From 1401fa7938bd94b31128dc723bd7e0446c5ea82f Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Fri, 10 Jan 2020 14:28:11 -0800 Subject: [PATCH 01/42] Add flash device locked by others to HoloLens FAQs @scooley @yannisle Adding how to recover a HoloLens if locked out of a device. --- devices/hololens/hololens-FAQ.md | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/devices/hololens/hololens-FAQ.md b/devices/hololens/hololens-FAQ.md index a183165e4a..e11c2611e8 100644 --- a/devices/hololens/hololens-FAQ.md +++ b/devices/hololens/hololens-FAQ.md @@ -45,6 +45,7 @@ This FAQ addresses the following questions and issues: - [My HoloLens isn't running well, is unresponsive, or won't start](#my-hololens-isnt-running-well-is-unresponsive-or-wont-start) - [How do I delete all spaces?](#how-do-i-delete-all-spaces) - [I cannot find or use the keyboard to type in the HoloLens 2 Emulator](#i-cannot-find-or-use-the-keyboard-to-type-in-the-hololens-2-emulator) +- [I can't log in to a HoloLens because it was previously set up for someone else](#I-cant-log-in-to-a-HoloLens-because-it-was-previously-set-up-for-someone-else) ## My holograms don't look right or are moving around @@ -204,6 +205,14 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe [Back to list](#list) +## I can't log in to a HoloLens because it was previously set up for someone else + +If your device was previously set up for someone else, either a client or former employee and you don't have their password to unlock the device there are two solutions. +- If your device is MDM managed by Intune then you can remotely [Wipe](/IntuneDocs/intune/remote-actions/devices-wipe/) the device and it'll reflash itself. Make sure to leave **Retain enrollment state and user account** unchecked. +- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://review.docs.microsoft.com/hololens/hololens-recovery?branch=master#hololens-2) the device. + +[Back to list](#list) + ## How do I delete all spaces? *Coming soon* @@ -215,3 +224,4 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe *Coming soon* [Back to list](#list) + From 17ecb7c7e54189325402f85a71623b813d916a6b Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 22 Jan 2020 14:04:43 +0500 Subject: [PATCH 02/42] Update recommended-network-definitions-for-wip.md --- .../recommended-network-definitions-for-wip.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md index c3e7e88640..fee621245c 100644 --- a/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md +++ b/windows/security/information-protection/windows-information-protection/recommended-network-definitions-for-wip.md @@ -33,12 +33,14 @@ This table includes the recommended URLs to add to your Enterprise Cloud Resourc |If your organization uses... |Add these entries to your Enterprise Cloud Resources network setting
(Replace "contoso" with your domain name(s)| |-----------------------------|---------------------------------------------------------------------| -|Office 365 for Business | | +|Sharepoint Online | | |Yammer | | |Outlook Web Access (OWA) | | |Microsoft Dynamics |contoso.crm.dynamics.com | |Visual Studio Online |contoso.visualstudio.com | |Power BI |contoso.powerbi.com | +|Microsoft Teams |teams.microsoft.com | +|Other Office 365 services | | You can add other work-only apps to the Cloud Resource list, or you can create a packaged app rule for the .exe file to protect every file the app creates or modifies. Depending on how the app is accessed, you might want to add both. From a9e14d89123e3b02729dbb3c383dc91fc4487933 Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Mon, 27 Jan 2020 13:54:47 -0800 Subject: [PATCH 03/42] remove review. from url @scooley Made requested change --- devices/hololens/hololens-FAQ.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-FAQ.md b/devices/hololens/hololens-FAQ.md index e11c2611e8..c91612ffa0 100644 --- a/devices/hololens/hololens-FAQ.md +++ b/devices/hololens/hololens-FAQ.md @@ -209,7 +209,7 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe If your device was previously set up for someone else, either a client or former employee and you don't have their password to unlock the device there are two solutions. - If your device is MDM managed by Intune then you can remotely [Wipe](/IntuneDocs/intune/remote-actions/devices-wipe/) the device and it'll reflash itself. Make sure to leave **Retain enrollment state and user account** unchecked. -- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://review.docs.microsoft.com/hololens/hololens-recovery?branch=master#hololens-2) the device. +- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://docs.microsoft.com/hololens/hololens-recovery?branch=master#hololens-2) the device. [Back to list](#list) From 06ecbe549f74f2fee4abe46cfe7be822916ad2ef Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Fri, 7 Feb 2020 18:36:30 +0500 Subject: [PATCH 04/42] Addition of comments As requested by user comments has been updated to improve the structure of HTML of the document. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4918 --- .../client-management/mdm/bitlocker-csp.md | 213 ++++++++++++------ 1 file changed, 148 insertions(+), 65 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 82139a98a6..746ef380c5 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -31,12 +31,15 @@ The following diagram shows the BitLocker configuration service provider in tree ![BitLocker csp](images/provisioning-csp-bitlocker.png) + **./Device/Vendor/MSFT/BitLocker** Defines the root node for the BitLocker configuration service provider. - + **RequireStorageCardEncryption** + Allows the administrator to require storage card encryption on the device. This policy is valid only for a mobile SKU. - + + @@ -57,12 +60,13 @@ Allows the administrator to require storage card encryption on the device. This
Homecheck mark
+ Data type is integer. Sample value for this node to enable this policy: 1. Disabling this policy will not turn off the encryption on the storage card, but the user will no longer be prompted to turn it on. - + - 0 (default) – Storage cards do not need to be encrypted. - 1 – Require storage cards to be encrypted. - + Disabling this policy will not turn off the encryption on the system card, but the user will no longer be prompted to turn it on. If you want to disable this policy use the following SyncML: @@ -87,11 +91,13 @@ If you want to disable this policy use the following SyncML: ``` Data type is integer. Supported operations are Add, Get, Replace, and Delete. - + + **RequireDeviceEncryption** - + Allows the administrator to require encryption to be turned on by using BitLocker\Device Encryption. - + + @@ -112,7 +118,7 @@ Allows the administrator to require encryption to be turned on by using BitLocke
Homecheck mark
- + Data type is integer. Sample value for this node to enable this policy: 1. Supported operations are Add, Get, Replace, and Delete. @@ -126,12 +132,12 @@ Encryptable fixed data volumes are treated similarly to OS volumes. However, fix - It must not be a system partition. - It must not be backed by virtual storage. - It must not have a reference in the BCD store. - + The following list shows the supported values: - 0 (default) — Disable. If the policy setting is not set or is set to 0, the device's enforcement status is not checked. The policy does not enforce encryption and it does not decrypt encrypted volumes. - 1 – Enable. The device's enforcement status is checked. Setting this policy to 1 triggers encryption of all drives (silently or non-silently based on [AllowWarningForOtherDiskEncryption](#allowwarningforotherdiskencryption) policy). - + If you want to disable this policy, use the following SyncML: ```xml @@ -152,10 +158,13 @@ If you want to disable this policy, use the following SyncML: ``` - + + **EncryptionMethodByDriveType** - -Allows you to set the default encryption method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system, and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)". + +Allows you to set the default encryption method for each of the different drive types: operating system drives, fixed data drives, and removable data drives. Hidden, system, and recovery partitions are skipped from encryption. This setting is a direct mapping to the Bitlocker Group Policy "Choose drive encryption method and cipher strength (Windows 10 [Version 1511] and later)". + + @@ -176,6 +185,8 @@ Allows you to set the default encryption method for each of the different drive
Homecross mark
+ + ADMX Info: - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -202,14 +213,14 @@ If you disable or do not configure this policy setting, BitLocker will use the d EncryptionMethodWithXtsOsDropDown_Name = Select the encryption method for operating system drives EncryptionMethodWithXtsFdvDropDown_Name = Select the encryption method for fixed data drives. EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for removable data drives. - + The possible values for 'xx' are: - 3 = AES-CBC 128 - 4 = AES-CBC 256 - 6 = XTS-AES 128 - 7 = XTS-AES 256 - + > [!NOTE] > When you enable EncryptionMethodByDriveType, you must specify values for all three drives (operating system, fixed data, and removable data), otherwise it will fail (500 return status). For example, if you only set the encrytion method for the OS and removable drives, you will get a 500 return status. @@ -231,9 +242,13 @@ EncryptionMethodWithXtsRdvDropDown_Name = Select the encryption method for remov ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **SystemDrivesRequireStartupAuthentication** + This setting is a direct mapping to the Bitlocker Group Policy "Require additional authentication at startup". + + @@ -254,6 +269,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Require add
Homecross mark
+ + ADMX Info: - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -297,7 +314,7 @@ Data id:
  • ConfigureTPMPINKeyUsageDropDown_Name = (for computer with TPM) Configure TPM startup key and PIN.
  • ConfigureTPMUsageDropDown_Name = (for computer with TPM) Configure TPM startup.
  • - + The possible values for 'xx' are: - + Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML: ```xml @@ -328,9 +345,13 @@ Disabling the policy will let the system choose the default behaviors. If you wa ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **SystemDrivesMinimumPINLength** + This setting is a direct mapping to the Bitlocker Group Policy "Configure minimum PIN length for startup". + + @@ -351,6 +372,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Configure m
    Homecross mark
    + + ADMX Info: - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -397,9 +420,14 @@ Disabling the policy will let the system choose the default behaviors. If you wa ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - -**SystemDrivesRecoveryMessage** -This setting is a direct mapping to the Bitlocker Group Policy "Configure pre-boot recovery message and URL" (PrebootRecoveryInfo_Name). + + +**SystemDrivesRecoveryMessage** + +This setting is a direct mapping to the Bitlocker Group Policy "Configure pre-boot recovery message and URL" +(PrebootRecoveryInfo_Name). + + @@ -420,6 +448,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Configure p
    Homecross mark
    + + ADMX Info: - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -445,6 +475,7 @@ Sample value for this node to enable this policy is: ```xml ``` + The possible values for 'xx' are: - 0 = Empty @@ -453,7 +484,7 @@ The possible values for 'xx' are: - 3 = Custom recovery URL is set. - 'yy' = string of max length 900. - 'zz' = string of max length 500. - + > [!NOTE] > When you enable SystemDrivesRecoveryMessage, you must specify values for all three settings (pre-boot recovery screen, recovery message, and recovery URL), otherwise it will fail (500 return status). For example, if you only specify values for message and URL, you will get a 500 return status. @@ -478,9 +509,13 @@ Disabling the policy will let the system choose the default behaviors. If you w > Not all characters and languages are supported in pre-boot. It is strongly recommended that you test that the characters you use for the custom message or URL appear correctly on the pre-boot recovery screen. Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **SystemDrivesRecoveryOptions** + This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected operating system drives can be recovered" (OSRecoveryUsage_Name). + + @@ -501,6 +536,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Choose how
    Homecross mark
    + + ADMX Info:
    • GP English name: Choose how BitLocker-protected operating system drives can be recovered
    • @@ -508,7 +545,7 @@ ADMX Info:
    • GP path: Windows Components/Bitlocker Drive Encryption/Operating System Drives
    • GP ADMX file name: VolumeEncryption.admx
    - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -536,7 +573,7 @@ Sample value for this node to enable this policy is: ```xml ``` - + The possible values for 'xx' are: - true = Explicitly allow - false = Policy not set @@ -549,7 +586,7 @@ The possible values for 'yy' are: The possible values for 'zz' are: - 2 = Store recovery passwords only - 1 = Store recovery passwords and key packages - + Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML: ```xml @@ -568,9 +605,13 @@ Disabling the policy will let the system choose the default behaviors. If you wa ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **FixedDrivesRecoveryOptions** + This setting is a direct mapping to the Bitlocker Group Policy "Choose how BitLocker-protected fixed drives can be recovered" (). + + @@ -591,6 +632,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Choose how
    Homecross mark
    + + ADMX Info:
    • GP English name: Choose how BitLocker-protected fixed drives can be recovered
    • @@ -598,7 +641,7 @@ ADMX Info:
    • GP path: Windows Components/Bitlocker Drive Encryption/Fixed Drives
    • GP ADMX file name: VolumeEncryption.admx
    - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -627,7 +670,7 @@ Sample value for this node to enable this policy is: ```xml ``` - + The possible values for 'xx' are:
    • true = Explicitly allow
    • @@ -647,7 +690,7 @@ The possible values for 'zz' are:
    • 2 = Store recovery passwords only
    • 1 = Store recovery passwords and key packages
    - + Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML: ```xml @@ -666,9 +709,13 @@ Disabling the policy will let the system choose the default behaviors. If you wa ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **FixedDrivesRequireEncryption** + This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to fixed drives not protected by BitLocker" (FDVDenyWriteAccess_Name). + + @@ -689,6 +736,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Deny write
    Homecross mark
    + + ADMX Info:
    • GP English name: Deny write access to fixed drives not protected by BitLocker
    • @@ -696,7 +745,7 @@ ADMX Info:
    • GP path: Windows Components/Bitlocker Drive Encryption/Fixed Drives
    • GP ADMX file name: VolumeEncryption.admx
    - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -728,9 +777,13 @@ If you disable or do not configure this setting, all fixed data drives on the co ``` Data type is string. Supported operations are Add, Get, Replace, and Delete. - + + **RemovableDrivesRequireEncryption** + This setting is a direct mapping to the Bitlocker Group Policy "Deny write access to removable drives not protected by BitLocker" (RDVDenyWriteAccess_Name). + + @@ -751,6 +804,8 @@ This setting is a direct mapping to the Bitlocker Group Policy "Deny write
    Homecross mark
    + + ADMX Info:
    • GP English name: Deny write access to removable drives not protected by BitLocker
    • @@ -758,7 +813,7 @@ ADMX Info:
    • GP path: Windows Components/Bitlocker Drive Encryption/Removeable Drives
    • GP ADMX file name: VolumeEncryption.admx
    - + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -777,13 +832,13 @@ Sample value for this node to enable this policy is: ```xml ``` - + The possible values for 'xx' are:
    • true = Explicitly allow
    • false = Policy not set
    - + Disabling the policy will let the system choose the default behaviors. If you want to disable this policy use the following SyncML: ```xml @@ -800,17 +855,18 @@ Disabling the policy will let the system choose the default behaviors. If you wa ``` - + + **AllowWarningForOtherDiskEncryption** - + Allows the admin to disable the warning prompt for other disk encryption on the user machines that are targeted when the RequireDeviceEncryption policy is also set to 1. - + > [!IMPORTANT] > Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory joined devices. When RequireDeviceEncryption is set to 1 and AllowWarningForOtherDiskEncryption is set to 0, Windows will attempt to silently enable [BitLocker](https://docs.microsoft.com/windows/device-security/bitlocker/bitlocker-overview). > [!Warning] > When you enable BitLocker on a device with third-party encryption, it may render the device unusable and require you to reinstall Windows. - + @@ -831,12 +887,13 @@ Allows the admin to disable the warning prompt for other disk encryption on the
    Homecross mark
    - + + The following list shows the supported values: - 0 – Disables the warning prompt. Starting in Windows 10, version 1803, the value 0 can only be set for Azure Active Directory joined devices. Windows will attempt to silently enable BitLocker for value 0. - 1 (default) – Warning prompt allowed. - + ```xml 110 @@ -861,22 +918,24 @@ The following list shows the supported values: >3. The user's personal OneDrive (MDM/MAM only). > >Encryption will wait until one of these three locations backs up successfully. - -**AllowStandardUserEncryption** + + +**AllowStandardUserEncryption** + Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged on user is non-admin/standard user Azure AD account. - + > [!NOTE] > This policy is only supported in Azure AD accounts. "AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, silent encryption is enforced. If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user is the current logged on user in the system. - + The expected values for this policy are: - 1 = "RequireDeviceEncryption" policy will try to enable encryption on all fixed drives even if a current logged in user is standard user. - 0 = This is the default, when the policy is not set. If current logged on user is a standard user, "RequireDeviceEncryption" policy will not try to enable encryption on any drive. - + If you want to disable this policy use the following SyncML: ```xml @@ -893,9 +952,13 @@ If you want to disable this policy use the following SyncML: ``` - + + **ConfigureRecoveryPasswordRotation** + This setting initiates a client-driven recovery password refresh after an OS drive recovery (either by using bootmgr or WinRE) and recovery password unlock on a Fixed data drive. This setting will refresh the specific recovery password that was used, and other unused passwords on the volume will remain unchanged. If the initialization of the refresh fails, the device will retry the refresh during the next reboot. When password refresh is initiated, the client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure. After the recovery password has been successfully backed up to Azure AD, the recovery key that was used locally will be removed. This setting refreshes only the used key and retains other unused keys. + + @@ -916,16 +979,20 @@ This setting initiates a client-driven recovery password refresh after an OS dri
    Homecross mark
    + Value type is int. Supported operations are Add, Delete, Get, and Replace. - + Supported values are: - 0 – Refresh off (default) - 1 – Refresh on for Azure AD-joined devices - 2 – Refresh on for both Azure AD-joined and hybrid-joined devices - + + + **RotateRecoveryPasswords** + This setting refreshes all recovery passwords for OS and fixed drives (removable drives are not included so they can be shared between users). All recovery passwords for all drives will be refreshed and only one password per volume is retained. In case of errors, an error code will be returned so that server can take appropriate action to remediate. - + The client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure. Policy type is Execute. When “Execute Policy” is pushed, the client sets the status as Pending and initiates an asynchronous rotation operation. After refresh is complete, pass or fail status is updated. The client will not retry, but if needed, the server can re-issue the execute request. @@ -937,6 +1004,7 @@ Recovery password refresh will only occur for devices that are joined to Azure A Each server-side recovery key rotation is represented by a request ID. The server can query the following nodes to make sure it reads status/result for same rotation request. - RotateRecoveryPasswordsRequestID: Returns request ID of last request processed. - RotateRecoveryPasswordsRotationStatus: Returns status of last request processed. + @@ -957,14 +1025,18 @@ Each server-side recovery key rotation is represented by a request ID. The serve
    Homecross mark
    + Value type is string. Supported operation is Execute. Request ID is expected as a parameter. **Status** Interior node. Supported operation is Get. - -**Status/DeviceEncryptionStatus** + + +**Status/DeviceEncryptionStatus** + This node reports compliance state of device encryption on the system. - + + @@ -985,22 +1057,26 @@ This node reports compliance state of device encryption on the system.
    Homecross mark
    - + + Supported values: - 0 - Indicates that the device is compliant. - Any other value represents a non-compliant device. - + Value type is int. Supported operation is Get. - + + **Status/RotateRecoveryPasswordsStatus** + This node reports the status of RotateRecoveryPasswords request. - + Status code can be one of the following: - 2 – Not started - 1 - Pending - 0 - Pass - Any other code - Failure HRESULT + @@ -1021,11 +1097,16 @@ Status code can be one of the following:
    Homecross mark
    + Value type is int. Supported operation is Get. - + + **Status/RotateRecoveryPasswordsRequestID** + This node reports the RequestID corresponding to RotateRecoveryPasswordsStatus. This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus to ensure the status is correctly matched to the request ID. + + @@ -1046,6 +1127,7 @@ This node needs to be queried in synchronization with RotateRecoveryPasswordsSta
    Homecross mark
    + Value type is string. Supported operation is Get. ### SyncML example @@ -1210,4 +1292,5 @@ The following example is provided to show proper format and should not be taken -``` \ No newline at end of file +``` + From 92a7ed8fd870ae6251f3d938d8b58865d0c5ff31 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 10 Feb 2020 09:05:43 +0500 Subject: [PATCH 05/42] Minor changes to adjust the Richtext Minor changes to adjust the Richtext --- windows/client-management/mdm/bitlocker-csp.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 746ef380c5..34121e6cc5 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -195,6 +195,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -279,6 +280,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -382,6 +384,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -458,6 +461,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -546,6 +550,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -642,6 +647,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -746,6 +752,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). @@ -814,6 +821,7 @@ ADMX Info:
  • GP ADMX file name: VolumeEncryption.admx
  • + > [!TIP] > For a step-by-step guide to enable ADMX-backed policies, see [Enable ADMX-backed policies in MDM](enable-admx-backed-policies-in-mdm.md). For additional information, see [Understanding ADMX-backed policies](understanding-admx-backed-policies.md). From 0f19b2686c14037121c1d3309e26f789f6c90850 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 10 Feb 2020 18:38:40 +0500 Subject: [PATCH 06/42] Changes to adjust the Richtext view difference. Changes to adjust the Richtext view difference. --- windows/client-management/mdm/bitlocker-csp.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 34121e6cc5..9244d5d9db 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -997,10 +997,14 @@ Supported values are: + **RotateRecoveryPasswords** + + This setting refreshes all recovery passwords for OS and fixed drives (removable drives are not included so they can be shared between users). All recovery passwords for all drives will be refreshed and only one password per volume is retained. In case of errors, an error code will be returned so that server can take appropriate action to remediate. + The client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure. Policy type is Execute. When “Execute Policy” is pushed, the client sets the status as Pending and initiates an asynchronous rotation operation. After refresh is complete, pass or fail status is updated. The client will not retry, but if needed, the server can re-issue the execute request. @@ -1074,10 +1078,13 @@ Supported values: Value type is int. Supported operation is Get. + **Status/RotateRecoveryPasswordsStatus** + This node reports the status of RotateRecoveryPasswords request. + Status code can be one of the following: - 2 – Not started @@ -1109,6 +1116,7 @@ Status code can be one of the following: Value type is int. Supported operation is Get. + **Status/RotateRecoveryPasswordsRequestID** This node reports the RequestID corresponding to RotateRecoveryPasswordsStatus. From 946ea85ab91d92a51b24c8d6c77b2e41c2fc405a Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Mon, 10 Feb 2020 09:38:31 -0800 Subject: [PATCH 07/42] Adding Feb release notes for HoloLens @yannisle @scooley Feb release notes. --- devices/hololens/hololens-release-notes.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/devices/hololens/hololens-release-notes.md b/devices/hololens/hololens-release-notes.md index aaf200a4b0..f49cc25d31 100644 --- a/devices/hololens/hololens-release-notes.md +++ b/devices/hololens/hololens-release-notes.md @@ -22,6 +22,13 @@ appliesto: > [!Note] > HoloLens Emulator Release Notes can be found [here](https://docs.microsoft.com/windows/mixed-reality/hololens-emulator-archive). +### February Update - build 18362.1052 + +- Temporarily disabled the HolographicSpace.UserPresence API for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. +- Fixed a random HUP crash cased by hand tracking, in which user will notice an UI freeze then back to shell after several seconds. +- We made an improvement in hand tracking so that while poking using index finger, the upper part of that finger will be less likely to curl unexpectedly. +- Improved reliability of head tracking, spatial mapping, and other runtimes. + ### January Update - build 18362.1043 - Stability improvements for exclusive apps when working with the HoloLens 2 emulator. From 3a5fc30b0824cf0a58c736a74032eb63f7d217d3 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 10 Feb 2020 15:12:33 -0800 Subject: [PATCH 08/42] Added 20H1 Bluetooth policy --- .../policy-configuration-service-provider.md | 5 ++ .../mdm/policy-csp-bluetooth.md | 79 ++++++++++++++++++- 2 files changed, 82 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 9d72af8a49..7ec3bd938b 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -15,6 +15,8 @@ ms.date: 07/18/2019 # Policy CSP +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. The Policy configuration service provider enables the enterprise to configure policies on Windows 10. Use this configuration service provider to configure any company policies. @@ -612,6 +614,9 @@ The following diagram shows the Policy configuration service provider in tree fo
    Bluetooth/ServicesAllowedList
    +
    + Bluetooth/SetMinimumEncryptionKeySize +
    ### Browser policies diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 225de9c9ca..1684e92639 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -7,14 +7,15 @@ ms.prod: w10 ms.technology: windows author: manikadhiman ms.localizationpriority: medium -ms.date: 09/27/2019 +ms.date: 02/10/2020 ms.reviewer: manager: dansimp --- # Policy CSP - Bluetooth - +> [!WARNING] +> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
    @@ -40,6 +41,9 @@ manager: dansimp
    Bluetooth/ServicesAllowedList
    +
    + Bluetooth/SetMinimumEncryptionKeySize +
    @@ -390,6 +394,76 @@ The default value is an empty string. For more information, see [ServicesAllowed + +
    + + +**Bluetooth/SetMinimumEncryptionKeySize** + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    Windows EditionSupported?
    Homecross mark
    Procheck mark7
    Businesscheck mark7
    Enterprisecheck mark7
    Educationcheck mark7
    Mobile
    Mobile Enterprise
    + + +
    + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
    + + + +Added in the next major release of Windows 10. +There are multiple levels of encryption strength when pairing Bluetooth devices. This policy helps prevent weaker devices cryptographically being used in high security environments. + + +The following list shows the supported values: +- 0 (default) - All Bluetooth traffic is allowed. +- 1-N - A number representing the bytes that must be used in the encryption process. + + + + + + + +
    Footnotes: @@ -400,6 +474,7 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. +- 7 - Added in the next major release of Windows 10. From 128324095188333892d3f37dccd1b1a6f52858c7 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 10 Feb 2020 15:39:32 -0800 Subject: [PATCH 09/42] Fixed http warnings --- windows/client-management/troubleshoot-stop-errors.md | 2 +- windows/client-management/troubleshoot-windows-freeze.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/troubleshoot-stop-errors.md b/windows/client-management/troubleshoot-stop-errors.md index 719976a254..3fe73d34ec 100644 --- a/windows/client-management/troubleshoot-stop-errors.md +++ b/windows/client-management/troubleshoot-stop-errors.md @@ -59,7 +59,7 @@ To troubleshoot Stop error messages, follow these general steps: 3. Run the [Machine Memory Dump Collector](https://home.diagnostics.support.microsoft.com/selfhelp?knowledgebasearticlefilter=2027760&wa=wsignin1.0) Windows diagnostic package. This diagnostic tool is used to collect machine memory dump files and check for known solutions. -4. Run [Microsoft Safety Scanner](http://www.microsoft.com/security/scanner/en-us/default.aspx) or any other virus detection program that includes checks of the Master Boot Record for infections. +4. Run [Microsoft Safety Scanner](https://www.microsoft.com/security/scanner/en-us/default.aspx) or any other virus detection program that includes checks of the Master Boot Record for infections. 5. Make sure that there is sufficient free space on the hard disk. The exact requirement varies, but we recommend 10–15 percent free disk space. diff --git a/windows/client-management/troubleshoot-windows-freeze.md b/windows/client-management/troubleshoot-windows-freeze.md index 664dc7700e..c9691539ef 100644 --- a/windows/client-management/troubleshoot-windows-freeze.md +++ b/windows/client-management/troubleshoot-windows-freeze.md @@ -251,7 +251,7 @@ If the physical computer is still running in a frozen state, follow these steps Pool Monitor shows you the number of allocations and outstanding bytes of allocation by type of pool and the tag that is passed into calls of ExAllocatePoolWithTag. -Learn [how to use Pool Monitor](https://support.microsoft.com/help/177415) and how to [use the data to troubleshoot pool leaks](http://blogs.technet.com/b/markrussinovich/archive/2009/03/26/3211216.aspx). +Learn [how to use Pool Monitor](https://support.microsoft.com/help/177415) and how to [use the data to troubleshoot pool leaks](https://blogs.technet.com/b/markrussinovich/archive/2009/03/26/3211216.aspx). ### Use memory dump to collect data for the virtual machine that's running in a frozen state @@ -284,4 +284,4 @@ On Windows Server 2008, you may not have enough free disk space to generate a co Additionally, on Windows Server 2008 Service Pack (SP2), there's a second option if the system drive doesn't have sufficient space. Namely, you can use the DedicatedDumpFile registry entry. To learn how to use the registry entry, see [New behavior in Windows Vista and Windows Server 2008](https://support.microsoft.com/help/969028). -For more information, see [How to use the DedicatedDumpFile registry value to overcome space limitations on the system drive](http://blogs.msdn.com/b/ntdebugging/archive/2010/04/02/how-to-use-the-dedicateddumpfile-registry-value-to-overcome-space-limitations-on-the-system-drive-when-capturing-a-system-memory-dump.aspx). +For more information, see [How to use the DedicatedDumpFile registry value to overcome space limitations on the system drive](https://blogs.msdn.com/b/ntdebugging/archive/2010/04/02/how-to-use-the-dedicateddumpfile-registry-value-to-overcome-space-limitations-on-the-system-drive-when-capturing-a-system-memory-dump.aspx). From 1b55043257fd4193c1e5d224ebf73d5627addc86 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 10 Feb 2020 16:15:11 -0800 Subject: [PATCH 10/42] minor update --- windows/client-management/mdm/policy-csp-bluetooth.md | 8 -------- 1 file changed, 8 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 1684e92639..b8c197552d 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -426,14 +426,6 @@ The default value is an empty string. For more information, see [ServicesAllowed Education check mark7 - - Mobile - - - - Mobile Enterprise - - From 13ca80891567b7b460c2dd486031f8a82e8c6f2d Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 11 Feb 2020 08:45:56 -0800 Subject: [PATCH 11/42] minor update --- windows/client-management/mdm/policy-csp-bluetooth.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index b8c197552d..ccd311c9f6 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.technology: windows author: manikadhiman ms.localizationpriority: medium -ms.date: 02/10/2020 +ms.date: 02/11/2020 ms.reviewer: manager: dansimp --- From 7e703a77537165f85188d33e3f2aa649c10a061a Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 11 Feb 2020 09:04:10 -0800 Subject: [PATCH 12/42] testing --- windows/client-management/mdm/policy-csp-bluetooth.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index ccd311c9f6..be4ffce043 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.technology: windows author: manikadhiman ms.localizationpriority: medium -ms.date: 02/11/2020 +ms.date: 02/12/2020 ms.reviewer: manager: dansimp --- From 9e9aa43eee2ddf6afa5986f5c4347a2a7d620747 Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Tue, 11 Feb 2020 16:17:15 -0800 Subject: [PATCH 13/42] Feb update notes. build num updated --- devices/hololens/hololens-release-notes.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-release-notes.md b/devices/hololens/hololens-release-notes.md index f49cc25d31..74117ca98e 100644 --- a/devices/hololens/hololens-release-notes.md +++ b/devices/hololens/hololens-release-notes.md @@ -22,7 +22,7 @@ appliesto: > [!Note] > HoloLens Emulator Release Notes can be found [here](https://docs.microsoft.com/windows/mixed-reality/hololens-emulator-archive). -### February Update - build 18362.1052 +### February Update - build 18362.1053 - Temporarily disabled the HolographicSpace.UserPresence API for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. - Fixed a random HUP crash cased by hand tracking, in which user will notice an UI freeze then back to shell after several seconds. From 8e4f85ca48e8f12dd34210799e60879868757ed3 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 11 Feb 2020 16:20:53 -0800 Subject: [PATCH 14/42] Added a note --- windows/client-management/mdm/policy-csp-bluetooth.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index be4ffce043..8e384d21f3 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -443,11 +443,15 @@ The default value is an empty string. For more information, see [ServicesAllowed Added in the next major release of Windows 10. There are multiple levels of encryption strength when pairing Bluetooth devices. This policy helps prevent weaker devices cryptographically being used in high security environments. + The following list shows the supported values: - 0 (default) - All Bluetooth traffic is allowed. - 1-N - A number representing the bytes that must be used in the encryption process. + + >[!Note] + >If you wish to enforce Windows to use Bluetooth encryption at all times, but do not care about the precise encryption key strength, use a value of 1. From fe4edd0b33c44cd925b17cd6b6ac052c2c0ea4b1 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 11 Feb 2020 17:02:43 -0800 Subject: [PATCH 15/42] More updates --- windows/client-management/mdm/policy-csp-bluetooth.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 8e384d21f3..2160f0b07a 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -448,10 +448,8 @@ There are multiple levels of encryption strength when pairing Bluetooth devices. The following list shows the supported values: - 0 (default) - All Bluetooth traffic is allowed. -- 1-N - A number representing the bytes that must be used in the encryption process. +- N - A number from 1 through 16 representing the bytes that must be used in the encryption process. At this time, 16 is the largest allowed value for N and 16 bytes is the largest key size that Bluetooth supports so far. If you wish to enforce Windows to use Bluetooth encryption at all times, but do not care about the precise encryption key strength, use a value of 1. - >[!Note] - >If you wish to enforce Windows to use Bluetooth encryption at all times, but do not care about the precise encryption key strength, use a value of 1. From 16ea53ec106378ef094b470f63ca820c8593e528 Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Thu, 13 Feb 2020 11:23:48 +0500 Subject: [PATCH 16/42] Few fixes for Markdown Made a few changes to adjust the rich text difference. --- .../client-management/mdm/bitlocker-csp.md | 24 ++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 9244d5d9db..6ba943ffca 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -911,7 +911,6 @@ The following list shows the supported values: int - 0 @@ -961,11 +960,16 @@ If you want to disable this policy use the following SyncML: ``` + + **ConfigureRecoveryPasswordRotation** + This setting initiates a client-driven recovery password refresh after an OS drive recovery (either by using bootmgr or WinRE) and recovery password unlock on a Fixed data drive. This setting will refresh the specific recovery password that was used, and other unused passwords on the volume will remain unchanged. If the initialization of the refresh fails, the device will retry the refresh during the next reboot. When password refresh is initiated, the client will generate a new recovery password. The client will use the existing API in Azure AD to upload the new recovery key and retry on failure. After the recovery password has been successfully backed up to Azure AD, the recovery key that was used locally will be removed. This setting refreshes only the used key and retains other unused keys. + + @@ -988,14 +992,19 @@ This setting initiates a client-driven recovery password refresh after an OS dri
    + Value type is int. Supported operations are Add, Delete, Get, and Replace. + + Supported values are: - 0 – Refresh off (default) - 1 – Refresh on for Azure AD-joined devices - 2 – Refresh on for both Azure AD-joined and hybrid-joined devices + + **RotateRecoveryPasswords** @@ -1038,11 +1047,14 @@ Each server-side recovery key rotation is represented by a request ID. The serve + Value type is string. Supported operation is Execute. Request ID is expected as a parameter. **Status** Interior node. Supported operation is Get. + + **Status/DeviceEncryptionStatus** @@ -1070,13 +1082,17 @@ This node reports compliance state of device encryption on the system. + Supported values: - 0 - Indicates that the device is compliant. - Any other value represents a non-compliant device. + Value type is int. Supported operation is Get. + + **Status/RotateRecoveryPasswordsStatus** @@ -1113,11 +1129,15 @@ Status code can be one of the following: + Value type is int. Supported operation is Get. + + **Status/RotateRecoveryPasswordsRequestID** + This node reports the RequestID corresponding to RotateRecoveryPasswordsStatus. This node needs to be queried in synchronization with RotateRecoveryPasswordsStatus to ensure the status is correctly matched to the request ID. @@ -1143,7 +1163,9 @@ This node needs to be queried in synchronization with RotateRecoveryPasswordsSta cross mark + + Value type is string. Supported operation is Get. ### SyncML example From e9e4f7511aae902f1afd606013b2f45b5d4dc372 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 13 Feb 2020 11:48:47 -0800 Subject: [PATCH 17/42] updated topic for the secure score removal --- .../configuration-score.md | 31 +++++++++++-------- 1 file changed, 18 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md index a040722887..5b876f90b8 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configuration-score.md @@ -1,6 +1,6 @@ --- title: Overview of Configuration score in Microsoft Defender Security Center -description: Expand your visibility into the overall security configuration posture of your organization +description: Your configuration score shows the collective security configuration state of your machines across application, operating system, network, accounts, and security controls keywords: configuration score, mdatp configuration score, secure score, security controls, improvement opportunities, security configuration score over time, security posture, baseline search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -8,45 +8,50 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: dolmont -author: DulceMontemayor +ms.author: ellevin +author: levinec ms.localizationpriority: medium manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 04/11/2019 --- # Configuration score + **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) >[!NOTE] -> Secure score is now part of Threat & Vulnerability Management as Configuration score. The secure score page will be available for a few weeks. +> Secure score is now part of Threat & Vulnerability Management as Configuration score. -The Microsoft Defender Advanced Threat Protection Configuration score gives you visibility and control over the security posture of your organization based on security best practices. High configuration score means your endpoints are more resilient from cybersecurity threat attacks. +Your Configuration score is visible in the Threat & Vulnerability Management dashboard of the Microsoft Defender Security Center. It reflects the collective security configuration state of your machines across the following categories: -Your configuration score widget shows the collective security configuration state of your machines across the following categories: - Application - Operating system - Network - Accounts - Security controls -## How it works ->[!NOTE] -> Configuration score currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management. +A higher configuration score means your endpoints are more resilient from cybersecurity threat attacks. + +## How it works + +>[!NOTE] +> Configuration score currently supports configurations set via Group Policy. Due to the current partial Intune support, configurations which might have been set through Intune might show up as misconfigured. Contact your IT Administrator to verify the actual configuration status in case your organization is using Intune for secure configuration management. + +The data in the configuration score card is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously: -The data in the configuration score widget is the product of meticulous and ongoing vulnerability discovery process aggregated with configuration discovery assessments that continuously: - Compare collected configurations to the collected benchmarks to discover misconfigured assets - Map configurations to vulnerabilities that can be remediated or partially remediated (risk reduction) by remediating the misconfiguration - Collect and maintain best practice configuration benchmarks (vendors, security feeds, internal research teams) - Collect and monitor changes of security control configuration state from all assets -From the widget, you'd be able to see which security aspect requires attention. You can click the configuration score categories and it will take you to the **Security recommendations** page to see more details and understand the context of the issue. From there, you can act on them based on security benchmarks. +From the widget, you'd be able to see which security aspect requires attention. You can click the configuration score categories and it will take you to the **Security recommendations** page to see more details and understand the context of the issue. From there, you can act on them based on security benchmarks. ## Improve your configuration score + The goal is to remediate the issues in the security recommendations list to improve your configuration score. You can filter the view based on: + - **Related component** — **Accounts**, **Application**, **Network**, **OS**, or **Security controls** - **Remediation type** — **Configuration change** or **Software update** @@ -64,6 +69,7 @@ See how you can [improve your security configuration](https://docs.microsoft.com >2. Key-in the security update KB number that you need to download, then click **Search**. ## Related topics + - [Supported operating systems and platforms](tvm-supported-os.md) - [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) - [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) @@ -78,4 +84,3 @@ See how you can [improve your security configuration](https://docs.microsoft.com - [Software APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/software) - [Vulnerability APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/vulnerability) - [Recommendation APIs](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/vulnerability) - From 8fd1dd36df45c27284fd6fdf5635757b7aefe66c Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 13 Feb 2020 11:52:48 -0800 Subject: [PATCH 18/42] config score redirect --- .openpublishing.redirection.json | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5ad808dbe7..8012e7c7c5 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1727,6 +1727,11 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-defender-atp/overview-secure-score.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configuration-score", +"redirect_document_id": true +}, +{ "source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/partner-applications", "redirect_document_id": true @@ -15705,6 +15710,6 @@ "source_path": "windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md", "redirect_url": "https://docs.microsoft.com/configmgr/desktop-analytics/overview", "redirect_document_id": false -}, +} ] } From ee69bf26040a6a1aaea270fd7b7af71310968f88 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Thu, 13 Feb 2020 11:54:10 -0800 Subject: [PATCH 19/42] delete file --- .../overview-secure-score.md | 93 ------------------- 1 file changed, 93 deletions(-) delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md deleted file mode 100644 index f08e397a67..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score.md +++ /dev/null @@ -1,93 +0,0 @@ ---- -title: Overview of Secure score in Microsoft Defender Security Center -description: Expand your visibility into the overall security posture of your organization -keywords: secure score, security controls, improvement opportunities, security score over time, score, posture, baseline -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: macapara -author: mjcaparas -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Overview of Secure score in Microsoft Defender Security Center -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - ->[!NOTE] -> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. - -The Secure score dashboard expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. From there you can take action based on the recommended configuration baselines. - ->[!IMPORTANT] -> This feature is available for machines on Windows 10, version 1703 or later. - - -The **Secure score dashboard** displays a snapshot of: -- Microsoft secure score -- Secure score over time -- Top recommendations -- Improvement opportunities - - -![Secure score dashboard](images/new-secure-score-dashboard.png) - -## Microsoft secure score -The Microsoft secure score tile is reflective of the sum of all the security controls that are configured according to the recommended Windows baseline and Office 365 controls. It allows you to drill down into each portal for further analysis. You can also improve this score by taking the steps in configuring each of the security controls in the optimal settings. - -![Image of Microsoft secure score tile](images/mss.png) - -Each Microsoft security control contributes 100 points to the score. The total number is reflective of the score potential and calculated by multiplying the number of supported Microsoft security controls (security controls pillars) by the maximum points that each pillar contributes (maximum of 100 points for each pillar). - -The Office 365 Secure Score looks at your settings and activities and compares them to a baseline established by Microsoft. For more information, see [Introducing the Office 365 Secure Score](https://support.office.com/article/introducing-the-office-365-secure-score-c9e7160f-2c34-4bd0-a548-5ddcc862eaef#howtoaccess). - -In the example image, the total points for the security controls and Office 365 add up to 602 points. - -You can set the baselines for calculating the security control scores on the Secure score dashboard through the **Settings**. For more information, see [Enable Secure score security controls](enable-secure-score.md). - -## Secure score over time -You can track the progression of your organizational security posture over time using this tile. It displays the overall score in a historical trend line enabling you to see how taking the recommended actions increase your overall security posture. - -![Image of the security score over time tile](images/new-ssot.png) - -You can mouse over specific date points to see the total score for that security control is on a specific date. - - -## Top recommendations -Reflects specific actions you can take to significantly increase the security stance of your organization and how many points will be added to the secure score if you take the recommended action. - -![Top recommendations tile](images/top-recommendations.png) - -## Improvement opportunities -Improve your score by taking the recommended improvement actions listed on this tile. The goal is to reduce the gap between the perfect score and the current score for each control. - -Clicking on the affected machines link at the top of the table takes you to the Machines list. The list is filtered to reflect the list of machines where improvements can be made. - - - -![Improvement opportunities](images/io.png) - - -Within the tile, you can click on each control to see the recommended optimizations. - -Clicking the link under the **Misconfigured machines** column opens up the **Machines list** with filters applied to show only the list of machines where the recommendation is applicable. You can export the list in Excel to create a target collection and apply relevant policies using a management solution of your choice. - -## Related topic -- [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -- [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -- [Exposure score](tvm-exposure-score.md) -- [Configuration score](configuration-score.md) -- [Security recommendations](tvm-security-recommendation.md) -- [Remediation](tvm-remediation.md) -- [Software inventory](tvm-software-inventory.md) -- [Weaknesses](tvm-weaknesses.md) -- [Scenarios](threat-and-vuln-mgt-scenarios.md) -- [Threat analytics](threat-analytics.md) - From e1fca675876f0c5dbdc34313a49be28f2976380a Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 19 Feb 2020 15:32:32 -0800 Subject: [PATCH 20/42] Microsoft Secure Score --- .../microsoft-defender-atp/advanced-features.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index bf486af90d..4b41111aaa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -108,6 +108,10 @@ The integration with Azure Advanced Threat Protection allows you to pivot direct >[!NOTE] >You'll need to have the appropriate license to enable this feature. +## Microsoft Secure Score + +Forwards Microsoft Defender ATP signals to Microsoft Secure Score in the Microsoft 365 security center. Turning this feature on gives Microsoft Secure Score visibility into the devices security posture. Forwarded data is stored and processed in the same location as the your Microsoft Secure Score data. + ### Enable the Microsoft Defender ATP integration from the Azure ATP portal To receive contextual machine integration in Azure ATP, you'll also need to enable the feature in the Azure ATP portal. From 430b9aa01ee2bf85615d5576f86fb43929a4a81e Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Thu, 20 Feb 2020 08:19:33 -0800 Subject: [PATCH 21/42] Adding in requested changes from scooley. Made requested changes. --- devices/hololens/hololens-FAQ.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/hololens/hololens-FAQ.md b/devices/hololens/hololens-FAQ.md index c91612ffa0..3ddc7325a9 100644 --- a/devices/hololens/hololens-FAQ.md +++ b/devices/hololens/hololens-FAQ.md @@ -45,7 +45,7 @@ This FAQ addresses the following questions and issues: - [My HoloLens isn't running well, is unresponsive, or won't start](#my-hololens-isnt-running-well-is-unresponsive-or-wont-start) - [How do I delete all spaces?](#how-do-i-delete-all-spaces) - [I cannot find or use the keyboard to type in the HoloLens 2 Emulator](#i-cannot-find-or-use-the-keyboard-to-type-in-the-hololens-2-emulator) -- [I can't log in to a HoloLens because it was previously set up for someone else](#I-cant-log-in-to-a-HoloLens-because-it-was-previously-set-up-for-someone-else) +- [I can't log in to a HoloLens because it was previously set up for someone else](#i-cant-log-in-to-a-hololens-because-it-was-previously-set-up-for-someone-else) ## My holograms don't look right or are moving around @@ -208,8 +208,8 @@ If your device isn't performing properly, see [Restart, reset, or recover HoloLe ## I can't log in to a HoloLens because it was previously set up for someone else If your device was previously set up for someone else, either a client or former employee and you don't have their password to unlock the device there are two solutions. -- If your device is MDM managed by Intune then you can remotely [Wipe](/IntuneDocs/intune/remote-actions/devices-wipe/) the device and it'll reflash itself. Make sure to leave **Retain enrollment state and user account** unchecked. -- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://docs.microsoft.com/hololens/hololens-recovery?branch=master#hololens-2) the device. +- If your device is MDM managed by Intune then you can remotely [Wipe](https://docs.microsoft.com/intune/remote-actions/devices-wipe) the device and it'll reflash itself. Make sure to leave **Retain enrollment state and user account** unchecked. +- If you have the device with you then you can put the device into **Flashing Mode** and use Advanced Recovery Companion to [recover](https://docs.microsoft.com/hololens/hololens-recovery) the device. [Back to list](#list) From 995f9398500718f84845702eaf45fc19e8753c39 Mon Sep 17 00:00:00 2001 From: Todd Lyon <19413953+tmlyon@users.noreply.github.com> Date: Thu, 20 Feb 2020 11:44:34 -0800 Subject: [PATCH 22/42] Update hololens-insider.md fixing bulleted list formatting --- devices/hololens/hololens-insider.md | 1 + 1 file changed, 1 insertion(+) diff --git a/devices/hololens/hololens-insider.md b/devices/hololens/hololens-insider.md index 9e30e0d48f..3d8c8eb80a 100644 --- a/devices/hololens/hololens-insider.md +++ b/devices/hololens/hololens-insider.md @@ -92,6 +92,7 @@ You can now can access these commands with your voice: - "Volume up" - "Volume down" - "What is my IP address?" + If you're running your system with a different language, please try the appropriate commands in that language. ### FFU download and flash directions From ac6c580fe88dfabd20ffe988454ef233ee2e9e67 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 14:23:01 -0800 Subject: [PATCH 23/42] Update TOC.md --- windows/security/threat-protection/TOC.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index c969d4994f..418d1ceaa9 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -103,10 +103,10 @@ ###### [Investigate entities on machines](microsoft-defender-atp/live-response.md) ###### [Live response command examples](microsoft-defender-atp/live-response-command-examples.md) -### [Automated investigation and remediation]() -#### [Automated investigation and remediation overview](microsoft-defender-atp/automated-investigations.md) -#### [Use the automated investigation and remediation dashboard](microsoft-defender-atp/manage-auto-investigation.md) -#### [Manage actions related to automated investigation and remediation](microsoft-defender-atp/auto-investigation-action-center.md) +### [Automated investigation and remediation (AIR)]() +#### [Overview of AIR](microsoft-defender-atp/automated-investigations.md) +#### [View details and results of automated investigations](microsoft-defender-atp/auto-investigation-action-center.md) +#### [View and approve remediation actions](microsoft-defender-atp/manage-auto-investigation.md) ### [Secure score](microsoft-defender-atp/overview-secure-score.md) ### [Threat analytics](microsoft-defender-atp/threat-analytics.md) From b723d354b16691c4dc5b864cb938970334d8fbad Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Thu, 20 Feb 2020 14:50:43 -0800 Subject: [PATCH 24/42] Updated with support for Pro x --- devices/surface/images/dataeraser-arch.png | Bin 0 -> 173037 bytes .../surface/microsoft-surface-data-eraser.md | 24 ++++++++++-------- 2 files changed, 13 insertions(+), 11 deletions(-) create mode 100644 devices/surface/images/dataeraser-arch.png diff --git a/devices/surface/images/dataeraser-arch.png b/devices/surface/images/dataeraser-arch.png new file mode 100644 index 0000000000000000000000000000000000000000..07eb456002f6ea7c6cb663014dfeae5671670701 GIT binary patch literal 173037 zcmYg$b9h}%zjllr+iut-jT-LQww<(%8z(!qZQE#U@7Qi^n~nALdCz&?^WE3A=8sv| z%=%&0;JznJNkI|?KnQ?tVIfCBw}I1%9f*7ObB(Lg|uLr9AWtAR4lI<+0C zCEck(!29+~ycRqwn%MEE3d;nwIUD{0H~iDhd9=6B2j5ADtR?0YZA@+E7EZ(&)TPxK z!oS%|$G1YJE!o>Y@N1C004aSTFr{clKBcAIP_2uw{aiyZ6cqICnp$7(esTSHkC_sZL;RENL)-3Ex zfmy_6&7228zDK@m-H{)$oF2e-H>~95ip$IvLo@!ECnxwDR6z&7BN?=*a=OCYaKUEX z6-g$ot>8zS80Rt1h-T&i*Y)I;`dOu1{M6tRTL+`!wFkbc!kGUFy*H}rWVY~TML3|3 z#TY;NF>9B{E{n%=Qxg5LKmG)eyG496T+L-^N_kGXGN_ z-e3z-I1>)HDNOd|?l-8`z$H1OzI_sTw3Wf@!Zx9aO1oLJXlLgRPd0!~GKha}QQ-wM z-s>#>hWFt)qP3k--WFno~ zyVsx9TbRpPLz>xU(0 z))DG4>|;4mlv$+zmdn66iLGLJyfpnmq3(re!lUZ347VgN2icdRN6 zwjgPFRNf9K`|5pZf{GYn>B&hfAyhT`Q^xt&!0lsEe}%gI6naO$D~9)@<+r%G(~hXP ziKBf=?XKE`LJLACeJrd$-abMbsPYx+pIwSnggG;UjPZA@i(w6q@ zwkfj@*zi&U{}=sMkbq`;{S*PcS{wN2-S7y^e^E^vI;K3%5eKy4%;}@{ca>(LU+2!5 zl0Lz*cMH$YM2e*qWO<8*%4V7iOp*yR5=8u8gyo>7@2*@~MEJ=HVSH+m&pZF>BtO(ELc+yqo4ag1$}RBUhUn>9qn-mVtLL2W*ALx8o39g_J+(F+ zjt|U)vMAhD(5o&3lh}RR5ZSwkCXz26I1vL}!CM$%cm1Tg=&NBz={J4VP&?j7Y#{*k z#k|?sTe9aYLBfr_UpSxsfj3>CF3n zd=z+Y9^PIM2j-{C@4l+y21}x6lF+Rsl3q@{`rP3`dadCm3;yrKO#@zd3CGw~Q^x7^ z)7k!`&Cdc7<%0$vBAMEP zT;z`RSyq)KKC9 z7-n2w^DKxmBeB<`g7ArHpJ)5vSrLoP)y*M0?tYc}u!l_#w0#+IPsL4s&?7n;84%m8 z-R+i%k(s$G(bXzUls;RyRc&zU{cMVb0EHz@A$Igz&p2}U0CxD+G)FMbg=wvxGHI?>05*B5aeGK5%ppcNDJZVSj6wKGjQ9@=Nh$&Pja~hUPQBJNj24;>dlT~ zIa;ZaLs`}nK3gE!I5h^IZH*+*g08k|myBWww2}4UsItUqY>e5K#%*2k9+mi ztXmd^r>9@US`0wY(mv4_7q|j1dyc>rehDK&7B+g}(y=1(j@!xhmaZ;PnaD^d56v5? zgetra@0#h*WAQR<&Nk=}();5@a3|uI>CrN5rL8&LA~B4>Q%Cok3Gwk(QfzGOV@e3< zJKY;~ub8pXwFTdG$S{c)85Y03UC3p%zn7ts`)w;R+c8JBfLHi62zkY$MU6RvHo@WH zx2EB?kq=pvglMTJ-tUo10F#^L>36NtMLW}7!Y*$+GF^|Cnke2Aq*FR`UI1aNY(*&{ zO5&}T^)+rbaYO9q^8&3Z$_#!g5YTQ$uq7tO`{84oOA%_#hTXdAmn4jB=oi5^_}8J2 z#}5(ubzcpwL6J^C-+b(>8ahsD)XP!RYAP(@>=Uq#9&62UD~^vNNqCSA+!AHb9#wFU z5S})$BSP|2NpXYs7_Ed5f(2h5C*GPGlt*7vB1%j~V!FdX$IPMpxj1)1!u;H37ra2~ z?ibc;g4V7m(0473R;~_)CwqljOs7V-&2YZIz8muCCllz3xrj72btK8)+7u~QL+Q?$ zfQjSfgCyro4K_gpY7)Qgxie?~z zA*Bf*RcI6C9v3Up5vI<8a+tcJFJnb9>uH}2Yso&h)m1HU`U%Wmwd?U_~Ro{-!=3`F% zfxvayO2b2zU;lxxyBfn<J;FDL>34f5T4U&XHqr)H}+*=;L)cqYnMcWem9Hc{v~!X44d)EwsuT|xS4G#VU@*eA zWuuPBM8x_qJUqNVZESvXQ&X_culw1xv29gmzVNU97COWG4t8e*Ob{^59g7FG(qH&5_>Txjj4QFas^E zP7#tOzG?*rnXtw<4Wb{e$_MM833P;%c!bzRQUdk~>)=?@khg`0Ze|HJ@MP?QnSd=1 z1Q(YLxd-VjxAz_`tuui|+}xhe2r)T8FiTBMgE!HWCu%U)z;?pR<6Mbh{;9cE`z_=~ zXJ^(E^nqM-tUgY@X*mWZJczQ^+r!@j9?U-i!D{egJ&yi94d5VY>WH${Pv42zwt zoHszT?WV9mim)wrZ;h+}6EHxp3ue%(r9RBge(I1t?n|*1f*MJTtLydAF=;eBWL*aJ zx3TYZ*3ku7HbBsv?nTHte6pXj@~pc3ooP2yK9QqL#a#B>z3QFQ6$bE$mCX z7Nn@2`qx7g8J^D^DGi4Vw9&9w)7<6V`a?33Sw}2ib>cVcg^Il@kUHO-*sPIsPx7&ne+9d0tV|tEdu206~S$ zElB$GJ*68#r$?zaIpntKQtOtvT`GgmgS^rAv@EQU2PD3SkhpD{X+Lw_PxzEP*fFUEByY+WZQB#sGzVk%xcot9q&N@iSa9>BX+S zmG4VTQ;oMH*5&4Sk8jAr1+yMgz+fXbatr>MAh>2#ym?Nd*%7%yMR_$JdYv^ z3J^qG*NUyz9&-Ldw$t4G0wrurBKUFF4dz?KH6r8h-Ia`)&Tt0e^PBpx$%@Y)=RC+4oqZZO0?yo$oTe_SwGUqM_;QwZF)|e)+hq zwm;M%f%~eUvd=-%b(+6Ol($Y|%-I~L@`HQjnb7C?krYk?i;EqFae@2bP2clrM$o8) z%;@giaOYxzNGbT`@lT)NmW4;;#KQ+v^DJDZ1=-8Pd!XR^b~gvPF}czk?(H8wrbJ9tY=OQ7T9h17fll1dtl zLUWdJ?4$mOpQq?|vy=-JfaE!Gm9k^riUZUe`eVj#*h(+8}1)! zKg@|jLWb}s;LJBTYe0N4?tMKs4$$d5qCCI+`Aj3TI3?C`S3(qLmdSb%u`|y&a(S@0 zo1%Y5WwbQ4hJ&w31==6zn{v+b*3V6W1OAB4Qjm?PH=+wTi=$z4X*wR7r0F^Bn@zm)|J@CDgu|^rnPj%`E#IJBDQN{vS@Yx zPWSNKNA7e?jCnf0OnK0J*D8bI7VW1mnrqvA{3j=PkdgaM68qM16Mu_qr6D^-nV$S% zwY)U(sEAom1D7sJt`Kc)7w9jA)35y^n8W*Y(HA4o+d0&Jq@1}s4nBKCx8?=XWayzqZ}|T1io+a3@yPovHD85y+BK6t4KOcO%-%B;^B~IjbfACwUev1&uKFBG z`j!!TKNctf6Me7WT5beIx>fVLx5Ush%;TX8vqD;Pmg@D{jCbt-GjoGf%O2v}tdb2D z|CcBqZ{C2$4;Y_|y{n3caJmD>s}6_)o?J5q(CLEB(i>_tsds2Mfndd7YW`JgR0@wYJR#DQUl5%R(a$MYo0nr^p0xB8brGk(-x$(AaS3CaU>* zVfD1<54wku|8d+@~X2woT#*(8{prdr4li9?( z*+qRu<785lrcm<~O3cZK3l`5!c?_}BS(u7hkdf{f<95Y47_^THAP-1G%8P21s&Y-r z@SUS)&QXoOkI{YiTQ&+kwhKN{!LnUP?Wc^1KQOu+fnIw#BNbQ{0ISg(Kj}a>Rsxzg z`!1xBq9@{}l4`Z+a!bed@&Dlkq|s}0#T`yhPj_rPxQM($J!2y@`b8?rAG6o$t9dQL z?FkP_$@;It{YKq=e8^%*`7yu0Rv5m?oOwu&((4y=XAlt$AKrdp+D@;s>P>Q1r=AsX z?S6XM+!6dp`G`)~#pNj88AJ04LHlVVWK(FD$YsZkZ_+f^Ype_2^d7m&c)@Mx8Q|a= zIzT}i00zd-@f?TtJRhtOzUKSwetAdCX^M$eE!S%GBKiCkN1{7o#1r95DiWs1PuU|l zDDjYU2RXAYP;lHto-%!?4Og9Yq;@sDz!qhXH^;70F=-1~u2QAZ-GV-&7IWqTZtyN? zR~uLV%r$~)RlXPzfPq2pXsaA?Oorl$hq2GMyf}8uOu1ZVYXw=Oiu(TD(fYyqx6L0k zdG;B-_5OC-zw7OcS?~F2(XEzNxu`nvA6-8DY~r1oxxQ(n9<~O;uK@!C47j%zOSe3; zWym*A5XmQbt}PMAxhRW@1+CAxY-L!)&hXqW`b(q%&?rqLM!@X8;sHQ9B9m2aTSK&~ zMub-RUTj%aUOLx+37X6gA>CST)A47?qs%j^p<8Z{Q{*qyo^jrBA@JiCItxnTX+_OB zBaI`Tg{o*@4t1hsb|4La`3#_l%x1{Lj#(73CV1Ns`8F2Yzlpd|p8Y1s=p~=ad3 z!dypBF126N=75s1m=c%nQsaTX^;i>;oi5&`Ced2jlZAS{w?Q_usR%ZMV?!F#VosGJ z=rJc2Vpl&(gJSzhAkkyDMrPFgwSTrQCO@w?Cu-niqu?GrD}ggOfrkwVNvo_V_Ygpb zs0^2un^D8R#)-?|6sFS(^3kWN6Jr5ekWtfXro8U^+3wm3Ak;4d*|?8k$u zaG$+pr7BvjA$*z(J*C$(L4;J}^!M~Y5~;9a2Zhp=N0r5?Y*-lnQJQjcQA;sEED$Y#;W-5JPbFuX)D*7#>S}f5hFKfyLBON)+m!sh&iLH1INf0 zRc<|;2!%>uKoVD81{~v5|I(ek1DjAzk#Z$7Wm1}-JxX#Oxu$^_YXaDu8%mL+XP96M zkfK}ucPlTY=MQ4-J$3r&d6pc7Be8=eb`XEDa`g$}(5dmfV(&+>D%iZbJ)lq2{^!T& z4FDGpPwbhKiwpL+;4PTGsY{D46x5MYH^Yi28x|njT_{qRm832XZoK6iL8Jug7^bB!FiRjK(O z2`MgHlSXCnAjNG<$k`_-YjHpAVdLL*HEMi4b1#O*3mb#>;lk{4iA3^RK>$E26vJ=g z8(chaK|##ru6aq6NjQ(guO==BTyw=#Im5fgh0lEsCTxItpRhfCwrYpg#W zxZx8-OD*+&6Z=qV9=-|p2zq0bSxh1*)*LeGk`|v=(5580U>`gA zZA+eg+6ztcT!0v@hQXO}mIfT*y!3|aLMqU61tOAc3;$8T937`?ex5IwjpVRvg)2A4 z8zCyYudJ;%;7}hhGAH^+LB~#7dY(;dRjZG$xf+a2BLz=NYRm6u3NMvXU&_pB_m>vo zQ4Kgb>$y3b1Rc- zUVr0sEra&p(R^t3lz`%jQoNhgRptgYRDu;yN;?9BdSVBJfNE|Ujg#mQz$P=3bB6a= zXbd-&ic61^DjCbn(XDhk?+2d!?yptf>fIVH$*P5(JE9D&s)bx`(?8B6%R$t7x|0CB z>scsz2h}}nyyTxoN0xM)i#4q)VgXX&DdIGuLskUC#q3h_&TC#T{E0-Og%xhKq8v%7 zGDy-4IP-YHSAS))NfS34601`yIy2R)%zSh6u6T(#NSP#9Mzzu5BKcY+(X&I-)M*ar ziQmrl*++4)fozA^hAn;R`alx7u1NGLZ$&c^QT|c>QFdNV2O!y zdWd)GrRBdV6SLawT0d_s?RfMvj_&Aa@qFD9ZqNQOy7vl z6QM9B%PM)T#0KwhjVf_K)30m{q#2(q*>Q+w%Bg(T3}hha6|%9w>V9qvUYUbNERuTG$#*NzM2)#T&ja?_sSXG&;GfbJP zQJYgYozbF{hSbN9>uCf1`vJ*?v z7s9EZYb_MBTFgl>DdECm(M?i$zehin&TOV6x!f=Mypg#qEG}yP-0Y&h50>>$mYy3y z7K6HNtz4=^%iP|;d$`VdpYs9xyi|Xntggl=X&Zn&KAwFBR(;;9jlbP4E%S+$toQw> z_xE|hv)#S0yn88%f4yK|>34w%fhJfv;!fb@lcx-}HRUBXW^vBbwn!XxGmoUOE6(4N zXhQp(A<2`2W%-E-hMba@Fp|ajICGxyrga`?)yfVO9kuLYRGBUwvqOhT7* zW?Xkl@rg)DunNqT%Fcjz%=S|2*q5z;G7VM|-MEFC1tDx|M5?Yun6Z*REC#@76D%2g z)5u6^a#EPk9+B@xp|wN{ZuBWAbC{3#Xdy>2lD?MYDN|G_U4{JrEFDrEtf3Dl?Jc2{ z@0WWFTbhX1gJYX}xH09_ zX`U=-L@Ocohrb%ORjf5lzaKxYnp*piCvQ}RajTtU`oaAm-U>0_<4wFNh~}9`se=4n z?&neZ=?f*4{N7!iQ>eop0{4ggtjy&tKL|2}vdPMACU|W7DVy6$yz*Y)L5eapd${l6 z82LY+Vvk>$mt}ZoufI`+ZZ0#_Y zyip!tk|4LM!%Kf>YudI04X^2*%JtF_)y3=J-PY6ZMh-@>0K{=VgrZaQyBlv)Y7u## zXjYg=qWp{?|0Te0qvV*S>+aTqb!gunVIH?Zb1PH$Kl3UXeD&$Os~`?X(lErw&!9dv zdAiS2-g$FyjBKbfe}A2SutV!hxt8_iEFLGSXU{IZYUG=iMsEP`}YMm zn!Y+r3DwV%Z;a4siI8tRtd{?3n3&a^PV(ZsI2aw1-=Y&{^sIkj?7Ee-T;sj|C+Ytb zub|X60bWz0w=$G-*Bn9Nr+)Av6-uif>7+H|eJ9nIi{sHmBntOUv8``nIsb~LXbAQK zuy}vP2sG`!(cDdba6)zSj1`H<%j%{#fT|t7!V^NAeS0$aYRygRVsF;;AGiM^OcSdC zp4^7$N1<_{Bf=Tt4_ZYQGS^(2_06Dar|r+QTXL{y2RjV`=qzCCKlRF_<)`9k4m6zAIg(zqdmUF(xZ<619jjeZ%<`0Ju ztuhQ@&-&3Cb8DT(|Aba#Cka~GbtfRUn-%&>-Od%DV779y%#oTMWVMezjgk%b_fUrb z`u|MO2~BPvJlv_s(<%Y+{#iy&mxYO$RQ!z%l4&RvAzmTH;yW(>NB#K+phomdhu*1{ zjBgq1^fYEQvqZ!TOysRg&zNBwU|hbYUo_; zr;>!7|MS`J^JM9?T9BV)p6d|Xmd789kfX=34q+jYz z2Vp&5W<=*u{>XZ+!sjvw=z6iSo^|!Q81ud-0z?riths!u5?YHr`qbcOGcp0A4ebu>% zIPyn4fcqs(YNMH2WJG~Dfpeb+tp)T&cJGd_h-*ee>rcnGw=1MQ18ID`%Wwh}Afiz3 zm45PN#FU3}rUE`lB&mIe2NKiEPw-)U{_vRifQ$xK8GFBBrqduqI*}hMp^S^v*Vd3TR+6Vl&lv`AL%l=S`#DxY9^-al zmK@MGNXrSCxfu> zqa`h2!A}maoHRNHaKK)zLj;7y)WXC3L~p`P(l&rB1Fvt)ucCPA;Z>5uO?1R%OjB0{coQI+u;K*vdp&YOB4C&)Ym&?I zm6YOU@QYo1H|9gmui1l+*bHB9H}3RJNKNvw#R4TgCXE~wR?t3vFyj1iD^i7S{XDSCG^A~#@5-Y@#dqncLKTN6bWvqmQjU+~LB(=Gz@4vOnQ$EP)l{nm; zU(q}>C(Ohuma#Nkc`qWdxNu828TRB_AX`LG*wC?jg@Yw_JH%4&^y=jiF*HK~I9T80nZ8W}#|AKfv@lHJNp>V7m8aP<`rCuGbdva0;$ zFfFQZC2z-5@P(!$l;^pa!)x=h+I=wMKH_kH+k`;Uh9yZ^xfc5fDCDza`pwZ;Kp|

    2ugG2_Z>^vOi0D{8&%3)nc;Hnyio_VkGACiq@DK2*835p(5*w zQu?L*SYP)=v6MGcRFRbt+qpwsY3AJF&!7Od{6Hftl6-{mtfQUJ1=1|;k+9TH7+nPC zeNTg-b8##rf?$QI0or;Vg*7Qhg*H=zhM8Kr?w{nDXF(nQy3SY=mHxY30aLF0nd7fY z6tiFOUq5NP$2|ZqH@-dc-!DyGrnif*4C)}_loW>vO+a(}vgaX~es!yO? z{`&T{V{ST5#J4j!O0p@06oc43rdUs2M`6=TBHCHDPefQW;Kcr5+hTKI=^#!p5X^$Z zn9QNZ#!$?T_F{wAhZvI2uJ##@^8_yWmQckV|AHkAwDfcNv2EW3D%gFwr!hQQMh5ZH znD~BtXfiB7(gqKj4+84mnxA@(5X;G=7E+SNW^2$tEGg1ocnIt@G?-ukk>hPEfo9)o zPNc0r&{*yl#39-~wk_w0oTW5^^a@bT6zBl#=#ylo$r za2CH1rB?U4QebX2kr-scc;}cISgU-aE#0&a)>G)ST<@_|7GG8w5F4}SiS|GxZ6+p0 z_FDS(&|n^)!}xL7DTs^ZFNLi{aPytyvZ~Ooq7qTrn9Uiiuxo)u&^7vf~*~-%{ zz%wP&TmSk=Nx=FvR(Q4soFxH@6*X+}>8>AC=5%M_J%RG}5X$cuUN_=uJXdt4+SDzl zWUO*2dU>#jL7$F+pQQ1Q?G8n3G{;HXQkDZspuK%Z`;Ea?>qqscdJZPhnH4V@k zTu8uCuipQbP==PW$Fg0eHaXuJac#t$tCa_6Qkl=QCmUjd<3#e6MlYr=3UtF8D5H>d z&RkRyf-u`NQA9-SFrQ0Y0R15NtW&Eip#0OsP96KGExaf^tX(|V1??!3KazH)2MP7F zd;%N>o!IeZ?NBzM&k5}R(^v02; zvfu?wp%% zt7y3K4wvv=o5IR|MK%!?Pkl_l)NX1{i;Y#-NRTVVy>i6OK*44H$g0J7hP&UH`zxbh zC@o=_-)hYIWmpq&h|FI;)cJ&fyzT;;12IC)TlITB+9JqTA;nm;WzXcndk2zX@+8=x zf{sPiSl3}4Von=99rdfbcF)u^vur8p3H9jK_q${24k{Vqv+7Lxfsr5x`}M&<_9k7t zpukk}{_8S(P_V-Y`)&i=h`Vedtp!m)3kr>O>P==7iDASoQA$*@l0+7Z>2jSPpFC2t zCGRZ5TV&rnj@{(88-ors920_3!UTJM{{ZKo`F4AIKmB}UIwqGR?O6u6WGlETO{YSB zG7lU0^Jt{i=!=;3{#soQi~1+n3=+kL-6n!X$u;i)F~Mofsn(^B$;M5oj?|ZJzT6%) z91Z|soj@2q>OIfUr>f5>Ic{q6V(tm|I`V&hkv~U`ZI|bz6bs&ot7gW*GiL(_cb(Q0 zwR=%Z88IjW>K|xdj>fc(9vLVO+P7*W?&agJD5X>42n$UpN}!@6n9@IHg zT{7x!8TdZU_ZcsueO`-<^4T$u>EGJoE^HaMhl)O)#=>gzOarSBIE7~!=TY{)iLty} zAd}>?6egK%?5d;lcO2S5@VchaD`tayE{X+eGf59!6_M6Du!=Ekoe zXp|z!Ft`PBRKj9iDDTm?P`Nod^(Z)zprCz*n|&xfDoQ+NG!sVa?wtqwj?s*+wkEg-hO4l3lK@XO=-eqhc1K%%4ZGC;b(WY)D zy*|7(;?6Qv+edA5?6_am1u0EuawWfu#+**+t*xRNDXXkQB)Fmfh^npU9I_Kg<)L9z zeq-mVbY+mNf?5k*$xk=$dzJH}(*pct!Y?gORnlr+@w00U*}IkVie8NeRgr6sx>0&7 zLvDwGr+1ZLEw&M$PISXS5`u)}lu60rwZcG3;5brGM=ZRfrJ>C0OR108TkwXk1@=g; zi=-PGB`zk4Q23Cdn{;k)33OIQ=rxjCn5K}&tCNa|vrG<)hnyVlYaodVX6@H`j#k$u zlZ|2e76bO$bXAtWG>{LsWCo3-&eEaw{G}E;e>5B?Rh~CcaXb1JU%WwSp*3D9+Jq|) zZzw;wh;d^eu~gwpT1$U7pL*p^knNe?QzoHv&D%=Nnh{+yXc5`NG zx>P2CvFvxuzbCmrtpV~xw7RKjj>N`AxUd^Xw3z4Q$pa>V6%^Hxp-D#?e>77y>U2k2 zubHi}UafJYiK#>_Zn&e{m?hW^k>}V`9&JqW@uM6gbC|@oWq?g$-?xG<@wAnw<|Zcx zCog|Fb^A~6-0+jUZot%Bg`$eKjB!6h!?(u_F7e*XkicqH9D&+Jn0ZLFBNBfJ^)D8w zgrlDl3+e&$Lbo*J`$02}Jcp?Xm>BRD^k(2}g`RB?F=-h#hZGUAgp4TtRPG`4jH0Es zI`XSyi0RIind!xDG&J1Yywb>Lx^%!i-QXGM#FUVzW3Okl7jpELr&z(awxl<&0nce( z9fwC1gMH#6(?kpk#>GzJ7AM$=_Y<>Q0HXhVj>pl8UMVn-kbqTUFm@#H0T-DDr0;r= z$A7;)A)3ULGHd5J)9Zl*$1xOe?6@OfzN&{W@c9=YUv*w&bus6KI}KD4J{!5Cl?j16 zA;5@pSMH}Gu(y6o-V>$-18rY@2-$?T#IQU7K}sN*5pW!CS1`{`=s?Jl^}bhN)HWw$kFp|AEv4#e;9wG{J1oQqY_8`tchUo)*K>yeFhOnW)2&hjd!*v z_Dn?%;HF8RY|DbyFPAn8t1rr10Pq*rF3O1souBZGq>Gv7LWYI?97&RoFC?gPJ1nFV z%s|65e?XfEsglfy(pVQBUe)seO{~c8bVeR&x*wM2(9ek@Dqe576R@ACG~J9sGx}(} z+V_oAK=rG7qHM7FZlU*NXN~uZ0{3uGLS(-X7W;=3SXmu5sUuuRCTJAesiceitE0(p z?88!)qhy9rx?dr+F}J=EhkTI~Ru-j&_zsq(?#_ph?uAvn;IjO(a5hb4#hFXL+S3Al zG!{%ZG)b&*zH&3QL^*fVp&4#QqL~F|RjS<)OfzF*3x$9x*2my*2VM>asztm@^dqTzr|7XS#joGcdKTX<6x>)0%}=i>eCiWSJ5_S@M&CMU_d=|Ls!ILwK2B}9sw$~5G3$Rli0Q~Kc}U-`>)IQ;f& ze-4*u7Nw{7lTvtMN5LLBMjZfB#6gON3{Hac5E6`EKB=X0XAzEZKxwD)Y6)*GRZ^OA z$LBZZ9ffZf9a8&W<<$|adS|d~Fp4eZO6@G+1vptB$!RfE#L*a_tdCjkkh3ZEfG*h0$iltrjld%-v%T0i(PihC?;~uGO?uekBu%q^bt#M`= zjWZp3lN=(`$n9P?SvI3 zCwMW+)UknvEHwtR%2RYw^m!gu&8IsQ16C81DI*ryqVMAN6(0y<4G%8PxGJ21yy)F`sYc1o8@m4uyR zt}xeGlb*FgpAwXnn23y$QRVZZk;V_1NlBKM>PX@=hfu_xRuN8n?E7xU51jODQ?=+V z=m?Q-(_%bV!5XXLk}Z9hFkB2iC-7p^Wd@;QFV_qkAU5f9X>?K}nOZ9`7V~ZSh5_`6 z(ja%KDt$JFAB7@mc~S}i8{+?}OUUXa~cs5m*~fB_*l6}d16 zgS#Gj^FVsosXDYgLjXCteaYGIpurThD}jSJNmQNRKxB9au7Uw-F!Nb9d=l$CfOjE+ z*Akm<3c6vCnY6+B%oS)~oxM<_#9E`VP@AY8RPMp%g3(}&frbO}P5NEaWVGWhj~5t# zU|UNhQ1bO&kyg2+a4-UXs3yji8Q=Vy==qd!ID+!9Rgc{nk_fYilPZIZIy4bA$yZrn zbeJPlexN|MY4a{3l+>qM<@s7QwQT}quhqUG{0~e<)OR$;2^c7A;sWqrCd7H zWf#$bmrScwMCk?z3M^+VF3UCqTMC8me14@RFGHNXUWTP-|L@S!>R#+@*vIcmLL5`3MKv>Spg72|( z%$+*P9Vy41y~h;#4w5n!5F?)B)u;miew6Mdkg%b^Mg%F{l^p07y6A9C&j4G>!`Y(H zzN0vQ&P4w+6752K&Fn!KoRzAL5}}T@SWcK+mmX?&9IX!oW}C7-1iB`L?lcC6S>cFw z4Apw=twe_^lTBio^p-{NsVL#loZbGAA2OlIJX?(n6AzrvwAc~AMj94TQQRGW&JX*Y zAI!0P6s<=m$$UTLr$r&xl-~BNJOsAi#6g;itfX0Cl9$s$SD*vdHA4=W?-{cIc2U@Z zYS7{rLs#gcs%;vMQhJSE=eoQT%E?Ndj|kDQ;*lG=tF4VcVai$ z0XP&POJAnJnFsRWzV*7`>z;wmzSh+38Ajh968_&}nT9P|n!atDjp5$#2G+4S;NL8> z{IKLa6ydq{?;o@(5za^Eoj_0p%>Lkp{?wSK!=W@<+Bxg|~!1nRHvUXYxK1*ZcNOtLsfw(3PmMX1uza z^udbOe%m@%M38kp9Ik5nek*Kghg~_jc0Bm2HqqVcYYWyLLA9)jLYdL^W zVV^n;`0nX5i4cf_DjJtzjrnSlkroEqAdbEKfcq^LMxRe-daWR13Q z;2@7r*7#7LJUIL=I0#LHDNz;KE4}mxd7zS6gLq1E+d55+m)&aXLI&W|YJ#ACIz|Qm zs|;;ox<-Ti&i`4A9Bx!bAz&MJ$+4tH5$X>xxTDO(6fDLL3smNIkER)(Z>*!hhS0&0 zJn46c8ddf4=ZOv$@TBE-L}R5Vi?twjToXv+I0Lc(K&#c^e!ljLDAh=%R>%s55`)ukMKJD8PN%O?4!^IQ zZ2Y?66nu?&@ocUl?6SL37xW-b5Zf!0l4eJu@`yxVK*q=ZM?W`q_G;1rP{E_#@YY2X z>Y_?*B2p*`*~Q%ugtyJH5w#X<5j>FZ=UPt4yUtTA3a|JAiCvr*w`gxQ<14`oaUyEu zZ?|caKAisTk{rAC&U5L<@cz5{D%O6zT76Bj@lgeFLUh!7rsx;}<>bAD-}Y8ufvA0W zTX@C<#|DLn)VbHrwjWWZyBzF1OJyq=GUwGC}eDPZ~>KM<;h-w-Hy3h zD7Nm>_%k^F<=?vi5Fx(^R8>C2kz~CA%dHg@m)7Ky1z@s zL`VJaXOO)wf7x?n^vH>v-z)A<{lkcXyMVg!`{ zHR?;AiNyD2m9I5Avw4`c)LackJJ0@*#dbiTJ*xu=uH{^)ZYzh6E>8igi%%H|$ zy&%U}*z4J7jj)=43Uvm8lnAiHY+A0lnv4%~*TJ~s%(O4%Eo%g*5Red1);dG)HxRlX zs=*fJhsmpBEW6L%Z4IvKbsDcCS=i(E6M=6r-4M(@oqIvyBGP}amofrK`zT@e*`uo; ztQ*??A5qsBUfI&DC&>g8PPAj&wl%Sn9ox1wnb@{%+cqb*Z5ub=ckem({n^jj)m62s zt84eFs-|tn@aL8dY$&wHRul~#?aNQGljzGm$P@Z50*9r_BPnpsn^_ENfE$ZpK2AJ9 zMS%)~VV{JqD$aoIjKj_89N=zbUaI=nqBti>t|j`Q8JC>bcaEQt97QFuPAUG&qm4mG z5vuH!X1M9&!+^O81$0NPjbdo|qJFn6!gZG6t`FqABMF_#fj0;SdDewzJ|$%}B`vq( z=B>G|zJzJoU3CJRh>aYX`+1STi$WdauCx$y2y&swJx|V0QMG&V$M@7pas1@9Ei(E2 z;!ca1Mt2nS`ZBK*(gT;j28BTgN1ErU5>!RLT4ApLWO8|F;JO=mGzAJ>CHcrPFVn9` zFF4Yoz*f!3@L zp3N38Ea#374*vNi4$iimaH;zI+#Z#n8e5uXOEw8jIwmeO`MF0hBl z^o3E}5KQ(t0RTn%Fw*4QT$z5ogB|ZpE zD&5JU3FV|vCg`>O{6b0Kkmn%npoFQuDP(B<)gyvDB*&98bA*COLB=RPFAk^YoCp2)QZ zJL>GpTm?9^M!CqW;kOMlw&DXvT?GS#1}m<*1jyesQ+6Bu0lGRpng ze}9LgGZ3`ovS?lwQjCl3JGgcSfnCqu> zt>rP#PnCN^ysx^L>x&Mc-NhnN$VEYvT;{O16ATM~p#{Lg^Sab5I@k#c_Y{a@pB3{$?jR(CHtv3Q!Sc4g;A)}OTyxU?2# z*j}*~D|Bk#_iN21e^8ov{`W8K*xI`G2Y1{`%lUMY1y5YoADzTLu4PQH&J(lB#1S$m9SoDgL8OfA_PvP zlCGl{Y4@u`rRq&NjwpNZ?^76FUJdAKRh5#zuO2^SdfzPTVkz|z@M>yZMueh`V^Q5# zCiXW|2FZ4R8A^r7ax^=)5C#y+#BPts`+Mt+r21Gfbi>xcYBqtw)OAKUjt(?JIuhwN z?hL1!t8zRLk`R`w(2V!|3Zgg+4JvTM!=rIieeiWA>jCoh$@BG*kLLp-;2~izfLM)& z#F_O-6bEfWgEk{Q%(F8iKUXWHCSLi5MvrNJOCmlj7e2rXy8|ia#!1deF*PuWfkz&Y z{&VBiTfVI@GQt-^7GkQDAepwHd|qs|H(- zxZL!|Q6$Z6E@=CkV14Cnh;)~4-}Bcid0wTZ1O%9&@j6*a<&;O*e&Qo0)}($*pz2&| zT~h^lNhC?=bxSXq8($Fvyry920H$PVUz@p4cg?x_@~mlL7i1=Szi})e7+~X)wQ36# zq#8ix294f#YTYZFmnzgmzfg)SM=_o;>{sLHpELJe)FU7Ocs1+?&`uP{`lf;IBbCN7 zMVPdeG%wAZ=h@jqy2H{n-BJ)z3{MuS=y!^1e8ENr>1XzYm79hKg9^1j#-0RGf7|jh z{5F2^ZzTvy+ueZDS)l~?aAAqge$K*@_F@3+N3WB16)VAJLnE1t`vZ#DL=d$%?1&74F9Cl?$ z6d$qf!u^cFgN{LuZEMh|I6m3ZYwPYL3LP+veS2#rz@LV`vS52_hQi^@m~i1#7ErCi zh6$feJTM!FF6wtCl{{f$7M(jUZoB5PO$@$(pl^xCL~@{Sw=i@P9>y$lZEN5U*~Sow zyj7hMGKIgKUUth%+jKOKCYwKkZ&p+W`UY*M_*zD3qRQIP9rG49HW$S*g$094x{uJ{*fw0{N*nTB=MQfwzxkrOd!yrxcS5 z!H8~{(VQd4`PWpC*^SK{5Go((H44gELg`9ecD&MSzMkqL@4|R?5qb5r{8Lt)<1OWz z^yXmtAyM6YM?7daJ(|^=*o6*3fV$x;xkhrua;}-a#A9{Zb~CiF6bvr$Q95bvqJ$={ zzh%BP!Ib7NGmzQhN}_Pvc}R6VwUV+jks>d>#OA+`tqh%7U)6Tj;ls{<@lb5bp@GSr z83?xMBBO|uV}G$wmi9reo}s*=_v@Td(*=jwd34^cY7%D z`1(Q%WE~_+nD^RsM>1u!j;;m#$}(2l__J?d{mD z$&S*AgGI~98|cNumX@(6O;tPLK~R$K`ya56aLCy!d+k*2NgVzpc;JkvK^f zejL z4tmmJ{$fl)N^F#Be1dl~!s94{i>)Tv#w@F(>?CWYh8pucBfc z3(nl*oP+bfzk+R{i5CJq$x@Ygj!L?jCBvRW>GN= zv??2wFO#|~{c+wF+IVSK!!BLjhDWdpFVfy2V1?kdk=mFq3^0Z3Rhp*nIq(jCulTtn zJ6%<@RNS0wHWN42(*Q0x!>M_wTHb5E*Kz)HEv794b}BVfqVIcX%*xq*ZcZM2#jt{& zG~q$xDQ#hiPI)t7=RvM02sK`FcJ3bwYi}u8CMEWxq8*BcIxIq-k?G5Wr^aJRW#(C^ zi9jMw){?U9hwztzRHQaGEr=v=O^D&j((>~Ng};loAPxhB1bilM)F7F8e+&!B20sE? zWVj$2!)uCki1f`mb;t((-V%7vM%H*K^&BpiJsFPl6{(czn_RUK3Le;A*lIrU=yPvI z+4Ulygh!=?;Z{;Z+6Ol`Nv;DU3Fm?Ici@KZUZV-Q$R~=dO}~z8e)XQ=%xPKDG&gHD z5R>%5#bkFLssXopw246=%7E*_5ke9bDzV#F%tPBys`g;iwOjflqWxy-4FLq}yrBV3 z-af#BQ<%c$;c|EL@n!;N)%t9alef4;0C;OFbEJ}hJl&Y>oWxH>CZ>IZU*SCjS=SST zP!(R%kKS8xq^(xS-@sj1eD)Q(8&H2sRLJ!5d9^{mUovAsANQ?lMw)~4e0B7Zq; zh!8mQzP9~!v38ha53@yVW(!KFM-qC9y_91G-tLHy`Lew48Xn*mZUA7>FjR}GIp@)x z14FG*XqctRY+e3SXxdli4|;r!Sh0b|ilatVg*~U^){|!=_qY;ucpyXOS$K5~gWwEg zEMhgwuD;Qz0Lx+kAxgyUw=D`pUOyLziuMhBxxxj7O~H37DXXdgVAPaWczIS|YEEM! zNH7tIZ}pB;j)Dzfuavhi9{ecOAPvK>FlfJ!l75vZ;@Z&5zek%IoLi$M;P?1aX%wl* zLxU7^X*@ivnwC5E?h!oz=XN1I%3_R{7IJiN)#d)Jdj2J$h{IW(qH{y`>NwXA1Nu72 z^T*MXCytYXWj*7Qvgk~&OtQWOU+)1h_(|z|fvO8OwM?4=i0pd_s=&hWEXZP$l&auH zII{vZ;cNr-OZMA9!Ra)4pLKtqssH`1*c**eO|cYupk#vrZ6m8+AJnECvg^;C*+=uI zfrL=(R0=P2SH#Gk=lEO}$LXBN*fYg+qTSo6LsBIvOoSK(?w=-0W+u6-Yh(%QGV)82 z)s56Zs3&jc>7ui|YU1D>hi=Ker<$uOuJ{dRu@vw0uTys_;Xwi>CM=?}vw>b(gz>x1*a#4M@VF^!Bbog&&-l+h4s?>b~Sp%1~gEijn~kKV>i@vdpbDLlC`A63fRf| zfMs>sa0A2JpS_?YqJv-CjDJ<;HD|q1*ibynBi7eODU)96B&gv|A|B{nUhgOPAXkQy zm_O1sTeRxsa#MGhXPrhJQ?xW9K-aTz@NH^QKi@a#E{^o$_?^<4P6HhP?%rY!f}FsL z)!GLxIYxFKMoQIM=h@rmvU7`}6q{1#$OZ<$h{x3@oNhqfw~4S)kmyKozx}ly1M2&D z$X(*>W&cx;h?bb7pE;0i`M@T(UIS+L(L0|I~FB2G$8R4g^FgajgWEj$-gt+>=m1XpCXSI;FLQ66b-cBLL>f3?)AkDP2Yvc%wzxjR3_(y<+agI2rSegAHefsz3X zyt2meaTpl#ph6YLNbe6_*8lBdi>|+W{SERQbbgFwu2k`9pXFo~za(H*n-~vfok$&2 zLe!}fUx@ILd4X0mfD=2sV$jk_Di0VvKjR1E<-YF}sqd3KNVICd=2%^Sw*5}UqA3GC z=Z47}T4R^qUB$sz=o#57rmQH@V3MkL%HC_1)|&ra)Ua)^B%-dAxij;TUzsH70YyTA z%vw0tZLa=T<*1k2lt|ZcVkE}G(@(I3oCN*>+V@Pi6BDdPZZy)PJ?0^8wwM$7&@MCN z?h^@Xb;760B~|U4>%R%mg_gRH#Dnn5ASWJ_@U)9GdLL_gfAZd;x^NAfTNQdn!~GB{ z7pkYHF>6X`#$je7Jb~=A%2m-*>O>Y+sO-nY?7Dgr{w@XFM1~QrRp@kbWY}h>;pK)Y zbJ4*IA(r>tWfWG3;Wo|+e>Yh@B~>Lkb~s+-#@u>C6?tD{cx`1~pKLk06$+wJ=8f5W zk}ZT=*pO! z6FzpMC}Ct7#kxoSL{V%G-KT~js8IiXkL}Rw8PlU0$Tgtiq7=0n9ck{>5$71a4_&n4 zDj4OQyrM%qkc!xU?%V5?eVkpvW@NeU9?Q0y%iQ z0z0QeL!yjV=sW9ibx7;UmX(=X)c~Zz)o5dLMGih2^+o(Vi z(^%CrP)<8g{EGS4oAS#7sjV2%XzX;hS|>S3m2Y-Jig>H0AD3ntNk9;6z}wagU7OKD zzVBxzY{eTKWMP;%NZa4}h8kdzw4QL+-944^c@}ulQssV3xFmcpT`yW-hy!hIKvu>d ze63NswexBT9jK2k-N5AnrVpATK##NV7>Op9ypma@u)60#aE0B}LF-F;(M9T*H9$&M z;H}|3Q+pzt%*dOYsEXB$Ezw=$)Job-eY`~4#=7?bbTp@8#Rc^k*?wg@T58ZpP-hoc zfAhQZtn|M{Nv4zLSh8dvhI#qP(agH93!P#bZ&^G?d5@YO%+sM;hpr!*TB8>UZ}#R- zS`QC2_R>_lsbQtmm3?j&Uhhc{8-SkXn4j~)U^yAhZ)vT?cs86I=;?ua%$0%`NIWPB zsgclzWLTj}l@%gpg!E?HOoc@((hS+clO;|Quy)I2(YZ`jCjnv?E%liOe zbX36do=t#@=8WMUtJ#!}X^pI=m|N4*ftoho@4ZlZdIxw?@J#I})nj&)cgI%AShG-x zW(43kK{7e;UX&}@)&aLZ6@gnwEI(2Nqb(vg3HTeK=IZ(c@EUaV`UZ_?omcgS@^cKVcC67JjYPLd4n*rFwalLFt_CGJ>tRNQtAbPKFzrbeTp84tPrIM z+GKJJzrT(L#B8GRVHH(VQZ3qjQY@mVeySO9g);u|d@8S+gj~`Rt67Bn<0h*xdslnf z#MF{>JDX{WL+vg(fO8YR+M;8keC%P^(G`o3^Wr+BTU+uP;RIJ@Tw@+R4XYK##C z=5Q`GyzpmL0?w77(`3}{>d$sB_W4UsS`ximL`y_TEy+?Oy^G9yzg6)2FYmki=}y>S6KxoEAWy zC1tL1I`k~ptk9df?(g(hr%)J2Il0KnXQ!doR3o2Gx4Yg*fL0gx-JR>Pawbo{mkZ|Q zr;*?mP=HBlr3{d>6@tSacLxNXE16o*b~Y7hm1{#^4ZOk;vml6U?My%M% zN-~INC*n3`=7x`?PxDz}Rvv*T7IEuoW24ahtV(Y-v~FIao8uW@1#h$_Hg$u?L~+uo z+LBoBU67|t4F~EG6;|%Y24SgCJ33$;OObv^HdO-q@xrMm>pGx>Rt0L*2X6iZAyldp zhBlxvj@MYNLbLn?Uy#*5YtR?YDUCKF!Kz?YmG(R#NiJFKMW1Ptax_6rP$rk*UrHyj-;z|WbV-1laf0N%o+*F$4Zzhr-%od#i?`-wG@ z&9lHL5Tuz-v3cyoPdZM}_if0BpS$5@(L6m3Or$Ci@}3?*ne*~?sQ2tsK%N81DHi-> z0#C}LxRSt1+|L>few;yXBCkS{(e;lCa%Q5iQdXLOZ6>8#TR?aZxvi6ZOzTNXE20z; zh+H#My`wAMuf8(TEkIC zv_J=lm6lkh=(A*N_vSkFo&)+JKW74|)$R5$ENLJi>(-*d*(qU|EbVhKfP+>2$3tsL zHQ!BVXDXgl!)))4`7ENIla^1GjCn|)JhRH3$!w=S_b`bR*~zbc6mJLk+Uil+`CE}V zb&5e#MpFvmtOHgpC76WJqAmVTEHq{h?!15`O;6hn(p-nOxI6}|tw|%iMNIfcQzAWz<8MYVQV||=1vP{Xm1jce z7!?0xcw#J`Z9aI!EykXGP$5Cg1#v{JxwVLekL{gY}P_jr$%%9=sn$Y!} zhIU$-7Qkv|ye%{rXjessm+GqxB&tg-Rq@ac=RbJ@k*CT|a<^*2JDiLNBPXF<*oSFk zd&f&5B3mbvNUT$rWbEdvN3@Vno-2My1xp-C>N~-#eCtZ;ziBF;^!Wya6zx)b^DYk( zLchCu3^6#%B4L{VP850H+|X_%K`P-<_>q( zH*RyV*nTBVCgo<-XN{V`>Fu77=%jy77Bqqxl_3)eKr>MIK`MA--~v&im^`w zT_sDLEL63(HK8B2vu{|4C@)uPyHT4|BEYXo;5*dZbr|-^D{+ro_*F*>H1GD-K*fSZ z(p`YL`Va)i<6>Q-kZp$vQu750R*5MuDbpzp;Jqem=uwtacUh;CJJZq`p*7ZqZVRNa zl6t&yS@k(2e=(=P9CYw~^c!^MGs^|Hr>P@NqibVQVxKVu`5033(>d10SPX z-dBb#!CJANP9J1`u>*Zw`wwmzNogfYlO0}30C+oflI4i?#9+fQC9h_MxR0)}yi8z= z#26O<-eV2f5(6vcbMEUr9U{yF)Cf*0AnanJakGPRMP)U)Yd}t`HvgH^!;?0qpjBI_ zQ!Y3;3zdZ%V`CGp#togw5yvub5##=UG!tAhX?< zVD}a?;7E9Vec&C~?`xdQU`{DL3SPDd474&Z>-;n2iQrUWlIybg@FNUY|4tDmt<#Un z39_k(XHB!=Z!*>1cX2Pdw3YTWVP{q$H|HN-~^qZn)HL` zIe66?cIs;G^I*9)MOF3@r2@T7_G(YGCc3{DJ<9GaV(Ud>K0%4NHb7Kut&-eK{yVl= zYhNLtH143n2s(2@N1&tKFu}OCYX44@lSS%TYS^P?!UZCjiE+v>^zjA2pCL|pye`Jh4_pHjXO9~fw;?`DRvIukrN@_UCG0?U}iQDI~}&k70t z)X025)2s<@uK9M1PpHlr2Kv>Vp>fDu`>#1k!~Co5ECJJ<Bavzp2?^pVLnXfLH^{hp}g`+QK4~I6PpU6K?%{^Fc2pmA4Z@ofYn; zE@pnY5$X3!Zs5K!iffVP`?{24CTykK)WwzgHl9zwbs8Z_GIwOJ-92%Z`W$;nSslL1zm6Cn<^}T?yz#(k@qu@A@ z+H;gJYd;j~bL4x>zG2i@Mcj9+AcoeO8U0Wn!$b=N@r1+Nhj?|372{~}5qbg|iYA=D zji~5%n)PN>eT31yf?*a~$;U16+t=RI;S18h(@LOx#+a~&LK;31X4 zxkzg*)4rxvJ%B4MPwh57F?sS^POOn@dnI|0%^{%x#%3AAoF=WKOA_Z}6gYy@3!V1p zzM8(qAmP~65qWQ4hH5Qo;;wGdVOYhShl)8=p+bvIb{D3nGRvCEC5@Dw2@`ycbx!L2F-H}O#jHmb$D)UU$k_9zbIPe}g#(|ih zoyRX{-{3!73<%0pdp>@SrjI(F0G%unQEZH+*^W^VoZJml+$zhG#janzB0$Qpc`lXHcF1)N2Q`8wIpkv3V$nWd@3z9 zlaC5aC?ZgP;9Fk}fwc}D=DO*orbe7+;Rw4r{*=V@LnLGgDiw;VHNtNbl4x324D3ab zd~D9G>+^Rmi?&9|%pGfq!gE0~qm(X#Q8*CJWeJ|KSf$)^A0EVp@}do55cm5_9lx`c z(THh)DSpcPqAxeGd^DLp zpiC}%(qoVrch7*0}UjB$Tr>H=PYdnL+ngTC1i-vk`i(`rsj zLxJaw*H8sA4@LHAg=ex#P*vMn*ocKzHWn7Mxmi)?=H8hc2UkLI+QCZ-ktO=v zt+zr@uWn$8jQSY;x1}?~9h?FzwBf-?2Ak9D*+Rwk@3W;Vv5ll&`(;G8@e~;5*0{L+ zOJ@ZN;A8>6LQWie8hl$TmP?6fR+|@YpQGV13DN0DSELd$Qs=k<8R-R{&BMdkPRJ#x zyHhA!B8ZI@-ye$@F6zXe%?KCRko-LsIHXbTjj$1LqlF~_#eay^x9GEvOgnJcz$d{| zr)%SWSP?RwyYbFgMW}|$=W%DtRcYki!PoZ#*;x}Rbs(jnSM;b-4w@-u-K+I zm&CjigfZ<>6}l7mIMUij$72V;4QynRnFPU5xXs`!3d^rMlp#L^Zi zIt*$9$pQhhB{CP3ORFI+JW9b$TJmK^9Vz&VAGkMqX;qdmd|4+X zlbp08RyJ-V{(E$Ej9o=ab3icwQ);$`?!>P{btX;|85{TjcGKB5mwUs%TMCM}!7+;V zz$IbLh>2I}cv{0g+v!ot1PcbwYvZ#L+Mict7_B-#(UN$4_`5`!*TwUE_Wh@96cWp( z+tz^|x5|s4PSr6t{%mWILED0a?XaD1Y@lP1M5H|m0I56@fvTW~wM{;_E05-}Y}9ET z7@(s0%3;&B9<|3mMA#uGX+%P_TY4W2WLXy=J!3vxk}u}w!}-B#e^$pHcovt>Z>h$V zFJ_xO;xIW$Vt6o|?O?OJ(tj9gfmK%SR<*dg=Eo@PC-ppSwoZd#$yiKGZQAKsTnD3P z{DVmoU_H(1f6BQC0Qkw}GF;df4EamhiMlx2H?YQ<%hf!bnCLIoElUiPYlfd1uuOIq zt%0gu^_gD_R_SSZ;qR_ZVDE!=4}u~f5Hb)Z8l#N&9~0Jo^t)E8t8qT5COQ|&nTems znbGuFf+$Xm??l5Da0k@lE-NxQ9i59v$ht?;yI~OsxPEIJ-Xi8%Qd?_C^||%2CjGdZ zZ)T)R2p;~Wj{T76{WpYkF@M!f=-7w!1)?K6nuN%r2VCynMHxoS57qMwqg2EB+J7x9 z0lqk?RKzdNR6@fu_y_S=4OOBkME{0iGLaGf@B)8%uth5&;NZ_DOo9#;7?pW&V2X8s zVrKMcqtfqcYpR_}S|e|yD|)RF#Vffqs>5f0d?luF<-+iiMP1H_G?@T_3ZyCfKE5Bb zb@7-+(5P4raI%#Sta4a9JPpnsCFVoS+XGV4i=KYGTBQ{j6rQ~OuN_i=jodRQl2&1( zF#ZWmy2^(F(N|X$kd?8 z^S*?B+_e60*4ny~8km?Cli;Bk`+ppnr2=v=Pk!%fa=ZyMKq~&2YpXGUEaOSB&QoJy zqn*sC4dH?dHXD`#IR0uoamd-SaQ2|wr<{C;4L(LtR#w(}({8+g>K4h^MN7byLjLn6 zKC7mEA+??``4g5f(5?^^Dl@)dA`V(zmEzZ}4y_}$&4y4X0$2&D6Hg>kfdj8NDi)h$ z)UIjRMR}63LPKg29EqY)D%Y&se8wAmc+-=nEp-8ooF;2y7X8@7=tgFuQkufp=xXy= zBz?tqanKqe)r{Nxo0M^!6#hxBS{OTwl2+sc{{i7m8FQAA!fGy|^_V32;z@vT+q+ce zL}+Cz30`l_)@?e8Id}48P8Z%jNPGw-O{96;g5q_cseRQLHgKJ2$tl1$w;H-;;TupH zrffgZ-J6}&v&v6^5@MFSJmPRA;IiAJmV0;fwtLgywOA(pM_pfb>LOLAd1XaARN5$g za>a48+pTvU{cp%()vz%$Na3iqLP%_Q1%?SD+acDFxh;F9i$n|gTm@&L3TZS|v{iXE z{XB<=0bKWVjB=dmlvV9-bgLt=EB>TW{5B}axgmC3>#CLKD#7%PLLFO zl}g`=-R8)v=~1VMR}_SmcvV|2ld-|E+y>wj9!nipt#J`!5XM?fbdbe;d>LhDi*fbt z_+Ro_kPYD#&c(-YNM%fksbX3>*sEa(mj)I%jG>(TKMBYJ{GS3|s=58X4tc1hy)|g)fve&%Vo;$6S71PlC+~?Z<^`mmnzIx z;tn%3C?6fo;zsJ-lgp;20|abHpuJMBinjI`-g;=)@|%oU9DgS%0Z2jH&(7hlNbw}h z@->5t;P36ZN5uF{w6H0(z?ka@;}XLv!OvxjSS_y88Y-Af^xY$m70ff)^F=HYsi?j$ z0^uS#R1D@-qRF&@NU_^Lg&w5XPMlHu*cLPr!Xy%-uyh=*OO{3@3Or5ihd4E^Mv)$F zB$H6P%_`BEMKhGJwSJBQ8K3t|3ZIvLGgZ%7jL=@?$WVKEwbJXZIpRnx7OwI~>TuEO z(M)32x3zE@9bBjd)K-%=Li6W$NEdp@C#AW`vwqOt9cye7av;iTCRNB(mL501u$kdz zlw9uddpTzZ1(LA?>PQ>CacIN2?u2qRu9sSMMYte`@5?w8L;D)sC=QeCuh2b?23j+W zFVYJ-*b$advZ~UaoaV{uEPtO$#UCaW9eC!dIRnLfBrz0^Q_{!e4j=k2PXq4(vd@*2 z5R{h<1zkx{$0P7Zi?@VNOxCQP9ZC}kC8xD&e20t;#*xr6OzSCsyuDMLwp*x*3N~OZ zz1HVYV%8(-jl*pecx^@l1Vb|FX7JDS5f-msPn^Z~nRe2hx+E<3FQ%BYxRdtlI6pd{ z*-f4I=qAB`j&=bNpht#nT_as-XBjYIh;yRFmjrEz0#838jOTzAz9gdbaH*N}N z5#@;SNVbs-13#pFlHR=(=K-=Cn?Osm*wR1wny>Xg#&QoUZ72dI2L-XvZr#XPY-gr; z6{VJ3dAr76skkhFI+I))pPhFq4O1&z;!LkfY=Lw`si>*xF33~GZxjf1t@uGwrv(@Y zUG2bup8yaBHRFMjy`ZxL27?Hqi7;l8JNew^Nc`fgln$SuK`Ku`V?uvVxV91fKl)&zHo?KZ~tZ_2~vHe+Fh8 ziaoVq%D6T6Usmp>EC)JoB-sa2q_b9Lq18kUJu^at0FTVYhlzbm+K_g@N7ACrswvl{oUWQJQ=Z%2OF7?>#$4Eg*X+yr>>WW@oOWQ2d7ydUPxt0Nd(}rL? z3X2$r!qa`t(Yw6Elj{XYL@GrOmuwHYTb^U-H1k&mD#gtzPYA<`E!CwLZ%-55Yo?)r zZ#KoC?Ji@a1^!MCIyVw_m9i1QV-Vdk;|rq`QIA6g_O0F&!#IfE2Q?z=)A4!3x6kzS z5+@+FUXD_B^aev$M zWlBL7mEuu8Hl!=5d!83yM9==L&ItLYy?@AwT-7ipph75Sy=2cgiW)|O;92?>m2V;R z?3EF6U0)wqCI?F*TWBOHoKRUe6lR)}77zv5!+{)H7VjFVXU9rv54Z6>Eq3=!RS+_z z-6dpZFnsV)#AB=(*|)fHglHED^-#KKsA_)arMGw4Rm%IwP{R3!7Y+Fl2pLjP5qyGU zo?-KokK+*L^sPBwhKTbcp@f>AoH&CmoNS?B#G-oa zP)6&ty8bsgShRRq{*8yxD8SD*H{36i>qcwL4wuga+2P2DJYp%Oa-ThE%8~=V(i`AZ zvo!GFJq?)IEn$DYWz;}inpyU5WN`s-FNudXHV=xXP#=h ziuLedWvSiiW#ZegAgwIY+_YCFXALE*<=YQ90s5jhaVxQ^-h?NdHdI|^Jt!1(4C`9b zG1e@&p&bnFJ>H|l2>@)P5708RLKLN2F6o!_VVa@P!yhr;IVPX&Kw6Z6s(IfR<9(3!Nf$1vx zwyccDla{1LvrwT2jcgL*9@nJjn59RfqtZ|6fFb<8irrkB^SJ@tuudG zdf39AX9qoC-vYa1SquAeq^7>%b7Zd_w`l4s1U^i=y{Tz=`iR>USeeyq4;+z}{#;Kv z8hY)Oq_gbZcW}Ar_D36XvoF_XeJl^LpxL~2+O+vof&1y9hNwMRa?=@Jp)mK!x|A~n z68Qf8lq}}1ykMHQi4@+@=!%I0a9AnobF|mh@`9_=Kj6XbT}WF#Lid*G?L9bXPM6{m z*Y#T3@U-Kwb=r5Z=T%L*A_r=+0z7hiFICEQ+TM6xd9!LK(|*FnGI^cbTT2(V+rHeN zT3+BHHqSA)2 za#GvDc`7^vlq}MNbO(s+z-eprc3$CgA;a{6lb&-`-5Z6Cq#b=D^?BTB=%}3Yc=H%o zKJ`UYOLn+?KWqo??)dRNZ*`osZtQWjn}^eVe3S)VDI4%|AZR0MbUr=XysTWhuBT}( zrcM56_y0ltMGuxhn{flJYTs#UaO{GIb}dibCY-Hhs>*#T?DL^?V&BNX`I@Wa#Dz@9 zro*_iYsBHBlwS`UrK5*si|gWjU~AE9#KEMa=d$Z$v+ML#da`AtTaPih^Xc`uzfMTt zlYF4A13OJEGOm-d5wqx+4s*(TQT4Osluo-Qu>H)*)vw`r=e2Xh-KEl@*D#v%dadKa z&1;?Ijbm!~wDQ{M^P~0owYH`k>kJ32i;47LrY!SNrK0b1x#55&kVPAw7Ja(Q;mM(M zF|G4KIc-_z#d~w{@|`5>Stxw!RQr|m^4h>_65)RNb9wPYF6-W4J?`?>;WPHpD=y0? zYx6lM)8cd4XM$zWs{fDZ@ z#A>^DN5nKpHPxq=TI)dff3O7!VZ~stwa&fZ+!-FgN>A@f6#u=*A`=hn3w~MONzzmR ze5zi@+hXg<1DO06uXFy{aL3cbCe z`qs|W1eEJP9DTvh1;kli>gYmyac1zpBK${+ir-o&E!JeF%&z}XvY{b8F+7LC$(@j9 zq5ogFYFsIJPyV4AUw?um?PmIC)Z!|3dV1b7U{drc%;XQQZjv zuumAge+#2ZFZ|G>WkQz}uVLvE8`s_hIiO4m%N+vt{4=mISzWN8qR0{zB*0b|(??6R zs)1S665TmK4`;mF1?|iKjb*~IQ_dfcNGCBcObD&9@*C)W#EqK~L+H+zkI8|E~qibeJn@$(DREPoNm=;Ss3X zQ0-PCE+x`5>cY~-QuEfoa(G^iHixToAF0Y`G=;=8Eb#qopKG=A{(*0FUCCSj7&!e?i=dJI$cFTl3plZn#Z2u#EA;ZGW%z9)>FB@9 z3{6)fk;qP4&%W;8N4{GQ*@?stVOtXra`zql!(01AHO?yHCJKbBTV`6?mlygkt{Qtl zp(UM~$m8j7;jZnK?d6Tl;C%lzOP~N_bwFu(Lmf31TUkSckA&Xd|2qpfi8ho$`^eqm zZ?c3utAR!t7<>OrhW_>@KYI401L2Z+TBDp|$M)qU{|i?Q0;5_H+RudWa)UIW(LX%f zaG@_D!rna%(VkL3uct5k>!Z#=!l*3AfR*H5CNZ%ExHQ#NIg*HB%zd{IVUTCIt&9}0 z%b`4~de8i?KHr=KW@=%tj=~i7biD#JTJwer#dt4=Hn74%a53EtyyGNY*9*1XyW7u9 zd|0M;IdNemmsM6bcU3jpA>He*4d7j#-v>cDD!=<^Ts(~p*@7;tT5?r(uDbY$AV>da z22Y!5R*DPu_8lMZe)q7N{me*C5^-+CGt{c({GoLRn)}zpNsco1LC`jbCC=yZ(%9PC z?>=y8BmL;=jbKRyGmHRmd-WZ|@rh3(13Oyu?dH`7c3o%U0+WDCJXD!1qeWo1taaDKuIpgpd$6z#r z!Mj|BrJ|pAbAV;JNKfRo=y^Rq^W=m5wbUejJ(&Oy?YzsHClm2C-$JRKbSZ>zKALpt zGmRNt97K9M!6D;sUTE$;xlTB6Agd4cm6aD{E1+h7oNU7V*NDl`>Y<)b9nb`rz zmjIfJLIp_OHNMP|^w2{6;-#1t?SJOCNVi;ZOB0~E7X>m&(HVxvmSXy1Bfgp>E)5T1 z9qI_VMA}gGjL*z z^o}`x6EBWk(i-fnzRkzEVe^1L*4qThV8Ac7datyqBDsIkYwoTZ*c~ zsu!7-Up4l66MG7@EQJ=+gqWYlJemL2m_P(AiXMYVt&~kG6@S`2g1zS!TJE~e_1Qu` zn*g9566iiHR@NmUcwl3#_OSJzdtl&d`nqp`^Q}APGO@75c-))THUB1k$xfg5HP8oSXoV^9=dOAd2oZN?Q|NNJ%baq zX&$Jj77W)i?rVw_B#rZVR}*O=Z!RCs{wE?C3e=!&OuRP;-VI}DJBY0vL%v%PT{^pq zQKL0BKBQl?%tlf&5(;)}&4NOrUJa0Z7;ccyC&I=)->F~s+n=v)_QVLgl_u^mu;lah ze~n`M*&?mk_6~C4eT8d$0@C~Un_c>_M~5Ymn_VAu3shM?&m^>h_LDg>rr<=S=OTos zyw1SHM?!1gh~OWU0$dtK7hXz%Z;PXL%?*K{Pw$sk6LHcg32L4<19aB|XWW1y6XGW< zScurk_;1S!zC&YlDd8nmGad8%gC9pva-c)A&S>HgKPa&jXOlBB29)w379aJ-0y8^+ z2#=*%9cLf$;|Yh)NNdZ>P^VFs+f7~X2;A$O0tUyJolmPey5`21386v$Qu>(h;NWZn z94XzW-bLhKdn!jqlRE8`pmx|g@MIi^KBrLY)@bV+-{eswyA9ML>2>ank?U?@lG8Fo zXs(EhjZD!*U~iOkS)Ws?(q@gKX1>p1` zEoW2j8eQ~RU?}`UhCeX%qDFPRecyC zs@O;oiE*LVBV676Z8}n`tH!!@{hYM=o&Y^VF09aRZcu+7aysLaCPk4+^~Bz_-X85v zJ=q4;DGqU0AT^*9JS{WfItf%^II%9n$sVX9q9IAYJ<=!bu$ zM78BHQ@R2aejPWUf(|M^sz0$K#=kav1L1c;NBu8I8 z8|x>fYKGQO;-=|w>E(HIT-5AkfO>y`f?Y({ql;b!Htk|2IrV40Ry2odMTKf=%MhTT zhZ+{DUVCZk2izXhV#6fhyGvprUYx0Q`U(B#GrcEc`={dMV;L$lp0EpG)2 z0}~q<0!Apave}UxzY1>_-Q)yX)wa{)SIdbf(xAw&&5K?{VKY*l9?p;GoA3W|aBRM> zc_Fit5?u47Td(8_FnQisQ(1gN_)^h?-3g~`b_Pxu3EADlIOH@*jgQ%hMe1?3vuliOSsazMNIHo?X8e_>w|}q`VV(Ex%*&D#lAQkU=Ft zFB;-t^BJB$dxmb}pgBt>s|hO&(eJj=@3nDqe1zSdZESAu;Gcf=EBx})J80Hw@;)qT zNjS&yT+Js>%|Q$0988d;sjzd@tWxjiIu`PDgx-LKN0tPe)p`>}o+61tNfGn=Q9tLD zX?Lxk%gQ-DF+V1Q7)7u;5;L7y6P*%F=A|utmTRqbv9gu&sU={lP^|NHyJOcxRA0O6Fqrrn{f7AxySvCRy z0|4#gLp)#G#>cm>C0XJf9POPBx{R*yr z@CE*t#uX&FEsRHi6oXz*HYdw*^#bm}_W}t*7?fp6j4&J`k8+k~z;-?Ot}C0H=%Q=} zn4VOlQhUZ=0TQUWvSIrH#qypCz*uZR<|>Y51C~H=Y~!LTCq2&-aXr~IZcLBE!PC_kf0_R_OuV=s#tl$I`&4Xj$Lp<*XEZ5`s-`UZ|87uP@j1^)a0@!#;b zpM3x)>f&U34No6G#gpw5xb+2m@bO*DFU|q+0KImiH!JnokRkvd^}t2cJI1$P{uck= zzx@`Qtqe;yKgA~>-NMS!45C37M@NSk#W`jc=ipcw;xs|v2Qn@UK9VGobYP}~JldQ1 z5(xNk03=C>QIvvwEjR9p=c~XwR~s?!S7T}l)kXvPu!WP|ZESArA$O+n`QQID{_Fq# zUvOo8ilqB zP%TJsT(31yL>=sHuVZav8ZZC!c?U_m-P*vJlQrXeeFE3wZL( z6zl7dwPgWT8Y9%z#C$dbUyVKG8XSA-7b9Lc8pW^}P*m&kzT-`cK^@rxM{R0;p#nPL zUMw<=9(;W&Cvz6-4T0%GZUVBwOWrA0L1vbTUd<0`@Pmp3HX%Qs`YPBGJXER``Q9Ki z5RDM&jX$68nkEB8ma{^}D)5AbWDpcZxdf@61YSP;$U_u{a070H1)^aOd%L^XJ8Gfu zYq)gv8gAUUfg7t=(Akf%**V6uN8jShhr93>ZlbxkgiDLl5@eV0hipmw&SX7U0f`iy z!)<)?r+ZjG8e-x0FYzz`^?$>!KD&vznuFt$V;rBH%7$4m*zkM_m`9NgitW;pMVhGy z>tT(90W~Wa_;NEIYaVUIqL4%(bHs5`Y)vN2*6#iRPTE7bm1Qg~uj1Pce-G`l8vau`H zvm(I-?Rkd7Nalm@Rnc^Pgq(9xG%hGO&)}47kqXQihxpYx7A{}M-A_Nq7a!e%l?>7A zw1t6dAMfCsKl}#2|Km5<-Fk#y|Jp~jIfc(}UqQ3pfaL~Kk0jrffq%sLtTdC<>@is8 z=eU(BT-QeDxP{H95AoH#$A~J6up3KQTE2`a&yqRkc>!Dro_t|F(}d|%#jbhs9-ho+ z3D$GPUX8!rguH?GDVOHgK(#t0sn}os{XgR4>vIT@pwk@xDb3h z60j?cDT6lN|6v?SAn*EBVS*X7iDosI5@-26c|IIfFvGXx!7oX3RVPgb*wl;|7#RE{ zD3k{8M_Gi%BB*lxr^i>!7z*|2DfsOWqqxAZeS*#B8+h-^JXRN~@Piytp34GW6e(KA z``FsrLVFm>Te>zEWKUQSrdqfmj0SzQJ45+cTNYmiYAPtI)~d3Ahr=$84)$?ybc!ei zYRwreE-YfI!Jm^&qo3LkUO*<%MH&updUA?koT1j7#oXK+rkXYQj)i#Cm-pH`I7EMx zAgE7c>GBmU&CenTDk^0|CIyZZDv+5>!#<7=_ON$wgh8C6+ML16>@=FSiUffSI{3TX z&=}#Ko-$Rpi*|Pir`p8)(j{D?IK5g&#SesiVt~B6wSl$uEu6NxNb@RM`&)Q$?LSOmdyJ#Q zBOJFn!Vb+ZE@OFl2~)KI6($Pvl<}Wz(v?b8(ua9G#L3Yi_7C{}G5l&n^kL0<9f98H z$)u8{?01f_ySt0y(>@BXhD(=Mv9i1%sd5IitazPFd6y4DsmB{X7dp)^k^wm^I4WS7 zp2hOY6)Z0;pkn9vfByAL9Byym%RhaCrMYR$-dus_CKwEQ81*`6ogCxnxQ#HiQJkJjFEg;KjpCw{?V_?OhzV2XL!X zSia1AFo#O5E-W7pGNUj?Ck!$41JqdXlc$naXV6NH_ZB$|HG)A2_8@R-0*Ck1Q3N6uVNz!qO75%tDxqu(wUyi>p|iy9vh&P(vX>Pc%5j z&ekTj_KuKwbu28_fW(1sIVcK8Dmfi1#qrKFeEV<>5h_?(xsLa4-oX6qlvsOYVIPM( zJ9zr!37)L2KYWV4 zPw?dFGpudyqCZM8y?7Zn-~SLFes~AhugqhL79iX-T1VJedxD2g*08yEfWat&ZTqOt zEXeCW|LkMjSXn^LEpU3ci;ZVb@%Y&~+JlsJve>iw8m}H2O6Fj{4M!w+*^_mmamW3)DB6D1(7|HgMjm^WMq+<))lPc4tt9S7EFaHi( zTl+YEw1?fT=Q!zpE=3C%wXwhc2+!A_V`F;{$E`kwVFtfGh4=1!gfIT)3%q~*3hG{l zVfzs4Pak7r=MV#Ck<$*=9^RLNhu%jY;)C~AG1bU1Jl)5WM~`G49UPyc+aJNLG_Z2x z4nF(*bKJgmN!V#>E0wM?zfk$AJP1V!!HRb>i{S`^K_9)I2aZ;^J4AmNO0ds>jzLiO z_yC6oCm1DwAK1u~0rvI}&>8?MH$T7^Q#0_b4o);9NX)atEQVpZUGcYjt@j#>FvBP}vqxLE*SqxgC4C4Yb^GleUZsLfi z^431qH@9$w0moDoQ$FMre!O*r^^Gl@jB-pbUqO)M=pLMisGb#wL9GeTZsBxq9ryn5 zJM=JvkL@PzeDXOKmln`J-ooQ&-{5z@{T=Q-*^tHAmsC`ac6WfFIggdA*D+V|Fe2Oa z=v%BEbVQt;^gB3h^)bDC8`q-*c|jK82!Hzbf5rd%>px?t-k zpW};v_!s=`FF(ia)kV1JK&8k2^d;^;Swm}(NSZJn4Uz5dqSlWy3SJ`JWDHy-0p zzx_3S^B-Sf`?wFc%Ayeu@u-chjSW0sdyZCjfdBQs{LlFC+PrAS3eid>P<;W&l7$%b z`{;H1sMxXS&(4ZC3egjG`(5;hBP7iAN#Q|07NVz2N&8hyU%G-1KmGuF?LXk~`91uP z|2syvb%=iYy+Y zce0Pi-+qmQk%zdlh>t&QV7lUAt#^#a-~Iu6Cwa)Kw1AK;sZ&vDX=RK<2Y#KxnqvA1`Cc0a`5|Kc;;xw(S*s*ho} zg~QF~_`~mhi$C1EFP}vQEl*f@(n1v5Sh#!*AAZCNW z;~q92e~WgfCtAW^e)<9C>NQvl*hZ10-_I!Qvua*dG?Od6W}JxeZ$^e_)JM$wtA?4ps0uj1m-`V{ARUk9!ZE;kcK<3#urx5Qkd_I5|0yXUnhDacgBp z6)e!7Fwe%%VH$@R4TlKD!URaj0zZF*dtZKu=LcQbl?oVx_D}cl_3;S~8EF6Nf5K;X zt|AC{Bvi76R2L|e4|gGHVpT1lrF|UiJja83b%aL^*lCDfKLT7Hz^>rZ-%kF4#y_LX{(3CX`;Tcf+!lG)jGzbZ@B(rlm@onrmbpYWUC z{2puD$H**S(%$K?jc51&gp<|)qr}2L|Lt8YPdCv$N^!FD4BtH2M_5>Lz~DS8+$vVR zX0+2q)jWC@-pp*0WyLPw;Q)MQmpE1R89J8L^1`*+MA+b`2LX5G6z z(^Hy7l_XOzRip@s2x$56tzQ zOcqNi4ffy!CkMOOJ8Z!>Ggw~RggNfRqD9@Fh=6Qz{{+|5A3aKtfQm#a2}5>+yN36jMeVulFXCKpxv_y~=?4zy$*g?tfPm$$LD zxrNoGEC!9|xcA^Q{PI`7$Fma~wXKVI>-IGi(=oL7pW*)9dw99`9H00m1GieGjI=w( z-qU;d^2;x9JdI)V+FQ7?wF-68L#Nq>k*Oe;NKO_^{fUF<(^-Ow}dO(Yq+?zfn+ek<9nau)4NY_@5|4S zDU^`Od?4cdu3yJVtBv8)Lj-098>AC?<1K8guOb^)xxYHy5nyDnad`vVmoK53*KxG- z0H1#LCH9}(!xza6a@h>F>p6C9`+>z^Snzft*@7is$n{N3pJUHMEB$n_vtY8%|4P<(n!39NnuBVE6Qo7b;ld!>MW<0ZcQ;tn3~KgFHTVyKkz$la(Tos7Y! znBl$Wm{3wmJcC+w6_uq5sw;J55;{C*3P%yuNtFLx%IQQFS!91UCKQDy~%;n{eup6pFcyZH$m<41>TURhcEHObuo4(vqhAG z_(dk1inyLYCX-^&);-zBy)WDJd#D$an6&q?y;g<~#4>{o9vedQ%KK9WH6+ zFKB^LVETA6K_ZbrX?Ytz`+HF$?32&F#=*%k9({I##>;2e+kXe|zyATQU*1AK6NBR> zIQfJ%+B6|-Eh?9UQZce}31>44IS$DBtQ52!N|_{cRb0CD9&TRV!s>DvxqJpz=MaAH z2z&b{2>c8#UAcjeKKuYHl`Q%v4U94ctY5f-6)lPS`UPCrs6iVa!E^>V+&je6#sLlw zo9GQED5wMM?L5HO_rF2Y3b20t9sJ$j{T;4vEFq~nEYdr&fkZM6zkh-U-+YeGKfi~j z6~nEYSMbhQo&X=!!Bt~7H|Y}7T~l%FXmEz^9m3Y zrzm3;sVz93f&_{U9sbzmn8c~$qm(VR79naojzGLv?6fDfr5jGK6NDuE)6|Mk*fTiU&t~ zFYx&39{OGqYnR`~habF;TUR!a(1AW&c4H}K5{9P2YIj8-_0$LSG*;Iy;+^+Dz&lsg zkn~8rbsu}rUf`fPLbkq*cR&0Hx36DDIh$g)PNKenci;PvGa&~b-{Vc^`Q8z7D=}m; z8RU`*`hzBR9zMYRl~u&9Z=+b>#F9qr)dYJxdw99?82cw}B#L$1eD?#qeft_#${EB> z9m(n{C~1-c(2v^#>>nRvXJ;4P_uj%%C4+n}!{x}-Q2>pC_0uW7ujNm;elKN;vUZ

    {> z8@X{6X4pMWPU7krzQ@uhOQjt0nK-*nd*dEnJRL#z$Na9A?J;vm2Pkp@^H|7a7?g1} z7)``hrcx=Gh7ZdykS$h_$`v_ojN&~>r?0C6$9oNQh7-7iQ7Pk@>I*)2O2c2R*Df5+*Qe20{peYmn>W$mDee)7B zswdbmA4sOM$mK^I?>T54;AvOo(2I7Tm`t#XdrXoho|J}3B>=S1ICzG8_rF28l*8t7 z1)CR3LhQTKz`@B8_Mh*e-5x?KWI672=ka~GgF{TZCpb81Gh;ec255HLd@#r+M9MiI zLNaw+xp5oszWX-n`2@P1HagutOS@oJ2_ph{kwq5Sn<;{e001BWNkl}97+4U8Q=SpF-KB=HX8VXr3ISL9!aT8ZKPBiOUz(kTpHdj6G@h8Q|qo zF~oEQ7VFGWD7XqUS43@f8EY#wWKuCq8Uu7r8fdoraMcVpHm~6N^-EaFC(v&maSTwQ zSVEz?hKrZ4;KB0)?DV_XJ37ME)$6!;{VlXQeYAgn4^O}NEi+C}ZoiG&Z{NnX%NwYr z6$TcA-hjbuZS4ZC-MEHYISZ@bL}%(Ep2=~-z~+TZSo`WB8tn%9P1;m?u(Byk9TA6T zJ3edcjYeY(heJ+Quq=x=T>{3ctZzE(51_k3w<{E{Jym|m7j;snQ&CAGS6##HLJ76C zb*!!3!N(tehMm1O9)0;S3^RdBF@Qq&1mVsal zDHe?)?Bdxhmg;rXt7R6f_C1^BZYU9f-ivk2VDUSRCba45()sUWGHhda=Q*D5HP9Q| zPy&aO39%AV{3gs+R$L0I> z`XksREDRr`<{s{S+QAo-2}^cNtr6%Ac33D zNf`ljRYNkFK*A(Ja2JFA0K=gLT}vUKO(UC0Kvf)!dL8UOeT+xX_Rt$yP)U@!-$lDW zVa>iIX)P)N0}i3-Ct@+_ze!q%#)h5{n&$*23HTC&{`BcHw7Nr{M~*$=Y8$qq2$>RH zkpjrUsZtNhOln6+&5*1Jl@eUpx`uZ?d=FPvvM~H9$GlpO&l%}4HNbc{!eB7ukPTCh zqf%bNO09-MHUmuh@N5Zk9UJ|2gT>Jg8Xdj{Wj^q?uc190 z;OWsm{@1_$H|)Q7inrf=54UgK#MW|=NHcNbr(B7~&dKE@O( zgZ+Fa!STSBW%IoaHG%T-DppqNC{UlPQiS}RTH29C7FlFJmeD$_Mjge(+T~lkLHb4lpMU)Thx-rl z>&`I_j*igjeuVe0ufY#Q*)dHKg09I#0*0X>n7S-QLYse}3XQrrx$TH+BcMw``koMa z^+lNg7F`xqHN+ohp&EfGbicqFVP0h-z+9+zRy3ZjOHwGB3SCQ}zHt?m+6vazH}K1U z`#1dlt7mxr%~$yP!Wt@xEof$(b=6eGg-$wSrok>*`oon1G*N$dKK24x$-`&;vA7;% zNf`ns1TX_{ia-Nb7Vu@23yvL?6%;7@cRXm~*`o(|{P-ze9yZaR_{`)`3>`6iBz)}0 zOlAP-ohiwL*dvnLCP@wIOA@%HXQ0j9@I9e{NTAn#Tr>AS&4_6X1BwUZ;uY&z|D( z6Utcc!U=@DO+u6UlJOW^VgoIzIqjidS;gBQ{VlY361gwF#*>{rd~@fwXdE8ku+hSQ z_}RNy%lc4s4JxtPl+cpNqFBg7_beV8G`7-(3eu%Ivc(#%ZmuAo(BX8*Meac(d7o5@ z8BvdPD(P@V2b5VI<7hvNEV9Uc99!UJcrn&-jtJ`yZi=jZxd0%jPONQBVZ_s@uWw=N z!gK6)zQNObcW_|pnDmF7Nk`zXUMWGb4>2B(`LwLcvQo3R3QKE(17t+i0aJ$#2hOmA zZnw)-7t9nDI@dU(juq_X2AYygmxhk%`TSjJS1y^o9!2P>l;_m&2*!|`XGYUZ8uWCb9?v1wLgIDmt?@OVt|kX%p6{!>+pVaEPfBhaXZuT-r=wQDdF= zcTquMGNJ!=pc(4C6qS4~jVqFne%}<$y&Zh<@h5n^*G8hUifixR!llh+WYjVCp4`QB z(8clCVV5Pv`^5=_stTr~0lMujhGPe6JcVMp!kT-!5ofpf)F$BX!1Wz&yJVq^i#OiE zmCZWrQJ+~-5*TL56+@r>;R-3_wUwYs3;RNr8ly@rs!o}lIpn#-UIoE4$!=#BR5k-p(S3dwkMDkgPriPHo)^dJ))l;S>l!v|MRXc3 z@x`YW+TE^@H}cQuXD+w~LbYsuKdxG0a=E)qCW~Ay&qBu}0izq1C>N)x7+HaklA-xZ zBHJ|1sIrDEH)ahw*n4~zckX;Qgb_D*UT2C`T)p)kR!T{z zB%VH*a&|eD3M3u8B575|G&H6Y2Bb8n$#{&8#|TtW+DzyGzPUzlWRXP{*`Ll%Gj&8@ z{OFY|lv!O?MM`n_;t#n=rW3e|j%;Na+uPfC@Ms73pFP8HVk4WcV(t1mHaAvSS8jAL z#c()gR>e0YlMo2ziAx80HgB#JhNQ+aC>2XwF=MaU;@G#R7dNq5EhCl8B9pRMl$H_< z6s}hb!PrAp6uY{ zWPn7nhWZk@qFgTNWo0s`Y+lFe#j6}!_ltk|XZ-j7_qW)4{1A`pD_AaHMX_2zGUns( z;2G}Ue}K)E5|*xPAY-VqG}r-N?mWeQrwc!x=Fd|?3B`)JQ(M$sCDvwfBbH^dm=&QC zaFS^twg{ByK;^n1>gQ_gR@Fpe1l2U147uK{YQ&H&7NMGPc*N#SZCRy*WKwkDc4P%= zgN1=(1dzuA3|bvbY!4~{7gJ%N)i^xDQF{Q3%Y>=o`$`~d?YeL%8`lvGD~l;FoJD-D zjq1Ty15t^Bk`J5#j`v^U>67PZ*-5?sB`P3N>81`7ZLh z&+;OJ(HIj;l&B-OF_kx?@e@eb^xOo14#75u8}gw+lm}DvfVBik@}{}Ji@Trv8o&O{ z=Q!wjSiX4$@4j;rwStMAJ3F}l%_Ho$Y+S#16@UMq{xkmLhZhm|+W4j2#^*-BWz!~8 zn^|2*CRX9(nLq$ND16VPX~70%@UhXweyz~Ly`J4ZU|NH;=8PeT` zwv1aJUgAWP%bPX)^MCti{N|foJa}*)tJOTV^H~-xSCu24Gnw)-ZoYL9OBs{h*ZuyG zWAG>$#MBjN!GvQ4XER4@$BUxo*cf!=fC?k*SmGzx++|DjhDFh`N#O|tH+oGNnE>f z1Gg@3A+1jE`0fLAhc*iJEnK*`fs|q(NmUYb+VCybBhx8^@WKUbZQRA-ogF;*{5QzN z!6MC-Y#hVZK3+V$i%-9}htAkT?ZP@PUEV-3n}R#+!WxY^hR}6X*bE{(-khlMiAhOk zQqUC}o#U7I`pY}Wm_91$7_&U&+LMKXIev?4cPbtR%@aI(zKhP-MY2RyG-@bil1RmX z7PY}AcX7~hkj^b(eQgE#0_m;|v6M^0#1#9_9^ms&mrzXjsAn{M^W|4~!Xn3nFav1H zT=bU!CAq_`z?N=1QP`h^s>3Q6w6WT*4M%lEA$SHGqBy+o6Z4~EJfXO*9=dGOv`xbg71` z*RJBQIY8rN7hiq$ISQ#bHfvedIP6dW{=kB-=$!dYRXA8x&=VSSa}!WVl(wzPN)ItqC$KSMlz9AK=D?6{O4wrsEMNmc=FStkHn$ zE%#Ugr-8%6Lv;FmzL(3|cY?L0a$~7<2BrqIS|_;w^<8|ry26>j1i;C4OhB3rGy?)R zy&hVwkE4S_Zojb&#AHGL*RK_dEZrqo^{F+$-tH6JyPJjAE5HnFbbBMNT$3%9QK>D# zge+CZF_<={1e$_C6!q5y0Q3V7Q`g66N)j<6ezuOUpmB7_RV@Ys7eQQS=99|ywU1t+ zv9}LTOJU>E6|5|!pvO}z<)aZZOd5rXiF~Dm_4PH}fASnB`%hV?G8Y4;lwm&^q1kMr zH<&^-5~x%P$R{;fLeJsaytZZYA(ftA)npmIP$nR9(MA?oWIw9SL#=e7z4hZBIT=QB zxiX=>#~Yn4TvnuqHZ?RP(^=H(HDuFI&>s(x%+*jV6u7E{Pb?KPBl7gGlkS!;T|&N) zN}&~)k~bzJjBOW7^7?lbJZcz|C``Z(Twj6yobl`5V-*1J{}(&;*($hPxM+1+`e%QTdS0*nuI|D$Q)~?3T8<)pn6lZ4tDVMqg{;E zB=Y4d^2r#?fMTQCIBNCb$IG~O?KUoMZz7#cK=pIjy0D4O7rS_Lw2R;U;$P7_eu33W zj%(W~R}ktW^;6`q9xPX3 z1Rf@12l4C@uD$&h-nqSno9};!UcZn3_3JzM>=*xnqZf~{zEWa#mIS3KF054Fz{SfK zu~I9+)I2zLAPdrmNeSYQX(o_LCi%UOb|2xlzx1&C^d5BI!Fbq1r`^QS;SnrfM|qu+ z6n>8PZ(Kq?rg6Pp(pOxsmeDwVj+ftjjDL1}c>47kGI1X-9zR8g^j$c1PUl+91e_8w z%ecN&LhE@GU;qBsJhodOy@OIBgY^p+ao8SWXYVoo{h$9IbYI*jiJ7F5$`5$qL59BkPky+)>|ddfiFg9WRXP{*-v2{k3LJ<6Az%>xN+mZ zrqk(MKA-0e)8+!~-hvzTPYmuj#zqx^^VSfZb{hlB<=B_iwN1{NGXe*SFI<14i325( z$NI%9*xp=4KCVLzEFlrnXkjq2IUZ_bdmAg&GBj_3lfwhFyF->;S*ovMg@Iz4>r_(E zK0F)!eiyCg37RKOv^!M46Z{OE4VTnm4ZG-4Mq)CDwY3c_mkZDpkC`Q^DND6uOT_}> zrVxkibvkICQ0>kJ*SEEmIMyy+$A=$%gm-RUK`CQ$98qKcC2MNE+&^TNg=^7HfnseH z*KXdz)hicJ$&(z4!P;{%L+9G8-Ch?b^7_Xo)Mf$7D;MzIM?b^cH?N>pOtb6*Jx8l~ zjP76zC7wZjWew}gRV1nYt>Z92qRo%o*C&kzyP!svBWjJ-s>o(j%zkiEh9AgsQyP3% z06D6T(Czgx==IQUx6o|0Fq(QCgnsSzyLj*2+t^$#arQD7(kJn0N`9dDs8$QDc9-u* zuHHl{g=8X)VtEN0Ya3Xrm7)3*oHP!&yqKOU@R(SxmYLxs9W=VAH5sGRq7qs*VyOa) zATQUKkV?cD*lQFAMPsXVf&;3%OZA4GK-70lCy^}_xmIwkN?Dp&PGm?VVo(FBFWX_6 zi*~!s-y4o?F4I+I;JAuPsfYw+Y7*<#YNA2?aeTxjwOXA4!GB~6C9V@pnYtQ+dCVGw zu(8H6HI!ID+0q>}yIqzbq4I6rc8gutjpJkV1{1E{v3>0pKKj|u@$RjwSjv*j2$h6$ zpr{7dNhVpAZl{H#<3lbjHk!K7^cZ5X1k&jos`X{msudJ-Nd{0f1{~W$`{V?J;eg-K zaraBy%W+T0KLcd>L5`RX#Zw=Q6LsSHedINII8&hzJZvA2hV!$Y)s zW2mt_HnuP0*3BE(T3hA}ZCV?Mt)`mO1gwuwj`{PA#xbuYREjQ7nZ3(3>y}DX5radlTs)aZHcOQQ zM3!$VlSj2)N3~MojA5`WiYsc2a;B=n8fugXP$(ApyXjO4nQR7y(h@edFX63s-^06a z-M~hz04;Dh;CyQPh^MI%MTr46Wv5cz(L$xh5-*o7T*Sue3aXVd*8@!@Oi^mh^iY~z)e4rDib$tof|54k9LQhDQQ0_?gX1?0r@ zaPi_cwl>#LuU1el6_H9LIbuN5bOf zMLt(RHk0C__%U{S=TWV#@IhmfDr6M0oCQj(@;vB%J_8u^QMR?NBbH2XU0iNgsY}Q0 zdf^J*{orT#=)?DM{o)2^Z`zX~`okf+Q}uX~+m;R*G@dA#h#1=X$_6f6yol}14Xji} zjA1%OncfN?t_&m2#qiTqbwoE{CNd~5(E*EqG69t=yO-%%6UhuJ^%ZPW$iUVnR#%pJ zJd#XHIuRE@)eV{RdG@t0%b}6WpE7$h**y14K1XerLoSy?o?=<6Rn)6BAF}3atstT%-5q%^TQWCDvP1YoV<4OumSvN}2CV8O&5BFPo#ev4V}QO>C~Opi)fp z;e}kYJ~RR5m#ZktdbZr(u8iZ2&|PGaMfM{ZDOHf-1_Qiq7uLk;EC2LQ|Map}tF5iC zud{r`U@%}wkspe|0~X{1q&x@9e#p2L&Y`5BbJDQWb&hL+460{&4_-M%W+=rEy0YSd z%7xoiW{Wt}(-VspCAm(lX$Zk#-xGRu)X<71WIHG>k>cYfQYwbt6{^m0eYsqg z-LeG0xwh%lWiU%%B}RqZCqs1GZS=>aizYVCEP>X5+{YG!a%OflO(w|*QD6#oVs|Y& z1OsM(*}V@@OU-HEkSJcncNNL-haiU|1T z@>wKIk;O|10<3$e38@p7@6iIdlM&kOE_!1Nx+%b7A)kSv5R=(OtJTKHa$!*a=5t8J z;|%^S${?lwQbd1Yq4J5W&modIR3Vm4@5ixfEb${gB?Pa*{YKfT#Gq1@KmxuFt0}9q zL@XA?HpGF*G!!^gla|KP(BfLXbnqayl5OPAtJIn$kMGds-qQkF9v3d6ZWW5HCx zad@`p^TCWnz%|9ic+lszq$(SvcxV#y&oPyzjGGj7nkj+Am*D~`$B1HHYdG4~B8x1t zAHhPIGuopHg*;a|diLx&v3R>bKEMlvav8HiQa*v$2XdQQlM!zOE_-`)k=>UN%!A`t zgh*L?iffwcCQ|7HYhO_elQkN$x;+7-cq+|-)CA;6%Ze6v0zU+9j982}Y1Y{?3>mcV zvHNn&C6uP{eT5}NlG1HwaWK0*tH1z=jVToCB>+I1zAp8_d|zbV65B_j!h#j0fN_J} zTqIu0AVCqaS;X*=C@cq;Q&uX+zlqGsP~R&S699vOj(lEbGD);n>e~@0qwmC%Nv}L%*@c|-D(=OgC@K0`p=YOebr@aobx8_^`kwC3z&4piDv@9iMVm7v643Pm8Msc> z9q4*-?jIM^$(Y|!l)RGKXo-Y;PFW6bO4Tt$yeGL2xyb%x!fj3WG)$BGgxcB+0UCXd z#FZ_Qz?g7ble`FxA!NWhFo<+ljDTuyDMc!2#Cv!AI_AfH6g)kh7Kk0WhSf3i8xf} zm@9WoCKykNEvIpw;%XK&&KYd84&>>%NsJpYy@qMB&kNb6E%h;z&p<4EU#wi#BPY2kg$knjOaDNVpWf69L`u-k#iWcq4bc z**yZ@SR^Q>gcQ@0n~ujUAb-aZ@(l7T-ctUL2Sw%Jv00nu#g?Z z8!DTiLAlLH7G=uprpIx4VHJ`P;-i2P001BWNkl2 zUrNs~8%i;0oFOS0Em_Tio?o=R1a^?6(z{y4-HEA>dNqa@z#(455k0(j%0uJOg6Ej6pqZ zisZOB%ZLS>tuf$odn%F%lYr3^+2CSaxUzg%*q7otNv0;Ois3Oxl>JLApJEHC8|h}} zY9cI4c3w^R!{tTz89w_JZ-@ISH?Kx)d!G+H% zit9Tx4Mwft+|SAJSVC4})DrzJpNZPPIOY(cE~>=Q4J zv$OsGV=ECv7FlGG;S~n2z~Nt1%JHXT@D^+)8*%O?aC#v=>*_)%p#dxu^$x!m2pz6P zU=)h7hGni!0Rr{ZCVA=_ugQj+eUjh7XWcH~G(b6TV+&*udZ;Bf``oGfoY{DNAHf3X z3*#7Hcm1HesPv_!{tVZvVX=7@P%l z=UtNn{e$_~Q0BjU<@rv7%wXZ&7TZO6Weka7c={Q>+ren=0B4DfQviPs9L@u(XRpE) zNxnv`YEV7^87KkBA zI{c}h=gkY_n`${Kv*PBj3W~mYlbxyWpZd(%dwq8XOuch-BvH5jJ+U*fJ+aM>ZQC8& z#>BR5XJT_=+g8U;CdSO0=ic9a*Yi)W?q0QP@2aj-)n}jY{%p379A3$!`xA$^ZtwHw z-KXxud_a%g?_RrJRU|ok2=yd<2mhVL-OS+nroPu{Lv^v~y&G`EowXZ;)%UdB>Y{mb zrYHS87D#6oM9;rXQ$i`=^t^4qcO{teW#95<`Ne!~L<2^Xs&XKTc3yf`pZ`@GeNhi8 zt3sgun7SovUjI8^du9B@^JjWd*hO7nudDB>^D)xiU;?m%*Wn7H-HF#T{zu*J!U661 z^X@uS(DKhKx{aFO?1kSh`oHf3C?BYHx8Z=<_-W@4^srBaY4qfzhHIeY$ZSpOSa zYgw2!cF4zvQA2^>e}Dg%vksGZ46V7UNG37`cJ;r4P+zMS8AYA@FQ=0n6p)@#K|*k3 zj{oIV)5sd-<(n^aVz~_F;r|`!SEPS|@~3;!v%gps>tp}_z@smjhD4}-k^N)tE6$hb z`>#{OvT zVC*z0zIQH$sq;1t=NH0mbJF<#_`Sc9yVbP2j zQ|yK1Yol&Er8jD5` zz!nUHRP;y5@uGjlJ$fMcr$D)@?H3%BOooNR@=r~DD1VHYp%$sCYDO@An1kwNhJ?v? zcXjy|`6iIqSYL+#-MB)YT#Z=Uv~c=)#c?LjqYvGM6A%M+`zhEc@YC~jX=&XX!%w>*@lLyh9yh|QKJGIpG4H~u0Nm`*^N%|eutYVvb2=lf(x<9WrU6YRyDsm?Q6Ab&!f8e zmFHE~;hXZ+(SCbDO~ADyZqR1=U|&`9%nNBQPk7biHM3_u@FBi6w1hi$G-Sq4=;~a# z%logdo`3xN=dB4(<5+L`CmbiFc&VRua2YLt*emV@+)xMz*D#Xdyh95MfQd61Y#`)j z&ky2}@-2q?W5lKN2XS%l9lEyf#z#^WG#i#AD{8ovWw+Km z8At9ykZpeh-03_eB~IXCM{iLBM{4irEqC|*h2%idyQaEDjU4_sjapAc$XTz2<%T9| zd*iLewE{fWMA%-=4c#B&DWN)EKC`iVr>T$#x=^`1GTfk7m#G_;AD%OA=(*+!y^}_{ z`u|$w@p7DEb9tR^(<4?3+X<1z#4fFFmK1% zxKEbw1r{$|nmmw9qp6$RwN8hJnPj=nGwGOS+JqSU!r=5(Glu`bP2G7w?#1HbF%=vL z&`xO~Mv94i1MCJzeX9lCqZ#9TDUH6S(mG>jbEihU4KFSRLVMIkX--d&2shJB0Ii(e zeJ1j6DdDo>=mna^i(TE%WKB<3pgmi$2ff{ZpH)#_1K+qah*<|6!akYbufZ=SXT7cA zso9v|UkOC8Za=8rTHS6R2tMs^UcGncpN-WG-?v>>9{&iuN6~!}P(HZLI`81U=nMGl z@HVxVG1ac`))4M|tPkIo|9QK+e5-%4J@GqsvypkZJgF%<302MciNwP>_^8hMkNx<> zM#nSPB~M*DgRj4Gy^}e$#6pNj$s`i;paBO2H{0N~T>w$a%E#Q3r?K?|7o!9JbS5q@;ExxX$~q>8 zBQL%e(lx+hGp49VDAYbHViZYYNG|^k46rHk6L6T!)8I8_kD`+o$bY2QF8REOq)+0# zYmp*gF*b9_Wx*R*%YOm6p`g~Ukg&c2>t_SLs%ezrR07+64z0HfvdA-Zc_R6sZ|3P( z!9nNMMwu+I0U%qNkfi;vB$XMBwym>*oMYoHD z^%uFW#v0tn@gE!A5iFK?@B2q8_IHXpfs0IH*!jELS6H!gUI+vq>%v|9KO({)y2OY- z-K2e@zhdX=)rN=|zl#k)hVOs>^Tc~aiTNAhj9os)N?yxum`XoNljoWvy72~E0|}Dug7`z7<2l&4M69V4XUir zMUa<$mmVsskj-V(Wusy4vV|p2ZZGf{h#2Xav+lo}S+IH8pQYesduER4Bw&=qT-XP9 z>9REnA1_Zf>o+=L3K&{)FFd7$kbYwXSA-pgaNMS$w;7t{!e8ukx4z8Dg#p6~T(*gO zS&$XF=|?1MnKX^@Z-W_qEI4Nws<=X8G0+3j4A@z%>>_+qw1>^=CL%RT$3-UogNe~} zSJZu6(B`?_1oHL|=&L4yw|M)UdN$0&ucM!-Ya4bq@J+sn!p2_B(OgMVy?NNyx3BA6 ztlsr`)TuLEoPDRC_UJax<%!Sm)c48pfEK`?aQyqJDEP%XLLfzQfOp8Kk?;ON?JGt0 zlxHvPlYa&2!n8wYWN|lxM$jlZH(jlKbx%Uw8}45n>E0Eac=aQ5rdW%b#M~Mdpt+af1;H>i@72cC znX33ai;pabU?-bDKYR0wxG&=_p<<Za_wV>*4Pw>Nlh`Oc4qf^m*^{D=gbnpJ zEGg+#W7y78g1OQYIrtE7(jyEX8D6sgA0vo{1O*atMk8 zS*P7XMPA~n$1%7KKE2&>WLVz%sU(=aMkrIJ6q`;j|NDRp# z2m~ZnI*U?00|S`tWtwY7>;Y3)2+&JWoQ4gq#h=Ja{)z5gPBzG1 ziN|2H>=*b2eWrKeYzS5M#!TxGt;>PWmf;(U#lkDVfup5f(3A z9T@$Cg^(02Yz*>l39*$!zs%yYh#Po@?$Q|!v;*K2ELs}_eWXg7sMDgxN`a0ws9)=T z58<3KYRE^W@CTjYJ9k6|0zc!ni?M8nhZepv-1_YSDiWf<-M$K9PSynNO@Lo2Q`E_7 z8!i1x()1Wody!6+kM-^%9{Z6bW>?IWg2)+Vh;S-?lDy%GH>`zqcGs*GjI4bh99Lb- ze0JtW0`jj_j;~@%bhsDBjvzvoGIlrUZn3&ZH_240_getY*uOIWxfHM8bDbjDNqmGw z%iLm3Y$As1>c33w6IlDvR-gqztvDxJH* zp^ss`T!PfpNjWGcYlb*~f>1TgSFv_APr{LS@@I&))YRilI$k3iSYXO%2VRe6P09}S z_`6;iW`4iwP-a-0?c-@h6awA>Y(k{lKG9e8V-rvdAjpm#$cYcUgQn=K{iZHv(_+t= zT;m;!0*gd)*nEp)@r>XXl8=0*JSyL(IU9;MYCXeX)f@a;S&L1f%$ncjxB$GH{ifM> zwUOep!b(<3pd8!7XwDJ|dy4z+?lMQ5YZ3FWe9df2OFN84`YVb;Y5T|9d@6 zO0WpSVWGDEY4ojw{4!L)QlRh&;PxXpfP3DHmC2*CBk6)(w;=A(Z&KvqsKjidM!-kvV&~~ovf@%RlB)kFGvC;8#ovp zm>=3sJz}X)Vn4<`hkn7>xrVfY;6!uq)Wm~+to!*A;xASX;uF|eLy8O{Gf#6Tjg$W( z%}~B%SDbS}$~XfzjK={)-NBI~7-dkh{qSXt9L*HY7!b~0%XEh+?hC+fkH{wS?h&A0 z6{^(=&YU8#s$w1y^)F9=c+NPwH%E`tS6+}8cY+aUi3d5q&q<4^Vq|s)tp_Q};rflh z4Gq**?9&V#X3)ebI|KZ~nbS!1wwkrG;a8%dOBg^&?E3AqG-V5S09*vp44rr`z6S2o ztcXORJs^7)v($pyMxX1DYwFK(`gTO|%M_T+yeJO@tZ(RTHT|;+;V31VrsVZtg1-)Xp^27j{q4efPVI{ln5(UtDP|`(Ji_9Szg$6jp?^-A)#4xv;?UUV;|9&aD4*8Cu8z5APWM04#DMq`}&9@ zAP@VCXap& zj4)`QoVf;#uZ0(luL)Y_Lfva2GL`q+lpWO4F-fv+!CGKx9B9GuXcn7)NdNGjI zPZ{YWoD{)~qT8@E{RkZW19U1beigMd&tgH|F3d2`<736j1S_wV#cuy*K|m*d%`T4) z^Bp{Y-&n#Mvg{Bw=}wb93`yTO9;Gh1I}er%?-8n@gj7q_EC#FN+KZu>=YYnUe^DH8 za(OFxW5Sm3ML4ORd5hmzNnz3c6P!L70ySzm(G#%|DkKJbZAm}3<@S{w`Z&87fTCV4 z({4|Mi64!HfB_m*vbv`~6UFf(L0;T=2komvsVcb4nmx(1(`SAp2<4ktB6Tp$poGFm zw$j8B-r19mp^t|(xj*~HIk6pWR7=&N^TP~}@$SEm0xu~`TcV$y?kofLEn(rC_a2w$ zaND7hwC2chiu@8l##T%vE!=qrb9L?3q7A%`S1g^|M7A7}Kq%)PWY5{Nw#_xaJMeJH zQOidO965T+)_5`6@bM&s=@?Q%RpUg-zP6H4CD0=S`S%PccF5qo7%SLIfviE~I?>O{ za9@FNz1jd*)Z=D@e6Xs1GJ%7Wa-<0U$5-YzEQar3z(;Yc?hWkwZ z(Ts=OMOu;k9t?KC608sVFwlH!zJNGe>hlAw$0#Krfo4xzUgh;^p0j}0OhNwfu zy|pQ6V?>(A05oxdXwg9qInuWQ_mQ#JV3wCf4}$I*NEQnCR-{SAz7HTCkBKtnos5QO zkZ{E_;tD@u`c{CFiLj#hVLKp}0R&);sSi58YB7)NiaIN6%Im9S%mXpO0;;3y#cUJP?E5DcIqeaa1y#ft`~8 zrS^JQ%!+eujRqlMG+2T(EL`pubMhX3Djx_m z!?l@oqc=-J1gE!&YA}PFBZwBYK%ol5wA&F-L`fAc)FQVE^mz4Qmp*+co`h0JMIeA# zrmND*z`)F70t%?Zi4Ag75d%%!!3;{0$1&vOg-=T22h;h!L~%xCvReB3qi^?UNi67# zmBS`;NEj?ENTQ5=OTURAuC=F(Nxm7OJjEmCVB2e^?jq!In#i0za1q9{oIih6{M{0O z&q4!P>{@T{%Eq!ABHjz+gLm?`k*Z=m%=Rw&R55TOF_OmF4`v{H%<*Hlu`M4cBh1oY zdT2xG5r+dMg~lHXVT91YeY2bA9gP}cHXE4n z?Mci>lqOD;v#M6cSxg3!J|SEU4eb&$g`Tk#}#Ex zy0K-PKYy}k_7$!P@No6nYj2#=gR%Q!Hi$vv4hv5$q0Ry2shm2bU`Ry~6R9QqSWK=- zPU!1W!A7ALMkJ$q1qllm*F=lwL$an!K=)?kmVQMofk|IQ1Bl@eh!R#L#`hmZ@`;@M z;*FJzLtqh{^BGu1OT_#2ci`_sQX|e4E1F6(xV^ip>ke!s1}N)WRFO+uvOfqn*Uh8N|KP9@ENpS;mXTDV){uj1$- zvK`w`C`z@H$53ryFT%LHC^$#Zg158{8Wmhri_G$&u_k6f%0^NkJ6m1V)&m6UEiw3c zLS%6Z{X>8fcepPVe6^zmi#hKsm%!Yls9@kx!qi@G!aKCN)9@e8(wpRy*pVQ+uC38d zMCHO~1T{BzSc|>=FgO)5^1;2qBBMvxxzKPRbOpOVM|{3yBFjlm!J*u|fWW}DFa)}y zs8?lJ&7&Cxo0Yv`)FM?;!1J-AU${}}*_{`$NBHS?7#!84)RRemrErOGqwPSp^WyEb z!NpvQQ-uKAj<^j8csPC`Kx$}ZP=8A)&aJ76>R$Lh{DB{a8&Q?GV7?A|%mx)V008W( z7?Q16N>gS$DjWnsP(bjiV@DQICMHkBm{F;OT}zk16L)%kvYW~kjJ_vQekUZg>BwM4 zn{rJ57W{VMcfJeO>_?0s29SrPZd?aMmC_p)EN1s6Eui_PGQIn?5{KzH?NETwf>dSvayat~gC}5N5@``cy_+}VOn#@$7G)9`KK$0of zmxsu5%6a?JpYGYXD_+$J#*i%Dp%Zk>cL}|@Np;H=Xice1ty$lwCrOikG;`LPb*W*` zxrwtWaKFsUXrQ7jh06?dB0r#%Q+(nV%VM|F36p4Gz=94&%_pZ+jqf+Js*GzUVjhd8 z0M6NocT%X$cVvwhXdn#jh!SYp5I>5 zcn`8%3W)+zLkc}{+!Y+1x5OMS$?_&lyh`J~O0o5k=B^gl+L;e%O3+xShkWHIFXOll zq{&%vq0d;BgSk$NJN^-P+-wc^qiA(;i<9MwQsf7)5$;?5{OtIrz~%noKC7uS1YR zSL}`vB7dI9R|zvEW;mV}PBTqh(dZ|k;z@mXcMOm-@T@)l^CbRuxj3EKna&Xv#2n}< z(ms8R+*J9WLSzGgolCt- zLB<&7mn4#W&s~l^i~j}ffo*dbzmW#_^joqq42HPsqF_Y(Y`@E@x0^9~#dvzQ6vmT#00tDd>+59DkAG`OG?=>>!s(pr+Towtq2n*1f^tID~$$igv9J48bK# znJO_JC&*OcJcXY=*_soo+~G83U9GUh>GI1#5SEtGrd_C;q7N}AMfZMJTuxLdO<>1p zS4FU!468dOFd+a12SIitssLiVsVoTy3)XQ(SS%R~4(_UH4VUCe#Mi(vK^%c`5PRJf4ZQG`-A`a)#Yttcc z?VR4ZoU@o*a|bw-J^!Z#NMKS|s!8$6Z5b71*JXH+RPBrSkv>V59P@|oHV_#|k6NtI zU^G1f7l$|cMN^qW$E8LA zrq55*YDl(K3gn68nDH_PGJxMAg>p^XqKken5MWzHoQ~8f%`b`qm21V^{)5j~Ev9*Lh$)zXG(vpu7T2Oj~ z8w%16hZ>r62P_t;Q)p9U#4S_Sbo9-=>{OA#vlqpgS$K2EbCC7Qgw0JthjptDqt)@Q z7pD3bi(QJoW48q0fv2-Hqq0l<7{^Hr9-oH2cd!BjPo1WJ8>uVVq$O zPOtdFkNVUO84c$qhi${A-dLl#YLl6`m^ldfH49Q=(46_K;IKrOanrx|M;f~nqwO@e{fmrd#8N)^v{qY~lh2CB`A?lkQ3 z;PV(DZ4nDm8Wtu-?zt604TY3?*rVOUdMq!{bO znq0)L4pz=`1#joD@o{BeT6Q|K#_S8*qX|TIrdMZq#$Vgkp)!?1?p)C|mCURfY3Q{z z97aq{GaDnE>p;TAYqBgHV_#s57I%OyAtNwI`;2{4En2&^t#zG2<8+T4h0xg7H^&t~ z-$E87oZv(~ux%AZXcX&RE#0P{YAXVRefJP!i@MhBF4Lt;ziVL5-z3{Z0}o)@2Zr|Q z$>kzuQE;wkXld(H=~m5OXG8v>(CHxp-F>^#aeL`$^{D4kR{^O@0EIh)Y1exgG*(+H z+w902)sL}{;V$-;a@K79tV_GMFg2gm-jJ~aJ)_poP?v-av1mKbgfQzwYQ&ln&A6I| zN9+x-W;+GtX!#{*ajEcbC#1ESJ%{{Q!;@^ryQM~e`4l*a`rP-g)kRwO-cB1XOLS)N zuViOpi1Dl8n>)iG6$(Bh9BA{7n2j4Fbh+Gi#^2a&Wr$S3KMFQ=ip4r#GtAuBD?q8U zs6SUf9_)RVxmfqd%rYA7x92YsgTaYeW3! zZ8Vy681OvqT%mDXVnExdj&|tcpii_F|u|-8( zAbR;xUZy3C-dp4j5@cdRUTmzVfQ`Jq!+zFgb7{t@t!-dJrCGLMd7z|MGIHLii}Aga zd7{hK*0!l7yWFh#tBhb-l#IXs@{)Z%!SI~%MoVa8#PRwIV-Bp-DzxE+8&Zi;luL?} zg!NQg*T6(8mZ4EJcgdZewzIaI8+1}}!f(#TNrkTojFs}v36U({wolreoMW{cl!t@h z$z$c~TC(AQhUkCen;-l!g>;M)`(Ak>F5IM0sFu6{>-2NzPt+=3w{Q?7L z>yv4qiAxnZt-3UC$$$agFg=}Y+nDJj^+3s~lQQkG*+ugP>-I_@*qDzceFd`mQ>x!oK=9Cip)waLp43i}(u<;3J?1n@qyG$O1t}{gmLl&4U zNWZc?jtcCA&@Jyjzp~SCaeHt~s&vhX*eKVgO-9Ejm=0bA6=-AL{6Rh%5t`7s%*A{4 z4U}n#J3~g!e5`_=2JmfW+g=}^ZfuoMnrCEZQxLf>(wb^@`9n;;yT*}s9BX~uYFoS9_m&-F=#B}SI@mkZb zVgLF&LlM0fsjLsB<*zEeIkzoXa$0g`-zyed%~g0*s)wbzb*PAchlJh0?0iJaUZ%`- z&$Z_xrMUpM(0CYpYQ#RKV!FFv`X;jXhfrGm^{bf8mT+q<-EC&wgkTGqGpDm1M0Um@(P;4g={((P!k-)ry(39xE)I>%1S1>U+EDq!RZ=jsU1MY9yz zoWjbdWibCZE0k5mz?VQ6G*0&OD^~u|)+OEm8gS*Fw=-@QPR+d};-e64rJ7R6_O79U zI!ug6R_Pd+sIh6r$0YOTN)<_y*p*g9IJn~$Qb@_RRhK)kbe3dvul>xMlWH+DrmOr} zsEWem)-!bf$l=bqiJ`;)Ae0b+?ab%1)vZ>bQt5Jf3l2JqFzpVhWo>KfpEz){XK->n+zF20!SEBQ z(cs1wO3EFHCdN8l0D6Pab?W&V*Aw+BBppxuXiY(8mhCI&1xM9UktyEQ&bNL~(=o=& zOXDS8Zg0EBPHCDh23`By-k{lXne4wiPhonFP!MLV6SfZUO<|Ge2nEd-OO3jE4sA5C zC9rGwjX18>$OIcopdXZoq8M~7@S$5oncJ-EzVeL?s>P(dvB!>pHt+Ur1NJtVUM&(` z#yR#0l?vPDF79FI1?q;5Msa(a)NS8H5&4+eFk9_Q^XO(|;t>wEz}b^TkT8x^$hC&) zdSr)mTy>buT3IcEMqyA;*!Iy6f#VW8H8WK2*U}Se)7Faa3mi5OoQ}xJGPViNs6lVv zQ*ZJN2qEz{%nVPGq7!jN3Y5thCgt^j)zopeJ z-vTl+r43@l2@wf|)~^))rGbyQM5!Mhp10pm@1Q(puWFk`-H~Gp0atVPWFMzf6GjvD zp{2ok%NS4D_5GkztlF7mGf9djXzSb4JNt!t)KSsaRQoWHcJ1#6<)a2dctzQ0(o!}d zPub+U-NXpxt8=FPs1fHv5&he5Ht=^WgSY5hC*e7U{Qv?0KJ?;4tJ*2B)&i3Iw&cRoDdG5bOJ;(x;CmK6j zg=LvP3kxo@4xc!wHM2#WBV3HZ^SS7ejnb#$P7!Tw)8R&ZhCssIjIlZ#vokZC?!&Q* z>@;v#4SIv93aC;S?P{UsPVt);)mvIRCRDl!Vj*Ysg{EW}7to{e1QfXu6Y}-SG|7{{ zTtLSRt$&c%e?r#H(&%S*UC25&sYJcuu>bkx5H)L!cKhl`SD!wcP{(n)hJjT^72yeK zVp`0H<8C*!MVeHUaCr|Xr|3;CzN=Q56!SVkmobL>nDo9Gro{=kLj$rix-=X&)YT#IaoTq8wB^uGCT51&XRn^#bH(1k)Wktop`b8;5s64*HgLmQTG_noDiOh^dOpEk z$jMKlTC{GlkOHeU4oSYbWD2$lC8v!qDJVS=*}3p6dAm}DCJI_IrRQ{`Nk zW8q?vZq5;*`7D$6MbOVRFCCh34|DH{RNgT5kWKu27naSSux(7Ram{)FxHo@Vey6eI z$a=4-$}|>9ruAX$s3g2d^t-OGn&0O7t$_0d z$hq>x3*~AJT(vB2b*4zI5LcBk1b{OuHh!>5p;XTf86L5PsWq}Z2I_M3<<+l-CHjI2 zPF|6d6L=P0&KWtCa`ko4!XrnTgPyU4x_Cq6N=ER|p>Ww(D*`<2R}Y(PeD-sO5j0-+ zws=SSI6kzm3LgqO`r4Wu0$w(8VQbg6!=Ty?oi!iKbD(V{Z)5{p8M;4#EY}z#W7CHH zqTG-Z9VehOR)S}8X9fDAdQz>6Q?5Kc&JoOGV~r!%l6BaURi^zaRXo>o7muR>!oG0D znjJ6b?s1H)nla;325#7O{)`7lI*!a%mcMwU^kOn+dn3g;3Y{t*80NL&~JCo z9Mm8|dnW~-(NG@nmQH8?`eoPH&?(liC)(sjt&Vr^B_}7h=Y~|lVg1Y0qrM}^GgN^S zvv1#hjH6ShTE&Kw!kAPF&nfq_Dk0+~QerS>$k%fle%l?tSULStw`E00RmU|%!f~#c z$~AkLwX`gUaw7m61gxvH42^TmcttdCaGt=&!yL@r7zPST@-UC};$yI5gLf0&{-Vfh{`5m)-C+x@hGbnga{K1+3xE>R=xu$O|?Xi64P z>s1m{yve5QEjm#989|JutoeKB0x+0{;A@eP ztX4mZg1wwwJi;O3b@j|> zB3D#WDMdm4{D!?PJP$ZZjDlCIYwYFM0J`kWn2k}}!`-ZrTJ>{6Puo>c5u#FdF% zS-FAkYGL4qt|YLWj8a9l9V?f!+klD@*UsEX4M|Rw0u6zgpKEq&035kkjG;}^u-h;z z-iVyq0}&Xof@jx_%CbH>?@P4t$;+TRh#i-lmoqfam^6(j{s4QTRZfLqR`?qwXieCV z0!xu)m(%g;h=%h$bnnrd5$Tjf7*P>;j&JGpTRAR>iI3ZsH=(*xo&` zWYtuO>5E!6-j>U%BZ4`rxyTF&B7ab26l8Ho=zs|4u4m>j%{UitEwv||FeM*Y`Y=95 zr>)85jXLi;a|cBa-MxoM)Wl1!;zquqEa(`=wpsD^dnTFAA}bIJw8bet7gtDQIKX!0 zkr3U1Y@d`cu(S9A=x`|T;1(lW4!aVis1BdqBlSf4^`cf9sVhR;*FjVmm{uoqw%IS; zjN`zGTX`p9efvtyrB7j?JF$r>o3q?Yj-Tygyf8uR009!Ddh7R=#wn}u_`1x!55bnG_W#86EVP6b|EaSq+3(wEUt zt|Sr~y%0_+|2m(Hm0H+sU`_>5>TeHs@{r(Oz51acD)$BZZ3Yf45h4;=D|JgfxA<e5;&RLq#0UIS&9!gtqhe-??Wdw%B*y(9`|4ktr^rytQ}rw?~L0|)7s9AQS`g=wg6hCQ;~Io=UDVgb$v3O(pd|I$x2&wyBncoTPrbBB^o?c zMrIypt}wVl0@kXLR`e3)Ji#&E#F`Smsjxhod<`QK|Ql-f(tadNK;B{^WOJawL2hE#D z*Zv^c9N2eMnt&C1H++80%*ac^+dpDx7{kBBB6Pl_lt^-o#VfTI?<^msw8+fN4wguC zFC9Dg4*Tmb)pD9rVL)sUpMh=n@M+*nD##hGC}0?WJzVo-#f7jiWbV-!S#mH%3>Zob zMu22L<%l{Q&Y{|FB-1B}8Z1_|U%!obCucXwN)RQFjGJX{suya*Dbbt(txbWH!@ap1 z5;5M4^H*iLQA*I*@1VLpdx&0lI>aYuK%$Rg5nf<+^vcVs}8N3Y|24R9Qcvdc31q>WuHH9q9-Q!*% zKubXac*C@z))1owRPsLqE3h57r!Oxd*=V?qd;`3TCu=r!ai&{yekc7fnPP}&wGRlI z4f8Wpb*aTTYlgGrY z+4kQFiy2ND)yP6LJ&-sCfrC}+;RCarVJOMLXTQRP%X)+Yj{X663uf54c z{!?T(k1^Qqw`*jHR#dJ`kz(NdI3|TlWEfw4_X2T&2B8I-%_yU1G(_g+l$p42QaY>Y z8I-!5j?vjR_?_lty;jEJdFJBeY>acD z6N(PW-2!z8I2fg*WJCmK;M53OvTBH9(Lf4mibk0d#{8vB7l}ZfZf6praZG*iCMcnn zaDE5fH#%%A1!Kla@h!q`RA4=3<%WD=<1@5UFB9f*qW}>_#o} zO~3#23!u`!b%_xfKs#KpKZNtDqW;zTC!BB^JI!t{U^KEO5lGIj&>vvro8sy%hShce zh0VC3MJsPhHYv1xWW*MWr+S8(Ntcn60h$ZMC94IS56D(>j?wE;1n~6tcUVaj`2&rA zyC#oNAs3#aQkIov;6;wvpo5zaA5rjn!7iekx%x(hlqV|=lW#}#>odj;q4x;HW z|Hd%xDqYm7C*Kze@U^mZMG^g_UOmUjt8$W@hm))$__I&)2Nu=o9ZGb(l%%$`by{e! zi)RjHWk7mmq!VpRmhDl*I73#Bsmkfg0FigB71=y0C1pAd#w52|>fsusOL#mhXPU?v zCr+doZth0WP75mR#hNXdM#+z9*hsM?gC>!&au(}{Q{)hWBF4=(MhC4{6!E7Llz*L{ z%E#tq(vp59AeN##RGLD^D4-lPJYT7h7tj@P(6aCqJZW8xKoq7Jr&!>(VQYnNkTM5M z2t;Rh{A*PpRf?&#wG1Q5whnChIVF$!@ID+1FNZvDW{P;cEYJ8I`m^(DgY2(gHw92d zLkFm~swRlGv^z>c^I|A9n&xI^sj1spzKRy+7Lm~nY6$2H+mIlTYpwz1cLHO3bCE`e zGs}#ajPGI0dadB+?JTm1PBzTAk)sf@Vo*8*$F`;)4oYX$SOmJdMAOUBI~kUn7ukrG$c&llI-u;>#MvIKPM2bTH8Y1lhAGL& znoL|x@~^(N3AS*RrykMeHYc(RG^x6sE2OR^8lrgVj{RH}3kQd+;k=oDdG}9b7eg4^ zQE5$9ogyfT2W2u|3cP3(xHlnY%Vl1OVOekQu*`8(f^FzKrG(#HRaO6|1-P0f#2eUW z)Cp8T5=Tft49B_Kv{Wd&i^sIubW<@wCl8t1St(Y38h1h?;*S`_PZi%7I)$a>KR=@H z*p8q##|H+ghD(FBtjt-_H^)Scku}qVEP_fTM{$rT*T_S5lq}D5>~aP!In&Gmgy|uX zM*bFMCp_+#_U;~SYvZYwo9rE#NbQh+ctyJ`egIe*qo3Rv6v)s@7^kT0iQQ4(7cPs= z!A2}7GjXC9X%$iLB*)Sx5JRf9!@Q!A<@D?U3&!&2wxSJAWfpCwAF0=mEG%4;AB7ML zmD>c0th}uKBlhB9AK69Ol~pR}z07RVL)D2^-5_Mt#ktGfzTho-aA!S}<>_k&% z9H0Vm`Fa@zjzMwwAif3AI&QuqUDz&3%{nGik8qioA`_3aq&jIj&510EcDKVwXsq!X z^m2#4)$XlYJDn$ll3vS#^4fF#tsx-2qFT|cNDN?@j9753L7r{L3n-B&H+u&AF}r3N zl?g;I*KGd-(O9h%6MpnTV-4949}R(=gRB~M4#!Y0$SPv(o0h_SmjRtBrj(VP)FgSD zRmBeV=4T++(65Bi4dlN&YaGKwr6uDKvLz8mq5@hu*8*C1|9uLs;SkElGtkqIafZ$< zL|`#ESXTcfccj7^Xf-_D9(P0S5FX%RcV&y5*ovOCO6SwvKV-Ly`qd4!P4C~TX9J9g z(u`1=HWtX9yh`rS0~T6wSYyaiygGyi(^5ki^Cw|qbO|QsoOV?N!) z5$I*frZOO~tivyc8_Lnzt7B0EvDXG8H?c`hpQUBmx2;v^QY%ubUFGMWANTO`geu~aObFX0W89;NZAsyB?sh$Pb1e)S$9bKgboa9lm-sHE`azn?2SaO^C_ zQaQEx8sKvr6eh>_?S}CYj$_Gq8|)$96il@{!gd=dAbjl>{a->>1T?wif zDeS({pTx7!4rJSH<5ao4;@SR=Ef+ zY2mnZCEelq&)hD-TB)Yrfe*GrcdaLfwtG5+aE?$~{?(AYE(_08m|6V+WANRm1xfK2 zs$J(kpRtT`!xZL)2aC_(FF?P>ibqcQj!h3Azn2ez*UV|1FWxWflpNZ% z4Qe$AOD>WT0s4+l{9XFAODEUZAjin1JFvhMIHV!+|1tH|0de(8ylruJw-$=KFHWIA zDOTLw9g2H#w^G~+TcAL(;_mM5EG+JeFS>8P@4kEA`|n6{l1y?YGrx>vxR>!uQ@>^a za^0FU?UWKI7i{BAh)bgb!;?S7@iN=}#o^`rrK&)QRBZR1439#vK&Vv9o=49tV_P7O zkSwolIt8Ym2m5VX73qgffbH;jZyrO5^6caX6LPO%Q~>?&kv% zL4|^JXwzauk{YD_6EwUFTwQN=r zly2eQm8OajRLqmd?p+y3}3hNu)zGWcr2^#;4bqEZXbd1 zZmXK$Zf;l2V)5gc`sEG=nd;6Dha^(J;uFcHqJpsw8g5!Tg&b@$xpxB%CI_u*=g0k3 zt&uB+c-p~+BSdX2sFR1LbH_7|%x=&=C_%AswtB;l{!^kBn|Bq5nIW&|ciUKULcqW9 zdTlP#Sry^iTVw!ID_j~&~34p2idmAl_B*?QfIp*Ou6 zIo~r$a#^PD@vc(ayui<@8vbU1stz+~D_kv?a|ksVBlikCoU)UCTZ8XjL@bLI%ej!A zO%EvMGZSOJREh!J@nal_etMCW8$iu`EJ29&(HT1gw_v_IE{#2}`V^Wt8vNe24=OD@ zZ`e!VVL>znWIeMj4?UcM+`sX*{OY67(Hc@f;*cxaEGsJF2Hl8~(dRNL?0uVOTCSSz z11yAR6}sIn`sk46ekU?Ts4iTc%|o&H4iwsLLh465?q6AOKf)DuRwdytanj4LesGb? zgQ`oF^|pnIIr=-us87z8dacFF+ailuU>WQFEXsF~L7g^Y-{H#l?aiH3Vm~DduR^YJ zX?>^XDS77USn+9TN!|)6O+IOMW@Z{EOa#G8`R^uU8Qs(Vrd+N%bhgK23Z(K4)@^SebnHyxdfnKOO8IsapfV*v4Vec`>-g)lp{OW#5)+T1tsW#~jL4w!VHHAd* zCY(y35ro5U|MNUNpF>f12kV&to)XKt_Ce-<#bF`uRO$|JCdnH~MgLdW>y<@W@F&c} znBR8)eTIZ_p2Xq|9b|$0uc3{1xHZ;b3&!%U+W)l7rsFNw)j%We$nE{V@1Nsl^nP(E zm$Co1Z}7U1iBQc=-T&KHwzggqqW`Zjmkv_ifBW1cf~gg3{l99;-7i}fBO=eix2=xk z@xt&E?2^&gGtVver{Ctw$nN^c^?E7Po^7vboHXmP-5%55xJg#6|I!oWqGD;$9^8F8 z>^y3BlIw`AID1uc)Kl*Fg~&e9^53rqN_k5cTsBnrK0Bp68Kp^8D80?1rM}trFK1<# z{gpH7ayo;=vx{9bEKRAG@s8|rBqM_cI;m%=#o0Mh%V}H`lI}+n7?vWpHyvbQYO|Fe z5?Ce8+}dl@A=#`pXj5Oq%+mcS$K5x~W+>4N#(m}kdfV7B#G39rd-bvT*l;kDEP4~l zERlOMfM3-H5glD-NFMH83p!sPi|>cJb`<`H9*|y$0FgHp`shA%ZNH-{JQclUyy3k%a=;vy4 z-Lo#9YCqEVZHHw|*%LSW?+NAkK2R8R)XP@t6fN6@_VzA4sft5t60f%I+OvNwKC5)F zT9x#zjPv?mL_3>9t*Rqa;^IF-OJK$Mlw(HOr~2CWE5lZ;CWd5GJ~lH70;{}S1%cHjEQ$!Mjv#n5UWx5Re`174zl=D!UCjthuxr|e zW4nT$`5zFV-MKZvqJI{*+=mzPHe7*Al)bgb68z32 z?#+q3LydC5w=5)+`9)yo%gt>fU*}oJ15aW16?SC67e10K-~A?1iWqg7#dhd5Lza30 zh-QigbF*ZEUGJY29PWiUcK+<6kKSe{K3QbXdO{STIdeH~Z_x2~=s9vQ%EoyMMWLV| z+V++#DzTv)KzWqN6m{~ugV0M1@*$AdJ?Zmg|5j@v!A#_dAuwaB-i@<5t$dqCWUL10 z#Z7(DF80u76br{8japq&)?zfPXiKy<6jb0Uxo%ZXiQ?>jGWApoOi8W%p(WDPuaHW6$B5M z-VrBIZyyBnQI{w+=3|igEloff<*)-y2D*{5B~4JDq-8kUOu|#6k(r@^d_3= z)GEG_v2DlU9uW>Slgk-92TQiqN>ks#({H4L?9yb_5_#3g2DZ2d2nd)blr z_F_qf?(V&__;}{3(10>|*mw0fS$_#)6!Q*UoO@tUho<%E15(G!uC)#ez^9tu#LV-= zSR+^))H30wA~D=(+$;lyKHe9B9uoccYFaZfTMqfgJ#PGb^WFtbdST)7>Zpam26PZ({=Wq5{m!>Wp|SJN@xO} zT*WKzk$hAM=Ts*Qh(pPUj{$jb=6`heMNmBX>+w|lrsrh#)cx>A218F~ol`VSOVudx zbi$B}`$#j+6Q@L9?yjlBD`<>*TrXU$`Low%*ESA5wl^%<(JpjkkA)(3wa(QIGRI6E z01F+X&$+y_*TWYhv@UE6ijR4~*@0sI*8cqCvt~;%f*9_5Qb<92_ba*%kz%aY^>?Y*(*d$9RDeN^7pq}8Tkaw0~)yHNaHiToh;7$DLpX;kQvk&PKt^AJw7lu zSwKm6oIKSozVfh-26c1(oDinv`tP0s%YqP-cvF29oOHeICmC+c5rqa10=RegOFPRh zd+P1mAV>C;!WSIah^dR5zd&VbLk>0V>V>O~+jAz?ewnO`#AM$1Ie|ORYkuys4efe2 zJfn-8t}jnWl^c2t+P{OzH>aX!+s;E1UEfmC5~34eM@*fxYPjjM8To|2qz%v1v*vVm z#IOqVhf2W2&m??){Bj0;oVNelSTj<;ONCsC8;L!}jen&+#&&r$I_Y+?hg{^FxX`bC ze`$&P*zl?gP%a9Qe@W2X(N(=K{>Ag#zC^@jtr*N?H-^jE(?I-Hl&KXy{-{Q-0S zX5Kv#4?Y%snThZb} z@hroz`nP4=nk{RzSC-AZ7!?GQ_ilLltmItnm_XV{nWROI9Jv9h+LJ~mJ|Zf!8ff%` zLY{YGIUV~>32hZh-AzGnm*?%%jp+1CXRFrt znyZ2`lQz0fpHLYS*i3jo|5@)C9x%e<&#?0KjrpiU(_%CJdLE3e0H67b`f@m8_Jy}) ziI3A<9b+xvi26)eRAH_Jt25RmYQOf+hEdVl$xoDL05aBXS{3}DT1f!i5TDoU0^&!# zwNs-jnx?t%X9Qy$3<8s_J6t2|Dd;t-MkXd4E7$cbcc!EftyNs_wsckTU0?21C~c4x z_K{QZ+YjkZlfyTuqFI9S59a3#__6p{j|cNrf4|S z1wJ>vFp9q%pqXW1Wyxqw24qVFf?I#os|Ic_2BjuPCd~dJTAFZB7l`;C0Bq{5U!36P z5g56CqO7Is9g3~kwHLkVGrqhQG`489m^!;X@N5-@T?$pQIYO3=pGa}m0$%Os$~3C) zJt!FOC%!;b?kCC@nfZJ(o~g_BO!>77_HVBst$R$nUp2~)I#kV@aAkE~)oY z;EArZp>W}Y-?;S$y$4jh?PZe!y^W)&BHRB_A%8z}lwLXDnj}+{rO=pi$7|91VYn0g z6pvM1>HyNSF!zYugmQ~-W$#QG%AvAiRklB{89#wRmtIxus&<~F?jm)Mo*j=f_71!7 z{5elUKtp;IQGwgUPKst~AAA z{nmgW$J~imzR%RT9X;W2Ym`ML@!O>U#g7^eo{TYO=AVw1U51KJb62NKc6%`3;uYuR zSS$$>pYUHFTRss{SPz*~9-JQ-lc2JjzwRto=rncMVoILiV%Ji}>xViJ*yu&9jrK?B!sfY9B z&DInqIJJDQ@qQx3cr(`cLEosoMrm?upyIkT{gSjeHnapZS|WZ0x`YBtGNW27`?J<{ z_J$|nAt?@DOW3o3v7cq~R3ByHx?f1sq&!Cou!>+WVglS3yoP zWhl37#UWF818R7eBH3+EN4gUo5O$5kbQ6|wLt6>YECZjzSM$n4!!k-|ES{a=_tZ*iXD1Lb!7~g0Q_#kFRgXsx)pMYQ93+ zGX%~Z4N&9_d{YJv-LBv-R_;WtwaeLa)ls8*+8th&i$2fuUe5t)OyUkh&%u=`I4)ol zauu)a(WWWr?0(1h?yB87E`$!FdV=|L154>H2K{qh1_d^84-;A%3pm zNAVl71%X>=sKg_=@goqHdom+L4I5(g-kH90v2n`!eK&qOq-7hL-g$4?0oiHPasEvi zxC5ljQY`ekWHW5ynp8`K6lJ;Zq-{Kx+Aeui{9n+F zni}Ly;2BwkxJJFZlx>fRs|=b(GS9{1$uaSw;M>A?rvs9v>q|lCI_$|$)MHPerg>Y` z`v~w3XJ?dXZ92+=k}8j>=0aLgX%erkLtY8X4RYq!{MaWprlbU(=hJd)Wix6Xy1y#_ z^+SHd17UjkOryc)uypcbuoG6&=FdBNF#RYL0BV1K!?7Dbn&WeUG!e9q_BWL{>j=Ck z;Ym|?xMokN+j_|Y3fOv+(1j{-7n}%*&JX%QH>k2X)7is2DLPqeeDC%Y4JeqZa-Fm| zsUSP}SJ&OLMsa?YCuY#MFE?oEknP1Y-J5!iU;0j(mzR5Z`VcYQc*X2+1?jRMC8J4w zGrC``Mzx%T+n4<*8BaOrfY%>9{Rr@I`E0l3l>bZ~bYUD6SrvHqrZV&Key8e*9QKlO z{*Gv7d1I|m#|i&)9KjS(j0n-^e#&~}>u2(dX(4Jq7)mC2G-R_zhylU#WpqD(ciuT5 zw^PJ3BxRPyl;_v>m9MK16{fG@$AfUD)Sg3IYHw&jPNz#kL~Y+%E6q0O>4@{H!*36* znaIx1-hW#`1(I$IWkI4JM-jh&{gSQHk-qF62Hs#WvQ7s*rZ7T}v^(X$z8Hb?n^3%N z8I13H_MzF%c?J2x6LJ!d=g@JLpeO`$?yt*Yf15=;#d>yh(1X;rlfCkHF8lSDZVf~q zAlpxuCF0#%;b^|`Z>WGD)@^1fzNxzw0ycD*gj|@E`IHF7l`|23pYRHYYQ_2%$&^@v zxz;HOu))U9NYnt2sGsG%3-z7bhnxX}m&R)Qtq)HVisxk>kVk&Ol>24p4r-}1ISLf%Jja0uoFegB8sRrzl(mrSYAQ40N) z1QdWT?k(ctW=l7hz2@geWjbEQOYXCs+ryOBj_+XjH2&9oD70d6>k8h1cV72FFJKY> z=St@bk~*wxJBEsKfzcZHaGe+-`lR06l$M1!2d zr?%vv^PmS~=o||5+s%V1wyLW&f}k$=C?&x6=YipqDwJCX!;b(l^qwWh^LKP6eRq_( z?Xft4Q1v**kQ`Cpq$s;fxu8c{(9=lD*ceCB%k`stWT5DF%)j^qbUD)T_hz!Iv$Jln z_3i2(wsjL%$Ls`w*u|3VrO7f}-vXCDmB!5d+fx~*^B(|F!I)9;IR2VUD&cnOVs-16 z19@uLrn#uUyJF1j<2n^beoz9*q;WTK-WEds6C2IrQY0D8h5YmC^^>T&lqY@IzE!?i zvtof>Nx7u^(<_WfYyuoK_3-%6!Gw$HL2B^H{b<|Y?022bVbi}qeCj>)95o*|a73E5 z0&*%vDHmQKzUxe=q<{kD2h^B#*U%#VXz6Uv>}of=nBxU7d@flmF&LUb1^m_+g?p06 znFTxeWT*D?vxLi|9}71BZBkrJ*=bJ<`fmI%2G2mAn*`z)6Yu`y`=i5lumCl=BlZhG zvTJ`(b0$g#KP;q|_|G_>tlyQxvg4u*4mRY+jsd~A}t;#~$zv{e` zv$Ky$Ls1|rK^av#mPbPfPXj>^9%25`T2MfObNdrHe06dzudka~UV$#k^8<5Q8A6x* z=>NtFHhFI`*!!T=juYp~rmjs8w>#yTjsMi+Oc`IZx>%rXz2}KTto9RS;=oET25$(C z@*R&FwEG4hvzGtzcXQWQVp*o*k&O+kkSbdEnYRk8@0eJ4z|O8E_e-Dn>gI#tWtN8{ z_M#eiNSDY(O=`!F@WM6w+~F@Cvz~yDx^;sz#V6{ACSCLkI+$H&|aS!ugA2SEEK zeFI2$dG;qd2A1vhZ4N`9)*{8bfp?U2yF`m8ecR$)!1G5yte{g(-96u^_Jqq`j|VnA z&gZ=^9xJ%|!0CH+N+Dm8tuJ4&FX-gX!0kA>dtHMNs-7fjgFhRdj4#D~`P!dcsC zJAPaDmPeX}REBS6w&_-#@qQ-N_5QimDS=j&HN z2Aj+=F$!+L(lU26(7o2_%eOq+UMiZc%E$BVJ~25|XoR+E1sPk#NllGrf#s4d;Z=^` zh0x{kB2&8E3A>>gJ*bb&rGOE?>6!Wg##E7>QqxS}f7?m1yPhaIR9ez8mLIg`-0Xed z`c!I4M;XI&yL^XF#>c#ap`mBka!TDFuWtaIP+zO|C@OEx0&RH~1hX<>@*5p$5#3cV z#u0lWDY=3*G)g}>oN|l+kA-suWE~TCM>%IU+Fs?-J_qJrX$w>f!IfA!G-ig?Mv~_1 z5z8_x!z{`Tw}-jo{`Fix7ErRtxqqunx#JKBM_P_WqV%;4D{40e|fDB7E0 z(ugt8W3LuLt%1Nf&}E0*r^K+0YqBjk2iBp0P&z`)_SZoVq+lmj9JkD zppk3ipC&!1Qp+X6jv@Y@;LPlO>R#6zVn0zefA+NqOv3N{{{5gwv7b1j(*4nyo%X4i zL2t_21Nms4AAH(YafCn*Zeszn&NEnbP}e~Gqoo&Ec5GuhcR4fZ_GqJ-Zu}Fu{Ev^x zgdb3Pyb#voW&QLG#m9vx_ARV58<5CtzDZp@tJ1&H)Ya8x;LZ0RztVe)8uC`0MwB|3 zk&SJmEiPMIyx%vv*U}AoAPA#s7NMan5ShxMk&Zg`B=}ko$&#P#Qs8XI*QfNPjHu zy{1`O;jWI3Rr;O$)43(F40|+tcplu$ zBJ!aHX1D=%`BjR}C`rL!Hspy!*7aexYJ0RQU-t9Z)&|t@PnG60|6DK~g5jq#Jm_Bs zivG`JM5}N1BOdzomYSL>JRm5XsXBSqjP}UU`NT29GEn^PTZTnh?7f_PlUkjAOYtElG zd1d}dz{BMFUNHHTVgPbr`!pW(q~CUPRsy|I35rS26AO+t#E$uTtj?U#5UtVkF)Y2B zfvzBy)umbTaYzWWeJMJ9D;_zbVo?*f6JnqQ_H1PqO`V2q z4+whYiIJUztfs>7&%>Dx`ohA%OA*7$B_>%ln}b8SI}?%b`i~m4wslte)2T|^R>QJ2 z)xlDkbl3!J-zCdRsg@l`$Y&2%4D`>?GxP|RN-<}mS!jzJ_Ma?6-lBqCE_4u$ioSH| zpBwZqar^byZ$O6ibun$qzF$w>8YXPSd+r`5=4hy_j z*kxC)Tai9&?oChQqDi-&=+102PZ>Y1()*;CdE?bBVT09grUF0RHUW77_pt}@+FQiw z)eWiyK|sQ9mv27!UiW*TIC&WQFgWe7 z0mPQTse`I4={0Fpg)CXP@_fBfLo=@{XFAHlB#j)J+B(>Cdh4n9$3qXv`DS0yl@o@% zjgrPLzXysF2RAmkph!H=uafF-0q*whF495I*c=IU1>D8J9uKbduvYF+oS=L2r&Aml zTE0;L&Uwd`i2v3TS437}lpN-P;%{M5AGM0{V+&QjTg;!p5*)otwsza)(L zH`d~AD~WeWyxmT)H#$Wlc;)<(Z=?Z7?WoR2!Ty3-13!-ybC=j#nA^IP2~d`Zudv#Y z4*fE-Q6wFbQG8FX&*gtfChGPFL8~BuOpFW>iKYz$2T?q zImCkKPlad~ztOZck{ZjV3eoBW_<=&?y@mFL?d2pT`OQ%azoP5w`7MwBP^kW*P-A(6 z0g7ufV1fG_ch#`ntdG?B6*f~1yCY}i$+eXdNi)h`C0hd?{7!7e0v*>^6&ucU3bDF3ik^~~cRPzZ;l)xAzZYx+yg z(wX4@E-}V(Ud279mqS~1j3f!PBw4C)-T#Zwg=hx@$w7k_ZiK|MSp?3l`9$d2D`{%_ zIvsS673c#7Ad`2-nTwHKV^VkDt2092a;&1kBd&9&+Z)5-{b|6`8=J}GBDv9z>eg=(?C13DtMsCfjI}xIbk=@bNJR9E<+e$8$)&g7~n84?2UAq!b_?^%j+iM)J0itOAPz04@9PP-SyVx__0&KmjHfYvp3{LdohXh1Eu zpbv$_LuAkZ)Ql{?MA+5h7sWFI9hY?i5XhZ?a~8J^yaV-T&JJEY4Ff+ZRip8kvh%;^rLUImzV13%gS)E$Q>MKn);%W^`P1V#053bA;kGri=-xbvf$8$)u_W88+KbI zF*sS-7Ebf5gjper26~vevXMU=s#@zk54y5{I>-+Uy|9cRF%pi{=FItMuQ;g45xG0h z|EG!wzG6%@;el3yM-4Up;0wg~?0m&6Qloc&Escx#fzk=PEq0-2tsb=XZ2W@Q9RJ35 zlB(Mc*iQQ8HS77WNjr5UQehNjaC0ol^d(5V>y%>K`+QH-2rz?5DnH*{MglN6n>$|H zsf}aE@q58~;smt@*LS|4Je}pgq#XThdzkUDNO_}h70Wdv1_ft>dhAJxP`U8ZJ;@?Y zOnw~yeHT*uQxw#UNuF+Npv$}K?cvCCgu=N)+n6fCVK5l3VarZMMM_5YVb;0I6ufP` zEhjOR9Ag75?|fqLT}=d27(erzC9L;=o*zJvd{{5xnNc8BRUTEat>fnH9Ok7S!9>Tk zaL4Q=k~_FAA$lLe$uE@v>sWJ%6x+@?#ezLcU2Wg1j@}H$PI!uHeJUC zbpS>X7GL5Pq4v%T{sIP-O?_@bhrj7UXUcpJ!IYDzdR-3az(qy73_;LVxJ zMNlQjHW1ViVV&q1Op?yUUHeLKIyk)pLhpa0Nk%^gPIdMt0a0i7t-~Hspz}encUoy_ z7bE?=HeBpu>>R;G!jKsXW4RXgSO>P~ZMp!`Q^($=$8G5PV*yA zp*JR8Zg1HLMhq6fmqyn3iKpYvTATa!Jm{Of^D{0iJ!NpNk3Fs~OD7Xb*!ggC4tco| za;FTU4!Yc9^}evtD_Rt^xSmiMMbFG?T+iwvI4T+MvYgW$y3{1;DZ-`xfZJCf3#GSu zGX*=Dd^ri4wBU(9Jw1(*rE#?ha3yP$c%ce>yrtpNj@bg+8+UtkJdq3QQ+OHV$P~IL ze07*p`f<%Ctei9GVoWUSigvfBZ8FFMfc41ah>OR0+sNAdDL`vqr;4JWtmReD$ZLro z9!85>Z;QSdCeuigf+efwkRBqlvTvX5AfkUN47w)E5edMTUa#P?=unhJOSj?{;!VU? zC{xuW;mnb9lSZ_^JKH?Um9aU*h95e`0{q-@(WIr>sO837YHCC)!Uo2Agx7SC19}Ht z>Po08a&>=U1=qumKFMf$bEDDLntk9oY7KjDR%e--7#`#jOs;oOvwoq<3l#9KCPV;w zS1vJ&83(wEHb&XkTExP!6y*FSf0C!CIezb9L)-ho#VZyaeJG^Jw)3-S)z!g*w4FWP z#@0Ff_g)Q;NO;X^3TdlYd}_Uii;|pZ@`pY}AkdGHv+V&rFW{EcB6{iaiEx0CA=sOB zLiCDuBA)t#HBhx2iBFx(-K#!SSB7mZyK4yw7&uondD_GBe>l`soUC}4ci0DsR^44p zk2%BdHYfMCMA%-e+6={!7+C7VJewFZKbmkf=zL&iDA~t#rs%RahN(aG=LcbsB-}6q zk92q{vS^!92G>Ohnml)r&(=EPFKQ^7d{2?Bv`0SGd2TOVY#$suMeJ!+d!J(uSP9@d zANKZZ8+Ba-b6B#@tj+w%BGn?Xa=ALQIGZRaq@R`mglxSy@iEXw z6|GK9FT`cUac#6m*65oz35rE$H#(U*e3ezIB?Wlm)5%3@G&;DAgu#tKZzli@RwUI% zuG3=Pn2d=ybbEVT@bdL#2@Syn0IxH?ht^d*6+vKaEfyX?$JnrE=UPlrS=sbyfZyQd znuXX+6En}}HRzcJhT?x*UiEf0NrQy8c2+&3Net~{whQ>l4dAs0@Lg@6wyxA17zv@g zZ+x>lws~;C+y?Ejt*hso>du8LNJ(lO={0ptVg4P}u0P+XcqVahRJ?VTn-cdXuIjiY z&lB<>EbVhTo-eSEh@r0cyftyLK$I3^FSAd}l;`uh+1|-aAw8Jr!NjSxM#j%%LynB( zURqDc;F!Y=AjPY@!Q5JN;{^AUaQx=`jYg4%!B=;;y)^6w;O2?CRV-UzAGHh($CFWS zpaGUlZXG~=W`(?Emv{w$1Aa`??-w#x_CWMDlQdWh>Mv@Lf{9ST~?}-j1k+Y_O{fcOp+Tt5 z@=;*+6$86$2{Vn&q&a9=6#;Luqvhuczt?kBL^8r6C-uRpni zEerg>aGYr)%^DFAF%3$U(cp)yOpT+?WU|T1PHy&V8~3_R=1F|X@+-Mw7;K~t*Q5`rhJV15@zl9tcLa>f$Mc_OhuX|W^lM~{He z^53<@@;@uAznsc3CgA*@aQat^$0znaL6LxVuNM>)Y@{%%6c%hvSDu~Pk&Ry6afvjB zp_?5X9Z7k~vC<~5^LBd{#Vwb*vN`=Q<*O?w0b<#%_gv1f2z=(qT7}D6-ZYe=q6>hGt|vpdf0b05b}9Gvt!fxr#VB@KvZj+_9@c9(%ECR^*w{?l zZQiBYN?SKzT|^ZZ^R2ZuMirXaoFA#}4S8(Qeic_wG=(lkh9Tx{Wep!9Q0Vq3X}+#>vHh$4JfXywvjsitlL4@y!3z|@AY12K-UN8( zfSL02R4Pm#?v5fUno!)pKo9wR&p$RXUTE_=vq8Cz&pL@~Il;~J^apks7ST@NS(;WgJu(c}k%TcgAZvUGs_JT}rl&>U%aehh31GZ2*sG)a}63q|k9EG+-|8BWpjgfnj z!|6csHW1+BkE?W1jgl|vYEFew>&B!Z^qu|GCbjdlY0EM43G-{Yj)8$}C2f-3cPu*g zC^@=+07h)aa#q%+ue;<{*48CB8kO(#A zQ->0?$=H*%@MaDKNoV^7JVekZnL=yWSKo_RiAjhY`V2m`v~CJ*=r8+FG|{y>JHjoI z`hP^UJTR#KbWn2Wj7=HF*0C)x`#ot{H7O-)Wnmuuhn{yF;9U3zA>YmLsesKOD3m1(i0#WBPqpXDaJ9@%{n^Q(NZZ0FcITXP%a!va@D+6SlZ zSm**C9|Pf}izB`O)pJKo${y2sZ=F%Xp5);OrHK@NBDh`rl>sZw{ZO!{+pQ!Md zTyggx&f`}=7V#Hv*<(Boo-TU+^n)sJz|3_`aDrCMX)LPc^tQvDE~KgEYCC&_qO~&$ zn=U-5<9Pr1Cl@{DjhJ}ndQu^ym4gSu#w~Jc^@ zB3mfSne(ugrF7B#`x?N83X^@4_-|P-?k4~57CS^{G|_)*!l9&ZsL`VM-v8FbjSNn5 z?Rh;}h~)5E!{D{PZ<%~HF7g4}m(=U4cc_I4?ykv$NQXKH(2kUuGF@^jiWO>NE_ls8 zY(ye&6gG$h2Uo6}i+O2GYGFC{#&A@`Coa7hM7UIHn&D-TG??&x+_Y6vU2*WD0Tnr0 z>7&Q@f11UKgCv%pd_yuC#)o>B#nA*+Ck!vgWVL46aN$PVecp78-Hdh&@=**^3OMwV z!o}$?UcWZI({0#3J6NLJ{T^FJm*g0~slQJ#<=KEY-S-kdiv|bUJF8ccZzPe7miLCFKqsFMRK?}VJ*VFdjU|>WA-JhV3baO z1S0I3t*&~Z@42cLym)P{Z1KeZ5(x(zBVqo;1c};OGV`^JkoE%JQ8=acE2jg*0_-z= zoXZ!99z3yN_B*lnFQO}u>{~?Y-B>g*+`rn;CTQ8yv_bllQ}(OtyVi<3dsKADPpKCU z6QMUkvA_{q8hX@_C7PS^3j`wXub=#A2XLL|f{6+29{f_!`kqm#anMA=tDtXc=%wzQ zg-gR|UA8)msl}(OPY)MYX8Y3?=~2y$9oS2f9?Ldwf_Sl}u6-B7{2kN{k*|PWA}6yD zTJI>E&j*J}cp2PERO0_keE_7%4uUy=%fIu=3oFVtuPY@;R{Bj<#L^Ge4gb136@0cY zZd)l*E>dWPfx*VLsJnh4{Q(6-OT?=3xP326rZBvgP6cFbBi~O=!@CCO3_Xu*t3qH# z*p5-1aiXnBmMn<{e10DXL zO1}Pr#SkVSmzVee?q<400U#TXQxfGze8d`+k2XP=w@PHmyrKn+>VN(sEx5LaD^f*e zd~_V@AJISiGuyUvAWa@ zhPU9}*yM@Alfo;fhB9-Pyl(l%Rp)y&c$1zyN-m6hCm7R5^??#IJLGVTz^egSgYBmp z;-9~bU*2Q)%}UZ98HOR*u70c7_1g-1T>PpLA_xB)lcErmr^|k!n?Ek9iOkvg)r$sR z)YG$8A@OlpWGV8=@B?0H86Q_)Sdu$dcz z73<3090)OnnAKpOS$*@So;D@Bw=U#ADIF1!-Q>|Gqv#?Qn z-b9jJ!cU<}X2T{mSJnFGPqfYKxP3ri;id3f#V+KeNoiIUbFTW3{T2^Qe!0z-u0A_z znn_M`9uWHI>FXIRqv0^jPK?e#^G0)of0&UAS5@W{tt6;XHv) z@~_=|2K7sn&ArgT$;l*YJ+Igf9rEO6@&+(+F`y68q#V@8AH4K=5e?Y>RBpBFV?c*f zW!gH&l38zFfAX#OVLQpJE3%D&vo-)Ob!}Ix1j`X4&Lsy*V>@O7zPILLc}XnU!I=V> zb)WpAzndwiEVR|0xLDg^M}aaS4nkyTqr@1HJgCg7Q zaR$BBZEr`u@Wlr+$@%UoryW<@zj60Dp*L*^9cOP8<=g}!_T|*QD+Ocfx|5Tfoys4@ z;fyqLC9y~)H%lH>W0Cv2LBF6%-^B{A+|-=No40#adMNG$nF-?lH_PY?ZstvXwnW+r z%w19CgKbRIce7~jyE1SL_$^{X*U7h5o5q@yCUgb`K;CZjMpx3ftZQ5UH={b&XD1?a zdyen&RE)mcq=#|f<};=iv#wlA6t6361~-9)bjK(Uir=U1P zmP?|=@^;{ZNQn2x3~LLvSp8U^Uo{c?t>5+&J>Jc(P~dx+ez&nZABY|N3QZqIid$#x z{Vu@bG*>kUJP(8GcQr0kvV*Hj-T6&URhu#w4su=79v1rBfO(4E(gvnVc9Gw9m=)uA zb;XK&viufimy;r8q=sW*d#)J zKPnLuj?+a2;Gb}1d8OED4ob19$v6Xp6ZViZk`Fk_e-z=_@-^@k@VCeO>Na%+!9Eha zhrqcfHYsQix)}hWCPkj47`1RIhhri{W5r5s{w&e40cbh8^^nM69;eYgG@I%ytR^B9 z-wD|TWS$Cc(o;NlD@6l+cdjY2-cl{9a#qbYF^peW$X28_QHL3vZj&mpBLS%3X;Y)E zKd%t1G4E&qTOMvc;sZU$h44M%Ej6o@zt$TS{0q6vUCNy^LKj1>v1@wBKs4z}VOJ3= z+F=v zy|tl-gdu}sFHqIWrOwO#L6nmAz&){$r7**2(lk&k(P%ZKV9?9Rvi{rdE+z3L$LASA z&LgrPvw@%B48Ysx@=aCR#YMom#mE4d>4(s-+}z4h)SL(a;1UT%0SN_3?&krjBKs=z z*_+IY4DeupuyGI#R3TyE*RMmwXGRDe$7|yujAYVn;??fi&E#45TzS{SEn%o&s~6%e zDHV}A)2Y0$MgN^CEgLc|_4<6xpvUBnO}K?FkjjWDhjF3W<(vaCkVWagwg7={ZdhJl z861T4WY0Ez0l$=e^x)fFs1!6b6x;uMKLXy|w(eTCp{?DNpVrU?KyRa+&@>f$~sq=Q60|` zKpPcOp!?aBcV$$#$;efFp+X%dzjBk{OZ@_}6rbSr7EnCOv4W1Gka0kvxViHMlY4LT zZc*@y>$lHyeTUtEjm*Z2VGXop9el<~K3d)$RSzM>#eV(t1sC(OxMle1;+&+t-&rRz%=BPB34~mn2$pbNbVVf5;ei-`fhu(zTF>cPQlQFjz;gWT?wp16X$`Nhx7XjzY&DxbTd`Y~X2WRO zzqW#YtJ;?z-d*kunjpxAE!@)car* znW%-cf6=XX86Mug&8bxWIBJQlFs$=e{#{gPcU6DN3L7mB4f78fPA5WwCNV8Z-C z3ihS=>W}zQ)~|S9lfF>ut-OW{qIsw&9FU!FFRas$NG1^cRjUSa}$@nGq)Tc;6$hJ2E8)SHkrp~A`_mfe7yL?xvTDJ_+!z~*`nAV z%f}2YE}_v0CD$I+%(+3iu=Jgm``~J)8u!~3wAH^gM=Kj|xMyQ8hn;-XJ*!$@ym_|9 zYc-+kbz4!Lbw<kOi*eXai-s|>k>-Kn+EwD&3(k6P4y#>G({ zs%UFaX*E*Hv-RE{{Pk0v4przaX9p$-Uk3fd*23`_E^3R*AbWXzko+^rbmmF`oIp`1 za!@cf3UznN%I6qX{a2nz!n+&g5O%BH?rwb+(Nc6Drj_dEH|@8n&Za7A;@h)cVpB#bJeTnNvVLXNW-7b44MrMBB(6l* zgoZ?~-BVgR&*7pP?&F}y1oiJOw`R#2mZWsBatkqQaLGL_1`jc9{ zfUq?-598jE&*REdNQNF#?U=uK(|V;7uSSX`oHMq!q+4RZI{=F8bHX_>H#UFyNYR_v zh9OPGSob60qv9%IH6wgCxg88fZ_^0d$~+_OxNsogxa*ty8Iu+kq4Dv`m!?V3JLfH` z)XfLmtQM{EmNyidl?iyy@eCZdj8nMt5_kD{aOJPJ3tMlq2uN;pm}m}Y3vC*;BLC3c3bUL=} zq+{L6IrqHx`|*vjM~xa)doRtoC!e+EO4|4A*cAwoM?sG<5M5{$+dP&1(k1-kw9wsi z6nGOEahH=qpi=h0Mr036ZHDmUQXGmC(ioobQH>b#(2`<5fZ?aac4?A=zqAxgQMUN; z*ipOrrfTz1LI$D@t$`^;aamyF+|VF#oqZeg_}&WDKxLT$`MIbLd0^FN4r>}^JBy2O z8aPZ|?wk@J$6uLVH5+{5^7rKHzmlRc?bOt}eylZh+jRz=KTWUDYd!I2fiA!r!x5%F7A0d!&rVZrL*YUX=y0^M&W5Z(ekE z*B*X5yLng%y>gz9Iq$$1;Xj9XvASyS-t20f-CY&WVY=D_?pOcVJE5TG=!@>#`4l8k zs2;uNiZiaoRu?~D2*zpF(L5~)!cX&IPb$IW*Yt%$B$Ar?zXe{BToLY(*Q@@t%zt?j zlrymz4?4uj0;4*Ip(3T4se?pkthsn<<{>}2B(z}nu}BmgD*)z8ju@kIek z254)v272~#Xp*|;(P&{*uyI%vL#5Rf273CBeF3X&K=>dg#2@!0etzZTo%Cns&c9-q z5ww*aCqU|)k~2cqZW3EXm4N;;a#a{_2CRL%h|wM{5%{Qs+=lz(r40IB@k4M~w&>gS zA)EjvbYJ$LCipG*a4Xu#VHt!h7-(9XPY0b#WVgZ*dA%O=CQ|!0?haP}+rknZq!yYY zSgDh|$+vuLL%pIrouMCbtsA*jALOkv6Z&#h{relcSGh#clOUS&=Pd!}aNM3sEN^$? zhianJslWDH4l1SKngHH+qE0XHA1v#eevD00sK@vc{O4y)n`K(?Xj>VJh}w-H62J+LICan28EO5|B8vLsSFZtu8_ z2=p&e;?6W?PO(vdwe!cX3@Qj+e;h1fe7%*CD>B!r%W;MKg>4w&NpFT>tQ5{L5^R|v z6@^|{^LX8Dn2t!ME2ArjpF>|qP;$`%33M(Lc(<&CRY8(jH8_wa89f2_-@$6|048AJ zlA^zKx}3?G0z9LZ?AFmfLrzObdTrM|kU3?U%a!eR)!Dp&N8&H;iY{s8k z9Tf{J9AEIvs|lsn7f~;Wj-^yTAB);|olsv;aMS{*upvi*v_?hM!O>2!*E(?oG{S=5S z%x1|tjo$g12p~sG)2!O+tR)ppE6cNjG0`I9-moM+Z)@qa*uDsbE8hzP-@}W=Jvxpy zs*#YIcXK$kgB<6PD$?fT+wpj}K%I7x$Zuz?nn+emqb_W)3Bu|my)uc4AX}#XqZqp1 z5p(Q{2Z_@QZ3POmqd>O0hj3Z&YX@Wy!(;$G=bUcii(Y!XmooeyAR}^#{ z64Am|c%pQ1&#>B9Ou<*`1q~=|x}Z6x2p>!9CTpIP+l;~rdEkmv8S<(*Vn2?J*rwP) zQtc~ttJUd!8ZJO+5C|$+Ivi3#>+b+CTJc{9@Z6lBBrfM+6SV&W}>mdbiZ^AJ!&S@u`;&7P~G{zgYVQJ99 z2Jm-h45@Cw^(avq^pCLktxOqJSAjWh+~njQ7REx8DB9}M@2zl&9)N5At=2%Nbjzy#Bv z*vmO$h|{HkGmm0yTjTa|dw@P=oHCCCOmS9vw#@4b%E=h%r{@Sc?XVXiesv+n9IceY z?2=c>5GWHAyB`_oGaIsq7b6T#L=>t`~|JgpYQSNMP0N@U|r&vW8EYG%O}NItn-P#GtloS)z6vz!BrEA~6NqkBnIz z$6Xl1R3iX%FfePnm^NY28|9JN5@(xfxVjG1qck+*IGCR6RRzjp((kzt1a&%Q9Y>O8 z&eh~ue;q_{Dbi6{q^}s`C0iFRV+g&#M1vt=Zr%&QAR=@uMY&ty(;U~L zAuT#|?CS5a@c;5-G)31f0Q&Ec8$OXvZ%-qv;7V!15qALIs^Cm0P+)qP{JhI9K4ymB zg@Nv1rYC;}Lo@mnPoKwQY|tPOxe?y8{);rl793%cl@_btAPQJT0%K2|A;~t+o;l`{ zOX9i_Ar?VlSFm24)r)?^M7KWW%*2Qgzc^2A)uh4=WFqjpS8HH(A z!SlP27fPG-Nal3xM$YZ1i#@9^WP@AKX68C`)wF^cTz8#?T{56H9aSxbBT1UmMvB-n zR89rykBTU=JcjmA#|RXRT|cu8JB157x$*C4frG(1=x7uCh%`VcBD%FQ<307}XR3h^ z_SnQI1FB$V#5}1$^^2Q7ZAeAuE_}={=-4I+N8Uk{_1`G&2qr59M{zLdYP4UiOwpt2 zjORlVz8mBTgi1n9FeEt`(}u0OOFKwFc(n@~_V=Erv;IH~3r}xxs6f$;6;>_>d>!qp z^yWNp##Czw4NZ!zYKXR)k-0E$`3sc{FpUiYiD?Ywy3)hXkJzn zn*nwep5Z+w3}?pQIlmL2lu66WXL=+h#MU5o)&~F71+7vbPO@L^98f*F~i~n}NVF3s26V zR3gmSQAQmQQ3lSnomV~66Mt4g;K*!0^308Z=1j5HrVPd=tAqW$pq(y4s1xMXB!}#e zMIO&kjb79Bj10y(0gO*ARcw@OPmwiV3%lM>GHt(uKe{afZ=`kAP5n3pb}&iI51j9! zrCpKYI#S+2plYrPPTXZOVoel*x8N}N^44i=It|6HIKKmIpHRN>8lr?H5I53F&6Dp^ zr)FHgD}jRNG8)#LBTCATd}Ec}IARS!NIG=9T_AYfkwip$LdTco)c8tALWrv^`6*4% zm9}_d;l`Z=3(;+nd&?cf|3JwhP&iaE!6vpp8We?DvM z;Ha!mpLMbdb}ILX>-E=F?pEh~+p(Tb+e*Ydzz;P^GPIQ4I_U^;?Nxc=LQo zYyybLiUrXqOlY@soaAv?=Cun&*mwUjBoLODM>iYoE3!6~Vbp5j)DEG;W`xfO52RV; z3xiv#D*ZwR4b=6JImNH!0QLjUmFsCP${C~BU8XfyD5+2s`3CC3-S3V#?n4(_!S?CdZ<39RKjz{Zb^Mo{q1c&YSx`i+nV%26P z?d{fsAdP|NpoHI`NPVwEtq`I>71!Z+te{p`ycEse%gYo)HCG>I^+A)~K`3^cBuLc0!4)SA_eCBpCCUx{guZbs)(z-} zj+pZ1+sFQM(jjwO`l`0C;;t$;U@S3)T@w9!GC0cRv2{1)2s=fTaKH(dG>y~-K*ie( zo(INsck_o7?Xc^mHU3VV>~Z5cI8?vBsO0G2AQ-f5Cs6wd6E5EAXxeuzm?t}H$9c(K zHkuN+{pqOy+(85s03}0RPC^BZv%Ne%@Tmy_+~85n^!xN3-m@Z}t$`0zv>J(tbYqN| zsU0jPkWpmWa|VvFfebY*2L(pB!sr^hwO8Zio)xJDrC=JBPUsA=5fpF|JaKOGee!~1 z+Zi&y7}Z#G4@z+vFBsGkW_9kg@X8Sx*BQNZ0h0KYZ9PjaFx_1l!>hX#DhvEf9T>V| zqbM5md`BY|OCzf-tycYpT`gn)DSWFmcT-B6>0w4g5G^XZJ&p+-{efyTwV8B1bzSsZ zPb{{5cBcvqep)IGabIoMi&R#F7m>bh!lbTYsMb;-C-bAj%ec-G*7Tq`tW|b7ROq>5 zHK8StMah)@J#K85Sj)yNP0^uGhR``S{lUI<0`Hzer%}oKRk9PuKsBuJ3>F<9irgiM z0E=jy&d{x2bRgKujd~gX)D%(5+`%R`?h@Tm`T4{V5Xe4#h-f$MguOK~zQU7j=-C+Q zUTtUK+Z7EZyR}gkf+vkh%L%>%OssA6mF;i+Stm8Rh1Y=|fw9nu(I<73!dGgdVc7hs zaq*+1j>`rx*j!#c?l&4-**=p-9})6}nHDw?w3 zUSb)VHg;%r;zI{?HF{U0_-(P)Xu1zZzWWvhOazJLZQ4bKOJn?Uip5NC#;C4D-r#;m z_twCW{W4yxZ!FYgfnPKAxJ4eq9^1e$G7FUgv1${kT57O1V%2DVK8KfJe1vrtF5O7Q zP>>0;gBg~nI#%~FgUoJnnJ7a#za8mQd#Sf0|1I3ixGbq)6L&%2r2(el!{10cpqjvm zR4J7k>W%}Py9?QC5EHmA7S|y|xO!_>F&xUfi1dh|w}~D(>^--gs;3y}3--p~)%3&2 zwnD`$>eA&O`0j$$FV$BG8HsJSv#ryxdK2SXRjZV0tavCk*e^NY{k8Xaxoc?9X*Nr= zr}YeH`@OUAVRmRpS}b7hiwvk#X1M+RQ|@U(Y39=((mHw)xhyMpc=f(qP|ljvdTz$& zyN~lBLQ4soixMCLRe5;Wt}tW{x_ePw)b}aS1snOT$Ap%Q9yqKc&vQaomQqUXmaBv4 zr}1_p=Sex{w?4O1sxOS9gf8!OjJI;w+h~b8xiYP=ida^?ULIe=p~@40RqaRW>9}Vg zMdcVT4eAX{Gw(Kwg5xkVXH{L4nx7jp@`&%PMXXtJ3IqA1I(%5KP3sIVwI7F+y;vK~P2!C~QFO-< z>Fyn0^;QDRW?er6UtNZGz$9!(>Co?#-!mJiy;j~T9J&L4px`y>4tu263*L7oKI~T$ ze5}b0s0dxszwk((HLl6w+D3JuUCnl`o?ITGOW=#9xhM3$`aZtD#Fj$-;W{UqC~uyf z;~*AOHKz^8wd9=1nln_2{gm3<$Uuk%s$wXbfTGWnD7cq5S(zPU_HPunPViqf*E^YV$?_|n6Ut%xN4wtwUG47 zP401I0gWj&nGrP=+A<2(m=~cD^@gyIp2w1|=c!;{;0D!l{@*w95k#&3-JrsJ zNA&*_y!?M*%pfkmlur=NXZIw5HcJ1_5)m!%mn7W(fIHBVDE|R^AZ|Bc|7)-x0;o$q zpM-EM&7*|-cai&pkx%}I2Z|T@4;l1ZxZVO7MFKXDh!H)C_g@oYpvD{_QvcngKzw2^ znrPUu^=T~uFaALVEQWu_wk-m|MRP^%^?&)4pMy3O<?H6eD$`q0_mWdy z(gbK3-3Qq=pr3>aT+eVS=tHnUBN)68Fq_rTD$Cz4lSK5pa00wvQ037$0EaNVcSKkY zx>fIlQIa!D@u4|iN2&y$tzdRwKBt{SF4|LTt3r!`F*wVPAhSW7)B{&Q3~~K;E21gG z%~+3p+ErI5gDO6JxD-B|IENXS_}%%|2hz_RA3kJ&8_G*phR(o$eQ4TzB>t6Opr)qB zxPtPp2}B$mAly=P(dAhZ*pJv}Kg6s?sb2>SkJ{9ON^G;q#c1evEQ>c9u-4co%X`VX zRRcXM-#@96L+n(-rYbIWd!uoZbtokaLMuv@qt_&n`xXjU3?#XyqZsl)Vi1rc z_zm~IP4DZt>3A^V>o^HW@J}o#?L0Y)k9b8{5<5yE%SS#}umU;cnp|;b%5|F?F<541 zhX%uA`y3(iu({(4ZP~{w>b)95fqPkgIO!b3^#F6=GttU5FbRoK~X4)wi zh@P*|lZmUm6bsMJy(PvU@b*~~{Sh1E?VLL;#Q&N##RhS`$J{XsckTl03r1h%O)=;1 zeZ6dNownRx`7>XEom1$|f>7?3X(9RpcF9~u5q=i1Z&c zg-RMQWPmzgF7g&`^Set5ITxXk^lu5LEk%>LQ*N;Z!feNl6pgfMchrN~QT$ir0p%!r zMn)tPD1s?qL)a&s7gh0$FJ3*UW54$S{%q`(TrqZ;M@GrQLo`*}AZu5i2kA)^(Te!qyxJhq1QOOI9 zN#_j3$ornWSk1sk8)#lSAV_b(d}7v_v|^ejez(M>U*XoJs3{SpZNZXU`d zpJd0mZpiMKKh`1;aA95#FdP}l4%qb=npC3qyvN?SF{H!Z z4jbW&_<5D99i2GXG;IznI&K!0a=ue)R)aSokxXOU`jbhxL)(L|spBwyJ?y!jQ}4py zS}?bNU+Ozh+B`;I*(!a44zCTMi-QxYfFTQTTyUMmP~&BXHRA8hVUW=!h6=Mrd}$S7 zg}wl4lXw5pxPw15AzWjOyu%ZKS`O>qWqRzBa?1{c zp)hJ%C^}D0LE~^V7v^%Y7Z4#6uR)yD4x>}<$||2yo5XTa0{J%0+v}UZ%Tx{kShHTA z*dk$d5HeP{-an7CGQs}pxZLY+gA$wV0mkQACBhwlra@_J*|pOhTBTuRRD=c!(VDO>zwNIj$dQ3K|vm8q+PheNXQ1GI+P{Pk_h2W_J78+bu1z`RYIgb z{F%T~y(#J}#dHrgSF`b0@7Qo_tqGyZJ4s+-YSyl|xxO@?IDJn(#aQ!4B6-1*h2ckh zOc0^j3ub!l_*;#5(AJnCV&Mu(^Rf3G-|L5rdTzo&l!0D3wF-)&?Cn7IE5FW#Z`GC3 zb`CW}Fk=%(El{bPA%2<`jzpZ+u+?2+j|EIw1@N#dNh5FqG{~AtGB~VWCDwWw%Ej)w zQZO0BV3_=jWLi!*jASO6O(LZ)1jFSo%AEAfh8e{VKKXPr7JRHBT5)Bg7%d`f;U8Y1 zYW5IU1NkL~D(EplC@$Z{>g^!^|-GQfs;X3otC=WVx&$^cRsWyHW#uSZq@`T0n+ zkmT)we(=|tO32^l_vfo2&BnD#alrI= z)gc@uE?_u?GJr45v6+SdDh(N+&zpdzLT5STl(i*;>OzHG`F5dpRLwN%lCb>OYz;u9 zbX;8mBEKNKj8L)I(>jLYj)sJmHvGzZ<`PKx^*lx(KIS4wzqVK*fsc|?wsOh0_`=Mv z|Mk!TB^vUU%v(!=bEkxw1621xDMPOet?|yIfbJ_;J;BB7mioRes`Ayo`T6*3!EW!l2oqB~|?%EB+}IK8>Kq=p})hJ1HnQh=dcpt3Npt zx2cJZPOM%BcIxb~iq=1%C2mE3&B)4v=Oe41--!#*RQ$=#H*N0BD$OJ>q&yRs6%NIM zCr#kEY`>!I%S6km)}A%zFze{YJi4NN>IJ$Yp?sh|wpKh(1S3GIFDX}!~RIX3$v z!`I4h6KHdl64m@8@nt-;`iQu4AR|s4C@xGO- zs7P{~G{m+WFb4ISJd|Wf(G8~WYR1o<9ln~u^jbBMiwahm^?PL(ZoE8LUt8%mw3%~| zf?1=QLN}kYl}X)zNgS-!*LWpWb4FHB(sDQ~XP@4*jjVp>*21#$sFe82$#f~3V?Y~2 z+xa&b@v?D_nyYk#GSS(aqdEs!bZ()Da90mj?P>Q3xW_NorT3LGR>6PNc!Wks@arB> zLBdD?A$A_ZfnR?p%u;q7mL`~nUT{HUHzs=7x~Ln-7n~_@ zeFB@}=hgP0nf7N^-tCFj*`o4*C|m(up-aBHUL(?!z%2OJp^a6?U8Z~*aTM^}g$uEx z773t<7Vg`xTAAjKJmZ^*L}PTqkngvm6iFvkR{W=ZEkT42V;+`X^ryd$!0f2Cp94QN zub3}>I@hqPvsmZ@Z&e+#$YkcUysgu;z5MgyuhN3QNr{F{1}7ot23LHp%^v69jExul z8)XrQ``8rKX8EnYPgn;#5I|A7P%I>&u$E`id)rIR@%jb*!dC)e)2H{I5$sGMRa;ClJ6Xo3-PYO?iw zoN150)O)=4B4^a_s`o&IdU5s_$F^$pylUoKQmeJ}6$v{v>pc=0MriZqT2%agP5JTg zQU8!5`$Om3k32zh5w`j|4^ZlONq3~<^vurWH{%yPd!d|>(Mp}^3m1DXg^(S7wje%F zDy#dmr>IhTunBm#04H!!TDBmbCc&eP6`6BD6ZaBqj3%JT$9jhz;!QPel3 zv0!eRcHTJ!vA3*w|8&fSKy1OV&nYFD#%s0qv%Q6lb%RIgSV6cu2qE^)QFM1VGlF{f zeVED!w?8=b@>0lJgKWHSM3DKQz-JW9-<4;R7LPA*HTbRr9&U=taW;mFn9i608tKw0 z`&$wP?i=r{cs=d-3T*-b=7GuMdHZpaoZCw+{ z!!4by!(EZQ`YyXk!w5Yr=w9lbHS;xh(+7m5$Gol==lr-U?YA+ar`I@-CwHTKX}uS*hwj^JqWUZ%ukQZt?n@5; zGdF?P+qk8wOR#34Uw&inzMIa1Ry-5s(^8HRaFkPG2pn_M%ArT0|B@}r4ZnO6>U91) zMq;1M-Z%c!9w+!a=_Tv zn3!e0!{5PG30(Gx_i&Y3h5?tg%x|yiXcWjxxF?(KY0|ueF%CX1!Ns=5%tAZ#OAe&? zC#hOhL~PJB_(@vmsx)WozbSBm3)UQI@@W3qi#y{%qZ}n#k|_lZa@bHiaFFGt!HtC@ zfo0b|+|%&DSt~h0#c9SPie(G}2ct6xueK2iY~h~{I|8dn@l<3#7YDfVz>n_Gy3#s$ z993CH>?*|negw8TPH%XTg&Sp#|9DV|y?6Tmd0=VmR!3Y`RrOB_wUi>d_j20*`%mnx zE>g6sjyk>_e=rJ*Nn+mp?nG6m)d{kFUCt;8>f6h(dRwK^tc9zy{S14|TAEJJ>V9B~ z;L-7wALOx22X%v-YyR&-tr>Oa%jyzBxOtA#XNp%i(6L4`z09SjyXr z4WADF&cywKdO=Gm(mB7IY*?FO{p`fAkU;r~4W&&k!O&`DOdLtmSk~#^ZiKGuW7b!V z55Npd>Uh|s`p7(7b4;SC#fh9<*DVX{C=veZ!R(-PR)GVx^b{kA?r!bsiQsHPXfs0Z zv8nm^4=kKW+Qi`|pH11YCd=KrJ2=`1IR%tTG0w4gc@tu_RMTBRC=+xZL|tFV!&IN! z%O+jq*pDj@X@)IM(Iuu-U-ynv`+HpeP_E1v{9Neaj?NqkKV}%fFvDg2L#GWNd|>S- zZIo&K;&3$|4$k1GbA*PYQkfK9Z-qWknDo1Pc6Pw(pU@8vu{5f=y!Ge$u@2hlWWiW^ zl#?-TNK?-r&z6<>{omp3H#&NqTKmk}VGL;bv3i+k3qYv4Z^cWfn(&8*rMLw;NvXJU z*2c@wnFVvFYdbV{s{P*(A1*(LsYb6`ejI8@l!F~AEH?6oj(Z$V5xlN%z7bq(bkaTO z>gbHTLA>m6=bG9BX3!^Kkm)0rR_r|kFL}{Pk_;Oyua4$%A95HRYByjUb{XKt(b3}h zIKLx52Y8~a=@ z!`N+RMfqRVQ(<{Lf;aod80q9=$3W~|cV_K6nJhKR<>+(AovH(|tK&R!v9uL>_ScWo z=G@**39c2CJdui3;{;BetGZ!cg??_s&6F+g^Z2uL7%5E69@iyoI{cdX8|)6PVrpiF z@AFay+R<<_)p5+-0z-SH!PNpMQBdbo{i=vh;dv}ldIvwCdKQm;a!p_CUEzt|bHJ{l z_xh$K9!Xj926u-T4bDgddlnceBkST@Xxr0jrX$`ef8o7e^&>s*0!b#H!w+L%M~cNP z^HS>Gh@Z%>_HkhU4%KYGnXuMx`!g1>OW^%?uvie& zfTEF|`}Hp~P{0#)c1WGYiqD5)@VI$+>e!g&1IupDYNL>Ze6p?nI`l7^*+=3vH#M3%R+5?v=Hv~ zx?89>C=AO1M+gFPNFuDm8gkE76A;5xQ$_&IQoWwBYyYtg)%E_2y*`Mz`LQW~-T(0b zd&*{)i9cTv;7$?}=qS^U*{(__eD^nsrt4LH(P1}}j6Dih{^JRr>B9+dULeUa$&#Ty z0$E||sp31KlaSCW=$i)TMy$x{ zG}M_#2XsKa2AFn|Lq*Z_?({3;w)>b-ZT#Vs8CxsycDLIr^c5X@SLE=N`=)Q$$7%N) z*XwxqYm^VC2NCK*`gFVNDdzjQ{}a<=iT^VdkKf{HV+R(f*;p3QJKv{dzO$}a8g!8B zk}jEL;ml;n5%7#1G>R~)Uxz)?pvPJ||Nf-Z#5C~$2$Anp3NWt#G|4&}){pS>`#obL z5%TvGO2s+4-Ai)%EV>DKjh{F1f%-rwtwr!JSEbO6dhzq{U>fM9gk+snsNU!Az&ytJ zzmmzx$uVckB@z7fBBkn)PftPLLV3MDJhuyrx^>RV&Ngh+8r>aEWRa`R%4>HEye{n{ zw^z*THESHQ(uFHcmzP#C#at;6P*^_G(y6ej!0h>H;b@z)?d~4SJcegd)$7&T<5US^ z$4O(%H=A|4Jf>Ue?r|HMr4zH8-p{44E5QMEgR+OM&*YwF${{y~n`{kP;j)o`ZR2XL zF^98YK3qCPASs2YUQBUQ2w%CmeYeb$QPn?!G2%oeEPd~b$I3O6@2g|%!XV~1H_F@Q z8MQN4NEhIAppeatZcIgQporlRl6X&-THT9yn$4;QcJLii27<3i9(t>FYVFJJ_1BgA zuUZqSEb3vq;M-r`cr2@n8RWtB-2lTcF)Vx2I*5UEj95g&aL63?jF2tPn#(92Z_mm6 zp~KY#Qa5RPzGV&~y@y1TaSE6eO@Mv5sP4plh5=~San9YIBz_r7WkuowC)=& zog4j9{_6Q}c0QZt=eG$v!(KyvzuucDHx<>TbE{=|@RpayIyAawGJ6Qm$&jX$m8OJ5 z_Cz>tCUy6A2UOTwmCJNTY4c3pbdquA?5W@EjSa^mxRb@sKDT#V8r2Jrz#3fid=FQy z4$OF_m!m-emB#OKlJVoxdDCijpbPy?6%7ZGqVG+J3|yHBw2`Ph_MRc57SY=3(ys?{ zL5t&4|s80)!H3iS75v6xKf&7DB6|4;t@?F3x}m# zd|C4ZoOk$l0%4Pf%6r}2A$Xg5!zZRu=dc=`8+jG1Dv4lE)L5YmNVkqZHza3KrKprG zXA)!Rx~rJ^(hHUwM#|y$$x}Hi8?2YD4j5*eDg!2K82+3y+@{C^imhitQho+j#D1j@g0A@6Vzp9?!SA~W>I}p^NK>L#+8{^f%ucijj zPd7+ditXthdN%@YIq%3n2GI=ro>lo1Vu$;jh~d@hRHY?%=T8?sUXQK`U(D!bV6SX| zXOe*NE46y+fh3DHO`+BHeeDtFm9Y=XLI=Wy#}{{CGW_x6i~FE%xOaAAiy^yOT%)nZ zF;5o^wVS~zmW*OBkU^2g%B*Tv8Z6pnKsE*!cE|CYecploF+I!aQYge*KKJq1R z55d;wQDW`%hO@g{0bU67ISdNugoTB$g-_7?+)_MBhL8ZfUc$q_lDDE4<7SArbZqO5 zq*nnTx4aDv_58E8`>Z^iD{53|2+WZnK_E=y4+krcBx=H{gKw6u+-MoF-uJ;U+kW8J zP+cBGnzj2*G*}=VarHSS$K1Py5(_CZ*#t;lj>^;)L~%bUq!p-o+}R^Ff10eGHQKfw z)Tiqh_`ICkU*AxGuEFv9-vf7It%gmno;TfifJsj^-f&ducVlAf5HZQHfc#^fqm>B+ za4qn>DQf03T1zH}7Z_XB-`LDOM=5f;kL@v=k;OK7{L=>j%Nq3ml@h;$v8Zi1*JwoF->uT z>5T|tcs3nYRtl#@%aH|!Ek;32Z=PN4SK>F@FlOM<3_*=d%C$wF$6nzxBzoF1~8-FwFG*(l_Bhb-n>x$xPr)B(k|CIaWKQ60z$kov;|*e35D zyDS4$pi)SY^usZyTvwA^nEr1qp;zELzIg27)u&1C2XnjU%>BVS_d_|GlAKEm~Ak*@WZm7`A$xB&+em%_MHrK4yCx8m3AUXr+P{q?&GxYW`B7 z3=v@ddIq{=m~5|W=*B1Ju4!KwOR}6zhO3%|kSD3x-uUk%SDNn&!a;L2$}CCs;-4

    )-ixM?+Y4+>&*sbPRCfYDQugMHRM5b?)*w@LH;u2iQi518fGUn?_bKX7qjIsYZvKza4VVlBvn#KddA|j) z7`2cE-sDOuP_Dj5p0g?w{n#glW6eF~NA*QGAFv${ai4g;yYnQ+PUk1P6~!SR{wZ?w084dUC2DD{Q&= zAgeUxxY6$QH82hTK5J7MG(`1CRJGl7t!IH9^`F}fYtZ`D_*%SV3`2mTgW|8Izv@ch z>{=*`Ziz$12v3+D!T&6Z)KE2*HHO=O!0gbd-KV+P$emdd$?WE<5O5r{Ag^2=RWZM9 z>9zn@HVNtYqS>}+zd@a;vuA`relH>$rK>ycJfflB?j~!lhZex)WB-p@{C;;BCex)3 zb9J;-yKFOcEA+YzBo}99cFjI3NJp+3r699f%z2R%kW!PGi+SJEX+`Z^>}8U%TS)+7 zsp?h`))nynhgqv8tg1D{2SYf;_36}f>gA0f(t$XKjOJH=dR;K(ANdnDyPWY#O4M0$ zr&Wqpo-E2T!D2jY@Uhpus`I2ZGCSh$88x}P@GuIh8JoDZe|<5~48~!pp2!4kr)2gR zw+%utzc0gIjFsZfNCJD->(twwU)DfhLw$RYm}72wB{A@^MM#{ z704ZR+pOYj;coAFS_aERSgkbKnG0fGZ*0r9DN~Xy`~JE3JZaLz z$-gL9+0QN}=kP77oE%&-AT@&7ysUTuAMU8l!d+=>?Ps0y!bQ>Zs?E1YcQgfPvEcKQ zyGSS4;$FmtoE|Sey;H%Ex=a4_pxoFQPJ}7F+=M|srckmieSJol2Z}U4p%RvA+%ISr z3F{GtP+>s01l5%qiq0?ftV9v-IuRq0T8;1`h{N@hCX|%;iplv|Wgovo#P^%-cha&I zISru)wQ^1jgQbY;UL>Kd(OqDKAgcX`tj|GKL+XBTr2B+P#-WKp1?G;T3%$5r9Jol)$6gS!cXU_$G539BL@^+d zFtM=-(`FXS-`D3X)c9Hy$%GMYz9iD0WGN*>e|TZxXmGH14FFHlL07pl16_jZ`B9cK zYfNF;=&X<2kdRMdEDqi>u@) zj+wHnuxvZsY&;I4suqor#tj+6ey)5K!>q#+&YgHrgi26(JWyi~yAem00?ncnh!_H@aJ4<-E< z`CxUqSP4y!+acEupKDh5j>}akd`e~P-J91zxYxUCe~eq>I%+2)#Crc*X1r*5%VU23?#Xyn4mF zuB1|Tzv8~{L1Yesokl_O;)?xHB`Xw%N@AE%EV?#>XtSw2Xk!`;g`uPD1IGd=*kn3w z@1KL411duRZ4=NQHO8?@(z(lX{DnK zyBZRMMBh9GEIh#lcH?14+Q;a{?9^3d4GFUGbjId$H?K|#wzKQOKVzQ2mdn7DwE`ud z`={p_)NZ2#Ws%KR8|gC=`?g{&1UA>^C-M_Vo>}Z|uZ|O6J0q*Ry@flDN?En%*uMY25!t6Fa`y+L5j!=TWp zUKxoh4zgmY0%I8s-2M1$(X_ILz5#F5jS8Mp1R5c(-rB0z=XMN&OMa-JSYUIG z+L`JMWwl)5Kmh}1s1UzUv{IzSuHG@W5V&K@$TM_ymS!k1p+g9V*Z4G=10D{0QSp69 zuZn4=73|I|>V99^M7^qjREeJM@fe<9^@!buazv|Y3sV|4IYF^fD`f;)c)4z>4_{Lu zwQkUIRisCvJ(o*nYv*3jVCBbxS|QdoXmd44&Y)-$4q$9%G-9F@hb-lJ24zB++LHs* ztN{AtU7*;os`7zK#em{m7uKPIfHs0IpCjw;MdN@|+t$B5@9%wtqGQej7L=myq%CTi z7)n5}rvP}M+gbyl(nW;X#l?lb(q{!)QFiKFlt^R>V)i)<28(~gv@4cV4Dc(s#>3pm z?{(F_I|gJL!swkKz2)EF`OwO)4tpT1Skyh$0?F5%Uk>f7JFlXN1klkF%@YF{(BDTN zVmAl^`R$3vA`qapd)dj&yrXa$6G52i2_rXLn(a1w8&4Mp(HFv&*!-EJQX`qq#3v8g zJa<>-%bidg(@Otd(>S|xCm#Or;A5O#UgqH}M4kOcgVQ=Zi<+ySxnBHE}s`qBK653z3>|ix5tqX_cC2VTEu0~qTCfvjQ|;^3o2#4-`^FXVQ-sEB#U2qg>T$e1R|fEp{ZW`9eczCaSFpQ!a}8is zuGmqdh?{!8QfPQa#^0SDp#E;fTd`*ZkW{xkKB_PV*DB$t^tF>7H4F&I)}ldJ!sPEE ztJ%;*3*{JP*BS?tv4NG*UL>?+8jzXsq@~K|cl0BhNzD+FM)5IvX(I9C#`cX`W2fJ} z23*SMb&D$v6$KMVUooYHFlAT(Kn zuX9zR^3lT+mlfYZ$sv%<56yR?++XTfTb|c{(Ibg^pRr2V;%Z6+{JrW0x18VTa74RZ zRy?9~2ZJ#2MRh&e9%ak+-RbE7Zm&1dkFY2Zr#i+=oYB!MHW{yl4q#N~EVp-V5;;GH zz)fr=FBea?Z6@+q=+hX&NlE1~MOZdA)Pe z!zD>cO&~}zNGx+`&FgJw{uxmRCj+d9Zr=z7u)3!{ARShibKMw2O$zUjOa`V|4Jj z?(XZ3&b>cledvm0j;#6P&MlL}>Ah{O%<;+wZMY2qDB&>b#d^uo4v*Y`Px`oC@Kg8p znCqu+>_P|9u}%9>qGDxBa=v`aR!lW7Md* zJJy1lBCgf^x4YFV(t5FKXQ5Kt{!^F5Mw!e%MA;lJPKN zdSY&+)p!|@6q;|XO%PB96)EEi1Oy}>_u3|1{ROv6{2t-!r`=zjr2N>W+*}|g4v);( zTyE3LtYFY!UM&z%SAwAp4n#%o^v9>oIOZ}1>B7kpU7cLWcQC-P%k)rwFc`gX)ab#k z-IVqnIY;xHp!kj=wJdv8zyo#UT*f-Ccvb7Ar2D+;3+7LUPX8d%f~358b-Eoi-dk z*KW|A&%>YexzdCB(IqE0045s+r19Z$D?N>4)m|admd9-pGI966S+}-T$&EU*@r4^z z${$eTYHdc*zPbJSDygCbNFS?fUgo;%ob)w`y_qGG;u0578^tZ&_u(Mmi5X@I=nvjI_~dN^X)eEEdw##>y?T4t+7s-4if4+A zB)fq6vUW@{Y!R2e`5Nj5*lg70W(Uy`>KdZI1zhGZnBg;H35ac7LNnp|3#LRg8a=wv zq@GU2N`ZV0UK9B2OjO9cN{#BDI$dH&1s%4haz(tJ|E^MmdfH^~LX|{1meY@2-49}2 zk2h$UgS5Qz5JGXSTbbJce2l}FIq3)+QBuu;LUQ?aQZon^K+{j{Es5PMx=kSZ>zV3` zctglZ18EOvAW>u6EVElUJ5SW5#d!6kCesviji^GC#bl~i*0Bi zA~v}H%-=cCKdI4 zMX25EAaF)9Ud9_SID{$z(VP^C52Ie|l$bk2WH4L*d1A~95SrLR@wWTj(Y`ohRi~p^ zUbZx}a}Rd}LM0FRpC#`z`K+*Rhw+}wBZ@&(kq_=d;^vp?R#5TL>0R+g7@~66=T%&k z23&f2}DZ zmSo4cSbZs?kaUh$2gWOnQRoT?8>wVz_e_(*-`V9%O?;St(59HaqGg*n2oGN0*=JBv zn)~^%pyv~#AC2QTEXp9v_+t*G(#Q86v(zt8K&PJ{E`mVB8_Lht!^B>9j$`WgkV&pvG(e#%<0(-v6nfU z6uEyO5z880DjBgpcq^@MzpZcnUUeePkhz{jtNGG*8WBq#yN8=NEULP@mge$)SR>hTN*@)ti$Zw6&uGtP-)5p1a;wL5m%4-|DW#vt#lG(NR!P z%)?+j5LYb4NQo}wFhF`TToN^?)TmX0`V4h*>OzS4e&Uf&C|ZiETI@qPnZ;iPrfH*S zorE%#e>7?D-=XZ5_g&Dy+uF^(3voek3BM@=L~b&u9)GNWvHDB46;{PUbnbqUj{9;a zY91X9c&TwHvSomf{}J!qHi>-)lmHp;wn z=W)j|g+j9J01~JXS=EA#@XM!x`G?>&4ptc=Y3QLTg>ZVVt^G7KBCz2_^wU%yb?(jl zmVmzQ>qH3wk*}48R`T7mk2kvj#QkqHhS0p!zcZLT@ZdlF-w%D~hoA>s79OKkpE+z% zXL0$C-ZfdPFh4V^S4TsakO?gP9~S&xwAm8WaOt5zw}1a?1W`h?a{BlDHeUt^m`BX@ z;E*8Q?>CC3NUJf8_c`^#&WGnXG8dLqoWQLJN;5w#7M*%6`v`wmOVA(rw-+JLk)4;@ zK}iZv7r!uQ0T(XAg0^=>22r8$aN8iANp19|dfDcQ0^v*7cdWhOy(jdP3iNkZyEedC z0RgqWy6=s6E-V{eu+$v+SHv>iQh*U-P>mWF&H&Bf;t(3Fc%)?9$Q1Uk6l}B;EP~Um zQSjw{=O_s)>&SiM_p8afADL}9yx{ZI_Z%g-q_fp&jf1wI13z*bTng`|_tu6`@T4Q3 zMmrqmZ#vP>oqeG>gNKJggSe=tCah@%21kZnY(zKjZeH zx2T_SB70};vtO5+r zd9zGj8n!o*q;P**HI04V-L6R2j?l@Po0u>IZ+DM+12- zWe+$zk2)qw`P(t7?WJ3VQC$PyokXdE8g1nIEFIfM!f+-?VoPKG2srGeS{{g!hO--R za2TsI>6{x(`=}G`v=}D0&Tsn2td4gaOF8pBPrw)uGyrl@RVT3L%wAg9z3M|$c%oV{ z!5={}f;txhE6*e%%ck{)du$Mz{6sDveo17`Ke$FbjG%JNKU?XKJU+*|*{f;pCfEPP z(Nur`_pDcZmXHj2w@s8xqVM@VOZ_Yk=pxiMSSo#EO6KIE5FTO>pHcX#z{|#G1!jGGZ-J_=$+=-M)3&+2?g}4KkyxOrc6;23A+Iy8B zKs6jeN;p$&@6gL^RT-eOv|&Hxv3JYjb}eMjhPHg;x2vNrY1zzecwJZLbT|nCifu{P zl_u;#3|rA~?e^{Ek^)=~CK+F1*v(@}L14%H3^-fW8|U?97XxrEj4H0xuT8Jt(H?kx zZsN8_G>szhmKVA@ka1!Im-Utv7HtSFuf;{cVD zmL>_Yzn&?Ia zl-eKg&Ic5SLK#1XU`@5_wzN$IxQp}PT~>P{vuql^0F6J{9(@8geHchl&zdMT6*9WD z_1=4(%botS%^CP+kKlD_KfmTACWG>My_=I!nTKWDp-6^O?Wfm*n~ z>0e))i}F0Lwh&C}P>T~WAK0GO*}W)Z;++_RE8pReyhL~VE@5t+h-I$D1m)mIN+tOmq01snGks=mT> zHzy`>1?slg{K(m)GMVjO4fq?}G`{Tu@{~{$^z0-0gM4~QQt1;4jUZT`ArhR?Ye7B= z+-VVYkX!4vYvE1mW{x{67h4L}?k`m@+4)N`fS6|S+Y-GeHroTCkDpj-EGY%0l=#K} zZYpUr7*c?}VNGGWKNG=Q6Y=y*Cj|$`&uO$Y&DaWsOk7{^SpIh3uFmGz;c#n3E>foTPcb@&xJH2 z>Ll$HNv1zcT8ReRZ!+rx#C1GIDi4l}Tl~soJ9Ee(fWD-EI$v$d{;-&n9%heQtB+U`MNWzM+t*3!N}PNGeU{xc&Cf z3_m4d;GD4 z9tjZtc|g4tY0IkV==8W%@PS7-zpJ&Uebt$AjxPVSG;F9w0g^XPdhFTxCx{U15AygR z!B1_PBb)9Os0>ln?IhFrV#A%6-NWgg-Kp5&l5^Z1Z}oXz-=BLA{r{V6e=hZGzl|iP z=n+Ylv5!3s>c;)Bo7@+Od$?Q{7Zstq+`U9%a=5${7sK~%f}u{M$(Fwan^F?%r=>V@*C^S98($DZ}v-Sa%wjbn)#i zm^a%a=z!zb2CfE_G#OzNqD3D?d0etm)~3g(^{S3}xO6`Awa|krSSoGk$RzAGqNeq9 z>%vK@xZ5`KhK#a_t3^juF^YPWG|UQIM2Y1@GVr3B3~f3+6{Z~2MqRRR#V)*2aUL!V zXdw9LK2K{LT*jzQAQR19GqmQKr`nKaFK6oU%AvmXt#vS-&9C#EQmJyAkP~9@fz%Sf zZ*VzirWB(qViSU3`1#D1iUW;dx+eeMf_WsWRpO9fIf{j+KCBaAHa*9ZVvb|lih#%` zH+vEy5MsNbqKL=x`EJ!N6S7*z*?!Z27XAL%SopVL&PuX_bL7<~f_MJJGG4?=!&(e0 zprHMK$w;s3UBnuLPx!^>Y|UuV4uKpV|Mu?hIYTjD|9fH3s&}`PPoG%X?K|~+)2fIA z8KmgXfAY>)^vik)$~h5_wKr~p621E9Mdn+D9s>`?6ktd>ES5M1%>N8cW+yKz1X(L3 z!ov4^TV0s-L|&+`m2lm}Rq5wFaBFmK<)Ud(e*%lhizN5qhET>1?l!nnHw9fR*ife+ z+);v++1V)T{S~?P_vw^j6nsf|tj%sn^-3uYE7RqyM!%%XSgxLD!L~0bCXO#_8X9o& zSKj*ut%QRuaA7ELh3I|+qYx7S4}Gaox3a4$7&I(yIMaK-5w~DiVh3qWncK6QWK65> z4G*L-7)W4QV8cAENBWzoJFI#{B zA#N%j&cnP0aQJ*2I?WLRU+_dvgETaOns_{al>SFZZfj>qF9=wL7$iiC+nYhw9h z&U}03F~cN2^vv^*AH%I*kscsRs7K{m1_0Dk)Y@IMyOT(9gIE48B%HN(e5`YLqJ$L; z?`pw+F-b2z-a~z~a#MrMFdqJ@qACOyW8cDqMaKzpS6|pU_ypLyxkJfVAyE%T)9bKW_HHfj9y8JXlj9lgQoKqYi~Yu+x~F@N@dz_U+@Q z**)puThdC(W1Y%+1cKfe6T#SruP$w5%E%hK(NrAJ%3LevQl&@N)wUboj`*2@IJkJh5x@IiCm=_k??!VSJ=G9 zSGwCfNfk2^<)x8Pg6LI_Ip~uPi=baQcP7;<`yuCp+|9i z?NC`ZqsN6I@!B%2OARkQmfdXJzWwK?4ya>)c|Ay&kETQ8O5YV2oT+F%fNTZLj3NYK zE&RUGJQ`ntnhAdCznk^U7EOb=HKS>M31Dpx z0ZG=tvkCMFhh+s?h^WGQrC(R=RD(|?aH5%<+8_Z)EN-!(;kdz7H6^;Y1Q1n zhqSfV`{3#HaPMx=?t?$2eQaa7AW-@{dN&JiWwoq{7d!`<-nj*U`9JUYTKvzbJ*wFK zrXO2)-vfi=&a4{OXs#pg>rn_(Hs9++xgu;j(1-QU5~%Y)jk%Axp5JAWGdahbSdKT! zmS^y(weQpe-!&Wd|f_M*Ue0_mtxv#Evq)^<-(#e!c zypz~|AkBsjm|(+1pMsPU>cvfr@$yVPCV7;;x8uPxno;5u)v?hJ1pNx;RJ4+p$VOpD zr@OxVptLwd7dxUKPVblVyW~ZSZ=M+a3o6$~J6%ee0SrW3R5(aWN>MjeI8yu+7nnLa z1ZZAw?92h>>5>^ZpQseR?rYOt}TVMcO&&PTUq%nW|QskKhtL?~5UYRdFc9A@AlmJT9^ zkB8UOw$K*r0s8{SQ8m?B@X+(=SB=*rm02NiR!bc^-tT`=j6}DJR%_Is$qgz4!q>k! z8g&d{ZoNUxba%qN6Lj~ZE30|adM$!REYsMgqREUb!QKuviTad-<3vNq^fN{7TRh7R zeD7MxZj)*0f7beQrrlNV%g9%VE&$WWAP0?A3(a-;ZWNyqW}Kt%wD}BDHinSAy6GXqA7Q#M1uZWWFqea+3B-ae<`Y zGTb9S{AP=AS0c%tYt>I>697!2NfNq#R%> ztKEPtQ&Z;#`ALNOovePPstzNKz7)_zwxMB|O_&Mx(?>LO=hB>VDJvr4vCmU7j8@0QgLwtmR-Py?Dx>xFuO3vO3IND?IcOl9_%Xti!l|Z%^zU z0WKfU1Z(To_*WeCo+Mc_Lv~iR?!BJvfe zYd#Uqh0W?a`|s+d|8Cy<5H&e@EQKw(MNAnXOTQl)O4t}94h1};;3>zO!^j;Wa{ntj zz3oHwEV(ppFVUUa!SzQ2S6Qj?que`*9*^G%m(_B9QP)yB;sm|(F3!+&R%;^`wvOmf zdTtKc9@O4wao+ndH8o}4KBrUI`LJQn?<*Scs`G_{SHioZ*emqIID($7A~qbIUZ#0* z%rcJ;Jt1GC2KE~0!+zCId$wHSvzQ<=9!<0)E@VrJfaE2tj!l37JECIb;pi+^Mu5MJ z$-@|`F3d2qVkyg-bE9m%dxNDK>=%YF)hOd%g3&yOn5rThtwKMW5Fj8TxDBmju1Mjx z8uirrpjUj(r8hnnu#@t|nk}MB*A@P$xIgf zRWd9ouW&kG%0DM9+MzD91$C{neQywL=(hXutuN7^vVl|FEi>X7cl*Ll{m+fR>>{$} z$Pdk=IGy*5f$vmd&iD z;ek6Mg6NLm>HXM<+H>|71d)jW6M9gs=3j3qF5JUYkwO2@P3`c{Em>rz7cm#BM6ezV zG-&XGW+kRHaRV$`r-pyCeSPKSNWVBvUl`sucQ)wON+Z)S3=tPwQZZQ+&*&^i#wTL6-SgC+NM_TC!w{jo$mhrXlkPMwq>BvL6OBi zEQ-HaFdX$XSdt3|5$eq9UB83I682JS@%+Gw1pwwGz z9XFFE{Z1#uJA8Mmw%Fb4x+>=#Rx3WoYef1$zu5 z_!pDis#6PEKD#I(VjX7S{Ke0lcqW$8K>)W1a(GJoR;-mdxr%(l!s~#2GCZ6=iuCUK zuk0v>uh$6Q*Iwn;#hNJCKyK&Y$MNn0E!Rg=V(tkEfqwBsOTBzlB{N-uC*kt(?|TUN3Xw(}v?Gir-`$@KnNr%Ui~- zGeyHtpb~5tUi^gJwrYUGIx;W|UrUHYg>h<+8lHG&tHsRFv3<{2XMSnvYCMm@mT4PMv@38I1`^;ZI`y1$49x2RZEADG z$eM}U<7gAG*?rA=PFQ656+LFA7&-G#c)7^kXpRJ$bJa^*(1&%+$v#8G&Mt7MR$pGT z!?(wQcOShO&~4k!w9p0Va(yB=!};E1rD<`%aO2Bdt+iPz?x`7dbp{Mgt)4?Gm=Zj0 ztA=6cS8@nnG|NtbNeoi?LLdIIYlbgw%CxhzNU*=*L)ynWC>c}_&_>pjZ|2F@Z}SJi z$;w;CT;5O>P6#~AtaW17QiC1A5lbn=S-ll^;e%(oq#8&6a_CIRQX6iM>@o4S|rjaIdwec>llWTjPZ= zp`gX%*h7QHt&t8W6rvdkD*T?@9<}&B)C5%u)*747vMn61K3vG5B957GeoGyLiw^N9 z(=E1ZtTMf(ht*67bq?MP%P>jgwQV=7@owS2P_*-on}lhzz?dDTFxe6S`zy?%JWvlZ zEz0XRo$Q50kHcT#^hPyV-j@GT)?7>v7S{oZ1LP1slq0!|#ah##XtUTaHIz*0w$%Kr z(wcPGP}nDg&1rBYG&Ahu3fR;JZLpX{A;UiR_X!s-d46;@r&*NGke(XTY~Ap2KWij0 z*JJ6al*UsZ>59X_gu_pNFmkC0eP6CP9zdf00Bd--gNn$DD3KsP_9PEgWfwM0=V8wT z`b+6EZgtLsV%N-9g#dbyK(zCgyi7t@b5tu-b3k_PN`25U%|H4|rOLD#i9hZUoDGeI z_|?^J*@hD)loDH}JNi3Eis;U5tF!`uM+)l5e z+MJ;@Z1!$%7JK5xAsGt|`$w73J-1(Xzp4QW+435G_JEG2o&Rn6zxHqa>kO(PS~I<< zMR=uZv_E5Cg+kqQ^eTdwENm-_u+2DfCirS5G^)Wh7XKJhI1W2;)Eb(YT>bG35U7zH zb%j<-w;@YE;O_yg0>JpHQM01qylY3Bk_4Lr_4uOnTxN}V+1El_t{Kcf*4z&Z=ZX#c zx22HEyQ~cs8Z;LD?CK0;-1U>!oCX&JuSV9@5nw2AK8jyqY`>+TN+zdF5z-?zZa>sF z=RjXD{#6~^u))$?gkvlmA_`7;$`FO=bNY?5P%Ipp^`ruu$`v#bS)yvfD%WDC!fbbp zaQtGTbz~S}D0jexFi|}^wTKZrWV&dv@`!#mWNPTSGM8ODZo=E2?ADuS)hxw8!^jy_ zb6~*c|3}!60Tegd??Gj+Wf6>>wpWd0**UkE!A03@&Md$#Zoy|g%d48GJ++eQCAoJl zWLx*QCv#>u>!xTIUGo?y#%(y$L11?;#R%_v5W} z+;|#`HxgPpbPU?JQ=9E7eonJ?3{V_o>P z{XKf^($wR{6O+cs0$xF`qd|K(Uj>zyA1JVdd-}WSVkUcJf20ui3K~w#A2A=e%0ShH zE3vSe)fnc7MD+^JRH+;AfJO)!a)@{*Jr`SBH_KOozU%&MxKLWB;kNY4-42w~a&KQn zVEA@4n4}YSd}FWZA)JfCw9k_u`%~5@+*=gwkg!hU@23XeAI8zM@hIvO4bqLpg)-UJ z{!HCK)sRovl2IR{d7Q>KWLH`(>sWN7h|K5%2_tG2FJi-fJM+x{l)Dc7c$Ga{lvu5m z8%|pQU49K*j5Dc0{o?RTwx3UD>SxK`+1fid!*6Vu**=nR0Z?R*N^%LSnahVK;j)WW zCk42(OVw}vDVn66+C#s|lo{j8MWwZ6#-k(oMh4&W&EF)f49 z1*?|T$?4_mLg`Pyze-j|V>1yoB2j`ygd9v{ZO9aeT)lCH{bk>+u=wHI5_w%K`tFev zo80eg^f=?pH%{%F+(Q>JbR;25hC&`AMu{>r>d58U8Y(apN6!gEt(&spQJ-WR^LLme z3qe6He$+UiYa%X0N6us9E`Np!28a(oe9zzoBm6y(wP*ZB2j$N~ zlu)dFN`*^xWjSzu8-JM(4v$neNY{SBJ~orZ+Vb8{$)+cmMQe~?e#GI<7PB*KRTrRr zND~C|x9(Q7=gn+)eWOkGR^YtQ%6vH^QEzUjZu_-}A%kV6T~ve|(x%+0c}8BL?@t&X zh56t?$xaY3-q@)>$3qXo?Jm_E$uUqj)r$))tecv-HlCVw4%~-3yxAmRBpU>plvq(z_a_9|2In|3C()oP_>tuw8 z^&!W_vC4om>5E1D;y(`7+##@~Hxbh!*gowpj$tx=QIes&3K7@Sxtf+X&Ckd%4dzLV z_fLSnPN)%>6!zD|KZzyd&B}|At)jIlCrZyglS7@^FkkIRbItT-ENVH5FtXqSw9nsX zSx*g3VR^4lE2S6LYXu}6V3qx%FV;o53KaC0S2{Uh`V_kZHlGFl>vz0MrIW&Jim(EC zZ(@^xs~|zgIwKDEtFG^rhW>&ak1HKaI$G`1v zX=OLnx!S|JHIbm8m4EDk)pc7R1K#yru>T{7rEQyRVmr@k#H9B;dkZEAHN=Ci%o^w4S2Y76%+Me^AOk$&L(S!Bq zVy!Mu*K5OIp;1~Y{=Je($!Z6y^KlL>vxmUC0>F;;*6Laj29z8_pjKv$@uXB9ZRdFN zx)U+#%|_)gGl$&e!&4H!%-|e2XBG;676=YAF!HKb84W>fz+6@Z+=0a-aSBlJ26<#T zqDXA@9qqTx=C@_G?@{O~dD2_OuwCQ+3ZQ}6|NhBNQ(0(FDcC1Zxi)7(`^*ZvJ!TD> zf3pN`2!!;An}6z@AzSH$e!CAA3yQ?b`LZTf$YB*?!yAczckC-DsgRhyPtk)(^iZgr z#7}-3g{?|{oH6L~0C0k_$X^m}O_uWWaMh-Y7kh>us(rQb6_y!5P&eSeeUAs6>?F_Y#F z)1h2d;*raWu$H%2vs}r7vg|1< z;?^^R_2$fa7YygLNicrr5m7@oifrGURY`+8sOQOt+10Jm@G94yAC$qkEI!aBHTJ@y zy+osUc;BG$MAC7LH-itiPIp+T!Hs}ROE>@1Btd|_7gS^Y+Gw~|XzkjzU7uc|cp=2| zK{=TH{_si9*3}1F44|K=2{Elda{}KAL4066MPT(Z!8YN3XZ}c|kWY#qf>}`90#uG3 za?}-1M62GZ&#$8*w;O<-lvcC7Z?BihZerxXz{eXB0^>7?( zgL{2dOQ12PSyEWd>JIZMur8 zeH8EZ6uOw=VsmbG2KhauT-A_gPI&Jq5FktSxDtC1- z(>jmCNwsXiLk*E3;Q%4G2$3?K=W%`P9iI}+vf6IPq7~4T+OA5)?SySp`VxuJDOiX& zn37&c)EW{3X8vU;8^{Njzv>lX_p2ZoWU#v@`{l=jQf@FUPjgPBIn)YUSk$sU;sCF? zEP~IzRe$w>2z_3DhUR7cD^)*cx|$w2ec2zn=j$cIuL)<6*67U(>v3QxfR=32T)LYK z;=?tu)+3}*fz8iC8kdrf1O`~rLX;B9BNCFegsD+7!%9~l(*O*yxR@{FC~BT&;uC=fa3L?;bw|1;e;@xE&eQk( zq)2^Cz2ogkyJ-G{37dyDY=`>o{ zfk{Zg#q;6y+0SN+mY7$8L-h0O$0f(<|8btmpy8T?uRzW;CHN$phNg&0Pv9$!C*`-i zHyf9~7mOXM(WIi^Ii6f=3+OUvqG;^pg0!Ki87+Xw?d9z%x~Id|P;n&Y_03`>^3|qZ z1H8}%)5jlgAyTV$iZY*+k%j!UsU@m0-NmQH>6J)aSE0$fJQZGH8 zcy?@*OHMq?PEk9^fMXX0)&$QqN!bpNHd1(sC#_o%R?D)WalwPbrag{{ipjQE+ncOE^@}@Kt{R+^Lk|ru&s>9W7-*0PWKVF z5Z3w81a00MS5G>Jh*-X5GiY5$P0B?4HD_nT#@x}RFUY_|+_c^z;NL7pC%y94<^|F| zy8Mu>Hf(2_@p`w0#bUX{nCMN7RIirn6+eJ?Igutpyg4N{RYjU2$KIfd+~|{KJ<9fo zjVsuZ<#0lV%T5cN$YQkCrqPP}NqXVO8JM$S#PtJL_9eHUA>4=d6*$4||41=!>zaSD z%$VS1v8n3A|hQ-G2PdyB$7#6i*$liOD0^Z zSRM1ZZS~5`BHkLiUXO#knR8v~>>KS<`PC{h7;iNZyvQtSLvq6>2*P#6GyP5%`qIUL zjR-$l$5`M?Re01t`eiaZ&f8iLx$2Jgai5;WO^_*v39{C6&aSq`TXjTeHLB`C6<#)l zN{NFN{ZXn`p<_t3rCRe`)w0!bsf?p84>@zs9vgWt<#Yj1jg%GkaFD0u7Db9sx2JK@ zuFLBMW;(4J#Vd|odupuOZaar%c@5DD!_Kg8$-eBRhZdjAD;2h<)r2n&3&ap-h{xN4 z9KsWQ_YJXz!OeoF`!E#6jfix9$=&AiG+e8K0E64a5GDf-J^rKHkLYn4d4Ii&J91VOQ(T=ko=*BD*Y=2g0IS7A*wxUB{|=dViVvSDJ!9Rp6>g7=U6$k6uLfag{q zBgl*3(y|XB_V8;nX5f(l&Cx>!Kq86p+`#a1lCG3d-dy%V7E^@5NdAwVrd=5EcR>Vc z)^Vkw@*P~?ALIHYc$G*L(LLZ_REOV7xH)KR{W8x1myBDCTpyC>=j$!1nE{ZB}ihp+% zmSVhEf?fh~Fd5GAZ-L_@EX{_vkU^kzQ2+3Ksc^^BN&r6S5AxE_qT60cb3!&La6AcG zY@0h$&b&zmn<42+>s7@~%m8+c`I2cyiv5n)M8?gc)ic7%od8WlgTazqOQxV<9&_=~ zeVce^x|fIP5>7zA;k`Jv_|-py#vXO1*~^lEh?{MA+#svxEQW$B?2Hw2S|^p6Nao+l z1=zhEow=MMNzg1lJ+s*n=Yt)%0Qz(PF_j9G_04UHN0riRZPEUTn=Ebo4 zFic+nDb24(wy%d)KWX8=94*C1f__kT(oFeX`w$@HMT;;L-NP z4>Be)hA<2$TehwR)&2a$f}E-;V-9EalSXMV)buePF%0_n^3 zf8-W3^Im)nTeW}C&2d`#gLLPAW4)aJo-%-da*&P{0Af~GV+`U5Y5N+K<2CciQUGz? z3*T~PV0jc!%;WLe{!1pRux|3~ZagKNesr6rpRNeG7M&cH-1_*}#hOrNaeG0$LN!qP zdA4cCY`|(jW3oa`)eEd5VQ3{$@!@orpussc(WdV(KG(D-51c|KU;K=TvBAEzE%Etas6X z>v@d#djYBC=_{FHCwSjc*kxbN(j_sDXy#dMo?dwhz_*5^r2eyz4z+dy+=8UHk`qtT zb89`w{cBa!wMWFAmhoOZecHb6)y24^ui)cf<(rWk9dgS(O$qV>ARZ7WtI$=;2aybfZg zx1+>+K#7Q0rQt|OlOreyg9A=YY#+j7xzLTx#!QjJE z^b(0(c-`d3={djEW;~p_^1%fy1V~y#F=%}BRG5GYjE!a+VSa2Yd(E}V>?R8^2hmtJ z#7=S`&rrdo^x?yHL&oeHuiMUm`3OtSv8!S<6|c6Y876Hs7892 zn}4gLdDTlCs7B9el@84XWRs1EOcgujZpw#}{jhWqT{tf#Lw$WSi>Sv7V1zk`YGwl` z-8u2aw8|?F>QrN*MwR#oe?Vs`j9?U@q+J;LMP;LA76Syvl^?I=YeH7MA&(HQqjkrzv>No%0ya-b2Wc%>t|LWStZ zZT>gF1trS0GH$RuC+cD0t{3p`G?wsJa(^YrS3s5VybA4Nvqj{m!BM(^TVFVPr9 zB_ZX%Lc;hxIh7R-g~EazF69v7OFS2$)qv8Np8^ccHkmH}kVFH!;?XxuhgdLF_}EHK zI|APH{H`Cpu$}9wCs&xzRvGobA8Q0n7$VA+**5Dq3hDp|`f}WZO--2P%eh%dlvt2& z2RQ>xlXx7%lIj$$_&tEMAZOCs0!Re0@LC@LISK#3=l^E`Zon&iq}VD>t3^lY%y8dR z%n2u)w@5yWg`8?+X6LY3DD(*QtsD@EMA{nJMVxujfC4NIWG$|84ogqZ3&B(EGadjx zLM5lSO}1P`nr5#GYb&r$egx#O1!vo8IpXMw}z*Ra!4efw8AsLyMvnaG|AUO+c*kv z35)yTyi}Ab-!{3UkhvytUH*M{A(}mS;54{jt3%NVs}FqR&inLNi`xl>O2Wcbd9VxV zoQCG)=!8bf($(WPa=$oeDD)4rcZxPxP>wUk*_7Neul8(N(4ncNMjTb8fhfH2h3EMR z@rU%Eg~M>w%FyEo^g6DfYL;}uGXcMi<2~Dc$(~`|uIuuoK$Q1{5Oq+wk0QU_;X0-D zO9ff)FZ~BWV=hcrY4NyBoiz+e-_2q|PigT5b{xoXM!OwmSVBjRZ72e73r zr`c`{Q9izTZ~zOJNBZ=c!rNJoN4L^T=$GFW&=T{KKDMFLJ+MhbwPW<|tR-MCqS1DB zjQ=`la`U2Ef-6K|@B#{V4I6~Qv;tYdtbUXb2e=s5fkve3;M?a5WdYUHDsKYF2*H+y z#i{x55w}Drv>NiVziYi*^hb!Wxu1bahdD&YA+2v_R5_zPK1fWjc>%a)_c1P`2~&#n zn+ir(EF1Les1)uMZ~6QluA8p5D4b=+lV{G8WvYjlAsnfWgcmQhX?JMP&Abz1un?cy zICRQ29pTk*zd~86ZCSFKc8qRF%{a}Gv1C<2^M?;ba;>^)E!8PPJE_pQ&ZZ%@ymaOiJ0HJd0V8m_=0i4%{HMh?nbH>oMEvE^I|7Yg?9 zNJAPrJ-^u7tgUwq5pap0IV{Omr2<1P!%;^W>F`ws63yn|l=W)G!DiJP>$qWJ-hYy5 zzgEV=un`YO1)UdcIIyEzA)(vcO@NT}`%^=DEr;&Z^pR&FR8dX`04oqQ-Qz+RIHU1?gV7dP4zMSzo$GEIGc#4}B^_ibFmhsM8%J1!0W}Br=m{ zO{o)9Y#;a;V<+q3ysPWClRwA8-yWYOHMV~C>-G2I7K5^W(@*B=9^Rqloay3whL~OFqqe7mFFGBe$b62y4;GqZH0VN}I*tM> z4uV;8&H*(*ND8h3*z4-*$1hE?1~1<@Su=!5piDhtrYM}~)Y`RdFJf~EJ0PucOx4w% zxBii-!eFHl*c48zmx^RH?7nQ)YFKb$2McpXu3t@RE)Z&Kjly$=h zDfGmSiOixH3HMPfwk(Yv&t9qWo7LgSh~_G?W=0vQH6Ol}qDP#IsH_U?Fj(TvCHi@i zK-@8Di!CYFf~u;L8P60ALi8Wo=tKX53EXJC)wojeVOxp^tHcf1TrX^Rb!g8I_w^Y0 zeog6%v3)~O|#MGC(d+M5jn1@6bH@Ids~ZA)i)$d%1AJK z=3v`*fhD3}Ui%EZE=$@frG$Hh4uI92ljeNSbw^COVClZJaKWz~SI??;lyd1Ep{}FW zje*Ya;^_hbDG%qEt>P#am==1Fz)RPQ=ll%_XMT;ji~PeP;*y|3nUKLUR|hh0g^C0{ z#?mCjMb`N%!;8jB({}rjh_d+3Q9hxuQc@wU`Y;-?soSm74&I>*smY$0jkotyY>+7O zFE2I)RJoC@+|&%!<3+;P=ZqCoWh4H1pJg@q)DF?f{OFJIMkH|H7SCa8~SR4P5d+ztVC% zG`0U7{k*F}i!oqcJ)$lsPV%ubY2V<+)^WWhSR_9%;taZ;2V{-DX$jP$D~L|qW7~Y# z3QTPGyxg@BA9mxx_9e(ew%}m@UfVk5?m`>IDtQ+Ep>xk}A>Sk?;wFWkz6H`~cP5F3 z3)bNjQf$`36z0cu2-P;4@%}&>wNB5dX3d^!gqY1&%csRst~cB|84z7{ebw6UhTeke6rP@9amb$r zoKA#ZIqS#^KpMLja{;gfaL+sl6#;P|63fD`f}U8 zWO3k^e`2$oy(L@pqeD>!X_KYy3TK2X_PJ%Jn__oBud=tT2gUgQYWg+Xg^1?2>S8?I zj7Vj_kW|8i3SId1(!7iK-^8QfFQM9|t4!}jWB#HnGIiXOB1&jB=n$rfzv0B)3Uv;@ zLt?b0MPL!u(m?BmQxzUH)-Qey`Fo+9&NErN`dn@2YtS4AN;4M^ZTfGiuD!mGNCMe}=jdw6W`ei4}{<5gn(?xxJRgszLFGje~B4%i&? zF1WVyP*O(>UI$k$>a^4^oe?N1#OatD)*d(`c+c@*2K5Q$tlz~L=R$ZW`X9LpK5x>; ze4e7l=i$}Z_2L;`JVB|cJJ3r&kdK10du92Pnp$DnPi!Jw_}~N-Tb4;JYV&ByMxEOw z1b@%OTiFaFX07*f3NRUSs44SmEVJyF*)Vb=#$9A7hC-AEZo z>SXXEb_Vt6>fExH3sIM=?j)#Yn+?4^K+omQaNQVq0VlQ>`~|It*xZ?h3VhMdoaHI*hvg`t3Jw zytgm+FGq5B>48ttH}nyIR$wkK+?Q7X!WT}ezRcz7h3ES-*qvFieQ}&9CXAxS1N}3; ztIsozFIRORoGF(&&g;94_FOw7%MkIReWuGY*h_P!1+x*b4-xGj5DydiUKcV$QALqq zaIkWsFda>AJ}Ulfj-i^)_Kl_6B)g@{rZ10SZZO!sTdZ$6S*A13E3^e?CAuI9k=CE9%rko3%Tg~?@sVpgG@IP^`ry#$ta zR1`r1!({(e17G$*i;gN@x0GkshkQHL5_7`R&~2GGh;)gMEFI_6Q7BkgIt@C;kXu>A zVg{~yt-{1Pk^9^sOvFteDzFt)^fBBe6W{=tK&miRs>4SEegk^4kmI0ad=N6s{*oCu zQ?jh9^x4z}1%bYr3Z-_~ZEn#}iU_45OjoE;U|&qIrNwF8N-;;!Pn<}#Hj6b^ zjse~|%ePbv_yPbdIIoX@AN^Z77o}UAL=ga!%NMJ52S6|OO|zI7jJ2^V53ctk2z+e6 zR!dX6EZt>{dK5Yy$bQhnUN<$%qfqFwYl8M2i>$h#7Q+482}16dKA}55p_3r5q)GN* zyTfi994JT#dAVHR>C>lp_UsuuRRrJIAexXuAE8;%W9m@Edj6mP`Y-%nfBYk!T|Hrf zVAs_Q-Zlc-_U)dTIm(+OQQ>vH31L>2N@+#BS0!muVtNqkts?WIE%>Y2UJl9snWAtr zE{2$s+{y$z&@TwgO_sQrEpRcL;cPa?Vj4oOb>FdT#Sgb%a5k^;Vs*i+0RbP9i1^`l zk1u=5H==BDU_LM5&(G0bT%g~4!u0kts?R^5dUA!y`8nnVru}Xl*jRXn&6!cxfX?CtSqQZhiZ7! zg9Rg0^KTIT^(L3l3m8-lyh8HoVny)*Xw-d-fDl7JX-*wPo+pAiDbmnzx%xhbJh-4? zs9{ca8R^x1MzlgDD#B7tMXI!BaOE|$-?1c8x8I}N?a9mU)fC0F z;yh5j5UiO=d7iWqY4qNQMFoj7&n35y@f{AMLCW(5Pkh1jqW8%SQgQz_^Onv7zL zr%ay-<95b^O+&w2>@jfZcx;dDpVQ3qp98#qo%Mws;D@1>yFP!=tfm%168d%%?6mf~ zy#S3+WKn3PrAzbY;r0d?YlOc0*@M8(+uUyeyLQha!W@?E z0;to;Por6yLsvw(j70Qkz7e;=bFy}jGbvE`5PF>yb4;ogrjs+wt2tIxh4Tp+txvI< zlelmdD*71s%`uy-;N1j2tUu$sn~(VGmk(G@r})p8@9^gQ2`0n<%nBCyz1i+Dzj3%a zb2y(bP+gp(eEAAhbBl7jhHGp1?FPkc$!wi}vcSG@xFKM5+oRrfShGpLV=FKUxw5Bg z3zjbFlqnGAgIykIYW1CD6iMzJBd}Jiz(R*qE4Nr)%6fE=i7w>QwQTdIKu*HM2-mb0 z>LP`U5y3?y+62&)k%G$;*kYK#A!?}|iEJG_DiF3f6-VT(mP5+d^Dwq>!{USojb}dQ z+aXTcLH`fl0wtgNs7(HaW$g}*;qZ{g$o24AFHRk~dqw=H<|=A%yRc3jE{a7=Y?}r%{(gZ*|!}R9YOjxv)l~g zLO7QI9*Z$kF5e`$bC5NHrounr}0VFI(HTSwKf1oWst;`xi`c=r4mzI^!-1$VVx z&D*e;01?t;qtE^L;RpQR|L^~U@BJ9->~+Zn(K?r6Q6OQtJo=`?jkcMDdS-x z?fXchDPu$cj+vxjSSs6eqDd#Aur7G}`d)ouRr10cab?8ouJ}zuuQ9LA*k0*B&iv`c zno5ap8*cT6Rf-`!>DRGvA?wCLcEwip8u_+7kZba(^1=xV6Au|O1rB;mBA|;GSmjJC zV`e7#kw>l{GI`!Sq9$ztrUKSR6_RX$9;t4;|WPUNN`@s$PJZ7b-R`ob-(4 znYNYZPNZ*in=x0d6Hwj@oR?IWlH`vnVeeR(AozGU1mx(4#LVkGgFH%sVNJ>D1Qh|g z`4Z)9fnqY1s$XU8(jtR?FOXg3{v-~}rafd}7k6`by{Su7<-fz9Y;vquJ zcYSuK5d|603K_h&Y=(b>^@c=xgBY%tutiwG$@JSF-_O`UZ<~c+2YGk$=3ov020X%@ z*C7jo4R$dEW>leB*H~}2SW-pp?HU)Cmw58z3U6M&!r%V-SN5@GIRx>Lm5UfR&5|Z8 zgi40yHU9U1{~vrPwwS#*4??_k!^IX;T8UF}MNd_)eXOvIRmn)qPjE>H8d?)K!L*n# z8xX>^U>1(Ttt3^#ZV?5ATF-+XUD;yce!#N$JIZ2@+CRtM|AEU`dtac%2G`vl-|uMB zDe-K!#k*z5=ed~8dG-ErbAwOoAF*qm;{5Ugi*ki}U!(AAP6T%pa^3CV`w|VNxSc=8 zy1xvL5jPb!*L!SHVviC#UvX~Tz77Q&yfPfr*F2ZRP5y)v}sDsMd_$Y1D zdlid5T>PafTl2geNUG@XNt4cA_xQJ7mpC|>vy(!Z3_7@kh7x;%sm z3+i;=5lq|b2JUyRsDkjgig=UmorGmsPqMDj?6#=a8#LQB+Iq*KS>EkV5=wP7T(Osf2C5tw}$|^pR=t@K0#(2y+8!;DF1FpA%iYeX~qXE05HEp8<~ z*mrF4ATV=)=MJ}EeRO$JaGvuH>D);kM)m)mKDlCNiziQ>GQfj`&xZLu`x#|q7id-S494?(q z9SbD8wnV!w(ch9W`V^}t=UloUgPUE8UGMSt>jsVMaqA0Q zw`aJa9J-ncNLrSFXo&~Z_znu0hi(8!V{S-H`bixaCaolq5HKr1kZ zjI>YeRsuJPMM?lK{U<)YPV=4yQcpVZTb2w0@G=A_;MNwIW}q$so#7K_(+T479XzNh zmo4V;c^}zX6Mq$emFE&FQ#IW4=zyRu8W?=uo18cS^j;EhL&Q}U1Fn$#I^CYrOKir= z@S588*=tQ;jKZOAj(8w^mar?5{lq>bzBLoD&LO{J-$sybr9j@MWs?L!uHLA7w<|! zymR>s6)aUE@Em}0k&Z%X{uW&+qBO$rT(nSyfXcpyzpmkS9jeO-rW7V6PfQ*> ziSZCiuE?M|@qDG+xRS%FO9E_@Iop$w)fcUf=T(V|P0(tQ|IPf?L}3j#N@S*2G%EVMi<(dF6Hm9|M6kb`a=1%DxK>L9`z8k*V_< z-s-xjO&3vzqz`D}K-9M@!{kBWu2AQMK4(?}kO-4Ir|ZQ~s!u-3F{dl#7%9N(&8#wH zl*d@=^uDp-k~b7&B*5Ygh%{Z=wVg_U1iesW)up)Xa zN2@Y@4rP12*{@zo$vg}ojI70Am_`Ip)-@roE&#hNntjNvW2?eN$f+Z?jv2e@jM=&X z3=tMM>V9MM5$`}Z_Bh8rTF5q{ceM7)!LnR;+e;NORmgK;MVGE$!RduvaQKi4-WliY z1=*I>BrtqS0enl*>Z25pxk$Xw_X@*AbG12#oui_oguq==1+b|HgYNza{vI1fD5l?a z6>YX+Ceh8h#`VoLHk&PjJIWVPDTv^OS>*Iu)_ytm@t18Q$CbS#$_A+kTBt?MGa9x0v)3Oz{%W$}^OHg0}Y9Z2?ju@nw(A zwnnkup>YmVe}x{efaV%izr(8d9~85rUE|*{`Gwgzr^@IehC%(&nL094Bk!f0MJYat*C2f(iXMl% z85Ro4z&o=gW%eZe?VSSs6h7`@bH#tGRClB>;ZhH4RjT``@( zRg=IP_F{!dpEWsZAw46z)4xc|A~7S|CY(FEi2UJ6C%)mTw7wkKUg%6EE^DMac7m6myVwGs!5aXm|?W{#NIl$M(-| z{}h>&Uor%HY@7Ef#L(gjm{>JE$W#PC;Ykh8s`sqZ>Cw3~nC4p?T}|1*#=U%N?_lqS zZy!X-j{k8yykkZ;E-={bSvG}o5N~hSSguxFZ1LvJ8_rFn!jsW!EE_JQa+6l<{k}nW zvqQgY;Lc`f5I`iwK`3u-IbGm#e#YX$XY(bNlLc42l0MzMTyW0bW`Bd*?KM94AMvUG zh^d=n-cE7RTw>9c@I{Ym0rpcZCc$EEeZ5743Hhdkh z;u#8G;YrcLl`T)!AGg4U0BG;=c~{`$ZiUbLIZK#qn}+SUSb@uxoH550dx9C*mBP0u z+E9j~G7!FNnUSD>y_J2@8C0qgT@f_>LOxFb9xV#4c1>ULocraN83Id0#5|}}A&}qO zXo=-gcq-Byxd5&=p&>u$(9ZO?*uQ%Xxh6U!=GfU>KKUslo--lH119Qta|%3%DHc8l zIm4a_6}Gm3GVc5Ip5uAz=VV{KO3}pgkb4`^X1H3hP(oP3nA7G`QoZvjIsae*IjGD{ z*H!>*??om^L$Kzv11AeN$Z3qb%Ep$IlHx=Xg>&g#s-S0fi~Dqgp2D!(E$YoJ+T9v` zT?dAk^Xkq}Eta8Rf|$B;lESdi;+j4RDQo9R7IDLo^nPuO#XCCwjot5&YG@ztX#)7V z@X*VyENv|oeOq3Aween5MX2H>rjG!fGJTZWcRmZ%ybI1NE(G|63SMGac}$3XPqq32 zI96AXW9;Q)`yDi!dlx(H&jfhC24H*W_7C#u?zvt1p)i+*zevoObI)#X(a`Es!n3_r zDXLt@=sv~=B4_70c|le5BL~dJ911p8cc)R5CEj)X<{%4lx?>g%r`UawkzCR z->^UJ`T03szj=c{{prsU;MrU}Es*f)7GIQM;AtA{zN~R^+u`c!9L1E10QMjg3u5W6 zRu_1Beuc~B8Lwt50$VPGGRfS$u1joo1v@(INso|9ehT*sUG9 zx&WE8_Wd5d@TlffOqMTDy31!`o&W$K07*naRCg$wHOkUsU+l4KHmI8m4u9<00{eZ3 z8)D|jHmM6M@?BqI*A>jvZJU<0>L5i8l=oJ~kfte$5Oyv|UWnXC-^D%zeE>BPy-XHh zG?8*ua7DIlA|}jA!;&E1OTJ#zq4QCU)!feP0cX%Cg)~BT#Sm2L87XY4Idd@2QjBH| zXsie*vR)@(%SwkBhl2t+p7OR!8YVabKiF{NVVpSEhs(oxG5jlT7`9ko_#~xtxCBbQ zm$XS6*3`4?)zu~)dsejNG|}D^E|?0~Qi?R7OrShF^yA#%Ssxyop0^48s!WbIvL=O8 zQ0HRH>YNg|CKzGEpOpB;e!>k zeFcYj*@jIeTBZe8?q19)JXutDx}4x*RcLk;Hmb@Ts#7*WA zFu?n{pzc)e-0(BUBv9@P{M?AO7EGZ4wEELI?CU-Iu~JyFjn-sIN=3f;z}4glUhmX7 zSa5bH{=4t-9705wO-MZhyqZF^>os;~XPk#ep<2qrd->`G3m?Wt)D7Lx^9bZD{1YUwbg;~-zweUE0_qii}<3y+eb!?PuBXJ6ySlmBjwFZDBgYzo}8 zdo(gQlD{j-rI0S&u7eo#d$v0B;tvt#OH$AGD7uF8>R6X90=ZBiVe^Lciid@SXb%eL zaK_@vhAc_Pj>5!V%=#JJsemlF3|20&8x$9agoTMgMJB>bM)DT_VRL|#z3aW^vn7_u zI|J}yNZI6unb@utCpfd;VHIX%o_&n64u&Qdixc!eF+VjTGFz}=KuiR=X7OR(E=?W5 z5Fp!Y=VPUOem{9}({;%r%;XD3FlSBtmHEnM-f)rC5qD%+n9ePRdegWO0iK?{0b$y& zT#;W-gIxo|>_X*l8$VJcO+U@|)YB(W*X}r%uGw$V?Y2R)j>4$4h?p-honD3N*Xf)= zUO^#P%7cyLLzkF3TJS5kJ!F>6&OD9>@8U5vViaUsP^y(@*W$c zk5$8hgkiIQ?3V&}!{1MRZtV4kRLI`7EePNvU`Om70UTbXG8=>8<9yGSPw^70CA-n_>5 z-+#vywL_q8!Elt-AivUmjrMwrWmDqa>N#eYRlL6Yrbp9uxFKLUX|R~?Fsp9SITDy& zqd|{Jb%Cqt6=j>DChM>n36_?qx&{^Yn6W&|1P$fiQPnDy!Id5@Jl1>QhNN%m7g+Dl zv1wY|>?_>VGpyT=t4afdQF2J7?!%4+rs;4u+;BoaGp&4J@&I6 z8|oiZhZ|ZQ-?Z3Vmkj7`>J|26{nZ6uVP0K}R+SpGR}|J28?b`%>4>Fl`v80-?8+5ExM2Z-e6k?Uw0CsRzh=FovPqX;@B$stl!m}QYiPv_dOL#6mgPG`{u;>!D$AI zSC?E5bX-Gz53*1!()AB4U8=s#4{-dt#(Uv{!9R(Ti+`OkxdBL$vXNb9YqQFZv+bYt zakCP(lhWYN_-}em;nm^XnclWsf@S%}&SPXF@p`1VTJ+R308b)BS>95>B}EJ`Y zw!6q|QZ+4wXkWj6jSn9_Vz=8KRMe(x8~i8La_VMti@*HsFL?X)dpv#h9A}FeI&`RZ z6^gA3aw0u#V+QZ8Q1=sTx*D!`I4e6WW)%yJZ1)bg+Zr{=3cHdg$Sp#y+D-59XO@UWjjILzVDMJSrqwoNroZT0%$lFi5XH!8OyxcNu2YmWOmUmmHJ%H zW_jB`ENf=t?dBgSTa+D-7ukq(t~Lxc)@^(9N9ca0I3PZ^R&Y;tDMbSrdx!vnEvQw3 zOv6>Sb#fh?*@Zp_@fkF38qNSaJ^vH}PR9ZBlw}pKCcjZnMDw$3E@7;I&6r#14~3J3 zW|6?1xi|SZaCp@dDAax-Ro@zW_Z@nwY$vvEw`O^hcDE1D0A2IR1e5tWGj@|jaF}pa z$gK+?v}3kUC3(`dFkx>6;u^+8df9@qyJndIUccApvTJe2_J2+ro`)Mgb}qk7-k!hY z^0I(7OQwj#4iOMsY*k@T<8o7=r{ay~mSi9BmuZXo%^X+N6^C$X+zsQG|AnCQWBXTb z8NiFH#t~p-U%L;(cB&l<)!rxPZY;NM?AVS0KrOBatL}m)+AX^`+^|FlvpZ3<3sJ~d zH#6AU$zT2OP4Dc`H+p>L?9)I$(z1cW8vqw4M=Mp4-ap)pFfdWrHVncf8ABkBehA=E zvBhe&WPnF3o&|VTyUX4K2FHDnpZV_l@9^FCf5%r}zr)#T!TBT0#SCpzqv#uyu4ma3 zbaNIUu1Q?D1L~q-7L24Bns$lxuI5B#hb0QXs z8cwW_q7;Mn0h7n3Et!)gW=H=~HVuX`OSr+VJks-#$(g`7U)a@AHk%k=| z4^_LC%X4PyxLATgU6n27yoO(uwe!Y9c%;wRd+XHgWN;e8Q}Rb%zw7g3@1I!i-?5d$ zcGq!@Zbcu~7(p?BUYSmW#gY&7IOqR5mZhme#DWI3^%}VT0&K5=m4kco3u_Pc9hRW=wjPq1ubf8Y1LQ{O-J+SvZ@lUp~=_IVCZP)LCuoVIN^3`swA-DK_+ z^Z&H zgD2-p%qAr#5W9JWsx3J*iq;YNuDquYgu#dhs_EfwiVk7wS5)9oiEtW z)f1ag2JN^|Ef6YBC(JI9;7G%66ut{Wsv$q94}bSTJ3cuWi05c&eO=2a3|omGWx*U6bO(2{V*1O2krB^M;H=S+>ChUEJ36}{= zl&Vg3Gb#_1dZeWwC`{ZcDDs127(Rc)V;H7n7;}4N%5<-}vKwL?IAApw8Phn2I&TD! z6D#Mn0=Q4lRLVbtDbPsAQ^>^2RmE~oyWX5zyiVcX#cN@n+i>b?L6`c9mx;e9l8c5i zg*gLeA7~2_%(aW#D9rbghc;=`b^8V_2@r2@xf-@>_8bytAUK_|tVxnL3BZo?@*vVU zS{WXFkS#F2r{>Kt>T#qw(~Te6#-E*^&*J@5+@#|&;=jg!7$(=&1-BX=%P3OO2TQe{ z7QMSQs{I#KxWU<~!MkT?`1aWX7t0xIW;T6pOZV7*-|Zko`_Mv$J3IAHWb^L&{#~zI zmT&BwoQ%M`J&7CNVz(phyOt|Sqw;$O3X#BCq)mLZO9ITmn;nq(Wi*Z(4?O=pn>bWs zEN5HdWMw8PKQLBGx#vYbunk7JFe#LA5~3es-Zm1Vy}r4@)2B~yc6Nr>uU_H1zki1> z*Ix$r!6zoi$2w1botU~G{{C0|{V#vQi>outt}a-_nA{^MJi*nhyN-P!*R99(uE6!a zWP|=)-*T9B*G{o-W-RVYP8gg?C!)awN~#EAbyeIlsB?V~8Sc9-%HIr^;2Qekiq|su zxvE)zmN>5!mcmwWSLu8*?w5iIL!xG3yaXJI6#gs~;3WZFWuIKUf)>hQz`Esqvoj&( zK(6%Chb*{v(UvQV_C<-06rNPpsUOV92>_bs!rXs-F)J7t_PN4@8-;=^qM^U-rb*Vr zqZ!<*w)$2kSEUA)v9Ign>lu7U40^xDU5 z1t}ffU?Cyc#MZ^0=JIV0Zg^yVQ(x8sr!ujRQuRwA*LoLxU?~Jk>>V$1iXd&mpl%s* z>x#*o7dLS?eb8}?2V=B$PK_z|Y4`ccfDn$&pLlN!Jf4U<-TBV3?;Zn;e&i3kNQz$5 zv9Icm!nng)o37#oV%N9mcN@6f4HoqcE{ZK)J}vS7#WQ^M<`teje}UO@$z!M&fA7ck z*xazl;uN?$7A`&ZIopO|)w@ExW8mym==ClzXJ1PbZTOo*kj&oI=(>hMp0ZyDXE!#& zWWUR?+C|#v7mv5mdyz>-*r1XQvME0+{v8+a7MvWOkjsv-h!uG(q}#T9eKy-UHk%FB zn>8*kFY)U2D?I<7XAJPdF^0_bD1*@Iq~xQV1pWQ_;|KipFMr0%7cZD`Bg6hr*E?Kq zTHMwiYc)@=-1zysCpjSEEE;Qg@yTB2K`PwGe>467lV90 z2@%Uhwf9dakaV8r)(%Yb1E4D6_78i8M0(6|6t*gGupqIdA$p&4i)O)+!i$m`pjAwX zsLQ5pXJ&AB(2sLf|2SWAzxMKP0(&|gTfyTP{w)+rM}E>==pC=*l+n5M?!7Nxb=Y@Q-C*iyCVJ>76W7ePk(j!7rB~O z#fB63v?l8=Z6MOkeBI)I21so$S z%V)E>kH-I1(+DU(iz~G08BhV@{gwejE8^tzxe2>VEZAkDTrA-xGxmRmjz9H2=7UAQ zWM!us5iTpP%Eaw=eMK)hnD|T%nlEICNW+2t0wiu0Oh9du+eY_LHh; z?-Ra#NZ#Do_D|)~jeYl2o?x8dH91}ed1CE|z1vfGmh(z9m&$}c?mFjKIAJM__-6LH zGsoJ;$yweXQ0v+LVo1#lp3V%fUSAqa>_Uvf_I*hF?o^~x z#6C63M761<%yAsj)gzSfUIJ7l_Fuc7wnYrjGifqzW0Fx#-Z>}s3Li>TmbGl`7^Fm)yPogFB(K@F4OPtD`ZKECXI!~0-kz8EkJnG|?c0}l`RXOkuAT_619ol4st+p6kAnoA z$M$<{-uzUlKaN+>o?_sRY0-_n_K;kcm zKc@LGQiiT1j|rjbDm=c{TYzV(DMut7kTH(;e{i#bZ~!c9O3~_GBcR zLf*9N+YqLue7sk$UgF0OA5b?$DCm@UwkbJV`X-`fiQ zI!MvTqEi4}kSr;nnqn@7!IIvYImQoR_b+@t=|!r+m;9pH5Z8(M4g9cc|NE8HkiYkO8~g_)MRlfwqMHME4N6 zHs<0MD*RgnacM4*7|#0fwhr?Gbu%unUx+LnQnjdvAg2i&(ht)D1IO-(Kl+enz*xbY zGJooc&Bahn2;nu9VzRkmlYatw%+!*!$?6=F^K(qjE>MtWT~VdoQC=Na%=YZY66?2p z-hVSPb7Tn0U-A~sW!LR6=_N1CxGydl``9spcW`7!-ye><4}nPO@faaAR2V(JSFoHC z7laiP&a2Gg2x2&by zySA0&`+hJBkBknM&CtI`s#-&}V;=!toHvi0M`1x+2JD7|qdy=`viFca?(OxAQ<^;) z^RLrmC>U%NksYM5HfDs5y1pt9DB(1Kp z2>E#`KCIv_-Ww|RFdApHY7VC923T1<=gfV8nQ+};a)RxPhm6AD5+{cR1N@!IolC5* zPoP34K^DpKQDE5SUB#(+gwpWBgt=ZXi!gL{Zk2xR?eE_7Sxez~y*9~eErvaP3?v@* zO-(@>pj~%x%}mZxyspAh7|ti;m9;VhsN={%-=m@MIf+Q`t}(5zap5+2bpd?y;wip;{~E7e zzsBnPk}I1@2Y|+_x}^no%hk}?0^|V%z+?OUw0rB|jrZ+4a>b5(XYBX8K6~Ho+&475 z-|u30wr~3&L<`O2HWCmN&N{FQvszY&gME)a<Vx9Y|!{6y4iF1#S38m z1ejd_(-kn81JxwRZ+NmEt58fQn9&aVLUPKK2?{_@nKV1Aco>!j17&>C`eMc|3#s{R zg6W5`c3tapat z)O}kymf@mArA(-oyYA2`DjuDYZBW2@*b{S>E(cRFcl_YGc!3fTY$7p;{$Rq_5O4~a zd(EAYA{M~+4GX+t%lb7K`7Yw@m_fWb-GA!3T_Jt{R)ekT?bPE z>jwAJE6ZgVy1d`1Z*dXqti<4-rA@e4;+75mIajVKIRrbQ5bS&*(k62b!E!YwpI8gu zHv%{$ob8hztkd7z@JJ84(tX%6l#@FPQ~6OdOA%3Qw0D$hHu;vBS$l|nj}Ly)G(Akjj7{QO9kew5p= z$B~DBwJ0D~<}tvNs!>36@oElhf4TmQ#k|1T*%HrQzr|lZG-z%+bh`$-Pv4_le?dXs zl=MU9;}p7`QqIqm!$cJ^Z4&}3voK#vsI8ZLHy0K0C1frWbm%)$K;hD)RQLe$2Eio* z6!aB`-VXdaA(!@VGx^J;>&$ihNzKd{+An+rcB#rZ_FJ1!KV-P25^0mERKQA(9-n3xv?T*$*GmpqZ`kO# z%sbk(e+sy}UmL7IB5$fI>vS>Ax;Xsp(^z`Hc5goJ{zq@dq$sPUtS(F5RD6$EEr7zX zZO4pjyIaF=KV!PT##OPy+ox0f;q_~L{ho5{UNEpLs(J9n-nY!wwXD^dDrBSY@nd^z zceE@-dv~Wk4(MP&oqg}8yMmc5c+YNiqHtanc#C)Y-%qU@4=20$x@AA?5?8{}g@T~S))ht!H5c8r zjqhbaY>(pt6uJ(SE3(~eaee&-=c^f>TwUPVix;?hS>v|;5&rfI>h%vOO3$lTS4=o; z#7W%*^kz#Gv$GJkoiAB$ixP$@Ux@SO2pROj{>X_IpCXocrj%R{lN=@@)Tu(#=*tbm zJ@FRkFEUUXWbcM3J2HHhfg2~;aPYFQK*mojR(tBClif2tx)g4-eI}a{jjW=|r}c^l zN9rCTfRl6UeFAjOZdBPR8?LkB!?qu1*T|60F7MU{$0C3Caomv!Qm&H|5x^|$D=1P6 zq~fN`IUoGd@c;lI07*naR9SL`fqY>PC2gz7!i6amtoo0sa099GxG+T%$0pbTkUwa4 zED&_cETo`g8iRsm*e-|=uh$Ih`mPCEswOCx!Qj7KhUciHXG@vuUSwHVG`v;U+t^o} z0QH!&DB{rfX+ITCxMSDCygzm!BeNR2Qw|92P#Dt}PHfRaypd(#@$>WcSDT8{M_}i~ zlRALwkYh*16I>PBQS@VvX8i?z{Rz|N8c(Yl@19NZEdjf?ukqsLE1X?E;rqL9TI@GL z4IpFd{3BEM*dE@FGI;j^W_JOxG4}4%_l~`PN+#t#+Zq-s5EFH?zQu04afmyA0TH2(_B9 z))uMbb1??}h#e9aWmGfHQwb6#Av-ThR>X=ll`ZLGlD`eZa-hwbi*Lo;vM^Y>cUkFc zcAo~53SeTJetgC-_tl$KeIDA$LvrbOq1GaY{RD?8aM6k^-ury&O1n&8F8kYVp1*3u zes!H=4mmrT0mzNVFq~+exsqA2h>sIxJf?%=FohbDcWHH}WBt?Mv51qlH_CQ{uI`MB zKyRc?;({=ONf97cCpv2tc5vGdWkFo}Vg!bTR>N|odKao-2?S6GmRX)nVC%@6lo;<- zkTePI5({1!(Q_j7H;WLf%^nGRQz*9R`)pLnp7rdxAD+u#>>d5X*U{1>ltN*secT=bDHcri-=tuI1VEHQTVcFh&de)Adg z`U{>`dwlhLhHu`!!8h;T;`z&0m@QUZptNg!u#ICEA@#u4aIc2`9|7KDdssUVI*vJG zW2@w!(H_FeoqGQv#}e{y`sgF63?5a4Qo#V_LU1(_g)l@^RnNQgJ=!J!JP0ig!**#k zTlQLf2=#RXNC%ViXb4AjlMH~2;7$RB;scjYH-%;8%tTVe&kn+mNCW-YHH}roMFNf#T#In-)HFhGw;+ zOk^8KtYqNM0y(YpRJP3EOz#X1vmk5;Hr+uUU@W4sKxzo?2KV2(Cn(?yxos)z>aE?{ zu&?-ZeSDU$XAgkMF-8$k_k0BF;AWR@lwOZM<~xDfrN+u-URG(Dr}^I`#+7A2*;huBAt z9{Ir{!Dr81WO(~dp4TFbN9;IJqIE^c<7_&P5H;Hybi~;0zu*by*p>Lho9FnCZ@(CY>e=_Ep6ZnIru zN2_EB&)S?LU8yOXSJ+jzVZyv~2Vnyn?L+>K&2-9&AR>^<7ywh)almGZwUIC_n!}T^ zbb8EVVOQDNDS&606EA+eVEL4iD^=+|64$)lY_VL-u$%*ndCB2e?@N#xF%?w!su#~n zQp2xnNXSx@1-_gmYIC-d%?GD+%kmG9IG>Nk~4Q zD#fP)4!N%CLQe^6g=YIJIIy`rE{3vfSTcqUE$GU^MaoF2_R3Jy)-b;Et>8r~fQp5b zgGL=}jYj-(>ZfTDp!YNt*?2hyO{%vdv`%)K7e}}V5$V&Vdanvm()NdHL4%_~3Y{sC zQu{W`8m7<2oI1mNXUC*~(6EQz2p?<6*x6~@7TFlT*O0>$76UoF>3Fxte{=^}^I9kl=IsrhPg;ESdVz1>evS8UUgO!b=a{d~n0?(-=$5LX z)jqNB^8G)8yT|qmv^#b1?ECk5?LMC!hFpKjc8~4DZaaQPDh}x}-%+8!?FRL}iMe+i zqS1*@26O^RB~^SzfM>)?#g}t9!9}&FY#uXAhE9H&$Zh)W*l6qqtcHe-n4K$&Sox~g z^;kY#ygm{tI@RnpXi}=G&`qXP{W_asQcXCFu-@$0CTvy}SS~75lL}4KbADM_NJVVv zIAn{i0{Vu5SjeqYb}ujy{93z3zeC_^q$-xd909(WNIx*xJ7>l(Fnx=}^05?wDJRt* z6VA1c6zKW{xDg2~y=YQBknV$i<{;rNey0$Nh@R1r^X5%UlEv>viY#c<$w!hN-1s1G zmkM@riXkL(3J`zdH1Uf~))+H|l-tM-65e874eQ$j8M1jgDOzBy&z6tC)}W%G8E2(H zvZu*jE4?l*19`fzf@Sd{6k2&df376pNWd(}-Rdi3-bv9tPSz_{VCJchQ@{R6w7slp_Facks;){q~Dk`jm;m(>%Tf z{RrTjN#RC035n+-&th&YZ#S?xZ9wT}<&T(C136Z@SLS9%v{R%IF6`_itSO0^X2wot zL1HQ(v`_e`LVjcKZF)jhQC#R_E@5sl_-9Z?$4}u`kv3`f8#MKf!?A4gPv=h0(&B>MT`KCs>;*fC z#S&ih>bN)bJ+pPrn^c5R+Us`+5V*he*)Z*;cqFl^#mE?)U&cOa8>Zrk01Q<$JLuT; z#f1AF%^&;S4Vujjirp71+FLxY8oYZw#kX(XFtB^^>NV!ebAGmW0`OU&x=-NIk9sUW zw#W9%vNeRAX;QmpaN&mV+*o#v;NTyjp{vn+1hwnB{?pb?UwWd7BO z$;W{{Y&h--aR=t5$b_1|^>{LdPnyl`iwgLIkZ>sm_%UzG+^?~@`WV0){yx@*?~@!y z->WuP@Nrcq5DrT;6U^sxT&$+JSXH>)v?2!UjfRJSBAQ^G##0I@+NA$f5=QJ}SP^j$ z>=OItJM{GisJG}gU&16^O#-N!N;sDVURRRwlYn+&l?PHH5p={mD~wnv z`9=le+$6`AnB~-$vvh&M_6~toN*f5kXQNf{>IFZGI37?8y3~Lw7mm&a6 z;4?jwy$Q$r>@b~Ejl2QS6o3}NoJqIJxGwwLn`bK&V3d&wcX2V-qpfRnBx^!BzT1#j zN8-d3-X%~+1ru5ECEXbQ^x&aGsYbt}Vb%xn@Kn6(Dv1QANqkZqLcBmcq5O!_^ zM4f04JIayg$*azxZmHnag4ggmj+d7R1Ph+5k@aW5GJ82mcp>~oYr+HgrV_g z^9if=7BA->U%g)9n^&*!{_Sf#d-W3YvkT6#+qXTZvoviG)3;HkJVoNMJ+@!IWg*&o zKbQ~r?0vugOXlF&@N8KGP(ly7`l;^sp$xqjDU?XV#{~DBRT~R%xF`u@MUTzT01(>g zILtFe2Ie^2N?~C)p7ZBM2CD-gCmSCFarXuAW0lVqga(F1&a(^EVpRFHTFmh5Y=)1Y zw%F9Bu%HNYFbBwKJDMK{7+DSoBr20?SsC)=Tm)OTB2~9Rc1sPq{Vn^rHm;1hF~sx* zz!wTQip9B9?h5dm%tCHc#r$rP#^?mJpi2NIQxF!#inIc@%mk1P6kzK*C;q;4+mp+2 zybM_}6^vyVj9g3KQL#iFM2Ocn{4cS0>@HDND2er6odxSKk_Vd3x$lKb8FudbTELu9 zYxK5YV*L3%xTHAt*~6lWL+8?AuY~CoIe7C&kLZ3N@6;!bZy_OZTRrXd9;w9Du-_@O z?eoP^c%x5jZ`2tIj4b8Xkw9_h3YOC%pV;R13$Xr(W%C6u<~{!K{sRB;)f>Ej{}z`| zpJOsxvSZJtru^=$M2SS>^RYd)e{g${Ov+Dr{XXs20F2srwOtk*id}Dsy<77tEEHID zGFNyhoCw7YZm?~o(zAW)|1x#)ykG-1%qo-C5Y&|#c2z(Z!?JdjcVsBl34ZX}Ljj%* zryYA=KSTbprO}|HT)cfzqv46_pDp!e zWFy$~62#ka?5f{~Ifrb3yyNv@I|UN$aUZ+px&n0qh!ucR z71(}XV>zvGzFOeoe1;DYK2S>mbikOCBGye2a4ie8u7nZng^H-bpCl2-UhpJkF3C)e3VY4go6E zYZ;DCW)(?=ODY}%?Ykn~bC|vtw5{uK=QL(zf}Dl7x3WQVBpyaSAMR zYL8LCR8|F>gYw}7n?8`hAat^p+`Dx82Fz>7-}h$1RJPKK0CE|V-yr~#p6|lk6$N;R zzPw2w+lf7xvRdi&@SLjcSJw!j+pbyOgoTLPAVf@VE!FaZL$H&%rU^_#V!niMA>!!} zi5AwZi@9}qpGT}}zPsIrH?uwC5ZvW^zF#}BXnfEy=X~Mtj|lRe0y{(?pT*jBOi|X^ zzB~{ojyZOsxe2ioqk9z?yAHecEt=0C;MPB4>DG9?bolno1^)20Nqf#1xiNq@%%!_8m^*ea z$3BaZegFgTio#CJV6DJC0lmc>^TiBLFBkaRj~lGXDzok3%K!#l%xx5_g($jV{G%KO z(~v<%gK(Ym8V2=I1|j6H3FFe2{G*BKG0aH!yxs6mzx#ytrV!Z``dI?AGtT3y=4ZyR zU2NB=z=K$rNd>2_xyD$W0iPC#aPDB(Uk{%jzVoq?RgL*$Qux6Qk~}tFWUr-YWnxn` zRIFEv&b(!k$VUKWU^V2%CWd58KQGo51YuqunGyk~raxGw#qQ#;&zZiK=Rt(Yu}^uI z*|Qm+iv%n~9%O-ubC{G4l#S6dixNU(37h(C=bj5S3O!_I07HIV$$5-U^KrWlEsYs< zunXh-tE~tT({UCR=hIE73U+lK7-7x#)PC9dK`78H2%PLYdlm-^pOFhW1{&@Lc_YvI zJ+^ynTSs8o$#w`NkL=O-t$OJvF}KbxkPg~FINQUBSnEPij=v&lr)emjP&5C16TE)c zpHZwo;j+8Is}=C|t1Eo_?j_#6evK=tid~#BW4tE|vbGUNq%M*IE;8JY@b0nw^V+|4 z6|K!*BT%>7Z?WBlpSo^kwUt(NR!@!wUkXQdt<_OWN!E}GU5bD4FkYl;*C9)1^XU$b z?Z|6|kutGKx%P9wI4C$(WHHvpO7(}pUqPy+Vral*3o{4o+ZNN=6j$d$G1U8Klm&_ zbAmlduQ2E%*@~4Ixv#ilw-6Ah1sv?YK|j6%4A|r26cO6ULTG@A@^YNG56IzVVcY^4 zxF4U)yqO@KUVw0#$(lbh&4_t!;(r^BYy0SroArajEHH}FR3jpK0>|ygBRYoa?1Vf3 z?fQKJ!?D011q?IcVO>NOfk7moMw^{g9#3XH&Zc3Lo4vI%oq+=N1~%M~V6#Z9_(lPO;(zQa;1(QDDrFjkqR zRwSOWH`m3f)~5eyVCuKtM$g3CFl@S3%>HZj`k?#h_tLLE0Vj<`RqBSixq1^-VzWLknbfLH4+_ydCyLTOr6Wu8LHx1quuc%!x%-?L;SJj?7q?n+PNv)Sb zg0zY(=*mDGGj*jDNVp8x4H>&rU{25JE`T>Y&!3WSH*CZEKK$+&n+K5<2+TxaT^KMg zdn{KoJiDCXhtFH=+JgNURlqld-PBw@0fjj0*-22T6%C;qVk!TysVLQOCgfjs;V3dV z5yG6kNcmcQJOMityz_gY*~2$C9DeChqNDpreJEP3t>DOcV{wUs!n;(!L7-1G`S`Q6 zXOY^8%#G*(Cbmxjs8(64$!sd3NI!ack|tgDBo({Sw zc5#KG3i2rHUCqoe+llpEbf2(`ut$*h*nTUm8nQz70eKGvWWV%h@0&NKAyx_#vXsa9 z1*VfJ+NQy7x8;GkqKDq#3EwBsM1>LMbP^mK$`TcYW2#dAE;#RpL7hxM3h?Z4j)Aq| z&+uA}F?9C{uRe5O$p*ra>pKSSvXCtiR7J-Sf(kA6y9SGSg{PM*oXx*rw}5~GHve5DAVTxh&B-`WrZMldnyqW`=wSRrk)~`$UQ;0C$$H`k;H_gO~he>?89in*StJF7h&siW;yG)4`?}j%JH%R@dx>q_Y39T z)hx(6lufbie&8|>9oxQuxab3tEKZ4L z2Jb!{bPPz@?~SoMcQHfv+1FjUV}9UX0nwIIa6+M3`g=B;;n~yY`1I^EuD@Idk690P zWvHquPHf7~5#vX%(~knYEc7Z$_`~q)7&x=%UKGW_@t$Jhj-CHqm9NJ>Z~s1)zj*3* zCoAfr2orSCIS$j-`#rY1DHii7E-udS{BnWo+b^i8+K?tms!AnmguX^^a>ZgUk_lnP z!WKh4rSaZJz~Q6Xe9||QjmGaC#CerLG{#(D;L?jcg{<@q@8yJj)X61GC|&T{rHb9{ z7j#95j(}V>1E#@sBlzl`0mSSv;9CViSWSfKo5li)#He+K>FZ*V!C@J0}mmq_|qV=CMGcPdR7_yeH9NXPIwd zZ6c7dle)Q`dY_u!;q%^cSa!9MVl|ryRfx7J`7E4e?Z13B^%Fh>= zE*31LU2(C5RKZH25QD$A9prc22k=BF`~Y}la|q3M2dNI;-ZOp8XOM8P)#2;*)x(8? zWzEMcdyj#^WY(B+Jmnu}9Vd`8*0x#ZzSlDyN+%_GrtnA@r1+eop&6W;G#Tc?0Wt|-#-Go$M!GLsxc5U z_L>5zA+WfMSvvNoV=vJ5^-ocPF?*~v^my9Cq<9oj|SLPKr6 zn7WS+xfalgBY-oLp#sN1v^o)F9#RKTir0h`WwK!ryEa&^HCtf&ImmACE{rmKiIvc*R+Vb;U2q2p=iQ~trulQ4#}^Zqk{Nzt zJInME^u8EmE!R#b+)g&r##(`qtUKQuOlE<&^?}ubB(eB{EhtKtJ3nT<2YJmCd*u?F z-11#y#;#&bNtdvKgnzqe@K3&>H|#QzykMu8&55mB1qq#4SR(}!QVAQvawf6Q<4DIF zYh!Thbc;ZEbaNH}jxetyzv=-G^IY!_SH_+VH+X-zAo1~EJs*!j7}lImI{dVKZ*IIF z0Bfzv59twQ&>1A}@uK9u(d>8F-+o5>@YT~f{`l?hhA) zFM3~MPa^L7Ju`NyPwClG(CAz~w#W7xZ&{JWFTE=HIeB@fwt3&}>1S#61qta~US8sx zZ@$6Pr%xG}D3}{_int3r4#C|Rn>f~fDmWVhllJfXY-9M^efK%s23;?@ZnUCxl#Jd6 zmk@f*;~dMy0?(f;aeMm#n;qq{odE>$C@jiJ$tJPCHy*KUY2{F{MxbN9C>6rUkFXeg ze@MB$cQKBomS<73O@w2e3dd5Y*k~OVrUF{QB9sF-coc-gQuhm}-9i#1)_+6juLkI6 zcN>DN1VXtWV~UpYw_*+-fxUAM^A=pVF$*jo$u?A?$0zI|>!neiS7)krl?@A&UUb1= zfoZ39UIsYnq*@F^sW6%@(zn!FEi!mP=Q)8%o5h9%fMb$-A1{qmBSqPfXai-ALXYvT zC)~wi2`P@CLIhvL+U#Dysbj6V27SF}ojPXhh^^c2IIK!S*VS^#Ld2B_5ffX-)>L#Y z`w+tQ=u!cIWsK4h-EqYKsAieLz|<<7i!z6ii?z9Q3GV&UXW}IcYk6}O<-Qv%xyaV* zbEWAah(gdJl1^z5~`B7>YGpKZ+<|r`G}`(i}zPE{PF!;{NbDTc=_fH zmS-1SBt?Sl`(2Hu4P#E%sg30?H-A00$M%nGF+@AYPGygoDFhgO3{L>V`-W|YpLqz_ zJQd2+P%YRne~M?%o-xqtY=W%)e4j)$)jM!(oA>$qRCx7Ni1e=4hub*Cat_(ov1@QK zx4QrUAOJ~3K~!d$It_7KmX%)X2MOa8%9>23n9f>eMeBWy&tE>H>za`Bc(%mV`3(DJ zjjmmz!-7}W98%@&ba9Xlg47Pxq`-VqVKJ*PsY(uyYuk3tq5AQKb;5gyVXxyvE>Q{>4Ic z$yeBAS$6R%hm}DLz#g96sj#fwQToN3J?NcA*6#*kUHjcgoLh10K2`L%U?)bQb8tm$ z83c;Eo*hN@R6KF}5!LP!o)$a2eKx_juixU^uioJGo3~h9UU5nV7YfxO62T5f2N8_N zQ0!y-*KDIQDHiPAl}C39gpGlxhlDF}0`wgF{BXMpR-#a^6Vv?JEWU2vx1g>cR%8v> zx?_24!_N-S@fZL+1?0xwKXnXaf8Vuz4DuK4b+p&gUgJqsVL4x*Z$q9+y{mEE_3Zmg z0PWe6GY)fnUN@+TQ7Y!4Qkjcf9f#4%(qUQ^m`~}a#C$rzVit_oxBG_2{F-Ge#8Cl= z;l~KBl)011iQr#lq&zggtH_E7GX6?fs#5?jO-93a!_-*hp{U66r2H&zLek-93+%S= z+fTvRz*QkXkC?n^$lVJ+=K=K1RE&8Z^!sRXlVkSE?nw?`%ymFi)PSjRS@PF5*aHaxqT?{A#7>i4^ z(4lF#3UXMo3{aT2*z$Bwo$%$&K0zw#VE64X5U z-r(uJ*Y;a%-6fS3&pgU{U+iXDFbF0g6+RP|rYt+NcBH+ggx?2G}l zQvh%5JHyY|*H3}8Q=hpDWZq{R!*f5j-Lbq$0!{>&SIZ>>m(6B_wrkj`hrrZgF~{?# z=a^I^e%zridai6M+=QZ!n3e^m(-N~ui3x?vNNz^JK-&eNQuG~4HeQ!JH^v@Cn((=r zvI~q70Y(*?7M4m^;jw>b`E?IZA&8$p$QR0fF`xArz{{A3UaZ!Fr+BX8{RrabQW~=Cj1EzGFDbEvzo|4 zzOg1+nYBb0LY*b#f+U0)fk5b2ePlutb7wDWd}fO>qD-Eg$;h3=h$-|+E)$ej*VN&f zPAW{!NVs~Htm&v=LeetgJyM3K>&!9!<5;>=J#b`MW`1{r*N2?v>EpM>5>~Qk$WX`6 zD%d{}y6oeALkb1Po;m%mVYkyu2H+Wsz@UFvg$m|!!j2Q1U)Qu~xw`!Z-OZ1vwjc4l z+~NJJ8NPk{248>m4liE4;!tc+h2jYYceEHF#*Rbq>F6E{C?4CtORI+9?iARw?XCx4 zEOdC^b}USMs-0pNhoE%G*o^_1A(LgdI|j~90kUJ;86Ly1_~aPVcWRsWJ?63R*y|M; zjX}lO7=y`7-gJtyGsii2HHE_Zpg~toDy+_^SY?V8B`vf5aL9YCxLP>?y0Gn_J6P{q zR);59f_>d!zi-etH41d7T&Q#{l%3N836iW4-{Bz2TqJ9+=o2=a{PO#CpLX}6!&I}H zs$gxwS}Wz$B}WgBqVFT?mO`!#d{YC>M!*sklu(}0j6=I_vXCm>^H9JsKZhf4U8>|I zK*%|N;d+GK^~uVOE6J_>mzh}gl678yosZIdfRV6>`Fy&CAd2iXted5(StcyM57Bi) z$weS5nhE5e3DtF;L$G8SM$#rEc|jnLiXZ5F%h@tYn$W-ONHP(*8o3TsN$YJ0-KRr* z807!0w4Z+D$7_1iP4I)4M``T%vMve+xvX)ag8{%xf2#nu_qvH9ELy}$tQUb|a-P`j zH`ssv5&rYvG1-5@%V~?Ro-gso_ut@~uixR>i4#z?!Xf1P4I&8vCNy@DjM z!P4ep1UTh8rSB&Rk!aNwB}D{%a6!r*zTN@#bqEVH%SU>Hvjq4^mv4Rn$6?)7EZ(51 zUKGKP7v#L4lWLc|bz{{o#L&MNkS7*Q3hZ2=OrM6zg{>B82{|hwl%-c?h=c0OqS#=d=@}mm4t{n@2u<0b+v4r2~Ef2 z{H?ZA$M%rp9!RQ;d_S&L-0&H2`L|tQ0Db(@$Z;4z6$?5HyX^JZQf)|aP${Jvy)T2< zF!{t%eqF=G6CW_!eZ-S;hp*nO@W=OGGh_Gs|URrmoxsfiDC`l%8ktZVhb44`i1q>3eQ4-BqSW$G&Snm8#I(aPr!~+1Xin1 zEJ0PU3jwoKg)DuQ775UbNM($i?I|&V@L!a<`zN)7T+BkMuyHV!45}?+I)IKl-sFff z^F9gAF$B;$V(eUrw(YUstV31o?FY>FpYd$k;Hx(a{Ndd@eD$7y-5V?~E_u;Ie#G^z ziG>rr?!*7IDA8kkZ2xL4%fYj4_}Y*eyKnoc-#fO?QvmJfHp{FH!fhG;lh}S}x zsw(*>h)h@fdr?-3A%fw5))(x#J&ct*cHQp-@Q!^h|GZ(q&C%N5V@PXoXwlgsTxI^f z7q(4v$DHW<6>-0Npr)TM@SB43l{{DB&H!ThD1WKxM7ipQyn{;q>f4}W+B|LBb`;#x5Vea^Qy=AAZ)u0O+cGUkSQ|_;g5B8Gv z`ZK#u;Pyw%nrl3tb@=w(IsW7QH+cWmJ3M*z0@K+7y>r-6wY~2+hgZj+IJU&``VrVY zwtuIV&m`I^H(=yW6cacMmz8Yas%pkSj(}YN zcgaP>sdGpS2abRDtwW1(Px;2m0jZ3xDs~8g*osSTqsda=O`utRR7VkOs^BL3%{#-ND2`vfJ>k!p4`0w+3?(t z71|tv;X`KguIqd17)}Aau|AQ&t68N<{#trTwp$n-KJ6%f=5VE zakVZnd_kh+T*A5Ohu>p&4sq$widhrJMP$s>?ZKPLU5>wy=Z$_9!Q;TznY_O2@eJo* zQl95@DgwDh!242toY|o%*o^IQg8x;T>9>Hr?6waN0G?sfI5mL!5ixdB2tkb9eoJ;@ zA;)gse8G!Zhj0FHjz50$7VqB@WA~h`g_fGBCzCX6@yY}O~8DPUJEczb(bx8-T z4LGzkr@hn?s!J%$buT`jebq7AZqrk}LQXR*@*RT?J>@!2{ zLv6(C%Ns=tV=QKD2=PX&V zuI`?mot@d)n_ZFnc7OLitgNh@%*oB&PIvE2ckxOJAb|uA1ZU1qOwG*Q!Vy3sixbz9 zC`5XAc(|LJn>~A~`g9d@3ya7Xs}!Hdq)u4;uJ5^mu}dyi&wyQKzj9;G-;E@T?=!wF zZL^rP+nBN2K6~5meAAf0w{63W^S=v(rN5UB@|^|nkOB$!xu)BGQ!-{6)zW9OCX6vN zsi5n`@i3SSs1P?BoTYn|0GF5~iGeeXWFa8RI1#vul$b;@um_-L^f7QrVDkCaRJJ zt}t5Emb#LyYuHrvBR+0i7S5sMjmYmI8fg^hPH}mbARJQl>xtF>||5^}Q&{W|tJxz?mKf)@Mz*?*R9 z#q}>k1(z8e)W(VH|xNdvNxWn5j zo!oW|U^e)ib)57$-^vaq8)ke@OZHJeC!eYSe~~0%Q9|vd*^bLSX z3t^wRYIz(V#qu$CZVdK{T$tI)Q_+52UzZ2b(8*y-$#o5ySSsj3BZG3?kK*E#jT8i&h-$jZWH}+3yweHauTe3m~OF>>A5pM&6@4`^3z%Sme?u!J}-OwNdclT1cF+=Kx7MP? z4+LPo>)-jl?5A*!_c@1I%pk?NnHnWDFxG7{jLantYm_=SdsPtxJ_KOb#%CIO9@+O&Pxj=~fn?FFt2YGRoqmmdi?#cvBra z_3vobKYp%|;yYNJ&nhPtCcrMq$OpfF6uc-h1A(=$0y-{;;$ zQ52IlEN+Rwm7&9%L}*=(aq_x}>+Thh8zNT;VX+#I)EzW2VW#E<;btXaQU;XbIImcy zOzbEA7f-Mf#Az{$Cu_x$3z*nFBmS~v3#p2TI0;=#+%UQ*L1q|w>^5d#Q2vdbbP@nc zS8zHRB*pysw=#i2(v|{*1@~a!!YO9s+r4m4066orv@3T8z>CtZY$SnvRQO+t!%Bd~ zKGu@}`bfG|!{pzb&f|Jy1o-?h&(K9V8isvEk95fqFKb5FyZmQ6@AbzurnMV$4EgbF^FkC6!@;Y{h6 zNR2C$$G>MX$Sk%mZq^jQdz+hg79doQHT6=9?#HB^DygD^J{^)Tn+mE&G+kaz#L{VT z?4HuTp@+z4uOXs|LAqxVF?LLTg#o*A4EEwuYqH!L1?MxDpTz-S1d*YeByA7~B+#dn zC6o0sw1nZ~E?m)1bi@pwtjj6|n16ndLVb3%Tejc)j^xgj#8`fWNa?pxq+~;jz1Xv7 zS`=r=;wu9fa9O6Bg~F2x9oqC95brAM9SGKl0VeK#VPQHpa=J~xjrJ7)Lj_7wYC)A%QMDU&O_s?@ zG#w%K;mo1X*waO3r`TUN5)dpur#6dq*s!Lc+&X8nJC^B@F_`aAiRJ8a+A_oW1Of=a6oFSs9 zP2GvPbYZgOjA9bUr&in`z*mH3a)}ns95Hb{gO_&;!kFC)<9ndQ^TmBUq&(ah_{sh* zD84z1Xq;Y!OSUT_)~;AAqFgS+ zVp*1mXcZqu$%GS6)Y4Tfj}j+iL==<_IX}rN2(cSZOWegVxJ#~!e?_MZVPz4P> z(Z{Vpx_yjgOxj0vfKJ8634oW@2$TRY5OIN_!U)dVR|Q<(6tvyN?A=Ev@U1T4xB+wl zgs0;KrHfzc;DsVPSC$duE?tq#LI3$YQ`a8?V=lrRFt;B8znlPh~SeH+9l$#y@zGT^tVlz%?R>cX(cveis*u~|< zh_ExDF$R?}c1$Nx)8TqPCVg2awgr9MMlBj)wQ6E_eGR*t>sVb~L#bLLK<={JFqzQv z8i;2hl#E@L8Jk&V--%@a?^j|m`JgdS!32mM!1H1ICagfCi8+vZvx?kFVu`yd#&?R_ zGzopvW~{um7!=B^T*P{F5xK~6wvAG;h+?rs3?6f_g_b!55~sBAD5G+kZIW?yag3at ztRT^5B!JXx7Z#Tf(WVnYB%Pxti66R%EhLd>J=ymrlc*&OWE|%f#iG+v`bEmU#DFff zeHP%m0T^$QiQx?7y8*o0bOPVb49flaeNBS$6%Z)ygO+9?l?00DMiK{S`9c=Q7jf4q z1@AMVTwRDTQ+94yWa?Jvy(W@3bSC3sn9$9{6|IFy9N)AEGZdhs7Q#ndUM;D%p#s6w zg6Jn>vw@v@Z`BXvz2E>ZNoe8a#7thJSTJ^huES??C+-N7eg}U00$TqZm1u~ydJYfP z7qGXpg|&@MlxhufuQOtmG4`(SQD$tYWW;J2W0zTG->GE)?^j?PFlaC|4aK63V%bKg z&+wfG&xzpM29Xprm(oBRO~u^Brq%_02Y{EX#5H2iWCDZ~LZ(t_Oj1R}-pQCZ=~0WB zHiOjL1XwU7H4}pd0wQWq_*8~y0zRbMRf4}rGCYbakxfLgyHmLs0tXW865GeKe2p03 zDcQji{2R|Ue-{hEHS*8EMoj@kBE4B%}54+``4HfApk6cH(| z^eCJO661S<>EDSNBPifb)YFyVi~U%Pkdxo?)nh&Yx;|FB; zrov-WS+G;gtJot3b;*fqBF2tl9?e|L*g3-y+(8F^_X^tZ3N;L|UbpdJYa0)Cx3Rpk zhGL}x&B#$wmgk9(23grgxa+BDZpbHPmRV-s)(GHDui`TMB^f71_`uC1C~CD5R@UY) zbh_w`Sp7zyYCl?R!h?u?6B(1yl=Cqe@R4A7dU4`u*FT5zZp58}`C*~g6mxe`k!V)(+4i(@l}kHr{7KGWsvBhs%CGO=x{bDBqJ z6)2XE5;X|yamG)x3Zm3njsPD44F+Zyj*9}pA_^cPfSz<+O5n$1_|*7SUTc@+e^hyv z`y_27!K(MLDD|b3DIW4E8JX1LXX@Xfpz&FZs%eTiJBwW8J`)@ELU@xQoPHZY_Y(T} z8gu#>>+^Z+uJ2%ba~(@7%c#~GRC$5{JJ?<_)QSdLg0y%Bh(-mxI0Ta* zP?P77Y@1FVm}Wa-@FBp8CMNj=_;9c)b-N-Fl%AAa)o!?>WIL*IFnTO3Z72yNNfxr) zhkb5Y7H1ble4)HY9ES)Xqyj(|uPDlevA@0&8z`%ZNOn*%g|~sgS+3t%Ea81VOS65U z%z%yErAdjkP{i;Vg6T_STO^C<0lo`(1FCn*UV(7!QgVjPfgX?LtHe?*hF#>1x4y!3HZaeMq7^zsCd)1qh~+Uy`g?8Dpr& zI(AfF*vb(z%GkHbZ~&)sg|K}NZFG&AF~R110gtvfvAes2C1UKVx;_O*p#M-g<9zrJ1;*A0H zn05|er&oC*o#!Ga`IMFcC4pcL7 zb@kbim0sRu=$Ve4Q+=&dZr3Qq!YkRZaoiy>jyf@RI!m4~awJ{jv2nxo;f?!(vAcpf zYNDo%u(D|5!NwN$wl}f5v59hhjyN zrW&E)=IfLyi+tWfqh3L?nM1qflWWv89ay%gLn{P`WtECpNLYZRDTxyK9x=KC)X9wh zOH5({B!y87@T8lKy)+RIM`hCpwM-)(O=0mAN^B}-Fa~?^wuCWJMU&&>#aXoSJ9AG()6I zxfoM`bdg<5yBJ!0&m|j3XC6e-mlp#-SuReE1Dy5msTcb!6)z~?V}^_OHurFt0-{lT zUg8xOp|_G`iYcJTHS?lqg3x8JE~251P?M$B^4xW6l_*0O(yeP3VdRR?86Xt8Z<67I z0`#OCng4DO-&YxP$oe&bZCy)bN2C^C+!dpkbxuMfZXc)P#1Q#!72wJ3VW`LrLBxa_ z+&yjDh|C-U&43s9m<;=HI@gFgmoUan%rnMrp@aw953sYdjiuF96pB@1<*DL?|fNVau{+>>QXpie+0s8~QeO+E!Cn|}MvyHkT+fB)xr&Q; zn(ezQMsParP>4~_0E3ufC}mw^#_ahq5af)j0A(Iy`ItP5CaP|5;KM;*foJRHxkL-S z>;eoX(9FOdtE($w@3fG+cqNk8q&rtFw-z&z;dIQX4ByiuVyYzoj3NaDrXS8YaY%wX zB<^FyH7lPXim?;SBm=fy7{Qx3@SF*}VUJ?$w816jv=O$JN_e>ah+MG?OUuX=N<1qT z8jTf9pqSmyKvaH7Sa$7}^UW-?%)V=ro)0;eXD-@bfvJ;uqPG?ypD$o_brt1O34_4^ z6Se{;`2t?t+m9z@KYlM0HWFqfRM!kM*`qkC)KD@_wIptdC3*OsAA`;~4lu<^(WDXA zy;YMLI1>`b1xnBrX(D|=0vrxmr{dq@_tRi->UZP(2`ypu6aX2!eW#Kpl!cQrziIJz zA_aJHH>`B8X$kgIFcm)iyDes zKG77s=~txfrl=4h`AGtRK{Dx!!HD%Omd(vTAoV$qv&m`qubL@*+us=YsqukvMs_G% z%Sov^nXwy+Dj4y<*=HiYj^tT9ACWWScueP&HyGQ+vUPQe<16umjeJ?WFOrBaPu$>| ze7wG{#oHrH*gcsn61z<$GGm_$adK8`E$)L#-RCLbq$yxuWsBoXRngm6<}j;VLm9*t zB35}qGpKzh1IE}j5q2+OI&Cai4%Qd*c(A#L-Q8U*udbm`t|4OXTR)`aiNK#u!jX%> zj4;S7vmej+JgmWtlu079U#_VxRVGQo?s=h5K&@KE%JMQzk}jKASsh6F%O+l?SLM>b zJ=f#1Dq;fmT$ckg2?!ZW<4;erk(`VpnPI3Uv3q(V%fYq}tRaESTs}uGVwqULBvf?6 zh{2&5YtI>ReOm$|~JQC0s$`W3Y!VbzW#?=W_85k`oNhNoS!C}Pp6H_NJllde! zZz2;T0k8_z8BjDCTWeVq^C>|h^+DI=ea-V?=5JPPp9FlfT){WD$$ofyd|=E1%7qLA zc!5t$AB7M20{le+47x5NcYtVkjYzk-JPV7_vkRi~Mp;zdC=m!Was|@lBgV`S0Lv7$ zpULB{#Onn@`%lL6g<&l0t;U+h$wO*)R6t!M6MV$J^c-0>xt3Y%Aya&D*mFGU!s|2< zw9jFVud$HxvAtHu!<{{BY^-5!agl(XZrJbx4($B6okdAHO<4eaf7v3LWtQ1HSjOP} zN-PFK!f2uu^;~7l9i%H)mf4yyVaoU_a<2)H#~Bw_fWPFk7znbzR9`ZPC(=k{L9$tf zCX2}guH(QMa4;8(2+NwY22cKANg`Z(&QKBxrp%;YddWU z$tLG4!CN{gUuFg;;4Vx6<5W_K%y6Af(xjgcHQ|Qmn+cek{GPG%@uhqV0|t5?re%_Q zp50dn){6RC3gFF>c~SNLX2tvwD@gs9v(UZ>{HH!FYM#dX%VWrW=y&|stsIJfhYa{p zX)X4bNzyn7eFv=CS~TPh5m8-TCc?}BU!HXMbe6m!5;+*?(@B>v7rS<;>=%(WY=~cfgGc8rN#8cQn_HtZ@YhfwdxLeML>$q?nhi?}Ek}-&CvO&Ud zDY1QVyq^|>2udCh;E;fzDM743CCGH?YBZ%DopeX)NjzGRj{Os+g17hsnd%UUtX^f- zQ(VSVAad&1N%=P^`!WUaRB#y2rV4YWoKpe@RVFe1)#=NiW15LSnBP_CaV|v?^M@$W zt(&UEk#hZN0$s#O4>HhR#96X?0gBlQs4uvzPdF1|@@&hdenu~w|BVpMWZTkxaFzti zEY?r<%k*Mp`W0|iS}@q20EhAZEMAcMwo5>e{sz*e91+vUf13e52Z7V0b7i0kMxNL+ zisKV{eB{o}3BYG3Ld?9}n$9zKW4FB$M;!Y+KFr<&4`n18pqiIsPJ?2(*#uGTh zKD`z9n4uSHaE(6xcv}2+uN91UV)u25T+bE9vA&4H@T2D5@8w10wqIunPv7< zFgf&d5?f1t#n?ZZWIcb%CFh4h%p?%Ip~lQj#lCUimau=KVurzip9F!rvX3Fy4mH_86H*p3 zL1QX`goT;M%wD7bL*Y^*MsV6$oVYdBMwh@b?aq~M+8F>7LF~Q&F9qbL?@z+^C6zZ+ zW>6kSb@?IrT|IHVvi}=OETS6AH%%f504PhX1-uWib|rVL#X|!EUk8)3X7`@OeXo3GjK8 zaY}K7Y@6!{5a_^j`HS^$UbSV2z#k$U1DrQ1D|oQ8g`K@!EG)0V&X zkLhH9=}HC(OTs5lR{?l@QgsFE!`Q$Hu|V+zEGJwk#Ua@j;U|kZ`osOxy*|vy@J}rI%6Gm?u;6)1fOMh=B z$V+}mVfs|Sev^Gsx5Z+~$&V#qQ*{%^Z{+WDwvJL+6jqcL0xYi5G&tb3BG|Tl1MD-F zm$AAG=;v~IO1NP!#^%XT0w`cjGP`fQJk;r5lRv@3ue zW2GfSNkDJn#32o?C$>4Pzq;^U7lGSBG&G3m3&@?yT(*qms{y4tv_gfmeRhs&>l%!i zW3ha?Au_!+r7vmX8pOFxMhJ&pMExcuPb}tr>}=QYXm1N!J3DABEW*kaNC?_x*|349 zxULfxHp_<1EVG}FvBy^LGIiq$brg)0fV)l>atT-_-=SEWuxzZIRiO z9L#wMBdAQWt^jn7jQyiYRWdHjEv&eK{VVlQWPykOFn8iR$bqU`D>zbyp zmdbAt7`_n)I4!^|`98{!jwFN10W^IY%C_z3(cwJbX3jcFJD2w3=&XS8dJ0rm9 zAs>vekPorFQ^Vf&8a6i9F}JWp$rDV=j|meyB5szXPQt|ZuHTUQ$t<(Xeh!w!;AM6% zdt0XUtcmeH6Ri5Z*?>cvVsFHkrhYdDgR09-fWawOn$IU&&aQ9(D49Z6f7);F-tzntR#1=G!DN3~LF8r!S1+>NQ)V7TE|KgoR zJ0b>w2|$aI-%)l{e>;xtOC^aQKAfJqU#W8sdX z)T2?KfKT7(VK5q?KB=M6XrNpw6Qjqz8%{z3d1)np+xlRdy?YzecUy=8G;QW`IMxG< z6H}tNWL>C=LdT4sOTf-2Hcv3q?8U+q#v@EdLyX5Gj7DQjCJx5#2u?qOAL;NTgNrh2 zqJFL>0G@cUwlwqzMH84W+t^%cV0UW`o0}U1?5siwK^S4ofb!TOA?qMYv<0VoP-dBB z_H#7FMVnb>(-Yh`u~~6`w}HdkSixC9aB7mpG=oKn5lpl-iiqJ+d-OEx5>5&2rYkYX z>|Z(2GPWfKe7-MaVnhs-CGk39+hZczjh(T(i0jL5(zMaPgaxf^9MHDb7 z6G047noQFZfoT~lDDaz%&AMq}vON|?PJrU{IG{?iByo*M#p{uSdy46s5eup6wkgsu zx^QL7jA&c4sSPxpCvK2Si0G8**;FU6K}`(p-(o8^vuTi?Dd z3?bbQXMWCrmEfl7x6SGF<@lKhlf;#&c)+-i30LoAjPYoIF$2BBAx5JiCS!+KY35F) zJ}lj`5$_X}7-ici6!KK9W_4)+Yilc*TUbV}SVkCWaJ+!nY_;C7TnOmj@Y&BSv&?>4 zmN9sl{iJMaa%R)bEiN<3qG-zd+hWvY62(-!VCr|KVgnT>P`Yyi#RcpNS6b`_mM?|< zliPhE4--g94q0(QR-q7QtO1~+IZVkyUDgu0p2v2gUTl=v4SeY2mwB)?_1)omecnZKL(sx8@AgW zbUSVO?&``awzjsgxUfLU7?L54lX|`byX!c&xp0A-3zF%E6^juG)=gz!nY5!WMx>@; zEZ7|JY+Y9-Z*W&GXRCwwy9}I}mW5o-MlN4Kp;$t`P=di~?nV)Y6PGVaShjlLB2i79F|Ptv{-Z;gEv)ON>lXCW`G*GT}6J80(Ju20C;iCpp?1Mbh>WC za4374xo8=4$F@zzjKS;T{QL~PULVIt$2dDX!{f(~vA4U6#l=Mec@j*&&F!z43XB>lt*Ix1_;&qnmcK$KmJIAAV1_ z$^^Kuh|ze6 zZm&n}z%>$?o6?Efnzd1<+eNq2p?!$8`VkhXvs}Np!$qtvNM>nHCVi4$N6fgYKp5)6 z#iZN{nW?13lGRCVVxMVY5yR)j;RsQfXy;{+F0;&jIhGDrfeP@_rcQzx_{;3awpsmj zmiF0Qc2`h6R7NGO`6E@B2SR5LF{U0<4b!|6Cc9`nZ%KKvW5-xwIi zrQ-Z}@{R$eh%;m^;aG+ybz&;Z7qflL-6{TUsue^uJ+2(083_oK08+*RO6RP~2F7g_ zsrN{WMSDY`ndb@M!;%W57NWe4d@hIOrDZHHuaJC7tyaUr;vz|{NU%HWKHj%qysO>T zhu+p7)9&4L457MRVn7w-sQ`~xY)R`W%KX^~yvmu(J`ZlR(QTQr*;t=hW+hzg0S;t7bhE=H)Z7PxB=DDS%VPsjYSRYV{ z1&m_@J-OYxkqxZs1WFc=#RmG3uNEs4gkZu}64(>qF9CxR0E&N`O7##`V#Y9%kAGjJyXo^+Gn=bnDo_OAUgZMU&~ zv#ujh-m6TivKJ-OBt=l|E-}qh>v)?@zkzze{@?h$M|fl&n&Z_rm16)oC7pbT6D^@!xGoV<1r1aEU=k*%=daz6{j_t?BpHiuaTCIwD zwGOjlz+ym;RkA3sOweLn51EZkQkYsE2Qz^5ZEgR3+q*J&ciDI4E`1k(msw_+{q#)* zcybJsU~forN<7rXOtS%U08a-mXR#TXWp>kUV~JGI_bzVX``A>xMXYBM-H7ReO52Ot z!R*B}(o|^}NHC}ZLJ9s9VP4fW%#%PoE*kBmVgxBJkX3OA;&?+kzF-+|v_}|HDYMwM z%#LkY#0E;Kl*xEZte%v+QOBi7x%PCDLuQ#}mf0`OcZY!SXcmi?d|Q6 z`=i-x68cNV-tSIdDznUfNtR|nX2t8hi_MC`x)1x3K8G|Lm}dUuXL=mKFVh~T0b-;` z#K`I(iBPnZcL@>(Fa~(ul>0Z9l2NjOBc=40E`TQkc@$fh%aME55-+CfMy_7dOty)b zK%~Z~Y`n@Wv&?=CrjGS&JY+G-tlCen*Na2$%m)u1U}IwgAAkHY%H=XHE-ujT_v7YC z518uvZ?alWe@9EnO&~SV-G}|S&-Z@}Ch}db?LOD~P226q*!R1PZrUHiGJux> zyl;E#@7sP!01pZQ$FLf!?86e$ip3%>FE8mclet8gYnH8ynK9HSi+Rt|_R1`?%zjvl z-V(=`wpjr0&hMuH-mF39wgF}qz`F~4eH#lEx9(l%m|13-W%g?@bv$G&9)uEuR3tFd z8dB`vEc+roaA%fTWNla=4Mv2VJno(1mi1N!a)kx@D(@ErkfW|?J{*)P%LI4DC{ zB;zL&W=&ZVNE&m`vNYQa;ANKC&)0qkfOp^DxXZ=xU0M2kZ*#ZII*;^sZ@c#Uocp&0 zo_C$+H#z>>_P>jty_iR7ZeDqE3|F^wQ_qBI9?p-dyAEGbcWz)Yey$tc$O@;hM z_wX#-_Zj{n>|Oflw>?j}*k$Y;`^((4>@Q2QU}YUm8Q3g$mRWC^i#D^&ex-Ixyd1tE zSo=1E*sYA8Joa0@JM*{Yrgy{(nwCsL=?RK$|L$WkqZ_{$iPN6hF6w<#-0r_*i{5%0 z@4DGhT)E|DkBV+I-8)a*YAt3=ch>a6ga5txo9W-ZPv5!`1EwZYi9T{Wlb)RL4+WBL zbX9Rv)#oYwEZ@Fx2jP8{+hUoNSu5Xk1&how%k0--@jy!BLNYn3 zWlV`84s@0F(qvKgZYDWIa>Qr3^vU%Po7Z(|W-z#HpB%5#%oGvc+1|D1{~K(J!Z_XL;+n;j ziEjw~K3*ctBw=JWL4;t{b={EH)`)1@Oh#2ckth?Xly!;j258dDLEmHbaSe-f`!w=; zu<9DVsI{90i(v}?ra`0}Yp3@~Ub>tv=r}ylB%A^Yn!G+Osf;48E#02UezHZA36|Fk zmeMz&_^nxhSKf!|bB}IoLxnYxzZ@Z&-u~9PCgv^^Kp-llK-|CB6QyYad`qGtqSAZv zK4a>7A^LWB14zlwr>>1k4f4rTgOmh{rrJUUiPVlkL{(cL`XAM8mU@#RuLKjs{e;zC z<|Y3i&W-6!vh&v8(oXSQu3TFb2C)8!H^2gQC)yJ+1GfNh(t9a{jI-!mr)ywBs6MMO^3;9hNtP=P}wQ7%rg7+SR_CZ zn;5NJ9{F4jMijuAj4>RI;Q0Xoznq;%&Nc~5ah*HC3WU4{?kw4Wcrd=fbR+}h{al;^ zT+psMbRmAs>fLey=71()rVbDWzL>lPs4+|eg87`yClofJ1wNd~1QW-FFDAiTepWCa z8Z497$YtMWRX13>_<@vl0sp-zvh6Ky!t~|pCM-Kg6-P`{FcD%B^E?O6#DV7pQxmB? zI=e=Lt=_3LoKM#@wVMK};t8Hj238J*LLQc(Q$O%r2M()Y?0Ev5Xfv)reE*&l1P4fO z-RTDCR{;lSCk);`IU5#%0-xGsJeknFh%~kcF=6L()DKKULlk&)pB>ku&+S}+zHe#~ ze9ytenNTGa*_UaN!|Eg3IhZ=&dn~5OLl9{&Ev7t?gJtT}#=Me?53mWRMqcY$64qA)a4|#Tokz zCKev~9>(Jl#^VY6D1x0ckm0XWyV#mHO-hO z&o*mgldh9JPYi@pe+@zcp|-8lvrKp-enxm*Zrjd@sy3`BVnolqL;aOKiyXw?)y<|B zM#{DXMBey@=;yN+p;OlqOnO$(q6jGt4gp5P>VvgR13ub03ZNKL_t(u12zIp9&9@U z16mZ&#OHdV%7p-OY=Gu}rvaO$j*-GwK`U3mWP}1>N|u8LR$^U}aY+*^V3KrUlc}AD zsR8bIfWcshP%}}fR!}bHX&@bshH!%bnr_kLOY#8>xEfr8kAYM+@ER-@S+FRx7^O(C z2#mF3;8xRo4ElZa`x9uoO~=gJ22E6KlHzQFM(xO1L(U>aF~Eu`#AHR!FP@kwc1{F9 z49-f*^I^atB1Xs|W{4O}O-w-=p8ze(hM_TV;j-er)PB-cEhoz;l*i=vfB_=Q7Jw=6 z5csmniO!i()dd9kZz)#I?=5o+Q6G{b)=FDSS9TcAU`(QGY&Y z%(5*27H8sozSs!jzQVzdWf`pDM87r=FqX^~6;X7~xbc#Dp}#$As9pXT(K(`{YSGc0>GZ<^8P~YVWYr43q3fj^k9%ws$u738m7YB-E`;5 z4SF1+!0SxQJ{YryH&{E#Y;x5O0(W+vfaPc~zkKXkKnwLJTTmh9*3FTS?Wd@`et263h+-uQ<$3PJSc7DK}p=?qqmWl)d z*_6X;*#@)^o3LmwWy}E$+7>JZVss#2SznBS2|{QzIdL{AAm+s(&}0aJ#+Z{x#@Io} zsMo>in`5;4W8`b|$d#+aU}&&8OEH>=iOqt65S`{3RqVO$4q?~@EG{o&u3kea$C(;G z2*gBX$Ur|jSKG|Pwlp9Z^z3RsoIqMJ&wM>39XkB8DNq zXKeNEyHo=h1_M1N0f^8v2v`KfAeh7~vG#DB2^=S&`^ENSAkrOoae4k4?N$el>%%UT z(WuX%UaO&0k z^TueMpQF?3!wGeiYV%lJSipR(3(5RO|DoSIe;NJT%=Sri%e{26Q{u zSHz$ZuwaZ);GlDTiv4yUfu2KSVHr#Fby!+}LF)>wP9KgR5u0Z-AXQ|-vt^WuWdbGa znBA*WTwONdhB~VAiVCIKF;?DGgFJ)AuM3ZH!W6a%A@L7)>; zp%cil$yF8TJXppIB07(p&6tr0z8fH5gQ=kr^FXy~*#J(%TnK;I#qsGrzWVAJ`o4+f zO&tZM=$_2Bp!5+rLtM6-*gx3E>*Eu2Mh*(~MLg0>ngGkS65Qbc!_k-_ zFz&{sS&g}TEjlO0rd^+0;pwNJ;miGV6z4avyuO1%IR~5Eat2C_or^RAtHczs7jq#C z7LO%^n8F2XFo4HEPNc&Rby$`T-5cWcWFKEWdyY33EsT922n|$f3wZLu2l(LqJa8T(g2@_=ZrDz_tCrVBQk8*G=W$!BG7LUqk~Yemz=36=51)f1Q(}=_~f%MaD354 zXymZAv4zJ^3TP}WqEs$HM+j#;LKJ!&yf7E1trM_hY=IYWMusL=##clJ0@Gsj5`lQ` z(hhn2nd=i%M-!z6cwR){lo7Lx<>L1@g0FGcA2E^)oJIjcZvxkM&~IJf#fw)sZ4Y5p zm+|C-kMQB62Ux0?U_=wNudZ=@eu!t!U*fbiLSbPWAAIy%eDH7s`JjulgRk+$(^qH? zLM&|T;qjCAu(iI7N-AORm9Ub85vlr-0fYsf{c<3={qON)VHw37&}+7^|LhBV_URY69tK$6 zc@H1|;cxNblWmj?4S_qssMo~)ix-%ni0udOqh4>IP|Q<5a>f$`p{)4A>o^m*Fm&Yd zd5TYSdRKV)>7Vf8_zL-jZT#Ke{Rh0ayMer+!E=Uq`So9Mbb1LRU&CCZfl`4nk$KqV z8uG;wip*7SnFQoCm${5Z>>(Q}7`q$#U`r*#%F%N{jFiUNFa}TVm0e zOe*sZ@Mo7Xok1L4LI97(Ad40^F5?e%lU(_H!4}aXcsLlK*B-;6#T_u{b#Zxmj&Wq7 zv9N+lwTg1FKyAic%%;v=^Xxg&i2-H{N)A-ny`?xxV&kK!Oy?NWDY1bROUe25jKRw+ zvtPRrGXlPvWef}=9bWr2{_X$%Kk;cZhs%+P4?lc@MazIY?BMCA|BCdFV4d% z9xyD;s;*-FtwAS`Fdg8mC9k3B)`*Zo(*5vA(&EdZPhLi{OmM@XJL4FL9O| zxl0Wt7AZi#eSxn(`viaf<6m$wH1S?zn}7~G=WCa{o+_mRs`Wa2kFk#@}(*b%tq*9((mHx_!(Y3{Tl7Ch{p0JqVWJnFTO&j+e4t~ z_|20oER<~#7iOYbE7K%6?wsMXFP`FJs9|O2F`hi!Macr3(EyrhBVR1S)EUE4Aoo+T zXky$Q;PTBr_Fue0FDzqqdmSrFOIWP2SgnW{Nd`P7<1w6xN4>?)+f))MUnrtjt+8wX zjE4hUUtVG2`V_-iu2#Va5O>r^ufy2I9LkjvO02K2xVOm=1IK|!E@$p`rI;#1qZl>D zV1yzjj4?6PPs4zik@>}CEVR3Lb9RA)^CpH)K(S@D$}Xxo&iLsjcgs7&K03pflo%6E zIw)%+G|$e_>U7cSjxq80gs$g`*xOt|qX10CP3(X5SNymC_CIjp*!aVLjj*`7hPC+y z);2b9dU1u<$LBbF_BoGJ3_ry7LJjMyOK7()@a6d-PTD>OVG&y&{1!%zfwuw9P7ZN! zc!zi_fVW)MJ{ileQ`{SlkJ^H z*xcAeslsA`Jz|-U_MhRCPd~%yWe<9;j2vSdEzWvt#0-wm=?&2vdC&|S^;#K~N|9Jy z#(?(wBLYz@?vE{4C!-MtgAp;3rD_$GQWXURaK|Hbn-{ond};$WhOsJNjD==(v&X{; zJ$vk!#FW{2l-T%HE|5oJbo~aOefbijD2K)66%?!pE@LgN95I=UxEl}J=yV5yMQ+gX z^IAyvb3Evw<9LX4gT@Ee=UM;v1j{$eZX}8zX7IGP2k~W=S!TablWA%Z4NhRe>ju!i ze1k7OX`}JrZ*em5uvp4r(r@GN#aH<9i_c;2T_rmH1scCWB=ea`aupWdr$EG<2{&p4XyKIJbm^G&Ax~E z^({PkQbr*R&^$Z9*U$FR_6yi~|F`&HXAYCr1fGopYQxL*xoYM9dZG4n@2m zn?zk=ADJuc;`A7weDWE-e)bAz?7?Caf(7)>5AfB~0}KKiPd@k%j~{Nrwsf@4&+z3J zPjS+8&{*E0Yh0}AxIR6=tD|!af;?6?cJT1wF6OE^n30aLH^QLRM7K9YZgm@vfBUzn zYePKy^Z$bvC$I7O7jvjq3JB{a&X14K9)?)kd5E=!jqCF__~cLj6Q3Rr@WFrdu)Mks zyAa^~;02B^+b}Bg*xK5{`tlNL19t)iq&aDMy>FZPcy3T>=zZR2sJjL041ezeq09(s7IGrZmym^CW-+@(`!zw$UoCc@c0>iz<#vJAs8i+Ix&8rJ^M=o;38fxV{ z8l?(~r4k&^$JyB#&aU@y-MYecyA8)#2Uv1Np^Bx=htTW_!cfD(;W1igukpekqGpHi zoiQywEXzUY_0jD#aoz1>ZFPxQSVqPU2Yp-iK3{-t8gN)> z!1XC!?Vq4MjIgx4jJ2gIOwGf<^%2=M)T=e*f+5b2_i=E13KZt>;K_%0xU-6UIKkQL zeY`q2!8o$9zO##m)e_(iaD4C-&ks(aRoC$TM;~Fc5utN^hO@I1oL_rbu<~eXW6>`{ z{LMf5_&=7`F<;KZ8;)>sbb!zP`Z*5HI%u%x;_)MtiUkS@sMc$+*)^ZM!R!44oHPe0 z&#mF358ub;S{>tI2d5`zxN7#G8F@77Rai!VPWuWM%{F|!h>g9+c=Di(TFyYf-@^VE zUts^Ng>>U1A}{nvlS zaZks_2fxRA54W&X$)QrIPyz`9cc*7Zc=qa;#=pHMAL8-jZB*@$+T>vWHO{X(2+RW3 zclNNmxrT~}>0>d^evpoBoK`E4gr1oJyUa4nOpXc^*JkEmR+mw2te}$b!|C^MemaCd zU#2*@L3ad8%VTwJ0gH_~Jm150t3@hF0Z5_)K z4}EQn&czY-50B9vMYtZgA3 z7Osw7;d&HdZsP$er6Rf)=jeB?DZ6nv>=SEMZY;rbeRTR`j2sshTQReQ4HFnQPx0cj zKjQhhhm+O>UZi2I?Bn(ROT2pZ3fB`GfnCM<*(pX%7iY(>@bu*YE_y!ZjxRCsf!}@f z2y;c|R^~3P$jqbISitt~HXhEIs0Y`Wc%R~W(8FbGfPARo_~lo4`tl7*FOTu?!8VLx z552(<-F6#;;fOLuO+7&O>J9$Pgv!n444mubN z#|W6K${XR$!E^lSFHg}P>3H<`J^bOL9Y)>Yi=$`w@>L7@`Ud{yx9?-M8sPZ#OB|dH zU{*I!Sqw1hchK&hY}q$$FOyY{limqd>dPj-owVmI%=f|r{|Y= zwtoSmx`g-Me+)AmPfjofk6ER>Eyp-?0yxKyda@B$bb%apBPX?Y$Gwzse~SAialaD8@+i_0d=(mdY# z=r_pwLwxb4f5qWh3zsKv&~EKwxm2f2SDR(I1|Is|HjWQo!XI_X1;|`<)%pUqA3Q>% zTEO+2*El>lgrBP;C@i4fs1O@oTiHQleg(&89y*to7!Ak3d=Z0I8_v*2PS0bhT1Ksu zBbRrp)k36o5RO}DUcABU^Df+|fG}_{xO6ZWbm3YR)K+&fKN!Low{XdR`g8)RuLoF~pToFb#$eb(yVt_db>Je8*3g0LjIps$M(^wm zj*kv-d~yl>x<|}g;Ed?HUp#w?!^Gw5k&5B=Az9kv&U&Ly~K=h^sfplo)Yx)km&8 zkL9w7Ve=ecUZ0_o3*iPutSqi!Zh0Paa|H}X3mAnttgSAhz+71@AjQmMdGAB~$A5AV z6#jzeCnG%j>{HZq2g?N?$46)Ah8D`3k74Eu7!A5OJ$Q-hP8Z#NpIl8lPs*5ISjOV| zI#ya;MD;4MbSzehO~#SiN9XDaUwrln1x{}^au~L+5NZ`{Y_4FwQNW=28YitQT(#P0 zcYEl!`{<7Xl&cM_uP&ldoQJOGpxXuHstp1T%Vi6tLJ3=Y53qCe8m*HNuG>8{autdR z?6*#F*c_rg7+`0qgxc~Jo>&Xm+gc^pxuN+8eHQO@ikHV-xJD7{Tf2C?xeSZknLHp| zGYyO;BlHJ7jGPI&UJq~H91;8FS_^n&Sj2opxd{d6pPe3K`1%r>KR|o6h{2!@N2?%T zs!4}knUw(SCHl?n`t#Yv6eyAyJcvJB}`v4U#3M6Q30VxoArCO5ecPxfSw$3A9$@$V-@(bBq2Tp#^!gQw=;8Q$470CjN46LrMq174S^7TFjS0^wqrgEoY zeh&3YjS?4*_s?;Cb%E9}LSudz5iGP$PS86IVMQYtxkW6`hnSnIpjHAFmzRKIgw@44 zlv&_n6r$H_yMH3TfSX^47%;n2Bukb(5jxe{hfC5`66sp+RvM`AZTwR`^ z+q!@@?&18+2?jn3fiTc$)L<4uO0GIPe1%tUE&zXmt@#3$xAsuo%%i-viE_b0uhm5J z?2OpAqOGHt)3CI>3ajU#fA$8Sx6Y6+M6}Rii!288SppJk|F7}|EG#TwZ*2jl8A4}r zKe$~EMvJDBEHcY1vtP9-5@i#{unk?58!PzuH#Q1o8=d3N@c*?=aoudeFD&E1qcv?>s$$f=#>>MqTwQlz)|c_YM^8{Mnt1lVh{@$}gN z{_S7hpjIhjFm_R0+d-bi!LXpU&_}P+#dWidk>_EhI)}B@73^$p!}eO3jD{E+HRK}) zy>^#niC}4C6MJKz*>B<5Uq8X?d=-sGgWORc{pKNTzlpE^?J4$OK118jqgtw9V=0G` zXVUQoqY(nk3w3*qfC^)BEU`*A^bj_a%b0Y~x;#U_Vx!Vn#q!!Ju20*z>Rh1F*uld3 z9@e%j?Cx&Bj$E|5eK;`5-L}+^Fzobka(0EW>!HL@i4f|gI3lBhTAjs17NLzgJf5yp z#{BXImKLfoA{XO8hh3h>T%!WN*+sA0#Bgo}wYhmz^NY|6B@8>)I6HfZ{o^zAeGO|% zi&&e>k!;QBWgDHb2BW-;jqL~6+geApn5PWd%IX#>wS9c`@=Kha98o-DrBue_jRv-s z>nP_%TUb1^yUy-c)P>XQW6;s;6lkX|1P&8se9 z=h1uk@X->SA#2Am-gF%ddVM_m;tRA25o|Lc(6zF@hK;2P3Odm4I~aQwme+To8#c;X z53fG|BQDO?aNU}~p5MmqLO`xh-5+Bz9O3l%2&adqlqB=;gZJ^#2Onc+eGcREeGISO z0D1|P@*Eb*ISe{&G_QNu+1bJ4y-i%7o#L;5`5fn`ZP9U`7}-37ldT^R+6Xp^t8RfKj!K<(-G9FRY-vu!c#$gTt%WIC^=Ac5jS@ z_wmUe{|zr+JVVcSP*_~T?!yOov_6lp-@zxJzd-ZN3C=IuSXo+x z&5~*~zBUnB$+yaP62Mc%nKR2QvtOaH1TuqX$}!hfzjX~=x3IFlg`zb=_xccDK0iX& zD`9(X0b8p~3I!A=G@Q7U-8by@h~Z%F1ST<1VUw>jq>Qk9v5LyV3I%)j&Ka_}Tz7D^4h1V~yU}zr9$~;y#e1wM=IK8+= zCvpL!0L{puUaP}$#?V3r2(Qs{izt=q*jQU336y+e5ygB?=!XSdAh*-P^~D+9TwX!< z3|t%?VKDJguywfIb6lQim@C^THkMK8kKySqyeNQGsH4I3+ky$s4)<|-ae=GW0M+>= zY>qUX4m1pUJxn}NyHdzB1YQW&>xbL`03ZNKL_t)OB}bGhBss#|ON>csEU#dFZyVKu zj;rGXoV5n%jzMuxO!|e7h5+|o`&^bTCWxEf(Ttlw7j-~Y_MD7qQ ziPpJxiJ@FwUB%*j9XX57Q04j>9z58>r~m$E{M-Nf9J%^3{_}tRFIZb&L)G#q_}mks zgu0nWwOBxbX%e=ZbkEwmnML7l6g*tMK1B1)8)#+$mArx4qYctEMBtHYu-6+vi%Jxpz!)jZ$Wy{dE?*$Fy4UTI z>%Fy9K&N?*R(}YsP{!iw5^{NiWG>|pQi7_izODtIx z?qouY(`Xz~MkfP;D3(!~U&fBk7DxfE_n+ab7l$a%ui&Hq{2Od;?_i~tqc-ez+Gsbg zkt>w3xwVC8c!tYYpW($(6Jco`b8|~rDKgOHp~c*%E|&r6_xl*Lq!cgW&u^)S|G&L2 z(QezyvfUU6kN^qJv#8m!V<(labic27|5tz1uY1+2_o`E=ICiYqvMo!pD2b#<0>s?w zoC|Q!WI4m??v!pVS8NglF7CMR8TOWPBEHtNDrmMk=r(Kk;EZ5TC$Jrl4+V4>U|u?+ ztSMKpxk2+ZhojSDynlU&QU4sVoI|lquTel&$|0xgf`~khIEF4;$fMS%!!pQPH-+Om zNuE5zd3Mcr+BLj+e~Q7$0e;$liS?$*6f%>+2q*nBoDYYXa>l&^vsgq{ok5c&PNZ;T z4YfiU-QF5{T?41lloLh#fU;*bUaLxZ18N*#JRIVDFoNU9$eMYmvY#YIIdI(=t!5i* zy$w`M4VNDe@&0UxJ{^cl6{vauO;X_bF=rW@d1@OK-Z*B;7aG3=0IA*R@T40ibVWhl z%yE|Ncshk#l~JlUvG-&P(fKjn{&au?I)Dtvu)P?nnkr+6#ED@kCZ<1kNC9Z>)0weiTgb^3@B@lC0|< zhPH>SNtt#9)xzlF97nHTq5pA!l9ff# z$^yX!-n{w_@AMq{QyXTh218dk-o*24Ol%jGViuuCC;B6}QW1^LE~>jN&UC#vKgQW` ziovCg^OHVvz17=m@KsF^u-fO?|Mt&tY!@eQKVUrdq2}^T+mI`mP&Dx@a26@i~-S6pv$#JCt-U^cYz;;;V~|N4LajGs;}(Ro~9QeWS-;S=$->%q1iNW)8H zh$j#fZ#cu?;~`$ZjA3R%>~3!f`jJ%jOjSvjf~`4|QG|oHZ*h7th9qa9=Pb6OOb4eJ z_K%t8&#ITvY*(OQhO@&Xj426ZBKQTpvjP74@BhXWF_Z;csCTfwwT?!m096eI$!;8A zbow680~e9~5qd6*P|4$~CmobCA^to$#E*Z!#7M2-sa|3ix01|bQs$r}5(+D@N=?L< z61;b>;o9V$RnVvv&@_Ek@3YX+^ohnMEjEnvW-n=}<`OrZ=m*w$1IX}RQZ)ea9 z6PH1NQm4V$wV?#Kp2JBqaU?TU(aGU46r;wj*qxRItJ1{NXJ273nBa#uAMxXNe_=k# zwcZ-k$cH28C{$~(hYsHD{|&Nt4kMcZ)B-wdn{Z<~WEq@D60(AgkLlnXAI4|Ms398V z0w$`7t*2k1M&#{rjQ8Jvi+>*+B45ZN3T3P{TL@>EvCT1D)mj6a+Z&LBON=kh@c!r>j!w?dYZg&8bu?Nzl!y>k z&%vm-u)VR4DeT%XTgSXj2f%yI0Dc|^bY}K?FaPj0At7Jn5kN&j66}y zP=8z)=3d(0f&(cJzv0DwSaEBDo9qzKB5udT?6e_1&2cqXUA``zn?=T zFTt=XXe$QFv~dyNT}ET~HPNP!6^r--EvtgEVPZC!pnuxujk?zEVsE1c)w{s!HvMIc>nPNZk$1(P=uL@U|&$Sri`4dpx)?W7JS5L zGK4GXOpaY{WT28P-{l1k4?l>c30+08);Ftf171J0V=f3=UZ(G*6xje2hz zYpoVkOnDAfsuh%aUDQf>$f3=o+9&-1!b}#ewRN^C@9!Vr((%w*-$d`xE_OCM9C|?U zW?2dc=(KQrKE~F_691-CEiwYP>np4LIZ|X<#8xV%og)vr2;ji z`Zu993T&0N>7S!n)Q~eR zv@MEp%sf5nHRW3~c!8*S{7b@1RPynFuv-w)4FZEc|0>f)RB1}Ec?rIg~@rjCR0 z_!5_wXE^#WW`H?d-$bq6!XF7lc}iLbwGL!og`$~A>7 zq)fz=PfVsxR$5txQLLce?xI@EAnOk>9uIIn6PdfkN&}BOJt#^9Z+wRH(-XXS{&)C# z8I^h)yZ`hJbj8Qak2sceI+;O_6z;=L7AR3XE%AAVLBd?Tsw}cx;#HcIhw@M!%0FsJ zCBTT^i5Cl5L33>jxk?B*OTp_IWTkbiJtl2a1t!rj$T7PDi=`R6M97uFd|8+=*=zLT z0H-4#vSy&zY9MbK$XON6Qlx}}y(iBQdp^{ILpYf{dOLe~{CFEh#lz8?3n+3HyHCEr z`tB1vd$I{bvhn5z4YOb$fg_{U>EQ8`$7q){c4b!2$H-b$$M>)ZHh;$t+EkdsM0 z!bU)K)=g&W&t_zVk&1k|iSE`OHhWEIAthB9L}Q9f&V`<@pvmsTBD)U-S+UA4VXIuh z&XX_L!bwc^vtb*@6oW|W2CBiq^}E{}DCcCHy*KgvhnM&`5jwfm_9nKvbyTY*ynK5C zS25U<1C{~37DDNLbK%kfT{Q&(?o5JlaEMDchL$hzCbO}%i;ZRpbyEXviMe+t7zc`= zquJg>t6qY8c@9fcV7nny!(hvkJsD#>aS%xvR>W9aUxP|StxW2gMQdXZ|NOrqRNkF{ z`1)xBG|f61tqpe98I;688xe8BXcn?Z=WwAh5pun3AuGF>j?SUzCcb#u;e?P!n+?R1 zJ}m3+c=i5_jR@qr(koSL?Bq~)0?1i|lM~2-L!$bmpP7+z*navA{&?1GFj z6IF*%C_?pp1nv|zxzLJb)Y|LV+ued?WN>!+5tD2VYuisyX>{S)6ISwwy$Ob68)m1C zN6%`gmfzv0H}9AnyV_nyt6qdc9BP9hXU2{x$X&ApO;6T>q?;&`3)P>%cU%VIg;EvG z-XrWhdW3c*57>Q_>Rs#>B@~)17!>m0#v&^{SAbclpi<7GQ?Ei(GB~}Qp|i7xot-Vz zOF2$VvAqylp^m+;zJY2M@%F`Y#=Mgh-jP> zPoNvhyW1UOGQ2<` zQ-W@mvHiu@OcGvv`2uf``|x~+`4h|a4w~gGs+By0qYq~ej6xZ`-X^+@0wMzMM7K_E z+37JZiSkAvg_AtY5&^6hdYc<~w9!SKteiyyk?-O4hjSQ2c*%vI#^p@N3EnonqA7**`JA#|g_Z1c3pf(62bv{B^yOvyncz6x#J#LC~O zqtH(CzK(UWLGuq3@ z*SdK6wZ)utm*WX5auB(1xnM$yW#mgu>^@adY7a0Y(3GQu4hmA&5Scm(`2xqfDViWv z4cr;?5Jr*=%PO$knH2aK4Mt3ETd1w!%Rd&-UcbQQ#1Zjrr4p=y*f41mCDj7OG_ad5 zq1GESL2Hg;!*V(zZ;F9gK%o|KyjG*tK-n@8mhym{MY(wfCj_j5iHt_^T?Legou4G5 zAoN!QFW~nNGYYK62L4#zVD}-l2gQgL%QYBiAy^LH&f(Hxbb_OL@`k({`pOUFzmg|s=GIS%4N~r*;Qi5q( z7&{)!3MH%1`1UdN93iWv>S*+KP$<{2zB`8P#>kiJXw^z^M#tEH`4cWCA#)#o@zox- z+C^lfh_i4>cbSNX$)d@LI*L$5&@(MoO`*6qqWYoOzI+7MpQV>26%69nlP!uFGhmj_ zF>xb4FjWb_>nbPx1hX0BjEdUY2EJBQbO{jWEYvz(R4oJE6lip}kSnhtU#fAIEz!9| zmX07+kgfFKBZGRYiAK4|U{lu&6kMOlrit^f)!Rnis$uF9FvaGOa2qMGM6eg(#@dvPE<*rku%7mg-8;WD?|9$sq7t4DC|{Q3i!_6MM}P zwx2x3*5($flw4$Hp=v7XoppTuFBvqqMr=`UwHv4q#ZqJHPz!GtUm4bmF?SVgVfL915bgN&6kVH2S^ zNemJVPrj1qbjO^ndtahs_RRk2Pk(y%?Af#4H{X22%;cn(M!}>v32r}>hw@N<$0Zf} zR|RbbSyNIGY^Kskgzsq+B2jmi9+M@c8t^g;=u1LyJ6?$Bv!FL+e38Y70{bN)_akJ2 z#9=aKJzK#oMuEdDYec|85}Kq@a$;rfr#NDxt%%VOV=kO+#vfY$ds1|*#QsOv&>KNgA?9H#|V@#i?b zRdI45M?`G;OhTgyEz1;C`<}~Of+4rH#9EYOHKRa()_^6@9Sb3J)(s^&H&sZW$!vWU z?ahMmq@$aFL@6P#S5lF8?x$F=@q0cTXU56|bT88GWht{*XydZ3E&Wze_?J|FYD3zD zNluL{u_SdS+Ao413VmV96xCU1KW45o0gQyy5?P3uT11u-88|T}=vj1aDgrMwhqJ7S zDzQYG!#bVR|8kEK6Jo1%rU~m+AQgn)q{$=MujOf|%P&&B#gOis(}!N)%e9LWM%* z`57D&_l(GPha}!1{Vq!6-O^MM2Hf*D z7b&oDqA5(tI+7%$)#%?e$Ae@&pm9dAcr=bl%Q;FqOiGM#38#D*TGfQ4f7d>_7$ixmq@x?rVQTyd0u8kx0Z zv!o_KvPXf>!NLI(!v?%))8b2~Py!1^)_{r-t}}(lfyfG5v~q?HITrF)qzy}-Q^uJ| zvONk|ca`|I+&~D!(}El`P)IUENyk!EI1Wjo=M%7y6c#%dV(Kz4nD%tcNfmtmtihBR z^d0fq5s;;LvM63G#PnZ!Pr4tAjk8Nz_d7lX z+Z)K`C^13djW@D|kUzBx8&ybmk}MiI9a&xDjmdFrcryw{51~*}gG7tE&IuC&#Lxy1 zu+@eDsKO$@A$;l+=DJgOv+-s=_a}iBwuXfg15Daj2^3M*B&m0JuFv3uh1pq@K4!9C z30Y|LT$WBEIjw*M zJ=b-`p+jtHF>l@sI2DCAd)76TB5o6+&hUc>8BI;3t01y8NrO}qn!Euekq`xmmxyY;>05W8ix@B#31x} zlP5q&suL1teY*%1m48nF$R|EM&rJmR#bJj*FA3}upC189MPeXj6WD=@e65F_23hIa zXcQ^=$YIGW(zqvZqEMR#Lhm06d{__)r7~OQV`*W%X8<1s9JQ5UaGe$JM+LBt0`{+`wk_7)iIQs!g^cZTV7%93*=1C}E_-7KvKF6=2i zCx8+ND?H+Wv(~Ha4Ok5c`C<|EQl32zj!$xYHs}mWQfc`@9)_l|SA*^|BU!RU_m|c? zTGJ@}f!a{x11kYK7c&aAAW%vk1&sh{hF42oLw%1yEXA8@S`InGU}-u&h|Yxjm6L2} z{6=C%(7GARVoerUZPnX)6~CpcGkvB?iJ6CyB zZDvAaJ6${kD2tQp*y5FJ5aKpbvLML`H&Y0Y_`PVO3&g_205D3|7(vYt2R?76y!g=q zOuDc$n;G=uWJ6)=4vEscE^Kl^(P@?en6T^#P#VmwW(WezY$w^c1fZnTJw1msCZoU= z;DW73KA)7qF^DtRQ>wS1DhYxxd8fppktlr#OJOtz#FWGU76YFNvgkknBf>+pq0>v# zJ?V3w+d={y2a)g2EtCXK(p)%+Pw-^Dm@p_|OGlKpg}90~W6!k_^Sg-eh2<%N9L0&{ zQ~)F}r=9}W6BgKztxZ8ic8XgFIY?tI6n!kwJ!rhRv&7<Rp%}ZeIMjqmzq3Wqi{|wpX*U8CR5zL}41kkE zfRyx6D8+0IqBbK68J51I`y_`YIf`K0F_ZLi-&6KzoW{Zmt0)600)*~Nj5BIm-{Y9L zjYlO02WC!Vw=3zQdJHy%=zp9ZK$5>l@gm!DE>zELgC#3anA8D;S~-!1$7Yz$198BK zk`;i)vSZs^zc`t{)UVV&43b=DJ`Q-Cg<|dz=%f5?3iIIkp7eK^;10gK>j~>yVl|AC z`N`{3EXL{#Hpi^8b(uW_zBm|29vqvvm}wmP{5f0rVvpO8Jqs#@h&0&BNZ{Eco#mNu zTZf7NlPOK?DQir#g*I7-B)V6Wv>9D1$2`ZUQ7|7%e3<32ABlsnFC|tv@h%ZtMFBsa zG0l)13-Cu{i2z+BC)Ujwewi5wayq)J$5`EwTJ~Zm`-$4C-92M_Ne&psJd-jrc!ym6922PIDmI zf|`Tdo~&HHH^0Z?P%c2`qELPPl{(M{ug)_s#XFHDDZO1vtB|$;_g%WVhd#R_=g&>9 z;SF`}J`(O-%-zu5(ioW!fdqst>1ZbH${S+5s0&-R7`O&=Fu3$J0}F}K6cTGwyvpw? zEuJkU?mgEH5}=vZNx1by^T-Uqmit<8Dn`Ox@25u{;aVeZvN#cm;?0-ch00>AFI9#% zWIEi;-;G?F%AzmQb|6q3c=6&rNq9bQu!WUff?>c`AF^;!O|-;iys+vdHJlIQrSZ(+ z6U!m`a&lerTz{#*q{Wy{Gp~j4y^FEE&}&j)oBMe~#KgX{L8Je1!@Nf&@$FV;5Q1Xh9H%Keu% z_xWab^}5tu7vsjdEl%?{96Zy1r|XoIZoo_6VSe((60i^_>~y(17H*}hbxb$Ht4~~choyL<)mMra?{l^9u?%uBzec+9`_wIbwcON} zx3zCtht$$7u923ibjLlGK5v1Pbnj;_{gwH>4@ZLxfRTp6#6&sXQ^>NTr#=K9(uu|+qH zt6IuYP%1^ylqu z8H;$SE1%t7y*tMI)$fweuHF5HOBdFGrTg8xECIMrOzA~GNLLIZpL*Wv>GPpHl+P>w zb>ruAEZEEQ>tFBvxuC56`^R7#O|8?7b_24*nfM2`r zbKc=j%h>O%+<#2Q^YK8&Im+|eM1cL#XO3uhE9+y;wShV;8={@o|bZvgPvRDTVKrqB3%fOpf_ z{3QVICKt!=8Q^{1BECE)<6GPscW+{=&%6D)pI7ed9=oZ&t1h3_ce~wfbldWiEFWX=4YsC3{14>$7PHsy3ab>@x@Qg^%?A$P(W2^)S-eMT|dGCJbyt!dbUR-nS zlb`kc`_$_;fVaFKq~UY)hupFhUPlsY{j)Q?eEAY5Cntg0@AnU7So^V**NBHix4hhHMXrQQtW*Z~aP!`GlK#?;mab$6F961!zq-CZuY8+cvwGb;1MD{_ z_i3-?%$n=(dDo_VeQ+(uD~V^`-fnUdOuzi>6y(XWlzb;IeHSG$PY?jq3-j``7x5sgpWpS)znT?b zX#?Z;y>njP3|enKz$}+l&~*LU6x4sRvNzuI=4)=N(|zXMBJ1&HFm}BiMEueH56CyI z+bcD=wf{dC;N2EWb#osrzu#SB@RxXF(sfF?lHhP#S+2)Ys9zEQA1}RAa_tfdj91?I z^NKX*XuQ5}{j&Y#z5oxORqy3>@J@i2uKn}qRcT(On*iSOx_ZBT`_pwy@3*uvti+UF zEx#qmyJ{E_wORdsk#Mw>l`9C5<3c{K6pKZDG#cgl{l3#bJ3IVO<~t*z*8P#P00000 LNkvXXu0mjfqK}|G literal 0 HcmV?d00001 diff --git a/devices/surface/microsoft-surface-data-eraser.md b/devices/surface/microsoft-surface-data-eraser.md index 0fe84fc0b1..a835026b8b 100644 --- a/devices/surface/microsoft-surface-data-eraser.md +++ b/devices/surface/microsoft-surface-data-eraser.md @@ -14,7 +14,7 @@ author: dansimp ms.author: dansimp ms.topic: article ms.audience: itpro -ms.date: 02/06/2020 +ms.date: 02/20/2020 --- # Microsoft Surface Data Eraser @@ -85,31 +85,33 @@ After the creation tool is installed, follow these steps to create a Microsoft S 2. Click **Build** to begin the Microsoft Surface Data Eraser USB creation process. - >[!NOTE] - >For Surface Pro X devices, select **ARM64**. for other Surface devices, select **x64**. - 3. Click **Start** to acknowledge that you have a USB stick of at least 4 GB connected, as shown in Figure 1. ![Start the Microsoft Surface Data Eraser tool](images/dataeraser-start-tool.png "Start the Microsoft Surface Data Eraser tool") *Figure 1. Start the Microsoft Surface Data Eraser tool* +4. Choose **x64** for most Surface devices or **ARM64** for Surface Pro X from the **Architecture Selection** page, as shown in Figure 2. Select **Continue**. -4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 2, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost. + ![Architecture selection](images/dataeraser-arch.png "Architecture Selection")
    + *Figure 2. Select device architecture* + + +4. Select the USB drive of your choice from the **USB Thumb Drive Selection** page as shown in Figure 3, and then click **Start** to begin the USB creation process. The drive you select will be formatted and any existing data on this drive will be lost. >[!NOTE] >If the Start button is disabled, check that your removable drive has a total capacity of at least 4 GB. ![USB thumb drive selection](images/dataeraser-usb-selection.png "USB thumb drive selection") - *Figure 2. USB thumb drive selection* + *Figure 3. USB thumb drive selection* 5. After the creation process is finished, the USB drive has been formatted and all binaries are copied to the USB drive. Click **Success**. -6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 3. +6. When the **Congratulations** screen is displayed, you can eject and remove the thumb drive. This thumb drive is now ready to be inserted into a Surface device, booted from, and wipe any data on the device. Click **Complete** to finish the USB creation process, as shown in Figure 4. ![Surface Data Eraser USB creation process](images/dataeraser-complete-process.png "Surface Data Eraser USB creation process") - *Figure 3. Complete the Microsoft Surface Data Eraser USB creation process* + *Figure 4. Complete the Microsoft Surface Data Eraser USB creation process* 7. Click **X** to close Microsoft Surface Data Eraser. @@ -133,11 +135,11 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo >[!NOTE] >If your device does not boot to USB using these steps, you may need to turn on the **Enable Alternate Boot Sequence** option in Surface UEFI. You can read more about Surface UEFI boot configuration in [Manage Surface UEFI Settings](https://technet.microsoft.com/itpro/surface/manage-surface-uefi-settings). -3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 4. +3. When the Surface device boots, a **SoftwareLicenseTerms** text file is displayed, as shown in Figure 5. ![Booting the Microsoft Surface Data Eraser USB stick](images/data-eraser-3.png "Booting the Microsoft Surface Data Eraser USB stick") - *Figure 4. Booting the Microsoft Surface Data Eraser USB stick* + *Figure 5. Booting the Microsoft Surface Data Eraser USB stick* 4. Read the software license terms, and then close the Notepad file. @@ -150,7 +152,7 @@ After you create a Microsoft Surface Data Eraser USB stick, you can boot a suppo ![Partition to be erased is displayed](images/sda-fig5-erase.png "Partition to be erased is displayed") - *Figure 5. Partition to be erased is displayed in Microsoft Surface Data Eraser* + *Figure 6. Partition to be erased is displayed in Microsoft Surface Data Eraser* 7. If you pressed **Y** in step 6, due to the destructive nature of the data erasure process, an additional dialog box is displayed to confirm your choice. From 349ef5b90eebe4630bf20a026f03da3f8337c554 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 14:52:42 -0800 Subject: [PATCH 25/42] AutoIR revisions --- .../auto-investigation-action-center.md | 42 ++++++++++++------ .../images/mdatp-investigations.jpg | Bin 0 -> 47514 bytes 2 files changed, 28 insertions(+), 14 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/mdatp-investigations.jpg diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 67192e12e8..c2c022f1ad 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -1,14 +1,14 @@ --- -title: Manage actions related to automated investigation and remediation -description: Use the action center to manage actions related to automated investigation and response +title: View details and results of automated investigations +description: Use the action center to view details and results following an automated investigation keywords: action, center, autoir, automated, investigation, response, remediation search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: macapara -author: mjcaparas +ms.author: deniseb +author: denisebmsft ms.localizationpriority: medium manager: dansimp audience: ITPro @@ -16,27 +16,41 @@ ms.collection: M365-security-compliance ms.topic: article --- -# Manage actions related to automated investigation and remediation +# View details and results of automated investigations -The Action center aggregates all investigations that require an action for an investigation to proceed or be completed. +When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. -![Image of Action center page](images/action-center.png) +Pending and completed actions are listed in the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and the Investigations list ([https://securitycenter.windows.com/investigations](https://securitycenter.windows.com/investigations)). -The action center consists of two main tabs: -- Pending actions - Displays a list of ongoing investigations that require attention. A recommended action is presented to the analyst, which they can approve or reject. -- History - Acts as an audit log for: - - All actions taken by AutoIR or approved by an analyst with ability to undo actions that support this capability (for example, quarantine file). - - All commands ran and remediation actions applied in Live Response with ability to undo actions that support this capability. - - Remediation actions applied by Windows Defender AV with ability to undo actions that support this capability. +## The Action center + +![Action center page](images/action-center.png) + +The action center consists of two main tabs, as described in the following table. + + +|Tab |Description | +|---------|---------| +|Pending actions |Displays a list of ongoing investigations that require attention. Recommended actions are presented that your security operations team can approve or reject. | +|History |Acts as an audit log for all of the following:
    - All actions taken by automated investigation and remediation in Microsoft Defender ATP
    Actions that were approved by your security operations team (some actions, such as sending a file to quarantine, can be undone)
    - All commands ran and remediation actions that were applied in Live Response (some actions can be undone)
    - Remediation actions applied by Windows Defender Antivirus (some actions can be undone) | Use the Customize columns drop-down menu to select columns that you'd like to show or hide. From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. - >[!NOTE] >The tab will only appear if there are pending actions for that category. +## Investigations page + +![Investigations page](images/mdatp-investigations.jpg) + +On the **Investigations** page, you'll find a list of all automated investigations. Select an item in the list to view additional information about that automated investigation. + +Use the Customize columns drop-down menu to select columns that you'd like to show or hide. + +From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. + ### Approve or reject an action You'll need to manually approve or reject pending actions on each of these categories for the automated actions to proceed. diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/mdatp-investigations.jpg b/windows/security/threat-protection/microsoft-defender-atp/images/mdatp-investigations.jpg new file mode 100644 index 0000000000000000000000000000000000000000..6fe755e85762552d398e0605eb6f387d40fdd4cf GIT binary patch literal 47514 zcmeFY2RvNg_BVX=5+wv7h#Dk%C(00s5)mT0C<%fnBcendB}A`5LX<>H(Zh^BBsx)p zFc_kjQAQo6yp!K8&%OV0|L=X@`~08h^Stkw4>RZNbM{_)t##I3>$}z_{3Of+=WlE4 zX#*t0k3I1N5byxcom-kWc}<)gTs*<ym0R!75`Hf znefzi)B-oE+gXiAb_Hc0c}LLDvR!27xO7EGSmf$8Ie7&|CFSc{H*aa{=<40RZ(?d@ zZeeNV;OO+&*~RtAGap|+|K|aLkuRd6U&h47rKP{h$jo~ECi{J1QE^G>hmW6XzSP!1 zVf77-U%z#9c6Imk_KlAH7@wH@IW@iTYjJ6LWp!s+w z`u`ry5&w^f{wvLYC7I9$Fj13OktUFl5UFP(A!8yTOapXeB*YUkCIAHN$8RED)MuDk z0?bN)3II5SQ9dUvaxz45CSy>-I4pRt;1RBM6(8770776V!=wHE&^}~pnT^Y z_~+|nXE&B0{jQ)L=YYZ7zP0w5CAnH0?>*e0C5FmXMteMx+0O4SW|%KZ|?j6;OBDi zfyA3bU<81b$o~W6{wVki1wZ)&fM6xWIi*989t5D%h&0jfkp{CtZ#UAD0PJ4V;G2BR z6_EZEkAUo%wEg|9B)Aqu>_HCx42-`<z)blKY_0Q*1;%he^hX5iH*(^ z04Q=%*P#{pjL2uF-+acp0B0dX*uyO1wD$_gP{*MC2|FSqi8}Ll`ltT?wMXO+5Ni4+ z6u&Y?1?PLvH6PTvp7nC?jWrb9*f6uoeEr_?igRo|vyQ0D(!mgK!qHZU>lWqE%aVZd zsiMc;f&yZCO4Dy0kKU1V+d;a2zz@d>z=5oe(OO{FM;9hfxX;CN9|%A{G_M{({}E4< z^u1xwp*LAMGDt4mX$ucIeRhg%<<|6UwL8^0#O%CV^y%`=JKr+4CE@I0YC4}ep{wCI zr`5Apu{4iLy%1FRG@_pTLSNu#k08+_b92a*4^Y>NY(#6aVP5w`-w)3p|6(sUeI-a; zEpk=PRraeSn{q{S@mz41%Vq5ceV>Keyf|5#z>i03)^gL__9s6hH7z@fS}#|Ao*)3D zYtSG4;muM%^)lr}>C_#foB5_*l&tn};Sbqwhi3GW z!VXJ2Co8|zHEydr?Y{4_RLDfPJAR+Kc2mZ~!Y(S)te)x3ozGl1gr?)`W!Vlq=lrl@ z@NbRjvjXS$*uA3N7V~AGB@~s^ebB|(@i||`06#Kb)JU*^@&s4 zbePHoliA{n>S(xKEh-d`f=lv?P0H95g0YlCV|M#u--8zVyC5jGxDB5RwcZ+OR$oV& z+d9v&7nr%ed!aBPwS|GoN*lR>zTmb^a<*|OV*=1-uAdEU$Zfs+crtBFXY(^!DF5DW zMUg`qO2Y;JoyOEH=Bq}k^)`C^US#mff>XZ$Gub=AFlC4`CaxRWpBrGVzTI==LN+U94*>XtC_DucZ;gEdas>% zG{K7t!Rh|{a%OtRHL$^BOu1^})HYWBd8@~w_P%(%2`o&XzSdpcOu7f!do`oYoN1uu zy~4t(lqcsb0?+wtRP>XT)zJu|xW`;i7_oQko3$8ZXJfYVOlzUkmHK&_QoD=B*~7G( z3S$(O-o<814>01qHdUy>3DFd*y2EXpc&T{faSOJLo7wsdj;p~O$Upj_di^Feb6Bvi z>-l`t_c1V~n=D7-mqz97d%`5q!|eRf4qfx~Qr6(2e z&#y-%G78-;DnNHGiLvcav<$2{$Jj&^m!zrHBsdI2=_Zb|i=tGsUmf@%Z|3`C8$*r` zb8PQ+C2LnSL7NnE^p2Ms4V%n`1A-MYf9XNzY%$MND=z&KOq&;LV!4^x@tF*kUR9|5 zEoDRIXR#ABTh#Ng5xy`msUHvv2^z9Xhppx36(85{zDj*@Eyts?EmpH3G2gdqNk*5c zpNXbJFhYyc9PsG(gXWf>^xN4*;g+)NfTfnCQ>wm38L@b9546len_$HUXCsAm8BL<6hj!u#f#fWJ5s3x`@aHe*4Iban zQj8JBfa_3~pC=j}3eIx*hEh`P33W(qXJ@C(#}L=J{EwhXEYEP1ac8J;M}#(yFfTCG zx79|DV(;zw=IAZL-j&qt#_B)Ag5r*CQ$8!?N>ezcTP+5h{uqiZsg{I)UIsOEZ*oI~ z)Wu9;MvyOn-QlP6TM+?aWQugpsvPxe1R^|NwgI5KkZem;xpLipSUM?1V&<|I{Y(UH zrt%WWFv(c;VF8Vm$|I@rB)!d_^Pl$Hx_P0D%4!sVc9nHrh0Yyx>r^*alJ1Zu?Cp{f z*{G=F8LCN%i_0N3eJp`4DMT^Ih>Ty?QX?g*SJ^$SZJT|uWVWHV8(s&1dg}x@`%tHj z%gO3*>3j}{)Iz*GwZx3bQ`jeN%91{!EB=c6 z6_(iM(=Nb!xhuN{`7n?>sm`O&+Nv2EGw0jSmw0ni_$OX>Nm>cG$iO}JRKlb{neO(r zz@V0#$e^Dq)y;9dvC2GLsNOCM7DxfV8 zqdlM>K`P?zIjvIaIBmB(bh^I30jkNj+dPHmr*;|%xZTQQw~YFFa|CcqX{7SIMIIpS z{KA#v<)A{%qTkk4<5Q4iy8lR^<;FS4rqk!KAqVD^K&tf{`#%}=@^us0?tEij-z0H- z%?_gjPf4Xnz8yT#s(bxeR_=M%xYny9r&>1j}eD{QmN; zEA?7!yvH>Q*c0YvV=DJ+t1C8d?j2L#fm8IVh285dEnUSyY&=%Peev*e_ZIo}@->vt z`JVyB*Phl!^TnX2Vp4;1tMlc=9Ng-s{a5oYVtJbMgXbz{FV)R%^GwXach%1_`D%9$ zG%YK*dvzF!Kz+B>yN&oU%Vtw&HGOaT!J?h=9{En6*0At$6&9FnlbwFRI>u9d0{LxZ z#(kgTRjkyQG&-DA?M;Wn&dQB*j-mj^bw@jYEXXi(wr4!hZpV!1Lh*p*wB)SVbBn{f z*ld}Osb7OGs z!SuAqfRi-k7N04}3osf|*kMujTvUKFS>EgRd4{EjQQuo|v*nWCy>T0-2SO^^XH#|) z+dE5TsL3B8<8$$(eS4jBqckK@0y;k*?z3!#oN2r&@Y+_lFZR-pjD%ITth*BZ<}@s} zLOm};eHlJT03=gw(P~_uzqtw8TKJe`WZsi9x|ybbe0M8aVVw==3rNy7Np}-Q`cAn* zEI~mvX4Z4P7>S&K)+`kFMgNcVoh7l$jo(yaV>}WDzF*1^uy@zsXzmn#`W53zo7hHr zzZHre+irn#`VT`g;pK4sO4*#eD^bwTMTHzQIn~JIHzup_JKoBh(NrJSovaP&bOFEl zE!C@zg1ycAVKjqYcTvrkTyDaajk{2uEIJvFe=?Y_0DSku(*_z;$>6H~k_C-#C!-;Y zQ}E4?1Yp=Wjl*`ay>a*x2bs}*IY@cu)K{Y1mLyrB<@s> z&hA9BSrc)$i2%U0!?+0mwQvk%jWdV!8zJ=J#h-U#HUuk~voKnsa zud-g^kPs zQC08oV6W0a{-HvX{(f7Se)I0n`hV`4NSigWkt>cl6BpZ?KEWGY^l)t%T@LIt&nz(9qq3d zjfn;(US5MOM1B7en#p6zT)oI!@1R!+rQvQ^;;Psvr%iu@#>45c1hc6~Cp9fQ+0TrJ z`9>jE3)J5a!#~_KRhbWtn(hWn&&^zT`|R$7 z-vQQia-L@wLgjptNeM5#h>jY#Z2$B!Qd+hpmgH$(Q3SB9$*p}=k{9vJG{#78O}T)2 z)F)+uUAoOvdHw*D47LI)pM7X|%Hvl zL8hl;VtRtt!amW64czzur0J3-hJDD+ElRv3IA9eVVDGu=EgPO&f4`c2A*KsZO`(D2 zPfTL#=$qjSD9oC9hzFv5@3|KU+VzJ+TmXJ85Jq)k{@M3)Ht=!}%-Ure zIB`)F*MCyn?^xB|*53V4gQcV;Vp@x(l3%9uO;1R%|Fzt57@d|(#3y~y{%$!)8`h7$ z_7LK?B)tJmQy7vT*}HmeVK|%tDeL9L>BV8FBv!=QvyzmxRf%qa%e$R(?w>fqN@7$} z>7NYr@a~ z9J!NL&$stoIm21PJTi-d;ihijlB@%BC|nw%KX|&17Hrs4$a2YZgc(J(d2&fl&)H5) zHzhIVTxO7dd4G5my|2GAo3&Wrfo?j>K+Y>;^@=;c%_1t!Ny-!~Kdtvg)rZ>qvjE5w zJ-P9opqO+QhyCjnrtG3JX+LHn2im7gjvj3)uScDt7o9}BL|i1H61#*%+fvB;Y!v< z>*0)Q)?qOL5XB8ueg0)2zRR}#bGw)QjWR9Sh2usF-t;kY;+;6ZhXjBgN7O9;d%CgL zlw6j(x~QUOWTXP0Atp<${GbtV(`rF)u}E*Ogw)ir$jIcbl-XB#^727b{7D&BjJ?cNOjE~^+k9pWeVT_^d`OPH()J+LXJO5e4+YIWhwt1A9052Ce7T()*DwsqC=a`O#o;l zUeVaqA)GV?1A5zNEzBc6rXc}-t`o4|036JiJIH$vOO3%d6xb1pLa zlHvwycnN?-Q%X|cb#&=FV84^obrqa{Fbv7S-|CS+=T;P8pCPFGCZkWvz6}1HyP=(1 z_kj06F5rNXzwdU^?RVrAG~G%=0{dJzsh~I@1YjZQ-k78uFV1r7ty=oz;HT8P6duKu z7f3cy`Y7Q{f6;HSiCeWw{ZUV!J{^jlvtEpnhC7^lP=u^G5@$sK8bK+a1k=LQLr=;H z0G|bXa|CqYen7I8eGwa34%wXJ!Likn49d4(ycvLoly@O(71Rm9EaIrl0Xmz92r_CU zQ`v+Ze#Y+>&`&K~WNN;n%Pe|T-~%0XPmh4=UP|aIde@Js4ACE^vMq%lNL}Uctb={j zYI1*~J8j6(ts19jpx#L8_wxguaZHe!TM&HJPiTGBU4rWxc9grH-JdDCN2A+QR%fG( z0Pu91SDeOs5JMq)wj3AwdDPW*vlkimtgredCX7B5NFk%i`n5R*1?{AQF@k|RI4}X| zy**oT7LAlV;aO^3dO%dsXNFUP+UJek1LE}0Bb;2rcwvUpZ(`P-MP~d;-Zxyyaock@ z!Y7|LdLMCO`qMAU2w-nxFRq&m;h6=GCm#?16}(Ha z$Gn;X&G(MD(VBXxtAgTST|Bt150*|+&Ebwp5QT-YP<7$ca~H|@vR4?CPY&2?(| zWVQP6SrZ3R0B&fo^>Y)!v7<}l5X(2%c`i+_txIp?u1YrWE~vfDi@|i^^S}Zcl$yueQDTj~h^%dGeE|I78&cbQ3 z3BW{Le;xc>sODr&1w3&F^TkZb?7KspRB(OzqwrpU;#?k%%1U9Fa+ZI#V^_(m=IZ?@ z^7%6XkC&ksxk)>1YZR=_*~Fio74|w zgO^tx*Nlvo-`Sga<-OaSCZw$q5W4S}INJkA*?OC#P`_&M+s9gi_Zta6#8z zq2+6=HJaRNx1_|3C{z8^h<7u_cjT+=f1g18@lrfV4W#Y=b>$5;}DSZz+u#;4up{JezuX6%31k0MBfu+|AzeV_GW~esK?|s|+iYhx12&i22>B*o z+;qWW?dXUhP55n>{Iud_*`7HQ3W}q&oa(;Aey5M?E%47*N;ZvUz_-&uQ;DX?bC>=c}$_EQfi#KA_ zP1^xLS7;hyZH@LjIN&)vLGDlfh;6=DeEs!+!E#EWbIw%_(~h`4A_UJs<_TN~e;WpX zDu;+LOxE04{3+4$hxEXnE_^;9*D+y1` za0Y%kn@Db?FUvBx*gG3CWIC0R-rjiUuAr_$245Jn?gg($?NBO2Y8pxRIdpPXoIk$R z74I6-1FCGV?1eW!-%ZLa6$PlCNci`Ts=DJP7pB$gSLGF;dHF9MKn^m8cS5iPfa6){ zla)?rK1FfOR0q61k@T9hI6A4LS`aTd?s?m6gsqJh;38=wOE6}yC5a6w#MNwbR`tAR z_++L9&;Nyx;p;X*a&CcNI~N;dU|Q$bAL)N5?KVm+X^7DsA(yRgBkGf+I3U#+gR|ir&?)}iI>(1mX-0IrZb&nt}aJHZ3vRf2>fDBIaK%lVpaEQx6Cp}jw|%hs9QoNBC$1$>qSePhdK?oTMrhR0FQ zUTgZD0o4?%pa@eFMHOtAq zF_@oPYs?c}9vv4RDR`K_Xm9y7_)14A6A8W4Cn ziU9C#+MON|akX3JfScnmITX2hAGe^v&Hb08$=|0?{`F_9LQ3GTVPd7TJenE||G>W| zTiuC6qFLkdEf)xY_K?Qqm+$sUt&WJl|3o}n;A}BAnw{$l-TW&j^X~hcQnd5_(}r4W zF7&kuDELI_+1Ie^*MBD`{`08eU)Ofc;22H|)a3hwPykP*Heo{JLVgd$+TUot?AM^m zN>P-RtsFutDXDFwA@H;C@13FVB>l5zxzaFKL1V_t@Yr6*xaYU~w%a}_;6AQ4Q-7mX zWH!no<1}IGo##NU< z=9XrqK_G{fZ$PWy%>zXj_P@=B{Y8`{`^TMN3~eV7jff=xh0XwbH%*&vHo zi;>Z>n%%ARl6>XzTSnEpyLFjY*(=1W>t3~DXuFsBQWX2b&*!J9ewG#s5LWcBJZvGt zevB#Vv!HnxxMkb-Px@pmP*}ha)M@o`&4MgV@R+Kf5u;bSYzV*@O30u`PhN%r)Szcm3 zH?ZzrrfE#o_mh0_>`e2@Gt0RNu&1ROs7c+fe?Rn=XSVgnTOoTZ_?C;WcTV(o9>J20 zGO2IXZC&Vh|18R3(ha`SN7FT2q{rp_Gy%Wfb04k}8HyT1X5|<(x}NNO!4%xyF=%KA zKK+d61fQhp|7x*fU-E<2;X2<2#y@gZ4v*Y^5xRqWE?sR28b5Es^!8WwvgeuhZON6{ z@^z1(1N4g>H_tJ*z6s<60hqKt4i(E5zags2tZbim&!brkljIj(a@hg%h=H1RM4&c| zdy1Upoha<`%mnH=5hG7WxCJJiUWG)}EsH|3Lm|GHSx{GCk(olgSLy@X*>2UdQPI-m zzUZ5GSYXlS%qmJG(6T3mf|-0);P)`yPPn?$dz%Y^$l@b3v}}6nS)XVhF+^LRY>BDBb*VmoS7{jUm+bV{2T6}rYc8TqF;di0Sl3Z;$v9i_%$Zi7VK+-N}X zR2W1LlCkZVy)}Bvw^Yo%r^Z&M-dMxw?8=yj{q@AY^2ja?HI0u}pff-4wr&;?QA3Pi zE&CBC-NtSf6-&^t_$Fn~g(PJz_$erJv&z59!MZlD zBxuK7@sf?=I(zA%X673yK8^Stq~P+&E#VE+NT&Us!4levM!Yk@T(`k3BiH}#cm4qC z;5w#yk+S!T{jQm}m`di`xUFo`^(Pb$#vW%jDpt9-68!~XFgC~MXl;O7u>%A2 z#P?8ty|Brl20m?8jnd@U?Z71j_0QSqV=el(T3!OZ!@YCk;Gd+Mu#dvAH0Tz{&7M3<2- zfP>>Tu16c7qy1nlIMF8sIbre4nm>fBm}H5<{3X9mLXvvIv2Fo!GPYLMoku}#qCx97 zYpT4{Fe|!+(^2{#Uc5@dCZ?uFrg*GBuT;?!%Fk%X7%s2bbUn4Duk4zZEvT9lZuqfW zohtxK)M97F4k`HB0-VMI$yTu=#+!CZkBpjO-=@t%R`rrpo7Rb_#70L zadbVK@-Noy?+O6^>5C>gJE1HjPU>r?w7@5y%}22uiGDYWjU1xxCxmZ#f%pu;-*)TZ zf;^MRAUt@7z0sydDb<0t{Y^W0(t~aHFfUDa=vc;#K1rH^cr6Av97Bza-qN_lI>qxq z1PG5B9M%vdOPEi6dqE@M;(xp_{RgWar04o1zU3VO7;)3MR7)ZcJN-cbo*Pl=Xt0)k ziC+Je=EyLyvvTupsLs#cdWJXCTa?cd(v(*c>ulY2W>n$jw2IU8N$+hc9-6z})I^At z1!p?PL>trAx^J2Oc*z+<#bpdzh2)lFTvuv&FxJaK_`uUtorUu2EJ-5sCKf`9OenG9 z$L`x+?U7Ds{|K-7l(q<0l=Jivrm1c{^aa8fX}(bl|ImY#EdDxr-MT=wEasbdtr&dM zlm+_p#TyK^DkoW3C@~`w5!@6Q;I0nagb%?h-#k5VQ)W$lZ(L&?Z_c$3%*G6Xe8AvP zL%BH^+}wYoF;>)SmNo00HJ+(l5ygMpW2a{0M4#D~YSblouE{>+rJIt?K(n+Gi#Yeh zDP9G4JUMjl0A_G;)-7bhOaM%~p2!~GLmMy9*L3-&2pUrMvuC3xIXPQSlw-S2p{{(y zGSKe;&43TYo}FUi0~Tx~jh^6}&$+3l1XQM#NS# zS`ACzRjL&!igWh8%cj~F5I*556k6D+o(kCNN=Caa9iM&cAHgA5Jr06Y?g7zPG#@8& zu@7yJe2u=BJ{$ zX}r)-V;Ze>{<%^iEUo5Xy1foNi>z3BsZlM{DSN8{m0>2<9A*Bnk2@+(_M@`7lLRB* z7ai+E0uT<)%yzkKHwhU?R8?^Rz(VZfvAM6LoHZr^8i=2@XRnmvd({0wKuphC!nCd& zJvW!lhqT6&?we0enmwD=315K9)S=t?`)Ls|?<~#a6CL+8XT?VQ>(xhdY}n36_8WN< zl~1LVSo<-DRDpe-^!&ORI%yYDi5>&r4^fpa>12=MHNAIzCP6lOfBXiG|2DGu18uke zU;|^ltmE`h9cnoQfA-RMt``eEi)z^I%JGTis*?Dbt!-00oUA;Mme|wRDd=rEoR;u3 zLy6rCn}!k3%0A@uz#U_b(PGe8$9}QLEHqDPt$PaWW03*@&K~co>-oR1Ci{&v^`C1Z^Lwg|1f4(zR02FOq1wg& zBFFb{O^5G4=#vK&Y(@Z5%Ipr;@=p~4ft`bB$5GT2<*K!AU*vGri}MW1?MhtF^dFXw z23>ZVN5)=Cj+OTtdkl?MA_k_`4(V4KJGxZw)N@)rzAwm|HG5t>HRJm&8-;_>%@t(R zM!Ek+l%y|W5b0ZY;6L_V79swJE1dG*>EJIAUE%87kEw$fmDUkIc0rd6Z#~TmVeHVi z7_K{bOd40Vz|AEpSIO~mMY^e%{RWzSq)>EUds{lQ(Yn!25z_lv1#wSJ;#3sZH?((m zqw~ed%Tns#-b{=96(N3s$F#-hZuh7gVK2TgllpiUaS_ovbE7~aqU*M|rB=B#eK?_S zh^4@D53aLckG9nUbcV+QU2ad_`w{)`mILzpcQV&(1_7*|Z~@@0rwS+whilM~uY2W; zmENFkH@^Ovtmom(B?Yo}_5U!AI{s5AVgVZ~_qdYwoL_hO?TU^m09AvW{v5imJuMzN zFb4f|o^Nf9EOw9LRbWM>gM;@dF1Nh0*fGiV9lapfvHAt*w+aY+__g|BM}y%q)hOew`rmp@1dWdNwc8~BsZRgZn#-!HNL`b2 zuO_ib%G&nRjT$|{V%DwlD^84}DkvG_lqVC?K!#fwgIgZU z(@~@!{2U_d9l03mKgq zsUEn`FLD4rtCAj|^6hhmn`79Rv2Qi(+q?m@#?RQb&4e_n(~z>~)g5vRl5Si}>}F{U z-ob@Ff;RfqMcL8bAdf@$^Y;L>s0?FDl5<~o1IS!90*@{q@56uPuY+&oHDauH-45X& ze+={f*QgL_-EviP%-6faKbL}}!0Y-wZZ}%r5IrB~n+`MVX*AOj@(ZTg=h?bx&vCsa zmX3yr%9tM;1H~BBQi9d!VjJN5g)edZS^E7D`AlVOTBNIqWhk` z0$>5K{1=?M2Ob_uG|F~SvG>0*@tQFAE`JcM;x2Rr`7lMWB)3u_c`qawbEtJi2rDx; z2B*Gj<5A3f?hNYqc~%-xn&$<828k#|{%a2y(cc7|u>x)Av4Mdi55XiBFUsqlT?_=E zrA6!P9xl}3=lGa=bdG0cd$uNf*Q#K3udra6A;hkPilxJ*h)S&W(zOVXTAML7SzskI z2c?N##FT&_Q*MF1gjrN^bNPw&DJCQ2fCzEKbnOm=JyK~XB!d9;OZy?9(Uei*CfTQXBtmiqpal%V>Gm^RgJa+cc5#dKS!026K1 z(|8YPd2vSiVPKv%5B>G~#;$_tExEJP2Ugs)77sM)E%iNmf#3%5ep1=m{W0N$$)q5m zGTNRvLFM4!Zm6N~<*9X49FX}Ry{M%BKB;QOceMn;${7QF5uPG*Q$IYtt#?s4{KsgJ z3zc%Q*0v=#0IWQUOCAYQV4NdTv>@ zG`Sz29@TDvoA1U$9l0la=kyCzE1TVA#lrB*Kb>?6qgE3_Z3mH|Vdazkc$)YH z4&ML?MLYR#0ymMa)-j{fti#d|?WZXpiVQ_W>kbYhzNKf64kBDVk0*}tE!0GONG-^^ z^zbH)zQHv-)X;d7Oup)`_a zc>|;UXlw=nxClwVmGj;Few-s({72_fwv zqM{(8H|Ul5(FY9IDV@LHw5L$$2FH;g-1Ye><`D7fq)&OM!1UdHIPI_WOcRr13s__D z_T;udG@O`Q#%3K(VPs}5brnnHDZorJm7Jd^O+hbO3R&Ng0fdy4QrdEq4ix*0wVVR%GIi}OHMEALLn%*jH z!u4_MHu6hHJ3;Gpopnejr%B(^^2+5EKbElnfdkR?bH)~D`@Eu0t!GN9D0JnDctAfu z-7EU)n*{sYF!5%hUo#J}`R0t)iNXF|2zj7(4zD=@KSVL&G}??fRuRLSyO)sw{F7gdm3JLFm(%P33}_ccevcVEpR3JD~(;wlcn>snrhbMR}f=%Y4F8? z7V-U3w=+0HYYSvPR87G&(pnQH;=iLz$H0z$*B?A*)C=5tNiM1K?1q`ye$Y{C)@D#J ztRV;9Jn00s24z&jZNI(RT$6s`F~uRI`i@giiBn4;`0JI0HpEJmvfOC^(Xk8+oSQ~D znwR<>+t}^GbAR@K=6*D-cC?Mkfyq7Nx=rUj0NTZFHtzhy`@KYkKJ()ww@~Vm&Cl6hrLS73X-ikJnyouT;;9C4 z6v#jGejKn+PqCS$JntB#u0KE5~koH{$836#dn3iEZ-&q9?*JN?SBJv2pW zUVdU@@Y%t>r+x1=M#a(=6y5hPI*=olchK!a{b92d@~cyL=-B~$ zunjip5qjo&GShDntl3iR-SD&UNo|lO=P^4=0wr$=-5LBj1H_L)9Sa^WPXrF+X;cYhsZmbF=58lF*`j@Gt;#n*d^EOkhpDg^NH8mP3za^F=9Ohq~%}wrxM;_&{KtA!(K}wo*#E~cN%Ozfj7f? zR-)^sH|zS&L%{mP+`+em7agQG^o39j#&M)zX&U9B)0tgz(J8x{!@JYSRYd6)egOeDrtILPy50z<{HdMFev5?g*dfBbB?9agzq90c1u+Evy(Hv?jW7 zW_=J8j5kBv*IsgCJCt{Ktzsj(|6n(_c0lWES(BVHAgFPr_{$B^i7#vdRI zd|MhB3|#x5c0u^Yqbp6-EpBhPgS*UTw8WN8Iv)Pyvw(dn%LDJI4rP^|j^u{BIqzc+ z4q%H@bL+qB0U{xG<9;&4%#F#zsn^N8l{?lPx5ymwrSiakG~T@3V9XL3!O8V3GAZOEi1+IH-h+W-&&rQIJI2LGIrTj{*Y5$CJv1%0{o&+k7FGOT9X0S3^dfC!D|)P<}Rn zS$qsmDf+|`Cs2Z$#ZEwBCAs;ZSelz$mrjwVE*o{!U^CzBo(L({jGtRwTWJ@rDLRlT z&pQKoB8XF>^Bo4-L=!hQNoSdG(}^jywc7@+@-;g8Y}2ceYYHFr2nwga;JMm{K`IEdZkYh2?yoyXH$0oJ4_vS^_@q}`w9xd)VcxB$I%-rLR`6?0FIbDbF?%;?B9C4?a zMz@8a40YJhHI1&Z<@_D8hEU(LHpRKN`Fqg($%AjFSb7zv=NzpQ4%ajgRZNjHzRFyS zsy@f1u)|GaGy#&_#M2b&K4vSVKzwiHUJ;LxN+VZh=-kz(V^-L&-KFkXGe0~5O`bl) zh1$JyFo@WuOh*~6fO#tz&;4LZnwsAWADSg+cCpH?{R`OVeVW_)PV5V(@1tU-hy3$h zWI*TZg88Ksb@x^9yN~{LnMr3DSEARj!_aDm7_xz|9$%V{pP@FfmJssOknJn=eh{H< zMAFOA+txlPl5ucv=LC`umaYVCnmoFa2~~gij9pAqq}|$ceBP7kLw^;i@u$xTwNJ_n zOnksO9tX&+&w;^)6SM51zKsWmNa6|}Ig^`ip~(0$p{<-9pt!LaC0WJ#s!}C#$9YC6 zLHpa&i}{eTLkLJF1XK=D32ttZYcE%E_?{%Mg4Uj(J@>Tk4)2nXg6AU=#uXYxp>e$a z&L+-pe;j_7xHGDjXqsKj&m>wd&!=lo2}U5E_LIR#xxy%KyoFx$Gksks?uQK}0BD@T zc&w=H4!qw0#IrF?mt#0yp_~!UE7kWv)jHe>H-%m_Dg<8n+R1C0IJ-*+tgn`Co}9Wa zf%@(G56{MaRQa@MD=%g$!^kBpRMR}JyuU@}vPfz4J%XJ-?1G!Lylrm&90E3zeU>)8 zBzW5T5&Oy*5@fgo_NH@7k>i}vy=-D`YNFympXJKacdyTr%sx5y^^(G#)hViyNYOlI ztNa~t@&urd0K9xNWlWYZ0$DsGzKfN_^4kNXlLq&LQCuEn7H4yJ3%njjs$nABBeRp0`4yx+B_OfJ8UUC-8$B9Y*hZS zJ)W6#6q-9ZH1y@mb=EzDv|hpc7pUXxgoErqD@jPd60cgOK?r@T{n$MqnkzSsoj!vp z1iG#hNw-Ed@b1ZnF$|(E-GV(+_2$LAaMGnK$msZ(N%kZ?T7YGuq8~0f1e+JF$R(yz zup{D`EpCB+d?IJi7Z0OBSA!Fn73LN0J{O?k;CQv&kU3F*T7Tq6Orvz^{4!9#VLnJ} z;zbQLn&pk9u(r&yVtJM`TLR^iYN&x-8`-e#8*W37>5Fp(17kP1AF z)FI-Eb`$S6!JGHn@qYuulc_P@ASP0LD{(=@eSz;M!USGg=v5kIvTAC(%)n*bJu0ge z&;>6sk$D%dXgCR4A^V1wh^Ujzuo|eM1zs^!4fnv;f#z69e#gVXpkD=5>X}wAFT-1i z2An~yXS2(N?9+FEqkv2fcpOGIOp*=AYEZfW|7$KWC~C8}j#mXDbxt51t^LWHT{>#d zvVn~fYWs&*J08n6AACh&l5_+T4hq~t=v1`7xH@!<^=SW!mwbI5n?Qp})#N*O+3-#_ z5te5PWNlW)g>!w;d4J9+JxKL4HCg5~M~WAnd!HgZ-0#7&{gqsVzPS^QSO^`ia4#eW z--^ctWrH0`o+MV4$=1~-bZXK$r1px}lYNu!<$HPWt)qz`%+~LWXx*5bN+%}mBDj6u zxgIMkp6_apTlK&5!PFKXZqCyg#_%NlOXD0dlgFAi-@U@+<*fCF7jt_X&;y5(v9?amP@Z(VbjWk~ zJU$DXHDmtrYqpQETnQhaj945Gr^7Y9dzZpKeJYLzH2b;I?uuA>te$MMZ7yZ?LcXOF zceBZtq?m85M_Q_`>vGxD|5rmQ)}K$$mZ$3!haFrv4VFl+=XUtKX{E=46t+Q zMO?~qr%QNC7M?m3n2EWczE*k6$~y4F3{`ymR`Nx&uVhR`RPp$m8n^gcKg4zOlshuZ zHX;XpUhIE;(fD3)&u*xt#b=UIQS;V4S9!dIn|B-MNyzRp^dq| zU0*2553WB;U6~P;K^JmrUZWO%I>&mHLXDwT>KQ2a%)0foMSdT4coMRFanClNJ@rk| zIqJucrFB_e@L9WFBRd@GyQ?ASB|=PWoJ=Dl4M*P9^^P8y6QqC0wUs zwNCUN@zzz-s+&%bugH}$OT!DUJK&>s$!*ndmvPDcBu(KkK~~JG@CfC@V#E-5^K{H6 z5>DK56tG@@>z6ghDqD4ft3H1iQ}tPgvsM#3ZM!vjYMRv5sZ;PW6#gNgawx5RR z?v*#BpV?pBb>vJBpwQrD;n`IFnn$x_oYmxq|GtAp?v4Gpju_j+SFYW_%T`&;rhg9* z&_JC}ge8=q*&WVRLCORd81Ea1)@GR#`3KQo-?-wuytxi(oj!eH-LR*Y8$XzJgINzH><5Q_TD9XMt4uHhWijEmm1WE8ygfNjOX$Sb`3f1SCBM*}T{JUy&R=B!W`yZsJelOS(Yx@-0 zuh>WF`g_3wwb+Ex;J!}TtW`{U)(@ zzB!g1nm-OZtAiJa+hpZ0d^CDq(_8d2XX^H6ffvEIE$YvmN4%kN6m9F;rZfOaS)oR3 z@rB4vGd)qwtXU?0Gm&=w_GFxc!}8E;(p_)U@OGBWqeHBCP{`Wl{FjS3%gl1Drt8yd z8hQ30}-H2349m`?iMr;`~BFu>+zm{ z&*3li=u?#TOe&wf0H||Ni9FUo-*XZN5f7on%^s|uh6V<%37ov|^xJxz{#?bBss9T@ z%xBn@pTX_VRlJZsk)|W9M6|%x#$ps>S-c(sXHMBGj=bTRJdiqKnk}a-rYIsTNZ;fj z?4FqWNt^LW9rypm+#qEkA3q%__AZYp_Bu z&ScTOJA9`?bin2=-%|)HE8u zlSi6+lufU`$@R8kj7f2?T%7Xa;sw$d*agkm9wT}2CD--M{9YpCId=8&cIkg~DGi7N zg16*M(tvlcsh@7M7nqRFBs1H$F`Oo zXH;c5I&KeDgr~s`9W|@FA+;PFdL$ zjvQkifOwj-CVd_;$X+k38YvKF{h*kn9whPkZOMC_q$L4E5c&S>J~kA`u(zNHj>~~j3hycsP%G-+Stv~kxX=`Dw)YIaqq}gd7OHqd@ zHXqRNK-dq7%ETkfU1&^p&J>n~ZMQY&U<%kX?DR%Pbx*po>%7U9Vsqh0Ip`-dM5(f; zw6lWNL!;#;`*CKs(PkGn0&eG+1@WQBe)w?3cS$~CbXk4VAH4{%$9HeD=+D2=ZZ-Ob zp%*U}T_J#OxD(Xzq!ftZKcCm`&V8?HeXaL;7@5^zhj~*>piRVvbj-4y>AQ) z_DJ||<)*EoS0gUJgu%Yk%JSmj(CkhSvu$y!k|LCGffu4+rfAMBWCUo{(zOJu40<$N3BQpJ}aD+dScH zei!5uFK~HgTbF$!z|lH!FB`%BSY#hxtZ)8IC;hY5-qlau_UMoh1&=Z(KasB$QwMXY z6$mNB02WPon$3{f?Ikw&P{C<{J!FG;&ynWAzMFZkZd1tX)y^9Om{}o5S1#9fE{xO` zZfUZmu?}}S3y|c6oj1;(EwL$Wzd12uyaB{o&>*f=Ou@9o9&CzCV!lth<2F#{!vjz)>b$-|wPJ09Cpw5(v zD=)3%+r^~+%=Q<%KC3$%;0L_xyp32vqK0_(a|uwMO`U?~*~?v=N*(GLE9|TDH%vcY zV)U2|h_C_q#y_#6=cACxf2%h<(iRRyzayqn0fkSV*A{4N1C$G~BO|VaP==7RhE7m! zD$(E4iLBj)+})h~^(2ZuE9^P7-GK@3M)ZTwD#={AaL7AJqfLP2$2rRlao0u72C%1c zX+MZry~gXgm7mm_F1@XOauM_ddUAoYbF3|u4Le+o;L+K8qknh3P~I;OjwlmMTTGi{ zc6GaJn9ll^y`Rc><*B%+dyjiNAO~N^gg5$J0b9W;XX!sc>XEC01DBr{(LXriuIcCT&2_&!SY)jg3K>)koe zRFW7x4?pI@w6v4iLubkFQMUtlSB~_FQkB}zAi6%hY-X%4K$-rw%gO3kmL5d29Ma+R z!J0Bec>oh0!pnuhMB&R|;@1KnF~cUC;($*~?&~~Lp7{{AkQmX|?J;l_>BW*v{LP*R ziWO*gKZHeh7Fm15xa&22gT?Op{_7>~F>XcpvvF_WB^&tbUw6ta^4}5J`bq9Ti`9gq zeK_OXK#Zp#FKRfdVi1Dsu3GV<^k8I3^ds}YENAs3XCIf1U+iO$M+K${$c~$A`iZfx z!;I+o^BD1@S=}GrHG3~p6I}InbeAiQU;3GB6r-CKX_5?2b}dkM55yhJS{I!PAxRZR zh>i#u&K!HYWtK;C1}}i+XF_szeD%ARzkJNSYGvZ2**?k&p)Fq^ySAN&BVR@@*g`5D zC+l(r#nkB@r_4l)0#<0jJwIG8H!i+jAX3oWEK^&Ckt&rTH(V;!S5ZF*l;@MkOtLlm zLzDcG0mMetnqHbB_hk1j7k=@iJ*dfgpb2?c)<-}KL6(qfzt^MPD7g!MNZa&b9N21y z^v>R|47&A$N=m@8yM8Y8d8Q3LN!xM}_1Ek$$Vk(zPa?kqgeEv) zh9J~};fNTs8#^>S$#0NXZEvHIq1H#7W^O4;EhLFU_cAxV6Q8{=b7)ZI4* z6=DJ(fh2a^K+x2;hBFF!U;Y636lv=)181e1c~QeOL~Xk+!+&?#wWx?ir+{VZ2Yze2 zYh}-B;TKH~hi;w6juKN@hPLBp6{c&h?A`%D@#+w5LYd`k>GjVHV8{2dM8o`X)2XJF(2+ajF{xv5L|gF~s^JA(Lq z$blOXJw7W1cniF%j*xHDVxaT-9^O)oaWB_k%r;5V1eg*{&Sdosq1Oha%eP_YxNqof zoZ^+#_fe>IGcUmLyS{5h4l1CdYI(DpaT4#q- zn>fVOPn$7+zvt*hAOjXPYlbM(ISXgYVgh-fI^!u!Ds1dN+8?Cp^c>}q6*=VM|9KFx z)kiE=hL5SyTNdcTA`o9h${0eH2CHZp@ zi0LC}h8NWK&y)S*l>ax65R7t9Q2oUVoXt@#0dR)@)zL-`g8$`si$8;;1#}#>zYi!= z9+m57tIa?<7M-0-4s2g8S^J;zjQEy79F~4yH~q^bXPkQm|yN1%QXB&e8E_7 zhK-SAIavi9XgB5+kartFym;Ap&t1!&)ftP{{?epN3_7IMe?OJjzs`}^yTxzYkR0#z zRqth)R>1Au4L=mJ8DA=Vk6>bH5*jzY^Ds5|i-oh7S93~2Gt(5?uw?Y7ZaM`i9 zQIqyOhl^cNiPMK^A&t*vlT%ZrEvRG1lYnDcd3CLZcfVYPZb?tu5NoZZ&Rm9&zj^zu zTD4KqRC_YEvcU5jeD&yC&@DJdti`YezIupjeWvvFBw^$F@G9p`%RR}Id-~osq$Gsw z9EX|797#&#=n(+-3Ed3(q~DY>`MP=&jj1s6=7y6$o(=YpA`@r6_oMzH?~I~*4Nx{Q z%#i}MN=cIIDE3@DffuFo-GO^Q&8o$oEWp@1pFAt6=^nEXxKE8tkm5^};Dc|07+PN# z>dt~<#OBZLTX^qd9C5A(dyk)BOar$)nj9{gNIVACvHb`7#R|Yi<`K$y~j{A zBwn-A)2%h~M>mx(9Qas3za2j@4FnR%&KHS)fULHDPKW;_wlIAhknoDbjxQ-?Fqm#{su%Yj;iD?m~%I82(=$2&08f?4My)UnN+e?K^E5@ zx-PrUdxKl+#$8jAubu>X*YL@5{uz`#@_V|GtoK#8{H$=Jfa<;riHx0sv*5a43`h6I z?4e%7cx=991hnv7U8|$WmxY57eVQp)4N$|NMfBj991Ii~TEyv}I21T?Yxdf*vA^hl z85KcBYNkub->YZAX+&ROS8!o*x_}rPd9m)Deib;YIK2JLBwn>OWKuT3FKIq6D~B%$ zVy8je^PK)W6Er!bEY4ftK0@;MJYi8=Z@Td=Q;dJee@LYFlZVE1 z+7Vs|bXZlmhqXEdlmz8C#MK&MjfbSB^r;+Myf)98aOB!U-c&*i2AWnjK8N@DYlF4O z@8EqTsVu%n5}{w(8Qk10z#gN3+APm@wFl~bMUTD=3A`A$XfehzH%V0H>;4Cosqzc* z88+YG?h}48jdl*u3WcviMDihCVU9gl-UC~N#9&~@1o>ugIDP`&x?F<5z|^ms3m(7Y zWBg&4W&t0C@+mYo>A?ui$XlGPUbi**bB^U}yryJ^b&^MGY^=99_V(vdYgxw_$JN4j z(NA_~e#E0k_AyK^cEdZXF_VWF+miC}%$FZjGrg`iL=J^^dyvtRxNi5iUj<3w(2EIu zMNehaZ=~2Nk&*YCyS59UNXZuI7H^V_-snQW)*w`ljTv@E+e8{T3OeC0pTI<-T1?Z! zYSb~7A-~__Hu7_p1I--mW-s%h%ij5EZ8ze|HY3@)A2|u9yFEkvfIw>#clMxWoS*JO?CNzQ6 z26wyN^Gr6LGv}{Mai;fv)KIvmAQR z6)UBa)SfTGmNvw?vd$V4KVg%cIs!=`!S}<>}$Aam2QPRZ*nN)Y_$U$&NC-AbQo9h;Us{B|+*YSAi}~AC2Cb znXADGDyI?6`K@`skpTYgaCZ`jx_`d6sx3XO_q#vt7mzm-+q7m#Z03_{bL|K}Uhq1m zvmgyAB(;BGb~II`IJJD`gkJW}x`~-xZ+`I@?L8u965+h~Or`iRp+WD>3~7Lmf-y#9 z`{H<}Hz?~55D5a7z3Tb%@_3HD#f>f%f(cuxv?e-ouU$N7(r7c}|Fk&eDiGv@L-%oV zmH~`#**W6LmbmM6^EpJtJHA)fLpfb~*6g@U(#5}un%9~VeeysODAkNDOu>#C18^L` zEQvvAmc0{XxqjQT$DOq47W+Dv57h{jdbSQd|CkKKmCG;~uXOwo%hD`Xru93^Yjqc-YRs)uS|Y0&&e zXYT+fQTS_iKie?rj+P|!z2wWh0RPWCh}%-7-eYG@le-lSre?iG1nAc;M6ZWLZ%|qv z5=DQskI9D#no5BoO@-z~{G^sh%?mDsl%02TDr)~|bo|49kzHBExqncA&IhM8W%dQ( z-D($Uy`)<_&(K>&YSC(&}Eip>4 z0DjUs=9K|a(qC1O?k?RJ0;nZ1&C_?)<0uRu$6i?Bx$@scoHMoBo4$Wy{@qmFHGnPK z>&GoMkJWZ>el42EXBu=p17{xJ=d^!BDHX6B= z`lDJORv%U`D89UJE(B#t={=|_Dosi#Mb;Goy1pGJ(c2~sV!rmbIB@h>1Ot5njPGW} z3n2$Qr$Ft=P3%WoW9w@mLU72kyBez?u$)p05~=}y1$X`e-Mdx+4pRh?72iLTA{OQq zCt zMi0msQ92c_0wT>buZ>VCs`yAvM!Yu56D|)zUk)C0nO{+%gW5KG#Nz~imZJ;*6Kc@b ze>Qo*TrQ!o;nqNP?H-_=tr>-Wa4>f~MW5{drX=N%L$#w%W=uEDjVmjChmp@Ykm%Ut~lzHhRRuW$}{wP1{^d z@bcD_=ralQpWkSF6!f|xM@K%*NIt^?g+(wirS9jpFKY!3W*g+$d~)_=o*#@kH(H3e zY%++6=(Y4_nmEMJ_!a|~Dx6j`<}YPd7H62Gt~+7qij; zZ}@UJm|NH2y6V~`g%OgiOEen8!Og}N)(_`i0HOojFiSsWgh_7ty>iOt2CWEJ!IWoW z;VkS~gFOzI%KX`t83ZR#m_se8_y8e+ON*I*5P|B_{BZxPV!Cu1+rTZ(sOkufiIQ|h z|4%thN0NM+bQC58(;|u@2Ui!{)hK&6fYm%lG(D2?*?<2`gqqX4*wd{+L_+0@pr{(L z8U5VL@nEF&e9No0rz&Y$6+q$tX|^~2>~RfX9#o18hA(Xh+uRV8;IHe_SMlTw|H2AB z^l|=Kh2kVVX*=4W7;a8JXy%coqw)wZ6NZFNR=jcRd<5v>Thv&KHym6o>Xnh>)E zRkpd&kBhU~>O0Pw`QuooFd_c1@d3nkPzzaIqVm5|3jg-hrv?*D6#n2zQ9Fz_b8*ik zU6z){#_|;AD%<0;Z4eY8^HNM-axro82fSeA+t~?fi!Y$b%NV1uFqJs| z^!c`pNE$m+lR+djCTpc!mZCU86BM%&+nlowcot7(y(*Zpc~wX`&7``=;QJUY=h8P@ z!x>Xf#BYX#ot%aDa{iL9^<%J`BLaIPHF?cJS~i8^o=6k>m;`_a0AB^J?3Z_zRP&3e z?8SJ5S}89Gq1HG-THw$mrS3;)mf?jd3_x+}bisfG0xO`$44FFjNsOtZ-SfsY^l~nO zV-BxC({QQRDaFST*pIGOFQD z_D&*c7#w)=hcSAg=;wI`?Npx~bcW2-1MTI)DTW`X=9w*1z%$@2C{~yG zp2LQ_8$vM8*87qol*`nknv`gOF<9>`BW@_@=^pxJnaj)>qylxk@8m6rj{2!N)DUNA zCsr&}rIOaOFtAEUX6(jn)!)+)!B-Y^8AOXqlm!ZIxat4Ro^_ zL}9*2px{ao)=^^-Fc;vsjS0#!I-RI|sVZko*(E4zC#GJC|Dy@ zUS@N1=-RB|s1U-ZHB!+IUNGBVM(WB?onn+IO!HuuGo~NU#(@WN45b;rd%~T`BP8{_ zFG!Pd^u2b*dYJQMT2laa=xyrEsRSn%6Qj*bTb8DjpAqT;wx<+V7LKHO7AQ z7h4aPq2mcn+*SkFiNF?B*O8Swp9Ks&86MHSuv00Rpx8Y#rXODZ{vvNwQDqmzW=RAM z@h2|;3H=_U_*4cSh9*>zq+m#Kx10OuVrVFkphNyIbPSPLgPYLG>IuZLOO6uL(|>?i zM67iYQ$9&iv~Snczn3)4S2fInTs(tQWq9y;q9wmV)7kFXB!M|?67Kp3$~Wplp8dG_ zBB5me;VwYKAg?ipAqfKsdA}QBuaP=wQM@$(Oe1(~=VDL$Od5Mo0BJHFB+}sWS@xbox@YRu zwO`!yJ@sOR_z1j-C}hOPwtT638Y&NHu?oYwe6NU)LZFxrE_{oJg=uGGI|- zdyxrJKoU!Wr~k#xLBy4*yPn)P63gnzej~ z1dz)tdhCn(PwtL%VX}1}XM(F)d^SsN^LQzKl}Zd@8>NyVWbCV%c1{t-^~cD2;=2n| zzgp1pEqZJRc>?Ly4PNemM`MBy;Y^TKBV~M&FkY2V{W>+^UikTF=i+9|LeHvCpseuK z7oBTq)$cmZdp|7Q^W+{iha1vCGWWPtU3zDNw!#@4T8mG8P{XGLh1r_^vyTE1Wg2S- zh|E~}daD)-pB)CAJ$ZfI&$O4$S(S1dU&?RL3*eyZ7Yi_XWk*y_dC5Yg_JGPzWH_$f zBaPh$A(T~DIqcJ&m|&Xz_G-Q>&g|TvWRG0SIgdV zkkFDQs?L)38z|8RX&EIWru}$xtyJh+Jf++d&tO~r--mzGH{CuI# z>8{Xo-`@NBt=L{VKdT5kNOm4b_!{T0N2QXDP5_mE(6_PERO2#x^&HX6_YX4FeTfA8 zefqiLg_KS%St&Kh8c7Lwq_^QG>43m_m&gGDK*GPDN|p1Mirdad_e?STm}R-_^ks!+UHorf`-qkK-IQ1tPuhgBSP}j~;JiPn_u@q^A9?;^2oAL#P z1Ni&z*AfaXXVYV>n7A>HqJQ*mAHsjEsr4L)RV`t7(k05A0;rTFbl(ql|B$>k(cy*|8 zRBEYCQqyJhQEThis}$P)dtCVhHv%Hz^~`|HzE}$)EI48^nOPOmrZ3~J^L=18hza|wIf`rF1s;E7DIjP4-ZtVsP79= zq?i#@f~TXsxEzVI(YIr0VDWEvFxoVPdYbvDnwjmrI$(AhZWoEF-?evnx1iH;vgP<( z>eif&Xl*o44Bw#%&79e4w_!d$iwv~rqEPYhD}l)NF93@_IRvT)IK^j zxfffL^5|2!-4U6BXKmQk8bwHsyb!wLPQ^T8tJA4yc|Gq+oqV@1XmnVv?vPrgcs1-u zmFmGWm7zD?FGmCk`|*_K@3qpxF=_LG2=a_WAuqIJ(1V58%Yyk>+91{=B?_K5ke8@b z`ncsL>GTjgB9YijI!flnwy&s)pEXx-j9)~~R0W1=^Ux{zk?U!v$tbO3b4!MMoi0sO zLS=`anF#cCw`xJt=$P=Mp(A(Hv0W};Crom=t!*C*nNqn6o+h4i3sbr($b3pHJ%f;WKd~2 z{p)C!?RE5;QME*Rk$9xZSukB-m?fDhG2^a_f-yrHecznY-M~d(#NU{iTymAKpu6yo za-nb{j_;ifxsqI{F(JX}r*!?|q$2xVtfV&JCo1(lAe*>}wkcp_{O-u1+FzCz*Hz@cfsuG{_5(wXWqnZpXPd6u}3SS_hBiT!g^;#=|{+oB2Mnn zxjIg8y0-Vx4sIKfhM5Z}4N_da3hbskc=?*0rM8BbEi*;-@Z&3bG92SBr&xcXTh&U{ z9n|s#BDJ;7NF`-e*tG*7@y5T(o64SRG*U~E`VE^(xzZ^|wYsl`&t9S%YF002{SZLo zidX<{M{qufEh`_W7&sVrl`58dO7FWK_pC8-@|x<0%D!$pF4Namujw^}joDPfi924% z&ca~*1LG%rrA-(vSM37tgVz%MYny%9rkw4{VZtSOmZW%W?LZnrl5 z0WvzSzK$mExVYRi$@!vn+Z|unHe?cz(!E4jeMzWOY)v@?cm}oI&no@s^@DDqinK}< zJ8;+g9?T*{L`tTBu(N;glN_&2LVudLUy??3?;seySohGEpF=Rl+EO)7J=~U+_=#`^ z?AOA|apR%UlpavLUp;ykxrgizj!;9n)yn5;O)hp+; z#cxydRo6^WS3+h8e{V$4QqNEMWL2^H#OA1bSwxPaC7_hh*e>s%WFV92JpT5mq5#~Mj$d4F9H&p^20E4=z9a8>H}G;d7P5a ztQ>4>CZ49(i9w2=$w7FH_q}8|V?47xRDfI$a5q?I4|w1=UOq205@KlLcsb`vCvbK~ z)2+TROa}hF9Q%-%T^v@TzmKuBc#8E9c_`CwXEKVd#3V?|fs}3oYt{D26<&8rc+qz& z6YxCBeMG0ZD_&m*XqKjZH_7k)AE2~F@p)EaP*2NP?8FaWx1#65^iuJO>A|d(P}x^2 z_V1w|1^!u#SpM8p@;fo1I|y5WB)WT0S5-$(y+ z-Ao2JKSWcn>Q4uY8cx8P;xe+o09Cg{pQ1|P8M)aEnLoRkg63@9-`<}Ba?rzoW)WQ> zM7-WUdcB=1RkRZ|P$T z(cS0^7aT~5+4X3{AgQ~T2pJQ6R^R^2iZTMqb6BYaEOs9Uv>C+f@O2><<5W+QVBUeV zdf1o*%Xxk_Na^L2y*d0GHPu(q0!;eHg=w~ZdU}`Rmr1b8=g)kw>?${db5m-lKkg01 z*T*(3EScq;p&?d{_KBvLf&EF|$sbZ_8zM!%Vm zA9K7M|AY`#m1);pCsrHJSjxRxISF4Af)cDGZL-?^Q#6EyLS(?8~fz7XgJ!IEu zMjdiJsT5bS&NgUsea%_PoHG51g6M)*#O*XgV0VE?Ii?k#ojSmw^#+z^MQ2(3Uv`l& z1>+NfLXY-9c-K5WNc0*%gXrOmu_9MIr91jlE@@b%R)j$L%Il?4$>8$JCF#{T?p`J3 z1U_R9#I*=050nYK%waS>RMB+tRY=(hW$+FIETf6DzKz3Mig#~k3@i)kf~3SWx=CEP z)fkLH*iHesGqO1i=#MMX9*JcEtYcp-oIe!0Vfi9WT%+oG3By^86lJaCug`v*AFq#z zuTW6K?vzbkU>CMOe^>P0M=e|-I$U!vM`%sIKRWeGwVY1Cqo7d$jE-gN%`43-b;(RC zbM8={0ryq7EC@hU9$hbWy*Sl5fsJ`r@WkvUYMQKgV@?Zgp4wdYoA<4*?^AwGe^Bha z{7%w%vuIuzmYq41T;qhoNL`psn7*`gPU5`ASSFaEp>J)@p4`=+5Ri^`WeG?X(kej*kEA zKlo1{cgIu`qy|A8h?6wa9)DsvlWcC3;PszoKe=RaNEx#o#200&?NcFD=A3OW>`IWy zip>w?-Es%e8j|e)p$F-C1{RlZRXrD8en67le%kApu7~j|07TYg-J8LP_o<%sm^FqX z=tJ<%<4Da~l;yAPl7WPx;KqtM{LJB=PQQQs&uBaqen{0eX( zewzk`hK3H4KLK^#g^xX*z0>UypYYS1>bG(^9U!c+wmIhrisrf(MeV>rJdzH5(F-nPHUE zZDQY6j70ia7Ofht8i|`Hs0!1Y*arl$2pKP)H{YK>eMW~d5q;w< zt#ZqvQmkWT=P)cw?dmPOa3TKZ1$wG3zwmf$2B9+6Q;>rRQj+iq8>1`DilD!`oW zlPr8!{d48VxIqT%C_=O7QeglOg{>FmsAR|e(7d`Lu0DTv!X?^cyFb__Y0h^zOA=xO zbflI9;Gm5DI%>e*b@mtBf75CA8+lpt!YZQYVgeFfNUN&UrSpE$8*Jxo!C zpB?m5D>H&MCU)kB(;lu>sSzWN`~~mOsJwdfsgRBD(V!XrzyP9zqu*5mT+{ME)RytF zKlhZ*p}*qORP=^WQs4|MHsfiQt80^9Pv_LH4#8aq6ZZZ4dZO0EN`@L@Ea};rgzCgq znK5e_M!4pM&GXvO>L(T!7=@AJ!zOMW3fOxEyW%yKTre-#N1=XyFMvIpx2rg6u)3Y?mHhW)j@6h3 z7WQghH7W`X*0`oKU_tVps=-{%YtJ+vEdrquiME7vl zTA7ot4Fb}3L%;y7)8T|-1wgblzTXC{g10NF%b zQ*eQm+nMgCYLV1Iv(K1dY4L^8fD9OD`WcvUh81P-U$8n4~j~W~59SH`5jEKIAswwx%t%QasPAl##hB#T> z`iqxGcBv=)b}@ReHxwn? zHfO6OI%`lv7abfU0T)W>7+9!NsljPo;LrkMyJxdNl=kx&D1EwY>Ftr*4k}BNtX<8w zk-e-g2+3BmN>T$Ub8ze)q8D(m3M~tPlOt50Mc_W})&=EA>6ZQxqj-Bbyrb98cP>}l zPB)!)jexwjjW(v2_??Bq{uB;szfs-;ltK=1?>0_b1_&<=qnAW~xxPv#DdACKSHt&S zl1_}~11yQC-W%UB3k13-J#Y-%PFwZ9peVl-GM?|x!1}d%-?Qm7cCTf3f(hBDutREt zqn@?%#}Zl6Xz%}k{4|s9ze!W!bcUtD8E;OtHUc8Tla96)pkJq*jQTzv8^MGo9;kkys?3ZffHs`wEbe?AJ1JYfN--&-J2T;8GLvJxT7 zM36ex0rdatpUKSQ>am21#Xzr|znV+@w_Z7a7h9p)fRePbbpVNws$xuIkYXZ0;Iku1 zqe0@lpx#`3zz8K~y?*n26mLZroTx;2A4E?LvekuHOMe>-Hjo98fTSqy;`t}YK8r;r z|Ly<&a*F@+w~%GPxv>l+{LfSWNcNp1m_6m0?yrRY4%WCZy-H^MzgLd_h7IDguXjej z%a;@#us`*V%C=9^FK5(R{p2pbdh6jy)WP?@-fkkO-GAAb@Bu|3o@Jd2Vqjo@$+hG9eGpy3hgGikDxUkUhpckG>Z;kULb0xY~*vRYUS`q1|e16cwTf%!>eI!G!rBoopo>GgbOveF+kR%2>=!1A-9wmAF&14=Cj)3HMs*qKSjPp&-UZn zcA4gpb@(ywV}A38(UThe&*kRUbTOLeS2pK9u=#Q0b|k z9O>5;X6vhRiY9C)NqwP@uoUU4XQm6C43pY*aODVU_5f0q`O!TBy5bVwei?bW;PWH4 z6&9(BL+cDiy>Q~0uk+RJi0F(u%qlsT`*qle`Wn2)`}>!Y*dF!b8O^L@H8-3d+Z6M& zr9!!NW=lKPq947RO7JUx#5=(bIUi81a5XQNrV%NaNljTUZuw*GHHUwj-u%_C8JyIg zz?P&!Lt&fT271Abq`%(jnMzq{LqGF<2Ql(<;sqg+8wgxvim_JtX0TX(vo~fR2AJn$ z?kBd1eK`ylQ@@Q|lg^q{XDrE#nF-6UpeaPly1JZh!yA)U^76cAR|6|%u0$G|T|St; z3~AF)TPzxvzVMcNar#lf>c>kzetM4Imp0S1v^M)hbMkPCR=#af+#B15c^r zBL_A3)(8VtNx#N+h%^r!bQI`XT67!qll?}mD5vEz&|r0Oc>&5?ukZ$>&fY723N2=m7)zZw#-Ru0S`kxo15&hNPk7R0 zKRKpY464Lb5$EwVi4jBfHSphARgU}N6??MtmlAMRg2cM1R}SXl-yHQWzmo?!!OU_8 zv~D3yY#W2$^tn%!fV9Ye0!Cloi53iMU+wxW>3g;(f`9sCUnQ>r5qtKVpq#a|wJ}We z>6M~lA6cNv4^f2gCncNDWM{HUf;2Zgt3V+t#d2{nK!@L#k$}}2qBmbo*;4JNNWa8z zPx}{IjP}A?xKX=#NPn;RV%eXF7u-L36Y=yBPV?f0uzInXM#+)^c*>Ww-ON$e!?3br z4Wq5Z*7`WKOYxi~ZULe66b9H`ycQi|++yZ7R{i=W0?NopnK+ry#|t=R`Thnf{-u7) z;|Fi39~ZR7NQ&kj)TKFdP|m8!B|V_JCXhlB+nHqSKunR8%a2shi^LgWEK_9t3?G8RM~ePXRhzPEW0}Sc}A?b2=rM2bWlwZ3sZ1(`HZuuuZ|`$#gndD zJh9Linrk5vM+Amo@bDmBhR*F%9J+iTCN&4NcD~rLNV`{^WhBF9bT6@h$g{Gk?)2Hi zT@TnArXAdB2?hZXQt0_UrgGLg9?SkjXCT9*PgjYDb1|ej$>Y0`oyGL`{F0x(e`<&U z<7^-`z&_(}lX4iPMSLys$NeCWGH%i^Pb6dPU@lzbXxZnskmNB2VdlNT00hia*c(rQ zN$|f+RtYt!`ay1Vctp@bbygfSaes&b#Hn@D8`KnK6DO|o_(c9nN8SOyE$A;!Qy_ot zF!!RF#F>Bew{1s-y4<=%BvaH%WqT8JHi*IbVw>t;iY0@66&s-ax4~Pd>*B?KfE;w8 z_y02}Oj7EwZw4BM!BPW9HpC$P zmadiCukxQ^?FqY&QQlw18myXx0Lc>GH;anx)pIYV^8J;xIc1)ZV~pKVrp8b@8Oe2Y zGrW_4Bpj5aHg}@|mC9YHuv#{@5DE`+{$0=DAGz2wM_hk$JKJMlQ?7&6jw7U#Dp$OE zXAzmt)bzcaE`oRx$o3}V$~F?P=rYC9i^Tgsg%kvIDhXUUykbM<)-+}~jzHu@-}OD_ z@HB7V34rAaiLB}BKxR1`ek|CVoPJUg_Q?_Pis_{AV235}K3qxZlL;uyv5=>Q!A32p zHoX=yw6`y|o+P(VimRON*v+#0*`Z=D-KkJRsPj&-h+#D_2;_)DY!9J_Pz!@MQ=L9k z1GCrlYvf@&O@5(}U-g0G_0=9l5rUeoC!vZ0Wjv*8z#gN$5vzU`bQ2pJsQ4&UOO>g9 zrmQw`?_*VH8{@8W^4!YT-|6V2t7}?mt}0jfe;w%mURUS^tqmMz^FoT4+|;fM9pkl> zC7Gs*?O}%fWZL>6C(T29&7GZTfo7)L$(*PDik*CGTBN8TEA3Jm*w^sfhXqw3pY^jC^aZ z$smIujV2UI+=XOP>XXZ~FOoBo4LrNeKk#!vQ*BN>KABC!{7v_@WzH2m&2ilLlF?J4cryHCXZMGuKNQ@!S*)^=5CE6@*N(yONpKDd^)>SAwv)<%mcIzupo0 zpBk(&Ff6+Yf@GW z?Fk#mYR9>e)F!`r9r+6RaFRx)B&965$>SFlnl*4HY`L*p1%PMI@LVw~Pp9^$UNpC) zi^l-FkgjRua$^S4`gVc_7c!U5Z3Nu#KeU&dEU;9%S1|Men{yR~V`%A}qW4uHMWhl? zOFBuy(_kx>4%1P$>xA8qnODAaG5A4JZzK+h;X%XgRxGPLIE;>LxbH4hFT~TYI?=Bx z9-pTss4FC4bsXVN0%pL>y; zw*KuE-upouVh+;fEV4UN@3|L8_c+9lw62Qb{ZYyd83h9ammnNm22v!Z8 z8#7C+8>L*kiIWe*oQgWFxj=`z#QdnYSxB}AKQ@!)*=6q?)7gqf9$i7W7SYM{KIn&@ zh+TJOXDF7D8MAa7Tg{7KQdiw6I3x76qW2xii0L2q<Kc`v`!a-L}t#y(jD?MTU z3lP@mcLew!`26oD|25yie%RX7(X-^GwNLxPpU^JWKH@<}X`h#f@X|lwAs8?GZZ<%_ z=t(-t+FR&^3T^(iKm%_^xsSci-{_o^g%mESjz_J~;CpMEG_OS&=I2HZ&4*IB%$gowM}S^XdIkbJ zA5uunmxqnX=B?@4BDqHF?0Hw`7eLfDlXQ+9S8{aZjdf#?Bg73l?U9 zsppxV)qNJ>&rY~SIL5Y59{{?}vrw;M?=Xmgh@+T21TTtvshOog#Dz(mI_ zirixlCBmEmWW)i9bDr)N%_?BxaO>hHn~{sQi?F^fnK#K*pN5ZhJ<_63GKB=>#}I5L zCd11Q<^+(8>NYv`Bgvf~3h?<$_{w1P*&OiETNbySt|E$Goo}G81k*n|KwcK)Pn3Ezs zB~RY_kiwINi_+_YM#o=jN6Q_T;d7|4+^L`1oOj>HDlV5?do0-P2!O9!#tF2=Jt)<> z9ot${6l!HUp|H@BMpgIxBGXct zGg8_1!mnn|Ewx*@*xnn*8xYs!N?8T5wo00ZOanCwO0L(1)KZVh+}S2yr9{bokW@DP z+F9=TY4fKQ;eLW5g0zo!bd#Oh#t<@Kszb99I>N=EkdlvAMb2-b+!i=va)$6rqmONR z-^OS@Zf0+;PP#oWMpZ2(#q)_JqgS5yA?){>%ePMquN~PQPq1!l7C8@J)y0)_miw(X zk8+@Vf2hEG5$gX;L4%sD!u!tDW^uif)-a?8dUEi{a=FGVNFS6gw{S=h=ooezEGPW> zE7J2qP9kes6Xp3IuKTyv`fV})@}Og^@CNqs;1cMWLb^AV4u2fYEi1HBYKOnmv5>l8 z5=){D%302(+c5Fj9o2nyYqBXuz2Og}x#C6M_yo7kdM6fi`FKiS7BQ?5JV?zlh~N^? zft9amr@!&m&EpMBA)Kw|q6yJG#k#+TiHbs>JQdH++ zgpvh0_55~{s%QMTvQwszB=$(>OjCaR-q!agsZjyGHefbu@8MIphNE@b#Ha-t%2Nu;nIQmts7C*(;O6 zRgCP{c)$@yEsM`i7#6g_P7>PY)W7RO-FTvz%1E*;9xA#PaRs7^K>&e~SRt(r%bjny z4)wvVv&GAg$g|$ykF#e>9cqB(W&JP7835(oO3wTdmwa>Ae(~TBd|@;ER)^}N7}BJ7 z!UuVp=bMl#UL7P_zYI_;5Icy-DjeO|dKLj20aUzf0m!Q zJ}^V`bYl|3s2l1qUR(FZ_^vXW`zQ{vOR*BFRYpKm!@(&=iNcFFlIe#l61In$cA-d_u5C&J7x zADL4hBIv7IAG(42P1K)?f?Nnm|FUD_{Kign^1_DuhQuEG8$sOeD$mR?dv`RapR<*? z#xIj^*2~u@EZrmJ7*8)eX(fc6qkjQ-)5e6eK$#W~&uErVpE8!hw5aj9nvOEQc1unL z9oQwOOGDLQL)z5t69BBHx&>Ba{Z?E00{};Mw$jqb=jNqH7oN_*rsMCjg?34CalABm ziSD#~UrS$C8nHJ&vOTXW-Z3}=!*z@7``7=tKF=W!^b_fxOq*Szi`#e+BxsjBTYo~} zti8m-qc`k{+FBPVB3$pE3BOZYaFX7aN~*_6L`gc4UZI%zE^7S*?wA1d)5dGR^hW)3 zvOnFuNrW@op${2JJRd18Cug^K>GP@86gG?BY}!z8#W>{|KDW?gsXomD(fTSO=+lf1 z&*ucZYE7Y(;un<29-OeRoEKTW8O4`$lvScXVty7|KC!=D57)oT@9j_sXi7PhtA;Z6 z>g}78I?HFBGz#xRgKCGDD?=Y)ijsz+HO9|of(4sJnZl86uTeN!wW})1N{v6YnaY%G8?KLX(C;2KS67UV7yL`i9N8g@OaO zi|}QkS2M5twpZ;;pfqjdR_6iy1)XPS8qTQI85xY9GTr^yEGAjSN!c|EDM%Z6`Yto7 zAfGsDRKXg@Z`#C><`bz2Lf$L0Xk>QIqR`mmSG1u%es} z=L0Y|-{R-%nX1J&hc2Ye*9?~$VJ6YAiOinm#TLRcH+GkUNwT(+4lDNdI=+5#Y1&NhqK_K>~pLi^o9MgxtgGx@_6w92E%c2#gO z!p7hdK*G=)?KPff@4UNbJG$Q@c#Jlf<%*Q7ucE>`0tX!{H8C*#EBI2MraD{yR3K37 z%vu(UZ9}aM(1?HQ$I?dIaF4-wAqulcYcSS(5$;P=5FWh@~>S#%zn6tOJPP z<`OT+)#cYjXMcYdN|xkJ=*=>SQH(!rLK9`RxMR=4Equb?wwrU`^TC}b8=e!99@|1E ziaZDv%+I44x#RC}vrIu+G~ezeq}FccAR>1qDYIWLwsUm*{FEyFbz4(T*L&33c5Z7r zK7CA=sF@?CC|Lt}*tGJW+&rhA_CVFEVOMuqLdKKzR`#Pe(1=@g@@8CBrvlXPB#U!w zlddrg2xIfOl*N~m12kH4p4#*`yA>w}4b>@i)&Mf39)^k2xno+M%jSwt<+Uh^V{VwG(OUi?|ly{Jl?Mykh&8KH56*!bv0tlOY# zOyBY6{n&!Nu!~m(-EPtA4s~f5CBwCb)U(|=0 zD^KRy>ANQ{N!Q8jk<*P=6|`ySRIkwUs`l#i;=JEKIB@#F^=VE=lPO)vqoui8l<3X`%_lZ$O;Trq6n+I6^tb5fjj-7dYfxsOWL9hKv5}G%AdP{)gwK zSzW3D(}@3L0~G%DQ+5>AafvCuhmLJI=BhJq%i$GwOX9pJ;$Vds0gQP;{%U^!Li6gwM*O|1NL#4}Tf3pguRnBjG=6 zLal%X<$6@Kprdi0QzPp^%Fr`mNMO)nwT4E_;Yn88?E2O}NY$(P*;NU}G3T zQBZ;nI8e9hO-_eYY_qKu?6c6>Hs+jnj{2qw1t(s(V5241ije(Y4T!XMHUNi3;%yn@NRvrs%2f%oT9(e<&7aByW8_U;U~L`iPe| zvDBq6Z6pQXfUn71`FM)3=Mh4YKlSE239I0I@hGY82pFn&|ForEZhiem^0nWP3ybTe zZi^i&d)JWnK`)q3=eqLHLotCtGC7RVto!8asnvpK`n=b!)%us&9#SeFgPrZ@6%Ill z4Z-i7MM|!GM5o1iOcvzWOGF3ZjSo&2uq$>jC*B;osN3B&jUYc-iW#i!gzZcMAzYl=mQF;!vLI1)B3@FsRHr#|RzfM?NR41~^fjS*P zV{-w8Ol8E2t(7cse{bIm;Y2F|)Y686_C>!SCLqEeUoa`UrpkXf{Y0LF50kH9M99;P zjOR|u<@bo4Dx=e@m-lSk+fqSmN*$1D2`7ucxZBcIi^utC^30l|*vZ3Z7(|o=!(K6U zo+_CpdLQ@g9Y$(?I%8dYqB$vS#FRT9;RS_uP#LC08Wx(W|6 ze%$t(Q*gH84)IWw8C3;k*cB-W+x`7N`1n6M_g{f91zY-A@N?fC&N#fr5h*^JyF3LY z-IEI{)=z0aEub|U6DQ=ET!qX&c5}NBdzBvM=hAAw^TcaL&}TvB0PcgjN*vjQ%E%$k zxp44^!C+^7Kzn>qq_woN!&h+C|J)v$V>$bPMiO7V<5@-odlW#6n1Oo8 z#gZ}sNKAcK9%tpCg^xR@SH^>Ja>(V;mvep$&DVk{YdvI|!s<{NPtEoSE^`vzjB6|- zmn$L_6b}QwtbgF+tQlry3C-${ROigkad9LvZiiOjegk0vp)r<9d{oLT6{2aZp$447 z&NWMNR=p+%B05+Mu2u!VVz$&dF!ENKN7np9>j8G~6CTy$9Xz+M^UAt}pnm(1IQ^7# zsjYd0h_0v^{*WS5NF?)tHoMwBybk2l0QC{emOD3OJ(0(lgy{YT@46=y&P1jqD!Iz$?5 z0|mA*5+K-sztn&c@sF^L{fz*F5(9`}iSTu-7SLEJO;`uqgsqEFE|XF~QN|s)LNX=^ z;OM7`DkSe2?Cb^}tcy zz(l{=q7xM#Y%!JaMZ-%{r*q5+D?8knw-65_v z5V+1vemfc9)kTrEW%|ZnOn+7B2y$&5ROY{$_e%u;NNViw{C0T${vu!$FCOtDjQV{0 zA`aX(2hGbG-a_#Ba%u>>f$#v-&6qm;1{FAkL5bvGxsf_xxxHUU;3P)X^CTLBjZyb X5&E`50Ribo21huyBH|Zeo8A8dtRvYf literal 0 HcmV?d00001 From 3871e806bb94da85443017025760e30f0d5603b2 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 14:55:40 -0800 Subject: [PATCH 26/42] Update auto-investigation-action-center.md --- .../auto-investigation-action-center.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index c2c022f1ad..dba3b17e10 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -34,7 +34,7 @@ The action center consists of two main tabs, as described in the following table |Pending actions |Displays a list of ongoing investigations that require attention. Recommended actions are presented that your security operations team can approve or reject. | |History |Acts as an audit log for all of the following:
    - All actions taken by automated investigation and remediation in Microsoft Defender ATP
    Actions that were approved by your security operations team (some actions, such as sending a file to quarantine, can be undone)
    - All commands ran and remediation actions that were applied in Live Response (some actions can be undone)
    - Remediation actions applied by Windows Defender Antivirus (some actions can be undone) | -Use the Customize columns drop-down menu to select columns that you'd like to show or hide. +Use the **Customize columns** menu to select columns that you'd like to show or hide. From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. @@ -47,7 +47,7 @@ From this view, you can also download the entire list in CSV format using the ** On the **Investigations** page, you'll find a list of all automated investigations. Select an item in the list to view additional information about that automated investigation. -Use the Customize columns drop-down menu to select columns that you'd like to show or hide. +Use the **Customize columns** menu to select columns that you'd like to show or hide. From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. @@ -60,6 +60,6 @@ From the panel, you can click on the Open investigation page link to see the inv You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. -## Related topics -- [Automated investigation and investigation](automated-investigations.md) -- [Learn about the automated investigations dashboard](manage-auto-investigation.md) +Next steps + +[View and approve remediation actions](manage-auto-investigation.md) From 56d49316389123275b6dab099d25df484af96a20 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 15:27:24 -0800 Subject: [PATCH 27/42] Update auto-investigation-action-center.md --- .../auto-investigation-action-center.md | 19 ++++--------------- 1 file changed, 4 insertions(+), 15 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index dba3b17e10..65b8232367 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -31,15 +31,13 @@ The action center consists of two main tabs, as described in the following table |Tab |Description | |---------|---------| -|Pending actions |Displays a list of ongoing investigations that require attention. Recommended actions are presented that your security operations team can approve or reject. | -|History |Acts as an audit log for all of the following:
    - All actions taken by automated investigation and remediation in Microsoft Defender ATP
    Actions that were approved by your security operations team (some actions, such as sending a file to quarantine, can be undone)
    - All commands ran and remediation actions that were applied in Live Response (some actions can be undone)
    - Remediation actions applied by Windows Defender Antivirus (some actions can be undone) | +|Pending actions |Displays a list of ongoing investigations that require attention. Recommended actions are presented that your security operations team can approve or reject.

    **NOTE**: The Pending tab appears only if there are pending actions to be approved (or rejected). | +|History |Acts as an audit log for all of the following:
    - All actions taken by automated investigation and remediation in Microsoft Defender ATP
    Actions that were approved by your security operations team (some actions, such as sending a file to quarantine, can be undone)
    - All commands ran and remediation actions that were applied in Live Response sessions (some actions can be undone)
    - Remediation actions that were applied by Windows Defender Antivirus (some actions can be undone) | Use the **Customize columns** menu to select columns that you'd like to show or hide. -From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. +You can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. ->[!NOTE] ->The tab will only appear if there are pending actions for that category. ## Investigations page @@ -51,15 +49,6 @@ Use the **Customize columns** menu to select columns that you'd like to show or From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. -### Approve or reject an action -You'll need to manually approve or reject pending actions on each of these categories for the automated actions to proceed. - -Selecting an investigation from any of the categories opens a panel where you can approve or reject the remediation. Other details such as file or service details, investigation details, and alert details are displayed. - -From the panel, you can click on the Open investigation page link to see the investigation details. - -You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. - -Next steps +## Next steps [View and approve remediation actions](manage-auto-investigation.md) From 9746ba9a94cff09b6a835acc27d05e406d409b92 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Thu, 20 Feb 2020 15:45:23 -0800 Subject: [PATCH 28/42] Added final comments --- windows/client-management/mdm/policy-csp-bluetooth.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 2160f0b07a..40e770a691 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -448,7 +448,9 @@ There are multiple levels of encryption strength when pairing Bluetooth devices. The following list shows the supported values: - 0 (default) - All Bluetooth traffic is allowed. -- N - A number from 1 through 16 representing the bytes that must be used in the encryption process. At this time, 16 is the largest allowed value for N and 16 bytes is the largest key size that Bluetooth supports so far. If you wish to enforce Windows to use Bluetooth encryption at all times, but do not care about the precise encryption key strength, use a value of 1. +- N - A number from 1 through 16 representing the bytes that must be used in the encryption process. Currently, 16 is the largest allowed value for N and 16 bytes is the largest key size that Bluetooth supports. If you want to enforce Windows to always use Bluetooth encryption, ignoring the precise encryption key strength, use 1 as the value for N. + +For more information on allowed key sizes, refer to Bluetooth Core Specification v5.1. From b92b2c95869a2190a9417fff9d7f155ba1a4e37f Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 15:46:11 -0800 Subject: [PATCH 29/42] Update auto-investigation-action-center.md --- .../auto-investigation-action-center.md | 39 +++++++++++++++++-- 1 file changed, 36 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 65b8232367..3c337a125f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -22,13 +22,15 @@ When an automated investigation runs, a verdict is generated for each piece of e Pending and completed actions are listed in the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and the Investigations list ([https://securitycenter.windows.com/investigations](https://securitycenter.windows.com/investigations)). +>[!NOTE] +>If your organization has implemented role-based access to manage portal access, only authorized users or user groups who have permission to view the machine or machine group will be able to view the entire investigation. + ## The Action center ![Action center page](images/action-center.png) The action center consists of two main tabs, as described in the following table. - |Tab |Description | |---------|---------| |Pending actions |Displays a list of ongoing investigations that require attention. Recommended actions are presented that your security operations team can approve or reject.

    **NOTE**: The Pending tab appears only if there are pending actions to be approved (or rejected). | @@ -38,17 +40,48 @@ Use the **Customize columns** menu to select columns that you'd like to show or You can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. - ## Investigations page -![Investigations page](images/mdatp-investigations.jpg) +![Image of Auto investigations page](images/atp-auto-investigations-list.png) On the **Investigations** page, you'll find a list of all automated investigations. Select an item in the list to view additional information about that automated investigation. +By default, the automated investigations list displays investigations initiated in the last week. You can also choose to select other time ranges from the drop-down menu or specify a custom range. + Use the **Customize columns** menu to select columns that you'd like to show or hide. From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. +### Filters and details + +On the **Investigations** page, you can view details and use filters to focus on specific information. Filters include the following: +- **Status** (see the details below) +- **Triggering alert** (The alert that initiated the automated investigation) +- **Detection source** (The source of the alert that initiated the automated investigation.) +- **Entities** (these can include device or machines, and machine groups. You can filter the automated investigations list to zone in a specific machine to see other investigations related to the machine, or to see specific machine groups that you might have created.) +- **Threat** (The category of threat detected during the automated investigation.) +- **Tags** (Filter using manually added tags that capture the context of an automated investigation.) +- **Comments** (Select between filtering the list between automated investigations that have comments and those that don't.) + + +## Automated investigation status + +An automated investigation can be have one of the following status values: + +|Status |Description | +|---------|---------| +| No threats found | No malicious entities found during the investigation. | +| Failed | A problem has interrupted the investigation, preventing it from completing. | +| Partially remediated | A problem prevented the remediation of some malicious entities. | +| Pending action | Remediation actions require review and approval. | +| Waiting for machine | Investigation paused. The investigation will resume as soon as the machine is available. | +| Queued | Investigation has been queued and will resume as soon as other remediation activities are completed. | +| Running | Investigation ongoing. Malicious entities found will be remediated. | +| Remediated | Malicious entities found were successfully remediated. | +| Terminated by system | Investigation was stopped by the system. | +| Terminated by user | A user stopped the investigation before it could complete. | +| Partially investigated | Entities directly related to the alert have been investigated. However, a problem stopped the investigation of collateral entities. | + ## Next steps [View and approve remediation actions](manage-auto-investigation.md) From fa54328dd007ecbb3fee07f57ed32ed1811f6722 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 16:06:35 -0800 Subject: [PATCH 30/42] AIR fixes --- .../auto-investigation-action-center.md | 93 ++++++++-- .../manage-auto-investigation.md | 166 ++---------------- 2 files changed, 101 insertions(+), 158 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 3c337a125f..50b88498b3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -40,7 +40,7 @@ Use the **Customize columns** menu to select columns that you'd like to show or You can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. -## Investigations page +## The Investigations page ![Image of Auto investigations page](images/atp-auto-investigations-list.png) @@ -52,16 +52,19 @@ Use the **Customize columns** menu to select columns that you'd like to show or From this view, you can also download the entire list in CSV format using the **Export** feature, specify the number of items to show per page, and navigate between pages. -### Filters and details +### Filters for the list of investigations -On the **Investigations** page, you can view details and use filters to focus on specific information. Filters include the following: -- **Status** (see the details below) -- **Triggering alert** (The alert that initiated the automated investigation) -- **Detection source** (The source of the alert that initiated the automated investigation.) -- **Entities** (these can include device or machines, and machine groups. You can filter the automated investigations list to zone in a specific machine to see other investigations related to the machine, or to see specific machine groups that you might have created.) -- **Threat** (The category of threat detected during the automated investigation.) -- **Tags** (Filter using manually added tags that capture the context of an automated investigation.) -- **Comments** (Select between filtering the list between automated investigations that have comments and those that don't.) +On the **Investigations** page, you can view details and use filters to focus on specific information. The following table lists available filters: + +|Filter |Description | +|---------|---------| +|**Status** |(See [Automated investigation status](#automated-investigation-status)) | +|**Triggering alert** | The alert that initiated the automated investigation | +|**Detection source** |The source of the alert that initiated the automated investigation. | +|**Entities** | These can include device or machines, and machine groups. You can filter the automated investigations list to zone in a specific machine to see other investigations related to the machine, or to see specific machine groups that you might have created. | +|**Threat** |The category of threat detected during the automated investigation. | +|**Tags** |Filter using manually added tags that capture the context of an automated investigation.| +|**Comments** |Select between filtering the list between automated investigations that have comments and those that don't.| ## Automated investigation status @@ -82,6 +85,76 @@ An automated investigation can be have one of the following status values: | Terminated by user | A user stopped the investigation before it could complete. | | Partially investigated | Entities directly related to the alert have been investigated. However, a problem stopped the investigation of collateral entities. | +## View details about an automated investigation + +![Image of investigation details window](images/atp-analyze-auto-ir.png) + +You can view the details of an automated investigation to see information such as the investigation graph, alerts associated with the investigation, the machine that was investigated, and other information. + +In this view, you'll see the name of the investigation, when it started and ended. + +### Investigation graph + +The investigation graph provides a graphical representation of an automated investigation. All investigation related information is simplified and arranged in specific sections. Clicking on any of the icons brings you the relevant section where you can view more information. + +A progress ring shows two status indicators: +- Orange ring - shows the pending portion of the investigation +- Green ring - shows the running time portion of the investigation + +![Image of start, end, and pending time for an automated investigation](images/atp-auto-investigation-pending.png) + +In the example image, the automated investigation started on 10:26:59 AM and ended on 10:56:26 AM. Therefore, the entire investigation was running for 29 minutes and 27 seconds. + +The pending time of 16 minutes and 51 seconds reflects two possible pending states: pending for asset (for example, the device might have disconnected from the network) or pending for approval. + +From this view, you can also view and add comments and tags about the investigation. + +### Alerts + +The **Alerts** tab for an automated investigation shows details such as a short description of the alert that initiated the automated investigation, severity, category, the machine associated with the alert, user, time in queue, status, investigation state, and who the investigation is assigned to. + +Additional alerts seen on a machine can be added to an automated investigation as long as the investigation is ongoing. + +Selecting an alert using the check box brings up the alerts details pane where you have the option of opening the alert page, manage the alert by changing its status, see alert details, automated investigation details, related machine, logged-on users, and comments and history. + +Clicking on an alert title brings you the alert page. + +### Machines + +The **Machines** tab Shows details the machine name, IP address, group, users, operating system, remediation level, investigation count, and when it was last investigated. + +Machines that show the same threat can be added to an ongoing investigation and will be displayed in this tab. If 10 or more machines are found during this expansion process from the same entity, then that expansion action will require an approval and will be seen in the **Pending actions** view. + +Selecting a machine using the checkbox brings up the machine details pane where you can see more information such as machine details and logged-on users. + +Clicking on an machine name brings you the machine page. + +### Evidence + +The **Evidence** tab shows details related to threats associated with this investigation. + +### Entities + +The **Entities** tab shows details about entities such as files, process, services, drives, and IP addresses. The table details such as the number of entities that were analyzed. You'll gain insight into details such as how many are remediated, suspicious, or determined to be clean. + +### Log + +The **Log** tab gives a chronological detailed view of all the investigation actions taken on the alert. You'll see the action type, action, status, machine name, description of the action, comments entered by analysts who may have worked on the investigation, execution start time, duration, pending duration. + +As with other sections, you can customize columns, select the number of items to show per page, and filter the log. + +Available filters include action type, action, status, machine name, and description. + +You can also click on an action to bring up the details pane where you'll see information such as the summary of the action and input data. + +### Pending actions + +If there are pending actions on an automated investigation, you'll see a pop up similar to the following image. + +![Image of pending actions](images/pending-actions.png) + +When you click on the pending actions link, you'll be taken to the Action center. You can also navigate to the page from the navigation page by going to **automated investigation** > **Action center**. + ## Next steps [View and approve remediation actions](manage-auto-investigation.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 32343d94bd..3af42fe74d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -1,6 +1,6 @@ --- -title: Learn about the automated investigations dashboard in Microsoft Defender Security Center -description: View the automated investigations list. View the status, detection source and other details for automated investigations. +title: Review and approve actions following automated investigations in the Microsoft Defender Security Center +description: Review and approve (or reject) remediation actions following an automated investigation. keywords: autoir, automated, investigation, detection, dashboard, source, threat types, id, tags, machines, duration, filter export search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -8,8 +8,8 @@ ms.prod: w10 ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: security -ms.author: macapara -author: mjcaparas +ms.author: deniseb +author: denisebmsft ms.localizationpriority: medium manager: dansimp audience: ITPro @@ -17,154 +17,24 @@ ms.collection: M365-security-compliance ms.topic: conceptual --- -# Learn about the automated investigations dashboard -By default, the automated investigations list displays investigations initiated in the last week. You can also choose to select other time ranges from the drop-down menu or specify a custom range. +# Review and approve actions following an automated investigation ->[!NOTE] ->If your organization has implemented role-based access to manage portal access, only authorized users or user groups who have permission to view the machine or machine group will be able to view the entire investigation. +When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. For example, some actions, such as removing malware, are taken automatically. Other actions require review and approval to proceed. -Use the **Customize columns** drop-down menu to select columns that you'd like to show or hide. +As a best practice, make sure to approve (or reject) pending actions as soon as possible. This helps your automated investigations complete in a timely manner. -From this view, you can also download the entire list in CSV format using the **Export** button, specify the number of items to show per page, and navigate between pages. You also have the flexibility to filter the list based on your preferred criteria. +1. -![Image of Auto investigations page](images/atp-auto-investigations-list.png) + +You'll need to manually approve or reject pending actions on each of these categories for the automated actions to proceed. + +Selecting an investigation from any of the categories opens a panel where you can approve or reject the remediation. Other details such as file or service details, investigation details, and alert details are displayed. + +From the panel, you can click on the Open investigation page link to see the investigation details. + +You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. -**Filters**
    -You can use the following operations to customize the list of automated investigations displayed: +## Related articles - -**Triggering alert**
    -The alert that initiated the automated investigation. - -**Status**
    -An automated investigation can be in one of the following status: - -Status | Description -:---|:--- -| No threats found | No malicious entities found during the investigation. -| Failed | A problem has interrupted the investigation, preventing it from completing. | -| Partially remediated | A problem prevented the remediation of some malicious entities. | -| Pending action | Remediation actions require review and approval. | -| Waiting for machine | Investigation paused. The investigation will resume as soon as the machine is available. | -| Queued | Investigation has been queued and will resume as soon as other remediation activities are completed. | -| Running | Investigation ongoing. Malicious entities found will be remediated. | -| Remediated | Malicious entities found were successfully remediated. | -| Terminated by system | Investigation was stopped by the system. | -| Terminated by user | A user stopped the investigation before it could complete. -| Partially investigated | Entities directly related to the alert have been investigated. However, a problem stopped the investigation of collateral entities. | - - - -**Detection source**
    -Source of the alert that initiated the automated investigation. - -**Threat**
    -The category of threat detected during the automated investigation. - - -**Tags**
    -Filter using manually added tags that capture the context of an automated investigation. - -**Machines**
    -You can filter the automated investigations list to zone in a specific machine to see other investigations related to the machine. - -**Machine groups**
    -Apply this filter to see specific machine groups that you might have created. - -**Comments**
    -Select between filtering the list between automated investigations that have comments and those that don't. - -## Analyze automated investigations -You can view the details of an automated investigation to see information such as the investigation graph, alerts associated with the investigation, the machine that was investigated, and other information. - -In this view, you'll see the name of the investigation, when it started and ended. - -![Image of investigation details window](images/atp-analyze-auto-ir.png) - -The progress ring shows two status indicators: -- Orange ring - shows the pending portion of the investigation -- Green ring - shows the running time portion of the investigation - -![Image of start, end, and pending time for an automated investigation](images/atp-auto-investigation-pending.png) - -In the example image, the automated investigation started on 10:26:59 AM and ended on 10:56:26 AM. Therefore, the entire investigation was running for 29 minutes and 27 seconds. - -The pending time of 16 minutes and 51 seconds reflects two possible pending states: pending for asset (for example, the device might have disconnected from the network) or pending for approval. - -From this view, you can also view and add comments and tags about the investigation. - -### Investigation page -The investigation page gives you a quick summary on the status, alert severity, category, and detection source. - -You'll also have access to the following sections that help you see details of the investigation with finer granularity: - -- Investigation graph -- Alerts -- Machines -- Evidence -- Entities -- Log -- Pending actions - - >[!NOTE] - >The Pending actions tab is only displayed if there are actual pending actions. - -- Pending actions history - - >[!NOTE] - >The Pending actions history tab is only displayed when an investigation is complete. - -In any of the sections, you can customize columns to further expand to limit the details you see in a section. - -### Investigation graph -The investigation graph provides a graphical representation of an automated investigation. All investigation related information is simplified and arranged in specific sections. Clicking on any of the icons brings you the relevant section where you can view more information. - -### Alerts -Shows details such as a short description of the alert that initiated the automated investigation, severity, category, the machine associated with the alert, user, time in queue, status, investigation state, and who the investigation is assigned to. - -Additional alerts seen on a machine can be added to an automated investigation as long as the investigation is ongoing. - -Selecting an alert using the check box brings up the alerts details pane where you have the option of opening the alert page, manage the alert by changing its status, see alert details, automated investigation details, related machine, logged-on users, and comments and history. - -Clicking on an alert title brings you the alert page. - -### Machines -Shows details the machine name, IP address, group, users, operating system, remediation level, investigation count, and when it was last investigated. - -Machines that show the same threat can be added to an ongoing investigation and will be displayed in this tab. If 10 or more machines are found during this expansion process from the same entity, then that expansion action will require an approval and will be seen in the **Pending actions** view. - -Selecting a machine using the checkbox brings up the machine details pane where you can see more information such as machine details and logged-on users. - -Clicking on an machine name brings you the machine page. - -### Evidence -Shows details related to threats associated with this investigation. - -### Entities -Shows details about entities such as files, process, services, drives, and IP addresses. The table details such as the number of entities that were analyzed. You'll gain insight into details such as how many are remediated, suspicious, or determined to be clean. - -### Log -Gives a chronological detailed view of all the investigation actions taken on the alert. You'll see the action type, action, status, machine name, description of the action, comments entered by analysts who may have worked on the investigation, execution start time, duration, pending duration. - -As with other sections, you can customize columns, select the number of items to show per page, and filter the log. - -Available filters include action type, action, status, machine name, and description. - -You can also click on an action to bring up the details pane where you'll see information such as the summary of the action and input data. - -### Pending actions history -This tab is only displayed when an investigation is complete and shows all pending actions taken during the investigation. - - -## Pending actions -If there are pending actions on an automated investigation, you'll see a pop up similar to the following image. - -![Image of pending actions](images/pending-actions.png) - -When you click on the pending actions link, you'll be taken to the Action center. You can also navigate to the page from the navigation page by going to **automated investigation** > **Action center**. For more information, see [Action center](auto-investigation-action-center.md). - - -## Related topic -- [Investigate Microsoft Defender ATP alerts](investigate-alerts.md) -- [Manage actions related to automated investigation and remediation](auto-investigation-action-center.md) +[Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) \ No newline at end of file From fe0ac889f6cce95e176a2e8b7d71fa28353073c4 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 16:13:58 -0800 Subject: [PATCH 31/42] AIR content updates --- .../auto-investigation-action-center.md | 1 - .../manage-auto-investigation.md | 22 ++++++++++++++----- 2 files changed, 17 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index 50b88498b3..d297b71baf 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -18,7 +18,6 @@ ms.topic: article # View details and results of automated investigations -When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. Pending and completed actions are listed in the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and the Investigations list ([https://securitycenter.windows.com/investigations](https://securitycenter.windows.com/investigations)). diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 3af42fe74d..04e76fc5f1 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -23,18 +23,30 @@ When an automated investigation runs, a verdict is generated for each piece of e As a best practice, make sure to approve (or reject) pending actions as soon as possible. This helps your automated investigations complete in a timely manner. -1. +## Review pending actions +1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in. This takes you to your Security dashboard. -You'll need to manually approve or reject pending actions on each of these categories for the automated actions to proceed. +2. On the Security dashboard, in the navigation pane on the left, choose **Automated investigations** > **Action center**. -Selecting an investigation from any of the categories opens a panel where you can approve or reject the remediation. Other details such as file or service details, investigation details, and alert details are displayed. +3. Review any items on the **Pending** tab. -From the panel, you can click on the Open investigation page link to see the investigation details. + Selecting an investigation from any of the categories opens a panel where you can approve or reject the remediation. Other details such as file or service details, investigation details, and alert details are displayed. From the panel, you can click on the **Open investigation page** link to see the investigation details. -You also have the option of selecting multiple investigations to approve or reject actions on multiple investigations. + You can also select multiple investigations to approve or reject actions on multiple investigations. + +## Review completed actions + +1. Go to the Microsoft Defender Security Center ([https://securitycenter.windows.com](https://securitycenter.windows.com)) and sign in. This takes you to your Security dashboard. + +2. On the Security dashboard, in the navigation pane on the left, choose **Automated investigations** > **Action center**. + +3. Select the **History** tab. (If need be, expand the time period to display more data.) + +4. Select an item to view more details about that remediation action. + ## Related articles [Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) \ No newline at end of file From db84fe31d54897122fb822b17137dc6a5d569e95 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 20 Feb 2020 16:26:43 -0800 Subject: [PATCH 32/42] Update index.md --- windows/security/threat-protection/index.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 16ddcac988..fe2f573495 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -100,9 +100,9 @@ Endpoint detection and response capabilities are put in place to detect, investi In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. - [Automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) -- [Threat remediation](microsoft-defender-atp/automated-investigations.md#how-threats-are-remediated) -- [Manage automated investigation](microsoft-defender-atp/manage-auto-investigation.md) -- [Analyze automated investigation](microsoft-defender-atp/manage-auto-investigation.md#analyze-automated-investigations) +- [Overview of automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) +- [View details and results of automated investigations](microsoft-defender-atp/auto-investigation-action-center.md) +- [View and approve remediation actions](microsoft-defender-atp/manage-auto-investigation.md)
    From ded072442e1281303240e523ff7992249814076a Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 20 Feb 2020 17:06:08 -0800 Subject: [PATCH 33/42] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200220162439 (#2097) Co-authored-by: Direesh Kumar Kandakatla --- .../resolved-issues-windows-10-1803.yml | 20 ------------------- .../status-windows-10-1507.yml | 4 ++-- ...indows-10-1607-and-windows-server-2016.yml | 8 ++++---- .../status-windows-10-1709.yml | 8 ++++---- .../status-windows-10-1803.yml | 8 ++++---- ...indows-10-1809-and-windows-server-2019.yml | 8 ++++---- .../status-windows-10-1903.yml | 8 ++++---- .../status-windows-10-1909.yml | 8 ++++---- 8 files changed, 26 insertions(+), 46 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index c5f045f610..63b5bd826c 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -38,8 +38,6 @@ sections:

    Intermittent issues when printing
    The print spooler service may intermittently have issues completing a print job and results print job failure.

    See details >OS Build 17134.1009

    September 23, 2019
    KB4522014Resolved
    KB4520008October 08, 2019
    10:00 AM PT
    IME may become unresponsive or have High CPU usage
    Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

    See details >OS Build 17134.1006

    September 10, 2019
    KB4516058Resolved
    September 19, 2019
    04:08 PM PT
    Notification issue: \"Your device is missing important security and quality fixes.\"
    Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

    See details >N/A

    Resolved
    September 03, 2019
    12:32 PM PT -
    Devices starting using PXE from a WDS or SCCM servers may fail to start
    Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

    See details >OS Build 17134.829

    June 11, 2019
    KB4503286Resolved
    KB4512509August 19, 2019
    02:00 PM PT -
    Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
    Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

    See details >OS Build 17134.950

    August 13, 2019
    KB4512501Resolved
    KB4512509August 19, 2019
    02:00 PM PT " @@ -71,24 +69,6 @@ sections: " -- title: August 2019 -- items: - - type: markdown - text: " - - -
    DetailsOriginating updateStatusHistory
    Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
    After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

    Affected platforms:
    • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
    • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
    Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

    Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

    Back to top
    OS Build 17134.950

    August 13, 2019
    KB4512501
    Resolved
    KB4512509
    Resolved:
    August 19, 2019
    02:00 PM PT

    Opened:
    August 14, 2019
    03:34 PM PT
    - " - -- title: July 2019 -- items: - - type: markdown - text: " - - -
    DetailsOriginating updateStatusHistory
    Devices starting using PXE from a WDS or SCCM servers may fail to start
    Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

    Affected platforms:
    • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
    Resolution: This issue was resolved in KB4512509.

    Back to top
    OS Build 17134.829

    June 11, 2019
    KB4503286
    Resolved
    KB4512509
    Resolved:
    August 19, 2019
    02:00 PM PT

    Opened:
    July 10, 2019
    02:51 PM PT
    - " - - title: June 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 50e384face..9c9ab15b4e 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - +
    SummaryOriginating updateStatusLast updated
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496

    See details >
    N/A
    February 11, 2019
    KB4502496
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496

    See details >
    N/A
    February 11, 2020
    KB4502496
    Mitigated
    February 15, 2020
    01:22 AM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 10240.18368

    October 08, 2019
    KB4520011
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 10240.18094

    January 08, 2019
    KB4480962
    Mitigated
    April 25, 2019
    02:00 PM PT
    @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
    DetailsOriginating updateStatusHistory
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4502496
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4502496
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index ad5f5d081d..a70457e0ab 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -81,8 +81,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
    Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

    See details >
    OS Build 14393.2608

    November 13, 2018
    KB4467691
    Resolved External
    January 23, 2020
    02:08 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 14393.3274

    October 08, 2019
    KB4519998
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 14393.2724

    January 08, 2019
    KB4480961
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index b0ee5c7ec5..de65b88d9b 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -80,8 +80,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 16299.1387

    September 10, 2019
    KB4516066
    Resolved
    KB4534318
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 16299.1451

    October 08, 2019
    KB4520004
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 16299.904

    January 08, 2019
    KB4480978
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index f390bca9da..db738bc8ee 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -84,8 +84,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 17134.1006

    September 10, 2019
    KB4516058
    Resolved
    KB4534308
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 17134.1069

    October 08, 2019
    KB4520008
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 17134.523

    January 08, 2019
    KB4480966
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index da6e037493..b1fc3e7ceb 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -85,8 +85,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 17763.737

    September 10, 2019
    KB4512578
    Resolved
    KB4534321
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 17763.805

    October 08, 2019
    KB4519338
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Devices with some Asian language packs installed may receive an error
    Devices with Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

    See details >
    OS Build 17763.437

    April 09, 2019
    KB4493509
    Mitigated
    May 03, 2019
    10:59 AM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 4b98890fff..4fe4e28478 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + +
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Issues with some older versions of Avast and AVG anti-virus products
    Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

    See details >
    N/A

    Mitigated External
    November 25, 2019
    05:25 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 18362.418

    October 08, 2019
    KB4517389
    Mitigated External
    November 05, 2019
    03:36 PM PT
    @@ -83,8 +83,8 @@ sections: - type: markdown text: " - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1909.yml b/windows/release-information/status-windows-10-1909.yml index 355ff2a8c2..6029fe13f7 100644 --- a/windows/release-information/status-windows-10-1909.yml +++ b/windows/release-information/status-windows-10-1909.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + +
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Issues with some older versions of Avast and AVG anti-virus products
    Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

    See details >
    N/A

    Mitigated External
    November 25, 2019
    05:25 PM PT
    " @@ -82,8 +82,8 @@ sections: - type: markdown text: " - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " From cf721652c02613fb3d279346f93a7d61da0490f1 Mon Sep 17 00:00:00 2001 From: John Liu <49762389+ShenLanJohn@users.noreply.github.com> Date: Thu, 20 Feb 2020 17:25:55 -0800 Subject: [PATCH 34/42] CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200220162439 (#2097) (#2098) Co-authored-by: Direesh Kumar Kandakatla Co-authored-by: Direesh Kumar Kandakatla --- .../resolved-issues-windows-10-1803.yml | 20 ------------------- .../status-windows-10-1507.yml | 4 ++-- ...indows-10-1607-and-windows-server-2016.yml | 8 ++++---- .../status-windows-10-1709.yml | 8 ++++---- .../status-windows-10-1803.yml | 8 ++++---- ...indows-10-1809-and-windows-server-2019.yml | 8 ++++---- .../status-windows-10-1903.yml | 8 ++++---- .../status-windows-10-1909.yml | 8 ++++---- 8 files changed, 26 insertions(+), 46 deletions(-) diff --git a/windows/release-information/resolved-issues-windows-10-1803.yml b/windows/release-information/resolved-issues-windows-10-1803.yml index c5f045f610..63b5bd826c 100644 --- a/windows/release-information/resolved-issues-windows-10-1803.yml +++ b/windows/release-information/resolved-issues-windows-10-1803.yml @@ -38,8 +38,6 @@ sections:
    Intermittent issues when printing
    The print spooler service may intermittently have issues completing a print job and results print job failure.

    See details >OS Build 17134.1009

    September 23, 2019
    KB4522014Resolved
    KB4520008October 08, 2019
    10:00 AM PT
    IME may become unresponsive or have High CPU usage
    Some Input Method Editor (IME) including ChsIME.EXE and ChtIME.EXE, may become unresponsive or may have high CPU usage.

    See details >OS Build 17134.1006

    September 10, 2019
    KB4516058Resolved
    September 19, 2019
    04:08 PM PT
    Notification issue: \"Your device is missing important security and quality fixes.\"
    Some users may have incorrectly received the notification \"Your device is missing important security and quality fixes.\"

    See details >N/A

    Resolved
    September 03, 2019
    12:32 PM PT -
    Devices starting using PXE from a WDS or SCCM servers may fail to start
    Devices that start up using PXE images from Windows Deployment Services (WDS) may fail to start with error \"0xc0000001.\"

    See details >OS Build 17134.829

    June 11, 2019
    KB4503286Resolved
    KB4512509August 19, 2019
    02:00 PM PT -
    Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
    Applications made using VB6, macros using VBA, and VBScript may stop responding and you may receive an error.

    See details >OS Build 17134.950

    August 13, 2019
    KB4512501Resolved
    KB4512509August 19, 2019
    02:00 PM PT " @@ -71,24 +69,6 @@ sections: " -- title: August 2019 -- items: - - type: markdown - text: " - - -
    DetailsOriginating updateStatusHistory
    Apps using Visual Basic 6 (VB6), VBA, and VBScript may stop responding with error
    After installing KB4512501, applications that were made using Visual Basic 6 (VB6), macros using Visual Basic for Applications (VBA), and scripts or apps using Visual Basic Scripting Edition (VBScript) may stop responding and you may receive an \"invalid procedure call error.\"

    Affected platforms:
    • Client: Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10, version 1703; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1; Windows 7 SP1
    • Server: Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 SP1; Windows Server 2008 SP2
    Resolution: This issue was resolved in KB4512509. The ‘optional’ update will be available on Microsoft Update Catalog, Windows Update, Microsoft Update and Windows Server Update Services (WSUS). As with any 'optional' update, you will need to Check for updates to receive KB4512509 and install. For instructions, see Update Windows 10.

    Note Windows Update for Business customers should apply the update via Microsoft Update Catalog or Windows Server Update Services (WSUS).

    Back to top
    OS Build 17134.950

    August 13, 2019
    KB4512501
    Resolved
    KB4512509
    Resolved:
    August 19, 2019
    02:00 PM PT

    Opened:
    August 14, 2019
    03:34 PM PT
    - " - -- title: July 2019 -- items: - - type: markdown - text: " - - -
    DetailsOriginating updateStatusHistory
    Devices starting using PXE from a WDS or SCCM servers may fail to start
    Devices that start up using Preboot Execution Environment (PXE) images from Windows Deployment Services (WDS) or System Center Configuration Manager (SCCM) may fail to start with the error \"Status: 0xc0000001, Info: A required device isn't connected or can't be accessed\" after installing KB4503286 on a WDS server.

    Affected platforms:
    • Server: Windows Server 2008 SP2; Windows Server 2008 R2 SP1; Windows Server 2012; Windows Server 2012 R2; Windows Server 2016; Windows Server, version 1803; Windows Server 2019; Windows Server, version 1809; Windows Server, version 1903
    Resolution: This issue was resolved in KB4512509.

    Back to top
    OS Build 17134.829

    June 11, 2019
    KB4503286
    Resolved
    KB4512509
    Resolved:
    August 19, 2019
    02:00 PM PT

    Opened:
    July 10, 2019
    02:51 PM PT
    - " - - title: June 2019 - items: - type: markdown diff --git a/windows/release-information/status-windows-10-1507.yml b/windows/release-information/status-windows-10-1507.yml index 50e384face..9c9ab15b4e 100644 --- a/windows/release-information/status-windows-10-1507.yml +++ b/windows/release-information/status-windows-10-1507.yml @@ -60,7 +60,7 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - +
    SummaryOriginating updateStatusLast updated
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496

    See details >
    N/A
    February 11, 2019
    KB4502496
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496

    See details >
    N/A
    February 11, 2020
    KB4502496
    Mitigated
    February 15, 2020
    01:22 AM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 10240.18368

    October 08, 2019
    KB4520011
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 10240.18094

    January 08, 2019
    KB4480962
    Mitigated
    April 25, 2019
    02:00 PM PT
    @@ -78,7 +78,7 @@ sections: - type: markdown text: " - +
    DetailsOriginating updateStatusHistory
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4502496
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4502496
    You might encounter issues trying to install or after installing KB4502496.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4502496) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4502496 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4502496
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml index ad5f5d081d..a70457e0ab 100644 --- a/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml +++ b/windows/release-information/status-windows-10-1607-and-windows-server-2016.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -81,8 +81,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Windows may not start on certain Lenovo and Fujitsu laptops with less than 8GB of RAM
    Windows may fail to start on certain Lenovo and Fujitsu laptops that have less than 8 GB of RAM.

    See details >
    OS Build 14393.2608

    November 13, 2018
    KB4467691
    Resolved External
    January 23, 2020
    02:08 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 14393.3274

    October 08, 2019
    KB4519998
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 14393.2724

    January 08, 2019
    KB4480961
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1709.yml b/windows/release-information/status-windows-10-1709.yml index b0ee5c7ec5..de65b88d9b 100644 --- a/windows/release-information/status-windows-10-1709.yml +++ b/windows/release-information/status-windows-10-1709.yml @@ -60,8 +60,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -80,8 +80,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 16299.1387

    September 10, 2019
    KB4516066
    Resolved
    KB4534318
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 16299.1451

    October 08, 2019
    KB4520004
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 16299.904

    January 08, 2019
    KB4480978
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1803.yml b/windows/release-information/status-windows-10-1803.yml index f390bca9da..db738bc8ee 100644 --- a/windows/release-information/status-windows-10-1803.yml +++ b/windows/release-information/status-windows-10-1803.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -84,8 +84,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 17134.1006

    September 10, 2019
    KB4516058
    Resolved
    KB4534308
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 17134.1069

    October 08, 2019
    KB4520008
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Certain operations performed on a Cluster Shared Volume may fail
    Operations performed on files or folders on a CSV may fail with the error: STATUS_BAD_IMPERSONATION_LEVEL (0xC00000A5).

    See details >
    OS Build 17134.523

    January 08, 2019
    KB4480966
    Mitigated
    April 25, 2019
    02:00 PM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml index da6e037493..b1fc3e7ceb 100644 --- a/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml +++ b/windows/release-information/status-windows-10-1809-and-windows-server-2019.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + + @@ -85,8 +85,8 @@ sections: - type: markdown text: "
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Unable to create local users in Chinese, Japanese and Korean during device setup
    You might be unable to create users in Chinese, Japanese and Korean using Input Method Editor (IME) during OOBE.

    See details >
    OS Build 17763.737

    September 10, 2019
    KB4512578
    Resolved
    KB4534321
    January 23, 2020
    02:00 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 17763.805

    October 08, 2019
    KB4519338
    Mitigated External
    November 05, 2019
    03:36 PM PT
    Devices with some Asian language packs installed may receive an error
    Devices with Asian language packs installed may receive the error, \"0x800f0982 - PSFX_E_MATCHING_COMPONENT_NOT_FOUND.\"

    See details >
    OS Build 17763.437

    April 09, 2019
    KB4493509
    Mitigated
    May 03, 2019
    10:59 AM PT
    - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1903.yml b/windows/release-information/status-windows-10-1903.yml index 4b98890fff..4fe4e28478 100644 --- a/windows/release-information/status-windows-10-1903.yml +++ b/windows/release-information/status-windows-10-1903.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + +
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Issues with some older versions of Avast and AVG anti-virus products
    Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

    See details >
    N/A

    Mitigated External
    November 25, 2019
    05:25 PM PT
    TLS connections might fail or timeout
    Transport Layer Security (TLS) connections might fail or timeout when connecting or attempting a resumption.

    See details >
    OS Build 18362.418

    October 08, 2019
    KB4517389
    Mitigated External
    November 05, 2019
    03:36 PM PT
    @@ -83,8 +83,8 @@ sections: - type: markdown text: " - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " diff --git a/windows/release-information/status-windows-10-1909.yml b/windows/release-information/status-windows-10-1909.yml index 355ff2a8c2..6029fe13f7 100644 --- a/windows/release-information/status-windows-10-1909.yml +++ b/windows/release-information/status-windows-10-1909.yml @@ -64,8 +64,8 @@ sections: - type: markdown text: "
    This table offers a summary of current active issues and those issues that have been resolved in the last 30 days.

    - - + +
    SummaryOriginating updateStatusLast updated
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    “Reset this PC” feature might fail
    “Reset this PC” feature is also called “Push Button Reset” or PBR.

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244

    See details >
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    February 15, 2020
    01:22 AM PT
    Issues with some older versions of Avast and AVG anti-virus products
    Microsoft and Avast has identified compatibility issues with some versions of Avast and AVG Antivirus.

    See details >
    N/A

    Mitigated External
    November 25, 2019
    05:25 PM PT
    " @@ -82,8 +82,8 @@ sections: - type: markdown text: " - - + +
    DetailsOriginating updateStatusHistory
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2019
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    “Reset this PC” feature might fail
    Using the “Reset this PC” feature, also called “Push Button Reset” or PBR, might fail. You might restart into recovery with “Choose an option” at the top of the screen with various options or you might restart to your desktop and receive the error “There was a problem resetting your PC”.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016
    Workaround: The standalone security update, KB4524244 has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Update (LCU), Monthly Rollup or Security Only update.

    If you have installed this update and are experiencing this issue, the following steps should allow you to reset your device:
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
    5. Upon restart use the “Reset this PC” feature and you should not encounter this issue.

    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    You might encounter issues with KB4524244
    You might encounter issues trying to install or after installing KB4524244.

    Affected platforms:
    • Client: Windows 10, version 1909; Windows 10, version 1903; Windows 10, version 1809; Windows 10 Enterprise LTSC 2019; Windows 10, version 1803; Windows 10, version 1709; Windows 10 Enterprise LTSC 2016; Windows 10, version 1607; Windows 10 Enterprise LTSC 2015; Windows 8.1
    • Server: Windows Server, version 1909; Windows Server, version 1903; Windows Server, version 1809; Windows Server 2019; Windows Server, version 1803; Windows Server, version 1709 ; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012
    Workaround: To help a sub-set of affected devices, the standalone security update (KB4524244) has been removed and will not re-offered from Windows Update, Windows Server Update Services (WSUS) or Microsoft Update Catalog. Note This does not affect any other update, including Latest Cumulative Updates (LCUs), Monthly Rollups or Security Only updates.

    If this update is installed and you are experiencing issues, you can uninstall this update.
    1. Select the start button or Windows Desktop Search and type update history and select View your Update history.
    2. On the Settings/View update history dialog window, Select Uninstall Updates.
    3. On the Installed Updates dialog window, find and select KB4524244 and select the Uninstall button.
    4. Restart your device.
     
    Next steps: We are working on an improved version of this update in coordination with our partners and will release it in a future update.

    Back to top
    N/A
    February 11, 2020
    KB4524244
    Mitigated
    Last updated:
    February 15, 2020
    01:22 AM PT

    Opened:
    February 15, 2020
    12:02 AM PT
    " From dbb3f3d6257c36a4371bc364cee389c993a8f9e9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 21 Feb 2020 12:03:21 +0500 Subject: [PATCH 35/42] Update surface-hub-update-history.md --- devices/surface-hub/surface-hub-update-history.md | 1 - 1 file changed, 1 deletion(-) diff --git a/devices/surface-hub/surface-hub-update-history.md b/devices/surface-hub/surface-hub-update-history.md index 5d6989d80b..50af49ec5c 100644 --- a/devices/surface-hub/surface-hub-update-history.md +++ b/devices/surface-hub/surface-hub-update-history.md @@ -530,7 +530,6 @@ This update to the Surface Hub includes quality improvements and security fixes. ## Related topics -* [Windows 10 feature roadmap](https://go.microsoft.com/fwlink/p/?LinkId=785967) * [Windows 10 release information](https://go.microsoft.com/fwlink/p/?LinkId=724328) * [Windows 10 November update: FAQ](https://windows.microsoft.com/windows-10/windows-update-faq) * [Microsoft Surface update history](https://go.microsoft.com/fwlink/p/?LinkId=724327) From b2cf8944da6adb8d07452383625eceefda24745d Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 21 Feb 2020 16:34:31 +0500 Subject: [PATCH 36/42] Update audit-filtering-platform-policy-change.md --- .../auditing/audit-filtering-platform-policy-change.md | 8 -------- 1 file changed, 8 deletions(-) diff --git a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md index 4103970aa4..204a9b6320 100644 --- a/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md +++ b/windows/security/threat-protection/auditing/audit-filtering-platform-policy-change.md @@ -32,14 +32,6 @@ Audit Filtering Platform Policy Change allows you to audit events generated by c Windows Filtering Platform (WFP) enables independent software vendors (ISVs) to filter and modify TCP/IP packets, monitor or authorize connections, filter Internet Protocol security (IPsec)-protected traffic, and filter remote procedure calls (RPCs). -This subcategory is outside the scope of this document. - -| Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | -|-------------------|-----------------|-----------------|------------------|------------------|---------------------------------------------------------| -| Domain Controller | - | - | - | - | This subcategory is outside the scope of this document. | -| Member Server | - | - | - | - | This subcategory is outside the scope of this document. | -| Workstation | - | - | - | - | This subcategory is outside the scope of this document. | - - 4709(S): IPsec Services was started. - 4710(S): IPsec Services was disabled. From d8e3e0e9bf6ebbdb4e3c67cf2bfc4714069f40d1 Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Fri, 21 Feb 2020 08:45:17 -0800 Subject: [PATCH 37/42] Updating autopilot mail to be accurate HoloLens AutoPilot Preview ; != hlappreview@service.microsoft.com @scooley --- devices/hololens/hololens-insider.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-insider.md b/devices/hololens/hololens-insider.md index 3d8c8eb80a..c5b4546772 100644 --- a/devices/hololens/hololens-insider.md +++ b/devices/hololens/hololens-insider.md @@ -61,7 +61,7 @@ Here's a quick summary of what's new: - Support for FIDO2 Security Keys to enable secure and easy authentication for shared devices - Seamlessly apply a provisioning package from a USB drive to your HoloLens - Use a provisioning packages to enroll your HoloLens to your Mobile Device Management system -- Use Windows AutoPilot to set up and pre-configure new devices, quickly getting them ready for productive use. Send a note to hlappreview@service.microsoft.com to join the preview. +- Use Windows AutoPilot to set up and pre-configure new devices, quickly getting them ready for productive use. Send a note to hlappreview@microsoft.com to join the preview. - Dark Mode - many Windows apps support both dark and light modes, and now HoloLens customers can choose the default mode for apps that support both color schemes! Based on customer feedback, with this update we are setting the default app mode to "dark," but you can easily change this setting at any time. Navigate to Settings > System > Colors to find "Choose your default app mode." - Support for additional system voice commands - Hand Tracking improvements to reduce the tendency to close the index finger when pointing. This should make button pressing and 2D slate usage feel more accurate From e3ba16ab264549a99b7f2f5fe251cc55df48010b Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Fri, 21 Feb 2020 09:07:07 -0800 Subject: [PATCH 38/42] Update index.md --- windows/security/threat-protection/index.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index fe2f573495..968151ac71 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -100,7 +100,6 @@ Endpoint detection and response capabilities are put in place to detect, investi In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. - [Automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) -- [Overview of automated investigation and remediation](microsoft-defender-atp/automated-investigations.md) - [View details and results of automated investigations](microsoft-defender-atp/auto-investigation-action-center.md) - [View and approve remediation actions](microsoft-defender-atp/manage-auto-investigation.md) @@ -147,4 +146,4 @@ Integrate Microsoft Defender Advanced Threat Protection into your existing workf **[Microsoft Threat Protection](https://docs.microsoft.com/microsoft-365/security/mtp/microsoft-threat-protection)**
    - With Microsoft Threat Protection, Microsoft Defender ATP and various Microsoft security solutions form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate and automatically respond to sophisticated attacks. \ No newline at end of file + With Microsoft Threat Protection, Microsoft Defender ATP and various Microsoft security solutions form a unified pre- and post-breach enterprise defense suite that natively integrates across endpoint, identity, email, and applications to detect, prevent, investigate and automatically respond to sophisticated attacks. From 6c2448aa4717a09b17b96e9c443d1ccf83462536 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Fri, 21 Feb 2020 09:53:09 -0800 Subject: [PATCH 39/42] no more secure score --- .openpublishing.redirection.json | 12 +- windows/security/threat-protection/TOC.md | 5 - windows/security/threat-protection/index.md | 12 +- .../advanced-features.md | 1 - .../configure-email-notifications.md | 1 - .../data-retention-settings.md | 1 - .../enable-secure-score.md | 2 +- .../machines-view-overview.md | 2 +- ...oft-defender-advanced-threat-protection.md | 6 +- .../microsoft-defender-atp/oldTOC.txt | 6 - .../microsoft-defender-atp/onboard.md | 1 - .../microsoft-defender-atp/overview.md | 2 +- .../microsoft-defender-atp/portal-overview.md | 2 +- .../microsoft-defender-atp/product-brief.md | 15 +- .../secure-score-dashboard.md | 315 ------------------ .../security-operations-dashboard.md | 2 +- .../threat-and-vuln-mgt-scenarios.md | 3 +- .../microsoft-defender-atp/tvm-remediation.md | 8 +- .../microsoft-defender-atp/use.md | 4 +- .../why-use-microsoft-antivirus.md | 2 +- 20 files changed, 41 insertions(+), 361 deletions(-) delete mode 100644 windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 8012e7c7c5..1e5f3dcc03 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1729,7 +1729,17 @@ { "source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-defender-atp/overview-secure-score.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configuration-score", -"redirect_document_id": true +"redirect_document_id": false +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-defender-atp/secure-score-dashboard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configuration-score", +"redirect_document_id": false +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-atp/microsoft-defender-atp/enable-secure-score.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/configuration-score", +"redirect_document_id": false }, { "source_path": "windows/security/threat-protection/windows-defender-atp/partner-applications.md", diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index c969d4994f..6ae84d007a 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -108,7 +108,6 @@ #### [Use the automated investigation and remediation dashboard](microsoft-defender-atp/manage-auto-investigation.md) #### [Manage actions related to automated investigation and remediation](microsoft-defender-atp/auto-investigation-action-center.md) -### [Secure score](microsoft-defender-atp/overview-secure-score.md) ### [Threat analytics](microsoft-defender-atp/threat-analytics.md) ### [Advanced hunting]() @@ -342,9 +341,6 @@ #### [Privacy](microsoft-defender-atp/mac-privacy.md) #### [Resources](microsoft-defender-atp/mac-resources.md) - -### [Configure Secure score dashboard security controls](microsoft-defender-atp/secure-score-dashboard.md) - ### [Configure and manage Microsoft Threat Experts capabilities](microsoft-defender-atp/configure-microsoft-threat-experts.md) ### [Management and API support]() @@ -561,7 +557,6 @@ #### [Update data retention settings](microsoft-defender-atp/data-retention-settings.md) #### [Configure alert notifications](microsoft-defender-atp/configure-email-notifications.md) #### [Enable and create Power BI reports using Windows Defender Security center data](microsoft-defender-atp/powerbi-reports.md) -#### [Enable Secure score security controls](microsoft-defender-atp/enable-secure-score.md) #### [Configure advanced features](microsoft-defender-atp/advanced-features.md) ### [Permissions]() diff --git a/windows/security/threat-protection/index.md b/windows/security/threat-protection/index.md index 16ddcac988..fe37c119b1 100644 --- a/windows/security/threat-protection/index.md +++ b/windows/security/threat-protection/index.md @@ -1,7 +1,7 @@ --- title: Threat Protection (Windows 10) description: Learn how Microsoft Defender ATP helps protect against threats. -keywords: threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, secure score, advanced hunting, cyber threat hunting, web threat protection +keywords: threat protection, Microsoft Defender Advanced Threat Protection, attack surface reduction, next generation protection, endpoint detection and response, automated investigation and response, microsoft threat experts, configuration score, advanced hunting, cyber threat hunting, web threat protection search.product: eADQiWindows 10XVcnh ms.prod: w10 ms.mktglfcycl: deploy @@ -106,14 +106,12 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft -**[Secure score](microsoft-defender-atp/overview-secure-score.md)**
    +**[Configuration Score](microsoft-defender-atp/configuration-score.md)**
    >[!NOTE] -> Secure score is now part of [Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md) as [Configuration score](microsoft-defender-atp/configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page. +> Secure score is now part of [Threat & Vulnerability Management](microsoft-defender-atp/next-gen-threat-and-vuln-mgt.md) as [Configuration score](microsoft-defender-atp/configuration-score.md). -Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. -- [Asset inventory](microsoft-defender-atp/secure-score-dashboard.md) -- [Recommended improvement actions](microsoft-defender-atp/secure-score-dashboard.md) -- [Secure score](microsoft-defender-atp/overview-secure-score.md) +Microsoft Defender ATP includes a configuration score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. +- [Configuration score](microsoft-defender-atp/configuration-score.md) - [Threat analytics](microsoft-defender-atp/threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md index 4b41111aaa..2326198e30 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-features.md @@ -189,4 +189,3 @@ You'll have access to upcoming features which you can provide feedback on to hel - [Update data retention settings](data-retention-settings.md) - [Configure alert notifications](configure-email-notifications.md) - [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) -- [Enable Secure Score security controls](enable-secure-score.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md index 8fafbb0b85..96650774c3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-email-notifications.md @@ -100,5 +100,4 @@ This section lists various issues that you may encounter when using email notifi ## Related topics - [Update data retention settings](data-retention-settings.md) - [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) -- [Enable Secure Score security controls](enable-secure-score.md) - [Configure advanced features](advanced-features.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md index 703b8a3412..d2df7a0c6e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md +++ b/windows/security/threat-protection/microsoft-defender-atp/data-retention-settings.md @@ -44,5 +44,4 @@ During the onboarding process, a wizard takes you through the general settings o - [Update data retention settings](data-retention-settings.md) - [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md) - [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) -- [Enable Secure Score security controls](enable-secure-score.md) - [Configure advanced features](advanced-features.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md index 8829cf492a..76c04110e7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-secure-score.md @@ -38,7 +38,7 @@ Set the baselines for calculating the score of security controls on the Secure S 3. Click **Save preferences**. ## Related topics -- [View the Secure Score dashboard](secure-score-dashboard.md) +- [View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) - [Update data retention settings for Microsoft Defender ATP](data-retention-settings.md) - [Configure alert notifications in Microsoft Defender ATP](configure-email-notifications.md) - [Enable and create Power BI reports using Microsoft Defender ATP data](powerbi-reports.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md index 3380258c96..6b96503525 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/machines-view-overview.md @@ -78,7 +78,7 @@ Filter by machines that are well configured or require attention based on the se - **Well configured** - Machines have the security controls well configured. - **Requires attention** - Machines where improvements can be made to increase the overall security posture of your organization. -For more information, see [View the Secure Score dashboard](secure-score-dashboard.md). +For more information, see [View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md). ### Threat mitigation status diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index b08c20b0a4..9c596b4ec9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -98,11 +98,11 @@ In conjunction with being able to quickly respond to advanced attacks, Microsoft -**[Secure score](overview-secure-score.md)**
    +**[Configuration score](configuration-score.md)**
    > [!NOTE] -> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page. +> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). -Microsoft Defender ATP includes a secure score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. +Microsoft Defender ATP includes a configuration score to help you dynamically assess the security state of your enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of your organization. diff --git a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt index a65e4c2dbb..51d5efdc49 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt +++ b/windows/security/threat-protection/microsoft-defender-atp/oldTOC.txt @@ -95,9 +95,6 @@ #### [Manage actions related to automated investigation and remediation](auto-investigation-action-center.md) -### [Secure score](overview-secure-score.md) - - ### [Threat analytics](threat-analytics.md) @@ -298,8 +295,6 @@ ##### [Use the mpcmdrun.exe command line tool to manage next generation protection](../windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md) -### [Configure Secure score dashboard security controls](secure-score-dashboard.md) - ### [Configure and manage Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) @@ -481,7 +476,6 @@ ##### [Update data retention settings](data-retention-settings.md) ##### [Configure alert notifications](configure-email-notifications.md) ##### [Enable and create Power BI reports using Windows Security app data](powerbi-reports.md) -##### [Enable Secure score security controls](enable-secure-score.md) ##### [Configure advanced features](advanced-features.md) #### [Permissions]() diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboard.md b/windows/security/threat-protection/microsoft-defender-atp/onboard.md index 0d041b05e3..c304bcfd54 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboard.md @@ -31,7 +31,6 @@ Topic | Description :---|:--- [Configure attack surface reduction capabilities](configure-attack-surface-reduction.md) | By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. [Configure next generation protection](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md) | Configure next generation protection to catch all types of emerging threats. -[Configure Secure score dashboard security controls](secure-score-dashboard.md) | Configure the security controls in Secure score to increase the security posture of your organization. [Configure Microsoft Threat Experts capabilities](configure-microsoft-threat-experts.md) | Configure and manage how you would like to get cybersecurity threat intelligence from Microsoft Threat Experts. [Configure Microsoft Threat Protection integration](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/threat-protection-integration)| Configure other solutions that integrate with Microsoft Defender ATP. [Management and API support](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/management-apis)| Pull alerts to your SIEM or use APIs to create custom alerts. Create and build Power BI reports. diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview.md b/windows/security/threat-protection/microsoft-defender-atp/overview.md index 0e926f6f8d..8600ed540e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview.md @@ -38,7 +38,7 @@ Topic | Description [Next generation protection](../windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md) | Learn about the antivirus capabilities in Microsoft Defender ATP so you can protect desktops, portable computers, and servers. [Endpoint detection and response](overview-endpoint-detection-response.md) | Understand how Microsoft Defender ATP continuously monitors your organization for possible attacks against systems, networks, or users in your organization and the features you can use to mitigate and remediate threats. [Automated investigation and remediation](automated-investigations.md) | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. -[Secure score](overview-secure-score.md) | Quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to better protect your organization - all in one place. +[Configuration score](configuration-score.md) | Your configuration score shows the collective security configuration state of your machines across application, operating system, network, accounts, and security controls. [Microsoft Threat Experts](microsoft-threat-experts.md) | Managed cybersecurity threat hunting service. Learn how you can get expert-driven insights and data through targeted attack notification and access to experts on demand.

    **NOTE:**

    Microsoft Defender ATP customers need to apply for the Microsoft Threat Experts managed threat hunting service to get proactive Targeted Attack Notifications and to collaborate with experts on demand. Experts on Demand is an add-on service. Targeted Attack Notifications are always included after you have been accepted into Microsoft Threat Experts managed threat hunting service.

    If you are not enrolled yet and would like to experience its benefits, go to **Settings** > **General** > **Advanced features** > **Microsoft Threat Experts** to apply. Once accepted, you will get the benefits of Targeted Attack Notifications, and start a 90-day trial of Experts on Demand. Contact your Microsoft representative to get a full Experts on Demand subscription. [Advanced hunting](advanced-hunting-overview.md) | Use a powerful query-based threat-hunting tool to proactively find breach activity and create custom detection rules. [Management and APIs](management-apis.md) | Microsoft Defender ATP supports a wide variety of tools to help you manage and interact with the platform so that you can integrate the service into your existing workflows. diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index 480df72feb..ceb8637a40 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -122,5 +122,5 @@ Icon | Description ## Related topics - [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) - [View the Security operations dashboard](security-operations-dashboard.md) -- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) +- [View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) - [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/product-brief.md b/windows/security/threat-protection/microsoft-defender-atp/product-brief.md index 2a83d109de..e69a6bc890 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/product-brief.md +++ b/windows/security/threat-protection/microsoft-defender-atp/product-brief.md @@ -36,33 +36,33 @@ Capability | Description **Threat and Vulnerability Management** | This built-in capability uses a game-changing risk-based approach to the discovery, prioritization, and remediation of endpoint vulnerabilities and misconfigurations. **Attack Surface Reduction** | The attack surface reduction set of capabilities provide the first line of defense in the stack. By ensuring configuration settings are properly set and exploit mitigation techniques are applied, these set of capabilities resist attacks and exploitations. **Next Generation Protection** | To further reinforce the security perimeter of the organizations network, Microsoft Defender ATP uses next generation protection designed to catch all types of emerging threats. -**Endpoint Detection & Response** | Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. -**Auto Investigation & Remediation** | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. +**Endpoint Detection & Response** | Endpoint detection and response capabilities are put in place to detect, investigate, and respond to advanced threats that may have made it past the first two security pillars. +**Auto Investigation & Remediation** | In conjunction with being able to quickly respond to advanced attacks, Microsoft Defender ATP offers automatic investigation and remediation capabilities that help reduce the volume of alerts in minutes at scale. **Microsoft Threat Experts** | Microsoft Defender ATP's new managed threat hunting service provides proactive hunting, prioritization, and additional context and insights that further empower Security operation centers (SOCs) to identify and respond to threats quickly and accurately. -**Secure Score** | Microsoft Defender ATP includes a secure score to help dynamically assess the security state of the enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of the organization. +**Configuration Score** | Microsoft Defender ATP includes configuration score to help dynamically assess the security state of the enterprise network, identify unprotected systems, and take recommended actions to improve the overall security of the organization. **Advance Hunting** | Create custom threat intelligence and use a powerful search and query tool to hunt for possible threats in the organization. **Management and API** | Integrate Microsoft Defender Advanced Threat Protection into existing workflows. **Microsoft Threat Protection** | Microsoft Defender ATP is part of the Microsoft Threat Protection solution that helps implement end-to-end security across possible attack surfaces in the modern workplace. Bring the power of Microsoft threat protection to the organization. | | Microsoft Defender ATP uses the following combination of technology built into Windows 10 and Microsoft's robust cloud service: -- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors +- **Endpoint behavioral sensors**: Embedded in Windows 10, these sensors collect and process behavioral signals from the operating system and sends this sensor data to your private, isolated, cloud instance of Microsoft Defender ATP. - -- **Cloud security analytics**: Leveraging big-data, machine-learning, and +- **Cloud security analytics**: Leveraging big-data, machine-learning, and unique Microsoft optics across the Windows ecosystem, enterprise cloud products (such as Office 365), and online assets, behavioral signals are translated into insights, detections, and recommended responses to advanced threats. -- **Threat intelligence**: Generated by Microsoft hunters, security teams, +- **Threat intelligence**: Generated by Microsoft hunters, security teams, and augmented by threat intelligence provided by partners, threat intelligence enables Microsoft Defender ATP to identify attacker tools, techniques, and procedures, and generate alerts when these are observed in collected sensor data. ## Licensing requirements + Microsoft Defender Advanced Threat Protection requires one of the following Microsoft Volume Licensing offers: - Windows 10 Enterprise E5 @@ -71,4 +71,5 @@ Microsoft Defender Advanced Threat Protection requires one of the following Micr - Microsoft 365 A5 (M365 A5) ## Related topic + - [Prepare deployment](prepare-deployment.md) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md deleted file mode 100644 index 1ac2ee7415..0000000000 --- a/windows/security/threat-protection/microsoft-defender-atp/secure-score-dashboard.md +++ /dev/null @@ -1,315 +0,0 @@ ---- -title: Configure the security controls in Secure score -description: Configure the security controls in Secure score -keywords: secure score, dashboard, security recommendations, security control state, security score, score improvement, microsoft secure score, security controls, security control, improvement opportunities, edr, antivirus, av, os security updates -search.product: eADQiWindows 10XVcnh -search.appverid: met150 -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.pagetype: security -ms.author: dolmont -author: DulceMontemayor -ms.localizationpriority: medium -manager: dansimp -audience: ITPro -ms.collection: M365-security-compliance -ms.topic: conceptual ---- - -# Configure the security controls in Secure score - -**Applies to:** - -* [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -> [!NOTE] -> Secure score is now part of [Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) as [Configuration score](configuration-score.md). The secure score page will be available for a few weeks. View the [Secure score](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-secure-score) page. - -Each security control lists recommendations that you can take to increase the security posture of your organization. - -### Endpoint detection and response (EDR) optimization - -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for your Endpoint detection and response tool. - -> [!IMPORTANT] -> This feature is available for machines on Windows 10, version 1607 or later. - -#### Minimum baseline configuration setting for EDR - -* Microsoft Defender ATP sensor is on -* Data collection is working correctly -* Communication to Microsoft Defender ATP service is not impaired - -##### Recommended actions - -You can take the following actions to increase the overall security score of your organization: - -* Turn on sensor -* Fix sensor data collection -* Fix impaired communications - -For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). - -### Windows Defender Antivirus (Windows Defender AV) optimization -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Windows Defender AV. - -> [!IMPORTANT] -> This feature is available for machines on Windows 10, version 1607 or later. - -#### Minimum baseline configuration setting for Windows Defender AV: -A well-configured machine for Windows Defender AV meets the following requirements: - -- Windows Defender AV is reporting correctly -- Windows Defender AV is turned on -- Security intelligence is up-to-date -- Real-time protection is on -- Potentially Unwanted Application (PUA) protection is enabled - -You can take the following actions to increase the overall security score of your organization: - ->[!NOTE] -> For the Windows Defender Antivirus properties to show, you'll need to ensure that the Windows Defender Antivirus Cloud-based protection is properly configured on the machine. - -- Fix antivirus reporting - - This recommendation is displayed when the Windows Defender Antivirus is not properly configured to report its health state. For more information on fixing the reporting, see [Configure and validate network connections](../windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md). -- Turn on antivirus -- Update antivirus Security intelligence -- Turn on real-time protection -- Turn on PUA protection - -For more information, see [Configure Windows Defender Antivirus](../windows-defender-antivirus/configure-windows-defender-antivirus-features.md). - -### OS security updates optimization - -This tile shows you the number of machines that require the latest security updates. It also shows machines that are running on the latest Windows Insider preview build and serves as a reminder to ensure that users should run the latest builds. - -> [!IMPORTANT] -> This feature is available for machines on Windows 10, version 1607 or later. - -You can take the following actions to increase the overall security score of your organization: - -* Install the latest security updates -* Fix sensor data collection - * The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. It's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). - -For more information, see [Windows Update Troubleshooter](https://support.microsoft.com/help/4027322/windows-windows-update-troubleshooter). - -### Windows Defender Exploit Guard (Windows Defender EG) optimization - - -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on machines to meet the minimum baseline configuration setting for Microsoft Defender EG. When endpoints are configured according to the baseline the Microsoft Defender EG events shows on the Microsoft Defender ATP Machine timeline. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1709 or later. - -#### Minimum baseline configuration setting for Windows Defender EG - -Machines are considered "well configured" for Microsoft Defender EG if the following requirements are met: - -* System level protection settings are configured correctly -* Attack Surface Reduction rules are configured correctly -* Controlled Folder Access setting is configured correctly - -##### System level protection - -The following system level configuration settings must be set to **On or Force On**: - -1. Control Flow Guard -2. Data Execution Prevention (DEP) -3. Randomize memory allocations (Bottom-up ASLR) -4. Validate exception chains (SEHOP) -5. Validate heap integrity - -> [!NOTE] -> The setting **Force randomization for images (Mandatory ASLR)** is currently excluded from the baseline. -> Consider configuring **Force randomization for images (Mandatory ASLR)** to **On or Force On** for better protection. - -##### Attack Surface Reduction (ASR) rules - -The following ASR rules must be configured to **Block mode**: - -Rule description | GUIDs --|- -Block executable content from email client and webmail | BE9BA2D9-53EA-4CDC-84E5-9B1EEEE46550 -Block Office applications from creating child processes | D4F940AB-401B-4EFC-AADC-AD5F3C50688A -Block Office applications from creating executable content | 3B576869-A4EC-4529-8536-B80A7769E899 -Impede JavaScript and VBScript to launch executables | D3E037E1-3EB8-44C8-A917-57927947596D -Block execution of potentially obfuscated scripts | 5BEB7EFE-FD9A-4556-801D-275E5FFC04CC -Block Win32 imports from Macro code in Office | 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7B - -> [!NOTE] -> The setting **Block Office applications from injecting into other processes** with GUID 75668C1F-73B5-4CF0-BB93-3ECF5CB7CC84 is excluded from the baseline. -> Consider enabling this rule in **Audit** or **Block mode** for better protection. - -##### Controlled Folder Access - -The Controlled Folder Access setting must be configured to **Audit mode** or **Enabled**. - -> [!NOTE] -> Audit mode, allows you to see audit events in the Microsoft Defender ATP Machine timeline however it does not block suspicious applications. -> Consider enabling Controlled Folder Access for better protection. - -##### Recommended actions - -You can take the following actions to increase the overall security score of your organization: - -- Turn on all system-level Exploit Protection settings -- Set all ASR rules to enabled or audit mode -- Turn on Controlled Folder Access -- Turn on Windows Defender Antivirus on compatible machines - -### Windows Defender Application Guard (Windows Defender AG) optimization -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Windows Defender AG. When endpoints are configured according to the baseline, Windows Defender AG events shows on the Microsoft Defender ATP Machine timeline. - -A well-configured machine complies to a minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Microsoft Defender AG. When endpoints are configured according to the baseline, Microsoft Defender AG events shows on the Microsoft Defender ATP Machine timeline. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1709 or later. - -#### Minimum baseline configuration setting for Windows Defender AG: -A well-configured machine for Windows Defender AG meets the following requirements: - -- Hardware and software prerequisites are met -- Windows Defender AG is turned on compatible machines -- Managed mode is turned on - -You can take the following actions to increase the overall security score of your organization: - -* Ensure hardware and software prerequisites are met - - > [!NOTE] - > This improvement item does not contribute to the security score in itself because it's not a prerequisite for Microsoft Defender AG. It gives an indication of a potential reason why Microsoft Defender AG is not turned on. - -* Turn on Microsoft Defender AG on compatible machines -* Turn on managed mode - -For more information, see [Microsoft Defender Application Guard overview](../windows-defender-application-guard/wd-app-guard-overview.md). - -### Windows Defender SmartScreen optimization - -A well-configured machine complies to a minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Microsoft Defender SmartScreen. - -> [!WARNING] -> Data collected by Microsoft Defender SmartScreen might be stored and processed outside of the storage location you have selected for your Microsoft Defender ATP data. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1709 or later. - -#### Minimum baseline configuration setting for Windows Defender SmartScreen: - -The following settings must be configured with the following settings: - -* Check apps and files: **Warn** or **Block** -* Microsoft Defender SmartScreen for Microsoft Edge: **Warn** or **Block** -* Microsoft Defender SmartScreen for Microsoft store apps: **Warn** or **Off** - -You can take the following actions to increase the overall security score of your organization: - -- Set **Check app and files** to **Warn** or **Block** -- Set **Windows Defender SmartScreen for Microsoft Edge** to **Warn** or **Block** -- Set **Windows Defender SmartScreen for Microsoft store apps** to **Warn** or **Off** - -For more information, see [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md). - -* Set **Check app and files** to **Warn** or **Block** -* Set **Windows Defender SmartScreen for Microsoft Edge** to **Warn** or **Block** -* Set **Windows Defender SmartScreen for Microsoft store apps** to **Warn** or **Off** - -For more information, see [Windows Defender SmartScreen](../windows-defender-smartscreen/windows-defender-smartscreen-overview.md). - -### Windows Defender Firewall optimization - -A well-configured machine must have Microsoft Defender Firewall turned on and enabled for all profiles so that inbound connections are blocked by default. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Microsoft Defender Firewall. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1709 or later. - -#### Minimum baseline configuration setting for Windows Defender Firewall - -* Microsoft Defender Firewall is turned on for all network connections -* Secure domain profile by enabling Microsoft Defender Firewall and ensure that Inbound connections are set to Blocked -* Secure private profile by enabling Microsoft Defender Firewall and ensure that Inbound connections are set to Blocked -* Secure public profile is configured by enabling Microsoft Defender Firewall and ensure that Inbound connections are set to Blocked - -For more information on Windows Defender Firewall settings, see [Planning settings for a basic firewall policy](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/planning-settings-for-a-basic-firewall-policy). - -> [!NOTE] -> If Windows Defender Firewall is not your primary firewall, consider excluding it from the security score calculations and make sure that your third-party firewall is configured in a securely. - -##### Recommended actions - -You can take the following actions to increase the overall security score of your organization: - -* Turn on firewall -* Secure domain profile -* Secure private profile -* Secure public profile -* Verify secure configuration of third-party firewall -* Fix sensor data collection - * The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. It's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). - -For more information, see [Windows Defender Firewall with Advanced Security](https://docs.microsoft.com/windows/security/identity-protection/windows-firewall/windows-firewall-with-advanced-security). - -### BitLocker optimization - -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for BitLocker. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1803 or later. - -#### Minimum baseline configuration setting for BitLocker - -* Ensure all supported drives are encrypted -* Ensure that all suspended protection on drives resume protection -* Ensure that drives are compatible - -##### Recommended actions - -You can take the following actions to increase the overall security score of your organization: - -* Encrypt all supported drives -* Resume protection on all drives -* Ensure drive compatibility -* Fix sensor data collection - * The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. It's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). - -For more information, see [Bitlocker](https://docs.microsoft.com/windows/security/information-protection/bitlocker/bitlocker-overview). - -### Windows Defender Credential Guard optimization -A well-configured machine complies to the minimum baseline configuration setting. This tile shows you a list of actions to apply on endpoints to meet the minimum baseline configuration setting for Windows Defender Credential Guard. - -> [!IMPORTANT] -> This security control is only applicable for machines with Windows 10, version 1709 or later. - -#### Minimum baseline configuration setting for Windows Defender Credential Guard: -Well-configured machines for Windows Defender Credential Guard meets the following requirements: - -- Hardware and software prerequisites are met -- Windows Defender Credential Guard is turned on compatible machines - -##### Recommended actions - -You can take the following actions to increase the overall security score of your organization: - -* Ensure hardware and software prerequisites are met -* Turn on Credential Guard -* Fix sensor data collection - * The Microsoft Defender ATP service relies on sensor data collection to determine the security state of a machine. The service will not be able to determine the security state of machines that are not reporting sensor data properly. It's important to ensure that sensor data collection is working properly. For more information, see [Fix unhealthy sensors](fix-unhealthy-sensors.md). - -For more information, see [Manage Windows Defender Credential Guard](https://docs.microsoft.com/windows/security/identity-protection/credential-guard/credential-guard-manage). - ->Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/en-us/WindowsForBusiness/windows-atp?ocid=docs-wdatp-sadashboard-belowfoldlink) - -## Related topics - -* [Overview of Secure score](overview-secure-score.md) -* [Risk-based Threat & Vulnerability Management](next-gen-threat-and-vuln-mgt.md) -* [Threat & Vulnerability Management dashboard overview](tvm-dashboard-insights.md) -* [Exposure score](tvm-exposure-score.md) -* [Configuration score](configuration-score.md) -* [Security recommendations](tvm-security-recommendation.md) -* [Remediation](tvm-remediation.md) -* [Software inventory](tvm-software-inventory.md) -* [Weaknesses](tvm-weaknesses.md) -* [Scenarios](threat-and-vuln-mgt-scenarios.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md index ea54e6d0ea..00820b5fe4 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md +++ b/windows/security/threat-protection/microsoft-defender-atp/security-operations-dashboard.md @@ -121,5 +121,5 @@ Click the user account to see details about the user account. For more informati ## Related topics - [Understand the Microsoft Defender Advanced Threat Protection portal](use.md) - [Portal overview](portal-overview.md) -- [View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) +- [View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) - [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) diff --git a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md index 7df11c3d9e..9f6f5b45c6 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md +++ b/windows/security/threat-protection/microsoft-defender-atp/threat-and-vuln-mgt-scenarios.md @@ -85,8 +85,9 @@ To lower down your threat and vulnerability exposure: 6. Review the machine **Security recommendation** tab again. The recommendation you've chosen to remediate is removed from the security recommendation list, and the exposure score decreases. ## Improve your security configuration + >[!NOTE] -> Secure score is now part of Threat & Vulnerability Management as [configuration score](configuration-score.md). The secure score page is available for a few weeks. View the [secure score](https://securitycenter.windows.com/securescore) page. +> Secure score is now part of Threat & Vulnerability Management as [configuration score](configuration-score.md). You can improve your security configuration when you remediate issues from the security recommendations list. As you do so, your configuration score improves, which means your organization becomes more resilient against cybersecurity threats and vulnerabilities. diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md index ffd3002549..a0465dd642 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-remediation.md @@ -66,10 +66,10 @@ When you submit a remediation request from Threat & Vulnerability Management, it It creates a security task which will be tracked in Threat & Vulnerability Management **Remediation** page, and it also creates a remediation ticket in Microsoft Intune. -The dashboard will show that status of your top remediation activities. Click any of the entries and it will take you to the **Remediation** page. You can mark the remediation activity as completed after the IT administration team remediates the task. +The dashboard will show that status of your top remediation activities. Click any of the entries and it will take you to the **Remediation** page. You can mark the remediation activity as completed after the IT administration team remediates the task. ## When to file for exception instead of remediating issues -You can file exceptions to exclude certain recommendation from showing up in reports and affecting risk scores or secure scores. +You can file exceptions to exclude certain recommendation from showing up in reports and affecting your configuration score. When you select a security recommendation, it opens up a flyout screen with details and options for your next step. You can either **Open software page**, choose from **Remediation options**, go through **Exception options** to file for exceptions, or **Report inaccuracy**. @@ -113,10 +113,10 @@ Clicking the link opens up to the **Security recommendations** page, where you c - **In effect** - The exception that you've filed is in progress ### Exception impact on scores -Creating an exception can potentially affect the Exposure Score (for both types of weaknesses) and Secure Score (for configurations) of your organization in the following manner: +Creating an exception can potentially affect the Exposure Score (for both types of weaknesses) and Configuration Score (for configurations) of your organization in the following manner: - **No impact** - Removes the recommendation from the lists (which can be reverse through filters), but will not affect the scores - **Mitigation-like impact** - As if the recommendation was mitigated (and scores will be adjusted accordingly) when you select it as a compensating control. -- **Hybrid** - Provides visibility on both No impact and Mitigation-like impact. It shows both the Exposure Score and Secure Score results out of the exception option that you made +- **Hybrid** - Provides visibility on both No impact and Mitigation-like impact. It shows both the Exposure Score and Configuration Score results out of the exception option that you made The exception impact shows on both the Security recommendations page column and in the flyout pane. diff --git a/windows/security/threat-protection/microsoft-defender-atp/use.md b/windows/security/threat-protection/microsoft-defender-atp/use.md index dbf6830312..1b86e94b66 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/use.md +++ b/windows/security/threat-protection/microsoft-defender-atp/use.md @@ -29,7 +29,7 @@ Microsoft Defender Security Center is the portal where you can access Microsoft Use the **Security operations** dashboard to gain insight on the various alerts on machines and users in your network. -Use the **Secure Score** dashboard to expand your visibility on the overall security posture of your organization. You'll see machines that require attention and recommendations that can help you reduce the attack surface in your organization. +Use the **Threat & Vulnerability Management** dashboard to expand your visibility on the overall security posture of your organization. You'll see machines that require attention and recommendations that can help you reduce the attack surface in your organization. Use the **Threat analytics** dashboard to continually assess and control risk exposure to Spectre and Meltdown. @@ -39,5 +39,5 @@ Topic | Description :---|:--- [Portal overview](portal-overview.md) | Understand the portal layout and area descriptions. [View the Security operations dashboard](security-operations-dashboard.md) | The Microsoft Defender ATP **Security operations dashboard** provides a snapshot of your network. You can view aggregates of alerts, the overall status of the service of the machines on your network, investigate machines, files, and URLs, and see snapshots of threats seen on machines. -[View the Secure Score dashboard and improve your secure score](secure-score-dashboard.md) | The **Secure Score dashboard** expands your visibility into the overall security posture of your organization. From this dashboard, you'll be able to quickly assess the security posture of your organization, see machines that require attention, as well as recommendations for actions to further reduce the attack surface in your organization - all in one place. +[View the Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md) | The **Threat & Vulnerability Management dashboard** lets you view exposure and configuration scores side-by-side with top security recommendations, software vulnerability, remediation activities, and exposed machines. [View the Threat analytics dashboard and take recommended mitigation actions](threat-analytics.md) | The **Threat analytics** dashboard helps you continually assess and control risk exposure to threats. Use the charts to quickly identify machines for the presence or absence of mitigations. \ No newline at end of file diff --git a/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md index 57b00a8aa0..9ba7a43bf9 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md @@ -34,7 +34,7 @@ Although you can use a non-Microsoft antivirus solution with Microsoft Defender | |Advantage |Why it matters | |--|--|--| |1|Antivirus signal sharing |Microsoft applications and services share signals across your enterprise organization, providing a stronger single platform. See [Insights from the MITRE ATT&CK-based evaluation of Windows Defender ATP](https://www.microsoft.com/security/blog/2018/12/03/insights-from-the-mitre-attack-based-evaluation-of-windows-defender-atp/). | -|2|Threat analytics and your secure score |Windows Defender Antivirus collects underlying system data used by [threat analytics](../microsoft-defender-atp/threat-analytics.md) and [secure score](../microsoft-defender-atp/overview-secure-score.md). This provides your organization's security team with more meaningful information, such as recommendations and opportunities to improve your organization's security posture. | +|2|Threat analytics and your configuration score |Windows Defender Antivirus collects underlying system data used by [threat analytics](../microsoft-defender-atp/threat-analytics.md) and [configuration score](../microsoft-defender-atp/configuration-score.md). This provides your organization's security team with more meaningful information, such as recommendations and opportunities to improve your organization's security posture. | |3|Performance |Microsoft Defender ATP is designed to work with Windows Defender Antivirus, so you get better performance when you use these offerings together. [Evaluate Windows Defender Antivirus](evaluate-windows-defender-antivirus.md) and [Microsoft Defender ATP](../microsoft-defender-atp/evaluate-atp.md).| |4|Details about blocked malware |More details and actions for blocked malware are available with Windows Defender Antivirus and Microsoft Defender ATP. [Understand malware & other threats](../intelligence/understanding-malware.md).| |5|Network protection |Your organization's security team can protect your network by blocking specific URLs and IP addresses. [Protect your network](../microsoft-defender-atp/network-protection.md).| From 0c5d83786e197895f5ce32f2b373085a582df757 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Fri, 21 Feb 2020 10:32:29 -0800 Subject: [PATCH 40/42] Update manage-auto-investigation.md --- .../manage-auto-investigation.md | 18 ++++++++++++++++-- 1 file changed, 16 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 04e76fc5f1..2114c8e188 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -21,7 +21,22 @@ ms.topic: conceptual When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. For example, some actions, such as removing malware, are taken automatically. Other actions require review and approval to proceed. -As a best practice, make sure to approve (or reject) pending actions as soon as possible. This helps your automated investigations complete in a timely manner. +## Remediation actions + +When a verdict of *Malicious* is reached for a piece of evidence, Microsoft Defender Advanced Threat Protection takes one of the following remediation actions automatically: +- Quarantine file +- Remove registry key +- Kill process +- Stop service +- Remove registry key +- Disable driver +- Remove scheduled task + +Evidence determined as *Suspicious* results in pending actions that require approval. As a best practice, make sure to approve (or reject) pending actions as soon as possible. This helps your automated investigations complete in a timely manner. + +No actions are taken when evidence is determined to be *Clean*. + +In Microsoft Defender Advanced Threat Protection, all verdicts are tracked and viewable in the Microsoft Defender Security Center. ## Review pending actions @@ -35,7 +50,6 @@ As a best practice, make sure to approve (or reject) pending actions as soon as You can also select multiple investigations to approve or reject actions on multiple investigations. - ## Review completed actions From c884a85484cc9907322a6169ce0733436eb74b85 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Fri, 21 Feb 2020 10:38:06 -0800 Subject: [PATCH 41/42] AIR fixes --- .../auto-investigation-action-center.md | 4 +--- .../microsoft-defender-atp/automated-investigations.md | 6 ++++++ .../microsoft-defender-atp/manage-auto-investigation.md | 4 +++- 3 files changed, 10 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md index d297b71baf..fdb2c392fa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md +++ b/windows/security/threat-protection/microsoft-defender-atp/auto-investigation-action-center.md @@ -18,8 +18,7 @@ ms.topic: article # View details and results of automated investigations - -Pending and completed actions are listed in the Action center ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and the Investigations list ([https://securitycenter.windows.com/investigations](https://securitycenter.windows.com/investigations)). +Pending and completed [remediation actions](manage-auto-investigation.md#remediation-actions) are listed in the **Action center** ([https://securitycenter.windows.com/action-center](https://securitycenter.windows.com/action-center)) and the **Investigations** page ([https://securitycenter.windows.com/investigations](https://securitycenter.windows.com/investigations)). >[!NOTE] >If your organization has implemented role-based access to manage portal access, only authorized users or user groups who have permission to view the machine or machine group will be able to view the entire investigation. @@ -65,7 +64,6 @@ On the **Investigations** page, you can view details and use filters to focus on |**Tags** |Filter using manually added tags that capture the context of an automated investigation.| |**Comments** |Select between filtering the list between automated investigations that have comments and those that don't.| - ## Automated investigation status An automated investigation can be have one of the following status values: diff --git a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md index 346bd331f0..17a56b7252 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md +++ b/windows/security/threat-protection/microsoft-defender-atp/automated-investigations.md @@ -85,3 +85,9 @@ When a pending action is approved, the entity is then remediated and this new st ## Next step - [Learn about the automated investigations dashboard](manage-auto-investigation.md) + +## Related articles + +- [Automated investigation and response in Office 365 Advanced Threat Protection](https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-air) + +- [Automated investigation and response in Microsoft Threat Protection](https://docs.microsoft.com/microsoft-365/security/mtp/mtp-autoir) \ No newline at end of file diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 2114c8e188..8289129ad0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -63,4 +63,6 @@ In Microsoft Defender Advanced Threat Protection, all verdicts are tracked and v ## Related articles -[Advanced Hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) \ No newline at end of file +- [Automated investigation and response in Office 365 Advanced Threat Protection](https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-air) + +- [Automated investigation and response in Microsoft Threat Protection](https://docs.microsoft.com/microsoft-365/security/mtp/mtp-autoir) \ No newline at end of file From 147a23a68dec25829a71968854c0919a9f803577 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Fri, 21 Feb 2020 12:24:22 -0800 Subject: [PATCH 42/42] Update manage-auto-investigation.md --- .../microsoft-defender-atp/manage-auto-investigation.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md index 8289129ad0..a9250abb97 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-auto-investigation.md @@ -19,10 +19,10 @@ ms.topic: conceptual # Review and approve actions following an automated investigation -When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. For example, some actions, such as removing malware, are taken automatically. Other actions require review and approval to proceed. - ## Remediation actions +When an automated investigation runs, a verdict is generated for each piece of evidence investigated. Verdicts can be *Malicious*, *Suspicious*, or *Clean*. Depending on the type of threat and resulting verdict, remediation actions occur automatically or upon approval by your organization’s security operations team. For example, some actions, such as removing malware, are taken automatically. Other actions require review and approval to proceed. + When a verdict of *Malicious* is reached for a piece of evidence, Microsoft Defender Advanced Threat Protection takes one of the following remediation actions automatically: - Quarantine file - Remove registry key @@ -32,11 +32,11 @@ When a verdict of *Malicious* is reached for a piece of evidence, Microsoft Defe - Disable driver - Remove scheduled task -Evidence determined as *Suspicious* results in pending actions that require approval. As a best practice, make sure to approve (or reject) pending actions as soon as possible. This helps your automated investigations complete in a timely manner. +Evidence determined as *Suspicious* results in pending actions that require approval. As a best practice, make sure to [approve (or reject) pending actions](#review-pending-actions) as soon as possible. This helps your automated investigations complete in a timely manner. No actions are taken when evidence is determined to be *Clean*. -In Microsoft Defender Advanced Threat Protection, all verdicts are tracked and viewable in the Microsoft Defender Security Center. +In Microsoft Defender Advanced Threat Protection, all verdicts are [tracked and viewable in the Microsoft Defender Security Center](#review-completed-actions). ## Review pending actions