From cc3a935ebc0de09a5b980a99a31db48a2691f674 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 14:49:52 -0800 Subject: [PATCH 01/91] revised toc entries and file names --- windows/device-security/TOC.md | 12 ++++---- ...t-windows-defender-application-control.md} | 12 ++++---- ...rd-enable-virtualization-based-security.md | 8 +++--- ...ploy-managed-installer-for-device-guard.md | 2 +- ...on-control-policy-rules-and-file-rules.md} | 10 +++---- ...y-windows-defender-application-control.md} | 10 +++---- .../device-guard-deployment-guide.md | 12 ++++---- ...d-windows-defender-application-control.md} | 10 +++---- ...r-windows-defender-application-control.md} | 6 ++-- ...-on-the-device-guard-deployment-process.md | 28 +++++++++---------- ...nt-planning-guidelines-for-device-guard.md | 8 +++--- ...y-windows-defender-application-control.md} | 22 +++++++-------- 12 files changed, 70 insertions(+), 70 deletions(-) rename windows/device-security/device-guard/{deploy-catalog-files-to-support-code-integrity-policies.md => deploy-catalog-files-to-support-windows-defender-application-control.md} (95%) rename windows/device-security/device-guard/{deploy-code-integrity-policies-policy-rules-and-file-rules.md => deploy-windows-defender-application-control-policy-rules-and-file-rules.md} (96%) rename windows/device-security/device-guard/{deploy-device-guard-deploy-code-integrity-policies.md => deploy-windows-defender-application-control.md} (80%) rename windows/device-security/device-guard/{introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md => introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md} (94%) rename windows/device-security/device-guard/{optional-create-a-code-signing-certificate-for-code-integrity-policies.md => optional-create-a-code-signing-certificate-for-windows-defender-application-control.md} (95%) rename windows/device-security/device-guard/{deploy-code-integrity-policies-steps.md => steps-to-deploy-windows-defender-application-control.md} (97%) diff --git a/windows/device-security/TOC.md b/windows/device-security/TOC.md index 13af847a45..5bfecea364 100644 --- a/windows/device-security/TOC.md +++ b/windows/device-security/TOC.md @@ -112,14 +112,14 @@ ## [Control the health of Windows 10-based devices](protect-high-value-assets-by-controlling-the-health-of-windows-10-based-devices.md) ## [Device Guard deployment guide](device-guard/device-guard-deployment-guide.md) -### [Introduction to Device Guard: virtualization-based security and code integrity policies](device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +### [Introduction to Device Guard: virtualization-based security and WDAC](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) ### [Requirements and deployment planning guidelines for Device Guard](device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md) ### [Planning and getting started on the Device Guard deployment process](device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md) -### [Deploy Device Guard: deploy code integrity policies](device-guard/deploy-device-guard-deploy-code-integrity-policies.md) -#### [Optional: Create a code signing certificate for code integrity policies](device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md) -#### [Deploy code integrity policies: policy rules and file rules](device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md) -#### [Deploy code integrity policies: steps](device-guard/deploy-code-integrity-policies-steps.md) -#### [Deploy catalog files to support code integrity policies](device-guard/deploy-catalog-files-to-support-code-integrity-policies.md) +### [Deploy WDAC](device-guard/deploy-windows-defender-application-control.md) +#### [Optional: Create a code signing certificate for WDAC](device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) +#### [Deploy WDAC: policy rules and file rules](device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md) +#### [Steps to deploy WDAC](device-guard/steps-to-deploy-windows-defender-application-control.md) +#### [Deploy catalog files to support WDAC](device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md) #### [Deploy Managed Installer for Device Guard](device-guard/deploy-managed-installer-for-device-guard.md) ### [Deploy Device Guard: enable virtualization-based security](device-guard/deploy-device-guard-enable-virtualization-based-security.md) diff --git a/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md b/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md similarity index 95% rename from windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md rename to windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md index 3c9fd5f347..1cdb8061a7 100644 --- a/windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md +++ b/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control.md @@ -29,7 +29,7 @@ To create a catalog file, you use a tool called **Package Inspector**. You must 1. Be sure that a WDAC policy is currently deployed in audit mode on the computer on which you will run Package Inspector. - Package Inspector does not always detect temporary installation files that are added and then removed from the computer during the installation process. To ensure that these binaries are also included in your catalog file, deploy a WDAC policy in audit mode. You can use the WDAC policy that you created and audited in [Create a Windows Defender Application Control policy from a reference computer](deploy-code-integrity-policies-steps.md#create-a-windows-defender-application-control-policy-from-a-reference-computer) and [Audit Windows Defender Application Control policies](deploy-code-integrity-policies-steps.md#audit-windows-defender-application-control-policies). + Package Inspector does not always detect temporary installation files that are added and then removed from the computer during the installation process. To ensure that these binaries are also included in your catalog file, deploy a WDAC policy in audit mode. You can use the WDAC policy that you created and audited in [Create a Windows Defender Application Control policy from a reference computer](steps-to-deploy-windows-defender-application-control.md#create-a-windows-defender-application-control-policy-from-a-reference-computer) and [Audit Windows Defender Application Control policies](steps-to-deploy-windows-defender-application-control.md#audit-windows-defender-application-control-policies). > **Note**  This process should **not** be performed on a system with an enforced Windows Defender Application Control policy, only with a policy in audit mode. If a policy is currently being enforced, you will not be able to install and run the application unless the policy already allows it. @@ -108,7 +108,7 @@ In this section, you sign a catalog file you generated by using PackageInspector - An internal certification authority (CA) code signing certificate or purchased code signing certificate -If you do not have a code signing certificate, see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) for a walkthrough of how to create one. That topic uses an example certificate name of **ContosoDGSigningCert**, and the procedure that follows uses that example certificate name to sign the catalog file that you created in [Create catalog files](#create-catalog-files), earlier in this topic. If you are using an alternate certificate or catalog file, update the following steps with the appropriate variables and certificate. +If you do not have a code signing certificate, see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) for a walkthrough of how to create one. That topic uses an example certificate name of **ContosoDGSigningCert**, and the procedure that follows uses that example certificate name to sign the catalog file that you created in [Create catalog files](#create-catalog-files), earlier in this topic. If you are using an alternate certificate or catalog file, update the following steps with the appropriate variables and certificate. To sign the existing catalog file, copy each of the following commands into an elevated Windows PowerShell session. @@ -120,7 +120,7 @@ To sign the existing catalog file, copy each of the following commands into an e > **Note**  This example specifies the catalog file you created in the [Create catalog files](#create-catalog-files) section. If you are signing another catalog file, update the *$ExamplePath* and *$CatFileName* variables with the correct information. -2. Import the code signing certificate that will be used to sign the catalog file. Import it to the signing user’s personal store. This example uses the certificate name from [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md). +2. Import the code signing certificate that will be used to sign the catalog file. Import it to the signing user’s personal store. This example uses the certificate name from [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md). 3. Sign the catalog file with Signtool.exe: @@ -156,7 +156,7 @@ After the catalog file is signed, add the signing certificate to a WDAC policy, ` Add-SignerRule -FilePath -CertificatePath -User ` -If you used step 2 to create a new WDAC policy, and want information about merging policies together, see [Merge Windows Defender Application Control policies](deploy-code-integrity-policies-steps.md#merge-windows-defender-application-control-policies). +If you used step 2 to create a new WDAC policy, and want information about merging policies together, see [Merge Windows Defender Application Control policies](steps-to-deploy-windows-defender-application-control.md#merge-windows-defender-application-control-policies). ## Deploy catalog files with Group Policy @@ -338,9 +338,9 @@ At the time of the next software inventory cycle, when the targeted clients rece ## Related topics -- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) - [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md) -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md b/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md index 524725b8f7..ab3baf28eb 100644 --- a/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md +++ b/windows/device-security/device-guard/deploy-device-guard-enable-virtualization-based-security.md @@ -70,7 +70,7 @@ If you don't want to use the [hardware readiness tool](https://www.microsoft.com 5. Select the **Enabled** button. For **Select Platform Security Level**: - **Secure Boot** provides as much protection as a computer’s hardware can support. If the computer does not have input/output memory management units (IOMMUs), enable **Secure Boot**. - - **Secure Boot with DMA** enables Secure Boot—and VBS itself—only on a computer that supports DMA, that is, a computer with IOMMUs. With this setting, any computer without IOMMUs will not have VBS or HVCI protection, although it can have WDAC enabled.
For information about how VBS uses the hypervisor to strengthen protections provided by WDAC, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats). + - **Secure Boot with DMA** enables Secure Boot—and VBS itself—only on a computer that supports DMA, that is, a computer with IOMMUs. With this setting, any computer without IOMMUs will not have VBS or HVCI protection, although it can have WDAC enabled.
For information about how VBS uses the hypervisor to strengthen protections provided by WDAC, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats). For **Virtualization Based Protection of Code Integrity**: @@ -93,7 +93,7 @@ Set the following registry keys to enable HVCI. This provides exactly the same s > [!IMPORTANT] -> - Among the commands that follow, you can choose settings for **Secure Boot** and **Secure Boot with DMA**. In most situations, we recommend that you choose **Secure Boot**. This option provides Secure Boot with as much protection as is supported by a given computer’s hardware. A computer with input/output memory management units (IOMMUs) will have Secure Boot with DMA protection. A computer without IOMMUs will simply have Secure Boot enabled.
In contrast, with **Secure Boot with DMA**, the setting will enable Secure Boot—and VBS itself—only on a computer that supports DMA, that is, a computer with IOMMUs. With this setting, any computer without IOMMUs will not have VBS or HVCI protection, although it can still have WDAC enabled.
For information about how VBS uses the hypervisor to strengthen protections provided by WDAC, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats).
+> - Among the commands that follow, you can choose settings for **Secure Boot** and **Secure Boot with DMA**. In most situations, we recommend that you choose **Secure Boot**. This option provides Secure Boot with as much protection as is supported by a given computer’s hardware. A computer with input/output memory management units (IOMMUs) will have Secure Boot with DMA protection. A computer without IOMMUs will simply have Secure Boot enabled.
In contrast, with **Secure Boot with DMA**, the setting will enable Secure Boot—and VBS itself—only on a computer that supports DMA, that is, a computer with IOMMUs. With this setting, any computer without IOMMUs will not have VBS or HVCI protection, although it can still have WDAC enabled.
For information about how VBS uses the hypervisor to strengthen protections provided by WDAC, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats).
> - All drivers on the system must be compatible with virtualization-based protection of code integrity; otherwise, your system may fail. We recommend that you enable these features on a group of test computers before you enable them on users' computers. #### For Windows 1607 and above @@ -289,6 +289,6 @@ Figure 6. Windows Defender Device Guard properties in the System Summary ## Related topics -- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md b/windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md index ef1f576075..c3cefa3e19 100644 --- a/windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md +++ b/windows/device-security/device-guard/deploy-managed-installer-for-device-guard.md @@ -29,7 +29,7 @@ If there are no deny rules present for the file, it will be authorized based on > Admins needs to ensure that there is a WDAC policy in place to allow the system to boot and run any other authorized applications that may not be deployed through a managed installer. > > Examples of WDAC policies available in C:\Windows\schemas\CodeIntegrity\ExamplePolicies help authorize Windows OS components, WHQL signed drivers and all Store apps. -> Admins can reference and customize them as needed for their Windows Defender Application Control deployment or create a custom WDAC policy as described in [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md#create-a-windows-defender-application-control-policy-from-a-reference-computer). +> Admins can reference and customize them as needed for their Windows Defender Application Control deployment or create a custom WDAC policy as described in [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md#create-a-windows-defender-application-control-policy-from-a-reference-computer). ## Configuring a managed installer with AppLocker and Windows Defender Application Control diff --git a/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md b/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md similarity index 96% rename from windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md rename to windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md index 4dc169b2f3..3b2d35881e 100644 --- a/windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md +++ b/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules.md @@ -16,10 +16,10 @@ ms.date: 10/20/2017 - Windows Server 2016 Windows Defender Application Control (WDAC) provides control over a computer running Windows 10 by specifying whether a driver or application is trusted and can be run. For an overview of WDAC, see: -- [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats) in "Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control." +- [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats) in "Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control." - [Windows Defender Application Control policy formats and signing](requirements-and-deployment-planning-guidelines-for-device-guard.md#windows-defender-application-control-policy-formats-and-signing) in "Requirements and deployment planning guidelines for Windows Defender Device Guard." -If you already understand the basics of WDAC and want procedures for creating, auditing, and merging WDAC policies, see [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md). +If you already understand the basics of WDAC and want procedures for creating, auditing, and merging WDAC policies, see [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md). This topic includes the following sections: @@ -36,7 +36,7 @@ A common system imaging practice in today’s IT organization is to establish a Optionally, WDAC can align with your software catalog as well as any IT department–approved applications. One straightforward method to implement WDAC is to use existing images to create one master WDAC policy. You do so by creating a WDAC policy from each image, and then by merging the policies. This way, what is installed on all of those images will be allowed to run, if the applications are installed on a computer based on a different image. Alternatively, you may choose to create a base applications policy and add policies based on the computer’s role or department. Organizations have a choice of how their policies are created, merged or serviced, and managed. -If you plan to use an internal CA to sign catalog files or WDAC policies, see the steps in [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md). +If you plan to use an internal CA to sign catalog files or WDAC policies, see the steps in [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md). ## Windows Defender Application Control policy rules @@ -120,5 +120,5 @@ They could also choose to create a catalog that captures information about the u ## Related topics -- [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats) -- [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md) +- [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats) +- [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md b/windows/device-security/device-guard/deploy-windows-defender-application-control.md similarity index 80% rename from windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md rename to windows/device-security/device-guard/deploy-windows-defender-application-control.md index 73677dec64..8becbe0a0e 100644 --- a/windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md +++ b/windows/device-security/device-guard/deploy-windows-defender-application-control.md @@ -17,10 +17,10 @@ ms.date: 10/20/2017 This section includes the following topics: -- [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) -- [Deploy Windows Defender Application Control: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md) -- [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md) -- [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-code-integrity-policies.md) +- [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) +- [Deploy Windows Defender Application Control: policy rules and file rules](deploy-windows-defender-application-control-policy-rules-and-file-rules.md) +- [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md) +- [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-windows-defender-application-control.md) - [Deploy Managed Installer for Windows Defender Application Control](deploy-managed-installer-for-device-guard.md) To increase the protection for devices that meet certain hardware requirements, you can use virtualization-based protection of code integrity with your Windows Defender Application Control (WDAC) policies. @@ -29,5 +29,5 @@ To increase the protection for devices that meet certain hardware requirements, ## Related topics -[Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +[Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/device-guard-deployment-guide.md b/windows/device-security/device-guard/device-guard-deployment-guide.md index 19bc9e6601..0408fa63d3 100644 --- a/windows/device-security/device-guard/device-guard-deployment-guide.md +++ b/windows/device-security/device-guard/device-guard-deployment-guide.md @@ -22,21 +22,21 @@ Windows Defender Device Guard also uses virtualization-based security to isolate This guide explores the individual features in Windows Defender Device Guard as well as how to plan for, configure, and deploy them. It includes: -- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) - [Requirements and deployment planning guidelines for Windows Defender Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md) - [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md) -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) - - [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) + - [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) - - [Deploy Windows Defender Application Control: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md) + - [Deploy Windows Defender Application Control: policy rules and file rules](deploy-windows-defender-application-control-policy-rules-and-file-rules.md) - - [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md) + - [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md) - - [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-code-integrity-policies.md) + - [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-windows-defender-application-control.md) - [Enable virtualization-based protection of code integrity](deploy-device-guard-enable-virtualization-based-security.md) diff --git a/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md b/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md similarity index 94% rename from windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md rename to windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md index 0e87f67867..f06a7859a8 100644 --- a/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md +++ b/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md @@ -42,7 +42,7 @@ In this guide, you learn about the individual features found within Windows Defe Prior to Windows 10, version 1709, Windows Defender Application Control (WDAC) was known as configurable code integrity policies. -Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](deploy-code-integrity-policies-steps.md#plug-ins). +Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](steps-to-deploy-windows-defender-application-control.md#plug-ins). ## Tools for managing Windows Defender Device Guard features @@ -53,18 +53,18 @@ You can easily manage Windows Defender Device Guard features by using familiar e - **Group Policy**. Windows 10 provides an administrative template to configure and deploy the configurable WDAC policies for your organization. Another template allows you to specify which hardware-based security features you would like to enable and deploy. You can manage these settings along with your existing Group Policy Objects (GPOs), which makes it simpler to implement Windows Defender Device Guard features. In addition to these WDAC and hardware-based security features, you can use Group Policy to help you manage your catalog files. - For a description of catalog files, see the table row describing **Exposure to unsigned code** in [How Windows Defender Device Guard features help protect against threats](#how-windows-defender-device-guard-features-help-protect-against-threats), earlier in this topic. - - For information about using Group Policy as a deployment tool, see:
[Deploy catalog files with Group Policy](deploy-catalog-files-to-support-code-integrity-policies.md#deploy-catalog-files-with-group-policy)
[Deploy and manage WDAC with Group Policy](deploy-code-integrity-policies-steps.md#deploy-and-manage-windows-defender-application-control-with-group-policy) + - For information about using Group Policy as a deployment tool, see:
[Deploy catalog files with Group Policy](deploy-catalog-files-to-support-windows-defender-application-control.md#deploy-catalog-files-with-group-policy)
[Deploy and manage WDAC with Group Policy](steps-to-deploy-windows-defender-application-control.md#deploy-and-manage-windows-defender-application-control-with-group-policy) -- **Microsoft System Center Configuration Manager**. You can use System Center Configuration Manager to simplify deployment and management of catalog files, WDAC policies, and hardware-based security features, as well as provide version control. For more information, see [Deploy catalog files with System Center Configuration Manager](deploy-catalog-files-to-support-code-integrity-policies.md#deploy-catalog-files-with-system-center-configuration-manager). +- **Microsoft System Center Configuration Manager**. You can use System Center Configuration Manager to simplify deployment and management of catalog files, WDAC policies, and hardware-based security features, as well as provide version control. For more information, see [Deploy catalog files with System Center Configuration Manager](deploy-catalog-files-to-support-windows-defender-application-control.md#deploy-catalog-files-with-system-center-configuration-manager). - **Microsoft Intune**. You can use Microsoft Intune to simplify deployment and management of WDAC policies, as well as provide version control. In a future release of Microsoft Intune, Microsoft is considering including features that will support the deployment and management of catalog files. -- **Windows PowerShell**. You can use Windows PowerShell to create and service WDAC policies. For more information, see [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md). +- **Windows PowerShell**. You can use Windows PowerShell to create and service WDAC policies. For more information, see [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md). These options provide the same experience you're used to in order to manage your existing enterprise management solutions. For more information about the deployment of Windows Defender Device Guard features, see: -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) - [Deploy virtualization-based protection of code integrity](deploy-device-guard-enable-virtualization-based-security.md) ## Other features that relate to Windows Defender Device Guard diff --git a/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md b/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md similarity index 95% rename from windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md rename to windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md index 42a717bb3d..668316004b 100644 --- a/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md +++ b/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control.md @@ -15,7 +15,7 @@ ms.date: 10/20/2017 - Windows 10 - Windows Server 2016 -As you deploy Windows Defender Application Control (WDAC) (also part of Windows Defender Device Guard), you might need to sign catalog files or WDAC policies internally. To do this, you will either need a publicly issued code signing certificate or an internal CA. If you have purchased a code signing certificate, you can skip this topic and instead follow other topics listed in [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md). +As you deploy Windows Defender Application Control (WDAC) (also part of Windows Defender Device Guard), you might need to sign catalog files or WDAC policies internally. To do this, you will either need a publicly issued code signing certificate or an internal CA. If you have purchased a code signing certificate, you can skip this topic and instead follow other topics listed in [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md). If you have an internal CA, complete these steps to create a code signing certificate. Only RSA algorithm is supported for the code signing certificate, and signatures must be PKCS 1.5 padded. @@ -99,7 +99,7 @@ When the certificate has been exported, import it into the personal store for th ## Related topics -- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +- [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md b/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md index 30e5408409..b2c2cb7926 100644 --- a/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md +++ b/windows/device-security/device-guard/planning-and-getting-started-on-the-device-guard-deployment-process.md @@ -19,7 +19,7 @@ This topic provides a roadmap for planning and getting started on the Windows De ## Planning -1. **Review requirements, especially hardware requirements for VBS**. Review the virtualization-based security (VBS) features described in [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats). Then you can assess your end-user systems to see how many support the VBS features you are interested in, as described in [Hardware, firmware, and software requirements for Windows Defender Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md#hardware-firmware-and-software-requirements-for-windows-defender-device-guard). +1. **Review requirements, especially hardware requirements for VBS**. Review the virtualization-based security (VBS) features described in [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats). Then you can assess your end-user systems to see how many support the VBS features you are interested in, as described in [Hardware, firmware, and software requirements for Windows Defender Device Guard](requirements-and-deployment-planning-guidelines-for-device-guard.md#hardware-firmware-and-software-requirements-for-windows-defender-device-guard). 2. **Group devices by degree of control needed**. Group devices according to the table in [Windows Defender Device Guard deployment in different scenarios: types of devices](requirements-and-deployment-planning-guidelines-for-device-guard.md#windows-defender-device-guard-deployment-in-different-scenarios-types-of-devices). Do most devices fit neatly into a few categories, or are they scattered across all categories? Are users allowed to install any application or must they choose from a list? Are users allowed to use their own peripheral devices?
Deployment is simpler if everything is locked down in the same way, but meeting individual departments’ needs, and working with a wide variety of devices, may require a more complicated and flexible deployment. @@ -33,42 +33,42 @@ This topic provides a roadmap for planning and getting started on the Windows De - Is there already a list of accepted applications?
A list of accepted applications can be used to help create a baseline WDAC policy.
As of Windows 10, version 1703, it might also be useful to have a list of plug-ins, add-ins, or modules that you want to allow only in a specific app (such as a line-of-business app). Similarly, it might be useful to have a list of plug-ins, add-ins, or modules that you want to block in a specific app (such as a browser). - As part of a threat review process, have you reviewed systems for software that can load arbitrary DLLs or run code or scripts? - In day-to-day operations, your organization’s security policy may allow certain applications, code, or scripts to run on your systems depending on their role and the context. However, if your security policy requires that you run only trusted applications, code, and scripts on your systems, you may decide to lock these systems down securely with Windows Defender Application Control policies. You can also fine-tune your control by using Windows Defender Application Control in combination with AppLocker, as described in [Windows Defender Device Guard with AppLocker](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#windows-defender-device-guard-with-applocker). + In day-to-day operations, your organization’s security policy may allow certain applications, code, or scripts to run on your systems depending on their role and the context. However, if your security policy requires that you run only trusted applications, code, and scripts on your systems, you may decide to lock these systems down securely with Windows Defender Application Control policies. You can also fine-tune your control by using Windows Defender Application Control in combination with AppLocker, as described in [Windows Defender Device Guard with AppLocker](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#windows-defender-device-guard-with-applocker). Legitimate applications from trusted vendors provide valid functionality. However, an attacker could also potentially use that same functionality to run malicious executable code that could bypass WDAC. For operational scenarios that require elevated security, certain applications with known Code Integrity bypasses may represent a security risk if you whitelist them in your WDAC policies. Other applications where older versions of the application had vulnerabilities also represent a risk. Therefore, you may want to deny or block such applications from your WDAC policies. For applications with vulnerabilities, once the vulnerabilities are fixed you can create a rule that only allows the fixed or newer versions of that application. The decision to allow or block applications depends on the context and on how the reference system is being used. - Security professionals collaborate with Microsoft continuously to help protect customers. With the help of their valuable reports, Microsoft has identified a list of known applications that an attacker could potentially use to bypass Windows Defender Application Control. Depending on the context, you may want to block these applications. To view this list of applications and for use case examples, such as disabling msbuild.exe, see [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md). + Security professionals collaborate with Microsoft continuously to help protect customers. With the help of their valuable reports, Microsoft has identified a list of known applications that an attacker could potentially use to bypass Windows Defender Application Control. Depending on the context, you may want to block these applications. To view this list of applications and for use case examples, such as disabling msbuild.exe, see [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md). -4. **Identify LOB applications that are currently unsigned**. Although requiring signed code (through WDAC) protects against many threats, your organization might use unsigned LOB applications, for which the process of signing might be difficult. You might also have applications that are signed, but you want to add a secondary signature to them. If so, identify these applications, because you will need to create a catalog file for them. For a basic description of catalog files, see the table in [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md). For more background information about catalog files, see [Reviewing your applications: application signing and catalog files](requirements-and-deployment-planning-guidelines-for-device-guard.md#reviewing-your-applications-application-signing-and-catalog-files). +4. **Identify LOB applications that are currently unsigned**. Although requiring signed code (through WDAC) protects against many threats, your organization might use unsigned LOB applications, for which the process of signing might be difficult. You might also have applications that are signed, but you want to add a secondary signature to them. If so, identify these applications, because you will need to create a catalog file for them. For a basic description of catalog files, see the table in [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). For more background information about catalog files, see [Reviewing your applications: application signing and catalog files](requirements-and-deployment-planning-guidelines-for-device-guard.md#reviewing-your-applications-application-signing-and-catalog-files). ## Getting started on the deployment process -1. **Optionally, create a signing certificate for Windows Defender Application Control**. As you deploy WDAC, you might need to sign catalog files or WDAC policies internally. To do this, you will either need a publicly issued code signing certificate (that you purchase) or an internal CA. If you choose to use an internal CA, you will need to create a code signing certificate. For more information, see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md). +1. **Optionally, create a signing certificate for Windows Defender Application Control**. As you deploy WDAC, you might need to sign catalog files or WDAC policies internally. To do this, you will either need a publicly issued code signing certificate (that you purchase) or an internal CA. If you choose to use an internal CA, you will need to create a code signing certificate. For more information, see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md). 2. **Create WDAC policies from “golden” computers**. When you have identified departments or roles that use distinctive or partly-distinctive sets of hardware and software, you can set up “golden” computers containing that software and hardware. In this respect, creating and managing WDAC policies to align with the needs of roles or departments can be similar to managing corporate images. From each “golden” computer, you can create a WDAC policy, and decide how to manage that policy. You can merge WDAC policies to create a broader policy or a master policy, or you can manage and deploy each policy individually. For more information, see: - - [Deploy Windows Defender Application Control: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md) - - [Deploy Windows Defender Application Control: steps](deploy-code-integrity-policies-steps.md)
+ - [Deploy Windows Defender Application Control: policy rules and file rules](deploy-windows-defender-application-control-policy-rules-and-file-rules.md) + - [Deploy Windows Defender Application Control: steps](steps-to-deploy-windows-defender-application-control.md)
-3. **Audit the WDAC policy and capture information about applications that are outside the policy**. We recommend that you use “audit mode” to carefully test each WDAC policy before you enforce it. With audit mode, no application is blocked—the policy just logs an event whenever an application outside the policy is started. Later, you can expand the policy to allow these applications, as needed. For more information, see [Audit Windows Defender Application Control policies](deploy-code-integrity-policies-steps.md#audit-windows-defender-application-control-policies). +3. **Audit the WDAC policy and capture information about applications that are outside the policy**. We recommend that you use “audit mode” to carefully test each WDAC policy before you enforce it. With audit mode, no application is blocked—the policy just logs an event whenever an application outside the policy is started. Later, you can expand the policy to allow these applications, as needed. For more information, see [Audit Windows Defender Application Control policies](steps-to-deploy-windows-defender-application-control.md#audit-windows-defender-application-control-policies). -4. **Create a “catalog file” for unsigned LOB applications**. Use the Package Inspector tool to create and sign a catalog file for your unsigned LOB applications. For more information, review step 4 **Identify LOB applications that are currently unsigned**, earlier in this list, and see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-code-integrity-policies.md). In later steps, you can merge the catalog file's signature into your WDAC policy, so that applications in the catalog will be allowed by the policy. +4. **Create a “catalog file” for unsigned LOB applications**. Use the Package Inspector tool to create and sign a catalog file for your unsigned LOB applications. For more information, review step 4 **Identify LOB applications that are currently unsigned**, earlier in this list, and see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-windows-defender-application-control.md). In later steps, you can merge the catalog file's signature into your WDAC policy, so that applications in the catalog will be allowed by the policy. 6. **Capture needed policy information from the event log, and merge information into the existing policy as needed**. After a WDAC policy has been running for a time in audit mode, the event log will contain information about applications that are outside the policy. To expand the policy so that it allows for these applications, use Windows PowerShell commands to capture the needed policy information from the event log, and then merge that information into the existing policy. You can merge WDAC policies from other sources also, for flexibility in how you create your final WDAC policies. For more information, see: - - [Create a Windows Defender Application Control policy that captures audit information from the event log](deploy-code-integrity-policies-steps.md#create-a-windows-defender-application-control-policy-that-captures-audit-information-from-the-event-log) - - [Merge Windows Defender Application Control policies](deploy-code-integrity-policies-steps.md#merge-windows-defender-application-control-policies)
+ - [Create a Windows Defender Application Control policy that captures audit information from the event log](steps-to-deploy-windows-defender-application-control.md#create-a-windows-defender-application-control-policy-that-captures-audit-information-from-the-event-log) + - [Merge Windows Defender Application Control policies](steps-to-deploy-windows-defender-application-control.md#merge-windows-defender-application-control-policies)
7. **Deploy WDAC policies and catalog files**. After you confirm that you have completed all the preceding steps, you can begin deploying catalog files and taking WDAC policies out of auditing mode. We strongly recommend that you begin this process with a test group of users. This provides a final quality-control validation before you deploy the catalog files and WDAC policies more broadly. For more information, see: - - [Enforce Windows Defender Application Control policies](deploy-code-integrity-policies-steps.md#enforce-windows-defender-application-control-policies) - - [Deploy and manage Windows Defender Application Control with Group Policy](deploy-code-integrity-policies-steps.md#deploy-and-manage-windows-defender-application-control-with-group-policy)
+ - [Enforce Windows Defender Application Control policies](steps-to-deploy-windows-defender-application-control.md#enforce-windows-defender-application-control-policies) + - [Deploy and manage Windows Defender Application Control with Group Policy](steps-to-deploy-windows-defender-application-control.md#deploy-and-manage-windows-defender-application-control-with-group-policy)
-8. **Enable desired virtualization-based security (VBS) features**. Hardware-based security features—also called virtualization-based security (VBS) features—strengthen the protections offered by Windows Defender Application Control, as described in [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats). +8. **Enable desired virtualization-based security (VBS) features**. Hardware-based security features—also called virtualization-based security (VBS) features—strengthen the protections offered by Windows Defender Application Control, as described in [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats). > [!WARNING] > Virtualization-based protection of code integrity may be incompatible with some devices and applications. We strongly recommend testing this configuration in your lab before enabling virtualization-based protection of code integrity on production systems. Failure to do so may result in unexpected failures up to and including data loss or a blue screen error (also called a stop error). diff --git a/windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md b/windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md index 52e334ee8c..418d67676f 100644 --- a/windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md +++ b/windows/device-security/device-guard/requirements-and-deployment-planning-guidelines-for-device-guard.md @@ -23,7 +23,7 @@ The information in this article is intended for IT professionals, and provides a To deploy Windows Defender Device Guard in a way that uses all of its virtualization-based security (VBS) features, the computers you are protecting must meet certain hardware, firmware, and software requirements. However, computers lacking some of the hardware and firmware requirements will still receive some protection when you deploy Windows Defender Application Control (WDAC) policies—the difference is that those computers will not be as hardened against certain threats. -For example, hardware that includes CPU virtualization extensions and SLAT will be hardened against malware that attempts to gain access to the kernel, but without protected BIOS options such as “Boot only from internal hard drive,” the computer could be booted (by a malicious person who has physical access) into an operating system on bootable media. For an outline of how VBS-related hardware strengthens the hardening offered by Windows Defender Device Guard, see [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md). +For example, hardware that includes CPU virtualization extensions and SLAT will be hardened against malware that attempts to gain access to the kernel, but without protected BIOS options such as “Boot only from internal hard drive,” the computer could be booted (by a malicious person who has physical access) into an operating system on bootable media. For an outline of how VBS-related hardware strengthens the hardening offered by Windows Defender Device Guard, see [Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md). You can deploy Windows Defender Device Guard in phases, and plan these phases in relation to the computer purchases you plan for your next hardware refresh. @@ -33,7 +33,7 @@ You can deploy Windows Defender Device Guard in phases, and plan these phases in The following tables provide more information about the hardware, firmware, and software required for deployment of various Windows Defender Device Guard features. The tables describe baseline protections, plus protections for improved security that are associated with hardware and firmware options available in 2015, 2016, and 2017. > **Notes**
-> • To understand the requirements in the following tables, you will need to be familiar with the main features in Windows Defender Device Guard: Windows Defender Application Control (WDAC), virtualization-based protection of code integrity, and Universal Extensible Firmware Interface (UEFI) Secure Boot. For information about these features, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#how-windows-defender-device-guard-features-help-protect-against-threats).
+> • To understand the requirements in the following tables, you will need to be familiar with the main features in Windows Defender Device Guard: Windows Defender Application Control (WDAC), virtualization-based protection of code integrity, and Universal Extensible Firmware Interface (UEFI) Secure Boot. For information about these features, see [How Windows Defender Device Guard features help protect against threats](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#how-windows-defender-device-guard-features-help-protect-against-threats).
> • Beginning with Windows 10, version 1607, Trusted Platform Module (TPM 2.0) must be enabled by default on new computers. ## Baseline protections @@ -139,7 +139,7 @@ After you have created and signed your catalog files, you can configure your WDA > **Note**  Package Inspector only works on operating systems that support Windows Defender Device Guard, such as Windows 10 Enterprise, Windows 10 Education, Windows 2016 Server, or Windows Enterprise IoT. -For information about how creating catalog files fits into Windows Defender Device Guard deployment, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md). For procedures for working with catalog files, see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-code-integrity-policies.md). +For information about how creating catalog files fits into Windows Defender Device Guard deployment, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md). For procedures for working with catalog files, see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-windows-defender-application-control.md). ## Windows Defender Application Control policy formats and signing @@ -152,6 +152,6 @@ When the WDAC policy is deployed, it restricts the software that can run on a de ## Related topics - [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md) -- [Deploy Windows Defender Application Control](deploy-device-guard-deploy-code-integrity-policies.md) +- [Deploy Windows Defender Application Control](deploy-windows-defender-application-control.md) diff --git a/windows/device-security/device-guard/deploy-code-integrity-policies-steps.md b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md similarity index 97% rename from windows/device-security/device-guard/deploy-code-integrity-policies-steps.md rename to windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md index 2b14a66d3f..a43a5c8855 100644 --- a/windows/device-security/device-guard/deploy-code-integrity-policies-steps.md +++ b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md @@ -9,13 +9,13 @@ author: brianlic-msft ms.date: 11/02/2017 --- -# Deploy Windows Defender Application Control: steps +# Steps to Deploy Windows Defender Application Control **Applies to** - Windows 10 - Windows Server 2016 -For an overview of the process described in the following procedures, see [Deploy Windows Defender Application Control: policy rules and file rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md). To understand how the deployment of Windows Defender Application Control (WDAC) fits with other steps in the Windows Defender Device Guard deployment process, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md). +For an overview of the process described in the following procedures, see [Deploy Windows Defender Application Control: policy rules and file rules](deploy-windows-defender-application-control-policy-rules-and-file-rules.md). To understand how the deployment of Windows Defender Application Control (WDAC) fits with other steps in the Windows Defender Device Guard deployment process, see [Planning and getting started on the Windows Defender Device Guard deployment process](planning-and-getting-started-on-the-device-guard-deployment-process.md). ## Create a Windows Defender Application Control policy from a reference computer @@ -33,7 +33,7 @@ Each installed software application should be validated as trustworthy before yo We recommend that you review the reference computer for software that can load arbitrary DLLs and run code or scripts that could render the PC more vulnerable. Examples include software aimed at development or scripting such as msbuild.exe (part of Visual Studio and the .NET Framework) which can be removed if you do not want it to run scripts. You can remove or disable such software on the reference computer. -You can also fine-tune your control by [using Windows Defender Application Control in combination with AppLocker](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md#windows-defender-device-guard-with-applocker). +You can also fine-tune your control by [using Windows Defender Application Control in combination with AppLocker](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md#windows-defender-device-guard-with-applocker). Members of the security community\* continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control. @@ -708,7 +708,7 @@ To create a WDAC policy, copy each of the following commands into an elevated Wi > - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the WDAC policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Windows Defender Application Control. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application. - > - You can add the **-Fallback** parameter to catch any applications not discovered using the primary file rule level specified by the **-Level** parameter. For more information about file rule level options, see [Windows Defender Application Control file rule levels](deploy-code-integrity-policies-policy-rules-and-file-rules.md#windows-defender-application-control-file-rule-levels) in “Deploy Windows Defender Application Control: policy rules and file rules.” + > - You can add the **-Fallback** parameter to catch any applications not discovered using the primary file rule level specified by the **-Level** parameter. For more information about file rule level options, see [Windows Defender Application Control file rule levels](deploy-windows-defender-application-control-policy-rules-and-file-rules.md#windows-defender-application-control-file-rule-levels) in “Deploy Windows Defender Application Control: policy rules and file rules.” > - To specify that the WDAC policy scan only a specific drive, include the **-ScanPath** parameter followed by a path. Without this parameter, the entire system is scanned. @@ -768,7 +768,7 @@ When WDAC policies are run in audit mode, it allows administrators to discover a You will be reviewing the exceptions that appear in the event log, and making a list of any applications that should be allowed to run in your environment. -6. If you want to create a catalog file to simplify the process of including unsigned LOB applications in your WDAC policy, this is a good time to create it. For information, see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-code-integrity-policies.md). +6. If you want to create a catalog file to simplify the process of including unsigned LOB applications in your WDAC policy, this is a good time to create it. For information, see [Deploy catalog files to support Windows Defender Application Control](deploy-catalog-files-to-support-windows-defender-application-control.md). Now that you have a WDAC policy deployed in audit mode, you can capture any audit information that appears in the event log. This is described in the next section. @@ -780,7 +780,7 @@ Use the following procedure after you have been running a computer with a WDAC p 1. Review the audit information in the event log. From the WDAC policy exceptions that you see, make a list of any applications that should be allowed to run in your environment, and decide on the file rule level that should be used to trust these applications. - Although the Hash file rule level will catch all of these exceptions, it may not be the best way to trust all of them. For information about file rule levels, see [Windows Defender Application Control file rule levels](deploy-code-integrity-policies-policy-rules-and-file-rules.md#windows-defender-application-control-file-rule-levels) in "Deploy Windows Defender Application Control: policy rules and file rules." + Although the Hash file rule level will catch all of these exceptions, it may not be the best way to trust all of them. For information about file rule levels, see [Windows Defender Application Control file rule levels](deploy-windows-defender-application-control-policy-rules-and-file-rules.md#windows-defender-application-control-file-rule-levels) in "Deploy Windows Defender Application Control: policy rules and file rules." Your event log might also contain exceptions for applications that you eventually want your WDAC policy to block. If these appear, make a list of these also, for a later step in this procedure. @@ -922,9 +922,9 @@ With this in mind, it is much more difficult to remove signed WDAC policies. Before you sign and deploy a signed WDAC policy, we recommend that you [audit the policy](#audit-windows-defender-application-control-policies) to discover any blocked applications that should be allowed to run. Signing WDAC policies by using an on-premises CA-generated certificate or a purchased code signing certificate is straightforward. -If you do not currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) to create one with your on-premises CA. +If you do not currently have a code signing certificate exported in .pfx format (containing private keys, extensions, and root certificates), see [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) to create one with your on-premises CA. -Before signing WDAC policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Windows Defender Application Control policy rules](deploy-code-integrity-policies-policy-rules-and-file-rules.md#windows-defender-application-control-policy-rules) in "Deploy Windows Defender Application Control: policy rules and file rules." +Before signing WDAC policies for the first time, be sure to enable rule options 9 (“Advanced Boot Options Menu”) and 10 (“Boot Audit on Failure”) to leave troubleshooting options available to administrators. To ensure that a rule option is enabled, you can run a command such as `Set-RuleOption -FilePath -Option 9` even if you're not sure whether the option is already enabled—if so, the command has no effect. When validated and ready for enterprise deployment, you can remove these options. For more information about rule options, see [Windows Defender Application Control policy rules](deploy-windows-defender-application-control-policy-rules-and-file-rules.md#windows-defender-application-control-policy-rules) in "Deploy Windows Defender Application Control: policy rules and file rules." To sign a WDAC policy with SignTool.exe, you need the following components: @@ -934,7 +934,7 @@ To sign a WDAC policy with SignTool.exe, you need the following components: - An internal CA code signing certificate or a purchased code signing certificate -If you do not have a code signing certificate, see the [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md) section for instructions on how to create one. If you use an alternate certificate or WDAC policy, be sure to update the following steps with the appropriate variables and certificate so that the commands will function properly. To sign the existing WDAC policy, copy each of the following commands into an elevated Windows PowerShell session: +If you do not have a code signing certificate, see the [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md) section for instructions on how to create one. If you use an alternate certificate or WDAC policy, be sure to update the following steps with the appropriate variables and certificate so that the commands will function properly. To sign the existing WDAC policy, copy each of the following commands into an elevated Windows PowerShell session: 1. Initialize the variables that will be used: @@ -947,7 +947,7 @@ If you do not have a code signing certificate, see the [Optional: Create a code > [!Note] > This example uses the WDAC policy that you created in the [Create a Windows Defender Application Control policy from a reference computer](#create-a-windows-defender-application-control-policy-from-a-reference-computer) section. If you are signing another policy, be sure to update the **$CIPolicyPath** and **$CIPolicyBin** variables with the correct information. -2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the WDAC policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-code-integrity-policies.md). +2. Import the .pfx code signing certificate. Import the code signing certificate that you will use to sign the WDAC policy into the signing user’s personal store on the computer that will be doing the signing. In this example, you use the certificate that was created in [Optional: Create a code signing certificate for Windows Defender Application Control](optional-create-a-code-signing-certificate-for-windows-defender-application-control.md). 3. Export the .cer code signing certificate. After the code signing certificate has been imported, export the .cer version to your desktop. This version will be added to the policy so that it can be updated later. @@ -1092,7 +1092,7 @@ To deploy and manage a WDAC policy with Group Policy: ## Related topics -[Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md) +[Introduction to Windows Defender Device Guard: virtualization-based security and Windows Defender Application Control](introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) [Enable virtualization-based protection of code integrity](deploy-device-guard-enable-virtualization-based-security.md) From f4c81c0439e4a5be5e7aaa82c7a947ebd76ce0bc Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 25 Jan 2018 00:42:32 +0000 Subject: [PATCH 02/91] Merged PR 5478: Switch video embed to Oneplayer with markdown code Switch video embed to Oneplayer with markdown code --- windows/hub/index.md | 5 ++++- windows/whats-new/images/video-1709.jpg | Bin 0 -> 326029 bytes windows/whats-new/images/video-1709s.jpg | Bin 0 -> 23359 bytes .../whats-new-windows-10-version-1709.md | 8 ++------ 4 files changed, 6 insertions(+), 7 deletions(-) create mode 100644 windows/whats-new/images/video-1709.jpg create mode 100644 windows/whats-new/images/video-1709s.jpg diff --git a/windows/hub/index.md b/windows/hub/index.md index 7e87fea288..c2f87b5f74 100644 --- a/windows/hub/index.md +++ b/windows/hub/index.md @@ -15,7 +15,10 @@ ms.date: 12/18/2017 Find the latest how to and support content that IT pros need to evaluate, plan, deploy, secure and manage devices running Windows 10 or Windows 10 Mobile. -
+  + +> [!video https://www.microsoft.com/en-us/videoplayer/embed/43942201-bec9-4f8b-8ba7-2d9bfafa8bba?autoplay=false] +
diff --git a/windows/whats-new/images/video-1709.jpg b/windows/whats-new/images/video-1709.jpg new file mode 100644 index 0000000000000000000000000000000000000000..b54fe67cf62a3e16dee8e634e5a2ac3b6157ceaf GIT binary patch literal 326029 zcmeFZ2UHVb*De}G1qDR}l%m8!69g2bm)HOSA<{b$X;MS4fvAWmRX{*Nh=BAG>CzH< zN2G?{dk-Z95|TT9=R1G-&bepZ|K7FkI(J=WF>z+{&g9*Do_XJAKYNeVA?g(9qNwir%)?AdtE`NB}rQ2Ra#S3pxdC0WIi6SFVC+fqxl*ecrz(TwMV^ z=>BdUFUKA@_Q0_Rjy-VffnyK+|I!1eKhc0r0+zFYKo?(sI`wbcpQEGxu}vc(2?9k& z|NHj8vk5x)zaBeg6aT-&&9TwP9ys>Eu?LPlaO{D9^ML5xdy+Eu?#kSixPDJeMqElp zObYZrI|c$#r_cGna(8!@5fO266E?SmzqAszfIEtKn>&l#6TT|~l7o0Vn_JjhxnF;2 zWn=3k&$n5H<-2ZcDbJ@bu6|eD`LWe2+o!&+R@%NAIu^e67Sfh{5QX#S?I})ceN3@ zCoL^4a#vJDR8$CPA>`)c+Eg|ce?)fg61#b9`5otJv?kJ zWvtDu#a~)liVM9o7qb+)chAyX$lOxwo{*)On5CrnJt~wbKz&Up0-Xl zDvsthR&pZ$i`H@?fBXI)Z252A`40#F9~lSSi~nfR|9GDPTYxq)k6o?I-L0MgtHNKr z2;I9YbXP*>zhg*PLPAnbh3fgJ@2k{QCzir+~lHbf-_B zI(7OSE$taPhI0%I^yld5&tJH7@%#m*3-t6CFJEM0W?^MzWnjF*cA16k5(_KK-;11} z0nRyf`t0e`XIakEpJ(|mFVtEP6Wu8(+SfEEZh}rSouFYlL2U$qfz;h;Ai?){^3tE-a#NqEhH? zJu0kY)#};e7JKRX_UyUKSJ>D&czF5vZwuTPmync_mU;X{QAzo!imJAbuAaVup^=59 zm9@<)TRS&*4^J;|AK$=tLGOb`5YS;|K)2!YTA$VjLfX;oTB2A(z5bj6_xc3 zjZMuht!?eSefZ>6zKN`Gv)$;(N7z4)`IL5#+297asjDcee9An@Z1IHLR#=tQKjxlhIfny9D zW8fGA#~3)qz%d4nF>s85V+;(N7z4)`IL5#+297as zjDcee9An@Z1IHLR#=tQKjxq4R#6S)0RAjxhg1C1joN;tz%l3+z-Tu9rMytj|!-txI zxbvv*;z4+DEe>@a;gU@~?+?UCVa0gV+}tQPq?r=`WCBi#9b0P76- zjmN&*sHUGevS`5NaV@G>Mi0+De}w6KJuCm^MWls+pKkze$jy&XQ;oJiTA?ax|d)uq>E{IFIjxMjoe+t}{4d{pGLnQfk- za>fd-?9*8OoWxGGigO^nK<>q>7i!<2nk&pdrfHQdJ<|UsvGah^8zr&5|`npW`Q$uzcrGQV+e_l(;;ORs(J2Cg^ABPWDjAHve z3yT?ogzLP(=HF1}+PC=?+l_Cgv1_Q_(|2f1t>K)FtQ%H1>z#~yTrudl=hv1W)Q__H z_~{A##qV=_vMPrbgVhT~DQ3yM-|V%#LWilKh6G%SHocyXy`ZWrn)o6$M9}TO{t6=I z*A}WCeIlS6dH((+CqlgsTTXtM0~(a!%<_0vFqO{O-gx`;@b;DKC%!q=;%(MdrXXzI z+QvPWL};e1h>L}sg#IAqN#v;}y71aVJJ>k4Agd~o_-SJu@8$u&GO4{-rQ{G8BK z?dgfJcHrO@l^8zhJlul7Mc>@?F#9T1U?&w~5G>UjI|dWnwomDU(Hk>-Uuhm&R`JO! zz7%peNx3$QM*f-3L{8m7%_@^+Tg<4Slm-ndsMZkDTrIK}!%qdFRyX1gxTv5*^f%-m zS<)=Urj12^kP6z`yyiyvdc(_d4i}0m4QkSC*3$jC zy%4%e1zqs=&f`Ix*MH2!Whk7Cd85dpZ`jJBpNlw6r18hkY#P4p&@1naNQjaZZ+u4D zkE3Cevw*LfH2`Pgao8p2KJ325mJiZa-uwGzTKE}dh{ON9*vw+yx)hRatim7Wsmk zcK2!uNJ(EzxNcq39yb3zFKE_LI9;OsBRn-Ks(DcRE#u4Er9&?N89Vw##7Kf||9$A& zIM^k}(kfFm^<;kD=s|u%%Xd%f==h{~OoGHaj9HZ#`IYkW7S^gqmpuN|4>mTtrg3Ho z+swslH)o}WtVo{>5$xGipk2L;JhevQF2N^BEbOe+=0`b74&w3xkubz->B?Y<-j#f zcjAndHx=Yn(Z)TsE~`WOSzz=l;lACYSQR7fns`6>{xzMSrMcSKM&ICU#$O4TNuSvg z{WS7LB4-}L6}NeRU3g`ro>S@x?ux$QjfYatSs0=<{Lh?N#4*prH<)Tqi-e0HBy;7& zOh$t|62?D9JTZ?o|3o*nD^Djbc;%5naFDiHk6`IwlN#-Zh-)v$z{O5&yA^Fcimd;G zJ97d$D$gX&L`Fr0#}TBut*@zm)V`>3 zIj~7T^O5jxN0FML?MlHuh^;y!bPLzQ$ZDIQ`&lLc1;77N(BAzl2hF)lplj0H6!8Uj z^VK_wYJIJx zN8Q!#Gr7zmDS;U)GrVbF$SUlK#+9=$PEE~*x^~m}z0@6>P)(RY6N!g>F9E)`OYF{2 z$kFKGXmfC#NR%5}9F<0k5pg6T@7$@ba>BRB%N5f{b;y#u{z(30+JxZGZ5wB=opE(B z^I%w|`H+)U?-?_Ee-^2hj_lkmWaok~stkS;VXabEohWl^2?qw!4X%rtiY%c2&DRs- zi1YYNvfyN>*%cfIRCr>{aFRlz)pEbBp zRR5suFzq`P^cvT}N|_`uly5|8(`iMerMi9S1fzp0?_tlK{EBw?#} z&F(So^HdPr9^AZkNJbx_?=($SHVH&gLFMl8)0PMoV5A)cU-!2qogunTswXxp$n_Vp z#>LwbbiM}D-0J#@$;m?PkGo;Zg9DL21B6FcHF<}`JGi3~ud=5ejWUwvo*+5a5ZYAG zWgEhc-jWnjl5vw0`uft)mxH{ggdiqH(g2e1p`~ea7*aPO9p+PB36I8!dNgm2X+Snt zQpkckzPgJ?1;w0{jUV%BbJ6qVc`*?6{NP}MT+wL2_P1Nc3!@9zA4Up7sUgYD?T)I1 ziQW-0p{B-AmRB;x_iDjk(Y=hFwVCFl-)XrY=gR}a*gup9ZaZNA zBoI?E?MJ2JbO_q5@><9Rhaa3T!?_dT>`!koWkWW_#Qe1|;^?^6D`n~WSNHQJa74W* zm=H8?hHuTTr&cJdj*r5Zhw6U3IvGX+Tno6*CIja1Mnrx{003rw#QrxhmKHilW!G>nmdXpy$y!r3~s#rbb9 z3U&S8@!1k=o3Lu>ZjFs|zt)6A;8JGvo(a)r!1EK|qiEdg?zfKAD(@>9RY7lVfGs5k z@$u10yC7HlVMj&NHScU`S)umN`n?mEkKU7&B@)CT?DmH?fp?tgKaQyjFcL6Uic}D$ z%W;I#Hc4OlQLjOr*pX>s=ir&jUDoRafAID>^bg0u!Qz3tv1+Dxxl7oO_%7ba)L=$y zEtN_{`LL>HD3Z5NK_j)sc-CfZb|&(zn4&_;yq(dV&H08LBbs8b=MkBo9T;Xm`7sAZ zDr_acrU>Ho!c&!HjM}oz8mx=k_ANx8X0egZ50eE4(?U`{r0s=hYh3G@9jwDO3?9}P zNOc!eu*`)=N#uJO-W{{bLA#FDJ@Ar_>@jtx&i1Q!G-@x=$?ND+K_f8_`>Mt8qm75w zF&6NQWq=A<8{|7$0Hd}&lN3#VG&GwV*8@9)v=~>OZfRVnZ;bISR_nj{Gip3Pzb6o5 zVO85k1=&M_)bS03$NdU?2(3Y~I&H{qjfCLr*~{g0O?{U4T7EP7ee#{(p-ConwdOXI5u@Mhef<_Xh{@pz2=|GqQ>=S|7!=wJkR}ka>vd z)0^*MAcPhW2p3ar9um7xUc>N?I3OO5+ zxuWiJpJ*OEqZ7hy%j0=2E0E{o6i7DVP_2#%D%ATi!r(g@S*>n9Wh!55&f25*ndXnQ zwa(-9X#WS|OL|S_qB(bi3|*TH6`jUQdW2wOKK;&LI!8(tRpojeE99dwmF20V?u0CK zz7Wz99Bjr1FCxNc&!Bv=xGuBW`*eWSv-#nRX7u=&=?l4A`c1PB1_~UV=A*}*rjz>% z^*?_7e2MPV)ile1jNyzS89C=-#J)AmLo1spv-= z#-eGKxpiym8Wq&yw{AAlpj*~Esu3Z54G78@tABzljz$(6U*0yiRW0=~67(WolX4Ju zurm0Q!ey&wMck7s3fYCd1D_!4;&Y!z%U>A2`SZ=&F*|+BA52_Tt|#scQCLrHi@oXc zlcBU>&)+vxXh9>adQ8L(Vqu@iy$yqEjzu4r+p`0h2*eReXplxNv}{h@JUd#^$g=9 z#_!@gj_y{sS&=`8SR;oXq?VpzR!p3KX3{u&9U`L;7xNg z&oWlC@pHTpV(;@gx4CxeE#qUelr0Fs4?|qGDNy*DZ)9M)>_=}jmd1SDdGzV6aXP|G zO_-8E#N`;Yk>1j{sc!Hc&tf$9Zm zpZU?6L=h5X70Kx+_s}KXq~TS$V){USNtcM4Ximd@ zhi+$0o$04jR$s1nBYM#v(%*-~+8Rnk@A=)B-WqVxa!KPXNel?}^ic;i3BJ2}-ET{X zdvNww659N)oZ#!z9`ff(Lg>ih7W%jerlVjFdFI9u;j9UBy`lD)xSY99kta~JW`v);(?Hw+EvrvR&JZxV#}*{VtXYm zjP^-L3~+5BulgPFDPxJGLT?yE)Dj3p(j$l&JA`yQuwK zBJ#~n63e1e`0zDVnQyG-Zy8fEa2Ujvrdc*#aOzCv)?^*#68=vza`kj9pc5hLE72+|1*1jS>>XX!RS1{Dxn<;8?FW@T z2xG^Yaan!lwO^%A=-ER%TE_~eix(I*V&?|NgB!J)dUdm^nkLhXW#z9WFYVx^?0(4< z1X;`Sk#p79>MDk6*O0icnDBW@S#>IKHNWP3VCoBd=WX?LiwDJuz(3g zBbnK$Aehx5SRaLCJWU0eSsX_0%uzwf;Z%@6hui^VF%3DX^i|Q{$Z4^yCbAgfw9JlR z+#1SdZSVR+1@-aU&%za;2TPOtJ?KK1^r1!$COsgQHHTc zv&fdlr0)H2e+z(L0i^s>O9W&!D3cN-gow|lf?DmUAPR;XI3*l`p`|FZZK@&<)fCWR zD(I#OZ9eSiHe;WhV$M?Wosob{A9K-fd2!{8oQx@2f-Bv_p@i&#(#VS=-ryE5`uyd? z6cSJA-pKnXOY@)*E##o!(O8*=fn`+RoJ`NwSf8_jC_Y=DY&yc)afgnb`et) znf1}&Q_td2oOUEZ6&I;Lgxu1+afOii=0gi=Zo+AAwDKCZVC8^MvCr6O@Xq~R7tZl9 z<&#wmL3ipNLXzApzhuu8wTrLRIOgs;!nP^~Q0C@AU4rII`NDZMTApN89sL}{^P^;s z&0rW)N#yBKRm{zSJz1TKa$~mkMfYglG0Dt06?xFyE?TqrDAYaw9#Wy9X+Yx9}UH?(x`C+D=4;rw{~5Mj2KzYYiZH16*OmK5}=5UM<} zoddo2O+O1*NDM0*1r;zgYUO_ zaMnvIbe{T%tlsd}+<=xF?cVs9CL?$;eM8)@=KjIRq*!{v0z2iezOojQtsEd-)Gf|KWmc;5J`%@`c0F=`@rOQhEH#B zt#|fWRGDIqVKiaG?>6_z{Iyz}Z#Jw8rR#stYRu}oX*~RxtS$TLm1#Q}-I-aQo*-5? z<(^H%!yKdK5y!l8+`blFO8FZ#*}^3d>uy;jiA6DG`Jx?!3E`DalzS#Bq}KeD3bJh7 z$o=KZZ@y_VRNX-TrhJgknqX9Rbg4>a%g0F&>=hi;JH8aX=hS-O8FDztIMiJiARIos z<<;a5(W%jla+3SHvxcY;#hP#&6wiR)crdw)KxHB>w#SE zh18AN5oQ`@UzegMJ zUEF0w%}w*$(>qVKq}Z>znXuu4bg-kBoGZsoVVQ1!YV(Y92G5qt$|ogN?kUH4%=IYx zqUx}(eS@3TIU7g9<8mD{d4oArZbCWl#k;l+u`N^b_V)7eY#|0lPNlX+0waf2B8?4< z?{ht`aa9VH_S@u{{vy(tkLPlL+3awejGX0PZvi>^mBWU}A7 zSrY&mR-O(>;v3q7g>x9KJf43w8#i({f9bI*bV1Q)=-VW1P}b6Kujp~^Ib42BdFQV4 zu!JP5y52h>+TxghGP-m{e@479K^#YBoIa3KoF3O>WP9b(viOwHv-b7YYBj(0h3_5$ zZj)@k6}$_oc_kSmGS~0+Ex_V)e9>Q9!fIz+50g8XFX$f}il-d_YO`qzo&G4c$gva2 zinM{SAs`hVw(C#+JYqX)OfsB-*K6J&pGGLc9tAY~m3rUV%sw%)EOIQx30an0PnH|t zvb0&<7LD9rU6gwJF4t=3vjV@7{h$m*Um-sD9#hJfdR7IF_`uybR8k}=^R1fUkM}yS z=EFl|?$+tip5n0b#R6jbB=J#zw0FY5tzml~2;tq;7p!04QiKbp$SLu8)^+pT7G@>Z z*^+3aZ^iUXmKwd8J72Xi%&ky9{PRfcdQEzXwQ=aj%lv6(d7TeH{wnCcNEU?T&uZe8 z9K^k1LGks7H*`rH(0gyxDIPDT=#8r|>THEo72)YfM>SD5RZ*tK`-?EPntq zm#9E`Z=uZiu=`?3quQ{DhCZ^UBr=E}{qX3!948e-ccmG^YI_zO?^GTxUpf1R!VhV*akIxW375f{840Hd%k(820l@P%8WqF|!Hh zXHnL>7B|d;tjxbL0Sr4Q3=Rms2MsgeP;NXfqIC13T9r)rTKTzrGJmJ1$kZ=z5Mm5D zvQwd!PR9dGsZiJv-{a*>N=uXy#IAZ2P>swpDY4mZ)95DXB?Qml+<=_8KSB26%WW&= zaLWjt-_GqyQr9o~M*c3AvzisMXqmWGjq@07#`JG|Vds6p;{4D5JD;YvJm3OZsFK(; z`wAgx<9{JZ?q}QGWcNGYueY(Wew;;}>zG2a*(-pP-76D;yxG7)*u?^!sZWe{gqba@ zade2;XuPTTJT?HgBPV?a);}{hS-9Yd)3CQs-v{OycYR$z=D7l9LHMM5n+WVRi$a17lxKV=JH7pegPL}Vh)|`(d?!Qbl*c;&qA3CG(?!=0s z4|w&AsfTYI6n&>6fMmQ_xQ5KFNJ`4iz-heN@yB61+~#EjHcC?`iEzED-aR!H2M>Bf z2JO+#UzXCl0#@+ zooRg!m7zx;))Dd*9a7vHu+vMq>>@_>+^AceQ)4h2`1u`m6v zH0il^Oo@C<(7?*sqlz&tu%;PLK`ID=`#k|6y3ByzbL=d0-RiUK+o&CTH=Xv?Z9l4o zK_N-zDo5YhgctZC_od(4rX03MUA#77?JmFA1Y(y*L~?A=H4+haAr)x`Ejjj=CA7xU zzv(l#(2uo>7M^)QAGIWgs;^<5Ew44zpVG)qH(I&!$4=AkZgruFahkw}(usK5Ut^h+ z)27jly_rTVJc1hfMVpS4*$_6P0sd|#x`~UWllJS2+4H-adiU2A{EeTN7L|r|c(@5P zu-FeIeK-fXr0DLLD;*7gqMuqLI2&I(u03T|lL^R8YaAgkWB*jyM0cxa?*-brU0x%n z9#sz({; zk(z%Fn9_cn-)El3CZXZKX8F;Ni4V5~n;;yex3B-nj~3*oyCM_YbNiI^`lqwj01G(gFE1l(6=GUf`QD5FScUk!&N5yqh0L>+eR0B zrA$zqVVUcI+Ojbc5)l8-JH8D02rkS^=Gd}MnZYu6w?Od{krwnO>f7(&LP{FVN*=DX zq|zO$ziJBtP+R0GqI;GGP-(@|E?*clVB%0_F1>-l>~SA)cNR@WuVkMIGCL8HMYhB1 z97>@4Z8Jjc^=f`qR11~f)YIh#UC=Obc9z*O+dPxKWlwm~IbxYM1C6{v1?jtNC)(S} zKV*N>Qs{NcLNMV#f%9wrpl*nMxRq(Nz`YZ=>r;neuU*yzWbk-{v$Fz5`Fhz%fnG|{ zc;>JH;pf+PcklP5Dav5Gg&arYWO=KqP_9c<5K}2O1XToXOhUqb8E#tr`lV=qb8v3H ze7^AeS{mPEvONX3m4!BMQ;Rd=XZ%!kE%sf>zSaM!2_vxvosfaxBHQZAf z%nZ!doX|*c#8ejdW34CO&Cb#`ah?}gHdwx#1NS&t!5&0+AV%q9g_&IP)AuJCBfKl{ zA|E#7&QA|h>ZXNQF>TxusGBD3-!49w?RX@SvwPsS9MMgX)!h=QgM18-AHlu~;*Pj% zK0(Lun(<|C7MV63;eQ8xKaxAF`&M*kr>ly*O1hFDIAI`H+u%>h%StzKABb-1HQQ?J z?R2H&Xta;Y-n>RnWZFPD8i?~OU}3KI@seQrYF$1;L3q~a)3~#qUhDPIghfbg+pjl6 z1+-=gPl1NP6z-Thiu51xUqdNAzy>y)o{OMZB_5+<;nw@ux(|GdH;M?x@i$pFZ z-H2pZXpnb}h^;W*FLRshAx;q^%f?K@8oS&YEQ{;xC01=Yb8DyWTP82sf=GcT>i#e) z=rrBdp^^7&{b4V^w!b+~F%wydT?|#gOS8qg9i*Wh;=OkI>XY(l+yKC4SoB=p8CV{>IYxkwu}+JXtCzR%SRugter_EY$2k=pIAq#T zSaXrYbHBPr8=CK}08ulF-iXy${$!iilW(Wvp0kDdDHR4-15@qrnH9)K7!BEfYi7Q` zJ!{jk`e-1D?i8}>rqkh1bS&nEcNv_^d(jlnFdAql8Eqm^zIDT*5P7z} zZ{Ryr->OI$tukQ}g`u2@=fSfJHyMdcXt67C?eCSc9?xccjwhyVLU5b%&$w(j4t5%$ zQ#oTWqSXev3i=DrJ{3J^dn1-Z+TvwI*j?Q>b!Te)2xpRvK*r2UU~eK!^}<70q92pi7hU24$padyx2(F$R?vs_ZNq_@?# zxR4vwnSeGMWM;g|%asf~A3XcWuhX;lE;YZjd&yIsi1a&R?17yfCAxx#ZE6qqLsCf^ zvC|y}doE7SdbXO}PyYnsgs#_ajJh@317sS^CZ~u8)Ug%c@lm$N;G!X=mex{@_R!Uc z{QiCPj{qS%tszQ1=Inck8zNl2XF(g^Rd^wrS-5R<`0D&G{0jzPw|e3N5HCy5I)5J{aucX@$}qLY|teOMOV6)K1e zEt+8yH+7{b)}SRm)gBr>x*>1mV`lROV$Y!!FR7P|mBdc?(ykTH*eb}7ui@bh$V;8@ zTg5Xl+0FJ6ScO#6-w;R{;NjAp;$5LKw8Jrwv>a94z2MPy7PbK&)J z#mghseyitr-MJuZG69Y;}_9mtbXtviofILhR!>y=YL zxN9U8^5cPOf4p0x^7D$Q{QINBc@Ft%*FGt8exCNbJo+nnj&v@Y1R?7Ir3cb@F(__6 ze4%gHXz-Aqvh#r0#+Ck5uf_k@ChP&i{^-jKVvTr9BQ&ToDY@`MmU>fjG7mjQyQ9Rx zn*n+!^6dqmMVeVWtL>CqWZui&ci+?4rTi`U3T!bj=V^;*V{_Y7Ea2y z#Tl9IB7G+|ZgCzt`$oFd<&7K;bZFkr_k(OJ$nW%3U&DD&%oSO5Ke6s@l9{m-B}PC! z#^sk&f_V@@FrY-P4p5lpUf|J3zN5$`SN%@B2suRXP~_+~Si2r51CUAq1o+)JS6B(O z$!g2A1W8AxmtDqO?O|RU32HoFX1p4C@akHyB5rva*SKy`1+;OW#-j=lffVY{jEjsxChsBJb^2JM(ysU&Dw9Sv0GjAJd4VMf6X zlOHRs!-e|8r`MgP9fgGqF;8ND56x>1y%#vU@ni9O6Lf?$eS`(-;=+wW3>tqL*cI|- zGN|6oGAU}ME&meXGQ?!2GCi76gg^7uIr#kfeyx-8j{{-P|E6_jbnz`gJT09g?jg{h zpQFfK-lZ>o9t_-WfZDU)_SqiJTlNUb~>42l+|+s5)Dj?(t~B5CZ3nTp2Zs&ea(AiVI3=@xllaZwH`n)_DLEJU}lBh zjzutB%^8Rn>K%9pcf$D{+?v1Q88ti}Dt0x_A{v_SP6eH(@YrL|k)e+HOOkN7oP*qu zD3CU-M05+I386ncMdX%_Q3NsnA+4L3wf)iQJ4Ia&?V$9@bKIYtNyyZ zz|@pm^kfo3{`;z=!ZqCeBfYLN)1fhCH+o;0yH=1dth4ja-{wWm@Q+V9cQS$e0U;;s9zj2bA&O~DAl)Nwe^u&+T1t6i{){qeC;jWxp7={RuC2bX zn_5P8-U`9GY!!L%L7Mt6Y!{^BLl8=%5_O%Ki zq6p{sqKm+M8nRiE?N6w`Z^(pmb*h6W1j;RLq-?`-_eQKM0f(^r0)l?^5JMOR_nOUlWoSeH;|C{o^`Q!O9N zt9v&r6Q6m39eU^7=EnE}AVK(^;9FysVA)hmLMexLh*RvV9mS2W+q;4T4Lad=qVv(i zX)CBv`sv@1xvwh0O{jCtxf%9v6vhg(XgWQ{ul~3Y=G;yNt)Cc6I55Jr5}jI_VLy?f zcZ4C{m5;|hl)LJ8yxLHLTo%XIcuTV^a_HWT@gj)1K&!nXr`EUS$&`z+Mh5M66C>x; zJ>z=Gx)ht`3%@EM!ITSR2!5i1V{C+|_9TQbF@T-V?;CBpN<%s1qb(fq)34=Hz!S>x zf{o=y3pL*RUd830m?EBTx=^x!EaPen%phQZV=N9*)ZJhzAu%G7T4;NZta2^G1xTT? zLV^&+W?l@_(P?te_F_IqZ->AYS9wP_Gc9^&zG-`;1ig>a3=ME~QQhpl%`<8?vmw>& zz563Igrq%P|2HjKT+K)Y@zTsNl7LFx-dJ>){n{pgnYP!&K*|JUH{E`g+?_@(=h zB=YC5nnd&#IotvF1I4O`=@r{>i#7CU1LX<)J$9oD(CJdp;r9RIk$G<$ilTcBpxmX4 zt$Jrtlm`570ZivRkPcdb#{3Oa73zT6VNW30YS9ATtM8+N9>rnQ27#Gb9H2L_OUNZ9 z43M<_mlmN^5F@2M-{09uoHQ*RRb6{}^Lz~Iz-kpnf7P{ak*%Zm+eS8-X`wU?S01(B zTU+g^_Et6ThK=@YywIj_5}BghGO&Ryg4d}(o`E(B$r>gP&u$HdJD2NAY6)L5y!ig9 zKB@5&y|1uazfJG0eu$OG+47O^Z+9BqTH5P-Ofk@mVTl`L?*hoo{`wog88jm{sG9i) zI*=^-yuSWot{hN+>3r(orS_Px%3j^gs$2_~ig(u-uAS9h=xI-#FIwrX8C_p+eqK9O zG@Pd-#>DZhGD{mV*5!~`8ofCO49KOpCPDbe$;$;75=Faz*fO10n9z|nG&J~n)%R`V zYri1c8Xx3qz(?L&n@8^)0h(er$m&F7q$o#T0G@ZHNh(Mw-|w^YpStPGT**D*ShQ*P znKFS4NjAK=$o=EDd%Q(?b=7xrQZfAYENqJV{>i(;Pr0zck%^CdpZ7W5=m2L0-H+zuN1ho$o{J<@;!jOnCmzkf?{z3z z_830;aWwE0cO6;Vfod*kd1%d^BzIojwqBuE?MKo&%aLTcS%&x7>MFt9$jo$=j^U=g zkkUC^;s~iA__N(%6W}ay_RT%nwmtggQTOsIqU_vmD+b$k-(UW?=&bx$MbTf&B&YR& zcP!E2aF$?5oT13<1h5j1fYi$Ue62I@o9zehOua$zeA!ky!9Uy{3*u5zKoHxuW{~gx zN^q$2?Ok{DiZ;r=28-4aDM%ds3}NLCy0PHkMbJ5{`}ymzqDQHdirX?N2n7PRqyH=aV-49dgt}+vc^3 ztCv)7D^y4KcGo12mw^Ed9e537JZxk!Ois<^V#20M*?Z0aQSGiBKxuyZLD-)?*!Q5S zWkPO%!cEK}nGF^sFKnzlsx$m(pbfe6N>(5OL@8Yc9;W6|XkfD3FOCM$R~*&$a1VjE zh+wT}uAii@JH2?Y$N-h9+XxU1Xp!7!R-Zw=k1-|&H{gaVBI+k}MW5vVz9~I=)Az;3 z(%o@;5l1zeZ+h8bh@8}rcgZ6nzLLvc=-u#|aFYh!H0Y^{BuPH0{Ef*fL64%oLz|B0 z-8?02cSP@NHP=Ny;TDbh^HzqVJb$$^_@nr3k864a$48XsxjbDB@lk{<-LaNv&n$L@ z*vsh|6R-CB3}GW(RzCEO(GxRbS3mfli~3|&>hD#>n@&6cbNVPs1#tZhAua(S#2Uc5 zd2{ihlo~j8_Z{wUVer2k>T;naB>)jKWcP=^@&zOYy9GphDmJaU1bs3yrOpG&NPb#m zeJ{U#q~1{Zx~K^Qr4*mlBX_31Qx!O_~tQoc1bY!C{qDEN|q#cp>5+d>D-rx z;f@xXucO)}S!sUiO{5Jgx+2eQaP-Z1z2kcv9BEMOteo}ryk9Vx<)kVQORPMrfdX9eO4?p=;bt?OIZ9Pr+&!ZL@j0e)7n9k!tEuR(vTbgZ z%!)tV@{X*YZm$=7MaH9FUvnp{Na}?`Fl)Txv(z8oEDOGB#sq4G7Ap_I%98`(1-1%w z_ze`PL#<5phi` z>0dyiP|&%9WUx~*m-lVBl2&BNy6+5(Lb|nR9(2!q#C&vv~5m)^aHg&fQW%! z56uov7BwFHoW5NXO^QoSX%yAL->p-&yB8MVS%vh&{n?)!LQ>S`gO9w&sGud*x`02h zZR5Y$K6AgwBL_K{9n$@1()%r38#=AdnZ}G)EYB>$bp*HgtNCC?RFwLcJSU$ zXT_EtWfbZZ;FN8v_{PnCPbjAZHbZF}c9Mj+S4vR2-h!pWBP$e}2vbvaKNp^+#v-U( zo|%f(%g!|)?wB_5UW7O?JP*jSTE*3*j#Z1*&vpg7FpVjr5+twnM|QlG2H}Jh{litA zb7?i~@V?@62veDubaAc3lDO;xlrd#2fW5D@3tWe~RFYNSl=tA12C**6=-wR$ z^Ad|EI$CgzF?5@=d&s8tlFE*#iBV3>sGUaIE;>o!+|oTFYGyHTx2<2k`Y;`v5S*rT zRgAIeA^K~Z0Eq$Pl34j;0iy}uRmhZ2+Y4*I^tL#kO>L1IYYNR;GwL9S6B+HZj-qc< zZhFTm$<4QYn3CwDG(ISJK>FQK4viqI%!C^^b2J_nlxLaP`Mz5eadDpiLSlR%d!lyT z?1zAV0*7#8s3OVc6L=>-dD^BH z(&NSnj&c7VE3T+X73Lf76+J1uCpD1ObbPUG#FsUh1j)+iNkYh0QQE~~`m8Zu^sto_ zxfT*+k21Ff%5I9{o9Nmy2Mq0MIC>7mgu%@^^$YjY!0%ndjFvWb1F~1D?mz#R9QNRq z+R30D1dJG!PV_KLEpfG}Ns?)D`c}cU7{s+E=tTek9rF$!f8+&_-6zUsz}p6=j{2sG z;atQJs}94_hv&-ugFB;ID377-74|O|-?XNgp&GO6C-N0VD)(iUrlupi7lX66Dr4Y1 z(vtfljgV5>ma;8bk^0Txu=_$HY9Adpo$hF~jE8;E48G1lUQcTJcxuZF@u~B7)0eoH zt}1g0<#~4H92;o=Y}1P9m2IzIU%TT98DHgD#>3my)R_zo4@ff>!E+J^fIL6Or%qop1kVFLNCnu zrtJgZEtFKFsqVY&8J7&c*lI;Dgs$Z0nuWvEBb9G7$$0;owzF5wo&W5s;K;nEG3b{J z_OX#b`N-#YI-YO5bYDxU;k2O!ox)TIiElO#SwDLeNxnTRend!1J5XBD$j7biP@I@B zZ>#AE-+R*j1Sk-HkMNv}^cHrOw+`olFhT?myrpcvd}cV+_WStnfv*fs z%A~xkNxcGw5wryJ`Gh9K1yO+cSy}NA)3E$$9brvYV#r1igoG{bnHabBsBn7dX*~pgL1$xt zv`bU^Q5@NCw&mz|dOmndQ>WzCst`mF8#Qm~ zZlQgRBUZmcV<-NH2YC%+qf0V0F+{u|p8w&!qeg$z)+oR6bo@8tlCBHTfi!@U*5=Lt zFBlV4q5^J_IfzkPgP!N_d@3DJC|v60{i9sec2#}P?m*z_$Zht2mO9g|n^bTIh2IaotAIKRtQKKN7Q(S&dhio^2bpIP%>;J*rdqy?Ywe6x<5XFM@Dp3Iuf*>H$iRc3e2uSZlsRGhF1fn2C zs&qvl(mRpfLL$8hNS99NorD@l@hsoH_ZfS?-#fnZ?~MH;FxDgl)|zwP<+`u?n#sm4 zL}f|l=m7Jl3i0#H%YZre&^ms5gY{xvRgsAC&Ve@c<1wKoo?++Pi?xWVI5$v;^5&BE=uEPv9Oxk2Zqd5?Naz`1?Sf z9YhFTQ7~vs(P;OX_2Ghc8+Pd*D@0Mg0M=)JbV<`hfYS$C2&C|WgvA10LPgBpPQmHj zs+~K*>MmAv{WE{TfzXEiIIC^M^fv%lgvk)>3L#=*Jt=>vg4jL-{#ycH6BtKygMTB5 z6JA@+Jm-O@lDjQ+0atC<#k@Zw0eI+M?>JP%6C8Q1_`rPPkI#?vVk_?YMTmM>-d_U8e6&fg%u>gFqyeDn(+u zQNfjgv9yN^pp#qdL1p@$iGQeQU5-I06r_F(^;%pRF*hmF6IT$=33!4a00XgW(#6*u z>*KZFU5oU({@C(C9jKB011|meXVmR8Lom_PH*%`W5SRL{dZbG0m*SR0!6D6I#*1#FW47v`#h4 zFvJXu%%Dx&`Z=Ghj=!r#(3`J-hN5IJjiaa+_(7RN%h;e_?PQvS@GVow#cBX|dP6s9 zjA9oL3CwY*_$Rh&^*L%K5e|6$Pw*y-0HQacK|(8%!zcW~bD&_}VYQ!{tuD;9M4`Gv zDmj2L0R8#B0JJ2`FAaIVMRVXzq8oAR*KL~^;A!@EjRdT0b=v8D3V*++wo*_+kY!*1 z9zl5#fE^?UngA=YB=VFN-Aot+c8ol3je;(NAL@4ir6Gw=fYCsbVTjd0m774_F^(J% zzRY|?M`GNgsC72~p?U?xl0&$OzOnx@HlD5stlvfoq9_#rV!Eg4w$8-YFx>EN{Gtf) z@(g@^9Qh4n0}4|B)!+&ug22A5V=kV}msO8tRhh(4@!!1N3&P}z3+0^o>)B3Ex)A$v zzEPA`Nzj=@$rkjzfe4=SSRC&XdKfpi#jT1Nx#;~bzc41*#H!j!qyo}%J)KmZgr)0Km0ry*~@K=6zs?FISsxJ$cqV=V3 z(<_*{zV7~^(i#E*d%i`!G&gaP_2X_U;@*P?mbTmMt50c`V@?hG(U1R7#rFYKIwUcU z%rxZhqy$r3##i{IlSaGmGQhxWfMLl`Si5GWrVO{+h`qS^udCbMEkOK|qML z@0xiX$Xx*Qv;I+VV(0xIDt>mrQ=b59BZ1>5`LoN?NRWcBu(6R~&0fM4%3(xz&cSPQ zx}Ch-!Fdo~uczdPl^eQhuH2Cn?DK;CLRY^8i^==xe+c-Kv3QY@^ zMReqD>bPoW4wwxLh&2Ce<~|hyAT{G+D;k)_U>{%~wJbr;j)2VU*D~O~w&n@^a8fik z;3<%%F60|(r?K~dwW0)90-i9>X1yszMG9^RfXr3Pg7>r0*``&?OO+4o;ron$4J`-e zIE(hIghC56C-J0yz-+Zb$?Q1JhqrVt zFQXGC*63@0F$6*0PdIB?N)yKhbrY|q&sCb$WGA?sW*?s-o7X*cy+n=q3MKoMHL5Ww z>hMHjO2GgeSBWwQumVk>bQHplArwQfHoi@iunb2a3KfUr^#`<}8ruT!yTrJZvksRv zcz~n`%4^YFXIR~I@aATncjYxX@wwjhrC&vFIois?_a|QNQ6ESA zXoiX@=;8+>%jMjb9ymf9y1(i)B`g<7|7QPq_3*+495TN;=MU9Y$72q3H3U6M0=Zki z*q`Q+JvhAC3*aJD$OOj?0FT#dH`w>BYNuQsRS2NFY5xP~$?Bb{X@!@CPIxJgc_Wp**AJ z8!M}sg}!_8t(_qh8mO3~NzDMJ6zbp;w`x8&$oF%Qyyh*`b#M>;o$w{U?gxC5W2Dul zc8mM&=n7Gli$&>El_VL@MGK!pekxkguykB>>(du-?;<@M-Wr3uZwAFA(VNJ^|pYaK3cy&w07 zsx!QpH0Td(V8DjQxHW220+*%dH*TaD_kvyGa z1bo>s0zkr#Rdy`G+u>EvR&vn%THQaj#(+P#k}!e!l?5^(%%MBUX z0yV#?!3LR&2A7N@6wFb6tEzNBx4dG)6J$Y=4%4?yJ#TgIGZ0uaeM>_(AIYEn{44+~ z2q0t+h_pa0U~M@{CtC=vKp@zD5iJWt*X--Vj-Rn>W|)~JCmT12;C4X0Yr}T?F)~T6Za$u`falnOLT~*( z+d8fTs=gO+0hDGSuO2qqS~mGlV^ThV4of8bO!o#aVA(?cP+fx@CNTjnNnjtV#PpJ8 za*hT-AI{-v$SC-R+C-Ee4z5udZ4r(Lz6h_@0m)d5(*RZH6ciU$nH|dx_qetgdU7%H@|y-K6V& z^PwmuA1ob%z5i^86KZ7FsxeCbD$gYyj^C*NAH>Q!xKi5x4rGj@B3GgjLlQnz)`#tbn6VIytYg zzNU9)qe($1J2|Q3rt;;55LKuFEItQ2dru>vox|b_?OxjPCfHhgHly|ZY1&yTh4xml ziewb*PQm$Wwa4OS4|gvnP=n6yk4tU`;%rT0-ojMzg4ZQm&+f|iqfVfA2L(fjEr^A< zlv(lu)xZt8xTUW4aY7ybnGyc{B~zBy)JZNaMmJxJ$ujoQZ+4 zXlX)C!4yt}F&pZJI>bJ=f*~gL1i}` z^>W7KwGZ?*$J#XX^7z?39hC!{7WN_$0J`k>*%DV5TYcX%j-}e>?Os`|2ySeQf9f~S^T?63CRqa$7V zhqSeVt4=XZ6XIsa*hn?F&ymVx&Aqi8eNIg`@%ou|$#Ty3z*DUbay_PBBmxw6e0B~n z1D?Qc^aJ{oEGR!A`wkd3%+@&Z57l#xzwEbvADXxcZ$RRKOioQ@)OC#rI4__mc$o69 zx3)p|?~;H$gEWF1>i7SLAuR@YcX>f6{IEVQ46^K~J`6wmC+=?$cNX5TUt;y|%oU40 zfSht3FjGA_@ZaY_3Fl)dbkaNvE#a zk@qibB7d`X3{4Z-+ASEG1dkg#QZwT*g2Vqjx9Mtp-cICm#ayM_=;7bda9JQmOsSjm z=qK1m-Qc*))|j}xa2r66A{T|}2_wfH_%6~tI9H8tc4AlYJyYv+xyr*7Dc4&JCVr>rXV9q zEBEcXF=08og$MuaRgP_Iv;vg|s*d~I+m#|@yjkjY1+H^ZYs$>N4iBVZA1qA2?7B-G z+_ho=5edC;+JpH?z;`2XNQ$Vhsga*tlTDLpKp6k~YYj0yXP5YK$OeEGMo_rYgAZTS zaf&rp8)m8A*zdgy{8rr0UJaP0i;gds=G_c={6jU!5{5^eGV7zT$6s(Qh?UMD|F?Zl zABn|7;}6yJPz9cK=gyKAK?~6FEYMMv0~j_j84WaX!t^V_^0CA7IKcxo1IwSrA9>Rg z?7_S1+Ogb8_uJm&ruG<-fC$0FC~X8OzdQ|>^q7ag2GB;46wuL<2Oy4RNKI6P_qgB( z$)UTDLvi!HZ3w`e+Ha$voZ*MG3z#<|rw=I7fPHW7qJ%lN6aa3g7jd)+Inz}LD+hJE90t(XyJS-EAp9};1&W=CMWpeyXUUDfl_}(Y1sa}{6!cdlG zv$c6`5lQ-7@E)?Y3XnP+CwgQ8NoN*WP63X0B3GyM(*$Vry>5pPZi1Kh(=6s`KIV}| z3ehK4+v1VvHqOv8QuPL;!R!PxjnGKwTB<&1{FIvJg<21MavgN=45|Qh2ZQ7UG1Y4= z2s+p^T>9NT@EBuIt-CU#Z`wxwdEf3kS?=!n#gv?s^xSl5%YQ9|9hrFS<~6hgKuqbb&OohTFZ z3^^uhgpkug>q&NO|62OU^hzqj=V12SPeselM)ijm$Q6bN%dD`zEdiJN^?7p} z^SdS(UKKj5UF6Tg`kgDv8ixiB^8u9>Z%VcQ37V5^#Q^xBw<=>Gc24m3Eg3zzWT{$iJU?^SAWr` zTu76}_h;}Udzi(*b^kn8myA*$Y{knKw`(Q(guvX9Lua)=RN$F|t0netcWvr2u6g{k zDyh6#dgC%AMhU7GG=Vtp43k_`N8DP!Np5Ow90@G8FGG9PemUihC*9Com=$aHw_9yI z`7YJ#7sf3Wsii_tC_2qqs~~VR1l=|AFVU|{Tc1dzJqGfJF4a^Wa+VxKP(XB2$-_h7 zR%*8=4du*>wAHS!{#~E?b2^|6h^!8}NHBm*!m$cXc>WF?In`|R)lK`exAQ_xT0i6C zM;}FBc(_^oE_1+~q;6 zg;w#VkIZ7HcMNmKl8tg>tvTxGiTD?BWbni<0?UbhII@j_lQfw|))Tc8nF7{2=cnwg_! zr-~r01Ib8}m>7VG#=uO8&j?!-7EmXI(P5}()#PfTql4m7Pt=KnN|nPNM%I{=dkB8W@nu^L_AWtp&LdS|AAsP(u>CIOcE=J)pmpPb&oMF1rBpJaW~SY zfwDN=MsGhy=7on>I1paX0W(#byuacNVM93t-G#lx^G8UghVA2j0&&0~^XXmCNo$$g z*shI{VMvQk&V%8Ju}we}aFFJ4hmf;OnJ?+V#(Fh0_*qVTR=hcT{OGQMZt&%GMI@YH zN_^ux{R6F$QoGdAC`Kw{K7i)}iEWi6ka_%Q3u4Ba)W*TT&2gG54>*D|iYaF6+L7OT zzYo4tyvY4QUuK>$q|It$-!M2GUWU-pdmY*dC*UbRZfiF&LkM|XEqu5z?%Lg+Fxw)r3)-x2tgNdHXaLl7HG32#u=c#Aro z_E9?cRJ7NIM?UBbdFy$X1ECjXmZmQ--oB7NgH_FAIr1;5pGOLJHDoAfsIk3u5B{)O zB+ZvSG^sW#T}LVZoAM~`1B$jUY5r?(B-DZgOi&^_0m!hRhLE$1%=^r+aV-+ejtqk* zDCEdcE?uQGi}WLGgZf2*EYXk1PkM$cg`?1Qk`^zXB_6aQS=a7Lu0Yu*enBf-I;0dp zByA^=m!B2$2=7^jGGdweFMc*6G8jV^tcJfs9O!~i;8zsxTBuT2(cN%JsOdz=AiKY% zS4(fdOg}g4oz_Rg7t$}vX1rcJ<#sSUY*Du{t!wtyLQocSG~`)Q-D?MC`D?{{z;APk^J{;+FcqTr2dimgzYl z+OC3jy`fMON_5aol?d$-Yn(LeWxD&^_3*37Cf9qh~K0 z#8ep5tKFzr9`TRfEhK@Hvg@rvvaY?TaEsgHEuBw2Or7!3x@F;Ow6G#F+c7I535Y3E zZ~%-`kCo3kwk3bNOQ0`v)R{Ljb1?DFbB_FFDpPVryE0~wZE65QZ{dQ!&@tkB(0R5N zVRtRA$U@bX$0{T8r*}Sl(u}UP;S3zfCc}hh?C4Y=C1{-TH0H}Rzj*X8A+_Psl!eO~ z+!uKIQ?3B378B?169usYP%@H2xO!tS@p%e6FDibt>t1{Ob1EQQdqA^d!LP*J6W%)9 z+Nqse`qk;Ic>tv;ST3fWVdtF?d1y-QzqUPr&u&}riLSY2_j06M;(mE4N556AjlnhR zn0+7bR?q+{HnLQcJ5xBiP~R}Rj)j%ckj6wRQg}GFGd!Y(cO0cyv`L?%oa&=9P&lh6 zob78|@WPbbP%ONnDrB=iLG}nct z%vM84$wWfmU#B{;dFW`j3}0~UN5~T$C7CWXk!4L1S2NW;ZRTcse67vbW|KI&zXG|r zDXx~C6KnYH{ML&+MuYKlE?}PGT_2CbUb-?^m6C6Kw`-5PnujaJP}-e58|QDP80nJv zFt~`cNxyo8fs46)nr?iqc;>y|^-hhejQ3I);=rGw7ec`-Yc`PG_bN!qPRe}WS`y*A+b|UR~4LPrj_VW+^@RfM6J_t>lUQj&B{& z`!;>xR7*CMb~F02Sln2p>c^X4@saxrj&8{sXly~5yOjv1vLGG(-Z}|8Er05qz6!Q6 zy?7z{mf}Ub0+Zue^~JdDp`{{)=~7=oqAJ?in&tZ=syg@)LnuT?9Ll2&2rLR@eJneQ zwSO8Q$u3nJr+ziv@?mvQ`4W4JL(*byVqhb}ScRwx<0WWZ8-|JEF2=6MryU_b*P@xH6tw z=mzv^^lJ6)6=a2pi?>@@77Yvqk0}c%3!GGL{l(1u!;_eI5LKYAe%S@hJfzvCjQMze zW3;w%l*4A;V{rz}y_1sm_3{@6EGdtpzaNb)Jvj4fm<;I{`!NxFFQhuB&LRb<{x=TX zb(9Wmo?(cO=PdaoAM5xVVvmSzgm-CpC}Bnp`^rRx9%NopPc;xSuCsPRvS&94zP8sZ z)1v3wdkRFEb#<}=i^aoPx^%3&0~5ftm!icqPUN@{Pt!8(vK{c%3r`cqmf%SYpZc}7 z=cg6&&OiBf$ly~|Btv$z0ZZ89#GHt@N6@4Fpf?ZedkGxHwH&ZY=y)^7zTJ4;JUt+< zs>S}?rAF(L1Bb>IY4BFH7VR4PB10(2Rq#IK4I~(PZF&&L-)8SpV{{t1r~Bjg{G4HY zt{dUp5i)Td2_n*lm?f6zy!_W*na63lkYBa)57O!_L00va`cHsZLKdLE%yXi&@FfPp z2hdEu;0f27idv0N(_x+4UcBko5>%IP<>w>8GdaqDPJf=Vpr|P?jO=jaCUMJT*gbK! zDx2W5bOj9}Y(2#@(GHwB&G=mBNN2wZ$`Gdv??OA9MUKB#KXR36@yKk zVICua@uP_AL3iIM+>3pjWPbwYjla{TN>6S5GEhyNuCqZ6T%0F0{-LPf{L#pv9iL!A zj*i5u?Zpv`5-T9!v3H5nCVAso620tf-10XXy{eRMHMfPih<+6&xpiNLEJ!RRX&Yf( zN56YoJ&mlks#|r6?9lHVPr2KK%EK%JE6$563n0{vjkHnj4;`sm*;`eh!d3v4CHl6T z@&jPu$S+E&Qs_KoO$Hs)oN%Te;M65D<(n>-%Zd@IdK zVtpKwH4*%?LK-fXCE{(GpBQzdr8RoiL}755)aTrJ)_T?knIkF?)9pqs!Gh|G(R}2J z>cMO4jBlVQ%tq+ez}^jiC)QQyHdaiP=MSSv-Z~OG$?tR$>B0n5CESZ*#3LZQmxf; zvPJiz7O#uHjOX~Lx-rsQX|u&l^um7WnV@x2;tRLLC>?V;BXTZ9%!uTQAB$}&*f`;M z`}pjww=y`zz_L#W*%bTx6J0ARGZK7Ffjg5W>5Yy-w5N(Pm{FJAM1M=R*W^3$AA&4? zqJ5rP!e021@pu4d@b&Sp9*Gx!@4fG>%efKgE`^lMF8-fAWJN#^*`vQLWcr0Yo$9u6 zt>Om)lZnv6jp_S$s#fP09?P2WPhR>NG>DrN#h?a8U!?+6$9AldY9J4un z+yT}a0xuy8_t09|D8BfYk;|bbk)YlJVW>L1MgF9n?W2O&x4#}1sdHnsiiIj|5EVo>RIizg< ztK16%Vf5pYvWTxq2t)E4RQxuua0Yj-f?C{4Hl||VvovQptSF4pzv4B|3P1PW;G$^n zC-F`22omK-6egs()Xw=n(-|q}ObMG4cm>V>ZTlN?&9Fz$@M}cRx?!2nKQ>aDruC|w z$0NEUZEHr6OjhB5cq9F!rl0}3(MzEeO)f@V!3{odsvsyWcn$A4Gxj+dYAZIVSj7zN zTNPgWapCtNGS$o6;J|FOyyn)^RrS8DA`bgqzPHt}U3?#p?iCN28_A)=Xwvi&-2phW z0b(%l!r3OG%e@nzCrt_PF|Yq!g&W+j3~OP0gwq0;EJ1!Lj>g>H$I!>(cI2W|`D?E$ ztY2JK&i~kV^;<+~MlQEw?Jcp}Ti}v{1I_iV*2Ut5%>WbOfqqz8747lh!xr^s@4JDW&sws47Fm|1LQJWeF^SmE2c3}ki@ z1vB>Fr#C7l*~*QLql7Bad#Sa&KpB}oyMZq>PX^zv8Ze|GqS7#VP2cGCT3FNx??_O| zDf`pFiD@osdv+7kY4iky}6{upFA;BQqyh`hAObz8)djU*hZylnG#gPB_e>_s7Mk zCSw<;!{g-4%g=92XM3{o$ClG!H3)-CeL$Zaqt_tglu4hROQGD`PcIa`rWyEo-NxW1 zi-kFx)#$3DrT`MEZom2Xh^}nxtZqzX*TchfV0`}9zf3LNTYNYWd9`Dz2E&7Hb>z)H z3(QyNiu2vg=bv7+J~sj6qyJ}u;vR(bKr%*_L?zi6&vx8LDpjn{UkZ}-OvNDamtms=loMh%A1QY0SqJ4(^N7S31^fIOoeOpD7OYR# zW>Y2hA27E?_PYKqM$a4RQQp+C9@GND0KZz-*wP<}ln|>5NL6a8{!o|rqn89Mjvrff z6?1_kgU}ndI?ZYrQx)x;{ro77=e&GUppqXYocLl(62avO1re%yiaPR7`&bZm5lf-m ztQr-;uF|f6m{Y9kBFZ2#%};@a7Iu=Jn{JlJFJN5q=XEk&>G55-33edc)+yk4w4}zV#M{gg zf#1^4@J}d#L~7J+&Q9(^0T{^vfD2&!Bc0)JN6<%@NN{%R#xY9JKVqI{MH&J=FE5&C z@!kz!xLM;v$W?kc&8!>?Ns(KnF0^)NmMc$}DCfb;Q{b+$#Mi}RUK3pWSk_{F%bC!K_@J76mc51^>Ts7|0A#8EiGcP zLe0WF3s8$oU3y&K7>032zmR6BeY{Z0vgsdcmZ^EkXgU4Hk8`csCRq2<$1DZ4hDm>@ z(lmO=doJ;@B9iTk8$_Bnx)h^4HgX^QGhmdqxkV4*t#MPofyO9sz{2WCdAY_tV<_{<5KXzG)dT!{Hfr}l6_MyXy zP-OzoakTBd1jR5S{8iNI0I3?wWcZ%zCUFs2;~3^#k!2Z0(qZ`vH+7F*uOtaq3K< z$XUzB1dFK*nHaAmM!4TDgcIX%b?;-NkOkW>&q5ShC{Kbv$^H z6flB%KveKe#cofTk4{XLR`%Rll!^Ex(@AyvfJAeEWXz6S&I!#6Pg>D1?mvL&mZJsB z?>$=5o>g>5J{gea;y4Sz4(@z(lnm8vMKF2N5!5|HwK?W4s@@Znf{Jpz+m@AjHRB^U z(RXNI^z#M?L`{otuFaGBOnoA!ckB_uUZ)c@v(JzXU?WI%YFh+_mGo--@T-wr zjF>HJ?R|yyFwLiNHcmZ%SyB>KSw|D^?Tg$G_=ifSwUqr`M2e1>X3D%YCnm=J zHenj(`n?BAXUJ_UoR2bowO|o+(>K4BbLWEkyQdYibhGSVSB2m+Ntg3d zf7FJSenWrl4K}X37VLiRjz=heW*`_r&Z$Pwtizd)WVJ5zT}u<>wJxhhzZDP#$>dnC zD0X=SKi`Qw;E9c{KvMUB^ZEkXX$e)(p*L; zn`_Jvdkcf@#=1%2(%qJYlBMDR8G4M*knql-%HSh_t5s(gemH;Cx1eRpHs0z6;<2LXNtVqvHEq$;bDzqQ7sihl4h!>*sjZH^)P1 zHEZnpn94~Qq)7b1qe3lueeLXq+}UK{7A@f7@3YaJc-EMpD?$Ay*T20%(}#Ci+^snk z-V;%K&Y(ETZf*p=vBmMqQ*O0n9aDYM3Xkvs=lRZKQxG}E1F#DCdEP~#6QPRS2>FqF zDC)144l2_+EdzSQIf0s4<&z-u!E8ST4&V@_x7IwmHMzrq>18%+zfUhkp3G0#9Xm&1 zwI=0Mu_a-nD9*z8l^)b{r!QeEI!k*zH}o+Vek0B!?P#KMVzWzr`9zWA5NUF9wl`|e zqX0lE7rnNM`mAk^Y=wL{o9KkFwq(88Eb98|;d5KTy!y#I^Jf2dH0~f01+0PKI6gGFG%us{Qkqf!UV8sIr3n$x_yqg*{OL*o7`QNpdK_k~tK$XqK~4`)rat z%TL3(AzW*Sj&lx=)4iaXDV)hIp*LDq>TfL>KIaICfM*jLBh+}O+C6pXqP ztYUD-G^;m3`fU7G;5ni@yvM%@ARJwFAzz#rJSvAqq=;NmrKtL3m4b`peL=Et1u8zlmPGI7Qw+}sw$o8)7V&4mu>4kbq{1> zrS^UqCVsZ1@55e^l9ujK;&YsxZ*Jm7o2K-Mr7z}x%VNDZyJO=#u?tgC3iJYM7|3Hs zK_qG@aY@Xue3_5@;@>H=4I z3LI7(x8@n)y$U3GpzH|PQguFnHs9Unme{FWm8PDMn_V^~3mdc&Z_#a$5&Y_snQpr` zXFA=zSr)`X$Upco!7Up8JVERFlMd_Aiyv#Azxq7g*}?)- zUM@(WL}S?H%u0%Ko6}dAoqMNGH|6@MwP?6xLtLhGqi2atJ1c)@Xe;v}uw58jFKJLQ z0s94@PFfXtJ-F;!u&7W3NT|n!>&xv`b#L8j<3GtjtVDpGUIi(3c%FdRFm`caLT^bD z3;OsMc(>!eD4Te;*j!atbvyD{R~~HV#b$c3jFgOf86QTZ6=BC;uo}oG7n^He{Cg@s zhqX?!eZq?wId8Re2HwgeSEJ}e_sbRNjRFx_Z9hox#@82)ik#&FiBd3~5$8n|u9cu- z@US6R(dk(4;Cx2?n;UbOc`5_=RDGk#M2m*VZv7zc#gL7ZOyg_(cNb#sOOlDg6CgX^ zi2IAbzyFUB8?&9pi1Sg*)49&hDbv1bK+N6=`*e>d@m(crs#BVD6{}UppLAb3c_?HAEh%X_-^h+yF@YA$y&h6x&H}QIe_!$c z`*olOQ4l7H>xxD*!4yZmni)oP&=qvY_G>SyjoyDAbl)z7#$;*EjL>PSOC1~65ZNI9g)f5yem8fM7`$WZ2$ZH8R`e(nmT0cf}P}` z9=WQl;liJJC0G9uTuz|+;WVpvyaTMv0Q^?L!{!_b}6X3=8oHxoyH40CGo1BpQ%N?Zp*Q*hFi6n`aY^SS5(5;_vBzdc@ zn)S0?|nQx}?L9_`$@rf8qBxzCLD+xX$JRM;4KlIU_R_ufK9~uL;(MzoE66;r95eSeFp=J$r%1 z+Yt%hmm~OJ_B4^Zddb!jc&ETBqTswDKI+&XZ`Wpe$~0q~)8%ZvX6?SR=n|L+2Dzl5 zwSd6QCga)wWPj5jmB5!nZ1hJ!KS9dc=#%>>7M*y2Q0WDQL!T`=2nK8k00qb>_0LnB zU;Q`)telH`pWh}1Usr@0uEWBn9wKYyY~k2Uh*iM#EAS!Gvqk+$nM2o+m;-Bg)lK?9 zH>hk-KLY5s!`i|ue|h#;9(WS{6lVP|ckf%aF)RF>)}_#xckMLeSt*QkQFcmose$3) z*~I%)IJ>uxx;7R5QNU01*@AW^V?pQ9Y(e|b2Y1or39Bvl`D3m+`ZzcfaEdJ`vl7l% zwF|>5`Pcmby^|^Ey6$hS3a|3K$|Z4}+n3R>eD^|&JA_JF{{6AJ?&AE9y&TI!HLQDqL1c%e zgP>mK$EI51euu-(MAkkZ^AQ?BG$M)PKlHs`0)@&1W+LuPIhPrL!{X%ZxJ@2*6{nxk zu3+9ECoyU`WcULZeBo+Uk+0Z+qbf&3;&#>mb8;NtmD3=XFPi5De0x(I`Ano>Hmqto z1ZN=7akj}L#W>o~d-6rJ80cGFx3OO0ZQ4g?+6_F?hQ0uf5_G}#2OMkQ=Od7hOalgQ z8qb=kIQsX#sCdsr{q$h7|8ycJy7L+Jm){D`7Zw;B`HKi=TchCz9(>owohPP!O^eYyiCiH(CDbnZF%M-J)5q&k zJ+C)QB{-b(43NEL*}Kz2JlD95@JyNaYLqk+yjOk3j#V8d@g2-ZHHe)6K*-nS7|IOe z`5xO-FE%a2Dul+G@OH{SvqgcI5(vD6eN{9l-Pe6_P9Q-Jv%7qI&kXYOVL*_XWhN_U zM2X?=#fSU(I{~w55dW=}O@IN<9V6lt*4~-jTxQ4aKY4g?D0dclv^S~V+NctvAhE%r z+3@;CUV-}cHhI)SvSo!R4emC_T9E9zH#aAtZLweEMNMpP&pPvgE^@chTnR4eClvfXqH0`7Tb{ z3)ZTmSDJIn=H3n)Qj#pb+z8&ff^i%SM{~lfe4*G&8OMBB+lKvD@!>`KA5Tw&90m|X zMHmwy>+Z(fV}gqlwoS5Ig7c9fJ;ES?FIEZkWbSB9u8)&>P>!hqmd66fSaHrT`#XYv z^zT2r#SNG0Q2`iyHE6r;Q9~5v*L;;MOr)v~uM&pTY+5Mk&zJqyGB*#Ondxiev3}k4 z>mZsS;ZJyB&gI2t@}V5DKvejNcl#_u;1~$I`#6DQ=rv2td^oY)j9Y875G82i!8+sB zj!w!%%{tra%vb79VIMicgM~D>BGermAQwrE0=-_`i&{0EHGHWhsfDYSK6rd|N$H~X zVYel-M@WLJT<@2DT78F?E6#5AyvZ|P4Tt<5OjoLusPiHXl4VFkFB6<D%d->8YRSsBbw7Xo#x%XS-kq-xvzfH9`!;)oOb}Yoy$M`*CBmEw5>0{q_ zDCa31JKe8yS#dJ1T8tDND9WFG)0jMm2)Jr$Vbc3c>uR)^OhReF%uPThOVGX~XJyL% z@0oBfRDNNuQKW#1%(I0+;Xv^g^>WhF-#c!F^YEh3liJqMsGCoBu*@Fh%>~kHd`<^~ zP40D`86ir?{#)#>ICb=ezS@vgke57sO4`N$z~L8ej}*-TG#3Faomr9lMJvDkC2T&{ zY|3uVPGOV+Q~yb>miJpVN*m1z!#t31@fPfvE~(usaXv$60%_1w%yJM8Lk{5tRPbtG zc~FD@I%XyZum$cGbH^Rn`7i)|1#_6l zA{8F`hRN5~dhaV1ge`oB9z{3o_Sf<$G zsgZSZdaxQ8l230Lt04alJ`g<{XvY}(qYs;&jz|k`MkIP)`+|DR$r=~eak;Ror+;dz zAB+H1iC5V2eTh|-OH>8Av}k%k4wOEb1d;=A;Labau*T|O`?r>pw)^Qxu}}KxK}Q36 z{J)u*@o#ZGj*mX|hVlUiMAf}iY+*i(+oms-i0f3}dNALF9=6fI?0`ELD2f=FeMqc~ z+B%#KWp5i*D|Hl*qI78RsWPrR^7QTbvs%ZO^N26AX;4AQh4Kds(-W$21Coo%#~LX!a+ ziqt2kSY>KWU1$lOVZ7aBD@9rO*!PEOsR8*+D(9Lq)Pj*>K(RN6G;@2aTlm5{KVZjI z{qwgcW(G_byMhPX20wD&#jVe-7+J`DPh%BYyW7$VwiXFg`eZl0ORZJ+Wp?6I~x z>|=GE^Av?|qHl>@B6rO?yJ1RWJNb}A$CTZidW=l{F#^-GS`f85rmIvIo>ree)^%&B zw3^;0&wiQi^q7}e(qG3ql5IbL-Rlp)le=+}tl?*6e!o_AR=oemnUN~D|7NbohLM;R zkckL!2)yGB!n-u0<9Nm@Iu3HL4z1T@$33u#VIu1QFXL66mQr?y zmgz0OCCiexG%qeEG5wvNG0-Ctg1Kr<8NjKunZoHyAv_LKU-bR7yba=Sbt_x99@k$={S) zET3`y*u7A>>@jmQ@X68l$($nd*KUt81mpBF(!A&T-%M@B@h~S98~H@F zj_KPM*p7|F9HT6X6r%BG_mReA1dv*iwU&bFL=R%WV5b?b1A%M0&;E!UD-S}6EAz+M z=V&D%J^@1{Sjl;i|9V(ibQuQ|Prtz1xO>^?#!<>c7#%@C++KkW_lWyZbDb>Tm}8D^RA`m8{KG@l)FTvw-uFk%T3Y7&_IA>1BS^Sqox2%qlvrY}yP_ly<~sS$Oz z7|y)m%^>^9qK|)0}FZJTa>1Vn$BRx5X)=o+8CQLwZBwxg*exr=ZcR znLkGoX@l*?7PC@T(fehESd;($@1?!|SULchd_6`Qeju~W9)sjp;^_Z!ooT=Txu?*) zIOnQ-M`XRn0%X&b!9l8s@my(C&yvrJAN|}_c{c+rYw*4WzVc5hO(#3es`k~zHaDB+ zg|UUgw~KuOr{gsZCIc@i3P&8buMnb%(m28chdES8)kIgvZX`uTR|fHF_hvlP!Q_51 zlz}>cJga;YruLOMJKy*D3;&Rx&ibuQujp7>&xpAC2f#m2Va{FA!S-WK#{@+Ko>8`3 zO%zAOZFLAWcbRu@l&e4rT<~6SPHHFw?Nmwj9 z_>$bChkiTFZ@~)^6@h$EMovtqe1Y>D;d5)XBT<6oT${7N#13H*$G(@0Nr%aMx~(>Ivw==j8SE*l&& zL57CM`KV8Q1;hE9?#E(-MH8+C5r#?iTgS*}af7+qleW^CzQ5J82RiFisfH9r8sZV2 zWK5h~xWgB(ev_==dX2>Jk@H;Um$;_+EMD}>xqu`6D~5GpErUM?qd9I>82maSKe+*% zM+z}1x3la13N)X*03(rxbF3}s3&b>nFEO)tJyoe;yEtcZs`B&Hmz{UT`CcOZw#zlQ zKK^=vSOV$j{ZNJ>OmO+0HWi3QIZ>Gde2 z4H?>WzEstp{UT8Hz^-z=&dQfg!p2Uh0jMsf{&MkZ%e*aeo^({)H3pmD11@OR7uA`r z-NS4rjMfvE6N;e($4j3T#{1SpHz%}a)O}#Q1IhYNLZE~Ke2Avm{oaO>1P2pQf@?`` z@4msx+j{mw_&vOI%$skfoW-hm!gWu5Zp~YpU#t^WMb-m$&XL(E$<8mT@JhL40jjM1 zsJiI6n{oFa{pz|k7P(d>BaSHYN}<*m}AIls2Y3NTnpt&YD3D0|6TFa7CnWWSH3 z_P44QCD&Ia0&(%r)M4Uw1bjfL9(5&e;8&D>T$zm$n9e-uZC(U&Wl;zE6ePm#$Ax#P zo=7IR7Gt+;T9t2H$J6mv%|71~A3de-GfqDE$#}K0hNzTP^6|-FTsQqi^fuc+$Q(eK z1l=jQUc2&ho?r0LMFO3wHC@s%s43WDG5fs@%gavCcvhX@V642-xo-m2K447-Vfruu3as;Pn{N{#q327MATirNlkP}-Y#Rr z-fb!+t2+H|TE2q+o%kg+(JY%aQ~P*4!v!iCa{G{mR`O4AHMbBX^+}V>VY!|zppK^bgg?r`Cu@1F& zeUCg-FOKJNg0TBu!nSfuOg`KS;BqS!yf^VfQV6>S6M805wCCs*RIEUf0fxT|COhCb zL*=IE7^`T&OhP_CJZjj0i)*0}aX2mJtv@vEjl5(5yxqHRm#TGvzUZ45sgW5#GrnCVlJQs&O+XcUG9lgtLna? zW*x;;&k(YBO*_X)2!NpdbPmphK+ZWr0(S(iZZY(_8maIE?VdEYLoWY)U6aL^| z3RF#$ik(Q-)TX!jXlbRPy*b{cIiluTf20~gqEjcP;5e~a-C4wx=HEn4{T~X~hDE&} zzUilxQZ0}Ik%*U_eXF-lkd)Wav|eM$>QA!2%p?#*)eYG@ZpcD@&IO%xS9miJ+RJND z-eM_KtIyMA@O`IiG^RsLL@0?voH;D7V9>N?W}{ltzi?j>NGI23&y&S}d&Q0o>EX|t zT#+>wku5ycu#hhmkBL)d_S?EtR7^K*9GPNO`sokK53ff(X;sb41DyP+XN_5O$Pr_hOOAF)?yoWcO%wAT!| zTuq>i-(wVOd2(bJTcMo!#A9?8+o*d(7kn4}CJm*i1N>>lm#^$>3P6%Nbq z{P)XSp60CURc;m))m81Q8YvcIzTx%Ph4oNQb#;H)NVuO$psN+h1TKlUiqvK$3zSt? zAQGocvSe?5+6m@*iPpb^LMlr>n12++=ZJ0ELI3Ps?6ldt(`2vn8H|mGiAngewV7Y$ zG_N#NV+u=>b(&e%nHDkg!nj}r*x$7L&MLIPGv%S2jN46R1C&!;XF6B`4O!yb46_Mp zo846j68J*{xTxdDBfwHRiNuQNWF{i1;J#dwGVFE}Cr4&eLGQEn=(rK6p5qb`E#ee@ zBnKc84zxWMN1M$sO~@lrb0E?xokju|mwBgJ;$`q5FKj{*IKP7rdG~Xp{zFIfJR)uq z+|B;kRQ{t36e$1@fG@$zrMDr+GLA>Jjd7F)(4|%xgP~OpMhd4id@rj#!7@d{byR<*98a$p6BC_I6+Ya5{VFZGv>(vS_UYygR!*c5vOKsScWHJ%;Zbr}g z))s{B`}(`5F9Uqevt(p($GT$M)$m$jSfMUkYTUc4TRl6ro1ecGdmmu57?bQ#MVpA1 zv9#;)^jZP)3?FN)UbWBu`kWZRd;iNHn%Vm$WK~KUnH_K1Yp?4FY=auK>|WO+?!>0rc;*@siEYes!% zm)sw_`sFRdndZV{hG4`(v~9oo;Ffj6uq(gOi|QzNU&j~1aR$vIW}q`KXX%?-PrI0w zs_<5#AgauQsDjHS*!+HZ!1&&!Q3P+(`lAZO4=;*=T>V+yv>rPC(G6SzGGi~)To*03gMnU z^fu7gsv?PMU;NfsUQ79^e2y&pVVo#3AKlon1V>MBL=>1c1?c_AV zWA?Z)2f~8$P5v@8(oi@1B=+kzx)ehWM>GGS*%)P{FnhqR8Lswk?qSiPGlICCs1=;u zJ6jwjDg9Pe=J~t`7rm_PyDe3(m^j+c!_Ni&|Y-?cZn z@}4cUUFDq4Tbhm&AKjZW8aA?sbT~$R;{3u{%NW?^*6HpGhk})|PV3Q@zHBpn*!lL-kt%b^)ObRr2@3EXt?JjGroE z&-&hgaIVXASWjfntEsv*i%1n(uaLr72fq!0p>Xlg46%*;^Wx1RR_QIFx#jukn%qA$ud6-Ash!QuB;lGdA%eyeDDjekvii5iSTHqV zOW|!%X0IZ?!5y!zo1d>cH~6r`nj~Qr;$_wOn4BfslN+3l-wW{{Q*`DE6n9ox`>w5; zIxRhr+0pUB$>!iQ$A;OENlr$ua{gcTzT@w(=l_v^48I5c`a^ROI)8$Q$vhf7^5&@W z?2gKS`l=-(&i>=EmWogH)UB7~i~G(O{y;>i`K0IdA8tmz3#;0UN?EBS0HCh_w6qIu zeZX{KVTe=<@Asm7Z-jtqni>D?m~e(*v{4qVs>q=D)4NN#uGy8yhB||)g4zoXVRJXX z&m$p|1)ce88s*c@T+yu$+`ssrWj0-{#OH)%PWwihlnxeI?YX+<#!LWzxBBg7y&!AD z*f>iY!+$bO)d%bO7qPiZR$z9lEIZaCvq%_BHtS;cet>j_l-x>J_5a_Ni0aji6EK zJ$2MV6^6*0g?N@LZ{Fo8`B6!T4@q1qLTf)*?~gT9Blu9#$+vK%M~L$E+J#%gx#9Ea zrwnTDKxXXpAe%zW_~@X}prL1E&V;s9J;){NVbxsjWRgwA<(C&LqNH}u+qolyPWkSn zkc1KaT28>f6#cWlDB%`CPUVipx`u~~Zah$*?)z+6`yXwa9zhWp>*d~={{e^LF^K>3%NIB0`7Pe zt_0+gweE}$&GR%Um(6$gnoJO!Y%9G}Ip1GtH#Ul5T952?O|#;UZSD(El-3vJg5Bs< z$o&zj{U!z$9peA7;0Z^*Sm2O>lNFZRR4YYoMEs`MX@Sa5a~}{DMS9e4jjNRRwxyMn zjCvKX{Ja2qGs}hb7cIOmUzv6y;m*BqGyG+P?-=S;-?V2#V+|qO`Cc9_J=yBfOSTV! zhu+EoV_@1DrPxhvyyT-kwkenzQK{k_LREUC^;R#2$79zXNDr)F~<*x^DYY9 z(Mw35o*Y3-t;Z4tdPlMlO!aCfLsS-PjU-m`^^<(w9OaWmR{G!j+kVX?KfsG-6qM9P z`A1O^pVGgxpPk-jaA$mVuYgL2FDb_DwXyJA9S~FQ%^Pprx0Eb8)56QJe(!4R1DL6J zY!Cx=Bv}UM`%@a{8qIuC-Ea9!bw;x-uTzOX-)p9H@nU!t@5Iu_BkX5cdHqY;DTb^( zRa9Vv3EPn9N_I#YY7&lMcBsPkev41h{6iy6K$B(L5)B*3&nYov3*5|%v$m$lLh-2+ z9v+tOv^c!F+v43~){T7RP$yAeeqtqv>p_?c(t<}pg zb*Mdt0xl{*Q-lgYQ7#^IQ3nybW@ON6TCh^@*P{O4UahwW=fp1JU=6YMlCT1bz%vL8 z_$!Nd0BV5_yXf1p5Yql5@KUec{Hg&Ehp0_(#W6wemP;J!03+ZBaFaS>1EAc7Q@x#U zOsG~3S@d^(5Ndj%1mldwaD&I8L>aB2PbmvIK6Ueq`*B{LoZQ!aT!xAfQRE6LOIs-H zhuLPHIl6%oZ=jz3IIbw89rE>pQfA`P@=!(45)quwFkSek17K5VxUfq0n(x0t7RH~D zP1Pf~x;b%$-H;o5_vuOoQYy1Vp1ZwK53l+L8ltFGXkYz&Y7OH)@yIQz!bJ}`*bqq& ztcizA(5pO@GcGQPqjbdgl7|hYN!q5_sE&RPKC5%CKFGrBWfXN(%FpbuKBs}up|{9B zGHPe~P#JZF`aRxaqkkdy&VwZvo5PoN5EVqT@?t22j<~G(_S>|}H3#~rk^#;Ykx=R_!<@kb@PZKe?qz8qI|lN zZ3y?<hZyeD;)dXktnHLW*aEK+6rT$XaE7c#CYSfebfv4ru9p@c?n#!Sn9Zj85 z*J&Hf=N?WVYpYNy;7TmP_&vk;D@-|=uBX=E1T{^R3FU~kGSNi=>+jN9KKUlF0I?a+fZaO(bASUN`ZIdt z7}a^o(HGWIogs$j`Si_UZP|RC^{n$b!c-59!0+>m8BHABs5~ezBs|ep;Jaaf58N#n zw`XayjDK=POOV$aF&?Fk)cV=L)xlQErtvX_V31KK-rkXx{9?u;DmN77u(4K$@apZK z2!4mJV^{%z>m79>iM*I%t$`rYr~?f8EX`!C2F{p}9v7UHAQP(FV-QTOLIwHnCf z{`fqAY?MIz94qGA#2ZPw;p~~hWh?K@rKZZko%3XBGIpH`Qc~S z6Rk}gFjBIm*Q}^6BK-jJcfRKZjp32~#GvnGJl{`>292c+>SJz6fK06}ILU7OIM7#` zf#e`fivRYQ%I_%gaMMikW1=Yv4#A&a5aN$9ESpj_5l~38^{;mi!Z9LLr1xNL;_n)- z6IB+3DjK}I9u2v%92R6Xy9a0TdMbKxtGPWdNy|4|JtQ2C%1VyUnAXH|hI3`MH!WUN zyNVf{VW!kp)_8gilI`X{L)!>*ryPvmF$&b>tEoa&Og_!KeF_rJ;XQRqmzjHsez#J5 zInv*01WI(wjcB%&Gx2@tIellyAZn{8-CtGRDOVLePqnVDPG0w&e=Cscz$UE5k!&mQ zg~m&oz`D7D>!4nFJRuvYXhk<(uel&H83<7sSX{7=cVM#l)S>_49e(VU->cJCkX4P* zUkbbD8AJTV!tx}pnw33KF64ToP1zTTC*Hv_UV^(&a)AVZ7<#m`ZTZ6~CbUqfJ|mZz%1tK^+(KUH7D<&Ejv`CDl$3J#BDJFUs_0cu-Y^Li`Y~ zy!LGj#sH&rGoxsb(!d9PboEm|EuLv@Oi$t;8k3{;hC)I+hSdZluRY{-9vClTi3l9! zzX?5k6M7DBLXfnV_w(ivKe8egW{CMnKa*-zM<}A{017TLt_V1pf64A>H&M($t6Bj& z1bc3<{a-19|F*ES3kkjqxPgM8un|0CM+o@v-~L1M6m=Kis*BY`PU=qrfIiqz(EnI* z<)m&Hk|oKX=H?JHtAIU#rYc8K&_R4tliHa?o~~yX>hTB%#}f>SvmdiGW?HOd7)f-c zsHlxq@yVn}xbKgXi(<%^bkzVDF*zdCH$pPcvD+}8s;xWl2kqa!lFN0J{86@#?Dz70 z;6r+F4)DlkLvR&JNWB!w94SLmPiEdTO;@6@^T;hu6%qbv$ltPWfOd}a_BP;w8& z8yHVilzOqOSFmbOC}}#QOflJtYUkJg`P8QdRjARS{!ChfiNZyzWA;D-*VRPYE46K@a>}9B zryJ)fIX8$>0#OxX%6#2<(IyI~0z51Bs?M0G(U61Lr;2x)N)(qH%EnA|-{ms*%6u!C zG*QzQ$e)axKPqLbElszO?LH->z?V^u>9r3E(1GduAf`=jVxC$b>WE7)istra5{ zF+{_!6!6h~T8YLn5(UyIfNRn5MBt#r)0j=|B2+A#5sL^-ZTYmn1{&V=sgHwCb)WlN zR7vdfr5-UpElbfH7JIqEX;+=}H7<}{o$i2{5ZfXi0sW5pspO6|z)dd~I{Ue~I9oe> ztx0-plN8>}?H&xivtuGVrxJ@|T9-L*-oB&zqo&&OUj^c`zXf8+^8$VTnAQ=!>@(U) zq=D)NCn(z6YZ;$={xnNMA^UKc zmM`MydgG&SwTSO~;>QdKq8ObxAqLc{cfpNz`tgqPZL(Y`(HQ&Sn?o&GnXig;+k;Yd zMgMt~dySz*yHWt=GNH5gOQn=LLEl3#%x#S8HN92NE1Lew2jwGSr2DZ5qzt+*jTk?tnc+7 z8u`P1qM*_cy0xFd^fIYt|IJmNt=nLI^`AyhoLG4VH@-To(t%-Y(~C18NBIrE0ko?T z(ED#g?Vn^^!-ZBA)^bLw7j?(H&J3f)UxNI?bYYdIHqI@LN@6^vzws1@xt~+l{%8{a(Vyu#aF<{1^<)5)@ z0Gm^5>(1*NzxH-pMR}no?ikaBzxjOk@XF>?CSZ7ZH{{GUGOTm?Jv0BJ%+h4Q1o_~h z3#Y#?C{){$o^LIxc2M-LF5HHw(BeCHo+p8kfM>bqB%Y{r(qw9~jHe9SInZio@>}nmhVOx2E_U zx>pSKU+Y#V>%7sp`x`NTW(cT(kY}5*DIhcPSqCJIphb!*mik54*(duC;@mD;oS^rI zCL9(MYQe^OXN*9}S{azLLc3YqK*l z9b_s}3=;TT9~-Q`UTsdq@_aGOj_ApZXc_)`Q`A&l8s~GAVSZU8nU(2Dy_=^i3$kN! z(GR^9IX4F9#t#|F41^a~8exYAXy$Hzx&&!|=t0Cp8P7a-I6Uj-q?kOE=J znJeZ(fX|i}{#gr*h3u8(*vRoCd3|P9i>182^!7uEWYu=I^SFb>pi97mAB(zZVqeP~ zl^UAuIcXIN9gg?ar;XSCr$Mp&S*V%%LW+pa=&{L!6N0z9*Xr!Dz5&yokmeIJ*Fewe zw83^I=7Z;u^4Ql@&hZvEyx{_ud?2<2bX2{!66JVW3l(Bt1#hU4`DV*k0R4}hY?b7|EBW$aYr;5L z6;mO(vgvc|P;-m0cRlVtlC-Qw5m}jiZ=z_w6EG)g zADUB<7Rwlp7~{D}^m3Zdm5J~1;(w%TSzx%Nz$$Qu8&(PT!M9K~)ndRCD*$FAbEckL zRjl!;(oZjE?Zje=~@wHl_FDFK))f<82tn(#KoDvFb z@f|T=sZ+>ZbMSxP_&NE9=AQHllICyC>dQ)PkwG6zI{^nu7wsc)L&U*6=$*f$Zh;b> zw-$D=4LjDA%SZf*Kv4o?fnzyxV*@#s^7Ggy6fTQ}M3}T%d>gcgpP3G4S9wJ49QPnU zyz(?~%m)=$xQRG_Yw!=v98!K52QPoFe)U5P38gCqsQQ57DLsQ=`Sdpm|X}% z`>nQqCVqs?*7RCv!8yGSI0*~rb?ka5*Om~Mz&#o$Wq@MGucFK)tCv+iO_c-T4LZ_}cn z5pTZO>Sopxp%nZ<1PCS105k|>bF{i&Yj#+Sj8&_RW?XGAU66OW9QsxJsNi1Uq3nD? z?1hL{z1jH0*=egK#>>7Dz(arL>acY26Ym;y-4a6=+V`g5QC)<+nu3 zqB#6+LV|ljogD_KjkP%oZARc;PCpEFk|#zVd0;FnzV;7!bQ~LY9uv|6GdEI0V)D7- z9A)OAUYJTq8z@8xHGcVO-3ME%{i$s)@N66z-IwXu{ivTQ zPr;or>VE3qnMR=KgKg@bpFK?#c!<3HPJ;fR`jyC1O$t?I@F13&7+W}xIAZT0OM*h* z7@rLw7rjGet(VNx@Uy@Td}L0WbYUFaa!VyFb^Wi)J}JxiUJ>l1PE3$)yxs0LQh#wA!Z(Bjv!nSN219H!s%e3^zDTyts-|hNI z)sF?GQ7zB(M^$m;L7D*TU#zQJGiW7|4Q-;JbF7Y8b(n93KwskY;qcuwySX+L^ z7(Q|Gn?^TeAM(XMh`e>VICVI9f<<#%i?UUUf>WYE>p>J>pd^17k{I*?&v|D-U}^8w zV==mtos`w(dWPDa;H~Rq6P$XavK?VMdCLE2E#gp$<6`UF`e5on8`T7wFpP7b*lV$J zFvvO3g=G{jS12$}pqnLt2Wkx3*@-Qpi&&C*PO#}8ofH~>zc=`;hy&L#REsy$KyMPldxx-f=_e9`fqtzR(vba z)65>7_3-zHh!8j0Q*&FPERM=oM+Ky2&AY5!o(#k0RrdASX#CGLgRGyL`?nXqp0ciZ zL_FK4&$lA$ec;+to#lv0Wyp8PcQ|Bp2y_tcJ&8}3lurka!K7FM67P#Y+)Vo78)hGU zz+RLa$NKG;{$U>BJX;VmF8beQ!5U%m*>vxl4XW!4_;-B}Ul07a9g4){qbV3IbZR+8 z`$K_i)$_opiL;9&A;j(G`c3gDm&qYHtn>x{+-BGD{?9_7iOLvg@@dJt*_i=Tdy0bUDxeUd!+j;lax zhC)4FCKGb$L2j9SB*T|8`c+6PepxEZ&L(yqmZC~@@+*4Oz(c)tU6w*g>ZdB0%Mv;& z{?^IE$p2L*&l1EzXXV>E6z0|2gXt2Yf^d!SlF1Ha>4hW;Udr6Q|D5VpCyzen1N!JJ z9>#&0F_**lCE*zfVt8fLH=_S+3x`|Wwb&wyOJAZ-a+xwLJpwZp*(hnW!~7@J_@7G#;~<*}PX!OYAAG)>s$#^b zfjl-U_^(i9k}NiRfbtn_JA0l;r|w$5e!N~bY!@{@2H1~9gx}|jh|)8t#2}u@4nOS9 zg?kb`y6fJ*=Kj!lc74H2&sGfop`qi$t0uVOg|!|!>WuGHn%p@3Q4IUOmxu6yB<6m{v@yQz%!2%FwZzT#mXi{32VxIw6SA=wJ-VxNSIM4%-9; zhLSXjoC>n{6w%|)sQyl{BWWu0D&plInqg5_GA;EiV0tYP!)6dNBlScviP5PO3%NiX znlCBQYX9VBkCAAd+Ek-VHTk;_#I3pqU^@NVQ^ejE&N^Tq8=EWfGunr75y)ZCyI)Yg zLG44F^*X9VGMGD#Vg@HG3oCw4J<5@>v6N6N5MP4vlOK)V1mwZxHu;kDwtdo;!TS36 zCyj*5Jw5M&f6c{+B#0!bWAW1ZLiaE01noQTh(c!T6r}8jLSdm<8~44gE;fwAru_?# zU&got;cBt6;$JhB|5N{v=n0&7QB;JYELJ=;wQNsR{Axg6ra+Oqc#?co~Bt&D8hJEL)yN*=nj|KdaT2T96AqGanAy|BM#={r1o@{z#Ou zU&JuqyrQs|H0X>r*bYRH0#*x)O^CehqY(6v%U0@eUuKlVrItT5fu}zJD8Om)+%d>` z@ggS8qk#qZ5>Wx0-zvGe3(Nr7guLhkBRaCegLZ76i@$^j6XQs{Ygz1aj`5oqG_HQ(r3bs8Ei|oR?FC}s=xvB_OO*m`?C4+Gy*Wx~jN-3e6 z7&;z%JdY2`Nx!z zgiYb%M5iL(*oD(*2dly~~>F%0USu z%0l1asn?}+AFc6q6b2DDOF>3@T7~OPzN>ODv)>wWHhfl0`HXN7zX(#fS<-OXi8s#O5~t;mYirrqauUlFJm zNsSv_7vRu~_#B&)Qk@&u$F_)RfLLdv4~ql+oOgdfHUYdOaP}*hxM;vo!~K^K4$vbp zstnL}MgF0=W@h;R@p>Gnq!vND16q*5@iyqu#RpV0lyZ${mPET@Pz&6Xco^#72nQ4X zR;LV&*8|S?hNI|9jm*A2gqq)$_}P{XQh@7~o0{Cz&+g5S z-!WWz95_zHcHz+IMBiyOX~#&R9=q`3Y>qD3KwiOB)VMU}$AD@=pX8WD-iAqVQs(H> ziFJ$9mG#1 zkFVopJT}Xvq2oG%-V!sjZ;?M6j+WWvUlHPqdCU)CL&`zy-jdncHXM@6TU~(e^qDPH zd$%;)DBzfJ&1=#o%Se)4``*ng;ix|}HRX^d!*IAM{$bE<;^&2E_tUe^0eQWA7eLr2 z0GhbzVH$7~JSG%v#~9*4zKK&=U+3X%G%$nd#&Uj}qWMt9MQ5=a0&(*bkQ2bJ<991> zn%^j~;kWM;{7Kp^cKt)+s$>|qWn03gD9TkLwj1gGxoX+pbW}ubIWU041sd2Z#2)~j zLV>3o#Qf3+5(M@EkJ*K1-c*a0X<@U0d0X&Zi*EDO zYK9Rw%YjyK?RkD&oK{<^Ll!i({PY45%zPU=xIlESI8LAS^B8Yy#Z*c6dQJqT@j-F^2Se;rKu&W-N;I`S@BBQCaknCjx|J40gDc=O+7LR{9IP0 z&d9C@lYbec6C}NBTUMY|?1-t2?woe>QJ8uZXgpR%(E=tGnsC+M%3Nf{GNSa{r`F$- zG|~YzV_Y95qin(q?T(P#60ARH7uWa7eft_T#-mkS9WlZ{`f5!^{aCY;3g!8HzA6n} zuKlU_$Kp2TbJaPKN}?Ms0PIE<-jUeQmsm9N@uS7m=^Ud)8~3J{)34ns@NrwIrl_~j zi$&Yf6&ZAR#IjLBj9|=S&%VG*zH@9(PdD%D>(5!a z3^Sy*X0Qdf$OPRael2F?RUa%`tbS_%@qNu>0MljGSIc)7NhHEZY{ZT>AGaCbZxG@` zMJQxPAQhkZT$16D(cW&l5Bvls-Le9BE=Nz$k$Gic^o`t!+Gp45Kq*L@SZj0VOfE6S zr>CE+^=r1FnIyHFtocWrn6c+X2R@A^xBtHoN;(LKk{oo0G@fbXR3{Ni5a1 ztJ-xCqa29W4i{52UT`)vtpii8#j5M3KkocGzisqpQ_9%WFpGSODB^?fZE{@)Z)$BI%&l zYzHD(7D)@YPi5}=%9DSd(Cy>u#T8`i+bv1%OsIGp-LCE8)aRIInEO7PW7rHU`b>c7 zehEua-l##Mr#&cEr~Xa%Ih+{^ z>1r&ZG*&R>cg~?Xj3E^cnB>s@ei(Rzlq^>$*?wn02ZZ_MMPS@K#B;VF*p*q)%{yFu zS8Mf{91Pthbk`ZI^sJiVrJ5kEHC%h2da;Vqj_irNUQgE5UAy^hf#vcvfCiZpG}uz5 zcRRcK3Z95=^|E@Rx3c4EI;NgH|=3dSR>ZI(F?lK;O`g8Pz-fCH?XwhMI;<$NI$OT)W|LW z%R1>DDrh|#cSUSKa-9ha=Abl$;N`?UT)emnoCY4b&zv9W(^onFNS;j5>mY-!Wf*HNogf;v>L04LxrVdCu0SoPpS5D#ZZZZU5<~n|IMz9NA0J+0Rt<|odbrX$JEikFGI$C#8m5cYIBHjfWNFWWTSHW>X_q0+=PRTz~Jc)iHS%6)2L4|6WuK`2Dth@ zflqcHLv(!~b(&9)S=Kq(e&mvG&=`Q-o}H?cvtN=UKd6+ygt(D1v#;!r0y-R9fR-Sm z5CXgpxpFo6GRh9PEQL;>)n-xni*ZT^R&;7v5cBr*b0>b#A# zSKLy&>qmcm7vUkBt_t0Vq#*NEh}#w{1+jrfgj z&sp;2(fJt@<17myei3z*{pIhP)Dyd-WkoRGV7=PmN|Ah5*X=CHUNVl1}!zMx@CwLkw? z*BSE-Cg}<{RLSUxwAC+|Lay$A@(Q|&^hBo-FwtY4$K^c%MXR-v9%zt@MOgQD1w3Di z)GS;T<24wznatrcUQO7uiPMNBEz43wTBve}PJ8?;CCnAE9{{2nX%)5Rk*CNHhk~y7 z3NJ~Eh;V8~PTLthhg6wcu+qdxWd4r(8TB~}8Lj-^zOiqqGB><;!yxfx_L<#WwCHBq zR^Zln=9-ko#TM&*!S?5UQYliV9wu92gbB*fjsJP*u@+qF|8gmeA=0&K&O^9?t=20O zCE2Idbza;WSrM&4cQGS~D%s}ffQ8cynZ%7|!X;v?R^1RbLVqZwH|VT&oSu7E7xs(X zWWSD?Z|#Scl`Fy{-cer#a|jJXm3@lbcNW}D_VY>{RNWFZ1B?sDh!c(7lyqLm6|@bM z+n3`Xz7bIqtCM#YcXVz-)AO)6)TjD;IG^^Q%eW3QAIC}<>bA2)Usc!P+G5?K=J0=H zT0Eci-7*2TyFrp>@GJOzj-Q!RYYC|F1A0Bh&a+pSJldD8N*ptNI9pOQ7)uDfP|uf` zdpes_fiy5W`?Wi9l-k>#9TgdMBi+VxXel{me`8m1dLYx*K({FOl+laeHFcOJ+=lXL zv+9J&^PW`lcA?SH;TCU?a`$73rM_(;Fi9!CkZ?oAs7nxkpZ@n@gH;IPJ=%l2{4X zzJvRbc7d*yTLoTs#*(SEw|)NH?RYB;eWocAOGd)<{w^!4N1t`#+Yr z@N6#_FDYatb$|Ddch?GZ2B-6p8af=hfdeXN;Q1ct_1{;qJ*@ULv;ErQhjbH<0lG3Cg+&u&uPe*p{nH znqzH70!f@Y$a4(`i>z=x@0b$5p20dS##_#Ec+;$yzEt17b5W4b#@|Ygy$C(Y3G4}Q zJJ^$vS*F=J$byL*U#jru`JVKwu4k5ZxpdsCqm2>yM#+HM%rZ~;PHNx;6`$z;fw{7lf*aInKZt? z;%i!9Z|YQM{r+OnKROFuRzmGTUnWC6fA`N#Yb@qB#kb#bkKR6SQy44OS4u2!lwSU- z?;zN%=G91n=6Ej~^9a!EcfI3U(=_UmFI1}9pz!uMO+l?-biE6xm|CT#sLGrV@s5|P z#PVIalonZz$9&{N`7)MY!NZ|PvE)(s-(sjTbX8hUU3E9yXyLiWysR!NV3P4m3giX!Fwy6Dht$=CJ`h3NT}luv)aOJERSH#8*+DmvB6JC2DR-EpmV~` zZ}i;$znR&B@~*wE-A7w|F>Rm57RwalwTn##po`KLpwD6g4DtO2veKFPSGcd--{MJ0 zvFWXr{1L7FOrk3{sD~b#j6^}#P%%y_6XarhNU@%lg%tLkRajKeRdwJEj%n9FHpX|i z^RP7FRdQQkoM*Q7p_d$%whm6e$eCEPzQ%z4xe|42jw$#Xr^iowJN7D7 zt3?==Q-4wE)7oL&w@({&o2)(YQV8of!@C5%bKVMH1fd67l}n1Id1?+0a}?c4w`Szi zDkr07!zmw5bbRR~pt8lq6``cdWU;!Tn>#N?8u^`c-fpq|3ZDycXPka7>AjL->D%so zJYHgPR@YaNFL6WfdA>jZOif^%zXYAs&neh#$I;Ch85zRi`l+fo!0{WZ&Q%Ng3x}Q{ zwGH^zVcYASr_^0@!uJ#d~t`)$z*?@0_v*0I{znIl46bLs5<(<7X z_c?(^K8bJ9U&<<7w?}fVLo`?ILec7Om$D0_5VLGx_UXRyXN|GqYo@7^yU!>rNZ$55 zRAHk+P^YYaN1ZDAh3lAgiyiCG$V>fItNq^YjWbebIP?Ev@4cg%YP)rB5CsGj zY0?BNARVN4usnc(h}6&{(xmrZq983a>Czv1C(@+`qzQ;f4ZS23=?Nu-7SD3O=iU44 zy~i2jJKtaL9wQ8vkpanA_q~4WUUSVg=XE7NEx9jo_>iJ`@9Deidk*V$cRbxbedlz= zA4^Yw66Z2aIL~IxvEzC{DkkqzDX&GRaxaweIgbXEZh9j$T8+0n7wiFcSH(qf6!ynF(L@KYyB~SBmB7 zPis|MwDYg9o4^@B_k=r01OFP|k1bpzM||(xy`0JxfC9IqdhxCflXw>V(EdsV1or|j zC?3p$F3$O@U+asjv#_Ci%`O?=b*8zK_{XH~3eeLWI_jH#dN0p8ffhA2!8v(HMNmwS z-fFC5RjXYQ!(=1&`O$VRmDUPyqp;A!_}ubKOB3`orB$G*rUilu<45wHclU#7)^Szm zY&b-Z&SSxQIr~G64X>0uu9$tTfw7@Ug9c!s+r29Y{ciegeznOIgzejfz<7_Spv1B; zJ+tL9m64XVO8lSa*&`Q`OaEu<>?Fr$C8&U4pguB}68yX-+x>@Rm?7%>+otd*djbKb`JM-1Bt$2wsFJ|#rgF*bgbSE1%#8xE}gzsz) zdo+pw%E)h^VwFy2ofcY6m?K_D({`VRa<72}eTTYaN4hWFj-32Qc38693TsW$Ks;>E zgwzwoLZn9+j;VK07_shLhG3Rqv`@c>fWXk&=AR@{w_E~4yc$i%p07pNZm3a(=SIXZ zPxagJ_T8!#t_rhVII2eGss6plL5B`Cy#`oO38QDO!!FJ_FibfB+><-Qh-7@%z?(Yq zJhx}o9JRW*DUxoK*7z&j?4>MPHBaK(TcDKrKOPdUqP%*OIzzV(u4&^kuy*Uxvh|mh z{Hkf~2-MuVub1e&6HCsZr&ZDH2zviOT9*IUr7l*t31^93GQ@EA2nLUJ>z{LmYK&GD zUn~4FcR=cbyo*|Utm;1f4VJ}+{xZun$!oFpJ*nYLYW3`*o}2MK?7dsuefiqN_Lidc zmcU~`Z>KfxAF{sxl=uA?d#z6D<)CTPM42gR)*vJ@t6q+4YNmet(HR-e;ET$kr^;1d z|5ds6k~T3p(aG`L-&;IZtxt$1No}w7>;xEHy%;@h;VoB(sla>Z`hhReW?A0eIb5j+ zVpmba5Vb# zIvFqIX?ovKFnryRovgleGS2$|-Rno%j#L2k8b>c}%ce|K_ye*J$OD^{kw(KDg$h~d z2z5xe1?0WD$dMY$8EmI_c79SgW;q)T=BF}&d|RW8kDJ8mpFn_c(r-f|H z1;$)uyyV10?O{pdGOTBdsnlW&o&-cwtR1+jmZCQ5>pxoLjTdM*#x2(p^#stFYbpEH z41T_qCja({5*l`(AY(HV_S{{AMiLI(_Ix*Z^Ic7bJ5iI19#rb5s%%$T2jVYWp5n9X+soZQy z`4L|_yEOA+>Lj(c5dFPfdm`L`efgbz1B27U%5Rz_p3c7A{Ve&r72+`=jR$_kQpq@THjj&RRDxnzANb#n;X7UQ=|6a^=lYt zK2+u}+<&O(i<-RcWSho&jf_4kA(PPV^$==A?6Xv8KN;5vgn0!iE(3i`&mIA7Oe9l* zjOV(68fd`}-ja&<6Sw+A8l@%36PNF@5!tZ5V^8l@L+;PQkv=h%R<+F-*6G>jk1(4x zT+J50%v3J^oTCg3>p(7T*-Xn}=fUt&3M3V8TXI@B(6<*ea6c$*JB zihs1(Mv37Ejw03Zb(cV~O0B~A7kSnPA+_I#zfo0EG>ZDi9d9Mz=W-cnsRg#YMJ1J{ z8a@QTpTv)~-G&}+ui@nNnzu(|a=nuve!o@@1)OioC-bX|>||=}$&IjGcw#nsN?)+w z#c(aGoDb#u2H^5eHXuG~k+%hHWlooA{3WS7!O|wnZLONscQ?1qW2za- zQ@Qezet&?zdT*x+1_6tyO=N3$47Bp|x6TOVMm*%C@MYnZIPRLSaujcMT`Bb(#9I z^j=q{{U!5{O2)I#)hWT8xO91XJPk{4CwfkDef-P8z#`|!i%T@M@p@^ItZSLGZ;7o} zaI7ODH~m$atj}r^$iRDSb1ygTqfQ0G>nB}zLU?(qs76fD@w-MCrLIP|Sz}zP#@zG1 z+k)zx&3CE zU_4QVityZcoA6eopl&ZqOxjsrfmgZtz)7|6Lp#%R>nPN0-LL$1 zo?c~RzHbL>+z;2dy}v?v%5Q2s0a z-9D8bfU0c^*@x?iG(egF=93SuXxfJy{C$kgs@_9-pM z$9wA>t|S)c#jP_B2$T$7(#{AAKPdVF$VoZCNT039ctuB`R|Q)XNa7)oj}pLepi zSET1dAN=#(lPAFzvPosmep1%f!O^t`{}u}T!CzprC3`(SfMG3c9xLU>Hac(eeDqty z#G|{=<6*#-1XuC*)6cM|3_RB|<@wuUm)^lWr6?Fnel!2dBV3XF(L}orBpnga_r^62 z=bso+;BcU@c!-_G0X0#E#{qIrA#rSq_f;>C$YD~Lh~6a@-%}$A;Ob{@oJ{5Jw3<~Z z^P8yJA?%X>V}5Nx+A?}SBbKT6L>qKIT(NFA|H99~AUVyJ+okn&bydw`nt^)shXe5jtvnM z)IUMI%I-gh(7tvaqXkSIo1FN=+79d3Ue&~QJ2h{oxjhO`cX?6%0#VtIgM+S5*vQ3a z`G3lzX4=Hg%`bG&y@|%$k&yb=F&0YoRbxIJXi=%$o{T}v$gTv21IZARDq9k{7OnNs zDZqqjYT*uh9+c?2Le%}X7U-d6>avCIY~KgH)&tnV{Lxy5<%ZUbdRtb2htlEnEIK|` z0#3ZOG@C(MAemO`=fpUBuWz@6`A#U}N~!&9)naS8xjpExVe)u&ME+1|F;RspJ-(SU zqfFT+K$^EDt0Mh)`y`8f%$XuHY0Y@9=<-TC2at%|rN)q~q~?fUlJ$som+*2q?%h{I zzR1eXo7mmR5|Tw^X=@vY3H+sy{T4W99>QsVA^9yzc6l`W%*O5TWC0jPR7otJ-=yCO zY38mm$20#tHKFHY57QMACuQclbOQsch-=F9zebB9BI*hln6TN4n+}^&ye71} zfaiX;ycDU(i3)2mOD_Z zsF3s0^4k0(WBS&{(HGPwyYc>5dBXFC!M0jE3AFF<(vZ$qQ*U#cgI?|5k3 zP~48>kJ@3aN@=OQ)pS1i&iOaddz-ccD8IkBoyE$|uP$Y8V8&&(K~+(?^;J^5K2A-4 zbT3RkT?1PGSlJmd;myn0&%wWB8x|A%Vwjz{L{iyfyHyzDKAJlj!$o_f zQu9FI{ihxch`j%?bM5}xNr!6iw*77t##h-uvlLY71cE-q@(4Omc8 zF^vBmw*V*8UsNK6J!omkz#`T5xDx$V-;4-U8hy$sOd612U?`#z;-IK{nh~F`aUk0B z2E$aGbH5C28wC*C_XmgM~-sU%xba7wj|57%k@{mgXKHi<|AIP~iBN zv3<;yP7h*7M$v{rPZ&`C;dx#a=EHsg9ujNw-_4Eo?zF}Am)XcC9hV=0;1OLb=%`8s z383mCSoH@|llRg(z>4=BTf1fIm=1BA`FD8<*n-_pF=q#Gsv*D2YGuF4+MV0?gU1?}2F>PmZHrVz`~MvJ zsbtF;wW8BZK-r=XjvCh3#owFUI}WIZp6J{rSD^RQ-XUVJIYFvMHE@v4`5J5(e#z{f z`p&|pP_veI^`k2DRzKW-y|fx`sXiKizutS)ZgXzcJ-{E4+`O>X0Rx-=CVEsgLhg$) zN8hY$NsDMO$$ofrqgcbI?-;)=tis+yW9X?rC{o6Fy`p3^{i%Bim$aP3Bs)5{5z(vP za1d8zbzsRJV25!zLrdaQ)^el)(_lyxOUR;cnsLiy@rxa!Pvoc(v&g^s@I)X9Ww%%V zwj%#5`m-Yc*io^J>3#N(1-ag{@i!4|pr*s}KpXe%8rPgV=}l@SF@BCdWCJKAUlK%v zhn}`sLJ5V>Dj+!a=Su#6T*w)%*H*PGgWQT2pZVCyH#WVJPUKy2k7p(MIN1I1$sYf7 zB_QYtj+QjIG8y=ycGs*zeCm~aDE_K$(w>L8pt1${dPJ|u+<46H0{3a=3g%OmAReak zssrm3tOAR=(5>(tH~untJapQipuQY0iu4}3Lq)tpL_{RbkbIr&L8vmrI8!MXQw67o zx=vPB;oi))`K`2m8+$ffWMc-4|SbB{hKWVz94TxeYk3*YihGQb!V zo}B$C@+x11FMerDFADUxj@Pmu2JSEl80ZTatm1`q+?{oN9DxgO-k$}6u>B9115Ha0 ztlT#t$^C;uBgqZst{;3XyrlgV_@BA#tf;=`B74F78+1F8yDn?dFr{DRYc5jP=M^tkt~fFH_afFm zg{*|_fA$;**qwPTR{1d$#a1Gk+_P)CT$mG86TG8e zm%fayHnkI}O6sQ_thv_RxccV$yf10{x$0$XFuk3e2F~B?sWM(}XeJY=hcuvo@D-f{ zGEx1xJtOCL03E$#uYG;y4ySm-=J8lR&Z>OxU#*7Y+ye(EAHvjLMLVB01jE{Y2&>`* zmpQ0+CE0KMT=v@Jo_=8ao2Vm_`?$Jeaf(&ifam`6`{q$BVcIx~ROqR3O1Xhg8MiRV zW1DxhMAYv#~dyiGItLz-ODhCD2v8f6dSAfO@i%#$n{jWvOPE$at)V7?N=dFIZLfYz2 zbe=FhD9xiOwAR=8-cPJ&m9%O8emzP#$Oof=6&eksM4O-Vq#B1;xgj+bf3Rj|`V~c0 z4Gf;1>!~miQ6?O6wEl2dRX=>h9LFJA!uQF?GdmviXvj^*`uSK-g(U3K?-xDD1r1u+ zy3oUA=lR-zGWbmfqQ0bFAt~f3nlHQi&by50qsnt+yBx}=6Gn0&hHF}0BA;=PO*Y6# z`s=J{y+B?Q>udGtE}ww}#bXd>qw0eE%_7sUVRzKOs$c9084E!H#eO~+C;w^N=-6iZ zWH0Z@xr>pUQdqH)!$^qYHJny4&K>o2ti9nFC93h}M8%TR;t5?~Pr?X$gb&f14%>=O zl${NeFY;~4;C@HE>Kiet8>US(0unY^DUCkH6{kQ!o%#EXuzxG91I=)Jb_tbNLgwDY zHEKFM9ryCP*Ye&HXg1#9p^$tma8rrmpiVx}eO{nOCtftR{@7c=6egT%7ad0{y5`=| z0o~|3(nCORAGnedCA=fqeuXIadqOBi`X5n@L{=3%0El6_=G*`}C=LL1gDC!EQaG<7 zF|KyJ6V4bYQ@!-W%gxSKAePg>%`dU>jn^sYfqViO(EI4N_LalGQ{?|m)CI`5+JaLs zHY5ztKHY2zXSFAS3Rb~&Uzx)huZNUT9MhX*0v(*;-0j-tK&|tQl;!<1A{?+nT?1cc zbD(F;Zvr+H)By5m{oh10fIPnCI>+H!uGeKl8e{}_x$@suHB3Y&$E;j;$F(L*IoQtl zcwpi})vL4@D@QG69T8)|cnbKrEHFVeht#JBBPQn#LcfV} zG3Udu|F+JZ`(Q&Zi!UTlOQHDtKOM#6Z_Sx4a^B-=AHOI~a~y4+pNo^$#UVTH!zO*T zZkSMpWbya*HaEd=Z-Ui&apg>Hp4?CEffQ$Ch#pHy@?_dzx--LhU#WL7;_!5SrK4OUg*TPl?}O4}L2xNB-)ODDZ3)0v$v3{SM3 zEWai$IzB*?--5K8LUvP@e-q*U!pqqo-gj)AM8@mH$L&ZCoPLXgu&fR|+UNbw{VsL< zgY}`Y#=cK*pz=`T}ToOG&Fx02JDfS2&t{$9sY~6U5kaZ5k79a~zBr z3_O?@u!3}Me}lgjrWwIVp_U@80C`$9QE;r}Fhe+#%3r)8zQoWypi2TYp;Xtg6bi3Z ztU=B^j@#Rkt5TD?sbM+rKKMg^0{$}41bsORw4Jiry!k#`R3q?GP0{_(%#akroFm0H z#=aU1W<;hfy4%ng2Ewkr+g1t&D@CAP_JjceBxU4&800l@a7$F3xOefkGfi6bIX1(s zc$B0_yZ_n5EJqiF8JE=MlOs6psoIP_F7(h)_?5#&Uc+m5b8ID!NP%pu0}!MQiT+JA ztO#fXN8sl`Ug!5_HxWy9*VY<8({GBYLD-hxJU)2dll~yLMN2)(b~HBu-&Z6p<|ANGf?I-1AjO0)%dvf=n+_01JWE6 z#Mi}&9o$&AK%`uCo5}{nA#DK*Z1{^HEyK~C7E@bV^Xb7lRgPBTL!OhnH~kUMFb}X_ zFfgb@Gh=r~at8x?xA|blQ5;>v5ap}0L#oz!hos(<1n~8t}0?v8xDCS;s z%*i|JpTR;7inqoSihPf4YwDi*y&iLl!U6ga>clP&551$ z&+w*>Cbg>STLlG<&g2q@;z|wNz0zJ5rI4@IfrrlXZ(PIacGsL{;=gw6TxNC%7zf&* zO*`%dFbM=cP83Wn{TxH)$*jVLP4S31k_&$+2IlV(8|Jkh4;Oi=ozf6HnLR$K7&oQW zu`%VkDq7y0%pKwpQxL>$`@M21)(g~X)~F-`gQKu0e2dhf#Q230P6N3QWfZ0k_ms=l zw3JTt`udFd$c`zDjIAyM(ha|&g%Lw~r>$iAh_F3H7bcbt#NA6x=>MW@i33eT>b3g5 zDcOwN{Iy7ezERW=oEiV@t`){Lr zgz48J=-QYTcK*dPRYfDvQM2%duN@ zaNd5Mg0^rWGj=@otn~=r3LYy+vrex~5orD)k=UYJr_-eDlzY6m#EA1)j)=W5TVai- z+hkz{zxCec*YINNdGI#I8vk^qmdw!#JM21%_1PgtRt+KduP)tGG{NnzUfjx00uOMFDnPbIKhslME$l{0-kBWJ>!go^h0O(xT2aVy~>->>YLT-dc3p zqwlbA+O+fyLk@Yv0rfD7ntM6ElEi#2w^WjT^lcE|fC4;$3>whqJ&Y{ekpd{^s=RBm0|SXL-tw1-=`1Q!psUq2zEAo{qFM*X0B6 zsOM)u98!k^TXt97kF=EoY(D^P8$^WdUuO>d5j%iOBlq>?rL%oud}Jd0mBYa~R_ixW z(g(E5r4MkC|4R*ADuLTzfx!QHTOK^w`I~5uK?%4z9eo1s6~VcNm$W-*@Qg5C9{&(B zy#~1`fce9&T_yq|Y9mP7%Re@ugR&>(SdaLVtz6*&cA*!53pVe?Zz4&61>Y%!in{*a zL=Lc1DHkRPLJo4t3x$jDAMImXfc@~sL|l3_0qKBG6^FEN>t*-}MJ@_*_Cl)%w}e*# zS}Hr?M`gf$D>yjVKWGD!0AKMA?rU+00-cJM{p>2$|k;_rW_~)Sf@_0Uu%ZgLb>O|Rq<&>I>yM!swu{_b7cyy_S*qV&) z)R2e6`P6eS+m`r)D-IOZ(It`G=v=6HwlhNM?RYh^^~D{lg7AJ6^qe2Nf&PTa4ZFC3 zY`?EmpI&nN`8SyaA$obGa6P;*_!j8b$<9!aEyfZXh#s!aJ3p_;9pMC8q+vJ>?>ME+^soslQGS1Mi#ce`AuY|h>EOeX7zSjq?F)6G*z1uyhT8M?r=8eu6i#!`14llmT_k@RIXn4H)c6?prUS@# zg#_0ChHL|sF__Cxk^ajz6U6tFBLtw`ir08p2N*A0hact7b}RuwYl1ZdoqG-FvptZ= z!{0A1yW<|b@SLk}38$84k-LAT2=a>mZ{YL7r+yQ;2gR2byfoYqvV31qrS*0-&9kVg zUGSt~{sImA@+Wa9@&%n6b0>7IVTXd+F>+4nJ7~m!qZZt2vTNi>9rm!%Y0eml^i8E_ zoAZ4G=(GE9k4v0L?O>LJ=vKgCdu_}mTQpn7KXNwRDz$E%29NTs3O6#)6C;S|2Fj6H zLpOAVQz*oAlPducwL}MyQ_4=;o+^d)r*fkhH-_aEriFk(gp&fpiFfNk4d8TUUc)iV zH~oziBW#$U+U^@&Tt*hKxxZ7KYOW}C=%$4}w8~i;# z^U`)0!wREbQYA}b7k7b|!c+})xS7f1$i@GBE+N-h0CBeXK`It(82 z*PHGeafP&x`0H2=WP-i47{Tfu5nN~70o!wUj(pqOq{(#xamCcsRnN6@(<)-CN+3Ar zDh?9REExR~Cb!d}AlUkC$+B+TTSzKcdhQGqI*lJxVsL3-sAIp?@;=&0bVNXn_ALAS zv+B6w=FiVUPa*MFFI z=e_t`mHm3(OO+))J7)Ua*XmLiq^@%pDC^TpFuw6ihE$>Y3Vr+#*@Otf`Z{Z1R;6|Clt8wm6Yx^9{kkIZQxb zEQT6s8zukjOFgJ5?x$^OSg>KlGPD2<15DR!rX4%PgGbC+$GvDDenJ1Jp`WDEi`{~}6>pDIBSEyfv?l`nwi}*S|c#o>LLVt2e)4Ci{(9m!o zzvIo#2$IPlF-|K8L+5KNp32%{>>^?sKp%w_86jys6sD9&ij+Vol5 zSjx|&+^-(r$uR`|dKiDMf5C^4j107}BjH$SgPH^ei{9m^3O3gUi)E}bInL%+80hGz z&l=A)O)6fFln(kv&?Sv~zU>ndTryd*YLS?$IXf-5c#MWe0#XLnzDa5m(Vn-{M%A@0 z5Bi$6F^P@!5LR4#cPpf};Zpa--1v@9qH_HCT3BF_`Sope_!7sY($BLkd9Sf*j=i*B zh^^pIz(oMFff2*^19{>#wt&fCZ5%ghDL$Ajy6bNoG(fqn*`YNhk!OSM#WdCKI=@vG z@Stv&1B<~WlsGZE{%R>dk-8ld17TWF-84N-qd-+4xy_UF$2Yxm7E>=?X2GH#F$IeA z80cvFJ#2Dm|4l@4Bn!pCRDlb6ZXaoQe^{`YUZysYfP9cK8=({-zqqQ?o7RWw2pGAW8RML)JZbJa8dv z>V`)ykz8mNzRkd-88pYyFl0^D{k0o~vJ4q$%1=Tx1oDCl(5dW=jMsD+mXW86u@YFz z`HPVl5pg%eEss12u5S&RN)19?%JiVQTnf*eYk)YBR(MA837&bIOqZP0_AG)BTNo zYY5x};$kur!0t29UcC#^3~AN6a$$qX?UrNBRHE7*w=+P9Ubluyqg;QGiXHNHb+Re& zN9UIp@p%;t81QM-fxuDX6?%C>{yJ_!<8|kw5OYAORjYE*ezs`H++HfNe*DMsl|BC) zX^t>ZO-JsFj;6MTkG&o)_lM};UD2Nip;r7r5dv*sDm^I5yQ!1hoQY_j!kr`gqZN6A zBJi}aHfG=*McbK+ZzwI{;04@lfy{J!5T6qxiZP~5Zh0F{u{pci*ul}NW|`6ZCZ?jY z+~7%KYxC8UYEfwSR=q+-(GF^`L49!GM8mRR+c*C0c7U3P0&8olS>{5Rr#Tre49OAR zQs0sr-XJ4hvH4nZMEq^c3+oi<%6m3#trgQ% z``WY)Nkgo(Bc;&>Td@7KoA+tE{HSn;lwjd?TL?whYIjVgun24 zJI%no#LO1!F0MBi%a?qajLhVb&<3|blCGU?$HX^7gUKs5p#KRA&P5KPO0rg z4h{%Ewog_(ZCPt*ebk?M>lS`k0=dDp8!wR)tm9iHD*rjl(v1P~acQhb&xTp#GEdjJZ`TO?Pbw@o6$DboR>@??lnddQ-k$HN{x7pznGBz!EyiSynA2 zwkP>hW#wiL#@UN`L1Lzh3*Qe%#4a~EZ3Mmt4R9iC0TFpvoFYRfc99ifU03TPDv=eL z^wjY9p6RW^W%ozE)fCW-dR~Kw+KOvDSUZUm1`QhHFf9jlXVJY(t$l?8^UKd2d=68> zZx`?1ruot>5nJi{O|>p;{?Cz()f7(?QxhK(ul?4$sLEL(gdOd??VN4@_luCd ztL^XU-^)a|)K%0}h=_@a|M8yRb41UGNUmJ@^9_7m1-`G5U%Pho>NN^7GE#CX3Mwi} z3QEcwH)(I(xJh%9lJeH=TQqd^3=9lZ)Qn8G>6vKh8R-9f2r&upo~zfcU%Pgl{s!d@ z`v2#z-biRR1|UNtV@oS*8{4;b_8y*I-afv5 z{-Gbj!XqN1povMzDXD3n(lhc43X6(MO3TV?>*^aCo4z!+eC_V(?d$(GFgP|oF*${p zo|#=iqE^?|H-2pbPV$FG$Ji6x>Dixg5fhR8V_5$_vi~wJ8em*ku3ja%O7>@5#8-U& z44mfbwR<9@v`@6jEZpesi@qnPf0~e2({=rUm=2oZjr%CYZBFqOF3g{y{oBa?zYQ$p z|JTU=ePI7Fu2~`~5@O)skDc$$(G~4 z$|y?swzyEwZK3TLHSAAB+Iy^fGL4>Shazs|{w)!P;pjx<-UxK7z}euHGd8p`heZFr zXQh*u(y2gfK!&N-hZgYdQx)wO1^D^Mu7y?Ik?oZ}kDbK_wPr2QYn!Rw)i$&JIuhZt z#L(td>}#o&BDm2eoW81~!=)$m{V^8&9r^=`Hm^c6Vgn}?<;@(f zTb6bebrl!ds8v6(rTSrF|4tzxe#P9b(nz&<3(@#-zG_wSuuaW1l#;LF)}5Q3?{oW_ zEuso^>VG{2WeIxCp8MH*X;B(yGri$ved<%U?{sm*rwx7;Xo%*B@XVbd>&&>!iMDj8 zT9`Kx?8~F)t5c`)pk;2!O5ykjOWVG4TU2^l-OXSvDSm#(C9X?@MEa}q#i-8suqjVI z^oUv-_?PHEZw(h5E1586T*dRBj**PUDHGl`byQ(OT|OKZS-BRvygbT-Cie@NU#g3M z9KYqav!dd=W)!dc<{+LmPdOb23{-_pb)RYG;;HZR@pp<~a|u9CUo5 zX8=o&3`CwTrGcIUzq%X@_c|ZS@A3bBDs}+crC(vh!6T3x;!CW7n&a@MiznqoQ?jh3 zUN5Sbi>L>Cc(2VIFy1B3a_+>~?y4;-G5PA6j9THeO6-K)EafFZQ~1B)ulAD1b{^DfP7pA1Cnu?jYNHX{YSJiOyhIke_nrD7@_eJqQqgMenl(;3IATf?C8@ zzlm6sRu*MXE^o5<;I9ne#eWk`y(qy$U@hQP;bTi_;8Upg<4ba63Xd# z4=BtTeWM3e1YX0D1YwZ-Mj=B6O=EEx333uWFV0U=Ntom$2hk4e)|Y&lYG4f}R@$B7F}tu`oZ>oxwe^7KCRtm6=WeH-~9CKF7* zNvAer12yblCxP%`mZIQw@o{*%PK5td!iF8x)r*z!@NbTNnnUgja*9exk2K_Zo=UCL z(cE5p^-F%v@2;+1{G;~#)tmmaSouLH56lX41on;SG-%2wodWGuy_9E@o=h>f3*&nd!&RG1t#&14U zvr?~H7@MDv&^M(ULj8ufVcP9KvjeKd#bfOz#I-_F!L&{dt!5gUIXn*&r+AF4K0NOt z=a%L&4U-r$VNj*!QK_t4-)Wos<@NLHR8OCK0c)v{?P{8CUuiycOXdoce{^4wZ2LCk z>JFZ>9+NG(ez@}$VR6VHC3;DZ1XKU6)a;NljJwKC8hu`j+Wv^D#cRr)Uk zBgp996X{p9gyi2s5p%wd=yBuGeF$}3JVd@7UZOzNUjhDAWdqE{ng?=~*w@)9m@Q*9mX;N#U z5&hH*b{YD~vcb77;&1pJJg>8mP|y;w$#CK&);%q@1(cZ#)Cbj++D#3i!Z(aPIrosW z=h-1pp6bx7|GcpN*M;`a&nbF!M5JoV#E-8l2VgVLxwmE^U9elY?OtKUc)_ZYSpo6S zf2&`_XE??u-|_{w&!h6tEXZyY&zt$n56#VH*^M2)iNu=dLSUhujX%ZsuN8+a!_YrC+_1X2ektjUveRqZ(#* zC2F;)EMbOLP4&e_=l)n=A>CuY^*=xYmUtoX2BzeKe<|9W5y7G*w77`TS*hy`*IM`n zxoV>n7T^LH(=9LUz$0b3Ba!j9wx(>Z8{Vw_`gq{10MPz^hZthOF7*}zg5o3RjK37Q zIp7oZUg36`6{#_qeuu|D0DCHi1HZI$A?pu)o=Ki-zlmHNIQn+ZE?}21f!^hoUcLlC zR@5_X#VSw@SZSv??grVNlj7W$G&B1Yk+^uQ7RGXt03F?iV^K^{nkZt7IJ=~&46CYCeP zh57jdnlhz*F|i<>4hdN5H^#;y(4CViNd(Ry0W7FhiR9j~AMF$@?c&CBSLTj9+g<`> zSr06iZbG)V5Wk6(O+nxEkN5i^ry~0iO2@|zfFWZw|9hOrIr}#L;ZI8p8MGll>B=vm zyfLTe)H2COPGQMBO1qB~Fwpfu%%{NHELAW5I@K*x%4w&ayojruyB691rcAf{S$g>^ zxOIua5m>B~2UfWQvC0iMzxUDb7o6$nyj{CPFHWlIQ(eIQ!Rr?{d^h@FGaEg>iLN>$ zowO}G#++HLJId^m=%mbIsClM0$f|E%?}Az0$a-C)AM}CS4r|v7*C_Jn=~?}x>-x;1e_C8qX{-uax3 zW6my*Ltbh9WH~+EIQ2A9FOg_+iz!SSei)x0L2aX>))Lq>qplqd0lc$b=C_-mYZ z=<`yh^BXf4{8I(cyvTxMsP0R)QPflyqI>GB-B5a@4iBfRxy-&0DfS&gsfHan*^Ii> z50%YpI)5L$Bk;15mRvy(Fm{_wdNST7hMDU*vq`daDc%G^AsfRgCre<}cA$|anMl+s z<3x;tNg0#PH2^^L`VqpT5u5Z>Ye=utKCBdDj}`dK3)B?uRnuKw6(@|!K;BK%0XO!+Zf+e zo7~CPJ={RUic+y_@*}_KH&W`S)PGAHI(aT*rX2&>UWlJ2F0~wM>A9mG zF=chw=RCYqwL7V#Qg5Nmun@?H6GrC7_}9(g{CngdC19hsLv$9Yj^?N3e-qUbD^89Z zH^|Gg8P{q<7wR%%Sw2CbDNN03JEv!d!l!7rb!V`(+M|Z;?x=1P;Tdw@vy+dqSQpgHo)l~)WI*gqOWr~g!-9z9$E<- z(1F{utyWC0GBz~Z44^cgFQB{YI`{m+0y!4h9;3n+cRLAYY!I@&oj;9n#TnyThNxAf zGCOiI+DEwZvjw!S#@~VJ{KaKt_&P*3RI|DunFpqg6FyhkhOj!xKXEHE?S7l_LcRZo zfns0`Q>8=PZ=!o=R{n^zTTi-}Bu1!|`BJ!5Xxs7}su7bxzkZcPRH!HOzm$yGA3UE^ zJ$aN5J$50(kDNt7J8o^mZxu~e)ej46h?aMYJC3+&>#aOrw*GW?BybECSriUUu``lP zJPx?Gf}V8KaVuc0&kT$DS8#tb0L(H&Wy6ifw5WJd zpaQIWB!BZ4C3>b-xrnBMi(N|dI(@xQ0@N--&s*?goMdD|UYSotf))DrzPp@Tp(>iM zw7q&+VObyYx*!f6WS}-^z(>v{Cu)I=OEyvKAQnL02bAAxSk#-rnn~p@D6T zAB)5?hK1RPlOUb>T3rz)F91E^5bTXEkKAX+my#$W&C_fv}AFJ8b zGTv5inVXP(%B^d#6d$mC|40QIluXO&>zo^JPpu7?8)F3xs0vUVI~8h3MD znKo?qo6)l7+wHRO`R~a0JINQ8)FMYNYbyTWdHI1WHIslt5Ou9`ND|X0vxrl5xbvjr z)e-zLl*n__Wfh-4elnAH%~FAOvR+>6LCDZ}yIfMuR}WdvVr?=hX9V6?E173Lmgyat z;4vS*D2(IcnK$VAZIGi@n)`Z8OKl9UZW}jI%k?S+8kJ{cU;~{D(_W3ySS=hY#^>x9 z@~lCG!0ao?Q~D38dlBYNvlB|j-0PKPPdNC(J6gvJXG#{ibmHa*Cqf(bn)(d0YnrCg z&6QLxr!4P~?m1Q}76#inNO(d$J#(u^fLhd2>^9l^J>UrZ2k{Vqo*=4T87VR#c^Y|e z3v?Da*24T+fUto{#UQ!)4q0G!RFE+m$#nv7(y^hUcIFRRQUJ^40Dk2I$Wl6TN-a?} zz|486trk@RabDp=a1n>|c-p&q4q5tdz~@}R(1Ycv{ay^vj5%aWV{-R?WPlBTuK-Z~r6mfo7M#TlmO>;H9I~`J91yaBvlKH0UfejvtTWNF>Z48E34)%mq?BVX8FF9{gEGE!6m?zswc79JrYjN z87xDc9rXdVcyko2P*Z6lWqYF`(Y7yx!}O3t5{&V39TVH={&~e-;&{KgPq|EUE%Kk2+TR(%;?xOyO_ z+HY<)Bzb4oO<-bN{b&tmuw>msNb+0TZ#lEY?eeR&PIC4E=IS65$;iN z^e-1hhbj6R$2*Yuyu+p%EXN#=5#6eD+k~4XHlO@@RnPEFN^V;@!C%B55#eB4NgWi^ zxw98kTG*#SuJOWm9yo?=GVdVdf@UC*XFkIVRA)Ji%A-~VmTlMyF+W`SLY;pOLEbSh zQ$lB7RVJy2-f8m`s8;}Y9{-HQZu;nMLMzO6uYOKflsKEQDeqr<=U{Y7t~=#osRULI zg-gyaBeWCntxGpBc~XZg)|N627j-RsXtPGKGb6TqG{rZD^y_i`kPidDnXN)BB&`5+ zJ^oVZ*v11!hkK8X3H7B2C%966_K+o?&ui7Ga8(w*RRrv$yu|pwr?g7G>eC7l$*O+F zO;aQLKyo}OW;C?kH}@>MTs7A;hP>&2^ZL<(^*{DM?0FW;HhM5x+}eieA~$f^MEK0= zjH9CA?3_q%Fwa}{-Yvw#T(gx?r~C@Sz8+g@#d|HKqGcAI-EtJ|f@u^hAK+@ zMjhfB?yd`zj+`TUHw8cpYIUQXl@oW?5mmBy3;u%=z@o>KD+Dl(q|4`G&%;(WbA-ok zzaDd!$kBVCoOdRzxNh;=Gmi;z+5MOr?K>M&29a)wI&w!&7-0j3){`9a$h{@W0DC*6 z{0^f|gl=%m;X`rU)x^o*0{P5@+t#_(YCc*4a{}k$x+@;H)-7UZYoRlQKL9292_W!| z=LDRLM*ogAkh-py7dJO8Y|rdG)w{oD&MGkQMEX*rI-UlXcjZpT{LWc5 zbd}wRYRKXfzE&Fu8Bw1JOcop7gGKV2tv+6OJr_TEt6=%DCUjBNclgH?YjF1RU++^(y*ow|w*O9vlJlaMdrC3X1{~OU|s0MJ6%*pZuI@ipBvg*u)5f|@kx0a=+R*H<Hj+xX&0LQ03GAd8%8s zuo;ixi=8@=JV<*8F9K5K>9Fyn=MgWXG1+w1rC#?c{RBc4_9(F7AJzNOe(s5xZLw1s zLCUuDN{aHJkgfgNwk&FYZRy^Jk9l@GU%@xb;6sW`V{k&~?Q^N$>UqHY2|>H@=wuW+ z>w}i*uMmUR3z1=px9W^okMrC4;Q=yzit;G%zE9Gi@Ce)&LjEZDg6EsdJ@Oe#uxzubQxtJX>(DyG9#V;dE`l9wkeVWCMQ;{{WfdA&#qy4~Mm1 z5GobkfE5hl=D&k!AvWq<54+EnHfoK?=olkwOHsi$Fb^3&l?4u2*e*3gcpOfF5}Yd{ zRjTIztLkVLDnJq#qm3tZ3j|ef42AS*VAOLC_WWcU29x==F81%~wEU#A5WVSQXkNO+ zuRDQuHIw=K98sLQuhdyrv(@LU@@T$3{eazcZA#FE?*+R`^2QdsNft`TxfJ6CbJ*`o z!D%k%DOpVff1C2Y_4pAHWOc#SNg(VTF*zXn9W=~>!mpDEQDs|awQ3Y2*DKfy=r=mO zWTq=Y!H99>=uVYZ2Ac?wQlT)0*yEKfW=pgh#1T6NutqPlm~lC8XE06B^9Yfl`9Wp* z0J73&>uo#rNZTlbzpm|S_pY4vL;WpLwwsf(X_*wp5%n^ z2s}fVs-`r}y+$b52b@V({@r#f#Y6Jvl{Q|U&w%Mh$25``4hE%oRDTEhW`m0nXA2Fc zzi>H{XNh?8m@uoc1WWk^d>~;*`MxA_D)6{&Du%kl-~_}u#{#)Dhx8Du+EwUO2g>jzN^fM!Tgb9UCtTT*jo!N!vh8d z{cINGs)(X9ERNolIqv}6d*Q}gnWb0p;Mf#4^ z#uwmYYE+bkj3ZjIB$WZ8wO3@vOTB$>9Sy)O`Vae$kV(J^vri+hk3d!;!oqn{iLj<* z8H0g$B2Jd63EqT`Sa(!F=I_AcbSV<39yVH1Z>Iif9oKbV0m|8%O#F+s`{o>3gKCYM zHjWMJy7jH|qG;SrTKkV(hb$s4Qi6`MIrVk!mdU!jS}EMg(KV$cN0&DBA%}l0c^IJx7QkU;y-23BbhT$lb3#BUv=2F#YX6w@zKF zNMgb?R|HtjLV?T^)|90-COWXi+u|JBe@_He{6S64&1z6#-5)4dqglgo(ks=0sdTTO z4X5;1LcbJIr;T`jOq~eMS$Bj^t;fb5j3^COz@( zesl{bI9XAUzyDOy3sSMi^51Pseg{UEsC`7cTP3e}+{&m-t^=m_Zj@tKRk}$_F8tzM zz4446#@sC&*QpZtzPPJ)OEatEwV6A7vEGnlE7Ly zp2a+28PnL8Wp+VCLdUpx%ZWJ`#%nfsqx&4&v z08h6^*rB5TyKSo*H%qox6Xr7h*R)mZi(0->h?<%DAQO1qXY46)C}oXjC|%)e@jVfn z=NxihlujIH@}!cyXKDcJ0%=OnI4e8b&68E&+vb zUn>Hw`S+kD>*s}i?ge}@#-(!Z2Iev4AyJ|U!e4gtN>4$I#0|DfigCR+kKf<;a_SX; zf{q5b-p4p0N5p1u@2?h-xSCaD35HhJLpv)%J6s-NZbDKdg1EoGAjYXgYD@;ixWk9q z#uokVS)c_XvNiy=WpgwvFyX)N_zL7Rs3<>$pZF?u7SHL^0wvu=*>G5BZ+~==QqyTx z^K@sWmF?L5V_Oga+oD_*)4M!~PA|Fd_Ki~qCJ*HnG8!DpnedhO0PJVIQ+y}sd=yAF z-H~KKy^9WT$P9-Y)mBzvrOK`u8D3{OqhsOfs<>mdbuxztC%@<%wN0OeqOKmY7`ttM zhdZb|@jP0^7tD4b$L!~US)BJb4xpJM ze5yz?pEi|G&x|nZW~6vbLT~5W}>~ z4p{un47HRPjIYMtf=(|geJ~OO)Oj|r2zPjb0*C`^C`K-f%pQ9hf6B{yqdtbb1o_ie z`F^;N)e8I+xG zgwzb9Qeff1KD9Cq(j@<^ZMvsCQ;x0_I|FO%dfQ-IQU|}g<{*&wXZnt9%8~;MEyzMU z00y}IvJt6fK6CZdz8m@hFGWhu(bf3m(1oJMh&n8-CRKySl0W@>L$nB$v zV12oelIqIx9xMp3X{vqO0{s8(|JVO$GGx$T0o{&BYk{5FW9{Tt>sQN)UFhZuvj|{M zrPd-GtXgQ-DFo(OOjOdbHqj1C?eEXfKWw$$p%2cgA=!yi~cTr=YIy~_c-E&AJN+rI!T0KX#MQ=JEeQ-{YDL))o z$K(!KYVlhN$9T2a{4}}64S5pt{NWp#TJaKNMicicJx;k^#l~}$4DTmL-T{iU9+`wxbM!e@=9lgf^2DD zt6xdcb#!ME#%hS0OHfoO1vnof`^dzZx!dQPtsSjJu-}pX46a_-sWFN>XvF>xbw4bP zrV}^QVY27u>}uqod;Muo5JBq7pUtti&2RurgLsuyNdP;x>NhdQ`xsO_tk%+6rqdq2 z7F95?kNFiS<)}BztjC=SxqDScsP7cZ=1&b#$W}IC8xy&

DQs#*dP-CheOsk143J z+*(Ez%u3oG+@d^n0NJ0UPn6<4;wSSZHc%rKjj@3}=o1KY;#y^@J&%|&Y}p3l$97S1lrnsI65KnLUQ1Blfg&a*HP*0u2X z_EipL8D6QVrvf`sauK$k`G+imS5VEkE2_MP1JW!Ya&O-G+5)y#xiL6ubg{(vNk$WYz(!NWV;SX+WOu zbV>O;q1QJ%z3KV6!55K|dGqX9sCD{JOqf{kMpg{pr8m(I8Z22}a2)*kw*js0YFR}- z3zT{Z+nkb&k96!`?9HfAuSj{h*55&Nxrq0vn%#pwAxP)c#;UOXhsC`S{tef`y>8&m z)xr;1etj8)jX;<>+;#Z9Nf_gth#BKIWPVN=#@xd&V;)=XBgfX5*h7}h$KAyM3_vrG zhb-gvk$|XWH?#x&klBE{P)w3(?sfC$?_fk{bs&%4Yu$O=!e6d}tyfQFAzY?u&>s(C z14wTh)t^^I7u*>e$$wLzb@_|Bz}Ff7i({23^ECDx8iZ~HNDuClDU~J$6@*{D&Knd%Vk?)A~&#?$5IYp8?QmqVRK#+Ax9{}^}exfl&(49UaC4u-M&`q*tbPsvUbbmySv z9?|6K^l~mdV4m7;X}0ru*Jpz%A5(jEi%F^v|;LV^{Ys!fykK+ z=NTtyDO22&xWB^-y2Byjr#62r{cM7c(qcR7R<=cPD{IBK zD7WErRvI&7nZ=}&iLRliPY>uFRe2l)d;YJjGiyj{2^MMT9Q6o;{{9+G@A4^o@%v!# zW&;$?chh%!Bx|jYf%1x&6ca9BPonWPwR9w{V06ki5hK$ORv6*|DJptq;vO<%Re^)O zh>uON1a0@+gmw(3$Lz&(&rnX!)GEy=G>iyn`8W+}L!W<~MgFiC2)(8blDjp3^ydrL z`=DXa<8VDn6A~#NqUaST8SVG^a<3dvE0v&{%b7O=Tany|0Fpps;8oaqX6SQV{A)x< zAFpcVrvZBHqZ6QD*Ey1jSz`Wcn^$p)x{D&2{WfMQ8KLrX zO#ytFaED>kRc<*vuKt$8Pw|!=Vguhdt0i<8X`T;O?Wu?r_!k=izR{&-6YxC(BZ@#%)@joezC-QIS zQg_IUeNtH6nXM!AC;bVYg{g0(QlR9^h-LM8J4^!h+>Ad;z^6gAN6KAvpm467lXZgg z&qeBySc-8;>?{LksZ(Zb&*R{GZ+UCqf+UwOkeWDTT!WR%G;*iW&4}fnQ-6nWof!K=RLlCbBqGRFcOEoU7&tzvimRMFNqL_o{idwo z-jly7@8Yiow6``ekH8e-{59{5npC5AF8taU$?5{pW1j@vby{D0;W)j5>=X{edk`e? z+X1HA83FHUk1Ocn(2=))kX-%y3e<0=TQ*zUOzLywM(JnNKKu`ug(Abe$l46zSl$99 zzS)PXv`5#4NVZNh9z|2aHX%+>fF!IpCskA1Zz_zw{*syUP1yyc9J*H3j^01vUpYn2 z@8$|w;TS;5ctIk&S&uQ>;%40}9nF#sX#Mo_%KU)vGy`lQkxl_pgvh0OJej8q;6OSo z7Cexrk@IO3V`hCho_Zh7-<7Ms`)U9Z$z^zuvIkTW#|~LyYEutchS_BpH&Src7(gKW z6S-|%3ZWfQJ!Hw?CUhFk*`5ZhwR^18D;n=I2OE)}s06Y$#XrqQ;t#c=8G7l75CLim zDY5Zn6*w~#_i(xfvf1Agw8}>8jsOYJHAvsB;&+T{Vx;a{eAkv11FKe(|1d>cjFizY z-+@0dGVH({jIUrpA7{e8mQQ)+w2b=Lk?1;VYx`6%0&ZcdA|H`wESH!6zHP|vHH{O94M_nrUvg(T0uX~vy48;yyp`>-SX)rwr|t+`!jFQo4)zC z^W$QHkYG}8sPMQgNGT1MRL1WU<{bBWM|CrCdskwx!64F6b|GdYeHA^%G4mId_qrO? zgl2Ef%Y?rNj~8Vh>-3xu{Bl6zh$e-q=>5Gtb7EnY24jj*IF#hByf;_JRVZq-C%k5?x;*!k;84e#^p>mpoPi<2}YP(d2`Ohq$@w$ zi~Sn29p<9CCOWp2Wz#qNL*FwsI3!v(JkZ@ubF1&B$e7ja=DlX0-Ct>8H2scFhCeUIzNGS z&?+?cUzrN71GK|lK(p1R1+-V+f5`GE9;Y<~WM+8)-oVZym(_4U)Am2E2tQ=uVzw6q zxH`+zX6{F0|D4!59g9A&TZ3^3y4Nl7cJ%$&%%PuKEK4U;MDO?g!Fp+Z(9FMTuRoU{ zwI!WQXR5ahZsLnw>a-uvLK~%&OjAbYh(nRC6~+pB(&tUjhCDTi}v)Fe^R??dA||6tZyU*tRBGx8yB zF+Ms0FvW3*$C<*#R7afw&b!*wA&Xjp|5w+Zx|xeYDZP<+jAi%9a`8+BUXr}RR}5ui zdziLGjv-yf)YW_k+H6IV`jnKNXQ2&L+16BS$c|XNsjL49Te`uSNLY#=t|$QGXsj5O z;Vr+n*N`Y$S?RvH?jHkRMN@9Ps<=LRig;o5xaMv=rVlB z@)%{o_=&h9`kZ8TK(K@E$B5lPo*YH8qsY~ykHApdlr zn@d|BzT!((KCSIg5AM_YmAr9*p-^F!>2nHOBaw&7%FyT-Y1#`bn>aTK_uhs{U9*H9*fIxAj1D{QDc~9NCmI%T(M6 zn8|*ue0pRxMb| zOBf#~s?LnW#6{j)IKaNtFyk5cZh1ewfB-L`Z3eu_)sk&n&?~_%Yu*H7WBR&lQzptm z0EZ5YflNeU#CT=%f#WV_WKO=`?>B{wcG>xI zIK@oP$_ai7V2}RdSQg-2Bbq@u015c2-U}4^S3;ZzN{Dp;b&KYa!kM)$_}!0$f5PDZ zSn6_Pr6mCsGi3KyfchCE4o`#vdKCLsL$WcQn_1@x<)S|=es#N`eYD(!`>oqniv!^wfxbg7F_cueB8qtmfYf0 zcuc@93YXINN{Y6cUAUt)<>fsxs}Nsft9Nl(ox8fK0UFyc%~E(sCt5zzwKL#Gp_ddr z2aI)hB8u<50EhAk^~1I>Q8zY7FT6y37*>%I#`jN1>XR1R?wwk!!COLsI4;SX^D@U4eRro--L+ebreF=YQ{GfSttwpK?=w@Mabu- zi<%y)eIL4n{6kF<*31;;9hQ=KB)jWX0+WER1_aPdkqk_83Q!mseDcTy`{V0m*a#ddW1w-_V!OJLb906Fe7%s|$crny2$ zAo1-LquGN?jQ6+)0TF%k$ST;CzP33*vqqa&g?SnoOKh~fJyOHBkdvld({bCL0nynCbZMDkGoUX{SWUU$ zd3qdGl8mQ9uK)-lJoWXy(6ymmhIp^{1k6I+iJe;W+Ypq`vp+SAWNIyhGJM7lS(bU~0()TF=Ks2VFa1#rPJ%xTfH7@| z--j$10W{-irOYS?Qwte|T$ce3RB94X`px_5Giw2Dn5K0Opxoj|?vY_sO+~JeOH3Ux z;4j_ln*+{i1||(4Ge4IfvK-x%heO!Uu|_Iet@$EzUiiijEq}Pq=FeSJw6c@(%Vx>t zKVF#!Di=+cPNhBeNw&4t8#jN*kDk$W;cH>+b|U$ANIp;Jgi?2-^$I8{ub%nZ}8&^jsDO?^vb$qzbLXc7oh}3k=W7Tma`N_{CEEQujRYR@NI$aVf#Pl zHFjhz%yMJL9CgxnG09-|<=YhW>{8Hf+kgs|nt@LWO;;0?<7#?{No*6RapK&*SN~eX z>ALKKvsBXeBHGV?C@J98TDp$6gl4asb&%yLT<~m0%uVJspExz;g|<)Acl()*4+<_(jnu-5Yzs%fk4rLct_$C2To06v{MoQ#(0nN$ETMBEg-Iq1w06I> zs?OL%;t1~71rYHZ?Cww^5629%*4V5pV3D5E=A~f{rJOWnUK>Vb>-NQgJZ0o-0>-=v zOg74^m`Q_pvDfpD_$<$`NB0B`6UNcS3e87I&i*Q_O)a#?jg$Nn0l!w=(Nh}SS3^|2 zn4(8@kXSacxHgJ)Z5COfI%bL-Ml4Q0Tf&h&?uQw%yGQ>635KIzIsmep;)Eu)wyZ%@ z$6Eg01376>vqAmhopex$dxY8Y=5AolYR#SJ|Ix!9y7Xr%cn1NaL}ySuP18!UV7h}ZiQ~lsh=!Rm8srWT%MjmbuWeH5UXQddhaXjk2XTeSX;`8N;36Zp%Hha zWVAjzZ8=Nov`j>N(+$1CN#96r`h1+|jrh{}x9MBFwY$cAQboRF1^*@{Ajh&QW_8=U zGO?SaRP+jxD6dl+QF8<;{WIq=vXt7k=d?FKdMjC3k0N0n0)D*_+-I2&ViU6=6sDNV}@M ziWGt5CGE=$%ND&!o++~q!<)Py)A3m`u` zI}u7c{ziI7M3bEyvQZD9UoJS$0%|~nx78d?fC6H2%S7>8Y`5ULRn-O-TIbwfs8S9h zLYYV5O)mM1{VvW@(l)m(%v*ak1U!xO9)iAMa&SP~r743EPxqf|Vf@V~0IhGR9I}KT zyDcHpJO2euU9igZG<#mBnJl(tP%6A81(CokM=-9e|{N@@9bnW3oncpfH`E5=|WPIxYF7Y$B;> zxlgo5y|_(Kd(ZJe{ORaTzWWOxBn; z{4u*=G$RNr!A#2DJO%6I$a;U1(|wJQ4nu zkHFDW^YcJBe+wnQIdkcFMM;i~>Bf#O>@ykD)MdRijaiSLP8M#Ey^FqEB?y6IE0ip; zt;4VjqBhiO+u z!2Qi#hrQjY){X8PMosnc3Y=BhH&i9yZFafvtinlq^a}X;pa-wa&;Bxj@AqU<;r`jF zUvi-WoIIY(4JmuyReAR4Id}U8(HG}OHEMyONS;UkRZG`W9s?*O8u6(V=pB<97b z`!ihhZ{3X`Dzyp_GGD=b$y+Q&&dovA=IGITd<5bx*xpLu8``CM2aR`)r7;Y+L*xOCawzAb-n~$^uX{H{?&c9Ob3;_)}qI z0;APhA4t{4Ej-)f@<4`e_ZkJZPhaBR4_!cOW0o-4i)S7MCS@_%;OGDEqq6_o`0W38 zYvORFs(k6`s){d7%F@N^*Y=E9ub>(Y?&uv`cNx1j3i^a*3k1>COCHi1O|nk?9Zb44 z4cfoV7g%8E5qrqO?m`A(v5?9^>`OT{^yG+48!9VW0LTP^00&}Uqfe?J8!IKwo_GhF_r?OVB)g!bV$+i3#sY`%9ob9(!JqekWg?mj|y2z5ovL+Kz>! zMQ(qa)xfGIlzwhM9Z9+m%C`QMu9oRjk*9eZHkVK%fecnBfz9&#baLEMSBK0Z(+|9j z-exq)FbHa#SvyB_bzvEIl1d=Aw6i<{+-R;2zsLfr+HDTu70;J{RYBc;aWe}Fd)j7CLP>higkJDss_dcS_k-((9CE4Gu?~; zGhip?g&nZtYAM~oiBTagF>wXRUBf1zH6;H92pSj$0=*cZeirCEq8R?6^E`W8bnY#t zW^?T!%L@QY_7Vvlga2b~=*L4~|5h{6ISBv}(>lhrMwMH_3n5!cvobWcapdw4<|p0` z6aog75wku8O8C?dx_H#GX^@pPF34h|e|ouRg(&A{D?5u-@*eEBptqHM!kP67AgX-c z8tlE13`u}2M{)_?MNO_<+_sPzA#Byyy?Tfu|2FUsTCq5oaM1hn@TPmS-bY)))7lBD z*Fp0A%e;o2;u^9fnD-v|@5>LROHK~FnGK;!Ixp>Ia}ztY`_ zjmo;>cf?9P&j)2hn3r|*%h*htpD&weXn(tB?f5YoD|^RXLO4gfz2W$|fpgH(QuOoc zkkKJNY3WyPg077j$-_TRumA#_yorWs;_$ufp3JlaJL(}z;4xmeip`jSOgZqT_)M)`& z&?u5F>=%oni;i}s4!LZ6`QYT#8-Fj|W-XDI;T`n{{T>0ZVZ!miO@i%%sJDSwhkfSe zTPU3m7I-K&A(2P5B5$IyyM7nfE$}KDf+f1jMrxG&MhTWep+5rwh_&sSavG>zfbg^Y zS)8!({*XnC56IN}z}|@A?__*)nd=V(`$(Ibh?i}}oMP^NYE9pHY00&b@vA$N*^{)p z-K;0EEam*t8od4KysSE%{Vpijv*XzTtN>{8X8dp?gicf&!Ke>sN`bQW_I8~mFu5S= zgPuvrAWxl!D=1pzKa9CI=Ak!N((GP932Q9s1;{4X5$>#f6zi^}O4c{B6?a z-^aFG%Nf!SR_ygy{F-2}N9)ZO(~F3Es&J{d0Mv%I_u(SP5>YJ_C#(R;yn(DcX;Bde z&uL_DT2wg3s+8*PwsZ8Mit9bh2}T-@O`E9Hyq2Zzx?iob{%W><@xigLfB8Uy&iWD2 zb;pI|-Y*4$dR?&Ug(ePuwlZ$nRytqm1Ov2+{s6@j8Iy;cPUSBsaTGe)OYgm#ZtwI~ zd5Q9&)!I;O)f(B3)43oVxA@hSqBf|QYtcKQ9%rfHRnuRwvbTeg91}12)bwjr&s8_& zuf^ZLGPVD8=e}eEBsKSJJr1~yAH0EcR5u5s?g5oq&peR6)}|<8NP2`2kSQ?cE{rpp z2T`KHUQtD=0-vz(YNa_-{T|X7Ael?%#c!nH(#%Wd=Zd8qklWlq3@rriaVk4CkI4=U zCkZEf#IM!E7<@4CmH*?n9U#$v`eTZREO3r_}f3$Xv+(}UqA*Wty;^MqAuzOjLZ5|gxSUOkU zb3PFAp5P3%zE2zM){o`*Fv}n%>@7QPhiE9-Xu@Q^8H==QbM^_#bT9=T2>bn~B`W`dP+jPsS;HK(3E% zD=`Z536=7Vn(EWiSBV@())OrePX@8(+14rw4T^|_({g9ds~bIs_T9csKViuTQht#H zYfLt7P>?*GS!?UnJRTA+`I{HGzfLj>mM#&>U~~y)yruWcMlPu-ApWo{Ag@#T0`hRwJ=$*KB+sb zP}yxx3J$Ak{jOINGoN#RnC~;k?y+M;OlE2NAqxkb%#SOD;0EX*ciU&%W5P;1yJy=0 zUW5e`17897cxa>1wogeTlVbqv&vn+J6OpMb*Yc$uT+}AU*nvGv)-!N*!)PE+G;8>( ztKo?P==;%wWkskI-J5ht7rLv$t@GN(W_-FsRHeQ- zh{+0*g`1WA#plBuy-|ynliebn-HatK$(9{a+;2)^X2l=m2!DUQUHO{OwSfhihTuij zFC_{Lk{~;B67wZzLE9QW>(*g-)4hd$t8Z;^BE&i65?9C{l{p~?WSHLwRpJWJuvy{y z#=gwt2gnvxB8Cy{gxqx}+_wZZzz%NUcn(>97hsrCX7v@sjO8xkAxm>;F1_0iIKV&* zZL{h*WLZCPiTM=@yKM|S&F4AfKw=ccc$Wsiyw7Wk;-pF>&?Zvhf`3BJ!#@E`I9Ywe zDzp(<0;^{PPAyeDDK`c3!KoMmz9$uAMw!GlGm<!TPfZ zB?PW)+Ymv1%%_uVVG$Q+S|vl=0JSgm*>6WGesy*8_ILq&j!jtH+AwvETmf`_j}iTu zwLo3nXRtiwBWpl%&{X}G8-5-lBrDY@mbIT|16}@AGvOms}3Lpv!j}I zMynFvU7`CCl79k49?;>!eEWE63um!fAsfAwe%f~`7^~_%!*$-l zZz9ME+rMd39j?M5e3FGG_=3g{fGTnn1Zu&I$Ec$&KoHp!)$QxtBIV9cEka$1z zbojS$<^9VieMtHyf}<(onO|~*w08BNi7cg|NbC}n!segoU5)7j<}k2l(U>H zXK`!uc+3e9^~R9GdI0g2dE^^}21)$1LOu1GN*8t?cCA}Hh*pQ5M#WDsrdj@;QAW+R zG!9WJNRLfOM^Bnxe0k!lOP$Htm$FLS9p_e?ab|iZP zJ);G2_*Ha1GGYHEMj>M&VXA0paGZXZLYM=6+*hJ2<##!~>8jS^L;5;h-TKzeLW=ijZDA5_uZF<2dJ z&^E{r2we?;87fbOC?)rusly(1e!yoRi8G~6~D~5i;$x#%?v^DsB%I-;9 z&UJ6jMmE%-AMil8x2zIrKJdFqSt+9AtR?SJaG|6C%RMOI-*KqaTCKH$1U1Ckfe6x@yfuS*+X+t=v8nZcMq zb`87!mnGtS5T@GFk;6wp zj2l%Lw*L^f{4bXzHUj5#j*EGU89Fe7oY(mLuhXW#Xa*ePuLrJaVK* z8m-RPh?A?E5>le^;(bq^+O!VS zUjf*ou<5|llpeYY@c5Ku1U}((@~SV;(SBw=p8))>SD2mvczrpDlkN))Rt>BPs8Ko1 z?}P4q0(HVDXTyfM^t1z!-;GmD!wbZb+sxzyO8)}PJ+8Y~*6(cBEe~OR=F3$8g1s-a z->)2|^pl%NEp$<&V3|)^Y(QpIc&2K%K&&XVrPCht4s$M#KbTIyV(&StBHO4Z#fX?HKo&*;pK2q8&gwZuS!(uOEM3`dzXrSt z)!D9%&~ef85!AVstU|h_37NwSYcVIh!CPWkoPn3Pj53EE+B)bL-)bMSjP(|gE^S<$ zgHoWtb3C*3G?W2_O=NNvD@yv@!UvV8zA2*kj;4`yr|IYGKVlptHkWmygudQrc>OD( z&4dmh1T&MQevHce7*gTw6!Im&Hp;|<_U7IK563b-L3@a7b0Kvzf;S<%a+X``5I{M# z-N3{;BX`-S@vmhLq?q@C_+Hz>41w2W0cocly|)UX>VreF=%0WjLl{A>+*pR#!Vd1C zfka5qLNP?+6KQ5Z#BcCvVb(kZstXd3uKv##=mACVKBEp0>ApW?xwFpzvd_4EG?3bM zTRPA%gdvb&FA&8T2q5ol_z_)3hNvnEa|s_rzs#5$gh--|l~`BnYnNs*^lw@3A#00( zr~^)DQw*R}tx}!*;a9^JM-7v1vKo3`38I{pnBPvanqvK&LGRDT?c1!&h2a_mf(z)S zE08LSef$_&JEmo>bf@}DLXszTIpD!*(9UBR7?=(QDU0Jvm+H`5h{wbq*S1XiQ(t<& zt47?B&cm5em3Wb3c|Ypd$up!MPirY%=9)(kh!hzz`d3Y9gZq&Km9 zFyM{f^Y56SN;v=R1K+PNIrGjYmAl6nMaF3B)R2y~n=UshGbUH2HqG$Y)wyQu!#cAo zH%_T(?;1Hy`4?NgIoSWtCP_c-XqQk%I$gCVJUD4lz)Qz3PqMXzD1uZZxr{ad(&}c| z-lPoU+~vnKd4v)4BZNm%-n`tdPx|W!Y=du%#TXmA~C+hk>~Jc)2dP}F?+AQ)^+{bB{}FD%q|%YQO3#_UFK|6V3`}>j|}}v^y*T!XW}W& zf&QUSC0U!0B@5=`6`E6YcjskG?)M-kUU}m8y7kn4>Rtbq24n*wtKno=eefJ&O}+`k z(}N}?n@+yHYj^cwspa>6mb{|C30ZN*Je5wlsPa0RVI7CLxSV4)3q^()UAUS zJ&`wzVQv_S4ru7Dd#OIZ7niRyk%Z#6fo7yhSQx-WqhKaD1?(P?o}(8`Yd<#d$M|-< zgZ&HCK*WW;a+Tu}fCGvhe>bzUrh8Uhj2H^76U3NxN}N=>$=8WzvDPN>mC2P1{6)ztNltY0Ffd69h0BCXQoxx$|4AN(}m@_?J1KU(>;_;>zn6cR&{s^Xt z;R%&U4nD^G0_uQKy30o#7oBCUQ-@ZD20JqG9Ntu&UQ64 zP$4HaE7puDcJfePC-CO>3nT(-g0uBmXm3?dszvoQ3ggS@P7t|3V_PKwbRO+paJn_) z+8D%-Wfn7~5eHCuG0}8eEBxo+&r!`6WbB{yq*rKzx-55&4Fb~;Wtk9Ni!Z%Ef0u^! ztye?h>8eg`0O{8~A{CYa)z@Wm1ayv+>t-Ul)yhd1YSBW>{rye3N|7#cUpDC0T25jy zJprjW8U?}6a7LISM!&3)?RqSQXd38JXwZsN4t|AXd);S`9c(sD(c_)&UQJtEQ^})0 z^DC)eK??LWq${PXGJbFi{JdKv#hpDir@ACnM=bx_^1L_(5^Xif|I-@@HOB)FD4q!m zbXZUW@D&-|F&%6gf`{1+r$>Z;Y@4zun^EC`r>%-3g}Wqb8DT1`5T4! zlTIYV)+32cDAUYuXoYi+q&x>+%TZAC+lxHxC;GAUXgVIUZ-%&gM&MP;@tc9)c zE%`_0D%Y#1sqEuwdNZYw{Xf#GrS>(`t}S_`43TpO4GS?EZ5PkGo{W#1*X=Cmn0_#q z;O$z^D#`Ov8#3v+GEuwujTxLrLqgtTydy=`?{V`#&ho!g*oSkvpV`hj%^#qKW57S9 zze-;LDl(c+7HdoNOvcmxpK9L6+fhF`(=`KB8a|P3`7N*^Ce|DDp36ISTLKYBvLC9h zKkZ_mxMjQCs%26KAgqu2@b_7|X_o%F9a-Pg6zm+i47S`K#P)681cxFMN-D8E7z$`O z^q%L+z54gz$1s!LC2hKEmO4i@N&y4q;yJvXvQ#&c*iCvIcFzzIq9Z~PY%yh_(c^x8 z{0ysKfrECBUGo1Ad7(hHT?Os4C0@stXty?1W@=3!4`jpm4;Deb;T^G;s87v^_L2x} z5vmCO7^W}-Q|A*^&}xusPZHOe?Y z0;Vx{#*p?*_?+}!ZH3xU#uS;WxNusghyU`*N6eX0cQ#ys!WpISV`zJNIkF#KhGcJK6WRJN7jR zP_FTlZ<_Nc(hY=kj(7HI<(8&8UbT!gYw(o|Yo*(G#f6`mT=(1BpTT5zt$Ih+u-Rx% zl#4wnFJ&IKthLgod>?h}?bXRK(i|OLs==Ni5Lu{a5LrjhKx;s5EEz5^9^D%fTEjKn z{Gw==CPyjRTYIE%NmnF^gy=Z~W5EuWu4Q6bGx+$=-kUsH{poAYAkN}LZ}-zd>M~fBqEBqU%Yd7z zy9?1k%8jrT<7fIJ+&SY}U=eWWh-*+5vMcb-Y`!gSXn3WZNLkXnQ16` zGLy0uw;UC_I>eqLedla6ECXC{l^|FkyV-hvz_-qhH7 zCpF5CHHg+y^jQ0e>73C0v2fy8OE8ggHT=F_+*qaJ%N1uH#{L~mjd~9lTbj*WO9YbX zkq*8e90eRVzVkJ%qX70EA@`tadYTAkk0{}d&uL!90F z0@fCRa%uqqi@aH3WoOZLFa0H$Bx_^TZl}F_Rt+ylF?HA{tmnoDG-etp<5XZ=Sar&A zm=KyQs!aI4x`Iyst=PG_<(G20bfaakQIsI#E>RxCeb`iPR&$u=h0BetCyl(WHTS%o z#N(d|+p?eE9VuDUUz_Xr52_DB29FA|f<;8SE#DQ5j0H|9@hb6NRPO!7%=|(U=ngWg zIQoWVRyFdFrn}N+)A@~&T1pZ2yLsXw_cV?!O1ihp-{{jPiAVlCn?mtlc{a=i^-Q(T zL_ZFy&Z#p`0@(k?kw*?vUs@LL#m2Ife3grKm<8KqMmHk*)ZG=^CQgUSgr4$e+)zu_ ze`-|s-Vw=^-N0vIr&|W0;XZl^RGD>kGQ8`><5@b?42L5#z|Wp9%oost=Y<&Zjs@p^ z|5Q&5c`##~2QFm(_tudwBUOU%7ZrC%c@8L(;sv#6xtz`GU;9dBhfNjBnP|Af-G*6eE zbB*C;_>oTg?8>r1Y_2Qz+8Hu_8_9vA2r`W?(boL0cVz_)aVEU&<{72XMS=h5qJ}Sk zT0#bpzpSt{Log-!fhW)m?!XzBnu=QWuM5Gw`<`5BlyNF3booEwpv4>|Ag4c1iBHIc z3r4U%a}{GV9(Rjhs>;TCqi(fwVE0~P?o*6hIWBtNVNPSZ%aJZZ96yBiwg{f55VEqd zM}@ZUIy+HsCOl?y3Bz3_B7+-F&dHIEdZZZOR{Sgq%+jHyG|f5c5Y3DSA_HvHWxXC{ zF#AXjUAWuT{ApWDUZk7CgD{hsci@j~%iY$iH!YQxPJm!mEAc7J`syu=bHcW%8$o<;(DD%ep^~;XQi2(@Bq-n)BK=fEDM-ngs}IrzX0HPsYwv zEbS~Snu9lilqH(3yK*BSf$;B&Dw3^vN*edHO>(B&>>!cTU{+bjf;~TYrfYteV?kcL zqTApvLlw?L7XNoIE)C+w6fJ_gCOWmEC{)Lyd$FbJZ>;PLN{@J*%*H%Rj;MBP8#BIp z^G6X%0}Y)XI+jPu0ItOCwpxjhX2-0KT$mABSN?%v?{z}j>*0*l=2}imzXaF)>#!U} zcT3@Yahb&Fm=?AaN3recwyc@JUlmda;VeNfll=IIGYDkzs)=~dc}|bzK%w)h3%rbz z$EDd!+=Sn z(GGB36aom;C%cLhXR}dz>={x6xdOSjBdFB>MYEzM`Mi*4YYL=8#XowMsuM((>;9lC2d@~2HCT~ zuiBT4aVKOWY}F-D${~1A!K|HupZoS&cZ|z!r+R-xFL)80?qhY|fSvZX+I2cM79&3cC98IeN1%KnjSyTU4kPs&w&jCD&UyA}N>00Q!0>b;k4uYSqP3})xW z0)NE9$o}8&EZJEtD^v71V*QSYW-Rlo>c(&{#oZ25A=2a0E57#$@o!w?Becz^4GFnK zVMDwNW-7X=VCRDQgZR}4FC|ct{=1>4$foGouhgB*8Q~yGdG-wY1Y2$WNDpNt5UmcA zvEH7{pz%-SE36D=rhDbOn4N&A(X>BH;GOAI_jt0|qfdi%IaC2|l1Q2C;{V4(Rs?v+ zME_dI^a=-h)vRO61zY7{H?Y}%PI}v@53330kQ9dq?zM%<0ovYu#IiAxx*Iu{*-q2 zr1`e^!^x}gj)cNyWlZ3#olply2wsSZ#iL1y=hwmoY^HsYoKf?iNGjoLNXG2&^PjWE zlG3Wt?6MVR;Ifre**E$Et>PtRp{WU(1_ayY*nME(j2_(P=x{CBnUDTN-;!m&DL+N? zmdh+FQ&JyFh*6uiv)7Mee6JqxBZ7|=CH4IS7v zD0}+KN>an5UZwYZLT93D%P{=DWe5=7NHeFwr{CJ>DPP)3C~m%m9(~0VSD*UZD_BE+3t}0Lv?f?ci7qE;xRKr z+16n46y10?0M2Xx>yNx~vI^~U>jmUV^Ss=2+kaQ#4*Oe!S{OI>vH&K7l|#jlo7s6A zc$+^6UzaSm@Vv$F-Ffq$_G1^{^=6ImjqWwOcWe85ppt?UjqSb8_2SiCe`A4>VOUBP z#rf#m1!_4R?cB92G=Z#cDtoE!_5>Anu%xS8!);m%P?x1_a-i<*9J()gQQ6!21`&0u zhi&&6-BG!|MZ2F1I~8+`u9(u6WkL2XB|9v9tv~Orp4NVnTGK3>U|*^LSo=WH@1v^l5S%2msq*I_>>a=>;{Cz37&!F>Vp0sdfVVR&Pu=#tlK7_u4SrbYiJ&@1R z%AeyQ4K$1GkH-HofP8K87*;(8&>6+_w$ zz|w(gwql?;r#PmYPd|P8N+mNRrs(#R|H(Q#uV6qqG|pRknXmNc9>q$1ro?cGlNUe} zzyci6ZR=iP>k&;x&W@+&i5WLvQ!QkBF!Dr~Q?IFGM^Qt7Pmb1ely=^D$i}%)_QTgV zFFY6S@o>3LA&l1xb9Sp+tInGI@y&I|E$3&{Wm8vmQ-X)??j|GCE5HA1tEK*c2>~jv z?zXDY5I9>;-jYHqb=f&qSaZZW3u3zp!j3h-5`Dt=Js z*fUM+8k%RV>UJ9`UOH2E+VV21VM;})cj=pG4Cg;`2?2_}#1Pz@J&84^Q!xr>B5jq~)fW=JD_vm58P;Y`!bDF>I)J zGp32q){4}%^f*jaL!^(4qIjYYh>u}!W@Odv9Qo5*vmQym5V}6`!9Fdv4?V*Kblchm z%%Uh&7DcWW`cTZCUbH6Zg*+!5DLIZ_5fS}|y~0t&bHm>@!xE?Ofi$6P{?t<;&qrj`EIOBC@R(8fHduPol8c*=99 zK__*oQ$ymcHuKYg<_Jc&h>z~R{Yx3%9@XXK8H{{&4VHkGSaS$Kwr5fc2%d#r2JdOE za{7gF`LaQ9#qu?)EA#*tmy8mxZwzj8Ykea{Un{;^O26y(#WX|XhT%pURr|G0E#oz} zQgQl%T7!gtNmA4Y2uIGb(Sj1)>pM7dTOFcd9wT80@eSCN_SuC_5uGvfvw$%Q|(7f>ZE=Xtd}4VKh%RiVI4t%Q)WK0cvkbe~Iw_uVZvx26RSMPyoG4nts8 zbfiUS)TD9T*^8jQchBx6ppUEKT;Y+xx;~UW*#lD%rj z7&8CQ7jm*kkv4G}H)N&5L9?A}PgaZknQ5vK<_CwsdG*0uxK$ci+pU%YjoVKe@ckEx<9!0e|-x8b81+*p6{WKXg4lBbo*KGE4+R23g@$^ywk0QkL~-SA}1&SFza zN8cSbI=P1oFA0m1ob=W-E%_}Ht$d^P2QaGRo$>IRF1nzHjg)wA>7lMt-KTph;n57g zlpn}YjW9~Ejfx!;=#oT8L;5;iHak1&%oQw&6^nORGe)*L`S==Ni8VS@L6ib40QpJZ zenajsA;)p`K>K_XZdGj|k{>`ZAl@k#t>}ByCpaIWkF6-^TO$Z`f+?{|Y*`))ZW3=8 z4lh5Gh)4cIqeR|%jh$1`b!-5ATHIT`$rl$r;^tPDcPitsWtcLVr<7)?A-wdG4_MP# zz}8yt^AG?PulH}`{ zI{3@KB#dG$kEf|Q-+cda5Ki6rF#c=KoQWHv9W-pX9pJfYY;W2;aB6=(F_w`!v>Tvk zxjqpi0W#C6IXhGS`<4MmKY+G^aEy4iv1Z>QY)Cgd@6TY|^YPWYrQQk`O4gSV92Ybi zh?N`lLbHRuaCXC#Cgs|r{E)1V9lF0q-m@0$BjIZqur+*Ehm&6kf>2%d5(RwvQdEgMia0w&O9Tw8g_ z_rLcc!|*@;8;bWy{_C3RwRa>;JU@_GaKIp+Y+RG#Q?Smp)d|1*xg?=c-fVdJH86-I zfzoGyCHlG6h%&t(lfre#yg_1nFp`=5=X(Os!l*I2?tTe6g>Ye=8Cik5Dx%aU1h|%1`9C=AZ#~Q z@L|V^bZ5?ZLGaubF-(1iNU8t`tQ;m`*DcXHeNbx8Hs;KbyW8_OlG|WcpKnqwFu40# zm~It9-CU%G-DgI5fL4%8&$Dd!SG=MP_2MU{FvFR-7bF27B$glTZGfFZF`k-lW)F!w$v;iCDqwUtywJo=kuySgf$^5lyi>zo?L_q_gRRLYL z%z~dSFf*ZLaJ8nP@i?-to;M8iDY_bazp+tE6<-M+$e}aW*#>vaC9qZn+tcouPoeE$ zk`Z!4PwgI2dki42SjC{}K zUu3sjoPQ^zW@B~EA@_Xj*J=cB>~i_KIp1TkwrJ3;$Mtt5I=7$mw3p0vtZ$&pGbm%}9DC>nymUc@7zW@-mI0i>s*DrOIW^ttjR6Lh{J9 zOJ+vtPW4&V@Y1QgAPwM9PtgkqW^C8R$R!~wieNBTnm0lI^P5->9Ou;dL!dL!( zM>^7-j&`j?a9s0%l5J1RbE4_~AAYOXW4U2lQ_~(7xtv`BC^aTY$p~ zoFAr%eYh?da#fxQNPJ0`wuz5Y2XXxSNv=v2>$)~WPfL|FCAa-%QsAR)fDsqa%Uk#( z2$Tj$2$Oa`eV(^UNAHzdS>jR7LKbSWeWD{VL=ZxeNg3!{}9&^Tj9 z&TeV{oyPF&{+2PqL#;)y zfbaOw!E|Iz11i_&-Yany-7~!hD2+T_cc3yl(gl3c(Nt+AD$Yabg1Ld6%S;srXA!e~ zt$40&&%rQ8Y)R4KVirpbzuG}K3X=YUmBf73=djs!L4!FCzda||o5XOyM>y_RFVrJt zpS99VMGCzAY7&qr+g{+rOj?J$Xs63OFBeFvLF=gD%0=+BqDC52<=*E{Ye(n(E@1wm`-X?VfLkd^3KIK4=qJo>;JyY z|6|$fzy|?!z7R_A3&&kgHs@E>lgLs9LW=JMKm7yiOT^tfzO(ob!dFx+ujbYHWtU>q z1lvc2x}VC4$J@2Q5=WD4fqB1>XHT-5sDm2K@*6PFjw??>qnY87{q)aKvLMhS(PAb@ z#f{1mE$srnm~7`m@jUhEB4!7#aomV}I1o|@>hR&WSXPIMy|1_0;JnLJ>hbG;I zI8BqiFC2+JiWWiLeM}+2k0=IJuToLZDm&is1gADd)P4dMxkc~)`t|6hpfCZ9#`o1! z2*cveJ;k-5{9AV}V<{TAK0agd){|>800A8POMqj)h4v-{01l8GYa}N}WX3%YPO?nd zNi&@2`N{8dVLYAed!c)&4s#s?CXEgVe#l>S;@K!G@B~Tz>r{Y z&0~x6O%_r5r;lPat*U}TnC_=Yd{FqG63NNWxoh;PCgsIAXw5LUhHH3Q_PD=%^uj_* zBTyb1GyRn;U;iKeVP|5AG#*c#MY!pOd@QsOi#9Ow+!;FHN4eC9YZY#HcNs=p?5q)e1D>J{bDd8Dcg8|~_ z>*IgKga0fmg&QsuSH=Oh>>y2psVk0$wUIz3DpMxbCT4cI>m~FQaTlBDrP0DFih|8? z?01tvO$|m?s%*O2utu4T)oj9s%}esjkUH}~VcBm#dmvTflYbq-t~h5Hur5A#tj)wI-Igmo;HAE; z(#(MmxJ=o17AI-s} zIG)hT0+cul-|Y~b#&fUCZoPY^muT2!WF$EtfJYX5KZ&{zgbUq*vtZrL3Gp!RbN?n>&uipzLCf@$1Q`G7@X|%`;`&kD>G~-eBRn0Bc^n+24r1M7g zrMxB1v7$tst_g%uw-TKrTuuDEB~^9Ixyoi#)W8ZTN#S`IM4z}k>x7YoT@}}bfN(7u zx$Gu$Mnbjmsn;EqQ?XuHD4DuKR1!A0J|KZf^8F=-=%ynX-IC^?6II zTu>O$<=s(AEz&DFF0pL_(yO}2lVlZn!pgLCa?=~q&jR9%YhkX60gg5}bG$T$g^=6> zy}8d>=|ovObbUy$UO!AIMsp5Hf!%1mB`+K29J0mET3;9bK1LANa8qW6`h=2wC7H3{ zOYb`0)VXA&Y*CZ>g?7wxrCFK+Xzkk3Ms6+j2lK5WYP|}i9A`umooqiu88^&ro{(6HiJ2Hvq2WbPcw3!Jf zf|Xc<1g&C1dj0<;;msrI_|dyhwf~;;!(}c)Py3$>E*qMtUr$y!8MF_z#}q+>kO9Q& zW-2r2vxG#@lRhJrCMD1?AgaC;2*2udo<9KwRj%wWGhkm71cdn*mBYSqS?ub)g9i*T zR}~O{L$Av}dEMw8)ylHq<1&1FM`@U@+h!^^%raK_w?vEYsBmwO`{;E6D6e80{>H^6 zd&(eM1opL0Ideo<3!sF{oWCE7(H()SCH6;FZtox9wbn`|%CUSWcG2600%4{n7S)c-}{AiV|sWnyWjjF8BsN6QXCGQuC0b)2om=t;@5`G`1 zI$2Z3yr9)OQ8rh`^X=a6%tuOtC%f11e9kvvtZ0r7XYyH}ruECD3%yC&;R!rH6>PZW zMeGYEIbp^xrmGui)WZ4hFB6Ruq)gI`Rk*z$Po0{pdF{vUjt_vQ@-*5+b-7X$UU~y=!?IsW^kkxHFX{&g={| zWjdd?u3AM}0ja9|3zsJPAF$csRmFC7#sYcX1Mo#Bso6#aT&4%fu2X3EH}>sEFhrBzVRK9%xNLE-!&Ke zda*|ty>s-7zN+&=jzO))xE-m@eUl#7Jh4Cyshcc?S9_57W{RVAult8&vhs@$S zr@_=P+Vz-7_J=W!W$Ddd?bhm_G7u~U{Hq+pAmy0l*0&f$xO21PdX$d&WbTPz&F$d& zgmbct`~KHHlD`E)qwtYc;4AMCygitx81U<=?UHUYpm-fj;Q$mm2tOscfb=#0c$^fm zF9x}Q$iZgze8^{Nl>V;Z`-xwWFSz+U0F5xT{AW^<-@~(?w04I*j;f^IH?rO;U@TmH`jx$abQxE>?JklJ4 zijHgK=oMr(%07seGvAC2pv!%lbNr~)grv1BW&I}x`#wjsc{vU@clJH#YFg)W_t1J! zqBuUO0vCH)&^gf8j+nhLz~mK&;uVn%chzIQi#!ZwMKqEQf|rp|dEd7ZHxuVo*djzK z2HyE{W&8nxK8tQmfh{=5O^u^|&$B3fL%s;aumT&$tU+(Wv5fB3$Rj9gu?qP0cJcuH z-RKcyx84U&lSkiTRf3SXydLlZcN_oGAIxmePS$4On&U8iEbBFX9O&`VBxo*&in@FX znY=fJu==(YfBq5uwvMb{U@jV5{|G39u!j!6N1k-iB+q>Qmn5+*#Q<`ooE|rm!6B3- z=^1BU)FgHxl7y{TtwNuyD~C2qOZe(D#ISNVehXV-lHa7r>}`;~B0Wb<==Y(f7I&XH zf8Z~0cDvt)&!J1iaSg2+!k-9XR%Wjk%q|*<7c=ZNB)J{wlL3QEI`kUk}^Fh_lo!D4giw^w3Zd2WD_mALdS@uG$aJ=$41nSpA!-m zoj!a!$G3S~dtuTphJB{|Bmq~1Q5MBwx$NM%f6j2v8nMLOLn@)cth^T391OJj|JL&X ziR;Kq<>?6GDfG&43P`>C-+qR*DxlvX_Rb)`uUa2s(QRjcGI!~=IjWBENdN+Ym^BB? z4+?Z!Xa8~O0EJirc%@)yyeumv7Sh$fx`S2fe1r&qcisQc$@^YzSimJ)N7 z-KguKd9V?a?~-o|EzpzcMukc{M%?+y@naHWP5~M=NqpaSv5|Uus;OzEOAASj^C10X zg9-qdJO_s$Yz2c>7zH2w#yg_VySmCeV1+d|JB2yfZ&<&ILJb@W%e`g=4wv!FYgSmc z^?uHpB(+g$d%kf)(}AeHI+koV$)^ph7i1ioav#KPcMS|p)p=BNrg*H=>#B^!8*}=5 ztoV}H*3mV3#&&Zx9;g5$Lop;r77onaLjdwipljB_u9W?Pq4Isax`Y0fu59?~(d+$N zW6C@~y>1`ZfkUnTJoHs@CZ^1DFsdZKwb{x~89LW$|#{nO_?e93gANZY+$NQjrgA zh8(;xO|C8oN)1U3PbQN3XIz|XPzlcI_I5xjwO#)n*OnXMpzXGKk#pw>S+*bZ*rRrD z8y&RS;q-gzKZIn&;#-2TFi_1VN|H;Vwp7o4`V30$^3^cp&mX2NiH#xm6ncACORUb) zDfY}xr$o=~&LCHlKzny6`LcBoV}Q@u0~!H8LBdme?DYS3;SzR&0wnM=+wg*^4e$*K zV)N*!ycobo?NTRDJVAOAGT;*m6&;N#>c4YW?nD6v%AF`+eM0?aHeditN^k20{+}4ovRryboy2 zv9_`TpZzb1mTpw$qHF}$=KwDP2-4M7ZPN*fU>MtmOJLm#Y;Soi>-t6dvsqfUFFne2 zz6&hm_f%Nc7-pk<0ip9Y?M$9h-!kIul?{K_K^M2=%By`T0{0LC1B|*vHG<~a?2sR+ z(F#5E2NqA0;VhF~atY(B%^&KQXk#ZM1F2mCULcu}&bPz!B6FBe*--p3)C^xr0{;uy zRYvUn`cFLRKd+#V1%m(w2(%b(djY6=BW?o&U+su*aHO4x=3os{n2mR_I`n-fDRh^2KLinildUcgTN;z{V&OS zK_r>$wz2$0g~^vehDfU|&U%H;Xt%k;>{b&%S5Sls<`#S!Npl}i`dx$C!e^2P&^fEl zfkaljXil|6y?PdMHA<9 zQMSvX_v}2}oW}mfs4KL~14E6c;o{h66|OinFx5goyet1kXW=%Ni=^GnqXkKJqMjn% z;Trn%XLXKJq$6FWJc2f?B%*}xY;%~`sWbdZdHgp(B9@4~jy~#wKPF_zKiTukk8$=d zv8%n{xAA@=vj(y^Q$3k$D5ta*X5=%UwyW`|KJk)4OG=@Nag3trsWStnm&M^%$z2F) zI6Hh4erFu7h>`DUR$O1we&}km_LKA}O-Ar5F3PLqe)0#reCk#{sPkAX0)-^o^LvIh zD!{^t4sNv!=V5^N<~!NFSFbfaak*zmd8ynz2qEQjfyTLeqnf{Xymy@0O#i7>qD~eB zQ1e)5&uCUTJLJymM+Btq6`cgoHLN0U*st7$sayWAP3qm#Y7PiZr&HGc<^P0<>x$wk z1J~Jh17VeF$lnYBSeaXZiDzCcPVHp`mu8%>aHQ9xD<{gWLPoKP$X|AAJj_B7=_-zl zM@~oC<{$oaSk(x9O|(;andY5P+h#S@#s%|L41jVRWUbxGrJsS4dt~l+9VZxBxG@kW zNXU2krfXozXyvsn!2ayNav%RV()Nn*ZOJt&cC$qM*73Y-EX!T0X@#GwG1`*st~yjR zGw8zv^R$^rfH|TyVGkTAdIuZ@RT!EQZX|ym6BwOeBQKMkDGG50_3(+hanilF2+VbP z!4~DgLDdY@1b1Ps**;r&RK)(?o}x|D7|JYsL1`;yh%9vDcK^ch&z(u; zOHQ?v+X1TMCWVpb6~CgMDqw#Tf*JH_n@Vy#VT%uw;>87EUU zirZ(vKIMpLdmw)eut0u53lf5X^auNyEaHDh>UUP|5Cvhkr&=HQcn!V6I(im3FfgF| z?7YU5$b^%xna1+Uva$y^#>}&<+jI)v#w(}v^_r8_V{X*ej>(w!v3{Vq>s9_H+~>+* zQ1=%|c0L_iqCp%k@vp-sH33`M-p=NvzLs|Kbe4^lytCiR?FomK4H&JWKcd$eu>Rb_ z8?8MlZKhrIkD=PT?GY!oSdkrcSD*5`5#zCHMtVu#DI2*aMybXocSpa{d{-jw=G(eZ ztMnLW=b}|A^?(eHyL;N_H4ksrwgNOx@j(L-SOeL&bZr{6Rfy;-X zvBcf>=fKbn%n08*Cp4q4ZaB_B3oh*(H`$D%=vN8;iHYn_9ZXwIGrL}iCjX2 zwqCF6KvW;Pp5qg1^s0wN)$6I!pR+(BzH((^Dekx?r(!64&`K$y$6}YSI_XfN@!(fR zF@c%~z_Pu&z_(A?EYC%!WEJSY+?fd<-tBPqDSoq2v!V6H+&>tEopBOjqGZnhgB*R* zwhn-*$$k>%H6lL@hF0!Ay0*A84W;_f3@R@jlWRFh0pQ#RVCiJTv0&v7G(9d_ zzjoi*FueSnr_$uU#Jvl=1tWb~CVT~73b;eNmBh5$xKrU#d4rjWqh#4Fq^ltv1O=2q z^n>4}n>g;uhxIMZp!yd#AKWAN;`&HlbV@e!8=&gr(U#}llicW|U_1?ZWK9$2rr9pT zuc$C`%2tOQeEZqWEM<*`-fyJ?nx#J{c^eb?{XrmsgBF@3YLMr4vz}jgB53{)=w7s^ zGTF7DCbPupOv+}%^@$!}74AD8aBND@7u^|p?7!N_A~>btur(U_6|2n=#$1n$ccbpTB5K@K&8M^IWJI=zZ&Q%F8zkdu0!r zpLR_eULMU)y{PB`_{Y7BX9jc73U7QYGz^#s)JBXKgE>I0;5{qHig2EPNgDqpxq35o zyr>4)tacFL;45u;i3~p0GTn6ZOlczwa%N=rJR7$H8G8f^D zxa3bloZkSvZc4*Y*&U(W`MfkYfeqhSBZ!OPdxP{?py{p*!D{Vn4PKT%MEE8?LH-2W zLgp$LOtB4XklWbXiZx@X#-DM2j%_DHvlQcR80`JNOLF*{E?y!WejR`9d-bqPSKqpK zXxYd@y3&P34VCogr%X!J>V+#utorv)8hyewGuYD#qyTu%3{>MQGsiEJI@NE#wmTX8 zIM?E)jJwQS6OV0)S&Qd{!lp53PljWGv;8VJaKap`kT39UQK;^i$BMoGcOm%VcS##f z8<1Uc1E!B=ZI#B#J-DY-da{j40zK49QdGLkNuXZcUbJK)Lmq@#Y%!v?rByWs4YZ^1 z^9x&-)Hr&^P*vXmPoo~Q-Vx!tIDdSb24uz`DS|Z|NAr`^)$Z7$FhT|3&8m3l`sVDV5|D)lERn~wt4CK?5q}@zD|t4o98P;~ z(HLvo1G|QripmWfeb;w=fRxJ-8k;;>Xu#(3ya$Ty$XfBSIp;+Gi7zs#DbKQke}&vW zQ#L9f^C$SvBuD*v7*Y16;7Pr1l;N`Qik*F<*q<0EY4Rw!GK0Q|P63~Gbxtj2>6p7U{1KtFDnGDkC>QdliPoKGFg; zX319GUi)$8AFzv$@0E*JW+{6IEG5P@IkpbzbU#6smbckL0^9Cvh{Gwcmd;3DsNi{U zcJUX&)TR*^=PtvJK{dy`&6;v|Q~xP~6(&AWZQ>C3$n52VxYAdcB+n>zA>w#^OrFoE zXs;ViG4OAp-G;usOjNF8Eg;+6&yZ#%#%%(<%YlP$CdZih8V&*`9p~$w%CJ;y5)V@qTUBiU;UTc7_J?e0dJh5 zDUe8iC4!U19<9}d%gUgn@Jwq=&0s4VO2@)3zDKEvyu6yv4$`i>j>w<+gy02^=2ifi z%ogDic+xQj18=J+e)pjs|D15rVD_)mk1_K*EDZ>j5y+8kBUfL4o1nW-*pnH`PZ#%= z*8`Zr2xg$?hN+_*h7~%QWmD+CJW_gC5&JUX?MI<@Yu2AUNWUHVYk1NrxTH^@VNNnm z=0#-}boWieP3l)KmikA3vSzds5-=Xy7OhpG7mpH`u6*rg^3%QKf%Yj62AOhM#-~=+ zj*gnA147SD4}%%Mf}WU9ZKQu3IXlg7h4fxURm_PO`Dl%$xv2iyos%N2Uq3Ab(%t5V z)(Rr>>Dh&_S_SiV$FTg}sdx3ZCoAm6&-#jM1Frkt7VR1KSM`yq_jcm_mt>WH@f=a< z;sPHm7pDk_i;p3aCC0?rB6EQDDs!&wHF`AIvGoB=zEL_kNT9Pi7W7^I7vq|l;js>w z_s$9L>Xs~Q&AgVHMVUiwLCf#M#8`fvx`!|V58JH<1t-SPz5Re3xl|}|F5*> z|D?au?XOgVyQ#6y;bPlFk5;qbvUFh-Ps}pSW@hK}v@7do>-76b$}p}E1CQcfMO`@26c_XQIsMdUvsqJy22qiXUc|wS8g! zXu4Figb}~6u!E`%1|P}%S1dhh!|=Oad*SrB2lAG$89z|^$Y_bM_ z7~qfN-Z=*jV)!lW(0WF}y`vW zb&3%+KUZ{j{25mYkeAgzT?S{xi=v^OWslz|v)*#`tP33L70bp%^i-(oss0qbjo~cRTUnhl!M^J@2e`* z)EFThNOA>J!sN#}_8ZIVBRzT7C2g+hl~XBSe4ir6Q7FPJp;?*L0C#y~17n>?-u+#S zrl`-Vb` z;f&Z@{gVimjBCIU`p#QQLhe;60>w**qlpgtg0mrJ5N51SZ`&QuUJl%5>Z)zKb>wncEE$mu{Ic)a}TUC5>o2pcA{U~k}_9jmLI&XD3qkn zN#>V*V)AEpz!L4A1-YZArpz!=}%aVov97o z{uFj#?Zd@!0HOmIA{)W)j7s?tHb@#XdwcfI8N>R#R#@Dj3_ucK=@}3* z%l>%s^jy%wzu3%lp^8`A(%0zg>gj4UfYE%sh_S@c;@`xH1Oxe(L~6%>GRLAkT`8?X z+jTxyyCujQ*lK&XQ48a-;F%qqfq# z?@!SVl*9cmMc1>gzpqy7zq~b~$F(Klb>{r*Du;OM#M6$W+nJ{0p_Z>e5~b9xo|V}u z+#W%3d9rT)y%4Z#-Nmcf6ql6eu;+j?|JXe3ed+BVloqsj*S_r&-k}60i%|>-6;+F= zvKM!5VT>&K=UIPO z%0r8nV58|hs}+pQ8AG(>Ouobzn`60&a}Yp6dRs5Ia zYkA54_rD{V!N;`++%~Qy%^IA9iGi;V?IrLSP5!R2cUeO}< zJcR2NyRF&G;vg%p)<6H_CMrwmz)LGwi5Kxp_(n~vc zK*Eg^Sk1Vc6sX#`t15}54yf=^a*k4KZ1Ks=Tw$lYO3Ba>;#0mj z{eY}NXzl0uXC$OO7i;5KE%{jzc}|h<2;l-;A?JZ(T2%B74!H=|jVgo~-7tJ&ddC5C z(i_IunYy&K+h2;%cGyH0S)8PtT2!wVoV0;(7XhOsJ>b%fZ+<7(q7ltYlkWiw0)1mp zG^F8S2rzj%Zndz^B-HpN3RJChIa&+aghW7TkVHNooF0bmG+MDc&oRrg`|dxlTt6+4 zB8#{#{+?x)HbQs?Z1t|o(1&ggoL5ro^U})sXTG)KP3FfgYGXYT7jpr<4e7q6nWQhk zo<;u`d+#08WZSKeqNpe!2uPKp0)i9~=`}WpfPmD{qaq?8AU!}JDgsjT(xnIr(o3ZG zM0yjD8ajq5olrwb-gEozy??X!_x;W}|D2g~&WwLBP9BFL&-1MNzSp|ewXUmjVK52q zF+Ih)!dKE3W(zcA;dB}o!;9e)5wh+y!5Y}xjD4MQLu%eC9@8`<*)5n;B`HirCLp_i za}ItdGMlT)>}!0F#Fnbp34KEs_dKYF06<*&P>y_zYM+jgLvw+r>~h8%d<+@nE{?Pj zp9w8%BW(Px9QmR;UX}t?CTYGyS^EQQRf(y>d>J<`&j0LM@8#SDL?GV+Dy$07pVxRV z8wUrY<{l3~R+c5m^u~TK5MC7Z^HLNn08)RnJjAjYstWjlF5+ogApUpM2z2u3oylB7 zTXDZR#{YH^x&Ob~fjdYo(0lZutJoyeNjG);|w5^e+?ITkw3R@aR;*gPzFQaqW444$~Y z0l$KOLiBBmKGq_|VMr09;a&-1jzcvCqFc?lw;~jUBGr=4SI*P{f!B|nO}#so|EB7i zb4;;jQ{q(oN@9z$OfQ2kZp$gtovk8P2B-61)mEQ;aM+oSjRcxC?;fV6`9`RL2*G%^Q7 zahsTA%b~R!q1(Y5NoSG3=@gxPP&$_fpw5&7gGt=e5L*8qW;c1b#(wb~ZM7Z3^7Tl|0LSD*Un`_nkPRnWlE?S%)w3plQzeIPgEa2aBVhRv9I_}Y9;s{G@Sg(P*_sMgHHkY7|h+J1pY3dfRwE6gGrG1JS@u;lbhG#M4-?bCgX+37U>?rD(v$z{aN;x2I#ytW&p$c(avER5KYZ# zmvDByXO~s4V11816qylVm!7_rkNQFzDz6vEr|;b%(;FGD#2J*6Kd>hqYo1V-l4;{B z`XXkfaIBAq6M2(E%t$Uce=V<513GChSzEq4R6d|3lrN2Q);N`Rsc?|j09t9VyDbPA z#=2na$;IU@!?+iGOlQa4JsnP`r+I{EF*byOd0gZA@Fa#*%iu7I2}NWv>|?j#cOo;q zSEAwfgz}#5#eXPxfQok{+5+D~7qXLo;dYAiXU+cg^8qsWXEQ*)meW4(BJU9isFiNW zpy&@UR|gc`&iqz%!%>1ndsqJT$~Yhc)C>V}Alx;CJl}o|WCp!}&VV>ihsene{G!m5 z#5OrA!^g~C-$TnSTxYKQI?^3LX;>AVRXn8In}0gZd*hA*UH15iwFYpfei(`1UyVVg zYImH9$X2*b6-M*-`8`-W%kI_HdbYGpzq_EXoZt?69#5R*Ki0VlKqAn^I1$2;p>U8W|**I8~+y*=v}QC~BC zU|n!J$Jsj4N5WY_s+JqY&m$Q>C!WAmq3lAi^c}O}vWy|Omidh%8>}Y9mDk>~MSX)@ zZuJuN-4sPDU|xE%#eTlt;-;OGUojjt(6Q_}hwy)S=0<@KhxS&3rcQ@YLHV{BU+N%i z$O^ui`!|(}4CXiq_!lVSMhz%F4)6mR3hOTvShs`X&d1c0a|?e{Jw**#@*Oi$PLv<9 ztccD|Q2gh)gbJwu<2E}apcj=N9T1VIBUp#}W>)#=( z`DJW&0b!4oO|%8@N09T*8@IABPd4Rx;Us9lY4h|Z)Z)_u_8xIB*RBw;((Drvz+PNC zSmY!=lKVSTjQuB5Oc06Fur8J{x_*~s-han&!>o5>@}qa1UDJucFUzeSSH9Pey7?AP z!Uvu`0SC=)aQkULP$s5PjUpeC!;fV?Epts+@s=mvD?jcm$T40Tp_dX~8bNsz+AB!03{SJALRiiTDT}}^|*@?kVc_<(?!kzN$Zc3 zV1ghr3C9>Bj_n3*3dcZJn0QJN7}iHy?KYE3++K)3?Dvba=)5xF zNptz+$WjWG)Y>C_;V~;Y3GiJLpW)uj^wlZRu_hbW(L9GvF<~yXZ?scapQ+a{4x(Ym z4$Ix#5XziRUq0gR2;`h4-biIgXel$Uu)?IT_X?zA3u6drtAtHrUD^f2*ij4DJER6{ zK&9eD?&U0aNs&vgpc86njP4ZohzT+k$B7PXv7^S{%vCld$Gug$8}F;Fr&-9 z)OfA5BFWA_7{;8FNAluyvx?<8TE`UCjOXrdgy81+{CR=aDVW#DjQ+>v@82#Jsr?66 zp_^k7NT9J(>IRMz_hI2G%QP;5c1*|7QaV|H0oC zOgmyf99ZX*wCof9ream*biDlC&B0jj>z>pnNKgGXg_hBMgDBM$-%MFox%_~pR{JvK zkP7ornXVu^80kn@GrL!z#G^j7g#M&qgxTUEVYijCDC;r+Yi(?9*37^m8a_DZ>Ta9X4OLhZ2t64u+g^P9>Jckyqis7S!k z*4dr;l()wWzgT6ex)lCRj(RN|-&DTGxSEYPM6LD_U6-XQ9z3p%(yb~L@Gsx0(_&Yy zZ&8vH208tM!yfkN?8NIGmcm`XA?I!sEB3PGu`cON0V#5A6pL5#W-9)h%IK_o1Wn)V zV^?3iAegHeTxtyG*GVeVFR^-X;8QMS=9;fJrSIk3o%Y1PYs@dZk?-|yHlz1Rt(*?- zzf8OXB0?Kj-A0t>s8`=&HHJOHrZ3pzlTtHW1SiQ8h0@#Yu05-+8ko8=KGI!jpryFj z_zE$_m4o^QPJq)T00m-}P>dq0&~@$n zRyj?{K2e}t|2LIn*T;vlER3`}1dayH{1nC(%-3CEEjr_VZ6puHHsM|8d|sg5$B{!UPrB z)Kpdus1;zu&NI;qMimE9E30_(y{qHTC#^KICEWBnr!B=7c8bwzelVKVjGvI8y;l=RBT_I! z8e#=^B=yjSfu>lbXLjQ9VIM$f`TG5E7*L2C=3|$n;v(!N7d?o zGy>8L8=g?zz4P{{4I{gLzf5uec~7v#o+1+k_E1daYxLDeJd`9SdcV5%FORY*2cQhm zJlLNxMzaU|^CPk~-+11!&YLt>&-i4R80-HUHU@gWnATn@Qqv3{ShT7cJ()6`pJw? zsZ5RSF#^josYU1?-vTp(_|G^0{qyOL9p-4mQ}sgk7wg>Ut6=~fT-^t2R9XmySO!Lz(?=8S>@Utq=_BhCJyHk z`CG=&?>$1oD-)vG#-oh|C>;1c!^e!7Zi9Mo=vnm?!^;KnA$(H$U-G(poYt17Jz4kC z8hjVY>5%7qEF@7Q=L!c!+7s5&X;R^$D#g7y!bBjr+2%tk!Gikkt@p$OtTgc@wW`4q zQOU>V**EZ5B9PNe>Lcf#@)HMKV&Tt|$c)*9T=>mMF8FC9;SMit$l$>(EQOrlp>>{S zPcIEN_}O$#x_Z5w<&xJ6Zp{z-6Jcm1tT9!%QVZ1MoA)KTVQyE^kLPF)agB0l@cd3u zh}`dAnR#EG?OV^dcPLpPADPrl$T6VU{{{E!CfR2+JuPOHo6D5jH#q=KfLC!uulF+N z9SlAeNo-`>EkxCpa{u%>@dIcAn8tz@Cr3^uN4@|O`DJe6%lhc<-&Dset;?exa2~UD zqd}XB@@VeekwRg&oe3f(Zp*(uYx>3E!e<}=FJKl?x53(}^|A4Gv#j4X0K}Y$ET$yW znH9)|Uv6Sv@pJi5u>Gt1?>H&tl5d`Epu!JrIe?NCNSz8lb+p3~Xo+2ybrrstjHy#o z(eOWO`gG#!@#Cjh{jxk8lf#h?1J_I=^>xLns(ky(c?aV|e-!+#bm>cMB(2Ovk$%^b z_)vSDL&$>e{ZufC(IO42L_Q`*BW*YHICnX$;Y=@>-gcuN2P3ss#4O@?XI&%bVDIsL zPh8w3W64Fl_Ig`nUmvN3ViRTcGub804XswFY?L7YvprJY{9Er4oXrVG7X#!Pa3Os{ z-B;*Ok{u^#51a%+Mebe?UJ0;jA;Br?F2A#KAT(|Vu$Li~-Wc=KUhtEsxpD*xrO6Wo zZ0!S!wttE}*NsR$O?wMfQOGzi5@TV~yKj#pprXd#0zOwJMVRtp7d}2s(XvS+zX2F; zUn#8DN9Z`H0J1UzA)kf)fK-0T7iwMcpt+`Uby64qJr;CML>JdsDEEx{c8PqHccR@L zkU7}BW8qz?-h)f9-?b!#Tuu>$G;N${vCfQgEJC0?Vl0K2#lN7WU-ORMI(?|*h3VBi z8~{c#QgY#Sf=rOBBbwiQ6K{e#I(j7_aC0*wZXjvO%X!1juY>=`%=h~%&&x0G1x6pm zpnPA7PD8BuLgZBGNI07>(%+>&qR0%0kOSld3*DQQ+WA8T40TcM&!Y!8wmRmgy@}*X zn@V1+&(r$vt?wk|70a^9Tu|}oxm{)Min`5_F{9ji!-U1WgF=R;JsLzDR9*e8ZC8d5Y2)?1k^GqQnjV!Vy8k7oE$; z=f3ZFRrY1KV5tFH;Y;4b4<6B8yiVBuZfQ~|oEOKul^WbhQ6y&N5*b^P(C=kJ zzVG8p5--J+vy=4vSk!7-S35QQQ)l(lo(n*Ul_HM`oBbCT6Dd!z$s zq6gL<$&+C7eORt32WANVG76rKYU;E)h(Bc#im$qS$A)m}^Y9MERK3WOUylnSrLd7Srv z4Qn2*U=o4%wamYEAOCmPD&PQ4Q$`g+$d{XLft7De-JeZ~7s-82MIZC+B(|HhcU`+Tb>Md$f~D~MBwqozj>r7qTdERlyy-pY~L z_ga&IG;}EIeHlO2jM3wY_4Hjc{-OQ#e$ThGzpRyFDR-;3^Y&T^*L9dvSYnexYaJ!L zbg!-VtfCpa-?R+Bn>|;~ab06nV7eZYWDH%5VBLi!9EqTMwZU$C4cCa4*fac_Dm4jD z(MARO@Qp)u=>T#_^?L>2M$&fKp@5YPBnlk-o5r>fZB72tB!~PMmn;i2neUQvN?=`h z-Q-Ovd*;KPy1QjnoY|Fbzdz>Dc6g*PR~bW|dz!rq%J?ST5L{_mqou#2ZBs&0dHGJo zn*Exz9P{;vM3Zo)<*)--2Z~uH407T4K2aw>ThdSU$f%~K;<^5p=547fm$&5kL+3i@ z^%2L~Mw*Y_4Z`a$`F26~*L%K?NfQzXxr#qNK2VVGgza19QIh#n0F`w`7yXZl)NduJ z{}2ACHj;ymwH#*9=Sf|JtO6u3?&e(!Q>)v+f&@!x0WZQoy*?Fio z4NjRl6j?FGo+XwCZ|scMJ};NbnWaDV^>3=_J6|B1Tn8tyIPyn-L4@-RzDdEKfwb&G zU#na%vaU{Rd8hMg@zPbk+R+5Mahgu7fPXvaMAeS2ywmEZP-lr*Ek>m@{#Qhv!aSIoJ*r_Gc(3Zr?yr2c+6nvgE zHR%lW&?%y7UNv&x;P1zF`y1?jetf0G?Nn8QxZr1XI}gHQl~Lf|89z-&;acJ4C%wUp znJh01-^u(nJaF<^Ra++~F8r}*v(}U)ixCvn= zGlNC^^#b0ixD4ka0``1KQH11HaHv`p^HaYOjLWxF_eZnMlN|z9MvTl1dG2TP40!tF z?@rHofiCXMB*zS^EI~X8W~SsmZZx=pvW1UnHACo-YFSHOu##ooi&cqNQd0!xvxt+-`lPKD}1IIjg-1XgpmsMrfF28PHGE8$qJ@jVtpb3f9cJ`@{ol_} zbKa1{9o$ZZi!SB<1@NAFf$t2olJf0vs0aWn=h^~_ruoK z=0J>(#zw8B?6U4+nlXV^Jmey2jykW+L(0^63mtPCD%;|#!4>LvF?^o4&rtgfQ@Oo~ z>NZR7bmN>6wNo#Nn10ZyD7vTZvF@(-Wjnlr!(MUt)BKCwSi$^C&orHB7os@p6ae@r z{0RT0!u4a;!UThe;bCVN&O_xVv6M44d?zTKC}yOa-$gh8CVzRpgeH0yT&XaGTZYS3 z{>jRM%BZsYh7_mJo~Fm1O*R?kg@FdmY$<_Z1h0} zKeVpXWJbB=Uahb+`$56Mr|FuSFB6MLKw4zuxI zqd8yG{2)d;sAyPS`b4&4b!z->Xx~Aa6{QWbrKWlVg$LE=l63hNE1*;WXtCoW3E*~C zpr8DuAKz}cHGRNgjcZ{f3#9Z?)J7OL!AsVnUGWF+yTfD?2FQcB9UqvWrE??SfhaF6 zD0n9mC}_=n7s$6<(5>PB)(EgZgI##yYFZ`kIKB&VM1AL<`TgYlCBFZe&36yY&!K)B zYF+fH-an3zE3?`Z1-4ikxUf6`=xy6RqQr5;$|0uXv|mOha8^qo2RS+6 z_qi%V8ZPe$tqDDD0DsS8LS<$4BfoaC*-$~*kxSzG;sbuZHL25lxfl$}*-?{+rU`p; z(=lq?&Izr6?z2`4mH5$NvdFi_QE-j!%a=LwWiV&gy#?PxUX$V(mejK<1ygp=)*S%C zX>2`#zn~2K#TPnVD)gq#+g|ygfbCk1&En&@`)>XQS7}K#*evp26p0sY8iN!zQpYT% zX;`i>CE@)0rgqsn&~9Z|r%k;%y55L&P|Vh+jaLl!&QyolInC_E)vfxeLXA@A>RPdFVbQEUiQ$0?X$B;~P1&oDSK!_SA8`j1*oHxLTr)yZL0|P1)fd zCm-mQ+F;(pFUTMq$8XpDcuB{o^l0eQ3uc*hBa<_3zb^VcSh0HN_K-e@{KOb7;Y&%L z?sDsiH$X?A@@sA_t~ui!yjOkMSEatF5p)?y8#6buu*PY&FCC-rwHmSaB=g0>Ban#& z_A$WEa6QA-%fhl}pPA3tQw(JQH}LPDW-4P0hA@ixpGRDCk(T{--fCTzMnHC!^U2UC z#kTF?>Gj(Oigl~0QW*UTYd!O^^3Jp^HB*S_x{v91LU8sy@vM#2m<0zXZ>91@$G4$t z{@h4jBBbU0t~DW9eq(WfS>alxUAzLP#n(%6kGUO{pZPwIU-^k{7FEh{6nb-fZ()%` z`<5-uue*PtsIA6Z2(xn9gPK|%9v*n>Mib?SpSg;&h1g3=OP8vf@k4)86$=Gj-t0~b zQx$f&*WT}*uOR+2E_muPOMl`0%eVPa%#JL*`dvtg$X zh-Onh&gPk>@>t|3lo&IZ^?dU;)!FWZ#*JVbmPQ|^p_-c4^EVQ8?p~(|PHszqlGRn7 z6Qc0pX+{#N(TTxgVt6rnNL|HaY~xwIv-OheguoUC5PsSc;*XQZaETdD+D^)2U7E2|FK0(|8Fn;3$`8yJk%`OX z;R2az<;~yes_OsE1Q!_Tf?pv?LUs?cfBC^L93$X|+q%27JB*|I6fM*n+^PgfUp|L! zAO7o=JtA(s9MvSzk;*_rUPqHM4l;f~oOBN)V5nV!Bk+?-I-p=*ldB#%q@(}9{Z2S`6XioaGF>_Msg$F9eXSZo<+19<_+5D${CfoNE}%(pZeLIYt@$QKlz&d{Ffe= zZR%9;M9Nu=*4Ow;TsGnh!C0j}3CPzSYb^8jo%C11+C~_NxAy0*W~*CF7J!`z?EG)i zu@QKPje~Ar+Ibli69Uk%*y5AM&8qr$%uU}&sH#5d9%}EMyz^$TLLQTn_qA$_W9a&m zX=#J*m~WKJQq<_lrBcPT43WQ} zRWd8n=RpVf%O+0_5#KT#c5ibp^?u)rt(y9loq*Wz9OaYH$>mqBfFo$llt_5Bx!|Vn z{OsdI+WqLM#jxN`A|hlcam~74*@X~teC6n*sU7}-b(N&KrQ*#71DTob zfb~fCcIJLXalIlH*o z*T(M1bQ(X2oAE_zuaYY+jnp=cG)|@N;;2`qSx}v-$0{JHzXy^A!GBzx|Lqbo>_40R zNebKlPfZj~Dq1l45A&52n7zEkPr}_k`^NIMwF~oK@6t4^1#GisP_=M6nD?gb?3vO{ zI4BX#Ot*i!%v+hXH$&an{Fio~49ZzApQCB)-jtDa&oE$EGfrMWgM%CpZ$59#kq!}x zCD|dcOg-1Gfeb5$_83z1#t7s^*4-Lg~9xIZ+ zx(^d20(M`N>9W6Xs0mU#G4kg1jjJ>YtAZf4`}URU00_~Pz+3oeCluv^Y=)i~Y)#lX zRnk%jccvh$tf`DjjWZB0(<6~EM3;J6+!{*M{g+*My9)v}^~h>CW=wBLX3=51hwPII zQS&*Uy}D1lv8TuFe+JK5|GWgzw(yO1N0-6B8LZXf>Oq;klFjb8Iti(e1=EEqhN;ZA zV3nR6MPs8`Gz=L1GFZ3VzPJvTf)3=un$Eklj?Ddf#?<^3)Mx@l+jf?Z>@$U0;>1LY z{_7RUd&mTy1Xe~Se?MV*A5S?4QcJOetD(Y}FRG7^B$_G~XM$HR`DTwXD(U^;z1v=w zHqpJvggykj$Amk zDn%6G>1PAu6k6Qq%-8Lnn}#kXM%{{fk5Y{H;Pi#H+Th$cF+QIs3jD2b7pzuRXTMRd zZkI;jM%~bOC&>+~^3DA{G2*pMzCBE2(b_RP;TKJ!(!|3c*8mLXILE$Q6nVgEonNZq ziFL1W9$cyNS3G78!GXkF3QZFf(OoaGD*T1D?UC8zTlKZ2dFxM$gp$IznY!}L+Fa=A zXO)c4o*MTHP%1)A@WyRnBE)xUAsj0ehum2I5Z2=*>l-uUYt7;OFH@^6vt@SLR`q7< zxsISjNF&+DDCj&wX>9#*y0w6nVc%QS`y732mGjF3i#y#0;;|WQv+LD2>M8;7*r4LX zGoP8H&K#{@77N#LkjDMw6L;Wh*?%viRj8$36Te4Uz9)ufk+k(x(U8%pN6kQ2ONrD3 zO1X2q&Xj-BV4VteAxk}Olk9DdAQs0{n-e^Nz?;^5Ulq>@*<85?@2OyId0*OF%8ndzx*n4-P{ZjK2>g~-uVbE;=47~fyGZv zCaK0qf2Nn!y&G=xeOAFurc$P;f5QmmS6+k#&4eB;N0g*Q?5BS}Gv%KjSr6p<)F^iqsKxyR7)I zTzXZPyM?e9oy?)m4wFh2vke2OLV_60(1loAPU*_>q&XF$Zi`E*rV ze<@=+Y%u3sKz@*2%l~B0s57f82?nQvT%;q{4eFylxJBn zn>4e6_y%3RI|U*tJ&B6sv`6LlzW)`?08@6-r)K=jNtLwREewVt9*;L_Xuh)7E5+6G zI399WYdfz_*qgLhHQKepv{g;*P&zpN?ny3L8yk_%S4Kf+Rb%7!gj(UFsa>mH5plJoP(nOI4LuiB<#LZfbQiRdrcORz`vfdOLQ3v0XRRrlbFp4@ETcvjlGB`TKg%xo>e0xlK*7;a;+x=C@p!BMam6xmx+xG;nuEZO!}S@2O_WkMcns7e zLC*33S*2%Hyy?8>JLE5iaBhYr@vPOErN#(cdAVMa`>KRSi1AoV)+H(+HNDsa_Zq@< z3_&@&rJ&IBXzqiWo5jzk(da5FMqg)jb?s=*JGEl<40oAE;5K^*nBP zZ>b_bcL`DgJUgz;@SP^rs&BUDdf&(;_}!gRy5j8GGWMhPv~hUq-M8wnEU7n1UF2dc z_tG>2<>rGLwHhHaaQYy(Lu=(5fh8n|JDdLuJJ6G>9owSond!-C9B2rQh zRKjYl2T#D2pd-DCZVhG==rNh{jo+Y_zwAMp7JR&k|52NezsKqUR@8i|e0P4l6QrJP zIq9KCEHiJhH2}-^B?YnKm7fqg+OO>mU#gmQnvs3xLJEOxVWJ%JNN^(U5y3gKERA_- z_IrG%MaMaLmiy}XaI#@kY8y?tH)qB91rDyN7aM}vd0y~PmGCsKl4C!yhZSM?zI;eS z9QF!Aees*B-0-oAdqK(4zUyr|6f^Y}q%Ss~(b{6yZw2sC*@I9H=<{X>{I|oxdfa>F zD;M+SPCjI~l0qLF8b^nhd6{nv9NIeBM9sV^x5&BE6I&jhkykqIgzHyst#8_s*+fo>kXAA#&UTsE zoxAo~$@)#XX7+6Tz?MuR0Wu1mL4`^1haja~zBKCgy5%#ye6RAr`2)y543iG&jE9sZ zk64dy)&JN@CY7V#kCjjhv`z;^e>4k=6WDmR z<5*szbyz$QJ0E9f9I14PT_-~B`?ztf*_W8fO0vbl_FfUu&|jQHoCyOi%9Z7DFZnOe z`7fP>P*i#An(l*ff}vnC67*U=)8>m|lraL4{SQ`6KSpW++nvLq!vEI3oo@OO$<9d2 zG8q&{RZB25a}raM_?k-zc3rRKg^;kuP%>hn>m%X-;K0^ zXQpx2Js~(uUo=C?5WhxF-y>d2wVHnPoYt`@{_cf!bEzt@ zei#FeIxYyK9zbFqYSj?OKQ9;l zp7wGeo(_7~1f}9HUA8g}jjKjele12Px`bHXyk)5?Fz}$io1fjAdp3)q)m$MBvTy-A&`uLI4HRcH}wx{=~K=KgA|2Q8MdKsc=Tx3L+G z6-*o~4DDyF&X5p<^x17G+lL<3&Q`9*c;#DZ%t{1ZJ@0h~Y?J*FfhnP8S0`c^<=urK z!U{Z8{Mm0?Hg#v{@$l!m)TH2^9@&b7o7BsiKN)>?UR4*daB3I@-mlH-cj(CY-ZC%$ zod>4rKEB%TC^HFxkleyB6{-pdr`bkGG4x$oewn1@-91O?mpAn$luFWGnV=hi;W@4} zqO$RWHK4e(EPd*CuUC0DT*K)R?OPozTyUack>;^L+RWIA-p~Ghsj|s4kkzm+q<93| z=q`_@!hI1}e)z4&`KfclR6vc&L9z|X8QutG+%Skx^A@izFVO`m%8oM7L7S>`kH4B! zKlK}n&RS!yiA->GuPw(Eg_B&dy<`mL8VS0I`i5h4SK#VwT)xh>+6YQjR`jc`ie`>}+BR#elE$=u zMj*d4Oi$YNw`c$A%zUtarXEhftYRr#l|Xv4cV+-ez|h*wJp}G?XJ&STMR|X?eu|2~ zA$F*2`A0B`gqxd-aloxyTXy<>^kivk(>&t4n$Cj(`|*k-Jxg=vXK0=3&1MQKSjm19 zcie-N!txQAMDvm^-%HsPd423vOr5d^k=HqNx_CMQsU~o;pL6}V*1?E+|EA!CC>L>> z%61}&q*`ai<6$AGQ&RTP)Y8*40^hzbpD-%&!ANb2HumLFerN9j0J`ZxgCl|nr_?_N zL=u<`0KfH)s7dLK_!g_{o8>!UoOrR>7erd$<{*59`V@%UBVOV;Y5VnD_Z%(9mehNu!c&ZBs|qqs zD>Au0+6x)A>h4^oBT%4dWo6gj30jX(Lb*Nz(IvLXKfyjNx5%R@&kb0pEWsN zUi`tm>5UlV!!3WKEqr(#OTjS&&!>(rpfu#RacK!wd$_(Cyfv50FV7!Ngg>J6Kv6qr(9Fe4V-GtWwAgM4D?ipCNBLj*jT61x2|3ozTvydzkKv3<^mTe~ zGYGV2d{``k(3|Wtvi0s?%@9Hs3_5ZarpjkkG5_F1&r_}c2Tl|WaH787IFY91f8s;| z=~(m-#6}4f1UbKpW=7t{uZhXPOCCtqbB#SV(~7`deonc{plW!^OFTUEpb za3KbmkEx1a*(`vsGVU6F&Nry|$QEflR5*4K|9D_1h|YBMejy0EThYJ~>@SBY{vo7M zPCcbG*U}!yWEV+Xv$Hs|37H)$%_-ObOsvY z4mmfCc;04GRq?|)F?FFua=!EXMP@|r71$QItEG?fhQ>*{McL9KI>}DV4p~XR<-=b* zw+DlGT)1~K4|c^_^lSPtvjit`LCFfGx6ntv0S%ZZ12{)`Xoc*`#iZ`cCA~L-E$_^6 zGSo5zLl_%BbzqD1N`H9LdW_On(yTAW#a?;#2@>8pmI~3nA(GW2`|^3xMo02)M_M-= zF~gIX5wxAEuI={&XJ2=muNUpW=0?aa>g=*z&ab48!*R$Ix-bnhxwg-jw^Yz)N`>=c z4P(ON2Cm(T<%+dTQt8zumr+FR_P{L<74G%D-j|hRJ04O;aWxaY*7S%7m6kb33qP?)($y+*;qUfME@g4-dpUelQFcC}wdu);(@{F4i0q z?fqNc5m=JCV>wAtGtOt0%;J;NSJ=5cBEQr+{S3bJ{F3I+IUi;S*FsKuX@tDGj$Wwt z#^TCEzmbr9PN#Ne$=cG0NKbOE#jnGNLUL@kv$unYE`8S!&jXt$>u1m8>lydke}6aT zrM?)h>{0|Kv5hRXniXTm3b&fCu=GYWoDh(pa*2n0eA1`(@Cuj9qqilNOa>`=8h~oL z>+>}|RHU62U;=f0U6(FK%hDGpU2r{rEA+Ozl{6`E2J${3e&1hUD0^sKe0D268fgPl z`1Xyb+pSDbkM>nIE3KVCjX0Bsh)zMuvPQ*Wy{UuN;Ch**=D?$p#KH~7YZ^ZjU1Foa z7ft>7+QGclUzNz%taA6#2GersGX7P|T$|XOje%fA_=!pMq6PV);wv{JZrH6AM}J~o z`9&TXq0W8Sz&cpUWm3P_vx;p4s$8xacX9-3Z9Q}SMuGJu>wrfgH%^}TappAJo`~ zUEPtq?fJFul(oIBlUmHW*8qt2V4ETN8;-e7ceD3V{C<;S^PzTgCmUQ?RO~hP>&|ca z)@_2x0BmXjpV!4N&v#q zWf{C3W!Tv|;&huXFH-Ye!we&{<&+t3Mbugl_0oq~+HB&PDn;RWht4H71L9VH4-O|@8Bt%q&G4c27AVAd)grWt9dmw+%~2r7n)wbf<9u@ zvshy_cqgLPXuq_c+H8=ksBe%p=J34i#V=*I*-2lZecl8S8lPj04&rc>V>i(?f-+v#UrSXOb~z)CdaY z`60>*Y_fK3yk>;T$kC%V6^9S$p*%9(>+79k`@7rHA2kLmm6J&b@Hm{$TRD7J zllrN>I60)aDsP9IVJJe4RWjVJMV+?8{a(tvzK)xhb3W}7Y(_UEra_m$RA9k)zSPN4 z2`%<<=HX87G}UgAeW*b;ZTw=Wrx)zkaJTnC9BoXtzlMy5t>cZ70xY=W|N<_eRxz% z9w#da$Kf{8zo5T`5@|)d;$g32$zO8r;5IQ^Dkck~@1CsAzE6VBpcY;@V6P4->*aKy z3hd>~GFQ`lX11Qk^;Vdqs^qJNiuQ*a8l@MYZ|J)^>3h8d6MUafyYKU{)ERjEY_AiN zEq4(LzS`O?Kig#?OB{zF77N`j8oT}1U74${^nUMW71BA5wqNe)^%w;=^^bhMGfAp# z>MF@Q5A_1!2CM16(cUCedt9W#qhl0YdQ$XcXh@^XRf3HBp-Nbw#z1rmPttOkZ5^t~ z5ovTJ5l1exS+M3s?IF!6Rjt$gbs4Q`7wR;KEc)zI0>e(_zH#mM07FRZ@$T6G+KkcL zMLwakpA!f-OBO$CO8WI{e5?v@;|xU$`t(Pyj=xw!5uPDFkc1KUSJ?SBBZ4NR*Oluw zwxtFjsMPXqKzeRXxjr2w=;h^vsoma|U)1*y@4dEKfaw#D-r7<$M~A3htJ!>}%93DG zg<`lno-xp)T&@&0=aN>Zu`*SiC!GFYaW^>)fAn8bhpo`ES(wJR_#nomd&GP7+R+{?D+TgnKQpVw&V>DU0BK?|1LyS&YRGl*4pr%_&h@QX*!?iV9Z|`uy0UXqJ>j z%oB~qvM`1kW3;t~gbqF;kk5tAZUpBF`^e(>CpRFD=uo^~92!SZ-;K9 zIFOdaY;;@MbxFC6Z{imDsK+C((B#h2S@ zc)EHXRnRU;^Sz%E+{6X%sxWE}t&5d?)c&2Wv~~pCXgwb_i2#YgDo6}0N;NPlIvj={ z<+^pWA>t=Pg$vKpt}9a$OItw`7S^@7_};0&F=WE=(#x;5)msy+rw(7Af3;&Q^I`x) zqf=m*ekkLyFJ)$w_aiA+UFX*N$FwQ5Px9UbDOZfwY&rfW7BZaq&KLIxx@7fa);Tow z1}Wk)iW%{C-^fTQp7Yr_ZJJTUt54+9uCXw2dK^tqf(no?T#we>P!e4*nK1Mg9ga9Ed2M4FTxoWYkDM>zI1EOUIKZyJdf?aIN(Dma~CRVjF(riByv zn@YS_$23dTogACr(N+nX|0)rfv!ns@P2NIs?k9UGJD=eAKEHHsr!kkPc9mBmL4|pf zD>a!5nJ6VoxYfh$UMcdDz*Ex?N6{L2u`sXFx5>Gk)oE5Z?}oK&KXa>9jS6evKScW| ze3T!6L#WDWH>>*tc~4ByHQKmmMj%z7qhpLmXUe;Aw$QtUl{H7d`QGU8+vwGP2jY#$ zs})@S{qH7hCS}updf}M-6%o@j<#nD@f_Q=Yl8ELIJ8lj7JFhRx4(dgpP)_m$PWtPU(=+a>=ScxGy21F??WUxmg(xL!)acxmXKlAv z_Dz6nsYyAx0xL59jo;6>bsqE^%*Ef`!4ZGZELojbb9;J|}1r{=ErS&NZZ z^QN9&Y4zU< zz?ZwZ8}+1!n12+q_3)2)Nk+DV{R$_LR8v}MxNnsTrtFM^p0@=et&0$RhL+IVLr!JM zKO`5;Iv;(dtej|Kw2rdE*&Mw@8kJWvb>xpue&yJ{_BG54KTqW!N4N-M_?_9R+V5lt zEr45_2DgS#>jJs$KezVd*zf2z;%LSu-^^j^YE^1O&8T@^10AX^=gbC)&7l`iDl*jL zd3k%nFT%hBr%o;R8A&|S9B@tW97nwegRj-EftTEgVgic8A@$r~ASEE*a*6#zLwvsh z=aXL}M@=I{tJ-YJ*feXw6Q+)WF{_`}e!r7$;*WBWbpP|!l<+`OQ#$#m=U5fO{?52* zC>Hi?4DPb3%1#{lGkerX*vuQeo^vRG;}=txU<$RH5m6|gtUL&`?1Rk7JOO=Vz`6c)H`i$L zzk!13=2EE;X4NkMH2^SrJCUG!M56&1X4;7TH#j@=dthSr(z>|+7%H8Fw6-^!RnddP5$=Fj84Nu7{= ztn+TdayYlV&r_w;l3b!H;t*fxBtzQyHSr{=wO@XM%y&9?kjY9e$DZA+d=;NiDP?5| zu%=W(SNp0@ymbe}45Q{tLh|yRO==p@!#zuwL$334hP0FsSp}8694Wu4Zckc0Q>jQ@ zv$}z+O-*Lx;g8g^3*`qkZ_v3B4HieUGQSca75Em@wYo1u1%=Zb+ZkWOQ22#Y{&7Ed zU?0tI0E3-1QN8fY$rf23LpL!`@aiM%)Ky}W;EB~h&)9*YJcym1;j!9))%?PETzMSO z2UX+!cEZ@%UjUJ;x9L|I=;RR=Qm68=;q$;auh|8SQ!c3mzWX3gS=o~=dZ;w5zL^{LQOLm^D-eC<^v&i6z zdX-e;#~CXm;%X33YN@wz?g$*@=5XQVVclzzixp`=u^U6}yaW&ybcmG@DJn;NF~lRk z(Ck@HOXBND<=v6clbD~U-3(!@|FI|2>VZA^;d=9P`R|4b|7^+QP%USoQ1dXBKDp7w zf&CnzBiTI((H7tK3YjXk|60WtCZonW%JnMS|3T(|9OeJ*B=@wky1yrf=W?8r^Ni_o z@SqO4n#%rL6N0`#;S}#oeQ57q3#ruRu{f-`>&DPnskRMuJLIRDg6g8o%%Cyr<_Dxv zeZ73oWIrkq%f}hgIK8|pNVoAEKW7g#`xPrAWbz~67Pw@C!J@OV=j-r8BR0bn2|7mJ=AqvS*y%uFjU05ydJ!qrwFg!|mM47+y=g z{RUD!2m8OND!f`8jn9P0j7aZ3c{}W>C+h$53%ZGw04hH*%n5}fjYk0}0({QLrMvX( zz0o!%XW5bL_Pvrd0giKxXmxukHc@FxcT#K4~z_!9$vV&G2<{E2}-G4Lk_{=~qa82A$de`4TI4E%|K|9{4S zaT!@;-#DSOxU{M+;V7Oc9lUiiIKB2%vZtDvXg-#tJF6{vw|W@!f3Wx7QB8f_y6{d2 zy#=JV(3C1&r6(XA5u^wr9i&JH1*9c(q<3ioiU=xA0Rcf0IwAss(vi>v>7CG$o8NoR zx%VsgpYM-%jC;ms*n6*?ov_9pGjq+k=G<#O&$-yU3AelRmiJp)6!?`InVgSsTC zmdj%DrZE~bg3nu&@=eQ(Gxc6sq95D+*D6+kxRUkn{@+^$;GW`g>$UN8ON*&*A%P-9 zX1CouLH}_O;!6$UI}u2c{^``#TwRdR-PFLFf%KDccug@&+YiX|LZK++dMo;rU++S# zCUyuH`O(Bi&b3{s=Qwa{Tt8qdY@6O^lV&0M-B`ih?8>T1mD#f+xWXgkg!@8ldE@5w zDVxk9v_~6l>e&HLOBD=HIbUf|zt$%6zW$IUz#G0ckbO+bymJ`TDEDUPi}r}vVe|2$ zAh>Axu9op(CJ`dfBUEIE{z!KR-Q^l;Cei%%Vf5;!<(^EANo8O0cTg)OFD>5Zy(ss& zdgR3TyjEsCIWd@etp zp*JPumDrFh6Iv`8q+^;*@p1c|`P$jc!T~b!7ib4RYLA_zBe%&2i@c6JTa83ou5WJI z*TpzQ3PxUDO|LM6q29RGWWTX2a|zDyI}B9)@SNk3*&9vm?-sj60;P4l!E_JoaBz-@ zhVM`_pm(8kQH@@jZ6&UhwAv(c`o0!D@2VNcNnUi65rb;y%lrnc`>{2&0@twaX*KSzBrZBa}_1s2J(eF!MLqZVq@x}K){7xS> zgz-<=B3DBLNF;0W%pUn1`RSrt8uRv+nO-pqGDIpSFmPy@nTZehFl*_mX0P(NW|@y8 zna~cKtQa)ucBt-yiihJof}L&k(4VI9QjTe|xLzG`$=i5Qgk}H{Bt4v`rrYr86l?5*CodaXa|@o@@hYk(Sodd8 zkUvbLggB*$jketgrP_ga!V|-3can4J-e|hLku!X2^H8>H&Lvhi5?tnJ^orC^-zjVq zvt~9Re5b2Yux4;!`Q>U2UcEGDyec-RX*yk3+uYL{J#ey?aO!x}iW9)vMxT1eNhn_x zo3^!)75pgq$XP~pAvuDOVCgtIt*s0tBQmKfn4icHVXS za^L0gTXY(6&Fv~r(0{C{3rjyE!^w8yMRv9moyO{~-Z0PLtYEp0u1oPll{$eji$u0Z z+1}o(9bcJ+_l2ho%^iRC@0~d3Hq8r2n2W8iR)>0P8U(%Y76R-j*#OlB+Til6|DKNJ z|9=yL;PH)O0w6?*ojcu@#K&i#jokM#v9QFe%GA4oo%x#wtmZ5^etjdFF06TC&O)}? zezISfkLk~^n@6EnNfyxO%*dn1C$=nh(iW8u6oy|fWigJ9X|F5u<=Xq?il)`v(QIz4 z!8wHdWX7U*CT)mdY$fywM5ZA#BEcHb5YuK8xt{?X5#f{6_TqV{_K_;lV5r_Zww=Bg zcuwRA{ssGg+A~|WP|!tbs}lA;lB4V>yT+IV+w#5_ReY(aip{ZT}s6(G;EqzJ>2hQ`@EJyXGr;-RplB9@=O z3?(M4t3G#LLh)y@%@o_g0?#4l&4u>i&CkYO=2Te+SD7!QQeW=A(3UQ>{(PzKAQ;{r zw@Hg7064X9SzL{t>E0%OVq6N4XV8CYN^b{)#aLeChq4o~bH{t;sNJ?}$$=1Yu*5o$< zXbcw%n}QkkE_li=(8r$#Vs-UC{W(gzZ!L73^IPcZDO7B)(dPS>vQqU!MYE~RPw$&D z#>@^LIaHlS+3JQ5pjicfpdTii8#Slr%yp+eW*Ji!x%#^U4n&Zj{p`h0+RziB0t^>F z*2rA>>S-fHcTi8cCspkrz*s8a2%wadrls0inX9DXySF5 zCi3Rc&%VON%ztzi|MvDiW7ksVisZGQC~t$q`y z?RYuy=hRrs=KDSE&f>|M1@dlMm22EE&Ao%hvuEQYl?-T)>TqZ7Cq~-bZgUK1XJkB# z`k?p6VKSF~SK&7^m7zGt;CnN&YurRou!5$>MKfh)bA9;)z0f8LgEx>%y8(~z3M z;#rIY#;Fj5QPM`JgvVW^g)6KTv(?WAb`(hk9lC$L@5^r}?p{z3aKbGJ*kQBTd-+cO zWWJW=F0^wC3#jDV_*ugo?o?bfzU`@8=@N-?YFb0zDKifL{%bT~*;8VAx?%QwRF$;4 z08>mGYOpJ7;!aPqddyL|3QFq%_d->uTcGc7>4j$7uplyP@`c}Z^Rx;a=Bal>IOT+L zXs=8}9P?I%l@T#k@?AE(cU*LaTW@$mrY??F7jlSp@t*LV6{|jYBBX-4c;U{l!)LC} zYuRky%cE0O^w3lxmg6mZ`iC1&@&ZgaMygEMCGj6O((wKU zzh476!xmW?#||(i){@}wk&j)_jr?jU0{75+1o|QKlw0`0u!i~ zWk2U;ED<*G>afksIG1oe==BhItu$=NwaM!~We~gPdC~efJOM4!(5Y8y4|0JCgCLu!p_3 zc3Cq0U;SG2NtqAw9rdd{u?Ts?-=Ytjidx8yebxA8@v8bg5-;h&yE>_jIa)Jeq+#AK z*En1@pYMGygt-7 z-kDLq9^YfTB*DoW&|~N^PHXEDj^PoVX_MG7*jZdgr~ESP5NU@UuOHTAs|o~}ozpJP zL0#!6@PlnRvqbDDG9}JkD_GBGt1GHiRsjO!_bz{N;k31AJN;a5X|d;<7ba>!qk28c zyJ*e)V}^A-u?nZTbcg6O$CKJb?*B5J4`VdA%X!`O`Iu`d)c_^Q%7Y=`0N>DOZTZ#l z@wL|7dXtXd3IbklG1w^F_^S6tqqqG|F}64Ak}*H^9P66+pQ5s*``y6-{MZSIGL}wv;BQa;WD@zyabH4Xz8T8-%ZRs}9TspFDupM^WaGr=bW6N@GN+d-7n0lqsL!C4ELoZuu_-1R1 zgnz@Q;JY@N*ysK>yRtzc2BShhu4QMxxc;$3=cY)fUo#sdY-6#_*VZ2YtrATEe*j~` zEg%G1KFiKbw**d}#S<9>rmg3We_CI}9o!FtVUM4lo4dF+;`xex2c15c&}96eS%j9A z7UB-1SF>tLI<2Bucq=T#;b)X``gPO#*O-lN@S&2_3|z0JW5oZV8UM=F`qatgyPxL@ z!p>8naYuZ(@@u)z>o--|rHku6pFSzRl~l8Cqp~PT>TXNls^7QM)Cs~vyygEO=V5Q7`0R-MPQ zJ{_l-?OcqykPzl0iQ(>Gu(p+5Fvw<*);awhegeBNKKc6-Qnlcu=*qQanKFFWTaogk zW{>f&)xWeQiG>;;gNWrCMxej@|1mNkuL}P{0QP)}h~T}|d&JVkr(%a>Xi2maF-stC zNJfllpCAu3vWXL?6yNf*!+*u)+M8DN_<56aA{?piKSi1+hpFEshDa}ngvg6S3oaKa z<^-T$@%ZhI?W81L8Gi*iv5Y(~tqHDiktYD*Z}!g97nX)DB8!Li|EVZUcARQaMjjDi z@G=8-<1YM(I87tD@Aetdw~1V1H77T`*^uK($P1AKw6xff4G}uu=MA2iBY4$yZkS8} zmh27BiP!Z030#j?R?2@N**Wp7E*tKzaoI>@g+;q}MGKu_0fW>`IEhR#j^gcgeInk- z{Uf#Y__WQJdz#12)h`e=nZ= z9&*Qs{*q?-M37Q@Ku`)rcFj^uuxQ2J3u2ao$PI3wSD2&XlyfX#HiVzm&yzI#aS>i+ z(F&>idbaoK4RPRq+iP4y3oO-81w|q$aizLroBl`1id$m!?LB((9^vveAJAS%%2alo zE#{Zlh`^a{zOPeKR378}%}(3{!-d0L((u&qfyOZ;3*2RhW@-(FF1Xnm%QB?o)R1?X zi2u#Skow}3qaSSU$EqQe*LQqZk0j(w))GC%O9HTO zh~DBOmJ$AJ*x|(AitDjGoUcT##?@q{o@X|}Pl?f1ju@{4W~u{0BT=0qPW_J_zd zxDLZv<@XK2CS!Z=bLbb(C_)3Qk0xv4ky% zK1}Zw+WZk|ZLi+3Iz?uH7rs&_4fSm7d&N^f3}_xk$LE!Z8BD?pV{9*aQlFi^Q%P$YJbX{ z7?oaA&>Na{o4nExFlqC3aLMQOy@aydUIrUFhUD?qs({h&wt?+q} zzH=>%NSOgy+i&~2I5ORue59mu!(lOSF&SMJq>{Q(x_kHR&VA{5>I$}xqvCsA>5^~e zS|DMvo3=(ZN46XHcNl+<++USce(=^i<60u#a^^z}soF|^ykllkS}+T^JYG6WI@hqm z-nrcPovz^MWO<-xPVvvYP^HK&yZ6OYY!&h*uU<`OxIg-teM}7H4N6yRqr>InFa)5% z_#s2zC4*06)gDeuo_nv;({+y^rNpt+bWsz|Z1u3X-Z_FhftX{6e($+JM-F~qPhH#& z@gS1g_T_8l>TyR$G)w;Sa@|Kg28ds9WO9P5$Vco^o@sq_+`j~J&9Bbz( zJHyR+dHc^P*ObLuo_#gJuW1xV{T!NprWvEZFY6iYe1i}_uK4o!@g)SAQrgJ) zH#BRj>l_q+B`C8?DN!>dXp<~B-h4SeoZ>B<>df$n$PToqy>U4I`Nkc7_f(p7=*8BP z$OqYEDl~?5`<1>-$oEn>@%xsepNcQq3IY$(zsJ>FG(YXNzcf--2;c02 z6A7L%w%~K6k3MyJ?-P^Dw*@I~Wa1C1tBA1J*B0jLo^1*scO;EIH57esFr>4U&sg}* zCZ68Jw(lsEvc{S($vYn?WSJ|8W3H^9THjzhd3>F1< zMzWl1;U2RloXey=jM|i$)-OMa6nW;X`aoR0miM4fwWp=lBJ`^AOXz@QgSGX+m}OP4 z(tTTj!CnX7$NqUkR}DVdY#5KvrhYnDs|iycdgB#Jy<>7z+t`f$E@W_{t1?#CsUG}m zlk;q(Bm5qjZw_$k#k||tLm&OAvAvkxpyXj?=6Pg@ds76ZFQp(kaG(HTn1~vW4D-g) zZ%psX>f_$ef3w-vYTmg>DR{#D?c3}?LSFK18!6CNZ>t&-*o|u;N2j}YpI3$Id_O2q zFb;WsWh`8~@S z1Jb4{$qxiS`mVH{s;$k8;4&v|re~t`@&KG0I_NNWNwakA*T4dkmI6Q`czAVRtN4gR%j%`PkziV6%OPVyEv#+eNcaa}-I=;NjysuEL7W?h3 zXv2fcf>mWzEnz0xGp9-A@xBTwH?)!*7G@7WAL*A`x4>%h;a&99xJ2(G^QUspbsE*& z!kAtWfH`sZa5TG^yY?c?Ow9JD+_%rFy-x%!h?uE$(eRXNC zwdg$lPk3^8`6_(l83EuyUV?A%68~@`!dRJASxo!UO z?)uY@s{_S#s>eJK9M5nMIGfvn->j%fI3Q-NlKVHU&D*8**Dn{9m=FMN*CBk2^*lM7hrJQX6R2F&TnqsnrN-!rJ?e&u4V(zcV%n&=RZ@n|KAhV zwsj(e+?jr;5-yp@r#7Yaw1)k$d+t2Ly>ISvw1H~bgG{7=W9IZ{yYChu z95$oVeiGqF=4Zz@jt)ORd%qG|Fts&)FdvyHB0r}}xd zzWe-HeU3uqUE%&u{bf$!S9xX&^N49PvuTk z?!+i&mR(l#eEq44y>vkmx~3{NR&y=Pa=GRjXYany^DOY@ItnH2N9N zCwnd4+SifkXbN)b4M>hK4%UOA^(&2??->;*2Qaf=IeP|5VBR=P42r9U{8}Lq| zylU-+V%a%5cwtR_Go@3ggd2su`+#{UuHD|J>Jw8b%NY?kr<@_Bdtt;P;X}UlG&0xR zpO|t<;ZfMBiLvdpG>@+quh+T624LNF}@Xdx3y| zUjNk^>61XN0u;n6KYZkG{p+LuJg^g6XKz1G`$ztg9&Q0{UM~OHNO=0l5kF&de)PnL zcq;SH_ld2vo4>aw@l^QnV>c(Oa*8vV6m`-H`v-LWRM|Pi>on3*5>gV<*JTtGB%}b) zsk5h({iA>Wm-vDbcQ7UK*i-wU3BpMr95MlPvp=o>`TOAmKpj#5Fs)zUT-foyWfQV~ zJpS+5e*T;K{kL}e?-Itp^QQkjKi|Lej{iGK`R_gdmB3#K{FT683H+77e=7+P@IiqX zl1LLiBcBH5rdx7II}-rRZm;n=-XB&&MO`S!a~*hKA^?itBuFW?UiQB$G5~bT$N+KS zgj_B^T8bbOF2jHI0gffeCp}Q=iChrt^({<@fY_aroZIA zRTuznRmHwyWSqsU-0a)6SU?im*aA^(JT)npd&BHjrupy^aOwm@-?qva3* z3+`)q8AoRpsEsMYb!q zAhJ^@Xm+p`f^F&Ae(-wrr~lXpXIW-F+$fUk>Mq=$O4;s7)VTpqSIfTio=P#~|9;tH zzpa9`^u18O^YJ|<3h_#)xK^z)Vu#ACM}IzrTJxCaeK=k`wu@PFzhAzTa36#M5S%D^ z9e{!q3$_Dkr0918qUJQ5ZEN91kQNDg@C0CS-h&O^J)O5B2 zx06KMbF)z#R0tN+DZ9>s5?C-KHUVv1J07PCE(`g0CB*{ALEM#D9LA%cp+p)J1Aae zdp3}9p&ebUNI*Quh(sSl&Up_(MJ~~VBKD6atW_v=z~V{Lrl98gAr`D1q+j!VT9;yW zIMOHn@ZI4iTtos1A0a^e>m}_ifO;2k`6K1)st=sz1He)c?Pb;!^U!~U@oAkvNMiK? zG?W!XtSzu9*)&-}Uq-1|xn!YtAppPh3xL6L5a3zxql4Nq4;2C`&L5eD<2mP|3L)D# zn1>P}!O35oVEvdt7^H3jWElEl9te|4%>g>(*T7#rsB=dnpC$N8-`jOOY<00BN^G!j<#S{{A5^wDFs#hZWu@(`{jG574UG4%CHdhKxzIB_W0 zk&Bmd&X)_gwLSFnVw-o_%qF zIj%VBG%*;89tHpU;d{p_}`!W(V$c0cdXU2`zYL(mF$immfOrr zxIB9eTtS!AFhZt?n=3SOQx?uH;kZ!Xa04bm_ksj0Kg1z_OB1B38F;KO@T9li2oE`Y zVJ6J>Q`c0$SgDxiun|%;;=DqjZVCbWJ6l7Vs8$I(a@CM-Iyzv;^9-}wwIK9#*7AjXfQ{lvZ9SYW;<_5D>xU`)-0^@Z)82tTUrkmb6T5JZy=F zm4a=1s8O8lYvCx|JkpN*z!WU4&vN`}id5dHQ8b;;77el!%zobaDCX$Q^Y?_B#71xE z4^)mBhaADS=ZruW00DKN%$f`cz>iY~Ne}|x)Pty8RxjPha33oI^_-#dqwSc6V4!9( zr1vJENABBa2p$9|uV;AHXSx#zSdudNH@?u3LCJH)=e9V3nUJZGP47;h+qyzj`)n_2 zjt8!gZ(@=xzcLe0C8w+GDR&l;+l~m`4X(z@7qA(KpvVf<*yEV3>B+oE%0?IFeb@db zosFzSzDJA4YnVs`IW+|Y3!$P9qDQ3!Zj(?vf~YeZQP*`Afb6)p(Lvn1b`L~0fFU^H zM2U0)6tRZe04M||%&>f%9wnp&P} zQhESYDc{UGVBHXnZTK-9zyyRg@f{)L*+%uHVT|XewZaO`-avHyoHuHD#1=xz$Af>) zNf;zie6YGaN5G(zH=y8~tk72vzM+!FP}IYz?u3KRlMhM(V19o<1)SCaKcKb);s@fB z2KwR$(1aZ@FXY8Y#23Y1p=cC^q~4r17JPkr`8x90*P7gi;_#?F7t7>W3?~eUgLu;} zXUh-yTp?dZ#7&Z5W2x>_SehM_?z8C$a+mY@df9bRYC4evB*Ww+#MBmvy)b{ySG782 z9u&P7g@%&U1fb()r&>3m3b5j+ZnePYO^&$FX(AjXAAB0Pa!%Qh{$>1l8v`)BUrnurCP0>2Q?duN|G7!*Yllc-MQ^p)1umNz5TuYCloN^~%#cHNOB%TS#i;Q`7 zCe2~=x<}1J2bzAysPM6N4!RCDE`<@Yn=eRgPe>dBgndFf^v^b<0NOpa$|bfB48;IB zHp8b;lubL(f~M!5PrGZ$)e}O~guEkGlabZ@+T$d;rh9HNeNW+PfG%ntpfn}hD={;R zylSLW+y^e{N{FGcj_OcIu35($kuq>8{v=7)x8ow`y{mlFsgQMMkKP>#Z|OaBPz*Nt z>~j+y*rbt^Cm7O+17uw@IS=@iUIBiNwMpjo$5G;a+K_d$j!K&PW-NtSk=#g1Q4<+J zf*|2y1jqoUV{+QTK-Qui45gaLxEWB`SSWSN5$YAv3Gk!9kq>%EXWIyo<5o(HG!>@x z?NX(gdjUV4(POs|+9#{T3@Q)bZyYrv&GSxqcO|=WWE9mP<+BtNh$+F2gFAxbs}w5( zdcX&uP;o@v3m{|k1$L@;n*PJ_VTsJ;sXVHoC;PprFx3zOj+mmQ=)1G3%Y^wa=R^ML z50)-g*b2DQunaJfUPt4UZK7I1NnKhd&vh7RA2umL^)(I3Ue{A#NHV#j9a`uUqC}Y$ z3wV4mDI+&Es$i~ig%q5yH= zW4xrbQ2-zl*i~STEunozajTa5E?Y|G5c6-t^ddW9MXb=z_pDN9r>=~Nb>zIru?cW) z%-KxS+!iz+%3{$8+=z!XBDYv03iV&#o7?NW0bHpjPo3MM_t9d#T6g!5F!VDnNT@Ym z?q~Qppma>BW7+Wn{GE%upUDH@nCs)c1f2&d7(`#$+B_nAmoG)GMuD_oMn0Y)adGMc zA&lpSR{)A{$JXO`(y0U2xNLd?AyjG`pj`Htq!umJPm_u1+<9LC+}kdrprkTF>8ab1 z8k7P*q^TQlAhq8JN|3H~4S^s}l*t{D(FQINw`vBTB}|mp+;A97aM%Y*NnwP_dW8ji zg(7yZ>;1t1bq~QEOPss#b9l4@irSjYCn>84@yAreDq>p$s3jXFzm5UaIHaI^^IOja zN_c@QZ0hp>2(d5`!Mp470^@Opy8IAin)77!5lsu0eD?mc3_6mFN+l17^PzY;rmy3= zY5xiSydq@&%8mKkiTG715X6Em30d)2d;e~lK4V} zhbG(Y09dvN3P7oJVW>-_w%x)I^)MVrSl++_#VvAtPNMjh4nqr&I)GuX1IZlOUxoE! z$-1c&6J`w!8S-li%1A1t^XjCy_mbyGFrZJVCQ7Nc@+MA<;-^@!Ni0apUU89C#PE|H z*i`_?f*g!4cEP!>VLresTPi-Xmt_6^`{We}O>oW;f?`pS>roa&(boHfT zB557sfHwL|6Ln=cq2`F%vm?cD=w}Jv^sXb5Sk|?95T72DQs)*Uozhx6Z{+qdw$Lhi z=Y>a|{Y4}?iY0ZYqLrJzld#I5Wt?+i-vK+I!pc*a*yNHy^j-phTEI2de*%yo zz=9Zn2m*}c02RRUn+uQ!ZQ1z%rogxq7N`JKhY;`)tiMugV$m05Z9Y=`nos~ty^GeQ z;w45*C~7DGApyWT01t4v7b6esfFx8Q02iRr%}Rp$SEI}7FdUz~(4-h03K$olb{UPLzbvrq-IgdRVWhWWfwC7ExZdPCRlHBKwUmDo)LnpmB z%pUUNkclaiVQAk3#dMm$O+O9+vy(+bL~mhS>##3$UaN{ZF#9tYi6PIaoMQBK9w`(@ z*r>(7DM(j6CalA2w?%Tm(~Jx}sNZs6COa5FF0xbQe_b<3=2goM8?CU8vIqU@;1y}6 z3j#^r3omm4p$YCMEXth?(|EG)($%ue&5h~q~Y?8e1ZFb0xy zGmb>6|LyqgO#hH$#ASO9*boBfO`WwIJ(yz=9e7`dxRl(g~^{GQHwfq zjw^g!gmQw~5Lhwbf}!`d*>UVRW0LjA;-h{VWq^<6gA@rc8%%w9%UP=jBgNX>75suY zL@XEqh`Ji;MI9fhWXq~>IjzNk3^SRpz0w;k*|XKl!5!-P#G=QK#)9JxlhxIn#tGyH+!wCVi;bpYiElHK1Q{KsPN2v8 zDCjLGzM0haf+hKwu^Ti%URgab;2nzOR4752#zVHUGm4KdF5?@lLRnHJX}ofW<@7e?9*omGz$mTiX*Rtv`@kWs$Io(s zRW`Uh&trAH+zh{IT~A051d**x12+1`6x&P{#c#jg0soZ^k>F@Aea45l{x+Ei z_;LU*KjJ*6aUb4iRbV@pnhYJZyJP_;)O7G7(}HdZo1m3>1x3_BB9uF)YB5`?smP9$ z2{m}vjUvJaMoUccIbhnzEWw|zUpPW3lx8bXDS4$C2#;^M#q0l1xn@PjVCe0iCS)$! zlr7IGQLuh8^^D7N-zb5SubMs$a~!MSEMa|iwMAt3cZ9xZtfl8`I^+>q$YTzz@yN{L zhFT7HyO?HgCIS|91wtMT6mn63y@wh<3xj>DnX98FDI|B^4Zftmmqp%Kv5iUf-D2@ho>48HxEj$yl4EyQIy#v!R3C9QLMMcRlQ26^nypR@ z)A{)mQiN0p^uB3MCsxOs&JrWjSkNhWL|AO5gPgELBXup~dxAeD4`IWV>?2m=p&{4t zj_NSLWcWx}Y3#)uo{luq4OwGM!MWuuaB zF+NXv$^^Vy8FsywN4Z@WMHn<(pvsz9vZOB(OTIZO<^A;;$>s8^7sN!K2Kz@+`zt6$ zl1!2S?T9ppV`oOyFJ7T2)J^Z@#9bBFq2|p3N6RwvP^3>?qNu(8i7X?_yYUFM4M`D& zV-bEGgS7Z>4+CKKFRIKWO4S4Ti{}X6?B{?>3;raI`8q)DlWNTM=;JJE3US_-zo>(_ zWqLePhBcocbi{p1PNE{*Chei+uVg{HDZFF2JqdE~LXJsubaVr1BgXWqVi2+3t^IMF z52%m!ft}i8qtA6Hg^V44JqJ^P0XB|A4oI8AXQ`d9$A7vk;66?q`%umZjXNJ71}6k# zqk%Lge&8WxoFa)RFU0?(<9*hg53NLt{g@O(Hb$vq7ITU;NUrh z-#`h|VjLfhS4r(~ijBU`rzf06D`5c~3#;>js{+VO{1b4GvtNz!h@>_;TlBmG5a6`^^m`hBV`Y z+3xr+^oae8yM>lz60Q8-AcER412j1jKzCr20bjXn+Pfp_J+N}NJopWP+_|f1!&qpJ zFoqxw07tG@_T64b{G%&Q2xY~@lVgAiCl%rB6B+2ihi_}eL*|<8sAB~;WVWmJag0A2 z0cEbz$p4kQzyYh}+)m8&$_seVjZ@BW5Vd(S`Yf*98(3k8Rn29LS&(m%icEO{uFPdF zerU%^p+6U)_38lFG3Fr<7UMzzF~BRK3)SmdtI>?5WGYwCl$!-)Z(^|a2#j1VusE!< zTzM0|e4vQbw{6FO z?ueHz=FfvSRkeu8eaKUuc~yLS-NXw@MP|bJNgZcbx4AkeBbyX58bE9iT{ZS7L5`ha#zuPqW|5mO!AZ5yFuJ zS3_!2$pYhVDY)^*Y|(7rMR?7#*n$a1EF{P6=?sQmWPs@FYmP2r3R#^NeOV<7oIVnv z?GagNjae75S0AkU<&v==H+l%@A}(G)p%<(Ukl^fu0pILbGo(DlG^l`Zju|h(uz=l*@1~oY!9>7P!MXxtAuRme?3h3za~)E9{%UMnuGi> z5jwTXVF!(`Kf=uyaq68J-k*bni`uQ;LbcFpMhcPA0b@?7|yQ_NkjhMr(4r z3WU5tk>y)<9Ey?~u7N@eadM;v*)PeTYyfQBdj&CZUOK)m(vGMlKA?lG4$XsA5psy6A&Rb(t;YAMKSxN!z}y5M;}6@;n;Ek4f%?cQ0jMSRb;7VcAeTHPB~o*e zoVnUT>ncg8X`mld>VZh&=O~NvVz;)|F(3;O`9JDxw)o||KmfIAC*yw327+2iftbuO zwT3%=T*Kf;i27hY+V8xV;X%xh_!mYBt(4j7cUGEit4gO`~+s8Bg<95=Yg@JMM(nEFMv6gS` z#HJ!J2w^!I5P(5YWjXWJNd~tndB8-%ck2PODGbKQBE4hl*CDbiO^{D@_btFBV8Nv= zCx`PL_OYTVI%R2mX!7f2`#SGu@xbj^=Roc6xaVDgDvJoi7hieaZb}I=~v!kiEwD;ft1Ir$%YD`Q~rOx!%a2hUEXEtiC&b9SOY^?Vkuyct4m>7b3)vWIoD z!|8ZpwPVqm=04Ge{=Hhe%xP%jY@hfqe&@(glGTq~M_SHyK?Ls26FeO?7W9*g=0hYK zOF;pS?7<>+FDuXSo-n)`jdQI3{f905BNg#6djTiN2e}{rss)b6w|s)~#a5 zxt;6#JNz#M_(R#;IeMhdR4Gk)Sv(AA`L=9#95uTu-}H<5A#UezS26DYQQhQ>ua;KJ zY?c1WkjE6#;kh$(iH_Om@l8Z7)>y!Oh~MF^_KiE&Y(4s__{m#6;2Um?<% z`ho4v<67+}CDCF@)mXK0F9a91+#sPz%V2>ae<*<pY%7$#hA>qoPXOG)@*?PRM-fvONcKdPT3Ckt2By1+Z`kzyo##5u)}fpT!M$n^Nz{EXJyDpR7G{ zh6EeM5~={6ucS3F*-ed0THr@)h3~nF@xjm1LHSUT;`KXRZRq5v{XYq>5uuDlyfZ6= zj{6=}Z_pvFv~~b54Y?fvrKaiF4*NwW*6_NRjPrrsHdwaWUw_AK-i21A_&3_JhM@dB zamrSxR2ZwSJ}NvuP0@bwo3c-sw5784S=KjcI%Jw+SWrZ9Bm+ZQlSBZw zh+PYio-jvW4+$ic?7ze&NaOCT7;T=BJ4_wwU136nGnlP^M4la%Cw{$W5^mVizH9zl zleI>fe1o+<(JhH^6hX4cE5TeNtG>W-0W>Z38`c+0}{?e1Gr6woF+3a$!~4@=j} zXb$KsUvuz2CMaErz66joQT6@q+CkMIw&A>b*hGAQ3I!to0;r3{Jo|cgfIr;JUpkpw zS)LGn@VFNB9e!?N`G_^|6^r5JAE$ZhiI)0uQM|n~e5KZS?2Z_ubX)J$gn-~rM{z#) zSiT*44KYzljo`0B-}?9vS@JrxpopQTvfsJ#N}^*zrr%N4Zh+;6g(q{R=1KzUT<@4J zwb=E3eDUpPbcG0FQ;tO^9xC||k36My@t8!{v-x1smUv#i_Gx_)LTDqSL1a4eM#|OZ z-*&jw-rIwSVzJP?WJ&w8lb|sY5yrPM&>i}xt1fgSh_qwR{Mq&iYQ}G(Qt+T=n~dtR zgRsSIhV^Z7i&rN6aRT_^Cmdkgd%i0QK<65jKI*)KFUT~*%Ko};5q0QIq1p=b`AbBJ z1hJ(NC)P@6#1j@f+okJi$|cW=NM{_dx7yy98isB9YJt~^qmX>uxe}=3BGRLqn6R1` zrOo4;hC3QK{Pkj*h?-aEwrxi4ilE&H+LPlhS(W~4YddM>?C>?ELyUG@HS9h84T2wF z_r#XF6`D6gBg?^|b`}YM)vAd(tCIHyfRF}HYFJRRP#Tqwv#g2$CnnGIGS8`)y~&5J)9>ni_Nw|5{ag_z(J|sj)fvvKHVgP%)i)=t($cnWzEVn~Cww8AGnCKDC_Q;g#|+(ln10X}S?uy_>v;T2l?Q;hBc zTb0pF;02n+{*nNNMg1j(mKJl8SrosLHm4MXTCznY z!sj#Tr#knb(f1-IIF-2<2?tcmsYoG2q?%oay?c3C-X?L~Lp*8ZDk%CTFBG5v?SFXz z%>|w05Owo^5cZy7O-0?-=uS^4q4ySgm5y`?9g(gGQY0V>iV7$S(h_=af)quXhzbY@ zD5yX}5l|5j5wMX^1e6vZIFtkFu3O3S6mt zgkp`bS8;MJq5kqza7{)R_wdJi{hl9@$~Zi|VJa7W{r4rbg5%>;$6Y{3Pg6E`++ARu z?}3|cPvl0o4o>>OAsnV`SR!rw_mF*B z;!dkU&vR))O;v{RW}LhZ=9ekY6 zBqQc|W8_`hx+kN-ZO6M+Y2A!YzeDI3f394({x&$a+3ya;;SDjrxUQJh$w3PSz%P{S7QvP!fd!@E~Ref(t#@VZjef=TsKtqPt zx*V48Y5l%I=T$6&6Y~y$LQDY*Cy3-_Q!5SY&@I?bbZ>)FY48-srmcL+!KK@}ho2k{ zz4}NUu)PR2je%+bk-RT{uRkjO_6F+OSeV~pu^ChJy zU$4&{D-a2ksrGF(9p=*TQsGol&FfuhBJG=+G{ZN0L?tD^tKb6F_8bqPL+a@X+#V@W zlN1?5zvT1QfH}oQxqvj{WdfnCcFseOY>-?Q-F#Z+vdos8UuPG@b^5TgU<5tr0#b9 z-8Nn7XaBnzC2A}KkTuL7g!&O@Oq1b5v@7B|BN#xAnM6>M7(@!n z_GJ3G!Xx%)(HPiWPE0p8L+}$G7-@(|+W|6&VOrsnt)_#Y0O+xov)mQHTaz&L=fvkF zFFmNqv|5Ssc3B+taQP&wXEXFG;SmT)=KGAnaI$!=(t+P@IbK{;(qvqQQccDKh5A&F zezT_mOYn0qO--Uv=n5DMCk-xWtWSf=9nwOUj>|&7Op6sV!_9|vSiwrrWmxPwtA4>g znI$8ts%m>Xdi_vBnvqQPo4TH=s`7EBIQcp;7`BiKT}rcOb$L(i;}Ew9Dti^ z>`W|<3PZBY#7VciXOzX--;1tTt6i(55xPmVk2dJU6Brl$)P7&`Ag6ls?|Vm(*V?K7 zsv?LvA1f>U?zNB1O|vGkt^4I(0n}3J6DqlsZdGhDBj%$V{gRz5afwc?1HfaAEmZW& z(Ue0DUZ~1X?Fa>2m6>TWpIfVV3xs(8cP@m_2qG7+Rtxx;6t2|~Y8`(j&9s^*J{O1-ocYE5PZoLKwPd$G$CpJV|Ci=IG8UY~D%j8f8*l*-QOz}T&@SIMZKMW!RbCc+R?n;@g0tLOHb*}k z%gsIz;BYtzZW5zqVw@bv6w~U+(dTRnhY0r){mHUB;b+|#jR^CicM<~re1}T$axUo< z5|lD32*{$YIEKG?U|u^;YI{eGSVp_&*V8XtUDmgF!}Z6s?sM0lVT~G&mMNT+jDfwx zO!tTEwlAh<`oS$RupPN`ZODK#4xw&5!FB4Vo1?%|n((`aNG^lUAxPn0 zZeyCKy~aHczH*I~R?arglb%Lw(j9J*GjM#G7Md?L_C{t%G}rm-J$U#YVnmx{xenpo zIeAo_(qxdanB(_3p{>TtL9I3SedYd&(Q4V1j+|Ip80Egd()0c&vpY@@p( z!m>N|a6K35q9-+3E=?=AVaFRlCc%?%N|WWScPB0snMdWiJfCywy4Og8J4~lv;m5wM zSoq;A?Rg~&-IjQ+wBcC5Fy-HmV&A$7a@P~YF%B@bdJjQR{p04hh9C?6FtiS#k7;vKUU)i0Be=G&5`Nwy%`T9hr&31|KgE#HE zOS3wK0seDx7)Nk9p%f=(xVPmQv zsBZYyNL~bV)s!O${nNnb$|`f7IWBTsUGYjSdy4g9a|&27soH+ihJ=N6@?HYL{arv> zD=7RconL9lZfyT7rl#x_5j;$unI+{I-Zh#bTzHuwE`m6JD#s{&K6I7$21$o+aISkr zwy64+Ws~zraRo%_RuW!#VCWLkVj~FL+7ijO+GqVU^HN|w@Xth6is&&LePg3$BUr7# zQr=v1-`xkF9gf=({A9IB!_oZ-u8RK;bN~MfHvhlx8~2Dy{2?XX>y2@Ylz&#w6@!ky zc2Vz9He##2re6*8T>8tV63q*)T#fcc7Mvl+JiXc?XtN{>PU0T6t1|Sc`|jOAcXVup1Fs~4_*+w)WGd7o)qjf*WjVm}1iF5DE>bA8dp!7+U9i2K z$Cq5=17`0xMEz7nh;t^1Rf`sNjO0Lva63+O!7GdGMl6z#(y=jN8kL4^(AYhwH-Pjc zMwlVvzFZlxgi(JZkG(q71bd0@YO@+q61-qn!*3xCa~r)YPd9?;GdeGb|Ew-Nuc6^|H4ZN|Ka5EX#meM}dgj92?TLvO$c7mfuru+9ib0kKkJj&} z6^Us9YO#p3^_aogJ78ok%UG%KEGC$m;Axts=CpIeKcSG*GI3Jc2xSY zLH;&tmV!T?3;^CLetfTv?Qq_lCTM@;{9L9BuK_<_!{a z`+~Z;M>Eeg)Sy<)pBqzy7uEo_uTs8bQ+-7|UIv0^L1XZEh~^Wc?v(9VHENTD;}xe& z%#Z%=+6al6U_a?CkzL(tw2fc)72Q*SL0ZDDBwWD zb?i8M(e;{iq#(eB!y*BAI)udpe+99)ScX{*jaMfh68b0hjGs^umn-z=OXB#`=7Y+R zr7NVFesD?X#qQad6ZQHkKuX%L*|OI9rZBxT?;eF8uFnQ8vwSpu-$)%xyZe{?6`Ej_ zXy{loxx@M-{#H*RY>AM`5>Z-N9ILCYc}vFSX01L)MZ*iv>gm;ZVvt(yz#(O4^XJFJ zTM&x@-IVdgwRUxYz@#xlc_9ge^Dym?mD-mhxip1DOP24~lU8wR;7c?+Nj1{o_-+0~ zsng05#$oxHEanNs{kR*75?~yzl^dfp=a@su^+_Z4jt0}Xa`SehOw_jNkU-5p27^w* zOV3PrVsP}rK7^Rh7NMXC+WzZkl^^ZC+@7SydqCm+SNjqUlo8jqUu?zzcIF@LsCOjx<$Wo0Ys%sLA85~mn5;d7mJzw_d1oLkA|ZysIFmt5U~QC%wtzg*Af9A06TpwnCqa5mFk4ndBN zQ$oi3@A7QdFTkRFaSzs@+GBBlL$aTM5ynn5zT<~K>5yl4&!WJlait%?$-kG*KW#T$ znoD56oc-+qEfO$xBZ8Df z{yG1zFs6`=ZF%iBlCsbh;$>e&Q2Xe3h$My#Q6Nj7s3P$fFpLWHSwDc0PJHhEEt zkmCeCo_$JhWzKDye$M6Zt8zQkIQWwxj;!Mt63=Z1&mg2O_1Rv8x%dQ9YkR^q57FQ+ zkn#>zMsdg<`}(A?_4k@|XQ!_xA$M2iN|I|UXP(keCRLLZo{5G6*6?>)?EWOj9}+|` z=*5Z?m-BuX)_qClMI0D*&Nb>3e~ziAaVP!aY?qgk?gHi>YDbX~eZ#FAM=_9WtQNh8!V&EF7wjtb~xS8x9bX;BXCm5X2r|)~? zk-z{c6)6b4zy2uxc@w&Qk8~8M{^TiODbgz(yE}s=Y3LLI9T2zqd85aOCIBxvy{Nw) z^?lKJ4P*dVwO_w8S06g5Oi8HA`jEJO*~Ju_0JtMdDr*v37fgIRt>hj@j#02AZBpOt zY5biP>K4l1p zubU(9y$C`U`xQ)81Ebp~#%>cFYi@WI`D?j>JLLSQ9RrEcrBLIbM<6(*oN+K>V7%WI zzT;v7R&#Ml+;9C&@-+8-^l&TYynMYvwB&I|&gGG~D<#sbJEwLJf2j$_6vcpa)2pAv z6!k}Ll1lEJlTr$km}bHi6no~2lSfC3gRwdtebhIor!u4Z1ED=!U;_71$$`D42mOeQKl?JGVFGo9dk0e`_YGVPx6&_v5g5 z_alE3^M=oZ|4<}tkNb6fkB}yHh;2bs}5CLOmYsrTC$Wa3xw;hpbyPkR<+(4>{Z}y2T zu>#iJj0|66xb0C8=8(l1QvH`L+xMcSzG6FX6Z=kC8UHoVVo55@n5QCb)LSeEWzM^# znB#G9^5-<@c=qlY;eysU?;3U0|#hH2+q(m z?APHkeqpMSt#~Uxsz5Q3acFmBEmfR>CekGrNsyGK=cb}yx#z35$E`agJQG=y6>v?8 z4NXF>9vdA~+U$>Ky5NIJ9owy_LD=*4YVN`D>J_`2lS0-lSRu6}_`_=~N<9jH{<$@F z@N=wBN#!lvrz@wZ@}bS`!S5B-@`e_OTiGlx?O0oqlo@{$%5i-qK5DU5h=}>iewZ_X zH>FTVLlM6p?jpHYFZ&EXfdt1*%AH#;#sSLlOtuwk$c(A{vm>Q!U6JsYkO}sHM7xCZ zJjUu2-}85lEXH*XUQ~tnL}I={tT_S_Wi$;q%IZ4MGDqiPx0!m#PVGXrhoLOs{p~1U zjFzhNZiE>Dt!_aQj2JDupv)v#m{w-rwlJNJ>VvbgTx(M7O+UZ=%uql>i=7Bo3tnHM zp;eGqGgTrDKV?~W@nu1|&F`JKR7tway0Xyv$=pok^%u~>V#_2{zFtK*PN3|?iRqP7 z{c-^bSH?s-NUbJKE&8w4ubV1ew3T)Al%U3Xdb*qXwc}r6BEQoH>DdIopti$b62afu zyPg$0D>@o7n4uysMNbdnR8{n*?-}H6q18F>9}EC>=Gp$;N-i_-@QFITV^M5gx(yB; znt>?aqo6PcXXma79IlhF_b!#B{A=8&F77#}XoI!+`DY=lsiNE=URYC3@v@vxFBV(b zt&jC>Xps-0P?uaBx8R@cw~oN(W%Mc8u)X-FuOd+2Nqx3_j^tnFTO#z6mGde$1CF_) z#^qCIW5Q?L%g_9>$zjmUER2=omtc2Qs1XC24cW9|8@4-`vmdKxtQ@_(@dUdPno_;AGzHkz( zXmNg`xR>8_ep1zusN~Q-N#(lwVg`G_G)&P4jwjkK%*wL@9Ye2hn%k7=*ZgtT~ z%929?HB21I-{Oj03Art0n-dWuu}mXCSoGAPxP!&JRRq;^C6wc6V#)0|EI5_pz!aD0Ho&k9|$Xva=PYnl3^zU3%#Rf z`)tEIC_Fcd9?)LyNyqO0lAOX#-AU^J%=QzBc9;c~(q!IEv`REI!oh+#D ztBhN;7k@CXT$d}qAzeevmnku`teN*4q$_cD31=gZTlCz|YbO+o7LA^@XI{E+d`jkL zQyb%A>gWYbU`zP^>X9XOv3LP6g4auM(SVz~cX0KQa86XGULV-Vx5&tsNY)T^0T-d4 zFQaD}f{pLoF6PvM%TNF+#TJbNaJ;urbknNjj+shzy@8w}a!!cPs0PoU+o6AARQiSxH%X8TxecNrq<&iX2~l0HXqI551n7bM1)S zwy1JmN5gAycpK#l=E4bYUTjSF5GdfYvb_hLbnc7qw>ysmB!~Xj%bTEi^nO1@d@7g2 zXp&N~@XWU%c9#UT7`);9D!q5yNe|DRI|Illc1Yx{IB0|GH6# z(At_$!jnfsg0UhALz((+3K{K?=Cb=iWH3%cJO0Sk4?TMiQ2Ao#khXvGWrYBXv?Cws zkUv49p7oDI!(YXOWU|<`EBSOINRJYsG*cjZN@~K83l!HZ^sRz4QjNH-!L&oUyAC4y z6yjZB)UL?LUxz#&6iS}a>5pB{`ppeP6OOih5ocf0sCgSeK7Uq=|0nwvJ@9nsi`8V} znkjpFaN+WYA(X@m3Hc9oQ;sU+r=EI+{1z( z?P_xiOR*XQXxDSN+CeuEXpRM@<3||qY?H)@kn$1mOT9ix_?6<_!DCx&nuSNw%i==Y z^73u2GiX3ZTKOn9_Id1@QP3LCZ4XrFoYD zNIvIF$=4aN%pO_HYYaz$f(jvJonS4rKdj#(+!e#%5~)T?s!jW;3?+^b^FJtk0xQW_ z)TeMZNs+%$qUhAWCwV$;Gjql>#fxRe-B&r2AEM*U5uRmmMTz}lPpyD5kR{4VkSV}C%)C@iw3di}u zN1~0b^^dX^l;7JG=5W?&jhmC$AUbMMHuPgi1;CN$TDp_)0xVov(EOO$OI)gFDJ`!-Q0A7v#sub%IXs zqapuj%^csMv?&FHa^H3ZO>RVW&Gn)K!M^T&->Em?Sgpx{&h9fMIVJ2%2W^Dgk=ew@ z(g9C#j@=?*mRk<|4Dc8D zwukg&Ie{x;<-0!M%wv(+Rh7l;i-dqW|Dd#yYlW9?$FqTA8 zN4G6;aSqg<*Mwe%=sYPC!Xi!X?8At9|09qp2*Xuiy25%(*Q*d{$isRLkm7+S@t zHd87vQ*j3BT-TND!`L^h5_irw0evi=&A{uONH#7=*2njuGpESkX5y)L=@D9P`>_wE znKOnBfcYEN#hRzYxw|d1@5tYd_sH7rhy6VPtK;qX^Y$3bWoGYVt+_JC?OCM6f{}3tKHAsSCAG~-|4oD+E zeuOAKz}z2~(DrMXV%!zaXz5oqImgKyHg7p*UaiU>r5~f!pU^iskK~fV#odT>^^Qy5 zSSPN5Yf#RVb>ifKA|ozce*l z5JN_Q0-ri1oPk1k9B2#glK2d<94%YE^G!8wa}s1=zWQnc$W*z&h(b9kTDh@wJlCmF z65OguNO)~$kJ=3T7@`uhPFLK2IpI-FIB_z;aT?6I77m&|af0=Iy%=#xqZ!uefd3g* z6RRgP8%QPX%B8WLZe(0-kF$KnWh!ahDJfr$9yDV=os_tiEeFp>c|TpBgjR)H=CHP% z*DTyV1ep)Q<&LZyxCx>$=x(6kAu^ha@pOj4vhzQ&XDG2>Xx|C?FEt^)zU=^TW(@UI zX_A*4F=VjY2T)wCsUz>P&)Vl^-Q7Xq(QpbpF!|#(kYom+&lH`x1~#&^{pUELcbEvf z8uMdxF+A$CB`m&!8R@`X+9^K-=pC)x#t@-HUYW-7NR9?{{t^Vh4!VLO6eJ0>SBMEV zukR6O9RINz!H=~NW#fHN9b8An4@^KrH2k8lnOF6frc2D5&HKMM8(ierL*%}r-URoB zWh;BVI%L(lKy-*u!t3v+ezhfqz&?v7@F zsg52w1pB!VXhgI`g2f#315P&vc=(<yS4fJ*--Aj8~Ir z0lQiKbR5Gpi!Q@fyT!2^{}?OL>vYb)Wh`L-!~^ugtm+bk+V=25rMmbg%GT@0`M8i| zobnI}UJ>6rknWC)|5FLY)WA9>)g`|Zs~)ZZ+^?wzq8>L%{kIq?2pd4yI^b{^1ljSt z3+Q-DoVQ5qR$uHyp~|euy6*_IIWNUD`~i`1smb4&OK7H-Qv{MIb>eI)qFx%Y0ZI`6 zv@r}W!2aIpwR$96Ye;-_puprapWZEOl?$IHe z{pOKUmf(^EJ9GqK%VaqdVy;MuAL<64xK2R|p#w9$?33kr_-hoE&*>TPqWwP(5+?=L z!6bENM}lNSHQnCU;~dk${LMcNG6XFGXV7G0qd1^d-qu_^@iL3{=&>; zswKAIYVgkWbBZuUk$cMr%0&!eIuM)VKD#9wAgHJW8d+MX0)F;vd3{{2CC?Vg6hu^7 z>c9BMmQpe*+hCbHkv#&a`Z|<-5^Oj4_dv@71j|v}seDOB+RBQx9oQS}w!d$fkh>>C z3X;w}IlwmdB}xf7u5a!Y{bvH9mNv81{7zf3*pffs*_tYf*q=KQ0S(;FbCriq#8M?z z`jSriGzz4LowjCq-`BWKUb2WTWIysxhyvUmM3){}8x4S*n+OxweuOi2C>^1Yl1wFm zco~Y-{YLmB-9>6SYr1Y&6<(moU45+%^ULYSexJ@ zI`I$1u01^|R^KMI;Gjt%p`oT)@&TO!=k<6(qG6BJ2et%&W+zQ~q(yqF6@B){?1qF{ zc)lp^A6zI7sn!M8?W?#7@HzI5)PrZt>Csbr{KaeXE}fK{h~|FTlO>cj{`?pRZFMI% zGx_9>$p_O@dPH{oqRy7_>+KlXbb*J;ZtKyO-zkH@F;n8`o_R`=uTPx`B?Bkd1a1of zZ)`^>c=%~;9AFUzys?O^C@?5b?%Mz`KKo!?(ZWf3pipqHlM7BjVjt{YPX#N+#S0Zr zh}{|Dp1W*$q>iD7E8?m2x$W{-@-jA$)%2Rpzw85I&JJay2jbU+w>3-VjdKxoHz`V_ zCIG*f;h1d#E827XfZTVR$+*wyWH>JM%X1v)!00Z#c}nqle=|_D`{9dBb!AJ?} z0VYxlM4YurQ}9DJ?^^o*8Y-bwkN%m1IRJ>)GL_d8Ms~lg@OQhMiaXgqSHhUQp5=NL zq_Mz46n;hB44|Ekd8;Zt=^geQJmjAW2Ut2zqd$1ca6~Jv>-C(nsp^*DT*%B;Ih$Q7 z6>!L(mSo>0{0^tC4ylTxFuN`A3DL85BFk{7!ov@!0|LB*&+e?mGCUMpY50-M`lzAs z)j9}Dr9=no0fr}vgWS=T%1pz|zCwn}9$`HOvLm z*IZ4f^8_c89@M1`@m$g5zs$QMlb3Y#OdR;GgSGs4LbdKfui^_&GZ=5%HOXz%|ybLs_JqWo^q^Pu7;}p{wz+N2*cfhF06* zSF(1-F2CLex8ahKW|&jO(wT#W5cU@)@web!3mmK+-8U_CW{$rziIelqZ+d9EZnA8# z#TqH4Guzaf>htZpjIgH@>oVk;-n@{VHCX&V8tIh3a-1W&kq5?^qvvw3Zh~NYhanB3 z|CaaM(RpsE^B@IcSuy-}DF9NR7CU5fMbIU*ar#V?j2nfB;Pzh~%-o-Q75Y~Jq!BFH`Bfapm(b_*`V8D~5YKkXr!Z^OrP2)Qn1A?qO}`p~BZ z(u)lAtz%j;xpt9&!eOaQui)blg(4jEDD@p3keeO4A%U3Z#3a3(1XpysMM-H6;d~Ys z7(1rtN^xFR5E~br`N0t!zI%<}dL+NHs&bwaC;NeES4jjZ3IcdUw8}fA`b%>WZC%pSO8lvY%;?FQJWPh^Dq`1B$;pSYF`TqNdP~XQU!TB{^ zX0R-f%ux4*esZ1$__0ps9rLR$U1~k(5q@;s=Ai*|ZnMZp@PiB_3HbU`WYF8asC%>h zL<;zqQz&rw4hKF2&;e)!zz}Z-q}u2f#!G+WwUJ}%+MvNT)b9>r%P$+M|1x!@lEIiu z3GKdopM=v&gZsazmaw%CdZXeh^iSsWHPSh0N*~Wh zk_)fZ5*#LPtTj{Y{Y_c+L4&COFi=3yD~4(Mj)#U>5Jm=tI3n-2;mnMibrZ466bsl4 zb`L1DYWDxM0*~CHyuVy(^q81GHpaxFm?UgHRT7JbNb#M4lccB@QY@`yc--oEGSh0T zKM}AD(gS)PW$_8B)1byW7-ug&c@Rt#AV8C*T#GN<=ASFa98Zd&u+^vdw76H{FH;ULUAr~Uif_mC%0iD)P)D7=>7?(5X*kBb7Gv!_{OBqVYCr*pe(4C;4j0w z2>5xPe#Oz!aPj&XKn`t#=SfilOx~WeS#=GI2QXLhi0=WIAb#U9I3Voh$Q+Qw_-W`B zIwdP1`Lc()aF7WN0b#7kbau=|-><2>>qQU4w@nh*>}H|pQN>kbdX=NK8&jFd9AM|MuG|J?UJXg{wti&WeC z{&e{;53Du$axcg+5toU5pZg&_yz2!*<)3$#ITfPqCdhcF@|k*X^obzYiAOj`=w8WP z*dBFGnvopb*a`1Z$&AqlRTuQi(Y8Gwp;#++J}Qc_1&zK2*Z zj9!b7wOc^WC!_#E3Hdpy+HsyCCgV=L6d!6n@_rATCku`HrG6!qM^~wXxgjU*9Xbsz zd99Juqt5oTuh% znN`%aJ^$mcxdWsc3{jL)2WU{CQVYnN zaFcC$p6jMlLV1FkTWs;iudxFx9@jtI@RDKD#t}R|=NJV>QV$K?xFI|8jNfaRtCCB1mba;X3a%NU$s0V>? z{caMh4JHnwA?PYIAijP`Ix(^NuDtM3RpOhMP_v{?3tz`OygRmJ?BYYXQHGgPfTXC2w=#Ty4U{ z&SU~E4-y0zvs~qpb_sPH2YXl=ti44+$Tz@>KLWRNtkg}xkem=l8e=+t2GfP>?s82M z?qxZrwCXcp%B}r!-bG}hpM0x1xGl|e5Rm-bR%KrSiDS4?*dj!^Yfe#)@O-&y>bSIx zka)GOqYkxEzI2Nq*>Cn=Vi@##I1Pb?bVC zpXOuVv5j6p-#(f%+(kcustf%+LK@;UzKHsvym`Xf-0GA>z$f@^MP{!q;tJd8^U!=~ zq0fHu8x)K3xsHClpi`Xh$=`8ugeP!+^2pxkVf>V0@6*|uli|TtxUXmHSE%Fg>KoD@ zKko1RPbQM|-WsmuHgRAqzU0)P^&H&amQNwT*0eCSrOA-BCM$^v){9Kjt}8Eg?Q38e z$hV~wSuVEG`Dtlu;~*;7$JZI+om!8zxr_(Y|5KXeN>N|}pL#8=*nJ%bcHT&y+5osV z6yz;KmN>%+_YGPb&l11u=v1tzlh|_g^&D@hXqHj}2cA>iAwP4y>k1@hb-zRVK912x z&$_K>_2=o{iP~04{WbkjAR496^P)Mqf=#)zo8Rc^Rcu=TcnA4aFeNHp&s*F9{b&&c zKdtchrk9AwN<^-{Zu_*s6VBdwOaJvt6qAC@Ns4S8grV-}fOV`cJzbeIglpGdySoJ*d9#$IMr}g`Qry}j_fSG!67)olY%U0a1VqFGK=v#TFc zT6sJtBH#Z6R9{G2AKQD%e)m_j6-X|hj?;Fk1OJZi0mhi4t2N$`Bj zC8;GUDP$Z6;3y1EfJZ?SKpi`2EM0h?lf}Q3kEZNQ`mIgLQC|MCS_+8OL@JiNzqkOI z-i8_>OmO^e9b!NIs$Hy)O&mT&<6#d^pKw0nzRx4c+-sQS1c4V1BtGSFE=q?1~;2NyF@AJdB*%Z&eO&2`F z_n2jex_m23eHGFeT_OO^Ts))^H>Nqy6yvyGkCmq!h-a1zwxmlJsmBeu_a5A@>tqWu z3+J-mpdy&oczm2A{XhaX+vxR(`I|TlUtNx4H(YloQO$Ubm#yuY^t7PmF+p^XWE8x{ zn0>v&-1HrMgd077EJBGc%rdCjHZ48ljvC>~?K~PeGzJChfymO!$Aiy;KilhNmXV4k zl(ryp3j5$#&X))Tlw!lZ6UbKoj8e2(3*pTQNc`!qbQ;#U_Ze@c zcE%C>xN3j2i)zEyf*cQh3bq-3N8mP_Euz{4xz3-?xmE$>^z?;fZ_jntbO(&#=4RA9 zib_|RBv*j$qz)*sN!j(~lx>8vviC6CJpgcKqw3?CdvL?w@5tY9%{7z1hVdHU8nOkk8*PH!vWf zk}2C@G7gl6Q)sWigHkbONs5e=QV$;WKN1KauE}QBCY#;qFbj&*^tD{)UnpL9BK(g3 z3U9N>wi>f$nxO4!zBovh9^m7Mn0ZrUznK%o!$Np1L;)X3TxgBhfkxfPOtq zJqd!KzucIDcM!gJ11@95>HUok`S6ailL^kzA!mX|`Ncqn$=W(lZ#bc^s{I;ZC{JTa zY{mK!9~X0#gDGTZUaY%P`}pQZC0`1w3s$ANVnubIGD8(`$UsEW;w+pq zL(K|s@P(tS?oXI@p!;pKHZ1S`z_r(rGXa{Q+V{qno7>83Qp!s!v6q-`&b^2!K*;*W zxM0Pmjd29i%JGklD-uAjhiyH$KP@GSZbmXIEL-pq+<5y?jaNN9FI{&sRS z-VyZI8qlkl-~nkRchr1XPWl7rK4>J5A}9mG1&I z@#08x4IC&QV1ixuNJzDs{;R3-0NYdT#OMYS#{6u9f+0l2!cKFG3*+Nln)tc*OU|CR zSw^O;@rx(HPc^!V`z1-(aAY`5$&aQ0*IWy!Nxjtgv12>tN~}@pwP(n_@HadhPgJ6p zn?CX$aJld=(e@74MFQRJI-{xU-7M#J-7z`S;LPh8>H&Ze6l3}lvT9yz15mTWjRc`? zmG*-k5_Iapta)ZAa_fPulPBD`{G zcW;2cNf&r7)beD5fpbCT&8HlvjNb&Cv(qwxtO2$wrO}z$VVCXI)S+U9l7DqZdDIx? zzEj5kwqsuJ06F6X=np(VJ5OR3XC%JMd0E1BQv`(3<-|tU^}`SS>sShOB02VMq5`|! z27?`tOAI+1ks^E)kg|=gK|ol}ICmB$PMSRCu=Iw=I#MQrxHiEr$Cg7Ymre%+(Q=s% zW5?u_n6>^B@&X>{gLaE6vU=!0BMzkkI`~m*@T3C<+ijg2c~E{`>C>9i3b|M&-N2uz?g^Co1pvruiXgaqjL(IuVlB4odm_iV;?%JyVVoeKW_F>p3a_sKac}E@(tXa zQYG=R^gxV`-|j;|C!Oc>-4*v4Y^bpob{kpQXl5rVn-juUe*h3U)S&iZs?5z5p53Il zQ}4V7uZ8HFH_4wUzC^LacwgNSz`LsGZ>}>rz}#3974^FPrVoEvECTrUr-j6AGe~Yu zJ8dzD%J21AB3Hg$ZcV!OQTL ztxaFlUx2u4c#oOl0w0)3^T_DudrfkOZ!2szCs4d{b_)=Nv@io;P_#5^&MqHNi_b5H z3u=KC_;?6gd=HRNzk(_EdVsPEfL$Iegz~Hq30E7Z@y|x4g!^>q%8@DC2hc~C4W0f} zL%1dG6d16!az*x%(^jlM6|Z17C=M*ojE?Y6EJ&;-)-NydZUsFtP4nY^lwMJ&2sr_U z!Yy2$Io&w-pY;g&`mhiEF7Z075@U`A7+1h~c81hdS$e6h?e(4Iq| zxW9ZOOe}7#DOIf%<7Bf=qri#})sKD{efIhllbG|y*y0}-<%E1K=D48CpYZp-Huyi{ z0Oupe4TGxmx?vaqc?XT70N-H*=qp?vD`7-X3o1Tpc7({-0Uj1#sxAm;6Ewrbh~D*K zrU8)8j;2!)R~~bR=!v3S6wdyk2#U{pE>-ri@@6xK!wz!7&Q;`#1d*aN~!f>x2wFd(EZe)i%cM}F-N zWtUfsQ^1v4s3Db6`{a2Ffu$O6@(U6$6jh-keUC56Um2X}GyM3^8aym!~VOOHY~1DOs2YY3l)`wzf<9%eS+ z>fBxEPl9;tKBoCzxd?D@Pm-ryYAyACLzu-#93!%-UzXjn~aAY=JMcuKFj_iiBaN(^pgMGT|Q^5W?R5o$#v}{ z`HTCGmyJY|(3#Za6*4S8MRFfSyg^JkY)cKm6e>czWAc2Uze?^_IFULq-;0f(#T0E7 z@3YkDKRNtmL;dZ_tB}`Lw%lM4D*xE6ae7WX8L)|D0#CcitCbwDMHZT*hT3r7Qy^kpsp(LGqAfeTf+eAu49IA*udt+zxRy=!FniONl zki>y1d0tX@=u9gb;Dx)I08rvmxcd)IwBW|19+`SOVF*Q89GA?UWpfatuSj?u707C# zlD4k>2q69S(51y_X*OZjE4Ct`P?ATL*gaqCqBxY7fEy7XRt9E8QM)||{ zqTNY&$IIc|w;bWAFxXwpL2~ed2@T7eCWnEO`&OT+K2(9a?THCu(D67=Eh&${hW9@z8}h97)`xkT`ayW zlj_0h=~=gmS4Cqm5Tf1V#3A3Rav1liJ8}vc;YL&ShjYw5lPPKjcE0b3o{pITW$csX zJbarE3%RXy8`%j7XKk700cLu4SxX5bDMnw?eXM3d%pZoF7!s+N*j%wIS>H5`A+jAfpTldUV@8>1grrD1P= zixPts?}Vr7-OK9s>J|Q`mOiol`aR=a(g%3gO|_dijN7GH zuJkJ1XLrFR(qil2T0RuXckUf{^-1rilhr5l#Ff~Y>#w8_0URsjhn}dw(MKup$Qm?M zQ3o>7g?Qtov^bR${85;Q>}gDapl>~j$58;T^WND)F@z!pfuYc2f3F|&fSdo($rLft z56+dZKZ(}fHznuGlif)j01AmKMH6hjllb@pVVdZ@Izh@&O3oWWO;n@hz!B{v+1`w4NX6?a=rM z?#0j83qA|l`1U+5yDN6*S6PXmvi>jL4W$hiSNoNS0JeMQEn9;!Ixz3u=6l?7hG>!OTpo-0rxm)YE*96S{daaB)?XZBJoSU*Y)575k|crOO7(91uR)Taq+i zrQY|xSM-Pmj8ID|14Ov;JtQcqz9*foRq`_~Zv8#b;A?!OaAS-f zpQO9<Oj6Jb+Oe1=({>8{dw&0jQj zFO8o*sjGn3BVRU{3PbvUeaETTQ|3r`syyCM=$Ztzpoh*$y^B>cDl*iYW`EZpgg255 zaj9tAp^Lypzq3Z}E-MtLIG*iX1t-thxb{xy?kI6BOsR^zk)D}ohOQop%9Z@({)Gch zGKL{AX7RUy_FCN}o@Ho`Mab=`^OINL0nO%|S4Ywux@dgX>FZaAYyUD{4oSI+Mffs) zA~a|`=_&hfS9SHPZ({}PIV9&^Oq}oFGvhfdToGj7(I$mwH9^Ivrt#MF__ET&ot1f@ zqEpoR&2(^^z1HtcnK+3137<<4Hh#uy4W`?nhdsVV-hB~M|oqbmGHH2S=+R>lc{QSVec8$LQ}m>YTG?74s<=iX$*WYqS_a%>u~+9AHhw_upUHgu>t##A z)nUceH0G2gP%Wrhez2K2+B<7_WR8^QctL)!qmRE$aK=}l`@F%bxa1v{fun^rrtxeB z(z26WwY+M=AFC%>;qI^$8}@VXmLT4_AF`ZxSCiV4rtVMzyv_%SDq&TIUc9v{$x4Pk zB~N7^$>;*pq?Yt<)SkoK$#~FN;HPYP0|4*1}dx?L~(gD3BIYQ)>|<2QkmubCaDF+CM! zn3BPlMx`DeYMO*Aey|`xW1pddBoV#8_et5$C#?W62Tbsv#VPRgu`KBukF8~g7xdJA zO2@EYiodgQArSIi!^C;hkN3KN@-5zo()gL#GvOvJ)DsO?xRiW5v1V2#up!=Q{J|(P z)xS{Zn${=IQ=QzhTsOb)K9r2j4V}v!qZ@6Dlg_QPqB=J)?KgxMWFARKb2p!x8BSED z^4hTTc4tJJu$ec6K2bjVdF|=P=cmDSXd4^iBAG`Z`!cMM??WdRsVW4hI*V^`y&zk* zUJGPZAly)OHdwtz-Pf?WW#dg{9o=Z8b7>owKcr^;O;YLIp*GbvdyW%%jU9l!BdV{KiltKs54Q&3j6!)P==Ce%9Y*|B zAlvg2vJA3ogA#ktxOk{e@1D}B70}2PUraW$xJ-wU;eCe^&#mek=&n6a)P)WaJPmfW z@m0d}N+46bk5pC#luB@^Y05kND?4I0bAY4Sa|~B+HmP52;FaQd0CDGF!%8|PVuvsa zooQfO4d42SAChF5$$5JgVRV@#z@*{!lksaneAbJ|jkf*x_-lEg=+vv4SUi^%fKcU~ z4oK+C7|;y#;U^(Z1m57Y+xQx8h2QW0s*lZdC2(M&%`MZ{^j#Jd)2cWN2hMe&Q$giHN^_!$?qhe%R2vZ!g;y5iyi8O&WD}-5rxb?H zC;YPa0!{~}3K$b-wcFNb}-nuyy+Mw24?&<`*5gP7aV_@wW|xiQ*Ro`)F~JL6^H z>m=ca1+>lBdn3@J-t7IIvN^LQ;x;w%Ejt|&76Ntl)2F-or6P`HgReLA;DsV>u(a0X zf4c+-PYM$mTFTtEPTVGSE^FRb#Hj9Deb6K*9Y}L^@CpW76A3SKo>r|Mh|@klr93cj zj(zi#S$Ge#e6DiJ+{IT4ROL_fE;denO^FDGrz_vQk26FAB3jTC zfHgJw8D5jsv$e1(W*_jeA8;R+#GXsPn!h#;_yg5n&%B%1hr6n9Yb1XXAZ0&IG@>gp zqw|BP4>wh%5=h3!PggWL=TiyqnVwiahz|JmCsVq9?U&I%#7KfKYB-aw;nrG(#Hl#WZLH>nd8T0$49uzTv|AL5_ z`R?UNR=J=p%arD_kEP_)*VVXZyMqkiIoh=(UlKt(3!vULUd7M=kyy$aW+66DBy zP=0B2&1zgQ=5w?B?2Xh&GLPY8cksI3Hs2Pvdh zd2~oI$M(8s0!oE*jCfY}9JIhH)%;Wf+~xc+gT9cQ=lcBcgo{?$x&kaRYvw)al*2;f zD5MC+3!?;slS^32$JD(JMqoG&I0u{xU?9?~$7z{WqDAhZ%pT6d5JYS8GAB{a@$#}bq@0sSfuz%|PivmnI!m+h%XAN?~m{ka81+E;`4Re$tQ!!7naXAMw4Lk-pR6C84Q#|iT-@2=lTm+K7 z^0;v$ufMb}H4=v(9%+|6i13q5?`enf_#=;2GDHM*GLhN;b*i;zPPM1NpH%jWVXeW*y@#gs%}edLMZ3dpEp$U+?`FieQezSs)j~q)Zk{@_W7E z#aM|)1MsGOFVfRPYDtDVuJ4ck^8n{jqPRT+zN3Z8>)WKj@#PDGBT_%A-d5G*eBieB z-`7Zlf%yFEszL}kLgK(P&&DLz*z-|7+3}v1oEzd%Vsm+YFT&QPRMlQtN5#eM`F9(9 zc%qxfG+4rOEZ2XCy{Y`z>jn~=>W4=524T^a7}X}Cm25tps&?cy1{mbod6UeclWhMX za0h=`tD6e^jv304A0|{WhXMC5CRWBl_pN=N{jK>N-0!dVPfS;a{z2wbNwup> zF539^xxW0NB_qa5g~fm7*s|ah_f)nE*B!XNJBWjPKu0NjmrFtXT1pLmY(QnglhdU0 zomx?tFI+sT;xAHOeUe%H^LG2+0=tE=fTchPGas=J8S^x!SF`Y6L~%@VJGt;qiT}s7 z+NEcEzdXw)zi1S$E(YUXdT6`6wQuFWNxC1XYCF_|;O_mVX8o7?MKW4j;ptv4~ z2I57^!Lu0~V}Gf(ZX^kDk-o=atsP|iw9f^;5dF}Xa_6`@0f;gD+H;0)&WEIARuPSQY{kPsdA0>F`y1Te$J% zQG*os9k>PW#)w#O@|4-;6Q$aJ7J*kSTVUwc*3es@Q^WSYEoMK*mi_H}*Bk};^jbN5 zoqYA;rj1fU7}4Mp512s2tB2>dSjG>KuW!PGaz>RXAr@rk*gyoDaS-EJmYKIqeWrJ#i{!t8i#Z~IJCvG zw)OH_9%)r|+44*--i%f?B}n%8wkJQOj_(lilf%zlF`C-Dh&+Ku4!(&zi@)~=_4SnS zotF@9O0kZWQ8h@7<-C`Y&W?sgVW56ecplhVa>)_Uj(Yt)Z|Be|BvZ5>N@!X-&ehuS z>6!!lc(_WduJYivluKFgjnI7L6EG&ZruR#4$RvX0nvo+f?%4NbuX`^Et`xXa+RSmm z_!JZo>f`)g&n%|&)@e1T?84=tVrg3|9+?A{+L(L6J{Q2Z9e^^^!Wued!}9HFYLCw> zw`hH-SH#x$+(((}`QIWu(wyx)SA{wsbW9btz=l=}o6+z5B}X%iM<;uKl*ych;?g22 z10DyL+I@^g5j;7OLfzA{{SFD^itJa~XPjf^C@{p|9B}DX+`Jt zXwghKoQ3cjd?X2|>eps{hQ<7fs~t)v+dp!C(9?FtOs*wYpUpYCZlvA%t{$e#`Kpe1 zn4+3Y=)MNUgLb#Hs+tvo@S+;$iPs;n2B)apj-RW`H$oRIec2%=kuCb54IPSXY8u~z z1z44@oyZ6e9?ztn_#Sv}%+_|_^)ECvN%%Q;~-vu)}o_UM72D z%#5x96`P&tN@DkPM!T1_7 z@q^stI@f7m&G)GG1(H4W)Nyv5)>MZsXlg0rZ}(6p-8yS{!}vzk37N-WzFGH4$*`jqsUVhW{Tm|x;zkT3iEM7bbS=lSOuQfEeA*D8@jq@;7fdx zKVX3--UB~13b+Z}NqV+w(w=S9V)E>vzu;HCpH}u-`o;c7k8I02{Rz*VeBH-kRn4dX zDdFK6#3|(bBzs?;(P7pElEl3$nSAAyt9)z@O-+r|vV)|sSb-hDJ*(6NR(8$Yw_I?` zENr2n&9mvT8~Q<)$JY48n#Gm#W>jDeoxd(Fp(w`&qrl>@VhM@F+D$XY=(sx9-RA~*DTtrKn>bb;S=E%@I;Zk7_B^nWCJ|SLpXyq9 zcXcGa^2T(5p3Q|5lH8_`$P+QwH*HVO)WPM9-yoZJem)}jOV}@CuSnE6#Zd_jb_$nC+|YC*u%mu zVe6PeVKG@Rz==MWT7YSLF-N3qR#8{Z|NZLTX~!y;a`c!?iB#7>YM(dfI^0OWUnelh zE|1Ftb8D)d#xEo;$IZDKlk37N2F5y+iIi?oe>F_y7$vR}8_=)xX}fQ)>zt3V0~!Vf zj4?%CEh>)66;CxLf80jr8ufVh+ErlYreLRyNMEBxN9EWKgR7=v@H>5yV)Q?MK8`SY zl%mWIfMKJbMN7fr4K|S{$N<|N6F_Fd_`W^7_Y24Vyp+|tBt}Jk=aWw>`AsVm-iU}- zc;CkvMBf7M$KNE=J?WlPpWf#9ob5QkNB0{6T!#_EdcZy2OTS1-y)AM!=fI{`se@6L z>#_8^aS+%AxbOk*^b_O0aGeG-FLmNW%Btu>P$(gKRr_}URz{%(TozRFxbQ%{LiIvXAN3!7G3U+3BD|5#{=rC0uOU}f0%kN(8(>-CKCB$->M1=q@= zYKxFHD?W9P{u%kCkrULX5KCWz?R`=ti(4F5q$f zDx57zOtw&;YUeOnY)`#sH-Cos%uo~H_TNX*x}`>ozIwv^DnIMN0!~hda7uyUT%v+s z=+x%yA3bu0ssv{*5QE?LdBKbw6N=|D&IU+0S$IVkZRWO=~%1` zee=ZY6x>QS^pBJZ^TzOWiGr(q%_FRL-MGp?s@NN@H7h_P?^K+Z)-_YN_Fh0^m?v!u zZZeA3oV{=w*)e4_V4-r}^6?1&U8L|A%vh0R*9l=n*UH5JDMO=1Utn6D_soi+X?;j2 zvz8Px(e`SE5dd8Qp<6yV7L~8uP)o_LSQ9UZk2|Qf)g-LEk`+VCG-XB>vPyk&F6k2= zX%+L89u`;kEP2lVKGf_UoeUM9M`8#we=$dUk%XyJ--C`5g7X}Iu`*(+pzp(-o6kr1 zC0868hK&$~cE53dPM$Q1B3gX7X?J!>`0CjH>6>=LVo%oENe=+7_b5lH*ahx6g|wyi zah|%D!693E)C`iU0>&A_lxTzWZEh(Q51AAOwdaUxN8mz$)_Hpdw?NCLI?FP(w+Km& z*-~wK)k&H1XMKH*2#7Qtl+9*d8Vu0i+WFksnD)fxsQX~%pSvXX6czgOM$>h*W(Ztp zo-A@IPjngW{0k|>L*Ni~*P!$~ZZ)w8a5Y6Mc;E^da<;_x`4eRb@K15wGSHT^-TJ7C2>LDOw< z^vniF=VO7xQZNbv5>9z_BV?+wMhN{5RqG(bZ$|*0&q~odHb|-h*w`*vM&twaIcK7H zj&)nK@+kC)SMGv=gwUFh77zs4uk+TxIN-&+3;TUh`Br|FTTZ&EF*A8uY!bX;oCT$ac`L0ZE(V4<_`EP>f)~cA|pb-eKUu zk+kB7jE>LP^x51uFlaIa(6Xdms*`zuYN}$>S9dRBR|E!_yetQ_PRg~&ea@t%#F_=7 z;981I)U!w`pnh`juMGN#W4{{~>(rlI{gcRw_;qcc>VWN3@_oE@f3nm?zNg-EtQ~6N zyq?X`E#a>^_VZK$(^agh!e}KFjAg8bXC<4eemiP=B zj5iF33!lA26i!tV)nq@x^7m5|l;@KY(m?VtGl?=75KN+?bZEdk!B<$?%}oIz%tuRR z;2x>hMXFoe)W42hL>Q4j6gmfGh{!9I!lgC*QW;X;0!l{9Ux3 zf2RmXg$v1hc()lfq&3OO>CPqqG8omHdA}O{V%|x6ZuUMcQ(Ed6b~KPqy}IkW;!3{r z7e|T3@_X6gS^AJ{LVwh~RP$I^pQQ~axBsA)hDv&&Z;x4zb~{fQpQ!jQiaHZEw9K|h zF#3_>D%XdOX|jA1fxMT*$4Ih$=G}XvS)ZF05Mt?6$nxpgj7r@DiIsV=ymQKG5v9I0}BTaV`L#7{@x<#Uf|C=doMG%*W z%5u|SB1{>0OBaKyp5QpU){T&;%$1k#)ITK4;}*Es_j2S)o>_vV>s%vpM^-U_0$Uy$ z5I{_D>}p%lcY0gR$!n73{G2_afk~mF(pB**CHF*h55JJOVi$;hT!?$k)#Z=$rYehU z{gE+1u&4mlLkIX2sjD-4OZj!?e=V5XC|;m42&&lE>fmu?k{ z{2J*k&yQd9v}G2u`}MS*Hb68QM`pjha@&px#c{KM3rhTkZ}$~l!(gl*71~RWtQ-cC zmJzVrqf#rJMKiPvAvi=_^)?39lFPt{sPzj27RJo^bt? zUEU-=-`_5pJqb6sY;i`gY#`}uj>%^-H;Duzd*dPEY&`5PL)l!gf(d@VWmxOuE<4IT zS@DM+gBHaty-ti;hCUc6&Jk)4-1quxNdh2bJkUyBL@6Y;;+d!MRhyTlrz4gM+Ll{ zRHh2RC-|40mmkfLsm0v)PfBvULA!d_jAu*aa8ZC(!n^%~_;^{nY2~uWdz1+HYcg z_`tv5>2Owwq+_3A?p!yNpIE;y{^2VF`t&}Bp^D;i9v%o(y=Mcdekdr~$mGMGlm^o6 zrC|P=RNEkbumkzw81?dqv)D<9OFOr?Wjz>LaH}o_!XI|UvQ;qG_*TL#(Q=Rqnci9u z@e>^1B3=9NP0Z?wC%D%jp-FbVfFsnfucgh0?q_LlTt@{2IYufUg#UxshGbPRaxbo8WQ=lThG`*HL33g)RKY2 z=16FaE!$O$jR~xFe~6_w=DJtx*Ra;Zh2)kqsP+|op?cdEa;-pH_G-oDBis|X31g3! z5GQZ8O`}B7m~#q%he`Q%4rlU*yL&K%4E-s(?%3{t&fnm{a71jk0SG^Ag_*Mpd(nhB zz6W_%EH5?XN?FzKnq*-mg${(I{qe*dq_!E2UzSwxxEi!WusiEmkioURLn*)0$#PeI z!lw;Kea3@^Xk(euTuoJs4F@!P@8n2r#YXpqm6-vKA4&;ZQD@oJT5)vE0b!HnYC!O9 zcUr@B36>k*;~ZDb4>k`k;@Z@jhBtM*uf8eQ`h0nxfY3oIIgpTe?WcmaAWnqPAUwL~ z49P?}9eTTa;KlM3sdD_qVgA#>M)(sV3KbKc5xyF_71`13#<9iPQN@-_qm#I)i}Gy8 z!s>+H=Y1`hIvZ@N>QxbGwLWCD`N^aDd_$1utL4>KsXh+moh&wdfjT0k!Bjod5wiRj z=>8Jo*GskYjfni2EMt$-HoXUb+W_;|FG#;Hw}ffCJ=YetcRn0ZykHjx)zN`>1U)wPo3qt+g7HRlBDD)RzzhX}WVKlO4@>i%sllJH~i zZLLlPAXBL2z-jh_h3sY0d&j27DYQGqj8fP7`JNI>atBHU$$A$@5O^*+>h+nj0>TZ$ z<+7%x+9wO&{5LZFzvtE;41w5}ESY6ow@~5LEBT@?+L=Z)G`X_D%$}8<1HL`;Srcpe z7NZrn$)T+?{orK?m;t#F?(#X^sN=8&lch6__cKi`Spsi%Ud(WO7|2)wiC<$X1=!MD zF;>QrD_i?!w$gHEXo%IMKrceHflf>H+%`H`s@-E@w;Fa9CCInJNM&-v0IBgel4{N* z0t#VSrT9-7;>n&2z*OVbIdQ|iAP72MZ?$q0d~QT%eIvZ-x%!|w?0Y#r{5kTe?LnsO zOV?F`qXPEP0P1$FtL1K{MrnWp8)YSovpEFIn9QC~Xa$KiSWn>>4sf`j0@ILxU zZb;%joq?c2?w<*{E#Lgvp$Z0$F;QmJwP41J=$&49-k)#&#s%DOnz2ac{d4!?53rq) z?0TNcOi0Bm}#jrYhu3rVrSDVtepZZj3EGW zQQ0Iw{YhZbfmuqIx-ATx18cTih3T@z@9zqSft8FcSJD87WLs5oFcY^ zMj+u`#@YM3wrTe5j9Qv;fLBsX0_}B}??O2ke)f>Gj5O$etsPthBwg=kIrGQ~!VI41 zvRx@YpznO0z(y%qK_Yz2uQVFbpd+S^-i=1!ACSl-aSPh%nj7!$j{@pCaWpUykY+;F z54c}L2CORi^Hwz>X9f48r4%MOL=1<3wWv!04nU^U}^eDpnb_;h~ud+$awrT%(nVYT5aOlTeL$glYu zvvR#FNendHTonUY#xJg{tnGubUzHv*d1xQOO>sQ8N?(sM@-7FYaIgU0{D~2Uw_+Bt zw5Z86e=nkPoaS^%`@$#!J?YS)q`$34A56=Fpbm2=>bUkWSKYRqO*2Z<+_qivpW%hf z>$P8MbST&04*F}+uJhG{9poZdH2ra9Xbs+ltt-NsE!WDfy;4fpwK5JUQ7`7ND8gBS zOy;AO3)Q4n#0g9;_tbredjB2N#S0#~A<+GWCNyrzUeS3mfn(F_pWYAb*+iK*4VvR` zRtyMgO3@iGBK-expB$L?i7v%70i?oNy1dqiAXR^Hc|mT2DUxPBEgZSLM{ZYwB*Dj` z|Frd(^%%G*y6wHu07^AdZLgR_+&J+wjPr# zr4@Gd!FkU;&iFTY`B^{BY z@ra=is;x#_!NsQd#RKUqIQK|Vuhz+5dA6q-%rw~oR z=~S96_@s-4*nTMyN8)?;+d_AiaHZkqq5cCdK+{eYLJ$T5_}>_qACbB@PqaO-Tmqdr z(6+Wpl%^>BdQP@FDZ-0uXYj~jQZ72D45&ZpKj2=A;6cg@(WDmfOvtHpJO90mTj1sn;+KPwe#vZy~fzZ(TCj>K6cea56_IMI#1E?67hDt<4ir(nvt3q^Kt9C3@af8a|(0gMnR>%4YE8fhL)1%s4>LDDZDsG zr)Yy8dS5+y3GW9VF^rn#u74`yA&NA#@;SKPtvSX`8FzFX?t=G?yOj3c@*0{8Bg@9;L!QK)WcdPn@R!@-7($GlgD z?`ZDRc5rmoI@n#R%Lw97ZsOUmMe6{!$`1Sij5!qMZyZPuAxpA}GBHkfXv6mn4~R(2 zRX!!&DtXE<2x4nv-7L7pxEZj)ww3NSpWBQpfU-4jjM%y9eYQ@w&WrJn8R4FcWM`?k z$eJ*4m+pu?amaz^Ieaa5G!zFmD-cIvez|5L+s6F!Yk|QfB$_*C-GENMAmx(qBZ5Bbej;`X7 znO<1v5m!&o_K_9(jM7=_9XbrVZ@?92=Q|1{PA-1YpA-k|@vPyIi!rT*`C{=Y5ozi|r)k{~>fctjrE;dz7u0T);V zl%sVm*7~^{OUyVp-R#wrycCVbysdc4bSzPG6M|QCLWkJC;srO&3yB{+69EsKLB%N! z?sxy0S?mA(|1fmDXRZV4IhGvtmgsA8dN~m?EE_^JNg(M2=fyLLHozy{(m^yJ0SNQ+ zApvdxfk?$8Lp?vO*>O$TR89d91WzOhS+uY=g~q|P=TZPD>gXKEglLBog)R~sf3bgx zMIQ@(zFw3AgMD2aKYpW6*!)W^-%2(z*|-DEmx;;$)Uav>7?~U|FPes5aM~avkE1^~|_Fm?5ISPl4Pi8^^G)YahJ}(x^x}=imyBehudo0gihZ#6I zaORMJI*!#gsD~rFWzZmicn%L0qG3r8x7F7$8%v~T5Q!;1R8M}{e}K{Cj{GMV^+g{k z)UbUmn+(;+;W?}eX2}-}(ae|y<(Nal#8Tl#rWdENdH+F0Tuw+KH^9j%V#|;M>zr29 zeKVM+@{(lcb0I)56wmcr+z#@yHxH=s{tX-{0;xAxJ^|O$EtG8(g$kAWna*7$FW@I0 z$Nw~4W5RAa?i*^QAB;IY;*^)RW7-f&!&3lw@&hNP$T9r(%#&RbTk5&272ccFNc{a8 z?J|&?X+O0J5er?BRy&|Lzqaw*;Za^iI&pyl&CxvXbn1f-{kaZ!Ogd6_=xmn-H(UBqle zd(q{p!ytWVg^~aW515(jz9FDTtA^h-%iaz#Pu%@&)w6o@hQXoBaHPB_8tw21uWaI5 zkQ|7=x>c-ZWqgAqXnKYJ;T-;&YkkX2yHeZ)%8(-tp^b?x{ZtZa4vg)b`SVNzlWU}i z%6i4-W@CThw;~Czx`~B%PSpy^7z<-3c4%kP`x>I}o=8}%1!-v!O+0!>YTA2T1(Z;=pL<%?#lEPvD!egALwRabJ59LMln1{{hP)w%(+sH-Q4CZScR zP(1V=uc=H&u1E=>9L9oWiYmMyNv4^AzyQLDqwZ3xZjj_}R;w$Wf8sqs)@_dKfD;vP zP_zM#G>(0?$%Zk|?xV8itnNQ0hC^7H^)lhMEy49>P5J#Uw2$^yArEdLS82BBG@{OZp2M-%tGAjclxLv1U_<0u$l zt#YwOd@vRZ*Z|L&`aXU@WU5J~!E!Ie`%`y9i24PtaqiIL8}ll@90l4Nqtsb}pSSv> zglh_h`|SAdCMgn}+Og$uvFlgoUN>kT4nP%f609@A=c^Vk;{{-Ey`; z(T#y9I@N1^Lm$bzJSa_rse0OfHn!Wa`XnOYuGb@R%(}ejf6Ct7ky9`ia2^gO$~{b^`gh zc}dW$4|p9nSw=urkhuy*;fQNG%PDfpzFh66l#L_-FNo>0Rv_H39L)p$ZDR}6`E;Xh zxkb;v^~rC~D*B{8sKgefT)v$(g7%KK04`=r_al`ezZD( z=`jY;zXGt&v+9}k8eTSt(+Ltx7qFVo9+@Tqd4L7f<`uvd2Q8SUDeB)BVB1!;I&TP= zLS_e~Do{vMzbeb!2M45T7>}B6O7T1DA-0X*_pWuxulPc0Wek8>{1nr{t?D4^I6>fA z^h>$QL+8Lr^1q~(*^T=qyS&jL9U956UOmB#uSmB@C7gPuB%gUmK9Lvot*5I?wTsht$up>Qr=(e|->u7OB}` z|8B;%#RruFqX>7@RMX)@p}lq9c3L~kf2KVr4U2X+7 zjt6Nit*M7ibZ9(+@QTCk@*5kLC!otN(aQ_Qb8Ni6k=gjKZcLbikP8FRz_l#zRJ$m}_ z-{Y(7;bbwPRF$-yxAl3`R17fa6f4*tu@|7sjEVJGm(DFx4#0u)_M?-JH!+`RZ4i{^pI zi1y7Q1~C>`E+zRK!dyGFgucPkSH8!J`vF|T_T3u}z#IGEVg|p~t5%otZ|&Ea08orK zGp`TDDvU@14pxe1?9tq?Y=TK)eU_bKc;9o?+^Y#x7G%G7rjjxBs`EutlY(Ecddtv1 zr6SeKkQcu+%slupFze2zHjeOQzB!SDw*xGSZa*5%_Y81R^0^4BXT!u^JyFG$+Kd(w z%)=F;Y%{bs-|sM}Yw*^=Qqisp&mpEQ zn$U};*p`DirEg3$oYC=TPM*o*^Gzfj5k9?U`sl-E;I&^31nKFM$k1<o>$Q$PZID=TyV$F;BT{f|)(dFwr-TCPigB8=_?k!&@GY?%aRw3Y9TX}+AI@?$I zgIQAq@0RM(d}VeENZNHc(1U4T>kPxggIT6$EzJeSi{g*)HN&_Qk-1{hk)%{^0T*YV ztBKn_X#>EO6*6)|;6vf+AgTLaE(uoYl2)p%*vk#T-UAT8j_U#GP;N$7)msnvw9v() z2mXyho(IChbu82;^C_Hxt7s!te!F`)#E*Sc^#D&D4162A118*o?0JtM#X)*22EcpE zcK~qMO*C*Qt-GYLccQk;NT26sa&{tjh3Y#(&?>OhHAhhUGg0%T_|O-}npvyWxK-o! zF8h_afDp733G&VcxZueQnOL*|BrP>AqioXe=u?o9ryQeP2jPOAESLw3uoui(;`8jl zgI>-(PJ1?9QwqKt=58R|A->uKddC8}3y}VLN8H}1U4z6W->!|7?}^?uMeDqb(O?_- z_6WTpnffO;535LW0uZKy$#JG<0EDUV0q_V-Z5@G27JngHg~jFzpVCN%aKF6ZZI4~9 zd<<**zrK2h;^G9+lKRa@y}w3vJ}#Dt2jUp5TJ&EZ>`W(H?locBn&Rcfb{gIFz@yHR0O3`47 zE((DpqTv^TadBy>QMihT^s`yV*gC{_@!g~DYl(q*hG$>n)d?(5_efcf#CW@ooG=3< zFy82+?o4qmy4O_x|HF0tR66KYD+$LlWz#S|UFIKs01B@M04&qxldTlOb$&n>J?qvB zpb3|~NpMX5qcLX$I4|&(*{=WeCwM0bU~ay$;)elXo&zJy+LA5|9C-vG#^;59GWb|4 z%yd+kAp!k(Ajx+`6YB+_IatsL=7Cgixqp@izr_KxcZ@o-Gl)cTF(H}r&3O;R0h7@k3%|91~JYhYa ze3PtrO9AeXQmk13lpBgWFo6%rY4g3>fTDW90#_Sr&mp|PS@+w2n}JabAx{1o`*F>| zj|D{4lerT+PYt-T1%&(Iv}*oPs)Ry$Ykie7+HWphG>!0W6`!lENkbZZJ~e#FVg~AwR0pL2oNgk8Ah^$xSA#Sd?&_ID87ri$^TtSjj*+veF&(H02lqKG z9v#?WB1|jvE0b8v3dGOsOSP)ONBeP2L20s=NZ&g7&YiLk^m|6 zP7+iUMI=a-mH;9u2v|V`5<~?BB{T&D5^4~Yq97K8U<2tYDk>!*Gyy3J1}lkxprC{j z2@rCZZ)d)po!Qwx-|WopkIhW-^PPJ#_nv$1d!BoqmmaI1anftz?9eq-Y+e4^omGB2 zU+tro;twkby6~9k%`TtbpV0Ske}bb?TkW;O`JgKmI~04Io~qvD>p$?Dk+R;`ruteR zFQO_QoxG1TmC6v-@9WtDf5c^YTY6e*CJoL+`@1seqa>#5f(Yx>O z+QjCEYekqm|9dX9A{m78kz1zWHH?WF$RNN4TySt~cUX2V|nB>5a!v$~cP5pt(5AMc1HRfBk6nAc zcf?%2hfdbK<$of4E9lyd*nPupku9i5@KM(9r@hxG6!HyF>o_v@TMpRgUCzDNJAgJ5 z-E(|Ps%sM{pnEC#(4hK*JWOiDOslgpPz^5mLfoab@w9n(pGL*yPyU>n@7Vivp2}rwiCmt3dUVdrGhT9_mu zfn+FHPJKajIG%aB`FVb95Ju-(;1kMHgk(zl>Upv8*!{KXtDXd}=9B0nDo~hz-DRLb zj*WQksfwQ61$@r8+C8N%TGKW%Kx8KfXdQ#J?r{$2Q)|Nl3;dLMi#jq)tZaZQ&K7*+ zB6AtYN}Jf@JnB^Qzi)VJ~!2!S7HSXv=Le)$n$IHgH_eVjEIRAs35Z{VXqtN~K)h-xZ{}dv1#{WG!tffYvmc zYe&CU?BkAj!q@4AlZ`x{tmd33qRQA)cRe&Lw!2`L3sMjU&b(*C%U|sPnR`6((r|t) zgxgb7+f8MQ>Ic(Vf3H&#pO+o43Y=o|uN^UXa1vJDcm&~cV5XfY{&vL1`sQGGMf}=Z z%^yD>Uz&>MpRcQnAe)wqk%}%XOAH?Z} z%Xx-=*bb#t>FkKa>}q1*;AX4q&K;L6RFwX+lg}%BKqURHNL^?eVU?skSU7w%-UqtZ z%lzBXu@$NuU0&93l*H-*O1oICi&riV774L`||C$B09tB!Ku=;tylbGrJz5z8D)3BP=DAe8$2Z@l;R*yUUlUxw8S>=5ET)%>$9*M~X2_R7Iydc7eX#kcecz=gQm+f75y5)G*bd~cf7EMgt;bEIz%o{vbVB`8 z@YpDV0k#J*E`_aO1CCeEosgSDUE}H)8w&{r8x=!K72i@`mICOgciIj<`delwV$e|K z-nPIT(M195COOGiy{S3u)R!zf;V^0Xu>QI|yB58NNlX{)GTJ4Dp<#WD4fDC0`zW@fM}>9Z=YZ+yl+U7R$fB`&p*t@-0QmrV;+%<4)nGxo^lXtP9I4-HYi` z+8S^Ml2gjQ>2~?k4!cs)Dr)mOS&I{jvRh$e{?|X5-J1VN=gFRh_~2 zAkUm#>*($NM{~220(`eGPh?DfrzbH`3LEgG_+zk&xGN{S*XchZWFS(coZVU*I#rhQ zHtHl-Jw~L6n*?k7sO(J#U4!L6TFo^2XFW!&tZr7KZdw1AqRVBwfgm8V^)X?Z7V?(% zyxH%&Ub!-E0XFBGCyYyL#`mLLF|^0uYF5-L)>cWXW&QY22_34UK(elgrRWKpjG(6jJNC_B zuO$3CdH2O0Hc4gp=v%`J!BO%#&+ag< zUEci2F>1|c)eV~_{D#=`CHAjmI1v#q|WE-3CEp% z0I*tnRi-Sj;@;Q1&mf!4ohZTD`G-s*Bq6mf7t;*GV2aAC#N7tR6|PT6M?quP!OrYE ziZ?Q!KZ*xNNYa!;@7(L;2X$xOxMfxJE&h9WB=%OZgx&($c?<%|e8dx3UmPQY;kw2v zyj6?lIRc1WvK{dFUwYX8^^E1}>KYRA|8UFY|MyP+tN%a^kS*M!0)pvF)<|r75E!zi z9z^P`U3}ZEKWu#Qf8$dR0)Zg1L=Z?;62K>H5=P+|=%ydv7%Z@8B>JlaTs$-?#o-GW z+h!(yE-3g&ldt|1!V$~N9gRbgkr5b>oY#UaOG^eqJ~?F!IsXM zZJeKv(I3YDY@HLX|5rd67dpL_5l@w8W9ku=$3YnsPC-v;Edt0G&;3k+!c%jgw= z6k{alrNs>E@s>{Vxh#D@#>g}}57yTfjL^ZqMzUWdH7wG}zc}rCpl|zOUw8Ck5`tAB zfPEdQ|15WJkYIm;s?sW5`NNTD@!npl{mGZD?g~BlF7;==dPMvCkcb3W85X(Y%Ug$9 zPw1S#6pP3N?6QY$@b7P6gVZ*EeLb$+cABWb#zjGVMvbeRHYQh_Ay#R#d8-F3 zBDojgv@-GgIAxVXI?Ves@=b=jG<6Y3e<)AzR0v_e5&1Kk>TQ=7ISEO>KTpk3e%N`+ zJ^%UxqU}5(jrZ@C>~Ly#+`FP?Z69U?rP$?I^&ipsOCaxvdqDCmFc^KB;qo4AXN-DfAQS%(_hA#!1DL>-c><77-au&W;F+;xfcZf*n65@ zG2*p!N{)?r&MWqd69j`uLB6lo09GQ|8a#2ixpu!@oV)BMq?2)CwfquuKCQzQs05Z` z&UpZe1Uxx*%{eK5@on3r>OZ(NZu|KH=5fF&G`PK=NwW`#HS7-(E}HkGGOCq+0|DOxq|KB4u<5j%G}% zoInSVcQ8b6v%xcSU6&M)w`)o5^ARnZWF)!_5QiQg?9t6V%yyQK^^v}saHU9`K^-7Y zAS29c`XW!%w40w06W~Lcx<&&+F>kU{7Q0)Xfn?LPd$q`sh1MrFiK`op!*fPt$ic9B zy-OD!@_?Fh$f|E!JfzmI88+Ht5bs@iF=}>SK`X&L)lG zEBy9KY77w;^pT-puhkXlTs!D88rzNZEltlz$=r2osSW}%%@6rf(`P9&mr6*gUFj$6 z5fw9hVI_4!8?6cO5-l4V}pgt7mrl$ALw8{w%9&4zLXJ)jp0D>YTC;NRWA4PdeI{rhzsTWW~F%LX*b~Bm;s=PGIu6BVc_BeZ-DkQc$2ruhz)7kO3XMFw+GU zf^X$t04_`JNxj*Sg&BO_?Dp9R2FQD@;~Cae1xRbCw9DBtZVgA2g%>(lJ8ppCjTaZ( zjkWa>CnY;7V2}iFtw(>0B`V%hTYZ)RbT8%0OdWi={E zm#0Qbz8VE1JCN7G^Hm!iOL(?K8@qc&wk z8fF1{S1}9B_YdxAd$e($;~Q;KA=+Zmu(_kY~RV`Dw&E9wu4Yg}Zt^+20eNt(KA zb9KlDFax}p@7%sfE7H8@*H=Q{V1wo@3*M-J&t3orjn44^xT+KsEVp%Urk=RD$i3aoWM5aOue6mJ<1NKH8iZo^OQ_u|tc^nW5W=NLQ({a?rYka7w--YJ+H%Kp(a6QlZxzf?` zWqwMp0vzWw$3}rY^;lJgyQmDhC>Hat6<{`oLHtfjo3x#zjD!g|y;yx0CjmNRsl4Ue znBgXDNRASFSdVRW`Xum|bj^NaGaIRz05nD=hT+$3dn&$D$371|n&ff$i6b1Av9d&k znr=FFYecaUdq^}ib-5SWltk7OotFA9#rzK3);0&}B6?zG!FtcT353y6{?b~>&(6|g zU25~Df=i|OMl(d>sDiy%?^bLsfK7OZjZxU9v?I3M-al?B4JaOjv*}H7 zl6%V&^BLXUqm|8nwU|F^HS7;_e%v)I0?4m_M^$U44kvt>8gu2r4i?}PNIVY8Hf4|{ zYx|>`9v|;V=hdXe*ZP28f0+*TnYc?bzrfx91OP{+EZ~-=mr~Yr2o%NhM;#w%(Cs=( z057i%!RLUYhs?!3YfqANJ&_&^LhwjOWdPw|<;7xLD7E>@@)<$dIr>cHFZ%rODyh{C zjbf!PLDr%(vzOMNvX*ZSpKMMmg{hWQ*hTKP=Pf3qKrY7aTllwa)fkxTXJ6@utu|Nr zZ8BD6|7xA`nW^X=%D%&v75{JzlLp_7USy-mZh?#_|L&5GeNV7#kPv7UCpciMEOGqM}>N=Zt{^He}oj*iY7YFjTEX47|ThOK=jn$p~R3jTOh}+f$XxH}m zZYoZ7*WFlY336&ZENFW_=B2I0S7!zq=MxnDH(zgi@!KUajs8_o%Zq)VgjpyveSJG9OG938^9$S_Pr`mz zK#>0^UWF&O32d@&JefU&`9rhqHxWExYo~-b5ev(Pj z>%TMp$yj%emQvYCT|}dj(MIY;NPt9?br}oDJNjD&eiRIPWzG^RbqzXwFx)Hhf4I$< zp85#+Ck6f*qMv?0Hu_(Rr{Sq8bX3c>8TyegA3R7HcLI?Kz2({EA1QjyPr*1%J&v{r zh%+w83_WAJN7+4ZBztFM>XHJnjPW*=p>>= z0YXjYW6mKfG4a8nIMLnBT*UQz`C0Xp>ThpOH#?PxEBR9D*B-Ht88jRI7^GOHMBksg zU%W}UGB3qF!64u)pN);#<}7qouzrH4UfJOJn~7c@LzBlkpcBI9-Vb}c)taEe5_tF) zPj4LoYUXN6v0(TNHd+4+bS6T0K^-hmma7l-^ISlFCI`qs3n~QTeYj9S-l@~%P4|b} zdi{w8)Dh3g^6!b+Edzsce~BQr#%}iDmXr(S;11`c+5T9G(YKlCdHW!VaSxVo$P_j) zo#41j+oz(fAT3zt<3W-8b(j8|Bth_e3PFN?Q~-A5C+*58sJU9Y(4?EEr)ih2w=&|; zy$5Nza%pnO)8YhHQ1>+iW-0L1=ZmvJ9mOK@m5DK2sUW_jY*Ggu6X9^?&vu~Yqcy|j zMlxvmrnYTK83m`#9Tx2WiadJreXW&dc0%8>H5Q(o#q5OklyVSM)4PmLV{lXZNgpPt|gp~r$y|AM2y_Y>klzl!n+eN--jNT5pbgx%K zmV0(*YP}9jHS&2`@IvKgNoWUjSsgkAvuSaVhx7M|&#utE)w?O3aoS7_SXR{b2I>Tg zmE0HO+r82K@SyaB+W79YKI9i4^@4(Y4nM?zP<_BtdYs-qnEhv~#-3+THwRqy(t8S& z^1W>id|Gw3>?JB=h#`!=$utSuOmbr;ZML=9FyQc%nR)iJAJKIU3EJmFce-@aAB9#;IJJ5QxJNCRp`9BvEf`eMnIu9R0cc)AKfNv7lm+*<( z)2i-4!7*{QGKrW7S?r9GuZa%$uw#WcqCr3&*iH02n4o5%5wFhK#$2@h;JPqd1nOLd z0ufZITb0um}J*H z?XUJ==f*7Ua9NfO{3orTQ)`~-9X@dJs?N)quPebhAD4*57O>PZU51e1I3Y^r3rQxsU5KM#^LIXYU0H&!jYM=%1 z#oo2smex!dS zfctsic2~F0((hdx0&iDqb+~;oX*;m_;}HkLo?;zsd%VcGh%ClASyKJL1u{#YF7N+Y z-+cc5eWy+xYffYXk%SHnXX$&CI$I^>lH^C9m{T1p;67H3T`};7E%93ZW;&yRH^adfs-VzXi}X)$6ysGJ-=iKV6ZU3p zk{||+hv7kS)6Ze&nalAH_ZOZl{=~-KMEYAO^Jm@-q@G)3If}8HoH?C?z40vwM9~SY zLAbY!!)VflbYEl{d_GinPnU4GEu8#7_mE?}!e02zx0o(e6}XPYZl*ZzEZUKhci92_ z^$wGnrdNRZQTLi8zi*}88{N7UbHlHgeDaX`=S92m;B}v+x>GVgrjq!Fp)*$D0r^*C z1M0(@iBVQeZQ*k=sS+DpBD5@7xMM{>{@Lg=$B&)1?v=W)_6v+c{mA!@#{K&}WCcQr zSxW6>z+&aIgJ8Jg@nzN+E1}M|0IU+KSclyC*+Z({;)0#82L&i&OLU=qMgr|)#ljw5 zf#IT!{z?CH5>;V!2)pr2yFIq|HpIO!8`SU4E9N1<{t6_1?2H|>(Ex#Y_2$N#8KkO= zm&h4F&DKUxgMVq^fgSXTnl6fv=b>7VJozIMXlV$zMU|^T@7l4v%T0H8D;(;Qa%zJ; zqEW8WDsj8sX+UmGCOlicJE%JGzPcl|w zO5{9GJ~H1V`zrD7@9R?%!wQ)<8G6dmht2SF$)HmFonYmp<)0|7>3cM)l)ZJUjP{$> z3rvk;zVnYb!fE58`jD&jW|svPu^xgddE`L<32l?n4~ekswr@boQ~8PAhUguTHt)f@ zGtQ9yw{HRViM=g9lKHDHpF}-z06HX_Co2<82n;S~g|WBw?=&9ruJwHIA%MWzc-BjI30Tz{PNsphRf!d4Q#rQU@ju=}`7X3l=t$pz&F zZ)W+7(AHJ;iI3F9R1`R*_lsawe5YFLAmu91bA9C`?EH}Rg(g-xkbcUasxjP8M#kYw zyOd|rV_lg)Byy?Wrt!;yVx-N|79FP$@mciCKQy6NJ9R;!Pqa3?$BxEh_Mebf4H>D_ zaoYaG*wt{Xcy8C-8aF`T->Psor70Bo_Ipq6ne|O~lDDxNAHSy!ANMboYL0u0?t$(L}rZ4^M z1y@AvAXBLRV=QN%+KZlYkUlr#zU>L^WnW_AeFC3~t##t}NkmHKcdn1)Ni`cE-3a2@ zvO&9a0p{OlKw9v#KX2w&q2nkuD8U}_dSV|`3x$`eGVTIq%h%I?KTR+BO+H0S;`Xo2 zH2PheKT7z5{f;jxJCMu}yQa?p!pcwWz|TX+NpN~n+Jkil3&Q29jOIxQiW|qSeJHl=_5Eh1vA9oRpImKY6f0g zmo9Xsg0K*J$DeCpir#PUb}^8MIC=bZOmF&w_Vt#LlK`4Yb(UB#>* zTZa5d^FS#Kt82lIaT~qGRuc4VqS1blMLPJu%^e*seUy)RN9!AGVBZoCTLRLfgrrJ4d6cPodXaKl3w19hFO;CRRk8!4zcdH-VxAlmq;4Nk-vJxbO5S(>}4j=+JZ~rgN){tf1@46{7RB>&NV>M>!%Z(^&K%YZSConKhsU(d0E4r5Bnk#n^C@Qw$H)v>YASigIeAb zKGi`3Zei5hqu`9ChZEHr&XudQN>lJ5+WuhvQO-EyZSM_P(CkX4*7EPZWV!yN+CIbws4Y{;V1TDB>wRQ~l^L=* z%kdwtfIeucG6D!btyysRI%2Y(ZV*+BrCxLB;b*^LUK9%5c5A4)Wyf~m(pr6dutVwR1B=LFJyJvX>qrIcNG5p`rECoCt%EeOsR2Et&{a_wx8{T7Pb@r zCP_V)rxo}fQjOu>ZR}&`bDNh^ict>6jA_6DK5#kJV& zqGWK>O6XV3ADew13HF~px-IT!voQ7drv28J27?iFR5Xg!*iIgZfhZ9A4WF58wdbgU z+3`E5g#3=xVWnK*?zU5AIB+((R;nZXY}DGae>91NE>RR@L}+(?xe>6LU#19wg^~+3 z^D0_KQ5(tq2Q3O4qX7XT-AAsz^c9$7(V5nBGi8ahV z29M~3aK}vxJ;(4UZ`sOLxt)3D?Q$P)4Y%KpH+tu;#UO$g-)(X3s4K+eq2W{Jyam{PI=bD_VqTH|uQ@9{B{@q=qDKSFOV5n}*!EGo%e%<@ zD)~Mn6fsIj-j-IW_*QqDa&5dN^TMM%aLjp4y){MQVMg>&y0z7X&;we2Xma+9R5gDe z*s~qXxBQ2~Gz>K2v4YstE%4Ule(hr{XXamhnGS~n9I_BB4&o(!EO{=XC2Zj=3|=Ah zlcK4hVqwFhr^%q6*~SR`Nm~_TID`&7#W(4E%jO zwV+dIEXcFHyw*xObLR-B!{KjIS4Y}Ilor^3>kDwDN?GUWz&ZQmi^JU`KjNMoym@fQ zVp)Dt;B zTc5jJ!Eyx;wrO()jqZ=^!7_K#-Op`g(axBqg`f1aiWU27IF!{9A0;1ppkqDuE+TLR z;mzJK(=O2uFK$H!Yw@u|?8VB{DQQ+9?V1G{(*{4U!xEAeK`qnCQ=*t`T`W8CrE3+;`>p@K)amR>x-wSul~ z@PvB<;$ylg)pq&%Am;m+W!+1+vmgNT^(@2UUJ73;D#QNy2+ryzd2K;Dla4%%|s^*kl+DiTAMk>MWUA zwFCXuW<-9-dmGOFj2+hWJ|<4_VkGz2zA6w!=)I#yE}i|316OcxN7;t zW3c5SP)iUt)qxiF?Bb6lj~kx^ut$Pt7FWLAma825_L1JQH8-+SsJ*p7v z*rUb(EkHrfrM8$sV|lM6pC=oSb5@&@s0b^4NV}wA?OyopLr2>tVhnxST-#Iopz_S> z(a58bss@ka?Z(uprVdWBxFqt`N0EVKIfZIvZ1|VH@p2gY_>V8t3mU9 z%LQc!nB$?n%bxaF;k*zep9KD6eyY+;HQ*}43jQSNy-&H_l~fY^$AWyzbHeJDZk&~W z+~4rBSb3m*z=L!p221JJf2>NTU4%Z=4#m(;C(Fn=JqRmSZrUE-;{EBY!#e>mytSvP zfIow}kVb2_hI=t^8U?ENpa@M%V79hpvpNWYv|87G_{HMwv*hB$hg#@$2DY+dLU!y| z#n@f>m!mAj;;$IUux*SL!UvT0<1K9iQCZMSrgc_PI+7swg@2X!%Q?&H=Q4QEi;1%` z5FHs>Y>S)0@aLp~9?bFiUeVw}p~9}DHZ!1;`tqE~IJ6S{GHKA-^1HsK%w8y=EoR*^ zuWdKt837{ObdJZ;L~|m9t#Z$Bga zUbu?=n(gR1T66QfnHayW`}344KjFU%`!?(u|0jDDoL)QkY1Xs->PwBDEQcAa$j{TV zE^J3e9Kw8Vb7%iop}%%V(h#FPLvHpxc1Sb$;;rZ>!>hE$ezUeWPUlPe*&>!c^-#V1 zVM|2iK)D)x0jKd3g{|;`dv;+RSt#hUkgJe9@UKFGp@U1yV3@BtDTOy|FB-;4ktvYu<}LbK3@H^Ha<;YDDT52Zk44mp$XG4 zv&__LMeu&+S%tM24B071mjj1D1D+BS_2|Ipu3y+--MCY0)KTt|f;)}v0+tnga=EIbys`iGA!rk* zc5wa+!@xjcvSmtlt1aYkpT7@~RzFFLGVq^NDygd^s=K6OedO{oG;Gw(D1c~@8D%5;u99=$ zPK?C%PFJr`q=ex%oZNfNly*_6WKTVsXmaq0-=%TfNxI-wvgUQ@-{Gs_&rYb>Zv7#2 z(1j@tVk-)_QXPdLfABMmy-#0jX#Cmr+tYiV9Pn4?C09Udb5l5bGvygF!Nl(SIYbNF z7(a2K0N!8i6#ROlBy7rRjb3*E1ZP;Z?=z6EmSM~4+$EJ+KKU$6HL&Yo$#XMJou~j@ zNE9;0FXo~a958xhC%qecIVJf9WYNu6UAk1Dvu<)kVJ=j%Rwc~Qx z;AEhEGY)yAP^#H_8;vM81DYMqkR~b!ciVD%m`fAx)^~uG+MNSmZokJra1P4wiT!X@ z)m|@UTm7l+$7Oo2%Y`Qm0d@g{2m8=%t5VG?OwsxP6+t;7rbjB$(1C^3d=TF4{zWtu+eV_F11+y)X8VWc^%>IJIcF9* zs@oHq534rrOw{~o_ss^Bx35aaf`2N zsjvAv@#@IYFhFim#~W=&3y78OtUp7NYTjCUh8$bSCk%)ux6!%8-#R_>>((K}391E> z`E`1n4q=NQCEoma#xaE-+YWE`SE>a(fDMXG^tV8I$>5u^%{7H@-4mY+2ML^+WlTu< zB7owSg`Lh}*&T4UZdQE>2wjWUOXM40M+^LL*st~Jzm{dUf;Nq7ppBJA1*Hzgg1;6v z*0o`PUkY?W{%4qQa2<67t&R_ylEfzfr~#+7jgJQ_OD&dDDeS>m6PKYEe1`pYG~&Bj zI`s}abT%t;(3UrHXgi(jz4oL!PrR6&667nQKKGt_I3U$zD$;epe_h&ZSiHm~0$G|k zuZ;!zyu*TkKHr*rK=9=|A7rpU%w}X8vrNpFs#c-GbSL%Rt{&7IR=!}oGVhLW>)*`7 z48hPk$0&~V<>}cx@4!@wz`&apeW_mjMbV*i)~;h#ZzWXo=Hsc zIx5==lP~aG`1RWU3dN5d5!ujUHVjl;ey636F~zG$4`=U7q1V2OrFBjE7@Ki36hTw$ zLX5A-6mL6K6!Eip=~sM;WK?Rw_Uf;;M<&Y3G2Ui@wtwm;3EPssYTF(4MT}Dq$-?&x zZ^X9vvjYS9wJJ1BVR2cKTfyaAtdE8%N7_%LJ@pB0&{So3y)>oygNG!lLGr%`O z?`}Y%?`FLTec0qj_RQh&)=*Aii#i=zdrh-)aPvS+KjWo%0MQ> zHOoBOP9$j%&29O#y!b8`Ieh5tyG~VNl$R<&Sr-)yh3am5+2>9tH)+pP&eP{6w#5>h zy6jSzAr~zCxF4MNLvmal#IrA@1OVxQe7+F#0NdYlGqO(_cm2Zic*3)L#$n=%NR3m+ zEYlS)#OP-9w*NC_YN*C9O7pR__cveI2Pdkr%v@~JOWx3GH1I3qR>k5o5opy@SAI|g zfB~n9(UF!7GQT+melOxGr-a^WPx|mWAORD8>#pE6x9V(q4u@*UG8R5h(?ZMf!;_4a z(m~A>heF#vVMFx$0gJSoDqD_rHF17h`OP=?8RhU2r;=B61XCzM3gK88p-Xq2Jb*qW z+u;&77I^hCNpP-ChAKd(xGWm=ASZ40MxHrz?NlF%L;f8VHA1+86MupR<#x%*$)<=(;H3OEiN94_>*oX{8q_e+V)0G1B5y(8RyH#`A*@7t|$&x$a?9 zH`@r69rbS=4+d{;m+W|Ib!4qTEtgFT?r?Y`RTbqZqnyjV`7emvY1FyViHc!VXlO!! zop6yt#{YT6GVjl$x1-%c9JWXV|_tW=5)ndrVRE_$AE^z~w&|IXEHny&9Ho2_R$ zTmqNt!n|vW`c^!OKgvkB-^gx>N*slC!{uXL%*Y5h8=#H2k{i0`#} zk%86$CtZ8<1z760od~FXAq&%U_^T~^kM%jZ3`Suyih?HxRwk;6^1!7Dmgx#cPJD5V zR*mqdlC``NJH%nklR?$n<%^VR!|uldYs?V~Ti9PoBA?}MbF@n-TZ!nU#e2U?MO#x-xw(r+Bp z1?w0IxZQsX8$X%lEDD;ejiOhB?N8HYf72SHNDFaKN}l8b zYZ+@qYt!BJkl~{&Mfuf4+rxzcj0SPug7+zn=##u;4fnsIg%R7wq5mj?)5xtGqM%kK zGQ&DSUBEo=XFO*HGuvwHclgE=K==)Gf8A)!=%eYv<^1W)Ws2Y(V{}uRB-kqvIa|B* z>&`^Y=yC3y^l3z7j+drY;;V_WvZneFExYpo^=YA8{>j2Q7Sj5jOk0t_E(D1L8ZY#Rk)91}T1#I0~S>Rv2wjR+$>BBZ# z+%i~ve71z~i)AFsxNJU$7jbX$zcE4z6O4tFbKf7Gfc~OqrFc!;^e@1ebQJw{a8yW8 zXKv5zc}T}8U#9wNcWE$W&h3jID+V~NDa$_=A6bec;zS)OgEG=%I(#rO$KWUT=^w!E z(2Zgs1;t{xK}xs{jSfI;gTX%Uz~T9oV|)g*;L{DdyFV>ai*v;^rALi8rq_9&S*~1 z9g)4#FMaiQ&22M3c%REpB2vVJdy%Q&F8Mu-TaH_{{u)Qz>2TOt0zQE8PdwxUv~KGK z>>nnqYbyAzl{Ob#l^427-}-Lx>vykvy7Sf7rqrq~7L39PiC zWD{1n@69gke+PW88&#dmxUJK2<>{`qX)>u>l+TJIJ4^b0?O&QZnCG3;b042pY8ZIW zCH89JzaoUF&(7Id)HfFZ-g0}x?y`f8w2$^?lf2RO8&!(=_lpN+!vOJlMx|};Du?cg z)AEa_YHA?W-~jsM(3*q5Z&&X7Zp*&Fg|$qH0*bc2GT}f(FDCZ z_AGsV#c-T1z5|as0PQkfv`7d6QjL3eQR~Vl54X(SWqD1_T$o?!O0U-?^z8uGO#7Cjj9aRL0i0R_BrF9`Knc=mdQ#nbD`A za3_11o<6zRd3QdOH#V0B?%=o>JO&SUo(K-0F3npPhG@yEAOzh8{OWO*lkqzy#`*== zzDC$b1z&Xs9cE^)xAGm!cvulTB`M)%iMHTo;jZOfA-unw5$uf~0Olo5*X_3BlL@=nyg;U$rljGHk}5G@)^xX74j zGP;?PXWvFipWIvaV_e5VQiP}9e!>v2JkmEnbOOm+qlT!#HS+}5mifXg==lb%W%>8z zfdq!Mo?^gZ=_JFIO+2EXvaG_@%zxRM=xj=4TScR9vj)o+S@t{ab#lPAJw)*d4NtoG z6xBDL9CLojpJ-?BkA&?sZU@(V=#Do~r<$V9BvmDWg(Fds7&_U;SiYU{sYOe^Dye3U z%PnLL)b<;)oXBZC!72XgH;){viIn`&cqZs&IITB6>uD^eRJ-(A)8dSUUxQWtL1xYz zK=Jew6-2dyonW6(WpyN1KW_DV{CaWlZM>94Z_%Y*uSqz7tuQXi zkCShDZhQn6x7tPbt|<@Dd~1kXzPyX38;K9^*;IpS~nr#;?zKbchddp zrdMQbv;VBjLGuB8hA|tVBx+Hd8n9clR3^Dp${%N0cdZF3#x>&54IpdR>o>o>a1~^^2%}?z_*B2kF}Z|abfx6x$0#uG_JvjXVBZ|7czAqdJw4_=l(!N@1v}> zDEh>=Gyaw8-X-?cUS163#MICbpFXwOdg1O-s0)SSzq~*>LI|F!srH1w`yau-4dAo> zH^I9^)7DqAJf>iGeU`ia=a5f|G7*XOW-b?V@X^5g8*r6$JrN6se&JVga$hYk`0T3reI*$-evj zzI(rW&ba5Ed%tqdAHVS%BY!g3d#*j#GoLxvT=V&ccB}32TY5Oh@UM}6J?g`V^iFU5 zEH_knJ1KlyBMV#Oa2fr=-aEIxx%Rz1E=ThF=eT%~m)x?)Uw~hCre^c&0<*Zexv82B zb3uf>#--07V&LCQ>JH>`{OYn_^nW08J_n95{yTHhj(vZ! zegr34ofMO?)Mr$=n(*iM5x&vi7;ofRAwTo#yHBgD&|J#4+e!N*-`qe0M`Y#3xtyiC zrEYASAJyeM*L;ZW{JlMPdKEgE6OY{!-q>#B$G%a$J#OFJt4;n{-^b!|MAkQ}_6HP` z^~Z#MoNe(F`XL?n9mVs#mlKj7ZXRlFG1>_#D@(j>tAt;VH#YqsiG1fh@Vklvc+Kt2 zL+;eLuYV`J-@iX@eAVJ(c*h~h4<>&5{{`j)fn)H0XYT(U$^I40XRdr4c3w}^M#Dw@ z+*!9>B`A`%-d<}bwtoT*W&a^u{~H8fzcy=$K?8Dve--5IZCjn>BU{-Wck~TK;q};| zhZ|Ar19qLMX48KR-0=DPug}EYOsL%xl(zH`h`$`FtmGhXw#R*2Uq{GmZEczR+FC__ zF%;m(7P@pW8^|3iB>zw+--epKYOh`;XmAtfIdf1rB%T-2H> zuc6ACEw4|f!5gWrzYFxO{YNjQ!C58ZB@`tLF9Z+811hJ^nh&HH!kp>g^@ zj4@9F#~J_YjOnpSrulLI8!G;vz_@=04etybhyT|Z^|?peHLp(2lVo`=@TI=-jL?HxQi->Hs$FsD;)=mJJwWF}Q020(L|I=L0RF zg!Y5Qcq!5+Fas*3eKF}S)RHt1B#SEQHus#hVhNDOpM1SP`gfWNFnN!(#P{c_HlzB&3rJ|Thk?F?ItmDlFoG>EyMRWLmD1~ z?LU6x#7k)4kMe9^Q}(`Tg&eMt>b{n-D$nceCM^H#&XU6!q(oipr!jvp*nq0b!KA?e zZUs0FG^TCGxqY4J_~!L6OS?vf)6@cEKOWceeSZJM28ACD4Bo{#Gn4+mH5qDvLpMZr80j^LHiUMKril7!K`$S=nu19HY;(xR zx?D#^F&sx;Q2|}99TkQGQ+NiZ{Dk^|epXNx@B{MxKqtKL9)?~R3jh5uCi2?-Xo?IE zyufOvNQ4VU)*9JE%OS49qpktawG$6R3tB(5A+>Z!Xc_}>rYE{eCg6P?tky3|9}|Yf z+HS=Qs57uyXY~XUW&dU0A;=@)2B0bp?K-)}lCxdA{bj#M;XX54sc|W_b^wvnB*=g) zv{@18e>`S9mQuB*|2@#J{1Jb8P)hy;ZvqgXE$kUWtO@G5xyYV41bL4BHxuHKSdZKI zdn5J(VXrWo?qe1tEC)F-ZX-InG;bja>gs`9pU6co!y|hlIkyaQYQ46saen z?Y>L76j}Ld)d_I)EEd_txa@_RbPPcyt36QRVDRpCOR5izEh{7eaf>7^Dhe3{ZiXGU zl6Lm$0hJKU*OEu$Kmt>;xl4p3EB`}sXb%%X^>)Gfpwb|wIY9&Li5yqL8G>pLV?xWJ*Ix-i3iS6j(au3o4WkYJlU zaV4!?1GbEH&8pV^SWqei7$EpXDm18k(lSf_y~0V2C#@Ln?jV+Jh(Uq)J@K5p)6vlt zo0f zK{7;9!RE(^;(aU!r+;aIMUODjs&-?C-VGGbI7qXYlX^apjq)$Rp z-`%q)J@pIF<*Mz&zsAYhEquoED5+h~u8N#XQ#~>qVL_pIPrS>9J8cuYBfVM8K&<=- zNLx1+nRvV4_5PH{dxGul+8~DDgW$7r5+WOytCqVxNbl|lB~@fBl}I-Xea1alA#6*3 zk}Lb{*bH;!B?l_=N(1FKW0&}o0Lq;4=+R0cFjpjiBn;qQcc=j11mF)s8>CIe;g8=K zSk-txx_KP;t6(4v%G%uWX){LzRtBeG(**eHi`^s-nmLA2rX}(Ty$QYmP_Ct!v6P6Ix=YBf%R%G@5@arzC zsf`9Rq5BUDI{)z5T=_sAX{n`40#Pv{q$p&j%oE^H%G% z%$^Gk1|;#E@Bd4xyDm9eS7)r2>jEmCL&-X~mx?z`&O zAx~|eW$$Q$h+Cxay=LRN$N(C)C7VpGn(mr5F~=4`3w4vguGB(9H(Q7-wg~nHXs*4s z2!bmkoh~82#v4VsSnNs-yr!IkC$2LWKz_%;PtC;C261kFgj)GNPRIA!6~W_)apa5p zmR$a%5<1)8n%TQInXPfVH7$sOgDcd5x`Q3qwigf;cULNfB;whCimi92e3gx(n+kew zmpsnfj_&9^L14$H4~S4n?G)D#a^3&Q{|eP@`GAq?r#-<4!hyE;ypI%7EPMFGABWr9 zOeI&Shk8^wN84|Uxi9B2gSK$wRE zLQlIM4m<8BP>x4j0P8~uGl6_wgJ#%#pf7u<3 ziaQjf3oX5UzyU^(q>kYetVr8}55d$zi$tid4GTl=4L?dCPG^2DD_6?x=yN-t6B6m$ zngWPLGGrhw)6uL4om<_GWi|^xJvxbMH%Q}!WVyci2YxIq2E)Rk-2!(x4e4vSvo?W2 z>**hY@~*Zy{zO(s?4ICkBkFkqTpWAe~`pJo~c4euTc z+V(z?Y*GgGxyPQwP9Wzll5*q`HU@R{`XSN2lW8$=w2|JyciqfnPlXqy%|!zUSX&t6#%@NX?SSys@cJKiGYl0QT_IDh;0=t?L(D>`*-UxJ%3 z1Hgc41_YqsZI`W%{Csy~+vTP>G-A^^0(UwGHs7bil9VwZzUw*A%lgU#i{$TIOzz{) z0K%vp(>T3g&5uEsHJ4my)w8idNZwkw?7r3*yl=&O1 zW`QbkEu35<2eN*R(6Db!;k|pF!x}|WM4A0W!=D_?&zIB(qIJbc1Mok8RgBwb zc77E(G32QP6EoMAZ4AS;{}mN{uyZmQOZ4nr=+jwR-IYkguzsdcG(*H^0+pg4l1A|-???J78Ye+YC z8=KvGkt1;BbA5dpWQ^(*7jIzT9rY~jvOJEo0UePX&U=Hnw+J%BKv#>l%`RM{HulV6 zNu5u@#FmMNg1y&*RLTFwmY}Xp@bSnylwu%kssk}v9A+eu&PB%}aLku++cG=!by|hS z*>bT&-~&d0R0IdmC1~W|K7Lgd=~OB(!6`1%(Q&^L4w#@rGD#wI6=^9DVE{twT#wCK zfL}QNJEie_Y6W9l>Cim0~_5M6H2*ft$x0=yC~2qAG|}9cJZw>FuY5{mcGBc z69_Ge3a3D>SG&YUfC}gHCh5-MFCRI6J6f!YG&9s*jfM!j0#ekvAiZ2cd&5oeBNSe~ zoU#A97Fjr=#0R9e8jn_qdEZd|%2<%-4~ZWw07LElbv^BLj4AdVr$ zp;uOJR_t0vN`|TP{>bWD;!zl@;XtpTJKy%drivxWu?`9Ml1fas%|eoL#G~pwya4y< z=H3q)1rnZw`sQ{RDmY~WBCR(+wB;b=)Jk# z!Vc~OMz9I)@ms*tjRrH2(SKrFnX~w6CDSQg^4=#I{=61 z(g}dW5mO`;0Qf5)V!Kf31OU(%aGHTIP_TZ?3>U=z3wU9`X#ny8#xEes5|!}0d& zn@M%KOjcjGno=_V*O#FibYyW+$j7ho(G!KxvScwullm^PhEHu%t(oku@o!`D+An^) z#wlD_0je@}G%WbgD560|;{n)!?h>jH`$nkN_7zH*fk&XEvEBHOIPT#*n;V)g{?1h8$q5cF*K=r7;{;JOkFERq}t`R|HdEe+J{x= z%i+LdMY@xnZ_0bhCeP=?Hg1c-REz#0v1JEF%ry?Ysu;tqa2 zbJ&v9UU#T{X7@5**pD|EdH*H9X^@$WNXj!uI!LY#hbF)dZDIIE#+Sd=Yk6s%62%h5 z42gJRLmw=c!@xSWaSk_Lc&=HxpVk8tKUspi%RE^z)!~l8;b^;W$UrRDVfMSl@@aqR zGu+1mTXeRD{Ryacrtv_?sq5O?cGR= zUO&Yys_S@|e)mF!!sJtNm+`Y}l4gas&0Y`Ac1RdRGAjuZO9%+h*c4a6X2++p-UV1qnBQTbc{{kFKaBi1MwSR2|P$6E_d}c%%eY>z|2; z9eob;bMF&-Zo}M4f6aoXO&4f@j1#PNmX~VZz3O*JYj4{ZB8Wdr20qO8s3pPE5zRHP z#G>qK_vA#C`fx@0F9Ji7G7%D-ww_7{V?G+f`(*Mmq!g*ld0nXUdAKKOHoG)rk{ibb9}-X1$I2V0EbB+kFk zTxbV4d&fY4u^fP*^vZ8X3wI5G9KplS4hx4i;e^iORT^IjRBZwVg%fQcy(Y=DlLC5$ z3;DCcuD=MRw2YF*5nSC(AhOYBYJgudY{07GBy?d5JOnb4iSMed;~FndM6;&&Jh*4*R^6VeaIRq(fs*w3pp}_YW5BdS=SA-M?xsy}uDCVD`#f@c+S87h(f2=`t ze39$|Tu8@@ThjN$g)I z!vY?DcyjUwOV!~?mfnG`YM1Wq%~-6HP?!Tp?<*==cSM8;r?>knQsg7R? zK%R|_0?{wx8&4H(mZp2gML_phvNt*Uw9Tbr*22d{A4aQC^DvQaDRiGGwhB>^Ko@x< z`0V)2;k_o0aD!voev2Y>(>^^PC-WuWtaI&AH|ZCQ_}o$ykj0$|(}PgTuNQS3fjWQ8 zi7>I7YWH=0?UiO}824-RpjQo^_YilsYTy98fVw!Joa+mL-Vo(6*glCv`^c#kPw zPvdx7fDm1nxcaB#uzgu>p+^q_2l6cx0=D^BF3vw2rWGq zqlqb9daMXE{Iyq4>4x|+3&+4(Q{gQB43Ir-*~uz8X4fD(&A|ob2xm_9FQvzI*2aoP zIw;`0lZ!nRxH{{5>8ehY4LQXV!Yy~Nz_YrgH^hp@Bb%w#4b<4eT;Z;t@ta;L;ETo9K-3oMZPy|K4Z z*?M26`M@!pe}0NXIJoN1Y+KH3j|7LUpX;{j^u5bE#tDRi8t8@_IaLPrG$_i^e?>@B zV;U$6teZmkmgugo0DaGc>EwNnS<&j>A=8{URi_TV7Y$6s!hswP)`=q^_R+Zeo(@-C zmVaTJcv}7{ELu1bE4Vp~<7b^^sB`{o(i9Tkf_@f_5H*vW5B9_ZUK}PlQr+;avu42# zAgV6fN%mwPS0e0k?1&l4Q^bk;nE1tBOPrfLRB6S9A@E$7h>|kiQ^5;Q9E#UJRYgaD zV~?}2w-z{s8y;pxspT6WL|CvX9oK}Wtad5GBQMI5ldF9kEk4pIedPq*F(qm<)=H(|EI4V@ZcFU8&}Bfw{%wy(mF>8I>uS%wPq0YV>d&+<07jUB zoz+z|`1{V$L>QOzVqF=09%d4dO!T122?SAB*c|v)L%hf;3nJ>Y*vDDV$9e3Q@ z**q9k_KxyFT^JG+1yajS46%$gQ`icuu(|rhV(FPcJ0M*h%y7|fYZfWOh{!^QeYSr> z_Kdy9B9m*m#4MScWnMD&E_<0gt%DX9@J=7HRB0F-u>dgkwA^1CZ&a1q>i|_BlW^7w ze3(|UaEc-p+t)R@bGjOcCYq{p8YfSmm7MnlI_)6}YBp>0IlYQcGNCavm)J&v=$IV`)>F$1)Z5<3E7T6PX{G;l4-oUd2pIX1fUBFn z7o}{&!cvFFfzjeDOOq}bq7xe~lZmRrXaQ(_Ww2q*8ZGUr=kW>yEJi0RXKd-y< z&$wMv?UmdoVmYq4uJOjx1nKYOl~dXGmpSQaGZhCuRYmtBQCwhsj*CGD>O?k*&~=0j z_mvxbY%lW{8l;K$`f_l8;hWoVLTPDAOM*oSF~!J zIp>)2Y-*Vc#h><)9o}eGNVWk4&jvP>S8KF&G>i^h?%bps@1;q$P4z*~1>KUUv=cA6 zuC-9Sg3K-Y?lu^*uIg9a=NUw(7i2jN?egO(VoXz5>H7N)GM5GNB%~JIY@EVt87=nv zTOVT1&hqKtioM{r%Z}|0fqoskr~2J{`8bhzO5*n@Q9;+6wQIZYyd+7KECQUHH=*~0 z&vem_7mfy}R)>9n%&t7he+X~$OW>X`J3zOv;DO?OWsiab2U1m{jF+d7KervvlkY`8 zmn~$3U;QoIruee>jrq~GHt$7AoZa3jecRFOO$hxFLy+pd{aWCsHVnWr09B7FMFb+K z2M!Dzp@NITHw7AOjB9aG`J!#dudkTv{wV%@p>lxUTrh@|aUdH7GTze00zKaAisPjavvhJpAIc2+>f}Spcg8UaQZ6ed47L_$(6!uGZB26=yT^ z*}oFWTmL7Kd?$huNuiZRSMx*eKX!i@g8!8`J=X0ZAYV#5_PCSq)wKzi5QqafWML8z zVbS~3E8!GG=mzJu9-UD^|IoJg6~ovw3!b_nYlS7HoxH(0Gg?G885Cdm5m10L^)^wS zA@TzPTdxBNgD_aBhWiA;{=NrnLJe=;uN@CaEvuuR9yj(^q(V|OHXWi^w@4Vl6#i+k z4+{&OTS7tLRO#I+pjwd9|6%#0yToGv_4l1WSNHW05S5nRH#$IfdHh9f&%%2sO?~DK zJWZo1YYt!zP#~ulcruyy;m3*nB7N7^hPN&wRsx-jn7sFfTktZ8+H_3V2OSB(0dyQx zN=K7sERX_{f##Vysj6AQLe1v4lr+vfjz|LBkgm!c<3HjH#V9-U zgv4?+RnLARamRm^bsLMkC2IYZm(TR0nse#2lIis0DV^7%+fuJvrD4<$CG~!}w^>VW z>bli#a6F?MBoO+)%R7qN2+mQRO=4y-8J0YbVlZ_V^48fSxWMDSnnB6zY) z=>z1A1O|AyrCqBNJxpQ)HT1Yigp&}#;8VsvopN{HC+?e#a>Q{vktdUbtdg?hHf z7{6wxdic@EK+Q5Wo3Rcd81F-`1&462$5J#>XVnl+=jTLH{DtWX$22V~IO_ujT}qvu z2uq;9ocvPy(eQ)bg6d#Y!@#@;h8QrQN=iLvpha{pAkzQ@&h}>m2r60+FxVXc6bM78 zvt!sY*qvwz2zEb_1|WAKg(wct!aDClt5CIs0*4L&ib%3(7}0@JtA%~Z)5^=8FOvt> zp44J(PgaD=G(^&B7^h0AsRZly1yRlNg1)sr4da47rAvuQ*J7ITZ@Pf&`O%}V;VLj+_zf-BP_5gQhbZ|$(HspC5COWjf}D{x${e?vp)j z*KnrBbgt9mVp(#X9e-Iea64VshrT&-)hT9)Z=te$#?vLX3KE|XR9*<~d6jK- zy#-Td9Q!=h~1sx z!OwTaf1LT4I?*>IUf*iphRtw3PE^a`+rCSnPC`3q>~(2cc;+r?(uKb?dUleTlM1_A zo{BBx<21IME15#GEZ22xK=mP`)dC%W6Pa8eXyT_wS+<%N;af59^X!99)H)AOJc}Gw z@} zHs}-Ibe=>~pBc-t&v<-CS5DU!SNbiDc42*(?-!lH5DJP0L|GCLh6O}f(Kj`F*XS4A z;K^utW+=I{A1smI_A6lA!OmLY%_m|io|UBraQt5^6UAc&dKQPCT8H9bu<>rh?FZ^A z9H@wV^z*niEzKo0q!?SF@l5S#cuC@bpxsw6{`s@@G0xG8=&4TArT6YN{F*lY^AA!S z{H?4rcj)Jnz8cNg+qgUC-erhprU(|MTP9%th*y^rIQi8Z=Io2?v1Zm(x)+A^Xux^m zlj;+7H4a&V)^lQLE>y%vhNpzsfUN4+lyoM&`BX-^h3>Y%Q^kNYbK^REe^f5xG^8S)Jjp$wws%9*tDMG8dRR;RgfY%rgLh? zRSsluEBG=u?45D?nqS%O2$9HEpu*z7#5#VZ0QPg3!G`u++lc>^sgf9Ym~sUdw9>S5 zOWoUbUFo;4VZ*&z(d20|$32p+kNkWP@4%C7N`98S>&4^z9V_CtcGpE@pGL8~9IlP7 zF4+q|(6f*w38^jr?BdY+TYa8<=Sh==zOz*gihSFjMS_=I*oS%Y`;h|h^k9p`LEH9q z3+)btd-Z-Vr=ZwDCyWvS4nr6A5gIJR;vEQ6i9df5<92pqN3i+n#q~v8-KnQUxiF;% zQ}+su&mXhESqpfgtyz6BoLASXzLi>2)NgH@07aYHQ24o9U38SS!yR{_E9Bna8(Toi%G~FMG! zr2g_!#!XLXIJgel0O7q*n3U*da%XD5DmTkGncXQAJ=V7RmVV5pgKUv>K^qasApeOO z^j;&B`0JCJ;5ITmJYq>AFg{&!h?lVzPq{4+_amzQVS5tw{8aqcP%DQW(Sls-dAUww z?JILt$s4F^b);55A-_9UG5tkAfP)Uc*LY6#rwSVHT}L{*jx?m!wPu5hqJzvQCQ=~% z6#b%XKo$h+q&hjEBm>}uu$=(&30ecNWN1c_Tq%WOgI9V%qYv84bs>{+<&Hb3fMiTm zUus!BzGRruZu)Mg0Bv(leMkIg1n}uqp1CPaTUq%;U_iDdMIvvuU}gQG>_I2@#M#dg zWFKbV>3fBp2sS=C3uMyf#x=y43!f|1IBcm9<;A8)jG1h6$!@S%5~^kx-7Q& zsVaY+eHXn0CXE zejEJ0<86a^LqT0Y%PompU6A```$tH#s6GdaYv`6~j*=p1)$iMcp5Jors-oQ)>`wZj zwXZn8y>mruc`ai)V5EP_S|n{mQP6bPfc-+IKLLgY-i_KFQ0V*XumzF6g)X3lGsTU3 z6;6nBV?diS@iGsAegJY1a+f*qOG@aAjzahHqFB%qfp{;)t@miDFKEeWx;h`9OtfPx z37H*4Iy$59Ear{n5mVECh<&^o%+rWM`DCMU zJRqu3(Wp5Rv`mG;FnLEHfH;FtZg2K+JTZe@3%jo?@G96{+EbUJ3_It0 z0?gLcRx#qhhHcu89u>m$L)tmN0xql`LVFI#J0JjwcQw_h$u{LJ#_wKnIv7R!UH{De_3T&i zL2l1t+J*+o;SCQ@n?BJ^P#9G>D3QRthu?1@siAR8X3g?Xj;Lpf#bc8BaW2TaxaQ`8 zHy(H7p`z;oS&c}=erQRwojkoS-MX`f#oUX*^Q9g#31pBCTGP@n!vyH)Yn&H>o{3FW;r!SdjgW=cG#`e z>!E4h@7?z4zY26}+S_w!AFiKLiKl}I7HbSZWvQtwH4)`>andbE#D0CdWp$w>*G}HV zq`z38ppgOmpyH05EZifC&n2W?wX-&@(}gD%aY0nQ=&NPBY%k4>0I7f{r zA17QT4-8d4+kV4xQxh&c4^vO~Jz0ibr-(zcTlX)tan8~uKEfM51f&bv!WCW5uXx(f zs*v{@&uj^45A`eTf-tvv;;C$&TBKtZ^7+1)gUGpLmAiowX-volX(asz#6i|W+y$dZT$BV=4I zAd%6QOCpqkU5+&U>n<(mV8Y}gjgxjtCtGzdec#NDXx@PpyJh^Tdd;-{0HG5f5M*-Q zhi!}RLeIQhRR*eJswR+F%JT%rb*D6rh};UgUJuFn*|vO-oDZJ*aHM-mj#&I2J7g2ZqD$I3;I z%H>5JaF66PPa+GfjCtv6Vo@{P_7Y@;WP8?4Y;k?jW1sqCqfv3P3%J?mTEx-o9E01j zrb62N{FhkO)#Ew0)Jmp$=ytuz{`6>XBymiR8u2?-S%HLFpp^YhK<95S0?L$7wf9C354#&KiX2;(V<{LYiee53 zh!Fu96a>tcEa8hZU889plKTYsb38#PD(1ygFZT)Vl*wMpoY+;#!IJ!sF7XtH*lh>- zJSx0Jk0rTQSnzggD!xnfW#bsxgX5_D(kdXF7i zmm#8;dv(Z9>f0y}V)4B>Xlu6!+WRRkBx;jC$+{R1LvGDhqV<4$Wo`3{%UIUKn*+4v z&MXfu_+5SC(9?j@ynC0iB=i~u+wca(#@ zLOOwrxSw(Ou$S57lQtQ>?Z-f2u>ge`8}Jn>Woc^--&ChbeDD!)e0ZcFqeNkwcwg1{ zBYBbCQ!h_?=C?}207e}Oq@jd_g039Ba1wOW;F{%6nVH4sdKm#xAdP%xVuF==w*ffF zJ4dcg+uvCuW9%xt4<>np71&ve@v}C)ySTuK)um+ND0D9uc(b$I5|ASvRnr|wAzCZ7+rrxl+ScM5{akpsP8Fg@9D zr=sJ`u4oPcf4YIUcIT^|+Z;rOavffi=Gm08vGNp~6$(8Hla_|16UmC?j{^{~Gm-Oc zA6fh!7hCgTY~b`gAmnywMBt!G5sA+Q`ArBi^}XehXXNhNA1nIL40>$;Iv04dDoLcZ zyRFImEzrh3$8;2JNVZ&U2Gev+kBLE94ud7?&fFQC(=M?(+3k6&1VNTxVHvm+u~2s< ze%MUGXV=j!)>NRO6iNhw89N-Y?(f%(`+}g7HT-WWw6KD3Ywm_rNy6by&g+jKRX(X+ zCMv73o{dj8dan|i%hT%)zDiaFIm5+-i&`bB(I`gY4f2OcPma}IWnKfNc#RarKTBwDtSj|o&h>OMU5-)k)*xt{AsPG zb8V%yAht94&HbV$8_p~ce*H*0B4PJA*Kpv}LzEcG<}QtKO-=}2RF`ykxa_F%5~C?- zoIZJ!9kt|WQ%mU_SFX(zaQ5OvOQtvX&2*rMh2=D&?Kflz>>5Xs^@esh+hO57V)5uf zZH+hit>t)_55>p+T#>GpWT=#~XNr-IWVPMd3`+bac#7C2Zq?!`%4#iN(MUv^?d z7=7SFl-eTogCiXh%(o!~(rNQQ zI&?bllpgQI#NyO`?e^6ultSjw&IPFR{1g@wM9{k>$8?gCN9Kt@78D5jms{VSAMI}j zhQ@au=>6JgG{qLCiZuF}@7b2tAl#;~*q+{S+MAC3Wr};f!Q-@LNJ%W;0=@CE_n2NvcHy`-rZGi}LDWQ@3(;cKb`ml({h4 zu9mjjrA7DE0xuyPGbJrM3BlJ=3kW^gCQLDX)3dfiDK>LY6ieo~MnKW!CP#@Jnc-au zSjJk{I4~ICRG?wmA>|9{q*Z_lBf_B1t6ZR?*+?`OrpMQAn1I8p4{W=F`{=3L;G<^t zji6`+!RO(oeg>RX@Xd^w;aqO66#0TGdyd}kXXde=kM)KB?g*F=G(zA*l+_)Y%8t*3 z_>&F_zo>ur1|T1@F!!?>{7#En*OZq5iox@WYZI(+$8GEWI$|Dq*|p&b73(MCA z)TSOa{|U9PB13A$R7g*L;o7xW-{IOp*c`FwKy>BQ0`4@WX=QpOA z05$YZOIXXtJO)uAVom>EKAnWqJOe;mvBmwu`ZSt049%V(6Jq5h+rFw{oD?2=Ma{n# z+i1~yG%(fm*EhTYcRD{W6xUOg^Q|MipgO;#Ep6rg2kk$G8-Yn*1? zbxwIxIb33lJY@;3rrAb0o!lO!vHDvbP#pY}muBYA?0Wk0Yh*Vp6zSAv#g=~x$bENJ z9QGd`hN_%6mIuQ&j@-$(6+_s%_(*Z}QQOq9CC0h!x;;WS%C{nKHUeP-2L8Z+ROBiQ z2WnrB&s}3Fu~db2Yrb>d;g&0hx-l6<(dbyfmPk2Wa{dtzY_$JfS@_UZ3~Xru<6eg|njY~T2 zy~sjGYpUYst{q^Wqo~=Js8oIHmMzIrjw*e@j$N;P;YwSSrP?LQYpQRrqs{NSPxs_! z?bPS=Ka`cqBRymy_MCH4u)LVKQ6@4VajNK$rb~j}G8dKr0>Fok;{sR|9b-);d7b~p z)4;_+zud!h4&BP2eA>I)!Fm&a&a-nJUANZz23H2B4L6dNpC~n|r>)sDNUxU39LZ+# zS$^F=?sGrCf65Sm59lyz5QHSUXc1Wa`HXp!zn}(%VA-30q`BU}vwpD0wti^{C6{Z( z(947e-g+M67~=K*q@&}BamU`jn9!Fqbm+N5{mSuWJdTmER@Nat^nCGIMhDYTLhAr} zQh!cMg5z#}v-X(wO-};?j?M%ik%0}z;qFPBJKWh0h1twaIqC(~%Hg&W0+nr_*Q~-e zPo3h#J!gD{vQEA_ruJSo_=^blj{KJ+tnvD%J}?+C z|5dW43jd`uC5Mj{i0G2aZ%jC^$(Z zg+c*m-3utWJ+EL>(lBT9H@e^io1k{9g&TbwsKLSUKUyCOxoSr^+brC18^%aaUM48R zm_r31<`5FE(8wXs@m5{SNry#Wt4uS5lBNb#c)qOE`$1BXjgdwf5*Zm72Cq}_$OA=$ zq;3#fXoI|vyLfh^#Y#DkB+h(By4*}^m+->MMBIa?n9!Nhgpc?c<>R9WXwR=d;(o2P z`$_9u%H;iu^#KNoTO1_U1c^95*?Z`2qI)$tw2UGIg&A#Bwt8R@<@;4FMAb^!*7%JEa7E0;qh>7*(X?)*u9NKo!7t z;Di*-Bcnmr?JPp`CCEn`L;jJ>({lqA7?pJIW*%_1U9?`gB;jv-Daizv`Tad2C9+aUuT3#c#gM>7Z5dOd2{s#!v8~ zs^H2+y-ylIEWNp4{DQ*ysVHlU!FYJ{dI{0+6@W?Yzay}t1j_b#r9@{G%*$=VEs7mO z8U_Yl-3Y#rr;+6IW8@^zwe%rM6$cDUQFnB=u{@ zSoRlpwmm07MbD;b%7vG{v`O;YcjGhr;JxP2(a;^G>)-$p406#B0b z(eWM0YH!OIf#&NsQ|`&4j=_`bi|#D~t&)UYZem`JGacP4A$Ls0Onsv+a!;w^GrC-v zOys=5$ESimw=ov)7fd=p^$q^h#w;i)SYO}k1 zZphV5_k)GSD6e@@+RzW2($J~Qa!^aOHJPnzY$evPK+oKW;cFAuGUpbYD zvsNcFjoz=SEH47;HP+)7ip`2XN+DV`IofwrVU9#?6r_Ho{>>3;S{TD9t4aO;;Oo7E zntG#d;U|>@0)*ZnROy6Xh0u#gQxp{;Ak_+rfJ!-pj-Y@A6r|b}0Sls(gpP^|ihvD* zA|O(tA|NH_JN~}=&fI_AJClK#OeT}$oM)G{*IN6IBJZZm(gTkgS5olWt?D5gyRNte zt;k$6slO)uCYJu{14G>YH7`8>hJr=*blD}j+<~DIkO=#H>ukL0 z>r*dA0QvlmPfqLS$qu*GsWHb^T|sE5cZBV8^23Z zA(?GX?60~qT&ZIcc@-ovP6oPRh1Lmqf9@`r*!}ds$nw&-vkd)0I_!Org~E6_7a{2Y ziXzfF7xVBGTwhOo;eSIGT$};QKbBJ%^rJtG^`!+qyL!2F=h~kEL{kX!6pojagYLF} zQH$dH{NUKblCMc9hQo_ezN(s^#h@oeME%qyM9s>KK6C#Swc~DA#r>tqUFNx_d-Vy_ z)d(Ok#X()-b=f*kRUdtaJMgV4OCQZ;AC!>j+HdkvIoDop$G+Bo9}4N^T?!xwnJEx> zcoiPwl+HZO!CU`W9c!uoQ8(&MHFu4RYn!0Y(Q=;DCC@keR29lULaQ>SRZskmYrCiM zjX5yVW%cXuXF+&X=~(@W+wR0I<42F9ZbojZy6b3(n5;jbG~i**vV&!3q+UpX4}t#5568L z!+-N*?Ti0ZCr~Heo&VuhX*x1qyHfgbDy4p%ED(075v-wNo!S%He+}a501Y`m!?Mu` z)u~7J_^=HOVW11~I(PS#+`lMzF-^ruNP2;Viz8N_o%Korx;qS(WG?r^5A@ggpWi9N zC48D6{K_%{=mzi9@=ohJW5X16vjf9t3lIK!OCcBen&$j8Kjnn~WmZ@7UbLP9ij6$9 zeRj6KPg?4K0yHiO7??kP{l?za1#RYWD|&d;GRouosqd=?RqHCW9Ag{g6JdBsrcy7a zdr9;7yKKMNzvX*lroMmwaZmi{Ew1?K>6=yl5%JptZKnU2#a@EppeL@Jo2UM^gfz9r z!SHvigL9|uwQGZ<%dVO9n?1vaCJni+O!Xa{%=9)n;iN>4c-Lz}Cb7w}X*wY~U$?4y zP5AUmm=)StS`pua^vQ9^@7fik^=?K4xe>WQ?O*tm1y6Q-yz_nc2}rgySMqQRQNHdQ zNAVlpkUtR?9E%Kp{o^uAt0s%Z^po5iwCm=!)BO7_5sCThS>fYTr*;Q&yAA}Rda@T! zVyX%UUdW!e-aBXf`0DRjOG+A_lQpH6c@+xRR+IAO)8hbH{R_u%t?KE=&}*+*`fpu) z`H-F8Lc=M9?7@rgmr3iZWVIlz`{M8BIS`;p1Kxb(-zEs3(hznrVYY+$!U}t(?+~wo z^>b44>K9`?`s&5> zRGwS>PUsZVY5mD`0Jkhsn%`JE$hM4s_(279$@X?X%S5yYAjMyZ2)=mvHn+770Z>cg zQ~xH_0<`H}uU~DP)9{MW{Sj5OEz#Dr$pJLq;|$qq zT_-TlMwhnB8b{^jclN*JVqGTqN%CdLCsyy1JXm9OGHbRMwFSbPm6bMYPX=;gY%2SQ zH)cKB%B(GAC-=F%SlSWrbn#8^;I+zeQw8S2cJtY8Jz2%?Y z>7btnx7}6w6*ZBSY2*x#1ZA&D%?dol!K+gkXM}SYqOJ<}s~rS|JYfbqr0sv<75YnG zdrj5=ZTe82>iR^HyBn(VdhK!>=A!hjx($FVTm&s1SGCfpX*@bt~Ws9s8nD*OxDhX3{1 zgPW~#m7?w8or5JxB36-F^G+ z=ST#?2TIo}c&t0>k!}*uR3SP-@Fw8Qcu>$)^X(3wBFJka#XheIJViK#744BQfvZ_R z1|4DmRs7Y9v1Z;c^*BclRBcNhPv|?AOME1p(!+7a?#Gp%EYSmGe&@L(qcB{zvjh8b zjz^^^M`LX)ym*k3{pyfB0|zEI05d&Aq&+p@?+!VXsTi{D+4 zm`okj<&yB`>1ESx&Adr$%84v;@_>+0{i4kM#8}M5V!TLJ+#KJ$nTca{*1!ny%TOp; zYV4*snK`0n*nN267){9iL#Aa-Srm6|T;lChIYeMg^rN9QuK^a7$FcelP_fU2;d!@9e~b5>W`Ru)D7=c26F zUkt+QZ2nhUI%Db`tlV1K`ak8y2N+%|<&{BBYnH7dz#enI@bdeqN$j<7T2NQn$)v{F8hWp0!p0*}(QH*m~>mpLH`JsG0!ooop|ePxTTP z{Et4|i87SDKC2<@ZAHD)IIh`I9VFvnZv$o zI4|qD)a)udV_W?plhqF%hodZ60b7TL0vsvnp=~6y4DosPq{#iZc3`7$E_c8_LlvGs zNY;MG&Ghj*om`h9S9ph4=13ttQ!T@b7+4BeI2^ObQ8`38FmQ8!{pUfM(%S?*Vyjiwo*$UmE;*&7)v^z zF1NZ%&TD5)L1`U#ERFVlbhZVXD3pCzi*NOQ10K8Q zXT|qN`N12u8RV~a@EX*p@yKhR<5IWH-^gR4-WxUWD1zJ4Xl4f~$Y2h|^7|vB)rP55 zbe`v#AXMxwQn+wsxu-$UA0iRO2l5jciY4A^_#-YQ;cV`ZB`TlAbxeEv(2k7I#v1`7`E`bA^&ovL`F>IT1}MgCeGE_HuiM?H8+zKyL4o%_mI(5kTAGwQdx7aKJ^*#;37aH|4NoQk zt%}(~F}c!pux2tj<>1z%4uBd|3;Sqb?d5o*U;mlB5Q(ra5%ah*U+nvf>C$71*t0)> zn7vnZv9st?@b33nXqP=UCGDFW$bsyy)n&khJl_oDW{mQ)c}w}BKQ(gef!G0YD~^;(ZUF;y3mSdeRaap!05HkH$xgAK;3(LWuzaT|_D z8+C)039VWP)PQFLM4E5iA9Efn7F3%Ld{XS)S zu3u8SaAe|abkF9Pw$wwNb(xKx^wA3oHc*VFi%e<9Y%}5Lz7+-8pHLcBed90ORv92t z0d4*(_+4nPzktjBg|Tujd&^_4^vb?RHYQrz#?{4W{)h5es2dSadUXT3^j&_4{rfsd zw~-%ALiE^~DjuU@Qe8v0yKipD2K*jd6Cyi_NRCL}`AxqS&Rk62o?vC1^1evw*iIO} zJFs6jOmtj-11jxr^Jpq{S^U9l%aS&_tl%%a=Oj2nK)98Dek=&wy2F&2daFA^^Si6k z_RpKE=yFZ+6)cifY+f(C)qPMb9K{_!Bf0|xDU zx##i{RRAIz_B!#u+wJr6$ckixVdmOX;|x>S?Pe5Ldfiw`+ey6gz)LG#w8U`iI@`T? zK__2fhg|}|iKB`bUEDfpE@}0az|-`N#hbDZYuxYtgCmZjkz+?E_=Q>KR!bUPj!Tdu zpM3?CkIcf4-W!muWH&7_N~P){o=}ByjuyObjNS{C?!Wx|`;0OW020OB04X7YM(gA~^fP?wfl2qqt9x8oYl!aC z)wuHDR{_ybM87zVGrX?FMQ%e9+fT{IP&C+mg#yk@{YwPG4&YSeSN5RlcoNv;Fer{5 zVZ^T7IP;)Mq+Y-!s!U-~`s0}?h;W)l6xRZ6+oPxuVOE<0oK96>CeEn=D*>xONbu#u z5FmjkNN`^9ar(7Wl(Y_C3DeyIGiA0?((N3TCE!0lCCpO**77v+tE8zwwkUM|S>1fo zv>K9=VPD*p<~_DvlFb%pPa(WXepg^Q58c`SltfFYY{+Y79avGGxhmv)dTkQIU&xAZ z$2MWVICPir>pvn|TMlH~u$g}&s1ALe=C@TmyotHF>tyXT5#Phqzceh?fr~8%n&f?6 zHsyc#DD?>SkHy8Wpjg#=&u-XEwA;YAM2sq{TeZ;G$2~9UW!{dJXFTnI@Crei&n$Ba zRO@EPhawd-#~&P~Tw~=>D>}Yg5;_*8+h}@>@1%$6jT6Y&h-F-tMs_paQXqFFaJgk7 zM5#VEMm;O|yZ{+1=9C5)+N|iPh;2T_-`WmUdqwLpo7UxGh4VR#(k7dYc&w=H#u$8+ zD~&5VN5|${Jh_Ne8u`3;F28kc6HzAE`NUA_Mqm4{fRlTg|7I$q)ABjIqK5$?^ z>dH@f7xm;*MT&LVXO$C6R*;L6OQ)f=_Uu==TMXK|nWx~Ql7tY1J{Y&m{J|B4X%ASK zhCJ(GYc9x_0MSnF55^$Nkcblt9C%%fgEtV`EjjIdTMU)%ifw40(Py*;vldo-52hik z=d+06XHAkce**bQP{Z~!Nk5p?7^xF++K)1hG~&@AcCCYYt2VDuTMvp>e^EPg0@DUi zbo2KA>^O=*Xl&`TM|WqBVitqrtvz|z#$qoc-o)GGdMSnbva>lh$jUd^_GUQ12vVdH zbmsfLyA%)PA07Ha!)%GydU)>-t#?^yQsexvD%aGT{USwgT$4Rl^ zXLD4xdSFwV&^s!iQ2gW1NZA&cw?z(@_d(B%obT3Hpti}3=X#G#1R|lkKv+1$)fnEu zWFmJXmI5J&;n5e#%sJ*l-nJv~4i1cqQ3pnI66UxUpRQ?$!eU_17&)MCm?qbqjJ>EP_D#;66cIHikLwTTd45lahzm$B~=k z-pTpNa_&Rn?c%)6foVZWYwHwMMLU$DEBk=*Te0!N$iTRDqSLniNt|~Vb74?iFmq9w zt?oAA(Cq($BfL&W>sG0g@8#A>oy1TOJ7k-VD2L*H2J$ofgy8rdZgjdFfvOQDn&Z^EFagp9R-h|Tk?0< z$#qA?)+@3IyErzJycK52{Ip{UcFzO)=0sdbilHYmV5F7knU!MHPdU*JdjX?8BusO` z>3;Uj>rZOZcYl}w25smF{5^X+Iz&L%A*P%(0*9uNC#UNbbm+*mMcM`pt+xL)X9scD z6fOG9!n9GUJHjtNI}1M<(?eo<&@}sukQOD`E_rDj#a!Y)x8lSyL|0)u)hT z%oP=sM+^i7J{ZmKUSlDb_Mv`%wXXph@lcINrew=B%(llqqE6lurfgKbOWlOrlA;N` zDEO}w!7BBGf^Zs1${BgJGa0GiWQ+3az%|H7p`6c&R+F4$O9Mw)o5VkDv38nI{9FD> zBg3X*7~(l39jB8xi^@&gkzpaa|2i!QC5KBx8~B4SxtGEjGy0i~&Xh5>z4IpY`QM2dQj4bqT%`D z$GTP#S9%DLjtV>$KX+GYy_K@Ewb-X=SP<|8sGtui z{AgPT{&SFY%CF8{@iwo-a4Rv=shUl#V+eAf;Sz8B>PXg&QynZXhfm?|7xS3t76?F! zVW6|ZYB@rp46hj5bJKHS7XS*@6qI$;oZ=<2H-ZDVaAlLN{yF5ph>G)B9a-RUY|6qh^;L z?O*F560>?=_tE&s0)c^kyuy}{7%QUF@+ z8^pr93PgY8)26Zmc6?CEin)1R@VA$*fI^3tIM0=*FT48A&h4j)iW~d*3nh^bs6{ft zO)~0TJ(xQYkV@uxE*#PHk_WEndgl_m-2{F`J6d}FHBvqHn_WYaRE6zb6k{a)JH;XG z=DG++=@&$LVpGlzNiMx~NC4^zWVoiBBLmF}ZgSf~b)5UeMxK{98rE zH?WmkjVpS%D8tB?k#`!WJF5~RiFw@%^<{l#oRFs;B5H~+fHr; zUIeH`Z;Hu&*jLO$yG8oIJ@p&rwrxLeEjWEg0p^eAXod(>y$!4A2W0dTV{7Ke;>x%g z!PnJINl^#Z@re$-ns=mlAq>Z~zkCrZ2RReBxr&7Bm|+2fH`i1r7lCbSu$Qg&W)uWy zP5_5NZr%%k|N6T$Ik9I^TP1^R4?vj2u?6^QIR?9RHJfw?zoPI7DBOdS|B4hLIaC{! zS#r55I5%$8kaR6@rsEhkmOglG8$609W4oy|qKCh}w~$|M;@O?8@VEeP$)E3{ewxizszd@96*-;>*cJRY=S_?PRXdhL{4< zFP?Bgc0`Fs$wI6$w_8`~upwo?T+$MW|40Y*_g(I$4J_Dx3>o#1UFZ#q^0=Kmh+nG$ zXZLkJhH0BzAl$>2@@Mw%=j9?ur(-cVOH)~>pd4dZJ%8%AsyXFPLmIQ$2YL;4L9Ji5 zPc^=~9){Q1{?aHzi`i^&!8f5y+E9i4Oy}&{q9jd8H3cQc&o8eAQHqk81`j(EhH%(- zfux;zRE+HMk=_Y&*U_l9p*BV_kfQiqOe zysdGjQsbyJG<9Zlg0z&&L_DgO)OA@HGeG`Cc7E2FWw5A@@D~iEr}TcN2*OMV9VkSZ zx}iUgsDJGddI2A%EDrEz>sr)G@M3j=#6JJ)A?+vVk6`MNx;+n2vc)*nl+|d@rPji# zYd*`%>08qt*2!K{&+WeTTpqJ(dWl>RjoEwr%`m*UC+HIp;px0oNjkJc6ZEo9-JKX-z?afa0~{j6+r=`ABc>?C6ARPv zSI^~E9vK1GV^Q8_<$P@_5x-($ygnVZB3r55hdw7}Y-U6t7d|r9^n9|j-^+p`3#bWr(JI;n z10dL)hi$ywKDDP#d9ERhU*RV3P*#&ZrsyzsBYn{5Me^MB{>it88{4X+yB~gp0ZTLW zQKCN(s!-SV-&~2W2sz%6HomJl@(f?75&8;}HC=+!P+|w!sLw%*ws2vM`&s@&5CAfGo;!N{@ao8b6-*;AuR*Fp>`1RKY1#4ec0Iiy5P@uQj%qh zFyh52g+ruD4|B;8+lupOwk0>Y*dvPAP0~^B<&y+e{WCiuvkk9g)Fa6tmyxK#Z8l?n zs!rjUSo^9Kqn9GO-a#yE>f+w#sYy{pB?$?)6#6+{7>yiNq6(t(kgckV4>wj$6a6uE zfV1mUybrB9V0j3JKLyBfKmzMza7yaq-5DPCXSs+wR}AmLCkl!lm>-^xd@VrsO?3PDw>{1i$h)OG^~$9GE$bX4qrgSv463b}ja8zKLp40lsc&v(qj33OEp zI%4N2%GogOg~Neg@0#UPHO)^aIAK+p^H}`BlPWfT+g`4UWbN-0UC+)edkwE)p_`&# zz1gzNMEaalgm57Y_sg-^WVe!vBWG4U_a?6kpgQV+DwRB>@>a31puf8xA4}3#>n}FT zRPV|-9UzQ2Jo*83q$-zSgJR&>aaG%nE_Is%AbkT4CLm&MVx#i+ zWL-Z*0oQf??Su2GEwTZ5${)gQR=qS`Pz-j+o2oy}WOFGrz#u*uMu?o81R4r|ZcF?H zLhSmq8Dczdj~KoPy|TQ}?I7)|@8Z=9Y}?|j6Y~dOlPAnE6f_p^|Ig$FUPn=$0y%Sa z_h43fPoJZcQ!~ViXq#HpaEWsfO%;iCrSGsKmDpYzKg*o1Xb41L zH#D{YiLj~Z!T=*%71JulA2-IO(Ll*DAi&$U4Z9`uZ00BpDGxD4Hi2-)3P=M5jv1)! zLSfHPmMAB@y^pHG!|Ej!u!`Ms&E28D2quTCt7uVFMo!0 z;0YAKY`pyEy6+ALu3zcq%me;g4Bmv7JY*re3Q&g{^ukE#$UJx=c>HC9r0w}LWA3h| zho~nc@Hcl5zrfQ1y8!B=2d`F$d;{6-rp?CB^0V+H9T2zZU`RRL1R9`u156t7Z!Zl+ z1sis%yvvlL&uFN1Cb zS*3*uC;zJl^2Wyf_{RR>Ad|M&K=mLDvrCxvF^fBQ&OZmN2+5_24rIWk=rEHih zD?!8YRn(Z}MZ7D;bYJO?IzM1QQ;&U)5V6qg9z^^oiO${!;gyTabFSV>@ds)j6dQyh z_H=B6;WqRv(8d1BI#IzWNl2`mW(X_)GgHPIz9j6qO<|*Q=BS-7?!z+*b$c+!P}(Gx z+ostz%))T{|A}@=q715!lK9u^eChI!eH|;ItM=!Rn;jnR=qLrG=bNev@pOYvx1lf> zl=pb&Wrps12+?7p5l2Vlv$4iQDp1?b58SNFI&hsv2G5=VUa`z;47a(n*?_=tOr{)nt9HWfAMm**W{;4*WZ2|BpwY%YgOy z9=avIo)q2iJ#o?EXfJ=It2HNtkJKr4s0__^eN1>0sV%fND@iSRWM;5>&L#mrp7H$T zof};>zjDDhsWm@+-&x)!3CEHiqZ0pq<=xm5nH*q0!+Hi_-BaCN!zY}i9_=a`c5%#6?xz7o*o=wAFCGJhV zUU@zi^A|=0`{s6XPJ+=QS^6#~YPlmU^k?yuoim2ZEX~t6aoL#R6HIvZ^~KFW*C#R( z0e`#dd9lNN-f(M5v7~3W@=>$j$@=s;R@kPX;HLGl&p@ zBU9TiG^|ij3mfeJHOt_A$D6$R30HGiOb5q2DV?vI1it)9ZUz|dPX-ysoW@p%cqS60 zNO+r5aDip3wV)syboaX7u*eV5i2#DR{f~YuA{6+pd}Wzn=)3f^w2diMFr0Sqk{vjy zEdPmvdP&BljsFWvdNXyXJ(nP~0C0w@@fUW!CSZXb#tuNTbu9LNnTa>*)>-?O&`dny z!XR53$cZw}Zd&sqGInjGKyMd-&~Y$WyNf4@xANEpaDBU*IUZ=gIWnB=sfD( zU5Q(oiTqhjm*wyV$ySRdvSf&YB~I}DRiI6KqG7dlL_x-OoK-3BqrNvn{HlR6fcYC8hQ7P z7~AkQN4c+u8qXOa@sc4Kfy@?Ue=`BExxix$+5sQLUwTJ;^%qI>n-B2n6Em610<1(r zI&PD{=(+iakF|lry5&zi_Z~L&@K5*g$)zuXYwj4Ir^M~vt`&g^rp;t$nQh>@?RhuH zw)M_=lDL1=qPFAXQ7cJ{6SAttU+;L>l2Phrb|8ZI6L&L^F<%#Zi=@Ak`l-kUeKKjW zqs~;UsB&{|Ak=5oBQf~P%JTIB93B%Zmq9H1Kmz@!DFW}^L(xJSG7yh)mw@Gk%UP)7 z!E>yb3d{#GkIePJD-|aJzRL4@Wd(_}ZHS&tR2xHzCLjjvk!yu!3B<<|O7dO2o_?`P z!82<1zA?Z1DVd%pj@Vl2Py9t)tMt|*EQg2C;N0_~6Prw2FU-MaUvzm!j9wp9t@ znF8bSY06Ux2SIsF|0d1#rJNq6+N;-eq#{q?GXHT({RIYD&^zJIC$RaUmSifq|dZd zZUXpyh}m!C^aR__@?IZVfO{xI7+?EQBHruVpJtOB@I1BiL&A1mqhMrIiy<7O03#mp zAxW^C_dSU1F;As#Aab$H8jxGA`t|omE_n`Qp35tanRteGZY<53Y$z0*V$y4^d^mhiYIO{ z{i5_IW-Y{k|HO_`GYthuhYlW1_K2A21ny*k-id^(K7zm4ggh5#G4HwhHD^k2^xyUm zb4CNWd-}qHSwdRu<9|6pXd1O2+Jw#`X`(m#*h}XX{b}yCBZ}fjS0ud%!x4h9Qh`J7 zrE=~0EO-L`8tB1oVq7>Ev6Vy{N|Hg&o9~_-T^sN%sx*1!x^g)?Ta#es*%)(&Y0vT}gdW>+b|2h965^JsBrinqp^K8L zlt(22jonBG4kQvIy~Zn~^kACaS|=}L&cePH&9L@9!H!v{#SndPzOC$FB3q1wI@T_N z6*<`V=h9V2*q#o8U*~+${A2WfA{@6_YIm`yH(6JHj@GA15Y$?Imw#e^>houWQ)_SY z4%Nfc)Oa6Aa#zWeUwH+&K>Fh=bR94dRg_Y9wb`2wR1cE(|IJK5EGPgpf?UQ19l6k>A47AX5Y54%t$-Z;iXz^E0dyLq>Q}G%6Ostw_9?)Ids_!23&W#{|%c=klSVsTxZSdkg_RyUP)8r#xSm-;_ z{n&%&D;g~-Vmd)HlaSCdPXvkwe5RLKC`^DU`RA*|&lU~BII||f z_PflJ%+GyXJ%o|z8?$@eZAEc98Q#PbE5}0Rv`(M3eR1EZkqIMHtk*8F0wJ4Uo~`Ey zw}HnEw7v6N<{n7li+IyFNu*>`OWS11R0*4)gM9&VXI>_*%WD>POy!PO|B8Ntk!5`q z=Nl(^xCYBqtcw&rjEXcnvR-EqbY^Ftq|S3Ff8Ym(RmA)TuV*u65eXILQddAly76tm zliRD~%PkCqN65L;S$-S$8qL<(|7VHJYZj(|*rdRA(O%&(V)MOq>;p8SQ~r@V&*AZl zn*>X@Q|^a13Qnhg1G2rKGCpqEin67ND>$dYhtA3TndciI*0)>gImVG7QRL&u*rAuu zGCEcT);c9_9X!Z4#sIjCehB?_Nhm*9$Vp&F(h8pI0Mc*mvaLhNY*C8O9<*=IY(;At zf_=MB3!GkuYXlLCa!6Cp$6#yjzEcYi47!K5DJT>ZKwltvFXeL>9|IZkoJK%3P2Qkl zX^n_Cwr07aV{i9~pP9XI!7r-@1(}2e%dhog@RBgnB1z+@zZNHZ zqiMGh^WxHW-lINMgGm7t{)mCzr**0W-|~>RRyIS}@sN+pI#BC$uda>WPjzOaw53jx z`rc{(OkQppx@p;Uo+Xs#oc%1AdkIt4kei02|)?Z)s0m-5nQp zyIe~go8vu4j~8D4@wWU@hi1?Wd`{wl37I7xJm@HP%+K?20+2(S)fdRVh`ee&z&}O_ z<+m)%JpY%4^9j1epL5iVhumAb{LMD<&<+-Oc}@DgARHZ*>Q|Y2&VGw@MEC7gjvbO* zi~x>+h~Wf~UkM9#3LA;8v}0^GT&NY6XiAle_2Yh&%l<|C8(Re7Kh(B2%c)o2u*o&c zN_q(C!ZaVfuUrC!wONZK)?IPwY*Q(Mjk2=NXKTV-Jd(apfL>*bgg|waz3X&Zp3WoN zgx{YelO#u53LWs{B)nWL%vJnX$O~8aIB9HmZDcE>>RIjl7s{RPA45hhnuMTAfTACJ z#YSya>+Qo6Z+o2qVkIuU5Usi4G@N=a=Sc-J$?Oak)!N83yZ?C~Phswlh`n1Bxc(t1 z`wGfwla}pwlJ4WRR;eAbG}NXj!`e=4fjCRah3pglaNxQJVVjh+)!WYrANh&UUU{a{ ze3W940hi)ZHCt9XE}Cw9pk1V8D-;koT5M`t_iex9kXRBX-1hAHMHiv!Wq96Gpd$ka z(sBeNo<#{M{yHZJVMc^`i(X<%Wp=;+o1#ib3&+=+t-)`x82RtLekb>B&2Rlvtf2Y8 ziKtr6MA#`YWFG`MXGi~_J2@R9TzYlajY9Iznn1^L($hHF3fO6GkP1vs(ol3aqHDT|A02z+7Wsx^OF#!u(?dM+b^e@! zk3}~jKqGxG&h%Z8@@dR>5A6#OIpSFRio;kB<_ypmQ~Tr193fq@a)}Qk*j#b+I zsxUqs>q%|)}2)x=wLHW^8?#-Mg z6tO|Ox%O|S7no89t_Huk*Gq*F7+N8XkMEImi4Ye&IVZfdtMxIwoThZr0IOwWz}RE> ztr+hbk-zpzio?S3eJwSt3HFJi?s)6G|LoX20i55CMQlj|uw{2B5+=}nOrn#M?g9HO$vL&BXW>ich7K+Z!TZ~Ml3#Nu2P&l4|ISWa6TbHd)Rvof>} z+ob(eLCZKi*vzL1&wGG*+AL7$w=-ILo~iyr%Z&9)*U+t>&lf&!o7$>(*;Pq$c#R?b zr%~97d)YSQN+Xj#&H_{s`+K-dz}Y zk_L>gQ^5A+#s-b}aBM%ZsCt(JymAfjA29<;r^dLvzhB8g5>HUyo%{kt)=*@HPDR|E zA8LItq)DZw53-7Q)uzbkiz5bM_a(}?u*Ss1un|Vwu zCd$80na?>b$(h5y&+TFtet^Us(Q_c}*wq%{&PCnyRB(g*#e3%9RnA@@$2yyev4}D7 zqALKE*$UmWx@`*!%iIUpt*^vFWf@y2|5xBy2Ya9&ax{Edm}wHwp?i0-)TB1{Fqb!B zdgY+&olLWsI?4LqVK#Ga5boJLkB-C`UC5)cSb(Q0YM^L2qQke($U!krWNbwlf09zE z2e}*zit#w|Ow9G(?lPk;-&2X{m$5_{jM78vbux|rs~tibkV`oYN%jAt6T)m@%y@A` zjkl(FcAen}ig@=@-J=Pt>B}jq*=4vdR@Le z9k7`XgzT*ZJgtIe#sK|*!lRHGUMh8oCF8Yu-Hugn8wl4*-)6!aXn;@~y%3X#bL4w9R`?@ArS_U=)DF_OsBS)+FMQf~h2Ke8fSDydBd);Vy;3*p(O!4}$a|-+ z6shPaS^5r5MJzO?eE2FeARVMB$g+iW6=l-je>d7jTknw4-M?fzIrMS67d3SlOY%%R zN+YaPV(2iMmFu8g92B#WhN5CjsZkDrY(K)c=UGLUJYVFTI7pt3E_(jc)3;_>^r!A( zu#+;mPyt@zt3xeI_Py)!zOsGmI>P-FS6CjJnYP6A+>mNN*=vx$vOq!%wCXOY3pEb4 zE0qKS3~1uf?LV8}gSv2i$bIJDtCM(&$suEUVUt!q3% zjo`=xO4W@mN-)^v@`tNUR`n1ALHv`M@Vt&9iv7djg5x9UcOhm+%Fc%fvA;FN* zeJX|+v^5Us&ty59R#?-6UJ$}wZXR6`#8J#%{}|T_+!I7TDzR0s72Wv|E02_3VXv>i zZ)YXq0j1Zyp;WI}VEn-(MCEL`jSV0o;E4Cbx@tidvT z`|SY%mcI%`Vc%pgcKC)VV_(%>;jrwBlu|O!r_?_x8SLeIZBUTfa!o*x^?E9#^7`{r z%$dy&aw5%C2w7yN+K<>l3TVs|sdyEoic>pMxTrj2fr)dQ6-Yn-Da|szoQ>EiPecsE zOKN;|AVHMz_Sqe*u$||85`O(2r$_20P{RW;ga8w-bw!rM>^Wlo(He29z;>)r0y1UH@`8fNbHuooiY*vt1 zIj{ef_3r5!^o^kVdt}ypMf6xt^X(I9eq6VNK0n<$^D3f`rls>kktp801?xh zzK4Jx1_ShTkOj=Z%a0}uu>bbCAuY$m_~o>(CN0xaNo)sz3J16+C++@>#D`WslTWE# zeNkXv2RK_lvTMXc?Iq=jJ?@6`g>DN+mRJ7m>D*RSm$kbe2uf8R*eLXbM`?NZ?7s79 z6PKuD1ldUcN7;nzUa-)Gomq!(_^7WawniGHes8xq2(%ja-{=d|#I|KO!TmDW2W!cn zM^S!p2*|68e|BCS{Z>AVg1JoL;p?b<^#w?*L%5`ne$c@Z`a{3%HXJcqT-;{{8Y_9O zb`^}@78&C&7yxlgeD7w|G8ftax;>tTiav!u+LkqAcJvqwo$ZCl4+}ADm`WEV?0i42 zv4#7uf6>=*WGKNlKkQd@pnRV*xv%m}ZoLr1#Qr{i0ejG9gRX!PI^{YnGf!i-k@1xb ztVmv4sGY0ha@6&C1hWg_!(I6PvnFY@>>o|ze|x~!tWOFg@Tc(fU8#?Mxq~~c2m%Fl ze+=w5C*APaD#d{a_x>XS+8(+v&g0WA_<2P~@jWl$5w5%mUUXPfm<6cXNoTZw#e6qkLBeLUi50tKOkb%oEzlr{ay(3^=Ij@>8woc{>R(f{tg zF?MorBlWAX?1iY^cjJW-;svJ~Im9SvkFg{OB{|Uc%_B+yZpRSCLH|O~!sV=387tg} z697x|nY14ZGuVE$HuMHbPUld+*7XA3ZJ9%1m&Ey2Mnozwk#)-3Oy1fYq7irWfEz+? z>O|(3bN!=-uV+;z?x#*BM{#Ox7y@VAY;sU8eP)Wafq+^G85d;RcsxY$ z-^jK-=ikUS)h%AdF<0q?KK)gHoSN{@!l6y0Jd;tW)dOaNb3DqFNXD&~o=met%kaV2 zfnLedB=48WMChC3eI@I{pZK;B$;#QAyMDi$eyC{jJSLHSPvWa$m)Q;Z+5{`U79Uhv zPc>_g1)V0JVh7?R_pQ!$AH&L@v3=KKeJP`<^pMGe4rPz8lJ`lfWvO>!j0Ujfk{%!T zcOrc3mJ0ph!65H4tI>a=1}cO_*#cA&P{+P6=`%j|>wG+QrAnP)M|82}1aSv>ZN-xC zfwN`?bN?TE?-kWl^z93;okjuy5^Ct77ZCy~(v;8y0i}wFD4|HP0fGopQs{_+iV7A8 zRjhzwK~WM=K}5j{DnhV<0urT4$-dkFH_qcZ58t>C_u;&RLB`m7WUsyET63=XE7U3{ z!uu66S>|2pJ^nRbq@kZ952ZQmXbXN*>+xGRBS6O2SO)24LO_rzjvaa;rQphuxn_N2tU)UU;6Xbd3KOIr+@1yw`sLfRp-i0O!IEqG9aed5CNt@izdjc|+a zj0($YIE2%;XYbA(lCv!J66Le^Z#X4##P%C*{?n=mb!+Rb^-q&w)W4rwo@iwFc#{gw zULrBjZ~4boY}0zl3{A_#+cmt*iN+;1)_z|1h6H4|QjjKqECGWEU>;qVL0q0o~SzIA9?4jIzt!{>!4|(XURVI;uc|2{6N1ubA zj<+_gHqn&Qexd5$=QJN9mYaGhIP=1@alpNgXl$r7Nm?cihL+j(WAIctX=m1pt zLppoKP^lT42iQDu91>#;HA1uf+V!^b{c5+j%R5_^0BWpbx)#7lpgmdXYafaAIB`|_ zRli2%$V(}+P$>G!s~Z3Yyt4dzM(=OpS{5d&w(3aMSgHhbxoMhkY~`iAcvQtnhhe9% zS3P!u9kAY>P+fh{)rKh7_i=+#6QXFtMFj;qRCa91 zuf|i_3^N=NKLi;d9Y3A3Amxb7wr$(ixO4Zi2ulV1Ug#`;idXsD##raVR4oQRHq*YF zXyK2M7_^$7r8{d081D|CaUN9tKb;td{Y;0s5E(7AO?G_GQ%|(Dw)E%IhJX2cG!cfZ=cxX$;S(i-c?SG==uJC2^-j9o< z1w=&Tlegs1^SMQ)0yXG198)p^Cn=nAbE}yYwIQAU%G3VQ_#|c7;kW}D&#lRfAkn$xrY}bj->C4x+Q+FLEtQsfR8J_QS z8CGAPZOECG=n_+KdUAZSs6Vu%x-4?%Z!SI$L$y742CsfsOT}1t=j#yF+OQA5>aMfN zp30etKZrN-Z=s?+N<9+-6#?^I|H4WdSsVjNs5cm&{k(3rMbnAD)}5 z%v+|c{Q3=LwB4GE`m4=z`!@Ayz0hTH1%^k;PkT75!HmU*u#1IfqgIcNIc~_S5YoXRj2MCfx+|b7_tqE?O!g;5(x2Pcc;&_aMO1%&&kUmN zcVD6|rU}-V_0tv9Cj=sPW`H}%ns8`sdY^T7K4fqvk+ov|+&EqO&>6(Yq_=eQ&UVc! zJ}Zscm{a>}FTP%EQri7{w-RM5hcyyPMRF-EWg1N`i(NKJP@->Ps@{#ks{R^m(DZC z*UHwP4%oNfrSTVV6Zfyk?08rwCCyft?p#i3lci9dI9QxHa55R@5L<7J+EBFJFNQTW@fHqUa8s@t$mT9HBt*dsNxMYhRfPkr!S%Sr?*2y z6}N&?KMLkyPv;{i)x91`LgsS(0PNv##;W6 zhiq!>Eq&_Q8xT;Ho*M^*?|~@1#Rj6}X3sT9=F5seV2&7;e1*Eyg%fWCBNSvP|;1v)km#GR=R4~FTNsRu|K@~|~0B-}^+v=}Wn z7%i=%oO1j=fg4Rmov>fe&_UD`)ponN@Sr{uMqzgKWtePr&LqUVws8*0Z1VZ=0M5mI zAW6I++>Ab;iufcwFCG`#Nz7}h`sT;?Oril^K7>luT4~Uj?WV}+7@{l>HEb?0Z9}y_ zT0ES#O5=P@=?LEX#AUIE^PQgt`Tx?5jOFP?Bo&ZI4Y3=}S(IXkuOxq6Vtt@w2EDvk zU|-C`AoZN2$1wJN8}=5QI}H#Ria2WQpd2;zlE=m(n&b7e91-Tox+qce%J~N2lfZ^62*R*f5Ds0ZGug(1E#KK=M z3ob;&Wn7dew2Cm18vvd_elF7?4$Qv4aZ1U}Csw|59NZp^`s&I>e12DH1He%k3H2r< z$fh8OZRbwI?USDkdQZx!;>T|U&`uYT0s1m@d5B3FJJ3p_DLx(TjP7}zbLq%1jFcKT zi3Zog&-qP{?(&n0bs(B1=?o-M-nhQD#5Pg~8=iL(cOK8Yh4nH$+U=rteC~0j()S#h z5ms_NwKvD1l$|R^@5BNL%q*cS3drBO*{0{{yjOVK?CWzcti4Q4^LJH(j!BY(hue`d zS*Pv~HGRu=v#LBX@@NZE>>H-qZ}?}>qunfaj1+P|Tf*jq3+G_0KYo}Xc`H5>Nq*w- zD%&PDH0Ev9Ie#uC`s$`XBKlUIhr+~aO+#PFJ5ZSNgN|>*h#wUM@MH?8SZ&96^Q9|1 zj*iO$$}&JX(9o=?-G`cVR?HzvO`Mx>(?S>XL>=gM797%>ftkMM|g7mEHkx_2ZcJ?8$OD#Vwr4`_pM`5uN&XAA5i6St50i(nc2K@ zU$d8eH^@>$U@v?u_7Ta_NDwQjA7NquRaExvm=drSr$vqbH1nW!-(8Y@G|1I-OIP?; zAl$y!3$!5jQbJ0jUvZwUCaXQrK5j#6t2ojMzUe)EaY2fS@q(VCD!H$MMV)diY5q<_ zgXw1JB1^Rr(($8@9j>d-(`5^UEKJ7TW|JRZg&CK$Tc=)Ts!kkM$6dW~ECUnBVNUgL zIQXJuZY0z0H%qZJ-=YiuL9_-;a7(sL(+!3MOGR6}ca-1U;h6AwvyJv3L-#~_SX0_ zG+x3e++Wwkn7M=H5f1bjs&f%#|8^&jnBIa(O_3C=0RRRQB7n{zmJVkPVkKtG88oKF zGaqBdOz-i!6LWJ*#=SuPuBFaNZCflk@3+ffwHXn zuu#LTJ*zp2hfI^!f1TIO>Y{trSsyTp;(hiPk{Pc$6{~buCoQcPGj-of`Oalh5wip& zviBUGyS=Yu;ojv3vGkp>AxD|lZYmSOj2w`lfz~#ZnLi0XB1n)EU@y%EoOCj;w)c4S zn^^6oZyRh)g;YPXiu||G(R<_8y8g{Q;umIC7vg^(8#cDx2{_=JbKvn9liEbW!Y4r$ z(Vc>$cWf+_>JI)Ym8b+a3*or26uq#`}s( zkTsktyQHXFgcu+!44Io2&aV*qp8pfyX2e+mv$sy(92y3IMIut7sDOk8+>O>;1^S;aHrE z?{g*n7P&2W%SG40#09rS8wSg1YbM5jF5^IOn@(7q_uOl)sR3AZpI=eS?_JkvviO6i z(*VSOEy1&-iXTW$Bc8^i_T9m6u9h_4(N9uukrTI~{-$J^J~C9FI(&7QPM{lHZdc#` zs2Fn1az}y7a#XBb8O|!Mf%9z}%jjj!*)8cQyyy3Ih!&sJQA5-}zrWu<&J>9+*s56_ zz_<**nE&T?+Di)K1E?YH`{CK8=OqhuAqzTgn&EqMDQVT=XYJ*g$1MBX)x>g6MA94N z2Q;-`JtU4DWIRP=0q^d`4cH%ea5c!~*SrjLhtD{2{8s#<^tpNU;5n83n$|sV9mcy> zGdxIdqEqVF^T~4_q#J9XlBoes<$e*;C>6^HKpHkA5=vk|UN4Y-N(UJqE2?&$WvJPZ zAE;=$j7q-MUY@auh zi&PHP$FKXy>Lgu0)_F5UZZigu^8)C=$#An|{$0FH?v(JTxbvdS71q`30(HZ#KE`!P z-$mISkK10L)(JIWJ6I?dA03%}#VNAfbk{R`Pd{t5LKg{3;Mlhu%!EN;UQdtdiUsOT z7Dgjzu^i6wXxDAFv-|o%MaQaNReA7<|M6r5NVo!XqoF$Ap;ha({Y$x@`>KOvqs~0} z(vxyY+%+Qn6!X*Cp$TC-`@wrawR?iKfY$Z5QCX-wJcbKNVPYj`I_;Gum<_w3Sde%V z6F_JU@E#zh33sz}0BTM7b3;+anfD*U_Tay`1O#ukjj!Sb7mFj_C}PN-6R zZtKVCH|Xhz_px-^?91|d0k0dXM?hKICN2UeU5q=mR zjF1UGXUHE^`B`{V9>x(X{)H(q zSk)S7wJe3|-9g;=Z6TgQI)NxhB|O&dA$0LHq?^uiuKENwkNkbg(>Sv3;lI4A8Hmte zxF5JP=)R%hAr(8`8nGC}r^92@CoiN}b(#@AWY`PlWcwT1Zik`G+LncykH|HGw1DgL zIvD8fdee{p5-&U^D7NrNV_-4;ImTAsW0nIv!ZN|;17gEP8&-s{3RB>?N{Gb5=uKLt zQ#!K`wkQ;~&Z+Q}y1)UGsn_jEA{ACCQ0rS#H;fslLdG$4^YF*m%Yw_rl5xd4gBv<& zbD3)I`|+W7s??({)Iy1sa&+P`ITt-t2A1c==QxElMPZ=m*7D+dkH6pEin@nbumFu-s?Sjc(H6Mu+I=JG zy$~~mZd~%yn>QtC_WNU3h70#Y^<{+*&dW>ETXCw1RVV8Gi$0}=#)z9HtG-FD1{gdK z(06Ws$BVwtCQ76is8$>U^kfDiia_Bb=?GQsw|$m9azt5sroII;Uad0dZ1x;>UFNnt|`OFGvY7o1t~t_7_((td!7B;?i@z6TL4h3F}Fo{{zin zN5Va4Ui>Hy~zfo zLpBW8 zUxTR02P43TknegY%WkvWymfC{XlBw_|^o z^g+J5PJ2fB)J}wiC1;E1)D(4>Z$q1{Z+%E4#jR8g!+)vh`Gt;q;(xlt(tokfCyrw| z(<++dqpncxCo9TO%mExfaCA!CE5@#TNh8sIkk<6<8Oy(th<)=&Rq7{-$pxH3XSV=( zmp{CM{08yTqBDk`?uT$shy|PLW+aj|qo^3?)l`(t7U7xv=TFz8o!85q`l$MS+e2B8 z`MjoiNsTT>SM7tZFDu|>PJN1C(Q#CCtX#Of2BXG9nU}d}R#v8lnB*Gz-*C{7Eh3@? zAEwP6}WJv~-|Yx6{uUd$WMaY0y2Dae*sL2MT5CjhpQ2 z+$M#a*td@1_3~!CNI!VDg?dsevx=INQ-0wR;uP1a=8+1SLlKfz`LAr$y67eqcCXqm z{#mwst;sQN>Fs_Xw0Em&@s;zt!hzP%&={@##joATA%vIP&by^c&+Q2NieY?z?{G#@ zh&k0!vd{I>wOJ-2ss~kwDdK@tzD$6mhxp=ghosv?ajA{PTYRBCvyxe*KdqecUITw* z4xh+h&{-{MYwWjkIEwO~?N$E(x1)*D$|zcsnE!~f(l<_9W%M?2jB4q-I2uy1K#59t zy-6#34-e&Xf^sflnr66CeuONk+(5*)$?SQ|Y&h0$wzw3a@_|+7|3tw~n1*goJ=kIK z((cYohFsqKg>SY8=GZEMfAu2aH=yXGRl?Z0YvG9{GMTC2Z@p%YkN?}iIF|oZ${|)g z#D3b4bre;26&q>Zf6qW@S&DYZyW-s~Z5ZY7og>USELG`{mxL=15Z~k2`PVB+&9>G@ zIzPHwqJny$%F(>=9{iJHEhWOepkp{)6uV1n1z!6FUOwZJwKy$3a&^-c!I}nC*qY5% z9|j1JfK3lF$bfNezwRA%Zr&QaTus#5`;Dr%d=lZg`teZre&2U}forYpg?`H4 zeIFHP`T|%Rx)>h_Hkqy8RTuJ{bJz7+;T`AKq>e58$GaUHLi1MgKfV3@ClhEJRsiw` zCtLd-I>x9q2{Ie3-yLL6*rtHJuK86Su@ae_V-dBxl8eXrg(<6XCiu9FIeu1Qf zgxO20#dFFk2V%sk-3|udrO6o|Bs4y6Dmirwo~H(M;7yEL&=se}=+(jXEu5lLb+ub% zl;EE{OUYugwvT3TGB&P?U)XA32fu|k#U`q;%EJ50HNAbs_<6P^i9LoXUk_dqXdfGv zUUr=Oj`4fGlXE?B0zIzhs9#R&=W;>Ne_&gx=u~N2mrY59;w~+iCr`yUKGsRRAhc}W zmfCiAjg(OKh-u1x61VJrL(|oc`2pFSadEyxW$eu!0l2PNsqHlBUzy2VzI1dwK2~?W zX-&=C_t9SJ+om}C9D!Y?-}K{?g%{JRK(L5q}1l{0w z70=rN#llrbUO7q}o;PQicbUbOr+51tiZIWltuA;O%OoE?@**8be3l!IQBr(9^-l7A zXs%%DU{Z(z+Qge0R56#J-)K~2B31BW-X&90Z%DDfajlyMyksxw)_HTc%UcDB zIQptWZD2!8&wwhZ*L!WYe|%!o!{8=L;s@124*rT8bLJZ& zp?9a9?nll{96O4wnzN_r%_D|nfc_N)Pz))8fBDV+pO<=wVEtOzOu>ziPcueNx!$A^ zgfn#Fc^D(gRnORJ;ll?-wH+*?jYVko; zvq50KLE0CuzIE^|OSzgqt9LT^Hp~6|K)_3xtt->`@;g3hz;Im-YH!;uJTsCH3SxU% znw#WSM{J6GZ?g^O?gi{7TNI+BzSx#oKRLg4^mWgT>MxjNIUqYXh*vy;QJKE^WOh)#B zx#cYJppc`lYnq>vp*0l;>q{BeTb`JlBxTy844akibhGgFB;XlqbLgJGhj;ye7_pwH+RtW4-*Y|g}552W!{AYYfT`H}DB93PSV4M!?$npE*B^q00r#7E}* z)`#pLq|^=ud)8%+KeFeD!FsQW?NMrr<5GLuI>@>llQWZ*c3F;bjsm_&Ros>|c_NGK z95bz?K5WZOa|K$QSlh#=s!?^;fl(L`Elv4IVl&`Hp2}s;Ch5dr`8VuG5RjBb0V(x% z;iEZ>grQL88P&-^O~~H6G2JTkXeI6u-5jiiw{^SuCtzl3H30FFcO;ieO< z>QE@pFbOMO&^N=)+*NW3N~(laVe6k}FzfF7O+VM?h8}?hOChG(Uqvcc`*@1FhT=yb zgs_a0A?||GNN~%0mo=-{H-hJQFIYI8fwrT%HBq`4aIhm=w{m|11vok)5<5AimqZVf z1%Gl&S#KU3PGwzV#2yjVSSoac(C?>TgcrG!>V3v2F5aA0T+MBz z=^Q9=xbel_%A+0J;&mlbJiV_xwg*L7c$DwSl9?$)=-^VC!neRVtzpjCktVLChI5V zp5Xq-EC!%JEzk@>N_R7!6l1-O5~IO;C`rPsc})Np_;7`XFei`q%6<=XJSjn{Nl@M- z>SNuL)%aS6T!(wgi^1KIFP10EvQF8}<9=ndP#ciL>JH4R?D7_D_uDpkqX)epES#LL zcCYGubT|ao9cfGOJ%1R@oG4=K9M8_VvC)an5+j5FdBydwEXYsZw1s0<{CbnMV&tv5 zQjG^1j~`DAeb@I_>hZNE48j=uYtrLv3oqe`0qHPre~EqrMMd9nXLUJ#e+}cPS>`wJf*8@!U4aI2VoAw z`vc5VmgUb4e0H?W(TbHE#(bQh$@+->p&VjSd689++Jpxl=v=2@_${Q(7MzF%(T zsg1~Y52o#$~m|-(_%15 zZj0`RzFGFA3wsmP_8O+NUU|y{R5^6ztJQt;cIQc#^2$23CDjG!%M8HNJej~ZzV6sb zIticZ3}}6If%oJ`R;@}nC3$X)x8L}g1y=JdoHh&~HsY%ai1|VIcMgVTzNWL}8spRAu-)TVz6HVfiI@2j$??$Nh5Oi}UMqvDqzdnh-TZbVw$ z#YxivZ2S$B;sSR4$()rJ&lY-}=h2*Z9Q7Ju{Z`(JQqc2u4%<1piy(jG>iwFxKTbWI z#g~NR703-x=RxefqiDsV*oW4td$vo_#o}CKO_DJ6)F0ngl^hOxk+3vY=fZpPK-w(+ zcwswKaN!w$d)9@;#U-U9$0O7k*EZ@Wm(tGMcxo}pQ>fZu^xgY%P2yP#qv~sX*Wd*y z%$FZUGP`6<$C%txKZb;NNaK!PfslJIh-i$vS)=Dp}MT3<6 zn1(|+MAE+*3Xrh&ij5q!6dJDlTn z9o+IKRY%i{gb#6c0MyDZy4Ve0jPw*ghklW3xFRES`&4YAa4Pv7&tKmXOvli97YNeU z*l6}g3SO4^oWGH+ZTEva(6!^C&!Xf{d;1NI>B(oF4FMqQ<-azSRva@BUhU&5MAp74 zWn>Xt*UR*k-0^(zmn(~o3Mz83ad7aroGZe|ruDr3xcYLV5G=IxpS5ze^#Ro5=DLWt zGkOmmJ9?MCu^4*%%*gGzoA@r4=|KBXrq&U$&2OiShd5&1c4bV#NYWt`q{`8%0nFDHUI@EzS+cDv7P~JN|S4itFrpwNo=> z2e{UMzvJwKVH$bE+L|bh34xw?pUX|;EJ|Z?mj5Bi5l06rHc%dFPVZ!T#e#;-n|4VC zD;+zVL?N)IEg!tGKU#rcyVh%4&dK}u6P!IioU@>=Izo8QHcbmy;!$p`E}_EH6FA>1 z^=ByAF_Rde$q~;4q+wmEWRMrtuM5@s8%5BK{cJ48*sZ?*a=&;}7*+D5EyY|@vvpn~ zV>=#iB1p_4$r$}AlWw7Yx~I2l<3f>~obHvW=MQ%-A4UvZeoPLD$B(egSQM|T?;X@d zm)S*1e+e6YMsq_SH)D5fSbNohnRfZO*7Cl&7CR0_Ugxu?mTJrd{iR%~ zZ>4zF6g-8&cvUc1Wb_964?#qYrIpMVHK~v#q=H?MN-^HOai67TRpG>*PYn8ILC2i$ z8{TSQQ~fq31Dhuik&U&~5e-fE0cs*D=PhdJxZwwj3&OP37LQ+9soBkzh#jH^T>JdB z^*)gb(mOEZ$emwtb?r_K#Ru;pwV9@483o7^4Q#P_kU6TdK%aNC^c?95?U~DnXAb0 zM2ZI+4wrOarubC8CE@Y5Jm3>jw4!jiV7&NO+^&5jteUVl>lhu=er$xRDf3rlPV~s9 zKZ4d(kvE#*&o)N!zSx;&Mc3xCn=|vzjLnC4>>W#vp?rN>4cYy1!R}lob=-&VcX;H z*XDr@e&5>A1g**qmnh``9r>DV`)`am zM$xA%P(hvee6hXW&%#7FMF%DK65eqOlY@8T?ac1#f+~N6AOrZbJ(v%sKd2%+U`Oeg}qP$5qZ7H- zcvpVRO6=ia5TQUuHS!Gn+Jm1H3(U5S)|rQ=7t#fq+qNrjw>Y*alw>A+=cdvqd0pxD zgTpp40VSVIo}RyhVEpY7B&C}*4Qdig#-we9hxq3*PX!osFEUU;;$ivDL!P`4#yd?% z>Au@1#dYLlnBe4RG^WugW#Pe?;YzD^YXw~$>D=s1ZX5Qe=;+Li5|SkELx-=EY@dxo z`%xjp+qS=96IWN79Z0^dp!cv`bRJr1@aq0Kvd+St_gg{TrrZ+eO41~Th&HAQZKzjn z?L`j1SI+~}$>vRxX4?^CwuaAvmM@rUdln074=mrf^aQ`{3feBM$HT2UmGj3tWJ?hh zt|+%z?oU4z1m)}+he@*3wuG{p=#8*VxPa{V)CId-l^7=B(Q+61$wPz39&I@{N~uWA z4mn^X_`#@uOWBl|_}G$+;KUa3UHU^P#! z(sHv~`w9_td&>TnsOC`fA(2r=s2`Xuy3!+L5u9A6d;{qydfa?)tDw*pyKF$x zUNI+{gt_n3nU~ThuwnU|9`$Z1(i&PCv@laQ#6@Vc+cSZtGMx^Ie-660KjiyTfcvBu zdyCzheY&Y1IqcffjO<=`)E=haKosCiW&L(oo(3MZ>SB#e6?n^`VMMy!wNn;|*UP24 z^^f%OX`rfT>_EqN<>8CVA@Jy$pTwO7K_c$tD!aNH3s5M*>p(X1O#*ty9{p!aRFqm) zCctZVBc!v?t5HsL-L|Rh0Im zDSIwY%`s%#YZ3J<=>!muRx&g8S#ig1-}e-Y2nqw*c4M{0sDI=)osDGIZ6q2Tyo~B( zH1;{eCw6=s0!0c0wwJHInW>|o4RyKnnxs;2>mu@ikGxYsgL_7?1-x(sm>>C*wE#Z{ zq_MnLq{?mMmb|bfW?e$i{Usd@OD_ebEMdsc!4RdS44+} zszgy@OWVAT)oP3+q*P$E+?Twmx6LHy95Ck3mYJ{r-No}|mG@lV_+K%2RG!y{=^!VV z*2y6vxx*_P^2h*>ADH#_e^WmXc7>SLa132>?LPpX$$f|Z^6K}AFN_RVM-dQPVvXB| zTaP?RimffsDTTb7CicniZEyN!;L7yE5YDjZNvy0I%3{ zWiX0qOGvwj!#}-Jg&OpMPz{SBL>Yn{J)U^#(?F_58_I!1l__rKF&88g9jV&Cm%OOA zCHj75OTOmJCDyCj{D?t9iTcx)3ZYih*FO3_?R?AqPe0%p=tOx6qb0NI4xhjEw*e^Q zaFWyT93ro~AkO#M@kp>s#^^OeK}k&srBROL=?t?BL^OwCHGFGBe3zl#Ri@a|s4T(E z#NZo=xipMKFe7xiNMyVzC}0TQ+Sb(O>!tbfc;;^>x0h0weMP+!UVetLBgoyCuufNW z9|o0kxOd?ji`xHGJJHWlbA2+T?oGwP3)om7_^;Vc)jSqI zK2Kg9T1Ih*2$9hO#(IafYW9^LS^^Euqlbr&T(lE-^C zhkwWc#LDx#sy4P4F=1@1-feZUmq`@_+sS#ls{;n*bEbT}|J|SFAllMpE$WFdGYSoM zkzT+S0rQW=W;NXIBLW(4eL_X}7Gawdj4!1)Z1BQndLB6a@|GQsgvO3s^KiTb3tAVj zTZWi%r@hb2=OETKto=>8PR~yD&0Z!tZN~QLnA*J^szQIlhB)hej?(HR$MAR{5pZL{ zIy%Go-x_DI>C6b#%2J$Ak_<+e_oGod>zSWm#5rPZLALn|dvflVMgG5c z5_Sx6o@YP4)2a~@@w{C0*q}I%j8kKtgGUwUD8?4`oRI2Xm(G2WhO?=}^ERv{t?&?n z5?z8&mV0S?#EyB0ain*qT}@{4B7C|1-_j7ic8g@)gEGzFxrg$#GG{ZIDZwQ*T50np zj*hkR;%;g4bIfJj{ZU$ODewN*oRmA515f?B9p`d#DCjRsslu9iQC!5DgOkXF!%3h3 z8PmbeuPw8%`+PU^;!w3^Mtrn`)os#AuX3gfLP37m82(LQA3eOsIfVTpfs^|{VORv? zw>9MJ@I1a4#;Ev?Eds5nceRq2;88w2EiQmwbymLT8~v`n&U(1lYee$#22){XcbkqA zu&rK|Cw}S{(+*~dU8tO1zg0Y39exSJ^y@%nV6;;@=TkOvN}a^gzw>8K1>}mCIF)7E+2uI=n|si& zHXn7;R~jPe?Q>ouV+~)rN!Vr;BEF`g2wZ)ytrg{B?Kp<4`6{y4x0;<+YG~^shs_{w z-d-<9Ct;UktgkRpUfqg|_TXU;4n5{?;)>57<585gwY z6J$yp9{mt8pS{xvr-;i+r!v^#1Ct1!KZ{ve-Ta*9rKO{1vMlJ(@8Q#6`-h^vMP&= zb1Dh#@lK@#B$sF}b{K4RUqsf6G_!4TDM!pzV}|xR>Bv^(Z*g1}ksw+=9=Pn8Bo_-0 zY>JsgFE5jiI*{V+k~GFx$ihFbymqIK)6<|#QEL#84P>c>NHu>C{xJ{Z0jHstg;BbQ zZl>%kxu}(jSgNu4G?(8ZDM!aqBe~+gLgd^D>#WfsS}cSm<4&>a?;bxpHQ95wqpQFr z-;u1+V%D5a0&o1;dF6Z2p?RmyHW_oC*s0n$U9a2qBQQ_wJZEb7K&|Nr9L$eH#&_mu@*|(f`KK%9 zT1$Y#jYuf*$F&jeGm%B@fBkfFEt+~#@$1&GrCDGB@oAnt!Z5w;lB+IuF9CF##i~11 zzWC2sCA2~AT%KCEMtWLUWJA%e$c^w40xpFZnr$e6ruse}j^dXGSm|HQ5UF;OTdL%= zoizIP)(dLyMghZeXa%5z$%&>TRV0FMdT&i#h8xWKfClrzX)_mSc@=w?<@}wiq~lO z!08$DbQJM52T;e?A91{~a@Uq8xD3=KxTE(4U?r~;q5_%k z>U#;xl_jgfRWU5!&i)s6p_fD_7Y~c`Zl}NDl64F2i1Nv1XSF>qh#{`4m}EABLUPfp6T>U~RbLKAZz(!=I*bUVqk2VnXW_6_dg!o~~-MnoZEc+%GuY#rq z>%B*Q&`Dz#w2L>6%+u+0G9)}%i$d^N_0&(;4TwlG>b}fGoFG#2gM@7Wvl4>5OlROj z&sz~MnAnm~TwXg5H^x3(h;n;U+WWVx3K|F9l+LPwI zBxt{09#v=L7Uf3q^IY(TPKKci+tMmNBqbTwN+_aXK?4$T8YL>1+5*?73$G;5uF*;d ziJT2GQ#Oqv7=@16U|(xPy14lJ7cwI8JWz3sE_N%&=F?s0WTV@mb2)VAZrag7wY8|K zNXZ>L5?ddE&05HwvIPFKr&RviQ)(F*zBPpB4M%l1&P_An-W6X?ggvoLH>ww*Dbg2I zgUNmr@Bb|KPDkwnBW1Qo>=rR$-dDvMVY5T^?BbH3bs5*7FZ0KG{rzun&u?)<)*N|{ zSLX4l-r(8qQ)q;UJ&pi3Gm|B+O+~SQwhrVd$ZQ?jdHW>;xP3sQv@%;K`G^$QXt(*5 zJBL;F4Kd+ix<14q;aG}g?{BZUyyYO#&QQyBQ&Da=CDjoLt|uz>$|eB?XW%2;z3yJn zF3qj2!*dH~e)akrR1a*zY!myqWB}A52V`|Zvv~hi_?%~b6~z9{DHp_)p@O67Y$bh? z{9O#j)fT>w#98{P_Av72hVI94ckUvPD`R3DA3#M0rw@IeO3~P2x5%mVQE;;RA4|6X zmZ|>VU)4G+JuQAk*K)8t2Nqn%89qzH)}f-b(s-5IXHrCviP9lDt@goA_`het|M&O) z|M7GF_mck|f&U$W{~dw<9fAMXM&RytfYDEkICLl?G7(;;pfb@0oV<~iotTU_7eU3)y;dXw!*e)7vxp61jQa+PBA9j=h z0$>0vzyEacAmF7S3Gk+FL-b67oT}f&On~6-wGi9Qk3%c?BxNqG8F8dQF=#t_VCJ;) zFjed9T}1`W7aSG_RhjB}n|FqBqL%vc-;+e5uN%j&?GV$T(sYiEPl;Np} z4aYp`av3w1tmE@nzy=W5#Ht;b648uPA4o2&=Y&_E3%%(Z;7dE;gTj5yT4G=jC@mHv zE30IyhlAv8*DglC;Dk83amUC*3^;|t014=D8ba%X#f6xbajaEhRum#{7lbo8vP7jo zCQ05bWlcn8?!H4VLauv(D%~YQGMbd~f5m?V4+XufOg_a~63-WN_L^w^0Lx!18SBeX z5^^+-;7NmCxi7J4o>&&71iT*DeI}i9I@p5&kb4wfUZs4VDdGn=ggrtYp#lBxlM7B@ zfmpnh0kA2BV%KzA21&*vhg*0FE;z5%+mYGzk`~}B9z$`m^yhvdxxRU~ZJj<#j@8f+ z*#0!N&%fIx`cdFNcMMe|O=F1b9s{(B4t^f}@%mV39qL+p@$sKassi0TM=!OuH!YrH z0`foDZu!EE98N#b!q=*?cV8+Fr0BnWat-HQE4U#Ur|?1o7t|mBXHPD4jZ(UgMhZrn zwX1Oo{fKNMmhv4~*muNsaVHnj!5Z@eG^1&m90Z31EYx@q^=)RnQx(&;YVV~RL}s0( zL#{;(e6RINyqy3|>5T9m8aHz~@!V_I9W=$npmO`rfSJ~X*cTNKLg!&Vpze~uqfl2P zK!b<f~}d%t!`o&wq5@$~*AvHalXu2q52LvyR7IfEdMWKTO2?&>TLPgHbv z?~@C&CvUt}(Rr{$-(Y{pps$>O1*tj#Ovv;*VdGg$9J_vQX|q@A@6iLEQj!N@n8Z&2 zO4ZSMkIhs*zo8*zfu#({Y%mJ}5WUsqo2x( zOfZe69GdvQoV(S-KUii9gAFJ$5>wFd5jDKVTs`9O$+^m9K{)Rga8OUVQM>pH6#~hK zVP}(!+;VOl3(yJ1fqhE^Ec}Rukw^l?00VTcslOAMR^m+Ry0X zx5V=wxeA=`?Nsoc<$=wOmKEY$_60btR|C_wu|`bZ776xnAWlc{6PCzZ!)EMbT*C)$ zE#I7BP``53X`$+Ep88YOxu4p8{ERbPWx?#=nhLCc zd~ysc0&_1XnnS&^dyj|W4!HyEb*GNDE|Qk{a@%gxbITx_tjigbT;STNs#yj%;1{r|^B1IuZq8r&4hnrKIHcTCgQfM2` z(Y~*h8UW+~xX+;DDK?O1um;QQs`plef&YUyzW9p>dy|v_3 z-CH+#_uZI<&at<5t^_wWRaQRN5A2N96k}%jlPbPs+R8XQm&v}zkYCULqOUGu1JD(czf|Et59yP3@NVW%=tp=-A(3^uc*iE^b6+i@)3rF-9R| z6mZRk4>cwslxsXP-bH<0k%eiH3GvD{AQ@$41zbJL;H3Ms#BTQs+AK%c01qWiU8nLt zu$P=q?blK~&23TED;psrgqORss#Osww=BL(`mCK@X{j~yA8;PI5GZ0^UzR|*hxD{1 zjMWQf0qSt`P-inSRfJQCR}U;Gj@!gMP*g?^p7&K=dtGZ+pK1l?p%caV@=%pc*|M6c zHdm_CfSM)Ta780fG=X?0Zzdh2mGv&xKjyh1epUgKn;1#AGPHM#z17!S zO&{F0*vJg=k?^BjS@(vIAf~?_H|(l=D*2gXaDGONe3buzmc4PrHu6wrIt+R;KFCzr`J>1{Mo-m0v>EebY*1I{`$kJpMWO*3 z{*?ySz%tu2J$k)SXxwdLos}g|(gYK94O2^4VJ~k(9 z?t0aWNXV?!Hom23^z_}lnSmr0{9PR}AFVocljq_TqvxW0eV$>ywq>N_n4)*fo|l>! zkz;GONk6|6?LXq2rMp67U)txU?M4xGmZvO+ILk4sqH2D8zD(-9;<1XZlyn{w(A4Gg z;GQHA@WySkk$%x@Y(jN`h>#fzQ&|c_ujp(JWmA2J)bJ32mvA>>E-jir(wL;ZV6ozxMl-qP{G}yVnh} zAFnd8%`cm{uuHttn}3wY-S~5_?~pfKR$VbFcX*?5cid!)^oP}hgc~^M%a#YKwq^q? zE1W!8S9*T9yX|wotQ2&2wtJE;YQNnwndH4(?%|lWVBOPhJ9)St%wi6)wo?4*UUGF5`HK`X|%Yr{oj3}JMgy%5Im;+Nz zx5mK@j!!NsaUbautk2>lMXsF2N$giX!$qusHy zc5W=IHZD}318b{zpr(-mFjCWS2pW*H*Sj@8SIj62ru{a%*J`4Ek+=}k19l^#>d~gb zWTbI%Cuh|Ml8b|=!7QAqBTdg!+sN*}3Ai_*N+9pb6idqv6TJ4PyEi>`S--b(XmFkU z)9_n1LFtc-enQJeUUiCVy?=Py2E~W!&k!4G-tEzQq#l@84y6zdR>c> z=s4=|;BnM3vp835Pcx_Wj3`Qf&7;9L!_D{{NrDMkCIA}V>14xcjAnMO=c^DEe~$6A zn59P7rR`IVF$odGa0v!=jm9E#f9WyDj}le~WiUrkXvDj2!;&n=mO#pX>Yegm)9o&0 zD=+N3&BX8kq6=KN|1hl=06+#C5D=)}i$nwRdid1PK3ALr2qw_34l;0qg(d)@Ut77; zELHuwa4!BKK%vh-USnE#fJPL)79b>eSPhCMOA~5se4c0=LISf?eki`~>N80}_7oo= zXa*qL8LYN-%8~&X9Pb$m{{JN7L=h-|O-WQfaKsUz%QP&|4u(!aWkAJ|H8)hZKB%}_ zSW2czcXDh7TUtmF)b=NZkI<{Kh>f3}0WNPF8O?UEUb_$k#kwFI>i&y;e&C_nBhX6j zu@}^29I&twS9TBBA{b<#?>Ako+>Z9`3y?F|-W6QY+JL4RvOYT2?7i7vdvLoSS(a)Q zB@l0TJ-gWXOw?JK#ZrzE<*qK(SZ1LWsHcV8_Bc!z4D^WXW?%w>g$L8)5P)#~;AsN2 zyfG2k9R?%ZWk7`ySY_f?cw~h-`R5I-QtJ6Y?7EnapEhul*m-l8h#znZ8cM)BHTBFm zq93k!a*`=eg%iVeYDE*rn?Ke#x z32L}TwZIT{{D4P#gGe%1Za<0YbFlu$!~?P8 zZ5V~(-Iuwb*ybS-a*uG@iVGGO#buuck>#gU3*25f=1BeG9^H|k#>5TIQMbBK{B)#6 z9JZ3iBR(knuC4PNE4_26r{K*RCP_Q~{TmMJL|HnYOuDAxw0z8GCE4+YYc090tekvs z?5vkS1miFISnH@)tE^yRl8JF8z~!S}kvWJxaa1*`$Aq@b7D|nh-I|w;Yfv>SveKx= zlTuW01OR3>qI7&1y7JR+NhYso6We5wt3f_)MIX$u@hX#E+L1gknh9X(dnRhR>hgn0 zFY-)&!}!LG;~V(etP^Va=^tGQxkbwuOHl#w7xD6eVlST-zg%z{M`*`eaJihwfzsDY zOndKTtlZyBb@8})Z1aNWBkRiz<6{1uG;X=kmd09?l}+>k%G1}nZi4901~-pF-;hjz zt{Q{(`I!x)Erlv9gx`sMr*Mt+EkMMZC=Mj}Yde&@DLhb8BO!%5jk8`Y$o@G=`+digCI*mt z2Qp%;XntykA}w1M0*Y>*?p-_1DrUOG?VEqbcIiK$Ume@yc^ELxwunhZ|9~X2+w45l zPM|4GSF|5nt!>$m_TirKPlt|%HU}>ydT1z2$}1%$H1L1fVXvpwJ=8Q5hf6@19VD(?rBfOXJ(#TxmzO6Mxc&rHq)_suliC)dZe40CzU3|U&~dPB3A z3x!CjtG=pne#ssVLnqt%o$tqYf`%RU>bG6Pe>(5r9yWR&xjj_FU%Sf|OL-Er?k(B~ zNNPl510PYM7OL{29XIV=2!~Ft0nQHrdx2z!URx>C!^&>pEUKSYy@K?#DU*8vYeu^0 zyAE9vBaZW~x^s4x;B=raH8XofC=#XwU{l^<_C^l%Rnpa*b@>(NqBa&X=<}Vma(3K;ry>g zz{0wccs1K%PDwX6tL)IG#s+}v*B!=J6?LV5CbKlxh?6jVuWWnsi!U4akw z2X<8Pp)^3xSb#(AftVsdqky>+0|c&CRs=Jax9iDg3kuQB6`4*WR}GD31}yTJR($KX z_jzDnlFoHz=ZSzL;_L4^W&GHaDNZjvNwQ#f(yvQ+bX33Inr+|y^ri$ltV2gL0qwJ` z3%rpOPd&Zzr;WKfI)(a3?!d zAtWD^XRrfL8>fA`b9tAxMuGpQYecVn;_s4a9}bwC2M){jmV|}y#QCRr2~php%e)W^ z@$iM6%7@qrY(mY{f#@$yJn>K#NqiiwumUd^}J#bNOnv-B*=DZJLHrWj}4p#vwuFaB&jl-4g)Pwm= z$p@z^&!fOptkP2DQ`zLaqUPV`lHR_B%MND%It$Z+r7mzA?q<1JfKz+HlZu`Ut++ZZW#;NZmUb^>X85HInx8jt%G& zTK|Kyf1muM7MJyLQ0Aid6}pt<+^JTjO5-v!%`1grT=~& zwPUrE>@Gnx&q#@RmAZm2TCuOU-Sbl?0)now3hzYDtrN{)+BgxNBTReLHlu6Vah?gE z=T|{-VX6_J-Xeo%3zeLudmU9%<&xE%#Ifg4ydKFo66!YVrPdpQX%N7^JTbEl(EGL{ zx0+h@7Hb87mV1Vp=k{K-k1*|GyXO8I3^T|5v;F2AGXi;VGadV$3J;WQwsfA{k_-$2 z1DGJ8QcI83)Q7EC5M=Hqz3KZohe^||abD9hiESPKVexix;3Yaj6YZceHBIMGGNp4> zW3{DgQIlvAd$Y~LGf8>w<9lo2sy6-x>Nx#^bJo}a-Kg1*^i?wY%jF2BiR<_+xoCG} z39=u1cdTHC+(dd=>CRo9u5*5)Yb;qm7dY3sTUo0&tJqC0X2P{8*xj1@)wJ+TR1%fe@>Wd-ENR@8M+l4bodwOEtxObmYOrxk{{o_TTbJSmFueE#1 ztx0AX8UqTRzyI(wqYz$S<*Hj+JWm!&ntMw`a+bR4{dnX3z}sVe@z@uk(B%56qrE18;F|go0C#jwSJmnQ z^1HiRQw4)?u?Qr#1nYe`sr)ekE@EcqNIz8;H#Xb8tE21?)4v%=i*ev#VSADv2QN;1 z>cgDdoq^xfl9v|mnWzIo4^b60k1OAULV%J-#VwD~|48oI8epW$IIBO>s@KT>CJdUG zr9`DXdDanj`!u0ZvaHLeS)Tj6H+`C@l6NfO?dKsTppg<)07m>&>LPhdDPsQ|K~sK@ zeWYUW&_43WC{StbDyA1W-|~uY$pWZST9J3D9_rnIWx-wx*Z1JD*tC2bSOWGjTi{Q$DS?_351Q+Y#~#M{s6m4O#0(x>1ODe^sNm&}PtdUQBU8J>}b0u(dfnM*gz(tpnd zXheI3@4xnb^ z8vuY7rNV2jKOZsV;rf!~_|Y$>c8_`%yqJnMznRhDA59m*`)uWpPRV3xa)T-l|D0^( zw8h2L@6<(3)a#x@qZepN35OMCe!ns8yXnW7WaOa*OEjf(Tcw@eYqyz)GgX?e#|Uy+ zD=mBgd2TWhnUp}AOR%3$N)ry9uxH^ef*@6+v!bLTjuqX39#Mnpv=!ajvZ zB!&h-2p;XPekhCp_*4Pl56ucd`1xn}cL|vNmo)94HUADnLncJV$NKMth2HTyzqE<^ zXPe*e2HX8>_)9zAYksdrg9x4pourxwbI@WDL1F$7K_Y_wo-U78VLf0F8WbM;1%sEw zu%O`YxDa~6bd;TcWKejpuny{KL|Ei@h{z;HeC@cf(zl=<^tDVeC^lGFM;L@%7Eg!` zN50~ygt+*CaEKSj#m9YN_Sbx{*FQ0ECB%i{uVg}^AW3$xL>PquB}VtOMy#V?gCSpY z{(7ar&3gbC!n<0dta#djVL%Ciu$Z$P_W&4qyjC@^CTKvqOI|XTs`~xcK>WQHPT9hXe=qD>sX6n(o$L+E846&W8K8Sm@9D>^vNXGL;Ec*OoL2^N)Xn_gLFA-*iIu!1`| zg`Gofl(#Row9;#8yvF^LUDV~w(N zMr9RA@e^f1er3n;LPFj9pkIHAJ0-Pp-zh7@Q3vhjR2M}TGle_t`YYCQbT2)~n>3h65J&y<^`Y0RIN`4FWm< literal 0 HcmV?d00001 diff --git a/windows/whats-new/images/video-1709s.jpg b/windows/whats-new/images/video-1709s.jpg new file mode 100644 index 0000000000000000000000000000000000000000..7abc313dd8f0d3eb0e94951d3f63892707bc0aed GIT binary patch literal 23359 zcmeIZ2Ut_lwD~NQEE+8OXx|9$)Dowfs z2+})92_zs80b%0*-aB{Ryty;;e>3lW-}}aOvh(e8&N}<-_1o+0wf9NV=T%4EytXsrC@;|x1^cR7@2>eChF9LrN_=~{*kqD5!xeT~Ol$;I#ppJcW-d;Z@?6XY-cAoh1O@dt&!^cR7@2>eChF9LrN_&*l`aZxcKNK6zY zDs@-v0Z39B^gtT$-@5k4e?bxC=gu2lvvRPL6Z!9O%ZdD{`+p(Jzo7G9T=-uSj@TCer9}Vtb|%U~i;-2lV$P{}jl7;ra{L zKZU?Q#r#*h{=)T7A@ENz|JAPlpTYI-LrFVV;`q^*I8eNp0XzX*A|d(n`&YV5dif7s zy>jI;DcMyrvOkIZ8s#-|atd-XGKw1%6qMJAM0V{a)s5>n|K$G^^5^kCPZ59D$;rt7 zaQt(0@d-dfPI8lE@iNIhz$F@z%QPexU4T2pFdiu}*!L&i_pd~9>GBoQtHdf%P!buC z)WqsvzI=&TS<)-SNFPZM@jl=R4Jj>$*rThrbgjtldC-Z!Ow1$ad|dOHUT+k~^}yOQ z^cn>N<83BpZXRB~`}`7;Qb1`L&=VzP6;(BL4SfScBV!X&GaFkwdk06Tlb1K##~0z} zANDHzbwp%TbW(CkYFhf+jLiIk!lL4m52aVRf8lqg6h;49%?2lX|mwbuo zGR+lI4za7Wk95hbJZ{|+e@RaFI5Ds0^EJ)~dN_J(&ru2nE{P>>{2$T&A=&?&V4?qy zB>T^T{kvS#fa{k@h>drd2A~MQgZT10+Nch8`0}Fxf74$K{_4R01|5*+d;jx2C38+( zP+lL!g6X`ePH3fQ8xG2 zRXX{%6Z=1|iY~^dZkJPPke=U?O1x!`2%R*@UFy4jCadm_^0%@{j$1$3qUoiy zC9{H{u$S{p&oK&j30`-?0zd35P1+K)O3X=F%=+gM9ks4&y|RT3E$$|Vr?+SkLx_+W z4M`4)=>7w}AkKjR;F^F`!h2JeY?phc423Th;&2pnG1q-o@7$U8$6@|6F!;m z)d2$=(-5&>+I^|CiK7OlG{^B~@z9FK=kAYWWU32=&jOa*Vw%Z%t8Y0al=dzeO?va9 z1zjkfz~K(p+8aLBsdE{tNzDk#Bo-t)J^mi|wk%he5V6=nkxN3b>|wu?&;?S6sc`b0 zmMXIO0Qp>MZmQ#$<|X&BKXIlavG2xCfbJ+otKOv@ijNiSP*Cy_d~taVlhl3?dahU7bT^c+8DAmw>kGW$DKjrFYhTkQV5ib zvO3Wn>~c4jAdj8P1E}Z_FbyI9V!KmneAzj zh>#^gEiaW(k;4Esr-NsxfE#W*40~|*;;-O}v~up&2d#dMsi~>-C^x}up72v))un~2 z1dCG>f-gR-XOf*~%o<~x^<^{*EH8|4%e-RjERYD7eNt=RsT9d=^6UBFTZ7>b`sjQo z$i1B`EntwD(dh12dskT`zkW&m!aCy$iknU5w@-+MT-9Eb7n1B&+Df{Wb)WuM+Lr+I-ar&ZS zf;%C2!>F|tHVukUEW~d2l0NdJoNQO zi!liXNg)AR(v{QSGi;^1dCA!H)wk+BVL^SxSyK->Aze27OwNmzOU{#5kKw4US7<-iYPdWBup&FY+KTA`cu7X)d{*;Lb1(o zY@B&s4*xJm{=6Z1C$aLKD@Su`rcx8%8`0k@qE~wCY4f7Ofp_4=GqwKnV$l}+P!#uQ zrBS(2>`m}>6=t|WIta?`Q&D+eLubyZPx(+swZKPb!yN5O|HFa@=Nleqg-f=;tAsOiCH3;K$(7utfIP0cO<_QuUd4K3xr3YiV(=Cl3$Zd8sp z`1=>k&8kvL80F14G2Om?*Zxarm+iZo&K-(1lRX?40EvX<+;dt`!Uce-^qj`y6clKC z0jQQ|yZ~r>Oi)pLe{uo19<#ExZ!;Zex8$iZI&wl4S)NN1TkUr$AZ*$LD&89`-7YXf z$?gSsgFZI0%04@q9m%B4i4*W_+N^-=eMO=t1Kt_c6<8wNOq$1#0w-gX622skbE9o+6Wp3wki#V6HyeXf*P*o8qj}T;@N)aFA-9PIP zEWLim2Td;1?NJuP8el+5T#hI3V~;tI2|sv;QSR0Xgm!n~bAu>B^Yel7a(SB`%Wa9p z%&VCR_wC)WAIpQW^f^yq2A-d_>~C*ct&w}F0JY}9Qcd1wbHI>2NmvGxtL1ei2L*MF zVg6AhIvv=$TY*L$>$m^-)n_igo(>PtF3$^;#eXD};(695yF?K_3qAN5M-Y3eAaj5@ z*fLvVna^~ZDQ%`ddJ4?JYIQxp>u!=9#Q2K>DZwt!5yj4h4z#Isvf!%&4K-w2RfC~@ z1t#iTF)nr57_Y3DC{7)T)Mz>-L_BK?7yLR}Jh1FtQ@zocFFg;^*>+;4wmoX$u|tZ6 z!f}0qaMiI7>Or(WFJ59Nbq)zt)gJ`vW*%iXy!tY2esg(hy~2|QIVJb?n3SvPa2R-f zd{$sGm@bg9mJmnmy^OwG01Pmgk=`6o6K-u*OuHTOO2H?YMbovSg4Ui9*7R1Chp)Ed z{?(kQ#gT{$0Il~3H8h7Qq5Ipm8AFtB#kAA(>%7ZT+s+PmvO!srC}ZS;YqI+7Q>AVu z`rGZlHzSTJCB4UdT(Ls5dMU2Er`_|DK`>aud0#14VWxSXDX`pCEHyP9Dqt~F6tK5` zq7W6dEUzy3b4GUP@xHRJn$UA-5nS29ljac@zkt|X_cHZG<^=7JjTqMzR2?d3cln`) z@)dhkcM_X$^W^X=@4Nvy6HU0}Wv$-N9ntMfczA`SV^$|9yP^2*T)laut+8Xmsqp(e zwoV$01>ErP$PxGNf?y5=n#Br(Gj@*E`!xu zotta7do%XuDUQ}tf4M9u`#rG)ey`{ddd;n(moDg633T4?P0!qf`^5g-hm7P%#N9jS z0_Hl5?d(?X%9T3oSLQ(r_m|^}Qjb3HI;q6(%+c$N_*RJ9haNdI?#+Qs8xqCKkeJIKv^a?)Qz_d}B;eg?Ca9r{;JXPq=5qc;n?Pa;iCMwgu zwER)|jmNSRjr(@5O|Y<5l)6v@NL(~To=L;SPCh-fl?gYww1Aa)PvCua0eIEC0v?sq zf)&jZa%S{UAg2XopPClc=dji(AtS^4jdOzWVM7#!zv$t0jy<$%ubP&#SM1=n*>l;M z_4&UsGwo6J*lgBJ&v$+$?CR3f#!%UYimIyY74AK*R3ua~li@@9IuY4TSYPUj)sjhTuwJQBFt&&(cuWTo|`VFK7 zmq3X>5$~o`hdbpN@j%VIUdO6vLU6{P6e-Ri7`glKrC+VeMVrAQ?H#x;rk3-Myu6CH z^T!6q-pmS$6=F~iG+mqat>KjJ*@oO+r`9RZQ;n$o!aV_~cNH3QV!G`N@m$Dyc-~#f zpVOaZK2)yU;XhQEg`S>+2234*)AhSidPK_z;{B`!x191d!XH?wHK*nj=HE~ZHyX1M zeFXQOwO!tOHn#kj{0<)fM&qn4ykuu%>GzFRL+-We7&$G!#UM)6wuyRq{#_PuN4>>k zo|d;?pTF&fTASX@I@X?diAh(MVbquIe3Aia$Q8~Wi*9HD5A$P-e5<1BK&HYxfmMC? zxrG8Gd4q(HUS%h_4mj5*P?1SG^*-t#_Gph!Fg^Rrz3L|OC&V6lxsF!h>tO8FTLIbS zjd8s%Gkv3kCCZ09m$h!rJgY<7eny3!?8^>Bz8-xurb?&DJJfQW^J%R64gcKGbMEb6 z&fjkpcpWE=!%pugjsEO}TDe{EX&B%=s?4t+V$~?;+IfF9=OMZg@Zb%A#TqYpU;ot- zeZ~9i`SMH+c@dxLIT0zVurKIxJ?{CCef0m#|Cl)EwkPE zV!=1js#yH%^?`mZ+M%%yxj!zKwWh?^LigGwH&u=Ia_0I3isCSLTBHY*`+0BrmMZKf zc4wVnQ~U$x==y@R9^r!BNK(H1aswiF&~cpU%PUiHXFB0an!@GZCFfi}{2{GUnHCAl zl}7#j^Bj@b#rS=LcuDr?JY)8WcuE$%@~}*!Qg+0Qcm3$GPYPtBx!f`9NAL6dqp@vS zz9quy78o~(aq0@U!|F+WqZwa*+mo*peEBc_`-wP{qg|PQ;&)XZJXlxAi<4$_)N?en|^O#tN>%X%V%HKld|ntu7Pf8sNZXEQ1`5#A3og*;$bhg(e?;u z0jdDwQh%1h>Ra40B$~l6rXd8lmx1_wSl&kXsO<*NRa-)hr79w?^QUza^j4(l8_BjoaXH$mpK!q>Y9=Oa@_QA) z9qbA{UaKnF`z@nUV?)|5SijVaZ0ug7y;1w`UBSSbftWg)N5?O!qHzOTC0Kp|?R`R8 zd2%AMYPNKHbnYF&&z`QZEgOh1Q>64c9!LAT4Pvr0cj04a4{;8!10UeoRHNmfD zZ6z%!HcP#+wDBi#+CA9T3xN1C)HX@E!Q~^YCWYeqya&Q>Bsy3acL7KUBwai$55Q{Q zp>gz=W4m!G9MDT(|=0fMb z6ZKHh_R%B*hQc<^h@j=N-|Zf$$q{Fn7OW-^o$%#O-DHd$Y-vEtVz^feIRU+cDg_LJUS(2*v6UhUC{lTsRAPHPbNZ{7*!e8(591uk?!K5`!rL;*1cpCW> z7BFg1^~-EcH_Hj_x_g2eoUd%#IpH1;R3tI>VHAJq#5P#pn`-~L3@I-ABU9o$Id&p8XM z(743NjkZ~R>4$2h(Rlz`66sa=hgKP!X7{-;Ub`l5^PF{}N-`V3FuwDY9nzD-fWXf7 zCxm8kC(`%zeA1MnH;FvI8^}G`&h(^Ys2seBbtsEc=nW`wO3SQF?Th`8O1q3UwG!v~ zIh%F-A@LeOJh}e96>FI;oUX{wshVyYrId6k?=n~EgErbob#aOVZ6(J-<=KjCcTuno zBzluKfNQ3uoea@GxrB<`trl6yQCr7hPz4`eJ`v44R%@+|e3!T%-<5`GK6bpG2wb zM|~mC$cdxU8QJ-=%$>ouRHX5#bedB6zb*hqleDxAecK|bVoU%fKh9=C#r!P-$LYgB zP29rS-D#aji8;n@|D5cSpceh{d(HyR0ZsYwqE^|IXJt)LpjfX3GDnV_qyXe0^&^MLt)m%zOq}5SX)15NzIq_jmu!IhS?pxT3&;$lP^? zfK9&baWFC)7*jIkVvmdyEjE+Qg*9vjUs}Jt?>1+y&FG_SG^QYHW_mtg77?}<@vITA zJaIZ*oWCl;tC|A__bpm$?}=KPJi52|ys~>(=Pr9)7tvaCEW5D=D&STe-3k0BLF^md z7NRim{Vi;T#6*3NGDnL9zTq)J}rdOM~-z@~!=J$$j_4a5+8wE~k?EW|qU`m@mnO7P9UZ^U~ zx=5|%zl+4TbXrIgQt?g;CR$FDpF3zpZN@989uiLH0mI}=B(@S4sY4--D*)xu;ab)FrxM~YqkXsM((wk>;N zIIJs&57+TBnA-WA5m!}IhKSI^d#7!dIi>r%k6|leLbLs8-&EJt_9c>k>B%Lm?VO62 zmG9Xz<<|2i>;&_l1>rlQCBEMGA?6G9VVhDrd zIkj^iGU3{0yMVg&CBEIgDy-4>*rZQ0157SB(XM#uZvS-bwPJ$6mk_qyvs-xtDlPO< z4F)FEllQwa#7iy_m@*ujG&pL7O3ZEocqlKu?&eyOQ7=_+{xTF0tyNx9^u9iNM(LPr zBYc6ntTjw0K^J-c4TWCGd7OUl)4G8<5<&s=e|abunIQc4=6PmR^B zlQz~fxO!zyPUUJPld&PAU=fp|AC#-W_OO;)y)lOX=N8Sku|!8@gfnO9nhEuzt8MD(pNZZ5IT?b=upP&fwH#;M zOj7cc?^dgK}~+ZnrPWM10^;6eH| zl_E8R{MEeM(|YSV1w=zLwEeOEyNY66bNR-Mj}R!5?x2vOy}1jq%GoDxZx8txQd9 z>3gp>2?Uw;_1{8jJ1(Sl_Y0fXA8K#SKqQWuCwP3UF!z;J+_iHBD+db;xLL+Wf9$no zLbn|X?1sF0f*J68ao%7{EG*!Q0vpaXfjxa`=I0p0)?s1%I=DDzjWheHkWlx~_*B%I zXj;73I;r@?ooV1QETP+y)nvhR)(KRIG1F?#4XSjK+H?zA7I=HS+nPy*|_%H#gTaCo~$C%ZW}8%(qz>ue$(MQu+>1@oT{DR;z~kDCp#0t0XM0N zSB>_bYSk)7{Usa9(hnvXn5nf@_#K}^Df zb&DPE7EkjLh$Iv!Fp##{wlgH4Nuvk@NKBr%ZFUCt1b40NWHTcz+7)A&K)no40vN-nXyj@+1C9ti467q?^C?@u*v!*imDj25o-R zgjB@}liATLy$RkBAAZaPHsGC)ct^N@dJk0sb4Zs+DEnm`Ham5qs;00rmv&CtFvcJW zLsv5<1yH|7NgitVLUuje;DvSBrzE({NoTXBU7iUzG*me2;>~L^i(j$PS}$ z4dKw~U$i>yg4;GTH}<{9X4bP-x#73Vxj)L0F|T&?rDPCLWfHq;UFvLEdjW`Vl`pb{ zKpZ~`Hfyy&wm{xyl_}Hh85B20xQBC+CD)qs_t#Af?yfb&JBLR1uc`27D-ZaA=gm+8 z_0>~T+@q#2o96mDLksO9;E>}%K($hV?OaQF!$}LOvOk!NkW3YJev4429#@r*k%T=_ zYad&Wmvmf`O7I*sPk!UYPY3ToQ=4Z)5_j*plv6gz;bm4dH$KvgiZt7B5Yb|Zn zrL;ZPyvl~Ptuql)t@C>V4M(-DdOqv5NNmCJ9QY^~C){zW(_1?0$UGi$t*XAIjs5sZ zq>}LYi2pGoiagAxbIr+Ei%aRF0;CnN7)u4hjl{vuV0c+`e0pRnv>NfC8#SH0Z8V*h zP>k$7d5Z4i?!3mCbN{*fFa_Q9nf- zls=6%K6Z5v%D1pI+Dr69?iNmD1x*VF`r&^kbW_EcHMA9fmXJaXxK-=xd1??%`KrOwePwn(>$I|O1;hM zXUdWONL$b958yam2Tal(+6xf4#NH|KJhj+z{;$-_2LO zO!k+QzOuabDT)3BvNVoU?$gruT{jw?=RaPUZGq%wgg@o6E)TLdSddqhbTtmr)AMPV zKhJT*A{ANBK!oH9L`ZiIeMcg*qV1j*-HjZhw8sS>=dmxRTdH5*sU3+_ z;P}z5kdYsz*^bltNM-lIi6Jv^0R~a&L2LRIG^PO~??KeMzmp!^quB_6RZx)!Uc;-# z3%XYAz$CtVp9=Jh<(%qaD!g0n3#VLyEjKo2N*AZxH`-tJfmKw-it>C!iqhHfGMCTR z!;|Xu>(pTd&GXnPflXWM&2{<}QhuF<*7}&%Ojn_{L!+Ri7N7Ce59K)=xZS)ZDr$>O z5Hb~$RR*n-N6r-us@$(Edh%LT|LgMr<`Ro8+rp-TGKUDhMii5P1f8z3E{8JRGm`%( zJzCXO1_S_i+Lq{lzdz%xJ`-ph$JS?5i@@YG3oXo>D~#MO2jxEF%8B`%D~Hl1>0>q{ z85XD-Rp5Z;vJicGnFl&J$VMb*GI7#a@skC-DO4rc3bY|TEaaqq?Z=5U8cTaf!X(y@ zNbo$Hp+i4hD{zR*Fui8);#=w6_{GHeLiC|*8<{?;{bO@eO!!ay^)>=+nHM3tH(gHXGv}~-C|M2hBs)l zq=SEO2Jd<$S_t5HyFtZK0hN7sB3xVTikvbZfC*{cM)uH(8$aA@+Aa zyis9;nD?BmS1!ltTTbR0j!VjGoEp4&9WWD9%G2a2edTLc4d=ENZZ8rkLbmm7i&-Tv zq;O$oRoTnV^XNc1F%0?bH5045(~mWNnw-fbjmfkv{nTGso^5MwyP4~d6vJWGwHsK5 zIV{^dD;Cef0%sKrGBdEcdfwUnq*dh2u+}1u6cqEhEsXGJ~i#+b{8Yd zrSc>W+QK}}1FM{Ca`g-KUb*!;FAqnUo#wA$B!YO2Fmk{Og#ME;33b8B!seLahA}L5 zPjK?NbcRUMk5+RrXy71?c%2_)y(Zwp!W_ih!onP4$pCyXAS;LBjt2+aO6vo>+mJ5L zVZ{%(EN(l0l?ZY(Mc*Ayx103=qG!0#i?M1nFFZn3SR^HCXO%(G&6z1j6SAg7Q}bK> zBjECq^5(LpV)i0ng!imfdz{54YQk)Ice|j@OhEDdSwN6N7Gw8}3=e#=-ZGq>HrKK8M?jP~+h@zzH|9$hD4`(&pdHungtQP=FEo=;OZVq+b$SuiDnAk zShIYHIQR^5BSxARi$bVfklo@4pOIb#&WXdqD`7m@HeP-KJ}=^9F-Q9!6z8oht{4mG zv#G3A*}t7NXQ~4Js`V=gY&q!g7zX=jdrk7nR1I3t!Yw7Z`+wQdoyvGlomF@&;@=d} zGxcV8ebMsOU2pz1duaL6LUCN-{`pvQRY8@7X>aA3S`Gec7I#+~c*z zDHwiQG?sTk_J_1Mi8@^?cgf>Hn;mM;YZ`ce8=|xFFYSj8l?2yCYqd8^h5!rXw-?jn zSPG62yp>j*eTL3g#+m@tpq^s2;&?ZupRBr=gs4y8EH7;NlZ>fW!oSP)l8q8+E z4YNf-7E%0@x%f4a(}-Wj_2*;wjiWV8YI;?hEjj1!7=L_zlezvzbLRT$5La#A1L~*o zYwr@jtsX$&AFJSoU@VjB1>lm0?=R1DUN%-^Zbprne(?*yCxg`Xz=fAT8N;hxB`pc} zOCot1p*%SU-8mfbo_^xxG2?KB!B~U%x6+%2hel|);#9$s(D9i-n`#fU-RpGUf;kJb zEtHtDT^XD9zMs%)JoocD^(&a#a;fWywR~SA!*Sm2jhdbAbx%>GF&Rn`gIpWDzUJ@V z<@_q2XTTRD7r{}*-ww0E%9&e=JicRlc1URQX@$*mQ$IO&nQHMW9iAmVO%p!uih^K6 z$yPI`tzaJ{vONdMx_{pwcBOEZ80)MYTs%sG&LsCAx5u&ZVi}j^HMN6zDi&LwFlF&VrCant+*W^0sbkk-@`ec}@wk-)YOj)z*g8#2`a*J-;5m>YF{9?AWBBzAfmUTv8`1j4O^+h9=M2P~6iU zbUjBKG-zI24dvvl2|;cRV=5}MW&Vn(a&xe85pKd*~pE7GMH{%jw`8NEx* zX?RHmdjW7l1h#n{C9O|f0G46zW#ua>C2kI_(|+ACX|CaVZO{F(k1I)M*xxNiGKfW~ z1HE$y(;Ly8a2KgqY)O(0_$JNn;`F$$_l~Hfk>+Vug6v>pV=|T{a1MQI9edi+<}o8L zkZ^jhqWly(qV&@Yi{+50m`hEO@z%Hi+?srXI<-%6KkuPCbT%$NA9i;=YH7)ps@4hj zmA`Y;qt{XI(@x%dqL6(7DBd<3!-s?+b>ccM$z7{LxDKy?lRst3wX@(!!((}zD@B;Y zv1@HJT}>f%nrw?Y(!$+o*XX0u5<(J3Jh+L9j8+$ndtv&$jumiK{U?ATOBEv`2P}US zQalgYJjRrG1EuOD9z6C4H6)tycxlP;+FxJ7nY~w=O3j8U+47fntKr@!@@zR}oA?WW z;}?_Y34Z1Mi8i!hsA)xT5o&Fya!30;lPqs=VcaTUPRO zDIYr#qvl`CRR#e;Su3-2@7&B++y`@ON zqK{0an|H?5h@@lyj&=6o4W62E-|$j=njpwWTd7AiS58_5s6f z>|FUXC2w> z6ZAOrsckZWFrhRPEQTiT?q3F66#bXzZ?0|NBZdtpLlVS zUitxj-b$_%2RrZS*7-7HH`9Pgb&&vN=b~~|L%FS3*ID76KO5(aFYx9A@!iQ+=)D?kAvlLr?gSvPnrg0uZ}vA zFA28;fxoNH9sr~2<=viGUfDJ}LB$BeDg8JTw8!#NElxC}$fs?RsKh{tikTl;2FqA_ zM!nLs5ZY}sjBq`e zmU%`y^TfCw#hIrT-xS* zNzKG)h-t}79qa4B%P_}~-Y$6+``^juwBOG*9d4|5xF?DYPx`^=qvVIbj|Y>DV@?T* z=Zu!2ZpB3JB7E;UqWp^jb=b2Q3o#JXzdhT*;ku8y*Y!xbQah9;;(60+9bx-@x-Ucb zGh3}Tl1yyk3KI)rWa(=7GgcS9nfBt5d44NeZo0UMsu+(7r(qgfvDQHq86_M zF6D;%tNVa0=VDXualIk|$@>~7bNAKzDtC_SbX0bZ)i&ZC$fUMa@E)*|MxWuQFaGBOu6w#|Qj~Z5GBA!6a>Py_YQ146Jx-%P4wl8 z@rT>h*LvR%R5|N8ioO}$Ob8J$ReALF9^1@SD!H4;VgX7sLpBXs%}lwf%@(sGryZ=9Ndt<^l8fFSjXlRE!A=4-KHdza2r?MwX|dz);u5K%u@udvP7h-O$zP_ zvR816BZ~ zY|_vR!0J)8u&KmWS)=_gXhQ{d52`I@hHYM`T|;J%n8{3lgyVVc_m{;qceGThYr>8K ze4UKZy~y*g3s=vam-eRl*O2m*=4c1pd`3l_tMe(88u} zwMTl-V8RZ*{nMVSKPDPt;-&)*z)A@P=Rijkb9JxcwAt|RyzESAD@Vy!&N1J)Ug0^* z&ZMuSQjo$}{+2z#uJ^(w`x8;id=gU~4m#neTY)kYa;7$g-xnOyCmBvs2PuoU7N$|e ziM52Tz?BT_TKyZwP7u9rE>}1%Tcm5cIHKxFnaLI?Jif@)i+-(bpxc9K2DO%`X0?CT z%Kpx~^h|Ok+xN3CiqT98RpEFHj9Q!3vI!EZPp5o`^-&>xtu8IYIw>!gR0(=kToSCx zcvRq1dJ3$7OrV<=>Ws!WOLO%~jo_?8!-egG71=tD*@YE5KLdQV*hH{Qe+EDu^u;i6 zCyO+}C zfrhLy_hkM7>^JtLZUb+)W>#OW=_hpp4^|gx5>X<~_+7lh>2x2G{=b~A{@sG|zhMi? zKf9f)K;l34<@`rJp8v(`WOg{JMXG2;Xh&39I}I)hg~W3xu1z;(! zRk(6FmlQdM@G=$qDktR0X}}0FS~Na=!j<$atkDL#xJpAfX2TcTq}gkdzIw;Wt_`!E z>1bP>sE1HZHByF(&yENncI;&OEymK-xmhd}pbN&B-t}B8(W7}KH2FyM_q*LzxF4P* zP!)ayTbcR&bAC`f$9g;ZX`F0YukL;{;ouq330H{l={0VyYeu1wsyVW#GM#LjkUpwl?_ft)(tSs5L8 zE#%%)VB2BaYR5FK_{Lqyoa7SQmBbG;vzUd*Gs?w|*B1bmR_>*lkceQaafu7S?ZD@F zk#LbXY(=d)dn!XU)R`XHPTT^+<$I&SklmVItK#Zmh=1;_@wil{;Nv!i^n=Iz`gO2? z(gW_I8F0bp(l04%zADu%yL~btLh90AHhIg9+`wE%4!!3$aPdWWsveL|#80pr%9(j> z6%-WrF_9B^tAAN~%(Pk{mVq%%qCQijp;}L`#?8!CcB!f(L$Nkv(^*Bf>{P zcuW%e+=;m(a<{%EstUGS32%AJrnhM#)bV|>0hN*uyNSMa*E`XuN%589wfdbv8r;u2 zHzhi#5xmO`38WiQXU6g=Xmh0zxP!;8MR**-b82*4_IUrGW%Tn=7_5;sDeiQ?Mp z7A>R9bY7l`lz&m8*?4<8&#==3C%7bMe}jvKA`sRntaW|J#NpjuPFGaEo-dikQb|Y0U))< zFJOak{M(<-`EeVsVAf5os8+^i4fBUzt%E-Ms0+T>D4D0<|BYNdQgBF=`1Wh`t=<0W z{dJBW-I@vQtB)2J4ZIEQnpCJn@^J)yCu-LtFk}W2L?ct|5jW^8s3KMH4vm~YG9J_P zwSB$6RFU+3NUR}VC6z<`ju6|6>!1Cvav0FcaHzg7b(lm_mKWxLw>RzMeVWwSm!{B0 z&xh_>d$PT~Dm4D)nhd>J^iLU^?*~mqv!i2Y4wX>mK#Y%nPbC!U;hA3hnRF+yTkyvt z^$f!o;`a?XMh3}m%TdJlb~6`eEN!>lThJe`{F(izE8R#8qLzjd6bs{ei1ic|HDP`3 zZ^+Ldlp-s93WsPMO(QpE!0A2NINB}>&awCZ1#F0fO5oida$XZ;`_ zPFzq3s!(9fQibU2X|b - - - - +> [!video https://www.microsoft.com/en-us/videoplayer/embed/43942201-bec9-4f8b-8ba7-2d9bfafa8bba?autoplay=false] ## Deployment From 9edf609052312609e9f298644c244a8bda6a5be1 Mon Sep 17 00:00:00 2001 From: Daniel Lebredo Date: Thu, 25 Jan 2018 02:01:49 +0100 Subject: [PATCH 03/91] Fixed a typo: "turn of"->"turn off" --- windows/configuration/diagnostic-data-viewer-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/diagnostic-data-viewer-overview.md b/windows/configuration/diagnostic-data-viewer-overview.md index 384f3b5dd1..c009c6c0e2 100644 --- a/windows/configuration/diagnostic-data-viewer-overview.md +++ b/windows/configuration/diagnostic-data-viewer-overview.md @@ -49,7 +49,7 @@ You must start this app from the **Settings** panel. ![Location to turn on the Diagnostic Data Viewer](images/ddv-settings-launch.png) - -OR- +f -OR- Go to **Start** and search for _Diagnostic Data Viewer_. @@ -106,4 +106,4 @@ You can review additional Windows Error Reporting diagnostic data in the **View The **Review problem reports** tool opens, showing you your Windows Error Reporting reports, along with a status about whether it was sent to Microsoft. - ![View problem reports tool with report statuses](images/ddv-problem-reports-screen.png) \ No newline at end of file + ![View problem reports tool with report statuses](images/ddv-problem-reports-screen.png) From 96d5d324957a4abd74ccade35d5dd55c4c444111 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 17:56:14 -0800 Subject: [PATCH 04/91] new WDAC file --- .openpublishing.redirection.json | 30 ++++++++++++ windows/threat-protection/TOC.md | 3 +- .../windows-defender-application-control.md | 49 +++++++++++++++++++ 3 files changed, 80 insertions(+), 2 deletions(-) create mode 100644 windows/threat-protection/windows-defender-application-control.md diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 56172647cf..4ca20e44b6 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,6 +1,36 @@ { "redirections": [ { +"source_path": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", +"redirect_url": "/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control", +"redirect_document_id": true +}, +{ +"source_path": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", +"redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", +"redirect_document_id": true +}, +{ +"source_path": "windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies.md", +"redirect_url": "/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control", +"redirect_document_id": true +}, +{ +"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", +"redirect_url": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", +"redirect_document_id": true +}, +{ +"source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", +"redirect_url": "windows/device-security/device-guard/deploy-windows-defender-application-control", +"redirect_document_id": true +}, +{ +"source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", +"redirect_url": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/use-windows-event-forwarding-to-assist-in-instrusion-detection.md", "redirect_url": "/windows/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection", "redirect_document_id": true diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index 30f102d99c..42ede7cb70 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -269,8 +269,7 @@ #### [Customize Controlled folder access](windows-defender-exploit-guard\customize-controlled-folders-exploit-guard.md) - - +## [Windows Defender Application Control](windows-defender-application-control.md) ## [Windows Defender SmartScreen](windows-defender-smartscreen\windows-defender-smartscreen-overview.md) diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md new file mode 100644 index 0000000000..5e9201d107 --- /dev/null +++ b/windows/threat-protection/windows-defender-application-control.md @@ -0,0 +1,49 @@ +--- +title: Windows Defender Application Control (WDAC) (Windows 10) +description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. +ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.pagetype: security +author: jsuther1974 +ms.date: 01/24/2018 +--- + +# Windows Defender Application Control + +**Applies to:** + +- Windows 10 +- Windows Server 2016 + +With thousands of new malicious files created every day, using traditional methods like antivirus solutions—signature-based detection to fight against malware—provides an inadequate defense against new attacks. +In most organizations, information is the most valuable asset, and ensuring that only approved users have access to that information is imperative. + +However, when a user runs a process, that process has the same level of access to data that the user has. +As a result, sensitive information could easily be deleted or transmitted out of the organization if a user knowingly or unknowingly runs malicious software. + +Application control is a crucial line of defense for protecting enterprises given today’s threat landscape, and it has an inherent advantage over traditional antivirus solutions. +Specifically, application control moves away from the traditional application trust model where all applications are assumed trustworthy by default to one where applications must earn trust in order to run. +Many organizations, like the Australian Signals Directorate, understand this and frequently cite application control as one of the most effective means for addressing the threat of executable file-based malware (.exe, .dll, etc.). + +Windows Defender Application Control (WDAC) can help mitigate these types of security threats by restricting the applications that users are allowed to run and the code that runs in the System Core (kernel). +WDAC policies also block unsigned scripts and MSIs, and Windows PowerShell runs in [Constrained Language Mode](https://docs.microsoft.com/powershell/module/microsoft.powershell.core/about/about_language_modes?view=powershell-5.1). + +> [!NOTE] +> Prior to Windows 10, version 1709, Windows Defender Application Control was known as configurable code integrity policies. + +## WDAC System Requirements + +WDAC policies can only be created on computers running Windows 10 Enterprise or Windows Server 2016. +They can be applied to computers running any edition of Windows 10 and managed via Mobile Device Management (MDM), such as Microsoft Intune. +Group Policy can also be used to distribute Group Policy Objects that contain WDAC policies on computers running Windows 10 Enterprise or Windows Server 2016. + +## New and changed functionality + +Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. + +Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). +For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#a-href-idplug-insause-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). + + From 0b103c93f132e1816894c17b98fd5a88c5392b15 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 18:19:23 -0800 Subject: [PATCH 05/91] updated history --- .../change-history-for-threat-protection.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/threat-protection/change-history-for-threat-protection.md b/windows/threat-protection/change-history-for-threat-protection.md index 6f573cc55e..2509a33e83 100644 --- a/windows/threat-protection/change-history-for-threat-protection.md +++ b/windows/threat-protection/change-history-for-threat-protection.md @@ -12,6 +12,12 @@ ms.date: 10/31/2017 # Change history for threat protection This topic lists new and updated topics in the [Threat protection](index.md) documentation. +## January 2018 +|New or changed topic |Description | +|---------------------|------------| +|[Windows Defender Application Control](windows-defender-application-control.md)|New topic. WDAC replaces cofigurable code integrity policies. | + + ## October 2017 |New or changed topic |Description | |---------------------|------------| From aec8da0f59382bbf5277b63049571d320d3da02d Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 18:23:25 -0800 Subject: [PATCH 06/91] fixed paths --- .openpublishing.redirection.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4ca20e44b6..f3f3b9294a 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -1,12 +1,12 @@ { "redirections": [ { -"source_path": "/windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", +"source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-steps.md", "redirect_url": "/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control", "redirect_document_id": true }, { -"source_path": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", +"source_path": "windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-code-integrity-policies.md", "redirect_url": "/windows/device-security/device-guard/optional-create-a-code-signing-certificate-for-windows-defender-application-control", "redirect_document_id": true }, @@ -17,17 +17,17 @@ }, { "source_path": "windows/device-security/device-guard/deploy-code-integrity-policies-policy-rules-and-file-rules.md", -"redirect_url": "windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", +"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control-policy-rules-and-file-rules", "redirect_document_id": true }, { "source_path": "windows/device-security/device-guard/deploy-device-guard-deploy-code-integrity-policies.md", -"redirect_url": "windows/device-security/device-guard/deploy-windows-defender-application-control", +"redirect_url": "/windows/device-security/device-guard/deploy-windows-defender-application-control", "redirect_document_id": true }, { "source_path": "windows/device-security/device-guard/deploy-catalog-files-to-support-code-integrity-policies.md", -"redirect_url": "windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", +"redirect_url": "/windows/device-security/device-guard/deploy-catalog-files-to-support-windows-defender-application-control", "redirect_document_id": true }, { From c85619f933801f70bdfa8316e3e841867f96a87c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 18:44:29 -0800 Subject: [PATCH 07/91] fixed links --- .../steps-to-deploy-windows-defender-application-control.md | 2 +- .../threat-protection/windows-defender-application-control.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md index a43a5c8855..380dfc0e0c 100644 --- a/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md +++ b/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md @@ -808,7 +808,7 @@ You can now use this file to update the existing WDAC policy that you ran in aud > [!Note] > You may have noticed that you did not generate a binary version of this policy as you did in [Create a Windows Defender Application Control policy from a reference computer](#create-a-windows-defender-application-control-policy-from-a-reference-computer). This is because WDAC policies created from an audit log are not intended to run as stand-alone policies but rather to update existing WDAC policies. -## Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules +## Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules As of Windows 10, version 1703, you can use WDAC policies not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser): diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index 5e9201d107..510a795563 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#a-href-idplug-insause-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). +For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#use-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). From 175f40bd23b16c81a92b6bf3367734956dd96a65 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 19:04:31 -0800 Subject: [PATCH 08/91] fixed links --- ...n-based-security-and-windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md b/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md index f06a7859a8..a1b6bbcab8 100644 --- a/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md +++ b/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md @@ -42,7 +42,7 @@ In this guide, you learn about the individual features found within Windows Defe Prior to Windows 10, version 1709, Windows Defender Application Control (WDAC) was known as configurable code integrity policies. -Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](steps-to-deploy-windows-defender-application-control.md#plug-ins). +Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](steps-to-deploy-windows-defender-application-control.md#use-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). ## Tools for managing Windows Defender Device Guard features From a8185e271ab84eee2a163844cf5a6bb012f8a885 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Wed, 24 Jan 2018 19:24:45 -0800 Subject: [PATCH 09/91] fixed link --- .../threat-protection/windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index 510a795563..d9f5a36a1c 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Use a WDAC policy to control specific plug-ins, add-ins, and modules](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md#use-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). +For more information, see [Steps to deploy Windows Defender Application Control](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md). From 9c7cf9fab0ceb27ad240111d55c1bf595d20e6be Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 25 Jan 2018 16:12:52 +0000 Subject: [PATCH 10/91] Merged PR 5483: Add link to blog post --- devices/surface-hub/install-apps-on-surface-hub.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/devices/surface-hub/install-apps-on-surface-hub.md b/devices/surface-hub/install-apps-on-surface-hub.md index 8449690b59..b0737d1f6b 100644 --- a/devices/surface-hub/install-apps-on-surface-hub.md +++ b/devices/surface-hub/install-apps-on-surface-hub.md @@ -164,6 +164,10 @@ There are a few different ways to install apps on your Surface Hub depending on | Microsoft Store app | | X | | | Supported MDM provider | | | X | +## More information + +- [Blog post: Deploy Windows Store apps to Surface Hub using Intune](https://blogs.technet.microsoft.com/y0av/2018/01/18/7-2/) + ## Related topics From 08feaf93aef0b13662ec8f8aaef83c97afff5be4 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 25 Jan 2018 08:43:26 -0800 Subject: [PATCH 11/91] added location for dll --- .../bitlocker/bitlocker-how-to-enable-network-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md b/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md index c292812427..7ed9c2166c 100644 --- a/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md +++ b/windows/device-security/bitlocker/bitlocker-how-to-enable-network-unlock.md @@ -260,7 +260,7 @@ After adding the Network Unlock template to the Certification Authority, this ce By default, all clients with the correct Network Unlock Certificate and valid Network Unlock protectors that have wired access to a Network Unlock-enabled WDS server via DHCP are unlocked by the server. A subnet policy configuration file on the WDS server can be created to limit which subnet(s) Network Unlock clients can use to unlock. -The configuration file, called bde-network-unlock.ini, must be located in the same directory as the Network Unlock provider DLL and it applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, the provider will fail and stop responding to requests. +The configuration file, called bde-network-unlock.ini, must be located in the same directory as the Network Unlock provider DLL (%windir%\System32\Nkpprov.dll) and it applies to both IPv6 and IPv4 DHCP implementations. If the subnet configuration policy becomes corrupted, the provider will fail and stop responding to requests. The subnet policy configuration file must use a “\[SUBNETS\]” section to identify the specific subnets. The named subnets may then be used to specify restrictions in certificate subsections. Subnets are defined as simple name-value pairs, in the common INI format, where each subnet has its own line, with the name on the left of the equals sign, and the subnet identified on the right of the equal sign as a Classless Inter-Domain Routing (CIDR) address or range. The key word “ENABLED” is disallowed for subnet names. From 50a7477ea00c4be16f9b78bb6e301a7e68c0eb5c Mon Sep 17 00:00:00 2001 From: Liza Poggemeyer Date: Thu, 25 Jan 2018 17:28:39 +0000 Subject: [PATCH 12/91] Merged PR 5475: Fixed typo in command syntax --- windows/application-management/apps-in-windows-10.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/application-management/apps-in-windows-10.md b/windows/application-management/apps-in-windows-10.md index 024ec80b94..521038e82e 100644 --- a/windows/application-management/apps-in-windows-10.md +++ b/windows/application-management/apps-in-windows-10.md @@ -8,7 +8,7 @@ ms.pagetype: mobile ms.author: elizapo author: lizap ms.localizationpriority: low -ms.date: 01/23/2018 +ms.date: 01/24/2018 --- # Understand the different apps included in Windows 10 @@ -31,7 +31,7 @@ Some of the apps show up in multiple tables - that's because their status change > Want to see a list of the apps installed on your specific image? You can run the following PowerShell cmdlet: > ```powershell > Get-AppxPackage |Select Name,PackageFamilyName -> Get-AppsProvisionedPackage -Online | select DisplayName,PackageName +> Get-AppxProvisionedPackage -Online | select DisplayName,PackageName > ``` From 4baac698dc71be76ce901eb6fd5445344898ec9b Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 25 Jan 2018 09:42:33 -0800 Subject: [PATCH 13/91] added ref to dg steps --- .../threat-protection/windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index d9f5a36a1c..28261c1bd1 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Steps to deploy Windows Defender Application Control](windows\device-security\device-guard\steps-to-deploy-windows-defender-application-control.md). +For more information, see [Steps to deploy Windows Defender Application Control](./windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md). From 4c93a12943b566a7cb4f2484fdd4eb7381a2bd83 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 25 Jan 2018 10:01:11 -0800 Subject: [PATCH 14/91] replaced link --- .../threat-protection/windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index 28261c1bd1..b1f131a960 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Steps to deploy Windows Defender Application Control](./windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control.md). +For more information, see [Steps to deploy Windows Defender Application Control](https://docs.microsoft.com/windows/device-security/device-guard/deploy-code-integrity-policies-steps). From 3dec80863e4916d47ae6c2a0870d9972d6b9ed09 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Thu, 25 Jan 2018 15:59:00 -0800 Subject: [PATCH 15/91] fixed link --- .../threat-protection/windows-defender-application-control.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-control.md b/windows/threat-protection/windows-defender-application-control.md index b1f131a960..74adeafb06 100644 --- a/windows/threat-protection/windows-defender-application-control.md +++ b/windows/threat-protection/windows-defender-application-control.md @@ -44,6 +44,6 @@ Group Policy can also be used to distribute Group Policy Objects that contain WD Prior to Windows 10, version 1709, Windows Defender Application Control was known as Windows Defender Device Guard configurable code integrity policies. Beginning with Windows 10, version 1703, you can use WDAC not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps (such as a line-of-business application or a browser). -For more information, see [Steps to deploy Windows Defender Application Control](https://docs.microsoft.com/windows/device-security/device-guard/deploy-code-integrity-policies-steps). +For more information, see [Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules](https://docs.microsoft.com/windows/device-security/device-guard/steps-to-deploy-windows-defender-application-control#use-a-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules). From 63981c1473d57ccaecd38441d55eaf071d162b9e Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Fri, 26 Jan 2018 15:03:10 +0000 Subject: [PATCH 16/91] Merged PR 5500: Merge nibr-SyntaxRemoval to master removing useless syntax to simplify automation --- .../mdm/policy-csp-abovelock.md | 10 +- .../mdm/policy-csp-accounts.md | 16 +- .../mdm/policy-csp-applicationdefaults.md | 12 +- .../mdm/policy-csp-applicationmanagement.md | 50 ++-- .../mdm/policy-csp-authentication.md | 18 +- .../mdm/policy-csp-bitlocker.md | 4 +- .../mdm/policy-csp-bluetooth.md | 24 +- .../mdm/policy-csp-browser.md | 174 ++++++------- .../mdm/policy-csp-camera.md | 4 +- .../mdm/policy-csp-connectivity.md | 36 +-- .../mdm/policy-csp-cryptography.md | 6 +- .../mdm/policy-csp-dataprotection.md | 6 +- .../mdm/policy-csp-defender.md | 170 ++++++------- .../mdm/policy-csp-deliveryoptimization.md | 56 ++--- .../mdm/policy-csp-deviceguard.md | 6 +- .../mdm/policy-csp-devicelock.md | 94 +++---- .../mdm/policy-csp-display.md | 24 +- .../mdm/policy-csp-enterprisecloudprint.md | 36 +-- .../mdm/policy-csp-experience.md | 74 +++--- .../mdm/policy-csp-exploitguard.md | 6 +- .../client-management/mdm/policy-csp-games.md | 2 +- .../mdm/policy-csp-handwriting.md | 8 +- .../mdm/policy-csp-licensing.md | 4 +- .../mdm/policy-csp-location.md | 6 +- .../mdm/policy-csp-lockdown.md | 4 +- .../client-management/mdm/policy-csp-maps.md | 8 +- .../mdm/policy-csp-messaging.md | 12 +- .../mdm/policy-csp-networkisolation.md | 18 +- .../mdm/policy-csp-notifications.md | 6 +- .../client-management/mdm/policy-csp-power.md | 48 ++-- .../mdm/policy-csp-privacy.md | 224 ++++++++--------- .../mdm/policy-csp-search.md | 62 ++--- .../mdm/policy-csp-security.md | 38 +-- .../mdm/policy-csp-settings.md | 48 ++-- .../mdm/policy-csp-smartscreen.md | 6 +- .../mdm/policy-csp-speech.md | 2 +- .../client-management/mdm/policy-csp-start.md | 102 ++++---- .../mdm/policy-csp-storage.md | 6 +- .../mdm/policy-csp-system.md | 70 +++--- .../mdm/policy-csp-textinput.md | 54 ++-- .../mdm/policy-csp-timelanguagesettings.md | 2 +- .../mdm/policy-csp-update.md | 232 +++++++++--------- .../client-management/mdm/policy-csp-wifi.md | 28 +-- ...olicy-csp-windowsdefendersecuritycenter.md | 56 ++--- .../mdm/policy-csp-windowsinkworkspace.md | 6 +- .../mdm/policy-csp-windowslogon.md | 4 +- .../mdm/policy-csp-wirelessdisplay.md | 24 +- 47 files changed, 954 insertions(+), 952 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 6b710cf5c8..1c59efda74 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -70,9 +70,9 @@ ms.date: 12/14/2017 > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether to allow Action Center notifications above the device lock screen. +Specifies whether to allow Action Center notifications above the device lock screen. -

Most restricted value is 0. +Most restricted value is 0. @@ -120,7 +120,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. +Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. @@ -168,9 +168,9 @@ The following list shows the supported values: -

Specifies whether to allow toast notifications above the device lock screen. +Specifies whether to allow toast notifications above the device lock screen. -

Most restricted value is 0. +Most restricted value is 0. diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index b64e96d236..9098a9f6be 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -70,9 +70,9 @@ ms.date: 12/14/2017 -

Specifies whether user is allowed to add non-MSA email accounts. +Specifies whether user is allowed to add non-MSA email accounts. -

Most restricted value is 0. +Most restricted value is 0. > [!NOTE] > This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md). @@ -123,9 +123,9 @@ The following list shows the supported values: -

Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. +Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. -

Most restricted value is 0. +Most restricted value is 0. @@ -173,7 +173,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. +Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. @@ -221,11 +221,11 @@ The following list shows the supported values: -

Specifies a list of the domains that are allowed to sync email on the device. +Specifies a list of the domains that are allowed to sync email on the device. -

The data type is a string. +The data type is a string. -

The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". +The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 05657e6bd9..440136eec9 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -61,11 +61,11 @@ ms.date: 12/04/2017 -

Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. +Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. -

If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. +If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. -

To create create the SyncML, follow these steps: +To create create the SyncML, follow these steps:

  1. Install a few apps and change your defaults.
  2. From an elevated prompt, run "dism /online /export-defaultappassociations:appassoc.xml"
  3. @@ -73,7 +73,7 @@ ms.date: 12/04/2017
  4. Paste the base64 encoded XML into the SyncML
-

Here is an example output from the dism default association export command: +Here is an example output from the dism default association export command: ``` syntax @@ -86,13 +86,13 @@ ms.date: 12/04/2017 Here is the base64 encoded result: +Here is the base64 encoded result: ``` syntax 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 ``` -

Here is the SyncMl example: +Here is the SyncMl example: ``` syntax diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index c495acc547..8d12310300 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -91,9 +91,9 @@ ms.date: 12/14/2017 -

Specifies whether non Microsoft Store apps are allowed. +Specifies whether non Microsoft Store apps are allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -142,14 +142,14 @@ The following list shows the supported values: -

Specifies whether automatic update of apps from Microsoft Store are allowed. +Specifies whether automatic update of apps from Microsoft Store are allowed. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -190,9 +190,9 @@ The following list shows the supported values: -

Specifies whether developer unlock is allowed. +Specifies whether developer unlock is allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -244,9 +244,9 @@ The following list shows the supported values: > [!NOTE] > The policy is only enforced in Windows 10 for desktop. -

Specifies whether DVR and broadcasting is allowed. +Specifies whether DVR and broadcasting is allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -294,9 +294,9 @@ The following list shows the supported values: -

Specifies whether multiple users of the same app can share data. +Specifies whether multiple users of the same app can share data. -

Most restricted value is 0. +Most restricted value is 0. @@ -344,9 +344,9 @@ The following list shows the supported values: -

Specifies whether app store is allowed at the device. +Specifies whether app store is allowed at the device. -

Most restricted value is 0. +Most restricted value is 0. @@ -398,7 +398,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead.   -

An XML blob that specifies the application restrictions company want to put to the device. It could be an app allow list, app disallow list, allowed publisher IDs, and so on. For a list of Windows apps and product IDs, see [inbox apps](applocker-csp.md#inboxappsandcomponents). For more information about the XML, see the [ApplicationRestrictions XSD](applicationrestrictions-xsd.md). +An XML blob that specifies the application restrictions company want to put to the device. It could be an app allow list, app disallow list, allowed publisher IDs, and so on. For a list of Windows apps and product IDs, see [inbox apps](applocker-csp.md#inboxappsandcomponents). For more information about the XML, see the [ApplicationRestrictions XSD](applicationrestrictions-xsd.md). > [!NOTE] > When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps. @@ -412,11 +412,11 @@ The following list shows the supported values: > - You cannot disable or enable **Contact Support** and **Windows Feedback** apps using ApplicationManagement/ApplicationRestrictions policy, although these are listed in the [inbox apps](applocker-csp.md#inboxappsandcomponents). -

An application that is running may not be immediately terminated. +An application that is running may not be immediately terminated. -

Value type is chr. +Value type is chr. -

Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. +Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. @@ -457,7 +457,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. +Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. @@ -505,14 +505,14 @@ The following list shows the supported values: -

Allows disabling of the retail catalog and only enables the Private store. +Allows disabling of the retail catalog and only enables the Private store. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Allow both public and Private store. - 1 – Only Private store is enabled. -

Most restricted value is 1. +Most restricted value is 1. @@ -553,9 +553,9 @@ The following list shows the supported values: -

Specifies whether application data is restricted to the system drive. +Specifies whether application data is restricted to the system drive. -

Most restricted value is 1. +Most restricted value is 1. @@ -603,9 +603,9 @@ The following list shows the supported values: -

Specifies whether the installation of applications is restricted to the system drive. +Specifies whether the installation of applications is restricted to the system drive. -

Most restricted value is 1. +Most restricted value is 1. diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index aefc04173f..5d6851b66b 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -73,7 +73,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen.  +Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen.  @@ -121,7 +121,7 @@ The following list shows the supported values: -

Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. +Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. @@ -169,9 +169,9 @@ The following list shows the supported values: -

Allows EAP Fast Reconnect from being attempted for EAP Method TLS. +Allows EAP Fast Reconnect from being attempted for EAP Method TLS. -

Most restricted value is 0. +Most restricted value is 0. @@ -219,11 +219,11 @@ The following list shows the supported values: -

Preview release in Windows 10, version 1709. Supported in the next release. Specifies whether Fast Identity Online (FIDO) device can be used to sign on. This policy enables the Windows logon credential provider for FIDO 2.0 +Preview release in Windows 10, version 1709. Supported in the next release. Specifies whether Fast Identity Online (FIDO) device can be used to sign on. This policy enables the Windows logon credential provider for FIDO 2.0 -

Value type is integer. +Value type is integer. -

Here is an example scenario: At Contoso, there are a lot of shared devices and kiosks that employees throughout the day using as many as 20 different devices. To minimize the loss in productivity when employees have to login with username and password everytime they pick up a device, the IT admin deploys SharePC CSP and Authentication/AllowFidoDeviceSignon policy to shared devices. The IT admin provisions and distributes FIDO 2.0 devices to employees, which allows them to authenticate to various shared devices and PCs. +Here is an example scenario: At Contoso, there are a lot of shared devices and kiosks that employees throughout the day using as many as 20 different devices. To minimize the loss in productivity when employees have to login with username and password everytime they pick up a device, the IT admin deploys SharePC CSP and Authentication/AllowFidoDeviceSignon policy to shared devices. The IT admin provisions and distributes FIDO 2.0 devices to employees, which allows them to authenticate to various shared devices and PCs. @@ -271,9 +271,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. +Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. -

The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD). +The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD). diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index ede5f3ea04..e575654a6d 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -61,12 +61,12 @@ ms.date: 12/14/2017 -

Specifies the BitLocker Drive Encryption method and cipher strength. +Specifies the BitLocker Drive Encryption method and cipher strength. > [!NOTE] > XTS-AES 128-bit and XTS-AES 256-bit values are only supported on Windows 10 for desktop. -

You can find the following policies in BitLocker CSP: +You can find the following policies in BitLocker CSP:

BitLocker/EncryptionMethodByDriveType diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index f9a9be2812..a292b521f3 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -73,11 +73,11 @@ ms.date: 12/14/2017 -

Specifies whether the device can send out Bluetooth advertisements. +Specifies whether the device can send out Bluetooth advertisements. -

If this is not set or it is deleted, the default value of 1 (Allow) is used. +If this is not set or it is deleted, the default value of 1 (Allow) is used. -

Most restricted value is 0. +Most restricted value is 0. @@ -125,11 +125,11 @@ The following list shows the supported values: -

Specifies whether other Bluetooth-enabled devices can discover the device. +Specifies whether other Bluetooth-enabled devices can discover the device. -

If this is not set or it is deleted, the default value of 1 (Allow) is used. +If this is not set or it is deleted, the default value of 1 (Allow) is used. -

Most restricted value is 0. +Most restricted value is 0. @@ -177,7 +177,7 @@ The following list shows the supported values: -

Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. +Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. @@ -225,11 +225,11 @@ The following list shows the supported values: -

Sets the local Bluetooth device name. +Sets the local Bluetooth device name. -

If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. +If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. -

If this policy is not set or it is deleted, the default local radio name is used. +If this policy is not set or it is deleted, the default local radio name is used. @@ -270,9 +270,9 @@ The following list shows the supported values: -

Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. +Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. -

The default value is an empty string. +The default value is an empty string. diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 990c0726eb..1a799e9db8 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -175,12 +175,12 @@ ms.date: 01/03/2018 -

Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  +Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  > [!NOTE] > Disabling this setting turns off the address bar drop-down functionality. Because search suggestions are shown in the drop-down list, this setting takes precedence over the Browser/AllowSearchSuggestionsinAddressBar setting. -

Most restricted value is 0. +Most restricted value is 0. @@ -229,11 +229,11 @@ The following list shows the supported values: -

Specifies whether autofill on websites is allowed. +Specifies whether autofill on websites is allowed. -

Most restricted value is 0. +Most restricted value is 0. -

To verify AllowAutofill is set to 0 (not allowed): +To verify AllowAutofill is set to 0 (not allowed): 1. Open Microsoft Edge. 2. In the upper-right corner of the browser, click **…**. @@ -291,11 +291,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. -

Specifies whether the browser is allowed on the device. +Specifies whether the browser is allowed on the device. -

Most restricted value is 0. +Most restricted value is 0. -

When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator. +When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator. @@ -344,16 +344,16 @@ The following list shows the supported values: -

Specifies whether cookies are allowed. +Specifies whether cookies are allowed. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

Most restricted value is 0. +Most restricted value is 0. -

To verify AllowCookies is set to 0 (not allowed): +To verify AllowCookies is set to 0 (not allowed): 1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. 2. In the upper-right corner of the browser, click **…**. @@ -404,9 +404,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools. +Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turning this setting on, or not configuring it, lets employees use F12 Developer Tools. Turning this setting off stops employees from using F12 Developer Tools. -

Most restricted value is 0. +Most restricted value is 0. @@ -455,11 +455,11 @@ The following list shows the supported values: -

Specifies whether Do Not Track headers are allowed. +Specifies whether Do Not Track headers are allowed. -

Most restricted value is 1. +Most restricted value is 1. -

To verify AllowDoNotTrack is set to 0 (not allowed): +To verify AllowDoNotTrack is set to 0 (not allowed): 1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. 2. In the upper-right corner of the browser, click **…**. @@ -513,7 +513,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. +Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. @@ -562,7 +562,7 @@ The following list shows the supported values: -

Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. +Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. @@ -611,7 +611,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. +Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. @@ -660,9 +660,9 @@ The following list shows the supported values: -

Specifies whether InPrivate browsing is allowed on corporate networks. +Specifies whether InPrivate browsing is allowed on corporate networks. -

Most restricted value is 0. +Most restricted value is 0. @@ -711,12 +711,12 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. +Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. By default, the Microsoft compatibility list is enabled and can be viewed by visiting "about:compat". -

If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the compatibility list from Microsoft, applying the updates during browser navigation. Visiting any site on the compatibility list prompts the employee to use Internet Explorer 11 (or enables/disables certain browser features on mobile), where the site is automatically rendered as though it’s run in the version of Internet Explorer necessary for it to display properly. If you disable this setting, the compatibility list isn’t used during browser navigation. +If you enable or don’t configure this setting, Microsoft Edge periodically downloads the latest version of the compatibility list from Microsoft, applying the updates during browser navigation. Visiting any site on the compatibility list prompts the employee to use Internet Explorer 11 (or enables/disables certain browser features on mobile), where the site is automatically rendered as though it’s run in the version of Internet Explorer necessary for it to display properly. If you disable this setting, the compatibility list isn’t used during browser navigation. -

Most restricted value is 0. +Most restricted value is 0. @@ -765,11 +765,11 @@ The following list shows the supported values: -

Specifies whether saving and managing passwords locally on the device is allowed. +Specifies whether saving and managing passwords locally on the device is allowed. -

Most restricted value is 0. +Most restricted value is 0. -

To verify AllowPasswordManager is set to 0 (not allowed): +To verify AllowPasswordManager is set to 0 (not allowed): 1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. 2. In the upper-right corner of the browser, click **…**. @@ -823,11 +823,11 @@ The following list shows the supported values: -

Specifies whether pop-up blocker is allowed or enabled. +Specifies whether pop-up blocker is allowed or enabled. -

Most restricted value is 1. +Most restricted value is 1. -

To verify AllowPopups is set to 0 (not allowed): +To verify AllowPopups is set to 0 (not allowed): 1. Open Microsoft Edge. 2. In the upper-right corner of the browser, click **…**. @@ -881,11 +881,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.  +Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.     -

If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).  +If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).  -

Most restricted value is 0. +Most restricted value is 0. @@ -934,9 +934,9 @@ The following list shows the supported values: -

Specifies whether search suggestions are allowed in the address bar. +Specifies whether search suggestions are allowed in the address bar. -

Most restricted value is 0. +Most restricted value is 0. @@ -985,11 +985,11 @@ The following list shows the supported values: -

Specifies whether Windows Defender SmartScreen is allowed. +Specifies whether Windows Defender SmartScreen is allowed. -

Most restricted value is 1. +Most restricted value is 1. -

To verify AllowSmartScreen is set to 0 (not allowed): +To verify AllowSmartScreen is set to 0 (not allowed): 1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. 2. In the upper-right corner of the browser, click **…**. @@ -1044,9 +1044,9 @@ The following list shows the supported values: -

-

Added in Windows 10, next majot update. Always show the Books Library in Microsoft Edge + +Added in Windows 10, next majot update. Always show the Books Library in Microsoft Edge @@ -1095,11 +1095,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. +Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. -

Most restricted value is 1. +Most restricted value is 1. -

To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): +To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): 1. Open Microsoft Edge and browse to websites. 2. Close the Microsoft Edge window. @@ -1152,22 +1152,22 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.  +Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.    -

If this policy is enabled, you can add up to 5 additional search engines for your employees. For each additional search engine you want to add, specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). +If this policy is enabled, you can add up to 5 additional search engines for your employees. For each additional search engine you want to add, specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). Employees cannot remove these search engines, but they can set any one as the default. This setting does not affect the default search engine.  -

If this setting is not configured, the search engines used are the ones that are specified in the App settings. If this setting is disabled, the search engines you added will be deleted from your employee's machine. +If this setting is not configured, the search engines used are the ones that are specified in the App settings. If this setting is disabled, the search engines you added will be deleted from your employee's machine.   > [!IMPORTANT] > Due to Protected Settings (aka.ms/browserpolicy), this setting will apply only on domain-joined machines or when the device is MDM-enrolled.  -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Additional search engines are not allowed. - 1 – Additional search engines are allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -1209,7 +1209,7 @@ Employees cannot remove these search engines, but they can set any one as the de -

Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.  +Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.     > [!NOTE] > This policy has no effect when the Browser/HomePages policy is not configured.  @@ -1217,7 +1217,7 @@ Employees cannot remove these search engines, but they can set any one as the de > [!IMPORTANT] > This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). -

Most restricted value is 0. +Most restricted value is 0. @@ -1328,9 +1328,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile.   -

Allows the user to specify an URL of an enterprise site list. +Allows the user to specify an URL of an enterprise site list. -

The following list shows the supported values: +The following list shows the supported values: - Not configured. The device checks for updates from Microsoft Update. - Set to a URL location of the enterprise site list. @@ -1422,11 +1422,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies the URL that Microsoft Edge for Windows 10 Mobile. will use when it is opened the first time. +Specifies the URL that Microsoft Edge for Windows 10 Mobile. will use when it is opened the first time. -

The data type is a string. +The data type is a string. -

The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. +The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. @@ -1471,11 +1471,11 @@ The following list shows the supported values: > [!NOTE] > This policy is only available for Windows 10 for desktop and not supported in Windows 10 Mobile. -

Specifies your Start pages for MDM-enrolled devices. Turning this setting on lets you configure one or more corporate Start pages. If this setting is turned on, you must also include URLs to the pages, separating multiple pages by using the XML-escaped characters **<** and **>**. For example, "<support.contoso.com><support.microsoft.com>" +Specifies your Start pages for MDM-enrolled devices. Turning this setting on lets you configure one or more corporate Start pages. If this setting is turned on, you must also include URLs to the pages, separating multiple pages by using the XML-escaped characters **<** and **>**. For example, "<support.contoso.com><support.microsoft.com>" -

Starting in Windows 10, version 1607, this policy will be enforced so that the Start pages specified by this policy cannot be changed by the users. +Starting in Windows 10, version 1607, this policy will be enforced so that the Start pages specified by this policy cannot be changed by the users. -

Starting in Windows 10, version 1703, if you don’t want to send traffic to Microsoft, you can use the "<about:blank>" value, which is honored for both domain- and non-domain-joined machines, when it’s the only configured URL.  +Starting in Windows 10, version 1703, if you don’t want to send traffic to Microsoft, you can use the "<about:blank>" value, which is honored for both domain- and non-domain-joined machines, when it’s the only configured URL.  > [!NOTE] > Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. @@ -1520,16 +1520,16 @@ The following list shows the supported values: -

Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. +Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. -

If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. +If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. > [!Important] > Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. -

If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. +If you disable or don't configure this setting (default), employees can add, import and make changes to the Favorites list. -

Data type is integer. +Data type is integer. @@ -1578,7 +1578,7 @@ The following list shows the supported values: -

Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. +Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. @@ -1627,9 +1627,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. +Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. -

Most restricted value is 1. +Most restricted value is 1. @@ -1678,9 +1678,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. +Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. -

Most restricted value is 1. +Most restricted value is 1. @@ -1729,9 +1729,9 @@ The following list shows the supported values: -

Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. +Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. -

Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site. +Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site. @@ -1780,7 +1780,7 @@ The following list shows the supported values: -

Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. +Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. @@ -1833,7 +1833,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an

user’s localhost IP address while making phone calls using WebRTC. +Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an user’s localhost IP address while making phone calls using WebRTC. @@ -1882,9 +1882,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines. +Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines.   -

URL can be specified as: +URL can be specified as: - HTTP location: "SiteList"="http://localhost:8080/URLs.html" - Local network: "SiteList"="\\network\shares\URLs.html" @@ -1893,9 +1893,9 @@ The following list shows the supported values: > [!Important] > Don't enable both this setting and the Keep favorites in sync between Internet Explorer and Microsoft Edge setting. Enabling both settings stops employees from syncing their favorites between Internet Explorer and Microsoft Edge. -

If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. +If you disable or don't configure this setting, employees will see the favorites they set in the Hub and Favorites Bar. -

Data type is string. +Data type is string. @@ -1941,9 +1941,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Specifies whether to send intranet traffic over to Internet Explorer. +Specifies whether to send intranet traffic over to Internet Explorer. -

Most restricted value is 0. +Most restricted value is 0. @@ -1992,21 +1992,21 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. +Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. -

You must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). If you want your employees to use the Microsoft Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; otherwise, if you want your employees to use Bing as the default search engine, set the string EDGEBING.  +You must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). If you want your employees to use the Microsoft Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; otherwise, if you want your employees to use Bing as the default search engine, set the string EDGEBING.    -

If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.    +If this setting is not configured, the default search engine is set to the one specified in App settings and can be changed by your employees. If this setting is disabled, the policy-set search engine will be removed, and, if it is the current default, the default will be set back to the factory Microsoft Edge search engine for the market.      > [!IMPORTANT] > This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) - The default search engine is set to the one specified in App settings. - 1 - Allows you to configure the default search engine for your employees. -

Most restricted value is 0. +Most restricted value is 0. @@ -2052,9 +2052,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Added in Windows 10, version 1607. Specifies whether users should see a full interstitial page in Microsoft Edge when opening sites that are configured to open in Internet Explorer using the Enterprise Site List. +Added in Windows 10, version 1607. Specifies whether users should see a full interstitial page in Microsoft Edge when opening sites that are configured to open in Internet Explorer using the Enterprise Site List. -

Most restricted value is 0. +Most restricted value is 0. @@ -2103,14 +2103,14 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. +Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. > > Enabling this setting stops Microsoft Edge favorites from syncing between connected Windows 10 devices. -

To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge: +To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge:

  1. Open Internet Explorer and add some favorites. diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index a6d562399b..54098f70c4 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -61,9 +61,9 @@ ms.date: 12/14/2017 -

    Disables or enables the camera. +Disables or enables the camera. -

    Most restricted value is 0. +Most restricted value is 0. diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 45755803ec..50cf068b2e 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -100,14 +100,14 @@ ms.date: 12/14/2017 -

    Allows the user to enable Bluetooth or restrict access. +Allows the user to enable Bluetooth or restrict access. > [!NOTE] >  This value is not supported in Windows Phone 8.1 MDM and EAS, Windows 10 for desktop, or Windows 10 Mobile. -

    If this is not set or it is deleted, the default value of 2 (Allow) is used. +If this is not set or it is deleted, the default value of 2 (Allow) is used. -

    Most restricted value is 0. +Most restricted value is 0. @@ -156,7 +156,7 @@ The following list shows the supported values: -

    Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. +Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. @@ -205,9 +205,9 @@ The following list shows the supported values: -

    Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. +Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. -

    Most restricted value is 0. +Most restricted value is 0. @@ -219,9 +219,9 @@ The following list shows the supported values: -

    To validate, the enterprise can confirm by observing the roaming enable switch in the UX. It will be inactive if the roaming policy is being enforced by the enterprise policy. +To validate, the enterprise can confirm by observing the roaming enable switch in the UX. It will be inactive if the roaming policy is being enforced by the enterprise policy. -

    To validate on mobile devices, do the following: +To validate on mobile devices, do the following: 1. Go to Cellular & SIM. 2. Click on the SIM (next to the signal strength icon) and select **Properties**. @@ -269,7 +269,7 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

    Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences. +Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences. @@ -321,9 +321,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

    Allows or disallows near field communication (NFC) on the device. +Allows or disallows near field communication (NFC) on the device. -

    Most restricted value is 0. +Most restricted value is 0. @@ -375,11 +375,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

    Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. +Enables USB connection between the device and a computer to sync files with the device or to use developer tools to deploy or debug applications. Changing this policy does not affect USB charging. -

    Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. +Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy is enforced. -

    Most restricted value is 0. +Most restricted value is 0. @@ -427,9 +427,9 @@ The following list shows the supported values: -

    Specifies what type of underlying connections VPN is allowed to use. +Specifies what type of underlying connections VPN is allowed to use. -

    Most restricted value is 0. +Most restricted value is 0. @@ -477,9 +477,9 @@ The following list shows the supported values: -

    Prevents the device from connecting to VPN when the device roams over cellular networks. +Prevents the device from connecting to VPN when the device roams over cellular networks. -

    Most restricted value is 0. +Most restricted value is 0. diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index e65cf59e9f..b8a7181d8e 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -64,9 +64,9 @@ ms.date: 11/01/2017 -

    Allows or disallows the Federal Information Processing Standard (FIPS) policy. +Allows or disallows the Federal Information Processing Standard (FIPS) policy. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not allowed. - 1– Allowed. @@ -110,7 +110,7 @@ ms.date: 11/01/2017 -

    Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. +Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index 5a2461e9cb..b0e270bdff 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -64,9 +64,9 @@ ms.date: 12/14/2017 -

    This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. +This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. -

    Most restricted value is 0. +Most restricted value is 0. @@ -118,7 +118,7 @@ The following list shows the supported values: > This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time.   -

    Setting used by Windows 8.1 Selective Wipe. +Setting used by Windows 8.1 Selective Wipe. > [!NOTE] > This policy is not recommended for use in Windows 10. diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index c261f2807f..bb91bd44bd 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -167,9 +167,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows scanning of archives. +Allows or disallows scanning of archives. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -217,9 +217,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop.   -

    Allows or disallows Windows Defender Behavior Monitoring functionality. +Allows or disallows Windows Defender Behavior Monitoring functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -267,9 +267,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    To best protect your PC, Windows Defender will send information to Microsoft about any problems it finds. Microsoft will analyze that information, learn more about problems affecting you and other customers, and offer improved solutions. +To best protect your PC, Windows Defender will send information to Microsoft about any problems it finds. Microsoft will analyze that information, learn more about problems affecting you and other customers, and offer improved solutions. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -317,9 +317,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows scanning of email. +Allows or disallows scanning of email. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. @@ -367,9 +367,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows a full scan of mapped network drives. +Allows or disallows a full scan of mapped network drives. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. @@ -417,9 +417,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows a full scan of removable drives. +Allows or disallows a full scan of removable drives. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -467,9 +467,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop.   -

    Allows or disallows Windows Defender IOAVP Protection functionality. +Allows or disallows Windows Defender IOAVP Protection functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -517,9 +517,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows Windows Defender Intrusion Prevention functionality. +Allows or disallows Windows Defender Intrusion Prevention functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -567,9 +567,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows Windows Defender On Access Protection functionality. +Allows or disallows Windows Defender On Access Protection functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -617,9 +617,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows Windows Defender Realtime Monitoring functionality. +Allows or disallows Windows Defender Realtime Monitoring functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -667,9 +667,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop.   -

    Allows or disallows a scanning of network files. +Allows or disallows a scanning of network files. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -717,9 +717,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows Windows Defender Script Scanning functionality. +Allows or disallows Windows Defender Script Scanning functionality. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -767,9 +767,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Allows or disallows user access to the Windows Defender UI. If disallowed, all Windows Defender notifications will also be suppressed. +Allows or disallows user access to the Windows Defender UI. If disallowed, all Windows Defender notifications will also be suppressed. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -817,9 +817,9 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe".. +Added in Windows 10, version 1709. This policy setting allows you to prevent Attack Surface reduction rules from matching on files under the paths specified or for the fully qualified resources specified. Paths should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a path or a fully qualified resource name. As an example, a path might be defined as: "c:\Windows" to exclude all files in this directory. A fully qualified resource name might be defined as: "C:\Windows\App.exe".. -

    Value type is string. +Value type is string. @@ -864,11 +864,11 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule. +Added in Windows 10, version 1709. This policy setting enables setting the state (Block/Audit/Off) for each Attack surface reduction (ASR) rule. Each ASR rule listed can be set to one of the following states (Block/Audit/Off). The ASR rule ID and state should be added under the Options for this setting. Each entry must be listed as a name value pair. The name defines a valid ASR rule ID, while the value contains the status ID indicating the status of the rule. -

    For more information about ASR rule ID and status ID, see [Enable Attack Surface Reduction](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction). +For more information about ASR rule ID and status ID, see [Enable Attack Surface Reduction](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/enable-attack-surface-reduction). -

    Value type is string. +Value type is string. @@ -913,11 +913,11 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop.   -

    Represents the average CPU load factor for the Windows Defender scan (in percent). +Represents the average CPU load factor for the Windows Defender scan (in percent). -

    Valid values: 0–100 +Valid values: 0–100 -

    The default value is 50. +The default value is 50. @@ -962,11 +962,11 @@ ms.date: 11/01/2017 > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1709. This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. +Added in Windows 10, version 1709. This policy setting determines how aggressive Windows Defender Antivirus will be in blocking and scanning suspicious files. Value type is integer. -

    If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. +If this setting is on, Windows Defender Antivirus will be more aggressive when identifying suspicious files to block and scan; otherwise, it will be less aggressive and therefore block and scan with less frequency. -

    For more information about specific values that are supported, see the Windows Defender Antivirus documentation site. +For more information about specific values that are supported, see the Windows Defender Antivirus documentation site.       > [!Note] > This feature requires the "Join Microsoft MAPS" setting enabled in order to function. @@ -1022,11 +1022,11 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1709. This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. +Added in Windows 10, version 1709. This feature allows Windows Defender Antivirus to block a suspicious file for up to 60 seconds, and scan it in the cloud to make sure it's safe. Value type is integer, range is 0 - 50. -

    The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. +The typical cloud check timeout is 10 seconds. To enable the extended cloud check feature, specify the extended time in seconds, up to an additional 50 seconds. -

    For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds. +For example, if the desired timeout is 60 seconds, specify 50 seconds in this setting, which will enable the extended cloud check feature, and will raise the total time to 60 seconds. > [!Note] > This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". @@ -1073,7 +1073,7 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersAllowedApplications and changed to ControlledFolderAccessAllowedApplications. -

    Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the | as the substring separator. +Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the | as the substring separator. @@ -1117,7 +1117,7 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersList and changed to ControlledFolderAccessProtectedFolders. -

    Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the | as the substring separator. +Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the | as the substring separator. @@ -1162,11 +1162,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Time period (in days) that quarantine items will be stored on the system. +Time period (in days) that quarantine items will be stored on the system. -

    Valid values: 0–90 +Valid values: 0–90 -

    The default value is 0, which keeps items in quarantine, and does not automatically remove them. +The default value is 0, which keeps items in quarantine, and does not automatically remove them. @@ -1210,7 +1210,7 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess. -

    Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. +Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. @@ -1262,21 +1262,23 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1709. This policy allows you to turn network protection on (block/audit) or off in Windows Defender Exploit Guard. Network protection is a feature of Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Value type is integer. +Added in Windows 10, version 1709. This policy allows you to turn network protection on (block/audit) or off in Windows Defender Exploit Guard. Network protection is a feature of Windows Defender Exploit Guard that protects employees using any app from accessing phishing scams, exploit-hosting sites, and malicious content on the Internet. This includes preventing third-party browsers from connecting to dangerous sites. Value type is integer. -

    If you enable this setting, network protection is turned on and employees can't turn it off. Its behavior can be controlled by the following options: Block and Audit. -

    If you enable this policy with the ""Block"" option, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center. -

    If you enable this policy with the ""Audit"" option, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Windows Defender Security Center. -

    If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. -

    If you do not configure this policy, network blocking will be disabled by default. +If you enable this setting, network protection is turned on and employees can't turn it off. Its behavior can be controlled by the following options: Block and Audit. +If you enable this policy with the ""Block"" option, users/apps will be blocked from connecting to dangerous domains. You will be able to see this activity in Windows Defender Security Center. +If you enable this policy with the ""Audit"" option, users/apps will not be blocked from connecting to dangerous domains. However, you will still see this activity in Windows Defender Security Center. +If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. +If you do not configure this policy, network blocking will be disabled by default. -

    Valid values: + + +The following list shows the supported values: - 0 (default) - Disabled - 1 - Enabled (block mode) - 2 - Enabled (audit mode) - +


    @@ -1319,7 +1321,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". +Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". @@ -1364,7 +1366,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". +Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". @@ -1409,13 +1411,13 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Allows an administrator to specify a list of files opened by processes to ignore during a scan. +Allows an administrator to specify a list of files opened by processes to ignore during a scan. > [!IMPORTANT] > The process itself is not excluded from the scan, but can be by using the **Defender/ExcludedPaths** policy to exclude its path.   -

    Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". +Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". @@ -1460,9 +1462,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Added in Windows 10, version 1607. Specifies the level of detection for potentially unwanted applications (PUAs). Windows Defender alerts you when potentially unwanted software is being downloaded or attempts to install itself on your computer. +Added in Windows 10, version 1607. Specifies the level of detection for potentially unwanted applications (PUAs). Windows Defender alerts you when potentially unwanted software is being downloaded or attempts to install itself on your computer. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – PUA Protection off. Windows Defender will not protect against potentially unwanted applications. - 1 – PUA Protection on. Detected items are blocked. They will show in history along with other threats. @@ -1511,13 +1513,13 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Controls which sets of files should be monitored. +Controls which sets of files should be monitored. > [!NOTE] > If **AllowOnAccessProtection** is not allowed, then this configuration can be used to monitor specific files. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Monitor all files (bi-directional). - 1 – Monitor incoming files. @@ -1566,9 +1568,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Selects whether to perform a quick scan or full scan. +Selects whether to perform a quick scan or full scan. -

    The following list shows the supported values: +The following list shows the supported values: - 1 (default) – Quick scan - 2 – Full scan @@ -1616,17 +1618,17 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Selects the time of day that the Windows Defender quick scan should run. +Selects the time of day that the Windows Defender quick scan should run. > [!NOTE] > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting.   -

    Valid values: 0–1380 +Valid values: 0–1380 -

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. +For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. -

    The default value is 120 +The default value is 120 @@ -1671,13 +1673,13 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Selects the day that the Windows Defender scan should run. +Selects the day that the Windows Defender scan should run. > [!NOTE] > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Every day - 1 – Monday @@ -1732,17 +1734,17 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop. -

    Selects the time of day that the Windows Defender scan should run. +Selects the time of day that the Windows Defender scan should run. > [!NOTE] > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. -

    Valid values: 0–1380. +Valid values: 0–1380. -

    For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. +For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. -

    The default value is 120. +The default value is 120. @@ -1787,13 +1789,13 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Specifies the interval (in hours) that will be used to check for signatures, so instead of using the ScheduleDay and ScheduleTime the check for new signatures will be set according to the interval. +Specifies the interval (in hours) that will be used to check for signatures, so instead of using the ScheduleDay and ScheduleTime the check for new signatures will be set according to the interval. -

    Valid values: 0–24. +Valid values: 0–24. -

    A value of 0 means no check for new signatures, a value of 1 means to check every hour, a value of 2 means to check every two hours, and so on, up to a value of 24, which means to check every day. +A value of 0 means no check for new signatures, a value of 1 means to check every hour, a value of 2 means to check every two hours, and so on, up to a value of 24, which means to check every day. -

    The default value is 8. +The default value is 8. @@ -1838,9 +1840,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Checks for the user consent level in Windows Defender to send data. If the required consent has already been granted, Windows Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when **Defender/AllowCloudProtection** is allowed) before sending data. +Checks for the user consent level in Windows Defender to send data. If the required consent has already been granted, Windows Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when **Defender/AllowCloudProtection** is allowed) before sending data. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Always prompt. - 1 (default) – Send safe samples automatically. @@ -1890,18 +1892,18 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop.   -

    Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take. +Allows an administrator to specify any valid threat severity levels and the corresponding default action ID to take. -

    This value is a list of threat severity level IDs and corresponding actions, separated by a**|** using the format "*threat level*=*action*|*threat level*=*action*". For example "1=6|2=2|4=10|5=3 +This value is a list of threat severity level IDs and corresponding actions, separated by a**|** using the format "*threat level*=*action*|*threat level*=*action*". For example "1=6|2=2|4=10|5=3 -

    The following list shows the supported values for threat severity levels: +The following list shows the supported values for threat severity levels: - 1 – Low severity threats - 2 – Moderate severity threats - 4 – High severity threats - 5 – Severe threats -

    The following list shows the supported values for possible actions: +The following list shows the supported values for possible actions: - 1 – Clean - 2 – Quarantine diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index c369584fc8..812d07ecac 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -136,9 +136,9 @@ ms.date: 01/03/2018 > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery Optimization cache. This policy overrides the DOMaxCacheSize policy. The value 0 (zero) means "unlimited" cache. Delivery Optimization will clear the cache when the device is running low on disk space. +Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery Optimization cache. This policy overrides the DOMaxCacheSize policy. The value 0 (zero) means "unlimited" cache. Delivery Optimization will clear the cache when the device is running low on disk space. -

    The default value is 10. +The default value is 10. @@ -183,7 +183,7 @@ ms.date: 01/03/2018 > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network. +Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network. @@ -347,7 +347,7 @@ The following list shows the supported values as number of seconds: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. +Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. @@ -403,7 +403,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    This Policy specifies an arbitrary group ID that the device belongs to. Use this if you need to create a single group for Local Network Peering for branches that are on different domains or are not on the same LAN. Note that this is a best effort optimization and should not be relied on for an authentication of identity. +This Policy specifies an arbitrary group ID that the device belongs to. Use this if you need to create a single group for Local Network Peering for branches that are on different domains or are not on the same LAN. Note that this is a best effort optimization and should not be relied on for an authentication of identity. > [!NOTE] > You must use a GUID as the group ID. @@ -514,9 +514,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means "unlimited"; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size has not exceeded. The value 0 is new in Windows 10, version 1607. +Specifies the maximum time in seconds that each file is held in the Delivery Optimization cache after downloading successfully. The value 0 (zero) means "unlimited"; Delivery Optimization will hold the files in the cache longer and make the files available for uploads to other devices, as long as the cache size has not exceeded. The value 0 is new in Windows 10, version 1607. -

    The default value is 259200 seconds (3 days). +The default value is 259200 seconds (3 days). @@ -561,9 +561,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile.   -

    Specifies the maximum cache size that Delivery Optimization can utilize, as a percentage of disk size (1-100). +Specifies the maximum cache size that Delivery Optimization can utilize, as a percentage of disk size (1-100). -

    The default value is 20. +The default value is 20. @@ -608,9 +608,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile.   -

    Added in Windows 10, version 1607. Specifies the maximum download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. +Added in Windows 10, version 1607. Specifies the maximum download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. -

    The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. +The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. @@ -655,9 +655,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile.   -

    Specifies the maximum upload bandwidth in KiloBytes/second that a device will use across all concurrent upload activity using Delivery Optimization. +Specifies the maximum upload bandwidth in KiloBytes/second that a device will use across all concurrent upload activity using Delivery Optimization. -

    The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). +The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). @@ -702,9 +702,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/sec for background downloads. This policy affects the blending of peer and HTTP sources. Delivery Optimization complements the download from the HTTP source to achieve the minimum QoS value set. +Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality of Service or speed) in KiloBytes/sec for background downloads. This policy affects the blending of peer and HTTP sources. Delivery Optimization complements the download from the HTTP source to achieve the minimum QoS value set. -

    The default value is 500. +The default value is 500. @@ -748,9 +748,9 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in percentage) to allow the device to upload data to LAN and Group peers while on battery power. Uploads will automatically pause when the battery level drops below the set minimum battery level. The recommended value to set is 40 (for 40%) if you allow uploads on battery. +Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in percentage) to allow the device to upload data to LAN and Group peers while on battery power. Uploads will automatically pause when the battery level drops below the set minimum battery level. The recommended value to set is 40 (for 40%) if you allow uploads on battery. -

    The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. +The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. @@ -795,12 +795,12 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. Recommended values: 64 GB to 256 GB. +Added in Windows 10, version 1703. Specifies the required minimum disk size (capacity in GB) for the device to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. Recommended values: 64 GB to 256 GB. > [!NOTE] > If the DOMofidyCacheDrive policy is set, the disk size check will apply to the new working directory specified by this policy. -

    The default value is 32 GB. +The default value is 32 GB. @@ -845,9 +845,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. The value 0 means "unlimited" which means the cloud service set default value will be used. Recommended values: 1 MB to 100,000 MB. +Added in Windows 10, version 1703. Specifies the minimum content file size in MB enabled to use Peer Caching. The value 0 means "unlimited" which means the cloud service set default value will be used. Recommended values: 1 MB to 100,000 MB. -

    The default value is 100 MB. +The default value is 100 MB. @@ -892,9 +892,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. For example if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. +Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required to use Peer Caching. The value 0 means "not-limited" which means the cloud service set default value will be used. For example if the minimum set is 1 GB, then devices with 1 GB or higher available RAM will be allowed to use Peer caching. Recommended values: 1 GB to 4 GB. -

    The default value is 4 GB. +The default value is 4 GB. @@ -939,9 +939,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1607. Specifies the drive that Delivery Optimization should use for its cache. The drive location can be specified using environment variables, drive letter or using a full path. +Added in Windows 10, version 1607. Specifies the drive that Delivery Optimization should use for its cache. The drive location can be specified using environment variables, drive letter or using a full path. -

    By default, %SystemDrive% is used to store the cache. +By default, %SystemDrive% is used to store the cache. @@ -986,11 +986,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. -

    Added in Windows 10, version 1607. Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. +Added in Windows 10, version 1607. Specifies the maximum total bytes in GB that Delivery Optimization is allowed to upload to Internet peers in each calendar month. -

    The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is set. +The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is set. -

    The default value is 20. +The default value is 20. diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index 4023eee26c..4b9ab87704 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -68,7 +68,7 @@ ms.date: 12/14/2017   -

    Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. +Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. @@ -117,7 +117,7 @@ The following list shows the supported values:   -

    Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. +Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. @@ -168,7 +168,7 @@ The following list shows the supported values: Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer.   -

    + diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index b056313e5a..9d4a67b93c 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -115,7 +115,7 @@ ms.date: 01/12/2018 > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   -

    Specifies whether the user must input a PIN or password when the device resumes from an idle state. +Specifies whether the user must input a PIN or password when the device resumes from an idle state. > [!NOTE] > This policy must be wrapped in an Atomic command. @@ -170,13 +170,13 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   -

    Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. +Specifies whether to show a user-configurable setting to control the screen timeout while on the lock screen of Windows 10 Mobile devices. > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. @@ -223,18 +223,18 @@ The following list shows the supported values: -

    Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For the desktop, it also controls the use of picture passwords. +Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For the desktop, it also controls the use of picture passwords. > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). @@ -275,7 +275,7 @@ The following list shows the supported values: -

    Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). +Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). > [!NOTE] > This policy must be wrapped in an Atomic command. @@ -283,7 +283,7 @@ The following list shows the supported values: > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions (Home, Pro, Enterprise, and Education). -

    The following list shows the supported values: +The following list shows the supported values: - 0 – Alphanumeric PIN or password required. - 1 – Numeric PIN or password required. @@ -335,7 +335,7 @@ The following list shows the supported values: -

    Specifies whether device lock is enabled. +Specifies whether device lock is enabled. > [!NOTE] > This policy must be wrapped in an Atomic command. @@ -343,7 +343,7 @@ The following list shows the supported values: > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions.   -

    The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Enabled - 1 – Disabled @@ -421,20 +421,20 @@ The following list shows the supported values: -

    Specifies when the password expires (in days). +Specifies when the password expires (in days). > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - An integer X where 0 <= X <= 730. - 0 (default) - Passwords do not expire. -

    If all policy values = 0 then 0; otherwise, Min policy value is the most secure value. +If all policy values = 0 then 0; otherwise, Min policy value is the most secure value. -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). @@ -475,22 +475,22 @@ The following list shows the supported values: -

    Specifies how many passwords can be stored in the history that can’t be used. +Specifies how many passwords can be stored in the history that can’t be used. > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - An integer X where 0 <= X <= 50. - 0 (default) -

    The value includes the user's current password. This means that with a setting of 1 the user cannot reuse their current password when choosing a new password, while a setting of 5 means that a user cannot set their new password to their current password or any of their previous four passwords. +The value includes the user's current password. This means that with a setting of 1 the user cannot reuse their current password when choosing a new password, while a setting of 5 means that a user cannot set their new password to their current password or any of their previous four passwords. -

    Max policy value is the most restricted. +Max policy value is the most restricted. -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). @@ -531,13 +531,13 @@ The following list shows the supported values: -

    Added in Windows 10, version 1607. Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. +Added in Windows 10, version 1607. Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. > [!NOTE] > This policy is only enforced in Windows 10 Enterprise and Education editions and not supported in Windows 10 Home and Pro. -

    Value type is a string, which is the full image filepath and filename. +Value type is a string, which is the full image filepath and filename. @@ -578,13 +578,13 @@ The following list shows the supported values: -

    Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider. +Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider. > [!NOTE] > This policy is only enforced in Windows 10 for mobile devices. -

    Value type is a string, which is the AppID. +Value type is a string, which is the AppID. @@ -631,21 +631,21 @@ The number of authentication failures allowed before the device will be wiped. A > This policy must be wrapped in an Atomic command. -

    This policy has different behaviors on the mobile device and desktop. +This policy has different behaviors on the mobile device and desktop. - On a mobile device, when the user reaches the value set by this policy, then the device is wiped. - On a desktop, when the user reaches the value set by this policy, it is not wiped. Instead, the desktop is put on BitLocker recovery mode, which makes the data inaccessible but recoverable. If BitLocker is not enabled, then the policy cannot be enforced. Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. -

    The following list shows the supported values: +The following list shows the supported values: - An integer X where 4 <= X <= 16 for desktop and 0 <= X <= 999 for mobile devices. - 0 (default) - The device is never wiped after an incorrect PIN or password is entered. -

    Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. +Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). @@ -686,18 +686,18 @@ The number of authentication failures allowed before the device will be wiped. A -

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app. Note the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy. +Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app. Note the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy. > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - An integer X where 0 <= X <= 999. - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." -

    For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). @@ -738,13 +738,13 @@ The number of authentication failures allowed before the device will be wiped. A -

    Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display. +Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display. > [!NOTE] > This policy must be wrapped in an Atomic command. -

    The following list shows the supported values: +The following list shows the supported values: - An integer X where 0 <= X <= 999. - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." @@ -788,21 +788,21 @@ The number of authentication failures allowed before the device will be wiped. A -

    The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. +The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. > [!NOTE] > This policy must be wrapped in an Atomic command. > > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. -

    PIN enforces the following behavior for desktop and mobile devices: +PIN enforces the following behavior for desktop and mobile devices: - 1 - Digits only - 2 - Digits and lowercase letters are required - 3 - Digits, lowercase letters, and uppercase letters are required. Not supported in desktop Microsoft accounts and domain accounts. - 4 - Digits, lowercase letters, uppercase letters, and special characters are required. Not supported in desktop. -

    The default value is 1. The following list shows the supported values and actual enforced values: +The default value is 1. The following list shows the supported values and actual enforced values:

@@ -843,7 +843,7 @@ The number of authentication failures allowed before the device will be wiped. A
-

Enforced values for Local and Microsoft Accounts: +Enforced values for Local and Microsoft Accounts: - Local accounts support values of 1, 2, and 3, however they always enforce a value of 3. - Passwords for local accounts must meet the following minimum requirements: @@ -857,9 +857,9 @@ The number of authentication failures allowed before the device will be wiped. A - Base 10 digits (0 through 9) - Special characters (!, $, \#, %, etc.) -

The enforcement of policies for Microsoft accounts happen on the server, and the server requires a password length of 8 and a complexity of 2. A complexity value of 3 or 4 is unsupported and setting this value on the server makes Microsoft accounts non-compliant. +The enforcement of policies for Microsoft accounts happen on the server, and the server requires a password length of 8 and a complexity of 2. A complexity value of 3 or 4 is unsupported and setting this value on the server makes Microsoft accounts non-compliant. -

For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). @@ -900,7 +900,7 @@ The number of authentication failures allowed before the device will be wiped. A -

Specifies the minimum number or characters required in the PIN or password. +Specifies the minimum number or characters required in the PIN or password. > [!NOTE] > This policy must be wrapped in an Atomic command. @@ -908,15 +908,15 @@ The number of authentication failures allowed before the device will be wiped. A > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. -

The following list shows the supported values: +The following list shows the supported values: - An integer X where 4 <= X <= 16 for mobile devices and desktop. However, local accounts will always enforce a minimum password length of 6. - Not enforced. - The default value is 4 for mobile devices and desktop devices. -

Max policy value is the most restricted. +Max policy value is the most restricted. -

For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). @@ -1074,15 +1074,15 @@ ADMX Info: > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   -

Allows an enterprise to set the duration in seconds for the screen timeout while on the lock screen of Windows 10 Mobile devices. +Allows an enterprise to set the duration in seconds for the screen timeout while on the lock screen of Windows 10 Mobile devices. -

Minimum supported value is 10. +Minimum supported value is 10. -

Maximum supported value is 1800. +Maximum supported value is 1800. -

The default value is 10. +The default value is 10. -

Most restricted value is 0. +Most restricted value is 0. diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index b23977c0bc..2f510c687c 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -64,17 +64,17 @@ ms.date: 11/01/2017 -

GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. +GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. -

This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. +This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. -

If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they are enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. +If you enable this policy setting, GDI DPI Scaling is turned off for all applications in the list, even if they are enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. -

If you disable or do not configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. +If you disable or do not configure this policy setting, GDI DPI Scaling might still be turned on for legacy applications. -

If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. +If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms. 2. Run the app and observe blurry text. @@ -118,17 +118,17 @@ ms.date: 11/01/2017 -

GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. +GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. -

This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. +This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. -

If you enable this policy setting, GDI DPI Scaling is turned on for all legacy applications in the list. +If you enable this policy setting, GDI DPI Scaling is turned on for all legacy applications in the list. -

If you disable or do not configure this policy setting, GDI DPI Scaling will not be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. +If you disable or do not configure this policy setting, GDI DPI Scaling will not be enabled for an application except when an application is enabled by using ApplicationCompatibility database, ApplicationCompatibility UI System (Enhanced) setting, or an application manifest. -

If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. +If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Configure the setting for an app which uses GDI. 2. Run the app and observe crisp text. diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 3506a2c3f1..a53e00425b 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -76,11 +76,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Specifies the authentication endpoint for acquiring OAuth tokens. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Specifies the authentication endpoint for acquiring OAuth tokens. This policy must target ./User, otherwise it fails. -

The datatype is a string. +The datatype is a string. -

The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". +The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". @@ -121,11 +121,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Specifies the GUID of a client application authorized to retrieve OAuth tokens from the OAuthAuthority. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Specifies the GUID of a client application authorized to retrieve OAuth tokens from the OAuthAuthority. This policy must target ./User, otherwise it fails. -

The datatype is a string. +The datatype is a string. -

The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". +The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". @@ -166,11 +166,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the enterprise cloud print client during OAuth authentication. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the enterprise cloud print client during OAuth authentication. This policy must target ./User, otherwise it fails. -

The datatype is a string. +The datatype is a string. -

The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". +The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". @@ -211,11 +211,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Specifies the per-user end point for discovering cloud printers. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Specifies the per-user end point for discovering cloud printers. This policy must target ./User, otherwise it fails. -

The datatype is a string. +The datatype is a string. -

The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". +The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". @@ -256,11 +256,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Defines the maximum number of printers that should be queried from a discovery end point. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Defines the maximum number of printers that should be queried from a discovery end point. This policy must target ./User, otherwise it fails. -

The datatype is an integer. +The datatype is an integer. -

For Windows Mobile, the default value is 20. +For Windows Mobile, the default value is 20. @@ -301,11 +301,11 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the Mopria discovery client during OAuth authentication. This policy must target ./User, otherwise it fails. +Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the Mopria discovery client during OAuth authentication. This policy must target ./User, otherwise it fails. -

The datatype is a string. +The datatype is a string. -

The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". +The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 8d3786e647..cb04d76f6a 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -126,9 +126,9 @@ ms.date: 12/19/2017 > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether copy and paste is allowed. +Specifies whether copy and paste is allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -176,9 +176,9 @@ The following list shows the supported values: -

Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device. +Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device. -

Most restricted value is 0. +Most restricted value is 0. @@ -226,11 +226,11 @@ The following list shows the supported values: -

Allows users to turn on/off device discovery UX. +Allows users to turn on/off device discovery UX. -

When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. +When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. -

Most restricted value is 0. +Most restricted value is 0. @@ -278,11 +278,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy turns on Find My Device. +Added in Windows 10, version 1703. This policy turns on Find My Device. -

When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. In Windows 10, version 1709 devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer. +When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. In Windows 10, version 1709 devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer. -

When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work. In Windows 10, version 1709 the user will not be able to view the location of the last use of their active digitizer on their device. +When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work. In Windows 10, version 1709 the user will not be able to view the location of the last use of their active digitizer on their device. @@ -330,13 +330,13 @@ The following list shows the supported values: -

Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory joined and MDM enrolled (e.g. auto-enrolled), which is majority of the case for Intune, then disabling the MDM unenrollment has no effect. +Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory joined and MDM enrolled (e.g. auto-enrolled), which is majority of the case for Intune, then disabling the MDM unenrollment has no effect. > [!NOTE] > The MDM server can always remotely delete the account. -

Most restricted value is 0. +Most restricted value is 0. @@ -388,7 +388,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether to display dialog prompt when no SIM card is detected. +Specifies whether to display dialog prompt when no SIM card is detected. @@ -448,9 +448,9 @@ This policy is deprecated. > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether screen capture is allowed. +Specifies whether screen capture is allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -506,7 +506,7 @@ This policy is deprecated. -

Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices). +Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices). @@ -557,13 +557,13 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Added in Windows 10, version 1703. This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. +Added in Windows 10, version 1703. This policy allows you to prevent Windows from using diagnostic data to provide customized experiences to the user. If you enable this policy setting, Windows will not use diagnostic data from this device to customize content shown on the lock screen, Windows tips, Microsoft consumer features, or other related features. If these features are enabled, users will still see recommendations, tips and offers, but they may be less relevant. If you disable or do not configure this policy setting, Microsoft will use diagnostic data to provide personalized recommendations, tips, and offers to tailor Windows for the user's needs and make it work better for them. -

Diagnostic data can include browser, app and feature usage, depending on the "Diagnostic and usage data" setting value. +Diagnostic data can include browser, app and feature usage, depending on the "Diagnostic and usage data" setting value. > **Note** This setting does not control Cortana cutomized experiences because there are separate policies to configure it. -

Most restricted value is 0. +Most restricted value is 0. @@ -615,7 +615,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Allows or disallows task switching on the device. +Allows or disallows task switching on the device. @@ -667,7 +667,7 @@ The following list shows the supported values: > This policy is only available for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. -

Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services. +Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services. @@ -719,9 +719,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether voice recording is allowed for apps. +Specifies whether voice recording is allowed for apps. -

Most restricted value is 0. +Most restricted value is 0. @@ -773,9 +773,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles. +This policy allows IT admins to turn on experiences that are typically for consumers only, such as Start suggestions, Membership notifications, Post-OOBE app install and redirect tiles. -

Most restricted value is 0. +Most restricted value is 0. @@ -827,9 +827,9 @@ The following list shows the supported values: > This policy is only available for Windows 10 Enterprise and Windows 10 Education. -

Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. +Specifies whether to turn off all Windows spotlight features at once. If you enable this policy setting, Windows spotlight on lock screen, Windows Tips, Microsoft consumer features and other related features will be turned off. You should enable this policy setting if your goal is to minimize network traffic from target devices. If you disable or do not configure this policy setting, Windows spotlight features are allowed and may be controlled individually using their corresponding policy settings. -

Most restricted value is 0. +Most restricted value is 0. @@ -880,9 +880,9 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Added in Windows 10, version 1703. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. +Added in Windows 10, version 1703. This policy allows administrators to prevent Windows spotlight notifications from being displayed in the Action Center. If you enable this policy, Windows spotlight notifications will no longer be displayed in the Action Center. If you disable or do not configure this policy, Microsoft may display notifications in the Action Center that will suggest apps or features to help users be more productive on Windows. -

Most restricted value is 0. +Most restricted value is 0. @@ -933,10 +933,10 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Added in Windows 10, version 1703. This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. +Added in Windows 10, version 1703. This policy setting lets you turn off the Windows spotlight Windows welcome experience feature. The Windows welcome experience feature introduces onboard users to Windows; for example, launching Microsoft Edge with a webpage that highlights new features. If you enable this policy, the Windows welcome experience will no longer be displayed when there are updates and changes to Windows and its apps. If you disable or do not configure this policy, the Windows welcome experience will be launched to inform onboard users about what's new, changed, and suggested. -

Most restricted value is 0. +Most restricted value is 0. @@ -1036,9 +1036,9 @@ The following list shows the supported values: > This policy is only available for Windows 10 Enterprise and Windows 10 Education. -

Allows IT admins to specify whether spotlight should be used on the user's lock screen. If your organization does not have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1. +Allows IT admins to specify whether spotlight should be used on the user's lock screen. If your organization does not have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1. -

The following list shows the supported values: +The following list shows the supported values: - 0 – None. - 1 (default) – Windows spotlight enabled. @@ -1083,13 +1083,13 @@ The following list shows the supported values: -

Prevents devices from showing feedback questions from Microsoft. +Prevents devices from showing feedback questions from Microsoft. -

If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or do not configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback. +If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or do not configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback. -

If you disable or do not configure this policy setting, users can control how often they receive feedback questions. +If you disable or do not configure this policy setting, users can control how often they receive feedback questions. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. - 1 – Feedback notifications are disabled. diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index e165e843f7..7c42eba692 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -61,11 +61,11 @@ ms.date: 11/01/2017 -

Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Protect devices from exploits with Windows Defender Exploit Guard](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard) and [Import, export, and deploy Exploit Protection configurations](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml). +Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Protect devices from exploits with Windows Defender Exploit Guard](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard) and [Import, export, and deploy Exploit Protection configurations](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml). -

The system settings require a reboot; the application settings do not require a reboot. +The system settings require a reboot; the application settings do not require a reboot. -

Here is an example: +Here is an example: ``` syntax diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index 17be10dc9d..86a2dccbac 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -61,7 +61,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1709. Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. Value type is integer. +Added in Windows 10, version 1709. Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. Value type is integer. diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 3ca3c0d2bd..6806de6ebf 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -61,13 +61,13 @@ ms.date: 12/14/2017 -

Added in Windows 10. version 1709. This policy allows an enterprise to configure the default mode for the handwriting panel. +Added in Windows 10. version 1709. This policy allows an enterprise to configure the default mode for the handwriting panel. -

The handwriting panel has 2 modes - floats near the text box, or docked to the bottom of the screen. The default configuration to is floating near text box. If you want the panel to be fixed or docked, use this policy to fix it to the bottom of the screen. +The handwriting panel has 2 modes - floats near the text box, or docked to the bottom of the screen. The default configuration to is floating near text box. If you want the panel to be fixed or docked, use this policy to fix it to the bottom of the screen. -

In floating mode, the content is hidden behind a flying-in panel and results in end-user dissatisfaction. The end-user will need to drag the flying-in panel to see the rest of the content. In the fixed mode, the flying-in panel is fixed to the bottom of the screen and does not require any user interaction. +In floating mode, the content is hidden behind a flying-in panel and results in end-user dissatisfaction. The end-user will need to drag the flying-in panel to see the rest of the content. In the fixed mode, the flying-in panel is fixed to the bottom of the screen and does not require any user interaction. -

The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way. +The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way. diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 64f7550a15..58a2418bf7 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -64,7 +64,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices. +Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices. @@ -112,7 +112,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. +Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index 9c979b9d53..bc22abef7f 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -61,17 +61,17 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1703. Optional policy that allows for IT admin to preconfigure whether or not Location Service's Device Switch is enabled or disabled for the device. Setting this policy is not required for Location Services to function. This policy controls a device wide state that affects all users, apps, and services ability to find the device's latitude and longitude on a map. There is a separate user switch that defines whether the location service is allowed to retrieve a position for the current user. In order to retrieve a position for a specific user, both the Device Switch and the User Switch must be enabled. If either is disabled, positions cannot be retrieved for the user. The user can later change both the User Switch and the Device Switch through the user interface on the Settings -> Privacy -> Location page. +Added in Windows 10, version 1703. Optional policy that allows for IT admin to preconfigure whether or not Location Service's Device Switch is enabled or disabled for the device. Setting this policy is not required for Location Services to function. This policy controls a device wide state that affects all users, apps, and services ability to find the device's latitude and longitude on a map. There is a separate user switch that defines whether the location service is allowed to retrieve a position for the current user. In order to retrieve a position for a specific user, both the Device Switch and the User Switch must be enabled. If either is disabled, positions cannot be retrieved for the user. The user can later change both the User Switch and the Device Switch through the user interface on the Settings -> Privacy -> Location page. > [!IMPORTANT] > This policy is not intended to ever be set, pushed, or refreshed more than one time after the first boot of the device because it is meant as initial configuration. Refreshing this policy might result in the Location Service's Device Switch changing state to something the user did not select, which is not an intended use for this policy. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Disabled. - 1 – Enabled. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Verify that Settings -> Privacy -> Location -> Location for this device is On/Off as expected. 2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index 8db727d554..af9df333ee 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -61,9 +61,9 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch. +Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch. -

The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled. +The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled. diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index aca34d8a1b..06b6844b22 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -64,9 +64,9 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1607. Allows the download and update of map data over metered connections. +Added in Windows 10, version 1607. Allows the download and update of map data over metered connections. -

After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. +After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. @@ -115,9 +115,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Disables the automatic download and update of map data. +Added in Windows 10, version 1607. Disables the automatic download and update of map data. -

After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. +After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index 4d41080dfa..aa1c3698b6 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -70,9 +70,9 @@ ms.date: 11/01/2017 > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement. +Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement. -

The following list shows the supported values: +The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. @@ -116,9 +116,9 @@ ms.date: 11/01/2017 -

Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. +Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. -

The following list shows the supported values: +The following list shows the supported values: - 0 - message sync is not allowed and cannot be changed by the user. - 1 - message sync is allowed. The user can change this setting. @@ -165,9 +165,9 @@ ms.date: 11/01/2017 > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement. +Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement. -

The following list shows the supported values: +The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index c15086a614..341511e93c 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -82,7 +82,7 @@ ms.date: 11/01/2017 -

Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. +Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. @@ -123,7 +123,7 @@ ms.date: 11/01/2017 -

Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of IPv4 and IPv6 ranges. +Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of IPv4 and IPv6 ranges. @@ -177,7 +177,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. +Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. @@ -218,7 +218,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. +This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. @@ -259,13 +259,13 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example "contoso.sharepoint.com, Fabrikam.com". +This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example "contoso.sharepoint.com, Fabrikam.com". > [!NOTE] > The client requires domain name to be canonical, otherwise the setting will be rejected by the client.   -

Here are the steps to create canonical domain names: +Here are the steps to create canonical domain names: 1. Transform the ASCII characters (A-Z only) to lower case. For example, Microsoft.COM -> microsoft.com. 2. Call [IdnToAscii](https://msdn.microsoft.com/library/windows/desktop/dd318149.aspx) with IDN\_USE\_STD3\_ASCII\_RULES as the flags. @@ -310,7 +310,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". +This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". @@ -351,7 +351,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. +Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. @@ -392,7 +392,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -

List of domain names that can used for work or personal resource. +List of domain names that can used for work or personal resource. diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index 1aaec21713..f5d74704a5 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -61,11 +61,11 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1607. Boolean value that turns off notification mirroring. +Added in Windows 10, version 1607. Boolean value that turns off notification mirroring. -

For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page. +For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page. -

No reboot or service restart is required for this policy to take effect. +No reboot or service restart is required for this policy to take effect. diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 533e43da2d..e4ff5000c9 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -145,13 +145,13 @@ ADMX Info: -

Added in Windows 10, version 1709. Turn off the display (on battery). This policy setting allows you to specify the period of inactivity before Windows turns off the display. +Added in Windows 10, version 1709. Turn off the display (on battery). This policy setting allows you to specify the period of inactivity before Windows turns off the display. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] @@ -207,13 +207,13 @@ ADMX Info: -

Added in Windows 10, version 1709. Turn off the display (plugged in). This policy setting allows you to specify the period of inactivity before Windows turns off the display. +Added in Windows 10, version 1709. Turn off the display (plugged in). This policy setting allows you to specify the period of inactivity before Windows turns off the display. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] @@ -269,14 +269,14 @@ ADMX Info: -

Added in Windows 10, version 1709. Specify the system hibernate timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. +Added in Windows 10, version 1709. Specify the system hibernate timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] @@ -332,13 +332,13 @@ ADMX Info: -

Added in Windows 10, version 1709. Specify the system hibernate timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. +Added in Windows 10, version 1709. Specify the system hibernate timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] @@ -514,13 +514,13 @@ ADMX Info: -

Added in Windows 10, version 1709. Specify the system sleep timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. +Added in Windows 10, version 1709. Specify the system sleep timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] @@ -576,13 +576,13 @@ ADMX Info: -

Added in Windows 10, version 1709. Specify the system sleep timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. +Added in Windows 10, version 1709. Specify the system sleep timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. -

If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. +If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. -

If you disable or do not configure this policy setting, users control this setting. +If you disable or do not configure this policy setting, users control this setting. -

If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. +If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. > [!TIP] diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 9c4392ca1c..804f7611af 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -289,13 +289,13 @@ ms.date: 12/14/2017 -

Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. +Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. > [!Note] > There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. -

Most restricted value is 0. +Most restricted value is 0. @@ -343,9 +343,9 @@ The following list shows the supported values: -

Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. +Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. -

Most restricted value is 0. +Most restricted value is 0.   @@ -395,9 +395,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Enables or disables the Advertising ID. +Added in Windows 10, version 1607. Enables or disables the Advertising ID. -

Most restricted value is 0. +Most restricted value is 0. @@ -494,15 +494,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. +Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -543,7 +543,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -584,7 +584,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -625,7 +625,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. @@ -666,15 +666,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. +Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -715,7 +715,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -756,7 +756,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -797,7 +797,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. @@ -838,15 +838,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. +Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -887,7 +887,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -928,7 +928,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -969,7 +969,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. @@ -1010,15 +1010,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. +Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1059,7 +1059,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -1100,7 +1100,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -1141,7 +1141,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. @@ -1182,15 +1182,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. +Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1231,7 +1231,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -1272,7 +1272,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -1313,7 +1313,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. @@ -1354,15 +1354,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access email. +Added in Windows 10, version 1607. Specifies whether Windows apps can access email. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1403,7 +1403,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -1444,7 +1444,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -1485,7 +1485,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. @@ -1526,15 +1526,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access location. +Added in Windows 10, version 1607. Specifies whether Windows apps can access location. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1575,7 +1575,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -1616,7 +1616,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -1657,7 +1657,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. @@ -1698,15 +1698,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). +Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1747,7 +1747,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -1788,7 +1788,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -1829,7 +1829,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. @@ -1870,15 +1870,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. +Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -1919,7 +1919,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -1960,7 +1960,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -2001,7 +2001,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. @@ -2042,15 +2042,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. +Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -2091,7 +2091,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -2132,7 +2132,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -2173,7 +2173,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. @@ -2214,15 +2214,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. +Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -2263,7 +2263,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -2304,7 +2304,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -2345,7 +2345,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. @@ -2386,15 +2386,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. +Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -2435,7 +2435,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -2476,7 +2476,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -2517,7 +2517,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. @@ -2558,15 +2558,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. +Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -2607,7 +2607,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -2648,7 +2648,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -2689,7 +2689,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. @@ -2730,7 +2730,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. +Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. @@ -2771,7 +2771,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -2812,7 +2812,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -2853,7 +2853,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. @@ -2894,15 +2894,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. +Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -2943,7 +2943,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -2984,7 +2984,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -3025,7 +3025,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. @@ -3066,15 +3066,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. +Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -3115,7 +3115,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. @@ -3156,7 +3156,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. @@ -3197,7 +3197,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. @@ -3238,15 +3238,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. +Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control (default). - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. > [!WARNING] > Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. @@ -3289,7 +3289,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. @@ -3330,7 +3330,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. @@ -3371,7 +3371,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. +Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. @@ -3412,15 +3412,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. +Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. -

The following list shows the supported values: +The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -

Most restricted value is 2. +Most restricted value is 2. @@ -3461,7 +3461,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -3502,7 +3502,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. @@ -3543,7 +3543,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. +Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index 204a76ade1..e5fca3da40 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -102,9 +102,9 @@ ms.date: 01/08/2018 -

Added in Windows 10, version 1709. Allow search and Cortana to search cloud sources like OneDrive and SharePoint. This policy allows corporate administrators to control whether employees can turn off/on the search of these cloud sources. The default policy value is to allow employees access to the setting that controls search of cloud sources. +Added in Windows 10, version 1709. Allow search and Cortana to search cloud sources like OneDrive and SharePoint. This policy allows corporate administrators to control whether employees can turn off/on the search of these cloud sources. The default policy value is to allow employees access to the setting that controls search of cloud sources. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -203,13 +203,13 @@ The following list shows the supported values: -

Allows or disallows the indexing of items. This switch is for the Windows Search Indexer, which controls whether it will index items that are encrypted, such as the Windows Information Protection (WIP) protected files. +Allows or disallows the indexing of items. This switch is for the Windows Search Indexer, which controls whether it will index items that are encrypted, such as the Windows Information Protection (WIP) protected files. -

When the policy is enabled, WIP protected items are indexed and the metadata about them are stored in an unencrypted location. The metadata includes things like file path and date modified. +When the policy is enabled, WIP protected items are indexed and the metadata about them are stored in an unencrypted location. The metadata includes things like file path and date modified. -

When the policy is disabled, the WIP protected items are not indexed and do not show up in the results in Cortana or file explorer. There may also be a performance impact on photos and Groove apps if there are a lot of WIP protected media files on the device. +When the policy is disabled, the WIP protected items are not indexed and do not show up in the results in Cortana or file explorer. There may also be a performance impact on photos and Groove apps if there are a lot of WIP protected media files on the device. -

Most restricted value is 0. +Most restricted value is 0. @@ -257,9 +257,9 @@ The following list shows the supported values: -

Specifies whether search can leverage location information. +Specifies whether search can leverage location information. -

Most restricted value is 0. +Most restricted value is 0. @@ -284,7 +284,7 @@ The following list shows the supported values: -

This policy has been deprecated. +This policy has been deprecated. @@ -325,14 +325,14 @@ The following list shows the supported values: -

Allows the use of diacritics. +Allows the use of diacritics. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -373,7 +373,7 @@ The following list shows the supported values: -

Allow Windows indexer. Value type is integer. +Allow Windows indexer. Value type is integer. @@ -414,14 +414,14 @@ The following list shows the supported values: -

Specifies whether to always use automatic language detection when indexing content and properties. +Specifies whether to always use automatic language detection when indexing content and properties. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -462,9 +462,9 @@ The following list shows the supported values: -

If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. +If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. @@ -508,13 +508,13 @@ The following list shows the supported values: -

This policy setting configures whether or not locations on removable drives can be added to libraries. +This policy setting configures whether or not locations on removable drives can be added to libraries. -

If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. +If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. -

If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. +If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. @@ -617,13 +617,13 @@ The following list shows the supported values: -

Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1. +Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1. -

Enable this policy if computers in your environment have extremely limited hard drive space. +Enable this policy if computers in your environment have extremely limited hard drive space. -

When this policy is disabled or not configured, Windows Desktop Search automatically manages your index size. +When this policy is disabled or not configured, Windows Desktop Search automatically manages your index size. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. @@ -667,9 +667,9 @@ The following list shows the supported values: -

If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. +If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. @@ -717,14 +717,14 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies what level of safe search (filtering adult content) is required. +Specifies what level of safe search (filtering adult content) is required. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Strict, highest filtering against adult content. - 1 (default) – Moderate filtering against adult content (valid search results will not be filtered). -

Most restricted value is 0. +Most restricted value is 0. diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 41b61f3d9e..049d83e896 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -93,7 +93,7 @@ ms.date: 01/16/2018 -

Specifies whether to allow the runtime configuration agent to install provisioning packages. +Specifies whether to allow the runtime configuration agent to install provisioning packages. @@ -141,9 +141,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. +Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. @@ -191,9 +191,9 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. -

Specifies whether the user is allowed to manually install root and intermediate CA certificates. +Specifies whether the user is allowed to manually install root and intermediate CA certificates. -

Most restricted value is 0. +Most restricted value is 0. @@ -241,7 +241,7 @@ The following list shows the supported values: -

Specifies whether to allow the runtime configuration agent to remove provisioning packages. +Specifies whether to allow the runtime configuration agent to remove provisioning packages. @@ -293,7 +293,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   -

Allows or disallow Anti Theft Mode on the device. +Allows or disallow Anti Theft Mode on the device. @@ -453,11 +453,11 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**. +Added in Windows 10, version 1607 to replace the deprecated policy **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices**. -

Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. +Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Encryption enabled. - 1 – Encryption disabled. @@ -504,14 +504,14 @@ The following list shows the supported values: > [!NOTE] > This policy is only enforced in Windows 10 Mobile. In Windows 10 for desktop, you can query encryption status by using the [DeviceStatus CSP](devicestatus-csp.md) node **DeviceStatus/Compliance/EncryptionCompliance**. -

Allows enterprise to turn on internal storage encryption. +Allows enterprise to turn on internal storage encryption. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Encryption is not required. - 1 – Encryption is required. -

Most restricted value is 1. +Most restricted value is 1. > [!IMPORTANT] > If encryption has been enabled, it cannot be turned off by using this policy. @@ -555,9 +555,9 @@ The following list shows the supported values: -

Specifies whether provisioning packages must have a certificate signed by a device trusted authority. +Specifies whether provisioning packages must have a certificate signed by a device trusted authority. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not required. - 1 – Required. @@ -601,14 +601,14 @@ The following list shows the supported values: -

Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. +Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Not required. - 1 – Required. -

Setting this policy to 1 (Required): +Setting this policy to 1 (Required): - Determines whether a device is capable of Remote Device Health Attestation, by verifying if the device has TPM 2.0. - Improves the performance of the device by enabling the device to fetch and cache data to reduce the latency during Device Health Verification. @@ -617,7 +617,7 @@ The following list shows the supported values: > We recommend that this policy is set to Required after MDM enrollment.   -

Most restricted value is 1. +Most restricted value is 1. diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index eae7e34484..614331c610 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -106,7 +106,7 @@ ms.date: 12/19/2017 > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows the user to change Auto Play settings. +Allows the user to change Auto Play settings. > [!NOTE] > Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected. @@ -157,7 +157,7 @@ The following list shows the supported values: -

Allows the user to change Data Sense settings. +Allows the user to change Data Sense settings. @@ -205,7 +205,7 @@ The following list shows the supported values: -

Allows the user to change date and time settings. +Allows the user to change date and time settings. @@ -253,7 +253,7 @@ The following list shows the supported values: -

Allows editing of the device name. +Allows editing of the device name. @@ -305,7 +305,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows the user to change the language settings. +Allows the user to change the language settings. @@ -408,7 +408,7 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows the user to change power and sleep settings. +Allows the user to change power and sleep settings. @@ -460,7 +460,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows the user to change the region settings. +Allows the user to change the region settings. @@ -512,7 +512,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows the user to change sign-in options. +Allows the user to change sign-in options. @@ -560,7 +560,7 @@ The following list shows the supported values: -

Allows the user to change VPN settings. +Allows the user to change VPN settings. @@ -612,7 +612,7 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Allows user to change workplace settings. +Allows user to change workplace settings. @@ -660,7 +660,7 @@ The following list shows the supported values: -

Allows user to change account settings. +Allows user to change account settings. @@ -708,9 +708,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. +Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – User will be allowed to configure the setting. - 1 – Don't show additional calendars. @@ -756,15 +756,15 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to either prevent specific pages in the System Settings app from being visible or accessible, or to do so for all pages except those specified. The mode will be specified by the policy string beginning with either the string "showonly:" or "hide:".  Pages are identified by a shortened version of their already published URIs, which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. +Added in Windows 10, version 1703. Allows IT Admins to either prevent specific pages in the System Settings app from being visible or accessible, or to do so for all pages except those specified. The mode will be specified by the policy string beginning with either the string "showonly:" or "hide:".  Pages are identified by a shortened version of their already published URIs, which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. -

The following example illustrates a policy that would allow access only to the about and bluetooth pages, which have URI "ms-settings:about" and "ms-settings:bluetooth" respectively: +The following example illustrates a policy that would allow access only to the about and bluetooth pages, which have URI "ms-settings:about" and "ms-settings:bluetooth" respectively: -

showonly:about;bluetooth +showonly:about;bluetooth -

If the policy is not specified, the behavior will be that no pages are affected. If the policy string is formatted incorrectly, it will be ignored entirely (i.e. treated as not set) to prevent the machine from becoming unserviceable if data corruption occurs. Note that if a page is already hidden for another reason, then it will remain hidden even if it is in a "showonly:" list. +If the policy is not specified, the behavior will be that no pages are affected. If the policy string is formatted incorrectly, it will be ignored entirely (i.e. treated as not set) to prevent the machine from becoming unserviceable if data corruption occurs. Note that if a page is already hidden for another reason, then it will remain hidden even if it is in a "showonly:" list. -

The format of the PageVisibilityList value is as follows: +The format of the PageVisibilityList value is as follows: - The value is a unicode string up to 10,000 characters long, which will be used without case sensitivity. - There are two variants: one that shows only the given pages and one which hides the given pages. @@ -772,17 +772,17 @@ The following list shows the supported values: - Following the variant identifier is a semicolon-delimited list of page identifiers, which must not have any extra whitespace. - Each page identifier is the ms-settings:xyz URI for the page, minus the ms-settings: prefix, so the identifier for the page with URI "ms-settings:wi-fi" would be just "wi-fi". -

The default value for this setting is an empty string, which is interpreted as show everything. +The default value for this setting is an empty string, which is interpreted as show everything. -

Example 1, specifies that only the wifi and bluetooth pages should be shown (they have URIs ms-settings:wi-fi and ms-settings:bluetooth). All other pages (and the categories they're in) will be hidden: +Example 1, specifies that only the wifi and bluetooth pages should be shown (they have URIs ms-settings:wi-fi and ms-settings:bluetooth). All other pages (and the categories they're in) will be hidden: -

showonly:wi-fi;bluetooth +showonly:wi-fi;bluetooth -

Example 2, specifies that the wifi page should not be shown: +Example 2, specifies that the wifi page should not be shown: -

hide:wifi +hide:wifi -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Open System Settings and verfiy that the About page is visible and accessible. 2. Configure the policy with the following string: "hide:about". diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 8dbd4fe36b..f842311ff1 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -67,7 +67,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. +Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. @@ -115,7 +115,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows. +Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows. @@ -163,7 +163,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. +Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 0f87f58919..ff34e8ec3b 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -61,7 +61,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS). +Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS). diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 02f3b03e71..4e4567d276 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -145,7 +145,7 @@ ms.date: 12/14/2017 -

Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. @@ -194,7 +194,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. @@ -243,7 +243,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. @@ -292,7 +292,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. @@ -341,7 +341,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. @@ -390,7 +390,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. @@ -439,7 +439,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. @@ -488,7 +488,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. @@ -537,7 +537,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. @@ -586,7 +586,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. +Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. @@ -639,15 +639,15 @@ The following list shows the supported values: > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. -

Forces the start screen size. +Forces the start screen size. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Do not force size of Start. - 1 – Force non-fullscreen size of Start. - 2 - Force a fullscreen size of Start. -

If there is policy configuration conflict, the latest configuration request is applied to the device. +If there is policy configuration conflict, the latest configuration request is applied to the device. @@ -691,19 +691,19 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Allows IT Admins to configure Start by collapsing or removing the all apps list. +Allows IT Admins to configure Start by collapsing or removing the all apps list. > [!Note] > There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – None. - 1 – Hide all apps list. - 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. - 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: - 1 - Enable policy and restart explorer.exe - 2a - If set to '1': Verify that the all apps list is collapsed, and that the Settings toggle is not grayed out. @@ -749,9 +749,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify that "Change account settings" is not available. @@ -805,9 +805,9 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable "Show most used apps" in the Settings app. 2. Use some apps to get them into the most used group in Start. @@ -862,9 +862,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. -

To validate on Laptop, do the following: +To validate on Laptop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify "Hibernate" is not available. @@ -918,9 +918,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify "Lock" is not available. @@ -971,9 +971,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. +Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. -

Value type is integer. +Value type is integer. @@ -1017,9 +1017,9 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, and verify the power button is not available. @@ -1073,9 +1073,9 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. 2. Pin Photos to the taskbar, and open some images in the photos app. @@ -1136,9 +1136,9 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable "Show recently added apps" in the Settings app. 2. Check if there are recently added apps in Start (if not, install some). @@ -1193,9 +1193,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. @@ -1246,9 +1246,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. @@ -1299,9 +1299,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify "Sign out" is not available. @@ -1352,9 +1352,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify that "Sleep" is not available. @@ -1405,9 +1405,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify that "Switch account" is not available. @@ -1461,9 +1461,9 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. +Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Log off. @@ -1518,14 +1518,14 @@ The following list shows the supported values: > [!NOTE] > This policy requires reboot to take effect. -

Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. +Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/.jpg files) for secondary tiles into its local app data path which allows the StartLayout policy to pin Edge secondary tiles as weblink that tie to the image asset files. > [!IMPORTANT] > Please note that the import happens only when StartLayout policy is changed. So it is better to always change ImportEdgeAssets policy at the same time as StartLayout policy whenever there are Edge secondary tiles to be pinned from StartLayout policy. -

The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). +The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Set policy with an XML for Edge assets. 2. Set StartLayout policy to anything so that it would trigger the Edge assets import. @@ -1571,9 +1571,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. +Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Right click on a program pinned to taskbar. @@ -1631,9 +1631,9 @@ The following list shows the supported values: > [!IMPORTANT] > Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) -

Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy +Allows you to override the default Start layout and prevents the user from changing it. If both user and device policies are set, the user policy will be used. Apps pinned to the taskbar can also be changed with this policy -

For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). +For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 57e64d4e9f..189436f4eb 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -64,15 +64,15 @@ ms.date: 12/13/2017 -

Added in Windows 10, version 1709. Allows disk health model updates. +Added in Windows 10, version 1709. Allows disk health model updates. -

The following list shows the supported values: +The following list shows the supported values: - 0 - Do not allow - 1 (default) - Allow -

Value type is integer. +Value type is integer. diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 5a62fcc89e..2435e96fe0 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -109,11 +109,11 @@ ms.date: 12/19/2017 > This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, Windows 10 Mobile, and Windows 10 Mobile Enterprise. -

This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software. +This policy setting determines whether users can access the Insider build controls in the Advanced Options for Windows Update. These controls are located under "Get Insider builds," and enable users to make their devices available for downloading and installing Windows preview software. -

If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. +If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. The item "Get Insider builds" is unavailable, users are unable to make their devices available for preview software. - 1 – Allowed. Users can make their devices available for downloading and installing preview software. @@ -158,9 +158,9 @@ ms.date: 12/19/2017 -

Specifies whether set general purpose device to be in embedded mode. +Specifies whether set general purpose device to be in embedded mode. -

Most restricted value is 0. +Most restricted value is 0. @@ -211,15 +211,15 @@ The following list shows the supported values: > [!NOTE] > This policy is not supported in Windows 10, version 1607. -

This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. +This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Disabled. - 1 (default) – Permits Microsoft to configure device settings only. - 2 – Allows Microsoft to conduct full experimentations. -

Most restricted value is 0. +Most restricted value is 0. @@ -260,11 +260,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. +Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. -

This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled). +This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled). -

This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content. +This setting is used by lower-level components for text display and fond handling and has not direct effect on web browsers, which may download web fonts used in web content. > [!Note] > Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service. @@ -278,7 +278,7 @@ The following list shows the supported values: -

To verify if System/AllowFontProviders is set to true: +To verify if System/AllowFontProviders is set to true: - After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com. @@ -321,21 +321,21 @@ The following list shows the supported values: -

Specifies whether to allow app access to the Location service. +Specifies whether to allow app access to the Location service. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. - 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off. - 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. -

Most restricted value is 0. +Most restricted value is 0. -

While the policy is set to 0 (Force Location Off) or 2 (Force Location On), any Location service call from an app would trigger the value set by this policy. +While the policy is set to 0 (Force Location Off) or 2 (Force Location On), any Location service call from an app would trigger the value set by this policy. -

When switching the policy back from 0 (Force Location Off) or 2 (Force Location On) to 1 (User Control), the app reverts to its original Location service setting. +When switching the policy back from 0 (Force Location Off) or 2 (Force Location On) to 1 (User Control), the app reverts to its original Location service setting. -

For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. +For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. @@ -376,9 +376,9 @@ The following list shows the supported values: -

Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card. +Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card. -

Most restricted value is 0. +Most restricted value is 0. @@ -427,9 +427,9 @@ The following list shows the supported values: -

Allow the device to send diagnostic and usage telemetry data, such as Watson. +Allow the device to send diagnostic and usage telemetry data, such as Watson. -

The following tables describe the supported values: +The following tables describe the supported values: Windows 8.1 Values: @@ -502,7 +502,7 @@ Windows 10 Values: > If you are using Windows 8.1 MDM server and set a value of 0 using the legacy AllowTelemetry policy on a Windows 10 Mobile device, then the value is not respected and the telemetry level is silently set to level 1. -

Most restricted value is 0. +Most restricted value is 0. @@ -543,9 +543,9 @@ Windows 10 Values: -

Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. +Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. -

Most restricted value is 0. +Most restricted value is 0. @@ -692,7 +692,7 @@ This policy setting blocks the Connected User Experience and Telemetry service f -

Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting: +Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting: * Users cannot access OneDrive from the OneDrive app or file picker. * Microsoft Store apps cannot access OneDrive using the WinRT API. @@ -700,9 +700,9 @@ This policy setting blocks the Connected User Experience and Telemetry service f * OneDrive files are not kept in sync with the cloud. * Users cannot automatically upload photos and videos from the camera roll folder. -

If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. +If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. -

To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Restart machine. @@ -870,20 +870,20 @@ The following list shows the supported values: -

This policy setting, in combination with the System/AllowTelemetry +This policy setting, in combination with the System/AllowTelemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. -

To enable this behavior you must complete two steps: +To enable this behavior you must complete two steps:

  • Enable this policy setting
  • Set Allow Telemetry to level 2 (Enhanced)
-

When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: [Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](https://go.microsoft.com/fwlink/?linkid=847594). +When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented here: [Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](https://go.microsoft.com/fwlink/?linkid=847594). -

Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft. +Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft. -

If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. +If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. @@ -924,9 +924,9 @@ The following list shows the supported values: -

Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device. +Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device. -

If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. +If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index d6e2d91c96..fbb6857b81 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -106,9 +106,9 @@ ms.date: 12/19/2017 > The policy is only enforced in Windows 10 for desktop. -

Allows the user to turn on and off the logging for incorrect conversion and saving auto-tuning result to a file and history-based predictive input. +Allows the user to turn on and off the logging for incorrect conversion and saving auto-tuning result to a file and history-based predictive input. -

Most restricted value is 0. +Most restricted value is 0. @@ -160,9 +160,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary. +Allows the user to turn on Open Extended Dictionary, Internet search integration, or cloud candidate features to provide input suggestions that do not exist in the device's local dictionary. -

Most restricted value is 0. +Most restricted value is 0. @@ -214,9 +214,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the IT admin to disable the touch/handwriting keyboard on Windows. +Allows the IT admin to disable the touch/handwriting keyboard on Windows. -

Most restricted value is 0. +Most restricted value is 0. @@ -268,14 +268,14 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the Japanese IME surrogate pair characters. +Allows the Japanese IME surrogate pair characters. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -

Most restricted value is 0. +Most restricted value is 0. @@ -320,9 +320,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows Japanese Ideographic Variation Sequence (IVS) characters. +Allows Japanese Ideographic Variation Sequence (IVS) characters. -

Most restricted value is 0. +Most restricted value is 0. @@ -374,9 +374,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the Japanese non-publishing standard glyph. +Allows the Japanese non-publishing standard glyph. -

Most restricted value is 0. +Most restricted value is 0. @@ -428,9 +428,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the Japanese user dictionary. +Allows the Japanese user dictionary. -

Most restricted value is 0. +Most restricted value is 0. @@ -481,11 +481,11 @@ The following list shows the supported values: > [!NOTE] > The policy is only enforced in Windows 10 for desktop. -

Added in Windows 10, version 1703. Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. +Added in Windows 10, version 1703. Specifies whether text prediction is enabled or disabled for the on-screen keyboard, touch keyboard, and handwriting recognition tool. When this policy is set to disabled, text prediction is disabled. -

Most restricted value is 0. +Most restricted value is 0. -

To validate that text prediction is disabled on Windows 10 for desktop, do the following: +To validate that text prediction is disabled on Windows 10 for desktop, do the following: 1. Search for and launch the on-screen keyboard. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Use Text Prediction” setting is enabled from the options button. 2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. @@ -505,7 +505,7 @@ The following list shows the supported values: **TextInput/AllowKoreanExtendedHanja** -

This policy has been deprecated. +This policy has been deprecated. @@ -550,9 +550,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the uninstall of language features, such as spell checkers, on a device. +Allows the uninstall of language features, such as spell checkers, on a device. -

Most restricted value is 0. +Most restricted value is 0. @@ -665,9 +665,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the users to restrict character code range of conversion by setting the character filter. +Allows the users to restrict character code range of conversion by setting the character filter. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 are filtered. @@ -715,9 +715,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the users to restrict character code range of conversion by setting the character filter. +Allows the users to restrict character code range of conversion by setting the character filter. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 and EUDC are filtered. @@ -765,9 +765,9 @@ The following list shows the supported values: > The policy is only enforced in Windows 10 for desktop. -

Allows the users to restrict character code range of conversion by setting the character filter. +Allows the users to restrict character code range of conversion by setting the character filter. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except ShiftJIS are filtered. diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index 42221e6fde..f97d7275a3 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -61,7 +61,7 @@ ms.date: 12/14/2017 -

Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting. +Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting. diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index f0cc05b9e9..771fc0cab4 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -204,14 +204,14 @@ ms.date: 12/19/2017 -

Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. +Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. > [!NOTE] > The default maximum difference from start time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** below for more information. -

Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. -

The default is 17 (5 PM). +The default is 17 (5 PM). @@ -252,11 +252,11 @@ ms.date: 12/19/2017 -

Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. +Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. -

Supported values are 8-18. +Supported values are 8-18. -

The default value is 18 (hours). +The default value is 18 (hours). @@ -297,14 +297,14 @@ ms.date: 12/19/2017 -

Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. +Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. > [!NOTE] > The default maximum difference from end time has been increased to 18 in Windows 10, version 1703. In this version of Windows 10, the maximum range of active hours can now be configured. See **Update/ActiveHoursMaxRange** above for more information. -

Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. +Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. -

The default value is 8 (8 AM). +The default value is 8 (8 AM). @@ -345,11 +345,11 @@ ms.date: 12/19/2017 -

Enables the IT admin to manage automatic update behavior to scan, download, and install updates. +Enables the IT admin to manage automatic update behavior to scan, download, and install updates. -

Supported operations are Get and Replace. +Supported operations are Get and Replace. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. - 1 – Auto install the update and then notify the user to schedule a device restart. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates immediately. If the installation requires a restart, the end-user is prompted to schedule the restart time. The end-user has up to seven days to schedule the restart and after that, a restart of the device is forced. Enabling the end-user to control the start time reduces the risk of accidental data loss caused by applications that do not shutdown properly on restart. @@ -362,7 +362,7 @@ ms.date: 12/19/2017 > This option should be used only for systems under regulatory compliance, as you will not get security updates as well.   -

If the policy is not configured, end-users get the default behavior (Auto install and restart). +If the policy is not configured, end-users get the default behavior (Auto install and restart). @@ -403,7 +403,7 @@ ms.date: 12/19/2017 -

Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer. +Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer. A significant number of devices primarily use cellular data and do not have Wi-Fi access, which leads to a lower number of devices getting updates. Since a large number of devices have large data plans or unlimited data, this policy can unblock devices from getting updates. @@ -455,9 +455,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. +Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not allowed or not configured. - 1 – Allowed. Accepts updates received through Microsoft Update. @@ -501,11 +501,11 @@ The following list shows the supported values: -

Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. +Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. -

Supported operations are Get and Replace. +Supported operations are Get and Replace. -

This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. +This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. @@ -553,11 +553,11 @@ The following list shows the supported values: -

Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. +Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. -

Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store +Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store -

Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft Store to stop working. +Enabling this policy will disable that functionality, and may cause connection to public services such as the Microsoft Store to stop working. > [!NOTE] > This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. @@ -608,11 +608,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. This policy defines the deadline in days after which a reboot for updates will become mandatory. +Added in Windows 10, version 1703. This policy defines the deadline in days after which a reboot for updates will become mandatory. -

Supported values are 2-30 days. +Supported values are 2-30 days. -

The default value is 7 days. +The default value is 7 days. @@ -653,9 +653,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. -

The default value is 15 (minutes). +The default value is 15 (minutes). @@ -700,9 +700,9 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). -

Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. +Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. -

The following list shows the supported values: +The following list shows the supported values: - 1 (default) – Auto Dismissal. - 2 – User Dismissal. @@ -746,7 +746,7 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). -

Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. +Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. @@ -789,7 +789,7 @@ The following list shows the supported values: -

Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. +Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. @@ -833,11 +833,11 @@ The following list shows the supported values: -

Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -

Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. +Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. -

Supported values are 0-365 days. +Supported values are 0-365 days. > [!IMPORTANT] > The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. @@ -881,9 +881,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. +Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. -

Supported values are 0-30. +Supported values are 0-30. @@ -928,18 +928,18 @@ The following list shows the supported values: > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. -

Allows IT Admins to specify update delays for up to 4 weeks. +Allows IT Admins to specify update delays for up to 4 weeks. -

Supported values are 0-4, which refers to the number of weeks to defer updates. +Supported values are 0-4, which refers to the number of weeks to defer updates. -

In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: +In Windows 10 Mobile Enterprise version 1511 devices set to automatic updates, for DeferUpdatePeriod to work, you must set the following: - Update/RequireDeferUpgrade must be set to 1 - System/AllowTelemetry must be set to 1 or higher -

If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the Allow Telemetry policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. OS upgrade: - Maximum deferral: 8 months @@ -1064,13 +1064,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpgradePeriod for Windows 10, version 1511 devices. -

Allows IT Admins to specify additional upgrade delays for up to 8 months. +Allows IT Admins to specify additional upgrade delays for up to 8 months. -

Supported values are 0-8, which refers to the number of months to defer upgrades. +Supported values are 0-8, which refers to the number of months to defer upgrades. -

If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. @@ -1111,7 +1111,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego -

Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. +Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. @@ -1152,13 +1152,13 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego -

Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like. +Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like. -

For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/). +For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/). -

This is the same as the Group Policy in Windows Components > Window Update "Do not allow update deferral policies to cause scans against Windows Update." +This is the same as the Group Policy in Windows Components > Window Update "Do not allow update deferral policies to cause scans against Windows Update." -

Value type is integer. Supported operations are Add, Get, Replace, and Delete. +Value type is integer. Supported operations are Add, Get, Replace, and Delete. @@ -1206,11 +1206,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). +Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). -

Supported values are 2-30 days. +Supported values are 2-30 days. -

The default value is 0 days (not specified). +The default value is 0 days (not specified). @@ -1251,11 +1251,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. -

Supported values are 1-3 days. +Supported values are 1-3 days. -

The default value is 3 days. +The default value is 3 days. @@ -1296,11 +1296,11 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. +Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. -

Supported values are 2-30 days. +Supported values are 2-30 days. -

The default value is 7 days. +The default value is 7 days. @@ -1344,9 +1344,9 @@ The following list shows the supported values: > [!NOTE] > Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -

Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. +Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Allow Windows Update drivers. - 1 – Exclude Windows Update drivers. @@ -1390,12 +1390,12 @@ The following list shows the supported values: -

Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). +Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). > [!NOTE] > This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Disabled. - 1 – Enabled. @@ -1439,7 +1439,7 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] > Setting this policy might cause devices to incur costs from MO operators. @@ -1502,13 +1502,13 @@ To validate this policy: -

Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. +Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] > Setting this policy might cause devices to incur costs from MO operators. -

To validate this policy: +To validate this policy: 1. Enable the policy and ensure the device is on a cellular network. 2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: @@ -1562,9 +1562,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. +Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. -

The following list shows the supported values: +The following list shows the supported values: - 0 - Disable Preview builds - 1 - Disable Preview builds once the next release is public @@ -1613,16 +1613,16 @@ The following list shows the supported values: > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. -

Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. +Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Deferrals are not paused. - 1 – Deferrals are paused. -

If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. -

If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. +If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. @@ -1663,12 +1663,12 @@ The following list shows the supported values: -

Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. +Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. -

Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. +Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Feature Updates are not paused. - 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. @@ -1712,9 +1712,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. +Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. -

Value type is string. Supported operations are Add, Get, Delete, and Replace. +Value type is string. Supported operations are Add, Get, Delete, and Replace. @@ -1755,9 +1755,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. +Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Quality Updates are not paused. - 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. @@ -1801,9 +1801,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. +Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. -

Value type is string. Supported operations are Add, Get, Delete, and Replace. +Value type is string. Supported operations are Add, Get, Delete, and Replace. @@ -1812,7 +1812,7 @@ The following list shows the supported values: **Update/PhoneUpdateRestrictions** -

This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. +This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. @@ -1865,9 +1865,9 @@ The following list shows the supported values: > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. -

Allows the IT admin to set a device to Semi-Annual Channel train. +Allows the IT admin to set a device to Semi-Annual Channel train. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – User gets upgrades from Semi-Annual Channel (Targeted). - 1 – User gets upgrades from Semi-Annual Channel. @@ -1915,11 +1915,11 @@ The following list shows the supported values: > If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. -

Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. +Allows the IT admin to restrict the updates that are installed on a device to only those on an update approval list. It enables IT to accept the End User License Agreement (EULA) associated with the approved update on behalf of the end-user. EULAs are approved once an update is approved. -

Supported operations are Get and Replace. +Supported operations are Get and Replace. -

The following list shows the supported values: +The following list shows the supported values: - 0 – Not configured. The device installs all applicable updates. - 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. @@ -1963,9 +1963,9 @@ The following list shows the supported values: -

Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. -

The default value is 15 (minutes). +The default value is 15 (minutes). @@ -2014,9 +2014,9 @@ Supported values are 15, 30, or 60 (minutes). > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -

Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. +Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart warning reminder notifications. -

The default value is 4 (hours). +The default value is 4 (hours). @@ -2061,13 +2061,13 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

Enables the IT admin to schedule the day of the update installation. +Enables the IT admin to schedule the day of the update installation. -

The data type is a integer. +The data type is a integer. -

Supported operations are Add, Delete, Get, and Replace. +Supported operations are Add, Delete, Get, and Replace. -

The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Every day - 1 – Sunday @@ -2117,7 +2117,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values: +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values:

  • 0 - no update in the schedule
  • 1 - update is scheduled every week
  • @@ -2162,7 +2162,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

    Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values: +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values:

    • 0 - no update in the schedule
    • 1 - update is scheduled every first week of the month
    • @@ -2207,7 +2207,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

      Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values: +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values:

      • 0 - no update in the schedule
      • 1 - update is scheduled every fourth week of the month
      • @@ -2252,7 +2252,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

        Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values: +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values:

        • 0 - no update in the schedule
        • 1 - update is scheduled every second week of the month
        • @@ -2297,7 +2297,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

          Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values: +Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values:

          • 0 - no update in the schedule
          • 1 - update is scheduled every third week of the month
          • @@ -2346,15 +2346,15 @@ Supported values are 2, 4, 8, 12, or 24 (hours). > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise -

            Enables the IT admin to schedule the time of the update installation. +Enables the IT admin to schedule the time of the update installation. -

            The data type is a integer. +The data type is a integer. -

            Supported operations are Add, Delete, Get, and Replace. +Supported operations are Add, Delete, Get, and Replace. -

            Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. +Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. -

            The default value is 3. +The default value is 3. @@ -2395,9 +2395,9 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

            Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. +Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. -

            The following list shows the supported values: +The following list shows the supported values: - 0 (default) – Enabled - 1 – Disabled @@ -2441,9 +2441,9 @@ Supported values are 2, 4, 8, 12, or 24 (hours). -

            Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. +Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. -

            The following list shows the supported values: +The following list shows the supported values: - 0 - not configured - 1 - configured @@ -2490,11 +2490,11 @@ Supported values are 2, 4, 8, 12, or 24 (hours). > [!Important] > Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. -

            Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premise MDMs that need to update devices that cannot connect to the Internet. +Allows the device to check for updates from a WSUS server instead of Microsoft Update. This is useful for on-premise MDMs that need to update devices that cannot connect to the Internet. -

            Supported operations are Get and Replace. +Supported operations are Get and Replace. -

            The following list shows the supported values: +The following list shows the supported values: - Not configured. The device checks for updates from Microsoft Update. - Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. @@ -2556,13 +2556,13 @@ Example -

            Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. +Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. -

            This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. +This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. -

            To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. +To use this setting, you must set two server name values: the server from which the Automatic Updates client detects and downloads updates, and the server to which updated workstations upload statistics. You can set both values to be the same server. An optional server name value can be specified to configure Windows Update agent, and download updates from an alternate download server instead of WSUS Server. -

            Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. +Value type is string and the default value is an empty string, "". If the setting is not configured, and if Automatic Updates is not disabled by policy or user preference, the Automatic Updates client connects directly to the Windows Update site on the Internet. > [!Note] > If the "Configure Automatic Updates" Group Policy is disabled, then this policy has no effect. diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index eb5a2581ab..043528cf1c 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -47,7 +47,7 @@ ms.date: 12/14/2017 **WiFi/AllowWiFiHotSpotReporting** -

            This policy has been deprecated. +This policy has been deprecated. @@ -88,9 +88,9 @@ ms.date: 12/14/2017 -

            Allow or disallow the device to automatically connect to Wi-Fi hotspots. +Allow or disallow the device to automatically connect to Wi-Fi hotspots. -

            Most restricted value is 0. +Most restricted value is 0. @@ -138,9 +138,9 @@ The following list shows the supported values: -

            Allow or disallow internet sharing. +Allow or disallow internet sharing. -

            Most restricted value is 0. +Most restricted value is 0. @@ -188,9 +188,9 @@ The following list shows the supported values: -

            Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. +Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. -

            Most restricted value is 0. +Most restricted value is 0. > [!NOTE] > Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. @@ -241,9 +241,9 @@ The following list shows the supported values: -

            Allow or disallow WiFi connection. +Allow or disallow WiFi connection. -

            Most restricted value is 0. +Most restricted value is 0. @@ -291,7 +291,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1703. Allow WiFi Direct connection.. +Added in Windows 10, version 1703. Allow WiFi Direct connection.. @@ -339,13 +339,13 @@ The following list shows the supported values: -

            Allow an enterprise to control the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. +Allow an enterprise to control the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. -

            Supported values are 0-500, where 100 = normal scan frequency and 500 = low scan frequency. +Supported values are 0-500, where 100 = normal scan frequency and 500 = low scan frequency. -

            The default value is 0. +The default value is 0. -

            Supported operations are Add, Delete, Get, and Replace. +Supported operations are Add, Delete, Get, and Replace. diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index 88d40dca78..ff846b2bbe 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -117,9 +117,9 @@ ms.date: 12/29/2017 -

            Added in Windows 10, version 1709. The company name that is displayed to the users. CompanyName is required for both EnableCustomizedToasts and EnableInAppCustomization. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display the contact options. +Added in Windows 10, version 1709. The company name that is displayed to the users. CompanyName is required for both EnableCustomizedToasts and EnableInAppCustomization. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display the contact options. -

            Value type is string. Supported operations are Add, Get, Replace and Delete. +Value type is string. Supported operations are Add, Get, Replace and Delete. @@ -215,9 +215,9 @@ Valid values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the app and browser protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the app and browser protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -321,12 +321,12 @@ Valid values: -

            Added in Windows 10, version 1709. Use this policy if you want Windows Defender Security Center to only display notifications which are considered critical. If you disable or do not configure this setting, Windows Defender Security Center will display critical and non-critical notifications to users. +Added in Windows 10, version 1709. Use this policy if you want Windows Defender Security Center to only display notifications which are considered critical. If you disable or do not configure this setting, Windows Defender Security Center will display critical and non-critical notifications to users. > [!Note] > If Suppress notification is enabled then users will not see critical or non-critical messages. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -374,9 +374,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the family options area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the family options area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -424,9 +424,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the device performance and health area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the device performance and health area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -474,9 +474,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the firewall and network protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the firewall and network protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -524,9 +524,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of Windows Defender Security Center notifications. If you disable or do not configure this setting, Windows Defender Security Center notifications will display on devices. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of Windows Defender Security Center notifications. If you disable or do not configure this setting, Windows Defender Security Center notifications will display on devices. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -574,9 +574,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the virus and threat protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. +Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the virus and threat protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -624,9 +624,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Prevent users from making changes to the exploit protection settings area in the Windows Defender Security Center. If you disable or do not configure this setting, local users can make changes in the exploit protection settings area. +Added in Windows 10, version 1709. Prevent users from making changes to the exploit protection settings area in the Windows Defender Security Center. If you disable or do not configure this setting, local users can make changes in the exploit protection settings area. -

            Value type is integer. Supported operations are Add, Get, Replace and Delete. +Value type is integer. Supported operations are Add, Get, Replace and Delete. @@ -674,9 +674,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. The email address that is displayed to users.  The default mail application is used to initiate email actions. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. +Added in Windows 10, version 1709. The email address that is displayed to users.  The default mail application is used to initiate email actions. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. -

            Value type is string. Supported operations are Add, Get, Replace and Delete. +Value type is string. Supported operations are Add, Get, Replace and Delete. @@ -717,9 +717,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Enable this policy to display your company name and contact options in the notifications. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will display a default notification text. +Added in Windows 10, version 1709. Enable this policy to display your company name and contact options in the notifications. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will display a default notification text. -

            Value type is integer. Supported operations are Add, Get, Replace, and Delete. +Value type is integer. Supported operations are Add, Get, Replace, and Delete. @@ -767,9 +767,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. Enable this policy to have your company name and contact options displayed in a contact card fly out in Windows Defender Security Center. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will not display the contact card fly out notification. +Added in Windows 10, version 1709. Enable this policy to have your company name and contact options displayed in a contact card fly out in Windows Defender Security Center. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will not display the contact card fly out notification. -

            Value type is integer. Supported operations are Add, Get, Replace, and Delete. +Value type is integer. Supported operations are Add, Get, Replace, and Delete. @@ -979,9 +979,9 @@ Valid values: -

            Added in Windows 10, version 1709. The phone number or Skype ID that is displayed to users.  Skype is used to initiate the call. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. +Added in Windows 10, version 1709. The phone number or Skype ID that is displayed to users.  Skype is used to initiate the call. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. -

            Value type is string. Supported operations are Add, Get, Replace, and Delete. +Value type is string. Supported operations are Add, Get, Replace, and Delete. @@ -1022,9 +1022,9 @@ Valid values: -

            Added in Windows 10, version 1709. The help portal URL this is displayed to users. The default browser is used to initiate this action. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then the device will not display contact options. +Added in Windows 10, version 1709. The help portal URL this is displayed to users. The default browser is used to initiate this action. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then the device will not display contact options. -

            Value type is Value type is string. Supported operations are Add, Get, Replace, and Delete. +Value type is Value type is string. Supported operations are Add, Get, Replace, and Delete. diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index eea3c2b2c4..53db2d066d 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -64,7 +64,7 @@ ms.date: 12/14/2017 -

            Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace. +Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace. @@ -112,9 +112,9 @@ The following list shows the supported values: -

            Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. +Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. -

            Value type is int. The following list shows the supported values: +Value type is int. The following list shows the supported values: - 0 - access to ink workspace is disabled. The feature is turned off. - 1 - ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 2a237c5b45..9ee11366cd 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -187,9 +187,9 @@ ADMX Info: -

            Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. +Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. -

            To validate on Desktop, do the following: +To validate on Desktop, do the following: 1. Enable policy. 2. Verify that the Switch account button in Start is hidden. diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index a6b8d30818..e2de8af8b2 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -82,7 +82,7 @@ ms.date: 12/14/2017 -

            Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement. +Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement. @@ -130,7 +130,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery. +Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery. @@ -178,7 +178,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. +Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. @@ -226,7 +226,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. +Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. @@ -274,11 +274,11 @@ The following list shows the supported values: -

            Added in Windows 10, version 1607. Allow or disallow turning off the projection to a PC. +Added in Windows 10, version 1607. Allow or disallow turning off the projection to a PC. -

            If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. +If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. -

            Value type is integer. +Value type is integer. @@ -326,7 +326,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. +Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. @@ -351,7 +351,7 @@ The following list shows the supported values: -

            Added in Windows 10, version 1703. Setting this policy controls whether or not the wireless display can send input—keyboard, mouse, pen, and touch input if the display supports it—back to the source device. +Added in Windows 10, version 1703. Setting this policy controls whether or not the wireless display can send input—keyboard, mouse, pen, and touch input if the display supports it—back to the source device. @@ -399,11 +399,11 @@ The following list shows the supported values: -

            Added in Windows 10, version 1607. Allow or disallow requirement for a PIN for pairing. +Added in Windows 10, version 1607. Allow or disallow requirement for a PIN for pairing. -

            If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. +If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. -

            Value type is integer. +Value type is integer. From 1c66ac54681566da9b3d4a67d86ae748e83a63a7 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 26 Jan 2018 15:06:46 +0000 Subject: [PATCH 17/91] Merged PR 5502: Add links to clarify step --- windows/configuration/configure-windows-10-taskbar.md | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/windows/configuration/configure-windows-10-taskbar.md b/windows/configuration/configure-windows-10-taskbar.md index e96debef9c..eb38b5217a 100644 --- a/windows/configuration/configure-windows-10-taskbar.md +++ b/windows/configuration/configure-windows-10-taskbar.md @@ -32,10 +32,11 @@ The following example shows how apps will be pinned: Windows default apps to the ## Configure taskbar (general) -To configure the taskbar: +**To configure the taskbar:** + 1. Create the XML file. - * If you are also [customizing the Start layout](customize-and-export-start-layout.md), use `Export-StartLayout` to create the XML, and then add the `` section from the following sample to the file. - * If you are only configuring the taskbar, use the following sample to create a layout modification XML file. + * If you are also [customizing the Start layout](customize-and-export-start-layout.md), use `Export-StartLayout` to create the XML, and then add the `` section from [the following sample](#sample-taskbar-configuration-added-to-start-layout-xml-file) to the file. + * If you are only configuring the taskbar, use [the following sample](#sample-taskbar-configuration-xml-file) to create a layout modification XML file. 2. Edit and save the XML file. You can use [AUMID](https://go.microsoft.com/fwlink/p/?LinkId=614867) or Desktop Application Link Path to identify the apps to pin to the taskbar. * Use `` and [AUMID](https://go.microsoft.com/fwlink/p/?LinkId=614867) to pin Universal Windows Platform apps. * Use `` and Desktop Application Link Path to pin desktop applications. From ef80b8989a05859e049486cbc43c088d98a5b925 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 26 Jan 2018 16:22:04 +0000 Subject: [PATCH 18/91] Merged PR 5493: Explained code section examples more clearly Explained code section examples more clearly --- .../resolve-windows-10-upgrade-errors.md | 26 ++++++++++++------- 1 file changed, 17 insertions(+), 9 deletions(-) diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index d90228f2cb..57f571beb1 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 01/11/2018 +ms.date: 01/25/2018 ms.localizationpriority: high --- @@ -105,15 +105,23 @@ Note: If only a result code is returned, this can be because a tool is being use Result codes can be matched to the type of error encountered. To match a result code to an error: -1. Identify the error code type, either Win32 or NTSTATUS, using the first hexadecimal digit: -
            8 = Win32 error code (ex: 0x**8**0070070) -
            C = NTSTATUS value (ex: 0x**C**1900107) -2. Write down the last 4 digits of the error code (ex: 0x8007**0070** = 0070). These digits correspond to the last 16 bits of the [HRESULT](https://msdn.microsoft.com/en-us/library/cc231198.aspx) or the [NTSTATUS](https://msdn.microsoft.com/en-us/library/cc231200.aspx) structure. -3. Based on the type of error code determined in the first step, match the 4 digits derived from the second step to either a [Win32 error code](https://msdn.microsoft.com/en-us/library/cc231199.aspx), or an [NTSTATUS value](https://msdn.microsoft.com/en-us/library/cc704588.aspx). +1. Identify the error code type as either Win32 or NTSTATUS using the first hexadecimal digit: +
            **8** = Win32 error code (ex: 0x**8**0070070) +
            **C** = NTSTATUS value (ex: 0x**C**1900107) +2. Write down the last 4 digits of the error code (ex: 0x8007**0070** = 0070). These digits are the actual error code type as defined in the [HRESULT](https://msdn.microsoft.com/en-us/library/cc231198.aspx) or the [NTSTATUS](https://msdn.microsoft.com/en-us/library/cc231200.aspx) structure. Other digits in the code identify things such as the device type that produced the error. +3. Based on the type of error code determined in the first step (Win32 or NTSTATUS), match the 4 digits derived from the second step to either a Win32 error code or NTSTATUS value using the following links: + a. [Win32 error code](https://msdn.microsoft.com/en-us/library/cc231199.aspx) + b. [NTSTATUS value](https://msdn.microsoft.com/en-us/library/cc704588.aspx) -For example: -- 0x80070070 = Win32 = 0070 = 0x00000070 = ERROR_DISK_FULL -- 0xC1900107 = NTSTATUS = 0107 = 0x00000107 = STATUS_SOME_NOT_MAPPED +Examples: +- 0x80070070 + - Based on the "8" this is a Win32 error code + - The last four digits are 0070, so look up 0x00000070 in the Win32 error code table + - The error is: ERROR_DISK_FULL +- 0xC1900107 + - Based on the "C" this is an NTSTATUS error code + - The last four digits are 0107, so look up 0x00000107 in the NTSTATUS values table + - The error is: STATUS_SOME_NOT_MAPPED Some result codes are self-explanatory, whereas others are more generic and require further analysis. In the examples shown above, ERROR_DISK_FULL indicates that the hard drive is full and additional room is needed to complete Windows upgrade. The message STATUS_SOME_NOT_MAPPED is more ambiguous, and means that an action is pending. In this case, the action pending is often the cleanup operation from a previous installation attempt, which can be resolved with a system reboot. From ac586eb6ecd9b702a6130d74a9560e47bebca57e Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 26 Jan 2018 08:41:00 -0800 Subject: [PATCH 19/91] adding redirects for Microsoft 365 Business content --- .openpublishing.redirection.json | 17 ++++++++++++++++- 1 file changed, 16 insertions(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index f3f3b9294a..2e1d5727e9 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -8444,6 +8444,21 @@ "source_path": "windows/deployment/windows-10-auto-pilot.md", "redirect_url": "/windows/deployment/windows-autopilot/windows-10-autopilot", "redirect_document_id": true -} +}, +{ +"source_path": "bcs/index.md", +"redirect_url": "/microsoft-365/business/index", +"redirect_document_id": true +}, +{ +"source_path": "bcs/support/microsoft-365-business-faqs.md", +"redirect_url": "/microsoft-365/business/microsoft-365-business-faqs", +"redirect_document_id": true +}, +{ +"source_path": "bcs/support/transition-csp-subscription.md", +"redirect_url": "/microsoft-365/business/transition-csp-subscription", +"redirect_document_id": true +}, ] } \ No newline at end of file From 54271b81801d233fb11cdcc8de1b8f8735597931 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Fri, 26 Jan 2018 08:42:07 -0800 Subject: [PATCH 20/91] typo in JSON --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 2e1d5727e9..f8fae17740 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -8459,6 +8459,6 @@ "source_path": "bcs/support/transition-csp-subscription.md", "redirect_url": "/microsoft-365/business/transition-csp-subscription", "redirect_document_id": true -}, +} ] } \ No newline at end of file From 048806adff3e00e66bfb911cebb96d726d5bde08 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 26 Jan 2018 17:22:46 +0000 Subject: [PATCH 21/91] Merged PR 5504: add multi-app kiosk videos to topic --- .../change-history-for-configure-windows-10.md | 3 ++- .../lock-down-windows-10-to-specific-apps.md | 12 ++++++++++-- 2 files changed, 12 insertions(+), 3 deletions(-) diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index de4cac4bc0..bbc901d25d 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: high author: jdeckerms -ms.date: 01/24/2018 +ms.date: 01/26/2018 --- # Change history for Configure Windows 10 @@ -19,6 +19,7 @@ This topic lists new and updated topics in the [Configure Windows 10](index.md) New or changed topic | Description --- | --- +[Create a Windows 10 kiosk that runs multiple apps](lock-down-windows-10-to-specific-apps.md) | Added videos demonstrating how to use Microsoft Intune and how to use provisioning packages to configure multi-app kiosks. [ConnectivityProfiles](wcd/wcd-connectivityprofiles.md) | Added settings for VPN **Native** and **Third Party** profile types. [Start layout XML for desktop editions of Windows 10 (reference)](start-layout-xml-desktop.md) | Clarified that the TopMFUApps elements in layoutmodification.xml are not supported in Windows 10, version 1709. | [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) | New topic | diff --git a/windows/configuration/lock-down-windows-10-to-specific-apps.md b/windows/configuration/lock-down-windows-10-to-specific-apps.md index 06e04ade22..7e5d71562c 100644 --- a/windows/configuration/lock-down-windows-10-to-specific-apps.md +++ b/windows/configuration/lock-down-windows-10-to-specific-apps.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: edu, security author: jdeckerms ms.localizationpriority: high -ms.date: 10/30/2017 +ms.date: 11/26/2018 ms.author: jdecker --- @@ -20,7 +20,11 @@ ms.author: jdecker - Windows 10 -A [kiosk device](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) typically runs a single app, and users are prevented from accessing any features or functions on the device outside of the kiosk app. In Windows 10, version 1709, the [AssignedAccess configuration service provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp) has been expanded to make it easy for administrators to create kiosks that run more than one app. You can configure multi-app kiosks using a provisioning package. +A [kiosk device](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) typically runs a single app, and users are prevented from accessing any features or functions on the device outside of the kiosk app. In Windows 10, version 1709, the [AssignedAccess configuration service provider (CSP)](https://docs.microsoft.com/windows/client-management/mdm/assignedaccess-csp) has been expanded to make it easy for administrators to create kiosks that run more than one app. You can configure multi-app kiosks using Microsoft Intune or a provisioning package. + +Watch how to use Intune to configure a multi-app kiosk. + +>[!VIDEO https://www.microsoft.com/videoplayer/embed/ce9992ab-9fea-465d-b773-ee960b990c4a?autoplay=false] >[!NOTE] >For devices running versions of Windows 10 earlier than version 1709, you can [create AppLocker rules](lock-down-windows-10-applocker.md) to configure a multi-app kiosk. @@ -36,6 +40,10 @@ Process: 2. [Add XML file to provisioning package](#add-xml) 3. [Apply provisioning package to device](#apply-ppkg) +Watch how to use a provisioning package to configure a multi-app kiosk. + +>[!VIDEO https://www.microsoft.com/videoplayer/embed/fa125d0f-77e4-4f64-b03e-d634a4926884?autoplay=false] + If you don't want to use a provisioning package, you can deploy the configuration XML file using [mobile device management (MDM)](#alternate-methods) or you can configure assigned access using the [MDM Bridge WMI Provider](#bridge). ## Prerequisites From bb60482bf50776927664a84fcd393864daf1ae25 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 26 Jan 2018 19:33:33 +0000 Subject: [PATCH 22/91] Merged PR 5513: Updated AllowWarningForOtherDiskEncryption description in BitLocker CSP --- windows/client-management/mdm/bitlocker-csp.md | 15 +++++++++++---- .../new-in-windows-mdm-enrollment-management.md | 6 ++++++ 2 files changed, 17 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index b6f9f2667c..c432bac103 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -6,11 +6,14 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 10/30/2017 +ms.date: 01/04/2018 --- # BitLocker CSP +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + The BitLocker configuration service provider (CSP) is used by the enterprise to manage encryption of PCs and devices. This CSP was added in Windows 10, version 1703. > [!Note] @@ -794,6 +797,12 @@ The following diagram shows the BitLocker configuration service provider in tree

            Allows the Admin to disable the warning prompt for other disk encryption on the user machines.

            +> [!Important] +> Starting in Windows 10, next major update, the value 0 can only be set for Azure Active Directory joined devices. Windows will attempt to silently enable [BitLocker](https://docs.microsoft.com/en-us/windows/device-security/bitlocker/bitlocker-overview) for value 0. + +> [!Warning] +> When you enable BitLocker on a device with third party encryption, it may render the device unusable and will require reinstallation of Windows. + @@ -817,11 +826,9 @@ The following diagram shows the BitLocker configuration service provider in tree

            The following list shows the supported values:

            -- 0 – Disables the warning prompt. +- 0 – Disables the warning prompt. Starting in Windows 10, next major update, the value 0 can only be set for Azure Active Directory joined devices. Windows will attempt to silently enable BitLocker for value 0. - 1 (default) – Warning prompt allowed. -

            Admin should set the value to 0 to disable the warning. If you want to disable this policy use the following SyncML:

            - ``` syntax 110 diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 16d073feae..8c1b31d886 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1457,6 +1457,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
          • Search/AllowCortanaInAAD
          • Search/DoNotUseWebResults
          • Security/ConfigureWindowsPasswords
          • +
          • System/FeedbackHubAlwaysSaveDiagnosticsLocally
          • SystemServices/ConfigureHomeGroupListenerServiceStartupMode
          • SystemServices/ConfigureHomeGroupProviderServiceStartupMode
          • SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode
          • @@ -1507,6 +1508,11 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
          • Settings/AllowOnlineTips
          • System/DisableEnterpriseAuthProxy
          • +
            + + +
            Home
            [BitLocker CSP](bitlocker-csp.md)

            Updated the description for AllowWarningForOtherDiskEncryption to describe changes added in Windows 10, next major update.

            +
            From 8ac4c28055a3d8263bbd041ccdeaab5649dfaede Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 26 Jan 2018 21:43:14 +0000 Subject: [PATCH 23/91] Merged PR 5522: Fix some formatting problems Fix formatting --- .../upgrade/resolve-windows-10-upgrade-errors.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index 57f571beb1..858ea4aed7 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -7,7 +7,7 @@ ms.mktglfcycl: deploy ms.sitesec: library ms.pagetype: deploy author: greg-lindsay -ms.date: 01/25/2018 +ms.date: 01/26/2018 ms.localizationpriority: high --- @@ -110,18 +110,18 @@ Result codes can be matched to the type of error encountered. To match a result
            **C** = NTSTATUS value (ex: 0x**C**1900107) 2. Write down the last 4 digits of the error code (ex: 0x8007**0070** = 0070). These digits are the actual error code type as defined in the [HRESULT](https://msdn.microsoft.com/en-us/library/cc231198.aspx) or the [NTSTATUS](https://msdn.microsoft.com/en-us/library/cc231200.aspx) structure. Other digits in the code identify things such as the device type that produced the error. 3. Based on the type of error code determined in the first step (Win32 or NTSTATUS), match the 4 digits derived from the second step to either a Win32 error code or NTSTATUS value using the following links: - a. [Win32 error code](https://msdn.microsoft.com/en-us/library/cc231199.aspx) - b. [NTSTATUS value](https://msdn.microsoft.com/en-us/library/cc704588.aspx) + - [Win32 error code](https://msdn.microsoft.com/en-us/library/cc231199.aspx) + - [NTSTATUS value](https://msdn.microsoft.com/en-us/library/cc704588.aspx) Examples: - 0x80070070 - Based on the "8" this is a Win32 error code - - The last four digits are 0070, so look up 0x00000070 in the Win32 error code table - - The error is: ERROR_DISK_FULL + - The last four digits are 0070, so look up 0x00000070 in the [Win32 error code](https://msdn.microsoft.com/en-us/library/cc231199.aspx) table + - The error is: **ERROR_DISK_FULL** - 0xC1900107 - Based on the "C" this is an NTSTATUS error code - - The last four digits are 0107, so look up 0x00000107 in the NTSTATUS values table - - The error is: STATUS_SOME_NOT_MAPPED + - The last four digits are 0107, so look up 0x00000107 in the [NTSTATUS value](https://msdn.microsoft.com/en-us/library/cc704588.aspx) table + - The error is: **STATUS_SOME_NOT_MAPPED** Some result codes are self-explanatory, whereas others are more generic and require further analysis. In the examples shown above, ERROR_DISK_FULL indicates that the hard drive is full and additional room is needed to complete Windows upgrade. The message STATUS_SOME_NOT_MAPPED is more ambiguous, and means that an action is pending. In this case, the action pending is often the cleanup operation from a previous installation attempt, which can be resolved with a system reboot. From f78d8a96c84f371cfdddf5abf3e3a3f185506f0e Mon Sep 17 00:00:00 2001 From: Juli Hooper Date: Fri, 26 Jan 2018 22:41:09 +0000 Subject: [PATCH 24/91] Updated windows-defender-smartscreen-available-settings.md --- ...ows-defender-smartscreen-available-settings.md | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index bd04f6e218..d37253a594 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -6,9 +6,9 @@ ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: eross-msft +author: jasongerend ms.localizationpriority: high -ms.date: 10/13/2017 +ms.date: 1/26/2018 --- # Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings **Applies to:** @@ -69,7 +69,8 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor ## MDM settings -If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices. +If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices.

            +For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](../../client-management/mdm/policy-csp-internetexplorer.mdm). @@ -84,8 +85,8 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
          • URI full path. ./Vendor/MSFT/Policy/Config/Browser/AllowSmartScreen
          • Data type. Integer
          • Allowed values:
              -
            • 0 . Turns off Windows Defender SmartScreen.
            • -
            • 1. Turns on Windows Defender SmartScreen.
          • +
          • 0 . Turns off Windows Defender SmartScreen in Edge.
          • +
          • 1. Turns on Windows Defender SmartScreen in Edge.
          • @@ -108,8 +109,8 @@ If you manage your policies using Microsoft Intune, you'll want to use these MDM
          • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
          • Data type. Integer
          • Allowed values:
              -
            • 0 . Turns off SmartScreen in Windows.
            • -
            • 1. Turns on SmartScreen in Windows.
          • +
          • 0 . Turns off SmartScreen in Windows when apps and files are executed.
          • +
          • 1. Turns on SmartScreen in Windows when apps and files are executed.
          • From ddf0a94861c162cc42ed9892e3bf627cdd776e5a Mon Sep 17 00:00:00 2001 From: Juli Hooper Date: Fri, 26 Jan 2018 22:43:12 +0000 Subject: [PATCH 25/91] Updated windows-defender-smartscreen-available-settings.md --- .../windows-defender-smartscreen-available-settings.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index d37253a594..5c72c6bffa 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -109,8 +109,8 @@ For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplor
          • URI full path. ./Vendor/MSFT/Policy/Config/SmartScreen/EnableSmartScreenInShell
          • Data type. Integer
          • Allowed values:
              -
            • 0 . Turns off SmartScreen in Windows when apps and files are executed.
            • -
            • 1. Turns on SmartScreen in Windows when apps and files are executed.
          • +
          • 0 . Turns off SmartScreen in Windows for app and file execution.
          • +
          • 1. Turns on SmartScreen in Windows for app and file execution.
          • From d1c8dcc04d4f74dcf1023aea2f815b1a093e4f2c Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 26 Jan 2018 14:52:44 -0800 Subject: [PATCH 26/91] adding new assets and updates for SDS topic from SDS team --- .../03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png | Bin 0 -> 28865 bytes .../how-to-deploy-SDS-using-CSV-files-2a.PNG | Bin 0 -> 115293 bytes .../how-to-deploy-SDS-using-CSV-files-3.PNG | Bin 0 -> 149567 bytes .../how-to-deploy-SDS-using-CSV-files-4.PNG | Bin 0 -> 157984 bytes .../how-to-deploy-SDS-using-CSV-files-5.PNG | Bin 0 -> 183414 bytes education/get-started/use-school-data-sync.md | 150 +++++++------ .../use-school-data-sync_updated.md | 204 ++++++++++++++++++ 7 files changed, 287 insertions(+), 67 deletions(-) create mode 100644 education/get-started/images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png create mode 100644 education/get-started/images/how-to-deploy-SDS-using-CSV-files-2a.PNG create mode 100644 education/get-started/images/how-to-deploy-SDS-using-CSV-files-3.PNG create mode 100644 education/get-started/images/how-to-deploy-SDS-using-CSV-files-4.PNG create mode 100644 education/get-started/images/how-to-deploy-SDS-using-CSV-files-5.PNG create mode 100644 education/get-started/use-school-data-sync_updated.md diff --git a/education/get-started/images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png b/education/get-started/images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png new file mode 100644 index 0000000000000000000000000000000000000000..82aeef7c402575d24f5cf1d32a4c12e22c26238e GIT binary patch literal 28865 zcmbTe2UJsCw>C;sL=>b5uk@OLAV>`zq_=>8N)wO{0s-m0DFPxbL0TwE37|-mA}vTK zfOP3qdY90o-yMA4|NFjk&OP@ZH)HIK5%%7z%sJOwb3V^pL_X9~xp|%LIvyV0O*K_T zT|7KON<2LLylVu&_k?)cB5(uWO;<%8uc(J%75G79`vCd?53e+q^wj(c@SDU%)zA$O zkE|JY;kP^ITjAlkJW*48@W|VAbBffR;YT_+Fuhw-)zg**IhOv#O8Yg!>X672Y`Y{o zeV>&C@$J=yx4b+hh)u!Nn~I@BB7;MW!cyLV;w3)4rNwYtqBXDV0)(aE)xD!gC&M-x zEU7V8A+RBCG0(9JUU*TpemMB~)7r-;1(VMoSD`cYs2gfLKGhtr9TW#mJ+H!M z|9HUal2g;s)iv0$1BUpkvfn9~Z;uUn)-qv`c+VL1J%K|&_pj`erLBZU_^?7anR&g- zTvMG{eM;T4k=6?47ZPnlXpS28;7PL}zpZx{>#CU7L?cBe#-$cl2;Nc;`;enwc^IEm zFux62*B2Uow%h&o;#YNiBw5vz=R~E`L?W+YsP~VLk5ytA?ua`6Mfcz!=8lj}-}?tE zFQGd_dfHAi=(DvSpC~P-rl{ywKxNJMNNy*v^mP9KG0CUDcs|c??Y{Dsj{jcn>&5|+ zkoe;k56Ka7mz<`WqWI^}pTp&}69>ien$+J8&90-sl3uXAm43pjH~OO8mT%EgQzs-O z3=IuEORBWV6OMgEHm@4i8h<^C{q_@!oIR2ai4_ck>KuyzrH_wKbxYHN2jVw0YOjUW z`|ADZ2+kF^Rpx@Hx$I$?Ig_?^bS*U>J~Xx%SUM{yDOq^oNgHa-r{S8SQMt>@$Su{{ z5zy1ys{(J*m}zQ~N7U8ig1hX~^vpSx)w|l)--Fl5Y(5dSwzg7Q#lP(-Sk4SG4gK|! zo;f9OPx@?ckP4*P7hTvSb^D33in{3-#-XOr&ob8SE^o{ug92rBQ+mQq9jEK>|1|j` zr|G9^ST6fJ2`bElxA%A6?O&XOh(+O^f)X)ZbKvekJlu>=5d}Ow9bZP6uGo0 zw=Atq#ms==pQnH}-kq>N_G*W6Cpvqo^bQm&ul2EC*jap8@iut#=8drHilJDZyHx0^ zp;b=4vB~-OdspV}=a%{G+K^B-TU|)%VBZ~9Q@B|LTjj(RSrL1mzo_K3yZ9dJl(c3V zFEg@zb~rP_1zlhs@LiFS9n8}n=@7JRyHS{Q&wo+fL?%?~26Uprp{J-t)dcNtcph+o zUF_Or@>ff2w=F)ICBF!6izUkl-e>GBt~*Pyt`fhHnK<2DH*bC|0)eo{c@`4iq~j=c zFB!W~oEQ~2ByI@E18h|zI;O5CsKR^qJ47SAHHy}<{zu5{hj1oAKQsRwr9xvPqms7w z<&~!I`s0IgBk(q-jJ~><8yemTJwEoeUmbPZ4iUKszF1}ycO}Xeav3HoH1p*Yxc+)M z)4D6`#J4f!WBlgkF<~u}pqxc-Mm<7*n7uDRXR-R?e!_*Q@NM9+^@eU#(ZURU&|Wt4 z%{1uJ$sPZT&5E<)@_EfId7{UU9~*#~oR7&z313If?q*)powEl8n0qoVJl2NI-w$gt zzaG|1t)AhpeCoTB!T?zEUt%urPbF(ZLqoAx*P{p1uek_Y=GjcX~RFt4+sG^k9z3ppDcCpT*Rk8=rf&M?|}B})o-y|!t-oh z7=bI4E8gypO-$~EWQ2WDd(9q^aiw{W<6`!HF8MOmmCp53{by)V=V`}_5a)htnRE${ z=lxkqlAarVPFYL?M|&YX{2V1o(ex1YymUz~b(hb(W~tzF)c&tGaZwENBMRr~URC8@ zGiu%76zLhm64D79K};ykkx^Jz5`V*Pk0dSMQ@N*xhAGL~viH;&E(R%QTBpN)&s9r0 zv;}$m96vjZF^l~^k=DSy?T>tr;=X8-mt zfu_?V_q`o|A%aui&4Skh{4>&(>QyInOK<$OTPluog$=?9TUT&U-Ya#FyLo+a>=r(;ZjdJ&&@6Wrhx&^n^9vep-i`L zr#}1jhzp-%X%G@f>-ykAZ<+t1aIL#{M!aGD>xl?^lV;d2Dz2Ot^KJGCEg1@5gVhiq zHQw=9|1F3yUu9**%z3w<{aB61`ggJxK?+)aQ{IbiCQX*UxuV)F_+PaPqsGqlxA8^s z+XGMMncGom*Bhhw(cZn%hwsTdygcN96^xB$46YUoIzR17N;T#)i!Wfura5mL>~ArR zCG^;{YOB|Ja+bYK7JI>FGcng3?opdf$p6xK9W8A+t~e#y>othduF9iGEPk8DDa}P@ zRpYMVcbMMdzlJ@#c_5!axt6Hg9(3Y-0Y!HE)7AWX#T&n@_l94$Q7@Kg3~S9ZCjUiV zpIqt}-f%v%)nMFq!9a8d7Z1;12b)mA=g&7G951ro9Ytov(>`tk%N}7Ad6ubisg@Au zz6IK=#X($MFJyEia969B%uUxDE3XnMmq|PNA}ahfZjMt>Q&V@K&Qz=lv^ka#yRj=L z$)+(%OSi0(_;w2_E1zV)9qjtRyWEo(Ma$olA#H4-fS&*5i(b9YQP0rnx)XrTcBG#1 zeX6?8XnT-Ed3ZFUcToMc7u%IrTC@@c9$v$|5|pzMEVTh z8=7)B(HDMgYfs6hUXKsw*1#tR#bQ11z?q}&CNg5MMqZnoA8WpI*-25 z3RFwrtF z%l)VSpKDDp6T7?HOs!e}0B9>sGIL=tnUXYNLDwN$HOU8r^u&j)9lm*UJq^Fx%xbHD zXb6~1`?91uxCi{_@{&=TV$Y3@|J}}`r4!b4Ef?+>x*-zw=y$^zjpEC)SSNQ4tK>_kp@j}bT3+IzG zL4F6PsIo>!J~K4KJ^f-+sQbo>n8zCR@Idn6CrC5@%FKA6(|+QEq{<72pNcPjWP%3) z9}&waiJ~VywCUal{chjXkxLYZbck?sQRC~Wh6ea+aE{E zmdCTS%^OkfF?d31p;TZk)wsg^e7o`rdY|O{MFSxU^t-0Yf?kK4s2i+ z>4(uXVP-wWzgJA=MQ?m^LLXKbEo<_n5ED>wb(>sw1~wTw50Mu?6@^mXmy|pt5K4L7 z^YOg3&Z#0iRpvx9OSvW15Jk{I-3UTmu?V3VBehF{j)fVrwWnfU(YzHGrSJ#*xeB{z ze~g?3iQA)Fm2o&3%GuBxXg7lSOap~z?WJwoL@$mh8WC(xc?oCxq9_u@o<3c|SiPZ7;h7qk4gmK`t@_fw`Q*1< zub(}-)6M$j;nP-I!MU)gJ|{l{>4(1VldnNjIbYvktl;*qY#}6Rq7H&n*vV;0GwFP! z$=nZ>dWEWcK;Smt7Cjh^2V`$QB8rgGDQW7hq_Xi#OEyz0d*2AjlRb<&7_O&jnj~ro z>U4H?S_xu6d?S-LyM+n^mQ&=k6zvhMh=TX;@z(JPuXdnR9!lCn!7w2)nft-l1+LEIx<-NbBLixn@RXYeR&dX6pc-@9pATMMRm=V+ zg^-KMdK)=!MY%-2r&}4ZZIxAs>j-xZS_^JYRB5w!ZH#>>WfFOw;COJgo~F~a`_i@H z+*^X^3xDD|6iPX}{H{yj*-zH!Y?au=?@Zj>-2EM{BYL~xP?OK}XPTN|#F-l%5b+YB zWnG06laeNO$pz>ZxqO!OhLa&Sdee_pn1xchACc}3S3k|D7nL!-e-f|H#Icl)4JH)5qZOyl*obCh{yp@5|}C@MkMQP$C$Pe4K1z1!fZnVV3PNCJlkoTSF!0&E=842+0(635*TU zQJuKGj1+g~rac~)d&g`0?h(BBP?ThZNr_RTK*^b1&u(efU0K)xQF2SRA3 zhY%859H^2K4Ea!YHGC7k$UzLmXuJK<5l&AMDGSVx<@;nYB8=ViI&nq4?W+|J6G_uF z^Nj`c7j_dzNwKE6-$26ydZL^$%Ee)244F$@PGTwl{i;J?>SlW{g*T0%-a~PY?()jY zG9%GK{7rsZxY5=Gr6RQT+3xG*6%=4JL2=4)_OCn?6cl2o8Afonocc$0IQjkir3|Jr z?e!9~5^CNv;_9kKkT__9cG2;tT_!{ZU9$8LXR#1XN!w$O_b=^ZaU)DS5e5r2*9Aoz zfD-*jb;AIb5vHWp)qDuG>9}sG|7@(xV2Tl9vW)${o;}hZiQta%u~B}d1XgOhT)a5FzOj z6=<-cE2*Sy;I!wta0Y{3aK%_TZ8~+j1Vgf>Mk4PWY2UqOa@n^S_wJCkni`4C5w+rM zDzF|6fE8Vf(t4A>Cn51d&|09kJECMICqlhATW=bnEyIn8j^L6>Mn-VO;Jy;-ipnd( zfsCjy-c3IG^ge__CswHk8oalML$x5G0)PJj#KWpECh|xyb8_!s!a2x#p^*Ho_r#ae z^VTGCW|_kDhzMT<5*foRdp;A?@C^~`pQIE;)5VH8*q&){UmXB`d^RZk3FQ0Z>WV`O zsmS5a#>;AQ23LE=`#m>P^K=sV-zKxSM*&{NA;AjpyL2AzyidR0FMek4%z=!&Jlk8`JFQdD{bN8-MLts7ZcR^7RA0J-^#CaM(04gx>4(QFBH#3HI zH+{A-TL22Tw;|Z&tQ_-BX6Z!W%9eqprKOwOZalk6&f<85LlU2fd|U@qHj|xH6v~Ut zLmJBnVegGGNUf)npIc;%O>Dxyro_Y$M$-n>9}FE0n%Q%mVI$I)FXk4bH#bMD^tDoD zgUej>)jS;PneX;FAwfASMh^z?% za7wfUG*h(HvbUaoDWI{?*mEXmuIb9urs@I;m^0%?yE{Jg;oS!M=*>9Cz|Gv;39?M(U%AVjC8W_ppAMuXoHn7d zNNip#b?j4Yk$bc6X=gg&bz1+QBSI8ip`K#y8+npT=d(ou4h>?y-vPMBADh19+%v#I zii0PikSSqce~%5=umn&x0E##kzN$4nT6?lpOR+Iot+z!=P^kaeC~W`hi+QGiJsqOv z*EgF39*m3JW3e?YvmzmDKYGyv1dDT=_eA?6>c8GA??Bl@?j7uRkU*Ko_QIkR6XXAq zB|v2KZE<`eItdp9Vi+e6I|r5a-#ha!IIrP?OM41T^(xrS)6}WXsq1&~&#T~~F^Jxqu zR$(Y)YhjVZZ}LV7SvXnle}t_Z9zHmDB7Aib#SATOKW=WA;zR~yAZ>cm3gQ>Pg%EP_ zx;KZ&=Y0MQg`{CX6P0pW(?8QokIHk{i#xQY!wXaIw3?J+fJ1 zBHmZ?2AnOo)lE9XGPjk%t`6JDqsoH-L2Lc~8cc1RvGZ2MM=1bNHDk17u(CB<5N;?xa{Jqm2!FX+LO!~X}YQ^W@t_c@xOdM`}>8*TP?U;CF zcX>6YX!?_z*`N<4)r#7Qz<20<+a3n(0}>;&peqe!9)q=ULtwz;$G1(}S!H~%9CwW) zZ)&=CvSHZ~nT#G92=!FlTM!5ZMXL%M#OHd~7A@P_2V6+Zem$}}l8Z1I>3BF36jYF1 zR7A$93t(1`GN-?q#|hzXdReKi!wR$+stgCySNxnUcHEZJy|RQlY#!?mtaQn!YYDoq zJnS8l2jn)APoW83K01zKbt@`-V<6DK0g&78K*Z*<>_v4BD|xvC z`7;<>C*Bf@NdYz>tKGl7n(4)|cIEr`?{qq1-B3P8O13xnOQ0k&5{gzi+3(P!qa!*) zchv~4tH&lV?00qf@K+HQ?`4Ofz=zHwS3zD;;M*bcsRV~2H6iYGI3AAK;Ccmz!vXit zeof-z`}cC$Oc{54$1}O;1t8V#s-f?ak~B=^Y~sJ+;PFR5sJOClznUcc{TBv13Cm*P zPE-4EAOuwB-4s*!nT$_(YxY(eb5&^lKsZ+wr|aM|*Oj5i!GG{N!532LMXqFNze4!I z9=&WDA17alyQOpE*V&)xw%At`0 zqS!;DZw#TkT__^Ecv3t!HCH#+YX|DYldsB==PUsW!`6Do!B1bt!J6Ff=j5dgKfRxv zu@v*Zl}WmgQ!d-R(wUmcr$RThm!>;0`1m$XS!#H@9gQyybqQw$BB4GTtlygdiiHr_ zLCCdsBi?zElq8akMtw_bLEn~)?O=6vrJ9u+RM7$~_I|aRQTOfCPm}{xkmm#p7Gz0L z@ieQB1cjV&83st@Ng4|`1&|qOi=c00_fQJ5d(NhisEl$Q70B}#2Ec3AjwRyLa&R`# z2Za$#t-M;6DBO7pMxyEH=-}jE~V`6s;8uMWtiLbReDCrRg7T9)0a0m z1AsjKmIDWG8pGy5#JTI;N4B6O3<;O|E;LtYRn&l#Hj>$=vp@vJ8>4Mbg4vjSedLR2lH!!6FmY(|jEj1YbZc1)7UtgIp!1e>!c9meP5sYbk4LCjcG{ zSSdR;STfT=*2)h`p1FL55oH9p;d4v_G6UKyrYE!F1mdOS`w!T&3R`hA!Cb{0slK<6 z#}3@ga$NcjUD{P)WMl-Q$)$M>%mN{F#U|(s=}soWu>_0`YMmRnEUUvuQi#-qW6wHW zI6xSvP4Qlp8^XOrmNX+XGZwmA4UNmT!1}!SBT|&xzh?K7=yvXzZG1QLld=n`gkpl_ z*za>Lz03h@oivxLTdeVuB?bz&C`l}|a-}LGAGTA`w#RQl5qjQqaYyzVR|~YX~hYC3RTkMwaP|=9pfd2Q{ z0AA}-;`qNI?U90!|HV8mZ3s{+(Gm(shfhW>&O&hN4i19Bi-R=I#Mu{kkKQBX_?l7v zx+GG56kSz)m=w+#wPS>~RLTu5=2&>Fm%1$j*VMud?45kY5%M zbNn~o`d@|e?Qfg?wFElyj{okD?O0hk75z#LkA;)-w5D7ROdA+j8809=57)$ytIPDW zcml&qdhudUk1g-vAF%PHXlrz`vM}cnm3M@TQg|V;zV9yW*K825+ka&7x1auBhBBLp ze9myNeSSiCX&=t8y8r|N^xCVYZXuYddOh?UtAldP!>!I)JqYU^)~V#tDtGy8dq_2j zLqTPZiA-FIlKrLY4Bo~qng7~#*4zBrc@)|NJ(lNA4diRMM+BP?+=2~u@D+B6>y3XL z`<*!qb&8p=+8zaC*t5&6DeLVotLuK^Ro-pWA(>L=d+cRCKw9eN{2eAIk-A9LS9WD27jaWF^~E(_bp!lscBN?X=#U47u44W zw8t>wiXgI-qVC?ktCc49K@xC>nc6T3|KGp1&HRrD*{2V9&F+Xh9AOv7BO~%5K5m0$ z)?HHEm@iU-s0ASV7)M6rd%0tvQ8f1stk`B28!iGLJoK#rQieCTd437HtPbR!9Bz+1 zVasB2bsKDprk57yYQ=s@vhC0j9eN7Xe+=Gi2R3WZt;quVn7X;!^`$Fgk;gqvVWfv) zx6sIpss`XSTIKE?4i?@dqY2`Bg@?kOx;p)w>?{@b305Zun{=#@+q|36O1)Y`UalZW zMOBppwPUOTgrLx@0iB<(3ORjR=lx>3&Ibs_02Pi~_2Uxy>7kdoxzH#U?ONVUdI6OK zd92?8fI|=GXU_vwB+EVN2(fK_=YuvjFs()L1=UwU;%3X#Hlu=1kS#}f^ zNNlHtwN7IXV~~kw(X`OXO*U|NakR173&-Ay03T~(eVKCX=)9Xl&!h8)hl^Qx65lgr z&5)sU;Qel)-r1D3>g9|qN|LUIW*UTh6`ur+%nFvD~3SXfN^sP|+ak|GT7xdtmTnyCGJDY2UUdEuJQJLDNc$hwtfEmx`^x zoSd7x=x4)&8lW{;_!0`>OJ=kr;K?y&cBS-)B!JO(7xEz<@vR=*nyT$*W1Jl-(4)NM zQB*V_>Mn!)Hs)u)>5WUySBh;eMrP14vo9}fYc@nkJLx;(e+$P!FY4}eG>EPbPF!8biHSag7jh@>vjfF~ zd5w8|XUC8VT4Z`4Hxlx)n`gA{L2)N`rM$u*dr_O2d)f`VF~2K1eb$uaMJ}4P^K3q> zS4y0=)@oN*W1TiLfU0pdN`E2$M{TV6)NtTU2g5WsuTyWM9~H0bh&7&XG1M=SWE1Iin$T)r!}xC4!El)l3#&L*;+5TUKtC` zd4hK5rg{5=cfEfd19fuxJP=qEnBqLOhe+{gNYihyJTx6Uty0T1;CS7=i~9{6(RxzfQK;fn{HN@n(;!X3TYTmRe4k?xD94r1Xg3j zX8hQ7utWk=C8~y2(~k16CI=0|dpJk2-qt+5IuL(2t5GH;VSQzIz_s$IbNQF-!63mw%J(BqQNQmXS7u#Gg4$Lz z<^5XSi8`O%j(B#8_YD|+0z(WU`4_tj9Ii1Q->-Qmg2ZYZakdRtT)Rkur}D=borTdp znc2Pgm_AhO%scHh6X5+lLZI=b|F>X#y9XKax^eANo~%E9+TSQ8vTMK1rp$)m<*n`8 zO6v`yL2PW*tn;n1w`aAc-4cN5&`DR5RK<{WWVrGUM_B9Cq#(Z?l`7jly5)Vw!`R&l zuJM$I$y=1^`6Nxce`X|{7@ocxRVlFnTe^~N=s9fvvC|(`hFRFrWSvtpM>B)r;j(v8 z0F20{@MB~|qc+}q*RQvpc=+_CRW2vOxxL25!$Ocg6?uLXw(2=>)Dvn_cH*Y@eABa+ zUgwht3%RJRRlU1n`v9$aN6^LVCb&#a>Hq~a8 z{s4pPyRmGilSut~IK}c8z|Gn>5>Ci`5tnrhv62{!Vc@{0EA4`n7K4ur%2k7D2#ZJK zRpK(Plag+-aj8Cp5wrm8>b1Dl4YQBFPsOkp#kC-hFFEHEnV-M?BHPqF^Iqx9rX_cc zOThOYWk28`UASUjH3A2UZx|O`$|Z?8pB3*ZIx<^p*&X~8gu784WHBxahbKexED2x) zw!y^A{&Kdd?5-*G~b~@8n!;zo&dLfH#J$_ zPrDm}q=5?q%K-dGdCf6H!lSdN*yid&z`R#|X$NL5qo3#8XYND$v{M^)3fpYPl-@B@ zpr-sQE>qpj?TgO`Y91#iCsnSF^BTq&M0^4`-JD9i2XQW?)qT86oXBw6j|5U|v4C^z zk4%>Ri)rXt@(piC_BbPw9Lo6csv-6=S_i4|+$mE(Q=dEDKY~Sif{`V?_RO4M#hQ3e z1e7CAMvU+vR5%sdvIHtYFK77m+0DGF_RfB;@a~c3gX)6KwI53ww7BXUC1XZU2uF61 ze}xw0VDr;NHhzmJr2gXkWa%-zsdC53PbP29h$gD3g{OSUh<9*&Q*5aCdBZ7xskKEU|u8&6{bdf_&j7?@F|iR-k8VQY`fN z(PCwQ*-7&n^KJdllegDqz$Z(n-@A3ey>E-(eynQ{+LsL;lKprxlVpMU8 zqw7cFx5+(O<;{b8sqdZL^cd`5p*u=?Qe(tjvfZOw_5xAM_X4CAJB`hlR5cH>xwd&4 zHgGXfJxRgEN{;qp4&957%rwph)jY%(hPl*wHT?>n18R+fPLF)fGS6U##7sfk=N47L z1WOuMH6|ZqLrtcvxvQ=|SG($S z!UKWeD|2Z2rY;@cO~}u*gsB(v0l_C1h_V_J2;u8?-L5}eqR??(>(4GclsNoQ*bRM2 zOgn+3Lc8Xm2jxs2-dUlM}9mgA!Yz|~@CZf?~~pk&R_ z0t(>NBU;?M-26&${k9&W=QilXSCw7gINR)SN`LzJ(TZwgl${GQw>&3)*TaZo%^37@ zrLuLG%WpP>IIam+y+|Xa3shA|YZqb2)l!aD()_Weolt-x64HP7vyn7b3L63XFrX_$ zaIL&xH#)EU2lT68bQ;eWH!9fe^%frn%4h!8RFshAy_R6ML~|v)p1|VwlL=|#3pZSi zJsm@bUaAg#vTAzS9fVxgd7Tl=c1=y)rtJG6Yoy}qjFsYvbYFhRTs)r_5jl?(nggub zBrjPc+t1Ixy_jT{$gnWE9|Od@$wBvdH-RK#0+^o~0p(XvwW8rftsEbL`vjZ5vn=>G z060x@w@1FyKXJEE&G44e?K z!-+*Qk}Jxa$+|;bSD?{-*>B$wO|G`UuYH}WJ_#ugKSYW;4?CZieW0k_`Z`bM4s7fR zYTVPL;7&eO2|AC(6E0HUyPN$AWxdP|!9*NEB(3wnHVWDm#98KcE>aA@PwTvQcU6M+ zR0cu-Bss=a2GUp@bmjn6jcI4{+jvb6>k9x8 zb+uvkE#G1{W(yqZ^bZj9U$ff(#7%MVsNrSmdu$2ALN(uCqGa2ydJioKaA|eOxdCKx zdD&s;GDVk@4QRkXq%Rxa8=PGDlRW=BUV%vfxC1-)t)~wjgebED_2M_^gjFFCuGE*{ z5x}CuUa=Gqhu>fTutg~#Rn+~1kO9RMkTJ!9o1zpf&}UBDw{7$YIJi09!{L2aRDR`tew$PW0niP z#3U{zIU?0K^1x#bhnSm}*t1Nv8oUP`a3UcgaSO;7`|UkH5PCM|>tvTilEE9E6g{=K z7<*@OsSpCQK~~833~BlhXBfN!3{hhzOAuSXgnoZ7gSeyOkR@6@&}#Kd*suh)7XIH6 zjQ?T007&e>d?L+A`6in2BsRd(>Q3mDb*}*56=D0Fz)+kjDK*iHg2sUA>=IhsR5mg$ z`CyGMv1EGnoqGW@LE=06EndtIFYl{jn6#`BX0#;psu z2n;Yo=BmB-T2gXlYw!u&1__X;RtCP1YDYJprAmOqSXW_@F6FKYRp{f3#w=V(S5xD0 zI8>86!@o4;WGU*Me4*H&Z}aM+rTPSgi#l(@Go@I*quk@#KNniljxVy_jn!@GpdN^T z-Y54MjF6L{M_s``MowDs-SFd#lOz~b7)5 zN=WEH@dH4i?yv7a4erDrK>XAVvA}M~t|0EjR}K*tW|1S14~&O(D6(vp(ZE0SeaXrq z*u=6?sIU^N1*ruM@Rbsc(kC$ZMgEOZ$}_2%G$hxnGQcG%QwqL3ECb?5b;%wQ_)ENi z91|^0@oUkpqV`GU5!pGpRhN$C_X0?dD_2z;^g)#lE~w%fEf=*wjS(q}bR`M-V&;Y@ zPd@H=WIm8t9hpC)z8|Pp!xEp8Ky7=uyiz)#W0%y=KOpWuc;z2A_EE-UL8Jx4q&AXoi#_dlu8B=OhwyTY9TZO-CHfcIga=X1fsA#O$c={PAG`t{{@t zr!LXZADN%`2e;Kqm&m0EYkQF0@i&f(dgu zM9mFOrWTCL5*0tZ=;IRn!;PS&B7U&{=zlmwe>Wb zOBiUDh7*!<%4UD9nxvrJU9`HODTHOGRqF{%zV~ear(Wzz91*Ud_0I&N;7E=WmMLLz zv)|E^ubx_d1S61ful?N+c|C8)0T#^PhY}x{=lsbfC+1wY^ZL(w8t;(D^uT?;gN^(hhmjiyT}-O5Y?=O_D9A>_t^nh!K=PXvw1?x3tD zDZX+IaNfMem73Y;*GaB);=i7gxi`;yH*cBGKkSNnQ;{K09fyhr}%>h6b;c{kCMmdZYaO7pv ze{_kf;L$PLt)tjVfSL&Q`-a2z3Vz?9vu3&a{|1az=8$2te`M~mAAc^a zX*>t4T`Mm8b767>3@G5&q8br{@SC^WVYRql*%A~k|HrNaTg3mh8onig|8*-Eeasa4 zcfbG~8&hVTmE!`+7&p=1wpri*y_SwoKSjjZDaSH75kGwRFc?}G|MFIcX{7n=w-7ke zYEYal`}Z02Z&k`=)=51WX!He+>%reXg!rg~SA*+8#26cknQAvU5;){`d>8UB74?D5 z0-SVXb2vD-3*#L&YDgRw7%|X+#vE2Xh>xIA+pm)*?mufY*!vuF3j-}}ZTKP||Hp6q zGvmuGGdL(q^xx(vyUC1ORsWOs06=KK1O3aJ0I(O}O@QAi+OWH&XzE-P3YDGRyvqo( z!&M~q`CmkaAEBwuGy9tT_0;M^wFU`04=qN zg}Qc#*)@__7f;2A^x&1z-m@uoWb3#OEM|Z?`0-~k>#PCzyqz$P&2HtOcE2C~EGg}l z!yeIK%(E>3<=L{$mdS!s47xDApNvvcQ9X z{0g^A$w55y^z^7)5l6ZqlPFvOd@C8L>#q~}NVlK?qll*EOz{`F{{E$NW>e8jiv8$J z?SRH*tcBYe8Fx)yFu{>=h8(e~PS#+?@=?E1(L3!{<%%|Ir>0;I#>fZ0smM4yP1suf zjZ3O+7J<|SgW~*ws*Eyng8Qo^jB!u8O&wFesC^`G$CJF}`sg7L@0I7I|4pVfy_8k5 z=rq6F-=^wlr;9H`z)KhM{~p`_6QBN%`{4hQ8e{?i!@HxU;Iu!y83MWC%!|JO>K%c< zCv;7O5&cS2+?yUj=7e1e?iuW3L4kk=0-Tq;{itbLo|wQMf3N+H99^k$P~0)8!%-?& z{4P+a3RYo(gg|#WAEx|iHWL}g`*vZHsDsy_%XAgAxf0nNZ&uOy7n4Ik4YZj)!T8XhN(^9h9H1i$ypje>mgRq97&YaNhX&ccf@a

            )szD!0zpFjof%@@IXg6=%B`+k=3FpGcOI{!f#HMPnD-b-SE-=Q`x`Miy_(n?}_T5hNfQVG4suAI7nQ_zueRmQ+}$^ z+%Xka*kfc2!@EpvvNU%%qHge~vL468$m9KC7E#`CrPs9IZw08Ru>KJim!1@ctvSjj z0-c?G>yK?EaA#PV^V=?Ieycgx2zoKA;>Bhs={LSnmPG21lv*(rYJE|4-U-tNdLzm& zDjLq$)6t1nrV&1_4FB-&ZOj=SOrDiyUmTpdMcJ~*h@;-W=-j;)2fNi}Bw7lb4H5|* zMyT*_kG{e~+O>r4afEDV-C>h+g?;?=iC)HEY}|Z(`15GmeB9)#eK@B^i88Ze)=RgC zcmHF`2cd85XGUbBXZIYkOO!zpdmXZDadqqtIjk5crRwXZ&>J4sy=3KixUsIRtjHBL z(&Z?*##!Y9c#k7nq8#O&;RxVV&+AuV-+`(jFc~T8-)CUX@68?lhC4o4=7OTP2$m$Y z3-UGc|G$x6{G5`I;!MBJwLh+^lUlp1<5$+5tnC#pBGm=Zsfr>sByy5tyN!y1fA*uh*8;dqy=Ap(vwlVBN=$&$sG)8vM*RV$JT>pQRjKxGf-qP8W;~ zZat%l4&z6Mk^u)M6>X*80;A*tyX%RX0LO)allDP>$?mwZFZlx}{H2Xtu8~cCeZj7k zmB$XutBUzCT3r_=$6(^gQ#zYSFt>lK(S{S$O9 zvh^~Ld7Q`G7dql`Q0Hy!K0%k^7+h_$Fv`@$b@J7;0sP?L04SUVDy_3BDjp+siw=ce~A8_jPOdK!eyFqN6<8%ivG*p#Cd+G(vN^>J_dwCLB0tqDMLZoU|fjRCF3$ufXp*T4bu>S+s$=xWK$(1OkJicH?3 z!@X6{#+!3Xd(<(&L3cu8UFkDsDQ_3x@Nb@0x>1dL!HqOxvUW9~ZucntFzO0!M#cvX zK|3eKPUowqH7T`POkx5XYw@vZsr$>Mwq$`eOWjF#y{am~fw#bKF0$QGg)fbmeRBFj zSgQ9Ln1JeYVCSdnIR*X~15ka$+FDzO0r=*y_EZ>0X{LCSY?N?SIq1!Kwvs-T(nXM% z{tlRS`dm0FP@U#O-`LTB6CJ18i%Na{p&*Z@tqX&%Jli`a7v~t0AR(K>V%nh}=qm93 z*xp^YslC;~QsoM(43{0=x8FN1G?^5@VYDC9I5iSgEmc)xfin7`kr9W55{QnzJ@qpH zHGLO#(O0^>&gi#w(*PYqhBLAkT_^ypJqghflG=~1_qT22t9>Tnm%G2MQR#d9>Zyyu zS8-__m3F{Bb!E-p=TFxARTX^VGp+mTz4LRSlNQ`q;I7b#%KW~^8{4Bk8JE}38{2Ti zcR=P{#L%@~5l)tY{;i^*zDefQ@KoG&Oskf&)%Aqb`7uP;mrjqj=P^%$A~{WikmG(N zG_SHe?Yz6x#d$as+7VAcH3Y=@bPJWNGHim}^K-*su!;ObzWbL}RO zI#sTE@{d-#+1lF|z&M;h4lo##fQ4dgMzyqy*EyE|qD+6Anh67xq64(vApqT16pTD8 z%1XT>?z&LBjppG;;#R&rcg8R8#)9sN8XzSbE&TKe0X6$-qSyREsP0!2DY_ML)*b)T z(CVUqlhE@%IE=*=EKCFY#p36uw$azlYU)aB6YcajsQM(Dg#<9n1_+ntm%K;@sp(5 zw-E_CI)vX;uE2Cf7S^>p+Twq-JId!VG)O6O%Im1*gc@SPmGc9F>v~{ zkjegT&d>OuXio9AP#E{Lr)w7qi^a-boVjWTuy=Wx&HNbNok=I@EwI9^gmM*?cHlh5 zCKy=KMRO!K6lS|lqw2oc_WtDXG-_9KxjPkCwhBf_cV!C=ThfNM)7A|R2RgO^}J=?t%Rw{V!2>9slC`&TjCTtM{gi&P=0;te30LE)+Oyg-%XTF zEbw3;j7R^4XfdgeLpJSWrwTDz1hcZw*0{%SM_T|>S{|Q)p$0~NlNpf zArWVPgXZ*J^5eZ?zt!y^v5GY$733_ll{j-Ua3@}||6;3ndHAWsqk?uZCf^m-IyU&% z($bw_V`m_t&x4GY>RTZ5jLjMsInf;eGq8koZsWB7v?x(5bmUS#Te+Y-2OI$%VjTG} z;rBxNqv)e|{3g$rLzu^M1aguiHFRf{K~1 z_2Go^Vf5YNAeepq)@apsI-_4EZ>oLIlS=Qzt&-nbzn_NkIyE#?F96J=kWKeBb&6m| zA?r@+x5+T#=C10WKYvnNBTm(|AQBRNWB$i?@I^VVx+Bacj#8z3Tme!a>Qrt%OI-nqTzgae;#Q)^O$S^uQky+a`Bs(pes?P$po*nBQ6gT5-FEB10wdKY; zEqE~APtMGHd~rV0!_Iza65u)W!?t9jUczGg$IQ09PtAF!-UO1_WJ1j4xF_hZ`CZr` zuFAz{gy;&FMfqrMFjzFbpKW_(HXk_LC=S*D{KYbG{N$J0gSP~BL-{%eU3`9nyBSn; znchE1gxO3hp8o)C@HOj1-|!i+?M@c3(?$on%R$C?77Xm;|59NktC2(pbRXp^ zxQ-?G*N#{M2Wq*XQYi#L;Kw&r`Ro@^hZ9pzPn7BhMDtZQ8Xv~9TlqDVzifLVDrF_uK2fLaJURx*VohO$kzihm5p;^#wum%gP zq}kfA!rAsw5uD`(fX6Pqelfqs_Vw%6iPogp?LJdNOPQ-B_x!vgi8`R5GyCJJ6wAk) zlFXCk>BT507IajDHf@A$oSF4k*o8v_Ga9zt#!|0Ju1DOFs7@DmUBKJYz&y4CP3+}2 zDiG(+ojWRUiWC@C1kWul196~46EVQ8BFKI^Y3V%E%TqC2yW76Az}>N8UiB`@AA%!Fsec<@U9qb%{Bruqp7T!q2)c4DrTH#KS)}Tm zjMkldjTbERPU&c#P=&+^+^2~u)(XH1M@V1^V}EujGb_3UI?pLG3uOcrjo4oEvY;ui zl%P35h!Sh$?BA30(B|VDVH%OzfY0?WF+P+O^e}N7KgVMx0eXi^VwuS&0M!nu5-=K) zH%XSZ$1C~jmyNtpJSa&ySjs4!N)S$7Qa>0Cp!~tZh@`nqN z_Ho?OQ9J6fvCT_;iR{Tid=-GN3^?~K?u^*)^EwUdN&Qlve+M) z>lcu5FI+v@s$7@ZyvduH6C1yagngK26|7#ZTE{>WD5aNP<`T7}?zcEW_d5a_JeR~f z5)mC4eGxl9HxO-u-ut6t>n5(&dz!aWJUwUY(`_P0gtt;UByT(Psl8Yf_`25rwWs zqA9T)=ym`%h%(Jat*jAPQ{~!_O^d*7w34|^ zG)#d0P}J~)T6)cm7_vaOZO!3v>#Lf(IfhFSHBPuovg^JKs#5U8!I&#+wk4EwxbseN zq*`rF?*}AfH}T&uISOzHzOhcl*Rf2hGhS@<4r%Vy)SpG4J_>GtMnuWmcg7FURgPs_ z_@^y=x3#3oT7YCoiAl^@@qB-Z>kHBrX3CMbInI<1GSfKktORzzr!Qlpmd2f0UGe-p zJZ_sqbsl6`VLPQTry;j5 zSbRTX(u>FMq{I8kL4m8)s|!px#c*R`+}68;G`B`4l3{6={YILRT@!&hec&-``CZ0e$hKvEj_{CoHdJ4x(YcgAW5g<*CK zD*}qM)q+s%HM(A7#`5i-!ce>Iis*AL5qH+-Gak_HRrh1|P0ll`((bhrf0A4x=Uc=# zL2=dNJcgt2?FI(BxF6@{aa=1{ap?u~=ls);-%iKw)-8s$Y2O>cQ0+J)d^+ke9(O0m zycp)?1HHU=^j9Oh=0VgBbaYh23&{BNcNWfVkj{HV^rKD>@Uu}nn#2w)xw`&)KB3) zXp7D$S-mf<>evQ(>cMOwufbY**pId&!!9eC-)S2JIZ}S{fMzbt7o+$UsYIrNqd&(#gb6vXk$YjuzPAu*2qs>j=FBUF6 zJ2V&V4+F;u?CHyx4EPSnz4EJ9c(9{@^bLZp-L)P&*BM;XX^kM7jWwGhpuqCM=V1Tb zm0O2$9I@vPGmQT1l+e7zr8|M$6tSw|aTt|fg9u||fLwaG%|rtww@3&21Yr$6UnhsE7sxH2EJL+qn002xc1>eCaB)D0%T zB%u!=iJ2R`Sc#vzv$L_OyB6Nw`|L(un-wE_Yq`>|BnjW3@JHCp#g9eJ0Ug!vUVF{k zfa-bnP?Ctl4`5RTjhOl(9{EEE26>_dN-1?f_V^RXGvD$$y6$J_IXO9jX2FG73^2W^ zwp2vX+DL&12L2GCM9h@G(qu}Y|*dIO!#H7G8ag;`4S6k1a@JuxdSCO%L9^L%J zW_;LY7h(c>^tq$AxocZHa zDW}i8v^qscK@l8h+P3;qV*Gov29AunsWM*sX@x+=oA}D+jxKJ;lHF;&+qYfD@lW5q zdk50TRIszVTdVqZ!yhh2{Dh}#?>uxLi&kDUWNkSjXtBX(vhLyruU!4TeP>r1gFS4X zGh_2FQQb3C&kSqxvszY1bcj0OXr1UnT0+&bkrZ{>&C;Y>&C^OQ?s~8RI%|{aNounN z-fgVZ#v5PJItq1XnR_l!HoUVb4y_($9($SVEm|{@%Lx9isURl4u%WptaeMcBID=a% zDc~=UbjqH8ig2xR@}?zq<^R-~WO*f@z=E%W>Rv?uFp{|8dWS^j_>+^0F~drNyNqv3 zGaHe*Q0c+IVrz@59c#{rdyP5oWWp~Z{fwsa8Cd(rgCL`KjYrSN`bfyuCLly!)aNVyo{F6 zbjnAn4Fs|lrS6P@jvR89FDs}kHfwX*1DJ!oO`9!UgGbmXX4O(q*<4E`sm_uQ3anLm zkO^pS+=U-LaTLaB@xJ*VHbZ=&p+g>WKw?7*{8$4g_69rqr1e{ z%XEnB4(xj}?kkBPi*pxyX{1_hebbH6qPBXLH;e4s#VEFnefHg+Gc#OUj5;ecwo!sy z2}SDH_;6lS5^+bMbQP0OwS|_x!z4V(HGm#0&rFD;h$i zcTH(ELBQAZj5~YLYtiFiVPsESvb*-54r9A~{@q~J&d{RNdatfP_3pJtSqaAOK%eGN zm{G1`gXCjTSZJst@sW4Qp#z?R4bODsvarSmFfacm$4CIb#sKJ;SqwDcgf`U{g?UcR zu>i33bPIGPy%-$qP+neaQ%E}n_^jy9U(BzzdhpSl@;+y&jLxDpz)+GY@YUk*b&NiG>ByYDI`pp}&Z<|kOk!tE9Q?as}nR z*O;DpjS2gX`ccBHA*om2#J-5A8jRT&^Q5$ig0a<($1VtnJDsBy;P zC%%Yrb}|qROCCw??73K&A3GL&bbE*&EuJ!mj^qWMyCmS_dCp>Fb{3{UT7H;r zjxX%tz7F|hp(f`|wMRvyOlS8PMFbrh+NFZM(xL|C!oS5Yt~W&#ff54V`DnW%OJcff z3NC}~FZ!>R@Y`h6p0wnEbTt;B%?hH*$D0Yt0q~kEhRCJ*Sg*864qEwRJ3IRvC1-m` zMq+@!c`^8-xfB)CQwx|ENT-o1FGm=SN(WHtGoy(pf>$Dr2db?a46Ico?By?J$_c$% zp`*f&wLg^~e108zU!*$S3-Llgz!b?JC`MQruAuh87wGD|@v{dc@J>ry8sxFWV zLRL{qlG>x45yo0NI@jz+Wrjj8ep`O_jDBb;jCPZIDjBeS8nmVw*26x#;#=z~W2ZwN z2D0uoG+i5Ev#!}T>d$6Sh;uqV3EJP`P2SH+Y{nsodcz!fDdy@&x%i)kg z5;o6r_5E@sE1uN3-jdfWCY`!3{kgg4-5SB%Q=2F*m5S?x144ZFKo_ZI9!qIZ4<6c2 zcM5lRIazn%ec8?gy#yD*T#PtBc7soDMy*!V;dK|9LiqOhMK{#5)kG(@j{`Ck(Z!-h z-(uLd{AD*(dHd{s4vQt8|5mbgHGx2cRfX5S!m)PDIYMkP&bp?)B`N3|8~wP3DPOLf zPuVHaYQd9JExNFDm2FfFYDmNdjhvUlbe>_u^Bo_byd@3`X`UZ&6*CEKHyoyrr^6I9 zUsXzUgj+QlL#z@$Q8#H%pj=~C89D7?(_tU$oGl^!5T|Hg1V+jC?Khz&+oaPQjBLpa z4tDkAglM99k})?X0@yfxtC32ukqGIR4WmzfvI&rDwBc3 zsd6V$9V03o zj>U{$=e)nDxgd5<9|JPf2TX#6ZpCEvQ9QZozHfPA0!44BAk526`GVpmWkjV3^XES@ zhW1a#h}?ytBzJ&(3C4_5@_M`sui-us@*C zZM&!YfVSc#wbj+nq-LT|r-NlQLZuw#Nf zYI#MZM36@(hwLwhjR_~45#EU4Y3IInJXO*iG|l>z|9168szAl405OqO1n}=b=NPrn zjT`6a=-5TPw%6i#bg6`3FhDsxR|C42R8>`}k^$Zf(nAu^S$h@87(p7JFsF(-LH!Sf z;o{@jM1WG{%R9wXj8dMip!`8X!6YUG$b=AL3dTfXyG#C{*%)9BEdA9!2LSSqya)6I z0TJ+&Kd73>0?~So%R<@AI24s8Ar8U7z_(0<-;E za=(op0$OH4wM6j^5G(3InbYyBz#HDE+f9dCZoBg>}&3D3L?VL9(H1~@fFKQ zz8}uiqxANiB=$Go!yxZ94EYERMGKe-7EUiv6Mhr_rVM#s{l1SxknjRAB=F z8^{P6&SZw1U=LeX@GYz-VgG1l-b#IMcUf1)HTwUR;{{NJM{w(lM% z;w~mzE5x}Sy9kvW^`s2Yp7KMTJ);%mpogJOcYi!SO2wxGOAkP~=iH)uw0scZ6J--J0kU7Cq+k5u{jf(B21^d#h!gBE?pj=T@(i%%nI=-WIraN7;N zN;)T#%$kx3VrDstlRSHR`BIpodG+7OuxAX{9nL8stcY|yDz{GdhWW5!qHoQE$m_5d8XTw^d7c0^e%DsAR4NZfj1A{Hy=K8fG+IY}L z00KuI(2WBc&iM@AYq7IssQ(H;b#C9zr6#hmvPuLkO8tfAKs;l*CIw({!EK=Ivp(Br zBTd%u$0`R_i@^!jJD0wH(!P{_zZ)tIYMps`S}N&*-B8uqKYq~yl+o#a_+F1Vf$P)^jaI(ma4-@<989 zt>d5O{{6LvC!awHcdgxkmh~BzDcGH(1*(ll1O){#okz`3;1$8neP=!eC#XMMNF3N5 z^oUr@2ww7FcXhWshvjI!h7u3}eF3XbZYs;}43g*8N+kvP6T=+dCF!@fE$7dVsNah}K zt?y_$TMBX!=qZYPkt%NM;l}28#~^fLn-OW$&WppgGaM+h1k{grS=R{}NxEeVm}P(X zdTUxLbL@U5MV_*xr$!oYB4f{RQcMLCMd*t(HDQZk&zOBHN+;!Q(!=AC8l-#d zc@%lD+>_IDp}?@yTSx!!SGCe^vj1=}S^hrwglmWY{q3CK)!Uz&r@Ar^Ws|hD(gx!} zbN<}t2#u+i+IqO_;P&SjQI)PS>He388vx}Cr80`3XxgjXSgk6R7Ep3cNeSClB6|kt z!Jrp~C5pafAm2U>1i>PVlZ72Dxj;X-Li!7sgK~O(>Ejm3JxgF~p2wjJ+a16=0pn#q zK7%}S`GW3LQw2hQP*L4+fTNzOsZh?qUW4>w@<1u77Op$8>$EP1)+*kNX+?#|SC zUm;Qd?ysuyoLld@?|IC1zGh_Xw1DL&142J1ym6dK_gUak_+{Mvy@DAV{+vkuix)ki zOvUQosEVdpR^g&{Yoi!4rVfA&Qxb`h8~z=nd%U=wvV$eeUfAkp!zuNG~!L zb5hTsnh~Cn?k&)K$4=IV0~}n@ zGs+apamo|7)GP8!PIx%nC3*91mWz>1*_4kM@777|HzccKYO#T5b%t9mJ~fwx6}C9F ziK_p@?DLA6w;m=-^O)7{#!%b{iDMFh5a6l9=IIs7P0!$p;OHhuE#o+8U{C$&$pkWW zpi*{*^&`_VW4J!RS9DcCh|~9bO&*%Sw57p0hylbEzz;rl`Tz1<|Ga`h!{gug=Kp*v z|N9mEFQg>YBI9HYU{z5iOL{niu6_~_*MP1E>SQS|cYGWV2^b&no*o^lPXOmbqJfhT zwf!mt;nGM>l=2eu2d}c}NEW530VO&$H8pBRQAdj}FYl00FiS~zY@i?^6im;=UHJWh zj&Lhhm{L|={u4kKspm$j4}gfE@*9`MVIW#?vIa1QhCNpikoEO-Kz~zsP|Nq2h zf)&Od^Ec|+AG5RJ8UJU@=@_m0oy7bBPGuw@wo5(5#ac}ovVSKsAb9A7gUg5nba$vS za^tds90QK=G6f#276)jUWS7Yg#FNSbDX~Xfmbuaxr{N^kDD%wd%LrjPnV?AzC)4(T zlk1O|OlRaCp9Jk^wvG!PiRR{tzc7?ruyl99o1sQGF?UJf4>_~m$@o4~qG*J+vsBN0 zGR_wrqk5T*ox3p}>4jPWX*~36tiXjyWn!n$xubphT2F+Q}`^m_d{P z5g~;k`9M=#lzHsQs86z&FP#*&Fle>T?lR;^3|D3!mAIcE#3s1Oxqm!p_D&IL$94{3 zsFon99=Qghdwl+U9DTRdWd`uNpB~IAAC}5B^2THW{uC(U&rgi85Jh}r7kxt7dNHf+ z>YK3rvn@l!y3(czB~98otV#0r0``v9pgXhLOyhWENwEdUx;tij8ZswZZ(_4T>^cH4aLXMRCm*{EyTXIUEf zF)Bu|8$v=>7%zMIGzRanV4x;;r@`nK<_WT24lL-u<9^C<-V_g&5!RJ(^B;5mNa`T( z*ux!QUtv|3vljirQ4E?!?Zpvweu)p4)h^G{hiZT9T&8FpCr*SDAJqJndxB^pj;@^g z1XCwMSSO~afgk;`*g7pO8VmE&ZRS9$5DKZ@37`PCnW?ad*H!R6=PD#yzU zZj(Ib|BBE4zg)!QfctR7Y)hmr91d4j4yhw~!*g}~!r$OP;9(VI%-8Yp@fpLIz`zOX z>+PLt;F1E1-v3=D4Uzg2B9?|l|CD{msXUOYN-(4!wa)r?&aEpifAULvg_=QIqP}x> zu#~eAvdhJz`hnj;OKMh$wjS@84ml z#q}BJd{aoQZCV-&GyrOrRa|ABxfY+%a3QHfOL}Fu|2Q7Ubf~M=T*&MAlF=XWGFIGN zKqEX2$gSx_r5mBSzh;cfb5y+z9}4a7m2sMA1uxjKF*0H@&{Aamct{i~Jbl$2&o77t zf@^}2a-MVjR~ZQb>9{{mNz@)NtJ|m9yWv#le$`62>D=(4Q7vWl*E#wR<~u$}FK@2< z9Hh=E#ogd)q-Bwj?Qvh>ChV28s`0d z&;Rxye#}E|_uB)v1@`KPUl03(O`xgHRhvoLsONuE-~-nCIVk^TdUi$dX2r5x{&gE_ z^RL8F@7Z>(q*wp@)b`(5ZFQRbADWQ+N;B7i&&;~{X*p4uS@7Dy6L3Whg#x*I{{IWk Cvww>K literal 0 HcmV?d00001 diff --git a/education/get-started/images/how-to-deploy-SDS-using-CSV-files-2a.PNG b/education/get-started/images/how-to-deploy-SDS-using-CSV-files-2a.PNG new file mode 100644 index 0000000000000000000000000000000000000000..1dcae48622a6c21624b9a67d007286a7775b58eb GIT binary patch literal 115293 zcmZU)byQo?*DXqEad#`ltqI;jad(Fnf@_fCP~3_`2~Ke-6k1w>L(t*`_ZCTTcXz${ zzVE*Ge(&BtGWIwbXXNa&v-Vtb&AE20wx$vRE-fw^8XAF$vb-)D+6x0TG;}03Ch8lh zdsiFO@XS+JNfxbQ^yLof;)R`zh71~7bt2xqB?jsm$4%ML6Ag`$?Y}uymF70j@VN zhC<%|=+Bi9U-u`>D9Ll7x(lgxSJ2v~o9*VX8zyGp%vr0T-O&EheoAy7NZXfYo$6oHf2a&oYr=SI@K%UIdLbd+*r_PnX#l&drGx6r0Ic z{J-->OCM`qoYY||2yXYXSj6b$}pL$4r@N59X@1Fwh#n{L;VnH{ zo(TvzPD76ahBNuYw7&#D+(yEZOCPY8H2E|k)cnkr0VHif)MDOH0&2dFC?baZW53^g z{^$04$OhLgyI)~jCEva=4#%Zr1HdVOCK}I!Mem>ksqA=Vn(9?-~*&I=?-x}F(xPV=O7J1@+9@3hcn%A~I0%2nJ{}U^}Xaw9>dybd3uJ7*y zhlYm8BE~5d6JF9FqUBe^%#xCm3#(8+>eI zWi_B&-#| zWWNoy?;OMoi+VCSBRD)iKOe`gt*LQZgU5@>DFc%LjbHzJa=L;xT@g4dQtP;sxJ^w> zmLve|It(EB<=EGIU^CCIx(Jm8?V zaIDSPz}Ib%PSBT{DxV}HkCJ_%WKj>cO)24%muw#3r{snHuMiOjZ+}O^N{tkdgV1E~ zCBk ztBwc8UWV7+^j!Mt2+Ucny4=hV1u@VDXCy4r?&Nb|XINBcD>EL=e{bQokuLFqeY_M2 z4g(KvF*}*-f{Yy7n|d-sj5Y67M+Gh2CJMZ*07TXQviNVB0^HUeYjT3Auhny{rQ{p z90^{^F(|1|^&V$d>T3`10iu4zi5aF=_@o~VVUUu9jD3~3{LXAS`~!bBOu^4{njm`N zr>u|*;-lXUp40p+iBOff-QG;gcLMtPsUKPeRzvBPUq&bfw!l;#CBEIF0oB%0cRF#F zmwA*FsQ}O~i}KTp`3;x^B?tH&ctTXH3_F#IvsIRAlC# zocOdF6yk8@zW;Yv+Gt^{=4apn@dX71^suR$u>1Mhr~6EgH0QX}7R2s8mebm>r}M+Pr_(~+P`SlzMta_d-bk1> zOHz!9<;n;auD$jA)*e6f#`okaHgv{*ERKp-vx$^(PB;bFltLGtNa4p>FLLJO9;{@X z>eb+!?WgGkeK#|$`3G@o_o-puDW2jEkiulpSU}9*?k8d>6mr-o?N3h7+J_4daq-J? zNYCKs+Pum+PGK`({D8Z)1+w){h|kJ$miq}t_SDS=zIBZn8OwFSv%P58kZ`S=_j9QB z?E|??&u6x$@Rg}ne0v(r5$3(O)8PNKJx)w{c2lbJU01W}IFtr%i=CtpM|sd{>}9#o zP5ZeX+vc5}vxvwj31hBj_w@+vK!|~2Chz7CJ49(`!CV?sywlvdn6u~YSJ>MJUE>1p zybZ0ue#I+CTQWFdeV2lo&+Th-Zzh8pYn+zrcu5t*a%t%Oef`Ph#y&U{G*`tY^vfA( zN!Q@gAa-k`|1p4g8erGDII}sbf*1Qm)!W;fniD_@)h!)A#r5h8!zc_}WmByioWWRN!oIL)kr!}X> z`-gl{^}~mLWE^jsy=&Wzt@g*E)WIacjbAl}qiy;{0bk!D&AUE-En2X`T*KV-FRZ!A z$B>$HNdjQ`6Ea<-G`akxZ{bMZ+uE+kDs4}hh2B&EbfXJBaE}t%M&JSVvv&pK?DhVu zu4h5^rPlvQ`Rnv6#)OOMg9p&sEdAn@aNi>ByBSOknvZ3*mG$MR!A^0vc@~~`Le+B* zOV#@_iHI*U2D9^Z_^6=a8e}nOjQVs;RJfnOB?Mme1?)d1anpHMmLER38uOpB8^7K5 zAIkgN>2Zpy+N~O8VwhB5t+!>16qKmlpZD3CD=;6aTKbb_84@6YJoImG-?)O>0hE>; z_ii7$zrZE!)v)GW=60rhj7Hzbn^@k5s~2h=mlVo`V`8AATi$;+VFdj?Em^3ExS=)8 zq>`KZp@H;k_!wq3mK}XdE$m`~=Ey>ID&Tv(e4OirlMaMz4UhtJ;u?AoeedX`zQva3 zc;*=%D%j3Z<$(VstfZto%~c18)H|;fBb~J?eYgQFtEO*AJiyUjwC^S#8*Y|y$BZnI zV`Jty7I~X#AgI%P%>t|^7&=?^?{GH<{FK+B<=5fAp;YZFwfpu>I>c4|jbE8`$yrpP z_{zwONR{tD1cq|d4ZocXY?k(<0^;!y5k)QDd0ZS8iS- z(=T9tplS6aCAaCToZOj+sv#CXi)B!i>TBM=fDMCun&VJ*{30MFsiBF=rHQ>-ntQ7P z+JT2w}_w#)Z}8#TB%qtF%asUY~)!EwH^`eOH=W2KYb z^=?@u`mgTQsHS)fvm7C3^iEwGJW9mJqs2eZMa~BSl_1o@%9&x8wR-2`H-**oAUkBp zY?0RHTJ;>ac7_GHkFbj6Bbe7JQMu0;)t;bG-$wHJ1%E8-OEq;Fy`X2GsC^&aC|zWSMf#fAAkd}r_wxm3VR9S9F3r&_ zEHoOKK!Y`xFn~2zbI4&BjOaIos-o^=)EA8(f=RXITGrG4FfQ-&S&f~&NUhz^(2B3( zU1~>oLmp!d5l@CEN#Rh7b6vwdY9>=Eq=hHw~cvC>ibY_l?a5b z2-RGa$jt2WqO0NJ{prjS+xnoMzGL5yx0hB}P<>J|#st#1uQ=0wTl$PZeV7x{5^vfG zM%U6ut5Tbc%6zd8=~z%OZO9~Yy8Kpgz%r?@Fr8zx^~Uct@UKP9ATy|xbzX^$sY#%9 z{BSSVI=;E2kA08S1N;EjfY~niBgq}b_xQO?8T2})UF-fi&LDqN3ppW3<*K=j+lq#- zjbTm>7ke{He)UI@0;n*;#e>LGO5Pdq*#+EeWXLJ~CJen<7rS_?Kz%$Wb|l_%wHQ#w zJ@$cOG1s%B?n-P@*loE(*S1v@TYlB*8(aS4!(FtBtrofZ>G)4Ah5%H-D+_|qxv(j{ z68*GI9L&Ljzddm(%}F-7vw@ykfZLfy##SG2b!aKRHX{9jqf&xoSVF?}-senKXTmn@n);rPQldAW}=Ik1V9=SYXcO$dSAu2Gv9Q^gUb;|hn=4#Xm{AE2je4> z9p*cF`|&Slaf{#C=HC`_3cR4G(NH32jGQ-|^1+L{;rl($$6ocrLWb7MK(B*Z zj`sUi<7RLj^qRha=ybs9AIXSthx2(;WqHw9Y+t1WAyKs5$s^f6^A9qhlXYCX4KR&{LQZw{nrPP(LMh3zJkz5d3a*hk1) zAnyV|zX4>JWW7aB+8(tzc7c(_`Y?xO1(@|;-Vyf4ztAxm*h=k^kxqsh)IwEwXcR#6 ze24|L$C~5EYQl5men|fwu7C1lUq}dK>JFY@Mn2xFGu&O*J90miwP$OH_B)+xIS2eK znA;_Ms@nK-RF%6AB_{Oy^?L(1?1Q;sS2L-ujTR2&ba8}SE0iv?`&ajGY+jOT)!2lS z0qi}D^QJF0mMf%mbCq8Y`kU(_#6#r=VmUroefB-Mo1-$GIBynmQceUJesz{HQLP}S zut93Lde<9m5VO>0$Jd0LGq{?U1j#|27Gd3!8LoABZMn|%`81aG*$F@fuoIP)BN>u++$TX+fEVdIg)llW~Dm~~=JH3&0?w(-NAT<7@ak$MGy zTL0G#fPwK!%0{TNWszB)H=;Ik)hT&t^2F&W8zi~tLY&ws*&X38fE{987H$_Egm(JJ?5gd;z|8UAa-ef_j{!CuiP|v?Om>@r%w`CU+jVzILtm)43u5WW!qpAuf5S zlF(zxV)%2h8y>|Xw6;Ux-F{rd<$!9PI5GQN!&0zVCYLUyIx(?OK(iZrW$^?DA&gnz z$8i+c71wK_E$D9YzFPULoS9zC8$ap2nLR_DBW$UPQJodo=J$9pV}8`C7lh7*E<;TL zw~Qg(-1-vXjT_tb4pXHYJ?(~e727IO!QAhKg90l2+0PlIkS<3lwhTPHup;LJtHDVU z*zc{YgRBN4!v!sl+2`G-`%RI^{fSn3Z=EICmh*B;p^xfPLj$=DYM_XbK;BN`L z4GWa3eFVX4XL=M#qw?#j)2nZ%8@1XbX4#NtbbMnlID%?V)GQ%1o*#-_p0(ebcEx^* zYjCRnR}CAX&bKF!Ub2C-uYLib^R(>O@EsleBBt8#ozf7-*vP&)2*rAZ{iU~!oV*%U zJ+!`Q_gM<^*(Q5yI>>B54QNitb!fQguj18ruBkUhW^!LQaqr&iIUegfmfg+S1lWHH zeak)XLbTyjd)6}6P_{&CmC8XF6Hmc5Sl%FZyb{e2<$o&3^nENVgDJ^8#cX%H?oNzEkw0w|SJrk9( zTUj$jJQcI{9uFKhjZaz=odXiPhudyr=Qy4m%f#}Wnx?RfT;NdMxF0qB6tHh2%44vQ zKglG(4+#Mh-T4RnW0J4(9prw1k)MBwOnWb@i>>v_T!N8+;pT@~XtzwYFJTRvTz*yV zoVE3eO>|Yi8hC(W({Z|h0_Wx@ozj2PWg;1MM+?zquv^out z38>hFggx1W-FEc+mSfunj#(7Zo@<%yfmuzg4FR8Lm3;^=7AbpMm$1Gxfh9)^o^oDkECHnj+@xgT6E3VT zb$iIW5zSlQsE4wbZsP|>OLvMjvP|iwQz90TYxfqYweR*_^b&Dfot(x zkt$nfk+jb-3HZ#iRyV=Y$_(id##Q+wZ^BI;Hg#EyA_4%D@ zQs~S&HFuRRe!U!SS&b?bAibIz#0`v=%eF1(aj~U6S1s?c2hr`ced+l-tOm$k{k}r^ zIOV?i`cB+d0-I$08c7G`6W*%dzj}QCb-=D5NdF_7tpAmFP9&sg^g9{ns`X-<@>D1@ z@FU}^cXn*ScfavmLm6od8x0IZYVECprDc9Fe0wjFX=j)w2T5!2O1RXbWkSm=`16oz zd&~VO@c=o9-5mbXPcf?DyT149QvVUtxcX1{T#-2vekcWF`m@+DF;(l_1^E>4z0bGh zU~lJgILz7GbyHugR_@2b)r#9tY`oz_6{xXh0Y@O_vG;Z@ip~W)C@a$Q??D^p1{x#q zRnYmwWWf5f)xF|WONqAx=vh-2dfx3S4K8Q8R~p-so?${y)~pA( z{_Sp_-BoZNnDnO9(S33D+BejJ zF7;jkViFuHn%Fr5pi(T0{R%U zQ`I23Oarfq^51;ykOZy(J*xu_qft+5$IwFlNdDwrTV|9d1k3W=oO{UoiByUcLS!Et z^`=G0IcaP?)jkUnn{A|-Luo7~0l$VoWlPpDiCX)Xe+4bQnol+fZ|`m7XI06aeb7$V zOTQ=J?rm_&$b?us-R+q_eY{%mF=u4>?hqUHh$vEstEx~iUoio|pLW^Bu?yT2#NYdv z420EuPK!J*eCcc0J=@dRiDw&QB*n{`{8S^|hysi$YinfPFTKHhH6N$y^3-fZcISoj zhrW=xE}jhJ>0!oPE`J`7cKqW;a_~a+QtVE3X*?n?L>%V^llarf&Sd;v z;Ek11Aw+uOpXYrRh`Cgomz_NZ?o#?}FMtgP-54b3g?l!-nroF3Us(c+#Id8pJ%b)P z8VB$=A5))dY<4Coge+&pU@V?LdsPqF(uGfD1AcDMz`Sj7=132>Oi8gbcoDf2o-Jo) zqYAK3yWBz!_erz&DUAzhD23M3c6NpP4keMcOvRas@(bRzYMa!)ehXyZ- zjs27V`Fr=cxc~jKVmES!xQ=CWwOQz5eT`p1?(wM*i~8lZ8zX|Tk!Y35`Mu^}buQJ4 z9%h{N!J%$SL|$Ia{y>GNljTHn(z8*JVO?Fne&qsjPNuuy zk6NR)JYQ|w)8kz?@&S{8HX@XK@8x{$(|tqxgR`&N=hLnnN%jS)r<*ZLetB94bti*w z&#Q=;@fS@LA{B_Pp2g#zU}(LcozY@R#LfHC;1yFF{zi9F&Hp}Lq^s!j7Em1Ic9Prc z_9>|-^#t-pfRmM!T3rgwlD*-a7aw~%53xGqVt8!yf}-* z#OcaG;T;PvwsUCj@kt*817$<&KgN4KEs1}RCy5~uwba^gRwF%D%CRg9S>J^!=U9?% zNPZ!VD8}1Zkw+h^US|xxrI`U{a%hQFYK8%hpcH?%LSDbdVhW$XT;K@f#JH0*I~RK8)+C!cxj_<3{NvLzZ|Pi! zHTc4g^4a+Zs@+U~*7gZ^gPN9c7>(n0JD3~4l$Ub7G4?X6lJ4{>H=Yw72 zxqbi=s!PnDIuy_C$>_?c5M3zYD$+Thdw8sVODwTInuDhv&L4E~yV~&}cP7gCsd}m# z=|q&+)Q)Z@dosh6wV>)72&=efYF>E2$nDDWwpgyH!@P)mK7M`@0mNgBD zgM=+8x9^FZ5vWD_2Vc}NzLdE2{b^l5Q!#EtMvO^TgKz!Y2$P*$6h8ZSfXlcI^=;HL z%JF&oKz-aDr;Tn|BfRTuhRNlI?OaYLX4O^(LlpOt=i_qE{xK1!rHOf3X^`xaF*}>% zfu-IE*#^BbcGO5535U>}32e?~6a=|E+@2HcL3~x@Q8Mo)=x1{6e%1sA%p#z2meIeF zd)qB3es@N4TGHBDAvmA=OFYGy^QPkBrl$j_-ZHG9 z!*K?;N5zitg9g^VxARBUdWYYC@?dMLYzf$uhuh>Ed^KSL9@%XycoGMvnYcF)GDP18 zzd1O}e+o`?B+9wIZ)-`6`k+s1xL3Pq>nsxpVM)V#$~vP?tYWq~JU(Z8-o+DVvO=>5 zk0tZ@XIxZc9Z>CTC^F{lv|urGyWmXIz1XmS?jYodxHj!lldq5-1lw%RO3-i30UiXM zM_Zl5Hb(Hp?iL`RoT1qICel-|gA6cUj~#iGolw^H2ENdPgJ@yhAH%ljns zmJ;hIiTewnaaB=-iJ?v%yv769DjW>e6{vCA+!qnDoFvbY^n_{TB~!w%xB*6vH`P&z zDPNU+t$k)KqcKW|+46evel&5~ztLZOcatMY`;JU>%VqqVvLNm%QOI?-TS26N>KKh( zE(y6pL<6F=&}t=IAf^WLZC-w)-y!$1RF*f$wC*1!UCgIOt(A$*t0?d`SwC9?XH{GV{bj;n=b?$J0rotbvnzt`sT&OFhi% z@16>0VcKS`67RNhJ!K7R?Zr=e$hzq`vGERNY^p)>vq!@b$}N`1&DX1O-SW|5Kz3!K zjmMUy2c8Ipt&+7G``%(IpY^Z8lErj|p60LP-Wzau+83tqvR zh^4>-J@Eo^Qs3}n)_#{&;L7XX8*}eQ1YU(Gx&Ws z^<%KnW&E?qzD-s2m+@m0x?hBVyx}n<66Yb}QjMk-#6}P?F!iPdaUe$hUsj;yOBUdJ|# zBo*7wdPOb3PDfGHS2M6jON=EkB95VJMP%cdNN?j>57`=*yI;XN%{to`;5wQ0i=eQ_ zVTm+>f(}l+-P}N>So#RjWy#fI;LeH$xnD{e_g{W%EU@vkvDI!|@V@igWWKhlcc%@X z&pqK>${X8F(qJ6-<-}eeL&o^J-kJyz>@cDHjzrvpls1K6Qp4Rer3!MC4_o%f&Ty&K z9cH~D<Z$zH8AnN%&@9~g4 zp!|%}m{_k=TzpgTmPcRi{CWQ~IK$z0M!wBdSGfFO%B>}Lr?DN7VE11c6&B2e3=b=06PP`|a#P4vtV^5JPp8 zrK!S8sM6JY&UTXOn+j_uXHnl}#=GVF>J(`XNiY0IT$B#K!nq1c-ycG0{Lf>U8V)0?fuqoq&7l*Q67`>Q6|4N z*=4w|N`dG+oRGo(=8P(8?2S^ll{2|k#f!LK5T`qTC;cjIzoI?yvJ0DL`g!s01Xud* zJ+^mDmv>r~wnpVYYxbkHG#a{Ti5i~l-_2xSjnuQ@wc(5nK~8~Mj6i$5zs?^b{g2&Q zldBG`hx;@>;a4bQCkiMrd`V$F>GGeL`OS0g7&3>_sZ>wtc;^9t2fZI7u-58^%#9wD zgh~lGiD@s;Lq?rDIXKR6Okem^o7{kh9%H!;P;CTcQrRw3l$Ev4)%c)^!I|LY*X>Ym>RDwVmDH*vPas4*>LKr2tDe;;ZC_P-di(7aZ}WDMwkEc_Oh>hE0`7%oP@!9) z`a}f?QZ($>!V)5hRx=Js2}+~6B4#hOZ;^?~2&L%7>dnWA3KW@8LKaE*&P_x)I6|m+ zio+k*?ZWwRWYK-;lQ7NkWh;^}Pi4d>BH!XZ--z(_d*|@EOX2DGk)9V-Du}2G5Mw$g zDqzVXJB)fF>#kRt*F)dj77ujgc=UBev~|gHt9mCH940H}%cWm?!c`F**3Y^G2Nxp) zWviOLK~oJTBU>0$yY!JU!9(aJ%!L|q zRyD+mHvm^Ut@oggs#0%eHj+}G-3DMG{Wl;A+{ev>lE*S%@ouD`eB2$sDi`SZ z$GM(?F{74M`b!6BY<;4J`)H1N&3nKTibEypp$_K|wzB2jE_YBTQ{wxiY zhK|i{-lKOY-tC{npVgGyHtGvumO%;3oQ|XHme8UFL0&;~KEgt5bH9zRmM`Vq3nh2| z{vx{--Xrf);8LJr){McsrFuwrPi>O=&8kCrZLMjAZ_y@qW1(q#FCF`Ro|-oci`sm9 z&%iv$i;H9x1@1cy!=XI`&0$UPZ}>L(?8Xms#f!|c=#&N5!cyO+v228fsnA)PL?>B7 zVhmg^UqpOOGBK<}yxPmMZV35m$$dA>#boe>$w1$zvx}|T3!ytSU~Yd_bH>dgxU>l# zX@IuM8rOTLqRht8bZ+yup?8s!J_v`Ok<~)Ud`jAf&;@ET9qi1j- z3831lO=~lzSBDck+hxOZ=ONSFe>ohn=WBj2n+!gwxOeDQstTc?4exWlR z@h}$hC|Hc=sI!R{nr-lVk9J66wA$71%PxgJe6KWC|BS+!)Z-a2L4|rYfO2bps4CsSJ&KeCQMEU0%v0Rf-^{s-JkyEua0o; zRXLw;?UU*Am1KF6hm(plo@is&T1zD_f5}Z(LP-Xmukp{+(ZTsw!RnuvSD z@c-bp4;!XEe-Ur|1C7Hu@Ig_EnIP@i&YI+&5w_gCV7gnuiLjC6M(C%B2F~c~lW4nQ zcN?ddDz?r7L2xHJQD{WRm#F9c=HgAO9bs$|f=EKguV$wujK?JUBSC>OPR78aRFg&s1IiGAcNzVC=P*HQ|ivvpqv0s}>zLD;U0OVN0c_edwW~L_)a({VFWx z!-`b%pWbx+SR8mB=d-GG(i7CWoDeDh$-}O?Pky65^8y4*T7B#L}gvYQ7)=i+=MGrZ- zP%$qwO(TsKi&V%Xd!43~CT}IJ7<%mS(?lCB_xf8d*H2%?xyat5Ho`=xe@)Qh@`X6_{L66|xpDNKY2>Y(H; z^)J|K)T-~C2{&T>Jp}LyB{`|?t7o|qO_&HdWPLFQNrs|P#;mB87A?)I-#*vCfW^m|IJ*;&G$oYk&T&mFy(y`;N0?5 zItMb!q+>bUMQ{KVTG7AAk_06=6fP7tPBr{;9PHhC zb1#r?g`r}|4__{Lr(Br|AeO2#+*H}Dv41$=!Up7<%#k|U?L?Lxbh;RN>qUc5Jv7KK z4bl}(I9nSdSvfS*u7-0Wg%zk4Kg-&w&7Nr|l$;GyNH_2JDY=*y}7)a1LuL^>k@zg0Ow{GW>P)sX9K;Y<6ps(sVE1*BoQ5fJfY>s zOL>8B9Z|qDGKv~VCI$b=fbJAn8Z?~ywuJ~xK)iMLYK_@&5I5R+){;}JC z39x!%vF_zY(ednr)PsAXzB#FU1`Ag&22)XeVjc^LzG+6d?QS+qx%FITn&aHLpJFhw zO~$+g2y&J2K81K#Lw|;xh?6wQ-dUMO(cPm>OHVwi6%-#$Ze^V{DT!uQ;>4X$g#4wq z7P`tcS!n?LOcGCWfSS{=fat1%ONfZET-?`;@l~Xp$GPV@iSpOd-z0IsrKbNu$vDa2 zcrgys=5^c%!9yB5`=dH8Gqf5>o1ku!zUxrBX^Ngu^RWPhZ}%uho@w3hXn4T&x{g~J zeENz23&lCABI}>hobFZxcb1X>1g|^RJP&>yeqb>GHLRucXP?VQ)(J{#zxsR|$AIkT z*i%6$yq^K8mD)`QZLgvFVHV|gxYX>i{?gsXkqJX<{U+$x0+r3*n81ziR}+Qul(7_1 zJ%GlynV2QWuyy~&)Y>(&jBU&?s1ntMA4+2}BHQKiP!RP#o-yTWCvT-^gh zy6WXq=bN1OjXdegq+#Hx>4Rxcvt;^d+oFFT#etxbw74HEWYG&&5YuyiAGI9QQ^nla zP~3zRMlg=cHgpj?7ZhuNPE1Q59&$e7k!BKm!3O}rCi4#q91TK5k%#+yBd6&VICtI| zz&;PQKK%+KXUFM^xCe8(9O{|bFGc@4e}m_~e1HY^(hiNR-AB0sUl(;1(@Kn|<9v-x zOOU=bgvysw__B25ppDVty@E0qrE=#Ttfy)b;!<|mj93gKi7^LDjU!HF+`qi;zh|!~ z6&SSWv=T%#ZHsfNHQKq^SyF)+cckZ8xYxrw(?Zc2?(I&s{>~aIYh&RTsS_3_yA}Od z#YY>xY*|i_$y5j<6Xavb;l%kC zny6462)!1tOXcHH&refJGdZay@|mbxo#~T-YwkXaTs+eV zd9Btdoow?gT7G~cLOhiaVOlrJ)`ABfxyD`TFzM{d!Dt9~M5r33>%>N!6nGobs9-e7 z8W(DOi)2x>iQEv8!PGwo(-hE^i}r*HCnW`!2~LZ=YE8?8*vg+{QM zwM*yZi^#CI30q5{VsM+u!P%&k?pYO3arh~lropTUP1JFblv4L<_DSdk&P`z+KZAe^ z-_Hql{uPeI2!+;Rmi17+owGE&;8-lSFZ}UupFJ9WR$4>qX;Y$1<|aIYxrc?CeK?_K zxkKd~%wb3$S?8yAech1@*#`yJSUE=Kg6>SHx^HL2n&PJg*)5a z?*vs~;pW2_+%*nQb}tf&U5KRY(^+{Z&oI|xSolfu?b(HFnn~z*g3%x|6bFPP;qlU( zyE96-pwQ?3OR&*($vV%Nlo2u1EKPAi6x@&KNlL2RE9?+>-;9cj`PN(d~{MBY;xO24n2&@x_?~~EMlY?iikBEBKc?#wX z$!pSE=Eox0Jnc;$=*?QWCTOg;Jrk;I4@h%2l)Yg!n#o|>&TAzuDp$fWKJCs_G+9q< zqcAnElC&EIn{d14)dk+D(h1jn3=Qb*SH*+-gz@;YTZoOhncU!fLrlyujO zAnbtCBCpFt@2MeHt=H)5gKG>|un$A+e&5x=S*Zk-0)+|NAaE(}7rfpLaz?jKkdN$Y3&+>@}qxqL_Svj(5ZW_AASQiho4XSpY zZ)MrvGHqo&$-+Y!&+6prX*!X#7||H1c+clZlwRumUQP)aenyjfL!Y-y^U{!<4~MiZ zgY9`vLENhB8pNeQhEs_WJ|QdsOsD=#f@)o~7VxwrwoO(rqJEhb_}w+sPW#ytb3XCZ?_FcU!bN)*w0Tx#hZ@BgC_>ipI>38qHT0qrKt3=ku-G~ zQz8g16c$=8ur@kf5o8yn&RRU;aVY>GFqTC%DcOabwIGw)9F_4~_Z_AtxYZ$V|8hH{ zU)9x?jcy}W%NA+131>A`WlYs3R$b+}a#G5lYk%6jDu7TPiH8>$p4dZI<8E9jNkM2P$MAZeF%V z3Y=N&-TKkD1daL!fG>m`^9^k@+FrTN8O~V_jor7-TZ~G18)XMg`sCIhNx&tKgr{#I z*&k~+W%c))-M}P?U|MV1FC;IXJ!Cqb4w}RnBc$-e$uVxlys$vW{EGr+e7r^46AUK& zg)Y^ag|C>*GLNux`2IXuErbOeu0=O@aIZ z+;o!{yh*a_>Xf*U4bDbZ{q`Kr_}MJV z_e(kAA(HX*`Okm-9!y{5o(4>h-CpdFoksCJ5zz_!ZSFznx9Z01YgPcODDbR2m)8qs zIp`1TZ)tM&FY1v8S#xUT3K{M~QkxZwQZt)Sx z(eC^~p=ZG{ytIUzi6*G#rniE~M}~9&!Q{a>C5@1a5Y`-gGUtlm-MY8ozL~8)(3xLK z$BHe2Y)B2QAB zGwLz+{#{=P?**PW%cobJ2zc~Z0J7aZtK>s1vILLO_f8k*guaj6=<{tBNtdqUw~s4+ z5}#>q4}q2E8J@;&($Cd9-yZ+u=4jX#bXFaps6DteTw1yOW83{-Cn{N4rC)-oUQ*e0 z)_C0!=KT2-o_9Ggd_1=)|2T+#@?Zd5Y-lEc(IeZK6sXmI*%$~7k-jE~48v4<&O0U% z|N61~1a(9Tihf2}S;ygTH`jY$YxF=k#chX!IyjZGP{sDrXz0;Yvb|2Abti^vLCqj4 zbt|I+dA@fRGP)#9=vm9_xOWOWQH z;E5ft-ku@G6;+{~HJUhz{>&4{u|wrQN*eoMWy z4hQkluP~8At%C8Kp`U1#!zo`W_8*FcNR6jojs~sThH4lW2PzXilEn+Ff2?y~Eius^ z)~+GO#_D2}$miLmENr!B`O0R{4;V9~o>1Zx-VME6+vxHf%=IW4JI+-wGhD~rfXG6^ zq(%Kki^AHJ7~-ZyRMWJe>r(?PlNv_HW3C(kwiaCLU#SFjbcnk)@>`Zcw79vN4)h$D zPX0Kiefw|#u=M2lM3*c46++=Y@a5N@byXaFl+W1PO$5U-YN#)Zrb47*&>hr&Fg|z; z-MI|>sUzg9?+;D1HOeSVJxKS#LVn1zGtLWb^6sS4D?bD*I4RPaU(b52sD^yTx9U_h zw^}TDX@4~=3@JNI?-jM?^F+6Pw#E{ac#@uh1q`F{e9++VQU`HzL}<0k|N5bIijM(b zq86MPkH(I6|Kb-X87-z&86GhF0g9Jf%oYUMXnn^>1pVHK#i=&U2)P^Xi_n@&aoHq> z>rTe$_5{MOKTAzBL+FVWHE&OH-kj#b;!+fwNO;DmLy8=JJW^LuhaAi0*om)6g8Ona zITK?)7c2~X9T5tUNnV)XTBx|SNq>7NIfXhl@sUmlKJ9{+VQhPOKkNJFpHSblTaJ)x zeS8iq!fsE9GFpp&O$cBYyrYIoHH|YISDe95t?e?b*E5zKCX(x(X$LuS8vEfam>_VZ zxaF}am*yVP6yfnbffynF0>@hH3_JQ%Fv>qSx2ex4%rDyCYLC~NXKW`?>SjO-g>Y7J z+JCL0-c%`C!oc&`$@?^ zn%dcXqs9R<0OF(1RW`W1B>~4;#{X9Q&Z^@@%gF+hw^u`xCG=h818d874WgXX69N*o z#?Smo;yPI8LHz>L^XrkP|BJ1!0E=pC!=)K|0BMAwQHGN4p%g_4MY@%e4rxJPXb_|n zDM2uap$11vh7=?Pq#F_GkdV4-&iRkWbMJi~9-pI!*?Z60Ypw5l-|t)RTV!!(Im&EI zQ3Jkgdp^ldve%>CU;WJf26cI7V4T?eIA9}G^c@Dto)>rh&_?S1Vu@egs8Si0eeV!l zz_F!kX-uzPH5a|~omrXx6948l+1a4V0)gR;V)0Khzo-@<-mD?`uCZPO#TYG_eHLA2 zt1b0W)d^J{aYM15il4OGky}yzCf?6OlR1Y+6?x!R?&*V}S22L=*rYrGr(lT*@VWW* zPx@rKxQ*D^E!lbuou0Z0pg*BRFQ*&#s}>+$UccUjW~`T3tDw2$!nhQ)F0erEZ2GOl zF|;uEDd{oC*_$K(ONELy#~Ql3;`}CDQ{PR|aFe>bkyI-u;jX=P@Rysz=#m`~aP&?D zwO5ww#M$8U@&WtN*(rsCaS}}r+AdXO%&FR|TsSN61r^)aEAvt=wbHcUpL2sxf=o*o z@A&Z`=E5R7t;Te!$tdJjtC7~T@Qm=GtP?ti+^3wo$n&tbdK!` zx6REv9v92#m=jLc5C(If(vSJx6)%5Oto>0b8HDPBcU?4hTDg-dn)hQKA-T8dmZ({I zuRGApvP#;x%46(!VA1)G8#-EsH@iJW%lb7 zVwk%%Js%0#LKU3OfBDGU`JfZhXf6TS&bs=BS|R50Bu?A_4{pcSFOVOY}}>o_}2f6uaYd=~J@K1}9|k>Jcoo@KauEdpxxC)t4g@rc^$b(VeHjbw@9GH+&9)HteIsRR>>^q=axW>dvodQu3B5AKW?SR? z%!THn3On#v& zpIGsTSq6wU(=U$^Vg1{EA(kPV30^-j84iL2X|E_w_1tLNoI6-TF`5Bi%d8rGPA+2t z-&YBA#(&t8!{Fk`B{=p>?8S~ zm=yGV&=3-Jx~j&;GdUPf(SpB1GN6{Z$^9tc;qEPt&*zhG3YNS{vG|m3+}M@rw6bL3 zB1Afj_ETPSUka9OD$T6IvWi|r8)dkbM@QR_-dMXl_R}?b#MR>EsJevV*aJW_7l=Er zhRcwQKNP>^$07t_(xXXWsB#*EcPg*ggb->8$Ix{~iie?f8gi^7JzlPoH495Pswb4} zCOVqwlJFgNli5)(t2gcjZNY*EbOU3VR`|8fwc%@#|KiqQz2DotIZr6F#T(Me9wUm*I**@W4 z-dizT-rFB$*=sktwEFzz@?Os6<-Nwh1+6J@B2S^F61yS<3L$^v=-`*o7*R?o{-YW<}!KvW2d+eu;0@N%l&d|MT zQRvP!gZ^J53-vu2#Us`xn8>DuDtTlp2fb4rU0N|}CVs=^`ZvncEj5QN8L3$0qn^T< z)VhU_4E!7+hL%i6BWYM46Bc0PU(_mM-85wEdZS$Xc-D}e{ zOBe1sjQx<48H;OrGP)~1U;N)#@An93#9tFpUNeQ3k7zoG1hGL;_WYcPx$%2KZUa<)ov~6hdz{@o0Kn@ zZE60(@{{KM71n}%M8W&{`5C`DtHvveTfHaGJl^~IoleYpww{S}Jurba0AY-|ZfPa= z$e}|Qbk0tbq;uc>sIAz=ZZqGJUpL0FOc5|6e^tP`Uj%2VtA)+Y@9r>(R4!_=xvaIV zWu$jAgi>Y(~(P!^C$SdSyrhVj>aEPb`m~>1&3KDxJ@@v zxpBF}oKb_#$gZ_?5U$SeCR9=BQT%EWvSN-}3*F#GDeJTN*ODe-i;ZMRmc4UGti zUXdza8L3BoV-r_|>VtE~PrYTej`GWvM*R*iLZgTI|6$^t?S6^?c_=?t|7j@qYL4^Vi8Opu@(FNO!X^G5oogrVs%Sh52r8=4z zxq7Ud!tI)#+15U9UVS>Pf0b6~p?}C|T^SW~!c~3SO1QvfYs@=tLBxS**P#5h(vPdn z6(w;tKYPwJg^XI$np4g&0f*9e+CDSej}9(NxO5J(NC$LMW=Yz;ypdp|M){&$2fpL1 z8gxnB0?ha7YOsGw6y0UrJEmiWkJSb3x7q1#1Ip?V~rnvkuf2< zl1_8AJN@;~$AubnsY2zN_j(A-Bwr<#ocBs8N?djhkYgDRS^%esBJzE0YRPqgr$h;~Yk|M)rH{3?^) zXM!vsxUp-%%)HS9~aYLG;l$i_KzI;Y{jubARR_)P&eNNI2 zYS$0Duh#Uax0}?X)z{{9`A5?Ux7V<=+H1!);y&F~U#2-+zt#N=1mNIpn%&zqtxROd4?=!$YxmmG}<-uVCH1M zyMJ!}fYFPqvDDj@({g6jU0`ZOgZ<62GiHWs)eqnsmMEZf@L; z6@ypgBqtO`J;1_egxW^bJo>=(=+7QE_>3;n@ze7^jnlJ8r4D#Yxl$v5wQW?SVA(dlO~Lvp zOt^}Q1Y193$j7G^sv(ZYt;Bcq*ACfo>d>QIb9l$9LNj6=6;38PQjp1M`YZd*uxpEf z^XZ~TZQ~kVZP5);=L7xFqxbucSxN%mlsV($Etrb`CyP*F)7&=ltgMfmNtoHSu?G`hNLuHDs9BR>Cf36jtZWaO zvgi9uHUm1{z)<{Z5lZ-JbHJ$lP5M{{-duCCJDP#dgqbG?$w{YODfk;4WsW*L zD)`BMc#K0K8-;%d&{CPTHc^*dpgK|Rf0XvNBcnvYcBk!TmZVbw70W~~$?k?za}+hD ztKZ_=6bbv(^vMo}yX&hazFR^$DQHW4<9CB^TjYcuZuSP3SKi3_aAYDBi@a7Cp@;H; z7{Aj{o4wT!<$p+Gm}?OAKk2%gCpY;q74$6L60UnyqZ!gX!h5v~!RX_y-h)7vR2)KE*MK^sGW}nFdKusIj~u>}5J&3F55_#A}?Y zg5p4gbQGWVuCuE7ldpRhwM(`3a=-m~$fg-;AZVjz!srB2IEMHY9kt%dg_&AaI zCL<^ZEKiJtOHAl`=?k$lKkoq*hFD%MOhskAWAVWrfV_MRui==R3_w{f6#RR*%lL=Z z%a1tjEY(c~Eg9wwLgC0;?+zUm7Ka+7{rz2R;ibRO_;3TUth-4JiI3_7gIfzKQiaW2 zVRxC+h;erwshOFPKl@;nxe&KmLhP!#5XWoDtN_kgU~A}sMAng7C$ACov(T&SxsFVY zBmE8IK3Xu%kzcp&C!o(9Vspu+EnnY&Z1ov)wcK&9ime}7A4EGVyR7gZahIuiY2sej zKR;T?n_i2GkA?nvHk?i!_(_lIVEFepph%^U9FK*7=*{>yVf(DAGwt6Wh9ccB>^(Fe zb}J1@KDUs8r*6{W(g-tS7x#V#6`^Lh#V?^d|q^?<#& z26WSe$6aSvAECK6Zj3h+#CPZQeFoZUoI(66e?Cit#cOViEg+}e#y=Ftk9O+1Hg&Lp zE!(c#f!pYx?*yLjz&C#YTyw4jZL9xGIPb7{&3G@@WcCYMN%1dOD|+o)DtJ?&Mx@^+ss>bh0Zmy~!+C>hp0uQu7EvR{5O z_UQOB+Q-~N=;=TkM}4iC0xER_0bFV#+cXRopT{ibk`UFS()T0+L2MugZ+4c*=~vEx+$NilQia z-tL(pk)P-~daqXF;-7>6{P}gS$jaMsjJ=iF;=QI@b2|3##xjNdvG6ne%HpiKO@?xW}Hbx?IxuWa}8sv`+Y(cx9OhIMxBB9H%`-+y15T~N@$tdCzv zWXfKf;^pXSL(OPhX75vBmwOo@)uR*g_AGu+?Nscf8>>xbU)gv4dRD^fZnUe|#KGa0 zeuHB_fx#|mluz-`Nk~WqI+5|-rKWdn3zuv}WXK$_j%Q2{x~zBGk0!e8Ww-fS^v;)9 z=7o;lIMGR(rBtXs5+8o~-J}*A70RgR{^IM>p8@;hg4E^)TBUesh-$_4jjx|G5`$*172Q}JUECk@*4#HvUGy_<=BpW-r*N+l@OH0>ZX2x3jDIzf(QQT- zCG^Kwq8fQFcoDlyx=ELeTcGW+_w6g)E9WpbR#TKiD|Nrt+pP`P-`gm4Wq=!6T8{Ot zfBMkLdUwhuDWP_>jghjlq}7Z*>canhy(0fELo>stb`p&Z6X@$7KD*4N+gEZ__tS6G z$k(5_)zHYbyRil4PF`A2d?)eUC#Z4ec98XTi!8KbcqW>d?BD6>fd`(>u1mUd^@4@) zTB=HBqEfrdU;w(}j99v?S3N`O*9|lI(sUC`he|%4)wYl`^p*B$n_Cp^tprTv-2Xln zHY}01BfT5#v}35vxtAh*`ir?T|Eyv)DG9ZeXMQh!sTW=SF5YFmqsG;;=7XUkCU$ac zMO50l;|{vq(dlzuk16fH3w8G6lEoXWpfvarn+3l`k z|1RlqbIP!aQS!?6(ZNSDBXwn`cFX5QDm4SX*!I?JFy{WXXZ`&>v0=zUH1SsT^Ykuq zm&<4N8B#@+ts<^F-{xYny32#cT}@^cvlL!q7H^zfnuw3$`uAIbU5FdJJjBb**5|^D z*)PHwx-y=!bv)7N{VT})Z>OM^y=Km)0dZg!5P<}q@H|%8TYPd zUgDcQF}UNNo|DY%?VwZrr0tw(2}NGDX}jWPM?o0(-+qlpIXR)Hhh%w0tl)6cu;m2>F7Zc)Yx;X# z&a5MTrT$a*hVCUhRkPX|sXT+DRHl!^Pi9n{Te%s2zdNLe3(&PP9`D|LFjq%uwuvKfKwMb;xz-K#dtf7-74MaUVx(+~Xl!n5?eU)Rpw z{6?tXe#^gOI(_ZmU+8Rz{v(vx)m|8dD8Jn?i;hh{)Bgl z+vJC$_j_Z`Ypa#L=w@n#&!;Pmr$YHw|G&=`{dg`s5x7#a2bA`RCGQP(uu8iypAt5P z{v0wIe|&`_Q;ZT1v(0H#&weEQN2DFO0>#|CA7lPT@pMP!Od{BBIaVMS)t1O+7C}O_ z`bi+K3a5s09CEzXPIy4|Ow!3VNpV|CR#8^ppD#lQbYSRyt~O0-n|Mf4zS8b{`Yj}) zqf#T}1;|Z)k6erDUtg}s>tNllkxlu8>P>ih9KB$&5Kxk>DZkThy1zbIa{HZO(Ors< zDa6>wUd#6AOm@ung893XPXs}CRC z;7mWp{NI&3r^n#6h?`MB1zI53kP&2*vQA-*-aT>x#)>VqSCQb1*TQ+tvyz&riYHbf zqqqYdSgi$V4sN51q+_giucjFXfVo=Y{IwJfgq^)Vb#+xTSp|DCQ7}R>fL_;EYPp4E z3+(kr<^euBFkN$<5Yg$145sL5(WHwN+A1c{5ci3S7p9*WSi3gB$)JZXl9b09c5*h- zlwX9YfH?#7k5Sg8JC%7SpXKlWxC=(PBJ^a%Y7YoZ$S+5kFrFSYo{fhbjZa4%$o27` z9_}~n*Ly&yduimqKley-Pdxi3(|F;AUof$OK*)A#9@722K;SnRr`3a>w>yjqmSPbc zbcIQ2%d z$u`{oa=KD}1?@J;dg?w_b>TZYcA_0j&+UV}vqR3>!*5yIH3aw_sb4LFgsY1DS;VYA ziY$AAgX&}<$xewLS%7WMv&K9WZ8*S^&~UhHG#r(l%rP}W+`!6JF)=kYy%0N4Y*N`L z%ViHy;YXnFa4O%F5#LHpo@!D z`lu?m{z|^dseSUp{mR+qXo2AMhX$F_uFuW~t(KGJ31HW1ra71!GO%iJd%4sd2L#=LJx2e0(t`9Ue$_8K(_Mah6LExAR zRw{!YjMoePRH3CDzuciRtLb$x#)zBeJzHpff$&n)(U#kVje`$16f}m4P>bVl93y7u`4qjEaAd7 zigq5>x`Sm>AmBGz>a-$&NYV>6civ7%hie0?f{u-v}1q4O+UNkg8oU7kO!amo~&Lj z^(gIB*r>a+^0ka+ks}?*F9T$KWl)O?gJl9Xx(P`2?&ogqDOKZ_)1VO;*$%Ht-#!87+4#B*2l>tV$Q6UO=x4*2Q=}+7s(q( z<(j15>8hMaLJgO4gWN`z!}5tPlYQTDX$orz@B2ve;c)QHtr8&C&5rT>@#YnY%6xkg z4GHx7@q?qiYRmdS6QKLv%yQvC{cEC(f{y)kFuBMaW-H@+^nD>Os*4_!VBba_3o9iq{BjAtwJAk zoa1f6MeE2TG23(SM$yLOZ9UX+6!UYha*x?(-d9ggHbSF2cXcnSis^A}tulp(F@=jY z*|v3mw5}JUdXeIYCo}1D>pT0wD{ffO`@G`JvE1-W&-DkI9?Aa@T>0`!cX{tk?fM5H zv1m#`^BR}YORKjQikU+k?%pM;q2vH*BgGXsm7Bv_pqzTrdE~17x)8LtzEfH z1n=m^|6U)L!1@SZrxUGHyxge0pd1HQ2mH9)T(wW8?EPFE;&nF2hh`C9a5C3G)XqvI zAM84q5`TYEcBW;1dM*|Z*azN``p=G1ENVh-_w|-J$y(4`9J&slEf~f z6?R3#LJuv3z88Eyns5lBJw>sHyBxNwoYGR`MJ02?JIcC5YT@5o`hDFLhOCs!CpZxLpUikjJto+v#TS$Pq^ zy1TzLE?)M{IBR6%6{+w$MlWKa_`k9{i5Ti0Wx3OXc|zKmLi}RB^fq_$;ZJxMc}?-~ zxQXp4y?Nv%)*X7XO|A{fim8OdxRl{esD+u+cV!Ltw4aDj?T?5I*7|Me;X~mqnpcpK z%>;$qz7h=2o4+`6X^A;BR}igmjjXdmR2YS?K#CsL*%s*xV*2U3`Ex5Lis??XyfX~87(TG zJCss0q$5T6sApV?KJ)(JMcWJ4ns>n*81`+*+0|({>8;#Zb$9;@&`0zC; zV;Adswb}XJyd1C23;6^i=yN~SFe|ES>GnCjBX`=s{9~ugps%(yI15$_>iSF zC9(`~B5wSU#2KV^WaNIDW)VPu z8})4|frjZ(`V8MCc>zZFYAGUVS3-_H|KbAqhdGdEx-=e5ZqO-6?~D$sC_utl?t(d)x36q_fP^}YEe=R_jAE#HDwc~N?boWzT_Gl7o+ z>$SsItbVLaOqq}GNqfIHU&%l(ps+iafS-ZjLZJO;(a^)LzK0hCR7S`09$((8v%wHx zwt?Dex^jeh{^KJlo6Xije=oitq+W|Vy(&z<(`B`yWDqRT)WysCo#lEn6Wv4aj7TdY zg4pNv9*d+DFOn-T9^9iDX3!t43-FdbC-pc_5Gbo#$2QHDl)Cf9Kf7K!;n7T0wD|Eb zJNb@Flg$-k5;B)YTN$D&H_ZJe@Bf9lpuDFx%;?Mc-Y;q`?+@LcjaU0Vi0s-Eezg3M zclIf@mbkBLABXG|_cLnJ!bDETcm@iGGN8Xk;Y!)KdTrL9ibf_`$Vfo7bo0|90~^}p zSB34-cos&Q*IE6&+em0;&PmhpX3$59~ zoG)!q_KFc7XA&6Di!+acjK89K6P)EUqqD9hTaug`U^q*-{1Lxqfp(6RF3Lxhy!=&C z6EWkX`uKIy%6H!xIkni(Ct@G1<64z|@cxLVf6i5*@f$PivGA&wYJ{beE){Q9$lg=c zqXmNS?7@+Y&J1Zkfc~URuwo>kJ3S_`08CgCA{Y0ji~RjN6?&Yc`_-4jJLrGhdgqUu_jPQun=j5_U z5R4i(ieT4JRhvCAZ)oC_8|7xA>h;$dhvNy|$f9-qJ(C_$>VH)F{J0>`fS{#!R(73c zfa^m&Xk*b*fg{7IjuZ?;sd?yxMKUJ>vCwRWop)9z7sVoy zudR~`F^F=0+~a&|Ktd<8622V&t4T3F@T~~J)&Ic-Bq2R$oWu(>wY#4LP?E91bE|E( z^Qby+!-Ci37=n&lCM^gP02c{5g+to475l#Q-TN(lLE(2(fPo^4j9GFAj7o!)bUy72FZKUyh*Z-@FZj8_6#5vut7!i!-^iuH0#WCkHD$YvGRvX(|oKPubSU8yM>96YxU%CE7*Gqq+ z>(Tu`0r9Fgz}xZ~rK>@I0@pn`jZ%a2+(vs!IIgy{!t_SPJI-Es)x2BKr_<^EQ}3ET z$p{^Ue=yLU&;?Ay!;e>YFHHXU2;|@LHbdTSfso!0K;s5qF#jrFwm}Wj{P1U zS2!AsHnVt=P}8S-HP{*mNX_2^&yz0T^1xv}oW5FOiFC*xc*8=dW}jbD&cnZ11_(AJ3{0buxz_lu zmS=YHs}WU+hARd3+(yVBk$=vVP-F)~ejDNsb_}JWwh*Ux2lnTS;{>nqwfKMDT9Q_- zxswR^XUqS*wkzOoZ>g@Zdm>MMeQne^fYbhGw(%4!kT>G^5CaydkU+LaIF8-&9n`-g}cOP8=1A&?7JAMPxTLxA8N*07*4IQhuidKwMt{#`){dcl>8Ha?Way&&Vtl<7s8o)hP;@8t8d_1D)mh z+$gH=(`TnOR2+)$cVXk5Q23vl&#oYZwNaLFN1*}>bNqyeV(cuG@vmD_LYzvE`D zpy%f1mT7!RrF|+FZ3@O)&br*|Tc$%)uTHs?VCI_Y8(v^NWx<9WMcJt1HGVBIGy0Vf zbeyzb^UAm}q#UN#RkQ(`_cZ|BbOHK88E_$%Fk(iyu{Gdk+?MYb zh+U+ZoA_}5-Ou&O@mw&Uk#2KgdHL$mW5P8Pwm57)>GS2r-c-=Wkk&xBSK!Idudc(z zCTPGQZ+7qHDg}{X`5p)TPQTqL`qujFUR}?mI~BlYJEaycqJkd_sr}?(SRm)c6A)K_ zi+FyHfnoIR?RTqyPOA_qeUH5)0Yvz+ftI_}S0XZ-JPIV_Y-%Qb&E6=SUTIGFu+je_8mD?2HfvrVcwdaCc>{1GY+4k@{Z}Vx zmS>bh@RysY_9v;%03SENfDD(M(wK4uVQ$l@WVjs1&?lZd3k;oLbQ8Dl#fftwrn;|+or0fY9Kx!2oqh8}yO!UMpqBhLJtsY)9U z<|y6)T3+_fH=Ib~U3?-9UthG8>zHIA-w&Dse2OQ3@gUz=&X#&|oYkW!$)>Nk54{Cy z%I{H<#o$&gz}(8|JdiHe=mB;t%mb|twjV0MeWwDJa*}0=wQ&}C+Ms-7^r}5Gt!1 zXgK|~V!ar#*qtad#jKUClOs=@61N>OhyfCT>VdGgsN*n6E*-Q){dT8N7<0JT2Vf6D zIJC3TgTHTr~pgU947Gzh~Oj+e@=$0YvdJ$hNG7-e82g)%;IzZWR7CtaHEgIu0$H$YP_7LXZ zG)C;RJ|UMZoHknY#F90Jbz5!3_%N9o!iasjib7##quA7*X{i*_FkV2m21w&{kzkL2 z^M$pM#r@kbKS)y0R|`K2Sfk*TVpCX7vQmln@5S_h80-m&YHvHz(}j#OQqBu*xKuU; z&f)ZlWb0Wf@Gpf)7@;iX7SnEFeL2u|c*RoBWZc~*YyD^#8ABQ%cZrEe8Cif5?L(g! z0V5##U7V~_eA9Pzgcd>zx0Cgb^fr$19zoe~+%B@WbEE?wg&#LJl{D45Ymg@!U$ zBC3GvfsY4vZ+n4*i2QEHLwrK4l+F8}6ogIPGSfKEHi{6KHcF?7jszPm;VjD;b(AcW z%#$qR5`k3;_;$2ryg!rVg#`$bSOqE$DCT*INu2&(Oj3zHV8d=0zx;=ugGilE=Qi^B z7N<9=xNF&>Ewq<4v1T7e8XXwW6#@&v9Qr0;0p7x5Md?vgH$YmhB-u}|EI z4I{qH%?&g0igYkewhqHGo{u5Ls>d9KQ;0w`sP`chU9FEq`N0?H=PwHZ(Ie^m@i9#8Xsv zjJKmdBk;`%g|LOigvl0sMsaYjD!uu4XMcbXattZ*H}ZXqwnPAD z?3lnfwL}ZaLS&(gT{Oj}9Td@BULq9Hb6&$_8nlI!NQzlH#-*no?}d?+OL;S-@eEqL zXm!<*WXk~rJG&2s)4W;0!F8#nPlyA=Dq=8Md758CuCS;mvP2PimG#GP2^)3w;)*to z%0wxu;s`bPolWh4S&=EPNU!#k*C>=&VQR_cWTC;te{;$`84&yLox7=8+V`4^3x!3L zN5B3!5JBiRN`PeRpj}rLL$D&C&v(6PR5(KpY&_a$O8~2DIg-*m%!G$O({fc2#w*)J zR6!tPoC}pcmU_SLmA2~7p7uo%h=nr*^%w|6*{HX z7TB-BkUU}K!qiHz5@pkdC-Je!L4UCA64Date|hgYZ>@=Cya*4JO^rNCV=+V=IIw-0 zPg3DnFRzZ<NpwiCta135v^eawI^Z4MVrW3uh52T0Q+45!Y4&ej(t>kgdfd~w zhQAl$34S_{ktHL@Xhm<{|3(g@L=)$a5XKO8kQzo(iVhok80B_VQdS^zk*sWkD+1Wrla?9gj?JIIA zfXlqb*t2Fm>a38$@0j1E6fj7GvqD$&&mJo3QMb@2>K+sYlf|E{M=x#JHAx+Qld}ns zKgq5AT?QVpdMFYhA_Nj&S}i^df#ZxmZ(v4;@K-2_aXdmAA9G`fZQluCHu~vOa&qwS&7bD`j$jK^61q8xqZXqmgc5vr~?+BQfL2L%Tu{{Sb@i{ZErg2e5g=LknN z;?lSm|4E&v!QWo%|0lzAe|-+))%x!L#YBHS$$u}H?=>C{3Q6oC2eW(Q)2Gt25~?x( zDLjX&7j>iyS-k_LTEH=M{`gwvjw8(Vp3!4yk%IrhCv0yM&E-I-!#R7PK*@Iuvy|)H zc>1%9{saC0{i`>1O4;uZ>hHx{9b-Aba$!>msmt*lb7~6bdpsV8$E9uz5UUoO}BYw$JhQlScT@uKT-kr&|%z-yhga16cRR2yrcfxap_}9z)vxGqb|U z?iW8E%@pE7Qbtiwz^IaPpHf5yd=_s{OW}p`-2X9H4xDGip|Vdb1D)PX1DrE(deE*i zhKs4kKsPC34{TC4OyR_H-{#^)(YJKuG>NpSz>E23oe(-oZWRR1$*h7jiRKih15-Z;#pRa_M&`6yX-UezUZ(}m z27qj~1PJqorD1k@6q+TDp>6$FI9*9OgHiRMBI`T-V1Ld2Ctc(#`o`E?iZ}noyXu`_ zU8|xDGG*Lz85kH$&Q4EULG9FTu1mDBD)e+G&(1UvQK|@XjxfnL7PaUcfKfnhz~(&k z_O>jn1~@VdqimW{Cyw9y@})yhk2e#15J*IJFxX^NO;o-=k07|Z-NxolRAJxuTosp) z8ygyC+{ls^PL{=m3paolsd2VgYk)DS##JA|uH=F<4epU!`abcr9`8RWI4aGw^f@y? zHZm?`Kb6h;p&%f-XnaEss_@fDm}M>1LD| zaM(IuY-kBAh7iLZA=(91RJLk%UHG#p8WzjH93WCki&uA4JWzAGg)B--pf!Eb&T zB_S97pS$yA>WVACL{SGb9%dc!+ti6Sh|ttF`rE*HFG^Sr%B8Egr7_~>gC!F{t|_qF zcQs*frapkWfg9(@VzBOLa{OW=ln-VNJ$`MYoH(Y8w!Hd#ab*v=7029lCag^t?cL6g zVT8@z)U74ts=NlEQRDXxiaenjx?G9}S1PUB?)30?0sc4-Ini@?#Wo|hElQAc9n>M} zSdZ?V*LGx$lcMAb4zD!8Eg+4_BH8`nY)Pbk#ve9WzH^=(wBMc@`+qNetrQQEuuWac zfE2uWwbW&*4pgVd8Np(RLb`p&Yi(_v4J}wAsJwWFFS8O-=2=PWSd!M`yM5 zfW7O52T^=oz&l%=eP^kcCYsN|!6Dkg`2J@083)Ju1Py^)Ke(LrC~fuW$D3`F+wjMs zS`-ti#xqRe5lhG4LhFhkUk{pr)|!on%G3i%5&4=|pH9NEv)Rq69QC!dB^!@J*D*_K zhu%4vnNGlymD)2|$8X+~4w!9;-|Qbg~2t?wEuwfH(% zwR-FNKVIF)Vr;nB>hMu+;b}zLp}{_YK-a#+T0xi^q$5L%?Kdepz?a^U+lZuKA}NSI zfUzB18)}KASC_>VpgrXR5XY7F-Q;(vw|0ICA8&GY(GRGPw1fqn?vVM+ac^j9YJ!b< z+T*ok3uJ31X{D;FN{=5{vr{jhfSv`{g^tI#-3uw|0YEKR4hZ(M-rsOo+D-;^)eOi2 zmuk*A9?p}aeHx9}ulNg;TeH5caSZvZ+uPf46%`fsn>UOp6$`1(7HDrKhyhwl?byBX z#8>MpFonKG^P;U0!uZb+-J`pBrL^uZ+OaU)JnZ|!*E6Z(!8YV6_{5>W#dQx9_r^ho z30p@r&Ihxiq5}IQUvGqq=D^1IP4o`nhDlYD$;@{!ZfI7yPk5>xpaFs? z6v_w?ST*q2h9PMJ2%Yd|cYq}((MmFIYw}Spw&wsnGEi!(N^YHj-k-qMcNH`o)PPn8 zvBJzUcVUYUl2GbkzW7}=##s&oVghhJvy}_Ll9Oy5m<2J$z~J7wAeJCjlOKWJ9&V^s zA(Pr0(C8I5f&r}?&ED9>FH1OLqL<487f?3?e6SIC`HCZ6Lq*z8l690D8}1FgO%@f% z8p!~%#D#Q=inc8f=fT(dBVHPEkEuI2lppArvPn8xpfkv+2Wlt(~jTB0fkTKI4^2u(QtK%w8p6jw+`637xR zOz=DcZ($6cp#M;XWS#sjGdWZ=bBL?-g0` zk<+d%Q@SuwaR=jF?1_ruDofS|EIg%6mGf7T_dKpp6=Z~!77zRmXkit2_dAr`V+VN| z0A#@W^E_T$Xf*Zt@a;!KWJKh=MC8h5w?^i|`A8P70VmZ61-J}K#O58j*@gr0Q9ni!k`a0WWZZv&3kvf^ zQFGBGpFfC%ab2Id+!eEwtla+|X5&vH7tR1#pk9X=!JIlMG-#0IAu&5R-#3kOhn`-< zGRPYtT(>#|hT&;!v#HdO9Dgt3OGGP7bF-_A#bz+0P4y7298^M>d6+e~MH}$LMK)bD-TRHDarGV~Yorp;0_+o9fL=7dYfXmDgb98#zHD6-UeFMHxIL3w zqUKU#W2Of%e8eIV5q|IF4?-}2)g)%_FnrX-Fh`g&HZ0*apxeG{9n6EMH2<0Q_|8^X z5VkFakS@AJ9ZCAw1LQ-bm%=?DNn)s}haEG)=d@sF-54I|rT$A;&S6R80=OBvSkg6( zZN#u?h>@Cb6=7wV3E@OPms3nROaCxW+HLDakX7jm>1!_Q*A13Ex3MZLWn4M8jYp&aimDn&W^r|s^0E@mf)TBkXVT4?x9!l+L^sRFA_Z$c!{A&&vxKV_U z;2GcV>zm(rG3Y&gMhKw-x(f{cxkpM99(gMVl5|N&TpXc2p-EphwkApp6fIA^&ub2f zhQRI|(9BJ?)h@|6`PG;!z^=XLq+*kq*ms_I%(=cbKEJu$LUor0%OYmHgRsUZJXFE* zgce3_ZfJ!I#hyQB28LjRr zSGfP?Rqn;fxU`P?f3`3%1Ft<6GKvLnkOh z*pV*t&mG*Z;(E(hA8E|L{QJ6kp!pX^UTBtX-p-qtFb8pmi#j2R{ZWqN>bbu&nYVvk zR1N5p^$-9bS)Bt>+$G4BUo-%Y5;_0se;1N6h%?9FiWc2k#2A35M@L6z>6_?cHMmD_ zqbvbD{;O7(Z2Hgr?%LU{8SvmvHqoVn#NrXr|HwJ!o7Hx)j4Vb_P*MOwH0>|V7?@sM3Dd!B=>4pbOUnUm;y<7u& zRX^hRtRMWAAN)4ldX(&WpHJk0&hlC1&MlB(x#LI!&qBmKqShyuR{CFD(fgrj0h)xVh!~eIFAH#PG@gZcL~v>mLh!e59O68p57c9l zB=0W|@R_Ijl87JQa!Yo=l^K91481u$0S1^oM3n43#2nx~FW z79x(nguXFrBmBX7wh-%ZfLkghAmdZz+WS>x-a$hy8BoaaMu=&mpTpydae`$KPh^j0VCYJreBnr;eqkJ5vhZXcczQhsdf9GqsPwBg z%w!iz7ONM4KHRTCYc;`AuM{ zSCa%8M&~EEI9L>T2iZfpD633?N>2{v3$y+9?Z=C<7$DtX7uN(ySf&}Y=y}sFO%-6j zg{#ay+rtpTD)=n+d@tiBF*q^oQ>>h~PeT(~uNu<2!)0NV#xHV?`x3xGSwAk*{Wo$XwRNC)gCad}p z!(kZhv*4pzDxUcbh=UUA#Ukygmayo&qsC5n*Hhn0#Y1n!^lvdoM~{kawT>A7mQ#h= zK{;r-+VRfFm>f}>3=ZtJkrpSymP%Q}5<;Vy?N^2-|5`z4VP21%H?)j>YF1~KcPG(} zMy&#!*W`!G;#Y4S{>$dmAH=r5ySfR1{5BuUDeYs{}n(5Ug%3||iCYj}3 z>fr#s$__I{{*gY4I z)|;9?W@tfzh17bbf*-yz-b(0j@03Ty&pb=kXap=BUM&(k-2-f z%gUH$zST_W`=`UL?atSJQG5we`voBinsI;<{M$?19JLvD_HK3E8Ltl~`ds-o)3i*QV{a$hp+Aw_2op+x1T z87#;>z($rPZx*?iwB&)uw^asqwQVB(Fd0S@Ns)_yta&%9W&Ih-F`HD4(eK8LLgl4W zq^vStry_+NsaF>>>!z?iL%6f2ux>Tn!hd{|7E*QoJD4PBB{8*Z;3aM)kRoOxKEu)> zeO6;gV4+kMWnNiEfZo>)|7{~xRA`L)aM`{Z#aT%;%6gbyNG7Nkql(jtz8kj`)w~)! z`I@wf*OR}XiY3fxL|>%{g8e zjoQ?qURck-3k#?k84yN_Yc3Ap!;^AlqG5x`&=k5ur9j(t7<9Dleo&Km%*Re&%n&OX z?kOrSRmvhNMV@S{H>qblj!F9R%-i=lR9;~Aty3bNhrol^B_trY{LpZOEOZ*OCu77~ z)R=TXQnjP&N)oP9cT|yPXvClwjUn0|#<-yNlGuyVKe|@7k+AMjk7DgFQT1-ys@5QP zF>HFK5b=6MiBU@407FppxBqRm3Yx+r43wIA={%$EY6 zo27$YG4_yXo$?S`-M-dA+g_hBh7^{x5TQEkzerDfdyK|c%I6`(RSKgd7pD;I@}bC7 zNUchdWKsS4H9=4wNK!xdVdH+ieOYB(a45x8ht{1DvsqGz$g&gWZZr2_)|^PEY{l0T z@^$I}h-cIdn-y32d5?G|N6F>14CAprRzf+}SBv^mseO$&CHMzh71sT?Xa`3rtCeC3 zA5A!@{K<9d#Zko>?zJ^Z4pINZ`D@n>$@2BWM_H`|{B!|$V3o{DRbNb7W*<5cC`_nI z=pY>Syr0+n>{tDsGAGrZ8UQ^sK4_oiP9a@fl!vz6mK?mf&ZRNIwm>KdCiIj<6Mnd_ z;lCE)<)}hlGAT#C$k?YOvoFCRQzY#SMB+SmH8~umEI=bR0h$HDWg^?wLW!h?JGw6% zU|(SyvCWxErIaS}spP`d>}wb}>RibT&sJ)f(8^aM(po|#uxvgtE!6)846D9Iq2HG2 zs5>D1sNRx0QlnJ+QFoI3AqKq-MsFVPM;TOr; z@9Vk6d%~?wqzJ03ZaU0yO_3yx%bdGoXvnr?#wlE;r>kMdQedhfOR`|Ilz?FF{!N79 zUe@sz8BgK8gnfc@X-wXS>870QTLS;h6VnwOb>ZY^$FL%qQV1^PR}oiwroCp*+K4m-32;4Z4cIoamL6^Wq{&clF6^Je(<GLP`EUCjfl^5$z9GjzL^=1R8i7y zl$7gjkmkvhi+l}jTEZuVJ@Q|?lwj*pMXS$vV`g%HfeE_p5 zu6o~%D*kc$JymYORAVcUFvJ&#q#P1#Rnf(I?y^i4o}5Aoc8Ub7Q`VQx9>PA_ot<Bd`4m0LTlovF3y$k_cXv1!wGDGD91j(;$C4J`t_zs8jvw}$YS zT}-Uv(HVjj_8rEJ>UkJ%t`@vf{95BSCeXCax|ml(_^xqt(8mJPrhD?M=A}t^^@k<# zqJ9l+&mC63_Ik@3;^RrFSF_=?maacKJ-UPI4#nd;43?8L<1D-yiSn}P`j6iT-pt8j zV1hE^Z5f&Hy7iDE{ba7tlvi6(M%VC15lCgP4rhb zg|c4{pu`tW=xkS>T3gnjZ|EB6PqjZ#~v*2>r2{c`N=B7NtJvgkXbd8))|;Dl`8BjMl?7>F2;{LaTLlIp^Ea%$GxT#Zzekr z5~4aLOCgsng)WEN>Lb|b8^70rI;S~e>lIw=B)0224<%OCn}zc)OgpE9&qXLotHDZxR<+Y=Hjt!c)$6OM)+^Y!u3%T4QYW+z-JGYaBGjyrc1rzU z`P!n}SXVkf;_qQSo9(_mprZ}Qb{BRwe8ox==W8VFtdF|VNRb`!2uuiC`uSs$ddQM@ zM);ljS)la7VWP(BPc;8*+w;Alv== zIc~c?Ip?=D*OYf}tXi(`1wo97l>9^IUKH8b^#b(cbZP>yq-I3Qm_X%5f0lU9FNCgL zJ9%ME`QAZU`2LvMq(H@dBE4H^a-v}TkN<99T>fEK3l3R=t|W_jvCqKx+U2RAx5A{} zuk*%=Mnhw5>rB5ui$__UVYs*EHN6|4bqxOVFUS8z z#y!B4@a)nq{2x4)DW!95t2@^n8{us~uwjy2{`>p6L#htV`cF@e)!WQ;{d_H-QuoNp zd;O`+3#I)G9+~@kH@RwuGZ9d^8 zTvyMU>0U`-4|^&b71)c*`q74JL%JfG{ycSeL#3PDt$Z>S=gsZ&WK}_=3DSWiGL{UY zG!oS+(tut!Z=ubRN*A;6t?w`-V7wZy)T3QT&gv9{nmdiD%m z5YDv~T3-fpOO;o*fb7FTWWx0G+h=AAQ$^Xexy~Aw=FhI3zGFm8f||^~|}g zA8p8NhV_|0{% zr5GKhdgrJdwx~3)v2deSqWYu! zy2pQPcq^~>Jx0!(?(_R!AEm0~rMtV=X*VxryJDMzT=%R@kQIk8?(_pUD53f1BJ)M4uI?h|inAb)Fux-9Q5Vr#j8@aWko zv;Cf6!?2SP*=oCN%XjGYb`pUc6U`*ds80^KQ_^DCT>qNlR z=y0Hbv)*7`>zGe};t$m%8xlTGAO)$r^DpQ%rc?C%h7Pn=B~YH&6n?=B3EJJ)=~pqs7jRSPPRnB<@u${L&vskrLosLrA866HoH%_ z24|y_s!08g%n9TV3o0L7w)_G_F~;H_zhPgm^V0yh_pd_yKeg{kPiEJlSTR!xYmHsG z$}emyY$AM}YNC9o@-qIj>0Q%FQx79QQhhLmQ)mC0xGcN1fbcdGbAHR&#u7Tk&!?kYjhUK=}7n%G#BCI@E8FE;&Nfq9?&BAZUOyk}3n;HyP1VQ6V-8Gk)>dnUKm zGLMRGM*DPQwoJvZ*t|}zJvM&apiifLOTzovBtYvehR!( zk77XKFg_{-ZMUg1$QRLehb@FHp8OKw_wd=r+#an3OrVpY0CM?$HCK(zdW!Sn4wFyX z2GjI%t}Vhp-1H^cnkfPgyMMLT{%O7Z`qy^zS(JP#ftXO7bP-C3lci+8b@p9BgF)($ z#wxS585KR^spT&|^nT|6syh`;z2{%ipoln%;K7ox-T{vI1ru&#)^@2W9(j3|6osG) zORk^^^w}gK1^VVkJ2>t542P9kilhmvm8R8S%?opUxEYQGBZ8cA28^-_9B=q0$D%gg zwZd2Wk1v(GA8r?wq@JQ$3mXjbKEaDYd1QH%XsWXiOZ+#GS$;`bPnWmYTQju(w)ha$eV(--lvog81*E8AHR$tgWJR;(%`9G5~9lNy_p+!=YiQy~2 zjv*5R>E&I_yHVH}V)t3sl9b6m$~9}d|3q!7^rZc0(5r<tRY;GYp%epoZ#`QUVOJqh;RN>o-fQ8T~*5hNYz#^sTq!@G> z7MR+&GyIC_MT1_Z3doDH_0TpFrEg$|WOhmds>+LPj2WmIN|Zx?%@taI-5bIwL1ZAM z)*@2DU{i-d&=*uQ;S00=a*fC#SOG>j{;xge$#(MJyUWk{YfEk(w?h2I(Y*WjbEA?k zpFqjrZ=iG#64vO33rkZ!0rkkO%i?%@ugYMjy31dItBgEE6ao#Z_{zg!%1z;>$gH<= zaELGQA=|o$tVKD3oK`X^m=0KqHji9TU$R8#TM;~2XBK-e)9~GW9XJhD%Gnl8jbfB! z7H^h}p|Mx7WQTZ*Nqr%PyFmO@TH&h4=XhEE&+)6j@*4$Zz??7~7*S-xPb`)MNc&$X zN0%Z~0rP?D=r^{P&@)oR!9sU_Elry$g8o}UIV&`JQUb2{wx(yCc@Et zWS~&dgX!_#EMzvn&LeU${-V)RY|x^7bT&4YVLvwme=0R-5oH^P9wXJ5B&A-%pF<zgiTP82(#V1!dA5otheRZrugEWTJy+O9v-8<-)~@ELY^FFgX<}M zrFI|Qhgiqrv0B}Ni^tI>q7@PM@j2^d&1NDcR)T z)UDB?gI?(D>8D$XaY(aevHptp=is0p4+G@u*;Lnc191 zhi?@hjA*(7WcwBDU8+a~5l^Thm*aO7gAhX4x7by3@-0Y&`)dSAVr}@zX&>ZMZbl_v zQlN^HXd$*_A{4G5lbslKA>^$HIxr@m(}a_3cV^^$yymh|)01{4QR<{>53lj3#nrN( zGreI6k0^Q&l2PBIv@C;`K}4(8=qO)~o5#cP(`{(Tk)Tip!T9rf&xfVFEMtv-p)y zmce&XfobbSd1XPnM`vKu96R#qL)<3NKxDJNob5XATKkp7_+5`LLV<~mgN}zkRsXL= z1OV5${%6C{b-8yEVMbvr6k!hTYFP)84HK(G;9jtJbE0D4Z#g(qbythXeIY zw)U7DnY~^yV9ca_F8}q`LB3fM&lD-s=yMuR|JMiBn{}`?R^&EPC9$lTUOh3&El3_8 z+t6}CFs}5sZyZnINzt~7JrgXGE`g51>#;S@hsBxfeR!mA(2*V<{o3T`^l*%Yz+{$h7JJ0u)B zix;JJ_s5M$5WRUsG1$KcmhH2H5-Xo^^on5IqEa)w#*_Y2jgX4~^I`w|I_Ln{k2gSX z0208zmHvm)J(WSrQhLC|PheR}fb}@_M)u!S5_*fNM)>lH89o4F{r>?ofS)06Pu2Ol z>;DK%{^V(B!+85KX1U#1CVLH{s>shPzw>e@n^fce`#C_j-^%en;jC2Dz1w!28-8Ac z?LKxT1zdA5si@&wN4I~Dj~fDQ;i|ZcVY)Q~)Iw)JmN8M#Pf^G3*u7ro_HN>2cGx*^ z`+vi`#SLezr0IvC4>HEetQo#Kf!}n$Yvckz$tNJf zjc%1GIMsQPvo)Kty3oyB7y19~D;zPc82kI_pEI-v*T0Epe!q({aX8&AQo9Od2e+A# z{TM00Ln#y1!6kY)6AM&oX%mlp`tyOp_{FJW(zuq-d){V=V}A-OpJei@gUfi;02n}L z!61SN!05H_0o4VE5#^bs+MCT&^@;A2MvZ_XfqmN9*}3*5uIrIA29M0?3Sa&pE~= z*zxtXz{rVsuC{BaS|pR_i1&@}@OUZ^gHrl9I9PsV{(Za&nt#Q3-#w7@cWNz{rF^!@ z|9Ym*hR!m<5Wt~O>UMxwmWOsp_BwH*?C=avTf>ok4pi+zaCbms@N;FDK>j2gEg2*9 z2sXpDJ;E<6vJ&aS=xS3~^n`juCvMPWpH;K}L7l^0~Q zURTG(GK~6G--;@`F$3hvm&AGOWZaVT+hWa<~ zQl%8BK7mg{v}tu}a!s;2F}!$9P;`6mMv#yZm!L_71^CQc|F>GYM^dU&feIFbl{^{z z0l1rFN=b^+TJso+%KU8J_XT)#xgyuko#)?~Y2-E}!O(0C@o#y392$YW$3y2VlrhRi zS7I8tZ^1iw+&m(FzS$-^?_YWU7D!o)&bt9sEP@{bpGZ}UA|$li$V9ESB7OmLN%5v( zBRZ4HEg0sIJb#4v@J|bohU^Cq-keU)WPZjoy1dT+v%>ylilE~?z+TKEDg#DcpfL0r z<)9HmAXCEMTkRQjC^4h3hgNyTuTH=YgKdP5dp4&bQ#Gnq6vz10{}m*quO~B487B7< z3MF|{Oy3bXU~C#Bqw#9*-c^n}8lIix=d}pijk$M$AmbbcK3c)hh1JRSWk68yx&=>4 z@BI1kQF<7V_-wv-1K_m!?psG>MP_I~a~}X6tax`OhIfr)TCU)>-O-qTJ1YNS47{u- zl%H;W=pF)3fdY2G;d*l1OYXBMU`WTGI0XP6T}BrhCDJMD>r zSd1r{@-0lCuAk|*l;{>4+YwbL3I)U=TczvdyK=xHRw{|f2&LcuSB7fzH}iX)900@G zQK~3~`p#lfpuW?sGhSa?ui%!*{hy2;Aw&zhwp5O1N&>1CvH)ncN<~%&w#0F#2f@w2 z0mI|90~4edl^$fXB);SsRt^v+maT2L(o0o*nu7O0@=3W`d5k+WakVNFt#3$5o$YO- zz(|zzf+g8A{D8Fnj~oQz5mW>U_a&ZB%_=IRxl)BH9P*KBt^q({#aC+97|GRNiE51! z4`p9x7o=RVzpZ-VQ0+G`o9edIig6M`5n^%a(xpmSv}-K~VNf3&4rt|a`|hECMBYv# zqL6d!mhIO{n1v8}*Iyh@#cCBjZV?Y3+eSN&h#n1{>CQwBLMPcRh4`FrEB*2R$eVzY zudCBB--R_(R8o8C6JySG$VRsE%^VZFiIa~X5<7m?cVudMhLUI<<U@EP=%677n)) z<0kikG)|CF`7V(Z@Y$#%njxsTR;iFwZxGP7NebLazfTW0ct)m3WH^>F+4KJ(xxXdA zF0ZfgfA1+`)F(bj?uTq}>ueSoWOs;CNa%R0&_nQH)cW+P0!FP5FFHH{hVWnDGs8lcgjSSbT0>9&5O=3~T_Z1?0>iv%Y}o`32lW64Wh_ zms$3Ae(vk{`PL8ocBqTN?T>!ld3o?_Rgl$N8IX!hn_*xR^de-slVg^)S8@I&4MZiE z8yXs3myYjkNNnrN=!KR(bE;|sY^G3eU*DKQURmVC0#}E|jm_@}GvK_LE_Fg1OYG2z z-H&35@kmp5x`T?)b3mp!>(X{{20cYx#0Z9P8_cat`%z<2A{7d3hg11qHZbmcga;3%#98 zx^Dctuo(z=F69OnuQb?2r_10BJtQ_OB{y|;eW|EbpMljqSH=e2C#FBP>-XdG-K`}b z7*dt@Q)x!+aFH>Wb7Odj-;J-&*#}F(8UK$HgRrnLIkNNs7`4K4jx0BUjp7&6&jjr0 z*I>OLCp@xmGsOZ;45k%Nlkpy(xMl}%4LK~K8(gU3RM|3G<0n)BbW`U?kz=^E>;(Ge zzc+4hKiv>mksPIs^0ObWKHb{(%%}p;sw=3@0K4b%cfd#k%bk2Ez&l=(l)dxWr{FWd zdIRSA?*5w1b>n=f_t%iF{daqJeuGW>*G#P9;%~r8jpFv#G7$Wifd+{?ptILPbUAwL1FN+sCSDf)U5WQinQHFLGd zF~lQMl%UMz9-$R1a?tdvy)>CH)?v9ze^*Ec9w!w4QMoOX5h{0oL%%_c5PZ9V>uiO~ zxkI?^7`>fbnbTCp@yH{4dQ>v6$R0j}+x<*n8$ z42OTbeVO_a{dTw?2_;_;7vA_FOI6tnc+Fmf>#yR!>lDQ9H+%&lXi+&z*Aln$aGVe@ zcnMsW1!mSvmu&rQhp$_rA6*QjP!xRVsZT@ALZyr#V5CgPMgIDMsK^!BDP@G;{!8P` zzxGWF{_?I5lx$hYd)`jZ#wB;JoB%{UN6~qfCxjB~TNmS|XkWaA&mhYk!j;kmNt!}o z8Je)Q(Dfe77eHhG2{d9CQ7Z320TpzXNF+iTkmPHcj2kZJW(lxw@nNAV( z6iyyjc4iw%nfQcFVMb;_Ro8(9$hWH-iu=r}?rl6HW;$Jmcrn$;Vs`}`bM}h#hOJ@e zX9N=Gqz#>EB*YXccEf_2d*rO-7Q&tuFtJeVEv6IAthKmi921)wgWWeKY+3jJ_{Mx0w_7xZ0^zN zn~ezV5c{)ZK&InZW=(@W6tiY&!!J;hWcf1Lu+KY;Utu%AQIfzYZe((=zku>si;)jp zJ6ErRJchD4_{c&n)GW3cZ^Nvlld01z?Of#6aNJ3fSj$ZlEIJJG=ifK##J;^M9F?Rv#> z5a{Yr4JN}Q2;EF*xhSUUPLVBEZt8K9-<2B7y4`1d_k-wPpIcx3qx+eSf5;Ky&`-9z z`@zhQG{iay%0tr{_$CBXq>5gUnGUF;7?`x&?ID&G)v0!!Ed`CGp5ggsP$XX zo**Uy#bAmMGb8EKI)Sr~?qBBdHfyZc19!$qjB3!q9sMA ztBk$`0O=qWHZ~3t2z2_8iZ@Ay7Pkt_Xn3RZcIC#K!k|+WLu z@IcABq5ByZhBSa#`-Q6k|C(ll_zPLy{J}d1taKlzXC?3x9WfjC$Du|qCo0?dVd<*C zxGG&jK~k3Et-_Ixc%ucLCUy=`IkCtA4D1O6CulqJ(2yxJAzf0)a&h}tOG8gQU;2OI zr^$-yU~MyHvFD&c{c80S#NhP7MDO?h&)-~%-ThcV1iC+pY=WS*6T?iv%+Hk7yj4C* zSa&daDwV<}50z(|yaM-z>tGu)wXR-jGYK(noyG;dK%Yg0!rZq3>cL>pTxXZ`eNYG&O$k@n-likVprcam)xs#I>LU zXzZ~=FLFc>Dw)Tr$5M{W65imabO#`MEDNN1!QR+zO^i*R3;G>ZZ->%XoQ9rnl1w7KEklzygf{${;}io%pJ?@4o(Qv+65w1rRE=@5<5j8bLIbe%Hst_c3Kzz_&~3wyJa&pW?v8=Ke- z4CUD4jl!{CXV?|^tBE>0PHA|E{UfLMg{3DNjBcQzPzi6rIx69@?E|7_nrwg%TBy->)k@KcT?pwl>%oH(C(1ZWgqp)2gqqf_mT9MrjUep6v=tw!H0 zU<*beif^b~rJQRyW)>J)di`M^s{1HxHhIw2z zMb&+GtI>J?yeOsz6T@=*5JC_-BQt6I4L?-an1floubChmFJFYi-}|6i=CdnY%Ce0* z(~Suuh~tMoXj`86a-*^aoj${t%Dc$&RC<(UxvMwh23nGqP;2@IjR-?TQ1y&<9L~}e z-qc*5BFh)O_rugQFcY>K98{pZ2Z|h&&37rv2zOSzka={5!uYt4MhQTX0C7mt#hzFs zg&#hVBtT4oQ7hZ}Q)% zNhA`K6*T|lL6@V1?ZggWelSVQh7sarMYh_HS$zZMhueiC#tD_CP(g?SFH97GywMEL zhjGr-S6co0S_s7sOYjK-j!p1^pB6Be6rie5Pb&X07CHl30WcmEO=4v%l*5#lBSXa; z)B)^gk}Fx8S=S1?jYjb-1m8mUVro(8>3jq)*1v=6F6mVIsYK1RHcnP@HD82LW8<+d z0~5{^8Jglg^uGR;1JE4i4vD;nIst{BN~kFeURRV+$kBDV+jX3@S!`nT9*_jF7VvIv zsxK{(j)kwU0BViu$f;b{jW(bv@o3$KV0WCx3Lz!mr)7X0TMHnw<#}muoV7D;7m*iJ zUd45w+&WmRI9ORc*pdnR!PcLv_sF%T`wiwddf10$Tvcm?$^%f%BPk}4rFn-F>un-CnIU6^v$<9keq*$b_Zg+KO;F(xXR~@7E^Y z;t6BpHvaNfCNNdot{x#*nyhV!D`GV2TW~@6_ik?v-V~QvHNG*TXmU`hTH<-{UmDNK z>n%6#g?XKtu~Gur>@m4pGd%c#2|mLVX?a#2-k^C0lLul+ujUW+LWCuCcFegc!L8?6 z-`=dWKjUx%Eft(fZ2xlOTR`M!GVCpagZp8Yx&(AElh9n9Ei4uE+R94{f_r2>In`ux<_jTr@Smsk7BJ(b zf5(;xmnfHf*mVx2CF^{jxusrpaza{EaO|<|j!k3ffQoA{yB_Q0gkKBJN_`vaEbP3< zAIp2Dl-*nKtt918HtWNJSEy(z*IGzM&6>4&1;cYW%MPVU&;E3+GnpM^9(xw0q_ zJ0x+I1HqGN++nR3@gNHxCm|d>m?qI|cLA@Q<=8E>sDBxZ~#$9W9oIX=ZT7A57t^9jWW)h(Mb`onx^&Q(FAH_>^WTZ3>Y*jzfe z{iRSWIi7>h3v&4|?73%>;JW2VP4p;-s3bs-M~?s|V-PQWScn#1OVC@tPlpyT20EYM z@`X5O?H+v4exg(1CsA5(6mOP=nUd$*93;9#edVUL)OR|X+M$vnT8&zdfxov@PH4B(`ohX zFPwCYplC8;YOd`7vwkq~R>-l|!bRY-!pA8dL;zw8K@}W9hzSK>P=Zbx#-G;5)KA}2 zgUvJEp2(l}(U+S@ELCB9goTIj4Pks!{R3D7?UBx7YJX~pj64dU6PGKk@3-uEMfUv4 zi7t$$ZRjtudP6Vu3{N~PffDrLGHqvvQX}!rDYYV7*nWdT$yU{P9rH~Cn!8TGH0Caw zhO4DpmC&yoZ_l)8!}-b6HLb_CxeK2p!Uqn*JNI z51yGy>DK%#=m_5GU+)*deAVTri@-U>+zye!6|Dz^_%|aJnTvW02USuE4>Vd7n`7G4 z2JN@^Mo@AJ4F>27-z5yaij|2_HBJTHdGEYNWvz~zzU-AkVGVQ9 zu#uVE^K?^*n73q90di`c&7SQX&F!h-C+g&zqmAYYv~}@$OB{MZXg*CqZGXnmsgg9V zan?cGPw9t3Z?J0(|EG~TN`50*dqc=<@oZig|N=yW#m9{}s%0aV^)j-c;X+ z9ku4MHnmTyQy1p4H7!pJ`CPv1=n6pb*>Kj&)$e>UqbVE3+wB=;Ncp8T%Qy82zDoH3 z4=4J6PI~2_x|pyW_qz|N<}<6%?!wh5eA`W}*k#1p+xTBMB8qr`Q@s5qtA5b^PjF`q z(~+aHk5)GxGuF9VAM*JyceM%n<8|>Md%dv9M1U_OCpF#I7kxjm_tt zu79N5#@Rg7`kaJt-&jJ8O*@{Ua|qH_6{dwwK&BbxTFvD~GTcXYj!FHvcmVndSAVCm zHb=ERpSLeyxpj^H#3kkerM9eBE9Nt~pnn$m2i^28u%sGp4x+ZJHVO2dz8RPMd+jNf zeyEw)_B?;}^z$0a5B<>{sQ2-1imi^jwqHit6zAz(cB|`GXw-JxD7Qee-QpC^P^*(_ zoLOYhnYhnh8-6n|f1}54e+oWr^;!d{4DRP?8Ac^sSoBCVw9hcK&#jtpbgvYcHjh|b z%d6rZzbp4+J3a~JVnb8c?z2h5T+@Bbm+zUQ zF{2-|lT=mAI~^Cj+jZ>MPKUIt1kUPE(yv#bD$e|MrYDBpE^~tu7B7Pf+xgrdqwT$O#{Spog59A%Ds%oC+oF%n8|JRZ zDB`hg=7v4*clvw`bE@;Oh7G6+1U5UmrJv97+4;Xo=c{2>x0U^_e~WmW3Z3oE-FDAx z$t+->d+aG7P<2|0ZNMaTsuKJ`)u=HF^r#tz%Zx)A@y+cnO`$^|b#2J&~<4U8LvbS6e|F5rJerX0~WCue>#g!opNHr*Dztr@m(YG@S zN*)?Et!?x%cz=L!(v#U49yhi(x>JPPL{=phM9pHnb||P$Qh~doKk3II&12o!laB+% zB?3a4T^d3SrJ-Dq15h3+{@pj0{f3}!GjZY7RX^~yUuWlY*K!J2&CV3UYx?_nJQFo` zfj$3J^R7wrT};dysGGQTCu|^vSDG>5SVTYP`C}bsP6dVrPrsD%`|}R4exY}XX|42i zfg;gLj7BYUA{~#&5hvh2e?cBE*=l(A2-V}JO!TIM%yXdmZ-^~VJ^%90hyroBxfxLL ztW6P7x=|qh+X>mnWjHO@#4_E%0Q22Ga6nD?0w&>~O+gWRBP0UMJsNZCRGv%U0bDdC zgJUT@;vxSPv)6RX*qt4>MZmyaF?1}4L$vpwb?Q`SBItLn3~S-E-eUr*FUM;XsZRIh zvEU;6!l_68pv@yR5?;Q$Q?)PFJkFTY+3&qjuChzPB^jdM|FedmSwX^%E`CY%gXnkH z!4gPhX+8KML>4xWD|`V?3`?U$(8aKuLnFT_IWHXLQSCIqtJiBggu?PqdcbNmnQsn>(_Y_hH z8Aw7waz-9Yo)d0V;)sMim4qHnVu#dwnFoI@F^9hf^Q{cr=U%sn%62BlNi=sKMa7x* z74i~c#ZWeuKwxJv28w*r+moR1^&%JT)TzU7f^PDGvL~r{X}I4n7b9LXQDD1X?F{V$ z6TW^14&YGsmr{Ah*)@H25#i7Y?rL$|=+syFBoj~&dmf8pT5vr#|B|HHa%C|DB{r$W z#(z$sCS#%_+##_buv2wf%cBi~gd_aLPIriPpjNU5NcO~_K8&F!yo%Dt`^}j&(cXMI z4@~v?q7`znyz(uB=^xQ`mlRtfrq-EQ<^F!ew(|}egw&Ok3!QLQ#ai2{VT78m%m6n! zDOTz8plL)0isk@c^POy?d~+je~f*(Yp~S=!_2VO>(!>Bk8cMZ96%p#+qtivZ<2?h0js zTxJqsA`_s|>2+P>Ebuu_N>V8Yi4U45M0Ii?gc%>) z@4H-VjXG0~&AVU-UVw`1$fR1q$ZSsB8gpLfrxJq|hq>3|dlg)r5FKWv%7qslj=7&O z-^`d*d-H%ffs@HN--t{)5*N5=e^a~a_q5Ex2-6jV?zY{$^DgK{G@IBy&F230*XsqJ z6n>+AcqZ=VU4cs^9l`AmWH5H?n)jYX&nme^*d5?1qDH282$)uxjWmlkNrAj+I2(^F z2jRq0cHFJzA9AQwWW=ICTK0puOhStl0+?tE##LW~&Q;k}o^-eT1<~dQw z95MjsA;D!RC@B{zYlV^(Nb=0pUW>Pba5gh&QR>N5_ z+-SS@wl2aE!F_S*kIlpeBX^^|i5BUL$crN9guFb|6U#Bx_6a7DLq`ctaB`KECG**`gDxs715a8J_e+fnzM z--R|Zu;lM%XZe<-LO2KswX1*pC*qKqJJ?9YRFv+V?t=<~y&Dgag7Q6~U4W6r$O8N4 zcQX#?8Na|d$pYzMM5Tb3>|cnqb;rwWoB;Rb-#>5X-syJ6FZbXHMhuNI8A3U=a1tQe z;bsV{^M-~~IAh*2o-4nOFK4`NFe?9^UfE@P1BJi?oYwI?Ph%wX$gu1}d z>I-bK-?`@L7A;0|u;P<{Y0&G}JW`dis#@+Tlqm#z-|SYMc)nDQo6E)LP2{xPZ*F@b z4LnFDX1VQI*U06Z0kXb`RiW>LI>VyQHkI+w)%@L2?gpL(E%~VXh52dR!x(=)4Tu2S z7sz8sFQmo`h1eA8JC#s)r%=>E$PK{>Ev&Lb_5MP##SZJSsuJ`95sh+f2uMy*e0^LH zq$vrL!~+$Bra(ra5Ol@ro2lRN2O|n`m!jw~12UZnp_>JIj}FqL#yL>;6a705H}wZN zwsO^$sGDsHp%bbwERO@5JedRgU@))8t5UPCZ60y68hGNhq0^@4I)oV98tklbKJ*?s zt7pp{w7vRGz&mBf)(Kofoa!#06u&6EHzR$(iH-?|6G$OGAdqp zY}eXtXFJtUJ;v*f`T^s2a=}QU!EQ&MePYC=v?smiFFr7rD7X8u@l(Y=YiHtj`<<$9 zYdNnNuixKMpO0GqiT3Q=X312?6`Vvc@j z;WXn0%6CO5b_+21 zH1AiPi2cU>0Xi4{lf4znIsk@TMykmKZa7}jv>oXrI~jkek+`b}i5;1do`S~9wsOZS z#rGWSx*hbAjQ$j$=Vf7H4@%0%WyQR#IpY=D zAWQdJ3R<$ax<)&KhDE&31&z&1w?X}R;#pq@WD(pa4VUh(ms_)49F`!cfY5Xzubht< zVsbnRDncBM53tPmd0Gds}kFfxq5-n6;RDoRwiNMzF`HwPKp=0!UNh z(XE`V8m*dyU?`+zSQH`|WmMMMAD(>J&}5FM~)24S^Py6ZZby{6<6S>ANV;nFcK5b=hCqBog!Ko47q@_(yzR(GM zU6ZKhBKKZ1F%3SQ5}Y8G03X48ObSi9oOaClwwTYN{q0}ku!;qpm9YOY`YFW;l)UC%x*ESYH3?zP$Rig>ybhuS)dX$38XBWL%%d((MDpK);v-GXsU9 z*E#lOZaZn0Oz~V~b#|l61neK#u{+qb`_+HI=>G*=1x8Ip0H!%LhRu0cR&SJoBed2v zZK;gQb_`2aTa2t2+nc1EAV_^t-Jg`%Z+**4gm)lnml49NNRL{>sQDA)Ark)|Z*LwB zW&8e*mvy8VNs^sPvP@B;7<(#Pt0l5aWh7+ZvXeb!iI7&=#?l~Lb|IsUv2TeO`!@F9 zdAB_8p7-bTJ$~Q6zW+SOb7+iv=DzOhI?wa9dF)K833a}~em+@3J zmI*n)(9d?Bt~;i9P*G|sZ;OXu@VBHq*^v`tx3#95V3Hr^8cSw1F2yVB2TPbrlI^%F z4=m-XFI#Lmn@|*~IT@h+CB*(b?<;MNmLI&9%VC5VuK;cudZX)&ozHP3O+vjZh1EvL z6P2bhA4$M-4DBKoN31+h?;Jew{lHh3*(9q0^-uM$wDpq(mH4Py)g^BW4zah>bj_}QiRbV-U~?{Fr8{)7I08$(R9v5LAv0zl{$bC_RMB?Q!4p!yCIsIY z*Stk@ak(`QrD}KSqE!)FHHxtvi`-zGHkuo~54DSAWcM_#%WMQFBa3(G?E>GfU4B?` zXEyGtgaTUkwBHCO^;xE%S=6F-V(A*|5$YMg=3Od#z3A9YY54u;o${`rPrGQJMR9rD zuhOCe52JSdNx^QD$kk_qn@tsKp_`VE%BPbVaI=%UH}W)gGkSM?e`G~czAbQYKW*{@ zZ=5M-^uZpni@cX%hQQK(fNIF%@cMaQFHcgX9F@wUX#Po|DTZIG&)%<~=Alll#}hGq zj?Ed~&4DS&fpw~2o_9Q6lXDk{DPZt*eAlijrYe*#z0Yw0l+^P62qay1Bbm)>+XI`E z76mn!rBPWJ2DhOXclavnpG zZfSIu^EUTVXvvPiSqps4v4tugB|2i2R6Ba&g4Ec736;msb|kBDp2s%&b4#2!*gu{KmSLqvXmoBXrk^ED4O;R>Ao{`G_9MR^^!(km3@?IWT8`VHi(#pNUOy1y^_-e$`~ zc$a}wAtC}L7H17*JXZ?9zF2%XKXI#ZCipcQ4FgHh2{PRtSpGV0(MsQr!*zylJELZ} zTewjae8WZSUk3tWBs!ZyPoaOKB{4EfHpe|hR8M_(^SDy-h=bR zomcDi-fKZLyX~$@@MlNmN{ zo^w+GLV7Xd>&qaMhXkt9^`sLdu$Ie^L!#E5$a+%{u;fVwMg`(y4?=$tkFH$vpf|XV zPZNB33VA)#YJV2#WOQ=T{kj}l{%pt%uPX=hCHL=*@Fis-tgB+8r?};^^-KcMqYk@} zuHErce*FgfwO5<97_TFi9s6p<=xOFD@naneC~wL$Z25~rLie;^)I0>5^OfgkACiG- zOSt*}m(`g=pe7nouV06C|JyuVFS($Kbve8gIwiWL+Llq&Xu;J}IF70cnanu9#& z0BJ;mkl#-g!)Ch>h0yr9LpelCvJ*?4tzAffHLBWS6dXwwF7-*`D%6 z{p&RfTl=7mgmCtyY{L#FE@>0CLznQg!%YT|vpxaF_;@g!ys|XegBWrVAl$11c!gK_ zZgdf{82J!iON0m*z?PSz=Z=^j9=iOR1WYmyn}?$MpMWI(o$5WJ>_y_=Aq=SG_Rhhx zAv^cufTxulP$gGxLGg)#i1o4j#TOb0gM-_wgQrj(Vicc=6OLng@S^q5NB{b=2x15M zt|Re$aw7fU5xIDo<=ZK~s%c#>-*3k2W4huG)+U`R@@qrc-J?SBGi6hr!~jN>I9tzg z1My4UAn+*XHt#O7LvmPaC5@2r1@m2Dbs6$H7}s^TS{+mK*m( z+jzNA_d-NveY8fX2oT2dA04w^SrPQ}$L-Ejl#X|h&;mZ+kU=oq;BQMn5*$<7Uez)B z@##8`z9`Dw!i3-D+!Wjd@kdB9L^40?ltyuEky1s&_rXVGj#tJN5Z~v!qJH96 z-%`}omsL~}WL@(rG}!n@L4q@H;sG;3sheL8GRJPt$!~tHr;&$b?FlMvJJpwwCpyr& z4VU!sCO)BiEgtig+C`Nq>1^xrbD0sPqN^ZR%hj;e?DA(PZ%sJU%)1zGPUe=euW7%5 zV@O+nR&?Rqx&C3ix;yGbhHj2ipPnQV@@AEb>n{4Js=TJEcLOGZIpM$osBM?;io3UX z@y~X2E9#gXE&334CPdq1_cj5>skr{KeKf7LEc&m4f_-24+*NwPP}PW}Uol^Q50Mru z0*u4>O<U#cq=?M#DnmZS~>Na93c1 z8J{xk$KdUBd3r@b(p7D&zE*@IGiIMQm*qEK(vOhpw7taW_)*4Cf?=mvD~~Si%Uokm z*a@P$_|FZ7rjsl(=wkw$0a?dUw#~I5j+oLvfU?Ccn~pOXc%nNR&Q=OZoTjkxeRr(# zXSfx~-iloreJUPb)AksxtLIG`*Z>pLb#BqpKH5Z!`lubsP8uLrG4vl;UYzKXYYKG0 z)pJ{POQbjnW?06;WjIjr^)RF%6%!-*T+MY&d6@tQ#}tYtAO`gyk!X;MxqR2C%Sp_OdDwUnrJH; z1Y9TsL4AVRtx|*ArnD6e`SS;W7C589KIyrTVZ3lRX+jD3DJc`&G#`THewO-!3>;{S zgI``>Zd&!*#L=f|qf{XperZCpmIW$(I5MAzb7)(r^9Sys-G;e*O>AazmqZBq zOwqM$kXL+9tr5k2hKpUWST%so+`@y3psY!nh9lu9rTf6Z6PpR`w{D)=su8W3>M-~0~ z-2EpcQQL#rN)u^veV5MiT{oO+cSI|p&!G%EUQ`;-A!E3=slEq&T77R<5x6(TBBQEK zid?7nF^4I(QDACpKL;;G*syV$X%AU2aN1~h9t}xqwwiaNRh7vk5oLzfihf?X<=fe9T#Siy6XPiNkR|t;$ zEmUeGRHdK8q+Nubk93t2H_TiLDH444=dk2+$=g{`oM+tMOMHoRPg0W$c5K>Bp z96Hfhn@`zZ^3P@y3AH%g4IHCc*9WAzXFpBJkna$rX|Z^-OUQxN$1kqz{+YWw2ty_@ zOKE(c_tCQbpt6Z*F3bK0eBc`Myz za*%aF`EIZ~ijDM*%bow8ifeMf>77e>#bUH$kyh-0WT#f!Q_aR%fr~1T`FyYms&oqY zPNWfK{aor~9IK?3YP-5|cC-yW_U}sfM~FxxfWD{xdZjW{!@_Wb@vn%< za^oq6=D>EmI3=w603H+e48ud%(>>Bv>c#tJDf{eZBLV)Q{(W`SzTM6Gm1qp zZemeHUXrA-ohFCLhiTDdp(aD-&XSLAnkyFzFox`fS$AjD2^`kRQhXhK`?@hLdVx7V znlGN8roSMk9+$Shqa|55Y5eolB+($Cy<59?HMLZ~p}25c#SpKF?9cC|MvZeL<)NMq zTq*A-dY1$$jR~j+c@FP1xgbu}iK+u%<69y+nbQ(> z^1ir9wuO)pn#eeeF##k1Bq&+P;JTtq-Svun>w)2FriqIY){Ozo55ia8Eh9F`P+EBL zINn>iKOZeYij=y)a9xOO|3RqzeC%A>I@4w~QTip*#7vUIBz1e(0?5oVQ&ZpNR39H> z=EZiysq6GcoOpksn0V}5IaJwL%n@(d$h-%YQ`uKbIzbP59V#FKP)a-DK+n3AenAI< zPQiowC1?_QZO%J4J`iSF&_hD5X5K;)&z(L*yMZv*p}Hz-QX5nLM32ifEdJCrGE!Ph zbf^>Zc(wtBc9uqhgw7KsT5uK}xSSZgCvyqXSXNJLEBVMYY=*0nvdOFCU~h44aRe-} zY{wqy+x?d}tBhNOG#^=H=w!`~PxE`!GI@@E&4`N}LehI7Q)0=@G&IlS!tqI=`h6b5 zZ=u$1dwp4Clj#$2RK1zn1mnSQGM8|F<6{NZbA__RxO)37ULzy7$)-Q)jnhmw$H~pM z8zq-09X4Z!#t+ZfUSnsRC>PA*dzU2d-kAeLUz_vayAwVejm!(Tb#@J&xf^W%dKya{ zcsF3KQ%p1zAvwNl3S$1Xd(f=Oi*DL_o7-9D_gt{@Lpmyn=wkcXZ)e6^pZL+=2MDPU zGDqD_w9v9pUK`|J3#a#>+3=X`DkM5h_1eJxn+N6o+bG3UMAO!lXBleK^Y-gFOTQXl z;|SF8hEe*ZF1hs6G~{4W+tQgpc{PR9UXbang`PV3fWPQK@cxEj85?p>NjvD~Miu22 zZt#NDx%uVSmuBuRHAD;c@~+gf$Bs~{gcJ{Nm9;s~`>`LIBgDnM;uPfx&m!th@u{_U z0A6^Q8&+x81#Xx-0B)hXs_a=8cSPpSXjHqJf2!P=ge_>Q^1#R64Iiml=LtviMzMK4 zlL+WE5dDbFVXrWTg{Sh(@`U0SOrDmI>rh@V+keu$58T`_e%>Up^J)G|eyI?fFa4(h6J&uDKbwZzih1w@%qFwSM5MP%tLwa z<_2+H9?c-co|>!j{QhX6PH3O)c6qq|b;lDARS4uQ}H&}fxvw(VO_<00y$9KljPNPg!u zFcfOv+TJXg#^O};!aLKn?yijK_T#p_IQ3Z3nYRzjANMmm9VD(imG`JmcKyy_Z0q5y z#lGnJHMVSVZf~{C+@v32s`Wf)#hn<x}4r->=WdJR4+ z>-09_pPN`S*xc{+lS+ePncl3dfnkV>RuqF>z*`zqK)Gj9A8lbxgcPy2^r^vYGzB0f zUwjwE7ZFCwRF2xQ_b48emRCTFD?1)wQUD+;4?ggAmBVE8g2D^xL3%}ZNHoa;%`4Bj z_E+bt{WhR(E(un6p@`@}!Ae}*cUsp|B^5R+w^cR~o%vZveO|hI{~gCk1Xt)%#iz>8 z`)qLm!O?n9IK#p!5lbV8-^X6}1EB(K=dsAhMb9A2|u{ccyL zzNB}=)wML6F^OCAWe_aeyMaLLLkeYRorBtaXz4we&Yxg7qYrk89s7VO2vc=y z??KDv)*or|P7-IzK5(y?k27EkWUFh}Ma}?ULV?D#nMJLr4pT=r;IsWeT|BmR_g1-% zePJ99!7fKk-fc-?ZecloJw+;BWX+OGErRRELT>oocP{5PK)AGc#C+1VMIMi$4HKF> z<(hZox}TQ`YjlRi`}^2aACG@eTsR}&P^Cy?%9FrKvr~l&8#B0#YDe038xv|fzp1S@ zhhKmeV(ASrem2Q^Eo~}{-aNpiYK@;9wI4CG#{^CLdqW4lD9T&sf6V`}luc(*g@-W( zJH!2q$qcm=FWLD-HjV9ph;B=Ll&dLDpGb<#y(Sm!S^aj{z1c$+1{T=5%q0ig$GMZA zb@W5DK2OxVk6FA_BJ8B*ccjg}S;9THOJmjRYvsoB(3rB#$VRo4$>Nm^l6ma<>o!zk zv3T>7EKjyxL@H5-mKU0O6@#a6q)6kH2P$bHV2hCl`hRT z4`nWXNeeP57l~|S&StsdQYVf6_Su+;T<^k?BzUuxX`^3qU75>70~LQGu0J*tB_TY@ zswlk`yU4O-k2cdv@O5P=8i7iXD~@oWNOioOsur#goGTan{ZX!>$`ji#de2IX1oxgf z@FjRZ;zO88u&XR=ILpvL;CrPeT`A6i4ig!wk{LQBlXq25Fzoo^4d&c1ljH^8sCSD3 z*qM~POolw6SCQN`GIiSr4t}S9vZXS}+l0jvEf??Jw%v?1g;MKtw_37}MbT$NB0EgT z5`6}Jc{j+P#yhQjOt42w+W_~5^MHxLt zl6g3P4H9BfZiEh&-V?)UMbul^n9Hh5rIm7Da9TC`T1oKinH^#+bN{0nB zzk1D)MKDYGC&wZQQ#yOEV;oZ~Ii1Lb@?W?un~qQ9s*m*bo;dik%2MI8Q~kCJ`bQF7 zjd2gdGZqwT3(F~K6rN#^PwM^5om7gx`o5R_>A~T`j>^hck4iCF6|X@@qsXghPTB_; zb+w;KqQZS@)4LU9b3Z~O5S9{l(3DVIha1_Jb`1FXZGl#t>ML3ouUYesd-J#*B^GQufeKey|U>3@{Z2Pj<8&H4jRmoIbV9hF>D^aFtI*CTH8eACnX%}Rx9o2Dxs+j-j8DEq9}Dy!d;Y3oqcojt8CGM!!MaU`S0$J+MjxW z&$472fx(02H2Mx&Mq0?FZg(1E`ApRXf;YP6)Lkun2XrQE~1j~j|E77L0tP6_x;&w;~k#5!M3Ctee0QTXa{8Gam z{-*~zYwJlnRrNbf%3UI^QmyO}@(_CUGLoX`>GAwAdOxc72X(8nuQv@%OTtB5(4N57 zYMG&C7gP2=Gy~d&j|Mu&miK9jdrVpyo|&$(?BB!dp;VA6*La`1M*6dN8~1RBQ;po1 zWJEI~fnzBCWSi*vh>Yj8WLIWp^ZH|Rfd~Dgs^jz9TxP_EYE~>BOD31j(Uyd9FX|n) z*va2{o=zTpd5=iBv7ummzmVsP97>Iwl?HlYRKy`{Pl$pa;eXH|00-uCm1 zj{CGy$;%(o?gb0`R?ilDNx4j(D9Q4A!tC8MhIzGqe&I=*N3+DHXpd#!dRM4tCb9Wg zdDf`2e>NV^u$=(~ zzJmg!8mH1Y-^?vFTL@e=q0&#q6`gVGe4M^+xG8@8)9pS79Z{!PWbhnQGpSd{cIsV- z%;KPV>R}(Q;3vO!IoZ0iUYmSA#f@f?vb9@C@43y`g&;DM$2)c!RE?m=6PsifKGxJv zOdTTphW$b*VYJ3>9w;BWN?(N}y8#}oDeGoY9o>k9mx?zBCwV|EOfrFIM&MGNPp(DM z@-wD&^JdC3<1qEo3~ICOql^UCQ*xcprc8x8u7&Ma+UE6{r<}EDF3Fx$c`A&v-*|rO zEA`DADGp|PALN(nI2X&q|+Fh@j zl)BwAW<2RcrXpEw6He=AS(M}f5vg2Ohn?%;%MlBWZ%wk!2RiAshw&0A$5J#;GIwHb zZZE8`=^es6yIP(;U2+~@PneXmC|RsnU*}H@aDF!Z-hr^lC2QYI*k#0vb?Y|1WPs1O zoy8W*QFtfjD^Ff4)Gj7n`g$oNU-Sufaq^fR$H1>#1+7{svR(`ByT(ud8lY@!Mr|5n zVv8CtMF5 z$6x$n^og$B4l_2BP!J;;89sfCe87|Wq^abYSsurj+Zfz=ao6O`YR5dSk52bilx4E{ z^)W3&uAes3Y>YF)@f?;_TBL9XEdLFmPFjg#^k_r;nR}jSf{ZpHx`5S51~W$OAD%Wm zl>f@x<3LxxQ1mL%tJ-@eC`JGKNGx$z?+{l0DVHVMj50qG(7L;QZB4?mWp}T#iR<$z zS#Mp&3W;y>wT7tSj-7X=NA0X-?bBzPRBXGvyM%th)l?huF?s}-1d)|DeDF}f9LO+4 zOgugLD&q!!|2k%`b2QC)|13-Xz;Am?1&7HA7o8+(^Y18}Hs$;{JZD=Re_>umX*=fQ zbHk5Tzxrl{D}(nCu#)p{uyVeJ&4zL3zve*5#AxFRf=B)hOCw~}!#4RnpU9pYS6YF% zue$o>CDziIQpJ7&%PtW0H#!Tzh6! zo5!R>N7XFD-7ss~XOH@|X2xKs4!e1r0FWq9- zgj71S!d|xwV68WveQ?keKvF#17uPm*z!Pu)A|mb@FuqAag1QMeJ|D<9|1@x6vZt$1 z?2O@i?!Rx%Cl=j}=S|-SLqtk1#V$QZ$nP6Fk$k$3u+m02_94+tIk(2oTt2Q~2u}n6 z7)UI;cxqI*g#EYE=7_S*dj3mI=wj-b;FC3^2GC<%&o?&Fpu-dy+ zZskX}V^)K`<`E3hO5_ocZ=Ug#jDHQ=uLsp1y?n~9_TkD!MsiBY^BE-r8b-pFO8NEA z@*OZVl4T8;I0^Wd-OP|%#h70aRQfqCFSa?Nb&cF7j(Jy30A@=D=pwgd@@-SVUa#;` zz~>jUY(1Ocn;GViV3wPYvgKC76;G9~k`Y|?jcs2q%$=@#uMP3axj%a~whD=}6zayxeq82GyAZX2Ypn2dQXdoE}e^6mWN%ujvx zm!gPHV%S3xgZ};|-7p2~TVUPQ@?RWmgfX2;;F)7Be_#V>cCq_`;gP5jEFz?xTmVb2 zvt^=7g^qMyI(BVv_om*ny|%ya3Z*Cp7#EjeQY?{x*6ls9@M3}Ic>TsghxlR+<_;_G zgPm7xS_aviz8B>EkwXcv{RkFG5uMaN!Z_pg-oMCxaXzul@(WkVFwuq_OWzsF+~_%h zTO6!7`)3dzY#pWZ{cM~V!Z3ONpy-q1JiNG^;MAndjossY!>X{``1;6(Gq%|4uxfFn z1am>$Kl^06BB-upRJB4xm(N&Z!WW|-6|Fa!u9`hBAribj2&-LPmT6oQHOEpc3TyK3uKrk= zGco1Pvs7vrSm~A8RJHgNbvfqs2aW$Qag}>ClA*Nu}>pu&vUA4FP z*9x)AV)M$|!lmKFhjjXz%ZcPEp2_Q*Wq2Ng*m9jw?Zl9bOplc1#iank6i&8x^45vU zjg*&f-|lhH&JPK2swZt;)*HF%sZRgThHrNjR`a})LA0g)DMMF$*?LbkcjiXJu+H06 zE^B$$@SZNS`g-5~CVwN2-vtBdLP%Sti9!s>-w1q4=I_Lbb$Lkm|;*j8H#-wMVS7hTB4_tZVz z9McyIKb3{YI!L+IX{KlAPi!s)|MT=V>;_0lMpfK0d(AlVP64sB_4CH^GEbXBo7-w* z)A|H&%Gk}#j3^i8ZG(*k$4VyDz6O;P**nKD=;TgOSxdp%I+u~|)MWD^Yv{|d_7kRew7s-iBuzHEx>Etz={*=RfalFEVX+1L-gW0EMIlGk|X^Az!prhw=i-96KU4>c!s8&Dki9*I3|CP_W^))zBA z**>Wddfq{*=n%Ad(J5AVeCci3wVc9U2PwS(>|EA|ny*exyonvuSqBX2g>6aXH|`Ug zu4$naG0!KS9h16M>$LiE#ErBm-cCG)>AIOByx{b`u|k*Yde61&Ip-3Egh>ZO!}Mdg z^fyWPPpS!oPEtL zKG_;)tHX7@Y}@*@*qH#Y(l6%Op~rT>V#zD}er4E;k#QWCUmjr7+wO7y7{|J0)x`0;FKpccl24mJv%oi8}`RF@Rzl3;V*E<#*>p_JmTYrvYw&)+J1XC^*2nY1BIVmvv4DlmzLzCzvD_9ZB0cp1q26BELG9~R zp`H^{yi>T%r|7&(GLu^YkCr=Xcl^*V0{z&^{b6(3Oi}mz8h}&DB;F< z28MY$u73kI#lA(!AI>NKYe#;g09&#+e9tr%p@!P23U{_Pvdx|w7q;D$mBgxC#R@lB zJZ5<8)lr%0K7zVCOTzY!AZtHKgeNmRWRPydWGOJ*Hp& z*Ct(j!|}zIEmewVR1_}(zv5nRF>KgCT+Vi$$vaq{L$K%{acilCy`~Nv(1fXg& zE)jN6wMc*?^JU+fywt7lN+KW4o;|!Scf~^?*;eLLY^L6gm)gL3{B_C(UxHFU{iI|5 z`cyV2pvmO>40gj7{A$d+c^8Eu?uFg1iQvK}*=PP?BknRbOqYEAuKct6)1O@(Fa#J4 zEMhMWiT*~i(3Zq5rHiDB4a8 zHWF9IABzYy{c}%&e+&OF^Pgww*UPk5cf*hW%}p&DJo^|v)lm7*PxYS<^^FsrKKZc> z8^!;h_XUy+l>h&J(Lo0oy#D=O$W-k=s{jbP5k<4g(6M#=Pvl-W8(-viiRi~EN8Fci zT_k4XTE-NqEMe%8m_$#|@qrICs>zJM9O2IO!EQSqeL znoFa?GN8y#-x^ppMOVmIz%saQ;-#CD;3u1mgI}H-^VXc&iF+(Ew=&y_acC2Q5Ou`)lgjKR@ojk(2SgPu?kii!7 z>hH2kS)85&4?)MRd}C_*jkE*WdDw}X_31LN^%W`0#s|(JBIlE}$-5UYD|N?ALN|_r zoE7n21jg_kcT>qmwycx_hL6~NDaIK*yQi8ei_Z){VUGY-Odaa~_FP%SE8W2u8tLVGb4HTgTk`o4B!+pAp{3)|=j^K|ZK*3z)48Eh7r>c0=OT2-Aenw> zrE@9AX#MKowuvx^u3lAL6;z9uzgq#p=)F2XFwIm7*p~dk?`q!J>mZ75ymdUG*jJ2Z zCyxIFLdxBYes%F>L|6KiH?OVwZ%5h#bUizhmV)TB5kEeu+x-f>Bk%yM77>$VKG#Qh zAxct7#aL1O!Sd(;KMcy0|6Knn*nVc6i8+9@x5ULK*okcY{5oK%SRK3hW%|T}P#FZ% zx0*kk3~?CFK07u?Pny@CFu|qS0##u)OCG!sr#H?og2gML%eJDYohd;C^v}*I*V%ay z6Un8JTwWM?EQK6N0V-@so6>zoD{X_-5brlk0fw^fb+xfZpLN-@b2iPbh`X|*KQ?7{ zeYxzkk;Q4H^+y>2jCp~V4G)TZuPdR$T7C2s-<82EqmN1@$_QwYipy}VS)lJGIE-j9 z<5_s5QLo=?aY*6f83jqohxw`L_)WnSShq{CwXOvW^v2pLktkmm1#si?b*G8$x>fQa zfZo@w^Rc8=1i}jKdcidaMCRd{NT-$*dD|EvZ35iU;&8C!UVmLw#lFV?MOzSl+W)k| zYVgj2NCkhrR!F8dD7Jqdx^+HIOcqflGaf`ylgyfSnzcgu^}qsJ5q)EiIup&lwZ}(q z+%I$>la6%ZP5ruTU_P;f`@|PX1;il_NGl6oe2s^lNXiAk|6@ng#E3W<5MT>LVr#`R zK)s%}M$IhSPqn)p0rlU8O@Qj#Ts=;F!AtNJUp(F@KBwKt{R8bWa=_uLB#GEy+2Aul z%)E;;%Fn8t>rBA7F8R5yi4q-?LuEJL#$g@Q`Cz-uEEo>C5}4=eOY@T{^t;X6@u1Y+P9 zE^alj5a$y`e_?GEJc<^L3BcbTP-1RnNaY19dFFT)Ov4L>OD2ryLF%nosT{-N!4CFd z6pO~(ex=eIp#3jY#Ydj@;jW>TxHihHC|5-*K()|d$p1?1XuO;|A+CD2QWHW(!gb^& z+f;du@y&`Fm6GzM?k9-Is)hAqCqB~&pp~j&=HXcv;<-i?OEbHG`d8ZSaAH{puF+>OE zh3Nu&Py;V-+bc`Fub*ocAP3VNqo87ek^nN7go7R?Oqgnq`Q=^y57vVs^s^KhZB#37 zv0rR36#jVQE%!;Us+Lm0>@R;hOcf*0u>j_Y)g*fgcCU2^Yq~`ed;eNShGKZf%Sk(g+3=}(S_CzC9D}8Bu4-CEIx-U~L9WY_dAc|wW zdE{F04r6>J?XH@KhdjT(Evm}LO1A4Y>Yk8^yO#vneTauc0t1vajELXBW_uky_VjiH8XQ4(* z;X_?~c2K$HT|nQ0eeK%@Us#k_zVnpP(lHv|P7@LIREQ}jvp_8v>vl6!Z36MH2<@kr z>o~5%9*jmS87c<%_wWME!-<#l-52=qx#2}hS8Etl_7Z;Zg|+q~a<7cRZRYihLNut( zQ@a#t6z5ZUDO*YX-1{gRi6}I#*vzmf2&L#w67mZ=@)Cj6_N3|F%D04do+Kf}BO$;Wo;t)!?&dd=4>m2xk{c_n9ov-BbHfq zE%D?Pwj|{hTN4Zts#X)7cn&71ubV~v(n&4fgChB&g@8kVYIy(MBE?p9I;y3PSYMMW zIg_UCz|h^Ih*hHXWgs?~@TvQpK(Td)Iv1j!#hmd;^+hYVcMI+jdP-Z;UClE{*CC8M z!hc$gi?5p28_(J0H7e8<8U*j2_ZzWze3<+}Esf z7`xA30MFxqOYvO{I}ib_}T-Um-H^N-)6_$dmUVaEug%%0DAEVn+P>k4D>+@C?? zgEBTxHs9c|o!n|8u}P|SUgI+eDK^^<`$3pg{K=I-Otaij=pL1l%mmJL!?|L~m$>B@ zJvy(Owj&gqH!0J)8Qty?P|;QE*mR6{1zh<0TkQ0W9&8kD{=~1-!HOd_Uy~a3T5x(l zC1SOpa-H%`#?m#=1?@{s9O4-+;#~j}g}J0vQt+xN25h08VmE4BKRP}2$iwbi*X+Ev zGLuBatDZDu7i*GMP2gLpwCZM*=kw5tI5J@>gu4)^-Dt-nHN;~%BuftB?G}ph&yq&% zw|L+`^&rF{wFl2F)ey@+9+-v28QjZ#DqHSPB!$@B8}Yb+#qICXj8K0N>hyGDK|w*r zAUA?Vi=Z?4g|L)Ce)S%%K zc=_K@k5|gi@#mkN)E_O-cMfI`!hqvWTT4K-ta9kWy7Nz)BS`2m`i`tu1mr!36p^O` zdf)GZKOL;`XaCjva^eo88z|SmVe(R1uL)rl-sJqLEST|XCGf#YKMR$}aO25M#w_I^ z(8Sy+UG1+p0^DEiaPn9)_4kv!HcI2Kf;c|#NC1Y)mI99 z{@w7wJB_wRPXG%Vd9EbFk*Df^e{t=H-MZq2Mbj+_$e$mj6mk9P*rIPB-`(J~P!Xsw z3ucDuD;%ExyhJS1?-94fUgQfb>KHtWh}{5tB51}R9(a6`cVY zU%=3iGh7++^}PV4-$#%WW;*28KHOMe?HZBabX{#LEO*rOd2ZWRz6jRJB(UolD&HRo z6}7>5TUH+ghSIuUGrPU?QQ=>rGb#nGpcSAg(40l_d+vhSOZfa(s>*iH17bwPp* z&Z;HJbtDA&NFHlUzdGxNqsUV+V;U@Cyz(iI%xFyU^#uRi0+`E}&wZQl+gwJ(Og6w% zbsLH3cpoEV0|gNHvYWsqBt8@~XbWWGc6%c}A$X0i5eG2Qluc*Bd$)x#OTc?(%fABC z5n7f>qO{v0`G>&+tt4qv1nvMCLsM-Ww4?@#iav~j79A$+1D2rs5hu6SK|9x72OQnf z?d>Bij~%>8vqxcHLArvn4}kY|-ruiYDm&C&=I(4z=Jw`lsmsR$+R0=ut`m0}Qh*+; zT(7q9XF2>_aJ(RuT5LoDnG=B;ds4d>J3Rz8>TjSR?EoZc0)$mM&`e}pcz!RGrObVa zfPjhO1+r_?)#7eQ&jqQLw(zNDaB<+))CC6EQ-fzg3zZ3Ilg>*mZuaYg?^>exm2rLL zoh*R}Tml z8A%4vHTL|Pe_>D|3B)H}=Gt-#4;c4ZM0UGRm2JpxqQpqw6m~uFq~Xcakw)Kaa4Lr8 zj2ysjga=3TR>^a(Du8E=`3&7p&Ph;su?Ir$Z2}IuyGXKtx~_0PFxi5=OobOUS&9>n@v{I0t&U9Ux0P*g3@Yqv9F6Cu{0(? zgR_@&Zng>I&WSS?uofc7M-QYS`wj2#zcw*YmJFX7cBx0uwC)25LUvKARi2Zz#J%}D zf@irXDQmU7ot1P-4D^m^qG}(lnQ%huPs{SHh$}K?I}9Ec#jWXEW)JafsCeRrn5Bw| zl|nKcj!WK4cGz3_ z=Xu@B3|D{*AW!Vn{dsDt5q^^+8jd2@_TbmG{okE!FoZ@f^?!M*-&4q+xAQ;eX$;IF ztIG|L8L>T_OdvTY0Vlk-_|wk=mN)3XSK)Kr93#YDsuR>1eZ?`wL*$P9N$qSN0RHnq z>0bWpwB$|s^Lv^wpp9I)36~@R+rSTyNqZuU3uFcY063+k$C(#?jR1045E*>M0bgRO zThr6iu2h7(7{)?!Hg0h|6GKse2tiF1ESqL7&k3DsIcOA;UvmoIR=7}A>t2fE)bVH znOee$hX{W_d78{E=k}$EN@<797JVU#pBNd2m!EA~os)+!BSKn9c=#jBWe~us5AV6= z_Vx8;r{!78lOXnAb(-#1%pvYMkb`7H4Lx=G^Bf_?1N6Ra%lMjyKy?V+0EG#>U#Vx3 ztm`L8PPjGR`DXkwi@$`0XX)B(6G9)U@Pep^EKv1&ZGd-qFOlU4q#ulP96_A@E~j6p zg^*|lB9AM?*CE5R#kD!20V44br%%&_gMG~dzRX3SIUw$Q6UfvGMwa?eBXsXxz{}%E zhaq`xl?+iSg+Ruse*xMom;fywnAsffI$kFvUP~GZKzGF=k@Lmh=UW$-Bsl= zoKmYoz=Ek=|M{FmcK+FV4gkzi4~vwrd>B3?_=}2X@<}{%qi5K7fH6jhKqChJJRZ}E zA|Qzg-HY01K{yxa*L=S&oU?=(bQuIhLJnjYt_V1MDLVW$(E*I?a3*(Uf+A}p%y0W1 z|0rbKh)mlI3a&?6;rR-p7JOT)N%*V5_N3P^9BfzJqV$bn6MY_i=4N}g=jC@CAZun+ zDsi5Ys(DDuxZ9;p3$YgfXTLX*mB@@tfJI*n*$8LO%l;`u!Es?UfFOWK0e_Zth|OO> z2q!lR4b&mWN?$Uo$1^b+W|f^x1QOI))sjYFxFm(t2vgbveC{+`pMpT5d?6@H6{!~1 zIOq+W8BLKHCVVz$W@3z<-`$mh#$rBj1R_4dkVP;YJo)Wt!NO>wFuRBo7R zMvq*!!A7W4O65_<=jrW&ozkmg_x-GN5B_uX0sp2v2kL1X*zl_s_xQ8XgkGu#>dd-K zmpfXpE|Pc3jDbT0l8@$>UgPEHbN#h@y+H`wArgELB?f*8^BQb5_nQp`c^-^ z(Bx$IM4w%m|1m^31tJoTBPe+b!n6^a1dJRGRR9otv8t<4 z3&gUUJ8u=rc4#AC#Q!`){tp{}Y|-o`Z{*tkXM^-Ct{CxPNdOJ)&vPE>o9mL2~e)-jKpA5JZGAYaJ8e&J5d!>PrNL;v;T z9Y}Nd>+nHJ1A#vHf23aeSt!7NX2U@=-3zzmzk$+at(*_=<9~VFfJM%aEaU&8b}Azz zn!n-1C+wZ~{v{Vy1~~3z!?U8QL8c3G>>WaJ-}|2y?e5ix8Y})aZW{cqkf|st0>e@o zKytN`Wp99ZE7y;nxf7ONuda#bU=4%N*Zd`F!n8=X4Ds2zhW*O?4fx5WT@#!LkT?RT z1GN)ndVpCJXOdD}+7@po|5b8L+KC*$TIu#qi%`D-y5k$+#%}>XT-4(^Vc*TfBXcb% zf@f*`;#4>LuWzH<5b3oASO*({hluMfbwv_EI}kxF!fe~YC4D%{WC=vTZD3D2-c^`G zKa$?~j2inj{bD_!g2Ri5Z3`l=M27i`AaJa7dF{qaN6GVCbpmwJpm9X?i3jw`HnZQ} z>yCuy8i9!PA-K8%angMM*#~$~?3UYB`nZ8$?hRskqNrHuPQKj(oJvHz`&iz4nNP%8R|hc{0)fx~$b`LdqfUbOpW;(6Skd{u(42l8k%{TJHzOkuJ%~U`&8}}BhQ7);O8@X*#Jy? z3c(?_6L7aR*N<-p*q2^aA4@TfK}J{iEnQoLYCIe5x#8>)}&0+$;TsALFGo4w`BgR?)wW{YEW`}GuekGe985=!J~ zz@}=`#ccTQ+KL^lFv^~dInchTJ_ITB+fk*uMmVppqF(Fgzi6-D+{1}|S~eZ7-Ff$t zIs3vOc49lHR5QfR4VovA)kytDhI68w;UgrC+Vm>7lgwO%o9o~8QxdGnq#0JH;WY!N zg6aIGZx40KHa$+>rszFc|FZC#x6t9USuYfO83t7hP?~EzKJoSSrS!oO9KGw0=W#zp z-#yR-5=~wKm39K8zKGqVqALUfkrS+v?GyvHB)A7}hmP_M!fZy`eyR5je0PQBo*@+x zxO*VAq3pq1B>WTlIg4le3Lm%L0>2))(Fg@jJ6dDr;$AZZF zeZV&C4f+|tR(4}`EUM3?NWI?$BK5FBpQ&yDa`KkE;VhawK1j7R%G|+Opc<(SBo^$)l2TInotwk@pXGNpHK*2W!yiAG9cs5W4a_LZTTj{wni<&9VS9w;>(y>X!S zA=K8Z-3Wv|HNa^`L`;!LW;>!fjsk5U=eXy}ouyEXMCh7}c1W1PREg}6Yw>=kyf@IU zJxU949fJ<)WiY)fmTwj$A~wDVh1vFu62+9~eX62`Sr0N3s^?`1U3A@m&UW>!iDymc z8T$b;$GC*$^EZ17yTx}W$2|XJ+s27CvLYts)d|L3iA>KRuNh2Xlz;0CW;RZ%86xzj z6R<;FYmPUK#IC$z+(9#qW9Q$pe~WEfW&-^unhz*pi{iCG_KNB4?BG0{&2XE+EnR&} znahkBb7Q*lJFVN=TO!UW>d( z-q9_viyK~tWG*{S@Y5!v4vKViyij5eUq``R3(gh)%+bRK1=IT$4Ecd*KdcP-_xY1LO(Wy4C|PL*>C5BNBP zXOO^QkBA>4zEo8-X_tU#;Aym{4>A(p9#mRn@tS4cW#IZ+C+jAs6z;b755X$-^%`En zZ8qS>%f4!oS-P8R_5ZQ<=J8PPef&3LFtW{%Ez1lFo$O8`3}bB(s&k66FVR7f5;2&u zjf|zp5*ewJI!6p?(k5GDo04*5D_fRC5oNO8?{9To_jO(O&Q7@RUx>^h4bnc%VM`8-Ild>ybB%4SNp;@A1fEWhgdIg$ zSFIVc;^PueaB-6|a$4D|tDj;&&9@m_ZX|n~bV9vhbXvj_-muVx9-+U@d@mpy>8GF# z<@n_ER*tIA+sjPCTU5dkPy{5v>6Mwlh=B~alN96=6<&bF9( zB_i&{D>mfsE6#62fAKv}kao(cD~z8OL5rivsHi>?f#g~zIF+@}vRlMZBLhph8OLMc zl;KHA;`hc739^}6DbChxff)mbpjx=`2|v5+dIaZF?oiPT`0z z?Ox_Wymc|c9On<(9UYIdeOb{0yP$;1&64mRoaI1#w$Xr!wVF-2+Y)h6$i|GFWUn0U zQ@gd@=&5sJMH%FkKht&cH93M|Y_2N1GAE)_=YzzP`;LZAT#t<`^o)5l=MPc$fOf-= z;d*2C%3B`V-&1XN;C}l{E9!Q4apJ#>MK!I+Qo%;;9zU*3@@CccM2pLs!U?!4XY5hT z%hn zctR7F6zGyv0XZ$MMHEdBBU4AgChkhaSm$i;N#c?`Ce6v#vb#X%%${v0b{|}@K1XVC{N3vJ71vC~i+fy^4<=Q0*-d&* zGoLwENzcmc=hqX#CB+aPg*X^uT{hE>mI+R)u=L#N>SS-aoUneJQ9zc6RMU>4uooU| zo$dh`Jjt5JB|WecSeJ&PysL-{0#SO;T@X>JN#d+^jbwNWaB5M47ZW54$O$Cw#RCy2u{2 z_I85BCLC2qKt&M6HzGjV;iB$an@P5aqYsgW=rt5(+?5t0p+=2IJ%p`J#JOT|ElU<6 zUd!So0xny7U;}bVa5QLMxt$kBqhqY)K$qiryW5h5u6;vZd~^6IfK?OFR5CS|8r~$) zS6o4ppz#b$kkx%(I~A?zs$opHafAd~+-&?lYkt;a-5lR5vw!b}JCcP5mJz_vyc%&; zi=1}$ylzajqX}o5kCiP(g&!pmtbz%}>m@p(rK*0z9-Y*gZ!!vdW?D5PpchXZ>VS#v z{n3jJx!A*bR!i;CDkDxgb4`xjf{SyxGZvVw^ey>zzM}Q;@+R`lsv8HqbC)rMG9gxm zS8lLRmk(L*EO&P|E?>*nsnRcHf}@W5?)3=%TqvS2E_ESod!tcjZeYqb-@jLa=ar&v z_1hnuJ-QFmLpg=M#<@{eFqF==390ai@AuS=LYtk z-)7NYxjiWyU{D#Yuu(F7l|aWX?UO@`u+lwKgT$lH`*)S<(0FOGG&S_0&8(+R;*K5*kjG!l-{?F20>5JGTPM@U)}h9(l;Y_^6BvO`k06!4 z*}`+2t@*01sunMZKGsi|j%I8|6>ZxQ@WUb!Ufzl@!3yvyPyn+AgMW5#@ zow04N)W|m0C61kko3Q%9vstIO%{_$Avl*&u%ye0k1a)@ybguK?oYNTEqsoAmAe<9|M|zty zM4T8HjqHrteN#R-S#dh-xqsCgje=^a#en1(o_aec|#Ac0h!pd<`5pz10dpq?uFfNiYP|35j>v4_avTJiq;^Vl_ zt&#PHp4*CEIrLA+w<<7IOiaY=C&#wGIH)~2pt>Yavk1B+YnQtkl1!Zjw{j&x;S@kSIldo3f zsZdau5GqoCM+;r!mlH2aOY#-)YTSBhRsCekIP539dq{f)KmUKItwiKJ{}GfZ-~0lt zavoBwFYcWx{rA7eY^ah9@%QG zUH|PNMSjQoI{;SwZ`djFkCF4QA)J!9+c&w7U)~^1&K@nSYK^jKZPMxYTt64QaZ6k2 z!3kU6m)*&vP`2tTpPcjZcQ4%fYVamEu($2B2|n9({s)+oHd43VDA6tr*}ozforB>} z4G+XOV69qEG6akZ9F-q$s#7FJBe$wC51u~jXd%5s50-J{=j#Y*GhM-Wq(dX@91I>4TKk55pn2UZ)wFv}eNz^+(oG7eX>&+`N{Oy&M-wvjGH!v`_e zg|CQyx2&Re57vk+PjoQuAu}o9Jl{ya-me{G+u!pp>q9_kz(Z)Za%{7FDHan_q|ki5 zB3o$vB2hg!LB}=BA(Bn~c1>(7>r2g9*s6jcSPtx!dMM7=YHT}fuz0}D19r==hXLmE zM*Jf`%sPwy*?&6FdjTRD48tPv?Ed7A*}DOZnhy02Fmm=H8*$`}RC{q1Q?OgUZgtY2 zHdJv;$F;^25@z$?njPEb6}_}TOMXGV;ZAqtO0EhsB8nEIO2j6jJudp}gizZ0x8NnG zu5eeGFXT^eA0yz_0^_h7xhWITw&e2TI^~UrIJ>#~uH3|r-4|QGkMB62Ghr~zH&NYq zC*WtZP~5uXW(N(})sx}a)gSE?n#iB#d7#4G49JTuQ31$l7(6amtGb&<@0AOSqn(hU z7LL4;nY%J;J?l|_g8_0MEL~x5KK>d#K-)t56=sYto>2f6Qo=aGU=jXt;5hUQS3(uS zw=V#;DrY@D{r*4{l7TUi%g+232`L69N)CQjHz8&om$vN@^yT+pWE=ZK#G2K24f)>!SPA2BigQ_ zN%%sj?{m4MQ%vHls60n6rZQ>vN{qp=GUK*RL!v=B)M1A{ajzJjhEJnRq4 zb8`9|Bj$5qWeFgtujm24Kf=2pax^NrBM#3|jR|@FpqTif@Jz>pcf?W2z>OZ<+95$7 zQe-y|G3I#?83E8Fln$RCd@!mWga~bwLQ;4Cq-RCT9jg*4IA=7%t z6dT4QJwz8FjGvw8GFPPMi0?UEc1zny`iyEl$ajiQ``A~u8=!_}g(~A~N9F6aEU~L3 zjk?%A7y)z=WUV!+$E}r$4%Wh@{?P}4ppnbpi`PnU4&+AB_rqRjMJZUXoFh0NcXA=| z97l?xAC_9NAnGBslAi$*L468b&_#FCioDd;^ZAWmxs2A4cQd*>Xooo_ezS>&&Ih~vi1`LZuU?1G^nH79 zj4ZW!@5jwP`qA#a-z_P~^Dog;_aBnQK2PZV@JzI@h(hl}yQ2@Gmoaj{7pg<2p~*d) zncheFc{S^0NU9`5iZQRMix@hxM=fs)MvX^}yM2g_93yl5j+ZQ2gx z>J4Y<>)k*Dy`)ycC|Q?8Xs_|giuo);O0>x4pirlyeS^5yMcK4Uw6(^^InC(J@hJ26 z+g{U+KkzQo4pi@ljJQrmj&_p>JD1N~wO!CdE^w)(#^4irP=RAiG4U1-%czMrr-@?% z50|^nedbtUoY3<B;mKEz_HZ67vud)c^%(F`WD)}y>n%)o4J$Wx zQv5kC{ZpN5Rc%Xoz4CKldLaFi{5laF zh!$q!)JRVS=59B%!gw}ctZeMZ?ci})rd%mm|N4CgNy|Xs~9f!0MIuBj3B2{3K zZBeuneI8wdJ_U9{8*8ru9!8fsQ$_ZgQV9>QQY=N?hsu);tgyo3oF!#C)>@*_JGpox zZ@iWOcVB;(-7XmM&=-2%6&C0EqsP!!(VwdmYb>#;A93EyNa`jrmKt0>fAXb&^3u1=kWIV2|; zUD7eos7AI3X;7nRPtbMNjfMp+g?WEf;ic#ahSfXktpQ(VE5^9+U^4NAzje8+>dIz} ze++KBbKpYmebS?$tWe)8FT~jiTDl9AaOEZ`wCFfL{#JZ!mzTp$aoB~JH78Q-{!7kw@3zO|yY z@VKB!H1sljp%ARiWp|8kVP~E>Kgk~G1e1=oZQ;-{+BS4N`U#q` zGIrVXVqH22*pd^fR>t(0hnxegaTseUC>q}t8gN88y$xLK;hrDLrg zqRY5VWPS5lVG@;vBg5cj`(BkL=h)|?(1IN%HsHL)iKBuOG^wuA47jljb1h94GQJ+? z!+&c!yFw47x{YTPGrrE@Jg^76%?J`UP8k|h^Xe2&3&o{&uAUA@y;fO&NRSBLTx^%m z2^^=!kOt6;#`;Luf&ey``#5)~e0GpKkI&t~1p*efzT` zUYwSil21LJ_LZ%R*h; zKH40uYfGc+m2!+%M@{UP%g6~*-S{=Nf3xCF{;(%L4oe&=c(S7YLHQyNNwpVUI8S#( zg|=Zss%8?S_N%vHova3~iLpj5&%fLLLTv1&%vhss&oy&&HjPm2_^@jq>(WA646aG? zosYqkb#Do|&VgIMoj6-qw|&L_t@vPrd*MOGge!EK4qOwd{}oELm{x~)SBDi9v#*L# z00AXee(g3eR6FhZHZa~xeyPEaQ6>gTMdlqc9bMXNLOAp9B0{df5ICEnznj4WH)liU zv#^f`1!~4!dQvAW%!0x)!b>~`N;Mg#!t(nKgP^uZ+`QpLl}HEk*%_|lM62UevRR+# z(N;rjFLsmnvgn!AzIUct zXZIO=`J(3T(6;?*ZNT>Ei1bJIimgnwrL7%th(uXcVOxf11pVLd2fBs1FMRv*QGK_c zV4kGD%q$~tMa73|vBRbGW?IQ+hSWW!MT+K?mdssWR*nF?CekhYw=)-AKe+sLuJuF7 zgiSkpwPf+F&g;Nc9Prk0Kv zrV<~zyZrcmb7O71dq;lyf}VjzKkkYComI-Ov8)Z7l`}_mUVhuS8P|02eduFPmPYpD z3)nCNuScl@FI)#Xku7)iTJ7=-x<>@B+;e^vwEtz{&j$hu21#?soL22qYmy>(K9v5p zx$LK2mCyogVvy+${xH>k_gdZgUsdz}UG_ZPB(-|vyD{mb{jg>&-O|D45g;VThS`smXqr>39Wpr*9p^_dhu zV$1j9YhLLO7eIyqI@zT3U;t6(FzY*Ie7kI(~TAbz{|s zI-Ci4>RE&Ttq(un_P4_8C-;5duO!3U%>oLCW$`0G=SBgG_Pg7tL0G2;@=4}Q&-s|) zb{JF**Q*fAC%oQc;G5g$^7UK~yZ&p}T{of4}rENAd|tI?n5?x{D=0S8F4W zv69$!>1|Q|` zVv9zOZ%eg#7ZQXdA34HO4PkiKR(RV8K?D&b*`@7K8~r7+2V=6k-_(wi2f5JS zE8O3FK&;b;D%{C;MW>t$rxS12*x3qtH-Sn#&<*CO^6u1AUfZU^p08>&l8wNAhK%v< zG2i?O;6?o&+rn0Er%l`nO48}s_J_gqtQoZrsL|ShP8GcQl*j#3PhUTMO}J8m+nZMru!491HSCriX?w>*_9ujKC(oJtgLoqy-NdAYz; zXM@Yu7hy|({B0a^HTX?bi#8*+UAt&oVS(cE%%$3};I0x;ZRYjAbbj0`B6h6A8dnB| zg5zTGttKqma_#-fGnGFteW*a}W# zwcn?Diu!+k(jI)Nmc{j*<8z~1UU52|NqC!6YdAFj8rP|NxJgO)S1?%4Cf_YmBJ z>(5V6T&WrWKaq#_v|ilun9O?Y8NWPW_1jfEX7hlZ?p3X&^BPYLtQD5rO00!Cpgpt% z->Jhs1+GBip@nZ?!oFjt6xp=;=VMqMxPYE(DxVlShR?%%mHQinjb(+<=j3Ri(0F6z z512VW*ya#VaO<6YBpJBBnWW{QPe|zX>unD z;CKMFI2g=V-Bo^j7X?k|Qlop491xef8T)dKzCe)9$fob+0>lWpd_E1~oC8jLszErI zSq_2BkHJ;xP}$K9D$N<|agh%jLisPGMEFNypZS@cyH!j?t_l%nPsuwOY@0=C+BRVd_E8#p8iM=eoKB)^v8~; z=?tz8W%rNUOK31Rmh9c@owAM0f(Hdqb4NC~@H{^E<+JBmFi*ui`znscpiZH}QInuy z_aH{Se7WkqLv6+sebSB?=I{KSsE02~Y=qUVWv4PjNp-0jRB>S$?MLSrb!4DzDG?+U z5b%4jglw~k36{#H%lW`x@+I!_*-!xY#p!n%PN2uS)EjyC$2&%oBH%`rjKm!fZdpI< zx*k@^VC9g+!U(EC!W+F>BC78-D}DiWH7>M4=HpxjpZ7*oI~ZP99&hoj48eC6J6zeh zCN4C32o9sU78G@Z*o};kT{(z?C$Wa~HFov~}wdz(0OAlZ>cU&=f-R~W&+w9w_ z>%V}NiL8O@nK=>(MK`4+htij28W(MIn%fF>|Ep8 z5oYuA!kAYEhyMCf;J?>!TGQ34&HaZ-Ys7YT{Y_Igbc?{68(e0!FLLUx%&4QU`zmH0 zw=mq0FOOb?n$At=_r4biV$9#;*XQ<6A~h%WRF~#xc-eF@_jRFg(uA*u$=&6Wv{H<>a7-rV!;6X@rHe}tW80Pnu^GZ?X3T5~N3uzMsc4VuRWdY`)b(s?dH|2=I(*+XSIiNPaR)B6 z<#fIDCr7Vn*)aATbX}a`O)~b=zLo4jQ|Iz3m+KZ`VhbVB+?SaWzboFz<{@+kWh|yl z%T@h8Df0n1^XWu2ZrXZv^RlnAL77jLCs*5M+(AO-u;C-Ea@U=)?0bCMH`O+cm-QYy zdBxbze*-z1JQRJD8E!Xx|6gAC6X;OB^>sJX?~I3bgz=y|rn88?q=1p9@ecU6V@SrN zZ4_gWVK<>~`D)C*j-ei79mynF`1y1f%p|1w9RA17ek!nIzY-}(S-C1z+ATsGw<$)n|k*HNbf(Cp&VU@Rzy z3pz;>Dd|9e^L2lLk5=cS#%?sis#w-o+^kb0|4C*`@Fv91Su?Lz(6)8@uaGoo-$Vn|WY6)5jv^L0Ilb@IOzD#F$%Fs=bX`0uK#tKH@3id1|K{pN zQdPi4sJLfR;<&g^DCK^t79OL3zJZZg`3HZ2Z;m1Y&FH8Is#_DE{z1snGKXdSdtOTR z;-e)pv-ILP*afj%*y+ zKrxHKMW}Ad)S?jLGHApu;ldEZajnzhv~pIm|3YFF*CsOqPuoU2%5^=R-s0fpI;ryo`^zkTI8MuwBh&!r zov@U=h6sajj0a{fMkZ)X`5~XOaHpWjf>0+dNQ|8xZsn@{Fg{3Ssa+xS3YFo@%&fFJ zBoVCdz!^g_9k=gyUTNaBB}=G zS&m_)+^cSUFse|W$if}WlWCiyZ!h{KkpJzPRB={!%!tSB zPTH361+I{cOGNlki{9UTC(A`IKXlNkmiq2zEXkW)UuXh?AIz6294YDTB=dZXFPd2+ z6oA{=qE8^Cd*(W#&OFCCMFE^&iAh&!I{lA5`7~|C43YEmo120$$a$iu@+a)Kp~Xv zDf`*@+v?RRg9E8C&E&T@OS3*Z>jrJPO|GM=wfd|D{wSIu9Y4lQ>Bt^41`$D>n5;7_ zeg^l4cTwKim8=#f^4yGF5b9-SaEP0ZH+5tcy!*}T;UgxivFXWDd!RgU z&%Y#TSNZR>zsq~)^-{NT%zlmE-F}S0O%I3HKYWW_L?+>vkSPt;hr&&3Y@IYoExdIz z!6!ZuPtx+c)wsPr+Vq;zmxHTc7*Sq~s_2V)B&T$mpT7@;_+P}^CY_p7COIp3z5!sbi8>;iXVocmx9vfDqz_)AZ%A<^Z z*1}VBDH;+-qg$+pV>&Ch^}W9C(HiqKEQnwT??JFr&sa>)`6WHWPJDt)mA!ZS?{u4s z0o%&AN)pv)wtPxdeD0&!@TtbpY}ePBBLrq$`Kn#el*f+#g(tyx$;+v(9uCP)^jcnEjfg{Nru3-U;*diZghMS*+KODC*8B;)M`mf0zG1dGpr3nxO-v#+Z#?{BtnoGXMeIo`g_z24JP-V|B<7*ZyKkU_-E0Bh%1>!Y}Y`P(3Oc(TRR-TvB^ZFPsRL6LG_glF-wb}YP*L+lJlt;SEJeS z>ql^aK@4^{d{((gX5+>lh&jAHJd`qnT&<^{1bj%P$jG4tdcGY0!veE?tp$-!UHy!F`~UtWG3m zu}T=Of~|pV2mC=!MA)@5L9@b?Emfx*#A!RDlU5^=+=`y6dvBa?%yTF(dakI&5~I`orTFtyV(Noo$wln%0emE$tMvP0E*AMW@rE_& z0E51y*?#78OiN7c`!=Lo>P?Zt` z49(iV%SY=o$}T};&yuM@E?vuVZ&#`2mxdEvPqi0uDb7)y4qewwtzDLOo)|FtJ|`DI zc`twGj-vThU(>m*F(@-&T~8jyE>`~7Ia=QsUbjoRbYgRP*X0AAPw>p$h=l`W*cKi* zcq*X>02g#GMN+*F3F(5d6sg`odO-yvpw;J8s2_Oj5x;;=GJ(Y0%d-PScNuSt(Q!WI z>o5$ied`OXKvG#jki>9Lw%D{kX`;*SH(8VLvhAR_!gO{5{^jR5tn#1m<{kQTkCeDB zjH5xwvG|;?cxG^;jO2w<2qqy2q{R!xxB`s)!Yy!l6s5&SBs@miO=l@)L8I-EHg{Vg zP1eOgG|Uxy1Smeajj>DVZtNn~`)$2o0;_$wBj^I}uYPSC3-o-F(ty!qLzu$W97vu+ zy!8H=3!erD5vcE~S}KLGiGjP1{X;f(>SgRw3Zco^hZFr-VQ^BuSF-0g_%E01!q~!5 zFmc_5jPR245MNl`qy0H^bsne~Huh>U%-Pyax;fR39!$9M@n)vE9aneQqo_CvYw7Yu;=loWEC%W3q_b+G0=0EUiG-)6nSA0rgn~{kH57 z*XHb$%X1gZ9&Zg%mH>M!z8pi)$6>=5m8x;2N|s{edVG~CrcEgNczhU}@_-}GYOz%g zNx$vV^(O};bJu8s(+$)4I_FpT@r~G^2O z9*y>O-FgRr3o@lW7pb#Wc-$sg`K34lMI#=2v9O}W$@`%MO7Mf|(S;PfYnm)9kFz?* zY(~FyA-9%k=yH)@8qJd2Ek~}06_MQhp21dA zAC9a}g5{KIh#s5UvgG;rK(29VaJRls`-*B0Ge*vw&G_aY?c?zCQS>YFm~_x)Hrt*+ zvLSn65082QHw2_;%QSAw(1Q=<4_Ayy3Z$)Hg&y>{TVQv4?&c9f`)8Aal;hNNt>T7b zK&ZckPOi4A+pYV|fNF+vXyOZ!v_`3j3a)u3KR}<$R-JtJcr!+jo8DugNVO00D)=gN z?pvUF?ZM=@JVT7TP{=JSr_`I)JoI2R?-YT`v$|RL&)_y}romg^&z?HgyljEk7TJ1j zKRMy(y7iKg4Xalb(P-2uv;cJyd)RW4fMFX_g~;B8LQBW_D6~r7pt%c`Hl|lkRwuup zJ}Hz8Q8gsk>ndS1(JwKQ9CgYL@}G)JNuMxVI9p%ST{wKR3Uh>Uip7;7)28j?l$Zla z#FvMggxO0u$Vp2R`W<$)5`Oh?V1WDV4s{xFXrGz6S71vTik>8zIhHGAiv9qisVhMJylH zYtQdq$C0qQb6FyCA||_V)Xccf2v?Tp0X+ScXir3 zV_q{}MHODsFZn1OkHoKRmRJ)%wZFwRrA#ac#~C%D5GcP;Hmjgq8}v+l&PB6u^c=Sy@=R$_Xq@KfP-rYl2JC<;Y?m z*{)BDk6N+!U@!w2(=ySc#Co0A=*JiWdK95dMA7xg^qHL)S(++M5DmVIwU=Tl8>ynB z39*$@biHHIa~bzX3+efjJ6I8eVv8D$J9*kvrmR^w*85nRd3Afuh~ldYt*9PM*jdKc ztt2O3?dUeHHlX>UP~N%2+xm~XWQazdL1v47rd+~k>du;?x&FTs4_l4Gr4SyYgI zEbWwXlU@wn#9NGfRk6({>IOc!n=M(o?)W-QCo#aczLp2T^|c?j7H#WmWY4xk0Ags=fv zE6lIGQ&u_X4xuTbblh2uy$sp-mQB1=*QqQiYJ~NWedM?xP5_75PYEr-TbQ707KDz{ zw+A1<7j)S~C}aIyanb?tdJRMsXO5~0@93V$AVSj9?Q)XnS=U$o(Z#`R9vpgo5>GPg zsN5$HE-y20Ys_v7^N8n02N)By?OhX>jr~k#^TTB&KkiTGVSKx4x~BSvt^i%#$I@e# ze=s8bCOoJ4zHDvm(KRnKUrLUncnn-q`1(GKV-}Wrl4DLDS*FHf+oBKi zxoad!YUV}w%EO;irC{Q^;KaH)$n3L$q$gAN_J2RFwYd(PNuuB4qUU#Kp6{`YOC(eE zStJW|)WF1LLiW%$s!#cSe9Y7Bh8pokxCtypehjmO!3ymX(jL8n8#eH3z?VnnR9_0( zHf8bhF!e0eBk0cU&C>_fg2KdSr6vz^_keQrI&-I(wOl6$PVl;t_oX(#of zSHxL*hX$TiW9PEea;HY1O^W>7Z2I$V6Vr^!)TM#a3fHirg@TFD=kv1$(}|+xTXP@T z$q&n%F>>q^_qfQS%xg48c8wW;cV#tTN3qD_HN`fzQFGXo+JyF!l8@3_h*J2))eZP- z9-SH2-HMg`BAy#FOvMMSCM{)2)hVYe$Zeh4hTfX@8A03nhKyf#Cj0gej2eGo%8*Ac zF9XV|g#7co!n9$_^v{o7sO57zK*wzdqv{rdFy%>f)*A}}bnJe?=dC+;{jPqL z>4!3JsU6ap!Oi+@LOD}m!b#xjdbxd8^js}Hr~UnrXkCl2DV}~jclGvn;IMPgE!vZ+ z!Jv|0;z6?xbZ@m*li-%x_*+Fk0GJm(&8|NHn5)F$2f;bW0~FF4KVDb@cI4Q8_>#Vb zmt}eO{{a_<9B)S;@G1UlX8m84_(D-l2|}~}PiYxZt1FOK_h0`d2qpUMKL*ngprRc~{o5ar$XfU7Zi zsk)y6!TCQm!&I4bF&~Z<%%nZU;4L-X9_Mv#-CjH0JiQ!PEMIQ8BZxOy6(4% z{%nL4aP+hzq>%xxlxu%dEbf!P)Fa+{ouJlJ}AfUtb!VDGE zUFO0+UIi=R%y?(P0B zAzRw{Z9e>DGFz8htyq57y*(aGAvtzXz8gwTfcW<1{i|jp?C;p$z(zl9DO_(hhB&cR z_$PpQc2;Fl{b=IEzRSOcdI?-joB*x;E+Bv+ji*tsvzw(Y(K9ePy%vKl#6LvBBL(QY z51wt^Zn)J-pbZp<@(mlR$qSSFpLCe@U3GUoC@_c!+2E9B=6b~RKD{*ATx1qi&QhEi z4&y#ETS*O^%H(Y%Pjw1d?gH^=HL^2iNIrNdj4o%W(e50=I7QzFGG#DSM4yPC6EeSP z)eFqy*PFzDeh@8wG&h3JI0K;Qq1Z`=RukTj|JguUCDnVvG z8NcjE{C3^{V#s=@9saJ#$C^g|A}oG3C3uf-o&{)`t8y_f9iYW$8o`qQd@AxN(xZx` z!y)~86802Kgal%?GWGWH!&F&dw~%vdEX^TyINjg?bT8LkQvfGk7Ou|FXqfkBkh}AD zoGi-N;nNV&Gy#VH>G!1!7J|J!QXMc%)H7V*i-k<)RPYe!!#=Je4b2dNxG$bz_BAh~ z9~M9}fFHYpRNffEHiZ$7ggN700<7up(cJ|cw^OD{fOUno-jFtq+`rz+ElB^({i76Q zji!I;z9rNA+(Lj1cIVlT)4e#~V_hKM@nfsBu{QAW`-4%n5)|P30eTS6je>ZyDc8

            4?d>8Ig=D^Y2@KwK z>+8iLM^mud0%Sr_IMg6`+dsJc0@>HuAjxRUo_fah8tN{vSF?o#*PL?CVep8*UdsVP z7&r=z$_U(>KL^Pv8$?a+AeOm5?n9)`nGq|xR!3mhO)o?#HI&`kq{8O8dJA?GADfXV zcu0v(#iP&XJGR;d`FYcU+7#Os&a-Z+@z~ zI@N!!A?Xar0~AS7AT>zIvl!|yv2c%FJtMkI7L%_ z^mo$P+k|kWn)jZ3r}$Fid_a5{O5jOD} zX#F+tW&h}tp=7qQ2L6}m!k(QQ`)NO>Lad4ma^rig^y482=6!DKF0arqBnfVy$~~jV zDg>obdN0g~(ZiApSC?!YJNP>x9&JEo|_RMroXQFVGAJ&;Eyx)(gtpO<<1^24G0$3H{G29g+?BUsbq!y2log1nemMEgaLg|TN4q&|gy*9pY4`wd) zD0oV_s2v1UcHiCk83W(a%;WWkl+c1`p#)(xh+9=oEkVN&e>_MKApA=3Bxq(Dla2|h zpybqjFYp|tVvVrgmag^Mi!D=x_QbR2oA&zPgd^64XOt}o;{+wbW&-nt2U?lMccK0> z*nlF~0>t_GrwfU}HohFDO^RV}ReVT7CQ0r4AAc~TR+Ty=eowtA|vFH{yk2DQ;H8cr-f_W*tf?f9c6-V5y)bR(gR1IVi}IRo0j-T+Do-)`7zqm1>Xh1c#(~ z^k`^k%q~58g??Bql&$=b-~48yx|~s0qk7*pCG&YsSd+lVPCRSNg*OyY;{6-$+~;Jr z>XHmA?sK*Lm-oWn0;|QMD}UmLg>}=x2R}zYMdw$M@)nmfTEIum(e>EcKBh0;9HQmG!TeTK;C2W%tf zYa(YeFuhwi1+3Yh)-_@}!WF9RJ#p)yJ96}wIQ&^=+`i!_m33rv7c@THzKi@3u%-Fe zmvj(7Ew}DF{P_8w{}6-^K;aD?%l`*Oa?=BC=gswd7ju;5|cwlb4peO1TTf5iS z@4@rxmu~*fx1Jl6eH}_X#9S`EVwP28_Tv#{eGc)g!Fy#)Lbg$_K)~n$+#AAEVI6z6 zX+32Kme)_VVYJ)kMw^4dMg;h>`VTpyax5rl2z_&Ew}#y}ga@L7RHuQVFmii~wuS~1 zL=WlyVNG^b&B7m`zoiXz->fd!)(JqwS;5!AOEx=PjYcroD}99q?dewIrEj11D4JsAYLF0 z)}jl#p(ECT{jA$?Vr{>(dFks6^j%d~!V&sG3rISANEJnFC>)%E;FNb}zra;=RCOqK z)+-Ry1Yrr9Ky{iMY6`B=ey~ukm^NL4jH3&jCT@c*4{1e55{-y~3*LqqZ(AM`ZK`7+WBqNrR((D}NE_eoF>@^(P^;_WNJIwen-wap6G0@do8^o+G(b zZ)8wgoj6F}x~4D9QLOc3#ONB*gP~A_9L-GKH$5ajnr0S+a1jt9%c|<$%oePiQcwAeA-RFEX`as6rmcsoR z+v{t963BV2Fovs_-Mivb`$u=#dlqCF#K%v=xA>#uFBJYx-^oW`y2*XNJPi3t_rHDm z^2&~Wa$IH9tFL(Cv9WWUD#c~7ZL8`IPD}JJF6Ho2oX8>l{VQ+DL}kFX&IJRzM$SccyMgCK<_a$vk1GZ4ydmfz~g^UV6p*+L9WZ?SY?U)C%IupzgnbjiJ@ zMnCrPmn+|r+@KJoV%wL?fkzjmzpnl^d=6TD5trTHtdDmMN>lIsx%bDz>;jPffUtHe zn1mii-+?IK6iq%36ITPiCjzDhr*<4helKlNpPh1Qa-RZpPIlv?TP@nRqedI~GK7{N~tbY`#&c2o+tc zIti4O(FP;ka&G*-1Pyk!f0wcen%QW$N#6`>!SyYdl^I9J=8Lb`-7L;#;Zf0RvNLsOmU27T1Qg(%Ab1Y-F4{(P2Rb zHcg|WM}@-_rR#a6bCad>!d8arV!Oq{Z^c(|n~yZwwN)A7e&-5qTJEV!-b~wiP3C0v zjcYmQx;ON01E+;n`J*#S*)x5yO$e7l-QlzN+QSbUe%#~qp#lxy=CGiURWnlS=TVLy z%JD34Y(i5{qR7_bRce@vs;P0)ya{}5gwvkMb(i(gLtUyo>bh#W>hb6TkkX{0uVQL( z#1=zBJhf~C>ezGKwup{BkKl}a5f1+xA?BQv7r#7BfSZW-^&*sGd$O)jF%)h?ZmzvZ zkQbka5NA%Xo~NEtoB7NN&m`5Q>ry^peyL70$MDnftF)Qlxt2MYPuINczg^cnBgDl? zw3Lw+lvCpkkH@oS^N9xT+`S&m_J~o{V4q~Y@vH~R#HX7)P2cnRxyaMSNB70z{Jr1G z%CM>T8`Xns8M2bkaiLf+e}V7Z$cZv<|zoyrS@ z=nMPfjja0@M3uz{^J1;l#`B3P3rz!+(%g4M7h4YB7hLXa2GQU!H|n;`>cuM!Ie2$h zlhu<)SIxEsvOeB1NF0rQ6jBx_>hAg2zr0gN;OElM2D#&md^a>S@mBG*)DZfq#SD%R zT9oQc4MU?6q)@^7N-f^SniS2W{w;)J;$m+f)rb-tqIOZytv8|1!VHtCtoV*>Zt(^if zdO2NIEna1^C&$yF&!bImk=rJ#CljsGFeDy$X>L#YZVA?MSwE`-3bOnVua(#Q>xab+ z6@q69xjTXd5wasd4BKbdmzzY8n@J`V!~`i1ugasZYc9ZQ0mav$(P%Ivm%zpPl@MR| zjG3bRiiZ8W#@wqrjK4M>>Png4ygzw<)?~?}D?>wm#uk5m3CFs2vS$~|M((3}yY(9l zKGTfa`Q5!Y$=*m$y^x4B;d1>#niLYN?KrH#hN6 z)=-r;t3KU4KdaR?Y+_jAR!#|vP7b_V4_0{d$f5<4=rMzpVY#na;pZEqi?1w;_t$JG zC<9a3kqWuLgIkl_)~0RG{6uo#Mb;Pv&MdH2X(7hS@6~o(qXubZYw5SQ8+7>R44$3q z_<8*Ag)-&;-}knXhr9n5Ir*<4;m2Jip=Af8o&KnR+F6i=pGrwD!d}T*sm}G!%U1vT z2|@UYDVQ}})FekXq%Hx6lLaj+{qTT+NRZ7tT}U_Ffvo*r&!3pgcUn(n4sV#w+4-X# z@D}G1w5&X+K`@UOMiHnm>*Sy|}VBq;S0sFJ)6F|%R?9h7e-%a7PXf>!cr?B`_G_&@FA}HDJC$X`}0SjrQ zf}qRl^Q=WB1k?=cBIs>Uy)ruTG!^J2zXn2u6eKFzfu~5rA?I*7E)*iHz8oEoHHY{A z`73U4N7|14Uxd90G}Qn1Ki*EV?`0c|B+6FSK|~BnC`(O-kyg_1uE8dGBL+n?+OriO!m*r3%o) zW}~G6O+)}hEu4Oqw@=Jeu=y^llnR4i*V$*MdxnobaEkJb+|#~SPf_l#gr*C0u|{a= zC|&uC;5*Ad0jJV&Z|impW~ep4TRp3L)3XAetm#BBHe`7UJ5r}Vt**{aUwTCeMWn}I zEh@AhR0@e^S%&T@bm9q}cC?rG=yd?H2eDcMwQ1!I5C^`4O9CB|X+R85j`u z{%s%jxT*;UDk-1AMh!=A=tHl%!hGp(Zw`nmX>^TT=iy7sy0Y)+=9Wnkc?Bs!wiVC; z_V)Rbu4hr=Xf17BnAvId_V&wnYfB?a_SMX?CQqwAvT2QCq2t+M1vC{$kn^;$q`Zv; z9p$rbuj#^*W8l6`N2UE^eNN5zWA3fox&Gr)3ccT22(IuT7fF}T^cgxRb__^j^qodU ze~^>3<6deCqMQ&5BFhD5a;?4q4(%G<=)lL$4G0&9i?e#)G4$3dJqAVSHfVNhbTZ%r za$|urMSBY{ufO{Uh9EEv&CNNaa6`J`;0JouYIO;~+CO)WJy5)nP;swvqdrp>NitRGxMS*wn|NT}z zZKE=2Rdt;PB=W{jF=znha6tBT|2r8qGZ98h$DP!{gu(j6-b(IHqRQnY9K&~>YKv<;B2Bv zx9C0tfl-0eQZx0x{%%bFJH!Gy9&%##ePBeFR@0>U!R%t-y+M>++E;JP^i+WpB^71U-w;n~lEer=))>t;9?6MA624Xfwd;5Ip~1vG<(OMx6TBo5bPU=yJ{f@ooRZ6NNX8 z@xt+f!t%e=iQ)hM1N0gQUjrUB|9S&m1Nr~Y&-8ykB#~E4N3j0;obP|$^gk+75P~~4 zl12<94RwP#6wlDZLx<5?g?5|XkfP+EJw#!mBas~Y9nyas*rU5l_o3BY`UpZOx6i;M zwS@uJYsJfrnKA;C4v$d|<{Bndu(rz&HJUGa!WR5>uq^P*3_I7BMTg8ye~b4bqW*5m zDd>X*E(9PtKhy;@qd-PK^#@1*TY%MOHiSKxCo0gbMrzfHTR~~ngVqz|1l{IVnfN|{ z;C+8)DxRcv>p38{*8W(XO&{Izr>Y;1ZGfqsA4eU(9WIl3xSb{`e2r!qGct zKllLpJ)ePcxGKK5*Bj||s)Ox-3CaC?f!%QdXbgpFnFg7p!eP}_J%w=MCN$17=eLY! z!-kefY(4|jACO^->8aTGDWqcbL5tkq>ASaW)j19cHW&JZH{L>1!=msa`UMdG=$g0r zKGQL2ZAP;1`mlj?m1CHE<#i;`T^z?cTgPUyU`F#4+O-YznHhxBY35kEtC|fx09&pC z^cC`klj5cN(t|kL$oZOU+R1hTCeZ482|kQAB>?}uQ3M?bdZ?CN2Rf#QP@xO^v2;@L zQ5>1kW4`_JhR>&@f@PcUEMQgL1%TC4H|OlLeBNViaga`GPR;Ub)4_r*!tXUueEvN0 zc^qPDe#qg?F|(-IhQ&`irzJZh9T2?D2+|qmQ>oij`W#?Np*v#>4Cn$nNAh)jE)ZDh zO{=pH_R87bqnq!H*rv&{Sj)i}rwA;I${r9s7H)V9=VW)Ca%2f9MB@V-`G!TKCxd@Y zQA1@r09`x=Id^LQSqn%`Z`hQAwZyp+$DuL2CP)&!IQ_)8GgEMtTDRQg+SCqXODC9T z&j0dbyF0*|&Y{C>k5;NHu>07hMdnuc>l0P`*b|aydBLp^=2TG8Z-eQMBOuEE8FEl} z(Sw0r37Kb<-o*>xEZHM^%&eVPYC@=y$KKSLb7M?GN)cBd^ zd*FVl&cJSKv4{OJvS(>#X8;r0AL88Z4$L)_`Y!fcU@g%vwuj2P79-IDBF|t)6&=1; zvAW1qh5h0rG+R~>e*Np+Ka+eq&tAAwu}|FR{W5X*n?TOPlz4>_ET?3tqhPk#*C)qP>kOZMv>#C_z8x5LXX#-A%9j1W&2XRVvx zsA3{AJ-(KX)#`%-lT2 zq8-tQX!|AN%T!rc?mk1E?{qftvUS*_3B?ceM6d2-^~Q-W=;>~}LRw_-SsB!jhlyq( z(kL-Mp&d*Xfs+TAU#PQ7TD_~RWg#>DJYIQ=%wutT@;AG*hSj?dd#-oBx*orSTbFSM zbH)7eb{+gqd|<3}xkuJyR0@vDBz=MXuiuh5rm;y@ZsCS@(6ja{g-L1tS79ACuP5Wc zGS>vN1wLU>s@m8phz%QP62%zo7?(kk_)1|=8bQUgim>n*R)j{52>E{7FKI7?5||jd zamL=bDD&s2HCc~Y@}_@+&N~>di|EryBYCqe_JNY&k?f&d0QffCl7P|4Dxlx z^a@Eb^3xt*uhcD@UP)4*k+V~z>M{(=k?~3(IIf9f2I~x2O{%Q7Ia}IquGI`cl=`&2 zzg+7gbU$EZR(c_L;mu7Uj@q-*VjHj4Y-_5ax@De0qEtZXHb&OmCEF|}Qn)1+5!W}u z$lt|CkX8wYZ=zmTE$l((q=Z? zo8Ot)apg^Ep~ksaKXXgP`t|UePt5ahxJ4#TXXv-+AU+_t;d0=NWUyjYZQORvw<~rX zZy%*4*Lhv_d?{ZxR%xQ8JaBF7$iO+JJbm-d1J$pFZ5px%mJAo4ewUgZ{5U^!?&9)I zarvN;Z%t!;tJSUfC(H-2t{*OyImR=2ULWlaUrJiOpkgC<+%C~GrQ1^|Wbxyoj>jn9 zjAG|One%ON^hI+-WX&f8Q-X%&>XQLSngx#p*pApklr}woUSMu+4iAWU6$rRr3j2RS zJ($ygYt7rKX_hZ1ic52y9R$X;UQAX!I8K;%Lgp|aRn?wOOJL8ywJL%gMaY{sZ&Uy! z@nxjduj2D5;`P>T>o6*a8|EFkPW0{(uTawTIa=TWVsvdVcKR|Ba9U|0fX4ZnO&|tm zn}&A?vxC`y)O=N~&7M)YaoA28lB#eF0bX|N*ZLJOlr+eeS#8*SPuKUn_TghsY15|n zOu|fhF#Cn;{n!*w-6Lp|KqNi7I?0tFR8K)kst&}vhqKjN*3L}4hYVxBDkwY3p_M0s za+6EZ0>^T{?f|@l4|vNFA$7MET{d}C2R43JX|KiOx!_($4SZO?993syiAf}BoYNql z!t2!GGGHCf9>ltK&6}j{Q?OInYR5?pM1)ofN)eBxb!PwwM!GtKw07K zXd0B#*N7l~ln>*V7xM-Sz|2)0frkwaZ4?Vl{Z+8Gt^z!jxqE~nj9o$i5RjEQ4C24& z!O5eYI~t>`TIL~tnUPfEy`GW;Nz3DJ0Tb~Ys3xP!D|MPvb@IXAK`sAh{Ikmf@5=;D zBHFW=DX^W7glef8_GB?>Woc!H2M?rmUebE))l(T@1#EY4d=nGm`<^v%JdhcUK13-y z94uEET+KT=Zh1p;f%v(#GGWW0s~`<5AiP0NQg-)~hy8bNBrQF( z*IEvAig10~u1P5q=3aWQNorRjCF-QP{$OqmZh``@#WPdJmHCUWdjSkA7hZL%99}F< zaB{po@l(UbbE=BllFW+hf;rG%q={~l7C!&earWb_2=$*szq?= zS^#(mT8Z5Re1BfeI{$)NBSyCD!aSdh)dNT9Tu8OUuwP$o;OD_vQ+hyo#JY|>akvwS z?~lLEW0_h05Sq|a5+9H`h$nDYEt$bg1ImI}|84$!{!GzqoNCdr;I@mD-)ic69eEUa z;_DF1Lh4i0mD~FRMW48X1ztK-lTxaBpAm~sSvU{hc$%H&ttO#{sdJbL?uA)eHZqVL zmKmyh7bb&J!D2nw*EcRe{iO**#FQ08&Rr<7sQvNSQzfdAO)IZ_;Eqe7_vhG@yWxk~ zN;p{P&QpJ-SVf-}?f7hxC#s8DqxBM@3DhUz#KpHZtl>W0_wbo$?rD(zmzTOh3weKR z8S~KxM~G~5NV|RQ+BGv~bi&mbH&Z?>*j_y9*xyJqS|M=RH)7jzjJlyr^32x6XN1Gp zD{ExsRhk#oP=LS%zLcj6g9<>o^j@I6L|n0Umuqxr!7RXlGAp9LQe{`gycu_sw_zuP z6CO-fLfzkTv?Gg!)7FApZk|^4eA|iyYjNlWY6C{+h}~freakN1Yg$|atBePuvet#j z@ZD3XDtO#M6OVd(&KuPM-W+VynyzZLQF-O5*wSXn0c7jYoz%DFz%umt;*b0s*Kugy z2sd3V6_Zf{-^?gTeHdwS-WjFx$!D?#tF7wu*DvfTnMxw=$2Z{_298x^msYFvX>zDj zQ!Pb%_AIdA_DQQvqr_9cUe4jXQ25SUrXE ztbeL?V+mgCXA0g{;Nq(rMUEtK#|Xx7N7aM*k*I_MQWJUZShPWOWw^FZHP$t!1^N{a z$x&ZL@E?c)8=tx&hyAHqyzFM(gInH>_qk; zuOeR-`?+a1A20mG#L_|09K26L#Slyb$)OinKinrX^#tmMkcwlTQ5nX>-XQuO^hH_q zNY+TA_XP{BBYuhd9`|;%xeoKRf?T%=b7L(!VHY!8SAk_Yecn)$(SH z!iWLLO!#(?@#x{170pWRKP*bs=?T2B>YGw{!w;ncM zE_<>{(HlRX%lz9rn$~y8S?<-+WgZZazpUw^)$G$j7Iuv*3n)F2^tEYyKf8HHe*$fA zdE48?Zb=}dHr-l#X~$e@GI<|wn@ia1ZJOHF$8#`jZ);&bjZ7mpy=y>;?pjIGw{{$8 zI~`fd#Z~RsW*1b}fPWH6FO8c2qOBiY6DfkKA>+ly@-hTT1H_`J^)VE}T{Kwdis-z_nZz9MB5ZDj2! z#*v9avwFL1k6tM}=i4V4s?{c0lPRnjl^lf>_5LOMOSaYe&Qf=u zz-@^>?v1WKU{ZKu-M}oEZ(g;UR4yh?D%yH}QFe$?lIH*ZSUP&|D93qDhvAkx{s>O> zXuIfB!&H$ey(6C@LHnKaq`OkblWwwrR)JA;lYB+Aqj}I8;tJw$kMtO7ePxD)c$^v0 zlO=3N z_@xyyr3HrbZOBUm@myQP3HP6NN%ED>j<_VGMia|`@@@3zBHL;eg&<;(Ed`_h@Rv7Y zd^U!7{H86ceQ>RJpI6fh=`HHCPo84JU0mdl5-(LhX(tu1_|)rXIzGu zb>m^xosOzqUI^>H{CS$exJ_h}xVH`N+ zUMVnA(8sdl3D!0>+P)Eos^c%lQ4pmOO~|_|(d;o8vpA)xG@d=Q6U^*V2K%oj?MSt9 zzz5uBHv(tnq~-9)Tuofo7N?kpy|Vc9b>w4YeDU%0#?t=2=xK;^xeuQRD-8+MNLO(B zbZi@*tV<9_$;VGy$){T9+Lp6R6jZs%<+Vu$GVTxCzAAbuOnEMtuYyZ*SZsc>l-2ct z%0R5N^=DDU#Q*AM80BD~)}!ohAP|ZZ z(;krt=JoQmc4=*&_s<0Jn+6h}n9Rm|HF7L?veDPkr@5YW<(lJE(QwhG7z)=ro;IO`vYx* zHbXxzO?1&Qm^Ml`wvP768{Dx6OVl$nNI&_uO+vfUCn6_k%dx_+L(!U?Mr)5wR)%YE zYIW$`e9VkSOnp?2wp*#Z!zt+){h5QSgS>0E%1o zt$91<1oRcvTQuS|_vQQco!x2;|si>4eMj($enj+Ux%=VdNERcN3P>ZHqq z(@78Q4ii|-U~T2U<1e&=4YO7j-}VrOylI!y{N|J1)x1= zPa~I$4U~Zvc3LolYmh6A0-gXEYWz0=O!fs%Yw9VNh)9}VbVNesttGOXi!jG_pczaL z%jCtNT4YBRQfYBsJ@MqkwVTG6L`8zcJ*TA)y$Xw~M~;D_u}1a2q)|o5$ zg1k&Bp6X3e^4(cdBo{rXvYOt6`N*pDtm&vDK8?eEhs3ziu)_Cxduo{1uo>IdfKq(8 z$3BnxoGwdTB}uvMMBC%YdTgHfqt7A(nzs_tAY>LF7Z~kT?!D)%YSFemkEj+ly@(<@ zoH9@CU2)zzMb+%>=qAB>-8{j19P`)Z5lh!uTr+FM7rb9Xe{dSdmX>u~G7*D=fSBY4f% zAIr+q#!NLu_&OQ~_jEQols3Mqyqj1#?~>AWm=qpaL|QB*!tOpNt?9Ce05%B2=F!gQ zt=j0Y?{#dGL&5HVTTD*eB}ra2O4FJoOr27Z(5K$-r83J8_0H&AJf^E-tP{4iqqln( znN@d-BjOz3?Wx?=Pd?wU7ZF%aT)mDFDa>CPSnKQUTF1oM=WX>C*Ac}b9*Iug)O>yR zia_C^dDrs+w`aVckivV;m7I0U`^wx?|TIO0pt!^Pou6|=1b?5LnPNI z(A|6pIdV=}ZT;AL1i6s=%g%x0g|tfJ3p*=3*{9sfX=^S)>e5Jt?>F^ac3kXkFDY&m z{a$1`G(*kG7s?IWrUQ8d&vGeDN|dE}pS|}UOZ&cF%hU(ODcNV9>uCPOdp_fHtIO%O??F#KH&x10 zl_$Cht7fi6o>#k0nNySVyMHGf**U6wBO_<+2lFHGOMMC}1FEeUroro?%0*4|lE+MS zay@Wkk$7vGY@VOZWQ~ibjbM#DSBgoz(qT&P4%D@qFL#7qN5wrL&HA1kz8Oy8a!adx zHO!|&t*SfdJ|#Wj@Jk|YWgxzv_l2v*GfFR4IVNV!Hi<9H+sdQWPvx@@4l}wm_p9ph z*D9=V3St-SQSXOW0z|CgBLywPtuwy(I;$z%6sRK7{32(KUJj^m^EGve6R zu?B}bkKi35pp6@EMv%6C?*`k&X1q^1w*lAml&i5Yd>?df?S+Sx$=e%pgm8Ly7 zX_dRM6+Lxgi!)C>zxa)KdievzKkZH1C+~tLmTG5B6R!$hU6Co4B+oGkFx{PAd|hy( zq(OD1mtTZfqX}O$qEC?V4Dgrr|7AWez7V<;uv}b)AD1qO9P8p;E<5QM{eHSCX%w3m z<0D0JA3j=gQm7)`_rd#C?`cb`f~Gyk7SG7kNO?WBv40ydSm+Z_Qk3@aLlC9{&+L-o znR1<$w9J$&xj4{Lq8j(L-}CTC`4ZPf$I$LBpS=DOl}2I>rJWUiP*C$ZL{`V8hX<0Gca-gPOjWXj+( zOgv8p=S(lSMA0w8*N$3Q3sm2$^>0xT5|RwDp}HID(O1y zWMLh4niwf}d>w5Zte(cbU$tsNU&QOkVx^{2k9eBD#9A@MiYlA-;*xQ&-IGs#{2$r| zz;3B@GWgQ`&~}}D@{du!lr?99FIs#-@XJZwThta>$<*u(pZq9!2i;g!eQo#B$K)qz z1ko@S9geirOER>sLtgLsaL08_991p}e^I91?Dks7DkKNH8w>I?tl_JL9j*$Hh7`TE zRwh5@u+Ei5bT4w%hAB@`SSjx@mAqhY;~sg_AnaKX%fOKr<&%*m376~74#>|uQZY?a z)nA#6x@-O08d@s*DD>{kkL~U@{U$t$J_!uu;F5$EayVamvuv%X8$zvF8P}97@w1DI z7Lc;y?l8*bv2<&ST7`ThcbLw=&vIUjsrAgGO;JQlR>f|FvACwr2y#i{jMTsO2=@yT z-&;~^v!6&cVZ?6F@~!jNF^G7|H8_u7t@g9Rr!I^52&{WZ&?DBN?Q7V`^(N;>r3&Vo z0n5VwfgJJCb~}5JsF4armQ`!EqU+Ij4Kh{q%_0sQGc##MSDv5-$P)IqiSNFc)>Ji+ z8RIqlAi*w1jesN|2q>go@$n0_Gp(M{3d4x+4<7a?*9g>TphczmCzI|XuOQu!&j<`i z*S7b&A@B)*LL&~@6TAO?x;Z?x_Yk`&i9J1Y@1t80H2u;$L@j@N~*u`2Y=cZ zR)<8(+`Dct5f#u40fsEnE^vupRWC~Bt$x@is6{wh5p%P}r;$sYtTG_FZHuc^6T_P6 z{!0Y=F!36cLxG7<^=|gL-)!leVyrWP)6hPG`X`~Ab}WsfJz@JShx`swf=IorBfD#L z;+kzFF^k3Vbn0RlORXKlGL3v|r9U20V54|6yRyIBz`owPt|r$<(_wt}AeTYeZy#|_ zyPQbzd2AJ1)%9M)`+ivy%{-z_eDrjL8y-8b*tqhsyv2~%2mU+j9gi9>5Y1f7mt>6O|^IYB~Wwc)Y@dIe@rIF6U4fNppU_< zfi2o%2HTtC2j%mU9d6`1G+&`c#a&-7_cLgUe)=W8jm5k9aE<(`187!#xQ7=dR`0sap=xD%-z(aFMa;UI zVd*0cQ+iW0MRIGkus7mi!QFc^j22;1w+I^c5!kj9jCSQ#=#P+Xmkb>z)7pM1)@aQI zGt6x3=69~8%Jv=?xqqE37b?PNlIyMQW-CLmpO0Ux5kv?RT*)zO3M2wUu$mW{uU2#t zv9DQa3~`E`VV-DW&FM41&>zgB!_=R+P77%wFtuHZC|~&LakWw2lH)$VEID9Q5?{F= zf8toWpp$%jVj4McDfe#rAu=!&WgUX|dfO+3d#zl|CCDx?Io(XDU_b7EU_ed&$x9h3 z$lZi`MmB5V0&Y^gd|9d)wnnrmwBGZGU*_H#rP-^vK42TP<`O}ybY8002=%Jo@+Hu1 zU>Uln_m_R=RhkmyE|)gi-&=7>b=MQ1$A)Hwo^_GM_1ck8>9^_MOtPh5ngugBooKWR z`T1^6k?8EpsqXvRC7vMBV!>jIlK1<+2yxzyJ{YaTshv02$AUFTbsG)LOhpb=@nMaF zrF6&g{(D)gB84xmypE|MH4BKj?KcW`)l^6l3Cs&Ke)f*K%=HU1*_rh zW4BFZYF2LDEmy*^+saxey~%J7r;8``ocEUlO8n+9RT_=yGC$nJ7BQ2d%P8pX$9kc`8b&}c~M%g6^yZfamDBD!7d>Q|K9zN*Q=+SULTa+6eOoQcZ zyMAl=ZlAJCTMTgO0Kt6XW1*$+L*ueb2962p#Wm#(k(_ox%lq>&HPSW->-A-*%fZ{1 z+bT70C$x0k2~#HGk`tZlNivQ-vgu-LiZ|SkGF5Ur1WWfG9}VX7vhTW*c2+7k7l+~( zkKmYK$FrwiVe1|esDK8q(r(!>d_)kvdM`%Ne9YI<-a<2vbm}Y&CS5Y9Ok9urqme`T`1ITooy*G zcM$D5TOeNZ)QE^}^~o9B7c3XNKN!`I{$=%2+w4TTk-#F6qxNPvIffjyL+-Vn3mQ7h zo~{uTB?ASt8v1cgOn?BVE+;zrWMj-EbTejSkxCSQelrFUcEdtBJ%!YrJP}g*Vrc3k zFHvD=3s)l-!uIrTK@y7-1ALQpdlhe~HXY>RykT+jv!)Y~Gl2heTH7H0GUiHX1*fH> zeGor~i0(d49PD22x%KJmC9si0{L5~7|B`m~pKilNJdkNo_7rEO1(WJ!m)OD-*9O|e zauIHbeW!)D`X+z`TBxeNhOQL#gDmK0`7_s=1(ns`8eqb)Q`uTM)+e`;_KI5=$~7`t z)Z1GOe!c^?kf5bR;gk;}+C?Zt67_wEO}D7;QI}YovDMqU3+~I+tRODAm;aWuzkl-s zAQtTJYZYq?;X*{dJ~_0KdCJ>z_qLs`AxrMYrF^A>g=8H%i zq(!ht2WU8orS{MBH_2pjNLGi>oFEYlpE#@n4w&X8$UJv_SIVP>wpX|9X6 zAkC>?ZG{&;9zW))34{ES_|;u`4xMB^Z9lT&p0n-U7}L}2J}cJ#+A&6>e z%ZW}!pg%+kaKa~lI8oAYbl$aHXL<3iCIcK-_GkSFsXEO;Vti-aoK)S>#(u9+hr$$$ z?CY43OXmZe21;D8f3~BQ>)WI2lulw2GyjayL(Uw|-C}!mYw#7~NYyWqgTq9_tx>%h z24}24ydM_#4!w|nksyM%pF2q$p@(EK7khxEEKcdttNjq^Ln3Qmu0|A?8Q8o#J=)Rm zE5mX5#D_aL?C2x%zZ@kms)fd=Nr&0bFu)ucx zzupJ?={v)_2K6K{;m7te}4Q)sTfZHmA-j_*BJpgzQF(e&2{C? z=0Ge!%a7g!x9lTdLSvWZK(l1v&HRBG5Z2~-SG@=j-{tLts+ObWn_s8Yz-d{LPlxPq zQ)^+2je`k{ynS^T9k?W8Re%6Y!R@oejGUWA0GL+*we_UY3ny)RR$xqy0|bG{0Y5e{ zR15|qMDJfKKxf1On8xzeCJrTbx4U4OV+%R{bq zmCo$4?1n0L;HPKn&AyQCtbXZvJuLCe>6#`)ulR>GvMNCAA6o4{6A&2`)XjMvJ z3850K^)O4*sfBJUUJa9Jf#I7h=NGN$PoJ*tL9S^fm-eT@(th;I`EZ!{7#i)>KpLdKjg?yfFm0zvq6>nqfRnFOy?_!0pMLDgMZmAaLQ9_@9;0e;luOFvP6F)d6r! zQ?=6hncu`1r2r3qa@(G56o7rlASziNSf(RN5vc{y7Xjjd{(OwTXW*EpoyhsGKY%Up zCc@3{WFv83fKpSMR+{c3kdMh!o876+Ai9ghZU)jR4}}lmNZ`zYuD455L*4e5^9vtL z^U-WSy9vC>!90@4^K^c^QO$-*qaJ3#ZXw8sD>wZnX{=&Q(rBv`1$eKDC+((M&;j2cfM}4!?+~D!>O?&vYs!AD8vmMO z-g58}Sk7m8Sv1rqt15n@ur6aVgmLWn_gMdAoEP^W3{dUkA!=>vmAM~l8;eLP58*cH z)}TI7&IQXf_|c2|CwOSZVC_c$1|1_Spw^9_)o3G~6g3kX;0uz7#srQ}yE z4KM%X+PpcjLDY~l+<XZjdsziY)|K39=9@(#2y3 zpZ@wH=zV|T)#=DsDcUPQvlN?HTO<`QWtEgD-Dm0e2^N!_7p9lZo>AVOVK=wRsayo& zxKcS^pb{Op7FpiAbG@`WgxAyZUpGcFZ`S+|%4ui82X&K#K1ShOTla+@cUo#W^YE-a ze)ir{d!TnCr=u}!A8J28Biq^*)Fn(xZlc_SMe%(9>)6PgB(FXc1>-k**(i|4EpU7j zZFMg>5Mu$0&lj}m%iZPyu77oB@EN6C1hv0{NoHepn!P-bXP{?#5a0j){`Mha($do1 zoSW<)+_*#HnWPIgf{MXWz;yBGNr91gM&(-*H*)n$H6>xM+KIPPN>BeR@z}79s|b*J zfVGo(UJtjsy{-qee#^3DNO;blZ;@z0;j{8#1@cwJ#ub6fi##3wBCQ|)8f+{u?H=pU zQr>udGX^l(#H{HCz|3q_U|TIns-}a$&=&|&biB;c#W}!I_dW>{4ta7ss2ZYF-ouJ= zsl3gjZMled=z#@h0_*EityJFE@83_rWZwS$y{%XEc8a|xaEPY^KzOMCwIgx?77Ds` zsy8d%CIqC1RNnyX)TXq<4OCj$c|~#p6-T+5?N4CNF`E)jbyF*rIldaUZV#cVXxUQ zDsGd%c&>B6&l^cAR;;g1PzD;3TFQXZU)AJ2UzBk4x`kS!fP?ibZ4Z!w4UsZ`N(NO< zd*F+I$;Xm@cazp*qYv3 z6;ZX!LlhKD5o$s26gT_(%TP>1u9^E(6`wuep{2_7C*Pm=3CeZ4`^7t@ z?jXnm4BLQGrL-ds=s-%eLIAe_5Kh0tS*jD{ip?-qFI^$1B4q$T{zBVU=a<=^2O}!Z zpT45{y$5Rn;?we+DcWmC+=>C)AP{DZt*DTu1#QL@OuoWwlA0!QWA zm6%wC;<{eLLsySuw2z$wz}8YwfPNOc^>3}^_Xp!D|G5u)t9Wt_!19jSjX^gRRU_K9)$i3rlCr(8o zh)V$rk+x|s^YRX-dW@F=eBP*&-IB1!Ye0neaayjG9mXxpaP#J$W(aDg z{wy$bm@uFtoekT5Jh!j2uhufCsy?$(9ArjAxClvycf>r3uO07rB~2Fxc#_gzt>@Or5qqRs#*&cXxieOU_Sp zi$HA|4wh@#E|?7FRuH1&0_utJT;ZVvWoH}6_B~!>m*4*RX|u&6CK!A_9l@^2djzVs z1Xb5d^b(Q?0vlF9-2jOj6+xcYY`L843^3HjJj&uAg54d!6C-E~3@rIkYnkw7V=Vb3g$M{&70X&?CdePL(Yp<58yh5N`tVVf%I87 z)H86k`2wkG_S0vGo@VLRxM(! zPKIC^bLFG>v7<+iq7OW|U{Qf6EMVHH4hk#bfF!2CWr}&Q4KT-i#NQHpq8uuURVy6srlhXJ@}Ez73Wks@iHx-#01cCYBxel6lB7!`9d+8FHw z*iC`ddQ1w$plToonq3eErTlt*Vhy#7W_urKvEF=^= zcWb_6vI{V@$M=J@;?M=@@G72XFJ2hUxp@+Jq!(AEXaq#1yc1C&P~X$77&wb>2nUiU zV5{-hP_qQc)5JLb1+dbW>30201x+Un)Q>HfOP;vD`HR!^Wm<5e9gii$Ob=)#9|vD^Wz|=>QT)8gtmPf_w0}Tk8r>_xe-~_3)jtFZ;P#fJ_w%LX%JN z2fO|$6*eMpGPRbT*SC=X;Vpex?453GA#%Z89rOk7avbi28UP2T=R+r?O1}JrY9~)n zZ#wBVlnmz*OF#|jL4HXSbyK-dgt)vJBVK;=t+Sd`-eWF0|5Y4O# zTNygxZR+!JwyYWCn)`9)1lUHbj9%6X1s2v*SI{3iIdApSwAA!AgaEoYA;oLqNBq(P zaKfrUB2q+avBm`V!FQ*nVM$nc{`y}d-w)lL{mlUi_Vg_W1vZH-6W~?Rya=)4f|QrL z`DSf%4HEOg5SI{XI?0ek5CeZklNXX!8ag`bvn?jsP0He7ba3}85`dr2us+#2l?AoM zx6AhZHS|Il>ddPSdj!1Ay&+%^sW?A;nV)a6%qW*jwbf%57z0C0&9T=H!`oQ+~m#kZ++VSx%8Qrh)9{{wRAW?^t||!1JR; zT*r|h0#)s)NCwy+%4*bBGKE!Ae5M1f?%jLv8vaBH+pCx-_|E5}vTl$i*6XN{_yJIY z8s3gGe&vkf)g#f#GPsX!V*5oc;HDf_a%_7b%=5pChKY)X61_!SwcOmH?^6^W)O?D& zVe3?^&<}9_U=W&uy=g4(;t#~v<1)Xd5W?4=2r23M11V~&9fX0aB2fVpdv#?_T%vfu;SrghHS*z7^!s!9t@P=Bvf33>-cPqiu*+ySNNL1e!M8db?i-Q~;J z>b4TJ5J1lwtAz(8v?@P(Sh4T4$hC^Hcy}`;oN~`9I7-<+3HmBeR{={+0j7RSh8C2a zhE6>qV+Gd&_3bBP&nnPs&%Ka+h9`hDW&g9>U1}GknMiu3z4NueH~Z#4E8!{dVY=^_ z(f5C+@Bw#{P|%7P+F4S5I`*3s2!raN=G*L9CQkMUMh+qF6*PtL*xU>KZ02|#cJ8A; z-Y(RB>A&*~QNVqp4YHqX^*g94TSEB#c|6@GKQLr~uGGfTJgYjJ4+#UUYbSAftsfO> zdood>|34N0y=jy~ZyI$?VDQrGw_(a!yf287>z2*Zx4KeC+q zX`zk2j3EXpw87ZoA20VQ38(yB&R>Ht3_TEnG%C6f_Flyk7K@$qywd7VOXpli92GYC zvt=~|rcSMV=x5G-f^^aFlOR4H`sQ>!( zf4BBHEmzJxcnD@fe=5WrrALx^jhMZ_8*<$ly7A4$Ry6T-NG5r;NpnH=?+1#$3}1KJSbnf-0?0sE%IJ6v@n%21 zzdkA3e$@Bq)N7|~@&(zGFVx1bC?Bopb~wQq_IEtU^1bH*8-W+oo%TWL>rcD&UI0Q1 zxOTCn^js>EfAnlnA5N**X?Jbu*L{+EKls#G(MbS^*gs)v>|mR+T+j_KTA`KcRwaA8cW^-;*5 zC~n{|JrEFzFStDNY&FAzIOj@|w0ts8DhUzqU8+i&sIWW|0jnm5{~#LE4)og14n?%w z&37-Mbrmd@)n<4o50Q(KyJA|LGI_0I{WfLqR2@ehwMR6x1y58%a}TL1pKHwxn|OyB zIlf0`bDtNxJF@)i+;xHT>$3~E&iFO9GA2eD{r#*V%H8iy|LZ6BLQ{mE(snWPv%?HN z6u9@uFB!ypl~b^_=7W}W7+8=#brtOXWN{7OpLg5b{7H zI`YQbF{P-&n7hn0%n0#tJ>iuTJ-9!Ng?N3NWP<*yI=7C6|pp%GG--bx{w3pjT@`8`|H zEALPvF!gb~h&pcLs>!W2s-zew+r{2u)5$BXG!ZJYkRVj_-7!+$NLhbSDnHBB*)cyf zuf>8A9q!Rfd=iTLu=Im?t!_=ld$=KCraFT5B}=W!5gRG8kj%w4o5lx?u#>A&N|!dO zPnQ|h#ka0_+uwDj%dy>&FYo*igWK-B?)vql&|b-=+1 z*w;I*pEB)i?S)I(`(*13&mY$4L1wb=_K$B)jCHTZw=FHC#h!3n z9$4p6KTKSmH>r-=dvvO^Xab{{U3QgPi(RS0lG9e()2c+)r$i`eD>Z3ItDMuhxt^#T zBtGD*wECU#Fc>8~rTDU&vzu7e&=s(Y&FIF%IWp&=^Vhq!JYk~Da$f%J$t)DLw)(f? za=4q@WTo4y+djEn<+2veKlqa71w$%azn_SgdeNI>YLqcn%7dRDouCGD7*P|y)S0z2 z?Apu{#Yea;^BPNxWR{1sarHjyx?zh{pO7J;v{1b|i%ic6dW!2!tct~n?HM!_gGbVH z+%+xq{Ef1#t-5itUPDHDb#;^&LrzP#*~?HV$vgin{|y9nH84{1kU3X;07_LZ5K=cF z!6`++KhO(l9Bjvjh>z)2EyW|G{RTMZT2{-nbNdbChx&{wN#AYo6pu(&;c3Bk^42Mh z1=|$;B(TQVglFp?3U$AJr~2X9^Y;A%@4nm~4VmrqT6$FaHhVMb80p~qI~*%U6y^JU z*6e0!T|NYD6HQL>Yt@;p`e4}p_}P2kdxfwU`0L$iTf4M7r-k!7@7Plfc`Y&ceX9|k|H|tSG!F;mL&yrqdGd*S+c0}4$>;pXvO_)#!EFm)BdN0^ zbyV7H6miw#^-)HY2=9)#L-CHXzo#)_sdDmk0RR}YTw%9jvMjiW@6X9jHS~FQ`4tm( zw~k{O;CeD{ua3yu)|J6!sIthV9e98Vh4rgxSSy<6d1mvmIJ4h@!*ZN|aBABFd;P&e53*z#cv+jjf$>z0^iLQMN9UA=0om~Q*6|33A!7mfl_xZdzB;)Ht zQnZ$^Il?gYZri^wj{={_L+z{+yfjONauN7214`F0?y)I~f^XYHBPTy}z%;R<&Vy=pOV zFjKV#^>>_Ndt|~zIBFxePBrr6 zi9V-mK@16{LLV`tMSmoHB2e)ppJib|GtCrXnG3w**iv6Px}kGbl5>T1>|@UxP_X@Y zoPA0-GO_L_fq|huRG)!lb_=EOJJ#(QtrFUPk(*Isr>OU-suVNQ#TQICOf zx9fv(DnwgDI2B&~z+1uHc^8BwBSAje*Q zv_B7#?m1tS=EQDETb3+SldbTmHj#}%4$Bp~X{*2?A*?;0fWOmFwmuCyE#2M`R;fM>* zN$c$%)Yk$QlrN8L@Gf79+ot?TVQ+4jR5!jQxqO^BUjvU~UneOPcAnXuF_9?+cXzT| zgZ|i8MBbJ~lQkFiO2czMnlbpD2GJZ=)3vcpo&$)h}FmK8@P6ppE;G^2X2$jG{(k+xjCI|g>q|w$m-TmDPCtJXxOgE6*uQu$9CmGe{QQ3! z^IWH_{`mfp*Xw6{FMR8c|MTcKi`b5@*P?5mcg0Kv&Ur!x=!$YrDXn9O|9W!1Q`-Iq z-40vh|EB!%o$vE(wf*+`PnZ7bPGA2~b>aHI51&?@ye4Wr{oCbyM_HEXy3^|_JKr|? z^&frq|LgpJdvi9`pB9xi=K~)5Fw=Bn^8bS~fD<28^SKUjtqun!gzF#LpZvM`boIxD zM@3ICdDppgi0W|Y96i+q>mA;aIiXx&^5zlOjwaVxP0-<-6K5Skb@KirtK)x%@a+2fzemyke{_$Wx!tiI$;tON2ECa( z$sAY%IW?+w>u~7=bs+0|m9zWEsoVLTjq$&lUwqv8U!ZwjjY`%r|33#7JG9<0DP;ZO z^Er3>-EVeXQz!SULpuRV=IlqOW`CZ&+fF!pU!C`wpR?^d)+VzZYgGQ~`gleru)TTp b+Qy0h;%ndOEW`BH;9CUfOLbj)F3f*e51cO z?|Z%z*ZG6%V(-0X#gq4QueG8y)D$qEl0F3h0GLXOvRVKDiYfr`WF8F>06zFmwCKypbUW*&)FuZ4MRkjH< zi69d7zxp(WCoCe;KOCw9O-t2*%FXwV$&>FXW(d^zyEiD!VC_x`rKTt)O$-yQdUar^ zb)TdA#;WFkCKPd#ziUvC^gQwTJQRmE=JrJ-OsUPmN9v0q55@Dv1PYVo3XRX516Zz{ zTwNN_6179X7GN8QmtK|!_=U8LVHLJeZ^K!i$c6|-zB@~Jyh=DUI7bh`WL8}31YVzW zjM`nJ_td{0y|rxcS*; zB(xOD;@XzsyIIOo7D(q&!!t3vakpM}8uTT!px}Tv=ul+C*jpP!tb65lK(#czET-vg zQor+!DNtxk6U5a2c{R{xudK#@jW_K%U9vrx_vLZk^-Ho+A({IGZ_eT7-B1?zsK7cHZa-6aEvzw zmu%JeDw>--Mx?}=S1Rl>Ab?3LwmzW!Wk}(Z0d-1}Z;qRvx ziw{K#HJP-fO3;}mvuiVGqVxO7C$&U_)Frz>_I+u6CcmnR66n^>ej2-2a;z*%Y1&i{ ziw=qW)DYKPj^2x{SHlb;(a$U)YNQQYCIPzXyRz2}PqREkK4a7G0eP-tvK8r;Z+Khv zHO#VVB#6yrOwA=eB|ngjWG`fX81+cIoQIZlA=F>%P?JZHp2H=u^K1{C%xE7?9C{NI$=gJZM2o`#~ZNlh=i{kLdgaI>WDF(!8W1 zKtbnL^HaUN=+=&qp7;D^4K41vS?{S$FA{6W`fM4qQqxUGnUH~5m(w~vx2?@7sw9L< zn^Vs50Dt_4ea=vcut>D76oGJef?-9_50!b}*}6kuYL#+%f_iiK!sVW}{pJu?z^rb? z#Lq*7fch+kmPl)1ZK;ckrpqD0!9B(E5Z7PZ9v0gfn#&HlOJ)0JM-%G6+oZAQ{GM6* z^3$W=W9_o$;%AjLA zo1_CM<+|kXNOG5UCj3vr19bensN6qtayRd7?K?#jLJ97zD__BcUXkHv^7RM43O>Kt z%kP#vlTzD)&%5IB2D6se+u5|FRfzi)l<&CfGsS)9_gv%q{r248CS!e&XO$z(%G-DI z6`_*0*zRcX?D_n+Lk)LI%f-UIW4R)fm=!v++VXbK>ZX`i(_!@z+THyI++^K7y()OW zKA?S>p$c3q6c+`5i^8sb*{K=OR4BA?xfaxIudo~Q^2A(M=wnv#*7<;Ud=2O|^n!!K z)4UBB`!V4iubH$XK{ZX^|BXwVLOT~t&@l3ee+Cg%;;`0YFLm=%?>X{@5o!j7^tdgaqD zMw!P9VXIdh+R!(<&)afVbh$-nagGv;BrBe)v=jN(UQF-ha)R6KTlt(bp1F(XX=5Mf zie~zW_&}0GAAal)rLJB5lGRZD047AM3J6ng(B zQ_!t;e(_eVC4aVhvjeTFurfL9o((DpiFK*YeW|KjUw>?0V;AUAvAfY9liJ~TP;GZ{ zpKgBvzIjM;7FK*)v%0$4y_J+L;4&Poow)mee|AE63_Rp@OVnQ>)mfeLhLw&P*an_u z^7nN*2VCs@klXfJ?DVVg?vQ*jMBoosU!q`EYEc*eAZ^_Ser#;4VrR$qxw3o*)703o zlucsS8jkB@g-Otdoz!YbwWggqxsbbT<&(?0 zAfdr|XrreT{U|FdWd+z}oqPs73=^)uSZGFpJXGl-lUQdQ0ll#*wBAPpg~xW7K6iG| zuDs=9m>I$DhXVbFiUt2#ScQJgu;MO;q1)4Hvu+O9sr1G>d~C~}PRWVii0w~)?Eu}o zPGDFNpiZiyy4K**tadW#;H&VsZ$BU1ekpJ{$|EA68Pd*v^^67Y*~K|NK~aW86F#Mgaf zQc`oJi~E9@wl)JI^TvtlEVxKrYpe{K*^8zBylUz1G?es?ZV`ublT*Vt>;**QGKcQfuNohyaG0&Ii=rEuXS!lFD3KCw1-L61 z`0SR{7l?8gzu_`G5ok#N&&cQBPyo;H7uod$Vxu0gTmGD8-fmhKC6dTcY@m2!O{Jfu z8Qq4zN3>Jk4Cj)AaPcbt52ogy%e5}`9VnoqM~!1ugiNjE{SvcL@I1eI=QvG^EjHuk zJWjHHa9f8=s@*nk+3K?(Rw zD)g!>Ha~dPz%xKnHAT+muQEcI64z|!vm%rG%?t_Q7_7=z*$uOBE`3y3c!5c)<(WyK zLZSJqqosPL>lk?{Zddmwf0XoldA}Ea&4c)I{O4xEK- zSf;abuq;W(bwXXYL{{d3HEw*~Vcw?Pbv7wlS9WF$HcCg??JRykMyxlxliYr{9Fju& zH-?(*lrCUgFqr(lSQhsSwA41EK5n#k%$AE7)c!7ZO^l@Qx~ate;cnAjjSW*wDJE2! zMd@stGyjMG#u=aFEwCwMbzNd%?^?a9JR<}T>Cw(j74XN@mtSQ=Vp6q-n4{n>2KBA=Ts14is zs8Uon3m72`n0SfcFBNmq%jbPwCXywJ7ZM=D6ZQx$FiC9Y(Pwsauw^f-b@AGBy>*$?1@q?x_-}j(5VYNSi zFqjJF=B-sCXr;9!|F4FY>SozHp~GvLw9T8R>p(*U#;;r2FWdF!)*dq)RnrXRZgxMO zFJttzM&>Ks(WodslEcGcf*{cePn4Mz`d&U#i~b(YE{&+>Gp@VclqS`)qyzJ&n)`?T z8j!?#VT;n;m!8=wM6UiM2IOJ;X@~cs!n@9g~yK9qin2KZLhK5F(`A zdzJVg^bVBv!i{6Y2Df_<_uqDRuQrGbrEhj$e<@ze`x?qjgvUG=+8uc1n?Ds-xW&uF zyYRNAr>AGB*<~sx1zCX~2S2_XG{LA&w&XIImNpGjN3F^T#TN7FWcn-OrY|jc4w?x?q>N>$tV)jjNkG32p+UE6tuA1;hVA}O64e$$z}fD zfROwBkSpa`ABLDx0iX4j`RWWSIHIH;s(FCl*NH_b&X&%~*>y!jrnA@Rix8#DU;l)M=Uo}?-zQNJSoFCr=b66Y2l6h7r zQV#@))G0GI*`3?1o@h(TNGa0b9U}9XE*F95VeAa5ne=xpb63IgAxRC$M|N3DUr}gj zKRhFK628)=czpZWfk+wpEOmSYH#zME+R;~h?)P#?%MP!oX$^Ssi$K9IL)F;3^uYFR@TwNJC3^J`0e1HqV|}4x{(X6i*rk>451(-EOa*W@X#Vx=!vGuiX%~r=D_5S!JJE zF2_8z&S_T}I1pK0b_mZ)0cqZ=Ij{!#{URl6mIw+O&D>f_)al%iAA$<9`zP) z@@&G6yHEGD%b?2K@g&Un)OfGz^H&@O4(?excb<(}kLRgAylpsU-PZHuga&nu#el>v zLqL6X%Okul$@c>}-C3^V*n=96tlG{YQ=JdcGhc zM!2%Fw?`#XElIQ&J{8b_`CT<_&{AE9B_`yKl1qNpW!Dwt#48pnb3RWO1OIUjxX@kU3iIjvC(?xLfgI?3Br1r=M%8`4d-R@kxA$JLQ|vWpFK#fE9eol-T@ zLQ9qv>MhiS=+~e+nGV@rwJNosi8jxtu~-&0bcxte$ae^TgT{ZM$xEnb#jS3wg)i50 zv_?#m_UWD>8}$gg2d~~|S=pr|LQ5a(J;KiMQ>jk&(|(#$P*9{afHJ+Swd&d*<(JZM zxP{lyJk2^~ps;lY_il0;F=To)wRozC)K4IiaLrmMu~`wM{6o_q*Dz+0ax#IJ_~=N; zKvH@dV{e0EB2lsLCx22#*3witqy6cAEio6DLVieW-9A`HeeOvfv+1Sq$K5ebkL0OF zT3HW>jSl$WcE}D~zk3Mu40n4zrymfKQZ%p*Wp{K^5R6WEE)md2Ro&i$+#aR!KNQ8Rb^ar-3goZ@APDv!m)j#7Hr4sP$#P z#3g}wY6ozi1mfF6z#`oi{SMn6SnWbv+w13V*H@vCyM_$cOGHI2GneiT$47SMdX$dp zd!Ihve=#usJg%d^T$`hplAId6s zdGBy3Y+u)9zFI`7!ol0$zz$r55?8mdSj_JFLXmyB*|xr~*3)7u`Pnk7MOJ=?5d(S* zoSi@leolhqL=EG7{-FV!vQuiepDJyde7`j#rGRCb)!C5hN7eJoZmb|H$y@(dolW@6 zomuqlR*S+4f4W3z`XZy@+P*GGCpL!~uB|}>jH8eN(OUAKDJrpJgL?xAxdj*JQMrU; zczB9Z%xxK`?|qkqEx*Ksz$_9YW}qcPVd7QmAp?bCR;)JrcI!SdLZ7%>PJBWc-gibL zQT1vFXi-+`drQ~XYnr?PQ6RhWx~z*7iSU#02uxa`j_q4iVlCO>+*8I1!4T!-_FCum zrpo#e<*@&$nk@%9QL--bC+7^y6y*^KrgT0#_nQ0AY)?V@mBTlq9Yj@CtTA&|7^8GT zIU@@UO{&C|G_pn3Vurjo>g453_f%sL?;ZqJJ99E*VxH`Q<+Lt0)We25*#z^^1USov z#;7e%!jE*amn-b_jay)Lrlti!JlX!?5pFqex_dr={8j|k=FY1olraR!fV|FVo}l0Ag-<5|WN{(aoeo6Z{(H9g{iTF*&} z7wPdC%^sQ$B&MBKDc- zaKA1lR=n>}SdV0%ztHZhH)^EIWjQ1SJJQ_h#8_v3V^67B%At>((~QlkdpeR(uIe-WyLFq}@3m%$p&(vHdglhLBH%c8^_+d{+9LtCG+X zhI>__i8j4}aXg)FWo$1f+McfLn-A$F@e7cl1EbEPM57AL?GD1T>%Cr!?W8TJC#->yS%JCd*UnreUhj+gB-7$D!pKf#w9t#cIIQ0caN#nm z&a$F9`wt*}AF&(fZHh2>rDlYIWixn9Fs;TDCKGaAb9|XYS2>yf`MksmJ8!W%|GGrn zUej-Hawr(oO%!$BpdkK{93nYWNZC92y3L3|ga0L$?`h{W)%KH8fs6YF5 zO}m#|C@U%p0o`**?4U?ne;*p5uQf(#2{@_aay=y~b~Pz0Q+02_Mp{Q)i=$SMry*tY zB|1lYaaG;JubXQ@wW=u1y$3-j=BKF4H1iBDFGO3ioV;k$gxsio8Ew2ES(lJk`&AtD zI++(b_DLQLj}SgCH|8Z|)ZZoA#)`vS%0ARe2_JP*8>2-Z{bie9=kuolmVq(@0{hih z?JgHtYbGL7K?Stu(x`79`gw`Mr2~kBAN)^fwl$E4MHk!(E;$X)H2>K6jY?orW2yZ9 zcG&v5xuL@e&M|N}48JpZ7Aj}QEi8V>)7>fqm3ww!`udV4zvwzFKBW!PLUb~ko9%d| z;AfvS-Kmp*8d*70_-32DmaQ1rmDor~X-Rjnp;=v7X+=9XXhhK`c4V^Ouhrh}AhrKO zkHf&)>nL3|e9$N+;pH~4vEhv4h<5YW4J4={t2c9ovjb#62H{m1G}5Mpy*j&6k+3YQ zsWefC_GeC~48tJWIbFrOaPnl=_!tAoxxGi@z%D+J3fjgrbg=(>^x@9)l9UZOKYN5r zW!YIH|5%($#D4UD!o&&ODi0l+)oPMt-KfMG;Slio36$@3*3G~TF_X`7-$1VMP0+{3 zbiXY@5`yu=vg_}^(AbI58l5C2REBWui#JGgIm!MqP1z1mqf0RG%8?pX+!p zy6zzz#H%339RauAT|z_*r*pNai2mh3;4TwzBpfto)ME>0ho~Hoi(V409Q^Wo$+mi( zfDGrJ_*l2#8=>GzitPbnLssHAxFWU)T`-qh8`Q;&7kA?Ax=zos_J@^sS9BugMn;9k zZh?XFjc>D7VhFE?#?7c{PiFu8jtFAfF1iw3Nn2x!4 zF`5lht=A3`I{z8Sot8ud_jM&W|G@~ikiT^Dzvn*^C%rgt!EV*X`Xf?n!G|5oq^S@P zAE!Pi6V=ys0qW;>0{|Gx!LOl3u>91+<>iIkMQ$6MWp(wkxw6{S=`Dv;ZD%DsnK4HG zf_k8Sbcf9D?i_SKBo7M@k!x&(gry75`1zV{IA}d&3={Ps+G#{XVTAX!JVKsP6&ZSmdnp1vu2p5QZ1E%SUh+!)u_m|D?W82GYrF+db_g=8DgA?fu0p29b+Q2! z=78m4f3;oF3dYuxf1(+)(xo!2Vy>7HXDV=|AY{JzPGpT0g}V@crNU(fvTZT&y<|nD z8&^|?64{OeO5p4%doUp^`~J8g5hS!(Z*cjAvyBJ9`1RZTOv5X-M3jFCiagLz4YTA+ zxBDB<1+iLqK}<+YN}9Za2j`Tmf@}AHIxKo@;8Ur1;!P+4S|!?(7fUNH4+>$!1$RNK z5TGv(+N!FCp#syjqvcogD9(jj>fTs_z~gq;NM-`}~XGC007>0+R>J7)%W;<#EX z?p$LpA*eGWnzXF<&6zB?O@H^Ib$_lQ2_Ycp9yLXOg#8!NS2Ekxmy(U7NO+Vxl-?S& zDvf+TBeQ-WOijVlgOBiuu>~7=OI_e!B!WWcjADW zE2nif z$3;6{(q#K9Z=3l?a3^?0v?h6T$j>L`Ew*PyTA)>i$aTWIsBw zy8DsSFo&f+;(T0cuazkB3_CxiMV|j38slNz19xr^=SR91)16ZPv6Lgi+$48!sIP`Uu`D42^r>Z zwM^%9`BZIxgZp^WuSPUgq!5|i@q9|SZ*90G90~&l1e}vHv_Eb1vD&%o1bcv~zLr?; zf;sh|$88?F(2S6|8`LiW_aW;C&0Q_-a?vR-rFy*_99WlfloIdZ2OsA7&r-uZHloY9 z$)@o~TT=_@1WHDVG^{Ng99=RtxxrdfjC3aP^yZ zIny*&p#kop;W6g>@1czvs|RN3q%qZ(J(7}$?vjhFjcqB#tBj^^21wlAM>Id4!oCvu z-P~}PJ>11~joee-U+3T(&*NHdP9x7UaOY$yv3`=K|B{wF*~_Orli)B4&0CR%Amb^~ z8^<0B2PK9|HA#9=GZKwZE@P>Dz;I5|7iSdW;A7+ff;NjdtNn$hFR#*v68D#!&V&3?*-V3K$e$zIi^sLA_5s9*h%ZLK>hUkY&&EqAh8mz8W ziD)xr)^@CPxgf`{kvv^j8yISBKf1C-V~F?;)~l())9LAws4w2Tu_q?)D1On3&RC63 zRixKfEYmuHwjV3g>ra{_i71f`HEheC6jnVSp$WKme_;y!$_UeD8?CkcYWn~ucP5q% z8@!H;_*vd=4VY!DvOknO%7D@Ch5 zto&S@%xFU!#X5|f8BK%gRva7n6lM!WwAwjR#O!Cy+C1Lk1;@b_}CkASMbW2$HJFpZ$o_PtquN(Mcrh`t2ZO)p6^aR zx!B@_JI23W7>krWp#dw)4u8IShd&%HD$9leP6fme$&@9wNPZg#@tHuNnZ2T7KS7Mz zK$cWHA@q%7{cTKnPbBkjc9EFh`5*w4adB$UM>^F201dQ(N}n)k>RJGRez3UcBs4I(uOhmWw?fgIkF)age8OTKbUv=%$u9TDG%2v5I&1|Yt|=KJ zN;2F9Z3iu~`QBS*rR3Y}yuZAAmk_@j=$f#VibkWE)#c(ti=SMQ1ZlWkj;kZ(W@9q6X*D$DDe^QCv!C~yfioobW^RZs~2Z?uu zKaegM`$>jKF-@=emzsw<7Dm0Y{3A^G7nFo0{DbC7^u@Ou*JL6(e62Al>ZkKTfxni& zmsR<{QU%WV!KRu$Df$l=>gDp;rUABePCYQ~X#FOt24h za*GT$n-nsVe|!p6{lK;98R0mpp-SH`*Wn`=xyh;+VXaubB7vD!chbf}bTUaYK?9gn z0Oe2_7WJgTT2E^RKTdUzsbQ2D+vL13B`zn*U)5cz=vN_mE4n8$zn{JN`Ej6b6eyM~a4K8@oQrzFw{^-Sx3r0_vE1mzkMA^2$J}zd@zcv0E}ghvVXtjb?*-m_*oh028;Ki8z$CzSX(Ti!PsO!r93yU?k-I=7 z6bTl6naR`^`3|x;zdwZ^{^6O*qcjxo=25Z*X)kN>)?`C=09Jp`{O3}AmG(E+Gxw}| zpRn`g@C1)CsdI8eqMUX$+@VkXBdt1g%fihkg7>?EBOF;;n&t|?96RC|L9ks$6E7o~ zO%#F9ry|zH$i|PBT^)u5|;%?4nD?3=V2!n)w)_XIc7qL-1*p50t{lAd) zY0NV^09AJ^4Sdr$8d-}92^}!V$=uJXy1jW6OkzD zKMT9jRV}uxAB$vLoYJp$xn1_jX;8iYX`{EPlyyKhm5|iajl+HJ5`b^iA5Da4rm?IE@!X>LrT+bBBWx?pY+!``@4XrN@yaHMjWicA}~(@G#D*igwslC zjdRQH8p_YKinz%~1g2+y8Oj%lcA+L`hSBD#YV>sVDU!E$pRfi%lCzS&ei+tD34zzLLVMXYn119kxKRs*XaxTIGG=SA{-RRlZjJ zO)_jiO1>KQ{L)3Y#dIIAP|Vy(E(C1@`RRYSz~5?-?6{-(qmjQSlo4&))!FLn(cblI zx~sL-S0sZpe4@+O`RoEy&)xUzqS0zvjn9j(3QK|JAYSeY;%|x}G2@^~H(3$~NpAx$ z36x_PyIn(6zj~k=@7vC_uR2y6UqrU~nDK*Z&7Z6}>&bp$%=QA?Eb@-BXIq=@m;uds zyH`kfhj-MqVfq3`T4res(`@!WvR%9~bw#8ke%;z@F1# z*AC6&CYL+arEg4Z@?NC8K3Z*+3K5{b@yUnCHy!ai%sS7l`II~Osp>YoZtvQdm5I|< z`{b{d=^Xbl-pN2To3Ip9hiu7vpK%-_+@6(<{gabac+GiL*_h(!!xyeVX^&1rNG=JV zL);IO7oX*3KNu8E$avW*Fk+tWv`Xz?gPW(hPT%y|P3@eOd|rqV_?FAMsV-va#3%8j z%JFDJNUREGKM(tPvX6h$w!3_~klHI2>xsTNF%W(<+5jA@wJkd`RBO!6cXAFKDYt)` zzbs{}jNE~45@jGTWi&zjrN(DS6++F|?Xv3SVf7(a9mtOHgn_xYEzaRKYW1PsxWPAn zbCp9kLTCa6lMiAfxwxz8(uPJTe{WjYm*f>ph=tv>7k_xaBxbGqX5sC$-d%E+V1XVe2g6>Uj}e`dzeB zkm62^olS`}DPhd%Oz+_q!QRSq^qKIOlE=);Obs4Er$8Z!r8ZD8)y%96JXUte@2R+Q z=xV?yuA@)gb@QKu^gBSzD?gaZqXex>&O5Q3Oh(W!|2Q>FEfS#fPmZ^_ad}cU%ACHK;7?G*1D?^Gpqqi7hFl!l;R#EdA`HJO#KqtWToAkHpU)z+?tf^3a1kbxP5jORy!9!lz(Dr zU|X6>M-h?b@U(w3XtbZ9g;iM{bV4GUA>gt%^f5#(h$MX*m~{7${D$swo@oVPH~w55 z#xKbX*&BTBa-DC=t~G@R1af`7aEC%zCOf+Kdp?KkcY*X$l2)yADaytCRAbTt74HHb zmBWQj(ZP5zL=#KkCl-B^oW^cGaiue3vDUi5Dx=0_o-asNZXS#1gb0jvL^?R$_r>hc zrTTvjlA&@PvG=_?C*^M$)f8d-VQBOwB?+Fb* zmialLuIZsjlK-#!|?1c z)246sjP7!ExcEwF^zQUJkfTdpUhu%x>?cyGpFPi;aN5R~-VL*!-Q5Y#?EBCl30yZj zhWBSu>Dx5FXwUw2wzHxEkh z?elcUA(5|`i{y>=jcAZ;E{#278$Zx{EO$b;Bnb6%*e$z(@%5^At3uor$Xgb zraAcrk()8b@7)DXa+YkZfOU@tIAjk@8xj%UYFr zGnXq={f1u!HoEtDAz(X!O{m?)6J`&C**^6 z4Tm*p=d|WtbbS`vjR>+0*+*@zDt8v1wEPCj>SigSS$vu)*{GZg1KMb>WyahEOvIFjf1Vr z+87J87Qx1m(*>Y~dkMBn@iV>w z&fzxCotvyYN{OtHz7$&EGO_8s;17f@)q3(^%M(>b%Pv~F^d0O5^<<1s+}(}o3ko%z zumbseOYN}olVsm>fY&gP5qEy=spdlX0;fBx@v9b=L_>lid%cf>NTY&$72If$GPBP6 zSy>Z$SB%LRCV#F z1n7Sb98=!@B=3^;U!@Q5bEr?4hqGi_*M(>RR^=T~PRM5|fn8DFe&R4Wm*1Q=O? z)9us{8UKpmqz<$E5s$FT-LG_q&W?i#XX9@U6twoU;?T#$BT3QQN<%g1P{#Q)8u7x|^v{g!5-a#&N_Z2= z4p9xZ4c#_)2LstYx_WxiZ?b~+yJgNUvmtg}U648lZ*~$BbMFkHGA{v=2R zZ?zh1!e3#2Q?+B@MO`klts1-WD-N0(qsfO2z`tLSPAsfMI^QS6QDNb528>hudJp%X zNqkO#r2HSCn@I|<7F*%%iT)A!e|VCjO2@bLDGPenue{?hV45tV^)5p#cX8!uXY8d->CoMp(-rCK|ilN2BTIr zwD2pl2E4q8SO(xr*hT5TczwbmXGNu*(&e*&U9xUHqiuMF<`=u&4#!`g92P8&-bZ z=7$z$v}HSSn-kFWCMIDO^oSi)8Ka|icm@VAc}2^0 zDE}4$JOKv&oWM@0Q@a0@v-Rp3)hQx9%3q0dD8UDTYxVE=vKKRVeYV?rI$zY>tj~}8 zjt$`iUO`ydU;RvzwJ*mCYJ91ebo7Ku zS$wrTP0cpDug#A;IQLc(TigcQklE*57Y)}@?iON<9#k#PjwenW{VH;AJ4XUm5`ZBt z4@TRM#=7(p4`Bwi$GD^3-eA=J`SE=4YzfB0eIkd>5pQSBvw?A1H-IALzt&>%=}kpL z;_s=!6Vy%>HtM2uvZ7@BHic53`)+-wMV#Gl*?OL^Xj+LN4B|R(z02Qr#LdQE1c(VJSp$6c$ zjD8ot|6OJMHy81LZsPowKH$ASq>O_soLY}=Qiq^XJ7sBCplmLJ>G6yc>yumc^`#@= zZ-7G{SDLSi;b3mT6hWteE4)xpfs zm%J3CCKTH6tk^R7I-2!qD@%(rW$ph0isbN^}FDhI_@yjK(WIs zznvBxgRn;Ohq&4c-cbTPq@7I6oMO+3yZmOa+5!*RLxT=S%ff2O8Nn{&Lt9yU`xC7r zgX_K{+KN8JkI(-d5g*ZC5Sji-AL|-C6UkpZ1AHdVk+-XQS=c6vq!%5?Q*zu!ohTeU-gp^ z>uIi0fd_YUy2(-xg7G_l1hRtfleG47$4Q-Mj<_dJ*?p)R?1^@tt0q*;mNVcOeY|N+ zT%2RAi<$yBe|Pq>V`{jR-cl@1a7>PoJ+XJv5CR>@SS3kOd|yaHF8E66B8)%RA;z!{ z#RHAk`cUjSTvrXxmO~9cHB6jNBfMA0M!VNDz4eGDy1WRP&D{_1sCD$+*|iAXK>3q! z-9C?WKaOiC@=jp00rRdm$6ywQj=t9k%FI22NPoyUIQ91@(EO(I{-DZ#N!UL$?Qg#B zf8RuVYGwxJ3tjgN%X1lnoo`TLowNa%*#7q6RJqmoWECG%`1Yu~SW@7Bd}5$D$+9Gd zsdJ=;A`KHc@cNj#NvFK!9yQPE7Pk`S@!j`*jBCm1L*GD-e)3mVNh$T2xI-Q9)W5!z zpMo|ErhL2;v4}^kVO6tDR^wqI%e&c%C#;z|So`@gihH!jIqNe2y-#p5!e6lChb8UL zo7+dN9PKx?G)TKo|EW@g1&5gOl!^A!k`;;D?!b>=^-yp^*M zSC888Ji6pec02nSBz&fjE6ZZC(B@fTP|NSOIRL-fHr*>2LbWto*V1qLf1OK_4?|M) zh78IW!5`TmD5~aI;g8d4Y5EU-ZY}I{m~xLM!D5Lp4(d5{7=2D_)> z)=dG3FC|-*(HHChv7l(pR_E0YU*oeGeKQygro{2i9pN=jkx8i?L!*cAkQ6vdmS&W~ z3~Tjn1b(ePtVXUnye9YYYEvbHL+PYN!OIA--g*=l%;`c`9jiQ=VPaf}MDix(RuHDlc!tvys3 z2snqrx0cwf%IE>xh;qn6-3BD5M=n9xalNEXDao>}8}2znCa>Hz>=j!BCnnDpey~S3 z!DnRlVDW2mH^dBcEzKfEQ1c_*?x&u~UZH0T@ZCQ{La^Pp=o2-R+>&4N-{4_?M1e5Hg5j|I0WoZUC4`;Aa_zr}HXSIB+HLohXSy{ochp%X^R z7+DG8cHa=WIpe}7-SIIS!3dR2J!RK7W%$DSvQ4I`kvymFG$Nz#pTtmO;<7rShd3gT zZGXk0n?nsGr5>%LWfN?*}dpf5z2_eYhg4Kmaf|_G)Wqa`<|B|(dE7w z!&w76_xHL!B?`#61>N41%+qL65jSnh($&7N&#F&-O;T5)yxYp0VNhEoMAW>^>}*IR zxTwqmtee7BH2Xw6NI1y6b!71-lENvD1^A-odjiBn)CL?qV$++q^>O-{X~Nw|_1M@r zt$sw;&Hja1wOrSY`>z{Vwwa0>TN6_si5kp2X99B}r-8>QMCsdZ=|(zD@}iqO#JTv( zHT6r)4!A}W!R`o&o{CjDiq7Gm9A7@3t3T4|aa*KTP{Adc)l;B&7GV~6di{e4Nyco2 zwCiMMZvCKlUD1788E+CJ8JkpDsSK5UBla-*$$}laWb0?2qLx(nZny~MJ2&jqiqynh zl+P`w!@A0YYDlk_k+xart;!I%phJgkd;kDGk_HDrat~n}5s>;qqk3Y!-3DQhY{Qp| z5B`ATf=Fc+xf?t!*($Hlf&R{)IuBI~X`7VdgaL3G<^$Xj3}QTpqq&s@y!z588MlIiKQR{FR zzB%2e91QR5N=QDk>^$T{9Su+%#LePdWh2)_?6Q&8aX>eR^Nh&O2YO&ISomRKUZ$Sf}5a5Cp*{fYtE6+64Oa3 zzE4am(EmiPw(hAD8wGLlVCdMGTGsKDYdpsEb#DZ=3JrpNaC7|9+b?n2T_6k{hzPfz zx??#Xka^q#a|o~BFxfRR-hD#csNJjT_o%z*E`CxGC=y{qOB?)dF}IGRVOvMmrcEDW z`&e}cvnCAa^e#Tx!6(hczg@RW(qlm#b*_ld@CB?8MNrPWr{%V#5O4?A{lr(9MdoKC z>2z8-c711)GNhAz^yt+oSR}e?$`%+8ORwZky=Dl@B<*8S0>YKUritTpa8m*)%dIVF zm3UTgT%T zrmFKJHu|oTo`OlPgOlthEj1w zYHj^8Bis8hhKars8^^TPjx1Q&%<$EwSq!Fb&Qv~WP5W^<*#twCg5y0ql%}OhiEIkg zg!-v$QgD(xnTXcj(AT`4fxbJ6v@HhZ{l$uRvY4epiTIx6FhmrMe(o$%ty6Gf0O+u_#ayvW6DOKyokl;15 z+dQ)O+J%+soiyI+rq4*91*Mesiq+=Q5D-&zkneel5Qz=vxCBdAal8wR3iSD?}$g%wmg2SC{4_dAtM?J1V@bC0~91IHeYXYg8$PndnPp`vJT6%?F zKDE`!s|K~2K?;ud7&z93;k#jGL-s<>v=0wALCF~gRlO(1$xiN z)Lf5-j47Tu;FrNdcy+s^EokLwY6vi5<5!onq3&&5CmP@}lvy&rdB>(zI!3-*`l@w5 z<5&--h~3l1v;|BsF!!_EQA#XGCkIMxpv7COij39(Re)Zu>cuf?GJy-rkNeFyu|E^Z zs>qA#yQJl(M4D!u*;DC~6qU(F=VA!hso8Q^>`<*HH|$pFkmwz6XHkv(cDGo+9bh0K zA)%HT78nS3T$il;peKL3E~-2e!MAshfy;;CN=R&m)A*|zWL;PVibP6ryDkYt)u@TI zcW`NKJkUM zB%&+dS2T%H@*}5)mA6pWF%R=T&W!)47OkvWvN}>ZOe7*ib)`#L1-!%m%A0v6u?w`z zHw}$&RFCUO-BEd9Edd#c$IEi*ZHE}5<5fR(+zQYKZNUt&n3xZ{11bj)?+zX^SDJoVXRuy|LL8{+TBGOJ#+`qg!j?Nhaw6;NavlX#?(+>Mrb|ravAkj4(?$+ZcRzO|EJeHJ_GetauA741)|&)MKsb#+y`|DsDO979sqJJ zZhVgbhd;=-@y@@RNEevIK5_W_*cx9N-pHbL`)?!IH>ukD#Nr^)`FF6qWn?gu7N+U_ zTOc=dL>g5LGCcK|D*W|sWc+J zWLZPV{9N2|E?xNSJ8|mg{{C?5jAYD_mOYt{(S)BF@)Q`wh&(9sDkeo~`J7wgBNv)# zjbGx9+w;v`t!G%p7)Xsd5as8a!F{;*qi4=ZgUwU3D4tQf{or+k@Tz`%?1OE^r#3nj zPv`>L-}6rKhNW29d27kXE`EX28)SVu{n&4qTU_LYFy7kIN##P13smXt3>+eQt>SUVDZ)b#TUIG+%rp)0YG5k38K~;^&35nn ztRBwNS5*}|j62xq&IAPtyN#9FF~{{1hL$C#xboq_&IV=V+2a)iFVpx;)ql3}aoSIh zDd0?Z8$?oT>a!3rq@>h!60oy6s~7Yc2^R>~@5tiO`L!;%lspVA*Rr#Jy+X~J(`%qu za=KJJ7pw($q0wnBu`Dz0T~+{9-M<-wZf0IrOa808JDG2NVQw;k&#^=ipf2p2bMogr zJ^g#kfQSF}DE)gANEs9lex@4ABLkAYX{yFZWXghbb1oS^!tz-3QN}MH!WisCq8RSw~?T!!maZmu~O3djDyZ*^*Kwn{ZXFo@ew~*=JNTf$|W97 zjzais@1P!br`1Wru?rAzlfNDK=qV^SX0uNi@uwH?F=-dt`Z|8-*QYnL>_$aD3xXx^ z-vCbB0j3wpVhx04c&1LHmmr&yNjvk{Lcd^`9=Wl*^Sn>rG(r-Lw|Sxh-OgvUQ9B8# zJ*k1skq}3QAHS|J`8z9SqM`A`WjVr%KOn`ka(n0BU>L5k5wxAqE?mc^KJ2z3J)3ju z){~h(poGbyz5K!3#ZkE@J~Xrn)h8gH&Eb{HtEp%jy;JeiW*jfOT*ozh6+MA?(*KRTkIkIE-G{#J8L z2Gu9$EF>jRN8+wC^q}_?>{E~8Sasf43ac9%QPkH`!qQW2!z;z(hjtXOg*u;UQz3o^~YBke-t8$ z5H)^xeaZ$2A`z$pE9d9g_RO5&2btb|cbT*SJ9{c*OILESf^m3$*|RU3F)6bDe$jWh zUya*Ld>Lx}Ob>z5tCnOki4S``F0sC;g{q6L8D*N&V2O~_%UIR^#cRVz#3*-z?3|>8 zS!3_sO&}YL`Cfg6PweGk?OeM)w1~1)XD;TG@lpww6c=dt>C^6GSE$>N5{q&sI9E2v zCo7|T#>jlQ<(tQ(hX8E+Om0e2?smw$wR#JES3_^T?n(!XpPPZB=@CrAB~BwYu$9)Eaag) zw2#`~{-@a)t{q{I$u5edGP{uCaeY(*Rtiy1)3YgRUA!fx6t%t+D%b7%L$l2VY#8V$ zSFW;gt+&o2;4_|y=Ur6JN|rZd#n}DE32RQ_K`M7kuftkv^=ZlW#P=k{6#FNr@j*V8 z>hm5^J@{5MO%sGMYx&bXK?|3nr+3tz8R)CIpw1v z!FppioQpId74J~=rFqFAMv9#oLDk*2J zy^aE;S=;Z-LW7IMnRWE-$aMQC-Za_K3x>YXd;`al(M842$=c-WGYyT|h*Mh{-oECD zC5FKL@gm{RuOuB0wdRcdrn5Sfx%*Zm($EJR+;pV&p|l)6&X2dNF~7b29Jf1E zW;H)1Iity=>8vw%uVAX8$qi0Yu4VNuR(dMD-4S&%u9Syl_+~{A-@TcQ>!c^-)Nprb zlGF8)^E4~KxKO}9LDjIFdv9C4Lpgor7U%nw9_z%(l$SZ)rmuTVX50jvAWJfcWn$ht zCUhITc2#D&WsaY=%W!h2^WFE_oq}{QIx;JHyB6Y$z!cy5(dZh*C zuwb$qw-V$q)50Opb*IudpTjQoCY26s0wdSRJ3jmW)|O1L*2=NT)YGjFZNlI_LWeje z!1nQ4I_~MJ!}VQzF9tMvEq3T;ID;(V3C^PQOEk&(bk#97|Cm|E@n}5l1Xpik{b;QIo z*WeqYzDC6CK`;rOXj-Stib)-~0Gzut8G$FxukjPF5m@o3(}e=sj}usi5fKEU?NG72 zT6{38Mjp)O@hm-BF`1+4UX9BoC-bVeS|{Tw%2F3mf|$~i_M$8{vXeZ+Rr#(#!Cz-< zbh?ZGLkR~`I&tQ7I;}mk9m)P#!)%OwI+xjw(SZ@8Pi~;| z3nc_&X3mG6`MdA$d7cNZaE=0eo_e@~bl*XZ%a+lwsSHBWj-H7?#ee$ti{vR&3>Bo* zMc1;<>+Hrfl+Z0>UY3CdY7?gNps`5;>6~ zChy*#Agsq(6M6n}D?02s{iYfzInFwP4@{K~VHji`jK(r;cVOZ!@z%r1Bc^1-c)sN0 z%8ulNk0i*N^4m-#G1_v`0bh{IqX%n`ZEZ6Kp(5D)FC%~6qc6IryMdoodl983P^`$R zQ~bdMoIq<(86UH5n=W=pp_mQoiS3uMozsYlYj$>5R9l%Ar<%;gt8= zgF>^)9ZK9k?DnfA2X!iQJ3O~VA-*ZISr*`*^C&^nw zAzn;HQUwWm{LL}p(U*$`M9eE{SjCT$S%_!!OQ=cK^f2gr5@Guhk#|}3_h)EKM^TrD zBf4%iE|Ki^DHnt6bFYa+tV)shr~TT@MZPeU53A>tP*--cr2p}lEeISMJVyT5mS`u_Oi4nX)rfRHNyQ>&c`1ufscdE4L}pdZHiZyOJ5!^gNj zy^c?>G=y6QWyYgxoL z%BOhK7@;5azZ^=l_M^r%IfE0}AXSPC&3S0M_BaRv}| zge;8?b@h7n;Q(~9;H0eVBZqv8rt!kF73}Dt`O!zj&%-$qim)BLG~Hc{PE*HB_YCr9 zv^0{G)yv=BH{#Xc&P%q|QeaBa{KWleW0`cFDNZAh@L5VWg(f`8>g;<3v@G5>`BUp} z%NbM^6RIGfAFb$XJVy;dH7hi?Sg&l1xFeG81+LFSgG3K+s0d`N-v-F#$*RrrN!z?e zv^QC;)?|i?gE5E#lcX#$Tw}5Qbn~_H5O>{RXUn|;+Ayv%YrPup%O+zDWtQ(n0(vj3 z<@&6S8bUjmmj(l#6AX1cihs3BuXK>g-+hGRchC25%#g;zwvXnxb}%*2ZYB%M^m%m$ ziU5Vkzq5AP7FG?U7(DNa{R9}*%jXNMF&=vl$m zOX0&nTMwn)&^~M)Hf@h=H@@wVQ0Gn)76DiFpLCS|IeJNFZf;?EeCGY1LKCh1*4kRn zU?e5BSh_l6QOiZR+k@j3zcCYt>f9tQTY9eOHKcu(MFRK99WQ$HwcC)XmHXm2z@g@d zKycd>92Ss8Oe>zhA0PNIWu%MHK%~p0>0Br@1mI=>UZAvh_^*7`;9ZqrcaE#nPR&Q& zJN>pvE&AyfTgstSmSxw*YC`H{%9jv^y#^o|O|Vsj4`LgtmG?EtIl$sI^GY^heMu!! zGocWwq=%X{f#+M9_vYz++K%jVJTbU`$o8Ym8Q`}Gw=2_YluN1)h{hD@Xc|(e)12&{ z7k))%Vn&x)jo(>{W1670oxGMaKHD15O)0HVf19F9!MOSwwew&_?_BtbV(Hgeb(gZ? z>Kd1kfL_ml9QlU#sp8Cf8I zT3sk|=a>v5QRFMvMqC$X$!&@!O1Bo3&7b9jOd#IEMP`d$%V>f>bIBvJdmd?29||2k z?C!7T3=dE1+rhYS_DFY0gnfxg}#*d+_Yg1bGMT6y^?t4x? z&;%C|dpQRf&gJ^lOC^Mo1IJ@n8+^5O+Rk}kxfXxxFB<9oW^8b1 zEEj63*5@`GDqhxaSKAc>0AdCb?aMD?{1v&Nok-jxy-Lm}blxmn0B*a%v{jiOS8giQGeZ4Jb0AqK zN25=?h`0ItYX2v~c5a#Ow@1UXFKIE7v@k1`@F7ckd>XVy_I=RC{gnVwnYV?>l&NMMzr@Ie*>!4@%k)HsoistjRtTY8gi6?e_r?Osg2HpS z5Z5NJkxM=SG$Lu8Rpw=uPC|=pIq^6_zl|qZO0J^x@}S(JAIY`4>#v`qBu;=bNSM&XR+RU0m!uZ!j2yw>$(>C z-z86wCqMZhsEUe%RaWM@MKixaM_0Bj;2PRkXqT~E-kIaRy6iSPQSWhA+09d8OC!r{ zl9u1#{#=i?aQ6?<}^)`yj04%$luH@&Csf;q7ixAJMRXPLz$GC8IX4lEtAu}SbAMm#~& zt!Bk%9U=cg9fHtMoYG6{7RO%vqp3+CGss$t3M%^0+gTSFiBoydNog%s9QMlXrDYhV zU>xA}ETzdUpNuupGjv};iy1=U%!iTs7cL?Jb-KeJ)i(TEt%$~yuo)1!$?0>@XQ=dE z@*mJE9f3GTUYY((&evgjtA1I~(_X^U&W!fY$Et832QU!}aUx8}Eo&*w+T8Gd)6{u? zcmMZ5aV#T22|kTId9NT_232l8{VC3_-imad<7Bf+_dNWRbs5%V9}DU>R}fe|Q`4qg z8b8(M?Nn>B(2*u&!DmXcEFLJfKZZRu8`^?DQ+sy(l~pkT4i51dVJ(E`X_ZX@g9Ub8 z7JH}-LzjO%lFm==(eVCl%edtZYSgE__GYZ7-#w2z7<|~-e&WQ!gic?xNhxTU^bGUl zPq|fQV6!YxGp;tg^v=0mIp5;>;;lTI(Z%-<6fLdn+UQcYb;6%W1_3)?zra(r$ozaa zNq`_S60sM<5G`GIkZ6yHkNAmXLjbN>1xy|Bp`=r)F%wGp@DF3Wp94)uNH9s@-SE;= zU@|0T(w^ASWB+9|U8r&xG;3jy`hBV^7Ls9AxJH!}E#t)P|6+w4-`WRMhP^hu0mPBNBJY@kGKLXe4lbyQCA3z;PJoSK|@N3B4zyN%X7HYOG{<@QGCIW79w81o$sOi(4SbUj^&`t)O#FX5Wt@Yl;q=MPIgY(qTLT z80#Ae>IvN{v&Yfn%Gl={(mr*TE^^H2iU%T&)C}XnnzO)>zP)mrlBgay?8$X!>KN*j z6|0=!bfeL`;eAqy6I_b=1%eyH3L(J4ZsJv|xBJV8$= zkOz&|;ER;zg*a91Pf{gcgjJ2+hRPw$l2K#J`u*}|c83Qc6TF(Vf8ZMuc1Cczlj^>& z3Z(4xQFdIL;q>@vIN^;-n&3$#S;hzDiOa2!JXZ{T`-^{KUU^%BMb2UuBROR?n0Dr# zQ!HvCc8FN@R2%oAgjtxqB~~8kNMlTp)66o*;y?mc<%i8O&=3 zbH_sQLtvAJatJ-A;Ee`7Q8U%2s+?T*x=3jtHi)CX*=iPnG0Yb8J-s7zo-4u{x%QUWX;XB@t=MOTo$F%^m(kgKqJCierh%cx*&~9k+ ztgQlqWy)Sj6@R_Kc|QbJGtLqmUYF>dM|Ku6N+aS$4X5jz-{~z^B9U`7Rfa_W8g!`n z%5+_JXkHNQ68ls2hw)Mej|!k7r>88r7I$0d1wO*YVzc5)T660BYD(hv!R+|}tA2xJM8_S};fMO|?%rUV9;XlJ~89>e4=O%OSnTVLlr4`v>_W4Q~{H!-$Ei2ZFUSP9Ok^KHrqj z94yS#bS^0rV91h`*1db+cJw$YU+&RAU|1FKp}QUd1&rD=(r1?0Z@N4F?lGS+ba7+QqC+a|Plj2D=^V0JXKIBj}dI321_eUTI zpPIE5vB@Z3uD7b`xMrnaC(4E1ul7k%v!h=frTJ<&sF*%^Vpqh~;;D8%0o{+r^j)13 z^a~1KvK!r)F^NTl1(mZ3U}{1V1e834B!p2NWu3-zXd)yM7AshG_{@ zC?;P|r~ItqS7saT?}<~2ffYf6V5(?=9K}811T&YpJ#l*?%%qcV{jP3B-}yu6R>XDs z%&pA$ifrE}loapNGPwF{Y<(k(zX~0U1Sco4*{?1`n?^N+@PM$)Lz8%GH^->{SHxA8 zYc{Xux%Clm#~w8&uxUHm>f;oC2*cU&3q|l-IxviP@LG^+IO+pDZ95~lu>`SwSPb2cZ;J;@G2^Bp#LeLg3Dw!FXlfu zIqq)Ce8EF*zCvw_iI!m8JKM#RtTyzn4^=1Nua2l+IXLqpbxn`(kBTvv$lhTzThXg7 zh??P(<GJPEyQ^h{aaMH?L z4I>sCJLp*AU;E$`TZl#CssF47VXpc!P#@&^R}m_GI;&ZtMZBWi<8>I=`qdO&>x}$J zw!Pt1VC$obVJ&b@V|qA@`K4Hq6-PLX<9-2bzv;+dm5#YPSa7UHB_;Khj1p9m^{`=C z`ZUxz8+vb}*n-Sj%cS>czQ4xAa;13U=!`z^qq zLj!J{X#S7h4S%Qe7!-XE_9YkR50dJ#y9KJJMpu~rb0k8y2!WuL|H0!BvlE1X$t@7) zzrPa_kl3fv*s$z#{0n;#BNT)0u#bL<>HzZK-8UaB&EvvwfM({W)@uJxTR4?NvNwjG?Pr-d%E&t?Al5>OT4GkCIC-Sh{v* zg-<5R$@7+*uGXR~mH0+j*%!H!m~+ywSu!{{f#B@?1JW79ec#Hzyq(TiJo4`C$251= zyjxV-bwvz3e8Xg|8T+k1kOz|)xq4Doog~#Xc%KJ|)of81&XN)fN@Z{}Ss$SM;tz*y z3`1AD6E<(z+E}jf%OS|e?}1)n+(=|tV#X7=qOJcMT>MXTtt}oU#FWS)kbxbNAS%IV z7K2Wr*WLvd7zlkBgtW7LIm6@Kkeo~B9D{41X?*S`XQs`AQK1^tCxMM9ZoLTeUqWE_%ZQz>cAoCc z-{bd4Sfm(p-KE0(QQk5vB6W4?u~Ao@F)D?T;XL0sW8JqzhyHTIPSqogQWUtfEN$Fg zrcIf6Em&t=RLhJwF$zUXx>JcAlgM^|!p1KhaYMZ3FEO5al(;~cXAN3T$Wn5}XsPAv znvx2kBq-IC4R12f|8JFbvgF03W zB;C`6qY*u4W#Lh#z|jxRauE;n&!XRTO3@W?Ja*&!dp76O8Wv!$jDqa$?{ z4>8R?*{%$`SR{tF&m7W={Uayjt*PZaN;Ikck^+|I{VAjr zIv&Mx2(rd}NnOOpisorWDM>9%)ysL)vt9sSuM09)Ol|r!C>Ub8|ep;utpnOwJT{215k44t(^$#ca8NF|?H5s~%p4!QIQpNysjZt2_aj5nS zE-S07O8f1lKalcISoj~1s{hK}{6F>Lv~oD>c=pp$?_rVTiP&^55 zV_=%;XI4E$EJ(w_m&vZ@ic)DNw|chyQZsePFi?b#e8n{O9DJHd3^|xM`3;l}Ni(In2Pvb2Exo-<98Wl09kv zWXz@>h%Hh4HP)F6J%>k@Uio-1o{n6ln83^Fe}C_+bMmyCP~h5^zNPZ!FHIh$OUf;W zUNX!xMn5$0xiSiMEPf_uIx77aaY-7$Fyc$PLPo+CKT0x(ViVU4{gsS7Me*hNIq-jVTAazAnoh0S{&Dnjb1bGS)vHuUy_T&iI> zexyqZpqErPokc5+CX6a2hxag* zL6l-KRJz7Ik9!KfH&!=qkMvB~eMdN+pazfFnz0W@MV`Ms4Pz6zC_OnGXsP!+J^1p) z_Zc_Ibp}>T+B7O4o6`M0I+o5iL6+bRn=dq?Z!M1Bp_6CYuJP4;`G|ND;X3aoQ+iiC zD_W;0X6c#j>%L?6koQ>exBVkyk8ZfE`}hEW){;b(TIi&Y@m zE;=07Yky^M?T*BR-E1?L=UNy`j-&xTMf8a5SC-NHQlzn6Le*e_(r$2nR;H$Dbz<(f zbsrn`{W_oXIulFAc{zq<>SbQ}lr3q4?-x6+?Q*v?ClQVXv>;IC{Wln8&`?-g9arq& zKH*WTW0zE}M;Qxv9g^&X7rv#28IpdTfS0KgH!8JfT9wF5O%V+1cgr?&bFf2#O;Uc4 z;jV5u)BT-Bi@=!Cd8cyvucg!U5+g6KwSHjqKbK*2>I;N2+#3SH+!YpK+xa`W3htI{~lvcR25v-B^ zc5$0;^5=+|O=y^0yuQ|2#^j#fLm%{x%4o zfp*%2Zb2pHMO(+`MP0JrMu|+a4KQ{yw~91N&UI ze@XJYV-z?56yqk87c0I`3I49cf4IH(l^97|2Fd+?dj?;2>W#NrAw7?*BYa~kr0E&4 z3s*lxZg{x9`Jv5=W9nM5gl+y*2;_t{78+ri_wK2EyTJ)eCh}8t_Z&~S%T~Z!ERafX zbZl6Hue|C`MY+Ah79GM6!h#CL(o&-{Fd<0>Hq39U9!c!%5a|ee%}-R&twdiI$2sB^ z8)tfZf;xui`*vF0`Rw}%VczdPOXGVJ7k4CtG7NC>3|brxOEzQ5;RaV$>(hPD6(x8? zHW0L7d4VqES>G@S$Ocn6x)&5e?{rn<+^U+Q+(I@|nokpKp%ukr3uNf$dvXM~5#EQ} zv#}rup>k4C)D~$g_m5}PeqocDXxn5AA$)f=l?v=@ZSC=m&5O;{>{at8_Y>ndU$OD^ z57SSaINxj)-`}mmiuKM|e{oDAghB?_x64~xk6uC|#z(~6@_1Jma~t*Ra4kmPhZx}? z@6|2)V?w*`lH*Av^c1#!$oAF9)6I+VAZft8yvqcQ&N4X8`Jf_{-IvVV((m)eEznEs z7jmOq-t>GB`ZuSCm+A8ZY|usp^#OA)p^T$rXyZ@SwbQ824WGfD?w3o-`~$8&qf-~g z<|pVr&3l*KxVohe_VS*de^uV;8qn*w2TQ#LV6NbXEdb|$ObPhuJC>ytq>LgIs-TnBQ*0nL# za`b3i-`;kz0!X|aL!}D>MZX|-U#F^UREsX$1aRAf5>XZOWm;{r0zQ;K3RwIafE5xN!x{9#a_0q#S_lwUS^J`% z3ef9*l(_x^(WvpI8eN8o(jLk7(dss)_;AhMGzJM~_wXA$dGPVUBj^2mx$NL>%dLc= z`^)ZaP{F9sUlrY4&muQe_6j$FQtbF8_?beCTBT_MZ#{u3>D`%p=H$YjA8-aHzbPr2 zRbv(6ogZ(<`3HQm2T!tO6Q+jIa(}=jcAg=v#`Gw>h;n=QRXk>`Fl>pn_JT}u6ldsj zHRd*SL3URmJx=G`Ck1Hy*?$i9;Fm{Vu6g+5I)W|g{mTvRLGk; zV)&Oql{Xf#Pe@gViP7IMO%(8blk#``!q=&b>Rl#q=rMiJi0}H%E|mlEUQdD4<$hjI z+?I?0ani0NEAeOP{$)e<)NW@Br7;UTJhX`{viH~maX8eK9L5Z8Ovy8RE@pu;zP23q z&Hd=mv83QRaLG<3ObT4j)ciZn5YgPeO!$Os(lLaGIFpRZLMfDaCJT^gJRHj1fEC(4c`9Kg?O> zov;Y9j(_DkgTQbCD+{KnM+%uha6CZUzrKK-#Xp8S62#-P7&A=^%yNvm-lMB+%`@eN zltOrI85~ZJNzzW^EnO%3>s~DBRmA1gibij@kxK`{-s*3uI=@Z?Kf^yojJH#;Zb@`w ztUQjDB}E0U8-S_G@|)YcxzZfesJN=o%bF;uh>Xi4Yr|})_p94a{c{~9hTkc2O%rbi zgy(<*xp@l;_DZ9}-uBSv7%06;$oY|N*CwTH(^kd~*8>Anrpi!F!pVTA7TA6j4w_O? zn&pdlIO?mTp#SEk#tGwqjc3grwr|7Q}M z`cJrVA0*ni%w!n+4VGuUTOIANM(&q zo4oy_I_@h$YTtBtgUt|d?Cb2Gbk{wOB8lvvjlsA+`efhOgJ=)1%IZ|ECpbhG$u!z! ziWQ|wBtg0>SVM%z7g1+pv+KlAkb^&gKJ!$wHvqt0;>ipLZNB-FZ=@~V@}2y$8e4&$ z3&V1wR*$9Fk{xmTPQOV@tMEwf!mypAR%xeAD`HE$3q;vsxa!69ism?G6r_oq1%ax| zJqfp^^Dg%ZoY|}Q`yYE6cPlrpNV=I+eFzldnxOe+T~PDf)KU1lOhH5;)-Qi?;!x&L z!DZwN{2xOf_5cPQOD#@=5y-m%IaL^5XVz>6^yod1;@_%ScER&2kF;#Whuvtw$&hKB z{_2?7XH*gSLC@5!OsP<}eJO<=ncW8Y;un5FJ|@qGtCqhW`lw&}GxPez*xZRY-hSE8 zQ4rnjY;g2b*(k}6AkfQau^EL};kN%BDyIOD`t{!_=-)`g^^IseT2yj{;P;WbmJ8d{ zDVFP7;XnnvN*LZa+5tdvfE!Yn)KpiLC}!pd&IymMi&_FKHag{_1H5c__H9*drgzu$ z11?It417h`_;_oo2YTA+^IN6}g_#XkyA6EtCG?$amq>8KZ%Qgn`uZTF;08I2Yck`2 zcGL4gV4Di0@ciJI=l8;_{f;Dx_C>nJHE!Ru_jYx@5HL>mKKiW8c=~-hUU3BAMSmqj z7$gnI0qO>NqJ1+EFrMssyy(SeZQl9NA9_Lfog5y=HkSQj^r{m;ou<}^l=xJK9dN(^~5os!i(f62&msQ>Rqs}OjvY$JN$(GCx16Q>x+XEI6Wl>%-L>w;^4r@QO30VUv z+9x0HATEx!TOQ63eI7`^5V@4o_c_AjQ9K+~XD>5swl;M0!J5%*nQyx%WC$I(rHuDqW_%N6xoE zqIO-3CU1A{IA4bS@WZ}cUOis(b1*?!K*_6^jo;HNK*VcgZI^9@*?%ztnQLDBWcWK= zef$UqvZ)@@;gIiWhAm~_^D24GvWITPzyHX*%5mrHdbdM9#H#sxkP!*Azn8~JJPelt z)*g5Bg(MZ+dHb`%j}dGLt>|VAayA=WOg}D^V9MaF!Rt8VIp^@@O+{>M%bAEv)5X-B zHHAFvtAEisSe@asWomOXpVOf=7l~tOj+%l0xx0m|@Ds244fNPFjQMQ1wlEjl_L=aE zU%utXP~!5FlnWW!EU;c$R`XQ4{P99-hTNjSKv9Vq&vvCIMN4T+Han42=DnTyCTqMO zuCi#mE^@a)AP(A`;CI5D^bc^fr0LR}FV2oW&F;*pE2|y|q-Z?Y+hCE?%oyHRO*Z$o zj~RSbmh=-Dk`kM6?-e~N`$bhl<}V(cV@oLm`ay<+7f#b-szf+_aEihggIptxzuoDG zKZ8}t6s{)TJQpSCUpGrXUpOu(|NWHMLAG=mIet|qzl%0PhPd!7CjI;@*B~qwF)mfG zYwdD38f5!fXG6-M`Y=}VjdI#>&XXRCABRSLZr?6fm7Y3RCXF-dC`|iex^m$4Hc1+w zvQaHl zrZNVpV&;s(1Vd9=Ns>9>v@#`a2-^y+mw4N86nt|iisRsD8z>Q9E<S{qE0ice3d69J#+LscGT)!j)#sWhCj=A>nJ94W%ToTX z_1%(|l53bUBWCbPaKotO=7=_J7N7TwVDoz=qm$I_Cd>Jzi&?z%9<5O+*?N4lu=yrS zm<(Z6v^1+66H4v(7~a^43og8|MJ&|6Ivc!*o+6yPJaJuIV$?-3VQY8&cuf19)nRip z^%Q%dyyVXiiDq!42P^lR(@4X;)uWl8B4-Aqr`Td)>z;>vUKpI}91#ucIjU6)F!9Zo zoZJoB+&Z>c&YMfx%noIM{3U2g&OV!iujRm_9@A%IP`YuphyS7kE}vfuH-d`{^CoTRfav7Ae+!UU(pYF#i_zPU zegDazF1BLweyv`cp+4KiN_|A*ga`AtRFRbEL?Xf`aRcdc zl=4utF*sj4$5q3QuH4?mnY)gwRTZVFTV{ETQisfb`9>WguC9@G3*;*fkV1UyeX;Mo zd53PNFbHjC|1lvMQGm!ajb+4BLBOXVe#=s~`&4o-#+`{cLRaH+afofxI-^)RJobrm zKmpp(aPnl$$+|2DGBQp}g*e2f)P*qdXk7u<$>mup5+SL3^x7bMgO3`K9553p@12_# z+ox!y5@MScOG@Y2il|zs&VV$}7d9l4uMxgc)^nQdS&z^vsqhecgbt>#fZ zSdI)xEoUrA%$7A}l^G}W5DtyJ2c%G94Q>!^eL&HB?*~>8@~OE;jt$a-D7(OTtp@xw zH2zbcpn=klTS>)*n{_hTShdAfs^x?0yfnPpY8ztmZ88S@T^7!F@qUaKFv*yE3YTPm zbz?2FmI)4>q|f=ip;b%JIj*TuxbB|=7w#Wbfw_IMD$i4L{`lgf?IB~1TnaPoq7{T! zM>(%wHe8^aij-Ko-M*#>qfV`Ze9mvu+F+ z1o-*u)WGoB{th2Uc~f4{Mj!`lMlV5BTqsXUc-EGIN|8XkUabek30t*J7WTM_bz#Ub z0M#54IUhdzu5$ADtUM_UVYf`XFE1pgwNYG5N!*ZV^?aY1EJuL&@ux@e?I|Xt-0|P6 z6$qST9!?MCy$G;S6#B)ltb!IvP;F~O+BDCliEahJ#Vi0GXcC@-JZIDsqqiU!{Oie` zwJ%Wo%?|W*soK^Wip}-eIq;$*^qR5{@`{~?ArIZ1`WjwCUgNToQ)Ed-svBC!R9mBK z6~l|Hh4?4=x)CH}>@3tnL_vg=ie&l)+|k%cg(ddo4G;U8cOwRI`bYEiN86Li6L}7K zfwzU{Z5;&u06s3|na?mkgD?(lR#Izv>$enNZo*VtRVzK0 zPoR(Qr^kWO-(zV~Ag&F0G~>_KsBOR=fLWlSA<#mb_dZ#7gzVJ7)V_MRJrw&*Mo)oM z5-g99<{Ec0+|Ha%}hsD)&`+`JCLV(~d!JXi)!QBbcKnU*ExC96xcyM>?MuS5K zO9<}J&^W=NvET%q9eKa+%(-V~?wq;zdFCIUX763KcU3Ldkh1>76Ic=EsX`#Uw#+bPjH z&Gg1$lpsLGU`3!uv zm?K?zn)UIin$2H96I`3mM&?-9D{df{5Td- zzIt}_ed(f7bC~_(|YDy|W-qt8sm34Y$*3yGZ%n z{9onesRK5n0ywhnE9urcX}T30&xT}4oaNd1T%-)>^eovd;=$pEzs&(G$)VS>r;YN= z8jtkv^nMpXGJ&6g|MmY1|9mzzr*Ei!n&z+W_apXvRb9r53Zs+C;-s9#$!rK}rmQvc zjp-i)6I<~Q-?%L}VsT+_P1zCRnQo+>7TI-D(BcBH705pPM_^xcMZ?%y+p?DvlgKki zs``6BO>v>;C+@VijHc|I%j92Ko7cjLw3YidZ8;)c%o)6`oG%ayT6kqE>$6ee`W>$d zc0awoU$;a_hqNi~EKk%lpRLcSBk51X5|t^uCpi4xrD&4E%*WAw zxIei?-$%wEdpT@{tV395iVm3^QXf$i2tERG#;)N1do*9^Nf-@Bi=qRA*6=XMeVT%+ zW6Dbz5O>fsZ@?{9aOvCrB02MQR*=daDPx*yIaw7Se4=zAcrzo1yOR`%NryR`uH5Rl zPsqB^wt=D%62ua&4o9Tbj!FAKeiE8W;*|Q}o_srv?vS;n$J(G3pMO75Ffsh&i+2aZ z?8K?4y)L(BwGRChNg|aPFEae}op(QTWOU8LUv`@?;1T?-(7yS0Kq}P_y!;$SJk8cb z?Pa3(3ES+AJ&EAS8F$(J!I`;vND`C{yzFeNy!c*#1xJCRlhq6Dmt~5 z@p#@V`?XfhnWy`PEt1!|>O)%E&wZc2GIHo-cwN%;X-jpcx!JT-UvUh=Jm&HC@YYSm zn1H15yk-M~p+gp4M{Rb0gEx)?C|D|R(j5&8`VyiX%AY;SfN0QIjUfh;8SsriQW?+0 zV9!wK2MlSHNaMceDY0V7)qt9Fc?tj=ZUEr$@#!U&;e*i2=>@G$Oq-t0m^(P3 zLt=W?TvzI@sjq*mjCVa}1rJ%~uO_Kqm-yM9An&nt$D{duskY&WcQ!fUzW$yN_a2u(egx(=t8RgJ{V0aH%LG0Fh{3>R8Q&Kq{HnWVrOCI?mMr{}G5Rm6 zz<6yU*rhVWqJw3nFXHetpv}|}uclEYylBS+zSU>ld^%-9GUz0^WCc z>J~fD$flWMJii;SJG`!e*D5=3wNM71lq71V2rIz|y!#01@t}^cw=@--w+|2#J5S(I zEt3xjs!vv~4I;zA8EWjTII#6rOI#Ku1sIS18_p`l`A)I!XJ`6@$?EJnyXuMZufQ}AX z?T$EH>sz_pu@`t{tU{!M>9%JTlooXqHAMFO3473&CY_?07`!U>p6YzIL)E>{BF%0C zCC|5JNy_H?1>||BgZKjVU3tkr??(d_+{5MTPm?w)?4S`s)fcBMW7N;cI^ayX^~~N+ zOJ1_?jeHQmemvy7!!~=M@7W%VL7_N@rUL2sRu$o1U1E2-ybe-M=#Akts(bANqy$-$ zc(YV`dUNMN{#$hfookM=5*3iL0Uvvog7z6WWM*JU+0EKd~p$1$+5<@Aj&wuCpJ0r>7xYq&0#!r$bP^vP2}4UDjs$()c zkA;YfoRVeixo%EYqcONd2KzT0bR5;Houxq4LJ*Q6Ldn^oEIGg8H!nymiTyxA=d4P& zrvg9(9!0IOhINzy_q*`m%ha-1w%G`)vn~4wUJc_tPxhdh&I1uMLEd4%ned@3Hbk&v z$b*u2Z&C=xhSb^3my1S4I_AQA^0EU(9pqCG<2v}(^_Y2!kCxn8pj42f6MW*${lW)6 zZO@kCqrM~}ub;S7ka1zzall-(`4)x^v-3$48 zMHx!L_mbF&YNgS8Aycfh3~+~P<0qw+;Hq$bUolZ+cp~(?<>R~fs5zY`GAnX}WGB+j z0DqL9#X0J_EG|KnB7!b!Akgz4dx^36b;n|67}+{oc>5SnQ%E1ASXADyH_wTTH5E$g z#gpe3xsgv0d8v_LR(K3aEca*85SA=i2$?lji=CJ|!=XcMQq5hiG8YCd!F(_N#=ARAd=ayBm z`>B3R(j|`vB=m$ky4SZ*3UDM$BLcbO1uq@d)^3KZDs}3>r5QB_%avg39sb}T$<~aQ zT6X*jer;n-0h*RbNQAeKc?$1G`v`g6_p*C)$gxwu7F}!Cfd!n(EwiU*gR}nI7$<&> zULny9d+8q9#j4HqO3B4UV656+8`fy$B#FiupP=!1#D3&c%qsh(&EhsJ{J&WBK_u*n zyoW66gZt6@W8z8jmcQ2LmjV5SKME$!K`EL-8);Jh3cs6gs0^cPjz60QPdBKvO$;>miLr;@d>XwV!&)m#xBkJN z0%Y1^PICuJ%K6v~uovOhUC4&`*an|oO99Qm!3^ zX&_rGCNme(uVS!R5UeDuA~tOYm?u!5s~;HE=U<+swXT=<6h zij4XeFWuDF&C`YrW!8vl*`QpqM`I``fDh-Fv*SWW1WkN^f$7ty@7?#GT@>HA)X`bP z%`G92&LFPTm0C_zCguwte~H6#NW>!~g`KWb!nj5;^_?%%M~#pO)5j-s?6UB}ns~S2 zCkpp%WZ82CDGd~RECjQHpE*p#NQ6Hua{f_Q0YZ&d(Dxp5&|*mj^YOLK%Re8-c%p`1 zsb2^7dVty4I^k;dte#9=6^-g;3AW&~+7Di<@3bi0$cW9;W>sgG(F?FX3Whf@%3|8- z0x|Tsp6bIv95Ij8(pgGBxpUxf8CFR@jwhoHd~`$(YnBe>8Tc9MHEES#b(gHyc5@TH?O0%GD%9XFK*6zdpRqTYqGw)C~pY&4WMG5%jgHSy=Qw zAPqhW{lS)-G2{4gfNuyT9Pcjyy)*@4v3^}3|KEPWWNxI|MP)}Qs(tG9O35G&6Uj#9 zWydl&;C%6RE#$FlJ*M1aLh8SEBL%jrIXiM}SU#rHzr^P*m{q`c(sMXAsygk}vJrJk z8h(kL2&YK@w-%z_z0v8+w(q3!8}ExsGAgP10uyU1qPkHZvKc!dn3FaJ2~x-p`y)*& zv+(PltCS($GKqzCctiYE&O2*!%DN<+(!4{&B_QKuAElN&m+8@WgH5{++O%3J@frNC zq(JdQMlEl!Gt+7Ay;XWfaUA;1P%i?8QG(O1aAJ{iUkh&Dwz78Zha|1vOA$QaK~lEM zwEd)4l9_PClzun_Ez60XotfB<&m^t2k$L=HE6X2iX|5=K>CHBcv07zOF4bP=+*EwB zcc1U8lf|%TSaf{V!EQwC5A(Wr{@HHj)vM(pYi3D^_%EZ8_x$zL>>7y-3%KxnVNXQ! zl4z6QWra&}UP)5&SC zjK~L4A$sW6lsQ;gU5J-Kek@d!tW-L+L^3?dYM5Iyf4dY>@ln9K+Xy6N#p=rEA;f8<^i9b+ikEANEPIP5ziNXpkXOOIyZ>$`f9WhE>JCHt_jSI244oW9Yjv0 zc?7d(<7jfd9!)n5#O~g&tEj&-td5|0GVO5ek-gobpe$!3%4ka%mhp@P_wIp2fZRZ0 z9b_AY@r|H5qI-W|i>ibwBaR2u(^(Th+k#ct z8(6F8Yo|5W?R)g=%<}h1jPd6r8ID}O* z{F>w2DX;ZP{cdx?s-3c)w@)0K1I~CL?)I)VsFVc_{PTshvZZC5(YC@2YNC1D{+Law zYF9=v!7@Uq>s-627Oo6xTq&S2+*H$b8V`dB-V{`RDgoTFyHnmB1$X*YkW&d0q|w~$ zy7Cp|laKA)ZK!`LgbliCGYP6Kp>ZS+xbbvDWLi3>Tda!SbWda8EWRm?S90(;&J`1N zmQzwTgoB+WGrQYKaY;fVV3Qf-O)heFoiyX5_*~CS(q}M)8hXs36;Rmco;sWuU@aAd-;luJJ*n@B;_h8N7v01RYjU|j&-agTjXS!N`=CMe zl=!iq_}&Z_)tmWTwB*I;hV@B)Vo5!A`QyZt`Cedu=7{<85qIVzJlDcDe7d?s)m40WCoisqW3R($crmZd33?V-; zrieK~b_6-QQ&zX#V41VdyiAQ&S0)1sq(H^Se^gLW`+hP?ziYf*t?1g4k7@6F5O8H# zErkE@RyY@_T_v%l*=`H^Iy&qSWjH#jI^9n_&pv+3)nSpUunkdsba3)QR^=(KNlRZp z138zhXhA^2&&f6?m7JXk)yDM9BBC(?cler}D}Z`+k2!I{&KNu$6ALg->?Yr3(V=_O z;=Ut*+>C1ayd_X(E$AjOhEIS2<+s2JxVIYY#P9Mm;R!$B$zs#Xk+K?kvB1Qnb*05C zbbxU%ae;S`=@xc&j}hff2#YMpM=Z)v(0b}_ZV5M)sp&U@b zo?h*F&wu28*WG&ri^fJ=5p5+IIvm@WvSM*}QMv?yU^Es@AGdQQeF+1>O-DkB1FGK? z*kuPq5}=susF|q~5UK(w>3_453xi1lNuqxXBp_-92-F+>2eSYYsuHrDteEsPJXIOU zt%7=2kygE$)N3nwFkq`nv9!ZmX9kyMKZX_kf5uIr z;G+N82Kl9UrXygR_q!_XwlA;0{yLWC8l4T;6N>beN#Bf8rXZR}V!n~l1(_Ukq; zSZ0?OrQ0TFXmr-rQTMXQ*_d&TqMRiW{Rv(S+Oe+R{i(-S-h1P}4ikEI^^b5O?`-ynRfzxdp4 zvx5~nWvb(bk{czE5nz9tB~r_?^@moVQMvbDiAAq5c-fcg48BQ$+%?@-5)!a9x69RK zXbwBX-|}V-wSJjE6_8!}0JDPPmwq;j7w8*lIU?yB)2X7|*!j|b#DI$qM1W<4p#=;V z+T5E6;4y4|U^d_{kIvsI7#L~{_qvM*&4s^g7npefA7RZT{NQ|NH>#MJ0z=6+g=^XRzU@ zgu7zT z#A&0djyvC`c)pHX7BVbaDsi^IhlWJMhzw=#-^gk0yMA&MSEyZKZ(FG2ZW$HdQ~jB0ZmUfG3GKkfedOl5y1h&t!BEASuX|z2*@B_tUfcY5 zz0;bRH1O#V;#g)P+-e%P{Tp!;dDmmkJK7`9C8&lVwkCP7uA-zdR_Ic$1`$UcKG>yN zUBs53_OWEtD(1A7qTW1hI`5+2=H@pdl6Cwnt4)*Kv(l-_PaobqGjsA=L$OiZ&6D8N z3M0RpnV&;;tg>CX^Fn200aAIOWR{&LR*6hCnU2fX<)J z{P`6t=$QQ$g86Ly5e)QQg*aE^d+&*#*)oR1+%7pNc(Fs_dQZfGz^GsQ-oKQY!iK}e zmq}w<8I>)p7L;|fAKz{EjejKKR=q^vc(jrdKsNQ*X3d@ms45iz+uloxEy=~B<6Fg__bj|*x(rjOKLU~^t|m1iNh41`Hzw%-UpcXt?A8L4IfSH z^OmA5#yRZ6XJB$vR{Dxc#G@^&t3{~F4+zClirKAo>?r`;Ay=wPxCkq zmdA{>uZz^mpgeW=`2 z6MmAYqGsu?cc3-J-IVwZvP~i+D+`*7v_3`NmRN5f@mpQ8?!J_N`wGxixzubS1=kY0 zk&%%jDyW4$YyHXQviNuTRprMK8=jmjC;}bbbrl?_(je2oW=epV$ebBzb}?;G>4(NT z9pQMbCWM+DaXo}U13+7>0%6+f&%kR$fEL;Op!nQ6Kuw5^eyFcc;a4FQHK%H~^3raD zowYq-|IHbYfi|c{oGWzB;l`Ws8H|Z}#U-w$wYpkyK>d>qc~M=9AIK65^qJY#BSK^y z*c~~%_g7&5^UY?&;LO<;yCKyqD=W{WxC<$8aY?m{o?k~_i0gWpXVjQmpYKjpi6u#v zeTzzju(rSkJ^FA(L7y+1fsS^Q(^?JsNk79zbVZBFbT!iaq}FqyvO!0i-N$|HYhPct z)f9sMLRQQLdpU7O9bY(05cw6!A95Te6M{W16?eSL4H zue+qAC%M8vU6)nB2+vFZp7wX-*m_M{fm~D^wj!C)E&SqS`Av+Y&Pjr;wzFl4|4Fx% zayZP!qpijH=ISI=yDuEpvjNtf2v1wkbuiFt%Be2V7jnlt3B(M=oZ#&1um<%-ZIq1= zc~NO@0O9oi!!#Cu*pj33sMx`HCOZ~gS@Dqfv< zf(uKe>3K`*L8)o*UcyEz;dXk(Gfleq@=KULvWRWYSp(aeEA8mp{>A)B%u&UhUmB@w z2poeUJlyC@cm#~_kh{M;Po1Ecm0g1)e${FR((f*}H83%b#3pX~p_=vGACPD#w->Wa z4mEid5vaEy-AZ5I>6M)dvr?PU2c5gtLp-V9%6oXWgfM|XQ;L7&+h3CGUi;>?F-NgA zpbo0ZkqOn?fQS0lY}c71HT_@S%WOEtgKTR7f!8HAyd_WA)RP5Mq5ZmO8(N|_DMRvP z;M8ROCeCu-PTLK)#~;1~z$bPX7fk0eH*_!JhWolpvo9vF$$ZoxT6&8kKfbB1|41yD z45$J8=e9p%U_FEDy4vjH$vNw4@$PVKk${`8iNkEA70dlqm8_*26Y!Fa@fk*XQREne zGm|D5KLDVxl5UC(Qlsz>5wH)NbrmJVAdLb*^Zf)4N&FUdbOhAJ63J-w54 zY>o+$N2EsCx3(&s|JC48)pfT3G5t&2_F(>lwW1qw<4#fQf^jVWeGeP_04O~I$j0Aq zXnlULi$q?KCg9fgS8v|S3Oq`nl3o@z$@m+d@P~^5QJeD$ARS9D}dr&Ayh@t1=c@`xHrzMMFyM+iUZgnD-dD1`XnCC)~|}pdhu`_RCVYp0n?C zM>Fc$+$I&$UMUg7wk!}v7UT0CSBBYWF6YD}Y zZ-K3k&&^})!9z9~9#-wb`uzf&ba*i5j~{-|BhwzFbfZUcnCDgxTi|=4G273hoGGGl z07Lr$gKy7dkpcy_=i|DbKW2THSEbkoDFqCuA;+a0=4UCR1L}wzGHkt(ASTYSsXLn7 zF4g?|J5CV$^JC%*RrTad`Q0Chjhod#RACj7<+F6b!F8g(7lSI9xz&xt99tClQZfUW zB+uMwWq%u6fRidOy6yv!wXY|j)Zfy$C?l8yd)u&u$n=vQ-c{^8eaVfaqR1*k2S`ES z%Nsa&F`#t2%|C)F&H!<_eKYG9NAhUrn%m{%TTPskxkhL8%{Ct-Wcxbv^ssaWrtE4~ zS3i8Jxg|GSg1Xzd(dsq3pR)c#ZJ(x_FLGA(xWvJ5w|wNe-WX(C)?g^EMKM&C_ozNQ zXHw>UXwpHPAo7WDqm8Fj`PaR%;L;hZ>3ldnGm`4mh}Y7y&?nQ< zvGt)cwBdOg6SSW{xZ>(lpCi}~s+6A2b`W1Zl z%WV70KL0lt0K*Of-9}U{-Y@JbR7@7VIe#-90R*2V`~&GpU9f)1BiFM%5KaP}pC7W< z47gqUpKfz;a#C$Lso5B|`s%p@r#NwG|GpD7)bQOetO5l6gMP_}aMHid-r$#PzlCM9 z6etvd*xSRNB>(}L3s2C|C$tl{F^v<2$FF`&m?tDj@dB_Ted07l5m3qK=;-USBsJW` zL;!L@QCs~_pRs}sF3&a=uw3f14A9dQ2oRygtjspnZYj(4*VEQcjONu^Xvmae)eF9?ER*;6|@-knAHQ~>3E*0BMiFN&uj+6cpW(wPa3QgT6MRzz} zgLJLQT1G&*as2>yzKQlVAai3&>7(kT^Wnby$s# zUdm+6O{`C>Bcju?!&li{zM$Rr&2c@`)vU}{C#u7DK4!iyv46cZcjbatHkuTxpNgX! zu#8c}WB;-KoqD8yAyt(=2=h(Qc2MosW;91v4XnJGWg0q`-^iCRKlZBTGL<*A>cN3#Fl}=&O@M1{XNiWQIc0}lJbjafHD6^o&dtH>7FD!#HiX8L&7*s`wlThZKIzy zwA71nnzj~J>!fs8Hkx&Q#v)6#=M>_Dy7>b2s%iLM9dzp*15&LA%P0@9&KCV8b&e!3q0w2g5!!F@|GIcIuZKFuJf~vgxWX2$kr}}4!OPC~$3{J;s0-R&4kC~AQ`te9-S)FDQ zqF(+d_kYU#)?vTGt5DRAf1OuqC;4ssq5V2m^fnLmUnc1P+Y7+=wVwlrlYT+6|G)ii zZ5nAFbE0hOg>XjVbBvo`zVF;M?Q%lKD3@~CGYhc3SEsdjyi6Jj6pUhng-$ppH(YQdTo6UWk2g5fv?LGNd(VpCXrbG`MOUf&0zDPy=kTq~FM z2Wu7D*&oTqNq?&VqVWT3V$>!~eu{psEa`nY?zTR3#^$7=m!3WLc~TBLxdQKt6eHay{N9IFx1M}&H7?x{NaY}>J&Ib) z2&ATedJrfe5LxW%YVz!%x{@1Z&cO>R>Qxl=1WK+Tstl{QU!HnByCdzNuVfNuLim_6 zmV1Qhg{1KHb=k?!orzKpk2n=~`p@zHZ6)%PMwe#`r9N$XKJ@CdY7?JiOHRJ#@3s|R z8wO~g%d(S>&Tc6IQ3w;7A1^qIVe({bGgDue58b(fuy?Z_wmjApb+PqYR@NT3ZfowA zaHLR`Nzzs-yf`e8Qa%gYwTa32F$ZSVn25>h@EDw>T{8<0z4X@DnUbv0s;J&Hq3Q;k8LxQJ-^d4{~)(3}4k&w|#E|zu-jae`|TgB09 zIGvj?E9?+qYP!YdMT}$PjgeEvd$o|&NuL*^ z%;nLF%^fBrVn!`=`Jky*#$PQg-LCU8OHA00exyM|>X?|IVH=KX3Z@jO@i17u@cMw= zcR|U1b=mALe73bTr8#Ywgu+Z)!lbrMw&$B=8W z&|G`XNCzAWn6jpZq77;rY_izxtX9i|wsc}^p}3{|;L!vaRhXX2lf7+D6<9FvWeP$E zyN0;yg|xKAuk7ZZ&bXwF)F>^b^4lYkK0@-f7W#oW{z~sJPO}ve3i3w<74MOPZti#5 zA;Itmfw8=s2p?RG$RL-kC*kA^a=}Yqm$AXXVc=lAm^^8lLnrw#*tDff2QK*K$dZBz zItev0`jvcD!zI&oqZ(^7~D6V$y;};Uqh)Lc`y-Hp@8ys^d1!LF17u$ zYD&L0t@pwbOb8Z(>YIu&LI3OGRFdISIT4h9#tNKj`AG2*M)_jwAt0O&?`aU+mzkji z#HznIGN@gS1i*Vem~xly-RX z5+tq(UTo{Jand+rF2;QqQ3!OvR>1Zsvi6Ie)7OcrDTzyuqJ3!g2ER&YwM@Lq%o&`3 zf2bhb913MVXz;-3+vfpiAaQ1G;EqWp8f|Ytw-t=#uwE6FD_O^)p?G6#9p!E0oT4IA z24{?|>E0rljc{Q=h>i<#tZhtjsZRu5TPurG)qgGVr>$_cvUkv@n|u+iBJ}Vqn}Wx5 zNr)e>W@1VX!=iC27V~d|)HHeQci4dx)5nWHVpMZD3N&po`M`B);->5zwWZMIr9 zTRG%V|0$Qd zC?C=OEQ6ncK0}*JX7wmjCO*|3ZMG9~hR}Jy_y!=;q#4QUjiB22?eqNwewF3q;v@E- z1x>4h?7h&aTLsMgQX#*>XNl)01&5cC`RUuq$`fsVTDm@$Fe`lWBKvv>PZvzJ(y;l} zZIUjYEW=Z%Lb7~(?d%1@zOJ_{twat{nUvDcN`G2fm~`t9=N@+!jo;bvuHXAWl6`Rp zI*lFDHHJvYL>9D6)$Vhv#(#IPneF-@dSzFPGtD54Euy4ucNvQ&TnqMpb<2~_c7r3I z0E1VKBgV+tP~IB8{li+SwjD~B>?A{O85OU}ysTe?gW;IU!k6&tLzoL0#zxXxRciu4HNJ&E)d35rKEPX&v#KD;9nt*vs{ z!_@Qx!Nk)ty6c_7&Jdq9L5G&jx(Sm<2yeM2f ze5-My8%Gt+z+ttaXeg8fe?;{<&6Yi}>rQKhlH98S`GnHAyDTW;LoffY+3pz%3Z>Ye zwg6IDMg7fI5&%NE`e$-UfhQDK$2jf&kkWN5A8?rDt)p(GQDSNTk3SrJEW5w}uyX5j z@Rt-?`wOaR-=HfzmsSXMCy$_{HMJf=!Jzm$*+b)RtC3cwPSp$ zi%GA6p3VNlo$v6@F^kG1CL-IO4-!@+V}|mj~@n}|EqJ$TLfe0JIS*- zR}V-@h^FoYrX;r%2J-PjiwaQzhojLLPe5h$)MBOM zXTJ+DQ{-n^;6${nQL*)a*CwMtaaJb_jgcM z@e0@oYYNaWs2vlYroegHm1UU0TYBO6pBLJ2#jY=?Yu{1K8*6yS^u6>Bl9F11chVBS z#MvyIr#@mgx;mwAR`S7@RxZ4T>_F3t*7p(Hd42MNbc|X>g)?ZQv$Jt9=qa|?N$`7T7ODM1im+f`3iE!b1j2vtzYn6%LK)ZpCh>vbKo0pvs_jut(@V zhKPFJOKsr_?+;qW2>x+I;fAYbve1|7v&G^33nfsmh?2Vn%rA{I{uq316`Q8S{?5o_ zyOnJsL`FD0EdjQitwGBgsGv16yOwE`yk88XVDUDNdWg~^_U|S2qO*6qhk}y*5oR(F z$GaKRtPW6$FF>FiiZeN4hcbY|_<;^Z>teAEzUd(We0uGC|C%;j;L*ju4QK0Y5u1L$ z=qlS#|2^vel#2O(qV@ll-ukaQZHqQ{RL`GPmCWVoE&wuZ2|W6(GA%vtjqsHciY*ilhAMMq|$xPdJvjgF^H zf2WL3W$X#$(=z1*gv_gPkCHvLsJP_8lA2Z5L+zAj`Xf_AJmW^T%6vi^1SsMae?-MG zvmY`I=-5{4AatJK$pl#}XMV5Sg?b`BeSo`#-{5w$MecJ5;gwUnBq zXWOFJHEk{FLD-n7ApnJc>3g|n81_O|Vu#+w%~Tft@E|YUipDo&- z|KI?B=qJ-D=hfB84TdMm3@I}us12fLT*N%N-*aQ!EO8U#HFXj2y9%Lu3*JD<8-RS&wo?Md{eY-=+IkP|Mod&K?V0E$IpQ8La*5wUa^RleRLB!LHHIhG$7`#id;nA- z`Oi@0KP>qLewdVsqI#HAR_xeEJ8wD{$?#w`f>BrSZdRQc8sfhB*-UrCCRt90q_L`< zcTt5NI&tiW3%wy0p{limy3d6>_w09zo<`qPw5Js*+P_NuiZruD+Qv@Q1tgfiLtS>8xlv)>VmBN(PWlbdr z({h+WW5U#IPAwG*v+oPSj13Y5tSb|f2n zsc%p7)pgI$d}u$qM6$MNFR=wzjEdCIDtOCw27b~TUB~U-%M?#9T*_rtLs86_>?qjY zv0ny~44$ZSggTeA9$7%&Kh$49(^)T)E_!j zzVv)CQx${Hv)wzB-wWMN6o`8}+c4Q$tGEyBsn;3IdKFvsDh=jqCJXi?x?<2|JG9)H zSA;)V?`04qR!~~5nUKFHRd>FWBaiGlJ@l0G# z+i-XqrNb(<`ZLkcb4_rSTrX= zdO<1F$i?2gAoWrX_EYTI+F{vKg8(EN;KAVBl4mbiqKmVelabJff~^7~BWuP3#R^o8 z@WI$%%vy@uA8Gx}K!%Csb+H7@V1E88XvN+GKd|nXpyWZH1U9gAV}LTnLvZ3**-(!C z%3$7ZvAH{VGg>fF4jyM7k#3}x+N%swoEIr1?UhvxitZ|2PxOja-dh^URQ91dT77yL zZs%j1dbDinXOlNr2L=mI?%-yY#lSu4h-=c-#^>BPtm09YG{fD+I z2b@29tiGEZbe?T*I-@><3*^xpkFjZkk3EKeaPR5aK;{*oMiw+^*4OfkhVp{mT2lwh z+v&z$ph={ARueQrCjF(9ieotsx@Z5bmNDbn(Oo|EG_K2{(cWeB;u>fSIc6tA*I3$F zE2rZD-3_MrF^FtONnzV5Ju{R4PCNY{tVkHoz|h>@=E`E?zJqpO`Uj9+Q3ZkF%8rfF z_2NIH$^V5K_TLcoe_^KqY(~w56gbi3B21rgBh-IZjKMg5gg3((J_9Bvpav)bR6+?} zJ4Az`p|k_=_LpIgsiDi(_7QNc+WpZJH}?}^MMBXD)%SsiOa}fcRC)twe*q+kxHv@d znivndJzsjTA$GI=wOa@~xEH4&fXCl!>%+kEQ3&8(HTkDa1hiB~?>oO(Gb{M3v&|;6 zvI(LT4leBcSw)yipulFw%fp zN&#w?ko@nrnYC0h-~3#^G`?b3sDFL&o>#OY9@0YdMvkI=K_YTw5!8RdOEy~cN*?}}sh&17cuc>gh6&R7169#Bwj{)@L# zqP!K$l8f!s6(;9fGYAm2>$}(5x^U*>^XbeRPJY~cLEMk&=gm}e7{|?_F*7^sW!!p! zWQO*k40irXKI!}%rxu^lJf^nB?jL8yk8T{s>hnCs^STD(B7#I^WS&F`U+`j3ljWcy3oJyoEV505rpRSz+U!$@iuKxx?OMTA#`yiotc zf0#8uIF>4c9rms`iP2wu`l(CmN&?Z27pZ0^by_JpF*5U+edK_B$E;ru{%2*Kypj=z3521Qh?jtXUx9ExSCXXMG zwGTz_0V()HduZ94B=4FfHV*@4@BVX_Ud4)!D0;N}KrY=LpAUwIam+O0I=zOc?fMkR!<(6zDIy}mdGD?C0+8JDq1CzWlj&PT`z z+f-qA=kELbhj<0alGMjZbx)W&Sve4&Qz@3&9(mz- zyW1uYHU8H(UC<Q6Y{3_;1hKJnYVYxP}`7Nt7=*y`wmFj%Re|bt{ZoT~5Z5b=l7h zZ!gvxswy4az~Ejxza9maoDex{si)&e2Bv8aTQysGAHo_JyKx0&5Yaj-6|hF;94@1I z7sfM1%IP=T0oRp)TmIv{&3Hov#tR}IB@NBw>}F}sa6|XGEqd??h1*V(hOq?;Yrvzx z-lIO#Rh!RlyG>%gt=}`F7s-Vy9a$ExmispoH&57oDnRFX#oG~CN6Fr7?#7qMt_B1! zhppSq14+^JW>XBzBVOiod_RugZ8ydBze9SlRWu}v=Qr*bSH61rAS;WWtMn5+FT_Y8 ztwqChQaVvfO;J8t)bQnw0_T)HwZ+|FROJ>u>02M}`|ij-VMi>lY;%@~*ofnJ*vAGG zO4QMf`UH(*E}QcyXustG)je6Z3!4ol?~_CrXQUxF(FW77q*7|~xbHca5mpOCJos24 zGtx*)-kjJLNrYKc!MyvMU0hhLZ;s~d?YA+nn$AA&x8AI;6U;NYfLdLmjwUw(v8L(+&7uo9>uOz! z^#?tSs$}c+I_9R2eG9xyQ#Dg3MM^u?V-*q1yG=Wce#>wkNVD{+UsBbM3|ky8__^a9 zafduid&a^|OZcZ{_?nnwY$O#y3;#vRMJ=>nDdW_RNd3;?cM9W?Mlb2Hm9cYm73_9%yP?_ zXi^d9<#@5I^W#Y50c^@|eSj#HHM5oNHp@F+`r@&YVNO%yPHJ4A*2|DP$>I>Dc#gEG ztOc1j)(Q(MSt)21-ou<*r6Rm|QH8xJB1Gs4j7>^bANksG8||K0l+B1L@2Vd1j&O6T z?0?NsTj2Bq5yhS9QSf6rP9Pqw0z!Ufbv~}BK`Vfn2eNIDajIRmHJd(-K+;; zDBXCEG0S%Xa z@BE8Mo-BK=3w^rWEiW|af?Y{!mzK+y?^V1+93w;CPPh1HU}t4IU{N`4?=Z9eA=Bhh z)W+Xr`pWq>$uHEo2N1nkhUS>w8oIZsT}r9E52yQ=2-fJwZOwt@_Eg}?XB@e2O--Qe zXk?iBdqvAZqx2pbnN2@qZtKr>8a%u!1HdbDKiO~K?x$B?c#Uj^S3t5|McjHAjLmQI z=f(=XN}ruy4h|hH8tr2t-xQOj$FvqknmN6|0!8*^fFBy(t?Ivb$dX&R<}_WSO->}k zCPbL3?(Sz(2<@f1^k2@=NNyhH)ZrD;f1{}@6Wfo$ zoFyRyPR)rwO?2nftWWN(Y^5R?G>xfF{>ba%{JK5a@VRD&;38KW^xD!fL%*qbg?;hV zC}RHHRrl;CT5{{fMf#NPB4iOK*WX*crFAnp%UX!J<|I(_ku>@f(r@qXRTNaY(b6~BKG1+XC11zU`a&M+9Qq6Zp1>1@-{;%d*Sz}UYl;Pu5*C_ zwXw-uNF;>q^-vj!6kANu+v!!BHll312sh*|w0x}9!7k*I`XKG`FZt*aqIA%^A>z7d zoqh9J)%YTttl?&idze#Omz z?nL?VHESKfV$}D%@2Un)nRAJ(Jssw5ex+$0W3CmiZ|(ViQ1{-^aJKEcup|$j2$ATW z5JVf%6NKo!jTQ`|_cl5~64C4EUGz?Lqb3BSccTkN9VL2a-$|bL-TU49x7Yf%Omkp2u~Z<*NInRvjB-uJSg~)1WCZPoGJyY}}bybH+bk5pzK)e@(9b>f09D z^BhO^z+ojF3spOJbCBcbefu4 zZ(?}6YQ3#BRIB$2c?*TFqeWehP8H|_i96YM1+v>6gPs_K;l6JBwQVE;i%caBOySp8 zoo?FmB1H{th1|1NAV|1q=HAueI<CO{%TwF4vU=NiF~XzC+RB5Vw@oJa7lqLLuQLttpgI{q&o5N4OB zdx@jbe-Xn|Qd9GY(wcS~*+}_KaLLqRB{?|~@(dq!vnow{2#O{SzPLW*hn7L$+}R^K zv8)*HjU;Ht!4xr{=}GPC;y%7c0(1g4jmP`eHH0h2)V*bO5_-~1eDc4E^gCs^UDYmE z)?|fYVQlxTK4)-{b0y1w1ZCoC&P-cQ7rd#OO{p+YcP<)!o&mQ(wBB6UkbhCl>t7kF zGV9ym(ZLG*#4jzfE&a$RW6ZqoD`Ht8q&4n-IX*<$uK(?M1f*vDWla6l-vyurpBM_4 z7ZDLZzi~ZQ4U~E0L({`N_8NSTWMViZ_6{&~F2MxgyyP!Z-xP{@%T2+28du+*-IEZX zrK5FY2o})8l8%PQJ>o&+-0jwrGWF2dCx%;Q%De!Z8h;0q?ueY4IkbX^)$t2j>*`fN9+bdzuYL2V ztCk14EQYH6e38AvtdE+xuqKk)H@J@wQr@Zlo?#KMx3cF29Q=LhNwZks6A#&9>!%QH z65Lmcxt3A|(pc=k8Zn`fc?NQf7|}*$H?N99_w_rkFHgs`iztL=u+G0wvbg9h^>zR4 zmvl(sxdY+hru@nlf9JsjVPm0Zc`k(WUe5PN45WK)xTstsC4DzNs^PzzjYi9jKdEa6 zW`=x_DW9C2Of>WbMm+T4c9h?h2|1baI~ZBAEBV@4^X<*02GeYv-Ac-nmDT5hnBY`$ zU7;bwY)5?lu&6h8W>W`8(0bloZFB0ffYZd*gAdsUZ=>D}W~+p}2K1Q!nUdrlQ#twF zKkYmsA4E>WuAVa22)5=sekZR~xL?*u2>0MQqsx^t3Be7=k_drZ(|(-edRG({iBaE) zi|2MBwj|ARuSa^jOdJ>!DoU8m_hHxeD^sEP>p7C1M}`MQuVq5GakNv~qm$>pcKfM5 zQ1ou)ei_14`{=gGgwrkwSQj??epAkPKJtGNz&A{Wi2|>fvhAYrn_$KwEk)6FmljDs zx3+7YjT-WHnI?|>Hc>WnKlKf&?T2AuZVnnK4t~WVn=eYyDX;=YGX+s#%HC}C{^WTK zvr*lci*Q77V>36&^e7XUsy@fL zcWESF^@4s62UZm|iwC>Di0KPVm1x%*(?KqV^IJDvm`_&jx0{Zx!ahAyN1z2!r;e(o zYqpzyxQL#R1ZR+;8D|GGnN=4ECB;5S23LaNHcbYvnk1S?WzX@J>jZ88{ zJKra4_`+NTs)9SfoR$g*r_T91{-vMlha{6elaPWKoFZ6Q!qC{y&ps&)fk^?6GTx(= zzGd_oU~;D6oIq%-kd}452KmW>iE@~)?2HeOWM3MaPlRtNeLy1kPMU@93|RICT9m%J zE|kb5U>NQ*OR2{_jbLKne*Wn9h|pYlF8CqH$kToT7=_{eq#1qU`c{`VSI4-iz*{nN zj=Gxo+=`1DtjF-PN4OvQGx6dw1Etr7V!rKa1WsG3_HRZnwVH|K(cbfA0;k1*7dI5o zqaZFyRh%u~TP2fAD3nYLN$p%p``7ts1=ZJpCHD%`A8X*~JBW}b7cLB>@e?8^?T;%$ z(`S&&iH0rT-7HbW?iO)z`5audw9=*M`Bh$;ubE2Z#!V+mdz(9g+oF4X43eLwOJ~)0 zk}bTwIbiBzM@$UH53rC=NyN$En;}f~@}}@^^Vsnj7z`K*6JeCz?xN?jZL;$=rRl@{ z-Dlyi)w_D^?bEC5;y3MD4`5HbRRRE)3?7>%M&zv zQakXuBc6Xl^+R8NO#ZkDLE*v;)v4lF|0|~a8xy9yl!XBZdfm5Ye0xiq6Y84NTA=N+U#}CkYi(T zE~C0BKF3(;d^LGTgqFpLEcIOuS6aAl(g6t?{WZUA&t|y>ixiG{Ca>QSSC4obh0&QV zmL89rCk>*|uwpxJV`6ab#R5b_C8BfGpeER7nn{@4kOfZ=(m??yQ?kOkObN$fAc1cn zJR<#Go=E}U z{y3m6=YJB4>&;y)eUai;QureT;`Tu`Iq|JSfko;7fv}B{TSW3mzx`Anx&DT_F$%a; z+ zPX{34N%W)t)^FKhL;joyv)KT5A47h~x4z$}Bi?W{BZL2~q*xf(I!ZU;9BN!cHT2ih zTBaS-Prc>}9ux)*MfDaawQF{Hd7rrRFJ!!yQ)=(AcF?czzXyD)j*+^yNnjl5!;ceAA)$bz6Rj;+3A+R?%CxZyGZSpDWB;coBTUy&7H*sh941 zNP{TNxz(Q&Iu87nD75f~w{6rLO4e*cadq)(1)PoL}os9=&i4yo_NZXEJE*sk6 z4JCbvaL7{&b>!bDju^lRdNSt|0&`kidw*OuPHWe2&woa|SAv|Tqge`&Q{-^Pn(T^C z>ZG@Z0XSYUVxNEM4kPo%lyPbFU1VsBU=iYy+Fkqz9EwkV+)AK$6 z9W(^gMg-^nfWUmNRixp1^bE7K=9z;W3%UFI9(wMsYds%Vv;Be^T+_hcJBrYK$yA{C z^)5mjb(c=!O!2Sx&DnR6sz6cxx7ob|lwmc~;3~(53JUq})$YO`RGIvp8G?b4(}|D- zk8kvxlxjvD|v$}2zV>f-t_sMbAl;+-;m-8{3?%73l_V10$u%u=l^#PIaOhu2O;8tK1t&Nrd#}7bd`3sm>G*c z_T&M~X8bkk?)!KCWGGttMB3y}94ihtYYwJ$B6QFQ3IJM0J3R8gl0Z>#hpH0fV@a4R zWB0M9tuFBl>*tg_%`2uv=< zITjZ}RI>a@^jutaU7o^d0y=dtof|Y=V>M=~laM7-zDN~(pn#v@id``^c62O`qPY9t zyM&kUDc_|v_H(>xS@=;*rw*X#O{e$Ia#3QhCQ+?I<`=#OzVyi0)YJ;!YmTzbi-|)O zkt;vhvi%k?#qlxV>KrLrfz@`~oN=&~=gu5&e|a_YSbtNmQ(@1b%`+(BYC3BGY<9Wu zX>7e>Y$_GWd3$K6Ft2|*C(d_2aUuR9{5%xm*OD;Fvg)hoB|swzS`DX$yIJUMo|*y- zzIWgwQVPKh6WeFB$Nq1Sr%aG0Lcg2K;)ZkQ8%5eV=Jn4fHai7K59;l;&L}fU^G9$j z1p;-79;B1@(HSdwCVOp;4X;%Bo{|Sl%W-Fj_R8?KgyPDNR9iJC%I^|R!?FPQJG_Z+ zxT0+%T)dKCNwh~dH&}eYJ>%Y-U+--=LNy(&-K6wwUsi9%z0=!YJZ8G7xJ7=v)kDUt zM=c8fu-W+~H=fNklRMlb%a`0@I68$kk6>(J6;Gtf zX-9oqk`8EQuBHdhkl3d0xwVAtZ}-*+FeO_;*xwAJ`yyANwBU0To#ew_+|ES6+bt9S?G<(~d1AAUZ+c7g&HA?dhGS~o_fM-R6SGQLC`pW1pYz_0n>N%=d=)yL%{AizDEd!d4{ zS@n?iWUuAyKGM|p6*&*Ar2Kd=k~%Z9Qt)N?9R}^Sr)4f3gwPb4f zQujgT<%J-m$oEH^V$0{%WF%B_?0<}MOQ$JobN(F>j->U(v* z=i|0&el<8ix~Jk7kXSliKzeq@{BD-fWRyG)RuW9Y(McpV3rgxASK&;ghA*@@uA|45 z3)*}$xIf07bL0vJT^!xAc*hX*IFvDWTQTf>H4?RuX4BS*-n&|aC&(ool3Am&v9@R$ zGe`UeV`zMG)T+yd@UG33B|*k@hq0;qfO)4QDlDehUtkrR2uz$5(i}@vyo4_V`I-+F=Y_9Di=9s(kPW^ex(W_;euFqF@AYPgcl&Phg>3d_ z$vsD_3fwtY#A+OZxXp9_ z`z`F7Us2E_|9-}#COd8cetJ^Ivh`!%rl{UIDN;sf&vV7h$Bn&B7FV9JI2*wu+Jx}_ zp-Lwo*8B1_6P&4r_)gG6#^dp*Xy9ws8R&aG3`Jxs5yB7CEFs2)fK18BM@eZnBbp7l?%em{F29Y9L6uVK>q ziEN5)taZ`%pcou}a>?#ml~YTeCXf-r&_QwL`0$Mv!z1+!NOGUeEVf8*H8c-2S%Cmq z5c4^X{TS(_j}}?KIA#rCaJ}UoI)NoD!K?;W{S#PS-P$z{w-^`!yhcF4`t=obF8R* zR-81uZ4X@YBy2cn6J^04&%D|`sNb~D%B6UR3qBnT#>ML*3x~2>2_NnQksrk-2 z7Q5OeVHcOx=LlSNRPpuCD#4@VX*!;ew)50B*s8UEFeG1_C%SvRt?dMNG3WT=M)wkA zBn?A*kGl~LEt1QW8ZPtwO$0Bmb=+@&ce8KYG9q)6!XxA2xcNUJq;|NEyM^}}hP1Dp z`}l^Y+VcIw0p&}|rZ`HHtyy95Dn~cqT>|U=y-AtZXTasao{^6sts4E4m2neitmEQKtORA2w-`!W4$-Rl zC4V4!ZCG*50xPln8JQw8;pgq?=vV#$PY_zv^vO!_aJLa{QG*9rHVnW<{Ea3C=N(hI*w{Bq0sWi-Q$pdtzx7YF z)&JVl8z~jy7jiiH6NqPd)i1VrPqcOf?VIv0a7SB^Uq}X2sQ_T)-%F9fta1*?U<}mnQ{`{A0+OZy*I=f z&R{I8z+Z)f{#6(r30jXx=SG<=4ziW3H!_EHfF%ghH7l(tO6{v;_)lx!;0vAb6?Gob zx&o%Yf;!=%$*l_??`5~u1c&G%KZ>fxF2}9E(sb z-61A_=A$8S@OFnN9+gW*C-1Ymk%nXXI%unNl+J_Dy&vu!>{32^^BmjZ^SSD zq&?d%p~f0ifY2XTZaInY;%9v%P%m}tE1KU|8S%K*#(VyC(U|t*#N+&z$8LhvHTL1d zQ^ejgo{oL*YRA*(mI}0$`j%eK`c=3U)JY{stkw)cH_Ny`RH)l&d0^ph;K`Mi=qgdH zaZ~TL2h27oUMeyq@LNE$F)%&?yb7>|lJM{}$Br>|5`M5jhpn01>uziir=Zc!lNV;PWsa$s))52fjAb-q~bqL@gC zcbSq-ahDt-2b_YKsDsJN8Oa6pm0d)m@nF-$KBoy`8cEH@qKS7fq#yj20N+Y4JWkhG z0^SuAzb@WJpQFtS>7x!lKjxWaq#(KyaDw(tNMfRorKWL`y~SSJZ7a8g|LU+MH{^6o|5GQ_)&cQ^!G#! z-u8vm@A8)yuEbu}uQY2@*r_Sj7lw)6Nh--9L!QWhGQbY9qYtMDfq3AeBte+<6v?R; z7ZCa-{#%3|t#i44Q#y`iC{6e4D8asicW+5ieFNfV3&<#f7&c~b61X0AbW@DZ5 z+``Z+`% zWet%fJ_x3a2Qz4EsKCjoV!*@@cQUWV^@I>d+MHzj;QL37gh{N*6Y4j)7P8e zj>CGeTv>nb$7Z9Lw?`c+dIUY3`)MS^7r_uN;#h*V`tYuz%nOLCD)D6$MDPkO`s{V~ z7BfBbVcJDf>iVh`Rau^+)p8JtIs>VwgqFG4i&hha)t5a)UZkR{Iz7);!T2vu1__vT z0o`)ZC8{fn6Q&?9k4hvW8sLT(E8&-0zuWs8&xOAvGuIi1$2Tb-O+3_f0MXYqv?SMYkhIX)Q?v9+{?ywtu$iNU^? z-Y}5b<)%#CAA2(M1w6mVEBY28q?|vXziA)hnWijiMw=l%t766m?R-yH{m=t9rfo3B}3}PMz(!k@C*w(iS z>TuS|Yy392>k6`@Z#CYJqk|@y51&E37W0ky1Z{_;)Q^baHM=P|6GD>Sx^1sUWL~JE z!2BE~!?WC#zD@F#;(ISRv_y@i^pQ z>o0(E^x*$XMDbt16kyaun&-Up^1xUaSSo+O0+}&jHg?Tf!6U~YBlsOB?fLc@?1ATl zD)D~`xS+%rKHC0+I{;ftRZ_j~%KgVh)x<|9UAakv{dkx5$6dgErnX6*Q5xSYf!OU| zm;{#|YF6(TMz7tN8!z3RM+t^Xxw#uI94dhJX7}kyn{hJQoQ%ujo-qFdE|R4|y?UdJ z@pqC743lNb$1!(zBP*ymS4E`Uy7eBzp(%e5NwgCu(m#ylLYVvQa8D95G@|0-%W3JB zc**5aSH`q8-@b={&nwS^r)7z)lS<&&5Nu@EN=r$sJ&VW`<=(5B%d!WR3w?VdA8AFW z-Cp|cIH$n6bh0=I_7=)oE9~riZ0xq%H|K){E!8l+sKTHB84$V^gj7{Z<1=Wj8r^8a z+88BKJN>>5?ExL2NMvX2_*+*lc03%yftzg3&s1DLsD1)3mKv1Tz)I>@T=fYl+O9md zJ6J&-vN3n|ogo7$>Yu;=fbii0ljFz|4{IrJjba`do=MtRsIq0TTklq08ai@h z#0Fq7F^;f*@2+8HVtBDDOJkWi1><|rtLF#3Rm39F>c94<;y`w9!?uVMM{suEmB!%DLQV-CeXeD|sBL-o+dc%@ZWQZShvb zcSw`+uR+#KAKQ@7E8Ts)@Q-F@c?@sV9$?Mh{@ll^_R`Fzfoi_3odqHvaK0o-J7wB! zHK`VS_fEI}mbisc&eIT%r~nK88t{iM=-ceofy^b_k$MhFQgHCT2%q^WbTgiI?cjzu z_CX@Q^YrIhfi29^r0uve!9p}d5C^WX$8Cngy*t@S^FYW8tugF`L%P*yD!9-i-dG3r z?DQqiK9B=37S=k-aaO?ks16#YR9=yeCny?xTP-g;On;vF_wkp+CeF$kdilU#d`Q6` z!Rj+Q{ZX^o?KSH$we%owI1tcpc?hm|w-&|xOJ6nT1$3YHBZ*%2-S43Ua#lnyjX7!q zYB@AOPE_@59N!`#HP38Tl_C$x60=DK`H`G#NNR~Vtm}WT{|`Fc}Z6E76aqln#8!G)7ApEqF7RVtKN;tntFe3;y#a)=l{GiGtDcC( zTJp5w2asbx2pSN352rd&g)kMtI5H$l3s)9Yexv<#|1o^qzPd2^Jx+5$O7XhgZh?WH z3N1W4;=xYP!b!z5F@Rxd4*1vZs+&4^^Fr7pot0WohI|!)NsOCKs;rsZ4WH!~RJV8; ztKIXKe(bv&h!q-Y?utHuN7biZy2hz(bei=Vn3)YuN}kCUa=4g}D?|-ey7Hv`Bx*UB z3Q)iFSdBX@rkpMMV$q4q>iqg8M6|;xR2f}MGp&`=nimD(YHI<(!vz3pMMi; zSvZ%{P?RkHqW-;YVY_G9ajJ#m*8&8N6%Q>`>;=X09$-_1hKBw^XAb`o8EG766m3$X z<}`MTJes%Pe~gDxD2uXhBdXWKnVzdHeXon(>b{@;5zZzcM|?W4vEE2@%o84R7V~sQ zBxF+SIV@=Aly@UOh|PM-Y<1)WT8u+#FEnC@9d{DNzeyXzURbg%zO-4CCcsp%gc2nlqK$dhbEqPL(Gx-P=E+M>84_T0A(0PboZYf z@+5J?GG5y7*uTov*Q08^o97P30l@0~I;W#zN@YNsjbWW43w6OHF}n#sz6OIoN9|9L zm}5k()vCBp#Ux8+(`aMU1B__*KVJllmp{CzD?kJIdP?(s^2|HirkKa zhMJ)JY}`)HWh_&QS253J!tE*w@0KS%uJs^sb?v465SSjAL?tLf6rpfU{8yzi-6?~cwX0k z1kV1>ea!MjD&6^#lX8^~9O$)Pxn4S`nT~ef_Y{bCtf#39?j_Ra%ZCNH^Cp9}J$&Vp z3VdMN2?wsKw^0MNiq6+yx3#r>SMvfgKi2kme>-z5vJw(&N5z(U42JtgIF~7i_Aa7 zmbn-drQ48yHeyDZ@M`OmMIp{9kB{_JQPE;EbeH$?Kq=8VgKzs2T0mehUF&lRrc^oK zF;9Y>>TO8cw^tHndg+c!=GTk89q?A z_Y|fZPS+`?GpwEWee6(tzT37meuqxe84l*j+A)?S>9FkE%ELH$G&Y)aYv=lNymEIw zN7P7M&D?c~Igw)V=USo{P>jv&+QNo6dktf6^d(D@2;BH*^s&qEjOx?bIW+WUYyINY zpNE`;4c>JKcU_H@mU1!;TM#MNjH%~weZm{&Z6CQmF=HU>yhGHoI(lDCAEmKru7k3t zMBD1-BCE3KgeA)Jl_ol)CO4=xNViWZC?_)b`A0#cFwZy&_iIAs5qiG7l1eAIdbXEX zVVc+XH%QniNy3Xht89E-E3pU2ar9W8ZZi!no)9Lbi+_b^sh|Z)RrSSeO+c?3&rwZ8 zS3rPp!s6o^nAguFLeL~f=BTvx%0>jQdS!!Pm@VI7%kxY&)m}-=H49hZ>909*k8ZUpxFd- zL`Q9u(pz|G`m6-TUzF#avU^CK2CX~f?bVd?ZJG3pYNTJO-4UbkhS}IPyOt3>sh6Yd z|A<0pHpD4BpqBA@0f+UOGNe+Pod_{C+2uFY5FU9ao_zRB<84;Q*7%@rhY2Y!B zB^<5sJ_kEB=lJqWHE~W0VTWDli>}{DWZ`Rmhy8&N+sR4)(jyfu$ zm=IqJ%9D#7*Eg?mtc^1{Hov^j(JSJ9lrQv5N>i(hQ6I&s^KA!F+DFwPBFfm{lX6Pe za=cw1Xq(zOo_hjyLWS~cHYw@Ly?TJP!(g`_<@cms#HxqK{L^OJ8`dvdJ~p#DGDi0M zbDQ}#cz223psXXh8NeEiD^4uu0RT%c`+M$I6IO4-b}hUBedZ#SrWNm!{u!S=s2aJ2PEBNBO2JL_lX&HAWI%P$2gF;gKaY~>_(0Q*6 zZS2v@jf?jMrd9<4vsNHn7MMbL?^?DEf5uIYsFO9O4^CfKs%MKk4E#|4V+cfPj``b$ z=;}xZ<>u{?GY}Qo_C<2w6|gElmnFi9i|f_Jubbs+YNQVf!=x|m=@Xl5FT?w|vQ`g2 zCok}jTN&s!)GC-UiO9IcElm%I_ct>wPHpcf>Id^F&_m@SYMnj>YG7w5So3*TLPVOK z5(q(%W{>H10_SfDW%DmeoQbWT=En+tw>Vn8e`nu1M+NnzwVTL^>LLyqf4??haOr}(mXV{@<{`fnf3Y%G zaonwZfvix=w6e32Y-8OU+S3I@d;?Bx&-&${6nLx-<{;ewOisI;`*}@t?n46SBFiEU z4QKos#gzUX$wwyv(bL$;Nw2;r%jkhKBS5Jfa@$VejPND0{rktox@=sRRY5 z?IE(x-*M$Jph@7n*gIjft4|dl9MR0g)rqw$tEsy#kx-X!98KG44PN%Ru2CHm!_A*w zKyu6zldXhn(yf6!W<8U)9)*?Dx3^gNxc`qt_X9BJcgUwzi<(v*=sqTsAg<_D%SV16=F@_ z)C7Mw)Q=|s_@-uZEU9VL1%GdHS5OPGn76;P&xZqn#0 z^(|80uQg~CQ!pqJ@OMiqdJHNG?S_}5rgv%tYU1#CJh|lfsRUKj7cRC4@I{)^ksh6j z3Vptg`))I-CF`e712dCnGs9i#`dKzkhc>nEEn+T&4cDJn46co5Fu&ccUL*UB46~d z_~SrCYS@EkRvSa^jh})FYz=C|L&HKlnpY0y;@5|DEL&131yqgnJwJGPnLGP@Fc=w> zlG;)$i+5$zid?%T!{x>B8YS-`CRRuko{ZLg|wm$;|(xiem!ip*HHu`hSg@T;t~ zY%~38bp~zQe09s+SDWj3<0fy$9;`l2E>FL>Up#OuH8COVV2wJkwb&9j?kvI%vW%&VzAUMLecM>M+iLMnoCoWasZs(fR~%SX5fkF;+_A8r1r zKyw0#6sAaKVJT?-nk?d;cge0DS0|ate$AdZLwe1w-TCyi2M*Gun^0u?EU_`q>8`)_ zTiBHB3PC#sQzz~jJeW{nS1$Mn=a|<<(T_hrdtFqo)~n;l7x17!eKseG!M7%EIQ-}) zyGylId7?B-F^d`kAHICg^cOt>vHI;8xxC+rzcuO~wz6+?H zQ16T88xIHf3WIq{3o{1Br?1YihQvQG_@YaT@4u3Dk|4#}SY`ESS&{ChgzPpv_G@_` zw!9H>Mnjk)o`n?h5?b((B<)@d?)KEx9oG|-Zt+^v3d+c&*KWQv;j_Q86)Dd8SX)2X znun9M-_mR(Y8Sp3-O*mk5dD_*n$`%Q+ZYOs%(F}GNvBJ$(|&yxXVU_Kc_@PVQHsJh zQAcH467x@pLVVtI#-^W2eyA;5CwvSzKW)F^xtZWeTvS)!7W8rzByUUe?t4b6x#?wg zRk9DTm8ZV++TSQG^pKJG5r*C;5g!faS6urd)K9M@j(cJYTn%BpR7CJxi@}*(fUc)b zmh4SwDL5SyWU<*l^JKAdV+9_A3L?54HgRgbL@0>h{g0P*H2$tujR>j3LV733-^#q1 zq5F#1bZK9(mnGwvp)5I`w|PIpilj%{3PDGBN0W&}FUNLBSsn@d9Zeo)?Vs>|x;vb# zJx{3@OYze5Xv*mcODxMuB5gs{aPjVm70j-&JYG+vX6++Ko{lEbOB>J-`t+38<5EBwY4?N)J_R4(o1ml>(!{ zi@X`D6Fec0x?=D@8gtG)kH3lfQX}>rR_UzP;3!{@`?YXnrUq*KVdceA@x=}p^SR)v zE(&MH}kJno#yw5AKywR|Y!Fje2;+smjR?7Ps< zcXOVzR)@^!Yl-l(*4?D^Qkbk;kPU%Y`MKbGi;g+2} zRx(^_YXuSO0})cXhlln_rt4NE{ngs6KLOek^*C7)#Mj#r(QvR~aA8gRms{UMO;C0E z@8W@86|~E7+{a5EwHjf**knJNC>I2gKg!6=Tstnp2q; zv~#-Q+kb@jFUN-uU+J}fl*4_*pDSVsxBua7UyDeWBO)gw+3Gp>GB`S-?Z|0_`v`oQrp-QEE;ctHj>Zdd!JFBB!dfN|qIISl-XYK}Xa9SMAiqGu3)F7kX*O-!ZL)HZ3@-6Mh6H?xf)ysAJ z$(k>ji;_^URWGU!hnMf9sDu1FUP!EyUnOyd`ZKlKc`t=X*Q2k{4<_;bMkgW5D zY+@*GX`98Rx3O-p{$|ZK#-ztj3vOJlW7{C+N6jVYPw|xaTDP zqTo~2(*e#}z=P(|Z&Ky6AGUVhiTMD2N#D-oxzV}iioOg*ZA#H#N{8BIMJOU5*?Q78 zOCt-EpMGV*%TM$o@_dXc+omL=l5IcnV6Kh63TlK|W_I09a9!^s`k8U-Z`XbnNH1Y; zrfbgT#A47iB<;XmdmBLTd&nd za-*9E{O{hQEk3a&*cDcI@(MF-;?E32h}b-nd&VTG1)hzqjfL>}iR2YET6)Fb%)Yqb z+!?kn)@?D`+EZoPL%>cc6pm=`-MkK1(Grp2iz4yn_m5<<`(A|?aoo37oHbc?g`Ix% zX=^WU_=8_oYl_kjeR zVa9h>?@3ti7(~0k`o%T~>b1LvgfS4_P!_O!`r41;WFn)+Iz@v#ekFQ< zY>Ej8;TzKl;nzgg6`o0r6~3B>%c^9&rB7seG_+JD^Y}7@otDkp>l9J|NKsWD<`H(C zUtI)(tADYBegyRoIRYjbzZ41fC-ws-2Z5Bc@j9;3y^pZxDz^H%JJWU}Yk90V!Osjc z80;;ugy8mp%+Mm12Z@s;z1*+HX15WV`lyX^##8Rap|#p^C@JFRA3HGs7;v@xpB$p>tkPeyzcuKpUz>BLk&AGOri6-p&}xwJeG5i$0lBjkPd-u)SWg$KtR#e+=U zEYTKlSsQO!lZswxsJD5p z&TV?dKC20^a?d9w+W$-W+tZo4Y4!H2BQm?$8i2A!BBwsYOmQ)~QuOK>ok|x|!i@pw z3~*Dt_HW4Dc+8Rs*IK)N2Prwl?6t6=}{t6HN<<+0!|Nk7CJIWQw*MPkk{YOMU z`CEt-K#u)@8!`r&??1*0s#;lMz)es2A4`_lXabWapk-eEp-6|Z<@8cCfbyuP|5WzW z&I%0F5*_>Jn?BJsd2;`M_&~T*dfSx8o6zTVM>VwPhVtl}`tF6Krsc(T(6ooP)ja3o zD~6S~ivN(;zlUMk5pYa!GMaKqDsTQx%Pzf1!o{n$yvzu}tZDyPKUDlJ zrTDl}P&Q&hsyZ;PQDmkDycebpoDr<#=aj>Xi2LT4M8icE3=F~CFfHxpm8PqK^I*zw zrkQXf`%3bcCu{k)M<``-$8`I5mww6Dk+@$sg8rC-{Bt>!ir=vzkx%v13yM!AL1n5# zTo7>mC!)BD*pYkWlZd=Tj!eS@(v_t*p%Aa2-on>nlB8(3$Qvbp75#VCwn46S z2a+JAoxSHF88h^3a$S2>bSP=m*2{OuW__^o$@-2%V)OKqd(V4;d;qityYU2H>3}@Y zzenxH#V%bXvyEqKptICjUTT14eykG~X47*+%*gvJ@p_j~U2{)NEMj7{+D<1R}-zaZB)@#)TE|d)x-mj zbyE~6);2TnMHE;*SXW}ny@#U7%tfru^ZQ_yiM~sExEY5-9W`32?P|Jpli}D|r3985 zRg&|ksxC$BC_QDF{meUFi1oZOcP>qn&*GX(B|-h5a+UG#SfCwFv#AxTogC zI@TupvTwayxB!U`S<|Db#^SM=vi?$!L8IQKcV-{>4;uXv&b>4JW?yZq$}Y~tNjP15jVkN4R6-s1-he~=XxrS)K83R!ji42^%zTKs+F=nINN@@0$q>2Hv> zWnU6l@hjwt7p98ybJ?D9gqVYoa$%w5)^V*UT0Q1k-Lpy#jRNh|Pproib>SjA_@&8W zjKoub3EOBwtTqX-J+q>HS&7YT=e%p}17|c%6tV@x^-E-VkW_kYn>i;Um$;2?2j9!- z^;3N#xPP!#O**VCBjW96O-m4*3zkZ42Clg2_=B#1C*5apj~gw`WPAC`xi_o1i1?E; zkHHRQ>KL=HW=cHYcSrlxwIwU0v0|nHbg~pTQ~cA!i*78itXuCW&WiHn>WjK$M9$dQ z2=SWQL`{PW+v?_nlGLMH2`YR0$AVh{HR)<1SH`taAEj=^J zNkSj(O)M6xTd*!Oqg{6eTDnl3G;sP619C>ISGPWsBRK+rDZym-N64OcWWu?l*;iLC zg8YV~wD>?8_k<(#&DDHd*J;STmx{v_4dD}~MK%rKc#Fczz_=@#*->IUuy%*^b!rsjp6|qLV_j(xT3ymLrI{+UPB?S8UEW1nDKq?@wF&FKEk?*e9(`N|v4q!6`GR}_4faaMI+6`}9+O|r@HjDT81bH;|XQf$*L3a7sB4o{N zA&9)<=GlCPM2&nyhgoSKS-^X4;kuG0=cqD3E@&J?Sv*>e=XFASX=Y@7m%75$sHoVc zC~vtRi&#RqrQp9&_nu)*tzEk)%2E_Wlp;!1dPk*6SLuWfA(Q|D(whWA6;Kh7Zm3Fc zp%bK&&_ty75|FO+geJYio-AGO=lgxvzV^P(F6W#d{y=5UXFg>-W87nm`{tbD#z9`s zK99l-i5=>ZDDZ*$Z%!5^dN%3KPTWuL#A^K%UJ*W2^Y@Bmt;`>Wl)fS6A_I%;RA^DS zlhead4kS8tT)4~a3bDN}%A|naERkU5_~X>{iYM6oKz!vlYi6q9pCv={aCZ2poKTZ{ z#yS@kJv|=`WjC4rBolHULs}OP3cV%@bos2C)$R?qN3%OkL=?wjZo-*{kB&V!W$psy zf_H5|(OiDFKAt_uQ9S&*BDI(0D`;s4v8B`=bY+}iAxxk`&ncUC;JwMw(0=wa8hB`? ztU7~u;pJ_=n#}H(o@Mb1%Fk~`efzGKz-pT8`!+{TLAYM+C+j^=H*GZo%lxb(4duhO z*xCvk>J*M;8_`jgxHvu-a#C0*G;hVcuEYk9%J|+odzhdF0ixgmdqR^j)mZ(~!yfU> zrVG78XR#i4lVjfRznPZC){V9rM0umd_OE{NUjvvJ-jtIXQiE$MIx)`*hP~_FC(@ln zeo>K@QJ_7PmV0h)I2LQ0%0kxS+pwvLGR^N0%h$D2vL{caMwP22jkipkJ-yxD?ct%m z?Z;=t&Du?YrpaIad4J^F4ZXRLRzlA!_71h)Rh0Lvfym+f-j9_w;_QW~@}wS>tVwM6 zn&HnH1{S%juJ`)YfvKdO&3qOT)SuTB)^GXHkzo5FKG+W(LfHbZPOEw&3&wFT)WV^}~&3qkn1Os7usgkVnWk z@;Q!~daqr{=`oBSawr6Z*aP;7R)mLo#Y_7hBGNi)^Yz&}6+n5b>v-C@{9#Yz6XW2c zSeq#(V6gPUWSnCFuNL)P2g3zYLvVIDG$l~AEH^VpZTgFR1%By=kWThCl>?+sc_?iF z6_Y#u&Opzdu+S{KVYVG0`Ey2%iMK->UU*W~=$bbkAE__WBWbY%voIb&suQW4%3pF%()gvtcsDY*Bi=Uo_i^9ONvmF^t8HueI$CgD87;i+Fx$ zruXd+gG~CBi<74BQSnJy9Jj;*q}m%EcI{;~-g%o^1t<-}PU~mx?h+YxGU?tuCg>-z z@dj0(=CR@7igcO9VxUH_s@m{iWmnf=sHm84IB-fYcgH#NbT&1hD^Y}$rV`QxgcI00D$0e$i^z6Isy)aQZ{GHvoMJvjDXx8wJ z>}9(>bY$Lh-_IIxJ?@WVwlB18UFl@nsSc^fRDTgzp^S?0Ag`Io!}A7Pp^s&OsgEna zU^6m~WE?f#2+}Um+j|LrvE7n2{nXpsRljT`%8|Ao5di}eP^!dUK;66Av1Qd|4_amr!d_n;eiD_C2Ik&{$lrPk-ddhZ_(QUsEvor zHJm?w>UCIM!aPpTVVRu#95J;|8@Y6Imhr)fm5v8k-KUp-?`!euAUyay=Vx6?1pm?4 z%-Hc9uUX+}Bx3CLlW{szG1smz>B_0%ZwF}fg{*Iq>dE)015TFS)}60Wd5j;OC)u-a z6)Y<@mpW(-q9JE}*sl)k80^rYbZhW20t)y(9}m$ok`G1%`FZE+-^!m1n(layiJWG9 z$j-IdCshC3rOq=Z?KYC;*H@g8-B^#eHxz{!@qG#C6!!Tl^tNVu|DG4G4*}BxQN=dl zW?_vP@hS|zKCcYTcvqLWuz0~{Jgdchj*0VpRg@EU2JVb6oZ^L+M>LR$QI{vfgOhEc z@>?oN20!#cnAzFWyW>N|M?|BS{aDr5$E3d1Ht#wZ}^rhYc3we}I65O?1& zh&4o&3leTJHNJtNiCC$JZ+n9KHWVe-EwCP6XRVNw#H+aA5!_P=UwuEw#Hva#6fs#s zR!|+-_T0{}7tl_ix<_mx_OU-@w;p^#hPhrUGnPgcRVkQ9!>l8sRlQF=9Pm!gFI|kg zRvIMaQT{!5?fad%W`>I*L$$FaVmskYG<#K`+cB^5d>^_ekka;MLeMs&Q9JIj!yC)e z-4hro2C~K$sxkYa8gv%Mhm`7G5-6TrGssLWWE_4^l zwWeN+39|W6b#A~gs~Q2ygVsf|eLofcss7Kv1Tu2A{g$)?j$VFye&0hMSrE9#MD)GH zJr*CJ3Kj&NNxl0a$i+k*<}ex#MNI8G)GLXk`4n)Yf7&jGM~twxe4SmK6!*e0#fRv^ zDEek!&a{{*N%+c)J5U-$u&~$1G3XcKfZ({cpcR65{4PTK z`_4aq!mqZOrN6@{AP$C+|H32w-Yo!D+otq8Za#O2|9<5E{RfbvnFyHGes7fj(U|go z459ZbsAr`J~ zSk?6yy00%o?b#W~d`LX%!m{&@bSYU#z2T)whd=rC0N9$BmwhWvso~R3Sbj-B@t^ zY5G-sP5snzf~f*xnca?sqhBa-SbT0<#<|gG;QO}V8JFOy(4DrMc*^6qp)vOvd=Du2 z$V8+Op)_bER$9xqmi8JOa)D)e0S36@brNtbmX(TOIGwgO%ORUb3N^!f=Qa;x;*;_F zZ7+!quKYQe=W=|QsP1olZYpq`PTwM@(eRMsB++B=pk+_3_m{uGliw(bai>V7h?{ zyuRG#orQD<_wH7b3a|~8FU>qLXwx=S$3N62ajptKO10LWpUK+QHp$5g6p8HMUydlf zO0l-!EYOthOhLSc#C)QouvFlKnQ#aeBZQT1IWm^$SqbTfmom zOS6Ay0=nPCYc=bmd)7Lyr=X`_?nEe`(1~#^t&28co(=v0FUl=G!%{va**4V-LdZ)B znlC(>^zbbWjEJ0??IZM(f?r#&QK!!^Sss=NxO8}Re?B`;f4>Ne+5w?dh)F)$_f7aSa@C{d^vD5U2>3J~2xid#h8#Hl4kjo!=9aTukU7pywKIXumZQ-GB#3-D(>E4?|Z(7>b*(!IZ`~f zA1)u<$QH)k!8d@1&wR)e)2FNlzE1M?uNp+C;O`-47fu(6($xR3%^mEq`7u{7X~P|r zpq#<<=>5S7hR)Q^;VbF9iuH-|p`~9U2kI40_)~8^7mix$&U(EKQ8j*5$1l6O@;1nVBtKs& z$~J(loSE7PzFpB00Sz`cTWtls{L7OvQ^`|l?G~5iRm*Wje0pYZl)I$0*fT`Uy3bOk zTO9%;9|>BCag_CHD$0BktqJZ$#OK{l|6VVO*?CbXI#AY<=P_CSY@&Q*g+U8W*Mb{v z^0$@LT~7ZwxUlHU0%gRx@Knyc2D)r7sS4_6 zaIZzK zLZP(lptIX8td+cz>1CawjU50@5&|S7<)g&`0eI@*Zy5BRJYhj!RkXXdC21`bYbzTcGY=cmP zfRkFZmqx9yg~SV1|>0e;f3^@Aap*kor;qrN50}#2ii4$ZQqThHj1)<-Eu2 zHkf*VZBKtnEp7Hiy=6&=JVez7W$TLYcosl;%@YQ)c;p$kyq1cmft#|GhYL&^r9CP0 zB-viNTCOFjMivgxsC(mR)jtoZ(asW2fOLVrTNhaeDrv}b)QnCh1ET*(Zp2*Zi5dL( zdGv8LW9*@nE0L;kI~AUCKLm=ukgc&)@4arEW=J-&RUUR(dp2gA2E5saFq(XxWuBX= z5;b4oUC|Dt-t>ngJAnIUg?FTX?sdv7UpHk9pRtzA2JXYJ9c8*&$UK`us=+j6&S4oH zud|^+%~`hG1=UOL@nEFrtirHHbvzN>s`(dj$Kx%U168^;Q%w@VXz#>wUxJ8;*lPxf zjRinqLCS#i(>(RGQKR*HNNuZiw#Np4oN}(kjn$}oX^|d#B`GYfR3)dWQgNd}YegZ> zBng48bP58PjvTv-gxX{t&VuT?6xVTl_imSG$&9&tPOQ8z@T+0+7i^6#s(a91^5D@V z{%jh@eECG(=Zgeqq>)lkgq!F=5XaV&y+(}SWYQhYs`0}sxydp{mMI{yEV9V0;~T7x zz5X0hP~Gth;P%S7J|FG5s101Nn+FgZvXj1WD)Cer5yvl)K|_DJ1wNe}{!U$DMRA?; z+RZ=C)&Izy<2v_I1;4hztB?4dXZa_!NbcYMjmG?)g`qK3Ps^kN@ukPw5SG&s2op z4zBaz{YN!3BkIb|ih+`_BHy!)4Xjq6eYEg@c*#-gZ982k4~cq>%a^$qnMY7tBkD{r zQtE$@V-bTP++dD$kmh{XM*$ zll5-jUo5*jcJFu`?+ej{EZ^JMY@OT?7r9RqLo7R3cuQ7bDwH6x*^i;W~U5JrOYEP8%w5qyvN@|rPse_eE%%F)8EAZf>hwg3Ocg* z<;H8gU1)12R7Tq`C;q7>j?jrCi7L{Mxmj_p@;N85QoQTy7LgXGC3CYKpprNNyFV&o z<=ZJ_TRLuq6PH8v(#$LV%tlFho`l9!yg6T4*I{z4`QC%A#fGD`nzL7$OS`M%qqdi2 zwhk6k_jY$XhCk;%ZRGyeLg;Ds4zYY}GUF%OV0byOCj?rc-qLWenY5gF8SFk=v%i`s z(o>N-N9S^EFtHWmJJXW!JQEv(e121wzj<3tKgw&Q2jusS?7iBjq+wh!vHlJc@7V(Z zs-m^vRwu<#YVpHk;r{loh1D`nR}V4uJBc9gCj1C+5nK1zlXI-biuWG)6d+PDeh0k|u&~^J2)u~H zEK6gj0PH^W%-2X(%W1IPZraB^bMf<^lYK+d#?}@w&|dm;yoIoGulz0vR5l7;Zcf*de2Agd6)u4V)+4M_Pf<_eECd zz$8o{KP)ybPB$b~`{0CIt9L5NBtakavcdH z@b+`YmtW6jltuM(her02@xn>%=Ay_&>!oJr1fK`D?R?D~>S3L^2fMKUPxRem@HGGU z&dWKBk*1F&4B6NSGIilmZ)y z*m>EA_P#vq9vHyE;qZA2WaO})ijXVVySzNi%H&M;4zH(|4X#BU3-jHw#%=3|;%#jX zsB9mRNo=+;Yr&AixBbJQ>#^GfpPer!Vh)3$u6WgPPTpj7lj)ZkD~m&var|7oyn|TC zQW(F1@t&-welr(V7?=vNn!+%)>J&OOO61HAS3H%zt7jluGlQFV(G>*opU-OCS@z4G zj4}2OPb$lgR2FoJEQ*>)8*|3N0r()7-y4zaZ5J@&9n@iCS*QJDXE-#!d(dnrgaK*l zWhb%mHM5++_FHd}iF#;8l?-kr+*S+w#l|TAPDAs05aMBOi$Ab20HR1h-n)+|x#F$P zfxv#-j<3xD3}uQ$&TC;#d~N2v4%Hw$s5E`wogP-cExC=@j?@~EJvZ+OsZVA>g0ivK z%slTQIsA~cA{(?Gqw6qeJ`^WW1v25Wu2jm}(#u5-Kc z-Sy*q*Tn1MZ^sCdjfl0DBSEC9_MC$k-qENa8E{j2_TFXXwJCPiSGQy1+D((k%siV1 z^NTPDkS@FqI6ajwF}B`cC)I$O*J8g<`P-T{Nw#yZAzieuA+n^U(6gW?-FjS3L;I(MS|`y+-FeFYkp<|8;qVN-#s!eQ7%L4>AHbEkO?c-$YC~!=uh$EYuZH%; zGaeR8OtWhlU6DR(w%eYB+GrKm2r3^EI5tQ>p35jcR3klbon0BrmUaa;H1w2C>3ByC;RImKvuCzIy>_zWWYk4OKpT|9HbxW1&25EmZ{{u%7M99&wu z$&SbCQ0F1K$3-YVf5+!6~E$~;LR@k0+#Nrc>?bcYAg`YBk zc?fRbqgk(nu*+B<`4fVf?SX+&Om=D;{A6FgZq{}NoRV7J#rj{DLxHc&!k0O|p;qoN z6pDV^bmQAE8~Qhg$gjH|Ac8F}l#-IB1X#O(a;30qzpG;YzFN|8sl$|53E_57+vC3U3_%^6Qdk8a}wga1ROJ6Rl-QEu#C6{*#X!(&_{`8=MYo zIotC|ZRYR@kGFmG#ds#GO!S%k4YI#-8%Gm9nYMApfS;X2vLV1S;}%3z~B8!N+lY?PgYU3Q&? ze+ZDNm@JYReeB?1w|8al`#i;;;4~>fE#=nQyt>*Or#Sy?BBa&NM$$vQQ8A9%33=}X zY&dRvaWGJ3(PkS-QOw3PvL6K!acuQ=axghgV~7A6RrsgWW@i`oigc)AW@W2VKHr}9 z!g1%a9FeN2@#o^NaD-3=`{)#8u4>25rF?`~BR8goS9@WXik>@IA0HG{ z%~UykNFJN=3bs7P4>;cmr2KO>H?f__@SLARn99e2mwzmu6{hM35daYTcWbx3mOJR1N270 z`m$c=LSv4M#qbZj50to#<_u`1j{+%W(i!wO$M)yR@rtOGKz-*lq9Yc8(US!Deh~r${OEvqtI{NF{HkRihbT@ZMi@p_>ntn;OJ3Yu zk*tdFVwix4+(Hhi&(WOa*EKrs#U?i~ZA__S_hQ=Q4hBM?<={mew*y+=zb?68&*xU; z^!p2n_x{NNpJU;idvxjH$2+f0S5iy6>8NcPy7H~ZO9w`A7$<|Peq!j^myV;Y*0uZ%vz6WT}QS--#p`b4h zZ8$_H%ll{0L!;Z2;q$E263Bt~W4WohYgNv+_0EE`WqXqfNbmKU_5MJ055eBNmgyqP z7+-!N{Jn%wD;*&(^R>Y;>7UDlf*-0&zE$26OqY)bQc6dG-#T}O>m$Y~`DUubck5We z9e0_id4JrxlsYcrR-D2KPA4j!j+n+^B9#Gk^VpUt%-9p>mTk@CYFB@){&WbVl7y5W z(1_;688qeflnkilE&tS6<>fS;21-~>*@6r?^-BA-**AE-^mT6qSA>vSMn9z=aoU^0 zC|{})2-6xXGr`3s@Tyaw^JzTSg}c7iHB0?#+5o)I+)n3i@J=pAlaOS0L&n#qmuNOV zhxqF}`e_%!pA>i9!!6%APZMKz^JSM;+uuEW^**5I&)D>VORcj zAm-YTZk<$1#tIM)_fZM!y$cymf@rF^PfC*HpCbYTFxzHDhY0b0t+d;f}X&eOS@?IBRf z)$nozUK53?>K?`$qq4H10QC&LAg1JRfGS~0a{7A-arMD(b%W^l}mt%1&K zd8Ojm!~)mPplz5?dy*0Yw4Q3<94X#0My_m5=5m#QpcIgb`rEfYFNi(JdZYMsmT_Kp zA|VJnsBz2#iT0J~WQiSWt9VnYZVhdG>r7(VAuA}MF&E{jlrweNH*PtHzn~^Ef2KZ2 z20+2WZ||9>*vI)wEt>{wib3FPDf5^k;D68v0JCf4)SL0eXK(W8=Nr$IHo43e&&u-w z{N~{KJGm8Zz$^5F*!P=Mz;!j4x%0k;#*mK-U_^NSNJn6;Z(R=9K1-DEv6$ zH@(fTA-@TSQq7m4KP{sNM8wDBG%us!{ zsrg0T8MR@HK4&7xhJ)@*9RVN;KX97Lq3L*B{&MPjc!Q^FKdd6JR;jjeO4930q|B-} zTk>!+XJZcn&Q&ccKwecVP(`Z__T|czS!++9$NAvcxY(_pf!b6-Y&Re83Eap?Tbmv` zgvI8~*GSYH#NoRVn_8dHw|N-a%u`s*tMix$f=KllJm+q5qP6S*znq}W`Oht*E{#}* zAd#ss+-?w+dc)4CQ^zplqN&n-O6SuT!O`SL<>lL=hi*qrSn#-1&P8>34u(9n!pP;$ z(~6IF`Ppa3w0!i(MLkRwVoUFUV-BnXma&8K%s}_>)S;rwq|PPSP8qZ~2pMBQS$n&j z){3YV46Mct9B^&_jPux4viBIWJK`A(#~z)^;~wr+fVd}mE! zD+pBJasL!2Unl7hj75GD&;=x~&dGoOeJcQ%L<-B3t1@s_8}eXBlY}NC<3TH24{fXs zhpi^dj1+GK+goO8)_aq*u{|3*NQ^)*kO=W!trZM*PGBe0=k}V8fKJ(OpE@mcGEMRG zB0sQt*aS`KNE&DDc4vyQwAbG-Rx?2W<8g4>6t*s>Gq~xuO2J-qx^?TEa_HaB!1i?K zynI4$CwE-KS>nUN-mmv&si_9QF2FP*#Vnvsrz80eIiOC6OC8W!vc@P9R>+s?E8$yP ztFjYvv*It@3$2GM^ECEzn=1$^w3Zk8?;v=Pdt}Q1&E;>5nwwM^>BO4MF%d5CzWFb^ z`_7U+suY94;E+hCym8-=PG!)+1x~el4o;Hkj80ki%rz-@v#cuPA1bJy&!_|j| zu~Iu*0}5aXfacOmVfrtjg3Kb5{M7jjO|9tK#N9He*YIm*2-`WQQS0yg&M#vElpx;w zxQg3+Z3=)h|LJJ9Th1M()o0YM1XoR<*l$~&b8*cc%cCYI@l613fBC#Z>2KQ+y<^OG z`@ye&mP2jyZUrS@yLc@SKnVZcHZ5|);H|UpOLn*>wLl{On%1^(?!|Qk=Cx5R{aGHR z=@5X||0lx*a25jH>%&0PtA_Ow!mfxfjNcPbjLr^yZvsR+zrF#8M1L%cgo*t}FDtxZxScr^hSy`8&0pSu})EgBHZ zDJE;Uy5khSzzBJ7fY5Ht9U!#Zdr0bgJCr}ZLW4(J(zIv|BcaVuM-{nr*s`@zjrS%A zU=wPQDja~n&-`aNPURdJkEW%8;o;pJ=@TWjdqC$3!19i{8Ciw$(YX9lmTy;oR$2+0 z)dFx2C>4qHv@9=;t5@w+=06kmJ#c1VMQ~emYydT3^_q|UH>M&CF-Jh)RUB;hKJoV} zeq~Xf&V?xIDpw|Ye|%`^h3=UM8Oi%Z8M3lgzk8rG>nvF*G6gab_nM_keFQ@$mfrPU z=3wO~Hm3YyZD{5t-)8Y=d_<$n4*@!;05Zjp)*5g+zUiEL0Q_ZhwrYyw17$;HBoQ*6 zdoqT4c4IMeDnS;h6mB)m5uWNa=hdeF=W{x2=R#JpOFcR2{dQ-!!WX>_NAgopopl@E z0tUzTlIMDO9emeU$BUO8@0+E}D<{KF>+S03CWls=ry6%Ljcxyyt~mqLfMoxC`u|() zKR{aQ|0D<2U7)q;zfx!eanAo;2J-(2wyr-$O81}@PoHDZA(}bnjE_|EEa$#1Zf*eq zTtKp4K4>wA5so51F-r`4g9)-sG|0T1m6TPGZ5Bm&a%UdFjeA5H)TBQh3l1Hb1Y;KZ zsm`R_n;Xtj&#DhmI9iOwHGG=4~^1>hkb=$Z4ttyrwP|(0cmCS(YXp`bF)zdEzw|910*SzW4-u;+6+= zM~=sV`@RLwgWZbT5f0q!w>035rMwCpj(3!NtZYU3MBcC3Z*|ESG zSQ%;U&seJHq!*$i=f$u)S8u6IY-@^-RF~w{m?@{vzAd2HRjeQ{;)2v@l-Nh>{QNpe zMAD?z?X~Wlw$3K$mijH*t?b#%E=4dQw0Q4bS0}=&W=+Dvq4s^U`nj z%E1!2D^>BR+tbT(>|jUfBEDU2%eN$=5A+dsrs)DmUAdB7Np23p7xSevFFZP!=ph+G z;AQMy7eE#hBPv%$liTNG7M*8e0*0#vh5OrCKKgNh;p^t&pi)hto66K4IA%(CQ9yGi zG*+~yFpyB^QHhNdD-9|uK>d2JVqKX$qQJf->`;Z>c`E@b zz4BLoxx{A~tH+P1t*)2OKd`ct;f@y-%Ux%K!5x5R&-^rAS30cfEr*Ar-1jouDyCDM zyLABe!;V0eBuA>45c0%)VU?VM6YiuhNR0AF{G(b$gPtcwKhxT%D#d1WV;+UN<-h50 zDVPwo{^+*O0~U6?1Sx$GX5@CryM(unMtKFwJ|;+nl~~!dkDn5{t0g z#a2h-1rZ?qqx;8)Hk`KZl9eE3V5|Q1w-^2_PIi1xV=Y0`??VTrki-xr8*H@dnh+Hv z7bf2ky$R3=97$#BW;6DPl@tXMk%WSl3KAYpa#?E^TA?|j^V;BH4|RYINsKont}n4( zD$*7BMv`N3i!JDhyNyyw@Xu!*Y%h{FRVJ+Fl(VmUFHV7Vh^f`w#U~G4Hg`zHv)X`C z-#k~Miv(e}etD$&lnz;;Vm|6U5BS7k$jhAhNf`MK`D_Ge4Ps!ha-H|%qe-sAFsNG~ zj8!+GOW*)=r{{}2Hhm7rb8-_V)Cj7Fh_(Cs*gpk+!%uzo3&KIr4U_{2PxXqckCMd# z=}2@ObM8vwBEnKx-*x!Fj-m2sgmxr@|sZV6W)UJ#uOQ zziPB1U;j`zXg!R5M6|~ox{{T}N|B>4HwJXc3+JFaN1f(i#MB+HrWopr<7p1OV zTsqBr=D?U-GwsY8eclSW9+e%aLAhsMg$lEel)27AMYn5`P|#6raPGQb_DL|&II`xn z|N1*6#Bx{mG~bb42e3;2^!y6pbI!PykDUy{58Xq`}L^ufg-S4+YGf)4j5J9z3ajZyQ3b`5x~=1(2Qd z3`4~OvXk_*GN?IYEkzmf6>OsoKuW=f7n%+X)tr4czt|M}Ju$a&A9~o-?8v6YnU7I) zh&6^F+LbG`hwjtM)Lnh~SmNBOYG@AMl2ox6JBcFSk;#1dGxu@9a8Pbq?<336GW@*X zfe(h!0T8(|vT#zoL-1_-SIGI-^kMbY5BHoxI_N=+CMTaUG7r;?Bo0rFkowv;^o>;y=+FcNEx$7k=lmA`TSYSd zyH`}1sZDwrJ}oAiu7JNln$5zwi?bkp<~?N)NtU38{?VYA%`SHkouP?wSs4g06OVs| ztzBoqK2yI?DM&K9>-q(STWifux&qv0gXAHd7R!nG1&L-t^Z06^YHwL@qubfZeCxyh z*z%2JZyS^sF_fnJ=`upPY;`hEt&Zfv<%n-OqoHq?IN@qd0pjCk(e$lh z$mV{C!Rk~XSHgpn9~TMQF8rP)Rkttr@kX!!tpQw)XXWid6jYkI3&Bn9c6~X&X-7Z; zQBc`tGxMnbfQVfpwO)G;)}f2b=LooJq__?1ha36WP2Ntq*O_-k{19bHVf5XzZVmb% zf+pFJA=KVJ^G#Rc`=xneaSQ1C`V4cY7uos`Mr|~w#p!btA=a%Npp9ok_Ud=04Z|50 zu1n{qmdudlw`jOfZQiQCKRTMvgnwXVJDSZ*ojasusI$s&W$fmT5#tpj3h%JJ2V+{* zFA`B{HcZ>$*&iO52cVR;VISM(NAp@Ia)6lr}PC7(CHHneS+i&@C|K+!z5?0m@H0RtLdhUP{<&9%6AWB!)v$ zy&!+_>#b0@sA+=ha!*o8m7&TlEB=2-~`KP&;4kR+@Zqo^LnwMUQU zsOp1=SaMQYY*&oaqFG`-#Tn464u#91zTX`fyYKR&(oN`Pq3^3UIE;RJOd#%-7!h3f z$2DiziyKauz!T*AHnK{rhm%j$+0kA5! z#qY{w*f{zf>(6E z(}LD?G(7J^Xj?0J=8!#N+%!IuoAHVvd`7-KZr+ZTC z#G4+XR{Sb$sMr$^W@_FbC-`vhmA#v2m0MX3afwl@;mb?h&D0D$Q9()9#Z1?=^`UcV z6b^Yp<7I2ARG|Q?uuD}$rDAXDJE-dUU$B|hF7~s0#` zAV8g;{wd|0Vg-V`dZUrKivrjF!NT1E^!$|*q}aI5Z8ZVxu%>!nGjarwFu<*)Wd<0l_CgkLm*} z0K0g`KbId?K2$V%I4tybMR2Z-wP45qrD$>M#PlR;1i*-QaU-oK)(8}km0VM5ZR9BmUKG3h%;Y(9{ zc6x+cJ{+vddqe!=Xq{1EIz%`Bs$*)l8AleEwW1tK5o|pnnZHKVn|ReXD_#S6RIHP( zteVz>>3WuE@KxGbm5K^}!t7q~=9GNEFujG(VB6n$FL(atEPg=_%eyN# zeHv^#Ezt{>okx17fRW?f5{+ehZ*>_URG0;ZL$w_j_n%KGJZ2L6rL}}-E@^e+)v>wb zY%I;QM>fuT1-T05CK4Gu*ZJ@hQ!}^dm7(jmbr@sd~=rrBI9Y&y)>Y!r2 z{d)TN9eRmkckLqJn@|w7L5U@e>U1#`UnVI0?3+mT-u!}YDHoxcd$$o^wj9t1@g z+d2Xo&VQ`*CK)|IWkm35<&Sxnb_IlB03ZZNvHV{=w11e1`u@aoGa(Hel5@n6&505) z3_wEZnf-48l3zyWKWx<9|34y7z$do-uc-B%=x;^$sSnddzt&s%p-0(uYe2XZ%`_d9mbnBanE0}_hjXsL8pwgVGfaa z&MlQI0c*Yv>f)qynWIlhb_?^euBJF1XQtfUHJjI=;rW1hN94JiDp?gv6fUHG7KUd( z-nWwU`gAlm?7eo^rywZ1mAo9?_0h-kYi|T;AS5n725V#Y=@^ zra~Sqetash0>b=~2XN=y_qP?sWObT*GR1GbdARLt0mri~_$lg9B z(+Ho+aMme6kwXUGVCq}6Ko zoYKEKK2$-AbUtI4R3P`~1nrS)GO^NCE(2D&$vT^C)3ck)ZivWM3_P1` zbTo+bF@LbtMkQYThWN0>+J1R(3ul+mw$t9Jqex3}f#5FnZx=8#DkPLVG*%Adx7$~j z-dBBKr}Hxeo_f6Tm$K5V?`{&YN*uDpy$@5$D*$3J-yL~>|i_5vQc$>5F z8f@}c2HZS;Kz%+ay9aX6Rd$0S1EcO(Cr*iR#}8W8`G-RBKR%5N6?N6D8I75hrP>I4Y4?0#96t@dI@jbu}xq>13*ufO5o`(%ARQ$FiHUODS6bvnjL~q9_nn!b;9J5h(HZ+_rHK+9cn!#*YyGwonF3$YiqBK-xH3ar zu~Dr!<=W?~;u7{s3~)1w*b1=-XpM0Z@^wXx!Oqu`HFdYHys)l>s<(cmb(s8QagC3z z4$*dgGf!z(^)~mD6tgzNWo&cJr{nYyZAtm_nv$Cz6*Ru#}o)TW>+en*7kp4~(f;_pIu_bg4uUa7kkBCp03j?E1B zeRUn6)*h7-3Nkj)Yfz}P85BT77E&mW7w*=ro1YNcwcMr0sP+^L`%McB8yU)VCRWT+ z9CThO_jkQaT{H&JnG9X)I(s}}PHSW=8ELT4S%aN!&>{t=hWQ*mU&3Xo_lEQ-NxJXT z`&1&~7hVBEx#xxdr$3P=&_R;k<24SlO`$*(*GmV9Jzt;sP;pnytO#ZNJgjwKM{ANN zbS-&{yjQJJEr0=&&ucu9W_L|}PFeQx{PwVw@dziYm*B%iszWt&I!eE2E;BHIe=RNc zC1u`ea>CtgR9b&sacy~~3~BN>Ro*1cvTaChIfzsqjs&677=#iWQski z)wt8I@S}W`AVh52!OmfxO;T=~qxr5lO!Hl#&NL<=#nbY_rMp6%7vXc0yh`}_nE=5$ zjnOoAA?u-g$tq$~o~G$iH+9OYfB1msC53XBUGUhn1WQhzSPI)!$jO&?V&;HMaRDwM z-VImRNA%Vz>k4?J&|PZGp6Q{Il$R^r^Wua10~Z%@!I_LgFOKZ>IJ{dI;*XfnEvUC%kps3|Fay(H1s zt)baUTDn#^sjb5VA(DmenL~^x!pbC;PlhVeQql)%l5}D_btYF>tc9kSATjTG( zd66`(lyMZw4$lhK$hD*Vk2>%9u9f%Yni*rvc;(xCM)6Ku5Z}G4eYrAx*#yWdn>8o3i)Nr^j)k z&*lL2i_cGJQ;xExStA81f53S-W!=#IV5`9?X!HZCw{_o58pZaB3K0R?$wb)Y5pOCNwucS&q%>8EK7rQQwQ?Vh_!LQQehHme-cosfeJ}g{1!joF z>Nv(Dq9(q!KtRntLAxQSJ~h*G`yrBWF*9(iXmxRWRp1K=LQ<@*c~Tqe)Jn1g^kYQ# zNIt3&ZUC7qFUoEk4Sx->M_k&>)i$zt{#tx^GLPbADq@=!%~T}TAvn?>kzZ!drY0$* zqcF->s!^Jq)Q7S>YMC*v6RdLKQwC+)U?vDlAM;N*T*Y4~p%!tPkrHTf*;cf8{v)aF zDPN8}ikh3brpw>S*39PfWYADc>Qt%g2HPaR{MqvT*4I8m_Z6mNBN$HT8ON{dtHr}0B7gVmynu74TOBtfEWhoPB zd@!Jl5R&PWXel@3@-=m-?+HZP$YD#CZ>PKhLk|(Ps$p2jNnDhue_QO%iC9*tNbnji z5a0f9+`V^LQ{VD8iUm;=Q2~)6C`d;TkP<+GD7|-qP^1?HA@mjtMS3TcK&1DgG(%O8 z8VCXb1SCi=5s=VZ@^19|J->6#?>zUu&vW1RzW2HO6?S&^nwd3g<}iR|q18zvVotbg7ko2^jl}L& zWS5N(^HMW)_cJere(k^C;>b!K4ehJngt!uGjgZ+s zYhs<4o8KOb7~Gxua-j&HQ?{eQ0UWEdlCrpT_3%=@f&jtsZbpQX$EwS)Y<1g^h37}9 zlyQk|<-e5<)|{P- zy|8iou5DgHhU~^)FTs8K)4n{wp>G{VI<#Z0@b|Bo+`o}a#y;v|*kYOoE6xFPF-`?~ zbW8W2aVEQW{ST4>ntT7Zz2y9VB3<_XpHTE`XpUlx88glJ__#H^8cqt(oXhJF`jt&{ z2T0<@?*5hdd&lSNul5eh(U7bC1XWV)e5vsyckp-1&J~o~5zwteX7Lxof7z8Z3z#V~ zvcH??9+xx2fI>{N8-K8j3~-jv-brcar@v}RPsQp)2K-P}yy#N==n?A{}88=I$~I5+-K)w#&ri7L<`YIW0NiEvl5FZN%a zXA}wHlmlr{(I1EyvyBd8q&C*Cy-5Ym9B27&cg8?kVCC*s_~+&O)9e>z-y zJI(ozKTq}hE;o6J@x#DE$1yiUxpp1)*hY5^5Dn1j#7io3#(rG52A|GuFl=+Ofo}x2 z4fbqr(ceyp_J{tcbK>(tV2MRR&6aAv$(GXFvCyR`2X?t+{uUPwEl+HBUBV|F3rb?Bkws-?B`@qFcNHurLRgP}P}q=QJ4A3# z_zGs1bS#LjSu>uh`5*%euyZ55C`;WCHu5rUJMLXcoq)EfCHi;688Y@>DK*D$Nicl8 z%-M5~F(^_gQsR!v>BsgI@7&tsG#b*VTizu3#SJW_ z_EbN##m!C+oX$!hz33q)W6?lqiMd@`$huJgAr)$(*03afvm>s>MEtm)rvC)&bsoCn z*}*1?JRBA7-&3=viIad50)`DRJfkkY6?dtKIawMgGn8lZ#3i%o#EWF%FLebHqnO|L zaR1*2eI=wzycxjx^Odd?TPcGqr> zRRcx#sf~xeM#hryCB@Mp3U9pJyQUo zBLbx6U6suHk#H2Zc|Mo3(+DRqFE`dDltQ6_;ynT$r^4>8@|kO&eetT2dUREzYftcp zIIDZq2siz`P=G^)rNq~o1Vs#cY#Otj&urpF8}?2M7K!=dU%v*$7!gJx9U?PQxVV-FHrJp?r>G^P7fp->jH~w%> zxvgCQS@B0p`4BWv*c&d^_F5S%Mabc>H1Q69ta6fo4HAuTD|#rBLt;kr>3#y{V@`co zJuv*dI%S4iQ5Cno#Xe!)_A4UW$4<4PX(x^G=hD(I4HS#-(rwWWleejpEo!2Lg{+Oi zDWB!y{!R3h+d{zL6i^jwVC;1_k>R5sRK-;s+fx@O%tYVdyf-&AMtif>o^A`xH|Yw9 z45p{)mM0Sdb@I`rOGdKEC1BrW1@2(N)%^1`8hcT2h6+qMmIp2}26ropTcIG`;n3^7 zcTtFs_trl&=+DGtYq72;q7i3&3Lu$Z-x=Z}#la~tpduaC8tw!HgKc+~Zu!T}TDgD| z(G~j=bRXNtlS-A2OY<2WD|2!lopWEC&xqy0@xU4Mj_mYS5>+#Tf-!A+r$lNh|4m`S z{znfJc}s1Dz@g#$ny8~U3pA4Rlzk?@{s>g}M4$v<=|cJUl|}3{gnwLY zO8m+LHylJ*70su7{s{eW`oEUn-&41NblbkW_uk7hFEEFXSS8ecRH~7Q?RQjgi4?~j zS!keo@0y!20G!@q@4K1?0{LN3Is;d}bTy$Me`Piakk776s?$wird5^szNH%0s zvEM)3dt>`eOXPmmt$$~U_qebs=xYkwZ}F^@Dh(SQ8)ndf#`I!oi!c1UW+nv|uO+H# zbD4x+!V3J`H2hiplvy2vr4s-4yZ^TI|1Ve6e={;y$Ott5!7`mE+rRL?+z_a1p!R-E zw}n!(%J}cmZnGCaasog9`R^Z>Pd;es2c8Cvk`5Lk1`UJGw2$(hQ z`G~;<&51v&`Y{<&yUPVgPp9MKW5=)jSIFZ3rffb5YRdQF>&jl@4|aG=Q3eRQu$2ns zqQH1zz_VEH*eQakT$_2=-$e37N24B4MxfU8It7^VZL9`to~@M zUA2JXTr|t7wENOmE~LL3VXm7<46J!FC_vUdxBFy34QqYExvVI+EM}f{v!ef*zLlhA z=61}MjH7=~5yq_>)w2n9^L;i;!KInm;J>{B zyG&)e|8r)ZD6*&#AbI5g@lz@wyRKysTd=aJJR0^UR8qzf{9@^A7Q14!yQk;Q))qo0 z;NUw7`XSBuy~9vG($QAy_+3W|QXAYWWZ~Hay3^|&!*lD*TdtPQ@DK#>8g#NkNpcLT zmy1-5KCeEb`#J_9lkYj*8XTQqXZ~$Ss-?znC&a4COy=NQiK5x};h_gFfY$p>a0P^+ z*?oCaWDx_Ce6ch13fkO1rm2Zs)kP9TnvOLVhM_A%x&g;$>@XP*{MLquL>#VJx2dT> zBO`uz&Tc4QeYBn1D9yrPH_FAoZH{rF#WuHFsyJi(eii68UCOBUT~>YUxG!EG?7fl9 zkYn7RDAe0kEO9SiEtLQ!c9OJ6Nz=3n_f(np9~j)91CTD62O5zO6Um>waMU+-6g6HC zCeDI!A8aBbRdU0NS{<*8=0x&_ot}fV(-@of#H0xcJVqY~;kR`o4o2;2L&Dnw;?Fb} z?{&>vIdU%g25PQbxw!X1U_Xh;ZKMN2mfaNoU~Wr(F{^!gy1!*_rqvEOn1}T9C^&*% zronxBCT|mIs`F;?oM2(U(J=_R*7^yw-DXEG5E!^YpkER3CRPFbudO*7^(pyGt3s@` z(zqX%$q(O7w837YnfmhFlsrV#l}@ZdnMWt1Zy?2XTE0v{C^xd4GUWvW!LQVwS8UO^ z%2u67$JZqXFzc8E;)1`zDu@}o6%E<6v(^3gw5 z=MZ0&Twygoh#6vQZ|PJQVAT}?jY1pz7MljPXSXv*GjkAD@F8wPQ^VXHY0`)Vzu3VR zoIzej;K3r^2faTE3i>lvm?Q@Lj01c%GS*}~>hW{Svs?$7TNw-zUK>a4f-(*MHosc) zbejT9Crv-3eVsbSn`7g5f!7gzunaU%6C(Aq=nB^}xAkU!q2q=J-6;8S0e&0MZiP+=UE0~A@Z&nt z&Xj^dlc>{3p%2~mn@Awmm5u#de#6Rd-}j`yU?A^8_4d1lCGF3pd4kYokqETEyGMAY z5C=>}mjdOlw%QteF;pYdwCNDrkCPyNI>;dn4sLush%r>gcx*>x@zD#I9bo4m1^qkJ z2wh||v5L!=qJA<+H57tbe7tVNwRrF|qF=xiJ6z)L)$~uHE?gfXLF89caYEO@#uV1 z+_j|Jv<`GU)50glZ7HQBd)-@S7|pZF29yAjDJdi46QCRy<8Cd+QUmx|eQj3I#Vktm3W$g`}b*H`b1X6MFlJn)Zz+|z=1#V&Y*EJo?AoxA)yt4 z8|`0%`vn4g4}ON}9&>2~ILbWWI*i`k@?-(~e5`7iwTA;EFiVbmY$YUc9bz(N{5F36 z$Rob`Twb0DMD0DlCxqW86dA@P=lX_=Q6Ys8e(5k}gQ%b0nk6kqcaOv7NksHUit>Qu z6RT(l-!s#14Wizr*Eu>8G?Wv@? z02JRSz0(9MDqYuxD%5(grx}Py4XBmU@rQ|kyLNkf8=b+Q=VBNTp zHKtzkXfuCKH2B~%`w$!Uj_#8XQ(OPmNL&07Q}($>R*CncEJl)U89xBye_jynM|x4i zci*US-#_sVlC8x{ho~bx{W1so6LEezpE6|2p!D1tsxL@-0Krk)#MD#9LfhwgIOW6B z(-5A^n)65U26nUjY>t(==-7<-v4gld2sM-Dkwu}nVde&cpA@=?3mDbkIq z>a)aF92b_0($Yo!o(!K zl+z1W({#y>MxEoRckpQ7C4*HTeRg+n%?s|2+Sihcav`O0%`XTln^)^zK>#+e_|gkPUCI^vfGUmyPZM6>#di(zsbOr0OlgiX-MX`bzzVnNLCqAekiOi# zce|rUa+nlmpca5l(dzyZ};KR&1jqSV3il}y@6sr>X3zaY0&Z?I;)CX38LSScr%lf9DC<}4@nympmhPEhGaC>T|F z-2m;L%+iaZb!qI>yH)?BEpoT&x<+B;HPfQ2hB(2eW}?cJ`(1NgAxyS9?g}n`kBKBx(Tc0rW~Hh@WL@Xw9m8E7U_{?Iq`zAP@s?sdlxz; zEd1eZT9pktxn)1SrJJXk@iYHEpDadSI%{}?=Q9u-=`u-(e8Y)W`tF7)n#3HV529g# z`?I0u$9rR|otHBuq?W#?&VNUGtR2n2f+DwfsJEyQP2S6!{Vg8}V|o1)f)GXtzbx2~ zqk;m8!vhLU0EPwl9`*yU+x5ry#ef1ZUOI5)YuxOIwEC;`R;jTiKfTuGDr^TO^-li- z9Lo-O^DWNk`mq8?rmOBoj?6{l~J6B_WH}n zVBZ72By)GSh*TT!Yx=~UtWA)JW}*vkCf8w=PMQ;#N!G&t=*j08JHrV-DICmcBKoe$ zRMIe+Y|#I|Lv#3TLk)(dK#^axzfvIJwb?z zvgASqilZl&p7(|!5W}ZrQ-P-x-dfmF!T=qRWLgjYU%wnX?yr8X=QEBkfw7|70#V5TD)#pvJ;k_Qz3%8X1xv)2-w@D?03bdOVIa z86`h^iwF}gEqB{E?2HvKD~=fstMyIyHnmz zK#PrD-^Ol?0s(xwFsB_EH{2#P8}JZIEnJ+RI>Zh#&zWbn1hHSwP+!C^Gx&MdU7q-dcB9QcD<0q zy-&nPCh@Obyf*4y^98}ujncVY=+c+SqiY5`_F&M+4Nomp4FRa36E2_u#BclcVr8!d z^SaqxhUlj~+?Vm)GFXY*z$pI4pcX;YyyJo{6oTZTJbOri! zhBTHl@lNBBfQPB=_?_rcejG>UHAh)mND;LB<3;aW?K2MW8oOTPD5~qlu*xR+hFC4< z-%_z~D@m-g_o;L5exYvf;sR4im?jAI>n3jG-EMy;*4dD)#l&r;4Xb@N_Q82la?@1T zTynEX*UI|Cf_l>QcwVix=-V-~q4W8!jxG~rQjAHT5E@ub%>0A*_UHQgZG3zOev7j3 zt4HWQDukV-s%c^T3#m#`Tz0iuwx@3+)IjB+k871TYH%KM2NJB)bV4aV?Jz3kj9N&E zdb#O^t-eJOd#ET|Z5DL0Rx&AhM9LPlQ=nCji zr)P6swWT9o>12dGj)+R}*bj#b7%6A5iFlkJzUxk_Pd?OTfXia3W7qOraL*2O69`aA zxloI(xGj>u)dE%5?J_cr5`K=KXT*X0qcRehh-h&j0B%|qrQ5WbWOIq(W5+EMgRwez z{b-#z2+r(M0AFlOv1)_bWqqvGCuUpyQQf&sa-kNN#H(H(k~;oOeaiQ6glgPV+UWfq z`3g3*Y(pjxyqmw#yY-SU{eF@H>vHnFyuzu|PNh~hD_6>J=O2&Szs{Ar3udL$iIUde z%Ze`TU4Fd105Q`_GFxIbwSFc*NpSkDsQMRRGqE~Lxsy`2`@?!6W7y!Nu_skgSybXo zI#xpJ1O=Z%No0f|>6ESry=zkbN06Zm{V%1Q@Iisi00BpE;dSR|afWj5;Dgt+xou@v zev4W`CE%tsXI=cOXIR5-W3yxv=aq1DL!y2uy+xMrijJ-jSoH#&(M4eHk|>;!edt-Q zkgf2|_5JhhsyN(x{KqZDzCwjG6s^8moWp0o{6@>H;KGOcpVV}){aL3owUnLS z-&aj=c<2h}aJ(RF61l|KWU!rElw_HoHg-JUL|)8#G+TCYBZd77EH^a=?fa7f_mHFQ zVHSB>{K6-+?=vRH_!jG>kD}~lif;DtMPX@^hejI}hDlo;e8txGrr|9wJNb2!?!U>; zecJK3gx=J!Iugmlc_xivwgSdDux)Jkyr)ok#SXwf2HC+jaU;R4@#L%L+e+W8O(mh%wDy6(&TbVjbhLbvt03op7Exy}nU z6ctX{trsRtQ!bEz8B?ch{^SPuE4T9dY`BKGiyZS(KO=e|u0^Dt%Io!xACfoB?Yp_B zf{pAibi<#zd6OqxU4LwJ`~$3QP%vuSNMFI7UkUT9NP*>MpKD?m?k|1`gtGSmlv-h| z-JU%=tJ0%s3}L`~%SY+WIMR)C^SN{rgA0+zo5rIohJ2zOZv`G|gZI!S!6_R9>RP?7 z*SwA^3Rz1#Be%8mvM*vIT=y=fTdLR(<1CN)^udbsH_G&@RTfH~c7*o$(VdSHulf?T zD+t-R&ejG@4RW$x0N==>Ysc`lF}(W)<;XVg$nz})UgAbRXZWRt-mb6l>Q8I98KS2= zUEUL0^Dk#9h-Ir9Y@J3B28`79zj})ZS6>ksq`mw+x^se(A=+i)BgZ=>VBt{BK|)4N z`HGq9JjZ#8#%vx6Wxz7kPFA`H0jUR@Wtu8n*<5*DSQ4umHc@TgmDjTeEs?O*CdTW# zYZdjV=GDwSFl%gO*D6J*UNH5hPcN-$O-X+kuEJIx-jauwx@P_HJhrvZ*!m-zPtq1J zE8*4O21WkN3g@EE)OiNX8)GGoMM&UC#C`T-nt(gT*T^uIx`EaUiXV}wXkPbfza;om!x5?&4bce78rjwzUr`|&IT6MY8{QGmw|vZ8 zqt7Fq_}YzGb-zuhvFiz=E)TSGKC_a$DaTHyE1@Ue)@zwzJ>nd+a%J+0OQeT3Hv?2s zTLc8}bRSo!#%ugQY9A}azL)=_;Rups;}81j;cT3o0EaUkaDKG;>e3fhZ*lk+Z=6;y zF7Gb%*3n4N-pEC8=1>;A1;M9H14Elxy39SAve8Gy+>W94k{OPm!N!V^nwE#I}V z!6$s>soQ;0q+?{!o2$k(3_NG94&?FJCSP5I*m^R&je~F+^XbY2B&lsGbf%wqbne4O zv=Hp9MMsyc+FOg8MUR0uv|BLi^5Z|3rp$s9jks<7mk#IcnnQ^CPw43;&$dTyENnNw zaWpIW8uDeh&mYkH)Oz+gQXhhK-X;}3o z&P@n=x``vGBjsUCQDqjTqSI?j0EE=Qp$u8(b^|g~nv`@P93dq?wyHkuokrPl!TgBG zb7*P;Un=UgQAL^Be1xyMq1g!4rPZ0lbiuqD#}`CdlvEe-ZsR9h?cScVtH!wtN9i*sfl_)@)c3HQ)Gu?#mVd|f>% zRmxKs%?ssu9E;h`gl*r)>yukQ8G?rH$`x7@YVqW>LW|+in*G(8mN%d7; zE(*KDkUOJ=Y;E$kzX8x&hqn6q_!={>6wkuxSk?E=Io&9?2V}k3#m6h9DoNan!i}mM z^(*X@C5$uzn%Y%2s^)lCJQGaX4occ32e}<5lH-4);HyR52vyV8V1ZsaxF^m-Z%Ohi zt%!A^0CPQOq*+KR!!e&I#S@uRKpN4Da5K%6%9l^rW(G6c_tVi4NS2!tQAgOFP$n%5pr}O5?1U;@#?8dr*j(XyDMW-bAwiX4)a#~E#PPdDS$btavkWTD;})aF?-! z9z~m)4*G(+zUnW*FNqiKj+o?#!(J|O3dZuoi089k5I`Hh{x zQ!Oi;=7K+kRd1nqN?S}z*`qA)KQl@>LHvwy#(k(pCpiw^ZJQK4AJ3fG6=T6R>>Xfr zU?GmVY9qaRBqiv}d75`$lJwA9m{BSiLlv{WY{+vph8SMvvI5>&^N0hGF%5g);3eHp zlEW?9`7eP~vr*K2@*|xQb51AM8e!d>1T~xN^k>)cQR0db+e?I$9HITajTFn37GY*< z+Zc>faaLDl4C%ZfHvYIOJDe!sNDAX@(k|uP>4}9h z;D`oO6b!*PYT{n(7iBo_1ZEyv=(Eb3&6h=4q;Xf9j>IVt28-YRL)kBKpMtitG>x;q zw?F&x>bK>r&qtN%g81;6wb*e!5njqu?}Q^FV$3QTc-m zm>Glq^Tsz*^{cjL9+}wPbhsl}7XC+-uDS`lyLQFx_Skjxa}dW!(6jTXST3mKz}0RP zWeGnB4sH`}^yZse?OGiSCta_!yr+KK&SSWr_4|!szvVa@7pt5Jys104>*!6QFz28S zmfF!lxb}60QEs68Ek0T0M9`uzR@-?eU@Jne&QS^=X{TAyCT|Msei4ge zQ66I~PBD&l28X7JJHMBGs{a^cgVmghi?8oZMy`Y`Qyw>EWgR@OZ%q(aq@eh zUz%+EsEhS73qwup%;cbr#vBlQrybvi(<>FVVp@6^m2A&xodtG;d4FrxNzb(&HI$9Z z&Vx*g^Z(rClPqXbe3c{_H;o%m$a(UIJ^erV>9s6|19tm&Ed?Mpu~!IueX1yt0UUV5 zO4?vG|D9K2*Drz7Ju~!}CS0#%JIT2MJ$A9_di1py3;BL;kCVloaZ6Zf^*rSfjJU|% z$dh&nxaVE%f88TH9rrt>dGDWYlRlyFC8L6~j_EgncW0XkNfqB+J8x3YEx{ZRitcU@QYt?G&QZK$ZK~6hDIxr`xx)o)2bNvDc z{I}mFUb_PcWLIqfRI`=+g#5y%bDYD$tEUO#gF*Od02Jbeabv^7!(+`(oAnEdcIcoj zH}(H;`<++1mu*QqZB=cfGmzt--|#K5@eTp=eCBcE){ijcv@9SXrz1sNEp)i`GDEf_gDdgc^X?0Go zK#PJ#vwulqxA(J(3dmzcp4Xq;<{@s?+_fRyMn!JrU{lv8hV}PqfTmjR+8J{L|9z8~ z=Eiu8iY7A5MaT9=+zwq2duS=+V`VQ?{AH8)21Df+vT}Y6x9QiB!aJ@~8%bZ8U zI-Aa}L6}6Fo;zzawM>MQ3g6Xv(b)i(q6M3mCf~mpB(0`wEpbAV7Ij}HY@T-$piRnE z0Zq8cMIX3pJd4|RyR9FojX;#>fb*8m6Y(>i&=T$OsfX9*?|e_ErMaKdT(h$N3T56Y zT-$f=bKi0wDFrRKd7)yfUEC-vk$v%?v(GN0!!7VtPe35Nw!dec9}p0*$C>X9rz35O zD`sp~JXVBlg7e(70IC|L$RLIS+pNzgmVZ6K(`1IE~R^;SLV<$!KCF+ip|Vpr^E3s2ZsgXH!n-dQ2EyH&o&1N8K6gVfN&dRvWI9q-Zly^qYKe z)Ead~jOi)krnXI5BPy5Cd?l5F(q^jP)7keJJjsvD&>G^0W8M-jc}BaaDn{uK|t zhCa2>2bNu)ZZ(<`dK#fVkh#c>^&AstCvG&QERqELkJf{IW|gk)jP4q)!jR_7(6?cjLUiBeN}${Tzu-cw_!NbSBU3sQMMBJc*FStta=O}b zq?mBMdE4xVcvxZ+Vc8irfG7Q$&|Dvl`DXs@cqs9d2mgMO=lqYsrM3*BI<+-3XPD6q znwsu>JEf3adkbhp=@$_EyW9=wYnIX6th+(2KC0hiNNht0b7BN*%g;vnX*tapv!Dly zD~A>?{Yiq+ED1``V%UQEG0j?dWlJ~1ise;&P z*LH?kGmmBGAI~)V$vrsyW?q^o+Bm8v!?V`+r z`%?pZ=2^B>sN<5Lv6RSu&2`hVb*2wOF|3*28=dP8UQ?KluFu^gm{sMpbf?9dlR~ZX zWsVKtC={5L%z!z9A<)3G5Sh|Una~|D>?X7Z&Pz&z&Z=R+nZx&HU1-beY zbWX9d@|dz%Hwdow0Oxf;N<*)7p?Jekz67uq`=~AvEd-4Xb(W9i6WMLB=s7Ex(hFaB z!{x82^ULEw{mWfZk@iQL3gi*i98YxwSj>orJ2ZBJ)TT|I&-Zl957+&LM%uvU)eFOQ zQ-O!Wq7i|_%1B+{HcVD?6|7b!j zoTs9oYAx;aEL3@Lw3$lr<*sJ*M9O#&AI&W^)BgIC1aLq$scbf47T-FZK1RsBr9jBQ zMy)mz0?+z!8FKWZ?(}|eNo1x-F0k)|Mj55Gy4?WvmWQpfDGHCtXeM*`Jhk@+c2!?m za${`d)4ZUlYincuk6zW`54dDvS3)$DNOPHso-7Z1f0QjA!QP|2z=jG>G2c}aC{k&j z_2<3OoG_!*Rhok&wfWNLpc@|ET03oKzIzs0{zEiH;0i+U3ICH%I?}e*jm&F{X~z>y z1$`0EvO@%!r)t)e&8z3Vz4zCt0~oyuMt_Y_!_s-z)i=D4C zww4LFr||mR)m_nz;%TIytMb$QU-a}C>utdMCrhV{hu}DD#)8go3Ysmql%V?W$#I}j zaxLms!RyFyu=|na&MT0lr5#JR^`W#;a-ydQV3#OM&%^1~z}@)N->k_PzP^&tz|sAtx2S|~Bl?xx?Zsl+1>70DRQ((3sT4f?>ltyk zDY)OTP0!hi&szg@M;M9-@{3QxJ0m0EJI9bs+^YH}TRC&aa}!>4Oja@1?-e3}YU%Ke z?TnNDOn8~PEMV1|xmV(E^bRHi#jEyA(b*ESo2G?(bxe27-LKI+8j=JBg@XW=^14yE zk9rAqbn{~0eq{I))~Q}endg)qwm)zGCg64_VRh5mNM}&|1Yo|U^f$V?9}&c33TkMm zT%Y6q?umkF<2o9Jl%#$TAFy8~6(2NW9a$b@^sn;AaGhIf`ILgX*5VNyNFGCyH=!4h zu=-vi0F9z)JU2wI@EM(H@!sN;>PAZ3#t9fz%1yMNeSf>=8(SB_?gn~e_d0&>!Pa;g zz8Bx*XND5NL+5b~pH|mz2^$_vzkB$_e176Ir8u4P_8RJ^iwp0q1Xo4#0r>Z)T`fL& z)U=c5xW9rga`4DwI2yRy7rH_yTwMBz6b$o7mh4a@h}){6D^9JpKfy*>c?#g|B^&RO zO*;wVD&ZfHh)ZhYqudkxNIqGPC#|d(*b*bZB74UieE5aq-b0kjuRy;K(f za|JdDh+M)EK>e+J(#$~nU9Miky7MxVGMWb0;`~M6au|L7QPQx^rs0K*T+dD@ICE=C z1h%%0hHb$#eYfTVxO$P)jc%T#!EcIneMx~2-2^(z`dLRwmX?Rmh#2RCy;+ZDAV4EY zEtsy`?SdB%>GJ&d1@mQ^+KK|yn%LYuu#(7V0lT{9JkXlCb7PCbG|9^EH@>W|+UNV} z{Y-Ja8P1xqrAQo>nD^RRS#5sdEw9WLH?s)2CYRSVuaW6;$vT7xu3Pd$w~RK^?=&|K z``(DU)74X{@moMAA;&wl@Ia&K<2P2aKdIP*b-t{|<7wc#;#H3-oJrYU6OUlUT(mko z0%smEJ&D)V1Avi9a-kE{>uRQvd&W05r?A+bcJ@Wy`V)5u0LM-H_0--6D07I!kjIZQ zI4jj1bBeIP>+?08(lX-*u;5nRU;9AWc=C|u6-bh$8n zPmTP%kyHor$@A%%hpyq^Jhx-@A>@QlwR!R3A6Rj7(~Gg?sEif7SlTfmraS#HiZ9u6 z5yI{*A?BR?_4AMFHO%52y+}}`!ZmA~CtMSY-5+vuT>xE>y_z)lVMcS!#~JBUx*l=S zRO)*2%(L2*iTR_e#pXq5HV++EpXgal+XtrDRlYu(Tf5LKPL9W>d=qUO>bI$GPH^Kd z#5!^Sk%xW}tK{iKh4;{tC^1pH%*>$DbT}AolBl4D747;-X<;t#KGGD(r$*5N`G{X9@iv*`4V1FS(}tI?EAvd{;kvChK;6K<1!-E{ zgXLH6K+b{awY+~vjiQm?bL%TjWrb*Ye$~%LOPwsbE=dKT4uSh$W5YrMbt9p__UOL_ za4O4u=KDRQ!E9Kec9f7_>gjVPx91@LA=m^cBy*Gf6KR(JDU6W4{3m$C(*22)yH5S# zpkD4Iv;dWzpF{P6+!gkag{K#Z*w$f5f2(m%5RN|Kls&L#a$31F`S z!kO1j4noKN6U&Ll3^W3d{`n!2Hk$wX5M_NiEXOhH$uK}30D6l14I$rjkn~%Iju%1n zFF)`Yj{nOIRf7fpaznUQPqpelkMYnsaBni_5Xk~oIT!ISEO`AhwH}HGEj=P%tNb2q z9v!B2ObtpH-;ZPvZ(eTR?_=`Zy`;p`@G4q79k%yHfuR@@Kv7#}v^4dl!vuRy0J3SO zNZ85S3EaG6kv_Eg zMAfd+1bHOWY`9jnc0^>1Xhtwyh$;qz!*mk+rh|W#i&+pqUBkTq4V&7}lkF~{alXELJd)DV(&K5fmvq(37{);}@vVS8TtaS3a_ z?47~=$X`g6@Cby=f3E>a6M=0~^J z$}#aTmluOY%Iwp=jO?VfC?gi{h!-B9{QB;z^+sMU_*k*gq(8qGe3BbGu_h-IrSd*t z;Q2zDmwVeBxyv2f+fOGO%)MBMen+gNhU?KwiwZ9;#VR zzr`soESyW=O!r~xIJR)!gkp3g}|+v zmU({9{oW1R!M#*;#&mLW-JP%qG^$l<{AZQcqmbR|hRTfuF8uS&bu!qooYcF3VcOIY zZ@iwv+popWCe@~tz$&+x`^$>)cF8KD5xsP7AyCbj`a8~(uKYsBgzR@Of`*!B1X6_^ z!nWHDaqYV)iemfub{{wnnW`Gc7;STvr9Lb_a|QAsDUGE!#GyPu@y*rRRQOPP5M64g z?inN1-H6?^_f)zDM$R!k(wODGq_Hc9lgehtXQ*G=8h~wWBUYEc^`@PUX}2A@E-k0i z)!d`jL;Ed0jwQg=!Js#>R7#R&Fe}VLKYt}p+~eA`yWN;ts)&@NWJDMe zL?6^|#GW)?d{P3^gN0IqB>ntXnbdX5i@5Khg{K)ij`!NB*+=JuKyY|gWaij4CT;KF z4nc1d1)J+PNadxkl2h~Fk}PGsGSU|&1+*1s@ZAKsGS@Yrz`4%Iz&YojDme;jji(v8 zehs;B-sDvseOH;r1?p&9%KglDef70Z4tOR?q0X6HM&Az~m35`_M>l8%5zHTFd|pP4Xo%!HXIkf^0Y z_7)hF*^PB+!Du-VCZvY#fYIo6K0o6;qv%OMm?Lq;5IY*R^)*3}Bp3n8#p%7z2*Z{hoBCHTmUH@{TcaE#x> z8pe|HrmXA|`F~t9+l%E0xM7s;6EoF*PWcSp4&8D1hHe7t`p~Rt(lk@XcB8D&Z}n2u zP7r-D=n%W_lsTKu;&=QuQZ;?-oA>i;URU<1?O{$aTT4~XKR!*5cR1LikFhbUnRlw) zlDeg9(Fu)_*xj2H=3K*HGxq`rp8E?XROmFe@NbGwF?M_hdG*y&Pnx{Ew3uY-%a^Sl}IexNUcLm znBO(?H;auGeb1nr?o-EMgcBC~x~XBy!m+0y0z>nEV@w$y9c-r0Du^+9eRv<5A}V&5 zvRtWbS%3Y3!z-_HJ9CrxUgQnEi5*+TcN`Ql{;nYt+*#o7puwDezj=eX1tq@(>$JeF zZwyXynpB?7rax*8?d6xfURJ!Mzdz1qW`3F(c>!2tw>bW?sNpk>4U3qM;*wz@uHa{v z^T@L|+x^~DofG&hRVPOJx--fwTJzN+{>O`i5M@qZP5_X25%)$SN@>5k5fO{X{GKhdTKOOy0~)U77z{b7>V@ z>Vz(a4jp~dH)e91Q=IxVaq&C6iOKom9ntP`{SB${5jN0IK)*3%5siwTIoSGeQnDnV z+`h7ZJYeV(v%xE2uXPiW2w*z>ss zU?l)(JmQZ(mq@L6f@}zXJ@5A(N#WhUJT>qI*~{_2obCUCuYi^b=fICO9?N||Z7;_^ zAXcLEV*UQKmtSawX@lp+ua))acvmtlmA@gG>IJC4H371uhkqk39%YPtEBU*4CDLC! z$YW4SAIbDs{)UQq_8`M~PKfG+evQB`i{nLKr;Re5TSl`p0dLyc-bk^c14ocf>&sf(W5_IBZL;=zq!Khn0|n3RP6MWv~jz* z6inVevi1G}yuy@eEnpMb!pT14zgnIo)qsJFtV+1QZ*f{2GPAhRB6Da<&Wr!rJ`Ts- zb3E!druM^2j5SYBr{|s3I{X_{Cd(~C6y&D{ZNkE7rzW*?SSFy_!vQgY!mij-uYR)z z&z(sloaf{09LQP)AmWjnH=GbjuaDbyvu$NVAFGcEHE2b%U!oI*e#ZJ%mstaAwH3aN z!c{S%($e3E)h?6fhl}DF#~z*&ml#fA#r`2)2@qU6%K`r23Z(<2ku*~?jiYfqbHo5= zuR!q4I(a=nttLchEMX@cooRJ{G9coN0&yV2b^H|kq2}xg`+&`9QI&rP%@$*$2N_S| zT^y`)rJ@E-6d%QZ&L;0cJ+{DUYqIK{F}-Vqdy9O85yekFRK<8$*Lb<4s0voya-lxM zi~Pq-9U;(#@2dHnFnR0qZZ5M28mgl&?%~51Aa%9wMe?>01^K0usMYQUQfte0P6v3h z++g01bKvn4`ZJnz#g-R$pKWt!jci95kC!ug?{%&8`qes{t?*CALxXYG#8w&vnNj|$ zIP#NNmW#kFYK z)Vt{np#quTcelJ0<#|i$ngfai9L*kq{rA;IF-ZfCWHtYYKzN>GY(6>|k`@|lE~#|% zpt9hlPyk} zQrjaayv@hcu~549Pvti1Q8`TO-j*UKyO3m*e?_Aea!MFcscZO4KaDM~Rr;BimfW~i z`>-eUPj~jUzrzc*+anD2smp4NA}&>tT{o7zq3xylu2zhQ(^OW@NJ&_q-%VVG`6}O< zTStufuiD7-u|-~G_M>k$Zfi_6du$eHH0BMY%G7Tp=K~E$JKNpWpFgkBuX}VT8VXk~ z#|b&gRgb#}-f+oy_+@hJda*Gfzu}y(r;B~2lt*?VbOr3Xa+FNH>eX2^h`){-y>C`K zOdIH0mo9jarc~GcKd5`}sHV2=Z4@gi0yaccKt({hfOHTQL3)Q!14^#}LJvhzLAvw~ z(n2TF0wEAol-^r_gwT5lHKB7i=RN2Be&^otjeEzqW85+BzZ*8}wdPuL&G|gfoNE;m zhu9JdHgTC|NSdW_t*dofDp8#bgwF!^?fmkn+_jz3HlHkVWZ5lRDE9m_q$>C`kN5*A zbWH7dN3ct`r+N}TQopLPYBsWYza1BGw2Mq999p_c+hrotMSXkiY~LKj1C4**@4x&f zL3#%*?V=|RGBkx%eZZmcxVk1)!wuEQ1baY@G{mrIJkT7d{t-t%24~xiw+%ffZfGg4 zq0_j!C4B#@)4Oleofl%#t^n~W*is4z`~>Y5`~=f1g`VYS{j^B#L-z1KdA_Suy*PT% zZq;c^_&%-2roV{8yaq`Rq@PQfkL=HeWK=j-qt(-3ooTc6UgH!vcnUkMz`qeKu#xR1ZAG248ebaKV#Q8pyK#!trK%yQ%Fq%VqrnKXr`^ zJs_#sZ;FnhZ5lA=Al$am6#wDk3I7C$mrz5IwsnIp=R#4yMYSv`ucqUGbW%J9f8Pek zMcF4Wu^O|@UiqYQ18F`*(b|GPs6U*cso*H0NqSol0de+*4k)UO3c>0@-JM&h>+F97 z6P?9C`zn!i1Z^9ZWr3p(ALQ*QWE;0YP}5fYy(^i~^3$)klv?i}Dbd3x9Z+w-x|lJb~ZL7?@Meol(Q%&SS&ymCw_AkZ}P-X9(f&M({b8cFGQ8VR4*5Z@fo)JnByi!&OVL{%?CT zniSqWLPz{3tjb;>JCK?;I^Qt(jcJJuPtbbHgQ0tuK$kANc9>lG_%K0|r(LylqDf5k z=^O+DYzidX+v}4G`ZU2az_mma-{k&Dp}y>f?yT)pq}8!~m9HUsMp}yUck~+q=t7@H z%-!VWH|P{zttdMQIJaJ52Vaqdz?p^a3qs;5f{(54+)OfT$f7OHCAjLp*uCD` zwKGSpeXQbOBJ?L1{0fp3(((}2TCm}w_HHUNe%Ru(6~B#^sO$aVL3_dsogPv@-_0&( zG2o4M#OziF>LME3^#$i!UYiKiu~2+-|L-Txq-YXMEWzo|Ep+De8@p7twm*hPG#NH= z5t!*JjR)H8!fzeGz7_xc^`lg0?$2b%*6)m|W1HtnI-L$?ik?TCXSrGbgrbaqt=C$( zGc?v0t8d+=LVm=fwm{AVA^TOfp;Pc$q;wdO^#j7AM zxjtB!n`>hYbHnai5-8_%N{0U4n*R%91G38hg}|NW#Q$IZC~oYaGe(X*v7W$D>4zkn zrIHgwgoMLV&}D{!(67zKHnzGRuU2hHPVjKo7!_MTlZ#xSsuf&Fft6Kz2R~3T?~vS3 zZZV6W!&-1J$vU_PejYCL@%s~|{ntTyHzhvudv+((eWvgmHK7_JvxP6X39->`F75Md z|6KqD)s65!i1Fo4BmF34T>`l`uF^h}CgZc%(;-~@Wjz?bNne%e-15TG{*)3OH(|T6 z!-DEao38;Xoy6AjLC0Bv14fYZVHAI##TLQnoP0c0{%Bn#SH2=3xdjtjNDiLRP=sd0 z%lg^DYo=MEE>hR1wskm6gWeTs8`8p)48t~N#Z<~Qc#u3Un{*Ly?t$J21UB>8_6uf^YT5UHx0%jwK z_}X{6F~?R7fk3VeAuLI}4NWbe_1PWGTHK^frZ#H=U=aSbt4|{J`v;W!Pp&N?^{h}@}Wpv;v!R?SqAdnT!qbfV=t&7%Uvt}e%L806njfg09L zH^x~>-Sj|}*4o}0{0$|l%if){ADEV?MkFmG3!qv*Tu!9FS-rle2l0ekc1qvRi|6;! zPvKxD=uaolm5wmwBRZ0|G$ty1qiO}N_#$FIs6^(U+b^YCU2}>rthsmn+Fb^$&-LKd zq!P9@1M{9s;mY|6<{KFF!yB|T5^kckDOse>Vmd1^*z}a7q<%Qm7P^UYj3461Ldzovk(8GQI7~6`$)xvbW-Jvt4Pj@css8CfG z9W1v*Z5zusj=3igN|h5F=+Y_Q|Lr7-xSjJj=faBLx@_?h&zAxT`Jn#5?gdD@)4Jl+ z>V;_;ehrg1Z}2iKULDDB%em1;lV4&7#$q~jE+?&;CQ%2fENSA($vL)e#L%^551yn2 z=Iv#$giOf;sMPq;RDE`{a`H0*Cy*ttnO9t^7OiQE)3+{=umV>pPR6-;4D{0F9jt>zLpNhEa z!(N`?HeK;!k zBsZGO_ozThYw+>t4@K*odNz3Gt5A>GQRZPg9Lf)Qm)^Qy=A*&VUB^*-LD{5i?%hAC zZeg+`w&oGPe-x28zdwpNzY8&`FHf6X`YgBf630K$u=r%awCz$CtH4&CfmKhFm~Hvd zcJ#4tv%9_CGl!K001-MU%sDA=uvChaenoAyF*i>5 zw54`w3tKmzK{J35??A;PP0;Qo2)B@{7gcOlLo@W)YJaUNSzLNS$T=zE?!Cz^6G@AI zo^!stKEP_}96C7-O}P3?F_S(UFDCGJt0nOb3v zitkHk$*j;|uD>CcF;rcY4>gtwP2Cb#azU(~oB#MQ9*%X<_p6a={Fr%k+rmb({>zV@ zfLm0$H9#aD&P5M&=>YugSc32F&`o0m=4x<5+%L_jm8wYl(iKCA@cJef?= zVvk6WxQWl5G3>sDmNc;YW0Wl%cJT912zP_G+1Q)m1H4Qq-jNz7q=qYR#Xv$VvNf45 zoEiHWrc3LM4PGpKXDn--Q?>VK3MXi+l0{t%Slc$Mq0qTHG5nkKmm-JC+#58utnk5T ztB}4T>Ss!AX54MMEcLs;9bX{2R6{-`+$$-UCH)b1WgB^lQaI`Z;-zbn=XIkG?RebL zf?R#Fuf{PGKF(vYVD&y4?J4xBZ4aW-jzEYi@60Igr#M8wx)V~4mZ~$uHtnUiZ7;MG zu;U`l=$ExIM78Ju`S|(#Tor(p`SC-sY2bRH7vc3D4&Sn6J&+0o!s_fTsDKuftLFScD4@89tzK@=^JdE5SRtlj|@dd-ww^~F|8AzROf^t-ksvYWeb z_n}!y&BY^jxBV@0yD!zpX!%=*!`NJfiuAA)tKPHZoY#QOAQLX^ZJO6{ny<3n#DG

            $KKM_KLP2f5wNwk--gVht@jy>AVR zjSE6i*|gf@{d|jsH^%FdqJlf=uRCHkfHK>qA;;VvugWyz-? ztJQanfs`^OH~-p5J=`DO)xJMD zB={ONiNx^UtZN#qCWl49P!1u!cG*hjdCA*x*1IFgnAOhqS+yHWVm^DJ_={ily)Zi+ zn05yq{8;bxnnih&*ME%1pY&Sj*$vhEA#2;NRt0*&J3OviCkZWUTx<5?u6f&3KF2ZX zPf*jL8#{M?Esno?au;h?Wbj%O2DiHfWk~Ug@5gsc4|Ew;)w9j%Si~gkHlD{`+CS%8 zbw8EGrDI7d##NoGHteJ*+7f=LzBQB2y>PDb%fOSlYyB+smR+O^B0AeVziT_b6o(42 z&d?d}Tam|%B3>|792$h;*0?EkozQ*vZ(sMm9&GH<_cKLOgHOW8Jjj0szUOC12IYU~ z7(LrOdFnFTm8!Zf*{qlK|AGuJv+Za~krIno4bn$p`)S1dB0ZmF zqRfvIANbm@b2?ZFj^lCTi{e9K68y&uYTx|6LNDmMlxmPGeOxp;1zby)e;}#bMeHSd z+#KbpX~{@}VB0NJRjv|sHDBDzW-}OXkpTAMcp59qEvdDZB{_z$S}z-P1$^>n`Z)6Xk(x+MCkUx1`SEtgObDB=dOG`>t)e#jkT}&Wp zpce{eP?<`e({pPYb}`k>WKF8La5G>;tjiX_G3^z9Gq`mxv!@DgBeP0Yogj0n`L0x| zWl1z+MwH|BtBg!bpipQ;reFQZp~_sTmhPgE9b{syI3-~XYo?QlbhxKoKRQr0fsc1v zo~qVvybo&btZJ_hQWh*Zpikm@kSW#fdsXQKq+gupt{9?)>0u!6|KQTh>r(T+Zp%~w zFGylJ%rZXE+_A8KqR?})of^yQ*|F!n{>;G23aMpxgftxwg;|Z9EYz4R%~Ik7C9Q4J z9w^1Y#TbbAQOU8oJza3*ed9>2*94pAM_!1RN5qan*daEhb2dHq(TE*F6hR@vN8?zx z12V)%F+zmVM3x99P#5X%&*ZO9MTLiq?1YQBh`otb|=QN#Tg|bkbWC zs}ptx%P)n?K*ER&7Gy`Iu=X`2?-`-IvfqAh%KBIYAJ8Xs=CS?#3Gu| z!p%1;UIHA22t&^d^kA*Znqf^BX(8v-KiTV-9J`PBF>(ZtfBy1=N#IWjV(1F9!3W4z zW_YA9O06#0>_KNWV?NbRGSrKH;o*K3KH*Q8w-4g3GXPId+Cc;-H`ALtzC}C~NEodk zFxI)djobq((A-?!P_k^ zrT64`9GFR;4Z@2eMXU4+mnL`&=uvg#4JT>=W#RbXqiqA0)j|>O3h7%~ynh^Ikpb}8 zh~kLH2HvkMncs-rOZtw};uD>~ra7<~Bt?DCMv$$1FfIf_`t`Z*(K`UPNUBK(<7*3qgLm3b$*e}AIw zl7}7yM_li6Ov!8?^*PxgINg7+9a49B(ayYgcV$w!F9&gW6!mgR7Dp9`>v~lk(0bQ3 zE7vaTP4b>AY)|GYs$gMseRgYJmC4Z#H?seW#3Ynz!+v0pJ*nubd{yb^C$9=_VLycJ zB7HGs1q4nIjGDbbN=Rz1Z{U2r)^1Q|BILbUsw}D(z>Q0M3L*WuJ@=n6^fj4u>+czD zovRLlz|N?jU!ErjI4^Ys(U-b{IWR7h%3CzG&d{^n-_KAeeo5tea-TiX@GJLTEM8

            0s zxZB0shiz$l{iIMaK5tQzca$sM>+(R)q=SULhVrMInxb~Ju>&G5pWhIkE|p1bV#-EhN11@@9WWQJj(R^EbArIg2Obld6PNM%=P>+XW8RU6o-UMv%lP8-!n^Eymc=FU(t6;DD-8{G z1!bp1fGqBCr$Wc==q`i-0LJli)M(hnoG%LmQ4b>-v;Ix-{TTPmCYw8gr8Yw$A`(8- z*-FZ`r5VBnjoA-C=g{%Wnw0JT1MN6Y0IGrp`2NNb6a`P=`0QrMa*o)X*Y+l^xCMny z2qLZbsdrnUj6iwxtj;7kWpH+5VPx6j`!iSdo8b8u%_*JzO@)`utP=Jk|A4feZaJiO zi7=rYwig0ziY(@bjJtGPEcSF~{_MvA6vmS)|6mr;o4UM=fk~G#ahD?iwaJ+BwYjsR zZReG}ZAIT-3U{TXd~Tlvdo#VzOAQrniv?6!pbpzw*>LFE6w22dI>DBHXM~e`pHz|} z?UtoaS^&D99Ouk_bujGsT%PpJ-(BFDl4!nC7(ho{P5v|f9R5>Z?!Wkgt^)n6cQ|zg zw*9V5lIrskE5$IuDp$uCTR*jU=CAttIfHOM?^T(TSJ_ow0(!6nf)WRfbWoKuUTE=y zdWvYdy|1-Q@*MI!(rls;ds`);RkcyFwwF0!4hbDw@^ExGo)i`8p0RKcV09GRuL&3K z`msM^yIs#GF7kM`{7;asO7KcR=a%-Cno+sZMY{TJ{w?8l(?GG^b3PI*xa)7Nq&AJj z?wfDr5eh>ukW4Fo)n;}qC=ae4$Tpo496j9Vw;gF)CT<3O4Yh`OA`l+uZJ?x%li_bX z>Vg7{D*-drWu&_NGiL zk3lYuhQ*O;<7=)+r@qHRW1lP|06t-#veAA#MElL_*Hcjm#}BA@Ut#)>=VMvksCeE4 zB;jE?F!q<*CfE}(kMAj#p9pELlMN&!`Vr(Au}9S+EBd7R+o&pY*?v}G$w0p1`C z@~R1Kpxh{L<_^yj{s7i5zDeS&i0OsGl(k`o zg^{s+K(9au}0V;Oj| z<90oNSM_hyPLKXad_X=uGx~y}YcpK((W@Jgbw)JhFK7y0bLJbim`pld#`#5+^{M|t zVp{ruR!YYI4Ed@JWL7}r1Kyq7_?C<>EftgDNW%QgeA`y&Kk@S ze&I#VR9CvSOC~fDkEVS@u%ed(8pL)sZ@N4y`qVxL0RQKzNuPMT-wb%yz86xz7IpQ3 zA5Ge~8j-Ujw%KC2%D3}lB6=ocxMA>X`Hn*+SR3ngFegscgXtTtN3z}P&}DnrE5&Ux zYQ@NKM~jCYn(&S0{aJ^2+-f0y_fDYFWQy2bkr?QR=9WBV(+6&#I2cO~J0nr{`^& zh#2r0?m&&B*b~JK;-#2lsB;kCyYl5C)5fOS#SXVw?bijQT(0x90~AGOEd}jZat@B= z&{TJvG&hTA@4k&}p98$mPUy$Gju{OjAO_=S#G!r$#l{&{4ExyOw&usyASMgnoQ?#D zft{JCoqb|iv6o`U>idmyt1CZ+Tai1pl|=cdgX%grSNHP~SJSSc7TYhmmsagB#%DK_ zXx-)wL+S&|eDV7VfkE)D4{ezEfnCSS2-(vAi#DQXv!uoS_3Ot>UM$ir+w%T`Z<3{q ze$|@Tn>j33bOYOeiSF<1Kayn6_NT;%?MnGPT{5QO6;FZh&a<>@uPrRs{)(aP4I3C? zc2*0uz1|~*JFA8w*pu=leXc3+>x|l8Yb(c~_Y%a~^!;V!_?f!bN2*c<8$%`z&P}g* zvxL$nN3w<3vt7o`O6jGg|DfA^fm3K4P<{##^@Tz7Jo3wXCPt2m#hu(uBX*liYm41z zk%rG;WpLN| z5Eb6xJl~`%-Ra`mV!78fSNkVf%=9B!V2Mwz?3Xsm8ZvS&j-Tw{1M8X^s z>%zVQ)r%BD0QdcW)oHgmM20K>rFou-_?wKwKOVUfZ3DakT+#Z^|4Mmm_)>uS^x0R5 zzmGYW7;`Rp_+QkD3s9E)m&VpH+8$`;cKT~C*8XN7+f<@U9weQzeH1N>e;X2|P)_%_ z|MU?B>hBHAC8B@~Fu!~H=z+)ItA3WPRrl-vHy`(Yb5Wv(T-|;=4OufL`KuWCjGdp~ zGFdYqVWo{57OF@$^K!4gZ+rdkalW9wvtXSh<-UE2QLf(oszJdy@*_&6;eZ%(+r(qO zt-#LR56^Dqdr@^|gw*q~9rNt%2D9WqZNDbPi@kqMZAtW1fKVVuH1+ZWn$4%4d#7UT zq+5tnCN51ABMz+Qgq|mI(C0Nn!)$qmw1eoKO-5aA$TVDw_7_T~Q4t`dM$z?zcew5J)jL@s#e zD*N9+l-cMD1-YJMgs=$(4?UghLh&#UncdK@YETcE-cD&a_;@+=WWvgjHV19I9OH2B z*rjiZuan@TE=Q4n>t7Ztx^>)BxDkP}L;4P9^PS(1SRMY};xYMjE=pzX!mC5pqZi#l z5bng4PQi-Yy9f^P>V4tNjiCZ)ipl5@X@j3Q4yE*_@vqBv19Zp&9K*vSpQ(2Wx6949 z>iFS9)G_pR&M$=Y#y_}$Lo9w>@AWXnC0mEI2H1`761DXm=)5l# z2)VYq`+bjRZb5?Nj6)_Q&maFdu!z5g#y)W=4f|;42Oaxl#pKoOeZKBM?dEL}N!W|P zv$ZCP2QzNt5Sv*Axo^?2{PX*x#$4nbT4QJ>UmT!0^XWT@`)eDOJaTRDM5G=^Fr9>! z*r**<7)@g8P3w|I0cJexigEbvGyHQtr{xbPr1bX_Rl$fW{cu?;>%_VaP+8@&Ze3_g zS%snaMZCnbvrS!wyI+i~2?y`U6F*8VV?xG|)@bhEy(qtkowUq=GoFI+_hOj*xb`lD*QneXA4ER`sUK5Z%wy&*C8uBH|?jt_jYh3;DhriU}Fn7A4V{v8rrOzw4| zg(Z^1)V;#Z=N&$dw5xzF!LZp~;TvA$6c_G9O9_a3%F~0Q`gjpgMk(*n>YiCM%+>pUd*QD?Z6_Mifw1g9b(m?2Zv{C%sdH1+8#?!Ml*|3MLA% zLvUq&A7q<=y~oCl$)3%*I%he~qDAk&I8TgrJrkEbAcl?AaWI}&u5nu(?U|UcI64RT ztQ*nCi2r!SIMZ(y@KpXeS2ekgS%k^@eI%ft6_as;Y%|&I2Z4;5J+2n6bV$4{@|@F6Vn!XI9R1)s$be*rG^3dyj9I4 zfj%w7%5sZm+~1?j<4`HLv(v5sJ7*2ZA&l`3Dk_fG{hMYFz`Mc(a_A7wA&IDFImoi& zEI_5MV8ZbY#h@TckLSXQauhpq`wjm& z#B|P@+=*)6%Q`tP0iGLo(~6}9SMD(4dPmD$CL75@;rFH`R>_0>6)iueoiH1kqCsv- z8uM&CZli19AF>8bQp{wjX_nO|^qN3?xqNnn>0FyOk0!6T{uKJxrVZdxisz_57(KpW zYazGGWZsr}K?|bxphu5+OCarPpM%m;!*flJHMEEK)SqLSyG6yPJ9T!D+xzBr0-$ zw%tPlMB-DDgI7hHJDzE))GMA?svr-O7%lgBbHUX~S`l;*UjK=?b+%p14>;Wpz0^Dp zqmRG-gOCu|yD_gY*J)_y77)c-M^H@i@Knsz!BR~_M+2Ios>@aA{IhAL8}@52cQ;I+ zJ)S;M>e>Nsl`msX&>{fmwg*_`3g?@yT&x)WU{3nLtVCnlAGsRGZvHJ^l-!-R=Z)0oMhZC7$oxnwXm%Y9ad#||-x+(ShZlz?{88X+3BAXF6j1+)SJ9Qg+uY~m%#Q{w^s-~k{(N|$94*h z8E?JZ>KuAW9bHfN(%9Xo;DmIUd-O%iM)SX(*Zl6#NjPe2b*H9h-zv|)1yU8WH#5?J zjoF*MAvh}Ve8rJ$^&_M1CnU+RjOIS~b16uuZ(VUyH10pk)s!8Y6nLp=sI}bZ&rH*k zAe&6(P`cvgh@w~KKBI0aF42DGmRES|arJf_F{~(m-G|LQZl4=x)+?arAbc(OEZ~SG z6$sLo;%in%4lI=6en~=<5sEO0ktWOA*LIJ&#Ab~+s&R;s`w@M1-vbx0EC!W$qFPe_!5S$(b+!iY?rALetKvQHvbsSa7KxePZYW|3+~ zn&x^PgL%Gs!=R#aE;fy~!t+g5MS7qeVtx*q)iN|Y0B{Dy2d5VcjD8l*QMNz=(47vhSeQ$dkG(KOd}H=HzXb9y6qRW z7;A8n7*J5|$#vr(kmro&Nv!s(osmR_uMF-;%r{F>d=YbL-7sd`l4Gi8L+60X zRw;FdXg@Y_`#uxCx<-Q@<+fqy;NZ}#Q-UyFlgjba9y$t5H@78HHOP(iZwB|X$;{Ud zG;xCr&A?g0c${}61iEcNiy0Y}kQ_i1&KGN+Jp3?O8c&qJUhOqz>5TOFl1d%-zr1BM zP#t$zwvz^QBu~8Z96BxiGlJgd`Whg`jY?P*KMN^g9F`o{3~!S2XzKW*jSnt$^C@)W z+MGW-`}}e{?o)GD`ZU`2=NGRB9Hh93rP?24ruzp<-oRri6~FDSy=mcBmoe)j>&8vP zCxcRXw>zM)M?8$C4L_WJ53o*lHbGMxm?m1^-ZKk{m?;z_yN5!~@a&N0oWgRzmi8?B zZO!&dZPV;-^(#eXSRr?+kZ*~X6V&F1WSwCKHm9W)AAA#SO3r8U*?fSl)R^JL zpAXjNhCZH(z^QJyUQP|xs_3-y?q z_fiq7gU2=mnG8#`8QDn3KU>Yea=|3M&atl|(tc}d#4}FTb2)pq<(QB>Yq?1|Hax~#o-=sE>^cmo3kI^^9;6dJh(JQ zIQMO0CT&Dkt>)|X{pA`Ci{lPc8Z|%NZ*`67wH~$89t}o&CP4JG)@5}(*E%##l=L?8 zTck}D-P}Mgn`DTaEhYf&sV{c^c5ZMZMXb!xoY8Zapai}*wmziw@AQO)I`%u97h)bI zjNJDyyG;azw#@3nCsxi(D$M!uDz&bEx+RuS_2qi9xrv?mvBtQscOHtl1I1V3+t_Fh z&VTlgYom_i@Vp0_F43A7md4gjPe;x=t2V#ro{YpH>jwbeUy|fc6Y2ZVS;2y-+Es^K zbzhxY9NUfB3VLj0ajho22ml(%Vu(iDgWd1MhocxX=D!n;wT`-qE_Yh{IH1`{PJdp+ z8h)^Ray7onP`Bs=gCRGvtpltkAU+}pWsGrJKN*^VdXvP98)($q;N;Hcf>V79>$0Kpe93tKpY&jjML%B|G ztd~pqio~5uU;k?%YakgDRwMt>bG{2nBdi>jZ7FW-`|K@)!>gZl8ch28ou{zX0(9t5 zUw++GpwhO>n11)5axfGSxpRunyRhFDW{t|FF_!e${Jzyz*vQ_E1HYery4bhwG_&{H zNpnV^oiyk^AXQS|^(&1GPQp4A>=-NiNGH@ucEBvzZO3Q2LSk? z^gFS^<(F3il%n()qF4nT!ew^Sf7w%&{`yzY*yDckr4^kSqD(Z#}@~6wM-UbuYdG) zu*;}{O<_+~ifUCw@au!p2m8Mn_%M80MUl8#h9&j={oiPRq+{@9+}hv_>B4vq-QJSNoWrp5Ym?b+Ul;4< zzzZj$4c<^@o3RGtM;d9PS+vL!LxJfNu9t-HalgXthu|7b)}Fmz+HP^9Pdxj%~FQe_%y zZjQ@|qSHwwm=xMNKqTt9qfs9Q;nRDn6G>%~p%7p$?cA-cE|=(Us(a`$k>4i0Uk^#b z6+6}~ri{Z}OYk^SS9e2c^Jm`DnSc$ssu2OU7QFxZPDTSuW0JQyI$3&bV@^=er*pGJ z**I*Sspl7LpwFA&a8|V)cCQHgeMKrMM-<&*3`n9OY-6@8h8A|-#IEa*(CNsu3I4e+ zV-M3YNNT0JWPnBL8u4r~%*h}=RU5BCF}uyl7ofhwzppfhR@SZ*BsM-0H0Yj|2I}c~ zQ3omBd44+xA~*|n-S<#*OMDtb{#|tZ(eu1!o^2Iyjs}lXy9@Hgygf~qk!l6 zkYuzz+y)7W%oKTecr<99QytC^Q)@rYMSk^r4bn;eJra_j0oKo8K z?UqrQ(7{JzW;51h_XEMq=~W3xkIjve%$=%|&W>#21`RJ338BxCQ0zPdf}Vt2{Kow+ zgpvR7k+?3Ev#5Or)Oyh zfS%l&Kbem1P;ea|YIe2#it>)3Tl@^5Uc7Ah&~qoBKMwrxTb-5`0iByercAh5lJ^hN zEQImnQ$tOXThrhV@{PL)E;U5MxW4iNXK%CQM}eKsKMEQ=;)?R^hzqRIAT&DNtGRM_ zF+#-OaSpY3yi@-DKUN#{wlx%ao?pGv)O3JPE7UEUSj6sV_iL|3XyflTo21JxkMhpo z?NT}hhRxVL!z^$QZJY9xvwe0XsPN&-c82xV;YJq>xZ<>?BNp-{#stQa$`ZR@>PX>A zol~&&+7V*h_}*SKyp-lX@}w_Kt8+gmHo)zUM$k32y!k@^ z?-GK)@wr!?Ry{98gr6@Me?;X~PEx_wt5j!JjLO2HYD>P;`!x2r-Hw|TmSa*I%O)Pg zk``_~-CHQWhps5gp*W|iIfs^yb1Tx@OsqFme}8TJR9ZFj__p0$#r{DPy>C-QqXmPV|6=1@#oe5mOkqoCjGL`CU>6kn||&_oSZcrqD= zZZgSOk$617q!F(;J6yvevDBdlGkg&<7qPqKk-kY7pN_xG2wz)R=V!8p;6#<431pR8 zeHwdV;VP9fzr@{}(O#ce-4fGSpwe1n1-VZkr9Q?(kCRpDXlQCo;1``y zqT!$Q@_xo#OMT}C1&Rkk|Mq2<#9%7ovtg-jR7rypK~-@TUHA0z4sSX&9@*9V=h0;N z27zK93QDl!Ea5*a)DuBTgYow`>q6_TDQ-NVm+E2-O8tGncZa2ePWjL+p$J;#rxr2N zGMwCUyN3SZP~c^vhTTJyZPhl!W_H%9{&qRbbWSg5TW){5(0UD%1= zwK?4jG%5AF9CctMtF8X#VRr_n+a(S$O%qrTZ$>WJb#_3* zlP&~-W~`2ncAL;^E~<--M3pO-wVOx*_fa~{Uf()l{=5oCDrJyyw*>Kw zYQot`D_-HVpcJCClvz`>8}9j2$TuwU*u*7a#G0&`=R0ezCDxwpHom(j;WGB<#M7@) zMJr>F_PJ%-u7Mk;W#Fxq_W{wOj<6G*qZ4AT70KGu4eDP+uS>T{?GZa$>~3AbKk#& zAy>I@H51~wzva>CMztSagtudNYR2twq?(QJ`(40UKBR+e5RlaAzF9%mbS#YQcw4Un za$%_Emm7GfM=sZ2SMeB|?YQQ{#82kA#O&QVW>z>Yp~9Co+{%RqY8vtYMHsr?vB0-yL>IwO-mHY*KbNrr%z8j zu7~)J8MlUu2>C6;q=PZDQtP~?NAT@I;^+2Vlky|0n`s`$L1b&qUCQn&a&7FZfUDG6vGd9O2{vQf-tsZwH8yji z*E>==%OL#jnh1~ZP)trcS*4>&=F3RCW2%MkI$sb^558&rv1?>hppxiSU|$EP`6!d` zSicn1a+J>BOh4tE{D((1U|l20b`+;v9z2k5hYgK9FVa~w%EE_C+tw|`O(TNBU)CVc`HTV(c8xm7LSDw_djVs$6t+Y;3Gh(bv~^{>-hU{iZaaE$Z&Z^pa8@ zuSBQE_vgJ^6uCJV*KJ7(TjeB|Qk%%S;pg83Ba7yxFH_3r-bjHi9<&Fl)=w8$|ii5r_@374*r zHtHgLnoQ-&t11+uwYZ}A(OmJ!mN;UE4U9nU3PblAQY-d$#rsxvIU@^c~ zRlYGmKlkVhw&mDRHgzZ#7)k@69mH2oA_*Goa|-v zJ)#IvJE}#@r&GQN=dkFqaCEA5ukvr^GgtP~m$@tAr=XY*+(EuK*IHytkU7rp>X;9F zVYx71xKVv~agfqQ@Xa?(o5CAiaZ`)Zwl*rMzplqHRSp;<7MIu&EvCvhFD}PS8^qju zY&II1fEgteWq2JO#(-)vsZggm;lPM_ta1@Wp}|1Odp%c24*87=Zt-Ucsaj~YjpAnDhQCw^{i3jZRuGS>aoLgexWqak`>w} zZho5c`u$=*pX<8!jLYavVydQuQ~t7$Nq!D_u_vlZ!1~it49=k9Sxd*8IV+lLv-IeT z0j>AGo;neD7hATu0WjG>=Q_p6)b?#jpxqzGse*tN=m4wi86D1t;4ti(eF~8vH;B}) z>YOasz@^GF$6&BS{i8s4L)DwUNBa@u@~W|HL%roXtZrSo7r@h{CfiI#$&DqW4bSI+ zJ8zbHJ|ENIV5GE1^l60!H&(lsHIVx=vRo`>_V zZi&&`rvA?{Gw64@E$lJeWK&MuIDE)JGrFlH8A=RwN`_E3|b|{VhN4WZa@QTcHrfz z)9WLF#)$u8PFPz}yo`QkBdN?nV%UJ2Z1_FeUL13v>Y7pY#83Yktt*l>rej?(``yWR zyxj!T$1AJ`8^ozJF2obX5!lUk9vSv(DX#YPf$eOuc46kN&iq7KwYWGn+vK}OHQf8^ zC+TifOil>`#677a+b*+|gw7=Rvg>@MShwRA_DPM3_aA-Y!V9{QTDN77h67^;`B+Sj zNiHS`^BTA=acd?S`Z@Xzi==>^f6Oe-ZWVGvLQ1ftz$-}PTKZV5lY}gX%R(Q}LZTrL zEtNOE0W=DwL!@W=@z?Y^LOkua5S^Q;>1)`i=L!(A>!NkG%1v8&2K>QL7IQwc-+DXG z@u+@sww|v;ya{bp?ywXs5H}e7(}2%$$zDJau0x@d1hhPb@Mwabk-5iHP)`^AS9>K= z;Kwtc-K|WmiJLI(MOeCz2=w}3gB1$;@l&-=MeW2ZbDj@Hh~v&kkpd0cqqQ7{=hchj z1MdQ`R<^UY_#9bC(o6mA95FuB-f&NP9&sp}$@BO5n1$t&R?JVPbkv zE<8ObjjG(~v-(jMC~nWl>Mos^G-#2@c-uSu*St~dkxC&1QPmJt2J9@tYTnQWvAbd8 z!^!cZ<&|Tm-;A4Qy;#&=H@ksfn_suTY=<_I*h2>mESM7A7hTo5-{1@lO}yPVBvEfT z9XT?8nhsgm-UC~FI560Pp01IiJO8^i5;bcilfn#2VBiP6rPNi6G(w98UW{DzUCy;) zPMFtXliEg4uYK;wMz9ht&Nggr=pk0lvWzX4Qzq1J4-r_Tq~^RuYM$bi zMeN_eiCi6r2*L0x?I^_~PH)6KM;kO0xPwe#XSIqXA|PCz{A79MXVge&*yH&ta`J6a z^i1m6D)(I%F3hv#D@gDE*+ST#$^|=*y`xUxYW#{;SsH0tz!ntw2#-#!QnWHX}nIRDS2K$naQ68 z+T7UF3QC>V?>Hw!_}o9Ie8y|4$?(hS*;e<@x9%2DvK?;6b=>5WVHa6u1+JB6#jW{g zwfN@9m*#%p=46}aY-BbBRu4NiwcY2sZ{&FzM%b*zJb{T!l~U56u=Ssj;-~fWtY{;Y zHC{9AZ%JEO@5}m|&JQ+iyB*J89K)!FBz_)0+Gc{-5DvCvlv?dGb6H&F6G~73U_&*I zh41aWH~QZU(WWccSiEj$?*c7h6*DyKwXt4j#X~g1LKxh~{fbQv4izV!y)0j%ppa)# zc>PlQC9|8#4D5q5KsPjkJ`aU{?~$*6cd`sm+gZw0*{@dFXZjFj1he@dB97fhM`>8k zcB3we8?;3^F@U>cfQC%Fgoi{QqVP&XPD2`o&wl8bt-TsMI^Htu6lwN0O-fWi_Ik-l zBgk)+6go04BR#!$6g0m3f3)}BQB7@K-zdk%QACa+O%zn5OBawDMG%oDUAlDXLg=BW z2p*(K?@c;L7ec5CBGN*yAqhS7NDWB{xjUBgp65L8H|`zxz4!gT@r`c`{$M0~udKb+ z+;h(Ln{)nVt#3zTzN$Nlycv{6+%cvzzXVtmy(s{OD8kfuyb_dL>sAx6G*4R`KkiQ9 z#!37O9gtZOXJeA;om_!gbz{|M`pi!{FiB z2t!+bZ0_Z4S1}6GfQUGp{&ln}uIb`Q(f>`?1_);iabSRCPQcRtXDZC1 z;&Ccb71{n8_Ina$>Dg6(1HF~cVf5~dXS2V;vp^Ls9)MrI&G}w+SN2XA;Di^6{JNt6 z&I@=eoGYuVqDdK4Zyp8=5{Sgbzn?$;I-P3>2mjAY`uwlOUH%K{vIbM>YheNR#@7V{ zhur&lcu!I({o|;|?*`v{xCRPR4}{nI?!{PeuU&F6e>ie7`{0-B{WDcIzYjKd(|KId zbFWq-=6uI~ZKJ-6jQ{qbO$I;$*D!&u1uvQoo+!`Wy7{ng(jOSj;sy+`}1k~>J@tohFkt|Gw*fu`V7s8+Chjkb-%mL_n)w)t50#)hP!eV*9slR z(k2L)me;*oORp(zZ!S9m$!CxIed`-T&E^E^$=T&MD1|l}wQwj+*LkMp_8DG~Vs+>G z*Hb^g6?_qwLCak()nH`Fk*dHdeq>kn+H-nN(Tr6A+X+P$#S3B@fNEWVt#37Ek2!6d zWte$z6PZ2Zg4h6A5AzhkQ6d4?_ttPej5Z~?bGFyl`5V$uwCMB5O-0G=Z!x1Ww+277 zRBY^VDM2kp<{|eS>%?_{j*4O#0p9ut=cK<^P+Cviyg7ZNL8{`4p@80CPo4Aew=^r{ zAGzK7*T&F7>Pz_5tN@ZRI_>E5sxvhqPfh7yrr33D6?p)J6XTNLdpOCW5cPl@o%v4IL;hf%b@*oQLShmb(&!T`IbQ~!er17cod$TM?Tt>CGxYU{ccNPsu@KT;?^A_ zdqJy>n%G;oU@2UFt*cLRFO5{(ujo1@OqlV4rw|f#d1{c*n~QdC(u!`)nf(-rwAJ3Y z-RxT)=caBpDadh#eXiJx0$W1|-= z!2Uq6=)&M&FC{a8IS#%YgX+@{h4FVW^)Jg*zms$jmxoOF-WlK@uP6L@Nw(2B^sMno zdJcnIm2aY|L|9pxht*tmx77z&rR(Qs2PBe-ElrTpi;iL^9pxPC8>gQ2gmy=orJVM& zm;?*9YSo}TGt+zP7VrG|3ur3+<8+Q1QOtYUUQ+Hump4|^95JQbiYo&VOENv?)g$Tc zWOr;|yZUkINs+XAG`Ut^N}_hXLH78syd$u^6qX?GxVW5RH?hD*WKhpzb3`a7XiIelxS(T{Hoe z>j>2I_2^!$v4NinNV}$VnAb8p${GEwi76&RKn*fT=2t9DKygi@J& zoge89V^6ZOO|w7cgor6Q$gO6MnIW%Y8qWC$09`s$(^Ul^2iq*o%!QxQjY3e{C-eSN zi+rzc@b0HYqwx6g0G&SPJCf7S<|Q#MZ|yD-r}Q-)2b8XF4O8BODtM5F_xp^%IF|e` zBok`kLK&m<&Ql3p{B$dmBN3YY2P#~PQphU5k|^hEjfj274fJTeckuUK2Eo-_)+b4n*itBL~Jajdh~r6H)9#ij>#irQP~DDe_* zqfq{>1+Y`uM)ATJh0#iGjXQmRWv?)_UFxn^#4YGzUhPAsHw{58_VOYTpCVebKk@_00G&>O)gGdahBb=D{Bf?q8Vp*6b?S> zguBc!GD*XXF9Q?s>WVlwiuj!}gJ6!um7!4LxL=Uu9mYAhjVrxQh06IX>UXFah7rK;jDsjiKV*HF~`IU zk{YH0bSGTQoib;8dN0EL-_z9ENe8~x*U%phuE02$OG)itYjZt3ykh@b@$)#|+GHcb zLz~R&9@v+S_G6_k-|}8LW)1VjxeKxozE~OWO^Is0;=-70zbuEP*-(1r6-w7A0|M+^M5I?`Cq4Ui2=w|1L@aF`+S>uahy8p zI1ksJl8!labJGP+0L1n`YM%b(RHr;9*AG4N#nKKl`8xTni-t9q(%&dQdg#<{NKoa6nV?EADT5haBP^S_~rE`NOZ}9}G4LRt zXP+7}%q$m{(ep??PXMw5@IA!kZczX(Y)>;6c;dI@Qj+7H<&-LHF(d>%NGe=6_w0Xl z8o-fC@2@>kWVj96Ff~1}5+dNoPjtzN7FQyHsqtD$CSi zz0D`17vS=|ZsYKa9GElZ*Yp-m$F3OQr3^gQhD0azk4`56pvr&#x&UB4xmG#jVh8TY zJ6R>$p{SfIeenL4PIPEg^S&!V;%e9RcS0{(B|Nqn>~dZ}Kc-Rd*vjn=#j}x0yY-?Bc&5Hrc@}H?HH8X4u4n=VGHHBfF7yVW<(wjMn|TU6lcGITc~k~=2X9`OUi0!;r}OX+JsE^d=551`ERul@a|H!WE- zMSz1vQQ16JaB+vRM!Qk`^rSahu1IqoxIO-R;Od7J`vq!IUJ7L(NUMcwnk+7 zSbrI<|1c@JXQd40=SWPWzSF>&Rx<6pO&3rW)1Cd)BtS88!vUrj`rC*g<;eQOQvEvw zMzMOkUJ}uxbzUlo4dUBxCCby{HQt@!-Z);H6HYRf$vP^Z-WFfo zYEBwG3t^{2ACs^`O!oRT+vn(Y2uMY5_W-oHM76*BfHb0i5|1w)+!r zS^qjZvy61ql?;W^YY3glKJhnHjlzB#^)L|(J3s!+bxkhkX;D+ZK(|%+J?=WW^&Zp$ z_KunS_Dd!O7(&?pVDi3P5q;V0ett`z$clljs)Cfkm`xPGH@`YZQ=5+H4J8sZh~q$q z*KkF5Ds9RE_=nk5F)&Cv-9&XUf$(k*hwEXY^n2jYPEGGoROMxm!EU4b#aD$k&0s-K zZu`GZxjvhgz+|!lDQlYU$o-~}gDoJs= zO{Px$ss(=-2aY6!yCNB}A@`(Lq)2cMzi-AtTGPLGZcop78#ScAckH)9r7Fv99G?HW zUa=-B`Q(ZrlIOJEvPIh+c!GNhK((LpnrW}kLfa(TBXF#CeC@cf_Ak%=hj-UFv|!S; zAW`@=z(i+^?aJjAiILWwt(h`?-|7XEH-UNIrk)vu6QSqTtHL)lqj4QBxnG2)YdovY z{!XfXU+#=(C^wajQ#_&))3P-nss3+kREECq;jL zl!9mgDmo@Z_v4sedyqnfvOwRt_s!$NSeEp*61|6Bg9VjKY*yEAPG2Vo>@@|leFa(z z{7YI0B?!sG`_I9D(Bc0*bN>G}r~Ch_I{ts9?g6CYe`;rspKk5{uG2`c2KtYMQd);a zu?`Cx-9m{5`VR-R253H9SRgH_z^~g@Bw2hm1R?B;RQj+z!hA0#`A4hG3FkIR8`b24 zG)NN39H1MJ{DePDYD^^UX^so|m61N%^8(WFJocyaUV0WF`i}GzTmf2nJp&5iUqepy zPGq*TW1pHz;o!ckd(WbPcXToRyxx;TpsDbEy(^vPE>G?@lI88UJiW`)8*DM10it7e zGoLe^>E!CyRp}YYpYD~(2mqFx>d~+Ae+G;B%K^s?UI^`V!G^A5_;MZkU>dFXMo@C) z0bO9--kk{`xakzon3>32=u3RBV|)50XzCn*DZ%Vf8=JNVlBTpMc~_lh-k1gl zP8+d$RhP+8SwsDbUbDmvpUTc?-e~j-)6#+zuCU1!U#a>fNuU61DaN}^;9c{7&K3ad z)AgV4b}92}!{O@-mx>(s*?Y~Q#+hbkSIt0>2tE;8TUDO;Re+1gZnIJUL(lKV@Pxok zpdZ)tQm>r-;QqqvGWQmyZf${kTxv!ax^?pStk@>4)fq(VgogAoC+8AWVGOpc_oLZl zT*1#6T&Pxztp!Itl31Owx2vD^%#F%B0HtG1p)8J#HfnR1^2A+?zj^uGMQxtD$=9ie z891w=x?fdfokv)7l5IT=9|Ky{0uA zcieT;O6%+l%p@%~_(d-!JOd?hAl3ny(DFY(<)=rvS<+H-)p9I%onbv^KzB%{}6o>5z+3o5U;bMeV+6 z1XsD6NzBPF<)3cy(EHt29E%?=0Xu{)aCT}&PEL6!w~kSmEbuz6eX69eCSDo?Xme(OY*6qlWWen!B>jMU+sd~ zjl?@r#&H*|($-eJftYjo^5@zXJs3)9$Qy{>or;|dd!=*L#;2E{D^sWyQZ+Uqw2<*G5 z9kcRnCK7vgFR{90(fdeE0#qW1v4e4Y#+e{TGQikI!zCHPlG{maPx3I1d8=&5m0xB% z=Wg{?-tp1M91g~ykAQw{@|W9fD9aPC2TFu)c1`YzgT^#FqB3d*vkn#-R(Jc}rh_}! z=@KJVA%}IfhYh~%=Wy~Mn`}%5XG05AU`jA|yV`0#O9Oc1KB7~_B;m>E%cQ_9f(XmD zOx<3TN_gvT4b;z?0HwlF0O6;(dafAjow5Gm0UpaBXpZ} z!;(Q8!rFx(qg^3QGs%@n<+}X(yXzjEG$6=o!)Z;@aH%g^9dM1FU;KF{d448V`~qL5 zXn8|w#^wQ1$lxgHba+MMPD-n9^&UJJ{C18PUYgza1{U;n03-U7*OILLD`+4NfZ$IA+ zz@-OT^itZc{x`RTFsB8&7!55C#-##%sTy@d-V{RSr`>2H)q7N1j`nJllfaG6-A()@ z2x3p#CDt!}$O(aVV5-k)e*y*}D`qmeIXT7l+mv=TNm_<_Ch*Z_-^l=VXs@YIuuXy- z#xH1Nx)`cysNXOVmd>9)#IDQ-vGip+^b`nypGH2UalHs0%9D_T*}AWBT}o|9+&3r zyOIg56Y-vgJ{q-O^w+WN=4*b?&YLIUS#H>U99nwJ#pZHYmlDyqBruvB%qJ4KguWpC(*D+{_MU^ggiSSBJ{#zfl3r3@1`v}1ooLgcTAHF#<3g!+ z(aufnhDYGOnq$sSt&3lv$|oJonheT5pRWmP@k~jzz9g+1W`_)Rz01CtBBdt{c3<3=v*W@% z(BoB9QuoJ^F{AC&nuSLPO(1viJIVGfIM?o zKpsN7OK77Bt1joCepB$MvL!_3>h9$jxk}$mX*T4U&rT7=2H$RpB7M zTJKcY=MYzOB_EhO(Taz+-+EsG_fsr5?a6R~&JTH_N}1A;>();xkGsrH*SEf-iX8I$qB2H7Im=ggGUgRj(=+sLcLE@t`90I4*sOaBRTNzQ#y` z>|Bm*FP&k8hQ$wfK670?Eh5PP!wpBcG}+9Jq|kwyp5?>nA0)=+mzBlsJ%CQ}Iy`Ys zE2=L!@da_FLkJ|yS)T0LbTrt^%m206iqDq!g~a(6Zhlu`8KIy{W3Yi0lV|~rwh$DSTl!#-;nA!+qeSoU+b*a^D<0~sRek}Wyq5`7j##|_&6e_@v+)N402vE z!ALIo>T;v++-B_77rW*KXu?1^Jc6ct{J!Ml>{n)r>&?<*d3T{%l7cQfXB{8qDEp1V z^@Ee^!bHRS)-RoJV(rq;X}j`Af&F#8Z{d^72)B4gnUfxMy}FCsLXL5>e6` zdNO`NZzWVJg_aTsDzT+6+%U-W-FrDMcaUjzMeEXLD*Uc{< z=K_%tJx0>8N=geGb0EF+K46@(nSWYJ;Nt%k8mV`0e9tP;Y!$_IBk0I>2oAJ7pP)>Uzy@<|ahFo#Drlo%>r9M}vh zDh42ML{$<&!B2k83NZC|5-9oC3qbwk6(i!o4t1zCtBWdyeW}tNaKwoUcIS!t%CF(Q)K=N4y-I5 zS+VM7PMk#OJ=00QHGviY-Jq=0^YedOg&2kKK3GJnX+5?nUX2q-vnN;&&wEF@4!8|O znzMS3&$E)CAleMVOujk!*%0|?D$i)w*rdq*Qc$9!uz>_EX@(T#~M} z!bg8u2`N%K^cd#O87L0Itx_WsmOa;RFD87wxj1w*3TiMc*6NtYn*=?94@Tb53(R(4eP_l5f8 zlV%O-n(M6gG_j(4H0zYj969+n8R7jfkzV={2hKpqt~tWB?VR1MQjhv-j;47bm{mbB z%bto&v&=3(!Hq!6_hR@jhG~68VB@9bZOJ1n(Omj=Q73K2)YgJ4bfq|DT2bAbzV7>*RfGm>tzlV!PohJzi$Lo@*uWxf`|Ne zGZjnNXG!lR786Xj0fttpRiIbaUt)aGh)Z*8VMl_HobLE^__$w_9+v}bWbY_ZyfyG( zmR*BT+UoAQ=FZ&{i!}_=V4?*>IVzW)B!XwqoomW_=oQzG5>nAsh{n2>B zQSf4~`@&N0)3$gE(>Hp(p{GvhaGW=$;T2$I)}e=9+gn~QyQD*{T>5;nVcrTbb zsP*tJNjGl}1*f>}ly1ZS@z!yyisRtJ%_BF>c`g?KPi)MGsMJS%KIrtd!3W1JAlD@Q zYiBFC3Z!pn&soO6m!-dt{EFa_bvV2kk5Jle;=F>a|kZ)&aMiGLNBc zy5?;itPO#1W%rZ!2r#$oeE>`OrQUvDy+`;=!Mb@k{`M~24fr18xuf?tz48A_d;X=$ zXUJ$2>FBE#+V@y%A#pj6bbS9e%`rM3OZv61x?zhh5 z{t9O_YOnBe1C`$|f)Kd1W z&Ek^H6@bFAv0-&@$UtixO9(7ovKmcWJ*Spj6g1CBj-V(Fz|uTvQzWrM59|P=ku3qp zG(FcUy1oNM(UrBp2{Bn%i~L34hy^e^MZoFlThbz7{)9_`3&c?w2f zv4OZH2A+pwqP_rB%+G-X;?sPB?cdw-2Z?awoVa}3A$b573AT|nE=u>gv-^%FsDi}{KnS6LF1MGx602xts z!NKBLNmY=9%xv4xAwxx_!`|xp&iWC&&D6j=Ug)5$gUS5R0RM)m&&!NDJlOQv-nvt@ zk=@#e5>%dE=zc~r+6!OegbE2tSm!`=&22@qHSG;K+1GueDXr-*6-3wVI_kOg4zZY4 zt{O*w=B2$ooh`Pqn>V}zXElS-7}#;wt-cG_w;M**TFMHgrKsaBm*(pSSdFh$Y1oaM zHxgDCo`-nq_irMCAbt^ZUTbVJj0jrx^c-c-_KbKq!sfWwRtM-HYqE}t>f-|-FuA5k zDh&a5!%$Ouksj55bYD!r?E_9-HSx#Lh;VpXqSYEYR*kb%3Z>7(lLB|co$QxVjBA9K zs|9vebT7}nEF~A?N@FXqhei#{#?d$L%diLBYF(`MSd#Q=W)KVgQ|!&U{m0o;87kr! zX<*T4UU#=Ma}1?{6NZZ6Znpc2Zn~{^{bu3eHNK^;@)NYXmZ%ae>1Ntxi)Z(x2$hs& zXMO-b`9Wi()#!Fodg+Bt-OmlBLgqmM6+yD`tK`yYDts2(O z{Ec}7pO?`Gyd4Q#-sY&kVyqD)7C_Q7?=A>sbD4S9tzxkKu{;?qr;py_6C=`UqhIiE z_{V=@SzJcS?d<~L0_GP#Wk~q;Xwj>yTW1DWQvw3a+@$xvLaP&6>uUOY%wR2U>gbf& z&oNgfjUVFM;IlMB;-ns1MdDTVLNpNGW#TNE}1!La_V@M>AicTy2I%KHIw3n6g zbbh$UTY*=osGe#3+69f5Lmc6nesM9m#Nn*5GZ|SvtDl8JLh{k=t2eQ%hf7Y5H`DO&+eAr^ zon3VWtzfzM!=aIyHN{rnj15Aj0-Ex;VVlV|S9q^n0G=2?0fBV}r3#{|_^4F@)fC(X zdp;IMP!4YLCwsTl>;wVn4O{u2=v_gL0_4`rrWsZ57U9+Lo4-*#SK-DSGvZ!lr*)sJ zJ&tJEk<7qK7MRC1tz%uth4);;>jAx}_v1M!2E*|G;lEb(2K%U6;-14O150h%9-=VXL|(=+T3W zw7gRB#MS}#u%|6u4cCAUx<42E^|}_9NWl1!x0U`Uynm(4{`5U>v_wtwuC91XdU#-J zI(W4A44P0O3k#UvgMxIYnoGqM5f5Ln9;1@y_@N6{uLZ?Vl6S{aii=aqMsad*Ot5L| zfFfK^$h~~WHpG<_=-v45H(6|HEg_Gmjccl#;%0K<@Ugo6!N{t6jgo4b>Se^uFGTjV zv^0nl4k=l#s-H6HUfGX$V%lCOy2C1fF!SdyeG6L0PB+@vA|r9@ z0hXI#&A0_)MtUIi7{>*P&Hz<;6Y0t`GE-5NxMzjzzD!vYK?d$;iaFVI`2#jq2#x(H z?|>Y7&2`ci61wiwQ1fjjF{OBA51Pk4xngedsDV_!KgI4Ov_Id1k+#Ek-&5f(*y+Ht zouOu*?yxd^2;2P9=FBo+BA}Y|kVv@OW>SUv7u8 zqm$FSMhL{ra265%{YUH5tU_GD`yX*}E0cZEc|nd~@?oiya<~CMC{DwUQMoQUM$oNJ z8=Ezg{h|x*Lu&3%ba`pM*&@iR)fkkbZY?7aG4OjWFT&pQQI8lkNrWN#U`;vh{Q6;v zN4oz$YQfcRSSNfu|4A`K2vLN2Urkar*b%$@SbnH+c}r%fHJBN`@Ozph3W?Xp3;?@9 z=b~QWX=b}qvj&?iz0chD$;LUa1ZGDL?o#T{D-`vsI{sV);6|lb9=2`n0eEm*1@J(! z>(d_!cMf#|<7M|p3KmlGalC?Q=6Uj^HvfU<^DTpv0y@|KOAWd^bc@i9TQ`QrlQ8G>) znbFUFQ+|7eN5lG~&spZhhjxkej-_(&DC0BdWID0whXZN3@koz7IuN4`^-6(}{ib;H z;>Q;PAvtQVD;pL16G}`b)LKhDw?8f^*b$g#FLXXk0Da0i9>*!yA!o-?TOX&*lvr4*mfliAZJAB^at$xAX%546ETJzOACHoBr z+;yL4Y?z*W%))&eygag!GY)DnWg7tVc~J>V0M+!K?~X?A?Jw*5#dncu{ErkK;y;yp zBct+@B3ks0bal+!R=A7dZzkoXgHMz}%pFD&M_(lx_F1!!pf|^0H~PPpyjsvX_=s(iKrhtUBDw>)5$0%%&RY zo-f9c?puO&nC!is;#3jr66F-KS{C!zA<&>sf$c#-l91}%A^uc5>I(S}ImssRGD$p{ zR-FUz-C^%sMfk5Ss=uF%Uyl#AZS<|VwjC#}a^Pow|@T6Z>jzgvnAggYG=l@++3G&_P zvhjg>)}*E5L?~B3H!DxS~5s?o~!@%$NGn_n`$ z!Q0UHXXG{^t_i1{m-}M4!kb;^7O+FRSS{s-wS_YUOl6Ih(%4YBR<-utId3gUxvtkp z_vUNwg6Q*tZe%$+a;eHfv6DN?P%S@y68vW4@lgE~|FZg-Ye5VSVQh)6netXK%?a`A z@`xR&>5fH+P(p^ik)>bb6eg;|WGKHOtBWjsDt-D-Nyw;Fv~BTldqoi1C5cu55Jt9N z!r00^ptfzDawM(w?jUav&yv)E{-{FMA3LJiC`a%QD?z4GO85$~=0kw&ny0j+TXUEy`5^Pc0a7^o zUwl{7Y0Fkq67I6Ul0xK@gj87MO4Sc%4S)f4w0?h&=x+qhP#w=LeafjxJnKEF%Em`pNZ3b0dTJesGwb;RI^+<20T zEAEFsc_*OR?HLXU?Sto;;~uJ2wC>kI_Ss~&&2Dmj5XW=}&N%sz_Pjxao_=4=1&~_3 z%TgUN3m+LlLv;xN3Mu{>a5hN=y43%lfB&oN(CQ|mCeX3S8*VeAX2M2AwG4o?fG%^L zjxF3plaFvTBlq2<65nXV;&sw+q(c6>r{eZqi@-%x13*?QW91bUyhe~NhBb-)W>VqfLzoSbOelw1RtIu% zWBgVN+4H#lSNoXA?;CjR@k2pm;_BgjaZ2iYzz^A#blK~LJ(LzTzRw7 zuMDqs5>Ty{Kb+sHp`l@Kf^;O15(TZ`wODi<@=8`viFD9=bpVXIWB%g>iA0=OFriWQ zGHJ2xlVm5filp2IADXi_ET&eNR7;=^QjvQ@#Hym)>TZK_-)|2jS{uk>Sb1M$zT=n) zVMEy*L|^m8vCX}lF6wA6fjZD{n=Ft{TIQC--7H%&0kt@7;#x@u!lhh*g&nPPcWQF-_sTULaCW-3x-Z0qgn*jx=GzRLa$c4ev!6@* z3;6wssI{7#l{4&VLk?>`-;9dw*`O$7;5_xeJBI%Oeyi{sV z+GeVey(vNX*5x?<-Vj1;wJzQ3#*yh7t4+;t3ypg|VWm$*!Q~%F9rM@>qsO=R;Hp7` zrVYv9=7TnFU$P&A8N55TLI)e<|L$Un4Q01JF8mU2uB(`ba^SU8aYvT`E|Sj@2Gn%J z(5f@0O>@{T+$z`mXshII>knvlMhj|aqp8;y7O z?rRYsmd|BrWZ^w#duc$EW=1!Fih?KZ05f33nYni~^npXn=N~qahsr1U ztId4$**KI?D&y`UCHx5YH{;l^Z$re@19 zl5D;yOIQOHAOZ% zX_4n##d#M}>zV|Het*oO^>r1fJo|_4c^dnWFUP(IaXs>R!ukK^AyhMmigW5^ZK@(t z!+MSj&+-+&DiClDzjaLi{>5tPAKoDyRraa>hR?^K8GeB-78W_8H3)d1&-SjPke+SS zgnWM;{owV;CsIwMeFS^Zp_`hCTgR4~+Rait9={M89p)FVpbwBFeYf>gBX>9xih_vI zonALIXTo&)`}G(z0ypw&*fZbvnk4GSrLV=In{^IlXX00fuSXU|%CZv9S`yh3*6o$L zV17#1O6h;$vkuv@4@X)Tr2u|QVvy<)G?{p#Y)i_Z%Cj>^wADpm=+CJKr#4#*xI>XnYTW1F2VmIA7_MlJ_umvOSupXvJ*xgPw!cG>*RX~)ZjtDZRYq^fq+q#Y zH23SQ4Z4OlQQLcsX_y!jQL(J|>0l8|cXV2B@#O}Y6sZ5}j+POa(j_g{u7QmHbbiB; z$am*1-+mu@vUp@zpQ9_Ej* z4w*Y@RON^8*IDW(Kv5B~M)fySbdFN|mB2d0Puqbwr zSwzZ(ot+(ILU1UK>&ThXg8;j9r=Il|hA>Su%3M7`{4GdMP6DOxmgSGFN!QheL3+1t;)n4zNi& zNG=SaH}*W661)e z@{}|%XM<{-cwE;Z7|IFedky4#+{L-&)J9zw5=D9PO45 zM1r2YVHfNTu|KzTjx9E!aSe0L;9X-oin){sORipIWi%*F;IZ}u*jgwc9n~FLUG3A( z5zfWGyT1Fe*v|xm26_Aa?#H-lAQk^1#80i905EIGhl^!nv*(do(LV=LH%2kqEA}l& z8K?<&y?Z+fP^3}Ncc7QwBNfhD&c47eREqv@@VN>vX6Tms@Lzu)PP?Fk=E=vI?z{8y Uz+%qyY_%0BBi8&bW04~jdV&&3`$6MGlYNw(v7q&guua@Ze_#9a`BC((Myfy9ZG{rZFMScE_Q~Y5ixg_0e zWvm2MZYb&23Bmds#ksRM@71v}^-ky!CmET>YW@f?_?&s&KH2uOc zG$k1}LH^e(RSn9zVR7+aANLl5ji#}1a1^}_V-Fsz_ZNXvaBQdh%+?k!cl(rRX=yuj zTbfTc-G-<$J=ZWQcvMtWFa%W%!$o$%wDagEZFvguo&9*k=ZcO%_j-5>wW`>~nq*Tb z<5Grjlu^CcsgA{TVU~}3rb`^PaduQ(n~OX7d;nAYX@-D{Z5ok+9v{hUOFZMYp8VXJ z!SYp-o`;C{3hYI1(?pQKxgtkgyh@MwX5RR!rw88)L63v((mj5AY%IS%!B>I!GrKa2 z^l2-~MqhriU??<^#>Xhj*5YnFIPiO-V1XqCR+m@-ef_|Mh$BapXbAuZplU?GWwOXV z;QlnDqt)a24r9O(Y}9R+J8zEp2|8QVWHny!SoU2AM0|R1Skr5n@}7wx=Ti8vxuZ|` z>B;l?de38;dB~AF@Q{;nS+QvkA~m-siP71hJ4d+jEZVKl@(sM}v|`&Ul1|y>a0zA- zNex*DmmQX^)Mz5sbs;tF)@vdzZwJe8>1WOei@hr^H>it>>rN-sVW4)xpD1 z5%dk;S6&F;I|@X{c`@Q81qL_i&BpY@3>7v(A4T_V>0&;+UeXRT%B5)?IErOR3+{wP zOzEvU^nh2+23}A{S133FNfo5h6fYtIodgf&+TAUVu^y zX=svNJnmyu%Re3veo+&mfwg~5%Od7`*;D}eNR^_cWFG2uJrO<2F_^OJp96l~BFd;G zxdrFlNrMWW?n3AgiW`y8CQnRlO_J|}ZxUBQ4M!U*lW8Ul??8pVx=$1M?I>?gf;3zk zwa`Lg5}Af6Fnp0=^?qU7{C;Dx-{*zz{@QPt5fAcgc_? zQmv@I!z56cH4yqPt|c=%Jd zwKf|Hi0D^=)?&D2i9xTdzze@!#tjUovTtS{b$S&umu0vhtLRuTiL4vz6lt~fSYY+U zu5X2W>AQwxXUSY=(Lv^rl@xY7CN?5@IY=Y%!TQP9xxuFDaE^3o+Zl?2hIbQV%}tP& z%1SP19ATplnmON;=&REd%stX*IWmJpaLq)rCQgOuj{#EIH`s%{Fw$*wi=@cLi7~gx z5Qtz5O8zdWFNP%)EiCx+I_T@;-v)z#^6kEm&1!{D3!Qwct(<^ONtmfjHaMQ}2;^>dqm8BI}EQ+*+tln_xzxb8=anWY#s>4<;Z7L3o zcCH(C&c@02xY)2EncrZGtaMlSYyX8ECYGtf_?+`yV4Oi9_!7Ar#ZQlt<*iy-(Ni8E zSNjl-_Cy}iIL%5PqLlMii=Uy#i0#DR_KkorozB!*GD&w-OvPJ+CNoPu)(o;edm7Wh zRNi#W$6U@pw>P|6Gb{#6@)qPV4x?s03cIGpvxc>O^h~W9=obXvH1muboLR8h=Cxvr zIjg^9x)g+M=-LSv*=-u|eCk;BWDIwlC=c>$31B5MY>_L}icWa9Y8W&3thnj(X6X*EG=E>{aCh&lM@3a%GX zP&L_f)`xHEr(bfh!^RiN%O+g>_F>vSpU)?-dG9SUm_@vt$J0U*o>}wF^Y5`zi*P@k zSy1inV-%D&D%=!uANV0ZtyC>SGWJH@+H3=~-tBzw)v-J-zkYE*N@(w^$FMUv^Ft$6 z(u3ndDe(wNb-kAfP_Ur7?r!cg!jc(J&(KCsYh#B=^%bsx$BOOau-Y0A$8R#RC;dlG zL)9rY$4n|_5skVwv~sUKSna-NTOq@MlJOG7I|zQX%6kU}2K9CPq{tH{PmMZ2kCon%$P@%M{k zsrcJ2w=$dlB}=bP?HIealT+aE$pvG>x_KoF^7{JZ7S+-hN{5W|Fw)}4^TarXmjch}rg4UDW zA#O4w`+ZB@?)2dG)4FOWF<${Y0gC+Sdc%N`+1o4K_0$!-)E#BC+4(eaD%wk>Vue;O zwGvK7T7>@i4dklsW`wc)R^H-q+Wepr?e2TaZl1wx=>hs!-MlIsuGi&U8FYxXtkdK{ zLw8w!37=MOp;BdEh4ym{ZQJL(`b)Ow*0zyOm=7D0ue#+rCLgn7C#e-)-l=YyVOp?w ztUalgat2;J(w>iO{N!S(N|+NeJ??WTlXLZW|Wt`Ll2t%a%J!Td1{ZFsQY9*d^!F{^k6^i(R{tCdleXsJ8>v z(@UAz+7Ni8j80M1*p%qZ*ZX4c01|7=KCF_^h3jIEUIvC!St1nt0od8WmuB4FiW!)z z;sM7TOFwwdIFIfS%ys4uk?x-0+61}dWDm?5(N~EQjpL*|(*LA42kQ;5DIBu&f4!(Z zQ0mlV7IS)>?(I1|0hyQ&z{lP=W^>bIZe4Bbg9=od-1=&HeIU(F&{uEJeNZO>cN=~J zqe)b*=i|3m=0Tv!p#2t>2cpq&U{fjkv?A7^V>iyqU^>6dbT^rtHhGEjoOe>%!h24| zh0eXPv@|kKw4+Y>bRQS8m2zWfk~kzJ?_QpnnOWW)Q>*vBIM& z56jS9aw)J-w@~Jk6B`Sz*WJ$@+@4REw?bGSI^e|0Ie&T)i|m3zrT?`tSp;?E8bL%v zgglHhyRJ@G$56SxNw?N^Vti&V8mbGehn&sF`;Tlq3H zX31;8i$Y%&Far6wfj@;kM~-ENX!NIZBI{G$2 zh98HX_xy_h94+i06diKSU8f`!5u^go>bFA>4^cG>Rky%ImJ}uNS;G%eu08M+A>K+Fb-KE8Ws!x&;u+)|9o>L#pKMn;H!6)I7|0PzKhwb!SYa@l z=OYMBNRtUyL))WYZ>1WDIYmVH#=n)|dU81}?1i_@GysFe52GXdczjk*j-L9klIOzn zhpA=4kdp}nk7j}p_FA9(O}lz~du2Y_?tGzw^9sDc{B&(qz6^s^IpPZ^4PFk!lp_JL zh8m@BVoV3f`~gC7pwq29e%j&7*3i4tVgISVWOUi^T94)1s~EmVRv-tnkKl)U6gmJl7rp9wMB|V-VsP6M6gE|YE)ms zPD0?FLwJtcy<%w9*9+?=|4R>0Wga6fB}T&ysE+p=l>Naiza#lyHNqXR68`)5GLGIE zdf$Oalyi|*MYyxxVPJ4r^x3o#Qu?hL@ZX z{g2c)&DI^s~;Cb#_o8*wA{whqhS*#$alP zHn^cpdOdsK8+^`U0JVw@UO$0noLnUd->77HWq({`Y2CPsGL6Cd;}?-# zf|H_K3`Gauu-&o2UqSf=89r2*!;w+7^i5T8WXBxrq7OP zk~^XjJgZtDX7WgvaYoC!Nq7BaPvL}~?V|K}^5Kp)r40AkxbPPZw{nrSn~z^s3%f22 zzS@$Y{2T8i-=v}vV3!RqegFsDa0m!6U3Vj$^+w3&9T2&JKb4M%_)O}KFuQ8=$wxgZ zbcPZz%zG=T(%!d>n;^iU+ywFDAp`%86jb(rNr_Qa{Hzc(nV2iS$Ke(Eq$^c<#Xd`ytVQARs&Ab>`s@YVZp1UFG%sQl8gr`eZ<# zX5X*POg{V7On~{#%Cz{MA1jg9+tFyf<$3Z1LHuNjz0lhAspM(WwPN} zO>wSSOPiHZ(A@{4xU36GDDhuqQyr7a?&_~Gxuu+g%M|;0GZ$LjC5y zGpv8ytl}hWW1D$aLP-TWmoQ1-t+N=2;`0D;lDYyC{OzHxzW1DB1w~ls+?;ME2@SbQ zDbai4sw_{qxNIn;;`%O`Z=XIy^v5Ezj`MRCtaW7A1TS9gtNh(CT6B?TP(izuTds_8 zqXXt_wpOpJZwYyLs31&O1$Mhx_wSw7O4QBsC%yBs+i4({cZ@Y;I1U$~z8(J#Q%rnF ztiT(IC5P`E$M~OxtDj9ikogPR&+}Ly8fQ=YM)rmaoq3Nj(GBYCYqt3&sK_!hGHNp- z&eR?tUTWhR(jB~lC&rkntr2@kT@?m^6JKJm#|_Z=#WErXuGfXcty zaJ+Jkx1cY}>||<`fBz%mS%swx@oQf&l5@$rJ6bO*Qxoh7Ca0MNGlj%f2fvKRRcLn> zZo;`_*>)UzGrnW+&|&ojrYgfXmu=Mw_*+X65`}B}2DIe(+yf0W5hRf_AF}`Xr0F`? zGDl-*b@5W%-Pg0_Fg&1*WqT;x``OT{2l9srCIpL?9ph|u~FaK}g7d8r$*P7hch!N!qlzFgF{87;7*Ec;Pu0S-})8a1? zYKXaS?}GGNj^OkQ16#Y3#XQ?6@80ZMGj;Xap^=4q^-`e{ay3rxhHZmu!e~IsS1hu!L8uB+G%uL-3KVvJJ#B-{sqw zT%2<$kj?7BB|D4OanNh7!<)iXSUS?udhQ)#w*5 zZ&B85YMIAd!708Dp^4wcn^|S?FyOosCz=%!Nh4wlXC5Yu5;FY5kb$#4t;Kvr`ql6~ zIo;6(k#jmmyO!ffhi^*Ehg>SP%;H0^qPJTq^JdKz9RslUyMhhGlMZ#YCxvX%wuY@o zZSjQ*b#2-(JlQ_D053a{ywrj8^l{2%w}K*eFc#4k^Easncl{i!ZezthzdTeQO@#Hblf z7fre+VBa%>oq=9>Dit)t1}OAs;uPpeFo60y%KGhkayCxi+AQHK(cYrb%fvS7A~kl* zSY3kv0;d06^c#1_jJX3lIIOXy@o=zmxroB$r7V;0iK12^>bIUlwhkswvLEuxRC*eB|UW zB|UX%2M4y;Co}Oi(Qy37m=)kpLi%7#3U0d=zZn^w`7)zOmU!@iwV_O(<1eGsVWUQS z1Ty!Ok65tr8~LJ3p@sRuHQ^hWFv08`RSX%i|Ke%>;GL($h{mb&Fumgi%Eup5uS14v zoK7I|uTxu_tQZDW#v?M8@~SXDoe?Jxu)}5Ozq^_y{*4^Hk{ab2eBQuQH#{>H zNYk{K=(f!{dr@)j9IX2OGx2Wm#pKPTIvo-107o?@Lyq+k&3DRtI0((c__ldg(({Yj zZ(jE=0!|w-S1n78fzF&$B%n`L+@<(gi9?sWRJCMbC7K+(OXTcq6?r9}ZMhh)usyC( z=UA&pG;W;~w)u81hcwjzHw4?1XqzAqi9*Qc41!-54EkN=igt2>N0=-qAwd3%v+iFl z?6tEnrrqtMJ4jaNC!In>9GT4i%yN<8WmyaU>t%f+-FTL#ReTir_My{JesQ6byWpOB zYWooAXtm=e>10wie0Mb!`p8Y*BeSs|k^cJiuMGSl;em*`(3&B=!7<*1yvWtON#h!= zOUrLe2(2M20aX|Hs#@j~#O{wyGFD89DL5hbpc;rd{$m%Cj0unkjkw#2xgvh7JiDOk zGS1_sn9bhjchdiXHiUDKLSIodW~EzUC_A+Rp>teWXkTKQf+l@rk*SMRw&izuv$A(iimV{X7rG|bu> zO^yyL870{Bjdufxk>-jy%dpz#O78Kc=@4O)PfTIH#X)4z-Ig>n#RBzHtq-%i`>lqC zWM4-exDk9G6=~;uJx^phC7W8*s5)Lb`NDaW2JhEGTS6H)0Pm~T;@(DIyh#Afqd#~Z zV+(Xk=1!ql&*Y#L?N?s~uYR{cdw4rPF-(SAj&NZE>u)MnXv7~qSa^Hs%J-7!@NE#V znoD(_@M@n%=k*#KG&GPc6L>b=J_-A!N!>tvNSMk3CA&P~xvx#y8?orN9M@NjD-{=b z`7?K|wriJ#^aS8n3()?OpG;F*6K>(iJG7yZAsVJFNysPIY-N=Hc6)X}|54&A?QqgL zyr%e%hMU{N`9$6Z7?*Dx^52aFw7tx?1o)(gwYxIUm8+^ap9Rx*I+?}&qy zODehsVC!O>va_X|H>c!%CayvK^Khl(EGj0zW(|{{vq?UU5e*l{bA)Uao-ea14vkUDFiA+ zbL^q&l=#drldg&HqRXGV8VyV-HE^`QS`S6XSfykqVI-*FC}()%^2!SakYK~gfefZH z>V&1OYJ+Y@*8aON#8UB9Hno8TbPQaenxQY-x6~Wfhwzcx9JaKC=@Q4boin1NB1RZ` zX_ zpp8A>8rhMzNcdtmyo--y0jK=_61|U7wl3W6WGf&^sCG6|YipxxBO`sb%z7!83sTpZ zpl&{=36U8}x$@L}d-9~VCl)D*uQQGw<-7>u#ZTa!aTA-T zcYh?~x9`;t$M8UCu;;~K9zSd#&hN8a@}GLqAPJXA7k7zR4EKrJ>PcOm(C&hT#*ziu zZbbcM2U=O(Pu~>Fn4ODMu;wl4QQNRFASs8(v3L5O^}5>Hgk+y&r*^+{yzCs4hj}Ko z&Q&nE;T98#TDv#D{LC6#Lxhh%0!tbn60S>*crdJWZ*wj(RN@7PJ(yF^_mY}QC52d| z${F7fyI(<}7QHZmcyEpKh+Trh;T^BZ6J5&6CE}Zi1dFhenlE2Izcp$q1%<{X*WK4apw{G=Z_xwoEwXvR97n z`0V}j??WE7HmanUl`Q(EZ|OSts$d3Z+FZMAn=AUMM3yX;?ruK#NB*@*%f6GR?j_u; zRwl>#iQLIszxU>Rdu+VgNY zWF6@|n18WHK}s5j1JGqC1N)vO9uSF$f_H4jo5`BfUwNd8e1F`M(j94}X92-sXr z5wYvA#TZJA`PYQ5Y=5Xl^@s<7^V=3-bLA=do1jdJrFc;i!22W zMYxDB@2}q{-mRvYy);#hxznd>B0ktwdVPNBWXo`}#bn4r&itDN`>TRU>UV@kvK|3( zfPaOBf3nTrHAoOvnMH~o7Ku!ekNTZEIC^12MF>k4Cdl?l(i39YWr78$acjmI>wsn9 zDQ`}p2fIh@l*rTT_3+l@hw^eejnl$sJwqE>z-<=3v9_qh4ba5b1JEb~Cu?nW4*s8&q&0WzXyWZOx3rf zRY^DLrqvQox_?`qvuyo1^rcnip3)6?mGCW>R;S_aTV<(6VR;-lRvI|FIH2Gsm-iY} ze*eHjaT?a0=zFh(wSw_S_mM=SWOn~w11vhjgwkc&|5-3oeRKU?DNWu4+YFoW;t^FA3mej7|8mg;Xp2YZ$u zNyJk*Ap2E^!ey`mX{6mF{^t}w1{wb^NoKDrW<0i7qp^x8d*FMaDw$URl7R0Ug~Wq9 z4)gdnb~C2~g0WxxJQA(*(iHt~_C&QNI3BPYI4aJ==IVxZTMHu3_YBs=)Abp}4}Xe7 z{dVRG{DKyrez~Dq=1_|)8JYU-B{J(6!DNI$r3d^*-+1ojOe*O2cKPR()#^;uw(;I{ zo%6$D&MPI}c?v%(GI(^Sb~3U@Xs*=4Z*-=Yy;9#>`+0Ah_J?&PeWG~1I=^!y37wkk zO3C82)3280bw2UXu+zk^k#te@?Y=irN!umd-O)t(~}{1^6`Ce!d_(b2n$_e+p-U~~RG3xXyK zyk-&2#7MJUTv~2a>p9%bs5N^%U)1XkJeO)Ma)%5@sc&VMG4VTZR6Q3S!zc3qnux&3s-xr-|7E{E24Ax;Kn!Hv=0%XXrnMh@5s;E-;aOO-=ocQ=+ z8dE|uIKbo&Qu;3@@rR-L{qAhF9qrOfv3o=#9?EAfe7yTXd2xahLcWx? zp!ELE(K6tUTCEkhH^Nh8Jx&(1wUUqNfSno-y`W1N>nwh7_eCATz$pPT88A z2!1^}xY|a`-wVT2vRa!&@mGFN>Tc^C2rYMBoAeon=VH>4km_(re zhQMc=jR!kfkKo!+x?gg0R%QaJG3)7_yj)+)%hgH<H>Oy+USrNT{}5)+S5h*BEt8xE!^ z9Ey&Jcoky8bB>FZDGE-?dBxna9&3dDJtIYfa6lG{W8CDq6Gza*snFrBsfj3iJjM`;7}! z7(uoHH&UwXI`)pjtnVm1Wk9BaeNGU;i`fwaO5^6UuD6Gul=xd3MO`<$zmG(!iMKL! zwS3Ee$r5*7@jT|Yuv9q1h>v95$pIdGPs_)o|N1}!a@GR?Bt8R<`ya=7;eX)#XsDWw zn+I4+eD)N`(Jj$D78mPz9EmDe`L5$pMP)VwvV*aA$4mnhJ(hfV{N$6Ak&zKkGEaR6 zRnJ?z{puLT@I+K=xpW|ytCg9NL~P;2`Ri+1wA&W3NY71kvh-i^-yZs$^;5j^H`v&X zRULd8#jOz4GxsT)AW!a4`K)us$Dl8l5bi5{`iaeQ=<`YiLySH9O6`Vv*7fXK;h`|;UM^c>X*HIHrZ6O3j*T#vtEPTD$J?cniW2|%}mv+CE` zlam=zqcjz`NEQx;yQmd8xZcbw7<{N7c6XTlwm0K4v`Vy3N9=^@9vkT*X`%U0*InnW zMqhkY>;@rWplw%pu;@EV`h62J$~764&zs4H`YYyEsv0sbW2~w8hN;xdrIn2g6zweroVYof+ zx6od@s%_(=lrjw1x|nnGkhKHbvxF}CrwXs;JY4-|Ag>n&jU7}-oyX*=<(pOFtUVwA zDhd_PsyJ!rGE>cl5x+ac1jEB{k7=AgI~8%8T(-L%znDK`i1g(2+L5fS-25o?{nreC z^GL@dOTJ*H$D?=X$`h!JYv0_3J9)=T37sh;)_|YBWIf_Cvl_4p+h8EX_ z`5|x(c+!~r!PESq7aqVgLV!{pr4tjN9vAAVqQB#T3ixpRwmnQ2X;#R>K%aH8!&A@@lsIzOof-fbDPR9Mg4{pqAzgFb-j$Ibc}n( zFW~9s==jaWairPT*YU_`lJ$5nWH3#4w#9Y)#fukk?*_$9;a^+tVM$>yA^I=xv-Fsc z@XA}~UvZCX3@6_Uy&`Y&vIk!G@Mno|3i$XsOd3tF?BpfYFsh{(=?<>$)fFrLppa{bdq+SL~*S?1q7#=?bQsAupd^wh#5@&-@lg_to&hD3KcI~!&21v;j zRgEcebu{-ayCLKHc~)MoUFBr0l$5(B=@j6B&2BruR@1_0>$J`w@} z-#cYHSpYY94*(H_K|w*KrKLQKRGDC(%EX9<3z?^CH4ypO9z)Bvzj-j!86gwM)1E)n3k3>A`V7A&Hh+yPFHP%CB`M zdR)Fc%ZiXubC!8D zi9Z(A*uAVoLsYy;D?X=D;lqDxVV><}!9#R#V=Cht{?hHOQuMotO38f#qjwJn=(FD) zb46HZSlih~cFlRPF5gxRC1{U`%#q+6Sk}c$iaL}eX>%A>H@E+c?4p@id{P6lpk)Qw z_B7%?+IFajCydI0%iG1r*#J(0{#qalR}sY-e5s&X>KS%~thsjKC zw5$rGU2g_C62iK|r=9T1FOTg=W$777^6mB0637`rJ!Dbg<{#Z1(MBc z*6;~6&iQwbG(M65{aGciMY@TW*325(_j=mK`~c6*Fszq=uScQwR{v~8jsarv4$6viB&K>;VJ@rXh(K>9M)Xs2BXoj zwmrV`jmB$IcM%_)XFE1&=YFs?(okDl3lqmYvr*Z1z!^=y)1#SJ5^RZ=L<0~|jIu>0 zdq$$*ub4vq4A%XonE}96l=;e};?xMK>r0F~FOEE>374avNI?E90LmDgBlX74x#==) z5w>|%HW4Y8NEOQ|w>(*PXeh4y=w7z>@qzliNyVGsHu0)w$7A77=@f^W47#TBeUe3% z9S;f0zuAZC_O$X_;~c&m$0Y5>(x{DM)NZnED8fvVyw!a#XatRKFWsumzs)> zil==h2Z@Jo&F>OD8YtYu(g;A?&0=~j{<%Gy`_`;Nh}Ee`W3gS(e0=NMVC#6M&iiyY z@#WX63*cjg;9b&Xx*)XhE*sG0Pqn57?#ae4T}q{@h=90i0p8;M-R`e<4f&PpUEwP< zp~TNkU)AwEEjNt)myG_N0MbtW(fdCZ@s|?&J;E8R3+XV>Ki9sTVp~0OXXnMrbsM-j zy1>?PHut<1;!4te-bA{WQ!#VZQIX_*K9V*U+W0UZSnOe$E2Lpi;oG56iGQM<79}_S z%GzqOX$faqOvu3K=4D#b1V`XuFk!{d<8GtfC%)@9l{=CR{X{&0O4~`FI@DgHUB}%g zrE=}6xtZE{zH*x(y_|dU#^{xH884JfJOAgg zqv!N-Q6uSd2wQXw^haa2QT3CKqWw*vnhu|>G2-c_?oXW4O&Jqif#!04cb^^;-W8rZ zZsMWhWs5^&d*eD<@~;$`KO;r8rkT=;rzZtk7nUSty+p}2&)Ha5B0bd7fAwj;TUu{B z@xn~DvrDJ6EzuNpk{S$e(`8qBI?AR}wnonn37)u_$E;05Li%4DiIoy>!?;T3>uV|Z zc7$&O`C1R^>y#$nMV%YAj7_Ts``*7i-cXoKwYvDJ_4Tkna(tdR#_2wlA03Q?hMIOz z(91FCXFW1nzx#A~O%3zn#k}gHnn6*X!HZ`-mASG-vndmH1v}rcpp3Piqv;}vc`}f` z;1IX$lL`G?+m4Q^(mbKyJ{z0<1eapggC<$WvmD{RSvWnkW^z0zx2KdgYfkwoFm+z; zZb3UT8_nA(E*SneJXzMqd#hb&40sM(FN-wTLf`q2C$kg7kew$>Q(RbeGKXzlN?kEC zIcT*Qb?#G9nSYvavfG$WOKziIOj%GgStX?nr5t4*~u-f+>?yvzxT;zU=b=hphc@L=m3UQ5a5IdhBh(p)TyL>x%8*n}8izs2B z6@8aMuIFbdAD-wZe^YnQNV3(-n5W7LdZpHc7y3-8)wXMuH&sWNy90`voI0(#E5g-y zc260%q1EzrZq@A>9f*f9dqen+9}RW7B*`J&Cl1@5+b+cXcZ@{ZetfYf3dux8plYT` ze!=_VFh%FiD5%d<*5YR@x{WrqwWEw&fPed|lze*`ZQF6msWV2Db7tlHWL&h}H-~ck zaqq+_=JdX?5ouH6C%nrRqpdF9sC6GDwpXzSO=ht$887d@obG*WK@P|C{k{<*ruMDQ|uN;4yw4Adx$92}p0?xv= z#|K4IS@@Ha0)gVF!x{!J5pDW);m1tcW#T`wkTmj*WZFuNdR7DOg`A*cA@#okleKkV za3g<>=cvYG2?eTu3RSJ?PyoFse_XNVgJV=G<39l`l@y6RE~Wkj2_`0x@S~SF#~}4= zjW_>9*93*%OkFd+!SlGzb}@Et!a(~ZS+mJA~;F zfb#3LS=Q5^$dU)`7nUK;6VcdO&z3b6wbwzO6bBm`CPUSg+VdCjl7c+#6Yp9`CM7BF z4H~bd&&y$N3gM5DacHNjxWWGnG;Ss~M;DB{FZ^1Glw@LJg9fzNl-!%GT^eO=q|~-1 z^JqA7?s4*1^S$MR24O~R~-;rtIe}a7u`+7gDH`gno$~1(oD^<@xDDHPf?g@#V?`>{#q?Mal+8@o&GiQ zDT7w>5gPqr^VvMF@^!*ZCz)zl3Tu!XM|Dv6^GZSH)49;9kSW8(1IZ^$P0AK?j?Nty z@BRA86y6Q|4D=ql24*4;14nN?V7tJjV-Q1XiDB2kREM>M7SaF}zx$1#mpMFm?k2ITSXSXcamDRNR0N7vg8LMP*U(PdIHf#YVnxDj7mTXD{( zd+wKGF_+REz%FM~iM!>Ue{3qXq|?SL$om*qSb$ttX z!>h>!piy@^aKSfnCKbfEgs!R+ZgD(wtBFZsueI_D5GPUvPJiAk*9>~CSh5MdsvJI z#dnQ;1lYht#tqWrlO(p_u3{DGV5_KR_cI@=qhTR~&hR-a zIDdYW-;GGeKK(Djd z65~5vm*f zkKU2`ukjwo94Jc))Yx)<3T;k`zaU0`T8{Ns{)a@nyh!_ytsMvcntA*fnLLE*KK}K) zkR*&4K*jbajro6@RDdT+3=nCJB%hPL_V6p>>g`ft$)<7g?fYH^C9H2Qb?WqFqW@#_ z-mjUbnly|q-4hO~xO~~F)iJtTndV_UCf#z-{IOd5Zu0S)MngTwwz2=6PV|sJB1ikm zFztEv2*kn)GGK;PC(3_TqpQ}9hBSOLcF@haIYVnU`!$;Q1Cs!Rv^3B}K_$fc!(C*P`*24bCS5%~p%sXo$q)z5&w#j2t92IGf1 zZd*lo=#*YWWkNP(MNSrfHf0%}dbFCQC82cPAm)(gT?k^~`j&E!CK3PM=OrNQ8B!T5 zkhJU{H`aLGk!PzR&f1gFhw=*a_2Iv5f+TF(k(G}}L_~mqEbo$Iknu+zpM|^w6+jR< zzrT`5YwNKvV)992tZp%wfR_JTDgt;`%y?Pt>hN_4`XlOhRE$U=(|~-KAO4a+u48G9 zx1=L}xb=AfZF=k6m!kAvwm;i9XP$Pw1^klvCwQCDfo`4F+z=N-8tHimW`QYD*Siyr zPRxzKe_Y}*BWO!^+OowJOgu;l<8Ve?ND_s17=Nxl_nGUE6&ze{k?P(aC98O6zHqw@ zZ1@R3ShT*oddip;Jyr=N2X*BfWE@b=vS=LaztFify0@=2K=saUO5XCnb1C$?9cU82 z3gdS8IX1J|R=1?1U|o2g$5np{q4D*)C@;-A(AB>G=*TZ#1-V~Zop)GiG(a*@3h4qDB)oJIWBvOi2T{Z$l;W&_$ z;@g`e$Z&|NpV+IO%U7wYS!7~hzc1}&0om`Q_{cu&BMl}my7>b?R}n;k1%yRD&hwgp zkLOiZDZ>;`gfN|i-+ylPe;Us}>5hrgjI>Nd-PRq>+! z{Y!naE+)Fk$TuP>=ch^Hp@iWoSAD7#fL`=}3^@1LxInJv5odz*8a+ma?fB$lRW9)? z3d4GPAW8Zg78ylE#HB$3q)VwTTV0Semrs&R#@Cg+Lim?)UebG3H6+C2*)G7c&e0*= z&_KTHHZ_)8q%CGkh!Oc+&uCTQCx1_umjZYvZKE)SYk0VJAF!vC-l z{{uzx_j)rYWOJ&{CeJP-drU{y%^vz^=2(~5ab_F4P+rkSg{s-qukLCXaXbQ4oi z+QVw9JJhJn2!5_5^08ikqIi;14PJcb>Q{N*}Znkcv!2`Y`fdLYwL?@E>r)) z#$NKW;x{!1R3w|OF*aWM+T4rB`I&c_qZ|oDdTYEek$OA-!hT>H$*q7$X+hM>^Q0{cmULZ5hb&TxkrvRl}c~kEdT^3=Fa6Dw|JEDi?xk<)#u<(sG}K z{_Nq-5*=yqH~8kmXYpdG0_x+9O(HA>WhMgNl3Qx=M`2!m$Ni%S{|jYICB2Qp1AHJx z@{7*jJ^$^T%(ejljR(i1=t%faE6kV~RVw}z6970SCH}jB0uKl>9J>h|@a*Wrt#uFG z{9e|l@w4&m6a5WwKo?4<&5Iah#N1E!l(z?ox+vk{$mbQQaG@^GzfCPnI6g2IJk?f} zP#}b)WSI6i*=jjr@*K`6b{i-$YHC(iCTZV9-|0ZCby}>JuFmKy0MA{hK=g7p7G2*3H%|E@WxS5un1I6ca@_348T!pIc%Zz>7) zoUoiw#}_>Nn2`Sm)q3Xrb&q=sD~IFV61Y{GuzqVpVnw+Xs&Y|)4_#nS9UbZK4wElI z)O@PWLuNchg?y)qWJfFJ>Q{flw$KIEi)Y9I9{m~MKe;M3sc4bnt?V9w6y@Jny{%O1 zS6?R(R_BZh=aXfRFz}rOF504|ofX(wuW6Niq?l*cx%hZ8iNWFbr}xyTWl`D2;~AIm ziP(jP!c6W-%mI@MyF=lw0cOoybh6DcC$cA^IhvF^4R~0ouRC~_e+_h1=v57A-|Sk1 z&piI5^FoWoJ8M6q(5RE8`e(yPs!_T$k64a=Zt5$`*xhXtYvb}>2FVBYl1;OO*&~@l zGi`dnSvumrwaIFQ&3y=Ntjr@f35y=0PZVBxPX1D-7hhgAMI8usths&TKQTxweZ5%q z)+%=s^59`K-?OXI#*1wNAp9UiMR@XhYt3s_R~#Rcfb!4wETJ@?T~SI?k9HcqJw6$v zbQhyd>cRxxN;1>eKltO62?6S!f6Vr8p7j680sb$VPfWPFx*9TxG?$H3txBm4-}{M| zV}7Xk!zfNn#8mcTYCORxx6zm^kW$MtZe|B`Bl+3C$JLDg>^aCCan(bl)Q++lo`?g| z4IHUgE$|B3a==O*QqF7?_hg}F^a}J0aC-H}xlWidfq3qh#t(IGb4P#e3a2Zmx7-T( zId~djNUaMEmdu@XGS*dlX83HC@})A3zxbKswTux;%w+v%e1TE^H@IDb+Jr1z zjtW>pAAZxWSGxSQKKQu^b93-(Q`YY|W)M~!*!TY!wSD9D!`|E2tAjFS2q?`E9^=ezcg zkm>@3-@hucE^LHC;(`bG8sMCWS2+%-U;pO=v+QQ0_xY~dV6w5_?EE}S1E3%6gG{<} zO2Ljbv1?qA27Y)~yPYwX;jQ(r{^Zf@na!Ugv#odM$loH+@adryX8SDYvK5N%@S` z*(V91-n{b4yFLxDA+R%w!pUkCaD=yiPv*B*s*nj}Qjc?)dAqavB6z=`fPoKrr`B^w z!9vBLDm|sTB!jNQYCN6TskZwdUJ_GCW&|`sMpSM#OJi0@zpB>Ia$f528BGF2txL=T zmTw;GCt5wR;>16;7P?~|G_pZn<#*^+6~fM}pUB+!TJ5=kFv{{d-Xu;AX%ySB7d>D7 zJcWCGg`WSTof)OCmQ7g*sDjq75F^;GTKTRxGh^5hCz+unVWnS{*|jXxwuye_cco=bhcA-!qQz^k=%NQ!}jAp@W!Q94Wrj$5z zs=;2dX5hkZKcLxON#R(%`4WVbbFbmI=e(zZKKLhqmAX zhDQuUN?J;#8>BvjF^-}`&s z`|~{SA20tfGiRTD_St)_?~1+F+HuwpTHpz{{VVol3_PKR3r5!qiQ}&!X9s3)en@kz z!XU)r?qUaG5)9w_GNn?Z^`f6XXF;PU`ZPk%ibR>~R=&Lufr`+Q{~tckHEezZfmAU> z;UG{RY8@Er)ZgUw#d1m&0&36>|LN#~ivkpZ%s`_oDe55NL$oQS>V_D2NCZQ!I zU=wo5ZF2b{tyCmrPsR?Gs|K4v^_!?NkJNdwbkRhCX;IrE^d_b^@I7w_-h+2@Zfj|n zq&#n&oa6{U#jbB{#XS#IPJc6{zSXnX7Sti{>#BdU0u6hpvX07*lxl=-$>}!g4u;yW zU$ry2Eni}yvLQVj+f&p)vdlY8%$jY5S-zl=Ls| zJ~bV2i({dExi4QcIqBRt8PO7sYbWp9@?rCAErW=u{A=g1FGa8o5KvKYrjNPiDw-x@ zzwnkiCX>*0^OF+Y3?I^?PBgEc>br-LMA^Q)o4$o?I{iRQfWKl~=*dvM(`0OpWaG@GP!f*;LX@JkOu;cPyPNto zKh>4g^4(RZB0nN#Bmn*uQPUm@tM;!*LpYmo>?&Q?(p=gR_kLQK_{s|N6&a%)nzRXn z52HWxG&DPkHFP(p$27hYSL&Q(+9?oHQ6*c`=1Vj}E|Eo)buS>os-TtIsndq|ZO#Yo z+x(|rc^=5uB08wUoW+NOUG+P^S_*erP_f-25@WINi{37fD(>@om4ZpBMa7UZ(5qE{ zha-`N(loM)7;7%A`o1leotkzi=aLfPRb1$Tai8$#H*TH+hWWzVYnvH10UsD~1Yl@q;!krs+f<<=0ZU)CI)AwB9WIlc%1YgbCGnD*Ktv(J7o5|OKU zst%=MiPYNqXGYNUp$!wY5*tQ;sU2CcvYFkwA{#KqFcJZMXG*ruet`qW@JI;0fa_{opvjL@gw)t*aIy_ghj>!O}` zK{00{h9Hm^M|@7Z)ict8?@CW}_E9G}AQx}H(PnRPf~H@G9$fVQ#R) znh60>gODT=G1LrgXo$O_D5@~eeHFqOXNteCBGP1Lqbm9S(S!^q3rfXsB_ETE0n920 zO%x6lqn3Bn@K$>DO(9SmD8LiL_5CxZ?puuH)3oni64&Q6Fu(N1_>%1rh1Km%7dfk8 z(ltA5ECV`!4mzd!&6L#5o(dJV*+zFc+*sPnQ=(+WL!RkkiG2Q8yh+E`<1QVQ>s9Fj zF=1|psXCzCHVL9pu{b|Xg(R?wQu5KPCVIZ^My;^GmOqVewiYW69s1<`a1+biTFRT3 z5R6lZ{Im)yCeUqC)L85Dl<2Se!ZkR2(W4=Me9#)1at}ra_X~pFisEPB?iL^3&(+(Q z$^qrsW(N*;ejHYkPau2XBTJ7M=wu29;mPx`1~-;)4<*p@LCNI`mRHj5*J!8Q;}6{NP#eM zSn%`Iw{h@>Fc(6HGDGv!dW+qR`f4_3EV!{s-yeD~O+1x-?)qZs#1_k|<;>+gV>Km( zEVyqGJEZjdWMarIWc6f&XEQ-0PB9O%I@!;N4pKSDgWLhvuGw9jivh_hLHE=yQxfOm zB?XPMAU<`$X6LctSD%lu*-FlG+s*ONfrt4kS$bbwT3(UfV5z@t`TRK7Ye;8Lo3$e5(QRbqH`u^+ zN{b7)*A2dukOj3Yl3$X4o+xiC6+?}DJ7!1`o`xGYOlOpdR^oJDmvbmlvIqr zdNt*919-!Q_DqY_t`k~R;aejYz=*~e(vrvY58k?qOKXRWaTkxFHsuq8gJeO7cpxwa zCL6By4}NQm$~1^ck^Q?3cObQ#dLUjL`rA915aWMdaK7`_zzFoV!syv!`a~ZSNx@;tJj0b?4fkK}n`^Iw?VtNaC5c&5N;Hk-2ZLRX(Dx(SYH&xiv|!{}3s=en-Tb6y#+O@! z@pOnhV_5sWV|6vELJsiGc6BJI8$BDCK-TN-_hzC;o5wfy{!4ecvWiCP5x6BbSaDr)sPD5-KrU zEpG!GcK><@_mNpiRQsE9Sdp70-%V6UIiFiFms&H&_TBH1-V``>Ho z2AFZ8B>y1eU!?di%9p|KMfpwjzexDMQ~kd+r>ud_wyer9%#q!C^qcZ!vmjAr7=P%T z7m3iU<>~c7HC5pWCb;kU{NV@nGbTAj$zRL{JhD{^KG(oSsZAmY4^)h$4h>sX&0HQ1 zudQ|A7diP(!Sfoj!OAS$U3tw%RH5ISX_c;vhzV7!oo<#ZtDS0Gia*7_z zj^)eG0iwUBSw#nK6m(pb(m*xB z$kc09J29xO9T`xU&W6~ik`j5}481f=uA|rZlDEmo^;yLrDK z&*W%FZI?!qU*N5-E~l5SDdt)sc1VSeMNqrO9hTz)PR7?Sxyvs^nZNnC+kJ%0fomOS zTfcLcOw6^EMF?ZYENZeIt4pQHQ8SI#YH_2FZ<``Fgg=$pBzupj7U@Aa zy(wT^A_H||++g_)1JT{n?#ugV#0nPvQ7ZE7`bEcvSIoUvioc=v-^9niG1C8*?~YBv zSH0xI$!nsy>L6n*sVv$TLIyll5--~;9lWpk9?T~TgjBpr(UB6RWy8j{WtakoHE0+< zTG14lzhs|O8qz7vOFz_`e2j&NRqAJpH!Qb8cBIw8#&*pXP8VHzY*c%_w(6hmJ`9@7c)i#=0Cks4lS0P#|IBv3d(8B?YJVfhIGdn)R-bV!!tK^oyeYw4bEoW18y% z)%s(rojJv~8#9|(z-kSSyx4(bX1n#Pduh zY*<<5u3#HvPPAlm9p~p*$MMjq)2#V`!;R>0gl*}{kY))#p6t@J5H z&IWb5RN>ibq)AV>0K6@kMz{VR*{4_k<$hpc>oDf@+GYnD6`xn_-0r_(_KGu<(z2*` z4HC5V!Dlmhafh(i_PrMiCzuKhv6)W$SlP!`%wv|eE0`D}$FY0Q=`28zyE=*tj4wXD zeqKU=$7ROvt)OkhVGGc7bSSik)Bb$S5kCACmcGb66ou1|!Y{D78vkU=OoP2#a9y_O zxzr10X1Yy_BDV2?g0H-V&V|!E@%I>T54n|*>egdHO@^b+ykq5%s=(YYtTcS9OCCn? zI2oF0ixvv~FHQ4mBi5CjckDbZ(vAWmxb*4jjO`)@>MROAh1tQiRDGo5dpSNS1*1|q zAfy71{qK~B?0+r(?n>(~KqS;`{5_d_ApWqjlqkS!Y5@lIcV=iyGU;9zl|EP5O>2

            -K^|Ya zRQqzYM(Z}zVFWW{PwmiXm#@;@9hJHP+PS#RDVD>21FZp!(u{ob-Z?7An@=!IC5`I9~h7C2RnGxteP(|@e@0J^)}iLfNs_#+foHjbHl7C|!zxxGPdH}>TP4?>7_!v) zwfhP=iO0<9v3lR57!(fH;Sse(89;nJDF9Y_f=mWVQ*xYaqKeLcRdL)I$CV%>Q8!}G zzGH;A^!;3Sz2-eYmz*M!1^0gR<}=xMG(|Pc%3%iae!HuvDK%TGFX|omjz!epL-N8T zRa|NNeYoDCFe?c7SZwCIrykYBs?;-%qvQK26;T^w9*2E>`DLAFqKU!Qw zxJ(BOg>Q6f^H@<0SbvjWM2z!vWJ3$9plW^`k*`xb`oASASVQEzIP;`rX470X zg`~Mn9?kHHA@T?{X}G`~wdU{;3tU(n(^*wqiE+@mdRV3@laEJK7_$DlQ~s(`uk70Z zJE2Y06M_8ct%aYDi^DT7kF3fd%qx^@((v=<7!M}LwsAzH8Z2P`?~-cm6H$V@54&33G z>P$q_3DEr?_I51D%GWOPnyf!Nne0(1|78zYFmU!>(W8qx{GLIJp4QW36jj{ctFY12 z6HC{D0$O?dTaiu&T*rUgE$%2tl&5TeTB8A$=0A)Lz|C~v_aEITw~ElJvyV{Y3Ab%F z_U>8=S=c%cFkr5~db|I105fj>#@veNa>Bv(3mme%q@|xW#e3YH$lsVfvm1SSzHe5o z5k8zk*S(T*fTnNPip{9!Z7_NLBFV7t1-;6r6Q$ba?+9z3=vl}4MkSjWG+?~BYOKf9 z%uy)BYAPI>thngjig{$Rfewuh!Xk(m#}m7kTEb18FAQ~)_A8uURsK}jWyt``+?$8g z+iGEgBb;~GQnV%DCSYZzlq!2Y=5GV1{Tj4I7%VzGNh8wck5?7ZXCJd^jVU! z5Otk*`W0mR_#Hy=-27^2-Q4~0Pmwy$?#_T4D@6ew*pQqBdEEWpJthlUA%S;6DlLzD z%(C%piSjDi(f(LiE@EJ85EKq2KnIlL&D)ixUusWue%5-M*F=!Nk=;wurO8pEHpu1J z2GS=GL-*=aft2{$$`nwL;y4CIx)3O6jxojD^tQxv}5?72yiNTp+xi}LM<~VLzDa2>u zg?yzz!6IM(nw@26hdVuEX!>3u z7UtdUwy4)hM0Jy{A=ep;KC#84KUIOC(+cK`F39!808K@uxlyC41mH^OGiK$Vj;!~- z@JtYVC0rqUDIg%;rRL&F)AM#oEl@rtWo2-4>Qesh5Qo26i@1U+q&FOV@T97>F2}%igp%kBQaPeFH~t zYqIJxl&2BZC21a4Ua=vLmwC@8KHNB1R*o#AGaCB_tse_ir)IHimoeHPM)a~EIew-jJ|Ur89)2(H{c#nDgDWv-RYAMM$h3WGhtCFhNld)ctlNf@ z12!QQJF^$J-YK3}KVk;koi61XKgM(^3EGp&={h?^&k|wT7<@a6>W{2~b9hlFz1CWw zYG)9=_#PHX|56%lZR05D`IwC^vhrnBob{U*ej(1y^WXcbxk81b<7rNVgjv4v3tPD{ zf%)FqFjO1yT9t4@zi(^1!mBm4apTihe)trztpNb<+6SvmO;3U-TN(7;K|Aw z77Y{Fbyj?>KxUG}SX)e<#smbT^R{>Vd#LtA4JH^uUuQkCkFl zNQzel*ZeWoR~JpG*^E7zQDOiuLbojZ#FJz>H&wRzh_ZCq+Z{T z^?DKOk1I>1G8iuT+ysWrF9&=7_15{aX(YYJy*0M#nqWdrR1NDkMojXAxM3MW!wdva zi>R!Q)P<3Vv{;_`+Nnh6bn#!Rvln)Me562=|eW=SdRb*FVO~ zqrUi3F%c1uh67>s^(f?rx71m+W_}86hGy4%*-4+OH9u8rB1kBmkP125aA5cC!5*H; zf)sxtsmaCYg%sJAg)%Boao$UoWg3$RLOCs>(Xq2Z7F(+^RiZ+8;r`Qf7VjE0-rSwE zmSGOQ6YxigFd=Z93{36<9vu5bQ-1(4cJxDYIvlCS3mkkaDeXH9 ztL|6rpG6hO(>572s`FE(3N)H@qo~!9I%SvDi%%y3UJRj!Rwxvm^=K5RH;hhUXNXXg zy&zvGq+olmny(4dCwB}lMoVOLeMBeXn!WgCcgCaqb%EE$@QeIkTL&YzbwmGqO`*JZOzlMjtcfyQj&Mm zVPvzp*^DWsi~F0V0w@~s^20KE%5#fK=*`QJERoe^C4LMZ*{YRLS`7w|s* zfr8;qhzi1ocUV|icp4R2bG*KWm2e-xoZlLrWt{bmCm(LeFn-yUY|wC|O#cynS;LEc z`Rw6`gT3c*5_f;5usP{9OG&?J7j)G30uRqO!dqSlO(t0#r}DRBYs}7gmu(JXawv|> z{NyagOFppw@ipb84D0ux{JHu*>_!ov)hK3NvcFV|wC656C1{9nQeJ4>ZhHD-E6L;( zdk7pVRg32eD6G-C@SS-`(vDg|DdaMLG9T`9DC4DPyPbmc9S9(IOdBESe&19V;>bKk zirL$3^o|nAp>+Jh$?^HP8e#wI9?A|s05ORlR|99oRBz+OAFd7dI-mP>s*)sUb~~e} z05GG@n25nBC+pblt|U#FEv)fa*s;`YB}a*_JgI9Sl@3|&=kQPZdwmpn0Os=oUp z3ag(H%y{+vgZ8QN@YF~krr5e&us+xrW)?DK^yCGm1=7lUyJj_r)6@P)=PA_&T3o1X z31rUh=q>b?IDRkXwi9aA^KQAh`;2Wno$>(D5hWe{or z``n1J{S7Gl4}(s@9O<8;T4NF>U?AUsv+LfZ@W^VorP4Nh(p`BGW9 z1(_@Tk!n#NcCKIX*_SZqY3XSMMQ=&V__pC?oRT1xw4zfS+uCj8~xHb}uZQ=v9X~dVu-k zL*GPT6hOVc{&>g$)`|}kWFo2&XPF;X;Jz$TK~lz;hDL4QN&lNeSlPz|D9WI2-GtGZ zkTWrB)##_wXoA08{xFNu45ear(%_idT=Alb=8{g+T)54z-teX+h2+S8^9rlC0{gK@gHoT z1zaC`eYS056rl3IDN%NLWRwSKh&+Xivj`HoZ*9H=!^Ni^j|?0(tq%uD89q{BLagVm zLasC{2dA?P_58PLLbVo0`qTV{WV(UeqRl$*GHA%1zaJKQG!AcE&L|I>ns}rIt9!8( z2USx?@{uf354Ck3J{j72VOn(eQ(RmxS9$c%3{yP3-&Z-$pu_)$XBiVOaMfEV=Tqg)rlWcM%X!^{}@YqsV-ue^&UK5&JIwI0oVNKoqYleqT!m_|66R-OeO=dhGRDA^a(=YvtFya_?>VVd!CnkG z^<4Xz03GtxD8rx!ZR3cHntATV5X|F=V+kZzK3d~fegN}y>QsQYi>(jy69 zUwBLsfr-^|FDU3(va|hziKE3Ps2k^x{E;hxyit`2GD^H>BxHc$GpC|qW2Ds9WPo81 zf`u*KB>MVqzSKo#N3C2S7f%i)vh1%V)2`eN*Nx&R+1?ZF0j|)ybD4|4mb6M^d}su+ z*S{^zO9EW3&rQeLB7}drrOqr*iTT#xZ#A(D3e?`e8h*}IF@Jg3nN*VI)pnHi2sHoq z9rC84m zb{h?o2W8^xlU8jjd*175BXED}QV(jgj$F8KU!Rt1rc6J-zA#6?JEVNL`=x~H$eGj$ zlC7*=!v??|17|M8N|*@ z&M!MRh}yUi$Y=FsEc1bLios!e4bmaffy4MN$aRINb*eiWkl9MFj_L~7?` z^B~vJt8Cb!|7Ekut$D!dhpv(Gkm9fhZzkla3oz%y^hEG9ou_Cwc&G|{1p9hBiVzq8 z8{mH2^FG(1KqDG8Mv1gFc*;PRRoDLED?s;4Wsr6v|F&(H&zBHAB00E8?5#at`h<6h z&@`__Z#$%VRsZ%>GhQ^#F||@3L8#v2FfXXX51VUDegqvQKpwy`5)Rlx-GFHm8iz1V z9=Ay6Sv{|vkR-lTLc6p6kXmS&d4O7f%2S<4nI6z~6aBa8c;VAbs79umcV>#@TPDhVam^6;&`D>JRbcoo59M!B1w zN+5SSD1me>R%v4*))6kj==|nhs|I>lfQ>KN4P)m(KHt8X2sKu}2y21bpuj-7g@6Kd zKhNKrO*ddh1o}++XNmqdR@wi>zS-|ci~r;8?f>nrTz|S%+e0Q^j2!J!@sWBh3{WT9 zpZ8&(kwi$qb&)<~u%v(>C>%D98a=f&b#@(~Z@zpe@pA(74{u@5MdlEj88csl@D#jd zT%EP;ey0&oKH83Xs`9k`?2zt6eYH?l>ZQdO5$uO*Sk(j!HA5J$hGyGq8skP|<|F z56~Uewx;6F&r}D>)z@28_nS-)uoshV7lsH(pJC9H9G|BmXiWE6_>weh^q5y8J=#G} z&Hunsu7(s}#fx)35tyxCd`bNxADv5p?05j-8QVuu`_O=xj$MA(u$&&ap5cId@ zKa@@P!YFkD5l=+>!m4Ix4buknx8={`-l+};(LemXEB%*i{;#-~{~_e&cc9NroXS6& zf9Gp-NYMF~29Y#&Lf9P%hS>ZtV&3FXP>C%f>Hn?=tJL{Tp&RnN?Se{@>eCe9i*HO1gED^Yjj^9_shDOT|M`4;NKhHh zH>K{l$vc=08I=`x%^kO$r=QOnm614e=$%63`E*i0A}IE_!(DIMJeNw?LotgU=&TAo z#Z6NwY}lJ_zxUMR51|D3}z-6~U38>ooi zT(+OB?DRKz$v$pKRajm6Iz2g&_?`j=aVei;etg-q$5a+1H!Rz0u|8RAT2rGBNKk9J z%8No z)J^uAw-4`hLGXe*Wz0kGiVpmirT-Ic{0F4uZiE6F295|~Mpd->^YW4>7@()z5)u;7 z&$++(QBB2U@Fv9zNumLOaJ0~E5D<=Ttq916zgnxp*l(O)lbrjFz-cc)==WYU^8`lWm}d+@&A?K>61tSBD^1CyY?T+U{#Lbp~+I1@CQ<3HifB z;YCe%i!q~Hs$`<@PJ95(O$OWBLKVavRi5s(H?wlc!gaNaD2u;V9HW}_X>faV|ENQN z;vI1M(-2N3*6%d|(^#=bi$(q(Rhv4?-ZtIjkKOVUxrp@ZSJpvkPtGq*feIsRKrmhi zpj%d&FJ+l_K=(cl*wmY*PwfeD6b=m0wJ1ryLx|8UCP}~t)-n8ySxxU~GBAOAS&9gO zzNSjh@5JFlhqYNdEpG$G2!9VU40TkZ0!07%PuHEdH?nj<_`H9n2lN&Q@Bh~;{Ri_o zMdJ?w0k#4#(m$bj{|Nj0cQp79R{Wpf@qgaDkWPKOZOw@h%mHBl;bH$KPoaupsrB;1 zOEAi*XHZy=@8`Fy?yojXIL@a}?$D~_UF^=_S!{x9f_Ht^(hY*H#qZULO8pdQ&xi9+ zRxjKRB{8b_=GzkBv)8+aov*x_w{3MgaSSfR0;$&jruB_rEhV(B)^T^sD=&Q=2{~K> z+)B>NioMDq#q33JN%!k{;p_2ovg{S1>(fX}WqwX(_9Y%LeNH?EQw9eYCy7P=0jVzh z{@a+p3A@xv-W0{Rr{apUoK4%|o67k1GUYHyNEJ{2{q_i$$kdbR!(L>)xAodv-ILS7 z-C)erOqG;4?i$!TsD5g%!qAK!d}pK+y$mA5Fz!DE%FO+37Q7LBG+%T3*~#y*{|9_p zNS77#1g|$XE%IHvypaaIX*4zucW|_Ub2=f_t@zpM;O*3&yv=u$HqQco_qriRUu_vp zBh*`MQ}~<;2!s0KlXE6t@;;vFXu7+FMWZu)KxdsjTCfaa^+ic3W2n(Py4YT|rZFs; z;-?Aox3RGX=A-+QX#yn*T4CfKmNflE{qtji$vizFHb{YQPd3ln?0PcK2Zbr~E-NN# zlG;Pf~Y4HVlh6L7>Ejsd6RZ84%4r`K-%EeCyzC0=+uCBAx7wv>2HOHO>oq=rh5%+>ZQdQFASX*Ci# zA?M5=f7=ZLQ{Z=6}VJqMXQRnZ~D6GA2I#yiZ)yOW3lPP;U_CY7!kX;66WJwH}?JHarx2^>xWq8Cj{& zfVB z<2x@m(HfGa<3d-f2~a(ZgPetHO0~80Yx$0n@*ow15rUN)3>#%lW25&miR^Hsx*BCf zaenW8uakdXHLWRcIkM3gmU)4@6uBzpY+)(p$4L0$>u&=857_4aXV^&eU=Y}`x0K?- z79wRmYA3z>dE##a)@-pN{;%xRMm12F&>yXgazkA<6SAQEcYvm(-UDDS|JP3WuVC+u z;KES4!WNr!5c_@N49DUCSeCP7k^{eRlF!RIW)oAO_0k zb}|MQ4X?%(x%Z`S{f(f&3@A_l8-LIY*BnvpH^6~j^aDl3^wDYxzeDJSaGV&ZRbiBL zVr;(>YdK6tWBvvOwM20gBqJ2}DBG1bI)qX}n&pqxbZd|L|KS#Vkjnqq*i!|JeaTKi z*99CT>+{ChIV3*7GTA8azjfM3C(w!q-71oe>y=2)gyi`GqCA~?U23Yx=W=jz9jIMB z2xR7Nc@{v`nl+XS&HSQ)jNWJ(Ww-k5=zyH}oM~2fk&Ki;u<^|ZIa1eET@Vj@k~E5C z;WoZG!67=!uP>0F(vqBUi@I?OpiP%2(_UU)HX>I)mTLvo$Z^>iO;a){8%9ZqYp8## zcy~X?-f5z5kJBnNy-EL_Xyr2NE~NR5Ie!iBCIMM0FiaQsH-(}s$oc8x4^peEnf!m( zIQFWp#{3#6xV^h4Hy@88n$C{~0)cc?+us!`C_!WHJT32bxCi|5bfc1vUk)V-yux=I z`1;UkGB%a^RyPwg^%n5eGKbY$RBDx)SzjFZIrb45StF1>Tw^^R7#R3^uJO!Cu+DD2 z+57Sw?zqOP-^d3jyuF}T6kWu?y-{+bNUH`~JgB^NOsokmKJ=Z6PsPc$;~aMAo=Nn5}{#m{rN1^z!S)Id52Ckm?1JhKhGALmvd8jIy|?^Bqop~3vNR2Xy;i! zO&YfAo%>Jv=YTWftG5LU2>GfW<~Xc$<5a}le zSG_>`sZoccC{-|X&$=#HT)EgpT&*>(wz|RYJuMHeyybzupdpa*YbmZgC8r!Cr#f1* z*`AltGIZI?dv!kfxn{afCR?JyH;c)?4czkR(N2q?>wf4L^huOO2=l zb%iTt51m_lD3JOAc3Cf$^+Bj3y#>LGvJR(5j!&jFFD~b=n{-G*>NwEg_xT4nXj|0A z>za>QD%3>@oOfmzfc2qA5fo>N%tmpjlg1U8%NG8D1%Izt?nHA(2qw4txtldFYQ2I8 zC~O7Y+Utgwk~^u0GhRx-XKg%sxL{H2X^18jo3c0$tK>B7`gUe?(HXGCGmYWq}Xs=-%pFrOy1ZDD33=uM+MP~c8RuGj5CAx<8aBUn! zD}LBgf36Fi(zKF@CQOX!4;)eEvB;L@tCpu<+KaF?_dd9JBO@@(=I27|bwi!;} zV}r|$l9!3B*q1ejBM}h;j%x$Q=`HqIyGv*2L_b>|tzT2RpKKYJR^aD`fN&4Cb2;a+ z*iy5?td%Ga2`BPJ5rKz#S;;d``{DUjbSIT26JvZ`1mnX2%{VrkCzQ2f@!JBaa&o&Y zF_3T*)3@YyG?3GSUvD$R8|J+A&J{>6?u&{EjSrAfTl`pV=deWs_wJ$JkiW03P9tPQ zlDwts6X|0sQhI;mZi`Q*Yw2wh*OYP|+~@I(*pyliH0 z{pxgWEe9Ynm^VM!PpHL@-Y;1tYRUJ?y@$P&2^BE61;vB#82K{!O=G?!;iEz0;&o!5IYOkDV~`;>|uEbnb+5bvV4jQ`7}Do>u1~gLh>F_g&6u2zjBP@ z{o+))d7J4u`qlx>-rTutn~G%?I^s@!XsW4V*6yZwBT$?hDqGzl-q94sq~24J?hXwQ z=) zW$$bl?Pg7v3%-iZZju@GsWQ!U;bxl4+~h|?33_}=iAoSC^VLn-x6zp?BpU`4KTs)k z@Dq4S2VdgrSL5yUQiM{B7h2osSEurOoNQ$|!U1q;pdyC(zeX&fgRI|Ff!!FM+PqDh@@vbYU784B5c|Wq8_TH zt_}8kKdS41s@aYMg7ym_(&mbwv}A-8k?NC^omnO{bn|(^k6=j_J|el-&+sZYYDFvv zPE^-~SEcTwcRZ5OBeSbW>lKrneb_{b$2Vs*&C?0eCCaG!F~e>~K@|OwQa)eLiPkA3 zWGkE1L&YSNIRktBD3#!Rvs4f`*x`OmcNhx%E_aGt?ru)oWb4xUm*=~U5)N9l-6;H` z1+0E5)v0YfgWHP2m(NQkzrM%0IheBlds~I=bX{One_&Odh;-~1Mioc-Df9yf8~(WP z+9&O**wM<7RrSt+0yijDKYy&v2DUlwjBOy(GcJ6xWa=*IxHp}*Ac$kj0ehT9GW!9C z1OZMrsTmI9J8T`ZA4v-oVVQ&@f#l-fp^29kba)48g*40K-AOY{ft+xx{vwk8?W_fX zIEg4j^GY#lFzpsKo0Q}8E?D2*{f|ob7HvMRyvm|~GaA1I1f(y1?y{u4S+57T0g70D z;N-7DY)lNr8E}fWHJFkA6qL1Kl0~&}*_35S4mnIMV%Bzz_A6ZQ?2R)2$$L1-3218HS8pSL zgLsXRo| z2SQz6ZmBt$C9pE%8#|VTis()R#o!_6sH53OF^3w&#dVdu6r!vJmUG3eRg3iXMez;MnW6q4}{TfVNGEJ$!Yn6WGxU8%J&<(;Xk(&Ib54+7XvovOs3EU zvJ}U;1(-B6oXMZh59Fq<^wXuXM5WE3ELQ6+J{T~w9cF!5{Sn|>-msPF9vMs-V%a>Ufp=;=9Mu=Z=bEdmXc|fJi%=JTV&kI8 zP6S{XCUJUq?CoTuHsZW+_B>LIaAIH*37w*khGv@Ar5p#c_5J(PqO8NR?neT_xq(rTC=zhiC--AUBqwZ0tJu>n z)i5De^UN~q_4_#jTx}ciVPjcwuH`Arf$HcPL5gs*KxPfA6^ad%w@(4!0*;=*FZ_%k z63&KIgR9p2ShUT4k$mvxF?9qdB$^~sQgrn0!R_zS^mrhUqGTuS1_~bO4ZH&o4pOvv z=;S*icGDo66*#Ei9xy_3Nxfe}!T1*N6Y%%80t5g(@b_8gsTy!5tg+Cn*Xis*75L_- za0EiW;sN%zyPcq4w}s$Kio^X2OA19twd4cDDJnpq1uRgsDj+Zz86P^uJ714*f$k zBp`--WHFH9+eG6ntEg+y_Wvd%pcg&u60I1=Jh!4ek5dWD>UOWP?E6pFDolNl87_*WC|bki3;X&N}`vm;A&S zJIG?(S!YD<-C0^6weesI-S68(gv#LHhO1Mexy#gV6GwZzP86IYT;-v1Gsn4>>3AN) zdgFHb*Uu{)m&Qg4t|ME9zRh10l;pcD1%J{WoabTl+C!NhYnki2C#FZx%f>IMH=k$7 z-hWFjFMp6L1E15l`D~^C3#ZX-kmyx6kI}@8att#@nyW69lPc8d@>4L_!OJxYld>dM zfoIw&vGi#=UD}$E%0nm9&^t=6b)uCi)l(&*3&?9-aD>K*+IXa8+YavYh}|6lbA1uU zU^#rVG~Cz^XMvNaffMhR3i93b6$if}a_A*IW%TgvFI|UowPeZ-MC#=$)feah3VGWa zrPaQ76trlM<;`+SD#AveEDS|1Z{A{Xl9;OLrrnq_ z^a^|wX|3lmsPThK16S^=dl^T0VQ6u%6PRGK=Lvzb9`C$8*)y`z+!ed4NWEQeZ;$oz zm{hJJqg}TR6Qb~u{t|z%UGdNdbMp8N%9;KzVrQ?8hE{jwoOynP*6Ux53f65l*kFIi zH)S+y9x^{6j|-@`a0)p$^I)C4%_0)t&YPhP?uAVmmk4{mppr6X4H3nhY4)0a+-eu| zVD5Dypfj1sY2)1XvQRYQ(vef3-8?@gEr8EX)1_yw@bZ>CT^LD>FBZ;P&cPVGxT4Go zN*VYbj|Zkj>FlGXwR9wA;FIeKo9p z-wH(3sG%pdlfv$=O!1x4>TP-8kPi1&2Rt3Zqm=x1e;1)7d&{5*ym6g<;E?FYVkV50 zk@Z&*Jp7ABr+ORiac?-_anKvU2noQT3M7z`wp){5-H0YoAB@EqKmKm(xHsZ5=0YMT z8;ETz|e%Ht#1lLAIXMICe2l0D&d`ngdeTI0scCg)7H zfs5m{6jhFHhuwk7IzNi8Pu{G2Ez@F6l|f;FlV&Ge#^!6LP^(7d#RWxYrQ^m7>y%C$ zy;owJ_4@J{$q3m*0pVj$%3!!KywjQ)&^D=hNn~B`715IH$#KvsLp?e`>OAY<*BgfR z&?%gK{zoS-wb8JRAiMxh1K-Rke0=REKEyzlvZ-sjKRd-mRIt*gK5TG#b@WOA~r-7?Fs{WkE<|MGwG@0M@p zvU56w`dkN|BM9Y&1JW`|MkB+VIQXfyXf-8 zxS{ReFZsqP{l`n^uGX!FuFd0O4~~8YPEQ`-zpMkswDf*wT=A1Gc;&9@ zVZh;=ZTQOro&x+TJO%R`Y`Qb!%y*5~nzWT@#49zz>%dqT7>c-m&k2}(e|n1A>fv5u zoV-+r;B`!l!DtU9ea)*5)eIHbiz4Cj)cvq;o8C;jD{Hbvc5)=%>PL^GvAT4F>0{p+ zJ@d@1*mmBINr2MU-`;wKe0bbMAzLRGehX>GFThQryRl%vANtgFD zwOY5ZnneYWCh^Rg*Pb(LwY>j^Y%HW_p~yI^X*;THAJm-52A6cxqVH5L`I zFR}zgJ@H~$(s)Glv+Dw1nNOI0ls#Z)v_6^`)YB2FccoPAGU_4Yor^W4tKTi=)N&3+ zA%)!E;S>Mt&En!+r4n3KyYO*V%f33c?DC_lATVCp-{Za4qJL15byK+yrj+8aCPf6c zZpp2Rb@}k|^F5-*)*wl}Y#-)sX6`^(w_apUaxj#=v5ft@PRz>?$#eIeFIOxEFy1B3FO$ZtXaXM>xbG&-U;x`mwa>FBis^ZWSZkdmkN6bR6A8IR&&?i zdQt&XGH!D54IvjryjAyuDrLXt$;j6j| zqfq}InW5p!Vcx`H#=4KHK^Eo$W(EA@y6Pk4)~>U_;X1p8hP0;ri;P6?dn~p|PkaMY zn9(#zz3Ln9n?qj>_qRwD`|P)RbygUxiI=cT-s%{ z(9*J1S&(uJIcsOwA?(oi1^G^Z90TM1&EKL&BLzekf_I&P%NW0|{;7?AF2PTbTKVyB zS^^;S>$~rsy>I}W^2Oj<2H-a5o0vP@*v~*F)Bmn@{!J6Qgd(?%%~A`-G0da?c*?~RBcp+F{Et2b)Q@bEx~|w_NiQm4V2;%bhc6?F!e_`#Wo{c?FBNXIE%<~i8}-Mx zVx3X>izWBh9dSA}jO^U8tK;tS9@RJ!Ptll1Rfeae`ukqfpZ-I4e%;m|^MT0zY=ISK zIAJ$iiz=8n|&nwdOjM_G;3>gtoQ@Ei>a zvl1>jq(H|j9yAtjw9{kaJBFNcQ1-JkrSi7xW}$y9jkr2V{Md%kA_h%~v)pgx9SopD zC`lCW_8$|fb%nBX0vA@4t6t)<8rSUmb@nF9v$5&1h3y6-X>`^HVD1tnbU=g?CHKpE zaa*qCQQ>hD+fJF1CYna`6ZUKKS1ZzRpUZ#<`Crvh0+bEM26!>Z!*z_S%=n?X8)uzodY8o-S!U$=@a#qb$AIZ%J5uv zn>=58f~oF6o0rwV8ET83xi8g`U4~>jKw_MBRS0`Sxk#;Vbomc$Nn1BF?2+~lk#e2c z)Lfg?ToE%m*biN|i4t}BAB}lc#$H*f?)&eGY;5`k{ZYIO^$hIWX+ileK5K@Cl)HH9GSA{bXFM0Z< ztLm!Zx`VHq%+p-or)WIzgzmLPA?N}#MOoEOHj(|D2Q163 zKExevQo`s@uxWEw9l}TGUdpMRG93 zC^`Ik{R_9U$!9=-{W>h-w~}Dw!!HHv(HU;+g<;vZ-2`ri{&{nc0(_7qSn1T~hE?5F zpuO$etoakoeM|F;TK^xl&`AN`I)e+Zh2#YtrbpM?;Wn3+i>AHZ*Jl%xFSbq}d}xRf zaTApE1N%iJbKvl?EBSM6Wk?^8UVi5;>31w)np$;!<~4u>d(ViK&A`$qSvw2g=S{Jz zSVqdpa6xoXD(+W! z;Hm=h)zAa^kHQIBKtxntDV-i${LF?zEsxwbizAaHr-0@NS1>30U|P7h%LOXKKwexT zN(%2C?67Bm%b)w=_jYg_OArIfvi)WRa#BT;^*Ny8Rs!F_l$ymt@}BgR*1miy)X=n7 zgGo_t`Pm!UG~~pRr{N{{+%q4q085U4&(?`hj$a2Mu8d8dLy=I#S5#azzIBI;0-3It zI~6T!(=xB`XJk8w+aYe#XeB>VV+4W9s~evJ#^^ojVG&2``~gtlY!a;^;HN=hl;3D) zKVW646ffdN91__z_a06fiQL@JCo-krePzFtZZ)jmS3YNmDx=Mty^or-I^fh{5-o$W zqxVhi=}hE6cr7oou@9nX&)#B8p+e~E!A3g{Pz|Gu1Si=!0VP$JiXTNx*5VuxJKlFu z@mco?v8UhK3$;8!Wcegvp48Ra6|)P_s0xw{>Fkrk+@glZ@H;xbOw_p8LhkA?#6uBF zFUDqP8ag9}by{UWVPeMQv6sO=Gzb~#1mdu_?v$CbZAuACeNM8njhT~>3Cupr_@Q`v zLT+^B+2%~g&bzgl3g0^3*277HShna%%3SNJ5YW8KdG%zU9j1i)kvqpA?YD7_y%(!Z z1Ru6?FZb19BAnZI6fegg3wElL*oW{f@aK6%HwL1+2~H(2Z#`8L4}HOAEEsSp4UU`| z69pO(YD{sm91XtGFRx$T*UK=i6%X}dk$_`a`8iVMh$<~X(zoT zONeT&DxNAO^5(-L>2{c3aKUke0aPg6Y)5#q^4;ttV!_bS6jkL|HPdLG zH8$AE7zJZ-D8;)=DFcHQ3*#>dOubi4Uc?>|k!M$jXh*tER`;yx#^T#{FXkfD`yJt9 zO5oOJq1?7h(rhO|e|XcQJ+}|L59p#^FUGvg?I7R0D0X@VO3&e=zPv-DTQg^`_@VL< z2N*@vOidxY+0P8mX4K;!cu5sV$lLC>OJ=_i9hyDxQwD2gLAzh?`k&;)D($Rey*Xl! ze59{>CA|_E&)kS^y!4NUVhnE%UIjsrvXjOztqf;fQQ zLMi-WgI-6&kFBJ^f&5MZ&F~t50e|VyJ*R#8?HB!_CsOqM1qvkKWq~h1lo-J_SWtBs zMDX0@c|_XxvfHmsr2#kMJ>W)NUUMZ{Wu&Y1+FOd$?YjPGbimj3EEF2`C8{!%vYKj^ z%Ez%Xsp7h;^zw6w8x>k^JjV zq6~}#Y+anBcJnTG?o>BG5lkG(Sq-^tG6BB*aJ`3EX-pjH7p<{;z2rPK?HVsR98$OJ zUQF@QQ@f~;-VE|UCGOt|_qopLUP&fP){IS%K)40C+V@+MjVctIb(@vqM{_u<5-Yp<#LT}}h zSH7_`P_A<`TNGqN9~8<4kI5eh$Sf) zud>sIElMRxvUb`vVi?p?BkOR#+5d3($2OZ?O3_Qm$>eBR;Kt~mLUGONhkSKf6mZ;BtD ziN4s#M6$UAI;fJiv!Z*3yq0D4A{B-GS9Bi!s8%i>t|3`XJKd|D^9RsYf?pv+zb_}t z$w|td^oG$HiSo|76y0M?O{lnCrN5!9;D#mHd0^=zmYMb<0$XWS=S6dV`TSh_jvi%Y zz*)7Kv&>0@_Wbul3j+gdHq`Z!;J&VNO^#H9=BBtpW}ZG=cEg&+vhAF2=e5Ryk(UpZ zhB@WL)xW$4Hz3Dm%tpf z%afNy_1#;>E>$Qr@3Y z(c~7~a5rzxZGOYb1oirOq1?%cQUW-(Lwt4tB+z<;-(g1fqhXERGvtW>V%Dho(Go}YQujOM#=Cni`))AD*rF^fVX(Hh+$qpXE=*>Y^|I@6JI8PQo{M9^ zFD#?BhX;n~skoU!&9;lmxv^gqg>v3O_!!k%9IMymz@U_vmL{X)LPWg|BE3|+v`5JLA<=c6}%4z>1tSzx4$v3#L~#25I^YkIfVJu~x_il0|Awquoe9XM-aL-uoa&4(i%L z^FU=%`b=y4`;-0L_s|{j?Sl@aMDtr{Yh?qQu48=?>`<)R6l=NphgIy8!lPB}O>vMK zSh0im0}k(NKwjmq5RV{&ilv)C`T?L31b;izDdY@nblAYP2$tW`MjiFf%|_s2+nZmm zxut`APtac|sq-J02syqhu%!o}vyc8@#NbxLzX4Rt|M#yXNC0Zs?K*N^&+nSGtX3=X z-j>@4Xm-2UiM)j!UsU7E^;pK_?cX@*U*HTdkYx_^&`ym)_FFX{podh#w~k0Tpkxh> zs&2n1gBIJW*~a27y9E;0L2D#V-qYH|hDK|`Tf#e2!4o%b20APp&?gA&EqkNx)xTFi zEGYoni%iZ1TsF9RMDx#76TFi5&}@9j%kX)^kPxoTR878$*~wl!@kK#9W-_EfDJ4ry z7yF3`)f2P+WFa-1>JhP{kp5QH$1kex=8U!eG>|S~$b$4H-)_1|ex=(O6OXr3eh!%p zZKF=p$hAEae#(<;l=HQ4KG1iR%ceF#olFRURmwV+FBLAP&8!636a4h1Au{A`D$uVA z8ZxF-oo)0?TISq{%+LRkjHsqqkEOQ2-HXGu<*qmn!lKK>vG~|r z?vgmuw@PjWZ~27<4A_)d4QiwKqPPV+I&Fv&qRRD~u{yw!B1O=IXm+y69HVEQ%SGxn zP0pBvk|U`b-r7AcN@jT{vN2=lx)wDmv>WGA;r5TJN{&uB+5Of=$|f0!n7=;YFN2eU zjQzqLm~6SC8ih~{A%fWG<#j&qUNnWublGC${z&uH2E?!n_Gn8Qd-v>}@vD4RQ0hmE zN~o6e4rTdQHb|>*kvCNxvxZ!ZZN<6j(de4~cOjx-oX7T;r-y$rZwELiEun`>Ywc%?D2VfrTQEx^c2 z-X+C#a~>$(AgO8=Kaiz2yCy*#e^P?|!!Qa0@(9d@On~uqXLAvLiejQrcIexMWEj^Y zT|X_U4sD^SHyP`pNYr)JG}S=YHFId6&<5@XSL0Wk109J2d*5GrG5ha{ zpWW5JI;gnIav`nv#w58HYnr+4^wpgX7Z+y_)qrUaz>>^?UA71jJftEeV zrO^IfNt-YltIxQ!MLzW-_>RJqy6A0|1S7G9a z6ZZVB5_8r`GLKH>RpEB0N`{7~4dYe?Y5h*(8EfyQR_b|6>X8Ez8Ye~jinE;!no>03e#yGH#yro{Gl$$7pc+rizvV5* zxE3uMvpC4~k*<`9*JDShF@O}9jrsAQG_BVlmi!7_yjP4OkXT2uB zG=%ARX@dKX@&a7F@!Bb;anwgA|Mhi|-Eqq&QUTY56&oqC#;ktL&Wft;f61*}B`R;)+uIo~(`uGYPoDSoRf^*sXa$eO=3PWT~SEK#X_9cMLqaN(AI>mDbZyei) zM;?lkxvtIc&5}0z4v0nutv1i^5;^rudTNzRggxlvntdpzg`vw=W2^y1t%sKiAy^() zz8_T5lWic|L`Ki3UqL4tLs(Rl|CIwIYN!LyBU2r~AVu4_8 z$)`PO>E7Nf9)p+aE~ta0PFu*VL5rUAIj5b`hUtFLp)Es}mWn3I0;HPe(vl#*y@b85 zU_Y)7spwUrUBRu2eFVPHUEjtP%)3!X`5qPN2{w!WC?mvh>iB8m>SRG)uTFBv3%Rf+xg-Nx?z|^)?w^iHwtf3o z&WIu<;Pf(XqSWiU= z-W5XFx)11YAS(HmHmsPjkhttVLfbMhF|yX{81 z_*A+kj1)7b%*=e0i->}dDEl=i;FsaptX2iR@dO^HJD#pth;DbpnFnl+eHi&`C zW9L&|?;B*#4t8i;l1RU2^)5;L5Y$X0G+$zzS!#Ljft1A z?$&3adE;nZfOW#Fa;}RZzK*a=&z4?%C@EX)lhu`=6lR!Pc96c45lLbWE$Rsijap*II0* zQXGsw_6PXsR+v9kv6EZkOen@LLfP517n*3kTxofK!W(_Dr}BIyjAXT4PSy8NA5Raj zQZ*f2B=N-q?Dj=JATO+MKCb$skLhr6-@MzbkfMysp%%kkuzQZ|lH%j15 zw}l8?*N&{gfzMJqx@9FV@j4!V{dU@Q4V5%0bHf~lFM3l*PEvSHet6NHl)=goHRk!G zqW`%@zys2tFBxZ}@tX8T_4$4sM8?JSE#!lku` zGm z{?g^~_fNTl#bO?mmmv;cBxpav=CkR_=ShGna8xho?#AG9=6xdn_vhUZK$;3h@;D%f z!E>;UsjFeP2mYS#mu|#7{mV}O5j!lc>XY0uGPSrLV$0V{-P!-XcWdR<(|f8D1;b@# zYKqsFZv3TE@BK{Gd%f^8SlN33t}^B>^{Z6C*Bf$3ZTiCY@;(rp-f6pjB0J3uFjki_ z>R=4$dbc@Iu_^(Nm81HO4HSxIy1jah;4U!EuheK{0JaQW2cMSW5J?}5W!miWx$=9k zZ0k_Z{iDi_@66PiN>RaXKP0j{?Pc6tC#$=8U2Z&6sCjEca83+kr7(ZkQd^I zWu);tUJ5fxHeH_DzV|eji^5zI;dhvhnSC8+I-P;3%nA5XEtaSeUel%ybp;0jDB{Qz zDv4_*CsI5cuBWbR$hg=r+Lj1^r7OjvQ@LdBdiFJE*;Et7n@503;nfiVf99!6T!PuQ z_6@3&@SCNgbuWNr?Hf_iJD|K39EY*{(;P+B62|pm+gO^vJLF_k=*tr45OxuHy`R9- z*cipoay^C|;IG)0D#Tq(8Ib9lr;@k;e9$2t78i zH!SzpM#dOpD6*XtpxFQ(L~5u`a?3Maptz{0b%>7cb8UQ~EokP_l*4hgGYDu*t~

            VK8Kb) zD9<%;vXc)jw2y}F`|pLTq-EyjiK)*NA&R^!{fE(Q`zs~hkwb1>zQ^1C@v`l@K#1q3qEAYs|h?;#-K!S_I`eZnzU**c6w|>Lvm_e~ErJv2gLQzqO_DDCH z@EBE~!aJf(j%%nRNRSbTi3?PGOJAfbhS`Gh`G?CR8;1n@UHEWBG!K{syGppVwfFh# zCo4UTMxdok9fIF`q_y{n9VfMnwY5u*9OOoFLr5<7;Buq??yYDQS_!XR>_liP_ zi#s8~B`{k-K_gzT$tOjhM)G?L{S{&#($gmieeWUY7oin9{7S5?R;R=3QE<8|9x<8+ zvpp%^aqwNsvBZHT5P@U+H-Iity#CqK)kQYy+Tcj{O&g$`Ee;jjA|YfLnLyrekk8#7 zYL|ieU#+JA8Y#m-deOXt_dYPxD}3EtVO5I3Z4avXB&#B{RkPIkvQ*C2tqm<_Q>4Wv zR0i}E?n33MwttrKxb9p2L(GEf1X;?WVNmAT;jCb;EVK%wkCu*#f2rRaiC+?6&U2Sg zN39Wkcn1roR;!q{;XyA{F3T{#ihC4E0iM8N%Bb_z07=o3Ty}EQW&x=u7gYYbZT32- z1HJC6p^;)ruOE2sy5-tcgSXnYtowLVmP#0TQiO4TvEN^*Hm=fghFA)#x2qPN7aG7T zxNa*jy;`droQgge?#ZhT+vp;-lQh0TFD2tQ4-2@OMztHAphe&C!0`AKq;C~KHd@?` zbd);83lYXL+@;&-E(>`r;1Z4e(zL+VKIKI@2JzJq*Vu1e>~`Cf%+b)kC{SrW?i6W? zL;WZPKo<9sX(+o(MM#k?}QY67|kuXVL(2$3*@FWB#Q=D541%7+v;&q#!E# zMG?$QvNK!Nw*P7wfV^clAbZUB=aCk?KQ#3}BKoaW4+$h_H2ut%{<+mEk0QEm(t`*1 z^%TxbbQ#=qO%xOqBoYde^{mli-^c~jm^A46Zal&NkK*_<+rwGr7oPM}7fYdT0Y_v6 zey4o=j1_(+F=8;{{NDIJ^h? zcK#h&v{8V;RKC0G-;L?iF^tZa%bV|qX7H9^pLh%Z%sc$)c>#7aNUAwMnHDl&>dE7- zKn5=HJu-FV#suXIl!||YZM>(z*Bf}t%r!KAZP;qbd~jp)yQ_VT*o5>I6S|xmPSJ$V zkNiLcR<~;>Yn>8Z!EDwEwmw|DpV&4M+9p2dyJfq-U-Q8IU(pnRwdFpbqj~jV{xeYT z!Y_`Ihk^sMK#bk}$upgs*I8Qof(Bv5q7RabenN|vKXKbE^|5krGkL=ykqn(Ni2Qs8 zX%R<`)#$OV|ACwJt{QRajF{(^P?eMY#||TZU4txZ|BIsPdQA9_jcQQzgmXWT-Oyy8 zT7xh$+B^>4?azQ{^P57(&@nx{Xm4a)+NQLSNcqI^s;bQvP%yA&KTZgZC0e~PI%Y%U z4xyYHk?pS5%=!Qe7ntRS>7duVTu>v>Q^$684;Mc9zx@hkAl=!?rETd`M6ga@%ELS7 zEArFyG+dO98e^&cu8t;q9EZ*YuU>D!Fsx;7ka07H8U$!1R-$fQpVJL)JC}H^Pp?n@ z>SlqWz`??_gvq?E`E%h?w~Y_my5@~QvV@D)juwQ@&Sp%>WpH6^#MV!^diY_|y43s` zRH-w#p_=pg*q0~3T4e!Fm8=m0tn%RUYV#t%Noy>H!~3jR6OPn&9D(nTHF^}FwMSG0 z8W8Znqegh9aB7*aS%R(??`Jba=)wi{ z&WDZG^eU(9^YbId`-KQ=?`x@gt3tebxrzGlJjT=__fF*n6t7CjvnP0s1cuO##o-|w z^BI0cKL1ZL7#Lq;=~&70*zZL0^qbJR615EfxIs@poR=K@HuhbUGxzsVHGzlMF(e+u zeYA@~KIRz`35@O0z7MzMA&3FaXgubidpYqKENPYJbsK15R0?NV!7gHjz0Mi9{nCgF z-)NG6DlpB;KIgn}V-({gz2bSe6W-3L9Q?)zeq0#1dzmB9 z=q~+~*NN~3#+{%)$8}2{lwPy;c7~s{d7Mgkj(p>s&i!;@AVgG}p*}?Qu$7Z=dw@cC zguu3$^sGC7yiU!OzI=K7$;9r?1qkE8ZG{(n@}LI~tusH%uVBR? zP0@IW=rdC)bQEHK{$*Y8nXi{EL-1Ylr98_W+`>{yL2;C`pgSJ?9>y2iKNs*s9#j~E z#4?MC&lFVz?SQc_mhtluq#7g`?_}_kur)~D$);Lz#?^gM0WpYQRi0_sSg^OyPmb1I zlJhq?O{w|Yp_`{%ry_Au2fwvIXKJR@3UqE$dK(^v5=|xVRQrxYz7FD$Gq(U{8Ra)OzGXh^c8F8?}#Ca4G$I#f0 z3s3>;&7aJuB7s%}3aPk(68TWySNlCRq-(k)mJE*yi~ReEjw)D;FSiE14?Kv}K%ees zSvZg7n?o0FMHk>YkAX~N+2GwZ2d$GR-G>d>>S&EO3Tk_Ap?%76$RXs~d4>HCW()gf zB&Wc6kWjU-M-##|PLPA5M{~{(ZdgkoBDnq)X5%Qc7R!rr9i z4*`DvXL-}I;TspW=oW;dab&~|bLGGI_<8|CG7i(>$yYrEyd+sV-*w<{1#b=>qdjsfO z-{>4sh-#!5>$D4;YLbjB>^ouIdRN4eB16@bk3?-DPXidA|NT{4G>w~mR8d;Q?zY+@ zVS{@Ha&J24^9r}_Q{~(@MqG+LREPKdekg3looYrr#Tvc?=m;!8N7UsZ{QS-%E#8Zz zq%(1VXRdO6w(<~6IaTTM<0`!Q92uf#8cY`+i{q}|#0sEw*CyXSza*M(ob)9ciJ#E3 zI`^cm#jlV>m?JRY;RDMl<+@kT8~BSHRQ;w4PnG)o@P*G5KJ0U0OOs-`W|ORKE|b!i zAZEvd)D|J9W`2R_Qk$XTu&=i;UdFz&h&MBaWHpy6tv+4<{7@;kv^a0c0O1pOnRYoY zHb&v^ILBh?3G;HOB{VNTL; znGn;#7a~H0RM|=b!C$C?QQKgsq>OOgD1j_|jx1UVgQ zGK15HQbsz?@}4k(4=A#@HB}s^T@7vIe=Ovp74_$P1gk`MYgL`4UVVQiJU19FT*cx( z$k^XvRXOYYkO1$)g!78xQ_8ufqNEi#456d|GC&srDHdBrFfAB($Q@l|sqwPSVOBvu zF*a^|681i-$lX0<@fo^$6Jmqd5jG@t)@eYnoT`rXsc+=@eOFa(sGCih8Xv6-2p2PR z?IEM}>+smv=W&hJ?dHC6#-@;e7lnGh>i!{6QP9y$&}XdqT<3k~?Wm^1<`1GYw7?91 z5!q5~)A1Y!^p%!qZWpmF%ER2|*PlF0yGoFEuATy(EeiakcUm?gtoA>vYc zUwyr+<|t&%ckOLa;myvqPh*rxToWhny419?AIs1q=(NNGhVL>DlsE0?_0bZcdT>81 zD}JF?mQ_ZVQzmRRM1FzmGtk>_E#wUnaM)j5yiT}=ffe%0!ZheBj`9Rx`6l+ocl@bZ zY8F>dGsk(1`yk?iZHqn-nUxQ^-1;?%Tot_FNVn%b0kg8|f;Q;MX7|ALfg2c%kABOV zcShVBb$vEJ&OzEKD;^CUb@+~@bN&vFS*2kwCH#Zd5rK+GGKG4TVW*&}0k*abGfUTx z9Cx>IY??u-v{8nES(*ol1u-}5@)W?`}R=jKkVl{lxC zbqvvIjF1y$28}?3^SQm~myMcr6(5F+=k!o5jpA>rs627@cMy91IsgN1}{R2NIqQXm0p@J9vv3CD+34NuK$wd7%KQWGYed@ z=+pVB<%zd$4EsfNUniP_-Q)SMajjG-6LYoW&gqld zDo?;byCzm}x?WZBkfv^>Yx614)3tmnq`tP@86CZ2BxwsnOi4k}V-`=lgqxNsi`;QW zdi7YF={{sukAPo~YVr9z9cyiD7Dl-#Ub(<4QDD!r_o0_Jo}Cv{k&dLzd5;+GTtt;M zEmp?ImV1H1P;CKMg>L*;C6pjz{?Z7XrPpFOdLWl=WkDX$q8r?pk}s>vEEB7@d}c@M z8K1pIbCi;L^GcImfOhp-^S#Pib^pTk$u@MJ_LV0`bX?x>#u@pu(p`mpJ#~xhH@ z>i0=Zbee@tcUL*v7PFC@8ti0h_b<)+%NyHm+S1rFm{;v{N#aE876a3Sxc{*<`YY_50Os>#b8qoazs( z#g3yOUJ$xpX839_DRCL!igAtZ2zwNz>&>gQgy4-jh86P4!0ym4Ja=XcSIm};A#a&Yc+2w5>47GT4Kcc5ELB2X` z4hXpiEoNalDeR@-;!5i6XO&MGX?CRd5NEAAL0x3j;js@sWw+g0MBc3XP0MDt|dY*oJF>N+8`3eM;C>C&~PJyjtB<7W|dJ`jAC*5DQ59!#P^mKGcI^L7=0_zPC*fhLZ?=lR6# zqq{1bthK!XSWolrFXCGi?H&QBs)UI===su5Xv6X6ei_E^(E)sP4S+pje|p;uKMP@8 z|Gi4UuYY*VD!DSjoz(HaFZ42&-{zW@nX z0&1iOD(cg$tHHH(5q@L$P2ZSx!NFYm;WwcoapdLaI5P3P>%DwipR=CNXB8$Y8yp+x zzqJvTI>;&zI!ZVSOPrTSQ^=;`kn<-YH`D9uCU*^6>aA!($@ zq3GfI%)HcBRSo)EUm$7&w_zVoIY(eOyqsoU8gcikX{*U9Dy}$c2a(aM@qt}>rJL<) z*rI@t;rWAKKK^YBHPF72A~8SwxMiD-NzX&8E8^Agy4f(PP48`>zNpLll8(BK-|7wUk#Y?Rv1J5G*wg|g-%i%fw@)k z{4`&(J98?YF31DSaO-!R@|^ht>7{^+=~y%qRxe}5Fhb7b;yBBCC}PO50V)iIrKcmk zR}wUYm{Tg2AV{Ivx+_SfXXlJDsCo6~*hg`(($W3J0$eZb5^|~x**CVb>;6@fONpNF zaNmGFU29Oi>W^Iwy#jWwkIzbSmSzQ&PJg_sY+JlR#W$GgdmvZpDvE*ePU;{3f0Zyh z5TvkvA4`UQZZdg#6*yqu_6s)pKXJru9ZgMF{r8G0y|{S^@mu0BLH0J*55X9I}sc`s5hO8!dJ@ zL%Ui>Lv1mH%a~*3)~Ephp+-l?(0e4}w6+l)#&$3$oZRR_A{u^g>QH+Q)U=pKsZ9qy zK~!OSAp9x|R(5y9pdGokS$c+=`)h}RmLthHBpiGqAkB*JRqnI$KkB@BTiX55W74gQ ze%RpXVU(`;Ky+V6zxY0g_q5B$TiF%{pQpz?U)VKnF2x#50yhgt>_USB?`?7VRTUs` zjbVI7ube0U6v7BjLm3dyh?@y?v`kCB5~;tmxNi_LuZcR`=FEyleT_TW7~=k=@Y zsNvs4F9qiEa#uyDg3xs0r^g1J95u6Vnk-SbiM#1U_ltJKii|(yL4u8*ied^H?Jp5u z-Rn9#pRwfo4&%t6f_U{&ov>FG1%)3J=aKmCzpM-?*B9y3?ZP zZImx{>J1({mXlngKh4f0hUp#4%}9uO9?0n1l+|$a=v6%cZ^Gf-4HU|`_KtpGI!jf` zBhRg+!Tp^tht9W3?O|R&ZZSI!l==rYPh69@{hPi|GWa_@M3BBAl-dw7q=~CPHG>Ch zp@8WNhQSdTU05-^k8??&H024|=@*Ojc6kMm8Kfl==_s{)mFI2vMxlm=h0rHd?@43h zPEEh)ejaL==wfiE$xqhZ`~=EtTjNuFsG+OU>w}5?;jKoPuwNS#7N=7qxADj+rjv?E4#l3fr3@wO#4^HF^Q2qxfR_$g~ue^}Y?vdvTBx!U_R1^`d zpHniRykqAz1o^Ig<1k0lJGapEq4^EnZ>~^N~qn?-LFw<5UR(J60R~dqE%WqKbT6qO}oD6c*@4_ ztf4^y5(~I6TJV-R`_VM3{DXBluk}`p6I#e8=_t2wW!HEhzzy_+4>szqGx{THXQ61* z2Ih6CPJt8UXk4>hc#1~6y;YhP{WS?`QyZX?bsL2?FFCX0K&Bj*?>Hm9Qx=$ zp~j0T!!at14yYn?OcdkRyucVvgxPpQ_p`4pLK2~b>oZgs?C2^ZsG$I$c zlI=A;c&LtldSY9IzA(Oey}E0Z&xT#kIMV&roXK9CDTqbEG8(H?>}n{=xPi{#K&Za~ zB@^GvL{sR&n|!-rzaPz#?`t&guIRcl&f^X2y|0g;ETcOX2+gd!G5yOtPuwqWKR(5z z*i=>&-ryAuSh)FG`4tT?0Vlg2%r-`ge)Q6~U;4y_>-GY=K`3egBCuygLszN~FpHk>zF57^Av9V>x%R zxlmvFL^j^?Bd$u8kr;FM%|`%IXo3~@E3Q@EbHOBAB z#2+=WAAN~B%M9q)8W(c34WVpa64+mBK8q8sL7mr3Qmk%pQH~1~u!~N+&xk)01UD`q z17A^!!ca2Y0S5FR!5&*^Y2awb*OcGk;&&cDYFv2`=To7}!>b_b;vB4U>Md5YKw9a) zH)d|bi(@eJ*po?_Vz0L(2j<=V8c|shq3{b5{eQY&0EGs=)x`sJYl7~3lkwyF3m18e zMJ9R;6H?b0o@*(w?nzI7kpTnabKWzo`(`+CPabm*0Tp}y@dF7k9w#Trzj@gsIds!p zc2ckX*P>j5EKT$c2Fgnt4M=lbaN5jj&)R?^ z|6z&$qzoFb~0^ix?Oi zGxCYFT!f3C&*Mf@iYneZRkUCpC>z%OvY+-=uTH_t@Y}(6jaL&5G5=`=-izQo`SBds z$+VzF%)hBfAnQ4&Jpi9nK**HQxjZYSIiFEW9>9cNIKaCfez{MO+++6yv`fb=-NgtU zOi2CqpQmIRhjWSIoej(j`@}f+NYp!li`bGvJO#=qFWjB{4>PD?yf)FGxfT2rQ-R)^Ek{{rFYEsfb?z;rt{L12$bq(WFLdaM8Ktt+ldy2D`Kw!N5-+1(qBr9>aEOaa$ zRPWA48GUqkXoPfASh*qpWQQBbnA~d*HFQYQAkKOQym$Edc&-)r0IkhDt-vQD;=8}n zo0F4+Kp@_{xu%ElN$&5DMpD$RZQ%NQWpC`o!1Kz%m5j7w`IpC8s&XDw8=})E>mC_-(Dv}`Tf_xo5<3DvfBy3^lQxt>#V-gfr%`Z zgpL&KddVS~CyOTqW{~aalZ6Ufez6lCn_#8Jiy4U6`e|+2-YB3tPtVRQ%G9eWD@CB4 zo=H}_^*s7F{1PXf+l7_Wl6F7!C_L6k#1^|@$jR$9Eeb6tkX5vv_1<7(ic|(ZEWLF7 zHC#EMGFtvs>H|kBuDDIAt6i%6g#0pEU7dec!p(^ClN%hS4$h22()(~h{`jxcI;_j7V$j1NK9&N!j6-=bc%G^0G-I*eI}|Upg%&Lq9Eul;YYA2$K!xB^f_qB^ zmtY~d1uaSO25pN4cPQRMa4QfjNbc_QoVU;Wo^!`{&lq=ne`aT|wbz_$t+{@4t|`F% z`{tvymEDvro>3nkAInloJUd;VdalU*R$Et^gkwRT;*zI2FU@;O4188P1e__oGoZZD z@Nh#>;&_$w%xMN`Coqwc?Dg448F;X|a7V67Y* zx?a}gdd$RX)Ha{ROj`aH*C=;X+%!dOo!!-ujobrbRmiWK9b0BD#=Y6-Jcl5DKtpO7 zYJEy-^G)f>)vhoE#M3UhLpj8M9lu+}#&*72@#aGBW8QGM%=D_3ez+A3js6Qq; zh&*9Wuq`UImQHTqTfJw56QRMT+a7xLZ$x!F`%C*R_6+x;0|)Y1jGRd~7fY@oi2Qrx zt(fUMVHUNoeg^ScJ?1x6Uwf7+VA+hg|M2UpF}dEQgm)dOM#`b0dFfa4G=EZX0@o%-hl1yTmqb5WC|M;u*Hfxvaf8JCp~?!Tv|5gz_jkA9nujD~~Q zmk3VQ<%s0bHv76m*Zu(3|E0fe$W#x39Ft5sv=uW+y?W;ZI4>E}azU7rlUum4P*AP2 zOY?1@7|8?s>@NN)a-j?LmAS#=lyta`w74TF2T-&!ygEhiE7cR=wg)jfLPq6mGRvKQ z4Q|s(*Of6x5PMQ3Si{F6+zxdL#f>fFzcgPk3G3u?1taYW1Qr-CC)kQ93m+}+=M;)? zZgTc^T@ViJkX$Yfw3AF$FBc>^h;XCuLRq@gXY_uQaU~Vnkwo03+m9aY;6(f{8)wx) zi8VrOo8^?Rn6`7+*w~qoQbt@n^3!Ku(-2A}t|Dy}BFeB=rm5wwnpU`z?zT=^GGc8q z*IvwCyKyS=_*{ZYugJ*K%MN{k&mYR-L-jbG85=3Yd97Ln2oKApG^WbpXob3$!{6=( zt`$vr`!sz;PgDnEAoZs%y`1^IZmClHx;nir;RujL!=&#rY%~9)KRp~Fcktt!aTmwQ zcJI>r_*iA+YwH}%9~m=UR#!zh5qf9O^R?s<+zFyLxd(l&7v7ccU<8k_vSU7a+BH9o zD|2pDU1bxI+q^%VVkWwiqz<|zJ*>kK;r@y1b71&U&1VkkZQ0JJzg|P3;J@Znh)9O` zdrmiIwr8GqjeUpnup1q!=mGl-+1h0rDSx{A>(OC5!32p@I@fDUCvqYAE5L*R;a4d4 z7#_>yz4WC)OuFf(xu!t5R~rlKKffo~FV@N(YP4ZDoM=CT%!&BfmQI=~A0JTQ(C$|0 z948AZN+hzcf9{+dD9bykGj zEu`8hk)W;@r*e7}YK#H_62l>th5qMX+w6UW?3cf{S?~@W;%z=Uf(0S>F*ky!hqxj+ z@>Md0>u9vSNfjPWx23a<0mlAWVBz=1%CEVUDB^j#)0scACUaxv)_($}9e0)V4$ao``U_ngup?>ngOljaLJ_*WJ~-DgxE} z(GidGvb(w5>kLh=!TTqcZiPcE54Y#RXUQI@5|;T;A~~9joTqgyfXhWGE4@ETWG-5f zD~H29GTph0<#bGQtWkkUISe9V-N9J!;Zh)8h(|>D0HMzOd!xO*b}l?%Mq+c6Gw^h= zTwInp%HrfWPA8Zs8#!Gk>bF~dyFZKPr2ioQ+}78F-8WgiJ?@cv)ZrIVXUNYBp;1P_ z2D4P`jRD^~EkkC&lslyBO!SsBItn=I2UN$XmAkdolLIdXA`!cz0;`g0J}7g^!T~wE z4*efZmUavi#B$Mroo$A^zorVpN>BFaO%6}z1IxTCThXM0XfE$?mzCJR&YQB>vI928 z-y?2rI~RR|e%YhJ8PGsl+wBdOt99{R>ezkr_4}f@bK7jj?kV6TckcaJ~x0ew9RZHPBv$C{);`Zdy z$2ZeDmz<^$diM5R3 zVS8lWegu>X$dgtCG2pLWi80!iJxBJMivq3zkaQNG@c+AM9FBeT5?~T1yLIU|yU57q z$N>U@@l4(a@=O77@KTDuBi~=U1mi9o-j|C$L-r&W-$Z`TCUVd*0G{B;?@F?vQs2>HO-xL3Y0_&qYKm`qeT?TgU#T#Mv`&Yc zI9{#labO)y7PYq%@fps&3JkgLQe`}h$`GGDl?cAIWTGtfs}kcM*+7SL=bNOadcwp) z-^e6H#a$DoW4V&O*VYZsRRp20qu%7LwZChZhV|Pks)bv89JL5cdyCLK_nPaqEC}oe zphlp^aRMcCQ9LxrxYCZ+pQBS%+r}E-4en|uQgV;wq)MLqGgU@E= zkEv_nc<8?MGmeniWa|*56BYVeNcPRrj;buOHJ0g9!3Xn)3};@mpdQD^aCg7syJ`+b zxv<9-LAEaCMBv};$;+;B+}s4ZzURty-zuK-ebjy!?jV;6IA;ZQUghGN-=RQ~ej9CN z${;a#KCX_(CY*Zaj_|Q&u2EYuy08Dj6T*^Sc6oW+xkP>M2M#EsD51crC06)HlS=j0 za+RZd%pTMsp1!l2W_`+sK`+oQ`U`4VKhgvXT4^{CldSZ29nUQAiJd77C!eXip&SZ% zw}3a4LTgUHpeB*G{}P60)7Fa!&A!C}-+8Fu^2R;_&O$$5@&g{e$;~9`7Sf<@uxG;z za45SE`ktSe`uKT|DZa$DyLpYwSzp<&AiYnCZ(hA)S4c<=e+zqX0L{G@X}_{v-6E*< z<#uaL=oM`>2_RPJ0V_6}`e+vuXr|msZNbK2W%@xv&be;uVnX}IR4tan zx{gVi|ILuqhpL`y+o!KkToFBTreB(VCN_0~-|*~2RefvIusBrIm6#AV{IsOU5|2~b zyca;-UmI!n<_`iATkLy-g=&N4;=&v-&Z z6Sbvb=63NjpVfnj!}4#DVC7h?@22l950Fpq!0o^FxqmyhluCFzN!NbUV!QB>b*Ru) zqhy61O{X6_8N*jgFh(5w*=l@j2R{!+#k3FbNhRmy*57}SWmgD=5CmR zXYQx9fvs1Zdm7zA5!HmI+~j`#G{4B(jh*(>P(Ta%#i2C)VlKX>%rR&v0&D_qh={HJ z{tkt{E=Ns?EmOcuomT<5!nS=AkJW-KD`Bf$$d6yU;>va>@lf`h9DO4{!Omz|_Esra zziDe&{`TEgH{@{#X#CRQr`wmxm~Fkd&15a5Z}i4^R#^22QXl$DIpPAda{GZA@wuI* zY_&M0;5L;cTH}YzOLl1`TdHPmRJrjCl2^t+v7y(Eqy#sSf^yVc`q0_kQ47R{vzf)L zX7ydPh?jJu2djl&M7c&KB+Ur@nv}s;-)(LPrhm-{_?&K?r%MX5`Vi0ff*U$1mcoDv zYV6XxfhOn(iN3SH91W|-TC`h0$-4t#VC`_EVnNs8+pEo~rs?Wn?!p)*tj&ouMKsZZ z1AX6${hjp>AH84v^E2l$saH=?;HT9#dmWA1!W5Xet3K1s8_S`v)~-B;;gqw^aQoxV z?duhpT(`OOPIh!830#6_>LGdFod-A@F&5UBS^hB;wOd~^7IT6lLcd;#?#vT7V`Itz zLqVnvxUG_sk1t+ta%kx_QBy9e?qGp!apB$o6*}TGV62^sYE_pKo{M#ac}rOOSt5HG znv*g@Y4USLgnUpzDxeyUL;m{az)&G0(d4#3GeV9lR2FkMgcRcBOHKw0*bH^)97Dh5 zROokj4v&m|ezu@FL#JjO6H&$uih*~y!H)Bzv}puI{ic(+qK(@NK8!Xk&RC2L(gq?q zkVb7ogW$YW^Lry@fd*X1J1Jwz<2>BC8Da4fw#MAK4*hcFh5Nm8a-eCVYPjq3?QEUU zE48JnHzsDP^emY=um80Wbm}IAsHn!zLG)Jrkg1t_?Mu3O}bU02IAdY>E;fxl8BFh8HkC|9^^E*jYFb!$i1 z3i|PhUIRNEnrm6Px*$jU|8Ub_&fxTNFO9-nUDAi^BnPW-!f=g|zG^7s^lX+8=4)dH*O9|WOd0J0 zM(|p4%MFqb2R$$s2RNwzsO3b9(qA(0xSuJi&2#zXtV0`AFG=7uhl$G>-kwse3WA5z zc&#vw*0l)9`2|vS@GF9NYVJ|i`1Bj0e-_h^_MxIyv0oDW&dlj@_bqn_z$lZEPj2|5 zbc+^gT5M#vgkuPds}AovtaQAX%&~?0{J1z}!$e6>FkOi9DPk#z6wk6x5nw<%Ha55A?aW} zI-pleyik8w1C_Sfas5?V0y1@a0uaw^Dk6(0Ais8ic-d&p|t zBE}2Ac`giVa2dzolrnr%Yc7u_pMzeL6k$63ykthAWh0S}e36zk3 zWfYaLwRzw85>;!PXw9*cC(DH}$UBR33|A%;7xMi`>VggtA90vuxj0)!d{+vwLj;>GKc(2 zM7y*eDQ8RoAj_r}JYX}#{3!%mQ5s)(rd?f_wNq0}o|Qf;j!At^Rs5@WXADOSuT1d# z-HbyTX*FfP&jH5~he%a84>bTmThviS`!o5kp-SEw>g}J;X&S->H)a?MdBWvTP&VPe zh)w@|jk8hr;#Cy@Qj)d*6s9E0qoMr_V=u;iPYNv(aONFw(r6EMO-krG6L+449c%{#!Gmw*mw1phw~b!IOs*=rUKW)Cu~ z0)W8*`0n|ChVPtkjR24eeSVnVygMPgmFP;Es-kV?)xN8)Mh_JIX zxp))HaRVSS$?mUyuSUU!^%7Z2@iIi~ieNGF62BIU+iH}4-NfN8aABp-SmeJ{5o@bs=oT;eA^Hyqx$_E^Oo`m9op z^mvWvXtJZSxgNva$lv{N>TXWq=*#+pBPFy%sBAX z)Jt&B_x`Mj+TsQ_z`^=3?lI&$EK#--~1*u#4kE ziROuCqx|(e)Ix7@34CgrbnT-qI)v{g$aLQN9D5-pG=H~Ox|jfAD}^)>sGk$4r>hY; zUGFWgLlgLUjR~y*IgOt3@I0=MFZS>>8z<#PoEKW9kW24G<&z#cZxlnUEW9JkV^bh ztJcb}c5a>*o*8*vedT1m(ZlMkW~b)DgwJ+KaoLr|Vq?E2tS~6FB7dQpBYjpKwtNG5 zKl0;HoD#lcE=CVe^p!*}4o*LolC9Y=_t#K<@DhtA)uwdP+(bPzmxWE;$m3Z>H|C{P zG;~{^{M??GJ3o%N2iI6Pn0mhNGpjf@PlE+EhMJ*Emf4i=FYFYES}5+Ys$u&@zQec0 zWo#t^Jrls;B5_M=VIsEDA|OG<0#%&6=g8FiXiE{zKivPu6!Xc=FjwSk$3+J7*X%rF z^*Bzsmb7$3WID&Z=b%n9ZdmAtxg3O(wSDQeR@+Fk3VP(erzbYPaZ1wdE1`(pckii_ z+0+#Y6%cLJMU$mKN!^!zqktYw_MR=}bEfPpIASXl!5ineOF`bSZ+;DPJS95wqr>^5 zM2F}&6n)36wQcu0X2`GU6tyV#Be@I1sYDH=;hPEA9lmDmmv*N$3C`mho1pw^nJ(j$ zO=W$bHX+_O+*lFBZyN0S5^iY5-lE?~#ND++HIq&N*US{6JZO7$la$;rurDnrL-e2O z#p}rM(d$PGXn`r9-a3Z6TqQ!BiIK2(?LdT8Rd~*ZUWp4B&~}!Yl^rju@6|yPn$kwO{_R9c@N!yNLq_vHZ&R?4HX4P?=Wf|fQK7+I}hmd0e@xBXf)6r>iG^VM5pU9Ssy zGC-xz0TdH-Nt}6Z}$$-kq=+wk$Mq_Wld&EbP?2K&yS&p&lIdItGx$_M)1hoz~!a0N^2Ri4Y zA%UO0j_iE$2QB0@800&S>A-1^S&4EBvRa{dqXy14Th5a=O{7!?M+j8DVJFb{L7V`B zWfZ4$V@S%Kq&btyE<;p~W7_d|S`v3&`PdO!mxPFOXpR&fVZH5#YQ5nK_? zIa4#$5OwO@xNc^+M7wA`PUvl44(r@lk1qIyY9sGk&Bj;+Zr1n{GD0EKbE6hNl?K!d z8N0U|R-1_Kua3s|Ri|*4_2ZVIkQLu+TzP|cg&k43Qxa4t>h06n|yq5aI{$f+he7^>AiTp|fN$sIEDM;bQ+4>W5=WJKt3<3Qf{k zT*ao+VJBA+Q6vn5pGMl_>q3ZU8&&NP7e$b|N$<+s9#aA~9HhRmy$uggTH@ZUpY2W7 ze`Foekc@){L`AL+sy$KHZR|hx389us)IfP0#H~UCdB*P>v|HAj(7}14AMe36rg9N4 zlAWu`r(}uO5yD{*od&4+b-BX@cBJO*v6cy^)#~{hk9Ig0!zrZ}g^XRpCRs*buby@s z59Mw+42nNbu<*w>_7@$d&#P-`G(d{`J!!Xb3hMaSSmnh#fK3dR=naXP8IEB|adr|O z8$np{F48jliY?!E1Gb*!HXPx9J=Qn*cG=Q2l@cZPG<{&rmr0VsZSMrW8qq-Lqiw4# zh`fdEVh{a`n#9x9&mV|2M<3W6*e9j=uX({5OOx8}2U}x5Og3YDRpqxvQuiZR=uyGp zweDtAl4cFBVoQsRx^>PDFn)fPJ1Rhmf<8dtP=O7s-R|kCi>$k&hQCd6_uBbP^Q8AT_`Vo7k|yr8V`91WIndcz=JR@fAJf6EiNA}llK3&%lyL?3(mo$}o7`6UD7 z2O0a(sF9?LCsI{THSc(~>dx?Qb(~c~XBmQ+g!hv!_*)3EwOG34<;Ir+z^Jm5z`Rqp zE@QE~K9Ut*7^ua`0I>F|vX#r%?eeeyhUwr=8&fx=r*p%BtH!sZABVgf`&yRQxr1;@ zh>~1#%HfnuBDodsw9BCTk(^H)=&^{THheXnIJ|(A%s5^Qv_z$=QDbqX#T)B7(H$YJ z{&lB|mw~lFbox=cIDeaFPGiPtS58(ZJ#fz=7hevPJfC@}Q>^|DIF5f|ep1jo2NHNR zLVWkW8zkRjW$3&Q>u*;hP4T%0V`|IXhxOK_ye$T*4JiS0=Mx$Sk*r=BmqCIb`^l?; zr7~G`qj}qeYC{GR&JqHlUdEiRVAw$3=wF4sUBkkSi7g_=h1Nn!pt6Oj_|y878P(G_ zlh;}4TdwVtp4JPuUDb2HYLB711UD07IR*rD+LB>?;(o7pKc4mHhe5iJ87 z+_AhYMoht}tfTsg6LUKN?j2QZz2I=|sk#cnvQX13v1Op<^X319ixM$?xef^r5(-!A zl0H6Q_|HGFKk{6$mL9_h*tY;g3e?73y=oI+)5~I zBo;TuvOE4a{JHcSWU}c*a?jIuoBp@X=yT3vG{4b3{trZ1{OUh(r@=!2ZIWd^y8j!T z{;z+q!4k+cKLgQJY2IxdNuf4%^M+P{z3^Nb$i-(NU;CAQ|@d%mgPQ>gLptoDvEU5WiG#`J%18yLv{ z;G*@bem#_S>_D&~jty1JGAp7XVUb;-oin?f29`-&D&#N*0xH5dkjgdWeI}^X$f{Os z1vf*xE+Gq?U#g|NJ*z)>wGGL`>KIuO>}@7P_UL}>zh;~vDGD^N!msR2n3{4!<%eBl zifl`<o8quo}LazBfY?(Y05T>IN%v-qUelu&r!o z$~3M|aCIo-sH09<7|ez5>$B5{8Cf%P9|%8z1ugT8y4s;sVp&If@_D?1=#~jlPc}{b zo7S2s4SDBe3<`%{wnz2%$aN@|%u1PB22HmwfM#alV-U>Cf+v6|Ed4w$bt>a_y0o4x zd&RYyPxB7Mc9$bvkx9KK@Qwu3T!QR%(BEtFH?0BQMI%5b636N#F&hXL{L+d*XKUVv;gn- z!H(O4El=&3es(ADPju$!b7-X^v(tPU@rh1gWr7lDx@o;_{`$vs4Bf0+s#JHCWXcfJ zj?Bc!2O%GLx2<9E15++QiM#OlU%S>?)}b&(1@SD$=Y8(gZf30hr>A2tK$G!QCPVsW zS?APHXs9k@;ETl&3R`!FVqJ};3hQf64Et-mSL6j=w(NOYUTqhF-OV1TA~zfIkd>z` zyGPq$SoO+SPem6K9m7gLYR7%nC*_tPZ29Ay1^0BBknZF69T`kNghH!6<}%7cS(QNC zY@1m{p}b>C7os4i!rD2z#Fjy`cN9yKKqXQ3KMMsjJyreE1GysVk_s-|Rso&-7+uI? z({IA6Ux?+54cL2PMq1=_a)`WFB-NA4$@Q||Uy89_#_WMRgEG3l^SGR=-1(&&Dn}zF+v`0=_Ecx<^53mXdRDBfT6om zbCf{rHSPv{!=JXuULK*-1=WOaEy`9glvKim(D6+*VuB?&&PfWVCc(-`ts-1+{{ex(2F#NZIFWy(21St}?DJT}n0`D9pU zurp|-jkBKl@)Msu@CDNNr%4uix%7Dw^2teEt+XK!zJhraE?#5{1y`w{Kc80KYMAQt zyzWh*5(?oqMI3H8ulP0t#+@fNeJ(mz0d-KlCkljf{Zr)lIgBEa0NP9ORsZ*&(6*+IiDG4 zGP0&bm1gg7A{2Iba@|K~UV`|3qK=R!^^*=gwMEoTkTWbM;HAs5OKn#fO`J}T)#LOZ z>LvCRIoge91+wXuAUOLei&|0#TJLH_@(>(97Iaf#9yf?`tJ78MQOxL%C;B{4m`l6l{Pgk^d)G&MvI7u%TXcOxous zqY)oiL*|~`_se8Y9{%CM!ehd0KdREz?ba*qVtV9^Vz0JnNnc!D1?4(KUu&y{E6o^t zlBQjV$B9;#ZXRqPQEs-F@BV~r%}>ix{;#5XG%F-_!ZGo>tn^qfH;eTW7Rx_4Fl-V|~{mD_6zjyDc!z=qN@p zVQa`mwm0izw=DB1oG^W%MIK5yfe7y#wY#i_w8P4 zUv&P6z^{++9cO@Z>2=2c3l0Hf{(s@1|61_>JNWW{wOPs}>*z#%(@9Bm$K^+R|G*Ck zWl)FdXioz#E1AUKc`bfp4m=e$rurWLKd%|9fbe`c`ah6K%LC9&y^E)`3gD8B13!O$ zrg5Zmknwu?-QC%2qUHxvVNm-&=<&A|%$Y=|1Tq~cd+2+Z94{?;MD*Dw-9}I}5T)tC z39`QH2N$^>%l`v<0Oz#_&T0t#immF6 z`Aa*$lH@sGa>4C=rY4#e_36iJ;zsx6^2FuGn}&9il}lmIc0&bv{rK)y$hM%1-;Eb+wN z(N1V2q{-T1K$LwjLy9i2HmXwq{!fQvilErWA!u#sQ#Bs(RVE&oZBcD;%IW5y%<~V) zB8K?wDfh|OrZHJDe~_Ui16DO1Y~+LYAtfI@oeyuS$L!cB!!@)F{7szOrV!u_av}@; z1tCzppM7*FWXlt=%3W0JwgH_qx&G!4BIP*3DQ&}Rj>YLlyScG}kB=(%Gf>1)-{9f$ zrwuq!e2q25hVL+a-`*~^8r@>^^>!0Y@rIGXAajnHCi$fzzUfc^q9?B?5*NSH^Q{tO| zJOy2RF=p)wx6{5@0cKrI_dmMCIWWA~9FbjXB&~=bG0A{0+gRtuBO$Ct<#SyLEI|09 z`ky`jC=`e4@=P5L&b=cE+!nkpRQ~6$c6jlCOO?B-x3N;Qi#m^WBA6hN?ex$CK%1s> zlekzjeE{VyDB6yw8Y?mI(HB0Um65t@-H=WbT`k5&mmirZs%q?37}-5!TI?LvW`X&b z>+iB;51r>uUYiKB_wPm7cGFs6CLV(1}V|` z+i=#39#yCkLjpq76X^r$>sU#NO1faQmO$RdIzczEq*>mT6AbaBX=PP0%gR~$`bUSQmGN%$ozQ7C)xgl@kf%L#R9Km?5)zBP+Sn-x_)M1 zs;7;=#)6cTdzg)h`W24lLcvOjgo@a{GVr#ek|1F6_RD@7=Ap)dXq5HAxpcUxwPZe? zw&H5=sufV+N0@}J`PEs|Cm8u&(>pwm@ayX0e(#+hmCY9E;+Cy2Ho#$)TMzCJ3(w2k zHpO27wNYSp_ta(9=GWcp-cWG>@|uP})abu-s58sYzS;#IChD(9MQANZZngy3bgE-K z!(d(KYBD)oZq0h1FR6lwo;22g!O0ymB{!fqO7zigcQ8ENIaJD)z5U@rMTbTVuX{sK}SF#j{)!e{qoOyg-2 zy~WE5AX!dT?5|`N$vU(rLt8}eh!)%{zv}*2K%Mdp)#Kitkd@|@{(Xk!V)j`@ex|g1 zCpAea9ksO|j)LX1E#Y_Lb&qw@0WaBIXuB^)3Kg4eUqf?noskNkUq_EnZc23no7DsDwdQ+RoOkA6WKvDkW$UjgTej z7~-OrzlbPR=u%o3rUc~9^hEsWmF}A^9f#r>GG>&aUe(uta!l}W^4C{&oaMAp;m(d~ zziAWv588fQJJ!DY=)q)Hza08uzQ={d`^rDR)fN`?T{piI&OB4EJae1Ztiq~R-=!@g z0Ii`b*OY_LlzeN2Uk5109L}pDDSYiS=x${y`Q)j@OR9g zzyC4+{9naS|HIhyTe0s=J_$52ww-{KzQDu}Ryd-~OFf$#9}PmBNiu8Hy=(bRfjl)> z*{w^Tb~x6DE(nkA?Kip(i`Mdj>kr>WXo)&T&i#T-K>HRZSZH~2lTa%IIGezYLThK+ zT`Mjf?w5B)3jmBABkn%>rYz*KW1R>%EB}k-KMHP0RDEZHO4=o+;rAAc;^H*gc%ki^ z*l~|xhcZyga^XZ}wpg5_H51lEoR87J=>}B0mL@-!lGSKpEm;eEM_y+&kCvgXh{w*_ z_4(|C-vpX=Z|~_tWxr0#pT82{N9n0EgTsrgCE-^$`7PWZLV2+IiF4Ht9K#bawszwt zD-Tub62!Wqq$_N+21i6wcFi}<=zjLL&3BG2FAFsM5e*A(2pJm1srlD=zF*W7lg_RmY+@%m%&Q zao@=YDiP^)k()hmWg!Nlu(D-(GqCT5bMc}T;H;OxeZsS~*QfsZ@^@X~&cWBk8iB2HU*Is>U$_CMqXUZhTJXY?QFk3B8QM#8gqQ4$AWi*M5&< zy{!It1~Dw`u9no&(e{W<-Qv=!22a{za&q#t!{%7+M?#iT#SXmr8lxPsW}HP!Zak-K zw1;yj1D8jv++i)ZGwL_*e~_Ut9$Xf@LO7KZlmlzGDa9QJs@6iGNatYYOiXR!lJFx_ zg5(wa^|%Ee*PdOm-7|JvN8UE;#{!5}e#za|}$YbE7in_5OMX6Tn?*j|9$*jy)n zA8UQvROUjn%1W0OR>EFpKME>c*%ms~7YH*M7gOS9(&fpm=s#U>C9N#&dFfX^N|Rf9 z%D9NoE&7d-bB0w<0rEuR+sDvGZI8#Hpy)r zm~M1auRlQ$nyg<>3yDPcfKID5Q>e4@G@K_CU*4PUESZ+4=;z5b$&@sIJKeL=z19>C zsND-jzuY(3Gd<mSOw ziZC)-$sHc~{(bW4jHa;XL(vI>TZuI%XTEB#Y&K?$@J7{QRQ8!Hom8sCDoRy3N$xF< zT}4Gcn3*T5I7@;{6K!BMW>a4NESx)}LT@qarSy;6;`NYaczBdX;2Mu#4j#z4HDug> z$C}(96&@*l0JGUm-GzgHv8Yq0_wSKlTy9qde-DM=!^os&6ms3gVE~Ik0Gv;n^&WEytbIW$lpDdca zr3ThiE?1>!Vu?dPJNwD87u6A+qcL(1wnOBrhn(7|YIf?H&f1rOjL-|hY+bq&<8}Ld zifv*iKI|+A*q_+gJmfe zw1BBj8&AHo$+47@mPVAaMj*+A72)Z$G^}s^x(NT7fG$=L+MIV<;7}~MKom={`SQW& z<5Vg9p zD}1oZTBk^w1liF9@Dsq%=YvSE^rxApxjHPng3C(ihPm41qp9GP080>71(qkDt~$n(Un2hO(9pamr;*rHmhVy%YzrPdgU6V2isWu zRaSLnZhmk-z0QJw1lQ@1ntOVq9ttlG4S24X?N}M}gS`f{%@k(p%0l#rH`}fYi^{-| zCDfon<8j{L!X%#-Ut8cvAH;eY7E%{JoNqK|N9%+tboA`}OfhQfT9|oU^++fCX5kBq zZOct|?J31<4!}$Dbb(X&C>k#Q+z#x)b#i=}-bOop?&L0A`ZyMMdT_G_6@v3FYxLTH;dv2)%ByF6)nMALr$%tJz9PD zz2N=jWnIW3xi>;tf1O(IzxaG|n(lct{nV2y`iQGrm_jHFvW6o9X^{CBf|^Hq-H+ua zlTLrG1~v~LMPc8{im+0;GZeVoA)X&ixI$Pzg|}kubWCoKFgu~g@+4adgbL%nwn;XQ z=^R3Oq+#snio39r@3oqCl2z=IVez^w2s)Wr#i9BXC?#^dw4_xEscSBwB{YNFL05^z zv+w60po6A09@DeArdNX6)N0CYL2{w1F@cNqO#H6$qUG$1*HM5)wWHbGSqc;$t`mLhM2JrBuH{sFJK}M}rIEF_{q^~c{E?G~TB+yXk4LQ3j@R4maNz@_S<7O+ny|c_N(=i@9KEdAT`|n>&U(ncH>thk6aO6^omJu>0)l4l?5|m z)A-YFa=LGCG`Dvwzv<9t|D)UjtW)YWUl3NS+^uk9J?pK;5{Z7VlA^YP6|vbrTyg3z z%D#@k^e2xlO=X_5whK}zf&fO7z>46g4nb*m z5Sv*!3~RDD(c9xwH`oVjFFE)5kruj@gFp5flbWWNk>-avJU&gB0Hb=Au8e1>j)~sa z)=!hInSk(a!l0N|d0fW3U!dY{;A93)jz~7Sx!BX6w`IygGcFXSC3tOHp{czU47s||R=et9|F$xMDTZ5V!)oYgbbqvRu0j#99bJ4WTEnPgUc`PTm6>^`26NFw|5GE2MuFwjque#?owBO|iN#&^ zW&rRhZcC^_CtEa%>=q1f(!5&WGntd=Oz;VaAi`8+ZdF+6YQ3F&nk%vV-YYlABXKkj ztT9Ml0bRyE%U;%S2fx@LQk~<3bouTt1LD*6h4M*YqIGEnR2;r!V`LepeiGn-@8FsP8fMy(YTBv)sl8144 z?rl4Tln?&~4jw)&TFjKK#c$D&I=x*XR(Mweh5}N4xt{c7%j{=(*!^7LtIL6pr|-YX zo!&Ox)w6&Im-|rq6Z*N-y-mM9gnL1$tpIQ0-N)$K;{daoKO#$fpq zV7hgI-BZpAdTQ+&*1^3E$DcsjjSDr>{3R>2cXQ08UFSZUr?Vg?_R+~=CxWuY?5NvL zslH0I>Uk79QU1m4^&I){4|^U36;7q{%C=#k9X<}EU+wPT5lFSEda@j?OjY3PMfa)OH42XDy%&{0t{=Q8X}|duv?`ju zUDZqK_yO!%&M)V~n2bqZE_-fg{t_KVjEYCQ2j94-4`{nr`Cu{&(GZbnHxBG#L**jX zg&^yh#w~|-HeaIQ;Hy0k^m6pATLabwcGO+*JCJ2 zJnDKUM~n1Ytnsg5;er*CM9lFm!l5@?V|9XNEwInI-)1}qOy<PUud0`AuW(=L~9>?@{RI!%5z?l@fPBG_dr7vXA|8S z*#c0s(73+K2Ri)hRBdcWEZ99lOZBrUW`sJ7tOR2?3 zch2BLEUIm9H;M{t)6{OOBB;Aysx`IH%Hnuv%&%GIG|scLmT=WiO`OhKfdjB$Z#%J~ zy-8&LyBX&_nwX2Et>peD;BW5{t*=U;8p&#l28Gex&h^lEJ>s@RfMr-;t|Dj5V)_MB zXY5Ag*Nx?djHiTjo<;}Xi)J$ZExi(gJI%yvq1esMMvrhipsbT=VAyM1}|P1 z-YY+;_Su)=n2T{{NdG-Sf791Jv_2oyr?$gu;s_6;1z*o(i6vMwKaM9}%i!pkrlnn} z{y-ahE;9TsCzUf`eE3Exc0EIO6PtNYZKo@^$)5QaDbH%53u7K@e*2bVv82!}zsHL0 zR0YeZh4|7#3SJ{Rr91hv%keX_Y469!)B?fc;@!JFIX=!d)?&*un+%5djM z6_VD0u|VTHnaeYqKN97JrI%R{B>INM1QG^t>1P9E+uuG#43j@Am+Os>gZDl8LU9&P zS0#!_Ob&x#5$^-G*7vpRgOcZJ)Zj200-s$@lLJA_9qgcB@M{Nn>%j zID?+RqNV$Xaa_B^-dGV?(OL-UYm3$nYxGB($r>xlj32Fs@Nomv+eXr{1n~s|n1;tY zt$j!FF8_nUjlpXgzTb-N(EJ%jKp=m7F||@~q1|rOmPOPKGp>I$g?rcHtYKh?#B>j) zKTL%i?D3ZLv4eY);#(iroZRIcYyH5f5ba}~+pEiDt4!Q{&Ne7S1E5i>)VE>=MS9Fn zUuL-)Y~hMpYl2fR86s4y2E((RiD(m(lvGB*{uWVXhnS0y$OLSg=-!tOgIXj!Cp|rq5v8;#) z^*#pZ{y1Y?lrA4jJtPXV6MgQg5;}pePD&=~RBw`oMUT#!3Y$%j=#Ju@D5m1uZ2wtF z;iVgCx1g#vw+`;x%1e1yBocqP;;so#|5o8`nApx0xg=+`ri5;y-0X5Hc3CnoHY6-!SZ|qZDnNoX!V-#(m(tE>M zO27@5+lQ)41RJ^<-Rb7H=fE%zyM_T^xZ{k%h}`zZVcuna82jl9(9fpach7;Ga*w4H z-+XDNl)EaqVvIJ3%sWr4lW|qalkRV@{Eyi_26NQak$};r&y6vsE8KRQl@9V)OgS1h->f*}(S{j*80bGWSb<#%~raX?4^Vs~AnhC6b| zx;um~)jnhUCVT`cIc+(~=HoG-xvASAJ?fRlu-2S+$OYHvHm)km(i}kwHD<`cfV}E8 z_U*M@(Ph3RH|}UfQ2Jo?$C$APA9!a(G!aZRUVwtr5ld2hKKqq}AO4`9b#<6wLTCv^N(i0(qR#33=KA)&&RXj_XYKPB-ZC=YF`n_1`?>E1Fg8l)R=6u)oyBE~ zaAN@7M52OmJ?z@dLIuxe^RtTeLO+*&4uGHVT4*`2z_@>G`|OB%d2T!lP+yn%jqy4u zQlzP;-6j=0cVwRs0^`nCMprOwQTN=2B&w6R18b+Qf@CCFJ&`MP<)>A9x3 z*OljN_?2&HcBFF8xkR*2*j1}1M;?GqD)a`vKRm(`bXsN$Deg|1_A8aNBRC5 z$gXRBod7ig(`l8ziUoUKmgMNN1HjY!f2EN3pLW)d{+}3FdY)IHQ~xosn(Q8*@nEba zBh95u(sHvxtF0;kN+Mw6Uo@T-mHOAAL)1Qy` zw8X2npL+t7VJMu<9f-AC8o>aF8UdFA6jdvKBZ<$9XxWHDRYrK5Lt{E@Nv^%pasqlh z1@Ji3e1~?@tNvFFt4)vZOayH<#&0brbK97fTR=lGn5uxAMi^Sk3{1Qc3`;bt7`X)& zKR`NbTa4q71Jd-F^Nxd0v(;KA%{GT}%8kbi67gP+V~GXp+484O^xfBSBI_m#b|wz1r3-e-)wMxl0^C67zVMa9=c3UEspy?liR z%G>8KN+*qD>~H~yXD+{e{>>{OAD4~?r$5V#u&p@)@m$8h%G8cm?_V3gY$mvo=sPTL zG9>Up5W3WDBxlAQl=LLyvH-caVoOL4{`O&3;ifdKBf{b?um<)bt%1-*|G;VePL&^v z19D!qBCg%Z3oi{wrO`SZARzKrQM=aWkh5Z7U*4+`J=5a{hrx(l>4-vXibhB+%&w~| zHmBr?nO|k3a7(U3k`ZPot0*UbiWX&4=}y{}r7S6cK>ELXdKZ(Q>kH_NFm!O*He6!) zUxKdBjKu8=(=Fka)8+m8Ou0B%Kc&yWqL#1kOy^r4BL}VGD)D@FtvC$GDoflP{9W(d z4_Oi$UJ}A8+wqAcz)Z7x*<3ayQ`K6fqFF2jUmfl57==s3taHF~F-V;kCblUy`J*U@ z3T!`!VWZ^&T~%Vg>)9z12Y4YiU3#U0Jsj;E!Ew#IQG`9Mk)) zE)wzGSf|u*Z22A{k7KLFxdP4VrnMJyxs9C(cvR&G%aH@6XnZM z8egPeh>S0Uh~uA!Ej*=QsJp+4@M?#WJ9ShGjBG>#yJN2!c5-Hv8G`b)QoraT4mQ6gJ!`9A(8B^JPWB$EgnfyFP%PbXM!DEo%`T<3Rdf3Zq5b%jgmZr-fK$Vj zXyQ_dD#d7Pa$mWqV5-OPatkPcR5Ft^&A!^&G_yQ|^_;Bqt&;YemlW5Gn+C;}DF$9> znvabZh^KF4S03?4T#Gvv2~U-gQ}j#eI9T-X`g*}?uzmmbsWnvc|B#h~y=8l7um1FE46UEXUr8eM?( zqAYa4!MWs*b2940T+PvrVba;N#Jb0oudBwoZ}W&Kf(vYtW&K8S3aT0VWJGrZM#$s2 zHBX-yY;etV4B!@edC@ubhj|r0x%DOPSgty4)y&FR_L8=!Fqqe(a1FlFmE5$23D|Xy z<6c@gq4T?o*o5laVi9biv*B8Cm5q-<0uJD;wlINy;%t3A#F+IJ&l8_(<+L-&dmrC# zQ7SQ{>W>mRCP#l*3cilfC$v^wtZG~aDzvRh`b9o1`9qXyYQG?vswXFs7CL!`1Vwj| z>aDyu@(3?n!QxiESG9)sskxKD5X^e6^ft(O*sV@JP*2Zk<_iOtn)&=qs4lwOP9E&g zs5V&(0K;Q3T#exFo{(59uJmCzOIe8->hVKti9gW;oKw|5kOjc9d&AW-HuUDf$1oky z?4GSjae5!@jKZupWNQ7v?>qBnzGBu^&SqoF%<+i_sgfqccWoqlD-4Q|g;qw>K_F6o zlv_~1kyZNLjtQ&SWIt6KSBol*JHweSB-@0~S)D_j!a+!ILUou-o^V7wqGa5~9ZE76 za~4BMY}MJoB6R_Y-cJ%q1OE7uM4-3CzR=Di6rOy^eWXv)=W(}T-st={C$v7-)iZxC z{bGaQw#Kxg=g}sa@eyi0#vO8&K0*cY5>F05HX3L;v0|u*uE*5|`z%pLcVhjH*U6Do zk4BcYqm?%2s-t{2V2d_QMCQz1;X!yiR*=U|afKjP(|Wex;$W-D9m00!tw`$zf0&JL z=Ie>E+tJsP=D6k8sxVpxV}JA`)w5^C4+g2YWh)}+q5yE2wTcYA05jiS{4n|MJ&TZS zuC=sEiKU!feHhnVQ$Vi{UvLxc$B> zPsI)%RrNTpx96r!!RKdhuFRnA79w7a zH7Qwomgb!T^7Gq$hsD&RcSolHQ`jyLPkXv>^vnKocpBT8yT7ge!Z~R4^Zv9k&`Qwm zVde{It)X5MVFC8j^MT&$>b)lb4p!)9hN_OSo)>F#Wc?^Lc_01L3Kg4Rg$PArI|HGb zl2J<;{Db8hgC?UaAeEq3digvg8?Ct-`H|N9!?Sfx=F)zQ0K3Rmi{!2{X>b=^bG&*@ zcxA3Fcgdr-9Owlrnzm{@^8AgB`|@DmMx}bJPNEs<1qc4_db;x4>A^FVPOD+o3FDFi zZ5{=T)S@E5Wjjl|H!d@g{J3=Qg|;s!{S*oMEq5o-QoWzJ*;=@_yy?TlNJQyb_uxuv zb>Wjx2EZ}M^DPYN$bqL+92jiMsWy~B>d>)jZ`NL>-o0X0eBVL`hU1uXT^kb~x*#d! zv5CfV{<5xjP_(DCt$tOIa2s!h`?TVe7q*v-Zd@9!N>rVR7fa@~HfxC1)63mSoAAuc z1wq7B{EQfu!Q~eDv@+<{o#FEkTQ@Sh3!Do%P4k3#x#~8k4sMe37ChGZFhB~fDuY6t zy+S6IcJ(*$&p4wYgYP^Nbk1D*)5^SAO1myw-r4=k=kPd9b~t`M1nUiP{sMFzww>}^ ziVcGc=Y}_vFLq7qwt39ghVci_XXypT3wuy+mCS8afMwKgh{7hUY{CPbKzuG1xqLT( z&_AM?fqt3&Da%L4hZlkIOZ!x84Y>DRIu%cmRd8M98-s3{Kp4C@9u|xzIt!%tM{TmenZ_ZSIwMAyU;+VXS1w zAwj6sQujIf31rshCxMwLgbRl>Y#Ak?*6s@>vD9s#1^DdfOKa7PvLm&cfS>XVrH^;| zz*6$G&g**SmuwHx(!|rYs_f6O<-z;g7LfM&YpQc&`MTc-6WL%;QSf^kGz+dje;Zo4 zX%Jy8w>|kv~;oyu~m7=WC`*HqjL++YuUb;WN^`5_n;!=a zu`zsjy|J4`s`1$@haUmzI6q=d;o=DN5h*N=G7Yg1t3I&%24IX4hqpiQi-624GB2z; za$la028tz?6u+^ry*wXrKw+?olj9mhx1njm`b70zl)ezQ3F_9aT`{~UgPH(Ji&*~Y zpvd+5XS6cuVIT9hN(lB2#L0g4`(eoW$Tol4-C@RV=obO#AUm;Q&ed>Qa_^rG>#rc! z@O^!(lLij9+w2}&X7=8Fx`|GI4|tORzBIYQvb33MQpMZ_t~O>(+-^Vv>F;5(;Z3^7 zhZuo>{o~KJ$bWg%PvBV_)Bo>c=l^n0KZ>EfmrjGPnP@MBw`v!&i4@{$Bhumpvbk2? zOs!X|oEG$@w*aa;BEhr^L93g!{70@SKFgip~;wPdA~4_h}CQB zKn{y<4!yG;xC2uxEMIM?9}z~luJ#O84j(k;7NJcE%oWq~s;(Y6WvFg%zqYwH2frKb zVJ;vfw9iM?)k@k)6R#{J?AtL+z*@4b;kbC4~p$~A6$ z1`s)I25+sYNP#Z8wa(_acF{Px^r~A*hb2K}>{?hE^U5a1Fw5V7@#ul0EZ*y^0)FaT7xL1ha*yZhMq|U}!Dd*sn zJ{Bs(x(U)g_{8r(RfCq^NmjRw2Th}r*C?6VZlH#qRiVXl?25qXYPVj&k_aQNyQ))= zT`T}C<*&PLU=d(BBOw!2z*KQ%{iQ?I{pCBoWED5<(M%MdZujU5auvM}rp zWCGLMAMNvLdzFDrO4Qf$+U_g~ak(JZHOPp=>cXemZpg7pnt&GiL%Iw&cO%O@b+b$f zcc?2ehSJ?y3Nq@(3hx{yK`TZfWdCL?RgL6JLGrX;!Bw`o+Pu z?ML4#ZgfpS3L{!SV8vooFvbx|NZBc#MNWe*N-ArXeIFhC!WwE)_k6ET!Kl$v5R`kcRPGPCDx z>@uj)&x&{c649gcz1o+n(x*&a1r~_Mc-o?=m-8yG!b`z$h~c91>bFA(`JuG~M0mCy zH(F_>Y=wDkQwCY4bs{f{JARIxKb>38#YR#h@4bi!o*}L%j4jABRg|oZCa{|-mg=&e zf}B{=zsx*6jLhPx){3PPfv-`3#4_ub!<4)%3&vtVH)0h841AMuuYYz`|4gl1wx#&_ zkQsMar#f+kF~@y2P&8ORtJycnwbm5ngb{eosSX0Xy;3~hgqRAYH`l9p35^GgXRJAH zPPLJv?9^_r?EwpI>e$gI@Pv)LZPleK+tKCOD&KFOFcbphraDAtRt{B-e;Q@&sJ&Xy z9z=>6%wl=tldXvm99##`NGeb>oZ)>IvA_LwrEqEY zp)fYDm68hZwdtgp?hXw4naSnKdiu9CaHmVoXg4at_<_2IAs`hdzEqj{2$T9nV_$IE z7t=w%yvy`~&XIZV1m6d(7bh-e^z^G-#yr$;t#DIS3FF8x(?myiF|~Z8-HIX4$rb3- z`uROvvR&nIigy982^A}(hE$X4$Xoh;E#NbJ+uFJfJrvHTWlb}o;}g8sFJzq^F%})d z2+Bsf93PUv^<}gs%2MTW;Oz<;gnE$Q_-%E%v+1a8Bl_u;#HR919Hau|%i7k|_9wfz-2-&O!*83#>70&_!~8uzY&ejk}vz3)JR zUzz&NjS}ehh>Be-Xw3b=4N6I9(A3-+$i&S=VA`=|qcByrAitmr6RpFsBm-ecvmp*C=M^m(2R5lW)vepyt7UA3q)jcq>aqsa@4pwn|5)oJQs2wfQVVe+5o)QA% zqDrIF*5RunT2gerj^TZnu9ShAt|VE*DEYeM6{t(sYhdlt>CJA6IVIk3aRc{%WNa@} z%@mI*KU2RvsZTkHil|zcn2n}>ezul}=Js^YfQO(Z!K`9U?{uU|T6U`o%hCS&QEp6P z@D3p)E@A+EV|sH)HqcBu%+lB@fKHC`!>8WO?LBVe&hQJpELY@DeQ}8KMU22IJay2u z{YsKP{TqVSFVHfsUdu}NV7zK!yUNyJj>YQR(T{#Uh!pBrVy=(WTX>n-gf!<~JGY}2 z+ES#IrHHF|aRA%HISI=bdv;b~moxHM6?4Hjs325?t0Xm!zx5@bnEf0>kJ9T)YH{>9 zMf_eFO5;zKpSiMFUrn69#-i`05=0G=Lt3=tT1NCe+4l8BWLAC9@~rndU6S4_${tm1 zd|?BXA1QNdMuJ);o5pd~Y?Uon!CC3(R>uj{m&1swluzsa`1{DjKK@}bRl+RKiRC3e zwoCt-$`?<6kAj^Eq{I(wk}C8$*4@qlYctdBdbT>l5aAN&ijCF?kqY|sB<*>J)mgTr zbASlrwE)*rwnM%i`VN+!T1L7LLMOKbMo6;3MCSA}li!R7-Vf%wH$18}i@^_dPexkr_*oCREP$Q*KnT zocPw@SLb8h2}M_bwnzVn>Gnm!;{gHP5n`QRR6FDoBhc@{Vj2PJf>!NK?($7;o)m|} zcH5h=-glQZE)xJ{Ry;Wk(?xrIE$A*eZ1(D3Yc7y4N=e6gd3vYJhJ*VB_XncY?BB*j zKszy68b(`Z8Zqf}-<9+goV2@V%8u=Jf#PV%BT+_EkGnuY&yMHH{_7XUK5z|qLzyjX zZ5WI81r}Ux%d5s}J!OU&^xSd~ysw1It_^cwT2d^bjIa8cYT7-$o3j79+x~Nj#O8WqcM{I_z^}+g>Ir<*?hZn%Ma50YPX>*(@2B zeQ5Qc5C2+^*xpY@kkangYkknc9i9nXKZ^exA^X!?XFpjGK6H}v21wC!+`!m)rTRG^ z(n&`A<>x(G8le&u0At?P7_%5$vf56&I3Cc>@K^WCVoaw#M%(zjg54QI5BK}5-3oXI zkU&cfde{%58K+b}q!{D;9aqe^Qv>HZl9Qj$2G4GO;~^GKD_)u=E#YTrMA>obh574U zb+ZLuQd|6Ql@AOB4rrBsa1D026ol&0_AJa|Q-lqMv1lmxDH|nUx)SZI>Q@#OSvarO z9z=+o@<##?#?5uVwyN^EyW5hz5WUQg^Q!(wKD&+GZ}Sp=2}ESAmRGTlGU(PsKf33u zyEvPQyHW)O$m4|gcTdOpdSDrOOCBzw$+H9v z&^a;u8H@0%ofbCfQ*C(n&Ba|+wo)&wflgZaC2wAGUauPfdN!jdEhi@*7$PMG22OOA z9TWq^SJR8*USe+$Dk|m%@QeElu9mwEHbO7fw}h~8J`D|ZfZqURd}VhVeRvC~cnR0l zlY&}^JzJU2DXp9UxC*bqX>{K^7)q)Q9pr)D5*g~RQyiz;DvXJ3enM(BXv@Xq+-BD- ztX(o%Jxj-x>IZ+>zs+41$bF`$es37T&9C+=?vGD4A79l{Hb2Qc8g1yrpFJHpSYh5FUjfYL1 z-h?Bq@75O~jsgLGyM_KW$aw&W&I!smR_s1Ed}J7YM!sK^arxbY7_&^6}!pDt@-hm5^+CeuxgoM3)b?ItG?VQ zbY=6rX_1QxQ2o;RH`Azq#iosNn?oRyIaYA6Dj{JDEx`e87f|2WbdXxqn&*t%$}j)? z0=TLp*b8FTpx?G(onNJy5@g{zwJ?`Y^`?or7zb@6R)LLnZ8cFu;|-$fYyqmCCiliH zP%GFR6=7NHV7Gg9lQrL)_C_P`aC^S~6_>>en2dzLaVnGM;c-*dj*7Qm=992gZCr+2 zJJeDn6yXv$Ohm}K$C6T*w10XW^yMgO-2vFPvq=e3Ie^^QfN>pB?2&X_mYt05mH<==pbclo zyV(R4T2?PFa>%#eS;)^9h}k|MiA8}P-S&zCFzEST%|AVC5IKgwpZvXbBll*;&|Ols zs$-b-?Sd*IP+ua_+2+;;T=c-QM)1S%rlQjsQyZj65yR|5Jgk5b`ne4OF0WsPu~`(Q zZ_|mjds#&5arf!|W~Vkz*P3i%4U}kOgn>D0s)Hutm#Xod*>*n8QA@i9{Oq6CYuV9L zxIH}j?GLx`d-{f-T#V9PV8eSfTisr&ACrr=-{>TptA8GaSEswlnB86Q%O0p3H}A^l zQSsQ^3JqJ9FDLX+&R8Zbp*~xJboq9h-s8#T z^*gip-GB31m#61M&jQP4qnYP~xq7Kv3RQsALfOr}Vj<;b`9Y9Vy@~Y3Nc9$k(dZl< zn&*M@dt~BjscxG?aCDaMTN;gA)OZSTpA+eB06}^dRV^!s$=w!0vL`sk)Uzv>8S=kN z^mT1Cw&XYt5I+n4_WUMa3uTMH0zlJjMd>Js>q7!rTDYq<6764Z_8Q_Qe4^sya+1c*YuK&&JPyT$I2O!k) zA6B~Ocr(}Pp{EVPOZD{l>WzIUSQPLE6(AWXh|1r8qvkLB-tI@acv3h?KVAyq$0b|1Op*3Glf`Ak}=8%Xk`ryuX4|pZBsi;AZ_DqSbK013x=sSGXC}QiJaIFEssb zDN16p*zq3!h8+W(tuY-G?Gpo>Gt%U`xEKVT3%JB@C5 zY_onG1^d?cp$%T)#U>28%9dq`||wJ>-9#sbY!J@@tbX`Bx8AEJpF|iYv&^} zvwD>KwH?RdZ`eA+bXzIcGa=|%a$Mtej-Y!pFZ|d096ZZg0dAQv>viejsUdXnU=1?) z;j;sv!L*7b(soJudZn#>o1{}4U?hTlJtm92iE4Jz z@tk=13ZJK58IE;a35H{Y>!DcC`ZCw%_M*K8zuXi;vQ;S3=-96s5#-9+)=2Fh&?#mc zW)Ah?vt!eN#o3gG9eS0^mw~hQ5#ZV(MGD`Qw>Dgh<0#w|49P|+B|qoG8#D_5tsJxv z0l!|(=G0f&4iVOc__Ru~+QdYOqH*#-hCShOT;q{!Eh)?X1UvVA7Lx=32Af*FZjYN^ zUJS9HO@US0hS;TF0N5md;#<(KKr{^4KTg0Xfp+;9nl{0Y8n}f-Qo>%NU{gtH**dr&DY%L+ z&ARdNI`wmA44^N>!dUhBLIV;*Z#V~(`SZ5{|9(v0j*>~Fq6U~{$mPNg6Ggh`rXai}oG{5-jO>=)>LpuL-Y;7;O zD-RKu6VNb@;Iv?APW5YACuZN36BkbQZNGcSvQAL1ehuF>s}z6Dq{L`&5pvNhbn&|3 zx|18T`WyOV^6a(O7F2@IJAUVRX?hp5te!sVv%YS~A0y&!?>?r+@SHvA-|~8f5voXJIPGJLfR6+1}J7?7C~Br5m^8N|ygzPA7DZ$UsT*f4^-DGOV_e z6y3CS=~TEQW@|#4Ou<8?w@TA0wX(u^B6zLz9bdN#F)`I2LrdhJ^2ZOkR0ky0g!r#} ztXqL{ZXd(nIb1HfGO)GriJz)<1{mI>Hs5P zWPY_4R!A-Nsw#y4y8B4r0jS}E?$No*p! z4dW592W_2B=9BMau!JQ>Z_~e-jUii&f!n-GIwlTsW>ft7n8b z#M_?~7N{A7lm}g%59#W(a+L2Wxju4;lvJOC{v^gxpxmg19BC!0e-miw8u(c2EpBEy z18&%jvorz81jCrwyYE_$X-V;>-quZA3qO}|&C+ly#>XoKE{3CCcnj#|dH|4Iz^p=^ zgDFu027mmuL4eM;$&r1XLHx6M22~=p<`x8O#K*(61U;nxSv#l zFQ8K?MGQ>EdQTpOA$}qUYj_l1vFJ^UPfW@rgQm0I2xH4{F!_ z0%XlU%eA`~v~Ukwg~Lx%O>wEiiRUu?@ljEFKv$qUZ@Aa3rt==PjJTNk;zilW>iCGV zLT{JPtoU%yK)5+1UAGf9HYU#d{W#IOrRX+@(piU=SNUqVFmoX1Ei)dVQN#ZOhP)ee zk3_#4e)+m^S8<93aNS&1SD(X4n# zgE|oRxyM3Xj(I7smJzA089{2aD`BQeP=F+xux`ZzK_*bNfWb>;*AN*&^baDOXicd^ zSxJX9z;5XOjx2UE^rUPOK>*am+K=w|pzC(-1^>Zt0{jT@Eq81_w5)so z@g9$>WG8|p>me+SG4^n!cI!F={Wfy_{xf^g?kmL0oN7p$$%qd9<%Y}8i=bZDbfkQ5 z?qU*7{Ox${RJmhS14S+jsk5PB@CQvM^(knvrC`Nsft_p84B|Gq59_l-lrO&-#3rD^Jlb)_%WK!=-(-hB{1EK9j#%IG+MH9@+t3;*@%9x)Hi|)KyvG`2 z^Uq`2^|e3Hzzh>8eA**eMJdlsx)FAW>HI^$lwYHOf)fwlxV7VS?!f1J(<5XKcU-Sj z;9h^{Gx;$!BaQF*P^E8Ii0))xDeN%(ke78QuT96w*Oz|oz;yg0c^i9}aF!L2j|{ir zdltB)JN+pnBbRm5V^?Uy`0`A@oMGS$r#2$y0G@77in5QWN6IwU+B;Sva0mB4?>L3uFX})09dJTI|enz~EPE~zj&2Qa~g6(i8*8KC+>_O!- zF)L2>?kG-Q{ml#f^Sk{Y|0!sPl8E+|;aUz_uKoUfhV@ptnEDD;ox9a%x`}*bJrt_$ zISN%*zn`i6b%<(~%CaM0v-cm{Ngim`wBh0#uUUSzKB1mpv)!RYA=tI6xd)zMox!c= zN$pkPS&Nz24UGKY!+$JKvU|}((p;|L8Kvg@d7fHR_#8@k}xqp+h6WByp_J~ z$({3kKDtV}HFavl0Z(p3z)huAPWweTigwY7cJCB$gDO6o5#L~G^U1OsA8DH(XE}qj zn*6gACTZxnql*`2K97AtR^7Dlw(oY090FQlc^TSXFI`0UbgcP?vTDtF>5y;>Qu9a9 zd>svKp=$iOf=c)DJV)R2mga9#%WKrOB>Dy{5<`U%!`Ur1IS%~WD`o4ooB?l2rn@HG zK3SI+Z-1U^9ZXMTT_d?Aof$iC1$G)bpB7q}&n1OdfU~j=t9gdBfolHD1nmgtgk1g| z#_jZWG-{ip^7|2KBZubmA4)(A-JS={w<;eOyU!PXNm?##j9YbyFl#8jVc3tDzD&jn z9p9wZe0?*!K=9P@8Ok$QeDgwc0PT>uUq?#s>WqlPVa!Kmvh`rXCk;Q!0z8E*e8GsE zef#wA(Tzyw(ltj zmH%Ytu%C!Jn_QyZW(AO_|C{x87XX5Q0(@a@$fPv*^Prn+3HMV!By~a-6N7-NrrGFj5*^c=E8z;m&W_PY?Oyi;&i0Islx*nP@#{ z$4?ljlT%nK8ZWus-4q+}D(qd{pkA1EOgmdYhkt0@6w(F;=c>a zb&PXlBn=#`LD5sq)THS7#lcF|IQp#Zra$A`0G}74vY_5XXGX{$Ps;jZ`E5{Kgs`sR z!p*g`u}+3@-3#l49m&@JU^WCR>SMdkv)!E+yHu~+wxfN;w)>yK^Fkj zD0ZlU_eKEKhcV#leSf=}aJK6xvR2Gv$K>*a@NqiG*g2H+0>B^Io||DBbACLtj_P>Uj*CoX7_c{{aUS^kQW zvF8rg-s;HsBC_W#Zs<$H>=$EJ?bWrz(MNP})z;yNU_BIz0>`e?rvOvwfwX3rbrLf4 zuLyEBxE?;=`{z++kr}b@)#SA_cg1(->E_y#HpTQY9^tg{E~rm3Fut?i&Zp(i=h>R? zsA=8bc~FEkql3}K2HNH01spgaQ#)^g18PG#edN;+&08I%GvY@8oLk! zT5WW;17U6VDh@gV#iY;CXFYOS6azKZ@$vf3-Mni48a~yoclhPq4^l&au{l zsZ{<-kGJaD7@BlE_`6cj6;;FSD!#l288<@h`B_um9bJFpl(*aw5bIT&b!dDwHKyeG(FR=u(ru}#%3u+BK1aoToIM|?syyuxFjDW3RNPIR zR}+#xXvCt`WB(?CO(W82Gwjz9!+s}J+6Pe!lcjc+-rhaqfpVTw;{ zPIa?rN}B;b%4pSf<7z+Q$OVplcfvcEel8h(X=u^=HV?x>&p|avp1=Rfv_3)n8{S^Q zRw`xe2rtESYOJWmw*iqBxc&K@c#De?!y~qT@DttS&7Vsu`JNr%#|_@h{;CCaYqX7D zgY2&8E)0Tk0yUfUYN5!Q@LDuHC#|d?z)=i{jGa zL+RTrF7Sa6zkjC=1O1`OP9N4P#@&<@PDe8_9Yp@+Ki()KU2@P*x_#SAQ4=@r=j4|4 z=R@O%jBaX49VCFbnS(F-3`+281I?JFzO=Gah6Q{7?!G>@;Ba>-L)2f3s_Ij`D0aA8 zZWaafrkDCdBn?w6Y{(+)jU9t9$2bsT3Y(%MHgIwZXkev}bVr(L&68M%ot5IyA0_LdxJ(3Q&ock z7}#f{F%Yni-@_-ga&k)+>0V1(*=v)~lVY#|&t%vikapW{Nd86h3YYS3mwcBA69=pfBDq+I*fvnBla-&u0AQgp|2e8Ty%T)3A~@TQtNI= zdz{h>s&E9zC~7+P{8dWk4b*kjrqdphVV7W#p`$U5mr}q=Ml2J8S9Nn$jHwt`;L9l5-hax>^HsgpTcLzT zaj>HL%qruU0Cb7XfwN95rPjt=Z$By`?otNqm9B^jM7O&rz~0mtnit2Cr71N$9o8E~ z#gsWF#mHGo7B;<3n-^_Kt(ktaWw)ZEqb}Oy%TvqmQ=lrWC8_G+`i~*#bO;mDyS9bL z&d%%LmQHKMdiLn|zG{dNkJs6%C!u$exi+e`UsTCTB6u`7N&--YYnsd1%Vcu?cYUYWcP2>8bVR8n z5uRKMxA@v@*kl~$gzpnOnr-tP;t(IB>L0&4H=6_K)fic5HI>N_=Z~Y^Otx$H^9eqRo;m z)v%3oUjCJ=(`W$wo`r)$$O+7M1RjCuyOv=2rgA9z1ja{?v@z5S=&o!YsxmXRNT}3N zvUG*#>Q+VxDH{t>1B<;&UuR-Go*Q8rG-a=@pAyS&r;n$P^e_2lw@fXbb&Axpz9Cn_ zD7oD$BOV!K;-W$ac0@DWc56LeEe3T~)d%7lBLL_Q{gvE1u=?_NK~Zc}=D|7%^}dzu zAo(dY&w6X6574i}-*l4c^3A_pYVsNtamXv^yLy|I4>b1BHo~m)gbg5AqxI+B5}{}u z(*X$Eb%Exd|7XHefUecQQ(F3y)93#nhxMPmZTw@SjML0bF%f52a{m`$hmP@P*O*&I z;sQCKMqAr0Tx<5qsEUNRfY<~t(+%<88Pl@MovO$T(spE5HgKGI2|rHtRVE4BRCyvGLnG*?C{AA7%YZpAGzWZZWK42H@o z(_5^lF8!V(|+t){4n%8V(T-ZzNp1Z0n6WZt%g^x0yy2NtH z3Sa=pvAY$d*qtkJ=i#+pWtAgL=eK@u?`0;tK-NN=H#s)YPg62Y(815E$BvwmJ2vqQ zr_^~#UC2W&M!DsbFky?L8P~oo{(>`j)zV*MJB3j33z;J2GK3h|2kY)<_dbx5iJq?T$*O!hjpYkq#HyYCs%$Bos zM+Frb`)Nw95WLiFKCvs9N_9`p0a)t+17*@`E+{Ue4UiEV;kltaoiiCQwAqW)i%hTX z{LX=em&Fv^{gw$Fd|R|H<~{9LiAfO9G{#%i{{o}H!Hd?`n_me?5f^ouUON6TJ_sa8 zF5|B2*H)?WNiYJpv~~*P&Ra~3bObiV_r#f6VxalDVb(45G4{yUoz6O301MkH2PIb4 z1oG&h(o$L~E^Z>-8EK6P9d9v^QDo0@g#u0VQ05e2ery`QJHY(?T}5qtY0VC!>EST; zqS$5q3fELGdk5M}SF;W9Mw~W}LB1P}wu&SZcfQ_EhV>WR03e>CG>l~u2AspN`S3BS zhKz*(G|3Ea>7tFaW;;5WuRd?$*bbfTt}k`20xEyC*oYR*@ZrDh$0Zxe~}Hgu>3xy zT!rp-w?y#A)+G;}0B}02iLVz^W@0|RyI5>MccfopDa$)Htl=NP9c_D>=|R|UE{&5_ zHbQ;n0G&W*dE5%0S!I=V>g~)3h2aaZ9tc5{+7#f^)kvbJdT3{ROF$Fo%B?4CuS`5B z)80mE@$Loz6f~i5gnVn{bwMcF>mKijvR4TkLzF%pa0@qEJmq59XmPt~H{SWAYG=KK z^RT(utgG81jS2%6Uo!1}ui5n@Eu8pYUqAwX+F81fsyXgy*p)k+chDwxk1Q{$IobB0 z0YJ;9WolEGT|U!J)eDT454u0ICy5*8?T!G*0~=7QG{iop_n-cH+w3x!;eQ|t#*FsHDUCvPcxrKnY*+9aBWlG zGY?Sh(k-xG>-t`a3xIW~!(WUMt+MAu(y@e!n0LP+Z&hm#CrBw<{ExgUjG^{RF|N z71d*am-pBI{$Dsie#tQYXV0DeUx6DbkFBA*f1eExDoug-_fc5wEf41dze&}Z7PNt` z$3GnJ-7}Gr{P4Fz(U2%``3GPxUf3!9{k$2#LEYMcN&5ocEz@4$psY0j>ft}107x{3 zCjdDV3KDqt(L(~9Y&#Sc^*jJ2(CL$a^1S0tVng8|K>Y*2Q%!!LLEvlv9nlSd+V0g( z25Lw&L2R|3TMQV^SwI-_*NbjzyB-IMKTLo+D|@(z-ItZ zfxjLa(_C-fa1BH2aZb2`F_RmdYeTAJp^;J%00wFi9ZrqE{pn-UZRwOMq0-gGt>xh0 zTuA)nN%ZDpDWEd9`>$~eT`Yn)>f0o3W3nl49l356Afkw$UusdP=`9;wj$HHYBfNxr z3n2?pQQ|huB8Zcx08!5Ozb7Gzt5>`jsOI|QrVypFaQ@$`>Ia2{e1?6717)wWxQlmQ zFc^#Pl2$c{Wej-wGz@P^vM+twauyOotj=)JVP)}br;hsy?>d}C=~yMi|=@n%hQT#F?#dgHtR<}wQ$M_0t$ObCa(NryIJfOfj;}|x z3C??jB26DgbqBWblMv;1j4a<1rWQDjsNBKQ@tU~qRq5@gv|UWO!hfv`J;&SmTq<}PPjW9vtPJ;kJzpZ+Y$1Zt6p10lxXKn)m9DRdro3ne&K62@{z}?)iD?&Un z3I}~#JLFv>tfv;?K}-C1ItLl*IHx^KuPp!e6HSwvPs7FDIwnHd!A2k(vnMVurfL$` z&sLkXoY~A?FR+K*4@&fEi#&o6XC+w)K*yxLAiG<}a|Ex*MWKwUUUoOh8P-Z4G+4Bq z?Lk~fTwIt;>Os*k96{oC0?@UMyQ$L6yO<1k|F#UDCzOMIq9*v`rUs7r$2R&5XB}@V zrus_KFGFmQ*-<@85CmheYpd*q0P@A1jf;^!I^BD$2oe#W0oLUgCe#DxZ6xv>KhkTyc@te{9Ae0|IhV7{_oA2t!x)Fwy&6ze5&Tswv8+h z`BeZ554oTLvj##qstj~@Ur0`(CVU(?f5ILYq?nbZBY?kk$*A+tE+R7UfX{G=BfL|I%@s z8jf6D&*9fK4&E-X|7^V;Vc2QrMt;HNNxPVKjg={V|Fy-&r^1|#+DF<@2juWBWF7sw z=d1p!hnPf9INSENQ?B;be^Zpn5GHS82hR{yBZm;tmQ98}1?@!1=+AZvj?Lt>!JgNC zYM^2yKDfVg%HFj(rYNv1%c3e=t<7P zecrwIx8L`E_ndRj&zm1g=2~;kF`rT97-NpC)mWr(=qXrwx-`}vfjX!Iho+hkWKuky zyId&@8x}AnEM=$qHrl^n$6Q1-6TmD<2$NauUAsg+zjrWSr=&X6$-dz@@8^jRTC|~DS)lhDQI9BOXT&if8vbWowWGo zZ$viuuuhN6Kv-LltX;gRF((i8B*29h=14c(+NW$dd^K+-vjPDekv)936h{UIy^o|% zW2Qha#O8*5uV^hE)abp3fFWb--`Ge5-$u3psz8{+iD5-T}u{aeb`$n5%Kn6ypUa(rC-}v64lQSTTnJ+tG;3pF$3# zwYdKGFGck%J;b7^EeX4otH$-}lH}b@Cs)V1+9`#SQSmtUlQ()MM2=`1@nZaB&B2$4 z$*K606JLx}LLs9>?PrEGUgKt8c=qZV<9l_H-bB3i@xnDn>kLxAP*6b`cX!N(QOhA9gVWkMI(5mgw^zlr|BCes9 zlscG@<&1fmW1c;>5puhTJzf7ajp4(pb*N#p;rdPOyEvQ!HdC)@kn%aqF}gaxCtS7c zWQ-?0x*4Oho5K3l(Ny<^x`|OPi?{a<=jIK;@`)Alf_}Vl1@OD1?iwZJsH8q2$T_r- zPi#^WHzTzv6c^)|RK(sZ0EZrYG~AuK%w5!P{cYSHcmYbdDD47bX~bmGL0xj0;nP)9 zpQlux4a{;^Fnu83@5wm90M)*fB0`f5eC(x&y$`?1=~F!4%L(bKs~E1phrc(FiFH!S0HBQ?69_a=vueVwA2FcdBW;RrTyC9e=(3caca2toBAm zsNM=wng)V%@{&6}^zg@CU0m$A5qzt;h@e~ltkc@&A!Bh8Zo$F+A>(jAu7v+d^B#pj z1#T9;H*qs>>xd3ZGK#Hn%qR5HsX5D&yLYM&kn2eteE``IW=>4S;PhaN1n}u(1DO2HI=^n0~Y;K9p_i%zsdk#*Jx!@la7D zIm~^45RD9L5=xAC0!q^ES3m?`oq<6kZ&EhT#;WJOT-}0@-Lr{5O-=GrxuuBekr6uc zJ>ifjP>7t!F=A1`AFYl1D&#Yfm-tT7P|gTmUE4C=+!sZQXX4}Tu1=ONR;;B;+_r;N zIUZr1X9kQiI9q%2lQdL>)*}0#A0%}se>~8U=+H~H*C9zMVD0n&*hQaSWZgYV!@ssA zDAA0nF{uJxRxW^EyQqE;bJG!4QrB!!h9Y#_wBgUa3Mt8jZ+}Uz7E^I9DkDTPAdIcvQPu@8$PV{d>Uj9$1|hKQgm+1^W!f{&^h0M( z;ECkMQz`RQ3U$i@rXgv~gA(0HZmc%ADsa>Z|DBYiR0H=^M@k`&u!EDeE>-~N2Ht7f zRct)@t(2C=K4&Sk=(sZ}tF!8f@Ia4^ppvDBq;Y7PY27{^$=|d6kbezcrFCC6&qv^A zP&Ag@rtNu*y;4KvENRCk^&xA`deV}a$1?FJKUN(g!4iAM=SG3f$rIwbo8)@P+Y!jY zBG0zF^TjNaT?4CYaIW-}ezoq-Ll8^G#!sVBv)ErV0hq&MW+fj9W1z0kkMvL_ytxYy%X%r3N9z<#Z=s8|47k+s#b9o ztSYf5_s!8>i&HnO?5y(IkmYC4f8^j~!m2VjjNc8onIgZ}CDp_&L39i8r_pEriL>>3 z8NSjiBsF$=T61YqcbB?YusdHG(S4YuLpHg)?_Ngp>~&zFT@cF{K7j!i$X0LS+i@%y zX`0=+cw||zcM8U4ZLh3gzfg&K;#_m=y_KSKX_*Rhaw?D!6Pdb)-F$mOD9eDlFB#XY zjZ>K`dLy$ek;+RQrRi#Ard|X4*fQfYX`E{3#&EO!T*g6)IW1ZExL_gdY(ulH*-Hix z=Y37Cl2eb`{A%}>GH@EkQRgd50;RMd?`ob@34V_yYBQ;NEDhSkWsy`7KAy39r$Y#p zG&a4}Y8!9*hyxBiE;?Dc6`T}guUXi`!cVeeug>Lmuvf41YUE50T_auAxp~jQi_0BY5X#Ypwwt5-;I99=f_s6CqQP|%c*qs_CNqs@T zFE3F`Hs2bXW*J1KjQt;F330p1P%6}Rj=)_~4^?ui%FdK{OC)#Ws(|x-Fi1Nka3otJN2Jy%=+rMW&?eY%_w?yV{%+u=Loc>Da41`ne00`f zi1MK`!r|oQ>{@g?xPj6n)n<0WFTq)xzzEq}wo-nv_oeXiT2l0yX*#<#(`JSL7;v+i5;490cFMK=GwV&E(A8Z94fjv-SFGZ zsbb;Zdu^|dG?6-;IT>GatL(%s?4JlX(9NcVEfQ@`EK=fsa7K$)>S4@R3tNh={sb)C z>a4QO0e*CNKB}2PZaYeUF9D>}E zU2yXd&&0s=<@}xozr6mVV|z>}G#{`Av>Wi$9VK`b1ZlRgdJBhZzIil-0%b-Y;8~b$A^Qyq zDG2{b==UV3%8dTf)c2+%DimBw%++#?txmioZ7-=lXz-QxR_ltxtTxy4 zJSX99$D_@r&68HR`*AXK>6m1zl%oL7;NTuS@dAK^!H7$hRlD8n8FJdNU)axifEYjuaN430E(j_tMl@Q(Z3PGW^^7;ia{9T`-7!{ zSg`QbU$X_h6hvJw!%r5t-F~FMO%CUGS|uT#(8|i{#3mW;jxKilH`@4HSkxP*Qp?JQ zO#hQEN+4no%=i|W>@2y!XP5-FF)AfB?mb{}fEDb%4k4}oH&VP2Ygh$mc*e>nnqA@9 zWR(%E!A@KYZcE-D6DV%Nc2%EL8*1I=3Ob}~Ha_wc6jPFeBU|jWl z0!Kp*k*t!|KwAg_Du)I_9zi>!lQ=0UrpqUrMR8-a(Nu0Qch zUoMlxtJ39tdkv5A_QsmxMohthOB5@2%QJ;gO|a9|jErtzeHM4kQPZK;=DH!x9yU7Z zy`eGx#@IGn7*0_bwK+`SC_Ae_FVLR+=rqESJ(9q!7Qh9YrFkJS0Gastl8U>G1$D3_ zD7WWzE)x8ZMjo_`EY*R(5n>Db?X$~YuK!IoGeq}k+x&*QXtT8cvsKdo_{{1^G!89A z0Okn^2|N=183;VVb)XSi(JbcV!Q`~W;fYZ3XumSzyWa>UY|*Wvmkw#YJOX!IU#$kr z3RI_wyDnDA_5F+#<0jkiDRUk9IRgus{Wp;*?$mW^vxCJoXLSY-JwAgF80!|MHx!kk zDlGfH0c}7^&FzvcOxGLGmYkdRS_6xl*>{6l7aptpjgv&+(ra5lzC=I38%5uTTBA$~skTk_$5YD)0X?}F^hFt4E~X>(Z0!+%#V z4cZKr%f_2(6E_uA0Sf=7llke(h2>h8uQN(MO3s$p3w10U(Y^fNOi4_{O!1#rbK!Hx z>m*8dl$f2uJzkN%*uN|U5f6~;`%lxe5=E%~=av02jgE}4fWX35Cqqe;Wr4;NjvD1m|}yk{zlqagFT9^NUISi@d=g;2(;jMNZ)D1mjX~ zlccdHp_H%xE{5tvcaR#0OpVmB1ua6MwMKrYm1r4Pj;OQmNE_HX5WE7cgxVfw*`9Zq@-(Ri>kvz+AHk%H{ zS*GA1-VRo9@Q%ioR^3Fbvoce)Ea@AaQyt*l(K*~+1STpI7OH$F<8jVJUGZbeo3xA0 zF!o%k#j4Vt)|s*kVBmfS7;>f2Drv58EE|gV@F^+(T3z>F^zIMtWmRf}LkHg7|6?pO z^b{|nOpn0GlfUc79|Fp&EH--}&~R z6#NflfA#zQ0n5K*@}YZLN$f&cr)zw~pPSvK7eG?|Z^~|A2x*UI6lSE{;{PMv`%i6C zT~p@e;(|}U{gsmc4^s}EZEywuKVAIuc;K8z|10#I8y`E^;J-dpRS1@`@22Q~egE_S z$S%-3HymRPKBV+py&Dma@;Y!3P4wa(3{)r0nh;H-v9o}=1GEs;cA%Coq(UVxNVg%< zEzVnh+{a{+xWkTrC!$ghi~PN-#yn7s-E)r9H8mxlG`d1m+uK5i|7d;1Xj+M$U{qc53@_| zvpv3Huc)F>2LCWtFh|@j+Wip2p#T6DmMR6uKZOvMa?^Ch#L_1MS4|1Sb^fP2;BEW1WiJnWm7G!1e}8!}K0f~7 z;2#=0nucU{G#MxH?Ht7$(1Kxl~M3ki# z}Zx(PF+@2!@%n@F8>Z5~wj1ami^?RLd| zA)#)1Jn6NmntQ04+dqa)TUpuAGCmydb7I}ImkL;Nhj=YLH+6QNMQ(2P^_8MiQ}fi* z<3}QTmU@$$Z)I89y)>AvX~sDs91`KZ(g?2zPkVIF(rX?yK;RSX0X7|CT(;SFklMdrK%Sn?cx3)#{^1BV{j{N?qNt<#D61}%%wFMcvW(MA zK#x?zeyTQeTXQ=Y#7My}GN$4uO5HGWvPZ@xShY9pCO&Y*4hZ1@7E zZB7B5NC%38r{hFM#kHShWk~rQd1Swyb+LK;3gP*J{!1FF)bDhe7?K1% z-j=xK{KwX7!;gj-pXuEd4yrO+su0dH4{41F+lMvCwP_-d(@Z$YLCsv!8NO7Hg`%3; za{JEkJ#0t8r#4Yy*S2X<(Y6LS@m!Ycw%clOFv_b{Gr z%oF8zbo!bj3(6B48DCp~rkkFeeT{2!yLdNGOuaho{YZA6I`;~L?Bu$<1nq(nskv0qOhP6ctVt;B1P2HN7*C%o;f4vY+OWj$0?c3Tf~=`;P3tdbP}? z&i(idL*2K(pC&pTu)0r!t^ywJ@O40oeCsKbCcCn}6pio748wmf!gs@8cw`YvCi-^BN2pEIiuE&A0E)^JZmQ zef&mmNAleG4YIBI-Bg1vn|)A5mvBqT#T*5G*-TDBlEVbFD$<|YuK`v_9#Q~eu9OxW zB~1uSuboqlN~JRlbXR8|WY=|ma-i9n=w0MZoWLa29wMip?~|yg=nIPtjt}E_!JfB2 z`Of7xq8Ie;dv1xAH+5~ijf5Le@`BtmT3vvAU+zPxCWzT9#d^|YXcCJFTG-C9h=-RB z7OTXy)7=s-i}m`jDkGBMq0-xckCPYUkF23b7chmx6{n>6#p@cCL;;chsc||!Qm-a) z4O2vZ2v|zS{#C{XnQOH8th` zG+<)vsI&c)_K@*t|8pMrl$Ly*us=}#)6wy+&4jv_7(8gFqUGv!`gb1LHci%@WrW`S zA&O__B=7;V-OCR9H^87`3Wcm2{02}Y1!z=JvYaOEmB+CU@&cQQKE?EmEfW=gq|`jG zOhvMJ=n}Z2=ogyvY3m*o6@`0sYa4KV*oUXNMG3rsi>Q`Bs=Wy&bBNDu=x$^zDVH&sq?aH zO?{uTOE7T>ax1m1q>MzQRIQFTf+&TMAknN90LoPvZFyFWRKvHlw%%*H>9PnU@tJJT z5NumLB`+L@QnPGi7UjhCHm3H>T_GbAEGTKp=7Aifo&#AaKV*gNUO@tdw;b)US z)SBmcE*K;cM&?{P*pcqy^CjNHY=w#i!$%1DmIONdUR&91;Dm&g)@Gj6*Ir(FQ@$I8 z^%{IxphiXvrh)h|uPp5HmN((u(yOiX{0BS<-Z@XVz zq~^w^(Jenl`!!Tm9507uwX0R8uP(2ziG) zma5dOjf>es#y!_)M_l-W01wLv zF=gM0(y_T+B#LDcRo>z5dITlrYVTn%ETFl=RgolY*zn-oy%?RGZEmiz8TVr)ERHM{ za0`NuH}LS2Y1Za(&jqt~)Z2tBS3%HC39mVKFH<9h!_I2--PCD}RP%OQ4kvYUt+>nF z&~eaPOrMxB0YwskqxL=J-cPOnp6A;SA9Oo73#*P|ZddEDm;YvYNiQSf^J`ir`vcqe z?}YK&tkk1nBYdejSKUBubep`F-+)GWT5!b_7`BhMj0NYvPEGf-EEY<`-!)*Zxuo5N*{yYK(LL)KD<#^#f;VDaWW!l?U+8|XR0)it z>Rs*ys@;fqWOB>7{t%-3z_o9cMP|UhI&V&mUSx2Pxz9gp;6$|uE!1v_8<0jLQKVI# zBXnGeE5rKy$a%)n-2G^+#=%by*Ux3Cq7fI#>X#OHxX=g}_s2}AHxuSr(I)n1z3EW` zsjJOLZ9hJ@abm83uxa(*0}jqsKp1tZYUlp}2l-|3Nrj zCil?aYiSCZhA-X3qis%f#>N9SRju!#59J{J7%o)EW=*TUzb-Wxu)Ki$>6luw zk!Liimi~NAV|oXX7ge1i?)nL*+CM(if877IP~xoBZeqIW()e74*F&e z&}v={*q$#f?NY~;1^^u#2ji77+s-;vPd)PK{}p5{K;47R=NB8F@SL|?+o51Jib}V& z>-22T7IUiWzb?GxFx7mR6|g${P5t`1gZTDN6OJ*UIK=-GCQIFO%WV=P zDIB;xr?9ntw7s#h)oo97Pv-wh==gsv2L0PWobTK^b1niLIA_AdAF&k?(FfZ9*T3@b z?NaldcM?@9x=z&fI)y~~GH-9zxwju7l*`0gA_|n?0dWpht3Y%%@XJ=B7lSPV3)#9? ziL7M$E`NBLxD-+wX#WnLJ zg&{qlCiL_2Gg{bC;l&qxOqdHAPgM65Cx9nY5#5ncl~ptJAktu2fD&=Mv13p&A_khn zxQ4Uy=zm=r*?b1}wI2aOw~ewR4W__C86BJ=xpI*fth6^-*p2?E#HePoATLc6w(w>j zLhW&7*hc0pJ*$E<$fL63p3dEKvb3HQI3rHfM%sByg^@tDx=zf}k~RAC@0u-fXdp_I zf}5~-6a-lptJ+hf7OkslA5VMD#^Gc61({3g>}~Apt+`dth!YAgwfV;nxqMIZYs1wcW9?ta9n`Hobv;az$70*YrX8&KjFM-O18S z8yASoD#aKV+H_g!uJL9S_gu<*Wtq~4lCi{E?M`n6jtS6qd#fZA(AbUW3T|<*9JZ+l zhMCkBFbR5l#HZ+lzwKhrfh|EFK$UbHCKglK8q>+F6?Yk_bm3=5!UH-{T3EY;a}Wz| zG>~#Szlie(K-TC~b-S-D-@eUPHWe0!WLe!`LG#IpJc8B^R8mF4riZKwWehz=y3^O$ zbY~?YJ#BAJAOS)~j*@;opC^=XFpW4fZ;yH7QT7a9*_ijNn8K6SnLi5IH~4In9_}-L zA%(DBSW*8b7C+Rd-#OoO&s7%!{>9$l4^4ttEY`W{ICmeD&BCvluz!*0g=U8UYf^GD zxQyBiIrDg?(Qt^dMKvq&u`15Nw>#Ml$ujTNd}_?S9eXq9f6_Jl(H`k%5E7BEwM5$r zO+1qFbH6)m+mTb+t(w}pQ`lDDsx3qH<|U^`AC=c{(GLpmZG1|jQRovxDH8JI7D(nD zpX=rt=lVQw%#q3%h;Y%r?JZsrgW6qLwPf*&Vh*t?E~-kED8|1{RjCwrffF9F!w zgA?ppuNOFArRPwMEM_oCSns4LVM1P)$=VP6FtMwk$+2eBR_6jbB|kN#+s}M(KdIl! z$9GUCxN@~nXSuG$zjXdh`|~oC&<^}y`C5J&tzxYRen45N={VasN3$;F?du{9dFKf$ z3I5yRqNv1+swWD`m8Lhek;-v7e-cY2l5iils2w1Zpj4Z=6HnaS1q;$7&3OG)EHiT^ z@YInXj8YVN9-j0xQTIre-r?+K>htf#-H--s^S^mn1lNJ05X3An5Sj!UUV>nf=1><6Wnin)bM7 zTkZsz!h!=11$G$7nLDJ3>Q0zuf+v!`Fu(nUNRRw9()@wxjlDg2nggZkp>~gr<`WAONwL@%oLYV60DIQSS zA2Vw*wcW|MCN&(BV5b%_lhRF67)yd1k_*Yze8*^%%aN@stb9Zf`dTK^v+PM)cn@@Z zI5=)xzalb&Oqfo~iWj^YxqEL$%EL77o66mDg)ZSc)vGSjY(eC^#~ z!BLfIn7(_N;==j*TwCmFhsVBHz&KYr6$0Xl(cQ3au(7L8!l!WTg+~IBb;CM6Hps6z zA;}~nvb{MW9gpeUB9N->ev&dfS`64PQsNWPC>8i{g#8DkiY9`c59HndUf95vsSpA- zlV@Lbv%R2htGs5Z6wmVWzm!zynsQ``ikvKVeLFZaS4^e!4_f@St0T7;GC;=7b}+&?V5`mna;d2)dU--b078bm#VcToTQE`g9#=t${(?dS$TTr4szYD3)W?asLVjelGVxI1oO3 z9*FI2wbvYCY~BFIqe$j^%`yH4WH3nLk{jJ;o=Z+9d{LH!_hN5rM(>Wd5fg65gRbTh zWtg3s&XYbX?>q;&)NduM8?T4gKYd6<5PnA%zSEmtUU1fdpH9v)jBKpF%rAJS5;j>0 znA2R~-4CuknP=KjnXi zpE}5}*5K_vL+lZjcR8A0L5$2vkSJ?3|< zMx9=F-I%`N{Ki9*jRr97Nh#eHY7_GN!>O;}@>q%|A-97HuGx)5!tiU`FHK)Z->$k1 zV|O*O2`MV%@tE(_Bf?WqEZi?~O>poN-`i6T=cU8oMlsJ&&y1>bgtkNtE;RG@sFabh@{TudIHw~+3*d%Ta=CE7GKf^$+ zJy*hF{E}=7diFctS{4e6PSM{PLPUE-95WN~KlL@2xwIzz(03pNU_|FGLr=H}UKSZ_ z9unGQ8o1=JY#QvLISAJ1x#4WGC6>QbbXyxd<*xNAgv& z2|gvJk`%DokEdMjFORV%)d_N)^^Ck z(K-&Z`vS5}JvXZ2o-IgASjhAurCd?jrNZAh$S!+JEjRJL zk6mzkv8d=&*4T}sTzzV)=}T>-JK@xjD@9Y6wOdH4*yJL0vsrCKdVNPO4VA5+TKt#* z$Q;K=*v$K=?xv*_NVH8j#97i(rT`l3&}X&07cj(_6~0f6JeND&o7$m*9uFNFH+irc zZA=N~)A9(n90{VHO!?E1aW>t|lz@enw@Ud%c?93i&n=H1{aK-?2jm8%)Tyl8=vNGDfmo;A4{Due^#Zz-P9mGcQPPcswB{uz%g5A4~$vkGEbbw zG*g1s=iYrrCSCtZo!rdPeY^W=d!xaF_QY8TOGz!qv@d0AbDPn z>PNr);1;bCkpwSr{?oE1Qn!GI6e#M~quo4$%DgR9f(f*2S%UndQUmm6%)}b=xjNnZ z6Kf%G+6sEXp#8~2J8}DYTagg~d{ut`VC)^Gc$EPPadE5Ej|N4H(7G{7G4LZ#ASbVS)(3sSyp$`4JB)MThM(Y`{5+*R zfz~3fm$ipw&L;C)b>Dhuj)KoU2W^$@GL-;5*)s&Pd&Y>=i&&PU=F~Z zaap&Ohrz;V(VWbXqi(aM@Z|5NX4o&PW~tv*DW)xD$sp)tJIbm{&US(JZ)hH(SE^pe z7x?zFt$2|j{Xp+u{6alP{UDz469XZdc<-WOIsOORqhA)_cJ9I1mry$d=a8vK&*(8X zXU`3XldLO+*La69gMqxU7Am3b^{R-#_fKhHpq9zm)zf>gZe)qx0!dY&duJHud|Y%G z-%!DvbdiZ01DX|6@xk=t?1B`^~M5p>cw-+V;|mXFOqH`@>hJEP393?(EJn63OgSC z_Lro25{T$3U}aI5C|k^EPKX;e4D@C8H8pgCp0rxQ_!sALn6uT=%i2PWd^Fp zy2Lr~)&~0+U>)PYI!;3t@GQf{t17i;4STsK?+#Qk>5watLNi~Sr#&lzGD<403&6M? zDS3OD?KsIuM5r~0e@DHWoJ`uU9lqiA{RZsWYrrKFiFKpWGk}5MAy(cydL8vKlQ~ob zF0-~j+_H43T3-3B90iVQhm#GV^b-lhWVm1PzMTvb`pSGmj#@PV=5?O*=gj(U*C*GZ5>#pIX<}33N2lju^ z_O=s6iJhilf`QELsH$b$(7jhv!yK(&$V4y1_B%Rd8&>+DFI{S@?ODOCqFWf~&=2%2 z$-9+GWx<&Zae(p%j-9!6lnk%38Fj304%M_@7$2574uF%y1IKz zhK=e}brp-8-fKe`m-wEZ{PaoSDd^}S3jgpDNOr8sCiik!JOlaDV|z$H{QiGEd65GA-u{2#uX{iq$+Y8-TZ!b8rTegP$gtPu; zAa_GV)S_FGK=piV`RgK=ncR7Dl8A`?U2+8IIkkrNIn=5Wa= z2iiW={dLcaugn-=sC@GUmMoIV%fpl~(1-0`T?_A^I+wqC{`PRYsw`k5N^JAUK$!qW z$Wi`&J`#`?A|ld_n6h+#R{!EYjY)N!>=Qojf9o8KoyAYW5zsdS`h$$C}($F-MW)ClI6$b|g74&AwT7r})ME(JALVF)` z;ac=Lj32^deyx^A=GNmJp2M1}zE?x%p}4c76Ki@OVMFyxV^HC}oPZJx_sTVtJ3jTQW$n&La+)tj|M0SL5d=h!+aTkk zU(|jmGS*w>`B-73Jz7Z$fQ$ZNeR1uv7b~~%$~3_l&Ww}O8{W_w6X17lmiMi6SXysz zS@B={;$>odyw^!sDdMaAJ-ng0^ti$(eZv1^RX;RFWXv+aMl5>67b}crIWsVOMG~1p z(k4`FLq)wVZqam2DaFB%tK#AN2dnon9JvnogHCdFRGwH7XJdM!=w2Pvrn%W?C7XZl zI6B>(wSI}#*%zbms^a~@*rq!iv|N7JngZskZ9Wj`AKt5 zyj2^-*>`^=zytwGg+*D0M(>-D;fdXPG#Po!GGU zzDel-H+DNM+CYI0TH_8Nd(cf%3K8mX`$X;qL!S@o*Ktovs~zKLD7xu9V%(_OO~nt& zm6G}xeXtB72nA!e=^jY*@``zX0852P<+_wI{6!d(Zw+4YL?O!|uu_-sLhLveSEB>p zSzuLrkLf<%MLi3sPs(TrQ}Tg<(0a?$C#!yHaoFcgDk0=_hv&sH-zoP#%_mKoy1}KM zqjwBl?^BdKo{YokJ_q&opC+A};?yrUHWsk~O%hGD!^d;l2m*Kef`V{zk$CzAfj;IA zl!i_$N6x_kyT~d+1Y6yc5JJf-?+Pnb-cWYCe-y2f)Kem_1izy69`SP~JMqJp6e9(k z1kd4`{tR%L1k6nAVvg*fZQ1!rWUs))~Mrl@83(f|2*M%x(?IT9vw_V zHy#)4tb=gV{oufGdek)#OtK1FS4Q7jo9575`sDER>YF~YYe}S}hh?0i@q(fWxx`kI zCXXs|Vou{huu>Vssk8PHmf$+hWK&AAHSK%?Zm=5JS+$rmy?fM=z-%h*+Ur4ZTU>fo zGE?yi0@@dee%F6$)ZHIzJ}cl@Jw3Vqh+--mFH*YJ_o-Hk!>8|Ir{2Lw{<&wFZbfc9 z4Q|Eg>6U~(F9tuGMS^=^`fay6$SibSh=<7YPlWd!O;RI7A>a6*A zcBYj2SwE^y^0*e)m4isGc!m}n>z%SUWGj3C-(~J|; zK~KAxWow!XuRpC~F{P;}3J0Cr*ze&U1~=_GzkM_&qLg`7tr8f_NU7+P@(l;Pzf$O` z;eL}#vDa9`cStj-g5BN+hf+US^j4&064uwIwFAWwfx^f+4fBlI#wa|Wa`>oXlUh$p z7oFOeeLb49@5W)FO8OPw$;tjA&T;Ll({{tWmAb~iUA}VcZxL@ZYJJLU z!xfqw^1wH3$Y0?n{B@Eb@FbGgUv-dj&-vM>$D1}ELOt{~pA;*l? zGalirmcz+K(UYHtpA1HMw5$MayvaUl)z;$o6{76fW>27m)&DZ(eUc3e&X~)fYyMnd z)N9w2BiY{=8QF~)EbF;9x{!wq9HX+oFF@m3p%TZ8`7vwkgvCUW4%wRf9dXE0V;=M+ z?!=yiB?N1Lg4VW&gztqd2Wu8`2^y-D2i(MnA@60Blwj&=qxbRZz`&2-(p;$%^Wsnj z(}n{q@MxSvY}H#vxMB!9xy0ejTs6?&T z{Zy@rO^Di0(~uc*i>++kuPG{DADzl~x|;cfkBW~a=5ag`61VlUph2D(f0pdVNdbso$$lUFOmFZV99lBk&>#jVX6 zC=cCwaU1OtOL9V*uQ2MHCWK1v37Gi)RQmPwuzIw^$HULg6pO}M8p-nj`V(2BJybHxWcD#??n&ah1|*vFC_yZrmtt;IFG#q zailFepHevY(E@r$_<|$Zc5Z9N#4KjdrMZaeeuRyZk}z;K_~CQ7i@_XTS*YAxAn00^ zF`O6E$Uo;tm%_?9kAHb0Skvs@Gg`Zq6dRmLXX zG4713P76)khlSm$6b)C<3Xp9v#*{~ogRFKFgLYz@(jC5>rYf1V#%VeKBI?+z7mgGAdbJ<)3d_IvL4plm2mk4!(Y?%;LPCJ688ihsO3?c2RsYG&nr-c zxUZus(ZUnQf{CRtPm?NQtNC(eYXLDUd}-4^^3x`D&200!FIX_4@-|otx6iHamyp+sL$I#FyL146eZz}PWT*^)3TiX3l z{s~F-w1NeXF%N+Vb8+w zhTgt8DAKdHekKz6vj+hy>t7%^b<5kp;e0s9m#nwW>3pWs_a9fd1riz8F?lT}?HIlp8CkvEsU^RSQHG za$ddZ(6zZHK> zxtHFzv(#^8Gy8i9DI?yK*4OB3T-&tPQylJ)w}0!sC3+`iVj3I!I-K|KD}BF42Z(~k z(}$?yBY?jXHVkX^?oHU1JmtY8t|dO!rk zdw;UUgW|OW_Eg z`&D$T(s0yrApklE)Syr@oZl%;#Vkx?{2gTW`Z+w%b^0a_mNLI1g-R4((E7JAKdJdOE#;Whejw(@fEnhL+?ZQ7{OLc2 z=qj@Ws!abe(W1^gP|^Dr7IC)#a(3BNzFPegv4S|>Ilh15>V95^`p@NR#oh4e{0H7N z?}ayF|1r%ccF4rTf6!y4cT%bH55hTQ*wLWBVgGBj_kh*n%W<5nQE@Z(|HjN;3;2(C z#<8NCY<}(rOCd#f#D2Di)e#G;rJNvwyM;IH`a5(ykxP!<@UsP$l_Dr|iF{NNizpCQ z%STTN5j%u^(-h``ED5Zr`TC_!5+$mPt;!bgw;u3-fr+D$= z?p7RvOQ5&}f=eI-cL+{!COpqO@6(^mA2Vysn(zCQn|r}I_t|@&y|3#!`&fR+8k13P z;v?#}jHl09wfgxs=9f_$f;czxI zB+QXT@h*s&>TiFK_{T&DC@M}P9<2=XtHPqpbObeNh(YKAn%8uqpJ8K_8&-<#kL4$E;(?btSoPBN%MDx#@`a4aW zza4^JOP{A6$(@oR?NSMo@z3W{HEBrq44*cZyTOza%B@;M+niy$Sq|7Ha!J|aWQ0Tn zAC&3LbLz3fvDNppS+pO_YH)f^Q7LA~y2I3~iq(}(ns$w;8p=+6s<889dOtGonoYG< zk$<2++S_2D8Y5fht!=wjD_~lZOARWLx`&;x^Z}~c%^&lN{M!+oZmIEbRnZ7M%vi0^CtI^3sl)zr?CHv*u~1 z&IirPZRd*5&I{y5x35opN2UjNSIC%WdbV^vcDS=xBTo4G7QJx_)6RNQQ1@$>V`-Ut z627ezH|zx*#5KQg>9a=Q9B?f^iiqraSzdDGH>jc0&)dm`vhzfGkgxU@)Ld<1C>dT-XBVt4P}9fxodz5K`TC#|9#E7Nn?j! zAR&q|Oa#w0#u$S^z3rIg{XzRr;Gh@Jt<%>zuIGW)?TKo?1D@_W!O}Z}y;~)IqATZW zd!!gk)AzL_<(v#FfNorx;O2(jq++Y_`gsv;IOnUyo%mVn-zu&1^eQ>VBMC}8adC|^ z;I)}Ge`BQf5|&*HT(k+>r%mLz1@@kP=_3~<)4N{khO$Q$#Flb_X9~H$zXiA^cMuNq z(f~<~h3bDBR3Td#!mD^2m&f~|SH*XLG!_ig$Gz?jFxQ3LkM;R)aMv(lR*CbU;HjR# zw*A2IqUG9D`O{3OpeHragAQS~jYJLq0jo0Y84IK^J|TqO2aKIurdRmn5tO5kE9!)K zFN&|xEYMY~|I78Z2sbR)Gim(ci!ucQkhB(_Ayk7%RhqSphH-|`r}b&GJdkFupKD+H z6`w($O1qeN`C(R?vkAQZ&DrDXc`}ndzsisvrf(?!N#4HkrcwrE>w;q9OWNt{(12LEuFm9IK_L#MJ~8g&-?1V8s5FG zhTtVeQD@ywvRE3=cZ0g((k`0vcSMSnI!N(VWr1EzkGT4y_!-4w>IvqO080%l)ocbd zWdt9?PZIYJP^JfrlPT=mHZOI>q4B<&hHxQdvduD-&uhq`@$0OtQxduWY%{Jpg!ve6 z#Q*siD!yBVK1HQ~$GuGt-oIk%xQ_!@{n9Z@k@GlR_Z5d(=K*=|o7p?XrPKrQEN8;J}{9a(|DX0C)%_RHoA*YKXXP(f4J-^8V zrmF{00=vBoz}W}a!mHNd6(?V&6tnxr@9R7=F2)hyoCLc^xEA@Ua3m)eHUnlD)TeMN zC`#QAAU_2^;@_x42g{Ys|CK<{2OWr}@wta{!bfLL7MC-ge6DP?)wLe~?dJ?VUKXsr zoc}Dt$Pv%{q49~KSsS)a*n)|tgX>4eX+pWGrYdn8E~aN!wP1B|t*K{)PBDpaKq;Xj zYXkLFnV~de65*6Cg2Q7Y2+LU{0Z=`^(;CgAI>#(%UM}@8c!sM(qZ89zwcM}IrY3sI zWY6KlRhVC?SeUo|vR0VZgL<8bm2VeSn8fdU!5=pKoE|8C=f$nA*BINj{rS(f_e13B zyTaTDOpO2Z^p6CuyqjG9F^LK0T3@1*npXdu1OcG}m2v5e4?II>&s-v5~s#qh7zUuB^A9t8ONV}%u+Ua7stx|Kuq zM|zcmccV z7zAS-ZM~jcXdwkTeEI1zw&b4K7%p;)gop^yEbJoo27Y#{{m+z6A;XS|dx@^L^}ZsH zT}e6G(vB^AZf$ddM0t9&YMYF7dOf-)j>)=h-KMv97u*(6V+|Su zI-^HU&gl&f6Ozmo<{CE?${aC)t$tDBf?VO`d2mIIubJ&6Ort~O>^rLb;|$^4n~ zcJ$PRJeFzL@{;d9p+0}$kHsgKkF#r{7502tOMSNXe4UgQD|s;AF1YTibh(MOsN*Rm ztd4i~!t2nbvy_KOn?^q8Kg^>KGmqLz`meAY;3Co14yd(++b8PfyHz|d=dKd|Y!?mU z{l@2lA~4R?OAjfSgMBCn7%#AQgfXw6!fl0Grk z9!lO^@mHzpcH2|Btk>pCO}(19DkkT%F^bZN*+~$_*T=b+N~aVhPz7pW_5zmxx4<;Y zEk0rshO-q8mux2Mu^6B%wyb>C^K`8vBO_P_O0h>MAM+okP=J}jk4h+&z*k-zwxPk_ zSJX}IU5%MgXniJ6T-1wV#6-UChKKXquGDd(#a4S7q;XMPY?kL>AH->-D>f3Fw-eSF zz}@ic`-Sg|iIdxg2vHw$tps6mcopoiHjoQFPy1Jx)E zQbsI!$bT5hR5H|hqy$wwV)Rh5v%l`U2F;&NX1k>Ij?$LtU-T|r>OV>Lf2|3N0V5a0 zo1LL)X9zL2TVXhMUGJmf6zN6KLw1T?;e`!0SGim_vG3N0e*%cH--+p|A???4VnK%v zREV@16(jM=jG8KFF?=EBo(AWYI%2dLhMVejd0UROb z9Z|Xcx+an)y+q67I$@3P9F-=TLZOfXdzI?4`A;-mk+!Ok`6Nx%1psoCJq~yvmkjjT za_b5K?#ZgBy3AmprqjzwRp|cbPyUa8t&} zIpC+pnak{3!^x)GP5K!k(kbNH-p_fpX#2G;L}8>DJmLG}KXYnfOW4?cuRAX!zKY43 zFU~b-0+R_qCQwF17A7-uPY#(@4TOGOr33@NQo2c1-M`IxSsUQRRX1Y>he)3_LT{cm_!{d*~pi@Ip;sL?ffS zhNWW!XI1H;X-`z{xLCk}5|}E5Ly@2nA4Eh-KNb3^6jVt`|Vr z)rZqtRAsfX$mrhceyyO(4HGn8Re-E^&VZfrUVn2tL?rV-xjmc^h33Fsz1v0(QF+pj zEW-*4Lb0vbv2_khn71N})7X~%>!(+Y6!WFeT?>ulG0pA?bk|}jSL;Q_(t*#Btgogb zt7Q%pw#6}K6Y`j*Ml$$soWJm9V%`HZ!*Bd1IdX5PhYX?{OTJdpqi3gO8XpFBl$K5V6Gxd~e(1|HL@L$~;5pNmM|5a)0PI zOp)<5idvkQ?SaneY3NxjsnJFM$jg%1MI>(w0Wo$**pDza<@IorI}}oq%17^eGnV6# zH1>Tb?M&TVQWH%_2Rqg~PQx2Chz~>jC#$-`7aNt`ymmktL$m6RRW&20XiRrhO3Y|k zH2z6#`XB2zXAU%CAS($Y1P*rfnPMtQ+_eg(WpAHFMP>~oJLG+9-z5+4G}}-t2pU^g z*S(HotP|*fF{9IPnKdI<7MMaSi3o0ZWI^(bUV~TvC=*!D*0Y&{787b zjM}buMIfsjWSP+U-C(FB18$YX3Z8Vw3+GuiJ@)DGe%n|D)$1=OZ+rS^3pX68fevqB{!1Y(&4`z4>Q0x2Ym1?ZLef`!UJcjj_!SG5-5q@{dq=n~K%kjtR{OIwpR7 z;~De+cm~aPD!PxWZ1nc=CR7j;x~{RAlY?Ewo8xD%82@++^YdRw>;F;G``?0{|JSl_ zBlOUI&!TO7Lra2bo7Rp&a(HSIZxgEXG-)bZ(C>L)VzwbCtx}pXuF0mjDtu{~TmraU zu;pG@ShZikTH%^cr#b@=)Vvy&3QoJw&Uzvm`fISwHv6#+)2p6=gn6QQ-f6D>=5nix z(bWO~NTtY|j8glYiz!VIFbwJ}G*HEuk;KSK>C|{~#L!2~mO&dr3~C$oDM_Y0^EvAEGx-MLnW)*DeE{G`2UJz+tyX`~dNCZJuyr%+ikgL^E5HQ2G_O z)$s7laG@brUvUN3{9$&BXo1c`EgYwbdLy*Rvt{PlHM59AU~%)xm;$q)Qri5+m~!l* zAOOr&|5*HWcI6QHP?GKp9t(7qHP&9F)GPqvH350S(8J zlpU2KJH_92Mc%Z?LE(Zp1t~R=62H*Q z+-h>L=yqZ1R`61xG zlFyn{W`5`EMkg@9^Rp#doG{ajRi+7}-I3|%Jkca|$3MtS_)Mc7sWzM4TApN}=Es#c z`X_uC8wFZCN$OOaiC%7ih=yH_A!`GJkug_#^jk9`_(H5-RqgB$IB3dvPKlmAqX5sx zdGie}iHU2m9efTuu#TF0i6*kIY2;LL>URi0{S9%l`{=WE3uj%~aSZCXNF$xfKcwm} z-L_>JVedu5e0-@eda=)eLZ_R>k()mYaFK~wHVsasOJQkf0YFWV+SvtSbw)!CRtHYLa?@_y8=8r|EsDWf=2T8~*ZCzA^Vb zk0|D(o%0lDC*6b;(hv^z{(hbk@FCY3;Tuf>=iX=$AnBo`Ny&gv4MAn&k$5`4!cvbE zgpvEGG?!I%?lhzz3lgLN77Y6+)3@}rUiVq*-T_k_J!iUr6jr0)0nxZl9dLGmej*-wrSXS9(NVV zm{-!{SzIB_yoZX$Iu2{z-P~U$fZCVXGMH2TDfx18^ZMmuKa1t3KO?~UB}6YT@0>0p zm+J;bjTf}U98=rg9A2`v-o>|UEXETXd?`^2OP4tqHFcG0$s$bB4h9?uMF|JR+J!F( zn%Z?&l24X9A^{E#HH?VFna7t6RT5Gl-X0fAr(923+T>3*u>H{WR?c*=gmsJp&I$&3 z@b~wxuO5{G%3}b7lL(_sY(%B>*{zWHWKMdiYykD)?(c1(AhI=1n0GNt-5il;fce@< z$>EkLi^Wys`bxslx34u~GmdFi={>f|x;4CUa9H%$j30a@_}F<6@cJOphxi@R!L_;v-Fm7-eh! zUg7=JRRi(zRwHTq#*Fov;$5& z(YN7Km#DNoQ;1OG&bC-pFu~A7#II!ja%cJ<$%PuBo|Xp@VP5X1g{*tNRmE3+o#Pe7 zz?JJM72?iSA7@w;4VJ(Wd5GTKER-M zmUiT#Wy(*`KDBgzh6#_Lm_w7ZbG)&M!J%ec#Sl7Nr1>(N(1Hn+e0LIkDAkJbO3K!| z#Ut%OvE4>2u`0u=iM3m*>k*-J|8OBjREYvefh>IG%_(3l*Y2o z&9c3hi5o;B$MM*GWEh7V@$AaBQ%P%hMA1nNY0e@L+gk-&@2P>>rRE=y!<}*OLcoK$ zVpuD)PSl7U_T*~uOb7q9v@z#2&BKX6zyYPj)0d2xb#fY9$w(4JKK5}Z)9xcF1f$gT zD*r;iOWxR)nCGA^Bh97x^#RaR&i%r^v*-$Aqw?yF=zGNwJ^G>?_{6u^XYWg>`6Jcw z~c01vlp zRlVJbW6$Txqdzf8f^p3fHQ6sVS@gXwKc{aAJA(>}pZ0&c=Gy2#(9Nypk^ zfW;VNT-;fWV@F9$9lmD7dO!W_cdJQnI+`~YO>X0;gRQ|un6e66<{>)M$pVP$2id?^FXp4gj22Ad~lT%lLHZ;9aY z)f+b+ifT6(^{9{Nd7iguYjRn^9kLG=<~}Ko*l_lx;Zwbf=qMtE%zvSCF|Cg7c?l?O zb$gwGy!h>;4Ge0QJuI{IIxI*Y-kRD6)5*AAr_)JWw4n_v8^&>KIB-6URU2gSVNg3{ zS9ZIg_Uz=OQ|$=+ErfPVY&nIRJIUsD9Zlm^Amp{l3?X0mugpeE$FPdTT%(Dk_X{DA z)qX`;QWwpkNvCXf%=Hc6`?QnN0VO3u)7AD*bx4ARN_HBZSl^(GF)1Y=nEP>@+?;YGzX1 z+4GF5@m6~rS$cT-l+5B0m^u#hM2uUtd1pGQ(|H!usX)tfW8;+PqQ&c<+T747JI&6T z+eaYXhm8oHSuea|4hv56jJQ`~u_=Z%^y7>b-FwQC`V30o zuHzCvIEn=8v`I;V`=eGMrD-sgPM$JmM>@;%Sg@)piAv+ILLRRfI!Td6aB4b=dzJ{` zc@9pkQP(MM&X~AY#p?Xp3BlJ|dN3f9v}9#MV%=v(U%cIo1hp@=?0GNwpk66Bc9GB1qX{HlKK{dd-$}TAFghjna zU`qqcyUf)rU1b;|Al=-((s+I$PK7x+5z=x0)1GDgO}%O?csOeAoKx%kU?%k7&Oq7i zTf=|vF6q|EdRCvoONzF$KY+e)!`HTmyYYX;+?XO^-* zGlf;o-jgF8zV~ts8>szBJS}Net(K>po09@^dx=yjP1)5HC zTzA&*DW;u^pILnRWqSjDI=~75{Y^nbiqbkdd=3geVxKhI^?cO z%1?B^VZbSzKkCMu9!n3y*4jtmmQShQKj$NyWwYAf2Tk-B5UXCd>c3X&5mlNCk1d2Q z+SqZ61I^abX&PbD2i42$R`Qfq@tPaW__|+PzE;|5AYGPXZ7_2vib&D4<5BI2S=MBw z7%#>2D*8nB2bTh-YK)Nz(5LxgYUiD$`ErMY(zotb7~AbAGUBIizTBNb_IdfAfN&NTq@P6wp{;i!lEdt;q&;bUVBjmSK}aJnfEEv z*|DB)pt#*73reogYJpZN#GccvqF zb~_gm*rxL1#kfxwhwb?$7(H&}0Zm`~*^NZ9LIO3zK3ZkPM8R29ahi4rR{gU%G~G`8 z&bpZ<>pv-9XXiBJs18Y`-QYgP2|j|qYuNWmpF56I4#X_H(fqJ&ETFE3D~er2-}?mi za;8bw&@}h-D6bE^NrR}{b;zT+ENpOI+25uPOU2w2Z1yL19C@h1)K*5cTwJT*vamR0w!0DqoZ|3u#e39gF(jl_YU4fZc8F)KYOw7Fxh6t zS-$mYjcW`0%|iMND=t6l9d}%}rM7ij?W2l`bK96$e>gs3ZJ-yjQjHygLrv0F1i_$L zigCx~+(CXS3xmN=#xz!bZ`8xQp|1|uD$ zjH=(BTw?Imu|G5qDj~i#w(wl`M}C<5%TcdXuuSXA%J zWLd%JQQ^rTe4-mD>5RO!jrd3HD;QNL`vv3MftG-TW(+?fY@2&ou%Wh7(z> z5?6zNSms3hpdq$cN0La0#|M(#>70FDdz)S!Vb~@6AIs1t3Xr8SdjGxo?-RZiVPrU0 zatd+26m^U3q0I&<)Fu3MgJJvSCIQT9ka*EeDp?aZg|nOShs$2MX1XxQvXzp8YBeHm z_5K(4pUUY^GqWktNluOvs`FwbzIcB)AR84V28y_63q1^IMb*h@+xaW7 zx%&uV5RCaXXjg^J9AVqwNH zi{Lsy8{&7dKnCJ}d zjttI0l&Vuu{GV!UPDxhxpf=nLlLfS7Fjy6V;E*jC^l0POJ9!h#f)9rfWQlB$!Q*sSK_BRK(r;tG4sqV=+^CiRL9H{1~3bBk6)9eUaG zhf?X_esMQQSa^wl-{14+y4RI?n3Aj0<4uopoT}o1kL(y$;qs604o|S8X(`sCc?@19 zNNj5U!kBN?kNJnfMkZG9CbwK?c(n)L@p0^+L)H;kd2_19qv_gc%ub~P^5dh8*9`o! z^cD!|Ah10PR*yWuJK{USaFo|802A>g3XPH1sR9~yY;_%c8lgB>dHIhz$Bz#^`;858a4I@mb*Hl zmmS@h(>L^I#nwv#6h*dV&TV|%6uLv=RRMWrJA^m3aVKh7(D(MO-@o4e!{tC3){C`1 zv91w2FR)=mZnx4e{`p`u@~&K$(~V=yjMs30!{SD6(VHaD~&de&_wXN2MyU$48SG zkFFihBd@Io$Y)JgG_gbe(85*x{S9NN?9%lyAnW2nNVCEG=KS~qM!gQ5?12hK>Wf0L zR>AV4Gu3)_!684=sGB4DEQT<&&IMm56we@}`DPQgf@5PyF!h$&I%31YwV!avw}Kql zMlM4*_N|M6)_2pB-|vvS6J!HM8n@z3#cK2FA{Ufm>*+fmGy;<7@1{C-A>HH_DLp?iXEBsX&DS?lzd2SFPG2T$Zi#sj0` zE&|f5+|ad8x{Fswwn3MRk);=l{b{d9{a*$^kg*+ep8Z;& z#A=+^;x1UQ;`F)1htALj3=xv3cbC87{QfNCL)M<3kbbf!U10Bt$ZBWzHe)rb@4u43 z6i!Bi7^)urlX!)T!vw*{amPw+H@cx5mg@o%LSU354DCZ;{nR5YUkrnN%FXY@?DtC0 zp+IwE>%KAK&ZTm~jB-os$?<@%7*`UJlsfyP8rol*bDGGoBo>g+@nl3y(z&dHuFQjQ zsr$DH(<$*CsT;+@4wQk@z?BE<-CQGVJ^)&=rMLgfQXd258?nC7uKYw)2R}~n?uU@$hB0yQP znH_6Q3BCR zN4{Oj86lD8xpXZjhkaf1b>`J4%+V#^r6Tpe0%fh_PqTPNoPlIQFg$jv_KfgpK)~3T zpGLne>vMgxiXE*j9d87S#WvYxp_`{iBqX=I3hmyZ5XW^e&UaukHLLk`r^B`>)OI9Y z^Ce`nh`M26E7^72xHJ*W{jNvDm^&V@pW}fFm1*HIN&##d*NrWdyyeIMMXUk3eBqlF z;Q_`{Yvaz25lw}2md6-T9qxAzWmvKFn98mz(-X~T}pc~u;f#;B)lwO_3|?Fw|p z%yhq)eic6oA!c+kDt_AR4jXiDh72SLYA$Tu8J^Ir#%io`iUb0O4XCt9r?{kpiOFJW z$rPgLm5f{lu!PL23IMzX$YTrO#0tF`=IYYzDU52!QWC~2RqY6-&EG29h1Zr`-9L9{ z7y=q6fjn%`hSsXa;Yn+a87VY;wVQLDVvUg06cuoN{ke{fZOoRr`+<=s)=AiQpMM?f zlijBN{xBVe>qN{uDCW8Z9~)^k86ZJ#PCY)kf$ab zmQNGRzJ>rde{51FOiZ{hACCnK#y0&RLED)*8$Xc0QPwGKBwN6nyuxxBlMV z3i){^xKTQgMR80|Zy%SVxCix`pyF6I<>o!9<0IUs$2%^TMNcqy?G+p3Q3ZS=9_*B`CYUTplQ?7!I*99OE@-E&aWYKys+0CatOsujOgcoDdb>d$lZogM3b>{#o?V_pZ;DX`d=hGaXPDdtJR)+T^a_o zSLR(7a*}eKHmEed=`&-<;T`Mlf5*|5YeeSux9*|XOZSGOx{gOjg^l!BvpfCDuG81k zw$x%t0)t1_-aR&7=2Z)U)Tu1EN zt~a8O?dnGn{B3Fa&PI(!doau1m>Fh`zm_C`o6&iVRxt(pd=9Td)%bWbmSchw9w$Ow zTQ6CGHlV4B>*umRIf^aB8U~ccqF+hW^}UEOjXOD!P-JqAfkUHfv+t{fh!Iv0=wAwW ztuzdEsz$+y8kQrrC|$2C?OV6}=hg)jdfFj>6_=MF2x$Vw{Va>dBX#nW>m@oG0#v1IpifKUbYL${h3B_35| zTEbV6)9SF=k9cQ>^McH$y%*ct!^Dw%t5fLiO6u!*)t&Y}>~soDO|Q_utVOe8uAxGS zW@EHa7@My0OUB-fs`yuuN9TL3ObydjNp5!Rx_!wYoO{_F&>|>l>e)*AZX!2RF>ulP9xIfn->Hw8g;Nr*3B}gnZD%04%LO?M#QPLF{ zQ^RQ^2hDCMadyp6<#SG}lPV8ojiPDBBmN9oF7j%hPFi>+p&0Op&Ss&shOgnQ_9Lwt zRY|~$Ww2@jq{v27p1;G5z+I}%a>w@}V`a5+6pG{JX%Gx>1L;#U1JYk^Y^ZXc zASYsqpO+?InbNx28`aRQ{HOpn1AYNB;3iXdXA_bK7-_El9k0r(L8!#WCBeQ~k1uDJ zVa-=t^uoMo*0zxazRGineh*>3Aaa#!dz2^3gsv(Gb(RH$V(vh`A-CL; zvL;+ir(wE_N0}>Af9lwMe@~zAuNiardQwbZbdiaj80*@U*n~EYTw0 z#tBc6EFjdA(>2Z`_6Aj9czKDFEFEr1{_07=Z z{D!?Q=w(d7GJm(X=hq4M-;=yjh|e$2!lqY3>A%?5CO0A8^t!jWsmw$>+s!~W3K{?{ zn_fby5=v9Q3+oWG^(Tvh=!sV{7RJJaD%>88qbZ=&P@aXYX&`Z;_V?|W%Rr=%;8t3K zcuj8Qc?L|q=4ffZ)q5ifH)mPJy9t`m=LeD( zEmsD_m*K1)z{U5RyWIygEVlgB=!L<-{7{`lgU2Z1^!5Bk2Ft!=^m%|klgEYdf@W8r zOL)m1twtgl>*$nq#bHwWd-*SbEqw9^lF#e}RasWq*pHe7X|-h87ZxzI;Vc6~<7aN} z%7P5B3GuIoV8Aq{r#+9wzY0$3mFli#IXCL1OS8f?ZN=r0{UG8VKdYVF^49w=FEVMh zswfWQfcU*v&K+7c49ZRMdJlW5AmEBa6F=b9JY*oOt|rMb;qOHZ7$varQ(!v%rnEl{1($NNT~F?mB8*TE>`+n`Qzy?72K}ow+MP*N7EQ$5aJw+UDGt4Q)V^SV>)3Fx-j}`m2cN(EizSDV05uL9S#8s8tu!f$$mk=uyVMsPi_9 z?&)o{TlpsWyiN*g>yrSBJri_$XOA6Qw*zgcku3LDYZ(sL9yespL#)M+MzE~z6Z5UQ zulDqScl6$Tf+hZ4j|;&KF(qHxdT=?WBE?jgfSw)hclF$ay}GxEuT%2vR7A*h?tK56 zV=;Sn+VqNEcE*=)wG{Va8$N^)li$k3paJ>bc1$2ceMLO=jb$$kzXhW&46{$JfZT%W z59hSBbRPuHV-_QJn|>Q}?#7-M8-#Q<(y7TA=l*$cskOh)vg4<-Ql%Lu2U++08ru^a z#?6TnPv{IlfT4}#mSvuv*6h-gT$8iNS|e!5aSBa$aP&tdS@fmWd=7O_-6;40bE*Tk zY8>5REOYwB|IEz)fiRSi$%U=!>Gb{B)smg5A8w0_{?D2J38C1O=-Sz{Tsb$gVY=># ze);cS(f^BS$)3e9Eq6S9%E6chgOqRozX^8y{}!eB?*>lS?k_<&G7G+#bV4ImE;bhTdvv{C0&2^Mpx;;yLH0>$979v(2BeqUE9f=bK8}GOl$ZScf1^ zOz*3+Y@qwWX1%mQr`u)HY$C^IOt|6J+TyrXEN^rZr`cI)tQBG!Nr@jg1lpo9IJTX+ zByNO+d>C3>-kfb*FALAL^4^V*!W zg$8?6S|6@_RA}&QR?6h95=q-qYqlT1mh*130J`TMzSXIfryktj=WvM8;P#{^wBzw} zl#x3h!kxGuUn*D-XS10pGICh9dz3&We(djB{hjUig}3_NtXJ0K>osle zgz2IZ2&w@jP%n!DxbEx$*Yz`k>Fe|wRRGmb9hf)c@J)}GVQ zv-BpbE0x!I@FoF&r0*_THOdRg)ww0WcpW$O1x8u_OMx2pQaFeI?MaR328Wwgy-$Vi zMzrP|3tUE(;AApNvEXHvL)g6Y!0>UDn;XDXJ9HC#u;$w61FhPg7U>C7u=}k%101>) z^7B6f#9Dq2b(20IXoZ$+KTcDWB$aofLqtwAx{^>+nsIBd3iF(2q@CGBaa<8v_FUW_ z7!+^Ju5k;f1swW;$?Bbsz5LWNF$1fHM>;0e zfZADgh1hqs^EfBwitvOEOC!S#jbz>nM+7 z0mVhk!jW+wXo0S=)YY7DP3Hy7iv_BRlRPqNwx;$3Z9oMY9hot}jq=aa$eZ;30T^`1-Z~Q=j)Mb+>XhnSM%3TdFHK2d9-o;1^NbE zMgn`Orn>bwg={f=XO0IU9kpj>_3<}C9WX&AjC||m!sJ}*CgW@=-U-orC0Djl+vi2`n?GM&X|K~7RR9alACsV` zXtZpB6DQCp&j8;I%3g(E(U{W)S+FNn6ZbjtQ9nvOcV6#Y3ZOVL+D1u9K6c(c0uUPq ziuyZjyk0R&XOk7sT-{_CN`ux*sIJM9^vf(?c?9lMNmlndJaBRCs7FUy7WB`LDJH+a z;~cmpJG&hN?p31oT^p~pDSV;jGP7&yq^YM}PH*pGPtSzr;lEbbFs?{jB8~mhqX5(Z zi(%DzW7`G4(s2Z5jWW=qXdit~r22!t`HNRkeVcuhSlIL0%mF)L%%W{7w*p42mUr>E z7Io!-+{te%-q{TT8ye@81B@SQVfi`xsTbE!LSp57XAOXNv(d{z za-fEMx}=n|Vt~__kVGdU?euc53N*XTvEH^L^Z3z=&SP(qI^{0s^nO=QHMw)718$$j zx^7j%)_B8?%C_?+<1>$yZoavvdDha*+ZBOn*bC$cySdvjD>Yg)kT3PLeI_J3hA%P;rp2%# z{nlLP#Hl=xhk?QeaNf(sP%E48tu`-}<1cRqZP+wVRBziX67wXx9y1JyR5!En4<*nV z?@%L@$P?OJ3QLyQtc;#)Vm>$2xMgC-y@p+A*SY;r^V!Ek+cYwK(pd@EFpu1RP%#&R zs8XON{xU0t^?bbBE;^BtakVu2)+pJ3_3pQfrWSU}?VM(9p}=YTac7~;t*KMZS>lbf z86*X}Gj?^&zV`n4;=S@Ol`JR=WjEF2ji7C~`U>?~??m%yu|!3z)syCrQmA_p<0{9`1|;yz9qKx#{rgO2-Qwdzxkb;OV{TfWoeSKZA+4%a zT^|ql?r;rw!psD&Hdq>zYef>GLI~kSApe@ROYc9F6dA-_)xWKym7f>Raouejc(cN ze%+Ceby?_1XE+F|eK-bxw%o<9OEyyIQu+0G%cBxiVzMBuh{(_m*FWbJ)bX-yEpV=V zl8J4cB#u z+wb+@LltS~RX7DTKwA6YzV|n7s_i|N`kxi;|7s>SkHU;&2l}e(s$f6iE-tSr{?%H) z6a4nzQ_COGyB{f99aSKsA#5f+w&*;zMhSr7c}=kEwYx}{j*^{QoIWf|0gfLN{@4?G z@82E}0JR!eY&|MR<0Ygx$w@ET8}sk8|5TcNZrtL7<&Ur|^G)A##Ce$@!@5<6@Hk%l z=E7$4$7qy&7`qIsdeIs>D#_-{$=o5h!&X$l_KO$WwbdZjSO8+|KPQL*;QBD|kVmg7 z(ihqpb&)UaMK(g1+Gk=v_|82RdF0unsGq?jD3orO8o-a+cVA-h&CuAGAh<5ECE?Iz z7PRah!32Qau^{|88CP83win`aCq@7f|12v?CUc{CvH)6|B(9MM@M(OPec4H(&sDa&$qc?<-BW^6va z=NqRVaw`OoIyjGAb!Gx+4A4BCkK!amP@8FK&$4aIy(MTVPFlVLyF2I4zRSHVZMX>X z%-NV2sL&DvD#TPS9d^`U^Y5hl!mry|ASJCmN|!sNc2m$m@3A zyCprKQr7+PJW$5FeuK=xCg3Y`;JX8!Jr?so4DnkojhLnsa`50m5pcc#X~jqu`$dA+ z^p^wV<>(^IuKnjTndw9Y36p?^goTZHAQo@pE5H= z^ZC5dp8_>Pwjz+~H;9iNWk<#)@t9$p=7;#cu|Hr1ktrA42>QkMUx!*c7fP3lft?l? z{LdN>jl_lwoGi5|VebkEODsD6JnQslxDd{mNAirZ@^+GzED(FBC*Y8~ja(Og^ZA*_ zRXm+tSh(CCE3_!{`v>cR*c@bOG1eO}8nbs!#TJI5IAPsO-uD3GO# zVTYwWE^;zsarT;b+p3RzIFgZA_u>VA5)?vC1CZ13J(hx@$0-!>-!Adu)Q0eCmBeXfc>_!!-AdD`^KA-Zb&6x+)=pRbCW zxkpd<&blqp!SeZDQ%%`6_4idt{Xp?}v^kGniibm&?!_5_ortBq>Hd(JJd3r1yv!hr zZeiQyvxa;19sy{TeLQ$EJ1$_N0TXmlj~~#Ff{)NPUjWy}M-vzi65=zC+(j*zq|h3| z0o;)sFK8YjyTn_p$`^8Z&UlHz#3Jk`-)s{Lsz8+6W>O;o>n{^3`{XV ziQxf+!eFEnvp4uHyO*8yeN~@-tug39BM^YnR|0N%wsG|L^Zx~iB4rt#pu5M4F0Y|w z0l?1hNQKNIf;;G-%WfiipkKF9ybexSA=yp_GM38%p$|7-V0H{8*J!W+6W_fr_4?f3 z2y>{Vc=_0+Jcw~mh&KN^o7ZoPHd!5tJSt{%OdPsbJ9P6Z2lNP6c8^%s>#dMC*oEl5 zfk@cF4?0Yg%)j3H9h$RjLeD`=tyzDM{+|G&DT1VJQ$EewI`Qt@4&+q<)KSLpmSgET z&+elPo7TrRUC8rsAK$xLiJbRwXsYweksf|tg$=|j z+=alZCrTW))4^La$zq>H&lF+@ADKVQT^Q`zoW!6+W#_Nn(Oj7zy88<6Zqjh!oZTIz z0@^4jCbY06KwQwax8E8UouhSB#Pm!+wI69yS;0NNbPDQMI|y&7LcEt!ieEsVC8uDg zMIX2%Q9{X>-e(W28MI~W?hZXmAZJ#0Q-9HKUOk4%uX2##<<~%`Bsm4L=I>XCPl5}` zi90W@v7%B|mTZsEGcQMj-on}1k8lM=Xv{>Gips<1U&wVhR_r&5Bh@ClUFi?>Ym`RC~V4Mu9@oG*En zZ$|K`pvI~@0(z!EDA6y4antWn-*$5bR4bYGsRKRJuN1EkNaT{F%4s*GqFyax7;yI& zFRT2^YNl>m3qLC;A{J_E=)VZuXgS`Gt=fR)HSI6z9%vsdZhM2hjw+pRBkxSjS;f;4 zaKxeQCFr5a!DLef6_y0#+y|ogoA;X?RE)Q0GOc-6XZX49F4bwANB++&H?Zn)l63!N zTQqg<%WIxh04pYj!}jCYDBsbmvZPMkb+}OX27g=Cuy6fq(1O|gh6f`QByHqNVR26> zK|3Ej=!TdA&8>ZwL|{2W=tL++hsloANXv21q zmMm`4rgHayXF9d$fp9O}A4Xey(9fN328Mun2}kr*BGDD902ed9CI1h(D1y8#24$69 z-QxBN9Am5Z{6@=D@bg#gnNc9~8Q7)^RN9L6oI;%;<==lPGVr!zJ9$|}A<(YFp@Bgc zm`LJz&JM=}rPvz1O6csgzClU}$;?av29}h%JiE53TqLOCmi$C-cH1<|&!bm{d`ceQ z9#F4JS*}QdSkD8uE}N0(xy2x1HowAPk)B?=XTL6!fAitF_BxzU_p0^ML$)E`vy1C9 zqJvXYqszCo{TMkw+rdU7S^Z3_oQ|vdVd}v$5#6yB!K3~N$yD-|cdmKUO)_(&&3}1E z-vjM4@m2C^BI1^aFUJuHXOUj6rbLCERT-G~&S4*Un>Ep0?>^K!A4(X!>efb)zwD4u z?I%Tg%@VuN&I-CkWqiDg>g@8UQW=k=^=0HJ&`Y?U89zc?Qwap9e2CUxH0<@WOG%fl zdi=0k>UBM8h#Yn->?41>w4aN`j%skU`vD$a+62%N?Y_#(3Cer7rSS-BfQOzm`T^_%IxA)VWU*6VyMn zw14euSk)in2cnjbT#>j>pV(P(7!@!VfjSPVbM;olJJ#;LzC@3_gp515mir!Fa17@7 zU==O<#9f4}Op!b3y|L~PAx)=MgGc=FNxWEd!p7a;;O?7ehDKlPW7D|Ay1kJqE`e8u zS>R)VO0TVMmKwZt!q=<*o9!q}UmYDE5*IajyW@4w#T>^jPKP1zy1P>pH|xC@0Q!#2 zukOMREpSW<-zRc@bf;Fi;XSc_XvAlAxB*c2xe>(mc$@cawA^p zcI2L8>PUA)91EGaBU9|W;S z{g1yK=?-YJEMS`Q>8`k&tWLG0fl{)2-UePwCS z#hCKvdryrb-SGqQh{8h6`j?Wg#aZuL!hQDWUH#SJ&(~yX1yu)!0_4*E`+9(DGdU^z zpIw{35w5RFJ+V0W|I6at|0*r?!=?S7tUAu>Lhg*X*|ZYhAXrlqF6!=8eDK4j|LMGb z1r4V(+u60_KOVw@0tVY^5S8_}1`d2!|1T1ZV{jofN8x5RqP{uDMzI6{C(FqWFJl)W z_&d$Fvu{s!!HmyqP90H$SQ9w<3{kcXLt-w}MMbjoZFRk?KN9B5cYm+Y)&~ZPSu~b( z1E`S*TA*oE3}K;J-p+=xPb#j}J(huP#$z#oWPM*GwPec)C!pp$rG4e`6 zwVm6dmqZ zRs)cgWnbpwKwM#3P9f42YUQp%!WDqaE4_lUlU6%J%AygEW4AhrK=7RLUH7V_TwlKtrlJ(el zs5D8ue_jdsdgq^Xk&2!dg)1eUI2KKpc(4i_%_%o zO>#W{3SiAA$SY7R*N;n!e_QMI?1P*+gE(oHtdxU|OrN(IuiSf&=~a9$urK(7gUHRc zMuh|tvTJSSk+vAqa3PN%#t0S=|&2D3UWXx5b4y`&(OxxX(dDw0vOb#c7d9f9?qa7em$ zSj+A%f5#rsza*WA z^!+Be5TO2!_-`dA`XQoLuKQM0W)QJ zYTY?3tQvi6=6;h3vOOz#;t&2#jcNsF2X}2QYwZeKnT2u0%TJk5pd{acPV0NByMYTT z+1RS|IVbfTn4u_@fQ9oqgxcI7m_#%PY>QOH*x6~GD`KCyI-gz3Wi~u73a;EUD(r4B zKYlFXt9Cnw2rAApHh&D&zD1;Djc-?_{hfQQ$K?imOS%9I)^ZZn)>V4$cLw0{WhMkT z)7vI`l-BlP>#lE!__ASc9yx2(s#D~D-KDY-3C*8bIxxMsU>V0=$xO^fSNXZ=%}k~XU{yq#uGpK zQZY+*c=oHD{VmO~u);#WrL=e7oIl~rjk0`}hhjThcGzta9P5PwN&VCPKlkUNYUuV{2Ayj+ z4)PJn^0@Q8LxT(~L$-ee$O_&~PT@VN5Qd};@k#G4JTaFdON-xQ@iRSiO|FXtZS|r( zW-x^6Xx|)L#?_iFE7#?ay)e>j;&SuKTH(BFbUD?3bIHs%#ldb%p2lCU+2F#TKr4kk zkBjfBSp+hfD6ix#iUh=O%Rp|ah9T9OY5odV*i*F)l_gA`w<+v%SyTbv$C{VxYNtCIuV-Y9ek^fdSlLQVHhex-iZk8b_KTay44&NV6zF3G_9})6bQ*gN z|0Va4HvDP+k5U!=-yJT`h$XzM(`(<)W94jI+VYmtdWl!MG)r(5dg?$hwVX6r>a|cb z*I7r%h6JcP6WX=@&3^PSXHNBDB3ef+e;|os)XtU5xl>Lx-I?R=#<2!ji_yKBjZpq3`6w zG7Z<|a>+HtDKy{Q+4?1o>CTp#`+nIoP;crfN%?hOME0PrCHJK*AVHc9J*!+S7_;>aB z#k!SdDj?Dw`X~a!ODn|VM;2Ebq|F+F0~eY<74$phg-Sk&l&o#^O$5W%MA(V~wn-F@ zc_p^}Gs(bEb0X*cNNDjP^Wq}x;fA?=q%6bZMSJ{yD@voI^g0Ji1M+x-fRY-|*uZ@T z)fD43{bszW7XP{lwsxDDQHp)XgSTgFACr_TN&`f#V#2S6_4ihlYO9|C|8$8zlWN9!Q;|*yMG4 zcz7JHy|!@|=q~#e&;IXpq@Wx{q*75i;edV71DpgWMT{wHX5 z%`ldL1wDY0`yIcAs=oKKwX2vJ`x(yIX%3Ia_nLJZRq3WK%+DX`q0-^YhTLMPZLQ&9 z*wC_u$lWmj8r`0mSomRmGdt=`LGOj^J)Z;&A!ofrzSMTpQhUt|vm45CNFLfS6>aR5 zK~H+>qQP!oZ*N#JL18eXUUQpsa(j_6n6N<5nKZ%|4EGcK*(N`AOi+Or+&B5x3f0tG zOaipN4B{vB`X&k1COP5(oN@unlL3Wxn_3>!3J)5m%p{cJL5d8=G;#*iBT~b|MQrf? z&_qw@Y3KY>}VDO;m2A*M-7Y= zi6A+SQ<7z%#4kZd!TzgFe0!QQ>upkDJ3dwpshf+afXs$G6bS&gel3DOV4i%I(=*vK z<E?nmb5hg&eg7gQ zv@^~f1XEv~J&O+*(OgCsR1etDxD}SU&!3MWK=$ytQWpmeSyK$bpHMA+3Qq1A9aw3{ z#*4RThXpG4qorj&=ICL`U)tCIzF)0hK!#x0uo1q?RGDq z8PHet)()f>H)#?(x8>761EdAToJ9W`ZBqvE` z^LRORSxyVBtb+G&dlmmq0l)dx=VAbM6}>|f4@i~^kefsPMKZ^KNpjn^X^1AeY1`Dp zqb6FZ?qwa^!BCwfAmE7}9K>QYnPaT%!~b=*BO~2=d-;}T{}2V{a04Rgufp5!!=?Tq zTTlc)wi{&JnlPk0J#DjOE{pttdlN1MmQJGM;_bT4yaNd(D-xr`fw^a*A!2qsjY3&T z7++;4mHwTTl_N_#Yh7hwsbJL70HX&-Oi=&_%*IWolH_$Nt(4d^Gl5v}o;}BYb^DoJ zxYd_<@a>bDH$7CHXia4(01s4Y$Bltc1|Me$xV}<06$9J(*2ZV%%&G5!mh`PD)6C}= zWs#j?xk4{VgF2}KVhL!@{#UA7*?bXrEdw2EW7!T5M%5fGm*?w|- zK~id4Zo6uY#cJJUZ_v{;1mT6c{TFoy7>NZ$%{gk{ z8lR(;yg^KrSICg(Z%2l2Ki>V+dz84XW{5cN2%5=ylCOT>J9)nidIy(e2Tc|4*l?R7 zzv)Kh*^lInh$Il&KhO2=#@9aV*fs^xBE#bn6UT;Z;kbg|B&3qeqH|V|UT_Z;XP=^m zRdNA4)m~{3Q8h_=lRfqB{1d|z)W)|qumpIi+WH6$*CZ-JlJ{;eI6oT8E}x2VnXBkL zZB{9Y@<|3guY_QCwn;FsubY~D7Wem2zW>EBZt6rDn=fsyTQ(8SPG;uo_k%pSyV+;Pns&0rIlF53?eM(xg(XL`qy24IkZx%G3 zW_czrZZ&LYY?+n9J0@w*LQv09-fJKf<{83SH)?;-Fle~vJ}DuElz7-6bv>YgYc`1> zs!)?VBXykYe-(D7>ftIA;vMS8ao;)p&4HvKQ!1Vz&N#bnh8BdbRFrVG=^`c6Y zA+vS=8VWx$Rj3;yF)rUT9^Z8YC}^ZT)!kRv(n-7#nWcLSn&^0y@V2-u`4NjKb9&u> zeYS-x(SzQ-uZ4ZZMlU`?%s2@IY?9EyEWIQGyL)u-XFLoGnjnubU`UFNh2)7WlK6?`mSN9Z6 z+1BW?Rn<6>;*Jxn<2wutJwH9c`T7XSYlzcu17zqyfNO=dc37M6XjdQm@8neId-nyE z!QkNfCC6nK?n@3k#2wLt6s1R4@Z?s!pXklhfQW`|TvC7vJo8JJSRmH#j>S?*ETwUZ&xCk`vUc4Qo zy;8v2*>xRc_~^eCP@QmfC`%3u8-O!i@|zEU2n}0t@ARlD`hRYZyrRi&JV{RmCa`7qO3MP2GaU(7Vn zS%&A1yroojWP?bEQdCI&2q>QDw!~wC&Z?CS(k`9}pD1Na+@i}-D%l5Bs)%13b3~FR zJxU73&!)d&&wnQCM{bHfYFxhpwCA{drg8Z)cjD=hUnb=IZLnJ_cO%t$fLllp03Q$V zS!i0~R?N&0@)rp4KKz4ny&a$irj#G=B&?)lX0mAW$DUKsKU@;)3>myH-5rl2g9Aqg z7q&m&lCH7z1k~bR6UCWg$OerB`W6OiUox|Z=a@<9?>1Cz*GF$q!^?n_#A`E@FZDI29eZ6esAtaq zYy=bp)}T_C&=eaDG!7F1Os2R$$>eG|z*T0?OT5ND%?{ofH@!RPtPt}F#(PRAWCG)L;@ z*dvAC-bqUX!00mB6{UZ2=RE_7ZWlJ&&hdi}n{ksm@0w9r%s7rGL(ztNLP=%f@dNSB zlh52!E2&)agTsBJ!$XtMnjBK65t|#8N&_YPKLd=0{6uEp;40pY2k{v#On;f4wkBV7 zIYQW6zGCJgn8pt~wDzqx9`#52WbkL6?ucQObniJwQE9Ee%`&1S8(4eeVEd;J@#OAW_)tq^D=9+;GBz!r&wx>&LcO>h!w)S@>Lo0@UlP$_8o)eEUQ2-D zU&oyk^upj8QXQ7S+F+D|_@DKS8j&kq?MD$5lz}Z)$YL+9Kqc5ja^ z@9hS^)Oh!P!)s>y-T~7_|6bqixzbVfT3_Gp1&&&{N|tdqC3SvLVQ3UK>w%pZRk8YzX;>$!(=G;%Ge^kb) zq19_U!_4IDk_!mp2|H*Fzzf~IvMp;>5baM*mYu0!=gNtZ8k!pmF!gHIkEq9PTt^r3`oP(b@m6Nd#a zKW_eLb?r{`t85LMZ-vO5?hP-6ZNi4@l+Qf5)2CrEMpB!;Ky=rl!}E4Vw0SDf^AyWl zT?!22{Ujsia0YP6c#W8$^gV&mQ|&-jZ4asSqmhJaWt251^V4&a9E;hjM;HOaQzXtqP17m{!UgY<=Zl8dIU<7E#Db9qy<_IIAe$e)RmcZQM z|7kAt^EHx=FA*2u(8=;Eg~FC=?Ah9>Wh-gynZdDEa^f${t}aJ+zk1}7_!6GW57NhD z<&btJSgHDkRc>3)h@=xS-CL<)!c}s#Xfx3USFJ^07e4_3r+?0Y)G-n%@!Uj5l@H1N{Io>1RPGFF5t)Ak$&`e zxJ!CIv8KE#&Q2~k!Wk|O%Ek6c+l)~briag)IdqU=Xb#Cwta)UU zd{-8wBm7=|`)JK`qryUe<4UyT2-dR@WU&(4=|V1!9HbdtJk|!5^j^V?&bgGzlo9gO z{fKBz_~&|?e#@@tp$d(Zven01UtcPX3t1)PPDmHJcfZrCtG*SAp0L2`Y{S8py9q;I z6Z_d{2Cp}7_)|V__)4i+4h$-G!mc3;9-ohBulLBvfb`9o@l}}LpH5*_%PCKgODZ__ zAfcnWSzLd^xAqR6PT$#nTQN)zwv(A2NDL>sLghqLPX>eMM_k1oYa`K8HWHA#-IC7kDK^wxNkuH(XY9wYUfo}ixC z*<)3P-ak^m(QE%st+u;TSrP?x?I{>ag2wj69-;Ex?z*9OxO;VY=zJt!=o5QlF$=d@ zP6S&4#1&*PR;J_i$_}cgW}2cWOEX`-A#icx?{ihdJyH9X&&zlWbqw%1(Y%&TE3#M~Bx~O5K~5S8GxK zlV}DXOBzT;U1v*rFK+Jq$C|WdqOtRv3{ylw3Ug-SQvV1pou@_cnzSc{{d(Ko|Q)xf$#0!nZ zUC7^{-swlFDn+H$b7 z(bE#mj~1=wNFYUX6Z1YHx{Y2Mw>v%z47*(BQaHX8x1!r#4CcV`8RCD`5~xO<>2yh#ImqFy`Jw zKohGzRaMG8480OeyV?&~O_6TE<8v&F&_Frao7!Q2Qp!mDm$g2CGOpv;Cn+D#`4^PB zx6SE%y`b7Ykd;7>#(R5_+n2jh=NLO9NZklRe3XE>l>VdClWXPX;}uf=R=X<+`{-!r zWNCf6(22m8km*EOyRK*R+dFuzZBuWi=Zpqni>5~Yg3wO3c&%BP{=0B67S?$gh+ zw)72NoLbJ%f8Ye-I$poHaE{zeFPikr9jFiOQiZqlUEbelK^v6zv$`ZI<`XUL=Jvw9 zrD|6Z7Jq}9T{I?|D+n?iz1U7LEwsyTCM>73Y_FM!*DCb;tW>Rmh|8#?l!w*im;RwL zu&r>CR|JEY0&cSdn5K8>hZ65Uf!C6w-_gd`5z=8J&VcIZHuA>O@ZUynbs}dXuvIQv zxG`LRgmLAK;O@HO0Gm9cTU~r|wHdQbH=)*k>xIQbSB4RR250a$H^_PdMM=X*zQ~A| zf=jv;=8{*o=o^USDjk7aIGvbjLpt?p0?%%zxr?GMYH8|NDyUew;`$byVVt9(>$Ieb zn#j9dtmmx1{32$gW$Lpqs8Bnv=lqGU(IvVF-&l99ioTo28^&tgFcpuY2M?N9f{b)D z+4XR6^)~Kwb&zfa7{U&j&#NVJOU>*+s3{;(b-_QS2g;Vk#fJjD#vLT}4gv=LPnpO+ z1z$w!&**7pytA9{spQ-Zu%%Zg5Cn?+H(vuS3;Y`6=xv(RzC$U`yi+Fo`*m@D0C}}bv7dl+VTChu$mv-^ZMQFbRjJkE@A99#~>O9lI z-=lc%e`h0U?oXGGcDCvrohepp*TI^x=j# zN9;^9@W_Rq2kN>~t+TUJvbddB2UE~1>x1ImS(dTYE@*b?gFnPNzP+o5y%DX0c_lXd$yW6@CmW1EYBy{l^`C6`XMnu#XK@HPjCmt%g6CV zh?uFN^|65xy!e_JqGU)1MkyX)4*VFX5>yPc9`d;Nhx0;=(54F+adG>in7_viyiHiR zu;2M1vZ4yAqK#+iH_kz)$jL?SAJDtvFyE6nS|}_W-5@PG@)1f1I9g=r_avdF9CF|O z-h8pQS@%+#uC4IG=!t>~#|Y=eo=^QKR1$lERfWG_?AV*Nj_BUF)tS@@PqNO{_h-YxhJEKEgNMUUmsn< zO57GWAIpe5eyi{3Ax7K*mSq2cCvT1Iy0w}F8ddxTygOXfcV{Mxh8WQedSS*?C;caz z-@0mov{^Gn*iS6yO&A@0FYky21jJp%=8qzVK?b@oHkNfCB-dj8YP9r7m505Da9gjs zrflT{&YN|2DPv;ncSg(1`*Dc|#IZhCuLUWyV|46wzO68+G|Hr$dQQS!(!7ynbD0Co zG3oOTV#=OXyDK~;_NblbawKzbomI$BOU-b8eBvvQ>834|822!f%^Ex^DzPZ64&9d2 zZ~whsG$Fbm0VgcA9D|d#XqA8LHIG>k7G^4GZgR>i)w^sPVKKOVlAN{tf>XM7a}PRc z;7b$ArvE_ni94KKcP<^ag^;V_#geK^x9^Fl311bDk)F6`&@SNsi_y5?SQtziO7%tq9j-9%5vcn-iCM)`dhkpj& zP)tFbDIy{^KkgNOyA*#3KmGA*PP0GdH>bAp>~9fbp17X@nx{(bLVV5(j0qaawE+4- zjuXt164$H!iCS;0cD$X&Q>8imW#XJ#rOtZieVuhZgAJahn&=(45L8>u(#Jf@jbo_z z$%RVOUGEdyu}yhg{Ba9qr{q^+Ps)dR64z&v%d+ReC2hl^qi)v}h9yevP|Y2Z1z##o z!~8q$SeBd@hE~1y(gy+Hwx1sUBI^%qK1iLg6Q?XYQYKnbY!k z4&2I`h?dD>?vv~%OP!j&8G#1O%~}r?kto-oz;`(l`^0+JCT4j`GT`TYhqG+jW(=;6 z)IM~Q^_wZ`YN-pHpHz{2d*`=DmF;j%vZ9%uY6Nuib#mq+%8)XO7?MLhs3?nrR&Sb} zW*^6Haq+9%N{w>U*0(vvZN|Q(B`m}^&;TzpAIBLREsp6>+#lQjK^@@@&h|y?SE@2M z2ABo$_r`R6TS&rn(h;}$KO7-Fr~180hwjW9vQ$)hPDa)VA@Xz#)^+mwlHNZTu!w?O z=-b=4m8G6@7s6?r&K<2G%~ArcYEWvBqOzYyBcl zQ*W9hturYh+sji}OTTa5AAYcCuBSRd0QnmJL%z$Ug(#V!kN!6sl6*7l?S$zro^^sE zh=vV0jfm$GVzeWOsr5$(^i3qeMGp#`>uyYLmDiP-ci<9raAQaIt0ao?Q3GtUg5g4# z%#}ZT8OU%a0|)-@Q8)|)@J8b7Pn)v%0sot){pSLPss%;j!UwzsfpF`GOTYa8R(kK- zRwO*Lp>4#sA6=>qpd;_O@Kb)X-MA-_cmfn}LJ?{)&M_S?!L@>nfN7XdOMg*$z&rnU zj|3=lF!jkEsaCU4^`9$0qq&p9{8+J9zGr8>MWKB;6v);8jJW*sUmyhX!Ke)gwru!) z4|^yBwdGH3`G7dfEa|&{eku&eG$qC|V>b-~%qQNL05tn!17_If|DlHrj4zlKaDgN* zaWkL);UEy{>G>W|+LFtw>Q8Fm@^I7Pcml-M_B=fY1d%~f;rRDm#Q@# zljWgqu)dp$JYJ{_lqJbNDYz}+#nH}X;!AKnNYY9!4EITw&O zfJZ+y{14BzaTl2pqI2%vvyWpZW;oXKM5@6LzjABLuiIlgi(;1&eeY%Sjz_cFZR~lM zX#H?%)j}(TVc3=I%ymVVI)@k|&k2+Y1{P~$Cdw?c5n0e1EA@Hrq|V?hKWyE+x|BOA zIDw7YPOV#80RZD#gyaOWq$w+f;tDx_yxq^6#?N8BDcjE;V(~i^i_OTAG2ehi)Qf^0 zXmR}6@k&*3t4toGK<2j{97x{hE#ymVYSJim$;b#ebWg7{akzf6J%0JI0oMFHsKO^$ z)v-AubzO9!wYl|8k(*VlM-!B51BxQ49!)hvii?wbj;Y7jKwa6F71}ci?1=Rwd#zq=C&GsbUVr$lZxIPf_8Q(XO&r^@!c0XE& zg=Q>hk2kh-eTk%-*L8c$xAQTm*?D1E*erV}mzZDKJoV*SI%lAOm+=}}W$vZk=x#`W z)Io&^$oN@=fzy&7O_&TI$?s_v`Q=a#m}sFr4?{AzeMn!~geXc%&kl>&6_GZ>a4+{fEdU}vwTdkgF0Ty6&7O)5=PJf*9#^*jI1#bC@o~w1P zIXm{|3rRj%d-%6*Os%V`)86BQ?qX!tXP)Q?wL`u@r?u_<)?-)p@UWX>%f1bTWZrcG z8Ln#|M~~5x)b_dcf()1Z-h;3va9?bP+knf=Dx0n2yW;_Cb8JVc#c@%YZLf z4M%rP7?n-+>C$fYFPzD-3i6lK0k&N;_zwa>i)8HC*6k9o?u*rKP=Ia@u8FKo+06Fi z5#H-f6h_|*dR~%UAit?k<8hzY(SdD9Bk2;)xzHVK_`RW%+97wviqcpe_|`b|m#0k{ z4buxI&E&{KT@A0?-cNiLuuHRlus+%Gx)7=$psp)&5#I+$7;TC(lzeVeK#RAzpxpJF zB&CL=qilMoC=5=11j^^;8l|D;Z8ks4%tN|Tm{IGu%D+grX99vj*1(5~pMMbtzi9*J zJz&o~`sItj-+P{>|3WIDr+|9ayFgh{mzr%?dK>n8jQaAqUk(xT8y_D3zxt5=vx|_| z8yVjf#{nSJ{dA6}EL&Xu`{J1T=ogLi{X73Brq0}y|8Kc)Ku9nxpYtS z#;`AGVZPd_|MM*)=ISioM*c`sEWETL)Sr}C5F&)PJ+CJ3qwkJ?U1j6Pj;X+-B}Slx z*~37;{P^}hE0MkDeHYq1s{#mb%81>ymzWQN{dE03Za2Y?a(xSBek}3RLet8H+f#)5 zSi%b>BfMW9HZ)CxnGdidCZwwdKfd=L)HmEN%Nwb=?0;V4_>Dkfx^lj8wdaQl_XgQN zJp(N!CD|yYuXjJv(x5uhI~FiJJJlHFwsv|Ge|Y$#(C)+7^Wweft88;}f|~g*)oQ|r z{Z7(k{l9d)_YQI%c{wyBM8W6Ay~W2%pE=+cXaDSQSyf7m^faOngKpk85N*# zB>V){dB;kr)QtK$&zHhx;(XaD=g?Aq0ny(W0+^e7yzv9dKvN(y#gl9i>z<5}mRbMv zsEs9>j^)afHk|Z)cxFGE?zP{A5?y?H0MZ2!9bJ;+Or-Kc|0Vl@iI?T7xLtS zo;N()oJ|GC(l=d;=<7gKqZE!%tVds((B~s0k7)_36nQB#8IF1Pb3gYd!G%r}Gw)3b zA&iQ737^@Y3nFD&ub!8!Cd%|?JOFmHh^7hDUvxBvrl#`9gqffO6!4*Pwx?xr9%hUv zQ0j1MJ{RI!zFvl|kHwuhm6rCxc;oj{_mKPIM|^}|=yvpG$k}W%@49#MtU)Cp)tLD; z0X;2Aor|wzZ+j@KK+rr|N)hP(*dlBUxi~(OV|Z5N6kdCxC{;&HsIjqy%Rc{74zz+> z(#OyWUQHjCPN#B5fe!mW;l|-yoa!k>%o^{ypQ*b3!;hXv zrOiY;iiwS|*BPt7Eb=}w6F<`al~MeKigeXNly8yM-H4elxdtK%dpHgfAiGs|mj-SCUIt`tj|G&pL(1QQ4h{*gBhOFQjHG zC$I*@9jk1asGGdNDyAZJ*#X>YW?3q4$bojqP)-EZ;k(f}aq&lhiOs5YW0+Q0yHT^k2>U$D+dwJgmfQMr_7XF& z_CfV$cHq0b{lArd)PwpnSjWc#tGBED9dmbxl_Mp=DMm1L#@1;W(T=p_Sgr#B@?$j& zvV!fx^}=EdUkeoR9vj%PX%{@}{&~@FVR!&(D{T_A70jRWs-y@h0tDF4-Tpy%HV38f zZC@Z1J6?Ku&J8od0<>w^E4OTZHPd$mv9GHv}BP1Gx;`j1vbPI ziTKz7TzvJh^+?0WhdbNVxHy^N7Dmam#Yp>%jGn+)mwj2t$Y&v_>%E*9GQ^}p*w|!l zPOr+UH;#Qa!_DP|^n#OmuD4P3baTd+%XZQk-A~H7&5!{bYt~u0FOFso?YlKIK340M9Cc1D_Kgx1 z)^eoco@9Z<9?p*V0&vJWm0fBATNv&J1wT2~y|kz!{KTYq`oqg|pJT+u`Oj$(}<|!Fqp29Laz$Y9tign6wI*xa0CCmx81J z;2WOE$vbO}5hnxQT^>B*RzxEPFlwxn&K`TDchNmtN5G&%#-x#9&>|h35v+SPR;S^) z{-L`9a;tKLNWo>^-XJl2$JK~HGUZz4A<2^BZ=$+xJ)IY=+T^nU4 zX;;)odGx$n%pLA*STno|E)jc?qpcVOCM{+d<@M`#H+aZ^J{Uv;MH-$z11tS3n?u5` zLRLGhbv_sPe5~RNIRqQBX@#9;nx&Q-GI_=67?t%u9!AM#>6Ex$uQ6VD_&Nf){QE-e zbjI~7b0y{HHq+oTs{@-hM+cVk13y~gr&kOR!6L^SHYRBL3cqu$_GlkimPvq$JI%{j zM#J_?#qwtyCi-ZSQ;f#BSj}`^MA^I596E~&manV}#@MuGcsh|~;=BsYtDMKJ=2kOx zWQ5+TARlOXW(UU|aw}K}>iZKlti~RKcvmkGj5UGdX)68GEOKr| z#hwkkxSrqoe2}p@l+TEs*HYT;rY-H#MCmu5=6V)Pp=Bpy)}T6%lu>j_#&K1B;?Qj- zAKM}}r$gMNN_=e=(^4`Qx9^<`T)0?)2q@e!wq`MVD~?q#tDiZ&0Z*gT8<#~F?4Hj0 z96>o!>*MvJzkvhPS=I8}PWxKScZu_4bo-B7?7&B%6Zzsq;y+!jJ&-) zeNcvZ4&e>>#RkbxRhz*lzuV^s3K(Y>Juf=5GFXcJTt+o3G z2a;`8ye{zt=A5W+&Y~QLPr(Ka0~2%#O%hBP;i-;(ZX_!QST-prA3JqGN_%tpZi!)~ z$AR6lhJlpE!?1q2yc%1*sQRg*)Ef{=eG0@~9@SEKaSJmZ}{@r3EQd zAnbcY6cI#Z3nC;05DY|R2@n)ape%*}TClQ+5DlwrAp#8$1pxs`w2FX~u!}$d0Z9nc-+TA_y?cN6-gkY+?Pbe(9OG(k79ZZ+GY*co zDO%W;PM*Zo$4|cVz0Z>l;{*rQBXY$?;XXGzZ|l(acO=HAIu?zx=N`qp!V;*knk#R} zcea)E)t_~<-@Sll78KTDO>J2aQl9B&K^-GLCbOsD0pH@2lS52xer#uWOu1jmW-lJ4 z8=cU&-PHCrqC@7P34Ilm*~KqJwO=+=7`IatJ5g19$N3rRFb;7=@@W0 z2l6!+i+w51)t!=1tfQeZ(D5VJ!B)h^-1z6@kdc;PzBt)-7y8gcg=;e=Kt+^Xw-2_q z9gi7eOBx1OPXX&rH~bZwep9g){aDAMB33~T}R?*@(MRcX&kRf)^JLiwed zln%x#@*ZsE`|N{C*zX7})x0lReUj?V74uFhAvUR!60Dh1?;Z*Cn;wXW1jKKc8BnAC zANKV@NBy5)g}B9CnF<9;Rxcjw;KINMYwul`CH3?gYvI5QQC|#G*a_D(fH(I$zQ3N) zZgVleu+!v2;+8h3F!)=jpSskc6l`O4df`WsCO&jMDkILEH712CRa6C(3*hrW3iNMY z96;Pu$7Is3i2+?!fQ$6q4$6+{saTwr#1{Np{a-pLe%ApTl;z&4$ zH}M3R^G7sf2RcF7DSIK`r0rGWP>8_4gND?>3TH=ob2<*dOalz4;ra<=hKF)tukB{u z3uh&axT z!Ta;Ce^gg>B#ohDw-XmKRs{GZVFEF17*mCLaR*F5c%$=7CLK$0 zUg+g&7DiwD`fWz5tYCh8+`@E-&#~4LT^JScvV)_$#WeoBIn`-+2!UTYsIS@RGRhl$ z|Na@H=^)N;O7ER0V{jRr2G+A*SHHy&zX1#<%Fx|;98~hR~PH|V_17`MzDjXN88&IhYXez+xrl#h1FqZ zs=%}UTUJL?Ps2<^ppkgmn~!oA32HF?F5WH@uTfEJw>300Zm(RCwb)tm(53r<@c3jm zFRa3k_u>j(wXVf_F(Qz;vnG>YdCqE{gEG-c^!^Ne;KUfpLexk`Muv#>MMA5_XH-z+~%THB5hJ);0H-^31)Bnze9ciViq3Y)BZraw-Z^|*eFBo_gr`A+vnE&K?)bkaKD$VrVA#GuA zk^brf;Z)MnJSrx1M;(Ep6S8Bi?18X|4Gu_K({)LZazj;|vf#fgh6X)NIqpuFdE(&ckw%M+! zyj-M5@XtIMx$BY(Civ(SF03PhVkhO~C6b^Z;p|Qbfd7*`X~_eBbtpX)rwPy_QU`Ji zW~aQMk!&uK@EvHjVdFO7(%06AqOH-0AvvF|ZC~pq>BVdcMUnRu{;N7Gstr77dD1qy z_=@{$p2$&>HFei+Sa@8%_)+)9<1auu>4sqHeK%kb<(tcUt>h!0-MCh)v+mghip4>2 z2kqvI1c;J=qpG)Z>?TetB#20vDwaK4C&z%d^Hn5L)g-s8%2Mi+{V^vz5;kx#0JuLX zLjJrq*U&I63uKG;WVj3GAXx2dXOE@084)kg4ZMBNBD+kwbM3#xsyp_lGb|9;0rh0_ zcvlQ7GihFYd7P5y;aXSZULQ&i1AScUK{KG!}I>i8HYB5)9<{?$E!ireM z61r1ct4GGzb;fo!2%(KeaEYbV@OC|KOly|R-TcbrDJY`X-ZTmC*|gb8v9%PrVO(QD z_iBzny5u|*j4&GE=H9tZ_f2O5MM>z_AKFwrQc!7$9io4L~3wC#~H6%!*{ z%9>FM2>~%uRV^9%%~$&hmwnavH{g0)gG-Bk0df_Sxi)zoh1s4y-b0M=vI~Jo8D)KL z&Dvr=)qIfR@s7f+gu0nb4XFck@C_xD*n7xfLAvpVK>D4Q)Lqjl%G-5iyIbLG3h_sr zCTVNE{oSRQUiQR?6^P|Km%u)APz;IHx+WRahGguurH@=X0AUFIShtP@`pz#YPD@(J zXXctem_C%^A}v|(&|8ofs130_lQ!^7T7nMFy6~07w8Uo?>4eYaRUPb&QhHU-A)x#m z{Z<>s%|Zz0D(-M#)aLu0{Ja{;Z$9jwma3A4Pg789RzUxhPB@96m902IGUDp34}`@2 ztRhk6Y1ZyQ=*L~XZa|Ig&0Rq|#mDB0v+O8N?=xvAmwYm9NBJ*(en-7hIi65mNRYZr zI+a;fs9JcwrPWIbE;9pSaieGEGk8nbNYv|xttI=vZ|t` z?!{9`q-TXTL&0st`IZWtMTLET{^8S}^it~15^{dltZ%8D&kxY95VuNDi%1ocW#E~1 zH!*u*K{~>_ZEx}#2#Lu zo!kc_`@+>dVFc5lr*Xur=G~o@mWEY8z7)Nohyi$gv5gFC?Bnp`u9cb1pP%$l&QL3Y zl$|6|bC+DYMR*RP2AE^DkbB&U{;Th?Y%42yeA|yKLG> zjLHCgHp~)Ur2Y|G|1xY`K33$Pw112D_OwPR)8AQ9kR=lN>7S4~w@Qzn1pql-0(Nb$~N%!NCi+6phQs>W!xF$Z^TrPZXdu&O^2T)o1@96xYVH1fp4BJTd(?)1At zt+23ei1@WZ%e=3?p&s72`|0BM8VYyLvWgoA9dUePDgEd!0_{+EFq;KDU zseYm;KYQQO%JKC*96mPC^7v7pBx3SNry$$jUcSwI+94>L{`y#8Jn%vyXL~z1pzro# zqB#v_(X~39zqr#mW|A}NApqRIoaY;=B+jevNgbXfHX2(pe^F)WFDwtDMS?R$ z$reD6D;8ZY2_t1!+Z_}rXkem!wWDnFy&pOsm}B8@ak@LV_~L>LZyU`}KoRk&SZN2n z1o@aq@?@Pa_TYRor#36{7?m76GT7J`v{U-EY4hD`xI4_!RceHlG-kBBIKhW0Wjw5K+GI!3zAw_U=n(O}^L32H;m~??@z{WX#k7 z$6m21RNP%n_qcpCm(~P;uMjPV+y-T_9;4AwAX4pS18wbQzzU%lwYwFA+0wv4SbD9<_E{Gvxa4Ymo8esenzz&rDs@IrQC1?@_P28@GO=Z=Q9`eR6POH+SDD zEHu+RjSic-Oc2Z8r*56vcZFuvszI?EA#yHD+8a|Jtx(<^^TwG{SBf{|pWOH6iHxOg zoewH6OC_Q?#1}wALLju}6s-YF5)^AL`2*_9*862iOB;0;2lh3(m<4>NckRbbFm2?PPMPbjlF$Qpou6y-d3|r?`TR&ptrkR3B|dP z8sPhY1g{H{I7ZCREmeuDbc+xd6%8L7PnECG57PkwCKQgH>+1sFghJSK(aJsURB=+O z^k{7V`dx+lh+%Kz1aXol(f6a^fVy4&QSJr%^ViidH&YKx{ZA zCX4_|0+ViKoU)D-aFdyiSLcUz=`m#^p~}rKp2K!bPPd$XWIbqtYx7riz$Nm>raU{m zz1VXsB)knOZY#x{m7v!`2Xf8%-I z%u-^Z*l76PKwR{qd882H}xLvx8HBI-xr zHMI}vW;7DCNnH!~lGRZ4y1OT@>zS-3CpyRqeCz|`WfjbmE$wk48?)k33+CX7dXI?T(>;jb zT>kCOI2bp-i#mD97tnlL;#|VCB8BnJF@LUN#>a{4CSu~6)JVsXGu57qQ(6Ugc+7(! zvEG4jp7R{ipoO>WVrfdZ8p9#W>@U#)>W2^&hxuuHovd~5{VgS)to?a?6f4z|&Y=bT zPLMjNY9l46WTbaNRp4a~cn^O%eOGkdr%tl2D1GLRURRk>Bf11M#5?LxMuzhDT>gbc z>CS3d>Qo)v*-EA6(qp=)d{bRC?_}m=yh3LdwUu%kUB%rHI)32;b)43Xyxk5cJCNVY zT+|DCV+`8otjh}UM$LDj>9xhoDaJE}?qi8jP6brf#WCkLd01=sxNQdmvQFi^`Q=ZTY5L2UB*PF54 zkgx@sO;QRlTGBhnEDm3MK0mbI@R@JFP-sy*RIG|){(E`)!UAPPck=g+73KURcnBY* zCK=Ay8GSB*7QW{%)m4*xMKtOtT6&{%1vb?#Ea%9863*9ZB~i-r!JmSS$a$%!8++Tc zvfdymj&Wl;VAD<_Q_aFw9W8vHk8O2Jc&0r4G=pFjeC1mvc3%X$CB)QfeO#ew{DZkQ zV`J@QA~t7+YL@W%8HuT>rEa8(sm6jv^Op+y-QC3kU$3fKPk{A@Q=fD_V4Rk9I+3%j zHz=b+b0>R@>bfX7cmMN6ey-$Xg;DiWS;W%h+~6|L_Ao=`IW==5*<{XOktRaLmQLz( z!WE;TsVWb@Y$%V2ddN__yarXWT4-Kd%!-e$CxycpP4;dNTcrMH`LVj&q|6nI&20T3 z-*gXP0Kf#!Q-aoj-(LuQnf@jUx&GYQGbqML&DEbfd2&H1m=VO|6R$84GM%*4;K;a) z_Tke6%uilK`T*sUjW(J9)3IWy`tYXg^bKlWGpIgwdNSlY&knW?eXGG)oMb!0UfkyP zkk0eG769A*|5&6vZv*9)o~r$QI-wPADYe9=AN=HZ-19(3idBmGoII(tPS4oq2|pIr z`GATaSWMFv@YweWVbVs2Gwm<6J&b^gxG`AzPO}&>X2ld0%d17NkyNKjM33|4z`{lB zUrn|ts_Tnb@lUER>MNOyg<$?=xxWl)|Rl_d#-2hy$RLj zlIbG}5hYz$QNMieYWp(Qv$U?t%Ng8EqqLUeK~*1^8eW0HEU(GO_gV6yV7+_wUs3fT zouakYGofcldhb``HNy3!pBuGp8@A{{QfZp34hlC4j zC)1mbp!P3AIQ}tXKC0*i#*Cr__(V;BU-4gkVC`zdy^#-(RBs8T4EOd;A8az-oA1eu zcM!zuiJn;etXmQBe0is*M(K#ka%=cHh%(HlieeZKf1&-D8I&AI^_5q7>6!ekm@YWe zU^~inOKQAT_Hk%SeYi8GZyx?Lrd}18Z`r=>#a@!9@r5YI3kSoQi((ceb;-bwKy@D< zpRz<8o3%rt)Sn;4G#F{UQK#$>4a z&4t-_N7wmaW5yKT7a?Qk1Q+A2jFx)@dS#1v+RbqJ^Bj6bTj{*`p>~UKSsuhQiDY8d z-)>TjvWBDvyhQ9NzMqK)hFsQ+rQa?5SBx&E`GX3@m5}EBWBSxH*L0x^vC@lsl+oAm z;+~nywOKjjx07VZ?0mfUZ+(Gj7-j^Y%{y4%azw^H9sR{~NOyVA*Uj7&`x4K!(2c9( z`@o*9T5@Q|nqrosCE6nk{;e+_Bx;>CC!Ry})|FnY^^&;*7>*bgH1}TIx%Fe1%&985 zqlM0YI&AX$p>wf~|9Czt zqh4laidr@e>9n>gDAcW(H;<_Ddtz5?UVg&EV8Un~Epu)KvGrj_P}6zgg?ed89vkDk zy!VMRx6cwgbhT}?l$xi@i|b|uoV4(o!XGSj8YY@8x4~PW`^5K2M5SU3fX+{9%ZjrT zS8lHBBt5k_ZSCMgO7=U#q)L(l^3nxmaBB+ zyFd+Ujdg)~MaSMV6-3j(RZ2~+dF9HJM&q=UuQfK}r0wcVDi|PMOzYyePNlr(FYE6g z0cz`?D{Cy(HqhE6f2L3wCK~+`Pb5E4=9fQzL&i@EZ$cwxX1SrXp&Px12@Pfs4+lCO z(BKm^L$?p`oiU4RaUe^e-SAkW6qAhE$SWhj@^azrB*aJtz2!I{ii|B_ne`& zCPW8q-QBc1K4tdmP6oERmm+zZ2mZ@`R|_kW)@2-=0w}KThCjy3T-+TFSvq|lYq$=Z|G{GX!VY91qV@7*hu35{w)I9 zWkxmgeq%re%!g16E(^Uje09;MaeE4b={KIDKg>_1ATM9;JkV2LCbqBan3U^eGM+{< z1nOnofH#hCuP)KOvB(o-TlZYUJu?NKiIN!jzK%J{qGNA^`NIxa)bp6pTSxwYi{FD$vbWD(Ii7vaD}I*_!^SW6epp|k2p!K5 z6pVln72*z`qF%#(_i^6? zSp8-F@Ocy96UTo**6kO?9PsElNTv zIp$-~>)lVAbvX2xA*9zP0M~b!>9ts&gjxkRzDhs`udY-Tv*Yn$PiX@RxpWHTPG zgRNTkeQ|>|p(tE@Y)p_R{dbFh;SK9i?FgxeTD|yQMb%p8JV?|1NsT#Rf^i<%ym#9B z#)bM!_W#P-yS1kreT^Dp{ic51a7q@$BULJlU#qiF?t;~lF%Mp(l6tt#ybG?SgUs;0 zJs$m@ChC3NdgvX$m+D>;nuD>!o3~hhlhxmZ^}k!;Yec!lG^BvF(U&k@q>QI=-#NV! znWB3&EELRS96#??H?m}E%a$<{m@L6MtQ?*GLwsjMNH3yXqC|ZpK>{*LT4toh;~V%Z zh~e(7_-Ct#06{9Ln#gagE(*hMX>A*>35*tBXemX2rl!3-l3H}_A9wjXfU!BW&G>$% zl2g;F46)m`Xn#S;5qjU9ZWRkDFDtOEV^#ji-o4~t_olu16&q|al&^f&-m~r}U)uB6 z^cS!)Trud_uWSyF2Pb!>769jxq=yfDVE*$4P2t~S2(`Fb6KCqqw+4%ciou7h9>ArK zE%k%N5mf%J%}m9#ANIgc#{bXQ{-1IFU*Fkv(UGb&^A3GvG0kR80#7L1U=@#0go?O} zoCVAe&lz~a0GOlRIu97VlhnAp{Wguz;x~Qwv996d#7n#Dvq2aGJaqBAgdzU2+t%)> z7ztwMD&%s!**F`MZb*${es}!)_W0|sS!oYfO_?&}t{4;)Zv`>4nxjTDKV-U`z3@Ry zfVrnxQ7Gz6E;jDQ9<%74XGZ;c!4QNlSdKq9Df$T8pHuCdjp5zY@mQ}1G#M{41h1@~ zz|DPUdTy>S?Sl^2mDGzBE=t}&C^+1C_)%Y%QoKkz-SP?^d?;jnd#vFphlA!2|Brun zgS}uLldCc60eZYY)*$l+av261+l&OB&^+P_<{E0h*=aj5;t@VdpyQohpJ97dd>`HAU(TJm)WSzhdeBusoK$PiWZaV&3Rt)*g`TY2!Fcmr5yMGX;mMe8t^} zD$**^w(wm1RLuTp(b404rm;iLF~ITJU{87KLgPcT${k<8><tYb=S|#(;XuGd|_Q(($%I+*`#Xt5W_OYK1#L2 zmqMzOR^54>ol@Hnc_5gJdMr(V_2=o+3q${nWCK4nHx|&q=tTODk!Ooy-r@-YlVWUe zch_tY``E@NI5XoXY%2U056Qab-10LZUa-QBUMsd*Ss~QPkLLwliu0jM_QqoU_ZS&J z5mGsep6SrudVO&OD5D6I#upwYBvansE1}?j>yNYOX#AA%lkj>0_vbDPSeFmjjt`Lav7iPFVL<_+$HZ*uKh!%T|4cNZg!KB!hz@^^Z2kSwlp{uaZ5=tuvO5I!B@) zm6uC07IP?yh(!j-GRciopUg6&%ykIEhND|6-2CbgyK?%pL|^LQ)Ow6*$!7Bd#9ywH zeK4%*w&SCW@=Z^xO+u5wA+zt3)AYWcW`OP2_UAlLSuGJ3EYs~@-i3Mq)3(^mtt^WzT0sOV!0B1#$H^laeXMrw+r1iGF?IcG_B@DvWv z32=v;^}8w1v%N%faC0+``*rKOeDClis~q0EHG%OkKoz+FAEg>SCilOlOlt@=rydHn z8h78hA@NYU(+U^}`GdQEJ`G~;aEQRO?Fq)A6zq4=OSckp-d%~#h!Ae)od){`I6%o@?jB9=+SWU&&v+ftpyq4gRN* zS3yoBDGixzY(5n?=Sdnmr>ob9ol;vF*x^*Z8>X_OMNS$$5o6f}>oXl5#Cj;rMiVtq zg(~$aHkRH{_Ko}u{yo|(ZKzHS{r+R`4c_PwT^F0tA9G?E3?e=pf*6|i%)-*d~JPc z#EttytFP}7oFW7yQ7hCF=9-%81MOD||8|IfSP5oWo7uSsTR-UOSwrU(%{iqT$Uj3W z)0}q$)He(s%YU|!;GZp6R0fPdJuIEQH=negYF9n9a(HQA;$;X!;$e1{^P>qs7 zOjZ}8_||0gG2>2;xH4%&NlluyqRuwGrR)S`;rO zw6E$@`Rj?q?!>10yp9+|x4%cTaaU{VD_snSb>zsO77ab_TrsQDhKFoZhoy7GR64i- zab25gnCAV?4%vlPc}IJHrvSm8Wqnzj)(&D_QNFXF_Sv6SmflbLvf+?ymy| zQ5&YnPeURt8=b}F@t2-hn0jqbh_OG^b0@^Gp!77(5`U?E z!jgRa;jp|qQjG9A1x7QH9rI?Z_1SrxXGF4wswWy-N5unO24UJ)UsU;Rmc{mmd_;itM`4^Jl?tH(>Gw zZoI%3A=QY3Xr)J^-fdzenZfq(VOx#QkofWM7qV!vma--QpAVXfdXDiL7gr9WX2=wF z68D=I=*fL(f!aVVALy~M!*X52tvN~DieHhBmO*n*qRa}8KU6b8ZCFYix|oj!*e0B{ z*`3vvY1vsHo%EI|hfq2a?`^cc6XJsL;}CH}M7dAQ#slopb2&3mJJI8)`m8KStMClX zqOAG%N4_W`+QpirL--ywilEdr3L+|2`r)~ZiJhyhN)S?xJ!2Of z4o|1ZSkPts<+JUXu0Fe9t2oF(ktI+!4daCES&)h-2dTQ{p4yjh)@d-#JB zs9u&e9#JD1YA$W|$NK-sEPiJdQBOX`3qL^O1~NB8g60}`e8wG= z*75!|)iBbaN0PCMOcNu0?F$#3?i&s19+}b2x)9ew-lWV&~kf>$3h_e0~G%XQmL zpIm3L70^e-Q<$ZhzKqL};?Uq8M3h4oY8I|XQI2~tX`YPnt?-XL8@isi2r_5!>4eqO zAF}_dO(&^x-wXo z^|iW?g(Zx%n| zQDHurGZD&6mHA%~5x}rU-4etUvUE7O{>BZ+tM@ya%OavAPmUOE zCiTA4i6Z0+P8O(Hn)!Lb6r%m!m5pLX@QFPoEo%w)1;WrV996`AKy75kKaNV&e&8=jWk zx(oNZ=-zzxY?81_Dqsv5Xg2DthLZC)jWJi51ilyp->-ELX$71=;?_-^SxgHK;kmD} z4Hi~+CFhiiyOH!GL;-)4jwQCji=^a#fS*7x;(YuTxRH_6`1W*IaeX2b2M=eeRSNjlLBq2+U&Y%MfjGFgP6M$+Ul4;02;1zSecR+%e&> zx!P&9P&3D$ZI2`@P{~?FKD(KB+5oq!f%asyN~*`jym<74iM0-XWtW|sT%On9n^|d2 z)DY7c37BlUvn*T7?hyA|!)YdL2LsLv4Z=G175xjf3S3-v?#rVUQF5HMLUoGc!g*qJ zXKuDxJW-ocl@~FFlc`Y1cGswRVW*N}T--XFtx^)Tuss^PjTf^=xeolJ3%LQ~-p5ad z-CCauDOpK(wWMZ$eV@y4abc*PpZ)WzfWnBQsQtKw#oc!f@)3s#`G*YeI&QRxT@Arn z?jA=v`<3|)v{$Nm3He(*P-CTPhe)b#lbM?88yKni*i73N@V!y7o2}TjqHQn1ce?&E zNuvm(lq~?DS)#hzuy$nRO;sP!Nz_0UxQxf2w;Zh5nV(_f_luW#eAkh3sS&m7ahCAknsYce7%;R}HM|lnTuE zKIl?&IE=dZ**+t8GQvD>mTHYF7o&u}hrZp-FEJi?f)@RpAcTJ? z&X%<7Wf#5}HKZ5o18kQgFUfkDHu-Y-!eQf)$B~>tLD0KW)4t~@xgE9r^4(OQoN51b zNpE|i=G35~P)~_&xx)xeuMX-U6=n0Sp729)>m4OcatF(HozY&jaJ6)^X}6PRV-8^p zPZBTA0jnl)3y<@m{C`O!|6Z&4%MMe*;%3sPcRs8WsjvP9M zSqcoRw_h^QiP%e=}%Ur+E6$fS}us-etiDLEE<${ISj^ zBWSz3$3_n>)CYn-^OSl1H8vP^Rj7$@Y_bKMzkfvz7!R1Jk%wZ7;Ez`hl@Ml|LV<4I zQbpQif^Aw2@S1g%ns*wV^^VuM>K`=2zp@T{7k{zMIP-d*D;kiacza{x6CWxBih)td zw=V^)Tc{-unYUJiO1yU}8${JZgJtT2m~ks3g1Cu>qRJeQ06pJ&sKP+qu9(d9K(5+s z$>2LxooRd$x*3r&0mo%Js8PyQynw≤F0CT$NQ+<`lgjl<7Q`pw!2q!|?um*cC}? z%1u+n)E;=9bC`|?alKYkk`de=To6;!yC+j*Efu`C&kn2G-kt~pG^X;*J}SP@aLvzL z{=l707N-fa>&`=1Nwq6gHI`%&)$Mg7RqqUBe)WdME_c*>^cEC#2HD~?!;LP}a%}9k zTRG|4&lY@@hi~-#Bdn8?uh*74Pw!C9I}c0_9d|0gw=ca0a(kqz{GxV$S$hxSGp9-z zUwmCI+hK2-uKD1cG}pRqZ>({f0r5~?X-QR3tm+wxn}kK(VHv~O1i$3}t^Bb2p*=L7 zqQ2=q@Esw*kgxC+v+?S@VDAcDDSlBDGxg5ShOY#``TgGL(aMJ#ep*cI;Ql{j#}7u_ zU9hKqnd8|{E-my9r8P3xpqtGFsVCg?aNKDhULTM{pdCM-IpcZUUZb{OcKLBmUCNet zAOVwUghqK$c;nTtfybg(*Pkc-5Y_#fc6TB09q3mCW>+I_{7-hFDut#BnE?MRsMy@Z zTEn0Va~iF5dB~3C{ESFDXddOPo!9Po_)}|oNMK=*KYEV*>}aH|oTO_w5F_U~=096z z?kYUMY6g4?{F8V6=9uK9rOG%OW5%m{5p^#aFhu{rHC8q3!b}Uk?d&0yIMbe2_UdkF z(x&K23H(vXiFzC}W~5}ytTC@2{Ljw*bo%ELAKpGyTeod4C-*^XPOw75F?ow7I3=xR zOg_u0$oNW80GGOp7=&(0R0=mM%xRGbNYD@bAPEBVl{YzV&^V}>cS)J^tizo0lbud7 z7dZ~I)l-tn!>TEglf)>7-qKEu=uB}3;fZV>;mi(5@;V&gG!*}SwB#$v(#E4_l%`=b zkg_BK=y3CyX-9ULDYf<+(=giyKU7bpsw$$NHp@mEKi#YeMGKB{dQ@pKHO}6sl8WKy zH4w|^loltd_WDb6@B93k#4h=*&F5nM&&{C!DHvkJ!i(M7 zaR##Y4e1B6mM*`gL5xsX{y_{!n=fc_2d}6IuSd7RkjJk4*=Fv>9y}c}I4wi!n~++V z*5+pWoTE4y66A`gR+QbaMS;shXc8-K&onlJ>$3>kdqHDNXya?ywGWC9S=Yu?A8g(( zgp92m%AzomVDU#t41qJnCXM~0GWyg+uNBO7_nY_)hN^gi!jN|?C^TP9OCMxi1@?+_Q*|`-H}nw6wxfR7EibR2c;NY=Z4QZf$KmD2G3DwQ zMm}N}vzN{c-C1dM*qpiyrgPj9rUH7`O*5G&5$?iy-gw=b-T{+TTBcWV+;JuYgS|t< zE@8}EMB5CoK~qfsnN5B{%llHD7rpf><5f%7Yu7u%`?26o$V%dP(JWc4u3ETk&8{RKolv>-3*LemtpUCZgjV;QRCp zVmgr6t9+-PaZK2qzmtuXRC3Y7BUg*D;|44h>$kBEYC2$f34gLzP!8?c3o0+98|tD{gf#ltMQAPl0LR;`-y(K_KUqI&L3o zi;0`HXY!f9iw!;biME$n##iM=1DZI(^PC?jss3f#-SkLNDJbD{(rS^poN}SIv0{m~ z`|*}mX;KQIZ&G$)jB4G6>_NW4(-gIz7aNi-6ZAP#8r6arwf0Ws=17{1qwjZ4Slico z2I1YM+e_b^kA5zaA*pF^)h9@wplT;ggfd0P(mk7SSqJ47-|DRYSo($_?@C5ce9}E! zcVTi@2PAy_1*~$2av%Q+OoZ|$SF_~%lQ}yeneG{b(zZyp1 zMFO+F4b$}QgOee%IeX`Pckim6s8}{h=oar9t&M)Fa6ht48AK!``Su4pMd;l6!@k#OqHj<`j$W8n!*YxF12#Ln9szpnYN?@z{z9{6wn_ z>lcME8FAPX8|L?!cxVZ)NfOrBqzYqe2pm{Tt4HZ z9*o3Y#l;$63{H4dTByVhM&fl|1(6=`$rR za#e_ni=Ba>G1dN@Yv%f2U(IjQm~2OyJf%EVdVqsX>bO*68cgke-*-rddmYYmzBKBj zVDXaPkeui6fn0Cj%&c#cd3J?$^egnY>`O3-;J#H%vN_YZVjxc_iZ8o~FtD=9F^ufY z?R12@n6>&i|Cp~IxE6y~UCV=10x!=8;El5#7vAgh_0;b=17B>kp83=+4Hvj>C;b&+ zO3I15-LsPsQx`dlJRg=aEr|`f-Zt5#Uj_#q&c}$kN*w%kqAXf!?R-)?@S}1dMhu<9 z#v6j=-$i-K+RHvjMPhbNyx=>~1{&}Q4a_hVnhQH#{{gABg4gGRHOlO_iacKe>Fuy@ZolDxLu2fZ&!^0bAP^fws5 zqKw9OpZ~P`NXFzS-c)l_aV5aNwPtQ>`+lNQ$K_)-6%+tKmBY(>RVcm0w`FEg89QHY zF_Qb!)%65!VeOxderh7mHgSvbNF#CRg(j3ELB(8Ho_ki1X#RArp+GKg9*%aEKk654Daxbdt_tHYEo(`%>Z%=0QVCTk>A|{@<)yUlgaTfwP zg|EYyxEv{?w9dX15cp1paBQ4BpT#HflAL#Yp3J|pOnYCUx4h1alKOq3(lhRFqT=6N zI=;J}xbAoZ><>7&AuQ=@#wIg&stBKFGqx1H@w1L1bf60Lb=?67EOvaF;Q|-m4|}JgSN#*KZ*%Sw~m{ zp0bUCf5DvMrAMjQ?qjVn{JVD!tS=#duKZ((f0+$4uxLhbyrL{u9QGfxX-67_)=*Gx zKN^-ZuYDXp@X1if?43bRI?q5ZHrADbmkI`NTO^ufDyE*Tp3tWz&88t3>rjooQT8E= z;ik98$J>*x-2C!&EU{i0b;VLC12->X_pLPVVBKJbtHcUU{33W}%<=aGe&-$~kAe$6 zzXzg49-ib|fjBePhkO`kyW}4o4~78pjCHuMigEv$tL|pBJo{AD<`hf2T5_HK>NF|S zyPjbLd8)QLJc@b#zDKFnTu&t^yHJltxoxB+EAw+jd^&g76Y$IQr~j{P@%JSEr+fT+ zz?FW3a%IKFA--Lw1G8rQl1o}Hj|GxnnfKLS_Y`pkanD~>?acG&g^9Rt4`&!$47ydB zGwY+FGYs)6qSmI({*A7e*!*;*kj?p`?$GbMf^zaq{4a=Fs0?UVRj%y2RahGmrJX%V z7~^mF;0;>cyFRSm8EamK7_*$7{MC0AKe_){KE7dkn)D6paE@tHvdY2?uJTY0Q^5eQ z`bXIix4MehH)E-TJV5pUbQ{Ra&hdatk9!D@+d@_(PrtvxUM!$XHq|=KhLN(k)Z1oW_heXC6{M2!@O%R7NjJod7@zH6)5w+>jW)ASVzOUWzdc$p{)y_+)!SLuH zRbe>h@nZLbVFRo(@?CC-2ECkG71w^9maoMlaWnq~ z8V;a{p);KG^cVCB^+-DHtwxW88>UQ`6*-uF@v37}Z=0vWwz@UmylZwS8=YxK!71)% zH|yY%$6bL@AvVPG_2DFfb=6hX4(~k4f*=$CdaR=-&INC z3n{;N<<&8!E2X2~Cg>3mwm4SFFIMK0In%e5{tn0bv|%w^YtE{1Ml4?-gCiz;xWLCI zsUyyG@g>ia&5V;)Cmr#yEWoDVVpNL~6r+Fkn9@6sj&rd)t*rQF?m+K+Mf-Zd$T>Yp z10tB(Zg2G6{KcJthku@Xa>aDBhy#%Lw#_r0P`irJk;5y(BCq9Vc?2Q+_?fcx);C~) z3w-NMa#At&eA`}K0uDw27lv}+?WLR}d3(R*C5YU42(zWnIGL?Q@>eG?tZmTtE4B^z z@Y5=`P3f7K&3v}52i>jnqZPoJ)}3m5Q5g{@v8`^mH<5CETELdMZxTYf&6 z&f&S7M*67U8iWx!$F_{I*0C@F;%pVeePa=N=+kQ{z;J|~8#S%*+RgD1=4;C;9*WVEH2L%2zKG;Yr@R~7tWXbtV zRX74T$K8Gw4RE(6iYv2=%}{S1m9%G`IkCjswYR&&zto@p z6WBh$x&yS#y&N7R-#kwNDTm07JC%T<0HAvBj>jk)NSJ7-=>n30v`*PfO&D4{$uRGz zJBE}gnAv*DAB`(!*M2QNUAoTMX6M;jr4oNkv6=CJf)0jjAx z!EeOv2-|TTCh}^Xty--|5IMa8SgGyo1_b@pdGc0{3s|=~EPrD<2Kz-LboW*)fta$C zsxi-}WNC}p=1z#ophL})LhYC7%4c-XX}rfM1hQRPg{0vhUm?mza#v25TKL;Ct^hzJY{&7P7D%xUnY{d9+tPx z-Q*x@yIkAF#sT2O@gt_$ENRdD_N`{Ky8v-{X_=#0IHvdU7W2BrSi9LpNqd=T&MeEZ zYx>$1RsxZlnwpJXI}?BC686n?(!gq2gnjr{3X6G9xm&z6Es0*O!MI<6Fkf`8Gn->+ zU&pbu1HYUcM`C2tSaw;ymP8t0rDN-jU~DwfA1O+B6BDm5U*u3yQ<@r?Xwe&HtLGI5}# zBjhsfP17AYpDMgGX05d$s4Pf~-L{!tsRT;r79J06D;Z3&oEa(jY;d4A@B)Ad>oy1| z%X+Dz$Hp5OlaDIlMX~dNsXH5FOkiYARc@H>UKF811~exy;$9_*i_!ellro4dkyEfP ztBClfuJ20D4#2Rc1^xdS^!Xpc1`u@B4}ZVH(0*LR^bk|g9tDyfqQ2}I zg8UPLRNE%N(gA0Q3w5!wQ+3C&`eqIxnKMja#=2^Y_nTi?RZx&Uj%{IXClH zd$@g2{cQbHZvyE`_Kc?9DBx*6!ndi)b}}_#s7KdZOscTn{vMQ-9#z2zNkmixXgMtL z$-QoU6=m=oUBdSSRIpkEGiCOp<2#xrMn!mzQfhF@U#^lqUQ#G13|JME)0|{A2JFoB z+(pt&Bl5+HH>55oU#2^};91Sx;V^J94JfDEDlfKV%-r!n!&0jQzF^|^dXygp4?i?f zrMF_WsiaR5n#ou>ILO#sn>p#dJ&&-M`=kf5c(eGwlSKKRC=1sgME@)NPv!+X7Xm*q z%gJ|IQ&7tHmZ1q{uD=dQ0X%L_ajhw8BfW#l^DXq{wlqUoR25XpiPu_$! zjE%v?#Kg{pfhU}WMhnfttQWIg0vL?(d3I@s7^a53}0~p*ETwGey8qyS+mW z{!9_)lzSuXdFF;enAjqbR46S5s+f1JB=ADnw?jRlTU_uN&FwC36)~}CabD^d5J#%k z7xgxFuA3<`D=n{gTdXx~&7dWHf*E_8bfhTXo;2rB!&{qh`j6y$&6MlQ0``fRS8J$S z!@4D&2Dhh6QsD>ODK@Hi(0XZW_EKZVm?t-L=k49L*=a>sdcqW;cXo6cfJ)y9CFIzMB67~PvW#(>IN;bT`gkEPB+b|+ zd@R79e+j~w5;n6t*{dk98K>P_ltZN0M>$lwjc1Rk2TPL0fGy#2RB@Q?bdnE65WQje z;r{0jZ~uV7_Fo72-qt$%j?2^><$V{v8@QT`2^ZB!37hB&Ey7}*Ya$Ku=!@`1sZL;^;?{b43UX~8Z-I*j+ zrqb6JeG6s@;b=PLQ3>lIpEXAns}E-OTebk<5-ua zA4n?m;FiU(MtfsH*jua-Of64DT@}R?KoVnIfSJ)6i<74gJ6NE6ij8Ko?o)k-_Mi9n zp{Xt3JG~`0cu}HtKBCXt^?Mt@^>ApQ`mc9UpArDA@(UZ1lGm-a{qE|}nJH^J3!T)9 z#sq0^(YFBrA1(4rq3u2%@BKQ6ANBmbXZAcU)52lpoSdqdVy>7m)h2=Jis_*34<|4U zEAJhK0Wu7-F@V?Qzfki-$ru}}l?DBVS?(WR7<(wE2IRvdq`fOCBH*DHawpV2Ci>4b z+ozm%wR0$pJN;~;kgxp>r)l`g9TJxGuX9wr<**MrpEnm1{Gq4+jfDSq>5qe`yg(JD z%B`!N9yrOP`)DDDlruXCV!9;#p_=SPf4<8n!6}k=l=Mh<}y*U{b3r6gv%Pxprh&u_H(h5v2N&Msc)K=$evy1ErkovURt}k} z=GN&XyLgsp5?kH~4SWcbpCm-TS2v3lxv$jrHC2PVOut2b@9xarTHuEcf*=h?vOVQu z2g6Qt0Cb`G!9--c!nixJ7CoUhL11l*nKY?k;m>tL)j=|k)Or`AyP=MK2s$-j{0xE` zXA#d^rv4ESDJmuSWIAd?Y?i&N^9!cP>4oD>P|E#jTrcZ-M~7ZPc=?E=ic~anHl@by zUn;fhImI^$CVv)zfQ4Y9iZ<))Ppd?wilj2)?RdlUAyK#`=#Z@Fb@P*p`w8y%$Nlo- zQ!>Tbo0F^M=9k1#Ph>P+UBp~ux1!_ID`AY?O_&O(g6OQkG zKJqldpCYk3g*mx*HdwzGa1SQD*lZSjCe^+{gI1k+A0ig;@=sRgEv~DEF2br(VVKcX zWE}Gp%wGkysSsY)Jm6VXJ7y+l0FQz2IF@VZYI9I9o`|^XNI#LwjbU1jb1)SUg;up=I`xx>o5NqFuCXxO|pCU zfXc46Wdj*zs9QQOOOR+^_F%11H{)Qnx5hdubspjsaKkpGewLeVpM6RBt%!Q+_}BLx z+)O-^Pd1GEy`(JD6x;HaSqP6fa6*+#w})FIlFmF$x-YEEly|guI)hjlTb1U|#1Q?Jcril3B$gkK!H1Q=V- z7db2}shJ)J?${%_7IHd}vTR%bU`e)j<49pjxgiJz(&gCyznJ z3XQSYYLSP$Bzu5Ot4@z&M{ihk6=0gF$m$nS!dPXjx}@|yEZmqs3_#~DO5-jG`TvJV zH_2~XB(avwG99WhrY%Lx;_p?iRz{@5w~3d*?I`FC!6JYBr?=t{Wz0we1>T#8&!NHh zDsSereyVLSpqZc=Ji26=qT{j50qo`__SPdePeFc5!QmAG)Mbep+=S6(l~`>5SSCx` zunp_e>7NkyTlfBBgnvn@|1CPH1cI(C-2SXivIwOns&V>f52cQCPx<5I|QOzX&2$?fEBn6R+GSy?8MvR?TIF!Ocf70*YoYQZ&(=#8+ntKuIq+eBUG!j}?% zZLOICw@wO?m&C~%?!inhffZ6Lve!(d5!Mx3tdbGQoXdLw+*Tx%mq`fj%96ai7uQ!M zDodK8({#ovqMJGD4N^Sl;<^7zf%_YVb3E6|-_zhjb3MfwI$*#%R8af{2ufB>gv%2-7njc9yG z6Tw?tgG0;94?4?TY_rMjgrmxdw@(!CWmQSRiDh;sJ6URL=N`k`;XRwGCT-L{oA#Co zKT{W?GeEWW30>ebOAWv2%%Yl7U8~#i`*CpFyBaR7-|FInB}g{O=!A@}0?3jtI{Klz zn+}Lftdw{8Pkw6ykHmuesd*)^d$qImgwdU(c;%5pXFTdZyrehDPv3j3AR88=GaP5Z zCj?HZuK26JGdF*Oxc`lO{EgthXsvcwG~x&To*k;$%d73R82b0%8#l_<0X`m5gy5*e$mj(R9I$eM*Gp^jpf(lsY4%Ah}OHRWBy@1RZpMBUw2E_F{y02#|AeA6pOcn_kr3vhKzSN6T(XK>bQwfIHX^P#jMfuG z4T?>gvhgYYsPz~|hWSe00ifS#0!_^g6Ux&4rVM-1-Sr@u42#ua8jZMs-jDP*qG@aU zdZ@qkwHP(`G97IIXK16l!t3g;Mmw5QQxtpG=Mvef=E-1%$;Ktp2Vb$LA16HiY zJt2vLlcZBs+RP&(aDcZA#4!IzyxodTxaR?4-{IRu_NNk-)Gxi|(T31cFEi4~o#gf5bqt(5)(C zd<|rz25(PR7!&Biu=r(Y!l5*t02!|NMtzFmX!?hq+9v%ovs$W;H|ax9Qq(?(N{8v9_p^i|^|JSL5|LNo(=#t9e}z0y59Yb^>;u?mmOrp;-aFKSH43CZsqAt}ef9cyZQTS&O>w?@ zfE*5CH-T~cN{2fTV!kyMQjsELZ7PE)VkJG5g}53EA_-X=cuv=%g}WTm??gAmhbN;x z+XA46V}bqSzE_JLQD;~~Hwk;ptBoFQfN`x>7qWKg8Hx>{^Ho-`xndR}oB&{zSLtqUmf%Aiu*;tIemebQPb%WQ^L= z=jzB?Pu61%U~zL;pKH1<<`*wB_4-29q0IWIEsZp;oe{fOUKy4VqlTRzc3Sw_&jo!~ z9KR?)f#ff|B@QGcnKuV=l;`4%vYt2@+)@L4&xtdEV~)`}QJ~=qt3hA9Sl~u`?3n|6 zkJ?K#;qT(G`&eG%Xr5nFzj)c9q4nO)0iwP6i~+|)V-n5*u5{=Q-+FEnx*j+o4(pcv zfc2*Dg)n}>9XOBZvND9W@o9yRDbfzz#*H4lc<`FDR>w8n+-wbENYLc;x@gf=wr zRx^bD^p~U<30v^lU`QvUSs;$EN!x2ZT^J6yIz;sq_T9oK#K6D+S*okX%qA_@`F{U& z*Q`)n*lF3qCGx?sH%(DSsBV%7d9rK8x>UnMr)BVu6KgObp zbC4~mT(9s13g|SRWbrxIjAGC5rVmo__r4@Zd`2xd?TTj^ky_$e=siuelhQ)v#IEpx z8FRr5iYiNs0Bde^jRigp3maKnRNZdm&Pcekb@6krojvS!38uf>ToI*X#=&@_cwsZ` z%4uhy!Aj=AjFVgz(@^}o2&Ke`g?wFOFKI&N2g8T&_*!!$gI<{)G{7Y1*7O^af>(Fe zfDI{FVY-l5w-@Gddea?>L{174ZOqBFSr49(#`i`_nbOR8C+Y<%Bsh}vtd^+qDrvzs zwx6~#&L*en*USmGPYjGgZnbbF3?lxWFC?aR?~ zq@D)aGVsQ8bBQb~^P(u6rAPEhfI|NXA->9%-kjj*YtgbZxtHlii>KW zara1%Z_=oY$}PZKgRd#(d5ff_oTq^fyrEiA1@?lBuQr!^feoRFB3Zq!zt762kMu9; za_0_`?=w(3!KJ@*tUY=u$Zo6Fvpo6kFffBVJK>q?5F@Ns#dajv-Ua&uc>M0$!jMUO z{#Lgs=dVh|p)7|w8Itm+I?iCM(_s6S_hD%Y2fmrVhxd@r;pNc4SJZ# z)?YK!uYCaq9!EPgN>FO>EVQV4>Hr?Q8y8CmJJEQ$JB8RcWcqe*+Ce+*@@l&1@Q_kJ z6U5-)M!G0vJxq`sFYY;oh*uCe!Yv%9$ErYsQ?8a@hCz&upNnAsL)b^$c!}y5N&pqv zLef-p+}RR?kV_ovrd-!Md~^@y zSEP)U*k*kdvN-9{-l;XB=#3QgTe4lf$_%07S=s47t(|fWpO4FQ9>rjPDJznqZJab()iLi9(%5tNN>z&FD$NcD7FpBB+pzsMoC(f|g zYT(DV7G=@QR-33`Mi71U2WU87NAN7meWGA?%5uPOSulMIF%iv zI(Uahy^om-y#0Ja$}Kvj_MAa);mwvypJmS&1|e^7lAFL zVZMGlGidLPrl3X%w~Sm-bNui!nMgH#7osMNeOoD5V_$7&+~65ZAxM0;i_ukB z4zzILYrFI%J3fq9EU|6Aiez;XyE3taRPuB-8Jwm*8YC12S({-M+;3ODN~`hwD^d6XCB{%^PK)(HvCw z{Vc@IccA`o+?ofkJhb0Q1b#7L8R&mE_&fHWt*X2R4C6Jq`2%AuOi{n*ZcS)xs#t8S5#|X zz1dE`mORQF$HIqos5IsRKT}D1Ci=uKKmY*Ggx{8jzn0Gj zq6w$0>cGahQVo^y%9Uxfu+-GQ(Hs3m@OWdN7wQ5^8R_ISg0T~^-|*)E^*=9ziAxFS z|00Z7&gb;7{l8q3Aor&j@`U~M4)WSID%i{5mORwV!se)-ml8Ka7;Loid_9yO`X{^%8PiltHiM!`};DxN8QlJ zB&_IvUNIIY({S(4pBf;yXEZwZEu?;hW8sz+8}t*NZr7ImxdXWm8?erV~2HNqxhOCBN98uwI&G6+SaQB zRUS^5)JK4ehyD)&3@*D`|2gv zfYg-%>&gRsL+OQub+JaIxQl4LCO3~(j-UnHo^1fN79FNUFKz}bophbIzhx1UOTuPc zTOQ*Z_#vq3w8h3|l!G&Eql7tc%lzJmE;b%h-2V?M|N3C>;AT16wV_PK?Zx-ncgTrJ zFU|EgU0C_RidJ|1((RlUODE{EoZHw8E}arZ4zbTwN#@wT8{gA`@ODBe7PQ%e|_=-*ws$^NFf7QZdGEbjm>O1w^ zYRHH_Y%}zRmExJEM$632qJo&Fj^*CbMMOG|^9LO7ZjQGv`EGwU<=r)=ij?YJ5UhBf z_LI5TM@l(vF2Lv8);!KBIHouB7rH>)&v4e*HPFdQ;c~fu4t0g6s zkH;f5pf6-)h<{a+>hUrUkGy(fJZKQ-?_$^mWGIw}MZOPd`3dG#9|C_GkLz`)=`Qd0 zICf!bdsM(=zxFk3chMHvEaE;zvDf$VEb?a68Z2a^^O>tkq_1xzOj!_lYx7^F(k9n7 zS?p@(qQds^D?Vj#4b0pk$c8r@nWuP#@to>GS4|+uOIC)P4OmfPi%)4QBKY9jL#t1m zkqW#NF);(I@pnpxHe?MEt_Q`k?!vkSAoyEw@ct+h3HXRt8kIoT~jK^`wN9#7irIXE}p2HkG+E&_wtVuj(XExS>f7|Qw7-UzA1%GzNa>woa~yw z;ZU?!h0=v3oE0s`&vK8=Yr{<(uS+y|igsJpXo7cw49Q4`y_Fad%3`fFzK1d@?dHU# zqzd7YUuONwyJn-SP19_NEN@TDPe}-6BNebyQCV~D3BEnrAniVF$P=VlP!rQNi59HC z#(*M;&2SbnMuvz=x@$m*hZ79T{M6Bcfl%ChFKBibm2v2*>5Bq|%?)U=Y1Ik zz*2)tr#iw75#cO)vVHurBxYb%Lh^0uh*&p+% zkTF%;@Z!|RrlvGUZHa27kA$oyQX_3$KH&9-7QMHH1ia!MhuDA#%{k@bLm63FSkmjJ z+b^e+Jw~qGD-`UaJDJGHNfM=N4jvW~L*kWVE_Cb44WzbFDe)Q%_O9WyP`*b<8cX$M zQ1$i(i~#yEV|t47VYE8nGdG6)1mps}0gKUd{Oo*kH_qh~gF$ zg6=+D$;m=Hhh`0WNh#tu|7a$R;GloNMa>bpcQqW8q3Y@ppkyaPUPnOQVlkkFTQkNy zuU%2nb-n)N61RMQ#+OshqnHZxz51FP?rGfLTna z58u0Fc{snuPnATVjE#77wkqsrO7}GHby$2N>};TfQ|7K7Z0O?d=FA2<1laKM>sN|+ zb{3J=e7HKm=;nrbAgOembN~=Xq-tm7r34ECfaj}>%aFLo{_q0&PBol~Hc^){6Iq9<MLmue% zYIcIl8X+=EvCc7L+E4MpIu&u^7wzVj^q%se1OO!mzcsc!65VoJ_KhCyrJ)SW zk8j4SIP;oHGiB7^3J;$!n9~1&Z=0ZptU-;FmOsw${j3hn@<_94cc1fAn#WdtC{dW6 z(I*f|IBH2hvO5VI|Ye(a2he07r1m$I=l9?{p4{76Kz67%li^XLJJ)vXWkPKr0?U904?` zZ8s?;A{lM}{?)Wrp;e;-xUQr*=z}4y^4omjf4y40cxOQ4CuFiaM>#Vcq<3G57qxXO zOv!0j*ahM@mUlC8yZa?yA}j76?kb9w`;T2N$9;5B(B}9`AjQr9_HE7541X9npq3=8lB9 zWUf1{vj2YAiEy$=Z3`hq1FB|Uy-%wy!`x7$@P*jW=O0xZ5TFLv`NsX$mec^RbQYw@ z@0;XcGl1SoT}P{-ORO&7BEnrtZ2hx3z#vANMzw^nYsV+fNK73cV$J)Qyv0Y^QbfaJ z=evRifU|V%mZNm8`#N{}`i-HoLg91oK8+V6%)2;WX8foai6v0(mqz<|J1&Tk6y+>E zVw%E;xRJSk^Quv9{SD9kiw%rb^}S|n|Dk$)ge|W`d*hxB;^o)Km){1}M&wGG2|sk@ zV<%+A7!YsOyW)Cwoqx2W(r^k$jqjzTZt_nS;>T+Is!DSsVbLL31`PCVtW)oLcdO*X zxhkX%7MpvdJxc4hm0ST;z+6LKyUVmwuwmBsi|}UMc}j$ZMAV7>3-W_X)t(Q2Ejnvg z^BFI07D9!u1Lcu@W;cibkwD8=Dvw%5i*Yk}kO!S;AZcpA~Xz3L?> zRkkxpycBdHR#p8|YTN8k8%r5{^l0XDLs7^zJxg*zz7K=QD4f3Xt#%kVV#?}eJ`-6* zLKmpg?4zov z_52yN?A7ywzW3x}UjX{!m^YybV+2?Fx*zv~fNrsFY2tSEL3}tPnF5WIUb9Y{Dthew zo9k|Z*#Bz?qpX1BY(X3q#7M1QVC?^v)wvYA`U} zu)8h@&qIhz)0zB^Ocanb1g3Jb-+C-MX}7oz&uST)dqnNO!KehBPdJ&UXa_HeIn={w z70u&%m&SuEzMzvya7=~urrhs5cZxA;(E859Pb#p`%c09B?JybQj$r_6_So6-7wrhk zXT-P(^dfz-unVM6(M*^7;H&kEH!eWBxuAS!TdSrB=ZD&-FRa4-I$my3DlrV4O9!G_ z+uPOXJ-U@bgOA(w3Y-)v1Wwyr@Rf%~PA?Ht+%7EZDQnC1tP@cQM3RoD>W$)CLaA?_ z{0?ru*}nRrV&m5FWKm9z7#yc=^{~Lv;@Q1BZkDC;YM>HYep`L%L{ts0N&WzYX1bCi zAkbElPbx}BE3s056Qa>YFMXIMsAc|+MFWhhor+^*ve@--xHotRy%CfeDBWLXTM=QD zndt-2s5w!tt+ul(aYltmkSc5KTARsOp$gmSTF=?Q*4%7$E2EG0#)S;2SQ{9s93NtI z7>Bd*kM*rEn7g`?L^2a4quB44Y(7Y;bfA~d)38ES()t!#Ah2;+c|8&cCL1+~Mq922 zAob1o+lx5$8}mGl<+OoiPScvT$Onr!4@-Ns zg1u7-;~dP+@720`TSCT@YHOp#=f36jwY9a?+cc%!SwpRNPx!9vOD_%VqmTNH#(Xin z97-y?6UiRWlrbKFzz9msR}=>|U--REzzdR&1kIZw62luYCZ9w;+z)*2Ma*$Z3y zS*@+?@G$05Y2H-iXNZA+ms6*htT~{Dv8fiXbEUO1Tv|qxzCs^1 zq0$GL;4|!Do;t7=r#lc=sHybo+NC8^=8}^It&h6+URTj_psJGnVjDD$&+eEnyJ>4< z5fMBVc7B2Rp#B-X!hMsS&`j1B64ej;J}MT$l)>k8XHrR`jtiK6ooM&{wY7Htm0CsV-JFC& z=CzqwzeLuNwDZmu2Fdev|5PmlZON67sam;Cuc%IQz12lZUjhR>W$neD{6@S;i;HUU z?vPcfbF03s4A<|nXi8Kx(2?0&OUQ>av8xAu@tsnchu0TFLMcpW-W@R1|yOjEcgXDisJnI4;dCL-{)rW4N_Eed zY6hA^rTmXakwMDX2M#p@uZPo7+3j0@OJ)DYIsdN?(H|(#AE3Z!9q=}q(gOicv;X13 ze*&ciI?%PNy)CbLIxNB)g*nL2p?ek`)1~lvAYJ!P=B6r9sEWIwdO6W1L;EoG4Lp{h z0;7rR-C-@wzN~EyxjvjIou_3Hqz#&!+Ku)LDAIsx?;R~pu%&d;DYpyr##x|JQ1WzN(6COHYX&IOmQJ+Zj}Oj z6aZs&aR}U8q4w{^B+v$UjihP-6d;duX*1|77&g}N$F{N)N%-(v(@t`b8Cq++?AdCn z$X?XPjmMkvn3O7QNXnkd7!<4DCrvzp)9bi<>Oh};J$ntRWoMcyK*3B28Za3ef^g3t z!n(7VSyRk+YIkl|oGpp4lx7c?6ux>&e(7y|R(AKgm_?H#`76_u=1#Kpe1IXnc75t1 z;|jC_C?Xgz;5erv`K!Z*_W&IQ+I&Gwywm&DQg<9d&(iZ;p{dtXsg;KFym4siY}Bf6 z;R=Uw*kwRQKthBO0-fZr*B@reKW(zqer+eM*o3)~x??|47sJ4koW=?-M<_@*JowNs z@KLay*MtN)cKH6JsR#+O8l^#M+|3f2 zRVBg{IYY{QS}{KEpSJDR@R{4j33Bv>muK{$1Y6~7@kxw~XE6T{;)lQ~jMy;mJQLrQp z)GRx)Q4LM)U%&~KE0w`>C|x5fv0549@9>fGV9a5BoNrpW;5y=E_l7BH@COH(+9<6cszAqmw`ntPn+gGj&cWA#v)hoMeq-28oJ& zfPmU0TcK?&QHP&rrQ}G*!d_(Jbz0WW!Uf*?TC%1OW+S=Em zFfk#F0_hvbvd{7;|FUk|H+{lYp#*>O8AKPqAjN=}L9}nVBQuEbMPSAaHu@`va-)|1 z9ntNuI}DEskuJE{9zP zR~;cU%?f1}<&)nblwn-O(*0^ZA863j}9B7McQ9tr&@4gT~p zA&GVUMAAq@3f@IhQfDsjFF8Y^D&}28ZfoY&>#@(DdPp1= z9Q08gJ84#5t&898sru&TzUQkfGj?2zEl-S4EHk#&tA@2yciS7aWW?uoqr59Ee-~?Z zDx@2Ft^O$t)p}Ba)wby^K93_8CGCW%>&gRlm?yHfcJYS#Jf)n})^_Qy>v=P0WSy$r zZ>N9DNm z0Q&as0T5~$;obuNqm3H1jZrRdiFs?WH#szc1-Q+NQUUpT2KX6N0p&0m+ zK4_{ld3 z-g!Z7L&lsqqOPX}L)E!8g_uE)y)80~!dSdPO-k&G$SsZWiLl8oDUo>ddCh$3v># zMnnJQD9en|;*cQT2$RN2N(4(4yzEQ(`clqo@V7Tr|7-J(9jd{bRB!%^&$^)LNVqu?r+_Zu@WYF#o0@TR$f^sA8SWzgW>ko#Oei zm(HDkUq0IFbNo6&lOQ$V$7xLGt@n|CqMG^hDUGQKj@{Y-m|Zcap<8TA2#_CMzjp6> z_+D{GbX+dT?KT&rJGn@xk*WB_Ze`z_0H2+y^XnYrpwBYDMR7!8s0UWQ6SB4)qTRo* zbVm%9_Jp3?LD%KZ17IMy%y#%YYPdtJvz(Z%diX@^B>Z_KAt`|Z=<S zj;E!KX(|RD0S_qH?O8w_4J0Yl8;h5*2<Oh7cm%I0JL&o6(erm&T|`W zTOaLGzv5d7Vj%J?_Km{L+T$u&hs?0;eb7E+@;kv5LzJlTSPmM>Bry+*o(X zV2Ru0vM}TH3LG5(XDI3&`xwI6mCa(AQ4N3XT~Y^E!K4NFX9 z>-?9c_FD*chaVP^pi(c-L{sc+)6O~cAvi)$8KbQH``56B+R1ajAdW^=JLFhQEj6_| zbd*RC^FAfY<_Z7oLDd-$bsh%GI~$l2>?t~#|+5nLslSF;{{<{xE6ub${*s=dC6j|5RwTq(rG^){%YrGlHF z@^=Npe=g_nTsd`LYNfsPgt{*2DDlragNYy#5u3S$+KJlCv)$B!roFGu3AQoq(-14a z=izXH)OVxktv21QJKB6toiB^S6YRl|(j3$8Y%)XnbX+vTDQnSX=kqpBos+stjFVqq z39aD|9TE{aXRW4WrJX0uA8$ENP9K`+1Uw;aMO60tm1~Cn=Jx6`+;I-?i~4ETy5#9u zNPq;aUTvKuu3Ad0YO!X4E7D9sgCp!#7=iplWO5>Lm=`30%ZqP|0p|=ai zm&xm(3AwIz`*8uuE%kbZ&w@t_8RsCArvx}U8X?-L0Jq&V?kvOQiAL&9WrVHP+6F2) zuth3Y9Btrnn-#7Yt+pO9v9`49E)y z=kbD3tConU`{}Q~L?OAMjgrZ`?kR;8quggpl>;?tkgLb)P*fxH7N19gxZ3-w3ZQmT zjXni0l@=dJ6BABHEA06NM=OC~i?Y<)bSIbuaR~wLDxJ?Stf5lIEXrfB5<%Bh8hMLa zf4nwBi@t?M6_IMUQ^l?6i8;>o@#eOot?xOuiSf~(%;_l&?fk4M#nwEwFV^2Q5boL9 zB=K!}-U9FZm+cp?tjMT4hUn+{+{kmx6gM~hTD&7TYrVJyi>2BU_uu%r1E_}6-)ka$KuF>T}h zhs;{qaiauU_shav>+`(QnFHj#)VmVUXWlf@OS{|(*&8~Ej zy5$yTJIbcJTQ=7xT+M7{KB}yi`_WB$PSBzne!e_Ay~$?34wZf@@!==DBi(ML$_fJT zt~y-3{-bCt@4#)j+~8AZ&a((aWgIx-8?>8Zp;o~<$!TOBo4Y2Sko#7LH%qh@Kb!}7 zBfDv&#a5_kPFt+;6+jJQBA3!9c3F6R{2`NCN~Q$w6(!xH4PmbFYLtTTLYD$e#*EyG z6D<<(z=}MB>wxwJaanvmFrRv7j7K}Zy<0%u;BF9hqPjqg3o+CwqK*N*BBjuKc_Nnw zi}X0KorHp(9d*QsNOYEco-ahxBC(4#Sp^g=IYsXFP~+p0@ZQxsQNUU5iR(+shV(t9e&hCxAjhHJ|@210D?lXu)=&iR@G);}q;)M&CIN zKK?VBlbfwMtr?qkdIGPHJw=rVONs{K{Bys0v&!kYl0qNuY~Y(fI*U#Xf;A+XtC8>_$Ecv#@};^h>t zcp+$UfV0&r)SX=C^i2&Y(?PSAN6Sf|vvH~k+>fKyvno*C)6gdpruE@;K<>vE-u0}V z$8H`=ucMOI(Ead7a_kGzAja+4jo_b;w4KNd$q-a36^t^UMV#U#(%)?rB)pQbFsXC? zF+$2YaL3K?nBn-FW7{=>=Zz5@-6yAM4c7!vIc65O_fV*^Brv{wFiL;~xi8uG3w#Ju zABV;d5#!ZVR2RKy0PSu^vrK&lT&nJ5?7elLp+gdOJkRjSvZ1>BUZxt}bvN(lYpn)a z`A!-iJW?(>vs}7&I$F#eYxnKHL1+6;nOT)IvGO=wnH`pO=ryQxpn`^vf@UW&yLJV4 zwb0V^UR20Otl}HMmOBKa8@{DP ztVZrF7b#F?P62#87JuR}1mAG5jaRvu&YAgeeDwwO#5dglP5VgO3NMh({w6^oRq?Db zfJMFb5~Y=RNW39p=hVeOjJu5o3@oWRz`7!Fr=IG-5>RPas8Fn4jw#P<;(qOBkirkp;P2(p(<-TGrByE8M%lah~zIxiW40ocGBuI*ZEqoK~4%SbDz>3-wmxz{@=*N-*v%zR+ehUU@ienScBuJUSdln06XQ* zJl!3%_o(uwe?Y1>%*qTJHi@j@7f2bH;KYs)8u9P6a1s4Q3m^RI#N>-3wZ^u?WgZZp z-Lcqh^Q{B*hm%u?c*p&EJzb-!ih%KPgO$(J{BU{={(?rt$?Mq{U~~O|_9cFsgoUsg zp(GKd?vY*Uaf1dzq(+qU&|;a}K}frQj?)4wn>LZb1FC*k>?G|XzSZLxkFr*g*3#tD zTWTN-o&2EjGX$`3to`aYP8v<`QvEs}UNL^yhrXl17 zeX@-gh*fvGLuHe7Smde$H^enA>N0AK>anP?v9}yEIL$OzYAlfA^!p{*8>|~t$l3t@ z_zJy3-|TTkcwErfn5<3fu2FbD@8#CFUSxukI!HfcEO<;7QGmIp@%3l6oEJEBHi1 zh$L&p_~`ejQKKsOl`|&K<;MN3_j#AsnwjjEK0G|1=iU<{IUxJF(Tys`MWS+~Xt3YW zO1c@>E+hX%Ko4>13Rz@UvFj_>DCN^Y0BWRFW!*I}lhuaSn!XGocqZk(D1x41c5{2C;P;9L!u&Tx5p)xWeGK}|`Tr4vy20NGyoQ~Xn$0}# zqtCr;&m|!NvBc#pn4iTfRWeZRPAhJk<%cGq5ewd+chN!3KV_9zy%(3?a+)ViGSA1W zqsFM`<-JuD2>Eq5Bkw&8fPrR>Msn8Ng_gYhzGk{AZ>cN6qN0{?S)R3Vf;CV+Zail- znVbYk4`D;Q|KMhyd!EX`LPrCGDybSH$}Lmr*P3O}EwqCfeqh-hu*O{I=E3p=bU*lz93&JXM|L z!#FcCZlfv(!P}@acEVvvsIf;WWu8guCzW(z7V1h2JTdJuB(6g7m6BXGx8J<|jgK+E zHwT~OGP?BM^IzW;~f5};onbTl%iB}MxaL|A!neH*tUHbOBWzGyl+ zhXwB04tgqzHjeQpjZR7}8~z!t8zZ?zWt6GDGPZzf&zHnWEXsw&1wd1E6+mfw;>|Qj zTicL-&#fTpdq*jzuQ7E1+MkBl`|5_#R;g~jBwF$yCBoue0#y>pGtTlQBP=-mju1!M zMw~+@^ORjJ?shMQ_O}Vw#Qq^h8NuXmOmT@DeY25hzBqgDBlmC7X1)u@e2jL(x&I;c z|J3TS_j;+N;S?razjR@mmuOZIa=2!+Y%PN?a=Dm475(x^)@SuLYSO}uIarCkD7Cb> z=x^YXDV#GXIU2~(a+-n*pm;4G^4WYy`=D$=(=DUttm+-Am@X=hklvzI+0xbys>DW8 z8nJOqB*?ovv!&wVm5 zoq=ihlAFb}PUmx{hmObXzOQ!^r>BY_ys)>cG5)J{cf?J9Q;xsW*Kid#KDO z&ZNnbU#mTU;8qn`0=IDs!g*$2>Jxnmrx09YVKI4Ob1cj`Pkm{!Yf)Ejn%~qJ4I{Ql zCYFGSOWfc98;L>F_8&1&S(d+>Wc<%K+W%70_5bC?TN^YPAcvz}I3<%jn%1G@6eP4* z@&b&Rd)Lop)RZR;fEot_CszlA zJef~*X^(X7410@B)Ys(Y%{hh(et+yxu)SfE&jVraF&R$<%I>@`7AwcO11nB6(bCW$ z{T6E_lr#eEPj*#Xsk3VZLuA=gXS6BxbWlh9s#n{}dl8UR9UX8hCY7i^m8>_Tw6uiZ zb7yKPD6nox3&?)BY}(i|MLB_?Ah4A!LdnKNd?R1V*t)fD-Hp!P*K=hycWd*+@eKcnu)uK^(e9+s#S@?QGMSkwI^vNnGfj? zC+@{beBrSi(#vG@qxCNl`slO7!%9XzDp0f2YAsn`Ig^NGE)n?W?lh(40~1$M-X5Z6 zoe_hWc$Oy58{57VwjGpMupq~pz!5Z9V?s0KHpT>9K;o?LI?9Z)uhjW93s!?)Cn{nB z-zmbF=$LcaVEEp9x3PQrio7Q7?Rgki1uJF>LK-Zi+*_MaGm%voDo`h+#VzSTQ40Uc z%|nb&2qnWQ+ogkyJG!!|W?BRBAtY1*4({^KvA5{MVHxai57$a}6C~`iQqv;8-m>gu z)s?Nv`(VL8BZ6qlPuB`z4SMlAo|zlvS8WR@%-w0s&Tup|3-CJlJZa*`{km#X?z4O@ zk8EcO6CJ>;usdc6B)90vFpqKe*XE`hPv?IxGJiko_ji5kzhR6gwtqM;Zpvsv?(pmjlqMm}P>-kklaZv1#>PfQ z)C|t2?30tA7ZRlvW+smx(6Xhn>aNbjez8mBpiqCoJJw?I3Nk1UYlDd?b!W;+z2X(^ zJkGYBJ2P8}{77!O&BHu3J5>^$50rJFMIL-)nL4{Z$v$-PqG69ySG;Nc7_AF!j_fZM zqFrwszaAT-_8nG-`dpe7(7PZ7kLx!GSd(d0StblF?($wOS9PUAEn6NotK@vHGLoiB29$^?D_5A1~hvRdLdb*SeAV`txg9Zy@?`jxJ|?TBMK z`D*dHpP8zKz{<$QiF21mgF|BO;OKn2QuCmT%!Dp|vd&|u-RqEnq*^&%)~%$MSvlsv zF5;m_F6~^ke8HnxDwk?c0eRW3IS}t3Pg=gkO2}Ldlr|_bb7cXf-a%1-f7j*BuMVR> zR`Z^^|K08WKgNWh&X!Jk`l7~HMurXj#xX*dQ_L{_V;TwR*u827Y}D<)8x5bZIeW*6 zMaW5KJ!?}hwH-e-DvTvt=c zL#ChJVk(-lDZqZ6QH}otM1)4YfjZ>`&HjN~9}RUp+A6WY5b7tIl+n^ig@qI^WegMw^^PiF?8S*nn{n^P={q3beO^JIiS2p&9{%7^mPop> zP-Q9R(2+TJ^dkWpom;2_Yrqr&L!4`UjM=EeHP9Z*$@Pst0W-XB|Jl+`#F})<6QA;g zJaap|UmhIE8gAIlM%4_;B;{RJu#s=~nj1q60dW>s0sLC6w2_divER~8F4F0GX?bJk z=V{O9sfy8UK2*E*ao0vv9DAkTRagD64AiLIYyD*2C)#N zBW)Q~42?}8Z{0a^Tj{8}zxD8vpvIsC0Fr{2E0kUUUPRYM_Bl)(XYTpRmJ_SJS7V~X zLJhLO7<;E<6YjfgNFl%B8FBtqV3mebWQv6Bh)%f(KQcq(ewc0J<2)WD|5BWfA?lq< zkUr^M9`-smry*qlX?w1Wj!zl2l?4&Latz|?Q|XMA&*pya$G5Hrw_R*)`<%8tY=tIM zW*gy}G;^MBzB2I#o%N4yH#*I?c_88IHTw58-eV^2W$Za;f1>HYs>%=~&TQhE&UwVh z1;ymO2l*I>TQPrDYJV3_7k{GGrO>Pl?MPL5RT3Iiz<-R@Q=}ZfMl?aZ7x8+Jm4izg zTmMD1?%F;nZI6EU4`(Q=&A0cS*l4lYvDOh_@iZEfr7saDS;`-}EGXQ(u z8C@QnQ{Mq(h>3mQEY8L=x%yVinvMGRFpgbDw(VZF(COXjXPBilZ<>4=H-|hvV|y?q z)G@?)VcTmyL4G`w&rO?qQUNP!VH|3(;79N?GRrHjoXb=V@~89P(RSZ@%|JiiPSb~w z)49XHuQTUWdDQEi#Bp``d85-fv=McD2M#k#537Lr0Dt|0w8uDp8yuMjZF)(s&8e&; z8KJ3Q8cU=L%LfcOv+pXMuGR7P6}ZJ)6`8C`at3ZE)t_w?VqW|6R&5W!Soxe5FVEq< z^|`8m5EQFP|WNy6v1-JZGD7^bFrcmwvUEE41K0o8v?#NYFKizxI1&*jK-#!LqF3v3Rcm>;Lff)^SmG@7^ei zfTDo3v~&p~B_SZ)F$^IwbT`7#A%Y++-CZ-pASn!~gdhz=mo&@}5(Cm_+`qk_=h^$+ z@A>TWp7S~U#eLs%ueI*A*7dz&t#y69iK&dcahf|O-KU6iDTIt38&BgH=wziO({^#BQS1N8yIEplFc)whX39fAH=j{7->* z`Z)g&E;SIW48(sx604KpG5AkuSZcT*;jdjjC6!@e@dXmMVRv%>xqd2<2z`48%S`M& zQPG7AE=dKhd?j+ zA6#E;Nxf80denax3u`%Dz&7rUNk$^X@pO0ALY)|K=ls(^e7q>KH#uHe*op?MJ{+1V zP*znHD>=ZrBDEW5#X@(l%#*)Bf+UFn&z2rMMkA;6E&SW_8Z4{{N)miLOa=(OD7Dq& z5vere>d(R|-$)SzV=c;IEj*FRVP~qp${x%c3pQxI{9V`Z+Vc4UK)=1m$c2sZG|K}gbxeBXIwlyVxK#Fd*%gCo;*>~i76J%Rz^K5;vMh8q?7qD zg<+8ju~Mf+hHo!gNz-jI=&}I^A1oEsEh~$Me)4?Y>is@krdDvF>wR=vs~qS`n>FG4 zZ)$&ayL(skHG;W{@&Ply38F38)O-;QzQ;B-_;>v9FgdlZL%)}GbmToU^w`8CxETqz z%{DJ9WjmqJVp#G+@hHzUU8dsNDk9$dCw1crn9D4l;_iK;LhgQlMPy!(z7C0A<7uoD z{Rp8c^iI0_-N;G2m*w^4>d3R3-SqlT(I4lDS-&rW*}z9pk@BEn@fQHAOXJrJBcw97 z*(qx?(Rk7%87oOfT6Gz67xZGU0B>j~eqn|UV4U)xR+?f|k@71;eRh{{b&lH2Z*P5% zd}8L!KP*}oZ+B;gOBk){R(Ln6$E-g8n8-{V4sV^J>8T$PRjv?Kc9?bc;9Ogu5PK0Z zm8~p{ju3dTFWg1`gc_evoy3w^1-^#GyKzx()AZ4eNMx%?bupur*(KxA`!B05BC$X= zeXT6}t_KC4zKLgJ%Do#c0Hfah1c7G#N49V241q$1;<8`C91%~u`mI8hD%C`km!hUL z;(!?|#AaEKzAc)4{VKEKjY!#^QC{f^iJwr*clo$lT0O7XJ^tTQcKGR=!N zlY5g3ZPg8tzf~>!uG99{`ME51cR;V{b7QH&|T|Cpg5-Fp#?M|c~#u7UW0V2cssm^#gIQ72io$R{} z=q%GEi{PduuCUdxtu!unZ;1PQZUIXt%-NUwV;sLK$IaiBZltk&LiJ;1dNrn8yv_|X zAF@3_SCijFlNYok86#r~{(ScXdm%KB25g6vom`vQdvvLcWt}N|aSX+jrF1p38h~M3 z`{Zc`j6Dro`tU#z^r+3uRO*|@dxpc*uCS%I)ZBUD(Qsl)Pz~{y?@bOtovZ2L{V{Ob z-)ldvYt%*Z%n6f8&oUI5+4S(m$K2euv|cB9df*K!19`4D-DyamnM}-q2zln8^sHa# z&b}VZ+?yR96`i!}Tm+|g(=x$0*~J*Mna<|7tP;Oof*-xqk>Z`09VM`4TP$kf7urDl zA=~?*9B>}if>TRs^mM^XyXk$4L4^C4A)_}OYPC~Bjw8O3w2rnUFIb2R|=S~@;OuVzxnCdy7AM;)-Qmrq)Ad_A7a5P2Qp)_`YoON zWOSWopTjwkbHU7R+^itI9ui#~KQ*lU+|UDaRCAy=?BAx)BXIl_%beBc#EPJ@*RBZy zP11AF3I6%PFb$;7J1<5(!%{x3q1?(s-f)xFOY9(rjBKBQ*rRT%7X<$0%gkN=Wo>*` z9+H1(3S%*#`QQUTneMu8pHRP6n4;x3W?3a(C3WqBCNPR(LqNHxLg#$PJ;K06dn5iK zSoUOC^G(eIWlbjcF|~0Qx6;t{&HMI(0#;cv%y<|WzK4M@QY@_E*Eo8)zaE2Q{e`0? zn|ppd`qL|UEE0L$?h4w)xEzlkgF_Zx`?37Ehe6PU{z!P|2`+%LkKiL5b4?=$dg}k@ z2k#&la;`RM1WxUrqW|a#t3S6ee`frz5jcPT;iFPQ2w5IlJ^w?PxZbFbx%HIFV{4dv zAo%lhz6TiXfQ9v`>?z3)dO46UP9aR@o1i)dwSV5hO3=dSjvw5Q!Q>==Y9%837>21v zUn5;A_(pU5NIw{@uPwy$5sv>r4utg%4_{7ZHWb25!&01if2ZrY9O%QnLSC#+Y#gS7 zU1`JyL1aPV=iO-W;MGWvTh9?gwv5B#sJ2!`&~m`>Kpx$LiKEpl2H;VLH+NR*?ajpR zOl3+r5dEKz@X3G8k}UBN{_1G~@GgO3_1jkRF7$*p?ZDOfafv7;X(W89gIm1GH##vs zuWba1$#cYceyXk^zZAr5-end21%g@!&+S~NZr$jy(qAka1|2`xt3jQ+qGUD?mDc0Z zyJahw6Eu5r4@YyV4+4O@mA}v0+i$N&>e05rzT70D1`HF(jmw0J4rlYrowTgkr;rK@ zU)E>{s@nbyQvyJ_WK)Hu)^IT9{1jPTokLE8h4uEk9CP?)P@>h!ML#$(i;8q+x(?JD zE&dW#BdxaGWzAHLVw{zJRn#{;r zeE&l@7rP+J8%afGlS7i^bG3(IkLx*&W{_t}>rtaIEaCj|cmzO+V>~jPUUTw0NBn!5 ziXJ{jt6|2Fh&1ZSR1P37_(gWc>z^rO?eFobO+*5Z-b?QMLhIg~sxNnRe5!jK6{yK_ zT^z-DJPjU~>|nIN1{Asnj+a7(~@Z}Dy34gMqnKm6&;BmIXMXqj<>)6 zDg$t;hu1p_BtTFEm*U+z*(g60{|C)@Ri-<0)u2>fWTAtF#L2zcNKRC zONB5~laB%LnVfnt`9P0XX}e?CQi+&ld}y8Zm+Tr{(~jMQ z!WWeC`MCSb9S4tAz9{1yoT*|aI$K{D6Yj-$`fI^ARB39b=%e|-h5hR!bn=x~9sXV3 zD{ZJlTUlVrCLRNiZ~g z0M*P#CG>54$$M(KRYrz4aXU%-Nb3X8FAHqDZ~S`$b7C)|TLqJrb9xKi@;EYP(I5}` zjhDuLy3}kKJofzz%zjttok`1^40+JWCTrwRq$Uy&W8M1ed?e`e$oYl_9k`}!isOyi z+&g@4Hu`k`NH`+n*Fy_#j^7@=$mhn5KP9Kh^;MM5@&WH`BEG%==o`CbH(?;4@6!Xh zN5O4L2)2aYnBemPH&ey+)>M=>1wmlteX6U@RYsCRB7&Z4kHq2h9bz!xm*@Ezd-_D0 z%i@76!t`bja*;Kpf#{(+dC9Hs3b6>U$JY^O)IcyhnJ9fluN4d^1| zm72&(VgthS)jfl(awKuY0BqFY zG5sQ|uNyJ2F*_$u-8M6{A;c*7_XerRH0Dzn*yvxpDkjr&4=!X9uL-Ov70)~TLLwD2 zzQRa?+@i!B#k-S6HSrXgY1Muh>#EdUJnP0)86gR59Pq-oAM24Tgk|&67s2poM)W7J zv0gLsXAonb;?ORH=m(e6Py+d8*l1LYYMvswSpHc5^c;^LSYv#Fkr)ptO9!h(JyM^uwsm2 zO6TvE!1yQc?8D^V^kYD~^pU$J=BXL=*E>^*tg16Jm^cy*Mj!B5fAq)5A=bqG$j^x( zkcVnitGSrVPC*%_N=yUq0>hiwG1q*t+bWnb{ja}Xe}^HNi~~tg1&pf2N>@+{OL-&*>J-=i&IFGCxOeB@ z8^=hj$B$8?PKUJqk^iY#>$pTUY5(4mPxra0KEgYb8UIu9f0|~aeo$Jbs;XKc+{(O@ z5PdwrS#6TA8|LVLyW9K35^YdrdzE;WA?JHrkyqzeC>5`FXi9zAx@h&nG zcW6|ei3Hi=XVsJx6($OY&9QLoxtMtP_-mo0+Lh7A`ah4o#^{w8e$12>mc8tU5ejOx zw?1Y^;(J4;k&@0+9nN<)IJhe>&O?TE<|W%A6KU;sa)u{aF^#B||7+mOq*{xE8!hMQ zz?=e9aIGHJxz9Vg1 z1BuzF-aXJxk*pkE0t_FpxLm$ykndmYg5zRlW#vCR{DNh=h&hqObF|@|vo`{4e5A-gY)uZ;>WF;qbv%2`dpk39={ z9h+hYarKpcKSWb!YrTDw(thH$voI~9-jDNe*BK)V>v#X2;-ZEAmm^y@RrqF@4Jq?^ zt_P{cj90QCt6MQ!x`)?Sw+MZy>tD-3`xl~`t7ZDR{`>_T1c!h$2XBjMu(H$oJtOSz zG9KXD&6{7##vRG{Nc^gqH+ij=-bl_8GgA&}l@E*_Al+;XZ!D@}LPD z=F?;Tp1v81YCkK<{|r3Y-z~#j{;$IK_dEZTsQ)UB|6AGp^SXf?C>|ltL|k(xUF07k z?h^&~Y(-yZB;M_$`NwTFKI9MU)=4$>2h59!TZJ_vVl`qzx$WXU8*I)O8zrQPckl`R zA+!8(m{L+0nHNi)QsOp?zv?mBoGAs@%?R6ARhkYWVt(R{Uj0M#VL)+ z2;)@z8_QzwUSgm!uF1CXM8!kla6mjx+2l`tJ(&jEAuh=}-&}JtfCjL{{GNCd8D@a{ zaQ`0f*}_8JMzQx+xI0qUG}{5Qe4BvH?ar@9iA>~44LOY{KIt4tv6?rc;g>Qvt>;@6 zo@oCGk{U1Tu1soLo0qSgfW&r>=HoIoQT_baU`e zVlPnr9}+df?TdiS1gaJ4bq*M6$(%>kAU(^>kfBBFzyd?)^h`-KrfKW{4&Z+I*h{^P7)Lqx934e59I*X{NT`htoEkykkyX*l_&g*=`kytFqv}NF) z(iL5vbV#bLWKLGTr3Zoww+o9;04yc3vLyQUGJ$%U5SYVx_<%Xc&VbCD@#kHvcUN+M zVUBI1+z5D9u86lHSbSEIH{P%aTRyyI^JCNxZAB2pWJXimo6$;8F+ zpCb8Nn6HN{=0~wGN!^8pt|MJl2roJJGkA^=ISHD>FL|yy`j;vh29oZRmvCfQP&*FB zUJfhC0G*`>KZ@3u_)SP(62~B+(vueU7*4aibeC*JF^zYavs7Q`-4A9Rk`>)aS1^eR zVnOAeXR4b^H+I1b2nE#EM_BKiR_!z%Cb%7iF)Px?A>0(_?@WDsc98(kR}qXv|B|_I zRoFj;oQxMSGZV+%#c=*!bc~9LOfB>48wli;m3q=oQu)i##3SfpjioBpSALJybTk#7=e$EQSemVSm^JSWhhTJ4|uidDO8KP zELRz5ZV9d0;Bst*I6fm8GkPM>(ZS3w3^{hPfyKpu$c+H>kqet?N7rC z-!`~J#a=5DHqv(aou%BlR_mTc?nKXxKRWOm=A-!ZLd@;c6o&nX{|ANEVdqz&`aQRA z6Hm?yqOAsvj=8N*UDz)5Z5280J_00hYVSubwc$c+E7otHg zIqgDFvXL2rlVTH#$sY8>k>hY`@Ru&UAw%*);!=Z(8%B)HPDYKf`d&sdM|SY~+#Gp1dE=dV2~-3j<}18+aB7_e zj**Ks{$EBMFI&>ui_=J(J!Nv5BiC9UHZHd-26oK1>wGs_2K_40$eTfvf^y9f@}sJH z{_bs7RAJAb=lneR8S8K9U0vh6hP3r!eue=PE~GYD$}?9##iM5x9*cF!XKybR>o*~& zqSFnlYQGU`(Holt^Q*3JRqlZ4Um-)RI$Aol=$}|y^=*~Z85j!W0GF5<_%8;C!bAb% zkN9Z#$Bj};MvV+A23l?X*Qso&!y?qlKlSz*uD86`PfpcM%< zoiEn}aSnTapa5{&=pOHPC0egte0b4X5Jc=eGfLtdMZkoa6@D$rhD*x~sgQx%sdg=L zh{=F3M)gTyhRqVc2nMzKbz+Zy-?*bBgf^-Fe)Qj-$l*H$&{KxT|H;+)-+EgA?#yt? z{%t2*qO|F2&kq!4;}o#&-H%D+GM9HN;%}|I+3Leib@pb$vaEE&*Y*V z>$R*m-vttw2BjXw9I;a#k-j_epcKCw3~XHoy=*=VdHH< zY@d+duBP)o5z~P&D0ym0b@nZu|IX~shYVbIcHv&SBO)3RPT~~%4uZ`m-u_wGr3Q7C z(o&vE`2i*MAUbux5?u1}f62qUJn?PXDSrjOr~4FliZzoe3;L{aKy*-Y{Vb)WTR zluX`nh+>E-MwuFu@k!NJ-e6bhmKwA{Os26hOPPOry0(pd6V-~E!f%ax`cJ9bh_Xxu zFbF?ITO;;fp6+@+_B(ZzKvry&Q2Ct|7F|-{OPRxTeB<1CR)hC`FfTH?>qmQj!yLTA zKT_QYew6;QJLy#6rx1$|-@Omd%ihCyL|ujaXgMWvYRO*FA|y@>DL4fh@#;o4KB(`k zUxEC-n3lTt)}jzl`VMe$B=gDeY)3mhsHQ)Dv#|&kjbYI9Kgk{j&WmVvcoo84`iscE zH37>TVvJf)tWdOGLth;`k#hkBt=*Q!x~+kE)RhdVOax=*_6Z07Z@JFi_9E+kl5>9%uc|~rYl4`BUxpYd zC3q}|Tc4r6l32I6h*z>~(gbMns&0{bNp?0zY)fBVs<5Hu_=OPgu{Uf0pMl>|)}hUZ zri5jcihli@voug@v}GVb*GoEtxN0%hZTPGDWGqPRZOcrLC}9^}_1hRP_glX>I4G%KP8Cm(mD*U@W5JE{ZjhMVOBPJJ#nV(ww zi(B0X#TbP#*}VP^yQIS*j^L4*$xsV!8wDos9>GVAQ0KJ-`1~1@cQq)pA1C~U_oTS@ zccujYFO;GdS@56Tr#RUY3k>$cHiRZEsu>3e2^rDyFEPkEDyp5$%!iG6`H$Up z_lI;ntfh3UH_wb9ZS(rOAKm__5Gb?;7#puj*hlyecct`~ahe;3f!R_Yd;(k&6P{7I z)m)5CuBeZL-%A>aXnt#vkL8HxTI3_if691WG>D;J_W0vudAz)2CI)Va0Mc59GI+LN zNM{b@Dy>6!MVmKx5FW7Fl8yH^CWsoi6h)Y*))+c_5*Kx ze*1Z!eP8r?ll%l+wci|wwxhG{`K9B(e)=?v=lYAkUPUP^ECJ$At>gNLf&6b z|JMl7|EXb)iC_Ku1X21bb>*>k+i>_9lhb*9A@X)3viBO>TsgG$A5M&yk`duoLe9SQ zxO`0VEoBR)(Ivm0YzqZV7hWz?rpSfy$u~4e()n6ybztSIqV^vPkNwUtiznPK7|Qp2pBA@2T8KE0$JWTfj1{|GeQ z!O<9Vb39=YGBE*2qs+cPw$`CmQ1+F7Q4*cIM*Tzhk>P{_7t*g%p$zg(0RBxY!F;eB zl83%~HfrKm#gVzyAz6zVjw>!4*q2_^4dJoHJMZAz2O zwd>NVqH-`Mo10fAa1kxW=X5-un;MqjvB}q%Eb+u_M=NNnpujO%^lvI{x7Ji`GpLg% zH_(fv%6FdTt#;U5g=~h|>*Y|5m3Bo=spCO6+@5~k?mFH|!xdQ-)oa`MbP;^`)Va2- z?wHb1AEGm@Q0LH$^v#beg5`iibcYHgsvLK8_k;R(69w*@3w(~d$=JL=ZaC_?4q;I` z8BqIRGPjuQZn_L>(atyen4WZv73$M5fOF<;am&xVyv7GAAELDs^o!1IATV(J4|_Y{ z7}18)LX(~5))LpmtIr*WwgqicM$|m3FIRr1mN-Df&tO_D2Lg`E#qPp1_O4ry2tmCe zKRlf}SKGxx-62duvGYCgDZ{dt3$n2lHMEkG=NGEa+m>d}QNWy>>a4HmoSYm7Jhk0? zOv*c6t+w}Ga1OI@KLpm;!-Y4B&uxi5WJSn=dHlstj_cRzvKAa_fs_>$fVTSsOq8qM z##`aoaGH}$pN@54H2UFGHKc!0*;v4D0qn1u29H3;9w%nAfbCD>X7+-%vSgq1w1K`2c)%{T>P$ixxdB{v5H$)UJ8Yx zS#P@EHXLLJtZJ&yd8O5t|75aRSEIzC!k#N7QZn(Fku}=6{r-L)Vf!Lb16BNU_x)r4 zbv2>D#^=lV$J^Mt^7_?t&nKWG?wY%1a?LZ7Z@Q#&!!I5m2YvSn{T@c`iFC6UWH(py zIe5?#uR!mWUGUj4wsQ2jT8I3Yci5*l-w8c+po@g0;&x+gkB5zzuRjWt0C_l1rWj%f z1dG|j7KbwehmxDk&xmXLXV=^GuQJ~n(`Nbvf3_H@)BL$ zGD#(Xbj7hwf!G?84*|-o#^pc@+(qeP+6uQ5iXcJ^v+Zzmc52C;3ong4w-d(UGFp!N zc7%J26Bqb-dONcQ)tXQD0t>iqCWg_X>;QdG=fdN;`BsOqCd`_zz#ZTo1e1QIMdPd; zs4QuB_XR-a(MoQPP5zvy^8{%*(01oE{H~CZkGIX_Lw|8`Qv)tr;4_pH7~CM{T^fmT zkuJDAdgk;br{yz#EKL|%XVx}^n>5g2on+hwpWaA`l%obI+pd?PI&HeHlhDiQHt$m8 zez`}X?BS9a|5=HkfC{I8&+1Fs-dyuusYDt9$%X#Sy@YBuy5c(z&BHps;jZ+ZMBkHp zlKk4^^^p=qty}zk0H2i1V(16{^1J}$)0$Y4~wf&W!gU5Q>%bTp!V^Jn)q@Lj|8z%bb zsC>zD#+Gynn&oF{Mvg|R=O&aAk^Bgsr%y_q#SLlfdGYR+IEd~P?^Ue&gHEoFB)<2T zz;tqqLX*9Xx{PEBUV2I;kWZoom749#2~`$l3qx1iSc+lAizNwgh@xMq1GU6HcuZs) zYiIq}9bD&@0_DZGMnWn`rY?}+hbE)U`JO7es*;|`wNhU27a=Vbfe`+hdMe;$@1CmR z@7w1KxHnxMMiIr21QJ-DJy!z#q{+x_c7#;39(NVfvwRixR8e~_k#M$rwc(0zd^=Pv zsm>USG83F8oOE$eZDqu69uBN_?7djOnoZrz`$BuAJN|H&PeA$G(R&0=d%_MTR{u$s z#oSjKd3U+*1hYKW$C&uJ^(i>S)yfZJh^#+Weq+Lx1<$=QA1v8O5!EL8B%JYQ@l8~Y zBsFb!0af^uwWQwNSU}7fn)m5q=}jA1nXx&9-OnNP*=ymy3$$VcqnF|rJ02%~cz}%U zVI%+2Em+K}5~ls$De12^^gjhl=qg99Bj%&6+_e{=6&rrLIGoy3R0)ZvP6KEYy6Qy! z$0e{OKVSDGeZWAd#&i9qnnfy_=0fgOhha$(6JDC(f)6fW(rDZX$j!aPx2Mu-*UIW= z^n1h7fr|Um&umOIOKbuzxheefJ1XuN&sO*;i``RVoxrU3J&jQMcEsP0n3N(BABM6B z>?6RhsEH&7S#poo0PJ8^IjXZZUKcf<%OpSd@kFD*gTAp1?NS6-|M{pHSI#T20L7Y# zHgNhQbPO8Z64~R2_MU9;_xAV^59CY6QDXV4io~yNuxweVstO;EmET40IchISJ`0od zQTx`I02j>wji_(F89i5<_Q)?c36?bTqARbib-wBD%6^+)E>cxD>5*T*bbc?q1|7D@ z0KLb@iy59z@YPT7(hRkc!EK_+m63Wc2+^n1_#FBPIqfw4y!!JPWe||<&~NP`ERTwX zOzr0BifjWbyD`Jq8fOJ`AmF!}rn+T!0AetP;&y@Y{B!ASPfW9O(qihhTxQ=n=f|+! z#^I{3Rf&^>>_T@~62dlcpbrC>Cj=}R8g#aAHgngA2HaR#%2P&$0eLzQ$wR&o#3Om1 zM+wtM(Zc1L^Ceuc0@^P>tCGrBe;E!KLhy@9c&{U4%h2qFdjWvJsRolGt{s{{iAstR zBUzjt99QUgO>BLXlx8gc0qU+eouQrN-M2d?H}9O$hY4xtT9qYmHaMczWUdMciJ}1G zf;uZ8oAnOQ7+95$h9U&x_B&If5{1yUuU`SDBSF^U=P{hzXm$nez@ds$PgI4^1O3sI zz$6dl`aNA^GmUrAGuADh@>ih-zq`ut=3Zv08b+c7j1YJ%l==&9GUR(QfrH>JJ$u@O zl_TAZQwvF*gvyvRfk9~W>4u6^+4{t_h7e5LEulS&ag4Zvxk#3KwpS?Tg5C9oNa!B3 z5ZIZpFT#VAQ&HyXd?D3X;N14fy(4^^L0xdHW%>a1!ojPvvYNF zA{Q$DrdUH!8C3ADig1aTZ={;5LPC4)Q%&BCwd*RU5TA=D$|b01_S!vVpJ*@js}{Sf zQmh||op43oMRH~<33m2&MZw_*l&CC;e}Ec z^(xU4HA$bb6u9RI<+-o2I;b?L{#bUT-Gl|?wa3UQGyL~ZJK{n#$ssy2;{Z--p4w-G zI^Tu00U#&HkOrD~JlXv8_{r(>x=KoKB-hHteS4%z{KRCLbj6$}N%=%g^y#PD%$poq z?->43$8)`;=5>d|5s2`$s_S9=p|E`<(lpwQ56G}qrEgHr4k87a893_JdX&L_f42u} zwwOjS(6J7?1NA+BjYnDd4}|0mSk#XY_LW2@vzjFRF5iihGrUTQT+{d3^0R?Ch^zd* zOMzj%@;Hus4h|feWUHYH-D2)(4E$-=@hpk7rE#ppCtpCT8TIXODsV`=QJ&X{hsZ6p zuq}HWr?)^l>0w!uS08LaahVe-lpDqNfqr#8m)GB#d78!jY*R3$N* zIbp;oLHVGXIV*p{*trFm#)--=l6tQU12sKT`R>TNq>+K zJsQ{a+LuETa8mUnkg^aYu99ucwaUo@_J$>N1JeYEn!{}nHq+1obu}b^1FiB^SFGFn68am^OpbEssLVM<8{M?;j zhto=aW9rYSuBx=>rtNO6b$;?GI+`kx+*X}yophU6wK62Bl*PQiV%0{B(Ki)(CP9=P z!s&O!08}Ngg81C$nVLCdyvF0-zYLm@U2^T2>4rY*w8Vx!tkw9B_b}Tv-qA8W79nRx*6xA%linooB*F$%U{(tMrw>U1v*$0YGl$X9Rf%c?bML_!Zg4EckLk3hJN_{+P^yKS!+%MjG9a)cgs3(lq5(#TlJsni_Gc`*-GZ zh~O_ry;VS^i5Dy4?uX7f2>ICOI?h0HY%8M}F1`6UEW z(&2^9!>gmlZIl;trKuXg=FgCi?Wql*5`0|_?!FQIswsNd|p!YY*6A7H}4ml4dGm>YSz+En9|y=oI?}g;S7wZm>oz?QCz0z<|@kt5G~vD?E*K>!&Gq zS_+^=L4o$xO<5E>-=-QlKlx;&A>=DWj`lc+Dj_c0b_A{mI?>YNk6rd4P!7VKg387{ zEqi-MMQ(z8RU+}9f?5y9R^EXY5Mwp%f{*u0C$SsrAk($IXW3xfr9aJbK)U31j+j?`J-&?w#S5|?*NP?Mr+uYToM z&1r3=XzYI8n@fz!j4Q<@jgytm!h4L6rQKh$#ZwU%GgQT{Zx9C)%%8G>wxbz}Tsoua z=niJA8&2xo)vaHE$K^EDw2`HE$kHlT%36R!;*)QrLdq+`%1YUdYxh1n5XZt0EqveQ zJ@VlNk%WU8KXOpBQ_Y>^i(vP3CoJ3dy=76YUFXnfta@_bcu z;FV=u3^5Q;I-`W{tnxg4$qP|vH0^F%i5HUE*8z#tU5gL&x+c^AH?cm_0F6LAdxY?H zd3iZsHib{;6+E#{0Tfj1U+UNoT}MmPRaN3VS4ABi4ZvCb8?;z+3b(K|i1fi9$Y*>L zDHd|l5%Q*@{qD2HydYwpqSjJ@OlTxgd#v9041$Xa9~!vq=+Tfe8_n)<9L~!=IYgO* zAg>YivLoZMbn7j0Kj!Ei zow2TZn#sOL(=7*1+Blk^wJ}KjLC;r9v9Y6&GA|7dbL2sJxW+?*$|Vr@D>eHOkfT%N8*VHY~|*ry%U7#=^0{yv);~5azBi(v}}SiqP*R zUgg71D#${aA$*n82tQqo)qYtOsv-_IVO&9?ZMftV$H*}a^n{DtVs+xp(EMdah= z-%^I;&}oGx3;A_wk1qhnM8AYOs&LroLnO|^28=a(OS(_56}vnOr(V(~TKnu`+@-`6 ze~_q532(Xr2EIy2B3GiA^_#;<67cyhT#^=w#v{WiL}x^x(H9vNt_B7dU^pXP$tDH) z=CS&-(98Zh{3g6PzaT&YQrOk~ExQJC_0rt;{2USfCDRNUl?wyXjK|sOh#C48!@f{x zI-^JA@<_p zhgqos)fMG4Ccug91(fy|CgkK|j!=NQsxs)0dwLD__Cjq`X$(T$yhDN)d2YIOJ<@srDEFE>Qvm+_^QLcK>q#{unx{7febPt z4gx(KdR=na8L^{u-u^Sr@BksNf_-}77Z@y`SMOLav&ibeMc5a&u${dtR)FuEY`lJ& zD+)1J5v8k&g;6(TB_q%Z?(zgVuc@;LMfW`tuMm%aD5D6C*K2)c><8agtGYagwwR)5 zGO4H1reNC6+hG$dfU~?4b><|vol8n`vR0yps+hkOjrC_RUQ>1^946m5*TX&71`E{f z36K*M(B(!yDi`-csbV)oYJS;g97T))42}D@Qip{aoC4~yT^C$<2!2&nzY}oIo)`tz zmX;P332kQ!V*Q&l^~VNbz_z7M4fd36<9+ibxpwX@?4DNmrE`nik08}nfZ!sGu6z+8 z?BY`JyGc6=OCaU{-dg#e8%GHUYiu>~zx?a}Z1nth#dxHOOkersS_@@kw)MXm&g&WJ z9*+8{h$N~W_KZMQIAuu*ykIs7-VCx3L#Yyp1oyoPyt4hl{>9lV1^2|>Q<92v$MPP# zvqKOG-rXKu?ZL21OYc(It2K&JMZMf^r=fd&On>!>0Qv3H9G$fwLG!uQyw0T37hV$Q zh>d{PT8+g)%H0awWp`ve`y-d2hr5ONoCJVeG*Fuh^2ma%o*EF zwPjv@*c2j!VB!Hmqa6@z-j=;_)J z=Z%CvI_?SQYGe)c%(J;m>n#saa26Y-pII0d(%Brb5_HC$6P~13*^VVLZ7ivH+b;~N z%5iukU+mtn9|Ci@vXA$4+12&m&Z?4pYxJnz)vK4D2e60dbV*>~HLGiLHufdgO@w6X z`fPS`NQW_$mIqw&D$-=jnDBcnbryExp6*GCl&#jzT!N>t97}OH->6N;7?%)+k>L9A z(%9y^y+_gtDPqIDDK=e_f#Vvp+>=}Ki7U+W3aX%7MceeQdh8=AMU2Db0HY4LudE5V z;84g&^4FU!_x%A>6VQ?LO|-eiID5NA3G96+pYyKi$Xs0a69j`tj$9IaVI_%(ry&U# z%bk;;O@n?ljUZI#j*7}f%{NW8_xBPM z2Zlbfup_^wz?*3EV(A&~R}oGrgFtMLIY8orI4NVgL$hxrV=}-82I@tn4{uA0J@e_x zd1k$(e;6|4T)m5X=vh)G*{p{v>W5VEBWWA+PKExN{?e~55G*|X&`{f8rrOkaKG-Py_K{A%P+pJPrqk>jWQgONqD z0Ok)O(bCRcMfk&%HN$+Dtb0po52oJnFg)2uu+Z!`VjJywkzJJJu^)o8gE6Y&9W_)bp!@^n)0f&xV~-tl!o5pWJ&# z3+5bu@~kuu-I?mPs!s7Po9)4XDjT#S{b3`|I`Soj|#&q#kcDJ(p!hUzslc9#o ztXilR`V^InqmLZ7tx3Nj6i8P4%LBC1o^JL>>h_SGS%Kl%hz7X8>E-e^b(UWc3wPWf1-xvdvTlene4r>GBpxNKPW>V|)#%B9;$#MF^ zS8B~GlQd`7s2=+9FROc77Bx~QIT&TK-?dzS%++${T_bh1lKM;pI#9>juoiN4GJY+k zCW7!W?m$J9e5w>4)BgnpWb3^=liuOz>bVg)??yE&^nTMYr+rolGo$v(sK zXIxyx)n$_)Ia>TMp~^aRZTHEv#DL6b`Yw^KyT2MlsYKWaA&;Im~jz1a%iBG9FNyfp`<>BETm}uc1 z9m!D%_t>ID+Nuye3rY`w`LGO}NU{hGmki}a27L~ajCI_pKm1$Q=1v?$=hVJ^l0i z)IzuJgQFUfdS8nAStB;<#`W+J^rBpQo{(0=izgO=9wViRR|WX5ilU)23ST|ewuG_L zasP?|*{F<<^!E7reyGmOd|PyS?ZdCd%}EPcmlnFnte6;FI1f2WYbFQ;+u|5LONi^! zEY_nE0{53JG}oK}RB?2*!;nRfU#K8gsRc9)t@p721mufCTy0HjaSGN;JmeHD3cE{1 zqNik`TvQY<0sSYIxC*9=wyz`D&)D$?_(ZS(>%P7rF)0)|jNAtuDz<(Z&qP+gZ^Xnh zgT}tGCKsQayVGsz>XyFIg`FjM;(ip{fQw7?;qb2?9i2Ttt}BpI$%gM}Z-x1ZiT073 zkN~G&&$C@0b|u1Pr2PYBD@=+OMCNt%jnrSnNLkKEd}$tpR#Y2&5Rk2|nyN|`)Shl& z*Mpilu#~`VcSIutv3@?sz!wX6XIUC+LZ#HU6q9Xkdq#l^*eDA6l8&E@wJqifTOfP( zoA5`(1qD7iq8yXev*0u2bH3W*eE|1KNe*v+tB)=SR(17_$xygCB4_F5y$iITj$PiZmNSGVH|s*vweyussH0_*YBOMn9`>9oAR>rnXG99l$C>HvSmUnNfIHqb4j zGB4l5l>2DOWFeYDG7>kfS2B}%^fmBV1)2>5Yirdc?KH!cnf-;k#>Qsk6y;f(S?CNE z3G9UexH}}(`iU!)czujYPke08&fsM{3Z-@Sl%O0Fu0>uAmegb&lS&OH`7t121xt97 zzeuZGQ=raxnNjvHq)ZnVw9o1gu`j?KNfe7v)#(b479Vj;9&%$S_mz#kuWTBx3No?Y z%R(RQVaj5~&;&{SmU1Tvp6NH)R_U0a6$wl52X%qG@)O&WWG|PBs!>iYM$0EiLjBTX ze9QW?U%?#LuYW{hl2gn0nP9)W{c8~^oAALM>u}{J+ul_JtGO{V1x+SCfk&Xr=n^mn z;a0!jnxNYe*qwuafyn=Fal?N>=$2EX=o18ksEE0Env@jC_NN11lR;G7*FTo?&Q${V zjGgXI=LvG*X!y1-Yh}uc#s*q=xZ@oc zbej6pL>i9eQ|>}u&+l*Wxq+)s)>J?`va>dQ=Y8@d1&fr<>$dN7iy9eTy%w>BykUNj+jxh}wqHdOdh9P>g zAoBa`M=sQ3+9tBEE|f7#ARn>|{Yp$?-9k*5*RvnBY7%T~p_4v+fQ_A55O@Xq_u5^X<5i&^cDtVwc#uii}|xO_9C8a=r!UwB7uJth-+8ndN4Os-+%7 zgmc2x9jC|6AwzpQ`NAnHF1izq_N-@{_h;@b0h{WBtZ%%TbQ%JHThz9 z(jW3Vw0`fMiN`lW$a!#0GyE_)v%PE4U&YH)9&c`UP8J@r)KG+Z=OMT6w8V;Th5m7d z6O3@1uyD~|4~U1mhx{aYb93W3w!(a6kP#No1Rhjom-^)MSx`fA1lh0h>gsp-wp%Av zt}|Y*1f5c!iWi zl@H}Tk5`mB&+D~r9%+fu_@zx}V^b}YehnkS=JDZOIWxNK9Tnx2Z2wEN|1aX+1FFfb z=@-X>9!10>0@9@mNa!G4>Ae@}DjftQ5PDGo5hA^VfIvV(Rf<4>pd!6PAc8=oLx502 z3549obH3v_?|bk1-|v3+e(UdIxmKR_JiE>8nctq7J=2$U2Af<}V0^b_SEc)6CG@s+ z(-_1oL|uX_)gIfHYE7>mmQst=wDmpmuEv}4v36DQSd>-HW0lga;k}n`y9U*T)md8K z;D*G0>>S?w)Fll1={7iZ}Sfw#Sr{c65-GxA0b_i@~2W6BPNfra{@lEpFpp!OO}nG2rm&2 zaAmbJMK7#>tUJJ9mAW~h5$HMznjl5 z4L={%kfzUYR=B}$v`MG??r8|*(?@7{S=_$X6Df?1o;X*LiEjH=TInsW)KYCMiWr_qJvA1LgSfNc6fCa4*Xk*YqBcSosh@*rwcV`>ztaA~t@Df6 z>mBTcx^*ir4LM3~eeil#GQy{{!~-{9otX5np!18kSQkO51&ECpv9VR@*DU*3;w|*F zAmsw{ZK+T76HKySN(oAEI22`;icR*tmsUsJZ+U&NLi48MI^0fI{wRDoS@n7)@4E=} z(-KKuNMhl|J!DUr6hmAp0@W|2DQo4E{Yg|t73(@PC!P6Kn@vp#&*%ESC!q3@fF>^& z+5S$Bp{S6_+Eb8;=lx|NsacoBTMh3d-f?&x zsD#a`UDdPRY|TnfC+#WE+}gjX(SL0w&?1YW^hLDaGe>A{+66h^)+%C-0wt-W8EngN z(QVvz}K;`Oi~Y{Tb;(bb2VK;*@rPQpxjB5#yn z&x^TWiyB-W5`br`R3oEB&h5Lq0&X6=Quv85EAKitr_fw+zti0i!a2|$t0L=V*&IC+ zR(Mu~y!FepJFv4>uDxlhy0gM~jc=h1G9J!eFa=MMIG&;`SZgjGL7PtO|5|dOx*Qsh4Q=CFAo{b zEyRB?qziNHPdj(AI)|Nq+yfz<>AG<*I2EN%SI979Xuwo5)kd+zmyv`ZSh1?yIY1m{@uB+Pu>_^= z*@3TD3}XuO-?kw0Q+vIvWn8H!)dX3-LD*f>Hw@DsP46DU-I9-{*g`O6ZWrTUc=lSVcoWcAT+lL4GJ?pR|IuFK5BwJwZM z+tfuFfhb+xn5;5YX9}dp`HhbmuRbpe^j1zOwMH=&db+m5RXrNPJ|NOQkK+gd3KJz@hIiFDgyGQpYE$8aYgxaHKPaYZs? z?%Avv_!7INx zRs`IvD%S7a8;2Xp`s87okacqbGkt`I^nuEYHy3=*Z#)GuyHFk2>SN}rWQ&VI6Qj}A z8mwd5bohJs#c?34Yn!I-_ag>U#4kmJAwHw@En%rRjw zvG}N$H5;!O!o71B>zV*Z(@Gz{_o5or)8DS%)$94e3n?Jv)I2eh^w#j6UQ3EOWQ%X& z%TZcFsW|CT$pV^@$5>_Wu{UH$isE8uF*3{OKF=deTv9}k_dj-lUWSddOsrqw<%emE z&KRbcrzz(%JbqE{uh_f)bWFtmQys8h5wMFShONaXFd~N=gDOygM+40POLqGsVxBY2 zmx#;<(I4|H+{>0icw|_KTAf@#R)(9&zuX|13~%oZjim1kv$nMs5IjSJ3_dppkYjAx zAUG5r%vN!@RNo38FQZaH%>*a9E(=)HzG|bUL+W5?1xD7QtQkWr(Fu=YLUxyEK!knC zWt!%%jNJJ>WjCIc^xKx6hMn-!3#5KGg;%uJ=(z7CKQ>v)88|i-uAg1lGknejb!%mb zdg}PyZ>hr7pns|V_(#8rs~a+qpk+G|{mqMc4 zm{_+GQ05O{@@GW?#TB8oPAzKzzk3s|EH8`(LY&WCbapc@x?1w1s=j2f3MSD?*zVoE zOft+%J$qzzPnwE!Q16oICq0~Uh3tpSFXdgcFfB=X4jKuw>}QQUK5Y&dTzjEtZa-|v zYWNujx=hhJLLNK!s^|O-$*bOx6nGclGGmeQz?1Cy6#;^7DmUnwUyxm`1nw&OM&GEN zk3MPFwDfEdsD)#@3=yzvI_x*7qz_-?(lF5c(gNavq0ElfGAIGz)P*EI}2& zqB3zm)iWG-PIcq#xwi|B@m3pi3V~8#EcW_cLwp5E_BPKM6!Ix`9*hSV$Vu%t2Pic5 zLCDBzl73Osye@`48sVFlEm`%AP_lcDm!}$+O-}etj_R{L-E1bpm{SLly(ppG zKSiI|_%hIcrrA@|z?&8DOHg4%!fkEdDpoXoXnLY*L+lS&+sbbz6UzP-wwn2&kW?LO ziw!)w=-Ihhsa&{;B%U*|JWThLsed|EC3JPaIU6zd6cfEXruAgk2ITjp=ZA)?$yR^s zVo|OiW}K1c^v8w}Iw5&h5{}Epgf@CU;JP%3qKUN$F>gsQJzQ#%GtAC1d+B-d!vQ}x zS#Jx9XMLrs+v*X$`9)nWVgY#bWpAq*rE8e33Y!1*@JeM}uk(i=*_avMty&9~yTqM> zR#emJ^S~&pn9s?N#GkcREVhSD*O|8PJvdCCr4F&0_a%J#eo`5)rv*!+8V)M7#q+;E4*Gfmf z+r9;dB1?lFH4)C4<-)bnayZp&dwWW9RLtQUV~Tu3K+ztjYLVW+;&qb=y_v@?i`QZ~ zTi?Gbz3j7GyA2d8c6P_$scKzVD)=q*WZp6i?nB|njl0mL!6J@xWMsDg7?E8ONCM>- z!O#p5nJoUIn}fQJ2E0mlZDw`J}7jLnK4aj&Wl=Ju5_=T{|BjYpeiJgMSa7M)x zvnA}c?xox*H;wiUBwTV8yghh<13I3;JpsyG0OSH0`dGn zbTSaTP5dCI>_3qcMtP|^_w2XHia+th3@-Eg+nzXxR&7!NSPt} zPmg1deRWKilX!;|oPPlSS^ivYz8W^riwC`EK91`hwqt~rpP(CF!b1SpyG>DLBpb-v z6TV@t79fv{IYXu``l~k;b{%gJIvSiz=(n0$!rZp-0mX4@S=N z3${ATo6rmu5bUmF(tXKhg9fywSq(Lm$wf-0b3&W*Oo9BdX6fh9(e)oJWels zSKoT?J1wn%RXK2*AWmZH0Ti=Vpp$dqs5&IzNKf}^UN>t-g@sGxpdhQ5cywM~S4p`@ zvRmtk1{AIYIk*?A9fV`6BMzwvxSlt)QDc=)`JL=x);}anA@a*@V~gl_1?>dKB*Zyb zr+zu@@<5&&IUQDCWmU7jYcQ{jLst_UqdF$QIi~b`6@xg0YvvKysW^W$C3C^XY_<%M zX`#csv>Id`@FpqgWmW>BfXAdM7=I?wcxYbJqpDZM*lY`X>?#i22A2E95zklExg7q5 zY5vzYIR39tq<8U17-R1V?#$b zy4E-ayl(2AiAquM5&y2BCKkJB!dW{Ms3ET>9Pj3A0!4NzM-CgJTgL^8>QI`bOFWQwYC~nF0-AK+plafG}8={`1Z)+EZHaHS&l5Fd!ic7sjB_uFxnI3dr729m zfdCOhmTQq5GRqdG?H7l0XgwT~XqCEo(AVX7SP|r8~WEyC5|fUMx|&?xECFm$ngqwN4{S)}rjy zWoZcI;xLO|SI_`n`Z{+ z`C_3;E>HWoLxVVyk44-q{XSHb_a+}SV?E;h-M=AF2yrt{(fFxCwpeLFtVp;vV{z2m zJk6?nhT1W=#E8%OP~yN*K{9s6%Dp1K_p94vgzg1{LCAZR)NiwOvRn^#CPwF%>EBCW zEN)8cFzQndJ|N3*{g-7_Df6j(CG+vaZIXDm&F~5t&GqrMyIhOTK6Z)t@ei*WAC8L4 zs|&|8WJ$?D-hsL$jg`u-jzR=U;+5t?npo+h@w0x|oXbTtfkFq*GK_}I&sy=*4*baGIsfo;)Q-O0E&ZLnd4 z5uHNL)NB3w2R!1gYJxbFThgjgQ64$4La6vFOW06c@&If>sCXy&3DRJYiZ5e(gnRp4 z7ymV*h$ZTTr~6iFoSpJ-_vI%uFFsrUr2)NFp_uIM%Lp-PvoMT)3KOYFI40EweF!hY zDfhU4(H=5dI*`icq}kz?Q>gaYC%g5xoqfPKAPw(xi@$pwn-m%8)4U7KRgk=GGV0-c zw5uZa^5jb-55aLxfQsS!E={G`kjOpj{z?>{kQ6Dl1OVKty1t?I+v{iUE&W0Y{|!R_ zziK}Ie}YjmGkenoF@2Y&r>DW{!?#m6CTV3w0-li4IlvM?g@W{7swXqQ`Figq4ftC0 zvZBBJ&f6bcPSilng1?W6^e~XDEUUUT*$=v3N>el(6&bY*++!g-`E_;0$+0>Wft2*L z5jVG%^_|oHMWdRHuweaTD!tZ|8`B<|ZoK=oqpW`5B+J+DBiG(n1&9Ix>!;wl zdCW(9jId#Z#;&_5_z~}GM^?n-u^zdvPepqxOoqKOoxT}Oocq>j)Jg<2vg@#HNf~22 zi+F8b6Y;h$B0zHNO>8^X^W-@e&P0FOmh)XQ%x9h20%m=(y<}^cr#3m*@-g5b$nPs2Ryq-e9q&` zHoHq9@w7)}_cywg%zIwIHLU%TT#d2P(*uhSUKFXC>aTRDhGK?7aZ6@l{%Nif zHqmkjQemDo5$l^`ghqeKlaINo3bKKPB4gS?xobgH3JgtILJ|x|bhRcyo9P@MC`mBa zIrv)R&?=@I$PxTOAy^0fIt_u`AE!Z%?r(3ZHr#(n1*`1TG=zP!n~H*6QjhPesr?5J zH)qdaF2>5j9bd{OAXxY{63@nau_kffk`oym`8zPoF#)l)^~a(lv6HjR%X8}73$)KI z0_C` zJRY%IuQS?C5EHJ!KBQ6I_65S@mIpSmFo2nE*A-=p?L8Xx23t=-HE>x3Lm3Vd{zP7kP4+kmbe@tbA2 z*C+yuuyRc`{6DTz|D2Ps7Ar2u+K33uo05s!o=vS=R*Nx@TJO)B+kY;x|Lfxfu`{cQ z|K!*+WFpBoc(-mIu(_Na;n=<7{!0a)C9~(|HT)qA%=|p;&t;!RjLpn=AVvPTyr)O@ ztndGmqW{_*C!~KO;v$RxkLQ2<*J&)r2__Cg-B@=!m&uIY0-5OVDJ>*LS+Sj|)(i!z zZTs^#mwR^U01XQHuo}dA^J9ND4?z)ycx1F1v8~Qi92jH;^_rUQQVl z&_#3oR@uVx6`+z;&?~E*1b)tYrrm?|K#H&ZYmEzRW?cqTO@5yK{)fHF2b-99)xvsD z3^HK1xb~bnr-Bn1+158k9&kJNZI@m1y##*y%a<*0R3H!MDELm;hP%4D%xps-2e|1n zv#P6Ga2e zEhQ#)$8JS;uU^UTf=4J}&6Y&yN#zHMfx(}g`;m}WQ!7V0*);@`eoiHsE)=Lq!})nQ z(5ZTxEyUey6K1rnYLifHj!#{n2hiz;Vr*q(TcJdo88jW2X5CCNZBxO>oi@>(O=4=>f$?xK{( zuT6}e@6c`ti$jP`I<(x*CtZukZ1Me;$`2grO%B*_KbT>*8IQ&>^TF&y_qU%zecM$x zYg?6mszt)h=jksHc6u+iG9$I<-41cf;d#@IL?Fn!wZ%JV1sG{44e{jk)2C-oBx1_H zp2aF_jy{g@RWs;juHmkw8yw9@^A{d(LpWZ#OJ?#xkBqw`D z|130Fi?{t|S+Tk+wujR*v6eku2KPD<(Q#E8S7FHND1cXp{*_ghyoOsN5j4!* zNP2oUXu&(7N2{Ju3XI5u@A*xV^2`i}J}ZQZ{OoW)g;vs7iy+RHwE>hJpmCYrBZX!q zz=2!xY0wwERkwp8zL^Hy6!g|4c+;u&ffBjLV1FNIDweV|J!xr%SNOO{UvYoVL5vJqDu)h?q_uacbf{Z*S&|8z8{Ty1ExKtphVpt> zd1aTDUI9F8=2uzJ=?v%Z?^5Z%YsLk6+%u)OV8*%|w{oA{0;c9F8mP~e>QVuBYR*6i z4gy=(NPnR;=49#OrcLPbH&4~mtti3JgT;5@eBkNRb^~o$Yk&3~3=* z&t6n;ua>L*YR4rdS}Xb&)K}7{-8(8djhC85RLh0&#zGFIddzH_?X_&htaG^0Cu@}p zihKv(04e&_+Oy~DbceUC)#^;ow20Ch1b51x^l3_j`WJ&11jsTnSJFSG7{31Cs_BL8 zk^M;)I=Q=qjKD#Z14EF!c95%Tw$bx8{Sk}gvWABi-~y2iomdTvVqv+d{;A`|7t2bO z3A~``=H1DBH_|sBm(D1(DljLYQld?(*D;vXNi?h6w?PCWn%*s+sL9cR;4(In7X_^m zoY?{N8#{T%p4DA9pGQ;F(xfL_7-qVb2zgLN^q^iF*!cxXT4)IbyqU_NC=M~q+Z$_< zps6Tw?3;c~Ta@yEySD3`5IHFOg?U-WJNUc?)494t2;mxc#72vuacsuot+ev}yST#*ub1GNVgJdxY zyIT26b<4jSw$PWl*zq+!+_I1~7oPddJ$q~!Tm^L-VN-B&>6LvLAOfcdpdfP;A&`TL zZrGJ)83u>-5--ogVp$uLz^OsPypY%&7j3PC3KN6!Fs;7C(XgiAMFNDT!DH%VuOrs-#>Wd6 zJVJu;l1@Pb-HwHCd9*b_DV$TYZRepd{l_20$z3}fj2;>ke|a4lfpNvI@3pJEkf&OXb09s2xF(Q$QI0OXX57>TjM zy-%uL(Y5AY@t2p)&a7_I3w=%7=uCaU=SP*B2&I_+gG^|2R9Zb=VB&bKK7NmMT9()} zeB4TZvpIBreA)H{L^#?+VWRa(fd+E&%uGn1qnIZWmvz~0h~IvCjrwXs(l~-2{>E{E zz4#(Q(_wNPWt0h&vFaxOQq~X~K-wcL!%u0V zDT-51sdY9)e>>`UGUwsggS&bpY_U*~rXi*LJOP_G#RP^SGz?`7!FBj-buwW=@)pPUesqbM~6o>5z?(^34paNsusqgJT9>U_#G{(A7dc5_4*lo(E zw-Ou#>XLelIVceK4WBpk7RxQZhDl6Sz@;1B$Az9Q4&?;3lCZ-qE1MS-nvPe0 z_XTbCytd>Cw;X?xBRe;QY2hqcm&v?xW#{tGcJr>xK&==E z>AUsu*2s|KdOx2}3<%=){3@2X6I^c;urgshgoi7*@cf|GR=K_QR(w2gPptSx`yHgG zawPn!QZt?Tv%fSd8JOk|;FLK>h_xiPHU=C`#-6&JLx*}3v7Yj)tzbNw)p~u6bcg}j zHu}R!g-{}0;PGG>%5VRqXr2e*AgWM8H&VTAIN4C_B-nWWzX__TKPykl6D1?_UuOe% z19F(m9N@5@2<_i6B2S`LB^BU_BoiVB-~#Zkn2G&oaj8!!KNk@&QG;Ju{d{b6HIbrP z=~V6l*}b?VTVJx|$S(4U`>pYhfs{g*6DdTZfS=F1$jPLx{9pbMorq!$y}TtyG-`5XGqYM zS0~0c5&BYqOJS()^@aBjKc6K?D^IZbDFl? z&Lir@I)p@ME{CSYiG9e{=Zj3u_RPSosui?KlAZ!_4=RXEAg3!$aTnQL%Jv-Dv^USV z!SMQ|I$L$`_{~cJiczQ_7r~IbVa89?Rfsy(Wubs0k1YVIooNsjtp zoD&3rQ1rcnU-sbF( zw_DAZ^pypF4i_%zxZ#-Itp<{wq|d1T2BdqE4&JpBQe9w2B{^-Rhyc?f>8WS6QuA62 z8*xy80RE7Q=eR-F&~Z}$3=}Pq1#g$du!bJ8g`}277yg{as$x0~GFW?8(0hhsGsmsi ziLBYk{AqrmB3&JfpBLTx<&JQ7S9_-*h3H61G3daG2`zT=$shMP%g7AqCM4dfrKRP2 zy=Qu4cLDYB-l$&h7vnkT*S+;#q2=Xe1(H;1che@aS3J3cC=_@ZCLverHYNv1u}O}GA73Zdf2%F36bs{F2kZPM z=QqmK*w@{SGY9ir63HKsV|+In?vh-4(A}-cV^?UL9wgiw8>*!ZStwwo*K1C*eWaZ_ zkhfm&lXASb=G8yDt?sb(@;2NbHyC_lSG-I5?xKdH;1Y;qmTYoU;MuXBEc*+36%D2`Gm9LDgN&tal0(;W7qsn3nF(x*y9Ji_fa zL2yezOH!*QMSlo5Nf&CaQqp%6e);PgOB<~uK6nB{V@a4t8x#l7_0?*`({q)Q!-`cPd!t=ddE8&7UqnEE>(v}=!a%8O~`9;2kN^x7G4t8i@FmJBBo{DJn&<0=jDx!%Z2xG z&{-!>rQ6IQl{3p2>bz{}rdO;oG3a2dc4jhdg%01%TIWe>zsxOm_td?xvD|(DY!~C8 zobKu!D=`%IwIVr82k=5_6>Z8qNynafQ<2iy(8H6a-oTbQ&?w*TdPd-6Pl^%6*P3-4 zUvyK8i^OC}NkSlBlEuhJWA(|xrVntxdM{SG&5+vuMxmf#&uEvRM~U1YgFJXN6w>Jb zn02cEx9T6%3}kAVt4A0}_`U->U8>9G(mqT2blD0&mB?D3uEWIVRL7f7YC8%uzgbtp zUtKjSZETcU3xI0xaSqie8Y$COM@VZ2N|$u#xaK(ZTZ__k5OeOjCqe}u25;Np+)PFs zzK6JruJ{C8VCH)|VQi??!X1a5ZtYBF*kUIkmRT~KL_yk43p>pv*){ftXKDIYA)a&c zAFPB*UN-7AtS0mp>#4>jUxp__CGuY|R&f<;yUXS|v?#^Pao0%__1SpAT=;vI+w37a z@1i)Z21_m)*J~>3-K6 zVGk=>c28p0=nGcw}GT^lWY*A~#j6 zNEKvZ?83htrc=Dk%Xr{7SE~YA3K(X`^-9b-1{aB~_~^JSJVuS&i5q`?d6c$srH?b` zBFCyWLhr59gmrfbw>bY0PFu_?-Q3j^w;V?SxBM`S05iJBYv6HmSxQ?^G#pCv6|>}E zxz{AI5t3rrqF5=oBW*tB`sm4iK-LUyV!+UCbi&Y9JAQLo{kpU@n(_HKSlOm7%eZ34&GtU~>k4-tqOtfOgH& z{L$3Vg}E2^p)RVR#|-g*j=Q5FA=?DLJX-T+l4k5RbK|QZehZa`Cs-rEzVIW>SObb< zrpGxt#_x@J8yl+w82xO%$iWX5r;!XDDvh8=IEI@1iK(XtqD@1d(W~)RxeDUcE$u4K zS9W?mu*1K-nCUz@>MB0qdDN6!rr?XAT`o3)7fC7r^ z`DJt=iwwv>FG_1{LoS6?H=U3T>}*b@7zbT`M}+GNzks3KyW6TnPVrlC@!bC3Qv1~# zDE&OJ(~LW%!ic1i+Ya&q7X%n^x9>r5YjOgb-6l)ay3R^7X+3aWHeO%-Ov&NwxJiL@ z9X1F*Hf_tIP3$4A2PVfI+k-Ot%=7~8b8yeLKh!1B%|8{cEe(la+m|v`j07YH3+GoHldIHtq7T854fK*g7 z>@EXcymDHvtP%u#X!K&0a~)6dGgZGEvS{uy$$wm_|LUU(qOMrspGCEksuanm?a%(v za!jVBj_VNOlX&hPt+^8O2%dd4DgS^2=IW|Xa#5{>vvi{}gBRFGy#?|TR=X{qOrab? z!Nuw$M`{Z%G_*vEOTMe|N+vim#K;?F+0+~?jn)D);0AN$2l8_DaDs<7<#eqh-1;gW z6M822L;jEz?aoiQ?Yt<7SKl${P2I9AX@e0BGm(Ly>!Tw4C6b7UZLe5?rsEu40LgqA ze17N9U3!87R|a=XBRe@=S)+seVmJ9-?GRViW?J{Rvi2D#sH zaeoOL-RqL5(J2NJx@jCZfMHon%?@2R)KjwBs^bQOuiJ1@fUFcCK!56q{LBEZY1Aw# z#d%zQkbB!xgZFm~Su$v(pEA^Ql9}3Q* z?KS9J7$pt*`{-z0z8QjNnU*vxKHUKj@`P|SCK`y-Y~ND`b-4rN{Mk`L+qK49-v8Af zd&j>4c`&;LWuA2_{!gGC!0r!w*noQBKmdvqV59^xzwrW~|0k0F`RGivm0tOq@y-Gj z=z`r4@RsU!9%(l$Z3NYZd|3MPyH8glZ>C5oS7x3|1S(BB-v0Wwj}6?<1dN(YNQv!& z!_`E$rF#om;($H$I@zcBGs3rliHKfgN0~Jxcq$k58Gt; z9}V{zR1%iA)klSaW*LBHw;JwW>0x3w;~u$W*^x(_0Bo{_|MrPS;cr}zT-ojI1YcRz zTmTL%vL4sMfisA>RC2GSHbVV*m$=(4@R?8Z7ycMcvXJUbsoXb4?_jV`6RJ2N?)txW zh2~WE&@>3~zc-RL?`MWdheX>1Z>y~KI_xB_sdc_Q%BQQk3(af%{(2u6$N8U@-lYdk@_9I zBWTmA=GNNmcYGXn2cj2D5*qtD9jJ#LO*2>^%m+@sOX=KN5Bl)UocG< ztdqjYO%;vy>fD+TsFpXt##T<;Xhf#9X8JxokZe8FBN+&sZenayljZlvcmj+3H%-^= z15S3r_6?q3Bw;60O=g}fyvdQTWshgpFtZ~u2P;v>6rh@_RzGa}Y)J%Cr913PAluZFbBM(^6W)4skq7l@0e{j#J@fzLjEB1h((u1dqMEwUwnpAH$4w6%?bs8h%hYK#kbgAqcujg0okz^0{9!DYv7j)$k z^-#=@EQ)4Q7Mp9ZYm2RKH7Au@jn<$(p;qvG7hk)+`;NZJZaaz4)4_PZkoDdNp0~ZK zLpP)#Z*7OAj1DUEf

            dw>f44Hz%6nQ4>S%D2fK3fszVj`e~PsvM`#7p#s=A3Pn{u zk4*|0sY81i$esy5Z`cyY4;?x?t+p89jJb9g)Ya6Vco?pd> zhuVSD-P$H<7?JziPPQE^A&p0aEmd1dsj79+gJDx<=c+q;@5EYR3Mz{-<}5d7gfd-T zH(BAj@H4S$wy+r=!aQZl@31}vMeNd0$teb7em{EQU8P^#=&kAJZA5v|$;O@+Cq1OX zrqzf>&g57tvHLkj^%1AbcV;U*Yq2!wO-f=LQ@qvJ*Sja_9|V#9Up?u#7I|7z!rmra zZ=4cd>wR#Ccm50+%=4_*{b`tOy}tMVD%EvT}^ylTI&njLL5 z@V%;aARCrcE|%8wSx{|n_Zs86+-*ofsAfW@uYXk_;@Z4fxb4#V?7Z;n)+ zbirA-i!~}R8M6aFHFuB&XX>l$O|NTJ-$Rk~HG5%Qi}I1dW!gZ&A@1A6hApe(w*<;J zD=!1St1*mB(b-;Zd~?0=vF*(Ik?rWAEmq^}E$>T9-z8RiW4lx|+`{EOmMcW`hE%$( zY~;rWf3sf9aS9ICAouB5DT}sR!hG-w;k%@%Vd^d!#xggB)P$pSLkV1H1t#PjlW3T& z``JW(XneF92+!Vf!zh@vHLdoptl^C*u#%3sS0s<}(v_<{d?Z=guZG!%l9hx!M&86P zSxL+BWLhmS03ji+r(-bWM6qpzNhsmNainQK-llS)cA=+^foL1q>;N21G&Bmm;{bh` zoEB=8&^nf2&rb5r9zY_~Y`dBBrW3XlR+b`Fk_M`pqdRW}=+uOst*=+sRj%~Z&yrhw zyL-T_j4nB>DWp)*jLeyde z1GsYH7Zfai>UB|#EU#HNY)Hw>jLxy7zBJ&@`TSB{D371y6WN@9I@MXht`X&hdkYrV=^4Pp)I$ADj=ICxybk10B4Mp+D>Jj8%OvFFqcnbXLVz(^;kZTt zV6IEbAaAqL^!mZDmecF4s@dync%0d#(HJY+!bZk0QjXUoUagt?89REq%}UnI#*TK6 z#N}6%@oFF?Wke#nOJ!FCpBEqxp0ULf+x(KpPla>r0mYpmJOZU)A(;*f^rL4-Ch4q~ z>}0y&}?8Uz;TxZT|D|6V%z>WFXV&*ab=0=)n0vnx=&%jM&XjJyikywOsKc)(F>(dZYh%)t4ux+ zCywv|=%(+6s6^J#rrdUF<8JC!d~%1x>^x!q+9t;~zONQo*euxQ)uR3*^mBTY^ z2ugBJUALDx)p6fmlsj6EqQjD`Or05Z%k&)IUR_z64udZ9Sp>sA8sKfGbH8(|e!(tNWQs3t3V>?ePy^D*nX6 z=svc@-m@9L1^{}W0=xOVviez00Ko5!igT%S%0E*<|IDyu#kSo;!TwiD=gI{CqPqI} zRsy!H`dJsb{GYj$`8jP?o7>5g5!V|3%Gyl+j$iLT+u|a5;?FGdKf?^olvM$%|9{jX z0GbWBzwlQr0-Ebp&9}gR)grhYZDs?UZ)D_=L$`{4W+Vf^>7Q@hr=4PnHj(FA-20cO z#oX!jul_kBd;5_9=$~oH{`~OsfY{|2osZ);01gKX5+zNvTZ6 zQ^;)d`AEUaRFj@DPr5$0Wbi)C&?&M;hqhz|z<}nJXSr3*1u zEeaptC#LDj?e2nQl8s)r#)t3Df#>za3o6jfgHXO_ja0zlms{)CIG%hnIhD&{|Jv); zR;}ozRw-(1L+7NCP{ zcT2B2IyBJ$iKQ`CzX|Z0cG@p~GkT;y-BcY0HWzGQN8dikT#&z(3f!mQEMYg(d=t1< zHBDjye@WEpVIT!{+P3e;F_d0>M}lD9NN!fuH&AHGg5g2_Hl|)Oe9TLdU^!d0-dc5o z8lCA=0?#xcutd225>ZZ$sEX_WEr-vMuC3-eXTpIcLe_~+x;gV*TfOtRK|0zu1=d0iRNT2D?SZ%u6; z@4!B0ty_b@bt=Tv=vH6wxb5hRUEffLA0ed=2Ifbdw|V+2&1jJWu*rN8c;umHzPyL`+ouhe26*4mQe{A9TFbj3$(S{0?w%hi>q3MTi6YThKeN26A z@Y5{XN>yWGxJ`WY&E%tP{_2)-3bot4oF>^T;-vyQI*8xBymHOAm3YqD zmrE!lIliml^q9eC(*AdV4BWrSAaMnAw*@@0`=*(;<>cIM`pQI=i~iM(L^N ze;WY4brqUz7`H~)K;^FIsX|Gmomr-J(>8UN3_OOChd^o$So zy?cv-jGE_9eF-!t(%q#Juog^&5ifoLZ%98J%!aW zb}fK8FYA}W)SC2b%q@kj>`r@y>rN)Iqu=bzbC{t7YKJ0^)ocua8afwN*BZT-om=9# zW~7tR!yB1J1~O}l{yqO%4!UkvY(W=I33RDw;DUY_+552ko8uxyTm)vOxrj0 z6g#tC{5J~3z1xa#&&npN+(b86s{#6fx9fmve7ZM%aq_Qe^eVH{b=zQf0v~z(4)Gwc z2!dU(zGw(RzGO3k-gV4Bu@_%zCuj3wFY@nC&I4mG#A?P`O&{1*-EqCyNIWB0Ow)+6 zfatCHi;ZXOVc+tD4Q|c9z<;?<-B{3CjxsU!+wHMwu3b6z_e_9OWKt|@G4zq}UOC=4 zWRr-aG$wuC_#JO^$7}(?2*tB*Jn2A{4;vumIN#33KsPT*x}}Hxr2fV48s)edT{J_ufHGwSCv9-rS0c zfP#ROpwf$gN|Ppvgx(<_kbp|>5Fm6A5eoKGerw(Q{qk;BDG7i4w@>`5f)oXYyS62QrlRX_ z6|k8G+drr*)I9$5&S)|(Ow`~91Xyu@mb$3uHGFD;41EO6%5m_4`VBpq`2H8-`W!~y z6(HpFkguZ*7qD}FRQ+8{w!f#xUn74KViEe3Kes(ens<^f7Vr`dN+r*WK<_P-KLad8 z$(l3BCHuk7BU!-Gb3VrTW5Mp@0PXqt9sx5^@6{iT`|d)5Ydi5#{qUp_CnMOyoncSU zg)BysJtlRDB^-&o6}lfU?lq5mP@vNDI5<4iU{!i@;z|jSn<7`dA~*KLaTGAjGKjav zbzp#keD3$YB`Uf>5Wkl3fYO7M$>pKTTWIBD_@y_+;C`7~snsk-!02Q@KDCyz5C;e-OrPRlXVXT^>Z>V=y&jZwLos6vx3-tR6>Z+w{sn}dq_9BRP|h|w1UP{4+d?B#)^kk1kstQy08U+q0NI+5K# zaprS7$A2F%Hr6eXP|^-Jd8aW{-OS6`D}n`2z|ReC@gZiJR^^cE54?VTRVFA2r8B!E zbmKd^lmq4a>9}tnJ;PnRMs!fRJ7!8(VzhknAx!zJIL?XE2(skm0yAN_ja!+1jW`zh zE3@bEj)N_-4XCi){~w$q|95cN|E#YgnUT;@I|J%ht^buk_YY*9pMIM!w$yM-h57tM*vwAsy~>D}ed7+zL)@KTgLA zo0Y3eEGmShmP7^&E0$`h0h(Vh@S2O>g{M@XFvAAr8;CN>B8d+E9mAC4tR4lfYbrrN z^kgd3cm9hCaH_9$zEj5L)M(4SZ&qUWuMfPs$CaPOhd4a z&w$f2C%^f*t}t6IvxAQzsx@j-t~$BiWn~%kuIHh%Tmh!wRBM!6=b7dkXi6JGlU%?+ zQxMi%<=k@+;vv@Gwwg1h`EooDtKUYMHaXqAL+KNhmVoQu(~qNEv|WYDw~Fu7mHIk# z?#R&QkJF}Ddk_wi19oBa+wI2XC+>AKfNjY8J69$Xu zaj~JcZ<6rGGe*`udwoGMX_d#d=wj0o*$RIDzzCDKN+@}AmGCyN>NQ<%su7&b!>g@A zGEv<9;@EOdEwC~CZ`ClU91fJ}0&LLU^|f42nJBy53u|^UdUf7mt#XuM7@7r>0SnYh zZ01{KVFf#p?3SygleTf_zdMEQ%DwoqwL(^cxvjg3(84?!0zZ|*Cqq@<(&Pn!OJQZX z!EiJ2xG*DVUxcljI)vX-m)+hRBiLv&~(ExK~SSEzje$7kl;NN{3(v z6H?b_(itMC;oJQ3>~ZOwmn=#T{X^Gk$1Q~vhW=&q=-u+Ck%Du45dJ4Vzem?Y<*h(pl3?g=}HB-Z`&kGy< zTT+#Q(Mr|oVJRn%n6aV7smkfZ8hJYTu=ILm4t96xI?;9UQNu(khmqqt%6>fA=x3ox z=ngG*+31`@=LOp3(Dz4R#!7JQpz$G0cJGc2#*4SFcdEruV>P`(UlY9N17Q>(|cod94KSQLIIjsYyiEazeH4CVe?n)}Mhj`SRDAToFcr!dpWVpkd7? zsr7L;1|?rDFKob_5pw*O`uEJDl<(l%W+TPjS%k+=9`0CfM=f~V%X_^RuPZDtxYL^a zdT51q;qW>V{|Y;%0YlSw!7>SapQZ37W;6RYxtNN5OCR6L6E5-|n)>TYeebHH)4E-3xA$;*hLys1~^;-e0IxqEQF%g>6l9_O+PE#N5k|L=tCTJw+ zyT|wHS)5*IIP$b4FkIj(hq+|9U_a}oUc=i;ioH(!M4R6iza*w2g8+}CGTAAE@Me-9 zEjUm<$9I59oJXSU_+_p6W&@@1O*zpiEilhS^Yf5uj$7~o7Z#UZSAO=!C)27rV=1h; z_qIfD1INNUr22Sb*kv$h@$9_N0BT+068Iew;a7(P!-qy`N0{+*x=$3;3u50wike2HSql+W6>&m##Ei?QY$>&rif;>hU?NV$Mos6Ay=xMKihRgNZ|aq&oF|mYM=Jgw0y0Stn}-73Wd?FMJVo z6>t0Pot^Ss-MP^CB|wH6**edwQMM!|ur(pb@RJU>Hikt-;fhut=8ctA;REu6i_5_> z22$?;WG`4bqWz9MdnYk<>c#dA(uj! zPIm$-CPph%_;dt{k9Aq3yXjZ_^9-Gxs8h?-ac*~|yPX>#OSQEN61!C4OeuS{%G#ks z!MLL`*mjd}z&yX|JpX*|h`rAnV_9Ahbptb>i%w1|#U`#~;ZDO7W*ZIz?V;nw%uYK% z*Rg3J3pv-mw)Z#(ScBZ$Xl;8Bw7z<-*6m2a23>Yq^tGlY1drnR6)@A1!ED;XI(bKSjA`iQ>=xxgvM0^neNow8_y6%?7y}Ro8SvGotzT!-yuD)Xq&fQ5yf72w zSo4=7>w~!XQ_cD~)TF2QzOd25hS9q9{n_5OANWx6__n+Gq~A-yOrx6osG~dzGcP>h zN`rae_oc&~=^xQ~#F{lGVV{6$HNfu^%@>TwT$UabXO*i!GKw{Q$LamY;rpj(J zwE?Np^OdEQOX*E6TE)|nVcZP?fmNlsVFU58hEf@76IadIZaV-rSr8BC4iS@ouL?b) zYD;7EiY)J&&h?a1t#t;La}}Qnw8$9(*$eKdrIFG*D@%3#{uh8@836uFo02xiVe_e1 zG>~q zY4!WBDmx?flI1NHC&5pJWfI2gUk{7tj0c_@uitZ~Xc%(4RS?E{;hK?Zk9t=y`k?bH z&`IR|{@?H=2w!-PHEJVs4e1~zMo74Sn`zWcD5ty#=fr>Z%!@y?qBS2}PJa+wm%^?W z4m3mnE*J(4q#bJk{X3?9Pay1ONiM&9d-`s*ndDxI{NmoR1vt(8a`+9Xp1$n#z#GmB zSp?tR)}<0}YYRFUyD3y4!RvWkChM@VD{5nK{6Bv1_X0+`!9-9& ztGx%!x8jb;jPtV%N@sZ<{LGHeQmt;QaL5UGet!hV-z{Fq=(EBzI-uTj;y}g#MNt?O zp;(;RF}fodaaQJY(knpUw}NwMqFAC1k&ml3mWva64U=zB424-C zBm=UZZO;%j&U`ff!}VNN78cOqx`=~%atwZ04w2Jm0u8wsgV7I)-|G!7+Io~)eGf;P z*k)ARQ6z?uEr$cOgj7-6@i+JQ?w1w#8OQI`JKLA(23MQ!N{&lzcU0Uu8O zT-eyX4Uh>SGxgA4UV%AO74K;u6wKN>)?{lPz8jOSwx-0W-KUU33esJQ$GUW@>TQHU zF&?4%qTP%`Bj3f*_Q^HSK}VTxUudX+Ugm1L)V7c${iT|(am@^-&aSZ(|H)asgZ5-t z^xK3hV$TYw54q`dd@haX|2fo>StikHc~OMP`L^17=odyUA*jW&c?*Uv-vfMBYpp9K zqMCL<_xNRHe+MtwevA+&;x%}!FBNDZw_0e~Y{-b{$88f;9d5g=W8<^#2DjXGMExBi zQ|*1L9#It(V3%IK&%sc~ff9>JOm!W`(nDjENP1co5<2Ud3O8pXp6Av{ROMt2U8V(8 z<^LeDa!&5v480Kv?Ku|@DKV(S*exh|g_tz}&O%k)dM*nrLoPy3J{OC!92n{xg*G3P zJ0R>xLElXwv~0oJmYC7)ykaM-b3P&~?CBrl^G-mS-<6aP4E}bw*h-ZcTh}VnZ*8H7 zO%dt6V!-IX|4?rSe?hhfUSrC5YIKW(O(VFb>L)bBq4oKAl| zAAnwtOxN6hTc7G$S283bS*0~ZB!l3$M(0@VvXq2doe&=!6duWN!@sx1a!WLn(llxbM~fnWH1Xh7Pl*B|q< z^D0&~P-jHfi9k22&6w*(Aj;t)Ytr(-xD;@D4vfvYhZw|M!S~n9oW7u1lv<9-uxKe{D97b@)JaThY-cB~R#G0zP=Hu7P6aFRpkE*V5B8;-umWJ1De(4w@gt*Uljt5=GpsMYN^q}E8 z%B?@BepA^@0DE+Mt}W>^*&-xG@9%~`f8-}4p1tY0yuV&+_S|yFCvkY+_f<9ntAhc% z8_RXzspW;yaPK&)jzyqmTiO1!w4yiFEo8ALU*qf>(d^4qw8oavYFbyV5E0*_F#oiD zpdx;Uw9~b!KU*{rqNh7KYU+|w9mvb*=lz*^_8_FLpBU2RvcX}g^}BhXxsqUItPNIv zPP?`vBeE(K72$fPY!#k{;N@mBQ{OMtVdC4qz3D4n62yhutMP44UQ0Z*F|h3}N;{fD z4vlA33kRaw6ou_~V}*g{1!!VHCAvWVRCE0M*^^_+YZpBu1bG##|J-B$_t4fD^-4Y3 z;)N2$Qq@_slsM;cg#GZUe|Oy@1`k=iwLLhI>s>Qe<$GD=L<@9{3~Pa zmtgnZnN$Yco_%n&8)%&6hr;8v;}fNKcL7u~&mdP!$jOYWz3`Fb3+yxC(xCuY-X?v+ z)uo!lV%ZOuD{k$kn=&O6X31OMZ?H4tCoH)z0|Em1JB0Vw5^683fv!J6{u6Ni|D%-oqNi?h zXjeW+WV^{d!-qlhRDv(=j>YeS4^TeM&Ib+eH+cp6@3xfOR?dAifb=oDb@L{8$Gs0vH=}Ks!A9BWe+|$eJ z^;<0f=0?p<7U!gHm$<`zLYqUGvwZJYT*oPs-eCKmP5~Z+b=8|Y^p8wCb_qL;P|ONC z_LJbobNbT9qIdJ5G6UE7jNOkKt>`Aoa<@B53a`TqIRFGL- z-ZD=7qLys4`!v9l7G)i^ZhxrknH@i8WBJz&NmV>zSZfyPEh(SecZNf%a$BL;DCT}(JjtFSFfsjV?tDpRWc<7nyp!c zRhY1QyqQQb^ZVWQFoIPJTiMF+b$s&Ow30T2s#|Llr%^t@M^|g)-UrH(Q|-|fZ)<0{ zt49yR?tJ~dODCMWh;;Zb)72Abn}AN64f(dgFhxIUS$W4^FFn-k!{`F>GNIOC=&$e8$te8X zI#@)zgkq^|NN3E?O;3NJRETbI$JI>;V}F#{kkFThcBTee5--)??0)_@rh52m&l}+> zr=-7pzq0%7boTD-0Lklf3Ra`dnjjG5kzd+`cZHKtyn%<9_z>bIlsO&pXmqvL1&U|9 z7*{yl+tY808#mR3>P~iAS>(VJ%=x{D5+M2U`nZ`+>^xg3$eY?*S znaXDPL{6h95TDb^LO!1vD8j6qf-Wx7QPA#&PN}1IRat3)#Xq%Drit6ig{aeS;tn2< zB^)Uw)O9!BLX$#vSw`HdQfXo)<19uixEaL#e^kG;mx#l#FoV19 z@?S@OxVY|rP3};@4%aPOFI~t(DVHa9*|T>$(614*SH6-NUyc-n@3@gNedQJn^<`3X z#Av_9ac^7p#H`Bt$t+JZc=U@q;I??s5_ITs`dpj5f>NFb>N|yev_mNeg(~WDr^O&N z48Qd1Hk?Gh$keAl+(VKzw@69T(Xmcn>RjNHPOMCh%ZztLh0AV?IrD$H%=ueNV+7iS zbehV-s;-w8R=mOImv_UBO~rf@SZZ9p_f2cnv6&F4eKlPSwt83FjyAamue0I#Ca>jd z%I>oI2&GBng4Hyelk+}CLZR7>4p-yeOE4Py6xVmfja;ehL8@1e>sZcWW^^griaE^2 zYx>K~GXEleBzWo-n*5F0%wKm9yY!l`2jR-*#wvf$m0 zgM<8a2Z%?3OnR{^dBnnHn$9Y{Nk+Gq0W8dJHp*ivY{`q*U>N*6y?%}?XFW3&SpD*K zP@pPfK|+0o70VXnLvJ)WlNVaH@)m1oo1et5YDYP+Nbr1aG~DTZZHTR8pFknqqRV?P zd*KW>*MU-2L>h~Nk=N!|Nh{rKMJy1m%c`9KPgw0wek{HIxLRLde@>d$-*}DymYR9% zuvcEC8LvGo$m$uK+2iNK#n+VwCJUG9GE0K_y{#WT zuoJgjk6li2wv%qMVab4P8pM8$RW$|ufF}8)+VGyz2m4aQ>tTeeKy;3hXSOFyK|?bF z>X-Ak==ye>m1sW+QgzXjMQK zg7#(;6$e!U#P#;<3?YLOp0!^w8mFDJt_ua>as_mT95dkdfpn1{i(;Q;@<+pcF?V zM#<~sT?I_fAezIdE9l876@TM@tWG_`=acMIe!q1p|7eBGZ~4K8b#vt(ui!mGUVX?m z^af*X$N=6qJ||6=vy8g^sW7)srs$l@_j|0I@MeAFD_#(u1pYoP8_=eC<2LOY$&{+_ zsKOwfWsSff=g4wnR0Zi?NNDDJ`M26&lHhP8-Qg?!`hkPj`#~PPbv8Q#TAoz)^pg^9 z@2}#gjXLVB&BT34nQf3GvqX!kKuy)fgY(9{Kp=NO(dD5$5%a*T=YlXQk)tsmFQdW8 zpF)YY+l}>V^Ee$3Q&m~5tD=`>O7M6S=X(Go-iqJi@-xI!D7V6d_wFRuD8;;mZbO@B zd2Y>maF5M~p|bo8M^k$EK*&R3CX^=25Q~b2`a9ktAdandh?fDcXZ~b)L>I4p@+Esw zIirbw2yJ%PW0j#an-EuC<4p^oOZ!jJs02s4iyHyTjg@C+y8H$sbvcZ-o3L>eZ$_f$ z?xf6@ax!_^?#4xOPhLD$3L}ls(j=pvi&d}Qc)a@kjA+<@ES(-(<6v@ae*RlQ{`e<` zX3ql6hV`^=#kv@TY)HeUG8vsIxKR))y>nhcUC|g4#vgn z{ajkG6}YI9?`6kB9=H9z)i|1@&xA!Oq$h`Rp{sSY|P=LC3H z9IUFR_w1Mn*QJydqd!izfxFI4a+v7CwDW{-x`1LNgT)65?>-i{`$51(Zx(4%3(2MI zOsjKov9Q0ch&+P@{(*{T?ckfb^`&3nAW!@(ozgm87;^_Y=nO+nW>l+pOfX}2| z7Vf!*xfENNQINE4hLu#fB_3Q^I7Pv>Foxza)3^9wy~qbJ0gslP_aNs5aIe1ZEMdOY zw1L$qb`N}y>+j}ud^`_?cKS7*p4i=Rb~sX+Q7$_p8uk0}N@>)65!7ytnGSr`gZv=U zCs`6?tY#!N{ltO+mb4$G*xh_P5RzOKPC0;g-uP_s`M7afLu|bvfY;#X9OaEAnXbGj zj}!S+s^j&iH;O|NRDai)V-Ulqa$iO4wG8KwOEtxk7?+Uw&D##lr{S8{Vehu0{+@EX z+sDat==ALi?H>El`u6NArj2LTzsqt_<({(-%zHSfV&Z&ABZmic$B{?-o|Ijx4BkuS z6x>-2iWjBq5sJbeHGh+Ee|q!(cRlSuBgOw_`e4>78oBhtW%b+p!v>_ui+3M>W1R#` z5(_>6sumBPTJmlCRCeaWpWYCZs*-T!!NiloN;AgZY@8cw?7_uMkh&citgJMra`oS! zDK`}obNI+{fgo6R=k8AF7cG9R)>viXL*7C8lAO!KJil3oXg88C`T=7&Lu;dA$4`KP zkQsVM5QqE$(tu8>4Pnozh3v=P)`BXK(2MMWt~IAWdcsSGE)43-GiiI8)m{bRCmO{i zZ?vq!8obvRr0Vytg~M2Uehz=>)bEdu>CqP-=cILBllS&$DggRg9#mu^^v)k8P zo~jF3W2@b}gQ$sd=^=je-HTFm(Q)aQR^;Ct?#64cKBx-VAH%zsCm!^46i$xK-|fC{ zQM@q7vgBu>EbX$FMqWN$&bS;Gy`ZxF<4e{ayVj<7-?!l3!bKa2b5J)-o>snXc|{W- z+Z~tZ9tkt7*1>NzfxiU5BfGHs2RnScXw!v*Hk28SJA^ko!>KFSd+KxyMv~Yr%{M*w z%CR-3YqsGZ8hu=JX--yE|C8Mij9Z;~wdy4uN@a?f%&Eo7eJ$NACYX++KtoY%no$ zvku4RWK(7O-Sx_Y(yd~5T8~S7_vHWjkgCtYlq0w&7;)4RgcdVR9JR~CPG%{3-wE-1 zA*KDBlmNPIFeP^x!_}lXR~Piz8@@L|-QKvjZ)SNNveHjT{Hl$VR{faGkPfjm&>nO0 zORGB9I|!>{f$WJ{^je*thtyzx4b&^D*Q<-ryz09QdiCdCW^*us-(N#d7*=NSY|eAg ztx9-Kurt4#7z$cn2)Q~wnoJ#=CQXY_x-k)dvNL(6W<03#*EAntM{Ry(NTuBU^vfu% z($8j9fXqmet5xn;m3t4%pJ&zGDRro$b>8zz)pOyA@zcL1Tu`YmnQwc5mwP_Z#@(UE zi5i#kKAz?$5(!S&HwJ%HDqw~g&p#Ck{&@bLT!7x*d#kvL?~P3R!Kf_96Z&ChpYUP+-QLopt-E##)fe+RXbz%5Bb{$jEy-1 zoP@it-;ue2>r4A0%ut|GF>Bu|4kPw>iLnNvmuAk{O+c!gK|}19q6(uM9lZ8dZ-*Lwws8PE2M%Q+H+Lj30G9u zeJ#!Xbo8)#|96gai3xOry1+AB6g7n(AxXEPMS`Qa`+5TD}=a_ z`S)Q^eH%tatON2XAHOK{lhJDQG+&t?N|2PC6HtswyJ5g&ZI=AKU6j?#sjG!B``+h; z-iK>>?*-wZFL6$RlfV$tznZ;%wStR&`dqe|8VF&`?17!?#M&6|hl0UN@^5i*#si{I z?V1^HhziDzzD7n@q618{8T0IHU0@t1lK#AQfYUI9W9848Zs8`}8WQBI0 z5;(Nqh205EA?VO2vP&)2Gl0I?sZ*&wZ?f;pRNJEbXvwM4YKt<0?NPbswpbM3V zqkP$t3Vo1BXk1ZF&e#tfJ{3$W1!4sXmj7-hVwX(*f`dcGYF*`LOj-2{`pPZSGTa-ZmX)FKzzddM0dQqr(Xs0 zljkCXfVzORbYlMFfGRRH&cM;m{)r2v1myh7@>b8@s;|$gC;AGU?F(~C^_OjPX3Cue z(rgR+-wYc#j$W+`X?>x|na3L%!tIjpOgJZCx8bd zLfCxWuBud(?PT<`{FvN5^_9Kyo{e5LBa&W7Msa^gsz<*zt#}4Y;+rWQ{*L^x=YGm4 zY2?@O4n%r(MOGHhL@wZ7b z;4G{&M}TJLac}Y61%u8e)|L-{M(3>U7aA5_weWU`F1-RkVczd%Lg1DtpFJ1ZO zAp0DlS-hVso1-J&3;#>86T!>3SvO&irwDqM2d)>SNV`(eC3a#m|8V`WH>6E z?{Zx(7WC~G#@_g$k{>aW!BXN;gNmL~uPJya?zazV!jLD4yS= zEILJ+`=9D3)jy>!F9^36W4Tj#r5e%CeouxiThKP((AYQ=7F)2CX4j4~t$t5dherW< zqX9O6CZQMI3lKKCD8G?G)*|R*79;deg@qAK^8$M2XflE!Am_1rz=a9Z93JTsjHbZx@rT|0>Q}Ms>e?Gxc}m~RcDp6R6l>c_mvt&THxlO? zuTB-%b~5aZK|w=V<{e_pDG3xTJ4ctxlO9j#P9NNQIrgV18R!O|HD=^Zy32vW{&3IIRc&mY(nq?Q|*J67!$;v{^5z$!Ex)cPL`Q7rvYg?dNED;@ua!V z#$A`G=$irV94NMzBU$XVg?ib70Z-78jClEZo@8lh*rPEkk-XiJ-PV()r58TmHQddf zu*sU!m4pl8^3m($kz>&LU)UNefOVh~?_(12Ov^1t^Ndxe6`SP-4el6W0jf_+8W4nr zjq%=PUJh+xg1hj9H%(u{59YzujRn-u6uP}={u|VTI_Y-zv(qxeDLo{lzFho1p87Zn zzs+;;oKpZR_~SYk$E|>eFKJ~bc<83bKf1^HYE`*SyH7RIz(}GkRU1F{5o*^NObtG| z%5&!GyWjqf6m%q9bg&ct;ll;p!@>N zsJUrNo^$^e{ly}EuWR7OnRIgeXd+4;%DF!oVfV{kQ>F==xZb$bbnHCED9 znFTStr{m}WK-htYYp$K3V96%qQkX?~T$9MR7LKJNi>rdgPvV=eBiph$=2v6UC?@Vn zlXREHMT>Xqsao~T4$4tbRKe@0RkZY@nY67m{lEFKcZ|yB>_=;1-am&rfpP+7xBE8^ zp;Uv2-EgA+_5>*yD77}-*835d^;eu>SxkhMHiM|zmgx?v#cfZI8fS|bAl$pHZF!?9 zUS6KR2&P9%W8^W$F!m=lH8k8Nrq9j0LtoUDIVfMe5p`(N9x|-^T*fP$&STAZc2&rS z6wt9+1BFIbs>;B7+^5D|^q~B}E-7qOt3hE}l$J@i2NM=f5-TabcUK6nj9I&bUxT~( z^sC%`-47TZDU00~+BoSGA2lovtaj<=U*(T3lM$t}|Mqn&40^FRu$4#dS^b*IPsXSI z@&O%LVC)oqjha2}hQ4*Gh;-MCqAV1dKquJW_!}psuU5EoxZbQkM76Ws%knsfoOUKC%nm}_`lNaM= z!o?Ez1bSv$vDhLErXZ{#F3%h6p!_XqHn=3vCr9k*mTAq;12IDq%R)It4p~U~i+%m= zh^zSOJ&5ivAPv*K?L^}^Oc(UM?`}7~0#|3wsJDy}5H{Agm}p}tUrAJAv1^WW^7WFN z5*Lp+D3XBND&yi}hnA|AS?EA-*}u9o9dvG^=DK2sHrq##$ME7*GS_8=5p`aGk zRx9E}hYVk<@2{C?vwE&<>A>HB!f-v^lK;^cPL6Q%b*p+Z(FTNxy5*=+FwquL)%R5G z&AYtK;T}*}k3of^lvQ@7?DC-#O z5B~O2#+bq~e}FD(|(i&@4iC#bXQ_aBm8 zI>!9>?4YPJ5bD==)(3M!vSP#25QPTU2wgz|F0Dy+H@}=46@HMs-9>qG{ucZZ?%!3f z|Jmb(|7t5^t^x)r@9dD!G3S4;mH+N-`#;in2H^Bx{mbLkUh<6L<26JebK|VW`#)HT zi__@#t}8LT$rwY|Zv6+>48Mc2X5T+s z?C&ZnvH1glzk4@Y$T`BWdZ5LDaKU-b>d%zEx)O3po9Sc^m>paQeW%33&B%(3&Z?Ij zud$*BI*{g{u34VXC+^W`ZGmdPz5Da+mH?Cl;J3S5E`J6oZ@n#gGBm(JFZ@&}0Hg;DfNc=Gjr>i1H0 zl@Ibpy0B@{moN_oOdIMyr3tv~up2OJSQyk~Z4{_&l6t#r^GcBuAxrp|2tAh$eBk_} z<*5L79ZEl!p4VxU(t>Rt6mo40Jy!~C_ia@ej|R%5hCCsyc;4EPRpj*FuN>=$4{h9t zXR#aVHUW!g1J2-_`UU}Pr=uvuf&)eCFkRy__PnP^o!)2G-$+py8@0}@ zpB%ff$roM}1Uz%23C){0P%ut>k(bF?`eyH-1LFydM6x3>r9s)1k8EnBie1lh@TdT= zUC3zC?(2}3XB3LPiDf5Ub`2hJzhlnd%f&I^#(gWU@w2Q%M;c14%%kH zS?T!&Ei2q%fMq?(LF-x6s861rgpArac$jNz@kBk~vGldhU1eSZ@*vBuL^%HgB}KXC zYE3>?9&dZhHUzJ7YX@n!W~Dop76_e872@hl)aZ5f8Au9BfG)L71npy1DT_< z5v7Ffb`3p}uYXFxr$U=-*-O>9b55gU+aIB%=@$xD@cv>w1P1w)x6r?kRJp(CUBL5? z(xqkWqIDym)S?E78GmWdOf>>Jh(BsYQjV*-j2VgCRG76Fl}S`|U_$Mc_k9c>1;2mOg1_^`x+4cHxRx_+kfpRet%v$^;43}`5;oHv?_r@C3Vv201tXdi)X9ME51w2gqSpo^ zhY)W1%HN_K2J&-M@+~{!BXgBT2ljgTjF&GL7t_9}>^_6Y4-1IPSz0PMyEhENLIL>5 zf~};8D<8s(Khf<|311E8kJx%8yv$dMNjl8$uE^rLr!o9>&Mkr+Zy&Bc;Nc<0Fe=d? zjViCHN_BMuQ&*I)yf9%~C=VBumNrqRAZJ6)FCVxHraayY?n9C#G@FCfI@t_Ld7;BY z{Q$nz8TZ$%sAIf%pW;VS45WGY;B~I+@j+|rJpj$U`pe1pRR!*LIcNB|Fx7<9;3{Zv`h z_^VQ zzpxqcdHgYTip-88gICZb^TWKyR6?M4(U&W9w6CT1N48TXsHUipSnNe90lk?WzZsTf zK%5<~HH=yig19?!5?$M~8V`GH0TG#ha`6(xeb`}3Yz^KsI7j}>92TsnJS?%USo)LI>rQTO;5m+@NX%CqKNocq|dWs`q@TuLv8s z%L6i5{IC<~6*v5Cn)R}Zb02>gqU!rQo{L(`)7jt%{HgsogawIFRO_KXI1}TA3OmSt zaDGIhu7@0W)<|xKM#{B1d8;f&svlQ#pS3q~+2jD%TfXRE2F`oj7@>e~0^w~@$>o0q zUy-MZ6|+@(-9_K) zjU06CXmt?eIE;L#Zj7(ycsscPEUM@XFqnMex-+Rn+@Fn1Oa4LNZfGsYsYja=D>Dl} zcgFY&s++`^gvmu>1mrtX%neR9|60ue=8f$?;e+nx8`Vg=aiB(O=wBNcbD%^WFIxI4 z`rgET(GNy@u=p9D*Ej1#3fgULb23dWahO{yJTF`-Z!$`eHNtZm9qFO{a$gXqbR-QH z?j^@Q*W*CpJMH8U#zl^kJ#I&OM`UHbm8D3Uimy{A49$pi zk2-fx%dd#h?m64D+F}iLUwjIc;`1Wi zdy@e8JfF#Cb4lLp*YW2cR+>z{GUEo74blS|n@)S4j|#&kZ^rq?OmU7%=zqRpD_R=O zohnBT;tmjsdCCi-8=;Em54iB^{7p{7z})l9L6I@MHfp4>RF~pB{qot*cLn;kW1M4W z3}zCmzl!^gEZVR>4Kshz&L99+y_y>etZi>)?805L{E6_vS%$)#LLacO(}HYecJb9> z$@-*myx+}HbC191-K3FMteh3WS%)ZHjwDx-G_I7;8WiC$#D{dqz%s|-*=W*+AbNgp ziC$r<`RWuQmgt<8!fMvi#3x?|-T=v- zCOk^i-?E$#=K;@5G3^jarqIHP@@XR87-6chAU`ee&z4lF{GwnW&&oYXbKG683!yO6 zl=nKd^@ZG6#n<5`Hq@aoN}x|l_nYSH9O@dNPaZybPSoc@j->r^;tRLVVg0RjgK~_< zZXz3gVIP9;cvOd98&S$)y3a$W<_(N&DQW392RQE)8qVbPEhV!~g+Z4Sop|fVE=LLe z2d^$raG$UABgYT#BpwD4;zkl z61ATN8V~D@e`OxI=v8y90q5mWEZFnYl`*+29J`^x1=oE$L$l3_>jx$ifL;LA(Apz^ z*se9!$x``)aFu^Y)m-f}2hH?*f#7~w!=g_sEdw;w7jl%as{xQBcAkTvK$v{szl377 zc0W9asX9f@l8khs+F#XgVhIdo;a`hD5iapYuZdLVhv=|AxuXxnQr-(<7GB zF;MdA4R5b1JrKVqWaN$sshV-vo>I+JMtUHYKxMg|t=knL&LD&1o}6XL&A#%3U+&>I zK4g{;RC?v#%7swB$w#IjAjMhR4|@AN7C0g3jtABGn^|8&Kgb z?Jj9yyWRRw^aRq7d0OIt+8*e13)DA|h3iI&Aqgt7egcAVv9b4yK|IRBdMqWFCE$tZ zisdbi^y`|}y`)u41A4*iU&0Fh-BlW|!s;;Z`21-iMo^kLDamZ;5&BuGZapw(y8p%6Smj%S^uAv)DM7lR|K2;Oj3niV$Fqg)-P%SYPq)pMpRj!!Fd<6_5K7tM6OLQ;>_&|o^uUOk{d-ft+{!0nL{-x1;mAeABEOHdFMpQ(^FVJ*$ zMVI;^w+M~SM#~r;Y;IQ~kUTrf)M0d(*;6=3(U*0 z%%S@*%`UK&Dp*-r|1(ZRDGL?(yZ=+>$4P+mC}vTRxP18y`D>A>Ko~I3(;qhF45+Ni z$_{p)R}tg=(i1(p)}uh@C@QmuJ|eDJ5N*fQj053w2lUVmqlz*bAJ40zUJ(X*r^AFm zni0XRYFgJf97;q1ZWpmo=ha_0tQFp$URscqA@HQY*#k=Uwt*QJNnbN*o{6GKE?Jr8 zvDcoNuey4XxO#C=OhUX+gxY|2tWAu`Wmv*DLTRkK|LTcbgjv|%Y6I(!7A?r7Mr*fW z=94TF&qp7@N=0<4&BVJ0JEvAlq%Rgty#S?ei2*ccRi=_qwH_^K085VsFj>>w7mt+- z;MaD1{lO50NZHfe0L6ys)CJh)w2JWK~@eaO4YS#f7Q-|sA`3w|Ake&s`U z8{6CGUot?~h@_Z?0Aym(l&{sZ98@!^=K+8e+wKnQ|=Ov)3=FLk!?>0#8LFTbT%tDNTHWr&Eadt&5B|^ zTqS~LVMkT_F8I_?`fp$1f5cYIv!okWTIMrkpSn{Pe5)x&S9t_bq*UHaiEWCod%kX4 zFxImX2{UY?T+(Rx+2v@@JIIj{Elz&ZoZv^Mj8nQkq4$i^ODFVj`P>eWcHE5SwoLj> zWhMZwg0<5;5KkXTD{6@AEIS&Y4pdjn+bSj4^%;6H7}b=kx%wrf*?U$uQx0JwCIe-F zn>!>lH3n*x52GUbt5i&hUmfWHsvoC%NXc#qR_%(1i5_p63om?8Yr7axXGp6IN+_^n zp3bD)S{jvQqHs#Gr!DBVT!kn6FYewus_C_B8$?kQ1yK+XX@(|9lP+CBIspX)fl#D` z8cOJ0rHS-T2t_&w1SGUjRTKlE_ap=a>7hxL{^dO9dGx%qX3c!F=AHG;4F8f}yYF4D zz4x{EE&1g!0@%j}37`)mu-wz~x;`@)m;Ze}mm1HH>-`QOlG)f(cCSG*!}(BHLX4 zSswk(AZ~n|TcWDgC6R$PY%Slx8FK&Zk=}^k>$8mzMpe)kDXZDj!$5DLS<@Rncy`4v zcM<8b`TGbdoGkd;#)BMWM@0Lcm`v~_Y}P*@E!%uqKe+TI4sj*UI)u#Kl1vT$BN9Ks zF+tvOC-jcww-tX6#^tsm+*0mJa?WO73-3t9*r8k@?U+(_e; z`M&7D5!biKzHnN%uT{O$_+iC^aJlte%~EU^d6%Cs`b^Y(Rw&8@^eQa$6;Q0O)9#mV z@_v;Ux3X+5@MKMNkH^$-xgxO}Y8wW+5zEEAyVm^^Sm}Mg{%-C_c{n4AqR)IQca^GJ zsiT}X4D=@UTL0_?WuXl^RpB-!!MQ7=>56tenM7oH3bxa{P0u}vP-mtduFv<%jM+SF zu2(G*RHkE+?Xgl+m^U-FYz{OY$qt|{);y*lKe{4uYu2ny-{<04TaN79m6QzXd0jtZ z#cQS%gRqpn5AX1r-ZKoLLrBo4N>2sOIhmV>o3<|2HGbyhEurJh2C8U!7GJ2VWGsaO z=qiFfFM+?#hacuVSis=g!nhhU*|djQ&|X~kcS&1q5%Fv1>y@3`a#YRQMknyQ#r3v~92D&h4m=z4@L+~#E()49Ki!uY zacVw$Lp)8Jr_nf|2qm%#FlBZtHbvQ02@GP)gZ7S5yBocyQd2Vgwkil}{T0 zgyGT;r3`Q;F z+sg)35r?9SzOcyN(kF3_clxK?HrBndgPi=sQ+M(V#9Q7fp~EMZHU;|Z0pqdtHjRKh zrV4pow6iB#LM*W{=vllVrP$LXYDi9IPTIWVGK=<_5bsUsK~%%c%&wRd=#q_(q=w{V zyEzzWyWL*zqTiJS1f3m!*VYtwn*aJt^7e2=Y(*V`?-9DL_UVTFR-9j%0$L$OaLy4} zyrl}5syp>H(fQoBcmvv+oV8m4Pj1*+r{FmnqOB^|U`%{a*2g;DJhE35>|>@;-4L9H zX^)MFu;rcecQL$oj*|m=p9zr8UDC&;RTFbS*EM%OyH2~N1QVFXYj?H`xdcY(y0-op z)tB){)4TUI2t#&sBJL*4;A;w>MkKY&1~Z76tt<^)oBL8<7_4sBxW4QcV3(b%gg;mn z7@v*_Ue~Oz7^Btd%*j3Jd0@Ta%gHsn6nOeVvuA}hi%ubI;A$oll(ZWTc{#UaHkAtY zr5>YS5m(ImRU$zh_+%Paw~K00a;r3b?-<$CaSRQY{L8!Q5t2UkH)7R2moyC?qvvzw z>(-WyiBp4qDG3oqPcNgcGqdJ=?V^WLZzRJqO}1~$#D#l_T9}#+4?*LjeK}U}i}{X@ z#NJ_jbI|-RK)OMa%%Q;e&3*U{tddYJmOyo6pX$(fplURPT+rbwtIQTHC^8P^I=T<@ zd~}+eqw&Dj-y-?Ge0_jxO>9qs%aQxD@5Tte23RCalNQ=V4P76K<(IWFUzcC_l!*mi ztqBJylenNI1tuF#n$4_5h~2$1fup%zfepVZ0YLhG>{r`oUtg%>w>8w#@mxlNXnKe2 zQn#+5CaqPSTGc{yJO#aI*5$;@2gj~Nf@%)7_IjDe6{Z?Lrf3-@1GgJo2!R&KSgj-S z`m*`xokY>;ygk(oB+jOQGBoD3GUAPgP@>b1$s#8sieU4?^0nMF0pk{L>mxCmqmm$z6NBrtC05Vs9IpeHM4gp!Zo=?Ql~IK~8LXBRg zzs2|Z{;wRW9g4)9Zz<~&e%P2D4ujOg>$l7T#RRsKz8C~Mn&4$pJEVWfej&s<8Sk4pLF_}QTPVm;@NzH?;-DP3OAq3x5b>c>ys`2NZmr-es6)Ef07}5FOe&}w9bj{Zb zT3tnv!hw6sl+%vQd&I=5`Tk*x_{PnyaL`kU4fcbrpr{tE&7?cphfu7`8_nWBUv7gM zqCXKZ8m>|$jjDuMwC?XNXV>$Rjvf@YXg?cF?DwC{2cz;Guf@hV`=4RdY}W^+6#Y(q zCL&#%pauf0q><_dS4lgaB0gv0|9s&ja@OOjg2LGXwo2DU42IaYhzGH)hLkUcX}K7; zA0L)idE>-0Hgo5@D-JL@{cYZP@B`nUL?xultq>Wxb7Z9qx6M`f6z0x%s{j7pe>rK= zc#`+wf28d1hhB#QB!6E8m{W58EfRnGl7H`fc*4~WgEN$559Z;173J2{-GJqgRq4{S*A9#FpY^(^GgP0>+T$)6-)3ywJ}+kLmsJC~c62t;*zS74Vy)y;kOTkv_hI z)0=J^PNvf%#y=SM>(<7N$=rwjv&P5=WdnBAnD!r2Pm(i4EA#4ko{Du`;NWR-ge9v_ z+|=r&((ky6(zbb`kH6nr0YzofOVa6^%5o15@kQ^CbRGI5+k^yPzPX0dMoNvLbyjn< zH7rVcMy15nqXc00ztpbeQxBh`gY~4ep*;1o8}2>58&rMb#aGxTy(?p zd%*c&b#!!h;fWLTZSCXQ&bq^#lo#B!+ z(&uq4fr$ng<4scnR4lOZ$rNo#2=T+u1Zq^8aMFWHhYmKzvLYn}b$<{}L=v36Xmex*WQ(iIXt(9P>Y_V{c8mf+qW-@(0ys$Tr)Jww>c!Huef2jj~|G zF|UaP;B_Xq^DSyr--_0NdWCMu)OWULM}I&z;BsVa+BrAwD}Q8fl>m@nCxjY*tI zV>ZCb^&w9_!MP-~O*%Gx$8XUcsXTo0Mc!ppKI%)hQ=DziD_Nl5Jx|d^k;=hGWjtq? z%cvee;fCCrx-Cy7Y+ceP_;uuRvZyqdhYN9Tu23BXN69BX-{?zsSkyUaukd%w<$F-C z8uu_>By!-FXSC4V%0}SUGK8m*X=N={v7yQo;z&g!)db}7*Ho~)8j$}4nIYf6rIy(beQ;Zl65(*d@a3gv$Q-zC^kJ~&?dqF>5Q~po!~JF4#XG9i6q0>HOy+4Y^ed-HlTu#ExUiv z`bz%rTh7d8G;pXmjJN*i@LUmO%W{D!A=5k{VwxK6mI-zG0UB>b3#3OpYWwK!FztNh zeQ|x8-x$?jt0w(zyE& zqjWsEneEzt=EUa2&m%Xh!DJg2!uBfm1K~N!c8k8QOV2TJ|{zU%qw5Zk8A3gaEBk)@HLE30%AXy@`5&n z(DgUY&hIrQQD9%++>|BAqzy`&L-3Yc#;*lc`1xgv4OgN-#cn)dE_X;d<)$&Wnk%`0 zyccb#(Butwin(gItX@CHNvh?t-r=lF0uxlQA~_DP>lH+T>&q`=uU~2vV|t)1jM(*e z(tTkvOKOel)0R1~OoufDA^WkQnx^uR#`1~f^NFmADITdCDO*@j? zI43-}l{+ufR_3+rebCMhg*EoxePMV<67%Edft1AwX3t=N{t60wR=t+ecm7Q>$$yE@ zC6&|M@ALF!_(p>YdrY}^?%kuKu>O>YLzA<5!hLI1V5Nrr=w$U5gWdI|8jbu;ISvxb zgxWC?{qQ^uUk%2)tT^vQ=5c?84wI+u9qGfO)|dpXD~`k>&LK{^Yq;+{a=elSMc7gC z#I9a3T7B)KsHS!?Q{2PHlGQYV+>>^`+4ZLD#t8bonZkzx9007o_u5UE*NIQO2<+M3 zi<-x=wYG-8Om7u8)fKI1Uk$4)0uRxz#R_$o6(MVINla2nCqO1RObq5z+ z@u{7vJj>X$hj&E#oWDFclw!Y2o*W^O$xsD6`Sm&i6d=``#Opk^N@(Q?UcuIbNK@;k z>CjMWK}Q!&NeSZc_N#A;>B6G9ibDRKb3I=Y1;M7qJ^UD3s*{a|+E%ykbY?Z)$Fm0^ z5=ZoAWY?ugaOiJjf{9Py*9`;FeTKtj5U3(xiELWC|1W*BbMMZR0O{Yb#5gz%K?So!}5B>L}ukhb{QFB%L2Wqm*bSaz_}2KL&M^0}r*W@6ai zpDO)=x(zQ9GAd-o`{n!3?BQar;+_y-I>urA{Q>KSP8R=*X~Y6It4!{2Z`5P0l0NcV z7AI#bX+>%saw{zTvEz>|NAqo+l1glnMG|BBs^O%#&g&1 zh{6*<6V7g}`=fGra`G*{xMz9QWBVfZaLLCjJuNLQ?u+(03BsPH{6uShad4cO;@i*4 z2puF`c6@1Q^O5lgR&=7>Z@!|l(D&U*0>iwWw{>#gU&*M#1B4}^GVNb|A7i?k!==>-y&B( zpa*nJ9+V>e_>OM@ee;mkP`9sCQM#S9W%EF*V%sU>CFina!m?6uCj%5FR;Ko>Gl94i z5t%zVS#Z^FIcY%KF1i3$W0%W(9w>Y#@Zh9^3K1 zZ|jrR6a6|?k!!uam@OFfrFSd0GP9J4g)O)+@6kfBg!r-jZel2=C&=PGwRhG1^0f$| z4O=5Z0iJtBo0vm^R|-<@Ak75D{pbyrOLC8~>XrAZX^(KwZ|S^b+b3?@@hKw0K~z{) zMpVujhXi`{m8E~inGAEM?x z@{0E)Ui4fXiz;d0Z+j=H*J%)lbnFb=%FEiDOTUqI$3wGbiPik zyk_xQGcF0PyVPR01XJnlvavo|H#b`+$Ojl&*SM!mHfu}vBtiE}mI$q%NGL5$ax~SM zh}-N@E>4u68S`lnPNOz8a@kfAYCT7@yK3(u8q1P?k@;b*a1Os<#boh~JVq#WZC~;_ zcRGHn^Wi{(cHfZn3)AOVe+yA;ZKWML72*p{bbjFTVQQo3(+O+8dRN2=`Q1I|gkm<6 zw%*DlYjc|bWb-&Az-n;ScxdGC_QZ)+M-;d!xm# zayzZ%7I%z25k08xGdXCl8A`FXs|$ zwN}1oxXyYZqX)Iy*hndsQ~*vQa5m347AksTwgSs-RZmAg_=Oq$8_>4n-y_Eco!E}D z`*aNd01cgai1hUV43?8>|`F&FXomzh{<#B24j~wUcs%9>B-6N|LK1HhS?r zmT2E>I~4Fq*LPNJpz~!_Jy_C~tJksw*<3^t zE7_1=cy!Ssc9bY@lrEKzJkQS@*tU8{UIIqIKNdY3U6#O;&+4&a#+XVOF&9$qqC0~7 zXyU(Q?j4^)M@cA#uO9-^Z?7hJIG6*syRm}%a)7*4;x?Pn!6%b|LaS;{&j-soXyDJp z)G}s$C+nf0gyYZT8rwV5QGGT@RH(lm-xZ&67Thif=@Z|g2&)warB5cAp|4X#eHjE+ zUd7R5pz_G4fJV&PJlt1Aw68|u=7U#Eo_mErqag<5DQiT~L2|4HWuLc#tQKeNlgw|m z1I~+FF>Zjbd7OJ6_YiGo(nrq=Jiot$XvrMdl%U{MZHm|;?%PzT#!U@M!&NI+e=-!d z{z0wJt^hvYAg9#^Y33n*@XBa^xUeyEPzr{u0lzH+q}BK>Z8G?dDTq4st1mH&Jkou#9$kzvqt;w za^KSm;jWq3dW?UOUH2I%JAAZH(LHiIpE5az@rR8 z*)hx;Y3Q(TY4nYPEK@9*!YpCNbv+WKH+zXjRJiW=8G@@;w(68OfNDE_(BOSG(J$B) ze4Ka#>i5lMIoK;T@jXdg5Fcy?1&S^`3%&@s8&tWbvq{#`oS<;Y`-RdoI$ponoi$Nb z9j@XDyD1Lb&uiG?eMiR)$DAUsLn)l^h`2q2{_(Y)u9&PFW~*ZJ`o$7Gt)>)l5ukOO z2=mALi!sLjxNy@{;Kn*NbidAL`-kX{WM-Gen%IRtJO$u9JRFjUVU%IIyx!Rz z33( z<6*9SGl(L6obL-YWsbqg8$ZhuDySE-cC3XqI`~k4=6G(~)Pu_cZd%uDQ8tq83H%r~ zWH{(lWUnf{+r&nGFrgH3EqG9ve%fA6yhT^D#jG;v4tKR?*bjho_@{nl+sZP=%kNhg z8(d72=S7hLIh!7?deby0kj!9UPkQ5U-#zI^=Hwj^F-KYnv0jiR<1G3ue$64qUd_T# ze>!LJ(+B`fY%U=_0)8(lytk84@vbEY{M4M+=gz5Cv7lYco2`H3^t=<{Je;UW841#Y)ORI5=}^^N_;J^Wwn?O9{jlu7Ae5X`C-uj2?~hxOeITMP z5~mW+n(=ELU4=)beeDI!_xl3xGv2iSv}V7EM1tO`ug|!ovUh0QCB(Sw^fh%BExQ-r zS_!i8wk8%AH1S@P%?X+`D`92i6oS!52b zw(LDKuzWvdoX!T7=L;#;3Fe&>)os(dKAao)U@d^^Vr$KiJs3@2Q5~|aDQwVv8C8MU zvuoj+Ms#wU9?IrUTJ|TNSU&Xw7~OZzz$ZGbUu~gX28{2Oq`PWH58vhdjk}`@AjVU} z5|cu>fRz zDG>?cU)?7^dG^We%l@!`KvoW?o{j9{7)9>0}0Ol3IPDRo~!Ni}uCODBywXdtQZ6(^P zqfadGr0PpR*YUYzCMYUVU*FVKCcog`=ZJZJLeG;82A^+`Jp~u$mAZqN6DMZI7EAC* zo(;xPYSCrl#0>H&K6ka)*tLgte@RX0Zd1!q>(om#4rP~G9)tVrA2bB41nfr`TJV*4 zNA-M$hWJxKtuaJ^PAI#D>MxEPA9b4J>%rJO<5Y>c+mg9N)aj0ksom+wh4Cqy@{`8N zr0#wk!~BIXCB#ggSy$&p7jJx1Iw7XW=T~dFsU+47j7jSB>R{jgT4W!hSQ{Q>Zygd)JQ8KT0bT89Rmudh@$L$k`k`c`L9Mu1)1P9A+b5yb@+8C z+oY9?&j|!S?V=gLxEsk@W$qCfFyT`3#|e(a`CLd6`3ji3ry~a#kI8%-z3(TeCrbW? zr9~}~C!Zu3uXQWFbq2hzP^xHEWGQ1@J_%|+8E>dHD;OU7)^I?R2K4@o*V0DbGDYzX zyHJM|iyMZ4zD5D&k}_j4L+mN9lYP*2(6t5di74R<(tBI=Ecw$dK|&)+WaH8h#`S1n zFIPh7e(s_b%kNnEzozj2yW`b=Rf+yrM&L+$t=p~=y+By~%)7KXYwW*5UZF3aHeT)o z83W{nOE`yMMqa_Id#>iv>~j>sWqh&$z%h5|<0gAVekFJ_kr`7wFc7fK2^;-;#$i;5xx?K@WI@sLMT zO}Hz!p%0~hFF7ebq;(>U`8&G(>accIa0$H_WwRA!dF2Xf%Ncoxn+DZ6+0~b(rLnQnS$YQKGC*2$a8sDD&e1mbFu_uN9H++#RJ z!YH|2yyx}4TfKeN0WapF9d^lPr$Vi_)|ua%Y<4U$e$c4B5WfL3Oje(iX;;27gro9p z`0>=?{a!>f#cFJ&>8RYFkEL$s4wM;*R*c$3BLSkF+iiK`? ztHYNGy$!7W7RP$8ieC$6CJw4j7!2_BW`Db9ICeYfP_gX!Zqs z>Z9VelV6;E?-33nSF;(f;XJ!sU*Vj($0#_RkI8w(X$qFe%v`U{gy^m&CK-D$;?H}$ zRF=mlX#^lB;(C(3lYve?OP17;Am!HRRgn$vZ*p=i%|Rbl8@%T0-HvBe=xg@A>ID?t{=W0r>QGfg&*xn z$Y&@ESiB8mGQE2=*6+!BORi1-y;r6q&s^ruuqeDXskg@V?RjG%V}1zLx}TE2n}PQO zx96H5q^SP*PJYkC54_#m{OknyJ}1Avh~_;^Dif5IFw*!@g-RK!-$0DxVSi54#A(U68!fOE+DJSUCz|gzPq_o;Pq1F)>g3bn$M%osZqhEbaG)ihikz*3B*@*Jf{f@ zNnJF_x&gu=WMky@v*;dL@y^@KZT$q>d`_WPJ@-6>b*M6-VL8mvJg zCn@Byi;$|9Y?3FrW7TF}P-MJ|qgN$04eO@WRoy#tj*6CtV+V!x%Zb}#w=RqAl+t)L zB4q;GA=TSmh4LO9t*x}^)m-mnDE+0N^3(h|t#h`W30i^tRu&f;8Bd?2q& zKzymlc7Uq8q^3=_^z?y8n*%~8AM87=0G!ZuWfCZiU;w)STY5g3k&EkBrO-kH=+a}O z8uvZs4J_e8PYts|mUCjMQLGft`Xm`N4ERjI~7y`znnv$w1b$;`lU7fZ4 zEnJ;A*-1q$j_f>0B|NTy3#c&E{%r9w%Cj$;jO)64GytDY8euBofR9iXlFomKuH!!_ zlpb~X>vp$?Sp zupvJw43jh4jby|h*LU}P9JGK(BJ%TL2JoC9U7#-4%BsAx+i5HRd`Qi+y#%M{P3ec0 zAHc;uH))}JO;r_Wk^UX2_XwUUW$gtWx_}s{+RyospWiJKBe|=+5uR?e96h#suGAi5m=iPs_qa7+GoM?O6DJxXYz=fsShaEeR+{ z+fbvfkvtpRP>5Twd@Uv_YIh#%8d^P4wxm1NZpb4`6T|<<3m^**5PU<1z_q}A5Gw2{ z$!EV5T}vFdY5OtQY%_m+ZTn+#^owh*nZnx*ebaMla!^zoF~WqeLJNqA@%<8QRTj4wcZo7#DWgnlugdhT+y}8)^BD_m@v?W_mW06 zcm75@Fj3#Pp+^HHdwG8{2ncDFm6@sPW`$C-EN9xW4eQhkN&QUonr$ndtN6+jjI(A> zG@oqy)_&=T26&X08X(&0KIXh{>Gc>bA-6M7(OG;nwzEOFS-~_%$m#uNV?JcJli*Zp zXPWHie9R=6)GC~F7uf4G`e0}==g`$L$LC8> zaDy^ljs$+!z3#vb_Nn7X#Bzk(=UYk$CFRm9S5aKuGNnkB50TH3(#YO*|H)BhMXqf1 z5w1gH=>d#nbN}$2&P@$2D-E3I%Pc0%6iGJ*PNU2}$Mq?g-n@*8m^utk30W+L_vF&} z0Zc8@1;)(IvNu2$cLAMF@zb8e7Gsz#pcG-}mlOEJw7t>v-lS*p!S!tb#Pioa^Lpyn z_Lk-1rZW9pGw%>E+G`Ul%XRO#zLHa-WNdn^8^VIbq-bY5rbSMPdhC+UKbG-Y*>`EV5=n<1Y(a#9WqT=s1 zpG`5GBv0K@86sFWCzr8DJZ&0HEAng8xYp2@&1-xdNqULHY*Wq%P@cRX>k#>PpAUoo za#vo1HqoE0`}om)vXso zuU{4N99$?YJ@ovOz<8V8spE=;{QSaK#gXNi3x3%K$_w)Y=!%fxR{i9DOpLss7vhP@ zu2iD6-*RI}J(=a}KmPk>gpL=!vAj;gN zPn-qAcGmhQj+czr{LqQhU>KVY7QgB4{~D0)+y=O1 z)z$P+m&K3I#bN?+HLdMJM~B98JE2)xFqn7Q=)vCcNSTHy={WkN-y2ed++dkW>8Af(3~3pZ8zuNU9`5J0dUo=r z)MI5NWWX4sD|@kn2cTw;>t2dIS{jab&iY;-EL?bT-=Ux%!LHEMOb8r!P&cKUbMV^C z>jPLb?d}|oJ=X!(bi~xqc$iaGDLZ#2uU~SS%1@ciu!gGj*1s1{K}Pq7tXjnNDjMZ+ zHmiez+XX(DzjP@wM5IoLQ}g}-{n3H-lRIHD$I-IH*NMrtdWL(U(u+R2gqy6;i=Qu3 zDu8|^u|ZjfGdehO9I$RUjy1sQ4#r7Vv%QU-@b6DOpAT}{NMl4a7OqFSX zqQ~);_l7JEvNxv1cMlDv>GvzV*B3tX2_@`TLJs;V2}@Fu*|{#cSQx zg?rC{EPD`Bj-DU-{ilbe+3daxq^p?d$O+@Y>I*tv4IxMP>9}jCl@&Jst`X_BZKkq~ z^Jydx^~<<9pkW2pOeC%!hi6NCcvIn~D@EAPZjupZdnE_7GiO12^vy25*le$m-5v$04YAzZ!|A6>V(x2Nkv*tX<+Ov%WKc(> zh2M7A!P!6=$+#K=iMUqf9{GVNQx(?|>s-eDWb&)(@?nU7!vXE=?lcO2(L2s>T_NE{4+AvH zC?}ggyR7+Cb}b;@=?0nh_1~Xt*!;x#DQ}cYO$gP4#7X!zIgqUM+MoZ*Dhas3RJF=YcfE+>KlV@N$i?D*F4$YX!_Jk;sLZn zR2txy$P8}&!HM9|?4?pCSeSv>I8iAjDFSqRXq1cA!`utWebdgInk?b&pWiObr*q^Z zNGLshtAo7Be#Z;ftv{z|oRmP!NlVMbnHX1?HY#gUG#jB?_+e1|mFC`eW!VW&x>Kk# zlR$v-xvw`FPtJqvj7zo%0{HrNARxj!wOqwuIu*b%}lS3W>U)XB9X9T@)sA zqFyUbIwbn+_U+r|9`1#)bjrJ=xxWc8NeqG!(;!fe}&(MRI~ z(k(JJQy|LRk$p7@_9+g`Sf+lVcJ-Z^lpHU9O=Qp@mKq*&$%#bQR5u<=Aoc=1Y@WrZ z*|Sn6Ikwv1)_69?Hk5=IIrmz56Nj^1eCjQqAL{Y{%%w&ZzE8y!FhawLRVe-0Z;WP? zWOx4JTK}8n*n1UKqc|ubcl?ElvZxpnGcx?Ldy7_8sK`bMVR;djzKO9ZZ{h7JMsOX! zr9#Ev4oxM>z~wkpZM<;n%dRkxNnx`jw?|O_h8G}xEb1~!bcJSr6mMhl<9!fD^wp&wL&QHnM$#6|c;4f$s^X00hC$j|oxos`W^mFmSsFL6~O8-f6-Kg8!Z&C!n z5g^3tfHVw*!&cI7?$k}!ik<;VO|uV!5Rf2!7bG_iX%Lv%gdHl_F0`tTflqw|9{GV5 z{Eftdrer8G)msk-%^d0}RFW8XtA*eQ`~|Z6eZN&LtMEL#!1;f&(vxqJkeUJD_wL^1 zQxYO8RrD_Y*}eBCDrLn?YVVhjSXQ!YJ(l}#GY_S`>+fVYNpS{zdt2>%YIbQ&d;cwd zWwEjEJlVb1zafE&lSr(}B`FMvS^-9khaan(epM0SnS*)&C89E=tC|jIllIKe7s*P+ ze=itAZv=>gV+FTA;>o8d_b%G1Iv~~nVsD?ID7!|%?*ix8uB+3h70iyG*m9tzRx}B+ zY1F^nh872)P9OTb(R^g%EwG-_-1bn^5{+Iuh5YiToy z*InzL%#y*MD|>M?GG6y&f%*2zd_Spwtd=jfi(RoszQWbscTQsblkJUNNMupmYUk=X zvis)0iu}l_0tlPKSQ}3P2!SZ87N3x zk`J(+U%SnC7x71Mh)1sA4bhDnP%xVQeY z8O_#vapNBS+$lFlB^~S}@FP#Z`#?n3j^bVF=+BY;_=o-0_?{>`C3-mCEZ?15?hi_= zTck{XzNK-o*Tm0#bZ1AvsHB2baBj%>?sX`{SrY@rZelKIBh*fq;j~e*wyK&<`J#4l zJwA9Q;koXL4Jvg%lW{UK+v5Mkm3D*BKkkIw)??7Y)fB7Wo4y1 zhW2I@6D`%jzdOh(?{iyIqaq?N5q?@>HQG+PmVJrri{^jv!-t-d+WT`%%B$iF30gi5USOid z4M|~m`|LXy)2jJXeZ_BS=g6%7u{9>z*2V=wfbwryCHF|WEXE8c@feC|q6#fA&VT7L z%kQQ6mo6J2`02%Wy}GQFl|zqF6#-AK*nmxxm1B=x59tsQu=E95N=gT9w3n_{e(~7N zQ9*IyrDogusrmt{Z6k2;SA+Xb@~5+phQDMZ3RS?61BiZ4%n9d` z&rKDt(YoqGwc?Jtp(r(T=JgahHxGjo1z4g?odmb+DA~)&|E=n#=otP2jITv~ISiH^ zCoFIP;wcN~LasV-*WhN}hDD|SMGp*RMSKpei@Lj)ao$vq|15p0I2JK@)5!08hZMJD zlLs)K-_J4ESYqjt##Xw1rqlhroQl>(6-M#QC(F+bj7}KBcC?TnbEla@Sq4oqaQc7M zAo`T~q=V+g!<@8V-wHGTMf~AD^PzvuK52@EceXJ!>w*QWMqt-EG7H5=&B$AMs5922`*Y1 zZ>;VX3td%h2JDm0coB@Yz19m(%P%&Ubfuw6)R^C*Iw-fCg^OEAb!B>D?lsqo8j$31 zQl0s?JrtzFjJoztp#={3FI^oezLZGza_djbYA@aPVF}%KoM2xa029!GfpgrNj5!id zV{7bl<}+V#NEs=ExgwI!xSo)_e#DWso1wm`BIGS1>FaAHA(0LRVQ}vJP#&|AQW}f4ay2HQBBHE2G9g<#%=^q=W~J$sShx zero{}l7{HoiBWkI`(haMhqezZhZpc(DEjNrUG|B<4jRLy*WcELj0fdQi;A`n-*a!v zu4S=U16#An$-Zd+XMIT6JEJqd0AVY2mzIR0Uk~$*LRKZ-o>xMI*1+NE%dgcW747Zz zZnhgKK53 zvqlgxA|%eT*8ZDbGRwd}Nq%wRIa>W%-gnlgK5Lm9j+69gsD?Z5TvAeBu;~a=b7B6B zM8@m^ZM^NVOW9I9K>my2xu6r(X2YYF=CnD|OuIiKI60#^8PO41b`xhg9vT%EHOiIb z= z5jcp^Wo#rk_v2Nv&OiA@mE`Z7J}tI8RpauRZr=)v!%|j1i0O*kA9HYOzd;UHAlv{Ox6bz%8_4h z0%3ak<5uUT^{0at-MhuNKc)d~yYzVHZcpu}+#DM#4yxeeHdYo|&gg0)bzW!J?+*>b z?Rqjqf%)x^3Dc1KD$?HaaxEXa>hCLex5o2z?8>gufp_)x-XFExAbSG-?N&Y~C1B1h zZ;;)8^g9-yj83>p_WtE>%U4Y@0q?H-mWThJlSuyE()_=&U!;Esi&`;v*po23R{*Dr zO4G^qnOb{Z<7kvCG*^k_P9(J%2*s>?uTj#)eQ##nHd-4BzuxScox4i0(duQwA!6J3 zFL+{Xo_26PzUvV_L1@l(ldy15?#cG?@$Y(ro%>v|_jXMvczxowgU3gPG_`-VcYqdH zQ64%c5dJ1Ffb0A<)V~`+gu)(&gD?xzwz{@al_o>aU;ip{9-HK|o3#@a`@8F-XYK}c zx4)f8k=^SO12D3%v+9P(&{*dG@oo=DA;e=YTOi)^Fi7YrZQ&}wNa!gkJ75u)pp{uU zm%uL(Cg&Fhy0q;l*m(C*>TPHH44(O+(;KF1 zf8{Pru-5r5GuO&~OcxdvqHH^FHm~$a$m)4^YUVVwrT*?on z_rQu1g4;s@+a(x3Uw~0G%Lo;6H0HLkMCA)yO6|)}l8*IB+p~l%{k3u5p!=gPDHJwP zwZno43RpQQ4&quVz|uE#Y1F8_xHf!&MX=tfW+meGa5V1rTB?I@cdfs%4i`maB>RV6 z9Vh!=gO1W3L3;PLw-#e;%L*;eI(ZaN;W_FRNyB4y=RwOKj%P%5KW(a9S-Sz3S$_ig z@S?mog=3iT_;c_Wd<^gJ^Kp;H_z1^YzbJb7Hk*5i&dRSU@P1}MVP?Q`C_A&1_=r{% z6@|xp(WaH?m7YzdfVQ54G8iB_l)&E;u}~x>94jrf5neC+6zO8-QG%Tq<_rDkSz&$% z^V{oj*>D*Aq~9=r5V4yQ*Uu@v{ZjY0SDQr>xJ}cXs)?T-chI?*d*4kQ46UQ3U`Alz_=e8)nNM5dg;#8&!PS$@sLeN^*m`*4s&bv;Tpba z{Q>ZygB^=U(pvpc4K`6e+h5ft)tNNl1ZSreSf3d|_^W9b_%Lgw(%7^-R^1NNU!<+; z^awU8B4{WWo5)8Wmg~=MO#h`Lpd8T{^raI;n zY+S;;PXx^5eGn;2m1DRG1I~T)BZqnKeE|;>bkS%_w!f5v$MEQP)s5-00FT3#7v<{c zR70Wdp(pQI@wy%{dpZJpehoM?Ot5oW$#FyN-3ib32=-!i!733k*Hgw)9`1Gf*Q2jr z&%~v!RJS%ySK7I)gHS)41D|)q`e;1=e(jU1Vk<&=rmdtHZm;b&YWt`(7W^{Cqmn?(_t6AP+On_3~QZ!k;t~D7A&qp59ydg2% z5A!k7wHmz!uKOC!v}ow)#CFK+ASzMYT8~5{W-TQf; zbG_Gf&i9@C1(V6lnzh!f`K>iGYx2JJES1Q7O--$ko0N049pz|VJ(Hdu4%kqooi?)z z(JA4ZZ}&j=L9rg_0DDX--<5B0Yl_#;X-8G>GVTO|hG}joSS)t}?!2 zhGQk?&{6E3aWlI!QcR^(xJLW6xY0`v3Xi{iOH-yLroap7Atn3s)~!H{8HevypfL5$ zCZ5WaNr9cuo8}XD0~z<9d>{KdQu*U5Xw4^Y{(WNFaa+M1LwO(gpQ$Q{9*F<(k$dY@ z$iW%$r5go14$K#YUAy%pEV&Q3V^P?-w|o_HJ@J!vPaJ!oF;PcUCgn%!)s3t8w>wS8 zQ6Pi!w+*j7Q{o-*u8Y$vkl6gANEymo<{bN86?3UwQ@i*KK9h$vG2ZsQOOH4Zx(d#yI@z43tz`l z>-pmYdb;{K*>r#5bk4ek%?M0Xl2$9~#*+k{{5kgk1m?i__l}MSwbWy<3v_Yc9kLgi z`*7t46aIVa46A`7Vn_4%!YXWx~U3rEBTBVMM_A_35 zEGIvNxb~Xu#R}Y=`i0y6mZ0PRz4P_|XvgILZdmvK+;2Vi?%qxgwF=IT82-VlRhIO% zKKvlRe!IS`{JQ&&w~D{gee6Nl@E3C)_Mbmvb@&3zSMQ|R1)ei}cd!42ysdVrg9_aL zKQ4>-s$SvX7XE4`r4RKE52WAmvzUMi3s1B-VW8QW@$D$=GjOs=;n{zX5%D|{*71ct z+%#KPR~OEbDHvyj3cUWjYcINjkxk2Ao5bCY9`2V$98~>X}IL~!otWz2y0o| zV_0p7-0t!oLNfsPVrO^K{nhlKFb7Rdt-qf5105eP<1u+JzD2;5PeHGS)n(ok0|G0re_8oGBKy#z9MKSZ zC6bvtYw+Rw$ZPL~1C(s@JM_Sc53kM)zdKn#R4irJl+^AN>F*)Sa*E*7Xvh%?i=11p zlHBx;+kMxJkyl7`c=DnYWNf2!P}{b@yyx@k{A>pq9rXA|9auz;^khyuN)@Vo7RJ>Z zVpXvoSGxLWZ@+t_s@>B(O@D{XJ!sJ+2PBhqqZ`@C&OYFiEcjRKHrkkU4z<-(Y(~IV zx7x`1FW7-UefuWwTT-?c8F$CMH=9Mto_Ia=2*g_sTuN~W6ULl;A9)yoPF?Xw2HaVh z%=YNl0XCQ?*WxQ%Mki?fQNkxmDQ8f62I%=V5jR*)s<{AsAmD!XU4ZPxd2S)GOkf z^_+L@JZFRK9YeOf(r~S)0%L~m*yEo>dzmH(BH(MKgR>L3c@zfEaa~X&0_N)a>htH- z;)!cEtYP_gdXcaJ!xpOw8tXh_fn4ESEUI3iBXY#_JR$31%;j;v48pI&2SSPG@g&Ig zH%^Z!Y^#(e7Trt0x_ag{Yc&v3cV@V=GnRRCf!ii)zbeL`wcl(waq30|39L2|fFb${ z3)=}2RjXN_^W#hT^3EPbj12@Z7doSwH!qa=&a4)jL3?xIGzeo_+qQFq(%IQ4ttyMe zr1NRFG}5c3RcBjtW1E%LRL9Bl{qH;M)K*jZ#`D!H+?ZEv`Dy2d(Upe&UcQn2XNILc z1j8;NW|-e@7p}CdodZ^OQ<} zK6jV(Dpo~g;ijbXe{OKs-KhxmC%P$GT3Yv`q2pmv4ad?DmC}?vAC2~=JF740LDY5E z`jl8A(KAy@;&)c?usz}7l+eADInf|=ObOn69*>PxJ}QU^^C5+?umgrCw2v6v&pB1| zoN&KT{Se|05g?(~zkZ_A=}$t^S@ah!8CO9HXtfB==!}ao;%TRH`<(Wa3*ixerWRx~ z&M>}aQqmQv5)Q_zSLij>Hy-OuYEmy&`tdnTc3Mcfn1>ThC)rW$ znSS(A2jUO9ddor_k1$EJ>*$T(jTM9dH*q~bdTCg)^F5#;&Y=YljI=T*$u5rBEM6%r6UBAWTlSU5lJXCFq}eXw5zooS1r&uc>~s#qp3Y!a1$+mQ=2 zk4A)*pH;>87W%ES8WR-2x`qSVLVu=I+a5^!uFSK3dy*1e2NYl48o0qnY)Cx_EmWRU z#Kis;X!|MD3s=PUnyHI8ZFkAOSGeR{~iOIy+j)?uY)60lW+)zBvzFXDx)V(+J|JLh&H}(J6X3}pn8Pxc#$|*Yi z5EJ}o3b>yd`^)xDzm%F3Dz{(K{3n^6=|2_8iG5o7%76Iouf#3eO7`E_mOp35ufDeJ z{C;%Ge|@@@T|52967>J=!-LSp_%giYvYgZKgPLq9rw;&ch_hW*Cc*Sw6I#M{-F;F> zzOY^NBX0JlZuY)6e& z9JWiopTV{#%FmBzvlZP57TmdA#2o}GsL`2F+i|&lkaldl01>rGzsUD4R7$C95jL~*Y{uYWZ@P7OJpbIuD$+;`wkL@0vd`p4kKfp)y z{$V`&z6f{OHxZGrLM#UtL#KNU=Jrhld$i*x8S?}A+#C;^f_Fn#RMytuf~+M4vFtJb zsUhJ)BfAFD#xRRSK-q-_P`Yuxd}>mX^B36L^8$?NP8Ox5DmGy_JU%Qe-q|c`Adte*>}7;{Y0AeN1NE^%O@8wOtAn${f{JTfo6Mlfj1(G)Bi17f`QE0G z8l}cUAt|WJmPRUN76}fVoGQFJ3*m1(n9_$-z7u}ApnA41C zMlPwgo*C}+(Z~yZSSh3;W|~v%!`o}339Ly7or7YAT08&HpsJsC9TzvdgN-ev2Bxnj z|4n0vvch7tV)_|0B#?L-I9_<$#L(105+hob!}}~6kVv;!O%qrQci!f($LFqPg==ZS z_CpoMweDubT@w*0>&p(~u&hNSzv9~0N~7_KpqKf%vsUNp3lxf(44 z0>tvJ9SgE;44tpW%D|cQDVJ=_ROFL0pNka1#OV9Qj(8cA5U!g6Iy-8tTs56$B#hvaG}Rea%`1 zZWbiYa(YNH0yCF_7a!PDwv1+;CbEtzgwawIP_x#?^G{YH*5XI4 zC%^6MQ&F<^E|ry{i3Buxdqqm|rIuFtXp5!KA$Hdg&-QDt?CTAi`c{9l9wA5uqPoDU4br>S=wQklVVq3xGdo6NO zPtSj4ts?1y4vV%SAx-X5j#|-x+Q;>^;~V4ZUwd4d#9wo0PoG5S#?2zuaI%)3k{3su zzLh@(qte|2yR#g+Ri7CNZfgYy-srcqPT^~U1mTAT8Q4B<=fG3QS8Lo@x2(lQnHKuO z009f}52|QebBO|VUi99icep&HHt$0jAX4Y2=MXRdrBt7;?`MtciRY%IsH6jL!2;K0U(iz{#@bq^R zuxmMA)~E+ZQCJTkiEzB;nP*M4rc+-U)scmy!qT`0=E-R>J#Mbb^_C}w32YMF#P%V- zkig7%$k@w0wJRvvSaNF5?K2gI_#6sti0}@Z-gE7-l%Icu4FT1pS>IiI+6JxJF|@v@ zm`Wq*)o3~G$*<{7{EMgkMqnK>XLmsSBrxqd6ZUs?`4SH6x<>NWnx4{4o<*2Bf0R@t zWCI$Q48jg=eBm&iWBSQ?+6kGb$6(!yn`R!Q-&|Sp_7Y`iXs+p-=&xG4CN^VT{kC0O| z#tO2MCZ0iaOJ>oKP&+=^h8oTD{ohGk@x@U+J(`Y$9`i?~$>rD}`9-`PE@}24j#&ib zh{!JM0+06?aze#YrhL@Xn>?fHdJ~Y6jvosbWjiIIRw&g9aK}U9+Gb3vQP;{=tEUO4lH+Q$0ox74v1!n`rKf@)^At=@~a z3-{mX7Hqu;9DCWMKV}*+KaG&b1!KsY;oegpqJSGcRD6P5b{0QaQu=n}CnJ@} zhSBlMZ1BqaYgYoIL)Tyqivd?goJ*Ie3Au-?r2N_tA~{zRc=OKt38-I+R{HA0oBCDK zu1*iYF%E+;9#JgeS`@>b?>Gopb1wK^K!fle?luM*ZTnE!U!R;ih0O2rMMJK-jU|S7 z)VZTv6$-%6x{BR}?)zu1IXr8WS9A){7nRsM)Dy7zB=x5i-DekCkDTKRq1o8ZGy17y zq9?N6^}UKmYZ$B92*g~)l%gs_eV9{(!R#!E52+{$`FoCe=aYV+DNb%zw~{;Ve-otVEPqYK_^Enc`!hguhnpo zPG58os9m-M^kxn|7hOk*D3 z)3tWFyYR&>OV?^RFcs4ur*A{H%ki*R<$v-_^UB_`V*t-EfJL+U)^30vZaf=r{e1vA24UA`pT+@#r71$xq&Cyatf} zg|p?3JUC;%CojmatIl8ndwt#&T`%pBYha!^!Q89|;3$iH|GA~Z*StG`QY0DO3e=xI zKR?p(W`E{MqLR}3O>#%9C*(rY+7_gR9>s3MdKED7n5?D-anI_J#k#;7?l{f8b8+cA zkjbx%q^v;z{8F=K8AvVdZ@eW`WV0(KtD_X(> zn0#!;tLtjO+uUqy0{{Oyw*w>?^~<)y417{PMzGMx-0 zkJ)bAqDeCuq;EM`Xw)itm*?26HM-jYuM#moAX2^% zuU>Cis?{|r82~b8j;(|jVy62tk3U-|$y6Ch*nFmQ{=JCUm4+brey@lR3!uq`|doE!)iX15*$ifCdni+o7<9rjEqIpRUYu=K!nDSOVc*PO(nLJ z%1n5!Q-%RCCG|w|r26^uhWAMYe(WCVTJI9ezV%EI%-os=S^7-{=V3BAfssPbR|}V@ zsqqneAJHY&h(%*>utyEE%Ippx4xeIWYQUL%65L zQ+CaUZJyE}IE#8C;|qXSR?U{zs>a-|m-vq=*retCV3G+tuA)=QVU->o4Klh;p|h`Y z*GX2xx7D-w2y9#ut6f9aZuCP-uCK3`z4B91BhrpsVBWf>)H%7eB93RPJ(7U+0zv>N z+u$w+JfYQ(xRRMTcN=3@iW$<2F)@6kVjFmPw5zzqAvQF}WG_tdLJ$eYRNx(ZnI20R zi6)xgGKc1?uc(ZM9xc2xy4pwGfSkL|hbz>917QLPtWW10%Yv8lW#GQTf?9I2uG5p>0Gx?9w% zY_zS>VIO~kN}QzLAYM(JRSTNwg?hg=?@e#eH5&&*FL-^AkKLQNj6h~%g836aj@=m~ zJb{+9o)$rWx7@Q$@kLA0aN8`&vhn;0O6d_RyOC$C8T-A_6d>~oY!mSzn><&*IU zvQ}Swd7j3wrjJ7p!H>S8y$6C3mTM#Rcq`d#YRf08*C)l@Rv*rX$Pu7imxQ8C+sY5i z3YL858hTomY~WGt`@8jDfvXN>pFGnRKcfZ3 zfAytb$;ZsA?{7@={QgY2j^FBN+3^$g73UFWqb$)`oiofgdx+56RD$~LhnphzkA_wl z6wmX*4LXt>17v*dQvL74F2P^HbY8J2ougj(3OK)&$XeAG3*OWue@$hmwj?IhnOlx_ zIx;osLD-(h?zkGKKxr6z&f>Y^6;$-68KEki{y>Y{6_lzek-Buv&GhBsc@Rv|gdOYa zWJ{^;-w#IA4j(m9?_H43|Guq5JO<}!r`Je*LMO-G3Lk2y5RdQ#A8L@}34T9i`1yl! zTqs@DBwrpZ2o!`{XFny=IL$fz+<01RJZ>>Y zDmEmwn@YwB`ZvPb?jx`0A`ErM?P1$yZXji=Rm4s*i1{$g3LOX|6@qMX0uAE*?|aqM zi2wL_?z1|v{)Y0K0XgCD7w6>KE?d2GgAxm&5v8X_M=N>H9jTi05??cI^Em0=>qBUR za}_6BWtA87S>YBmlDQ;~;DV1T7hMa-v}rl2HF)61t2cCYGkSO zzw^>SNkb2hf)RG{BUD(ne;Y}q02B0RwDJ*HtJQcH25uAq3W41ya)Mf=4G@+(hzcjm zmZ%4ny9}K%@8s&vMP-Y+=;?*fVDMI4WP zb8A*de)wS(j2?~uDIK%(MOkWL)QFf;y_=>YXpOq77=46Jrv13&$zk(XGrLZh4+JgO zB+-t_*by#>L$mZE#_yogiM8(Nh5!zYRH-cS9KFZoP0?o>xgE_aUlq+}Fzroli6if&fPQF9b{WOo>MU|Y0e9QHC!%vgL7b<8=Qkdjvcho~XcGsTmCYU$)PGNimYP8;Jggz*M z*Vl-vl)Jc^1XyDSUJgh&WMNh(!lRhMFYfRxiZzawzbxa^2<%T47w%=19tvvaf?s|h z#C<-{jprxQI+0M)hR7uT$*?KQza}xemL?RVz_H5sWcmj8lCSw7r65( zpVoBjYkSVONptGSXVo2ZI#1Q)w7bJ!1W@HA^D%AccasC3i31}lm$yto48YZ8>yO`R~itw zvnR_@kr(Ic4@&w(s}0}KmUP+NMVNW_cmd<9lrv&Aa|v=yDoLrC;9IDk+gNfs$N&7f z*rzpPBN^)RACI0RH76~GT1^bLOOe>F%J^hORo0e2W(s(`lL*;nXM}c(rgo0#6a+mN zdry`jLLM0=JVDVSG{&JqT$zaMai8gJ)b%mXdJT4l^igMAjpDUD+EmY)_wY;JSww;{2In{eF8XAP6XlvSb>@2a ztm6K7s>^{h(5ZnxJP$g{->QEkj&<*qcK))jt2)gaPO3htR=?PT$R4};Z6dL=K$iPT z!{OEt9QB|?U`O5?bA!D=(BzB@WGp=YKFB6u@ki;wl2qDPkDX3EzD~)r*i6+!=wlMu z%Hm3VhURWrnAgL!P_JBd6sG4VHhZKJm9UWMj;9?66ev;b5)q2+C!jg`*(!=3Gl}l^ zPZWYt)2&Cd&4(Wiq&+$gva|BNP(j%1hwBZK7xI#hk2JKxF5f|HqiYA#B*4gW@dZ2Z z2D{C+#&R}u`wg9vu1dPPvR7{6A$tD<75|-ODZ6x?4IoRp!X_Q*E-@CayZ6JYyKG)p{SxEA zqfX}sW5;R{McgqqBFhn9bh+BJV423%OaTU>^@B90L|0uB$N>hJ$0utrVhP9(Cp^sR zvAJ8C8pI{e5h!`Fq?8x5gRgNZbS^)ukRx)%y_vgyAEk&e}xa>rj5|NQ)Ng6+> z)v`aq;$0FKPM6camhfda*BG0W=)LFV1vT>>i-xaa+_WX<5J#XLVo7o|3IF>c@syq{ zMM}*~182P30}g^@XSS?NWQDqM7GrqGvd$J=n_3EUk>$o+T0}MVA69A%^}IME08xV) zFh3LgJlA?W;0h5Sj$PUfamf$To8Gx+?nNv+E~dn3-R}^u%1rJo05ZV z|LpbN@}bE72y33y{mMZCxktJsi;FRTc&>f2tjqs#L+i^C)5A*-MkH+r_EAnBEgqEt zq7$eRCYVkP9U8blVI7y)U}23VihM3O*J#nWJ zxbvj8>rY%?>+K?wvgLgN{fSUA9Ru2`dzYl)jLb7Od?dWa!|1&hBg}u2<&g%+>;tgH zLLatas@*zNRTQ%i8uw<7I3z<-R?N|kpP+Omd^a?iYXGMHXt}{pAJkR9L>9~bbSF7R zb#089;#9zPemBVBC0D|Olk)h7#{2jT9cR#vqH{cp&qanD$1Qwq(6!c=-VPn|l%fnu z>pIonK%*0r>GN2X3XNTm6F%tkaB)^W-&padq6*1f?^iVM3A%Fb#4 z2s#vsnrz)TXsX?JH&@eY{MA;Tb9;-64+ABzfas?WzQi2kdrd%}VtHL7w(d=^+;D2R zPhSM`s|DwCd6sJOJcDcr$Byya&&~a99DrM$boVSDf>xf-B_QGR{^41^C-`@dr;i6! z3_Jn$gL`f$g$GOF1CPh*MSmBzC;SP)?9Tg4>yOq80Dh1B+8u@hzt9LR#-1NFa9CEj z+|`x6)uo@AbdSh3Ei?m03FnSBZ>A#SMaviZyxA$0Ek>aGO!j^sRQvZNlbL*2dP+(j zEBHLF>&9&lsXM!?Qs)ZWBehRRJ$sDt-AidQJ4=GSJ=Oq@JZ*7rG(3IvsGh`)uP@HR z6enlVBp<-FhVWY&f4rTs20QV?Dkz-0pEdr{?2DI7w7o>Yq$t>oC-Opnb4i@EJQi>Ii zBkSug1LECo*O-kY%EQ&ct}pp#`!Cq=2BN$%Tq)*2FZrk%zwIW6BHwgU4Wm)!9UwCITn=g zIC6SNx1&3{{FLtVH6bi}q5!~Hw!4yAU(?Nj%BG*2b(rZ+UJxPpX7hlgl3EjQhn4;lZq!q3pn#M4K?9XwQHuo z@w`sIXd<&~_=|j{iXUl!Z!;p)XMTfXO$?p>nBB^3!(o@L7z=A;yREupVKs~Av(#}+ zVQ*0|?E)MK=H0#E=_S=dZdIdBm9DMOTah^!C(AF>&&d~i>tUr_Uuu2HVa)dY1Z_KH z5Fsp(-sA>v_qnmcT>G z?IuP~=t~vW(cd=7e66jvZFQ6{$=erMp#Omn)n}DfpWv{_u%PnGyjKW+MdY5{058l0 zpHyOy$Tf!D4qhA!PKs&*kKZFQmjk{c%781kbL2&W72d3b2-+IBpl>3zudw6T;5RXW{fGjCtcq_k`*6b^k0^i z$?o28HVOkCgftl^J_Sro;?OZ!ev!P^t#V19;|R7JB>G@0U^IB3(IAp5%8 z7gij5(^siQ{vZ)KJ(0A&T2XZhy5JkS(VnV+4DUe767SStnlW7BSG=?C0fN%4)@7$H zcPKBct*v_bH>uy^s}?uPDm5)!MIWS()CrJ_Oj^jN4G8!<@)CM4+u$~0bh-1=^3pv1 z$3Q-E4bvTwqdi_Y**HexvjjyF3^MLBo^j51=g=%&Z9<{GLHyCrNtQ@zF5il6rM~@O zrxf<1lvPx#SAMR80QuuPWnrya@YJ~1u9ihq@mqyI(20``qb`drmE+;(MsZJ3RqIzS z1yykREjxH2FOev-q=2Q;th&xZ3t4nMTyy`ybOmu&XZtc%d%e+Au2rqN)^ko*}Y4VGPx=of9&VN0RHP%+C z)@t9P&isUY)__W+<+uheF>?wVJ{Yu-eL{#rX(x@Qvt|c+EN_2B<8RmwTgn}?Wqp52 z=0y6;_i$8J(vdy0u2v7@Pi7J&7qp^SBR*o>K)zVwwFk-qaCVm#Jz5e>DS3fM<$-eS_HS_(H}_lQ7!V*;YZk62b*U% zN4$n(v?PqO7Abm@8a;WG@s}YkObfCQyf1xx-@6H8zh$T6B;v|d^DpuM_@pVegDq5q zx2hjaYy}3==^M?ifrra!Lxp2)CBw|Fr%5YcE5F(;*e1H%SC(qd58D_g^~eP7=2n&N zn3TN$!9Kq|c-5%?)OfCIl#TOr#_WLhoclvmcp(P7!I?;z7zYR_Fv~26_aP zsqB>gsLyx*sUX^C;PBh$Bwcy9&B&Ygn&JZqty@DJb~>1qGW}-5i3T61SpG27W=(`` zbj{ObBfY@pb308okIXsThNgM|>qw#vdfd`cqsmI7`492Pfm5jPh-{EF#^FAVK_ds| zYp&nJf2AyZpMr*m!jk6%^6^BY^6e80d!>+5Pg|22QwD?QKz zWw?6*$=q}ZYJJek*c`c(f6;l(a*2jtbH`OwLR412C0P5o*W{W28*`Rl=mT?z=0WU0 z)`-n#4^Wk$t^C=_6|=_HT%1>qCwF9+uc-wE!}8zb?78M9Oa z0WIY4(gV9^X=hqDjViLyq>Tik>-=YKyX2vU8T2|Iw=Cq`Cl{_1_jl&LAvE z;@E6{v&0^aG%D}MtsmKXTO0AK7!FNU)aFoO2yfz|-X1(!@^J|H2wnYIOEzZJTxiu!JL3!RQWz;TBSZ{~01Y+T2gUh{%i^=V%w7{oxEk?f$G_mUs8w~qR{f2Yr8Bg0+i9I;+m$eI@}O@Hz+ z**2r&M`jS?A-NbeklpJqd@t}I zR@n-5R4E6in^=<)a&S@ra!I@zG;WDs8-Zn=!Y=XUeCY6BelGlN%=j|35Mosi93zNn zX#s7?1h8k#>Pi^k)zm1b`Rr+GNH3?)vF{QO2UT<*q8!QXKwdsQa`FzXMNAc!bU zyfy)9whoSbv|zRfoI=-`l^VDrYnz~$SR>pw6Pr)U>P5^SMZ7Blh< z3I45LoB-^xEL=Rmx1)F8k@96X`zAXN6a#MkCjjHvUH^JeXeYF8sjiA@hA@W1p=#AKzv+xM#shUb=$!@+(AAJ~kuwhD~Z^(@5j~Xyy5pwxu~;mP)p*bhEm~#<@rwfkuOs zdu4RZMm2EyF@GRDAYAiV0T(%gDxMF{x(RUv$)_1T+Pa_G1asEebVQ;m_wTOvjcvgP zReF!0mia*Mg&G&bUM9#n%=H=mq0@d};aKi!m+w5gPa@LNMDT$D^0^Vj>skouk{Nz+ zDzm)|)%m(CX52Y38Nt{ONL4)daBF$z7T?~r^&tvzfGMgyAA_Os5po;s_Ep6Mv$Ep5 znPwZB#a}`X230&cxVrJ-;-;Owelrhi{5FjT+$Q*~(XT7<&PwBGNX9zZe)E|LbtG&3 z_WV(y5*LXc;x+&*NJIp0d_WDjAAd^1p8vSIB5gP|kyGD7eohNoF|z@3OOv}96FXv= z`-RAc5I~)A69jD$@i%4HY+F?osFeyyaTp&LriLAn>tXmz5>mZi?}YQ5qp?Mw@A*5w}`RS)&sQ%rRu+bU%taY>7#E zTiMrI4PJ!SkEt-8|uI8970oan*3^lJ5My32uP`W!zC)Ns;_ z)hoBzAhS^+fJ(eZS%alTbd%#%7~u}qedo8Z(!0Y66OdNacz6&LfBuA?kdz3*e_cMe zMq_*D`$OK6mlU1*)SzRSeV%#u9T=7QVVaeW%gOd+P4y5tSVm1R6F*LS*w3+bh-ipl zBM~P>hH7(L_f1%>hth4v^mZ@90swXpzd=%0=P)#gqAzGep9o;sOfZ#-i7jwSdx;LD z0tZo)MC1GY*YWHqmuiO6S{oB3_>2xUXz`iOl@U~)Co{J(D&@O3RNUc`a>C&Au!6q( zs(ay!M9g%yDY~vMXpG6-cRR4P!EfflFw~h6c%s#3I&87WlkVWl-xuIbFeQSAkF}gi z_el6;f8HgKrEDPSd|b;x$1z`{;&00D6J)arn6JRju=15?J+TQo<&H)*0SsD;HCC1O ziauL}-4f`??t@!>nLe3ae-Dg}EJ+j|sx1)9XpzX5F?v%%)5#s{E(Qlx=w>z?v=2>G z*+!{%k6A2^aK^aZoLrXvsGV#+{AO%&HeGk|CicWwg51LJ(XfB>h>Y`!kl{XNl?2)Qy_NpGk4U%u}4|KeGM_!9s+_NK)6HF0Cp7c zMDE`C@EkZ@{0~k}OMl#l`iu5|QFaXS+NI&tKZn>*5@C+|2j5TcUUhEzXPd7dOO53J z7d!sdw)CArL* zlclg~%)urvDu!BILZq&Y`jL$Uk()_Gv#Zup-#)EoVwsHRP=D7QN?Smx=brfS)uk)a z5|MpDo9oYB0=b3}F62*lJ^5lEV8BQddX`%4^ECjyI15FIu6dWxEq+sUz+DR%IcZt2CEz8UOHH>~h1OM~fUk{Sv*^ znTL%6E#o3eEvl8(MqG0H_>uGBcbBHmR-Fop`y}0k1FKohd>;isSss#-F0d}6(94}k}a$w_cy*@o+uy(@Qqw zvUsUBe-uFQ+lJrAEI}{p_}r+HP4!m{j5kA)-DXbSiDp@z{Lzv}wyw`ExfbGC!raVe zhCVBPH8Trg+!Hl;nI*jDYZTb%vDmVf8;Pxuv)i!Q%3awi52NKkxv-D+HP-^C3iM+z zN1i6nlH@GeRm&}nvr1hyRIOonYt!S2>V;{?JC`7l5{%6OLp33-To) z;>#0fe`I}WoIX%rXsnK1w9v}p1_*rg?3exN?Y`)@KyG4DaFKFe`x!f$&B&QFdAgeL z^mCEo1nSFg41N=<6PU^)`aXB|YlXM*v@u-Hp5t2#j)Gb6sPwU5Dw`)0Wv@gHVw z^h5%&=c%tob|n`>jcs`)Rm+d1&XTfQ8~t%M)`?w}iNTkpNL}Y>NlH{@@86MLRB9Wp$M3MPrKAF)UVLtD@SM?0hM*vxDVOcdE+xjNH;S(7pQ zL^&d7!mDAJrfkm`!xE#zuX`>P8fiGC(>ZFG3#nn&c|zqC{8nsiJ=QuJSIi9y>=Fy# z`UJa5vEnbtNX)nN6e-Cd?QEfgS?9L{vo{NWS?}t@r)+5n>7KH!o>_}InMWX$cqZN; zInVIJd$l0Rv)Ckxp7EJTXLsG_tKF%yi2JQ!N0aWJq|H~qvyw(CP5lre!TPzM5F{9G zkG?fRoZr--LXKcVKDd7#25t$l9kcswv{LE|VlS8r#S_mq6%7{n(gzX_biLzTEEv_# zTDXeyg*&K)3CN83byRaOczA=fgh{aXjC7*EQ3PRY|HZ))3WuUsBklF@_^>PnnXx1& zzkci8IYq}eF(TO$IUyiT&ut>bCH}Px{Ir)--(^f$FYSON=GVWr(8z@Yhe0!9P2c#& zi7Z>FmR1i<)Ov)_1;z81zeAK{r>SZ2!E>3jSh%mGfK ztcz7}Lc*>Tb8I5ODM=z&r<8l~x;_twCYW1aIuD(pYqe*#DwgF7uxwK4bTGg&$;4li z%fRuHHSs41>DK=Za#R7>1E_i0`8N%S2acctWo#D)e;ND7Wj_P_Y>!fZYjV5N<^2CS z8u%N?`HM+^U*!J}!OQ=Um?sk0jdJ#pdKp$S2(a)2zpz)yWgt#S{c>NS55|A|IC_*e zH32JhVmqJpJ4pBh1RFZN|0vq``&xbrMuIsuu$dqJ9e0?|fVXc&B>fHHBuQf}(8ntX zssrUxE;0Oue**O&W&F}Rd$};z5`QHgG`Wyt3 z>9RoN>**7EeBtDTOwp*s7OIU*i%iGGS8HPO9xm1Tw(KL<8_QI~mfj`-0UnnC=5)5} z6?tR;HjN>Mg}I!DsILZ;-M-#d#qbP|t#@wPA_WUWY^{Dsm;Yf7 z`5QMDz$ml+SU=6YCmP@9ixve`ysfC=Z^PwQ8_`}Fg2$CuA7Ly-S>S^Pdlq`q}+B8rU=9Br53HkIuCG^w*#|BVH2Z1>w1){ecZ6y*Y8zx81sc~$h2hRM2+)**8yXtHJD+$QxmD%7uV5HaezDBaoBC%LN9UF z)OEzRo}_A}h`Z1&GsPD-n@0QSt&z3J;A6PF2iNsJrw1Q1ru?lfz`ZqOcWTn=^~JfM z-*hy1E-D6HQXNi8ou%4#=(r+k*3A)v%rU)_EZ-kZ%Dw^hz6%%72 z)OVWX=@rwpck@}xdMjO97Su)0V0=>6AgZ;dw!#*D%tQ*qY^k*mS+T00M4^lXttkq_ zPJUkm!mtRNA;vz&kkqUp(JleE|3&cpFE_{H#cHpwl5O4MQjC^#Tf-`_;p|xOI~bqp z^gW{mAnAW?Rjyw2`Ohv*ua4u7tv(C#xU$C+C91@l-AMuBNbT)#-?is4fgJG22N=(~ z!h-xk>Fovg@|)k9vfL%pmUyEZNX~d^uSK4N8?i=uoL(Ka)B57q=BYY~$3QOm%&>~P zVCXegg?}{PC7G3h_Nk;dSAcear;&bJ0`{cYHwNLZNS_Ci(~brBeS9KpZThqm9uYUo zsq~q7SvJ*O3T|D3-@omSSs4B@&CZ&S4AuSXzWy)j-aD$P?EU}Man!LOqlk!rs0auM zj8y5PASf-;rK|KBAk>6}u>eYyUIIjU;_bvIjp2t734jrEGa7U zvwTw>s1&R;b@ovat)itv;R+jks1*aB91 zS|9l8NTmgDr&yNBQ!s8}=PD$fb>+xI)jku%GB_zkO^R@5r0PBM(>rUWVCT$Ij|^tZ z+E%9}&eMtz23D-rq848jQMIamFoCd5G1|7KY%VfJ4pq-l*3_1oG&FfZBuiibGib&bc~P#}~n#rcyf_atU*z zglfSwcXO;3#^(ADY3|5H&7a3%1+8Ak@&&G0=;fkcW#5xCyDQ=lDrF?XEmraVopK5i znR&;}Gk=CYs`xC9?=;tmtUuvWW!dAzCVT(^#>P8>-pe+RHoP+;bCAXc(XV>`>IZLleEFwbhx5AVDb7ntGpiwA#M;-bWW_UW z@^8CxjSH#o+*H#Bl#QW`UO4cmepk=w#646E#r;ybQfIg@ye_p}Pz z8f_iB;|_Ay?}t*@7fC{$%VC4qiZQ!05$&M2FBwV^IXqYOg%UasD*V@p(K;ax7!&oA zL~+;n&-pu%L)HAVuC;*V+A$L|_|BXJW5UW(9tjQh90dkEko%2wE7z2MdfLMe1$RzCE7R?7agpoFWoCkMeHAgr*zgYgz=Z& zEj)gi{CGKLW?D`t;m~f_5@C~nNz&EDW&qY=qR@-=tsHQ6wW)YwM%rxmXmW9$!C>NB z&AXR)(SGXgp2g*5Vm^7uEbKR@(PA)+;cbm@-C?xtVmzzBudVMQ%)$Y~$t{lIe09Zhw& z>VaJ|Q~a8ra&^VW#$XHS`BuMe(H2r)8t9oK;drH%_Lp}%XsTZfJ`=In{kR&cV&j*Sx-+@#s2G7s#(@^eI zDrCBCuw6w(IQMp{a7&KX`6V(`b?nhI9i!R~)ZDDmU5l8WtFTcpgrc#MF^o12UqtEx zw}7^iwF}S)UwhH}X*5=DLycl@a6xBx-jb9Q*LEXEuLoSB1)3Y9_oJz874C2jy z1{i`U;Sl)UDRY;usBFyE=9w%hAfj65pd#xLL~+5gom!q}IJdH7mTMdCa67dbT{pB< zosk-AKNe-B0P4uhPjOr@b@9pQu4?|s8m#+WUk0*-uegW9mBx&$E%5o3b=ld^MlTY& zx?k~`Gjqbic1N#RI=acoD6gfHk(jT<3@N>c3e6jLm~T}^vN(AbZR8pU(ePpGJn-<4 zLV*qGp>EM;y3W8r_uR$>ABvHyc&5cud){LIh3Vu=W+Yp#u~)b=A(#f1tJ3hdS%wio%J*r^VAx=8ba62*H=! ztnuCp#73|%%VO{g)mjIoo%ZlNZd5{jkY&BiX;!H2JEUVmhsCe2u0E$Gp7gmhBo4DY z-Bo`_evd*btMd7F2j|@Xdl7CFM7?}fp`Os0>#pzb{Nan~&UVt%>g&-u$(u;Ff(Bj7 z7c8)%65&M>;}73@Y6O5G);z)PLC7zD?JUpmcnekz4g_PYcE8Dclvo8pysJ)%NXRE^ zGe&A1Gt3}Qi-y#zz(LBU7fpII@pRjc7UvPpqM^G93N5^n5DME&P^za_co#y+VLu2L z$*qFstKHRyTcTe{%q;w_a^i+YM)&EKYEVGypb7W z^*++&v_g9e@ zOA8KEzXrU}AeeZ6Pc`&{NbEd4O`Z^zi}r%iYb!ky`Rn|J zGR{5r*V>QRgIvspc>qQG?WsE_jZOr~^I6{sUb-=i`R2nWm*W6=eunJ76?{D5^6ul_ z7S<+KGGj?4IPhR=lcC@0Gq3z$Symb!Zyx_Z<0~&Irq6xLY_P5V8R72kvr#jloZ5<^ zc8>`aTh0&N4%k`&VHLVgn%&3T$h%FfA5+|2ntsf7~FP%yUGO*VPTpt4(-p5RnV*e1>3N=jjyzNjbf^IW&)kKWla!`T944 z$vacPF(&Zv{Ei6J^XA9TwNp#xFw5rFPaGoCE(zoE)9JtJBb$vilC_-2NV~>a@Bg~` z0ByUbII^lj@&war;FV6TAzNB_;degyw_cYCCUpd@B23YM%e4pJ#f8Q>gXKi$^Uwt% z@8nL^Ki7Bk5xhaZAYS}I>D$v^^c_@fE`G0bNx|Nyu#qBi`14ilxKF0RuF|+W2AzOC zQ@lC~2Um_i_|Nn)cq?M})E3T|e}AxUbzWAw|B;1{oh9zlc2V}9ZLRGHhgQMRvscZ> zvj)-Pi;%W_B3ilIq`%LF|MR@9TK{cuY=F6qxhpD8M7-X@asaRbaRb^8<_LcErWU$+ zE{N`>6|~euLcbJywN(i-ad}vXAIOm3dH~wXC7#e@B)D!5 z43-8-C~Qv~#6P*QFfBUqWq826a)#BgZ`M&jJ4Zj*0{iClQq;+|N=c6n=R*{g_jh8f z%@wC##lj5TEtWH%Vl^^l)aW3;?aUQ+=@A^+?7_;(*B$-ZhKV~R_tWM{=SIR)76D>& zG03bS4+u*c2#LLczZl^w@}1-xBu6vTVg5Fd!fNpyrTx|Zk4L95^osPYdq}Tm->aL? z%`PYL$w3sruG{U>q=32@vUZ>Cabv>8qu)}kGCG9)@; zG$m_Ymm^4Z;_8n;XHzU{q{oa+p`C_#KQ_``D!RQcZRsa2P9J{x=ec&&O{{A{DksbO z>KFDGdhqzdwBEjqbx0%`P8Yep&|U;XNK)lODuO>jOjQ-nd+| zLycS|YcrKoy(~|<9`{FVow0tA@HjR57c{g(sYZ{HtuPE$|r6`W)I8Lt--2-tj6 zU`Z1&jGHUJo-i)8wpZ{=PM^4lzlZ2O4vUR_zQ#`guaPX5<3;4V3)krrhUm7v>O|_4 z0SqCA5UBL~g+==N%ho#{VW`?;9Ljf)L(v#V$bs*~_wbJT_PcGU1Fek92MCW1)F#x#-x+4>L5rsgjRg-ElAo#Oko{_-I6r(j&01lI z(WbVamVA`s(W%3f<^Nm*{-3oG__wzE|K}}|(94DZrDPfTZd;Zy=b6){!Dm_k2U}AZ z9{44XySeS5iWSccj3ySRNDM!2)~F@G{~^_#5nf&+ouefhq2;*bOMNtSJl% zN|88(HQfKAMV%nov0zZy&cTN8R<5933y3pp-9!dH1AY%J?Y5t4UlJP8{83wA{%<%m z!-7K%<5{u+#1{9?D9)394#t#xl-oF4z6Glrc^E5YwNSE^wo8LPap~q@b6jnz^fXgg zsTq#q)T)>rPFK=v$aITwx!1z7Hzef`d*qIfS^(u}Z*QSS(!|B()P&Jf$v*ypfvmp# z{T>Y+n@et?uaqtk(_X?!R>y$=n{{ZWxPPs08O5y|389@g&zJ_g1q}AAsVfUwANZk{Oxq)Z<_le@}`S0r_N#faDbVL2m?>(6IcnC*%sM4uUD4Y1TrQ7Pb7_aTMC+yy~bxT30AwuYf{K-uAu=Q!Y8 z#iI{D3=&2|W4q!$kA^C_`=y+53w$1HeY*dI;UjLRj|=zUCaZGmXmOVH253LEuaHk} zS2100!l!51e{@oBg(oAsqc0} zo5JrZArkXKMuR^~gogT9m>Oq^?bthw{zf{aT^aPxM{yM)G-m50(@mXP#5?cmc3Y}D zDQEphvME=$fH!ZQ>?i%QQ#aYj6EiB<>|f(Bm}MMsC@SatEQp`Kukic0%DA!o%;5fG zN>jVHZau^^zrYsjBA_=s+>CSIYRpX-3v=vptlP^l6Cyvm)hXC#7O2vizT&+$_Yt#D zu7;E4cuOE&9g-5W1H4-HXBo^MyffFM(fP^XF~HKr_!(`rrj5_;1=ow2?_1VCgcdcS zufCMCRkBOY%6UISPZy1Y{H_4dxjtrOoTKbAz%VRnoxE*<0PlCQ&cD3PrjTio%hKIX z(@v(DdM-Q?3|i|1g+k&@g)MC{Nf6C$&|CLR+-A+m-a{ytk`U=05*YZcC3%Xy6Wtvs z+Zp26m^FL$8tb{0f6~ar?rWa=vQ}3k53SY<+Ihsrw0TZ@WvyU%8EHuS%qBFE7kdIf zlW-*~uvb+(X+O{;eLq?cpEa`yf*(4HiN9pn;4S#Istu4e=3TYOv!+74)l(;1xo|Gp%=f}!&&Z@}^#&`za zg{YlntRzu6g)7#58@l+Z_CCSc%^iIXt)Syol7Gobkdf`IXMXekUzl(PfA)YYMMJdc z&Twr94AcAD{x_44N0)U1P8~2JzqdqiBi#oUwY<1qP-lvZ5ED#IBqBQUqKfz@2B9}XQkEJTtr@X((U&lkxTqm6$;2dJ=>>3t_I!XF}Hqaw;R>|a6Gd>p{ z+pTx-K$7*EG=7>Ar!GF^2k?j+y-6LJ!CJ`YL62Ty{emOrpXEsJ8sU}La&5pMimH;= z-N<&8itk`5y(!Y_e*E^tR{hicqfJ(T!}dN;pZ|Pad-?69N(VY+9_rQ;EWFZ0xC-@N z9)^+lruymw`qzj-7;-E@I6<#--NMY1LTw*9%DP1Hi=Y0NbszsF*go$7F-KI~&Sf%v zzRa2<9gaMP{hYHn*Q{H$&afkDzQtRzI;Eduw=I`uNiI>Wn~bR50uO zuUyJlLXtf_S+M%CUdK9UM!zn3;K7lwpR=WO-yn&U>3MV2M_CRQ6oG<(r%FK**B<_y zl<8F~o84F~n^H+}K$wNA4bz|@Qk}JgZY}%I?sF?VAaXoy`xBf5k+9`c_4B2Rp%zua zuEW8n*4AEB0FS}kc9inB=aZys!vpHkFvfnP7Qp6i;)HWOcKg#i&yOJt@W^|56w_yF ziiNoPM8ouKH%n6l?l7qJOitAI!Etqu&B`|VsErznlWFxW#Ic0l*3v+iO6w^w|3er{ zbd6!}RM=Vj{750ywyn2{-+*w4_kIbtqwi9>Xii92kZHA(zw5#E7bU_%TjJteTG< zPcEC9`F!CJ#jvE*t?xDbd>{t&;OkS(cC?tLzJD+v#kxtPES%^UN!4Gtmpp^-TetGe zSqFBo(ffbE9BcpRQ1)2}pK#s=lM5?WNh`Et^^N-1*wh3ek3c_*z0)eTB|!!Ol;L0i z*ib~pXwo};f=`#E)TePhRw@seB~;VKTJa2|Yi`6Uo7uAhkti6&O|qrSi_r-)4ILmC z71Zr(Gojl5t-8;=QoxMr(*K|lX0U4COm}blA@>eH>b@A%hcS>ayF`)V8j6f6sJLyp`wyPW)G@GL+csPk0p)Ex%^=|mDa4!FOadt zEZD+p*k~@RGdEbfnlTI2APE=7d=iKzCb@$);5knc7bcmGiGj(_-yd@r}~ zk)8imXNcY*MlRcS?n7%*Sp}dG*=C(pe226Duj2PWAML-3PC2&@cO}4G)~*D;1^mPG z66^5fou8HA|LaQC|5bJ=f5;tMuHC@M9_%Jpx_O%K0^_?6I*ktYjO10ez7If>tp%n6 z_P!@$$;<4nen;$nTGS59Yj5?0E6E+$22?OhCYv^w&$$>};$MRK?Xr&|cSu`<qW|G?3)zcVkOgoe`*rP5Lh6kW-CRqKIiMLdUcx5^fCKk z9CFOZ{!cR}Kj+2|`AsA3IQoK5xi&eAvyN+c%HD1vKgZ&o&`_q`%UNp`;GC@5Sk=yJ zi5a_(5KFSS#{okcxa!RH_|{KaT+)MewTbvqZS|}(c8LpQ7Q8SPddZ?Lovrx~+;TuF zEaYV->Fl0STT$|kZX74NX`)b0n`0%8OgH)hdbKOR*-=(I06wio8U6fJH15s$$HyOq zpK6%K_jRp5?rt*W{@y7TQgEEZEb#ZVDTMOMCssOIT7Yw~!U^rZQ>vYd%NyGJXb17F zoBu*IIoRuG)AAL`bz<03`nE#$Z?sz+F?aq+XupkLw}KK($q+ZFM|6=Ct2;9tIU1z= z`*Sv4n8U~(!81edtDJ!mq|rLozlP^@!-?2s=&C_|SE7qNWiztY|AFYLj8|a)o~6fe zmk-_}NL2zwe%mvg`WLx5zp*Ix1JkrR76{#7kO0(=?sWa}) zq^i7Lw?9pe(PAD{e z`lImoCe5SIZ~k&i;Kpj>{a-n5yefZv6cyV1SwQ*H>XV7s_;+ucIl?bemp~Ne!p6=< zf#t&w*@)O(1{lNp49-rACK?~nS6)1{vZ7Bp4V8v@4;pEc;%8-^a7ccFXo>Gctk4kM` zn`8b^IiKH=@@!rze!9^7IYa+JmsPrJyWGT(KCOQ!so#$Pz!yjb7pb_A+P6g#-GXQP z$Rm>%%?OPL1}3h5h9V3W-zde_%ncdRpAVO16t0edNOf~8z=yw7(5 z(=?97GE>s_jquG&-_@-P9UC+`7^_KQ05-1bTK&ke@%wT;Q6TpyZ1KCt6MNd#=V5wG z9j6;JgJX)OBXc}O!q2~bQ9on3zu;{ifv>Kun|h&#YB%hdfP^iH~ zbJFU_X)Vpp;J6HdEYRGi9M^l1DG`Y$EV!zQG&lQecTw700rE1((~MlIplJ-hcc7@N zmPHA<3RF-2n(QqRHUy=bVX|4qd-tw}OO=i=Ap1f!Pf6y~NVK&LY$DGn7ROdJ^;iV1 zZ^O3V#?R3O(q_Vql{w#5iB{kS7!{UD4rq3&UxZ+|3oA>YL=fbPo2%(E|9}p%+-)eA zZNkZ>7-e2ZbDrH&?_P3QN@Qq5Q)S(TmV#*3^(S^6%kt|4QzvC$p0PYV?h5m2??6Rv z)VRlanKpryB z$Lf4qcpJqEZ?X~~a{~pRs1@&u`#_I@p&nW{^8Nk+Jh*L0^~qNdGhW8&+BV6l*izUYR!7$RHAd`bsG$;^>|$5yAc z{oDz8rDu+xK4`cavHDc%n4%Gje*_rS6B0iuSxsmsHEZ0E&`RHGn-rIfjelBNu4JX3 z%EcYZAXaw4Z(p)V87?Q@w~C`+0zTGbaHC^w7M10OTSdzel~%hw%1^-)@)X5lp&J9T z51dT7p9hFtA7}8+Y<;jR1DP2PRj6#Ci=-tLu$xm01yIiGVVc%||LjWGIEGH`H)lkAH|u6^RT1UMi$ zhb(!Q?%SaI{?=eggI*y3EAiDFuK@Pdxkc=Ybi90#CTK3gOtexNnzd9@TvF^?U2~K_ zS882eM(D7=+U_D-hTCWD%Q{p#`Q@@%k zN>n>FEdXe{_X8GDC*#g}-#q}1N3FYgkclBg=DJ6*CpS(^6OmR? z19N8)yKSG7QNi_AsTS8~6l)&s&K=h78g)%A=UqTtZdlZ#BWn-Q`%nUI_0Z!?h4Ln?MWYM+a8l9 zmP|c;3vv+ieg%_aXDsdQqvKc=^uy&2r%&zbn5N8Kabd~Itnu~t%?oghZlo$>CFCZ= zr8)iPwx2aF)TO0|3^g$Y**znMBZuFqqR z4aSEE7dXcKYLJj-t5IZ{Tje+S-RbL;sUG0CA-!|=#e-+!!ejW>K@9g;y`sOA#$<&> zl3IqgU`;OE^Aqo4el_Ec10B7^ z%PqV9_08kpobZK>M%Q)XaY^VE0vNr?(_Iph2KW$L>_A(4I2Lr!Ad9-aJXhHx5UPK) z2^86D{G~9u<9+%ahztBczlb%VyYj=xXtT6GgeB0~Q)H{8QLzn26P=W5gV>!)iC5xM z=%$BprUkQ4P`}HcO@OT;9-h4_k!YwM3q8TIpOKYU>an|?^zpIV@eUit9NL=B)` zLh%s2O=mvZ>?qXpzI4;)8wJ?2*yznwd{4rAkz(teUwWcCqwZhmjxMV*W_zgkY+ezq zhP!-DvRzIx>(NP3T)ts*!R)=1S|=gIJig_X?`}imd({A$=SeP_5k&J{jV)=EEGTF8 z_>-Nev?&Fr1utjCynPi3;2hiWFWI?Da>A_dnTNw0vnz{x$XAMl7s<=G zgRakf_4VDs9Iin*TJkjT({W_dJ@uoxfo~EpY4wkc64bwy))@ng?X4z^+xno2v&? zCPYK`=R9B(^>n!PTN)><#b^m@rTSyyMwyx|4!?ib;x9MbH_L^=lneKtJZ?*{-Pzz(2Uw(e8FZ`$|B#6hGKhM&3}h(|X9&54|Ir;1&I zP`xl?FD#)hAUGR8_jg=a8<;5c=nJK&2v_xgW`; z_RjAJI_^JpW_UE9CCeUcEQR)qwDy4FZ+QX^66yKKcVS|QX2Hn zhx_+o)&Ijw$S@U#mc_}v@*BO9s?5F0wVi_cZRbK@b00MUb@XX*YvGUb&=#>%NU3yU zMoB(U_kkti>?UoS*yxGggs>lcU5ADQtS3j*sPY9b-K)KRME5%P-&*aDJLpdbF@xH> zfTIbez$}TPLO17v(p!IJsvmdz;~kIG-v?{gv{}nwzU+)BP@lo*j|Y`)H%xt^9*ik` zcjB)Xj*Q{Q?UlRVWm_7`aMN$kgX28OHJ>JxCsU&SKDt{I|4lT6S2 zy5^Q2dOE#n*VW#;n#`^+WW99%>C2yA6nQFRp#ilBv#iZrAZ~w~R!dCk7gWgIsm+5( z25)1!2TB@M4>l6mB^USmXMYuB-e=m*i)ZMmR#yzI$w5szgx82nO9XQ*2UnwDXVbO$ z4Y9O!&UXQWuwJm_SqMLEVt`TskygXulEI6fo2w-u61F2>TxA9@<6^z}J0^^_usXN> z7ny9Ys#^)f8#gP~7dVoq3h#wiomAPN=G4v`7dJ1{AIART^7H$z)=?OGWjo@vRUo=v zCA(kAeN8U~t&oy#yEVc%slEwbfkXMJ)zF2}xzE^!aP`i; zT2$~?HIY9R|24u&GvF05Lb$45e^j?vn3NIHs!K2^(qvMhk;>>Uu>^P7)CF%g0$}5v z3v2R^^MZ#>V8wBx*W@-uEsBgydW}jbWa}dNLI3Qt;w#^l0x~bWtR60zuGJJDIN3WI z;oOz9T3CKn`kcXfF;6VHI%wi^!{EWl)oZ_S{`?lxyE1eDUaZ&Dh-|j+Bs;LV)NBii zWT)S;>#B3ZWk9LFY59TGB!BJGS;nOxTyxLyw{}{^Y3CJ1q=_XJ>>KE~eYe-tb?r3_ z@XNIX;#!`kNkkEaCkzslZmxVgFdy4T_%fax!GY;sFU4+rvU9F+=tlix$skb z_w?7F425^415ntMpxe?WrAByBM`YqBNW9eUui3Dxcj8rxwJ*n7scsjXqz34Jb5d7Q z&yH6tK(MI_N2VJf+_lPju7m2<5Ub?|=DMq(}vg zXFUUC{Ka7175~*6vVazPxfvQ(Y7xczdiG?e=0m zr8ueCUT@!e{)v&1QGcIUq>I)05tTl=!X=<+;_MEhq zp1!+DVCPq>!7#PZm-^r19$3?|MyJGxK($1#5r`1udwN8q?AE~;(3Y9J+6=_WV0!p|oj zC2}UcZ!jTaVgFv2?4zcWN<<;A5`?)g$j7d&LQSE7n3Y@11KmVo0>0 z7ie8G#^20_HiAKRBWKvso*@6qMcfgJI~{O?8O+3TA&QHNnEFE>ORJo|O5DJeQ>`#f zE|fJ7VPv~DKWlN(y;;@vCgaSX<1K}0$82WT14-{n->%iM_a8L~$gy}6rj3@ma6Q_3 z$=xEiAfht^TUfNd7Ub3=#p8@+1jBoCX;+fCn1>3WFG$eJB4J?+2X^ZnZy*%CT?F%Wqb zO!Uzzh3Gr}g=dal)nFkumtb;2CjoGlE!}Bq7p~&$fk7{b`A_)QmwV=Z<6qB73wNGHGRcZPgSV~-4j>LvK_yO+xkRug+`pXc@XtnYpiD3__2=P@SEgw zCbT!`S}UY1vVu?Th3%;EN>}-9*Yc!FY8U`Fti)cVd7B}4RiPBBg_Rq=Q(>?ciyGq= zGs{xjs1o-Hk9_!|NuiSI{yBPGa*dL_o8EJzpa@uNDyHdB;E{X63-A-(kk}T9wVQ6d zm&I}8MYwFAb_ZU&fY|AuQgX>Xe!z9n)hWkfYQ^YxYuMn+OOk%8^TteH)M&eo)ytRK z%N61V*mE;_L~zrutI?Q0e7w>`g?PQA{pC$dOssACdTt~j`Stja+&@!ATH(t1WZl#ACw(TelC z-|EzsqIDF%jpL|jGDvU}+$J3?oI(24ui0d%V!b7_rz}IvAIR~YtUQ-@NY3^?X>t?% z^^h5da8=fAtLWxE9{#cA#hSf5X|Mq&7TlT6X&F=F*NA$d8mI@=L4`O;v(TB6((`tM zgY-qEkHWzRLA8wIGq3`DKjEHP0APIQMD?%DMv$%`!d&J{h!m%;IMrXq3Yi{#F|nkO zq&ah<)c^pT`J!8NMlWxm2($DEvvRMKuM2I;tV!q7f5~@@R`6I)ml|ch z#8l8UoFmm9PHDrCS_bXA@b$2=8CElk{+Dkr)ofYvL zw5&w;lQcev0D|+dS$8O~c2lHrknY{@K7m+F{0E1%WG=TyZAo5MmdD%|G}$GjhoY@j zAf+Dd#U|Lu>8{OuzvJQPtk5R_U3W3dor+Ue17ePC6_D=w1}hC4|Ft_-`Q#UR+Ei9Y5i#Waal@*^6(3j2HGU zY#N`D509+>W%0A>jGWZnO2Xy3IluNti+f+@MRI`5*{XI0B{Yz_O3WaYATbb_aVP(t4{4Q(&D#Ao#PdmD#eK3C zYTtcIc1b}vQWdK@ren8UM+peDbz5L9!W8)C9x7UDqF}A>=uBUkHRMkqaOc$I^V}2f zjQ-i`bQHyH2fOD^^(8W?(I+ zeU2L#K~oUx=80g0KS_=SMpJx_gFfDNXZt88+V?`r+uh%8#$;Kw+5LIiuR6N}mMZ0C zrJPYn-GDIRrs(Rik%voqo7p`T3BUPSK0An=nBUqB^_0B4S_QPAE_Jc5Pm33k#=j`v zgw^Lg8PZ&;+yME<9b^Eefsc`TLsc0|tO1T&br?*)%cn`sh=!Ped%7s0L+h{s{zt&6>_HCV59yUIZ88jtP!#MX+&N`5_qmygm`U5z>YCH%h{0`?$*Wp zO6ymzoZT0!YYwnJh2~G|m&pN-sBY%kxomF;EgyX-NqzU;QFHKRGECvqj+}_ zE2Vm(K>%z9sN6+;2EMxxNH2xqEFtv*pUVl;ICVXzMhj6c) z8g9-S-`ikq8)qFmoV&=RI*aG)8?qgy6Zo?N6uN6}fqF=_ph9J1b#(l>*B2 zC)PrI31E5@?YOdQn+a`{ISvQJ*4>FVH3S%(vXBSUEbIZYXIKtar8Wbb19iu`n4TMK zt0IbOcrX-IlWT+I=t+`3H*rV1lAGr7R`$tN#2J-St_tJmKA`T@nLqEyNxK%>dYe*x zK6l7+x{3G6TpM@Fb$bf+yt4+RBzf2MZHfd;; zvgpckA@PKgg?xl(LNIfr4FrQo)?LcD&n;G)Q>gd(5l$gF)gjrV6h`@2hgaZrE%8|H zd&u@J>)L zA5ycBX?Qcg_qn79KW19E%aMiA%rbSv

            diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 049d83e896..7f23c593d7 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -481,10 +481,10 @@ The following list shows the supported values: - - - - + + + + @@ -501,9 +501,6 @@ The following list shows the supported values: -> [!NOTE] -> This policy is only enforced in Windows 10 Mobile. In Windows 10 for desktop, you can query encryption status by using the [DeviceStatus CSP](devicestatus-csp.md) node **DeviceStatus/Compliance/EncryptionCompliance**. - Allows enterprise to turn on internal storage encryption. The following list shows the supported values: From 78bc59075c7ea0a71ca44d55465a35655439a4aa Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Mon, 29 Jan 2018 16:20:54 +0000 Subject: [PATCH 39/91] Merged PR 5540: added missing Data tag in Understanding ADMX-backed policies topic added missing data tag in Understanding ADMX-backed policies topic --- .../client-management/mdm/understanding-admx-backed-policies.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/client-management/mdm/understanding-admx-backed-policies.md b/windows/client-management/mdm/understanding-admx-backed-policies.md index 929b649c67..f88849e2b1 100644 --- a/windows/client-management/mdm/understanding-admx-backed-policies.md +++ b/windows/client-management/mdm/understanding-admx-backed-policies.md @@ -131,6 +131,7 @@ The following SyncML examples describe how to set a MDM policy that is defined b ./Device/Vendor/MSFT/Policy/Config/AppVirtualization/PublishingAllowServer2 + ]]> + From d06520d9de570d898daa668ddd81be96762351e1 Mon Sep 17 00:00:00 2001 From: Juli Hooper Date: Mon, 29 Jan 2018 16:35:15 +0000 Subject: [PATCH 40/91] Updated windows-defender-smartscreen-set-individual-device.md --- .../windows-defender-smartscreen-set-individual-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md index f24e15d243..508f23802e 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-set-individual-device.md @@ -50,7 +50,7 @@ Starting with Windows 10, version 1703 your employees can use Windows Defender S - In the **SmartScreen from Microsoft Store apps** area: - - **Block** or **Warn.** Warns employees that the sites and downloads used by Microsoft Store apps are potentially dangerous, but allows the action to continue. + - **Warn.** Warns employees that the sites and downloads used by Microsoft Store apps are potentially dangerous, but allows the action to continue. - **Off.** Turns off SmartScreen, so an employee isn't alerted or stopped from visiting sites or from downloading potentially malicious apps and files. From bf0d320bea456572180baca904e54c56c1e67d09 Mon Sep 17 00:00:00 2001 From: Juli Hooper Date: Mon, 29 Jan 2018 16:49:24 +0000 Subject: [PATCH 41/91] Updated windows-defender-smartscreen-available-settings.md --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index 5c72c6bffa..f07d5f8dfb 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -70,7 +70,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor ## MDM settings If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices.

            -For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](../../client-management/mdm/policy-csp-internetexplorer.mdm). +For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](../../client-management/mdm/policy-csp-internetexplorer.md).
            Setting
            Du5m)%28)|f5z8~RFtLmNNvu>u_92#x zo|bTRrrn`hO@}Hw*tSn$1_wuPp17g^W$Y zhpF1uCOSto#HT0#C@6c218Qk@z{jivMXq|2XvI49yo$4oO%i0UxI|l%D#qtRp2c^y z5E{k%J10jF!vpVRGM7coRB9;@#YcWm7iqxj$?=&<;l!cAfim`k#^0t7;TZaGqRI=A zk3aQvEP1xgHe4Ky%IGzS$6nHAak5?R2h}E->%$H%ZdtpTfy-l528YuFd>t0sBpVk4 z80j^d0*B20O~*v{M!)hk8y@wWpC56J`Sb zd#{^fwrFp{>~~MsoYZtZ5)k#-^vi=wxvu%OZnmJ#0FpDDqA$svc- z>#swy^IuxnkA`p8Q2*>u{^3&pYhNOObnWn2#<(VhoDBb8qImy15U2<2!cO(g;ApDM z_X}|LHq#@2=9%vE7B_G| z|KrrPncYS%%I*%0gabnN<|}foWTAFT4f0Bq-(LCLaIl)>0%zpdAtL|}iyyoC%%tc& z>&jEwl<44uzx4bi|HZ#BM>qbLdin}tuN9ZIjQ5(zhbayHK!B+H0sbZ4-2oL!XT1`k zajo<_3p{SGO|^$C>)&B4PS7*d6k#7fGxK%RFLtB$1jees*{Fi$&)8Ts!sc90kDndk zWc|qI3k>=2uI5LwUUfMls(^C`8?*Kq4;lUfk-yqaulqQLYhb6)WezLZRHUl6tqSn* zZxW{W)%!X_t!WXN&>Xb8pJZkk!KY5tW|^J_S$KKmND3>0kiTY#EtY2?DE`o46S)s* z?(8rJb*d~Ut}4zfb`=&((#Z2w7~&6r&L#$WAoxw+nxLpr?)0&5PB=A)8|Ds5*W-|` zB2zZbhm3N3QI-hkCdu2{3P#3A$x0XM*KNWexAg{U`R5^nxq&=a$M%xF?JecG6;dd3 zGboglQ_q~FDo?O}vfneul)|MNCX8VGAj!k+*t<{`f_j$<%Kl4eBEk#kP=|NyG?JBV z$7NPYh(UW7om@veZwS*J)kb_PH*Fj;aw6!=v0H%Qi?+L!C7BqLdtVors*T5wexnGm z)=Gs|ykqdX?_8xoJVlo$Erj#jh)@RTke8C=d^B+V*)j4QqHTzGoO)5ptKh^UbK}pN z(`LQJVX3x-Q4PcTx&ioj~)*{V-oMNvHQr`-G zD_Uo|JH4n5&aw!PPw8$oi;0u=V2hkKE}7Gpb`p1WR#LHwN7cOQbY7HTLwJ^D7F7Dk zxz2-|sZDipJXAfpU!Z-+C;OzDPO9%pj9FANk`Zg#wJKR=fnP`&3-CkmbPUp6zTS6H~Rg^*9r z8dl(pUE))`-S@eo#*)=cMSN3Mc2hEwJ4Ny$iM;Y(^-Se8#GT@N|DA|URxuFwnU?1l z=za9q^SeuJgb{vz#d1PW(kTAF@Qj7x%zB%_G6dVuE0#^!f)7(y_f9({U{6w#fj6Qm z^IgG=<2y|ZWSxEp))mw|;&x9^fEH-z!2xXkyZj0wSo);C1o))RTTpIwdQ(1jaYNM9 ztiF2Z>ErTu<6Vvgv&obdgYKG&ntaF2{d?xVQS{0I;_Z;RD27uGR}>GEHS{(^N=Z}^ z=)?f4O(AUk1s#fz(H&1$%P<)gx-xuBgGQd61 z=`ZO&a~51s7Uf%;cDGb;|Bw5fl#xkyLqZOq3?M&z^wzCIX{d=M4XrQUTc~&0{)V_3 zOoc8jZLt7!r}^W4jR(>=if7zcsktbNIY4FKMrrP2F-Nn`PUXj*l?0Y%?Uz+yb|R?_b%sM0w(L1 z_47^0E=~^*vRq%o(?AM(g>FNBR}^+O1YA1>EW1neK4<1Cp=HL*m*p%`q}=;OEDxW= zxUtR$&#K4rY5d6gCTk})hirU-JC(fR zbY0`N+WYcxsXVtw^^X|M(nr3|kq zTY_UrzB)N8eCa;95otbQ+_l^df5k968L26Gd8Wm`?Z&{8{?Rxj-v0}&?SJF$y`!33 z!?jQMcB>m3DgsIo8z5b&(p40Y-g|=5d*}fI!L1?!0@9^RC!t9RkU)rlbO^mekP}q2=Y7h3-M{O4@^;!L?THLGpeI0Bk28j(T2jTZ ze-DumUO855!hSZ`w2;-Prt;oy*CJmN1WXK5aK6IRFbdE`FjfvJU2R@Ax+Z>?5?vJ@5*|!SmL7(vHK@&(#0fc=<=8n zt^%8((xOx4La3e?hE6y8(tUp>M2JqX4v>TIP@v(wczbjeB9(+{$xU#=fd@sbgQ_gh@0x(0)oB$QiJ2hS8Vo%U%-_P{$Kv1AvAk z!eZjGhof~Z@q+SG#V#{t4Y5xts!R#&+b%N=XHDh{AVr>imbnU{rS1S7$oRbL%icPG zG}xA$4Kx?<8Y~bhyk?R3-@!9YFLyl|vpz$c9BVgt#~YJvAF-Wr$N3MTrF}y$E4{#% z^M-SlQbd)gk&KhP_q@t)VB*l8-_iBOfTlB*_Z-4G$bZdre|_g4RK_@i!WeeD%WS(? zWoqd?B!(^OlKzr67@HOTpksu;ET2?dyYv^AY)rF;gE5*t+G#+{nY>7WELVi84?wd~ zeB!Hen|?acdHH>Fa=lo6sK`aCi(c8q!9HQ^6=|hriH;}D@*iG1&#bpGqs3|jmqtPu{GP0FC&Zpt zNpUgY*2IiEKe>Ybf!E6}&9ty|8lbl2jhHBhnuj}ReD*{z1-;!+&R9~s>6oWz$VL0| z2`t*6h`M0~%l+Zl-I_kxq@_FP#tcAZZ?WKd$1hguV3Y)^X`m8pAq4#faqWT3~R9 zF6$NNp^j;GrdeSjPt*3x%>K^RcL|29sz6%2sXXk*clxfY4>Xs69+$!19he!R0}a3D z^qsC6pOjZl9+=>uvISieYFfOW)xN{@K6c5^Yd!~Z52i1u^qZ$WxM$G|qA5OT3tQekBkj^h;zOyKc_SEY zU?`p|NiDgTe_32DR_^Kx7ar0;Q7hJFLMWNYxXamkkqNL@j~cw!Udno@%%^oL>vkB9 z7pRTS*8qE+o~A+Fi26-G5yE0fL{ggPJN7p-Zn_1lt>`OC_@IN7lLKLj!*^IQ!M*m%c7;+peic?tpeh$nqc!15G^e5n9pFi~;0Jgm?#mdGuNAw9O4lq=|xQ zQ^@qPWNbxO;3NH|=2y15jV`bU_pA*C920`+x~uZf@vt+}Cm1o5b1FDT7FZu=0Ked< zGKZLEs-~9Ylxns1c(mKp5be>&CcCR7&N1c1>6K>3>%o`B@eToT0khZj-&k`tCKaM& zS*_|u`R=cQ<7SJZ8L45gf-cce{98_sb-n2(g@h;M(4GfgB42ngMX z1l`15S@ZLFq_IYt_;~9w_NB6Bs}Z4(j~lZ|Cz_x2!Q&Jt)4cork@B*2R?&W`=t}?l z45osB&dVRK1GB8B6jVV|3~P7Ojc*n(9r{qI8;KXIst{GAhNtqN8a@v5N;E$U06JBs zs>O!|ZU}<$QJ-91&b%JN?qqP6P5wR(W0e}9Z-06CXtWqAOIZe3Gppjn7c;1Z=)G6x zX4Lgt#JZnW2s_y3?Q!2dca<^FVo7l4ODHyRU@;^-De;{2sTU^)^f|MS_ZAugG=K$i z{aWk|#&n~YD1h_IfTngE5A^s6`$)#`>)>921Ed4nns+?F%hutJnS4r`Ye)*%vP6|0 z*GkX^8lFQxu`KZBPGgVMS?XWDu?PSP3sY-$=a66Z%ex*DeC;wYxTdNWB^exH&T(A! zWsJ^i)yfJLbNH7Yo(Ts>Fj_Gz@8hNYNykwmvhxYoRGI8N3u;-Z;t)1RI>*=uQ3D$H ztqES5Bw9!fSJS05zC$Jm#b#!5I)R^C^bx<`xRW5JK}g-8M2|pV@Mrf6D?bvP_};$e zQzfza=aSt8Hac}S+2NbMRPRuROw#4>aRr)Zj9Z7@_S;^{hREyB#ZXPBQD|&UwC1Y` z%27mDRABsVvyl7@K-7#GmM|nbH%Yf@4uF6 z!Ls6H+rFki(byUzCI{wg__a4bZ__wgDa#6UTB^63Skif|5ynZ{T-Dxl0tZoP8o=0< zKplfy^!I~m3UN;*i+wNi$7y#Z7tS$1Inx2hlJg8iP{!uh?)pz&8i!Ss&c+_oIxy8Kb zJgtD8!4u&~t-BWtEh#BMAf|ei-k(1OefA6GJ<)sqzpPz7i1rvf_2iG%-`KAIg&LZT zpqW#E=ZD$ep|G+Uu(#XrTiz4Z}qGG_R%xm=AQuWcA=|7`+!7EJIfXHOV;#w zohfN}Ypax`Sf!$y$gQ3~2<2W#+Q(NjFzgq2i4Ik- zju4l^H#nNOb7AL5+xIZBGe&j|hvK;fCS#->rn1w*d6t&iYIokq{N4ut5yMKSoFZnK zAf3$Am9)eUsOSaGvLcxh>+Z=9+4KIYL0%FQaYY!_LFUv<8#5&b9YTjXjl)>RH0TrN z_}&$%JQV<{n|E(hqUVK1M|^$N>OA-KS#HSHZ4{8aFL;BZ$ankZ%$^oZs7QE$$#_UTeh-pozauEPQp zv<8Mf?%A=8AC|fROnYb2BJS3a+%vKhjSo}WXUcX`m+!SnK^HLl6lu+i;T>l!{skur z2I>dTDwVvKzH=AMek`;-JB+_IRtFCf{I3Fk3H6LFY3!tGFZj1=&#Ya$_E?O-6O05M zb?zw8hO?w|me@HBmVjpp=}Tdtz1aTyre72M52Kss%Ge|_tO-!ca;TP)G)$oSz79xi zRv~Z48N3$v&4N~3_j<26&i^SWaO)#9aLCrr$1aza+hf9K^_2tR9olkW z2o_5yZGKSJ*NKkq7;Z8Yu#*&misbxbKvA;*{7cql#k)~#_s%6Cc5Qb0DvwwlTKd+P z)c2Q~mzzo2C~d7AY|j@XSCC&8-C3o+I>xh#)_LyL9W~rz_dwm?F}B5p_0um020M&XwS6$d6Ow8t+I@UgU~PP+vUCj&Z1XFsS)ZJf-HHR6WmAxJKt4ES}VWYOa^I7aj`z|~p8$|og`C{+H zO_ZrGil!5Z^ei9HFBuwu-W>fh04L?bQ4gg3!idJEYcUSpkeiwv(`3P0JREkK0Rdr%-p+&Hn+-o6mFaCcscP z(3Y;xk64PiT1OJCgTJ&GAyQYVbhu$hU*ml@R+p)i|yI4?x`#3y0wmvhN#U?NsOhs ztY_+jG>e7@3xRJ5Olo3{{B$;pfX>tR*1|UV^Ma@^1L=$4;E!ck8pnuY*ZvkdJ$e;NVB{g7VlPy_rtz6wbc5#_FtM z+!rN`q@Qb|iLPMl#^qN<(c!4UI^7kd^Hd$+4XPO{Nw|J3{OhOaoCh%a6V?G&WYTjt z<{MjSWs5;|<|S+v>E)!YK@`qJdSGh&ULcS6m%zmI9&=Jm@60DWOmjK2;3 z`RpInq)qHwqDpPo2$BmR>B_?4OhoHWETHG-~9zFn0>Lsdu`b)r51Bh@ZQu(A}jdPkc-*ow__$i z6;&y7%uP|fSu=rlYm@Pn_0y-M?5P5P0w0yjFTwYIByTIsy2h^?qaA@#5$`i~tAAt( zls{YE=Z8B2n(9b0z8N)QPx*qTu9Wb?UA1V~(vuQ!xP!hxqQ`Vh&OH}p0MXT_{kTN| z3ppxq56L19I@=Em+=(@3faZRS4P|Ehq-t8Eof!oorgZrsr^L@|Qit6aN;c~cdTJpWN z6TB?gS7wXN7G`4%+8dvw3gw3%NKWkbgv<^1*wVbXz}0k<={`EMlUjS+cKjy=Vf9_T z1KL#S!Optd3ZsMTfj*8MOKQW)N5vuVpcIM|*RXWcy7msU$=;w7)-_%U6iD`!)bYvKAXN|%WGH)(w!b0&*iqisGK>Fo zb>M%qE)Y@*fKdAM8r{4jVk1Me8`?d}1A$7%P4R?f!Ve-pSYw8P`~Et*G(Q|vw#JrV zig5=Mqtj$eC(kRunx_whD0V&8+Y@$_nu4|;ZciFoY5Puhx!E=XuA}yvbV41iAcNd~ z_l?u)po=%f|fCr#~nC-jrWzLwi=l z_USEvruWPMf#b0E9PY44va$2dbaEVr83JtpC*|lOU-e$?LifcYp79F}=$tufj7--# z9!_2$YV3#RIs)#l-^@{>vcPc0tR#1=93xcx;J%cvCT7QT1B#F17nsa_W*H<_{BZs9 z?x6I8$R`GHP(s=p3cWmBjq_fTv=y0#6Ob*tQXU0<$>y>l_RlIx88(A{||pb zIC1`Zatmsf5-CqxTbr6-BZX?9FbeT09T~THYH8z|g!Lom=h#u4{|MFTfp-C{a)Ea2 ztH<=-&v=MiK_PvjPWC8wLx@jt!6QdN*LkNcm;=rt*aO-dry1SzEbYnwYlVyP0 zt?9S42D9ps{l!oD$Yseehbm9-tr!6=U1*lnkE|kQ>!ymBoiT^c>x{xG&`j0Fyz!*? z&U9T6kf=c}};rTl; zd}qx}+qCMahts(3G!Rqpb+V67)jB_X$a7+PT8Evt$Ps2h_W9{}kS3cQ`z?cZU09@YH0ztgg_6K80jP{#K(O>(lA2Z=72A4vA5A{`EEhd z)>>t`p`5G2U|%@3B*huxFp|1*q{*lm?pczO6{w)^apY-fI>k!1his#q&2$P_zaYQX zC~CYS@aDOH%}aBnID>H(zD3gcfOlj_R#fbdF6@r`Q*Ro6ME{oiPMp%?H;N!u~5j{5JEKhWd zyNSZHx4x}yyEZgR(7o1JE%;gqC?GlN8kZbRyFaxu3Ci-=r*)3f4dPj>zMP|T25crM z1Lj%p#`xI`o9uBFw}M$}Fj8YqCdfqWp}+sE;p7_AsuUM7I0y+sgr!=3;ME`Z^Q-3b z&b*`(wwwp+NGtSAh}GF(c>trcuDe@gD>idDq%^=3>9i~~F0Q1dm4A@ZF7cu`uxiHC zL1Cfa-fVZXJhh9D#B2{YB8kIs=&i@;k~?YURz~@-zVJUc#yq8p*7@!!wHNze_QW0p zjRAOD0$vS1o``pI643cCnp56^E%DM%B;*)3U!$J*of2fQc}7PULu6e#5#{ zVpu`nI&f(AHJ3tfgD#iV&CPdFBt_KVth0i{C{D82cr96tQLdi_Rc-;gP)i5odCjiXtD$e@gf#5Rru5^*?-mVdcnt${$=e_NC2_Q z9uNtNXItCyI2%7BTu$-^!aUMt*HHELl(R}}-pyWNh%py=z3Xi__~u; zjrUs8`<)!>ejsQ>7&fJE9QyK0caGi&`>8k2etC;+1pk7L*BwuB1TI+lG(-okxNt)8 zrL|9DX0U_tMgKz~y*@o<-m%khd5rK-q(|61z)@fD!$aQdOb6{_xr^<9=pqGm%Ssx$ z)ut_4;;2hBvk4$RER*UoAQ&Ub=LhRKrMo8wN|>xUAdg-dbZM7{b+GGsfAUV91oXWk z6g`X^?rm8GT{Etk%C{jpK2a$(e>U{)J~+x+Gic$YuSjJ~b`fZGzua7$COcGVJ%}88 z;j!S?j{(LZt?P$P>uY|PZ}x;1QTWrJifHh4DZsFEaw5KDTVTvNZ`KRBSKn_(y@2n7 zM(pzFW~#C~HYCRJ+V6$UI~D*+3O{QBXoRY#?yL&&j09*JNHB0%b8vL1ViOZ=F9=S% zgnBhYFxy)YI3_jS_7Kr)MJsm8)O{oJO=%7r0@Nh=*OriYp_Fwcs@MO2BiheJ8; zKV9ndShfSdw&rC)XX_Y#n?SM3DmU?!ts?&3h1@c&HOx&JHNFs<_U^=RlrtKh3KzFZ zyMI75Lfmxsy9Sq1EMSK|Ja4yObQo=CFvwncF0$>KN3n>IKncR0#5Sbb`*Uf&Ys1l2 zT3mifqtSiAWle4x*Xij0ZA+R$`qyFT;v9gUZLN0>pKgqmwzCSDbLD;DIN`ls-LyjX zGd1Mhylm!!Ui&9#N+@Q{pcReB?rxqommZOf>OXzzdw}wSf$K}rJ0sp{?%^e^7E z(U^x`tP2cPnd_h%ydXTVPH!7EAc!7^`b@bQF! zYv7vt89Lc>V&0T&8P9p{^Fa7T3BtY3h1R@9ckGvzAoMtVbS%sK%8_FC5M+`1L8*am z1qAaXI+naoXyI%FeB~-V~x>WMry6<4PX1)>xM|HB#cfR#<2y2#Y9xonrk=-Tc zd*|vHIJ{g&Hogzn1@?&Zt&A14;II@WNUP4sE}D7#meI&g?V9wdQ=u<^7k9Cxmv91|Ba@O<#UaxOvM@>2pUdz2GH|skSiWDr5oZ62S4AGVLGh;?2%qV!2lcUF(fwrawd8Hz<*i z0PmCPZi6(pbcF2WMJ#rppS@4;`nnF;fe)UhJk$6-F=0&O7;jg=RE?SnKpMWg{FW^a zGlCZGRN-WM&MGyE$?(=*znun?9drrtOfy%U;UpscFU4ZtcZM3&-hHQ=k5ur_?F3xxBg8)Dwt{R&JIq?c27{SYQCI-|^hJcg8ZLxLnnIB-|o0 zAuxySOatnsEQ-%3s&4skE|B+bh)T>eAlANeevm@CUNpwo4c%6{m#Vz(iLg`$teOKI z=!q(iBB;nCU&DB~M}l-y$DR(BtDp|;>-E@0hcm#oBVOv50v=CyJC15uAFuqB(h*3D zr;Z8by@IB{dbd#@fvTtOhrgx>VJigue@av8H}HYw--uIAk3Ga*Km%PX7pSxRCTm)aD4me z(8%I?kOY)$cRW=`*!)MY8VJ#d05T!2{*o2{pCm;5pV;#M%)j}c2$}fb{Sn`{ZyqoGTp5S@ zA5UA?93=z^&{wAe&)%l{cx$4RMk7bIi9dPrYsQ`QZ*wQ)!HbK#5*JM2c{a!W@@)I| zFNZ!H&Q7H*o9+}1ons>HPF1A`PL=&}{v^HPKV1v|*S7VYI!`C-IEUr8AVaIJ0T$Ux z_e!a+fQQIN+`D7{r57`P7N|J}GLQy9(a~>l0@?OQ?|C38#slg_lRbX!%HpjhVMUQD zsj@(~PLBvX3%L=9NIN7@BILxFzYb02Uw)M3P%qel;uiC%pw!(m=W4T?!ZV`0R_H;| zM0;;w8mMhY`dQ4>IML*^cGClu+{1ae6yEYO0D*jiBIbfba1%XaTg|XEiT$z40XTX|a7ci2 zOUG5CKdxNf&Uv>iJ7&kzu1w7qPeht{yFNDvgNZM&aL9ZkpwkOMbx2>+g32OaN@(~w zu9dU9I^Fnr{TRcE`(I`r{F8ElK?(2WQC*JCwb={HYq9nfo`YOZVw(*Z_m*2nkvVDw zJFY^oQn1$@fwF?CS94UmkA~yVrLDpY_X$d%L$@s;Oadf#;n44>3!j-oI1 z2e1yV3ugb}Z&xo(lyubA9hPnmJi~WlNUyf4Q@s*G>5av`(d z*Ehn=y{gLbPYPUboxW%Lb`}j{bWU%CN4M`-F5b_dL|x3oFS$#40cLs!)9xDx<&ni{ zDg9S6(xuAF)hc6jiyQTOH=rWA4hQTK_(z6Ya1Ce;SZ0hlqG;N$R(q(wznz&F7LFI7UBrGVF;D}Wxz6mSmV6|R=wxix-LJbU{}6^Q!#t&j`{s~(;7 zIsdc~a$ccU5wcf|Cr1Q=+G(DPt$211SZW%XLB+rGeSH?+t0@Ktc%~-| zK30#7;2QKXwH z4V&cQxlK3%JeWyuJ5Zt%#U-}`FW{^RC{q?v;qX6SrLeqle3zhN%l!{#qpQpt&ZM{5 zK{|jWi!l@o59X5&nDK)EVG_VDSqWv6gdeWgb*Xy+NWK8J{`%XMJaZF$Q(axE)fT{6 zL~_UjX?ydw-jvDOJ<IpY$TMygdu&hCp)&rQyV3hDKj5Ue zs;RZ#lCv#ntdS^m-9b2$)T(v2Yzm4-elq!ITjrH((#BBXQCUik9!qa@8Eu18;g0W0 z1}^!SDyd=z^q3cS%fv2DGB`s0!n}hV+u4oq@UwWjBb! zuY&|Pm0P?g4TVzaG`^1IYfxkQwO3ZM^ardfR$VcDvUy<5I@dX;ma(yYic80~Mz0Q^ z+1~&qk^-8`$Jk!`b3jjjVhX#!lgA{;gPcL#&@a}Ala|w$Przd1}+N*aMJ<~KZhUC67mKgIJd)LxzSf;LAvXkKYC z6^bZJFdx-!)gvXCqoFz|kqwi?FImYZxAFriW&BO|I~R0#S0gNbgF=d{`=ye$YybY& zyG}OH;)3{AMY>ZLr*@mkDeTQE=q-@!^Fus;_$^RDF|T92PjR6ZR5SB29up56MAhgb9%>E(I9#3d0Il;+pL}v@K?T zq!I|e+c6rC*Dr8j?n+%zUpc?b9aB|nq^ctbqllHCQ^a`kQtZND0%K$5m`5YSy_nbf zG+=vsH{9WSW@OpPbfM{uABcDXezzFsYn6vl^>W!tBY%7jX5NuytZC`jWGW)aFCH0B zdUDBFTQ$oSw_;B8ejq@WR$*ek^_KZ=K>!Q&`FwkXH|}TQgm-3V=_ID*be2)`RYVtB zmZa`&iYrnMsG+UindO?y4=SpEy)QU<03Li)i!!+?{XuiMp3JDOZ-NhwL+Xlhe~ix< zzp@6_cgW6s$^2GuT3V_7g+|;6($35P=mP8Nr1E^6k9ju+q6(k~P7DJ}m&d;-Zp*|wXXI_Z zETd#;*GoGXFe@i-K}wx?ZBTOwH#jlp2}BMslvK&o`Xe3NI9MdxroF zMYrNx4z2FK#_ZoPZ4-idTjr%FHmz`bNKLkC=?Dh4$HtB73fh|t&S0^p*qGXlc2 z?$_5}IVPe|Q8ZrgI&|6Z_!czjgT$=zWV-Lx?Tht#VcD$8*Nu0lj3mk# zNqmN49$4d6ASPKl-I(P0R$A5yaMK(QNrL|AJuy_{bjgMJpgIfM{LoN>bVU9VZ$|v{ zTnJiXoVd{QxX??B@7-PNd1ZAF&4HTZcyM`TiT?;(Da=2~I;tjcAM|&`f7I7JzDpk_ zxj(c|4QghG+9R*TXyyHgsM3E@vhCM~3Cgnob*!ZtIW$y7K?;)*arHdnCHt*^aWeK9 z&4@-49j>1IbK<#(kYPeT2Ibq9VBYkO*E(>I(J#+Jx?^BB0_(O4sHncREBA~=?=P6q zWRHRS4LRlc%Z1J>07dwJ9-cjZ0=AJ4LmVmC%qcUt$Lc#iZd2lmsi~nE%iq+@>6Sm8l9(RT(cwz`swFKI)FX%DIkZQ*j8DW=w9v(Lp zex>@yt^HH^Ge8S5=5TNP{Z^=&b4AYG*F5;FWA6grmAA~|lH3`Cfw}=XF;*)rMrX)h zjd{kT`UL3n0PvrfyHjrXHlasiIqw!NbuB1Ix(jTmFEpNaEAN8I6{!w_J@g)n??b@{ zywi6KfTP+m`c0iUsPYpwkS&O($4qwuzv3owd z-HVT9^E~SNat7PNb+da$$kQ`|B@FD~J)I07EptDUO?t}08>MaAREdA=O1yA{4}y&2 zYb#{L_3u1${_Ltc0Z4sxPvV^=q$W zo>*j@a6lkV8QY^$UYnw4YK0nf?2w{2CQH<4qz0M~X93a$r+jd4`Gnt6(e@qJCo|0) z{Tx7l1kJzJr6zm*aD?bhj@3Tc(i>OIc;0JX$CvRRGabz!0ry#lGLd|0JG{$2bYs6! zAa%B|*U$b_Z>Ja1?3V8cH~UR*zx?U)t%(^q{yAAby?-+%xyEafXi%$U56MDk%23?& za9}}IU{#u$pQGQL^Yk)ker@3{WmDnJKR{%p0(pO0N5jTdK;X6Z{)@{*y2x{tQXyqb9#O3lK)WpFfTuasI?YW{j4yyNP) zAc&m2=KEPF<6CInsJ35TNAe@iWBi-zi|NFl6-wX(Fst8aTwGPUW_rQUEniNP=M{`u zdERG)J{dC7r%roPLO_L<3)EonEWz6*yEBJZ1a}SGK@@@U{^*!*ASQf>glu5;UsKNd zWxX*rg)t0|m@GRTA0l1F^dLoqp|VQ+O4wu<>F}!R3+&9c>AQ&~PQu1Ya{U-rpiNnI@z?6yt-m2w~IIojto3Jpc0O>m8i$M(^ zuOD3eW!fj4u1&Tz+@0J;KfwppAsX2T%X^elY#DP5oqg&_nZxQ-0^DV!yuB$#rw5{!Ntp|67v4$q)OV z!^)Wknue70g+#qOLK{LTPk<0Ncm*Z1@QpZ-*oLTss}4(Z8f#xkkQy2oC|s((A4dK9 zU#9NOq@Hmd2A3#@SLy&w-HcdcsKZHEuLbGxg81hVU;GuzH_3e&6fYE?_fB~GrtJ5} z9sT`pVWb~_ejoVl6e}2e)>~FwcbW0(53Q_sN+!wiod^5HZ7*Nv@-HOK`Dvt1ESN#F zxP##nl{wzMg}Lkc8A5oZBwvk^RToHD&gWGCNF69n^Z{xE1tcRGI>}s__yfE=I$FzH zJENiY5-;XA|9zf9ktS<+KgSa>e3HWh_bw;;LH**nMdjQq{&@0RQ|7WyNJrT_x?_-$ zcv9hYn|Al&m&FSMZ2@>M2|u0vSA8X+ZJ)V369-HictQlZxb+ji7Sd@Z3F4?$!0*nT zvuLx@DG4x|Try7Uk(~MQ=bPWCBALfH%2oXwq%WVeP-I*C_c+-=Nhk@3#6!KLq@as0 zm0+ffvJ#C99`#|}BgRG_m7B!riov{5CYLLDFRg;4#z8ssk5s#bk|!6tW;Wb2a>B#$ zHu{5uM}Jj}u4o{*$J&ScEwZ7LGALrFG2Vs%zF=~0Zu+r()8T&e8N8v6vmtQ)Qt)HI zsdTWgdO6naykBSua+KOC1%dbCJOm-{S`q}k&i_656;oOO%Noy`HW_5!QD|Qxwe2o> zz2JJ~>+EQ@v}0o>Qqo~Qd1XL9H3sc*?A{%>jz7|m&xPrxepge3nF6r%K=Gu<&RBKf zdB99J+Y%W_HC~AS<~IIxA+ja%cu{~FYXnj6iX#9uFRM3)9Q;tZ1%C-h2^cPR{zUS{ zR^`+I)VIjEbOf6`+-GW@%Qj&@p0Kis609i7vTh2!B%P`r;pqge%0~eHYUKJ!#yk8F zD5iRnY;gq+K8FI#?Bm?o4gAY}72Dh7s&_xbX~PeOp>Mqe_FJG$e`M&D)&3Q5T29EvTzi%5s}?qP#9 zg54>fbyrWK9`Bx-$onM;Co<;AkEe-O~UQ;ED!X6)bf^i7%TH2c+~nfkZUp*Cl!O`D<>_ti``7{{dps+M8fg z9tqiu(}#=mFc@<|90eq$zJa_xny(f{$W@Ee7uclihsJcE@SF)D<5$0(OjRuN>LETUm}yFY;WuYORFTV9G^v z-+O`nB-FnBa`j47u1}_P0uS#_kXKEawB`@Wk*s4X>+$+T=59cC9kUqZ{yn}T)5kNc zz9NqL)B}^Er0ULY4JAE1Mmwm7nk(4lwQdVY^cPIJ z5A3U+esl0!)RBh+Kn>`t%3uAgd{=a;<&JL1-I(B79;Ik~A6>g!kPGts;y{ArKP(GGrfhD?Rc_M4$6T9^X zM~bA4kanKcRpn_m^U-UWTSb}dF=a5zNraIhfo@iCINbNsfv%WpmbX$mKd+z7CtT_n zpZL9JlNx7P5j;%If2BNF=_+;O^WR!K?Rc-_(XghI$K{HD%aJUWid@Scdj(IX;Yx;g z_EPD%0KaI%^*@&HKN*2tDaMG|)jkTbkEp+H@Hq9Yv=(@Qff}~ihGEPx8tUh^%9t$NY!*$nRf z;+oR{S!}-^V^lDAKH-+%KYG~;meR>e6>%=InX8K>$%M3v9D;`|{No)!D45Y#!r$Ub ze&c&vwF2^V)+XSOMAuN0uQhkQdHXye{z3^})>8XvWhW6L$rK!_+PLd+NZsEm@88$LJ# z5p;LF;`FKp8$mc}L%X09*9WLI3OHuo6VV|BstR1`;w(egyb&Irna3?da%Dd9s zbCG6-TvQI?+kTeQpF*+-c@&Y98N#Gf1z3snCsW=fz~mF^7FUucT(rpkNJp2;L85fb zsk$2ZhYN-;z)W%e%hyy;52XoxoR#HHPU59lt_6N2Q>}~+P~`^CWJ$eU1g{-X(#U-K z`|Fcm+XvmmG3mDXpFpP9d5q7it4}hNe`U>A9|MZT_kgGJYWo9e9z=8a*;7=GUkliu zRC$1st*%A_Vd6g|0m%jd*VN@pQ^pVLGqiAw5f@TX!?~ywx)0zZW7&-{tGyfmp($bNAhWk9pGjYa~UO2?yYC)_MO8 zMDbN)k(;@ImvNabG==Z!kyLR18KAOg`*mSJm)YZ;Pf2b1TUe^q3v0^+`1)bli(|Kl znkfa3qgjRm@G4rAYbxY@3SSe!;;{KU{n7rorvHmdFL7|i>Yl>sEO6#kTQ(tDMzbKL zwt6{4em`^hf>%oMv1FRuV>$^#_HFs4Xq&)|$TTC=!uEPKp_BQ#jGX^rNdm3Zv~g6^ zpIYX>2I$J}-BP$s%za0SLL3{19M*P_0S-$wIQ*&x^AgZaZ!FznFQ_X{61ANyh?Bw{ zqK7Fl;51s(G4LHCJWA^xX?$?lt1{O}VT&iZf9`1GGlYId{b?OnG}@DvLrN-fqJ&JWBcx0*Tqv}K9k#@uKB3&2z1`E`{;S4#EnrbPf*W?^HqYIIC_ zSl8SWQg*EC(XBt)gVvow?i|l7lWvE7vtdV2>m=dJzLeX<)#L3>`m-)RPv5iZ6`E2e zZ+r2kD_BeFZ6!?T%*&M0va1lRyiS47uH{~o93Ey8N~7gqnBSQ>t~zLL1?r?8aGM5R zYuC-5xpXN|7`8F=^V?Vt)nPy|D*BoJexFE`g!xigU762D!USQnduliQNY)E!U5@j5 zAfqp|B6(<_(6}lj=J{9N)7UltaWqF@xqi{1&SVf#4r2+B=Ab*x0lc`Wqg(SIQclfcrfIVY{$ZRl*>h7P zLS|Fhc0a{&XW7LxF0hQkM@s1aE8~4}^-a6#Y*IYr`ks^-Cr<}hbrinQagD)xkp-u{ zgKvxWSi1Zztw+L?8Ex*n^jT1}2~owPdvEDTxNE(xG9B}Tm=sQxTRHntu`dTEFq6Kx|JD{R(3%s2ZG=JmBzCUl-`^m2&l)T3V=3`)(U`Al-=dDR zFiF#Y@n)*+xoylV{%Geh|8~SR&C_?$8vQA0DV$+1ymjn>rjxvJ)cprGb7~J`TmUY< z&LL8AvPcFNzTNAb5uM+oVIG>aG$QKB&mPCJWYq9SSIM^f=!NURSJ74dZU5zF@IOo@ z%{}4dh4ZDuAy{JOkc2h5R@gdMK2~oFA$V{Ix=eddS`At7(vCH5Tu`ZyLL>l~61 zZC?ymyA9GsXcNOi*9e0KWq;H>itBP*Gn0e9Pn)o}T$(Sq13$;k;l z9P@^ZeDuJqK>W5onfXv^#%IYdq2b3?1=5n7p2>nj<3}b1@=XQ&9Yy~8SfajiT=}I` ztsi;I+48Zq()Qk6)Xs&5=91Okk~Wo?H_9H)#|}AEm;BZkTROLxf!2Mpc{@*t+}pg4 zvPuIfVVTrLJpQ#28eg@#AloaE5!f%XBV%n$bjY?f9vzo)2i_nJVj6?GRY{`UKN2SbCU5=N5$UzEIP4-XB_vCqtVeY- z>qjrXw*uWF1GzOqL=@QfpBhVi;6>+~biuWTl`DNmi(%b=?LApm2&&Rk>O0O(J@{c` zI5w&Y_K?OH7GypnKCT;ZT?|xI2tD7ARP;+9jtOFmYBt4xG&FD=4qFzO$CMIw%9$Zz zRk%iv8xMx}c4#x)1LX9t99D)UCIlvrG#|7(|AKNY+hIcYQUfipdOb2tv^zpQH!0P@ z+fp`|<^`r>cck&c8)_R9WF=1C&FjD3%^$S8chFzl8HGjE27^2KME5Ne=k9|9cn9 z{O{bFMU*0(O^2oL2I7Ilx`lWEXtnK%9qLLEgK9Tsgl#%!0x%5{#8PA3bY0c07Qn1u zd_4)h`!JN&0o)8ByEM|yJNV^HO>rv=@N-Ww{4OEieoW^Ir`TwK6?~ZCR{nm9xXBcFFQ3OXoa6m;t zf=Y>zrXocUP#_>Rj-UugkpQ6uR8&L+q)YF;NjIT{B1jFr6N;2T=$$~yeWP;@%-^Kc*K741JC?!e&dkkQoaM}E} zdcLK!EU#LOuyv>`v9p|dS|-Sv&-&!I>3^FPFBdHhg+WT{RqF_xnW?!Msb`sV5&bXELOi+le&2czStSymvau`vm!PW4Z1E}RrTzWO!%g!m(< zQ^vc8^X|SQm6`d5=8zPcx@G4F?S$C)XV`&7?EPLXY|hyaNY-N6TwS?>jdFucw=6*F z$h+$w=+&&#V-AQLddQ*ScB^0;4M)?h^ucolg_Ek+)v2HF^c4YP&f^{~vJ2|MERM#; zyYX_-0*ISLWF5Cj0)@fd*;LyCt-7uduP@Fsj0d2&uXM*7@fbe^ygIFHwZx+Um%xC@ zK}LYwG^|dw>^SC&FzSeZ6#uZYOak}t8v4Y0VKM2MY313H0)8>!5e`*G>&pYxAl0E8 ziY4_7?&O|AYQ2+tACm+N>97QzQn}@Q$1L%A17DzyGKh zk=_*bBOF3pB|Rbx*giKgE`dESQ1@|)yI7)ew-R&=pX}D3S=0{n&&1X$rTz@QZ@A6D zCY1BLia9dB4togh z&=7|YyqQfE-DM4z;yrx(3i0stwSibecQb9=XG8&VIsK8dh|9&*X+S(GuCc&BrN`)- zGPJzKw#9}*M9R3*#rQ@Y>xM2>I;O1VQCf4`1=CZWa}~R7V6_Vv7kBQ!9!gC&`oHi^sy}YL41SRYtXS80pR=Zni&cpAAmPQUn ztND~4MiduQjgsXlF-!t^3AS%>gSR!CB;bsqg-BxUCbQv-I5(EU##%AILjtok+Ql-yXXv%n3 z^`AO_@JI_Hb6-@{Lr_wpTFP0Ov3f(UXY(tR@F_0VeemTl?y@iV(jK|_W4w_|lw|KW2HKr&;18xOzipTc2t#J2DerO?q zki`(Uyra&HTnou5LpahWKc?P(q#_PVS()|oDb`ev6HyL5nLK66JxbR_%=?Px-ug$o z8?>poF=X+5{BnL~2#tjn#2trcB&KlsYthfb%ex|E^&EGSd-+DmMR=?Jz{1A+<8Z~OKXT$mFP{>T(Mo)>u)u4bhzm7X zknB(;L5AFNSd$wt!r_Rk#TrB;ya!?Zc!9Y_=G%_hch2QyR)$54c5+_otkeljT;qs1 zbWGD#W(mwQNd+kCRN4(r_`a4%0?ffWdssMXd&Z;&d%4EI>ztboyktWwvAgs(eyUhC z2Qu{eeSzq$KxE2!#QAUICCdV>$rg6t>#Afm_T}q|3IW;7eRTv@)*SgOZi=|)CKd4& zjv2A*6Y`Biy9DV;6rd$&|hz{<$1QlU85n`@vBm zjo~(`wN@ayLbI*|&I~IW*WKq-r*NC9Rx>#d1VLj!+h3e(39Z=+F8sh2&%Xi4oO6rP zy$nFEFf+luA-JJ2gO5#jF%3%Ndc|4L;?me(O{|wHqY3EZvfUmIx7<%z*?}69=p~Zm zdi~vOw@`I&_ky}Z_K-TXTN&Neo$x8P!K&p&j9^|u9xG8b64Erc7*RN_)TH|O)@%%9 zDW3t@>A!T8IBJoPvrCd=vfQAw%TkQT>9H5f)vH3k!}TY_y=@G74NIa`fy{SIr5Ef$PVRnaW>}}$G&h-k3%>g}1jw6d zQ21Iwn(>XVakHvXKcdbPSJ|N7li8?@UbsBLu+wVo_SJcYeix(J{%k)@_q2?f#SIHR zdp!KRzgM9SFQBm4HrC^p*V7mR)uO;SM@KK?@}qBnT%TPH#?*R$w&g*w^@x8NLH04h z7*?rP3o^yewQmAqwbBfj`)n1vc5-6cF!){v|;ozEM5jfJBvqW2~56S;*Qrt8CK}Y;H^z@bV zLH#U;UX4;o(GKc@uHARNY;ZrI+PUwI6@V$L)EB88enT`$BKY;-j~DWkl}nf>mpv^h zTL9CUu66lDTnD$Atf_gd+h-~kB)7W8!^PLUwF9hWUEo5ZKkzvi?2{&Cd^W6JK6SmgL7l=Quz z8lIhZC46AT_!xb&MsEqR1l0zN+3H=)QKMe1>?R2bfkU^qG|=`Nm2|+qygUj~e-Y$NL3(7l-m_&yNZM`+NO7g3 zxSg_YD>}JPV#G;9K!w>u4x;jaf>Eeu_%=@?eVJi>jQ-Eg^?H{%f2KBN6WM_sKjPFG zqptTz^1?^i(tE}8@qH@=$eD!dZxUL!Zp+`w?9Q4Zje+rh2GlZZT|j<^+L>EjQ2=U% zeT~ZXDlW5vW%(q(KSKIjN7>b+oT-;z6lvy}^do_Phzt{yl~D^hClB0hW_$h@R?^}R zqMj!EGE9bnBBhrX35Jt^g(sRESgMe!$aMABzPSq%%Zl&^>2Q%k#cR24j<>kAYm<`e z>Ve@^WkGI|8EhKWmzk`lvjH_B>xrRIsOQR^VESb=`s#xoFo}O)(Qz+hJM{JFkHX-0 zKn-K>#kj@`#@G)Wc+bA?bBxdYCw*xDca{tO{j3-{*y_qGKA z2z?%xoRX|-!JSNDe!~*XFObJ_R*O@XpdLJ&_ z*Prb$L4^+DWYe0Ap^QYg`10skvO8n(w-`3Pe&XwdzoBcnB~&@{TVm__sky`osNn$PfVuMz@lI+|PCzpuuZD@IYk#KzoECyCU#lo&3!Tn)-|8*`pu5pkIA|g#gkYSnwhr#U@bIofohil)f%dD! z50}8evC?k>$@409W`6J%R&a<0qq@0PeRW|r>!r@#Yp8ES^H9tA)d%r`i}eGGXH6*6 zP`ub<#vq2k;5Vgp-pvCd^(FclTNb5<#WP840oY~}ofQ8o>8ThDaJ}ii8U!jG~OZ$d8sW$n71-1u{S*P7i?#q%WV zhi8UPpS*A{LX`M6g4_?mwT?(Nvt{vZ(P9!38z=`RgWT&G5whw{L8= z0fl^AaTLfxFNVxt1~cZHZ30?6lwBb@P5ZO;q7Lom7EBRC^<#@`2(2>Y5Grvbe3lfNanBpuO_ z-Pml#mRm&cAy-SF>CoBB-c}CFV_`dI)`(4NJ%rNCHbmz!bPl!|9f#eOazgnEZ5nlm z^r+!C1|tf&BpoZXgR;*=v(+IKmaI7&ZHM&|p)J6N=8Uu1LlpHK{pH@dvZB*dbMF%YUl%^~kmJ&GU8}IQz+ycyKFd`^>XN(UD9!R) z2s7DJHc>wXIe(gg%@@&o2*Ugs^k>2E$a|Y_&vE#Fg<<&r*+9)$ivI!y>VH4t{Ns(Z zGGuMi4O5g2#hMQHF;4$*b@LVwW_nwIM2)9d@N2xvla~BYxMdQfa2Wb>-$fQCe!mO_PTI94B`QJWp;MCssX*K#dWmMw0b<9Ug z02+@eQ?DcMHvq6P+v^}ag8UBku*dNQ+VMlb zdjeZZ_S~P&X2b?>wZ$EfLRrQq$lZws^f_lITE7#ebVw|7t9PC2WUqoN^`HD6L-QCT6A1UJ1P!jXnIOwPXvk< z-H9O0b=7JGzLd7K8k;zFZ2gTk4v4og!kHLa? zuO#YiKM>AI_H_oOc9QQET;lh`L{4NR{HXLBk(skS7~pPWzNnQq{PCq#yAHQpAD@H& zke67THsa6*Ypzg)h(qDJMmR1&`$SR~K_CWy82`3wl=jnoa^p)43;XIn8TEr0Mo!=R zm{=>E=Wc7g&M0@t%F@kKNz5OYR3ZNb~ zGcRM9d95oEO23M)=;Rv1NlO7n8&r_ql5CW0#URwF8bM`RDT@N80 z(S8RlHqu4uED-uKUl)eHWHr^3=BfD7@zt0VvlE2Ww(TAjlOc0UxMh9^^%d43 z>@Ix6dgkyi#+p#&GM+4gqdokJ64nt-xw6^6Hu{)#H8@|qZC3j?>>+DCqqi@TR4X*g zq;GPIhK9x6%~bm=Bc_@y-yGfjK_#zo<0P-PN9NRy6dZjre-PFZr<|?ts#tU2!JpE1 zNCw;j)>3YdHnG}RHqN{k4z?#sw(z1d@=XSRtj^(e=TZ3LG!z|9*o3v z6?l>ORJbbK+K>I@4As?orU@nm^TU#j#s>$rnDQisn%<&^?V<}Ok$>ONGPu4ZnEgX9ksY)XVFtAg6c`ip(Ekb1jDw!yg)b}u!V=@Sp9bK zsv1{orptnAPfB%TVCPY+7-W#?l1JK0+*YPJCodYvWSLqU>gHsE{5Tg%6f(lxqjqsU zdCx3iay2_^{wK>>$PrvjLessS!j@Zp`C-#=p94 z)%K!d1dF}ZQH*#&j(9`MGv|?`Pc373tTPPHP`}(yz5e#cY^d&Avqy{6kYu9-3se8) znA9%@kprFmN})?9Ml44tDxC_Rx;ATN zaZz~EXZ`j-jjV-tK!0_Rhf+uAr4$}7*__qrhi034HN|?Vn2u1b*>}W42cEfiVc@!d z(T0rP^Mp3U1X{;5y7lPxlsi@rJ!aGu!C3x?n~TwoO_A%Y))v2}uS_l+b70OdR9RE* z-baTFq&cVB<4Jy@EE7kW59uKeQBKOJ;F0p;v5w^YEZMo~*{FtO4Tx&^1DAFe=|XP#L0=UASDyMdEA z_AX63Z2WA0?kCls!jn8tz}3RB%qr_Aigd!?c#bK@b+v{6#9s0`(`Y)m-noLy_1eWx zV=st3^XRDDO4?#z(+5ro_CWhXZwpLxEvzhl*?32fUv$BYdBr_Q$vQQ)d}MAcIqohd zcxO-~;ft-Uze7)!pf{c8dQGvpY+b#oXU)Ck^~^3^7aJg8Fqa=8o;jUeq__wUykUE7 zAmnu$9RZY5iK8ybab`r?FDsMSf+)zR8rcb^IB&W1erY_)@^R$ePv!UOxZ6JEwe+rq zd>hgld3c79N?0KzBN0!^m9aYGVO@U`ZfvM*pCPUA!M#~VB63U=Mh7`2b^V=9E5d)w z_-M7>ojaC8vZSx(Ejfi)yv1(${VQkbu97|CXnx>G;Y+hd0USFZCAS$82LHxik^M-)b@a~Lu8@~(&whh zyT!^V8QrO-zBI0N15iI8afhq(GNYqXD@)iUMIOt(6fUdzRJn%#CeLl}Pg9 zs)@BVtMK8^Zq^Pi*vknFIJRb~Dw%ZLo#Y_jT@$FSkI53Z zmid*RT)qifeEW`||9^&P?>PSd@LIT(vI>MxuHS4#U1Mud1ctMAxVIaBzs2#LgKM~#=A>W_POPM5Wfbmu``Ns z=Z@_?wGrz{BNqjHoe+^95OfdRIk$J%Egx#YtiF!+)x^t#P;nss&R*PfDV>54U2T{8 z_z&;a@L$Lta&q5}o0^kOZKCgtY?)p1T&#$mYumiA9TljS;z>>$RpH>p(dLP}(9b0o zCW)w06Z*_1P(i&wT~=18SSnvjd8Le_H|C5|ND~{yu3kyDxvQc`}}iw#CdA(^P3BXbQ!zyUBn55I+chyl2+=m zQL8?^Q;yb=<#=#`ahuQfP0>yhoY*IgO7rFomfICZuPkpB%xqJVplmX0;Ru?SSi`%# z`U+bQ0ffst^-4;(TW0bqczUGXCq({`!UXsl3zN3v#g{{1jz526Yne*6?nP|!o0KC1bsft?&L9B0$Ho5L3OASY*+^qh}D{sEY(#4PnH0B1ZkEq}lw_T%vxc6yFsDyPX%UPtYQd{~?k`fXAE61^6hMv?3Y zxcLa@>gYCek8V0cFa%$^x)k2P9g3vR>p|<4N!8uQ0udQIg+32L6!jzu(Fl`IBb+dD*JedO3%!n6(YKr{47#OW)4#%Ol z%$%iy7bav&e>WkgKs`7;o?W7m3I3jT8cWLIny>j_61Az$_+lD$^s1G|`&sH%pp3}& zOs|XNdaU8Ewq3AI9yff-BP`W&oo6Hxn1~2VIYTao|A(&kQkRcNEbcfwdTMzhQ`TH{-wE5kQaCus# zMm+dZkE-R(90b+QYS|&SurCZcLJry~bS><$#iO=I7d>rm#w_2#r<9PxwZ)necU^XD z>5IJ!Lvhpzirc60KaFup@FK)C*()TFR2=tXSM!1XAf_pS%}el{{y>uoOPVcp zkX?Tzv^i~R*(V!SKy z_Og%I({QqpG(Da;!S2WrU2DuwdvxV|A<>AGWb*q`v2jI}$I_PH@ip@n%y2+gihTJ> zhD;_Izz}Ua&C~j{4{GDv>-J9P1$$g0RfYS9+pH%VQeW?7(@Q18Q%0{)ZBs^Dn`tdb zU-zSOlSWn4CY3YW%Mrr?$w$Db@$)B^dnw?WjUcg!$3EAB`X2d^4wT=wL}YR&EC zgOm z{ks?0ia{u{HO~43Ej{CX?|ZZg{rR8XJt!)kVtS_|K#z;#A936T;S%>dv{yQ=ZN#Mu zOT)|49X3B9@0h00pR$p72k%9!23sHqPH`*Na$tFeaj(6-r`(-A$jyi*RB$Uy7Z8t+ z>3`5Uc<`Wxg4rLVf4@~gS!(z}FtmZLY%YtVEu)E^@)R*TYCCIJj(FI!zC> zMUTh@DNVlavfxLrcU)7#n-qAy3zStqZ=ZYR?~fXkJMF7f&aBcqV13^7DSEG`9j%Wp z9E*GIO#ol`8Ml%+U9KAhc6!^F8^{)%eFaK+&FFua?=?mE_4mo@JT=a`q zsCPu&Z!3{RpLc(F2!7T1a2~T~v==wo;7Y~e@ND_<)d`p$rM-S}+<289C?Noi=8IjA zZYE2$1Y~_JOw_q}M*O2g{&>^N(!SXq9}c1Q#7#9tuJSic16pCt^HW_J5f{=4IgR19 zc|J4+%#Ul={e};2bF(PM|8m_>J$=`1RJoJ^&BPEjSh#s^%NLf%kv9Gvs_Nb(T~o ze%br!1fKNf@Pu{$}G}A!j&As?f9_X!x1WHvic_!_b=BexB zH(R!6PTl(QC+*8Xzy1jm4%*8?Vd@GJLgb)JQJ6imq8{-M>YKJKV@tnpoVYH~jB=m) zB~9b$PP`I4Mp6m?P^aZw7a4h_v9mFfo}=10pSQKDEoJN{lV*JRy*evF@n1A{{&i2~ zPaENtnGBU&HwL6_uZp1SO$u~ZOwUu9mu7gM)~sRHmHS$c<8!{k!r2BTl3;jcPb*$X z8-Qi|+Sv+=W{kwvO;@?MQ>u7wvPNKW>~bma&^5(GG%54XK2cjUwuXh2&uF#E z{ODx8v%%CramF3Q7(P_Q{}gZcP4=JhmW?5ggG{|^T2NB6iHy*%msJCgKH))D%bvgm z?Eb&R`8Uyjdi0|Ij&*-+j(>(*f4$8A1StPge;i6o7hq9!_w)Mu?R&RPdYtw - +
            + You can watch the descriptive audio version here: [Microsoft Education: Use School Data Sync to import student data (DA)](https://www.youtube.com/watch?v=l4b086IMtvc) - ## Download sample school data 1. Go to the
            O365-EDU-Tools GitHub site. @@ -56,89 +58,103 @@ To learn more about the CSV files that are required and the info you need to inc ## Use SDS to import student data -1. If you haven't done so already, go to the SDS portal, https://sds.microsoft.com. -2. Click **Sign in**. You will see the **Settings** option for **Manage School Data Sync**. +1. If you haven't done so already, go to the SDS portal, https://sds.microsoft.com. +2. Click Sign in. Then enter your O365 Global Admin account credentials. +3. After logging in, click **+ Add Profile** in the left hand navigation pane to create a Sync Profile.. This opens up the new profile setup wizard within the main page. - **Figure 3** - Settings for managing SDS - ![Settings for managing SDS](images/sds_settings_manage_sds_firstsignin.png) + **Figure 3** - New SDS profile setup wizard + + ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) -3. Turn on **School Data Sync**. You will get a notification that it is turned on. Click **OK**. +4. For the new profile, in the **How do you want to connect to your school?** screen: + + a. Enter a name for your profile, such as *Contoso_Elementary_Profile*. + + b. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. + + c. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. + + d. Click **Start**. - New menu options will appear on the left of the SDS portal. - - **Figure 4** - New menu options appear after SDS is turned on - - ![New menu options appear after SDS is turned on](images/sds_sds_on_newmenuitemsappear.png) - -4. Click **+ Add Profile** from the sync dashboard or from the menu on the left to start syncing school data. - - This opens up the new profile setup wizard within the main page. - - **Figure 5** - New SDS profile setup wizard - - ![New SDS profile setup wizard](images/sds_add_new_profile_062317.png) - -5. For the new profile, in the **How do you want to connect to your school?** screen: - 1. Enter a name for your profile, such as *Contoso_Elementary_Profile*. - 2. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. - 3. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. - 4. Click **Start**. - -6. In the **Sync options** screen: - 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. - 2. In the **Import data** section: - 1. Click **Upload Files** to bring up the **Select data files to be uploaded** window. - 2. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. - 3. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. - 4. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. +5. In the **Sync options** screen: + + a. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. + + b. In the **Import data** section: + + i. Click **Upload Files** to bring up the **Select data files to be uploaded** window. + + ii. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. + + iii. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. + + iv. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. > [!NOTE] > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. - 5. After all the files are successfully uploaded, click **OK**. + v. After all the files are successfully uploaded, click **OK**. - 3. Select the domain for the schools/sections. This domain will be used for the Section email addresses created during setup. If you have more than one domain, make sure you select the appropriate domain for the sync profile and subsequent sections being created. - 4. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. - 5. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. - 6. In the **Student enrollment option** section: + c. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. + + d. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. + + e. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. + + f. In the **Student enrollment option** section: * If you want to sync your student roster data immediately, leave the box unchecked. * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. - 7. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. - 8. Click **Next**. + + g. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. + + h. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. + + i. Click **Next**. - **Figure 6** - Sync options for the new profile + **Figure 4** - Sync options for the new profile - ![Specify sync options for the new SDS profile](images/sds_profile_sync_options_062317.png) + ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) -7. In the **Teacher options** screen: - 1. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. - 2. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - 3. In the **Teacher licenses** section, choose the SKU to assign licenses for teachers. For example, **STANDARDWOFFPACK_FACULTY**. - 4. Click **Next**. +6. In the **Teacher options** screen: + + a. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. + * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. + * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. + * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. - **Figure 7** - Specify options for teacher mapping + b. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + + c. In the **License assignment** section, choose the SKU to assign licenses for teachers. + + d. Click **Next**. - ![Specify options for teacher mapping](images/sds_profile_teacher_options_062317.png) + **Figure 5** - Specify options for teacher mapping -8. In the **Student options** screen: - 1. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. - 2. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - 3. In the **Student licenses** section, choose the SKU to assign licenses for students. For example, **STANDARDWOFFPACK_STUDENT**. - 4. Click **Next**. + ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) - **Figure 8** - Specify options for student mapping +7. In the **Student options** screen: + + a. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. + + b. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + + c. In the **License assignment** section, choose the SKU to assign licenses for students. + + d. Click **Next**. - ![Specify options for student mapping](images/sds_profile_student_options_062317.png) + **Figure 6** - Specify options for student mapping -9. In the profile **Review** page, review the summary and confirm that the options selected are correct. -10. Click **Create profile**. You will see a notification that your profile is being submitted and then you will see a page for your profile. + ![Specify options for student mapping](images/how-to-deploy-SDS-using-CSV-files-4.PNG) - **Figure 9** - SDS profile page +8. In the profile **Review** page, review the summary and confirm that the options selected are correct. +9. Click **Create profile**. You will see a notification that your profile is being submitted and then you will see a page for your profile. - ![SDS profile page](images/sds_profile_profilepage_settingup_062317.png) + **Figure 7** - SDS profile page + + ![SDS profile page](images/how-to-deploy-SDS-using-CSV-files-5.png) -11. After the profile is created and the status indicates as **Setting up**, refresh the page until you see the status change to **Sync in progress**. Beneath the **Sync in progress** status, you will see which of the 5 sync stages SDS is working on: +10. After the profile is created and the status indicates as **Setting up**, refresh the page until you see the status change to **Sync in progress**. Beneath the **Sync in progress** status, you will see which of the 5 sync stages SDS is working on: * Stage 1 - Validating data * Stage 2 - Processing schools and sections * Stage 3 - Processing students and teachers @@ -153,15 +169,15 @@ To learn more about the CSV files that are required and the info you need to inc Here are some examples of what the sync status can look like: - **Figure 10** - New profile: Sync in progress + **Figure 8** - New profile: Sync in progress ![Sync in progress for the new profile](images/sds_profile_status_syncinprogress_062317.png) - **Figure 11** - New profile: Sync complete - no errors + **Figure 9** - New profile: Sync complete - no errors ![New profile sync complete with no errors](images/sds_profile_status_everythingok_062317.png) - **Figure 12** - New profile: Sync complete - with errors + **Figure 10** - New profile: Sync complete - with errors ![New profile sync complete with errors](images/sds_profile_status_syncerrors_062317.png) @@ -181,4 +197,4 @@ That's it for importing sample school data using SDS. [Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) ## Related topic -[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) \ No newline at end of file +[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) diff --git a/education/get-started/use-school-data-sync_updated.md b/education/get-started/use-school-data-sync_updated.md new file mode 100644 index 0000000000..2b9005613a --- /dev/null +++ b/education/get-started/use-school-data-sync_updated.md @@ -0,0 +1,204 @@ +--- +title: Use School Data Sync to import student data +description: Learn how to use the new Microsoft Education system to set up a cloud infrastructure for your school, acquire devices and apps, and configure and deploy policies to your Windows 10 devices. +keywords: education, Microsoft Education, full cloud IT solution, school, deploy, setup, manage, Windows 10, Intune for Education, Office 365 for Education, School Data Sync, Microsoft Teams, Microsoft Store for Education, Azure AD, Set up School PCs +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +ms.topic: get-started +ms.localizationpriority: high +ms.pagetype: edu +author: CelesteDG +ms.author: celested +ms.date: 07/10/2017 +--- + +# Use School Data Sync to import student data + +> [!div class="step-by-step"] +[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) +[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) + +School Data Sync (SDS) helps you import Student Information System (SIS) data into Office 365. It helps automate the process for importing and integrating SIS data that you can use with Office 365 and apps like OneNote Class Notebooks. + +Follow all the steps in this section to use SDS and sample CSV files in a trial environment. To use SDS in a production environment, see step 2 in [Try out Microsoft Education in a production environment](https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education#setup-options) instead. + +You can watch the video to see how this is done, or follow the step-by-step guide.
            + +
            + + +You can watch the descriptive audio version here: [Microsoft Education: Use School Data Sync to import student data (DA)](https://www.youtube.com/watch?v=l4b086IMtvc) + +## Download sample school data + +1. Go to the O365-EDU-Tools GitHub site. +2. Click the green **Clone or download** button to download the SDS sample files. + + **Figure 1** - Download the SDS sample files from GitHub + + ![Download the SDS sample files from GitHub](images/sds_github_downloadsample.png) + +3. In the **Clone with HTTPS** pop-up window, choose **Download ZIP** and note the location where you're saving the folder. +4. Go to the folder where you saved the .zip and unzip the files. +5. Open the **O365-EDU-Tools-master** folder and then open the **CSV Samples** subfolder. Confirm that you can see the following sample CSV files. + + **Figure 2** - Sample CSV files + + ![Use the sample CSV files](images/sds_sample_csv_files_us_uk.png) + + > [!NOTE] + > - The sample CSV files uses sample accounts and passwords. If you are using the sample files for testing, remember the accounts and their corresponding passwords. You may be asked to change the password during your first sign in. + > - If you are modifying the sample CSV files to use in your organization, change the accounts and passwords to match the user accounts and passwords in your organization. + > - If you are using CSV files from your existing production environment, see the detailed instructions in step 5 in the next section. + +To learn more about the CSV files that are required and the info you need to include in each file, see CSV files for School Data Sync. If you run into any issues, see School Data Sync errors and troubleshooting. + +## Use SDS to import student data + +1. If you haven't done so already, go to the SDS portal, https://sds.microsoft.com. +2. Click Sign in. Then enter your O365 Global Admin account credentials. +3. After logging in, click **+ Add Profile** in the left hand navigation pane to create a Sync Profile.. This opens up the new profile setup wizard within the main page. + + + **Figure 3** - New SDS profile setup wizard + + ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) + +4. For the new profile, in the **How do you want to connect to your school?** screen: + + a. Enter a name for your profile, such as *Contoso_Elementary_Profile*. + + b. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. + + c. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. + + d. Click **Start**. + +5. In the **Sync options** screen: + + a. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. + + b. In the **Import data** section: + + i. Click **Upload Files** to bring up the **Select data files to be uploaded** window. + + ii. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. + + iii. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. + + iv. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. + + > [!NOTE] + > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. + + v. After all the files are successfully uploaded, click **OK**. + + c. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. + + d. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. + + e. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. + + f. In the **Student enrollment option** section: + * If you want to sync your student roster data immediately, leave the box unchecked. + * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. + + g. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. + + h. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. + + i. Click **Next**. + + **Figure 4** - Sync options for the new profile + + ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) + +6. In the **Teacher options** screen: + + a. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. + * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. + * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. + * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. + + b. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + + c. In the **License assignment** section, choose the SKU to assign licenses for teachers. + + d. Click **Next**. + + **Figure 5** - Specify options for teacher mapping + + ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) + +7. In the **Student options** screen: + + a. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. + + b. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + + c. In the **License assignment** section, choose the SKU to assign licenses for students. + + d. Click **Next**. + + **Figure 6** - Specify options for student mapping + + ![Specify options for student mapping](images/how-to-deploy-SDS-using-CSV-files-4.PNG) + +8. In the profile **Review** page, review the summary and confirm that the options selected are correct. +9. Click **Create profile**. You will see a notification that your profile is being submitted and then you will see a page for your profile. + + **Figure 7** - SDS profile page + + ![SDS profile page](images/how-to-deploy-SDS-using-CSV-files-5.png) + +10. After the profile is created and the status indicates as **Setting up**, refresh the page until you see the status change to **Sync in progress**. Beneath the **Sync in progress** status, you will see which of the 5 sync stages SDS is working on: + * Stage 1 - Validating data + * Stage 2 - Processing schools and sections + * Stage 3 - Processing students and teachers + * Stage 4 - Adding students and teachers into sections + * Stage 5 - Setting up security groups + + If you don't see a **Sync in progress** status on the sync profile, and receive an error message instead, this indicates that SDS has encountered data issues during the pre-sync validation check and has not started syncing your data. This gives you the opportunity to fix the errors identified by the pre-sync validation checks before continuing. Once you've fixed any errors or if you prefer to continue with the errors and begin syncing your data anyway, click the **Resume sync** button to start the sync process. + + Once you've completed all five sync stages, your profile status will update one final time. + * If you haven't encountered any errors, you will see a green check mark which states **Everything is ok**, and the profile status will change to **Sync complete. Ready for more data.** + * If SDS encountered sync errors, you will see a red status icon that indicates an error, and a profile status of **Sync complete. Profile contains multiple errors**. Download the available error report to identify and fix your sync errors. Once complete, upload new files as needed and re-sync your data until errors are resolved. + + Here are some examples of what the sync status can look like: + + **Figure 8** - New profile: Sync in progress + + ![Sync in progress for the new profile](images/sds_profile_status_syncinprogress_062317.png) + + **Figure 9** - New profile: Sync complete - no errors + + ![New profile sync complete with no errors](images/sds_profile_status_everythingok_062317.png) + + **Figure 10** - New profile: Sync complete - with errors + + ![New profile sync complete with errors](images/sds_profile_status_syncerrors_062317.png) + + Sync times, like file download times, can vary widely depending on when you start the sync, how much data you are syncing, the complexity of your data (such as the number of users, schools, and class enrollments), overall system/network load, and other factors. Two people who start a sync at the same time may not have their syncs complete at the same time. + + You can refresh the page to confirm that your profile synced successfully. + +That's it for importing sample school data using SDS. + + + +> [!div class="step-by-step"] +[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) +[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) + +## Related topic +[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) + + + + From 55be0c2baf510975668a9fae155ec1e959cac137 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 26 Jan 2018 14:59:26 -0800 Subject: [PATCH 27/91] removed extra doc --- .../use-school-data-sync_updated.md | 204 ------------------ 1 file changed, 204 deletions(-) delete mode 100644 education/get-started/use-school-data-sync_updated.md diff --git a/education/get-started/use-school-data-sync_updated.md b/education/get-started/use-school-data-sync_updated.md deleted file mode 100644 index 2b9005613a..0000000000 --- a/education/get-started/use-school-data-sync_updated.md +++ /dev/null @@ -1,204 +0,0 @@ ---- -title: Use School Data Sync to import student data -description: Learn how to use the new Microsoft Education system to set up a cloud infrastructure for your school, acquire devices and apps, and configure and deploy policies to your Windows 10 devices. -keywords: education, Microsoft Education, full cloud IT solution, school, deploy, setup, manage, Windows 10, Intune for Education, Office 365 for Education, School Data Sync, Microsoft Teams, Microsoft Store for Education, Azure AD, Set up School PCs -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -ms.topic: get-started -ms.localizationpriority: high -ms.pagetype: edu -author: CelesteDG -ms.author: celested -ms.date: 07/10/2017 ---- - -# Use School Data Sync to import student data - -> [!div class="step-by-step"] -[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) -[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) - -School Data Sync (SDS) helps you import Student Information System (SIS) data into Office 365. It helps automate the process for importing and integrating SIS data that you can use with Office 365 and apps like OneNote Class Notebooks. - -Follow all the steps in this section to use SDS and sample CSV files in a trial environment. To use SDS in a production environment, see step 2 in [Try out Microsoft Education in a production environment](https://docs.microsoft.com/education/get-started/get-started-with-microsoft-education#setup-options) instead. - -You can watch the video to see how this is done, or follow the step-by-step guide.
            - -
            - - -You can watch the descriptive audio version here: [Microsoft Education: Use School Data Sync to import student data (DA)](https://www.youtube.com/watch?v=l4b086IMtvc) - -## Download sample school data - -1. Go to the O365-EDU-Tools GitHub site. -2. Click the green **Clone or download** button to download the SDS sample files. - - **Figure 1** - Download the SDS sample files from GitHub - - ![Download the SDS sample files from GitHub](images/sds_github_downloadsample.png) - -3. In the **Clone with HTTPS** pop-up window, choose **Download ZIP** and note the location where you're saving the folder. -4. Go to the folder where you saved the .zip and unzip the files. -5. Open the **O365-EDU-Tools-master** folder and then open the **CSV Samples** subfolder. Confirm that you can see the following sample CSV files. - - **Figure 2** - Sample CSV files - - ![Use the sample CSV files](images/sds_sample_csv_files_us_uk.png) - - > [!NOTE] - > - The sample CSV files uses sample accounts and passwords. If you are using the sample files for testing, remember the accounts and their corresponding passwords. You may be asked to change the password during your first sign in. - > - If you are modifying the sample CSV files to use in your organization, change the accounts and passwords to match the user accounts and passwords in your organization. - > - If you are using CSV files from your existing production environment, see the detailed instructions in step 5 in the next section. - -To learn more about the CSV files that are required and the info you need to include in each file, see CSV files for School Data Sync. If you run into any issues, see School Data Sync errors and troubleshooting. - -## Use SDS to import student data - -1. If you haven't done so already, go to the SDS portal, https://sds.microsoft.com. -2. Click Sign in. Then enter your O365 Global Admin account credentials. -3. After logging in, click **+ Add Profile** in the left hand navigation pane to create a Sync Profile.. This opens up the new profile setup wizard within the main page. - - - **Figure 3** - New SDS profile setup wizard - - ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) - -4. For the new profile, in the **How do you want to connect to your school?** screen: - - a. Enter a name for your profile, such as *Contoso_Elementary_Profile*. - - b. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. - - c. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. - - d. Click **Start**. - -5. In the **Sync options** screen: - - a. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. - - b. In the **Import data** section: - - i. Click **Upload Files** to bring up the **Select data files to be uploaded** window. - - ii. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. - - iii. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. - - iv. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. - - > [!NOTE] - > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. - - v. After all the files are successfully uploaded, click **OK**. - - c. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. - - d. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. - - e. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. - - f. In the **Student enrollment option** section: - * If you want to sync your student roster data immediately, leave the box unchecked. - * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. - - g. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. - - h. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. - - i. Click **Next**. - - **Figure 4** - Sync options for the new profile - - ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) - -6. In the **Teacher options** screen: - - a. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. - * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. - * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. - * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. - - b. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - - c. In the **License assignment** section, choose the SKU to assign licenses for teachers. - - d. Click **Next**. - - **Figure 5** - Specify options for teacher mapping - - ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) - -7. In the **Student options** screen: - - a. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. - - b. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - - c. In the **License assignment** section, choose the SKU to assign licenses for students. - - d. Click **Next**. - - **Figure 6** - Specify options for student mapping - - ![Specify options for student mapping](images/how-to-deploy-SDS-using-CSV-files-4.PNG) - -8. In the profile **Review** page, review the summary and confirm that the options selected are correct. -9. Click **Create profile**. You will see a notification that your profile is being submitted and then you will see a page for your profile. - - **Figure 7** - SDS profile page - - ![SDS profile page](images/how-to-deploy-SDS-using-CSV-files-5.png) - -10. After the profile is created and the status indicates as **Setting up**, refresh the page until you see the status change to **Sync in progress**. Beneath the **Sync in progress** status, you will see which of the 5 sync stages SDS is working on: - * Stage 1 - Validating data - * Stage 2 - Processing schools and sections - * Stage 3 - Processing students and teachers - * Stage 4 - Adding students and teachers into sections - * Stage 5 - Setting up security groups - - If you don't see a **Sync in progress** status on the sync profile, and receive an error message instead, this indicates that SDS has encountered data issues during the pre-sync validation check and has not started syncing your data. This gives you the opportunity to fix the errors identified by the pre-sync validation checks before continuing. Once you've fixed any errors or if you prefer to continue with the errors and begin syncing your data anyway, click the **Resume sync** button to start the sync process. - - Once you've completed all five sync stages, your profile status will update one final time. - * If you haven't encountered any errors, you will see a green check mark which states **Everything is ok**, and the profile status will change to **Sync complete. Ready for more data.** - * If SDS encountered sync errors, you will see a red status icon that indicates an error, and a profile status of **Sync complete. Profile contains multiple errors**. Download the available error report to identify and fix your sync errors. Once complete, upload new files as needed and re-sync your data until errors are resolved. - - Here are some examples of what the sync status can look like: - - **Figure 8** - New profile: Sync in progress - - ![Sync in progress for the new profile](images/sds_profile_status_syncinprogress_062317.png) - - **Figure 9** - New profile: Sync complete - no errors - - ![New profile sync complete with no errors](images/sds_profile_status_everythingok_062317.png) - - **Figure 10** - New profile: Sync complete - with errors - - ![New profile sync complete with errors](images/sds_profile_status_syncerrors_062317.png) - - Sync times, like file download times, can vary widely depending on when you start the sync, how much data you are syncing, the complexity of your data (such as the number of users, schools, and class enrollments), overall system/network load, and other factors. Two people who start a sync at the same time may not have their syncs complete at the same time. - - You can refresh the page to confirm that your profile synced successfully. - -That's it for importing sample school data using SDS. - - - -> [!div class="step-by-step"] -[<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) -[Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) - -## Related topic -[Get started: Deploy and manage a full cloud IT solution with Microsoft Education](get-started-with-microsoft-education.md) - - - - From b16093396f3ea927fd02c6da2c5b654cfcb64371 Mon Sep 17 00:00:00 2001 From: Juli Hooper Date: Fri, 26 Jan 2018 23:04:09 +0000 Subject: [PATCH 28/91] Updated windows-defender-smartscreen-control.png --- .../windows-defender-smartscreen-control.png | Bin 53778 -> 40708 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/images/windows-defender-smartscreen-control.png b/windows/threat-protection/windows-defender-smartscreen/images/windows-defender-smartscreen-control.png index b2700addba33ddc2bbe8d5ba9d1677bf6b3b597c..e51cd9384c005f8194da7e2a8f412760a916d519 100644 GIT binary patch literal 40708 zcmd43cT`hdlsBw`B1KS85fBgsDN2{#6i^7EC%{7uNRuw1NePGu5tSBdqzeQHRjPCW zrAr5;gVF*7kc1W>c`wg1^Q~F$%&eL3Tkov*`vZ}1@44shv(MhY^ZV^hq`t1kB|3Jx zGiT0R0%@uno;h=F?aUc!j*I7jPYgKN{D5y~y$m%}&y@Dx!~s80J3i8Rbmq*b82V$I z^T5xv&oxcG&YWRvKm9t}=}};J=1c|}r2Yu{!U}%^E6Drdzj8GG7`FJ4*0NkwzMKPI zfVjd~M|<6&=uw($1ykGLUAY%`9{JH|R|*R})AhKRV*M++m3HQ_M?7X^QS;Nsq}ni- zcW+V8?ZSi2STdP|oTr}YKea<{4Q)*Uj<-@winECEW z`CsqFXaB6QZCMaFW0uWO{U;|(!G9=ZkK>(Q(U!meN&546ts=SkSO$d34HrYi@q*}W zNw-0$>m9_$C|=?BxOcoDvl}CT{jT4ED6cW{?iqg_K*Yz!&!MXK8*dD z0M^nV6GF%Xy9yZfv9e9KdCj=}Pn5;X<9MiK?76XpoI;yh!tKoxM#hD3I&@}~{xV-y zngNsYfwi8#fWG}CluegXEcI8zyI`7Ug+@D-wZ2{Do}l`vZD^X7q`63XhL$N-%u*I* znL0*8m9vulf+>H`;DIt{b(ibi=Q`)Dv~+&_~aW&!^PUUq8mt!yhgy z80i+PRx{RA=X0)6X)n-}Z_8fn9J**p>JA6T+|1!@vQ& zNnotYojD0#k(0^>z(@>$WBE{gv5jC`1Vhp>+@tiG{9x2xVK586VLEj7GvW(xJJ)tiHhS>vgT|; z(yaq>QC{1_2+3~foDB}I#)~Wc*7_jPp~ga9soV0vDje4qcT)z@D%@ucr`utg^JzTk z(qgQX?;!b)bKuY{3GGtx#3xuEk>PC0NKNa$nWvj8!hnu4kmxMfH{zu%e|btVh00_?Ssk@$R%=9($i3e= zV6A)W?j$t5bJd$*YLw-90s*#I+hl|yo{RFV%DPFiH+d2#Chge~#^w{h-&{D$+NKcOoAj& ziv&b-dGNoD+CXTOI05zcV{B@h!2FIM3{br3uYub(p^zFMW(*r2Xc#1hn0Qn5``5R3 zCNW4hZJ4h&ZkTWLnv5G3e00ciyD+8M^=sJ9LCbzOl^^z|RYhh%xVw3>D6E-6KBB$0 zKkYRzw3&*GuOaZO8;S!%(JYndz}%-lxBg}E`MHgAy)a+rZB1!D*HFUja;_MXyJFh)s2_}wCGUTE z6z~S+G}{(jpCLnsq~nP8*y*olys15gSH=GWkblv-`=sZrMfSbpVWde!yZ=!Ss@GM+^n3^ zVgYa|FhQv$-xgYWLGY?@U-<_oQtiixFE=!ig~N*`)~?U7a|y7Ov8fAHmlw)=yi06^ zMDm#4_1}4f`0y>whX(b{y%XA(x$p=rtex!f3vp+WxH@X)JM3K}otF=d zfPNmwm2t~8KOeV67q7Vw&RB5$JM`)L!tp%b0{-*5iRs^&`qS)OV$cB?FKPYxAw7Dy zA>51sIcIakEzlYAhwsXtzgtvjZ6p`#ep7MUNuLknc{dIWRGj7sI6zKCLAjrPBoxKL-({@m;*>j?A8Xq6#BdpGsj zSE$oY#c-z4GT7s7WAF_ONsE0Yoo^;w8z%khk(|mf<2|P7!U_(qKMZJ!nu?x(bbR5k z9c`)mp(`fy7ZM+m#Y_EOe&b844b|@(<|TE@b3%HK&3d~hC>bJEiV$)gY6{YA4-DHn zY3wV4*s`=^!k=>agM~D7~BPZSv3V-LrLKJ@tf{#pj&lI95WANQHXS+pwFpC)4t- z6ya6v4~b;KJ_;>|Tpp&!0kEOQ&SZiJH-~njPXr@vvxe>sV)sX-+(!9Cu|IJA^py{s z1Z(Vu%s?=_Y`Khlmo_W^sf!zFL6E=*6%Ub$yM??jd6KUcpX|eB1IGy0y3g`J(9N3X z^p*o;Q=2#1!zwcGX~dtd=_R%^{OiX*y9{JhE>wIyW_i>0S}CG^Z|?QQkxFHgt}C(w z)<63(ga!py>pC6+Ve5<6m3Aj3JvLfd4~FZH+2cYX_I!?Vco#hqHDv44Sv3h?>|B}~ zI77TkM`2stQDKTuHyuj8a%C*zzOM^w-g!tKXyp*8N4T~UQSLWgoZHYU6ex}`Mbhxa z^cKRQr#9kTteScne3A1&dmvKQh;c52CD?scI!IS+z`7zQSk(jm^UEs8hs^HgycJO$ zaf=Z5q!h!?36DHd;eE1^aGms$E#iQs&sPcj^Uref{U&LzwFsl-Wf`~L*oDpW!YM-E zC;NYn&R+7fP3A#uGXEW9HuMNNr;&K$mfTrAe6=S1XL&mY8s!nTpSH5D6rI%(l_UYR z3-L=eK^Q|ujvGpa63*DUs=}t!vd3Q%*>{AXa)sKP{-R7NLL4-n#>#Ql&uqTwkX|dy z9#5trr7ZaC3L`B_g9AF%^Hds!yG(BD2&J2VX7i$vpm%8Ef44kBB8?gcJTl- zc8p-oVT@}xl^H{tP~uXRoxkwS>JkfOS+tuv8NGiJ`Fh>zoIK}?9@2eNREql;fW?8` zmnSXCi)SyXTs-;$1ZTgPrbQq?3v(q9a{iR>d`TCg>GroM>oiMyM?_~fq>>|UdF{0y zl%M>N7kfO<%=xsF;E?=<^c~bY`Qyz9JH$SH!9v~ltLwBm-O2CUd#DN7{y=gSXwRy_ zVM8S6S2+$m99=Dw-Mf{7N-IfBIU2Y&2GN1R+mRNHz4SvN9nv~{IFYIzD{a{L!lQ25 zPL^ZYlu&;R8x!h|T`ybMv80R2Z-TaCc6G>^M-1(0NPJ7TklN2Z*qiQI8Q}+hKfl!E zilUwIe2ZNDWfc$nFPKdH7_CwjQls3j6>M0m2uQC`ldiO^ku&oB(j>nf{_vIKPGK`l zB649ZiQInSPUJ4sY1}v3)psNv)H7D*j@BBU>G(Te@!Nm!EJ{;L%Yq=nj_){8@(&e9 z*ucM^M=Z^6P>$aMdxe)E2BK)}&A;rnF`ldCF7>pw-i>E3R=tyh325Ku)g!ouS=iy3 zt%D<;V;H$<2jlmuxvllnDW-Y><8Iks-lk+WR5AQnQO^`=07-X5N3gys53GuOt03o^ zru?3-(ZUGh=hwWju>7}46$-u^BpzF&#vaFQT{B?hYvO0^w$i4= zy~*%tiOVoWex?c`1oFFkW^S7y z@9{8H66GHd{E$Y(O^dz9hAM~OgiUJf$AZ;TM@ML2pMiXg*XNb+4C+{QY6iz6YH3UN z(lRpEFE|I&E5kQg2*2Ua!>n>Ka%nj;JXVCave5l&%bw4IP^)(0$y(xvHJPD|OFK&4 zF6=*iMf~gh>X0pBuOcjA6{NH}@=k)yU$1#%pO%lL| zGj7_j>jMCY^sWVB*}q=&-#GdIw-B-JJw#o=?iv7?FmD0Upj$4H82)vs?Je7T0GN96 zXEyWtEd*Y}&;v-8f8q5=GLOA@7=T&%H+e^rtGoZX%#=T=*%buovjzsBl}8i9M;DI| z3FgcRR0^6XUi>Qca58}P0BpH1UFQWsP{|MCNxSP11g-K;TudV#100Ykhob>C86jkU zV@iiiv-lWgDkMj{S8_m6a?GPG6_2@HxD%t)H1)Qhrn*eK+a!c0WRp)ENjO=y3Kn|qsk zS$k_)`B)a>_UY{(8p+BNEz{4IC;SV0GL5Up2^pp&p9&SZ+Li@lB<|g&H9x>5bU`D| z1^8bXS7xk{Z6b!ZyK3gjUI=Kekl%_9PT=y**N}vTD~$Vn8W)$WZ1r>>MW<6Mb;Zw+ zCpfIU_uvk=-eHd!n-T;#pVee z#eYdsBj8d>D*=>gaXK`eTBeNxbVL_fWw)i&)h8!oIZIKKlA3WX7W=gyLfOwBrYo|m zyC2tJqH^Y%VeS?0TdoeeN0^e(8*tidcDpoZb3H#(obI2vGl-i0iuoYSfeX}A2%vnx z7U6AE%0(_+!CW!@^dzyqyT~eVZPT8$y<$1?Z~OVcZ~Fj$a&ykC=Ap{1A|-ZIYupVicsqeO52;~H~# zz?cBT$ar41d4!`M;+u$!U9&>RaK?x|BmAk^2>mBmki@8*`eTe5!7gC#thQ zLVkFwy374hE7NAHDMSMqKvqq3w^xhp)%*E42CrBFX+HMr8P zH0MoeaL#P8laix1z;hIa3qWhxqpQ#UFhh$i3HxDcC2Iy?%+iKBiwIW4Z>URKvtW(> zJHyh6XMNkVHf{ypnn&dVoNHwLe)w>-HjMF0>ZRQb>M^o(QLPAqRGGEz;V~%8vb-?N zEgu-Om^#p08nLa!iFFL2Uc|*pm;@>!B4%f83*^9$XKN$P!hJg&Pj+BFGP%16=VqZ{l1TT`I=Qqm|6RKxu4qp+_1H#!;M#+K^K)w zT*z7GPx7XR{t6v(#B<>WL(Vv3y$iZ(?;9YVj;z1Rmc(DP`lg0v3n=iRAwgSX`@USi zk=Rj9`gy2WtzLr`tC`wC8Hu$&iB%YsX?VBRi0dDmg?;T)X%tDR{lU;K5^5t>fOu8Lu*v-izP4V20G}u2DIhj;@+hc}ETfgL%IkEQry-qw- zVQ!u61HY=0`f%54!7U~DBug$fsEphitB7#kF-$kf*^d}O_8(>(m~igP>+5D#J10g9 zk1B?#x9tZ6IYySMu#C_c<>}kndN37TMEgp$D!-1?JjfuY+C^%g-+VGNY!eZ%@M>pP z>mHi~bqpQ+VMxGojlR_sl2JQl2czVWarOk+g>>%TZWg>fk@~T4O1JLUS$rfnB6xX& z#n`9$`v;!=OHP?N=HcR*$Rg9H!4w)~KzBq`);SDS&ahkj*zNe~TAMbkgx)Jbsod0- zH&X58?+#x>S=?qoW^_jE_cSqUo(`3k4k>f>7U>!yoU31llNGFHZT)X*>m2>z;>xhd z3=C{@IUB8H@3B3kxog_+ zz1}2c03zcUOab4vbHx(%{PExRgqZjv;EkDKN<-IYqA+}{_2bUs*j-S9m`2_PZ$X$nBsp-cETD+KJ3MXm!c_7r z?!>8K@oNaf*{V(*TVUnaZW8RsI%V_$iq@9E7FpqTSd}S3e&CT(%l%ZwjMxxkTD$8} z54IjnN-my5PqK0@pWV;6L85N8gA+N&O5R`@@w86CEXy)T15*LD;Wsv_(1C;_CA(W= z(_f-H`s6Z&BOW)@H=V`-={1j*0P|NeZXq<|fuCENXc~oGG<*DWmKO|jNJ3twwJH)4 zMlqEtoU0QGCQ|Pzj3-Ugow=U3^DS>FJmtaqBxXR_RMA@#R|JX?@G+s*pR-XvSH+B^ zr^jBK(2JYDV#|nZ>S3!``|_c_Fk)yrl-S2x@Z-GqjbCN%2y(MM(K!?S1dA^3 zY?1D#6D8q$lm=oCPel9lli!5GZ+FMOjqNZi@S{Rh2)G#C32&arGM92l_2)$P8+|W5 zLX`4Y)*HP*Xb_?xCAR|g24_8PiR+h)6{RN?C;GTZk87>i7|1UgJ=FP0qh)?dp-n}~ z7^2NgUNq>I9L+g770P%eYcQ|s$>prEC4dWL2p08AoLv6biDyV7p<)5NO&{FjZanMG zgWl2m*rxhGH!(G)JfZfz(8y9M>B*~YjEft@d!1!3Jho#2Eel=uvFi_J(NB(5h&?>a zU<@O^=Q3)_y5W$OUL;s{!gk~1V|*NAoms$k!NI*7JrkPfEpZGcQC&e@8QSao)y~;j zymK^w;CKO@A3PeFJ21D!98f*bCr}e_Ir{x;`O=MG_@Kw*@$2dCj z+D@>BcRW}LODi}2Ij3p3)K9Q_;aNPgx-QH`+Te69caWa`fa z!S=0w_iO)r_TN^k{#%&!-^yG62X5%2%@>sc=+75_ejO542GSKe{d%gjfAE4(x^0np zq9$cl_O}g_z{w((Ey3y6n<1ER-%?B}fOW-7Dw2QaiLMxLworoaYW*4>QdKY+adS=t zpflEJ557UP7vlVSO8;_Z{(F%QAb;zgFSMN^?;ZzY_6qcr3dRCVuZUIS!FD^7UgGyv zwShvwbly<@*k+5S0H5R-qt)LbC#M6>0ciHcb}NmjW&H!A@dY8o-|$@=(DmTIJEDNs zfHepCW4AOEOio&80D_vuQvyd{YS~aD9R}L0=$+fs0+9KyucuT!uH|tLh0rw(44a-6 zuMK++3~;p7Ldgi+tP47nm=iowxC2b0LRS_+3s0tJ73m8Bri$_o%0~gzH*Y%Ee_yTP5AikA`J2zmV?L4-Q+M|$n z<}843d{0Qb?^s3Qbnu7B%-GjgJG zR}MA&d**{Z$p)G@~j5 zuKd?i;YqQkFw?8qx_fDM0&n;Es z=%Xywm^s3OnUF#v00qwRibwO@{B?W!*R5l?SG>5SN$@Eb@@tU2zph&Lr|j`+A7YVu zNkJHz-&;h;h>y9BqK#g$dn{)f_FFPOmnvE4QFhZ)&066)aK8shQjfDc@$%yQfK6IB zv(SuCn2jq*-}(YC8}_l>%ukOUK8qGA%4LdhCJ~yFZbj7dP(Q48XI-iSquhlvx`ETXJ-2RkhMlXb%=09@ z-7%%S@ZXX~j9|uZ@>k;SNDANllpu3rtCS2Mmr$|4fI$cwZ`g>1WXj=sFVoUUMg{35 zR+C~iFT@YTOMob@g#*&_%EY2NVJT^sF(z)!E6)l8Gpg65Urhk)PMiV6KHPc0Bp}hh zV0nH9886P)7C6X6mljq`JeR*c@udGC;YSZ!-_JuH z%he9S{woUiKhg4wtTRiWuzlNR|BRc@SKG~gn3Z~mP*a@OM-!HI3!g66X%KTd84c)e<7TI1&-(L-@06jS(oEmD z1ilqS50lEVSok9{I^$FOcJ!y4$G1>aF#|ylRG+rq>sf=c{T1&ae-Ow`M+DVf=8u}t z6$2?hxQ#vRlxr1mz%bQawQbc|JzH$~E{QGz4twwn7vGonFHaY|%v*VhRC4$6@8G+v z#kFsN3H;-elYdzG+Hn{ATiAbw5Gt>F%+qSe(AGVYGZQAwA<9j(bu{_j;S_55;auu znxJ7eKtH>i$?XbK7E6m>#nFotyK3p9c#Y197j(->?e8R)urZ{sSF5)b{DhY>WiM-T z8NPjc^L6@7zCTP2DJyh*$pIAY=0K8!9xI%M#Op&u}A4X#gS9KiIQ(mSnsF|WZmwL5W_ne5G0(-^f;vZk*jddH5bB6ttR43h=z zoskpWE3F84|ptSDXjYzIXMWoF8AymT3Idw=LW$XM&5*=zbwUP%^1B z?g>w#yMfRsPMsJ0!Rv(+GcqpNlS2yqF-fz&Hp?_|Ri+%67K@pL7RuWN-8?PKsCe*6 zIxqI`4FCt!Jb?ca*M@Cg2PD#5g$P{lOxr0F)+vi7@`Y@mRW9N~Hb6WfICM+U^p0bO zyxZT`bpXkcm(PwrExKD*_7F9ZV0M99<-R zgk8A1cZLu^b7{Z<5f=ag>n%uwLpossli9Ou!r#dm1tjOSGQQIc1mvCOe0DYF-ptdI-4y5P^hUK-fqQr*5EOQXtzaOf_PS=u)70D2C3h*e8OrpJy7T2E(v&sz@t-?nR{!D#~oO}DbQN$jQ zmn-_MX@%newOLMV%^=ZPWi;mbM{l*Ko?7Fjsy}Hkcli%el$WFAQ*_1 zQS!9Rh8V1H=cMpU_c~f2;fL90Octz@-nO7Eml}~f!!>?uhy%?2sZdEKZ7D(_)4IZw&a}3yc}<}(lbWvRuZ|-a zr~Z`PPGR9pkvi(eGGVnJ$W)iMUI#qU&zhVoI{BVdbah949pN0&SZ3ItS|>7867dp@ zcB^iyqCP*#rYTpXzk0=?E6Yy+!P*y}&#<$sS2unxYAmzgl)cYlrXojCi`go(Mr3yZ zq3LU)cEO?zS|vyfT{IS>tVdU$S>UoiByPsjOjisk-QefJto=+tj;ZHPx*Nle3{liK;Vp5hj6A zC6)}Nhhow)v3u1vi+2|zXvQ|~$&@5<5u?hVMzLE7_Rwa@7-mhOP%M5unmJ)|Viz z{Z$Z=(-~_}hcvSB$JzwcyhcwHD-wzNDy zh~%rF!?X4BPR*4Px3-Q8oa!c#Oua@`YA>oi9X8vG5Z6YTCcRkJFuSSx`%z?qtb)84 zD4b^eqdm6Rq4e>Q+t#x(wut$avU982wp+$${nWM-ytrQ#p=~;w$}Dd$jBPi!^0*oo zn(z}CYz=ryEQ@SwW<$~I7bG0ryn^=w2Fw^w_#R%`IBC$ivZoLW!j?OR zFWjGjeb7c3Y!uKKD;+r$P3Q1s)O*;!adYEdE<+o5F`9E=-d5MfO^`OROmj!7K1?n# zmZf(ixV+qWJdHJ_rY=iITuN%*RE(fYMWe-{>N!%HZ@%28@=#e6rkNFP)Z3W_)2|6X zXyh;Ypvs;zi$v@c^a}!I3EusFlm7AhOT&&Hi+#s4jK9kKB^sf;38vAi!b3}~UwLWo zV6}KSKl(nBYj0rSVJ@!sXzyd_hTb3AGH1e+U6igcb4GRW9N1`T1hxnhl-0JqXU#F) zV}--TGe`PSJdIe4*bS@nwMO=Oq;IKVfkOPA+}<#(hp2~E4OV@a-EzI_qu@TL_|$B` z(GZ&PWJ#dCchtz$yX)AzEoF`x8yRx&Xl>bGOyFG3^sagR+EG~l*iR2I=y%rK-VOK1 za|V`Ap=~#y1MXW!ru$)?`$iX4VvpMU2nF!{RY?o1N&ehrXky#*se3QaniuH|*}QmM z-~hc1%Gtbt5vA$!%AV!XMAvGCXygVr{fMTopWQ<$n@lyecFtwjE0Ve+QiHEm6&WM!t` zDq}a-Fa@g<`&@x#J@wp*%^m^5%kd*^iyIGY>4k9?fic*fR(qoy4$XK~x(STV zeRZE;W6j~%a1Q5f(f5{tEEjJ$Q3Finu098YT20rbY_Vx1mv&1Yv2dOR)T6eI z=(?HCvNw5voJXR2qXW6I;;(-cU9D-6$4wvg-AUW0eY&Y6C@H-(+tSH$GKN!ldQl0o zN$Q)yq(+)mU7zIYP@IPbX0~27dNokcTzEDIUVVG3Vbdm|I*RHx?j9phDI+a4wx6?d z>?rz3H_>>8Xa+@=wprtXtBp4THH=n7ud6K+aylhrqMSDgNk0ty0KtuFQAxV-`|vQg z%iMxUW3rs43W?xP08MZpNa!0{4yTG6<$J+oRr z+iO_Coa-f)8b)kCk&q|u=Qy$No8yF-o|TcUU%XljoViZ4t|)u|QLlRIo2S?rcBEXDaOIi^hIXX07&ZoPBoEP5aCUVQOJBF*YfLC2h=tfd ztMm0jOp6#WYoatJ1c^{F(n+p)nK1(c=u5#llcM&Uge>{6{?swP1`_kGi=%?~At0D3{u4+b1wihU|7s;A1_KiDLD$E!fyb{ie`8 zhwKG+z*C^2$;*vkWNq=}UE&CN!ZYnK!~UVjwX ztbZQT5N-9{mMeKkccOa9lfoy6<3rG+`jeFJEw0fA?KCGoY^Zh z&D@dL*l7LKEYg`_|9Qc1h}2TXBoweypr%y0M`g=&xPs!GhdyTnQ7mA9`sLdwr;%66 z-J_%KW=%neHq=jNg-?PE+9fg}%oPt1%UkaZ&)(uFe0h{-a{+teqX(3HP&%_5%#UvS z`afD9zl5kz|1O;zc&$#j_>INmvT^WrCv^|KmEe75HECU2W41kI=#g*Ab9{%>h71cE zGf)gwmb0md5gq0f(dd8Pu~opBJvDM{-QY5F7AYgTggRv%arPkLt3;adYA}074L`JO3}q zAHU-L4a!z9*Z1wrE{l)C6#L5K{JYP0*NmE1<}NQE{h@I7PuG4R^lh9tLI#duSu=1X zA1)!K`B|!hEMkHPQq<21{czXHd>_?poGIL@$GX?cHNgJD<~K^C@h(PV650I=uy&J=*ilogR`q8LAxs zLil8xGX{Z%IIMaauS6HIg|k=N|2~;@Q1B`2%`2?|e(zKv8I4`@1c?BDylb&hR3z`C3U%oWT9-RgHtw?E{B+fs zhah=Az~Drr)C++X|8&V5-COMI{@=Y?GJa<@4e0ZK6_bQZkERtk9UVU!P?ty(puKP3 zwi@>`Z(VlLQ02>-;o}>{hAi%?nIDp5kqg)SzuinVo-S>ht@ty`7y*4@$^DAmNZc`U z>>G$g)NvcOwcaJGiq*^^$@Tjgv}Jd*oAeBa-LQSq=KD!oh=WPt(R-?57I`7Ria!Mn zxEh=YGF0w%@!=i-29{I|U!MmIXjMXW=Nb3&L^7e>cJ{AMel^lW*xOw0V6{XZ1oTyL z##c~vuff+oqBb|NGgw{sP5Y7n;?1Rkz}_Q4}b8y4iI2+d{VY^b1v98lD|6ZhC--? z*ma`_q5%UgbPW9<%Y1I9e57srZIVCMBJ}axRRR%>8y`@7n$!NA?gG9#Zt|Zgrf`>v zpH8s|Pn=(=xGbQpqx1cO@f`V1s}OEF(1E;G_giF*tZsBTYx|QoZV+S{%)F(4lF_W8dtc@ixPA3PQ{nhDmMe6N3&?*9Fi__O^jAeD8l{46&L6X-X^kI zDC1E~sPajMn12fsB5~I1ucoxKB2a-;xdR80=f>^i+!1Tw z0K&8$AOcy=P78CCl??EaEfUz*@K-uH>a+M>)pVuWqDM*?Jes#quxjK$75>@;aXU&% z<-D0;K|lIZk;u{DPpX1)L4AC?q_Dsppn~X?Iw}7XF(Xp=1lixDg?!7e<|}s~_=B@x zfnlReGYO;S=KP`#{5>LDPZir$XXcl+e^Xjh!344y;jV2|nT^F6$Fp$Q(YiLAw%l%l$U|#r{O;R>`1cx{D$c6`pc6^6|kB*cf34m1lT}gBsolpeDHgJHc-^*^uFz{EP9RGZS+npzWB*b z<-JcqH@xN$`<{Y$fa`(+{yv|>eIhW?JvB$()8O)7JOUm&I@$QAgQJC1)Kb6C(>FD{ zw-~RdTLN4^S`32qpByta!xu_-hryyVfm=f!H%0j-%mvVU6EOMg1K9lK~$4q6MFb@gES++R*RSE}v+!_NMR_KSUYQz-MrLOAPA=yxd0 zF{9Zok_W+)pUrN^@5CUHh-<6!0$M0AdHJG%(`KDKbBg5!y?cHR2i|Jw{qbOInd)FfSAQTc!)_ zdkm8%siY?XfeH9<16aQnz=OMWxn9hlWlkXRE(7f;+($n(n=Qu@$-^Q*I7`I!o+akz7cGhBo*mhc!4|kxMJUTq4K&h;A*|pNK}CTl8-`mR~Bz)9`&~9?9#&y z+7in9f=9>M0*CCY1Ck68a=@gygwHE;Vuk6L|&tL#r(gE)kPa z0TqfL&1FA|sgqQaPke1@uGpUrlHto#XnzJAT<(%z?S_$TqUsomLH+wB*NG4 z2@Vd2#6fQitDr!^EW9E>I||~ zE(ftCtcS5N7=cimnm|v(Ngu`YtI7;wKhZ;X_Y&$=ma-rS&458MVG}EOV?Yz9&VOo~ zfq`HJ?!23Our%@kE7L)y>|LElCm8~?bb{c#yQg7K+`j(Q&!Ip~(ruTzmAR0_e*!_~ z@ot&U?)M$=?Zqw2+ro(zvCYsADDdCCc6OwS?mAvaE6THg0N9J4OrX;e0^w;83RQz$f zAxHdW-fxfz(yq17Fl%tMnn9AWgZ0e8S6JQe^0DQtit<^zl z2LI0w3_%X(>1mS_*-PzbYC7xUL{jrq3VO zEY^E?jqXROWzKVV;L^f);5VOu0u|eQQSBiWcOI8hxB|(0-f1WHuTjgdY2DJp+qG;o`>SUQ^!``PD#C`6LX}>vyg;oO)FN}a1X|ZpZmN6y2 z&1vW)%<64SFfqrD-y`H`irarN?liGOTnHT;9>;5CaLH2}IGl|5F` z>CLW(<};5&NIU-(Q1}g0p)ZQ0l8yI)jzwKFsvakc*Z&!CsO{mFO)lKMYuHo;YYIqo z_US+Md^k{rqj)eMmV5uSR6zOJ0cFwBu_L*CmcKT~5bMdjAm-CLB1qG3 z&aGRlINXm=D*$r@Sxb)nz-1PDJC(sWLW}b#(N3K(FtECvrzs!r5u#An1x!zT%x}BI z1M!YWWf!6%HRf1ze0LQ9;4R)b=JP55WOY&iHnFZCVj|(){{wAweK{W_MvLZgCHMW5m^bPRyT)Z}{h6gFTL3v=^N!fjX zqnFcSnD`rF1GoR5&FjxP|IX{b0c!cRVln z3!(tJW?f%r4W^V~=#Pf_$6yq_G94elKR%qA8?kWDz9L?jtxx!e+RU#l%1-87oAB}1 zmZLS5qY@8Y;ItOq1Bh2V{PU|zXEKCp+5YZZ0f2a_4vwDfjQ^Q2FBQsTdBy!-A$ec? z%%1736u^YUW8uwk!JT*cLH6Y4r^-7v%Rs|sk)7r*kQ}U=iB#2XB4LE!!>VVLF{t~R z0Lqzh-RgK zj5WQ?s@%6`pKM=zAJ4}txkTCtSF7)!5?I{wI1{`C#qDYs%GmxAQBY;7E^B+(gLeMw zqlO4*I1cc{5wBNi<8s+Y-BCA(>qhlftMjEC{q4^vp#@GF^VJf2Ck>QFA7$poAnR){SGF^Rjz*H}M>*ocTAHzH zrM~w+c!%;J5>dpbpP@N)oX&Mxrq7Bcy48KUOopRv{FGK!Q`e{nMmTUxu89uN0>s}2 zyzT<8Nc&k8J0Zal{)sawuR9XfsouZWvNbWK&#Ae&hpueP(O2rr1t{= zBD%`EBdLNlVGpaBv_Hm{Wq92JJ+#!ay<7bC>6c-t-0R;jH=~@PnXkE2I=>NfU_J8tsS^jSx{r|5_$(1-vSq~LGnG1G32w0+O`I=WYeMC7Jr>wN& z#!r&pQ9MZ6iIRUPf#k|-W8&%a(ArcFN{CAHo{vpsV-Li>`=Ir=3(!O>V}~DjUKbX^ z^-s-b2d#|aSD8G~e7lSD<&KHkFx~c{%?y<$l%{)loeg{)Ekh=3O%#%;qK2W@sTtgIo;3Zimk`J2{MZgYnNM1a zfPV2YClwSYO8iyjeid(#Ctu8rs3~*`Um8xybMY~A-ZFjF4JlF9l%b2vbyp2J9L|7; z$1ws$i)GqV{N3q=jMaaf7mBQkCojUPEjIn{Zt#E%fphEq{9d2}u~K1RRnev>O~Z|= z*=aFQDFLkF;k=WkCI~4&k}p5xes`1OD*V~50is5piurkF_9zq)X|vV3sEs1TWFRc> z;uN%aWOz?%JJG2ZNTZ0H>6PL_QdI$u>Bm|^BD^!LYJbctS)%cFw)taok~GT`(ufty zo>&CvjigKV*0YDUC2dtwYT<7e&gb=+^boVt*p~N&mTX?ku`W&Pl^P@KEsF97Z4G}sR}Q78rx#=o{TBH;@kg=yEl)A`u+F+D@93E zk|d-oAxoBIFS2Es?AdohDEl^qm{b^J9s4@AMAqy|g&||jZc-RyUj`Xw{I2Q!`JD6l ze!l12&N;W=xt(+S{r>TX<>fW6*Y&)v=k>hqkH<6Pz0>{L__-2@K871N|8Syg48y*~+iJWOa>5i3>Pa)RYU1!hd-5_*r zB^HdSNq?@m&!VV2721$6RVK7L=&OafEHU|LTntljab-KVPyR`T#`<<*lA!PnsPh_> zi4ajT(N}21_pspMt$eviHUpd@?9I>8fSreUtm9o**WWpa{7^8`=L@^n^WX7fx7G#y zeMX*%c5cZ**7x$7=#CPoj?@J7rika3cylFKM~W_&!Xy_s&+wjEVL|LH8YD0WoR#kE=aS8nAoAmocU)X)1oFcrXP(9kc6ftJrkPsZDwHg*v*+OxRzaFsFl+7+Sg0@!02;?QCb z+??)Nm>ZMQ)D^ndJAZ$kT2hr>)S^s`D7I$Lh5|a9(oAoqHrZxY=iWVb?qZMyjvjci zurC>usVZRR7W=YB3QUN$sqaa$Me^-*X))0=A`1q@k+YG5@(iaWhR4?%f+3OMkVDVl zh_N_$rbxy4uF)59drQIRxxhJjFTCMC=L$<^v1od^K{7Nz|LStEY08VFrtCD4ba`X( z1+qQYWnb>ZcR5rxi=Al0kAR*7 zsUVr7YHCl2Cg?yp?GR=NE-*d3RUqUk6zdEJWaFID%E=W%;)XEtLxx{wNDH8ZeKQVhH}s9KlKEQYo$eUC)y-mgn;3h%7AFayN5J(PEo5PKu@`PC%AY7M z7yDg(on<JfAwJaI5MBA_d3-0-WVeff}}g*cPZOdc|nL^+wj=p->stY$KXmhXb2Y$;@$N%7k4n2F=m#G3+8&L1ndg*a~L zN0eBKX)66>T`|7a7aZAe{-{y76rL|U32)|zb7*LyH)63NUc=w6`(vWO`Rrpft0amj zh+r(@kdlH*HK2&1&rmic={HbwWZ?7@toN=95+q+U9t_7CZrb)$z1m~=Iw=GN{1W2g zM^NdSnDtA`y6a?2JnA`)KdtaRh<7;6#QhqFmV;+nQ;SS$>%tbtn|gC1-Gb~*F7-N2 zuoJyATN^_Bq?Z}L3F@>`!uTxDT$8q2Qa$THEQ1A=*ZK!JS&S?O?Z~ouKCkYzbMyy< z2;|o3%lc2U(bW(Il6YgD*--*n$?7VDmGE9)SSX3vfRG=z$7ko##c+G7;R@WmOj*Ci z-jIc->n@RNFB|7&-P!}k6giJXbdFeLKt|m=g(Tr45#)O1ph8UzA!RI^qPzc z#hNdB6wFP_MxWKp^XZL{77LJzVsE?mTP+L&!aQ7Q$3~_vOSbne4$dV8m(MH6BD{Wr z7lf9on=?)?mFfmIMViQq=quEddYPO4*`7DGsNC4ws{0h=bh6IQ>Msa*cyQ50_B~ob zBGiEWFk%3CXu)?+%FNPSeilndK=qs#!epAjMCV4fTvsAjTaTH z)!hR>WDK1=Uu( zJdphPyQD^XsS}D>a$<6`{knSLM<5xJ&G1KWJ)ieC_vL@glG!iivG_<)`(?4H66D?Y zXQCW2f`u1g4+c(tT7r3D1m{19zsOL6-jNsBOrJ}%RnA3oCU3$G?0$~?26v}7_pl|)RzAE|=2en0a38czxhALiD?)5I<(yBw)^n;E6EDo%J0YP}TIN1oc-NY2h2 z6H$n;J5nsAF!H%fJW^e5pZAthkG{b3=7--;Fg809t~O30*+rsG+d6R}4z7ONzc4QF z$-l0eAlT!&R<)xG?r;9JN-f-DJ4=H`UHS}47}myEukekJq2p1=TUGW|K1aVpLAnkF zLGKqmuArBRbXajKbJt3lq_xyXOLo^qB|0EwPpRrd%{1MpE^H#f zR1w-;7MsAa=OScf=16z3Vd1&C8N9-kbSs2&mvtXQy;<2WYxyhc&lZ)BsVZkU-{a{0 zEj?e4hQDSde@@g;8r@@rrK4QzH?=zU#+8IjyZJs`yhRWZ?K-<9vK0!DV!+0{b)(05 z5d;aydo@3$me2H@zp@A=iyLBsPgRd_(-N+TJ{SKE#M3RlLj40FBJ+`~cP`0m9k;)@ za$1MYf;f34Ki~&L?BCxeJ%fGbl|%*d)Y9ovOMBT@=v{L~}nwDQxK#D9o9aF*y}# z24;yEF`9P0FiQo~sKkp~u}E{ziNbDGEz352pzXP*5i6wuNo>cqU0L*g{aYLPTVTxo zq*$L|)%I|__;a6kl{U3^rP$zUvdeOLi!`=Ec`4EK=D9xu9jwd)HZweu-bK6&s_PU(leMGMn|IfEus6JkoP(?OgeON`_t|O;*HW@Ql z&sv|#wDffDe00t0&aXHfCYu!4twO{J+CCBD z$A$k4iXPHe29mW-#dBqx0Yw}bJeH1w5Npmgr3=DZWF^>!fiG^4Y*5xB zESUxU3^mTin)N*pCj%QHC8a3V^Oc{DIQYSK$m8q3U5Ix3pxkk&qvJa}lE4ww-V)@p z@!TeJVg_cJ3JT#j3P<#fXIy1vwPLn9<*Nt<yDHrw|kCOqX*#|D!pK5kfc{JN7yli+0s z%46#{OL12jB&K^vHwq%?`9>JUAnCHCJO$_<4N4aM9}P-Cif(qQ=%SQ{Z0Wr~k78EC zsFu^3;qJlwgW;+~!n(8Sm;`pv!ut9y=Xw9=2NH|2+G@y>+AA(~M;hjM>`LBhYm|`k z%TL~tn4*&>8A}`Gy+h%$u^iL`m9L&+0Xw(@K1H8q)tY6c=)_t|{pR>q=ps(M3N zG%S-2)6niP*czKE^j5zpC3T#^PGy_pIs48~wRKwcV7u2J)iMd4? z+S_BfdP~l|EyjctF;{nMcEfUy$ZW%&Cw$k%C`p7^)2=Y|^q9L!j%rFMlGjM5^l8oN zd1CDSvPZtp3omJ%|i0L|z zEb^sX1`Ru=aj_)zMb65LBpe2nnp6t?U16py^TLSLabCV@+~^)DTTU{^&7}2|H+DfG zwknS*Uf<73&;*5Uz&WAWRwUZb9vm1P$#7bp;{V}xGSg#K>8XU+@`v3Tjpu3&;)Xc( z!-{0^Tq>}bcdd3-egO{i;?%=WUeO!dUwTbjDebNZW9QHFaIAETF7tcfN=u^FE%F&^ zOZ9))c!|Jt>iXQWcr>t{Nj@L4dTQgX`Q=irgRA2}egX(c0}T7q#K3A&i}Du^x!QNw zTtcxw@jz#TPR?mr4);+_)q&{oyb1fz{gbTfrjXX@$32Xmei!v6BE(ff2F_r@7SoSm z@k+R$!VH+Ar4V#SrI+CNkdvIs+peLkh@87IblyA@p@|U5Ex9nj>CBuU*3=DehFJza zb^k=sm9&dh(+nCNXEhd-Q2%xIKqNn}8Jpyv#px%#CO9~|2;ARRp+y&oI3~O^vmDu4 zIPItP)%HP0xXf(>6Ymf4aYc`~g^3~;Ypxs44xp5Es+5~Qx5uRLGF}Y$UQJ3YV5Mr* zRLde?H*se6e53WG2f4SOdk@y5F!_T0aJu=?F45*?Nvw?t+MK7D`F(jO7n2Gtn~|83 z(QfTf&qAD4Hz{j(x$bfIN+NwXNMM_G{b+XTT+rJ-(O!8XO@S0`O*k28O@4{bz_*)t z^-jpI5DGDiM0TNm`4H_KL;OpHiJ8DpnYN0@@nV zObQf%DoYz3kj^O_$HIDsZGBy{X!#b>O(jRg4@H8CE=FPs%ghPC16lrj^g?tnNhPP` z!gq2?j$6OT#V3VW=ZghO?tIm|50N70=w)n{pS~{PUCgw4)X>Mfhtjt)p=E+~M$$Jaq6yci zfDs@HYLvuOW-FDnH`W>P5ojKw3Pk9Rx(qAvLTCd}R1v{7wurqvYrmkY|E5eNEz`0c zF6g0jgKjs6X3(7v%K!U5Vw0kkQN_JzzD)*NqWQ{SfcH1v=N~fp>mBFBY3SLv9>6sd z4cQ!4oqZ|F5lQVDjOF8Hxg|ror2&|fUd&=t3sx(TBCjexH_8mESB&(&r)nn8K5gYq zOZxhh&zCQch@v(_pRrD?9wM=Pdg(vvvTZ8aQ#D6skb~{F&h0#a0UM6zO|1K@=begS zCl+T!n*sw9>wKGWz{XS3hoTHgOaGfPB=bViu}HX$Uy$9@V$%9~smJBsfs%$fsiMyP zy{bV}>(S||unZ^7236TIpqc}L)x<(k#xJAEE(36ljOi6p=&Pgvv(q>ON9xHuRV zlZXBNR%oeQa(dz)!lpuJBuv+$nkRg>bgAbrhGw1;UE#}<9wM2&R>nWfyUWDqsGX!% zqpDVaZF%NQWn5~gN3>0UaMaboOwn6}{V{i87Xu{csmvr=R+nF0)qIXFHP=#dRJfPT z*aCLIj2gU~|BF&|c9#N5`)PQSav_>l(0}pF+H_88=#LDAruR-=+;nSCO+=+O^NZ+B zRZdV9b_;;S{ABl#w9L(YMJCM^>3~El)O6_zE>LJ2zIaM42OVyGx<-o@Dg)hau~~hT zpAIBs|E>hYS}jC5*XP!xox>wRQCA;VS-R!--Xs<4qMfvOnIjgj69((cQ|MC`1@s1k zt9L_du-3jGU*RKz`Ho)QuzRA;LD*@SsRh>O^ZkSnflZyp*VFE+P zB4M^DY}T;N;SjJ>N8N3I!MQeg_qJ=TAn%$5Ese?De3{hS|AotVO1r;L?H9E7v zglV2yM|MOn0{=Qc-m4HLyk|D!)B7&J5gg8gZ>XY#k5h+ia8Akp=c;JQg9C@#{Xo$H z@nRU*x_OwF^e>N$(xy}9(K3x}%J&i6^NgGA#y2j#jq3dKA= z864enk5{#{|J|CwU7N7~!U<1&!J_+qJGACvsiu}-30+i8D{fJ5xV+%;n`%9^zT6?zrcFM&18x@5;w432@Wv?``46Wo5~x1#XOQ+xtV%Vec&13&f*z`U=MqL zNCy+^A4N-z4zy-PyeadHQOqbOsN<~l(F+-TPj8^;E@~Z-iW+>x=?(ql)yeOKw+EdQ zq>@MVcfR;u-kWYedD$iWrp~Rw&Nc#ui|N$dt6D7XBg!qREOIFNvSNXmBupOZEDs?T zHjQ}Kyyg$@atXgMz(FW(yyx#)lu+7Ci=YhavB>a3`m%IaDfrz$^TkVut+!bb!}T2R zrpEJx76(v-0v=13l~;1L7SzCmuajRXYo*c#ef%pOU!Ki;pgRWM;`Rh@sF&EFFZqhT z$jaH}&5G|^;;t+G20?>ui;J$soz~lLhD*HzP-R*Q*FCRp$PLeY$n6>Kga`jvnPV>9 zLfF2IRYpj^2+gOMWleA8gFc`nK_wk@fvBzG$;{$DGZhFs|ius3TYM0-Pn_Ni!X~rbFtT&C9d* zb*c8FOQKbQmLa@j+^NoM!Xxi72HNTCa3r}>Jkr$2fLc@`;)%8Q292}c1!sO*zO80V z6s^QUAI$>m(Fr)mnduzp)&)m>>M;52yO;~VE$l@~ zq#ZXcdKD$ah@)43cu__4BpD3c!5Wo2co0X%TI=F#ZA4rpJQ_ymlyD^u{i$L~k)7`g zOlu!1rPR7zxUnnyCR5)<&#Wvkti+*Ld|p1EE^=2M$uCR_m3crjbindxLk$6P1j;9$ z3o5w|+mROLdwR-g8D}QF%r?Gqp`5ICI^v3VXIl}s&5B}Ay2{Xo@p+%8DAfCoNKI2C zq|Y!E@@e|KF2P_xO47MzjpIp^(SACMwuX?mX~VXLlKvP#I9)4zU=7|n!g@b=GX8HY$;$=6k z_n4y{rnGPQ3(}*oiQ_Kiq~5gyZ2;#NW(F)$%pCp|&ObcZ0_`US?SF&Z}%s_Gnd*E^-mbCh>kZ<$0A>b*+vi5q0s)qqk&nF!MI?QA( zvQkbx*1}WMC{uVfApNi?^sYX`9KiBgfO-HpZQ!*j5bJB<7B%^2bLhmHRc)|Ti1bKjct-xMPJPtr zSlP|Q@}P*M%$8Zk?7V_|0J{tWm@o%<9o9uP9klhWxFvkVG9-hOW3N*cMU<9<;^)Bc zCO=3FgJ*ye`y{u$G#&nQRb0zkA>eP)L6Hv-2AGKn#oi%AMOs7?7m=HGd!&UMuYq|2 znD21F4|!3y%093_Xxew`=-%KGw-bD{KSPVx2zC@71~7Xb_zgmj7zTd!$_&I;VXq4U z9I*n3VZc~wj#-Hp(b8uPR1x@Idte?!J~DR_aCajuJ2k~l8Ri4b^Tzw#dHkBpZfN1y z^A*70_YW+5&bZtCaK}CV?3G0Y)7>FGh}QO*03w)-$lZBd*Ah|ijG?o%+ehixL~r9k zX=P923{d{WP$1mW@|J+nL#MXT!zHIphJYku0uVE(Q8Oks-p}GB2|$ZWCCUJ-&rYFn z$FfK)V{I{q0J1I|1PT(M6bhI7+aMk50)teI!r~@d2Jb~MTTq7l2Lc$P$bSKG!C;>Y z!G8Fz2a)ssu?D<}2h?u?PLJ6#XoE59_kF-GFW5-1x5w?%L-gp2)SRCgIfzkD;fvF4yaVPS14VaP761| z8Eip_+!87P{g*QM!7~ZksmkJ(*;@x;hXi3)RyUn$k|v1_+8P952T)fq`XYpbtSN4C zg%s{>1pIHx)qRU0X1Di%OY%M9CU{0r(7!1o6+93;$Oaa`RnXW*5X4!?R72otw*f9O z^V;&@T12taoL(03LWTl)BNnplof%BTQw-IB`4o_$WKs-aT!BC*hejl_MpLH<3+mc-B-m=FNbu!xWkT^0Zx=RTW%K3p(3u(n2vTbmB ziXyK`1x3Ca$Ong>z_2@t(wit%sGQvC`YD-6(CTnzd47ST7yz$;eDANQRHsB` zF?rkaP-3`-f5LAr(WuCx-h+F%M$HhI?j(sCYXoP!aL!Reo1qWXPCvHulds}DlbfF8 zwN`~$lzi@n8T^(&Fk{I;Rz9b>Oieb80pPMM{$$;#O5hDAs04xAKz(O#;iXt2XV^xsC&4YERm@R}t#RF`8?kpHs zUm!t08TUS%FnVW}Lj)_Dcf(Bp=fC)GT=B1jfmuc!;YNcJmhoSy841Su2J;$sPlBmq zJ7X=#agiS|`ba>`0K4%$RSsx^I9Ou@vi2u&7XEXI)qi@f0bpJJjsNodjt>bw09q^o z=-4{wh?cZG+YV-bNBJ#e-E@G9vnyqsK|+XwfgHeBqm#L1J%YmWXIuvQB+5)dx%y;* z{IjuHR_t$Te79|^+zv%g_bd17wnr#I&vlqKONC z1I_=wLi)G=^9l+6)wpN!)o{*2^*tcayB)tSHyjL1swl_w*n@9au4upQVI$C>1Uw(6 zNV9qm`;u}c82O%tdLU{1q@5tiS2Ljy$cv_?K==^Be5N_D4sJ+$o2`jVT%rSEColRJ zT>jS*fB8QNms8d`m4995koi2Okm@|z5~-7$xrlKjP?_dpI zu!nOBtr4cbqe6CvLv~ED>HI*=3lwL!m9*RXyN}8mxQT(9MSdd?jonTgU=}^Hd87mv zOn&XW_w!vQ&QY`6e7xfiWNzSeZ91Q@Scp}a z`Mh9vwu}f(5F4(zA8UrlzfLK?< zFC9o`S1(TmOf-d#z1^;E7D*M{sjrKIR2~&M70ow7bBQJK>$}Q}Dy~w?VvZ52IcQ@W zSF~upu)*r%$y?B3L0`G^gc1;fls;`w#L_?8-}$khLm&B6ZFly0Z~g_oK{Z?gpMGF6 zImj}NBO#v;Kd5BC&3+piz-6$i)L`wKHjpfDAgMV~N_nx2V6FJ}^nCKn^EH_C2eg!y zMoG3O+XOg=z8qM$s1(Zb`+@gEPHw2Wlv0V=Og~aS(UEZcTKm%Zh*{nCRU*7a?{evz zSI!@tnxz5!hJOrj_c53~Pa=5#Q=M4#8H6KNNd0yb6CYZ_@#64Uj zf2szR3*UJ=OjXKurg0*nC7Z@_pUusr{JTe5Esy$ukfx=Zs?w{!v}6|AmD7-vH?{z!oP%A*5xRPSq25#MFA?2MUTo zQHTxHOn{J+1e)PV+57^Y!0GR%oYNDIw@1k+`vh_wZR}RZTvW56q`Sr2etylOIDPjI zIw|~TNNe>tc3NKx;-~0l;4~anSkZw`c~^R|>_(UQhkIAlt|or;+I#zy%afgf z_ZsIpR-D^0Driz-%UKcA6n`qpYFkv#*2~!g`COg;BPUQJU6+VpFj;hz294|3E9DUV*2*O= zA$eYQb?QV!^%DR>eXa9_=TA^R%#|k-3ecG&KQ8@f>ao6im~J{81}u{4#nv&O_pCTB z1YAVuNTiQBXDZgE_t69sKlSXLIKzJ%^d1GcVd|95yCVUIoFcQB=bJ3lRQn2JgYhc! zh48X|*Om=LdrfK0%aYn2{&p@FH4flV?AcJkQOfvLzkbh}>8PW=mRhLu)Yoz4664n@ z)blDE&F_*LQU!6$F-moUX}RM{$`)ZQE?*6^Utv@}QXrN@Xdsl1Xbym&6C6P4!>*x_^n0d@$fa$pyr${F;2~Q*qnC z_L*-`5vj_*o51T3bB(=n@Oc{SnjirJStnqIWuNZ9y25lSoKxH|&|y9>nr(K3M)S+l zYt~b=;XCQ6{})MDrWE1EqLJmL=C>U#VPzh9_Q+1H*S53vl4iFo^2LlkUeD2g)#8&{ zw+XUP#opy6I{m`$%pLvuRDNKiu4OM6#`%0$5NUzE9CP!t!(eFd=kL59ceDyja&)s_ znQ#jtMUGZoIpJX2+w!oZ=v6)sL&>supz+jx>E5kux#;8RE3?Y^si9WNCJSGSit*W5 z(NaRg{B&c1R6Wzj%nB;_-h4iC*;C*Km~*{GNh<0lLYY|<&*aZkagGA9ikZ(zactFj z<5EWk>J=Z+-9#UDtRA%W&7#uz zy}m4}s2_SfA|<4&b~-%j8rPO#XFYO3!?+Yiy}5ZVQo^UcN4%CLX-}!}hIMh!bFwFL z3z~x`J*fodXXG8r8mKzgU-_>rA*yOGGfe8EnVf^CA619-K-7XA9yJ`^%xS$wCDfnw zo{lp!$5BWtF>%@V_ZaJCG3N!PUrAZf_2$#Z+GA~2ouhN#Tt4>wT4aNiX61e~qWYmM z?~;xav67lWp8con8GoDa8MG$EjY!#`{VGwKHqf?~7nsiijO;sm{Kx*Zys&j*P9^E! z$H3X!woc11TK-KgB~tZW00Je#l%(5XQZlz+7gtI-C~9qn_H>0NFY?rvGBHRNqM^6Z zYAo&0UX!i7hTbnVM;YRmD~s9LPpsP-8U-RXdXfTLu1hnD<)!4eUUW+57w}r}y&frp z)Pc&-ke^(+p)thPeO``%I&RnC#)urBS%F-j>?d&lcLKX!aB^3j7n zC2xBm5$Rz-Q(DL$P0)0t!>lG~(1$OIbyUeyE$wN02VY+cP|#pryyWxVM-Wx;9=(+&t65oB5PtiM zu_^4Q0>17g&DhZY|HhZ|?HJn=Sc~ zfLNhttF6A?Y5)h?OQW6(aWi0+mD}l_;TZT3ZkrHqZ|WY7ye*i!LJ^$BuVf(Riv9%; z?-d|TnOm$ng;^q6J@lEkFFXJ^Y;a~YNRO~#)6Esl0s26RU?eK?ueVJEY?-1z5 zk?}qj8$=!1hp3WS8L|8;;O55Q#WhS2q<6DcLTIcA)RJ?#y8q#`g=P}DQW z7&^!=(-l;343?So!-$z}mQ#_q&2dLx6@x4-qT-%us1}YUIkIA@B5QGfu5->z{hdNu{ecA{z(#7Y|Wkf0u!&TnO#O~_%G{exA7&=RkD5;bKbk7^7GRU z52Je4V%u2{YgwNj*Thw7E%-ng)c&o!ALz+tHj5WjIWBKGRSffs5`M9#33k9bGkYXp7 z5@^*%(>r!f1a^f4YnO;RZ3H8&R$e?hnBw8K`SiTwmsGoCEzY_y_@ceNNtm4#gU5$M z772r$Uye^+%KED)e~M)smbc!KIWRjT89G;lGTR9j^&ywbIIPjMoFIPdGM{rBI`4HC zd$lo7X)1ckJt2SYFMsj%mp$h`wO^1zE;@uRu0P6u@Jrv=+Ny?2j_1Pk&s#Zq@^eC{vBFyH>6ko zX|GUKXcgETs*i`x6tPoc!X^)3!t(cX(2DmpdM2~H7V3VsX>r=(4RLOyBEnVVi?PRD zvh9lIVUA3+Rzr)t3p9t$mjnhvITTRG1iQ{Z?m4eEdozLaQY}Zlds^^qYMGW3FJEYQ zWt-++%k;YIaOCv+YqnL50Xe>{I*6p#zLL7Pp<^)K>lj1!*Rtd`vG)o}abJroMMGM) zCYJ?eAzODGOjczaspn?KGCWkdWZ%|*-mN~XE*)O{GG4x3e<8l+ZfN|~mA`R>^v{FW zac;BDhCT0-HN@$8@86b>EjimR`-XGA9lT5SjHQ^wNzWl;_I9D~@08m>3zA{|$%2Cy z6=!|@R?0?O_+}sC2J|hv1g697$l@rmL2YJ-lWz>1`a{=;UZK-cW|kAurDD;3-P%(fh-bN;Pw{nxVQy}k!%uv_4AI_mcJZ+(})f=xP?;6H7Z_YZyw zlYf?z#>=%pRg==|8+dyQdgZP6`nGs31ZDGP1&P{1m`cx@?(Shif*Wd?rUnjU4}ZrN zqVfX3(FhW@rbk*ARg&t}Z?ye27yuka)*GdnQ_-(ZqsDQGazM%^f>tv6->fY|SyJM99=R#oPLemk#7TZox z1~(=8^Nbnh-gKAj#eJOzr`dGh@j7JQ@h7T=5c_zek@dV6|6&Ql9#UAs8O8tqvxLi! z3q8GU%c}L>skhChIlw7C{WmbX3Bddf6EUp!I6wo(A0c}$AS;!VAueHyt3<@KC zIh1DNeta=}ETGM-M617kRfT~)N~%5X6s}HaMS@?9;bS2Lg|5c8c25T$ejN9?rb)*# z%B=MVl$vXhGLIw#8q5VVu$b;56>H(|+Zi+s%jF+63dxmvDz4NO%pad?B6PkQyKu4` zViEsb$2)3=-zZ0Q^p>L_%*1W2WwMD??#GJ+pIO}HC)hOPH1pk>D{Fi`E2 zmWdkFk%f*9+O`kBp%&lP(AAMCggz9s@8sV&Z<}H$@=Jh?x zI1$}m?ZHbDD^K}0aG7T@;|1@>KQrWh<6`*&XMeQ4eAK93bz;p_|DfM?X+f{U zP1T&Fh0O#z1o?R>e}vb|@e^}&Yod1B;^dFvfs76gYN!&N6Tyo3%IbP)0guy_FpfyC z>fH&^HL>FmT(f;DXma{(yqRHG@v!Nd`ARN`ZhJjhIy*lioks`iK`Fhj=y|5nS!Ir| zxjvs?nT=Q9aIP&%_8UF7W%o%DlUmza>1At`d)%1+66IuZNk0G3j|FX zT9R`I7wH+}zw0O6F82Qa@RKH;N>kHi4_i~3Ur4VQ`KoYSp~uW;a{r;Ai)DmK>0fVE z+{3A4Ihg}dJW$f!W4!GTLcb3*p|*rDed^_*`JNev20mu@ix3OXzZ?8q1oIxyjrK!e%q z?n6yRg{Wbri`x}<<;)hNGj=TIKI*US$fhhl>k|&u*ru~*5*juz%rV1!AXl&|z9RSC zqc}*Hv+GumG&Hl8g0=@WkHOnSx5=lAdN3|L1maVD|GR;Zs{8r`+7{{w(VF-SWad#`!D3PRnML$ zZk?+hvc1OeVX?wqU*u^+ljxJ<6pQGp_DW&>k93%F3+|NSUFZG1ObxmG05{#DO{-Bw z*LX#&wq+PqLU_#qys5GS<=?B+~n+7 zNjJ~ncKfpK|HkVyMP>31WO$q+epc68y%$?c5pGf-=|fbD{7KiW|9x`Mo_8-+M>{dk zWS;|y4(Z(dPJW&Dx$iJA!xs@xWN@9cq+2~~?mu9@M}#PoBo!ZdEi}Cr+rMR%;}J+^ z1rnXBgUK1`7DNx3JNtyWlwD7awk|OgI&O6jrIf*hbS;_ek=YLcnzyzL0ldpb#0q%!7E%~hY zGNn1lutN8Vty%u$g+8ij!s}T1rcX;$fjwiVv7UV0+r8PTy?V{i%(%?vkZ~79!W_Ku z^76~1<88a*J3w0+mo{iBGWi0`|B~)bYlf0iw+iFnHtt_ZS>LZlcj|kCJ{4-G8#_^9 z9&UV>GBsQ*vAR@drG<6l{r9?oyyqSyONbY**?Cl9&i|6qqj zlz;A~Ip!I9`v=c+X=RUTf@46RJVE`4aV{;BffmAV@znI%-Q<}Xx1T+upBZ?H{ck)i z#=;lB`UD(6O@!>{>F`y#QxgZONowUZxs_~fjHUVVf&Y{_Z&Rau-owwgx^Em6o2 z;Fr#GFT`@c4bXaTPio^{y#pqQBw=~N zdULvUcNut9Pd&y6dE_mMm+a)ob`}*^?j_ML=#`&rFO@AyuCaM{Do{<1`rSN_YF17i zuEl;TwMxX(&4}qzj0yL~Zd$7{_4h}F=lANdp~2pMT25=-27YN3US}Mito0O3!h;2D zycKp-T(d%2NU4tUaOc*;b~d=zJ~%{z6<&fg6c5nFwwCDrC?1)U(y$JGwfIeyG8jCODkC?f8`6nOf7e}s7|zpY<>1v5>+#&jB|lc{2=E_5x?Fo z>&tPRTYDeRvZIY7_#@<#G+a2w2-cr~cVUgfZul7gvgmTPyW;}36sqs)*@w|5IAe#b zE=g!w7|@aoMe={<$YKMn&A;vpBjLrjBN`g!6do0oC|R)}yh|bYI)NM%6{#w~Tu=$_ za*O{K;ki!S{niH|4%#eAnEC@*&BWpF&Lh>k6}vl4VCzx^^eAD*(cIcM>Ln>op z+x~UDj|12*vY23MWan=Xwx|r|0z>X^!oOXYSlRab)}FjZs_vxo??gFzzqBZT@Enbn z2x{y390^*%N);X>He|y)8C|{e`r2=>WO7ngB^i6GZ%XwxD&;#Kt9K2M3g;Z^#dD2d z8s@E8R^u(nz%`}uej8o!gkoSKZlHeWBr3O{e4stgam{S_^B8jhx^1t3o&Qmhsv4wZ zOc;w#-x+sOwM{xnjS4aB;mVG4Mi;qR_40=|6Eeq4l95%9-87VyS@>|eD?o3L%rLA= zRUqlDrZmkL-p#t%>;pCfj{VCnqmB6!Nt8_QhAMk8sqJq0{Kn<&1<)0Y=*vLC^sN#FUcPHXv9HqKGP*c zT!qUU3)s^cgyoOB8v)VB*a?9h`Q}s>_{xZRE@XTwm+rj3x5}|4nUx$5C88XD*z5J= zQP5)@3!j-&^V74h8KWc>L$0yxo~=$rY0q;^%fnVQNjtkYB@DiPClwZSh%Gl;mN0`R zvZyoV^r-IAQ(GBdwWtbFiD0fbOZ1Wf$z6WH_=D45Fi#6^vMG#`{WPTE`0mYhO!;Ug2i4`{C>`;A?#k=aTFHutN?Yx%`bi{B3H-8-jyc65BY)+iBRW z%Z(IsT7^T7Lw=5S*@MDzEsFKEW=hMO7J`xcL7#9?)L-NfL+j>L5cO8Hdx-lVYzRZJ z&ys9C#BS~iar|y?%}h0HIhYex0D{@p{l-=eYiE-^Y-T`2@8MQn$gSa#dT_Q$F~bI( z-z+{n1*Zsoign;r5m5_x0vvELWgUp4SfMWYssMi2cX}THer0=YH1g}jr9m38kp1R5 zGAyKO*H`3lqZ_N$Jqga&K!;pO1H(@9$MwM^qP}I#U*KRFC{^uQ25+&>UL#?QBPY4# ze}81qPBsde?S>z2cO@4R>6~c0(8Hxhfi*Y*C;S+II6+%s`>aEEmp5FhUIGddlOro%Yi&cBy1h;So+ z2b5MFKn`(hP3~)!N#u#O=EOycQ>eXw7)EwWlXx)a+tL9)Tn#^z8m>V+%}?*iE4-PA z=8`D>D$fj?jhJWhmaAyLGRkU8Z)zS$6q01}qm zRjRO))7_W$MAcX0{7zo8wvbmD%t(zDvH%B7WjHMyUvBuuxAq|JuzCz-0A~J@RS#T zyLSKuqkU_?nge4e&P%pRc?0a$u@ih=V8D7X9k|A=Me)ha1ZXmVy*O8Z&n_?umrr7_ z1#a~6e?h$fot2O$_QxVJng9tKG8?Dba!6W(lzpQ(!IlD}dq4>`t+-NrorfrM2_SGN z|G9zUL2katn5-pF!UG76Vvh^Bbo3vRJ`0Q$;4i+rwJQX8;7&l&!{iB^(tj+m-IeP+ zzYPTpf{+{x224cBu#^$Ex-KOO#vHS_*(f*so!t9)6?n-1MrQ4?L4TgqA00iWPynG|&{!$}#JOjU2z*Xi!7|^9qLSD}JQFds843fbT43HZP%_{Cd!(D!y_DE8F0O z*PXjT*_f^XIFO?krTl zK9^J*un^t{4H*cGqUKZoi6`r`Tj3LSbgy}?2LIf)5*-x55td*}>Ekrgx2_90;$ zG#XHM1ieA;|Ho`##__@AemLV(g2xd^;soXR2fu1Z6dg}!fggp_Je1qrvdnMy6eb(d z1{Fr^c*PJ4&QtN>1d^|{`k{^H*97LTb2wx!O1^&($(5O~m3WX1NeklE8#c;)FuRAo zYv(JWH16_+?oG>s8XRgPapy^)@Mj}Muq*@1ZGUnyc=%!Ukf479>jrPMJMGLiq!uADg&JiYBk*5;CPHiZv( zfxBfafUcW!WX`p(rd!wXRq(xExyinErT1Pz%O9^-TRq7-zQ|Kt;!?P#r+%Ba>8cA0 zr>&mSdQ5AwPe^->>RXAj>&1QhR@xcFPu=&$19ECC@MJ1CN>&B}k00r2o4kXEy~h5^ zK>@y(^JFf}oT8K}^>U6;Yu5Wq^WSHGZk}YKT3fYZ&Ar3R{QH-js`W5`lNbE!((+er znblW;c^Gs$7Q_wviP{F*p;VW62| z?atUgNB;ewf2*@e%Q+e95a3eTvuOG)Hiz{a7Wcw-~u=i;D(RFx>lx8 zshwM10o!;bllta?7L(0nX-#wc3U~|g=h=%_ zZaw+F|I)$z%|M5%zW`p23~C7~X72GQ99az4i4RME#r zM}MuJekuWY2Ku~tE4_e=XzvSN7PtBPgZlKhxb`?6+Ao3t__ll5k+1q2=xq|3`c|u##R|bmR-GipIZm z-~qpvZdzCU5>n9+|Nh^f`BNnDqWh>)pqs5cj{^rNy_NRa@AzeJY6oU*vFgKk!-)&*e{mcl!X-#^w~@Vday=u+At`RN@hR?(niNM?rgpfXCYW h`IK!KFaPJ!fBBR>d%Qg#<-KG80#8>zmvv4FO#t{~cHRI0 literal 53778 zcmcG$1yEJ%`#(x-VABnoP6??^NC=1`0t$jH&89(+mPXukr_zF07)T=xn@&mTZjcZ} z5v1a1+2*d-g+CBBS8iUx!z+p-KQbeN|0Z?T)OW+fqiQ_+!ealfYLe%Hy` z-P6p~3eVZh&e2`m(aN1$MjS0JDJ?^2=!1vXA9r2t$~`ZWjas7A=NiLxr^f+@o8{?K z?R18`Y~?Xd$Ob|l9)jRt8baRYzS*t+{)eIohbCU=!6A=+t_{{qtg*CTwpC4EsasC} zJnf^UGi3NA>*AF3)amZMU90Xlq^T>Vi|&_}zWPxl=h9L&w0(Qz{T2ROcE)2nh+NMjjFn48FP& zbpP`MD{E`Iq`941OHpz0eB1ulW@ctv>)C|H8~tzED&1BlM=Bd$smF1?eDUJR@74a* zRa?)k7bR9*$>PRUMxP3lefM6890~aUTI_(|VfZwkd*I!T7gc^NJk6AiO3YhPQO-TB z0aX(DwEIHrCplNcwp-;pu0=7;IqZ6khl8MuH|N+Slkf%e{>;HR>|^k!2<^d4j9yTPThxm(LHr7;ps~?F15$ z|M>pVtylSPUt^lIjqKy`-yMS4G^@8<8-q!c1a7`A$Wr!oC6}0~4>*mx^e;S70G%P{ zgogE(=XWHl4osr#w2EtXIS1-g{JAM zda^!VQ5cC%kfJbK>U`17*tCdgJQ}oMWJZLrn;`E?3XF{EAa_1HPa%kr`rB!~f45qk zzJGow!OPp|&qr;PhI=k_d)~ADaO!dS)N*W_Qg~#fEAu}h3Kl8L;XM6`awpTT4lLqc zD?Kln25045X7>AXv!D8OB%V{lTk1+_GiDOLV+qw_+v@*!Doj*zAJ%UEJ?XRI0#lVo z--T+#p3M0FHD*Zd!V;3qf9$s$=YRG}Ll@g{xbRq5H`i^YN7-Wo)j;pF+sfwDCxFj% zBFD}BY|Ht#CPPx}r~9Aokse?5{V`Gyhqqe|i`}grLdKYfzW93~PG$a^U4zLzHFRGN zyhc8{c8ab*Jwy-*HD|YwP_$vW=GLDP(_C7aL_{s-QHk|8q>pV3iY0t^HOdQ_@XCq| zeUZ-2&hF*KC%^p0;s;6oDZ4FeOKHTicZ6qo&68TQk!z)h$1Jr(GB$BWtCgdu?zSyJ z8wyvpuB4e)pY3fmy}LR6pb?~gwh2g>GgSi%{2x0#HOcSx(7F)evJX|mvxz(#rgs9RKOgR0nD-%zu9XVa z#jVeWPW|D{Cu++2k@C$|RrQYA}|h?I-VdfJ!8B(OOlj#E{0>rn5ogEX3hR?M7YZ?|e;3KfKfBc4TQMhPJ#-L}kS z=dqM;S&$6~gZ9f={(ECxND4Zw+!rDbJs3i+J-aSMQdU7hO`SU!O36kyH}(&0+#!r6 zB_-91y`OI_jxLAM;V6@zi<2*iRw#H;>9mLyVM0yP3tF-JWMA^1)E{9`O?Ik3X5zY` zLD4#Wt^GbGwNt@udD3IzF|4=WR^10Ah$A4WC_010x_y4UI zT%T1I&Xh2%gSjy>O_1{j8o>0^!_BiXa=5p-`I0!0_%&H1k63sxDaBqir*e90$Ir>i zk`!EXb93La%E?aLkDbw@Ai5Qp>2uNV{>z^v`P?q;8SrU_0u4MUEs5zml;Z5E1 zJ6KA&s;b(jMZ7<5Utp%IgT2DohiTPpmUf(!Cy;QgJand{BDpNsFi=ySnxcm{5$O{yw}2PDilaNPrO(~+Fj>=7|AGNT@XD- z_;+J$7pBs9zk-BO5e~(^Xg`wwMeeB+4NYnSp9WoPRY3^N({HUYY*Phw#|%9QTXZAg zP@%rZ-%uLf1gw8sdR<-+@Hw)FW5eUeOYN@uE%(r=hO^<3b~|y-4_8!FJb%tWw~%;v_@sv_s;`O&IK9>2id~k<$3`v|MURaSx8L-4-fu9&CE6EI+gA-6{3JO_=>f)wA@Ui*n++o zmY?iqpH5b|yg4*L1~eBS-n*|298LS4^E=vU^JY%fFR?yek_b4fs9&p-1w4|HlF|8k zMdo^nmhJJ(CSG&jo zlx8QliF(d$t(!hWs83Stzra10Fy&;v?3Lh26Rkw1ZEGvU2|bU}srJuKY2T$#y_YCo2IbHqb%-$94UF_iJ=?bZo8H z+=i(FmwuxjL&hK!pPDKkaB_6GRqZrW=fA}!4vSC@ID;9qL zb|0WP-QQU#jiZDH{l-ef0>jCX=3Ux^nvxSYLL!kk*H2u^J`7s>o8BYzzwE*|?MTqe z-D%QWzRcq2UJC5>1twzjqh1dbE8o0aTP%m7M_>Q@n;Dr>nSvFH-oGpnq5ChGyqr^; zG2WfIIxk=I{d>n`XCHq)lhC0?_FQX7M&j3)L{QJFTT{Ytkn72X=7SrISgyOcA)1x-5aw(-Y+t5 z+0NObV-}BQliQl|oLTY&$RZhSOZqT8U}N|T8*z%zZGyWqzCUZvYBh-ZlC#HYTA^%4-{HlTpmzc~$D) zvuU{on34Ub?(?%fN6jXiXW5ZBItDOXcgz`M?SQ-%$&eFOKJzrggGt=T)-%B)3rS3~ zJV0K)Y73|Ks_dfJB1d&um@k=Ky@}Wz$$vG~%UyhV_rs=1< zQ5=ts%P+$IYF}yN3eaZmW-HN9eEV@8QAdYzk>=3Fdbzl`oUFPf2Ibw_UkQbJ?5z#1I0YQCIdaI| z5RRKl!)L)b{)54A)NAz>w9Hw#dJO@9o^RgyiR2Hu!1f^| zSTC)w?+j>GJuEP>bS3}n+&rpX$9NgzSbw|+&5P@j-{>dbPy(v16p4D6Hh}sZHgC~M z^p?yrC2*xj;xHLymtPG+XUmG^D@9VYTJV=N@ZSopLedd*IP~#-@>uQTL4Ws$y|N0yx<+%8XXIex8b^Xr6wb}DA-I;Q#CGsN-=5%GxW$2;fPW1tK| zjt~DXM8t9`18oyR@7u;!ZHY2V+w?TAr!h-oJM=^EN?Uz(n%S!B!KaF?W0iFXCpn$^ z`7~_6tL|&iM6I?lVtK3j=iYhTlCkI11gIPRCx7b&kBYT0@}~#A0X~1XHkUfn zEYJ6(Nr$;#zWi*3pBr`hZ=@di4Bh*Ph=k-#2mm?07}Yo0CWLZz|9*Uys6QIG`=y^y z72E$t!%z`P@#E6tahd825qX!!PGAg+tV5KnGU3%GX1vO;FDhO59EjuQw9Sw%=dbeo z`E>nD`NgR7E52v}G&?POPK)&ehJW99i`c_pyC1_aQVtDDJ$R-CZywQ4QmGMW@spx?!? zUTEavc|xsngwB1^MxE?zwwB3_&MZ)#lC!k5y!Fm&XWkl zURYaOYsZU;=1?5AeC4{-sW41#D&GcYvE_vr?G6X>$2IE+7 zbtR9@ajTRRy43M9d&L;~2JSSKqwT9bTQnB@V8Y~+3f&$Iy#&={VGFn_q{etda+h2+AQ#4?A0?)@UTE9 zXw@7zWFMm?9$$j;PyvO#+3M530jDWK4Fbb+ zx&i<0_P@UNO@j{|p2YW|a-hP+LM^?+#q^Y6TrTEsV0$8}>*PV>bkH2ytUUT=hHTDd zQL*Zp=Qs+kOOyJfi#5l46EH;GT-kZ~_yE24zf|;0O#a_rhc<9CXBNtUPI%dWQ|gaG zMjJa*ab9(ui`(;25(dly=)qjwaz9<6AT3wZBZk0;+$^8Sy{VCWxy&<;XvBCmOUYYG z+_g7LdCOM;jg@ry6A$+}ns7u6cDKw*jEyfTG(a`{6uj*!YyM z$jmQWKC7=gJvmfvx&(vGb|jyp$*gAI(bakQ3|!M{63@2`ywm!ok%6mVt>ACx{N?=d zZxKzZ5n;2K;a8fn)Tc*u*c=yKtoO=G&rk}M#JjXNF`}G_|NU^tZa~nmW$T7MKddg0 z2$T@H_u&?R-%Ye5fklAzGU<>@1C$frV*U5b;A;Hb1u?IS=f66P4T!suQEdIhl5iras60%4acE#HkEiJyaK!xdEt}sz zCZ%D2(^({34}QMua*K8W=E3etb^zyv8#iw7&Zk{`^6AjSaq$`^oZPO>Tda%RTv)XG zV6PkKr+3BPbaxpY>TL=x7Ju0zN;zBsW8u6 z=X?H4+4cOSzO?_!-z0~$8#s2>_MmP;!$e|4X}m19ql|*;d*>pe0H9S}=BaX4Vq%~h z^y7)mb17O_+$?YHv~w%Z$)AFNC*$41XrVs)g4$35@9QHVq}hFQiTZFYg6^DrVLdF; z-Y|ivX&t-nG1R$?{qV+}PK}Dz?_(l%N+GNl9xeLO_VP#&G!dF7U-Z~W9sEK_==ZBb zuy(p7hm39?#$jrLH!bRIcvlxWg?1_$yHfmkLKYg(rNfPq8!yg}9h#j@zF8H5pddGY zI~?P}(PuTC?Giwa?J1^D*XmA$Cu=~Giod_Fpi6@$*vmf}+7H29wKq}}_^ z3?fttggegZu>IN9{x`@oWSFt8h*0L=$)D`gBa-?!>JWgkDlq9_Ts!-j>tJ)rKpLEUGGYvf`jYc3UK1$=MJ80e z!35Cl-iNP4sku&8R8CopJrRi?T2w`RO4;>*v0WkF8~hF=YP$qfv*LYXtlxZuAdNJ; z+?%FGN;X;dt;w{tvMP8fC}kg+yZrzduZB_e_slhgF-w?ecQ=U5*MkgE1H26o_7&BN zt|NLI2H`uwTX`2FvKdoXS65*h<-n{}QY22y%F6nTLnncnWHIh-DWiG4l)chwFO@`u z@2qrA_|SEjqy3%C-<#Br-QGPK`jq|jpK$B|f|yxb?{1a5ozgx~lO{2x^kXi?RNO7% zfJJ>`6+je>?B;Qt$|eEFe{78VZo}0{YvhB%LPMVdgINCNHiQB&iGdc*<+qJL-gPA^zdN&grDXMFsQ2c z+hd>>=DgI-8w#mGYOAXguaJH^+h-Iko4xljc*3eaEK&>alyb2!PP{{N{tH%BvhT~Y z+vXQkp@fBnK@reF1O+vbBwQ6UqVQBcjwS8>y*4OuclpjOB2#tmM=qSYH*Y>!3}$NY zJ&>)#?&F6XJRY)Zvse3GcDtfL`PG}$)YPtwN9B{u;vYhG|1c=|yfq!if8MS2&USdM zeLB^wX3IA}K(FJ^&oNh330byMi;_h<^m)fYs?-%L!Y3c+FG$~O;M6@3j5#iSc3+07 zG;MuxBK{ldlh-l6YEN>=whBLbgjfRuGVL5P8aN!!5i4nT*?%-|6HQD$<(US)txDkb zI6NlicrJ_!Q0PKkPYm#BfLo?@K$rLb^F9BEPX52ji62U!BO)TQvNeT(y?VL6AfTtC zgUy`Xogvq|K4=pHJbd91LO@2Q6ed4FnnRF1{)8|ALv~$?BodI9uK>Yz?@JNX^vOm^ zZ?dTV>ygg0OSxE`UFr_duUg-~7iSipr>2gU**~m(05rKVN`xjA5F}K!8H|(IDpXNX zQ8qLYkZ~qQ;M!`_M4@=^49gt@_M5miTo+nnJ{ynz?cqg(SmU9s9X)k?UsG3CV-a}A z;2VuNpe^415d{ee2`(T6o68b_6fcM7W8REBl%0f^1@{Vs-46sS(8nLl zO7+F=*8Z-iDXjm3!lF|yJLQDgY>43TT zk3BzNu|~jCn9`S10+LEdLiPKI!0y5R_FU7SZ+&uN4`~_-L$+#mb+l%n2MxZz31h5p zZ7{b|4da~Wu|C4f&u`iJTv)(M(>VWp;0PPYoec(MePDWu-{+OMSG2}k*-7-TH_KWVwpBr@*borW?;^N|4%q!HFd3kw7U52#N zWk^$QnuC_S=OcQ;ob>dM+-bUuo%zanM8>-(ltgj49Ur`lx7KF}=umSlFKS5^gwaPQ zFg`i3Ma>0B0%_1_3*Py`<1By67%4Cf029MYx%n0BOCZY&1IF`>AtB_$meJ*Cx7Okwwjn#o0IsE%GPGYwCae18p1*zPWGya;Nb7XZ?#)H_ZwDe5`v3hKHx(U;p+!0`D|RJ|e9zo%baA#_buZ|y-y z-3HLJHd!g{zw;exu}SZ%<5cHvF);_|7gshkr$AkNrMx*_)->XFy-P{d@q)vsGoZ!? zUZ6nh#iDOTX=QOF&=BSx<>{By^qd0%C78`b#V(Jta&Qn$DYWh9Wl~~#`gh9n$@=h8 zWs;p%6mdk6mr1uuQlZz5xzEqhA`5r-(z5HfRLz!iK2H@Vy{;+ znhVWWjd(|8RkZ6OK-@ECVUXRf_(F!U`Re~?eZq^hERFL0%S?DT=}h@Xm5FJV<{fYC zT~j~2(@Jse(DarWqcjdKOPDe`{`a*#t+!viod;bem3L0$YHlSN#qA58K=!n+Tc^^R z(Zvl#TNdd*nZL(`T8}{-z%S#Fb7UuF;#p5?>GgPps_qT#ez267dp%G~G}qI>!V{ge zr!9H^*Ph5cfP*G0T`Cm%*-K1;e$hLZs5~vlggEl93xQ^FMbE`z=-ce>;N@OUXMb>> ze0+zB_=LbTX#4m22(@XG0Kcm_A5gHt3!gJzYU3x%Yh`nU*sC|mJ1&I7482M2RSv|V zu)OKhkWw8<5-kK=k(L;JO?Bi7zAzkUr`A`dBp z8;)PV2F$x)2>~92%)Ufx$dAE<7Cqa<2xYhMnPxdjI}ie+IY=z)7&DQfI%y_K@_fbC zcGlW_Nrn)`8rC)fQxE4j4OEx_3E);RUn`gZtIyVIxpVWksX(xJUd7MIkgzJXc z`}9cnIWITs?ou8bM9}@{bnmbC!*FQvjUpU*i|ToyCI`N~526e6V+lcJds43&oKY9} zUjGAnqWA83gF_a9ZtzyBTe@pX9dc?X!yGWsaz944t9zQuY6-(*VYWx3z=UUv7VE~l zI(x-A>Rhl{e)6PVkhRzzpOd`1NK-;!l{Wdnllf*+*VKtjf~Jz??XaD2GAVWD)vb7* zt9r)2!}mt71Sgg@1IsBrVYG9QT z!QS(4y9J!f)7_v&-*ew-Q#nb{LM#K?TljTy`15p#s1;+eP$|D(*g00UfzQO15%!|Z zWj_+pO3S!McvUJKUj_g3gW&_bVTx?XX@J6mMJEaL*!J@c-LM8#s8tUhGTrrtwzYP4W z1U|GpRg?nW{U(wkMg_rQh03mTD@F#Z)3w!0=*!kGVq(mm=Q7bpVO}w5Q!R8>#<)<9 z#&OB*T*i#<@!JMRe#P8k7A^l(fk|ItB9z0r7`@;_KU-+692DIO6)&VOuqmey7`A*? zc}`X8?rmBF?tgQOI#juK7tKGpBvf2`A8SU}>81X8wBwDXH%2o~@ns^hjp`a4 z+Co;FKj~eIv7-XM1{fV)&y^G>m31ejIM}gf*Sv?#J8q96T89$_8LT_|TcMgM+Opbs7qe~TA+Qv!p3bgH=8<Xb$OXa>8Cm)rF3Wf54Q#eZi=N~xHXf6&b3w`Et5QN)hDK|>-!=f-RQNv5O@ zv5gg)*)fLqzY66QrRVk~e#}ozUPwypwlguopxMYPqXb(RrJVgfj1lM2Cx5t!ysu=c zPN;#|9{FBuf+yF>kcLZjmDfWzcysOAvTxd$q1il`eOE&wGsRMwx-83fjS5-1cD^ey ze;O47uKkKR_LfY0EJjq6BC}%Z9Y+sI9zAE~QenI+S@bSv^p`uWR>fDS)-#YQ)&PUExwS#$NI$=P+34|xqP+P@YXBnjOFMxTTS>DENuEVA-!#HhTi_&RsMXbyw3yU|Y3ot` zlx+Y-r*%`c0>Ra79T2J<3k5|@f9=?NbaYxDy0oA3XTdf^^hwaEmVCc}ZQy?%VXP*= zHbnX&o>vxqUnl!gjL4kaITsm#XXd)&>Sc+~e&P%hbom@qd^K1bo0@0^r5dJ_oe`lO z4W6U8GGfvIS@y6BR6>?IQ2=GM;~vh&u+L>=R- z4LIwKcyGu-ZoxUNEax{WN)l0=n_nk))(WjO{Y%4a9Gj zuP4L}e20j|L#&yBZ8H<8q>B!AF1oS1k6D?wNjs1ajiVS9F;@2ZJ=@`wR;Vyo& zv<;78A%(oB;`$X2aE02P&+Zp7BZ?;%nEmyi{X9Z#vjNPSwefnU8*{Ey_Rl2U)SMz~O8OS(ZEhH8T3#Lrc&hTJUY!R9S{jR-T z^M;T9>g+v|Pj`vCRqfjxz0F%bXa?%grh*2XYWCaQiiX&nTfD)#n}u2ATc`Z3P`}6o z9BRcIU)pX+vg6YPT3O=?qiZIQp}_L(fdP#1v%3kzFFiCzG z?%v=S+;}duvy@^AZmJ?bznZD3#2NFhA?pUK3S1>UNXvnc4k(Z6T}OAflJ~Dg(9%Gl zx%2J@<5pD^8D#6gI)=;@6`QQ+rAsGZJg)R+d#;#NJnQBc6l`m5UhGQgeR=N8_D(o6 zv0D5S*dQj6qImYve+dxb@au-Z7y>8AOh}jmX)h-y2TZe?Lm>IV?bSF02}wC{8U=+h z|Kq#w;mw`};Lb#c1W)XBU0tW4PeZ_|r$#s-F#&nL1)w+o3H|Z@Bp|$f`!-0X-C)#C zjxeuH*B%0mmX?-=#YFNnGm=td%DcSwJNN~(v@DoTIBqTvV1ag6C@-F6SQdWCEX9^y+!uKzB4k6Dn2|FeKtHR3v zDYf`tKNOsC4FetjcUOJUGCT-SQ7vt4chl3>vtU4b0$=Z0FklY@oD8x_H=)j;Pp*#? zaB*ciXXP*92*Wbk?-FfwnqhDPTQ4r-I%1;M= z4Q}lqh$6t)<-@IjMf3tKuB+2jRc*A0Q+@!_3_c+-0)c>+C=K=tfBlspV&LaJot?$z z5XkgCx`8pbuy6?kWfs}v0-_?&;MKmIAjI+=qZ^piat$v3@2{D3A)gU0(ingcP*&!k z)&sc%#LXr5K)TdS_%2X%)W6TyZC{4?W(Dt&1|~2lXy?T6tHYVAL7y7KCRYddeDG`O zGpIdAMwwHQ5fOG1UpKEpSOp#l7$8oH=iIq>8gZQ9JD-9%d<xP^r^2NWs zP5TfIp<$q>B%EH{VDf|FS}M_{U+Z&062DgN(f3sldj)0l^okml{)E%=tp>`TsfWH0 z?g0;ZvfL^A^E+}{TG~JBBW;C(SzfO}CQ+CQv>uO_D){ZA z(__v}{-H|+T|<(M!G7RvM6JY&v^0|<6=F0)mz*3%$IR|{V1Do2Z|^=e?OZL*=)k;?I! zE^-vQLD3iBun=pLe|jWu{tU+59T|ulW%}x14UNV3d9u96V1Po@i^*08Ob_LN88kYAF<~} zXO`(^UwWK^K!DgxBuTc#_Qb{HPdcPHKq1p0z#}bCYLtz4G&9)ZO2GyQFzxuISRz2N2S8PNSDtp`ZZM*PUa56Y7 ztT$UFyKXgHo1*JuIIJ*PJzXjo6Bi}?ysmZVM3@s3Tl6IP|0Z*m|T=ui>21yEb>{yXS zSan|rIhd~gFb3GME_JBqnQ-|W$Qw(?d2-XlnJ((I(A(fA?-VlL=MB74op#v4yC5Nk; z+S*{}xPs9Y@0Jz*nUbgZX5=Z7BEQn-&yQ0u_{$xqe)RmBy+cp}nY)K3-Ywo`ZD!E& zGMlM6l~(IK%p?+C!c+mZ7&e8oiQ}(e8XIt2`3D9D&OHA4mMBGn!FO8BBJ@xc$Ukd? zVWp%LL>o+5tbYvZ{1hZ(DjnGWy}h0kPFI5d$#zD*Ci%q#HV87}8{z7YBQ<8uKOi&XFtgtL4 z_dY^qC&cyS;VJmsn&A+eN(a2fZ44d96+!%S5)cC9$NaY&NZxM7 z0I)>Xe{1a~nj^SCQTDV%EVoeytV(TVxKp-h*j`fRGT9^z8#^ z8k-Wd+ar@cP1m41yB;T*2Bt!`cLkcLL5-JWQ&By`Wv>kh@;nN$hac~>n6U5_t`2=> zuDzG1mvD=iJi$!j5Zlp!(xT7LIky)|HUL#EW}nt>2O9a$xKpTZw z8W9=EE2yC04N*8ypT{5+ZeWnkNUx9p2Phm>f1O8v&?+#gO_y`J414D3?nudnk zu)2dzru+`1P;aK9=KvHgW-9xBh3O5FfqM!#LoS0!5T`6OBgASwc#wRoLG-%uqmr`n z)PYtG6tmon-{4umQqANnmU_PV8YCs^pp4HYIHTZcf0q0Y7L#+c_|<_4xy?&s4zaF<^&kIBW4z*MR{p3lCf9Jl9x0?PCuLDaB&4}&t9S1a{X_NxG_~-4xV&|?Bk08Cw|)6+CDx$uCA`Ib0Aza z>u2-^o*w_90J;!H5j4p$&!_MRey|llY#0s;JWGhqM-mZlloi9u4&~_&9t30Ht{am+ z)1pSJJ)K|=!G&IpUV{hDhqEh}U0r`sz7q#f2Imr7FZpGm?YmPYlVfAxw1bBOga!cA z!LbChv=m-RNf+>XdLCvRsX{93-YKt|uY$_-3=f= zKcsB{VBo^hdh`YRVZ9Q7VNYxhLgBa!{N2*gYkUc>)jfl)ZykV`VSHw$=<*m;xeNQQ zM1I|!taP)R@plO+B!M;ezD6F`2$2XC?_Y1v(p2H$;ov8&{98k*koV*OdZB3W7xQZ! zBJYk-fAr`)dC!S(*iv}z79?lZ5GK}eRKxp78j;D|`TY6w#kv!#Jje#Z$&%#h`hbA? zr^llxk2NBui!;O?*P2^ecrsPiA9Fl_`UIapFE6jerdLY3e(^c(x2*jz#j!xlgSkGj znUNVpQ#>5nI4R+}DFd0+_3ba|X9-1l7v9}9IGY0iI#t?6hm-tN6_^c{7$O(>fp&xM zzZg{xz+-LSN-YvG@M6f4v}nDcAg*@p+Mk~@Dl6spkfxABXi}eN`097yIsg$(Z~?g# zTrD*QF8oy=DwmPHK{?epNE4; z7He-(h{4~yWes6YAUvhA!fSsT%(Dmx;hc&q8Afbr@D-^fuDeS*(caxLmMws zv^?$kA|&(%w^LO6(y(VF!u;(LhA<^M>X*A(?C#@1VuGN;eyVa5M_iD$uh8Objc6N! zm~oM|5U-*I?0d6R9&3(N|PL(xa#@8qp~!v`$FzwUIiChVA^id=pb~ zO+%(9pQnKjr$Z(8RcE6sn_E;gngw;qPu@!Jnof|Y9j7U5(NvSDuvESC1W}P%S+pEE zFQa=tp37%FrA1*rQ*bJ!BA#Z}HcyvOqpiahdNd0^>3LVA0#q)1CIi}miZQq{u#&yr}K%h^t>(7E_;r;Ur2j^Ij-bkkd2`WC!2 z67|Rwp0l%H`+Uzs)qxvC{zNy}ju!H`%{zYobJMY#u3nNft`LGxKwh~SQR)JFeEj_5 zUmtgc7mmGu*>>f3hx7J#3Rxkca4Cwu-4+^7N?n>1>%6 z+q7zT4UO+s*tw`Ld|6V&qwf~(-}c;)F>U>)_SU-(s;R{xvWO1FQPLo~!;p6avI1$| zoSx7ag?o*=NV?C)aa3mGJ+pDUG*YwtijbegKjw8^#wHun1~_yl9|-rd2Bn!~N$DbD ze)hj1v5ud;ZNNSv>;h@*);LH$McFhjq93U@7%$^DU=DJ|77IV5+OYBzTUHjEkx;T) zYMjH!?d*GnM<-}oPgh}F%z3oZ_r?eu414t%AI6xHQbfIn*_KBkt7H<#*gD+!a!z^k zXbDMC9nzvk^*OVpInq*YeBEx+>PhkP=sgE5H^leXWR5Ql^Dqyjeb4~;B8vuXBV`l? zS6=_7LuL8`sznpGn3EK%jNPj+7*;+(M({Rx#}G1<<7Gz?n%Ae56D$Tt!UVUf*Qc89 z<3(lCe$j8aDLrR6svFC9GXYoQT?WX-5x*K8Dwac zeQx3&vEG#SXOC5IAw;no9?N}>_`a#f+MaLiuo@Qc??kum-0Xg_^m}V6gOe6z^Icwa zMe#D0BqmI%qd{3xJGyyhPUxc}XEvz|qE)!NZ(IJ}id=6O0f%lXlVTSkDgAkaud9fk z7NtqJt0MGctP_ArboqfK`$%oTJ;#jKkU#9>kA77g#Bu8$z~_V`GV zI6T2&M6xnrk<1-6MN!foe3W{L15Bi!QNwJTeYBD!#{}K2zfh!aZ6cZ({z&+5s^~_s+)-JOzn8@OZUHq3HrG)ovn5BC~og9l?MYCn>BQ&~$ zO4xV00PNyt3OsF?e%H2B`j1@hxx_Bt-U?M;YZiaLGG;Zab@Pa=VBKn+V0_YsYUR^$7cH6TLY7ba`Y zIO6YdgI#Hljbvx+XwcWAqH09EhfMsUq1Z+9YzwiR7mQt`6Ql<@s2}DgjLZ=%i-iwe zSoSprymVvZQKJ)b4eLW%4~ z*S^Ne9}yq-x=vP9@h&F?C-(L>A_4z1)hhi}X9O|d7j*q?$dy+J$jUt)d zpalMH`MpS{P@dNOjIo<$CAqlSN)$6TVGPHIr#>evxVYj+-D)o3xWm2eDQb}9fnJa} zhwd&}lArx6#!C{bAxf7le)4=}UFs2u=i19y6i3ok@6cy2^X~ln_4|thjq3HR>id=k z4pfxq$8!+Qt9g&ot#(S}$7tOjms325UGaQ6C?RdF!=-RVp`At9r&Rih5ak=USkKF5 zqWrNom&DrcVm@e5g`^n{6Iv_^8%hRp=1MftqIiA3zHlSgLTCMm6``qT51>cYs0i9V z;2{s^2yAP+eX&5^^ae)HQl4D#MM=!zpLLCNLkE=MyaUf-Fv1)MCTww?{`(EdK+<2> zm`>~ETOG^g?Ar_|?bl=(Bms{EFLlXjV?-O4%eDD(acJ%I3pO!9(pVlOrbJ(I0Z0}8 zo==YzB6JLM>Nb$;FCYtmy<2*s0um0R%RT=-;%4JA!^~;Qylx;tot;g2iEaTS>PX;z zyV-J4gLRfwREqz+{d6d^WLE zbO&cWga|dU9TV<2Hy8LMo&HC$muL)9U#97vo6_s#Tn6kz(Tuy8@Wu#CCWb&L=z8p5 zL98{}Qc*qLjRl)?fwQ)(HSL+kY$;(ZZuE1VPVQcD7GimP-ie?o@bm3At)KupP?xBm z(O{vGj8|+Bn+|M<^t{Ln(kv+!CiW6? zt0SI%1c#D6qV_pHVpa$PvG?L5E~PPhAVSZ@X3xucKAr))twtM!C>O5hSEx3XQIiO9 z>KV27Yd7E|WX6Ng{OcuyU|x1Jvc)AQl>Ym(?n_EByMW?LdoGtz6uB8AFqhG%v>xT$ zcNgRAynnN`ON?D4M0mK;%|^r_sFoL7B;0a%_oceFEeH0aakcCh7jjeUla%vD=6Jnb z4+0y`xwU(FPj;j2pJ{7gggVe^azB2_urM?=yxc*y&(Rh}$`8g9E4Gxl=1CY@k2bwl z{ZM1_vgz8LL_)GPIKRxxBam$X63~)dni8MX^}%ak#evBse{+~EHt{+pVOMnfOR$Cm zLLia`n_rX`TbTA^R9lQ5MJGx~tSRwZC%WgVO^6$5519-N%5jXona}W9qrv>@tZgCT ziu4}CgWIVGy~5}R3Ax(%4zuM;g?O6M9`B>fMcH(eJecOzp!WMHCIq4bgLhri=8zP2 zYUEn0fnhBN5$vC|F!?+u0%+X4ThCj0wO(7il(ty&$3;Sqsb~F1*&G!7NPH71n}q4U z6*5N5yuFyV;eA*1Rca+$rl@~f?klTEEcCh3Z@;kqOFd6sw&y7pmh}j@cemag74!WV ztUk)T$B9 zS2ZtOJVZC$QWW0Sd>(ReP{SP=QVmND-7EETcD&v1ippEU$flG!kiOy-(_^*GPAliJ z;E$sSl8ji5{~<56`(25F?zfh+ML8;Ds4=&qYJAR{6%RptTxfW&RQr(v-~7SAB~S14 zVTSs&fW^U!E$Gi%rO^*uB32qT$8*qPUN3iU>o;1Fjh@@JE9-V)OKwV1rPh0*rj48lev4t#+XIR+<2IlQrg)@QTopM_s&}{TQ`&Umq3j`&XLx&dQ&gkT)}M1Z$+&mnJ%gx zPJ~<+cy?8Fa-?3iox0&>exP7JH3S1!oJ}|-&4XJWsdPbxjlejd|LGLB(vPWXIh)6S z|2QQBfBL;S@mF2`gnkmvi+lwR1zK(MdC&a)3;&NtLJQ=d{J01FaYOgvZVv<j%VuL| zuK`pJVq-$bn39MH`AE(5AK^lX1eP}zx~=Fq&QWd-9B3%eC0{jzsb3lA;cxZKU!18M zv%ZpV&(mxL*r*{_{`A}k1V)Zj z;Rq7sBtgrG9YIN1A_p49CLPZbj=a3iycM!Fq@M79Z?NOam)o6R*;}~i;ti?C*Sslx zpYDset%BPQij0H;=(SC!^XecA55oDHt@%2atNWsvb>8tbusPNXb_ji zwfH+(+^i9)lFo*DHVtCEmtSMe)lTQc4{}-EzclV%mU7&$Z9)*#)+}}>71MaaQ2^f4Vm$6iEJ~8#XUDnz zXd?0F8{l_Nvo~pr)f9R~nIm~FUb)Wxq2*ELd_+S_hu&8-c#nP~ zU9xGhdwn*lLk0^5G+E6P$E%T zWo4ygWmNW#NXjUqtsz@T_6#8uN|_lElI(Fk-{0STo#%btkL$c1*Znx}>-yvV{`Y-U ze8&5AypH3!4nHRC*6^BaG_5`!Ok>&n;%yRZGi>`~^!F={mO2*}aXdjSAZ7ua2ZXrcQdv0;2s9d_Y zutm^yakMtB1N<8AK+~nJ=pdVG+~oBy6{)N&DdPi1eS9OdVdEjUYk7CzlJ!pcZcWS4 zw)EIk&u;1_$y`pYq({JMrIwXw=NJUC+vtv1g7~p@qvxW$|9p-47VQFVUKv#!~DSYmqq9@SZ}&$$2U7f$B#$N;CSESy@% z+8Nq05j4kn3q^^--dTV6k0k=)NM2dEk$!-a+pBl8qj+ZA5S?#rVFFZ*8O;z<`u=>& z^@JboTz2dk~h9#%{WTx{qyu~MVlqc-CiNox}9ttKuKdH+a=XeX}sJKw4^ z?)N@t(Cd@_^-e$ETZb%6_g?iGX_rZ_&5d=vC2LFW<+XYx*~)q+e%k3Vp~LsZ}biwlem-sP|4-9{RLiRI6TePRIl$7|MsI`ii0cvE25TG7H2BpI03qc^PdM3J(5{I zzc6e#b%K!h2xXJFgABl6^jI)byiqEUlA1ayGV;Z_vK5eZXUU=SiMR;D#szE`NaSJ( zaVnY=g)0|e{$G($1&xvhqRShGD3CC5O#dMhBe zDNVsIwZNd6Z&?+j9!m8o>#U-Z(i(V@h5Zg>;&7CKu)6-^?wNMB)wdRSttxfdWTQ|Z zL5FhWtoYyk6R`4$oO`zfSL?TK)gR!taqFA?sxD{au|+USyzkewHbxefgvo<`RG`iy zHz{;4T(|(p8Ke&y$DgfDRrr9R`B{d70Hk$C>W?a9MG%P_;58V2>^2(NEd%Rfo9(W7 zqEQ1UbOjA)?eSRrByDYNq#3{gG+JIxhE`a_v|t1p2H@WDrWU2Wo+6bmN982xBZ>uFq%-yELn~Igzmwf5Z{4OFcahP4~`| z$XHeefS)$eL4Zv1Z=OJ?YFt2GdrtR(1tJUK(v$?Me#PQiKqV2F1DZ|tZ6*b8lNs_YR3`Fk8fhGnfrkZbAXG>3t z3JU(nZ&S(l`uq6tWAv&v5^)T@?|^gQj%ai?z)!cvPv0VlWC&f@tRRi)Gf}mLEf4}O zp=uY1tH?$nBGE#e-O@MwZbH;V5+4^QWmO%bI9(iEij#_@kEcqz{=iOnTf@)AC5MtG zw;3`IFn<*nKJ9fnjbEY%4VWd&pbolt-zOMIXhQ;Z`ECaU1mL_f?=^C$4A|#3qpNd+{sB~ zY%f1r9b)`PrYDD@qx5Og`?r;_#2@!y3f<4k)D701rCB${qy?5FUX!qO$14Y4XjLv- z9!YjjPFxl6$J_6wSB1ILTe?qm5Mg%u?^2MY*U2qZ6!%e>S`HnezZ~4%OETCH$^2*7jHbq zg0iJ`wxCpztXx?^Rz)nn8AR#Q(h_3)#{Mh|&m4bO_~E0-wfL!y_^z%l@V>nbt2MZq z7ian}PZSgspj3JLDdwSIrq@BIw|w!lR($mzFIpv*_}63+P4LcDK!gV!#6ian0ZGYO zlm?NpyuJE2i(hG2s?E#4`a#dY@O$Cw&JfBOgpqSU6sF%(A23bi0Qchf^IVg`vvYYz-Qw z+cA-m@6%QN7g05%A9~X#*l*v`Bl|NLB6;R%dONBxj%b`QG92#iJ*AzEW~v!CCoW?} z5s?Y#T=t+elhP@<%#Rz)Mc$0K1rb1@=P%QsCy-@i0TjTw=900~wX<7r^1#h5gBvvR z===G#^d@uv)8w}PhU?jN3Abc6vnK|Jb9=L6QGRy_x==SC#$4a@x;Ecr(St@*S-SSr zgzyxksc_UP`EMw7NTa$DU(BzstS`KwEhJhv4h~HEy19@6UPnC?pl8zzZ4dXroLhQj zG9fK3X5kiO3+dk;LA6>ta>~;Ax@Xwa^^zZP`y28Pi_6O1sjLJO8O53ZbvPwdChnD28v9$W{KMmqK5p=$8V_2 zO>$pWBrjKxloQ%-ri#SS^t3cT^aPori~gr+zp`wOC2ZXndv>nuQAajPKOPyzg+IrIORJdDyd?;)XXQ;zIkwwQ7 zr5s-(JTz65ulG>=LxN_iPPg!Fl%2NU2Ll7ecLF%&cO4cLtUiR_y<)* za+U8g4s+jYYx7r9;QTJ;M!}>{6G(5qS0McR*GFD|r_^=FCW!^bk5;E>w%+uWO~%=t z4B(+cs}#Yp^*@xt|4=*sCjgr&a}ufwT-lJ~pT>6!6^%sMdQH<#SE@9HM>S=c3z6$B^NURuCQ2V{szGD>I#FDIuzpIQzECH6z)T{_#J%C~Q%H(OyN%Td1HzOik`kBxua=;*gEKi7=h!^PK@LX{pA!>2# z&HKS|`JL>V*P&z>BFsvgTh1A+!RhT~wX@2@H}cIe421??=Qp{8D)@6^{%RXE&5Sm+^pNoXNd z*iaiUG~FlKRdg8ckQ1VQA|JKe*O&6&JFUNmrDbGZ8NJB6*ektQ7=`D3_hCSdWl;H9 zcn^{X-KW~Q7kXkbG^_p4ESKKG&+D7z3G79vDG~{Fdj`<}A?tv6V~{UF63^?xdybNh z&dZ{dIDrtQp!%7i{|68npO1RQYH{6w0T0ZYC_b@pIv#PD%@K?CtveCdVvysPf)}eR zd=$E9B+I^65K^+*Q}9guTZeS+`>F)WuXY?CK4w=73jt;2bv!I=M3xRjL-?klTeXEc zi%`NBQ)Q`HBI_=QdUOhU_Ft`TP~t>OlrNEJO_gulRpb4Cc1aEN?GK5-+=T5_RaJz{ zA8L;&KvIE(YFiD(Dm%?3f# z(xR(02MJBu)t@3>B^GzlIX#j>&!s_mA`0Pg(o9TD@S-btjGuUZ;vtZk-E60gG5*Xn zz9RIMgo(WI7B6nY6%?rp-C4?hYfFGbKD$X_pv#6Z`;7nHmVa-Y3{a|wBI?}7Rz{dO z_8L9U!I*~FL@#;t8RY`m|1_^gApyI^#2{~SQ}mi{X==I=6H`8!RZ2Wh3ZkN!IFQpF z6?@^=P({_eEqII=Yak9I#vxSU8gG(aQy#30h*z}98W5BYhq42JgS4`;GOmB5Ah{#B zIE0=X$;$NQ5BAkcAuS0rNFLGFhRhBi_yNNsu1wHV&JnZ=8Hjemt)r0t#d-vYBRky5l3l9j;`X)jP7*g};-F8$_Jc|DV+r`ni-*skR;( zck0>Ui#y~E-KQtSove%d7!po<9U93b)%i5Gafb9li!xVQ(nr@*x~TtawNLC!H{NNy zPw2d+aj{d-pp?I(QCI2yrwcyw&*C?CMh+}_^eNP>I7f55*}qYh)xbT$-DPcJ)X|&C zYc}*cR8Y&1Rx5S&!jankuVi;PUELO{o)kp?8Q)se*yq0@`irKYrQhc46l*7cxyO%o zey`Pw(TeeDuh|r9I*ae7=JP5FOUpm*{K@9mXr=kvUiu9AQ|lusRdWx z;b-SPjd!lE%ufA`BDp;?!B#wEeAMWuT^V`CE4?VT66L_P$|U#8H>oI(wKPswk|(;; z2^wbpopaE9+VLdkf(-xclF69F^#g)IYY)wa(aKCFl)3uaQC7IDr zN!<6!i3_2WR+Nq={VfWi>YO)}zFHcLyuL(o4&ye_LDsucwqU?v-Ivq z!SHmYUB0w|C6B)ul$Od1m|5xx+FneC@o74AURaNkT23KlfJ+Vi(R^M_qH!5t_ zq;$&K7H+Z7-&xHnknwRyJ8CbD>Fy=D`-82&uSbghF#r6P>4og7?#wXDGdYR4GAZdN ziz~*?$G_dzrVcr=r*A;)cb@{APeMxPd-gqibqks)Pp7}ysIzkGJX`b1*Yi~n*H#e!7M&RjOYKZV4#s#6_1!I63Lpq75|WO)7Q5}jXTWwrq(M8 zMb1FSw*pjyyli~yZF+&A8seVsq6|l7Fhff?Qw_cPKFS6Z`iOp#gD)xzEOz?pXQ-(& zb#R?&c(;G=`70;(zMZT15Hs+I(vbTXgC?!2Ho2|CSV?)qtG4ACi|uSY`m`Ck&9(;V zdX!^%U%w=s)6Km2KKTyv ziAvdgWLS(cm3onUjO1j8`AlN%GdpqRd)70lnorNS$|osZvgr8SF3Xse$GUJNr7-ac zt(NVk!RI&a1&Uv|loN*i9Y(pEvKnI#v&kO2`Xjf?J$dXGi?xPUZdU2nnvTq>{NynM z>JFI&;nav`KQU)}?|Xu`TkUum*^bQTOD#p0oeUS^J$&cj>aTBH9F4igi?`Uhl;?)m zcma*Ay~Rsiia{+q$K!W0Ta^-#Jp>%H%Y8cj{b2c$kBug7g^#t8*=roL8BGNgL)?qe z=peFh@crM@{QnDPy8o@W!au=F)x!TrUfysxyp717TgDiUX=hrr-vvN1gohY}zx(=f z=^Q@}gy}0#RDYitWHo_P87V?UlXdf`)32ecdy2+@vo*i%13a~!}f(f@5Yt4 zw#_VyH!UI&?3XBJwg5-TB$CwJ-0~C`sn8GGqEm;#5AI4du|(MWXE*foNLUTc%oHuX zqU_lIpb9>t1b=q#9YHOCi>q#9;%K^NZQtLV@8stFn9CS8^ zGr)cCaZ}STm@Su)@cJNeA%F#$9FoW%qQ zz4mQGn2BYJfu`t+RPo4Tf+K{r?&_NAkeMTB9cXO^kfN@>cWF>0N z^)@VoP@H+E(M-_Ud-=LSh1@F7eB{a=2#X5AFG>b`djTp0XDLYb!ngzQyn-#oo>$+# zlwB+OR{iq%^F7VX>gH6CYNr?=f_pYP=9=5mq{Ze+$1w>gq}eN60KW{Cmed{^E}1?hMUHM!9KBve*yL^3Bl*;B|1Wjd#_XU`rHk@qhZC2vCW%zsYgbY@b?m2q&ADyepeHldl4T`YsS zA>`(C65rYeOj?aksGnW^JyiFcx^9og+9Ki-2aDtQ$fC_!YB2hz`K>tCT4G|Esn}F` zb~4d2u0(LxFykO$*xN?KrZxyR>cL8j08<{UpLgbN9{j$?qMYDGd^n9fitixoNJv_| zUJj9Kc3~zz+AZ<@5HuFp79e9c_H<0ZX1Lw(Q0tz}wK3I6BxDuj8_5Z}IJguFhct3k zT#Zl97j7`_Q&0&lP+Y7I?O&hvdQR<35*`&i;09vBlUl+i+iTDhntEq{&$pIbg->x^246$Ddm(jHy;~P2{xvLlivUzcc=uUn940Dp~NE<(;Pt`e}6NZQAuY zovs*J5)G#iL(gXFXM`(x$w{bl_?Lm)B?f`=KMb zf6BDdQs57gHqB2`n>=N4zNby$>PB*?UT-G}`JEb{6Ee)!4mEpH=^m!16WU}j~)KORS{h=%;x0yZW}GLaJ5v*=O5 z=p(`1KPSK9Va*k8=3HV6A6mkZqsa>T!3NaUB&&4S;A8gU*hNtMd1ZSW;^s-=?#-HNe0W|-l z7oUiH?eeI{?>*1|uzEp%AZRydR0>wxBj{F)9Xo4mSmh9o|6$7FAMdVC%wpJ;JQr}eIul<3ZZ1B#9u!9X$xcvlabB0~c z5mI-VyrK`Tr78OEJCovt_1(b78F=c%%E=uYRzT9}A9(xXaB6-q=_?KXRmn-L6gAG- z!s?G;uTt4tM_MZP3fH?8Qw0*{K`ploEly`RZvb7XE5t&YLunpy&1G?6^mG=9O}0hv zwZmyxWAe!$6tMUG(gtis*8k2L{XNr6jt!c2zHb{<3b{UU4-%MdSZKBynLHu z)j`*ShQDq1_ETTsEzbQsyNYE+!ZC*q%dN$*%Y?Pp9W7CPW+y3!3FIRP#eD#0GzF?`uEHox zh>n(lcl~Hf=Xp`@Hl?)_1gz~$Kk*SK`vl#FkCkcV{GtZ~6WiW7W0ReghQl;f{G)f; z5xI>|^Y=UYZ>q>IpI6`6visx&G?}iaun&R#BXPEQCEJn6uD++0h3t;fG!XnBYs0{1 z{t2AvM24d)-$t{=#@yPUw#A9ghDfnFK1odu!gDX&O9Xl1MgbkIpG87Sv88Na55M_! zn0~veY(ZCn=jL#C|tYc+7@i#Bx+|t`q?eu%L!E|83ij02NFUwf+dSxP%L5wRDf!o2g?G zWl(5HEh;0VgfEa`r~)S5LO8VQ&K4kV`ujSgx;fW>0R^i93#X#u2Yj-%I~+gyQ#lJa zu<`^6i?oCUpo(&BbTX}XK@;Mn^<=DVxY2Se$;}fOZb{47jF6B}41hcoWwi6tneWiO zC?QDIen1soUKUc>cuXRmJ5(KI6bMw1fdC3{ z{q2s0J_=)J%9cs=&O%PS)XTps#ml#9vTb_5gmLl|TQLXCm!r`OxJZM)6R z&8;VOfUPu&%$L`6^d9s82Kze-9CzHF2&mLeQ|k3~9ju1Znx63(zPXe+ZynQ`Z_u+u zXr!MSyKQEfcW71a_|e-o{U0gWF4{_dWnkOpoXiqvKpiZ9|Nb^M9LK`TlI{b}=g*Hw zu^OFsC{T;>eL+*tseJVgr&CCr8?|C`GI~DQi#_xeY8B6$p-wRWwa)tNqpjYSga>3s z=b4qrN83vdm+yS$+w2-$6w}Ci$(9o~!k;gAXqXg_TRsoH1Yxz1O8$*=z6Q55+TQv2 z{n$eyV^dFaZBMH}{+1*r;RXgajwof<)gyY-Uq(6$W%z=ZGZfq##h8S-S+=#a=2rUj|*l4ttnO)o{O z@N22T=%6eSUBwC-hy_{E20?I~l_mnL!Z zyG9PnA>Abs%x12mNdy=QGx(}iLQ^kBdER#w#N^ zS4_q^f4F3ePDA0H>%S+=?Svb0YYRpP1SKy9!+n<%j|^RXl^@`_wVRjjU~sdRnF|ZW za6kANi2jt*Y&Q(&|8y?3YMd=n(OeNac9MBtpmxr*-tFzTcjo`daqFNz@J+`y9x!DX z*ze|3EWGmT^XvP=`2mNl=wvFzL^G78Blp~#uohx4G949<4Y2#o+++FJPLr(y6mm7c zP=a*r<8$Y}Vx!khYavP5a{o=gJF$TSOOnBk1)kdNw2pSsrK9~j-Xc<5Mo6jyRRmAM zd0H~_+wToWA1V^#x?X*?sFb5FbJi_hF!G@Z@*igDzukQM9A25WUF>!afHfKh`Ao%3 z3o5x2==a5w?(q7cWOtjqvNs~eWxho<-^%H(?y8^s)$<$gk+LJCQF-y6?WoDkz8?q4 zP;M*d;fuT~_+e&e#s#?X;fgOiai zYuUn7E%Q|1hmR-Cts{HdjtJYJWMeHQWB8RpI<;lavt%Q7?Y&tmHn@^!Dlg z$^+c=GLgSq=nkAneOgU3YtANZ^Mv8e-uw5=JPv&kINm1*AT3AUb)SIoda>JQp5~Z8 zw0fO-{xOvUVHc?fIbEp)W?4sbdU!K!JV{=q2S2=IO6xS*+q?53_kk_t0rkC(7hl)b zYU-W4^YBUcK0WUp`hix>gR+jCXPg_PuJ72mcS)C;O_x@YX;V8W%e7Z-cl7y9_xHv< zhiiG{oH*%A6Ro4W_}C5{aD3HB@1jgWQ}_JvGtxxwBb>4}xtwd=;5l=)dbOBKsio|8 zuQR&!K4R%OEsLAEZ9*6=*MGnYPRCV${al~x$qmcsDkJ+e9Fk9ATU82)n6Z?>+O z#(66pwQA7!9^L>??cvw-Y)5Vu-r?PDGL)r(gW>Agc;B}oFQd}(N&EoI!!3IKE4x(v zlvbLU>~~Exe!9&elwO+Dpe+?ySo`>pWy_Y+B&I_mk^(0VIS-yMiE6Gl{ds%%lN)SJ zx?V3LQbiA&j-uCjtoW?jTxMt7j(dC`x(3hb3?!P+Es(j6D~Y&y%YF_$F4Xp=T(v9k z=~wLgVl1{f&ARU) zod0`Uc`Lpskwb1KbeWS?sLwe`?BgJU**CLqV}ddx_GLSb*T0! zWpvqI?VVvqq~6-4Dbt-CI#QWUwhbsp&2;sloK)jWQ^p7AqCQP4kOZgnSZ&X4cv+|D z(w;9}eCAqYv~rEz8{H@56V_bA!Lu_*I^Y^yj zFE{kMlGzpUlP=s)>61i)XW%#|OqyGWjZ#d{blX z7O_Hy26l>L&FU^%mc}W%kJ&3T^JX2YCZ9H@kdPLiRT$!|QUCE`u*v6{XH@ce`5${F zWv4TJf~%wzsCjZfe-D260bR^_i!EXo6~%iJ}DUa`|@SNG9h%KJgjc3=%|q!!1aOOWi<)C)Zr?0}=w zliKls@UF0ig5#5xBpQar+}Yj6Zd5eu3bf*qlI>(+XT!(xbcg3iYS`E*DkNYi+@>ro z`z*roeN^R^@-TLdL%AQoUI*rO9~A9Zs}v>kC_YV6b9L73o)0rySZrwlxh2|v=Wg=@ z+ZjlxIanWx*_h{AhrTN2Fn{Tzk;YJ%)5O4bT14L4e&2igVgcxB{xpnf_Ns{0Xy5+|UxonL|m5!>PYfHA;>kydFm5~34 zGw@JrvaZ(GcJ2caPu*`raUQ5ED^16B9Pr-A;E5gLBR+SC%Da zPg>!loiu$r@-%}|ZB$r)R|+QAR3GpgV`giq%+IHLUuAlYZW{*$^+og1VGQj;4NW1HMZdKs>Jb-Vsy(g)*Ejz?S0(OtIAyP1h4q4q9KJy9WhWNl|N zXlkjx8f{|946C(CAA8Yw;&PSzZM&c2d{El^C^?1c3K>?}ASw3C6MnncgcA0+o1kcBT4RW`8OihUABs8QW8>v6 z>!~Eu9Is9|-`9U>6Z?VVs-4(hTv8>eQv<#5pM9gA;mIgu`v^zUX>!Htu=9V&yCq?K6<)zq#?oi_`e9XT9|tJ8h^~ zy5A)~Z_Z4fFrAEN7e?glC78R6w9p9C8Pk1WpB}wHP4Sgo(^#7%Esxrd-S_@ zUDzxdFJF)X02EWcRB}^(a9W}$WFZ4?N-T#M8XoR`ZRT|;;|ztXhU*_H>^vl_cRI*= z`n)k&7X`xsgr!caUUJFF$q;K5uro2?g>hJH#_1zb^H;@g_t4UFn-MNM5%DQQzgTyd za54Y`y0$SHMqk|q?kX}Ws>XHrB&j)%hkmqr^+rG232N~w+P^UbhOEHjSu3_LnC67a z-n~>i0wN+Pq~R02u-O+bzVOoGMtXddvdN;vyrFeMhI zCg>#hMDgV7H=8Rw`=VMXFL$<`|Fr8`gWGQ5+P}G*r>BZ1J3m6I^$8nlQ%K^!WxcZ1 zvgD-xWigv{aLoVr6iVBq@iJ%+X?38+)cZ&+r2r5 zta9!$s4s2Dz9!6+PBSaUt6*#vC%Z4Bs|CYDgk`SVY(h?3GU5zsZPshamMIAftq8z} ztPUTDMlt{-ZU|`+;Yci~i{w%8h}Z_@^xMyWe_6>LUz;h2vf$IPG8J-%o)Ke*Db@{L zdGEyrxe+>2hlJ9`lQ1;CC)5M3^LSMS^FVioda zmgm~6;2NH>=~ZA-$9~Z#J&5L?^3TDFbcgi$!+w|+-jRg`N@6ZTAs4dZ{T8QFall1r z2R}m^uFqc8HNVhp3H0Q%k1gGq#-1=zJLpZE0t^;uQp>-sBoK$rGFd}rA;FQ#TR z_Jk3MlTk<#tJIBuuE?#VY@U?}Svo#^nM9`P@75VIPV|ELbgaozHetSR?xxntFAX30 zNc1+^&z;h@YEWy!{U41H`W_z-9gztMh+VIpf;)LZEKh27V9DYdWz6HZlr**}WXlc@ zb#|u$(MTEyGn2KJI_kL(2I}Toqad+eT4zM%jDgYJP#@S27-W}lIK^X3UTKgbSiV%d z=Yot#z#d)ukFm{xsuT&>#+3PB2ThX-_e-yt@6mCCU&D`Ey}av6w$0J&&Q8h#`3w=K zWX~jxXS*B=vn7k_V%ASB3ntX&BSC`(yL2`Z5Zl1szqK6{pF_F%5=mu!;+*E ztHd>{-P-rQd|dmy5&!hWY1!b}Ad--y%xacXkBhb#exzYy3&XP|qh(?s@r*W@z3>A8 zkWdCBQNb?FO_P9;@d|LA)@BEFip>E#2DaA5VtIF~rSTLjN;`Dk<`j*V<&@1&F?T%9 zz`1GyJD!DV&W~Rom-yt`;BBAX82sJ!nZrq-!Ts_Mf?V{JZ+E|Qu_*nXkt}IN!Wd*& z-(^m|jaO6Xc!Dv}{ThKegeLGzH&@Pe&mJz1En9ldaGQDe_p-Vh#_d;~n+;uM#^je>R% zfV}6&FrX{9nGmb%qh;w}g|jN)GA^VJ#0%fxFyk3LlFeiH_IA}h;wxt$G~{4PRGBYSmz|K2TzsYfZk_foDMf@M^>r(pNYgb?qlg(fObwohOzouJDBq zV!r-{MFoE&Zus`n9NHTe7Tm~V^CjvLs+BVKjIW{xq$4|18t?( z7M*EZ1zJh&ASl8T*x@PJ#1h~Y~yJ>Ff{A*Xr{PozcnM7_g zRNBxdKlWUGgQELP9@d0OtBDpJ^ls+dR|2WifN??_P3cH6K+LxVo-s$<`+SHTsc%>)IGCsJ{j9q+!w%4v+ zG+bUYAo(QqRai`}z>NZxV4vLo0bxef<$n^Ek=!c+Q#s@m7d~goBl^vkD;s&&`fDdF zgMxw}H9ZYgC3f-+yaJU3kpjU3qa^xaLoS3G1($_jP8oDsJ5FpA!bZvEe@OwPv6<>o z0+xyalZXGBz!4*XSWidC)!s)EB2$QQi?Or|Vhd|1`Wq1v`4(O$ zY?Xdp`Ge>qa9F>wLiXATRWB0*!=b4l$&u)@O3CnFfM`XX{Y7}RmI1|U(^GzfnGiq} zp&$Q82J8;*9pd_n-`8YpwIjpO3Xy z&%wGkMz5|g?%oEP(77k);p!JsvQdI=hXoc2Ulk~|39OjJ5CkiXRHnJm2CF{>#78g# zuCA^LloTxxkslfcq4UoY^GM*kl(e)*xQVz(2(aN*5I>zsT&eKdLCj}sYx@_8qPPTN zDzC%&mgcW`;-!&@xP{M;oo$QP=#xNCtwjo_snztE;HzN5R}r6*Vh&6W6ms{u#-_Vq zn%{#^)EHYam>c+!!XE?#Y=YInFN;N?$#OL-52tExUC0+~rFoES#+yZxi8fK{z-akIFkZNO9}uOStmh z5m6W!$@kS4c;-`af`ysc2$|9_nw4fEZ^`U(*yPMtW0fNR(~ea_7QN${Yxdc7iU_9o9Jp59thRA{0S&w~#9Dap~_z@fT|XMk9E48p(* z*FMS-q2WoSVDy5_SEvEHtz(VJo89xXzk577P$DJHy(=~|6Ia)*`Hz+^&@Ex60_efp zvn?uMV*y3HP3#5M)uZ?zX!;#2pVL@`P5q0Pkn>}GWnF#!?F|GkBB@HT`T@Zi97KGI zE($*3V(sPr$JKU=y#rL!KA0-ZjKzuV%FdyJ&-y>{=2ZV@}`!u&D zA^+XGI)oAwwsH}|zap|8aMns;x3#o9MGIWlXa9=hKD5UDApk4FO_jq(j+jE(+E;*w zPvDvDT@Kb2wL}}MNOtpQPoG|y`M!=I<(DTOs-sZBQR;yuiZT;p6=|+N-@MUUOl?}1 zxEpD34z-em^<_E?a)fd3?Av+Jh$W$KjcK~DkBbjJpXY_N7~f#V=EUu|E9GtV#b&14ArNnwOkl<0O8d6A!yG|u zW8dz;4boBh4NRyTBNG#)$CNV!cI#a3Fa)1G$ygxyY?S_h%Xb> z`JcTLk*0f3XR@)d*jbDZQRX(|7R6!<7JB-DR>HO-1NXDEv^1LS!_n6Lipl#zr15i! zRrZD_Pr?cvsy2qme6i_AV2*HEFMJS(0LJ%MVfRa;7eOArc&UAKroCWe77G`*1rWqTgp( z9M?(!O!P<{zrie$=kup6`Ue)5;N)EB&3g(7C^VQ>(78@icY7K7t^e(=6(>7FEH`y7 z`}-L;S(#cO$>wUsW>h`oR&~%V@oGB%&zhpiC;>siGK9WkpUSioD>zVREX@Gljj!o^ z_B)2p@34^I2Abs|d(;6#HQS8hqDePfQ9dE_Sx&3>x*EH@BZ`e&{_O@({ga{-lo*M zq)#59wG}*ihk}O2!`>$crnZ7He1)DRF#7AOuFEPYm=f3PnZQj78W?0t;Ty!>j(1%a zyxFFOFaLXEGKP+gJmgS_bii98??&ujwy%Nzl}1AXBAkf8-Ee-n-HM08dVb!c1M+I- zoa-bJN+*iE!lf|APJ4GFtk zrS}TDw>}&xRooWyZJFt&&hfSz$3L{RD9n^EY~4SW>ikxq$u}mA<=$xzo0b zH&(4$U;I(wgkQj%9p@kZDdV>r)s1^Q`5qZc7lowsdi|VQXfJ@}{nA56;o;7M;VHS& zm1jfjXI|vPyT2@de{i9lmvSP(U2<-!HK(9QCi(m``?P+pw6FjZc5Ri!!f8#yN!SRG-?vBAv(q)&!(YgTJLkDmQFr;+fCa}S#Q$%L*gxer*6%1j!4|gsI zqEJ6tc-J{{nOgbJ&j$lAO*B4qNX zk;}@lE-bY+;BLc7*Okw9smmGt>`Yf>NBdHO-!FQ}e|EgmGWgv6Sj;n{d(0}%XVlYo zxT?0Qrn-qwmiA_hySB83=x2nma$L>()ii#{Y{-JgPnu7JwCsg~m^HdmgRe{uDF$S9 z&o)cjTr;1NPbI@x>}|d>X2^eohSE;+dE8ey-jJnJzx4x6Tm;z9_7a{Q_hXY=hG?WI z&FPbJYNK!StG~^<$vak-`|x#w7Sknx61{bb8Ybmn3if-VF)MzpFKEupTS_&Zk>R_w zl_d3ojJ}E0aBq2o0YBr5Eb*6mbXsoaUgE|AhqUL_E0`jvChS)@wOX`|QrO;%YtJqJ z>Ai94>UoO2b00DzxF@YA=RZdN{cOcOE}TvQuJ_~4z@))oY%`OgIM!Z8;g zLT;fOyZf89$sIu!Zk>&5_qUMTYs(1J{}R7`FX<5T+^#-NebGK!9qmk$Y$ z(0d7WG9<;kviZ)#b77`WsppfK<#*1Vc}kL@AvLyScKt8%(~s}a*Im8b6EdKKYvP~^ zEKvjPGe7CQyPmQ%YQWr=)zZ0X(OFYGKKONL=AwVs^($~Lt#Rinb5kyRyA^l$KiF?} zZ~dUna|Q;=qMs7cYu7KlIlbSU*~HFc59RzQj>5BjWU@HMIw3UtDCYIFi-_1 zm>;nW8qV)`P4?NX=(ej&Ca`A@-s$hwq$!kJ=xgp)!nM}p?fPW3x(?2`biMa1baHGy zZ+;d~MD3+LoVMzAWPyX@$zqy9l)i+@)OmQ%1k7#o*9*%8Y#+94blStosW8^Ae~u^E zZ8&e=oK4)0v$wLO7G<|;mAG0xS#^$Hb-Nl;w!PE$tf)NGqCm$?>>vGjae2P;u41wj+4bm(QzHuV$`Mv}DW%xvbt!@u|MxA^TcNb+Ofrr)9 z?|RZ$|8BzH6k$ObJ;RnKxS>j_w?_#c?ROaI^Jltx6Iat`>)K%L|K6c6U~x9K?9TA# zn+t{xF0+hh1O#w1C=l1R`qKYzd`Xa zfr6FYECXZBG)Dy^&ey5u)gJ$s(+S;7(Kkje5FVn+!YGI1E3l(FMTU->VyO;Ji?Viwot2eS(q{@{p%!!y&7mm*At6pun|USu92T}^OqX{p~m+Z zs!K2Tt2CPwIiCfXN8vFwccWP4pDcrL?yC+^<-MV~sM9`-C?CQjVZWP5bAXz&;N9}* zeSkbfBMna38xH4+IAB1o4rR9$y|ReXK;X;^(Zh*Wh!4 z;)01s*0CeRI;9_&&N{ZW4ZO?D5uR5cUb0qrI*Dm3h3mNMT82}|4Zl=rxaM>k7>#cD zO)wlw>F#rh!Jc>Fv@GF7z1A6&ILj4Q?@|N->ANCc@6@=N;Rha1rh16@P zt0!@0(~}*Wemj|kkcIeq5hjY$FHVLYXozO75v1o-0#+g0O4A;p6SqI25U%?t5>xv6 z`d)>JJ1%uFNbU?_hW#O=huQ?VL2OKnP`VvEf5q!9!H)ut)5_GySTjdQHCPQ>2bh~$ z1+xD4%;vn)VrkQy6Zf6zpFA0GE0R=w6ajZp1x=Ou0&jt*ZDdg z+x7t9zJ$2mru1#TI5H%P?f?8E~)sV75J%4iTJHwU$9(4C?x_a~g zU+}p}zEHK=Ur?a_$iyI1ljFM1XZ!u?_sqFm zFJG5QUH-Cxh!Rcf+#OoF=5;bJ&t!AA-O(D|kGwa|P*XFAm?=zIT^( zs3;V3mY)@>1!U~)fKeJ5{-W?qbFhl9`ET}bhFhqqV_NB1nEHunZ(v_ZEraeo*+}V> z$KU~Ort_t*uf_VW)$|?Y9)yLCbIWj+!beUp29^K~1ZT@!F?9@At^Gn^|O(}Ms!j3d6{umRR zv(!nl$hp2pwjoTBLyS8nVW6~4TFywjO4Sy%bzYtMaI;6%>_?>wA4PX6KNftzC&iS& zbc0w$eWghEs-~|G{lXIc8IoP<+n+Hb)$G5O_TJ%C$N%4W_Bv$6v1eAsv9hUb$t+|Z zBctq*EwXpguw_M}$W}NuksT6|O(+@J?&ta3_jTXD-*w;DeO(m7nXURj1+AfsV@hP{J49jE(Q!TiO_5BaDbHMwyQVZFeiTjh z&eRO#6X{Df*4~VUz*w(psX7e{5pl=#0#OotLR(L@K*Ag<-RL)dCgw8P^Y39I;-9n$ z`c6L>t)%nC`I8{lmp)BJ5iYzE(o$YzrtiIwZa{;y4_(jsL34^ZGAu;=rBIB!ppRwqN=5R@5^{@# z(6~e|Ed0~)6v2Bm;)j`!ohvm*E)F*)LB>X!&B_xj)6a1VZH`;S^bjOc(9I&N=%(y~MavGDtW+ zDI)idOcD&kc@f+A2p}qXdhgCtjj0+g`90ZdpjeC+>!&VIrutpKKmnl;%2)6@E+Hp!C6oy&sXxNFL*=$lyucsW>6987{S{tZX-D$)G$C6IK<&yaYPeRF)=#=*h4H*cKV69ABZ%N8~Kn4*L}TC z3gZ~IiZ8NpxK9!u07o2uLMT=4&r>R75*dP~kE#$RmD5h7!?(1x3%Nf1DI&B%e}$40 zR%3~4Sfa{LTok(S66{6LvR(bD^+ECTby2%INi z8DU3~u6+jKoT@xRY)Hj0vMJ4sL+f`#9Bt--_%}|L!K>-#w7T{+WS9~*Gzb6>7?!%! z%GQC7s@@GBn+WVkedO_mn2>E3!d2(*Z#&i}z_QlKyh{Ex&oC($pGZQZ5{~$JJ|~8W zsP}mngnMtIS64xh#w_j5e(#SK%sH1Y>l4dMHpj*R;>$U!vLt}N433Uzt<_i@o-yx2 zmxy`&6EpY(uL+8ZK(7n7PqoaYvj8^M`yJzn_rzmRMf<*#yOEF7Z~w{TK_zT~7WNeI z2EK6P8PKQV!Gb7e&}F_`fxf<+I!6K?h^e}O2WG?BWpZ5av^;&r_+(q`TA!53g%}#0 ztRNmNONbaDevMBLz&hZ68K$Vqxc!iy{s($KQG~7Ee8;P?A_7olnahuMV*G>l^|T3@ zDLHg5!8p(^4I{RbfW`s<8`YvVBzU4<&)cD9LN7yoghuK!Qa$gK#bTPypT)ZXjYhja zWV>-P4xhBO@j|$C*oT`Q+8Yn2U(9@t$4us4z=pJ9Rn70@VG0fMySauxlA!Wa=a42V zu#3>bCxzot*^jv;TzsC+198ZV23Jks>HOh0T86yMb10FUiJT|=11w5Cd@%FYqV4n*9HEgx&UT*f>{UHAs zS{^Z5teKX5SUqKn4D^wcKM#10#d(iyQUAy%e(eqPEoGVUqn$9BW}2m5+O>@bEK`*y zAVzp^j1dx!|Nt#$fOtSn|~_CMX(PHM>l6zakFq4vF5YZjcrUD&q$7i@pN5$(;%O-uKM zR_{OBJZG21;L=kBAuBU;*2_K3-X~9<>#M%w-q+W|;!z%Kw{0144jZMA<1$6V^ zld${%M&mp>Sv^zGe7|2=Iat<$Kyk3Jb%*h}RTs27z!v-1-lXlB8yg!Ic zjgQtE>i6Idwh}CkjadBebTN<{j{?g;xWHeD?6ppYMDOceV5!2iy*9-%TBN5Gj6+}v zuEsljo`eYA9tKV@9s>vg?v%(Va^qb}r~B~nZN=Zj+=grZc(YwkaRqYYfz#hM5bloYvYALd9GPdo_9rz0HEFMsZ;wD9THK=XAg*4BY)H zxV+1=%D->Gurs~rYJXVBBbet+bgzYTp>*1Uxh_uY;kMgU{JuRvCV2dx8AOog4}#_OCzu1akUiFZ z5ZM5dp!OI-So8}tyb|U;VNSp!4-gF**iMN4q}!&2E{**&$L>$MD}li6T%Zuhx(?$L`X-Am&Jhsb zqP*?;GkCRa6bEj8aU_+K1JFefe6e{1Bp=bVW(_on%SaDgpRkY|MLCB?{||VOPN{## zNSL;&y5qO~aAGz=GHzSx{V8iw=O z{t}v&N!FWhRF&cN%uTW;e0#v1OxYSgDPTA`{Ogk9=qg;gI7?E`lnuH|Knf8x- z65Uha(1-+Ox}nQc{$AWy!VgHkdgDhO+6kt0a}bhk$~mR6X&L-D)UwBtauA6!g{Z+! z%hJnVm_J;V9zx6SqglOrZfUUtxOhuPf3jXAT7-ag0vuFw9`kUNOw_sNtotc0DE#9o_pVDCOD{0ec0 z5~(%96HZV%Sv~nHzgCj3J%IrD(M={J@2!+dtMcn_T0I05Pgejk2!FkZofoe2v)di1 zbul}xRfy`csS@sRBZlm7;A~^V9`Pw~eQUwVdWU_(?kdS)5~f0TgN1Q?8#b9{#r$R< zVM-iOK0nY<@}AIsf397d+H}^%x*(N^oga01wE7VR;VVq#?8-_)aFrQ_Ls%yI_^vOX z6;K03J%O}Chf{IB&B)Ey^`ZcY+fK1UZCjEQ*mm_3$Eg7V2NfpD``{A)BVY=dvv&UB zv6I!KW@%FzNm&ATkv4F0Frf*?R?=LhbB-EwtLeh7`ea1itM!E*#{$}e#8EnHEK+gX z%Qfj{JAH*9Y4zvylS=h+%~Pm1-I^Z-?J%-A`$%;02%#dlK2L%kVMDUZ@_&R6Oiw|F7E}zC-jif69&e zX#!fCJY&>sCkHifi|zkzt8e%-;}HBQq&pv0lw*59V&pDtZpz^5Pl`bGO7uA~whUhG z*5!fJLELb>8cnrwFnY0l?TJxxpSw`Qya2h|J>0ep;`ak~19TtbaLUN@R4t0(hEq!i zn|B4p)!?(kyt~hmBR?CW zXJmh*i<2L78i!pM`o!o^VV99p*=15!hVyxHoxr}U8vl-(F_PlGis1`?(Dy^bG^I@B zs{cbkjCr4{%B2qDAB#A4!Xny&yr2JMUXBaBD+=8Li2I~}S4f0?!MsDSRCV`zT+<0_ z{pFFNmN+R>i|4_~N93bVZ{Dy;E|!8rEp5YSmutpVk3Pvbq~#>Mahbv~C$P&9&DW)v zF6G8r?!jsQ%e2`Vw|%^=v*K{3L3oJzxG`i-IEO-9`l>0#X$Iy`X7xQrX-D(eV@@Is z{#sE3hkx@=QF!erJl=R;%xyW(dATR#G{~LeXaA^?M5UBsVoG$Z(1`U-m%5d){}gEUgtkgY92LuatrpoB)I253{)ZND~&M7+xAC z)U@85t>;O&di zDp0Gz+SPDMRS(DfdDYv>s*e8jgV@d@r57h&A}Pn=Gvh17vcJ|F)pS9nsCF+8{HS8> zwsd6)Jn~v^9ZIAiN7x-fztT~PSgc`*njO25_DR$qsjyZNcTW5B3N@TJ7@BXI%n)$r z{2an1GW%@*eHiliD52`VQ}`@hF<6#F=L^)M%eh_KGaF`siIdy>2a%|D|7Fyw6PqpL@Yq(c4 z=dw9$W?fcuVT>jy7>ICA5ic01$l7(dk-CdV-5yCJz!+pk*xh1ZB1QnG)#ezKfWX|$CXiwF( z;M=~H0!yG%wG8r&xZ__70sYa8^-L@G=pHiu`104|@z~`mn3X!qd%`tkq4H)qX&zEW zhJa9{-38i1?)yFb*h(Iap$Nrv%eC^OAA*2vj{aSdAWDP&c5kY z{QePBbm>hJM8!QMe`lHmbs0|SjzljGg)$<{Mq7@n$YVs}94LE$zFN$cWkPzSGZTyrwx7^^JXhmDfM*{#P=uz*b8n&_ z0{?D6HVH)6`)rNTqkIxn*Z+S1Ke1!y2LBWI0*)J3f^no|Wv33A%r$g$6g}o6bkAcV zg*U7;UF~daY&K?D-Vv8dC$o?4-96er=X;Wo5dhZ#u(cC=v_JD0m|EYgx*Oj=62+mf zY%!w0ae(`XE)DJ`AjR`LHEbJ%&=%%F-OH_bo=%U}esf_naL||w|2idctAH4s=3ABW z6`H8PSkd(T-$f`Gi)YK6Sxl43TC{{T6(bA202C<6%gVs;txz)+M*5TG&;|q5GYw0I zJ>OuH(+9Ud591>~uSnZ&=p@$y0ONz1vJ9YC8B#!Y2j5cj7$$O(1Sv~gFP1-%822B! zp4+LiJGfp;L5!Ko?(Xh@ga~ERhspS?kHJJrfma^HcwisCKllfcI-aFV+A9D4Jo^)3 zLJv)x2L3*FBk?8d(Lg4IzvR69T=hMr6gx0)`0172VP3p($_c+4==vw%=JyAHACDYE&npzS$@tQP;ekJJv57EulVN(?F7-4>s z*a|zY3)NK*GD2}b@aEc&8wCWFS3B(*PDT+TsTrOaFgQP4)Jcwu%SW->_LC@x@xtiY zmK8(+aDZAjqAS3YP*!RgREx159GH0Vr(?sK}V}lokUd-+CD-Qs74kQ(2hQgZ# zZ$q20p)bts^5T;K#8$h`WDtd!IrJbO0?6md*ZV4J`M~`Q+^2n4hr)!@q-c<=l*wrx zt#Fyt(Jz_tT4HkYB1F>=u9{84+g@iRyKZ`rfX&6k0yBB492S|YJ9Z-naA9*K zZ8t$xW1NSi@1>bJdr7SvWf4a??_iKZ5_U^^PuDvhErOJyNMG@KK%RWAY9`&m{^3K1 z?=!Wd0|_p^-)9DNiXR#Y=6@wE>U>!2qhI`;>Os-Sl>RHnrdK7Q27gT7zk2ofQq7%f z0w!*%DoZw0amL*E#N3p^Bshz7?>xXD<+c9U{bKcCir>F~It?BUyiEO_6>%Qej8AjI z7@v_e6+s=Um64sD$mt397k!=$obXw@F|J+M4qPL+8*HADBmQ45Ulmw(`cCxh=dy_! ze}}7n&L6AW3@N%Lik+RE#7NqJ1X3Z8A+}#&wwh{l@p7I`eq3-(;f95r<8h&+vzD%| zdS@$7f>96-Vx4DQB+5Fs6}_0&WnHqGEFP*At(HZ;UHM0Yo*8$b%Xa{cvdREy6n2(^(%GMRQ9 zTLa&3es_Ly``TPoCSey?eK03W>)W!0Z_u9IU7JgzsZgB$Jkw77Ecp z*cE=~WI{1KHYuqq)TOCRnL2ki(t1wEBcRd&fv4OiHb6MgaGLOQc@hk0E*Uee#@;cv zn|l+fNI*cqDJg27KsVzqNQ{yv^>g>oTMcKDRon{3BOKKA&Z&#Y%h?~V=sPcBak~Pke-h-pryxAfbA}HU)Biw zJa)hbE>udSop zT|fDTpp7;q1An=B^C#HC$4X@CE}hjE?vUKmS0NVQFJ&riP(bUg=`D9~=+*^Gh7u#a zuRWTc0f5l$GTL2TLtXF{CeO&G&O|M^PNYN9J$|nFWyj=)jw~ZltFdtjvqAc4%y@*C&33P& z(N{xn+KXD_ZV;KVJh*aSL4ap2fMNJCJIs9m;ox3%}CT4sCep-D4R)6^b>#S6a4T0Vy%rG z8}u=A5`;uVwz7{6!}5~{kjSl@%#pU3Nu?p0>q()lv^0@-s$XRir@>TDFkTIxRZE`r z7Bjn6i^kn)vV1aM-XnBB41ng_6OL~rcHy~PL}m#ixd$&4`U6F$r$>XfI};yKO0xdGXyCyC?fiuxN- zo~HV<5h(;;42x(;;j@0YYJ2WH*NhWxki-~Gr_JU5Cdn}3j2O8w8(>R>BoQ+U3ct`5 z`l{2PrrR$yw3X_oQ9W0+imGbtXds*}+iCNb?pFC*3wf=IqH8M0f0z0?Gu3)XsKljn zr7eGjxVRVYCogy6#Wm0-IfBk%J^HS-H?#1ta-FLBepHIRPAXm-9cinBbobG40*q zF}w+Bt#c&dxBN(dKAT6vI7EePKT5iT-9yK@j;E2AZ(RX-5>OBW$My~=C~m~iE#`iFvprypIRYXXZOI~kAk4*2{HdE5Zn&tQ~FQ!8ipRv^I2Z1RKBDv#hh~B9qio65^Lw=t*NJZ5@yMst;Y43B^PmS-z0S>> zH2inW%@gi8w~3A14$7qHVrONv;~t1|={EAa=D{;eF;AuLun`0!MZc&yst#qITATCv z-6=dm1rKV}Osi3rWr`*)D^CP7VN^G6APr8qU~4K-Vvj%qPC@4m<=~YBy6#Bciw|Q? z+69j0%HotMD@cAuyGox=Mi_>vQ0ZEjlg5ZA7z!x%TH$k#&>IWPFRT2+RVC=Rh-d^t zn(#Uc6+8OLm82aRD%8Aec!?4kb8^eQL16BK@uziFZWKBOiF%Z}e1+L+njNF7=yt8 zV+_o@yWQ|0ezbufg_d=hom}18+M1sig9IpE-eRD4Bmiq*c6QcIOfx$sM#El<3>n^v zf{`jjLtO?pVL7>v4Gj#5k&%(Wtjo#C0Uz%G9UY1m-={IF6neKY>^ecg!6}?EFCH|H z_u5oGd-)Q2XQXJs*ZW0AoSaV+^Kr2Tgy4MuGWN#h2l$(mLNIII`SVkC^m5Lzypx)$`vm}+Q`U=lnV$}RoJeX$991-aT1Tvu%zW= zNhIwwMo~rO6l&fwv}S`!=bv^y~;_Tk~7CiWMlf^>0V0Za{TFQ!2Q%bOcS z&HtEAMC3j6d->msb3;HUrdN&r1rkbC%&Q&X-35W-@r)mbYR~I4Ng8-CNXyARkYIE= zCCtdkphSVQ^hhHfKEj~m>({+VdP_*He&1{Nfe3r8tGwg=w!GZO)3fy5yO8xa#V8l* z#L&>~y}fJ+Cj(F$jj5=NCG+#5KY#u#FE9TzHMMAuNjmtbIy3V-Tn7q$i1rz@)zzb0 zS{|vWL@1ztfEO#o+YFPV)LRAq_HUoE;`al`=(JyaP~z%Uty}Qk(>!rs=jF9_cRK(j zPs-ng)SvRwB}t$Pe)=T;rZ;RM5Czk`Yh9Cg_5j3y{FN@V;s{bHpFewcvR~Ko_19iL z6(tIgX^8QGcdDYISq{JSxhF0mj9Vd#{11qrADmGoSm^5y!!(WR!pPBAN)%kszV!59 z-*|j{A9TmihcY$)X(I!Y%RA}GO(2(nhl4?&kjud%~J0da?KWW~Gj42bEH3VX zb$mcTfSQU*%qRFMxocrKT*$;OsD1X3y;fATw7h)3#`LV67QUxhiLDI2^mtJ*F?Ow? z9GskYp}@pw&>@hp;|Tt@FUOIm;Wqhql8hEctV{VCeUY=9e1Cs!<0o$iCDn`!DFW$L zcX>BvI}f#|OJ8#4YB`*|On1tyv6tN1`QGL0*IM&)!xynJt3<`sp~F_|tW{0x#%yo9 zAH7pDnVxdoy1wv6%WKHG{ZW}Ku08LPz<%ka@qom%aTm2q{ZTOPwu* z-zH|a92aiX)N56)msD2+VE1OLJSN6964qyJ(f51G zkq;7#3gfkkGJp@4`UO}I5DD;oW+u^J+fVHj-X=wfsf*MRU4CbKyK<1NiLo)gtEA)5 ztD~cUvgPGvLPEm0_bgnT`DTS#p)zKp+amE}nk$)=(?dgZOG}qWRNZ}j>8%X>Ur(LP z+3XQnnIHS4HZ?V!ot@X-O+Fr#{-f7fp@*gp&2EWl)iln zh(9XN9|U$4aiLV=K>0vG3N7Zwy?aZ*U}m>8;AvBM09T)Hs4pxteQd=!PJL)WUf#aePmhe1!69Xh=@32Ioh)Uzk~{V zu&y%~Srh2+`+-aCT=x;KHIHF%ysS{s>U~7=J3m*Kh68&$ zZhRh2P7BDuDq84H{kk85QqVL~~ewwG4IKUIykW%_Ek%&CNuTTWV@inVC$mbywy11<+F;1xNSCf3#?v zZVw-g54=6gyQlkmX|Zkj+|pQ4Ozmxpch$uNFb)sZ;XNe@H7y4R>SU9v>Dpi@r~V)1D{nGX z|IKX(#^vDPfIAXI_rf*Z!op(YDpa^!T)fv+RoH|+sGh>Y!eDsv(9@Gq%&rGq8%|D7 zZ}Fs##X@O(T^%ZlM1XoP0Fs&EnS7|K%FHac8n!YqL0-DFw6=B#oY)npy>V^{P()?m zgQw(eZf@3~Qn~5-?@n&7Tcye8zCNhk32DRkYYeVHQ>LbmL&L_V1X^$CEI4!uU%%xr z1*C1|_ivGMt3eQXvVGY8^XEy1u$3?$pC2&ZAa>aZstY8h0(EbpxzGhZ28GWg$kg7& z%}s@SpPw-mk)aLE&9ma;$zDqvq=rvTnZh9j671NoFs2IunzE3P5EK`UY_Ok@pu2Pl zs|b*4Amikuh8=XjX6nlqAq52s)0VLLc^h9}-~JnLu!HHAS%YU$wau|D4)-{y9bj}v zgg}O7gI$vYfVmJ^5}KTR@u}K6G(ZytP~?FA1uc!+dF=vIYl0m}=tDw6Mvg8yvMB^q zs}-b-yF8Kl`ST|^IXU!zu=d+=ah-vC0N;7EtF7YwzgicoRLWpUNl6YgE-r52-j$5Z zOf0dj$x@{JJD7F^Kr;pf2&XUxTROg>pBXqZsZJN+#({n z_Zx9DAhilJH=0=KsE~j}y*q(&+u>?b|EMoc2|B@7J_eFGHsSyDNq~ zyp_GiQWs9~$BC!9=^oz!n_^5<6U@|pU0p3PtfQhLl~)pqW2bFm0<+(C6ctv8YiLNr zxU;hp9v%*)e;IJgh^H6vJiD&qO~faJeg!YX&+i0G2UzG(S9ElAz`rHGxYz;uwH_u; z&PF_1BSarpdtR4x!N`z@4CG)q>i@#fDysrzp(-6M)GPi3_=OSaMy z;!$=C;=TU6_U^~J3Wm+EUuGN+wN5uX__l*~o|KSEG}jdq{yWp~>vena?BMm7rP#lD z*5R|`JNI@dnEt-)FQ~f%M}^BNzn04; zo6J-_ka#P0YjXWVo=yLLY1Dqs0P9UVo%TL6ZxQD*WL-h&r@WiC>x>MBq7T)VVjMT; zdj8@z9bWV3OYOV)XwQR$V)2GWw1hNg{zt8JoYc1u&S!Y<^+tXnPJ2YkuV~?-wxDSt zhpT2W8>=z-bRy=3FLi10@3)fG`$2~HHlKJ_68MM9V4m9U}Rx7pBont%MY?^EWVFPx|gec60^^3J=u%TnEa%+ zNIFF&P$M++o7Xu0KGaXvcbl=hKKy9Usf+VsO|Li^J<%mVMOGH z|Hje%S*?`AO=?a!;nMzm+NXU(He-%sR`~rbLL!&UR54=`zR?ay^={)AJmKSCeHZ?QMzEj2FD;b)AVz@MW!Hg~rVIS2_E@JIyXS zToM_9vnOSx*WAu>%Vnu9B~j`;GB5TItYZ~N1Y(?Jze>9&zV1OQh^O7uZ1B8{o|bx0 zB`{Timioeh{xNA3i+ZqDO|h_3^^y|B7NkEqb+}orX}jKL9f$Yrzz6RI14_mFV&i5g zq(wVG94{bKRUbZpV^}?4tzfS)Ha5LhH~Rk9IG(+yf#g*3i@R@6)UC#E-K)XKdSxt^CNhME?dKqKxkyI+J@7ko^^31el%+yXzIdHH!|HZy*-z{9io#!0-OEx9Z zU&|9W6(-2j_GHMZKiJN30(!$Lr@)U25j9acmug<-O{a_YO}cEUj{@ zr`7F+iQ7TnlX*m<%$hCT&vN*+P+tm#R^xlMl

            xch^FQ&v_MTz+e6Y9JGA zXmC)3hvzl0qe@DMy)uBR4BlzF>%mgbq`VKe%AYSdoU9xz%6gLC{9gF| z;76dE`F55QA`BM6*=qcLjfo`=ILv7_`?28Tgw6e5 zDGS|0_fOya9t{yWn>?FI@K%e7*(&|+cacX)=^Tt}x^YKT%Z+UFii^9yePbYl>?~G$ z@o_leRIb)BqVC+e1LlsCjXqai0IL59^k8tMf`0t?=qUd(I6#416WsM`o8ianm{E+0 zSdy}f%XrK4^^Fa4XxG3_3VcWHB^ZZoDoq~#{s9ex%deZzH}&C!>tPMa^z?>6zh-7) z!dEl($^)+b&@}Arjkl~`=Hz?~eOwU&Bf4WSdzgb&bo9MteB{ufw z6zkV|Q-{yO5j3_*N){b+q13CK>t#opT^C(1N0dtN=y}22;R+(3K P0sd*K>Zm{<%H#hAsbJ?a From f4f3da4dbaa8368d6fca35a845246928d0d424ea Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Fri, 26 Jan 2018 23:46:26 +0000 Subject: [PATCH 29/91] Merged PR 5529: Firewall CSP was added in Windows 10, version 1709 --- windows/client-management/mdm/firewall-csp.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/firewall-csp.md b/windows/client-management/mdm/firewall-csp.md index 01c9d509c3..1330e71e5a 100644 --- a/windows/client-management/mdm/firewall-csp.md +++ b/windows/client-management/mdm/firewall-csp.md @@ -6,13 +6,13 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/07/2017 +ms.date: 01/26/2018 --- # Firewall CSP -The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP is new in the next major update to Windows 10. +The Firewall configuration service provider (CSP) allows the mobile device management (MDM) server to configure the Windows Defender Firewall global settings, per profile settings, as well as the desired set of custom rules to be enforced on the device. Using the Firewall CSP the IT admin can now manage non-domain devices, and reduce the risk of network security threats across all systems connecting to the corporate network. This CSP was added Windows 10, version 1709. Firewall configuration commands must be wrapped in an Atomic block in SyncML. From 1c0795300df495e4cecbf3187643cbde7fed1d9e Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Fri, 26 Jan 2018 15:57:32 -0800 Subject: [PATCH 30/91] fixed formatting errors --- .../set-up-office365-edu-tenant.md | 2 +- education/get-started/use-school-data-sync.md | 88 +++++++------------ 2 files changed, 31 insertions(+), 59 deletions(-) diff --git a/education/get-started/set-up-office365-edu-tenant.md b/education/get-started/set-up-office365-edu-tenant.md index 2427878df1..3fcbd5064e 100644 --- a/education/get-started/set-up-office365-edu-tenant.md +++ b/education/get-started/set-up-office365-edu-tenant.md @@ -23,7 +23,7 @@ Schools can use Office 365 to save time and be more productive. Built with power Don't have an Office 365 for Education verified tenant or just starting out? Follow these steps to set up an Office 365 for Education tenant. [Learn more about Office 365 for Education plans and pricing](https://products.office.com/academic/compare-office-365-education-plans).
            - + You can watch the descriptive audio version here: [Microsoft Education: Set up an Office 365 Education tenant (DA)](https://www.youtube.com/watch?v=d5tQ8KoB3ic) diff --git a/education/get-started/use-school-data-sync.md b/education/get-started/use-school-data-sync.md index defde7ed8e..a370bb71b8 100644 --- a/education/get-started/use-school-data-sync.md +++ b/education/get-started/use-school-data-sync.md @@ -25,10 +25,7 @@ Follow all the steps in this section to use SDS and sample CSV files in a trial You can watch the video to see how this is done, or follow the step-by-step guide.
            -

            - +
            You can watch the descriptive audio version here: [Microsoft Education: Use School Data Sync to import student data (DA)](https://www.youtube.com/watch?v=l4b086IMtvc) @@ -62,86 +59,66 @@ To learn more about the CSV files that are required and the info you need to inc 2. Click Sign in. Then enter your O365 Global Admin account credentials. 3. After logging in, click **+ Add Profile** in the left hand navigation pane to create a Sync Profile.. This opens up the new profile setup wizard within the main page. - **Figure 3** - New SDS profile setup wizard ![Screenshot that shows creating a new profile](images/03bfe22a-469b-4b73-ab8d-af5aaac8ff89.png) 4. For the new profile, in the **How do you want to connect to your school?** screen: - a. Enter a name for your profile, such as *Contoso_Elementary_Profile*. - - b. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. - - c. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. - - d. Click **Start**. + 1. Enter a name for your profile, such as *Contoso_Elementary_Profile*. + 2. Select a sync method for your profile. For this walkthrough, select **Upload CSV Files**. + 3. Select the type of CSV files that you're using. For this walkthrough, select **CSV files: SDS Format**. + 4. Click **Start**. 5. In the **Sync options** screen: - - a. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. - - b. In the **Import data** section: - - i. Click **Upload Files** to bring up the **Select data files to be uploaded** window. - - ii. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. - - iii. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. - - iv. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. - > [!NOTE] - > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. + 1. In the **Select new or existing users** section, you can select either **Existing users** or **New users** based on the scenaro that applies to you. For this walkthrough, select **New users**. + 2. In the **Import data** section, click **Upload Files** to bring up the **Select data files to be uploaded** window. + 3. In the **Select data files to be uploaded** window, click **+ Add Files** and navigate to the directory where you saved the six CSV files required for data import. + 4. In the File Explorer window, you will see a folder for the sample CSV files for the UK and six sample CSV files for the US. Select the CSV files that match your region/locale, and then click **Open**. + 5. In the **Select data files to be uploaded** window, confirm that all six CSV files (School.csv, Section.csv, Student.csv, StudentEnrollment.csv, Teacher.csv, and TeacherRoster.csv) are listed and then click **Upload**. - v. After all the files are successfully uploaded, click **OK**. + > [!NOTE] + > After you click **Upload**, the status in the **Select data files to be uploaded** window will indicate that files are being uploaded and verified. - c. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. - - d. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. - - e. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. - - f. In the **Student enrollment option** section: + 6. After all the files are successfully uploaded, click **OK**. + 7. In the **Select school and section properties** section, ensure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties, or deselect any properties, make sure you have the properties and values contained within the CSV files. For the walkthrough, you don't have to change the default. + 8. In the Replace Unsupported Special Characters section, checking this box will allow SDS to automatically replace unsupported special characters while the sync is running. Special characters will be replaced with an "_", and no longer result in an error during the sync process for that object. + 9. In the **Sync option for Section Group Display Name**, check the box if you want to allow teachers to overwrite the section names. Otherwise, SDS will always reset the display name value for sections to the value contained within the CSV files. + 10. In the **Student enrollment option** section: * If you want to sync your student roster data immediately, leave the box unchecked. * If you prefer to sync student enrollment/rostering data at a later date, check this box and then pick a date by clicking the empty box and selecting the appropriate date in the calendar when you would like to begin syncing your student roster data. Some schools prefer to delay syncing student roster data so they don't expose rosters before the start of the new term, semester, or school year. - - g. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. - - h. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. - - i. Click **Next**. + 11. In the Default Term Dates section, You can set default start and end dates for Section terms. These dates will only be used if you do not provide these dates in your CSV files. If you upload files with Section start and end dates, you will be asked to select the format of the dates provided. If the format that you enter does not match the format of start and end dates in your files, you will receive an error message and need to edit the date format so that it matches the format in your files. + 12. In the **License Options** section, check the box for **Intune for Education** to allow students and teachers to receive the Intune for Education license. This will also create the SDS dynamic groups and security groups, which will be used within Intune for Education. + 13. Click **Next**. **Figure 4** - Sync options for the new profile ![Specify sync options for the new SDS profile](images/how-to-deploy-SDS-using-CSV-files-2a.PNG) 6. In the **Teacher options** screen: - - a. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. + + 1. Select the domain for the teachers. SDS appends the selected domain suffix to the teacher's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The teacher will log in to Office 365 with the UserPrincipalName once the account is created. * Primary Key (Source Directory) - This is the Teacher attribute in the CSV file used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate source directory attribute, and properly configure the identity matching settings for teacher. * Primary Key (Target Directory) - This is the User attribute in Azure AD used for SDS Identity Matching. Watch the Identity Matching video for additional information on how to select the appropriate target directory attribute, and properly configure the identity matching settings for the teacher. * Domain (optional) - This is an optional domain value that you can add to the selected Source Directory attribute to complete your Teacher Identity Matching. If you need to match to a UserPrincipalName or Mail attribute, you must have a domain included in the string. Your source attribute must either include the domain already or you can append the appropriate domain to the source attribute using this dropdown menu. - b. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + 2. In the **Select teacher properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - c. In the **License assignment** section, choose the SKU to assign licenses for teachers. + 3. In the **License assignment** section, choose the SKU to assign licenses for teachers. - d. Click **Next**. + 4. Click **Next**. **Figure 5** - Specify options for teacher mapping ![Specify options for teacher mapping](images/how-to-deploy-SDS-using-CSV-files-3.PNG) 7. In the **Student options** screen: - - a. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. - - b. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. - - c. In the **License assignment** section, choose the SKU to assign licenses for students. - - d. Click **Next**. + + 1. Select the domain for the students. SDS appends the selected domain suffix to the student's username attribute contained in the CSV file, to build the UserPrincipalName for each user in Office 365/Azure Active Directory during the account creation process. The student will log in to Office 365 with the UserPrincipalName once the account is created. + 2. In the **Select student properties** section, make sure the attributes that have been automatically selected for you align to your CSV files. If you select additional properties or deselect any properties, make sure you have the corresponding properties and values contained within the CSV files. For this walkthrough, you don't have to change the default. + 3. In the **License assignment** section, choose the SKU to assign licenses for students. + 4. Click **Next**. **Figure 6** - Specify options for student mapping @@ -187,11 +164,6 @@ To learn more about the CSV files that are required and the info you need to inc That's it for importing sample school data using SDS. - - > [!div class="step-by-step"] [<< Set up an Office 365 education tenant](set-up-office365-edu-tenant.md) [Configure Microsoft Store for Education >>](configure-microsoft-store-for-education.md) From d895d558a4a20538ab86e5236e584f02151aa434 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 26 Jan 2018 16:01:58 -0800 Subject: [PATCH 31/91] added Edge entry for Books Library --- ...windows-operating-system-components-to-microsoft-services.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index d6fbb602d2..596bf68d1f 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -522,6 +522,7 @@ Find the Microsoft Edge Group Policy objects under **Computer Configuration** &g | Policy | Description | |------------------------------------------------------|-----------------------------------------------------------------------------------------------------| +| Allow configuration for the Books Library | Choose whether configuration updates are done for the Books Library.
            Default: Disabled | | Configure Autofill | Choose whether employees can use autofill on websites.
            Default: Enabled | | Configure Do Not Track | Choose whether employees can send Do Not Track headers.
            Default: Disabled | | Configure Password Manager | Choose whether employees can save passwords locally on their devices.
            Default: Enabled | @@ -548,6 +549,7 @@ Alternatively, you can configure the Microsoft Group Policies using the followin | Policy | Registry path | | - | - | +| AllowConfigurationUpdateForBooksLibrary | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary
            REG_SZ: **no** | | Configure Autofill | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!Use FormSuggest
            REG_SZ: **no** | | Configure Do Not Track | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!DoNotTrack
            REG_DWORD: 1 | | Configure Password Manager | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!FormSuggest Passwords
            REG_SZ: **no** | From 9b4d4413678208e602193377cbf99ebe869eec9c Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 26 Jan 2018 16:13:15 -0800 Subject: [PATCH 32/91] added Edge entry for Books Library --- ...ndows-operating-system-components-to-microsoft-services.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 596bf68d1f..1496428e1c 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -549,8 +549,8 @@ Alternatively, you can configure the Microsoft Group Policies using the followin | Policy | Registry path | | - | - | -| AllowConfigurationUpdateForBooksLibrary | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary
            REG_SZ: **no** | -| Configure Autofill | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!Use FormSuggest
            REG_SZ: **no** | +| AllowConfigurationUpdateForBooksLibrary | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary
            REG_SZ: **no** | +| Configure Autofill | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!Use FormSuggest
            REG_SZ: **no** | | Configure Do Not Track | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!DoNotTrack
            REG_DWORD: 1 | | Configure Password Manager | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!FormSuggest Passwords
            REG_SZ: **no** | | Configure search suggestions in Address bar | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\SearchScopes!ShowSearchSuggestionsGlobal
            REG_DWORD: 0| From fb329270dac285b31dfa5a24c9d136ef3cec65c0 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Fri, 26 Jan 2018 16:21:05 -0800 Subject: [PATCH 33/91] added Edge entry for Books Library --- ...windows-operating-system-components-to-microsoft-services.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 1496428e1c..e8615361ed 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -549,7 +549,7 @@ Alternatively, you can configure the Microsoft Group Policies using the followin | Policy | Registry path | | - | - | -| AllowConfigurationUpdateForBooksLibrary | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary
            REG_SZ: **no** | +| Allow configuration for the Books Library | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary!AllowConfigurationUpdateForBooksLibrary
            REG_SZ: **no** | | Configure Autofill | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!Use FormSuggest
            REG_SZ: **no** | | Configure Do Not Track | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!DoNotTrack
            REG_DWORD: 1 | | Configure Password Manager | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!FormSuggest Passwords
            REG_SZ: **no** | From 5317e4a58f26c6db6b97de8c6e8556654dc77f03 Mon Sep 17 00:00:00 2001 From: computeronix <19168174+computeronix@users.noreply.github.com> Date: Sun, 28 Jan 2018 22:40:53 -0500 Subject: [PATCH 34/91] Broken Link Correction Corrected broken link on this page in relation to Troubleshooting Miracast connection to the Surface Hub --- devices/surface-hub/troubleshoot-surface-hub.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface-hub/troubleshoot-surface-hub.md b/devices/surface-hub/troubleshoot-surface-hub.md index 71a5e73675..df8612a26a 100644 --- a/devices/surface-hub/troubleshoot-surface-hub.md +++ b/devices/surface-hub/troubleshoot-surface-hub.md @@ -602,7 +602,7 @@ This section lists status codes, mapping, user messages, and actions an admin ca   ## Related content -- [Troubleshooting Miracast connection to the Surface Hub](https://blogs.msdn.microsoft.com/surfacehub/2017/01/30/troubleshooting-miracast-connection-to-the-surface-hub/) +- [Troubleshooting Miracast connection to the Surface Hub](https://docs.microsoft.com/surface-hub/miracast-troubleshooting)   From ae600da0184420d9358d7ff188b2b81d8d16d43d Mon Sep 17 00:00:00 2001 From: Kaushik Ainapure Date: Mon, 29 Jan 2018 12:56:13 +0000 Subject: [PATCH 35/91] Updates to Prerequisites (4th bullet) A global admin is the only supported user account. --- education/windows/use-set-up-school-pcs-app.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/education/windows/use-set-up-school-pcs-app.md b/education/windows/use-set-up-school-pcs-app.md index 8a1a4c3068..21ac36db3c 100644 --- a/education/windows/use-set-up-school-pcs-app.md +++ b/education/windows/use-set-up-school-pcs-app.md @@ -110,7 +110,7 @@ You can watch the descriptive audio version here: [Microsoft Education: Use the - Install the app on your work PC and make sure you're connected to your school's network. - You must have Office 365 and Azure Active Directory. - You must have the Microsoft Store for Education configured. -- You must be a global admin, store admin, or purchaser in the Microsoft Store for Education. +- You must be a global admin in the Microsoft Store for Education. - It's best if you sign up for and [configure Intune for Education](../get-started/use-intune-for-education.md) before using the Set up School PCs app. - Have a USB drive, 1 GB or larger, to save the provisioning package. We recommend an 8 GB or larger USB drive if you're installing Office. From 5bf691e31dbf66ae40c024d59291fe773bae3f92 Mon Sep 17 00:00:00 2001 From: modcaster Date: Mon, 29 Jan 2018 10:12:26 -0500 Subject: [PATCH 36/91] Changes for 20180129 --- devices/surface/change-history-for-surface.md | 3 +- devices/surface/deploy.md | 8 +-- .../windows-autopilot-and-surface-devices.md | 51 +++++++++++++++++++ 3 files changed, 58 insertions(+), 4 deletions(-) create mode 100644 devices/surface/windows-autopilot-and-surface-devices.md diff --git a/devices/surface/change-history-for-surface.md b/devices/surface/change-history-for-surface.md index 9aa9194b2a..d2965a9e23 100644 --- a/devices/surface/change-history-for-surface.md +++ b/devices/surface/change-history-for-surface.md @@ -5,7 +5,7 @@ ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library author: jdeckerms -ms.date: 11/03/2017 +ms.date: 01/29/2018 --- # Change history for Surface documentation @@ -16,6 +16,7 @@ This topic lists new and updated topics in the Surface documentation library. |New or changed topic | Description | | --- | --- | +|[Windows AutoPilot and Surface devices](windows-autopilot-and-surface-devices.md) | New article | |[Microsoft Surface Data Eraser](microsoft-surface-data-eraser.md) | Added version 3.2.45 information | |[Surface device compatibility with Windows 10 Long-Term Servicing Channel (LTSC)](surface-device-compatibility-with-windows-10-ltsc.md) | Updated Current Branch (CB) or Current Branch for Business (CBB) servicing options with Semi-Annual Channel (SAC) information | |[Wake On LAN for Surface devices](wake-on-lan-for-surface-devices.md) | Added Surface Book 2, Surface Laptop, Surface Pro, Surface Pro with LTE Advanced, and Surface Pro information | diff --git a/devices/surface/deploy.md b/devices/surface/deploy.md index a05b2ce399..a52eef5395 100644 --- a/devices/surface/deploy.md +++ b/devices/surface/deploy.md @@ -5,8 +5,9 @@ ms.prod: w10 ms.mktglfcycl: manage ms.pagetype: surface, devices ms.sitesec: library -author: heatherpoulsen -ms.date: 04/11/2017 +author: brecords +ms.date: 01/29/2018 +ms.author: jdecker --- # Deploy Surface devices @@ -17,7 +18,8 @@ Get deployment guidance for your Surface devices including information about MDT | Topic | Description | | --- | --- | -| [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsb.md) | Find out about compatibility and limitations of Surface devices running Windows 10 Enterprise LTSB edition. | +| [Windows AutoPilot and Surface devices](windows-autopilot-and-surface-devices.md) | Find out how to remotely deploy and configure devices with Windows AutoPilot. | +| [Surface device compatibility with Windows 10 Long-Term Servicing Channel](surface-device-compatibility-with-windows-10-ltsc.md) | Find out about compatibility and limitations of Surface devices running Windows 10 Enterprise LTSC edition. | | [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) | Walk through the recommended process of how to deploy Windows 10 to your Surface devices with the Microsoft Deployment Toolkit.| | [Upgrade Surface devices to Windows 10 with MDT](upgrade-surface-devices-to-windows-10-with-mdt.md)| Find out how to perform a Windows 10 upgrade deployment to your Surface devices. | | [Customize the OOBE for Surface deployments](customize-the-oobe-for-surface-deployments.md)| Walk through the process of customizing the Surface out-of-box experience for end users in your organization.| diff --git a/devices/surface/windows-autopilot-and-surface-devices.md b/devices/surface/windows-autopilot-and-surface-devices.md new file mode 100644 index 0000000000..d4599d8ffd --- /dev/null +++ b/devices/surface/windows-autopilot-and-surface-devices.md @@ -0,0 +1,51 @@ +--- +title: Windows AutoPilot and Surface Devices (Surface) +description: Find out about Windows AutoPilot deployment options for Surface devices. +keywords: autopilot, windows 10, surface, deployment +ms.prod: w10 +ms.mktglfcycl: deploy +ms.pagetype: surface, devices +ms.sitesec: library +author: brecords +ms.date: 01/31/2018 +ms.author: jdecker +--- + +# Windows AutoPilot and Surface devices + +Windows AutoPilot is a cloud-based deployment technology available in Windows 10. Using Windows AutoPilot, you can remotely deploy and configure devices in a truly zero-touch process right out of the box. Windows AutoPilot registered devices are identified over the internet at first boot using a unique device signature, known as the hardware hash, and automatically enrolled and configured using modern management solutions such as Azure Active Directory (AAD) and Mobile Device Management (MDM). + +With Surface devices, you can choose to register your devices at the time of purchase when purchasing from a Surface partner enabled for Windows AutoPilot. New devices can be shipped directly to your end-users and will be automatically enrolled and configured when the units are unboxed and turned on for the first time. This process can eliminate need to reimage your devices as part of your deployment process, reducing the work required of your deployment staff and opening up new, agile methods for device management and distribution. + +In this article learn how to enroll your Surface devices in Windows AutoPilot with a Surface partner and the options and considerations you will need to know along the way. This article focuses specifically on Surface devices, for more information about using Windows AutoPilot with other devices, or to read more about Windows AutoPilot and its capabilities, see [Overview of Windows AutoPilot](https://docs.microsoft.com/en-us/windows/deployment/windows-autopilot/windows-10-autopilot) in the Windows Docs Library. + +## Prerequisites +Enrollment of Surface devices in Windows AutoPilot with a Surface partner enabled for Windows AutoPilot has the following licensing requirements for each enrolled Surface device: +* **Azure Active Directory Premium** – Required to enroll your devices in your organization and to automatically enroll devices in your organization’s mobile management solution. +* **Mobile Device Management (such as Microsoft Intune)** – Required to remotely deploy applications, configure, and manage your enrolled devices. +* **Office 365 ProPlus** – Required to deploy Microsoft Office to your enrolled devices. + +These requirements are also met by the following solutions: +* Microsoft 365 E3 or E5 (includes Azure Active Directory Premium, Microsoft Intune, and Office 365 ProPlus) + +Or +* Enterprise Mobility + Security E3 or E5 (includes Azure Active Directory Premium and Microsoft Intune) +* Office 365 ProPlus, E3, or E5 (includes Office 365 ProPlus) + +>[!NOTE] +>Deployment of devices using Windows AutoPilot to complete the Out-of-Box Experience (OOBE) is supported without these prerequisites, however will yield deployed devices without applications, configuration, or enrollment in a management solution and is highly discouraged. + +### Windows version considerations +Support for broad deployments of Surface devices using Windows AutoPilot, including enrollment performed by Surface partners at the time of purchase, requires devices manufactured with or otherwise installed with Windows 10 Version 1709 (Fall Creators Update). Windows 10 Version 1709 uses a secure 4096-bit (4k) hash value to uniquely identify devices for Windows AutoPilot that is necessary for deployments at scale. + +### Surface device support +Surface devices with support for out-of-box deployment with Windows AutoPilot, enrolled during the purchase process with a Surface partner, include the following devices, where the devices ship from the factory with Windows 10 Version 1709: +* Surface Pro (Model 1796) +* Surface Book 2 +* Surface Laptop +* Surface Studio + +## Surface partners enabled for Windows AutoPilot +Enrolling Surface devices in Windows AutoPilot at the time of purchase is a capability provided by select Surface partners that are enabled with the capability to identify individual Surface devices during the purchase process and perform enrollment on an organization’s behalf. Devices enrolled by a Surface partner at time of purchase can be shipped directly to users and configured entirely through the zero-touch process of Windows AutoPilot, Azure Active Directory, and Mobile Device Management. + +You can find a list of Surface partners enabled for Windows AutoPilot at the [Windows AutoPilot for Surface portal](https://www.microsoft.com/en-us/itpro/surface/windows-autopilot-for-surface). \ No newline at end of file From c418d5e1199eba57141a99b82be4f31ad57b1a6a Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Mon, 29 Jan 2018 16:19:35 +0000 Subject: [PATCH 37/91] Merged PR 5538: Fixed typo in Policy CSP topic --- .../mdm/policy-configuration-service-provider.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 4a50c52186..f109ef3f90 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -130,7 +130,7 @@ The following diagram shows the Policy configuration service provider in tree fo

            Supported operations are Add and Get. Does not support Delete. > [!Note] -> The policies supported in Windows 10 S is the same as in Windows 10 Pro, except that policies under AppliationsDefaults are not suppported in Windows 10 S. +> The policies supported in Windows 10 S are the same as those supported in Windows 10 Pro with the exception of the policies under ApplicationDefaults. The ApplicationDefaults polices are not supported in Windows 10 S. ## Policies From 9acff0322230088a82d19b4f9d544a445f9149e1 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Mon, 29 Jan 2018 16:20:03 +0000 Subject: [PATCH 38/91] Merged PR 5539: Security/RequireDeviceEncryption in Policy CSP is supported in desktop --- .../mdm/new-in-windows-mdm-enrollment-management.md | 1 + windows/client-management/mdm/policy-csp-security.md | 11 ++++------- 2 files changed, 5 insertions(+), 7 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 8c1b31d886..71fbb6027f 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1508,6 +1508,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware

          • Settings/AllowOnlineTips
          • System/DisableEnterpriseAuthProxy
          • +

            Security/RequireDeviceEncrption - updated to show it is supported in desktop.

            [BitLocker CSP](bitlocker-csp.md)
            cross markcross markcross markcross markcheck markcheck markcheck markcheck mark check mark check mark
            From 89b592bbc7a78e4161e332b362978a00e612bde7 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 29 Jan 2018 08:58:26 -0800 Subject: [PATCH 42/91] revised policy name --- ...ows-operating-system-components-to-microsoft-services.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index e8615361ed..3bfd1454ec 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.localizationpriority: high author: brianlic-msft ms.author: brianlic-msft -ms.date: 01/24/2018 +ms.date: 01/29/2018 --- # Manage connections from Windows operating system components to Microsoft services @@ -522,7 +522,7 @@ Find the Microsoft Edge Group Policy objects under **Computer Configuration** &g | Policy | Description | |------------------------------------------------------|-----------------------------------------------------------------------------------------------------| -| Allow configuration for the Books Library | Choose whether configuration updates are done for the Books Library.
            Default: Disabled | +| Allow configuration updates for the Books Library | Choose whether configuration updates are done for the Books Library.
            Default: Not configured | | Configure Autofill | Choose whether employees can use autofill on websites.
            Default: Enabled | | Configure Do Not Track | Choose whether employees can send Do Not Track headers.
            Default: Disabled | | Configure Password Manager | Choose whether employees can save passwords locally on their devices.
            Default: Enabled | @@ -549,7 +549,7 @@ Alternatively, you can configure the Microsoft Group Policies using the followin | Policy | Registry path | | - | - | -| Allow configuration for the Books Library | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary!AllowConfigurationUpdateForBooksLibrary
            REG_SZ: **no** | +| Allow configuration updates for the Books Library | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\BooksLibrary!AllowConfigurationUpdateForBooksLibrary
            REG_DWORD: **0** | | Configure Autofill | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!Use FormSuggest
            REG_SZ: **no** | | Configure Do Not Track | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!DoNotTrack
            REG_DWORD: 1 | | Configure Password Manager | HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\MicrosoftEdge\\Main!FormSuggest Passwords
            REG_SZ: **no** | From 5eb0906d823850f1f8589bba229db5c8f9d34321 Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 29 Jan 2018 09:13:09 -0800 Subject: [PATCH 43/91] fixed link --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index f07d5f8dfb..9989d526a6 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -70,7 +70,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor ## MDM settings If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices.

            -For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](../../client-management/mdm/policy-csp-internetexplorer.md). +For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](/windows/client-management/mdm/policy-csp-internetexplorer.md).
            Setting
            From d942be9aa2cea22a833e17570d86c93d99a224dc Mon Sep 17 00:00:00 2001 From: Justin Hall Date: Mon, 29 Jan 2018 09:20:26 -0800 Subject: [PATCH 44/91] fixed link --- .../windows-defender-smartscreen-available-settings.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md index 9989d526a6..9bffa0146b 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-available-settings.md @@ -70,7 +70,7 @@ SmartScreen uses registry-based Administrative Template policy settings. For mor ## MDM settings If you manage your policies using Microsoft Intune, you'll want to use these MDM policy settings. All settings support both desktop computers (running Windows 10 Pro or Windows 10 Enterprise, enrolled with Microsoft Intune) and Windows 10 Mobile devices.

            -For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](/windows/client-management/mdm/policy-csp-internetexplorer.md). +For SmartScreen Internet Explorer MDM policies, see [Policy CSP - InternetExplorer](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-internetexplorer).
            Setting
            From 366be4e8a0d4ef7ffda23882e254f8409076826a Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 29 Jan 2018 17:21:05 +0000 Subject: [PATCH 45/91] Merged PR 5520: Add section for custom lockscreen images & fix broken links --- .../change-history-for-configure-windows-10.md | 1 + .../customize-and-export-start-layout.md | 4 ++-- ...indows-10-start-screens-by-using-group-policy.md | 2 +- windows/configuration/start-secondary-tiles.md | 2 +- windows/configuration/windows-spotlight.md | 13 ++++++++++++- 5 files changed, 17 insertions(+), 5 deletions(-) diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index bbc901d25d..38cd69cdf4 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -25,6 +25,7 @@ New or changed topic | Description | [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) | New topic | [Configure Windows 10 taskbar](configure-windows-10-taskbar.md) | Added section for removing default apps from the taskbar. [Manage Windows 10 connection endpoints](manage-windows-endpoints-version-1709.md) | New topic for Windows 10, version 1709 that explains the purpose for connections to Microsoft services and how to manage them. +[Configure Windows Spotlight on the lock screen](windows-spotlight.md) | Added section for resolution of custom lock screen images. ## November 2017 diff --git a/windows/configuration/customize-and-export-start-layout.md b/windows/configuration/customize-and-export-start-layout.md index cd236665b7..7d84bee306 100644 --- a/windows/configuration/customize-and-export-start-layout.md +++ b/windows/configuration/customize-and-export-start-layout.md @@ -82,7 +82,7 @@ To prepare a Start layout for export, you simply customize the Start layout on a ## Export the Start layout -When you have the Start layout that you want your users to see, use the [Export-StartLayout](https://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet in Windows PowerShell to export the Start layout to an .xml file. +When you have the Start layout that you want your users to see, use the [Export-StartLayout](https://docs.microsoft.com/powershell/module/startlayout/export-startlayout?view=win10-ps) cmdlet in Windows PowerShell to export the Start layout to an .xml file. >[!IMPORTANT] >If you include secondary Microsoft Edge tiles (tiles that link to specific websites in Microsoft Edge), see [Add custom images to Microsoft Edge secondary tiles](start-secondary-tiles.md) for instructions. @@ -97,7 +97,7 @@ When you have the Start layout that you want your users to see, use the [Export- In the previous command, `-path` is a required parameter that specifies the path and file name for the export file. You can specify a local path or a UNC path (for example, \\\\FileServer01\\StartLayouts\\StartLayoutMarketing.xml). - Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](https://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet does not append the file name extension, and the policy settings require the extension. + Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](https://docs.microsoft.com/powershell/module/startlayout/export-startlayout?view=win10-ps) cmdlet does not append the file name extension, and the policy settings require the extension. Example of a layout file produced by `Export-StartLayout`: diff --git a/windows/configuration/customize-windows-10-start-screens-by-using-group-policy.md b/windows/configuration/customize-windows-10-start-screens-by-using-group-policy.md index e205a7d93f..41f82753c8 100644 --- a/windows/configuration/customize-windows-10-start-screens-by-using-group-policy.md +++ b/windows/configuration/customize-windows-10-start-screens-by-using-group-policy.md @@ -44,7 +44,7 @@ The GPO can be configured from any computer on which the necessary ADMX and ADML Three features enable Start and taskbar layout control: -- The [Export-StartLayout](https://go.microsoft.com/fwlink/p/?LinkID=620879) cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. +- The [Export-StartLayout](https://docs.microsoft.com/powershell/module/startlayout/export-startlayout?view=win10-ps) cmdlet in Windows PowerShell exports a description of the current Start layout in .xml file format. >[!NOTE]   >To import the layout of Start to a mounted Windows image, use the [Import-StartLayout](https://docs.microsoft.com/powershell/module/startlayout/import-startlayout) cmdlet. diff --git a/windows/configuration/start-secondary-tiles.md b/windows/configuration/start-secondary-tiles.md index bd8061516c..c12a8cf0c6 100644 --- a/windows/configuration/start-secondary-tiles.md +++ b/windows/configuration/start-secondary-tiles.md @@ -68,7 +68,7 @@ In Windows 10, version 1703, by using the PowerShell cmdlet `export-StartLayoutE ``` In the previous command, `-path` is a required parameter that specifies the path and file name for the export file. You can specify a local path or a UNC path (for example, \\\\FileServer01\\StartLayouts\\StartLayoutMarketing.xml). - Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](https://go.microsoft.com/fwlink/p/?LinkId=620879) cmdlet does not append the file name extension, and the policy settings require the extension. + Use a file name of your choice—for example, StartLayoutMarketing.xml. Include the .xml file name extension. The [Export-StartLayout](https://docs.microsoft.com/powershell/module/startlayout/export-startlayout?view=win10-ps) cmdlet does not append the file name extension, and the policy settings require the extension. 3. If you’d like to change the image for a secondary tile to your own custom image, open the layout.xml file, and look for the images that the tile references. - For example, your layout.xml contains `Square150x150LogoUri="ms-appdata:///local/PinnedTiles/21581260870/hires.png" Wide310x150LogoUri="ms-appx:///"` diff --git a/windows/configuration/windows-spotlight.md b/windows/configuration/windows-spotlight.md index c1b5070e1d..6e1b327c7d 100644 --- a/windows/configuration/windows-spotlight.md +++ b/windows/configuration/windows-spotlight.md @@ -8,7 +8,7 @@ ms.mktglfcycl: explore ms.sitesec: library author: jdeckerms ms.localizationpriority: high -ms.date: 10/16/2017 +ms.date: 01/26/2018 --- # Configure Windows Spotlight on the lock screen @@ -68,12 +68,23 @@ Windows Spotlight is enabled by default. Windows 10 provides Group Policy and mo In addition to the specific policy settings for Windows Spotlight, administrators can replace Windows Spotlight with a selected image using the Group Policy setting **Computer Configuration** > **Administrative Templates** > **Control Panel** > **Personalization** > **Force a specific default lock screen image**. + >[!TIP] + >If you want to use a custom lock screen image that contains text, see [Resolution for custom lock screen image](#resolution-for-custom-lock-screen-image). + ![lockscreen policy details](images/lockscreenpolicy.png) Pay attention to the checkbox in **Options**. In addition to providing the path to the lock screen image, administrators can choose to allow or **Turn off fun facts, tips, tricks, and more on lock screen**. If the checkbox is not selected, users will see the lock screen image that is defined in the policy setting, and will also see occasional messages. +## Resolution for custom lock screen image +A concern with custom lock screen images is how they will appear on different screen sizes and resolutions. + +A custom lock screen image created in 16:9 aspect ratio (1600x900) will scale properly on devices using a 16:9 resolution, such as 1280x720 or 1920x1080. On devices using other aspect ratios, such as 4:3 (1024x768) or 16:10 (1280x800), height scales correctly and width is cropped to a size equal to the aspect ratio. The image will remain centered on the screen + +Lock screen images created at other aspect ratios may scale and center unpredictably on your device when changing aspect ratios. + +The recommendation for custom lock screen images that include text (such as a legal statement) is to create the lock screen image in 16:9 resolution with text contained in the 4:3 region, allowing the text to remain visible at any aspect ratio. ## Related topics From 898cace4512df9842b5f0d569078371de8e6a48f Mon Sep 17 00:00:00 2001 From: arottem Date: Mon, 29 Jan 2018 09:49:20 -0800 Subject: [PATCH 46/91] Update evaluate-windows-defender-antivirus.md --- .../evaluate-windows-defender-antivirus.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md index 6323444135..2636c7abd9 100644 --- a/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md @@ -43,7 +43,7 @@ The guide is available in PDF format for offline viewing: - [Download the guide in PDF format](https://www.microsoft.com/download/details.aspx?id=54795) You can also download a PowerShell that will enable all the settings described in the guide automatically. You can obtain the script alongside the PDF download above, or individually from PowerShell Gallery: -- [Download the PowerShell script to automatically configure the settings](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/1.0/DisplayScript) +- [Download the PowerShell script to automatically configure the settings](https://www.powershellgallery.com/packages/WindowsDefender_InternalEvaluationSettings/1.2/DisplayScript) > [!IMPORTANT] > The guide is currently intended for single-machine evaluation of Windows Defender Antivirus protection. Enabling all of the settings in this guide may not be suitable for real-world deployment. From d9879ef1a1a0edd73e041fe310f89c1823686c73 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Mon, 29 Jan 2018 18:40:16 +0000 Subject: [PATCH 47/91] Merged PR 5547: Add topic to TOC --- devices/surface-hub/surfacehub-whats-new-1703.md | 2 +- devices/surface/TOC.md | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/devices/surface-hub/surfacehub-whats-new-1703.md b/devices/surface-hub/surfacehub-whats-new-1703.md index 7d770e3856..59ced8ff5d 100644 --- a/devices/surface-hub/surfacehub-whats-new-1703.md +++ b/devices/surface-hub/surfacehub-whats-new-1703.md @@ -7,7 +7,7 @@ ms.pagetype: devices ms.sitesec: library author: jdeckerms ms.author: jdecker -ms.date: 07/27/2017 +ms.date: 01/18/2018 ms.localizationpriority: medium --- diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 5dd7130ea6..778c88fa47 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -1,5 +1,6 @@ # [Surface](index.md) ## [Deploy Surface devices](deploy.md) +### [Windows AutoPilot and Surface devices](windows-autopilot-and-surface-devices.md) ### [Surface device compatibility with Windows 10 Long-Term Servicing Branch](surface-device-compatibility-with-windows-10-ltsc.md) #### [Long-Term Servicing Branch for Surface devices](ltsb-for-surface.md) ### [Deploy Windows 10 to Surface devices with MDT](deploy-windows-10-to-surface-devices-with-mdt.md) From b284b34d96d8eab068a2789cf69d8cce6a16ff18 Mon Sep 17 00:00:00 2001 From: Elizabeth Ross Date: Mon, 29 Jan 2018 11:44:53 -0800 Subject: [PATCH 48/91] Fixed broken formatting --- .../diagnostic-data-viewer-overview.md | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/windows/configuration/diagnostic-data-viewer-overview.md b/windows/configuration/diagnostic-data-viewer-overview.md index c009c6c0e2..fe1598c59f 100644 --- a/windows/configuration/diagnostic-data-viewer-overview.md +++ b/windows/configuration/diagnostic-data-viewer-overview.md @@ -47,10 +47,8 @@ You must start this app from the **Settings** panel. 2. Under **Diagnostic data**, select the **Diagnostic Data Viewer** button. - ![Location to turn on the Diagnostic Data Viewer](images/ddv-settings-launch.png) - -f -OR- - + ![Location to turn on the Diagnostic Data Viewer](images/ddv-settings-launch.png)

            -OR-

            + Go to **Start** and search for _Diagnostic Data Viewer_. 3. Close the Diagnostic Data Viewer app, use your device as you normally would for a few days, and then open Diagnostic Data Viewer again to review the updated list of diagnostic data. @@ -98,11 +96,8 @@ When you're done reviewing your diagnostic data, you should turn of data viewing You can review additional Windows Error Reporting diagnostic data in the **View problem reports** tool. This tool provides you with a summary of various crash reports that are sent to Microsoft as part of Windows Error Reporting. We use this data to find and fix specific issues that are hard to replicate and to improve the Windows operating system. **To view your Windows Error Reporting diagnostic data** -1. Go to **Start**, select **Control Panel** > **All Control Panel Items** > **Security and Maintenance** > **Problem Reports**. - -- OR - - - Go to **Start** and search for _Problem Reports_. +1. Go to **Start**, select **Control Panel** > **All Control Panel Items** > **Security and Maintenance** > **Problem Reports**.

            -OR-

            + Go to **Start** and search for _Problem Reports_. The **Review problem reports** tool opens, showing you your Windows Error Reporting reports, along with a status about whether it was sent to Microsoft. From d20eb820de83eb3df9c4a01d19f6b996b60868af Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Mon, 29 Jan 2018 19:47:45 +0000 Subject: [PATCH 49/91] Merged PR 5553: adding additional whitespace in prep for token re-ordering --- .../mdm/policy-csp-abovelock.md | 8 +- ...csp-accountpoliciesaccountlockoutpolicy.md | 35 +- .../mdm/policy-csp-accounts.md | 10 +- .../mdm/policy-csp-activexcontrols.md | 4 +- .../mdm/policy-csp-applicationdefaults.md | 5 +- .../mdm/policy-csp-applicationmanagement.md | 24 +- .../mdm/policy-csp-appvirtualization.md | 58 +- .../mdm/policy-csp-attachmentmanager.md | 8 +- .../mdm/policy-csp-authentication.md | 14 +- .../mdm/policy-csp-autoplay.md | 8 +- .../mdm/policy-csp-bitlocker.md | 4 +- .../mdm/policy-csp-bluetooth.md | 12 +- .../mdm/policy-csp-browser.md | 97 ++- .../mdm/policy-csp-camera.md | 4 +- .../mdm/policy-csp-cellular.md | 12 +- .../mdm/policy-csp-connectivity.md | 30 +- .../mdm/policy-csp-controlpolicyconflict.md | 11 +- .../mdm/policy-csp-credentialproviders.md | 8 +- .../mdm/policy-csp-credentialsui.md | 6 +- .../mdm/policy-csp-cryptography.md | 6 +- .../mdm/policy-csp-dataprotection.md | 6 +- .../mdm/policy-csp-datausage.md | 6 +- .../mdm/policy-csp-defender.md | 74 ++- .../mdm/policy-csp-deliveryoptimization.md | 115 ++-- .../mdm/policy-csp-desktop.md | 4 +- .../mdm/policy-csp-deviceguard.md | 12 +- .../mdm/policy-csp-deviceinstallation.md | 6 +- .../mdm/policy-csp-devicelock.md | 47 +- .../mdm/policy-csp-display.md | 6 +- .../mdm/policy-csp-education.md | 8 +- .../mdm/policy-csp-enterprisecloudprint.md | 14 +- .../mdm/policy-csp-errorreporting.md | 12 +- .../mdm/policy-csp-eventlogservice.md | 10 +- .../mdm/policy-csp-experience.md | 46 +- .../mdm/policy-csp-exploitguard.md | 4 +- .../client-management/mdm/policy-csp-games.md | 4 +- .../mdm/policy-csp-handwriting.md | 6 +- .../mdm/policy-csp-internetexplorer.md | 580 +++++++++++++++++- .../mdm/policy-csp-kerberos.md | 12 +- .../mdm/policy-csp-kioskbrowser.md | 68 +- .../mdm/policy-csp-licensing.md | 6 +- ...policy-csp-localpoliciessecurityoptions.md | 391 ++++-------- .../mdm/policy-csp-location.md | 4 +- .../mdm/policy-csp-lockdown.md | 4 +- .../client-management/mdm/policy-csp-maps.md | 6 +- .../mdm/policy-csp-messaging.md | 8 +- .../mdm/policy-csp-networkisolation.md | 18 +- .../mdm/policy-csp-notifications.md | 4 +- .../client-management/mdm/policy-csp-power.md | 20 +- .../mdm/policy-csp-printers.md | 8 +- .../mdm/policy-csp-privacy.md | 158 ++++- .../mdm/policy-csp-remoteassistance.md | 10 +- .../mdm/policy-csp-remotedesktopservices.md | 14 +- .../mdm/policy-csp-remotemanagement.md | 47 +- .../mdm/policy-csp-remoteprocedurecall.md | 6 +- .../mdm/policy-csp-remoteshell.md | 23 +- .../mdm/policy-csp-search.md | 43 +- .../mdm/policy-csp-security.md | 31 +- .../mdm/policy-csp-settings.md | 40 +- .../mdm/policy-csp-smartscreen.md | 8 +- .../mdm/policy-csp-speech.md | 4 +- .../client-management/mdm/policy-csp-start.md | 60 +- .../mdm/policy-csp-storage.md | 6 +- .../mdm/policy-csp-system.md | 45 +- .../mdm/policy-csp-systemservices.md | 68 +- .../mdm/policy-csp-taskscheduler.md | 13 +- .../mdm/policy-csp-textinput.md | 37 +- .../mdm/policy-csp-timelanguagesettings.md | 4 +- .../mdm/policy-csp-update.md | 114 +++- .../mdm/policy-csp-userrights.md | 323 ++-------- .../client-management/mdm/policy-csp-wifi.md | 16 +- ...olicy-csp-windowsdefendersecuritycenter.md | 91 ++- .../mdm/policy-csp-windowsinkworkspace.md | 6 +- .../mdm/policy-csp-windowslogon.md | 8 +- .../mdm/policy-csp-wirelessdisplay.md | 28 +- 75 files changed, 2103 insertions(+), 973 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 1c59efda74..544860e28f 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - AboveLock @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            +
            **AboveLock/AllowActionCenterNotifications** @@ -83,7 +85,9 @@ The following list shows the supported values: +
            + **AboveLock/AllowCortanaAboveLock** @@ -131,7 +135,9 @@ The following list shows the supported values: +
            + **AboveLock/AllowToasts** diff --git a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md index dfe6305024..341cac943e 100644 --- a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md +++ b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/29/2017 +ms.date: 01/29/2018 --- # Policy CSP - AccountPoliciesAccountLockoutPolicy @@ -32,7 +32,9 @@ ms.date: 12/29/2017 +
            + **AccountPoliciesAccountLockoutPolicy/AccountLockoutDuration** @@ -76,17 +78,10 @@ If an account lockout threshold is defined, the account lockout duration must be Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - - - - - - - - - +
            + **AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold** @@ -130,17 +125,10 @@ Failed password attempts against workstations or member servers that have been l Default: 0. - - - - - - - - - +
            + **AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter** @@ -184,15 +172,6 @@ If an account lockout threshold is defined, this reset time must be less than or Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - - - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index 9098a9f6be..3eaaad3542 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Accounts @@ -33,7 +33,9 @@ ms.date: 12/14/2017 +
            + **Accounts/AllowAddingNonMicrosoftAccountsManually** @@ -86,7 +88,9 @@ The following list shows the supported values: +
            + **Accounts/AllowMicrosoftAccountConnection** @@ -136,7 +140,9 @@ The following list shows the supported values: +
            + **Accounts/AllowMicrosoftAccountSignInAssistant** @@ -184,7 +190,9 @@ The following list shows the supported values: +
            + **Accounts/DomainNamesForEmailSync** diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 411a6aa435..43af11e725 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - ActiveXControls @@ -24,7 +24,9 @@ ms.date: 11/01/2017 +
            + **ActiveXControls/ApprovedInstallationSites** diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 440136eec9..549937c7e9 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/04/2017 +ms.date: 01/29/2018 --- # Policy CSP - ApplicationDefaults @@ -24,7 +24,9 @@ ms.date: 12/04/2017 +
            + **ApplicationDefaults/DefaultAssociationsConfiguration** @@ -129,4 +131,3 @@ Footnote: - diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 8d12310300..2cd0eb5954 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - ApplicationManagement @@ -54,7 +54,9 @@ ms.date: 12/14/2017 +
            + **ApplicationManagement/AllowAllTrustedApps** @@ -105,7 +107,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/AllowAppStoreAutoUpdate** @@ -153,7 +157,9 @@ Most restricted value is 0. +
            + **ApplicationManagement/AllowDeveloperUnlock** @@ -204,7 +210,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/AllowGameDVR** @@ -257,7 +265,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/AllowSharedUserAppData** @@ -307,7 +317,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/AllowStore** @@ -357,7 +369,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/ApplicationRestrictions** @@ -420,7 +434,9 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no +
            + **ApplicationManagement/DisableStoreOriginatedApps** @@ -468,7 +484,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/RequirePrivateStoreOnly** @@ -516,7 +534,9 @@ Most restricted value is 1. +
            + **ApplicationManagement/RestrictAppDataToSystemVolume** @@ -566,7 +586,9 @@ The following list shows the supported values: +
            + **ApplicationManagement/RestrictAppToSystemVolume** diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index e8d81c05b3..53bb0578e4 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - AppVirtualization @@ -105,7 +105,9 @@ ms.date: 11/01/2017 +
            + **AppVirtualization/AllowAppVClient** @@ -161,7 +163,9 @@ ADMX Info: +
            + **AppVirtualization/AllowDynamicVirtualization** @@ -217,7 +221,9 @@ ADMX Info: +
            + **AppVirtualization/AllowPackageCleanup** @@ -273,7 +279,9 @@ ADMX Info: +
            + **AppVirtualization/AllowPackageScripts** @@ -329,7 +337,9 @@ ADMX Info: +
            + **AppVirtualization/AllowPublishingRefreshUX** @@ -385,7 +395,9 @@ ADMX Info: +
            + **AppVirtualization/AllowReportingServer** @@ -451,7 +463,9 @@ ADMX Info: +
            + **AppVirtualization/AllowRoamingFileExclusions** @@ -507,7 +521,9 @@ ADMX Info: +
            + **AppVirtualization/AllowRoamingRegistryExclusions** @@ -563,7 +579,9 @@ ADMX Info: +
            + **AppVirtualization/AllowStreamingAutoload** @@ -619,7 +637,9 @@ ADMX Info: +
            + **AppVirtualization/ClientCoexistenceAllowMigrationmode** @@ -675,7 +695,9 @@ ADMX Info: +
            + **AppVirtualization/IntegrationAllowRootGlobal** @@ -731,7 +753,9 @@ ADMX Info: +
            + **AppVirtualization/IntegrationAllowRootUser** @@ -787,7 +811,9 @@ ADMX Info: +
            + **AppVirtualization/PublishingAllowServer1** @@ -861,7 +887,9 @@ ADMX Info: +
            + **AppVirtualization/PublishingAllowServer2** @@ -935,7 +963,9 @@ ADMX Info: +
            + **AppVirtualization/PublishingAllowServer3** @@ -1009,7 +1039,9 @@ ADMX Info: +
            + **AppVirtualization/PublishingAllowServer4** @@ -1083,7 +1115,9 @@ ADMX Info: +
            + **AppVirtualization/PublishingAllowServer5** @@ -1157,7 +1191,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** @@ -1213,7 +1249,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowHighCostLaunch** @@ -1269,7 +1307,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowLocationProvider** @@ -1325,7 +1365,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowPackageInstallationRoot** @@ -1381,7 +1423,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowPackageSourceRoot** @@ -1437,7 +1481,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowReestablishmentInterval** @@ -1493,7 +1539,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingAllowReestablishmentRetries** @@ -1549,7 +1597,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingSharedContentStoreMode** @@ -1605,7 +1655,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingSupportBranchCache** @@ -1661,7 +1713,9 @@ ADMX Info: +
            + **AppVirtualization/StreamingVerifyCertificateRevocationList** @@ -1717,7 +1771,9 @@ ADMX Info: +
            + **AppVirtualization/VirtualComponentsAllowList** diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index 71012e8237..21e12791ee 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - AttachmentManager @@ -30,7 +30,9 @@ ms.date: 11/01/2017 +
            + **AttachmentManager/DoNotPreserveZoneInformation** @@ -92,7 +94,9 @@ ADMX Info: +
            + **AttachmentManager/HideZoneInfoMechanism** @@ -154,7 +158,9 @@ ADMX Info: +
            + **AttachmentManager/NotifyAntivirusPrograms** diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 5d6851b66b..16cef802ca 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Authentication @@ -36,7 +36,9 @@ ms.date: 12/14/2017 +
            + **Authentication/AllowAadPasswordReset** @@ -73,7 +75,7 @@ ms.date: 12/14/2017 -Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen.  +Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen. @@ -84,7 +86,9 @@ The following list shows the supported values: +
            + **Authentication/AllowEAPCertSSO** @@ -132,7 +136,9 @@ The following list shows the supported values: +
            + **Authentication/AllowFastReconnect** @@ -182,7 +188,9 @@ The following list shows the supported values: +
            + **Authentication/AllowFidoDeviceSignon** @@ -234,7 +242,9 @@ The following list shows the supported values: +
            + **Authentication/AllowSecondaryAuthenticationDevice** diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index 0eeac9b230..ea392f0f79 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Autoplay @@ -30,7 +30,9 @@ ms.date: 11/01/2017 +
            + **Autoplay/DisallowAutoplayForNonVolumeDevices** @@ -91,7 +93,9 @@ ADMX Info: +
            + **Autoplay/SetDefaultAutoRunBehavior** @@ -161,7 +165,9 @@ ADMX Info: +
            + **Autoplay/TurnOffAutoPlay** diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index e575654a6d..5310af5a0a 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Bitlocker @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Bitlocker/EncryptionMethod** diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index a292b521f3..aebbabd6f8 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Bluetooth @@ -36,7 +36,9 @@ ms.date: 12/14/2017 +
            + **Bluetooth/AllowAdvertising** @@ -88,7 +90,9 @@ The following list shows the supported values: +
            + **Bluetooth/AllowDiscoverableMode** @@ -140,7 +144,9 @@ The following list shows the supported values: +
            + **Bluetooth/AllowPrepairing** @@ -188,7 +194,9 @@ The following list shows the supported values: +
            + **Bluetooth/LocalDeviceName** @@ -233,7 +241,9 @@ If this policy is not set or it is deleted, the default local radio name is used +
            + **Bluetooth/ServicesAllowedList** diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 1a799e9db8..5e4018865e 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - Browser @@ -137,7 +137,9 @@ ms.date: 01/03/2018 +
            + **Browser/AllowAddressBarDropdown** @@ -191,7 +193,9 @@ The following list shows the supported values: +
            + **Browser/AllowAutofill** @@ -249,7 +253,9 @@ The following list shows the supported values: +
            + **Browser/AllowBrowser** @@ -306,7 +312,9 @@ The following list shows the supported values: +
            + **Browser/AllowCookies** @@ -362,7 +370,9 @@ To verify AllowCookies is set to 0 (not allowed): +
            + **Browser/AllowDeveloperTools** @@ -417,7 +427,9 @@ The following list shows the supported values: +
            + **Browser/AllowDoNotTrack** @@ -475,7 +487,9 @@ The following list shows the supported values: +
            + **Browser/AllowExtensions** @@ -524,7 +538,9 @@ The following list shows the supported values: +
            + **Browser/AllowFlash** @@ -573,7 +589,9 @@ The following list shows the supported values: +
            + **Browser/AllowFlashClickToRun** @@ -622,7 +640,9 @@ The following list shows the supported values: +
            + **Browser/AllowInPrivate** @@ -673,7 +693,9 @@ The following list shows the supported values: +
            + **Browser/AllowMicrosoftCompatibilityList** @@ -727,7 +749,9 @@ The following list shows the supported values: +
            + **Browser/AllowPasswordManager** @@ -785,7 +809,9 @@ The following list shows the supported values: +
            + **Browser/AllowPopups** @@ -843,7 +869,9 @@ The following list shows the supported values: +
            + **Browser/AllowSearchEngineCustomization** @@ -896,7 +924,9 @@ The following list shows the supported values: +
            + **Browser/AllowSearchSuggestionsinAddressBar** @@ -947,7 +977,9 @@ The following list shows the supported values: +
            + **Browser/AllowSmartScreen** @@ -1005,7 +1037,9 @@ The following list shows the supported values: +
            + **Browser/AlwaysEnableBooksLibrary** @@ -1032,7 +1066,6 @@ The following list shows the supported values:
            Setting
            - [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1044,8 +1077,6 @@ The following list shows the supported values: - - Added in Windows 10, next majot update. Always show the Books Library in Microsoft Edge @@ -1057,7 +1088,9 @@ The following list shows the supported values: +
            + **Browser/ClearBrowsingDataOnExit** @@ -1114,7 +1147,9 @@ The following list shows the supported values: +
            + **Browser/ConfigureAdditionalSearchEngines** @@ -1171,7 +1206,9 @@ Most restricted value is 0. +
            + **Browser/DisableLockdownOfStartPages** @@ -1224,11 +1261,13 @@ Most restricted value is 0. The following list shows the supported values: - 0 (default) – Enable lockdown of the Start pages according to the settings specified in the Browser/HomePages policy. Users cannot change the Start pages.  -- 1 – Disable lockdown of the Start pages and allow users to modify them.   +- 1 – Disable lockdown of the Start pages and allow users to modify them. +
            + **Browser/EnableExtendedBooksTelemetry** @@ -1277,16 +1316,11 @@ The following list shows the supported values: - 0 (default) - Disable. No additional telemetry. - 1 - Enable. Additional telemetry for schools. - - - - - - - +
            + **Browser/EnterpriseModeSiteList** @@ -1337,7 +1371,9 @@ The following list shows the supported values: +
            + **Browser/EnterpriseSiteListServiceUrl** @@ -1380,7 +1416,9 @@ The following list shows the supported values: +
            + **Browser/FirstRunURL** @@ -1430,7 +1468,9 @@ The default value is an empty string. Otherwise, the string should contain the U +
            + **Browser/HomePages** @@ -1482,7 +1522,9 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi +
            + **Browser/LockdownFavorites** @@ -1540,7 +1582,9 @@ The following list shows the supported values: +
            + **Browser/PreventAccessToAboutFlagsInMicrosoftEdge** @@ -1589,7 +1633,9 @@ The following list shows the supported values: +
            + **Browser/PreventFirstRunPage** @@ -1640,7 +1686,9 @@ The following list shows the supported values: +
            + **Browser/PreventLiveTileDataCollection** @@ -1691,7 +1739,9 @@ The following list shows the supported values: +
            + **Browser/PreventSmartScreenPromptOverride** @@ -1742,7 +1792,9 @@ The following list shows the supported values: +
            + **Browser/PreventSmartScreenPromptOverrideForFiles** @@ -1791,7 +1843,9 @@ The following list shows the supported values: +
            + **Browser/PreventUsingLocalHostIPAddressForWebRTC** @@ -1844,7 +1898,9 @@ The following list shows the supported values: +
            + **Browser/ProvisionFavorites** @@ -1899,7 +1955,9 @@ Data type is string. +
            + **Browser/SendIntranetTraffictoInternetExplorer** @@ -1954,7 +2012,9 @@ The following list shows the supported values: +
            + **Browser/SetDefaultSearchEngine** @@ -2010,7 +2070,9 @@ Most restricted value is 0. +
            + **Browser/ShowMessageWhenOpeningSitesInInternetExplorer** @@ -2065,7 +2127,9 @@ The following list shows the supported values: +
            + **Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** @@ -2127,7 +2191,9 @@ The following list shows the supported values: +
            + **Browser/UseSharedFolderForBooks** @@ -2174,14 +2240,7 @@ The following list shows the supported values: - 0 - No shared folder. - 1 - Use a shared folder. - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index 54098f70c4..6e910bd0ff 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Camera @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Camera/AllowCamera** diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index 6c2905b717..c1be290991 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/13/2017 +ms.date: 01/29/2018 --- # Policy CSP - Cellular @@ -36,7 +36,9 @@ ms.date: 12/13/2017 +
            + **Cellular/LetAppsAccessCellularData** @@ -97,7 +99,9 @@ The following list shows the supported values: +
            + **Cellular/LetAppsAccessCellularData_ForceAllowTheseApps** @@ -138,7 +142,9 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N +
            + **Cellular/LetAppsAccessCellularData_ForceDenyTheseApps** @@ -179,7 +185,9 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N +
            + **Cellular/LetAppsAccessCellularData_UserInControlOfTheseApps** @@ -220,7 +228,9 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N +
            + **Cellular/ShowAppCellularAccessUI** diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 50cf068b2e..e121d2f02c 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Connectivity @@ -63,7 +63,9 @@ ms.date: 12/14/2017 +
            + **Connectivity/AllowBluetooth** @@ -119,7 +121,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowCellularData** @@ -168,7 +172,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowCellularDataRoaming** @@ -229,7 +235,9 @@ To validate on mobile devices, do the following: +
            + **Connectivity/AllowConnectedDevices** @@ -280,7 +288,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowNFC** @@ -334,7 +344,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowUSBConnection** @@ -390,7 +402,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowVPNOverCellular** @@ -440,7 +454,9 @@ The following list shows the supported values: +
            + **Connectivity/AllowVPNRoamingOverCellular** @@ -490,7 +506,9 @@ The following list shows the supported values: +
            + **Connectivity/DiablePrintingOverHTTP** @@ -545,7 +563,9 @@ ADMX Info: +
            + **Connectivity/DisableDownloadingOfPrintDriversOverHTTP** @@ -600,7 +620,9 @@ ADMX Info: +
            + **Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards** @@ -655,7 +677,9 @@ ADMX Info: +
            + **Connectivity/DisallowNetworkConnectivityActiveTests** @@ -698,7 +722,9 @@ Value type is integer. +
            + **Connectivity/HardenedUNCPaths** @@ -756,7 +782,9 @@ ADMX Info: +
            + **Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge** diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index c628f5e912..50f47bd8ee 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/11/2018 +ms.date: 01/29/2018 --- # Policy CSP - ControlPolicyConflict @@ -26,7 +26,9 @@ ms.date: 01/11/2018 +
            + **ControlPolicyConflict/MDMWinsOverGP** @@ -80,14 +82,7 @@ The following list shows the supported values: - 0 (default) - 1 - The MDM policy is used and the GP policy is blocked. - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 8db7adb8b4..f7c8f906c5 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - CredentialProviders @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            + **CredentialProviders/AllowPINLogon** @@ -94,7 +96,9 @@ ADMX Info: +
            + **CredentialProviders/BlockPicturePassword** @@ -156,7 +160,9 @@ ADMX Info: +
            + **CredentialProviders/DisableAutomaticReDeploymentCredentials** diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index 6a2a7950a3..f3cedd07cc 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - CredentialsUI @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **CredentialsUI/DisablePasswordReveal** @@ -92,7 +94,9 @@ ADMX Info: +
            + **CredentialsUI/EnumerateAdministrators** diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index b8a7181d8e..921ef9f0a0 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Cryptography @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **Cryptography/AllowFipsAlgorithmPolicy** @@ -73,7 +75,9 @@ The following list shows the supported values: +
            + **Cryptography/TLSCipherSuites** diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index b0e270bdff..9fc7abd61d 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - DataProtection @@ -27,7 +27,9 @@ ms.date: 12/14/2017 +
            + **DataProtection/AllowDirectMemoryAccess** @@ -77,7 +79,9 @@ The following list shows the supported values: +
            + **DataProtection/LegacySelectiveWipeID** diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index b9d3a22ccc..ca2c55abb5 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - DataUsage @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **DataUsage/SetCost3G** @@ -93,7 +95,9 @@ ADMX Info: +
            + **DataUsage/SetCost4G** diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index bb91bd44bd..fc2c7798e6 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Defender @@ -126,7 +126,9 @@ ms.date: 11/01/2017 +
            + **Defender/AllowArchiveScanning** @@ -176,7 +178,9 @@ The following list shows the supported values: +
            + **Defender/AllowBehaviorMonitoring** @@ -226,7 +230,9 @@ The following list shows the supported values: +
            + **Defender/AllowCloudProtection** @@ -276,7 +282,9 @@ The following list shows the supported values: +
            + **Defender/AllowEmailScanning** @@ -326,7 +334,9 @@ The following list shows the supported values: +
            + **Defender/AllowFullScanOnMappedNetworkDrives** @@ -376,7 +386,9 @@ The following list shows the supported values: +
            + **Defender/AllowFullScanRemovableDriveScanning** @@ -426,7 +438,9 @@ The following list shows the supported values: +
            + **Defender/AllowIOAVProtection** @@ -476,7 +490,9 @@ The following list shows the supported values: +
            + **Defender/AllowIntrusionPreventionSystem** @@ -526,7 +542,9 @@ The following list shows the supported values: +
            + **Defender/AllowOnAccessProtection** @@ -576,7 +594,9 @@ The following list shows the supported values: +
            + **Defender/AllowRealtimeMonitoring** @@ -626,7 +646,9 @@ The following list shows the supported values: +
            + **Defender/AllowScanningNetworkFiles** @@ -676,7 +698,9 @@ The following list shows the supported values: +
            + **Defender/AllowScriptScanning** @@ -726,7 +750,9 @@ The following list shows the supported values: +
            + **Defender/AllowUserUIAccess** @@ -776,7 +802,9 @@ The following list shows the supported values: +
            + **Defender/AttackSurfaceReductionOnlyExclusions** @@ -823,7 +851,9 @@ Value type is string. +
            + **Defender/AttackSurfaceReductionRules** @@ -872,7 +902,9 @@ Value type is string. +
            + **Defender/AvgCPULoadFactor** @@ -921,7 +953,9 @@ The default value is 50. +
            + **Defender/CloudBlockLevel** @@ -982,7 +1016,9 @@ The following list shows the supported values: +
            + **Defender/CloudExtendedTimeout** @@ -1033,7 +1069,9 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se +
            + **Defender/ControlledFolderAccessAllowedApplications** @@ -1077,7 +1115,9 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app +
            + **Defender/ControlledFolderAccessProtectedFolders** @@ -1121,7 +1161,9 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci +
            + **Defender/DaysToRetainCleanedMalware** @@ -1170,7 +1212,9 @@ The default value is 0, which keeps items in quarantine, and does not automatica +
            + **Defender/EnableControlledFolderAccess** @@ -1210,7 +1254,7 @@ The default value is 0, which keeps items in quarantine, and does not automatica > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess. -Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. +Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. @@ -1222,7 +1266,9 @@ The following list shows the supported values: +
            + **Defender/EnableNetworkProtection** @@ -1280,7 +1326,9 @@ The following list shows the supported values: +
            + **Defender/ExcludedExtensions** @@ -1325,7 +1373,9 @@ Allows an administrator to specify a list of file type extensions to ignore duri +
            + **Defender/ExcludedPaths** @@ -1370,7 +1420,9 @@ Allows an administrator to specify a list of directory paths to ignore during a +
            + **Defender/ExcludedProcesses** @@ -1421,7 +1473,9 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E +
            + **Defender/PUAProtection** @@ -1472,7 +1526,9 @@ The following list shows the supported values: +
            + **Defender/RealTimeScanDirection** @@ -1527,7 +1583,9 @@ The following list shows the supported values: +
            + **Defender/ScanParameter** @@ -1577,7 +1635,9 @@ The following list shows the supported values: +
            + **Defender/ScheduleQuickScanTime** @@ -1632,7 +1692,9 @@ The default value is 120 +
            + **Defender/ScheduleScanDay** @@ -1693,7 +1755,9 @@ The following list shows the supported values: +
            + **Defender/ScheduleScanTime** @@ -1748,7 +1812,9 @@ The default value is 120. +
            + **Defender/SignatureUpdateInterval** @@ -1799,7 +1865,9 @@ The default value is 8. +
            + **Defender/SubmitSamplesConsent** @@ -1851,7 +1919,9 @@ The following list shows the supported values: +
            + **Defender/ThreatSeverityDefaultAction** diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 812d07ecac..2489a17f31 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - DeliveryOptimization @@ -95,7 +95,9 @@ ms.date: 01/03/2018 +
            + **DeliveryOptimization/DOAbsoluteMaxCacheSize** @@ -142,7 +144,9 @@ The default value is 10. +
            + **DeliveryOptimization/DOAllowVPNPeerCaching** @@ -194,7 +198,9 @@ The following list shows the supported values: +
            + **DeliveryOptimization/DODelayBackgroundDownloadFromHttp** @@ -236,17 +242,10 @@ Added in Windows 10, next major update. This policy allows you to delay the use After the max delay is reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from peers. Note that a download that is waiting for peer sources, will appear to be stuck for the end user. The recommended value is 1 hour (3600). - - - - - - - - - +
            + **DeliveryOptimization/DODelayForegroundDownloadFromHttp** @@ -298,15 +297,12 @@ The following list shows the supported values as number of seconds: - 0 to 86400 (1 day) - 0 - managed by the cloud service - Default is not configured. + - - - - - - +
            + **DeliveryOptimization/DODownloadMode** @@ -362,7 +358,9 @@ The following list shows the supported values: +
            + **DeliveryOptimization/DOGroupId** @@ -410,7 +408,9 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this +
            + **DeliveryOptimization/DOGroupIdSource** @@ -465,15 +465,12 @@ The following list shows the supported values: - 2 - Authenticated domain SID - 3 - DHCP user option - 4 - DNS suffix + - - - - - - +
            + **DeliveryOptimization/DOMaxCacheAge** @@ -520,7 +517,9 @@ The default value is 259200 seconds (3 days). +
            + **DeliveryOptimization/DOMaxCacheSize** @@ -567,7 +566,9 @@ The default value is 20. +
            + **DeliveryOptimization/DOMaxDownloadBandwidth** @@ -614,7 +615,9 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts +
            + **DeliveryOptimization/DOMaxUploadBandwidth** @@ -661,7 +664,9 @@ The default value is 0, which permits unlimited possible bandwidth (optimized fo +
            + **DeliveryOptimization/DOMinBackgroundQos** @@ -708,7 +713,9 @@ The default value is 500. +
            + **DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** @@ -754,7 +761,9 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser +
            + **DeliveryOptimization/DOMinDiskSizeAllowedToPeer** @@ -804,7 +813,9 @@ The default value is 32 GB. +
            + **DeliveryOptimization/DOMinFileSizeToCache** @@ -851,7 +862,9 @@ The default value is 100 MB. +
            + **DeliveryOptimization/DOMinRAMAllowedToPeer** @@ -898,7 +911,9 @@ The default value is 4 GB. +
            + **DeliveryOptimization/DOModifyCacheDrive** @@ -945,7 +960,9 @@ By default, %SystemDrive% is used to store the cache. +
            + **DeliveryOptimization/DOMonthlyUploadDataCap** @@ -994,7 +1011,9 @@ The default value is 20. +
            + **DeliveryOptimization/DOPercentageMaxBackDownloadBandwidth** @@ -1034,18 +1053,12 @@ The default value is 20. Added in Windows 10, next major update. Specifies the maximum background download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for background downloads. Note that downloads from LAN peers will not be throttled even when this policy is set. + - - - - - - - - - +
            + **DeliveryOptimization/DOPercentageMaxDownloadBandwidth** @@ -1054,7 +1067,9 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo +
            + **DeliveryOptimization/DOPercentageMaxForeDownloadBandwidth** @@ -1094,18 +1109,12 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo Added in Windows 10, next major update. Specifies the maximum foreground download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for foreground downloads. Note that downloads from LAN peers will not be throttled even when this policy is set. + - - - - - - - - - +
            + **DeliveryOptimization/DORestrictPeerSelectionBy** @@ -1154,14 +1163,10 @@ The following list shows the supported values: - 1 - Subnet mask. - - - - - - +
            + **DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth** @@ -1201,6 +1206,7 @@ The following list shows the supported values: Added in Windows 10, next major update. Specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. Note that downloads from LAN peers will not be throttled even when this policy is set. + This policy allows an IT Admin to define the following: @@ -1208,15 +1214,12 @@ This policy allows an IT Admin to define the following: - Business hours range (for example 06:00 to 18:00) - % of throttle for foreground traffic during business hours - % of throttle for foreground traffic outside of business hours + - - - - - - +
            + **DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth** @@ -1256,6 +1259,7 @@ This policy allows an IT Admin to define the following: Added in Windows 10, next major update. Specifies the maximum foreground download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. Note that downloads from LAN peers will not be throttled even when this policy is set. + This policy allows an IT Admin to define the following: @@ -1263,13 +1267,8 @@ This policy allows an IT Admin to define the following: - Business hours range (for example 06:00 to 18:00) - % of throttle for foreground traffic during business hours - % of throttle for foreground traffic outside of business hours + - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index 048304c12e..bf93aa8e5e 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Desktop @@ -24,7 +24,9 @@ ms.date: 11/01/2017 +
            + **Desktop/PreventUserRedirectionOfProfileFolders** diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index 4b9ab87704..7a77348d53 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - DeviceGuard @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            + **DeviceGuard/EnableVirtualizationBasedSecurity** @@ -67,7 +69,6 @@ ms.date: 12/14/2017 -  Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. @@ -79,7 +80,9 @@ The following list shows the supported values: +
            + **DeviceGuard/LsaCfgFlags** @@ -116,7 +119,6 @@ The following list shows the supported values: -  Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. @@ -129,7 +131,9 @@ The following list shows the supported values: +
            + **DeviceGuard/RequirePlatformSecurityFeatures** @@ -167,8 +171,6 @@ The following list shows the supported values: Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. -  - diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 7e7740810a..efc8a18433 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - DeviceInstallation @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** @@ -87,7 +89,9 @@ ADMX Info: +
            + **DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 9d4a67b93c..963e8714e8 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/12/2018 +ms.date: 01/29/2018 --- # Policy CSP - DeviceLock @@ -74,7 +74,9 @@ ms.date: 01/12/2018 +
            + **DeviceLock/AllowIdleReturnWithoutPassword** @@ -129,7 +131,9 @@ The following list shows the supported values: +
            + **DeviceLock/AllowScreenTimeoutWhileLockedUserConfig** @@ -186,7 +190,9 @@ The following list shows the supported values: +
            + **DeviceLock/AllowSimpleDevicePassword** @@ -238,7 +244,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/AlphanumericDevicePasswordRequired** @@ -294,11 +302,11 @@ The following list shows the supported values: > > If **AlphanumericDevicePasswordRequired** is set to 0, then MinDevicePasswordLength = 4 and MinDevicePasswordComplexCharacters = 2. -  - +
            + **DeviceLock/DevicePasswordEnabled** @@ -384,7 +392,9 @@ The following list shows the supported values: +
            + **DeviceLock/DevicePasswordExpiration** @@ -438,7 +448,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/DevicePasswordHistory** @@ -494,7 +506,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/EnforceLockScreenAndLogonImage** @@ -541,7 +555,9 @@ Value type is a string, which is the full image filepath and filename. +
            + **DeviceLock/EnforceLockScreenProvider** @@ -588,7 +604,9 @@ Value type is a string, which is the AppID. +
            + **DeviceLock/MaxDevicePasswordFailedAttempts** @@ -649,7 +667,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/MaxInactivityTimeDeviceLock** @@ -701,7 +721,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay** @@ -751,7 +773,9 @@ The following list shows the supported values: +
            + **DeviceLock/MinDevicePasswordComplexCharacters** @@ -863,7 +887,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/MinDevicePasswordLength** @@ -920,7 +946,9 @@ For additional information about this policy, see [Exchange ActiveSync Policy En +
            + **DeviceLock/MinimumPasswordAge** @@ -964,17 +992,10 @@ The minimum password age must be less than the Maximum password age, unless the Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. - - - - - - - - - +
            + **DeviceLock/PreventLockScreenSlideShow** @@ -1034,7 +1055,9 @@ ADMX Info: +
            + **DeviceLock/ScreenTimeoutWhileLocked** diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index 2f510c687c..278ae2808f 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Display @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **Display/TurnOffGdiDPIScalingForApps** @@ -81,7 +83,9 @@ To validate on Desktop, do the following: +
            + **Display/TurnOnGdiDPIScalingForApps** diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 0b37a6b5c5..ed70c0cb02 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Education @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            + **Education/DefaultPrinterName** @@ -73,7 +75,9 @@ The policy value is expected to be the name (network host name) of an installed +
            + **Education/PreventAddingNewPrinters** @@ -121,7 +125,9 @@ The following list shows the supported values: +
            + **Education/PrinterNames** diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index a53e00425b..1a432f3397 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - EnterpriseCloudPrint @@ -39,7 +39,9 @@ ms.date: 11/01/2017 +
            + **EnterpriseCloudPrint/CloudPrintOAuthAuthority** @@ -84,7 +86,9 @@ The default value is an empty string. Otherwise, the value should contain the UR +
            + **EnterpriseCloudPrint/CloudPrintOAuthClientId** @@ -129,7 +133,9 @@ The default value is an empty string. Otherwise, the value should contain a GUID +
            + **EnterpriseCloudPrint/CloudPrintResourceId** @@ -174,7 +180,9 @@ The default value is an empty string. Otherwise, the value should contain a URL. +
            + **EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint** @@ -219,7 +227,9 @@ The default value is an empty string. Otherwise, the value should contain the UR +
            + **EnterpriseCloudPrint/DiscoveryMaxPrinterLimit** @@ -264,7 +274,9 @@ For Windows Mobile, the default value is 20. +
            + **EnterpriseCloudPrint/MopriaDiscoveryResourceId** diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index 67f7bd2d6a..71b4c992f1 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - ErrorReporting @@ -36,7 +36,9 @@ ms.date: 11/01/2017 +
            + **ErrorReporting/CustomizeConsentSettings** @@ -106,7 +108,9 @@ ADMX Info: +
            + **ErrorReporting/DisableWindowsErrorReporting** @@ -166,7 +170,9 @@ ADMX Info: +
            + **ErrorReporting/DisplayErrorNotification** @@ -230,7 +236,9 @@ ADMX Info: +
            + **ErrorReporting/DoNotSendAdditionalData** @@ -290,7 +298,9 @@ ADMX Info: +
            + **ErrorReporting/PreventCriticalErrorDisplay** diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index ea5746021f..c98738d293 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - EventLogService @@ -33,7 +33,9 @@ ms.date: 11/01/2017 +
            + **EventLogService/ControlEventLogBehavior** @@ -95,7 +97,9 @@ ADMX Info: +
            + **EventLogService/SpecifyMaximumFileSizeApplicationLog** @@ -155,7 +159,9 @@ ADMX Info: +
            + **EventLogService/SpecifyMaximumFileSizeSecurityLog** @@ -215,7 +221,9 @@ ADMX Info: +
            + **EventLogService/SpecifyMaximumFileSizeSystemLog** diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index cb04d76f6a..c8aaf83293 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/19/2017 +ms.date: 01/29/2018 --- # Policy CSP - Experience @@ -86,7 +86,9 @@ ms.date: 12/19/2017 +
            + **Experience/AllowCopyPaste** @@ -139,7 +141,9 @@ The following list shows the supported values: +
            + **Experience/AllowCortana** @@ -189,7 +193,9 @@ The following list shows the supported values: +
            + **Experience/AllowDeviceDiscovery** @@ -241,7 +247,9 @@ The following list shows the supported values: +
            + **Experience/AllowFindMyDevice** @@ -293,7 +301,9 @@ The following list shows the supported values: +
            + **Experience/AllowManualMDMUnenrollment** @@ -347,7 +357,9 @@ The following list shows the supported values: +
            + **Experience/AllowSIMErrorDialogPromptWhenNoSIM** @@ -399,15 +411,20 @@ The following list shows the supported values: +
            + **Experience/AllowSaveAsOfOfficeFiles** This policy is deprecated. + +
            + **Experience/AllowScreenCapture** @@ -461,15 +478,20 @@ The following list shows the supported values: +
            + **Experience/AllowSharingOfOfficeFiles** This policy is deprecated. + +
            + **Experience/AllowSyncMySettings** @@ -517,7 +539,9 @@ The following list shows the supported values: +
            + **Experience/AllowTailoredExperiencesWithDiagnosticData** @@ -574,7 +598,9 @@ The following list shows the supported values: +
            + **Experience/AllowTaskSwitcher** @@ -626,7 +652,9 @@ The following list shows the supported values: +
            + **Experience/AllowThirdPartySuggestionsInWindowsSpotlight** @@ -678,7 +706,9 @@ The following list shows the supported values: +
            + **Experience/AllowVoiceRecording** @@ -732,7 +762,9 @@ The following list shows the supported values: +
            + **Experience/AllowWindowsConsumerFeatures** @@ -786,7 +818,9 @@ The following list shows the supported values: +
            + **Experience/AllowWindowsSpotlight** @@ -840,7 +874,9 @@ The following list shows the supported values: +
            + **Experience/AllowWindowsSpotlightOnActionCenter** @@ -893,7 +929,9 @@ The following list shows the supported values: +
            + **Experience/AllowWindowsSpotlightWindowsWelcomeExperience** @@ -947,7 +985,9 @@ The following list shows the supported values: +
            + **Experience/AllowWindowsTips** @@ -995,7 +1035,9 @@ The following list shows the supported values: +
            + **Experience/ConfigureWindowsSpotlightOnLockScreen** @@ -1046,7 +1088,9 @@ The following list shows the supported values: +
            + **Experience/DoNotShowFeedbackNotifications** diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index 7c42eba692..c5da5ddb2d 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - ExploitGuard @@ -24,7 +24,9 @@ ms.date: 11/01/2017 +
            + **ExploitGuard/ExploitProtectionSettings** diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index 86a2dccbac..d0db2bf70f 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Games @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Games/AllowAdvancedGamingServices** diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 6806de6ebf..98cb777d45 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Handwriting @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Handwriting/PanelDefaultModeDocked** @@ -67,7 +69,7 @@ The handwriting panel has 2 modes - floats near the text box, or docked to the b In floating mode, the content is hidden behind a flying-in panel and results in end-user dissatisfaction. The end-user will need to drag the flying-in panel to see the rest of the content. In the fixed mode, the flying-in panel is fixed to the bottom of the screen and does not require any user interaction. -The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way. +The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way. diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index 88e6a352f7..8eb6808dbe 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - InternetExplorer @@ -750,7 +750,9 @@ ms.date: 11/01/2017 +
            + **InternetExplorer/AddSearchProvider** @@ -811,7 +813,9 @@ ADMX Info: +
            + **InternetExplorer/AllowActiveXFiltering** @@ -872,7 +876,9 @@ ADMX Info: +
            + **InternetExplorer/AllowAddOnList** @@ -939,7 +945,9 @@ ADMX Info: +
            + **InternetExplorer/AllowAutoComplete** @@ -976,6 +984,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -993,7 +1002,9 @@ ADMX Info: +
            + **InternetExplorer/AllowCertificateAddressMismatchWarning** @@ -1031,6 +1042,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1048,7 +1060,9 @@ ADMX Info: +
            + **InternetExplorer/AllowDeletingBrowsingHistoryOnExit** @@ -1086,6 +1100,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1103,7 +1118,9 @@ ADMX Info: +
            + **InternetExplorer/AllowEnhancedProtectedMode** @@ -1166,7 +1183,9 @@ ADMX Info: +
            + **InternetExplorer/AllowEnterpriseModeFromToolsMenu** @@ -1227,7 +1246,9 @@ ADMX Info: +
            + **InternetExplorer/AllowEnterpriseModeSiteList** @@ -1288,7 +1309,9 @@ ADMX Info: +
            + **InternetExplorer/AllowFallbackToSSL3** @@ -1325,6 +1348,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1342,7 +1366,9 @@ ADMX Info: +
            + **InternetExplorer/AllowInternetExplorer7PolicyList** @@ -1403,7 +1429,9 @@ ADMX Info: +
            + **InternetExplorer/AllowInternetExplorerStandardsMode** @@ -1466,7 +1494,9 @@ ADMX Info: +
            + **InternetExplorer/AllowInternetZoneTemplate** @@ -1533,7 +1563,9 @@ ADMX Info: +
            + **InternetExplorer/AllowIntranetZoneTemplate** @@ -1600,7 +1632,9 @@ ADMX Info: +
            + **InternetExplorer/AllowLocalMachineZoneTemplate** @@ -1667,7 +1701,9 @@ ADMX Info: +
            + **InternetExplorer/AllowLockedDownInternetZoneTemplate** @@ -1734,7 +1770,9 @@ ADMX Info: +
            + **InternetExplorer/AllowLockedDownIntranetZoneTemplate** @@ -1801,7 +1839,9 @@ ADMX Info: +
            + **InternetExplorer/AllowLockedDownLocalMachineZoneTemplate** @@ -1868,7 +1908,9 @@ ADMX Info: +
            + **InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate** @@ -1935,7 +1977,9 @@ ADMX Info: +
            + **InternetExplorer/AllowOneWordEntry** @@ -1996,7 +2040,9 @@ ADMX Info: +
            + **InternetExplorer/AllowSiteToZoneAssignmentList** @@ -2063,7 +2109,9 @@ ADMX Info: +
            + **InternetExplorer/AllowSoftwareWhenSignatureIsInvalid** @@ -2101,6 +2149,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2118,7 +2167,9 @@ ADMX Info: +
            + **InternetExplorer/AllowSuggestedSites** @@ -2181,7 +2232,9 @@ ADMX Info: +
            + **InternetExplorer/AllowTrustedSitesZoneTemplate** @@ -2248,7 +2301,9 @@ ADMX Info: +
            + **InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate** @@ -2315,7 +2370,9 @@ ADMX Info: +
            + **InternetExplorer/AllowsRestrictedSitesZoneTemplate** @@ -2382,7 +2439,9 @@ ADMX Info: +
            + **InternetExplorer/CheckServerCertificateRevocation** @@ -2420,6 +2479,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2437,7 +2497,9 @@ ADMX Info: +
            + **InternetExplorer/CheckSignaturesOnDownloadedPrograms** @@ -2475,6 +2537,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2492,7 +2555,9 @@ ADMX Info: +
            + **InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses** @@ -2530,6 +2595,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2547,7 +2613,9 @@ ADMX Info: +
            + **InternetExplorer/DisableAdobeFlash** @@ -2610,7 +2678,9 @@ ADMX Info: +
            + **InternetExplorer/DisableBypassOfSmartScreenWarnings** @@ -2671,7 +2741,9 @@ ADMX Info: +
            + **InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles** @@ -2732,7 +2804,9 @@ ADMX Info: +
            + **InternetExplorer/DisableConfiguringHistory** @@ -2770,6 +2844,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2787,7 +2862,9 @@ ADMX Info: +
            + **InternetExplorer/DisableCrashDetection** @@ -2825,6 +2902,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2842,7 +2920,9 @@ ADMX Info: +
            + **InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation** @@ -2905,7 +2985,9 @@ ADMX Info: +
            + **InternetExplorer/DisableDeletingUserVisitedWebsites** @@ -2943,6 +3025,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2960,7 +3043,9 @@ ADMX Info: +
            + **InternetExplorer/DisableEnclosureDownloading** @@ -3021,7 +3106,9 @@ ADMX Info: +
            + **InternetExplorer/DisableEncryptionSupport** @@ -3084,7 +3171,9 @@ ADMX Info: +
            + **InternetExplorer/DisableFirstRunWizard** @@ -3149,7 +3238,9 @@ ADMX Info: +
            + **InternetExplorer/DisableFlipAheadFeature** @@ -3214,7 +3305,9 @@ ADMX Info: +
            + **InternetExplorer/DisableHomePageChange** @@ -3274,7 +3367,9 @@ ADMX Info: +
            + **InternetExplorer/DisableIgnoringCertificateErrors** @@ -3312,6 +3407,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3329,7 +3425,9 @@ ADMX Info: +
            + **InternetExplorer/DisableInPrivateBrowsing** @@ -3367,6 +3465,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3384,7 +3483,9 @@ ADMX Info: +
            + **InternetExplorer/DisableProcessesInEnhancedProtectedMode** @@ -3422,6 +3523,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3439,7 +3541,9 @@ ADMX Info: +
            + **InternetExplorer/DisableProxyChange** @@ -3500,7 +3604,9 @@ ADMX Info: +
            + **InternetExplorer/DisableSearchProviderChange** @@ -3561,7 +3667,9 @@ ADMX Info: +
            + **InternetExplorer/DisableSecondaryHomePageChange** @@ -3624,7 +3732,9 @@ ADMX Info: +
            + **InternetExplorer/DisableSecuritySettingsCheck** @@ -3662,6 +3772,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3679,7 +3790,9 @@ ADMX Info: +
            + **InternetExplorer/DisableUpdateCheck** @@ -3741,7 +3854,9 @@ ADMX Info: +
            + **InternetExplorer/DoNotAllowActiveXControlsInProtectedMode** @@ -3779,6 +3894,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3796,7 +3912,9 @@ ADMX Info: +
            + **InternetExplorer/DoNotAllowUsersToAddSites** @@ -3862,7 +3980,9 @@ ADMX Info: +
            + **InternetExplorer/DoNotAllowUsersToChangePolicies** @@ -3928,7 +4048,9 @@ ADMX Info: +
            + **InternetExplorer/DoNotBlockOutdatedActiveXControls** @@ -3991,7 +4113,9 @@ ADMX Info: +
            + **InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains** @@ -4058,7 +4182,9 @@ ADMX Info: +
            + **InternetExplorer/IncludeAllLocalSites** @@ -4121,7 +4247,9 @@ ADMX Info: +
            + **InternetExplorer/IncludeAllNetworkPaths** @@ -4184,7 +4312,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowAccessToDataSources** @@ -4247,7 +4377,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls** @@ -4310,7 +4442,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads** @@ -4371,7 +4505,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowCopyPasteViaScript** @@ -4409,6 +4545,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4426,7 +4563,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles** @@ -4464,6 +4603,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4481,7 +4621,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowFontDownloads** @@ -4544,7 +4686,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowLessPrivilegedSites** @@ -4607,7 +4751,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowLoadingOfXAMLFiles** @@ -4645,6 +4791,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4662,7 +4809,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents** @@ -4725,7 +4874,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls** @@ -4763,6 +4914,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4780,7 +4932,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** @@ -4818,6 +4972,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4835,7 +4990,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowScriptInitiatedWindows** @@ -4873,6 +5030,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4890,7 +5048,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls** @@ -4928,6 +5088,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4945,7 +5106,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowScriptlets** @@ -5008,7 +5171,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowSmartScreenIE** @@ -5073,7 +5238,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript** @@ -5111,6 +5278,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5128,7 +5296,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneAllowUserDataPersistence** @@ -5191,7 +5361,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -5229,6 +5401,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5246,7 +5419,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneDownloadSignedActiveXControls** @@ -5284,6 +5459,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5301,7 +5477,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneDownloadUnsignedActiveXControls** @@ -5339,6 +5517,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5356,7 +5535,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter** @@ -5394,6 +5575,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5411,7 +5593,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** @@ -5449,6 +5633,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5466,7 +5651,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** @@ -5504,6 +5691,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5521,7 +5709,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneEnableMIMESniffing** @@ -5559,6 +5749,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5576,7 +5767,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneEnableProtectedMode** @@ -5614,6 +5807,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5631,7 +5825,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer** @@ -5669,6 +5865,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5686,7 +5883,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneInitializeAndScriptActiveXControls** @@ -5751,7 +5950,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe** @@ -5779,9 +5980,12 @@ ADMX Info: + +
            + **InternetExplorer/InternetZoneJavaPermissions** @@ -5819,6 +6023,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5836,7 +6041,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME** @@ -5874,6 +6081,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5891,7 +6099,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneLogonOptions** @@ -5929,6 +6139,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5946,7 +6157,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneNavigateWindowsAndFrames** @@ -6009,7 +6222,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** @@ -6047,6 +6262,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6064,7 +6280,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles** @@ -6102,6 +6320,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6119,7 +6338,9 @@ ADMX Info: +
            + **InternetExplorer/InternetZoneUsePopupBlocker** @@ -6157,6 +6378,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6174,7 +6396,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowAccessToDataSources** @@ -6237,7 +6461,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls** @@ -6300,7 +6526,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads** @@ -6361,7 +6589,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowFontDownloads** @@ -6424,7 +6654,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowLessPrivilegedSites** @@ -6487,7 +6719,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents** @@ -6550,7 +6784,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowScriptlets** @@ -6613,7 +6849,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowSmartScreenIE** @@ -6678,7 +6916,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneAllowUserDataPersistence** @@ -6741,7 +6981,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -6779,6 +7021,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6796,7 +7039,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls** @@ -6861,7 +7106,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneJavaPermissions** @@ -6899,6 +7146,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6916,7 +7164,9 @@ ADMX Info: +
            + **InternetExplorer/IntranetZoneNavigateWindowsAndFrames** @@ -6979,7 +7229,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowAccessToDataSources** @@ -7042,7 +7294,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls** @@ -7105,7 +7359,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads** @@ -7166,7 +7422,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowFontDownloads** @@ -7229,7 +7487,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites** @@ -7292,7 +7552,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents** @@ -7355,7 +7617,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowScriptlets** @@ -7418,7 +7682,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowSmartScreenIE** @@ -7483,7 +7749,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneAllowUserDataPersistence** @@ -7546,7 +7814,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -7584,6 +7854,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7601,7 +7872,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls** @@ -7666,7 +7939,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneJavaPermissions** @@ -7704,6 +7979,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7721,7 +7997,9 @@ ADMX Info: +
            + **InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames** @@ -7784,7 +8062,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources** @@ -7847,7 +8127,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls** @@ -7910,7 +8192,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads** @@ -7971,7 +8255,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowFontDownloads** @@ -8034,7 +8320,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites** @@ -8097,7 +8385,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents** @@ -8160,7 +8450,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowScriptlets** @@ -8223,7 +8515,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE** @@ -8288,7 +8582,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence** @@ -8351,7 +8647,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls** @@ -8416,7 +8714,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneJavaPermissions** @@ -8454,6 +8754,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8471,7 +8772,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames** @@ -8534,7 +8837,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources** @@ -8597,7 +8902,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls** @@ -8660,7 +8967,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads** @@ -8721,7 +9030,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowFontDownloads** @@ -8784,7 +9095,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites** @@ -8847,7 +9160,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents** @@ -8910,7 +9225,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowScriptlets** @@ -8973,7 +9290,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE** @@ -9038,7 +9357,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence** @@ -9101,7 +9422,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls** @@ -9166,7 +9489,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames** @@ -9229,7 +9554,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources** @@ -9292,7 +9619,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls** @@ -9355,7 +9684,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads** @@ -9416,7 +9747,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads** @@ -9479,7 +9812,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites** @@ -9542,7 +9877,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents** @@ -9605,7 +9942,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets** @@ -9668,7 +10007,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE** @@ -9733,7 +10074,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence** @@ -9796,7 +10139,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls** @@ -9861,7 +10206,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneJavaPermissions** @@ -9899,6 +10246,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9916,7 +10264,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames** @@ -9979,7 +10329,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources** @@ -10042,7 +10394,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -10105,7 +10459,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -10166,7 +10522,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads** @@ -10229,7 +10587,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites** @@ -10292,7 +10652,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents** @@ -10355,7 +10717,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets** @@ -10418,7 +10782,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE** @@ -10483,7 +10849,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence** @@ -10546,7 +10914,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls** @@ -10611,7 +10981,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions** @@ -10649,6 +11021,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10666,7 +11039,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames** @@ -10729,7 +11104,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources** @@ -10792,7 +11169,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -10855,7 +11234,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -10916,7 +11297,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads** @@ -10979,7 +11362,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites** @@ -11042,7 +11427,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents** @@ -11105,7 +11492,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets** @@ -11168,7 +11557,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE** @@ -11233,7 +11624,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence** @@ -11296,7 +11689,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls** @@ -11361,7 +11756,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions** @@ -11399,6 +11796,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11416,7 +11814,9 @@ ADMX Info: +
            + **InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames** @@ -11479,7 +11879,9 @@ ADMX Info: +
            + **InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses** @@ -11517,6 +11919,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11534,7 +11937,9 @@ ADMX Info: +
            + **InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses** @@ -11572,6 +11977,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11589,7 +11995,9 @@ ADMX Info: +
            + **InternetExplorer/NotificationBarInternetExplorerProcesses** @@ -11627,6 +12035,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11644,7 +12053,9 @@ ADMX Info: +
            + **InternetExplorer/PreventManagingSmartScreenFilter** @@ -11682,6 +12093,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11699,7 +12111,9 @@ ADMX Info: +
            + **InternetExplorer/PreventPerUserInstallationOfActiveXControls** @@ -11737,6 +12151,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11754,7 +12169,9 @@ ADMX Info: +
            + **InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses** @@ -11792,6 +12209,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11809,7 +12227,9 @@ ADMX Info: +
            + **InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls** @@ -11847,6 +12267,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11864,7 +12285,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses** @@ -11902,6 +12325,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11919,7 +12343,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictFileDownloadInternetExplorerProcesses** @@ -11957,6 +12383,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11974,7 +12401,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources** @@ -12037,7 +12466,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowActiveScripting** @@ -12075,6 +12506,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12092,7 +12524,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -12155,7 +12589,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -12216,7 +12652,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors** @@ -12254,6 +12692,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12271,7 +12710,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript** @@ -12309,6 +12750,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12326,7 +12768,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles** @@ -12364,6 +12808,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12381,7 +12826,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowFileDownloads** @@ -12419,6 +12866,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12436,7 +12884,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowFontDownloads** @@ -12499,7 +12949,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites** @@ -12562,7 +13014,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles** @@ -12600,6 +13054,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12617,7 +13072,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH** @@ -12655,6 +13112,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12672,7 +13130,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents** @@ -12735,7 +13195,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls** @@ -12773,6 +13235,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12790,7 +13253,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** @@ -12828,6 +13293,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12845,7 +13311,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows** @@ -12883,6 +13351,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12900,7 +13369,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls** @@ -12938,6 +13409,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12955,7 +13427,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowScriptlets** @@ -13018,7 +13492,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE** @@ -13083,7 +13559,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript** @@ -13121,6 +13599,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13138,7 +13617,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence** @@ -13201,7 +13682,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -13239,6 +13722,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13256,7 +13740,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls** @@ -13294,6 +13780,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13311,7 +13798,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls** @@ -13349,6 +13838,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13366,7 +13856,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilter** @@ -13404,6 +13896,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13421,7 +13914,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** @@ -13459,6 +13954,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13476,7 +13972,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** @@ -13514,6 +14012,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13531,7 +14030,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneEnableMIMESniffing** @@ -13569,6 +14070,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13586,7 +14088,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer** @@ -13624,6 +14128,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13641,7 +14146,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls** @@ -13706,7 +14213,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneJavaPermissions** @@ -13744,6 +14253,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13761,7 +14271,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME** @@ -13799,6 +14311,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13816,7 +14329,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneLogonOptions** @@ -13854,6 +14369,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13871,7 +14387,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames** @@ -13934,7 +14452,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins** @@ -13972,6 +14492,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13989,7 +14510,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** @@ -14027,6 +14550,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14044,7 +14568,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting** @@ -14082,6 +14608,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14099,7 +14626,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets** @@ -14137,6 +14666,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14154,7 +14684,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles** @@ -14192,6 +14724,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14209,7 +14742,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode** @@ -14247,6 +14782,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14264,7 +14800,9 @@ ADMX Info: +
            + **InternetExplorer/RestrictedSitesZoneUsePopupBlocker** @@ -14302,6 +14840,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14319,7 +14858,9 @@ ADMX Info: +
            + **InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses** @@ -14357,6 +14898,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14374,7 +14916,9 @@ ADMX Info: +
            + **InternetExplorer/SearchProviderList** @@ -14435,7 +14979,9 @@ ADMX Info: +
            + **InternetExplorer/SecurityZonesUseOnlyMachineSettings** @@ -14472,6 +15018,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14489,7 +15036,9 @@ ADMX Info: +
            + **InternetExplorer/SpecifyUseOfActiveXInstallerService** @@ -14527,6 +15076,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14544,7 +15094,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowAccessToDataSources** @@ -14607,7 +15159,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -14670,7 +15224,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -14731,7 +15287,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowFontDownloads** @@ -14794,7 +15352,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites** @@ -14857,7 +15417,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents** @@ -14920,7 +15482,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowScriptlets** @@ -14983,7 +15547,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowSmartScreenIE** @@ -15048,7 +15614,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneAllowUserDataPersistence** @@ -15111,7 +15679,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -15149,6 +15719,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15166,7 +15737,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls** @@ -15231,7 +15804,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneJavaPermissions** @@ -15269,6 +15844,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15286,7 +15862,9 @@ ADMX Info: +
            + **InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames** diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 43b40603af..322d3801c4 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Kerberos @@ -36,7 +36,9 @@ ms.date: 11/01/2017 +
            + **Kerberos/AllowForestSearchOrder** @@ -96,7 +98,9 @@ ADMX Info: +
            + **Kerberos/KerberosClientSupportsClaimsCompoundArmor** @@ -155,7 +159,9 @@ ADMX Info: +
            + **Kerberos/RequireKerberosArmoring** @@ -219,7 +225,9 @@ ADMX Info: +
            + **Kerberos/RequireStrictKDCValidation** @@ -279,7 +287,9 @@ ADMX Info: +
            + **Kerberos/SetMaximumContextTokenSize** diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index ab4e33bba0..3384e28b77 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - KioskBrowser @@ -41,7 +41,9 @@ ms.date: 01/03/2018 +
            + **KioskBrowser/BlockedUrlExceptions** @@ -82,17 +84,10 @@ ms.date: 01/03/2018 Added in Windows 10, next major update. List of exceptions to the blocked website URLs (with wildcard support). This is used to configure URLs kiosk browsers are allowed to navigate to, which are a subset of the blocked URLs. - - - - - - - - - +
            + **KioskBrowser/BlockedUrls** @@ -133,17 +128,10 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit Added in Windows 10, next major update. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to. - - - - - - - - - +
            + **KioskBrowser/DefaultURL** @@ -184,17 +172,10 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc Added in Windows 10, next major update. Configures the default URL kiosk browsers to navigate on launch and restart. - - - - - - - - - +
            + **KioskBrowser/EnableHomeButton** @@ -235,17 +216,10 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser Added in Windows 10, next major update. Enable/disable kiosk browser's home button. - - - - - - - - - +
            + **KioskBrowser/EnableNavigationButtons** @@ -286,17 +260,10 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt Added in Windows 10, next major update. Enable/disable kiosk browser's navigation buttons (forward/back). - - - - - - - - - +
            + **KioskBrowser/RestartOnIdleTime** @@ -339,15 +306,6 @@ Added in Windows 10, next major update. Amount of time in minutes the session is The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser. - - - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 58a2418bf7..6d5197aac8 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Licensing @@ -27,7 +27,9 @@ ms.date: 12/14/2017 +
            + **Licensing/AllowWindowsEntitlementReactivation** @@ -75,7 +77,9 @@ The following list shows the supported values: +
            + **Licensing/DisallowKMSClientOnlineAVSValidation** diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 5ef2395ae6..5bd76c04ea 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/29/2017 +ms.date: 01/29/2018 --- # Policy CSP - LocalPoliciesSecurityOptions @@ -188,7 +188,9 @@ ms.date: 12/29/2017 +
            + **LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** @@ -244,7 +246,9 @@ The following list shows the supported values: +
            + **LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** @@ -297,7 +301,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** @@ -347,7 +353,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** @@ -405,7 +413,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount** @@ -452,7 +462,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount** @@ -499,7 +511,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon** @@ -546,17 +560,10 @@ Caution: Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia** @@ -603,17 +610,10 @@ This security setting determines who is allowed to format and eject removable NT Default: This policy is not defined and only Administrators have this ability. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters** @@ -662,17 +662,10 @@ Note This setting does not affect the ability to add a local printer. This setting does not affect Administrators. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly** @@ -718,17 +711,10 @@ If this policy is enabled, it allows only the interactively logged-on user to ac Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways** @@ -785,17 +771,10 @@ If this policy is enabled, the policy Domain member: Digitally sign secure chann Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible** @@ -849,17 +828,10 @@ There is no known reason for disabling this setting. Besides unnecessarily reduc Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible** @@ -907,17 +879,10 @@ This setting determines whether or not the domain member attempts to negotiate s Default: Enabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges** @@ -966,17 +931,10 @@ This security setting should not be enabled. Computer account passwords are used This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge** @@ -1024,17 +982,10 @@ Important This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey** @@ -1093,17 +1044,10 @@ In order to take advantage of this policy on member workstations and servers, al In order to take advantage of this policy on domain controllers, all domain controllers in the same domain as well as all trusted domains must run Windows 2000 or later. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** @@ -1151,7 +1095,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn** @@ -1204,7 +1150,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn** @@ -1258,7 +1206,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL** @@ -1313,7 +1263,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit** @@ -1363,7 +1315,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn** @@ -1412,7 +1366,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn** @@ -1459,7 +1415,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior** @@ -1520,17 +1478,10 @@ Default: This policy is not defined, which means that the system treats it as No On Windows Vista and above: For this setting to work, the Smart Card Removal Policy service must be started. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways** @@ -1592,17 +1543,10 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees** @@ -1661,17 +1605,10 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers** @@ -1717,17 +1654,10 @@ Sending unencrypted passwords is a security risk. Default: Disabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession** @@ -1775,17 +1705,10 @@ For this policy setting, a value of 0 means to disconnect an idle session as qui Default:This policy is not defined, which means that the system treats it as 15 minutes for servers and undefined for workstations. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways** @@ -1856,17 +1779,10 @@ HKLM\System\CurrentControlSet\Services\lanmanserver\parameters\enableW9xsecurity For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees** @@ -1929,17 +1845,10 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts** @@ -1995,17 +1904,10 @@ Important This policy has no impact on domain controllers. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares** @@ -2051,17 +1953,10 @@ Windows allows anonymous users to perform certain activities, such as enumeratin Default: Disabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers** @@ -2109,17 +2004,10 @@ If this policy is enabled, the Everyone SID is added to the token that is create Default: Disabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares** @@ -2165,17 +2053,10 @@ Network access: Shares that can be accessed anonymously Default: Enabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM** @@ -2221,17 +2102,10 @@ If not selected, the default security descriptor will be used. This policy is supported on at least Windows Server 2016. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM** @@ -2285,17 +2159,10 @@ This policy is supported on at least Windows Vista or Windows Server 2008. Note: Windows Vista or Windows Server 2008 do not expose this setting in Group Policy. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests** @@ -2344,7 +2211,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange** @@ -2395,17 +2264,10 @@ Windows 2000 Service Pack 2 (SP2) and above offer compatibility with authenticat This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP, and the Windows Server 2003 family to communicate with computers running Windows 95 and Windows 98. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel** @@ -2471,17 +2333,10 @@ Windows Server 2003: Send NTLM response only Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients** @@ -2532,17 +2387,10 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers** @@ -2593,17 +2441,10 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** @@ -2644,7 +2485,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** @@ -2699,7 +2542,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile** @@ -2747,17 +2592,10 @@ When this policy is enabled, it causes the system pagefile to be cleared upon cl Default: Disabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems** @@ -2803,17 +2641,10 @@ If this setting is enabled, case insensitivity is enforced for all directory obj Default: Enabled. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** @@ -2867,7 +2698,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** @@ -2926,7 +2759,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** @@ -2978,7 +2813,9 @@ The following list shows the supported values: +
            + **LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation** @@ -3026,17 +2863,10 @@ Enabled: (Default) When an application installation package is detected that req Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** @@ -3085,7 +2915,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** @@ -3140,7 +2972,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode** @@ -3190,7 +3024,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** @@ -3239,7 +3075,9 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. +
            + **LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode** @@ -3287,17 +3125,10 @@ The options are: • Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. - - - - - - - - - +
            + **LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index bc22abef7f..3863b5f6b1 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Location @@ -24,7 +24,9 @@ ms.date: 11/01/2017 +
            + **Location/EnableLocation** diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index af9df333ee..e5f5ea3c9f 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - LockDown @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **LockDown/AllowEdgeSwipe** diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index 06b6844b22..31f6725776 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Maps @@ -27,7 +27,9 @@ ms.date: 12/14/2017 +
            + **Maps/AllowOfflineMapsDownloadOverMeteredConnection** @@ -78,7 +80,9 @@ The following list shows the supported values: +
            + **Maps/EnableOfflineMapsAutoUpdate** diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index aa1c3698b6..9d52633f18 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Messaging @@ -30,7 +30,9 @@ ms.date: 11/01/2017 +
            + **Messaging/AllowMMS** @@ -79,7 +81,9 @@ The following list shows the supported values: +
            + **Messaging/AllowMessageSync** @@ -125,7 +129,9 @@ The following list shows the supported values: +
            + **Messaging/AllowRCS** diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index 341511e93c..63b61350a9 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - NetworkIsolation @@ -45,7 +45,9 @@ ms.date: 11/01/2017 +
            + **NetworkIsolation/EnterpriseCloudResources** @@ -86,7 +88,9 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to +
            + **NetworkIsolation/EnterpriseIPRange** @@ -140,7 +144,9 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff +
            + **NetworkIsolation/EnterpriseIPRangesAreAuthoritative** @@ -181,7 +187,9 @@ Boolean value that tells the client to accept the configured list and not to use +
            + **NetworkIsolation/EnterpriseInternalProxyServers** @@ -222,7 +230,9 @@ This is the comma-separated list of internal proxy servers. For example "157.54. +
            + **NetworkIsolation/EnterpriseNetworkDomainNames** @@ -273,7 +283,9 @@ Here are the steps to create canonical domain names: +
            + **NetworkIsolation/EnterpriseProxyServers** @@ -314,7 +326,9 @@ This is a comma-separated list of proxy servers. Any server on this list is cons +
            + **NetworkIsolation/EnterpriseProxyServersAreAuthoritative** @@ -355,7 +369,9 @@ Boolean value that tells the client to accept the configured list of proxies and +
            + **NetworkIsolation/NeutralResources** diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index f5d74704a5..3086806c49 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Notifications @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Notifications/DisallowNotificationMirroring** diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index e4ff5000c9..ac601b4c93 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Power @@ -48,7 +48,9 @@ ms.date: 11/01/2017 +
            + **Power/AllowStandbyWhenSleepingPluggedIn** @@ -108,7 +110,9 @@ ADMX Info: +
            + **Power/DisplayOffTimeoutOnBattery** @@ -170,7 +174,9 @@ ADMX Info: +
            + **Power/DisplayOffTimeoutPluggedIn** @@ -232,7 +238,9 @@ ADMX Info: +
            + **Power/HibernateTimeoutOnBattery** @@ -295,7 +303,9 @@ ADMX Info: +
            + **Power/HibernateTimeoutPluggedIn** @@ -357,7 +367,9 @@ ADMX Info: +
            + **Power/RequirePasswordWhenComputerWakesOnBattery** @@ -417,7 +429,9 @@ ADMX Info: +
            + **Power/RequirePasswordWhenComputerWakesPluggedIn** @@ -477,7 +491,9 @@ ADMX Info: +
            + **Power/StandbyTimeoutOnBattery** @@ -539,7 +555,9 @@ ADMX Info: +
            + **Power/StandbyTimeoutPluggedIn** diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index 8718ad65f0..dc79350f3f 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - Printers @@ -30,7 +30,9 @@ ms.date: 11/01/2017 +
            + **Printers/PointAndPrintRestrictions** @@ -103,7 +105,9 @@ ADMX Info: +
            + **Printers/PointAndPrintRestrictions_User** @@ -176,7 +180,9 @@ ADMX Info: +
            + **Printers/PublishPrinters** diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 804f7611af..8cc054a89b 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Privacy @@ -252,7 +252,9 @@ ms.date: 12/14/2017 +
            + **Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** @@ -306,7 +308,9 @@ The following list shows the supported values: +
            + **Privacy/AllowInputPersonalization** @@ -346,7 +350,6 @@ The following list shows the supported values: Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. Most restricted value is 0. -  @@ -355,10 +358,11 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            + **Privacy/DisableAdvertisingId** @@ -409,7 +413,9 @@ The following list shows the supported values: +
            + **Privacy/EnableActivityFeed** @@ -457,7 +463,9 @@ The following list shows the supported values: +
            + **Privacy/LetAppsAccessAccountInfo** @@ -506,7 +514,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** @@ -547,7 +557,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** @@ -588,7 +600,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** @@ -629,7 +643,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCalendar** @@ -678,7 +694,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** @@ -719,7 +737,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** @@ -760,7 +780,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** @@ -801,7 +823,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCallHistory** @@ -850,7 +874,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** @@ -891,7 +917,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** @@ -932,7 +960,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** @@ -973,7 +1003,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCamera** @@ -1022,7 +1054,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessCamera_ForceAllowTheseApps** @@ -1063,7 +1097,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCamera_ForceDenyTheseApps** @@ -1104,7 +1140,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** @@ -1145,7 +1183,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessContacts** @@ -1194,7 +1234,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessContacts_ForceAllowTheseApps** @@ -1235,7 +1277,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessContacts_ForceDenyTheseApps** @@ -1276,7 +1320,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** @@ -1317,7 +1363,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessEmail** @@ -1366,7 +1414,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessEmail_ForceAllowTheseApps** @@ -1407,7 +1457,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessEmail_ForceDenyTheseApps** @@ -1448,7 +1500,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** @@ -1489,7 +1543,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessLocation** @@ -1538,7 +1594,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessLocation_ForceAllowTheseApps** @@ -1579,7 +1637,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessLocation_ForceDenyTheseApps** @@ -1620,7 +1680,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** @@ -1661,7 +1723,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMessaging** @@ -1710,7 +1774,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** @@ -1751,7 +1817,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** @@ -1792,7 +1860,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** @@ -1833,7 +1903,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMicrophone** @@ -1882,7 +1954,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** @@ -1923,7 +1997,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** @@ -1964,7 +2040,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** @@ -2005,7 +2083,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMotion** @@ -2054,7 +2134,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessMotion_ForceAllowTheseApps** @@ -2095,7 +2177,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMotion_ForceDenyTheseApps** @@ -2136,7 +2220,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** @@ -2177,7 +2263,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessNotifications** @@ -2226,7 +2314,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** @@ -2267,7 +2357,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** @@ -2308,7 +2400,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** @@ -2349,7 +2443,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessPhone** @@ -2398,7 +2494,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessPhone_ForceAllowTheseApps** @@ -2439,7 +2537,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessPhone_ForceDenyTheseApps** @@ -2480,7 +2580,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** @@ -2521,7 +2623,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessRadios** @@ -2570,7 +2674,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessRadios_ForceAllowTheseApps** @@ -2611,7 +2717,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessRadios_ForceDenyTheseApps** @@ -2652,7 +2760,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** @@ -2693,7 +2803,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessTasks** @@ -2734,7 +2846,9 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas +
            + **Privacy/LetAppsAccessTasks_ForceAllowTheseApps** @@ -2775,7 +2889,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N +
            + **Privacy/LetAppsAccessTasks_ForceDenyTheseApps** @@ -2816,7 +2932,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N +
            + **Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** @@ -2857,7 +2975,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N +
            + **Privacy/LetAppsAccessTrustedDevices** @@ -2906,7 +3026,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** @@ -2947,7 +3069,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** @@ -2988,7 +3112,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** @@ -3029,7 +3155,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsGetDiagnosticInfo** @@ -3078,7 +3206,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** @@ -3119,7 +3249,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** @@ -3160,7 +3292,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** @@ -3201,7 +3335,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsRunInBackground** @@ -3252,7 +3388,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsRunInBackground_ForceAllowTheseApps** @@ -3293,7 +3431,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsRunInBackground_ForceDenyTheseApps** @@ -3334,7 +3474,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** @@ -3375,7 +3517,9 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsSyncWithDevices** @@ -3424,7 +3568,9 @@ Most restricted value is 2. +
            + **Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** @@ -3465,7 +3611,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** @@ -3506,7 +3654,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** @@ -3547,7 +3697,9 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family +
            + **Privacy/PublishUserActivities** diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index 29f29a7267..b0b51ab819 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - RemoteAssistance @@ -33,7 +33,9 @@ ms.date: 11/01/2017 +
            + **RemoteAssistance/CustomizeWarningMessages** @@ -99,7 +101,9 @@ ADMX Info: +
            + **RemoteAssistance/SessionLogging** @@ -161,7 +165,9 @@ ADMX Info: +
            + **RemoteAssistance/SolicitedRemoteAssistance** @@ -231,7 +237,9 @@ ADMX Info: +
            + **RemoteAssistance/UnsolicitedRemoteAssistance** diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index dc0834d71a..782ca41f12 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - RemoteDesktopServices @@ -39,7 +39,9 @@ ms.date: 11/01/2017 +
            + **RemoteDesktopServices/AllowUsersToConnectRemotely** @@ -105,7 +107,9 @@ ADMX Info: +
            + **RemoteDesktopServices/ClientConnectionEncryptionLevel** @@ -175,7 +179,9 @@ ADMX Info: +
            + **RemoteDesktopServices/DoNotAllowDriveRedirection** @@ -239,7 +245,9 @@ ADMX Info: +
            + **RemoteDesktopServices/DoNotAllowPasswordSaving** @@ -299,7 +307,9 @@ ADMX Info: +
            + **RemoteDesktopServices/PromptForPasswordUponConnection** @@ -365,7 +375,9 @@ ADMX Info: +
            + **RemoteDesktopServices/RequireSecureRPCCommunication** diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index 315cac1258..176cd59211 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - RemoteManagement @@ -66,7 +66,9 @@ ms.date: 11/01/2017 +
            + **RemoteManagement/AllowBasicAuthentication_Client** @@ -103,6 +105,7 @@ ms.date: 11/01/2017 + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -120,7 +123,9 @@ ADMX Info: +
            + **RemoteManagement/AllowBasicAuthentication_Service** @@ -157,6 +162,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -174,7 +180,9 @@ ADMX Info: +
            + **RemoteManagement/AllowCredSSPAuthenticationClient** @@ -211,6 +219,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -228,7 +237,9 @@ ADMX Info: +
            + **RemoteManagement/AllowCredSSPAuthenticationService** @@ -265,6 +276,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -282,7 +294,9 @@ ADMX Info: +
            + **RemoteManagement/AllowRemoteServerManagement** @@ -319,6 +333,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -336,7 +351,9 @@ ADMX Info: +
            + **RemoteManagement/AllowUnencryptedTraffic_Client** @@ -373,6 +390,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -390,7 +408,9 @@ ADMX Info: +
            + **RemoteManagement/AllowUnencryptedTraffic_Service** @@ -427,6 +447,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -444,7 +465,9 @@ ADMX Info: +
            + **RemoteManagement/DisallowDigestAuthentication** @@ -481,6 +504,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -498,7 +522,9 @@ ADMX Info: +
            + **RemoteManagement/DisallowNegotiateAuthenticationClient** @@ -535,6 +561,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -552,7 +579,9 @@ ADMX Info: +
            + **RemoteManagement/DisallowNegotiateAuthenticationService** @@ -589,6 +618,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -606,7 +636,9 @@ ADMX Info: +
            + **RemoteManagement/DisallowStoringOfRunAsCredentials** @@ -643,6 +675,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -660,7 +693,9 @@ ADMX Info: +
            + **RemoteManagement/SpecifyChannelBindingTokenHardeningLevel** @@ -697,6 +732,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -714,7 +750,9 @@ ADMX Info: +
            + **RemoteManagement/TrustedHosts** @@ -751,6 +789,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -768,7 +807,9 @@ ADMX Info: +
            + **RemoteManagement/TurnOnCompatibilityHTTPListener** @@ -805,6 +846,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -822,7 +864,9 @@ ADMX Info: +
            + **RemoteManagement/TurnOnCompatibilityHTTPSListener** @@ -859,6 +903,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index 1569a65e29..7f7c9c2e4d 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - RemoteProcedureCall @@ -27,7 +27,9 @@ ms.date: 11/01/2017 +
            + **RemoteProcedureCall/RPCEndpointMapperClientAuthentication** @@ -91,7 +93,9 @@ ADMX Info: +
            + **RemoteProcedureCall/RestrictUnauthenticatedRPCClients** diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index a9538c867b..3a66eb8677 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 11/01/2017 +ms.date: 01/29/2018 --- # Policy CSP - RemoteShell @@ -42,7 +42,9 @@ ms.date: 11/01/2017 +
            + **RemoteShell/AllowRemoteShellAccess** @@ -79,6 +81,7 @@ ms.date: 11/01/2017 + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -96,7 +99,9 @@ ADMX Info: +
            + **RemoteShell/MaxConcurrentUsers** @@ -133,6 +138,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -150,7 +156,9 @@ ADMX Info: +
            + **RemoteShell/SpecifyIdleTimeout** @@ -187,6 +195,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -204,7 +213,9 @@ ADMX Info: +
            + **RemoteShell/SpecifyMaxMemory** @@ -241,6 +252,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -258,7 +270,9 @@ ADMX Info: +
            + **RemoteShell/SpecifyMaxProcesses** @@ -295,6 +309,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -312,7 +327,9 @@ ADMX Info: +
            + **RemoteShell/SpecifyMaxRemoteShells** @@ -349,6 +366,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -366,7 +384,9 @@ ADMX Info: +
            + **RemoteShell/SpecifyShellTimeout** @@ -403,6 +423,7 @@ ADMX Info: + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index e5fca3da40..d992a30b6e 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/08/2018 +ms.date: 01/29/2018 --- # Policy CSP - Search @@ -65,7 +65,9 @@ ms.date: 01/08/2018 +
            + **Search/AllowCloudSearch** @@ -111,7 +113,9 @@ The following list shows the supported values: +
            + **Search/AllowCortanaInAAD** @@ -157,16 +161,11 @@ The following list shows the supported values: - 0 (default) - Not allowed. The Cortana consent page will not appear in AAD OOBE during setup. - 1 - Allowed. The Cortana consent page will appear in Azure AAD OOBE during setup. - - - - - - - +
            + **Search/AllowIndexingEncryptedStoresOrItems** @@ -220,7 +219,9 @@ The following list shows the supported values: +
            + **Search/AllowSearchToUseLocation** @@ -270,7 +271,9 @@ The following list shows the supported values: +
            + **Search/AllowStoringImagesFromVisionSearch** @@ -288,7 +291,9 @@ This policy has been deprecated. +
            + **Search/AllowUsingDiacritics** @@ -336,7 +341,9 @@ Most restricted value is 0. +
            + **Search/AllowWindowsIndexer** @@ -377,7 +384,9 @@ Allow Windows indexer. Value type is integer. +
            + **Search/AlwaysUseAutoLangDetection** @@ -425,7 +434,9 @@ Most restricted value is 0. +
            + **Search/DisableBackoff** @@ -471,7 +482,9 @@ The following list shows the supported values: +
            + **Search/DisableRemovableDriveIndexing** @@ -521,7 +534,9 @@ The following list shows the supported values: +
            + **Search/DoNotUseWebResults** @@ -573,14 +588,10 @@ The following list shows the supported values: - 1 (default) - Allowed. Queries will be performed on the web and web results will be displayed when a user performs a query in Search. - - - - - - +
            + **Search/PreventIndexingLowDiskSpaceMB** @@ -630,7 +641,9 @@ The following list shows the supported values: +
            + **Search/PreventRemoteQueries** @@ -676,7 +689,9 @@ The following list shows the supported values: +
            + **Search/SafeSearchPermissions** diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 7f23c593d7..7da2bfbe1c 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/16/2018 +ms.date: 01/29/2018 --- # Policy CSP - Security @@ -56,7 +56,9 @@ ms.date: 01/16/2018 +
            + **Security/AllowAddProvisioningPackage** @@ -104,7 +106,9 @@ The following list shows the supported values: +
            + **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices** @@ -150,7 +154,9 @@ The following list shows the supported values: +
            + **Security/AllowManualRootCertificateInstallation** @@ -204,7 +210,9 @@ The following list shows the supported values: +
            + **Security/AllowRemoveProvisioningPackage** @@ -252,7 +260,9 @@ The following list shows the supported values: +
            + **Security/AntiTheftMode** @@ -304,7 +314,9 @@ The following list shows the supported values: +
            + **Security/ClearTPMIfNotReady** @@ -355,7 +367,9 @@ The following list shows the supported values: +
            + **Security/ConfigureWindowsPasswords** @@ -404,15 +418,12 @@ The following list shows the supported values: - 0 -Disallow passwords (Asymmetric credentials will be promoted to replace passwords on Windows features) - 1- Allow passwords (Passwords continue to be allowed to be used for Windows features) - 2- Default (Feature defaults as per SKU and device capabilities. Windows 10 S devices will exhibit "Disallow passwords" default, and all other devices will default to "Allow passwords") + - - - - - - +
            + **Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices** @@ -464,7 +475,9 @@ The following list shows the supported values: +
            + **Security/RequireDeviceEncryption** @@ -515,7 +528,9 @@ Most restricted value is 1. +
            + **Security/RequireProvisioningPackageSignature** @@ -561,7 +576,9 @@ The following list shows the supported values: +
            + **Security/RequireRetrieveHealthCertificateOnBoot** diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index 614331c610..b21b911cc1 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/19/2017 +ms.date: 01/29/2018 --- # Policy CSP - Settings @@ -65,7 +65,9 @@ ms.date: 12/19/2017 +
            + **Settings/AllowAutoPlay** @@ -120,7 +122,9 @@ The following list shows the supported values: +
            + **Settings/AllowDataSense** @@ -168,7 +172,9 @@ The following list shows the supported values: +
            + **Settings/AllowDateTime** @@ -216,7 +222,9 @@ The following list shows the supported values: +
            + **Settings/AllowEditDeviceName** @@ -264,7 +272,9 @@ The following list shows the supported values: +
            + **Settings/AllowLanguage** @@ -316,7 +326,9 @@ The following list shows the supported values: +
            + **Settings/AllowOnlineTips** @@ -356,18 +368,12 @@ The following list shows the supported values: Enables or disables the retrieval of online tips and help for the Settings app. If disabled, Settings will not contact Microsoft content services to retrieve tips and help content. + - - - - - - - - - +
            + **Settings/AllowPowerSleep** @@ -419,7 +425,9 @@ The following list shows the supported values: +
            + **Settings/AllowRegion** @@ -471,7 +479,9 @@ The following list shows the supported values: +
            + **Settings/AllowSignInOptions** @@ -523,7 +533,9 @@ The following list shows the supported values: +
            + **Settings/AllowVPN** @@ -571,7 +583,9 @@ The following list shows the supported values: +
            + **Settings/AllowWorkplace** @@ -623,7 +637,9 @@ The following list shows the supported values: +
            + **Settings/AllowYourAccount** @@ -671,7 +687,9 @@ The following list shows the supported values: +
            + **Settings/ConfigureTaskbarCalendar** @@ -719,7 +737,9 @@ The following list shows the supported values: +
            + **Settings/PageVisibilityList** diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index f842311ff1..4aeb3007f6 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - SmartScreen @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            + **SmartScreen/EnableAppInstallControl** @@ -78,7 +80,9 @@ The following list shows the supported values: +
            + **SmartScreen/EnableSmartScreenInShell** @@ -126,7 +130,9 @@ The following list shows the supported values: +
            + **SmartScreen/PreventOverrideForFilesInShell** diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index ff34e8ec3b..eb15267764 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Speech @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **Speech/AllowSpeechModelUpdate** diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 4e4567d276..6dbef99ae1 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Start @@ -108,7 +108,9 @@ ms.date: 12/14/2017 +
            + **Start/AllowPinnedFolderDocuments** @@ -157,7 +159,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderDownloads** @@ -206,7 +210,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderFileExplorer** @@ -255,7 +261,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderHomeGroup** @@ -304,7 +312,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderMusic** @@ -353,7 +363,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderNetwork** @@ -402,7 +414,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderPersonalFolder** @@ -451,7 +465,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderPictures** @@ -500,7 +516,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderSettings** @@ -549,7 +567,9 @@ The following list shows the supported values: +
            + **Start/AllowPinnedFolderVideos** @@ -598,7 +618,9 @@ The following list shows the supported values: +
            + **Start/ForceStartSize** @@ -651,7 +673,9 @@ If there is policy configuration conflict, the latest configuration request is a +
            + **Start/HideAppList** @@ -712,7 +736,9 @@ To validate on Desktop, do the following: +
            + **Start/HideChangeAccountSettings** @@ -765,7 +791,9 @@ The following list shows the supported values: +
            + **Start/HideFrequentlyUsedApps** @@ -825,7 +853,9 @@ The following list shows the supported values: +
            + **Start/HideHibernate** @@ -881,7 +911,9 @@ The following list shows the supported values: +
            + **Start/HideLock** @@ -934,7 +966,9 @@ The following list shows the supported values: +
            + **Start/HidePeopleBar** @@ -977,7 +1011,9 @@ Value type is integer. +
            + **Start/HidePowerButton** @@ -1033,7 +1069,9 @@ The following list shows the supported values: +
            + **Start/HideRecentJumplists** @@ -1096,7 +1134,9 @@ The following list shows the supported values: +
            + **Start/HideRecentlyAddedApps** @@ -1156,7 +1196,9 @@ The following list shows the supported values: +
            + **Start/HideRestart** @@ -1209,7 +1251,9 @@ The following list shows the supported values: +
            + **Start/HideShutDown** @@ -1262,7 +1306,9 @@ The following list shows the supported values: +
            + **Start/HideSignOut** @@ -1315,7 +1361,9 @@ The following list shows the supported values: +
            + **Start/HideSleep** @@ -1368,7 +1416,9 @@ The following list shows the supported values: +
            + **Start/HideSwitchAccount** @@ -1421,7 +1471,9 @@ The following list shows the supported values: +
            + **Start/HideUserTile** @@ -1478,7 +1530,9 @@ The following list shows the supported values: +
            + **Start/ImportEdgeAssets** @@ -1534,7 +1588,9 @@ To validate on Desktop, do the following: +
            + **Start/NoPinningToTaskbar** @@ -1590,7 +1646,9 @@ The following list shows the supported values: +
            + **Start/StartLayout** diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 189436f4eb..a14fd22cb2 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/13/2017 +ms.date: 01/29/2018 --- # Policy CSP - Storage @@ -27,7 +27,9 @@ ms.date: 12/13/2017 +
            + **Storage/AllowDiskHealthModelUpdates** @@ -76,7 +78,9 @@ Value type is integer. +
            + **Storage/EnhancedStorageDevices** diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 2435e96fe0..e9d50d3359 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/19/2017 +ms.date: 01/29/2018 --- # Policy CSP - System @@ -68,7 +68,9 @@ ms.date: 12/19/2017 +
            + **System/AllowBuildPreview** @@ -121,7 +123,9 @@ The following list shows the supported values: +
            + **System/AllowEmbeddedMode** @@ -171,7 +175,9 @@ The following list shows the supported values: +
            + **System/AllowExperimentation** @@ -223,7 +229,9 @@ Most restricted value is 0. +
            + **System/AllowFontProviders** @@ -284,7 +292,9 @@ To verify if System/AllowFontProviders is set to true: +
            + **System/AllowLocation** @@ -339,7 +349,9 @@ For example, an app's original Location setting is Off. The administrator then s +
            + **System/AllowStorageCard** @@ -389,7 +401,9 @@ The following list shows the supported values: +
            + **System/AllowTelemetry** @@ -506,7 +520,9 @@ Most restricted value is 0. +
            + **System/AllowUserToResetPhone** @@ -557,7 +573,9 @@ orted values: +
            + **System/BootStartDriverInitialization** @@ -611,7 +629,9 @@ ADMX Info: +
            + **System/DisableEnterpriseAuthProxy** @@ -651,11 +671,10 @@ ADMX Info: This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. - - - +
            + **System/DisableOneDriveFileSync** @@ -717,7 +736,9 @@ The following list shows the supported values: +
            + **System/DisableSystemRestore** @@ -783,7 +804,9 @@ ADMX Info: +
            + **System/FeedbackHubAlwaysSaveDiagnosticsLocally** @@ -795,6 +818,8 @@ ADMX Info: Business Enterprise Education + Mobile + Mobile Enterprise check mark4 @@ -802,6 +827,8 @@ ADMX Info: check mark4 check mark4 check mark4 + + @@ -826,14 +853,10 @@ The following list shows the supported values: - 1 - True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted. - - - - - - +
            + **System/LimitEnhancedDiagnosticDataWindowsAnalytics** @@ -887,7 +910,9 @@ If you disable or do not configure this policy setting, then the level of diagno +
            + **System/TelemetryProxy** diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index c307f1e57f..cdee24bf7c 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - SystemServices @@ -41,7 +41,9 @@ ms.date: 01/03/2018 +
            + **SystemServices/ConfigureHomeGroupListenerServiceStartupMode** @@ -81,17 +83,10 @@ ms.date: 01/03/2018 Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - - +
            + **SystemServices/ConfigureHomeGroupProviderServiceStartupMode** @@ -131,17 +126,10 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - - +
            + **SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode** @@ -181,17 +169,10 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - - +
            + **SystemServices/ConfigureXboxLiveAuthManagerServiceStartupMode** @@ -231,17 +212,10 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - - +
            + **SystemServices/ConfigureXboxLiveGameSaveServiceStartupMode** @@ -281,17 +255,10 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - - +
            + **SystemServices/ConfigureXboxLiveNetworkingServiceStartupMode** @@ -331,15 +298,6 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - - - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index 0a8f13c708..71e1d6c905 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - TaskScheduler @@ -26,7 +26,9 @@ ms.date: 01/03/2018 +
            + **TaskScheduler/EnableXboxGameSaveTask** @@ -66,15 +68,6 @@ ms.date: 01/03/2018 Added in Windows 10, next major update. This setting determines whether the specific task is enabled (1) or disabled (0). Default: Enabled. - - - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index fbb6857b81..d345d4add2 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/19/2017 +ms.date: 01/29/2018 --- # Policy CSP - TextInput @@ -65,7 +65,9 @@ ms.date: 12/19/2017 +
            + **TextInput/AllowIMELogging** @@ -119,7 +121,9 @@ The following list shows the supported values: +
            + **TextInput/AllowIMENetworkAccess** @@ -173,7 +177,9 @@ The following list shows the supported values: +
            + **TextInput/AllowInputPanel** @@ -227,7 +233,9 @@ The following list shows the supported values: +
            + **TextInput/AllowJapaneseIMESurrogatePairCharacters** @@ -279,7 +287,9 @@ Most restricted value is 0. +
            + **TextInput/AllowJapaneseIVSCharacters** @@ -333,7 +343,9 @@ The following list shows the supported values: +
            + **TextInput/AllowJapaneseNonPublishingStandardGlyph** @@ -387,7 +399,9 @@ The following list shows the supported values: +
            + **TextInput/AllowJapaneseUserDictionary** @@ -441,7 +455,9 @@ The following list shows the supported values: +
            + **TextInput/AllowKeyboardTextSuggestions** @@ -500,7 +516,9 @@ The following list shows the supported values: +
            + **TextInput/AllowKoreanExtendedHanja** @@ -509,7 +527,9 @@ This policy has been deprecated. +
            + **TextInput/AllowLanguageFeaturesUninstall** @@ -563,7 +583,9 @@ The following list shows the supported values: +
            + **TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode** @@ -615,16 +637,11 @@ The following list shows the supported values: - 0 (default) - Disabled. - 1 - Enabled. - - - - - - - +
            + **TextInput/ExcludeJapaneseIMEExceptJIS0208** @@ -674,7 +691,9 @@ The following list shows the supported values: +
            + **TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC** @@ -724,7 +743,9 @@ The following list shows the supported values: +
            + **TextInput/ExcludeJapaneseIMEExceptShiftJIS** diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index f97d7275a3..fedf2c5380 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - TimeLanguageSettings @@ -24,7 +24,9 @@ ms.date: 12/14/2017 +
            + **TimeLanguageSettings/AllowSet24HourClock** diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 771fc0cab4..66e08b3185 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/19/2017 +ms.date: 01/29/2018 --- # Policy CSP - Update @@ -167,7 +167,9 @@ ms.date: 12/19/2017 +
            + **Update/ActiveHoursEnd** @@ -215,7 +217,9 @@ The default is 17 (5 PM). +
            + **Update/ActiveHoursMaxRange** @@ -260,7 +264,9 @@ The default value is 18 (hours). +
            + **Update/ActiveHoursStart** @@ -308,7 +314,9 @@ The default value is 8 (8 AM). +
            + **Update/AllowAutoUpdate** @@ -366,7 +374,9 @@ If the policy is not configured, end-users get the default behavior (Auto instal +
            + **Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork** @@ -418,7 +428,9 @@ The following list shows the supported values: +
            + **Update/AllowMUUpdateService** @@ -464,7 +476,9 @@ The following list shows the supported values: +
            + **Update/AllowNonMicrosoftSignedUpdate** @@ -516,7 +530,9 @@ The following list shows the supported values: +
            + **Update/AllowUpdateService** @@ -571,7 +587,9 @@ The following list shows the supported values: +
            + **Update/AutoRestartDeadlinePeriodInDays** @@ -616,7 +634,9 @@ The default value is 7 days. +
            + **Update/AutoRestartNotificationSchedule** @@ -663,7 +683,9 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). +
            + **Update/AutoRestartRequiredNotificationDismissal** @@ -709,7 +731,9 @@ The following list shows the supported values: +
            + **Update/BranchReadinessLevel** @@ -760,7 +784,9 @@ The following list shows the supported values: +
            + **Update/ConfigureFeatureUpdateUninstallPeriod** @@ -787,16 +813,14 @@ The following list shows the supported values: - Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. - - - +
            + **Update/DeferFeatureUpdatesPeriodInDays** @@ -844,7 +868,9 @@ Supported values are 0-365 days. +
            + **Update/DeferQualityUpdatesPeriodInDays** @@ -887,7 +913,9 @@ Supported values are 0-30. +
            + **Update/DeferUpdatePeriod** @@ -1021,7 +1049,9 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego +
            + **Update/DeferUpgradePeriod** @@ -1074,7 +1104,9 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th +
            + **Update/DetectionFrequency** @@ -1115,7 +1147,9 @@ Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 2 +
            + **Update/DisableDualScan** @@ -1165,11 +1199,13 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. The following list shows the supported values: - 0 - allow scan against Windows Update -- 1 - do not allow update deferral policies to cause scans against Windows Update +- 1 - do not allow update deferral policies to cause scans against Windows Update +
            + **Update/EngagedRestartDeadline** @@ -1214,7 +1250,9 @@ The default value is 0 days (not specified). +
            + **Update/EngagedRestartSnoozeSchedule** @@ -1259,7 +1297,9 @@ The default value is 3 days. +
            + **Update/EngagedRestartTransitionSchedule** @@ -1304,7 +1344,9 @@ The default value is 7 days. +
            + **Update/ExcludeWUDriversInQualityUpdate** @@ -1353,7 +1395,9 @@ The following list shows the supported values: +
            + **Update/FillEmptyContentUrls** @@ -1402,7 +1446,9 @@ The following list shows the supported values: +
            + **Update/IgnoreMOAppDownloadLimit** @@ -1465,7 +1511,9 @@ To validate this policy: +
            + **Update/IgnoreMOUpdateDownloadLimit** @@ -1525,7 +1573,9 @@ The following list shows the supported values: +
            + **Update/ManagePreviewBuilds** @@ -1572,7 +1622,9 @@ The following list shows the supported values: +
            + **Update/PauseDeferrals** @@ -1626,7 +1678,9 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th +
            + **Update/PauseFeatureUpdates** @@ -1675,7 +1729,9 @@ The following list shows the supported values: +
            + **Update/PauseFeatureUpdatesStartTime** @@ -1718,7 +1774,9 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. +
            + **Update/PauseQualityUpdates** @@ -1764,7 +1822,9 @@ The following list shows the supported values: +
            + **Update/PauseQualityUpdatesStartTime** @@ -1807,24 +1867,20 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. +
            + **Update/PhoneUpdateRestrictions** This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. + - - - - - - - - - +
            + **Update/RequireDeferUpgrade** @@ -1874,7 +1930,9 @@ The following list shows the supported values: +
            + **Update/RequireUpdateApproval** @@ -1926,7 +1984,9 @@ The following list shows the supported values: +
            + **Update/ScheduleImminentRestartWarning** @@ -1973,7 +2033,9 @@ Supported values are 15, 30, or 60 (minutes). +
            + **Update/ScheduleRestartWarning** @@ -2024,7 +2086,9 @@ Supported values are 2, 4, 8, 12, or 24 (hours). +
            + **Update/ScheduledInstallDay** @@ -2080,7 +2144,9 @@ The following list shows the supported values: +
            + **Update/ScheduledInstallEveryWeek** @@ -2125,7 +2191,9 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i +
            + **Update/ScheduledInstallFirstWeek** @@ -2170,7 +2238,9 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i +
            + **Update/ScheduledInstallFourthWeek** @@ -2215,7 +2285,9 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i +
            + **Update/ScheduledInstallSecondWeek** @@ -2260,7 +2332,9 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i +
            + **Update/ScheduledInstallThirdWeek** @@ -2305,7 +2379,9 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i +
            + **Update/ScheduledInstallTime** @@ -2358,7 +2434,9 @@ The default value is 3. +
            + **Update/SetAutoRestartNotificationDisable** @@ -2404,7 +2482,9 @@ The following list shows the supported values: +
            + **Update/SetEDURestart** @@ -2450,7 +2530,9 @@ The following list shows the supported values: +
            + **Update/UpdateServiceUrl** @@ -2519,7 +2601,9 @@ Example +
            + **Update/UpdateServiceUrlAlternate** diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index 5a1943db52..7ebe88f286 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/03/2018 +ms.date: 01/29/2018 --- # Policy CSP - UserRights @@ -110,7 +110,9 @@ ms.date: 01/03/2018 +
            + **UserRights/AccessCredentialManagerAsTrustedCaller** @@ -150,17 +152,10 @@ ms.date: 01/03/2018 This user right is used by Credential Manager during Backup/Restore. No accounts should have this privilege, as it is only assigned to Winlogon. Users' saved credentials might be compromised if this privilege is given to other entities. - - - - - - - - - +
            + **UserRights/AccessFromNetwork** @@ -200,17 +195,10 @@ This user right is used by Credential Manager during Backup/Restore. No accounts This user right determines which users and groups are allowed to connect to the computer over the network. Remote Desktop Services are not affected by this user right.Note: Remote Desktop Services was called Terminal Services in previous versions of Windows Server. - - - - - - - - - +
            + **UserRights/ActAsPartOfTheOperatingSystem** @@ -250,17 +238,10 @@ This user right determines which users and groups are allowed to connect to the This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. Processes that require this privilege should use the LocalSystem account, which already includes this privilege, rather than using a separate user account with this privilege specially assigned. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - - - - - - - - - +
            + **UserRights/AllowLocalLogOn** @@ -297,20 +278,13 @@ This user right allows a process to impersonate any user without authentication. -This user right determines which users can log on to the computer. Note: Modifying this setting may affect compatibility with clients, services, and applications. For compatibility information about this setting, see Allow log on locally (https://go.microsoft.com/fwlink/?LinkId=24268 ) at the Microsoft website. +This user right determines which users can log on to the computer. Note: Modifying this setting may affect compatibility with clients, services, and applications. For compatibility information about this setting, see Allow log on locally (https://go.microsoft.com/fwlink/?LinkId=24268 ) at the Microsoft website. - - - - - - - - - +
            + **UserRights/BackupFilesAndDirectories** @@ -350,17 +324,10 @@ This user right determines which users can log on to the computer. Note: Modifyi This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when backing up files and directories.Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Read. Caution: Assigning this user right can be a security risk. Since users with this user right can read any registry settings and files, only assign this user right to trusted users - - - - - - - - - +
            + **UserRights/ChangeSystemTime** @@ -400,17 +367,10 @@ This user right determines which users can bypass file, directory, registry, and This user right determines which users and groups can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. - - - - - - - - - +
            + **UserRights/CreateGlobalObjects** @@ -450,17 +410,10 @@ This user right determines which users and groups can change the time and date o This security setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users' sessions, which could lead to application failure or data corruption. Caution: Assigning this user right can be a security risk. Assign this user right only to trusted users. - - - - - - - - - +
            + **UserRights/CreatePageFile** @@ -500,17 +453,10 @@ This security setting determines whether users can create global objects that ar This user right determines which users and groups can call an internal application programming interface (API) to create and change the size of a page file. This user right is used internally by the operating system and usually does not need to be assigned to any users - - - - - - - - - +
            + **UserRights/CreatePermanentSharedObjects** @@ -550,17 +496,10 @@ This user right determines which users and groups can call an internal applicati This user right determines which accounts can be used by processes to create a directory object using the object manager. This user right is used internally by the operating system and is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel mode already have this user right assigned to them, it is not necessary to specifically assign it. - - - - - - - - - +
            + **UserRights/CreateSymbolicLinks** @@ -600,17 +539,10 @@ This user right determines which accounts can be used by processes to create a d This user right determines if the user can create a symbolic link from the computer he is logged on to. Caution: This privilege should only be given to trusted users. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. Note: This setting can be used in conjunction a symlink filesystem setting that can be manipulated with the command line utility to control the kinds of symlinks that are allowed on the machine. Type 'fsutil behavior set symlinkevaluation /?' at the command line to get more information about fsutil and symbolic links. - - - - - - - - - +
            + **UserRights/CreateToken** @@ -650,17 +582,10 @@ This user right determines if the user can create a symbolic link from the compu This user right determines which accounts can be used by processes to create a token that can then be used to get access to any local resources when the process uses an internal application programming interface (API) to create an access token. This user right is used internally by the operating system. Unless it is necessary, do not assign this user right to a user, group, or process other than Local System. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - - - - - - - - - +
            + **UserRights/DebugPrograms** @@ -700,17 +625,10 @@ This user right determines which accounts can be used by processes to create a t This user right determines which users can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need to be assigned this user right. Developers who are debugging new system components will need this user right to be able to do so. This user right provides complete access to sensitive and critical operating system components. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - - - - - - - - - +
            + **UserRights/DenyAccessFromNetwork** @@ -750,17 +668,10 @@ This user right determines which users can attach a debugger to any process or t This user right determines which users are prevented from accessing a computer over the network. This policy setting supersedes the Access this computer from the network policy setting if a user account is subject to both policies. - - - - - - - - - +
            + **UserRights/DenyLocalLogOn** @@ -800,17 +711,10 @@ This user right determines which users are prevented from accessing a computer o This security setting determines which service accounts are prevented from registering a process as a service. Note: This security setting does not apply to the System, Local Service, or Network Service accounts. - - - - - - - - - +
            + **UserRights/DenyRemoteDesktopServicesLogOn** @@ -850,17 +754,10 @@ This security setting determines which service accounts are prevented from regis This user right determines which users and groups are prohibited from logging on as a Remote Desktop Services client. - - - - - - - - - +
            + **UserRights/EnableDelegation** @@ -900,17 +797,10 @@ This user right determines which users and groups are prohibited from logging on This user right determines which users can set the Trusted for Delegation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using delegated credentials of a client, as long as the client account does not have the Account cannot be delegated account control flag set. Caution: Misuse of this user right, or of the Trusted for Delegation setting, could make the network vulnerable to sophisticated attacks using Trojan horse programs that impersonate incoming clients and use their credentials to gain access to network resources. - - - - - - - - - +
            + **UserRights/GenerateSecurityAudits** @@ -950,17 +840,10 @@ This user right determines which users can set the Trusted for Delegation settin This user right determines which accounts can be used by a process to add entries to the security log. The security log is used to trace unauthorized system access. Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial of service. Shut down system immediately if unable to log security audits security policy setting is enabled. - - - - - - - - - +
            + **UserRights/ImpersonateClient** @@ -1004,17 +887,10 @@ Assigning this user right to a user allows programs running on behalf of that us Because of these factors, users do not usually need this user right. Warning: If you enable this setting, programs that previously had the Impersonate privilege may lose it, and they may not run. - - - - - - - - - +
            + **UserRights/IncreaseSchedulingPriority** @@ -1054,17 +930,10 @@ Because of these factors, users do not usually need this user right. Warning: If This user right determines which accounts can use a process with Write Property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. - - - - - - - - - +
            + **UserRights/LoadUnloadDeviceDrivers** @@ -1104,17 +973,10 @@ This user right determines which accounts can use a process with Write Property This user right determines which users can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. It is recommended that you do not assign this privilege to other users. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - - - - - - - - - +
            + **UserRights/LockMemory** @@ -1154,17 +1016,10 @@ This user right determines which users can dynamically load and unload device dr This user right determines which accounts can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). - - - - - - - - - +
            + **UserRights/ManageAuditingAndSecurityLog** @@ -1204,17 +1059,10 @@ This user right determines which accounts can use a process to keep data in phys This user right determines which users can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. This security setting does not allow a user to enable file and object access auditing in general. You can view audited events in the security log of the Event Viewer. A user with this privilege can also view and clear the security log. - - - - - - - - - +
            + **UserRights/ManageVolume** @@ -1254,17 +1102,10 @@ This user right determines which users can specify object access auditing option This user right determines which users and groups can run maintenance tasks on a volume, such as remote defragmentation. Use caution when assigning this user right. Users with this user right can explore disks and extend files in to memory that contains other data. When the extended files are opened, the user might be able to read and modify the acquired data. - - - - - - - - - +
            + **UserRights/ModifyFirmwareEnvironment** @@ -1304,17 +1145,10 @@ This user right determines which users and groups can run maintenance tasks on a This user right determines who can modify firmware environment values. Firmware environment variables are settings stored in the nonvolatile RAM of non-x86-based computers. The effect of the setting depends on the processor.On x86-based computers, the only firmware environment value that can be modified by assigning this user right is the Last Known Good Configuration setting, which should only be modified by the system. On Itanium-based computers, boot information is stored in nonvolatile RAM. Users must be assigned this user right to run bootcfg.exe and to change the Default Operating System setting on Startup and Recovery in System Properties. On all computers, this user right is required to install or upgrade Windows.Note: This security setting does not affect who can modify the system environment variables and user environment variables that are displayed on the Advanced tab of System Properties. - - - - - - - - - +
            + **UserRights/ModifyObjectLabel** @@ -1354,17 +1188,10 @@ This user right determines who can modify firmware environment values. Firmware This user right determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. - - - - - - - - - +
            + **UserRights/ProfileSingleProcess** @@ -1404,17 +1231,10 @@ This user right determines which user accounts can modify the integrity label of This user right determines which users can use performance monitoring tools to monitor the performance of system processes. - - - - - - - - - +
            + **UserRights/RemoteShutdown** @@ -1454,17 +1274,10 @@ This user right determines which users can use performance monitoring tools to m This user right determines which users are allowed to shut down a computer from a remote location on the network. Misuse of this user right can result in a denial of service. - - - - - - - - - +
            + **UserRights/RestoreFilesAndDirectories** @@ -1504,17 +1317,10 @@ This user right determines which users are allowed to shut down a computer from This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories, and determines which users can set any valid security principal as the owner of an object. Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Write. Caution: Assigning this user right can be a security risk. Since users with this user right can overwrite registry settings, hide data, and gain ownership of system objects, only assign this user right to trusted users. - - - - - - - - - +
            + **UserRights/TakeOwnership** @@ -1554,15 +1360,6 @@ This user right determines which users can bypass file, directory, registry, and This user right determines which users can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. Caution: Assigning this user right can be a security risk. Since owners of objects have full control of them, only assign this user right to trusted users. - - - - - - - - -
            diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 043528cf1c..7416d833f4 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - Wifi @@ -42,7 +42,9 @@ ms.date: 12/14/2017 +
            + **WiFi/AllowWiFiHotSpotReporting** @@ -51,7 +53,9 @@ This policy has been deprecated. +
            + **Wifi/AllowAutoConnectToWiFiSenseHotspots** @@ -101,7 +105,9 @@ The following list shows the supported values: +
            + **Wifi/AllowInternetSharing** @@ -151,7 +157,9 @@ The following list shows the supported values: +
            + **Wifi/AllowManualWiFiConfiguration** @@ -204,7 +212,9 @@ The following list shows the supported values: +
            + **Wifi/AllowWiFi** @@ -254,7 +264,9 @@ The following list shows the supported values: +
            + **Wifi/AllowWiFiDirect** @@ -302,7 +314,9 @@ The following list shows the supported values: +
            + **Wifi/WLANScanMode** diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index ff846b2bbe..4c421859f2 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/29/2017 +ms.date: 01/29/2018 --- # Policy CSP - WindowsDefenderSecurityCenter @@ -80,7 +80,9 @@ ms.date: 12/29/2017 +
            + **WindowsDefenderSecurityCenter/CompanyName** @@ -123,7 +125,9 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. +
            + **WindowsDefenderSecurityCenter/DisableAccountProtectionUI** @@ -168,17 +172,10 @@ Valid values: - 1 - (Enable) The users cannot see the display of the Account protection area in Windows Defender Security Center. - - - - - - - - - +
            + **WindowsDefenderSecurityCenter/DisableAppBrowserUI** @@ -220,7 +217,6 @@ Added in Windows 10, version 1709. Use this policy setting if you want to disabl Value type is integer. Supported operations are Add, Get, Replace and Delete. - The following list shows the supported values: @@ -229,7 +225,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableDeviceSecurityUI** @@ -274,17 +272,10 @@ Valid values: - 1 - (Enable) The users cannot see the display of the Device secuirty area in Windows Defender Security Center. - - - - - - - - - +
            + **WindowsDefenderSecurityCenter/DisableEnhancedNotifications** @@ -337,7 +328,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableFamilyUI** @@ -387,7 +380,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableHealthUI** @@ -437,7 +432,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableNetworkUI** @@ -487,7 +484,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableNotifications** @@ -537,7 +536,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisableVirusUI** @@ -587,7 +588,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/DisallowExploitProtectionOverride** @@ -637,7 +640,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/Email** @@ -680,7 +685,9 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. +
            + **WindowsDefenderSecurityCenter/EnableCustomizedToasts** @@ -730,7 +737,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/EnableInAppCustomization** @@ -780,7 +789,9 @@ The following list shows the supported values: +
            + **WindowsDefenderSecurityCenter/HideRansomwareDataRecovery** @@ -822,19 +833,13 @@ Added in Windows 10, next major update. Use this policy setting to hide the Rans Valid values: - 0 - (Disable or not configured) The Ransomware data recovery area will be visible. -- 1 - (Enable) The Ransomware data recovery area is hidden. +- 1 - (Enable) The Ransomware data recovery area is hidden. + - - - - - - - - - +
            + **WindowsDefenderSecurityCenter/HideSecureBoot** @@ -877,18 +882,12 @@ Valid values: - 0 - (Disable or not configured) The Secure boot area is displayed. - 1 - (Enable) The Secure boot area is hidden. + - - - - - - - - - +
            + **WindowsDefenderSecurityCenter/HideTPMTroubleshooting** @@ -931,18 +930,12 @@ Valid values: - 0 - (Disable or not configured) The Security processor (TPM) troubleshooting area is displayed. - 1 - (Enable) The Security processor (TPM) troubleshooting area is hidden. + - - - - - - - - - +
            + **WindowsDefenderSecurityCenter/Phone** @@ -985,7 +978,9 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. +
            + **WindowsDefenderSecurityCenter/URL** diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index 53db2d066d..1ddb435ce8 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - WindowsInkWorkspace @@ -27,7 +27,9 @@ ms.date: 12/14/2017 +
            + **WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace** @@ -75,7 +77,9 @@ The following list shows the supported values: +
            + **WindowsInkWorkspace/AllowWindowsInkWorkspace** diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 9ee11366cd..62e9c0003c 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - WindowsLogon @@ -30,7 +30,9 @@ ms.date: 12/14/2017 +
            + **WindowsLogon/DisableLockScreenAppNotifications** @@ -90,7 +92,9 @@ ADMX Info: +
            + **WindowsLogon/DontDisplayNetworkSelectionUI** @@ -150,7 +154,9 @@ ADMX Info: +
            + **WindowsLogon/HideFastUserSwitching** diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index e2de8af8b2..4e120a73e2 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/14/2017 +ms.date: 01/29/2018 --- # Policy CSP - WirelessDisplay @@ -45,7 +45,9 @@ ms.date: 12/14/2017 +
            + **WirelessDisplay/AllowMdnsAdvertisement** @@ -82,7 +84,7 @@ ms.date: 12/14/2017 -Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement. +Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement. @@ -93,7 +95,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowMdnsDiscovery** @@ -130,7 +134,7 @@ The following list shows the supported values: -Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery. +Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery. @@ -141,7 +145,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowProjectionFromPC** @@ -178,7 +184,7 @@ The following list shows the supported values: -Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. +Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. @@ -189,7 +195,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowProjectionFromPCOverInfrastructure** @@ -226,7 +234,7 @@ The following list shows the supported values: -Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. +Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. @@ -237,7 +245,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowProjectionToPC** @@ -289,7 +299,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowProjectionToPCOverInfrastructure** @@ -326,7 +338,7 @@ The following list shows the supported values: -Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. +Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. @@ -337,7 +349,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** @@ -362,7 +376,9 @@ The following list shows the supported values: +
            + **WirelessDisplay/RequirePinForPairing** From 7d40bbea1b967eec41dc0c38809dc0141375b79c Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 29 Jan 2018 20:53:31 +0000 Subject: [PATCH 50/91] fixing redirects --- .openpublishing.redirection.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index f8fae17740..395247be86 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -8452,12 +8452,12 @@ }, { "source_path": "bcs/support/microsoft-365-business-faqs.md", -"redirect_url": "/microsoft-365/business/microsoft-365-business-faqs", +"redirect_url": "/microsoft-365/business/support/microsoft-365-business-faqs", "redirect_document_id": true }, { "source_path": "bcs/support/transition-csp-subscription.md", -"redirect_url": "/microsoft-365/business/transition-csp-subscription", +"redirect_url": "/microsoft-365/business/support/transition-csp-subscription", "redirect_document_id": true } ] From 6adbec8de7de5bf2b1dc2a97d011886d092e3d44 Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Mon, 29 Jan 2018 20:58:05 +0000 Subject: [PATCH 51/91] Merged PR 5556: updating token tag names to minimize automation output, and standardize naming schema --- .../mdm/policy-csp-abovelock.md | 36 +- ...csp-accountpoliciesaccountlockoutpolicy.md | 36 +- .../mdm/policy-csp-accounts.md | 48 +- .../mdm/policy-csp-activexcontrols.md | 16 +- .../mdm/policy-csp-applicationdefaults.md | 12 +- .../mdm/policy-csp-applicationmanagement.md | 132 +- .../mdm/policy-csp-appvirtualization.md | 448 +- .../mdm/policy-csp-attachmentmanager.md | 48 +- .../mdm/policy-csp-authentication.md | 60 +- .../mdm/policy-csp-autoplay.md | 48 +- .../mdm/policy-csp-bitlocker.md | 12 +- .../mdm/policy-csp-bluetooth.md | 60 +- .../mdm/policy-csp-browser.md | 456 +- .../mdm/policy-csp-camera.md | 12 +- .../mdm/policy-csp-cellular.md | 64 +- .../mdm/policy-csp-connectivity.md | 188 +- .../mdm/policy-csp-controlpolicyconflict.md | 12 +- .../mdm/policy-csp-credentialproviders.md | 44 +- .../mdm/policy-csp-credentialsui.md | 32 +- .../mdm/policy-csp-cryptography.md | 24 +- .../mdm/policy-csp-dataprotection.md | 24 +- .../mdm/policy-csp-datausage.md | 32 +- .../mdm/policy-csp-defender.md | 420 +- .../mdm/policy-csp-deliveryoptimization.md | 280 +- .../mdm/policy-csp-desktop.md | 16 +- .../mdm/policy-csp-deviceguard.md | 36 +- .../mdm/policy-csp-deviceinstallation.md | 32 +- .../mdm/policy-csp-devicelock.md | 208 +- .../mdm/policy-csp-display.md | 24 +- .../mdm/policy-csp-education.md | 36 +- .../mdm/policy-csp-enterprisecloudprint.md | 72 +- .../mdm/policy-csp-errorreporting.md | 80 +- .../mdm/policy-csp-eventlogservice.md | 64 +- .../mdm/policy-csp-experience.md | 236 +- .../mdm/policy-csp-exploitguard.md | 12 +- .../client-management/mdm/policy-csp-games.md | 12 +- .../mdm/policy-csp-handwriting.md | 12 +- .../mdm/policy-csp-internetexplorer.md | 3880 ++++++++--------- .../mdm/policy-csp-kerberos.md | 80 +- .../mdm/policy-csp-kioskbrowser.md | 72 +- .../mdm/policy-csp-licensing.md | 24 +- ...policy-csp-localpoliciessecurityoptions.md | 656 +-- .../mdm/policy-csp-location.md | 12 +- .../mdm/policy-csp-lockdown.md | 12 +- .../client-management/mdm/policy-csp-maps.md | 24 +- .../mdm/policy-csp-messaging.md | 36 +- .../mdm/policy-csp-networkisolation.md | 96 +- .../mdm/policy-csp-notifications.md | 12 +- .../client-management/mdm/policy-csp-power.md | 144 +- .../mdm/policy-csp-printers.md | 48 +- .../mdm/policy-csp-privacy.md | 924 ++-- .../mdm/policy-csp-remoteassistance.md | 64 +- .../mdm/policy-csp-remotedesktopservices.md | 96 +- .../mdm/policy-csp-remotemanagement.md | 240 +- .../mdm/policy-csp-remoteprocedurecall.md | 32 +- .../mdm/policy-csp-remoteshell.md | 112 +- .../mdm/policy-csp-search.md | 164 +- .../mdm/policy-csp-security.md | 128 +- .../mdm/policy-csp-settings.md | 168 +- .../mdm/policy-csp-smartscreen.md | 36 +- .../mdm/policy-csp-speech.md | 12 +- .../client-management/mdm/policy-csp-start.md | 348 +- .../mdm/policy-csp-storage.md | 28 +- .../mdm/policy-csp-system.md | 188 +- .../mdm/policy-csp-systemservices.md | 72 +- .../mdm/policy-csp-taskscheduler.md | 12 +- .../mdm/policy-csp-textinput.md | 160 +- .../mdm/policy-csp-timelanguagesettings.md | 12 +- .../mdm/policy-csp-update.md | 564 +-- .../mdm/policy-csp-userrights.md | 348 +- .../client-management/mdm/policy-csp-wifi.md | 76 +- ...olicy-csp-windowsdefendersecuritycenter.md | 228 +- .../mdm/policy-csp-windowsinkworkspace.md | 24 +- .../mdm/policy-csp-windowslogon.md | 44 +- .../mdm/policy-csp-wirelessdisplay.md | 92 +- 75 files changed, 6326 insertions(+), 6326 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 544860e28f..8a9ab9e4cd 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **AboveLock/AllowActionCenterNotifications** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -76,7 +76,7 @@ Specifies whether to allow Action Center notifications above the device lock scr Most restricted value is 0. - + The following list shows the supported values: @@ -91,7 +91,7 @@ The following list shows the supported values: **AboveLock/AllowCortanaAboveLock** - + @@ -113,8 +113,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -122,11 +122,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Specifies whether or not the user can interact with Cortana using speech while the system is locked. If you enable or don’t configure this setting, the user can interact with Cortana using speech while the system is locked. If you disable this setting, the system will need to be unlocked for the user to interact with Cortana using speech. - + The following list shows the supported values: @@ -141,7 +141,7 @@ The following list shows the supported values: **AboveLock/AllowToasts** - + @@ -163,8 +163,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -172,13 +172,13 @@ The following list shows the supported values:
            - - + + Specifies whether to allow toast notifications above the device lock screen. Most restricted value is 0. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md index 341cac943e..fef93c8458 100644 --- a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md +++ b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md @@ -38,7 +38,7 @@ ms.date: 01/29/2018 **AccountPoliciesAccountLockoutPolicy/AccountLockoutDuration** - + @@ -60,8 +60,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -69,15 +69,15 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, next major release. This security setting determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it. If an account lockout threshold is defined, the account lockout duration must be greater than or equal to the reset time. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - +
            @@ -85,7 +85,7 @@ Default: None, because this policy setting only has meaning when an Account lock **AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold** - + @@ -107,8 +107,8 @@ Default: None, because this policy setting only has meaning when an Account lock
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -116,15 +116,15 @@ Default: None, because this policy setting only has meaning when an Account lock
            - - + + Added in Windows 10, next major release. This security setting determines the number of failed logon attempts that causes a user account to be locked out. A locked-out account cannot be used until it is reset by an administrator or until the lockout duration for the account has expired. You can set a value between 0 and 999 failed logon attempts. If you set the value to 0, the account will never be locked out. Failed password attempts against workstations or member servers that have been locked using either CTRL+ALT+DELETE or password-protected screen savers count as failed logon attempts. Default: 0. - +
            @@ -132,7 +132,7 @@ Default: 0. **AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter** - + @@ -154,8 +154,8 @@ Default: 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -163,15 +163,15 @@ Default: 0.
            - - + + Added in Windows 10, next major release. This security setting determines the number of minutes that must elapse after a failed logon attempt before the failed logon attempt counter is reset to 0 bad logon attempts. The available range is 1 minute to 99,999 minutes. If an account lockout threshold is defined, this reset time must be less than or equal to the Account lockout duration. Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - +
            diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index 3eaaad3542..8bfbafa470 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -39,7 +39,7 @@ ms.date: 01/29/2018 **Accounts/AllowAddingNonMicrosoftAccountsManually** - + @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -70,8 +70,8 @@ ms.date: 01/29/2018
            - - + + Specifies whether user is allowed to add non-MSA email accounts. Most restricted value is 0. @@ -79,7 +79,7 @@ Most restricted value is 0. > [!NOTE] > This policy will only block UI/UX-based methods for adding non-Microsoft accounts. Even if this policy is enforced, you can still provision non-MSA accounts using the [EMAIL2 CSP](email2-csp.md). - + The following list shows the supported values: @@ -94,7 +94,7 @@ The following list shows the supported values: **Accounts/AllowMicrosoftAccountConnection** - + @@ -116,8 +116,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -125,13 +125,13 @@ The following list shows the supported values:
            - - + + Specifies whether the user is allowed to use an MSA account for non-email related connection authentication and services. Most restricted value is 0. - + The following list shows the supported values: @@ -146,7 +146,7 @@ The following list shows the supported values: **Accounts/AllowMicrosoftAccountSignInAssistant** - + @@ -168,8 +168,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -177,11 +177,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins the ability to disable the "Microsoft Account Sign-In Assistant" (wlidsvc) NT service. - + The following list shows the supported values: @@ -196,7 +196,7 @@ The following list shows the supported values: **Accounts/DomainNamesForEmailSync** - + @@ -218,8 +218,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -227,15 +227,15 @@ The following list shows the supported values:
            - - + + Specifies a list of the domains that are allowed to sync email on the device. The data type is a string. The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". - +
            diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 43af11e725..c8facbef8f 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **ActiveXControls/ApprovedInstallationSites** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved Activex Install sites specified by host URL. If you enable this setting, the administrator can create a list of approved ActiveX Install sites specified by host URL. @@ -71,7 +71,7 @@ If you disable or do not configure this policy setting, ActiveX controls prompt Note: Wild card characters cannot be used when specifying the host URLs. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -79,14 +79,14 @@ Note: Wild card characters cannot be used when specifying the host URLs. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Approved Installation Sites for ActiveX Controls* - GP name: *ApprovedActiveXInstallSites* - GP path: *Windows Components/ActiveX Installer Service* - GP ADMX file name: *ActiveXInstallService.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 549937c7e9..a2454f2ffd 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **ApplicationDefaults/DefaultAssociationsConfiguration** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. This policy allows an administrator to set default file type and protocol associations. When set, default associations will be applied on sign-in to the PC. The association file can be created using the DISM tool (dism /online /export-defaultappassociations:appassoc.xml), and then needs to be base64 encoded before being added to SyncML. If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. @@ -119,7 +119,7 @@ Here is the SyncMl example: ``` - +
            diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 2cd0eb5954..024a22b95c 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -60,7 +60,7 @@ ms.date: 01/29/2018 **ApplicationManagement/AllowAllTrustedApps** - + @@ -82,8 +82,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -91,13 +91,13 @@ ms.date: 01/29/2018
            - - + + Specifies whether non Microsoft Store apps are allowed. Most restricted value is 0. - + The following list shows the supported values: @@ -113,7 +113,7 @@ The following list shows the supported values: **ApplicationManagement/AllowAppStoreAutoUpdate** - + @@ -135,8 +135,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -144,8 +144,8 @@ The following list shows the supported values:
            - - + + Specifies whether automatic update of apps from Microsoft Store are allowed. The following list shows the supported values: @@ -155,7 +155,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -163,7 +163,7 @@ Most restricted value is 0. **ApplicationManagement/AllowDeveloperUnlock** - + @@ -185,8 +185,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -194,13 +194,13 @@ Most restricted value is 0.
            - - + + Specifies whether developer unlock is allowed. Most restricted value is 0. - + The following list shows the supported values: @@ -216,7 +216,7 @@ The following list shows the supported values: **ApplicationManagement/AllowGameDVR** - + @@ -238,8 +238,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -247,8 +247,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -256,7 +256,7 @@ Specifies whether DVR and broadcasting is allowed. Most restricted value is 0. - + The following list shows the supported values: @@ -271,7 +271,7 @@ The following list shows the supported values: **ApplicationManagement/AllowSharedUserAppData** - + @@ -293,8 +293,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -302,13 +302,13 @@ The following list shows the supported values:
            - - + + Specifies whether multiple users of the same app can share data. Most restricted value is 0. - + The following list shows the supported values: @@ -323,7 +323,7 @@ The following list shows the supported values: **ApplicationManagement/AllowStore** - + @@ -345,8 +345,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -354,13 +354,13 @@ The following list shows the supported values:
            - - + + Specifies whether app store is allowed at the device. Most restricted value is 0. - + The following list shows the supported values: @@ -375,7 +375,7 @@ The following list shows the supported values: **ApplicationManagement/ApplicationRestrictions** - + @@ -397,8 +397,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -406,8 +406,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. @@ -432,7 +432,7 @@ Value type is chr. Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. - +
            @@ -440,7 +440,7 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no **ApplicationManagement/DisableStoreOriginatedApps** - + @@ -462,8 +462,8 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -471,11 +471,11 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no
            - - + + Added in Windows 10, version 1607. Boolean value that disables the launch of all apps from Microsoft Store that came pre-installed or were downloaded. - + The following list shows the supported values: @@ -490,7 +490,7 @@ The following list shows the supported values: **ApplicationManagement/RequirePrivateStoreOnly** - + @@ -512,8 +512,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -521,8 +521,8 @@ The following list shows the supported values:
            - - + + Allows disabling of the retail catalog and only enables the Private store. The following list shows the supported values: @@ -532,7 +532,7 @@ The following list shows the supported values: Most restricted value is 1. - +
            @@ -540,7 +540,7 @@ Most restricted value is 1. **ApplicationManagement/RestrictAppDataToSystemVolume** - + @@ -562,8 +562,8 @@ Most restricted value is 1.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -571,13 +571,13 @@ Most restricted value is 1.
            - - + + Specifies whether application data is restricted to the system drive. Most restricted value is 1. - + The following list shows the supported values: @@ -592,7 +592,7 @@ The following list shows the supported values: **ApplicationManagement/RestrictAppToSystemVolume** - + @@ -614,8 +614,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -623,13 +623,13 @@ The following list shows the supported values:
            - - + + Specifies whether the installation of applications is restricted to the system drive. Most restricted value is 1. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index 53bb0578e4..b30da5cc6a 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -111,7 +111,7 @@ ms.date: 01/29/2018 **AppVirtualization/AllowAppVClient** - + @@ -133,8 +133,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -142,11 +142,11 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to enable or disable Microsoft Application Virtualization (App-V) feature. Reboot is needed for disable to take effect. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -154,14 +154,14 @@ This policy setting allows you to enable or disable Microsoft Application Virtua > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable App-V Client* - GP name: *EnableAppV* - GP path: *System/App-V* - GP ADMX file name: *appv.admx* - +
            @@ -169,7 +169,7 @@ ADMX Info: **AppVirtualization/AllowDynamicVirtualization** - + @@ -191,8 +191,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -200,11 +200,11 @@ ADMX Info:
            - - + + Enables Dynamic Virtualization of supported shell extensions, browser helper objects, and ActiveX controls. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -212,14 +212,14 @@ Enables Dynamic Virtualization of supported shell extensions, browser helper obj > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable Dynamic Virtualization* - GP name: *Virtualization_JITVEnable* - GP path: *System/App-V/Virtualization* - GP ADMX file name: *appv.admx* - +
            @@ -227,7 +227,7 @@ ADMX Info: **AppVirtualization/AllowPackageCleanup** - + @@ -249,8 +249,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -258,11 +258,11 @@ ADMX Info:
            - - + + Enables automatic cleanup of appv packages that were added after Windows10 anniversary release. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -270,14 +270,14 @@ Enables automatic cleanup of appv packages that were added after Windows10 anniv > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable automatic cleanup of unused appv packages* - GP name: *PackageManagement_AutoCleanupEnable* - GP path: *System/App-V/PackageManagement* - GP ADMX file name: *appv.admx* - +
            @@ -285,7 +285,7 @@ ADMX Info: **AppVirtualization/AllowPackageScripts** - + @@ -307,8 +307,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -316,11 +316,11 @@ ADMX Info:
            - - + + Enables scripts defined in the package manifest of configuration files that should run. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -328,14 +328,14 @@ Enables scripts defined in the package manifest of configuration files that shou > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable Package Scripts* - GP name: *Scripting_Enable_Package_Scripts* - GP path: *System/App-V/Scripting* - GP ADMX file name: *appv.admx* - +
            @@ -343,7 +343,7 @@ ADMX Info: **AppVirtualization/AllowPublishingRefreshUX** - + @@ -365,8 +365,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -374,11 +374,11 @@ ADMX Info:
            - - + + Enables a UX to display to the user when a publishing refresh is performed on the client. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -386,14 +386,14 @@ Enables a UX to display to the user when a publishing refresh is performed on th > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable Publishing Refresh UX* - GP name: *Enable_Publishing_Refresh_UX* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -401,7 +401,7 @@ ADMX Info: **AppVirtualization/AllowReportingServer** - + @@ -423,8 +423,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -432,8 +432,8 @@ ADMX Info:
            - - + + Reporting Server URL: Displays the URL of reporting server. Reporting Time: When the client data should be reported to the server. Acceptable range is 0~23, corresponding to the 24 hours in a day. A good practice is, don't set this time to a busy hour, e.g. 9AM. @@ -446,7 +446,7 @@ Data Cache Limit: This value specifies the maximum size in megabytes (MB) of the Data Block Size: This value specifies the maximum size in bytes to transmit to the server at once on a reporting upload, to avoid permanent transmission failures when the log has reached a significant size. The default value is 65536. When transmitting report data to the server, one block at a time of application records that is less than or equal to the block size in bytes of XML data will be removed from the cache and sent to the server. Each block will have the general Client data and global package list data prepended, and these will not factor into the block size calculations; the potential exists for an extremely large package list to result in transmission failures over low bandwidth or unreliable connections. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -454,14 +454,14 @@ Data Block Size: This value specifies the maximum size in bytes to transmit to t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Reporting Server* - GP name: *Reporting_Server_Policy* - GP path: *System/App-V/Reporting* - GP ADMX file name: *appv.admx* - +
            @@ -469,7 +469,7 @@ ADMX Info: **AppVirtualization/AllowRoamingFileExclusions** - + @@ -491,8 +491,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -500,11 +500,11 @@ ADMX Info:
            - - + + Specifies the file paths relative to %userprofile% that do not roam with a user's profile. Example usage: /FILEEXCLUSIONLIST='desktop;my pictures'. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -512,14 +512,14 @@ Specifies the file paths relative to %userprofile% that do not roam with a user' > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Roaming File Exclusions* - GP name: *Integration_Roaming_File_Exclusions* - GP path: *System/App-V/Integration* - GP ADMX file name: *appv.admx* - +
            @@ -527,7 +527,7 @@ ADMX Info: **AppVirtualization/AllowRoamingRegistryExclusions** - + @@ -549,8 +549,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -558,11 +558,11 @@ ADMX Info:
            - - + + Specifies the registry paths that do not roam with a user profile. Example usage: /REGISTRYEXCLUSIONLIST=software\classes;software\clients. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -570,14 +570,14 @@ Specifies the registry paths that do not roam with a user profile. Example usage > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Roaming Registry Exclusions* - GP name: *Integration_Roaming_Registry_Exclusions* - GP path: *System/App-V/Integration* - GP ADMX file name: *appv.admx* - +
            @@ -585,7 +585,7 @@ ADMX Info: **AppVirtualization/AllowStreamingAutoload** - + @@ -607,8 +607,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -616,11 +616,11 @@ ADMX Info:
            - - + + Specifies how new packages should be loaded automatically by App-V on a specific computer. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -628,14 +628,14 @@ Specifies how new packages should be loaded automatically by App-V on a specific > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify what to load in background (aka AutoLoad)* - GP name: *Steaming_Autoload* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -643,7 +643,7 @@ ADMX Info: **AppVirtualization/ClientCoexistenceAllowMigrationmode** - + @@ -665,8 +665,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -674,11 +674,11 @@ ADMX Info:
            - - + + Migration mode allows the App-V client to modify shortcuts and FTA's for packages created using a previous version of App-V. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -686,14 +686,14 @@ Migration mode allows the App-V client to modify shortcuts and FTA's for package > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable Migration Mode* - GP name: *Client_Coexistence_Enable_Migration_mode* - GP path: *System/App-V/Client Coexistence* - GP ADMX file name: *appv.admx* - +
            @@ -701,7 +701,7 @@ ADMX Info: **AppVirtualization/IntegrationAllowRootGlobal** - + @@ -723,8 +723,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -732,11 +732,11 @@ ADMX Info:
            - - + + Specifies the location where symbolic links are created to the current version of a per-user published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %localappdata%\Microsoft\AppV\Client\Integration. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -744,14 +744,14 @@ Specifies the location where symbolic links are created to the current version o > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Integration Root User* - GP name: *Integration_Root_User* - GP path: *System/App-V/Integration* - GP ADMX file name: *appv.admx* - +
            @@ -759,7 +759,7 @@ ADMX Info: **AppVirtualization/IntegrationAllowRootUser** - + @@ -781,8 +781,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -790,11 +790,11 @@ ADMX Info:
            - - + + Specifies the location where symbolic links are created to the current version of a globally published package. Shortcuts, file type associations, etc. are created pointing to this path. If empty, symbolic links are not used during publishing. Example: %allusersprofile%\Microsoft\AppV\Client\Integration. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -802,14 +802,14 @@ Specifies the location where symbolic links are created to the current version o > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Integration Root Global* - GP name: *Integration_Root_Global* - GP path: *System/App-V/Integration* - GP ADMX file name: *appv.admx* - +
            @@ -817,7 +817,7 @@ ADMX Info: **AppVirtualization/PublishingAllowServer1** - + @@ -839,8 +839,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -848,8 +848,8 @@ ADMX Info:
            - - + + Publishing Server Display Name: Displays the name of publishing server. Publishing Server URL: Displays the URL of publishing server. @@ -870,7 +870,7 @@ User Publishing Refresh Interval: Specifies the publishing refresh interval usin User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -878,14 +878,14 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Publishing Server 1 Settings* - GP name: *Publishing_Server1_Policy* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -893,7 +893,7 @@ ADMX Info: **AppVirtualization/PublishingAllowServer2** - + @@ -915,8 +915,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -924,8 +924,8 @@ ADMX Info:
            - - + + Publishing Server Display Name: Displays the name of publishing server. Publishing Server URL: Displays the URL of publishing server. @@ -946,7 +946,7 @@ User Publishing Refresh Interval: Specifies the publishing refresh interval usin User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -954,14 +954,14 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Publishing Server 2 Settings* - GP name: *Publishing_Server2_Policy* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -969,7 +969,7 @@ ADMX Info: **AppVirtualization/PublishingAllowServer3** - + @@ -991,8 +991,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1000,8 +1000,8 @@ ADMX Info:
            - - + + Publishing Server Display Name: Displays the name of publishing server. Publishing Server URL: Displays the URL of publishing server. @@ -1022,7 +1022,7 @@ User Publishing Refresh Interval: Specifies the publishing refresh interval usin User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1030,14 +1030,14 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Publishing Server 3 Settings* - GP name: *Publishing_Server3_Policy* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -1045,7 +1045,7 @@ ADMX Info: **AppVirtualization/PublishingAllowServer4** - + @@ -1067,8 +1067,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1076,8 +1076,8 @@ ADMX Info:
            - - + + Publishing Server Display Name: Displays the name of publishing server. Publishing Server URL: Displays the URL of publishing server. @@ -1098,7 +1098,7 @@ User Publishing Refresh Interval: Specifies the publishing refresh interval usin User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1106,14 +1106,14 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Publishing Server 4 Settings* - GP name: *Publishing_Server4_Policy* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -1121,7 +1121,7 @@ ADMX Info: **AppVirtualization/PublishingAllowServer5** - + @@ -1143,8 +1143,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1152,8 +1152,8 @@ ADMX Info:
            - - + + Publishing Server Display Name: Displays the name of publishing server. Publishing Server URL: Displays the URL of publishing server. @@ -1174,7 +1174,7 @@ User Publishing Refresh Interval: Specifies the publishing refresh interval usin User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, Day 0-31). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1182,14 +1182,14 @@ User Publishing Refresh Interval Unit: Specifies the interval unit (Hour 0-23, D > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Publishing Server 5 Settings* - GP name: *Publishing_Server5_Policy* - GP path: *System/App-V/Publishing* - GP ADMX file name: *appv.admx* - +
            @@ -1197,7 +1197,7 @@ ADMX Info: **AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** - + @@ -1219,8 +1219,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1228,11 +1228,11 @@ ADMX Info:
            - - + + Specifies the path to a valid certificate in the certificate store. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1240,14 +1240,14 @@ Specifies the path to a valid certificate in the certificate store. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Certificate Filter For Client SSL* - GP name: *Streaming_Certificate_Filter_For_Client_SSL* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1255,7 +1255,7 @@ ADMX Info: **AppVirtualization/StreamingAllowHighCostLaunch** - + @@ -1277,8 +1277,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1286,11 +1286,11 @@ ADMX Info:
            - - + + This setting controls whether virtualized applications are launched on Windows 8 machines connected via a metered network connection (e.g. 4G). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1298,14 +1298,14 @@ This setting controls whether virtualized applications are launched on Windows 8 > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow First Time Application Launches if on a High Cost Windows 8 Metered Connection* - GP name: *Streaming_Allow_High_Cost_Launch* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1313,7 +1313,7 @@ ADMX Info: **AppVirtualization/StreamingAllowLocationProvider** - + @@ -1335,8 +1335,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1344,11 +1344,11 @@ ADMX Info:
            - - + + Specifies the CLSID for a compatible implementation of the IAppvPackageLocationProvider interface. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1356,14 +1356,14 @@ Specifies the CLSID for a compatible implementation of the IAppvPackageLocationP > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Location Provider* - GP name: *Streaming_Location_Provider* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1371,7 +1371,7 @@ ADMX Info: **AppVirtualization/StreamingAllowPackageInstallationRoot** - + @@ -1393,8 +1393,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1402,11 +1402,11 @@ ADMX Info:
            - - + + Specifies directory where all new applications and updates will be installed. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1414,14 +1414,14 @@ Specifies directory where all new applications and updates will be installed. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Package Installation Root* - GP name: *Streaming_Package_Installation_Root* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1429,7 +1429,7 @@ ADMX Info: **AppVirtualization/StreamingAllowPackageSourceRoot** - + @@ -1451,8 +1451,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1460,11 +1460,11 @@ ADMX Info:
            - - + + Overrides source location for downloading package content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1472,14 +1472,14 @@ Overrides source location for downloading package content. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Package Source Root* - GP name: *Streaming_Package_Source_Root* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1487,7 +1487,7 @@ ADMX Info: **AppVirtualization/StreamingAllowReestablishmentInterval** - + @@ -1509,8 +1509,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1518,11 +1518,11 @@ ADMX Info:
            - - + + Specifies the number of seconds between attempts to reestablish a dropped session. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1530,14 +1530,14 @@ Specifies the number of seconds between attempts to reestablish a dropped sessio > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Reestablishment Interval* - GP name: *Streaming_Reestablishment_Interval* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1545,7 +1545,7 @@ ADMX Info: **AppVirtualization/StreamingAllowReestablishmentRetries** - + @@ -1567,8 +1567,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1576,11 +1576,11 @@ ADMX Info:
            - - + + Specifies the number of times to retry a dropped session. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1588,14 +1588,14 @@ Specifies the number of times to retry a dropped session. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Reestablishment Retries* - GP name: *Streaming_Reestablishment_Retries* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1603,7 +1603,7 @@ ADMX Info: **AppVirtualization/StreamingSharedContentStoreMode** - + @@ -1625,8 +1625,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1634,11 +1634,11 @@ ADMX Info:
            - - + + Specifies that streamed package contents will be not be saved to the local hard disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1646,14 +1646,14 @@ Specifies that streamed package contents will be not be saved to the local hard > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Shared Content Store (SCS) mode* - GP name: *Streaming_Shared_Content_Store_Mode* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1661,7 +1661,7 @@ ADMX Info: **AppVirtualization/StreamingSupportBranchCache** - + @@ -1683,8 +1683,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1692,11 +1692,11 @@ ADMX Info:
            - - + + If enabled, the App-V client will support BrancheCache compatible HTTP streaming. If BranchCache support is not desired, this should be disabled. The client can then apply HTTP optimizations which are incompatible with BranchCache - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1704,14 +1704,14 @@ If enabled, the App-V client will support BrancheCache compatible HTTP streaming > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable Support for BranchCache* - GP name: *Streaming_Support_Branch_Cache* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1719,7 +1719,7 @@ ADMX Info: **AppVirtualization/StreamingVerifyCertificateRevocationList** - + @@ -1741,8 +1741,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1750,11 +1750,11 @@ ADMX Info:
            - - + + Verifies Server certificate revocation status before streaming using HTTPS. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1762,14 +1762,14 @@ Verifies Server certificate revocation status before streaming using HTTPS. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Verify certificate revocation list* - GP name: *Streaming_Verify_Certificate_Revocation_List* - GP path: *System/App-V/Streaming* - GP ADMX file name: *appv.admx* - +
            @@ -1777,7 +1777,7 @@ ADMX Info: **AppVirtualization/VirtualComponentsAllowList** - + @@ -1799,8 +1799,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1808,11 +1808,11 @@ ADMX Info:
            - - + + Specifies a list of process paths (may contain wildcards) which are candidates for using virtual components (shell extensions, browser helper objects, etc). Only processes whose full path matches one of these items can use virtual components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1820,14 +1820,14 @@ Specifies a list of process paths (may contain wildcards) which are candidates f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Virtual Component Process Allow List* - GP name: *Virtualization_JITVAllowList* - GP path: *System/App-V/Virtualization* - GP ADMX file name: *appv.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index 21e12791ee..257d3f313a 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **AttachmentManager/DoNotPreserveZoneInformation** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to manage whether Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). This requires NTFS in order to function correctly, and will fail without notice on FAT32. By not preserving the zone information, Windows cannot make proper risk assessments. If you enable this policy setting, Windows does not mark file attachments with their zone information. @@ -77,7 +77,7 @@ If you disable this policy setting, Windows marks file attachments with their zo If you do not configure this policy setting, Windows marks file attachments with their zone information. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -85,14 +85,14 @@ If you do not configure this policy setting, Windows marks file attachments with > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not preserve zone information in file attachments* - GP name: *AM_MarkZoneOnSavedAtttachments* - GP path: *Windows Components/Attachment Manager* - GP ADMX file name: *AttachmentManager.admx* - +
            @@ -100,7 +100,7 @@ ADMX Info: **AttachmentManager/HideZoneInfoMechanism** - + @@ -122,8 +122,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -131,8 +131,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether users can manually remove the zone information from saved file attachments by clicking the Unblock button in the file's property sheet or by using a check box in the security warning dialog. Removing the zone information allows users to open potentially dangerous file attachments that Windows has blocked users from opening. If you enable this policy setting, Windows hides the check box and Unblock button. @@ -141,7 +141,7 @@ If you disable this policy setting, Windows shows the check box and Unblock butt If you do not configure this policy setting, Windows hides the check box and Unblock button. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -149,14 +149,14 @@ If you do not configure this policy setting, Windows hides the check box and Unb > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Hide mechanisms to remove zone information* - GP name: *AM_RemoveZoneInfo* - GP path: *Windows Components/Attachment Manager* - GP ADMX file name: *AttachmentManager.admx* - +
            @@ -164,7 +164,7 @@ ADMX Info: **AttachmentManager/NotifyAntivirusPrograms** - + @@ -186,8 +186,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -195,8 +195,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the behavior for notifying registered antivirus programs. If multiple programs are registered, they will all be notified. If the registered antivirus program already performs on-access checks or scans files as they arrive on the computer's email server, additional calls would be redundant. If you enable this policy setting, Windows tells the registered antivirus program to scan the file when a user opens a file attachment. If the antivirus program fails, the attachment is blocked from being opened. @@ -205,7 +205,7 @@ If you disable this policy setting, Windows does not call the registered antivir If you do not configure this policy setting, Windows does not call the registered antivirus programs when file attachments are opened. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -213,14 +213,14 @@ If you do not configure this policy setting, Windows does not call the registere > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Notify antivirus programs when opening attachments* - GP name: *AM_CallIOfficeAntiVirus* - GP path: *Windows Components/Attachment Manager* - GP ADMX file name: *AttachmentManager.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 16cef802ca..d030e6f423 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -42,7 +42,7 @@ ms.date: 01/29/2018 **Authentication/AllowAadPasswordReset** - + @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -73,11 +73,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. Specifies whether password reset is enabled for Azure Active Directory accounts. This policy allows the Azure AD tenant administrators to enable self service password reset feature on the windows logon screen. - + The following list shows the supported values: @@ -92,7 +92,7 @@ The following list shows the supported values: **Authentication/AllowEAPCertSSO** - + @@ -114,8 +114,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -123,11 +123,11 @@ The following list shows the supported values:
            - - + + Allows an EAP cert-based authentication for a single sign on (SSO) to access internal resources. - + The following list shows the supported values: @@ -142,7 +142,7 @@ The following list shows the supported values: **Authentication/AllowFastReconnect** - + @@ -164,8 +164,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -173,13 +173,13 @@ The following list shows the supported values:
            - - + + Allows EAP Fast Reconnect from being attempted for EAP Method TLS. Most restricted value is 0. - + The following list shows the supported values: @@ -194,7 +194,7 @@ The following list shows the supported values: **Authentication/AllowFidoDeviceSignon** - + @@ -216,8 +216,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -225,15 +225,15 @@ The following list shows the supported values:
            - - + + Preview release in Windows 10, version 1709. Supported in the next release. Specifies whether Fast Identity Online (FIDO) device can be used to sign on. This policy enables the Windows logon credential provider for FIDO 2.0 Value type is integer. Here is an example scenario: At Contoso, there are a lot of shared devices and kiosks that employees throughout the day using as many as 20 different devices. To minimize the loss in productivity when employees have to login with username and password everytime they pick up a device, the IT admin deploys SharePC CSP and Authentication/AllowFidoDeviceSignon policy to shared devices. The IT admin provisions and distributes FIDO 2.0 devices to employees, which allows them to authenticate to various shared devices and PCs. - + The following list shows the supported values: @@ -248,7 +248,7 @@ The following list shows the supported values: **Authentication/AllowSecondaryAuthenticationDevice** - + @@ -270,8 +270,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -279,13 +279,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Allows secondary authentication devices to work with Windows. The default for this policy must be on for consumer devices (defined as local or Microsoft account connected device) and off for enterprise devices (such as cloud domain-joined, cloud domain-joined in an on-premise only environment, cloud domain-joined in a hybrid environment, and BYOD). - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index ea392f0f79..0c38facc2f 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **Autoplay/DisallowAutoplayForNonVolumeDevices** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -68,15 +68,15 @@ ms.date: 01/29/2018
            - - + + This policy setting disallows AutoPlay for MTP devices like cameras or phones. If you enable this policy setting, AutoPlay is not allowed for MTP devices like cameras or phones. If you disable or do not configure this policy setting, AutoPlay is enabled for non-volume devices. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -84,14 +84,14 @@ If you disable or do not configure this policy setting, AutoPlay is enabled for > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disallow Autoplay for non-volume devices* - GP name: *NoAutoplayfornonVolume* - GP path: *Windows Components/AutoPlay Policies* - GP ADMX file name: *AutoPlay.admx* - +
            @@ -99,7 +99,7 @@ ADMX Info: **Autoplay/SetDefaultAutoRunBehavior** - + @@ -121,8 +121,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -131,8 +131,8 @@ ADMX Info:
            - - + + This policy setting sets the default behavior for Autorun commands. Autorun commands are generally stored in autorun.inf files. They often launch the installation program or other routines. @@ -148,7 +148,7 @@ b) Revert back to pre-Windows Vista behavior of automatically executing the auto If you disable or not configure this policy setting, Windows Vista or later will prompt the user whether autorun command is to be run. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -156,14 +156,14 @@ If you disable or not configure this policy setting, Windows Vista or later will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set the default behavior for AutoRun* - GP name: *NoAutorun* - GP path: *Windows Components/AutoPlay Policies* - GP ADMX file name: *AutoPlay.admx* - +
            @@ -171,7 +171,7 @@ ADMX Info: **Autoplay/TurnOffAutoPlay** - + @@ -193,8 +193,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -203,8 +203,8 @@ ADMX Info:
            - - + + This policy setting allows you to turn off the Autoplay feature. Autoplay begins reading from a drive as soon as you insert media in the drive. As a result, the setup file of programs and the music on audio media start immediately. @@ -221,7 +221,7 @@ If you disable or do not configure this policy setting, AutoPlay is enabled. Note: This policy setting appears in both the Computer Configuration and User Configuration folders. If the policy settings conflict, the policy setting in Computer Configuration takes precedence over the policy setting in User Configuration. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -229,14 +229,14 @@ Note: This policy setting appears in both the Computer Configuration and User Co > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off Autoplay* - GP name: *Autorun* - GP path: *Windows Components/AutoPlay Policies* - GP ADMX file name: *AutoPlay.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 5310af5a0a..ab5e371656 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Bitlocker/EncryptionMethod** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + Specifies the BitLocker Drive Encryption method and cipher strength. > [!NOTE] @@ -96,7 +96,7 @@ You can find the following policies in BitLocker CSP: - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index aebbabd6f8..4cc182b25a 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -42,7 +42,7 @@ ms.date: 01/29/2018 **Bluetooth/AllowAdvertising** - + @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -73,15 +73,15 @@ ms.date: 01/29/2018
            - - + + Specifies whether the device can send out Bluetooth advertisements. If this is not set or it is deleted, the default value of 1 (Allow) is used. Most restricted value is 0. - + The following list shows the supported values: @@ -96,7 +96,7 @@ The following list shows the supported values: **Bluetooth/AllowDiscoverableMode** - + @@ -118,8 +118,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -127,15 +127,15 @@ The following list shows the supported values:
            - - + + Specifies whether other Bluetooth-enabled devices can discover the device. If this is not set or it is deleted, the default value of 1 (Allow) is used. Most restricted value is 0. - + The following list shows the supported values: @@ -150,7 +150,7 @@ The following list shows the supported values: **Bluetooth/AllowPrepairing** - + @@ -172,8 +172,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -181,11 +181,11 @@ The following list shows the supported values:
            - - + + Specifies whether to allow specific bundled Bluetooth peripherals to automatically pair with the host device. - + The following list shows the supported values: @@ -200,7 +200,7 @@ The following list shows the supported values: **Bluetooth/LocalDeviceName** - + @@ -222,8 +222,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -231,15 +231,15 @@ The following list shows the supported values:
            - - + + Sets the local Bluetooth device name. If this is set, the value that it is set to will be used as the Bluetooth device name. To verify the policy is set, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel, and verify that the value that was specified. If this policy is not set or it is deleted, the default local radio name is used. - +
            @@ -247,7 +247,7 @@ If this policy is not set or it is deleted, the default local radio name is used **Bluetooth/ServicesAllowedList** - + @@ -269,8 +269,8 @@ If this policy is not set or it is deleted, the default local radio name is used
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -278,13 +278,13 @@ If this policy is not set or it is deleted, the default local radio name is used
            - - + + Set a list of allowable services and profiles. String hex formatted array of Bluetooth service UUIDs in canonical format, delimited by semicolons. For example, {782AFCFC-7CAA-436C-8BF0-78CD0FFBD4AF}. The default value is an empty string. - +
            diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 5e4018865e..cb2b6f9db3 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -143,7 +143,7 @@ ms.date: 01/29/2018 **Browser/AllowAddressBarDropdown** - + @@ -165,8 +165,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -175,8 +175,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. Specifies whether to allow the address bar drop-down functionality in Microsoft Edge. If you want to minimize network connections from Microsoft Edge to Microsoft services, we recommend disabling this functionality.  > [!NOTE] @@ -184,7 +184,7 @@ Added in Windows 10, version 1703. Specifies whether to allow the address bar dr Most restricted value is 0. - + The following list shows the supported values: @@ -199,7 +199,7 @@ The following list shows the supported values: **Browser/AllowAutofill** - + @@ -221,8 +221,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -231,8 +231,8 @@ The following list shows the supported values:
            - - + + Specifies whether autofill on websites is allowed. Most restricted value is 0. @@ -244,7 +244,7 @@ To verify AllowAutofill is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Save form entries** is greyed out. - + The following list shows the supported values: @@ -259,7 +259,7 @@ The following list shows the supported values: **Browser/AllowBrowser** - + @@ -281,8 +281,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -291,8 +291,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. For desktop devices, use the [AppLocker CSP](applocker-csp.md) instead. @@ -303,7 +303,7 @@ Most restricted value is 0. When this policy is set to 0 (not allowed), the Microsoft Edge for Windows 10 Mobile tile will appear greyed out, and clicking on the tile will display a message indicating theat Internet browsing has been disabled by your administrator. - + The following list shows the supported values: @@ -318,7 +318,7 @@ The following list shows the supported values: **Browser/AllowCookies** - + @@ -340,8 +340,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -350,8 +350,8 @@ The following list shows the supported values:
            - - + + Specifies whether cookies are allowed. The following list shows the supported values: @@ -368,7 +368,7 @@ To verify AllowCookies is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Cookies** is greyed out. - +
            @@ -376,7 +376,7 @@ To verify AllowCookies is set to 0 (not allowed): **Browser/AllowDeveloperTools** - + @@ -398,8 +398,8 @@ To verify AllowCookies is set to 0 (not allowed):
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -408,8 +408,8 @@ To verify AllowCookies is set to 0 (not allowed):
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -418,7 +418,7 @@ Specifies whether employees can use F12 Developer Tools on Microsoft Edge. Turni Most restricted value is 0. - + The following list shows the supported values: @@ -433,7 +433,7 @@ The following list shows the supported values: **Browser/AllowDoNotTrack** - + @@ -455,8 +455,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -465,8 +465,8 @@ The following list shows the supported values:
            - - + + Specifies whether Do Not Track headers are allowed. Most restricted value is 1. @@ -478,7 +478,7 @@ To verify AllowDoNotTrack is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Send Do Not Track requests** is greyed out. - + The following list shows the supported values: @@ -493,7 +493,7 @@ The following list shows the supported values: **Browser/AllowExtensions** - + @@ -515,8 +515,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -525,11 +525,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Specifies whether Microsoft Edge extensions are allowed. - + The following list shows the supported values: @@ -544,7 +544,7 @@ The following list shows the supported values: **Browser/AllowFlash** - + @@ -566,8 +566,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -576,11 +576,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10. Specifies whether Adobe Flash can run in Microsoft Edge. - + The following list shows the supported values: @@ -595,7 +595,7 @@ The following list shows the supported values: **Browser/AllowFlashClickToRun** - + @@ -617,8 +617,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -627,11 +627,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether users must take an action, such as clicking the content or a Click-to-Run button, before seeing content in Adobe Flash. - + The following list shows the supported values: @@ -646,7 +646,7 @@ The following list shows the supported values: **Browser/AllowInPrivate** - + @@ -668,8 +668,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -678,13 +678,13 @@ The following list shows the supported values:
            - - + + Specifies whether InPrivate browsing is allowed on corporate networks. Most restricted value is 0. - + The following list shows the supported values: @@ -699,7 +699,7 @@ The following list shows the supported values: **Browser/AllowMicrosoftCompatibilityList** - + @@ -721,8 +721,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -731,8 +731,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether to use the Microsoft compatibility list in Microsoft Edge. The Microsoft compatibility list is a Microsoft-provided list that enables sites with known compatibility issues to display properly. By default, the Microsoft compatibility list is enabled and can be viewed by visiting "about:compat". @@ -740,7 +740,7 @@ If you enable or don’t configure this setting, Microsoft Edge periodically dow Most restricted value is 0. - + The following list shows the supported values: @@ -755,7 +755,7 @@ The following list shows the supported values: **Browser/AllowPasswordManager** - + @@ -777,8 +777,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -787,8 +787,8 @@ The following list shows the supported values:
            - - + + Specifies whether saving and managing passwords locally on the device is allowed. Most restricted value is 0. @@ -800,7 +800,7 @@ To verify AllowPasswordManager is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. - + The following list shows the supported values: @@ -815,7 +815,7 @@ The following list shows the supported values: **Browser/AllowPopups** - + @@ -837,8 +837,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -847,8 +847,8 @@ The following list shows the supported values:
            - - + + Specifies whether pop-up blocker is allowed or enabled. Most restricted value is 1. @@ -860,7 +860,7 @@ To verify AllowPopups is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Block pop-ups** is greyed out. - + The following list shows the supported values: @@ -875,7 +875,7 @@ The following list shows the supported values: **Browser/AllowSearchEngineCustomization** - + @@ -897,8 +897,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -907,15 +907,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows search engine customization for MDM-enrolled devices. Users can change their default search engine.     If this setting is turned on or not configured, users can add new search engines and change the default used in the address bar from within Microsoft Edge settings. If this setting is disabled, users will be unable to add search engines or change the default used in the address bar. This policy applies only on domain-joined machines or when the device is MDM-enrolled. For more information, see Microsoft browser extension policy (aka.ms/browserpolicy).  Most restricted value is 0. - + The following list shows the supported values: @@ -930,7 +930,7 @@ The following list shows the supported values: **Browser/AllowSearchSuggestionsinAddressBar** - + @@ -952,8 +952,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -962,13 +962,13 @@ The following list shows the supported values:
            - - + + Specifies whether search suggestions are allowed in the address bar. Most restricted value is 0. - + The following list shows the supported values: @@ -983,7 +983,7 @@ The following list shows the supported values: **Browser/AllowSmartScreen** - + @@ -1005,8 +1005,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1015,8 +1015,8 @@ The following list shows the supported values:
            - - + + Specifies whether Windows Defender SmartScreen is allowed. Most restricted value is 1. @@ -1028,7 +1028,7 @@ To verify AllowSmartScreen is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. - + The following list shows the supported values: @@ -1043,7 +1043,7 @@ The following list shows the supported values: **Browser/AlwaysEnableBooksLibrary** - + @@ -1065,8 +1065,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1075,11 +1075,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next majot update. Always show the Books Library in Microsoft Edge - + The following list shows the supported values: @@ -1094,7 +1094,7 @@ The following list shows the supported values: **Browser/ClearBrowsingDataOnExit** - + @@ -1116,8 +1116,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1126,8 +1126,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether to clear browsing data on exiting Microsoft Edge. Most restricted value is 1. @@ -1138,7 +1138,7 @@ To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set 2. Close the Microsoft Edge window. 3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. - + The following list shows the supported values: @@ -1153,7 +1153,7 @@ The following list shows the supported values: **Browser/ConfigureAdditionalSearchEngines** - + @@ -1175,8 +1175,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1185,8 +1185,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows you to add up to 5 additional search engines for MDM-enrolled devices.    If this policy is enabled, you can add up to 5 additional search engines for your employees. For each additional search engine you want to add, specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). @@ -1204,7 +1204,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -1212,7 +1212,7 @@ Most restricted value is 0. **Browser/DisableLockdownOfStartPages** - + @@ -1234,8 +1234,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1244,8 +1244,8 @@ Most restricted value is 0.
            - - + + Added in Windows 10, version 1703. Boolean value that specifies whether the lockdown on the Start pages is disabled. This policy works with the Browser/HomePages policy, which locks down the Start pages that the users cannot modify. You can use the DisableLockdownOfStartPages policy to allow users to modify the Start pages when the Browser/HomePages policy is in effect.     > [!NOTE] @@ -1256,7 +1256,7 @@ Added in Windows 10, version 1703. Boolean value that specifies whether the lock Most restricted value is 0. - + The following list shows the supported values: @@ -1271,7 +1271,7 @@ The following list shows the supported values: **Browser/EnableExtendedBooksTelemetry** - + @@ -1293,8 +1293,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1303,13 +1303,13 @@ The following list shows the supported values:
            - - + + This policy setting lets you decide how much data to send to Microsoft about the book you're reading from the Books tab in Microsoft Edge. If you enable this setting, Microsoft Edge sends additional telemetry data, on top of the basic telemetry data, from the Books tab. If you disable or don't configure this setting, Microsoft Edge only sends basic telemetry data, depending on your device configuration. - + The following list shows the supported values: @@ -1324,7 +1324,7 @@ The following list shows the supported values: **Browser/EnterpriseModeSiteList** - + @@ -1346,8 +1346,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1356,8 +1356,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -1369,7 +1369,7 @@ The following list shows the supported values: - Not configured. The device checks for updates from Microsoft Update. - Set to a URL location of the enterprise site list. - +
            @@ -1377,7 +1377,7 @@ The following list shows the supported values: **Browser/EnterpriseSiteListServiceUrl** - + @@ -1399,8 +1399,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1409,12 +1409,12 @@ The following list shows the supported values:
            - - + + > [!IMPORTANT] > This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist). - +
            @@ -1422,7 +1422,7 @@ The following list shows the supported values: **Browser/FirstRunURL** - + @@ -1444,8 +1444,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1454,8 +1454,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -1466,7 +1466,7 @@ The data type is a string. The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. - +
            @@ -1474,7 +1474,7 @@ The default value is an empty string. Otherwise, the string should contain the U **Browser/HomePages** - + @@ -1496,8 +1496,8 @@ The default value is an empty string. Otherwise, the string should contain the U
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1506,8 +1506,8 @@ The default value is an empty string. Otherwise, the string should contain the U
            - - + + > [!NOTE] > This policy is only available for Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -1520,7 +1520,7 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi > [!NOTE] > Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. - +
            @@ -1528,7 +1528,7 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi **Browser/LockdownFavorites** - + @@ -1550,8 +1550,8 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1560,8 +1560,8 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi
            - - + + Added in Windows 10, version 1709. This policy setting lets you decide whether employees can add, import, sort, or edit the Favorites list on Microsoft Edge. If you enable this setting, employees won't be able to add, import, or change anything in the Favorites list. Also as part of this, Save a Favorite, Import settings, and the context menu items (such as, Create a new folder) are all turned off. @@ -1573,7 +1573,7 @@ If you disable or don't configure this setting (default), employees can add, imp Data type is integer. - + The following list shows the supported values: @@ -1588,7 +1588,7 @@ The following list shows the supported values: **Browser/PreventAccessToAboutFlagsInMicrosoftEdge** - + @@ -1610,8 +1610,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1620,11 +1620,11 @@ The following list shows the supported values:
            - - + + Specifies whether users can access the about:flags page, which is used to change developer settings and to enable experimental features. - + The following list shows the supported values: @@ -1639,7 +1639,7 @@ The following list shows the supported values: **Browser/PreventFirstRunPage** - + @@ -1661,8 +1661,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1671,13 +1671,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether to enable or disable the First Run webpage. On the first explicit user-launch of Microsoft Edge, a First Run webpage hosted on Microsoft.com opens automatically via a FWLINK. This policy allows enterprises (such as those enrolled in a zero-emissions configuration) to prevent this page from opening. Most restricted value is 1. - + The following list shows the supported values: @@ -1692,7 +1692,7 @@ The following list shows the supported values: **Browser/PreventLiveTileDataCollection** - + @@ -1714,8 +1714,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1724,13 +1724,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether Microsoft can collect information to create a Live Tile when pinning a site to Start from Microsoft Edge. Most restricted value is 1. - + The following list shows the supported values: @@ -1745,7 +1745,7 @@ The following list shows the supported values: **Browser/PreventSmartScreenPromptOverride** - + @@ -1767,8 +1767,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1777,13 +1777,13 @@ The following list shows the supported values:
            - - + + Specifies whether users can override the Windows Defender SmartScreen Filter warnings about potentially malicious websites. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from going to the site. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about potentially malicious websites and to continue to the site. - + The following list shows the supported values: @@ -1798,7 +1798,7 @@ The following list shows the supported values: **Browser/PreventSmartScreenPromptOverrideForFiles** - + @@ -1820,8 +1820,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1830,11 +1830,11 @@ The following list shows the supported values:
            - - + + Specifies whether users can override the Windows Defender SmartScreen Filter warnings about downloading unverified files. Turning this setting on stops users from ignoring the Windows Defender SmartScreen Filter warnings and blocks them from downloading unverified files. Turning this setting off, or not configuring it, lets users ignore the Windows Defender SmartScreen Filter warnings about unverified files and lets them continue the download process. - + The following list shows the supported values: @@ -1849,7 +1849,7 @@ The following list shows the supported values: **Browser/PreventUsingLocalHostIPAddressForWebRTC** - + @@ -1871,8 +1871,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1881,15 +1881,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Specifies whether a user's localhost IP address is displayed while making phone calls using the WebRTC protocol. Turning this setting on hides an user’s localhost IP address while making phone calls using WebRTC. Turning this setting off, or not configuring it, shows an user’s localhost IP address while making phone calls using WebRTC. - + The following list shows the supported values: @@ -1904,7 +1904,7 @@ The following list shows the supported values: **Browser/ProvisionFavorites** - + @@ -1926,8 +1926,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1936,8 +1936,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. This policy setting allows you to configure a default set of favorites, which will appear for employees. Employees cannot modify, sort, move, export or delete these provisioned favorites. Specify the URL which points to the file that has all the data for provisioning favorites (in html format). You can export a set of favorites from Edge and use that html file for provisioning user machines.   URL can be specified as: @@ -1953,7 +1953,7 @@ If you disable or don't configure this setting, employees will see the favorites Data type is string. - +
            @@ -1961,7 +1961,7 @@ Data type is string. **Browser/SendIntranetTraffictoInternetExplorer** - + @@ -1983,8 +1983,8 @@ Data type is string.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1993,8 +1993,8 @@ Data type is string.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -2003,7 +2003,7 @@ Specifies whether to send intranet traffic over to Internet Explorer. Most restricted value is 0. - + The following list shows the supported values: @@ -2018,7 +2018,7 @@ The following list shows the supported values: **Browser/SetDefaultSearchEngine** - + @@ -2040,8 +2040,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2050,8 +2050,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows you configure the default search engine for your employees. By default, your employees can change the default search engine at any time. If you want to prevent your employees from changing the default search engine that you set, you can do so by configuring the AllowSearchEngineCustomization policy. You must specify a link to the OpenSearch XML file that contains, at a minimum, the short name and the URL template (HTTPS) of the search engine. For more information about creating the OpenSearch XML file, see [Search provider discovery](https://developer.microsoft.com/en-us/microsoft-edge/platform/documentation/dev-guide/browser/search-provider-discovery/). If you want your employees to use the Microsoft Edge factory settings for the default search engine for their market, set the string EDGEDEFAULT; otherwise, if you want your employees to use Bing as the default search engine, set the string EDGEBING.  @@ -2068,7 +2068,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -2076,7 +2076,7 @@ Most restricted value is 0. **Browser/ShowMessageWhenOpeningSitesInInternetExplorer** - + @@ -2098,8 +2098,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2108,8 +2108,8 @@ Most restricted value is 0.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -2118,7 +2118,7 @@ Added in Windows 10, version 1607. Specifies whether users should see a full in Most restricted value is 0. - + The following list shows the supported values: @@ -2133,7 +2133,7 @@ The following list shows the supported values: **Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** - + @@ -2155,8 +2155,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2165,8 +2165,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether favorites are kept in sync between Internet Explorer and Microsoft Edge. Changes to favorites in one browser are reflected in the other, including: additions, deletions, modifications, and ordering. > [!NOTE] @@ -2182,7 +2182,7 @@ To verify that favorites are in synchronized between Internet Explorer and Micro
          • Verify that the favorites added to Internet Explorer show up in the favorites list in Microsoft Edge. - + The following list shows the supported values: @@ -2197,7 +2197,7 @@ The following list shows the supported values: **Browser/UseSharedFolderForBooks** - + @@ -2219,8 +2219,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2229,11 +2229,11 @@ The following list shows the supported values:
            - - + + This setting specifies whether organizations should use a folder shared across users to store books from the Books Library. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index 6e910bd0ff..d92acc51af 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Camera/AllowCamera** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,13 +61,13 @@ ms.date: 01/29/2018
            - - + + Disables or enables the camera. Most restricted value is 0. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index c1be290991..8fd91336fe 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -42,7 +42,7 @@ ms.date: 01/29/2018 **Cellular/LetAppsAccessCellularData** - + @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -73,8 +73,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. This policy setting specifies whether Windows apps can access cellular data. You can specify either a default setting for all apps or a per-app setting by specifying a Package Family Name. You can get the Package Family Name for an app by using the Get-AppPackage Windows PowerShell cmdlet. A per-app setting overrides the default setting. @@ -89,7 +89,7 @@ If you disable or do not configure this policy setting, employees in your organi If an app is open when this Group Policy object is applied on a device, employees must restart the app or device for the policy changes to be applied to the app.” - + The following list shows the supported values: @@ -105,7 +105,7 @@ The following list shows the supported values: **Cellular/LetAppsAccessCellularData_ForceAllowTheseApps** - + @@ -127,8 +127,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -136,11 +136,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
            @@ -148,7 +148,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N **Cellular/LetAppsAccessCellularData_ForceDenyTheseApps** - + @@ -170,8 +170,8 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -179,11 +179,11 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            - - + + Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
            @@ -191,7 +191,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N **Cellular/LetAppsAccessCellularData_UserInControlOfTheseApps** - + @@ -213,8 +213,8 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -222,11 +222,11 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            - - + + Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
            @@ -234,7 +234,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N **Cellular/ShowAppCellularAccessUI** - + @@ -256,8 +256,8 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -265,8 +265,8 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N
            - - + + This policy setting configures the visibility of the link to the per-application cellular access control page in the cellular setting UX. If this policy setting is enabled, a drop-down list box presenting possible values will be active. Select "Hide" or "Show" to hide or show the link to the per-application cellular access control page. @@ -278,7 +278,7 @@ Supported values: - 0 - Hide - 1 - Show - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -286,14 +286,14 @@ Supported values: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set Per-App Cellular Access UI Visibility* - GP name: *ShowAppCellularAccessUI* - GP path: *Network/WWAN Service/WWAN UI Settings* - GP ADMX file name: *wwansvc.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index e121d2f02c..537f8beffa 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -69,7 +69,7 @@ ms.date: 01/29/2018 **Connectivity/AllowBluetooth** - + @@ -91,8 +91,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -100,8 +100,8 @@ ms.date: 01/29/2018
            - - + + Allows the user to enable Bluetooth or restrict access. > [!NOTE] @@ -111,7 +111,7 @@ If this is not set or it is deleted, the default value of 2 (Allow) is used. Most restricted value is 0. - + The following list shows the supported values: @@ -127,7 +127,7 @@ The following list shows the supported values: **Connectivity/AllowCellularData** - + @@ -149,8 +149,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -158,11 +158,11 @@ The following list shows the supported values:
            - - + + Allows the cellular data channel on the device. Device reboot is not required to enforce the policy. - + The following list shows the supported values: @@ -178,7 +178,7 @@ The following list shows the supported values: **Connectivity/AllowCellularDataRoaming** - + @@ -200,8 +200,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -209,13 +209,13 @@ The following list shows the supported values:
            - - + + Allows or disallows cellular data roaming on the device. Device reboot is not required to enforce the policy. Most restricted value is 0. - + The following list shows the supported values: @@ -241,7 +241,7 @@ To validate on mobile devices, do the following: **Connectivity/AllowConnectedDevices** - + @@ -263,8 +263,8 @@ To validate on mobile devices, do the following:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -272,14 +272,14 @@ To validate on mobile devices, do the following:
            - - + + > [!NOTE] > This policy requires reboot to take effect. Added in Windows 10, version 1703. Allows IT Admins the ability to disable the Connected Devices Platform (CDP) component. CDP enables discovery and connection to other devices (either proximally with BT/LAN or through the cloud) to support remote app launching, remote messaging, remote app sessions, and other cross-device experiences. - + The following list shows the supported values: @@ -294,7 +294,7 @@ The following list shows the supported values: **Connectivity/AllowNFC** - + @@ -316,8 +316,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -325,8 +325,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -335,7 +335,7 @@ Allows or disallows near field communication (NFC) on the device. Most restricted value is 0. - + The following list shows the supported values: @@ -350,7 +350,7 @@ The following list shows the supported values: **Connectivity/AllowUSBConnection** - + @@ -372,8 +372,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -381,8 +381,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -393,7 +393,7 @@ Both Media Transfer Protocol (MTP) and IP over USB are disabled when this policy Most restricted value is 0. - + The following list shows the supported values: @@ -408,7 +408,7 @@ The following list shows the supported values: **Connectivity/AllowVPNOverCellular** - + @@ -430,8 +430,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -439,13 +439,13 @@ The following list shows the supported values:
            - - + + Specifies what type of underlying connections VPN is allowed to use. Most restricted value is 0. - + The following list shows the supported values: @@ -460,7 +460,7 @@ The following list shows the supported values: **Connectivity/AllowVPNRoamingOverCellular** - + @@ -482,8 +482,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -491,13 +491,13 @@ The following list shows the supported values:
            - - + + Prevents the device from connecting to VPN when the device roams over cellular networks. Most restricted value is 0. - + The following list shows the supported values: @@ -512,7 +512,7 @@ The following list shows the supported values: **Connectivity/DiablePrintingOverHTTP** - + @@ -534,8 +534,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -543,10 +543,10 @@ The following list shows the supported values:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -554,14 +554,14 @@ The following list shows the supported values: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off printing over HTTP* - GP name: *DisableHTTPPrinting_2* - GP path: *Internet Communication settings* - GP ADMX file name: *ICM.admx* - +
            @@ -569,7 +569,7 @@ ADMX Info: **Connectivity/DisableDownloadingOfPrintDriversOverHTTP** - + @@ -591,8 +591,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -600,10 +600,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -611,14 +611,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off downloading of print drivers over HTTP* - GP name: *DisableWebPnPDownload_2* - GP path: *Internet Communication settings* - GP ADMX file name: *ICM.admx* - +
            @@ -626,7 +626,7 @@ ADMX Info: **Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards** - + @@ -648,8 +648,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -657,10 +657,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -668,14 +668,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off Internet download for Web publishing and online ordering wizards* - GP name: *ShellPreventWPWDownload_2* - GP path: *Internet Communication settings* - GP ADMX file name: *ICM.admx* - +
            @@ -683,7 +683,7 @@ ADMX Info: **Connectivity/DisallowNetworkConnectivityActiveTests** - + @@ -705,8 +705,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -714,13 +714,13 @@ ADMX Info:
            - - + + Added in Windows 10, version 1703. Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to http://www.msftconnecttest.com/connecttest.txt to determine if the device can communicate with the Internet. This policy disables the NCSI active probe, preventing network connectivity to www.msftconnecttest.com. Value type is integer. - +
            @@ -728,7 +728,7 @@ Value type is integer. **Connectivity/HardenedUNCPaths** - + @@ -750,8 +750,8 @@ Value type is integer.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -759,13 +759,13 @@ Value type is integer.
            - - + + This policy setting configures secure access to UNC paths. If you enable this policy, Windows only allows access to the specified UNC paths after fulfilling additional security requirements. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -773,14 +773,14 @@ If you enable this policy, Windows only allows access to the specified UNC paths > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Hardened UNC Paths* - GP name: *Pol_HardenedPaths* - GP path: *Network/Network Provider* - GP ADMX file name: *networkprovider.admx* - +
            @@ -788,7 +788,7 @@ ADMX Info: **Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge** - + @@ -810,8 +810,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -819,10 +819,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -830,14 +830,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prohibit installation and configuration of Network Bridge on your DNS domain network* - GP name: *NC_AllowNetBridge_NLA* - GP path: *Network/Network Connections* - GP ADMX file name: *NetworkConnections.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index 50f47bd8ee..2adc69c9bb 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -32,7 +32,7 @@ ms.date: 01/29/2018 **ControlPolicyConflict/MDMWinsOverGP** - + @@ -54,8 +54,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -63,8 +63,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, next major update. This policy allows the IT admin to control which policy will be used whenever both the MDM policy and its equivalent Group Policy are set on the device. This policy is used to ensure that MDM policy wins over GP when same setting is set by both GP and MDM channel. This policy doesn’t support Delete command. This policy doesn’t support setting the value to be 0 again after it was previously set 1. The default value is 0. In next major update, the MDM policies in Policy CSP will behave as described if this policy value is set 1. @@ -75,7 +75,7 @@ The policy should be set at every sync to ensure the device removes any settings - The current Policy Manager policies are refreshed from what MDM has set - Any values set by scripts/user outside of GP that conflict with MDM are removed - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index f7c8f906c5..7b5579ff02 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **CredentialProviders/AllowPINLogon** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to control whether a domain user can sign in using a convenience PIN. If you enable this policy setting, a domain user can set up and sign in with a convenience PIN. @@ -79,7 +79,7 @@ Note: The user's domain password will be cached in the system vault when using t To configure Windows Hello for Business, use the Administrative Template policies under Windows Hello for Business. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -87,14 +87,14 @@ To configure Windows Hello for Business, use the Administrative Template policie > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on convenience PIN sign-in* - GP name: *AllowDomainPINLogon* - GP path: *System/Logon* - GP ADMX file name: *credentialproviders.admx* - +
            @@ -102,7 +102,7 @@ ADMX Info: **CredentialProviders/BlockPicturePassword** - + @@ -124,8 +124,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -133,8 +133,8 @@ ADMX Info:
            - - + + This policy setting allows you to control whether a domain user can sign in using a picture password. If you enable this policy setting, a domain user can't set up or sign in with a picture password. @@ -143,7 +143,7 @@ If you disable or don't configure this policy setting, a domain user can set up Note that the user's domain password will be cached in the system vault when using this feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -151,14 +151,14 @@ Note that the user's domain password will be cached in the system vault when usi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off picture password sign-in* - GP name: *BlockDomainPicturePassword* - GP path: *System/Logon* - GP ADMX file name: *credentialproviders.admx* - +
            @@ -166,7 +166,7 @@ ADMX Info: **CredentialProviders/DisableAutomaticReDeploymentCredentials** - + @@ -188,8 +188,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -197,13 +197,13 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Boolean policy to disable the visibility of the credential provider that triggers the PC refresh on a device. This policy does not actually trigger the refresh. The admin user is required to authenticate to trigger the refresh on the target device. The Windows 10 Automatic ReDeployment feature allows admin to reset devices to a known good managed state while preserving the management enrollment. After the automatic redeployment is triggered the devices are for ready for use by information workers or students. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index f3cedd07cc..f8e1d19c97 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **CredentialsUI/DisablePasswordReveal** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -65,8 +65,8 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to configure the display of the password reveal button in password entry user experiences. If you enable this policy setting, the password reveal button will not be displayed after a user types a password in the password entry text box. @@ -77,7 +77,7 @@ By default, the password reveal button is displayed after a user types a passwor The policy applies to all Windows components and applications that use the Windows system controls, including Internet Explorer. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -85,14 +85,14 @@ The policy applies to all Windows components and applications that use the Windo > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not display the password reveal button* - GP name: *DisablePasswordReveal* - GP path: *Windows Components/Credential User Interface* - GP ADMX file name: *credui.admx* - +
            @@ -100,7 +100,7 @@ ADMX Info: **CredentialsUI/EnumerateAdministrators** - + @@ -122,8 +122,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -131,15 +131,15 @@ ADMX Info:
            - - + + This policy setting controls whether administrator accounts are displayed when a user attempts to elevate a running application. By default, administrator accounts are not displayed when the user attempts to elevate a running application. If you enable this policy setting, all local administrator accounts on the PC will be displayed so the user can choose one and enter the correct password. If you disable this policy setting, users will always be required to type a user name and password to elevate. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -147,14 +147,14 @@ If you disable this policy setting, users will always be required to type a user > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enumerate administrator accounts on elevation* - GP name: *EnumerateAdministrators* - GP path: *Windows Components/Credential User Interface* - GP ADMX file name: *credui.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index 921ef9f0a0..4908b2af8e 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **Cryptography/AllowFipsAlgorithmPolicy** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            - - + + Allows or disallows the Federal Information Processing Standard (FIPS) policy. The following list shows the supported values: @@ -73,7 +73,7 @@ The following list shows the supported values: - 0 (default) – Not allowed. - 1– Allowed. - +
            @@ -81,7 +81,7 @@ The following list shows the supported values: **Cryptography/TLSCipherSuites** - + @@ -103,8 +103,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -112,11 +112,11 @@ The following list shows the supported values:
            - - + + Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. - +
            diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index 9fc7abd61d..c1a23ddc73 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **DataProtection/AllowDirectMemoryAccess** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,13 +64,13 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to block direct memory access (DMA) for all hot pluggable PCI downstream ports until a user logs into Windows. Once a user logs in, Windows will enumerate the PCI devices connected to the host plug PCI ports. Every time the user locks the machine, DMA will be blocked on hot plug PCI ports with no children devices until the user logs in again. Devices which were already enumerated when the machine was unlocked will continue to function until unplugged. This policy setting is only enforced when BitLocker or device encryption is enabled. Most restricted value is 0. - + The following list shows the supported values: @@ -85,7 +85,7 @@ The following list shows the supported values: **DataProtection/LegacySelectiveWipeID** - + @@ -107,8 +107,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -116,8 +116,8 @@ The following list shows the supported values:
            - - + + > [!IMPORTANT] > This policy may change in a future release. It may be used for testing purposes, but should not be used in a production environment at this time. @@ -127,7 +127,7 @@ Setting used by Windows 8.1 Selective Wipe. > [!NOTE] > This policy is not recommended for use in Windows 10. - +
            diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index ca2c55abb5..da3f7e483a 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **DataUsage/SetCost3G** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            - - + + This policy setting configures the cost of 3G connections on the local machine. If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 3G connections on the local machine: @@ -78,7 +78,7 @@ If this policy setting is enabled, a drop-down list box presenting possible cost If this policy setting is disabled or is not configured, the cost of 3G connections is Fixed by default. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -86,14 +86,14 @@ If this policy setting is disabled or is not configured, the cost of 3G connecti > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set 3G Cost* - GP name: *SetCost3G* - GP path: *Network/WWAN Service/WWAN Media Cost* - GP ADMX file name: *wwansvc.admx* - +
            @@ -101,7 +101,7 @@ ADMX Info: **DataUsage/SetCost4G** - + @@ -123,8 +123,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -132,8 +132,8 @@ ADMX Info:
            - - + + This policy setting configures the cost of 4G connections on the local machine. If this policy setting is enabled, a drop-down list box presenting possible cost values will be active. Selecting one of the following values from the list will set the cost of all 4G connections on the local machine: @@ -146,7 +146,7 @@ If this policy setting is enabled, a drop-down list box presenting possible cost If this policy setting is disabled or is not configured, the cost of 4G connections is Fixed by default. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -154,14 +154,14 @@ If this policy setting is disabled or is not configured, the cost of 4G connecti > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set 4G Cost* - GP name: *SetCost4G* - GP path: *Network/WWAN Service/WWAN Media Cost* - GP ADMX file name: *wwansvc.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index fc2c7798e6..f8ca333a92 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -132,7 +132,7 @@ ms.date: 01/29/2018 **Defender/AllowArchiveScanning** - + @@ -154,8 +154,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -163,8 +163,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -176,7 +176,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -184,7 +184,7 @@ The following list shows the supported values: **Defender/AllowBehaviorMonitoring** - + @@ -206,8 +206,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -215,8 +215,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -228,7 +228,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -236,7 +236,7 @@ The following list shows the supported values: **Defender/AllowCloudProtection** - + @@ -258,8 +258,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -267,8 +267,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -280,7 +280,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -288,7 +288,7 @@ The following list shows the supported values: **Defender/AllowEmailScanning** - + @@ -310,8 +310,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -319,8 +319,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -332,7 +332,7 @@ The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. - +
            @@ -340,7 +340,7 @@ The following list shows the supported values: **Defender/AllowFullScanOnMappedNetworkDrives** - + @@ -362,8 +362,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -371,8 +371,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -384,7 +384,7 @@ The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. - +
            @@ -392,7 +392,7 @@ The following list shows the supported values: **Defender/AllowFullScanRemovableDriveScanning** - + @@ -414,8 +414,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -423,8 +423,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -436,7 +436,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -444,7 +444,7 @@ The following list shows the supported values: **Defender/AllowIOAVProtection** - + @@ -466,8 +466,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -475,8 +475,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -488,7 +488,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -496,7 +496,7 @@ The following list shows the supported values: **Defender/AllowIntrusionPreventionSystem** - + @@ -518,8 +518,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -527,8 +527,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -540,7 +540,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -548,7 +548,7 @@ The following list shows the supported values: **Defender/AllowOnAccessProtection** - + @@ -570,8 +570,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -579,8 +579,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -592,7 +592,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -600,7 +600,7 @@ The following list shows the supported values: **Defender/AllowRealtimeMonitoring** - + @@ -622,8 +622,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -631,8 +631,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -644,7 +644,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -652,7 +652,7 @@ The following list shows the supported values: **Defender/AllowScanningNetworkFiles** - + @@ -674,8 +674,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -683,8 +683,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -696,7 +696,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -704,7 +704,7 @@ The following list shows the supported values: **Defender/AllowScriptScanning** - + @@ -726,8 +726,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -735,8 +735,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -748,7 +748,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -756,7 +756,7 @@ The following list shows the supported values: **Defender/AllowUserUIAccess** - + @@ -778,8 +778,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -787,8 +787,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -800,7 +800,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -808,7 +808,7 @@ The following list shows the supported values: **Defender/AttackSurfaceReductionOnlyExclusions** - + @@ -830,8 +830,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -839,8 +839,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -849,7 +849,7 @@ Added in Windows 10, version 1709. This policy setting allows you to prevent Att Value type is string. - +
            @@ -857,7 +857,7 @@ Value type is string. **Defender/AttackSurfaceReductionRules** - + @@ -879,8 +879,8 @@ Value type is string.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -888,8 +888,8 @@ Value type is string.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -900,7 +900,7 @@ For more information about ASR rule ID and status ID, see [Enable Attack Surface Value type is string. - +
            @@ -908,7 +908,7 @@ Value type is string. **Defender/AvgCPULoadFactor** - + @@ -930,8 +930,8 @@ Value type is string.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -939,8 +939,8 @@ Value type is string.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -951,7 +951,7 @@ Valid values: 0–100 The default value is 50. - +
            @@ -959,7 +959,7 @@ The default value is 50. **Defender/CloudBlockLevel** - + @@ -981,8 +981,8 @@ The default value is 50.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -990,8 +990,8 @@ The default value is 50.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1005,7 +1005,7 @@ For more information about specific values that are supported, see the Windows D > [!Note] > This feature requires the "Join Microsoft MAPS" setting enabled in order to function. - + The following list shows the supported values: @@ -1022,7 +1022,7 @@ The following list shows the supported values: **Defender/CloudExtendedTimeout** - + @@ -1044,8 +1044,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1053,8 +1053,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1067,7 +1067,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se > [!Note] > This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". - +
            @@ -1075,7 +1075,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se **Defender/ControlledFolderAccessAllowedApplications** - + @@ -1097,8 +1097,8 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1106,14 +1106,14 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersAllowedApplications and changed to ControlledFolderAccessAllowedApplications. Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the | as the substring separator. - +
            @@ -1121,7 +1121,7 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app **Defender/ControlledFolderAccessProtectedFolders** - + @@ -1143,8 +1143,8 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1152,14 +1152,14 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was GuardedFoldersList and changed to ControlledFolderAccessProtectedFolders. Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the | as the substring separator. - +
            @@ -1167,7 +1167,7 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci **Defender/DaysToRetainCleanedMalware** - + @@ -1189,8 +1189,8 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1198,8 +1198,8 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1210,7 +1210,7 @@ Valid values: 0–90 The default value is 0, which keeps items in quarantine, and does not automatically remove them. - +
            @@ -1218,7 +1218,7 @@ The default value is 0, which keeps items in quarantine, and does not automatica **Defender/EnableControlledFolderAccess** - + @@ -1240,8 +1240,8 @@ The default value is 0, which keeps items in quarantine, and does not automatica
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1249,14 +1249,14 @@ The default value is 0, which keeps items in quarantine, and does not automatica
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. The previous name was EnableGuardMyFolders and changed to EnableControlledFolderAccess. Added in Windows 10, version 1709. This policy enables setting the state (On/Off/Audit) for the guard my folders feature. The guard my folders feature removes modify and delete permissions from untrusted applications to certain folders such as My Documents. Value type is integer and the range is 0 - 2. - + The following list shows the supported values: @@ -1272,7 +1272,7 @@ The following list shows the supported values: **Defender/EnableNetworkProtection** - + @@ -1294,8 +1294,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1303,8 +1303,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1316,7 +1316,7 @@ If you enable this policy with the ""Audit"" option, users/apps will not be bloc If you disable this policy, users/apps will not be blocked from connecting to dangerous domains. You will not see any network activity in Windows Defender Security Center. If you do not configure this policy, network blocking will be disabled by default. - + The following list shows the supported values: @@ -1332,7 +1332,7 @@ The following list shows the supported values: **Defender/ExcludedExtensions** - + @@ -1354,8 +1354,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1363,15 +1363,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop.   Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". - +
            @@ -1379,7 +1379,7 @@ Allows an administrator to specify a list of file type extensions to ignore duri **Defender/ExcludedPaths** - + @@ -1401,8 +1401,8 @@ Allows an administrator to specify a list of file type extensions to ignore duri
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1410,15 +1410,15 @@ Allows an administrator to specify a list of file type extensions to ignore duri
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". - +
            @@ -1426,7 +1426,7 @@ Allows an administrator to specify a list of directory paths to ignore during a **Defender/ExcludedProcesses** - + @@ -1448,8 +1448,8 @@ Allows an administrator to specify a list of directory paths to ignore during a
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1457,8 +1457,8 @@ Allows an administrator to specify a list of directory paths to ignore during a
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1471,7 +1471,7 @@ Allows an administrator to specify a list of files opened by processes to ignore   Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". - +
            @@ -1479,7 +1479,7 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E **Defender/PUAProtection** - + @@ -1501,8 +1501,8 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1510,8 +1510,8 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1524,7 +1524,7 @@ The following list shows the supported values: - 1 – PUA Protection on. Detected items are blocked. They will show in history along with other threats. - 2 – Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. - +
            @@ -1532,7 +1532,7 @@ The following list shows the supported values: **Defender/RealTimeScanDirection** - + @@ -1554,8 +1554,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1563,8 +1563,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1581,7 +1581,7 @@ The following list shows the supported values: - 1 – Monitor incoming files. - 2 – Monitor outgoing files. - +
            @@ -1589,7 +1589,7 @@ The following list shows the supported values: **Defender/ScanParameter** - + @@ -1611,8 +1611,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1620,8 +1620,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1633,7 +1633,7 @@ The following list shows the supported values: - 1 (default) – Quick scan - 2 – Full scan - +
            @@ -1641,7 +1641,7 @@ The following list shows the supported values: **Defender/ScheduleQuickScanTime** - + @@ -1663,8 +1663,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1672,8 +1672,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1690,7 +1690,7 @@ For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, an The default value is 120 - +
            @@ -1698,7 +1698,7 @@ The default value is 120 **Defender/ScheduleScanDay** - + @@ -1720,8 +1720,8 @@ The default value is 120
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1729,8 +1729,8 @@ The default value is 120
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1753,7 +1753,7 @@ The following list shows the supported values: - 7 – Sunday - 8 – No scheduled scan - +
            @@ -1761,7 +1761,7 @@ The following list shows the supported values: **Defender/ScheduleScanTime** - + @@ -1783,8 +1783,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1792,8 +1792,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1810,7 +1810,7 @@ For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, an The default value is 120. - +
            @@ -1818,7 +1818,7 @@ The default value is 120. **Defender/SignatureUpdateInterval** - + @@ -1840,8 +1840,8 @@ The default value is 120.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1849,8 +1849,8 @@ The default value is 120.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1863,7 +1863,7 @@ A value of 0 means no check for new signatures, a value of 1 means to check ever The default value is 8. - +
            @@ -1871,7 +1871,7 @@ The default value is 8. **Defender/SubmitSamplesConsent** - + @@ -1893,8 +1893,8 @@ The default value is 8.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1902,8 +1902,8 @@ The default value is 8.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop. @@ -1917,7 +1917,7 @@ The following list shows the supported values: - 2 – Never send. - 3 – Send all samples automatically. - +
            @@ -1925,7 +1925,7 @@ The following list shows the supported values: **Defender/ThreatSeverityDefaultAction** - + @@ -1947,8 +1947,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1956,8 +1956,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop.   @@ -1982,7 +1982,7 @@ The following list shows the supported values for possible actions: - 8 – User defined - 10 – Block - +
            diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 2489a17f31..44763626f4 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -101,7 +101,7 @@ ms.date: 01/29/2018 **DeliveryOptimization/DOAbsoluteMaxCacheSize** - + @@ -123,8 +123,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -132,8 +132,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -142,7 +142,7 @@ Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery The default value is 10. - +
            @@ -150,7 +150,7 @@ The default value is 10. **DeliveryOptimization/DOAllowVPNPeerCaching** - + @@ -172,8 +172,8 @@ The default value is 10.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -181,15 +181,15 @@ The default value is 10.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. Added in Windows 10, version 1703. Specifies whether the device is allowed to participate in Peer Caching while connected via VPN to the domain network. This means the device can download from or upload to other domain network devices, either on VPN or on the corporate domain network. - + The following list shows the supported values: @@ -204,7 +204,7 @@ The following list shows the supported values: **DeliveryOptimization/DODelayBackgroundDownloadFromHttp** - + @@ -226,8 +226,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -235,13 +235,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. This policy allows you to delay the use of an HTTP source in a background download that is allowed to use peer-to-peer. After the max delay is reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from peers. Note that a download that is waiting for peer sources, will appear to be stuck for the end user. The recommended value is 1 hour (3600). - +
            @@ -249,7 +249,7 @@ After the max delay is reached, the download will resume using HTTP, either down **DeliveryOptimization/DODelayForegroundDownloadFromHttp** - + @@ -271,8 +271,8 @@ After the max delay is reached, the download will resume using HTTP, either down
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -280,8 +280,8 @@ After the max delay is reached, the download will resume using HTTP, either down
            - - + + Added in Windows 10, next major update. This policy allows you to delay the use of an HTTP source in a foreground (interactive) download that is allowed to use peer-to-peer. After the max delay has reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from Peers. @@ -290,7 +290,7 @@ Note that a download that is waiting for peer sources, will appear to be stuck f The recommended value is 1 minute (60). - + The following list shows the supported values as number of seconds: @@ -306,7 +306,7 @@ The following list shows the supported values as number of seconds: **DeliveryOptimization/DODownloadMode** - + @@ -328,8 +328,8 @@ The following list shows the supported values as number of seconds:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -337,15 +337,15 @@ The following list shows the supported values as number of seconds:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. Specifies the download method that Delivery Optimization can use in downloads of Windows Updates, Apps and App updates. - + The following list shows the supported values: @@ -364,7 +364,7 @@ The following list shows the supported values: **DeliveryOptimization/DOGroupId** - + @@ -386,8 +386,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -395,8 +395,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -406,7 +406,7 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this > [!NOTE] > You must use a GUID as the group ID. - +
            @@ -414,7 +414,7 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this **DeliveryOptimization/DOGroupIdSource** - + @@ -436,8 +436,8 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -445,8 +445,8 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this
            - - + + Added in Windows 10, next major update. Set this policy to restrict peer selection to a specific source. Options available are: 1 = AD Site, 2 = Authenticated domain SID, 3 = DHCP Option ID, 4 = DNS Suffix When set, the Group ID will be assigned automatically from the selected source. @@ -457,7 +457,7 @@ The options set in this policy only apply to Group (2) download mode. If Group ( For option 4 - DHCP Option ID, the client will query DHCP Option ID 234 and use the returned GUID value as the Group ID. - + The following list shows the supported values: @@ -474,7 +474,7 @@ The following list shows the supported values: **DeliveryOptimization/DOMaxCacheAge** - + @@ -496,8 +496,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -505,8 +505,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -515,7 +515,7 @@ Specifies the maximum time in seconds that each file is held in the Delivery Opt The default value is 259200 seconds (3 days). - +
            @@ -523,7 +523,7 @@ The default value is 259200 seconds (3 days). **DeliveryOptimization/DOMaxCacheSize** - + @@ -545,8 +545,8 @@ The default value is 259200 seconds (3 days).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -554,8 +554,8 @@ The default value is 259200 seconds (3 days).
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -564,7 +564,7 @@ Specifies the maximum cache size that Delivery Optimization can utilize, as a pe The default value is 20. - +
            @@ -572,7 +572,7 @@ The default value is 20. **DeliveryOptimization/DOMaxDownloadBandwidth** - + @@ -594,8 +594,8 @@ The default value is 20.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -603,8 +603,8 @@ The default value is 20.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile.   @@ -613,7 +613,7 @@ Added in Windows 10, version 1607. Specifies the maximum download bandwidth in The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. - +
            @@ -621,7 +621,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts **DeliveryOptimization/DOMaxUploadBandwidth** - + @@ -643,8 +643,8 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -652,8 +652,8 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -662,7 +662,7 @@ Specifies the maximum upload bandwidth in KiloBytes/second that a device will us The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). - +
            @@ -670,7 +670,7 @@ The default value is 0, which permits unlimited possible bandwidth (optimized fo **DeliveryOptimization/DOMinBackgroundQos** - + @@ -692,8 +692,8 @@ The default value is 0, which permits unlimited possible bandwidth (optimized fo
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -701,8 +701,8 @@ The default value is 0, which permits unlimited possible bandwidth (optimized fo
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -711,7 +711,7 @@ Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality The default value is 500. - +
            @@ -719,7 +719,7 @@ The default value is 500. **DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** - + @@ -741,8 +741,8 @@ The default value is 500.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -750,8 +750,8 @@ The default value is 500.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -759,7 +759,7 @@ Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in pe The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. - +
            @@ -767,7 +767,7 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser **DeliveryOptimization/DOMinDiskSizeAllowedToPeer** - + @@ -789,8 +789,8 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -798,8 +798,8 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -811,7 +811,7 @@ Added in Windows 10, version 1703. Specifies the required minimum disk size (cap The default value is 32 GB. - +
            @@ -819,7 +819,7 @@ The default value is 32 GB. **DeliveryOptimization/DOMinFileSizeToCache** - + @@ -841,8 +841,8 @@ The default value is 32 GB.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -850,8 +850,8 @@ The default value is 32 GB.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -860,7 +860,7 @@ Added in Windows 10, version 1703. Specifies the minimum content file size in MB The default value is 100 MB. - +
            @@ -868,7 +868,7 @@ The default value is 100 MB. **DeliveryOptimization/DOMinRAMAllowedToPeer** - + @@ -890,8 +890,8 @@ The default value is 100 MB.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -899,8 +899,8 @@ The default value is 100 MB.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Business, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -909,7 +909,7 @@ Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required The default value is 4 GB. - +
            @@ -917,7 +917,7 @@ The default value is 4 GB. **DeliveryOptimization/DOModifyCacheDrive** - + @@ -939,8 +939,8 @@ The default value is 4 GB.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -948,8 +948,8 @@ The default value is 4 GB.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -958,7 +958,7 @@ Added in Windows 10, version 1607. Specifies the drive that Delivery Optimizati By default, %SystemDrive% is used to store the cache. - +
            @@ -966,7 +966,7 @@ By default, %SystemDrive% is used to store the cache. **DeliveryOptimization/DOMonthlyUploadDataCap** - + @@ -988,8 +988,8 @@ By default, %SystemDrive% is used to store the cache.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -997,8 +997,8 @@ By default, %SystemDrive% is used to store the cache.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. @@ -1009,7 +1009,7 @@ The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is The default value is 20. - +
            @@ -1017,7 +1017,7 @@ The default value is 20. **DeliveryOptimization/DOPercentageMaxBackDownloadBandwidth** - + @@ -1039,8 +1039,8 @@ The default value is 20.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1048,13 +1048,13 @@ The default value is 20.
            - - + + Added in Windows 10, next major update. Specifies the maximum background download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for background downloads. Note that downloads from LAN peers will not be throttled even when this policy is set. - +
            @@ -1062,10 +1062,10 @@ Note that downloads from LAN peers will not be throttled even when this policy i **DeliveryOptimization/DOPercentageMaxDownloadBandwidth** - + This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryoptimization-dopercentagemaxforedownloadbandwidth) and [DOPercentageMaxBackDownloadBandwidth](#deliveryoptimization-dopercentagemaxbackdownloadbandwidth) policies instead. - +
            @@ -1073,7 +1073,7 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo **DeliveryOptimization/DOPercentageMaxForeDownloadBandwidth** - + @@ -1095,8 +1095,8 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1104,13 +1104,13 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo
            - - + + Added in Windows 10, next major update. Specifies the maximum foreground download bandwidth that Delivery Optimization uses across all concurrent download activities as a percentage of available download bandwidth. The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for foreground downloads. Note that downloads from LAN peers will not be throttled even when this policy is set. - +
            @@ -1118,7 +1118,7 @@ Note that downloads from LAN peers will not be throttled even when this policy i **DeliveryOptimization/DORestrictPeerSelectionBy** - + @@ -1140,8 +1140,8 @@ Note that downloads from LAN peers will not be throttled even when this policy i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1149,14 +1149,14 @@ Note that downloads from LAN peers will not be throttled even when this policy i
            - - + + Added in Windows 10, next major update. Set this policy to restrict peer selection via selected option. Options available are: 1=Subnet mask (more options will be added in a future release). Option 1 (Subnet mask) applies to both Download Mode LAN (1) and Group (2). - + The following list shows the supported values: @@ -1170,7 +1170,7 @@ The following list shows the supported values: **DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth** - + @@ -1192,8 +1192,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1201,13 +1201,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. Specifies the maximum background download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. Note that downloads from LAN peers will not be throttled even when this policy is set. - + This policy allows an IT Admin to define the following: @@ -1223,7 +1223,7 @@ This policy allows an IT Admin to define the following: **DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth** - + @@ -1245,8 +1245,8 @@ This policy allows an IT Admin to define the following:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1254,13 +1254,13 @@ This policy allows an IT Admin to define the following:
            - - + + Added in Windows 10, next major update. Specifies the maximum foreground download bandwidth that Delivery Optimization uses during and outside business hours across all concurrent download activities as a percentage of available download bandwidth. Note that downloads from LAN peers will not be throttled even when this policy is set. - + This policy allows an IT Admin to define the following: diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index bf93aa8e5e..fbbf63681d 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Desktop/PreventUserRedirectionOfProfileFolders** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,15 +61,15 @@ ms.date: 01/29/2018
            - - + + Prevents users from changing the path to their profile folders. By default, a user can change the location of their individual profile folders like Documents, Music etc. by typing a new path in the Locations tab of the folder's Properties dialog box. If you enable this setting, users are unable to type a new location in the Target box. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -77,14 +77,14 @@ If you enable this setting, users are unable to type a new location in the Targe > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prohibit User from manually redirecting Profile Folders* - GP name: *DisablePersonalDirChange* - GP path: *Desktop* - GP ADMX file name: *desktop.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index 7a77348d53..decc360200 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **DeviceGuard/EnableVirtualizationBasedSecurity** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,11 +67,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. Turns on virtualization based security(VBS) at the next reboot. virtualization based security uses the Windows Hypervisor to provide support for security services. Value type is integer. - + The following list shows the supported values: @@ -86,7 +86,7 @@ The following list shows the supported values: **DeviceGuard/LsaCfgFlags** - + @@ -108,8 +108,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -117,11 +117,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. This setting lets users turn on Credential Guard with virtualization-based security to help protect credentials at next reboot. Value type is integer. - + The following list shows the supported values: @@ -137,7 +137,7 @@ The following list shows the supported values: **DeviceGuard/RequirePlatformSecurityFeatures** - + @@ -159,8 +159,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -168,11 +168,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Specifies the platform security level at the next reboot. Value type is integer. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index efc8a18433..212324e984 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,15 +64,15 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to specify a list of Plug and Play hardware IDs and compatible IDs for devices that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing a device whose hardware ID or compatible ID appears in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, devices can be installed and updated as allowed or prevented by other policy settings. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -80,14 +80,14 @@ If you disable or do not configure this policy setting, devices can be installed > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent installation of devices that match any of these device IDs* - GP name: *DeviceInstall_IDs_Deny* - GP path: *System/Device Installation/Device Installation Restrictions* - GP ADMX file name: *deviceinstallation.admx* - +
            @@ -95,7 +95,7 @@ ADMX Info: **DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** - + @@ -117,8 +117,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -126,15 +126,15 @@ ADMX Info:
            - - + + This policy setting allows you to specify a list of device setup class globally unique identifiers (GUIDs) for device drivers that Windows is prevented from installing. This policy setting takes precedence over any other policy setting that allows Windows to install a device. If you enable this policy setting, Windows is prevented from installing or updating device drivers whose device setup class GUIDs appear in the list you create. If you enable this policy setting on a remote desktop server, the policy setting affects redirection of the specified devices from a remote desktop client to the remote desktop server. If you disable or do not configure this policy setting, Windows can install and update devices as allowed or prevented by other policy settings. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -142,14 +142,14 @@ If you disable or do not configure this policy setting, Windows can install and > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent installation of devices using drivers that match these device setup classes* - GP name: *DeviceInstall_Classes_Deny* - GP path: *System/Device Installation/Device Installation Restrictions* - GP ADMX file name: *deviceinstallation.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 963e8714e8..8b22ded5b4 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -80,7 +80,7 @@ ms.date: 01/29/2018 **DeviceLock/AllowIdleReturnWithoutPassword** - + @@ -102,8 +102,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -111,8 +111,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -122,7 +122,7 @@ Specifies whether the user must input a PIN or password when the device resumes > [!NOTE] > This policy must be wrapped in an Atomic command. - + The following list shows the supported values: @@ -137,7 +137,7 @@ The following list shows the supported values: **DeviceLock/AllowScreenTimeoutWhileLockedUserConfig** - + @@ -159,8 +159,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -168,8 +168,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -188,7 +188,7 @@ The following list shows the supported values: > [!IMPORTANT] > If this policy is set to 1 (Allowed), the value set by **DeviceLock/ScreenTimeOutWhileLocked** is ignored. To ensure enterprise control over the screen timeout, set this policy to 0 (Not allowed) and use **DeviceLock/ScreenTimeOutWhileLocked** to set the screen timeout period. - +
            @@ -196,7 +196,7 @@ The following list shows the supported values: **DeviceLock/AllowSimpleDevicePassword** - + @@ -218,8 +218,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -227,8 +227,8 @@ The following list shows the supported values:
            - - + + Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For the desktop, it also controls the use of picture passwords. > [!NOTE] @@ -242,7 +242,7 @@ The following list shows the supported values: For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - +
            @@ -250,7 +250,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/AlphanumericDevicePasswordRequired** - + @@ -272,8 +272,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -281,8 +281,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Determines the type of PIN or password required. This policy only applies if the **DeviceLock/DevicePasswordEnabled** policy is set to 0 (required). > [!NOTE] @@ -302,7 +302,7 @@ The following list shows the supported values: > > If **AlphanumericDevicePasswordRequired** is set to 0, then MinDevicePasswordLength = 4 and MinDevicePasswordComplexCharacters = 2. - +
            @@ -310,7 +310,7 @@ The following list shows the supported values: **DeviceLock/DevicePasswordEnabled** - + @@ -332,8 +332,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -341,8 +341,8 @@ The following list shows the supported values:
            - - + + Specifies whether device lock is enabled. > [!NOTE] @@ -390,7 +390,7 @@ The following list shows the supported values: > - MaxDevicePasswordFailedAttempts > - MaxInactivityTimeDeviceLock - +
            @@ -398,7 +398,7 @@ The following list shows the supported values: **DeviceLock/DevicePasswordExpiration** - + @@ -420,8 +420,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -429,8 +429,8 @@ The following list shows the supported values:
            - - + + Specifies when the password expires (in days). > [!NOTE] @@ -446,7 +446,7 @@ If all policy values = 0 then 0; otherwise, Min policy value is the most secure For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - +
            @@ -454,7 +454,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/DevicePasswordHistory** - + @@ -476,8 +476,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -485,8 +485,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Specifies how many passwords can be stored in the history that can’t be used. > [!NOTE] @@ -504,7 +504,7 @@ Max policy value is the most restricted. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - +
            @@ -512,7 +512,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/EnforceLockScreenAndLogonImage** - + @@ -534,8 +534,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -543,8 +543,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Added in Windows 10, version 1607. Specifies the default lock screen and logon image shown when no user is signed in. It also sets the specified image for all users, which replaces the default image. The same image is used for both the lock and logon screens. Users will not be able to change this image. > [!NOTE] @@ -553,7 +553,7 @@ Added in Windows 10, version 1607. Specifies the default lock screen and logon Value type is a string, which is the full image filepath and filename. - +
            @@ -561,7 +561,7 @@ Value type is a string, which is the full image filepath and filename. **DeviceLock/EnforceLockScreenProvider** - + @@ -583,8 +583,8 @@ Value type is a string, which is the full image filepath and filename.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -592,8 +592,8 @@ Value type is a string, which is the full image filepath and filename.
            - - + + Added in Windows 10, version 1607. Restricts lock screen image to a specific lock screen provider. Users will not be able change this provider. > [!NOTE] @@ -602,7 +602,7 @@ Added in Windows 10, version 1607. Restricts lock screen image to a specific lo Value type is a string, which is the AppID. - +
            @@ -610,7 +610,7 @@ Value type is a string, which is the AppID. **DeviceLock/MaxDevicePasswordFailedAttempts** - + @@ -632,8 +632,8 @@ Value type is a string, which is the AppID.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -641,8 +641,8 @@ Value type is a string, which is the AppID.
            - - + + The number of authentication failures allowed before the device will be wiped. A value of 0 disables device wipe functionality. > [!NOTE] @@ -665,7 +665,7 @@ Most secure value is 0 if all policy values = 0; otherwise, Min policy value is For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - +
            @@ -673,7 +673,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/MaxInactivityTimeDeviceLock** - + @@ -695,8 +695,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -704,8 +704,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked. Users can select any existing timeout value less than the specified maximum time in the Settings app. Note the Lumia 950 and 950XL have a maximum timeout value of 5 minutes, regardless of the value set by this policy. > [!NOTE] @@ -719,7 +719,7 @@ The following list shows the supported values: For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - +
            @@ -727,7 +727,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay** - + @@ -749,8 +749,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -758,8 +758,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Specifies the maximum amount of time (in minutes) allowed after the device is idle that will cause the device to become PIN or password locked while connected to an external display. > [!NOTE] @@ -771,7 +771,7 @@ The following list shows the supported values: - An integer X where 0 <= X <= 999. - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - +
            @@ -779,7 +779,7 @@ The following list shows the supported values: **DeviceLock/MinDevicePasswordComplexCharacters** - + @@ -801,8 +801,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -810,8 +810,8 @@ The following list shows the supported values:
            - - + + The number of complex element types (uppercase and lowercase letters, numbers, and punctuation) required for a strong PIN or password. > [!NOTE] @@ -885,7 +885,7 @@ The enforcement of policies for Microsoft accounts happen on the server, and the For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). - +
            @@ -893,7 +893,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/MinDevicePasswordLength** - + @@ -915,8 +915,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -924,8 +924,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + Specifies the minimum number or characters required in the PIN or password. > [!NOTE] @@ -944,7 +944,7 @@ Max policy value is the most restricted. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). - +
            @@ -952,7 +952,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En **DeviceLock/MinimumPasswordAge** - + @@ -974,8 +974,8 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -983,15 +983,15 @@ For additional information about this policy, see [Exchange ActiveSync Policy En
            - - + + This security setting determines the period of time (in days) that a password must be used before the user can change it. You can set a value between 1 and 998 days, or you can allow changes immediately by setting the number of days to 0. The minimum password age must be less than the Maximum password age, unless the maximum password age is set to 0, indicating that passwords will never expire. If the maximum password age is set to 0, the minimum password age can be set to any value between 0 and 998. Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. - +
            @@ -999,7 +999,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor **DeviceLock/PreventLockScreenSlideShow** - + @@ -1021,8 +1021,8 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1030,15 +1030,15 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor
            - - + + Disables the lock screen slide show settings in PC Settings and prevents a slide show from playing on the lock screen. By default, users can enable a slide show that will run after they lock the machine. If you enable this setting, users will no longer be able to modify slide show settings in PC Settings, and no slide show will ever start. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1046,14 +1046,14 @@ If you enable this setting, users will no longer be able to modify slide show se > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent enabling lock screen slide show* - GP name: *CPL_Personalization_NoLockScreenSlideshow* - GP path: *Control Panel/Personalization* - GP ADMX file name: *ControlPanelDisplay.admx* - +
            @@ -1061,7 +1061,7 @@ ADMX Info: **DeviceLock/ScreenTimeoutWhileLocked** - + @@ -1083,8 +1083,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1092,8 +1092,8 @@ ADMX Info:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   @@ -1107,7 +1107,7 @@ The default value is 10. Most restricted value is 0. - +
            diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index 278ae2808f..3921cace6c 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **Display/TurnOffGdiDPIScalingForApps** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            - - + + GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. This policy setting lets you specify legacy applications that have GDI DPI Scaling turned off. @@ -81,7 +81,7 @@ To validate on Desktop, do the following: 1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms. 2. Run the app and observe blurry text. - +
            @@ -89,7 +89,7 @@ To validate on Desktop, do the following: **Display/TurnOnGdiDPIScalingForApps** - + @@ -111,8 +111,8 @@ To validate on Desktop, do the following:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -120,8 +120,8 @@ To validate on Desktop, do the following:
            - - + + GDI DPI Scaling enables applications that are not DPI aware to become per monitor DPI aware. This policy setting lets you specify legacy applications that have GDI DPI Scaling turned on. @@ -137,7 +137,7 @@ To validate on Desktop, do the following: 1. Configure the setting for an app which uses GDI. 2. Run the app and observe crisp text. - +
            diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index ed70c0cb02..6889a52380 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **Education/DefaultPrinterName** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,13 +67,13 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. This policy allows IT Admins to set the user's default printer. The policy value is expected to be the name (network host name) of an installed printer. - +
            @@ -81,7 +81,7 @@ The policy value is expected to be the name (network host name) of an installed **Education/PreventAddingNewPrinters** - + @@ -103,8 +103,8 @@ The policy value is expected to be the name (network host name) of an installed
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -112,11 +112,11 @@ The policy value is expected to be the name (network host name) of an installed
            - - + + Added in Windows 10, version 1709. Allows IT Admins to prevent user installation of additional printers from the printers settings. - + The following list shows the supported values: @@ -131,7 +131,7 @@ The following list shows the supported values: **Education/PrinterNames** - + @@ -153,8 +153,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -162,13 +162,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Allows IT Admins to automatically provision printers based on their names (network host names). The policy value is expected to be a `````` seperated list of printer names. The OS will attempt to search and install the matching printer driver for each listed printer. - +
            diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 1a432f3397..38c3886970 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -45,7 +45,7 @@ ms.date: 01/29/2018 **EnterpriseCloudPrint/CloudPrintOAuthAuthority** - + @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -76,15 +76,15 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. Specifies the authentication endpoint for acquiring OAuth tokens. This policy must target ./User, otherwise it fails. The datatype is a string. The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". - +
            @@ -92,7 +92,7 @@ The default value is an empty string. Otherwise, the value should contain the UR **EnterpriseCloudPrint/CloudPrintOAuthClientId** - + @@ -114,8 +114,8 @@ The default value is an empty string. Otherwise, the value should contain the UR
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -123,15 +123,15 @@ The default value is an empty string. Otherwise, the value should contain the UR
            - - + + Added in Windows 10, version 1703. Specifies the GUID of a client application authorized to retrieve OAuth tokens from the OAuthAuthority. This policy must target ./User, otherwise it fails. The datatype is a string. The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". - +
            @@ -139,7 +139,7 @@ The default value is an empty string. Otherwise, the value should contain a GUID **EnterpriseCloudPrint/CloudPrintResourceId** - + @@ -161,8 +161,8 @@ The default value is an empty string. Otherwise, the value should contain a GUID
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -170,15 +170,15 @@ The default value is an empty string. Otherwise, the value should contain a GUID
            - - + + Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the enterprise cloud print client during OAuth authentication. This policy must target ./User, otherwise it fails. The datatype is a string. The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". - +
            @@ -186,7 +186,7 @@ The default value is an empty string. Otherwise, the value should contain a URL. **EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint** - + @@ -208,8 +208,8 @@ The default value is an empty string. Otherwise, the value should contain a URL.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -217,15 +217,15 @@ The default value is an empty string. Otherwise, the value should contain a URL.
            - - + + Added in Windows 10, version 1703. Specifies the per-user end point for discovering cloud printers. This policy must target ./User, otherwise it fails. The datatype is a string. The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". - +
            @@ -233,7 +233,7 @@ The default value is an empty string. Otherwise, the value should contain the UR **EnterpriseCloudPrint/DiscoveryMaxPrinterLimit** - + @@ -255,8 +255,8 @@ The default value is an empty string. Otherwise, the value should contain the UR
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -264,15 +264,15 @@ The default value is an empty string. Otherwise, the value should contain the UR
            - - + + Added in Windows 10, version 1703. Defines the maximum number of printers that should be queried from a discovery end point. This policy must target ./User, otherwise it fails. The datatype is an integer. For Windows Mobile, the default value is 20. - +
            @@ -280,7 +280,7 @@ For Windows Mobile, the default value is 20. **EnterpriseCloudPrint/MopriaDiscoveryResourceId** - + @@ -302,8 +302,8 @@ For Windows Mobile, the default value is 20.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -311,15 +311,15 @@ For Windows Mobile, the default value is 20.
            - - + + Added in Windows 10, version 1703. Specifies the per-user resource URL for which access is requested by the Mopria discovery client during OAuth authentication. This policy must target ./User, otherwise it fails. The datatype is a string. The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". - +
            diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index 71b4c992f1..4f957acf78 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -42,7 +42,7 @@ ms.date: 01/29/2018 **ErrorReporting/CustomizeConsentSettings** - + @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -73,8 +73,8 @@ ms.date: 01/29/2018
            - - + + This policy setting determines the consent behavior of Windows Error Reporting for specific event types. If you enable this policy setting, you can add specific event types to a list by clicking Show, and typing event types in the Value Name column of the Show Contents dialog box. Event types are those for generic, non-fatal errors: crash, no response, and kernel fault errors. For each specified event type, you can set a consent level of 0, 1, 2, 3, or 4. @@ -91,7 +91,7 @@ If you enable this policy setting, you can add specific event types to a list by If you disable or do not configure this policy setting, then the default consent settings that are applied are those specified by the user in Control Panel, or in the Configure Default Consent policy setting. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -99,14 +99,14 @@ If you disable or do not configure this policy setting, then the default consent > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Customize consent settings* - GP name: *WerConsentCustomize_2* - GP path: *Windows Components/Windows Error Reporting/Consent* - GP ADMX file name: *ErrorReporting.admx* - +
            @@ -114,7 +114,7 @@ ADMX Info: **ErrorReporting/DisableWindowsErrorReporting** - + @@ -136,8 +136,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -145,15 +145,15 @@ ADMX Info:
            - - + + This policy setting turns off Windows Error Reporting, so that reports are not collected or sent to either Microsoft or internal servers within your organization when software unexpectedly stops working or fails. If you enable this policy setting, Windows Error Reporting does not send any problem information to Microsoft. Additionally, solution information is not available in Security and Maintenance in Control Panel. If you disable or do not configure this policy setting, the Turn off Windows Error Reporting policy setting in Computer Configuration/Administrative Templates/System/Internet Communication Management/Internet Communication settings takes precedence. If Turn off Windows Error Reporting is also either disabled or not configured, user settings in Control Panel for Windows Error Reporting are applied. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -161,14 +161,14 @@ If you disable or do not configure this policy setting, the Turn off Windows Err > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disable Windows Error Reporting* - GP name: *WerDisable_2* - GP path: *Windows Components/Windows Error Reporting* - GP ADMX file name: *ErrorReporting.admx* - +
            @@ -176,7 +176,7 @@ ADMX Info: **ErrorReporting/DisplayErrorNotification** - + @@ -198,8 +198,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -207,8 +207,8 @@ ADMX Info:
            - - + + This policy setting controls whether users are shown an error dialog box that lets them report an error. If you enable this policy setting, users are notified in a dialog box that an error has occurred, and can display more details about the error. If the Configure Error Reporting policy setting is also enabled, the user can also report the error. @@ -219,7 +219,7 @@ If you do not configure this policy setting, users can change this setting in Co See also the Configure Error Reporting policy setting. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -227,14 +227,14 @@ See also the Configure Error Reporting policy setting. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Display Error Notification* - GP name: *PCH_ShowUI* - GP path: *Windows Components/Windows Error Reporting* - GP ADMX file name: *ErrorReporting.admx* - +
            @@ -242,7 +242,7 @@ ADMX Info: **ErrorReporting/DoNotSendAdditionalData** - + @@ -264,8 +264,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -273,15 +273,15 @@ ADMX Info:
            - - + + This policy setting controls whether additional data in support of error reports can be sent to Microsoft automatically. If you enable this policy setting, any additional data requests from Microsoft in response to a Windows Error Reporting report are automatically declined, without notification to the user. If you disable or do not configure this policy setting, then consent policy settings in Computer Configuration/Administrative Templates/Windows Components/Windows Error Reporting/Consent take precedence. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -289,14 +289,14 @@ If you disable or do not configure this policy setting, then consent policy sett > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not send additional data* - GP name: *WerNoSecondLevelData_2* - GP path: *Windows Components/Windows Error Reporting* - GP ADMX file name: *ErrorReporting.admx* - +
            @@ -304,7 +304,7 @@ ADMX Info: **ErrorReporting/PreventCriticalErrorDisplay** - + @@ -326,8 +326,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -335,15 +335,15 @@ ADMX Info:
            - - + + This policy setting prevents the display of the user interface for critical errors. If you enable this policy setting, Windows Error Reporting does not display any GUI-based error messages or dialog boxes for critical errors. If you disable or do not configure this policy setting, Windows Error Reporting displays the user interface for critical errors. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -351,14 +351,14 @@ If you disable or do not configure this policy setting, Windows Error Reporting > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent display of the user interface for critical errors* - GP name: *WerDoNotShowUI* - GP path: *Windows Components/Windows Error Reporting* - GP ADMX file name: *ErrorReporting.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index c98738d293..961555b8fe 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -39,7 +39,7 @@ ms.date: 01/29/2018 **EventLogService/ControlEventLogBehavior** - + @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -70,8 +70,8 @@ ms.date: 01/29/2018
            - - + + This policy setting controls Event Log behavior when the log file reaches its maximum size. If you enable this policy setting and a log file reaches its maximum size, new events are not written to the log and are lost. @@ -80,7 +80,7 @@ If you disable or do not configure this policy setting and a log file reaches it Note: Old events may or may not be retained according to the "Backup log automatically when full" policy setting. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -88,14 +88,14 @@ Note: Old events may or may not be retained according to the "Backup log automat > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Control Event Log behavior when the log file reaches its maximum size* - GP name: *Channel_Log_Retention_1* - GP path: *Windows Components/Event Log Service/Application* - GP ADMX file name: *eventlog.admx* - +
            @@ -103,7 +103,7 @@ ADMX Info: **EventLogService/SpecifyMaximumFileSizeApplicationLog** - + @@ -125,8 +125,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -134,15 +134,15 @@ ADMX Info:
            - - + + This policy setting specifies the maximum size of the log file in kilobytes. If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -150,14 +150,14 @@ If you disable or do not configure this policy setting, the maximum size of the > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the maximum log file size (KB)* - GP name: *Channel_LogMaxSize_1* - GP path: *Windows Components/Event Log Service/Application* - GP ADMX file name: *eventlog.admx* - +
            @@ -165,7 +165,7 @@ ADMX Info: **EventLogService/SpecifyMaximumFileSizeSecurityLog** - + @@ -187,8 +187,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -196,15 +196,15 @@ ADMX Info:
            - - + + This policy setting specifies the maximum size of the log file in kilobytes. If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -212,14 +212,14 @@ If you disable or do not configure this policy setting, the maximum size of the > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the maximum log file size (KB)* - GP name: *Channel_LogMaxSize_2* - GP path: *Windows Components/Event Log Service/Security* - GP ADMX file name: *eventlog.admx* - +
            @@ -227,7 +227,7 @@ ADMX Info: **EventLogService/SpecifyMaximumFileSizeSystemLog** - + @@ -249,8 +249,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -258,15 +258,15 @@ ADMX Info:
            - - + + This policy setting specifies the maximum size of the log file in kilobytes. If you enable this policy setting, you can configure the maximum log file size to be between 1 megabyte (1024 kilobytes) and 2 terabytes (2147483647 kilobytes) in kilobyte increments. If you disable or do not configure this policy setting, the maximum size of the log file will be set to the locally configured value. This value can be changed by the local administrator using the Log Properties dialog and it defaults to 20 megabytes. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -274,14 +274,14 @@ If you disable or do not configure this policy setting, the maximum size of the > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the maximum log file size (KB)* - GP name: *Channel_LogMaxSize_4* - GP path: *Windows Components/Event Log Service/System* - GP ADMX file name: *eventlog.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index c8aaf83293..1ee67cf404 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -92,7 +92,7 @@ ms.date: 01/29/2018 **Experience/AllowCopyPaste** - + @@ -114,8 +114,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -123,8 +123,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -132,7 +132,7 @@ Specifies whether copy and paste is allowed. Most restricted value is 0. - + The following list shows the supported values: @@ -147,7 +147,7 @@ The following list shows the supported values: **Experience/AllowCortana** - + @@ -169,8 +169,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -178,13 +178,13 @@ The following list shows the supported values:
            - - + + Specifies whether Cortana is allowed on the device. If you enable or don’t configure this setting, Cortana is allowed on the device. If you disable this setting, Cortana is turned off. When Cortana is off, users will still be able to use search to find items on the device. Most restricted value is 0. - + The following list shows the supported values: @@ -199,7 +199,7 @@ The following list shows the supported values: **Experience/AllowDeviceDiscovery** - + @@ -221,8 +221,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -230,15 +230,15 @@ The following list shows the supported values:
            - - + + Allows users to turn on/off device discovery UX. When set to 0 , the projection pane is disabled. The Win+P and Win+K shortcut keys will not work on. Most restricted value is 0. - + The following list shows the supported values: @@ -253,7 +253,7 @@ The following list shows the supported values: **Experience/AllowFindMyDevice** - + @@ -275,8 +275,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -284,15 +284,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy turns on Find My Device. When Find My Device is on, the device and its location are registered in the cloud so that the device can be located when the user initiates a Find command from account.microsoft.com. In Windows 10, version 1709 devices that are compatible with active digitizers, enabling Find My Device will also allow the user to view the last location of use of their active digitizer on their device; this location is stored locally on the user's device after each use of their active digitizer. When Find My Device is off, the device and its location are not registered and the Find My Device feature will not work. In Windows 10, version 1709 the user will not be able to view the location of the last use of their active digitizer on their device. - + The following list shows the supported values: @@ -307,7 +307,7 @@ The following list shows the supported values: **Experience/AllowManualMDMUnenrollment** - + @@ -329,8 +329,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -338,8 +338,8 @@ The following list shows the supported values:
            - - + + Specifies whether to allow the user to delete the workplace account using the workplace control panel. If the device is Azure Active Directory joined and MDM enrolled (e.g. auto-enrolled), which is majority of the case for Intune, then disabling the MDM unenrollment has no effect. > [!NOTE] @@ -348,7 +348,7 @@ Specifies whether to allow the user to delete the workplace account using the wo Most restricted value is 0. - + The following list shows the supported values: @@ -363,7 +363,7 @@ The following list shows the supported values: **Experience/AllowSIMErrorDialogPromptWhenNoSIM** - + @@ -385,8 +385,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -394,15 +394,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. Specifies whether to display dialog prompt when no SIM card is detected. - + The following list shows the supported values: @@ -417,10 +417,10 @@ The following list shows the supported values: **Experience/AllowSaveAsOfOfficeFiles** - + This policy is deprecated. - +
            @@ -428,7 +428,7 @@ This policy is deprecated. **Experience/AllowScreenCapture** - + @@ -450,8 +450,8 @@ This policy is deprecated.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -459,8 +459,8 @@ This policy is deprecated.
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -469,7 +469,7 @@ Specifies whether screen capture is allowed. Most restricted value is 0. - + The following list shows the supported values: @@ -484,10 +484,10 @@ The following list shows the supported values: **Experience/AllowSharingOfOfficeFiles** - + This policy is deprecated. - +
            @@ -495,7 +495,7 @@ This policy is deprecated. **Experience/AllowSyncMySettings** - + @@ -517,8 +517,8 @@ This policy is deprecated.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -526,11 +526,11 @@ This policy is deprecated.
            - - + + Allows or disallows all Windows sync settings on the device. For information about what settings are sync'ed, see [About sync setting on Windows 10 devices](http://windows.microsoft.com/windows-10/about-sync-settings-on-windows-10-devices). - + The following list shows the supported values: @@ -545,7 +545,7 @@ The following list shows the supported values: **Experience/AllowTailoredExperiencesWithDiagnosticData** - + @@ -567,8 +567,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -576,8 +576,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -589,7 +589,7 @@ Diagnostic data can include browser, app and feature usage, depending on the "Di Most restricted value is 0. - + The following list shows the supported values: @@ -604,7 +604,7 @@ The following list shows the supported values: **Experience/AllowTaskSwitcher** - + @@ -626,8 +626,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -635,15 +635,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. Allows or disallows task switching on the device. - + The following list shows the supported values: @@ -658,7 +658,7 @@ The following list shows the supported values: **Experience/AllowThirdPartySuggestionsInWindowsSpotlight** - + @@ -680,8 +680,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -689,15 +689,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only available for Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education. Specifies whether to allow app and content suggestions from third-party software publishers in Windows spotlight features like lock screen spotlight, suggested apps in the Start menu, and Windows tips. Users may still see suggestions for Microsoft features, apps, and services. - + The following list shows the supported values: @@ -712,7 +712,7 @@ The following list shows the supported values: **Experience/AllowVoiceRecording** - + @@ -734,8 +734,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -743,8 +743,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -753,7 +753,7 @@ Specifies whether voice recording is allowed for apps. Most restricted value is 0. - + The following list shows the supported values: @@ -768,7 +768,7 @@ The following list shows the supported values: **Experience/AllowWindowsConsumerFeatures** - + @@ -790,8 +790,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -799,8 +799,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -809,7 +809,7 @@ This policy allows IT admins to turn on experiences that are typically for consu Most restricted value is 0. - + The following list shows the supported values: @@ -824,7 +824,7 @@ The following list shows the supported values: **Experience/AllowWindowsSpotlight** - + @@ -846,8 +846,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -855,8 +855,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only available for Windows 10 Enterprise and Windows 10 Education. @@ -865,7 +865,7 @@ Specifies whether to turn off all Windows spotlight features at once. If you ena Most restricted value is 0. - + The following list shows the supported values: @@ -880,7 +880,7 @@ The following list shows the supported values: **Experience/AllowWindowsSpotlightOnActionCenter** - + @@ -902,8 +902,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -911,8 +911,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -920,7 +920,7 @@ Added in Windows 10, version 1703. This policy allows administrators to prevent Most restricted value is 0. - + The following list shows the supported values: @@ -935,7 +935,7 @@ The following list shows the supported values: **Experience/AllowWindowsSpotlightWindowsWelcomeExperience** - + @@ -957,8 +957,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -966,8 +966,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -976,7 +976,7 @@ The Windows welcome experience feature introduces onboard users to Windows; for Most restricted value is 0. - + The following list shows the supported values: @@ -991,7 +991,7 @@ The following list shows the supported values: **Experience/AllowWindowsTips** - + @@ -1013,8 +1013,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1022,11 +1022,11 @@ The following list shows the supported values:
            - - + + Enables or disables Windows Tips / soft landing. - + The following list shows the supported values: @@ -1041,7 +1041,7 @@ The following list shows the supported values: **Experience/ConfigureWindowsSpotlightOnLockScreen** - + @@ -1063,8 +1063,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1072,8 +1072,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only available for Windows 10 Enterprise and Windows 10 Education. @@ -1086,7 +1086,7 @@ The following list shows the supported values: - 1 (default) – Windows spotlight enabled. - 2 – placeholder only for future extension. Using this value has no effect. - +
            @@ -1094,7 +1094,7 @@ The following list shows the supported values: **Experience/DoNotShowFeedbackNotifications** - + @@ -1116,8 +1116,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1125,8 +1125,8 @@ The following list shows the supported values:
            - - + + Prevents devices from showing feedback questions from Microsoft. If you enable this policy setting, users will no longer see feedback notifications through the Feedback hub app. If you disable or do not configure this policy setting, users may see notifications through the Feedback hub app asking users for feedback. @@ -1138,7 +1138,7 @@ The following list shows the supported values: - 0 (default) – Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. - 1 – Feedback notifications are disabled. - +
            diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index c5da5ddb2d..ba0ff86d79 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **ExploitGuard/ExploitProtectionSettings** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + Enables the IT admin to push out a configuration representing the desired system and application mitigation options to all the devices in the organization. The configuration is represented by an XML. For more information Exploit Protection, see [Protect devices from exploits with Windows Defender Exploit Guard](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/exploit-protection-exploit-guard) and [Import, export, and deploy Exploit Protection configurations](https://docs.microsoft.com/en-us/windows/threat-protection/windows-defender-exploit-guard/import-export-exploit-protection-emet-xml). The system settings require a reboot; the application settings do not require a reboot. @@ -92,7 +92,7 @@ Here is an example: ``` - +
            diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index d0db2bf70f..51f293f7b8 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Games/AllowAdvancedGamingServices** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,11 +61,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. Specifies whether advanced gaming services can be used. These services may send data to Microsoft or publishers of games that use these services. Value type is integer. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 98cb777d45..15016063fb 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Handwriting/PanelDefaultModeDocked** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10. version 1709. This policy allows an enterprise to configure the default mode for the handwriting panel. The handwriting panel has 2 modes - floats near the text box, or docked to the bottom of the screen. The default configuration to is floating near text box. If you want the panel to be fixed or docked, use this policy to fix it to the bottom of the screen. @@ -71,7 +71,7 @@ In floating mode, the content is hidden behind a flying-in panel and results in The docked mode is especially useful in Kiosk mode where you do not expect the end-user to drag the flying-in panel out of the way. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index 8eb6808dbe..2b29a32684 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -756,7 +756,7 @@ ms.date: 01/29/2018 **InternetExplorer/AddSearchProvider** - + @@ -778,8 +778,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -788,15 +788,15 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to add a specific list of search providers to the user's default list of search providers. Normally, search providers can be added from third-party toolbars or in Setup. The user can also add a search provider from the provider's website. If you enable this policy setting, the user can add and remove search providers, but only from the set of search providers specified in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Note: This list can be created from a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. If you disable or do not configure this policy setting, the user can configure their list of search providers unless another policy setting restricts such configuration. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -804,14 +804,14 @@ If you disable or do not configure this policy setting, the user can configure t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Add a specific list of search providers to the user's list of search providers* - GP name: *AddSearchProvider* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -819,7 +819,7 @@ ADMX Info: **InternetExplorer/AllowActiveXFiltering** - + @@ -841,8 +841,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -851,15 +851,15 @@ ADMX Info:
            - - + + This policy setting controls the ActiveX Filtering feature for websites that are running ActiveX controls. The user can choose to turn off ActiveX Filtering for specific websites so that ActiveX controls can run properly. If you enable this policy setting, ActiveX Filtering is enabled by default for the user. The user cannot turn off ActiveX Filtering, although they may add per-site exceptions. If you disable or do not configure this policy setting, ActiveX Filtering is not enabled by default for the user. The user can turn ActiveX Filtering on or off. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -867,14 +867,14 @@ If you disable or do not configure this policy setting, ActiveX Filtering is not > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on ActiveX Filtering* - GP name: *TurnOnActiveXFiltering* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -882,7 +882,7 @@ ADMX Info: **InternetExplorer/AllowAddOnList** - + @@ -904,8 +904,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -914,8 +914,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage a list of add-ons to be allowed or denied by Internet Explorer. Add-ons in this case are controls like ActiveX Controls, Toolbars, and Browser Helper Objects (BHOs) which are specifically written to extend or enhance the functionality of the browser or web pages. This list can be used with the 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting, which defines whether add-ons not listed here are assumed to be denied. @@ -928,7 +928,7 @@ Value - A number indicating whether Internet Explorer should deny or allow the a If you disable this policy setting, the list is deleted. The 'Deny all add-ons unless specifically allowed in the Add-on List' policy setting will still determine whether add-ons not in this list are assumed to be denied. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -936,14 +936,14 @@ If you disable this policy setting, the list is deleted. The 'Deny all add-ons u > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Add-on List* - GP name: *AddonManagement_AddOnList* - GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* - GP ADMX file name: *inetres.admx* - +
            @@ -951,7 +951,7 @@ ADMX Info: **InternetExplorer/AllowAutoComplete** - + @@ -973,8 +973,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -982,10 +982,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -993,14 +993,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on the auto-complete feature for user names and passwords on forms* - GP name: *RestrictFormSuggestPW* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -1008,7 +1008,7 @@ ADMX Info: **InternetExplorer/AllowCertificateAddressMismatchWarning** - + @@ -1030,8 +1030,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1040,10 +1040,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1051,14 +1051,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on certificate address mismatch warning* - GP name: *IZ_PolicyWarnCertMismatch* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1066,7 +1066,7 @@ ADMX Info: **InternetExplorer/AllowDeletingBrowsingHistoryOnExit** - + @@ -1088,8 +1088,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1098,10 +1098,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1109,14 +1109,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow deleting browsing history on exit* - GP name: *DBHDisableDeleteOnExit* - GP path: *Windows Components/Internet Explorer/Delete Browsing History* - GP ADMX file name: *inetres.admx* - +
            @@ -1124,7 +1124,7 @@ ADMX Info: **InternetExplorer/AllowEnhancedProtectedMode** - + @@ -1146,8 +1146,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1156,8 +1156,8 @@ ADMX Info:
            - - + + Enhanced Protected Mode provides additional protection against malicious websites by using 64-bit processes on 64-bit versions of Windows. For computers running at least Windows 8, Enhanced Protected Mode also limits the locations Internet Explorer can read from in the registry and the file system. If you enable this policy setting, Enhanced Protected Mode will be turned on. Any zone that has Protected Mode enabled will use Enhanced Protected Mode. Users will not be able to disable Enhanced Protected Mode. @@ -1166,7 +1166,7 @@ If you disable this policy setting, Enhanced Protected Mode will be turned off. If you do not configure this policy, users will be able to turn on or turn off Enhanced Protected Mode on the Advanced tab of the Internet Options dialog. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1174,14 +1174,14 @@ If you do not configure this policy, users will be able to turn on or turn off E > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Enhanced Protected Mode* - GP name: *Advanced_EnableEnhancedProtectedMode* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1189,7 +1189,7 @@ ADMX Info: **InternetExplorer/AllowEnterpriseModeFromToolsMenu** - + @@ -1211,8 +1211,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1221,15 +1221,15 @@ ADMX Info:
            - - + + This policy setting lets you decide whether users can turn on Enterprise Mode for websites with compatibility issues. Optionally, this policy also lets you specify where to get reports (through post messages) about the websites for which users turn on Enterprise Mode using the Tools menu. If you turn this setting on, users can see and use the Enterprise Mode option from the Tools menu. If you turn this setting on, but don't specify a report location, Enterprise Mode will still be available to your users, but you won't get any reports. If you disable or don't configure this policy setting, the menu option won't appear and users won't be able to run websites in Enterprise Mode. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1237,14 +1237,14 @@ If you disable or don't configure this policy setting, the menu option won't app > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Let users turn on and use Enterprise Mode from the Tools menu* - GP name: *EnterpriseModeEnable* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -1252,7 +1252,7 @@ ADMX Info: **InternetExplorer/AllowEnterpriseModeSiteList** - + @@ -1274,8 +1274,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1284,15 +1284,15 @@ ADMX Info:
            - - + + This policy setting lets you specify where to find the list of websites you want opened using Enterprise Mode IE, instead of Standard mode, because of compatibility issues. Users can't edit this list. If you enable this policy setting, Internet Explorer downloads the website list from your location (HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\Main\EnterpriseMode), opening all listed websites using Enterprise Mode IE. If you disable or don't configure this policy setting, Internet Explorer opens all websites using Standards mode. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1300,14 +1300,14 @@ If you disable or don't configure this policy setting, Internet Explorer opens a > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Use the Enterprise Mode IE website list* - GP name: *EnterpriseModeSiteList* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -1315,7 +1315,7 @@ ADMX Info: **InternetExplorer/AllowFallbackToSSL3** - + @@ -1337,8 +1337,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1346,10 +1346,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1357,14 +1357,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow fallback to SSL 3.0 (Internet Explorer)* - GP name: *Advanced_EnableSSL3Fallback* - GP path: *Windows Components/Internet Explorer/Security Features* - GP ADMX file name: *inetres.admx* - +
            @@ -1372,7 +1372,7 @@ ADMX Info: **InternetExplorer/AllowInternetExplorer7PolicyList** - + @@ -1394,8 +1394,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1404,15 +1404,15 @@ ADMX Info:
            - - + + This policy setting allows you to add specific sites that must be viewed in Internet Explorer 7 Compatibility View. If you enable this policy setting, the user can add and remove sites from the list, but the user cannot remove the entries that you specify. If you disable or do not configure this policy setting, the user can add and remove sites from the list. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1420,14 +1420,14 @@ If you disable or do not configure this policy setting, the user can add and rem > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Use Policy List of Internet Explorer 7 sites* - GP name: *CompatView_UsePolicyList* - GP path: *Windows Components/Internet Explorer/Compatibility View* - GP ADMX file name: *inetres.admx* - +
            @@ -1435,7 +1435,7 @@ ADMX Info: **InternetExplorer/AllowInternetExplorerStandardsMode** - + @@ -1457,8 +1457,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1467,8 +1467,8 @@ ADMX Info:
            - - + + This policy setting controls how Internet Explorer displays local intranet content. Intranet content is defined as any webpage that belongs to the local intranet security zone. If you enable this policy setting, Internet Explorer uses the current user agent string for local intranet content. Additionally, all local intranet Standards Mode pages appear in the Standards Mode available with the latest version of Internet Explorer. The user cannot change this behavior through the Compatibility View Settings dialog box. @@ -1477,7 +1477,7 @@ If you disable this policy setting, Internet Explorer uses an Internet Explorer If you do not configure this policy setting, Internet Explorer uses an Internet Explorer 7 user agent string (with an additional string appended) for local intranet content. Additionally, all local intranet Standards Mode pages appear in Internet Explorer 7 Standards Mode. This option results in the greatest compatibility with existing webpages, but newer content written to common Internet standards may be displayed incorrectly. This option matches the default behavior of Internet Explorer. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1485,14 +1485,14 @@ If you do not configure this policy setting, Internet Explorer uses an Internet > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Internet Explorer Standards Mode for local intranet* - GP name: *CompatView_IntranetSites* - GP path: *Windows Components/Internet Explorer/Compatibility View* - GP ADMX file name: *inetres.admx* - +
            @@ -1500,7 +1500,7 @@ ADMX Info: **InternetExplorer/AllowInternetZoneTemplate** - + @@ -1522,8 +1522,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1532,8 +1532,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1546,7 +1546,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1554,14 +1554,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Internet Zone Template* - GP name: *IZ_PolicyInternetZoneTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1569,7 +1569,7 @@ ADMX Info: **InternetExplorer/AllowIntranetZoneTemplate** - + @@ -1591,8 +1591,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1601,8 +1601,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1615,7 +1615,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1623,14 +1623,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Intranet Zone Template* - GP name: *IZ_PolicyIntranetZoneTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1638,7 +1638,7 @@ ADMX Info: **InternetExplorer/AllowLocalMachineZoneTemplate** - + @@ -1660,8 +1660,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1670,8 +1670,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1684,7 +1684,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1692,14 +1692,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Local Machine Zone Template* - GP name: *IZ_PolicyLocalMachineZoneTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1707,7 +1707,7 @@ ADMX Info: **InternetExplorer/AllowLockedDownInternetZoneTemplate** - + @@ -1729,8 +1729,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1739,8 +1739,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1753,7 +1753,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1761,14 +1761,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Locked-Down Internet Zone Template* - GP name: *IZ_PolicyInternetZoneLockdownTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1776,7 +1776,7 @@ ADMX Info: **InternetExplorer/AllowLockedDownIntranetZoneTemplate** - + @@ -1798,8 +1798,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1808,8 +1808,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1822,7 +1822,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1830,14 +1830,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Locked-Down Intranet Zone Template* - GP name: *IZ_PolicyIntranetZoneLockdownTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1845,7 +1845,7 @@ ADMX Info: **InternetExplorer/AllowLockedDownLocalMachineZoneTemplate** - + @@ -1867,8 +1867,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1877,8 +1877,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1891,7 +1891,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1899,14 +1899,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Locked-Down Local Machine Zone Template* - GP name: *IZ_PolicyLocalMachineZoneLockdownTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1914,7 +1914,7 @@ ADMX Info: **InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate** - + @@ -1936,8 +1936,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1946,8 +1946,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -1960,7 +1960,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -1968,14 +1968,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Locked-Down Restricted Sites Zone Template* - GP name: *IZ_PolicyRestrictedSitesZoneLockdownTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -1983,7 +1983,7 @@ ADMX Info: **InternetExplorer/AllowOneWordEntry** - + @@ -2005,8 +2005,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2015,15 +2015,15 @@ ADMX Info:
            - - + + This policy allows the user to go directly to an intranet site for a one-word entry in the Address bar. If you enable this policy setting, Internet Explorer goes directly to an intranet site for a one-word entry in the Address bar, if it is available. If you disable or do not configure this policy setting, Internet Explorer does not go directly to an intranet site for a one-word entry in the Address bar. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2031,14 +2031,14 @@ If you disable or do not configure this policy setting, Internet Explorer does n > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Go to an intranet site for a one-word entry in the Address bar* - GP name: *UseIntranetSiteForOneWordEntry* - GP path: *Windows Components/Internet Explorer/Internet Settings/Advanced settings/Browsing* - GP ADMX file name: *inetres.admx* - +
            @@ -2046,7 +2046,7 @@ ADMX Info: **InternetExplorer/AllowSiteToZoneAssignmentList** - + @@ -2068,8 +2068,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2078,8 +2078,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage a list of sites that you want to associate with a particular security zone. These zone numbers have associated security settings that apply to all of the sites in the zone. Internet Explorer has 4 security zones, numbered 1-4, and these are used by this policy setting to associate sites to zones. They are: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. Security settings can be set for each of these zones through other policy settings, and their default settings are: Trusted Sites zone (Low template), Intranet zone (Medium-Low template), Internet zone (Medium template), and Restricted Sites zone (High template). (The Local Machine zone and its locked down equivalent have special security settings that protect your local computer.) @@ -2092,7 +2092,7 @@ Value - A number indicating the zone with which this site should be associated f If you disable or do not configure this policy, users may choose their own site-to-zone assignments. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2100,14 +2100,14 @@ If you disable or do not configure this policy, users may choose their own site- > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Site to Zone Assignment List* - GP name: *IZ_Zonemaps* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2115,7 +2115,7 @@ ADMX Info: **InternetExplorer/AllowSoftwareWhenSignatureIsInvalid** - + @@ -2137,8 +2137,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2147,10 +2147,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2158,14 +2158,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow software to run or install even if the signature is invalid* - GP name: *Advanced_InvalidSignatureBlock* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2173,7 +2173,7 @@ ADMX Info: **InternetExplorer/AllowSuggestedSites** - + @@ -2195,8 +2195,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2205,8 +2205,8 @@ ADMX Info:
            - - + + This policy setting controls the Suggested Sites feature, which recommends websites based on the users browsing activity. Suggested Sites reports a users browsing history to Microsoft to suggest sites that the user might want to visit. If you enable this policy setting, the user is not prompted to enable Suggested Sites. The users browsing history is sent to Microsoft to produce suggestions. @@ -2215,7 +2215,7 @@ If you disable this policy setting, the entry points and functionality associate If you do not configure this policy setting, the user can turn on and turn off the Suggested Sites feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2223,14 +2223,14 @@ If you do not configure this policy setting, the user can turn on and turn off t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Suggested Sites* - GP name: *EnableSuggestedSites* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -2238,7 +2238,7 @@ ADMX Info: **InternetExplorer/AllowTrustedSitesZoneTemplate** - + @@ -2260,8 +2260,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2270,8 +2270,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -2284,7 +2284,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2292,14 +2292,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Trusted Sites Zone Template* - GP name: *IZ_PolicyTrustedSitesZoneTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2307,7 +2307,7 @@ ADMX Info: **InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate** - + @@ -2329,8 +2329,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2339,8 +2339,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -2353,7 +2353,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2361,14 +2361,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Locked-Down Trusted Sites Zone Template* - GP name: *IZ_PolicyTrustedSitesZoneLockdownTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2376,7 +2376,7 @@ ADMX Info: **InternetExplorer/AllowsRestrictedSitesZoneTemplate** - + @@ -2398,8 +2398,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2408,8 +2408,8 @@ ADMX Info:
            - - + + This template policy setting allows you to configure policy settings in this zone consistent with a selected security level, for example, Low, Medium Low, Medium, or High. If you enable this template policy setting and select a security level, all values for individual settings in the zone will be overwritten by the standard template defaults. @@ -2422,7 +2422,7 @@ Note. Local Machine Zone Lockdown Security and Network Protocol Lockdown operate Note. It is recommended to configure template policy settings in one Group Policy object (GPO) and configure any related individual policy settings in a separate GPO. You can then use Group Policy management features (for example, precedence, inheritance, or enforce) to apply individual settings to specific targets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2430,14 +2430,14 @@ Note. It is recommended to configure template policy settings in one Group Polic > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Restricted Sites Zone Template* - GP name: *IZ_PolicyRestrictedSitesZoneTemplate* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2445,7 +2445,7 @@ ADMX Info: **InternetExplorer/CheckServerCertificateRevocation** - + @@ -2467,8 +2467,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2477,10 +2477,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2488,14 +2488,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Check for server certificate revocation* - GP name: *Advanced_CertificateRevocation* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2503,7 +2503,7 @@ ADMX Info: **InternetExplorer/CheckSignaturesOnDownloadedPrograms** - + @@ -2525,8 +2525,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2535,10 +2535,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2546,14 +2546,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Check for signatures on downloaded programs* - GP name: *Advanced_DownloadSignatures* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -2561,7 +2561,7 @@ ADMX Info: **InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses** - + @@ -2583,8 +2583,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2593,10 +2593,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2604,14 +2604,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Internet Explorer Processes* - GP name: *IESF_PolicyExplorerProcesses_2* - GP path: *Windows Components/Internet Explorer/Security Features/Binary Behavior Security Restriction* - GP ADMX file name: *inetres.admx* - +
            @@ -2619,7 +2619,7 @@ ADMX Info: **InternetExplorer/DisableAdobeFlash** - + @@ -2641,8 +2641,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2651,8 +2651,8 @@ ADMX Info:
            - - + + This policy setting turns off Adobe Flash in Internet Explorer and prevents applications from using Internet Explorer technology to instantiate Flash objects. If you enable this policy setting, Flash is turned off for Internet Explorer, and applications cannot use Internet Explorer technology to instantiate Flash objects. In the Manage Add-ons dialog box, the Flash status will be 'Disabled', and users cannot enable Flash. If you enable this policy setting, Internet Explorer will ignore settings made for Adobe Flash through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings. @@ -2661,7 +2661,7 @@ If you disable, or do not configure this policy setting, Flash is turned on for Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings, even if this policy setting is disabled, or not configured. However, if Adobe Flash is disabled through the "Add-on List" and "Deny all add-ons unless specifically allowed in the Add-on List" policy settings and not through this policy setting, all applications that use Internet Explorer technology to instantiate Flash object can still do so. For more information, see "Group Policy Settings in Internet Explorer 10" in the Internet Explorer TechNet library. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2669,14 +2669,14 @@ Note that Adobe Flash can still be disabled through the "Add-on List" and "Deny > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off Adobe Flash in Internet Explorer and prevent applications from using Internet Explorer technology to instantiate Flash objects* - GP name: *DisableFlashInIE* - GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* - GP ADMX file name: *inetres.admx* - +
            @@ -2684,7 +2684,7 @@ ADMX Info: **InternetExplorer/DisableBypassOfSmartScreenWarnings** - + @@ -2706,8 +2706,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2716,15 +2716,15 @@ ADMX Info:
            - - + + This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter prevents the user from browsing to or downloading from sites that are known to host malicious content. SmartScreen Filter also prevents the execution of files that are known to be malicious. If you enable this policy setting, SmartScreen Filter warnings block the user. If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2732,14 +2732,14 @@ If you disable or do not configure this policy setting, the user can bypass Smar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent bypassing SmartScreen Filter warnings* - GP name: *DisableSafetyFilterOverride* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -2747,7 +2747,7 @@ ADMX Info: **InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles** - + @@ -2769,8 +2769,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2779,15 +2779,15 @@ ADMX Info:
            - - + + This policy setting determines whether the user can bypass warnings from SmartScreen Filter. SmartScreen Filter warns the user about executable files that Internet Explorer users do not commonly download from the Internet. If you enable this policy setting, SmartScreen Filter warnings block the user. If you disable or do not configure this policy setting, the user can bypass SmartScreen Filter warnings. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2795,14 +2795,14 @@ If you disable or do not configure this policy setting, the user can bypass Smar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent bypassing SmartScreen Filter warnings about files that are not commonly downloaded from the Internet* - GP name: *DisableSafetyFilterOverrideForAppRepUnknown* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -2810,7 +2810,7 @@ ADMX Info: **InternetExplorer/DisableConfiguringHistory** - + @@ -2832,8 +2832,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2842,10 +2842,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2853,14 +2853,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disable "Configuring History"* - GP name: *RestrictHistory* - GP path: *Windows Components/Internet Explorer/Delete Browsing History* - GP ADMX file name: *inetres.admx* - +
            @@ -2868,7 +2868,7 @@ ADMX Info: **InternetExplorer/DisableCrashDetection** - + @@ -2890,8 +2890,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2900,10 +2900,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2911,14 +2911,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off Crash Detection* - GP name: *AddonManagement_RestrictCrashDetection* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -2926,7 +2926,7 @@ ADMX Info: **InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation** - + @@ -2948,8 +2948,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2958,8 +2958,8 @@ ADMX Info:
            - - + + This policy setting prevents the user from participating in the Customer Experience Improvement Program (CEIP). If you enable this policy setting, the user cannot participate in the CEIP, and the Customer Feedback Options command does not appear on the Help menu. @@ -2968,7 +2968,7 @@ If you disable this policy setting, the user must participate in the CEIP, and t If you do not configure this policy setting, the user can choose to participate in the CEIP. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -2976,14 +2976,14 @@ If you do not configure this policy setting, the user can choose to participate > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent participation in the Customer Experience Improvement Program* - GP name: *SQM_DisableCEIP* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -2991,7 +2991,7 @@ ADMX Info: **InternetExplorer/DisableDeletingUserVisitedWebsites** - + @@ -3013,8 +3013,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3023,10 +3023,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3034,14 +3034,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent deleting websites that the user has visited* - GP name: *DBHDisableDeleteHistory* - GP path: *Windows Components/Internet Explorer/Delete Browsing History* - GP ADMX file name: *inetres.admx* - +
            @@ -3049,7 +3049,7 @@ ADMX Info: **InternetExplorer/DisableEnclosureDownloading** - + @@ -3071,8 +3071,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3081,15 +3081,15 @@ ADMX Info:
            - - + + This policy setting prevents the user from having enclosures (file attachments) downloaded from a feed to the user's computer. If you enable this policy setting, the user cannot set the Feed Sync Engine to download an enclosure through the Feed property page. A developer cannot change the download setting through the Feed APIs. If you disable or do not configure this policy setting, the user can set the Feed Sync Engine to download an enclosure through the Feed property page. A developer can change the download setting through the Feed APIs. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3097,14 +3097,14 @@ If you disable or do not configure this policy setting, the user can set the Fee > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent downloading of enclosures* - GP name: *Disable_Downloading_of_Enclosures* - GP path: *Windows Components/RSS Feeds* - GP ADMX file name: *inetres.admx* - +
            @@ -3112,7 +3112,7 @@ ADMX Info: **InternetExplorer/DisableEncryptionSupport** - + @@ -3134,8 +3134,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3144,8 +3144,8 @@ ADMX Info:
            - - + + This policy setting allows you to turn off support for Transport Layer Security (TLS) 1.0, TLS 1.1, TLS 1.2, Secure Sockets Layer (SSL) 2.0, or SSL 3.0 in the browser. TLS and SSL are protocols that help protect communication between the browser and the target server. When the browser attempts to set up a protected communication with the target server, the browser and server negotiate which protocol and version to use. The browser and server attempt to match each others list of supported protocols and versions, and they select the most preferred match. If you enable this policy setting, the browser negotiates or does not negotiate an encryption tunnel by using the encryption methods that you select from the drop-down list. @@ -3154,7 +3154,7 @@ If you disable or do not configure this policy setting, the user can select whic Note: SSL 2.0 is off by default and is no longer supported starting with Windows 10 Version 1607. SSL 2.0 is an outdated security protocol, and enabling SSL 2.0 impairs the performance and functionality of TLS 1.0. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3162,14 +3162,14 @@ Note: SSL 2.0 is off by default and is no longer supported starting with Windows > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off encryption support* - GP name: *Advanced_SetWinInetProtocols* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -3177,7 +3177,7 @@ ADMX Info: **InternetExplorer/DisableFirstRunWizard** - + @@ -3199,8 +3199,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3209,8 +3209,8 @@ ADMX Info:
            - - + + This policy setting prevents Internet Explorer from running the First Run wizard the first time a user starts the browser after installing Internet Explorer or Windows. If you enable this policy setting, you must make one of the following choices: @@ -3221,7 +3221,7 @@ Starting with Windows 8, the "Welcome to Internet Explorer" webpage is not avail If you disable or do not configure this policy setting, Internet Explorer may run the First Run wizard the first time the browser is started after installation. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3229,14 +3229,14 @@ If you disable or do not configure this policy setting, Internet Explorer may ru > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent running First Run wizard* - GP name: *NoFirstRunCustomise* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3244,7 +3244,7 @@ ADMX Info: **InternetExplorer/DisableFlipAheadFeature** - + @@ -3266,8 +3266,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3276,8 +3276,8 @@ ADMX Info:
            - - + + This policy setting determines whether a user can swipe across a screen or click Forward to go to the next pre-loaded page of a website. Microsoft collects your browsing history to improve how flip ahead with page prediction works. This feature isn't available for Internet Explorer for the desktop. @@ -3288,7 +3288,7 @@ If you disable this policy setting, flip ahead with page prediction is turned on If you don't configure this setting, users can turn this behavior on or off, using the Settings charm. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3296,14 +3296,14 @@ If you don't configure this setting, users can turn this behavior on or off, usi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off the flip ahead with page prediction feature* - GP name: *Advanced_DisableFlipAhead* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -3311,7 +3311,7 @@ ADMX Info: **InternetExplorer/DisableHomePageChange** - + @@ -3333,8 +3333,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3342,15 +3342,15 @@ ADMX Info:
            - - + + The Home page specified on the General tab of the Internet Options dialog box is the default Web page that Internet Explorer loads whenever it is run. If you enable this policy setting, a user cannot set a custom default home page. You must specify which default home page should load on the user machine. For machines with at least Internet Explorer 7, the home page can be set within this policy to override other home page policies. If you disable or do not configure this policy setting, the Home page box is enabled and users can choose their own home page. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3358,14 +3358,14 @@ If you disable or do not configure this policy setting, the Home page box is ena > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disable changing home page settings* - GP name: *RestrictHomePage* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3373,7 +3373,7 @@ ADMX Info: **InternetExplorer/DisableIgnoringCertificateErrors** - + @@ -3395,8 +3395,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3405,10 +3405,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3416,14 +3416,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent ignoring certificate errors* - GP name: *NoCertError* - GP path: *Windows Components/Internet Explorer/Internet Control Panel* - GP ADMX file name: *inetres.admx* - +
            @@ -3431,7 +3431,7 @@ ADMX Info: **InternetExplorer/DisableInPrivateBrowsing** - + @@ -3453,8 +3453,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3463,10 +3463,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3474,14 +3474,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off InPrivate Browsing* - GP name: *DisableInPrivateBrowsing* - GP path: *Windows Components/Internet Explorer/Privacy* - GP ADMX file name: *inetres.admx* - +
            @@ -3489,7 +3489,7 @@ ADMX Info: **InternetExplorer/DisableProcessesInEnhancedProtectedMode** - + @@ -3511,8 +3511,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3521,10 +3521,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3532,14 +3532,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on 64-bit tab processes when running in Enhanced Protected Mode on 64-bit versions of Windows* - GP name: *Advanced_EnableEnhancedProtectedMode64Bit* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -3547,7 +3547,7 @@ ADMX Info: **InternetExplorer/DisableProxyChange** - + @@ -3569,8 +3569,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3579,15 +3579,15 @@ ADMX Info:
            - - + + This policy setting specifies if a user can change proxy settings. If you enable this policy setting, the user will not be able to configure proxy settings. If you disable or do not configure this policy setting, the user can configure proxy settings. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3595,14 +3595,14 @@ If you disable or do not configure this policy setting, the user can configure p > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent changing proxy settings* - GP name: *RestrictProxy* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3610,7 +3610,7 @@ ADMX Info: **InternetExplorer/DisableSearchProviderChange** - + @@ -3632,8 +3632,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3642,15 +3642,15 @@ ADMX Info:
            - - + + This policy setting prevents the user from changing the default search provider for the Address bar and the toolbar Search box. If you enable this policy setting, the user cannot change the default search provider. If you disable or do not configure this policy setting, the user can change the default search provider. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3658,14 +3658,14 @@ If you disable or do not configure this policy setting, the user can change the > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent changing the default search provider* - GP name: *NoSearchProvider* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3673,7 +3673,7 @@ ADMX Info: **InternetExplorer/DisableSecondaryHomePageChange** - + @@ -3695,8 +3695,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3705,8 +3705,8 @@ ADMX Info:
            - - + + Secondary home pages are the default Web pages that Internet Explorer loads in separate tabs from the home page whenever the browser is run. This policy setting allows you to set default secondary home pages. If you enable this policy setting, you can specify which default home pages should load as secondary home pages. The user cannot set custom default secondary home pages. @@ -3715,7 +3715,7 @@ If you disable or do not configure this policy setting, the user can add seconda Note: If the Disable Changing Home Page Settings policy is enabled, the user cannot add secondary home pages. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3723,14 +3723,14 @@ Note: If the Disable Changing Home Page Settings policy is enabled, the user can > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disable changing secondary home page settings* - GP name: *SecondaryHomePages* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3738,7 +3738,7 @@ ADMX Info: **InternetExplorer/DisableSecuritySettingsCheck** - + @@ -3760,8 +3760,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3770,10 +3770,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3781,14 +3781,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off the Security Settings Check feature* - GP name: *Disable_Security_Settings_Check* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3796,7 +3796,7 @@ ADMX Info: **InternetExplorer/DisableUpdateCheck** - + @@ -3818,8 +3818,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3827,8 +3827,8 @@ ADMX Info:
            - - + + Prevents Internet Explorer from checking whether a new version of the browser is available. If you enable this policy, it prevents Internet Explorer from checking to see whether it is the latest available browser version and notifying users if a new version is available. @@ -3837,7 +3837,7 @@ If you disable this policy or do not configure it, Internet Explorer checks ever This policy is intended to help the administrator maintain version control for Internet Explorer by preventing users from being notified about new versions of the browser. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3845,14 +3845,14 @@ This policy is intended to help the administrator maintain version control for I > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disable Periodic Check for Internet Explorer software updates* - GP name: *NoUpdateCheck* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3860,7 +3860,7 @@ ADMX Info: **InternetExplorer/DoNotAllowActiveXControlsInProtectedMode** - + @@ -3882,8 +3882,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3892,10 +3892,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3903,14 +3903,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not allow ActiveX controls to run in Protected Mode when Enhanced Protected Mode is enabled* - GP name: *Advanced_DisableEPMCompat* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Advanced Page* - GP ADMX file name: *inetres.admx* - +
            @@ -3918,7 +3918,7 @@ ADMX Info: **InternetExplorer/DoNotAllowUsersToAddSites** - + @@ -3940,8 +3940,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3949,8 +3949,8 @@ ADMX Info:
            - - + + Prevents users from adding or removing sites from security zones. A security zone is a group of Web sites with the same security level. If you enable this policy, the site management settings for security zones are disabled. (To see the site management settings for security zones, in the Internet Options dialog box, click the Security tab, and then click the Sites button.) @@ -3963,7 +3963,7 @@ Note: The "Disable the Security page" policy (located in \User Configuration\Ad Also, see the "Security zones: Use only machine settings" policy. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -3971,14 +3971,14 @@ Also, see the "Security zones: Use only machine settings" policy. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Security Zones: Do not allow users to add/delete sites* - GP name: *Security_zones_map_edit* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -3986,7 +3986,7 @@ ADMX Info: **InternetExplorer/DoNotAllowUsersToChangePolicies** - + @@ -4008,8 +4008,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4017,8 +4017,8 @@ ADMX Info:
            - - + + Prevents users from changing security zone settings. A security zone is a group of Web sites with the same security level. If you enable this policy, the Custom Level button and security-level slider on the Security tab in the Internet Options dialog box are disabled. @@ -4031,7 +4031,7 @@ Note: The "Disable the Security page" policy (located in \User Configuration\Adm Also, see the "Security zones: Use only machine settings" policy. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4039,14 +4039,14 @@ Also, see the "Security zones: Use only machine settings" policy. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Security Zones: Do not allow users to change policies* - GP name: *Security_options_edit* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -4054,7 +4054,7 @@ ADMX Info: **InternetExplorer/DoNotBlockOutdatedActiveXControls** - + @@ -4076,8 +4076,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4086,8 +4086,8 @@ ADMX Info:
            - - + + This policy setting determines whether Internet Explorer blocks specific outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. If you enable this policy setting, Internet Explorer stops blocking outdated ActiveX controls. @@ -4096,7 +4096,7 @@ If you disable or don't configure this policy setting, Internet Explorer continu For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4104,14 +4104,14 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer* - GP name: *VerMgmtDisable* - GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* - GP ADMX file name: *inetres.admx* - +
            @@ -4119,7 +4119,7 @@ ADMX Info: **InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains** - + @@ -4141,8 +4141,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4151,8 +4151,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage a list of domains on which Internet Explorer will stop blocking outdated ActiveX controls. Outdated ActiveX controls are never blocked in the Intranet Zone. If you enable this policy setting, you can enter a custom list of domains for which outdated ActiveX controls won't be blocked in Internet Explorer. Each domain entry must be formatted like one of the following: @@ -4165,7 +4165,7 @@ If you disable or don't configure this policy setting, the list is deleted and I For more information, see "Outdated ActiveX Controls" in the Internet Explorer TechNet library. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4173,14 +4173,14 @@ For more information, see "Outdated ActiveX Controls" in the Internet Explorer T > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off blocking of outdated ActiveX controls for Internet Explorer on specific domains* - GP name: *VerMgmtDomainAllowlist* - GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* - GP ADMX file name: *inetres.admx* - +
            @@ -4188,7 +4188,7 @@ ADMX Info: **InternetExplorer/IncludeAllLocalSites** - + @@ -4210,8 +4210,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4220,8 +4220,8 @@ ADMX Info:
            - - + + This policy setting controls whether local sites which are not explicitly mapped into any Security Zone are forced into the local Intranet security zone. If you enable this policy setting, local sites which are not explicitly mapped into a zone are considered to be in the Intranet Zone. @@ -4230,7 +4230,7 @@ If you disable this policy setting, local sites which are not explicitly mapped If you do not configure this policy setting, users choose whether to force local sites into the Intranet Zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4238,14 +4238,14 @@ If you do not configure this policy setting, users choose whether to force local > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Intranet Sites: Include all local (intranet) sites not listed in other zones* - GP name: *IZ_IncludeUnspecifiedLocalSites* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -4253,7 +4253,7 @@ ADMX Info: **InternetExplorer/IncludeAllNetworkPaths** - + @@ -4275,8 +4275,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4285,8 +4285,8 @@ ADMX Info:
            - - + + This policy setting controls whether URLs representing UNCs are mapped into the local Intranet security zone. If you enable this policy setting, all network paths are mapped into the Intranet Zone. @@ -4295,7 +4295,7 @@ If you disable this policy setting, network paths are not necessarily mapped int If you do not configure this policy setting, users choose whether network paths are mapped into the Intranet Zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4303,14 +4303,14 @@ If you do not configure this policy setting, users choose whether network paths > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Intranet Sites: Include all network paths (UNCs)* - GP name: *IZ_UNCAsIntranet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page* - GP ADMX file name: *inetres.admx* - +
            @@ -4318,7 +4318,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowAccessToDataSources** - + @@ -4340,8 +4340,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4350,8 +4350,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -4360,7 +4360,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4368,14 +4368,14 @@ If you do not configure this policy setting, users cannot load a page in the zon > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4383,7 +4383,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls** - + @@ -4405,8 +4405,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4415,8 +4415,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -4425,7 +4425,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4433,14 +4433,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4448,7 +4448,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads** - + @@ -4470,8 +4470,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4480,15 +4480,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4496,14 +4496,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4511,7 +4511,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowCopyPasteViaScript** - + @@ -4533,8 +4533,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4543,10 +4543,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4554,14 +4554,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow cut, copy or paste operations from the clipboard via script* - GP name: *IZ_PolicyAllowPasteViaScript_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4569,7 +4569,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles** - + @@ -4591,8 +4591,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4601,10 +4601,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4612,14 +4612,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow drag and drop or copy and paste files* - GP name: *IZ_PolicyDropOrPasteFiles_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4627,7 +4627,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowFontDownloads** - + @@ -4649,8 +4649,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4659,8 +4659,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -4669,7 +4669,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4677,14 +4677,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4692,7 +4692,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowLessPrivilegedSites** - + @@ -4714,8 +4714,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4724,8 +4724,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -4734,7 +4734,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4742,14 +4742,14 @@ If you do not configure this policy setting, Web sites from less privileged zone > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4757,7 +4757,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowLoadingOfXAMLFiles** - + @@ -4779,8 +4779,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4789,10 +4789,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4800,14 +4800,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow loading of XAML files* - GP name: *IZ_Policy_XAML_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4815,7 +4815,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents** - + @@ -4837,8 +4837,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4847,8 +4847,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -4857,7 +4857,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4865,14 +4865,14 @@ If you do not configure this policy setting, Internet Explorer will execute unsi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4880,7 +4880,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls** - + @@ -4902,8 +4902,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4912,10 +4912,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4923,14 +4923,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow only approved domains to use ActiveX controls without prompt* - GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Internet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4938,7 +4938,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** - + @@ -4960,8 +4960,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -4970,10 +4970,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -4981,14 +4981,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow only approved domains to use the TDC ActiveX control* - GP name: *IZ_PolicyAllowTDCControl_Both_Internet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -4996,7 +4996,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowScriptInitiatedWindows** - + @@ -5018,8 +5018,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5028,10 +5028,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5039,14 +5039,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow script-initiated windows without size or position constraints* - GP name: *IZ_PolicyWindowsRestrictionsURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5054,7 +5054,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls** - + @@ -5076,8 +5076,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5086,10 +5086,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5097,14 +5097,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scripting of Internet Explorer WebBrowser controls* - GP name: *IZ_Policy_WebBrowserControl_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5112,7 +5112,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowScriptlets** - + @@ -5134,8 +5134,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5144,8 +5144,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -5154,7 +5154,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5162,14 +5162,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5177,7 +5177,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowSmartScreenIE** - + @@ -5199,8 +5199,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5209,8 +5209,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -5221,7 +5221,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5229,14 +5229,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5244,7 +5244,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript** - + @@ -5266,8 +5266,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5276,10 +5276,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5287,14 +5287,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow updates to status bar via script* - GP name: *IZ_Policy_ScriptStatusBar_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5302,7 +5302,7 @@ ADMX Info: **InternetExplorer/InternetZoneAllowUserDataPersistence** - + @@ -5324,8 +5324,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5334,8 +5334,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -5344,7 +5344,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5352,14 +5352,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5367,7 +5367,7 @@ ADMX Info: **InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls** - + @@ -5389,8 +5389,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5399,10 +5399,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5410,14 +5410,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Don't run antimalware programs against ActiveX controls* - GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5425,7 +5425,7 @@ ADMX Info: **InternetExplorer/InternetZoneDownloadSignedActiveXControls** - + @@ -5447,8 +5447,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5457,10 +5457,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5468,14 +5468,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Download signed ActiveX controls* - GP name: *IZ_PolicyDownloadSignedActiveX_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5483,7 +5483,7 @@ ADMX Info: **InternetExplorer/InternetZoneDownloadUnsignedActiveXControls** - + @@ -5505,8 +5505,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5515,10 +5515,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5526,14 +5526,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Download unsigned ActiveX controls* - GP name: *IZ_PolicyDownloadUnsignedActiveX_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5541,7 +5541,7 @@ ADMX Info: **InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter** - + @@ -5563,8 +5563,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5573,10 +5573,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5584,14 +5584,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Cross-Site Scripting Filter* - GP name: *IZ_PolicyTurnOnXSSFilter_Both_Internet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5599,7 +5599,7 @@ ADMX Info: **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** - + @@ -5621,8 +5621,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5631,10 +5631,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5642,14 +5642,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable dragging of content from different domains across windows* - GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Internet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5657,7 +5657,7 @@ ADMX Info: **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** - + @@ -5679,8 +5679,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5689,10 +5689,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5700,14 +5700,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable dragging of content from different domains within a window* - GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Internet* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5715,7 +5715,7 @@ ADMX Info: **InternetExplorer/InternetZoneEnableMIMESniffing** - + @@ -5737,8 +5737,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5747,10 +5747,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5758,14 +5758,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable MIME Sniffing* - GP name: *IZ_PolicyMimeSniffingURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5773,7 +5773,7 @@ ADMX Info: **InternetExplorer/InternetZoneEnableProtectedMode** - + @@ -5795,8 +5795,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5805,10 +5805,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5816,14 +5816,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Protected Mode* - GP name: *IZ_Policy_TurnOnProtectedMode_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5831,7 +5831,7 @@ ADMX Info: **InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer** - + @@ -5853,8 +5853,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5863,10 +5863,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5874,14 +5874,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Include local path when user is uploading files to a server* - GP name: *IZ_Policy_LocalPathForUpload_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5889,7 +5889,7 @@ ADMX Info: **InternetExplorer/InternetZoneInitializeAndScriptActiveXControls** - + @@ -5911,8 +5911,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -5921,8 +5921,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -5933,7 +5933,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -5941,14 +5941,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -5956,7 +5956,7 @@ ADMX Info: **InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe** - + @@ -5978,10 +5978,10 @@ ADMX Info:
            Home
            - - + + - +
            @@ -5989,7 +5989,7 @@ ADMX Info: **InternetExplorer/InternetZoneJavaPermissions** - + @@ -6011,8 +6011,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6021,10 +6021,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6032,14 +6032,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6047,7 +6047,7 @@ ADMX Info: **InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME** - + @@ -6069,8 +6069,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6079,10 +6079,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6090,14 +6090,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Launching applications and files in an IFRAME* - GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6105,7 +6105,7 @@ ADMX Info: **InternetExplorer/InternetZoneLogonOptions** - + @@ -6127,8 +6127,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6137,10 +6137,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6148,14 +6148,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Logon options* - GP name: *IZ_PolicyLogon_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6163,7 +6163,7 @@ ADMX Info: **InternetExplorer/InternetZoneNavigateWindowsAndFrames** - + @@ -6185,8 +6185,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6195,8 +6195,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -6205,7 +6205,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6213,14 +6213,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6228,7 +6228,7 @@ ADMX Info: **InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** - + @@ -6250,8 +6250,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6260,10 +6260,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6271,14 +6271,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components signed with Authenticode* - GP name: *IZ_PolicySignedFrameworkComponentsURLaction_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6286,7 +6286,7 @@ ADMX Info: **InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles** - + @@ -6308,8 +6308,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6318,10 +6318,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6329,14 +6329,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Show security warning for potentially unsafe files* - GP name: *IZ_Policy_UnsafeFiles_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6344,7 +6344,7 @@ ADMX Info: **InternetExplorer/InternetZoneUsePopupBlocker** - + @@ -6366,8 +6366,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6376,10 +6376,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6387,14 +6387,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Use Pop-up Blocker* - GP name: *IZ_PolicyBlockPopupWindows_1* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6402,7 +6402,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowAccessToDataSources** - + @@ -6424,8 +6424,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6434,8 +6434,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -6444,7 +6444,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6452,14 +6452,14 @@ If you do not configure this policy setting, users are queried to choose whether > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6467,7 +6467,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls** - + @@ -6489,8 +6489,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6499,8 +6499,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -6509,7 +6509,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6517,14 +6517,14 @@ If you do not configure this policy setting, users will receive a prompt when a > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6532,7 +6532,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads** - + @@ -6554,8 +6554,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6564,15 +6564,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6580,14 +6580,14 @@ If you disable or do not configure this setting, users will receive a file downl > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6595,7 +6595,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowFontDownloads** - + @@ -6617,8 +6617,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6627,8 +6627,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -6637,7 +6637,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6645,14 +6645,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6660,7 +6660,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowLessPrivilegedSites** - + @@ -6682,8 +6682,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6692,8 +6692,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -6702,7 +6702,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6710,14 +6710,14 @@ If you do not configure this policy setting, Web sites from less privileged zone > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6725,7 +6725,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents** - + @@ -6747,8 +6747,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6757,8 +6757,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -6767,7 +6767,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6775,14 +6775,14 @@ If you do not configure this policy setting, Internet Explorer will execute unsi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6790,7 +6790,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowScriptlets** - + @@ -6812,8 +6812,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6822,8 +6822,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -6832,7 +6832,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6840,14 +6840,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6855,7 +6855,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowSmartScreenIE** - + @@ -6877,8 +6877,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6887,8 +6887,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -6899,7 +6899,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6907,14 +6907,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6922,7 +6922,7 @@ ADMX Info: **InternetExplorer/IntranetZoneAllowUserDataPersistence** - + @@ -6944,8 +6944,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -6954,8 +6954,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -6964,7 +6964,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -6972,14 +6972,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -6987,7 +6987,7 @@ ADMX Info: **InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls** - + @@ -7009,8 +7009,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7019,10 +7019,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7030,14 +7030,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Don't run antimalware programs against ActiveX controls* - GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7045,7 +7045,7 @@ ADMX Info: **InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls** - + @@ -7067,8 +7067,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7077,8 +7077,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -7089,7 +7089,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7097,14 +7097,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7112,7 +7112,7 @@ ADMX Info: **InternetExplorer/IntranetZoneJavaPermissions** - + @@ -7134,8 +7134,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7144,10 +7144,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7155,14 +7155,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7170,7 +7170,7 @@ ADMX Info: **InternetExplorer/IntranetZoneNavigateWindowsAndFrames** - + @@ -7192,8 +7192,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7202,8 +7202,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -7212,7 +7212,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7220,14 +7220,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_3* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7235,7 +7235,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowAccessToDataSources** - + @@ -7257,8 +7257,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7267,8 +7267,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -7277,7 +7277,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7285,14 +7285,14 @@ If you do not configure this policy setting, users can load a page in the zone t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7300,7 +7300,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls** - + @@ -7322,8 +7322,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7332,8 +7332,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -7342,7 +7342,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7350,14 +7350,14 @@ If you do not configure this policy setting, users will receive a prompt when a > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7365,7 +7365,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads** - + @@ -7387,8 +7387,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7397,15 +7397,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7413,14 +7413,14 @@ If you disable or do not configure this setting, users will receive a file downl > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7428,7 +7428,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowFontDownloads** - + @@ -7450,8 +7450,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7460,8 +7460,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -7470,7 +7470,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7478,14 +7478,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7493,7 +7493,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites** - + @@ -7515,8 +7515,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7525,8 +7525,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -7535,7 +7535,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7543,14 +7543,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7558,7 +7558,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents** - + @@ -7580,8 +7580,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7590,8 +7590,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -7600,7 +7600,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7608,14 +7608,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7623,7 +7623,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowScriptlets** - + @@ -7645,8 +7645,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7655,8 +7655,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -7665,7 +7665,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7673,14 +7673,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7688,7 +7688,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowSmartScreenIE** - + @@ -7710,8 +7710,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7720,8 +7720,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -7732,7 +7732,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7740,14 +7740,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7755,7 +7755,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneAllowUserDataPersistence** - + @@ -7777,8 +7777,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7787,8 +7787,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -7797,7 +7797,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7805,14 +7805,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7820,7 +7820,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls** - + @@ -7842,8 +7842,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7852,10 +7852,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7863,14 +7863,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Don't run antimalware programs against ActiveX controls* - GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7878,7 +7878,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls** - + @@ -7900,8 +7900,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7910,8 +7910,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -7922,7 +7922,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7930,14 +7930,14 @@ If you do not configure this policy setting, users are queried whether to allow > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -7945,7 +7945,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneJavaPermissions** - + @@ -7967,8 +7967,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -7977,10 +7977,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -7988,14 +7988,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8003,7 +8003,7 @@ ADMX Info: **InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames** - + @@ -8025,8 +8025,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8035,8 +8035,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -8045,7 +8045,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8053,14 +8053,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_9* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8068,7 +8068,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources** - + @@ -8090,8 +8090,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8100,8 +8100,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -8110,7 +8110,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8118,14 +8118,14 @@ If you do not configure this policy setting, users cannot load a page in the zon > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8133,7 +8133,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls** - + @@ -8155,8 +8155,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8165,8 +8165,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -8175,7 +8175,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8183,14 +8183,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8198,7 +8198,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads** - + @@ -8220,8 +8220,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8230,15 +8230,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8246,14 +8246,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8261,7 +8261,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowFontDownloads** - + @@ -8283,8 +8283,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8293,8 +8293,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -8303,7 +8303,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8311,14 +8311,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8326,7 +8326,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites** - + @@ -8348,8 +8348,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8358,8 +8358,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -8368,7 +8368,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8376,14 +8376,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8391,7 +8391,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents** - + @@ -8413,8 +8413,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8423,8 +8423,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -8433,7 +8433,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8441,14 +8441,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8456,7 +8456,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowScriptlets** - + @@ -8478,8 +8478,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8488,8 +8488,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -8498,7 +8498,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8506,14 +8506,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8521,7 +8521,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE** - + @@ -8543,8 +8543,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8553,8 +8553,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -8565,7 +8565,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8573,14 +8573,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8588,7 +8588,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence** - + @@ -8610,8 +8610,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8620,8 +8620,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -8630,7 +8630,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8638,14 +8638,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8653,7 +8653,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls** - + @@ -8675,8 +8675,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8685,8 +8685,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -8697,7 +8697,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8705,14 +8705,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8720,7 +8720,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneJavaPermissions** - + @@ -8742,8 +8742,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8752,10 +8752,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8763,14 +8763,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8778,7 +8778,7 @@ ADMX Info: **InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames** - + @@ -8800,8 +8800,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8810,8 +8810,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -8820,7 +8820,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8828,14 +8828,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_2* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Internet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8843,7 +8843,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources** - + @@ -8865,8 +8865,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8875,8 +8875,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -8885,7 +8885,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8893,14 +8893,14 @@ If you do not configure this policy setting, users are queried to choose whether > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8908,7 +8908,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls** - + @@ -8930,8 +8930,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -8940,8 +8940,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -8950,7 +8950,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -8958,14 +8958,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -8973,7 +8973,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads** - + @@ -8995,8 +8995,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9005,15 +9005,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9021,14 +9021,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9036,7 +9036,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowFontDownloads** - + @@ -9058,8 +9058,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9068,8 +9068,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -9078,7 +9078,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9086,14 +9086,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9101,7 +9101,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites** - + @@ -9123,8 +9123,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9133,8 +9133,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -9143,7 +9143,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9151,14 +9151,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9166,7 +9166,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents** - + @@ -9188,8 +9188,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9198,8 +9198,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -9208,7 +9208,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9216,14 +9216,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9231,7 +9231,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowScriptlets** - + @@ -9253,8 +9253,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9263,8 +9263,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -9273,7 +9273,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9281,14 +9281,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9296,7 +9296,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE** - + @@ -9318,8 +9318,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9328,8 +9328,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -9340,7 +9340,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9348,14 +9348,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9363,7 +9363,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence** - + @@ -9385,8 +9385,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9395,8 +9395,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -9405,7 +9405,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9413,14 +9413,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9428,7 +9428,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls** - + @@ -9450,8 +9450,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9460,8 +9460,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -9472,7 +9472,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9480,14 +9480,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9495,7 +9495,7 @@ ADMX Info: **InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames** - + @@ -9517,8 +9517,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9527,8 +9527,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -9537,7 +9537,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9545,14 +9545,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_4* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Intranet Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9560,7 +9560,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources** - + @@ -9582,8 +9582,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9592,8 +9592,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -9602,7 +9602,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9610,14 +9610,14 @@ If you do not configure this policy setting, users can load a page in the zone t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9625,7 +9625,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls** - + @@ -9647,8 +9647,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9657,8 +9657,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -9667,7 +9667,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9675,14 +9675,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9690,7 +9690,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads** - + @@ -9712,8 +9712,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9722,15 +9722,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9738,14 +9738,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9753,7 +9753,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads** - + @@ -9775,8 +9775,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9785,8 +9785,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -9795,7 +9795,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9803,14 +9803,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9818,7 +9818,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites** - + @@ -9840,8 +9840,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9850,8 +9850,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -9860,7 +9860,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9868,14 +9868,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9883,7 +9883,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents** - + @@ -9905,8 +9905,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9915,8 +9915,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -9925,7 +9925,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9933,14 +9933,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -9948,7 +9948,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets** - + @@ -9970,8 +9970,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -9980,8 +9980,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -9990,7 +9990,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -9998,14 +9998,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10013,7 +10013,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE** - + @@ -10035,8 +10035,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10045,8 +10045,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -10057,7 +10057,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10065,14 +10065,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10080,7 +10080,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence** - + @@ -10102,8 +10102,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10112,8 +10112,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -10122,7 +10122,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10130,14 +10130,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10145,7 +10145,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls** - + @@ -10167,8 +10167,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10177,8 +10177,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -10189,7 +10189,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10197,14 +10197,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10212,7 +10212,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneJavaPermissions** - + @@ -10234,8 +10234,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10244,10 +10244,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10255,14 +10255,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10270,7 +10270,7 @@ ADMX Info: **InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames** - + @@ -10292,8 +10292,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10302,8 +10302,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -10312,7 +10312,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10320,14 +10320,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_10* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Local Machine Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10335,7 +10335,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources** - + @@ -10357,8 +10357,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10367,8 +10367,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -10377,7 +10377,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10385,14 +10385,14 @@ If you do not configure this policy setting, users cannot load a page in the zon > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10400,7 +10400,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** - + @@ -10422,8 +10422,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10432,8 +10432,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -10442,7 +10442,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10450,14 +10450,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10465,7 +10465,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** - + @@ -10487,8 +10487,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10497,15 +10497,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10513,14 +10513,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10528,7 +10528,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads** - + @@ -10550,8 +10550,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10560,8 +10560,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -10570,7 +10570,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10578,14 +10578,14 @@ If you do not configure this policy setting, users are queried whether to allow > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10593,7 +10593,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites** - + @@ -10615,8 +10615,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10625,8 +10625,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -10635,7 +10635,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10643,14 +10643,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10658,7 +10658,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents** - + @@ -10680,8 +10680,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10690,8 +10690,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -10700,7 +10700,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10708,14 +10708,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10723,7 +10723,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets** - + @@ -10745,8 +10745,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10755,8 +10755,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -10765,7 +10765,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10773,14 +10773,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10788,7 +10788,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE** - + @@ -10810,8 +10810,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10820,8 +10820,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -10832,7 +10832,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10840,14 +10840,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10855,7 +10855,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence** - + @@ -10877,8 +10877,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10887,8 +10887,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -10897,7 +10897,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10905,14 +10905,14 @@ If you do not configure this policy setting, users cannot preserve information i > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10920,7 +10920,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls** - + @@ -10942,8 +10942,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -10952,8 +10952,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -10964,7 +10964,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -10972,14 +10972,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -10987,7 +10987,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions** - + @@ -11009,8 +11009,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11019,10 +11019,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11030,14 +11030,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11045,7 +11045,7 @@ ADMX Info: **InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames** - + @@ -11067,8 +11067,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11077,8 +11077,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. @@ -11087,7 +11087,7 @@ If you disable this policy setting, users cannot open other windows and frames f If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11095,14 +11095,14 @@ If you do not configure this policy setting, users cannot open other windows and > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_8* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11110,7 +11110,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources** - + @@ -11132,8 +11132,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11142,8 +11142,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -11152,7 +11152,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11160,14 +11160,14 @@ If you do not configure this policy setting, users can load a page in the zone t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11175,7 +11175,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls** - + @@ -11197,8 +11197,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11207,8 +11207,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -11217,7 +11217,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11225,14 +11225,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11240,7 +11240,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads** - + @@ -11262,8 +11262,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11272,15 +11272,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11288,14 +11288,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11303,7 +11303,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads** - + @@ -11325,8 +11325,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11335,8 +11335,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -11345,7 +11345,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11353,14 +11353,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11368,7 +11368,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites** - + @@ -11390,8 +11390,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11400,8 +11400,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -11410,7 +11410,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11418,14 +11418,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11433,7 +11433,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents** - + @@ -11455,8 +11455,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11465,8 +11465,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -11475,7 +11475,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11483,14 +11483,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11498,7 +11498,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets** - + @@ -11520,8 +11520,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11530,8 +11530,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -11540,7 +11540,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11548,14 +11548,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11563,7 +11563,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE** - + @@ -11585,8 +11585,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11595,8 +11595,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -11607,7 +11607,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11615,14 +11615,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11630,7 +11630,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence** - + @@ -11652,8 +11652,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11662,8 +11662,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -11672,7 +11672,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11680,14 +11680,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11695,7 +11695,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls** - + @@ -11717,8 +11717,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11727,8 +11727,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -11739,7 +11739,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11747,14 +11747,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11762,7 +11762,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions** - + @@ -11784,8 +11784,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11794,10 +11794,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11805,14 +11805,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11820,7 +11820,7 @@ ADMX Info: **InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames** - + @@ -11842,8 +11842,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11852,8 +11852,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -11862,7 +11862,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11870,14 +11870,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_6* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Locked-Down Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -11885,7 +11885,7 @@ ADMX Info: **InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses** - + @@ -11907,8 +11907,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11917,10 +11917,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11928,14 +11928,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Internet Explorer Processes* - GP name: *IESF_PolicyExplorerProcesses_3* - GP path: *Windows Components/Internet Explorer/Security Features/MK Protocol Security Restriction* - GP ADMX file name: *inetres.admx* - +
            @@ -11943,7 +11943,7 @@ ADMX Info: **InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses** - + @@ -11965,8 +11965,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -11975,10 +11975,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -11986,14 +11986,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Internet Explorer Processes* - GP name: *IESF_PolicyExplorerProcesses_6* - GP path: *Windows Components/Internet Explorer/Security Features/Mime Sniffing Safety Feature* - GP ADMX file name: *inetres.admx* - +
            @@ -12001,7 +12001,7 @@ ADMX Info: **InternetExplorer/NotificationBarInternetExplorerProcesses** - + @@ -12023,8 +12023,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12033,10 +12033,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12044,14 +12044,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Internet Explorer Processes* - GP name: *IESF_PolicyExplorerProcesses_10* - GP path: *Windows Components/Internet Explorer/Security Features/Notification bar* - GP ADMX file name: *inetres.admx* - +
            @@ -12059,7 +12059,7 @@ ADMX Info: **InternetExplorer/PreventManagingSmartScreenFilter** - + @@ -12081,8 +12081,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12091,10 +12091,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12102,14 +12102,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent managing SmartScreen Filter* - GP name: *Disable_Managing_Safety_Filter_IE9* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -12117,7 +12117,7 @@ ADMX Info: **InternetExplorer/PreventPerUserInstallationOfActiveXControls** - + @@ -12139,8 +12139,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12149,10 +12149,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12160,14 +12160,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Prevent per-user installation of ActiveX controls* - GP name: *DisablePerUserActiveXInstall* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -12175,7 +12175,7 @@ ADMX Info: **InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses** - + @@ -12197,8 +12197,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12207,10 +12207,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12218,14 +12218,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *All Processes* - GP name: *IESF_PolicyAllProcesses_9* - GP path: *Windows Components/Internet Explorer/Security Features/Protection From Zone Elevation* - GP ADMX file name: *inetres.admx* - +
            @@ -12233,7 +12233,7 @@ ADMX Info: **InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls** - + @@ -12255,8 +12255,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12265,10 +12265,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12276,14 +12276,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Remove "Run this time" button for outdated ActiveX controls in Internet Explorer * - GP name: *VerMgmtDisableRunThisTime* - GP path: *Windows Components/Internet Explorer/Security Features/Add-on Management* - GP ADMX file name: *inetres.admx* - +
            @@ -12291,7 +12291,7 @@ ADMX Info: **InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses** - + @@ -12313,8 +12313,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12323,10 +12323,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12334,14 +12334,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *All Processes* - GP name: *IESF_PolicyAllProcesses_11* - GP path: *Windows Components/Internet Explorer/Security Features/Restrict ActiveX Install* - GP ADMX file name: *inetres.admx* - +
            @@ -12349,7 +12349,7 @@ ADMX Info: **InternetExplorer/RestrictFileDownloadInternetExplorerProcesses** - + @@ -12371,8 +12371,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12381,10 +12381,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12392,14 +12392,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *All Processes* - GP name: *IESF_PolicyAllProcesses_12* - GP path: *Windows Components/Internet Explorer/Security Features/Restrict File Download* - GP ADMX file name: *inetres.admx* - +
            @@ -12407,7 +12407,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources** - + @@ -12429,8 +12429,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12439,8 +12439,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -12449,7 +12449,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users cannot load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12457,14 +12457,14 @@ If you do not configure this policy setting, users cannot load a page in the zon > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12472,7 +12472,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowActiveScripting** - + @@ -12494,8 +12494,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12504,10 +12504,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12515,14 +12515,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow active scripting* - GP name: *IZ_PolicyActiveScripting_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12530,7 +12530,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** - + @@ -12552,8 +12552,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12562,8 +12562,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -12572,7 +12572,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, ActiveX control installations will be blocked using the Notification bar. Users can click on the Notification bar to allow the ActiveX control prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12580,14 +12580,14 @@ If you do not configure this policy setting, ActiveX control installations will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12595,7 +12595,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** - + @@ -12617,8 +12617,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12627,15 +12627,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, file downloads that are not user-initiated will be blocked, and users will see the Notification bar instead of the file download dialog. Users can then click the Notification bar to allow the file download prompt. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12643,14 +12643,14 @@ If you disable or do not configure this setting, file downloads that are not use > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12658,7 +12658,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors** - + @@ -12680,8 +12680,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12690,10 +12690,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12701,14 +12701,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow binary and script behaviors* - GP name: *IZ_PolicyBinaryBehaviors_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12716,7 +12716,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript** - + @@ -12738,8 +12738,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12748,10 +12748,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12759,14 +12759,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow cut, copy or paste operations from the clipboard via script* - GP name: *IZ_PolicyAllowPasteViaScript_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12774,7 +12774,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles** - + @@ -12796,8 +12796,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12806,10 +12806,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12817,14 +12817,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow drag and drop or copy and paste files* - GP name: *IZ_PolicyDropOrPasteFiles_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12832,7 +12832,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowFileDownloads** - + @@ -12854,8 +12854,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12864,10 +12864,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12875,14 +12875,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow file downloads* - GP name: *IZ_PolicyFileDownload_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12890,7 +12890,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowFontDownloads** - + @@ -12912,8 +12912,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12922,8 +12922,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -12932,7 +12932,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, users are queried whether to allow HTML fonts to download. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -12940,14 +12940,14 @@ If you do not configure this policy setting, users are queried whether to allow > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -12955,7 +12955,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites** - + @@ -12977,8 +12977,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -12987,8 +12987,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Internet sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -12997,7 +12997,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, the possibly harmful navigations are prevented. The Internet Explorer security feature will be on in this zone as set by Protection from Zone Elevation feature control. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13005,14 +13005,14 @@ If you do not configure this policy setting, the possibly harmful navigations ar > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13020,7 +13020,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles** - + @@ -13042,8 +13042,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13052,10 +13052,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13063,14 +13063,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow loading of XAML files* - GP name: *IZ_Policy_XAML_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13078,7 +13078,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH** - + @@ -13100,8 +13100,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13110,10 +13110,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13121,14 +13121,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow META REFRESH* - GP name: *IZ_PolicyAllowMETAREFRESH_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13136,7 +13136,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents** - + @@ -13158,8 +13158,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13168,8 +13168,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -13178,7 +13178,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will not execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13186,14 +13186,14 @@ If you do not configure this policy setting, Internet Explorer will not execute > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13201,7 +13201,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls** - + @@ -13223,8 +13223,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13233,10 +13233,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13244,14 +13244,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow only approved domains to use ActiveX controls without prompt* - GP name: *IZ_PolicyOnlyAllowApprovedDomainsToUseActiveXWithoutPrompt_Both_Restricted* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13259,7 +13259,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** - + @@ -13281,8 +13281,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13291,10 +13291,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13302,14 +13302,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow only approved domains to use the TDC ActiveX control* - GP name: *IZ_PolicyAllowTDCControl_Both_Restricted* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13317,7 +13317,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows** - + @@ -13339,8 +13339,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13349,10 +13349,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13360,14 +13360,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow script-initiated windows without size or position constraints* - GP name: *IZ_PolicyWindowsRestrictionsURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13375,7 +13375,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls** - + @@ -13397,8 +13397,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13407,10 +13407,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13418,14 +13418,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scripting of Internet Explorer WebBrowser controls* - GP name: *IZ_Policy_WebBrowserControl_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13433,7 +13433,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowScriptlets** - + @@ -13455,8 +13455,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13465,8 +13465,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -13475,7 +13475,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13483,14 +13483,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13498,7 +13498,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE** - + @@ -13520,8 +13520,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13530,8 +13530,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -13542,7 +13542,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13550,14 +13550,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13565,7 +13565,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript** - + @@ -13587,8 +13587,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13597,10 +13597,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13608,14 +13608,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow updates to status bar via script* - GP name: *IZ_Policy_ScriptStatusBar_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13623,7 +13623,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence** - + @@ -13645,8 +13645,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13655,8 +13655,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -13665,7 +13665,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users cannot preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13673,14 +13673,14 @@ If you do not configure this policy setting, users cannot preserve information i > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13688,7 +13688,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** - + @@ -13710,8 +13710,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13720,10 +13720,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13731,14 +13731,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Don't run antimalware programs against ActiveX controls* - GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13746,7 +13746,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls** - + @@ -13768,8 +13768,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13778,10 +13778,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13789,14 +13789,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Download signed ActiveX controls* - GP name: *IZ_PolicyDownloadSignedActiveX_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13804,7 +13804,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls** - + @@ -13826,8 +13826,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13836,10 +13836,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13847,14 +13847,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Download unsigned ActiveX controls* - GP name: *IZ_PolicyDownloadUnsignedActiveX_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13862,7 +13862,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilter** - + @@ -13884,8 +13884,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13894,10 +13894,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13905,14 +13905,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Cross-Site Scripting Filter* - GP name: *IZ_PolicyTurnOnXSSFilter_Both_Restricted* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13920,7 +13920,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** - + @@ -13942,8 +13942,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -13952,10 +13952,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -13963,14 +13963,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable dragging of content from different domains across windows* - GP name: *IZ_PolicyDragDropAcrossDomainsAcrossWindows_Both_Restricted* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -13978,7 +13978,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** - + @@ -14000,8 +14000,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14010,10 +14010,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14021,14 +14021,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable dragging of content from different domains within a window* - GP name: *IZ_PolicyDragDropAcrossDomainsWithinWindow_Both_Restricted* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14036,7 +14036,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneEnableMIMESniffing** - + @@ -14058,8 +14058,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14068,10 +14068,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14079,14 +14079,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable MIME Sniffing* - GP name: *IZ_PolicyMimeSniffingURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14094,7 +14094,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer** - + @@ -14116,8 +14116,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14126,10 +14126,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14137,14 +14137,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Include local path when user is uploading files to a server* - GP name: *IZ_Policy_LocalPathForUpload_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14152,7 +14152,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls** - + @@ -14174,8 +14174,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14184,8 +14184,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -14196,7 +14196,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, ActiveX controls that cannot be made safe are not loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14204,14 +14204,14 @@ If you do not configure this policy setting, ActiveX controls that cannot be mad > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14219,7 +14219,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneJavaPermissions** - + @@ -14241,8 +14241,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14251,10 +14251,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14262,14 +14262,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14277,7 +14277,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME** - + @@ -14299,8 +14299,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14309,10 +14309,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14320,14 +14320,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Launching applications and files in an IFRAME* - GP name: *IZ_PolicyLaunchAppsAndFilesInIFRAME_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14335,7 +14335,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneLogonOptions** - + @@ -14357,8 +14357,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14367,10 +14367,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14378,14 +14378,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Logon options* - GP name: *IZ_PolicyLogon_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14393,7 +14393,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames** - + @@ -14415,8 +14415,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14425,8 +14425,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open additional windows and frames from other domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow additional windows and frames to access applications from other domains. @@ -14435,7 +14435,7 @@ If you disable this policy setting, users cannot open other windows and frames f If you do not configure this policy setting, users cannot open other windows and frames from different domains or access applications from different domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14443,14 +14443,14 @@ If you do not configure this policy setting, users cannot open other windows and > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14458,7 +14458,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins** - + @@ -14480,8 +14480,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14490,10 +14490,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14501,14 +14501,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run ActiveX controls and plugins* - GP name: *IZ_PolicyRunActiveXControls_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14516,7 +14516,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** - + @@ -14538,8 +14538,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14548,10 +14548,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14559,14 +14559,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components signed with Authenticode* - GP name: *IZ_PolicySignedFrameworkComponentsURLaction_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14574,7 +14574,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting** - + @@ -14596,8 +14596,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14606,10 +14606,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14617,14 +14617,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Script ActiveX controls marked safe for scripting* - GP name: *IZ_PolicyScriptActiveXMarkedSafe_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14632,7 +14632,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets** - + @@ -14654,8 +14654,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14664,10 +14664,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14675,14 +14675,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Scripting of Java applets* - GP name: *IZ_PolicyScriptingOfJavaApplets_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14690,7 +14690,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles** - + @@ -14712,8 +14712,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14722,10 +14722,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14733,14 +14733,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Show security warning for potentially unsafe files* - GP name: *IZ_Policy_UnsafeFiles_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14748,7 +14748,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode** - + @@ -14770,8 +14770,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14780,10 +14780,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14791,14 +14791,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on Protected Mode* - GP name: *IZ_Policy_TurnOnProtectedMode_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14806,7 +14806,7 @@ ADMX Info: **InternetExplorer/RestrictedSitesZoneUsePopupBlocker** - + @@ -14828,8 +14828,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14838,10 +14838,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14849,14 +14849,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Use Pop-up Blocker* - GP name: *IZ_PolicyBlockPopupWindows_7* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Restricted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -14864,7 +14864,7 @@ ADMX Info: **InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses** - + @@ -14886,8 +14886,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14896,10 +14896,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14907,14 +14907,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *All Processes* - GP name: *IESF_PolicyAllProcesses_8* - GP path: *Windows Components/Internet Explorer/Security Features/Scripted Window Security Restrictions* - GP ADMX file name: *inetres.admx* - +
            @@ -14922,7 +14922,7 @@ ADMX Info: **InternetExplorer/SearchProviderList** - + @@ -14944,8 +14944,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -14954,15 +14954,15 @@ ADMX Info:
            - - + + This policy setting allows you to restrict the search providers that appear in the Search box in Internet Explorer to those defined in the list of policy keys for search providers (found under [HKCU or HKLM\Software\policies\Microsoft\Internet Explorer\SearchScopes]). Normally, search providers can be added from third-party toolbars or in Setup, but the user can also add them from a search provider's website. If you enable this policy setting, the user cannot configure the list of search providers on his or her computer, and any default providers installed do not appear (including providers installed from other applications). The only providers that appear are those in the list of policy keys for search providers. Note: This list can be created through a custom administrative template file. For information about creating this custom administrative template file, see the Internet Explorer documentation on search providers. If you disable or do not configure this policy setting, the user can configure his or her list of search providers. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -14970,14 +14970,14 @@ If you disable or do not configure this policy setting, the user can configure h > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Restrict search providers to a specific list* - GP name: *SpecificSearchProvider* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -14985,7 +14985,7 @@ ADMX Info: **InternetExplorer/SecurityZonesUseOnlyMachineSettings** - + @@ -15007,8 +15007,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15016,10 +15016,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15027,14 +15027,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Security Zones: Use only machine settings * - GP name: *Security_HKLM_only* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -15042,7 +15042,7 @@ ADMX Info: **InternetExplorer/SpecifyUseOfActiveXInstallerService** - + @@ -15064,8 +15064,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15074,10 +15074,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15085,14 +15085,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify use of ActiveX Installer Service for installation of ActiveX controls* - GP name: *OnlyUseAXISForActiveXInstall* - GP path: *Windows Components/Internet Explorer* - GP ADMX file name: *inetres.admx* - +
            @@ -15100,7 +15100,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowAccessToDataSources** - + @@ -15122,8 +15122,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15132,8 +15132,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Internet Explorer can access data from another security zone using the Microsoft XML Parser (MSXML) or ActiveX Data Objects (ADO). If you enable this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. If you select Prompt in the drop-down box, users are queried to choose whether to allow a page to be loaded in the zone that uses MSXML or ADO to access data from another site in the zone. @@ -15142,7 +15142,7 @@ If you disable this policy setting, users cannot load a page in the zone that us If you do not configure this policy setting, users can load a page in the zone that uses MSXML or ADO to access data from another site in the zone. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15150,14 +15150,14 @@ If you do not configure this policy setting, users can load a page in the zone t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Access data sources across domains* - GP name: *IZ_PolicyAccessDataSourcesAcrossDomains_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15165,7 +15165,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls** - + @@ -15187,8 +15187,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15197,8 +15197,8 @@ ADMX Info:
            - - + + This policy setting manages whether users will be automatically prompted for ActiveX control installations. If you enable this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. @@ -15207,7 +15207,7 @@ If you disable this policy setting, ActiveX control installations will be blocke If you do not configure this policy setting, users will receive a prompt when a site instantiates an ActiveX control they do not have installed. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15215,14 +15215,14 @@ If you do not configure this policy setting, users will receive a prompt when a > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for ActiveX controls* - GP name: *IZ_PolicyNotificationBarActiveXURLaction_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15230,7 +15230,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads** - + @@ -15252,8 +15252,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15262,15 +15262,15 @@ ADMX Info:
            - - + + This policy setting determines whether users will be prompted for non user-initiated file downloads. Regardless of this setting, users will receive file download dialogs for user-initiated downloads. If you enable this setting, users will receive a file download dialog for automatic download attempts. If you disable or do not configure this setting, users will receive a file download dialog for automatic download attempts. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15278,14 +15278,14 @@ If you disable or do not configure this setting, users will receive a file downl > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Automatic prompting for file downloads* - GP name: *IZ_PolicyNotificationBarDownloadURLaction_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15293,7 +15293,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowFontDownloads** - + @@ -15315,8 +15315,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15325,8 +15325,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether pages of the zone may download HTML fonts. If you enable this policy setting, HTML fonts can be downloaded automatically. If you enable this policy setting and Prompt is selected in the drop-down box, users are queried whether to allow HTML fonts to download. @@ -15335,7 +15335,7 @@ If you disable this policy setting, HTML fonts are prevented from downloading. If you do not configure this policy setting, HTML fonts can be downloaded automatically. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15343,14 +15343,14 @@ If you do not configure this policy setting, HTML fonts can be downloaded automa > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow font downloads* - GP name: *IZ_PolicyFontDownload_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15358,7 +15358,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites** - + @@ -15380,8 +15380,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15390,8 +15390,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether Web sites from less privileged zones, such as Restricted Sites, can navigate into this zone. If you enable this policy setting, Web sites from less privileged zones can open new windows in, or navigate into, this zone. The security zone will run without the added layer of security that is provided by the Protection from Zone Elevation security feature. If you select Prompt in the drop-down box, a warning is issued to the user that potentially risky navigation is about to occur. @@ -15400,7 +15400,7 @@ If you disable this policy setting, the possibly harmful navigations are prevent If you do not configure this policy setting, a warning is issued to the user that potentially risky navigation is about to occur. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15408,14 +15408,14 @@ If you do not configure this policy setting, a warning is issued to the user tha > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Web sites in less privileged Web content zones can navigate into this zone* - GP name: *IZ_PolicyZoneElevationURLaction_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15423,7 +15423,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents** - + @@ -15445,8 +15445,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15455,8 +15455,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether .NET Framework components that are not signed with Authenticode can be executed from Internet Explorer. These components include managed controls referenced from an object tag and managed executables referenced from a link. If you enable this policy setting, Internet Explorer will execute unsigned managed components. If you select Prompt in the drop-down box, Internet Explorer will prompt the user to determine whether to execute unsigned managed components. @@ -15465,7 +15465,7 @@ If you disable this policy setting, Internet Explorer will not execute unsigned If you do not configure this policy setting, Internet Explorer will execute unsigned managed components. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15473,14 +15473,14 @@ If you do not configure this policy setting, Internet Explorer will execute unsi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Run .NET Framework-reliant components not signed with Authenticode* - GP name: *IZ_PolicyUnsignedFrameworkComponentsURLaction_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15488,7 +15488,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowScriptlets** - + @@ -15510,8 +15510,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15520,8 +15520,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage whether the user can run scriptlets. If you enable this policy setting, the user can run scriptlets. @@ -15530,7 +15530,7 @@ If you disable this policy setting, the user cannot run scriptlets. If you do not configure this policy setting, the user can enable or disable scriptlets. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15538,14 +15538,14 @@ If you do not configure this policy setting, the user can enable or disable scri > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow scriptlets* - GP name: *IZ_Policy_AllowScriptlets_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15553,7 +15553,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowSmartScreenIE** - + @@ -15575,8 +15575,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15585,8 +15585,8 @@ ADMX Info:
            - - + + This policy setting controls whether SmartScreen Filter scans pages in this zone for malicious content. If you enable this policy setting, SmartScreen Filter scans pages in this zone for malicious content. @@ -15597,7 +15597,7 @@ If you do not configure this policy setting, the user can choose whether SmartSc Note: In Internet Explorer 7, this policy setting controls whether Phishing Filter scans pages in this zone for malicious content. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15605,14 +15605,14 @@ Note: In Internet Explorer 7, this policy setting controls whether Phishing Filt > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on SmartScreen Filter scan* - GP name: *IZ_Policy_Phishing_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15620,7 +15620,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneAllowUserDataPersistence** - + @@ -15642,8 +15642,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15652,8 +15652,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the preservation of information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. When a user returns to a persisted page, the state of the page can be restored if this policy setting is appropriately configured. If you enable this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. @@ -15662,7 +15662,7 @@ If you disable this policy setting, users cannot preserve information in the bro If you do not configure this policy setting, users can preserve information in the browser's history, in favorites, in an XML store, or directly within a Web page saved to disk. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15670,14 +15670,14 @@ If you do not configure this policy setting, users can preserve information in t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Userdata persistence* - GP name: *IZ_PolicyUserdataPersistence_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15685,7 +15685,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** - + @@ -15707,8 +15707,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15717,10 +15717,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15728,14 +15728,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Don't run antimalware programs against ActiveX controls* - GP name: *IZ_PolicyAntiMalwareCheckingOfActiveXControls_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15743,7 +15743,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls** - + @@ -15765,8 +15765,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15775,8 +15775,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage ActiveX controls not marked as safe. If you enable this policy setting, ActiveX controls are run, loaded with parameters, and scripted without setting object safety for untrusted data or scripts. This setting is not recommended, except for secure and administered zones. This setting causes both unsafe and safe controls to be initialized and scripted, ignoring the Script ActiveX controls marked safe for scripting option. @@ -15787,7 +15787,7 @@ If you disable this policy setting, ActiveX controls that cannot be made safe ar If you do not configure this policy setting, users are queried whether to allow the control to be loaded with parameters or scripted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15795,14 +15795,14 @@ If you do not configure this policy setting, users are queried whether to allow > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Initialize and script ActiveX controls not marked as safe* - GP name: *IZ_PolicyScriptActiveXNotMarkedSafe_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15810,7 +15810,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneJavaPermissions** - + @@ -15832,8 +15832,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15842,10 +15842,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15853,14 +15853,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Java permissions* - GP name: *IZ_PolicyJavaPermissions_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            @@ -15868,7 +15868,7 @@ ADMX Info: **InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames** - + @@ -15890,8 +15890,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -15900,8 +15900,8 @@ ADMX Info:
            - - + + This policy setting allows you to manage the opening of windows and frames and access of applications across different domains. If you enable this policy setting, users can open windows and frames from othe domains and access applications from other domains. If you select Prompt in the drop-down box, users are queried whether to allow windows and frames to access applications from other domains. @@ -15910,7 +15910,7 @@ If you disable this policy setting, users cannot open windows and frames to acce If you do not configure this policy setting, users can open windows and frames from othe domains and access applications from other domains. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -15918,14 +15918,14 @@ If you do not configure this policy setting, users can open windows and frames f > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Navigate windows and frames across different domains* - GP name: *IZ_PolicyNavigateSubframesAcrossDomains_5* - GP path: *Windows Components/Internet Explorer/Internet Control Panel/Security Page/Trusted Sites Zone* - GP ADMX file name: *inetres.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 322d3801c4..66c8d28294 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -42,7 +42,7 @@ ms.date: 01/29/2018 **Kerberos/AllowForestSearchOrder** - + @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -73,15 +73,15 @@ ms.date: 01/29/2018
            - - + + This policy setting defines the list of trusting forests that the Kerberos client searches when attempting to resolve two-part service principal names (SPNs). If you enable this policy setting, the Kerberos client searches the forests in this list, if it is unable to resolve a two-part SPN. If a match is found, the Kerberos client requests a referral ticket to the appropriate domain. If you disable or do not configure this policy setting, the Kerberos client does not search the listed forests to resolve the SPN. If the Kerberos client is unable to resolve the SPN because the name is not found, NTLM authentication might be used. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -89,14 +89,14 @@ If you disable or do not configure this policy setting, the Kerberos client does > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Use forest search order* - GP name: *ForestSearch* - GP path: *System/Kerberos* - GP ADMX file name: *Kerberos.admx* - +
            @@ -104,7 +104,7 @@ ADMX Info: **Kerberos/KerberosClientSupportsClaimsCompoundArmor** - + @@ -126,8 +126,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -135,14 +135,14 @@ ADMX Info:
            - - + + This policy setting controls whether a device will request claims and compound authentication for Dynamic Access Control and Kerberos armoring using Kerberos authentication with domains that support these features. If you enable this policy setting, the client computers will request claims, provide information required to create compounded authentication and armor Kerberos messages in domains which support claims and compound authentication for Dynamic Access Control and Kerberos armoring. If you disable or do not configure this policy setting, the client devices will not request claims, provide information required to create compounded authentication and armor Kerberos messages. Services hosted on the device will not be able to retrieve claims for clients using Kerberos protocol transition. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -150,14 +150,14 @@ If you disable or do not configure this policy setting, the client devices will > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Kerberos client support for claims, compound authentication and Kerberos armoring* - GP name: *EnableCbacAndArmor* - GP path: *System/Kerberos* - GP ADMX file name: *Kerberos.admx* - +
            @@ -165,7 +165,7 @@ ADMX Info: **Kerberos/RequireKerberosArmoring** - + @@ -187,8 +187,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -196,8 +196,8 @@ ADMX Info:
            - - + + This policy setting controls whether a computer requires that Kerberos message exchanges be armored when communicating with a domain controller. Warning: When a domain does not support Kerberos armoring by enabling "Support Dynamic Access Control and Kerberos armoring", then all authentication for all its users will fail from computers with this policy setting enabled. @@ -208,7 +208,7 @@ Note: The Kerberos Group Policy "Kerberos client support for claims, compound au If you disable or do not configure this policy setting, the client computers in the domain enforce the use of Kerberos armoring when possible as supported by the target domain. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -216,14 +216,14 @@ If you disable or do not configure this policy setting, the client computers in > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Fail authentication requests when Kerberos armoring is not available* - GP name: *ClientRequireFast* - GP path: *System/Kerberos* - GP ADMX file name: *Kerberos.admx* - +
            @@ -231,7 +231,7 @@ ADMX Info: **Kerberos/RequireStrictKDCValidation** - + @@ -253,8 +253,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -262,15 +262,15 @@ ADMX Info:
            - - + + This policy setting controls the Kerberos client's behavior in validating the KDC certificate for smart card and system certificate logon. If you enable this policy setting, the Kerberos client requires that the KDC's X.509 certificate contains the KDC key purpose object identifier in the Extended Key Usage (EKU) extensions, and that the KDC's X.509 certificate contains a dNSName subjectAltName (SAN) extension that matches the DNS name of the domain. If the computer is joined to a domain, the Kerberos client requires that the KDC's X.509 certificate must be signed by a Certificate Authority (CA) in the NTAuth store. If the computer is not joined to a domain, the Kerberos client allows the root CA certificate on the smart card to be used in the path validation of the KDC's X.509 certificate. If you disable or do not configure this policy setting, the Kerberos client requires only that the KDC certificate contain the Server Authentication purpose object identifier in the EKU extensions which can be issued to any server. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -278,14 +278,14 @@ If you disable or do not configure this policy setting, the Kerberos client requ > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Require strict KDC validation* - GP name: *ValidateKDC* - GP path: *System/Kerberos* - GP ADMX file name: *Kerberos.admx* - +
            @@ -293,7 +293,7 @@ ADMX Info: **Kerberos/SetMaximumContextTokenSize** - + @@ -315,8 +315,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -324,8 +324,8 @@ ADMX Info:
            - - + + This policy setting allows you to set the value returned to applications which request the maximum size of the SSPI context token buffer size. The size of the context token buffer determines the maximum size of SSPI context tokens an application expects and allocates. Depending upon authentication request processing and group memberships, the buffer might be smaller than the actual size of the SSPI context token. @@ -336,7 +336,7 @@ If you disable or do not configure this policy setting, the Kerberos client or s Note: This policy setting configures the existing MaxTokenSize registry value in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters, which was added in Windows XP and Windows Server 2003, with a default value of 12,000 bytes. Beginning with Windows 8 the default is 48,000 bytes. Due to HTTP's base64 encoding of authentication context tokens, it is not advised to set this value more than 48,000 bytes. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -344,14 +344,14 @@ Note: This policy setting configures the existing MaxTokenSize registry value in > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set maximum Kerberos SSPI context token buffer size* - GP name: *MaxTokenSize* - GP path: *System/Kerberos* - GP ADMX file name: *Kerberos.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index 3384e28b77..eba4551112 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -47,7 +47,7 @@ ms.date: 01/29/2018 **KioskBrowser/BlockedUrlExceptions** - + @@ -69,8 +69,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -79,11 +79,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, next major update. List of exceptions to the blocked website URLs (with wildcard support). This is used to configure URLs kiosk browsers are allowed to navigate to, which are a subset of the blocked URLs. - +
            @@ -91,7 +91,7 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit **KioskBrowser/BlockedUrls** - + @@ -113,8 +113,8 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -123,11 +123,11 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit
            - - + + Added in Windows 10, next major update. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to. - +
            @@ -135,7 +135,7 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc **KioskBrowser/DefaultURL** - + @@ -157,8 +157,8 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -167,11 +167,11 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc
            - - + + Added in Windows 10, next major update. Configures the default URL kiosk browsers to navigate on launch and restart. - +
            @@ -179,7 +179,7 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser **KioskBrowser/EnableHomeButton** - + @@ -201,8 +201,8 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -211,11 +211,11 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser
            - - + + Added in Windows 10, next major update. Enable/disable kiosk browser's home button. - +
            @@ -223,7 +223,7 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt **KioskBrowser/EnableNavigationButtons** - + @@ -245,8 +245,8 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -255,11 +255,11 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt
            - - + + Added in Windows 10, next major update. Enable/disable kiosk browser's navigation buttons (forward/back). - +
            @@ -267,7 +267,7 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's navigatio **KioskBrowser/RestartOnIdleTime** - + @@ -289,8 +289,8 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's navigatio
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -299,13 +299,13 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's navigatio
            - - + + Added in Windows 10, next major update. Amount of time in minutes the session is idle until the kiosk browser restarts in a fresh state. The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser. - +
            diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 6d5197aac8..8cd5d7c7a9 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **Licensing/AllowWindowsEntitlementReactivation** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,11 +64,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Enables or Disable Windows license reactivation on managed devices. - + The following list shows the supported values: @@ -83,7 +83,7 @@ The following list shows the supported values: **Licensing/DisallowKMSClientOnlineAVSValidation** - + @@ -105,8 +105,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -114,11 +114,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Enabling this setting prevents this computer from sending data to Microsoft regarding its activation state. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 5bd76c04ea..79fc96e412 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -194,7 +194,7 @@ ms.date: 01/29/2018 **LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** - + @@ -216,8 +216,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -225,8 +225,8 @@ ms.date: 01/29/2018
            - - + + This policy setting prevents users from adding new Microsoft accounts on this computer. If you select the "Users cannot add Microsoft accounts" option, users will not be able to create new Microsoft accounts on this computer, switch a local account to a Microsoft account, or connect a domain account to a Microsoft account. This is the preferred option if you need to limit the use of Microsoft accounts in your enterprise. @@ -237,7 +237,7 @@ If you disable or do not configure this policy (recommended), users will be able Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: @@ -252,7 +252,7 @@ The following list shows the supported values: **LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** - + @@ -274,8 +274,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -283,8 +283,8 @@ The following list shows the supported values:
            - - + + This security setting determines whether the local Administrator account is enabled or disabled. If you try to reenable the Administrator account after it has been disabled, and if the current Administrator password does not meet the password requirements, you cannot reenable the account. In this case, an alternative member of the Administrators group must reset the password on the Administrator account. For information about how to reset a password, see To reset a password. @@ -299,7 +299,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -307,7 +307,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** - + @@ -329,8 +329,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -338,8 +338,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + This security setting determines if the Guest account is enabled or disabled. Default: Disabled. @@ -351,7 +351,7 @@ Note: If the Guest account is disabled and the security option Network Access: S Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -359,7 +359,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** - + @@ -381,8 +381,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -390,8 +390,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Accounts: Limit local account use of blank passwords to console logon only This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. @@ -411,7 +411,7 @@ It is possible for applications that use remote interactive logons to bypass thi Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -419,7 +419,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount** - + @@ -441,8 +441,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -450,8 +450,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Accounts: Rename administrator account This security setting determines whether a different account name is associated with the security identifier (SID) for the account Administrator. Renaming the well-known Administrator account makes it slightly more difficult for unauthorized persons to guess this privileged user name and password combination. @@ -460,7 +460,7 @@ Default: Administrator. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -468,7 +468,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount** - + @@ -490,8 +490,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -499,8 +499,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            - - + + Accounts: Rename guest account This security setting determines whether a different account name is associated with the security identifier (SID) for the account "Guest." Renaming the well-known Guest account makes it slightly more difficult for unauthorized persons to guess this user name and password combination. @@ -509,7 +509,7 @@ Default: Guest. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -517,7 +517,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon** - + @@ -539,8 +539,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -548,8 +548,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            - - + + Devices: Allow undock without having to log on. This security setting determines whether a portable computer can be undocked without having to log on. If this policy is enabled, logon is not required and an external hardware eject button can be used to undock the computer. If disabled, a user must log on and have the Remove computer from docking station privilege to undock the computer. @@ -559,7 +559,7 @@ Caution: Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. - +
            @@ -567,7 +567,7 @@ Disabling this policy may tempt users to try and physically remove the laptop fr **LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia** - + @@ -589,8 +589,8 @@ Disabling this policy may tempt users to try and physically remove the laptop fr
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -598,8 +598,8 @@ Disabling this policy may tempt users to try and physically remove the laptop fr
            - - + + Devices: Allowed to format and eject removable media This security setting determines who is allowed to format and eject removable NTFS media. This capability can be given to: @@ -609,7 +609,7 @@ This security setting determines who is allowed to format and eject removable NT Default: This policy is not defined and only Administrators have this ability. - +
            @@ -617,7 +617,7 @@ Default: This policy is not defined and only Administrators have this ability. **LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters** - + @@ -639,8 +639,8 @@ Default: This policy is not defined and only Administrators have this ability.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -648,8 +648,8 @@ Default: This policy is not defined and only Administrators have this ability.
            - - + + Devices: Prevent users from installing printer drivers when connecting to shared printers For a computer to print to a shared printer, the driver for that shared printer must be installed on the local computer. This security setting determines who is allowed to install a printer driver as part of connecting to a shared printer. If this setting is enabled, only Administrators can install a printer driver as part of connecting to a shared printer. If this setting is disabled, any user can install a printer driver as part of connecting to a shared printer. @@ -661,7 +661,7 @@ Note This setting does not affect the ability to add a local printer. This setting does not affect Administrators. - +
            @@ -669,7 +669,7 @@ This setting does not affect the ability to add a local printer. This setting do **LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly** - + @@ -691,8 +691,8 @@ This setting does not affect the ability to add a local printer. This setting do
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -700,8 +700,8 @@ This setting does not affect the ability to add a local printer. This setting do
            - - + + Devices: Restrict CD-ROM access to locally logged-on user only This security setting determines whether a CD-ROM is accessible to both local and remote users simultaneously. @@ -710,7 +710,7 @@ If this policy is enabled, it allows only the interactively logged-on user to ac Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. - +
            @@ -718,7 +718,7 @@ Default: This policy is not defined and CD-ROM access is not restricted to the l **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways** - + @@ -740,8 +740,8 @@ Default: This policy is not defined and CD-ROM access is not restricted to the l
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -749,8 +749,8 @@ Default: This policy is not defined and CD-ROM access is not restricted to the l
            - - + + Domain member: Digitally encrypt or sign secure channel data (always) This security setting determines whether all secure channel traffic initiated by the domain member must be signed or encrypted. @@ -770,7 +770,7 @@ If this policy is enabled, the policy Domain member: Digitally sign secure chann If this policy is enabled, the policy Domain member: Digitally sign secure channel data (when possible) is assumed to be enabled regardless of its current setting. This ensures that the domain member attempts to negotiate at least signing of the secure channel traffic. Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not. - +
            @@ -778,7 +778,7 @@ Logon information transmitted over the secure channel is always encrypted regard **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible** - + @@ -800,8 +800,8 @@ Logon information transmitted over the secure channel is always encrypted regard
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -809,8 +809,8 @@ Logon information transmitted over the secure channel is always encrypted regard
            - - + + Domain member: Digitally encrypt secure channel data (when possible) This security setting determines whether a domain member attempts to negotiate encryption for all secure channel traffic that it initiates. @@ -827,7 +827,7 @@ There is no known reason for disabling this setting. Besides unnecessarily reduc Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains. - +
            @@ -835,7 +835,7 @@ Note: Domain controllers are also domain members and establish secure channels w **LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible** - + @@ -857,8 +857,8 @@ Note: Domain controllers are also domain members and establish secure channels w
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -866,8 +866,8 @@ Note: Domain controllers are also domain members and establish secure channels w
            - - + + Domain member: Digitally sign secure channel data (when possible) This security setting determines whether a domain member attempts to negotiate signing for all secure channel traffic that it initiates. @@ -878,7 +878,7 @@ This setting determines whether or not the domain member attempts to negotiate s Default: Enabled. - +
            @@ -886,7 +886,7 @@ Default: Enabled. **LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges** - + @@ -908,8 +908,8 @@ Default: Enabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -917,8 +917,8 @@ Default: Enabled.
            - - + + Domain member: Disable machine account password changes Determines whether a domain member periodically changes its computer account password. If this setting is enabled, the domain member does not attempt to change its computer account password. If this setting is disabled, the domain member attempts to change its computer account password as specified by the setting for Domain Member: Maximum age for machine account password, which by default is every 30 days. @@ -930,7 +930,7 @@ Notes This security setting should not be enabled. Computer account passwords are used to establish secure channel communications between members and domain controllers and, within the domain, between the domain controllers themselves. Once it is established, the secure channel is used to transmit sensitive information that is necessary for making authentication and authorization decisions. This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names. - +
            @@ -938,7 +938,7 @@ This setting should not be used in an attempt to support dual-boot scenarios tha **LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge** - + @@ -960,8 +960,8 @@ This setting should not be used in an attempt to support dual-boot scenarios tha
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -969,8 +969,8 @@ This setting should not be used in an attempt to support dual-boot scenarios tha
            - - + + Domain member: Maximum machine account password age This security setting determines how often a domain member will attempt to change its computer account password. @@ -981,7 +981,7 @@ Important This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers. - +
            @@ -989,7 +989,7 @@ This setting applies to Windows 2000 computers, but it is not available through **LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey** - + @@ -1011,8 +1011,8 @@ This setting applies to Windows 2000 computers, but it is not available through
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1020,8 +1020,8 @@ This setting applies to Windows 2000 computers, but it is not available through
            - - + + Domain member: Require strong (Windows 2000 or later) session key This security setting determines whether 128-bit key strength is required for encrypted secure channel data. @@ -1043,7 +1043,7 @@ Important In order to take advantage of this policy on member workstations and servers, all domain controllers that constitute the member's domain must be running Windows 2000 or later. In order to take advantage of this policy on domain controllers, all domain controllers in the same domain as well as all trusted domains must run Windows 2000 or later. - +
            @@ -1051,7 +1051,7 @@ In order to take advantage of this policy on domain controllers, all domain cont **LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** - + @@ -1073,8 +1073,8 @@ In order to take advantage of this policy on domain controllers, all domain cont
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1082,8 +1082,8 @@ In order to take advantage of this policy on domain controllers, all domain cont
            - - + + Interactive Logon:Display user information when the session is locked Valid values: @@ -1093,7 +1093,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1101,7 +1101,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn** - + @@ -1123,8 +1123,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1132,8 +1132,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Don't display last signed-in This security setting determines whether the Windows sign-in screen will show the username of the last person who signed in on this PC. @@ -1148,7 +1148,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1156,7 +1156,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn** - + @@ -1178,8 +1178,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1187,8 +1187,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Don't display username at sign-in This security setting determines whether the username of the person signing in to this PC appears at Windows sign-in, after credentials are entered, and before the PC desktop is shown. @@ -1204,7 +1204,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1212,7 +1212,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL** - + @@ -1234,8 +1234,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1243,8 +1243,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Do not require CTRL+ALT+DEL This security setting determines whether pressing CTRL+ALT+DEL is required before a user can log on. @@ -1261,7 +1261,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1269,7 +1269,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit** - + @@ -1291,8 +1291,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1300,8 +1300,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Machine inactivity limit. Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. @@ -1313,7 +1313,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1321,7 +1321,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn** - + @@ -1343,8 +1343,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1352,8 +1352,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Message text for users attempting to log on This security setting specifies a text message that is displayed to users when they log on. @@ -1364,7 +1364,7 @@ Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1372,7 +1372,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn** - + @@ -1394,8 +1394,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1403,8 +1403,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Message title for users attempting to log on This security setting allows the specification of a title to appear in the title bar of the window that contains the Interactive logon: Message text for users attempting to log on. @@ -1413,7 +1413,7 @@ Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -1421,7 +1421,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior** - + @@ -1443,8 +1443,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1452,8 +1452,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            - - + + Interactive logon: Smart card removal behavior This security setting determines what happens when the smart card for a logged-on user is removed from the smart card reader. @@ -1477,7 +1477,7 @@ Default: This policy is not defined, which means that the system treats it as No On Windows Vista and above: For this setting to work, the Smart Card Removal Policy service must be started. - +
            @@ -1485,7 +1485,7 @@ On Windows Vista and above: For this setting to work, the Smart Card Removal Pol **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways** - + @@ -1507,8 +1507,8 @@ On Windows Vista and above: For this setting to work, the Smart Card Removal Pol
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1516,8 +1516,8 @@ On Windows Vista and above: For this setting to work, the Smart Card Removal Pol
            - - + + Microsoft network client: Digitally sign communications (always) This security setting determines whether packet signing is required by the SMB client component. @@ -1542,7 +1542,7 @@ Microsoft network server: Digitally sign communications (if client agrees) - Con SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors. For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
            @@ -1550,7 +1550,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees** - + @@ -1572,8 +1572,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1581,8 +1581,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            - - + + Microsoft network client: Digitally sign communications (if server agrees) This security setting determines whether the SMB client attempts to negotiate SMB packet signing. @@ -1604,7 +1604,7 @@ If both client-side and server-side SMB signing is enabled and the client establ SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors. This setting only applies to SMB 1.0 connections. For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
            @@ -1612,7 +1612,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers** - + @@ -1634,8 +1634,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1643,8 +1643,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            - - + + Microsoft network client: Send unencrypted password to connect to third-party SMB servers If this security setting is enabled, the Server Message Block (SMB) redirector is allowed to send plaintext passwords to non-Microsoft SMB servers that do not support password encryption during authentication. @@ -1653,7 +1653,7 @@ Sending unencrypted passwords is a security risk. Default: Disabled. - +
            @@ -1661,7 +1661,7 @@ Default: Disabled. **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession** - + @@ -1683,8 +1683,8 @@ Default: Disabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1692,8 +1692,8 @@ Default: Disabled.
            - - + + Microsoft network server: Amount of idle time required before suspending a session This security setting determines the amount of continuous idle time that must pass in a Server Message Block (SMB) session before the session is suspended due to inactivity. @@ -1704,7 +1704,7 @@ For this policy setting, a value of 0 means to disconnect an idle session as qui Default:This policy is not defined, which means that the system treats it as 15 minutes for servers and undefined for workstations. - +
            @@ -1712,7 +1712,7 @@ Default:This policy is not defined, which means that the system treats it as 15 **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways** - + @@ -1734,8 +1734,8 @@ Default:This policy is not defined, which means that the system treats it as 15
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1743,8 +1743,8 @@ Default:This policy is not defined, which means that the system treats it as 15
            - - + + Microsoft network server: Digitally sign communications (always) This security setting determines whether packet signing is required by the SMB server component. @@ -1778,7 +1778,7 @@ For Windows 2000 servers to negotiate signing with Windows NT 4.0 clients, the f HKLM\System\CurrentControlSet\Services\lanmanserver\parameters\enableW9xsecuritysignature For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
            @@ -1786,7 +1786,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees** - + @@ -1808,8 +1808,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1817,8 +1817,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            - - + + Microsoft network server: Digitally sign communications (if client agrees) This security setting determines whether the SMB server will negotiate SMB packet signing with clients that request it. @@ -1844,7 +1844,7 @@ If both client-side and server-side SMB signing is enabled and the client establ SMB packet signing can significantly degrade SMB performance, depending on dialect version, OS version, file sizes, processor offloading capabilities, and application IO behaviors. This setting only applies to SMB 1.0 connections. For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
            @@ -1852,7 +1852,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts** - + @@ -1874,8 +1874,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1883,8 +1883,8 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136.
            - - + + Network access: Do not allow anonymous enumeration of SAM accounts This security setting determines what additional permissions will be granted for anonymous connections to the computer. @@ -1903,7 +1903,7 @@ Important This policy has no impact on domain controllers. - +
            @@ -1911,7 +1911,7 @@ This policy has no impact on domain controllers. **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares** - + @@ -1933,8 +1933,8 @@ This policy has no impact on domain controllers.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1942,8 +1942,8 @@ This policy has no impact on domain controllers.
            - - + + Network access: Do not allow anonymous enumeration of SAM accounts and shares This security setting determines whether anonymous enumeration of SAM accounts and shares is allowed. @@ -1952,7 +1952,7 @@ Windows allows anonymous users to perform certain activities, such as enumeratin Default: Disabled. - +
            @@ -1960,7 +1960,7 @@ Default: Disabled. **LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers** - + @@ -1982,8 +1982,8 @@ Default: Disabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1991,8 +1991,8 @@ Default: Disabled.
            - - + + Network access: Let Everyone permissions apply to anonymous users This security setting determines what additional permissions are granted for anonymous connections to the computer. @@ -2003,7 +2003,7 @@ If this policy is enabled, the Everyone SID is added to the token that is create Default: Disabled. - +
            @@ -2011,7 +2011,7 @@ Default: Disabled. **LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares** - + @@ -2033,8 +2033,8 @@ Default: Disabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2042,8 +2042,8 @@ Default: Disabled.
            - - + + Network access: Restrict anonymous access to Named Pipes and Shares When enabled, this security setting restricts anonymous access to shares and pipes to the settings for: @@ -2052,7 +2052,7 @@ Network access: Named pipes that can be accessed anonymously Network access: Shares that can be accessed anonymously Default: Enabled. - +
            @@ -2060,7 +2060,7 @@ Default: Enabled. **LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM** - + @@ -2082,8 +2082,8 @@ Default: Enabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2091,8 +2091,8 @@ Default: Enabled.
            - - + + Network access: Restrict clients allowed to make remote calls to SAM This policy setting allows you to restrict remote rpc connections to SAM. @@ -2101,7 +2101,7 @@ If not selected, the default security descriptor will be used. This policy is supported on at least Windows Server 2016. - +
            @@ -2109,7 +2109,7 @@ This policy is supported on at least Windows Server 2016. **LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM** - + @@ -2131,8 +2131,8 @@ This policy is supported on at least Windows Server 2016.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2140,8 +2140,8 @@ This policy is supported on at least Windows Server 2016.
            - - + + Network security: Allow Local System to use computer identity for NTLM This policy setting allows Local System services that use Negotiate to use the computer identity when reverting to NTLM authentication. @@ -2158,7 +2158,7 @@ This policy is supported on at least Windows Vista or Windows Server 2008. Note: Windows Vista or Windows Server 2008 do not expose this setting in Group Policy. - +
            @@ -2166,7 +2166,7 @@ Note: Windows Vista or Windows Server 2008 do not expose this setting in Group P **LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests** - + @@ -2188,8 +2188,8 @@ Note: Windows Vista or Windows Server 2008 do not expose this setting in Group P
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2197,8 +2197,8 @@ Note: Windows Vista or Windows Server 2008 do not expose this setting in Group P
            - - + + Network security: Allow PKU2U authentication requests to this computer to use online identities. This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. @@ -2209,7 +2209,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2217,7 +2217,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange** - + @@ -2239,8 +2239,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2248,8 +2248,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Network security: Do not store LAN Manager hash value on next password change This security setting determines if, at the next password change, the LAN Manager (LM) hash value for the new password is stored. The LM hash is relatively weak and prone to attack, as compared with the cryptographically stronger Windows NT hash. Since the LM hash is stored on the local computer in the security database the passwords can be compromised if the security database is attacked. @@ -2263,7 +2263,7 @@ Important Windows 2000 Service Pack 2 (SP2) and above offer compatibility with authentication to previous versions of Windows, such as Microsoft Windows NT 4.0. This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP, and the Windows Server 2003 family to communicate with computers running Windows 95 and Windows 98. - +
            @@ -2271,7 +2271,7 @@ This setting can affect the ability of computers running Windows 2000 Server, Wi **LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel** - + @@ -2293,8 +2293,8 @@ This setting can affect the ability of computers running Windows 2000 Server, Wi
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2302,8 +2302,8 @@ This setting can affect the ability of computers running Windows 2000 Server, Wi
            - - + + Network security LAN Manager authentication level This security setting determines which challenge/response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers as follows: @@ -2332,7 +2332,7 @@ Windows Server 2003: Send NTLM response only Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only - +
            @@ -2340,7 +2340,7 @@ Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients** - + @@ -2362,8 +2362,8 @@ Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2371,8 +2371,8 @@ Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send
            - - + + Network security: Minimum session security for NTLM SSP based (including secure RPC) clients This security setting allows a client to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: @@ -2386,7 +2386,7 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - +
            @@ -2394,7 +2394,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers** - + @@ -2416,8 +2416,8 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2425,8 +2425,8 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
            - - + + Network security: Minimum session security for NTLM SSP based (including secure RPC) servers This security setting allows a server to require the negotiation of 128-bit encryption and/or NTLMv2 session security. These values are dependent on the LAN Manager Authentication Level security setting value. The options are: @@ -2440,7 +2440,7 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - +
            @@ -2448,7 +2448,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption **LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** - + @@ -2470,8 +2470,8 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption
            Home
            - - + + Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. @@ -2483,7 +2483,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2491,7 +2491,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** - + @@ -2513,8 +2513,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2522,8 +2522,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Shutdown: Allow system to be shut down without having to log on This security setting determines whether a computer can be shut down without having to log on to Windows. @@ -2540,7 +2540,7 @@ Valid values: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2548,7 +2548,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile** - + @@ -2570,8 +2570,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2579,8 +2579,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + Shutdown: Clear virtual memory pagefile This security setting determines whether the virtual memory pagefile is cleared when the system is shut down. @@ -2591,7 +2591,7 @@ When this policy is enabled, it causes the system pagefile to be cleared upon cl Default: Disabled. - +
            @@ -2599,7 +2599,7 @@ Default: Disabled. **LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems** - + @@ -2621,8 +2621,8 @@ Default: Disabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2630,8 +2630,8 @@ Default: Disabled.
            - - + + System objects: Require case insensitivity for non-Windows subsystems This security setting determines whether case insensitivity is enforced for all subsystems. The Win32 subsystem is case insensitive. However, the kernel supports case sensitivity for other subsystems, such as POSIX. @@ -2640,7 +2640,7 @@ If this setting is enabled, case insensitivity is enforced for all directory obj Default: Enabled. - +
            @@ -2648,7 +2648,7 @@ Default: Enabled. **LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** - + @@ -2670,8 +2670,8 @@ Default: Enabled.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2679,8 +2679,8 @@ Default: Enabled.
            - - + + User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. This policy setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts used by a standard user. @@ -2696,7 +2696,7 @@ The secure desktop can be disabled only by the user of the interactive desktop o Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2704,7 +2704,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** - + @@ -2726,8 +2726,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2735,8 +2735,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode This policy setting controls the behavior of the elevation prompt for administrators. @@ -2757,7 +2757,7 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2765,7 +2765,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** - + @@ -2787,8 +2787,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2796,14 +2796,14 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Behavior of the elevation prompt for standard users This policy setting controls the behavior of the elevation prompt for standard users. Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: @@ -2819,7 +2819,7 @@ The following list shows the supported values: **LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation** - + @@ -2841,8 +2841,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2850,8 +2850,8 @@ The following list shows the supported values:
            - - + + User Account Control: Detect application installations and prompt for elevation This policy setting controls the behavior of application installation detection for the computer. @@ -2862,7 +2862,7 @@ Enabled: (Default) When an application installation package is detected that req Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. - +
            @@ -2870,7 +2870,7 @@ Disabled: Application installation packages are not detected and prompted for el **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** - + @@ -2892,8 +2892,8 @@ Disabled: Application installation packages are not detected and prompted for el
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2901,8 +2901,8 @@ Disabled: Application installation packages are not detected and prompted for el
            - - + + User Account Control: Only elevate executable files that are signed and validated This policy setting enforces public key infrastructure (PKI) signature checks for any interactive applications that request elevation of privilege. Enterprise administrators can control which applications are allowed to run by adding certificates to the Trusted Publishers certificate store on local computers. @@ -2913,7 +2913,7 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2921,7 +2921,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** - + @@ -2943,8 +2943,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2952,8 +2952,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Only elevate UIAccess applications that are installed in secure locations This policy setting controls whether applications that request to run with a User Interface Accessibility (UIAccess) integrity level must reside in a secure location in the file system. Secure locations are limited to the following: @@ -2970,7 +2970,7 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -2978,7 +2978,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode** - + @@ -3000,8 +3000,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3009,8 +3009,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Turn on Admin Approval Mode This policy setting controls the behavior of all User Account Control (UAC) policy settings for the computer. If you change this policy setting, you must restart your computer. @@ -3022,7 +3022,7 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -3030,7 +3030,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** - + @@ -3052,8 +3052,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3061,8 +3061,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Switch to the secure desktop when prompting for elevation This policy setting controls whether the elevation request prompt is displayed on the interactive user's desktop or the secure desktop. @@ -3073,7 +3073,7 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -3081,7 +3081,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. **LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode** - + @@ -3103,8 +3103,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3112,8 +3112,8 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete.
            - - + + User Account Control: Use Admin Approval Mode for the built-in Administrator account This policy setting controls the behavior of Admin Approval Mode for the built-in Administrator account. @@ -3124,7 +3124,7 @@ The options are: • Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. - +
            @@ -3132,7 +3132,7 @@ The options are: **LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** - + @@ -3154,8 +3154,8 @@ The options are:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3163,15 +3163,15 @@ The options are:
            - - + + User Account Control: Virtualize file and registry write failures to per-user locations This policy setting controls whether application write failures are redirected to defined registry and file system locations. This policy setting mitigates applications that run as administrator and write run-time application data to %ProgramFiles%, %Windir%, %Windir%\system32, or HKLM\Software. Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index 3863b5f6b1..533c3d2f12 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Location/EnableLocation** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. Optional policy that allows for IT admin to preconfigure whether or not Location Service's Device Switch is enabled or disabled for the device. Setting this policy is not required for Location Services to function. This policy controls a device wide state that affects all users, apps, and services ability to find the device's latitude and longitude on a map. There is a separate user switch that defines whether the location service is allowed to retrieve a position for the current user. In order to retrieve a position for a specific user, both the Device Switch and the User Switch must be enabled. If either is disabled, positions cannot be retrieved for the user. The user can later change both the User Switch and the Device Switch through the user interface on the Settings -> Privacy -> Location page. > [!IMPORTANT] @@ -78,7 +78,7 @@ To validate on Desktop, do the following: 1. Verify that Settings -> Privacy -> Location -> Location for this device is On/Off as expected. 2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. - +
            diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index e5f5ea3c9f..d42f28adb1 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **LockDown/AllowEdgeSwipe** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,13 +61,13 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Allows the user to invoke any system user interface by swiping in from any screen edge using touch. The easiest way to verify the policy is to restart the explorer process or to reboot after the policy is applied. And then try to swipe from the right edge of the screen. The desired result is for Action Center to not be invoked by the swipe. You can also enter tablet mode and attempt to swipe from the top of the screen to rearrange. That will also be disabled. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index 31f6725776..178bc58f12 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **Maps/AllowOfflineMapsDownloadOverMeteredConnection** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,13 +64,13 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Allows the download and update of map data over metered connections. After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. - + The following list shows the supported values: @@ -86,7 +86,7 @@ The following list shows the supported values: **Maps/EnableOfflineMapsAutoUpdate** - + @@ -108,8 +108,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -117,13 +117,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Disables the automatic download and update of map data. After the policy is applied, you can verify the settings in the user interface in **System** > **Offline Maps**. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index 9d52633f18..a7f3f8050a 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **Messaging/AllowMMS** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -79,7 +79,7 @@ The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. - +
            @@ -87,7 +87,7 @@ The following list shows the supported values: **Messaging/AllowMessageSync** - + @@ -109,8 +109,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -118,8 +118,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. The following list shows the supported values: @@ -127,7 +127,7 @@ The following list shows the supported values: - 0 - message sync is not allowed and cannot be changed by the user. - 1 - message sync is allowed. The user can change this setting. - +
            @@ -135,7 +135,7 @@ The following list shows the supported values: **Messaging/AllowRCS** - + @@ -157,8 +157,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -166,8 +166,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -178,7 +178,7 @@ The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. - +
            diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index 63b61350a9..bbbe2fb3fa 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -51,7 +51,7 @@ ms.date: 01/29/2018 **NetworkIsolation/EnterpriseCloudResources** - + @@ -73,8 +73,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -82,11 +82,11 @@ ms.date: 01/29/2018
            - - + + Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. - +
            @@ -94,7 +94,7 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to **NetworkIsolation/EnterpriseIPRange** - + @@ -116,8 +116,8 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -125,11 +125,11 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to
            - - + + Sets the enterprise IP ranges that define the computers in the enterprise network. Data that comes from those computers will be considered part of the enterprise and protected. These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of IPv4 and IPv6 ranges. - + For example: @@ -150,7 +150,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff **NetworkIsolation/EnterpriseIPRangesAreAuthoritative** - + @@ -172,8 +172,8 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -181,11 +181,11 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
            - - + + Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. - +
            @@ -193,7 +193,7 @@ Boolean value that tells the client to accept the configured list and not to use **NetworkIsolation/EnterpriseInternalProxyServers** - + @@ -215,8 +215,8 @@ Boolean value that tells the client to accept the configured list and not to use
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -224,11 +224,11 @@ Boolean value that tells the client to accept the configured list and not to use
            - - + + This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. - +
            @@ -236,7 +236,7 @@ This is the comma-separated list of internal proxy servers. For example "157.54. **NetworkIsolation/EnterpriseNetworkDomainNames** - + @@ -258,8 +258,8 @@ This is the comma-separated list of internal proxy servers. For example "157.54.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -267,8 +267,8 @@ This is the comma-separated list of internal proxy servers. For example "157.54.
            - - + + This is the list of domains that comprise the boundaries of the enterprise. Data from one of these domains that is sent to a device will be considered enterprise data and protected These locations will be considered a safe destination for enterprise data to be shared to. This is a comma-separated list of domains, for example "contoso.sharepoint.com, Fabrikam.com". > [!NOTE] @@ -281,7 +281,7 @@ Here are the steps to create canonical domain names: 2. Call [IdnToAscii](https://msdn.microsoft.com/library/windows/desktop/dd318149.aspx) with IDN\_USE\_STD3\_ASCII\_RULES as the flags. 3. Call [IdnToUnicode](https://msdn.microsoft.com/library/windows/desktop/dd318151.aspx) with no flags set (dwFlags = 0). - +
            @@ -289,7 +289,7 @@ Here are the steps to create canonical domain names: **NetworkIsolation/EnterpriseProxyServers** - + @@ -311,8 +311,8 @@ Here are the steps to create canonical domain names:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -320,11 +320,11 @@ Here are the steps to create canonical domain names:
            - - + + This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". - +
            @@ -332,7 +332,7 @@ This is a comma-separated list of proxy servers. Any server on this list is cons **NetworkIsolation/EnterpriseProxyServersAreAuthoritative** - + @@ -354,8 +354,8 @@ This is a comma-separated list of proxy servers. Any server on this list is cons
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -363,11 +363,11 @@ This is a comma-separated list of proxy servers. Any server on this list is cons
            - - + + Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. - +
            @@ -375,7 +375,7 @@ Boolean value that tells the client to accept the configured list of proxies and **NetworkIsolation/NeutralResources** - + @@ -397,8 +397,8 @@ Boolean value that tells the client to accept the configured list of proxies and
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -406,11 +406,11 @@ Boolean value that tells the client to accept the configured list of proxies and
            - - + + List of domain names that can used for work or personal resource. - +
            diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index 3086806c49..767c680221 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Notifications/DisallowNotificationMirroring** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,15 +61,15 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Boolean value that turns off notification mirroring. For each user logged into the device, if you enable this policy (set value to 1) the app and system notifications received by this user on this device will not get mirrored to other devices of the same logged in user. If you disable or do not configure this policy (set value to 0) the notifications received by this user on this device will be mirrored to other devices of the same logged in user. This feature can be turned off by apps that do not want to participate in Notification Mirroring. This feature can also be turned off by the user in the Cortana setting page. No reboot or service restart is required for this policy to take effect. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index ac601b4c93..8de63327aa 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -54,7 +54,7 @@ ms.date: 01/29/2018 **Power/AllowStandbyWhenSleepingPluggedIn** - + @@ -76,8 +76,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -85,15 +85,15 @@ ms.date: 01/29/2018
            - - + + This policy setting manages whether or not Windows is allowed to use standby states when putting the computer in a sleep state. If you enable or do not configure this policy setting, Windows uses standby states to put the computer in a sleep state. If you disable this policy setting, standby states (S1-S3) are not allowed. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -101,14 +101,14 @@ If you disable this policy setting, standby states (S1-S3) are not allowed. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow standby states (S1-S3) when sleeping (plugged in)* - GP name: *AllowStandbyStatesAC_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -116,7 +116,7 @@ ADMX Info: **Power/DisplayOffTimeoutOnBattery** - + @@ -138,8 +138,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -147,8 +147,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Turn off the display (on battery). This policy setting allows you to specify the period of inactivity before Windows turns off the display. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. @@ -157,7 +157,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -165,14 +165,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off the display (on battery)* - GP name: *VideoPowerDownTimeOutDC_2* - GP path: *System/Power Management/Video and Display Settings* - GP ADMX file name: *power.admx* - +
            @@ -180,7 +180,7 @@ ADMX Info: **Power/DisplayOffTimeoutPluggedIn** - + @@ -202,8 +202,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -211,8 +211,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Turn off the display (plugged in). This policy setting allows you to specify the period of inactivity before Windows turns off the display. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows turns off the display. @@ -221,7 +221,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the display from turning off. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -229,14 +229,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off the display (plugged in)* - GP name: *VideoPowerDownTimeOutAC_2* - GP path: *System/Power Management/Video and Display Settings* - GP ADMX file name: *power.admx* - +
            @@ -244,7 +244,7 @@ ADMX Info: **Power/HibernateTimeoutOnBattery** - + @@ -266,8 +266,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -275,8 +275,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Specify the system hibernate timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. @@ -286,7 +286,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -294,14 +294,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the system hibernate timeout (on battery)* - GP name: *DCHibernateTimeOut_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -309,7 +309,7 @@ ADMX Info: **Power/HibernateTimeoutPluggedIn** - + @@ -331,8 +331,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -340,8 +340,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Specify the system hibernate timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to hibernate. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to hibernate. @@ -350,7 +350,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -358,14 +358,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the system hibernate timeout (plugged in)* - GP name: *ACHibernateTimeOut_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -373,7 +373,7 @@ ADMX Info: **Power/RequirePasswordWhenComputerWakesOnBattery** - + @@ -395,8 +395,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -404,15 +404,15 @@ ADMX Info:
            - - + + This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -420,14 +420,14 @@ If you disable this policy setting, the user is not prompted for a password when > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Require a password when a computer wakes (on battery)* - GP name: *DCPromptForPasswordOnResume_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -435,7 +435,7 @@ ADMX Info: **Power/RequirePasswordWhenComputerWakesPluggedIn** - + @@ -457,8 +457,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -466,15 +466,15 @@ ADMX Info:
            - - + + This policy setting specifies whether or not the user is prompted for a password when the system resumes from sleep. If you enable or do not configure this policy setting, the user is prompted for a password when the system resumes from sleep. If you disable this policy setting, the user is not prompted for a password when the system resumes from sleep. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -482,14 +482,14 @@ If you disable this policy setting, the user is not prompted for a password when > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Require a password when a computer wakes (plugged in)* - GP name: *ACPromptForPasswordOnResume_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -497,7 +497,7 @@ ADMX Info: **Power/StandbyTimeoutOnBattery** - + @@ -519,8 +519,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -528,8 +528,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Specify the system sleep timeout (on battery). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. @@ -538,7 +538,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -546,14 +546,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the system sleep timeout (on battery)* - GP name: *DCStandbyTimeOut_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            @@ -561,7 +561,7 @@ ADMX Info: **Power/StandbyTimeoutPluggedIn** - + @@ -583,8 +583,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -592,8 +592,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1709. Specify the system sleep timeout (plugged in). This policy setting allows you to specify the period of inactivity before Windows transitions the system to sleep. If you enable this policy setting, you must provide a value, in seconds, indicating how much idle time should elapse before Windows transitions to sleep. @@ -602,7 +602,7 @@ If you disable or do not configure this policy setting, users control this setti If the user has configured a slide show to run on the lock screen when the machine is locked, this can prevent the sleep transition from occuring. The "Prevent enabling lock screen slide show" (DeviceLock/PreventLockScreenSlideShow) policy setting can be used to disable the slide show feature. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -610,14 +610,14 @@ If the user has configured a slide show to run on the lock screen when the machi > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify the system sleep timeout (plugged in)* - GP name: *ACStandbyTimeOut_2* - GP path: *System/Power Management/Sleep Settings* - GP ADMX file name: *power.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index dc79350f3f..e6535304b1 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **Printers/PointAndPrintRestrictions** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            - - + + This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. If you enable this policy setting: @@ -88,7 +88,7 @@ If you disable this policy setting: -Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. -The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -96,14 +96,14 @@ If you disable this policy setting: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Point and Print Restrictions* - GP name: *PointAndPrint_Restrictions_Win7* - GP path: *Printers* - GP ADMX file name: *Printing.admx* - +
            @@ -111,7 +111,7 @@ ADMX Info: **Printers/PointAndPrintRestrictions_User** - + @@ -133,8 +133,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -142,8 +142,8 @@ ADMX Info:
            - - + + This policy setting controls the client Point and Print behavior, including the security prompts for Windows Vista computers. The policy setting applies only to non-Print Administrator clients, and only to computers that are members of a domain. If you enable this policy setting: @@ -163,7 +163,7 @@ If you disable this policy setting: -Windows Server 2003 and Windows XP client computers can create a printer connection to any server using Point and Print. -The "Users can only point and print to computers in their forest" setting applies only to Windows Server 2003 and Windows XP SP1 (and later service packs). - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -171,14 +171,14 @@ If you disable this policy setting: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Point and Print Restrictions* - GP name: *PointAndPrint_Restrictions* - GP path: *Control Panel/Printers* - GP ADMX file name: *Printing.admx* - +
            @@ -186,7 +186,7 @@ ADMX Info: **Printers/PublishPrinters** - + @@ -208,8 +208,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -217,8 +217,8 @@ ADMX Info:
            - - + + Determines whether the computer's shared printers can be published in Active Directory. If you enable this setting or do not configure it, users can use the "List in directory" option in the Printer's Properties' Sharing tab to publish shared printers in Active Directory. @@ -227,7 +227,7 @@ If you disable this setting, this computer's shared printers cannot be published Note: This settings takes priority over the setting "Automatically publish new printers in the Active Directory". - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -235,14 +235,14 @@ Note: This settings takes priority over the setting "Automatically publish new p > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow printers to be published* - GP name: *PublishPrinters* - GP path: *Printers* - GP ADMX file name: *Printing2.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 8cc054a89b..79f182b572 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -258,7 +258,7 @@ ms.date: 01/29/2018 **Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** - + @@ -280,8 +280,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -289,8 +289,8 @@ ms.date: 01/29/2018
            - - + + Allows or disallows the automatic acceptance of the pairing and privacy user consent dialog when launching apps. > [!Note] @@ -299,7 +299,7 @@ Allows or disallows the automatic acceptance of the pairing and privacy user con Most restricted value is 0. - + The following list shows the supported values: @@ -314,7 +314,7 @@ The following list shows the supported values: **Privacy/AllowInputPersonalization** - + @@ -336,8 +336,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -345,13 +345,13 @@ The following list shows the supported values:
            - - + + Updated in Windows 10, version 1709. Allows the usage of cloud based speech services for Cortana, dictation, or Store applications. Setting this policy to 1, lets Microsoft use the user's voice data to improve cloud speech services for all users. Most restricted value is 0. - + The following list shows the supported values: @@ -366,7 +366,7 @@ The following list shows the supported values: **Privacy/DisableAdvertisingId** - + @@ -388,8 +388,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -397,13 +397,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Enables or disables the Advertising ID. Most restricted value is 0. - + The following list shows the supported values: @@ -419,7 +419,7 @@ The following list shows the supported values: **Privacy/EnableActivityFeed** - + @@ -441,8 +441,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -450,11 +450,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Allows IT Admins to allow Apps/OS to publish to the activity feed. - + The following list shows the supported values: @@ -469,7 +469,7 @@ The following list shows the supported values: **Privacy/LetAppsAccessAccountInfo** - + @@ -491,8 +491,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -500,8 +500,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. The following list shows the supported values: @@ -512,7 +512,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -520,7 +520,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** - + @@ -542,8 +542,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -551,11 +551,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
            @@ -563,7 +563,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** - + @@ -585,8 +585,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -594,11 +594,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
            @@ -606,7 +606,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** - + @@ -628,8 +628,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -637,11 +637,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
            @@ -649,7 +649,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCalendar** - + @@ -671,8 +671,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -680,8 +680,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. The following list shows the supported values: @@ -692,7 +692,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -700,7 +700,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** - + @@ -722,8 +722,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -731,11 +731,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
            @@ -743,7 +743,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** - + @@ -765,8 +765,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -774,11 +774,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
            @@ -786,7 +786,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** - + @@ -808,8 +808,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -817,11 +817,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
            @@ -829,7 +829,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCallHistory** - + @@ -851,8 +851,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -860,8 +860,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. The following list shows the supported values: @@ -872,7 +872,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -880,7 +880,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** - + @@ -902,8 +902,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -911,11 +911,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
            @@ -923,7 +923,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** - + @@ -945,8 +945,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -954,11 +954,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
            @@ -966,7 +966,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** - + @@ -988,8 +988,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -997,11 +997,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
            @@ -1009,7 +1009,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCamera** - + @@ -1031,8 +1031,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1040,8 +1040,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. The following list shows the supported values: @@ -1052,7 +1052,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1060,7 +1060,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessCamera_ForceAllowTheseApps** - + @@ -1082,8 +1082,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1091,11 +1091,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
            @@ -1103,7 +1103,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCamera_ForceDenyTheseApps** - + @@ -1125,8 +1125,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1134,11 +1134,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
            @@ -1146,7 +1146,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** - + @@ -1168,8 +1168,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1177,11 +1177,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
            @@ -1189,7 +1189,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessContacts** - + @@ -1211,8 +1211,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1220,8 +1220,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. The following list shows the supported values: @@ -1232,7 +1232,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1240,7 +1240,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessContacts_ForceAllowTheseApps** - + @@ -1262,8 +1262,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1271,11 +1271,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
            @@ -1283,7 +1283,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessContacts_ForceDenyTheseApps** - + @@ -1305,8 +1305,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1314,11 +1314,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
            @@ -1326,7 +1326,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** - + @@ -1348,8 +1348,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1357,11 +1357,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
            @@ -1369,7 +1369,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessEmail** - + @@ -1391,8 +1391,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1400,8 +1400,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access email. The following list shows the supported values: @@ -1412,7 +1412,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1420,7 +1420,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessEmail_ForceAllowTheseApps** - + @@ -1442,8 +1442,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1451,11 +1451,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
            @@ -1463,7 +1463,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessEmail_ForceDenyTheseApps** - + @@ -1485,8 +1485,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1494,11 +1494,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
            @@ -1506,7 +1506,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** - + @@ -1528,8 +1528,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1537,11 +1537,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
            @@ -1549,7 +1549,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessLocation** - + @@ -1571,8 +1571,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1580,8 +1580,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access location. The following list shows the supported values: @@ -1592,7 +1592,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1600,7 +1600,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessLocation_ForceAllowTheseApps** - + @@ -1622,8 +1622,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1631,11 +1631,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
            @@ -1643,7 +1643,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessLocation_ForceDenyTheseApps** - + @@ -1665,8 +1665,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1674,11 +1674,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
            @@ -1686,7 +1686,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** - + @@ -1708,8 +1708,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1717,11 +1717,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
            @@ -1729,7 +1729,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMessaging** - + @@ -1751,8 +1751,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1760,8 +1760,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). The following list shows the supported values: @@ -1772,7 +1772,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1780,7 +1780,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** - + @@ -1802,8 +1802,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1811,11 +1811,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
            @@ -1823,7 +1823,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** - + @@ -1845,8 +1845,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1854,11 +1854,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
            @@ -1866,7 +1866,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** - + @@ -1888,8 +1888,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1897,11 +1897,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
            @@ -1909,7 +1909,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMicrophone** - + @@ -1931,8 +1931,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1940,8 +1940,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. The following list shows the supported values: @@ -1952,7 +1952,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -1960,7 +1960,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** - + @@ -1982,8 +1982,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1991,11 +1991,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
            @@ -2003,7 +2003,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** - + @@ -2025,8 +2025,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2034,11 +2034,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
            @@ -2046,7 +2046,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** - + @@ -2068,8 +2068,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2077,11 +2077,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
            @@ -2089,7 +2089,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMotion** - + @@ -2111,8 +2111,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2120,8 +2120,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. The following list shows the supported values: @@ -2132,7 +2132,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -2140,7 +2140,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessMotion_ForceAllowTheseApps** - + @@ -2162,8 +2162,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2171,11 +2171,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
            @@ -2183,7 +2183,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMotion_ForceDenyTheseApps** - + @@ -2205,8 +2205,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2214,11 +2214,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
            @@ -2226,7 +2226,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** - + @@ -2248,8 +2248,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2257,11 +2257,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
            @@ -2269,7 +2269,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessNotifications** - + @@ -2291,8 +2291,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2300,8 +2300,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. The following list shows the supported values: @@ -2312,7 +2312,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -2320,7 +2320,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** - + @@ -2342,8 +2342,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2351,11 +2351,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
            @@ -2363,7 +2363,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** - + @@ -2385,8 +2385,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2394,11 +2394,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
            @@ -2406,7 +2406,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** - + @@ -2428,8 +2428,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2437,11 +2437,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
            @@ -2449,7 +2449,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessPhone** - + @@ -2471,8 +2471,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2480,8 +2480,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. The following list shows the supported values: @@ -2492,7 +2492,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -2500,7 +2500,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessPhone_ForceAllowTheseApps** - + @@ -2522,8 +2522,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2531,11 +2531,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
            @@ -2543,7 +2543,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessPhone_ForceDenyTheseApps** - + @@ -2565,8 +2565,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2574,11 +2574,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
            @@ -2586,7 +2586,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** - + @@ -2608,8 +2608,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2617,11 +2617,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
            @@ -2629,7 +2629,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessRadios** - + @@ -2651,8 +2651,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2660,8 +2660,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. The following list shows the supported values: @@ -2672,7 +2672,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -2680,7 +2680,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessRadios_ForceAllowTheseApps** - + @@ -2702,8 +2702,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2711,11 +2711,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
            @@ -2723,7 +2723,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessRadios_ForceDenyTheseApps** - + @@ -2745,8 +2745,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2754,11 +2754,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
            @@ -2766,7 +2766,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** - + @@ -2788,8 +2788,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2797,11 +2797,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
            @@ -2809,7 +2809,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessTasks** - + @@ -2831,8 +2831,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2840,11 +2840,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. - +
            @@ -2852,7 +2852,7 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas **Privacy/LetAppsAccessTasks_ForceAllowTheseApps** - + @@ -2874,8 +2874,8 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2883,11 +2883,11 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
            @@ -2895,7 +2895,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N **Privacy/LetAppsAccessTasks_ForceDenyTheseApps** - + @@ -2917,8 +2917,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2926,11 +2926,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
            @@ -2938,7 +2938,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N **Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** - + @@ -2960,8 +2960,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2969,11 +2969,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
            @@ -2981,7 +2981,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N **Privacy/LetAppsAccessTrustedDevices** - + @@ -3003,8 +3003,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3012,8 +3012,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. The following list shows the supported values: @@ -3024,7 +3024,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -3032,7 +3032,7 @@ Most restricted value is 2. **Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** - + @@ -3054,8 +3054,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3063,11 +3063,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
            @@ -3075,7 +3075,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** - + @@ -3097,8 +3097,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3106,11 +3106,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
            @@ -3118,7 +3118,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** - + @@ -3140,8 +3140,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3149,11 +3149,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
            @@ -3161,7 +3161,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsGetDiagnosticInfo** - + @@ -3183,8 +3183,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3192,8 +3192,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. The following list shows the supported values: @@ -3204,7 +3204,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -3212,7 +3212,7 @@ Most restricted value is 2. **Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** - + @@ -3234,8 +3234,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3243,11 +3243,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
            @@ -3255,7 +3255,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** - + @@ -3277,8 +3277,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3286,11 +3286,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
            @@ -3298,7 +3298,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** - + @@ -3320,8 +3320,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3329,11 +3329,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
            @@ -3341,7 +3341,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsRunInBackground** - + @@ -3363,8 +3363,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3372,8 +3372,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. The following list shows the supported values: @@ -3386,7 +3386,7 @@ Most restricted value is 2. > [!WARNING] > Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. - +
            @@ -3394,7 +3394,7 @@ Most restricted value is 2. **Privacy/LetAppsRunInBackground_ForceAllowTheseApps** - + @@ -3416,8 +3416,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3425,11 +3425,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
            @@ -3437,7 +3437,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsRunInBackground_ForceDenyTheseApps** - + @@ -3459,8 +3459,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3468,11 +3468,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
            @@ -3480,7 +3480,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** - + @@ -3502,8 +3502,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3511,11 +3511,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
            @@ -3523,7 +3523,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family **Privacy/LetAppsSyncWithDevices** - + @@ -3545,8 +3545,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3554,8 +3554,8 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. The following list shows the supported values: @@ -3566,7 +3566,7 @@ The following list shows the supported values: Most restricted value is 2. - +
            @@ -3574,7 +3574,7 @@ Most restricted value is 2. **Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** - + @@ -3596,8 +3596,8 @@ Most restricted value is 2.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3605,11 +3605,11 @@ Most restricted value is 2.
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
            @@ -3617,7 +3617,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** - + @@ -3639,8 +3639,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3648,11 +3648,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
            @@ -3660,7 +3660,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** - + @@ -3682,8 +3682,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3691,11 +3691,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
            @@ -3703,7 +3703,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family **Privacy/PublishUserActivities** - + @@ -3725,8 +3725,8 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -3734,11 +3734,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family
            - - + + Added in Windows 10, version 1709. Allows It Admins to enable publishing of user activities to the activity feed. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index b0b51ab819..25c6878ae9 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -39,7 +39,7 @@ ms.date: 01/29/2018 **RemoteAssistance/CustomizeWarningMessages** - + @@ -61,8 +61,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -70,8 +70,8 @@ ms.date: 01/29/2018
            - - + + This policy setting lets you customize warning messages. The "Display warning message before sharing control" policy setting allows you to specify a custom message to display before a user shares control of his or her computer. @@ -84,7 +84,7 @@ If you disable this policy setting, the user sees the default warning message. If you do not configure this policy setting, the user sees the default warning message. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -92,14 +92,14 @@ If you do not configure this policy setting, the user sees the default warning m > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Customize warning messages* - GP name: *RA_Options* - GP path: *System/Remote Assistance* - GP ADMX file name: *remoteassistance.admx* - +
            @@ -107,7 +107,7 @@ ADMX Info: **RemoteAssistance/SessionLogging** - + @@ -129,8 +129,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -138,8 +138,8 @@ ADMX Info:
            - - + + This policy setting allows you to turn logging on or off. Log files are located in the user's Documents folder under Remote Assistance. If you enable this policy setting, log files are generated. @@ -148,7 +148,7 @@ If you disable this policy setting, log files are not generated. If you do not configure this setting, application-based settings are used. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -156,14 +156,14 @@ If you do not configure this setting, application-based settings are used. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn on session logging* - GP name: *RA_Logging* - GP path: *System/Remote Assistance* - GP ADMX file name: *remoteassistance.admx* - +
            @@ -171,7 +171,7 @@ ADMX Info: **RemoteAssistance/SolicitedRemoteAssistance** - + @@ -193,8 +193,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -202,8 +202,8 @@ ADMX Info:
            - - + + This policy setting allows you to turn on or turn off Solicited (Ask for) Remote Assistance on this computer. If you enable this policy setting, users on this computer can use email or file transfer to ask someone for help. Also, users can use instant messaging programs to allow connections to this computer, and you can configure additional Remote Assistance settings. @@ -220,7 +220,7 @@ The "Select the method for sending email invitations" setting specifies which em If you enable this policy setting you should also enable appropriate firewall exceptions to allow Remote Assistance communications. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -228,14 +228,14 @@ If you enable this policy setting you should also enable appropriate firewall ex > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Configure Solicited Remote Assistance* - GP name: *RA_Solicit* - GP path: *System/Remote Assistance* - GP ADMX file name: *remoteassistance.admx* - +
            @@ -243,7 +243,7 @@ ADMX Info: **RemoteAssistance/UnsolicitedRemoteAssistance** - + @@ -265,8 +265,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -274,8 +274,8 @@ ADMX Info:
            - - + + This policy setting allows you to turn on or turn off Offer (Unsolicited) Remote Assistance on this computer. If you enable this policy setting, users on this computer can get help from their corporate technical support staff using Offer (Unsolicited) Remote Assistance. @@ -315,7 +315,7 @@ Port 135:TCP %WINDIR%\PCHealth\HelpCtr\Binaries\Helpctr.exe Allow Remote Desktop Exception - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -323,14 +323,14 @@ Allow Remote Desktop Exception > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Configure Offer Remote Assistance* - GP name: *RA_Unsolicit* - GP path: *System/Remote Assistance* - GP ADMX file name: *remoteassistance.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index 782ca41f12..1ff2a93cea 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -45,7 +45,7 @@ ms.date: 01/29/2018 **RemoteDesktopServices/AllowUsersToConnectRemotely** - + @@ -67,8 +67,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -76,8 +76,8 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to configure remote access to computers by using Remote Desktop Services. If you enable this policy setting, users who are members of the Remote Desktop Users group on the target computer can connect remotely to the target computer by using Remote Desktop Services. @@ -90,7 +90,7 @@ Note: You can limit which clients are able to connect remotely by using Remote D You can limit the number of users who can connect simultaneously by configuring the policy setting at Computer Configuration\Administrative Templates\Windows Components\Remote Desktop Services\Remote Desktop Session Host\Connections\Limit number of connections, or by configuring the policy setting Maximum Connections by using the Remote Desktop Session Host WMI Provider. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -98,14 +98,14 @@ You can limit the number of users who can connect simultaneously by configuring > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow users to connect remotely by using Remote Desktop Services* - GP name: *TS_DISABLE_CONNECTIONS* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Connections* - GP ADMX file name: *terminalserver.admx* - +
            @@ -113,7 +113,7 @@ ADMX Info: **RemoteDesktopServices/ClientConnectionEncryptionLevel** - + @@ -135,8 +135,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -144,8 +144,8 @@ ADMX Info:
            - - + + Specifies whether to require the use of a specific encryption level to secure communications between client computers and RD Session Host servers during Remote Desktop Protocol (RDP) connections. This policy only applies when you are using native RDP encryption. However, native RDP encryption (as opposed to SSL encryption) is not recommended. This policy does not apply to SSL encryption. If you enable this policy setting, all communications between clients and RD Session Host servers during remote connections must use the encryption method specified in this setting. By default, the encryption level is set to High. The following encryption methods are available: @@ -162,7 +162,7 @@ Important FIPS compliance can be configured through the System cryptography. Use FIPS compliant algorithms for encryption, hashing, and signing settings in Group Policy (under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options.) The FIPS compliant setting encrypts and decrypts data sent from the client to the server and from the server to the client, with the Federal Information Processing Standard (FIPS) 140 encryption algorithms, by using Microsoft cryptographic modules. Use this encryption level when communications between clients and RD Session Host servers requires the highest level of encryption. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -170,14 +170,14 @@ FIPS compliance can be configured through the System cryptography. Use FIPS comp > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Set client connection encryption level* - GP name: *TS_ENCRYPTION_POLICY* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* - GP ADMX file name: *terminalserver.admx* - +
            @@ -185,7 +185,7 @@ ADMX Info: **RemoteDesktopServices/DoNotAllowDriveRedirection** - + @@ -207,8 +207,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -216,8 +216,8 @@ ADMX Info:
            - - + + This policy setting specifies whether to prevent the mapping of client drives in a Remote Desktop Services session (drive redirection). By default, an RD Session Host server maps client drives automatically upon connection. Mapped drives appear in the session folder tree in File Explorer or Computer in the format on . You can use this policy setting to override this behavior. @@ -228,7 +228,7 @@ If you disable this policy setting, client drive redirection is always allowed. If you do not configure this policy setting, client drive redirection and Clipboard file copy redirection are not specified at the Group Policy level. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -236,14 +236,14 @@ If you do not configure this policy setting, client drive redirection and Clipbo > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not allow drive redirection* - GP name: *TS_CLIENT_DRIVE_M* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Device and Resource Redirection* - GP ADMX file name: *terminalserver.admx* - +
            @@ -251,7 +251,7 @@ ADMX Info: **RemoteDesktopServices/DoNotAllowPasswordSaving** - + @@ -273,8 +273,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -282,15 +282,15 @@ ADMX Info:
            - - + + Controls whether passwords can be saved on this computer from Remote Desktop Connection. If you enable this setting the password saving checkbox in Remote Desktop Connection will be disabled and users will no longer be able to save passwords. When a user opens an RDP file using Remote Desktop Connection and saves his settings, any password that previously existed in the RDP file will be deleted. If you disable this setting or leave it not configured, the user will be able to save passwords using Remote Desktop Connection. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -298,14 +298,14 @@ If you disable this setting or leave it not configured, the user will be able to > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not allow passwords to be saved* - GP name: *TS_CLIENT_DISABLE_PASSWORD_SAVING_2* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Connection Client* - GP ADMX file name: *terminalserver.admx* - +
            @@ -313,7 +313,7 @@ ADMX Info: **RemoteDesktopServices/PromptForPasswordUponConnection** - + @@ -335,8 +335,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -344,8 +344,8 @@ ADMX Info:
            - - + + This policy setting specifies whether Remote Desktop Services always prompts the client for a password upon connection. You can use this setting to enforce a password prompt for users logging on to Remote Desktop Services, even if they already provided the password in the Remote Desktop Connection client. @@ -358,7 +358,7 @@ If you disable this policy setting, users can always log on to Remote Desktop Se If you do not configure this policy setting, automatic logon is not specified at the Group Policy level. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -366,14 +366,14 @@ If you do not configure this policy setting, automatic logon is not specified at > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Always prompt for password upon connection* - GP name: *TS_PASSWORD* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* - GP ADMX file name: *terminalserver.admx* - +
            @@ -381,7 +381,7 @@ ADMX Info: **RemoteDesktopServices/RequireSecureRPCCommunication** - + @@ -403,8 +403,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -412,8 +412,8 @@ ADMX Info:
            - - + + Specifies whether a Remote Desktop Session Host server requires secure RPC communication with all clients or allows unsecured communication. You can use this setting to strengthen the security of RPC communication with clients by allowing only authenticated and encrypted requests. @@ -426,7 +426,7 @@ If the status is set to Not Configured, unsecured communication is allowed. Note: The RPC interface is used for administering and configuring Remote Desktop Services. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -434,14 +434,14 @@ Note: The RPC interface is used for administering and configuring Remote Desktop > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Require secure RPC communication* - GP name: *TS_RPC_ENCRYPTION* - GP path: *Windows Components/Remote Desktop Services/Remote Desktop Session Host/Security* - GP ADMX file name: *terminalserver.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index 176cd59211..762edfe54e 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -72,7 +72,7 @@ ms.date: 01/29/2018 **RemoteManagement/AllowBasicAuthentication_Client** - + @@ -94,8 +94,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -103,10 +103,10 @@ ms.date: 01/29/2018
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -114,14 +114,14 @@ ms.date: 01/29/2018 > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow Basic authentication* - GP name: *AllowBasic_2* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -129,7 +129,7 @@ ADMX Info: **RemoteManagement/AllowBasicAuthentication_Service** - + @@ -151,8 +151,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -160,10 +160,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -171,14 +171,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow Basic authentication* - GP name: *AllowBasic_1* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -186,7 +186,7 @@ ADMX Info: **RemoteManagement/AllowCredSSPAuthenticationClient** - + @@ -208,8 +208,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -217,10 +217,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -228,14 +228,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow CredSSP authentication* - GP name: *AllowCredSSP_2* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -243,7 +243,7 @@ ADMX Info: **RemoteManagement/AllowCredSSPAuthenticationService** - + @@ -265,8 +265,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -274,10 +274,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -285,14 +285,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow CredSSP authentication* - GP name: *AllowCredSSP_1* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -300,7 +300,7 @@ ADMX Info: **RemoteManagement/AllowRemoteServerManagement** - + @@ -322,8 +322,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -331,10 +331,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -342,14 +342,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow remote server management through WinRM* - GP name: *AllowAutoConfig* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -357,7 +357,7 @@ ADMX Info: **RemoteManagement/AllowUnencryptedTraffic_Client** - + @@ -379,8 +379,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -388,10 +388,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -399,14 +399,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow unencrypted traffic* - GP name: *AllowUnencrypted_2* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -414,7 +414,7 @@ ADMX Info: **RemoteManagement/AllowUnencryptedTraffic_Service** - + @@ -436,8 +436,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -445,10 +445,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -456,14 +456,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow unencrypted traffic* - GP name: *AllowUnencrypted_1* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -471,7 +471,7 @@ ADMX Info: **RemoteManagement/DisallowDigestAuthentication** - + @@ -493,8 +493,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -502,10 +502,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -513,14 +513,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disallow Digest authentication* - GP name: *DisallowDigest* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -528,7 +528,7 @@ ADMX Info: **RemoteManagement/DisallowNegotiateAuthenticationClient** - + @@ -550,8 +550,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -559,10 +559,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -570,14 +570,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disallow Negotiate authentication* - GP name: *DisallowNegotiate_2* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -585,7 +585,7 @@ ADMX Info: **RemoteManagement/DisallowNegotiateAuthenticationService** - + @@ -607,8 +607,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -616,10 +616,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -627,14 +627,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disallow Negotiate authentication* - GP name: *DisallowNegotiate_1* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -642,7 +642,7 @@ ADMX Info: **RemoteManagement/DisallowStoringOfRunAsCredentials** - + @@ -664,8 +664,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -673,10 +673,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -684,14 +684,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Disallow WinRM from storing RunAs credentials* - GP name: *DisableRunAs* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -699,7 +699,7 @@ ADMX Info: **RemoteManagement/SpecifyChannelBindingTokenHardeningLevel** - + @@ -721,8 +721,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -730,10 +730,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -741,14 +741,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify channel binding token hardening level* - GP name: *CBTHardeningLevel_1* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -756,7 +756,7 @@ ADMX Info: **RemoteManagement/TrustedHosts** - + @@ -778,8 +778,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -787,10 +787,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -798,14 +798,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Trusted Hosts* - GP name: *TrustedHosts* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Client* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -813,7 +813,7 @@ ADMX Info: **RemoteManagement/TurnOnCompatibilityHTTPListener** - + @@ -835,8 +835,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -844,10 +844,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -855,14 +855,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn On Compatibility HTTP Listener* - GP name: *HttpCompatibilityListener* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            @@ -870,7 +870,7 @@ ADMX Info: **RemoteManagement/TurnOnCompatibilityHTTPSListener** - + @@ -892,8 +892,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -901,10 +901,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -912,14 +912,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn On Compatibility HTTPS Listener* - GP name: *HttpsCompatibilityListener* - GP path: *Windows Components/Windows Remote Management (WinRM)/WinRM Service* - GP ADMX file name: *WindowsRemoteManagement.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index 7f7c9c2e4d..12189ebcb2 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **RemoteProcedureCall/RPCEndpointMapperClientAuthentication** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            - - + + This policy setting controls whether RPC clients authenticate with the Endpoint Mapper Service when the call they are making contains authentication information. The Endpoint Mapper Service on computers running Windows NT4 (all service packs) cannot process authentication information supplied in this manner. If you disable this policy setting, RPC clients will not authenticate to the Endpoint Mapper Service, but they will be able to communicate with the Endpoint Mapper Service on Windows NT4 Server. @@ -76,7 +76,7 @@ If you do not configure this policy setting, it remains disabled. RPC clients w Note: This policy will not be applied until the system is rebooted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -84,14 +84,14 @@ Note: This policy will not be applied until the system is rebooted. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Enable RPC Endpoint Mapper Client Authentication* - GP name: *RpcEnableAuthEpResolution* - GP path: *System/Remote Procedure Call* - GP ADMX file name: *rpc.admx* - +
            @@ -99,7 +99,7 @@ ADMX Info: **RemoteProcedureCall/RestrictUnauthenticatedRPCClients** - + @@ -121,8 +121,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -130,8 +130,8 @@ ADMX Info:
            - - + + This policy setting controls how the RPC server runtime handles unauthenticated RPC clients connecting to RPC servers. This policy setting impacts all RPC applications. In a domain environment this policy setting should be used with caution as it can impact a wide range of functionality including group policy processing itself. Reverting a change to this policy setting can require manual intervention on each affected machine. This policy setting should never be applied to a domain controller. @@ -150,7 +150,7 @@ If you enable this policy setting, it directs the RPC server runtime to restrict Note: This policy setting will not be applied until the system is rebooted. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -158,14 +158,14 @@ Note: This policy setting will not be applied until the system is rebooted. > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Restrict Unauthenticated RPC clients* - GP name: *RpcRestrictRemoteClients* - GP path: *System/Remote Procedure Call* - GP ADMX file name: *rpc.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index 3a66eb8677..bb014aba29 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -48,7 +48,7 @@ ms.date: 01/29/2018 **RemoteShell/AllowRemoteShellAccess** - + @@ -70,8 +70,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -79,10 +79,10 @@ ms.date: 01/29/2018
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -90,14 +90,14 @@ ms.date: 01/29/2018 > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Allow Remote Shell Access* - GP name: *AllowRemoteShellAccess* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -105,7 +105,7 @@ ADMX Info: **RemoteShell/MaxConcurrentUsers** - + @@ -127,8 +127,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -136,10 +136,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -147,14 +147,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *MaxConcurrentUsers* - GP name: *MaxConcurrentUsers* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -162,7 +162,7 @@ ADMX Info: **RemoteShell/SpecifyIdleTimeout** - + @@ -184,8 +184,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -193,10 +193,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -204,14 +204,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify idle Timeout* - GP name: *IdleTimeout* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -219,7 +219,7 @@ ADMX Info: **RemoteShell/SpecifyMaxMemory** - + @@ -241,8 +241,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -250,10 +250,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -261,14 +261,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify maximum amount of memory in MB per Shell* - GP name: *MaxMemoryPerShellMB* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -276,7 +276,7 @@ ADMX Info: **RemoteShell/SpecifyMaxProcesses** - + @@ -298,8 +298,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -307,10 +307,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -318,14 +318,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify maximum number of processes per Shell* - GP name: *MaxProcessesPerShell* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -333,7 +333,7 @@ ADMX Info: **RemoteShell/SpecifyMaxRemoteShells** - + @@ -355,8 +355,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -364,10 +364,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -375,14 +375,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify maximum number of remote shells per user* - GP name: *MaxShellsPerUser* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            @@ -390,7 +390,7 @@ ADMX Info: **RemoteShell/SpecifyShellTimeout** - + @@ -412,8 +412,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -421,10 +421,10 @@ ADMX Info:
            - - + + - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -432,14 +432,14 @@ ADMX Info: > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Specify Shell Timeout* - GP name: *ShellTimeOut* - GP path: *Windows Components/Windows Remote Shell* - GP ADMX file name: *WindowsRemoteShell.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index d992a30b6e..8a9ea5fa7c 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -71,7 +71,7 @@ ms.date: 01/29/2018 **Search/AllowCloudSearch** - + @@ -93,8 +93,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -102,8 +102,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. Allow search and Cortana to search cloud sources like OneDrive and SharePoint. This policy allows corporate administrators to control whether employees can turn off/on the search of these cloud sources. The default policy value is to allow employees access to the setting that controls search of cloud sources. The following list shows the supported values: @@ -111,7 +111,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -119,7 +119,7 @@ The following list shows the supported values: **Search/AllowCortanaInAAD** - + @@ -141,8 +141,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -150,11 +150,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. This specifies whether the Cortana consent page can appear in the Azure Active Directory (AAD) device out-of-box-experience (OOBE) flow. If this policy is left in its default state, Cortana will not be shown in the AAD OOBE flow. If you opt-in to this policy, then the Cortana consent page will appear in the AAD OOBE flow.. - + The following list shows the supported values: @@ -169,7 +169,7 @@ The following list shows the supported values: **Search/AllowIndexingEncryptedStoresOrItems** - + @@ -191,8 +191,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -200,8 +200,8 @@ The following list shows the supported values:
            - - + + Allows or disallows the indexing of items. This switch is for the Windows Search Indexer, which controls whether it will index items that are encrypted, such as the Windows Information Protection (WIP) protected files. When the policy is enabled, WIP protected items are indexed and the metadata about them are stored in an unencrypted location. The metadata includes things like file path and date modified. @@ -210,7 +210,7 @@ When the policy is disabled, the WIP protected items are not indexed and do not Most restricted value is 0. - + The following list shows the supported values: @@ -225,7 +225,7 @@ The following list shows the supported values: **Search/AllowSearchToUseLocation** - + @@ -247,8 +247,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -256,13 +256,13 @@ The following list shows the supported values:
            - - + + Specifies whether search can leverage location information. Most restricted value is 0. - + The following list shows the supported values: @@ -277,7 +277,7 @@ The following list shows the supported values: **Search/AllowStoringImagesFromVisionSearch** - + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -285,11 +285,11 @@ The following list shows the supported values:
            - - + + This policy has been deprecated. - +
            @@ -297,7 +297,7 @@ This policy has been deprecated. **Search/AllowUsingDiacritics** - + @@ -319,8 +319,8 @@ This policy has been deprecated.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -328,8 +328,8 @@ This policy has been deprecated.
            - - + + Allows the use of diacritics. The following list shows the supported values: @@ -339,7 +339,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -347,7 +347,7 @@ Most restricted value is 0. **Search/AllowWindowsIndexer** - + @@ -369,8 +369,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -378,11 +378,11 @@ Most restricted value is 0.
            - - + + Allow Windows indexer. Value type is integer. - +
            @@ -390,7 +390,7 @@ Allow Windows indexer. Value type is integer. **Search/AlwaysUseAutoLangDetection** - + @@ -412,8 +412,8 @@ Allow Windows indexer. Value type is integer.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -421,8 +421,8 @@ Allow Windows indexer. Value type is integer.
            - - + + Specifies whether to always use automatic language detection when indexing content and properties. The following list shows the supported values: @@ -432,7 +432,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -440,7 +440,7 @@ Most restricted value is 0. **Search/DisableBackoff** - + @@ -462,8 +462,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -471,8 +471,8 @@ Most restricted value is 0.
            - - + + If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. The following list shows the supported values: @@ -480,7 +480,7 @@ The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. - +
            @@ -488,7 +488,7 @@ The following list shows the supported values: **Search/DisableRemovableDriveIndexing** - + @@ -510,8 +510,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -519,8 +519,8 @@ The following list shows the supported values:
            - - + + This policy setting configures whether or not locations on removable drives can be added to libraries. If you enable this policy setting, locations on removable drives cannot be added to libraries. In addition, locations on removable drives cannot be indexed. @@ -532,7 +532,7 @@ The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. - +
            @@ -540,7 +540,7 @@ The following list shows the supported values: **Search/DoNotUseWebResults** - + @@ -562,8 +562,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -571,8 +571,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. Don't search the web or display web results in Search. This policy setting allows you to control whether or not Search can perform queries on the web, and if the web results are displayed in Search. @@ -580,7 +580,7 @@ If you enable this policy setting, queries won't be performed on the web and web If you disable this policy setting, queries will be performed on the web and web results will be displayed when a user performs a query in Search. - + The following list shows the supported values: @@ -595,7 +595,7 @@ The following list shows the supported values: **Search/PreventIndexingLowDiskSpaceMB** - + @@ -617,8 +617,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -626,8 +626,8 @@ The following list shows the supported values:
            - - + + Enabling this policy prevents indexing from continuing after less than the specified amount of hard drive space is left on the same drive as the index location. Select between 0 and 1. Enable this policy if computers in your environment have extremely limited hard drive space. @@ -639,7 +639,7 @@ The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. - +
            @@ -647,7 +647,7 @@ The following list shows the supported values: **Search/PreventRemoteQueries** - + @@ -669,8 +669,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -678,8 +678,8 @@ The following list shows the supported values:
            - - + + If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. The following list shows the supported values: @@ -687,7 +687,7 @@ The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. - +
            @@ -695,7 +695,7 @@ The following list shows the supported values: **Search/SafeSearchPermissions** - + @@ -717,8 +717,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -726,8 +726,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -741,7 +741,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 7da2bfbe1c..ac48498127 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -62,7 +62,7 @@ ms.date: 01/29/2018 **Security/AllowAddProvisioningPackage** - + @@ -84,8 +84,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -93,11 +93,11 @@ ms.date: 01/29/2018
            - - + + Specifies whether to allow the runtime configuration agent to install provisioning packages. - + The following list shows the supported values: @@ -112,7 +112,7 @@ The following list shows the supported values: **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices** - + @@ -134,8 +134,8 @@ The following list shows the supported values:
            Home
            - - + + > [!NOTE] > This policy has been deprecated in Windows 10, version 1607 @@ -152,7 +152,7 @@ The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
            @@ -160,7 +160,7 @@ The following list shows the supported values: **Security/AllowManualRootCertificateInstallation** - + @@ -182,8 +182,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -191,8 +191,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop. @@ -201,7 +201,7 @@ Specifies whether the user is allowed to manually install root and intermediate Most restricted value is 0. - + The following list shows the supported values: @@ -216,7 +216,7 @@ The following list shows the supported values: **Security/AllowRemoveProvisioningPackage** - + @@ -238,8 +238,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -247,11 +247,11 @@ The following list shows the supported values:
            - - + + Specifies whether to allow the runtime configuration agent to remove provisioning packages. - + The following list shows the supported values: @@ -266,7 +266,7 @@ The following list shows the supported values: **Security/AntiTheftMode** - + @@ -288,8 +288,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -297,15 +297,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 Mobile and not supported in Windows 10 for desktop.   Allows or disallow Anti Theft Mode on the device. - + The following list shows the supported values: @@ -320,7 +320,7 @@ The following list shows the supported values: **Security/ClearTPMIfNotReady** - + @@ -342,8 +342,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -351,14 +351,14 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Added in Windows 10, version 1709. Admin access is required. The prompt will appear on first admin logon after a reboot when the TPM is in a non-ready state that can be remediated with a TPM Clear. The prompt will have a description of what clearing the TPM does and that it requires a reboot. The user can dismiss it, but it will appear on next admin logon after restart. - + The following list shows the supported values: @@ -373,7 +373,7 @@ The following list shows the supported values: **Security/ConfigureWindowsPasswords** - + @@ -395,8 +395,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -404,14 +404,14 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. Configures the use of passwords for Windows features. > [!Note] > This policy is only supported in Windows 10 S. - + The following list shows the supported values: @@ -427,7 +427,7 @@ The following list shows the supported values: **Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices** - + @@ -449,8 +449,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -458,8 +458,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -473,7 +473,7 @@ The following list shows the supported values: - 0 (default) – Encryption enabled. - 1 – Encryption disabled. - +
            @@ -481,7 +481,7 @@ The following list shows the supported values: **Security/RequireDeviceEncryption** - + @@ -503,8 +503,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -512,8 +512,8 @@ The following list shows the supported values:
            - - + + Allows enterprise to turn on internal storage encryption. The following list shows the supported values: @@ -526,7 +526,7 @@ Most restricted value is 1. > [!IMPORTANT] > If encryption has been enabled, it cannot be turned off by using this policy. - +
            @@ -534,7 +534,7 @@ Most restricted value is 1. **Security/RequireProvisioningPackageSignature** - + @@ -556,8 +556,8 @@ Most restricted value is 1.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -565,8 +565,8 @@ Most restricted value is 1.
            - - + + Specifies whether provisioning packages must have a certificate signed by a device trusted authority. The following list shows the supported values: @@ -574,7 +574,7 @@ The following list shows the supported values: - 0 (default) – Not required. - 1 – Required. - +
            @@ -582,7 +582,7 @@ The following list shows the supported values: **Security/RequireRetrieveHealthCertificateOnBoot** - + @@ -604,8 +604,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -613,8 +613,8 @@ The following list shows the supported values:
            - - + + Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. The following list shows the supported values: @@ -633,7 +633,7 @@ Setting this policy to 1 (Required): Most restricted value is 1. - +
            diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index b21b911cc1..f80b9cac01 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -71,7 +71,7 @@ ms.date: 01/29/2018 **Settings/AllowAutoPlay** - + @@ -93,8 +93,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -102,8 +102,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -113,7 +113,7 @@ Allows the user to change Auto Play settings. > [!NOTE] > Setting this policy to 0 (Not allowed) does not affect the autoplay dialog box that appears when a device is connected. - + The following list shows the supported values: @@ -128,7 +128,7 @@ The following list shows the supported values: **Settings/AllowDataSense** - + @@ -150,8 +150,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -159,11 +159,11 @@ The following list shows the supported values:
            - - + + Allows the user to change Data Sense settings. - + The following list shows the supported values: @@ -178,7 +178,7 @@ The following list shows the supported values: **Settings/AllowDateTime** - + @@ -200,8 +200,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -209,11 +209,11 @@ The following list shows the supported values:
            - - + + Allows the user to change date and time settings. - + The following list shows the supported values: @@ -228,7 +228,7 @@ The following list shows the supported values: **Settings/AllowEditDeviceName** - + @@ -250,8 +250,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -259,11 +259,11 @@ The following list shows the supported values:
            - - + + Allows editing of the device name. - + The following list shows the supported values: @@ -278,7 +278,7 @@ The following list shows the supported values: **Settings/AllowLanguage** - + @@ -300,8 +300,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -309,15 +309,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Allows the user to change the language settings. - + The following list shows the supported values: @@ -332,7 +332,7 @@ The following list shows the supported values: **Settings/AllowOnlineTips** - + @@ -354,8 +354,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -363,13 +363,13 @@ The following list shows the supported values:
            - - + + Enables or disables the retrieval of online tips and help for the Settings app. If disabled, Settings will not contact Microsoft content services to retrieve tips and help content. - +
            @@ -377,7 +377,7 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti **Settings/AllowPowerSleep** - + @@ -399,8 +399,8 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -408,15 +408,15 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Allows the user to change power and sleep settings. - + The following list shows the supported values: @@ -431,7 +431,7 @@ The following list shows the supported values: **Settings/AllowRegion** - + @@ -453,8 +453,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -462,15 +462,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Allows the user to change the region settings. - + The following list shows the supported values: @@ -485,7 +485,7 @@ The following list shows the supported values: **Settings/AllowSignInOptions** - + @@ -507,8 +507,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -516,15 +516,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Allows the user to change sign-in options. - + The following list shows the supported values: @@ -539,7 +539,7 @@ The following list shows the supported values: **Settings/AllowVPN** - + @@ -561,8 +561,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -570,11 +570,11 @@ The following list shows the supported values:
            - - + + Allows the user to change VPN settings. - + The following list shows the supported values: @@ -589,7 +589,7 @@ The following list shows the supported values: **Settings/AllowWorkplace** - + @@ -611,8 +611,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -620,15 +620,15 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. Allows user to change workplace settings. - + The following list shows the supported values: @@ -643,7 +643,7 @@ The following list shows the supported values: **Settings/AllowYourAccount** - + @@ -665,8 +665,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -674,11 +674,11 @@ The following list shows the supported values:
            - - + + Allows user to change account settings. - + The following list shows the supported values: @@ -693,7 +693,7 @@ The following list shows the supported values: **Settings/ConfigureTaskbarCalendar** - + @@ -715,8 +715,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -724,8 +724,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. The following list shows the supported values: @@ -735,7 +735,7 @@ The following list shows the supported values: - 2 - Simplified Chinese (Lunar). - 3 - Traditional Chinese (Lunar). - +
            @@ -743,7 +743,7 @@ The following list shows the supported values: **Settings/PageVisibilityList** - + @@ -765,8 +765,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -774,8 +774,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to either prevent specific pages in the System Settings app from being visible or accessible, or to do so for all pages except those specified. The mode will be specified by the policy string beginning with either the string "showonly:" or "hide:".  Pages are identified by a shortened version of their already published URIs, which is the URI minus the "ms-settings:" prefix. For example, if the URI for a settings page is "ms-settings:foo", the page identifier used in the policy will be just "foo". Multiple page identifiers are separated by semicolons. The following example illustrates a policy that would allow access only to the about and bluetooth pages, which have URI "ms-settings:about" and "ms-settings:bluetooth" respectively: @@ -808,7 +808,7 @@ To validate on Desktop, do the following: 2. Configure the policy with the following string: "hide:about". 3. Open System Settings again and verify that the About page is no longer accessible. - +
            diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 4aeb3007f6..c487c7699c 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **SmartScreen/EnableAppInstallControl** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,11 +67,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. Allows IT Admins to control whether users are allowed to install apps from places other than the Store. - + The following list shows the supported values: @@ -86,7 +86,7 @@ The following list shows the supported values: **SmartScreen/EnableSmartScreenInShell** - + @@ -108,8 +108,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -117,11 +117,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure SmartScreen for Windows. - + The following list shows the supported values: @@ -136,7 +136,7 @@ The following list shows the supported values: **SmartScreen/PreventOverrideForFilesInShell** - + @@ -158,8 +158,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -167,11 +167,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to control whether users can can ignore SmartScreen warnings and run malicious files. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index eb15267764..6da3005afa 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **Speech/AllowSpeechModelUpdate** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,11 +61,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Specifies whether the device will receive updates to the speech recognition and speech synthesis models. A speech model contains data used by the speech engine to convert audio to text (or vice-versa). The models are periodically updated to improve accuracy and performance. Models are non-executable data files. If enabled, the device will periodically check for updated speech models and then download them from a Microsoft service using the Background Internet Transfer Service (BITS). - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index 6dbef99ae1..af43f0bf48 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -114,7 +114,7 @@ ms.date: 01/29/2018 **Start/AllowPinnedFolderDocuments** - + @@ -136,8 +136,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -145,11 +145,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Documents shortcut on the Start menu. - + The following list shows the supported values: @@ -165,7 +165,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderDownloads** - + @@ -187,8 +187,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -196,11 +196,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Downloads shortcut on the Start menu. - + The following list shows the supported values: @@ -216,7 +216,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderFileExplorer** - + @@ -238,8 +238,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -247,11 +247,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the File Explorer shortcut on the Start menu. - + The following list shows the supported values: @@ -267,7 +267,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderHomeGroup** - + @@ -289,8 +289,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -298,11 +298,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the HomeGroup shortcut on the Start menu. - + The following list shows the supported values: @@ -318,7 +318,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderMusic** - + @@ -340,8 +340,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -349,11 +349,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Music shortcut on the Start menu. - + The following list shows the supported values: @@ -369,7 +369,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderNetwork** - + @@ -391,8 +391,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -400,11 +400,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Network shortcut on the Start menu. - + The following list shows the supported values: @@ -420,7 +420,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderPersonalFolder** - + @@ -442,8 +442,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -451,11 +451,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the PersonalFolder shortcut on the Start menu. - + The following list shows the supported values: @@ -471,7 +471,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderPictures** - + @@ -493,8 +493,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -502,11 +502,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Pictures shortcut on the Start menu. - + The following list shows the supported values: @@ -522,7 +522,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderSettings** - + @@ -544,8 +544,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -553,11 +553,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Settings shortcut on the Start menu. - + The following list shows the supported values: @@ -573,7 +573,7 @@ The following list shows the supported values: **Start/AllowPinnedFolderVideos** - + @@ -595,8 +595,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -604,11 +604,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy controls the visibility of the Videos shortcut on the Start menu. - + The following list shows the supported values: @@ -624,7 +624,7 @@ The following list shows the supported values: **Start/ForceStartSize** - + @@ -646,8 +646,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -655,8 +655,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is only enforced in Windows 10 for desktop and not supported in Windows 10 Mobile. @@ -671,7 +671,7 @@ The following list shows the supported values: If there is policy configuration conflict, the latest configuration request is applied to the device. - +
            @@ -679,7 +679,7 @@ If there is policy configuration conflict, the latest configuration request is a **Start/HideAppList** - + @@ -701,8 +701,8 @@ If there is policy configuration conflict, the latest configuration request is a
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -710,8 +710,8 @@ If there is policy configuration conflict, the latest configuration request is a
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -734,7 +734,7 @@ To validate on Desktop, do the following: - 2b - If set to '2': Verify that the all apps list is collapsed, and that the Settings toggle is grayed out. - 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. - +
            @@ -742,7 +742,7 @@ To validate on Desktop, do the following: **Start/HideChangeAccountSettings** - + @@ -764,8 +764,8 @@ To validate on Desktop, do the following:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -773,8 +773,8 @@ To validate on Desktop, do the following:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. To validate on Desktop, do the following: @@ -782,7 +782,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - + The following list shows the supported values: @@ -797,7 +797,7 @@ The following list shows the supported values: **Start/HideFrequentlyUsedApps** - + @@ -819,8 +819,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -828,8 +828,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -844,7 +844,7 @@ To validate on Desktop, do the following: 5. Check that "Show most used apps" Settings toggle is grayed out. 6. Check that most used apps do not appear in Start. - + The following list shows the supported values: @@ -859,7 +859,7 @@ The following list shows the supported values: **Start/HideHibernate** - + @@ -881,8 +881,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -890,8 +890,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. To validate on Laptop, do the following: @@ -902,7 +902,7 @@ To validate on Laptop, do the following: > [!NOTE] > This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. - + The following list shows the supported values: @@ -917,7 +917,7 @@ The following list shows the supported values: **Start/HideLock** - + @@ -939,8 +939,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -948,8 +948,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. To validate on Desktop, do the following: @@ -957,7 +957,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify "Lock" is not available. - + The following list shows the supported values: @@ -972,7 +972,7 @@ The following list shows the supported values: **Start/HidePeopleBar** - + @@ -994,8 +994,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1003,13 +1003,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Enabling this policy removes the people icon from the taskbar as well as the corresponding settings toggle. It also prevents users from pinning people to the taskbar. Value type is integer. - +
            @@ -1017,7 +1017,7 @@ Value type is integer. **Start/HidePowerButton** - + @@ -1039,8 +1039,8 @@ Value type is integer.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1048,8 +1048,8 @@ Value type is integer.
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -1060,7 +1060,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, and verify the power button is not available. - + The following list shows the supported values: @@ -1075,7 +1075,7 @@ The following list shows the supported values: **Start/HideRecentJumplists** - + @@ -1097,8 +1097,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1106,8 +1106,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -1125,7 +1125,7 @@ To validate on Desktop, do the following: 8. Repeat Step 2. 9. Right Click pinned photos app and verify that there is no jumplist of recent items. - + The following list shows the supported values: @@ -1140,7 +1140,7 @@ The following list shows the supported values: **Start/HideRecentlyAddedApps** - + @@ -1162,8 +1162,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1171,8 +1171,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -1187,7 +1187,7 @@ To validate on Desktop, do the following: 5. Check that "Show recently added apps" Settings toggle is grayed out. 6. Check that recently added apps do not appear in Start. - + The following list shows the supported values: @@ -1202,7 +1202,7 @@ The following list shows the supported values: **Start/HideRestart** - + @@ -1224,8 +1224,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1233,8 +1233,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. To validate on Desktop, do the following: @@ -1242,7 +1242,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - + The following list shows the supported values: @@ -1257,7 +1257,7 @@ The following list shows the supported values: **Start/HideShutDown** - + @@ -1279,8 +1279,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1288,8 +1288,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. To validate on Desktop, do the following: @@ -1297,7 +1297,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - + The following list shows the supported values: @@ -1312,7 +1312,7 @@ The following list shows the supported values: **Start/HideSignOut** - + @@ -1334,8 +1334,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1343,8 +1343,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. To validate on Desktop, do the following: @@ -1352,7 +1352,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify "Sign out" is not available. - + The following list shows the supported values: @@ -1367,7 +1367,7 @@ The following list shows the supported values: **Start/HideSleep** - + @@ -1389,8 +1389,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1398,8 +1398,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. To validate on Desktop, do the following: @@ -1407,7 +1407,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the Power button, and verify that "Sleep" is not available. - + The following list shows the supported values: @@ -1422,7 +1422,7 @@ The following list shows the supported values: **Start/HideSwitchAccount** - + @@ -1444,8 +1444,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1453,8 +1453,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. To validate on Desktop, do the following: @@ -1462,7 +1462,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Open Start, click on the user tile, and verify that "Switch account" is not available. - + The following list shows the supported values: @@ -1477,7 +1477,7 @@ The following list shows the supported values: **Start/HideUserTile** - + @@ -1499,8 +1499,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1508,8 +1508,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -1521,7 +1521,7 @@ To validate on Desktop, do the following: 2. Log off. 3. Log in, and verify that the user tile is gone from Start. - + The following list shows the supported values: @@ -1536,7 +1536,7 @@ The following list shows the supported values: **Start/ImportEdgeAssets** - + @@ -1558,8 +1558,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1567,8 +1567,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy requires reboot to take effect. @@ -1586,7 +1586,7 @@ To validate on Desktop, do the following: 3. Sign out/in. 4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - +
            @@ -1594,7 +1594,7 @@ To validate on Desktop, do the following: **Start/NoPinningToTaskbar** - + @@ -1616,8 +1616,8 @@ To validate on Desktop, do the following:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1625,8 +1625,8 @@ To validate on Desktop, do the following:
            - - + + Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. To validate on Desktop, do the following: @@ -1637,7 +1637,7 @@ To validate on Desktop, do the following: 4. Open Start and right click on one of the app list icons. 5. Verify that More->Pin to taskbar menu does not show. - + The following list shows the supported values: @@ -1652,7 +1652,7 @@ The following list shows the supported values: **Start/StartLayout** - + @@ -1674,8 +1674,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1684,8 +1684,8 @@ The following list shows the supported values:
            - - + + > [!IMPORTANT] > Added in Windows 10 version 1703: In addition to being able to set this node on a per user-basis, it can now also be set on a per-device basis. For more information, see [Policy scope](./policy-configuration-service-provider.md#policy-scope) @@ -1693,7 +1693,7 @@ Allows you to override the default Start layout and prevents the user from chang For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). - +
            diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index a14fd22cb2..f7c55ff050 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **Storage/AllowDiskHealthModelUpdates** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,8 +64,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. Allows disk health model updates. @@ -76,7 +76,7 @@ The following list shows the supported values: Value type is integer. - +
            @@ -84,7 +84,7 @@ Value type is integer. **Storage/EnhancedStorageDevices** - + @@ -106,8 +106,8 @@ Value type is integer.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -115,15 +115,15 @@ Value type is integer.
            - - + + This policy setting configures whether or not Windows will activate an Enhanced Storage device. If you enable this policy setting, Windows will not activate unactivated Enhanced Storage devices. If you disable or do not configure this policy setting, Windows will activate unactivated Enhanced Storage devices. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -131,14 +131,14 @@ If you disable or do not configure this policy setting, Windows will activate un > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not allow Windows to activate Enhanced Storage devices* - GP name: *TCGSecurityActivationDisabled* - GP path: *System/Enhanced Storage Access* - GP ADMX file name: *enhancedstorage.admx* - +
            diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index e9d50d3359..eb2ff5cb90 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -74,7 +74,7 @@ ms.date: 01/29/2018 **System/AllowBuildPreview** - + @@ -96,8 +96,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -105,8 +105,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > This policy setting applies only to devices running Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education, Windows 10 Mobile, and Windows 10 Mobile Enterprise. @@ -121,7 +121,7 @@ The following list shows the supported values: - 1 – Allowed. Users can make their devices available for downloading and installing preview software. - 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software. - +
            @@ -129,7 +129,7 @@ The following list shows the supported values: **System/AllowEmbeddedMode** - + @@ -151,8 +151,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -160,13 +160,13 @@ The following list shows the supported values:
            - - + + Specifies whether set general purpose device to be in embedded mode. Most restricted value is 0. - + The following list shows the supported values: @@ -181,7 +181,7 @@ The following list shows the supported values: **System/AllowExperimentation** - + @@ -203,8 +203,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -212,8 +212,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > This policy is not supported in Windows 10, version 1607. @@ -227,7 +227,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -235,7 +235,7 @@ Most restricted value is 0. **System/AllowFontProviders** - + @@ -257,8 +257,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -266,8 +266,8 @@ Most restricted value is 0.
            - - + + Added in Windows 10, version 1703. Boolean policy setting that determines whether Windows is allowed to download fonts and font catalog data from an online font provider. If you enable this setting, Windows periodically queries an online font provider to determine whether a new font catalog is available. Windows may also download font data if needed to format or render text. If you disable this policy setting, Windows does not connect to an online font provider and only enumerates locally-installed fonts. This MDM setting corresponds to the EnableFontProviders Group Policy setting. If both the Group Policy and the MDM settings are configured, the group policy setting takes precedence. If neither is configured, the behavior depends on a DisableFontProviders registry value. In server editions, this registry value is set to 1 by default, so the default behavior is false (disabled). In all other editions, the registry value is not set by default, so the default behavior is true (enabled). @@ -277,7 +277,7 @@ This setting is used by lower-level components for text display and fond handlin > [!Note] > Reboot is required after setting the policy; alternatively you can stop and restart the FontCache service. - + The following list shows the supported values: @@ -298,7 +298,7 @@ To verify if System/AllowFontProviders is set to true: **System/AllowLocation** - + @@ -320,8 +320,8 @@ To verify if System/AllowFontProviders is set to true:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -329,8 +329,8 @@ To verify if System/AllowFontProviders is set to true:
            - - + + Specifies whether to allow app access to the Location service. The following list shows the supported values: @@ -347,7 +347,7 @@ When switching the policy back from 0 (Force Location Off) or 2 (Force Location For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. - +
            @@ -355,7 +355,7 @@ For example, an app's original Location setting is Off. The administrator then s **System/AllowStorageCard** - + @@ -377,8 +377,8 @@ For example, an app's original Location setting is Off. The administrator then s
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -386,13 +386,13 @@ For example, an app's original Location setting is Off. The administrator then s
            - - + + Controls whether the user is allowed to use the storage card for device storage. This setting prevents programmatic access to the storage card. Most restricted value is 0. - + The following list shows the supported values: @@ -407,7 +407,7 @@ The following list shows the supported values: **System/AllowTelemetry** - + @@ -429,8 +429,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -439,8 +439,8 @@ The following list shows the supported values:
            - - + + Allow the device to send diagnostic and usage telemetry data, such as Watson. The following tables describe the supported values: @@ -518,7 +518,7 @@ Windows 10 Values: Most restricted value is 0. - +
            @@ -526,7 +526,7 @@ Most restricted value is 0. **System/AllowUserToResetPhone** - + @@ -548,8 +548,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -557,13 +557,13 @@ Most restricted value is 0.
            - - + + Specifies whether to allow the user to factory reset the phone by using control panel and hardware key combination. Most restricted value is 0. - + The following list shows the supported values: orted values: @@ -579,7 +579,7 @@ orted values: **System/BootStartDriverInitialization** - + @@ -601,8 +601,8 @@ orted values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -610,11 +610,11 @@ orted values:
            - - + + N/A - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -622,12 +622,12 @@ N/A > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP name: *POL_DriverLoadPolicy_Name* - GP ADMX file name: *earlylauncham.admx* - +
            @@ -635,7 +635,7 @@ ADMX Info: **System/DisableEnterpriseAuthProxy** - + @@ -657,8 +657,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -666,11 +666,11 @@ ADMX Info:
            - - + + This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. - +
            @@ -678,7 +678,7 @@ This policy setting blocks the Connected User Experience and Telemetry service f **System/DisableOneDriveFileSync** - + @@ -700,8 +700,8 @@ This policy setting blocks the Connected User Experience and Telemetry service f
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -709,8 +709,8 @@ This policy setting blocks the Connected User Experience and Telemetry service f
            - - + + Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features from working with files on OneDrive. If you enable this policy setting: * Users cannot access OneDrive from the OneDrive app or file picker. @@ -727,7 +727,7 @@ To validate on Desktop, do the following: 2. Restart machine. 3. Verify that OneDrive.exe is not running in Task Manager. - + The following list shows the supported values: @@ -742,7 +742,7 @@ The following list shows the supported values: **System/DisableSystemRestore** - + @@ -764,8 +764,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -773,8 +773,8 @@ The following list shows the supported values:
            - - + + Allows you to disable System Restore. This policy setting allows you to turn off System Restore. @@ -787,7 +787,7 @@ If you disable or do not configure this policy setting, users can perform System Also, see the "Turn off System Restore configuration" policy setting. If the "Turn off System Restore" policy setting is disabled or not configured, the "Turn off System Restore configuration" policy setting is used to determine whether the option to configure System Restore is available. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -795,14 +795,14 @@ Also, see the "Turn off System Restore configuration" policy setting. If the "Tu > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off System Restore* - GP name: *SR_DisableSR* - GP path: *System/System Restore* - GP ADMX file name: *systemrestore.admx* - +
            @@ -810,7 +810,7 @@ ADMX Info: **System/FeedbackHubAlwaysSaveDiagnosticsLocally** - + @@ -832,8 +832,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -841,11 +841,11 @@ ADMX Info:
            - - + + Added in Windows 10, next major update. When filing feedback in the Feedback Hub, diagnostic logs are collected for certain types of feedback. We now offer the option for users to save it locally, in addition to sending it to Microsoft. This policy will allow enterprises to mandate that all diagnostics are saved locally for use in internal investigations. - + The following list shows the supported values: @@ -860,7 +860,7 @@ The following list shows the supported values: **System/LimitEnhancedDiagnosticDataWindowsAnalytics** - + @@ -882,8 +882,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -891,8 +891,8 @@ The following list shows the supported values:
            - - + + This policy setting, in combination with the System/AllowTelemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. @@ -908,7 +908,7 @@ Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combina If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. - +
            @@ -916,7 +916,7 @@ If you disable or do not configure this policy setting, then the level of diagno **System/TelemetryProxy** - + @@ -938,8 +938,8 @@ If you disable or do not configure this policy setting, then the level of diagno
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -947,13 +947,13 @@ If you disable or do not configure this policy setting, then the level of diagno
            - - + + Allows you to specify the fully qualified domain name (FQDN) or IP address of a proxy server to forward Connected User Experiences and Telemetry requests. The format for this setting is *<server>:<port>*. The connection is made over a Secure Sockets Layer (SSL) connection. If the named proxy fails, or if there is no proxy specified when this policy is enabled, the Connected User Experiences and Telemetry data will not be transmitted and will remain on the local device. If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. - +
            diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index cdee24bf7c..121c82b0ca 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -47,7 +47,7 @@ ms.date: 01/29/2018 **SystemServices/ConfigureHomeGroupListenerServiceStartupMode** - + @@ -69,8 +69,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -78,11 +78,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            @@ -90,7 +90,7 @@ Added in Windows 10, next major update. This setting determines whether the serv **SystemServices/ConfigureHomeGroupProviderServiceStartupMode** - + @@ -112,8 +112,8 @@ Added in Windows 10, next major update. This setting determines whether the serv
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -121,11 +121,11 @@ Added in Windows 10, next major update. This setting determines whether the serv
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            @@ -133,7 +133,7 @@ Added in Windows 10, next major update. This setting determines whether the serv **SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode** - + @@ -155,8 +155,8 @@ Added in Windows 10, next major update. This setting determines whether the serv
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -164,11 +164,11 @@ Added in Windows 10, next major update. This setting determines whether the serv
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            @@ -176,7 +176,7 @@ Added in Windows 10, next major update. This setting determines whether the serv **SystemServices/ConfigureXboxLiveAuthManagerServiceStartupMode** - + @@ -198,8 +198,8 @@ Added in Windows 10, next major update. This setting determines whether the serv
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -207,11 +207,11 @@ Added in Windows 10, next major update. This setting determines whether the serv
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            @@ -219,7 +219,7 @@ Added in Windows 10, next major update. This setting determines whether the serv **SystemServices/ConfigureXboxLiveGameSaveServiceStartupMode** - + @@ -241,8 +241,8 @@ Added in Windows 10, next major update. This setting determines whether the serv
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -250,11 +250,11 @@ Added in Windows 10, next major update. This setting determines whether the serv
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            @@ -262,7 +262,7 @@ Added in Windows 10, next major update. This setting determines whether the serv **SystemServices/ConfigureXboxLiveNetworkingServiceStartupMode** - + @@ -284,8 +284,8 @@ Added in Windows 10, next major update. This setting determines whether the serv
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -293,11 +293,11 @@ Added in Windows 10, next major update. This setting determines whether the serv
            - - + + Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
            diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index 71e1d6c905..9f01af6518 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -32,7 +32,7 @@ ms.date: 01/29/2018 **TaskScheduler/EnableXboxGameSaveTask** - + @@ -54,8 +54,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -63,11 +63,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, next major update. This setting determines whether the specific task is enabled (1) or disabled (0). Default: Enabled. - +
            diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index d345d4add2..c9ef2af75d 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -71,7 +71,7 @@ ms.date: 01/29/2018 **TextInput/AllowIMELogging** - + @@ -93,8 +93,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -102,8 +102,8 @@ ms.date: 01/29/2018
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -112,7 +112,7 @@ Allows the user to turn on and off the logging for incorrect conversion and savi Most restricted value is 0. - + The following list shows the supported values: @@ -127,7 +127,7 @@ The following list shows the supported values: **TextInput/AllowIMENetworkAccess** - + @@ -149,8 +149,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -158,8 +158,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -168,7 +168,7 @@ Allows the user to turn on Open Extended Dictionary, Internet search integration Most restricted value is 0. - + The following list shows the supported values: @@ -183,7 +183,7 @@ The following list shows the supported values: **TextInput/AllowInputPanel** - + @@ -205,8 +205,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -214,8 +214,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -224,7 +224,7 @@ Allows the IT admin to disable the touch/handwriting keyboard on Windows. Most restricted value is 0. - + The following list shows the supported values: @@ -239,7 +239,7 @@ The following list shows the supported values: **TextInput/AllowJapaneseIMESurrogatePairCharacters** - + @@ -261,8 +261,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -270,8 +270,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -285,7 +285,7 @@ The following list shows the supported values: Most restricted value is 0. - +
            @@ -293,7 +293,7 @@ Most restricted value is 0. **TextInput/AllowJapaneseIVSCharacters** - + @@ -315,8 +315,8 @@ Most restricted value is 0.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -324,8 +324,8 @@ Most restricted value is 0.
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -334,7 +334,7 @@ Allows Japanese Ideographic Variation Sequence (IVS) characters. Most restricted value is 0. - + The following list shows the supported values: @@ -349,7 +349,7 @@ The following list shows the supported values: **TextInput/AllowJapaneseNonPublishingStandardGlyph** - + @@ -371,8 +371,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -380,8 +380,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -390,7 +390,7 @@ Allows the Japanese non-publishing standard glyph. Most restricted value is 0. - + The following list shows the supported values: @@ -405,7 +405,7 @@ The following list shows the supported values: **TextInput/AllowJapaneseUserDictionary** - + @@ -427,8 +427,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -436,8 +436,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -446,7 +446,7 @@ Allows the Japanese user dictionary. Most restricted value is 0. - + The following list shows the supported values: @@ -461,7 +461,7 @@ The following list shows the supported values: **TextInput/AllowKeyboardTextSuggestions** - + @@ -483,8 +483,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -492,8 +492,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -507,7 +507,7 @@ To validate that text prediction is disabled on Windows 10 for desktop, do the f 2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. 3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. - + The following list shows the supported values: @@ -522,10 +522,10 @@ The following list shows the supported values: **TextInput/AllowKoreanExtendedHanja** - + This policy has been deprecated. - +
            @@ -533,7 +533,7 @@ This policy has been deprecated. **TextInput/AllowLanguageFeaturesUninstall** - + @@ -555,8 +555,8 @@ This policy has been deprecated.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -564,8 +564,8 @@ This policy has been deprecated.
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -574,7 +574,7 @@ Allows the uninstall of language features, such as spell checkers, on a device. Most restricted value is 0. - + The following list shows the supported values: @@ -589,7 +589,7 @@ The following list shows the supported values: **TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode** - + @@ -611,8 +611,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -620,8 +620,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. This policy allows the IT admin to enable the touch keyboard to automatically show up when the device is in the desktop mode. The touch keyboard is enabled in both the tablet and desktop mode. In the tablet mode, when you touch a textbox, the touch keyboard automatically shows up. @@ -630,7 +630,7 @@ When this policy is enabled, the touch keyboard automatically shows up when the This policy corresponds to "Show the touch keyboard when not in tablet mode and there's no keyboard attached" in the Settings app. - + The following list shows the supported values: @@ -645,7 +645,7 @@ The following list shows the supported values: **TextInput/ExcludeJapaneseIMEExceptJIS0208** - + @@ -667,8 +667,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -676,8 +676,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -689,7 +689,7 @@ The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 are filtered. - +
            @@ -697,7 +697,7 @@ The following list shows the supported values: **TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC** - + @@ -719,8 +719,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -728,8 +728,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -741,7 +741,7 @@ The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 and EUDC are filtered. - +
            @@ -749,7 +749,7 @@ The following list shows the supported values: **TextInput/ExcludeJapaneseIMEExceptShiftJIS** - + @@ -771,8 +771,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -780,8 +780,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > The policy is only enforced in Windows 10 for desktop. @@ -793,7 +793,7 @@ The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except ShiftJIS are filtered. - +
            diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index fedf2c5380..ae92f571db 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -30,7 +30,7 @@ ms.date: 01/29/2018 **TimeLanguageSettings/AllowSet24HourClock** - + @@ -52,8 +52,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -61,11 +61,11 @@ ms.date: 01/29/2018
            - - + + Allows for the configuration of the default clock setting to be the 24 hour format. Selecting 'Set 24 hour Clock' enables this setting. Selecting 'Locale default setting' uses the default clock as prescribed by the current locale setting. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 66e08b3185..2b7ed79caf 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -173,7 +173,7 @@ ms.date: 01/29/2018 **Update/ActiveHoursEnd** - + @@ -195,8 +195,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -204,8 +204,8 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursStart**) to manage a range of active hours where update reboots are not scheduled. This value sets the end time. There is a 12 hour maximum from start time. > [!NOTE] @@ -215,7 +215,7 @@ Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. The default is 17 (5 PM). - +
            @@ -223,7 +223,7 @@ The default is 17 (5 PM). **Update/ActiveHoursMaxRange** - + @@ -245,8 +245,8 @@ The default is 17 (5 PM).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -254,15 +254,15 @@ The default is 17 (5 PM).
            - - + + Added in Windows 10, version 1703. Allows the IT admin to specify the max active hours range. This value sets max number of active hours from start time. Supported values are 8-18. The default value is 18 (hours). - +
            @@ -270,7 +270,7 @@ The default value is 18 (hours). **Update/ActiveHoursStart** - + @@ -292,8 +292,8 @@ The default value is 18 (hours).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -301,8 +301,8 @@ The default value is 18 (hours).
            - - + + Added in Windows 10, version 1607. Allows the IT admin (when used with **Update/ActiveHoursEnd**) to manage a range of hours where update reboots are not scheduled. This value sets the start time. There is a 12 hour maximum from end time. > [!NOTE] @@ -312,7 +312,7 @@ Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. The default value is 8 (8 AM). - +
            @@ -320,7 +320,7 @@ The default value is 8 (8 AM). **Update/AllowAutoUpdate** - + @@ -342,8 +342,8 @@ The default value is 8 (8 AM).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -351,8 +351,8 @@ The default value is 8 (8 AM).
            - - + + Enables the IT admin to manage automatic update behavior to scan, download, and install updates. Supported operations are Get and Replace. @@ -372,7 +372,7 @@ The following list shows the supported values: If the policy is not configured, end-users get the default behavior (Auto install and restart). - +
            @@ -380,7 +380,7 @@ If the policy is not configured, end-users get the default behavior (Auto instal **Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork** - + @@ -402,8 +402,8 @@ If the policy is not configured, end-users get the default behavior (Auto instal
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -411,15 +411,15 @@ If the policy is not configured, end-users get the default behavior (Auto instal
            - - + + Added in Windows 10, version 1709. Option to download updates automatically over metered connections (off by default). Value type is integer. A significant number of devices primarily use cellular data and do not have Wi-Fi access, which leads to a lower number of devices getting updates. Since a large number of devices have large data plans or unlimited data, this policy can unblock devices from getting updates. This policy is accessible through the Update setting in the user interface or Group Policy. - + The following list shows the supported values: @@ -434,7 +434,7 @@ The following list shows the supported values: **Update/AllowMUUpdateService** - + @@ -456,8 +456,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -465,8 +465,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. The following list shows the supported values: @@ -474,7 +474,7 @@ The following list shows the supported values: - 0 – Not allowed or not configured. - 1 – Allowed. Accepts updates received through Microsoft Update. - +
            @@ -482,7 +482,7 @@ The following list shows the supported values: **Update/AllowNonMicrosoftSignedUpdate** - + @@ -504,8 +504,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -513,15 +513,15 @@ The following list shows the supported values:
            - - + + Allows the IT admin to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found at the UpdateServiceUrl location. This policy supports using WSUS for 3rd party software and patch distribution. Supported operations are Get and Replace. This policy is specific to desktop and local publishing via WSUS for 3rd party updates (binaries and updates not hosted on Microsoft Update) and allows IT to manage whether Automatic Updates accepts updates signed by entities other than Microsoft when the update is found on an intranet Microsoft update service location. - + The following list shows the supported values: @@ -536,7 +536,7 @@ The following list shows the supported values: **Update/AllowUpdateService** - + @@ -558,8 +558,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -567,8 +567,8 @@ The following list shows the supported values:
            - - + + Specifies whether the device could use Microsoft Update, Windows Server Update Services (WSUS), or Microsoft Store. Even when Windows Update is configured to receive updates from an intranet update service, it will periodically retrieve information from the public Windows Update service to enable future connections to Windows Update, and other services like Microsoft Update or the Microsoft Store @@ -578,7 +578,7 @@ Enabling this policy will disable that functionality, and may cause connection t > [!NOTE] > This policy applies only when the desktop or device is configured to connect to an intranet update service using the "Specify intranet Microsoft update service location" policy. - + The following list shows the supported values: @@ -593,7 +593,7 @@ The following list shows the supported values: **Update/AutoRestartDeadlinePeriodInDays** - + @@ -615,8 +615,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -624,15 +624,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy defines the deadline in days after which a reboot for updates will become mandatory. Supported values are 2-30 days. The default value is 7 days. - +
            @@ -640,7 +640,7 @@ The default value is 7 days. **Update/AutoRestartNotificationSchedule** - + @@ -662,8 +662,8 @@ The default value is 7 days.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -671,13 +671,13 @@ The default value is 7 days.
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart reminder notifications. The default value is 15 (minutes). - + Supported values are 15, 30, 60, 120, and 240 (minutes). @@ -689,7 +689,7 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). **Update/AutoRestartRequiredNotificationDismissal** - + @@ -711,8 +711,8 @@ Supported values are 15, 30, 60, 120, and 240 (minutes).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -720,8 +720,8 @@ Supported values are 15, 30, 60, 120, and 240 (minutes).
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. The following list shows the supported values: @@ -729,7 +729,7 @@ The following list shows the supported values: - 1 (default) – Auto Dismissal. - 2 – User Dismissal. - +
            @@ -737,7 +737,7 @@ The following list shows the supported values: **Update/BranchReadinessLevel** - + @@ -759,8 +759,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -768,11 +768,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Allows the IT admin to set which branch a device receives their updates from. - + The following list shows the supported values: @@ -790,7 +790,7 @@ The following list shows the supported values: **Update/ConfigureFeatureUpdateUninstallPeriod** - + @@ -812,11 +812,11 @@ The following list shows the supported values:
            Home
            - - + + Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. - +
            @@ -824,7 +824,7 @@ Added in Windows 10, next major update. Enable IT admin to configure feature up **Update/DeferFeatureUpdatesPeriodInDays** - + @@ -846,8 +846,8 @@ Added in Windows 10, next major update. Enable IT admin to configure feature up
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -855,8 +855,8 @@ Added in Windows 10, next major update. Enable IT admin to configure feature up
            - - + + Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. Added in Windows 10, version 1607. Defers Feature Updates for the specified number of days. @@ -866,7 +866,7 @@ Supported values are 0-365 days. > [!IMPORTANT] > The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. - +
            @@ -874,7 +874,7 @@ Supported values are 0-365 days. **Update/DeferQualityUpdatesPeriodInDays** - + @@ -896,8 +896,8 @@ Supported values are 0-365 days.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -905,13 +905,13 @@ Supported values are 0-365 days.
            - - + + Added in Windows 10, version 1607. Defers Quality Updates for the specified number of days. Supported values are 0-30. - +
            @@ -919,7 +919,7 @@ Supported values are 0-30. **Update/DeferUpdatePeriod** - + @@ -941,8 +941,8 @@ Supported values are 0-30.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -950,8 +950,8 @@ Supported values are 0-30.
            - - + + > [!NOTE] > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use DeferUpdatePeriod for Windows 10, version 1511 devices. @@ -1047,7 +1047,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego --> - +
            @@ -1055,7 +1055,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego **Update/DeferUpgradePeriod** - + @@ -1077,8 +1077,8 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1086,8 +1086,8 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego
            - - + + > [!NOTE] > Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. > @@ -1102,7 +1102,7 @@ If the "Specify intranet Microsoft update service location" policy is enabled, t If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - +
            @@ -1110,7 +1110,7 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th **Update/DetectionFrequency** - + @@ -1132,8 +1132,8 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1141,11 +1141,11 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th
            - - + + Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. - +
            @@ -1153,7 +1153,7 @@ Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 2 **Update/DisableDualScan** - + @@ -1175,8 +1175,8 @@ Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 2
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1184,8 +1184,8 @@ Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 2
            - - + + Added in Windows 10, version 1709, but was added to 1607 and 1703 service releases. Do not allow update deferral policies to cause scans against Windows Update. If this policy is not enabled, then configuring deferral policies will result in the client unexpectedly scanning Windows update. With the policy enabled, those scans are prevented, and users can configure deferral policies as much as they like. For more information about dual scan, see [Demystifying "Dual Scan"](https://blogs.technet.microsoft.com/wsus/2017/05/05/demystifying-dual-scan/) and [Improving Dual Scan on 1607](https://blogs.technet.microsoft.com/wsus/2017/08/04/improving-dual-scan-on-1607/). @@ -1194,7 +1194,7 @@ This is the same as the Group Policy in Windows Components > Window Update "Do n Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: @@ -1209,7 +1209,7 @@ The following list shows the supported values: **Update/EngagedRestartDeadline** - + @@ -1231,8 +1231,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1240,15 +1240,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to specify the deadline in days before automatically scheduling and executing a pending restart outside of active hours. The deadline can be set between 2 and 30 days from the time the restart becomes pending. If configured, the pending restart will transition from Auto-restart to Engaged restart (pending user schedule) to be automatically executed within the specified period. If no deadline is specified or deadline is set to 0, the restart will not be automatically executed and will remain Engaged restart (pending user scheduling). Supported values are 2-30 days. The default value is 0 days (not specified). - +
            @@ -1256,7 +1256,7 @@ The default value is 0 days (not specified). **Update/EngagedRestartSnoozeSchedule** - + @@ -1278,8 +1278,8 @@ The default value is 0 days (not specified).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1287,15 +1287,15 @@ The default value is 0 days (not specified).
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to control the number of days a user can snooze Engaged restart reminder notifications. Supported values are 1-3 days. The default value is 3 days. - +
            @@ -1303,7 +1303,7 @@ The default value is 3 days. **Update/EngagedRestartTransitionSchedule** - + @@ -1325,8 +1325,8 @@ The default value is 3 days.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1334,15 +1334,15 @@ The default value is 3 days.
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to control the timing before transitioning from Auto restarts scheduled outside of active hours to Engaged restart, which requires the user to schedule. The period can be set between 2 and 30 days from the time the restart becomes pending. Supported values are 2-30 days. The default value is 7 days. - +
            @@ -1350,7 +1350,7 @@ The default value is 7 days. **Update/ExcludeWUDriversInQualityUpdate** - + @@ -1372,8 +1372,8 @@ The default value is 7 days.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1381,8 +1381,8 @@ The default value is 7 days.
            - - + + > [!NOTE] > Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. @@ -1393,7 +1393,7 @@ The following list shows the supported values: - 0 (default) – Allow Windows Update drivers. - 1 – Exclude Windows Update drivers. - +
            @@ -1401,7 +1401,7 @@ The following list shows the supported values: **Update/FillEmptyContentUrls** - + @@ -1423,8 +1423,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1432,8 +1432,8 @@ The following list shows the supported values:
            - - + + Added in the April service release of Windows 10, version 1607. Allows Windows Update Agent to determine the download URL when it is missing from the metadata. This scenario will occur when intranet update service stores the metadata files but the download contents are stored in the ISV file cache (specified as the alternate download URL). > [!NOTE] @@ -1444,7 +1444,7 @@ The following list shows the supported values: - 0 (default) – Disabled. - 1 – Enabled. - +
            @@ -1452,7 +1452,7 @@ The following list shows the supported values: **Update/IgnoreMOAppDownloadLimit** - + @@ -1474,8 +1474,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1483,14 +1483,14 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for apps and their updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] > Setting this policy might cause devices to incur costs from MO operators. - + The following list shows the supported values: @@ -1517,7 +1517,7 @@ To validate this policy: **Update/IgnoreMOUpdateDownloadLimit** - + @@ -1539,8 +1539,8 @@ To validate this policy:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1548,8 +1548,8 @@ To validate this policy:
            - - + + Added in Windows 10, version 1703. Specifies whether to ignore the MO download limit (allow unlimited downloading) over a cellular network for OS updates. If lower-level limits (for example, mobile caps) are required, those limits are controlled by external policies. > [!WARNING] @@ -1564,7 +1564,7 @@ To validate this policy: 3. Verify that any downloads that are above the download size limit will complete without being paused. - + The following list shows the supported values: @@ -1579,7 +1579,7 @@ The following list shows the supported values: **Update/ManagePreviewBuilds** - + @@ -1601,8 +1601,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1610,8 +1610,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. The following list shows the supported values: @@ -1620,7 +1620,7 @@ The following list shows the supported values: - 1 - Disable Preview builds once the next release is public - 2 - Enable Preview builds - +
            @@ -1628,7 +1628,7 @@ The following list shows the supported values: **Update/PauseDeferrals** - + @@ -1650,8 +1650,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1659,8 +1659,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use PauseDeferrals for Windows 10, version 1511 devices. @@ -1676,7 +1676,7 @@ If the "Specify intranet Microsoft update service location" policy is enabled, t If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - +
            @@ -1684,7 +1684,7 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th **Update/PauseFeatureUpdates** - + @@ -1706,8 +1706,8 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1715,8 +1715,8 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th
            - - + + Since this policy is not blocked, you will not get a failure message when you use it to configure a Windows 10 Mobile device. However, the policy will not take effect. @@ -1727,7 +1727,7 @@ The following list shows the supported values: - 0 (default) – Feature Updates are not paused. - 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. - +
            @@ -1735,7 +1735,7 @@ The following list shows the supported values: **Update/PauseFeatureUpdatesStartTime** - + @@ -1757,8 +1757,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1766,13 +1766,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Feature Updates. Value type is string. Supported operations are Add, Get, Delete, and Replace. - +
            @@ -1780,7 +1780,7 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. **Update/PauseQualityUpdates** - + @@ -1802,8 +1802,8 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1811,8 +1811,8 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace.
            - - + + Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. The following list shows the supported values: @@ -1820,7 +1820,7 @@ The following list shows the supported values: - 0 (default) – Quality Updates are not paused. - 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. - +
            @@ -1828,7 +1828,7 @@ The following list shows the supported values: **Update/PauseQualityUpdatesStartTime** - + @@ -1850,8 +1850,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1859,13 +1859,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Specifies the date and time when the IT admin wants to start pausing the Quality Updates. Value type is string. Supported operations are Add, Get, Delete, and Replace. - +
            @@ -1873,10 +1873,10 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. **Update/PhoneUpdateRestrictions** - + This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. - +
            @@ -1884,7 +1884,7 @@ This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupd **Update/RequireDeferUpgrade** - + @@ -1906,8 +1906,8 @@ This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupd
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1915,8 +1915,8 @@ This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupd
            - - + + > [!NOTE] > Don't use this policy in Windows 10, version 1607 devices, instead use the new policies listed in [Changes in Windows 10, version 1607 for update management](device-update-management.md#windows10version1607forupdatemanagement). You can continue to use RequireDeferUpgrade for Windows 10, version 1511 devices. @@ -1928,7 +1928,7 @@ The following list shows the supported values: - 0 (default) – User gets upgrades from Semi-Annual Channel (Targeted). - 1 – User gets upgrades from Semi-Annual Channel. - +
            @@ -1936,7 +1936,7 @@ The following list shows the supported values: **Update/RequireUpdateApproval** - + @@ -1958,8 +1958,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1967,8 +1967,8 @@ The following list shows the supported values:
            - - + + > [!NOTE] > If you previously used the **Update/PhoneUpdateRestrictions** policy in previous versions of Windows, it has been deprecated. Please use this policy instead. @@ -1982,7 +1982,7 @@ The following list shows the supported values: - 0 – Not configured. The device installs all applicable updates. - 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. - +
            @@ -1990,7 +1990,7 @@ The following list shows the supported values: **Update/ScheduleImminentRestartWarning** - + @@ -2012,8 +2012,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2021,13 +2021,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to specify the period for auto-restart imminent warning notifications. The default value is 15 (minutes). - + Supported values are 15, 30, or 60 (minutes). @@ -2039,7 +2039,7 @@ Supported values are 15, 30, or 60 (minutes). **Update/ScheduleRestartWarning** - + @@ -2061,8 +2061,8 @@ Supported values are 15, 30, or 60 (minutes).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2070,8 +2070,8 @@ Supported values are 15, 30, or 60 (minutes).
            - - + + > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise @@ -2080,7 +2080,7 @@ Added in Windows 10, version 1703. Allows the IT Admin to specify the period fo The default value is 4 (hours). - + Supported values are 2, 4, 8, 12, or 24 (hours). @@ -2092,7 +2092,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). **Update/ScheduledInstallDay** - + @@ -2114,8 +2114,8 @@ Supported values are 2, 4, 8, 12, or 24 (hours).
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2123,8 +2123,8 @@ Supported values are 2, 4, 8, 12, or 24 (hours).
            - - + + Enables the IT admin to schedule the day of the update installation. The data type is a integer. @@ -2142,7 +2142,7 @@ The following list shows the supported values: - 6 – Friday - 7 – Saturday - +
            @@ -2150,7 +2150,7 @@ The following list shows the supported values: **Update/ScheduledInstallEveryWeek** - + @@ -2172,8 +2172,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2181,15 +2181,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the every week. Value type is integer. Supported values:
            • 0 - no update in the schedule
            • 1 - update is scheduled every week
            - +
            @@ -2197,7 +2197,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i **Update/ScheduledInstallFirstWeek** - + @@ -2219,8 +2219,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2228,15 +2228,15 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            - - + + Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the first week of the month. Value type is integer. Supported values:
            • 0 - no update in the schedule
            • 1 - update is scheduled every first week of the month
            - +
            @@ -2244,7 +2244,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i **Update/ScheduledInstallFourthWeek** - + @@ -2266,8 +2266,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2275,15 +2275,15 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            - - + + Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the fourth week of the month. Value type is integer. Supported values:
            • 0 - no update in the schedule
            • 1 - update is scheduled every fourth week of the month
            - +
            @@ -2291,7 +2291,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i **Update/ScheduledInstallSecondWeek** - + @@ -2313,8 +2313,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2322,15 +2322,15 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            - - + + Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the second week of the month. Value type is integer. Supported values:
            • 0 - no update in the schedule
            • 1 - update is scheduled every second week of the month
            - +
            @@ -2338,7 +2338,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i **Update/ScheduledInstallThirdWeek** - + @@ -2360,8 +2360,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2369,15 +2369,15 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            - - + + Added in Windows 10, version 1709. Enables the IT admin to schedule the update installation on the third week of the month. Value type is integer. Supported values:
            • 0 - no update in the schedule
            • 1 - update is scheduled every third week of the month
            - +
            @@ -2385,7 +2385,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i **Update/ScheduledInstallTime** - + @@ -2407,8 +2407,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2416,8 +2416,8 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
            - - + + > [!NOTE] > This policy is available on Windows 10 Pro, Windows 10 Enterprise, Windows 10 Education, and Windows 10 Mobile Enterprise @@ -2432,7 +2432,7 @@ Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. The default value is 3. - +
            @@ -2440,7 +2440,7 @@ The default value is 3. **Update/SetAutoRestartNotificationDisable** - + @@ -2462,8 +2462,8 @@ The default value is 3.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2471,8 +2471,8 @@ The default value is 3.
            - - + + Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. The following list shows the supported values: @@ -2480,7 +2480,7 @@ The following list shows the supported values: - 0 (default) – Enabled - 1 – Disabled - +
            @@ -2488,7 +2488,7 @@ The following list shows the supported values: **Update/SetEDURestart** - + @@ -2510,8 +2510,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2519,8 +2519,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. The following list shows the supported values: @@ -2528,7 +2528,7 @@ The following list shows the supported values: - 0 - not configured - 1 - configured - +
            @@ -2536,7 +2536,7 @@ The following list shows the supported values: **Update/UpdateServiceUrl** - + @@ -2558,8 +2558,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2567,8 +2567,8 @@ The following list shows the supported values:
            - - + + > [!Important] > Starting in Windows 10, version 1703 this policy is not supported in Windows 10 Mobile Enteprise and IoT Mobile. @@ -2599,7 +2599,7 @@ Example ``` - +
            @@ -2607,7 +2607,7 @@ Example **Update/UpdateServiceUrlAlternate** - + @@ -2629,8 +2629,8 @@ Example
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -2638,8 +2638,8 @@ Example
            - - + + Added in the January service release of Windows 10, version 1607. Specifies an alternate intranet server to host updates from Microsoft Update. You can then use this update service to automatically update computers on your network. This setting lets you specify a server on your network to function as an internal update service. The Automatic Updates client will search this service for updates that apply to the computers on your network. @@ -2653,7 +2653,7 @@ Value type is string and the default value is an empty string, "". If the settin > If the "Alternate Download Server" Group Policy is not set, it will use the WSUS server by default to download updates. > This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. - +
            diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index 7ebe88f286..6e21e25c40 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -116,7 +116,7 @@ ms.date: 01/29/2018 **UserRights/AccessCredentialManagerAsTrustedCaller** - + @@ -138,8 +138,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -147,11 +147,11 @@ ms.date: 01/29/2018
            - - + + This user right is used by Credential Manager during Backup/Restore. No accounts should have this privilege, as it is only assigned to Winlogon. Users' saved credentials might be compromised if this privilege is given to other entities. - +
            @@ -159,7 +159,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts **UserRights/AccessFromNetwork** - + @@ -181,8 +181,8 @@ This user right is used by Credential Manager during Backup/Restore. No accounts
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -190,11 +190,11 @@ This user right is used by Credential Manager during Backup/Restore. No accounts
            - - + + This user right determines which users and groups are allowed to connect to the computer over the network. Remote Desktop Services are not affected by this user right.Note: Remote Desktop Services was called Terminal Services in previous versions of Windows Server. - +
            @@ -202,7 +202,7 @@ This user right determines which users and groups are allowed to connect to the **UserRights/ActAsPartOfTheOperatingSystem** - + @@ -224,8 +224,8 @@ This user right determines which users and groups are allowed to connect to the
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -233,11 +233,11 @@ This user right determines which users and groups are allowed to connect to the
            - - + + This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. Processes that require this privilege should use the LocalSystem account, which already includes this privilege, rather than using a separate user account with this privilege specially assigned. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - +
            @@ -245,7 +245,7 @@ This user right allows a process to impersonate any user without authentication. **UserRights/AllowLocalLogOn** - + @@ -267,8 +267,8 @@ This user right allows a process to impersonate any user without authentication.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -276,11 +276,11 @@ This user right allows a process to impersonate any user without authentication.
            - - + + This user right determines which users can log on to the computer. Note: Modifying this setting may affect compatibility with clients, services, and applications. For compatibility information about this setting, see Allow log on locally (https://go.microsoft.com/fwlink/?LinkId=24268 ) at the Microsoft website. - +
            @@ -288,7 +288,7 @@ This user right determines which users can log on to the computer. Note: Modifyi **UserRights/BackupFilesAndDirectories** - + @@ -310,8 +310,8 @@ This user right determines which users can log on to the computer. Note: Modifyi
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -319,11 +319,11 @@ This user right determines which users can log on to the computer. Note: Modifyi
            - - + + This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when backing up files and directories.Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Read. Caution: Assigning this user right can be a security risk. Since users with this user right can read any registry settings and files, only assign this user right to trusted users - +
            @@ -331,7 +331,7 @@ This user right determines which users can bypass file, directory, registry, and **UserRights/ChangeSystemTime** - + @@ -353,8 +353,8 @@ This user right determines which users can bypass file, directory, registry, and
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -362,11 +362,11 @@ This user right determines which users can bypass file, directory, registry, and
            - - + + This user right determines which users and groups can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. - +
            @@ -374,7 +374,7 @@ This user right determines which users and groups can change the time and date o **UserRights/CreateGlobalObjects** - + @@ -396,8 +396,8 @@ This user right determines which users and groups can change the time and date o
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -405,11 +405,11 @@ This user right determines which users and groups can change the time and date o
            - - + + This security setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users' sessions, which could lead to application failure or data corruption. Caution: Assigning this user right can be a security risk. Assign this user right only to trusted users. - +
            @@ -417,7 +417,7 @@ This security setting determines whether users can create global objects that ar **UserRights/CreatePageFile** - + @@ -439,8 +439,8 @@ This security setting determines whether users can create global objects that ar
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -448,11 +448,11 @@ This security setting determines whether users can create global objects that ar
            - - + + This user right determines which users and groups can call an internal application programming interface (API) to create and change the size of a page file. This user right is used internally by the operating system and usually does not need to be assigned to any users - +
            @@ -460,7 +460,7 @@ This user right determines which users and groups can call an internal applicati **UserRights/CreatePermanentSharedObjects** - + @@ -482,8 +482,8 @@ This user right determines which users and groups can call an internal applicati
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -491,11 +491,11 @@ This user right determines which users and groups can call an internal applicati
            - - + + This user right determines which accounts can be used by processes to create a directory object using the object manager. This user right is used internally by the operating system and is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel mode already have this user right assigned to them, it is not necessary to specifically assign it. - +
            @@ -503,7 +503,7 @@ This user right determines which accounts can be used by processes to create a d **UserRights/CreateSymbolicLinks** - + @@ -525,8 +525,8 @@ This user right determines which accounts can be used by processes to create a d
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -534,11 +534,11 @@ This user right determines which accounts can be used by processes to create a d
            - - + + This user right determines if the user can create a symbolic link from the computer he is logged on to. Caution: This privilege should only be given to trusted users. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. Note: This setting can be used in conjunction a symlink filesystem setting that can be manipulated with the command line utility to control the kinds of symlinks that are allowed on the machine. Type 'fsutil behavior set symlinkevaluation /?' at the command line to get more information about fsutil and symbolic links. - +
            @@ -546,7 +546,7 @@ This user right determines if the user can create a symbolic link from the compu **UserRights/CreateToken** - + @@ -568,8 +568,8 @@ This user right determines if the user can create a symbolic link from the compu
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -577,11 +577,11 @@ This user right determines if the user can create a symbolic link from the compu
            - - + + This user right determines which accounts can be used by processes to create a token that can then be used to get access to any local resources when the process uses an internal application programming interface (API) to create an access token. This user right is used internally by the operating system. Unless it is necessary, do not assign this user right to a user, group, or process other than Local System. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - +
            @@ -589,7 +589,7 @@ This user right determines which accounts can be used by processes to create a t **UserRights/DebugPrograms** - + @@ -611,8 +611,8 @@ This user right determines which accounts can be used by processes to create a t
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -620,11 +620,11 @@ This user right determines which accounts can be used by processes to create a t
            - - + + This user right determines which users can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need to be assigned this user right. Developers who are debugging new system components will need this user right to be able to do so. This user right provides complete access to sensitive and critical operating system components. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - +
            @@ -632,7 +632,7 @@ This user right determines which users can attach a debugger to any process or t **UserRights/DenyAccessFromNetwork** - + @@ -654,8 +654,8 @@ This user right determines which users can attach a debugger to any process or t
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -663,11 +663,11 @@ This user right determines which users can attach a debugger to any process or t
            - - + + This user right determines which users are prevented from accessing a computer over the network. This policy setting supersedes the Access this computer from the network policy setting if a user account is subject to both policies. - +
            @@ -675,7 +675,7 @@ This user right determines which users are prevented from accessing a computer o **UserRights/DenyLocalLogOn** - + @@ -697,8 +697,8 @@ This user right determines which users are prevented from accessing a computer o
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -706,11 +706,11 @@ This user right determines which users are prevented from accessing a computer o
            - - + + This security setting determines which service accounts are prevented from registering a process as a service. Note: This security setting does not apply to the System, Local Service, or Network Service accounts. - +
            @@ -718,7 +718,7 @@ This security setting determines which service accounts are prevented from regis **UserRights/DenyRemoteDesktopServicesLogOn** - + @@ -740,8 +740,8 @@ This security setting determines which service accounts are prevented from regis
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -749,11 +749,11 @@ This security setting determines which service accounts are prevented from regis
            - - + + This user right determines which users and groups are prohibited from logging on as a Remote Desktop Services client. - +
            @@ -761,7 +761,7 @@ This user right determines which users and groups are prohibited from logging on **UserRights/EnableDelegation** - + @@ -783,8 +783,8 @@ This user right determines which users and groups are prohibited from logging on
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -792,11 +792,11 @@ This user right determines which users and groups are prohibited from logging on
            - - + + This user right determines which users can set the Trusted for Delegation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using delegated credentials of a client, as long as the client account does not have the Account cannot be delegated account control flag set. Caution: Misuse of this user right, or of the Trusted for Delegation setting, could make the network vulnerable to sophisticated attacks using Trojan horse programs that impersonate incoming clients and use their credentials to gain access to network resources. - +
            @@ -804,7 +804,7 @@ This user right determines which users can set the Trusted for Delegation settin **UserRights/GenerateSecurityAudits** - + @@ -826,8 +826,8 @@ This user right determines which users can set the Trusted for Delegation settin
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -835,11 +835,11 @@ This user right determines which users can set the Trusted for Delegation settin
            - - + + This user right determines which accounts can be used by a process to add entries to the security log. The security log is used to trace unauthorized system access. Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial of service. Shut down system immediately if unable to log security audits security policy setting is enabled. - +
            @@ -847,7 +847,7 @@ This user right determines which accounts can be used by a process to add entrie **UserRights/ImpersonateClient** - + @@ -869,8 +869,8 @@ This user right determines which accounts can be used by a process to add entrie
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -878,15 +878,15 @@ This user right determines which accounts can be used by a process to add entrie
            - - + + Assigning this user right to a user allows programs running on behalf of that user to impersonate a client. Requiring this user right for this kind of impersonation prevents an unauthorized user from convincing a client to connect (for example, by remote procedure call (RPC) or named pipes) to a service that they have created and then impersonating that client, which can elevate the unauthorized user's permissions to administrative or system levels. Caution: Assigning this user right can be a security risk. Only assign this user right to trusted users. Note: By default, services that are started by the Service Control Manager have the built-in Service group added to their access tokens. Component Object Model (COM) servers that are started by the COM infrastructure and that are configured to run under a specific account also have the Service group added to their access tokens. As a result, these services get this user right when they are started. In addition, a user can also impersonate an access token if any of the following conditions exist. 1) The access token that is being impersonated is for this user. 2) The user, in this logon session, created the access token by logging on to the network with explicit credentials. 3) The requested level is less than Impersonate, such as Anonymous or Identify. Because of these factors, users do not usually need this user right. Warning: If you enable this setting, programs that previously had the Impersonate privilege may lose it, and they may not run. - +
            @@ -894,7 +894,7 @@ Because of these factors, users do not usually need this user right. Warning: If **UserRights/IncreaseSchedulingPriority** - + @@ -916,8 +916,8 @@ Because of these factors, users do not usually need this user right. Warning: If
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -925,11 +925,11 @@ Because of these factors, users do not usually need this user right. Warning: If
            - - + + This user right determines which accounts can use a process with Write Property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. - +
            @@ -937,7 +937,7 @@ This user right determines which accounts can use a process with Write Property **UserRights/LoadUnloadDeviceDrivers** - + @@ -959,8 +959,8 @@ This user right determines which accounts can use a process with Write Property
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -968,11 +968,11 @@ This user right determines which accounts can use a process with Write Property
            - - + + This user right determines which users can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. It is recommended that you do not assign this privilege to other users. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - +
            @@ -980,7 +980,7 @@ This user right determines which users can dynamically load and unload device dr **UserRights/LockMemory** - + @@ -1002,8 +1002,8 @@ This user right determines which users can dynamically load and unload device dr
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1011,11 +1011,11 @@ This user right determines which users can dynamically load and unload device dr
            - - + + This user right determines which accounts can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). - +
            @@ -1023,7 +1023,7 @@ This user right determines which accounts can use a process to keep data in phys **UserRights/ManageAuditingAndSecurityLog** - + @@ -1045,8 +1045,8 @@ This user right determines which accounts can use a process to keep data in phys
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1054,11 +1054,11 @@ This user right determines which accounts can use a process to keep data in phys
            - - + + This user right determines which users can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. This security setting does not allow a user to enable file and object access auditing in general. You can view audited events in the security log of the Event Viewer. A user with this privilege can also view and clear the security log. - +
            @@ -1066,7 +1066,7 @@ This user right determines which users can specify object access auditing option **UserRights/ManageVolume** - + @@ -1088,8 +1088,8 @@ This user right determines which users can specify object access auditing option
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1097,11 +1097,11 @@ This user right determines which users can specify object access auditing option
            - - + + This user right determines which users and groups can run maintenance tasks on a volume, such as remote defragmentation. Use caution when assigning this user right. Users with this user right can explore disks and extend files in to memory that contains other data. When the extended files are opened, the user might be able to read and modify the acquired data. - +
            @@ -1109,7 +1109,7 @@ This user right determines which users and groups can run maintenance tasks on a **UserRights/ModifyFirmwareEnvironment** - + @@ -1131,8 +1131,8 @@ This user right determines which users and groups can run maintenance tasks on a
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1140,11 +1140,11 @@ This user right determines which users and groups can run maintenance tasks on a
            - - + + This user right determines who can modify firmware environment values. Firmware environment variables are settings stored in the nonvolatile RAM of non-x86-based computers. The effect of the setting depends on the processor.On x86-based computers, the only firmware environment value that can be modified by assigning this user right is the Last Known Good Configuration setting, which should only be modified by the system. On Itanium-based computers, boot information is stored in nonvolatile RAM. Users must be assigned this user right to run bootcfg.exe and to change the Default Operating System setting on Startup and Recovery in System Properties. On all computers, this user right is required to install or upgrade Windows.Note: This security setting does not affect who can modify the system environment variables and user environment variables that are displayed on the Advanced tab of System Properties. - +
            @@ -1152,7 +1152,7 @@ This user right determines who can modify firmware environment values. Firmware **UserRights/ModifyObjectLabel** - + @@ -1174,8 +1174,8 @@ This user right determines who can modify firmware environment values. Firmware
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1183,11 +1183,11 @@ This user right determines who can modify firmware environment values. Firmware
            - - + + This user right determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. - +
            @@ -1195,7 +1195,7 @@ This user right determines which user accounts can modify the integrity label of **UserRights/ProfileSingleProcess** - + @@ -1217,8 +1217,8 @@ This user right determines which user accounts can modify the integrity label of
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1226,11 +1226,11 @@ This user right determines which user accounts can modify the integrity label of
            - - + + This user right determines which users can use performance monitoring tools to monitor the performance of system processes. - +
            @@ -1238,7 +1238,7 @@ This user right determines which users can use performance monitoring tools to m **UserRights/RemoteShutdown** - + @@ -1260,8 +1260,8 @@ This user right determines which users can use performance monitoring tools to m
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1269,11 +1269,11 @@ This user right determines which users can use performance monitoring tools to m
            - - + + This user right determines which users are allowed to shut down a computer from a remote location on the network. Misuse of this user right can result in a denial of service. - +
            @@ -1281,7 +1281,7 @@ This user right determines which users are allowed to shut down a computer from **UserRights/RestoreFilesAndDirectories** - + @@ -1303,8 +1303,8 @@ This user right determines which users are allowed to shut down a computer from
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1312,11 +1312,11 @@ This user right determines which users are allowed to shut down a computer from
            - - + + This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories, and determines which users can set any valid security principal as the owner of an object. Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Write. Caution: Assigning this user right can be a security risk. Since users with this user right can overwrite registry settings, hide data, and gain ownership of system objects, only assign this user right to trusted users. - +
            @@ -1324,7 +1324,7 @@ This user right determines which users can bypass file, directory, registry, and **UserRights/TakeOwnership** - + @@ -1346,8 +1346,8 @@ This user right determines which users can bypass file, directory, registry, and
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1355,11 +1355,11 @@ This user right determines which users can bypass file, directory, registry, and
            - - + + This user right determines which users can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. Caution: Assigning this user right can be a security risk. Since owners of objects have full control of them, only assign this user right to trusted users. - +
            diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 7416d833f4..75609b7de1 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -48,10 +48,10 @@ ms.date: 01/29/2018 **WiFi/AllowWiFiHotSpotReporting** - + This policy has been deprecated. - +
            @@ -59,7 +59,7 @@ This policy has been deprecated. **Wifi/AllowAutoConnectToWiFiSenseHotspots** - + @@ -81,8 +81,8 @@ This policy has been deprecated.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -90,13 +90,13 @@ This policy has been deprecated.
            - - + + Allow or disallow the device to automatically connect to Wi-Fi hotspots. Most restricted value is 0. - + The following list shows the supported values: @@ -111,7 +111,7 @@ The following list shows the supported values: **Wifi/AllowInternetSharing** - + @@ -133,8 +133,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -142,13 +142,13 @@ The following list shows the supported values:
            - - + + Allow or disallow internet sharing. Most restricted value is 0. - + The following list shows the supported values: @@ -163,7 +163,7 @@ The following list shows the supported values: **Wifi/AllowManualWiFiConfiguration** - + @@ -185,8 +185,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -194,8 +194,8 @@ The following list shows the supported values:
            - - + + Allow or disallow connecting to Wi-Fi outside of MDM server-installed networks. Most restricted value is 0. @@ -203,7 +203,7 @@ Most restricted value is 0. > [!NOTE] > Setting this policy deletes any previously installed user-configured and Wi-Fi sense Wi-Fi profiles from the device. Certain Wi-Fi profiles that are not user configured nor Wi-Fi sense might not be deleted. In addition, not all non-MDM profiles are completely deleted. - + The following list shows the supported values: @@ -218,7 +218,7 @@ The following list shows the supported values: **Wifi/AllowWiFi** - + @@ -240,8 +240,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -249,13 +249,13 @@ The following list shows the supported values:
            - - + + Allow or disallow WiFi connection. Most restricted value is 0. - + The following list shows the supported values: @@ -270,7 +270,7 @@ The following list shows the supported values: **Wifi/AllowWiFiDirect** - + @@ -292,8 +292,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -301,11 +301,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Allow WiFi Direct connection.. - + The following list shows the supported values: @@ -320,7 +320,7 @@ The following list shows the supported values: **Wifi/WLANScanMode** - + @@ -342,8 +342,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -351,8 +351,8 @@ The following list shows the supported values:
            - - + + Allow an enterprise to control the WLAN scanning behavior and how aggressively devices should be actively scanning for Wi-Fi networks to get devices connected. Supported values are 0-500, where 100 = normal scan frequency and 500 = low scan frequency. @@ -361,7 +361,7 @@ The default value is 0. Supported operations are Add, Delete, Get, and Replace. - +
            diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index 4c421859f2..084f29982c 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -86,7 +86,7 @@ ms.date: 01/29/2018 **WindowsDefenderSecurityCenter/CompanyName** - + @@ -108,8 +108,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -117,13 +117,13 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. The company name that is displayed to the users. CompanyName is required for both EnableCustomizedToasts and EnableInAppCustomization. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display the contact options. Value type is string. Supported operations are Add, Get, Replace and Delete. - +
            @@ -131,7 +131,7 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. **WindowsDefenderSecurityCenter/DisableAccountProtectionUI** - + @@ -153,8 +153,8 @@ Value type is string. Supported operations are Add, Get, Replace and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -162,8 +162,8 @@ Value type is string. Supported operations are Add, Get, Replace and Delete.
            - - + + Added in Windows 10, next major release. Use this policy setting to specify if to display the Account protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Valid values: @@ -171,7 +171,7 @@ Valid values: - 0 - (Disable) The users can see the display of the Account protection area in Windows Defender Security Center. - 1 - (Enable) The users cannot see the display of the Account protection area in Windows Defender Security Center. - +
            @@ -179,7 +179,7 @@ Valid values: **WindowsDefenderSecurityCenter/DisableAppBrowserUI** - + @@ -201,8 +201,8 @@ Valid values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -210,13 +210,13 @@ Valid values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the app and browser protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -231,7 +231,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableDeviceSecurityUI** - + @@ -253,8 +253,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -262,8 +262,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major release. Use this policy setting if you want to disable the display of the Device security area in the Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Valid values: @@ -271,7 +271,7 @@ Valid values: - 0 - (Disable) The users can see the display of the Device security area in Windows Defender Security Center. - 1 - (Enable) The users cannot see the display of the Device secuirty area in Windows Defender Security Center. - +
            @@ -279,7 +279,7 @@ Valid values: **WindowsDefenderSecurityCenter/DisableEnhancedNotifications** - + @@ -301,8 +301,8 @@ Valid values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -310,8 +310,8 @@ Valid values:
            - - + + Added in Windows 10, version 1709. Use this policy if you want Windows Defender Security Center to only display notifications which are considered critical. If you disable or do not configure this setting, Windows Defender Security Center will display critical and non-critical notifications to users. > [!Note] @@ -319,7 +319,7 @@ Added in Windows 10, version 1709. Use this policy if you want Windows Defender Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -334,7 +334,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableFamilyUI** - + @@ -356,8 +356,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -365,13 +365,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the family options area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -386,7 +386,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableHealthUI** - + @@ -408,8 +408,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -417,13 +417,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the device performance and health area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -438,7 +438,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableNetworkUI** - + @@ -460,8 +460,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -469,13 +469,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the firewall and network protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -490,7 +490,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableNotifications** - + @@ -512,8 +512,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -521,13 +521,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of Windows Defender Security Center notifications. If you disable or do not configure this setting, Windows Defender Security Center notifications will display on devices. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -542,7 +542,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisableVirusUI** - + @@ -564,8 +564,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -573,13 +573,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Use this policy setting if you want to disable the display of the virus and threat protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -594,7 +594,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/DisallowExploitProtectionOverride** - + @@ -616,8 +616,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -625,13 +625,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Prevent users from making changes to the exploit protection settings area in the Windows Defender Security Center. If you disable or do not configure this setting, local users can make changes in the exploit protection settings area. Value type is integer. Supported operations are Add, Get, Replace and Delete. - + The following list shows the supported values: @@ -646,7 +646,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/Email** - + @@ -668,8 +668,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -677,13 +677,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. The email address that is displayed to users.  The default mail application is used to initiate email actions. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. Value type is string. Supported operations are Add, Get, Replace and Delete. - +
            @@ -691,7 +691,7 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. **WindowsDefenderSecurityCenter/EnableCustomizedToasts** - + @@ -713,8 +713,8 @@ Value type is string. Supported operations are Add, Get, Replace and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -722,13 +722,13 @@ Value type is string. Supported operations are Add, Get, Replace and Delete.
            - - + + Added in Windows 10, version 1709. Enable this policy to display your company name and contact options in the notifications. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will display a default notification text. Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: @@ -743,7 +743,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/EnableInAppCustomization** - + @@ -765,8 +765,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -774,13 +774,13 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. Enable this policy to have your company name and contact options displayed in a contact card fly out in Windows Defender Security Center. If you disable or do not configure this setting, or do not provide CompanyName and a minimum of one contact method (Phone using Skype, Email, Help portal URL) Windows Defender Security Center will not display the contact card fly out notification. Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + The following list shows the supported values: @@ -795,7 +795,7 @@ The following list shows the supported values: **WindowsDefenderSecurityCenter/HideRansomwareDataRecovery** - + @@ -817,8 +817,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -826,8 +826,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, next major update. Use this policy setting to hide the Ransomware data recovery area in Windows Defender Security Center. Valid values: @@ -835,7 +835,7 @@ Valid values: - 0 - (Disable or not configured) The Ransomware data recovery area will be visible. - 1 - (Enable) The Ransomware data recovery area is hidden. - +
            @@ -843,7 +843,7 @@ Valid values: **WindowsDefenderSecurityCenter/HideSecureBoot** - + @@ -865,8 +865,8 @@ Valid values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -874,8 +874,8 @@ Valid values:
            - - + + Added in Windows 10, next major update. Use this policy to hide the Secure boot area in the Windows Defender Security Center. Valid values: @@ -883,7 +883,7 @@ Valid values: - 0 - (Disable or not configured) The Secure boot area is displayed. - 1 - (Enable) The Secure boot area is hidden. - +
            @@ -891,7 +891,7 @@ Valid values: **WindowsDefenderSecurityCenter/HideTPMTroubleshooting** - + @@ -913,8 +913,8 @@ Valid values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -922,8 +922,8 @@ Valid values:
            - - + + Added in Windows 10, next major update. Use this policy to hide the Security processor (TPM) troubleshooting area in the Windows Defender Security Center. Valid values: @@ -931,7 +931,7 @@ Valid values: - 0 - (Disable or not configured) The Security processor (TPM) troubleshooting area is displayed. - 1 - (Enable) The Security processor (TPM) troubleshooting area is hidden. - +
            @@ -939,7 +939,7 @@ Valid values: **WindowsDefenderSecurityCenter/Phone** - + @@ -961,8 +961,8 @@ Valid values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -970,13 +970,13 @@ Valid values:
            - - + + Added in Windows 10, version 1709. The phone number or Skype ID that is displayed to users.  Skype is used to initiate the call. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then devices will not display contact options. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            @@ -984,7 +984,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. **WindowsDefenderSecurityCenter/URL** - + @@ -1006,8 +1006,8 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -1015,13 +1015,13 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete.
            - - + + Added in Windows 10, version 1709. The help portal URL this is displayed to users. The default browser is used to initiate this action. If you disable or do not configure this setting, or do not have EnableCustomizedToasts or EnableInAppCustomization enabled, then the device will not display contact options. Value type is Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
            diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index 1ddb435ce8..11511b33b1 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -33,7 +33,7 @@ ms.date: 01/29/2018 **WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace** - + @@ -55,8 +55,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -64,11 +64,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1607. Show recommended app suggestions in the ink workspace. - + The following list shows the supported values: @@ -83,7 +83,7 @@ The following list shows the supported values: **WindowsInkWorkspace/AllowWindowsInkWorkspace** - + @@ -105,8 +105,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -114,8 +114,8 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. Value type is int. The following list shows the supported values: @@ -124,7 +124,7 @@ Value type is int. The following list shows the supported values: - 1 - ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. - 2 (default) - ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. - +
            diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 62e9c0003c..685f5e228e 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -36,7 +36,7 @@ ms.date: 01/29/2018 **WindowsLogon/DisableLockScreenAppNotifications** - + @@ -58,8 +58,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -67,15 +67,15 @@ ms.date: 01/29/2018
            - - + + This policy setting allows you to prevent app notifications from appearing on the lock screen. If you enable this policy setting, no app notifications are displayed on the lock screen. If you disable or do not configure this policy setting, users can choose which apps display notifications on the lock screen. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -83,14 +83,14 @@ If you disable or do not configure this policy setting, users can choose which a > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Turn off app notifications on the lock screen* - GP name: *DisableLockScreenAppNotifications* - GP path: *System/Logon* - GP ADMX file name: *logon.admx* - +
            @@ -98,7 +98,7 @@ ADMX Info: **WindowsLogon/DontDisplayNetworkSelectionUI** - + @@ -120,8 +120,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -129,15 +129,15 @@ ADMX Info:
            - - + + This policy setting allows you to control whether anyone can interact with available networks UI on the logon screen. If you enable this policy setting, the PC's network connectivity state cannot be changed without signing into Windows. If you disable or don't configure this policy setting, any user can disconnect the PC from the network or can connect the PC to other available networks without signing into Windows. - + > [!TIP] > This is an ADMX-backed policy and requires a special SyncML format to enable or disable. For details, see [Understanding ADMX-backed policies](./understanding-admx-backed-policies.md). @@ -145,14 +145,14 @@ If you disable or don't configure this policy setting, any user can disconnect t > The payload of the SyncML must be XML-encoded; for this XML encoding, there are a variety of online encoders that you can use. To avoid encoding the payload, you can use CDATA if your MDM supports it. For more information, see [CDATA Sections](http://www.w3.org/TR/REC-xml/#sec-cdata-sect). - + ADMX Info: - GP English name: *Do not display network selection UI* - GP name: *DontDisplayNetworkSelectionUI* - GP path: *System/Logon* - GP ADMX file name: *logon.admx* - +
            @@ -160,7 +160,7 @@ ADMX Info: **WindowsLogon/HideFastUserSwitching** - + @@ -182,8 +182,8 @@ ADMX Info:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -191,8 +191,8 @@ ADMX Info:
            - - + + Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. To validate on Desktop, do the following: @@ -200,7 +200,7 @@ To validate on Desktop, do the following: 1. Enable policy. 2. Verify that the Switch account button in Start is hidden. - + The following list shows the supported values: diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index 4e120a73e2..0ef62935e1 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -51,7 +51,7 @@ ms.date: 01/29/2018 **WirelessDisplay/AllowMdnsAdvertisement** - + @@ -73,8 +73,8 @@ ms.date: 01/29/2018
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -82,11 +82,11 @@ ms.date: 01/29/2018
            - - + + Added in Windows 10, version 1709. This policy setting allows you to turn off the Wireless Display multicast DNS service advertisement from a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS advertisement. - + The following list shows the supported values: @@ -101,7 +101,7 @@ The following list shows the supported values: **WirelessDisplay/AllowMdnsDiscovery** - + @@ -123,8 +123,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -132,11 +132,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1709. This policy setting allows you to turn off discovering the display service advertised over multicast DNS by a Wireless Display receiver. If the network administrator is concerned about network congestion, they may set this policy to 0, disabling mDNS discovery. - + The following list shows the supported values: @@ -151,7 +151,7 @@ The following list shows the supported values: **WirelessDisplay/AllowProjectionFromPC** - + @@ -173,8 +173,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -182,11 +182,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC. - + The following list shows the supported values: @@ -201,7 +201,7 @@ The following list shows the supported values: **WirelessDisplay/AllowProjectionFromPCOverInfrastructure** - + @@ -223,8 +223,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -232,11 +232,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy allows you to turn off projection from a PC over infrastructure. - + The following list shows the supported values: @@ -251,7 +251,7 @@ The following list shows the supported values: **WirelessDisplay/AllowProjectionToPC** - + @@ -273,8 +273,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -282,15 +282,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Allow or disallow turning off the projection to a PC. If you set it to 0 (zero), your PC is not discoverable and you cannot project to it. If you set it to 1, your PC is discoverable and you can project to it above the lock screen. The user has an option to turn it always on or always off except for manual launch. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. Value type is integer. - + The following list shows the supported values: @@ -305,7 +305,7 @@ The following list shows the supported values: **WirelessDisplay/AllowProjectionToPCOverInfrastructure** - + @@ -327,8 +327,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -336,11 +336,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. This policy setting allows you to turn off projection to a PC over infrastructure. - + The following list shows the supported values: @@ -355,7 +355,7 @@ The following list shows the supported values: **WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** - + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -363,11 +363,11 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1703. Setting this policy controls whether or not the wireless display can send input—keyboard, mouse, pen, and touch input if the display supports it—back to the source device. - + The following list shows the supported values: @@ -382,7 +382,7 @@ The following list shows the supported values: **WirelessDisplay/RequirePinForPairing** - + @@ -404,8 +404,8 @@ The following list shows the supported values:
            Home
            - - + + [Scope](./policy-configuration-service-provider.md#policy-scope): > [!div class = "checklist"] @@ -413,15 +413,15 @@ The following list shows the supported values:
            - - + + Added in Windows 10, version 1607. Allow or disallow requirement for a PIN for pairing. If you turn this on, the pairing ceremony for new devices will always require a PIN. If you turn this off or do not configure it, a PIN is not required for pairing. In PCs that support Miracast, after the policy is applied you can verify the setting from the user interface in **Settings** > **System** > **Projecting to this PC**. Value type is integer. - + The following list shows the supported values: From 33595c56f8f3a328c730dca8b38b405116fefde1 Mon Sep 17 00:00:00 2001 From: Tara Meyer Date: Mon, 29 Jan 2018 21:10:08 +0000 Subject: [PATCH 52/91] Initialize open publishing repository: https://cpubwin.visualstudio.com/DefaultCollection/it-client/_git/it-client of branch master --- .openpublishing.publish.config.json | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 75b0bd92c0..7754fdf882 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -125,6 +125,7 @@ "build_output_subfolder": "microsoft-365", "locale": "en-us", "monikers": [], + "moniker_ranges": [], "open_to_public_contributors": false, "type_mapping": { "Conceptual": "Content", @@ -483,7 +484,8 @@ "branches_to_filter": [ "" ], - "git_repository_url_open_to_public_contributors": "https://cpubwin.visualstudio.com/_git/it-client", + "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", + "git_repository_branch_open_to_public_contributors": "master", "skip_source_output_uploading": false, "need_preview_pull_request": true, "resolve_user_profile_using_github": true, From ce9fbfa8a437e6a2a34f44f2eefb9e6bf56c7b52 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 29 Jan 2018 13:57:16 -0800 Subject: [PATCH 53/91] updating repo url --- .openpublishing.publish.config.json | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 7754fdf882..430506237d 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -484,8 +484,7 @@ "branches_to_filter": [ "" ], - "git_repository_url_open_to_public_contributors": "https://github.com/MicrosoftDocs/windows-itpro-docs", - "git_repository_branch_open_to_public_contributors": "master", + "git_repository_url_open_to_public_contributors": "https://cpubwin.visualstudio.com/_git/it-client", "skip_source_output_uploading": false, "need_preview_pull_request": true, "resolve_user_profile_using_github": true, From 7c9a90989a3e8c4413e5d4a6fc58c597eae5df96 Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Mon, 29 Jan 2018 23:15:06 +0000 Subject: [PATCH 54/91] Merged PR 5559: fixing typo in SupportedSKUs end tag --- .../mdm/policy-csp-abovelock.md | 6 +- ...csp-accountpoliciesaccountlockoutpolicy.md | 6 +- .../mdm/policy-csp-accounts.md | 8 +- .../mdm/policy-csp-activexcontrols.md | 2 +- .../mdm/policy-csp-applicationdefaults.md | 2 +- .../mdm/policy-csp-applicationmanagement.md | 22 +- .../mdm/policy-csp-appvirtualization.md | 56 +- .../mdm/policy-csp-attachmentmanager.md | 6 +- .../mdm/policy-csp-authentication.md | 10 +- .../mdm/policy-csp-autoplay.md | 6 +- .../mdm/policy-csp-bitlocker.md | 2 +- .../mdm/policy-csp-bluetooth.md | 10 +- .../mdm/policy-csp-browser.md | 76 +-- .../mdm/policy-csp-camera.md | 2 +- .../mdm/policy-csp-cellular.md | 10 +- .../mdm/policy-csp-connectivity.md | 28 +- .../mdm/policy-csp-controlpolicyconflict.md | 2 +- .../mdm/policy-csp-credentialproviders.md | 6 +- .../mdm/policy-csp-credentialsui.md | 4 +- .../mdm/policy-csp-cryptography.md | 4 +- .../mdm/policy-csp-dataprotection.md | 4 +- .../mdm/policy-csp-datausage.md | 4 +- .../mdm/policy-csp-defender.md | 70 +-- .../mdm/policy-csp-deliveryoptimization.md | 46 +- .../mdm/policy-csp-desktop.md | 2 +- .../mdm/policy-csp-deviceguard.md | 6 +- .../mdm/policy-csp-deviceinstallation.md | 4 +- .../mdm/policy-csp-devicelock.md | 34 +- .../mdm/policy-csp-display.md | 4 +- .../mdm/policy-csp-education.md | 6 +- .../mdm/policy-csp-enterprisecloudprint.md | 12 +- .../mdm/policy-csp-errorreporting.md | 10 +- .../mdm/policy-csp-eventlogservice.md | 8 +- .../mdm/policy-csp-experience.md | 38 +- .../mdm/policy-csp-exploitguard.md | 2 +- .../client-management/mdm/policy-csp-games.md | 2 +- .../mdm/policy-csp-handwriting.md | 2 +- .../mdm/policy-csp-internetexplorer.md | 486 +++++++++--------- .../mdm/policy-csp-kerberos.md | 10 +- .../mdm/policy-csp-kioskbrowser.md | 12 +- .../mdm/policy-csp-licensing.md | 4 +- ...policy-csp-localpoliciessecurityoptions.md | 110 ++-- .../mdm/policy-csp-location.md | 2 +- .../mdm/policy-csp-lockdown.md | 2 +- .../client-management/mdm/policy-csp-maps.md | 4 +- .../mdm/policy-csp-messaging.md | 6 +- .../mdm/policy-csp-networkisolation.md | 16 +- .../mdm/policy-csp-notifications.md | 2 +- .../client-management/mdm/policy-csp-power.md | 18 +- .../mdm/policy-csp-printers.md | 6 +- .../mdm/policy-csp-privacy.md | 154 +++--- .../mdm/policy-csp-remoteassistance.md | 8 +- .../mdm/policy-csp-remotedesktopservices.md | 12 +- .../mdm/policy-csp-remotemanagement.md | 30 +- .../mdm/policy-csp-remoteprocedurecall.md | 4 +- .../mdm/policy-csp-remoteshell.md | 14 +- .../mdm/policy-csp-search.md | 26 +- .../mdm/policy-csp-security.md | 22 +- .../mdm/policy-csp-settings.md | 28 +- .../mdm/policy-csp-smartscreen.md | 6 +- .../mdm/policy-csp-speech.md | 2 +- .../client-management/mdm/policy-csp-start.md | 58 +-- .../mdm/policy-csp-storage.md | 4 +- .../mdm/policy-csp-system.md | 30 +- .../mdm/policy-csp-systemservices.md | 12 +- .../mdm/policy-csp-taskscheduler.md | 2 +- .../mdm/policy-csp-textinput.md | 26 +- .../mdm/policy-csp-timelanguagesettings.md | 2 +- .../mdm/policy-csp-update.md | 94 ++-- .../mdm/policy-csp-userrights.md | 58 +-- .../client-management/mdm/policy-csp-wifi.md | 12 +- ...olicy-csp-windowsdefendersecuritycenter.md | 38 +- .../mdm/policy-csp-windowsinkworkspace.md | 4 +- .../mdm/policy-csp-windowslogon.md | 6 +- .../mdm/policy-csp-wirelessdisplay.md | 14 +- 75 files changed, 933 insertions(+), 933 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 8a9ab9e4cd..09bab6143a 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -113,7 +113,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -163,7 +163,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md index fef93c8458..e74c715473 100644 --- a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md +++ b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md @@ -60,7 +60,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -107,7 +107,7 @@ Default: None, because this policy setting only has meaning when an Account lock - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -154,7 +154,7 @@ Default: 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index 8bfbafa470..14b5d262f0 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -61,7 +61,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -116,7 +116,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -168,7 +168,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -218,7 +218,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index c8facbef8f..6b16327ccb 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index a2454f2ffd..9016bca75e 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 024a22b95c..a28201a263 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -82,7 +82,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -135,7 +135,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -185,7 +185,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -238,7 +238,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -293,7 +293,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -345,7 +345,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -397,7 +397,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -462,7 +462,7 @@ Value evaluation rule - The information for PolicyManager is opaque. There is no - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -512,7 +512,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -562,7 +562,7 @@ Most restricted value is 1. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -614,7 +614,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index b30da5cc6a..f1bfd67657 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -133,7 +133,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -191,7 +191,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -249,7 +249,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -307,7 +307,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -365,7 +365,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -423,7 +423,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -491,7 +491,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -549,7 +549,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -607,7 +607,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -665,7 +665,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -723,7 +723,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -781,7 +781,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -839,7 +839,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -915,7 +915,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -991,7 +991,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1067,7 +1067,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1143,7 +1143,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1219,7 +1219,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1277,7 +1277,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1335,7 +1335,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1393,7 +1393,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1451,7 +1451,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1509,7 +1509,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1567,7 +1567,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1625,7 +1625,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1683,7 +1683,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1741,7 +1741,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1799,7 +1799,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index 257d3f313a..b23d0fec1c 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -122,7 +122,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -186,7 +186,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index d030e6f423..6755d07861 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -64,7 +64,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -114,7 +114,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -164,7 +164,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -216,7 +216,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -270,7 +270,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index 0c38facc2f..1691a0fce0 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -121,7 +121,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -193,7 +193,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index ab5e371656..35eb61f9df 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index 4cc182b25a..dc992781e7 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -64,7 +64,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -118,7 +118,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -172,7 +172,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -222,7 +222,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -269,7 +269,7 @@ If this policy is not set or it is deleted, the default local radio name is used - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index cb2b6f9db3..07b993c521 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -165,7 +165,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -221,7 +221,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -281,7 +281,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -340,7 +340,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -398,7 +398,7 @@ To verify AllowCookies is set to 0 (not allowed): - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -455,7 +455,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -515,7 +515,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -566,7 +566,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -617,7 +617,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -668,7 +668,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -721,7 +721,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -777,7 +777,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -837,7 +837,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -897,7 +897,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -952,7 +952,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1005,7 +1005,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1065,7 +1065,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1116,7 +1116,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1175,7 +1175,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1234,7 +1234,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1293,7 +1293,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1346,7 +1346,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1399,7 +1399,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1444,7 +1444,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1496,7 +1496,7 @@ The default value is an empty string. Otherwise, the string should contain the U - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1550,7 +1550,7 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1610,7 +1610,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1661,7 +1661,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1714,7 +1714,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1767,7 +1767,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1820,7 +1820,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1871,7 +1871,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1926,7 +1926,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1983,7 +1983,7 @@ Data type is string. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2040,7 +2040,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2098,7 +2098,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2155,7 +2155,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2219,7 +2219,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index d92acc51af..fc227b1f17 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index 8fd91336fe..db8f20499e 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -64,7 +64,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -127,7 +127,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -170,7 +170,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -213,7 +213,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -256,7 +256,7 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index 537f8beffa..c4e91457b4 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -91,7 +91,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -149,7 +149,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -200,7 +200,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -263,7 +263,7 @@ To validate on mobile devices, do the following: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -316,7 +316,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -372,7 +372,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -430,7 +430,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -482,7 +482,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -534,7 +534,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -591,7 +591,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -648,7 +648,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -705,7 +705,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -750,7 +750,7 @@ Value type is integer. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -810,7 +810,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index 2adc69c9bb..421980c7b1 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -54,7 +54,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 7b5579ff02..20a5e4fc8d 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -124,7 +124,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -188,7 +188,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index f8e1d19c97..29395b9209 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -122,7 +122,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index 4908b2af8e..e35c21d6ee 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -103,7 +103,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index c1a23ddc73..0a497016a1 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -107,7 +107,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index da3f7e483a..736ad17532 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -123,7 +123,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index f8ca333a92..1324fc9bf1 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -154,7 +154,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -206,7 +206,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -258,7 +258,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -310,7 +310,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -362,7 +362,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -414,7 +414,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -466,7 +466,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -518,7 +518,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -570,7 +570,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -622,7 +622,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -674,7 +674,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -726,7 +726,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -778,7 +778,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -830,7 +830,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -879,7 +879,7 @@ Value type is string. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -930,7 +930,7 @@ Value type is string. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -981,7 +981,7 @@ The default value is 50. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1044,7 +1044,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1097,7 +1097,7 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1143,7 +1143,7 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1189,7 +1189,7 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1240,7 +1240,7 @@ The default value is 0, which keeps items in quarantine, and does not automatica - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1294,7 +1294,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1354,7 +1354,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1401,7 +1401,7 @@ Allows an administrator to specify a list of file type extensions to ignore duri - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1448,7 +1448,7 @@ Allows an administrator to specify a list of directory paths to ignore during a - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1501,7 +1501,7 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1554,7 +1554,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1611,7 +1611,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1663,7 +1663,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1720,7 +1720,7 @@ The default value is 120 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1783,7 +1783,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1840,7 +1840,7 @@ The default value is 120. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1893,7 +1893,7 @@ The default value is 8. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1947,7 +1947,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 44763626f4..066c6de874 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -123,7 +123,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -172,7 +172,7 @@ The default value is 10. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -226,7 +226,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -271,7 +271,7 @@ After the max delay is reached, the download will resume using HTTP, either down - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -328,7 +328,7 @@ The following list shows the supported values as number of seconds: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -386,7 +386,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -436,7 +436,7 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -496,7 +496,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -545,7 +545,7 @@ The default value is 259200 seconds (3 days). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -594,7 +594,7 @@ The default value is 20. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -643,7 +643,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -692,7 +692,7 @@ The default value is 0, which permits unlimited possible bandwidth (optimized fo - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -741,7 +741,7 @@ The default value is 500. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -789,7 +789,7 @@ The default value is 0. The value 0 (zero) means "not limited" and the cloud ser - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -841,7 +841,7 @@ The default value is 32 GB. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -890,7 +890,7 @@ The default value is 100 MB. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -939,7 +939,7 @@ The default value is 4 GB. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -988,7 +988,7 @@ By default, %SystemDrive% is used to store the cache. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1039,7 +1039,7 @@ The default value is 20. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1095,7 +1095,7 @@ This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryo - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1140,7 +1140,7 @@ Note that downloads from LAN peers will not be throttled even when this policy i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1192,7 +1192,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1245,7 +1245,7 @@ This policy allows an IT Admin to define the following: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index fbbf63681d..009265655e 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index decc360200..d2cc249634 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -108,7 +108,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -159,7 +159,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 212324e984..d104e70a92 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -117,7 +117,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 8b22ded5b4..97297f2da1 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -102,7 +102,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -159,7 +159,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -218,7 +218,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -272,7 +272,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -332,7 +332,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -420,7 +420,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -476,7 +476,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -534,7 +534,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -583,7 +583,7 @@ Value type is a string, which is the full image filepath and filename. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -632,7 +632,7 @@ Value type is a string, which is the AppID. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -695,7 +695,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -749,7 +749,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -801,7 +801,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -915,7 +915,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -974,7 +974,7 @@ For additional information about this policy, see [Exchange ActiveSync Policy En - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1021,7 +1021,7 @@ Configure the minimum password age to be more than 0 if you want Enforce passwor - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1083,7 +1083,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index 3921cace6c..395598e623 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -111,7 +111,7 @@ To validate on Desktop, do the following: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 6889a52380..70e051604f 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -103,7 +103,7 @@ The policy value is expected to be the name (network host name) of an installed - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -153,7 +153,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 38c3886970..635152c9cc 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -67,7 +67,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -114,7 +114,7 @@ The default value is an empty string. Otherwise, the value should contain the UR - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -161,7 +161,7 @@ The default value is an empty string. Otherwise, the value should contain a GUID - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -208,7 +208,7 @@ The default value is an empty string. Otherwise, the value should contain a URL. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -255,7 +255,7 @@ The default value is an empty string. Otherwise, the value should contain the UR - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -302,7 +302,7 @@ For Windows Mobile, the default value is 20. - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index 4f957acf78..8b4deb16d5 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -64,7 +64,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -136,7 +136,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -198,7 +198,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -264,7 +264,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -326,7 +326,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index 961555b8fe..b531654651 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -61,7 +61,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -125,7 +125,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -187,7 +187,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -249,7 +249,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 1ee67cf404..08a7c01d46 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -114,7 +114,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -169,7 +169,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -221,7 +221,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -275,7 +275,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -329,7 +329,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -385,7 +385,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -450,7 +450,7 @@ This policy is deprecated. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -517,7 +517,7 @@ This policy is deprecated. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -567,7 +567,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -626,7 +626,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -680,7 +680,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -734,7 +734,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -790,7 +790,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -846,7 +846,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -902,7 +902,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -957,7 +957,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1013,7 +1013,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1063,7 +1063,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1116,7 +1116,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index ba0ff86d79..421c1c41e8 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index 51f293f7b8..233f091ce6 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index 15016063fb..ac276081cf 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index 2b29a32684..ba26acd4fc 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -778,7 +778,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -841,7 +841,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -904,7 +904,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -973,7 +973,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1030,7 +1030,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1088,7 +1088,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1146,7 +1146,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1211,7 +1211,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1274,7 +1274,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1337,7 +1337,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1394,7 +1394,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1457,7 +1457,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1522,7 +1522,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1591,7 +1591,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1660,7 +1660,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1729,7 +1729,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1798,7 +1798,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1867,7 +1867,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1936,7 +1936,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2005,7 +2005,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2068,7 +2068,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2137,7 +2137,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2195,7 +2195,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2260,7 +2260,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2329,7 +2329,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2398,7 +2398,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2467,7 +2467,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2525,7 +2525,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2583,7 +2583,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2641,7 +2641,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2706,7 +2706,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2769,7 +2769,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2832,7 +2832,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2890,7 +2890,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2948,7 +2948,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3013,7 +3013,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3071,7 +3071,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3134,7 +3134,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3199,7 +3199,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3266,7 +3266,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3333,7 +3333,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3395,7 +3395,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3453,7 +3453,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3511,7 +3511,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3569,7 +3569,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3632,7 +3632,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3695,7 +3695,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3760,7 +3760,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3818,7 +3818,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3882,7 +3882,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3940,7 +3940,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4008,7 +4008,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4076,7 +4076,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4141,7 +4141,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4210,7 +4210,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4275,7 +4275,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4340,7 +4340,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4405,7 +4405,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4470,7 +4470,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4533,7 +4533,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4591,7 +4591,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4649,7 +4649,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4714,7 +4714,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4779,7 +4779,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4837,7 +4837,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4902,7 +4902,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -4960,7 +4960,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5018,7 +5018,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5076,7 +5076,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5134,7 +5134,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5199,7 +5199,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5266,7 +5266,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5324,7 +5324,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5389,7 +5389,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5447,7 +5447,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5505,7 +5505,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5563,7 +5563,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5621,7 +5621,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5679,7 +5679,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5737,7 +5737,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5795,7 +5795,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5853,7 +5853,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5911,7 +5911,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -5978,7 +5978,7 @@ ADMX Info: - + @@ -6011,7 +6011,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6069,7 +6069,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6127,7 +6127,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6185,7 +6185,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6250,7 +6250,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6308,7 +6308,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6366,7 +6366,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6424,7 +6424,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6489,7 +6489,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6554,7 +6554,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6617,7 +6617,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6682,7 +6682,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6747,7 +6747,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6812,7 +6812,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6877,7 +6877,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -6944,7 +6944,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7009,7 +7009,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7067,7 +7067,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7134,7 +7134,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7192,7 +7192,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7257,7 +7257,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7322,7 +7322,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7387,7 +7387,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7450,7 +7450,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7515,7 +7515,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7580,7 +7580,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7645,7 +7645,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7710,7 +7710,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7777,7 +7777,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7842,7 +7842,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7900,7 +7900,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -7967,7 +7967,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8025,7 +8025,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8090,7 +8090,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8155,7 +8155,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8220,7 +8220,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8283,7 +8283,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8348,7 +8348,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8413,7 +8413,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8478,7 +8478,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8543,7 +8543,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8610,7 +8610,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8675,7 +8675,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8742,7 +8742,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8800,7 +8800,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8865,7 +8865,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8930,7 +8930,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -8995,7 +8995,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9058,7 +9058,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9123,7 +9123,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9188,7 +9188,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9253,7 +9253,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9318,7 +9318,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9385,7 +9385,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9450,7 +9450,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9517,7 +9517,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9582,7 +9582,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9647,7 +9647,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9712,7 +9712,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9775,7 +9775,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9840,7 +9840,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9905,7 +9905,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -9970,7 +9970,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10035,7 +10035,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10102,7 +10102,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10167,7 +10167,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10234,7 +10234,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10292,7 +10292,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10357,7 +10357,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10422,7 +10422,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10487,7 +10487,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10550,7 +10550,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10615,7 +10615,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10680,7 +10680,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10745,7 +10745,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10810,7 +10810,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10877,7 +10877,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -10942,7 +10942,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11009,7 +11009,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11067,7 +11067,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11132,7 +11132,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11197,7 +11197,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11262,7 +11262,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11325,7 +11325,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11390,7 +11390,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11455,7 +11455,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11520,7 +11520,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11585,7 +11585,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11652,7 +11652,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11717,7 +11717,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11784,7 +11784,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11842,7 +11842,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11907,7 +11907,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -11965,7 +11965,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12023,7 +12023,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12081,7 +12081,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12139,7 +12139,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12197,7 +12197,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12255,7 +12255,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12313,7 +12313,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12371,7 +12371,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12429,7 +12429,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12494,7 +12494,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12552,7 +12552,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12617,7 +12617,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12680,7 +12680,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12738,7 +12738,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12796,7 +12796,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12854,7 +12854,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12912,7 +12912,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -12977,7 +12977,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13042,7 +13042,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13100,7 +13100,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13158,7 +13158,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13223,7 +13223,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13281,7 +13281,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13339,7 +13339,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13397,7 +13397,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13455,7 +13455,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13520,7 +13520,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13587,7 +13587,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13645,7 +13645,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13710,7 +13710,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13768,7 +13768,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13826,7 +13826,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13884,7 +13884,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -13942,7 +13942,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14000,7 +14000,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14058,7 +14058,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14116,7 +14116,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14174,7 +14174,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14241,7 +14241,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14299,7 +14299,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14357,7 +14357,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14415,7 +14415,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14480,7 +14480,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14538,7 +14538,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14596,7 +14596,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14654,7 +14654,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14712,7 +14712,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14770,7 +14770,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14828,7 +14828,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14886,7 +14886,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -14944,7 +14944,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15007,7 +15007,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15064,7 +15064,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15122,7 +15122,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15187,7 +15187,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15252,7 +15252,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15315,7 +15315,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15380,7 +15380,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15445,7 +15445,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15510,7 +15510,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15575,7 +15575,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15642,7 +15642,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15707,7 +15707,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15765,7 +15765,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15832,7 +15832,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -15890,7 +15890,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 66c8d28294..7a2e9f901b 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -64,7 +64,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -126,7 +126,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -187,7 +187,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -253,7 +253,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -315,7 +315,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index eba4551112..769c55b3dd 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -69,7 +69,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -113,7 +113,7 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -157,7 +157,7 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -201,7 +201,7 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -245,7 +245,7 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -289,7 +289,7 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's navigatio - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 8cd5d7c7a9..28751d2800 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -105,7 +105,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 79fc96e412..d142ceb56a 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -216,7 +216,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -274,7 +274,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -329,7 +329,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -381,7 +381,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -441,7 +441,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -490,7 +490,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -539,7 +539,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -589,7 +589,7 @@ Disabling this policy may tempt users to try and physically remove the laptop fr - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -639,7 +639,7 @@ Default: This policy is not defined and only Administrators have this ability. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -691,7 +691,7 @@ This setting does not affect the ability to add a local printer. This setting do - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -740,7 +740,7 @@ Default: This policy is not defined and CD-ROM access is not restricted to the l - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -800,7 +800,7 @@ Logon information transmitted over the secure channel is always encrypted regard - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -857,7 +857,7 @@ Note: Domain controllers are also domain members and establish secure channels w - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -908,7 +908,7 @@ Default: Enabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -960,7 +960,7 @@ This setting should not be used in an attempt to support dual-boot scenarios tha - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1011,7 +1011,7 @@ This setting applies to Windows 2000 computers, but it is not available through - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1073,7 +1073,7 @@ In order to take advantage of this policy on domain controllers, all domain cont - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1123,7 +1123,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1178,7 +1178,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1234,7 +1234,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1291,7 +1291,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1343,7 +1343,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1394,7 +1394,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1443,7 +1443,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1507,7 +1507,7 @@ On Windows Vista and above: For this setting to work, the Smart Card Removal Pol - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1572,7 +1572,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1634,7 +1634,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1683,7 +1683,7 @@ Default: Disabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1734,7 +1734,7 @@ Default:This policy is not defined, which means that the system treats it as 15 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1808,7 +1808,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1874,7 +1874,7 @@ For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1933,7 +1933,7 @@ This policy has no impact on domain controllers. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1982,7 +1982,7 @@ Default: Disabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2033,7 +2033,7 @@ Default: Disabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2082,7 +2082,7 @@ Default: Enabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2131,7 +2131,7 @@ This policy is supported on at least Windows Server 2016. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2188,7 +2188,7 @@ Note: Windows Vista or Windows Server 2008 do not expose this setting in Group P - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2239,7 +2239,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2293,7 +2293,7 @@ This setting can affect the ability of computers running Windows 2000 Server, Wi - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2362,7 +2362,7 @@ Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2416,7 +2416,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2470,7 +2470,7 @@ Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - + Recovery console: Allow automatic administrative logon @@ -2513,7 +2513,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2570,7 +2570,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2621,7 +2621,7 @@ Default: Disabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2670,7 +2670,7 @@ Default: Enabled. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2726,7 +2726,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2787,7 +2787,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2841,7 +2841,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2892,7 +2892,7 @@ Disabled: Application installation packages are not detected and prompted for el - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2943,7 +2943,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3000,7 +3000,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3052,7 +3052,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3103,7 +3103,7 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3154,7 +3154,7 @@ The options are: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index 533c3d2f12..f5a62a9471 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index d42f28adb1..38165bb182 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index 178bc58f12..d4c5ac8af2 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -108,7 +108,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index a7f3f8050a..a10d85a033 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -109,7 +109,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -157,7 +157,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index bbbe2fb3fa..1e104d4c8a 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -73,7 +73,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -116,7 +116,7 @@ Contains a list of Enterprise resource domains hosted in the cloud that need to - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -172,7 +172,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -215,7 +215,7 @@ Boolean value that tells the client to accept the configured list and not to use - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -258,7 +258,7 @@ This is the comma-separated list of internal proxy servers. For example "157.54. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -311,7 +311,7 @@ Here are the steps to create canonical domain names: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -354,7 +354,7 @@ This is a comma-separated list of proxy servers. Any server on this list is cons - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -397,7 +397,7 @@ Boolean value that tells the client to accept the configured list of proxies and - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index 767c680221..d9bb95050c 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 8de63327aa..7ea180fcf7 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -76,7 +76,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -138,7 +138,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -202,7 +202,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -266,7 +266,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -331,7 +331,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -395,7 +395,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -457,7 +457,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -519,7 +519,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -583,7 +583,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index e6535304b1..709afa0ddb 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -133,7 +133,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -208,7 +208,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 79f182b572..8ab600b9d8 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -280,7 +280,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -336,7 +336,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -388,7 +388,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -441,7 +441,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -491,7 +491,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -542,7 +542,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -585,7 +585,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -628,7 +628,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -671,7 +671,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -722,7 +722,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -765,7 +765,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -808,7 +808,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -851,7 +851,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -902,7 +902,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -945,7 +945,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -988,7 +988,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1031,7 +1031,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1082,7 +1082,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1125,7 +1125,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1168,7 +1168,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1211,7 +1211,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1262,7 +1262,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1305,7 +1305,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1348,7 +1348,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1391,7 +1391,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1442,7 +1442,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1485,7 +1485,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1528,7 +1528,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1571,7 +1571,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1622,7 +1622,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1665,7 +1665,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1708,7 +1708,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1751,7 +1751,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1802,7 +1802,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1845,7 +1845,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1888,7 +1888,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1931,7 +1931,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1982,7 +1982,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2025,7 +2025,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2068,7 +2068,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2111,7 +2111,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2162,7 +2162,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2205,7 +2205,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2248,7 +2248,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2291,7 +2291,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2342,7 +2342,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2385,7 +2385,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2428,7 +2428,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2471,7 +2471,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2522,7 +2522,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2565,7 +2565,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2608,7 +2608,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2651,7 +2651,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2702,7 +2702,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2745,7 +2745,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2788,7 +2788,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2831,7 +2831,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2874,7 +2874,7 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2917,7 +2917,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2960,7 +2960,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3003,7 +3003,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3054,7 +3054,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3097,7 +3097,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3140,7 +3140,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3183,7 +3183,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3234,7 +3234,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3277,7 +3277,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3320,7 +3320,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3363,7 +3363,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3416,7 +3416,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3459,7 +3459,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3502,7 +3502,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3545,7 +3545,7 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3596,7 +3596,7 @@ Most restricted value is 2. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3639,7 +3639,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3682,7 +3682,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -3725,7 +3725,7 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index 25c6878ae9..1cf07a4456 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -61,7 +61,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -129,7 +129,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -193,7 +193,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -265,7 +265,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index 1ff2a93cea..2c808afadf 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -67,7 +67,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -135,7 +135,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -207,7 +207,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -273,7 +273,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -335,7 +335,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -403,7 +403,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index 762edfe54e..141fbaed7e 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -94,7 +94,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -151,7 +151,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -208,7 +208,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -265,7 +265,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -322,7 +322,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -379,7 +379,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -436,7 +436,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -493,7 +493,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -550,7 +550,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -607,7 +607,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -664,7 +664,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -721,7 +721,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -778,7 +778,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -835,7 +835,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -892,7 +892,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index 12189ebcb2..6038112891 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -121,7 +121,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index bb014aba29..d1a746424c 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -70,7 +70,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -127,7 +127,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -184,7 +184,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -241,7 +241,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -298,7 +298,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -355,7 +355,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -412,7 +412,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index 8a9ea5fa7c..6aac1d55e9 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -93,7 +93,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -141,7 +141,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -191,7 +191,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -247,7 +247,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -319,7 +319,7 @@ This policy has been deprecated. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -369,7 +369,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -412,7 +412,7 @@ Allow Windows indexer. Value type is integer. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -462,7 +462,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -510,7 +510,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -562,7 +562,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -617,7 +617,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -669,7 +669,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -717,7 +717,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index ac48498127..7ee5db3300 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -84,7 +84,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -134,7 +134,7 @@ The following list shows the supported values: - + > [!NOTE] > This policy has been deprecated in Windows 10, version 1607 @@ -182,7 +182,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -238,7 +238,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -288,7 +288,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -342,7 +342,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -395,7 +395,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -449,7 +449,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -503,7 +503,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -556,7 +556,7 @@ Most restricted value is 1. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -604,7 +604,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index f80b9cac01..f5a811c564 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -93,7 +93,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -150,7 +150,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -200,7 +200,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -250,7 +250,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -300,7 +300,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -354,7 +354,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -399,7 +399,7 @@ If disabled, Settings will not contact Microsoft content services to retrieve ti - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -453,7 +453,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -507,7 +507,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -561,7 +561,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -611,7 +611,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -665,7 +665,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -715,7 +715,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -765,7 +765,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index c487c7699c..27398259c1 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -108,7 +108,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -158,7 +158,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 6da3005afa..2c38f752bb 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index af43f0bf48..fa95c2c0a3 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -136,7 +136,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -187,7 +187,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -238,7 +238,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -289,7 +289,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -340,7 +340,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -391,7 +391,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -442,7 +442,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -493,7 +493,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -544,7 +544,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -595,7 +595,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -646,7 +646,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -701,7 +701,7 @@ If there is policy configuration conflict, the latest configuration request is a - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -764,7 +764,7 @@ To validate on Desktop, do the following: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -819,7 +819,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -881,7 +881,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -939,7 +939,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -994,7 +994,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1039,7 +1039,7 @@ Value type is integer. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1097,7 +1097,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1162,7 +1162,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1224,7 +1224,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1279,7 +1279,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1334,7 +1334,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1389,7 +1389,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1444,7 +1444,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1499,7 +1499,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1558,7 +1558,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1616,7 +1616,7 @@ To validate on Desktop, do the following: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1674,7 +1674,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index f7c55ff050..62c833ad36 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -106,7 +106,7 @@ Value type is integer. - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index eb2ff5cb90..e8c1f500f6 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -96,7 +96,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -151,7 +151,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -203,7 +203,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -257,7 +257,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -320,7 +320,7 @@ To verify if System/AllowFontProviders is set to true: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -377,7 +377,7 @@ For example, an app's original Location setting is Off. The administrator then s - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -429,7 +429,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -548,7 +548,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -601,7 +601,7 @@ orted values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -657,7 +657,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -700,7 +700,7 @@ This policy setting blocks the Connected User Experience and Telemetry service f - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -764,7 +764,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -832,7 +832,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -882,7 +882,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -938,7 +938,7 @@ If you disable or do not configure this policy setting, then the level of diagno - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index 121c82b0ca..e717d43451 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -69,7 +69,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -112,7 +112,7 @@ Added in Windows 10, next major update. This setting determines whether the serv - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -155,7 +155,7 @@ Added in Windows 10, next major update. This setting determines whether the serv - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -198,7 +198,7 @@ Added in Windows 10, next major update. This setting determines whether the serv - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -241,7 +241,7 @@ Added in Windows 10, next major update. This setting determines whether the serv - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -284,7 +284,7 @@ Added in Windows 10, next major update. This setting determines whether the serv - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index 9f01af6518..0da5ed456d 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -54,7 +54,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index c9ef2af75d..7b2956f975 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -93,7 +93,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -149,7 +149,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -205,7 +205,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -261,7 +261,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -315,7 +315,7 @@ Most restricted value is 0. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -371,7 +371,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -427,7 +427,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -483,7 +483,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -555,7 +555,7 @@ This policy has been deprecated. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -611,7 +611,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -667,7 +667,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -719,7 +719,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -771,7 +771,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index ae92f571db..ddda234337 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -52,7 +52,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 2b7ed79caf..d6e49b9bb0 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -195,7 +195,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -245,7 +245,7 @@ The default is 17 (5 PM). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -292,7 +292,7 @@ The default value is 18 (hours). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -342,7 +342,7 @@ The default value is 8 (8 AM). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -402,7 +402,7 @@ If the policy is not configured, end-users get the default behavior (Auto instal - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -456,7 +456,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -504,7 +504,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -558,7 +558,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -615,7 +615,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -662,7 +662,7 @@ The default value is 7 days. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -711,7 +711,7 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -759,7 +759,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -812,7 +812,7 @@ The following list shows the supported values: - + Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. @@ -846,7 +846,7 @@ Added in Windows 10, next major update. Enable IT admin to configure feature up - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -896,7 +896,7 @@ Supported values are 0-365 days. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -941,7 +941,7 @@ Supported values are 0-30. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1077,7 +1077,7 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1132,7 +1132,7 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1175,7 +1175,7 @@ Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 2 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1231,7 +1231,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1278,7 +1278,7 @@ The default value is 0 days (not specified). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1325,7 +1325,7 @@ The default value is 3 days. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1372,7 +1372,7 @@ The default value is 7 days. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1423,7 +1423,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1474,7 +1474,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1539,7 +1539,7 @@ To validate this policy: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1601,7 +1601,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1650,7 +1650,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1706,7 +1706,7 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1757,7 +1757,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1802,7 +1802,7 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1850,7 +1850,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1906,7 +1906,7 @@ This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupd - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1958,7 +1958,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2012,7 +2012,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2061,7 +2061,7 @@ Supported values are 15, 30, or 60 (minutes). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2114,7 +2114,7 @@ Supported values are 2, 4, 8, 12, or 24 (hours). - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2172,7 +2172,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2219,7 +2219,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2266,7 +2266,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2313,7 +2313,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2360,7 +2360,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2407,7 +2407,7 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2462,7 +2462,7 @@ The default value is 3. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2510,7 +2510,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2558,7 +2558,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -2629,7 +2629,7 @@ Example - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index 6e21e25c40..53cf96c3f3 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -138,7 +138,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -181,7 +181,7 @@ This user right is used by Credential Manager during Backup/Restore. No accounts - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -224,7 +224,7 @@ This user right determines which users and groups are allowed to connect to the - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -267,7 +267,7 @@ This user right allows a process to impersonate any user without authentication. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -310,7 +310,7 @@ This user right determines which users can log on to the computer. Note: Modifyi - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -353,7 +353,7 @@ This user right determines which users can bypass file, directory, registry, and - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -396,7 +396,7 @@ This user right determines which users and groups can change the time and date o - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -439,7 +439,7 @@ This security setting determines whether users can create global objects that ar - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -482,7 +482,7 @@ This user right determines which users and groups can call an internal applicati - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -525,7 +525,7 @@ This user right determines which accounts can be used by processes to create a d - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -568,7 +568,7 @@ This user right determines if the user can create a symbolic link from the compu - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -611,7 +611,7 @@ This user right determines which accounts can be used by processes to create a t - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -654,7 +654,7 @@ This user right determines which users can attach a debugger to any process or t - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -697,7 +697,7 @@ This user right determines which users are prevented from accessing a computer o - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -740,7 +740,7 @@ This security setting determines which service accounts are prevented from regis - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -783,7 +783,7 @@ This user right determines which users and groups are prohibited from logging on - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -826,7 +826,7 @@ This user right determines which users can set the Trusted for Delegation settin - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -869,7 +869,7 @@ This user right determines which accounts can be used by a process to add entrie - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -916,7 +916,7 @@ Because of these factors, users do not usually need this user right. Warning: If - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -959,7 +959,7 @@ This user right determines which accounts can use a process with Write Property - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1002,7 +1002,7 @@ This user right determines which users can dynamically load and unload device dr - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1045,7 +1045,7 @@ This user right determines which accounts can use a process to keep data in phys - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1088,7 +1088,7 @@ This user right determines which users can specify object access auditing option - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1131,7 +1131,7 @@ This user right determines which users and groups can run maintenance tasks on a - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1174,7 +1174,7 @@ This user right determines who can modify firmware environment values. Firmware - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1217,7 +1217,7 @@ This user right determines which user accounts can modify the integrity label of - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1260,7 +1260,7 @@ This user right determines which users can use performance monitoring tools to m - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1303,7 +1303,7 @@ This user right determines which users are allowed to shut down a computer from - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1346,7 +1346,7 @@ This user right determines which users can bypass file, directory, registry, and - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 75609b7de1..5d27b9d4f0 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -81,7 +81,7 @@ This policy has been deprecated. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -133,7 +133,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -185,7 +185,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -240,7 +240,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -292,7 +292,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -342,7 +342,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index 084f29982c..78fb5ed4b9 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -108,7 +108,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -153,7 +153,7 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -201,7 +201,7 @@ Valid values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -253,7 +253,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -301,7 +301,7 @@ Valid values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -356,7 +356,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -408,7 +408,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -460,7 +460,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -512,7 +512,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -564,7 +564,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -616,7 +616,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -668,7 +668,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -713,7 +713,7 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -765,7 +765,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -817,7 +817,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -865,7 +865,7 @@ Valid values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -913,7 +913,7 @@ Valid values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -961,7 +961,7 @@ Valid values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -1006,7 +1006,7 @@ Value type is string. Supported operations are Add, Get, Replace, and Delete. - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index 11511b33b1..eda04ac82d 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -55,7 +55,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -105,7 +105,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 685f5e228e..e0a364f38a 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -58,7 +58,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -120,7 +120,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -182,7 +182,7 @@ ADMX Info: - + [Scope](./policy-configuration-service-provider.md#policy-scope): diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index 0ef62935e1..e7c65f476a 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -73,7 +73,7 @@ ms.date: 01/29/2018 - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -123,7 +123,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -173,7 +173,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -223,7 +223,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -273,7 +273,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -327,7 +327,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): @@ -404,7 +404,7 @@ The following list shows the supported values: - + [Scope](./policy-configuration-service-provider.md#policy-scope): From b56cd0d2d221189e2db7546f6223e48e8899085d Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Mon, 29 Jan 2018 23:51:03 +0000 Subject: [PATCH 55/91] Merged PR 5577: best effort tokenization of Policy CSP (by automation) --- .../mdm/policy-csp-applicationdefaults.md | 4 +- .../mdm/policy-csp-applicationmanagement.md | 18 +- .../mdm/policy-csp-browser.md | 145 +++++++----- .../mdm/policy-csp-cryptography.md | 4 +- .../mdm/policy-csp-defender.md | 99 ++++++-- .../mdm/policy-csp-devicelock.md | 104 ++++++--- .../mdm/policy-csp-display.md | 8 +- .../mdm/policy-csp-experience.md | 8 +- .../mdm/policy-csp-exploitguard.md | 4 +- ...policy-csp-localpoliciessecurityoptions.md | 108 ++++++--- .../mdm/policy-csp-location.md | 6 +- .../mdm/policy-csp-messaging.md | 12 +- .../mdm/policy-csp-privacy.md | 157 ++++++++----- .../mdm/policy-csp-search.md | 47 ++-- .../mdm/policy-csp-security.md | 34 ++- .../mdm/policy-csp-settings.md | 8 +- .../client-management/mdm/policy-csp-start.md | 221 ++++++++++-------- .../mdm/policy-csp-storage.md | 9 +- .../mdm/policy-csp-system.md | 40 ++-- .../mdm/policy-csp-textinput.md | 35 ++- .../mdm/policy-csp-update.md | 93 +++++--- ...olicy-csp-windowsdefendersecuritycenter.md | 20 +- .../mdm/policy-csp-windowsinkworkspace.md | 4 +- .../mdm/policy-csp-windowslogon.md | 12 +- 24 files changed, 784 insertions(+), 416 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 9016bca75e..2889bb4f2a 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -67,6 +67,8 @@ Added in Windows 10, version 1703. This policy allows an administrator to set de If policy is enabled and the client machine is Azure Active Directory joined, the associations assigned in SyncML will be processed and default associations will be applied. + + To create create the SyncML, follow these steps:
            1. Install a few apps and change your defaults.
            2. @@ -119,7 +121,7 @@ Here is the SyncMl example: ``` - +
              diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index a28201a263..1ca01c5a3f 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -148,14 +148,17 @@ The following list shows the supported values: Specifies whether automatic update of apps from Microsoft Store are allowed. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -Most restricted value is 0. - - +
              @@ -525,14 +528,17 @@ The following list shows the supported values: Allows disabling of the retail catalog and only enables the Private store. + +Most restricted value is 1. + + + The following list shows the supported values: - 0 (default) – Allow both public and Private store. - 1 – Only Private store is enabled. -Most restricted value is 1. - - +
              diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 07b993c521..51ca199a31 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -237,13 +237,6 @@ Specifies whether autofill on websites is allowed. Most restricted value is 0. -To verify AllowAutofill is set to 0 (not allowed): - -1. Open Microsoft Edge. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Save form entries** is greyed out. - The following list shows the supported values: @@ -252,6 +245,15 @@ The following list shows the supported values: - 1 (default) – Allowed. + +To verify AllowAutofill is set to 0 (not allowed): + +1. Open Microsoft Edge. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Save form entries** is greyed out. + +
              @@ -354,13 +356,18 @@ The following list shows the supported values: Specifies whether cookies are allowed. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -Most restricted value is 0. - + + To verify AllowCookies is set to 0 (not allowed): 1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. @@ -368,7 +375,7 @@ To verify AllowCookies is set to 0 (not allowed): 3. Click **Settings** in the drop down list, and select **View Advanced Settings**. 4. Verify the setting **Cookies** is greyed out. - +
              @@ -471,13 +478,6 @@ Specifies whether Do Not Track headers are allowed. Most restricted value is 1. -To verify AllowDoNotTrack is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Send Do Not Track requests** is greyed out. - The following list shows the supported values: @@ -486,6 +486,15 @@ The following list shows the supported values: - 1 – Allowed. + +To verify AllowDoNotTrack is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Send Do Not Track requests** is greyed out. + +
              @@ -793,13 +802,6 @@ Specifies whether saving and managing passwords locally on the device is allowed Most restricted value is 0. -To verify AllowPasswordManager is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. - The following list shows the supported values: @@ -808,6 +810,15 @@ The following list shows the supported values: - 1 (default) – Allowed. + +To verify AllowPasswordManager is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. + +
              @@ -853,13 +864,6 @@ Specifies whether pop-up blocker is allowed or enabled. Most restricted value is 1. -To verify AllowPopups is set to 0 (not allowed): - -1. Open Microsoft Edge. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Block pop-ups** is greyed out. - The following list shows the supported values: @@ -868,6 +872,15 @@ The following list shows the supported values: - 1 – Pop-up blocker is allowed or enabled. It means that pop-up browser windows are blocked. + +To verify AllowPopups is set to 0 (not allowed): + +1. Open Microsoft Edge. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Block pop-ups** is greyed out. + +
              @@ -1021,13 +1034,6 @@ Specifies whether Windows Defender SmartScreen is allowed. Most restricted value is 1. -To verify AllowSmartScreen is set to 0 (not allowed): - -1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. -2. In the upper-right corner of the browser, click **…**. -3. Click **Settings** in the drop down list, and select **View Advanced Settings**. -4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. - The following list shows the supported values: @@ -1036,6 +1042,15 @@ The following list shows the supported values: - 1 (default) – Allowed. + +To verify AllowSmartScreen is set to 0 (not allowed): + +1. Open Microsoft Edge or Microsoft Edge for Windows 10 Mobile. +2. In the upper-right corner of the browser, click **…**. +3. Click **Settings** in the drop down list, and select **View Advanced Settings**. +4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. + +
              @@ -1132,12 +1147,6 @@ Added in Windows 10, version 1703. Specifies whether to clear browsing data on e Most restricted value is 1. -To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): - -1. Open Microsoft Edge and browse to websites. -2. Close the Microsoft Edge window. -3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. - The following list shows the supported values: @@ -1146,6 +1155,14 @@ The following list shows the supported values: - 1 – Browsing data is cleared on exit. + +To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set to 1): + +1. Open Microsoft Edge and browse to websites. +2. Close the Microsoft Edge window. +3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. + +
              @@ -1197,14 +1214,17 @@ If this setting is not configured, the search engines used are the ones that are > [!IMPORTANT] > Due to Protected Settings (aka.ms/browserpolicy), this setting will apply only on domain-joined machines or when the device is MDM-enrolled.  + +Most restricted value is 0. + + + The following list shows the supported values: - 0 (default) – Additional search engines are not allowed. - 1 – Additional search engines are allowed. -Most restricted value is 0. - - +
              @@ -1364,12 +1384,14 @@ The following list shows the supported values:   Allows the user to specify an URL of an enterprise site list. + + The following list shows the supported values: - Not configured. The device checks for updates from Microsoft Update. - Set to a URL location of the enterprise site list. - +
              @@ -2061,14 +2083,17 @@ If this setting is not configured, the default search engine is set to the one s > [!IMPORTANT] > This setting can be used only with domain-joined or MDM-enrolled devices. For more information, see the Microsoft browser extension policy (aka.ms/browserpolicy). + +Most restricted value is 0. + + + The following list shows the supported values: - 0 (default) - The default search engine is set to the one specified in App settings. - 1 - Allows you to configure the default search engine for your employees. -Most restricted value is 0. - - +
              @@ -2174,14 +2199,6 @@ Added in Windows 10, version 1703. Specifies whether favorites are kept in sync > > Enabling this setting stops Microsoft Edge favorites from syncing between connected Windows 10 devices. -To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge: - -
                -
              1. Open Internet Explorer and add some favorites. -
              2. Open Microsoft Edge, then select Hub > Favorites. -
              3. Verify that the favorites added to Internet Explorer show up in the favorites list in Microsoft Edge. -
              - The following list shows the supported values: @@ -2190,6 +2207,16 @@ The following list shows the supported values: - 1 – Synchronization is on. + +To verify that favorites are in synchronized between Internet Explorer and Microsoft Edge: + +
                +
              1. Open Internet Explorer and add some favorites. +
              2. Open Microsoft Edge, then select Hub > Favorites. +
              3. Verify that the favorites added to Internet Explorer show up in the favorites list in Microsoft Edge. +
              + +
              diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index e35c21d6ee..2957dd9d77 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -68,12 +68,14 @@ ms.date: 01/29/2018 Allows or disallows the Federal Information Processing Standard (FIPS) policy. + + The following list shows the supported values: - 0 (default) – Not allowed. - 1– Allowed. - +
              diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index 1324fc9bf1..bcd17f7911 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -171,12 +171,14 @@ ms.date: 01/29/2018 Allows or disallows scanning of archives. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -223,12 +225,14 @@ The following list shows the supported values:   Allows or disallows Windows Defender Behavior Monitoring functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -275,12 +279,14 @@ The following list shows the supported values: To best protect your PC, Windows Defender will send information to Microsoft about any problems it finds. Microsoft will analyze that information, learn more about problems affecting you and other customers, and offer improved solutions. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -327,12 +333,14 @@ The following list shows the supported values: Allows or disallows scanning of email. + + The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. - +
              @@ -379,12 +387,14 @@ The following list shows the supported values: Allows or disallows a full scan of mapped network drives. + + The following list shows the supported values: - 0 (default) – Not allowed. - 1 – Allowed. - +
              @@ -431,12 +441,14 @@ The following list shows the supported values: Allows or disallows a full scan of removable drives. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -483,12 +495,14 @@ The following list shows the supported values:   Allows or disallows Windows Defender IOAVP Protection functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -535,12 +549,14 @@ The following list shows the supported values: Allows or disallows Windows Defender Intrusion Prevention functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -587,12 +603,14 @@ The following list shows the supported values: Allows or disallows Windows Defender On Access Protection functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -639,12 +657,14 @@ The following list shows the supported values: Allows or disallows Windows Defender Realtime Monitoring functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -691,12 +711,14 @@ The following list shows the supported values:   Allows or disallows a scanning of network files. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -743,12 +765,14 @@ The following list shows the supported values: Allows or disallows Windows Defender Script Scanning functionality. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -795,12 +819,14 @@ The following list shows the supported values: Allows or disallows user access to the Windows Defender UI. If disallowed, all Windows Defender notifications will also be suppressed. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -947,11 +973,14 @@ Value type is string.   Represents the average CPU load factor for the Windows Defender scan (in percent). -Valid values: 0–100 The default value is 50. + +Valid values: 0–100 + +
              @@ -1206,11 +1235,14 @@ Added in Windows 10, version 1709. This policy settings allows adding user-speci   Time period (in days) that quarantine items will be stored on the system. -Valid values: 0–90 The default value is 0, which keeps items in quarantine, and does not automatically remove them. + +Valid values: 0–90 + +
              @@ -1518,13 +1550,15 @@ Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\E Added in Windows 10, version 1607. Specifies the level of detection for potentially unwanted applications (PUAs). Windows Defender alerts you when potentially unwanted software is being downloaded or attempts to install itself on your computer. + + The following list shows the supported values: - 0 (default) – PUA Protection off. Windows Defender will not protect against potentially unwanted applications. - 1 – PUA Protection on. Detected items are blocked. They will show in history along with other threats. - 2 – Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. - +
              @@ -1574,14 +1608,15 @@ Controls which sets of files should be monitored. > [!NOTE] > If **AllowOnAccessProtection** is not allowed, then this configuration can be used to monitor specific files. - + + The following list shows the supported values: - 0 (default) – Monitor all files (bi-directional). - 1 – Monitor incoming files. - 2 – Monitor outgoing files. - +
              @@ -1628,12 +1663,14 @@ The following list shows the supported values: Selects whether to perform a quick scan or full scan. + + The following list shows the supported values: - 1 (default) – Quick scan - 2 – Full scan - +
              @@ -1684,13 +1721,16 @@ Selects the time of day that the Windows Defender quick scan should run. > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting.   -Valid values: 0–1380 For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. The default value is 120 + +Valid values: 0–1380 + +
              @@ -1740,7 +1780,8 @@ Selects the day that the Windows Defender scan should run. > [!NOTE] > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. - + + The following list shows the supported values: - 0 (default) – Every day @@ -1753,7 +1794,7 @@ The following list shows the supported values: - 7 – Sunday - 8 – No scheduled scan - +
              @@ -1804,13 +1845,16 @@ Selects the time of day that the Windows Defender scan should run. > The scan type will depends on what scan type is selected in the **Defender/ScanParameter** setting. -Valid values: 0–1380. For example, a value of 0=12:00AM, a value of 60=1:00AM, a value of 120=2:00, and so on, up to a value of 1380=11:00PM. The default value is 120. + +Valid values: 0–1380. + +
              @@ -1857,13 +1901,16 @@ The default value is 120.   Specifies the interval (in hours) that will be used to check for signatures, so instead of using the ScheduleDay and ScheduleTime the check for new signatures will be set according to the interval. -Valid values: 0–24. A value of 0 means no check for new signatures, a value of 1 means to check every hour, a value of 2 means to check every two hours, and so on, up to a value of 24, which means to check every day. The default value is 8. + +Valid values: 0–24. + +
              @@ -1910,6 +1957,8 @@ The default value is 8.   Checks for the user consent level in Windows Defender to send data. If the required consent has already been granted, Windows Defender submits them. If not, (and if the user has specified never to ask), the UI is launched to ask for user consent (when **Defender/AllowCloudProtection** is allowed) before sending data. + + The following list shows the supported values: - 0 – Always prompt. @@ -1917,7 +1966,7 @@ The following list shows the supported values: - 2 – Never send. - 3 – Send all samples automatically. - +
              diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 97297f2da1..3b169444ca 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -180,15 +180,18 @@ Specifies whether to show a user-configurable setting to control the screen time > This policy must be wrapped in an Atomic command. -The following list shows the supported values: - -- 0 (default) – Not allowed. -- 1 – Allowed. > [!IMPORTANT] > If this policy is set to 1 (Allowed), the value set by **DeviceLock/ScreenTimeOutWhileLocked** is ignored. To ensure enterprise control over the screen timeout, set this policy to 0 (Not allowed) and use **DeviceLock/ScreenTimeOutWhileLocked** to set the screen timeout period. + +The following list shows the supported values: + +- 0 (default) – Not allowed. +- 1 – Allowed. + +
              @@ -235,14 +238,17 @@ Specifies whether PINs or passwords such as "1111" or "1234" are allowed. For th > This policy must be wrapped in an Atomic command. + +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - +
              @@ -291,11 +297,6 @@ Determines the type of PIN or password required. This policy only applies if the > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions (Home, Pro, Enterprise, and Education). -The following list shows the supported values: - -- 0 – Alphanumeric PIN or password required. -- 1 – Numeric PIN or password required. -- 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. > [!NOTE] > If **AlphanumericDevicePasswordRequired** is set to 1 or 2, then MinDevicePasswordLength = 0 and MinDevicePasswordComplexCharacters = 1. @@ -303,6 +304,14 @@ The following list shows the supported values: > If **AlphanumericDevicePasswordRequired** is set to 0, then MinDevicePasswordLength = 4 and MinDevicePasswordComplexCharacters = 2. + +The following list shows the supported values: + +- 0 – Alphanumeric PIN or password required. +- 1 – Numeric PIN or password required. +- 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. + +
              @@ -351,10 +360,6 @@ Specifies whether device lock is enabled. > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions.   -The following list shows the supported values: - -- 0 (default) – Enabled -- 1 – Disabled > [!IMPORTANT] > The **DevicePasswordEnabled** setting must be set to 0 (device password is enabled) for the following policy settings to take effect: @@ -391,6 +396,13 @@ The following list shows the supported values: > - MaxInactivityTimeDeviceLock + +The following list shows the supported values: + +- 0 (default) – Enabled +- 1 – Disabled + +
              @@ -437,16 +449,19 @@ Specifies when the password expires (in days). > This policy must be wrapped in an Atomic command. -The following list shows the supported values: - -- An integer X where 0 <= X <= 730. -- 0 (default) - Passwords do not expire. If all policy values = 0 then 0; otherwise, Min policy value is the most secure value. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + +The following list shows the supported values: + +- An integer X where 0 <= X <= 730. +- 0 (default) - Passwords do not expire. + +
              @@ -493,10 +508,6 @@ Specifies how many passwords can be stored in the history that can’t be used. > This policy must be wrapped in an Atomic command. -The following list shows the supported values: - -- An integer X where 0 <= X <= 50. -- 0 (default) The value includes the user's current password. This means that with a setting of 1 the user cannot reuse their current password when choosing a new password, while a setting of 5 means that a user cannot set their new password to their current password or any of their previous four passwords. @@ -505,6 +516,13 @@ Max policy value is the most restricted. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + +The following list shows the supported values: + +- An integer X where 0 <= X <= 50. +- 0 (default) + +
              @@ -656,16 +674,19 @@ This policy has different behaviors on the mobile device and desktop. Prior to reaching the failed attempts limit, the user is sent to the lock screen and warned that more failed attempts will lock their computer. When the user reaches the limit, the device automatically reboots and shows the BitLocker recovery page. This page prompts the user for the BitLocker recovery key. -The following list shows the supported values: - -- An integer X where 4 <= X <= 16 for desktop and 0 <= X <= 999 for mobile devices. -- 0 (default) - The device is never wiped after an incorrect PIN or password is entered. Most secure value is 0 if all policy values = 0; otherwise, Min policy value is the most secure value. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + +The following list shows the supported values: + +- An integer X where 4 <= X <= 16 for desktop and 0 <= X <= 999 for mobile devices. +- 0 (default) - The device is never wiped after an incorrect PIN or password is entered. + +
              @@ -712,14 +733,17 @@ Specifies the maximum amount of time (in minutes) allowed after the device is id > This policy must be wrapped in an Atomic command. + +For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). + + + The following list shows the supported values: - An integer X where 0 <= X <= 999. - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." -For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx). - - +
              @@ -765,13 +789,14 @@ Specifies the maximum amount of time (in minutes) allowed after the device is id > [!NOTE] > This policy must be wrapped in an Atomic command. - + + The following list shows the supported values: - An integer X where 0 <= X <= 999. - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - +
              @@ -934,17 +959,20 @@ Specifies the minimum number or characters required in the PIN or password. > Always use the Replace command instead of Add for this policy in Windows 10 for desktop editions. -The following list shows the supported values: - -- An integer X where 4 <= X <= 16 for mobile devices and desktop. However, local accounts will always enforce a minimum password length of 6. -- Not enforced. -- The default value is 4 for mobile devices and desktop devices. Max policy value is the most restricted. For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). + +The following list shows the supported values: + +- An integer X where 4 <= X <= 16 for mobile devices and desktop. However, local accounts will always enforce a minimum password length of 6. +- Not enforced. +- The default value is 4 for mobile devices and desktop devices. + +
              diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index 395598e623..e2302d2679 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -76,12 +76,14 @@ If you disable or do not configure this policy setting, GDI DPI Scaling might st If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. + + To validate on Desktop, do the following: 1. Configure the setting for an app which has GDI DPI scaling enabled via MDM or any other supported mechanisms. 2. Run the app and observe blurry text. - +
              @@ -132,12 +134,14 @@ If you disable or do not configure this policy setting, GDI DPI Scaling will not If GDI DPI Scaling is configured to both turn off and turn on an application, the application will be turned off. + + To validate on Desktop, do the following: 1. Configure the setting for an app which uses GDI. 2. Run the app and observe crisp text. - +
              diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 08a7c01d46..9c346946d7 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -1080,13 +1080,15 @@ The following list shows the supported values: Allows IT admins to specify whether spotlight should be used on the user's lock screen. If your organization does not have an Enterprise spotlight content service, then this policy will behave the same as a setting of 1. + + The following list shows the supported values: - 0 – None. - 1 (default) – Windows spotlight enabled. - 2 – placeholder only for future extension. Using this value has no effect. - +
              @@ -1133,12 +1135,14 @@ If you enable this policy setting, users will no longer see feedback notificatio If you disable or do not configure this policy setting, users can control how often they receive feedback questions. + + The following list shows the supported values: - 0 (default) – Feedback notifications are not disabled. The actual state of feedback notifications on the device will then depend on what GP has configured or what the user has configured locally. - 1 – Feedback notifications are disabled. - +
              diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index 421c1c41e8..9f742bb32f 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -67,6 +67,8 @@ Enables the IT admin to push out a configuration representing the desired system The system settings require a reboot; the application settings do not require a reboot. + + Here is an example: ``` syntax @@ -92,7 +94,7 @@ Here is an example: ``` - +
              diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index d142ceb56a..1207e03022 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -293,13 +293,16 @@ Disabling the Administrator account can become a maintenance issue under certain Under Safe Mode boot, the disabled Administrator account will only be enabled if the machine is non-domain joined and there are no other local active administrator accounts. If the computer is domain joined the disabled administrator will not be enabled. Default: Disabled. -Valid values: -- 0 - local Administrator account is disabled -- 1 - local Administrator account is enabled Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - local Administrator account is disabled +- 1 - local Administrator account is enabled + +
              @@ -343,15 +346,18 @@ Value type is integer. Supported operations are Add, Get, Replace, and Delete. This security setting determines if the Guest account is enabled or disabled. Default: Disabled. -Valid values: -- 0 - local Guest account is disabled -- 1 - local Guest account is enabled Note: If the Guest account is disabled and the security option Network Access: Sharing and Security Model for local accounts is set to Guest Only, network logons, such as those performed by the Microsoft Network Server (SMB Service), will fail. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - local Guest account is disabled +- 1 - local Guest account is enabled + +
              @@ -397,9 +403,6 @@ Accounts: Limit local account use of blank passwords to console logon only This security setting determines whether local accounts that are not password protected can be used to log on from locations other than the physical computer console. If enabled, local accounts that are not password protected will only be able to log on at the computer's keyboard. Default: Enabled. -Valid values: -- 0 - disabled - local accounts that are not password protected can be used to log on from locations other than the physical computer console -- 1 - enabled - local accounts that are not password protected will only be able to log on at the computer's keyboard Warning: @@ -412,6 +415,12 @@ It is possible for applications that use remote interactive logons to bypass thi Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled - local accounts that are not password protected can be used to log on from locations other than the physical computer console +- 1 - enabled - local accounts that are not password protected will only be able to log on at the computer's keyboard + +
              @@ -1086,14 +1095,17 @@ In order to take advantage of this policy on domain controllers, all domain cont Interactive Logon:Display user information when the session is locked + +Value type is integer. Supported operations are Add, Get, Replace, and Delete. + + + Valid values: - 1 - User display name, domain and user names - 2 - User display name only - 3 - Do not display user information -Value type is integer. Supported operations are Add, Get, Replace, and Delete. - - +
              @@ -1142,13 +1154,16 @@ If this policy is enabled, the username will not be shown. If this policy is disabled, the username will be shown. Default: Disabled. -Valid values: -- 0 - disabled (username will be shown) -- 1 - enabled (username will not be shown) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled (username will be shown) +- 1 - enabled (username will not be shown) + +
              @@ -1198,13 +1213,16 @@ If this policy is enabled, the username will not be shown. If this policy is disabled, the username will be shown. Default: Disabled. -Valid values: -- 0 - disabled (username will be shown) -- 1 - enabled (username will not be shown) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled (username will be shown) +- 1 - enabled (username will not be shown) + +
              @@ -1255,13 +1273,16 @@ If this policy is disabled, any user is required to press CTRL+ALT+DEL before lo Default on domain-computers: Enabled: At least Windows 8/Disabled: Windows 7 or earlier. Default on stand-alone computers: Enabled. -Valid values: -- 0 - disabled -- 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on) + +
              @@ -1307,13 +1328,16 @@ Interactive logon: Machine inactivity limit. Windows notices inactivity of a logon session, and if the amount of inactive time exceeds the inactivity limit, then the screen saver will run, locking the session. Default: not enforced. -Valid values: -- 0 - disabled -- 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit) + +
              @@ -2203,13 +2227,16 @@ Network security: Allow PKU2U authentication requests to this computer to use on This policy will be turned off by default on domain joined machines. This would prevent online identities from authenticating to the domain joined machine. -Valid values: -- 0 - disabled -- 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.) + +
              @@ -2477,13 +2504,16 @@ Recovery console: Allow automatic administrative logon This security setting determines if the password for the Administrator account must be given before access to the system is granted. If this option is enabled, the Recovery Console does not require you to provide a password, and it automatically logs on to the system. Default: This policy is not defined and automatic administrative logon is not allowed. -Valid values: -- 0 - disabled -- 1 - enabled (allow automatic administrative logon) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (allow automatic administrative logon) + +
              @@ -2534,13 +2564,16 @@ When this policy is disabled, the option to shut down the computer does not appe Default on workstations: Enabled. Default on servers: Disabled. -Valid values: -- 0 - disabled -- 1 - enabled (allow system to be shut down without having to log on) Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (allow system to be shut down without having to log on) + +
              @@ -2688,15 +2721,18 @@ This policy setting controls whether User Interface Accessibility (UIAccess or U Enabled: UIA programs, including Windows Remote Assistance, automatically disable the secure desktop for elevation prompts. If you do not disable the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting, the prompts appear on the interactive user's desktop instead of the secure desktop. Disabled: (Default) -Valid values: -- 0 - disabled -- 1 - enabled (allow UIAccess applications to prompt for elevation without using the secure desktop) The secure desktop can be disabled only by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" policy setting. Value type is integer. Supported operations are Add, Get, Replace, and Delete. + +Valid values: +- 0 - disabled +- 1 - enabled (allow UIAccess applications to prompt for elevation without using the secure desktop) + +
              diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index f5a62a9471..3d2a9f5773 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -68,17 +68,21 @@ Added in Windows 10, version 1703. Optional policy that allows for IT admin to > [!IMPORTANT] > This policy is not intended to ever be set, pushed, or refreshed more than one time after the first boot of the device because it is meant as initial configuration. Refreshing this policy might result in the Location Service's Device Switch changing state to something the user did not select, which is not an intended use for this policy. + + The following list shows the supported values: - 0 (default) – Disabled. - 1 – Enabled. + + To validate on Desktop, do the following: 1. Verify that Settings -> Privacy -> Location -> Location for this device is On/Off as expected. 2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. - +
              diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index a10d85a033..743c206a04 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -74,12 +74,14 @@ ms.date: 01/29/2018 Added in Windows 10, version 1703. Enables or disables the MMS send/receive functionality on the device. For enterprises, this policy can be used to disable MMS on devices as part of the auditing or management requirement. + + The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. - +
              @@ -122,12 +124,14 @@ The following list shows the supported values: Added in Windows 10, version 1607. Enables text message back up and restore and Messaging Everywhere. This policy allows an organization to disable these features to avoid information being stored on servers outside of their control. + + The following list shows the supported values: - 0 - message sync is not allowed and cannot be changed by the user. - 1 - message sync is allowed. The user can change this setting. - +
              @@ -173,12 +177,14 @@ The following list shows the supported values: Added in Windows 10, version 1703. Enables or disables the RCS send/receive functionality on the device. For enterprises, this policy can be used to disable RCS on devices as part of the auditing or management requirement. + + The following list shows the supported values: - 0 - Disabled. - 1 (default) - Enabled. - +
              diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 8ab600b9d8..5422f5440f 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -504,15 +504,18 @@ The following list shows the supported values: Added in Windows 10, version 1607. Specifies whether Windows apps can access account information. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -684,15 +687,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access the calendar. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -864,15 +870,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access call history. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1044,15 +1053,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access the camera. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1224,15 +1236,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access contacts. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1404,15 +1419,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access email. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1584,15 +1602,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access location. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1764,15 +1785,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can read or send messages (text or MMS). + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -1944,15 +1968,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access the microphone. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -2124,15 +2151,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access motion data. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -2304,15 +2334,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can access notifications. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -2484,15 +2517,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can make phone calls. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -2664,15 +2700,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps have access to control radios. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -3016,15 +3055,18 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N Added in Windows 10, version 1607. Specifies whether Windows apps can access trusted devices. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -3196,15 +3238,18 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1703. Force allow, force deny or give user control of apps that can get diagnostic information about other running apps. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              @@ -3376,17 +3421,20 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1703. Specifies whether Windows apps can run in the background. -The following list shows the supported values: - -- 0 – User in control (default). -- 1 – Force allow. -- 2 - Force deny. Most restricted value is 2. > [!WARNING] > Be careful when determining which apps should have their background activity disabled. Communication apps normally update tiles and notifications through background processes. Turning off background activity for these types of apps could cause text message, email, and voicemail notifications to not function. This could also cause background email syncing to not function properly. + +The following list shows the supported values: + +- 0 – User in control (default). +- 1 – Force allow. +- 2 - Force deny. + +
              @@ -3558,15 +3606,18 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1607. Specifies whether Windows apps can sync with devices. + +Most restricted value is 2. + + + The following list shows the supported values: - 0 – User in control. - 1 – Force allow. - 2 - Force deny. -Most restricted value is 2. - - +
              diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index 6aac1d55e9..743ea8568e 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -106,12 +106,14 @@ ms.date: 01/29/2018 Added in Windows 10, version 1709. Allow search and Cortana to search cloud sources like OneDrive and SharePoint. This policy allows corporate administrators to control whether employees can turn off/on the search of these cloud sources. The default policy value is to allow employees access to the setting that controls search of cloud sources. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -332,14 +334,17 @@ This policy has been deprecated. Allows the use of diacritics. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -Most restricted value is 0. - - +
              @@ -425,14 +430,17 @@ Allow Windows indexer. Value type is integer. Specifies whether to always use automatic language detection when indexing content and properties. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -Most restricted value is 0. - - +
              @@ -475,12 +483,14 @@ Most restricted value is 0. If enabled, the search indexer backoff feature will be disabled. Indexing will continue at full speed even when system activity is high. If disabled, backoff logic will be used to throttle back indexing activity when system activity is high. Default is disabled. + + The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. - +
              @@ -527,12 +537,14 @@ If you enable this policy setting, locations on removable drives cannot be added If you disable or do not configure this policy setting, locations on removable drives can be added to libraries. In addition, locations on removable drives can be indexed. + + The following list shows the supported values: - 0 (default) – Disable. - 1 – Enable. - +
              @@ -634,12 +646,14 @@ Enable this policy if computers in your environment have extremely limited hard When this policy is disabled or not configured, Windows Desktop Search automatically manages your index size. + + The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. - +
              @@ -682,12 +696,14 @@ The following list shows the supported values: If enabled, clients will be unable to query this computer's index remotely. Thus, when they are browsing network shares that are stored on this computer, they will not search them using the index. If disabled, client search requests will use this computer's index.. + + The following list shows the supported values: - 0 – Disable. - 1 (default) – Enable. - +
              @@ -734,14 +750,17 @@ The following list shows the supported values: Specifies what level of safe search (filtering adult content) is required. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Strict, highest filtering against adult content. - 1 (default) – Moderate filtering against adult content (valid search results will not be filtered). -Most restricted value is 0. - - +
              diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 7ee5db3300..8d7edec458 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -147,12 +147,14 @@ The following list shows the supported values: Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. - +
              @@ -468,12 +470,14 @@ Added in Windows 10, version 1607 to replace the deprecated policy **Security/A Specifies whether to allow automatic device encryption during OOBE when the device is Azure AD joined. + + The following list shows the supported values: - 0 (default) – Encryption enabled. - 1 – Encryption disabled. - +
              @@ -516,10 +520,6 @@ The following list shows the supported values: Allows enterprise to turn on internal storage encryption. -The following list shows the supported values: - -- 0 (default) – Encryption is not required. -- 1 – Encryption is required. Most restricted value is 1. @@ -527,6 +527,13 @@ Most restricted value is 1. > If encryption has been enabled, it cannot be turned off by using this policy. + +The following list shows the supported values: + +- 0 (default) – Encryption is not required. +- 1 – Encryption is required. + +
              @@ -569,12 +576,14 @@ Most restricted value is 1. Specifies whether provisioning packages must have a certificate signed by a device trusted authority. + + The following list shows the supported values: - 0 (default) – Not required. - 1 – Required. - +
              @@ -617,10 +626,6 @@ The following list shows the supported values: Specifies whether to retrieve and post TCG Boot logs, and get or cache an encrypted or signed Health Attestation Report from the Microsoft Health Attestation Service (HAS) when a device boots or reboots. -The following list shows the supported values: - -- 0 (default) – Not required. -- 1 – Required. Setting this policy to 1 (Required): @@ -634,6 +639,13 @@ Setting this policy to 1 (Required): Most restricted value is 1. + +The following list shows the supported values: + +- 0 (default) – Not required. +- 1 – Required. + +
              diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index f5a811c564..1ba96f10d0 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -728,6 +728,8 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure the default setting for showing additional calendars (besides the default calendar for the locale) in the taskbar clock and calendar flyout. In this version of Windows 10, supported additional calendars are: Simplified or Traditional Chinese lunar calendar. Turning on one of these calendars will display Chinese lunar dates below the default calendar for the locale. Select "Don't show additional calendars" to prevent showing other calendars besides the default calendar for the locale. + + The following list shows the supported values: - 0 (default) – User will be allowed to configure the setting. @@ -735,7 +737,7 @@ The following list shows the supported values: - 2 - Simplified Chinese (Lunar). - 3 - Traditional Chinese (Lunar). - +
              @@ -802,13 +804,15 @@ Example 2, specifies that the wifi page should not be shown: hide:wifi + + To validate on Desktop, do the following: 1. Open System Settings and verfiy that the About page is visible and accessible. 2. Configure the policy with the following string: "hide:about". 3. Open System Settings again and verify that the About page is no longer accessible. - +
              diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index fa95c2c0a3..eabc6aabe7 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -663,15 +663,18 @@ The following list shows the supported values: Forces the start screen size. + +If there is policy configuration conflict, the latest configuration request is applied to the device. + + + The following list shows the supported values: - 0 (default) – Do not force size of Start. - 1 – Force non-fullscreen size of Start. - 2 - Force a fullscreen size of Start. -If there is policy configuration conflict, the latest configuration request is applied to the device. - - +
              @@ -720,12 +723,6 @@ Allows IT Admins to configure Start by collapsing or removing the all apps list. > [!Note] > There were issues reported with the previous release of this policy and a fix was added in Windows 10, version 1709. -The following list shows the supported values: - -- 0 (default) – None. -- 1 – Hide all apps list. -- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. -- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. To validate on Desktop, do the following: @@ -735,6 +732,15 @@ To validate on Desktop, do the following: - 2c - If set to '3': Verify that there is no way of opening the all apps list from Start, and that the Settings toggle is grayed out. + +The following list shows the supported values: + +- 0 (default) – None. +- 1 – Hide all apps list. +- 2 - Hide all apps list, and Disable "Show app list in Start menu" in Settings app. +- 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. + +
              @@ -777,11 +783,6 @@ To validate on Desktop, do the following: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Change account settings" from appearing in the user tile. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - The following list shows the supported values: @@ -790,6 +791,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Change account settings" is not available. + +
              @@ -835,6 +843,15 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding most used apps. + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + To validate on Desktop, do the following: 1. Enable "Show most used apps" in the Settings app. @@ -844,14 +861,7 @@ To validate on Desktop, do the following: 5. Check that "Show most used apps" Settings toggle is grayed out. 6. Check that most used apps do not appear in Start. - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - +
              @@ -894,10 +904,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Hibernate" from appearing in the Power button. -To validate on Laptop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Hibernate" is not available. > [!NOTE] > This policy can only be verified on laptops as "Hibernate" does not appear on regular PC's. @@ -910,6 +916,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Laptop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Hibernate" is not available. + +
              @@ -952,11 +965,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Lock" from appearing in the user tile. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Lock" is not available. - The following list shows the supported values: @@ -965,6 +973,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Lock" is not available. + +
              @@ -1055,11 +1070,6 @@ Value type is integer. Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the Power button from appearing. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, and verify the power button is not available. - The following list shows the supported values: @@ -1068,6 +1078,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, and verify the power button is not available. + +
              @@ -1113,6 +1130,15 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently opened items in the jumplists from appearing. + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + To validate on Desktop, do the following: 1. Enable "Show recently opened items in Jump Lists on Start of the taskbar" in Settings. @@ -1125,14 +1151,7 @@ To validate on Desktop, do the following: 8. Repeat Step 2. 9. Right Click pinned photos app and verify that there is no jumplist of recent items. - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - +
              @@ -1178,6 +1197,15 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding recently added apps. + + +The following list shows the supported values: + +- 0 (default) – False (do not hide). +- 1 - True (hide). + + + To validate on Desktop, do the following: 1. Enable "Show recently added apps" in the Settings app. @@ -1187,14 +1215,7 @@ To validate on Desktop, do the following: 5. Check that "Show recently added apps" Settings toggle is grayed out. 6. Check that recently added apps do not appear in Start. - - -The following list shows the supported values: - -- 0 (default) – False (do not hide). -- 1 - True (hide). - - +
              @@ -1237,11 +1258,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Restart" and "Update and restart" from appearing in the Power button. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - The following list shows the supported values: @@ -1250,6 +1266,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. + +
              @@ -1292,11 +1315,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Shut down" and "Update and shut down" from appearing in the Power button. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - The following list shows the supported values: @@ -1305,6 +1323,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. + +
              @@ -1347,11 +1372,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sign out" from appearing in the user tile. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify "Sign out" is not available. - The following list shows the supported values: @@ -1360,6 +1380,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify "Sign out" is not available. + +
              @@ -1402,11 +1429,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Sleep" from appearing in the Power button. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the Power button, and verify that "Sleep" is not available. - The following list shows the supported values: @@ -1415,6 +1437,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the Power button, and verify that "Sleep" is not available. + +
              @@ -1457,11 +1486,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding "Switch account" from appearing in the user tile. -To validate on Desktop, do the following: - -1. Enable policy. -2. Open Start, click on the user tile, and verify that "Switch account" is not available. - The following list shows the supported values: @@ -1470,6 +1494,13 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Open Start, click on the user tile, and verify that "Switch account" is not available. + +
              @@ -1515,12 +1546,6 @@ The following list shows the supported values: Added in Windows 10, version 1703. Allows IT Admins to configure Start by hiding the user tile. -To validate on Desktop, do the following: - -1. Enable policy. -2. Log off. -3. Log in, and verify that the user tile is gone from Start. - The following list shows the supported values: @@ -1529,6 +1554,14 @@ The following list shows the supported values: - 1 - True (hide). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Log off. +3. Log in, and verify that the user tile is gone from Start. + +
              @@ -1579,6 +1612,8 @@ Added in Windows 10, version 1703. This policy imports Edge assets (e.g. .png/. The value set for this policy is an XML string containing Edge assets. For an example XML string, see [Add image for secondary Microsoft Edge tiles](https://docs.microsoft.com/en-us/windows/configuration/start-secondary-tiles). + + To validate on Desktop, do the following: 1. Set policy with an XML for Edge assets. @@ -1586,7 +1621,7 @@ To validate on Desktop, do the following: 3. Sign out/in. 4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - +
              @@ -1629,14 +1664,6 @@ To validate on Desktop, do the following: Added in Windows 10, version 1703. Allows IT Admins to configure the taskbar by disabling pinning and unpinning apps on the taskbar. -To validate on Desktop, do the following: - -1. Enable policy. -2. Right click on a program pinned to taskbar. -3. Verify that "Unpin from taskbar" menu does not show. -4. Open Start and right click on one of the app list icons. -5. Verify that More->Pin to taskbar menu does not show. - The following list shows the supported values: @@ -1645,6 +1672,16 @@ The following list shows the supported values: - 1 - True (pinning disabled). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Right click on a program pinned to taskbar. +3. Verify that "Unpin from taskbar" menu does not show. +4. Open Start and right click on one of the app list icons. +5. Verify that More->Pin to taskbar menu does not show. + +
              diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index 62c833ad36..b7bc8809d4 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -69,14 +69,17 @@ ms.date: 01/29/2018 Added in Windows 10, version 1709. Allows disk health model updates. + +Value type is integer. + + + The following list shows the supported values: - 0 - Do not allow - 1 (default) - Allow -Value type is integer. - - +
              diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index e8c1f500f6..f7c6e8a3f8 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -115,13 +115,15 @@ This policy setting determines whether users can access the Insider build contro If you enable or do not configure this policy setting, users can download and install Windows preview software on their devices. If you disable this policy setting, the item "Get Insider builds" will be unavailable. + + The following list shows the supported values: - 0 – Not allowed. The item "Get Insider builds" is unavailable, users are unable to make their devices available for preview software. - 1 – Allowed. Users can make their devices available for downloading and installing preview software. - 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software. - +
              @@ -219,15 +221,18 @@ The following list shows the supported values: This policy setting determines the level that Microsoft can experiment with the product to study user preferences or device behavior. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Disabled. - 1 (default) – Permits Microsoft to configure device settings only. - 2 – Allows Microsoft to conduct full experimentations. -Most restricted value is 0. - - +
              @@ -333,11 +338,6 @@ To verify if System/AllowFontProviders is set to true: Specifies whether to allow app access to the Location service. -The following list shows the supported values: - -- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. -- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off. -- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. Most restricted value is 0. @@ -348,6 +348,14 @@ When switching the policy back from 0 (Force Location Off) or 2 (Force Location For example, an app's original Location setting is Off. The administrator then sets the **AllowLocation** policy to 2 (Force Location On.) The Location service starts working for that app, overriding the original setting. Later, if the administrator switches the **AllowLocation** policy back to 1 (User Control), the app will revert to using its original setting of Off. + +The following list shows the supported values: + +- 0 – Force Location Off. All Location Privacy settings are toggled off and greyed out. Users cannot change the settings, and no apps are allowed access to the Location service, including Cortana and Search. +- 1 (default) – Location service is allowed. The user has control and can change Location Privacy settings on or off. +- 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. + +
              @@ -721,12 +729,6 @@ Added in Windows 10, version 1703. Allows IT Admins to prevent apps and features If you disable or do not configure this policy setting, apps and features can work with OneDrive file storage. -To validate on Desktop, do the following: - -1. Enable policy. -2. Restart machine. -3. Verify that OneDrive.exe is not running in Task Manager. - The following list shows the supported values: @@ -735,6 +737,14 @@ The following list shows the supported values: - 1 – True (sync disabled). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Restart machine. +3. Verify that OneDrive.exe is not running in Task Manager. + +
              diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index 7b2956f975..e712a54e76 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -278,14 +278,17 @@ The following list shows the supported values: Allows the Japanese IME surrogate pair characters. + +Most restricted value is 0. + + + The following list shows the supported values: - 0 – Not allowed. - 1 (default) – Allowed. -Most restricted value is 0. - - +
              @@ -501,12 +504,6 @@ Added in Windows 10, version 1703. Specifies whether text prediction is enabled Most restricted value is 0. -To validate that text prediction is disabled on Windows 10 for desktop, do the following: - -1. Search for and launch the on-screen keyboard. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Use Text Prediction” setting is enabled from the options button. -2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. -3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. - The following list shows the supported values: @@ -515,6 +512,14 @@ The following list shows the supported values: - 1 (default) – Enabled. + +To validate that text prediction is disabled on Windows 10 for desktop, do the following: + +1. Search for and launch the on-screen keyboard. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Use Text Prediction” setting is enabled from the options button. +2. Launch the input panel/touch keyboard by touching a text input field or launching it from the taskbar. Verify that text prediction is disabled by typing some text. Text prediction on the keyboard will be disabled even if the “Show text suggestions as I type” setting is enabled in the Settings app. +3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. + +
              @@ -684,12 +689,14 @@ The following list shows the supported values: Allows the users to restrict character code range of conversion by setting the character filter. + + The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 are filtered. - +
              @@ -736,12 +743,14 @@ The following list shows the supported values: Allows the users to restrict character code range of conversion by setting the character filter. + + The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except JIS0208 and EUDC are filtered. - +
              @@ -788,12 +797,14 @@ The following list shows the supported values: Allows the users to restrict character code range of conversion by setting the character filter. + + The following list shows the supported values: - 0 (default) – No characters are filtered. - 1 – All characters except ShiftJIS are filtered. - +
              diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index d6e49b9bb0..3eac735f1d 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -357,6 +357,15 @@ Enables the IT admin to manage automatic update behavior to scan, download, and Supported operations are Get and Replace. + +> [!IMPORTANT] +> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. +  + +If the policy is not configured, end-users get the default behavior (Auto install and restart). + + + The following list shows the supported values: - 0 – Notify the user before downloading the update. This policy is used by the enterprise who wants to enable the end-users to manage data usage. With this option users are notified when there are updates that apply to the device and are ready for download. Users can download and install the updates from the Windows Update control panel. @@ -366,13 +375,7 @@ The following list shows the supported values: - 4 – Auto install and restart without end-user control. Updates are downloaded automatically on non-metered networks and installed during "Automatic Maintenance" when the device is not in use and is not running on battery power. If automatic maintenance is unable to install updates for two days, Windows Update will install updates right away. If a restart is required, then the device is automatically restarted when the device is not actively being used. This setting option also sets the end-user control panel to read-only. - 5 – Turn off automatic updates. -> [!IMPORTANT] -> This option should be used only for systems under regulatory compliance, as you will not get security updates as well. -  - -If the policy is not configured, end-users get the default behavior (Auto install and restart). - - +
              @@ -469,12 +472,14 @@ The following list shows the supported values: Added in Windows 10, version 1607. Allows the IT admin to manage whether to scan for app updates from Microsoft Update. + + The following list shows the supported values: - 0 – Not allowed or not configured. - 1 – Allowed. Accepts updates received through Microsoft Update. - +
              @@ -724,12 +729,14 @@ Supported values are 15, 30, 60, 120, and 240 (minutes). Added in Windows 10, version 1703. Allows the IT Admin to specify the method by which the auto-restart required notification is dismissed. + + The following list shows the supported values: - 1 (default) – Auto Dismissal. - 2 – User Dismissal. - +
              @@ -1388,12 +1395,14 @@ The default value is 7 days. Added in Windows 10, version 1607. Allows IT Admins to exclude Windows Update (WU) drivers during updates. + + The following list shows the supported values: - 0 (default) – Allow Windows Update drivers. - 1 – Exclude Windows Update drivers. - +
              @@ -1439,12 +1448,14 @@ Added in the April service release of Windows 10, version 1607. Allows Windows U > [!NOTE] > This setting should only be used in combination with an alternate download URL and configured to use ISV file cache. This setting is used when the intranet update service does not provide download URLs in the update metadata for files which are available on the alternate download server. + + The following list shows the supported values: - 0 (default) – Disabled. - 1 – Enabled. - +
              @@ -1556,10 +1567,6 @@ Added in Windows 10, version 1703. Specifies whether to ignore the MO download > Setting this policy might cause devices to incur costs from MO operators. -To validate this policy: - -1. Enable the policy and ensure the device is on a cellular network. -2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: - `exec-device schtasks.exe -arguments ""/run /tn """"\Microsoft\Windows\WindowsUpdate\AUScheduledInstall"""" /I""` 3. Verify that any downloads that are above the download size limit will complete without being paused. @@ -1572,6 +1579,13 @@ The following list shows the supported values: - 1 – Ignore MO download limit (allow unlimited downloading) for OS updates. + +To validate this policy: + +1. Enable the policy and ensure the device is on a cellular network. +2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: + +
              @@ -1614,13 +1628,15 @@ The following list shows the supported values: Added in Windows 10, version 1709. Used to manage Windows 10 Insider Preview builds. Value type is integer. + + The following list shows the supported values: - 0 - Disable Preview builds - 1 - Disable Preview builds once the next release is public - 2 - Enable Preview builds - +
              @@ -1667,16 +1683,19 @@ The following list shows the supported values: Allows IT Admins to pause updates and upgrades for up to 5 weeks. Paused deferrals will be reset after 5 weeks. -The following list shows the supported values: - -- 0 (default) – Deferrals are not paused. -- 1 – Deferrals are paused. If the "Specify intranet Microsoft update service location" policy is enabled, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. + +The following list shows the supported values: + +- 0 (default) – Deferrals are not paused. +- 1 – Deferrals are paused. + +
              @@ -1722,12 +1741,14 @@ Since this policy is not blocked, you will not get a failure message when you us Added in Windows 10, version 1607. Allows IT Admins to pause Feature Updates for up to 60 days. + + The following list shows the supported values: - 0 (default) – Feature Updates are not paused. - 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. - +
              @@ -1815,12 +1836,14 @@ Value type is string. Supported operations are Add, Get, Delete, and Replace. Added in Windows 10, version 1607. Allows IT Admins to pause Quality Updates. + + The following list shows the supported values: - 0 (default) – Quality Updates are not paused. - 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. - +
              @@ -1923,12 +1946,14 @@ This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupd Allows the IT admin to set a device to Semi-Annual Channel train. + + The following list shows the supported values: - 0 (default) – User gets upgrades from Semi-Annual Channel (Targeted). - 1 – User gets upgrades from Semi-Annual Channel. - +
              @@ -1977,12 +2002,14 @@ Allows the IT admin to restrict the updates that are installed on a device to on Supported operations are Get and Replace. + + The following list shows the supported values: - 0 – Not configured. The device installs all applicable updates. - 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. - +
              @@ -2131,6 +2158,8 @@ The data type is a integer. Supported operations are Add, Delete, Get, and Replace. + + The following list shows the supported values: - 0 (default) – Every day @@ -2142,7 +2171,7 @@ The following list shows the supported values: - 6 – Friday - 7 – Saturday - +
              @@ -2475,12 +2504,14 @@ The default value is 3. Added in Windows 10, version 1703. Allows the IT Admin to disable auto-restart notifications for update installations. + + The following list shows the supported values: - 0 (default) – Enabled - 1 – Disabled - +
              @@ -2523,12 +2554,14 @@ The following list shows the supported values: Added in Windows 10, version 1703. For devices in a cart, this policy skips all restart checks to ensure that the reboot will happen at ScheduledInstallTime. + + The following list shows the supported values: - 0 - not configured - 1 - configured - +
              @@ -2576,11 +2609,15 @@ Allows the device to check for updates from a WSUS server instead of Microsoft U Supported operations are Get and Replace. + + The following list shows the supported values: - Not configured. The device checks for updates from Microsoft Update. - Set to a URL, such as `http://abcd-srv:8530`. The device checks for updates from the WSUS server at the specified URL. + + Example ``` syntax @@ -2599,7 +2636,7 @@ Example ``` - +
              diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index 78fb5ed4b9..a7f22fe4fc 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -166,12 +166,14 @@ Value type is string. Supported operations are Add, Get, Replace and Delete. Added in Windows 10, next major release. Use this policy setting to specify if to display the Account protection area in Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. + + Valid values: - 0 - (Disable) The users can see the display of the Account protection area in Windows Defender Security Center. - 1 - (Enable) The users cannot see the display of the Account protection area in Windows Defender Security Center. - +
              @@ -266,12 +268,14 @@ The following list shows the supported values: Added in Windows 10, next major release. Use this policy setting if you want to disable the display of the Device security area in the Windows Defender Security Center. If you disable or do not configure this setting, Windows defender Security Center will display this area. + + Valid values: - 0 - (Disable) The users can see the display of the Device security area in Windows Defender Security Center. - 1 - (Enable) The users cannot see the display of the Device secuirty area in Windows Defender Security Center. - +
              @@ -830,12 +834,14 @@ The following list shows the supported values: Added in Windows 10, next major update. Use this policy setting to hide the Ransomware data recovery area in Windows Defender Security Center. + + Valid values: - 0 - (Disable or not configured) The Ransomware data recovery area will be visible. - 1 - (Enable) The Ransomware data recovery area is hidden. - +
              @@ -878,12 +884,14 @@ Valid values: Added in Windows 10, next major update. Use this policy to hide the Secure boot area in the Windows Defender Security Center. + + Valid values: - 0 - (Disable or not configured) The Secure boot area is displayed. - 1 - (Enable) The Secure boot area is hidden. - +
              @@ -926,12 +934,14 @@ Valid values: Added in Windows 10, next major update. Use this policy to hide the Security processor (TPM) troubleshooting area in the Windows Defender Security Center. + + Valid values: - 0 - (Disable or not configured) The Security processor (TPM) troubleshooting area is displayed. - 1 - (Enable) The Security processor (TPM) troubleshooting area is hidden. - +
              diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index eda04ac82d..69290e276b 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -118,13 +118,15 @@ The following list shows the supported values: Added in Windows 10, version 1607. Specifies whether to allow the user to access the ink workspace. + + Value type is int. The following list shows the supported values: - 0 - access to ink workspace is disabled. The feature is turned off. - 1 - ink workspace is enabled (feature is turned on), but the user cannot access it above the lock screen. - 2 (default) - ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. - +
              diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index e0a364f38a..9679d7b3a3 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -195,11 +195,6 @@ ADMX Info: Added in Windows 10, version 1703. This policy setting allows you to hide the Switch account button on the sign-in screen, Start, and the Task Manager. If you enable this policy setting, the Switch account button is hidden from the user who is attempting to sign-in or is signed in to the computer that has this policy applied. If you disable or do not configure this policy setting, the Switch account button is accessible to the user in the three locations. -To validate on Desktop, do the following: - -1. Enable policy. -2. Verify that the Switch account button in Start is hidden. - The following list shows the supported values: @@ -208,6 +203,13 @@ The following list shows the supported values: - 1 - Enabled (hidden). + +To validate on Desktop, do the following: + +1. Enable policy. +2. Verify that the Switch account button in Start is hidden. + +
              From 3e02444b5be0586e72b5c065c996e96aad04a00e Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Mon, 29 Jan 2018 23:56:22 +0000 Subject: [PATCH 56/91] Removing old Microsoft 365 files --- bcs/TOC.md | 4 - bcs/breadcrumb/toc.yml | 11 - .../bcs-information-product-help-office.svg | 94 - ...bcs-information-product-help-windows10.svg | 122 - .../bcs-iw-devicesetup-move-files-2.svg | 76 - bcs/images/bcs-iw-devicesetup-setup-1.svg | 91 - ...rtner-advanced-management- add-group-5.svg | 69 - ...partner-advanced-management- billing-7.svg | 115 - ...partner-advanced-management- install-4.svg | 62 - ...d-management- management-4_placeholder.svg | 39 - ...partner-advanced-management- reports-9.svg | 106 - ...rtner-advanced-management-add-domain-2.svg | 75 - ...partner-advanced-management-add-user-1.svg | 69 - ...rtner-advanced-management-auto-pilot-3.svg | 88 - .../bcs-partner-advanced-management-faq-2.svg | 88 - ...ner-advanced-management-find-partner-1.svg | 105 - ...ner-advanced-management-find-partner-2.svg | 73 - ...s-partner-advanced-management-intune-1.svg | 76 - ...tner-advanced-management-learn-about-1.svg | 70 - ...partner-advanced-management-password-3.svg | 56 - ...ced-management-resources-6_placeholder.svg | 37 - ...partner-advanced-management-settings-8.svg | 85 - ...dvanced-management-technical-support-4.svg | 88 - ...-advanced-management-troubleshooting-3.svg | 78 - ...artner-advanced-management-windows10-2.svg | 59 - ...tner-advanced-management-windows10pc-3.svg | 96 - bcs/images/bcs-partner-get-started-1.svg | 116 - bcs/images/bcs-partner-identity-manager.svg | 91 - bcs/images/bcs-partner-install-2.svg | 90 - bcs/images/bcs-partner-office-migration-1.svg | 67 - ...s-partner-policies-set-device-config-1.svg | 85 - .../bcs-partner-policies-view-policies-2.svg | 78 - bcs/images/bcs-partner-prepare-office-1.svg | 66 - bcs/images/bcs-partner-remove-3.svg | 150 -- bcs/images/bcs-partner-reset-windows-4.svg | 85 - bcs/images/bcs-partner-upgrade-2.svg | 60 - .../bcs-user-management-add-customer-1.svg | 99 - .../bcs-user-management-remove-customer-2.svg | 150 -- bcs/images/icon_video.svg | 59 - bcs/images/partner-fastrack-3.svg | 82 - bcs/images/partner-news-2.svg | 123 - bcs/images/partner-resource-training-1.svg | 72 - bcs/index.md | 2087 ----------------- .../pc_customer_m365bpreview_suspend.png | Bin 73363 -> 0 bytes ..._customer_m365bpreview_suspend_confirm.png | Bin 48298 -> 0 bytes .../pc_customer_reviewnewsubscription.png | Bin 35056 -> 0 bytes .../images/pc_customer_subscriptions.PNG | Bin 58677 -> 0 bytes .../images/pc_customer_subscriptions_1.png | Bin 43712 -> 0 bytes ..._customer_userslicenses_m365b_validate.png | Bin 58685 -> 0 bytes bcs/support/microsoft-365-business-faqs.md | 186 -- bcs/support/transition-csp-subscription.md | 103 - microsoft-365/TOC.md | 1 - microsoft-365/images/M365-education.svg | 171 -- microsoft-365/index.md | 90 - 54 files changed, 6043 deletions(-) delete mode 100644 bcs/TOC.md delete mode 100644 bcs/breadcrumb/toc.yml delete mode 100644 bcs/images/bcs-information-product-help-office.svg delete mode 100644 bcs/images/bcs-information-product-help-windows10.svg delete mode 100644 bcs/images/bcs-iw-devicesetup-move-files-2.svg delete mode 100644 bcs/images/bcs-iw-devicesetup-setup-1.svg delete mode 100644 bcs/images/bcs-partner-advanced-management- add-group-5.svg delete mode 100644 bcs/images/bcs-partner-advanced-management- billing-7.svg delete mode 100644 bcs/images/bcs-partner-advanced-management- install-4.svg delete mode 100644 bcs/images/bcs-partner-advanced-management- management-4_placeholder.svg delete mode 100644 bcs/images/bcs-partner-advanced-management- reports-9.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-add-domain-2.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-add-user-1.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-auto-pilot-3.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-faq-2.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-find-partner-1.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-find-partner-2.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-intune-1.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-learn-about-1.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-password-3.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-resources-6_placeholder.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-settings-8.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-technical-support-4.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-troubleshooting-3.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-windows10-2.svg delete mode 100644 bcs/images/bcs-partner-advanced-management-windows10pc-3.svg delete mode 100644 bcs/images/bcs-partner-get-started-1.svg delete mode 100644 bcs/images/bcs-partner-identity-manager.svg delete mode 100644 bcs/images/bcs-partner-install-2.svg delete mode 100644 bcs/images/bcs-partner-office-migration-1.svg delete mode 100644 bcs/images/bcs-partner-policies-set-device-config-1.svg delete mode 100644 bcs/images/bcs-partner-policies-view-policies-2.svg delete mode 100644 bcs/images/bcs-partner-prepare-office-1.svg delete mode 100644 bcs/images/bcs-partner-remove-3.svg delete mode 100644 bcs/images/bcs-partner-reset-windows-4.svg delete mode 100644 bcs/images/bcs-partner-upgrade-2.svg delete mode 100644 bcs/images/bcs-user-management-add-customer-1.svg delete mode 100644 bcs/images/bcs-user-management-remove-customer-2.svg delete mode 100644 bcs/images/icon_video.svg delete mode 100644 bcs/images/partner-fastrack-3.svg delete mode 100644 bcs/images/partner-news-2.svg delete mode 100644 bcs/images/partner-resource-training-1.svg delete mode 100644 bcs/index.md delete mode 100644 bcs/support/images/pc_customer_m365bpreview_suspend.png delete mode 100644 bcs/support/images/pc_customer_m365bpreview_suspend_confirm.png delete mode 100644 bcs/support/images/pc_customer_reviewnewsubscription.png delete mode 100644 bcs/support/images/pc_customer_subscriptions.PNG delete mode 100644 bcs/support/images/pc_customer_subscriptions_1.png delete mode 100644 bcs/support/images/pc_customer_userslicenses_m365b_validate.png delete mode 100644 bcs/support/microsoft-365-business-faqs.md delete mode 100644 bcs/support/transition-csp-subscription.md delete mode 100644 microsoft-365/TOC.md delete mode 100644 microsoft-365/images/M365-education.svg delete mode 100644 microsoft-365/index.md diff --git a/bcs/TOC.md b/bcs/TOC.md deleted file mode 100644 index 1b161ed802..0000000000 --- a/bcs/TOC.md +++ /dev/null @@ -1,4 +0,0 @@ -# [Microsoft 365 Business documentation and resources](index.md) -# [Support]() -## [Microsoft 365 Business FAQ](support/microsoft-365-business-faqs.md) -## [Transition a Microsoft 365 Business CSP subscription](support/transition-csp-subscription.md) \ No newline at end of file diff --git a/bcs/breadcrumb/toc.yml b/bcs/breadcrumb/toc.yml deleted file mode 100644 index 6a29a6b202..0000000000 --- a/bcs/breadcrumb/toc.yml +++ /dev/null @@ -1,11 +0,0 @@ -- name: Docs - tocHref: / - topicHref: / - items: - - name: Microsoft 365 Business - tocHref: /microsoft-365-business/ - topicHref: /microsoft-365-business/index - items: - - name: Support - tocHref: /microsoft-365-business/support/ - topicHref: /microsoft-365-business/support/microsoft-365-business-faqs \ No newline at end of file diff --git a/bcs/images/bcs-information-product-help-office.svg b/bcs/images/bcs-information-product-help-office.svg deleted file mode 100644 index a748576afa..0000000000 --- a/bcs/images/bcs-information-product-help-office.svg +++ /dev/null @@ -1,94 +0,0 @@ - - - - - bcs-information-product-help-office - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-information-product-help-windows10.svg b/bcs/images/bcs-information-product-help-windows10.svg deleted file mode 100644 index f9c36f40be..0000000000 --- a/bcs/images/bcs-information-product-help-windows10.svg +++ /dev/null @@ -1,122 +0,0 @@ - - - - - bcs-information-product-help-windows10 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-iw-devicesetup-move-files-2.svg b/bcs/images/bcs-iw-devicesetup-move-files-2.svg deleted file mode 100644 index 8eff6a423a..0000000000 --- a/bcs/images/bcs-iw-devicesetup-move-files-2.svg +++ /dev/null @@ -1,76 +0,0 @@ - - - - - bcs-partner-advanced-management-move-files-2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-iw-devicesetup-setup-1.svg b/bcs/images/bcs-iw-devicesetup-setup-1.svg deleted file mode 100644 index 6011499c3a..0000000000 --- a/bcs/images/bcs-iw-devicesetup-setup-1.svg +++ /dev/null @@ -1,91 +0,0 @@ - - - - - bcs-partner-advanced-management-setup-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management- add-group-5.svg b/bcs/images/bcs-partner-advanced-management- add-group-5.svg deleted file mode 100644 index 435e4bc752..0000000000 --- a/bcs/images/bcs-partner-advanced-management- add-group-5.svg +++ /dev/null @@ -1,69 +0,0 @@ - - - - - bcs-partner-advanced-management- add-group-5 - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management- billing-7.svg b/bcs/images/bcs-partner-advanced-management- billing-7.svg deleted file mode 100644 index 50af1d2262..0000000000 --- a/bcs/images/bcs-partner-advanced-management- billing-7.svg +++ /dev/null @@ -1,115 +0,0 @@ - - - - - bcs-partner-advanced-management- billing-7 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management- install-4.svg b/bcs/images/bcs-partner-advanced-management- install-4.svg deleted file mode 100644 index 24f2df79ca..0000000000 --- a/bcs/images/bcs-partner-advanced-management- install-4.svg +++ /dev/null @@ -1,62 +0,0 @@ - - - - - bcs-partner-advanced-management- install-4 - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management- management-4_placeholder.svg b/bcs/images/bcs-partner-advanced-management- management-4_placeholder.svg deleted file mode 100644 index 81370d6388..0000000000 --- a/bcs/images/bcs-partner-advanced-management- management-4_placeholder.svg +++ /dev/null @@ -1,39 +0,0 @@ - - - - - bcs-partner-advanced-management- management-4 - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management- reports-9.svg b/bcs/images/bcs-partner-advanced-management- reports-9.svg deleted file mode 100644 index f34b2f595e..0000000000 --- a/bcs/images/bcs-partner-advanced-management- reports-9.svg +++ /dev/null @@ -1,106 +0,0 @@ - - - - - bcs-partner-advanced-management- reports-9 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-add-domain-2.svg b/bcs/images/bcs-partner-advanced-management-add-domain-2.svg deleted file mode 100644 index 2fab39dd10..0000000000 --- a/bcs/images/bcs-partner-advanced-management-add-domain-2.svg +++ /dev/null @@ -1,75 +0,0 @@ - - - - - bcs-partner-advanced-management-add-domain- - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-add-user-1.svg b/bcs/images/bcs-partner-advanced-management-add-user-1.svg deleted file mode 100644 index 30bebd62f4..0000000000 --- a/bcs/images/bcs-partner-advanced-management-add-user-1.svg +++ /dev/null @@ -1,69 +0,0 @@ - - - - - bcs-partner-advanced-management-add-user-1 - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-auto-pilot-3.svg b/bcs/images/bcs-partner-advanced-management-auto-pilot-3.svg deleted file mode 100644 index bd992b7c7f..0000000000 --- a/bcs/images/bcs-partner-advanced-management-auto-pilot-3.svg +++ /dev/null @@ -1,88 +0,0 @@ - - - - - bcs-partner-advanced-management-auto-pilot-3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-faq-2.svg b/bcs/images/bcs-partner-advanced-management-faq-2.svg deleted file mode 100644 index a89de48058..0000000000 --- a/bcs/images/bcs-partner-advanced-management-faq-2.svg +++ /dev/null @@ -1,88 +0,0 @@ - - - - - bcs-partner-advanced-management-faq-2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-find-partner-1.svg b/bcs/images/bcs-partner-advanced-management-find-partner-1.svg deleted file mode 100644 index ffae69af7c..0000000000 --- a/bcs/images/bcs-partner-advanced-management-find-partner-1.svg +++ /dev/null @@ -1,105 +0,0 @@ - - - - - bcs-partner-advanced-management-fid-oartner-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-find-partner-2.svg b/bcs/images/bcs-partner-advanced-management-find-partner-2.svg deleted file mode 100644 index 221c47548e..0000000000 --- a/bcs/images/bcs-partner-advanced-management-find-partner-2.svg +++ /dev/null @@ -1,73 +0,0 @@ - - - - - bcs-partner-advanced-management-find-partner-2 - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-intune-1.svg b/bcs/images/bcs-partner-advanced-management-intune-1.svg deleted file mode 100644 index ba86b50274..0000000000 --- a/bcs/images/bcs-partner-advanced-management-intune-1.svg +++ /dev/null @@ -1,76 +0,0 @@ - - - - - bcs-partner-advanced-management-intune-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-learn-about-1.svg b/bcs/images/bcs-partner-advanced-management-learn-about-1.svg deleted file mode 100644 index 5237e929eb..0000000000 --- a/bcs/images/bcs-partner-advanced-management-learn-about-1.svg +++ /dev/null @@ -1,70 +0,0 @@ - - - - - bcs-partner-advanced-management-learn-about-1 - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-password-3.svg b/bcs/images/bcs-partner-advanced-management-password-3.svg deleted file mode 100644 index f1f91ab410..0000000000 --- a/bcs/images/bcs-partner-advanced-management-password-3.svg +++ /dev/null @@ -1,56 +0,0 @@ - - - - - bcs-partner-advanced-management-password-3 - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-resources-6_placeholder.svg b/bcs/images/bcs-partner-advanced-management-resources-6_placeholder.svg deleted file mode 100644 index 1a4d5ad540..0000000000 --- a/bcs/images/bcs-partner-advanced-management-resources-6_placeholder.svg +++ /dev/null @@ -1,37 +0,0 @@ - - - - - bcs-partner-advanced-management-resources-6 - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-settings-8.svg b/bcs/images/bcs-partner-advanced-management-settings-8.svg deleted file mode 100644 index 5b556a7ce0..0000000000 --- a/bcs/images/bcs-partner-advanced-management-settings-8.svg +++ /dev/null @@ -1,85 +0,0 @@ - - - - - bcs-partner-advanced-management-settings-8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-technical-support-4.svg b/bcs/images/bcs-partner-advanced-management-technical-support-4.svg deleted file mode 100644 index 00fe5333f8..0000000000 --- a/bcs/images/bcs-partner-advanced-management-technical-support-4.svg +++ /dev/null @@ -1,88 +0,0 @@ - - - - - bcs-partner-advanced-management-technical-support-4 - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-troubleshooting-3.svg b/bcs/images/bcs-partner-advanced-management-troubleshooting-3.svg deleted file mode 100644 index d70739d1c2..0000000000 --- a/bcs/images/bcs-partner-advanced-management-troubleshooting-3.svg +++ /dev/null @@ -1,78 +0,0 @@ - - - - - bcs-partner-advanced-management-troubleshooting-3 - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-windows10-2.svg b/bcs/images/bcs-partner-advanced-management-windows10-2.svg deleted file mode 100644 index dbfef70e2d..0000000000 --- a/bcs/images/bcs-partner-advanced-management-windows10-2.svg +++ /dev/null @@ -1,59 +0,0 @@ - - - - - bcs-partner-advanced-management-windows10-2 - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-advanced-management-windows10pc-3.svg b/bcs/images/bcs-partner-advanced-management-windows10pc-3.svg deleted file mode 100644 index 5e772085f1..0000000000 --- a/bcs/images/bcs-partner-advanced-management-windows10pc-3.svg +++ /dev/null @@ -1,96 +0,0 @@ - - - - - bcs-partner-advanced-management-windows10pc-3 - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-get-started-1.svg b/bcs/images/bcs-partner-get-started-1.svg deleted file mode 100644 index 3fda6d92c6..0000000000 --- a/bcs/images/bcs-partner-get-started-1.svg +++ /dev/null @@ -1,116 +0,0 @@ - - - - - bcs-partner-get-started-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-identity-manager.svg b/bcs/images/bcs-partner-identity-manager.svg deleted file mode 100644 index c75db3c46f..0000000000 --- a/bcs/images/bcs-partner-identity-manager.svg +++ /dev/null @@ -1,91 +0,0 @@ - - - - - bcs-partner-identity-manager - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-install-2.svg b/bcs/images/bcs-partner-install-2.svg deleted file mode 100644 index e112e26bc1..0000000000 --- a/bcs/images/bcs-partner-install-2.svg +++ /dev/null @@ -1,90 +0,0 @@ - - - - - bcs-partner-install-2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-office-migration-1.svg b/bcs/images/bcs-partner-office-migration-1.svg deleted file mode 100644 index 4d3078c578..0000000000 --- a/bcs/images/bcs-partner-office-migration-1.svg +++ /dev/null @@ -1,67 +0,0 @@ - - - - - bcs-partner-identitiy-integration-1 - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-policies-set-device-config-1.svg b/bcs/images/bcs-partner-policies-set-device-config-1.svg deleted file mode 100644 index 78c1851ca6..0000000000 --- a/bcs/images/bcs-partner-policies-set-device-config-1.svg +++ /dev/null @@ -1,85 +0,0 @@ - - - - - bcs-partner-policies-set-device-config-1 - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-policies-view-policies-2.svg b/bcs/images/bcs-partner-policies-view-policies-2.svg deleted file mode 100644 index a9864295ae..0000000000 --- a/bcs/images/bcs-partner-policies-view-policies-2.svg +++ /dev/null @@ -1,78 +0,0 @@ - - - - - bcs-partner-policies-view-policies-2 - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-prepare-office-1.svg b/bcs/images/bcs-partner-prepare-office-1.svg deleted file mode 100644 index 4a32ab1c8a..0000000000 --- a/bcs/images/bcs-partner-prepare-office-1.svg +++ /dev/null @@ -1,66 +0,0 @@ - - - - - bcs-partner-prepare-office-1 - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-remove-3.svg b/bcs/images/bcs-partner-remove-3.svg deleted file mode 100644 index c0391193d3..0000000000 --- a/bcs/images/bcs-partner-remove-3.svg +++ /dev/null @@ -1,150 +0,0 @@ - - - - - bcs-partner-remove-3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-reset-windows-4.svg b/bcs/images/bcs-partner-reset-windows-4.svg deleted file mode 100644 index a4edc0ec2e..0000000000 --- a/bcs/images/bcs-partner-reset-windows-4.svg +++ /dev/null @@ -1,85 +0,0 @@ - - - - - bcs-partner-reset-windows-4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-partner-upgrade-2.svg b/bcs/images/bcs-partner-upgrade-2.svg deleted file mode 100644 index 6caf6e7678..0000000000 --- a/bcs/images/bcs-partner-upgrade-2.svg +++ /dev/null @@ -1,60 +0,0 @@ - - - - - bcs-partner-upgrade-2 - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-user-management-add-customer-1.svg b/bcs/images/bcs-user-management-add-customer-1.svg deleted file mode 100644 index ce7d0b8c16..0000000000 --- a/bcs/images/bcs-user-management-add-customer-1.svg +++ /dev/null @@ -1,99 +0,0 @@ - - - - - bcs-user-management-add-customer-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/bcs-user-management-remove-customer-2.svg b/bcs/images/bcs-user-management-remove-customer-2.svg deleted file mode 100644 index d6e01e0d1e..0000000000 --- a/bcs/images/bcs-user-management-remove-customer-2.svg +++ /dev/null @@ -1,150 +0,0 @@ - - - - - bcs-user-management-remove-customer-2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/icon_video.svg b/bcs/images/icon_video.svg deleted file mode 100644 index 76aebcbd5b..0000000000 --- a/bcs/images/icon_video.svg +++ /dev/null @@ -1,59 +0,0 @@ - - - - - 5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/partner-fastrack-3.svg b/bcs/images/partner-fastrack-3.svg deleted file mode 100644 index 6501c59e6f..0000000000 --- a/bcs/images/partner-fastrack-3.svg +++ /dev/null @@ -1,82 +0,0 @@ - - - - - ms365enterprise-partner-fastrack-3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/partner-news-2.svg b/bcs/images/partner-news-2.svg deleted file mode 100644 index 29eaeb8f09..0000000000 --- a/bcs/images/partner-news-2.svg +++ /dev/null @@ -1,123 +0,0 @@ - - - - - ms365enterprise-partner-news-2 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/images/partner-resource-training-1.svg b/bcs/images/partner-resource-training-1.svg deleted file mode 100644 index f76cf7ea96..0000000000 --- a/bcs/images/partner-resource-training-1.svg +++ /dev/null @@ -1,72 +0,0 @@ - - - - - ms365enterprise-partner-resource-training-1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/bcs/index.md b/bcs/index.md deleted file mode 100644 index 37096ad62b..0000000000 --- a/bcs/index.md +++ /dev/null @@ -1,2087 +0,0 @@ ---- -layout: HubPage -hide_bc: true -author: CelesteDG -ms.author: celested -keywords: Microsoft 365 Business, Microsoft 365, business, SMB, small to midsize business, Microsoft 365 Business documentation, docs, documentation, technical information -ms.topic: hub-page -ms.localizationpriority: high -audience: microsoft-business  -title: Microsoft 365 Business documentation and resources -description: Learn about the product documentation and resources available for Microsoft 365 Business partners, IT admins, information workers, and business owners. -ms.date: 11/01/2017 ---- -
              - -
              -

              Microsoft 365 Business documentation and resources

              - - -
          - - diff --git a/bcs/support/images/pc_customer_m365bpreview_suspend.png b/bcs/support/images/pc_customer_m365bpreview_suspend.png deleted file mode 100644 index 7017cf8105a5d4163050853e039ce8b12904a987..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 73363 zcmbSycQjnl_iqZ(5`rKIqPHN4Zj|V~_c}rJGWuXJ5k&7Tdh||2FEgU|8ol>!bOvKQ z`Toj#f4{xftb6xe``$VGoO^ct+)y9#7;rlBhf{nz6eDW>v@(i7w z_!;oigA)?7bG!$D=?v!jLud9n8Is;~9 zZ|P`bV_{)|UK_SiH&x$N7E1)><#%;4PSMTw$|;87Vaun(7_DqWt3Qr4dU)3(A%N=u zwde5(uaZ$ZUoielZPYVgJvb4u0rdC4 zJ4z3KwlGH41$wARNN8z&`I{+8YMIJhhx?%V>TL*mWU(YL?^UI7AoMM2QO}r)q$NIs zp(}{rLDQA){dx|^`2?_+{l~08kuZRrjt%bpt4I`NwQP?KA{o*8sPTl7U&PBa+vzYc z=IeWt^`WXt#504ZV$hbGR>B=A7=&U>Uhi+V#Bug0C@XN|YTF0FwKYGD{comLa@Q}F zbO1p`;p`W9H}#$bPzS{8HE@6HzVh~c^7S7d#uoIkwuUd%xZqyAFEVEVKP~XbpUe1Y zJnzDfxe<&~LHzOqy+7|)llww@?Ux}p2aVi?DhEq-`j-1TOz$_OK|CD86KvDC$M1EpF+&|Mp58j|AWiHF?78v3ZFnSvQQMDvq)}PM(!{MZbRj>}5(B0(c-6e(P^(%Iobs4++P? z2}O^u-*#r7y{n78y{TA!`^)!gDOZ*tJ2|k`DY52!t9;($VCH)PlJQ6!WFk*%!cK|N znLjEFZDZ5=YGVAs8O6T|d4J#NMF75y*Jwe64Wx$F|e>*o>Y8$ z_V5zv$TjhFNd2bg{ z*X+=fXuQ^U-3sba5Rh-w8}mq0yz`V_l!#wmDFV;&@0JvdlC zkgrLlq?OmnKwV@IZyqWN&&F{MobLgHUdFj$({-xf1xU2JeNmN@3%NT@PQ^RCK-_KD zDi6LZFVnIBg@uQ%f=6+1al>cMK7~;VeQrEzh9aV{95Mf@{+4W@~0SbV#q2 zZX4%wyLJ&=RD+asP+*``=gEnRk3}qKnK%UB+WixeSPk&H2~Nw%SY{b1-&`xO~8IOp?HA^*xf* z_Qg|FbTtm5pYI$CLzohdE$G;ZZwx&6O#V&cRuby##)X3Sn3!Rn* z>H1_bFfev?c8(I}Tz&l^;BCPmH+j}szx-@`A_PDhk>SIkhp-E)ub5}J5=Jw*eY02molxl^hyOX_Jozi{RAyW1?# ztjE#H%57%oRBzo(j(_=T#t|W7DMOr|k&&KZ>^U0Ptoqr~W#f!k;~UM5TrfxyfHu9} z+b~u&L*l)dZ@`{jH2b!eBQY+UDbb*iUi78knUFJg}&|6@qs%O`z1wk)ro#tMk#No*LdP6axLroTE zxv_p-7kIzk$`^L@{#cP=o<+fNq2c}@lAZa|2VHp2?xPSDCpA+qe_Ur_rptSApt4%o zI{OxO#6mlBQZ^`tJ_Xx|^rU~+XdmOCyGJS*^<)uRzH2^7I~4ukMplalL`?%RFU5Yo zkIOtrZZwVksv}mdY5i36#y|cgnULr3Tamf#gih}=eTCt^jgKXn23!PoXCnRy1-MsNzmOT7t9Mtr-G!L9Vw8!%us-OyG>{SLdDCi%%#qJ!nK3uOtxTeTz9n z^CRi4mm9ks@v>K;VTy-hzLv{~^6}=&f3CLrynxVcf8jftt(DYJ zdLvEvfpwP(0Cv11pL1;__{&( zZ)(XB1U%Qe@w~40xAE~p6sU!Lw}v~m>qn?(S{$~C1sfr{sv)7UcpVL_y>?xm_X^+A)7OtgoKZG zVTIIU4VAkalA(27s^1b4X0{Hu5u%B{m*<_C$}B{VM8tERYmQ3tL9yTCT!q8U&h2}W zsCHN~7vMGeN^5_r;-`-mny-{NE8$T)`Hj%|OiePbB`A7rsf&Jm?OTpnGe|5p9tM_| z(Qvz};;u)CczLdGY+X6d8$D&2MzmbAd}QoUl{|@!i!Ci}TNda>(UGihzT}Am#fT~!3y$-1?W!am~k_~8v*FW++Q*-$Bg+% zbeE{d!NL&WYV%9ho1|DGqF1w3+vx{**RuR0;UOUiVV8rO@@6n~|2X@e4MwxC;ZkD* z`Gb{0cErCVU2wn9mr;iMmy~@Ewa`)NFI{i${BkKGk$T#d}NLQm?}?fIIzAVA}1M(6bM3JtcR zJPw|{fYquh&aXthddE9&8xBgBz$Fp?3(7qHz7TuVR>XJ1hTz@MQnt{OFZp&o(wME+ zJ^Y4BPc?)$D(&^S8sueUtnc{2Wj>M%320icxvaP{C$p>W7nH*kO%1bsc&p~t!WvKZ zyIwuVamNfbp+>ASP>hYBkofZIIP$dORqNAP`m=%!7@c3fFdxivx{rJ(vdd+HJHi?Q zk(aqvx!8`nU=V7pl*7C3{C%Y16H2}ur1MF!$dHP|bR*e`(#_pER&=It6=;M|Od~G% zCUoCYYH6>Oi)l}n25y}~wBl~RF7v^UoQ{Kz#m9J?; zY<;4T1|mj<{6W!&sE>3K?Ydd>JrFp0{~oo>B^md|L5oD`uX39=FM zgW7hVwpTzm(bS@dZa{9pA$EcQo*hB!OcPtuK{@4^AW7r%%H9K%CxLcxWINqAO3vcc zo;U}-Fnc~c`H$)`)uBoubsrLwVH`oxtS55eijLkzrs$j1ME7NEV|BjqnC4m>8k*bM zP7Hn{tq+XEhhI8_0)rSGUki3(cr{=K&!qMt;00@k<_N+xa_iHBL=`!(YjJi|levnq z_Or2!%*2CSnB*rpBhP@1ry1i>-3=_sDAZc#=l#6&ci_a}G=dg6`2n}z)j8ZbTt)z^ zIE}?PRnP0=)Qr~Xvnq; zLdtWyYrjGzQ{{1I0(Rlu8XZxNghV0YdMqaoeiPk6V6Q1@4{RO%RadY2C6Bxh_%Wi- zo+FI+Bj3BCO4a8)K4qUZrj3b-5OId-m#0YoZ8nn+*-4J8uk0FSzteh^YZn`EaXQA5 z8g~eP`&RVpM~&o@zq;GQ$w0irrF!Vdl(L3w1wgv9i6Tw5Gf;S?ry~N9W^E2&yip8ZpXqe?9k#^|FR!l2B|;~AVftT zcZU9AX!-u~YMYZ#3v^Zrt}$A$@92AHm?67YHx^+{x!F_CC01K%>u`P=I>^Q9to{U-Qdf@%h-N0Schjip@fPCX{3i8Bytm+FCI@;JJhJydC6R8ZS9K1^4BnS%QSdu zoUxx`V}V2N_Izr4h6UA*`b8M&Aqka6g#2I-xJR~LwGrvX0-U)S>D7HKU$Z_h%~>kY zbGs|w`{spWh_9R6@rz~sXKnNFaCe{P;Ki!(-k&&?3JVTzuCGt7hyF^g?n^44zmv-r zQso16j?7Ygy54JlIxzlCz>a%4LFzt@IbYStrzG1ZBR0j(O@TMFO-lg1nRO+i8W9b+ z;-}SaK4+*8-VeHpOR4hU8%xZW7qU&Y(Pl(=IQ9*O?BBwridBvDb|xGo4boeS!=WnD zapmRJ)wR3ar7R_F;kP3^>p4TMu?rIKSiIdWss~?G9~6xeQ}W|tJ2sTr%7j)KF}L)+ zf4j61RA%xr!`{MELPp^r11tEUKBjmGD7RQQU0<SykBOU47k0rYw8U0F7b;0Hne$v2ff>V8gTp;OVQBwd&i=$grS!09=m;Q zV!OVD7PR()G6)Iq7dzM3nKUb*sD}F5Jffp&o$qIpMN@Va$98 zh>1z&JP%~7O^Qo17#SJ6&e4ffSR<^~w%_x=+zR%kNiz%Xiz3DDPpsE9u=-g2FXGxojZwa81}0_AnrZM%YSo9mS6Po+mduwlE36b<1qMe&7%m)=MC^&`_S7?Y2exb$gr8 zKc2Y!b|Ct0L?=&*dlGPulnH_4vpg7@M^2vbrkjXVB5$AQygyBqm!%DHPY$l^m)R=| z5M&)cui0#Ou^8jahY@5897h^TFP2WXD~G_e=Nt?aflxTL!-V^mBsf%d1m@t8wDnwN}m*<4OK?-4RY| zZ~K%thgH5Ex(kMyQkZ=94WIX@b{yDP-m=t)Yc28o*eiK=J~VB%wzl7DaP{XS%ebcD zP8tY)y*B`osxwskC^89TNh4~Hpsu{Xp>%ex0>MeuPC}mZv|bSubC+K4rH7`4M;`F+ zV=lSXU0(sE4aHs=w5n)5hYn}f)P!tIVMR1_${O;au0c>@k(>9T!Ol+26Hf<<)HF$O z9N}}$2S!Q_16>Y4^fXzTyMwhjF4*gOuU`}Jy>)7dJKC%_@UA@zTIG26{bFDA9(Bew z6)sZEe5wQV{g9u}fXP^IsHq>jH4+3zQ&81D6yJ+Nj=x`gOSU*9LMeBmPqr)7pDz2{ z3GP`s&g>F>a@G-O8`9m++M81gP=m*f@EfYHZ)tB3RF-jO?HUkOm{ts+MqlE*BNKcduLf_*vs8(y zBSPL(0v!b8%o3$$ZI@ua>jz`|QTUxsSJQJ*&c*O&-ZJ9yw5qMImd&zsHk`IM3PeUU zZ2Wb>ct3p@&j#Nz3SRy^=Ny=La=YJyzvtDB*-+Bl8MnxLf0+e^*hrpN@m3WS%r6R7 zZGLsp7l*Hg7uF*dMBGuoHXzZb@kFFa4Q@wW@%ueefznf3lU-+tqpRUttdBFXMDKf+ zTal;~e{-{%O*^aBkVm<#cMg@!cprMl!ZY8{Jy>=GxtA3~queUUyK0{_P)c=MSBSIG z=49LRdJpL!;TW3_pSx3J?qaCFWn@m>WAlnh5yd}E8pEk;QbnU9u|vBi{AwVrWu~~? z_IKMvLIocX&$a?5B&@iDn(H0ki22Tir4rME4W*nSmzqoS@`I#0dB2hOp_AgE*U|UY zhh>1sy!920AC$$XJ4+dc$(Ph{nzncEMH_qriaNK3(gHC8J*eQ6Y3V!G_DXayAUPku zWucg@yOqRTE{=&k(ESBL{4Y6GVT@#F^tb=@M#_MAx|Cm8V@k7I&Od(1C~c znX1CC&F;Ex`DV{widcayt^X{w-f1s0|C!v8cuPNNvO1VdC)+n6N7=d}^%32371-ix z^b-`4RY?qX51TgTKKl7Nc)MNpsDPv}YxZ=qB5hB)D~}#9{TbE2#4ESGka&xmYH4Xn zy7jF7q~|C!T%phNnb$q>X=2QuU98oV;$(b~@zq6Bns;Cynk@*g8IE2XU{9Tr4^^RT zO?dC35UJM0@z&>0auVql@@6KRewtbs=IqlWjdvgN+0H-mo5mX5N7+hg25yJREE++# z<8D{_XCixTDI8c8!kP&%*!>Fme32Anvo!5$IZ9FaqgE3Hxzg5LNfoy)0XiZ?+uo8q zp_kp9pnm19V$;+ueQP4%^LZNI2C*pgkcu(#l*@-!xDZKvYx(<@gM*35ohhQ-O&tzd z>19;B+Socx$e7Q|66ho>=VhG2dnm&`^x&k;x^4P06G>-5YcWK{r=Ku_K8a`VyHw0d z4RCyGpL1jgt4Hse%MKeszI-Wz>KWV=YYKxdz(6G&_0{qokox!;{hJq+CIapU6DftK zl{6-Rw{KlLA6^d25+~Hks$F#AklRKbF36d{!m~J?=p`xH+%J{k89_k>n~rVD$w9fQ z3WJ_Y`&s83+7Bre_j`y~$sTIf-M!W(Mp{miwx6#D9OmEF@cC*@B(|bv;?{~;YZ0J* zer!a;JIb_9C-9jnyPUe%4O^U)x-fl{<9y$7-a9B2FBQ9O-X@1>3QRO1hPj@rDVPb_ z0MOs>0}64Zbz;N4lpc-frseTf#Mj|jee_Ynf8(X5rjK$9KX)%>32Ph3-8RX4Wnn7@ zl?aK3dU}mqn$J}&RrCa5NHYd9;xC7qZo~wzl1O`{sv^Xu`COkD#Q6?J%lqt;lOe(3 zIC$Y@tJS;eaG`4n=H_<;BRvCc$Syl#5sDytki*46zq)?f`)6bH0w1`hlFbnv8TXv|AuQP1H=Vk6(a zQDRJqjsIqNMh>fS#yg+5>)D1FFPiaGEbw5f<^^HJ{4OEF`CbH%`PIwoP&(1@ItyEY zPXv{R(XZPs!R!c$qbC57TwC5f8&kerl!$Bh5suezHCCb_e@4i`LxWytf6T#U>r#_@ zYG+P2DSK=u|Du{D84FBPgg z9>#_Md>sDQaoXhilFg+{aPY;RZZ6hF*QJU5d5v#uOxiGn%4iMqXGV#*N z%*Qk@03|8Nfz`9}(D5i_@;E_fLeM9Tb*0JWm#nu%HK(03ECw!ljW?ui)o_#;-0uox zH08|Py;hq1(!O#R0J)iOMVi4T*a6`0A!b9x^J-g)gFZ^r>2?oZ^P420pzEhh6$HTcO$eeNi@OMbVA`u60>le;G<)r|s+4q>8jXgMp6C5; zbH(HA$LPo6a7R^68ohdxo!(kqIBmAScw1CAF2JG_6GJ-6IPLC`4O z^ek^1*8h-TWqq3X^ffDaFZV1*BF&_P0^S6taUbrK3glW!=GJQEq^dOVa%(xg*YNJ06tZ# z+irVR0Hm(heja8uQpbTj+w?d9xZRvr83VvaOI6a|@q-9hv$}SQ!!4&tlh5u#-{O27 zVyW70Ag#wnK~d3u+23Ar47>K1*WUsTfX9(^HPJ_`s0<-5r+b9)gL{sht?|0eGzOe( z&kfke5hX9c?stO1xA756jTX1VxmFJaa3_yxOBCf_(VIVy(DtJavMT9tx9ig`?qGiT zFlr$$#AzZsGrl8X?5xY_LKmJ@)ZrZ5;r7xP;^83OS_`;5c&K=vF{PA4JdWn*0xnIw z|4to3E)SAs83ITTXMXEj-VVc>!C`pe4>tLAt(Vi4rKx&f2IT5+p-GzPeyy5no71Sp zXBUOeNV^6eT{_DT*vnLMT?s2Hf)?RVVS)1x&EZ1*9pc*=&LS7SXJv3wpKAeT6+?vVB|J1cOx(+8(r4nl~r}TCJ zAI-o??uQ#VnpLwzeVwLeyP+|Ba{arm$Rb9Izm_QslH)rUL20;pP92<&A5e9kevDRZEk4E%@U zmGgZa%|X&qV_eUK!pD)i(}x1?TZ3)J_vy(*4@LzU`3XvD!FMF)a=Mn!PBxN*eodUA4dMj8eRN?KA<&lArmB&-M=h@b{FF)=LnHe*Hbm!ez@ z-^7SwZo4!=`zu+*>uFMkJ%D9oZXRPG2Ii>Dvanc8Jua@Pr`^JnH>pyD;nVok7(pjT z^hqyCNJ%?dwQwuHLbb`@g=-1)w46c+E>12_138VLIHY@#*A!7*xNLl9c#I{R zQ|DPbRf3x3c#oMBHXEHpISl_q}Jmy=@d723j%h0^Klu}SbPquoMqNp49? zYTVJ~`$pdU-K7VAu{)_GdjjFqTnQ>Jxg>%!~>D-LU28FvlB83y|#K>$r?ILA!LJWA_7fI zR8rUm&oj&sfi|O$GS1!&iQpo1wOnZ+Y@u1^sNzs$RqL7d+z!L><>}#vwaV2!&RmRc z!(m?+5d#7-o*F9D^BgZ6)bWXn8(-e__T>;ODkPX=$ahKTTkGucGClg1*n!A_LOFZU z>y~I`JrERaEca<8B@~t$)X%?Mw!KvD)y>=sL^mP%DZA7>)+)M6L!&iUgL@Y-gxHG? zvaU4#^=?~9JegnKL&DK&F5FM*v;JgkUP?9iGEAKO0bmu)fBlBJm-e%Dqo^lT*ZZ%X z_ifMB&|Z!CRlDZ%)kK8Sx6du79FD*kw>*1VPa|Kisu{~!F?C-^_r z{>j!pzW#^P`$tpHGAkSEz5YGoA0f3dFfc@k{|6m+TL z1L|hacRQHEO-DzU=ErJdW0NrSzvD;mJY+*ES)!3oh{QPVeE#>IN5Q9)Dcn~7EBB}J zBK}&zz&k#H2YLe$|DV}?w4l1dzN>7=rwE$=R#-;!IfE?|z%REhX5k3LW}B&VVJk!~oV>6($!bhD-Wx8)QXwrbXR z=F-)HYOE)fiKk!CCIR-gCP0r-(qDAwTTvYwG8D@^VKT&S1W&DOaVn3AJE?bzK?sAb z5#M*~#=JJWm>mbakb!dAOKY&ND?fVcmdBY?D0T0K8J$8S_#ZVU>O5#)W`{qKbHh(3iBrsaNR1)=>#iOs%oW{43~X zWZeQw+6u-wzP0L!U;gU(VV9k4O;Y~pN?lV5w4=AZe{HZ2sg*mtp{|Tjq>J|eZJW2OUp*;hkrc~Qh|C4+g z(XE-dJ=)U4(^Z;hJ`MS+wua`s91c_*FC4fuE*H4Sv7`&FdW|-{EIy0V2wwNi);BfP#huc z-yxk{@{E+qmt)M|#N_dZL*j*oj{qZm^{Gh{GU``qliXu-YHDJCx&;ndfcdp+i?HF- z^9|H9o+{zVEKz^lVH9u(dZ)~f5T3WDAX1QCu>>I0@n6VvLV&4cTyLAa}c3V1Wf`d-2DNzHXtczur|xyadF-M&b-G`xZu$_;oMM( zg6uUXuN~!sITE%%u=LGZH1^%7R;C78oGRRg@U)2*a9;Re46OTt`#6p6?6bm{V8~$UhKNDLz@;WGAu#X`T zqN{z-E9OJ87p-q#V1Sk;EB=pfL48N5!HMEy1e;WUM;>3%t}Q2NpyNJY)PC)?WMxH< zgYVK$N*QEDUVzZgr{&Dy;r{N}DQnh9g{fXE7tFL`Ceao*t@%HFV#4E-TD$$O8G9!r z_P-A%6Gar7IN|rN=c9gY2@gu!UtjmE5BHQqpZi?w z#1g>p6JOd>BVcS~l2PaHHDO-BuJ-P+v7wQ9gU!@*OX9gDKtJ6@t*|_bd?7t3Q$vnW zG)YJ1%o8OwoBYxu`^0GMql+JA+7Y{}+b>*fdM|?#G0nRDOv4g+f(Ccn`j%o@OL_L@ zL}%?28?rF5#K6*?OG<-V87ZkEv4+!e9*X>o#1x%s-TGJ04{|!5D7zgwF4i#T?!)}7 zz+NS_DZUIrfpdO`FB?PFUi{rXt>d<=2n^|cd7YN5EuuMw8{R=8qzbYzXp+Lb*==cZ zSsDF%1D16n1-v*~mbblgY%v&qUfXi7*Tw&CZh3O8O|mgi0rh(Rw*<|y*VYa(Df!CH z+R4+AP71BwAzdvVLI%O;;fd--#-b&enz~kp1*q4(vkbr zNLeM!A+dVoPkptA&UbeEEE-WC=~}nr!{g6T^^KIfkKo$!?y;)j2>i?F3V1rlrk9eX ztu%X>SNbYCb9Z*Pza^qXWl3$rUR#tsD8*p;%;T4pV*_tS-ymDDd8>_ILv2`}QXgCK zHp%naNt^y<&(9lK#ztB(^1|SiFljvrQ&$@BYJFt#GZT&4PR-@hn8XFxr*mpwtY%J? zq5hpTrV(HtcML096cg7+2iv*)0d?qtiA%64fybi_=4jl2H zZ<@(ul&>t8;pcRa=Z5xgsph@jS0yfI;7xj&z0nFOuUVL{on$NzHtcrhXyngmsuN&&RfAi|v;>QP0VQ;IbPzw9*#J1VRR7Tl* zpZ5wnI8ZroQgL*_f-BVa$OJUqZKE^4oC5mn@w%{1jusMl`PEDPZr?SMQVsnMz6@w! z^6_!Z7TnD&AhPwXV7fsrY3h4oxBW7ix-$gZZC9N@IgglfX)ZgUSj(`hd?t|oB{(_klE+cnzU1T0Y3MBps)9A@Zw5WM zCvOwL-|}moJJYy1YiOSFIeT=SXTfG)CMB=86Yu+AF?(JE>a&%${UzzLkHbmHl|_6b zWyK^rz2}Z^be#s)w9m8}K;*{F?~PEXIoN?8`f;OJYyQrU?hF%d_NPI7&v2Uz`k$do z`yA#L)h5ULm8LtNFh)mxk*(FmM*?h3-*y@pN-IwfYRQfOJZzlDHTU=IL;&m}L&s$@ z!=AaY8$4-VDoRC>MyrvQUF41$R5~tc4bPZfQ`@(v-%t46FS*B}2!eJ0S-$ov;FKzV%(4XWf#r$v^j~VbrYO!Ku!lz! zJk+rR)1PaDgiWYfrU1Tendko`?sp42m#Bre-JbVKC8()`T@wpEW9%CDR7m4|t#%_e z(S-H&5AuC|0k=U@k(8)YM~ZgE8X zC#bVqd5Fm^Q^e zqCUa~yVlfJe;oDsEx9F*e#K`g(?$*@-h_qlnWoaLmGK6vDEHW{;- zC^=uBb!J|BO!}6J(M{G+k)1M)ne0+b&0Ug_@Y1$>4CVKJQfG>(A^{+{pHsH^3ACkh zrrq^gM2n}Noo#4jWMG8r-H@{9>G6juKhr9~)p0bQiXYr0B>HMn@izT8*021>E-~@> zwHd|VQU1AD^6o_-vDKg6fG`N&galqda%Dk3HWzQ?b$$GhN6VCF46iV8uDjURMhfg^ z`y(;rl<}A9r|y0#mvwwoO=0}?nL5@6-QItVcuks*#Rh3ur@R?;#RPZRm{mD8>m!w? zY?rjTpxc%ohCi*A8XCMfD$uK#l4=En`ImY*=F@M&qhws&mpYoakO5D;wg8Efjs;id z7onF&+oj}b+g#=YNXj86KZo^<$qXu2AnoUiN8`fwiRt6l+;)N7dPU_0=^0r$NQrVA zish>@iaka5`F^voraIbw-HbjJiZIWnUR-X^vR%QpMatn*A}fn=RR1MJM#_hpDk!lm zU7n$GS#0cw=lyr1jzP0@v@3_MpP7-70X17V%ul+)^Q&Pv_iCQY@(;BLratPqEoWs< z+Nr`5J+b`<=p%<}oh+u8VCoL*{w#0gI%Krnt)a4P=Zj;`vB3$V!)iFH8pLzJawEDQh8mDR^9<#N%&BhTdFXmoWCJOZJf~3)p4- z%|E@g@^U7(QwFyzvJYL)|Sp_Dek(385;P23Lo}MzWro}$?M$`_i3-oIsE9T+Oe%PkEPNr{E}L$ zXA8cL0-faxukASOh-*JC<{j_ITXOjk*~;tu?xx*Qb|^xBY>9)-WN|^RyhQ6SeasIu z_2)yc3C%aR)f4T{nLKz}+%|sLUJ=zTBtBr=l*R5P|Fd1bE=SNbiM}LEj)~oP#%8mt zycW02?b3C2RzWbK?hZT*F`se!vCHi~-@A7yZeJ{U5o z`&lW`u9Fap75%xH>WIkZqQ&r%A1j-sI|?n)4+*Qr#0FTTD#e2_GI+LwTWaW5+@^Fy z=;(I?nCo!SreQ?_32>NxvSLA2%eU z2*IUT@JU=NyPoqUPpj8$pqfS^8b*sk4@gGJOnh95B{%Enat{v~t%jfR!@{3o{gy;5 zHEm1wtwts?U=_6-``o_n(`h=hlh)<&Z;j1q0OfV*Y(i2aqCm{kn|&2CJHI{yxmX;G?J$x_O!I&IkRacm$qlW3uG zGhv@2`aKGGnqlS2jOMI;pU#t*u5S8aa(C`9d9}}?W!*;JwaE_gjcGh1;rwuS;iG*S zgO>WFeJZzu&taaIwTribt%1j6?Ml?8-lryRB|{y6rizrZnu&>;8mF|UR&G5XRBCqF z!+SN{bkcb@@3=?FfAEZYN|zZPd=|=V$Q|hal3!3@nHRJSaH{+AEgn&1N*LFJD0TYi z?BO&XQIxThH%oET>5}#jMfeEGaUJV(QE?5t&RDo(!^4-k z)Lg|89w*|@F-07W5K5Tngo!#8>mHpfKGLD-t{C;a*cggu(s?t45Lmq~88{vLn{#PW zuUo%S&Qer5o#+UW8Tziv+I>Dwg6Z>#zFk~etR!7muFlU^dUcy!R@%J>w9W2Ia(k5t z%C1Dmsfk7^Pw&AKMvNmlJqum*)^}llG+L~hXVRQ6ciM{B-1Ibc!gO;=P7u2iuH(ip zq)p)7`4#s}z*^Rl<)POb34ui-qbJ*pCGhq?>$g|cOH7n4;diLP4mQWiM*c;+@2{>vP_{@d=o&CQsb5PWtnVq-L3<_3OsKmAs}toJ*q*d>2G5-K{e&_fsmDHstEtI zZjsX+UwIVGpa$$*izA0D$8#fLfO&0u4r9Zu=lu&=W_rUPZs?(es)J3ndx`|f z*1sC0?AHC!rqFK+>RA>_aonqXGm60vbY7Oj<5=*yxQs+`oGq4Z>jEc+K2ts4XZJ>Z zpnINH>vc{S$M1CZY!MwQ|AiX*-R|etyz}-@nwLFcKx03Rq3%|`@xcAZyXE?)weY;ObCX_jpA|oRrB9sUF z^pP<~QilEk@U;gtMFbmyH_*JiEy}yzaRFDZ+(3DtSI%of*#Ix(!)1R+%3-L#Lhl?XL->HA=VhFO z`;$M*6QFR8ey08>K{Rn zoL2T4RPi=hCWi@)8GqNUTobf|OW$1vO(T>p-E!Lou(;gIjTfj)L*krc6g~E3VRymp#oJ1qnJ<9++Yv3Q^u+_-4SW;r3d449 zjW;@~R90_kG9u&T?HgP5&Q2Dmg{JT?JqqSjM`+?J{kGBU6^ZFi^8he)(Qb;Mpq@<; z>owzgvO-eNt#Biko$ZmWMNVm+qk0?cx!q4X@zpj-V{Qnu9kB&wWFD?h<=KPkDXV1D zgk#0@N!jM_TknMnzCu4K&6CM^$XiEiNDMj(d)gfBt$ndNMV%{aU%fF2s%;<8Wkimy z{3xwMP3{vYJvpYVk_newjsmjgCa10E`p!S1;nU}B@g8I9PC4G7SAZ)T2vI;iFWoE_`(K(yk`#de@T$Gb^!c(_Wc*XO8j5TawpG91l4;@clEk7Dq zoiYE*ubZ*fa0L{sF!?gQ{s3bD65!$o_I zRW5Pqd$wCX<|Ta!tBGO1rPZ(6UC0!HciE|-f=6rriD14iCp9)Umg-jG;^CeB9Ur;k zKAk+U2HUw_&5!(XR!r1)Q?Pd#*^$zj?` zmJ}J1Y-#TbJ?Ly0{2jH~Rs4O*vL<}s?^EUSLljBUcBX<`P|4r zw6YfdY){7Z#ey%s%VTXxuI)7Y=RpkiOxm~WgJ5#5b+l{5`DS(iub^p;oDRI1r|z`G zi+g`E0&d^o-k8-&?KQllL{Od5PxebmA+cy_gsRJ6DKh_}{^E&2u?e%C+{dTFctBhl z`j#d2<3fqiJAQ2)J5KP&CsDdEmi@e^v#2_=8Ezd4HvW0S^*vNvpQ!Pa{%}#dwq~93vWV35eb-6o$CCna_@@s3Vi$bV6BXdF7jka$~0*x2Add zPiVZuO7<(oR_z~%ZzlZvroC84_2-=Ed#>q!BN@#ywsoPhSKDHP~b=k zKbN;*^2jgsJp(qcird`xbT}ePrC^h(sBk%ZCt^NyXnP{A{8T9yZdqwMubP1JWEM4) zwc@*{`0EDdUAs zZ;ZX{RN{BBR`AEAE{mIg!dYDmC+VUXR42S|SvJV=jv!43xGpTtbB{H;aSNc6w*R<90O7+NCx+`+8F-d{9GmDLV#G{N z%gM+3@~@T`lYmENW=6s7MF_9`-?ECs zM-Q#>gY}xQ2~JPuq~p@Oapu(&en(HXVoUGjT9v#+VI8G;+LRflL92#h=G6EeFH2n@ zZIt?VFOEOX_)L?PjV*v=W`8O_l8E1PV^_$GfXn{F1$c}RoMdKTU}AV`Zd%}S+a{>D z9r+b>qshpRacG=lthc>kQh0V$_T6gZQ7HCLPrrFumy(v2mXeZsAu$o@SLN@!_^PPR z<}aAno$n~~LfF}_CaWmH<1dxBHQUJo_xGB++W$>j{{KtP{tvY8-Lwq{{>!veh6sNH z;-7YSdvW!vu4QW!j*08%89G3SNd)KKLwr&a7|c66eh@tieM!sDk@QXVBph4=?|7EDsd%6IW`o z02W|tp&hQY>~+0CPJZt0&#?@gQFAR*OPZL(B(3|MIU@<%NoI+KiRsDdZvt!x7R7DG z71d?T?sH=(wNJSh> z(zeALdNdJ{rt1!Jd;>1u>u|EoDgGQ9Hz+lRucyD6nrpJF8Mwkdq4@q3A6mnq;4=Ww ziZDVKj$zEGs5oV7E7{}sHww+z-W5 zR;ii#WAK{T8an2%vd0Wam7n(Af-)Le0j=NQ`LpLtbSyM*i>=W4GotD?oNld+DvE23 z!`Q>aZXCm<7_z72<04mt!Ala=NIjf;HO5M;cCz^S*|j$Ij?n3Uin-iDL4*NBV|siY zJ;Ec?qul|~vketB5Ys+%q~zxI#J#lS$H#A5Eb|I&wiM|L@uqr^E}h)kS~<;*-yy=4tOAql>Y)p8=JRgx7@eBtB1d>7Lv; zVjf7iwppMZwcHWANwzji^dg~!&X0mFxQqf0LSDM7?$4{tWYg#87LxW&O&4Gg%dH2$ zyd4Bl&?JGxrM1EbGV4!^78VzoXz?Vmg*CZhM|M>i2Af*&&^WV!8uiErG2G)55>5HX*JRHy- zHPct@Y%u!{%?|T+*15`8(;FFq7_av3Jh0dCW_rG+!xD(e#6O;kacOjlmlS3d<2*>j z7);Hm4T`ARXY4`}H4?r(a19R9ay~|*QGI78w46`{DDS({kvP_HxUKQu+w;lSRuGGlYQTIQD^TUiBer_~7F+Q!QOPnGjr(eIW%^XO&S`y4n z$PtZ-i-yVD7 z7?sj-dL^k}tto0}qOGsNy6${*bu(&rJ4d@aPR1{(oOb)1e>lZmCnt6lmW7cWQ7fCE zsH+^D6(QKeS~n@o?pU4K0IQbt@ge`GadLqueTVaodK#r0F3rPM#;uO`%VkNCsN{&` zfEMkX_4lYY7e%|w@O)@jhJfY)(Y*YJz5T4bibPR%_Q0hQ6Mzc=o5oh*&Twa7z{k8~ z3tcTMkU|AZ=ua0+xCOpK^6+rp=a%{{dsPSTD4!<;jJ|#!b=G#~IQ$(`yzT_e-lmX3 z3ERjel0qTL6nnAULllGbc4rLL`PS+5;v>8v1Z%(*ln%R!w0P1&^-l(*tB{2U+?e-c zX>Hj#IU_|l!Wg|~dJd%@sOrL}b4;kI)rE6(Q|7;EUM>vuKzS9b+EK$ z71Pb}gapBJB{&Ko>NVt@v{GJ-X`ANMUX42J;!sl;-jDaWCHe4BySS(m-V8_^!g)G6 z6Pg8uhucToUQM+*>%7$FSv-H>YPkQJlpYN0;0mV?GfzuhxKkT$+)!u}Dah1VTg}lA z2vG`{G1PDq>jq}%OmnD)R$NiIdoh-f%=CT!IQFBq5l zo9KpC!e0+{@D3z%wp4O@K|Jm+b903i`mTm8p*XTE>=RenTXJ2s)JTeZHHu5xc}n#P z!(m(7I@keuwtcj_cAHO9OX8bLUT>SKm#?0M#x19fprg?ws|BwLq3^%})!EV~Dl<|3 zT9?@vA&+B2wAA;#nYS=i=()N-e(CEW|U>Q8lWcQ zS(KX{9F`27Bf(2$Memgix{ONb*fDWZFt?XsX{wu2eG5SCCl4n81EK9TB;=)CwDf1^ z)SPr>Knir>y>vJ_gn2Hw`x;Qn^+50}+o-;pj=q4DlC!(SIU+2cX>q>+vpAW8eAlnR zK|KdYTP4<37sS&CpH)O;rz6;|B5D~UzIBml2x1Hf5h!cB5mELpa;&?v9*~RAjl{## z90)mQnF;^)v6Qas+~hkMRAWLkp1ddmYxG!Ifm5A}y06cyLQHy$kcUH4VIb#0ikM3) zd~V-8Hmy_KX>|8$v{ll;DQ;(3g37|RWmtuH4$$s1r-chD%E5vNG`^Rf@!;ie1!`&R36*b;CgQ1 z;Wo$!J2rgOuRM>rF{i$en2gT1J@5tB7bIW$f&f_Gpfv|0)|CvuR@|&4Wc~@Spy*Q?Uo-5IUCzHhenf< zy?wr-(B?(4JaMpz5uuqeXIUCpCaY$Ib!R*Kp8t4hsK? z5=0H|NVA*#_st%=MOut{pNv9cucIHgV5z_E8sS##x_WN+D)aS2P!(WA_;1xearXM^$ zJoIAL>mI4V;yvq~V1w~O(P3H4(z}z2ikc=3uCaPi4Q?+Zb)aDa?_i=Id)<7m9RTJQ z%EQZ`fL?JL4KB77%Q_9qsNmu#YrUHG%1nA-|8|GPV`dbateMt(O-+4-(7YGVkF-4^4~o(}zNuU$$17-R6=&`TGRF z)YbQ_OiPQ)Y~|awWB_`?*jfsVh;Yb=l*U(e=%Dl{A*&){+Z{5#Cm>cTY0w*i20=Ss#Txz3x$3R!&V(-oX+!jAxvTm$WTUc1tB0H%EvD_qfgv zboKG!$EPF$4Adpo09{24dB3fIUVLV9Jci@pU}>5%YRNBOtokq)#3yo|N|bQ3;Q<=h z1!1x>BO-R3tp%Z9vW3}EuCSPcglVe1Hc}%?JFGekoS=ihgh>yqM+DKu=S~!gbC&u( zAI&G$l?9Xt+q%1QYB0{J36e#JXr5_bbXub&3e%Jv5#k+N5v2%FmzI~>=w-~Wyj1E4 z>(P~Z-}Zv2Y5J*6PVmeLdy~^7WQn8nE_a#2Se92OCc;BR1KpZezm9UvEOT-;^RSHL z6G?vl6r8(M_S9*hqwF>YaxVbrWqFw3Xm;$t-~_WWFIa)x$IzRZXmR3xI;}-sK-@%7 z_K%>-Vb7NJ{iiG8X zpe)f$F=4N&Gxh;*H5=pRA54}sK|!%kv(tg>JuC~_1N`tOQ)~gaEaGIgk7O_FJ$v6Y zH$U0_-wF^6}7OiK#5AVK($`J$({f zn4Nslz{!D?oGsB8zVG}=` z{rV>N$ZI{a-r|>Y8lF30e*TN3WUX!Mr0?4_M`B+rJ?-OY6uxh zaF@SR+!$Q;5Fqm(IlcF4t{3P(B6japrvL1J^FLrb|K9F@koNOoSY(G*hvL8dg@E3) z3$&By*u?MdtUi{lZTt7cRkD#V=^tS^MRSHyzhI6|4A1B0#yR08;uGxc6Ksuro4fkr zrKnfj?=5hK$5FUw#VE3~TGI=$ ze07lOge0S~#_G)b?ViuRMu^MJjAl%aa=qo^m~;A3m8 zkNs;p&sR^EHVu4GUAxm&p%@+E=lBPU6P+f@W2Wh;J=7?+_HKH3yEwP&L2i0ZmZYNG zBJ2c>iLaRDRQYEcxelI0ZlIEtUO549cd?gCZUoMSnzp?92&BB*cZ?ijyMwy=n42=* zWGgc$L_4uy%(1C*T{SUvy3)MbcE7ybf|E}@pz?mn5P$`3qyr=Cr1O0z9WjnYJ_G-KZl{^_ zY{K`-iKB1zvj-r!9*<)OR%sFCVrvQprcuW@m<4BmzM5u0q>-=+-^f92G%9s#C2wd^ z&eH+~Rco1#2%@C$=ZcmfTq&t6KP>C`yo3{@^0+vN@+Qu7>*6Kx{6fuXtl>V6It#_) zZlnP3uld%T)_(35->(c}!@6n0HrF`b$T1BpP0mrrFQ_L!4m0MokZ8{?wL96{TNljA zN=q-&dKlGoND1&adz7@(4NQ>65~4mWFt#{3yJk`f>GTwUOtQ!m*Y=3GClkxpMAA}^ zW@@K1lpF3 z0+I;85c)JH$$wo#2d!BivDk>Kk=z*Vn6SC$XE?(*0NhJNd`*^`U88D*M^`xRLlO=~ zj|zx}+8={2f5pkzsVgpPx1dVIOr%9U<%G+y+xCP-|z>Pb0_hj!2|Y%7dZucd?(K3OrW zoGO4VcG8>#&FlOhqJNEub~SVf{wnLzkgTKY8BiV*=_cnau3iUAomJiTPY+iT<|!yj zp|2RzVh=lpw_^OKF(pyZ*jO#}Jl?I;NU!r8NJGqc+_!~S@ciN&Kk(aFSv-9BIGMTO z@c0CAD;C2}BK}b!K)ed*NZp@zNE?t59dBTE|BH2HQYEQS`3sL#(+^C`_4w(9l~1N- z$*LOYx~Glax+94vgg8i&U2&tL@GIy0V8pC?(pEpqQ=wtu;s!C)AUNUL-9RJ&AnaNS z4Ss=ZXd?_=d+Jhi=aH5!tag}Win3AM#I$7QY$j0^7ni=H#^0aZC-AE~Y~AE1kDV0< zI|Kw$q?n}zHc`2cpU266B+aVEo8}Vt_+YUj}zal~-L>2L zj&FlYQ~WK>a>Zn#s4I2b90jQLNssTLaVQ3NqR6V^nzF3iK{eTu#7tJY#J7pC(3)u# z%&HX#3<>MV-@>m{m`xI0uD$>OtSHAf2 zLIac8*eH(NWTY%TqMgUk`AK0U)+(_#4v|%Phe`0t++pK`?um*Gbfr<9CmeR2`QdJy z+SeT`-L3Qlbv1Q<-Z4wM;e6)<%|)2{dS&!Hf1b&j((RQmz(w^Vi-WtJ(NaUJp=8~- zn3Qt~NdkR{s#@1#h$rA$*@cM1roF)iR1;hF%+->`GxMd7iG{yC?|muzdYh2gl7iN3fLQeW3$qg*9-h|&VgS;t@xt7k=s3LGy|89lTy416M}+nvP!Vlw74&m` zJ{fq`m!q?l*Hkx$dU~L@cOkzBtDJczN#Du>ElwpkFSMYoV4xsJqlIu*%`CXM6i}2Z zAI@)8LC(Ljun-=dvcSRfHSwc~nc2@7F0R=rHSI~Zah0zsv)^@7CJ#a^+1RG!O#*M` zSZW&E19$ZFcTuNVcvX85YbtBUiq`nUKk{#7G1t6)r3K~=APH5Q6qVBu5cq@>6%wUJ zG^RP*PEx^YVw((&nhQ%JP=7X|d~cF#(!|7_-QbCxe5y~LBlD~4;_q{L2g$wruiUX; z&Ht|{9DTqg`042C=;@Q!pJ)uysF!biWI6yR_ISf8wf&N?_%?OV`P=;hhB7m}jsG~b zUqr*OTePE8z;WMBIyyQ%7+5Hb8N{rrfsWCpfSGyn(c$jBC+4DRRv;%QFAK0fsGMnT zUTJZTZ>WRAZWGC&);9*Bz}m8;Jg?5i1cY4vpVY&4ZldV&fS50_$ZUL^3(*+3BS*(3 znLVFkaHi3XbiYao>-HTD%1P6aa+3407TacJ)6kNUkod$ZEwA)S1k37mD{LkL9HcA# z&eV)VFMpBM%m20Vo4eNgAMU_tVKTM|>+!8YXEAr4IDrqBVG?wMlD4<-dbyR%A)um5 zMcYG-Q0%CEk=g-a1s3)&q-k=F1sHTptUK2RMmyWRb@@gx!O-1bKK6Hn^^kE+%M~^K zebu?AQ18b+C&s;a)LW*3+S*!xmd8{VAa;B$qu;M`JC4Nli-s;akg6tvTNJDw{7%ip z#lgZtk=6~a%P3$nTaX&Z!CCGP^bSegTunt8P>l)JC45;IwpAjFO5ltzvf2@IIf zLkq=oWitPqxP~K4`ws@fC!wlhip9aH=XV}L0|O(=7SwQ1G;#6ra@>5A>51q>Xc*Dj zbG4mjf0DZ(#_-hPBi4c7jD-_vqYasdgehc8r-KlSq)8{`q#`0vurPOzk7D_lrDvi1;|h0& zF*+wLV4m^MPEt=kf@JO3f3EPB#n_@fLj`spdfm($zaGkZy>5iId)=(Q9?xmD?i8K| zl(_7w=7(<<-Pu_IC>I6^8cSC==bTmcUfZ{m*#ED)Q0%|*r+W~@^80jtT7F?3)L>}6 zkarO;S+35PRVMJ+jo&3XHhg`q9($p4_{GmxOvd>D;esLg@MjV9Lf}FD7O51t%@_by z_pAQtvmCN9^R)UQr^dv%v2}3szxL!K|55%+tb0t=#rF=eSz}`?Jyq#;l$6us^3;pl z<2-Aww|%w#g9E$kS-#ifQTaOswoEv>qSKyBi=oy)TO{ZsDgrbNGSiswn#?^5Tijo{KZxudUKO_D2rVQjeWHs4gMHY(GuS z(&4sv?4_?sOoC>i3C8k!FsW}Y?CYZOuDQwO6jrY4;{JRguwf3D|;Re}VsD1XNDucXI)_nt)4&?|(ZqduaT@Xk>+ zC-T&^Km{caZCiN{Cm|KRFO1a9Rdqiw3bRdr(VZTdmVbc1fJ6GAujDv70`zxt{`8^a zbBC}iK6q@oJwx9pVmV#-v#>~j;m>O%hpk7hhL4Ju6b%E#^xTjN@!8C@z3ko}k4_1a z6%PTbZaVdVODJ$$*-~pL@`2O*ecf2DyOG>IcNteg_;F6mr5*Cl^eM6)^@lpI>EttY>{XBPJ)XW^zP>!RzmC0LpX#($WoFdN>qoEFF}yy2Mc;M< zYmqc@Cb+8Bt6z6tom4e-9B1QSFMl%J9?xH|@;^#3uu*Pxe1CP?Osre4V|n+gKeqe} zdv++@tM#O~{fS{>6QxLW&F1)zvDRWPr|v8G+;|8+v$3XO`=l&F{!u>8V;adrR3o!@l#j3xzqv4e7?#LBO>J^hmGl}p-?kcQz0F!MmG=tQuOk97(B1W-<~|R2Cv&mP{zuS*WiBe^w@W!zTiPoq-eR8+bEpUFig;^d!;enuaur`jfPMl|3Ei zuEOTFBi6D)YEny|*rYB{PJd;OD8MJGsi}WK)~{fa!K5x}@bIhw0wQ7)QL)xVGK>rj zcj8ppBs$!%7GVk7gMC(e!_}jYKSmWH7&S2A44-Y7-`p(`oA6AKf$T-7MWu+PLaOvUB zGo|&1Oi^E4Mvm5DTn(fI#3bdF$Qp_38*06>n!giD^lKA@QAxtf_JjH}VOb<7D*Qc} z6Bi~Yv^9QUVF>h>4~8Q}lpUVP1YL#8>h%P;_%p&MRiSmo3{8X-P6sWN?Xwo4a5lD7 zSC=*rGmw!r6ofyj{ihVdUH)Cht|oD-v@)m5J-F1v#I-7)vp%P)wAjhWvZ=U@q`bo1 z8HNamYhqepM%2kDBdIK)Eq=@jD^k7RmbPvf#=?XS<%$dQOtdYgZ&*C%h>qqfIC0oG(j(>M4XJX8WFt z_{OFt2G$QKSMp+jbaf`%Grp?!pf zos2d$g{=ROdOXF#a$HJ|6P)vFZLX5MghJxNPGoWDo?OTD$u23r1 z>uJ@kUg$viYTU+0?~H|8P_~IWzLn5I5G~SUGzV(-RYO<$fgR z{cHUnvcwQ@EvOwl(KxxdgvzJOqIHcWhwCSlVIx6^1I2$L-E^)uV+Z` zabD+ijga!pwR_KZCoDiGA_QoU{JA!+1^wBx(N6(M5y~c15a|_&(C8Fx&8Wy!ae3a{ z`XV|_vjBYfc(TqTHi_8$9H*~a6irok)^A|T~E)q zG;CwCs1fgvXzz`eJw&g-v8gO#*yW6ZgJ)`0aEiYXUzXV@OjBv<443|OpA1@f`c|5C z1}rlw(Dp!}CQj}$IB-bzvliR~t+2O^&4z}*DX%7|%T@ zuBQS+80p&u-bqWfPE0eQaKWI^DGzjZ*k$7?%g>GTy7Zr!uIKFICiI&z5JSO0$u9;p z+6`uVM+Q_*0z>?1i+_RcyX;4A_u5HO>)Z0pydoGCd|*ACW)jVi{O+L<_S*8tNjPgp?A7kzx8W!*-W|f2{08G&Dr@SIGiKoNDToZqfE!wd=51|c z?39$00q9d)ovpo~+?YMtg41-I10vx|giYT0lA7oy`kI_lE_U8}0}!fa!hxA-(a2c8 z>0atT+g-=NlIbJlrx$!jWlJMV@%Kp@x{>IH`IxhHU5W@VaVkblkAV|jVsmF*a$RIZ=BFJE$~o>(P@SrMHpm6szr1Qgjm23BxaJ#v_Y5 zD#ZDh^VPx9Gr0AMsgf}x)NB!%ts|zcb*?e^bi>y!P_!e;(w~jLc^X!9_RItMSvp4t z-&(Lzk3LGb=><}O$T4Mg(R$d{{i=8lXxl4Vc60aqV(9Nn_gy7#3=P2gr^&* z<4mLBg0!izYY9p5MFl?!Mqe`h_84(#X?e?QvUma|WC4R&WJ@lux8!NA-JIyuBT?IHv`9cPVK_;iZ?$_lto%CPMs*>Ow9qcVYaG(WLh$G!~LDku!xno^9GNWwogu0+?fB#I*+i z*la@Ai~uW;-FWMng0|{Sl&jz~M;*snPVN?JG=^C1;9i2|NQg5%Z8@=Vlsq>xIA!k? zD}XJnizEQ^#`;#DzGH^G*%2nW2u?=Iyg)BejD-Srq10gu9iuje`SMv$Xt0Tkr)IiE zFFLE#UBjqiekOMODhyvC$R}@xmR!hI!GRjULtklQnX|CU8WygL=r-%qTNz*SQP~AZ zK#)I3cydPnr^PgV|p0O(|{RHcg0nbyb|kz zHVz?XOadVmHsS0N7|hSZH>r+_jmgw;{49gW3Vjb7>#%ull<}E?IAmes>kbk2%-lHk zCsd|^4wwVxy)bi{IJt3VU+H=`7w5XOaui{8`mCbHq)*~>wA3GvGo|UX`A$CiVxy-f z&4QO%m^l^GrGv6&_2!skJ}H9vhZ56=GXtkg5G9=DK%Rhpcsh7a73KmCy_TS(gh5!eSE=;z@_1punL> zj~3z_pN8a9j@VR`9i*I%Gm?aZ*?l7^D=0PeNd<$V)-$*KPDV%Xa&kv>Tcrul@GzbXZ8{y6C6R#5_ECIi?k@ zTtM=CXl1~lRJnPHbgn3r=ns(VgBb4Rhqrzo^xXANtu5qj)rh~x%d<6pc>foVg~WN$ zD1)l~gBweTZt++ukW#+JMnheG=%SZ705HkylqLPvla|NoeT6EbSg=GdUF2_4V+Q?{yu=+{_c%85O(wTp5Q-wejlvZ z`HiFgqC~#HxKsP{ZxZAfB$DNTAV~W6EAGk~8iVPs@8e?Q;vj$rYR$tf+oR=rbM>jr zrF;FBre{@WhaLl$Mqj zA+cxAH7IDJ6{{fUp@b$vjUFiHG5sOwpSLhz%1^;9Q2v4+;Au?I3aDdO$5}N{r7tJ3 z;57==wHr2$F+fDXh@=e*bYKL${O|s*(QnZbq^9TQ#v94vDu5cvx^Zd#4$5+r`y!+% zz=Q(W5CKl}fnZ0no=XY}{=ty*sCg~c3=RzyLdr@q!L0Sh%oMDl+{?*K6%Nm^RSI&% zuy_X+b_=2))_Z#f3z)aTTfc?~_b7`Z6_5rcsU|Z93n(;Db19&5(PQc5NKH_a zL;)EO1yBN?p-TPXXKEkmqv6t0^q0nb@~Mqd8Zrc4Fz&3YBdS#9864jQ-wl3hfr}-QoBL;q z3OO@OUR^yHl*Q43@Xf?jS{ezStR<5smdV)^9#B+NB-r809u6<>EdXfYuIs`(7Qh&n zo%V!OwE;nipx5X*H~<&k)@ZGKM3dkvz?I-GcxSabZkds8()?ior{?oChlbyR0Qp{q zGk2H*js~=PxW(Q_=U@bjpjnP0S&A4J@&a5gs2Z!54%!-$1y%{~mg?^+TgQwv!lp>i zkfAM;1uFQ_OaN1a2zenqb^QB-Wp`;u)qEq}zMaA+eN9qNNIfYDgF_CDFbp3Zn>D0B zBMGWBASuow09aB1=;-K2=*k4Ci%EF-#wi(V8$28fl5wR!d?t608L?UH;wn~S^6O_5 zG!Ru0S5W##O7DCLKEF8@105e*dMHsng;rLEI6C{i?*}li-DS2`C7Iwq*7hPO$<;iG z1bAqe0wjGC3t~UTxM{NBJacmJZ=SxIa#1rg(~xl05mS=#P%&n=BzLW|#^(9^Kd{)E zVHpKZp=AX#b+7IDwY?A)CHn_7x;gY=TY3EwyI6MjpL`dBM8%!i|NR1np*{mHmfksZ zTvn+c4?$4UsrO{;ks|7w2JBSF$ z-rBK_Pfr)kMq;iD8qG;r?|ecuH43!L&f`*f$twjWIMHIzO0_I{267l(wbg9|&26`b zx4zkX%NmKpQFD~E)B;lRzl_laBUy_VpHOE%HUtOG zFAyP<>(K=rR?(1BG#Yj{-ksHB$iwUtxvO~(zYU8{DMu%OM#Y#RViNz83DP$~?+_&j zs0uQ;OsL@r3vjK5;Q=D+5VL<$il8|goM5%;531*qplCrlpF|!MX>pY6UpJ(z`5=-3 zc65%LU@Zz0L}oZXvqcZlZL#i=G$|0M`K*K{o$c-C_@;DdNapt&NLeUO-be7!8(!XU zn%M_4v-WIrm#^t#X^>}@tvyEp?&-MPW&w4LX-%Msh!R>Zbq#uHP<+;ne02+#N&GDO z|8{wNSNE7PLdRPsf<~U1)%fezuTa!wRTPltm0i5d6%nBflY}1uVa5PxC&FNto>_XlmsPuMyB+HhyRl~v|DNyyI6n>8~ zNvrgUUOUwa+&$}6ec1xnvhRePXzbwXpanS%R+`wvXK`-vc|ESY4B^ck>E95e0i}V@ zx}~`xqpGoyoIL4Aw0yKogv3Cx#r{#MPKq8BEEy0fo2ztQ36143=^Vq+u8uuwLNjU` z4O>w~0jxIriwsrYZYX)NIdAu_-Y|{~MqYt?mvZQdw_s|{7No=&s*a8SQDa6y_UxL$ zq#zRI10ZdU?rL_tpa$w46IXr-l|Q!dP$`2ra>TdkS>?ON<}H5EP|X~Q9s z-uk|EhI8M)gkVNzlB;Ax~`yLjV(DcB~SLfIU)p5&9i_-fl+VTW({iCCmnb>$|`!|@W zX7{fNGzV3yNtb)>U0k4ZeHGL1(AM4}Zx;)ms0uJ-b>#%rx`NH?Nx|g5bHar?yOY`kAdVL zBmK*D|2pl3-7Y@Q+vpz7Dtbr3+YG0f77~f5A3v+C#6F{96d=|YH_HxYon_w462~D2 zD7&C48JVe?N+}KE2gI>tGY`UIXF7UT-f!c;c^ZhSO2!8&T0f7IwVVEJJcRkb%W#hq zy1I@WDg}sNAZK19DaGhdI%C1BFa;NG`z{TfV814Ky8Cp6knW&kk@p${bk#hN0rgc3 z0Q#H;J3{?>5wyhRYz(H);)+WS|K4@&b}Ro9Jo!b^`==QzAT90V>B&KqhTNxZBDG1* zxkYxl6oHG#Z&!$s*H>&m1fOs)2+*F9n7aM)PLdKBZDn6S0Q$*u?Wz2?VwO3ArP;;$ z$efVl{GCM|q`C;y*75;kV=_`B7sh|T?QZMYz75x`+yDc7kr#M)SuMf!us}=N^^}d{ za&$kxVPEBC;;gN8I_!)EC_P~ht_EM6u-VQ5aRpUMyS2lis@}aqz zG)GQNP?PI3`}lMsT@&jMDF*H5=Ol9}$@d15Gg@i|lWa~OE>5MHaAIM0xW#ZE?_b%N z$%hOPh@1^cJ19fJKz;ngJcrFTug=R++pqJhnrD7R?bZ|ZcVpZ70(n>8dFvSD1Q=au zj8Kx0boNO}_Y``Xn;O~cS;B47jfTlaWaEPsv=bn!QU&H2&Byq9B4Xql1cJ5-SAL;?4 zmtw)Js@e`F|6Gjd5BdIko|(2!3;-&i-nQ`|O4_g@>*Xkn2uU`nU@qdcL8WKD$at}f zv0%77CWNGA?FIIw;i@0-C|8-347ND#Y`x#~_E9Q|w{p+gELO~?7a?Pos!a`GEaB>% zC1pk;s@71)m%co;wkIszwt5G#Bwb`Y71d#!{bu$sLaXv%zSEM@`4Pw>64AZ}D9?nT zi!T3ljBw#JL9YMG@f%qBn?AWC>N=7`<4(XJVObg2!>+~g&**^gA3PrMkroJ#_xh5{ zrZ;VspXCFh$d^;LN72(i*6+t{)2JvEgf<2k*-LB3X4-x%!rXjfuFYg0?DL%o2}c)e zy%1I&~PoGbk#dZPVqD5P9C zUmkRkf3)OR94A-u!MOw_IZ>cPF>Y@>UccjanSFVP@Jx#BcX}Bs(Mm#YIwdFE6*~KcWrHV+Rk#{UTzjn%xv7oIdh?F z1CVrJn3*K_;6aVWprU+SUKUM+A->pCWAPnZN~!K?kdbjSL|?D{V5DR_`-k^|s6?1X z?03v)c~#lj*i@Rm9!fyZXHr5bBkx@t03*h|ZEqV5F3cQ+?9kq$UHUD!R~1vkl?qbM zGi!)e3DIGMeXUaLKWJ00?#cyKMLsDcSLA+P{3+YQ+`tY2B4$R9Y4jxHI@1Lo*-lw?C*Q3j=)mL-vjR7%BIsMn6!DCVvU2<_YF@AvT})3 z5Or{VO90LwQyL;HW7mS5f`Wn^s$T>B{YlKt%&N-T3bXU=6^xO(k|V%e@>&2(%q0ZN z892vL@^UotX${l8)E~L7&5k*$q<&KP)iyfQnxCY!CG3gJgpUTi%J?_!Hhf+IzHT-ONz@p-k$l%w1XfG*ZCpI%PCT2auE#a7At{2 z8RoySmhf-&ICw?S#>$;jbAKMHUz8B^Cd=+bJp?4BaRrULV%%Xn9OBMQ&UJ4>%RwyAeh9R8l;3fJUo1er|-q(rJ0%8ec;<) zMB;XKEHMK)a#V;g@1I{r$2Mh+ewPOO75E1oiY=E@p}t3gtaM*eUcL*tn-`*_q$HIh z>i^>It)k*+!gkR(0fJlb5Q4i~fZ*;Hbb`CPN08v|7TgDSW+1q`%is*|uBXYj_uA{f z+voC}zGC$>Rn=Xu)$>|VM{;s9a0m|%4+pTE^73*pn9&F2X)>>8PoNAS9$IZBO-v}$ z8UKb?_=i&gHpHF!J58`Uy2_MSB_~UV#%72R%Mu7dY)gTQBZRkFSl| zKD_=;`hBSpSQ>z#Jq+C9;^AdyXD1{iT%SIz@k&WBt;}R*4}1WFK?Sas4j+8C{7Etr zms^fn=BSd&6vJs{O+SsA9h+;q7l*J8XzgAVKmL7%)#aQ14;sVXJJx+tBqf^tJ69t8?3V30Hrr_kAHSt zeNsmx1XsVvc+Z(ajD>Xy8Lp6&lA@ueULJn>5XukOQ<}kQhbT?cjMiXOGY+N3J$A3Ch)CH>OMkfay^h&y z0URCuZ?_eqW{Ek$rB=s|=855c5y-&l$UTI2hA$a8iaJ zSv_BzP5C0K)|Pb|AU+>$*si%D7lK~iN>%vh&oi--y*;b5hq96qS!wCuurOj$QaIBS z>$D;~$>DefW)KinjEjT4j)#i_H>DVjaX77v!SCg{zBcbYJKOtN$>sVDl2Ud`KnadO$d(!Ka2=Q#&VvYAAJ>X#d{MK5<$yu_ZVZad_j~S5GA;eVNC$1t&{$ z6E9hHB^xg<6E$1g$BDfcrpD%81>`@rK$C*QmPFqb2Di4TZ)$*$5#Rz!o!luu?VcC& zKm7C4shXy}59+V<$jHRRq%@GaUV2Ot0jYvvW#!S2QZCq_#@@r`%%73+o`UMOzLSNW z%5X3qFM+8eXfOPAULmr8Od1;gdhSuKDuQyPOspNQo=9Hi5j%F#eA~BY>~3vY%oK zaGzuYBg1+AQoTptU#_@>%z#}-VPWAhB&2=41ISe$xYV`4v$>_Jwj!Sp?c3lY@fvb! zyqAaM+XhbpWjtWgCBgqKhz>CVaR?&6gjLiyTBmm9rBu;7u|wML$k)bn)P`Zx$JVxe z?%SILgj;3=$-f69Zt9a`R1)>n1?)S%80KHGptd}OCO26S6C3oM()g91 z6+Fw8VG7et4YSP{x6oale4=)rx+mdnY-0lkN_lN?6#(L-sVT+x{j=|`PVj3zKF7_P zoymKVYZ9Ocyb`T0praO$3n*5%880QYya4o%Hf1u{B1x`ma3&Wfnf zYva3F97mP$(}gnEH8d4_?&hF4v5TIbo>zoWO&~d?^^o-cCb$Kd;_3PyA+ds7puesO z|NQ_o=eRur{O&p`vpl?m8MooN$LVb)10_F$qcrbUnwL!V|1{a6`uZ{bugC9Dz0IH& zjDvr2H{}L=eLp8#m41Bnnj+5>&Wta1?#(vN76R00vA0Qve2+(UuB&lAk3fxc|H_*) z{VqFtw&J0yYg38yL5y~yW3+6d^JKNVLYH2u5O(@1OG;#G+!S!sqQvAzQ zUSFWACDn1Joq6lB%jR$Iqc+wUIvA>AKK|515ozWbYC})Mp5_gabHW};dOhgRlR0Xn z?qe>(F)lsLOk3rV)k5}pCPnnqYZaBQt{W*Bqt6PquPxIH29|+tF3NldbDvKkLP1pB zDr=6n^Om3YiGzA)H{1)AGIQ3e+sLpNfi;v6qnhS6=7}>jcZ8}Y>!>bG2&%yZFcX!* z($wNrKnyw^o!$P^VvmG;ctK%xIP8j+IsQteW`OI4D*R4)3(zhlGEuj%W$u zry~zynV90Ss;r7kPX?*9eiF@dieUUUW2ZxHZ%0BG5+Yr4Ac8~3W;Tm|J*vOLaQYRC zpZ-%ZF`+H$Z%MP_zH(O-dKw0l6FXDNil1!-D(|O23D^X}mZXU*)_?`oN>G^@yTvBa zKx2`cS!?2C_Dn9fnxWv+yEu*MmdhjpV4=@^W)$GX{@W`?4x(P_*GF43BOh$Oef#ES zg-JTNs+nXe=HGGeySMn-Z9#mM^Qgj*Z{Qs&HxQBNILFLB!D${H00>(mzVQ9TC#efD zG5N~oIcn)Wcm8J1_mB|+ZjqV4ygX|d56u~s%yvH0(&C|&P&Ko*p>|=dV^~(I*@l{+ zVmPUpo8%ONb+yFu($Xo?$_(~G)9~B8a1P-BE@fh+&Ak}Xed+eHC5GK4t&3Fs)K>%_FACM`|KO5)Qo9J1}t9K=HSbCiA zaCn@V5ffW`#9Nrv6v^n!8$9h4srT$<8F$T(^dTipS^MKhGx|Z6NpD*#)3tB#L_M9T zEz5jsGwY&L*ceA8HQV38&aQz8nzE9CVV&*;CU6loOj4q~Z)$3Rp**jsXJ~>okfP_T zvM!wF5AFCn`h}uo887;QJ)*@I24jTCnC}L3cBqRQKa95b_I6CLm%gnlfA;KCFJG0? zC}VV%me17+!ii9w&0^)aio=e!8c|!J`e#zW;e8|qJ-f$!p`M$O;3_}aGQjyl-P%Uo z#6>CTh*V#om{~AIQ*C(7fzXn+l9i2)(2uEcnNtlfHg+6qZ>}=5B-KNnPOOHLll?@C zhNQSKs6AiH4JE8iZlrX>$aoV+!_IA?tINcL$3;X;UYxRObKEfK*|QHAb4oRw$8j&@ z*G4i$I=7`ez9=N5doGd%1|B|nVZD-=1~u59XLPR|cL4JFs);$I%yTz>qR&t+LqM0P zRP^(rPO>%)4&3ee!GF&S{sXyeX_9)UTq1I*1_osLoOdR0!JO6$Gi~N4{l+boAz4S= z8^GYuC;8bbsB3At%aM(KDZBD=W<_70%N8~=;x=qpm8?~O%(!ttW`BlhEd%Jo)|S90 zXJ;uC1Ch^3g&|A2o=9F>jj`$?ShuzaL3GVcYHN3PMarDbZ7rhPXNRd z4H(zYp838itH{c#3}Pr0oc^m29xlUVft?`G4Gs>uD8ha?7X?&H%e#LADNlCxmXUxU zZV!9N-dyQMBp<9;R7R^&=`j)nrXx$wFPt2H)dR~sO8D0a3q;%Xuu|x1bM~q@Gn18k zhW1l(I_mjRNPiI!@zdaT9js~Qq8~hrl}i-?)^jV_>{(F>d+mb;v>d!wZmIpTR+xQx zHTz4&6#UA>zF903D@2|qCBSpk<`$!IWy;|9y_|xWayiUq zJppNVV*k7;2?lYL&?cXYp>{5Rq9U@{z3?D@UGqGft<6ox>lN$y0v*nb;L3*MMgRPP zBI&eS_`Agy6SjKQ;lZv-%|)grK5)27*+O*8eq4Gp%W(y}BD+hWfr%iu>pTbR!61Y% z{0GZaUm5n~Uf2Z5YycdOawem}h4Y^S^+EX`xkR9|2h113+>D~%8{hYhrhv<*IZu9< zG6uWydR{lGS=q-X?8tSyH3|$q))eJF%$6dQ!CG8z=gj#P@?GH*hQ%~RJ@XTHg<~(V z;O|$a!B!}xM5(Fa8H+C05BJ&$W$!KUn@8()B!|ryn7v#%_AjAHz@8pW3O~6vnbe4| zb_fZg(6_xd<2^)k4m+Ee?q2FDJlIWqY_4bKBb$)E-XaYAVA`2xO41o{3xnEGQ8TDL zUR!(T|Ea$!p=3PWe(-z{Q^Iph5R31$rVS|H$^XS7SA`Bin# z?Bt{u>pWJOkzCPxDa^Akf>i6qXr!MVPrSwZXzSRp6llrw{_uC(8)?N9;u!R4=^8gP zS^-b66&zPfRpeNDHDf%4UqcSaYul|M=_W6b7FaCEYZH`#}>%I4%wOPmDg zv!>djTBxQDz%*Cm|DHlKqnE0ws+eG_c`HR{gE8%0IN+vHHKJ<25;6&Z?_%&Vtke@L zg|fG(Vm0i{hQBa<4+no**}_|Y^8Tnld)=3H-)_j->F*n&(l3iNyc#4E{nw@-{KWnw zVkj@)eK0Ov-h@|u$iF7zFzFANyB8)rJOir>9n5wsd9Og_O-v`QPwf5PLV7HXD6O)% z;mn{jh|GgGz(%NdL9qN1kbdq@On#J`Oj|V|TdIOov_ohiBP~O?BmHY}Z_kT-$4ym4 z%*0ElKH-;)vJVHuNJJ_=Buv-N3YS0a{igLAf$ESAgXD2VP_MZ)Bbt5Hd6;aLp-{@s zoe>ao&|>$dC9a5R_;&>I?F?#|cHF)NeCA6XzOAE-RNZemHF&_xO>Q01jtInB_g7Ym zUr-iH*YM>0@cdt%=ISEGz$hZjy$wwCNlv<<;n_~U#Dkpgy12{R%OpwS)A7dL+>K4Q z+_ zvM}FKZ{N&gYYUZ|G)N*U%3bK3$j+A0rrZPLZu zn~($(cYS{sy9cN)VTeOD!+UGAY2v9x@QN~?GY-dSJqOqizm9wlcOK&@q&_SN#Lz*| zcci?5o@#_Fz0;AF?JnEhNOEwO2 zDxhpC6D`N&l2rE$9}`pWC@fQbBzbEeH-;`eyt*-z+7@1~9!zL+_yvI?7_?%rs&PKg z_p209h=gpr6LEBiCCmS#t}JVjA0*_2E1bqAYn-&bpJ_&LgoU}f;2;8~4k#a~|0G`= zzW)BBCUkWQ?~U6$p=Hal)Ifi@^NAc?=5BMdfx*Xxm(iWW&jWa9pj;KTb*wBE?_?w| z9D@f-OC{@S>)y)Kt%j`1xL2lVc>T01VjL8prJ!hoF{Qy?O)pX~KemHf`a<4?yhA+- zR-o?-LVkPdY9B^zUEt&?!?pL#xX6_F{jxrma$g?a`t_|S9B;ER`8E6aG1EBHN6v}f zR^g=q*pzH{A6HK0hvBIs)0Q*xwgSRAG}{ zL;RW--_qROpKa{tOY*EOa*<9kzr4J>tJi_vFgthU#5zYWx=zH3THAh&p)RNz(9zCP zpQ6kCM$Fjpm8$CR8g38|VLtMynq^{yk`;}FV#49>1|B|uiEU@ZMkH{(cy`A`2G~Ze z2^I#FgzsmK_u6-*zz^Jdz>8MGD%K5i2R}QB)xzUA( z;u`fvkE2an1g4Lul&NlF%}yk>G(n*00g^3p+0 zS@Fme-A`hOt6uvr#{2umUs^%38`@Cn7&;9_8{NezI4ie|x@98H?a^e*=oRWJ&Wo@F zM5*68Ob3~qxaW?(3HMouj~CT&yhLBgaDMab`y-It31}#XpC@N_bdE0#W#)6Tg8TN| z2-)}~w3}jA`^NSp#f4sr*<%@u6VBY}h)06KQeTWviwmdvd&g!bK2iexL%D&}TFvM^ zTPuSDtdv2UrXQ0)+A&^%soDAg@t{6(qGl%PoK&&Z!%=~@Wm-a-w{+4`C)%;kMP{M# znW&+AQGtGbssm?T;mBmiMDJ`T7dz0c;v?mUiXeF#3Pf{%iiH3JG-NhItnQMwHMdMETddb@^9( z0JmTn`wAg>f%;$g($AYJEduHL=AR)c&`%sSt0=&*zPkU@YzIt{5BUGTzO^5&rW>7- zGT&p1lOXt(&As6^UuFAz^`n@*tX}%ncI-ud@FP-w1uYX77oW^;&2f70z3xI5LjHxG z=NbbekZx%YE+?dzlv@p6T8?f0T(RG*M4kU>wRKb1gv@>QhH1RdHVe&4>fH9Sf^rgm zG_{{+pSxP=cW;rXg&fkkca@IVz>PIM1$Il#wHTXEL<&M+o&tol@p!%DR zLUQDf_a*$EYj9?j71)s03;@^MFTLq2TJejN={jBwMk`?|qf-9$tFKdRZsYuA&YQ;* zDyA&MPz9&BsJOUn=ZEdwjQR`LV`V(lPcd9Acz6`W0*`}1=MX-Z$e5V@Y-Zh2#+|zB z=&9I~#b>N1p;Ee)8-GxBZIe2KcUxpjMk#Ju!*#rC#C6Ej3G*hy1eO_jRx5M71!PNP z>x^G+>&C`KWuozVPjnY;Squ{jTPE`3WtzEg1@h~jQi%+2!!Y`l#Tdqd9rp+T{_K+*3)Z_GVM{+qnHl$5b%W>a>Ur4y$v zD0A#)|M~xs2+b4B_>+5YdIe| zG10M`5{TZQbb+Ymj}KTVLH^qnE~xTS1C+rDO^zjJImlfYhvaehoF_>&wDSIr)N`YQPw$!(MkuG*Hm28s1lG*-v`8H zM5H(>*Oo_}417rV?q;GCz_+Mmnex5=4;UDX(WCD!;bH_ELoj zw}oX&Gt$CpN-d=zX2WhckFJSY4Poy1h3{N*eUw?7z)5*|CTgbF3`7)=jdT^DHA;*O zGr!5+i4KVLFz4z$=#u$4|4(xvC#nSl|KqX-`hF$1X6rk0|0LSk)AKLFc_n-}n73pG z_LZFPqS7wM@0**OWkPPE|E3sLjd{KNi65$1*7}W6%w7gd%rwxHCPm)!we4^TdCoWm zMfb-Q)QN`K@q1S$D>FiTy^_aA~K@0TiM4h0sCZ)LR)Q*_}E zW@uz-8eUCBRoL4CrV1AJe_d{(y)NP+6qd#C?>^FvJKwaaSwa_gdU})v1Om@e@h}N1 zd~(j3NnvVnqKCTl3cTlg#F@)SNQg1aep`* z_1qoYzL6t7tj*#mX)4^<>@aBCbFRmur4BZ2K{S*YE!LR`rwgjn|Xa8HuKG_zN@kFDk zA5JPLJ!o#VX+6%GRTg3r!i{o^3H_T_P)H85-O<%?_Ike0TC)1|)Q3_|m};gashYyl zA=R0dYr7wqCX_j8Ob%>#DKMTVw>Ra!j4T1q5SNy_yGDWB%TzU?-W>>+r%kOMuXWSD z+g-GcG*J}#IV$v#s>*9NS&voJWveLB!KQJT&|iqS>EeLR>?*y!a)9bq{T(5@N$Oo| zZj&twVG1BxZn$O1O+nXc?-*U;6LuZcb0hf;#=-T`cQWbp9K{>8Vz_65ki*22M1P|<%lEP>hTD;Jy#;&0o z&`1ez)p9$Ml9K9;>x39}9lEmm%!Jrj14R>wC0@R;h7xi_9@ud;Fse-P|3+d-|BtD&v`T2mN8^?V;}T~`J3O}j4?vUb?jt~ZP0?z@J|zxVsJCJ z$9VP7uLKYyn0A(}>2_oTo^nlZdG4uUy8z>Di5Qs3mXZQvdGwSv8)>Qh{W>DyacYbM znfKgM#T)OSJNB5>ZCvAD{5EMB5;SnMW;#UwelmA0wyMV3)#GF_zbA4-!b+4ss{pes zDy^qNB3`SmPR2FuAVK@!*sQL4fg0}DK|anqc3ng>n?=4|h#N_oQy=I=XhZ@^{^syA zQYipTGM^`XiQjZEkd)En`oWUKEtoJzi-EE1fZ0OB*s{2Hn@1UmuUJc)-G@LdplqmU z!-lWow|Z<5!MMe1))|u6 zI_;1%k8^r;@(PQ0G;ItO$Mvb8>6~`R2g>Y<`s*cMhGjZ`z@DKVKZeqi5jS0uFcOL5n&xRenbqJ37Z|A+ zZ+YO~EhjXMfHX^ZV>Q_#4Ln)8$_D~!s3 zX^hxex4#nZNj$&Qrk1{j)8t$_tgP8%ca|EK5KmiflUd$~-1U$BXrCr>VRoCSc#O>7 zgbuq#9I&s6Do3|(G4eB-A=T9y8cpxxr7sFxg`Gt@8=v(h<-J^Q)b)kCcrGb^ocG;s zJfC;j<8_e_n!Ok#m0uaIYIMq|7f?A{)|yCzjY0w0NO!vlz|YoD;h4&z+05gC=;zDp+gBf<&cF zM!rAiZp>MR^|3m(8=j>qL)rNnI;a@b(VgT zmX^@oC`7yovzKP(6ZVk1$aJL~Zw}c*H})R4?Uq!S%bctAR}5og^$Sg}ak|g5=DXBY z^>Rpt`A4)*xQ>;PtlgC zU{H(qGkC8aXWvsjdKl;xu9=Ydfd#!3Y21)Pky2XXhzskmR%!+RytZ1Q*XPTu5oplyXoMyc z$ImTmx8`zx4(Z{&)LG&9E(%y7O)HZ+x&n!3Nyk$?6EidG*DD-nuN#wXE5{x*bH-bZ z={Q4oB_uOw{+jpRnx1X3+wBFT6mJKEk-7yRlaZf5g0NJ4v&# z&0P~^&!DYoko=t*?7L8i?>BIB=JhSHi}9w-<1Exa1dpldzHMr&vlbPyY4#pUEZ1{@ z0B*=^#PX0qOJ(;x{wYTpenBVRC%aH20*^b)m%L1T{Pp9+d@OhACQXnbGU1~kD$8o= z4f@Gxu~{&!?vy{hKq1ja!B|G5{b_=&7EhgFAh-@C`$ZV|@^Hblw~o+^k}N}yCTgvS zw~`7!huQIX)&IUJy0aT+SDU)?7n>B^*hxId=bVkqyL5H+q99a7E5ZODuXK;Rr z$=XVmu*%H7ZH%oOO$;KAjo)Q999_j((hK@+uft=%d{ij2B}dv~GOCl&>?nOX9I)L1 zZ|{)j+L!HlF#XXc9Q5eNXf)~!3Z~WJ{T-_J$ULT*6#m@;!}*Ly-@#Pk5(d#24YPr* z#U~w`9begq42Ms4Z6?Kd zCg(FY-hbkp=VfuVj5ljizcczvkMp3cSAP@d%EJYr9o|~kt)TPVR`r^$f!3B>$17E6 zeH%2489P!2r#Sw-Y?K`?q4ca%t~qM#M$Kh(j}H0@*f=)HNE{gpUZx};8P(a+VfE(3 zI$w^FVo7v9`>J*Ro!YyWnPk0b6XaWd=ycRj3$-3p1r;^kZ#u7u9oygyr}H}BG+U+~ zmA)(#*hEW*GT4r4gnSz01&TIMW#)T3u8@ zfuB^e=LSZkl5c&PFgw{v2O|>$C(Z23OB+GXv1XP(BHgDqy=??+omKhUZxnb$?{{AB z#?km(4k6wiPtBC=*Qyu99NcSAhB@hk*!i3((v+4A2%STdO?9yrBs{^t4)wR=}AL?cj@;Gk0YZ+^^m14+iaUIh5+>tHk-0n?jBcoE-vG}-e zP8iei<=3I5Ul}1SLH^pYH@lyj*l|LZRMjk6Au{l|v%yf+4D*{j7AzuLL7x;&iJI8% zrIveY?q5TKFI?|Eog$b7*s@P8yj^C}klV{g4X#qvj@ zygj>+;)LPiB(Y#zTu$q|9VpmwrW^jUCOl71`z%4kE8};cwg$cMrzDj=8>eJlY1uly z>Jt(v-fHb8Gg;tjn^wLTTaX@Q^YbM+!D%IJE$l1j7|q8|(z@#O^`HSVVV*sc4E^%Q zSo^Mu?DQv4R)l1@wdO2XF3CdF(ZpkoqJNCgC3kwU$idNKsa|coU)*2aqMJhr8#MeY z3FvMuX$5U0XDdxI5LMr%U{~STn+C^mpm^zakEwJG@P)@wl*BK8XALwGn4~>Iq!u(# zbD7WPE#8MsX9PS24FDGiPoSly=m%(Oq|G|FU~1}w*GH|2`LSG+!B~!gA*-+U5~Z%T z7D*KJ3H_~>pikx>G4^|VTwQE69C&Mg5@_cEKxv zj|&?+1pYM1Gp|nIY2wMe20?D$<1{Grp@}bnsinWfQh$;IsGm)jF*!2xg-J28?YHr# z<1NuneXeO$%FfP>$-1}6j`E}e4)dRKYJUCP_95q)O~ctbi)eV zpXT^p2E>3@XHaIRB+$2o%put@9TK=*^9XPRF<>5@@H-DU(e@+N#Of{ZIm-456n>h! zNpKFd<*z^K_s2_;dOkl@`mj=K;#bx#M~ny8pqeU~HQHOhIf|F25X+s}DbT#CuI2bw z`TK}N2>SCv<>qX;U(!TIJG1AoCO$i}lej9eZ7Ti+liV*?lovh@zatuUs^~NrV%i66 z)5bFKs@xnGsIohRRVGcr+K;io(aL~J1)Gb4lbxNh2Ate!%r&8kv;-W}6(?Ks3pRse{jP%Nx`MSOw+7I{zz~dGtiUkf+9r z{{CWjul)l8D5mAPEr$T#($n0+A{e-?k%L1+Wo2Zr4*z8kwBm^Xv;yGQPjf%A z0~%iM$&C#JNIVrWo%>hw0f0Bg0jt>aT4uet{>l%i@~|!%P)~otbQ1RmTGW^{|M4FN z^6ZZE>EEFbUO2;&Z% z&Yj|<6|_NACt(DdS`hd1i3twwAdG2F_^Fo~0Up+JI&HF5VR6Y?wQ}qq9uD45yc7~& zlu$Y~^~sdf=%05QYTzb(q7==?Rvig(Ae3$wCa;ts1Ug)m_(c{>n0S~6XAl$O#6(h9 z0a^v{(}zEODX)!dS^+Ya)=^QJ@eed~^POKMK<$h?6q(jj@arP_D2$yHvg8t1E~mkw z5(QKTmt(v0kl#!L@+cQ4@6Zs>Pvz-{6;!>m;aEGS7T@A@72lifZ()$c=xTwY)7K9$ zgqc?35@U#WH<#DjCHqXs|84G_+|xc>_nqR9N3B>}7vx&B^~kz%anvf-$lsw|7ya#S z<6>Z&g;A-yF$HIh2@`>~wQg_S-&+t;P=4b5Dlrn*KsKeMc^#BaLL$Ht#-N(h&!=nY zDu`yu(EdGj@2#onZEUpG=-ks=9&z~rXZQ`eVGaAx4m&i*+&TgbL@8VXTc?5MXsoq) z6JSdcL$4H<=tqrW5(-_l)T4uHJdKgXYEEL>7vJrBRXIA!^wH6=V(!zEYthgOcJWfS z1ZUObuRI)}VyyU>0Qpr74cEpv=T2BC#z~Bv0p>V5O27V1?Fxi~?{5_Qwuo7MB%cyK z++Xypi)B9-F??@dv5KDoFK%3Tg@wal$cDVsQ~w1%k|pjU6j~OQ7Y_k_^)}WlhtxDQ z7(dG{hkoks=SUyY=#+x>x?hh9fN^p2l!7|da9+Di;cmv)B6d#3C9zD!Z%)CUtI0Lj zc0F;>vh5Sy_G@I6ZTaEg;bGxpqob1$<2|zI-t&T#V!tm=C~9j=cdWjBRcgJIY5^{@ zw8Di-md6bjmX=x@*=rZ7dw|Qu3;ZW%6sJcfYMC>}MVZ=HPp);;b*&i)ncSYF#?`Gb zz%(a#JsQr;QnLgRzVa%2LK5W zPd{AcKgsE_nVI*vxVXo7*qE5nsj2j^f5|rAnE-{m@87?Hi-Uvn_!N8{~vz- zzY`Y!-+t=vqpZ97&oW;#Vg;R?g7^|Y^v97i1)P1k5p292ytuFQj1P~~W2xw?#POQq z_Ll9-&X}fUd@wv_ z6TUYbN9xQ)lg7*zCdX=6eJW>tX9@^0m{uAnZK=UB0VP{U=lI7)T$rf5K)tX|4)s)A zn8^Bigjdm3+4`&PyXxKB!>JOj28VO?iM6~?p=n8tbyo%Q0Um|Q9e*?P6SU;RVBDytO$8@V6Eo!TY?-3u=$*MnsM>8jsC zKq;?uHOoM!QF?6yKhV|YEYWT_LD2RbzZU7OEN0BQ_Wi1&sp-tGt@G!&PZgZL0CjKg zi=%51^q>Ln3Hpma&#x>9Wk64O2n(27?GtC5RIW88A~Teq4k~U@EM7}Vp|VLHg_!Hd z;R|pJqp|I`@}vpQ$a`Xz_w~ulWTX)pSD;b>D=T-|=;PRBGOy=6?K~GQslFaF+KNwU z2_KZpH+7}>6>s#|z2yG3FK!s5=pc!K2aw#uUx47f?L+RN_@br=C;OW1OA8C-TEsay+C?rIn8H|iH_SOhdleyZfDE{N>x~hIhlvI14G|Zk zFxa4cURTL=34>!S#GL#{=!1CI)f*9r%p)G_B>I^I{c^#q@Nv-VE|50a-S2+rX1+EO%67YCC zyJ!DOJ0FxRXV-Xf_@wy{>||r{(nYAnMjYKJ=WZ`eYSH(ARZ!z3*Y<2cYV% z2%n_XM!uU{X08|L4tGku+t_+2-f9gHt=if(ryeZxtZtNWZ=o{ z#VGqCwsR13z4qyNlon_4zd(F?+`NxZ=P$pN;!A6po#z0XMRog3jrnFcy+JV zH1n<+=hjz8z;d9z@XcSfpKrRLo#YZ>1RN#@(%CbZLhj41$hahYzWYtR!>A6m~Cx<>Fh`>I%BrZQ1z~ z<2h}|Dkg0De%n}A%Eop{byx1aaZ013MoAWIz8wmg&WqUd?WK+fuT0`C&Q-Z=EejEH zl_ebVUV)QlGdss4T3qr>HFflwj+WcM++HqGkMOH~ZCtZc=b#$jz9`w)1*Zw}i2JP9 zA!KMEQVZ$cOnS?_K_g(dILWjk5$qK*J~s0>Hjg;-OIS3wQ4m0lxeEoMsnkr{HGmVG zl>Ntnj(HL?!}A_ir(7{z@?W=;M-_2x8m$ge`R6%Hb?hmd=;5%;I43HTJ?<3Eeuk6r zR7pH>8hTA%hT@#N4WZY(&w5<8ug7sLm71_Sd$k1X+XLp?vS4WBQp4vLoEF8nWiu6q zomq<#l@>+s$__|qKl9}+jw+PM*QD}G2H0e3EEzNQPMSk$$Gd4m3HVPN_1-T&_PyU7 zJl#M*AvnA5H8n+J%*Kn^o?DxFiPO2ebl6}mgb+)Q7U!?x7gh>$Y$#9Hz&-XE3gwsv zXQXgAU9}P8IS>fG;rlVW9ha>^WULfB{VUAx-PF4)}V760od2phft=ZL2hM{e> zq>IaL1+Cq<_WWebTG?c;Y2M_d%__s28KrD-(q{dM0lfF11#Z)|1BT+fhm+;&3SH!j z^oG-W;A_c#U5Ow4ifhyCw8^Dmo1Rg~yfd#d92UnEo?tTIovcy@y-U z6btG_8f$zwcC6TkN@@Nq7Pi&&AoWB|`IhzpS{QHaoh?%LFx3_l%c2}$#a&!-aWoRV z!KYE8<#Jc?a1Y`HdF_4~4ykfyQ_#DLYSLe|@VcCVg-CO#xd(D7%${Z%y0pDX8L&CX zOh~SCKI}3cA2#b6xrG>ev=9#q_D=%J=ur|-M(MB4^EFTsJz@T88`8Lw08;7e=B5C4D8gkA@rHSnry!czLCf5nSK%o;n!Ql~op$|M~N$2ud?}B1H8O za+nz(esX=FObo{NcWdSq{XM}HF#$f*`m(-Wy2fg2oBG*%X+DCBJ}WHTB{uqCtW+Wb zCNlZ4ufJ^x?T~Fb(6D8MMwqVt)977%s%m})X~A}Z<&D4F;Z0s(N!#kQEl6%xfzsB! z*S566=W=VO697E>&vjgQ_$K8tv7$it{hqnI5X9@1Al=``VW`UdjKw>j`6|PqZV+qq z{gR8S>VeJyTWTR4i25VVH{lanjpzc4IT*n4US{@I&V6&no(b@)m{%Y;FVM`8|2eU%n zeCg~`*j$oIECKMQOD%EGbg{Q!S^?tK4pQG9^&sl7yq3;z5`S=%_%C&g= z)QG+j8wW?O^rLsZm>jZPX%I()M_7ATnNEX4xfMKY+G#aa&za2VVzX+Kgskgw3XAoo zB7SHWnJ+gdpvWVjAnh?;60JFFJrdV|zZ6gN?$n>K#cFHOFv!(vB%p%0yYxX*LZZ91 zqjzy-P!yllaN514C$T-m_>HYHnD!{svuX3l+XKP$oKj{;Gxw$?rwMX$bwAB@F{Zf} zt|qJ}cKULO&$o@TuPxAc z+Oc0D^<3p`gIR*^s!LiAO5G9S4Il=uI|Y{@$NjD8i>mFF>=&V#5s#hI9uGgJWY(q1 zH2Gk3g2dxV^gQ5%y;9hZ$S{q#^z=Un8awmZt_NvX@u+h0NgVN}xG_R(Hj9uZBeU)d z62kcw-ivL=Q6<JjM)?uq{-GHhwn z^_Z5-Z;t&$yIFLb(kIYutapD8X%F!?IGQEx9hJ6Gfs>m9op$%b@2xGP4GsfeTVYb>QrFVNEAbw zt={4@?|1FbFO4Ux6XyqNsPpU0$hd5~uMAkF=!@RCo8gbcHCyx?&r$Tk3Av^OWYBGW z?7Ig1FG2jepL5#xv{4aFx+O2|VNUXWY=;Y(Em^gHgQJLXiJ0+f6gqc7Ifk;2D{GYD z#4y8|(9>xJm$;qdi+1MwO_m|RXfo;HYVWzBTEU*I_pV$h0kQ%i?4IbFabIuBISw>O z6dE0e5o0J(2uDnNVV0)#XIJM{Jom=xx?|Y|V>I4PM9S}QYiQegVJzU`{@^DlcCL}z|w~pZOAbBj47OXsvKoqA|uF`m`U@ll0J_^7|r z$I3t(iU^+#qA?g?rC5SpLy?H~PE>~;eD zqwT9mbBs^|-+Kmhf&@CVThsF6s*P=zdQzF6QZwFZi5qzV5ZO04 z1qJK-P+=3}oC6ABqv67Nz9fMixgH({P(IbIaU*RB-1}oz zR$)uDr~_Y__P>LJ3<9O8__nOhiFbV{bO>mP-%@n&a!%OD_!)~dd1k)`ig^GbINn2g z}BwB90b*ay-zPq%ru))HK#Nz#zs3{HR%%@ML=@P+WMh{A8H=j2=8w_gULj?%4okQh3n}obY2a-6C z#OVO$*kcoGaImMRY;C(8-K%mUCpy9ycjn-OQ6RquQC0`TFBbCVO!u5 z$qh?kUToO7@hxg>M&lhp$SO&aLI9Z8z_N@_Bw(O<o~?$3oJzz@RHAqQ#NME=YarIKF?V2qxX6Zv#MgQ zP}NNg$K?x}BC|y^R_EI)GcJxsnlx@)V&q{kvFwdPTpeSp@1#YA!*lfYVV2jwjZN7* z!~*+D8l-tZz`&FUrJ$7=TS-4UqH}rQFf80LAY~EX;5HG3M>5efu{nnGtq9GK`Q9#4IU=ra_L_)1E1M=$7X#CTF~ns#WinueKAEEP++b-1ao|0v^+q3 z8t$IAi<4~XXz3?AHM%Fk31%K)As2wz9?5`W`k>cB1Z^TjrLG)Q+_%HFnR`7x!%2j-z5dk_mBOCJ> zLIK_xMRAK8O7c3)sKWluq6R5!q&Zzna_2_=OpG@$uqeNVk)z3&fHBtgJyG6v&8*FU z18Qb`X#uK9JA2_ziF?O$$VByk3;+=|k6lF2{XsX#SLaA9XiOxUO8kDq?=G@M)7ogU@MyAI-Wq zoBr}{TBx0TCgY8$nF8@l_QQw|Z*@@;tEUHj5J48?n`pAG2tmQz-{EM()vX3HvEPhkZ;rhrJ8IeTnm>a_DjCe z6&|}<3z10H&)+{LKqj1<0a7l1`1%p8XU0&$*FCiJBi_jHrxJ-lj>xZF8d=M(l~EA`AQ7N zuOo;8o`5=l%s~W;xVe3YOV#4zdAHBJF4Nxb%^i!NGU_&3b|%^*QyILNmbT7Af85>d za?vz}h;!bZB!(|7jbFv0BN^VoBy1Wq;z)a5;9{Y5zqc2+-Movj?R6g%NK$1zdbr3B zpXtWG*@nJlSE)cd8O2P@-r$VZ8E1$#VtKX= z^E|KGLBYH&`!r>n9hzq8JEURxI$j3wffiGf#eBKNe2%cq@SQ)%omXv~&8Ju51jW6v z{RFS6dFJzQZfGj@LRg?a=$O0QWwE+@+}lrHx0NDD4L^lne=8e(=aY@K(BVbC=?k!J z4@r6K@v9IALqT^Y@zA)m`>(fwHNEQMr>%`{4do7<6q5?vB4K9?Em6)RlEi8|9(q8};jD7&7Xqqfrtc;}8g- zUxf_OGnEok1R-2go)TUI5pqx8`u$_D{#;8&dzZxcq8^#%*6b_Yk|IQ zc*%5{9$@5Q$!TFgzf=^D@nh8%$6j%%=xo*%A5#KjgUtABn`!wBV_{@U)bQOdKjbGq zS-mw1e!{}My3WZ8!0M>Ba-!0D0cS8%&0^!*GzqjMv^!M`kFm!vK-YYsZPN~=kP*Zl z2AGex%h!e&+S{u-QAcQ)9NDo^EG(f^G#-TkEPi!b;w&{@`!nP{IKLE4B3O*XKXd`P zG5-CeQAZz5Q)|m(1w#|%7Tb+xxm*JjVppgtKZk`5uEIp7ad+OI>T(HTR5wXEKZs1b zMKceN`H9cR;n&$FH{pnoo9bI*#4P3qg)Ix}D8Bz+Er2Xwd(m8h> z)Ba(*dFwNJy*&9Rn>nHMi%{t6=kO|bcU#>#YW0GuPJ{<8d+&xn=dASbs+}Mi+e$e6 zSisFZ#cW>C4I|mkrA~15wcI;C?X)VN5Dfbc?7yFjYGsAh=X~J9h3ms9-oHfXOA9 zKkRWIske5_o+uq5s>W#^o_Vvx7IkN#dpYrp3TWvHY;yd_Z=?f-s-BI=Uz#bD*v3hN zaPN?|%=N1^JfqFw9~Uu#RwGU5nQDX?i{kQ31izW^+{6%#{0L0jX4_swQK@&1oXxIM zni!M-VkBRW)4Hi#y>YLrxn@HG#rNOyo=xq*6?B{2&EZ+V8=LLBWUzg^plDFf6ZEjHZ>~bT%&ChQMQP zA29!c;r_bJtH?59-$tFV@S7muP@?jYn|;F0(QCz&Jt0`6%3CH-<_{Zhk)nSsz^SO% zC11R%9QiKYA2=5suK6tYsz6f!sM9)>v#FdI?fv%(oAL(L;4Fk4nwHHNOI2`7r2p1% z!tT_|vVw9O9Lk*$dFoFTPzKpD8z0ARDU)GQ*#`m#}hpDl&D73h@By3IVO-gHlsb6!S&-ylbOeOUbiZ+Q8Vf<-4Hg5NKuj(04r)hJpVPR`!jx1S>5e&%}B5%D1A*`VTm{ zZ2732%iiq-gtbdwTKi~UOwEQ;XHA{GKSpUFfmhGk(p%=Q5tc%z4~iDRk{Ill_6wCA z4Usf(EblB6hQ;PPfs}WE>C+yq;#=mVxoT+SxN1YaD@EmxwY0Oz4&MAixyKHDFGhNN zRV2rQO>M4Cf|6et#Ws#RRaG~c#%l{HX5QDCSz(HkF}?OnicszvshzS*U}#)I4;%iiY{8EBBsAyu~SU|M>ba z^XA9V(b1Dl(~E^+lar@Qi%OL*Kohl2D}ypSYD5ZAdw15AOnR06*vu|YGqJjzi>FPN z(oIJ@Zh&0_*qt0i@i@1)q}l2In}Ioha@_Ui7@&AS`QI5U^%fx@js_R_P*MT`WZvP6 z*iv)dyWR6WEkNa&@EW1xMlJpD!6M{nsGBCe;T_8~+Yem|_EyeJU%iN}qw_*dS>ZGX zXD3U`^xUj6r~;Ol{TsmIX`h*eEm59zj2(`;EZ=TV3jiuBN8u_RbFR{m(5MPWBbX!^iUv{r=EY ztgK#QV~5>hAcIb1q+0b@9%(Ay1z#dTeHmqCq%)_=fZi+8QlzC|$Gc$VfaTh-~PycRDa)w36iP^>Uynq&!dO#%*W&hh+jA9 z=pvZ16NNpt^RH$kOKrA)3R-Ni_ImBT?AZjFfXC_KnbyI`+b+L)btJ*zc)i2!L3Y%L z!LM_*@_Dvq4GB{*BM6<#s>n>(Khz-YN|=NrVe0)Wd30y1q8iQ5fYy!5sy}3bWm_a= z2uWXn7O%bySb;|85oy|+$4zSX5up~*Nd;GFB*Pg@gx&oW>deaM+V~r4ax*zNXJ;k* z$JtAYN|`!`d&gT?-{%GcqYljWzgpXx7#u8(Oh@A2q}W>EK~-CGi%;w;*h)aMUne;u zvuk5xxt+b)0}Tis`*nNwhmG?OKgG~GqtK+UNA`r7tyHN}URKI1;moCpUdG7#+QgrF zhd-Eq4C5QWcB6Dctu_-4|3LfnA}1&3;7|((JGZ>TTxNKGkbRZEwA=-|z5j5&Rb~zs zfQ@&lW4_{@$K3Me7v7kb93Cv2e|Rz0|Kh~}-GvRld;O@(gDA-tMf}JLjTZTKe6Y@7 z@;4zMNIUpcohlT%4{4>~rlYgLYP9CLP{UTK{pz^t+|)Q$Q1OvnZCS!aJ`ZAw?{1Kjj&u_NZm4bZXxc{M zk=~`fUiF0EsNqQ|s%oBxkFp?KG;GA78pg7oyfOrUhuFx9+ej`>w6II>jN9Wb49~zqk4mOd;3YQ3Cy%mzVp~zX=gnnLZnXjBh%NLXXcvWrwoh ztZc8{8$H%orMU+&JAHs4IR`l@YY%I2D{oIb=gLDJuiId6W?Q|7fwH=~-vfW?EqS*Q z>DNC_?jiUOA!uh(vyStm_7NxVZ)7aQJ;Q!{WAbDuk)_Av3|90rl!{dL+ zd;9Wy!u1wE8D^J(9YUvm2e1L>$2!jR ze3#UP$)~qYS?#a%a*Sg?#tBMH)PK>=qSdPmaxg7K2N3x88<3pg664$OYR$f9@(hU1 z%Dd4Ar z6e;Z!;wy?gwk%J05^(KodwIYSZH%bn>~WbrnjuuMK}K8SbkHgMfFd32DA@lh{GGegT5wVyqao}b9cSmJ&K9x1%ODM${fI@2Gj(5doO02KUb}geJNNpH<(+F^4{|`lDekgu?SoAMP2H&{u3k{wA)|HY zq4&)8SBvYe_K$g@EzL+fC?sIA-*0#vnlwFW*^-eX z9+)RH;d*r$7vCFTjf*NPaFL)TFXwXS$)XLRA%6o)E`^q^vQbGLfV(=LZw(Iw`Of;vx?KcEK9cF z`E_&4BqbF=Ow+(L{DPy&^8lJwdXh~{!RUxx6-v1vq27(p@oBt4kUQv?0BWn4lz!+z zhz_L(lDFW7fOceDUh#HID>RvnDJ30kkM6|&tXnmMgT<>>TKB`CO?HRyk6AHzX-}wj4WPrZ)oTnHCRmI?ukgr*za=tDmjD;n)^>G$o}qi! zCB8E#Bi3#(syktHjr^5fZVV`|42X_O;6mddkkFgv2$DSGc7=VJmQ_Aa$UgnyVMdTB zJZwyj*5GElZeW;|wJ(lc_WZ=p);C1QLyn8%qmyF6aJeZ!q#S`6iD+;!*`%Cr{lbR1 z()!6!9`h3s1MDoX)N3-KJJ5F#RJ~L79y)61@bDvA<87mn{Isd5u-ROxLH$-^Bhp?n zp*%mU4qBq0*QLJ4y+DQZdFzE`G48wl}T@MnypD|_gDu1a?=3oRUG}aK zSZML?YO&-5-FD!eWRF?fG;R)9$~Tob_O_v%pq)kQf`qDB=ZyW|5OR4Sj&nt}P;BC8 zV%R>?Tu?mimWyMvf2QN0$jd>weCG|hYtkq)>Npg-S*)u*OU>-C6(?ZzY=&rs_c;*J z%gFPUDmGq|QZzO%)Kn-)jJZt?&qQ4bD*TRvEL5?y`oA)#TGDQ&NkEvW6>16A5K|oQ zL|E)F+U$~kvK#nK<$xMYWcun1VWOwuzgZ$LQi!V*Ip-is_WiT% zhZf2E-zaJ1q2vtA~IY~N_9uVS*b~l~b{++XFtKH{4N)8xj#8PNw7ga&lo-b(Ts!`fX-f zz#F6zThia!zSffWWWg^O$_G)ehI&mjep?#=j9_4s2^zK+sZCfjeA$p_A_mOWPD!Hp zm}~7Dn@SXr%6IL#uBSkJB{A88`W-wS(|8dAkmGfi8vtref&y~p_&rv3(NF&ZtA)_g zp|k5Y86Dl$M$}7Vf2jzybH1irfXu~x_65il7~bTO{HD^OkxyoE`YQ3BZGb9YduQMn z@&Y&JW4wUbwC2U9BT`zy%64ziNEmK1tNcY(_)xml`@fqbs2jUKYF>x@y|6n>lzJsJ zY}7+L7tES|=a4A@iP4H{c4;`YQg0S^el@9AmRBr2&6|A@OBl2%OTuk)(s(R*tWAYn z)VDg1u=#3~7}J&l2cJ{U$6)pGgn|aRxIHYUCtM6Ji>NhGYuck1T$-7vzz!EMrEgfX zH(pr2hZU*Vy&yZ7zul`|YT~#kaVbge!NPd6Xwa)UA7oWqv~jqtl3jF6W;`#PV5y|U zuhJIl(o6B9H@QjsP3DDzpZwFXCC}{C+=MSfnaV9!?6^ktj>OF?FFb?_-7IhrRo`3j znP#*}n;}Z3J|V+3Z*E#R8&Ltgz$ulB`=j277#m1)PV#PKI(h)pT0MCFy2b1Do1(Y0 z<%m_ws30w=C1V%RPwDX;hPjQO@4i!ou@({f({z6I(_a0gG z6ui3r{_u!lt4bT&2t?((T%lLFpfBP!8BZx!wkkql#WSC%v_S70$NxU|(mkMVe8U%1 z>%*j$;r}xk)jzlxfRUr2e9(dC}3p_=9K4U6#9S_)$$v%yOe zv!X8ra1t~byv^*|jxqZC=k3?b`!Z7bZ5rh$XgklZ2-wh za}24UEH*=qd#%UzAH0=KE$rQi{M#2fz6&rng{AY3?prL1r%8cZIC7UJl5nw`Gf_qi zF=D+Bthfd{xklv<-lvt>*qFd_Yo)NbIlQM`l! zOm}R_Z%vnKUFfO>N6^t5Dx#GwCzhH?L7Kv<_`-S26Gfw3!osPwqP&QMgp0{9H)hYu zaov6~a*kW+CEhzzgMJ|%hG=f5->|OIV7eNI`7MDF+`R*^m4r~EkyGP(r-Epz^&FFu z9OFK%4bwV9lYq2{?`iXhjz!}{Yoo&|G9?W8x6gC3ydsdxw;1~Buz-@#I6~LN-d(IX zm-jgTh12j>TFDAs%xi58c6I$uA+&Z=(1_;Y!q6E;*DKa>I<5J4kLy|E7Jq4aw!k-R znC31DxgFz`W^Vi-rq}DVJDw{;U@nY0$Q!NmmK&*N;4DP!K%%_Z>ch0H%u~mH{7RV2 zjZC>-9=LyMqFuO*-^}l{+)eH|j+9q7*ZcLnJfqJRGzoC158takvq~mC7`0{fVA0)h zEjFxf%G1xJOO?mcCrpN7k1xu&${#;mTECM&D&0uu1#N$_K*VVVjtQ{DfZ~Yh8I?2mll7>@_BWY$D@&9_wA{4Bz*lp|1GiG70VqC2BIBK$e4TpVMxSUfZ|11EZVV z-y{W!&;?d{9_7?730A`Rgd_zMJ~pMW8l8U+m4Vzx77L#Z{lZ!k>CaL3TJt_-RY<>R zHoBW0a&T%qt8Nl8>T-pTuxwLqE?%`$TSKUs6jkg~`pjmK($`+-XlP~)or7`jyx}Z} zKVczqFO~ae4_{DDnsj3p=>3u)n`ec7TS-9u(>8wmm%kUBZW<>d*7yYz(UaV;J$5!L z-Tor1ydZ6?J39+Wx{+lsVIiRt@g351SzcZ#Cm13`@h7(|@c%^mPR=BG^i`;w+;JYd zj@vM=ns!`85yni>s$6oMsT!E1T#MnT`ikE3CUQ{*QkA0STA_cuKGFQPv0f6M-${H< z#`A6Ub|OI$rR^NKgg^gX<4(1+x{Q6W+Sgm;xu>|H)0VD@vL8NCykNP?fbx^N$W|r9 zT-#6X!f`Ml26YS{=@I_ojjoTrTxYq#vB*qxNc-X&4%LlX$^#b#@!U`lLOV?Js>D z1%aFUTZIf9KhUePvbseHh;9Iq0M9M za~hr2P2#yA=CG2iw&C}5H<9vO)gw<7t1F_-%-NbkdycRrC4Xptj)Q#k0Ab3I3-d6+*B*`F(^>`6(;QoBXFORUj0`l9>8E7al`*I4C zqpx*T-)25~>F$iR{b)2jU|^JsTS)j=w<$Kf$dg-to5zdiGrHr~3)Yu~a@t!dKcv%uNV^hphIpi)7shIfJUuH=KLAal^^(k0X4O%XF*b|leW zf}C&hVBvrcZ=&oheX!>gKISf)8`wmAd>_&18w?fZe1HXEU(h4V8Oy_K$4k7?zG^Q{ zfI318Iti>x6RTzxptcX$5gWEhxNh!#*)l8jN7pX}35hidz3BN*B;x zpOSdOnsyF_EE3MWDF3{Pc{4k9>&xJq8QL3S5uK^)VkOc2Gg+2?H89@MDu_`jev#`< zLdFY+spLmIz!$h_l?Q(v$;89~*C5=wVe8wlTIds*jO!NHTFzz?iq=S#>LM$ z^fYbbBcCI5#dP{-MqvXg{S>lXoUMb>%COuY_mP`E7{n^oy@t^!bsDvP>q;szIrULd zY9E??aLv;54dJ-Bn-&NnMJ+8eTNAQ4c?tZg8OR&A%d_U9MZ6Ja%iqIs!jhm^p4bMCm2TIKWv2qQAQ4S97Vpv+XC&?umVq8|b zWQpS=jO8|ZpNLoOPq+tm$}+Q-^`>4#tX?N-a>ykM~HIJ39uXU2AMaENJ4-rKm&^X$} z$I#a^om!*oJXe&-)Bd@pnFt5b_D($xPimO{YQz-B$vZjy2NbK3SM&NB3N6x{&5CQA z3Vfr5Fy{^MrJJ8ggj(*A>MCpOel<$`GL#lCLn0Uaw=#o^V=XFAe38KDebM9(d&HF# z&Z(~d@H6G0(|Faq%C05Y=n%U)q64gy)QyU+_e*`lEK7*xu6K-&@@L#^x|ZHHe)UV~sAuG8#MQ{x zvdE6D7sFJJ3=h-87mx90_iq%N0^c;s(bF}6Vx$p<)qRCTK20ctKf))l83Ql0qBFCB z3+1@F-@LD)8jD9k2SvM#J#_WBm@gC2HKcJB59JTI>pfK6j`G@O^buZFy1Tl6qu zimh~Zbp~uVU$Cyx17c&kqrV+nYTdd^7r9P;$ebjp{Q3w~vJo_0_b)|UeaiTe<{YT% zV_%u(J~2>ltNwOM(&r|+G0-f7KEZaHStO0VSW6Y?@T?WGAs&oMFlCT_89j+QiJ4?j zukB=lQXCG5qj?toh_lwI%!OcN$wT>EdiP^}Db^fxu%o2#2v7!%AG>jO^+UDlDXO|=S z5utZQN4bf65YGd#1Q}(5sgoC#tYpvZF*fmH@<5~DihI8QLRX0@Aq|=1*XGy5^Cs8h z%f)y3*AIXHBaQr@iJbqpi@ieihDa2m+-0?mTrnnLeLLa9s~F?}Ai*i8M9@^@Mss$jKn9wIu=W%@>~332GN!RPV|_&Od!U#QP)Jzh6B}A9;P0luc5N zgh8{ircVFBpxKWws71bkVY)}KN)f-EEC$P^{$SL!Y*%|ZTDuaP-ePU)c0>fRk?VS) zsZGh|;0`thLma&tQwHZZoytWbH{*)RKUnY~@Xuw^zgoiCHYDhIl)egoV74eb$=G?Wm5ivXXq$SSwlT2Ep^1t z&oD1C+%vhbb+;2ttr+xY(DWXm4T)TN0G1x)4Kz`^D)So%jNuz1qW@q-whH$mt z$D7A1YFSdwT(AC2r#y0MiZq4y9E+ElJZ`RQ`RlRs2vJnwC`&c=Yqh?rUuCte&8x;> zywy-TH`lDF4VJ&>R}px>*BT@8k=}&WoYDtrYlK)78ihYmDILXh4oCu58=9OKC`rNp z$lo75&>oT_;a#ZSS=IhBp4yg$5uFKYsH$hqdc2QKa4-B-ybMUoo$eT;&;3cs^cYiPe*l|@QpMMcFYxlp}u$O#yj0{;b^dj5eO_1@`qc6E#SxwzJ#d5ggaWwft$ z+^LpNT;}mdKX6h;D=M|)$o=sYxW)Pxf)yAd6CCu3?ThE(`ih7cUUJD>@q$aHM-e?A zH_Q8XGM{GpY-~2GD#n!m76|Jmr~n?I3jM&iSLCZnOz~Es$HBDb7P4)zj%Ste5;0hbn!CU0yU&od4Vc4IM=?F3EV>?jA~9gid{%#S3v z{X|3ztlDw|B=hY=o#ua-5BD~YVr`^5Kwx;!VJXL$Dx1DhmP;&=R<0&Z)`yD0Yd*aw zDpp|+HqnSPvMw@&j|;R2+8OeZBO!`x(|mO~CMLne)GRsrb$0rOcK3=Xcbr6K*3Da9 z=3{y-I{L-A`9)3^PR8jLfe!-XlT^%gpxIMWKdN!0T>l6i{r((v+u~Y^yH?&e zzD^UXx3@W>I2Jv)C&hjALx1-efSrA4fLC56L#ZuE7olEPU+;?cY~w?A4R6O-6iR88 zz0bsMpf*^>k5*j2COfYvGrc}PU+*hX%<6|{+}y60s_bj%Lda`=Z>IS(hb~R8o4AThlcIKdsb6!V1ci1hp_Yms)BnP8-(Wa-t1; zXGFFIX4NG=lZp7k!?7W*DQ1HI25!{#tiGOCJmZ5ekFzgzW(Kf~YY<39*Ne>75;w=& z{STS`)IB69Hr83(z`wfDH$Jd3LC}lh{upoX#Jv-_H9fyLIXw!I8)WP=byjAg9-oZm(7exoA0#s2}i@+z{-Xqth3s!81toaI7H~^VgTPxOu zWt(d2MwRG1F0D)6Kg#_xcz*2G7MHkzw6w*0N?mQrV;5v_%H#jPJ%XP1e_w6u{X@_B z{(#K${7=FDe=rJ&h>6?V+TP#)6c!Od#smHb3VL{T+t=5Z*PMd1-KeYM`M10H@lyXi zy3e21{`G%`I`seXcl~ryi|c%jj%mzs)VYD}K2gl5TT7X$iWJjVT~}H&fE%t=j`Yk6 zdeAY@(GM@uso-ismYxJO7XzWjXtvz`LBFTo;=bRN&^9TpS>>EYnW`FGxEadko-*Ay zy|N%fJX(5>so)b4y-o&FFg;*YqMI-f0KQx>zCj{@dTZNlC_9w&&sNLcBJ~E78}&@l zRsQ{Y!Yz5D0w=IbmUQTBcToO4sjj?*wxnH(oz>szc^b`#mSPna63&6RY%K=C6UV1>)QJhMVd)t^|)CziGcX`FZxH*qT9m9 zVzwn6H(xy(#d?lwY|ZA=ddmd=-IA1V_Tf&}uvats689q7mkRICutpLh_QoruYK zv0hExGeKs5Qy9%U$=NHWIa37(C76Js!}rEA9kK~ z5|-gTTx7$kznn2QW;en~8E&cra;VocUs6n29d{ZBepBNUfb9PKMQ?wU&Uq6fuW=$X z+APE090flT4kepMvrvpPUd{8&-fhVX_m)KOHW_LA{u=3kK#%RZ6trLE2Cez1_|h$k zF#QI-TRi?H^rTU1-qdsjEmvOcIl`2v9|Wne97szFI77}KPO4+tfw#{Omym+plyXax z*XD6dI(0pLPTb}s47#ffUvI8Qi5t!Ag>tMO0&z~aMs%n$=EA^^NX%KdS5?h7RAc>@ z3Jp`xcqgG887H#Re&17|AMJSQ!uz|zCwrsGM(kZKj<*^~ND8haZjaDeVj#`EH3 zhxdGEawMy14T}vfmc)z$FZIc?vhI6Vs}Sy))Lmah<`T2n&2G%j>^nDVsscdJ$ zX2q(s>PeNicbgMI@ZkwujrCYxD29?~wYls9yg-nR}N*!0fd~4mw^HT zPCd>x3$-MRau}O)M@kd00%|XyY(KX;%1+zy-g=)Y}g(Q0Z&aifE-z26}Y;e zXi#EdesWUn{GEC(b_e@Y6?`w3#_Bg@4n!fb<$>|~-!v<_cn34yukc4Rn=;~7_k48| zv1Yq4Q7uf5^OaCfD-W*=j7L!hxn&D*sv{;aJct1_mXvM>pY-v>N~PC|_v0lpt`i|< z6jr`EDMg~>0cu6zai{ag6|by4WNb~fbaW1?Zn)lb&ewmPj-62RF@z1!2VQulXS|M* zuuU0L*XivOjMIHTJNem}*_sdbcSu(csL^KABBLnB1g8i0oI+fKiwh89<-;3Gel-*K zYQm|YW-%*%IBN0Q)rELFe*H!D?AJ`0;?ptZPfFI?%G%V9G$Pdt$TDdleEdo6q+9S` zf02QuM1@o`mVPT!RRV2XXBSyYhqCDDiJb8G=!b8LJ`w7Zs6jU@QwvPhhHVZjK7o$H z@Suzb72hmfQ`q_%hL_axEe9Mm>mg#n#73iSj68rb2V^+ z!?2DxSin|u#`Up(2U=i$8>>1Ed;wxrRAo1u9KYf*YX-9S=Ds$*s(Y!kK`^Y>B$H>A zs!6{mD;S(x2gFlov2&+b3O`j+FWz~3M*(F64-@k^Ei53Ta+AEurQo@t;Q<_|zWa+q zSzRV9iqK*ps7#bIhEnI#7K;)KHa$Q}#qEZgwYiCQajK<*LSXEqyfmkL(o=?h2PX8M(?rPX@Ojq!I&7w=PWcAj#`J-`6&vB6 zGE8DrCkmuyxpQ;FhWvBSfDC!ja;{lB<+rhKB6wX2v3%WJ^mB*T(qr~%jWIjFg^VWX z(vM{iqHx`u$TFC1PWc!a{5%*?9f<|ZXA-4A3A{FSNAbUhY;H~N=eeJ{^?$54_!70p zDjN6_T58qX@xxnkp;ER`vMg>f`BXWU*|P1qYZS(8sYdIpGTM1Uz1_;;iU?M&OC=JW z{`A#Ejny{UMyr&4O5gt__tm)S*{rMZHKbnO9-uL1yO=tk_wz2oC`+%}T9%nQ!>h~| z`VhegD$k#SaHe2TP;zFDvro@2a2lnwwfV52g+R?-pCA@>U1F=;;jNpc=zduj8X#3? zjG+}o^=Tbt*3k5~g|Y74^Y74a?OmY>EEkFYz|-lbOi-3I0*bqk_tM(rds`zOX{JUk zFNHbi(Uc0t5#Clcg)Rdl;YC2B$0Vg-?;`Ajf1dm-u&8S!1MflWte;8Z+=VAfp`3lFmWKU<= z^4p&3wT-%SQbGN;#H6q?HW4)}D%=YJhl#Wp600{!YlZGbG>9x_oB7@3A+#DT*`0Ts zCS7fWhBvRqc05$frTkZZ+u{$zv6to#{Hk^u#ZvIhn6u@@%@8k?&4oY9A>R?@2}|NL z-c1=2Rb8aY7d}{xhopA_5(SNW{Lgd|t2Zo9wk5XG3yB#ZvNcDfDwb95mR>nb1 zXAm4+;{2DBsL%)-A!{E;`oJaJg;cz7IDcS?RVe;t{MCZe%1jv|-de;{js3ov5({@RP>2QuSu2fNiFDp>)1Y zh07^_ID$j}xB#aS9U(v+EyC{8NXp_~V|?B0OoA)}E*~H>`et#8`CL~%mmTFgSeu`& zE}j}E^L7rZ&xX4@%*H}3-Oa7lu27h4Ha!By&DTVEe6=;%avmxe@DkhLf{=jG+ufTdfAzF-`k1TL;l7xo<`h?WfNBNO%2j6#m(6V)qahZ4 zh|EHfd1IEX+qR{BSW_UlC!1Dv_f{wg|6s~;=NV()*5BcAuXJQGW0Pny!sIw~)M||l zE|BgF&!z=ZyiR47hRM+xcuR!!TRJL>7n^{bCwQT98I#`fNp7dR9*TlL(#oQHe!FC2 zdSkq(aS@n37TvB9a+k@SdTU;GW-X~K)v?zuQLHD(Tgp50O=R$VBQDHT7%dKx*M!rZ z{d>i20#T{6Z+kFr`8zIVtxewOZ~#wmSCdA@@5SIN{r)!_XHJ3?Wt&o~b0Pa-=f9Z@ zttq{#&wj;w%Em}ckjK)pAG@7-e>WxVrA;_x4O(Mxm0Jkc1D3dn$AmBO8=yPKs9_OR zuBN0PVeqJYoUJg0rP+JGbQr?nj5Ts~na?R@(asataxoPy(qhgv$VY(I(l+|^N*y`k`eC-=|=Cd&7e@wQ=>=yE9mrQLjFoygHJCQ{_MT?e&fSGBT<7_+!P5EW z(|o4Rtlw8&{Dww6wM43@wOqe#n7wD)3$>_M8&K@G}WVsn;HoHtCP&m#yq0Eu+&$visek{QKVPF-p+1pONdy0Lb&MfIPS9qbSAdvJg219MWpyH)sZ1JwGHDb&yu&J_D zl91JC^Vs7C8_MIRxdf1^kjvw1%SnC{2NqJ};y6R>P=gP+Z$OG-V|7eMH@vnyb4fZ2 z_5(JB9ZQ?}w|mO2fUB9Gx`-oRx(KxggPivbLe+=$I%p7X*Ui;R|63EqlT~*-`RuFs zWx|DC|4zZp@hUrY6ka%HQWc_U6oW?~1iLUD%zBjoF&dR}(>2^Jqw|_Xy0v(W{j8xc znnmZqalEmCH|d2Y)f{OL!nPr%?`_{QHK3R|oZJ+72qxb0qgkM4FD*=abcBLIT5wgz z3^x6_jz>d|&?!XIpmvkXLu5V{JuNmi*~<`0=YGii~zr+m#atGDm~wWvn55uc}5c&OzAOP_@MX@0tHe)KtI6 z!nM47YI)_{U6IFzo<=O=_UGt@s#F4HK~}Y*rEK@J7mvLEre}V|Mmi+gOc1UQg4II3 z<$Ynj=?`~DfkleP1yXtV&*N)tFNEZ$x&tJ-0{rdRkCt7D6!o*pr+ z{$>2KE1No3{*ud`Y$4PwN-XVAKQM4r{N|9TUe?KyA6^KK(*J$AbR>w4d<($Lz8#+z zFq&qqZy8x$ezm4m|2!PB5p4xB#th&7?m2aqo(YON<&ORg$ZMHgj0fmcVrf z{Gi%Q)=`TkS0VdJ`WxT#U0$bL5rf(jq-<3wXj3_pBj!2ca!7FhQbjmR@AlIDYfbc_ zV&~bJ6i`%vMRTRKGvZx_Sv2|Nz32SRZ z-rALb?7k$oSI00)-W@czfbo`PO&%RlMiS9#Q6{47F-sk7u9T^QWN8^?le702#jc|) zHai(M$NBq_8$QK^9~h@>x5|JrXpTEI+b!Ad8^uokp}ID;jEqr7f*-eGxd&f-aPDp} z<5LK}ytM}X{Pjd0k^E3$uz%-EX2iWRJ)oXqY20Y#KM<(Ay*cce(mnoxwf}wskR;i? z^5VtGxy}pFST;f9zLqc^4>r~M+)Y<8m}z_5?J|$uvJR(gB`*+>bSJvK7B?cq_#1Jo z?Hn2cZE#)*#$kP$#YICv`@q_GQG(M}I^)K8vqmRu&uBxsHJRyUXLSwU;j!|uS10TY zj1%iQmcTllf66A+j7fjA2u4R3M=M!e!alxl=BQ=`7xKkb026c{w%dMqm>kF}U@QqB z=_{9Upc6D*3AnfsC5YtxAE?+H^}prsBtnvzeTP~Tn22KF5?0WW-0l{| z7b4e~zmkpdl|}s0B;2w`)0s`HSsPvJ68a+Vle!0AonO~Vn1l~o^VsB~y;y3|cUqYn zmWOcTJw*1)NL>IG5R!NO1q!(QQw?T0QqzLQTO~LV2ysYV`lxo?r}XY@7Sfti)W-G7 z!gK`od|kOK`D?pg-y;yd-}6A7NSAIv4b$iB!m6Jyf_Q(1O~hg5Nq{4h5FP<3!%10Q6<@#OfC(>8 z)c&{$&okfwJ5#T%n=-%;EW`~rHydPZY$&h7Lxp5=l3Mh?ATB0~R%atx)Qr5wFG(W7 zfG`*N)0=UWFtA8jx$k{3U`q9y4oBKzl*FE+5}iZZ0Q(s18?k2Q*BvZ$d6QkAfj}4q z>&KSyaaHH!T-MIdKrvV=;A2bc0LLv%>%HhUh5>Mio{p|Li18J~lN!*~-7=je{kimo z!5O9;8w1g6FRQ|zownL3Kog&BOUuS|HASV$az{2+l}fDFLm`fz6oHk+**V+0@ASQ- zO}MFK^(2&O^l2^7K^!cO7;8rw0w&uQ_%JOlhoLos#la2~mGqr?XH*M5RkL=<9=Dzj2C&9pLS?rmB*Qxh}9 zEx7l}kvmGmnWM~sGc`vbTDb?#kjflrfZNO@M}ns2LU^g(<9NTn|G<6U*Z6WB=kK~t zyh1qgt3}PIy5spxnW*cMIaRaKZ9MMaESly4Ao49lOacjZyctk&LUjWbs zj)`E2D9qKttnCm>7c0Cy4EOKB{Zbs=O6$%%v$4qp_<8w(WUq}}#s4DPO5n>&h==%Qs3Wso`r&y6fXKF$Ps`GnuN`PFE?sv4XU#UEL0S5S z)U(D}{8Wr!p-c=y-(ad{KO=Wl`F?dSIwwIBqlL`R4+sDvefGV#1iB@a@ptOEc_28p ziF2bNW;5|9X-;(5)>niK^3{7oC{FEFAt3o%{Iw|5r(=g#P5*=%{0siah0e3!(Jlb1@nu@VavEvL4lv?A&W$L9JwnIBk zr!Fm=A|nGAb0K|hORF|y!kb`ShqNCt=QPrE?i&JGdc&XMB5ew^_L!`fJnhilS?S8G zMai$MER6RP8l|e(zar)N4g6l^76d0@zBN$a9~TrhFNx;Ky4vy7MB0>nggBb=k)Poo z7iVK+fifvJ78`U=j?yFxxcA~erfwXD{uD%1<`S?`0(KE&p4O%v$*FVCg{4LSD(^@4c?I1|_4NVAMuR~!+$@DoGsa4(@|Bw=T{k)zp z-srX1XRAa?QI3&AY-9rB>CL;wuEs7RGjCS7U7rG}Z0+6H$?0C~4w-w?jSc;BtP~4Z z=_41u>N#MVE`Bjh`U!r#uA5|%A~92OcmFfSXW&4$q?i0ow@aeg2@~R_1G^X=Xch;WFUu?(Vf7s3(6Whtglz~8EtCc5|)Zczh z0EcOtpQ1nm08r{zD;J@;(aG+%T998!-%#}zmG#RZ%MW8%*V)zuP2(`y)6>&2M|H>a zyGRV9FC<)I)M)hDq97oPzWo4JDRrIDS462a3X0GdTkUg1FizYzadR@#x@HTl1 z=p9aOxAxL^0C5rS6ao-GOBlx$m@(O)m^1WNrs!sknL*6GRJ8eoMo6X0EznJ!)mpP< z13@yVE59sG(;u%j0#G1$7|ZNOVHICothabxryg^uE=7hf`yA92(Od z@X5bCDN6XYq$-`U$tF<_?Y;jhr2oHDF_f!^WHvnjJMniF^$2}OT_`;x!`#WqX@n%D zu0Gz^SB^xQOfSqa7uBJ15RjvHWKqj+P4x)OH!LiSg@uKQNo>6%C1YLSiHZDY&n89F zqM1`@Y_{03SD4rXtL<1jF>8lyRz(nq>s)n$Py$9P-o7L^KVP!=50C=`ZEtUjii-NF zwr}`i7lX^o%elC?u-bHOra+vYhbK47PQMNf38}YijreJ+%i7-5(vfW180<43^-%%| z=UG}@p@2vx9Orxy6Nm?t00o0ITHCi+t?(kNFiDg*vbOHzSZ9YXsk8g>mW+qLGzJJV z4)9Kn_ybq0hvReVY-FtZ*v!n*Vt`5|Q!=! z#?3n8W=Yx{tX*V=PF2Ou2Qj%6ST$tzD{s}il_uTH{Y#E&Y6a2z7Oek3Y75#*?IOJ& zy(z979po}kE91O)dq-A#m$tUhCmvXFIf35bzlrDf!0Qmd6N)edxqykcQ?n#$Pladb zl~k43Iv?Q?;+5ZdruoyZK=C)L^K2Ic9hc64m-HBcQ!ooSUBO@x+;~BW?+~`VeS%et zkZilS#TfN%Bru>`Pge5Vr0_6;%61orcL@rOs;fqx;n(^7+kpKi&qRp6qWvT%t4>{` z&=VP|-8;TUPR`hdG)qC&s|vNM)RMW*D1wya^v@06Gf@g!+x4@{SUx)+pvGS_5mB=} zpbs^4$yT;)XGXx*LsL$VGotLu?{a>jE~xFL4Ez5|l`Vu#M-zGKT5%my^n%E7-(}mb zZ$E;W#xed1C)*{(+G)@4e%3qGCyme;q#+Ew0i4Jp#PC#BFkCpTa^>9IZvQ7(civTq z>RD%*A<1whoJjoWy@{4%$JPK9i%sZICu(rj=s)nW=xCF`Er>+L+H$sV$z7WkKa;p7BpKH}KKp)6x#)#U zYk!GJ-z zAqvMX+K65B@hM$avLDo#_hb^Pxh`3jH+gdv9jJd{HnV62#amRM@G=2Xreqlr80b9H z*fJj{8wbgU+>`a4=8#(9rs$#@(|jg$gKz2IzdkmMYAP%~pO=V0fW?oy-Bo}SFM&1P zOxR*duLGW;9H+F}pO*LccItkYnHQsE=ROBpS!c;pZiJu7H-M3)#NkZmy9)a%9a8hNygj_qSR z$)n4R=8mYwl=X-PmETkZHG2qr2BkXi!(uky9irT>Ayp4*mFNKxWsr*w=2dDiirrOT z5IGPG-bR|(^PYy6yE-s}EO$Vp$rqWA7sSvhYz}6JN8a#HtiqgWod!MGHs5^02Lq*Q zpP!YRDi~kMarWmPKE(-#>Vzc4!XYfLB)k<7x5jK>A$nZbfz&DVH>;qGArCLj)q9yQ z$8v#gip!Q4i=%s-qy)^#vo1WF0U8%K&Su~0>zVN{kv^5oO0*X^pL2)8{yUIUQu3Y$ zoSNSU>mJuZd2hI2tP4|7q+0eDZ`td2b`Pbqdp1o=OguLZ{wbX*l1}qe@%^ZLvGIA6 zq*lpFbYub#q9XE^-q>=ohIC;Rtt$C?V0^|78^>(Tc5=4^?qZ&hSzmX;$E8PI7HZ9L zxzZj3?W83c-m0?sAi5E=*K|)ePGjtQ994xM=>O>v_@X6LYyt0{cCc!=$G?-KBk{Cz zqhh^Waf0ygUh{4Egz&?fj~P9Nufpc`V$YLBKWO%c%?xjw6p6paOexl^70Fj0pEdJ* zo!+<+Gh|0-C*suT3f?so@EZd+E^96{LH@?IFFww@6Q4W|k0^A_KSQgdqAUl6%&yPn zwZq`UY-RsEAFSNrZvOL{>h;1E=_AfrCf|_WH=Opr5gVL706is^su!q*@4Gzi09%~Q zu@`4=Bwbb1(?|HRRCy+vthIje{wav=l8gG3^^v=rNDiQY{{snWiK2yjti5d1 ze{Wy7CJQ)up+j6=4}WmhfmOPB_)d`gO@nzS)$^$!9-BRZaiO6L?t(=+(|vIR_1>K6 z!rH>jmO1t3+%^$j2z>$)TcRXU%})*8a)1=dLU4K^Gx MHUR3^>N>^!2dnbo@c;k- diff --git a/bcs/support/images/pc_customer_m365bpreview_suspend_confirm.png b/bcs/support/images/pc_customer_m365bpreview_suspend_confirm.png deleted file mode 100644 index f44337889b9723d99396a9277dd36b975b2f4318..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 48298 zcmb4qbyQo;7H^Hx(gH17yv3as2o!H|_uvV|B{&3vx3m-pR@~i#yF+nzf`=4$XmIE8 z-Fx4C_un^XopokrjqH79&bIlTAXQ}{Bu8CG^c?*c+ey! zC;3?u2Hr(s!6>v__#6(J-7xw#r1QCQgD>9&2;lPY2;zNzjF&)W9Fkx*z}@$DU~q6y z@zHnFKKcO?Zwq<`rADi1+li^YTVG_l|IR)bd?A(t z%VlBQd-(5)uW4}tT|BlN8~`&0Vkop|$2O6?U%r2vTu+bOT0URmXrKd4YHP~@1pooi z;v9w8Cg<0QiQ90TLjoN6esVGOzzJ1tpysR606)J9L_-zPf96^L!iiDT0BLx345N~? z*|mEzXDAXA6X%3n5A>Q16r4|{OnUH&KqVOer2~9<5w_a2!(e#uGY3&bR=JL{S~6J< zF96^YTO{hW-HwFt+ZnXF?r(D95=&LzRWZ)Z&21xC;qnOkk!_(-O|4(kIyFnjIfc`u zhOMqA{kMA%0AM|SbQC9_g_Tu2_3^)G`qMf~xt#FxlD0ZWI)TIN_9v^8lRbIvWb|6> zf%oW~hVw~!>~=|G`Rm&NZB~{b!k??GowcPBUX3ck&mvCY-u1F`TpVg~pdyo9#g{zO z)9Pw^H9MUr`Wr61n&^-cL{Xj5SqEZ!{DFl6o2Q$T>+9jIF#=*Uxlf*+()Q_(fM#nP z*kPzfFC7`Bi=jWIZ_Wn%@4)Fr^tBfupNUuif}K6X-BT$112Z=b84X{u3An;V(-M#{%6Y`T4BAFs|cgwaN}$D=hZ*l{mHXl1e(wTPJNlEu8Rjb zQVX~MA*Cs~t5o`VCHbs!BIFgpz?V&xdGWY$_&fb9>1Ejk85udnIR%+TMVW})jEs!j z+%O!ZW;9VuG;*@s4%78Z9$~$0nU8=8bJ*JALIIQh@X5(h&BSE^X1R@YL}qqTW4X?D$$0BXt{y% zbNxV=qvh*<>zQq5ZWyb;nL+N zTGyN`s|ISQX==9T`c}fK9?8Sm@D~S|2l-m-6r?_%PN;~*09AEsjQ#QE-c(uI)L60s z%WXf)s7WZvslB#sG-b-q&$qH>w&WZO#|vI4%|iSzXIoU5A($*zkS-T43RhMg&nb!T#Pxpvn2rw}D>zEqdt5pQN)-n+y*@;s;ljA698ruH`Ey^P)q zT7B5Gf9Tl(+gKvuXDrM|_#(%~x?9G6rM}-j5H>6mNcX;2sd;Fk&jwbgN<`Qj+J-ia zK1Co*4jvsOG0r(}&v=slvxqGMn)q>EFg710sneX5~%&i#$);emoNv6`q`Moli8|7^32^1vwfmnTK<-gPDDg z*MrLf^G8*^G~>^@Bq-L_h^k`k_#98@egqJ9G^rdIo^3tqLNOgYc}?3PE|JwPL2Ynu zv(!#JZFoNIf=3jY>5W2(M;>mID?D!l^Q)AIf5R$%3%5wZ6CQ$}EHrCs=_+ZsmK%RD z&b(RKqZ#0+znqMC^_p7x?d80vPGP-{-E0_BO)A$AsJ-25k7_qd{Yby?u>E>ZrC9Lq z--7QQ8a(LHzk!=?v7<{aKGvLS=ypA>9W<~pX!4fuq73Cr zM~G-mBULq#r+Um_B--CyI1w>?>-Koa8@iHzO`GD^oU2r#s&x*jd=>?><& zae>;!JC-vaj~wV{wXCLB`szV6G}K|E-*;q4eGpDvqnyI5w6u)dIb#5*yZatMf6u_i z21WVz{8wXMj{XfQ9SN?0PPa{La3+g3U^AGwFct(Gy(2ecg+et)z%6!1>&S-0W%f&R zX4hrX28sHveMs0QvEcW;=1xGTtuI~vvk)hoVFEn-5$I++7O$sxNV8JKvrI@ z5=YY)GU>kNjm&JiCX*nH>d7OH(FCiUUp%u+nS{pL&3bR{)*t2J?@x}YsuSkfJ;9B$ ziB3dpBTgvzN+!BmR(|d0a_#j^XJsn)*`T>>ZIy@_+>40=hLal|Zg4Lwrg-Wp=f-|oOZalP+*0n4clvvTUog2kTy=W0@&76;5 z=^IFCx#=9bO@&83LgdS@AA3ZOh-ERPO-F`1^)aWvap z$vhnoV$B9(X_~Dgl8C*(q;#7F_e!c{#Rw|kQ;L>DQIXIq``oqM1))~AiwcH$6=B5z z`9@#Mu4RTsaM#AHp+JMC5_E-X;8$Q=(lonai>7{semTtbuda0T(bF#cyAuqPb<4elH8^{_r_?;1!E@5@l;cd4#EL%9qpzCagbxGcbhg;kx-CTrH% zwAdqdsd3GQ*7BmF2uf@KoGadsze-==g;`j)a64&NBYbyj(iDu`fVnV|qXQ`?+C4ehZ{Ck81D3UQ_G zucBl2Y?{<{<$w~-_4^29VO#;i7>#Yog#@+QRsT$6J;e$bjs!ra*+H4#wd5@d@B~lF z`>Lx|i*+>gEoS=x3V_Mu(3Hc8o7mz}2BO$EXt4kQk7as}tdU9ZUEX))*TgYqh0``V zt*$}CqLG{PIi}!kSrr!eEP5g8T`snfY})x5A6v~)>Pkfgno?4> z3HymBJ5zyY1XDzXjULSPLW#pyQTz4G3biK<)3OD_(zj`uht`TV)cf=J0wfc^O8z@t_@#^C1UeVza16@ei zLG^ak``lGbnm{0+TD!!sQMzf&Qkxyr>@fs4+dO!z-+J~8k^!!nd!{n{8*8Q!E0WL) z&rZ!CJHN%6s%AqBI0axLi3+vbVP?yC?B`mUcsX9Z!&jnP|8ft~w=XU8a2{j12AwW3 ztQ1!QlBIMq*O%(G`XITffHoSVHAOnDJ~sp|PqR!4imOexa8MkcCJG9M3&OcY*Hq}u zds*`JPS9E&XW%SFsk9XL(Df9rE$cLO@eHi)I>%DfpO`ANNcKMRPDqI z`7~RDtV*xGb`{ZjlZ~Xf-3H?>Cy*^J@h-vJ>KryzB!t6NBo)yx97()0RXR2{t_qY$ zJDg*iDjEZo6lZ39fArf7GIGug0hsw8oE8+ntCdCl=Kgp*_I-kMUuRw?Ay`*eA1%;| z9v$=lQk;iizT1m^KMgadlxXqX|ND5_@@~Uojf6{87fQ>@veceoyT4ku(-WIt(v(I( zUI8)+5)egQTz*p_?az#dt4}-%jWM@c`+OG8p;z}w%cojfvZ7;cD2-kH6LEoma5T-+ z&Q{(g*t$FOMa-LKHAmd_Ro60b|UfDCC6DimEv7geXkdYMM-qMQjUS5$F z&}o*hm7&Kvg>lAFS1<+tu8)p-w9(mdY#ZTGel$DH%7C6cE4ej1&8q^2Dxr%zIZn>x zd1SDE2eh?-Y2}w8(rnf>l9tcVkFOCGJo%&A-dfGH^VbUj7LzrzU5i{qnj%{Y^bZX>yTw!}c+`!&*i5sWl8B1RQhU<(|su~K=4K=HM zBu9*u9nI^M9H617r)alX2!$UCg~#Wt=E`(4G*yfmR-IVFjI4arM~4XY!F5?Li3q7I z%dKL@lLj6jk&{zu*IJ{fsNmJ6|a*V8_Xw}k)@AVN= z1?zs@FYMZI-JcPM6YB4lKNJGP;QfUVysFkJ9c4L?8u%=mI_woqT;jTg zmz;*2t^}6t_(gj3j9G=RzGHjt*FRn>*VVtym7^ zN;E<5&` zg_z^{XO-v}qE-{(D8nM3>COS5%H6VU@Mzhu2j#B};xG2-rb84T4RK~EUAZd6I}6k0 z3fEUDd5)x1b^bYVqM`BFCf+%FvKIcEHckS;$CT^b$E{i$XV(wMLs%bbH5aRMd2XPpb zyxfxhYjs0kizPpUym32}^qb@WPvLCl(>I!ycx=v4FsP8=(^2*#O{im^? z%M$Z8vsKB*G->70`6Al9%L}zp)wpS0cd^zo&c*40dGyG14;w4p{LtZ4u7ot%QVj)w zB;&F+ahTQ1c&3@~@NiqZ{gJ~}Y;PYTSzZy+`}@N4;^M;HbE$XBsAXLb;>wtNnKr{% z$Xvg_E7Xy>Qn9icO`qkAom$5rjSV)ew%VvCl))9&sHC)^UW6AY`?B0^wGU9U6p-+1 ziV7rZ&zeG=hRWydbTM{Xso6!(1|&#RwI_4+;ysbEuU$DJw6%b7hDA;t%)(2^sEv{z zr`=U~)1i;R0%8uqO5DxP-~&02ND4UJH!P^=$XV&fqfB<8lYB&EQ|5KQgooTkL{e-Y z4WMmhSMk7uVGX8d-@bp_v9I9O++b}zFomu-ec#}F)vuvHU@;9XS3oXGi0F)akf=Br zmauR!H7;;6igiu@`HOqBy`G#RR6`|n@0@_*`fdE$y7BqNe8pFnt2C{WrErH*X6gkt*c%~M@gjC2O)~GP3C{us~Zka zrE{p_gm>7Cl_`Z|)Ilqzb&!mrV+ZT>A>E4GgqY@>Hh*jt_FWpoQKXjp*$oICKez1P zU~cDrvX!0w$*`G6=zDJ;3D+<-5ig8<9}MlIqlK_t`KK6R#r1ze)6GfTZ|jqXUZr%ZSP5p3-?;Ds|;c)hQhS$Q%7KHgtU zDsO#6Z8&>8(po51uJWSQQyS>4WFueJvWVy8eRXtH$m<3g8VKj{xI|av&*#vaPxprUTGHJL_PMS3sF7sABd13_94 zx?CFMh+)!;;~+F?uPI%0x*o)M=4M=AVx`y52`Z55IWI&(z8~^3Z^wqAJ*iTwEB5FQ zl?A;W9BPr?efeDZ$r4sf-&1o8}{5%XAf1#Jz(Ds<&Pt;SH{C7>Fh!I!mq|hP%vU*Xu|rfo%Kq#MSFQrfwM( zTg>4&Z3h@HkB8vdkAqsRc4~?#w2JTJeYy=74+J>=PFgq}d`Pw0q*NX*m1jJ^`Y5_k zrntAupzW0|^Pq*fZ+!C4Q&Hqy?6sdt>4iBHg`wK{rmU0v+zihQK<%Y&Z>3lL1<$?e!q{wtl6KC-u~zur&5J=DgMe7&)KhrMc(IJy z;UX{bP8__Y^5t=xoR@T6fA%~b!aw~eN$;-9e62gg^0w{f*5VLHekM)YDP#Jgc{@%? zJ+Msys6Cf$sxR`PZOt^nEskj>?;pNi9Es0PJa z+yd<-mh?}V#(B`qp8f5YzpTuiH(|-i_W}OyVTu}~#oLm1EdI~mB}Egd3F|kVz+h6& znmXwLsH5ub?KqA-uSde)qnv2H_tDPy&pl3-JMiy}s1$!UH(hTbMEY`Og{CZRK7NsL zajSVIH=q(!RbJy(%QIQ&lMseK+pKeXv+;&#BwCXrkPJp~qjGy2vAa&!GMf*E9!Qw5Ro%J`?#zCJmF?%ns=NGf;z@em( z>xm$+N3DGieeMp6Ps2@x5&QnW2^&PcZVUVFAeWlJ>j zJ1If#v3ag6?B}p8VvR>*kc9SSeyEG1uxD!ApGu2@qKad`54iPGpU;}7*NG|i~3QJ z4a{pzhQ^z{u)-9b(J`P2;1ukXo)h&EN_}UE<${muq(u@td0cshSjg)&SX8R7l-TI}tqmt-S6w9krA7tu z*pYJa35!ZuLd`78N_44+iXOZ|#=mlKnAjU!XqOQpEk^RtMl9f_3T1cxND=V1zRLyX z9XIa;gQj-aJ4+@eG-H9+Aq&FEcm3xx?nj@c4~EvP^O`FTZC>J~d1z{-K|StLH`^;V zrrr7=sKFqnv&Dlkc|@ zV@uvuNpku99CJP$bycD}W2haEjj$vSPlgq5uGEj^&c*wZh(s<42 zr5Y>Wx@nG#_k(gC;n%fiu`_N@oqY89852D@AA*d>uqo<5NZUL`5m zeABhQ*2L|-teij0Xs4#B3XF`KherHLJDtVJ@%3){1a^ih+QsBuc$0d8oo1qBZq+)! z6#8E8*`I-)`zQEdhZzhOunE=4K?XidD{^fVTBP)C`FM~jQ(oHKwgkBJSGbPLIo_4fzSG?PUbS*ojiGBU}7>8^O1q`ndM@%1sqqRxm7tj%UV6T&}vFjN< zTMYHxPiyHEJmD)t#Kfzup2Ce5+iNaM<698M&+poPY|1J$uQ<`%o^bhI3|!=yzl-%i z+Y3h_4KPGB5ZFn2QBhHHH>06(L+IkER0Z6+A*qRw_5_bh4cSaZ@d_qug~>FVXZOmI z>wHgx{*oMyimhg&@$V)xSYXThDner@TfU4J=QZ2{E5C^L@XR}6U@s$|EE{Fr-rS608z4dATb!&bFoR| zd9*5>6M97**^%PL8RJPcQZ)&T(Y6zyj{GJ0?C*=eC%Df-?hpK~^4670pN)qW7nTKl zK`?WoTyfGO{qf7iDh}%!Ee4}(3yG1M#HPTLv`cA010eXgZ{3-TAhNg3XYsR<+PhNr zseD8-cMn$LA}}uIZn;`FQQiq>UU`A>7teB*xcALV;Y-)rw^C$;n8c|Xwhc}j zNv7D?TzKUAH;vle-Q7^?H_0=NCe!|&r>-?BC*hnEsva`(5yHV6H=l#-FV<7Shl)pW zX2?-972usq9tuy-#=L1)NYOlO`pw>Jw#PRbX|{9DdvkIi4u538h@l8n7WDaOb4#Je zwMbLrKG?5UanL`cp+9YHi}F1gpJmWfz&C7!n%+1OBW;&cOnn>*!;1D}2c}DHbrCG3 z={~EO->CE+cogd7++Hp=j2MLzd9>>1``>QIQVW;384u_Isv5}kEJ_V#TiuT2L~c@& zph#%VPKrRKCh+JF6&*Hql1%u^Fshj%L~ht{05Zv~sjR%ZlCRZy>)Z(dxIag)1|}&R zHaD63hdsSi(3+ZQx`_-8O{wtyo~{{Rk=*l z)O%ciZ5SUvdTMTI_y*NnWwi6|CU|2i9S~8n=$T8))#!nK&W2qTY>PV@ap|&jNk=-? zR$a+6TMO;0z!e&@EmGMt%*)SiQgqwUQ1H~Jh!VL6W=x@+(Ct%;+ZQK=J^XtpVng+% zl{Fiy+hZQ8ixi7w1REiUYAA%p0F;sWmZ^1l*_N=1gMY-QMpo*ow_0C@zf>z)d%otZ zA@pRz8v;Pv*F3#9mwZlDsU$p+m--_dwraS2>lZCbtih%+arQ!1*0vA}h~vrm;*Ctn zY?k$0vxZ(FpW%4pX+rKc!q$^Bb@q04-#h$e=$Pb4N%ADPNmgp5QfB=W@03KwmHkQ+ zy4H1->+0&tMQwnthjw*Av}=nEX$$ikRt_IyV|#Wmg^y6r2gS01zT3-5*hOsPX8k@4 zF*T$y)E60lF62LC(9zZ6i)4m!lz}1e8+p42Esi z;IiGDqLTn#Xl%)~&Gh2Um22r|q!&>wFETnBz-KdG?R$5dqCbUTWq}{4kAcgbkWQGD zhXCYcY_VRg=fVC-VK(Gje--q;STDX&%;andffOL}H#bY>8}08-LkoF%tK&Efa|?2^ z8l8~pRJMJv{JDDLll5j#w-RuJ%>_JWpmWVKRv~Vu#GqW0;_BwZ+8U&GcfQs4pkzdA zGySrvdz_dJ8rQl~;5;`I^_*xjwrHW=f=lm6M5s21=2^hadG%BUpz&-EUF&ux2%;he zLQ`@E?q9?0rQH5p!+lqdvGGqVRDgrRf?g zsOrQJyj>d*TUwHy{`1v&%&V*eeQd24P?o9@;(Po-3~($WHY!E}=m2HFa^GcQnOq~`h}Kru zk~~tI7@bm&($@SW(G@(Ut`)6cXE|o9tIJSj%HYns(RC<4vqHnba|5=@3RMS%@ToV6 zSfc2Y7z6kWK}vW#2K2$F{)uqm8hJtTew;&i|D2%SrVd+%h@Z%YiiQ*z&$Az!T;{Wy zhJuDJSedNrtr9UNnS`y-I{hYa`^0)?g#r*m)ae}4wcmXCj!(5Is9*lj5|=@RK{Gl| zTTM+PGLG^Y&|ONZs-)j3xI9KY;FB&ch0-;JrOxX);(Py&j!`Y*XJTfPAALa9BOoyr z=C2fvy!B?drkb3TzKo29k~^kd3eL)kb9iW}hzm7y86CSL&Y>v&Awr`4`SrZxGSu^~ zj7L|l3B3816|%LN&%z=bR)P>b6(ZeKHIaF;N2CP6NN0hewz$APvS!P+N7WoM+z~1#>iY4V=>_FUZ7bkW)w--3M@A*3)p10jVg5fv6JLM_lKhjQURVckQ1Vt)laPF^PSqs?8-d;AKc zf-NgJ78dCO$q({<_?)dh^<~%%dD1Gjb@_8NoOp)VpfsQb(31UWjy5M~TP>0nxchk_ zl6!ZmyrW`xbL@ew$*WhsH z*``-S*w^BqbIj(9QyE(ISIFtXXt%LRE8sRsT$6V8lg-Ye9<&cnQb9Z`hu3VeS%UIe{Zo@OXTKQukHh)keSUWs z>jCqXk>P$JyZbT?#lBT0T`R1-D7mTW(dn~&`=kdORAM^vAL|BZrs@YP=B`pLI5=W^Umo_`wMr+Cu0ssDik z{%(4JdHL_!2kTgY7XQh<=j!eKPyYw;*rvn(ss1M~`G5245C5n6|C`SJ;s0O{U)@vu zuk;1{750y&_$M7b`v0Qj{|$X+Vs4&`Kp@J>%Fgw_{dc^Bw$;__prD}K+}y~>$o|?# z|K(`$dvC9-+OAa1lznrd>qNSx15PZ(Y1(Z3Rj!uQ`{=Gct z@zx$5T%}^%LI8EL+I!*BKVI6dd}|%-c`BS#nk|lsRwE>UJ>SMrM`es+?_Py~=kD$r zWcs*tdke)B(^5G#aO7S#61%{>=b48g3C{a@!5i^4(#2%NpCqj6yfG;USl8mRnHYIW z3+j3j{JZMz*W<cmHgq+Z(+4t_uMpe zdlq-$SID*vGPA6pN~u(5 z+G^|AnaB7S1vJW0cZny5QFQY_0B>vZ$U4yojLzT9m0B4>L1p$5A2(D{c|;!D>mk?7 zX0(D{Qq=)O$u&<{*uBzQZ|({;^z=JeEgn33GPFGV#l83W;|-dR)-8kqTHXh{x+>~p zuY$)kBMo)YS3peB$KQXxd4^PNc(x;&vo-{2{{!^>BLds#3cZK*9?H*|dmLU@;Y$k8 zJev@G25Yd~lg9;~xCzsnhGB}%`-0e@E92njcv<`c+%qFw>2*+9gWoUs1P+oW#(}9z z8ylo)^KUtcLMQZ+8a)~zPU4xp9VR9xp~Q3(w04H9a0}bz+~m{4qV}gn0%2kw;-kKv z9UZBZMuTVgMrUWn#U>4+H#cbJWP3_P3kO1vj_~t0$zwwPb}OoMqbM$M?Td{b&ti(K zW_GH0B2>hk@erFnBJX@NSp$Ad@vt^Og1k@4j1;D^1K0NVB1_Z14O8uKLE7hBbDz#r z2zknQP>glLoW}Hvy`%i;A0--DK@3$u$Om)TT;$t`uxE!y_#xY00=W_iL#j2kcytFB z&R^Yq4Xjxjp(wXhy12Cjs4G-_2c^Dw-STS0JR$5%Iq^?_PP5^pMhe+iS1p)0TAwt? zDL^miW0h{3zmle05PfRKf}pZhiPc`4{M_h6vMsA#84V`lR^mJ+=I2YdKA%6>-b6Pb zNS>a}8z@`=8q`5}i-&QiO;huF8fd2Gx30!z%~cPDjv2n;8=gl=3l@%T5tAqJoO(#X ziuONNK_4#RJ|2HNY~tGUGh^===K&=#rU#LcKG>F0N|ZzyU@96hu# zy0U=FS890G*_M}W7N~w~ePCjuiA&S#u+Zup7y6x4UiDJubkR+=lND3x!r$Q>w@-$3 z?yjf5FbdS5i!LvhYU!r3b_7&9oZvYC_&+)yN%1JWC2$c%HE7*s6sFb2t!Uh&FyT_f z>u|Kvc3%u`4Y-0I?sE;{+39%?M4!9TlS2ZLtqyk}TgA!(pWF>DwA&fJQ-zPm`eE}f z-mbKO2e9aN>u5cU`ZJiz-az<>n|uH&p(E`48B-qgceNsjiB-<+{X+E>;=6Ww+Q9&w z=cynAzmaoxjEJb)VM}>R=?2>oH}jfR;V-=-QsAY z`QGx@z9miK6g{Q=N2pO~8xI9G|Hz@MeEwc&Kn9dKu(jc4wp;;!Aq8}EW5AjA(UMGU zFfILuJ_=l86JF40FNa?#GQ4*PJkxc_eW@inA#~I`_?mRp40hz#ra()QCDV^@C+LD2 zUYwYiKD^y}%s<2|{Mt8r`1le)h>cGwb5&+zgZ+UH><+Z54dTMRsX5fAN2ku)b<~~V7Jis* z3W(OuKffx($IrM=;b!Ww-3@K`%#s;Y$xBc@8iL;d zBd5Z~o{D_0y!fso?CH2B2ld7v3G)cH)x_3^q_v+=fExFL*3(RV&68TPvU6DeoVE~S zD>5XoPf8wyX=l`Fz*X3qn!GPg@|FR-AMS&q%|6?e9bB2C={O57nm67>j#-kG+KD)m zOE_+w%<&9Ja3;6T1~f1ta1T(Hq_r8Uhp2E0{j8G=^ZFv)`ckha`hd?C%a{%eJqszN z^4x%fkMjJ^RolCKpas&E1l7N}0>Nfp8$UEi=03r14}sD~fMxO2o17c2KGY+vm|INL zDqkPpa|irzFzhF(n*xBaxrCz0>cKT-A>;b)QgBSixNYx=cjlRJypWKc^VU}l+9|;w zimth-VkO!_oaCi#8L;lxL3%;vwYHB&(-oO+fY{*oT^hAaA1MVa!XxFX#%4X0Y^*%e=sRlGB z&Ud{$SYB3PWSu*W(TI(ttqPZ#c+6D-{yVrGP4ag4XB5P&m@vnX?#V3b1KdW^L@-s) zyZ61S6NzJEr1D;?L4YfE*72^ckX)rb9R|7QsZ$BA+Nu{)?px-Lute#Q~FU&7I6|C|_*WsadUXBm`V-T&w($f|_vLgJ33yhDiV+S%Ri+(=e+8p@TgS>;bnf9$ehLAqeu! zPEA8|ELLM&w^e?n`$LYI0&lCg@Jc1?zAbu>JRvnTQc`&&FT_YFtC<-&Fx$7de{qXT z!IhAm9+|$8mokx!`9x3d-0U1b$}JMT1>63{YaAp^Q7XSomi71aCsNv#6hOtpkB1|B)PRaG|ndYmb|?k6saiNI^&oz;lWO7Z!Af({{mlOnD|SusFPH_m{B;AGB8)(c+kDm&Lzfu+3pRai`n2x?u`|# zk$z+2t4%p#4tlA4PHZwjkfm!VMjlQ;$*|G+{74zY$k*ku@Zr-#pTX5=@TES#Btf#h z2rX|=?#?icuR0rw|2jS33}mc#u8~5b9kwk7Wwwg(ssGo$d(aX@h8|t~omc>G*=jLT zwxw~EP?ZtOixQZZ*f5>Ob4df zh5pmNWW3=A5Lc(4VzMimRVuF#j5C#f-?}4;b5q)=l9$HF7+t5s%WB+{Rr#j;P}{V- z*-rBMJ#;&HjAf#qeQw@l7!e@pY>UyaM_xg3Ifwzaas`QkQ+B7oRwa??V2ZTVN&5(M z_Q6l?n_WlKv{5fCi!cUa0c_@`ns1D~PJzQo3U7Oo?P-GTHt@_pE|ecfi&kGB!L%GK zj(+Yn4!grkizIZY1UxplF1jp^UxruH3yL(Y_?>=k+UUUk#t``${%D`VL%wj=ij#z& zGW(%~ajwwK;$BjUy?@fMVy(0J>->(5?pcj#a9w?4i`T_?Ul+&w;>3~tvO3qkh47hC zo=$7!2Dcr)SnEzqk+c`Z*gR%8wxF`gTy)X#XleElBhx8{>@J%>Nnq<@4aUff!&eWR z=WVY0Ch}q1&T&8#tE+%7U)-7Uii=PO+;U z8XDf5eJ^Mc$iff$F7k5!MOw)VwX7iGETQCv(4(H7E?i4cC>?&sW<(6(4ISmm%s1m2 z2fyKCC8Mh2@Z^decVK4&neZz#H(8uKK+cG<){*I_0Lg33tHIZ;I8PHM-A3bL7kE#Z ztHf%3uM_n1M6G6oBFvLJ^AS|D5Y%`3l#rmUv(hwcOY#;{`LiM8H<3RB;weR@hxMO# zaQR)L`WY*5un!`nX~`MY)~5E^mS^Lwi@vNpwIeR;&Dk~qg&vM2Hj zv+uJ0SBYuz^#Nw|ZMu%S&Zh5Od5?BarJES}lSZxg^LyVMzkJJ9H7-gmyJC;U{dKF@ zGlX4gTyORMF7~#|90PBuuY289Nztubx}tkEgq?RNExC5m|&ykB*fwZJTJwT;Szq~)2OEP_7z^7RI->)-r7lb?9!k;d4S?b8OJd7(Lj{w>mNeD-1Y{m z8_L}b7UI{>+dHKi&bswhsFU40Up@D-OD+GEjYs4R|IWuHcDHySlCKST(Dc0%PWCBHJstMd-ct`TvX`yVG!kqpv+fRI?o3BGjgNLhiI>&WYk0y zzYs~W_&^pgX#A1mS36G)b3+(oL*M+8N$fet zU2`cV*xHj??RhNiZX(JIe|<%%8#f6&oAt9Asf=Vu!I|zB?^hS+f^O@lOAE zJc!ZQ&$ve<$8Ag%3EjSIv}Kw6vU9mdD$@MO__?Uta4Jl$lT#1!j@%Ho%xoKHG?g+g z_Df3QVW5}o2o@1Mmwe^SZgC}I>H{*#dudXRg67e~1L)S~IH3pE*rpm+>5gY$l9FU* zvbMH;OQ&APFUh35jX^^+9ewwnVvE!MF)4Ks4aD(}%8*2h%Z(69ujS=-RIy=B z^f5-DnTs>E-hPFU`1P^o-DqMKY2)Z{GS&OW25s~?5QyI>hPFMEpd%Xbh-4oTsfy%F z4yjIVtzjyV=`}&Vp%l98y#%t0PGZ)YQy^2FS}jx~=k5==lv7#*!ozT?_`#)(eT-N+ zUzIyRp5umhTku zi7*t){Oe6t65a~E`dKJOy|I()yM4@N%)m-%uhdxP8CM`IpHuw?ld2G?i@l4myp=XcUzYKI-t~1?@6;D@|}Kg|X#5wCQFEb5px_vtzZ(m${R} zX1B@Zh~PgM-ZJUNTYO%=G^J7^1`X;;9N+ZEb|Z^!RUQLRmo|l1Qdu z^)SEP@wBmc@{d__?wQ6C%%x|vYojvOETbE5xjRa4lo@f1HxGp45f)eJIiI{N#m+hYIJw>5N^tcO%JgK@#B-vGiN`C|fRsS^|Y4s3+EB;n&MpCFwi@sZ!1sNXH^&m#hYSMXnt zJel}zMpjQ}4_XLxiD3{B5|XiqKB?j*)ikLELNzyPkB^Bvu?2)0b7K@LpEcIzmLb&i zeAmL(i7iatxmc&uSAJ#S%$YQmqBj}Yr?BgDb9Tj}T|0B((~9{L4mhx4XR(U_7fIW* zaN2s^{JyzF`02s3^~K*Sv#|DBv_MCwD@!>WD?m=2{#has4@*bqq;q0Jhm6f8Bskjk zhxb1_Qi-5q))?5?8G@yS21aFdp%N2=r$umU-o?&OpwCh%u(ybW$`|t7S3PA%pL+M- zoeMVBJ)Kf*5IGqpz-c|!H=XFp{$gQKo4kFRdkJswanb2vC z?am?&9xBdtsnXPR^)W) zca6k)rJ2vAbZ%XjsY% zQ#_i3Zd}~xDO>1ShOth|R^3e91OwIWw9>TfcyRC~H00%L3^P7B$x3z7U>WZ>wz?fw zCF2f{Qxe5wsQb>xX7^_>ZOwkA8pWgIB5y&g{!4nHlY=8H?5G2s8_enRgI14M8sF@9 z1dk}9(R`HF?SU6ApToCg6#)APwjuu&feSvHVceL$%=n@RLT;7|IWjZ_;%XE@!t7-7 ztZf)LD=6k>n$XI1YqF2=5e>hOK5kCXNZbCfE$({Znq;bsJ=gF=m2|*?xFUac8SA$LEu!I_ zgC9xRmzS4^`!VtA-8r*oNl}M^5)u+e8}kqZ4lHq#X7Kq| zvae(4uI9&(9iPLR!$Dc;lVZP;{&#$bm@ZTms2T`luZ!;EoY{>N6e_o}PYOnn%mGEyl|xA_XdW$X$K z77dwx}^N6?s+MZCaPp1@ZMz(|i!b|ZY7osOLQQ4iajaP)GOxF6B z2rWWa{?xI*05vcd-f^abjQ3M)Bhlndtut@isV8fTgR?USD=Vwlf1b{?#Y#fMJ~%u* zJpD-4bOOge|1#5ub4dKDNnKq{jmI_V-eb!rnBR7_IL)7XSVI>1Z=g=M-S@x9)cng3mBJuUE@qP0`{4Dpk zHJQI2`mWuNtH0)Ode(n&u{ZHsWbJofLAWc9BA~=m`?{_)ELGL6B#woCp}S!kjczS+ z2$LYow7|tR)ITWOuQwC=OAG3`fwA7ft%NuYDLoP_&{mjGHx6PD|Ga^<`?sq6in<)x z*p~i-^fCgzxNRQWPfsf=+$NfY)}cHy$2hu?(soU}fJ`2iu`@GE1F0`U-9>UeB;?vd zr6EP8^yxY=9YLkJNkT^1)u%}1mC7Kx0n1E z>;=zDt!x_@GqG_}Rs&#nw3};ZOva;}H91`LY#y@FvdYVN&WCo6$=NHG2V8Htrjp9F zI^1XK3SU*em}baD$Q0Hw9`a}UcPa}lI-EzfQFg%y)V&!I>bV1Vo8`nZe~B1`XO z;_FM$f;D%%B6%u_Rylr~^Zi*K95up1D4m^ahC>*_qBk1^m7>Ii_?R*$B%!|?(-ptsG4ABSt^x;!$+3bKTXIGV#1dMt#yU_e`Jl<#^`|HJ*hj__;r+2&aB#f6l#{5#XZ_NO6>;4t3?-_yGf#E>8z=Qh_$j3D{l_pM z>)w7&+l$*Qt-+dSikQX?eCpkZV8@NyWGlOWHUIC=sSg@|Iy}}NJEBtG2CD8A&~Ild z)aRVr{~5Pm_lAg<;XG-no9Em6=RmU~f|M!EL_?dU&bgJl=b;r#Kf!s`g*B#2M~}-+ zUP|}Ijt{cI9(RkZ*@f&=w?nu4h-d3Cf5^c0P8C4m>=a}y=Y>(~*xMo&=e9Pja$Z&| z?5zf2{tobHLH^g}_0`gvmie1A93BQDdwXL$OYfqn^p%niF~L~)7N|ONAQTashSuZl zOlXeG7j#b}UiV3`st8 z`0Jz~1V>&Eg2gk|!A8aH77A5v4w%$>+!#{qEg-r*IzlV*-P>0;1Y5W zd+M_8CV@n1j?evat+*ysv7q0M-{FJ}yqKoMb^f6qbhPgtK8J5D24WN6ZKMQN#250(XY~!tI46#()|IqAZ zw6L!GZ2yT5tI4-5B^{-6FasI3$b zwB%e~_(CwMP{0%kTyc5ka#wkXG~WimkRpik+Q6M3h)Ss^uYp;LN78ZNVw2H|#AhtU zZaH7MNe+{$s5J@%O-dBq0KBq?PV4ULC%K!4l~`o~kS4S*K2D&F006(RYw z0A6zF9s=_x0-w6kvB>Q(JfgZ%a`?cxYFT$jogsXtFq1gfc|FZ8g&z4fvjHWmg^|TO z7mlhwrOiaf)z8dDPpBrZ$|TGUc!oE}{1N!lqxkVn3eGvvMiOTo+M~_*^Cb3FufVB; z^u={!wjEJEZbM$vZ$?r(n)$B7zee+#bw0y4VKL%|ikzb~8)n>bE`)mn*J1w|DGyn% z1D8*)JZ&TyS?k8>-datxbeGxz0phgAn&O7gm5n8NCwrue9lf?UWlJ<{JiyBbCF1?I^NphJk$LJE|(_ z3o|%CE|Qhf74L`aeOtsCPJ`Vaq<`)a*9ry&F`M9@N`JV<0Y5qy8{G|F`};tU;n#hd zqY;lls*vpC1#kAsbMJH3@;>=`cV{g+TuCcK4I>u%C+C-KnK)mbF?M^KJe~6pn_&i` z`f^yJ>Jg*XuXiuYm9`q3j>jd4AY+2hUszptRB#0U?T!2Uzk1_oOES!LpIX^nuwCm^ zA^vQgb3^7jzr7{`YLQ<2-5@F$U_yB$LSQ1riZ&Y-K}Gmr8#YS93WH0UapdFT!HRgq zXwnVzZ9ZqyV3!4i9wkhb3=mES!&Xi8%9;oXPBrW8u*8~J1Kv4$nhbez>$g!f~T%pnm_I(z)EYRhYx5s3yvn)&lnksyA?_tk&jx@m78 zW_;MY&3;*P2z(Uq^ji*6bNqNYH3jChvvTzUk~U!@6phP_Q%Z$}NgK$>V346a3-){w z4|usDL`5M&^P8YIKejG{8wf&)vnxWYSuFjhkMCNIWG+jo`N$irZ&yI2A zW|mR$4rEC8Nqh4qaiDg=xshkZ$zK!%9gPeH2$7`wQ%57OV1ubGN`@S+5om`bV0sFs zMYeF9|9R>K;zsGM6yq$e_*ahEUH8U^J#hA zMGCxIQlHjG7>J7?B594~(v+yvDI+~EJv2{h+gbm%6Ts2nl8CxZfS($ZL4by-Aji?2 znMEcNkZXjVxKJw{EHrwDuSgP9Zwv6Qr6%RH`Xv(qe-kbyAx=|jYB7iq6-rM{eVQLx zeb7eskxRa-D*!^=!ugj~=wb=c3uNueg;ZW7C8#(dZDtFF~RT{;3uI zPP9<}R$Fe%FBqfY@-!o%8c(8=$?-_DF{R(i&ZYAj*dSHhzQS zzuY}WhW|k!{D0U2dEpDZ-h7GUqlvz2x9+B5H}L1XOgCmo!^hLBB;V&GB6QX_^yeCT z>JR&4yO?9J^QOoAEsBeq`?l?r`LDNLTD^GXGrDZP z;dwUU{Bp$6jFddx{`Q;wC^39=AZu>JrK)NV%jp>B);_Pz+WZR#mkWd*=Cf4a*w%9Y z0K5_VhXJ#6kqLH0;|CLUApbytUf z?2RWjg6VKkL;9gci8^2-U~HKi-FDxC_O0&^7SG0Dov6e2F>>|z}P&=V|xt5YkN9`;Up;ExDjA4;Jt5&V32`m^A&WW!q*FV(8itjih@&u??Ex%QhE z=vuhi@mg&$kY$M*mU!wi%fIL$ce&8 z>m9^X$KFPUCs&~C*Z7aj%muzBkIbXqxBMLoYc<~Ii5PDrB=$2L^AF32Af0E=g)BkU zQmDn+$DIA}XrL%O@-)oI5Fp3z2&}jw zdfV5bnII>Bq*J>{dV3nnpcq`#A1jEPD{JGC^uT4&O(+CQlArKf|Rqr*ol5-paiR1Tp) z9mPL+R$mfEb=E=$CTC^YpYLSN5p)J>)Y7Ix_+R#B%7P|H*`n@%t&bO29T%m^$O!uk zF)>plv$wf8LxayFInb$-x?|R_b>{(@hjSgThnX5tno?G{#qeIVB-i}w%CVBz53f;9 zL(fNXyYEW}^uoG>N*Ja<=}+uVjeQ1P~Gzlh^*dfP6AP4OqzQiksu#d zW>=&I&hG80A`ZuLhY77->Q`d1;YrF$P(oqF|5GhBt2`FXyw!siThP4We0&jTYy( zqL?CCCnHIf6A~yWKjXbI2)!8!&Z`P+vyWau)Aty~+`)K@v{?8mnjmRax8wuc5yxes zN{NaP#EoMm_x6;DfrPEKL_>1@=9JN5dT~$`B54ynqlN?8SS+|1jdUWEd;Iem575zw zBAmUeT0b!FO?-Vx?d+WDJvjIic!!h(_Wnv@&yw9vF(xFkCwn)v=6iX@SIz9rr%Qo8 z288}eutrO9Juruv@9afIVt~Iuk8G11{td~mjoEuiE=ssb?Wrtu+hx8^=T=psCA`4c zMI6Xu^lEJ@a_%xY=h&fBS*-lk5KI5^gsf@kHq>`Cv!PxFuCWZ|EjEVBI(5ra_LYO1 zLr%8@zKwx|Bz3h9Euy}Ozo}!_0JLGr-kbQh8})+S)8aKySaJWk- ze;u8_w#%uhsojT<%#LoSOJ3+L0LZU^3E^c$Wf~%KtnTL{y>HaKpjO{F$hu zxy3l4)c5MMH+Upa<40LSZiE@pi(?jX$_!PQ;gr$}Mp=~6>wSaWGPn0z!swgE!>@1Y zbSn^&DX}Z0Y8#wzWZQE!{Cw&SSyUBojUGjxBof^8>a>O?vKJwAD#y3Q}HJZ>lFLsll_GsrH`e$XT$ihdwUmpI9auGwpT1M5WWC;=xf zF}xp-MXz8(iLxF}8XrSx(3RcRh1a}ixCMLpL|62M@|n%_=RL2yJ07k-d%upIqc7l7 z=qJ^PJj&zQ*cwI@woktm`fmT8byl!6EN-_HCY1ix3^zecN*m%YJ-Jngh}j2Jq| zf6L(5ROdmC9$ytGZQf?bu=K2Ct@3R1A>LK<0Wtex3%+2`nl~ZW# z=TVB8a70ulW?EKKN=iyVS#?7jD>r=twO7BMpo)}@oSc{$jFSn)6AY&XzJ~&ru~RWA z6?sWE2F87S9%{`1TT@{t2=NaT7EaW{%$R4s-(#d2O&(FTiJQ2Jg~NGu>|m2b3QVMNPU5m z)t9iFqh+B=M8*Xz&CCdehFSjBZ3$n>2vcFl##*2N+^$HV=}%KnLIm87DD^)D%qQUn zC87$6QMvHc{6k8$qQ4B^(7-+ql03?15iKIHg7~HF-08**R^dDFWw`3mtFp*W zbml)htLG$;Any($nr-7FN_(v;YodS8LUn+qx~G)BnWe4U7y7!I)NX9NNF*m%aasZ# zi-C{OSV{|f{UUh~jnKr+(=?JJSh0Ebvw%F|81424EfNG_Lj@~wPg@0jpplk*e3{mF zdj>~L^9ba4GUyn%6}TN8u7@}Y$-#9ncyD=i^Y=mG9U-Q1GX9C`Dx+pJeum~x`2;+p za~!@&oqen0SXFJzo#PDkWz}Tt8`w;Cfn!+ME2ghH1;R}$tvL^o7uObx~KFu@j3(MpWA-3|4eEr!vQ+o*JM#K!bPS;9qK z+}MzKFoX65qIZb9P6q`2{C{QNq!+&U@}#@F1ww&+d2(w1EuZ2?un#uw21(eN$XOgh>wHbqM?}2O6ZKbtw*fht zW_%mcMBnKD9M|1iT_O^yC@^F8G|+t228G)1@H9|adepE-ob-*+xJmD;}J;Y z80fj8$e}d2*?xj4ORGg0+p4d@cW>sV2HD~93en*t1>&qs!Zf@e73i_Vn z8b|Xte)Ue5Fm)#9hl^rPQ?FdbuV0lm`qz`#HB1Ww6r8-Yq*N7lzgqy@l$7ye*)>h0 z^&Z}t2lRJJt}3;%zjR!r`Zs59zH5m9^*ZFfOMlB}5zekBw$od?;LM>X{`!@av%1>2 zvVn_&q(ZQnH0E~`V^d>!M>}U#qp1`r_Q=GD`LT%@DfAN>s+)-0$V_aC$&4RC6KCdT zV<9q<2eakx0IA_r?BF%pb*T7WCio9{jTXsz~ z(>#;lR-6pZyD!ilO5@%HKG3{`PM<+ytRsIUM8Fas2vdln7;s+9VXB0K&!ytFZ3{#` z9ZG-ftz3+CrWNkozkH~vSp_Ya!~N}N-(CM_yL$bpq5UfrJeF@*Mg6s5?&j~Wkc99^B|RIus`mt$SsNKQ&uR#}lgw3Z5`NNkWJoq=mKFj~sR zR&cwgbawJ6tgfczVEa~5i(yWeiaRPzUO+*y1yPdS*{*uvn|j@%b5L=1->(&8Ns{$r%-;MiazDP>(I2Fn6~Aep z(#${+l{qKa3f_m?BXDwdb<;!fW8>oC5;6)Omy*3hk{^z>n^8oC#icYL(Na59JHSuH zHxvIx!RBzomI%q1EFjKM&1S84&)&o~&p)nW^9y*`OX8)nh?`PJL`7NWMouugjfC1W zU#E85$U_{HE?|pI6}YQZU%7PBf8|>`jZ2;0vr`Eoxp|FrvvZny7stXbmzfcxy0Dx; z5QY>+cXXCDw@>=XA9`1*t}0*7?)T)+^EW($3rsy@Pg`|yJa_%(3f`d!j@q1xifYEZ z>ZX=&6yG@GCnqJ+lToFZO=-#7S{Z9ftKiDrK5Vw6O7fL@7h z5VeDiM3<7UYz3}07PSzaE)AsQ|(r3#UxtT3ge9+8P88;GuGqkd|x76^|Gc$8jF|xOm7on#5D;*yG{?Xv|$<=6I?WB7Th72Zy${;2wMu;+p`<$s5cX=-GHttKp`1hH5D&6 z0STa_+lDZ?7;l4)0r{JrGG38X0%*Cn|@19QOVLkdSdzWb;-q+UxrNI5a6O#olA) zNiDu&9+4=1IU(Hnqq9tR{F4A7a2e&@{4g`}a`JNO-&{2GcDI#>NVG~r7EQ7- zn1D^~&@}<-B|i4~qSzvQ_?0^SpFu&N02cfdpYr+P^WFz+LT#QXY97+Pa{>03>E~?A`GB>Jg-bXi@rOMz zH?bZe1UO(fh|>5@z)CT5_tSb;hQ5FtgtEyA=y0m60WcN7V>qeososWHu8h3A_>sVD z$%o*KnqDq`P{*XoNu5uPiv=)`S<{n0JU$^SjP&=LQZfB#)YSxpXDf@RK$SlZ z4Z}+{x7&siyueW|Lqod>AH3Mq)ig6bMlMUhCiF$3;D{1H8=inKsA_XXZ-*R@^D7hX zwb#a-$O)+re=0>H_%L9#!ZQUDZ#)Z)QDul`EGVL1lg7U=f9TyvNZS+4p`Wr^68i=Oz4y@6$QqD|c~=0ZAu=VV?fQ zk0C$bfBu&b138uG|4kGFfuU}09R5KJ_!S);9oyR4rkl_I<{P>25=w{vok;DRKunM@ zVg~(l?VkYU|DtE`KY;+w`7`9XHCloOa{2zb>)jp@f=n;OlE?-XPA0K6T! zoLvcCEiYz;%Q(dg~%7jvUACpIMx2Uh>bE!@W^{k0RQxUgacL8zQC zQ4tZd6ujbV)R&N^HYjD3#>M{n$e$ZY@=cC&T!wafj*2iL@mgx>7)J-vrBoy<>dlyQ zNkGt<(l1=@Ld?5)i$N0 zA`!=0j}_G!M{o#nf*8iTyqlWV-RBpSFmW*zlok?kPj`-p2#K(c{$Ocn#G?sN3kiOv zo>qh%u^-A!%&L0M9Xy#X-i6-&-MBY=L|N%vDIFYjZSN{ve%KQ#v~vjl9jXm5{>sBz z`en{OPSDrvDL+VqX4~LPdAS$cT6$4q@G?w{NhujKHHeK}J|+PlW%m>hq!pd{o&NND z%|XeyIMq<_wZml}1#-{x%l0(2J@Md!5=zHsBJ3{IkRukG!#rh}b$WmvOqGlG#^P-8 z>Y)D#A*-c?g_7jk_xInb9ln@HLh+|iMH=Aq1^Kes>wCWJ01fvTMdg;R)3?>^52N45 zOf7R{Xg@q$remj6M`W!96Bg_1hT-8PyATR`M>BI%qt7WbS^G~BMPobWOe1+YZ7i03 zd3>qt>U1kr2CuoaHjh*7HG~?^($9PHzIZ{8wZyYLWwJXsdE}QOL9E55aWFqyEC?Mf zJj^OPJO^6Dnj!Mbr6i5jo@B|s@A`bb3^lHQAB(yyQEv?qVJ43@C?OoKKW0RIL&I!a z!M-{>2$<`s!?=!@`IC$8^!;YXEdKV=D0E#^;A`;DF`OTqcH~^-)JjUSZeq(WfEi%g_?o(wsd8gp{i>H>V;qeRShp^&?aJVx>);-6^D zj_Wz*fBLw8ExePft7&TmLrckn1hF%L>EQ#Af(r1Bh51|d@Aek=}$v`-sQ~zB%?b=x1kgrON?uwb%hv+eYZj1PY)gR)^`3$L0ZoIMHgise-z%E%ArZ zqoY|9p`5G66>b$VB9|~wskDzhJfzlF-Fp4#30xY{lAf`{+v9d?XeLEkGcRZd{=1?= z3eVK}R6EZcbVXwrehbW^13zcnx}XwBSlG1U6e%~Exagp2hyhVby$*u}IkMyI_fj=L z<0HH!dEp$y00V=?CA!h?=COT8KhQ?6h$ol#sz4upI6ox|!sa9sm;FS?l9QfRgOVDT z#AmB9&M(S1)#xoYzItluKT*VXtzAMnGJJo>L6MDQW7eEcbNCas)Jm5tm(d)D#S<#7 z4NU-G&Rz78PUPo26H}+pHTJuUnI0SimVy34>4&V{Vk&krmTw`%&&EGjM?%h3$mpNX&K`|NwRp=RnN&$fOVVcS{V@QU<0`80F)HdDzYw+}}1&qfAV)0xOuaugLVYE$4v>1uW*l=(EZvMkhUFLV)$9pE5u= zL95IXWy{A!fRm{tkbi_qG8~b#cLz#4FCIw>o$k?>;_{gF{=ys2tQ!Rj}M(+b<#%Y1wXc zIYqY?D9*_*w7CmxkyEmnY%n>j^7(wkl=Odg#1jlmh5a-%AK_ZK#6K$aG{(%T*UPW! zDzEg;RK7Ou713kzci0?Qt;(65E()^J^h=4M&(XRQ7espv#c6Z;f8>Ifm0M*-iDA;5 zXIYtH_Lz6?WKOwD8ztPoR-86{{Ndnd*gtqoL)UB`DBA~5mK3p^SA}h$xCaf(UGsz& zXxnt+tKV!oYa-9!>|r=MnKaGVKi_cTP-eI!eDjoKKTM6SqL%Y9fkgW-r&nn?tamCK zaAvasPLKAvagupUc6cQtyZNnta>=FF+qKI+PY@*25*m`2FF(_`wVEhi0`2C4IL59g z)th-6nzJ<%R8AgoQyZ=x9SE1YBqClr$ckHTSKOfwIbti%-ej4>s?Y%TKX$YrSoYAQ zoN}V%6c6{TP5F*~8ziSBW=v16CdXke ztc%i!hfx=nSBwTDe8cQP`EWgb!WaRdYTK2R>daI8+_WJWn|$0CA>gxl3j6!r!vunC z_e4P#Ik+2t9VUY0^s#yYZf7DgB69L^*+9_dBcFvh$VIE&YF&q`dqMV7yRk=qqrsJ~ z%22e%mW$dJW0pQEy-{u$`!TwxWSOpiuDEwbR=WdO1rsjf6?;R6)Qj9i0hg@Fl$zOm z@@s@R!H$dneNyN|z&5;@!m))k6G@KfAdx;didv>O6h}|ksPQrdqR6~7<{o^8B)0Hp ze&S~S)*sIa?~lllz^W3NoXe^_tuvY1u|qbJ#E;dF=gIt`BDdpcKx*PIe38w z0;xTt_}7?S4}K%Db;MW-=Jy-TSO!D+nATpPvZwV!wiNkGd(*4&wY$~DduMwR3NjSb zxF%zfl%6yhb=eI+PoPM+Xj|%X0OTz{c*SPrMe48MNhrvnAE4(s8c0#EcpZUf?JB!&VdVLXBy;9llKWVuDqjby-dGs_@*mz2cnrVu1 z@ygM^)*Kln85m?uOH04hUW=1bJO+R%_Av^`=k@H94`ii^9#rlT-d%X6no>iGc(FRH zmbO$1MEi`Dyoiu+(#&~NDS#k8s@}p2Mh`c6JddU;#Q`E57P4uz85Ralo+y8W8ZLZZ z+d@BXb2Qp zp;rTUq+I7cG2*U*E7?*{RoV09D+&uQS{`?}+@QX$xMgjGEty?qUHT=Z&(I&(55!M? zG+ds7nlW$|1Cwlq*_7k*7zmu<%Q zanZvk`uKFsG`6d_l(6l17H0~<8x}HUh_`lkp)nJFp2mQ8+t=BdsZx7V%fv$I4}OP< zZmRBM#Ir`|>f~LCqWVqqxTOg6h}RZ@mT+VwUEO|aI`K!acjNBBI|+R@%5t^=+DlkT zlcd~YRS7A z8A;peJKRHiH+Mi2p)Jf!;|q%&ruQ=ZNvZEp z?N>qp3K!q8ITGwfZnA7HOYkI;Wsx*;ythf;Ic(@YyyTm1Nk2Xk$;Qj$;J@HR^RewQ z$phnO$bLAb_p!?4@VV=Ap}FSvGLid=d!nm>URf~EcqeoO)&1Lk33@prp0!!4FW$!Y z318OI-@WktJAQEipsci%*mp5GO``!yHy#Um;*V}0^LJS%#H?pAoRoLLZXcm{NMP|a zBw|Mb8(C&kc+--Qm}+c%`P4-sy8t9~%eaMp?cg~BAl7FyHB#>L8&!Z>gxnrJ5=ih^8d_Fl1B z;`-uS*P)T)=&Mt!v5lbsHhpMs@~(6g5-IAGHWH0_PR&zEO-U87sy?OJX?Ryo!&Oeq zM##g$%%#^0YRl z?qy;0mbU+><0X~!P8ju&10xNmYd3YD5SE|8TaXgH{b39Grh}?{^OQe#Xkq92VX?Nt zm^1)G##=i$kqo4y@am{@lEs#WY4ad3lpHG=&t)=Y-;xHjQ)gs*QeIfqXAu(2^L+R2 zB90<09kkajWANqZY1=(5nqwq=&(2tfe-vfQwuyyzh*aS0=4O=kP0~8-d1>kJkYiy0 zrg!JUU!V&<1x<4aJa%b3dG`Fwj8OYTMiBcF?sOm|>uD&~1s>JtP$vEEmk)7A))&Ba zz~(`44%+v}uE2bs9Vo94{xe#Z1ZdV9{&(&FQk6GQjT<|1f1f^;mVUU{`1t=Zb@UJF z_;!ng)l zx@i5n+>qdUy}Z2aES|?E9{%O9c0!H=jbO!EPFbFdgw1Kf$!N3&ntAA(scQ~r zVjI{4KNd<-LZlo81M~|G5?O|}uH;3H)ui6h8+&~6(jojO$pYXQaOtO!iHPV7BHL%r z${31S|0(c0iNF1~Jyz} z7K*>9NYP7$M|?y~*>462AsUoDwSwz9MES z@-2ceP_!cJa{l?s?_4Y)jAlCi?$LQVu7DH6o#>6Fbb^oyoZfQP-Kt_+pIn$j&M79- zvO&fBQ)k z$-?x;NHU|Pt@^3+e75Oo7i7tv3Op$sE$(XnAbWq|#I4c%?_1tMYFqGCG>ozC8j(tk zTg!^A09Ao%Pv3e;Q5+)%Xy7(b3T%QD*Yd z;aM7HFmTb&(;-o8u&jjA;sg(60_7J2-u^|?G}@U)%I*b4`?=`EmjE>US9r}_2=L1f z{YvWYA#x=IVGo1VQg?EGyaN+nJj@Zq@u5}ZU?-_A_vy*Pp$?1UEo}hqE8Wx{U*qH1 zWsofIu4V1$`Ex=E)VY{wsdg?EOBTN+pyha=xEpe}#$zY|<^kkdg*JAHntYfFo#ptC zN6`bR(sX)`-|-mVz4I{VRdEyGq^HfGfBm{SiQ6q8aFtpZ>q8v#Ykff$Cj-^FdIqMd z%wfnNy9+5Ca_adM+f8ITzqmCXc8VyGe@(a(K0PT_gY+^(%Bk70(F7z__0q(pyt9qu z3e<2F`%>O4+Pv%wx;(=z)$&o$kzf9fl4N_e-E9lrm3Qgo1jqb`!klqfRFha16+1xc ziIB%ikh31hG&Rdg)RvSTKg-Lg#lgxmhQ{1)%wxh*7|qA6xWvLY*hidb6R0}Va|qNU zIzpo@^)L~kM7<&jnZ?2}kdEkav#QP3J4~f9u;C>RIz(pEO$#AM&fP_5!K~iKrBM5z z=fpe~-5Xkwdf-AZ5tt(41TAOtkdxG1=t#Q`9W;R!3eDRE{aNGetDnZwMEWKSr)F2F z9B0p#d{ASZ-!x@#*;Z$GBm1{(cmsoMt1Z@wX5(h>la@M|50G>>TuTQT@94x~pCwcS z{8{h!-)o)}46;x!pZg${Vp}yr)uV|tlRUu@#M`X1N^{PW@>tfskb+=7W}h}e*=hGFu%89^&zyB&&%v}#%Q$Bf zv?Cml>qPv7Bywacye7G-U-S&y6+t>%mP5wg(a7<5AL$RKen+Q}x%oi~dI%63N?Cbs z@xEMOeG$8*tg6^Nnhd9`puV{s3T`)T%J#B@L=itDcp?>O`>{J@xp??aJKsepTvz{h zadox*yAt+MDXB;##gdZaAe}ezis+gBhv%w3NhH4@5vqtqrS2~3m8AEUYo|U8<;U8M z8?02@GsS!v{C8JQZC+!=GQ4DYw9C^hIW>$A%T;^>Yhs1Dpk2M2(dDJlUhYD4Kz&!# z2Z;T>wBfvKJQLlzLA+6!NUeuCZaU^)^tqoz)2)ciu{x8d+bnH!D?50Oj3zPA?<=FRXN)jj<> z5GHh*hQZ`6dbwnfzD8R!`J=@_g~9%cEJKAKpm#cFi7eTHKPhUlhk#^Tx_y91>gKX! zD7|yABi5`%USjOOgD1)+ZJ6uWg=Guzv0MP6k{4$6xb!bgZOS0T`k}%G(&wS;1LDgI zH3ePdZ#7uQySGbP?rH=0CBd~F-Yc6vZL%8ff}@fKG(2z=_fntoj{3VKKP57ZXEcE} zR+aI$-Df7d`G_-lrm^(RjrVmed?l^QX)Zn7CWgn`YhSL90Lfv2tPD@O-sa}AkEJI0 zaTWxG5wP|lQ;m!G`}W6>vy_yV2S`8iHF-@OjQbUI<;8N+rC5+?aaX-GSsI$lS~jLv z)kT0>tiR=bGkpU|0{4()GTqgsiOy-d)cDxh*d3%~>EIC@j{jVVVX9i>qmeg2emp8P2?v_mu9BEoYwM3g`f z1kF$(H7ieubwa33w>uGji>cGlU_pRZ_h)-dpk(rEbxnq|3|1%zdLRi@77i*331w|C ze=lw#_ezu6xEdKVuZczz3m(yb*Xy5F|LC@?p;LFg82=a;X*#rUeU1Ssf7-#xw3Eya zD3EWXZt6Le+K=xl+}&cQo`?_|D>ZgU4eD#4fL$pT9T!5%p|41O-K0M$i;b6vD8X(Z zQSij&@`(8w%89%f=!usS^CQGO{j^XIQY|QqW|1ToxLcKteO4;^;e|XydzE8F8_>Fv zq`t_l7l9{sv@IPzfnG12A_R|&n+FpyH@vzz?aty4OyM3*OLHPt;C9KL(k2IlX)W|t zc1E!>`)8{~x_-?I z>d?u?1({uB2Am^7Zl925ikI>1i6LzBob3MR&Xuf>+ga8FHH0*L`@Y4RBsAVb7+4>> zRG!M!@{My>0UkbSF>d#zbJ1e6D0)XI>Db1{&sP{BWXN?CAi^1r@llCZo4s!tVwDZ; zNh%BoNV?@N=t27`1d6`2Iy(o;RPx@jY9`RsK_YcrJNG@Tn_v^d0D7W z30)DwN-9pcyCVuFMGqwzhV+dywKZ;Qc^3}#6F2a7c77j)dS}4T|6e;e| z;$FOXaff0F?v`LJh2q5>f&_QBK%lq;_u%dl+*x|g|2MNcv$HchJNsg1_U)5r?mTkc z_j6zN`EKz{I*cKkY!zbDw{EElhzVk&74%PLuY{kK4#J~drXYu|6ByRQyCn)Wjn3OE zuF#++9t&Z#bi6?~bpX0d_HbVLiJz$0`#_9!O?O|4x(@L_Uow>JEFbvdC|l3vAtvbe zwXu@;%2&>~3#MPvg>T({nSK6SQHFKZ>W!S$-=yLc#(!CVlanJ0vRV(x1%0=a7@U!S z;NFciYlBpxZ5BjrBd!)SW+$ z#FpEhFPO^KR^1P%>n& z_@j;iarhmtJ?BL?95hNguDS@^E#Y>xSH`N<2^#!-2SmWG6Lu| zN)_Gr>F^lU+)b54HKOn|YC&O{UrJT3V6Ob_PR%9mRPjhtA8zy0;I!)K_JXA z0iR)bS~tf^6fwoK7AX*SxM#IRjh-pv26A+ z5snXVsvqz0_biU5VU0~a#{nNm=rgN*yt3&hMTaNXe#xl*zBn?!7@DxDpQTO-iar<| zT!?SdLst&jC1HJas5?DtDCj-I?rT<#c!WZ)R@N%9SLsC{3>5ZQZ!1Y?)GDox(9a1? zr}yW!2`|!bmL0NJ?7*&j{9~WFs^<=A8Ox~H5i=bfWPy)4${|eR2H-Dpx$UHa7jPd0 zhd5>O02U6)Rh&MsJLB?=gquw1a>-YT;|z>MAJ@Pkh8a)FMV*lyquiYQTA5#*RoB z?+XK>^GcYj*13YG-0@{r3%ughH(s!nQrhqriW5<`oXRE}`bG?j@>KLcThY&cU>b|7tc@Va-#;l~tD!y8(M?RW1 z2zEJRglAesJ$;&`)TeIPa!Ppgf`_-pEp=`%s%gxrtA1@K7{J5h<9VoVG9XF2TC&A8 zz-*U7GZ8k0ZM+B@P#UD;Rf@fErq8{E+Soard5}LViHH;s;_O`=3k2pqqq^s^{}!-8 zxwn%m%nX0NW+IU^d3lY~0jpJ4cvwWzthhO(jAtilo%_(-c z2^wF()ibh}a0@rS6a}h;W{_D{kZ9)?)R-dvc}>ILWC44Hc7yn^6ukQw-?>|xK zfefpoKl%+!NgR6FLl%+LExW+!Xv}~4?MHVvLns9X{6Pd_ z5Ye{Va&QJO&3N|jkBDdbbN?xz{$Bu-5S(7d-A4!-WiEl=yT%ArovJa>Q!)qf^Jy06 z9Sr@#FMJ;b1bNWh9}ALOwO$Wmt6AXbfB(}O;qypg`A(5QS+(*|=f1e?s2+%HO&Hem zll|sDH>@YVl>d=_ z92V_+Z>H$<`rioi@@~*2c7l9;k5W0EHxPTpBM3ntK$BP{FKBmaEA1>w3AI3V#iB)) z$f~fdr4dmSpt%{=(!U^@8Im7WS5n*p92Mcp49izJ4Yu)LNS(Eo^Gtc$xniCiI3Easmy!2!^-l!m5CAsBJs7loH=JhYa5l};54Zm z_sC5Q6WTM!)njry_Vtoh`D9~k zG5xx>`(sG9Qjl<{jtjCJ-|(RRT$PbGO9nco2hcig_u>?r1_NsLi_E@%Db)dJo+`3H zM@$|?HwN?brQ)oLM(h%pS=R~zCoE#D_N1Yml|Ca1SHDOFO1;+r%pdfR%dC0;pBXHC}^V(VL~orKhLX9i&<19tzR}>Vtm!qCfhkOZJy3!?!|xj17GE$ zdWXZH^#gIzg!rPkrFxZBa*h&1O!k!A552Vz=BaiBU5b8jXh{O*Kzy6m!3?I(mmhxC zl=xMB7ttP1T;;GqpBurL;-Jo|@QRq?mohKUr23 zDl*IG*)!qfx6L0vRCpivw8uj;DXQ1PFf(LwJtHj>`UYgJ+e)0?n&H2guup8Nyo+@CoDJgI= zVRSIw26QqJ>0j7z1qmx(T3bt$Pe|sYrfu?|)i3$eIKx5I9s$@;(THMeF{q*(AWH+oNCHU6C*`JbkRbNJL)jqGFfy1XOUSl>l9 zQ`CHHa7+&{^-y=D(sF6gqgJ)VHZ){2Aq9hJ7Bu8w?Z4xaQjj?d1egQYo!m9&7H!AN z`XfoIsH_fwX~x1-E<7GR)$sbjl5j@+H6_v>Rz}*@nOJzazft)XrNVW4=L+O~Cq{6S zAMV*g{d#}%%9_as=Pt?nh-8i43mXlTA}MOfYB(SdMWsjZ`;cMKoTn;MlJXH-SxW9!N>*qI-d9 z#*Cnl@11%Rv*4Dypf@JwmYuz?_RRFsmFzf)SaJL_`dD?|E_!qf;K^x+e$K_LpfVxh zhK=`Bb4KH_(=@L1O%IVHo2xJ<`?FNcM71Q6n4yicGTd9F^QpL#ll6OOhF;^GgGio_ zIBa^=kuJij7!o3a%j|ZrQuCs#qLs38IA#9=qwd?^(!XY5f}!%;uv@2|U@{dV`L{V3 z7yCj9N$Go@mwOHUGc(U-K(7L1;bM-qw(B2iII*~il%(ksJKee0bX+lba_4d@I`izkpqf{c)=tpi zV8JC#L1M9W?pq*dr9xK?!ufm5?y|x3HX+!!6O?SMRwfC$`emE?v$f>|%%{Ad(lW8p z)r}080WSn~IG9&289hh6gmVF+-0ZJ+5}hsjnYdH4u?WL9j^*x;lGBEwY3uS|G%q`3 zmRo*yE0>gGT`K342i?f6zp844n8$R1f@-HHADm{}#u{pD6kkewy7Q&ho=v8XEESb3 z9Zem;cTRH;6I@F^SvRRH=b?w`mmO@y#wtdk5PJ#T=^tOarSTW3CVnW_RHvm})sYRz z@KbyZZU&ZQ!<6B?2I~BI)@i&9@BF3g`xrKJ+#+=bM}!#`JMo>;>V&k<8iQUM>QCvy zPDBtpy2dO1--n5@X-aZmTBU5BvJ~)F1f|rQ)v_14#mV(NOtIr1^?1Zb4$-gb0HPvO zX_8d^dAFs}34XIOwVA!jJpsPz_>xCc93yn`*I)JU>G}nc_u={}Hu-&O%(tV447dxBWlcm1sXttEupMzw!v&`>O4Rnv#(Ge2Z+28Zkv(Ig_efW^+7HN;u#^Qi#%c*kkgwuZ4Z0scxcLbgF7KwucX8g_I)J357_XXR z-c|O7;s)>4oB_HLr^kYSSo=5mwipS`T!^nP>g#>A`QfawrXzWC5IKD2(M87g z{Iiv-Qh={J-K&;Ljxx)zzN`NBGZ4Zm>KqGn{-~D+mps20n}H}mj0(nCwZ1fd&Lv~6 z@)MQo;;dyU86X}yekN~a3dZ%duf0^Qva(a!PiGG)j@d-m3JGNxsTrAs+$K_`GbObu zyu^{c*fW1h9Hk*T!kCCZM_+~r&Gd$?5A(FIm9Ka)6ATS*s-bM^<((=#?-J7P9dO-y!XFZj3i zklK3{70Wp2&V<j@F8Oby%Fuo&pIngv$Oi5l=oJKu(+Mw|+Gtss)_1aZtSdI<1zC=O6tiALs< z=>i^ehuUAi{*FA+5&H;HBm_$ZMs>4JsM=3g#2Bln%$$v7p$eM^J$Rx)4Y@#*YL<~P zVM-<@ON-7=#b+?v*-4girS-JAZLKv*M9qs4W1sG}H%?ROJX0u{!L&Iy5fGyr3{(UpAtg{P!Y!w70OewN2nyQefJ87u)?IGUHqE%HVx&RzE))DeH4nFF$1` z3ea;N9$L`8sL%D*_N8S(DILmbp2qb_0@c=>`};ZKA)8kthR=jaDKJ}02{aNuVqsw> zn!83b4-MY-zlZ!zP@ws6R`E)$?+k`RrkgflMqf;r()BfOfv-%*mpjNd$TTrdZE7PM zQ%!W1!*Sh~!he1c_wCKJ^roQTXKcbL4yIftKy!e;m844!ZSV5yJ_R(J_G~k6*K_ks zN6D{~i8km^SGP`%tuP(wW(|9{ty4|1hWz>WQ#!rDJU?6`ZQoLnlCq5T{}cn(c~w+I znBJaNm<7(4K6cJcDuJ67n??M9b;`vg*YV*Wf6RX^FJ#4Tvr5>>4_CJ=0T&sR)I>A8 zCEB(#OUJj#X@=3kMjJ3<2X*M6ie~|H3orjVTCZfnXKL=eN-(4)fA{uv=_1LpnLb`b z_{;ONGj>cfk^m$q3CYFH$HAjKkIIi>!8tt(A3R~ztWwRTgO!s^fT5bLklkGhd_f9K z9tJ+Ml!{J`A4=T9!@PX$cUgmZrOIw`svhh2-r~&Bkr>?2Sm9w&D)p^YocZYu0O093 zd`dAI=8m#=Cq@qFb|zch^)%6$U0j@nvxgu6KNO^1`6hEQr8%RnRE}?mH<%0bzNnk* zsJ9lX6%d$_-W*>#JS=U+{SfTTHKe^U4o;=EmJ5)UxeqNb;$~WngL3p1YcbV~>k+Rv z1&q9}Jb}+7Enhn0-bE|R@V~RF5pRZvNpT8sv~KJw6c6?cPb&|x^!UoE#`S^jm$mU2 z;fdX$OGSN|xV7AMp;O(cmbd@%#T=SP2Nj$}opa7xG6_%#fT=|y%%gRQ|Kia)y!a1= zjO~&A_fKS^mG(cOj{2wnQ4&pf>@lD6YhNz^=M4Q8o7$mU!j6Z@&0ru;sFmWK=-t<# zcEHCZk-HK4Z^}^*+Ry%el0HQL@K5`=L)tRRLoUZ@b?zeFVFHB!Y}uD?C*8qXHuF~$ z3D(W>^2`Y}Tp1n)%j6SdV_Y@vy245Rjgj0AXmoLoS;!d7_N*-4Ot@6V#-yY!^hY80 z&$*+%^_#p>WQ!Wp$_?ZfPjhnQYRM=!btukb8(5Y6de;#$PiN0KG}LQ)UPXsr`5?0Ixo}H3ZB_`y-5ke>!PHzcGGoB zVpeDI@C8a;3xzP|H$~jS8ZLm@^2oZLukmFp3LP?%u0xni(GoFM(g4q$m=F^6tnE2{ zx|D&EUf}7)1--PiYq{B6MacL#6GYOob`@RjpQlm3pf4pf_M*y^+KE|DCJ+PcIqB-| zigR4!3zLuH9gWnJTCZ@mb~ZpX8dq{G=ug5ZaTVRyb3R@Z#p+&t^07;q$Smsl%95BL zPyH$`&DP-RS)BFL4;q~;DN%1iW**fsCqK(;ODf39I)cGq``J$-P`^XUJ!wl%DIYOM z=oj-`!hg|6^}qBd2Es{RzzVZMSnptU_{ed;rpu0>mcPU^*DCn;l6=61+(tBJG?KhZ zJpQWN z?<6S|)FK`F%=849JkYLY^zStp`48d#mz?lY=p$+GpQB4}{?kaP|5!or&!KPf|A}<| zZ_K{`KiL2NiuFHvX8J_$Gy@c}zU=ZAK3HQHsWNF=y(FFRZOzn+kzbcfF@^e^aXl`} zI~2v8#ymZ=s#V@l%s<0S33qVTOXC;U*85j8W=653&^jjte^7L;JkxpjyD@3X=V;0L zCi-E91)Aiux(r)5?R!LXp>5=ov5TC>)bVYEUr&s(H=XVAreAyaJfsdKL+1|~mkqlR zqG|kpiqw{vA3?IEQ3Z2kTu8+PWVV^kL^_x#{9NgH>AKkW$^05S-1CNARPJ%q!wRD- z^nKp$H@sF4-?-QIDHiT7?LnjyMf5nxi{JEySGD0gzEKoScM;tuy>0sDdxE|mWwsO5 zB4mGVq|`GA=n#(hh%@JLgC;xgRN2IndNNE_ZE$tsw(3-Tcwnnn_f9}Dp@8oUGVUD|9fqt2@;vzj_ehuL^mPcNuunyEIm ztEHg3%_}~l(;^J}N5>eGyH{3ZcCF^d)Tw}@YfIc7`97jt>QzOpw)17=VNb~Es7#C3 zQG+M|U@+b2tz}_|Gh^61yi}8JMG-wMtw}2pfKh9I_qE>++^rxlodHx=^-tGRa5S*9 zabWS*W_)`t46dwi90xv3&L1Qsl*GeNza2*Po{=ga{>sIvRlf#58!YOv+dFd<(|ZJF zwR;0~69%4U%3|>mq^U#_JKn}L%M|6AJzajw7Cck4+Rmzn&4V49zyD{-e=DQ>V=4g5 zizpOJgN#`G1a$+>qU-9D4aua!_aGMWYcKjc2d4h_}ICNFK&uwE6?|#-F^{uq+I8H zI_Z2d@6fGW$KEp){o?|Da-Pz1d;f!1>`00W{!~C z;=j42!y(z<?-sVEH4hl&z^4eI)^D$6~a--kRUDCB$VqTl4Kk!+Z{$k(f z%{v0WL9iR%3`AIRAyLyCxAHKE@BLMJ(<=Mxf!pQnGSP>7smc#^D;&fcnCRNih=gi= zyiSLIX+2(KD9NMFtnbEm8K1`8HS_Os%QwGGt5e`-eb!~dpa)iWA78z#C|^4Z{oeQu9m^XNWh!-IXesV z8KBcEBqgs$ZT!f5wtP@FhiV2cAXfw#<3^Nk6WxX$h;@A35Ol{rXL`IM_unH6i{Ypr zFy9JpQ}d7M3O0H2T0OGwXCV#i%VcYG9uLd$7>i-Fc`nkhd7p0TSI*9Ya79n2Odua94=+ zsjW@7>xM1#+N@a#<*oPFNcI;}Wm&}%t)19yJ+H225AF_X>+UaG=amWSaMET`p)km` zt)WZO!3~| z7NocdP3ST!#qtPsJ2^2n7Qq=lxahSh`8@q-aN0rzRdPV;reC*PhDg&xGXA43-(fpX zm(3A8V3YT%8ZnW3vmERUbxd321VN3LREv6K+uLx-)}_92+|Y{fT@@5vh{C_d-p|b| z;!nPhjj*Ub{1B)WeF1lwy=⪻OuE+i%LKEJj!7lLt}L6y`E_=bX3JVNOr@ypBosO z7fT3LVM-P}*{M6Y9J6F9)**a2-ka+6s1@kEBn&^7-T2l^gFLCaIk;aot{L#Sq($Df z;M5}bN>n`UTUM95W;*AU=N%Sz4Z)%2xjheb$Z*H-G?=f)5LUWAr6-evC**uDg@rRy z*9IjFcg72MTNW>LhW+!IDSCv5mJ$?koi82Q!R~%4rtr)=?6Q`5Y-p4HGOJ4<2d|+X zrd=+E7KNhUfUgCOU}wR3Mji(vo^~Ebn|LNFOX=wuBX&M33GDY<%bqP)(;}t8zRP9o zLJo)S5b#bx`W*;kw+bqG-AhCczuK@DIX!L18MUZxNmU}-W%S%BojvqjyCU+rWe7i) zbTaHR@po!yEt+Ew>yq_X~Q5;0tv^caXzw%*C9;Nm|MQ2*I4kc2ws+W+))}YD8zl$UEr# zM_sfgFcD|bYm9p6e#`S>P8zlj`4;Wy=a3EYh?0ga2S?m;qMZ+0xN~C$^@a=|&be+* z@!B??mBM@)IOU3UK)bWmhb@~j=dlfEDoC8gV%8zhw&0@Yad6;4(;X_SP-QdskB`x+ z_1H+RFP{tPq7q0m)Sg;yS{)LZGLXaLOWHjbJueoSD>2r;;@IFtEI7JP1}`RN5Q=SdX=M_ zPhn%Nw|U&Wsw`WA(F_vk%J!SW8n70lwk5&xK_{-#6O;J#`-jO-daj3Sl~peq1T@?k zWAsCG_L@$jC^x|JSRtgjI%=+Qie5PoPUOV+gfMclkAWpQCWdU+v#4OeG`^;kzwS3p zG9zP89%mn*gGtHA!2A%u#tl|mmec5M5jUH5-a2K+m!hJTG?c%So=He~;b)Rlny54W zp|+Ak$3TPL>3~twm$RYb*#xU@A>f@wz72&ArF_%KWXPZ~ZiM1~x0kdU@6E{rI_aO4 zy&kiJ(?Ns8ax%cQLRL2O;Ls<$cH6@3u9H^K2@vi2zWhFH= z%|-4efKC_TUzj>BeGLVS1?MOC#oT`e)KCAvwq5tyeg_Ec1-RRcFD=FmSk-Fplg2&t zi4Ah<@iP7S>nZlfeFGiK&hOgF!p7_C>*PMj$O!U{wDe}2PGLyloMRLSdJW3Iq-sD` zs$Av0n$ovPOR!ZhO&-Wtl3RBRjjE%$<1$flHxJapu~pYkamwVRE*>sdxe>zW?39wt zdT_iTO=!HuD^et_@%`FVmE{x(QRf4uQ)E<5p4*T+EW5oAvixOr0PHTI9>0o~Yw@Ll;Y2rI%+TB9+&V#3e? zF+LkQ;kXqArh6(+jRv|$tIqb0ZLKS9zq3yi(59o1UquR^*`P4<&=!!6(0HX#L-*#76X|vQKKTYiEK5GcT zOq*FQPprno2FA^4j)?~=OAp?DT7|d|{`#!3`=X?5W99p}99y6wPww@wthUWB{Y}a} z%{0hP-!cbr{sbu>ORa*$zW*z?)itfic}n{YmvnRobzCM! z)`liOGZm{wT}r2XG3|Gg=J2qVj+N(W4Lu#k6=tNy(_OT6PQ~x}xA%@8dkcp{bVA1m z-`91Ed#CaIn8|{a-cJj9KQbcXzoZAz7%rD5&<-kAm6q#xCG`QQTX5D3zZ6f#$ZMDI z1d34uEBMyjEn{#FT^3^|IysXE1kh^eLY2fyrFP~50VxJ$Q7n#{Q!O%36W6Gk><=nc ze_k*=>-EqQQs--KHtktdK+aA_gpvEnkXgxP)!^o z8ce%|ywK*)Tc&zGI-tL`yEzBF`LT+3EfG zc+*%2Wm8AI_NPOMyBzxcw6T1xnCnTj_1td^UuS%lS4CRXXPTL+Ld7(8!#^D*ct9Ab zTBI2|wxUFSamrV5^F_c}iTPdlnb5j7BG8cE`uz!6X9bUu@6iPX`1;zr`r&mrFFz?N6XY%wtkzxLpHY=v%X{`;b z;(Upld0`=?^ay+_8$>o9MVf?c2Q)+{;stW{irY;utQ=IVO`C?_k*R$5WbWo4{27bd!O9FXtX$%d&Ei}kRs*+{ zM}k8{#tpppdU71&qf<2qypm=zUk|O5!xCjQC!jAM!pwrGHBjSNL(@nLnir@yaik3x?R0$7!ogToA>cj>FaU5k?7<6m;6 zQEF8-#laN|h1u=Kn@rBfY+XE&G2m#Z^H?(Hs*q9_zWan3*}^(!1IL={)|XE<+dD4M zZbIKjI>Gg^a#|nnG#4JUIY$L!2uM(~DVZ*s&NeI<)<1D*BRV=VPgZ%cmLt!&93?hx zsBL?MCD`wdowuz$02A^AeaCK|6qh{fssW;RzYt67N?*t?T+k|%!+q>7P1SNG3~@L?#- z&0M(!by4zLXRy%0t+<#0MqdUnjgy6|L`#cO8oDoz$NRe8{)thvYT-X_hy>Fg)%CL0 zrjJM}zv#I|%?PLB*R*I!y^RNF-JR!Xx|J@9PDR5-Yi)(Aw@hM8`{SRteI#<_kWzkK zypW71BSF%g(Eo#-z}>o`{l!58tC`@9Rj8JigoH-6^2E!`6u#HQ??2$h1#Gr6!<_F7 zMah#BlamcKxiyXO9CPazXE<|?M!Um^cS?JZ)6|GxllAkN>gSa2))UZ1IsJGK1><9* zlOc()YU!jA%7c-6x(s;;vua z)V%fNe&<|fuPI~iS>fqD!eFAFWX?PjZnEs^rtp26keUpM=572;E8dowFFO$2km_(g zoVgY)0+!a7s|%y-2#XBW`2dQBP=uNa=Ga(cU5Z_01>U1K{%o%hp04stDWI0JEh zkb5+q7_0rzjBAXTKCQ;ziBTGMep}!=QjzE8DU*|%L!i!`&!X9^1msAjUDeq9MH6X@ zIN2vcV+J>>vgOej9wRr>^_7(NdLslk$)$`5R)!}2sDnJouGo}-jY*ds*a^bYlZ zC9)|t<13UDQTFrZcxQ2a5XubfYdD?jIfgH1B(}b1%_RByF0_;laBZ}MA6W%JZsCH+ zbU?qiCCuc-b~5o_5UbtDM_fI6N~OqR!X}G9L6?6&Xxqxz5zk9#vDCs6zqFWCe);_z z;DX&HvuBx#=NkWEtX=qTPOM2IwcivhH)e~=9UcCS3)}Ixu~2#{JgSJp8Nz0&H1@BA zfoZ2Xyo#p)843~7s#fA-!D@CEVPT#%v-uuX8BmbtGD9Zu6$9m`uaqHGO%kNJGW}{o zgWU;naYM4M^X9(;odi;uGZnba4uu@(gn3PGFv{YT`*vc4aX>~2%Juk($VLP?e2E}Z zLsOHxK4a>6N`I)Tcr#jmN@3glN2KNpKldG{+j34wQs+sY=p`T2+2n4c3*HymY^i9L ziQuiuVrXAQr~n)@yHOGST0H?w566>w&%6OJJ03(gZ)tgPR*7;IJTchwAlp+?Nj4}Q z=w4PR#Q*2pK8yM zhI?>8W*FtOywrdd6EmNuTu=Lm@IRc!O%vprPun~skUH>xzd5}saOTn(PqYY&Oxp$> zJLo)kxQ_cQu2m`+)ty+rJh-H+s_r=)4~{P_jdd17U74?!py{TtunwP?dGxJEqUm9K z%B70+)Yhu%sN!!PlB$m{PQBjWaQ$#IS0D<`4gx0MUrxd*bhZ~Ta1vZuim@Lx_13RI z5X-~u=WdG>Ui=jqaA;^0fluwXJsRFK7yVfUMFh%y4sDbj0|ZfwvyN2}!|;pI1I%vU zQ0>M`_u=e|B&R-tLrFNASd_yA2_!nT?Aq>QQE|O1ZPBj}zio}~6c5Lk4p#q3Tph(d z2Jxo`N$f$OU@(86W_4pnmYsi05Fgb#NrWK1T9Bap@v*#~nbrzMu;^G)LIQ8!=JbBeBJ4piwi^MrJ{K zv-LK`NyH>K<=s1d-${jb3TnYTEiSn-A&wlpFv8&zrrDn~A6e63O<9z)NtZ0O0k`^S zpgcS|Q9%|O0M6)%+%+Bj)JrB!_L`9QkYq}hyBq~+u`7;1FjiKusD_?e{OdRIDt&a% zZ@zjnHsB$<($M^s2-BQE9{JgPE%~7&2~|uDIajBZg@h18wnP#t(mKSKa92M@C$*El z6mv~Kj-!y16FDUMWt;gbSV+y8IT7>{z`EPNZ-pp zx9oPj>Q+HxHba?8Eoei!Zn3sv9v_rSwZ`hOUfFcXFw~#qB9KO#hrXd6YI+uzMpfVe zkd-^*kiLs~yTZ_O+}C$o7;+mOb_=Rd=QH?ZXCU10peU~f?JM%q`GfKN7W&xje~G!| zVxG>w!V7P@=ZPsYS3_*lNp%}y^Y3~3NMFYVvE;_~oV=J0& zzIgI*|1DLX{_ykIO+!xVQRNur?nB|3wWNyVqes>E>zhceb@dHn|t!Y}_^k5{Z{ zydFIY4ORe3YIzwSE@OC6LURN^E&DEFx3vW}<52Y2=r@c!B-T{M`8b(|-jNZ`3Oxvi z)xT*a(8}|0&UTVDHnVRRCBA4iHovZ~zde;9G)(vEp{_@dPBirq6J|7>o@<}R|Ec{U zNsz{o{F~`?rPF`>Z;lfx7gr7hKEuFx_AD4UXZbJjYj$h_BZs=WDIK+{YJe$$x(AMe zmX=mbc5+0zn${N_2>=Tqn^wI$;8=`koeY1zVS8=;76Oe3ebJF#nF9G!dnUk5eaBSD zLlBF4Jq5hSuZl;m}~q@JXE7{@1w(l*GRRJ@}f81L9W zN%d_UKf$UL;y~Y=Zu(0F1s$MPI0C4%Y6;nM_~>RA6t6G6y`KfoImZB>T?SuJwG~zt zRFst!6&2mC4Vj8li^mGACObR`_3YWITpTI{_Yu2GE8i`8Qofx$w-FUb{QYz1f90 z7L3cwP|qL1&oEL#TWRSzIf3}Zewpup1GYiG*3#cej{M2UEH>4t7QTxmDW~l3h_f%s zw9X$&tq8o^XAxn_;t*{c7#u_h!?4^ciDRa4*dyzFzuX^blEnWQp#+t<-H5i*)6@6- zTrCfgH=yrH3e6-UhHq?uYAutale)gSXNU%M!Nm#h&7HJA?(D16&SQ41L;)g*NSq6p z=^keZ>~D^+y3pMT^JGhST>^(Y;qz^It$t6Oag$QA>uak3z{*5r&D^exGU$@`F9dw) zv6CvbYc#a~&I%C9G=S(&yJwKhC~j0^a3NgTKa|vChZU)P+*u?NM_?its85I=dP`h< zBxx{RmTsblx!EHRa!YjyqzgkhE7otkPJ{g z{oYtBBCB~bje+)>4Gj$^k~sy8rm(P-@av!Xu!X| z{_V?)dpuE6#hty-?!FIF3J0fORZ=YqR$9Ab6K@$Xv6k&_=J{Lp7G?Y0?UMD=yte9} zKf(u%4i9$(AjTL*kS|`I5b1t!XuDhxFkAFIUhQy(#twU$Gx%p^EY>UdO|{hT&%O+E zSgyaHn~+Y2R;_Q4(MJQnW_ylaRmeqCi!@oM(@M}xytL$L-(LIE2AQp?2@2%}0PeX| z6kjg;+#6(Rm+88>y1Jg85H8ZIV$$$rU(SLadSS8FkwJpSn?l9!R@f}{&=-$N%=M#@ zRw!8Qqt-!as$+THP&~*GK(rl_EP8RYw33Y1jW176Kf9b(5`ZA48?x2)xf00^G8vB_ z2RJ#k)A;&Hxb=8%nT)o!bLhH+JFm2O9&^Luey{pT11%0)kQ9RDEQNCd$F$zC<3X;w~BsHHQ<-b%RU^KGkGwO$mLczS7nr)D>ih;pc;pwH~D@s zW$x$-$MAxRnbK!*y<5)1d9~)ka6wI}Cf}mB{ytX*D9R-+d3|Tf?PN?p{<)GgVZuF3 zCF<<6?)H_&N1bJ;&KdnS8HWco+=cru@_xnonqmKC^MH?rx|~f^~CV@^3tiA^Ok+fH0XGp zR^^eAj4YZkqBQq{!e09aIDLCZTmL@h6N^ay$%~c)WVeZ5gKYP-2oMKFi0&F4sl*?t#MtY9e%3zE^&i>Y66z)18FosqY2}Y;)HPSZJ zBmWMj1IF;}Sqz8iyMS(~?@6~7g1tg*xv60`p*Mrw-J{a^e&R5_L7_PjHBNeE3)!0R z5RCea{RxQ)VcXj*(J_~=PO$NHWn+@vsq|?A0&;;yl1`6J&*&8BBwZbs zL`Tw3dI~nTjC%*&&#o%WuNz%X<7hw+yTB*9fTD1xl~Z|z?>0g^yS7=PO;Hi)HZ^Z4 z@XDE!c!k=|%6L4*`Jy~(=B{>GOk5BrFDu;(G1*pD?;FQ;@VR1~Z_bzuLYzri(xQNi z-$TIJHrwTQX9$51Zp|HBUjWui{KF&~wU`J^qs4IYZ8bgsfFIEKiH^CP%1G19@0bRE z%V6&>&as|Bjj-2@;NR zX1$hOY&Ad@NnlkjHw8oul=zZ|O&H5HydXlna1c_9Qux@xeaG_csmJ43LJ^<@8Xn)K z*jL!%Db7OpdICuAd9?4VV-j!%oq0l`l|f(pTtli%*IB}6edHTg_TBou7p}r&F6-j# zXV7ev4Obq`@&IB}w+z^DSkRPCO>zrY3ncQkO*004nCIxb9wd7*G&W(pM_ATD==mbF zE=J^Z-sFCy`Sv-N@ZOlm1h(*c4@^$bwTk}OE9MzSlP9&N!nx;r#-_OA3W->31fp`@ zmyVWBac^X{;||RO8ShXI_gG=0wSmRQli4-~2W}Q|%%)#63Jql3?$b1F8f#2DQQzK- z2QGW7aI@2`^;q3W+@lc`FLBky)96JxL^XyrGwXwOE7u5U#l?mlCkVWEMnJWbBee4& z<9U-B)T_db4f}QZ`8{Zc^k+YME~te3k!LbkIQ^wV?B9p`1&`(e&(4{!1|gUpj$1~f z&E6=wLCm-!T&FD}VhPuqrA!C_?`XM?g|_wfB-Sw<8s@MNaIlk8Pj7!gDb%{%xl&P5%zfuB(n(Azl)>ei@iw@q7&+kwwY>XOv-IA_=uLjIak zurW(@Gls6ksul0g_hU>heCtTVi%f_YvTt(N6S7ta|Mt_ZfE9zwdQA@)J-RA>)nWc54SU{Ls38Y(CBqC_(%^DutB9TXm5>o zg6K%3kO9s*&e3x-_oy-RW7Tc^2f1(cK$ zE9`Z#k44!}Kb-YMBckpE@Jk{rkC%o4MIstQ(7Y0c6KNx%wHYMO)oZ-}CUS_K97O znY8$976L6?v{`#?(&r38sSmcs-6q!AXGdXQo@P-c867EOX@G#(#p#{OP41!-LDYcZ zwoEXF7t{&jqkA^i%)nB>6)(Lz&STu>b#!9aE|5@cgUR2!4|S$qqVF2)MQkPW(BO>= zpMpku$HQJ=InGyuZ4y8oU;LtWW`_YzVm<{_r2EZ*2-kQL07^%b!?U;Bnx_5j@7j8L zx5R?P%!1QIO_7ldhwMzFd(-$tH%9l>3;&C6>pWElcZ)@3Oy_N4bM`y9FB!JnKZ7`Q%8l4^Z9X8qy`$VV*<%HATgy6x z>76$n^Ssv%YD0NT&zo=kj7pD5%168T%XC~T2uL=K(K94sa(EoOYCmvArp&S^ z=URPcO7ludb!73H2d}L-yD~V?*~J>{wG0Oi<;lOx?(SxE!=ILcFw_erq^ca)N`V5-DjOx=~P_rD9hma3C z3SZE2a-Ut@W%}Y#&ox+rH9sbdBA#y7KhclqXpRI%_@ES)^~fOpWx9yk{TKADMxxtH zhm*xga*fUl9f9|=dC51m@lM(A%k7CQPQM(#R24tcE<0jmO})#tfET2aJs3ObuIj@a>#Q`T&rYIt)*qN9MSEGUQDH1>-hEh%gU-4pG}gVWzD&sx>X3HmE*~67}+~VyBWMBM;SXu`-YagKPs6a znyoKz7X<&XRg$BqIehD8NQ&7d04i0SD!6sg%26&K7di*II%^eoe!5D!sf1?B=;#># zfCOmylp<@>?L9?9Rpj~jCnF*+BwUVCWF7SVNjE1(-DJmbb!4yZB->q44G-pv1Sz8_ z-M1)Tp8egSVHY#>`4cBT`Lq1KDI&bLX2{Q?aTb|J}P@1a&5Z`_-t3I z=5pdPsCX{aw*EWE_eWz}wVI+Op>}$TNldc!#vmfes=4{hxqWqXG#1TA+MIXBr+*aq2-;C8z|a>%-8^Q5)Z4{=n+Tp}fb(LzIgjoSgd`J;*jM`7W;F-zh?cR`*bYOZq z3Q1*{HmU5uMHKghI!kyxTThc1ey~PGZd%k~e&}+%rsZi5@_7c@yBp-Vm^e&~CATZZ zDwqi~fg zEcWqLxco2S634kZ{ZS6d<0~wk&xC8n?jJ|{W+V?abEJ=%%P^f;I4ZS+-jW+nR92}{ ziu>K{JmxbMH-0QB{y3H;&BHY3sPru%OXYBr##0X`12<_X6m(nC$zJIhKhr|?oQ@l> z>cqtb@fnfPZjOIQ+p*afztcr8XGr18tme5WV%=M1S4(y;tdDi#v~bVLHg-Hhs>)qs zPap9DK(=bBFg`i`3{w+Z#MjqQ&f3#@3Y3l_pSwyITNv-<=&beWrLq)jx$aKPjvrJs zgq>Rl68PlMm=H_WR{w5jY^?S4Xyk|D8?qb`!%O_E5ADt}+Ax7N!YUzMlR3jUvt^?3Lb13M;pm=kcOblcj zW@Aj)GNjP&?LlX(UI@jao_RIlfplfestxPwKmR@{7H zs&-Y=AoEu0n^Ps@?jKLe(yzT5#7DzVMHt%CtdV;Hp4x;k=?3f(OK9VlPPQ4*6ufN~O~VsjrT)wnH)FVWyV6XOdxaT6!B1{A*Iz_K|39 z{oA^?lfJGl*)eO-?5s_E`1V4B2@_A%`_2h<-Q6u|?Y2+OTx|SgX^;h)_NARQvVC(4 zB0{^yz43crc>|FjR;@q1H&o>vh8@F-*sY9(6bSl*(P(s&?lEL7RsWN1zEVWgOlyEu z_n5gFF>$NeRK^Ik9a=86qv>>U^>$Q1^Z<>FGCV3{W)we#^bRu~S-d2ERIqGZez2R8O0-oVPKw(nJ+{aw^07yI{;>Pm=aq_;iquMIJL z!;7L)O}yY``x$|kXJ2e=LYaDnI+rarj{|FwX_CKd6LU3fVvgb^ZaXCQFl1~7jnQxp zC##N+4+b1IMp`crIB3UFsk4C zQP@`2#!SXShGK6INjv(Y^ya9l9ZrU?hwcrhXmM(9P+T(cN6wIC2ljGQN-I_S-+hpc zhZT7EZYG;xy*LR(GHvrynCKqbXTPBFjxUe4)zg11?^hp(aOY3I%}DIHQ#nfHxV#+X zI|l;2f@haQal@LJ8uq|}XzbOMbkp4lk=|hEohxrUaUu)mGMwvZ3@^hBqkFW8gyD4; z?eyWGwoZ+(8`Wj#$*6 z9brFhp@=PiW@7W)W>x%jkVaR2*Gqlc`QdaUQDxNT)B7O)Rqsn`Qy0$`R0L#y)uaX{ z?mo;b!Sqpm@2DE&XOCjFg|y;jF(nBqxLNAU~Q+zle)w{Yide;>8pcU>l^lID1D z#Dd9P&CCM*-_dFAw|&xU2ni$2TD9mJd}fLBn{9Vif`%<{BG+5OuITExnY-bHNTX$4 zSEw2loQ%*jJnXL@ouhP=8?SfqK8@2QY;3h1hNBp+*;4Nf`C;df0Uc7qNECQlu3g7= zDzs&wR%zVw`~JjK%%=qmw=}LqozMGA1AnCJepnF`?$g)ZQR}!qyvm!+ksM+s6?)S? z?gWCk?oQ7xL;YbjGoIm9Fd`#}2M&M*Rk*DC-JD)|X68HVGMzTYsqL@%Af+dKHJb zteg4=^?q1`?GCbT<#=07Nfk4sBB7fh9^(rk^LH+T9PRcP3>hv4cpsUhuicSWmtJ? z53h_a!^Ou}%CNk{8Py~zo&m6I$ig8u0FZENE5Jo*uxK<;8I(qjhy)OhO< zbDN;#-6?;_MFzwL)pdu%;-2BZgcQAS{x{CXltt?As{`?EA#X8GJ@swtom zOMF;Z)4KRZgKVs2WEKSGs~#O-bI1x%KSgSd)Fh#g9roFnFbb_1T8 z)0>F3w^&2l4JUbw#o8HJX%C20G?R@w!mn@ZRKsL%b{AXT8DgxH1nM`3+jrZBtrgqY zb8P=OnA`THxqd#8AAM4x7x-6%eMVnjRUdp*<{KvWrR?eG#@J^3Y}PvNtko3{O_nex z0m)&23k^$Z`Rt1-V>&Z971`mhYV+}^gSb|R8T~f$#)chyLG6p5o}T;V9+!#pU~88P zcAXG($c1uqJH5{_Hv0v>oJ7@w@$kSDxyr}06V<(>Nd zndC%;r_`;3nj;*x4kvCac&&_DW@}Lwd#8?CTFDHz((-M~%mtK83_6YB{&~D5f_JQ0 z&`V(~(h#RK*U9~Ne0k;Xhr_O{`ao!~@()US;F>?~3GKjmEh6QmcUE(gj!R{0K{3Tn z;l)7b(9A_IOSV&e-OCsWH}zf-`sqa`*7|orxr!s>qusu$3OwSBoqs}-NO%1|#>nf4 zE@5&nYWRCrZQR;zvbPH?R*2@dQaa?p_&MJ>m$YE)u`b=fu~lV6d?GtaMl_KhTAo6a zrOpfjNCA~AURFeJc0Yak6?k+~LN=yeNl511yy{s)kE{9N)AH5^ZruPr08^=omd33D z2ZC$x{Ks_~IfdO&sH0xhE_p26snx#h1zAyNH8xl!>Q#65?eS_;@!D%*f-Tu$uAH6h zmI`~QR^rCi29Zpy7*h=tP|eOVnN9u1w(24!eZRO?%@4m<{Kt{&=1rEphgNv$^pKja zs1`~!8qv|}$(7xCJ&1l-gE}4swTi;}D}nHBpZEILSL(~7)Tbv-A3c9fh>bk$cJ))C zUP;h;$LEfBA=q4IO1$L&*^F09+=DZr3Dd1 z5w#KNc{7<)B0A;p6}O}6ypW=@bV$ind{pj}45QX-RfYFW@rb6mG$V1=vEJ@(mUa_W z?d=;67x4h`2^CCt2T?J{I@Kcr7z2$8!TJV4`xm*>neXvkHzwJS%#uB`Tg|r>T-<8> zxsgCc9jB@16Xqxr)}>~~k!}`x`VkIV9~p!G#YO48>C}CI$v~zA{XoCkg9G?mbk{QS zhNBsJs44gxMGNjxkiJM_mAH2qOg`wHr!XZ1N!Q&%og@mKwsvGj4)?a~tUVAtq}-~N zI3i;y@0$oYKD*S!x4CD4eMcGeXZp7riALWB7-z*pnY6RB$>7G#rvoJRc+Q63x9u;z zQ5j9vYSfV0_=?@bc!(ETCaa7cB*Av!X+C@_{}6mP+ZS}88^dsGa-@^I!+~663%i@G zj&Ygg?gO0XYm6f)MVz`DKp}X?i*+uDEgUm?dmzAhS$TxLC17z-vq+6fq{;iXWzT%W+>!02OjfikwsIjFwMYNa>&qnRfK7@N4EfLIo>So6>v*kpq zHI}tIDas+)Wp0vnxh?~ zbO!$AubiE`-?&Y(ibj{nL0Byu;NtQ!y7ufHS^{ zTmWXq+*bEPA1~FpOl_&qciH!ZjaC|Vb1=3XpA1eFsU5Dg==*JKsqFU-@L#mYGH9Q< zA;Q9GMBJ}N1~(Raff&urG5|-3fUEP}jgTH03?S55*!AY*C(`~IMlir}+3jj%SK9Z% zhjsSCan9r5a_|$%Ky{tuaX67!ZRX{^Nh*i^eiU72o~UMPR>t zS-I?Yep!+if^xtoT5U${>`t*XI1+D~Ftj@&nAJ^9PovTWo%A@k+r7vCFtC7W2*?;Q z%}E0g!^t7nNSJS!)oVUPVHAu$=%&?vmWrMo?`U40vvr9%42uJJQIL_vCJuO_=gdD4A>86Eos3gJ+p&W0HF_cv;Z=e>Ita%(;8Ab7+JHR6-HPJV;70Nn8h7l5kd<-}}WZ;|qAcUzWi_bGEL@4)sF(UA(5G7+Z z_v}(nWgNp7qOz+iEndu4tu`` zVSaDJy|eTdz43qpnD*__mr_9fxNMWJ^0z&ymeJm_4&gTo@90T*;~xv*A@(Ozqzi~@ zYqp4eAdZ6>nkgfCJ+VaTwBhhuAc3ov=b6~n-_Jc7CV>?c=-`2oM81xq)MmWnO}^3s z+T3T&VrRu+dHAMI8FOl9FH&cE-Zg8&Q_e=rt*O}&F(y1}lmw?H7y7i@#Pnn2E|UY6 z7#+spO?Ev#DP@ceJqDNEzWbsP55Z-$<*j(>T5%jaFvW_v&I4bk#GUO z+F{^@S=%@zI7=^D^qrXq{0-w!5PUrz*)xxCn!N}uI(bUn@WPGQ{R!HXAuxI_Tg@!K zr!b7o%(K1y8NBUJ6*x0J9+CC4x@4@js@-7Fj~x;EJsr`Fcw$nq#iBvv#x|P)Z(}>d zPfe#Cd#R3^0xA9j(7>2~!5Fwo*uk3m=G(mLC(=|d0xOCz8?TtCr@8YVo?+)YO5HHC z7-Ybes|;04?$7+&-cRJxE>M>zy_#S6H1?rE;{ms!2h_9ZPNE6{Q;B$;{I2`vFQube z+%Z)@CHH`C@%VH+MkB_E)ObLqb@IGKAD=_>ZsJ$B?lfh5A2#SqecCuGnr|WLnja1d zBM$~aum{{stN>8lV*Kp;1BR`$gR%w!Hw=vODSG(#qk9eDj|Z@c{%vm(*5E%ty@w!m zbId>1#zRWN{{NFAzN2XY|9O1lMcMkF+;36J;Qz_}2Tb=!kD8I=U)tAAshWQPe~%vN zasR)P9!-vnDC_F#T3fT6-b)bw7o7Jfuc}H-N5_L>s(}XgzfHcI;o{^hE-o%NYK{Yg z)z;)B|I>)Cf$l^^L~_xT4`%`p!u-FezRr%8)6>(3wG(lATJ1K87h>@r0O0*zsD(Rx zfZ+dYH_fqcd}8PTxhcWLdEMs_BYZIA73# z%Cx?r*|X;!X0>NxW}huYw<;7#`ZL>Z>J1TgF zcQ4GFoji68Rn#L%Kye1IBa@O@)cU5mf0rd!aQ~TKkVpg3a^eavrpf4ne@Co3o7(*H zwXlm$NwZV%K2?NxL~7s1?+nL_a;HN3x&0ljX#4sNboTyq%i%dM1+JwVbXS_By)r>Y z*xmI2^P|Fr#Im)~YP|DiH}I~}YjBom3(u(*Lv?93sN)%(haIzI@c#%_F{mi7cMcc- z^JRGab#)-43147Z#FgfE=qj<(=ZFdtv~1mjT%{4b39Waf-kg?$zC&yR%mK$eGoJp;ElGKvS8TIoX{zsc#MS>U%P6vG>Ar zu{-9U&+~!a_r8#$f3@Uz*c162zD~4UFVoa>swsO$^I9R0)AjPa%k=Rdnq`XL;tR^B zCA|<3e9I0&m~n7G+1Blw0(x}qDrTwuB~4`i7Ib)E^d#+Ps-$I2Resa&`jW}T(Skbv zrW|2Nsc%sA9FVc>$Mc#%JtcKBWgP)NK8b}y`~ypCYqBg!QY@UAUJ{i<@9H~`3*s7V zI`g+#drsRQN{()=lDp|8Nc4%+Jih&&%cH-a;|Eje2y}$3UKv~TRFKvZh>eYH_|%u>qPWW_~g~a6}{OTMXxPr<{h)J6f3UB#Y!+b zEF3@*v8tdG;iCGoF)?#6-6pW8AVu`hqcUJdEdGG~xp`A_Ojr46>5VN%t41TIG z?&opkG!Q}8uuqe&mhmSzr?01O62MZ_#$NWTJ+GoNKR>ngk{O=#yXH;5W=S(R<(0qAQ3>Db1b%JDTz?)Kwaf?wLl;08K>PlHz9N%X!nCN}X-h z5bpkd`$^IkOzP5nP0h%1i$^n1S)~gY(pva=VWE!d#nt$j0{b-KqOVfUF^9||t;e@_ z1qh7=hGd67WIq>{+8H+FPp4u#cnbDK+B#E?INu3OxShVNneh)$>nnD&s}!BsoXi=; z6L8cxqhKb_9amg-WC~Kl+B|4KEWL^r7Z)FQ&hXCPRjY%O^-7^5;U5(Y;9Hrs8#2ZA}cUByj&*TzW_2P`5q% zn0jqqqNkdPBC}^0Z#j$0GJnM%sMb|8%lt!AdJ%UOm^w~(ee8J0r7h8_9_&U!(q)Xg z1_Y&lYA@^<-c(poWi8c&-I)3_|2uv3+6DB(c;gd)J|k1PE;ILiCUE3tY2fc+Qxx;{ z7pre{BPW}FJ(CEvNr$fLZg5;&?oVGh6s7n&vO2nMxQIF*=dD%Q_Y23RHxr%h{14GJ zxn-`9>W_hrQ^FC?X5T-HC^XO=iC+js?yk1cB*$`j?!RS*i?iVzKb$J^-q z{p3m=W&X2P;;J@RQzUtYBe>(s&IhSs2&&weqB1|b1>IzoHIZ%yvA>;px%J(UX!D!y znAnlAQ6!%?qb21~Ml7EJEbyum38T{qtD8&W_Lj-JJC>bDu~BUIJn|tI3E&OCaX(^P zP*uh$UVguyHrB4o|B?9fM&DGlzN|th9f$q|&e85vL>Pmwx9L4mnbxdBgIeYOmF~#- z=CXt*S4D*XhglSlLMk(F(Q5X3O~2eM$otYr2e#+{@E6C)>vS{MB;Tfhg-565YU5^X z=r&`6gdrOX76?r=MT!5$<8UYlwgUX4)4dO9Kdqay@GOW=t1Lq78Y*t5^E2*gOcE?JFK-W{;7-p0hNlHgE)z? z2!DcHGfRPVMzMwU4B4zjC*p0acHRtMpKJ7iaE`f}hX> z*v-~yXfi6{$;-2r_!GIB$^XwZ_{xN?T>1L!v7|bkRRSS_J_GGJmuHz?(gMXt{n@LE zSA1Iq-p9>3&ia~o=9T&vNm5dHvE{8a?8P0;NR1t&#-EJ7*A-fE?I>a3!v?wRlN@dG z-dAabHxxNAttWlfCW7+csP*mJO4}$Wu^0(cq|wwT38W{CvH6L5wFAe&fyIpGZ;s|t zq)a);1hAha1spuF1xhOn6*<^da>HO**cSnJ#?($n)YNx>us|DAbV)okWpkv{b>sX$ zIpLLP61>{D#6Yanm#eBe8ZS%R%8^k3h2d4@eF{9SrlX`2t7izEOnWHdimHyA*lbPX z45gI)0_GcO8N7n*WaS6!fO=nsKngwjZ|rop9lgGS=qolq|5DkZY)~SX-?dO#uz03# z5oIX;Wo4mF@;(@}!dQmxD>hUNkD3wkth8%SEKkc4Z%diHb{yQxA{GPte^9WR{E2H@ zQSuFtzqC@$JEkbNa3Ho?Yj8m4`!tCcyehYumT&r=Zz9XC`S=V+jYa~`6X5B|V`n49 z6I;Axm`JTyG&7wl?n^l%zw#Tw7_ZG`&WW0CAKuCmC&u#(q7kSIu!-hN;6W%#F!wA^ zOH_7n53dzO0eZXs7KJYTYdLk|q445n7Vn&v!mGGko?&ZxvrSd?8<^N=h zX2X8pbfLV!Yu>>A`M40IUO%$()s2eB*~DF8&qA4aSfU-_!x@I5S;1jtQDZmL<_>5q z>E1gn2=RHBYq^?c;{_c1DxmpwtAt-|BovD#-n!~$&e5{;4kSh{qMxcL2Dr7V@j;GU zW)g53ivuuOpIaMLI@}FB!AAD_M)q#Mfynbb!o)U9r zj#~)Ww)xw0vHaa{s!Sz$#Wn#CB%gvj| zeP4917!)=eTSN#&J{YGn;#K&nF(yQc>J<%7U8X92z%XyuJ)Za;>g*AnfjjBtch{=y zr2{aphRSdBB|;|kL4nY34?eC3v)VQ(rTp$26I0p3i|!)4R~@Q4k!Y`EvScT*w|w=# zr@UHy%Yb{d=7n$9CUcfuc_Jf6xe~IL5&`E-@rurcBW?CV2bE6PKkc?7VPTw;r9Ky& zslN;NvrWWLr-hx&%4IhvqU3naxyn_jSLb=?EEPr$ZBKx)U3-rQPN40TBr&5Il>C0Q z=C4mxojad|!-)KK|2fE4u)2*4ggA_m$%w3UAmoRqHB987liYUU)iGqBJa%h-gr&x| zS1wGLUq2ZR3B$-ev;b!(ohX%(J4be$pFgg)XFwmJEQ#lrU-$3P3}i&u8S7D&O|%3e zVq05+b7FtCkMv3xO|1ru*_j5}G5X(Tm4`JaR=2{(YTqWhMPBH|1B#rgMIzo)pcx|3 zm7>9my4mde>8~kl*_XxIk4@(d$MyNR@_i|cn_Z=k3X)R8vRX6hG+)j0)v%7NkGW&1 zm@A1zkxh=fheHO6z%3Eo*-K4mso^g&FT6vl1h1_gCT|2uO5&O;yOR&6p zvznA3_`6PUTBjCEHRIDyNLb+y6(he{w)&COHl6u2*^@lCW~+_pi}?!>g&OX+55`xxQ|?oloPWFlguct0JfJaQPu# zrKrJR`-kuFX?F!q#drQlbamEN^jJ>i6)(F0b6cbsVnklr5xK)z_IqyDXkPH03S;Tk z(9j=+xA7x*_4$^Gae2KsjlfA;zWKy%>9z_S_#+ZAN2H3_LDj*beTCDmIZifURR{W4 z@MP?%fVr3o($N`}nQm)Wd>GI+v$F7nJc^t=euclUvSd)@mwNXeVNLH9TUc|=giJtWu94+boPookvug;+X7xY3kM3q(;o=gm z@13l7U!#sCPP*yzZy)91ys@(@_37JcDSfG1B@xEzJ-%9Yt(i`ZsgL{5OYUK^a&jRdA#wrl8OvzQ0!kZrqh#|YyI_X00a$z%zuN=_BV`LFYuHzA z&G`OdcyvkkfAZq}ZybC7*Cg@s*vf{a+33?$8IRNwCV+@|K{V)61mVVyz&06Q)u&`} z+wMcAH`)rR9Iz*)s`~oJpLB71oEnbSQz&tG^-c4>#-5roIqrdV-Ha?fft=)Vj(ur< zy#w*Ol#|_5t=_+j4MsQ5qh(l`k=N7!eqN=7Ts9OA!PkO(JWOp1LwpPk44(H}&s!G877m53 z1$maP)W{zk-iSb%ggVbiT~29=bp!UDZl(D_y)EQAy`ZUbn5Z{<`}OoagC^VQX)~Ak zgCB@@mhg2pFK;*ZgBjM@LCnZ;`FYDe-fxD{5?(;^bkcs+Y0_%Juw<|AH@36+7_oDe z{HTpp(i=@Afmv(d+N#UmIo+wQcxt&~Ll_Jva3cXxVnx<5W0XF-%;MytQg7PFa>0&Q zWB(@VjTQ!^2?{wEt2pd+_U#ZFRaBMh$Z2k?3QW1ZYaBxvv}Wh2d)>l-%{P{Lecm3M ztLfAyOMhzF6c<~?#fC#o6e@^@wT#I_!uHY z;FwuvcB$lxBUZBB7F5r zO?U16UH1K=-`d}Gf3n=YfX_7-5CwhZf#cM(FjLzQvHR+R4Q-O%7&a; z;+g%=K@jsQ)$kWUve(UALYnXjsEP;q@v8cVn&M`cQF3!)OCJZ@pmj@PoBz>U2yRxJ z8g_J^I%2_o3P~d|v0!Ys!Yk>2W+kz@g6qIb6BUQ)ht){ZXeA&w! z4VSg5{H#WkHeAt67}2J5d9_pOl|Fa{1tzxWNM-JXA8GsT(_Wl(>x7`LAs>W4#sVG> ztAuWH(=~gATM(bXK~d3}vH@FpJ`doJfjF(bQ~vNrbV=R0w5Nfjwe&Y@<)`KigFSPF zwtnI~v-}n4edUx-mx|-!nJFpRlJ2XouS}p30 z&4Z!MLABblo+=QFB8_XShrYyiYA%`P7gNz}fp}ER2@vglbZ=SA;aM0QoC18;+knz(hbm}!L7eY(%;dJ9L zx6+egV6^RAx*k6-IGgl~o+&Tia_Y+Gw0h;a*o?IX-pth7jjR$ezf-BbE$P&toWVbP zDajgY$AfPKaMUb&TU!5m)A`;vxcSX=-6+?zVPKgCw&xKa?GNM26b@1_J-BFQm4BK!zqFccCt3K5XVB9@jjnk&|_l^MCiLQvr&A3?P?nGc_4DM zbZ2bLm`WBkGwR3+G;&MRwu+Q%iA;D7wAiP(Sj9yX#lI^ zIQ%+zxy7KzOQ|a|5x0_Ga3F?Jt}=Db%KY5(=KGMygj{S&!Y0&sH60+lbZA>liARpe zvsP6HKb#F9w!0kcPzrBG%LGm$Y6(b-1iy_sBGOIOrF7(>vjl|sa2Z%vmqbd@I7e(+ zW`)%ORI+eP{Y>vG?$Ydh;=x5zuB)qmn>#4OzF26;p1uBb0bWRhScsl?FWH|u>B~Uu=h~dpbawKS zsAV8F{Az=?s1J3~q@om^UK!1c)Ugey^nC|}Hk|1t#mCsFpUW8dDvOWp(@n>ccuD0c}Qza%E6JmpT{j_i5P9y@+K%>0}) zq1q99Lbdu+#9`*$!F=aOVT3 z(CCl6jY<*Caq)Wzu4K|;A=azRoMC1sq06CO+`5(^o$b{&zL;?}FFB`NeKp9}$5**bQu9)Y zA9Y!$TC3|y&0SXeuz571%!CjVB}NyFsoIFm14#@FV09IOZq?W+snA}C3m$^qHRcT;zqrfUtq{{+3{uAcAm?sr(Zh$5n-TKr97ZY?ywg&h|ZPXsXY>RLc z_LkvN)Q^{jHR4W8JN=%6YGA^W!Scfpf4ehgm&vzUA4T2N;7kz6JFwXgjN)h@#ML}z zES`6ES3ndV`UG^F<=%3TQ z*0#D0*mw;mVsfo|o*Ssmq;?vDVg;&ph8nrVr6GFQ##P=4v_z#8<6iEvfO1CnDY*myB?dD`|^ zSz1~Vr{qg^YZal7Z3i`#MFaSQHt{GqTLR>!o^}ee+IZt?kB6b4&hzoPv|$=16j*Vh zu%z?D3$D{1eMMX`LtE^v`kkX*N{RnUXiMkd@#?4%3$F=%Gnq~XuOrb;>XU`LHKv4} z>_cdnzQ9kJwn76dFsbgp8&)p7x}D(rcHW^`n+k_||KmSeOtZqp3%o1RCr)sMbU%r?x)O@;fheNdkp7wz@y!(=o-&VX^hQR$n~{?fUg7z%JA4bJDFBmQ{d7AEgstMiwLim(`(q>l3&NuSa1?%aO+p{VWXwYVU>cYxZ z-EuKL;q`vosWjn6y8ijK=F`+?nvWUgmn~lgvhaPiD3^pj`dV!rR9y__mkN>zRHk5D z6t9D@p=E{Ecj(<^IL%Ims7X_M-{sYAK+N$sa#2{`@5IyJ@1_6LihApeH%1{CmoFue zM~LUC4HcSpiVQpAs&pwW8Ez|sPW2gb1)w%);dA5Z@C8V^u2VBI-4IZ#o~^fhHBJAR zL7acVtbVJ{>`>T{OTN^^{2E_PN5mJ5D(NvxG7dt__W|9=4Gt3Rh$0 z6R(@OZa3a9#L@lw9pbet#M}3))L6zW^g_t}up?tk>zuA}iChtJ8KF=KL^wpPi>SJs@2gUH2qn{p?G~v%;>96L6?!HK_r4m z;euR}Wnk^sFpMe{c4%rwf91H4t89s54%lPaKC`kkMbO~qk>IAif+hiVfJ8xF@C>m9 zu|#*Ubt{ML(7<~;;++9ZkjExi4X?OVVJZ%Qb%s}^?B<{n`htIPC7o5S5w7wgH{hiqIW_i=Y@Ju-ncjMvJxS9ilq*RD(6 z#H1g)&+CS#zS{A6?P{yi?!%Y8@6$k^;g#Xq>UKcb87@O+J+FZ{`SQ`zsWw^SizzE9 zXn3GiLs*b^xVx_@MAx1z#99uRt|DD6oqB$6kAOgKEzg z+gxm5BXfthDVIED7F;kyZZyD@#rg7d6vxS?*Bxg(#Ytm2XyUwXeLoiBq3KLvA#`a*ytNt?aYr zX1hwI3=CxzV ze{GQyr1G@(Y}>t83JF63<@!nv^tFw1+R=*P&3E99!fHp!IL&?Lb4O$i5kWPDP#jMON+uAUE-TUkL<0yVfpJ^VuR zdghsH)J3407w2vl(YVbJ!HvcQ-i7ygL-upc*Z`Pc-~&GdMO?n{TXbEc0l*}Pl!!#i zj0ZOr$G-YaWERXdgMFDWGgY9=Fr14=J^no6EFQ#F7kOE2Za#VLJV9VK^)H4-f;pb6 z5;HaurvTz4D6D$PkrJeD_bF?ryB$_u3J`$?X!W}38o4_PKuSeM7QXlNa5dD&0(8wG zMjBvGX&Xy3MG=2?-PBYbE^ZywmYo2}gcHb5#lxpUKscFTI-!)$fa4p@6+ zXf)<^;$}vKmULd5el*@*CtjQtLSnY|%nm?0x`{e!GIw!+4Rl;h>Nl{^84dXlUZ8Fw zh&^>np7GaYUcy2TjM(i`?%FP;w*y50^8G^@y*JC@jTyCL6Dch3SfsD#ap|brY`?mB z<^elgR->0{2dZ^) zXcM*9NHjzhcq)|KlsF-+%agq{`8$JJuP`jR9Gw9Go7}8+=qNppJgMB1^i`nF{A=<} zO3*0hvhIfpOcF!3pdHR?z{DBYQeuW7B?Rht@8t$8V)N&CS3AsahXC8aYbdxhs z{=ccY&&*q{fy$ba+7$LL2!c7*LJNq(&b0$;(johuss&O~LlfJLOVNEfKQ@m$yYTph zYP}rlyJkPnxNe0GP5WED$Bd=a2QJ^#CRDFJUA_62GA0FfkTHkp2%#d({N9%l-3Z(J z!F|$~NSnyYMr0#tKQyFYFsG(}T@v1)?<>6uF^rp>(T*juGBF_oEpdOl>+6YZo!elPbN46; ziht1t^LmNM?=dvh60`fhGPJW(TTyXb{U)mD?8~zhUk{Mxhqyvr86$Da(2xjST?6H~ zHgjXit%(^Gaj7_503&DQ&IftB{XJVtsC{mIoa-P9_J(_X!1UDC%zQoI0-HKWHKs2m zHMB_ogFBT!{u0H*#zwyFkUrL;H@@sjw0l143!mzGsdryc(XZ59m7}oFXw~-pdk#JS zg72I_wG@VC_Vf&FN_jd3c)2**avZao-g0~)S>GUx(c!P*O(qsU zFBp;M4>C6|;LJe*w|seNP2zZ3#V@@{NS9JICO=P7rDtQ~h4STT4rdo30U=r{QYh~f zChu5v+Pz6g8iw1_ydb{nK(|TA&sh1A@s=n&d2IDd*Cvc!L{8LA?~*O30XbGkdnz+G z{{qd6^~Ne!PY}{-v+ex%>!=y!l;VOQT{uklKd#qbgqw7V8h`FSX_Jxp&!_(X!T^@* z{Wrg=2{)_=dZC`uE4J3cDaEQ^(pLtBx%JcL zlsB+lWf2XVmi+4bQT{ov`nuQNQ;5$J(Y-l@;5=R95<+1H#W&&LJCY_iDPt~`C9hok zc&cXOIJ~^9q;Tq9ar>)kXOz+<*S?#(Sw5oTX=TlNRx7o29Edt4ic zPI8oVAyBds9W}lHUBT<{YQd)`VweX#q|y-)wHE#KbcyN>u!RV_WP}X6#_>_l3Abil z1TiV;8RtmkdpV$h%VJqk%gE&h)2^r!-dza5^p;$&?PmJ%+~Dzi_i@He%Jd8P9^iWp zCL`ND^)cKeXFgkbSbywQ?VsJK8+4u}>7lD-Cpsd>%lu~PKvT59U-?3`_ooa(mp z@v(mp5Z3ZfkJUcs+o&D~bsiH^1d+-QF+Fm6DSqyM7)pxsHw)(&%ue`SC;*)eL#*2pitOj67D|$z z{ngz#uk$p%HYnKcnqW_AOD!=9Qw_-)cqTRcQVD4bh@fPT{%EvKo3N|_0H6x0h{71)UVngsHn#e+4S34`; zgYNrUAB&|xuAvRo6ZEFpaz1q^ zDxqZ(&_2&Mv9L<1X;zR?k7@4sAg7VL1&2gcd*?uFPjqY-A>P{B+O@EhP20CDjl*2z zma3zCe9*{gOz>Ag2Lj%7y&*9xBcg7v^xQe#$8t_sP(rogBLx^pXm>QW2!Atx$WGH2 z6AQnV58G=LtFk`nqzWJ9=#w9QLk-WI@(OquG_e2loT6T8u$acUM>J*8j*mAESAb|R z+js3({ib%zzSElKcy|3e)p9rk7YjvSu`R+1v>N!RRPXvjbf^gsY^y76~ zn@?@%uprwR$E6*g&n?e~R&o-?Py_orIi7sx(K|f!Zo5k|BbJ9cz^h~gVO`0cD|Y1L z?dcZn(vtL*Z`%rNYfs`l)}QI|)YbPI38%k5z@;b)zp$vn?NIZ?IlTK>#`j=;-mo*J zgSh|lc<-B8^6ItQWrLRT3o#=c`Q)+Ut*N^$!dD_ZK&uah1yq3m2`EEi&LWimw z3iLBUS3BpvB$7ii;OVZ{_I&CRx6$50IjByk!o0M~RAH!2oW|^vVQ3AKM1b6n>+i2j z06bH`1Yplj*JJ`AZnBP~f=NIV5fM?nv^nlL2sOlV(m#B5=;&xbb@O9DSMk3nDB{D_ zR>qCgy_(BC>|DYyh+#F9k>&g1tmtxMvz?KBQD4XR?{hTade<^7Ezs6zYdu|Q8!`5V zklG&$u(=EgbYc)Q5XF1E8tr5VZlvJxhzW7Y zqHSuVX!*z2!BG}(P5g`R>aVLwRPf>E-sefOwlSqcBd3m+cMr?dcYU0DERJ{Rge8`7 zqv_OFzGPdNcc94P2de40ZXIlJ)#*c2t^J*kq7+Z`SM%Wcu;J2&LCRVY3feDPkj8SVh<8Exh(?q?fkRYyJZg19e4vCA9ME z%36lAVqt`#{gKXNu4j02uFTglD?>)7f}m~finZ>9K}tC!rQ(_rSBqvs$RCw`PJ0Efbi|l z$C4&faPofl{q5t;&n-c*U2eW$3G!Rc;2A6-;}#(X?zW9zD)Ju(KQ&+PK3>^X*bH<& zQd7)w^;*a;9Fayo-luhQ_t*`GKH~9haRb!6l=kY{?!$GzKK6?|SOz*Ph}Vz$U`N*E zSA_=|G8^wkuE^q)k ze;qyqf8ErsQn>dh|UBdidV2BPXpE^&M$sT;LXlF8}U z$dIimqEk;W3UJjSrXNri8DwRwZ%^MjN|#2~Zd}Pctr9zfb6%u((yAtoJvbwnYraP&!Wm_V>mlsJ@W8O>kLJ3=Gw)29x1JlI$b^idmsxH9dUZTR{bGY1j4b@Er zN~`-%ETL0zq1b}sd)i+Ac(7ymtoGKr-@rpdh~JB_B4Pi4>;g*ORl(mAaa&m`jk0NTzVNlEnapQ}4e z*8U7j?e@LSi&O*g|LKzhvQOvIsAyAXtgmA+#0QOx&MZO`OAI7z&Ejg(b=Abw9BkdS zH9kt2irZG(8QV%K7^;wS203d6rIIwRubT?YX?5fmN_*Uz#sP+750SQBFbC(<{KP_} zxjynl;bSb{XpT=zG@&4DSffRv7@@#A6nf(P;wuzMxw6|Q+l3dpH#S`d;S8~^OL&SiG-q2RpP*t60`*0USd8l}Hnn$A<^9t+9lU8xp4-<|daGp|d4Cl#y zrrwQ6GHyEyi>Y{casi%W@Mq{T3l4gj?ZqGTKsz&yc7%l6EUzcJ+PxPF74W8zh-xwL zAwxgA{gwM9IcApvX6F<$S85Wwzz?btr@RXK(ca0?SQ6m$6cMRX_PBU#6;senlUmM? zr+0#{9d!t`;HXbNw{ebUIQVpHfQOS#a_|rso|M`WH3@|tl4cx4j_kt1e9YoVJwg)J zxEdP^AVzrewx}+h`MD;H9bZUjLp>V=j}opK?32OFm884g^*+acgxE-Xde)uzph243 zmnYk-Q(Art%DWvVd@Cjji_JyZXC7oOSsXZKkiiufQj8c}^oMku?VVjcb1XkcKtn7y z$;1~+nA2OC{Dm5W@TOpwH%h zW#~&7VZJVM+oNWB0dPcTc27;RnzH)sArTivlJu^KllS_XYpqjb;ti|>_q(9?XsTG` z&;-xOMVa1E;f|`wv{l#pZS38wZBOZ1(r0FKJz(GoG!6bjuWn!O-f;Nz)Ds}aM4GFp zWS~yE$0%IuS*EGa18Ee$AE?DjR445oAtXgshVq-gcjZo8te_h0ek8g&HIyz8pB9VO z?U_EAmuXExY@wB}S=&*M=!2&akq}ek@ld1k0v-9cnoeuZZ5jy)fF$*mE%@i8K z9V|!%yYIn%NKW8Ue+}=eHOOkZRxbVh9Wo~TZS?oLadaAh zM9!!v(hjoLeg?ahRB^p+YD@)dRd#8u;kw2j=RN=Zt3L}YI-Z%s+8xs{v^`;OJ?=hPYnX?d=#HM`st@H&N#Ow`s z&){tQ97mspGPeLTbZS96^;?=iug>qzJ^4P2hFqpa*=wUHv;tf<8$Yhh*;(e+c`nZu zRg$F3>tgGvvcT<-*w!K=MBd$cB+x5pC?5;mZfA32OK_%Edo>?Pued!(?i|438Am)c z;wXWqv!+aW4cuXxX~b_BO2)hOh5lBA`nw{D$`~#j%VCEGFYR=Ct7SoB0?kCj2hskf zIQFE5Sb3SznZ4dlAso!bY7>@ZI@}OT(TkaoUj$N`c^7`EbGbl&%jgeQI7;Nr=4xrH z4*Dk>Y}PHmi+>`*i5%sBBy|>AOeJjO>qLB4Cb=N08)vpQI`#qWgP#0G;n6Yjx;(q? z-5cvBT-7{Gi$Yd-%k75M@|64vC7E`Z>U>^`qiXvrHm2xy_X4*EM1(YRnT?N?4R96) zfNyAv$M0%BXNKj|!lBtiu#?cPiw9JfP9El=;qdUtN(>PVX&aXh2-gT3HuZ1OqryEb z?l8S=c;HD~y0k^5~#DbpHc z5YOAb7IRqFxsW&Z+_0d72T?c$6$2um_WFWXmjORGPbC;WO;ZiX5S~7V_hG1UIWhEO ze)~2iWheT(eOC?INS-HyvZL!Mc5dLaUlY(evZg*Qu`=nTk5_YpQwhn;Q7s8r>uls}&R{ zJ?3ZB=np6k{G#7F(OGZpZ5~5IO6f^Dho_lJ%B$-5`bRt7u?agSB{wjR|4@6GBCm!* z2Btq4x@bpi+%HbH<7K|l@tQZ3|EOZIyZup;c5&Qa?D*5$C7YozZXU;@a~CHp1uNLV zq{sO}e8TLAirA@rZV=r?`495nV~>32FOYGh*0;+5dfP~_vBCu&+B0eePNIC-_TIpa ziho$_XKf^QQua$uUOvyzCwl38O23^9d5<0NY(#F?LGR;Tms#OY@BpL_4NZ>9TfEXC z*FOyr;vA2_R?_FwW@oV-wL6f->$;LCm@WwBN6)VwROWWOQVBa<6>LE)ipOF~d47Z2 z`6&6>i9V}1Fa1K_RjYOe|>p*+?A zLvOZ+q%s=;(7*X4r2w7ewb&Q67;&#X`m>3NxPhF?l)D~LtAkV%5ZM-Gx@s!^R;)U| zQgN~z7I_+^8nkhBbCtlO9&|fa83XjPgm$Fi##{bVF$+Mj7u$);g*-1V+AX~CoWP1< zf-@_*ULKbm>Kr&4{AuzN`HHx$VgkmPFZ=2DYpb}pF=M)^)?z|>V!1%Q_n2#;{3(55 zYPkN*D7gIm0t^=#e1QGg7hHq}R$@*>LKWq8tjj;&I)$@m{#r}Z<{8x_N05G7)XUu6 zk{=xEvEC-Jg-4#{<+U`t)gam+&(KMyKv1NM3?w0P)DY)`im0>6KEiRuW8sFbkA1bZ zpA5Roi}DOv1){e1=Bl3`CcQImcWYFZ+|_!z=tlya7#mAUOh>G&WXyk!{xi>?{3hX%@s zbg9K=wah)21tIq3O^$93MlLyR@YLq032oh! zoTJ*wu^GBQS=b2rPSxOzU2?cN<6(2N&LVo^aq~j6n!Otloe>7UO|ze@li{&I6)|q> zg_!m^K{~p^qGp|UVdgUkwZR(m(qZaTq-|kyJ5s8M9 zHAcl&S-az0cjxvVygWhC8yWD38UgEel1&7+6WK*!=hn6PJpbL(hX&zVaPkDdQeBo*S9We~q_f$Hb;;^@>*Wk_KKXKKSRJOGpcVq1Uq5 z8%?XVGkf!E)*Bv(X@lkgE^yIhQ->B=#72e`s4CYdFI&pw11aCu-C56@)A@Pxn=xR_ zDZJ@xZz(K%ePESgb+Om);b3zwF1$jwj6_<0mZO?5SUW&DbeFmI_+#`A{jter7?$EH|ww8WcI!bwwUIwX53 z_~5@@tHh+|yZ?n;TI(EQLWWZAhc%=h6u2sNUul7FuO(jZbUaU*4fI;0xgn z-jYTw$T1!o+E^IbnmObw4|mc*z4G`cWc0!FGd+xDre5}JTVpM^9%!`q;4(Yy!OLq) zYY--8cT>_RFa_i11j>mHag`!#ns+}8gR9!K#HQpV_2zCbQ-WYR2@Y;7EM|0lthF?e zv;#tGLNg+gvrP@{KSU76Yh32?Y6C_$z`H7=i^-GI;54^X?*Z=DHTk$WHzB3>uYia)r`v&_{eLWwbaay9hk4E&Qlx~FI-iGhwk?PF8 z-q?8s;u=dpFdIcnuqaoH6K)kGgYPTT@vu;GbC@H($QKZY4|NYusF8l{k=oYK^iKLo z!tBsWCpugdoMeHMVER)>27&O-b zdC!3m^qjcutdccNxhYPf3WA_yto5X#@CPzSn++MOq6ZA+O@UZj4z`GaNF_8#>I2T>Fs; z*xJ$KaPwZPO$jZMdEVzZZ9S!8?;Ecw7jB>7W-F=STH07K4Iz{&fQG!_cF^$0lv0)) ztCGG{2N~=jM(2ajzU&QD8^{PW6ebdM$jb?;fIzji&nePV3!B`e2(hA^%@&({sNP3; z75m!TGme3EK_Eq0C4sVnwlW%Vjhlp=J*w{Q;>c!t8b0D{x?!6ZwOJf7=E%lAea}0w z^M1Sb43Evlq8Hj1|Fu5Mn_^glT;OgBZ@2qSrY?FOs&pFtu^04oW=Pp znqZ|-q@|-XGpb8mVs3GwKF(W_*CA_QpnZ_+Yr&AA?ssWiP79U?JxrcTYuJwB0wKa0 zWz;67AWUW*sTpLVn!W2m^hy{E?Um7o+AbZ%dvX?jSDJND#GM+G{7-#GVH)9lOVf0G zBeW@#%9OfOXPjR8BX)pW_T7RAYaQ2u;xRM@3I$5u8rl|DRb*7=*o%_x9)CbiVlA}a z%dQ!15S`g3ad;px+O_!=wD=^!LEHq_3eLmP(m(_#5g(rbRNgI; zzQfGGxZ}ojt$^j47>|dK7gz0y6B)&RI<@ykRki=_?vf_~mvU%oX|w@xT=C+>+|tXz z!T4iQX?<3G!nxk6F~r^e!w2o<9uqrH&{^Z!l}h;&{e@BE&$_n0x0 zt9LWoJp+R9+{eA`qwTXZ30L#239`lq+YAt@-Y|g1$hcL{}zkXeFgD^ws8@zple4BEHDvdl(UT)?0FB88D@n+2#`*n^G8@ zu^ge+At@^tJ6Cyen-4F#ewaYKEq!d=FMDJ_ALMlOJD;7(YdFR?&cG3{yYREKv(H(dgM2pY?J$`AhT>qQ$4jLYIf9%M83}RU3})q;$F&lo zlcGiV`;&WMYICmpa2*zL4OhBqS;qfSWDJ_Z7Km=gzh<4bX#U`U+BhY=8b*axd6i zi6JL|-W|&E1^JUPF@M~uu$-TF+xE~&#q|FGHI8t#FRCbk-C&PgizVwiP61MlzIh4e1f z#JzeiB_>1`1MemZhpvm3b)5W@W0eK%m}h$Pj=f`2Ag{Eh25wi>mOnGuZ=RGK71U(C zm9d#M&lKnzYhVg`py8duDSSb6bX1sBK`gwnmm$GZxMu^L`b zWKguLx_kShyf9j#Sju2WY@mQkjG|S6Vc}DiPIk&=-$(L>j){$DLso(eDWgOU?3AtC zbmir>)F)=%<+ic#(6sr~w+tW?xJ`F=bH1r}jN{Yq6f-9if|b??a|;&uI`H!h4G(n& zX6P-&Id*e5- z>zBrjtpAAC#`H&;R>+HTAtnaj$jHUY%QyxfxM^0<-A!k(jH#1EMwyxNz~4SFtfU;S z%yuZ+!Yv}e&Uat(%G}4r$|1!)b5}q?F?@I^HdQArm6$R!DcRe+GYsPt7>f(!-0N#d z?hOf%HGY^SHnuC&ivLsB6UsTY*uP896EDL55-t1xQGf0Kq2*ReLksV$Sjmn)?v->o z7ErvXGbKz=u9O!6hJ|5Zge`miM&}_f`I-O|fRGv)<>rQ@{W+HH9wkK6Cvg_qjs$?Y zteC@Ss93mKV!%irv!StYmK$}J30Kw`#1lWFV_LC1(%8w#$Q}%3fZ-Ihea&)8$lXfB1akQu^UM=*kz0hk_WG=K- zbS6or~%N}mOex140jnmvxY5M8_}?bk6pG){2~+z$_oPjDc>C7p z!B2YwmEA9{@vW4nk&28M6{I$qM09Xau9~|R>jg5^OGGC{rWy+j~4Hg&KA(Ar4BV1fVVEa^? zmNL247Q~4-%nB3vv*=Q;c!m7+Xn326Q|cPssHkY>c$0vdNW}`uw!WxOxt(8HiO$q80jN@mfy!+8nJ=IAsx4m4HcjHQGf z-z4DXG{}J#x?050Db!$J8#l7_%H>evO7vUt!+*pkedOfp&1={|(Xn_6xrOT*!>{s} zy0**z)loOreEcM>XnOiD-@m`kL_IZ>*hjxo(T2i%(bZGJ#!*my%FPFD(%!tz72jSN zts$oxm}K`zVcgM`-ZJ;-m)|ib4l4nfrlV9b$7`>wWWONpy#Fa4u@S#G9(KCs?HoZa z?hOu6J?ptzucYPpF-d6FK~v!7Ss&*#7;&jC89eeMcf3)miv-?xLq|-N4gy4=ggJ`i z=Yz&ErOa)V=pzVHbp(02wZQs(72lI~Y@jx~<^$n*G!h!M(RFRVetxLD+4`#!dBwn7 z!}DvnUBbZHNMGN_D!xN9dT&!P(D zik#Xn`c)U3(CA+C_;>AJFu%KTe!MWFIf*Ch0~A7ThLb1k1xpMyU%v=-i?$5qd#l;L zHRdv%yTKy|FtC{Z2C$oIIGete)o_=9!QS^5-tr3Y^Gi~j;o;*Gvg5CB5#r(D5fC6% z5%3BArO8oHh($H7{FYW$U!5b^p*r3%Rh5;O#@CG#^e2dQ1iV4Y>U!xR0i-c-J;)*g z$Z;lEFw9n)Di2-N>@&GpwKd~aU>_-oca5z~8yE9?xYQqY(5q|l$}cz@ z-E>TdP^xVI7w(IXwAylc#UPE6DQJ3|2L1A@QQy!p4}hH@+_po|ae%k-9Cr=PYEVL@ z>#Ov`SDlVGEna(h;QfTpww?8@=7?D4Mcl-6lCJUAipjc#~tJrIY11wz0;83`F`!x92oB&&WyNY|r+)W~O%2sAdYcy4}u! z=06ubS))54NeDCr{WVKPe38Mc?7J(Ie3fhK^SNDFalb(E!fI>bijP=~JJ-sACn&N% zdHm<>HltFnx$NmD1T-TS3TmYR;l&y-`{GoumC^D}IP06jH4~>c)sI^*`qHl2<7;Au9;`6CT;lbj?9zT1R@^wIsVSw_o>iS)(^^_vOg#=ZxZN1viekyo9C2|R zRiBtTFJq7$WlI18HGCONRTn20=h6y2ZuSD3IIOI!QignN`D0$zoBsx(A4QA)nGm#a zxyVA0?qX9$x3dAx9u_@9*L=yufSXqQP~Iw|m3YPlZcxoFsZse_#-i6K9D17r-6?=Eh9-uy9EKWDy1E)?`4!rBa+ z-D-&pbOs$HUvuG_!sO)SAVvDty%mz>gn%h^t%o1WZrui^zLN7{G%%TtMGT={bkIg$lnA0 zcV(nzvM?Ss-1o1r@qe11%p6NLHV~X^B2qiO#_{Tuc1jhA>@qPmeZ{bm8=IaU@pn~> z)wZg%>Q#Ih-kWBW=+k`N+g081!_wu2Pj9F|p&QnYdjzSQqHt}Z{-XOK_LM3Y7grqe z@(qxam#3qn)0X~oyr7&LiMP9dA1Pe=Ty!jQXN)?QM zYbz)=_bG~hjx~BAL7`_~KWT_|6Dd|8rJ< za`zOeCW$qs`wYo4G_(?<6p&l2|SR*{yHP8Zc4QR1Kj`HtuUXFqc-G5%@ZIrFz@^8zq`!L;14)Ziu<%G00L^L;4IMf>3UY+Hf~)Ru}5*p>jQ@CyFN z&q)bOVmP{Oo9u#?f2k>LWXLMeQsrVCn6$>dLE6yk!E{BMR{f!e(PZ55SoaWhbLGQ< zzR2Tjjm9>3qMeNPR?j;~Dc9SXNgm$!g3YDg&F@*E1=ca_lj-qbes-Q@3Sy#YaIem9 z4>IxvX8k@URsOd(pAY};qEDXuxA`LfW1`7__aBji(M3nAGtZBVmL4O;V!mPsaS0Bz z9{uS-xykRaJR#xM=H`mQKlaOzjLzv%0?L!gP?I7zlV-ivsn=dz0ZY17p7*o*l0`WIhTex>1p2BIX14AtQHef6$+=DIpieb^ndV)E6ASqGtU-z_j!q}lgP3+Bz%~0 zI5PLDs}^g3jmZ0Lh95Ew+K+$RzE&z3cg3uaRIk7HWj(yHl(NZ7l(xc!6b*IKHCJ%W z&Wr)tvXHr4`Ty7Sv`(JwwmX$j66#i2)nZoKzu643Eb_zWkH94sX>0V`UI|Z&x?*l{ z19-2>yLa!TWfb2hY}D~l|5@4c#LR%ZTX^x?h5N2di#!%k+T>qg7I-ys_T#rst6!~M zy7QOtNv-+MM8ka4Rxdg-Vat;<3ier-zc|J6*edLwdNKa#JNekySsA&{r^bf_#f9Du zpZ5Nhu-7*Ql}VAs6X(xPPyAbM_Zm`&eDL46<@uUr?LkS0ieB%!adf}&wVMy#COvoM z=33SovinD)+n`$xIxR+hKY;pUn>&a-#z7OtIJE6n}-c9+fEx6CU-?w^=) z@SoYN?e&MBIOXct8tiYq82^iE24ac%hj6K~F(xsi|` zo11%I!*a^eGd~=>-T4g-O|QfTUpFw?dm=%nuea~4o>7|m@#D*%O8}3EOMar(vDNg- zRkN+%{m!53>Gc)(?A!az?8=og-nzS-g5ad_AU$d2$*v6s=GL~>r}ZGIFVdQ&MBb@02oNRr~m)} diff --git a/bcs/support/images/pc_customer_subscriptions.PNG b/bcs/support/images/pc_customer_subscriptions.PNG deleted file mode 100644 index 77fba8ef8b208f29eda3055b6450732f7abc4e25..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 58677 zcmd42cT`i|_AU$}pj1&HbVO7XkS+uWMMbcJl_I?>(n5qJ^d=o5AUy;X6@5jj0)bFM zfB=C+<&_!&AwX102vI@^<>Q?5{_eSdd}G{k|GR69ovfX`_bPMGHP@Wae3E|4)<#rF zPKbwxNA&6yt2;bA2OsnB@CF?c*#D*O3SDjgix+ao<|0oGQQ_zQ$wB`MH!tw;)FXtq zJ^A;~4~JfHg7EMhee$n^m*S@kfW+_kL3jkiObKP-Fw}(U!0nv*uzHtlq`__E%OVmf3|L0@*@rvUGLMZHn&=q|K39+oIsc;&VV~^ncY){NLAIQh)z`a`N=)6Dlga!Oc^) zQvdYIp#?kErC@~wv}^cNSxScI&aIT`#F`FBV+cKX`Y+w%hF@^q-PM*h zVPOsDgLk(%)G+k3=g)ta(fp)c{Ir((b5(D5#>V&%3Pm4}R$mAVTxMul;6;UmE>bY? zkIZfyPU7g%0~Qt*`%-b_bYnJ~bw&7?OlE)HDdDjB{sg2kMC}4*^;~q<;UeH$EHBpw{{gd(3uzj7z_qN z7Deo9-Lj)r(Rd*@pNQz+?}MhAWPqW^)g5XA`5k4FJxr30IyL%zPTfAgD8>4TrlWAV zsy0VtWFGQ=_%WbX(X-$9#}{LN1Oi`GR#F*^5dOs7VDh31!?xVS^UI41_LCeI{bMw3 z!#rw3GvNDQzWm_e*TMiT#}R+?f8Ol&U2>hXte2Npbqcu5FsQoCwkG-K%~FH<)xXj* zG8(>xEet-j&X%L5tD)*vKW(acSf=n6BngT?fcC73$qEEeBA3oZuMeo%yKPGgXpeq$ zPW|ithX>F_NlnKiE0dpb{uMDPecAHPPz6_Ufq=d&S#SQQu&R-nbl%qI&n2UGIdm8; z+vrPc_+v@+dxt(h9<$!p&|9ysNIYRsc8vI3;tuki$LA6v6vvWok@F+NVdvqp}=2t5Zi^T6+9Oe;hp5lkRSIptpeTYJ`-w z!06)!ju2Bze*R{Q1+SSVow`Av(cssR(WDw6J@o{NT9A|-V^J*&V_Fz|bGihOWT((4 zi-?O8W^8!GCn^h68wO1#E5~k9i?+d`PMEP&eq33j0x=q0otv9GO1o^k8!E%_Y_A$% z*4+D|Cx+YJC|SdDiS*pBbyF0TGpIY@A~FhYmnG9&9jk218wL}SSYdAozWuOCRN zshZPW3c!zk023eWk%0eF$T-O*b%y|)?(idv-3eetR#1Is=?KwZ{&Og`do-KBlYREq zi}*j!`zu^S+B^{#ruS8{g}d5z`<2zBP{%Hj~E#<_CSD!YoNL|vqG zs{{}Nc;+_n!~Jf>!c>iJq}1K!>QV>Tuqk9s>-T4y(``gu}xJ$h`uj3b~z zx*pvN^k|ObH$HKYhtx#@&ElCG^tN<8Vi9L;rFrH7r-#}O-W5SUStUK zVfdhW5A1;(WroA0;zci^49ckDO-=Dezv1pIS^er4CHgUi>H96c+BX!ApC0B)U7!=dy);$QF=9P}>&sdk2ICc>v+Zn3<3{t$lm)sxQ~F$hqFSn`yx&d6 z1NNgikfU3Rh=?`BMWClV^F(JVix#!VQ=`NCGo&=CW%#FFcS8QmveS> z&F1<7;bV#kW5}cOIW6Mnx849yBNcBA6rSqM1bk$_Tzk_gG8vl0D%XjYe7HDNG8*l; z=_u=p4tsN7rkFTO@&SB~S5IV89#u=~5xKwTuUcEgJ6}VljoUdlr zB&R!c?5+NhKUhI!$Av&TvE05Z3oBcrLEvqkz`$A6KlS2!o)9bGU6x<=t^3DW04op6 zE5MS$cpHbk-DBdFoi8Zcmie;x9szfp95-Zne9+z=Ndywe%bXS8{m0uQLz&Kl3mSY9 z+Y&2sBy6fN8b}M3$-yxwf~R9i#YE3?DrXG4f~P7FL+5X#3Pu$IRx8N#md;SumI`wC zn5%tqDTmR%O~F)Mr4SZ|XaO{n79=u-U7wEpJ(M_A%2l`HA;)1{AGwxq`%i`hY13&U zQExC_a$HkfD9j&qgGDs;pWJU;Gm`~QVWTJv>b9Piv)`0;k2jw()5loJC>R;OI!mi_ zu{HbwzcCMut@*TT>()rtcO0UfN-Chhm*?pP>lH8;AIl0t7mJ_q4QcQwFMRhms+Qei zYhnRf)CZE79B|=4lnWyW%ecX^Wus8+Enj;VTO}j7L?T^x5y1XD-3E2uX>oHAXGD9O z&qOYL9EE>1j*VndY;Bc*w4&6O73uMf|RWr&oPPI zI6#vy$J4aXNOR2#I28n9u(oGo%-78kJ~!y_>^~t*Rd8FMR!Gg<B`--v_+fqM-q|_Z( zg8dcuZWt{SO9hpqzx>tzDRAPOkouY!z<%42>BCn6jj8+UQsZL$A$Pd#-1w~Dse%F_ zfz#t_iv=$#;&x>#Vzdv{DYdR$^0BLHksaF{HNJFn)5OHxmAa8WLl5|~EC?ZP#R7Zu)d z9;&c~gQFJ3`O3*-!EGysA5M^X&aw)*hvkv`)~i|UZ;_Tro1d9d8h%0Yg*UyN=wWNY z>Whkm)2VdOIMCNfSH@bQkTbO4fu65(F*ke|f?kk*JQY^f;9{}6N$bQ2W)Mh^OfI-; zA=n1!;6QSi;wCke*brtx)m8J3&!(;6FdiilZ%GDXBugbizCNilzwsj+Gq0P;6$9@S z12ByU0%@hYb32sdWQ%r%u@y&J+8t9$jL6C@C}ax6pNB2w?|ck#2`SKgm|)f{-^`Eq zMti$K6gIr&2;xbBLzk4wjJ0z}pv7nz1%IA0y!`52A~T&6_j&eQ5f+{Q%=anHr!UBg z428L=D7B%>TLOmwi+t>}iz-Fsc%#Kk*0^>mZ42z~<+M;=LI((Rqj$<123Bx?7CTnT z_sAXd2Oq<3c+{2QFDlvCAe4gm^IAe69Y{c}i>?Lw22zbx@>Ar7{uPqt`6~LnMOE(# zbs4cu?9{Z|CdO-kr;CYy=&+JU^1eL_i>ZKfFihmH_f@e2{%(?Uy3aU6+kO*^bs(*J zj9vxjogS%3bB1g?WRpXpX|SG7r7R?J`SAX5xZo?zC9vNy*wkY;T3UYPD z;k)!E>Mrd$e_`3TH`kq6^Lk-zK)i$3E`(bj+a1=^Do~_KLpxbn?V^z$q9jgqWFmf7 zOwq(K{4wPX0djyevrS+fUJ?Z%fb_GYcHmo#Xso-!a#?`55>&*@^xF0Ck_f#k@{Bl*h|zhlB|pU15ib`|FK7edu#G!Mfow>~(PBlW}&uqvh@eU!A9M<%4H+9kChWTrjHo48&Xi7Vd`MskEm_1(Jq7 zvM)SSSh#Dt%C&Pa;uCaMb+v7YUhiKnV3!T=m!2>E>JkxR;7Qv{DN6(nP+9t3>}EO5 zMO0Y7iuB@e-2IG#%Whw30(4hpq&X|?Df#^mFy7N`9jw~%tb{;ZSPaFyA_yt55?Kq| z=s;u+yP@ug-T}g+FxaAU6*lAH2m6oJE4^)L9lKkPAH!SB_V?%x+ZU-%IoDY24}71| z!Z-s_T;KV?C<=d%hvXQ7wYWXLcHG~@rQ-0h(~bqs#EPjj!6Sy7vXDWSoW8L?*^+XITjmX&LOy8 z8%gGm6=5=(-V5cqkAtDB;+h{Y$KpA|rupM7G;BIe0`IN!6!DsAIZuAtGkZi?74m9! zC`6!D=8!indnz4qKCHt3OFZ;z-Piu$!Vsld+2q*>>OeeKmcZ7i#dw_qFka8CLnbvX zdV+d)x7SRIatT=LW6e}Miya^S^D_Ok*ungfg3vvGk77hsXa&8YVOb|0KdUS6ULrM? zzfe3?gwR^Axj=F1?Ni_j2b~U!V%i!np0{fe@z9qc29b^%H0!c;%^L{LZGWbF*#C;)^wJ=b`6=q+yO~M-~$+rZ-mZ=+l z=(+mxDfYFNY#3;Tj&Ebl0A+W-$yBAM1 zJNfl)Q-xP$U(?HPfcjXDJ+vd*%Q_)WybH|d_zw0=+)QM0F^6E|ZLEp7TYUslaS~;U zCe@?58VIdo8nt9M%_Zb%(iGVSR^z#=-wAYG%_K`>WU%YqF{#`$q*SsXJP?xj1GF1f zvGDYu{ZXge{>F29VUc7l%%Pr`a{8fFsKZ|mGt&Aklu7QOQPy@BB#PJ4ds3E|gm zQ&)I9t|f-wZu$r(&P6-T_)O=9i=pJ5*q*KlbTxrEN5GTGRZRXV{qOR{wOQVEK{(+8 zS&KkC5MZ_^WVAgYW_ZvkftE7I^>M_~2E&rp6%7J4-9zL(J_v=vFMM*m0$V6zjCiV!mxvo@i`$R3#M!X{$H$C9#5 z8K5~#OJ!Jl%g2`K$c^Pk_jx!nQWj)h^j(O#!tP#)_E^HmVkjm1Sr$@2j!)dhVjq_4 zX!v@GXh{7e<1x2&WQ6010&{ATNBnW99jE&J4Up#`9V_(t?)!z`PLH5(D<=*_>=bspI|ajIZjHN8AP3t~vHv%gJYH3WjvLn~P%ZEZ+ZpiZ`K zu{?q-xF5PcUeIqAX1widJZ0W2o;|*HWXU8ZN$sF=%W{vZ+P*eGY zeou7F#5-TNMwd`W%GWMy^&-ap3U=Ie^z^7KS}4G=WJr3w`96N#;R{S;fudm{8fk0n z+Yx5wWGj2bC$?^xNi;O1$o@?Qr(-Xn#AP-&`dGa3>mo-(<=1sx7hg7JW5CKDZn|fN zX+XYevTby#EPWW{Q$lrhaxo9SE3gQ2@$g98|0tRJjV>P_W*M<Y za$c1hRYu^vq5liDMkUkqrM{qEk5jA+_>gm5i4jO(eUoGw#d&vjMD`@@GS8^LjDa`D zuVW2-N8kiJ$Gc?SRkQk;UWIYaUE6Y@GlWM5&-e8vj9YonTBIaJ!MYQ&ls zulAKX+x|$UrBqO7U2s23e(6MY(i*52+#E6!?D}KgI2jPRNf-tJ>P4|zd?Xu@@ilUH ztH2Z|u(4rxz~nrM6KE6KQ4QHYl*)@2jg z-j?_Wiu-S`Aqj@V?h7e`kBg}y$)UK$MEu|h`McHQkV~!~b#De~?NraG_3`Td@U=WV)^vunkh9M8pqOye~hcMaS$F(fjrv$cIR;xdmVxSdOp-Y7!_HSF1_3N;fVuX|I zmsxnl#q$Jx!g+!QpW)C<7MFiS-M;#vVhB8N)>R3^%HqoLMS*7Oh9Dri3^7B1ZBfXl z)-tz@AREbkTBsv(QhfUlPp$`B6DONn;M>T-0NLjgv+3KG?#zz5( zGdJ;;`gl(zW4zsBK19nm7F?z;GdO!fqju;n9T|B_0Y4BI93@a&(rN3OBIQ#k6-(zo zsgw^Fo1eZ-9s_DJ0#t329CKP`Lfc!aU2Of8|FeiH9igGWh66QpuHa@xwJ}GyOk$wh zAsRY|E;zaXR9ecZCV)YxRG6EW3E#2mvO3C7;mQ!j_wo7cHMw_0&$X~BA- z;GUcB{C6KDum zx!UN)+-?CeVZEfoLv{>b8qlG%wy|bU+;CZj$78-ATg-4ADLz(KaKYcdbuzjg90}qH zovPPdL-%A!IclkjizpO|idu(H{9vMt=mb6i`Gb4f{;^1Nd27%Wo%N_UKlMq-@U8Z6 zZd<6bXD^C@^2C)RZt3jFQ2pl196Tlto%HAG&mi>(f4o{p5Yx6DCQCzu<|D8VC;2Qv zmbx_hT+~dx+o!kTZ^HHuzKinM zq#B?**XFytMQT&@c?M%P0)S!!KE8gCjQ*i6?|k;UulV;A9i7b~ zdY@yT4{ORDIRe#D)(`H?DhBL>`C8txU|<4Y;RPjpzbvUlz>Y#@J4wrQ`RgDY?#3=z z;hBzN@MZ7bM8t<@jS3})S@{W~t3}&&%lNz*?Cum=;$nH zb=|iv4F}tfNZN1s?%W0)oKSGawuq~f^bquxwc#JEmdbuo^SqYW0K|p5h~YnYf_Cc~ zx_5Fe$h~#Hjvf?&ReM>MK?NIJ)`8s~(n)rjBwHojBg8-Rx&_#y0ujbqgs48248dF@ zRG|>S2UGHGPX^xfIyKHM?t28p>rti`vmfn8?t_Dx;HWj=uc4_Dt+o;dWr|f%r)Xt0 z-#5!aB}9$#!gBmv6O>11%1u<3Tria>&?gNwMB!Q@Ix+lE7?DdvXT+5=K&cX>Tw-Vs zgSah_Qb?urTN}}t>LW!QXrtt(K~5* z)1bgH7>WDlfBGt8-t z+nAjUC@T~stw0|%m2U|AR5ypamIL`-q-}6Q41cBa*hx=5)X1#679ixDpX8UrTP}x% zbu2^-z+{Vzr62b&;~t(bsRmA-KAry-1`RBD?yhfi?D=oS0fL=tj@7p6&9r30XK5@{U=O5|R^aOI zxR{g=SYF)Nhuy2TSEsweb{jB__4qb9WZz+B!Pz>>2&*q99V^amZd6{RlX+_(lr2wE= zp@!i%Si#n{rQcB6R%4(ZVw2k1Kqa=tZ(?eXSuHj|%Hh4qBmq|8y}1ZTQwc6A%3U;- z9!f!iH;Z=A?dZ<++ecTcTns5Ud#8MzJVO_0&xMts@Hv_u>r@TM7BU?xjHiE+`Aq|# zr0Mxe4~Z8(S~YTUuevxFx;}(uXhxCUL{iqZ#Da}hy~!2rBrw?q9R!c{K9WXPBdXHi zUnWiy!3iUD^Dfh=7HxfT*=4Gp2_4{H(t;tvpDkq3d^L@Fyw#fDupWvwn`-!A%2a74 zettuIqt_ifXB+>3D%KUS(X$crt;5B-xYjgW=2;gz%Jcw;3ROC0EE=n()HyyJlgq2v zak5m(&dpK9K7*5XhVgnK!gIHAnH4>_(krCHC|&^P?Vv@F(u9M27MN@#uTded|0KpV z^AR~%A&0gPmpu=;{se{8$M$a+@*Tz`l^~2*CoD*2J&|&ZZwr@o zD7UaCNf6zxHsajhGmd~+u9IUGoj=;VhVY2B>PjpE7;Fk1v`xC8;$|?9&O;dM9_eXP zfR7n(Qqe^to^7QodQCxawOz*dsl96;8wecMK~D{m86`Q|g^niSe5x~doPr%!G76;Z z4f>rV+`iK?w>HT|cVDVjHPAdx*M;gFb5vR2N^S;%7;+xH&-fFc=14{Odxvd_*=F+R zNh!HG`ST?*B0Ojb{6&cLHRcgw1%E-dNCz&-;Wd0pkB(cQ1q~=5aO>)3oe+uw%0YZ$ zbH3rI#zo@R(V_&=du|_Tk&W2s&+*w%H`l|^<2BlRhh3!2t@|?Ml#OSJ{X(yC1EwJg z6`ZaQ^%zA|GqLevga-J`_28&`=omnr<69TBL?alw17~EnNWxh59e*?8A_^T?>^L5l(A$O2{^ zdo~AM6it#11g=>QS|2BXGm^3^6D&9*Faw&t(wkAvHe(S0h}YN8G^wjvKDvyV+z&8ZS$c= znYU#rDFZP{7v#nEqJTkF7#~9yL$}Lx)ntr!`a%I-H&}R8o}9Bygi7mHz&|rtMx57n<^y8 zzO!mUn|=%;!RW#o9{b?-U*ReVTp@Jo`3_?_JNjD zsK=YDYLwnVhybG_JobJrqs0@xXpExk+ebJR&35$cAn*pG7A=bKReEL5kg#p4l#9}J zxI_k=t}x>$00Sp;_X9+(9;RUn#YN-`>wpwncf)_TQ8ToY z&V06?AO^C1B_ufPP$B{IZjc3FMEge-($&oe2@VfI|4IP2W6@J6y2j`VT#V|v0J39} z8Gkd8tmeCM-f~kn6$CS^#;AHqZuuSq58Wo;W<3=E{4lD`4N_D5OZ(2pmQJ*~c-pF#4%dW`@`F1bk}>9rm4{ z8dG7@qH_3vwcN~Y>@{Wl!n)s(sh0^W>-J5=-OaOfuEvb0+5&3u0d3 z{pTl!Gmei{AjEa|fW(4DuJgDDHPykZgzXX%q5s!lh6Npq318m_I9Xn*sZzGYOimYA zriB{eYc=+MQ?GpCDFH_Uoovi>wPPO;fqoabMThRMF~?y3#@A+B+X(w zm((o8v(Tuv5+wEFV%sJRw$XBzhqtH}5HRMLot>>`ZVwAQioR4}0M(gx&h zkpv!^5-#@)DPBc_>+ZXL3!#NYEP5#Nw7gtT*nX@=jMK_IW;JV4U&cMOXTp0Z7FhoH zY<@}k2oGdEo_lBq#c-~fCb zx05{LZHd4^4dldOuL znz*6si@75eQ^`|l(?oM@u$pptG*qY4Skyo27;8qJ3qcJzgxsKkkl^x#`3(;v`epKI zV#jdM4+X%cihrC>T%n3>Dp#(poMzC5uHC!42E#|w+_g+uNpU4=`;e3wI%ivF1}MTx zFSa8x2Tk{YVytXDMkB~HmVWsliUcEutryTjDI(G4`>7oJQ^f@?wyCVSO{8?QVk&gK zj4N4G@W^&IO53haPvyjky=ag&Ym)@wC7FU8){s54j=O^3Ux;dblkkgkoMgIG4$T!0 zAu8HVPrh%KpkrCbNuEd)grZjE_S4K=j6{_gpEb@Hfe>v#jK~W8bb4E7qZoF97N)<} zW2jS<%fT9Ic*|lQB>+CjybjYUWg>^R-g}V5I{4i`iu&i-hu;k!)g&wgC7pjQ7 zc(wC$#|?TbP-;4>#xU4gAw^1GOOQV7I}2riYo9}Vs6egM@KI&}POtnCabvc{);zEA zqn_c98iS8B-5`Goq(p(7;-by?38P!kSLQpDmU<0hF~$Xs{$@anw@mGkeS$~4i)9vpLlrm2r0Ar5Gz1Q*>|2ldFF%aKI5wYk9XNKWk!VhRMPez zTZ%Ek6g*)+&mYsLGER9ii4W8^3F^1Ni3BSqOO79ilJ%EBp^q_&*ibHhQ za?DZAo{PvnnJ(9Yh)!d87%`5|jhu|GF0r`SW56f_{2+<^{p>#^z&Htkz?yqhZ#jmh z?=$O!ecoSgCxAqVE={iJT#|_W--v&?Lwh5l|4{2r?5X_Uv;F@6nSwQXzJoFw(0`bJ z5}Y!$Qq;2U|JLu}BF~1-%zqy4pSi)P{-1jXtR(**uDhfR>}vgwyd3IdxDkQlb-ep5 z!BDhI#INiskL>@M69dMchU$8DAJn)-i)fSjUvuKLX*x9=6gS^Ie(}cj5o`vwQOFBg=(X1Bccj&b(!hU;cMK6YfyGU}Uv5Vr3+ ztw#ZT*bq2z_B;L>>#gZyE4_rIyA_vLv>21F{}IKy9WMU5RhG72uuwv0ZGzUhN^nS} z<2(r^2K`I;)cV_(dy2PzjGaBoHb_gY6;CoWZ~2yV+X(3B?SUX|YpXLh<4-rsX|i`rMvCTkMwPpUh1+d&*R&!SHI-%61|ye(hG8>rE7kToQJ$KJ4!C8=Kvw5wyr9FL&4J7M9c;D)J%R;XmlllxG5e)s$dfo=; ztR0>8Kdv<)DBQ&FtSz}%dx5hlW8dPp@zx_6sH!oSAARIU$Xi#HTbGP99rat_N+P|} zX&K}cV)(V=HZYm)?uO%<&PsnjhRc`Q_j`-OY2`Dzq8egv#$8KB*zO&f-$-J;_;Zc4 z@6An9@5fI6`68g{7$@Si96X>PAS#n#+W8>If9k%~tg@NMLvsyi;Nn4K^CWDI&~Wfy&kKZA-b`HBGr^Io{8)CtWmchK^V==4c8v&fV5~8 z-OVi;wiq3HD(CIIb-_{evI>z#bFjcJ`(Cg6b4w)A3*o^@$$$5t`NV-`m3YT2W#-wp zB$wp#@*9e|r#zJgh1Hbyq_I*6R_4nsCw^_NxZ7|~|<(t+k z>ZexB$4&^XOm=3e@VE*u>2$12(s zEIqmm%z6Ih;gI_$LEjJeFOTxrS!?frCHriPQ_i>9s)h{Y^-C;=ydhLD2)wnGFhs(` zyIa3JKdF9r>-j6z{hkJD#Fhzc@H096@v3F^I_KkR=2Tp_e;ICVa%UJE%XJY^)Rn$I zwrmy3R6kSvog}xIXEju=b9AO`A$$pYM)K_aqn-&xfM1pJeqO(em391?*N}FHFEjHv z*u44}Y_p@RgUrJE0abI@vBw*NFCxC50G4_h+XW(%-$%K;djK-Z`M7oXQm1UH)Z%Xb zhiK9HCe_=yQGnT`+>!bxUqQ&LhM`_lM-?*9CJ*{TPJs7rL^lJEejfz1ZgU9ZF*3}b zMaAfchYgoI(;j>$V50`IdydJRhsphARGraN`9U{u+{m#dQtjdp?NUNr7UxKUvQ5m> z!y|s)V?R$m*L0Fo-~E@dS+C7~o)KWyOd})(4^1d#YdcuIa$yFZ`CaAOYxLzEDdO*k z#q#i#jYVaN`cnsLQ38?oTXk#UYv3x+m9P886}gbXhyX8_MIH(glZAZ}apys%gmb@z zHljs5W8A3AF`QHKz< zf+9WRS7%;a`WUe3IsHgs%3QqN`8n>RHu1N}tgZDutAk#z@}5an#AgDuPpGRC$(l+_ zeVsXpRQ|OMXyy@FxWr>WF`JULWmv>-^{7MnTu`Ke=2KHQ*=)$-rbd+rjxT15_Dwz_ zk9ipp*?)W2aJyyknQ?ig413kP|G|sXvE+(Can{sPzs}^5H?6OLkoz`LM~@ads(sq?X-TZ+iK76KxN3{y_#HrOj51;3Zu+9ZTs`%ZvGNFY3oiJ$ezEi(qm0|qUIP>{7bes?%; z00wN=bVENcD}`y_ZHFYpzak9D}$V5pwV%Z)m=sUm>ha& zBDQ6FojPq3XLxb=w;g-(@LP(M=fU{^Pfas#wJ+)E0?!C*N--;HqFHl@?1nbb9cZ?G zSn&uKHqCF^s~RwJ3nz%qW^&2)Z0aLB`Tntqt<@{(ogS~>Ms;W_kja)P)2yVks9=27 z?w{=VJ0G(TwQ+xu`}F@LWgAu~d}Z)g`wb{Z!%9A6+BL5>Lr+QG;Ja-bnM69TyKcVSJ{>+V z1SpfASZWV}%JyN;+BuD&*-1|$GVo}A#)F@x%c~P?2b~Nv;Kb^BT1M9APT9U$=S>Y_x7ct$b608cv~gayqSFFF|m2BJt^y;U7jyh zV=>loUZstoV;)$Df5#=BZX>AbsZ(}O|JxL6KSO%`z5020Tp|eS{4GmdkYS)6d(1cd zoJ=F>%+9nE4k+oHyfNd6;S9@qZ%&@6WC^!r(*dWPa6QYw$C5FRYIVcHKQSkN?^rV( z5RN}rh5fVZD5lx;PV<21&!;CHeZ(AE*jkl))xv$4n1NB9oFEN^OtXlISC->3-`~6Q zExAYX{mA5~%=+a|X7LkxV!!I9$9)DAVeg?yAf!Ljx+J(Q z`;xu>DJ*RBX^eHPEIq5%-bPk*YemmbiD_WD`m3||q3Q2ux&b${m}_4Y`&N#DR$iYP z5tlt@VeB7`Hu?6$Vm?{I`|Y1!%$D14Z^%|&D^Ty`ymy&kJ-Su(>UPIPsmhDJ*B>nm ztuBhH%Y7`nr=xD)y1q%oAJ*Ri|2&+QaX|e!Sn1|gkiJ0pr5j_^A7iuYRM*RsUUapf zwQKBzPM2)E9KHvlN*UJhm4oUqK+abUPdi(zH?Po>e?%6?;d(celK}Q^uBGt6>8X9hrUTm4nWK(MRu$ zGkx`darTFN?15U*X`iY!>}8K1* z6_RuOg+-rGcZ>nd$!ZoXa-IKVH(&>KHgnk-LG9_dLT<+cOxx%eB1`3s$roTh5->1K z1TYr%;YbH3Cn)VC*elmaTzKQ$chhUsg+TC+CXiCiEsKLTaz9wNBtUo6G)nCc zUAo#hJyi)8`*bGeXYUDvumFSLrF)Wy(Zl#JRYEGjOnIloooaWz^|cE*Iu@H{D-WAJ zkDocNvGs(QZZqubG-DySb;C4R>{yZ=d&}$L6!OPJ-5K+s3gLP|yO&c!7S%C-9a5?( z;u}%Ycx0$UzG6@{LM4)6-7bsWDzS&enL}s#U8-Nl^I)cQm6ZYu<^53u*=-b~DV8zr zOWSMh!RMlvn(2Z@*WHdL>aNz48ChRK=^M+@DYoLesaILbcJ+@3~vc29P1YJjoZ;6S?B z#Os3boNMnK)~-!RW<}f=33OslX$!lZ-!(h=d^x9U#HP-h8?ii&7F0{R{?aE>q@$z` zr!=T)%-_^)%*+-d$hWX`$6%&@|!&dWtv)!sl$jHCLK^6d(@aPofxthytR;PG1=-P+E5tF)4RN? zaaCW~X~J}A%GIH$v^1qVJGh}uYwUHX?6MPjWVKZ~weCxQ(xUGWU$2zGBl-CA&Sp#g z#0i(G?lU1!W08X=$eN+9dqOts2Tsge z?K<4)>JG=zb4Eg)PvmeFT7m6ldBf>}{M)y>euZ2UznHEAh**hGRRQa&@az%)4i%nxTK0SnKz5`71}tp8&==6`Zy>%c{n8jiQRptxC(bVJ;O`8a!pXK zXnkvVqT2kB&J-{=)OqJy%KDGrTs|Zl6&LrFj@78Fd2Qy<8F>J+3iXbT0emUHs&9 z=P9XNzsgaIS#@^YL6#VA?P68Q*%WqRJrg=;W)T@4UhhW~j0{F_r1s*E)Sg30F?K)k z5p4e8C+$`*QeISV6448%5*P){OI`QF&H{(<4+=kI;!-aa@(ALOyC=-OyNA|Ozpt6v z?OW;vxdTecM*4`;v6qF~B}=yzRb<*sWi7;i=2TP!B+pid>(E}rlDUj0tZBw^U*`4V z@n+K|JnWl@wAbnz+0D&;_#`pTbx`|i+SQ~uCAEi6M})QdJeDEDOmLOlns%(IA@UDs z8KygTATJ5Su;HAyMmIinQ##dow6K>@w3avix8%Xa?YP+IrhT9z0^`sRI}a?c)EQg& z+pN#`)Ut4Ek$c%^U&}?PRp6ejzFE6hd9D8eUEg z3wYyLibU!+-hZ%N09@Ofqt8|*E?v0}b`Ian>?EI`ZAi41hLk>{K##p{r5;=L-svLdBZ_+J ztJZ0A-|}0cY)^DwiW%PMDwtGs2+q_2N>a^&Ak$f2EPYbNzYSYw5lka}YAU8kPorO& z1Iw5HB+BTQhqQVU27<(bUr*7BUGTqOsr&dO&8-@?t6=` z_e<^eDpEUQ_WyxkmZ_Yx<2T;R)W6 zvCS77!}ph0-7{T&%P!hT;?6dH(fRRYLe0~xyRb9iscgeg%u}b5q_U+Y$kVxBnWv#< z2^_p=HQdN3SbOSFk%i2Oxbrio5yg9}_!Iho0M zTkU=oH>P3uVo>qVa?8l)D*-whz0s2=fw<43`p&j5xH*=~QH?<9o5tz<5|+1K z2&d+p^y(L|cm3@I4Pw1=Ip zMHDs1L`~Qqw)$Wi_A2a&+{SAzm6?|y(>lyLHqCtO75aA|WvxksQdSSYU|?9@9O=3C z-205{Ifa@}C#%g162Bbql$kKlkY3Hc{KtNx-lNY`p`jvlBCb0yX|uKZc)>`Z=Tesw z@kpHVvSW-0-i#sD2e^CU>+1yi#ju*=77FIRY@Ii6(Ydo5xVun#-v=C`o1@EQS}57{ zo}Q@Q2oICvyVp6?U#ea9NNuBRNnSG9mYuBn+fiMsG(X%Jw{to8N}a$&>s%S-{?|8w zPB$o=rIfQYdvH4HM%&8I3qbvKbIk#u1Dy2G;e41IayK!{c6WzU=moZY2LkWO3I+l-(33ED`7lHVdc^|v* zrE=v>S)ZQV&camxH>VyWFVFx4*RO=nXqtXDD2lTJ)s@E5Q&O z5fT24=#1J3*In35$D6NeW#Oy403f3 z-p!J9`RwMVZbyiyMwf8Fu^oF|5U$IBw(^Qq}yDndbZR-zgszP}Z_RfdU$oi|R#V>YjY zlN(s}*gr;FQBlaQx{qz_m=EU}S7Lv>Vu=Ezv*pb7_d`@`F%%<_yZUX23Q(Z=>cg)9 zd{F*F9~TnA&)fa6Wi^*{Z2Q8;L3M1u_?jJ0e+!8j^8eHyk7YX}mjP4DIP1JMhd&z{p3bKNn{?TtmtHF&P6s&C!2TDWi{v&v?0EsH)e zYQDn}0kHfrq%3U`eB};wAixq42?=g;Hgb|5kH?U{K%pIJIzI-RjPix1@_~Itf_2P* zvp`xr=QXC_fTv1ITo`i`=Gv~KBnip2o}iGB1-(^WBYtAUp7f6nsywCR{vpLshxH$x z9{E0w)&pPGU3y2c6(wM@S>mv-SPoXB?*Nc%t?grOLNeLfhLGIyCOt;cCvJVqxN#-O zeo{YDcI@ko7Q3w57CpUZB&WI4V1JM-?Rqc2i%%}GmP^O6JBAma6&?H97p*~qJw}pj zZ)+4=HXoMr>+Wz-X08zfr9rCSUL9gn5vn?JhA7i^4Ik6+CejCVR(DUk%ECbyVKmaK z<8ct&uPUNUnxse>xjEfneEedg(J(Vh`CcH@ro7eT`yXv*uYp)Q+1dWt>&>H- za!-25q>TWFMlWaX5*_%(06l&mL;S*#Wj|#is(y7v55oeI6-|0_lQGTSeo1}t^C~C_ zw-v43@1w|Ylx1qG6O1_(?|zY>bdhMu{zmOa6{xDvQXO^u0|#PYKRZaUL}@eF3lmDW z(ZtJI#b3vNday>iIA$-|@pP8|xJL$Y9Y36N$(w&IIo7P4W0oH3;GS$Y;N->?qQD=u z$<-nI2oS$3ux10O1BL3_r@BekASNAN`@nJ(i2j#Xj|PWtsXydKvmi05k7Z>-xv z<2KYW{kmps9R^Th@d>MVc(iW2p3}YCO}ED(x|tt=^{r@|IBw?N`i2-4fCu~N;z)dO z&6P5x%ZFGwTziuY;CVEjyU;j{>+`)9JQeP}`0MEsdTLh>l98&9;_c~61#?;s8VLzO?tY13L5X_Zy)nr%?+{;?-{FFNQzBWgU@1p$F3J2!YaE-r zUt3*6abor9R3w|4eIif}6T0MJWqq2u2B!8=@u7RP>$y-ZM;0RB0bHZ|l*?6{0QTHy zT9{m9jL~+k3zF578e6G@?B=vADFT}6E^m~~@2@^M_9XiLq(c#BH*Zp4KwTDcKJt>W zFr>0Zp}qY=#`)u^3kH#-sN1WD`xL z%aGJVD<@@Se)LPT5$G53O=0qR&0+T9Ij5wi=bfMOW$XHr{&6~@-Pb9pyk6CXAZMO? z49l|}GvV`O*nWygfrKLW#e^4KtDCfc&?`+J`1I9+F48izd!Db#M< zgw}p#&BM_Pis;}3rtqABujZg6qDG`YG2D5Qd7#NJtr$em2d1F%XW#{fD}NFfnuCgL zS2a5sA6{iUIA>{%r19fM#vpC}NL5Ck`DY#QO%xoBj?C(pe415@pT>>bxPD6QPH0E7f5(aKUySurVd7!mZz(=>)3%{l=!1L# zeIYf?DhjlEr4y#~g#F_5!A7r~71h|t&ujr6x^q_M`w!vZg89Dy^uyAN>p+#|G`*Cx zbk`nw$Afo1;|t*2QN3|Ox?c~2%XkAT$o$XHe);((cI>TD;||V9I46lM1}vVi{bc|^ znGeSP$EZlk{r{C0(SO?HKR?s|3m>DuXa3)u%LX#_C62Sk$=>QKIN?OS(JbYv3Fm4U z1@Y7@{);(3E4;MXL-uQ_f}AU^7Qa%UTZAcT+;5IPjT*tfZZ}VVN#E}t|h6}ZldEcCZPFKBg_v-O07%8Y$S5djf z7Bl%e+uuK`-X2t(l$S)thDrT-6t=yD6$AHRpK4nEsqDX8=tJNO{YD!yThn;X2z0l!9~uuCPc8J9rzx5cL~S8mCyK)+VkavWyk|mc zWf6Z2?g*%`$6?|-iz@5|R{^s9 zR~&V#n3x2Y=9vNzIE{+G@bbA;=tK!!ryI|1bn$OwQ?Q=-pb|PYIhd{`TR6>Q?B5-} zooR0(Y}WYPcafQEp~aQW6MBch3^^Gm`?2MgFWJ$~I3xw8Az~GcVM5A3AFah={CY{` zVx`tgO4+9k5Ooq7>upp$I%Sy5@#|pt_H=zUmZtDu+De?S|51BQAG@qvf})O}wE0U> z@IJL}e*$LPGJL!yj7Q<^P5EUgjgCNB7)r0^tSL4f(O#^+<3=vW>74;XBRqS4)oaZy z7S~v|kYrKVOVKGj%iPr}SZ@nQOs_NR1UprCAwDf)9bdV!RrbMSERYc#@uh#F~8+EHi7J|0Nli@}S0K=WUJ+Z*LV7 zu-HAB^Myi#oy5;Y^KExcNSetz@R%+NIP#bJM7cKWOk*8(->M_&c#M|)4Tco_kWuHO zdyY=@ACJ93eG(Xyo9ppyq0N=#nG&mmGq@kJB1tD;9d{IOmm(MnZJKJcdvDk2L&4YO zsHX%D*{n{R27fSMUhBDij`_=`xu9~9T+_za-y_oFATvHfneQ6))FW|5bU;drziGSJ zj#pQkJWa}QBmTkX3oO;Hdm~cjD|Y*cu;H}Rr91sP#bW5G37hE6>Fd~DDzb2b2CGxo`_yMcp<%oK*#GR%j^+fZx#YM z3ZuI^=XPDT+n{A4?S$`f0C841yW0thSrow%{)DM}%BPCKQO2&cV1=T75tVski+H(9l?lu>Tcv7zri zx0lzwYv4J};cycaM`v4Qznw=#6i1`^cM2!kxCWUw;yX-FVRCoZFI-8xJ@-tuJ^bvj zn!WrJwvC0P>4Ei-vr#$eKXJ#FTuVX~M`*HlO^g|kciKu+0{(fPP&P8Ysp-*JhQ*8` zvXJ4L*A3Scp$h{Djo=xW#nXZfv*Pyr$cH3jAk((Qmf$ZHnwb^sa)RPd&IrG1jE;o` z;y~Ylx0LTVDbCi^U$L8Bevf;2PMt;{-HLtx4I?i|pp1;B7p0ah`aJ7&t1x|GB+RpImU)tf?a}Z^&Q8#{ zYnObTpq6A>nW&8@fE>t%FgTbTz;jwl@UFZ^j z+=vEzaeEl}q%5vx{1eK`*X}`2K1=n`J&h3F_}sR$|9s9mce}m4ZLl;d}>{)%XSo)JQc52w02b3>vargg|~>C>8yk@*KLX1f;&ya?u0HPxQGaI9bWKMVK+ zNYA~JzCaAWb&?lu_Gm`-@nf_@{UpH%@P@udnZ&HOyw{rNPrlu!$r6pvCk za)Z&+?QO32(NeMgFP@}~aPb;=v)C&i3-y|Ep3L)PGjLP2*bOo}c%?d|Sf_;TaLy)p z2Sx9ET=#Vu**7n4rdAI{?uxGq_mt@+@a^f3VFJ-Q#j7`1Q6GV%*JUJe7*w{4LH0VU zL8r8Q-4&lGYHf`lckvHf8!_{(?Ip{au~bTQYyqAdj5(JB$I?fj zU%5M=hCPq2lf~lSX0#X4i)7qxFyH=+TNV?mHxyExiXK|el6XuCR*g_4M5dZrDRyy} zBMFQ!S?p9xndC+JaV(RTdP+v*=L2Fgew^-gu=@07n}=bi=K~Ao3?j_vsx!Uvw=X9- zsSd9Fo}z^R>32gROC<*C)rY&SNd3ff^?92xWhdG-@{_jm-l|puM?H=r;Z#AHpZ)*= z=gk#{9S+!m8ixogved6MK{wPS5np^FkuT&heU?ZRCgjbhd1mT^-+2pAFF7Ht_hd<} z25*$-(csWSz*qfzMmOq6RU6@33lK}BC|fdgQ>@b#*bNGtI{L}R6Zh7L57^_Tqqbl5R8+_xc`^=vtqC1Qt zs~LV0is+jj{f3SAr*J=gCSg@SNp#+#0kgBZ8rTyh_g94XIT(5~l=-7>Be#adQ6|6u zrVaC?lL8m+BRv8PXS(j|F|-^HqU~^b35)p;{0TcWdLXv6%iI1Rl;2g(yU|?IvcrP- z`f8G% zlBvKMkf@@1TowyF8M2a0*v+^9U-aRBwR55tTdak1_|DGSIiNx^_3{O-%!KW zIQ(*$8=R-a$Td^ofcEZ_=UeP3&5QiaOTj9dJ}lE=EO4gK!0iL&OiLY3AeDq;P$q@oqreId(Vh3S*66C)X{r$Fhk&-rh3WVp&0=jRGBi)nnYf4FP$UxECO@1~1%d$o9 zlagH5F>9QdoAcfDAc+s0g*GdR2qp{U+ZXEHpQ-C*MdfN(+cpUZ{9bs>#-nSSyF*eL zy-d!Y_d)k>XUVS~LOg6Dc{KS~IxF+dvJzh8JT3oPsXie*xpt+AGb@1;Lz00X^tSEe z&2ki)I0(>PbIl|3wC&?{fT zljR>uM|)XslklrhoNHsLqF-LpCBk-^1Vn#eX7~hpb1dWbFFhC z*IUI$ft=D#6~1p7Y16tfE@{6nIDS{`>s7xga3`5*7r^rAt7FBsMMr4Gz{CT{oi9{Q>O1~&$fiWg?ODXH8+W8HVQ3_V}W z1|JWS(NOZfGRasYW0r{)PgD`%lmIiuKq2-iMR;TatU6fQwiKn8F~u<9=?U?Qy?UaM0STX(Ew5_n_?8>V#a?? z;nEcEUz9TVZTh)67URz=WzYyyz~9;nlxdE8c5%~akE9NrS~)>aHR zibMqy+bmZ0*^@Kun^~kytI@u$>iv6*6tD7^suC{d#zkr%$-#KJ6sC53N-3J`ZsuZ=!$4u^j^n`I}RZhz*r!H7l{F zlrm)#Ipz3ykLdx6ZH!Z*tU)o7F&hKYd`?04G!+6-&JO5Uob$q3xMcrCIncAa`8LBB zrnH+PJ4wA8b25VkNYXQCWt*!2qrWdg?2sl&<3y`1js#i(jdVO5 zBEGpxj(g))O@%;u5VEIAhs^YnqBpYQs}CL~4YwRwJ@N-*{A2xc&V5zL<3IY&H09kzvfzZ)-@Iy02_iPr z?;JC|bhsF>-^AP-SYZ7palc^yk9Og~5wp7IoykI8B)=(=^|8x8 zcgKZ-W@_=`jzE5jIq?6QO!GygY5uQ-KkTpSUE9ZBp{)lz^Y(XK>vQ z#{`4iH0nlCe~jJ#mRBCQ-fPib_kaP9bY$8(tTX~yIj4z4fKUu;XYT; zw-sMR*$MsWo(otbaE>6Z^pRyb_1H(7Va^0m?(5JQcU?gleXPj{u;$oL{w)Lz_>Nzr zSWkgDk5fZc+t(4fS&fUnEyO0Tk@*W|L0{Efa8aYR@Y+h+G-F5)&q=hGS}rtPzCusv zK-1QnBjI;Gej9MPExQ6m-DcJxY5&^n-?q$0{gD%kS|Bo4VzAYLnoxJ%Rtgs$_hY>)e=M?>ty=VfLJYJ#tvfV+I5~ zIC@;uze^vi5dl(K$A)%&`WTCC03ec8_bU)~KEL0a{y`_tNW;t4cUm*I|KC1;=J#E~ z2yrGJ3r>i4Y-}{abGx7ELpZS)hwf&cf7&6y%=RI1cP|ZRl~2|IQLYOSPkJ8a>&@XH zBBo`(H7F<}3-oL+n`rP>*C^McIBBkvnc7uNNnAmXbuIN2s z*h%)H6HZ)oWfkjBq?P`+J4DB_U#earKDY->HE)gk;iM>*f~cu{gSx1IVcFO%DhpJM z3$3&PN;X|@oEL1J=kq?7%)Q z_$j^%y2=dZ(?Tr9`Kl~^6NGF3*B!@S?x@{-%WY?=K`PV8{&~hOw&?yw^4UB~{Fzw4 zGq8b(Z%+?C@q*6eadTA5l?H=UbHF%er@oH|(;({)fuEH(mi zdz2kk1c<$o+e_q@TED#lxgB=SQz}Ae{TBjwY3_@0CxieV zOF6c`RT6#!$zG4$lQVA#`>4m*_2)W=&)p`CG8--mX45u$Y7$iUxu;Km7XMt0edxL$ zH46$gjNQBD;je|gx~R4B&sSgTbM)4kMBxQHusC?F6G^3k2!GGR|El@5!H!bcht%v`GWBEb*l2^cNNVt&;Q|;NoR^ujXq(!Bdz7Tmn^iODHe|pKJ*HIn)`)ym zR9>%c7lklvZn)Zft>w!!sswcgT%Vedh?>(=`rf$;?%cA%4iRcu2*doXr%n^a9lgW_BQMp z8MJ;dzn}t6fxYAl(JtABOyl0P?B4hMl4o) z%V56tZVtZJsvt`4F0TAjC;&wGDL#z9Ve?DDbhfI(;`H?ipf zYvNb`(YX%bI0J(8vEDk6w`@7@EG*dU^M^G+4#r{nLl+w>v(nk{U0O)yn*zLvrc=qsIio5*?k^2@7wy)1j$-Hh7lf6#(= z(;uX^vBN%CrL*5@l7(wB)t(@GCS<)~A}MjWLu$hLIT#^w-wKp3?dd zVug)_E@u!zA|E5&xt+T>jK5+*FwYFS_b+GgWl9QJqi@Z~>k463McrRJzQ*2go;Eh+ zT>ETX)qL$p1buw`KsC;gj@#MMm09+bEcelnd%VjC5LJIGWF_P>UM6!J%8)Ls^aiWu zLt94GgF-XU{_(v1t-{$2U+Jll?S=MgVmkMEfnYY?wJsF{#TuPcll2(cz(aH* zWLwZ9O&V|hWSFtkFu*vr`Nxe%$OswaQNTeq2aUcqv-aw)sT0CF+tBIbboO%vXWh8$ zSy_-rw;I;|?lGz%F(_>^j6H#jK4w9X$F32jjrZE@Ts4mb`wrXjlq->CRDMy)lrFZJ ztQE;9jbT8evR~7AB0Ciny=k*I6ZJLO=LKoqD4|%dNPJtXM>*&JctXc4Y`qtIoM0l; zCg$8aH^$DiSCw8WffB?f!w06c2j?2J%tgUs;LEZQ&c?{>*^c35jIvFN zX@j=j&$2OIeT7_(G7=;2!OKRXsXoTh%NM~qkLdOL*5pxPym%us(r4~fQ-5wLY@^Rc z_!{-hO)gVSX-}^7Xfvj{_5>{~YXy2d^W7))<~S-UA~@CXNr)n^6G|okeN!GFevt!# z5>dbqsWt7$_gJA9{mB8E*Oz0yX>yU-VoODQnKBWB)K$*D>1*LjTZeTQTF8S9Eiue{ zFCBJq!SqiEmKsYLhzFhaaH|Mjw{3V55x$V+X3fTa%3YkOQZz3(NymP&QyB>7v6%hC zqtnoa&!yxrfU)3%=%7zEee;V?Wg$bOjCa+LcYAaV(zu^acw*N)cpN4<-b|;GKUtRI z=qGH#;R>S%c8$!RRTVB5cI-J8j>7mG9vhG9Lo8+*-;>Ukg?ooqRNiZk`UGvvVy{aO zUFrrC2~U<=HbPG@V>0AEJZE*UVwL1;wX--t?~N8dzozmFDtaliaN1Q&~ z((g@rTJ27a@6(|>6Eq3TDtHYphbTwxC4g@a^V<(Q4f5-4tJn9a8iT}soyI4S?h^&M zzDZ$*i5w-tlII@c^n9zpBoF&Tr4sL609yxp*0UA-pB*e|2QA>rdL)Rx`?8a8!ubU# zi=!>MF3+rWVYqg3Z{vmka*5o@XCU9YkoA6$zx_4^%1115ER8jai`-%8d#QWRUUFvd zR=!#}a=&)BbE_g4+H}15c?)z)Sv94kv{Qe1S!(M5Y=zKFgCmirGVhQ}5C=-{FJ6B1$+kEG_ z+nXb<2B?Md;XrHpz&nLsIE;FMSC2*vXMLcsP$=GpO95RkO~E8a*y1(Uz0d+BuCAu> z0tSWZS+4*p_GPPopQtQQqf7(tJM(N${3A-vnLIXii*m#@kiyqs-9Uo*z1;g1^NBk~t5Q^Q^(vyLs9uO@y;*5MMGJi4NI%2XE`5{dhI|47gfl*QVWq-N>x@NC~< znSD(xRP)b9MsW%+`zWy=Kydk;reJmX^YokDav3pU4K3v?ber%>ndV^4r*BgZ4ltSH z^)?D!KKt%MFa#C-yawh;y2MIVYWnzC02{qCn`d10rKPZ<)r=NY6+!)^bQyKV`(dqWGaxQ4s&T<%WzC(#taK&P|0UI!X5Z3KLtRQN zF~)KgqQRg%e1^|DTPAb0CY0XOB}5Vq1Yzy>#FI$i2e|w_slV#5*wk03C4nS+xt5!-dI8WV=LIBdLmJo=ZPd`6no1D z5lHwtZ%kkljccsCd>dC|>K0E9qOIpE&W%N`?=@PR@a_J5Mf)`ZL}Ts)FS46&48*PO zPhNVyb3kP90@LwOqpJ=!o!_6IReC<tBq~6d@1953S#-a~Edc z80AkrgRRD-lHHnIVk4a2=)B0G!F|8t2t0{)mTr2Af6H@tis4%?AE8hLXNs1*?rDJd*Hr8ITjos z#)myuue>)S;qU@L(NjJ0+uxew~c;aLu-6@@O z3sHuwg;Y%fH%}FXg#+oS_)b|4JlTiXvjd__i803k<)=FbyA1nrj&l|UH&?B#H}#t4 z+N+jD$&2i-%Pm-z+dz$Vm{B^>x}>b>GrWM*th29RRD)%_hM@s#MTtX#&$d*r_Nk4 zsV2Q|d=3pngn_3iJv@9-5MgG6B>h%9^>MEa-ja@n{7X@e?#IhFqjt6?D|%%KJb*+> za2aqqtNj6~J=(6y;2mK3=<9QAdXV;NlYC;kO=DVHd;R_GAM||F>pq!u-UiYpzyfpjAbF7yQ>kL}^VOl+U*C^}sH?crQf2pQ@&6M5YpnJcbm$_n`)0!trzPRYPpsmGH z4NvR6r#^??rBmQ_4I?mU8{)STf>L%_}KVJ^@g+QG=(@ePcL}La-YZ zne5kC4ktv@frfrz_R7D#J2LztpKQ0UCD8M%McK29xLa1&ujoBxo$ zoGjP>5WY^+sK-Sx?D)%^`d!Uueg{lCGCqmbr8?F0?88LWn|i^Cb~nx*>7pEq$ohR3 zXMs*W=H?quBvyNL8HcP7#riEG$UYz8cPfBitL7eW?ZMf{^eiP^;)Pm!56PK^5{QauqF(W1qIznnKJ7UxV!8J3EhaZ3DdoilOd|L z@D{XV)5JOI_X*R6fgPS>i8-nyDWzaUmAiu5s^hDIF6xo}6RlDldIFJo+Ud)af3&gQ zoi4|AH`Gfk>!wj_=3tY$0!iDJzDjx-@@iBp;@rM|AfFBqvg$bN6Wdw?F?Mh2I(T$u zrUhaA7I3gWs^7gjq?Wa~*n!TK#PQhwQ~nri)r(qKSbt6_sPTXt5IfF$)2h;${MhN1 z5qcgZYQ0+mp9r_>2)m;e5$2=xxe(vxTTW*d^+h17(Uh844CDte5wT`@;FRw;SDsG1 zFW4@RN%q#Vhe-9rosd8urS7^>$|bPQM;=*mJq_tZo*l^|_C9q9By^dq>eBWAt#-E3 zAa@?$#9J4OaCc)UgQk0js4Yh+Yc}x%go4(Xod_IRuyMG8&t@3)|jTA~!cjRLW zczXo*Zo9}8byySe7js>AAccMRxB+(m=_leT{He+I`Af#+TY z%MEB6sWmMqcq!u#P-C&Ab5cZ8d6Ne(TK<_jRtoyI5@Irk-FBCwRz~#IYtEQ2*Q30; zSS`9k86$x;;e{w~?C7>T zNz7S@Bp&4}bvc|1SDn^sY?o@FTwmz4sZdjPE{Q+0J?fzc zQnNLdWgq)&)uH^zxZ5B{ApfV^Zd`Imb7g4O)!FD)P8biPOB5(6o#3f6{%-(o)L~IR= z+}sNk8}HT%fQK*hB(T4G*A6HYDfGGF)xYy-tz&DSGu#y&{C$prb@}iylCBqBtcs6{ z_Y$M^3OSn`PTav$hP!EG_7X6z4-)}!9lNo-5g{3G7r~oj$NbmXYrwb96~$TtgI7GV zRh9#IMhHy$sLZ%EMhT_!h|9u@y>by0+XTn(i6NT`b;XuAwy4Kdh!N@uIikX8JHIt(2MnYOCSMQW2MV+< zJ+`nPZgS`&Xs@5xJ>&6#S2qK3yd0?KC>4XL0zc~&cOz|xR3p3}^S~v3*>RJy-Hpv# zdHiu0kHmq20Zg8qSPeze=#mG8=1NU{9MSWh`S1RvanAuqujgL*d)&2k@k4i(J$$a* zQv|@~BM(5v`&NGV_r*c7x_h0=fgPX+=(^GN0!5ho9tn(NqiUYRXH5??wUY8yXto#K zqPDROjtKaSOH{rZY0R3{If^EKzSOX8bb74qVYz_0a%oD1nC`3)6)UY4aV*U5=#{ z^mx20|L7mkZL7^1G&y=CQrgM`av4W>@T#7pEo$T_r)3-4(2NQ(Y{&mcUz04oGA)%7qY@CM7+^HIS~=HF6E4mf6R*Y*)X_NO&WC?ee2S8ia-mt-U2)nOj}&vpRolvs z+ae2L5zkuCwAmKup?@=w&VxkN3ZXj%Kv-7@NMrY<41&^+luirydkRtB3MGinpUBKC za(#ke%X(D$4=_5fgLqUL6OTpyy$nr<^8W^DY$LZCYW>^fQg#IY z- z-04*qXv;F*k-r=NY9Qlgvni{Bnr8B}_9XolNgrku2xY}uzwRK;*UW-k;Xo1Ql)O;R z+W1gKOIK`*^w{j40XF>UcJ7a&Qh}&U~$^X#jHEW(=6`cEl;v~G5 zY?y*4Ubb0+xUjsF*HGECtFdJd`w5lO6`x6^7r5A3&$p6Z7>#+4Rk~pHATF$|Bnhl= zd{+1FS&4c8j|hDoQ(%LbZ`iMDVBHi-g4GgWt!D=!+)VlJ|zUIs!_o&d<8C)cULsIvy) z+~d&!6ZmXh!wc(wm$?)a4))x{E_SmfPC!G68F_?bF2%2TaDKOSIWN-3ieS)liQtuM zL0QwD1SGJJ(KEX3$PjcAY=;?@uhP*tJpv547GJ`{t9LA!HF&e97Qq>Ac-VGiNu}a( zOAR@Oja0i)kEr;r+dFrf036*n?ytyIbl?^gl ztDXGBq=QS{KX0_qU{d9DAe8YTB3EMa_~z<8R*CODo=FjF*Twfp2cb$1Cc=@JV#Vq6 z-i*kwH36h}GnUSwHcJbY{2+6J+t;n48(gJJt#3k&^KcybNwMr~0}LyW?R)%P7t%CH zMwtnFN|p7yQvstY++?tVtrBcxR4}TCD&w^e=yc$;EeTV=H>XjMj}0rlc1r2xCaUUn2DLf%7-lje3WI z7XZ9CUxta1(@$RnqBvlp(w^4$B`U{r>6>l47vn!XtWa(k2*r9Ov~iPoW>{V=b2zPf zYOp8uKYYX>Gr7nMtHLIW=`|WYKI62vhbPr|AIz0*1`dqFcMzg^^<{{#uPfLD0=>(w zywu|#f>!i2INuna)lYv~s6i7U90Jc&t1bY}Ie>RhDCAt|IZmfscQ)HDB{fCuTafOi5 z^nr}>RAuq-YETDtQH|HQ!xxKO8$#C|F((yfPXHusC-`oi)ET>u4XQm5H4%--)2Vtp za_0iid#o27zFr}onN-K&du740*h<+hO-6Il$=?%12&%2<=<1_2-=wN}(*pk|*Ts#P zMl-fgdGePkr?MZ9!5~2CWFeveen*wj`fYUxqS5p?ZKdI&Oa|siWZLE)ht1umk$X#l zp_M6A!9GB!HW@EyzzN^jT|rhS?hop1WamuWk!raY=Y!D2cZG}w3?OtU50wm=hNh#x zQC|+XuM;Jk_hu=RaxZ#Zf8XBbqdAFSUx#5UWYmqBhyE}u&Z>Y+wy?vzRmdwd(X4=l z^JPzQAKKLu-on=V#!2r10%fm5H}E9PfV)Tv(wB>nW&he;Eu+dTl50M&FaK7^q$hRV z_-i!h$5lv9mB8Zk-VyQX2bl^b?hc9%Sx0UiRUi7|fo@AG;ClUvH>z?kK1*wh*`x^l zj*BaO3wzCEH8-3*V;&7>l6}YOS^g&D>C8!#CV;yY=f17!uRp7Hr<0?Ti&7E#skpNM z`*7eAPw&#Jw)k}(N`Oxq^dtqMSFsn3Fz57(Bs5k!#dn+xf%44$IL0*1Na6U|53;(e zWwNepPs$#%X7Q_+O4NAI{{g=&n`4QD+ajo{e`&=!y21A<0mfC*!3SJ(>iVQ7I^yAb zZ^nFboS_`$7|KSft`F!Bt5?GWuaryonTy(0w-?bDlI(p2nqp>}Cy7p1i)W|(TH@e+ zI&bClI?-mfJ#eQYAsdO)980k{4*xzRVzS>~61@mqqv@(AP^ zGUa=*q#8*#i8kfh0qIkDjxBrBlh{81`Z)63NT-WzszS7H!OMO3jF+t)$Fe4)YaU!X zrI5uv{4$_H$II+q;`h^1nhamY_d6yjB-&`UeWgFT%Vf^uzQ@5kjmC`B{=sF)2LFVQ zUctbajum=nYm)t??4t?bdX2p1ebs`8*@9h3wxDqDJu}UPw_PVj2v#Fj=XZBc=OQ=( z`Q*Mq3Q?ok7!yH&NIblICY`lGa?H!H3H~e@^QTN@w*8Z8ixT0n zU=#LUGP}g*>wZRz;Lk*Zeq&s;cU) z3zIeok(dd=U>)pG1k175$@{7^cD!rg{IaK|)RXf?f^2zP$;s>3ONN^qiz<$zRUY8n zZ^4PuEhs3FC{Tb_b_+Z%(m5GKaumvhPQVg{^ZI844ge4T$Ipy_1dVZTvTq{obAl*8 zf4=0FB3g+k(#}1`^G`klnq@4d=?!%F!x3z^!U5)jvz-fZ)1z2cZ)ex)s~9xFHM!Ya z)9jjWqsRp4pvl19kkF3B5Dsg=Io~q9Wv=2x!;M?(^C^doaBAxM!F!t2!54lQ;31Bg zpU~0Kt)bU1yTa4qLs3>mAA$#D^6Q=DOo<09elSe#M%vg4HDZ=2A}=_S#(m6&Y}^321L#;Urt|21y!ar3**lAR<9D&Lqy}4P?W&uRW^HYEs&SaV<{?wi&e$ zdm~b&8B>U7)2}-_QPMya02F|eFU83H1;Q2SRh{|A3+(uqXlA~xk)}(2_ig@w?ry)z z*7M~$vKP3f%6L>wPXWR+Tu7#CRv}rdomCXI7_7vjr`14>cPnyB^Yi8@%to5YcyHt& zETYx#o44}Y*+jdquY~FNMoTfPf2L4Ugq|GTP~SZ0v*?otllDGrm=tWT9H{TcY{@to zqhAoS$F!B0z5Pf}x}01lt(B$oNm)_M$>|SInMO@O+*onRi#>v`5^#pqmx$K9RMyn= z-3?p1pR^p03UjEoxBTm#avyU?vm=*duA^4-8yhjH-1~i)76T&m&F*5>-r_su%nz(c zgO+wj#s(52Z)ytB8mHsq%x_QWHBzgEFWwv&=+l{F2(i3YoR-P8>cLFH@8lM4+6n_(HPaQ_o|1eVxb>#;+w z!{VXGS-w3^s}BuOgdmzJcpAr*lP@BXDf(r**nA6dWrtu}X;4WUNeUgq>B%MUT5|)b z2o>jUHE~;}fe>83vuHqh!&liXyzf7fNKI}bh&JR8b}0;FIZm7W?I!7&R!hDF3=hJZ zg22edUFoDDX-CJS&w{=A7FkT6V)&ys;Dc3%^g@5qMdqvA;H)uq$qtX;p1`sD`1?BO z*LrOb0v3uy3Zw4PwTBZWw>RS%Rf~(wN$Db}?Rk%uFrB{IMm31O39w=?HylZO$E^4y z2T(14TM1bFz_RX0B;4%EJ$^6jg$u@thq;c1xFR#1Zv!+CNETxCXyfUi?}dKaP*avb;;=9I>0>6hza)jDDGH zCmDFUTIw##V>5?n+224*!$YOBqJ!7oMF+9jvr6G|XH$YD%JwfI;b=9|{~^3>wftkc z`jIh9eOx*6Wkjiu3f|{f&M~s+G-HP5t$bRl!3!)Z>pHm=@@xDi@5m^RAT(3Y6roWX zda)2ZSQ49S+p>$w{aoTJ`)yosy*i=yq|T{}-5g1SX|HcL5RFkA>_)&<;)X=ZBWbaO zMjpdKcJXV7hQ5uFiJ)=H=isO1ote1!JHy3lx&_BMs#{k(3;JEz+vZ%YrURU%y5oq| z;X;$-mXAyGyhrNP-&KnMN~OzAM0NJQfSQAjwV|Iv?Pm}WieRH%#tnU zD`p0ZEM{hgYcVrh%*@Qp%uH9zt2gt_#M^%xvAeOc|2wLytGiB}&XXt8MRIMn9k$0F zt0yOcwYooD?nQ2%e-<0{iGV=>-o)o)Hy1hkG9oKiq11UOgB}O|m&}jz7XhI(I52g# z9s2ZfT?kRopy5Jnt?PaP<+hJAUZ(fH1DnMntXs{a{^`2}-;)`%=jsE)o~t98^&xOE zT|MxyV7K67h-mBwaPVTF0}-CtXTzC~-I;IX_dEXN z7-Mwh#&0Xc#?zvoICj-w0&dv?s@@Akg5R8M4`mIO94*Ki7{dB__1Z$TyBD$(rF$3q z8v!mqqX)N7tG*bT#(1H|0H2 z^S$ke+uHlNaQJ+FOgDzJ0HUlPF67+DLE8<*NG0=OHxDYC9D z6IZ5mpkiKnp@g9a8;CE9QQ_hFxt&Jmec%Dy+uJnu>@5pBpz@|Ii;E8TKTj=|#-q1K z=QFl=^JVlq>D9@DPee?+I|_CoIdaKi$%kg9C63(kU2%x$!flW0c;_2_D++{5i{C5x zDCwGal8ojaH9j8^G#NjE+oyAJv_6qY1~<|seh}(_!I~tO{S}U)Ypbl8bv$)^FKcen zlEa|gjv-%<1GZ2TFQEYU4Jj2hTG8&S0x-aJ5F)WuI16a_F>EJM#I7(7FT<4#3DvigPJWa~zGjY!vypHZ|DwXd< zu||_SN0O|JIvqngxoq~Xg6-t7KMlvYaY)=yavZOxbNuwq{FE`EW)_Y?q z=s7t#&Ldf$uuIH`lD$1kgY`O`kB<-UKV9?hG}P48p+MlrC^(0?xp}dAH7V$D(x&M3 z>3>i3_P*imB9B-jfgB7gm|K^H*iZtGc8p)d)m!M|8HP;=(_TTf z1OlSS1gQM_h#(;bw-zx=ZY^TLEsy#12TNq2^4i^M?bN>wob;IF?Qa=mCz&^QjeJ;lzhLbjZN0p{z-Gh)HZR}Go@2W5o0ui75mt5l~ zkb0dV^Hv(BOG9DrFSrl+86(b zHGhGJxu2;iAz3m@0nr6($#wU{xx!Lg=S3G{YX{4&Z)w94a14yGG;6y$4mj4Q^fMZ{D^R z<_DI)pO!Kow}TA~)gLIY7e#Us9$WKqS~n+n|GqO7E28Xd==gAd%=_fl8`*w{M=_7` z!8hCVGwntn0KbWkT@I>wTHdK0|yC36yq+_h-C>E}RV3n-y2!i(rTO z{IT#oho|VxD96cduo`%#UzHb76+hq0aW%`q+&aT{O-838p;!ODQwtA}G4pJ$O z%pc-kctA@yB{hBhS*F_wX^@k%)JX+X3fcR9jnH1-MUzr4gPiP68^wOXujsD%48SnH+N#F6v<1~*4M2=?C=%>Jk8!i z+C?;yX1HBvUVz0MRd}8_kmPL-{49*xH@&FA;Cx`5O1+A$flfPMNks3{sgrO4u0FU@ zqmp6bTmWH%G$A%MdTvjIR_FbfIdyV9H`d|KxwQ@Tv3eaZQq1v>or#E{#mg@hH{0DG zS=$4LWJozjc;d|a>fmyz`>Ztm7l-ugT{HC4kH4(g3NN3XmU(=>FPv~%SkcWSZ*f$a z=;3#0VMkRTnD!;ATQ-d*yVbgz;twRhiC0E+FWmU-Iqh5@E!jYCEZY?zbX+Uu#W8tU z(hZaW2O2Gnssy)NtflHivUrdd16uz_A?C^ByU~4UC6oJ^dL+BxE``j%q{9K}z*!uj z8xAX_7m(R#U?;6o+;I0=FKc$OC-2DQ>WEqNDn-k5HD;h_NwW zIg97A4N4O1GniA;GdPP+InbpCO}g~zGOazogSkG$smYsNBIDHTvCW{Z!wjbocz1YT zIeZ(^sVC5FYDD!!kBdoUN0^x9Za%FS>6&H_4UOuli5fOr;tE-&sY&&`Vi)9{)D@Yw z=PtJvpE))&9#=pB>*%;*or&ob<-F}Ityy2}Wx|W>Fd(^VY+e7QHMJ%9nt2gC8lnWf zAoGC$(U~5Azg$B+HHpnYJCDD}i2@eckgQ$d34`Q^$)}lR;7XLl7#k}`#w6WzXh+3T zG`SlJPc0z_`gvbPcXjg+u#N5S4Css!3sR@Q5|zj{g}Pv??Z2?^eqEfkVrU(mgf>5L zhuWu#{^FnkF-D)DU4y#e-a-!^`8_{KXQVfKOCIOI-y<<2&c0)KlZFP@3Yt);w&d_U zP+Ij<-Ri(5jk0K#8m5C94@*D^Cv$35@5mM*Smbf%h*osE8s_SDYM0AC$i4sRldkH{ z_06sJ#poC?czp#-@+ULp)c&!UqA--$OLVxX*QY>1QIxw{MRqlM0A#A&`UU&w$s0M)qu{cl0|GP}Sm@PVETA~>%f@fk+e&bHR*QAx;v6!2 z^{VcTBw$zENGp`j^*RHk6A@3NTz;i@KS5sR?RrEg)QG^oK05QZ@f-&72hv-xr1IU8 zr^zH%+cfmc-VqHl8Yn(M^3DH6jW(r+{HTqPuO8QOMvn2R_^eERC(mLRbPmxISo3kg zJ6oy4>_~tkdvg3Pl~fvPG5EL5ar1 zV{Bb?DS))7_6U2Xl&q4M@pDfKq|LMFp4(;9tEtI*>f?0N*KJavwD(;)tP^k0LfqBbwB zbZjD`TEpK+vn9q%7sW{sn;QsgwdoHP-yU}c9Tw(gq&@jI(osJUW4M%gN7rkTeJrY0c9C#KiGTK6c ziM$GB%CB`-d<)`*nmX5%xmU}i?K0XTd(V*B!~8CJN-y_K?dRp6C?oyGyL~cd8MhM) z+MT9AVB%+Ei$hXHvGUg9-FVkj*%0pQC^@h6&UL-I1L^PuOHu7_wu@7HP9Ep8(DQp( z3iCUvx=TlFLZ5p?E>3(pLP78l!-<_^q;os9$;0Z+(|h0HtWMw77Dutoq{26QzsspI zwds;wog;3ux(q|9m8f^1OScXI?{;ej9FBJ9_sEwXz7Gc1Z|xqk^|QW58MW8Tk>k$T zw))4MIPH5>(TpF2M6yd^8bo}7*aCzm(dW!VYxfTutC$&rsU}6*7msbI$<3!Yy2m$E z0xx!H3C;!QyicV7+pAk^zRhZW9>Hr8(sRd_s%u)ui=}Tah_5{-(VJZ0!W|EMvOhLE zUIe0-MR(3tsBzdg9mGfV9hNUnRv<5BHLaXX>)hu&el4Gdzq}v>I>546d>BURIKo&C z@L46EwlW!e2N&TFCEx+?&H{K>>bt!FUXe)4V%s;u&Vr+MZ4U|Xn;k1(bS_>n@+iDQ z3uV)`M!zXlpPhFnodgtCwsb@%VMhrwk;=2vL1T&h5>NEkD5v~()EA4Ie7cEQ>1-a( z&^~sI{|%uwoE8LhUhl@unyYp7=weN-x58_vP>%!-l!-p@;*yGYYfb0$3AFJ!ewy2^ zh9B$s1nw6ZT*#M%Ms&XRDU{06|IX+@V_#(leQ%nLLBX~mSPS2rhH#pc?KX{TG+Iq{ z!{M;!2%qnOH;Hs|b+`pCwK%bU%6njPq_@BR;&jm*`B-U1?xG2QMc&#>(v`>w4E%vc z{1qIQoefnU3^PVoITfauxLpnG=hyrPhV};}smu1oAHMR6Fn+i1paVfIA)#xZjWCzV z)=P1s83QT>YD6omrEN7A zwwpisbL8J47lOxz{=zp!U+Q7bdiI3#xw$5qfDAGi zSIewwxxyJ&CI8}PZ(u-xjp1C|y*7E1<0h-7Y**8_1qC_Pe0#aM>u~3erl~TgJL`Pk zsIF|j7d)DTR<$R?C!|={PS45@WiTnbWXF$+SNRsBFN8~>JJA(M^R(CSyDxH_5!y1? z#tSO0J9Kz9z;0y}(sFfA*u=>aFc{3Q(1bxtOU+Eso)l=XVrBXJ;s^>T9b?uc4bMZL zg6&TLJE6WvLc}*2ly_%SBLmDL)4z5Y`@J6~nSj49U?Q|OJ@|N=4@p`hzg&&AJqMbALJ7$^ni7-bejVKhtw7jYK-?=7dyE1 zxvA+D!K<>MmxCTv@O*0FEdUR=)k>k8xQYG-D(rE0rAkjPXZA6zb0$qpj|RgdV}1#A zUTO5PVUru$rA9?<7oE0b=DZd5RGJr+74XFIj|geh-)%|Y^5Ert1OfXpGa@9lgy%0_ zXjit|Q(QhpG%d=~SH2yCq#0hXfL8>r*lC<)!krewRplEx1fNXr4XV2hHkq}$Z*iKg z*-hfY>^@!}sp^<|(5DL(gVsYXM|ovjckpT zMKe}zV%^MdH;i9Isg^$&^bL&T{0|$*AL{Q@j#j65Z4Pp^@veI$0*s$a{j_b_RuEC} zdzm#ONCrYD1fhp<@S?ONNNIq0VeV)TZoelg8NyT4#e)l5ejAl)57*|k*23hE8r zL!jg`Ll*cF{8|;c9FV3_6f-%g@9wIAKwa@2v}4%gK$pUYVLhSBSdj(7riZ`2%FcxA ztw+%NI;BXCWXB?k%fLZk%4K-u#QPVPD`e` z)|SUMk|yk41A~NwHLQ`B%F@@K<`THDRza$f&g-Em_Yv9jM65a)fz3IQp>)Hr?)jbN zZjJ6(a#D0CAQbxvK(vWzaIHDoRhVuP3dA@}0O`P^9#4|?t-}<=Y_VMv?^Q^Q&;Xfb z*P01PS>i9$LXd%K&@m8Uyh$c*6FL~%F$%dphXO)YtLjofAF7GtI|oiu$?;K*%(7$C zafXXw{_97L`i0A&RrFiwF#Wg6jJOWJU_Kn(EQxb!1h|$|YGQ_$>1k z5e}>Sa0-UM>^%n6?ckZ7F?%IMFg$`VZ>j-bu6dFW5mFsqKIs{ zMbYF$#ZxA=MqW~8b{$6|ca>LH0oltO2{av_CUTD8;dW9|U5pDC@wIuEw4q&OkqT6M znrm26TiZ~W1ZeR6N6?;JlP!)d;Ntsq?$wotJ>2re1p;P2R)_8a-S!|+xVG>`>AHf# zbnZ;!V!xdRX3DeyIKdoNH+kGr3$eOqHGr_ln4j9RCQG}hwjw{Y-@!U`K|EfpTXv@? zt0FwiK8|T1Fl;9v!E2f7`PEiwtSy0VCdxh+wj_7WMXfKuF%O65B2oR7Sh!CQ5uE^w z4+YUX@l=yAs)NWw{Pj6EH#GFfD*4JlfcYRd^G~K=6NB^bmG92)EmCbpae%TW!lH-a zh5|iV1&>=BcPaFSGb07NEw|-6nYPn2+6#+ip131)W#utGJhGYnC*ROc+L3+w@9{Rt zutXSG>kGz+1k^OVTz?tY9`_@9a?fuaG#e^ZxBU$_-$Y_kzfZzuW}zj(Ctz=r%DHM_ zpeNPJB^?7^N)$w^4;q|Bs|zkYaz6%8>R+aVH%PNf?`u%{ZSpK5Qr{Yi*QHw_!v*kq z=P$G@UqW~2>#-BeW<;}#fKB%!g^s@@R1|VN?wxO+pAj)ez6lQsq10BMQ1Y1{iZFNX zoJh;^sM(=LFo=v=5*KXhC`^_%$?FQvun>20F)-RFHa4PX-Jg-2M9%4Y&iqvsMU6?M z5x8%_!t=hoJsf6G_`8H{PdmZ!_SR;=?+jK+jHDm;Xex4Fc}h z7GP5&ugdODtX~RKq1q57yvd{NEMNS8qxYezB27Cy)mux7yo+xaBN1T zmof!JRjM65gk^e#C9+~e6Ye*utA_>e<1gv*EL0NXw5NJU^;&^t1opj)tGlA!9sZ)* z$NBXj!yyeQN*87M5$rAaQ$9kflN`Pp0|=YVT-zZUU;$$I)00KxayySF7$xx?wOl6B z&uW$$zMuOj&h7$q0VgDIJc# zpZ&>BW?9hhqM%OK$N@?w7|fB8=dp0PS)a()4nMDM?PR?H+|3LY(&JxWg+Q%2e=;By z9r%VR8l|2jyElpwT?chWhjZ7?RF+1c`=1fzplCddH?7Z!8xxx5M2IWVRp*>UezZmu zcRX^l81yX;pw{64%Zb!iv0*l@tl5-d=fgorT=1eqd6bi7GDK|tO9KfD7(~Eo_QkVv; zO%KO|3#Xl$dF|~F7Gu;jNra96xQtRba_9;zPzRu{;UV&< z;R2SYGFrrt8(G=Du~*IMW@`zxIg>?+dAAz!IWc}#Iu0|3Fn`95x!X6OD0a%|4c)Vq z3~S!Pt!sV-tsY)uyQ>}Hj4RGJSOv7}7FjknhfpTn_`~U(f|8Wf9dCzGUqgf)fuX3V zU~Qw|$~=yu_(4G$pLc^uxZ{2ITwh&%#HKdcp((wH&VEgXn7^lgNCaP-3zy&hzOV7k zTdaPvGYE8-b+Hp^*biqO&<*C+-k!~euxck)=#n8Z|IGRiw^h2jhN! z;b#LyCziobzW1$`)%pA+5K926sdM!?$|Y<@kc@D)A+z^{s5M*ZkU`z+S>P8itK`1= z4<##9=~>))x|P_7CEXLyITzdWiRSNOalW%gV(ks)7?`m!j-SH#oC z40o#--62Hp<~wvkJiynL<&s0@9G9J|)3cbP=~l{)r)Sgn#}q3O=>+bZpXVM0%K)hQ9d->?%_qJvtgC+*-opr;;>Vw!h3LPZnxFtW49z z0EZ4{>-W-quI$3>S%&T}IRIvpWBS{Zj}D%-%jR~cuL3C-{>gaawr5w=BFJUI-&V%0 zZUrZCO)Rkn(|>x|QVUJGlfdpmMT^uVF@o9>hK5#6f<>S4YDR+|x7KlPZobMqx*<%M zc>7lCEiQP>e6T&~WEit-#SOSs9WFxSG*J_fY3>h1n4am%=YGGZIydZ#GUfJ1X&I9# z=p5Jt<0|I}%#{q4`|0g*K3(7)_Qs9ib1^*SPBIn|7Wv> zn}T{0WzVHhp)LIZO7w3F2{9Q`(!R#eW;9hQv!VxIFpfkh4BHVn?q8@(!*NO4HtE*R zzm~)0VA>PF@^SR5*mk@ZSO>76z7L(C)chW@1eObf|KS^h%tAs;*%9D=gD8 zNZ^WMfzzgs0c1+ZTBZ`+Xu0cO96m9(Cfbh}_=(-|5jVt(AMXOM`h&kW!#E#3L?QR> z?7-+@hjTB^Nw#O#vF;~NVkxEW4}vDw6=nopu2R~0=oQvip}_o*lAoHPv4-3x%nyR4 zo=hrxno)7EBl=f+yr_d&zBMIwUCDN% zpt62;rb}vz3t%vu`+?0C8eFtJsaNSUc;kMG;o47qdd87(sp{M0*(#S6)awX+qUzlsey}vPqCT8f3cL5VY#96ZIxQ@bnt@qw=_^iCKG&=kQ)4 zMlO*lM8U1FKSp|8f43yUN(cOiWkFo`o#bP(vBR056-?@<%sH&VxV1_l8h{R4awbth z^fQKo*cd+re`v90I*;rLzH(&uc?H4Dl^*B33&oNYrLgO9Y39_`qP`H3cil>jE^4T6o1`WlsgDz80X(xC7UOW^!eLvpihH@Z z4@H&DaJ=j7M0B~|08%`LBNJT8m3#U3l%%-K@m(NDTgdn?L z!Yh)Cv-8)oHl|{wZwUC+7;;2TBHff})%!njSx5mnllkb3{_F+dwA*JfZx$}sh3#9; z-Y5s@5pjp=VN27s)F97B6ms3C{{H0DNaMSFvDwOb+EbT|g=9M^d(y~fJnICj@8sN) zi5N$3Rt~ps#oQOvO6ow2%5cU&jWrjn^0L<(>RPJ zK5juZ{9dBGnMHZqV#0OtjC|S+@Lgg(@|wmb8##fHDgs_~mCKWtxgpmJzC-2(dzBmj zaXVr7wal$J+eL8Zz356Q1T0ozX?gCIFGZvy+oBnv3HydRFzYi#VwG|prW!5j%f1O> z5Fx!R(B>rb$h!pa-`p<>w?*cWWksi`yT3 zEhXwou!0e8GSx(N1a?do?Ikv8Gk;qWD|C zC{L%l;S%6hOI=o}W*ZxmoK)wKR7wwmdS|&J1yg+Uwtw`FOxQM#^_4-us@pMx6~64}eir#t+%BPqoOhSFR!R}Z+s2qw zHHc*AL58c@iDgG%#(S{M;-6nRk&8REl74P&5`t<#xkBr($57fX#Wb{OgVDgN(^8u? zYwB;VD7pQ34>jFiX``5ciHrUfE8c3;MUHeIMHDANDlqZJA77t%dW+n}<0W-M6qHmA zZnnRAzU>cQ-Bw1(6&Ow#-75dy^dh|UdW4k1a11O+VD}tV_D^~yF#e-gk5sH)z_Md) z-S_xy^s^|AcJRi5o{9Bi8<+mNV%82Js|iEPSx>a~o_?P@fW86nNNCw$)vZu@S#?9i z$0O9q$jX4>LiCagNc+q9)}mAF=q9q^9nQnPDZE<_Gu1}D zlYyhErs1c4|H+V1Q98tsRo@CM*gj2;L^G6`_A5ij$1(Qr)mOX`m$Ohs>w9~MJF!1X zgl(%Jc#L7Iptek@S&aFqi@cc;89TcdLm90qDD15LffaHxJ+{$51#6TUF_-URuUt;3 z6XM*452=zXyC?Q*+D~4n$|KSQ6Z!^0+K{6qtDabR(C}wEtXMZ{=K~e2+c+L(v^2vp z$YV!-`EbJ1O`1QwB#5aWaRvY>0rRB~`U7E`@(ZF1?mL1W{@f*kU4T6!dtK&zW< z`+}L1wAJ*s((FO#;iDxVaOcbR@aTx>?3l^XLwgaV=7_D{zY|BxZePOdzXeuq(&juc z1E31Faof}W&B{4qM2jLh_sF|j+lP6C26CJeEa7%rCFN-m6G7!PO1te%^*ql{jN40=3m6%#xt4ylU{MO$0Id#!`a&J$AU0^Z;`=9yGVY@8w^4s@?3h~X-9$h;G4Ey1}Lh@Q$dN#O5o3-v6KHaOyk4ww1|5@{+Nmomkh2Pp9 z1eXoPp%nGtRpz~@{McM=##E|-2i;RY1DNu~c`=5p!j{@und~iTo)HN`NrYQ-v!e)l z7|Z(_^P-KWrn+&MT#09ZAHEtdh6Yt5UH$M$F@*r+uox~U=C4x1yv#XjOy;u+Y?m{5 z!qA-EeSZ9?vBnXF=e)$gDClQ|^MC=rpt|e-%;_C!<5Qc=6`Bz1Z$!<4@9c{e@x-N& zaqtWoTAJMVY^_q@T=&)q+~t_^*rqFHhDYNZ=nu9iTw0aK3uGPM8Z3vq^^5bl?RJ;* z_oCJAg#n({Y$$1UEv=t!$iU(6^0f=%RcfGeaD{nx)J61!D!J6Nq_B8wRKkD0x7^N< zMzqhO>;*nr@1#CxZaA643(_#o#^@tKd4B=>yB4;eLv(`?ODq~{>cy8ze4r%QwS-K~ z4*^s5vs^nnKQBXk78V5G?rbPiW$ul{-)P{?4sC~P%gZWW1&P6xD*w<2b33yH3Cd8Z zAF4dnaKvQsq6FHXvrT~vIO~)7Gdt!`6hV<^xyQJy%-lD1+=N{9nXZ>DAk87$&+{CiwurV31 zxO9NK1fmw~THWo~W=$-c zr?2ot@?R^PtA-Pp@A4r{D1am^CdPvR63lIs9r`FMx7yMv&dxMq=$R_8bLqpT^Y1pI zBX&Z9Kp=UD35$>Km`ZE zWKYlZEIhK8@fRK69;hE_)?Gh!1B=>liJO?g zf_=ekZ;L}-PY6BB z(UOo3!F6rf`Gw6~`OX|#d)L`{XFzPP%!;g#XWIPR2gW6b9T%ci19?b2y$?P7%y7s? zGcl93DE1o15R&F$%%Rb;fv}0T&NqP(E6 z@Be{@1hspv%8Bi;1`0|ChXApoou0os9b7*71h7{tpoRiiduCRUtO>2FBmrH!Fd9D2 z%?fktDg*~lv$lQYg(Lt!QrqeX@ju;=*!b{U63Sc_FwMUwXSVhZg4XU&wrFC|B0^2W zm_~#%<1D@RoJVxI3SI%bio^)2wl{QNcq1IwTCt(DLe{8`w!_6Ah`QQCkrjz_yJONM zT{|auhsaA`hTA

          Z?NlIp9nKqNIEbWP_fvL!NEO(Yi!r^p)7&ybkCppw;eW0aWn^ z0?~`udX%G#c7|E>EHWAjg~VmWY;qQi*D?|kkUkhF(F>*T@$v<=*gj~WStF8wlnqxlM)fBs*IT) zyN4(D`Z90Nt#>7>Xa>rD!uG2mxODwO@bi(kB ztj-rho)OctYlN68m*m9z<7{MXM%<)E)te3tFF>J^2xLKLNY+w^Q^8Ok5dP56u(abh z&}9r&ROim~$*%Z0VJd#l@yt*rJ%1>Z$EH1gb{vAd)&nWr#eh5vAie!3z!Z-xJQ zN{Rbd`jx@}b5rOYo?08*W=2ip^*arH#;#JsvbCL$9#MVk5j0t#0g<3}b@3H|(q)U`WC>>vW0Z_m;WJa5CUW)_voC2DswSY&(>Qcl!kBQr%_@exK|sddbvSFOfOTCPVP4L zu4`XpG(7N|H7DjqP+oBE+GUwEc`Sf%`%VfW0cF@pd@KCY6ZZ=zdUq7DL%e2F_Fn|d zSCK9g|MU)oWV`h;##l%GJhkcQZC7`}kDO1uygh3;VdHcx4MmD`*)ADIm({HAH+7=z zj{k$8Zr->T8c2r2^v0LUW*q|3ov3n|yEv+O;)&?y6O2G2C$meB8QXgm)Wjea zx?3=weQwgjm{_FDlNTSxpmXKmjFSg*b9p5X0X!`p@$UCuXFe24`_qLKf6}o+Tp;4% zAH|ovxP{(jdwRuzpIMOKATrSpx64>fvAgGWWZntgp6~)`Tld{bO^6|AWHOC+YNbm& zu0X=R$#$NdcFl}AmaS!nKI2q-I%YF|S7&>V2e1oCLJC;S?d#g=xcTL>z z_;UFD?Oggn;MPe)`AORi8*Z?$Ws>1~W?b?nmqf}~+A+Y6+&U}F1iF%Vpn(`1ewkQ! z;saRMiPt46ViD4#-Cq}!TWSzw-`(sl4jYdLp zW4Y%bOILjj45Nk$zvt{YOE9{XI;{3pjGw;@Q)9_WWqDttH9=|5jgu$BOHF6kWvedV zdN&k$eo*5y(qlF_tFHW|)x;Z|JnIG3hfEdziH!*pcggG;Q7vsszfyC{~ZQVe8RIelhx*AuOHe z`@xG-{fhCI%{&S;G2+E#@7OFZ0Nb4FtX91G^R3jiDAzkAxBwG{F#HyQ+zwR~0g7v7 zzdOkiskGfF(ph423PxZ<_v-dGFbQCQpt6I?@mz6n9zqjT*Ck!yJ7TMt$8K)%Bj;go zgG#jnt6^}jXOL(isIkVE!cW94Ik`=r9sJBM4H|1Z53a+ud079SKZbk}21bn8APkyZ(Bp)zyP^z;1-hQfxJ z2@9!c)Nr49r4*+LsX|&lN3^m0r^;EVlq=1L`%YYH!JMb)-N}kQUn^#?j7i=fI4s)8 zSBoUNnwsDCQq-_^R5$CBmGi6Nc`+xp|4PJfANuqWr#t(w>k}TO6uCEYa<@22UxDObN*CCh%6z}MnI6n^$bh{;9@mLWgcdlRT2A3g5Z z6-rZdLv^vEp&&vK-d@xEV{|m|!hMi}RNcWDDCzOrymz7gM30=Q`aKto`2% zBxB&VAz{B}qZ@noSI>rmDFfjh=2MA`%41sxMpxIR0N+8SrhdX2bI8yT}Tz{ic^fiO!v%up4eAB z^QuJ`f`l?E6~9)ljg%G0(D%g|2*q~5)yb!%$H}wcZ|#=4=W)|zb z6Fv6O=(MH{CY#TJ3&z%bE1pZ(z1D26Pq-8N*E{mj`$TfyB0BI2>JMwYTnXY4=%Ql# z+phLOqb!4vd7U;SAE`|3YK-Y^1b&VfKbW!ib6256!!hSCM%?V-$UUWdiX^Dd>&L8kPr>z)7hZw?>y&6oEHT`EizU&D3NAT}a0oH7#>N-r7xystYrRf2%OC0`K*sGQ^~WR{q{$ttd0t%B`UhG? zrsvrm`(<#{tKlzq(-l19&$&M=mS7h-Weww-54K>!RkHblfGY&ShzLituBpLIZkihe6I@~ zUCObV@3e&W{My;YLZvW-TuL}x(zGzxB=y74Le==d$r(wGtHFBA@=mod5XAH^C0Eop ztKkS#(r0X|6ak6&kv!eWQldpgr@r7g;9ZB1i`4$$8&>jkJRL4qiN&g zf~1$XR9Td&M+7Zz5e#0tPqQj({|W5f+{MY8su@Ina74*^eOnpeA!SvsP3K7Eo54$c zBVZp6Ekf)b1Rt5n3WqspAEe9LGAw4G$`D73S?;QlU!x4MTs zk#wjII!_olhsGQ62-^j<&}_Z;;Q=ygg}ZmbMP6SU#r&N0YIJEGnEeu8*?ojLRTi){ z5*2s{$-`6d62bC7)Tqo>Uf7=UclU2=jZGU>@qI0t(gCBZLM3Jz5(@Rm(6y;(6#jmI zmRt3GHcRHO>nX;X&Asn}n-wk8A|qJ*I+DhnMznHlRON`Q)*t98ax)u336s)eT6Ihw z9kLzR<|{CNjcPmPHSN`2sBHpT9xPqzS8G?~V{(uk?60Si8uH*|Jt8chwFY|bfwLfK z&OhW+p8Exeizdfjc1MRvjS%%4H5C6gZ}E|a+9z`J2Z$Vyl0hQp#%(JRS7xF{J?O04 zav>eH?r=~v+|S+|3(_L}gi_NU+7IiEF(@wSsQI@9=h5V@k-W$O#Wk1!{1~)pqd%4U z5V{-`z5K3bF8MQyypfoUeA=C4q-gF&$G?xm>D4Y?%h0hXX2P_@v91gp-uetJcxia! z9!NdM6JMbb+NdF!e4}#!`ZZS;w7^RZL|c>fztdm(|Bbp{G5;41`M-qB{(l2$#559? zg|&JjsAZZSQRjXL6=L8obzs2zXhgD~avHsz?5o%56LRQ+?B(U6j5N zYLD80w|XI$H($6cz?9NQYGeDk3H~{haJBWL_@+H4W0qKa2l|HI9X&`HC*K+Uf0C0o zR2z2nI9Crwir;)-$l{j#hgpBFFz^lm-IKeN`ZJH!I7}u98@s?(4|nDUeD}Xaq3@(n z@LbJ%q9jCm_?dT@2U)TqEma{3x zeS?C6o}VlWjND%?ZI_E3)22FQ@%UVY32^AVZ3w1`400AWI}ZzGcr8l>`58?-rAvLb zd5>Mx)t(8}T#&m3Q+JYWPPbD#(A_z4!q89MOV|G$`untacjcO!33eCPL>^Ef{^;q} zzOyRkJ!D^IA77b+2%wOTfE^G}dF#*xcO5?3uLYJc(seURB0i`A^fdEjz!oQqT(Rb! z;;Wxzb0v!~M2{9C<^WiPv^CE?*>#nKFWBs6a3Q-wFEjV5aVfVKhxYOxA!l~ z`l=nxaaKwpG>7(yxE$Iui<(=FsBk$g!fgf^W*jg8Oxe=3Y*uS9wfEExz=1lAQxq=` z$`wwFPzoit-TK$Or!YjxpF0N0<4;y~Hv%gPlxw zt8Wg)%$AzyRWlV;Lt$yf0e#D5PGpdbS%E1sMz+kS4Igl39PGsNEzT+!<~jbD@!3yZ;~UT~$;RT)X}h z0V(N_?oKHIX$BC6l9rMdkj?>SPziw{1cvTGy1Tm@1RT0M2I(9)eE-e4I(KKSb945^ zzTRuEwc~x>Cm{Qz=lc^RqbWkLg$2PR3qH%S+q1WgHG<-oAERr|38TTCC?M@K5XQvRjv^Q{G@*>E^jmGm%pF?H0%8tQ{Ce(i5jPzEUSHc&uyZy zMc}E1yDy=*sPQ}YWX-6@mZraG3BR0{oJsK&5pjP2pCa$IF7vVk>utbQ{O;tVl7P(+ zXAI{LEJ<$zTq*%gV2aRtTnc{0G^jw~2Cd0yHARzERFbf3>~)*Bcjfl1aOH90pv9s_ zjzZ$MjcHd>yK(h!Lhv2*y`@t4GbVBahPbC;j!NOFEHV)GO1gHv zSD4K2)^t^)OMDRJ-lL@Vb@us{{|lP);-~6}l&cvl@F{Vqr>5GqN+S%DMv!WN4S$z*;L z60cK&zoTi|Z%&MBN=!9m3?q1n{alWvray4s=kq)dFkDARa z8Fp+7o&de51Z%-u!);nyfC+u*G?-(1TG^28j|EE7alB~lnZRQYajoCzPjA59*x3v+ zPP?7NQ=CV$IU4u?^btwU_Y!rhCQp@z1>S z={z5%Pq=tr4F``2ak7lBMII=N`C5nS=HwR*Gr_%IF09vDM-lMg$O9WntvJW9GmUit z5yn+~#U$ja&PBD1A8+J=*ndI>VsE$&MvPi@j$TQ>lW)+O+!yq*_7)2;a#b{BaIIHh z5qk`*a(Bj-N7AcTY9h zVNpObmUpS2Jx{Q;ug%vi@dXb1wY%7-5M&Sz6+No_OX%W~*_WmqkJr7wZZqI#86=Gn zYyhnMQ+u%-`SK?&4c%~=A6!cYuM(-Aa{s)MsR+i!uE$BW++E68AE4{XEywFKWOC9* z7i7lfC^10BOL?tFz~wwtDz%np5TKL1%%N5ANv+XT2p{21jK1=^%qzO!fV)N7o?ULU z%p6;qvj{fE2Z_TWtM*p7Y;!*^Xt)9zrl8em>FDqk?b(WqmW@f2zZu(i)^7RgB1P{Q{BGAT8^*@ASP}YZPXf>IVvE4}mIR z6qUOEm!mJ{NVy>UbJ}T$@e#|6-l71$$2XcIOS#spQc|qG-gFGp2N-*He{Cio7Ap6{ zZuYji0jbNywX|BDaP5O8iz##-kc$((fM2`Y8)}}A%R?So`?>Y)J^_oKTZgVBUsDgK zNx8!*z9ilez?Jz}+UaqI^PC<7H)GfbPkf!PfVKL0DG78Od_Lk7C|raehSz z|Bw;RSgb>L?Hfug##oqWQ%f{+cLXyLRUizIc9o5eTmCq2N^;yHryAN1_iv-mKJ<-C zeGv+wl2`a>k*2JHP0aJ|OAry|++R z4E}A)@EuOt(D~lyo4L&do>1R#GkFVuoN)`kA`N*wc7oPbJ7v^OPZR-YGLz*bfgOuW zxZsy>l}<-_j89|VI$&v?r6)PjQaMGmEC&f*Z z+3X~9b1%ZfY>ce;=t{`deP!5gwtd%(a^s$^3qudQmn3{5^}nd#FW$}gnqC96Chdn( z>k5SkQC6+#45JW6yl zN194-iCMas7y$}CNy?g0Q-pUxsoCeM3&tB3ycX?5VLHhQK;x8`D-ZGPbN;FKv9nyK z+b9|4eK4v1b`80%1RqIqpA})I1yQpSm~lT!jN^}2F-KGBn7BR8$!8^Lt-K2o$y~uD z(&Ovfut;xrSci`a$<>`fsafv^4=Tv)Xwv?wH7#OT#by&Vs> z1-sLo97(Y#B=YS2aeG$W=c|&e8?bhD;#TXYhKhwFzgQp41eGC~?@HV znH;=UfDFRg{wnpdpAzMb6Z1Ef{XzB4D!X+q%^l&3{UwhXd4L ze-^L-^uUaiQti3O@v8t0>wQ^iL&cAad|9eNv!z9isa-_F2~)X5A?1e8bHPF6(HaBo z80>f=OJhO@ zT+iU@oUNtMIf*=DH!@ZACFS|nuhC5y@W|h_f%~@67oCj9Fof%hn9yw>n<(xZu>Nu^BDGo2PFcocIr${^swhy#Sp&4m2sG?m5Y-$ppUF-ca}JAw}-#exah#Yf@Q# z@xh~cGxa_R*)2Vr)yFk_^XUKfqjt-pB8A^=-Jzb=B}=xP}Mu?4cpVN=0_a0#m%?9r;CABuUEQLI9CRPDI(WC zt3bSMlk97(G968#WXA zzylX~!#~}hysSNr1XpWbO_A-2et8L*1JNoPQ8A~_VUC~1&pdEC_%)h-$p)Tkouj20 zNYbD%@f5F|y4N)8G3^Iu{9KmCDNdi9s%eD&F$%N}4hK>==!8UypvM>MzRR#3GEGFl z*Vt+WvQ`Kp?zfn!fp%ZrX}%cDQX}1{N>68=ghjorciGBq;D1oJxE)`YO)60D>2F1_ zdgfHM3bZP-M6?FGc%=``Ou|CovlUh3HVO5?CNpIXxxk6v&&h_AsN_l$OUm&q^Q1X% z?N$h}mGsGjLNK~>AA%0SJBjI48sd2wP}zkmQwU5%9#Re~dg3mdCd8O4Y*EhLeQmwx z6;!l~F5^fos#>wpRv|}iqfTNL>3D!HRmGfFFCznOwMbO7$jWfN#y>~D;>94j@nB?} z7D@gWC)jOY%EbL+kfkzwEKrhxNt@C#S*7bx1mPp;MeXc}Y(QzdH}|Aa<)b;k#Qj&#FCJu(M`=>da+w? zJ*$@yJx>wB60{xdOA`|mu$SR$7-I0}tnV4r{MJxN%Wl@zoE9O-EhuOTqhhswZ7L1R zwUtu3D(%Ti5QF1aa_*RfgrGa~Tdls2wE0z0p`dWfzfDvGlQ;s^ zpx4HUhAUoa5$_M`Ejl;DD3*~Xjib!nm2!CRUXBsc`}<=Kx>nko+>)>dNBgODohMgs zz8UR2*Fsz6E8Yq$XSF!#0$p40Vb}25G3?l36*J|#Q6KzvVVxvDZeoF}x0+Mb-u<&Z zo*CMRCIzqvuOn?)X}}@csuP~D7Ph}!_{K?!rj_*t2bduupN=R=-q7loCdUTNt)AB& ziWp`riGTf(P%gT4V3>>Zst3#XUWDdYmy*-{bafKNHZUL0jZ5ZMJ#i`FFl_YJUE)so z3u1gxCcaA6{t61V^#?~RKE5bbdAr(BRk)o61lZy1sg;zLy4?N+OQOFplZsxCA1++# zyH+qP7rO*|s%_n&P?H6R(Q^y6@0}7^!RPB2cdH@XJ6$S%gx7Q2JaPXXw1;BU;HOB| ziuZgZ(X$~SBX<#t8%!~ntOMwx`pcP}qgiODT8ElNC)=qGZ|ou!n}*)n-|ylNbQMi0K6KF#8d2ukgL{C?O&L zYwZ|V8u+yXP*v6~g@}TmfkOcO&*{3u-StdEVp_!JfNcd9dvq+{ib5c5oP@dZMM7vo zVz)WMX?3?ZwE%Hq^ls@54TD=C#NVHcH4`@^GF=i$JsX^3dt6BF!#XaukA{louFemY%|4^E;`GMyZ^6xt z_7Ac1J1+9(=H6exK(0jm$fqv#KA^ARUBO>Vwo~@^ctwohl%0J!atk51*c>CL$;5i} zb{H()(P3tNvMqfg6b?30Q<4jD*oV#BWzeg&JFpH@A+(C9`{qg4CM5`xSzR1-pB|gq zukpbmGa`;F-6IUdlUbIc!bhf05pGBgnfg)h7*@pAl3BlnZNvNldZVw)X_Q+gZiR!t ze41LA-U_|dh~apwfUXnH-aJdwUkr*CO8I1a7|>okmUP!o4Varg85tK#Cg((KXYVY7>^Sk(KE5zoE; zxQviSE$wW?Je-q#tWCw`qQdN9G45|7wVm!Tgx6vY!8o5slSvXZ`~L%3rip<4QZRm7 zfjb1f7r!`;a?DBHsNwdK+a>fc@%V?foVM6<+JRHp6rMdgbH}s65V=pMi=|lwbvY9lW~9LRkbyrP|93A z%`sr^`SA&HNkyP1=VWH6MsDjUJuhO-)}8~Qx#o$I@_F@6IymnsqO@EWuh#6fnKQK{ z$P`t_PcgM6j>r>$tmc;=MN40mb8smko!z7i7b-afO=u-HXT$mh0#?L+y+&V;#F#Fp zeesJn$o9x96ylEiAKvf-j==-{-co?dWY*PBH=EabW~2qCeM;jfOaB!R-QA{SIaLb0#4*tTz&3^h?=7^dYbX( zv%c#~ZMxU@jp3#KrJoPl_ml!4gW{4JFX=NRAzwX>#s2hVyHIMOSvH`snwEH7=9A_8;+)k}W8%PJ~)Bboi4U9%lV|fzG^% znvuamN2xOXbMWZ^^vbwEr}TMAceMHR^v$g2x|AZ%Txe|hJBc0R2612iq>wVS{I%7a z)R#W(SpKRyGTM*)xOc8nw2gWl6(V?=4ITvHl*mt)BR2;1Aewz#$**;!HT_AHh|-{7 z=~0Rd7hI=_y;dHdh=&~N}@VN6fbkn$@D}94vwPT+ML{E zaVy+i03btC{qdpQsU9parg|r`l}!s7h{3MSeC#lsp)G?_uaFderJd-cq!`ISF*S{e zglw&@eGV3BZCXQsq%Cez@LUQ-p2s!oX!mn`K;h_&gE4aQ%X*?(MJMiy`7{T53HuWx zJBOAQPK@sJXGL?xK8?W02SHkmAHZoqI3v^WD|BwESpMK2M5!jQXcfa2 z5uVN;l|Zd10)t#J`y?;(`w=|lL~GjL6KKIIIsjS;G&gdtTq(urGDozAB0*P$R41^D zh4GWmL^D-;NPPFI4WBf|mR2^FN*}Us)^2$9*xKYLn;XIgeNFuGPkDhqSt8mz8qE z&eEOh+1-^pD$I&ww9)sCIN9Ot=ptij-{TiVJ9Tc@fR5!s*{7=q&mvu2M%YX4J;~)P zIad!fR6B}f(ESZ(2y+4`qSNuyD_ssxjl#>-&ECgRK}lGT3m<+HOzE|YdKCI zhL{QWE~9T$eBR>qNN<0V^fYJtXVsUic2T^83yR?F2kY9F@H-!?z4+4JU>BAQLc9Ex*{nju3sQb^cFq}* z+rx_!K(l+TSlfzj1Uh|?v%!d+Qgbsfx{y;(w)vQc^~dY7Vo1C&9?HGhy9@o5mM@!` z_y#Sv6k5Wjub|i@-o|gxxvbah^MRJM(&ywe6w8jouBsjV@X)mVGYjKwH{Lc6<9A2oauv(sKWta;o=#zi$;ACcX}Y?Y7DBlvfOT;7m41AZi?aFp@24kpIi#Mt zWODa}AO9_K0J|`N+#pKDJZ*+|Tlj+f9AnZSc~xQsHi9Jsd(` zhSwbGs_P@o@^9O%)g<8kf0Mf(gq?H0ng53c_B8oQ{NJ=H|F|nEz29^uMz? cbN@Wx+dZ0PXM!XK{&^bj0qP26a-Y8c7wHO?`2YX_ diff --git a/bcs/support/images/pc_customer_subscriptions_1.png b/bcs/support/images/pc_customer_subscriptions_1.png deleted file mode 100644 index fc27c2c26cfd2bbbb8fdac0cdab197b1bde7aaea..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 43712 zcmb5VcT`hd(>H8KL_n$11q7rKhR-lR)!CO|?B5FjYM_s~PH zp-C^Hym;Nu{e0ga??3OXm38Lqb+Y%&KKsm`ncwWNk81M7k7ys=x^;_KQQ^JDty}k8 zZ{500`|!?93r(QW%bUw>cMbWsx8VKs8#g!itYuYYZ`~@7A-XWVe{)ahqM+}7>lT^E z-{0+7D<ys9bez4mGef(MnxSza$+{ZY&D;Osf6ZJ{ z2qb1^B9Tc+$mmQn`u};vpJz4&dUyl^jebuQ1|1zzvc2^4^K(=MQEC(WUCO1wx?!|a z3So=YUMlLE%Ff%X4E0DygTkUB{E-pc+~evq0Q9FV+Hz-j1QL2%RbA5<^m~hnNAG7& z0e+XBurusG!(3D~a%yhiY)WTbR?m;Nm8oo-lHOGb3ybcE`>rgS5^u}N!|AZnb=vZV zhI>;I1<*pz1R>p8@X}9xiM{=h;zd7-sphd(jhLNX1jyVs{SEyAn` z1RaTq7?ThQ$nYT(c_iy!Gc^dC7>>NAy-+{VV52Yhn0k=?YYeX9Ulk~ z_*_^OU5C9P8QlzhD)w;qFzLCsVW)EzvcJX}at2t{U3>WV9nLo2P1lEnExzh74-Cte4P(+MU{U8u^FNkCiUV~NFygqIVA991p9GEf)GgW2{5s)a|X zHa0d{Wo*b_gZ#b<*B@_T8{P3R%ZQ_7KFm07t1|DQcu+dhaT?`%($!O!nj#@D3K!C=^Vl116Zf$fahk5TUb~T7NC*@w zH8iXRta9kvk%D+Rm=u>n14m^jE1hS{&3oG0Dmi7DS?1-rNv~+ZI zK55F21=EudgNVNh)17Q#>%rTPREZDAQh!$zbV_a_w`M9Kp@Hb=kPzfmJa)&wPIlEx z1g;-U&jj+AtJ%iZL$>$ZXcf3dl?f#D2KCs%g)%`W&79&U3rivC(-w6k2u#hBE<9i zos*c+w*i`0g0Tlbq0$gGfEM@?Eri;$gJ#*>`^y8imXiJZa z_%g0}UDobfABb!<(k3c=dqf-_-tjD;&i}x;xV5A=woEU8gIvmSTa&be{9(}Zfa}wH z4NaGga3H1QRD}pE%?hKpqI> zzLPXI<`2eHYm1@zRtaiwHa5%>5mvBJKrZxxYYr)<^e-~|tl5IeKj7$_0`dym_bjj}ad zayy8)>T=%2RWW4~@QgaOhEm8JhW71S>%uRV^gY5r{fsJ&%`nf^SydszugZ z(`v%Ns;zBaIbA97rVXq8hX-+G;mdZ$jzVo+yIX!yJH;|@pNIPJ1$3NJb)v?$Bwem% zOf5ESr1aIPp)XnSEI?E=tw2d`$QE(DBxY0#6YGlz+~O7wHd~6*_lT?dMg_ICv$gw~ z*CET8QymK=KQqb37v$u?U@&;_?D%_Yo$FOW|4x!d)ZVw9sS`;AU;}3d&__-WZUvV% zHcqzm5UBkCJGc>Gjm{qAt&xbGPSGAnpSes6kF39>^K%3(U#bGtbv4mzX;b?bL0b*K z(+)zcke;3*>bnjmg~7ew&?SX%ZW+r?IIotDlCMY+;c)atw_ge;tZfL}w}(VD;6QId}f*XXoq1U(wZEFoi^I6L3nY*+y>5 zLDQ*k3q#G;=K*1+fWu%|8tQoQ$=lowj3bl304X%kcd3OM%79K|fQqnyNQH@2^D`^| z9H>)oOVYf1I8&ivNCd6v%|M1%1V(vjFp9Ldv|w9W+^GcS$)D-OlY4>c;oZ}oLw^!$ zI<+L!@NBKKuRN80dzTJt4Gn+9O#5<@P@CGB($HBKU!)!juJwMK?hx`oE(%nXz;`t> zMb(X+yEGh+N(WfwQ4#%)!{>(y>Y^Eb-!ZRFHWof5;i% z7~B06o~G2)Ox|cRaKGv}NCJNjzq8A9)&bOFl8PvoY+4&>x;Ae~mDj&t zds!@WeRZNfkb2L`)MOpn7s2BQATA%ukWp79s&hg+8JLqgT2y(JzR8nJeuw$HFB~ zSLP*QTksgw2Wz#AiCQJ1Nx~PZ&q}am?j0YNA3IH;t(OEE+w4V*(f*e+dwvS2j}9;2 z2JGPydq6_fv8OrE;u_z!@B;VqufIiYxCUe_7GqO)3J|3s%WqUO$4H`n+$7NT*D~ke?D`TVCcCk?r|}5)MG7LGW-^|q+mB>SZ;NalShp(k*Tok z>u==X1HP_%bf&F4G+TB#5tT05G*hpr|IWGvjxFj3O4V6kE?RQ)88`W_c6zGzjg#eN z&JM2>6DO_PZnm<%hOu(1n4 zxUob7r~rkkm`%%|9>@@OC2cj&82p-DTwFKtd3U2{9Bwp=_IXNnm)aJ_H{(yMJLh2Q zJHT4{&>3ub7QfPIVk8cBDK9)eFO@(`f>wJIHxn~j?*$})dUSRrUFNqibk-yeVdv|^FZQJ;dzKj1gEpfnQR3WVjx%V>71+_{ z34@r=S$h;YM3;GY*sx|t${)9NWS=auu?d6y1OOXPrlQiRqjxoR$Mwp=o5>t%S>ge_ zm34x`?cnYBaaz8+H}M z%*c>_qd&I>rv$`oj^$FAW5Br9(kdZ|uG$fE(x(N3+0Qhvs(3Nf*{-hdu0^qP0h|K> z$(jV?^#ph+$+9g!OIU1ge(5Ii!HawuiRz7(7-|#uZ&6iswFfZQw_onYLo;9JKQNXq zTS2*-rBoiT0kZ>6F&J%4ld^G7mrUy88JDg!pxY=CN$t?1}X7B;}WZx=KGx^L?UY zJ#Qb0IW4)}#J*weOa!=tB}6Y{VRw@}JtgglL#1O~bO$zz0-l}+M-3dTMox9evDpdbn&R2%r-bSGKuu}ci)dWK)akP zvAGJ#G#~xyKgt@=t+z{ma=bhom%fTUk}J|>3j6ipb;rD>1B36^gs@V%aW(puBvD-p zd`F^o!5J-%PfJr*-(_%+U98JB=iF?wlc!i>oMCCWJR0C+A_0w%hzQ@XFEvBqbL!;~KOHdtQ+eW~jSZNwu$N*?O&#u;uHdCxbyok$7=lkR!1+Cd2xR<`PH--=wbQxJKJ1X2 z1a~Ylz=37oO17N)L>pZ{hh?@)^gdTO)fyRfR~;boal?%aXzP|5*Z6F(VEce5^Z3Th z>CY~4YpV2I26#7Y7Tg3{-0<;e!g4(KPH#eoX!KTXDn){?!DWQzz>hNY8bbUYF>zAe zIhc}S!HIDuhIh+J=`mrXYTq9(y(Vvk5Jp=bu~_+5chi4wfq=>6sP)Mmhv**yM~9x_s$6b9ZofMT)1yEQ z0ej0iJ^iJZ*sDNS?IYnD5}MOOZBMFp)cdDy{7&`B+cE6lvzgHPoTLbbS-<{Xx{Su& zA&+Dz@IpbkV6q^cN{z7VnYzqdZFkGwkd?GK3C&W^(_SfM>KB?|<_5nzzB7D3 zW;STHAOY9ICyCIvl^QiPKbd^iX~$oT4)5H;M9G*_)mikf*HJf=G#xM?W9m;@REO`&_^QE#)ln!k}5nf}C7fAt6NXFMO+o6~SHo(Gy7_B^)s-j|?{b zel)u8zXHN9DHMGS>|he=2Kj|S4SybUI`_M|?f-G{c5Rc+{OrH9MVUZR(nl?>Oa`-e zW-=)W=tc2J+u@soySa!+XbhHIJr72y^n(iZv9-rMl7d~cX7yC(7ZnsMe?Sf661lToqH(fb5b8gxHrs#f z743`}y29bkq^pFr$D9Na#rEy@?@vle2aGgJi;bPbAupwy_W@amhmiwquknTX=YUiE zuGeg(;_rH%__>l1{fhI&YJ%0BAz?Whyoa#x&9>qsMWsDCzv2)&(C6oR{AZsSvYV3f zel6*K{ajVM6<>>X^#IsZ7mAj$Y5(_&(b*CstqG<$2UvW%;zgiU*j*CRPLDN`eK(x z1pE5Au2&A;L7|)`{LHlv$Ik+;uxWzPUCgtEzoB8CURTFOO;a3JdUToR>qOdM?vH=- zd)b33pyfx*qIT1E3@hNQQpkGZGhD^g=e|Dq55H@-MziY+tro--k0E2w64Zvi{5QS* z@qyA7%`YZfgeqNCjWye(Of;=*93d8Rt)aP0X!`+iYk6-+K|S}o8B&0@>)wd$Z#HY( zM7s37rM(kBFLPGm5gWn$hI7CDU>Lqk(}Cz8exFxp*LOFg?!jWqQvUq1Upw}`ch)ec zQtefG{PvQ8xqRZub*$dCbz0Vixr~97A2*=q|;2mQ*uYJ z>(v_2#@5za;t;IYO$e07DRGXgyvSSJmaK8F-b|8Iqx}?5pZ{n($l5vS4938=Y8sc|(PSG}L zqQ1$AHdGv`%wJIItHTg&L%ts8!e1Ihp>3D}MO6@o#Tf@$hv&6}o z<5UVR5AXM{E?&i4iSNQ4J$es_n658(52*QmoJ~LcqHpqS_2q+{nvg;F1aep7I&Xl=!$ym$i#vyh`|f1&QxZt97H;RZk`G5bl>n zNrbW%NUb~Lz&e^irfl;Y7;L-M<#>P*8j_FIO4=qWUGL?%Ct0}%W5884G;IGgcRN3* zuVF-Y-fX@jf(kHLt*>`qMW0pOQ(1{vWm(HBxV$ISTX*G5*-yaEXkh2UBJiB1M;Hx5idO%P^Pktw(g#KZ0e-RR(AJ9~e>RxPLAum$fok1$D z*&F}a`0IN~x-ShU8)7h{bA6L?f{D1oyCQWt{+lva>n-ZiXtSN9z-q|+(@4VVi}|m@ z(wT${PFJa7aRymeE0LCOT$76Ue1`1(ZRrvg)?D#n)^f5_vy&>-+ZHNvr5TfXl>}Zk zxM%m)EE>Fh21GdlgGYr7BG`?M0@9|B>O9>LUsDXqo~jN!bRaY4zkg@V+=)B^xMb?L zb{J+p?YUjS@!cGrrKJm&AK&5j@qytC+MiB}F?)&!;G1N4rk4`ZPFpdRg)BP@!Gc9< z^hT8%JnV?`vj<=A(@sTD12nXCjO#W$+|)v*57xr?6+5bAq&J@=(Yov)4L{m_za+Rm z?c@^g-`!v}vdTOImj*}l=d-uUAc?xvNQN)guRUk}C_M6nQ2e03URio8|AQafa{JKHV;(l1##&WEY9dSzV3%6SC$ zQ$y8FwARx|ubil!;VkQ9cqHal`ghbZH7}kn(tl+Yh#w@K+ZL75X#T?T_3O+^<%u8!8*_auPqF!zcJ)v6H*3RTFqPIW12=@{NwnLy;&BV6An*8T_xqE{E+0xD^3@6dhLl3kPy6@*8Yt(Tz9S_5Anp7#-K`?~q0yXo?b z)Gw#S&wtL90_qzY-r#xttql|-_K?HTas9g0b}7lC=zB7h7yts2$Tq?I=@Vot;~VL# z>1xoyP98N+R=VTxNc~o(hy;F<Xqq6j|0!hwD&@L`;g_gVWIF5r}*OS|w+uzxXOIBn26Q)FZ=<4O|c`y&R z*PndaQNxv&Y8SWD4EE_S2Tum-Y>H+TJ3;Fk-tQ{oy&KL-c_GfrV@Z-|A5M1O?TZ}D z14AYb0&hpn8!SU-WY*(RvT-IwpfkKwsLtaUXKr8f@U2F6pU$@Pp=O}}Npf1+xx|({ zW0#hMlO(4-4>8H1m!JPqAf{5wH$LL)WnzmVTC!3NSl;y$WB027AiaIJ^R>KPsEc4v^-oe=Ygq70p_? z>9`J&FM1@k@j%;y;gWoj_0A7^-WW%d3w7f5!$Gw-RkN1VBvWa2bjN9V9r|*Xf%_Lk zg`R{9Nj3D1Ef<;ohkLXD=O23uORMEH(DIzHf>IiOs?I~09ZsHUdaY>w4*zLI?*zk? zLZOBx)_)kl=`^Bo1Xu+O>Q(hi2ylxJ0=S!+58CcW{JCeCaKPkO=zvr2{Efl}{E-ZN z@^il~x*XK7RyVT7cy49&KwMm$9t-+otDrMcy@Z49ifc00Lkp@sFz7eFR!ZL4x*ja; zEjKwI29w&u*P_%#)F(Gk&@l^7-pgjoC0Z#;%hJXUr+P7of+BN7ri2sO_mnuQXoO>! z>uc|!{(!PdcKWYf&3J~JkC&6$XbpDR7yhP;WbRJk>>fbWEl0;cJixcMamdxqX=nnkB%i2%J5*38 z4s&k=U!kDIhVR`ih|@VwRBg4;n%Z{*IHUS^?1`Qz|1S8C#brn z9O>`rakMWNkzA_RB=(4I@6Ru?6|XGl4RSuV>u+)CdjMlINW&?M&?ANX%GA`2jg1|9 z!jxC7#)ZCv223DM7b{MnmHQE63{?jtB&5W|M0<5*kd^bw8YZdQ{G6PyQ95DF=-9US zHYF`3Eg3E2vfswwIruFGl2nJ7Z&m?;Rvu zTE>?51^Uil$~DrikH5V?c`?!b=L@=U6}>q?QOT{tQq=SidIT`3IjMtu6cPaGd8aht z&n}C#ziTHUWVUFZh44HVnwb03EKQ7&t9i`p6i`P3jkSdpGrWdio7a^cF=yPKS^Hs; zNA5xf`A{_YI`Njr+`BKAGklB_KjBboi@npWK(^~q=NbBqjSXIXl&`QG&vJ&%rj0${ zTy{W)`-aW3Tx#3vFel&uhLHLBoUahC z5(A_M2A8O8;^}t-ema)Xmp=}B*GWbNFsQOPg9&&3L|)xwU%edkYV1~E1~Ry2$O;)1tzfVS$y011MaaBgPejww8a^_MJk;Rug=Jze!10lc!9FVAb{Nv z?R6daj^L!!uv~BN$bL6D^U7@bqC2KCb5`T)N++ig(yXmJ@c{~T&aDgAFDx#ob2viZ zCAdl5H_g16O-5zH;mG4c;~UYijZR08{4D6=#Hazrbv_ugv#vqRhyLy~KLV1i8Kmu* z!14^-z^RPlQmuxq*z*PrHeCr%EY`to@Cm%psrQIOMPH2>6Ob^7*V^`ReWfhc;WPZg zSnfr<9ju|L{ci5_?#;ZAZW-3R2O4T?2dtp{LP;2=YDV4wl>;Wbv3O5jAX355&}${F z?`F=X>cFLGsI>n5YRC!01k#pQpgsqvVrTYiwa-xWnGMhAOtQY#*0IBGA@6it&l7O+ zh<+8Vn6rdPsfOnG8-M=Tyq}@|)ie7U^h`P?t+pxrQ6zT!D4qOjC@#{0@rT~X@ zYuYh8%Co8jk89CYJzCi^jJ10vu-8rbz-KBA7m>8{{?Sc2LSXNOUvZ>3tXnw~)i$m} zQIuaGkCHJI*iCrn<#^Dobnr+S=Jsk$#IE=XuWr@AshPv@YV&6?443QoA+LtS3L^48 zWC(HoX=G4-KmNhg&DZf|RA(@g6r-iBUF~sr6CRIZgyZ%n?=#D*$lX^|TrZ{#&&-J1 z&>nKt232v(oKe5?6DB@C`RtL{IW_c1bZWa22@4mf7*4*t>g)e<58z?De}_WgTPtjG zC3``g_%iylBeAfs>Y;MhAmJcl_-&0A(YC3+qvz67@hMuEox&ZX$XRAtqzc;BZr?u_ zm~}}vsKyv)*{2rez%{iiQt=Z(65K$yDMyRzWX#EsV?pHlX|VoQ^S>8+E2QL(esqJi zy9J2{m8zpf!XQWXa)+&_)b2lw=ePQF%S{NNZ|v;sm=&4CD)z5>W3_XD|AZ{x2D85@ ziVN6FZMf@UF+9l$GC^o}7mdn|P*$vUa>af+WXxrp(v>(*YnT?bfFsb^#FuvFXU)rV zwLEhnUi-D9({JA1LrHre;u;4N5cHF39;7R6ov%=zY}EJm{gQWKzRAG;n60P#0d1e& z6phM8)4B}~f~%X-h{WtW-IgQXj|oW};7_Jp#}amfFYNPHjKAZuJDzQCKf#`iqi1Qw z9#$HjVWe}{{$SWyq4vihFyNrmcOA~WDI4=#03Nj?Z4gaQEY()-2YxuWw~Z8|kWUu^VX0~eS@n?}#ga@gaO zm)-l+!e(RMdVNAaTK@UmQf3Bv?`Adoa}6pzKL&y&zGC#~>!C1{u{8AgA3re(jl4HF#!6wDDkO8(tGR@ zKNjM|L20mxvG{`%Vp0boz1olWd1d2s%;Ez`Zvu;70HUea`_)Zv{2c#^e5>iD59$V0 zsB~;alXhzTZMmUWUjO%+IoZPhsjB;@PBUJnl=weS-}=n=ef00(f2lW7gY`e$t$*q? z;{V&6!u|i!`B#;{^@V@QognpZf#P3UB@wvM`CsZ~_%}rQ%cn^EZ^zHmGcyY{pcIep zpPkIz`S1V!D0h5*^_ZA=ytDLD^nVq&$W?qn=I(xQcCcn|V`FoP|KG|$|DjXgs~v1T z27{sQBmD0;zW`Iq%gb=%dLbbp3g(Tud;i;gM2H0pTkrMm|C<_b^TOc~!~Ei+XIIw$ zJC98^&YfC55lK8_hRA!WI&+WytIRz0Hqe?&)$!7pt~$#|%edlndROQFC#Roo;qcgy zE@trBVS%htnM)X*#bXF7DnaWh%U{!pmduK4Dza&OH`}5M>P6$u3pv{+YRE9uh2zH+ zmIAWMww#G43`FNKWaZ}qg8MWh;X_PcVzmu5ddRriuO_`1_X5IX?TT$!S?{)1{1_fv zm~6hz7Tpdm%R^fH0n!K8yqfxyq&;;mLSSFjcqdgO_t{^E@WyZ(3Sb;;#LEp2Hslfs zibiSgNHcQye)iBg!acpgCWVp#cmtS^d!ZT9a#r$mrP|QTX{Oe{V=%c@_j^9v)Q&Uq59nJsXSJovQ^cjh+#JOFiT^MEM=yyAc;jd4HU36i@tcvZwvUb{{&k zUlpyy72hOqn}t8|03Q6S@U6YlR3&-c>t8zCZU}XYx&XNVw=0o^qnfLAQq_JapMJ@S z&(9l$aeXc*|FOu{RsQz&_7wV|8jN8o=u=HpuYP!Wfa0*V`?-hdwM38B(NKHM)>}%} zhn#($weq`qCupEoHRWpod5psZ_{}P<5_iyB1im_y~n76P@#s!ih;9kNwSMfTp$5l27M)KSef@E|roxc{gE> z2>;c>AB-;E&PofpYR8~>Wtn=yuUWXy?KS5+Iy`M{2XeM=BFp-Xy8{T(Z|NIQ?uW-G zq~WSXJ#-iRc6pEc92LJyJESxPymWFgV*GS3GHLb0{&Rj2$tsXVLsKy-p*>lVAWlVl zFlJWZnH^Uz6!-Q)tE8Q*TUAq2fX{vL@bz80ooDpWp0;y>)@XCBD#D_phk}&yxlMWK)S&mA$oej@ zFKZniL8ya@$>p!D;?6ERUiRl~gy18<04iJHE;qpT4T+1Fwd24a7iPZ5j}pIf4xiVD ztH`pC9e;Y}CtTNQQ9I*v_;@d*{P-q1#NwL)wPydcG40qoe6kqj^r7aXuX}TcD4oDs z*_-vUn%4sN8N0;^0aYLA-a7M@GDs-%$ueOv2ky^Q3Cplf$ zRh*j{8@ClB8ru9|JT=zsx5J-`S$QQE)xEPIo9$aX7Vdcie=jnbyLW(;@*2f{9Bp56xivI(tfCLzV!8eY4=kF6&iy;ID4&_ z_x<^$W+!0nlN81GN@nx}2r)N?WQsL=NAHWRcZTw!qPz3ALPO;d>4(oZA*$v-QlY?H zvwOmp_$?C)ULW;be$2^Y0bZ7W581A}JJm+WCcs=U)Q6E45+54qU+?x?TY#n>HxH6a z=wf{r3^nEkb_b;0P6TMeBzgJek?=~Fhs~c~eOM!z^9hvW8jkPs-<;;yNs%zmYbnXh zG(p*b_|NQ9?P@vaeowKHWPRho2ipI52%TH2V=_QaPjNpWrv@LKGQVr`wRrF}@2qQu zoZT~X&-Ayt6O&2Pp4*x(4FMS3xwr)_xe9>SMJVTP^_%!UqlhBjtB~@#^6?=;#oR6U zM6GV@N)#DQbcAx<`vLqQq49D+>z>6e{6#(+^0pYe2uC!1qt#RT5JFFpDc3_C;rrN} zMTN}->z#Y8X73tHJZ<r$W5cKRq%ag&4SXVY2vJK%akM;q@P{@vf48^0AoD)!z5q1+h%+YF)B;SB zj9Asyl0mr$6q1GMA>ve$gC!eX2dHUUrDa@~67 zn)R$U#xTi%c}`jnchaIl_cBH_825&PmD$4Oy-$%|0|kx8v6xZs(4j6VMTXAVZ+=W! z${Vt~EvhG08T@sjJbo~SddI$g4I%GNi#$1N^&dM=x^cOx11Z7%nfgNtS78~`L?LMZ zEL?#r%fkHGG}dfV4?5RwStPMcYO^;@uEx-)nxN!v{t-9N(__Un8W;f8^}r^d7;iuFDYbNAnM ztUf&pW-Vy+r{?d*4BnXzDYedwgInvbVP2PLFU&~*ux4t5td&Al;JviAlJ~(`U# z6;~GsRbTl+gOVnjIjZfph$Agws$%<%ENoG^eO~l2{f;K_Di|o{i6}!tQ56+Q3U5V} zdYRjN>czyS)6noV+*f;Sk4*)Qfkth8 z#@7R)rS#1j2Za|bl$Wl$EeU)3@@a+m3Tr`11pjJMmwVfi=$+xaOYQ}cia$0c2OD&m zW4AnxXGAj}kq>_Ry~C##O`^Wb2t;kF#psC`%v)ak(tLV11yopr@N%m&8Fwb5HIbfb z*?uMFIC?nM0@N_*+a@nGMsVoXT}94odbOBnud(INRH{cprnv^Pkg^h|>1_0<>veBt z?XlE_{Ua6O4euizw>-0gHbzqVyGo%wF4nt2=&8Uvz#_;_aCn@T@-Kx$$N10>exyz_y7|Z`e(=A@5JJbBT;AGTuJ5O_h z`k}H(-;~ypLF&w)%JZGBetuKUf%m>N5^=Bb4})LU$8Q70XM2*n-wRS^G#sM#J~nr< zg#K=pZIcS3fxpWC9=uKA(jKfTl>bqQg(&4q*RS=3!C}{H0Y14P6*fNm`BU9}Jq3zX z3c2L6x6>RnCD3jiKD6Z*g;cXgR-O4>%~TfWdvS_;pL-@AM4;!@q*KM^$XSHfQ^!T~ z;Gv-i%Z{ptv8bF_DN4QG_7lS3J6D;`_W01j;j!_!(3et;ayO@l8r}(SmQGzs@gIVD zrBvQG)tW6+jEg8F_r*R2q)-gTsZc^jmd}c(d838~R3!fhFz)R&as!rHidEz)Wy*Ia z;)vSS!Ybu`a+^-O3yNLOFo$6@8ksR&ex&(NmaJ@|<(h9j+VyCQ`^e4o!=uT1D-#P~ z(y_U58IQwtBeQFDVs=?D>#4JmOX)H9Tg~%WTUc3G%e(H6Dw>9mS5B|`6JuG;XgUst zQctb&8Dp%t9Ec3`18(YPgv&q9u%yyASo@+Q`BOi;i8Rb>H!WLC3tB%i8PF2+U}}j- z3WQ==9cYR+R;BW&nA4ytyO3Vb?=K6+pUpK+23x@FMKx)Gj9gCmmXVMsgp4|y>4b^c zvu~|U2)bSpDTu_Ob|D$5g|WAT_@K7?#$m*`0A~IxL5FfXnpe}fPWh+i*2g%!RM9U1 zH{0gA`UM14%9pT~+@ zf~4uEZ;9{$C;Ix0H<{18M5P(052qNUmcuKgmh?-!PjU9CT-CP7CyH`vHEJ(F>OCKn z)H09^-*-z{G{Y3yId-aUApI1p54x@yZ$BvZrs5aEfv#2~c?qO+D`ClkgY(vq>v^`3 zn-mS6;P0A!9^OJqpmo6YAeesaJFgRku3C+%m9|J(Ol=&QeXV+PC+FptFK*ol6jmBy zn_!UyHQKo)$tMOfarz3=IAwT(JX`8}3L1GN=Yme8T8(HVwnv@|vX~MShbkvb|L69B zucsE(wjyJFN#@@3z@%}hwp5Dy^YYkky*T2n;pVu!*%rA*-_41fAd^hD>MGS zdont6?UEZJ-{r_!TZ!8|_ldZgrXD{CtH;*OHANo1w0K>bu@*+>30=|Fl+(O$4#>pO zp=Sl#bY}}=9*Hj1I{}Zf`Dlcs$|RgA7?zO>o;=bTGqSI z#zU?4!qZ&iTPz_BEShy#VK=;0p#Wt41{vV$jdW@gQtf0H&zwc+?{UGik8DHsRs>Cn zZ8G$P3>vI^LQZuoYP^rVNIPnBPMC@ym1=Zz8GTwev80I=EU^AVQN+gZd8hnZW>9b8 zOC{9_Bxo}ntt66z6^kRAsJ;3%iMKp4zH(=)$m3)|H)`F z1BBupu+Fq4t~>2vbn@0p>LW3aeU%lLGZC~-`MY2zukFk5BAX*>k{{d!-Cj0n``+V7 z2`9Pz@j05S*9k4UtqExgBkstYPRn`s>s-023+ec8ZjfE7%2N`HPF#<+ZpQEmd3QG} zFCWeQ152~thg+)5@P)vojqRC5ml1dM7K*?RlB`MJu#ReVlw5ovX)peI1VVVXam&!j z>8?@Ow}hgs*jRALqZo$j6ynzEIKFnO*A`h{AFJ!V*XruAFeg?_hD+1`i2tpGW#Ip_&S8kwX3w+Zf%gZ*=zS>Pydrwf5f7jZ}Hi zb1JG8jcR~zmyb$UZ6y6-P=?Z`2(^4_7C()YO)^i*4bxQ?#;}rRGz+>u>(UC`Yr(8f zM6x;M2eyLRKE*wvX9fp->=RMDn6jEtdSm~q)y~dnP!1?{EbUb3ZKa;*cP53f-u>E`J58#xB|m5 zCleB+r^%JRrhpk%5dsHJ|0tql;0coC=OVF;88=sB$`N~lb1xm=PUO>DZ7Obp6e_TAm0e5Xt5Oue*8 z7d^w#-}%AK7|0;bS^7wf_Q)tT#lYHa@9--J37oGVzzCeJIkKAG^a6g2-`6YBEb5o? zvD)6TbG}$NaUq#{T*1lvXL!;cVAQZxnmH?2;aHgK_|CR(!>d0dz;1hS=QHR!+Eqso zg-O&)7aX$*g%Eb;D8ISW8`L*hTx-`xvLc2p^XPwzd?`A7K2c}LXOg+oucPb5AbQA| zl`(Hj18p%udC$(wV#a!x7gyx(Z?7xTK%-?Uum7owfMgeSKrbPEWa4qkzn9v_002o( zcQ+3|C!dXQQ%*9c{2wm?_U7EW9Gli519ufVogW4ab}jE$6Aa84J8n0+O6GK8amq!K zZEYWq+>$Ge0Ziha*sj^%Ju7FJgXE>|;P9Bp0Xcxx4 z-O6*8&+}w=wk0uF^SFqBvGHmCw~vt_67suVuTI5=jz6qM!$p!#vcyD3mIMBCn)+0Z zyp5f>rqA;WZyeQkje&F0)+!=s>z?7Wsqb28Y09eb6}`5E1O>ri&K%avso{1snP|8c zMBjL;@-^o=TB3X!Q-;zkJ zv%`b?VO$ItAr&@piSjsCL4OAu1MiE@r#Iz{ati07jbfUFdM%fYEx>?ii^2jS@~j_% z&9odR36moNd-pPglomeXhvVbjx~D0~)!p$Bly^ASPmh%M^sCPa-Yc+>P2K@(Ek91w zu4X|fw}%Q4p8l{~d~F>$6XPi>%d|t6&z)&(9$O#stkQTXEEIwd)dxZ*Y`#cOh+g<8 z*KPd1Vw~!!jy@8a-&2H&tsD}{DSA2HmgX#t5tkMjmJl&~Nek#v;Iw@aCf5MJGO-|U zBd^N5l5Kmu2%Yt3A#!vMbFv|<$k||XFv;pmRc^~4pSsF9tv=&CJ!CmQeI52bEw(f0 zM;w9#E3{jj$FC^I{$g3HjQy;o@hd>|*uJp+!T#``qPMRph=|(pK{zc(P2qe(d}WUq zqK}1rPXOgnFN60Noav9X4Wa0}B%2uwz)IwenYK_m4 z7eP1i5~qq5eL2AF(l?0%gbCGuZhip7$1yL5YZyIlNUo3cLhZ!qOizCdQW;ab!jU`= zD3K5rtIH5!wun9^MPH13`$s2;arw|GZSiR*CspEv1mxi6Fd+N+H^0u*H4UGNhu(+1 z{@cU<+Vs=5w64w^qws9$UxH;TkLy`PqPQQbSg#6|A@0XBc4#o=3($}eng^NFi=5w5 zR^KKMf0i&N7U^oC7Whlt^L2&oG5>Q{r~57UlnJ@AEZp8_)(+u0g}8h52J)Y0zH*ZZ z^x+NB5D*s>d1V?@AgyE_TbBz&HID2l(UCVr1Vu(-3VCEx6hX*wsK**)FT<~pLD`hu8t664KhzpB&zZ;hM-ufWRxbSmxE~+9>rR}T8skaF#f1}?1aJ}51#sw#6nE30JU^t_f49pruvSRzV_Ou)Ce8yZ-d z96lb2o7@q=DP@>UubR~e`THDwh|qm`pi{q1%&&c;hrsdW4J}Wah0nY^gw`G&DG$~^ zL02Eq83Fa*8vb$fQyk0cl+yAO{=%0_;Qbj+lf*CT>o0$w8w_Wk(pq!=*R#0eD%#}} zIk!{bef@ah5#O)5f8Yq1trZ4EiJXuhv!F4qZ5^%Jk@N1 zfiXIE3HIG=_R>m3iS<_QIt|E8A{4|mzqs7}wD7Zi^v%Ehc8YKo03z38TW&O2;iOL1 zAH!aXn)r#k5E~|YY?6PnUkc}L^4zxk2$d2)u2KUiL4ZJDXwhDjM7DqM8`<=v-GthN zsWo1Fj|o619t~Gw)d-zMex84IxG{}pmkqyJncnVpM?-wi0Lc#!o0>1P=l#$OsiPoC z))czlJE1f_S4>q-vNV)k5!d8oPF5sYni{xA^l$%CZLMEkDK&+D7k!`VjADcSueuZl z+#2__w&34p9%|w$&eFI0p$P{`noa3E5p7-A^NE`S3#OZjy!8SU*XxdsSK3Fc0iPin zqAJMjh6~Hr`zDect(${C8?KoGjnm**y9GX{bBQW`C`?V`wXm?P0=OmV&L-{c;-syr z9bR2ta^8g4{VwmXd<6Zx;vEbaX@MKBt>TB}*Lcy%6{K+Y)JG%Xy8kn6{UkuabeGrh z`ZxEnBnPLpJ4EN@$G-&UbN?cbEP2TY#N%=*GqZSkm9)fJlEP%Lvu6vfsKa6tEh?c` zvZ=$CTG@3@Gq*;BOe5-L@{u9JLp0YvRGnFyB1@?b_e1pz`K{YWlAIVv=sF+H73VRr zAI&^C0Wyi^;b7-y&U_wS#mLUa=d*_9C$SgVfBQ_#SSUudZ#A0MdWxfuur&zFkMu&L zh~xOnQ?&_KB-eH3s$6K*I(;BeI@r7H&)rhZ!{V;;ql4$#+|B3E5^v7%$6mkNda2f2 zDaNEp9SjnC-o0;ZC$-2=Qp@+=5BE|p_aFbIH*YDe%^rGj@~wy~=I~RdWA?U|Ot@=f z&r9fZ6@fRuTLyg45{RymukO{84F(@vht_+P(xplghve|k9_Ch7o-@)kgv4UP1fUlA zV>P&M9yLsd%~ZDT+4qDt8c$wk$IC* z4ZvBX-4od_3*uwJwsaljt`IJlUdvnK2FA(vQd*J90>xf-%O8~$Gbf5w$OpZWXKWpl z8FD@zNzQ5@>K8=ibedcW=8C-?ZFXXLi-Q)2xV^rs*BC8PYy0sfN;Q4rN~JrTBKr$; zNVui#;r#gn5z2VZvZ?ABN%0L{B-TKl0H*#zHUE$Eg7;@HoJhwAU!UHnj~^a}Y?DUG z@}2Qp^Ze&FlULXK;eoGKEY&s4{lVeVhsnNB)Yi}RTnogA_2B1Ng zwwQ;hik?kwlf6;Hv)ULSI{E~xCo#3Q(y--3?YaV(y!r%6|S2MY|6~pY}uZu3(6s4z`^Lh_vQG|Z+Hdyie z`ooPk?a|-h1U~&)7mCX7M3i!}lA7)slUz@-dMMA@%O}0d2abvN3)i8P zbH2SMF0gR?a)%vnhs1q8Z}G?7^MUxEdeq1JoXzrO1xcg+yR6Zrrtic zvrvQwh+YzW@uoO(m#j~S7L}R3kkUw`L{%%G59>s^L?m(7UGq7gY$<|nJ{wNaQcq2C zhV3w~SD(H~=8Dk1KCN!(kLQ~?%PzlUn>jN9{NOPRz|)8w>57jizRnZx3ix_oya#; z6Ou;J%Zh=4)+!OJK?F(-Q}Hs%lS zr8etB@pA3WL5tv4)d$rE<&!3PW~*o({K2^%r)mz=o1g!c zbhIVEu0to?wP2d8h}L^KL3mSd*STDWN>5YRVbZ`t9N}>5-8xmfO&aXh>iv3!KDbiw z$1kobegc=SGzJ?qh|>jr+flNr-ZSobkq5f05!PE)pUIEbgX}v!#SWSHG$;^k@zOKFr5SO?0xW7yQ z-J81`(^;aShOu)>ZSS(f=Of^qsyweC)~!4EN2!V*BF~>Hvvdy-_VX($+dz`NRCnP$ z)aVs%72v_3=m1xV_bbu-I%oceD*t~vmj88iTnV)vRq7i(2sU(baazOctjt=y`okWe z8{WeASO|MJTW3%7qo%W!2u?&7qvhV!)4>V*?&j+M)yT<^(n|r6(4~~uIJdzn)l2RF zeM7wpgqpDU8$eew|Lrpjp|?4WM<$xwo$2GF#caHgH{FE)l+RyZ#Yjz9#Y!0^=B*_U zJ|(@Qd%XoGN{{*apa0Q0MgGrq<8e4t@~{2e^!&KMAs7K&WVNuhxS|+Rg8i>N%11Zg zHGPYklC^{KZ9-HU3K4G9n8*%^q5e8q=x_`PV~9v!t4aS*m>g9irbOiWe!nedU?6h8 z(Hvd8To`h{@LP%)`oy#-$Uj9NOxtMJt3HgB7DYCGHG_mTSByM1qH>?pPmK;)QDr(R zIerR26K#86fq)Qtj%vw zWs!vp19KPEUp`pP1fjBcyJ>G)eakXL1# z0w-~PS=6|e-{l)P4a&klEV(rctEhi~UWfcWsJDt2oPTGH)zJWRJ86the$YXZDxZjPR|rru`jg z2J^`A*L*gpW*k3GdXV&EJ_xYsE-$@5dyrgrUhYhPvG0^48=oMLk!3GTulpQ4ah(SZ z8TXbRE7#t>8I*;k6fb-vTHd4J!lT)}i@2ZvkTWkp9rS(#WPjB?8!E0gw(k$9Bb8k z^lBTIsPSlp@YXn8O^{2CxbA*M+vEjpqpcR=Z;diIsl?wMztq~)ciT_C8WFSs@F~#) zK?O6k2@Kk1WgC}3>k<>UE$(Y zG_<62|Iwd*zLdz5bQQi?n^xCvyo#+otr}x; z=G`igmQ?NypIS9#N5h z3di8QX!Xg`N#EBO(o3%2P9{kf57s2Qn|^t01=iA~FLC5&UvlTAw3P2C#e8%w#b14X zSbe^Ef>}~7=6~E@jIUgebyQT}3Y3(@8|7ze^?a0Vy`R?86v<7(8F{``l^iH)VevGY zXW_U6Up&4{^8O^NA0useVfEgHF}OV(czN(fm{H?WBb<7CNJokgyVsr9c?&u6}C2L!8jFB+v1tiy3{cZQUd2 zXXvn=zFm_|-{<&{XY5X-e1CH1>S!>Q+Z=NLwTtAN^R?UC?yUTAg{us$T%J$ z6W;2EKqG`@NU75O$!fv=ANt4Mlb5=4Ijy?hz}CA}n@ms-jl!Mp1oSi{)5kq&Abro0 z7pk#x=xX&;6#U{mz25ZpF@Qf4zj85@AcERce=LH*&Scp-7MYVgUhfET=BSp5UFqS$ zo4_k7p1|WpGvQ(v<00JI;&J+9<|gCfy5w2OG*BIriz-IKpEM%jhSoc?;;O4Sq~uLe zGw#KVj^F?qL&;O+h#qQ;gYfR>55^>s(ZoX{Is9gRIlD_*SoGE4+H}{WlA0^kE2RQy#)4a%?w#GZh}P+*mQ&>gHR~ro?GaO3N03Y z>J~Tn2uM=U{*H^qyf?62tbTS+c73B@r?*Y1;huI=jea=$nu0acc!CXVyRZ4+|IaYy zeO;(m5{`$AB_+LqpNB0iEDrH9Kd#8XgpYIw+=HiIR2FPH-&6lK{e98Upd+zQqzWpw zJW3UuC@QqM_ExxeM3<){H7tCT*%!89wa+FU7_}-I(e=)AySu|W(kjmel2Ir_{Rx{rMMPe{dG%-wzL;k7d}3cVPlm5I#+(!A*1 zpDM!j%h4Oso|*Rt?Vs0fULN>gE;PGZ%+uZ&B|jH>dnr+rTmqG!H%p^Brav1bk|OOo z(?2}$^F5w+%1UQyhz`EvyI*bXatZ+pafb3g3=YE_`bu+oKdp7PdSpM*)dX`c*;wr= z+;ycdT@}gw7G;<{zD?(wR5K`BdwJTK4TUU1n0f@$k8dZ_Uz$7)*oqnX8ouM$c!sXj zGVBVN_=a)Yco$#4&L6GX6{eN<#xKrGeAZ6Tj^|558t=!oPH&IwW|Efb($KZD`IpC0 zex(Epo!^|+o85Xdr`^&QtW_%Xi7&glFRi1zr_xBUi>ojDj6`0i>{p)7-1{*EI1v{w zXWU@+TAiwquOS8?T3-yiIVTCPZw{ph|Ng;-x|4y^TU5-%6f|r+Gz`QBL7^(}FY{!@+&>}*9=uq& zGJFP;Z%gLbI`N3GygcuC)#2plr9+}{bl~62iacnvzF*@v7v&HjARr(lq=@M^pj#nJ z5Xh)BieV4r`iVZ_dhT^(^csGNSV`fxu`lt5N`#3tF4*6J#ve$%Hb&iNPCAva%oyZS zi3Y6KHQ%M!0#MVHe2?bj;ps@%4ishr@C>2J*sCke+>(XLJY8>x4JMEZ*XrqObQ#KH zYl+PIP2jw7L{AMEkk?Wj8b`qmrA*qIh$M&#Qg`4=;O+)1h>DKOjCQ|82C%xiBwn1? z`gML|PwQWol|2)sb|9|M1>mF)|B5K@ejG{tt&p!hT#M!Y9^szVGvAC^=^-A#B_9`ozoZ z<%bWY|H53e#kRnNiWE>&5hTYWIivRo3$LT1g(g3IG`D+v>|iR_3w8}BU7n7I5Peu5 z5ZxEz43@X`(@JWBhi`+#{&JlDD2e;S!_+Q5fsGkz{d*uNNZL38 z0bD_BVFOYGqTr>AZ=Z38+Q{$6Jx%ZHM9uSH!l9whaJETy`8mnuHP9$_MBB}wg=iwd zJcUtzA92WTV~q!N#2nPI#fy=FZU)-FPa7+w5(vyfO4{#_4aY$_&g5u88KM(%KOORG9pA$w6m-uti z-RqAv75}AUQ^UQ%Hi}qTn&5ri+UZbXNpw~I&Bj%TAJhVP!8nNfm05uTjB0TpAA|0P6ap)D9?0*~egQ7AR;+Cn`Nmw&)0#a5uWK zLG(3QGBc*(gV(T?gjK z-ghjxBg)97+3vJx+rHs$a_Q#gu0s|<)2yaI*1tzP42;X@3W?&Ai#SC?(m|oQq%AW_ zIIr%B+CR5749qi{mj*Osb#_HgS$UcBQd`&HKfe}#e!9|snSzLL{>!HH-&mr5A%M1} z|ML9!)c?;g!vE}lYJ73YjSlJ7FSwj86DEPK%gT(18%h0p@@ry8(oo5PS3288@D)E2 zz%jJh&N+$v^_AN*lGPVkQWQ`|-K-?4=t+=V8l=8vEJE^CC0=<3Z5s<+l4Jvj+a4%(&<@}SleqFQ zHer06_g@bUz&^ke1^@EZ?k?~Pv4UC{)s8_jCiJ9qySq^`ka&~MRX7a$M5pz5}h8{dn5WaId1L-9JD@K1$YHXLZJlG zG~B~|Y;3)@<`N=2nsPGk(yHcA7EV^`6qL~*KSbODp2}S3U*2{aZ0&?cl=4xPY%;G& z-QhB)E?J~PPs^T7`=-dgTue+I+j6v_c3ck+V$_KJms{VAxuLAoF_JDr<1KHvQmkNL zZa>G2ILvHgqQ}S0DrIjgBQZxx{%|mIlO#*Qr?`s3)+%rb=*2xE!cG2;xU-`YEk^y$ zGy8txcTbBR@_nrmiZ0V##XZal{l1N}qlTA+=I7w0c{L4<-kq}kcgu*#*1s|;Dl)=5 zF(ktz0n{mm+`+(D?}kIosEEmOHN8}S)sj%Q))ZxtP`=(h*=Zb|xFa&e zWV_&;t@w$)<>zBIxcX|5_c*q2bsK*$UALkna+V5zhNZA*xd>v~TX4)R!o@^lZs2J# z3+G+O8jzp?;cN-L^vEKb_~>vt#MTxbxTBdQ(Ai3<$k}L6(o=MoCs)%_evXc`#j#vo zP3P3rzb8XsdKJGDD;UF5P|)V(L-;tyroqEXj-GAHyfQLgN1(-%gex$e-^y~yg$D#`w=}?zvun?0I;z6vj1vc4V)3#p{sU;=VuPl7y zne}mz)7e2N@?1q9M8!q+;fND|rq!HxZQYUyY6wWE_{eGriCHVkI|^2*>dV-QSmMP< zn;z}CUL4UgQCi?~^4I=O?I0+WL_n6tCb=;r|IlrefVrW+p#VqTO>k(t{@q-}URyvI z4BFk}woZU;8(n%udEl_{CkI78J`|nXnFn`G4CQa>Cw=2tO5EBZ(9~4j-$heX)5h@) zPLJ>JW34BKgZd7s7T1$iwU;bZ;J-xfrKPR(<$uavkSZFK>7$aA3{McNhI`9)yzN;y z51LL3>tvsvMg`D}3qrqAF3_T@YH22JVL;^+W3kg0LSl0_^bZ!26w9KfmxTZ*A2$yI zWTLUr36nLWV^9(_nJIk4uMEhr^JbKHcM=S1AxsjU^z%8&tgfj5oYwrzx{Sh_x|Ze) zK#{2fDzt*QG=P&&$c)a)q-5j-JOJBi$O)A`BEY9;&Y>f1tw4tcP0J^xMlJ9#0s2iw z53tj;UnfSN7eo}w+OOt5uTKGh*Dwc8eiC^ngtoP_k?W*ysppjK?I7=ECH2CTJ|4Fy zrz?$*5e8AhdPU@vWkR~MM;e+kGj(=~YS!15HzA4$G(~@CgR;})2_Y#75m&(@CR9hi z%BhC^k+KZ5^j%lls0z4R>ue+6kA8GvmbAFo=oTpY0he^shQ~D|)%#7Lo7bgRCeNF}o6E&5NPq=Bu-xuA}U#dnaKyt}*D%cpQP z!i2<0|5!{iN~bXCP)ZY5>hZgIk-5_~#4YK@EYHMGr5Y~{^d;M9}0=tEC zFxeqvZa{sKpV10<4G#kww&Ue<=Q9xj9kE@p6&cJ5GJ-6`jb$Y@34>@64s6$sv#=r} zV!hsMvs{C7nOITsEFW-b!8)RDL-4VoA@xH-R{eCOXa^bz@Zb21Acyc1Xnk$nk$ zqKyX=(QxIq)Vy?;D$^X*bmoSUG@cmO)ZMSLk-Q9N@azUMN@c&@krRb4i9+q`AMx?ht};BL=#Ub=qjO{~pvG^i2AaB*;SZNVFjEwC-feR<8+mysR| zkN_t&>1BdCvLinRiq?4$Cx{SW2x3T8#hHH~g=bL~ShwRr%0Vw7=vuU*P?H?a2Q5 zpI6uY!viG+1$y-y=YQlD|2uy2MrUY&-{xh+@tX{N#DAKC@p^vUy>$sH2*FVRXz&yG zhES;BTL;mdP5iiuvG1bvt7es}AXK9NetYe~RVX*QqCwE3^CKlW+HdBbuIxnV0ZGsh zl|@RlWM457=lncpef_YnL0@cVb81(~N<<4Wm_osxlL1q8ULfwA^ZmYr1SbYvl!Ma` z17G@X&iUJ^-z6jM(U*RYNqk%HMO6uq@zOQNnMqUkOG~L~`Xt3ia0wHFDEHpuxZv{{ zN0P?(3tQ%JO7y?Z-_w^8^XT?pd8yg*GPUV2Zfat8z((M$xEr)&#pu&wUkk8E?8<$Y zU){j9-aKM$P6-)5ke0JHgnLB%>Xl&rw1n%M+`diL<7vfRwtAx*)p%=HLh? zeqJR30~abl_$R!V%;~BIZG$Nxu3p7}sRA)G8;c@UOdPqWN=;>N!+|2|W;2g3-h-PxQ(X-; z)NefLTi-6z9yyd+{s&+AejMj~-5;;Z9R+Q9H$6k6{7NwoJ3AL~8z*T)D?y8sy0D4F zZ+!;|!Tl0*T?>EST8k0AeM9sGRcBl-1s}582mU?N5qplQVJIWWEZ;)E7TA+#hh$K& zj1~f;tS(v0koE->q>*p$4G#fwJX0ktaPUCoJ8;sGjseg};C7U7J)uxPk*M$3-q#c6 zh#=3D~pS!x_Y_?BY zv}g(%Ata0+_|f4Q59fh`7qvWZ#-mY~GzagQe?=#y(uFa{J%!lnsM58>c4mL^I2?Kl zjCy+}?7cVnah4Hxw~F|RTS?l@N`%+7jQA-d*b|60KUomXF{@c?UEdS;sjD&u=G3dX z;D{(;VNwd^Q|`doc)z+~fh{w+v~LzmfLzyL$fv<$5e7|lWBJTfUrjXaE~5NTG6P3N zLx>TB84(i&zMj zJ?9M*)3tC_MO!8D{Cx%XrNW>V<;S2tJnaWqKtWYinqdSU?H*dJbA)>iaL{BD9WaY8 z=B>lV5INAL^+T6yx!U9H9o_Na_hj-3ZF3ir0xFsak5@uEN@)4}inTg3vwNy7Wo{2; zx2Lp23_6=G$2Jty{|6%sM51m*LFdMiDIt#56!r?L5nFeKbC8ombh{=3a2}%x`4r}6 zJ4tQHhEUQBQ3-^$6!RY`3T^y4IA^}WvWu^JP~6GnpR?K-=WsiHYLZ;?)+)k&T~12 zoFHZ!9jun3*1;re>{#v}uDx`IqpnNIZfT=IktnmD=!1X-b866&E$63z(muMtThz!7 zoM2=#&MunUi?Y3ey)Sh6J-)<~MC?t9XK7hrl|7I>=^rJtvtvZ=i>4si>|5{eY*8*u zQzScxjBw_5-I3!`xg9>PmfCU;aQbF5_82YXY*}F}G z?yuV*RAO1#q5&szLw=5Z;s+uO(p-{)79zixSXrshu!@S6`S6{FnkXHxkqQ zgwg`1Je5Y_ec;}^L=qL(XexJkP;GS}3t#t_r9;691UeSosDX`4k|Dfaec@ zD{rVu7&0&D3+vUhp?<%`tYNRd{p%YSkZ);hN#yuMrbDEga!pF34{!!HQ~@w>l9JHX zxeALP6bC^+VRQNUu_?G80u_`sI2q!l zk*jAN!-MM4-!jyg!g%h$KekalS$xFrr}iH~?GL(AnzR9AM6ZqyxF(Gpni?f%GZi*a zaNoN^1V0RiP>6SK=9YJ=FDusZm`EH1Pnt{Y9IvgCQ0~7Pe8i!v(-+A0R!T6_TYl5tz%o@$(!AV z{uPGn7+5z${#6=NmI|LgX(P!fGOl0pqc~Y&NSuT)mP;ZPr-$591lqIZ0S|tzbL|J} zhbwGO-{7o|!^vKY;HQ}Lg4-Y_NPdtLF82yIQ+-;f5*oh8?}>&nx8lTcee+Pmfz_{r z?>q=RLh#^8EVX@U4qZ^F+% zgchf9s7}T4JD+vvlUfWRN@;S>J=U|3+=`$Ye&jSn365f8OyaEQuh}ymcgbd%p~cpf z4D)iEpe`}X=6qS-G&XcZdP8^}HNRY0x$TzD?bKUf?c;Y=6(mkAb92!yYRI9c!@HX# zhrfA#N?lXWHb1jc+CZ~*ay5Z0aF z43w=X!rk!XAq`CmZB9$$+SJg(x4)U`Op~}nw_}CtVc1vh^HCDNaK0+U7kt5`-IH$l zgW;*WY=Un;w87F%r(Ajv?k z`jfclyQSGAgy6cWAH?^K&488MqgBXHlV~AA{5@+bNDxIEDJ8$Wc-tuh7#ug5RoH`e zj^jT}=YdmN>1&?O9v>$~zn9!xLyl?NxvfRrYV9#=h~1Njo7OywZ=b@6;b_)Lk_xcRF`G0+GvON019P?UDT0SbKgGs zYN=7MHaJ`sKJ;C%^lYEX3$6-F5I@50?bKnh&Yj{N z|4?Q4Y$UM$N#;=y4v7B&<3q$w4CH1WAMNBNuO&e*_|1MAsZo`hr|!nCK`9D|OZD8a zK&V{E5Bg5@lbwRc`8tEftv~l&Z<>12YO4(i4RCOAtd!7om%{iV;4bo^5&wi2Uc&5% z`ijS6BQmG{t~*9_KD@b}IX<^$gcq?6;moOy9!o~MYbV|*oGNuQQ`NtY3o*EQOQI z;H~zVlg_%H%z^AmC6l+^MZBJbNKQhvHy1Hq8zuhcLA>&K{~lvay*)Qgvu%yPoV$Y3 zFDW>{*Q3Gk_7A8YKlRbLzGw)ANB~;Wpw=J*>DYp&s3WX3@0Qs zW%EF&3QQY2k7cQh9o*b;mjf?OjG1b6JcH!H^~>GIBP+qd!F&v9-Cgq^71|gRh37Pq z2$MBNVss_+S8Uw0z#l~FsueY^a-1NhMmMA z7*ED5{r5pyHd9`4R^X{`h=*VwLAmMLg{w!Nnwk3NMM9~QJhciB9*hqb1h3`>clqBs42H#2*d_{Pe-@qx4?ZzNCL|)8;$jSycE^s7di3a42 zTjCt+^K?&gh8Wl0UJGfWE~#}6tNs1s z{pZi+y=l#sBBC+^Pw$Fz6OJir?L$0E9}H`vLTuTQQt!pY&ejRrCFm=GI{`Yi(#25{ zt_+v~?ZFsb$1S#RCim-=P3XmXtU{fxL4#o)7C2)|0%YT_cB=r${?1}M!EebtUSmR5 zM9}ajiVxffbd0O{1R@8OVF9rp*$Hcr!!f%*27==-T)5x+%?yAoO1~BXx(%GE9CG^O z`o0CEtLiszykXK1nv&@KzGV*tPR-Dl)HT!XL(O4*r*;m*1>6;cf<(hC35`DYiwq>P%9g;*XyuzA)9t7Lw&Q zdjU%#VT!ToMR(=8&ml`^7(;o%?FT4eDUP&K=}3LbS`cUN{Up?wJd|%t@;*8QzNeYV zOfC5v73MukegJlo^+h(%`LBirwORdwfU~Nt64P?f&(Vxk%CI}b@_Y4;->3o1@oDqy ztaF@c%e^Ou+vq4FeF59kwta6Uq%TDfR zL?j|tKa6aQ9dx9iyUQ_3NMy7bAYCJvy~)_Z0*9$he@8UisoXHSJielEY2lHD)W9Hp zE`|D8Nj>v3AXwRk#ITBe4H}gZCx-Uk6Y)(`aQ0W${1C2(e#-Vh(Hi7&MNc}U@HDqu zgT;c4;Nu}~Szb5Jm^hBvhk$@lX3nMgR)qoZQBIU85^o<&X;Ihtv8RE-LDF&5&%>~Z zH!T*?TCwqz=rUiHeiP#0HR{tu_752Nq78@xti&Q!Im9T;B|iZGUg(iJByudH=_SLb zO;2rOOYEK=8VfP0T54QhW2AR5$#19#(FBNTrL76k$24>}{N;6Y__P#6zKJs5%X7@{ zK3%RHaa+Bb2?6a$F_YZfKR`o0xjn4oT@^U;PJWbj)NZ2LXL)O#XhW#AafY{dA5>9S z2eGCF|792Xxl+4vf^lAz7uLO!b_n=>VuEd&(K0~wlOk`ae`&`xF|qRVOp zgc(}aG^7!gm6Gt>4b!(c&L+`twRN@{eNaZqZo2q#*?-`}s!Zz*$WW1%E1zy+kGBCjrD zuc<7rLB^Lw!cWRjWEZ;->oc4j-Jf(}OFn$Lq^6plIFyoI*B6%g98X87nV#g8q(A;mH{lVcf#i{WFE}PA^?Zm8|9`h_nknY-RHVXa9+}!SNIDxzHOCCXS z5k^_I`Gmwo+00pykL18sRk43maIZuz>3IOC`?#QeS7ikGM%CCb-pP>-(?8&SPj(#B zeAQt#)641J#?Bk~0!|X1uQa%-E37opr-NtX0^<_p@+i`tOMe6ffvyTYl)F31;Ry3M z<$Ba{UGwi>fw8|{ZL-UFfH+~AlZ1_&`I8P*>9f3CWA`_)pKd+MJy3&9%4 zkiAV+8!D)p3BH%_7Grh0 zX)7x2MC(FYb4Eb2k%2fQcihL~=9cmj2#--$AIVXWoSh@WJO{Co&#|+#+9BH(L9mI$i0w{*LfWH3tttf zwj9}NB5ZPVI?fsfI;t+i4x4_mp<+B2!ma!Thz9~$sY8Y{G{8Wub2V8s)9ucVA8+F2 zzmPYk9}of$<$Lh((U333*u@tT%Z$YPP>7?%mN+=3d*z!FB)cbS*djEK=Y~xrS?vQx zw|aLV?^PmZ<&6U*&;rUyk-IlVd^_gx1oSCx)Thc6F*o7jlVsB{WrFjJBFV)$Jj#VB za)5r-LW0+^E@9*wG7=P&#`n}6DoG@e@G<{5aK;y$Xvqe#+@t~%0-yer5Q=r5=K>R36z2 z6-Lei+r6&Jmw`O>`dCTrX#HJ>>q!HJ$9gsTgis}_tuRD~8$_l^p2=0E*(Fv#k3=|1 zS0UeJ>0(QsJLq-<@>DE4Q=U<-E6;csh^2ko#%05lIlVg_1+GC8H)%nuq{U9mIQxq#`~$+B?;` z{RvVO96qFhaoK&<@)OA@({H+B`ciwpSek+t^CmMxsVF@Hp3DG@$$7#QTi_vzZQlmF9VO0d3KZsj`Tol_Rw%o zG_N_mO7Q(V#GFWyOeEP`BZ#^Yb6M(A07bks32CNnh5PpoYX2P-wv|Ds_A^NDO|hwi zC=c^?tc=ueFn>6~Suw8lpLIWQ*nAEIBNFyb*?>KhYIMVN6o_3Cd>ObOMi}5D$D{(< zFj8g;d-Rcm7Pj&B6 zqUtW$G7|qBgQJ%NYXq=~Ol|CBG6!g9!wdSE=Ngz5idPXxC$ZxDmAi6NTxxe~2(9W~ z`F?EU#l>7qQ3}yB*J6U4`q5!Jo-BJPotcxxmc8ajRSPFoRkWV&bN^~x%NOhhj#JEg zsg5)bcUM?ZBwOK>lFPP31*ioHFEckO@Amj}oEV{t)6JErYcf9@Gr$SHkQ6d#oJ1|_ z)NH>g12Q8mry*^dSsACuZYif^o?5?Gyf7AZ_CP!6?fDS%l!~9uZNSw1z98{u35tSV zcJ;@a);vaPVp39?iS`Z(mKv99hUg%%a0IurzT0ud(6$CX4I#Urv+BIu(J&pC?($qC zykC8Fmp|&hqUkzZWTWj(0|+s|2MLn_h}B!`9$B=x;Es|3B_ZolofVLmnT3m0vJWTr z-Z@L4c$_qnzdI}|kb*K_$m@sE@q6uak%8OGogkmKHvyReFkb3iF}}RKmuIT=Iz3r2 z4-KEs(rLqcF$vyimIW5wbHx#|cJAlYqvu4K>Vd5gcm=A9pr82S0kdE(k@H4ar144sS}A2UjpT zh2z<2Tugy0;%vnkA7GZsp(={9gF>;4V2=RsIy$LQudtSCdjW}^iIJy%3S0{2pF`|I zO}~>c_Ma${L;7g}%8A(gt6&QS7w`uSRSNdq)mFzzT8i|jaO!6- zJ{;z=h@Br~*Hd!z$1~xJ%)xUXZ_++|XY!H>fScyEF@AZ~8QgNZv0S6VwWo0+bsmn8 zQF<`gIq3`8yh`)l%d^dgKXu_ZrF!E6EVcD5OoTI<=v$b0Uw58}0#th3i7OTGAqX{0 z<<%GVPE~fphdYk(?waq(gzL4Ntf49RSGOC@ksM*FulAGNQ6YnurlwfGpF>k$oULou ze%N*&bv-NmtdwR^!1x-s)`5n0)>0xfvhP7SK6qw|1m)&NswfuWpj{n8y*mX-N&M8b zQQ%jlLYdHSehQT^5z+st@G!LM?K9j-7AQQ0I7l{>&5^tn&nM}sV4{`wSQz=;;E3k} z16l}};ALtyb;5q!5Qj}=^_SQuSGqeIgVV64ATE#KIJa8m{dc~cqzM$jkjOzb6?!*V zA2}^W1d%Z~H=Ha`kL~$Uup!wXw2~-BLGNs$K@%6n#lhbBfA#iOQE@e0w{Q|d2oeY$ zJb?y6;}#r(gdhzBcXxNU1b4TF27=Q-}l!*aX`egYjhy zTw(?+bU~5NUVKQtU;`6Q_YUkKYp!y0y+Sav_tY-NAl6PEqX61H!uWKqiM9A4Wz+939Fj)<5_)KW^jymwy>5Bpm2C#<5`4UR%j~OJgtGRh6Zu6UI zU6iGhs0#!qSU@p@bk~9?CF<16#6^gWDEoElqQaVzH_*qHvYYtBPjO9qQ5kC~L6_e@ zglO_=KD!B>QJ>YB^U-b$hHbs0G;FG)Xv!h7GPwCgHPjTiQ=#2E)3Y-!&C|)hO~y{8`($jKi1N&FG?{~h7HdsWRE+Ao zSUA12@sJ>Agy|T#{v@q9DQQ^ojD;A+J-`fby+CpDDIV(@uSsPD$zdG#S)}KmKlj!o zY`DyqfFrqcVb9~WK7xXhwe9FR04uKie5iGO#LxV4x_;G{_=w4S>f4*!$r!2L4$z-1 zQT*L6(jeuo@g((;RRIHhhy+VjE?j>I8Th9dhpHqc49umf`028QqQd@>z2bN#J2PpE zuSmibdUu@9BCPv|U_8nK*bouSVBR5>o1z%JFA<{(91;kn)MFnVgJbubd*+Y(FgBf- zSDSEx%4yBIDniy0MOoisgu@2S`;3MA@^BKjBqA!mgRPT63U;QFMeIQSZW^UG6y#jW zeCp1m88aJDW5a0tp|kBA#ixY{D_@J$&q3=v&O`X`!+oE54zz+-sl5~%RzsBR@dt!s znIX756H(wbl9i#vw!Q5nu@e2$=NbLp5Si>WBGi0k^nFM%NQ*W&TT{wEewZVc488a@ zfjV0rDSa=&H*;WH2CH0O&Ikz|mSWI*jqc!j+c+q=<7*|bcG4A*7-WK`C-im@~ED2szg2~asUc$!w z%I+x^pQwgT<;#;X3=v|Jgi6Q`9bKXlI38(WO%73hXP^G$4=qFN>$R1{IPu)5S0Bu@ zcs&TzQv~Mto})G{H5uxS$d|~vv7i2`pGpFS&e-0)bMHiA18E*qo9RgreLzeeXK1LldJ9 zrV8{%dngz!@$Y0z1N==^t(iN1uqLQTl=a2F?3r+V)e(D%^@vI|+N{^>T+W@lp3x^g zB@*MghRsq;i6bQAI^TleL>IXY831kx%6d;H(ED|Vpzv2ZI=28>YuI|-)cr(yZ=1ba z#R`ST*C2uwS9yE9EF5e&$E5(kmj}5!o0;IbbQkmM38_kvf}<){xH-%`Yz&Qrcq$a$ z9}Z%CySVMyV3ee5%57)&JPe?AB#9?hL|Bt%6xIX-$~7KEXqMxgc~Aw|41cV;th$t&F7Qb#$mb#eSJ5a5_{uLg55NsT^#Bt1oGl_o~>P z{6Eut0G2doL@|96wd#UP7A8+|zR9BvdIQp9M#Gz&f2|N7$`8Jq<$Om;?KV2I@bl&u zGHEab`y}W~|7INLsmy0yBRzdx9UB`(0k7J10G5@ACzfq9LzWRy5uJn~rUNel6k9)&Qei_v;K%g>FI3J3RO_@K6k?hm3k7n4e(R7Ljo>3imEB}a1R$(%!;j7V& zZFl~!%Rnq?w%qpC+sKE>Z1SR8t9c8M#c#Afoc~`PkpE*r{*hi7+(`Hz;^T=3D(6E- z+bwo%iOdz6AF9N2QI(+Sy7FfcyDjz1%{$H3PhE5c$^)pSaN@+oyrd5EiO0M-5`*HF zyfeWdj_pK~G4E_pb`rR$!<$~zeVMtsW}yG()-UVMakyy{;(d_mzi|r@;2AjUxE>|p zAY358#KcrqR!;oq?G5$e;po9)RX5CP^#9E|X#TJJ#>nEO39w0wU6`GZk2|=7>YnOc zG!mXLiSw_*%Wm+}q-1^F6s#jp%XoLc^-zrC<>+X69{3L@^_48p{Ndj(bP4^BgT!}% z|4R54|Kq>%WDEO0)lojW|Nq}l@gGX?>%o8i#FPJ#N41a*sVLI~;!|H+tye%zPy+0J z{zy}5n>$ih;RtuptkL>6@8Zg_F$cswIi8lKEci}S2lh|^2j`UKr*%zOlR%++ zk^=~Z5}6o~0Lzr$2VJ8p##eqQ;9FUNigV zYb~iH4~5D1Guh$EUBE*_*lHr?)0;@bqe{W+_>unZH2?PCx5%M4N3usg_sFzJM_~?l zx_7d~+&P{9wqsF|nm8C__Up%;RrJK58RxhcVZO!JWNnoJ<~|vziVSrNDJMbZ2zKCj z?Rt?OY&VyGib!v*vN5VRY>H1#)=R@fvB;^6nTg?1CG+7eph|nB^Cc!DBM=i)0iu?O zvQWy7UQmPQC4%`6a(+)83xQ>XIpYWjv$Q+O-fSI?;<>nA#)AAV3BJo@Wxvr~5~|VC zP8&2Uj4hU)HL$gk7m{YFn?%yn5xk1Lee@m+M`#CH>>@DXy zG`{6gU^{(u0%aecd_#nn{>TF>YmIRWcK4gnnI#qWJpWWQ`KYUSj6#XIX%sYpo})Rl z=K)nQCzZWvC;b?bl1npE`c5FRSe?b>3`j5K+aiHqtJU4X0c9SNpO_n9?jXJ{%Ql5}fA?4^j?tbHSh@8o<7B=JKYV?n z&K2in@G5w;{jreg&zEiNw4{f&7Ka5Gmh>|D;9;yfBY_1;O_waU`7XH*b&Ji zbGWrHO7J1KjGIO6iDmd-xr9 z={cF%!*!zj;f+^POv;10xL+-CO%~8(*53~?wFswqC?EVMDemFX1kj!ZE+&F~>P)4?E??uA78HD8hQzR!@K3k! zBl_h>Ojvnn!HUTgHRhfC_q~Tk2_}uS%)xyICa$r=u2Y+Yj$6U5+(|?#N1NUeSa9o=Iw%Woig0+Kbz9B*sJ381hR8&f#YT$y^r-FB_W($thdDm$iqh`fxMlNEW6s zBZjv34yUor8Kj(QtA4vHyzW|~%CFJ#+LaX-H|inY;`1)SD3(@|-ARQ;IF)dPQmU%Q zLG;ExM(387<#9x68EHK=$Hn~{zJ3#Z1)=g_(yw9~4J2+e-m0j>4rW@{WEKrt|6n%Q zx7#C>1|2ea+w(+cPTjjxBv)(cv1t}Yh6 zFZMi;qnPOaRiXsnJN)lAbZ;*ocCub|r57zjsS-JKu=hQ8`g;7G4%-lvW(^IRR6bUV z8)#W`_d%u}=T8LA>vm7minyh{WwX64)|#U)g)SGy$)+n>-VA7gm6!DIkIP$lM2^N6 z1@tjlfA4fi+xQM7Tk$-sp|~G#k&>6+z&FlC{B4&bTMlW$xb}Ga7+G+avAIMa%^*paS2+zdvx7f3|nteF%nDTL`+>;KNIp1wi3!!?& zI#|uuY)DaMc3-Fuam3~nsol;Jf>EoA&IF_J*yhkR*^UdLkyi{~rYcogPggAaU91S8 z8?CLM42L|=*mp1Y-s>yM@_)=z8#4Gi|BpJw3Ij5Nmx|`9>5D>_>`3}6=N+c+)q&cu zsiG|6-tWGX>iWw*Hd^-FAISB{mvv6-@Ov|?^|9);O#z;VJ&B#< znywod6(#4u=Ft0QyaU>>idNYPt2!y(Ov49Z(FNxMCncDoCe>qUUQbM`E5y|6TabE) zh~urX{t#2|tL4VEoJ+w8Qn`>J^9*-E#KE@D1LbOyv*HARBvqL1gODqX>k$5`ORolb zJzKxLB;IO}sj_uN;@ESKhL}yMN0c-Da|P%Yra%!ts`{SJ~I=-?l-2&Ox6@ zEKU5be;zh0)=iGk-c8KAi=1F*LI*E|E7wqEfdoQrDZF^14|jcQk=gk3BI$J8v{l2m zdR|`hfe8MVj0I;h$8WRJh+NIy>N#1#D~w1#FUQ#(ufm(tl?I`s?X!fj-{;&o{&=7| zlUeealOK`Ef)@h~`1UjA%FImJ_IBD27Gi!EtUS1d47LD1_ai8`!VY~LQc33P@h;-P z>*^E`Egfd#r;aOzMV!(AAfy2|4*l$%**y_cM;lh zuX7%CMwaX=ZqYK&?frX^`6|cLM0?X@WSh@r;bO^wzG~1g}O5OuR7Vqr>Jnov*m#-%ApNm4!VR~TY8ATW5P{ZY+uPJ5~ocjGD zB8(rNlDaf|+3RJrJ5G%DLY9gqOd#9icqlcyE%R;r*`SS->+jeIEd6&s?4`ox;W~?y#H-CTCp_cjN@fRtY?fH(F2YsInHJra^}x%ST^a4WHkQP zw$y&d*n`Hy$wz5ha`IoR3(n5!ZozCt-1MNnAtE#6k6 zBmi(buo{hp6$Ju~m!h6|7%CLEF}PO!q=f}?L*0bqJDo~YRntiw_-b7WE0EymU2JU+ zi_oGG_dwEj#jZ6REd;6KU(&Y^NVsHJRTK6$rR1C#(%uzXtqS{lw*;g(TDd}>%Hyia z$!)VwkVdoW0g+?s|J2hI;WYs^s)8Ias8@|nPMu@h+cRhWD6O;IJ4I5xLKU$V5QRkK zXW#!Fz*o|~|(8a;A{Y0zZmN40!xxD3B)Lh>xXM90NHdFp+|KN6Xqk$F^Sc!9-b$glowfh)t#_1%DEXt zGr`pClFW=$*z$C;sNR4f`g*n*w(SI@{ElsIyIPbn^+((Buqiu;S3dCAs@9|Kq9Iv7 z`eNWv6Lu#qtGqu5v4UIKPIh@5hM9mNhYHdx8TW_1MUUNivMlIxbhaFVPHDDOh%q4~{~dhoF`Ie)`#>1s!0c4rNDdIm;mTbd6^K$<82WqLLR~ zvQ0`m)+dzEW(?fL&$2b|SF8D8i^eLNbjb=aFL_&uO0sSIbVTi^EC9yJPPSXx2?GFX z+C@1*anlCcKHktF(k#vI2Ovz>@&krueCW2l;c4>??Obh1{IJ8!o+2*yvg^S8pB^TR zSs3KSH#b%b&&JG7OQdzG6t??^Dqf$P!qTpDa<_+|B)iGpVgUq0IA-KI?wISGjYurq z7Pp@mskBlZqN5i#G?46B_0-HTSO+^aM)C}eM-t{>AtRq$gbK59%llH*$i>6>+T}uF zP$~&iHZt~x1j+i+70#s0%k;OkObH_|h^ z+nS?ES$Yu>Y`clarwNbh?}dTn>m8eIHV*W8cq?>Y^64b5yUgC-HAN<8(y&uXW|L~B zXYuXfs%K>VCQuTVV`-S5MUC#;?ix?dAX(G@MCfG9qE_ohJEy^WbFEfCbWuli&F`Hl zV6Q^`X8SkWnOxZd`KvSR+bCJO)4)s}AKwK?Vo0zPI-$PVMrulErtr1c@~`o`J?TrE z7>Nb^gY^v?7yd1)SJ}z_(#s3;0;XP$^;}#d@XqmWzH)1uYPy?#K1>15#ENKEw9)t& z0Ga>>tH#bPYR^kAfj9ALC*;$#$|(0!W3?Wiz+7; z3ZBZU>i5>xm%=VvjmjQsUcK;{vTx0`zG$(0-h2?wO0!AT?CaHN_w#4obNz@Gz|ioy zF1xV#&Tj)V<5|9ULl``FXRSG~KZ=o+c)}e!xdq?!4e|}vhyRA;1=7cj1|9J7F;Qei zDVW1v0P*&NbcBx}bH6plVkgU~)%gD2kX4I%L$cJhR9vj*J(F(IIYIU-L@vhUH)-0Y zG7o#I=`g(Tkfa7x{&}MKbV^S8+jsodSbW#?D#>&d&Y1Llw6f!QO`Rt8;0Dw@!PApe zFZrr%X*+*@Pg;TT`L|_pS*i69q%SZpaH&uFap$B!3F0ghgMWS`M4VFw^A1a{?|!M4Xsu7WaPh*|Ulu3?7R-sJIt3q287O#{BFy z&>1gFE-al4-vWD0K7NWh8iQ0fabwwcTHG`%{i0woCt$OQ#>1QiI0|G)hQmF=hL}WZ5iyL<*xz*;JAa|6C%jz zvt_9hAlt=G4gB$wAAOArW6t>JDPhxgD^jTNO&{lCvGPE&8iO?c6smRqQN|4Y40Cho z0-A5%+M?YC;{x@?Oi7ekxxgxsHoi7M$-bDACj-c8okP}W!BuCc6YE_snNwf6H)nLQ zQ%;Z`9%$x7gO6!gC-f|r12Il{mKU^o;lTP>8!&Rb{^u;8C*h==iV2x*ACEgb0y>E4 z%0ZUXzRIJ=Ep28=uNlF4X^=D?`)rJEwrEkP_$#-L&X2Q3qKq|XTH5*LlS+Nl*fjlh zBfAyiBpxAM|CO$9VYPz+cL@ig`^GLi;OB_AtuE^Wv+nq5t6zcl3F)-?X;izo9E{n6 zVK^>MZAw4&eZN#PM&goa$PrR6wnNi%)dZ4|Mz|zz$iO?q3F-Uxz6*?u0?4w!i|VTw z^8la~p2*#Xk(Qd9sN-mFL&vSsIiJ5Nh?ZDscEfVu{qQS{u*haN_(^VJM|yK|*)tsc z9!PDm{cxtS8Il00?lMt0(V3oAd zva)@zWM`QA&=@?dVopxdG%H+KRWOmW(hO+0l95bM{z&NRPTz?LkyCzJ-!e5Z#ou12 z4S?v53D^BKX*~)Q|BIJj2xg9yrJ`I6MRdUgNUX{8RP{~okQP@Lhd|%ESGFLGEAhGZ z0dDA1GzExzCAJ+2MXOPn`G%F>!B;&u%g>^cNgbuZk?uc#KUv;8N*&}E{RFw~Q%-SH zdjVB#g$_fMMX{8)?GJ5r*~RKpQ8fyxBt1S6gJ924P#B*pM}HEflO~)~9(k^6*`u(- z=fz7QH8zrt?zhTJ+h%ItTeC<0*6amhxN?yxC5kVo zoT}8jVG}aW?WX0p_C#Hv*D}OpwcNg!#wOb2MBy;b12GGsP{_sJsGh}_px2C3H5Ms{ z+X&PCSe)sjXN%wydoT)XUI4#Vcb3Hw!B?&cvT^Go?2yO`gB*rA;=E1-@XXyOIUmV< zjHw8u2w~%D9JG;2JIU-{*64&?+%whY#KcX()5V$2g(H_x0HD3@t`W^9pp&ZOo{+@@Fs0OLs) zgEu$K2?vn5Vq7!@2;RBQ($do1OafLQZB0VQ)rHX95X^cnJ$2BsNaf3;%{h*BY#e?d z#YFMNsOR-`otBgYn`*cN%<)rUQ@|fGpLCk%o9M{!a z!ab&wu4mZc#M^nN_{Mkz7lI|%k{?QAZWnI}xlSBQ%(V~Gl&SzkL$X8@`Cf`l`3*Z( zt8Iai0_x4MH;4A-+$Yf6`o_2Wg+vQoMf$UEGd1~ACCCn5q?0jLi^2BaOiZ$b)6KZL z?xie=cxMF4@Nv>u*c&ulSo3(KTXSHt(EzK zZP-$CD72wkR4qh~;GT=-vF(r8M+5jDuulwx{i+W--*cIIH;RgiHuIO;+5b!x<~*RE tS&=+8``tnQ|K{56e{(Gm0eGO|rpb}h#eVvz<$dzxv6iJoxtKw~{{o)^#~c6v diff --git a/bcs/support/images/pc_customer_userslicenses_m365b_validate.png b/bcs/support/images/pc_customer_userslicenses_m365b_validate.png deleted file mode 100644 index 1af38b82af9d9b314ae8917953d019a3cd93888c..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 58685 zcmce-WmH>T)Gpe$EfpvZrD%}iR@_6OxVr_{LU4DATY+Llf)t7r_ux<xWDciWACgzv-i@u=bG!8&yG}4lEy?QL4Wq_8K$g^gxa%bFCCsedrtr6 z`IDq*Z$0zr=N}g}Y4K;}BV@Zz7cZ^E6vduBtBS+8H$i*4e(NZs>+AA}+kdO=wd5IPpA}L_;pYYpNH+Ui`H8tWBJ5kEFh(8~!uw)e!6lA`|LBfp` zZ0nw36JfXGaD<=D;o%eF5Ww56#^PW2%tS{;-G5T8@(A|mc3En9?vUCbA(`?iJre!+ zq*Q+{IJx8+O>%ilfs*RqaeC%EXZTce2pZo}6AP7-t=vJZ(?*9q~qgg@gE65uQcAgh~xLd(muva+BX z-8Agzq;HxPtD6;_4}Rg*l#=eeXK}$PH%P9C;lbm22sL zaR2KxkfB0J{kibqm66OL$)%sS_a+l?L_u{ed5Jo#gRpM5U{L$5Ofd*7pMkTnO;3S~ z`yS7nhBN3-M8qdCnH{et9NNOS;^ORhFRNbqIGJMk%!n5PoqNRH@pU>{2S>Q{HqW8$ z_Xmjv2;~hx#ySGwN3k!_p!EhggUJ*NZT8uoc|n+%hZHtQt9jnyo12>p!*8F%iZ7Rl zw4!!bl8MO9cDR^<3+kP|o^?7wkNj~bb07CmD&9$ru}JHP6;eaWu0?Ozl9UvJ=A~T` zV7rxxvsLl?TtZDwZ}9KN+JTwxeGog=PaS^~t87u+Momt!$VkUBJwJ6d>06{21)HIB z`nLaZ{6Bh%u@LY zx2PMH|MGOMsVOYLJe&_$g}E3@Cggv9+`+m(8&L+Lr-Ql=mcNk3Iy9)!OHD}$I4ghX zjRT0b1Qb?21H@;CprJ|3+5?@Db8EpqyrqORN}TN3t5A{Gkrr5o^K^Zq%pVzAc2gxj z+cuqsCJI6Ank{w}ozz!aUG54lFbq%<4ch1;6X&^Kjr38w^w|No-LnZ{jc=hs-C8Fn zZ%bFI_ZfVI#Dkv0bd8$*yV9q@9!LR4UpDw%Pl5nO+5QEZ=&rN{Z_B5 zxC{q~pj%YdxBOJQGzt+bDf{Idc4(XIVC0sNzyk1n#FVTT{)v zo;fbpuZxO~j)tVfd9oo~kIzmV=Ad_TC+j}-4tT5dkU`#3Bk9r_vz0Y7X>2)6LBC6RgM-7A5J6VH5^%kMc$if}iS<=gB58!#T#aICb_xXIP&bzz1K}+*pt)?@U_`uogMNIB zQ}sxGA@^X1yRBM9?RlHxIaYEVc!p|<2+in7_R zkGl^JHXuh9QLWu_(rcHk3RZ035aJykAdO9P%@C{Vx>*2(9j*UHDH4DCYg9d?q~y2! zXYOg#brz3A#+>776NqwpaGvTD%LH;hGmZ)0I| zDJWx7az;h+#>+F#zs6O%8osYe(2^?Zq(csoGs%HdyEj|QnjXg zWQvfGQ#gBzBOi5)f9B=+v>Zj;bUwd_h5V_+0i=D9^lI?DH1f`4@NynSz0hVOGpMsH zk=94nIY9j`yPd_TI2{u&j7_KzX_2zj1$dEq5)nfV$e9)Zj@L=|3#VeDGkEtXWfpjG z4S%*giw>$Z^FvZHf{D|K1zCo1hBvv?0vpFkOH4@#Pm#I2hgBuWJGy7-NQU%9Zm<~s zBleF!@Km_6tA_H#suPHQ+Hn0ehMw0i`=JWX7Hxo)L20tF=pL!lG5<|BKP3r?uLrlk z}5s|VOL*ZTQ4K)W6g-TFV0=vF0$mZb?f!M@o&R`2|hGUyUk#a z*r>>3{0e1fUBsr`Vd9U<%5UGEIfcN$pFjU-;1u`8m~~p~X8)WN!Q4l~AijLgz#?HE z6P^N}Q_|O?$V%2LlIu?*e2>To z*8C@PKD1peaJ%g!*!_yj%P{%S?Hv8Ao>DY!XBpD=&mnrT4X{m6-{=h^v1IegU96F3 zz-Nu`VX#^K!IZPeaszr;y%GF(4cq1(MaQVIQzB1s zuQbj#BjvT3{m4>lIe9ysOYZ>w*y~LWXA)YjQFkaUTo3_fM^?3yBVWwC}~=3ren=kGJy>jlaCJpE#b65W-av< zTW!BcrwwtPZSjv%jLM#TtkFgIdFmW}0IK;Z?-ShpB=LOe73f|5=^Xr z#^1-a-yj_V))t(2_<6Usu&Rz+sUxT3>=C-MP}?6NFTLE!wPi0o_*rU$9`h?YC0|}^ z9o?}}GD>YdIVTUB6+Ug6a*=M!v<&9r{mc>2MW#x`0)}7X`CdiGk4N zjS&jEf4ZKU_ss$N=6;hs+bG#1BIj$=DchAyg@VV-d)=xG?H``q_X~Pt@qtP!oXn$G z-XAYM($O3&Uvz;zvJ-ybJYMctimlb%#bq_Qu4OcYnJK!(bcC)$+$s2-_F5WXWx>t$ zj%A32>g~#qJXrr1&~+#;*~2Yz7&MD@usFibP`%zaegK+@v|o0*pIhU}ExDo)slHlm zvjf-f@rO?(No4R}DjM5V|J+L)BpN+hrj{Xl8BfD&yW(~|W{*HW6!f&c@*d||yj)87 z(cpaurq*_JPojic?r+6(J`a*O#=*gbH&{&K_R_foEmez}UdxG~?<+JBS z5g38sV~@a9rmkL}Q0y1t8+FiOuJ+$Y)oimFw7Q$DjMEg37$i5iSuX;1yXpSwA0NY@+t#avEuN!)BMYxe=ayK6uiP z2H&k;-~P($s%p5xd&)>>&@p~k%Xs<%2)1JZ`T_O z7pk{~H||5YR+b5fL|X&60DzPoXcu3(VLYG9n@hfr%0Uqkf73C0+2MHYe*3F4(-P10 zS^w7Tt>%C0RO1oQJ&Q;(u3IFXwf`84*a}SqzYK9d6g@xa9!znNH=osbz0iN8(|&Or ziLZSqV+gF$*7yN2G9C?iV3q|Plv!%4X56NnE?!n5Iq*ItB;jnVC4Y1Y^G z9&&m3czK^6Jq!CS5AJM@fmZkxK{%f_MAFI;DL!Xui$%!-OmVPHZr4e!^&|2*7E0)Y zplW0bsw_2vawYvB#a?zv*ylW?)WXKIFVQ7sBvYh1Dxl6op)@$HGnskz$r^7Ww){@k z21f^*?YrzR_pBsCL+cNhlr;v*GakL`=Aanb6)T!Eu@P6om7B8#j1*aR1zLyb(jzjA zq;vCn@wx*O10xgHi2h7VB`CIXsnIR>CYd6<-K^cuIB%j`B;e6CxuGpC{4%D?W8?XY zi%9PLKY&BeeHifVZ%S>N9QJnVb|fM0+NPeDey_k>x60R>Q$l75!gqfN@(1;qwW7-3 zuY)e8RRx#Q7B(Z3^|eO3nlX)nf1a2*)y*k_oCrF{A`xAhvM-jLGU z6Ni(EEc@znQd8Xy1RC67kuSBmRj8|cA5IKju|Z=iMIk0|>vlxwUDpkemlb-nf77IK zHrKZvv^v>>ZMfsUA(KWqtE(g>vvS0zQkJ5yCaG}_! zQ$Rq&KCYR~v5elN%;=mjUH@IrObN%0-8hQ3_&uy=qgs}R|#U6OO44blraUG<#gr2cZ!8IIbQFC zUdE=3EBcrjU}>#Yn&}{=6f#T`ui4_e#Hn|2! z%dSVs#L#k^o^crrE=&pNcDZd!&w$-bn=j5*(Ee>bg?&-9`4yi^iOpUy=3ztkk3Fx} zAw`%T0yF}w^%#S`Rdktd@KYZD{X0iS^CZ&R(#^}}mz%41M%QGFzHm?rb7%$A`?{IX z8{Lf!0*S``Uh@KwXbaS`(A-xoJuTkQwe*qCDh>?O=HBvLX?36Jo9`HqSrP5KIypFK z@r7lh$x7%rPPSoqH#y(Umg6nl*JTwPpG%e2{3nJ`&N!#20x7kQvw|C6(@`E0WFBz?1F8*z76p`p-g4N(9 zIcT=*{rp`SG3}I^0R(T=NzqWWq=jP{IX^Q@tzY8V)@+fGAff8ZM@X zBdGU9k*BDISDYr&bKfsr-f%)PK<9jHTK>qx4GcWr69(Ubz-;(C; zxrHu|8MUG=UTNt;nPPjl7Ox0SkIl|Fn`VO(8-*_a4IalX(p=n^`aq&8cxiKKM zU`B-NjZ1t}-{^4HV3*Hcfmmtq(oD%jRX1%cl=sp$>k!H}YTJ-Etov}sP1{$0^B11< zvV9WN*wAkujv?XIaKkR+`LmE-AXRT}esNJyuvrLlxLiH@cV-27_>VnMY*};AfoU(a zLB8xdLqUB3Q3$*%Ip%tRCHyfa#Q^*G2>Dof2)V@6?ep@Zc`+^P*F*_h$$yhkU(ugt z9l)HNb^adb4D^sWUyTGgpWYT(>)M0^Bw=(ifa`nZ#UlyH5b{UnQJUWyA4GOC+1IH6s5DuQYBeD|D%LDF%0; z>r5#ZU&9Aj&?D9(-j&T>WM?^lDA}IH!CPJS|D6Bp7x&+B)vH||M$J|g04p(9im^xC zz9t*no((Kcmveti+9yY@=85gX6jk@lCwK7Jz{lP<&=(Nk@j_|jR$KVT6 zsBA(BeaO7QjH~MvXH%=qWdAkt4_rKeh~JrpbKd6>uU65H2kNLP=&~6Y78#rwLx`K7 zVbBUEgH=#)dDQxATkl=F=V+RSXZYP`9%T3-lU@Sv7WvG(&%G9>4)B{Dc6x3WZFO$Y z?tbF=mnSo~kJozC&2DTVwsia1^LHssy|TAU*wJ31Y5P{)7negS4%D+M+HUuvN81sL zzwk3G?<7v!3hGl9VhD}=X&D%fr&IK??R*XD*aN7Y&n43Z%S|jyC{fes<=dLz5kGa* z?X0I3%Qg{ZZyP@0CcdEu4=>B!?Lu`GdCzll1d7K-}s&uvPWY2UThXh;@yb>kuif=_G-;K4M4ATebvHf1(Ec1VuY`?eYF4i1;vbdA%KhL6U z9kEZm+`$hM`HWeKvzQo@&k4=#$ybKkEwg=ne>|=)VpAthPQ?nNM@RX2dUh9AY^vj# zD&1#Z#jC1?>`InTgUH1nVq!#G);sem3{Zzlku+8soRfZRWI7$ppO-l3{uNVivk(QfA^H+?tndsbHt(8V z)rcU|=*Ga>sMe_gucI>N<(*W-&??RHwlJ8cxV zKiKYD<*cnDmy?}ypO3LZzIatuB>OAwBDk=?Br=vs&c>dDq8>=356(z(a6TE^E33!v zG8na8qn=2bvrE2i7&FL)xZ%6Rw8Puw`+0}DPa`E6ru9%2k7u*ZuL7~cNN%b6rHHW0 z;a=_heA1eyGdIyGSb#a2`{1<;2~V$3CBvUBHwXSe!?yg!Ci8T}yo0vhGdOKwL$J@JGs)4n{V)v$Rr7o{kO)xmnSPtca>V>mr6rivk7gksOA^au{)vWY9HB-o!H00S7@rL6hJY7t2urvgEi5| zE5IzE1`At_yQ**S)X($bwEK*{{-9A@woh}V&V;soES;z1360}DY9t^bvM4U6*id{> z+L>g&EnmCTK1ve|^Vxg2aLE4Zd9wiYA;Zc1<*ev9y*IcP=&$USY4(L24R~|(C1Fd0 zezI37$3Gpr{nj>F(Kjk3Risu!TS#@_I;LtaI&-?cEeR7cuvf;Us*NX-d)gCT0_i6|r*+j3^?nyg^~_T|yC&*fg(5tglR&borr?6zJvD|H_|^oWI)t>d^q zv$fg7&qJD(cj0JnyiQ1Yhwksk|P3G04BAqBslB8T8BBWktAd;f=>y*5Z*Mn=W;ZtYjdC$tl@Twft>1%w~KaFd1_ zz&Bct_meoV3Eb$Ft%ruT$PAcozuKAKx7i!;k&tvqlVmAHo#x{swhcU1eI1>#x-~9_ z_`Q=u1h4s*XLpeeF{g#h9c&4cSdO zq_)iL)%O+5TFwr_v=k)xV7twXB+^Io6_J%+#%aIr2WJ7Nk+L3IzNLSN5G6iY+P07{ zmA%6l^ra#+l7JC%p zZez>r=fC3_`c_U6o137{@wG^9HyJgK-~90Yju8oi)4(t_&rj1jMn{*seu!6wRe`*R zs`ELP&dyQp8oi`O=;hOIm1o)=Wo#FR9Yq%tAq`%Q4X|?Nkg)4Ryv00(A*04pAb<Zh>4yrBE-f)PYUyi_VY;d}gN-+B?w-)fdR;xVzD!^t0-x}39WTj{VzW$+WwdM1 zPz6_jKd;019RnCy3OB8sE+(eKdB?}GUcI`tip%ibB3ozjkBze`nj~;a z4GP+a`X1nrk#B7o?-ELI%q}$C{jm6)S5Z`zv-MC%Ity-+%5NY&TBaKqruDpU_9>7G zi;qWnlxHP+yo-u*#28^en-TT;GFzTcHyR@z`4%d|*fh%5NXNb)`cZJf@PGpQio;6I z^hdp)PQ+lh!<8ZQw|B`v>9uQPQj@Yx&||0{_!=#RZt=ylXZKidPEPFk{W*$1t#tJ- z%*O56yQic${BHW<7!mGeERj_aImPo94PX6A1&|0Lk-{B;f<$l5i}EwqCcAq4WocD& z{MVe?7L;e40WKT9*MbH&he^3^#te<#IrVG07A_zwv;I-7h^3mha+oe>-v@?e9p`UK zd~Tgw9C&K-cMMXJCOJ9ACub(q1e@K~_nz>;gQfl5Bh)cWuRLEtUHtjIP#kbZZKc_w z?ANoE1%twA0t)04M6$jP_dpdyRr8Cc^btC_H9EwdI+f|SuIH5}Cqkm5OKL7IenUJA z8?UZA6#f1G$?akIJJ`J5M=MXHOk_pGCtU(5bZ0Z_sJTLlNMkE&^LePd?JAlE=`Z=- zDMtx4Bn~#rrR($8211^Kvt5C`#eyq`bAQ?YvO{lv#KsgB#>_;vcHVE4(dFK^P;Wah zG011(;9jGCMH(!-APO=I>mi8;_{7#}(s6ta1VaAXY4^it)K5|STx#DSQz8pDUteK! zrK~pRgZXubIP?XpA=6^bqyxl42vC-&(kdjgIoTE(FiYZ6vWWvW#x; z4(v{*&F6AX{nOperH-rla#+ir?J!128N%OyN9yQQ?c@3Y_RpI302D3XxxZE=#9v(( zagr3j=&u(SX67Yt{d%xw20k{gd$zLdV858ydx$g#d#}Unf&Yxt7b{m}=-ef8ti6}j z&~QCyig}77c2JOjbYzUz4`0wL`_}}_&eWOiKOwJ8{;UF9i#-R;ab)xDUXwprNoSvs zxW#HajH*9#w+Hk}S%O~oV?QtUp|dGTiO#Ukc9)2B;j?U$-!7|{z4!ZSPwioG`AU+3b>7PU(R%(V8i{3T|C9;(|i^&B{$R)Xu(;mbOGW(-l z<#MF`oL+iczx`@8KCw_KlfTKT?$hJpmtN&epr7Nc9z9xP* z23y(bDO=<%1J&r+!e>|^vr)J{>`mVAurg46MA>^9iiHOEn7J^;MW`*_#wMuQ3A<|8 z05tOyr*T+-`b{>~b#7qC*a@SCBh~5Km#eHXx3{O3SyiieU>6qIR;uG}Pu)v#d?-+a z@Hyb%;x4v$EqddM1zv#KfljBZZJDHemC`aqgipcB1(%KM$aQHCTlhyQBu&*;x*Me4 zUbn051GP9zbN=!o5qw)d78h8hW69?0ye79;A(E0>4wPB$a2udW z)q}KBhM=4CD3q0y*KWSWpVh19Cy793-ZSj>xv+Kmr_ngMh^;df7Zx^!c=-D5O%+vO zJK*3GfZA_%W~F({jaWZ^toB-5Rxea0UvAD!iPQF6zg#!U=C8C8s=B2C9UW8NwfbBg zE&OelTixGD(ooM|_qinhXcz`-&N$vHgSiRST4AsQL{GxSG9*<`3lY2&KyTOCt$?BY zr)}2tXBYV#qW(kzh(M|iYkW(6zk`AIv3yiguc(!9nBS~uh_19q^tDq zx@3iPOGxnAF0@#$r(=>rpPoF2%}VpVi4SIoZn-|*-1KU@1?G}Sv9x$izEY+7r)_#4 z3!e-704`B_4=(xMDXb69PP^T-$`6y2@J?kcGeFHV5@&{dKM&cc&EOxHhKmb31OR$U zCJ6*et3Ls-dsr21o&;KWBSk@&odO#S$Ly3@UHu2&wlP=O=LUh(XPMrq^uhO$|_50gwRWT?6F z?4`*Q^k+zYS4IVrj1Vz9B4PJA-%inf#C6`0G6iAC<2TF27AV^8-Klp_WO(z40-Pi^ zaDKpkZ^%qaLEM^-nVkl7csxj&tPL=#drV{e3_E=c{b5e`y)*S=8f(AL- z%a@U^${D(sIu!nP^OqXh7kMcxR{QI(uNw9D_5rwP`MB~ZNSuVB&*>n zNo0YUzTZXiNULV9MC+tbG8{f;$Q32aqppOd_ZM^#*Pnp^uPK;nM0Iw?obu_L`I<;; z=fb{|mHFNgpvEPY=#y$uBaB9LDN_jOMo63{`rJa>jG`NCVD58}k6G3xn;u8`XDkCi z^h@l|HLocM=|(vO5~#e8><=nDPI&JxPw&h=R;)!E(4Ee7t|P0~BQN^C&}4-R2TSNi z2>Ut%op>b#wl8lOeZ#|92PjT5KDW*FwbP93Cwj^uiXs_JJ=)q|nvbMS+EJ5Fy5zb(lPMhw5Ov*&C=K*eQ!;F5pWIaM#R3TVJFb*>W70mPbE7>w zZWeFj3lOCiy(!sy{KJp^v}rg(qaHrN_w;IbIcwPbxC1-HEYWgGbcs;t)7?0DqPzX= z4ML*dOw=ohGCbY=S6WgdBn1M_F`BCgd@AtYRQW+h{lCn!=>LnT>bsvd@BjSWl4;@l zKe^+}pM+1I!c%&p+4cO#YkT&sKK%bvf&Z5}{$E6Zy7~F}CyLwQp*`Yp1^s^!`FvYm zy?R9<;$0hKcLx$r|E~ex;s}B}R8&=Ut4z^EMcY>wzx*G0jFgb~IRgN&vL`9_zlBp9 z8yoR7($_aP0w+7HRR6;Z{3{(Lqb?msA^AUdJ@XW5Pko{ZYDY&n7X+YN|4V&*nsc@G z9|aQH6$UgU+ECm-eE@oSvOOus~g<6M%^&gD7jj*D&?lBJHe`S(2}1eZ^nt>591!6N5tUE!#ww zSEs9GzQly8M&7_AJQQ^e-LN@S4SpIprE)8qBBqvveCEB@eR*wOUdTBOM2o}8$>Xhi1HHt>R|V^3L=rm)a7hqA-^L+WQjfp`JOeKy~9PJpH-@1kVRZCWqoRYLgPzP4vcVfX6+;pg+g`2H)aot1*2tMW&L^QBv;Y>b*jykvC+DJLL(<- z$-toc`EUm^Ik9m!;coKVDU$*p+-H2)RcRMs+kzOs38xLt!0Xj0++7Fb$rbF<#sqf- zC!-b3CzoY}FDp>}y`H_3b^A5=Bf?vldQ_GPV{isI(s07l|nM z*MzA-v~AVX^%ywrHb*n7lpop%*=7{(+Pu&?Omh6jS@JDR=>DDGzoXuo%A$t;RdA5x z0GX&oK8l@rQ<)Yk+uuV%Wv9&hmZvA3QMmHj z9)l`(cW3*D^*7RylSf5MZ)sWWV0}w%Szti}0-BUJ;{Zi)Cr?SZ8-tl;V+V_9>2}sd zWOEGN-QDAL&Ev;3Kzh>?x;RG;R!55N*yf6~YVZTH7Vurbl2|EBc{4tezVNg0Wlxw! zj$a_?(}EsyI18dKe`!b4BBOqw*{Del+l5q&um%ac>cs=UqTk}1 znj)BPvvV0I?LQx%g*x)7`ymsSpr5v1Tif`599apSyXoA*&7Cqxh8Qlj9LxAfN-5dR zc5(*_r21SS%7!RThbHa@vkgQYH|ApAxl2H-qnaEwi`|1H_sbdCN~yMBX`;&N-m`X- zHYJl^BD>y=meOtEEHKqDFY?p-{mHMbjPmVSUdX)-gWflMmh&9Aq9^)SAArv*LMVj|vbj}sX#@)DXAf3zB9ti+tz)cLdHqY|vBc@$Y9 z@SQ^^kuY#p>CmUxbPKr-E@Je#jWz9l6U?LKdvvZfZ}mR5{BXL=uVByWd_D5kHGC#t zUcj$3vT1IxaMaW42jTn@j=G=xow3oZ&uoQ|M53mlLoj%8MCPT6pIt3QX7i~^@87AZ zfquisHQl#2-iRARHDpPtF)57kM}b?CxyWh1do{ulLdtg}2ag}W$TX?6Y>HM? zJlAgtvUST|YIB(45HU(aI-`!?Gb%!AJL&Y)k;G}B1Bp4tGhj_XcySv|sJNH&#kqlE z0QKT0I!NtdW{MWa>6P=er@J+LudL`mR7RbgHu6@lr>#Q_1_h*EkKlSyb|9y2f9w5R zCNRP-aw(*kr^90&!c1aX7G$pguWj$;c^;jQ!0T-c+bXQe6)y(5Qwy@g7`@XA50go; z$y@I;S>4JF6C+q?;;IDTXFc7E1z3h{Y(EqD$`_F`+itp`+(hE5=AmzP*5pppk$ zK*?sN{Ls0&XvJ2Fq5=-OFhIUq=ygGwOcv0wcWz=tRM0M?;fdJ)M3x@Ep68|=P*NvB zEOjgxk*_f4IfV-??$vZPhoFVR_~nJKnz*Oq_pUE){o=BLKDQcTT_U%e6$kW9oNO6M zLmw=Mr(Yec)G`-GPCnl#@>GYj#&v&fY4OUGRHOHynAF(M^^$vCCGr6Bz^ir!7`3lv z4qKP58V_0WizX)3QPDk2k7ld78l{#!z_Zkyfyn;1$)H(VH6q?VRmJJ0`m5{7!YJi= z0zz}>0gzmuYmltM-}k{%Z>3X>n>?)qmmRLaBcgY)(aB*$=)~;`Db()T>!*vI4@(_9 zt%l7MGCyG33S}rsVZAS5-W<4**W@aF&K^2Az=k36d|MEI6aY+}x;*HU#pUugf)t^n?&naO`UO2cLKZgf)k>>f9DpRSZQ57BQtf}sHkAnU|n_n*GtLxh!%VoC6 zURc5fyId8KtDa9i>7RU0ae)rk&D|CZ7R_zp;jt)-HXB;Qs}69vNYFTY$J`^KFPchL z8uZtG@tlrMP2uQ(zx2EX6aPQEMEzu!z%Z?VR^_k5B&rlBo+m^^yKPIf8liOO&M%A_5jpMjaoU0!4;ZDSo*tO0f#HGtkou(bHEjFrRMKkp}YAxM0T9d-$4d zZG4q>tQ2)|Zq}7z2e+l{Sr(KyIe{CHp*0Ds__1|67N+J61@sIaxvL^E;Ws->Nfzw`n_ z>2-U@^H3i=9y7C_cxqIVqYfOTB?;~4c^mnVmef|Ss}bfYR9=a$deWpM@hs79%s5Ga zq-uE%_1yxko%3-U8kgM_AY1;>WLkpw@spw=$x6q$1o3j|k&ru}D1RK1=YnV?@k zQa=d+BcD(u0+dt9RFKimZsB#`ZT`}ywS2F;$Q%brc>uWWV%+T}4@j+eBhz2f{?(N6 zQZ0cG+cHL5G`aObnEz?{ZuQ=7M;#8i33UAm1^uE+S94ftS%;)9@^P%B8@H;E7Ni2z zPUuaaG0q)B#rnkMJM+>?Gjwh7ebRr!lqE+d;?yZ)tc8&xRN=%vy>NH&xH>(NXD_Bv-cg9#+qBysDZX@ESTp3D zEI5}~7>BD$8U*}Ux=@{beHvR1^&n&=Qd%3$V;mlQZ#_CXrZM?qUVgr7=tGT=cTPqQ z7W4Bd0CDwV!H~rTOP|TJf4|ULH9Je^zNiMoik!60#)+FS(VN{qH0*qTABr!HKll5^ zcg>e%dM<)yNj%#44Gw3Asow6QMK^5uq$&DpO}e#ejXr$Yaj!c*O*eg&DkyS?@7JG# zno6Hm`w0xXV%R}{m^6Ttg@xdk*J*7nF^3q3*B_*I^{2$*0QtB{cJPG8R^)EnWYX!E zb-;J=ocoP(kN%h7+`V~&qEaHU&{ALQK6n#SPXbCf?3PclSU*^i!C&emk~Zm2h?I&C zOOrbJfU zwvaFFyqkoSZx=DvrZYbL{91S}(;MLKKXH8NVYxOMekkMI#9AcMX`USNVQI>&kP$Ie zHJOAe^Xa(Bcp=A|JYJ)idC1!0kFfE^zWZj`oJ}D>X(!hcM>~~d?4vn=yo2?B{n_A4 z)s_fU-*Qn_3gu_rUG{b^P|c8zjF3SAXkgb>Z60zV7hSKn;*s<0W<8Mp0|KExyK>7Y zi9Rfi`4+F3HX(Yn_zF$k(~Csoa$2wyMQqs+luKFQfvbc@p1U0Sgv zNw)s=R-oH+yIiHs!|CSHbJkMDL%1*{o0%-jfi-2>YU@~Y+-8NJB(rhOrLYNu*UG28 z*CG#5ErfX&1_Ef$YqZx;cC*5qQAsetDdW3%k*xBH=l$8#Fk(~GDg}5 zb0-gh$-iOfRqkEwX1(v&s4(Op{! z-Z>`ozP0c( zswe+-)Gb|)RJyW*U#n3uBLA*n?n4?djELRPuQboXGMD~JXNEEM$=}0Ub3BV`D5%QM z>fxHF7tBXOAl` zf^zcGRo|s42-mhXd(X~IbPma^kHovgm9{_f6y|@jyI5VcN&?(3Bv+jB=t742ZA2sQ z&^Pu?bLTb0^tX!A^V6!Jf&Sj>GSUT$jr-2zu=tpy=xh;uogvw8?C%QFSdH2e)P{F~ z0;-BP=b|^Qr~H_|Ho%$#5vdV8T8W%;AL&Y`<0zUxT3CGjT3qORwgqRnyh*cR|8aYH zE@JV8ncgaG@O8JMZ)94eRDw;|inP$bN_6e1psbuN;1ZUSl7b(%Jh4A9HKii0{-qcD z$Rv$jJ`M{jW}l42&cOzdWid{FtJmBl?M*`SXR2WceWbI-O!1;_G+f%uy;jTPJ5KUy z+RWbG8Y5@;nDhdt^FU-T@o&3vst%{d>EARD2Z|e%_>G})9A~98n5v3AHN$*oBgW; zHrv{JSmkP8Qrr0W%*@Q&S76J$vpaP@A=JZsDw68`yU0P3^gK82+I!?1=gEiRxA7fQ ztE(GJ)m6kwwxo9K*cb(2J(jU8wdj7etXUbPv%EvQq)vxnSp~xpKKD>&>Nr*+mt@#T$fS%eH0MATtx4k*%A3X>MM+CmNfMXBi%TS7sR| zxw*^%^6L&MY01d<->;;(&jTI@axSLB!(Y-9&BS4P)Vn8CWTz-&{5#9O8mS5eSy>d= z*w_F-_TR;)FXMvH&KuK+XbyNJQZt&079U+0cY-^9jSc}tfAxp?q$qibwpaZJ>aCh_ z2@5N{ET(x1s_;9mu0DZ^w-)P)x;8e&-aT7Q#iuFdGSbPdi7QPHy=lbQZffciV>O?q zliU1cyE*p4hvWWjz%xMR$;rw1_;^))2=~RSoym)C;*O{BjetR`R=%8nI4q5edsCnm z>{9H1-DULO6URM2{$+kVrS~uX7rbc9@&A`-ooJFE@$5*RF5D+w$eTZOHdpy-Mq_Gn zOQ1W2V_V9mxVYEK-}3Gm%dHM455w=gWcB-;$Z}^sqTWAKf=a~ywtBVxc#oS$6t4dR zad3EuAX)};4yX0csD0RcpV7zILg7-~{M+gzis#9bMG0Yayj_~g@NtWc}?Yho((kYTpV=V!ooR@AwV4al1qi&vfReD zf@1ry?!EFs%;U4j2=-L->Q@l?Nj$uuprBK*5ApZLsPFuuk2_&&j3dB~*VK!b8`T!s zXd3ZE<;zzm)fSKDKLivMM#t#r>F5dyh&Z`}Gw5CrMRN#=@Q4hW4=F1va?Hh5ZQZsG zEBs;9RJdK*AUNSPQB+hKshr)HnR>Xg7^Dy+9H}C*7{Y<1>3F{Rx96*X-Dx}Z?BM*kq@h5FtrK`s$^?%p1kq8qCmNGRcpaF;VvR6^_03+M1xOf5?fd!!@`hs&Fa zWoR5!RkS>`vWEpwTprA{a(fhQcM-+NRKW;}QLr!w6A&f59X*JOX3q<=ov?kUb~`J2 z-(7B;$EjlI*3 z|Kxx)S>#lZi|i#DTDklZYA@hX+IaS10-6gpdKj&KJPSZQU}yJ*Yx90=u;0F`5JjED z34=!pr!T8#|D|s}yMBEWdRIWg%r+^sG8fb`^ zOK9qR=h6P7csXn7!^%=vC@_#)G|K1UQ#6m^-Zr^5C`A@?gmN2d5!OSX@m^YruD;R| z6m%c#Jb~Y3HW(Rh=`%=;z^jQ+vm}bo8It7MD8pX4bV z%FKT@^pU8csxqQax!e6<6`f{H>u>Zm&4=M@9vvDc~5E)SQXP(eP2lz}XPEt$Y@d2>IrtkxKi z%cF{Oh=-gcSpMxa^B-f|hJoI$_Uh`T;rWuH|A)J`4vH)KwgyQ^AOuT-TOc^Wr6G6- z0fIE{8nmIY;0_@qxCDo8TpEYqF2P+J*Wm6h;k)GbX6j9Sucm6MX8xJ3>ZaMc>e3n*d)VKlCkE=JKZ==INIXjaYm)D!NRCE!*%EU#uXpYff1?)F z7NJ@%db{Cs&7AF=!8GY~gZ4+Qk1wxYU~X}+eAnPU1a9y(V2Am4U$3t}?%x#y(F;p$ zO}I4`{9eJQ#w=zy?(?bb{S`w1DWN6TpFW?f>YMPeezw%++dqq;|rFrfp_+@@7`&8dyEUf%%wE$hwiPSc46?Ikn@R2b3*ZUY$ z$#GV|MG_kS+~1ACj7OcFc|GpWeKb;3$-16JK1`fL+*3^9ySVoEUZEk7xgqRmoMw%a zv!kl|$->L!5cZEa1~R+E5Kh509Lz6vc9_M&Gzuqe7F-;B2MtJhU}vxA@B~z<@Owl;Hm5jy`j#YO87~89t%I;P^tevb~;y@J*`e z23_p+e(4Xjf3h5ZIsd-2fVx*SBC4?eYc=#%05<(6@3wS-{{P7m>HP)_#&%JU)!?bZ z9p>lu4wX)&pdeepCoCussm^VPSGg>W%qT1zG?X_KbFovmSHjC_F$xb08*GB!KlC38 z%0k#=cHTm;BcDcU;L@+*;RJ-Qv_P_0zsZYxjvgPW0RK)4l{@g&xx9^@ad~@TVo>Do zKX&$D!f1X`sqabrXd(QvWQj>;Lnb2-`T&2T3?e@fL16)r-wU*s-p=l3&M7@c{X_C$ zSP|^BnOAv7>2Ij%M<9rtX@_n|)<8dZV!!|8=Y!3L$dM5(v=Ff!Cx@zmygiz@gzPY! zu+V`wTK_t?rT(Iqrz6Sy+{vE#AQ=+B9w6A4kx>@duNqAOHyG28CS2PhNz&4fP2Ikc z6Qe7wD9WsD9~c;!9T2RlaB{C(=$e`6>S}8frV?Oj@95;uF*Smg3DQq>EiMXX))X{@ zx<=Zm8JQq4$>sT6)T7UJWXJ9(bUlT1DL!z&MRSLKX!P?GUCF$hQ5~*!Q1)J{V;l!*9$R z1~D4Gk$s7{4n}<(Wu{qp95Y-I)%zV~@-oSpT6f@V(*5c8K@Q2*IiZl7EtZKdn(x23 zd8LGe-M8Ob#e_(Bt{o~$gxZ=rd&{Lcd{OpN^KZ0Pg`$sLK_x97zESuQ5 zVXt24@DGb+<^6J-c>lB9WrzIeQdbDXQ6dzvO#o!s#{3$dYn%DQqFTR=Dz`B@>%ZCB zvf!tSb^0;li)bOE+U4C`a-eg@@RuClzi2&{ZxG-{0;4m&rG%UMPmH-4Lm6S<%&>R*xd)bR6@6r z93GJ7%l6gwn9%cyx@QXUhY37Hn3>;4i{pBiPgkjAJ}YauR982u>03i=?01=R zy0#O9m6>_uB8UAa;#!leM1x)A-JEmleZUZ@m{b*4N14F*Mky;BFUbl8U5rvAWyb7$ zFKVWCUs8?Hi3#1G@V%`+`oluMe*MQw{OYpdl&Sclj*Pk7;Ur(%J#g!&xN~m#cw*3I z=F~(=&&@_`Yl(K68ab(}F(&hb*v!Gy+s1ByHu{+np76Y%BcVf93B)RxQ;KYRk47qI z)1t6{V6fzXJOM_sw?jsUUj7+QyiZ1&9fo~|qtIVYTrS=wPUDxHeZ@~O&}d@Ny1zhT zlztUCQ+9m%Y%wh+KW`+x$*^qP$|Nm95;73(tgZoaadE+4+dx*~mhoZy8!3l2cOPKx z2E$UA%EmO*e!`7RVe?5ZAOD-bDBj|fpI}CVIOmR4RaMyXKL=F*?Ss->i%a`ovPKP% z|1oy>yagCIlbjrSx@=x&=MD*feCOeJxD6)uH4xA14u$YXC@rrNbIx#a2O5caFLDyf z@8;Xsz28%!pm<|vF=@Kjid>Y)^pTOma^f82<>mYPxi_)aH$SsSrkK&A3kuxOTSVi> z$`XoQjh*b`deTSte8#zO!Im#Wx5^q55ES(9>ZYX4@$Mek>&IFe0TSr@s z$yOp=hYH{D!F?us7=Kp+<^CRNGR=Cp(?wVmE?(bIxU=KwQXdB(&hSa)*J&9lerEp7 zbhLQq;JU;am_EPEB{jbT@avhG^UVd3u9-DOJ~ zYzz6v4F2XVQ;>uqd`nR*&vtOLvWuk?XSRA4n~FbEa7m=H9@@otRuAgf&JqAUI*Q@J}Y4#>c?-R3BARexqANgdPx(I*lBq! z`fdd=LMRAo>x0+D+VH@^&zB=8yXWFm9V?JcZdYh@^=@X4-CzS9t*aml&56~J#U*r< z%fL6_-=lpewf6(H1!ZO1TOFpb3GGDFwdWD9vvJDmRC0&1i|yjQ(kuPFWra z$@XNnmAEBQ6)@Duh56lWa4;=``DYE3lVm{}+?9u?r4Fiyhe8cvFW`Rfg z4=>EVA-fLE%d^?YzcvMnW9k5{3g2fD58i0q%U3I9!1quXA_ z@!Ng+Oe+#$|LBT^kVdnIhM%ryrmuB+VHfsISqnU3jCqo-6_*-;5dXtiz_gp7XOG%pjRrq7NRMm}+X*3{*Ne3FdzO7=4zTiILt?fXdjO6@M1TbRPS z5$|-mv}xwtkkAs*RO%Fb2}u)SfCW2$We*JpcO6r;X6y?1u7-lrOvDN?M*Z)j{$^cH%s#NbKvq+-WA5~eoU7u` z=8^&pb2962kp1h5GQ+mlHO436VqyFuL*{JK&UOyiq3p!)*Rsz~ zj?*qDoxxZTU3@qQTJ#mLSpO^8|z=UyLRbwKkv|0{~n=XB5A6Y5)mThcGIuvqv54iTpi*A^``F-tto6O zF7UA`%p4sVaIi`Nan8+ZYOMcRjauZCESyt;Lw95>3I|;rolA=HoX$?kP0QSS@!D2S z%J5L{s2%c8R?fm$VE%*vN9<s6$Lj zDkCS?{}|;f-_OX%NEl3jyWB)PW_^7fk)3T(K+WEK;lgBgn; z6E%-e#;@?(fz$Bdxuu_hQSQe?8ai*e+CKP=9b0xuc0r+*TOU24j5wGWLj_Qe1(uHm z{nFv#p#w}baU^-gMaiaR^yo8Wf&p45#)%k8r9mXw!g_mqjo5A*04MSGRmQTm zlG1M`7Jv)OQfhFY@dV{Em&FZ6{Wnzw4dv@3)Y@7C_U!@_Af>kGJg{9ai>ScAJsv{m zCEycaK-GUDmKsk&ETGQzzieGC_N&oQE-5a-qsY%X)?F=Am!F2(k*6(+i|s6riBUX5 z|NT3d2Sl;54x4`em(J^gSOU9#vt;q+dryFrbR~^ zbkR1}7yhcUgz?X%#Hj?>N<9KH!N5rz9U68~bx1?T@y*LjPl^HHho@^lvC&omveL5o zy}D9W&ak#N*}pcYIy%HduyjsS!NFLt)W}5&Jk+ge>|mGW^GQr?sC5GHH31hHXug9* zaN?TfdMwN&JAIL7U|YU=`0(8Nt&B3aOW5;Y+=saRVMi*}XU~33a-1-~hdurpF(A0V z#kX5XYk=f@v1Z|RkOx(Dl8W-H^>MdO%8v1|#~#1(w$f@$93`e72Ah49u3U&#S(ag2!@k3u1@20+7;u*chqCgv>ZFt-xS-lh^bvYvQvS~=&K@)U zL5m{V&rc*4p7qhmjPH;cj}pjR5$ys3`6Zg;;sbba_KZ&b5C5x~taf^L9RcE67=Ad{ zXkoVB*v_}4{Vx1CGOYso$S?&wXL$wG+(^|6j*Oo#3`uoV4NcOMhJPNThgi^uyP!L zM82YzlXukHuG8hh=%)H>eI}MxA*gQ}&$e>JzxuH<^wx@wCgiPStgQ!O_<-ZuPC_EV z8oj2D;J~01r8+Hkds2xRaf5n$ z*YKy->CvUSj>2zmE~0rlo}D1Ei#2l@v1Z}3=!#Z)Mz1>2X0c;B2=MW9dlK#R_rtZE zSW6#C%I7(r+XLyC2$y7p<`@{a*k?yYNK#IqN80=*<`tgBJ`Cdr>yfW}q7$n~_}dFg zp$3<|Vp}uH5Ki;#w{M&@uJYp4y~WGPIs_UC79Ae798B2$M0AoWpVEfjboW?@>P#Lc z*$_s9L_sst&>Dtq{#dhwqwj%~TMdz&jq1A5EVR>Qk%0oIwQ_kE462 z*m=pkf^*-?4fOYymIxZ!>~FO319xvqP(j7^s|Yv0ys^(*)Q{RyJ5mTK%96_-pR`Jk z`!f4zjE9k$RAD46wBk6^qk7zHCC3brQ5b6aS~$AtA{lHVZ!2Avl+lnCDg(9lyZTX7 zk81$7PAcp^^FIElrL|aS`Z=nxM+qW2ggke1ha@)J>8e;Ra9?@IpbgHCMQcT}joQlu zpYIFP%=1DwY!^W?EFHf-09Q`-17PFpZ+Sh`6j0_YQh~!J7s|_qf znC!LcXcazc43PZ&h__B%zumawk&M5u^l9WmR09?_0smNTT$Kq;K$={qYw~V2-?vfw zB(=c;G=eC&AvTGimK5I*_ssKo)x4gOCS3e^AdJ}D8(E&Ddo@~KNnlH+vI53ur>n>y znnFkUZ&uIS4+zXsiUG2Ed{UO6rY1wB<5T8>PL2Lo5(*Teq6`G$_lnD<6Pn^uKKHJR zU&v(ZAub2g^c9m5<^lohrIPsvdrhC$msWR|VXBS8!#q}2kZ8%(@%P zo3qZ*Zle5pp_a*ZIgS0IUnHwJ^Ez?YOP0ZfKM&8}rpXKjleGCuDx=U(t>cbKVJlrg z$m8Uu%}gSAtRCi{!8=^oktacy5*E8_gzs2PQF?Z%zc&O$zJ+w3*+SG(NI zr;w_NGb?9*zYFq6M1Da5KT!Q~Nq2R1C7XaKD=+`gR|*P>`$HaygzfO`>zk{9s!%S? z!s)LJLxsCucYYc5Qx}Ed6$IBeO67gbk``kscc9;o{&H@02#Y(g5VA6fH08VagQj1< zTsk1apX5Gj*mzyU?Z2Ixpf|C|IkKqsXJaE(Y3^fx%6`!^TEb8n(v+kv^8%8!EOytD zmoG&@ph_|TOntARp#kWaO%d}iEtE)Q<$eGDB*VVtKkKEpx3>io|L9f*>s#<$OH9c( zN&Ajg*HcGfr{_a{`n46n67QfrMbbWo@+WKK|0x+AE&!0a>L-!e<|JW=7 z=CsH(9xErN{7>PE2ph2JKM>2qYWE+<_WzA^Y#cp!V60QX<9dUi?%z?rE;a)$C%r>W zwvZ496^B5!k5M@H3Bl%y*BU5nENRpO+ECO~XC0{W)rV^Rw*PR7F}a87@3UyJ)Ew@2 z54Q^)mY77GGr&QNC9pzpFalur+JJg<8@33}eh2G(rP??J%}Qb7pVm|4+%e&DWP12{ z+48sBjOFumjEr}qlk?;Ai-Pauwr-(4}cX0-jbM=ECPf>n3Cco zQb=BiM>qiHtB(SLA|%gow6#9lzTXW7@=y>G%Uys(%Q7o|DLFUc}9t*#N5nyNDM zPEh#ufk}qhpZN)eeeMR8HrA*5HUKI#n64H3F_K@G@&y^coNj&USQ16X=FfJf25twh zMsDNiq{n~-B=(}_o*3$wPW%9VeV-kuni?CYs!C+NLl`sHpV$FQ+}ej^RAZpDz}=i+ zusz(93&0CZ%)VnMT{f5XGV#J>Qd^)77e z9U2qmXX9_q6%gfQ<6`CGq^Cus+58!3csJNHHOeR43UD!4nVEX0C+f}2>uPEF%BlLs zI&u&N+{n&$ep=p%$pz6S_uP8cOe#U%z*hmx42N$tUVDkM*z&J=lki`5c9puvWT^6DG+NB_w zz*8rj(W!dW1I4&5Jqr+?fq{XZ1c}Pz)YVmO8TF9(r)HZFEj09& z?W+W(#kLc#ZMLg?#LA93%4OqD&$wNg4LM?9REvgADZZ&TKmYFZdH_B{*bdKf{bG9W zXc-w>nSSi06<>3l^#_AW*dRukx z8pvnYvgQB}cWD(VjiD#jv=e>Y=|K&T@>t#s&$S9PCrermIAKc{%3+*`_U844L-ISF&H@{E239w@=e>xA#tS`7B}S*IaI?uV-C>o^2k= zKdXU9@;dRwi`Q`mYDpi@g8Tbru$~Q>n{Xm>Q^J{Qr}6nFzs;F^q6~Dmk+V)nr zd`-uJ2p1XO+@MfY*4$j)S6Lig80X^=QQY2J9uw>$Ws=3{W7+u>av02Pc!1fU!~ZDw zQ7tBAe>5+CKuh;~JjmE+(lc!A+KPO6!UB!^);4M`Dn9f1N@=;nMq3gE2-uY2dp+?d z;qyQ?EYL-N?!Yrn2L*@}7a?;GSX-DQzJpXnb%LGDgeRWiX>Fpg_uKeb!u(7NNtVxa zch<*L1;TQDy?k#Lv;id%vi#I7U!CL1mDTP3D~oF$fJ7qcGd=*Im(64}rlYS6LKb~Y zw&UlOi0?j4M7t6p8;?1PBGjaul=y&@BE!jY>+b1VDonELsUTc}s38Ush&zixA1#rZ z&^k*87)VzqSjHLMkEiZ6wKq@Oow38u2y<%c+-|;qbiu|V?37rmh<5rDc`d}C(X20E zSyuENmH?)t48}aHs6LTnx82KUJvwy0z`!cnT0Jew?+KS<-AsfRV&clcjYcq+X=DoA zl{0Ude4E%(kTc;`{ecNEjP<$C#@g=QriM*K9c^8+%q->3W`)fCvtxo(Q$4?nvz!{5 z7-#zCX*hWDJghi`-_}?pjO)FO{y8p_Y7_B1j4W$lmG<&gh!ib87FKn;zXa}JdFS?V zR0tWweS2OvIRwu6qC+r#@1Ez|Jny&;aYn(`f-1Zan)R^(#~)fArnWD!ih$26u_RMv zs0XFj88}BR8i#C7xmtS3Xa=tNF|b8O-xaa(nwedn7Y(8FN}qe1f1v-viH-?X&4p)Y zO7o0M>?bPAYybKYbcPkOmF~{$@_n2*!;BK25>iB6U_nF%{|VEPZ960cfZwfNp3^gZ z^T2~X9G`Q>pRUy)B0d(<1g4X-in53Z>|?&_%xg_%W}S{srDVBG%nU5n`3wMf0kSf) zZh8u$^j>ki{QUQ~J9)K-n?O+IsB{QwE|gw zD^l7{_^pz5O)r?RO7hc*3P%L9S*c{QRi3m`N^e98F%+7+X-;I~uLGY2mlNy5qTIv_ zJ2|XxzE-5HE2{wvRRkiEUoGhjfRA6(tVQgndSqqgL-w>2@Jlk~OiSqtv%)aZ5q+p$ z52FhV%`bE`vEIv`J+GNC-8GR=rkZ&gF&yg0ILpU$L zB=58WD27Obr$S+L9Z1VDARswi4D>m6I!q`nMxH>_;%&PwC=|mA)92T{sww!9PfvH< zF?IdVi9BG)Vsc&Npts=hl=?@EI1tTZ`j30r0RR>MK51e-r0ux5xp{!36l!#Ibb0w| zi6C3-)s>qOJgKPdCagxe{cKs6pO-$GA5iRbBVG_~AAeK)as&G47m!(cwX?Gm5*`kC zVuO!Rz8XZu#uAW`$*PXLJ4kQFQ5uq!mhS29Ub3QCux*c}E}rbGJh{GhUp{O3-;QHx zZC#X`y9DHQmf~NiRYbl#<~#BcM)QkIOzdH53HVy0->$ZTuUS}DRu+zPydl1H_fa?b z_}E_l(N};05~r!7L-qh^?=zkj&$1GvR+Q7Z7j2%2DBS5My6n<1); z+d-1^T}s1qT&(aipBt#r7jvU;NwC+X#H2~Ikl%ub6BfY}vMi~|vC~{~$f{2ibdeEs zuT83bL|eVBJ>}kSMu`5{2(ZjV%_L*y&h<^VGVy-o$t9y+loxxyC2n3 zvYD57T;%KOGC_+oWU zWkz^(l20*_NE}0UkBs7As|fq#NG5+9fz9*e$#)G9p%Ut=K$p$Y_OBJA3!1hn&B*JN zZ8`MC+?13LxaiOeB(8S`j(5B_a3>TTg#}!@8EZomY~(mxtyVtCapV9_NI($A_33GA zg!QmFcYAYaDXFz}$K&P5EB~E<^PAX_K%&ead7hH9@2u_XhGl>E3WDf9X^HaGmejk% zHBu+bd*gGGIHFB+#`5!VbMgosEjQw#EP0*pkKuD`pKQ65M9dQlqyzFfC0-8y++j^QW_F8umLOW$f$=t&I?!f+*8cnhwK@7ydX=wlZ0 zE=)UC)nP5p58xNwGpEm#?@7)WlS03_M(=4!+S^RCB%Ym}<^Emlz!{{l^e6HtNP330 zh`CQ%Z|r-`dBxF@8@**lbB<3!a%rMtCwWmxs;BR;|8(rg=T_uDxJZb zC&vcsx5Mv;S`JTJlWKd?Qx<-2MBs(UJGxv96M9F$dNLHkE^t^Hsz|V|Pv0Lm*<-#Kq}HZejdg$9cp`kuBzpf$2k$ZRdT|;kDa? z;{$27DI4wmgn`}twm%}Yo9g-aRys-cy!4-xr`9Sg+72&3d6muGL&E-d44BOhqHqLh zxhFF8jAuZYA!x`?)dA%4+&XI!5DAzzuKjvDdW*ska@gwcs=-?S@tkaeyrZ9m$NF<2 z!&z@+G+Q2lF)P1-wtTi$DSkXM z$=+2t#ld&pNuX)LFS~{r0tyda-^kOLIal?)SKzGl`qM@kw*b${s~sVfwYH8Qeujz) zcH)m{|ER#t00q0nT_#fG?0YyP@wY8|q~{xmlxOtF_MQJE^`lB?F`9g}8fLgZFcWI`6PS@*Z(Tw-Et7-;DJew-X!P23HW>hxN1 z_)AaJPTBpSfGxz!J@T8j!SO3d4I+-s!rDKfre5Q8XQ->PsOXS)YfPdgeRY|yZ^W>{ zAiz@5PASrGuh~`|!b?e}d-md_QUWZ*o?4DbhFWCPHepB048X{1RQ@p$FvFsM-SF3)&g3W ziTwSWsgVj08fod8=A|y;Xdj~!sIJLvC}t6z7>SM2&{xwkpb$Sh4I3(E>N&-g-6ywt z=6J@!n0H>vDaZIa5VK67gv>Z>^5(k38Aq*7r!LO1>9`N&a{e-rr-R&am@_vyA*@m@ z!qyObU3=&HhF;*U^w#xSR!ypVuKMESo^je2g~__Ah!Z^xhGn;st>xvIY&T{2&KPYeJ_Yk& zSSFZ(aW(Kw(WflCwL0Rz3oLpOzAt=bQ36?~NWa)sw&#l;k1b|5)=?oj+1yPLw0|9z z=}2h&E9)Kml$_ckZ$6dkeWJzT?U&M3mv~FF^|lJy+{A$qTy8(MU0<}q-OtB5Xte1;NrOMkU&sE_bJ!Kkeo}j+tQ1% z9`gug-m0E3mzeRgl++#1FMmH?FX{TP=yfH0L!qRoza-E1bN8euy}tdT)?Xb3^u6&>!rnbWaChYwA=m1IIE?8ez(p92Q5botMkCNO><{(z z+jH0z1BEQI^$g`vkC6j_AVsj~QE(bm^ew5@lvt;b-^(1^B@#t(eC-S%G&5|HLF*w< zDJ(ULet+L@?xD9xHR0GCl;}toruHeeTA};-IbRt@m{Vy?k)hA+7+hsP*MmFoHq+vx zG>tMr!SDz@W4?{euilRu`|Ne3sb`GUUuFO6YPHL6? zx9kc&f7&v8BMme9F7TFVT7r;>AkGYZ(JO!Bpg3o3PbZ$JBrBWZ)hq4sxhTs0yxr|R z%QVQI#_2814;#A=yI&jdIAd4rlW&H{NT}PSY7@5oH-7BQTtTwj`;u$_w$D#1YL8Tv zHutR^d5H^p)b1?uOYoVXF>MBzvRXYwS-QIbGQZ}gxmn+w^|kB_mGXYvhn8V^sMfSW;EbwlI0n7?oX0Ha4e<$uympVd#^ftG0++ zhSG$lZI%a(&v(#bRH4gI9gk?s%p41H@V$0dyV6x2tTrbzF1S=&PAs=L5%SopM)x3y z=V-1}lJ8Ch%BarAL||NaBm;6X5O5f5Tkfo0e$6sblYC^X2B*>y-(v9PcT?pK>dKeL zK_X2IXcTVpzfDPvR_o~|sZ}J|&$@e3zWulwQR;tk>ghQ~Qy8Pypjq)697fi$Qb0=VLQ@32W3XyGMWH1Qf`P zRN5#G7JNSSYjB-fQzV8Rs^AtT!*fsS>8{@Km2`JXgPQX-?~k0YWr-p-=lZ|Q{`e6a z=0|!>)?dOj!L6ByfXSzHRHTrH?YNgHsFZx;c`EvY=c(*2gGKQ4jAm<7b_`NqOUJ-q z3<+)uQiB92GR7nw!)D56!tDqx%lJxat~#V-T#VJg%vZ6Kt{UQ|U}jD+vP~_m9DJod#z^{GP>Gb)Pfed8DpXxhMF$h(iO z|J-Flod;RThdorDkO}r}!k5w1)zcHVz; zlywT+0~kDJ3c7t+Ht_(3@bqhGK4*xQP$r@{~t6 z(WaG+;|C=P2V={tCrX>lH2RZvrX~mZq=T*PTn?-RXFT+lSw(r}9!VnHGpf^NHM5T* z0XO_7;&ag51J}4^r{P42amnjU-6Gi9`@6N#wZx?BWxxm6w^ZOw_kUzNMYL^G5lei) z*MH*#>%X$GUKKwPBJVz_9I61U!FFvO9ZP8U8!rGN0ORB1hla8Y%%^;86cQAKt9-?M zWY_2&gQ%wH1}L(aE?)xJhSA>Mo}HatC6EC_gF>MhnVDT(@#`0RiE{KuIC9AI zcRB$VWOmtsI}*B}!87C1-oC!E(b0FfZ4W@f=2uivVC>3TIXhS7<>dkChK2V45l2U7 zw(o4qATK8;r?@!0+{v~1rABa#eiCyR0KZ8$(Eiun?Vx2{Ruta<5p($;V3_|$n_Nv{ zMjXTr4kw44RBSxSgG;*qlyp#Bxl80!cu0#f%L@wX(eLl}?`hahH#dnlTK`emTHs;| zqOJzRIRS7>I3h7=`Bf&jJN>$k+w4i`byK39K+Y+RoPe>pr}w!VxBlX=+)g_);e+_! z*9d@b%hGrrToZgQCjSSU$Bb~?S+1OZmTP59(wixTW5b-Af_0_RI&_+UurPjLP%1XU z@n^)aO0d*h^dOXuTqyBSH%V0JmY(LS6e(FJv@3-nEAc93<|rlAswT&>unPVgmdJCu zvy-&ZUud1!y$4?d(4JBen4MLL*#hG$Lf|4=q#grMkA7Wzp@!r@E006QkL|7X{phmc z*k8>8ZNSqzGn;(!n>*VEScTHfpoLoY_k8hdyD$%Q54d}vsXvrE$h5VLG;r%2fhasB zcClRymp;G#s0$r3uk=*SDG*pd{!TpO>THlT_i)AZ1MzuG*GLN31_v6z(vy|k#9hP% zXk?|n?LY#vC9iYl>;p1qA?x%xbk^JKQdm_AWvJuinckn{ejD*t%h#+$@Ppz(=eiv z`LT2!bp|pS?F!!bT*goQZb~tgXTT$F_f&0D+|9Pru9lk2h)MjORs2miFL@2cx3-5G zc1GZDob9ZIUATmsKj9&RggahDkhEh}@!7V*KW@digM_wbCYWe-SYgRX|($= zo~gxUlN;SBui{rBD3&}8qB#~z9vP3eUfJc5fOBG)$6=A@Qs<*=<04Z4Xs796Kb(XCM{qeTn z7QrGcph6Bz(zMRCBFoKVK+02t_^ud01?NY{!T) z&6PdlUZz#F=d#x-WSw3r?yIftYkA2ecc=R>Lusf&4@Z5ErK7fBUP+yw*^7B*f*Cln z&!T+WnzU(eF&Zhboyvg}?%K8?uVSWtj(zubb{!s3)E%Z0b$=L8SuT2T1E zQ&#<-RZnHDjEtxOSOE~|TzD@gCT3@MbbA|OfQgRs6&Hy9SV{p|htSYafPd|Z3M^U} z7#NwEnMoIl06QcNm};*8;wg~Nd8njVieFt@dk`S?OnX?kUs~j6WPAfySpc37hle~6 zl6?RBVhsdiy0$S0fLa21z7+q!6a~~y03026l0BQLQ&r4Na;)V^&Ly5-SoR-e+ERCW z+#iy`LdwkXST%*uzcL~^mq(E-*7ixfeN4AP^nSlr_;^boESuJMgKw-vEhp-q}1}`!?%YWd~ihxUtH> znj6WqDa}c)v=6a}=J(U0A(^0loAfhK#Tk}^+1<0Ekxl`l zO*du>AL}?cT<5b1Fr|^|qC(XiH?`9vW!E-?JOD=WP?fsWcGk-yk(y0F`y(J5KNLJ9 zKVlwjRk20Fb;^=JiF@YEzMZs;Pl9R~(}G57nZ?8{M4w5^Im1nxo>82aN!RzGj|!1h zTf#QfF-9ZIIzYowSY94$WVlI?vTqGpet}Q4cCZ3ehJq#tNj?npbYo_Bf>a3;wn#eG z)$wzlc(`@N#7stvL?T460MRrri4-Di^69V`2j7Wh4D9wDi`>epthC(31Q0ifpGyEg z-%d$+u*NdRH5MFa0*S3=r!APyPbyqaddI4_jUosRQ)Sp@7CpxT9>g7JWj)wTZ#Vd^ z!YEG6mVKy)Etgt9Qg18#W>C1_ih_y|0I~*IZ5cF-SFA!Gf=rcE;b` z3axUWXFe8(Lp1Ryo{j`v6;)p0U!+A{zag}w>gWFD1B+ES14C&=S+~nFR9Tk)8Kf zxp{VdAJgLPoElqBRnOs{-vKi2${Hm%gnTAX>&>s|>SZWJoX_>0Pc&sh8~uH=Q+(x} zX5U*>^ccH2`9aF~C={Z>!%Y`Hq8)tc8J5i1WMs6QlpE?0zGW#&nr>?0)$1xC%+x?~N5Q9GeP}!9ex-&ZwJ`Ra&nF`YdWw%> z>rYuR49T@Z#5y8anYu0NqzkcOhRAuwLuw5*JHI(NOLTBcZ_+PyTfI{rGxkHZ zj%@l1YU@A$#!;QdVzgjx3+nitQF3@8fajM)3m-hyR6(u*`MW0E8r@Xma9s5O(2LGl@QJ#M&ePZZpI;&bb#45|~ zyyr`@_xD|9L#N`^hkZuN3YNn>H51*mMtv(Cg}Ou?*GHBOGRG}0gJN&|BL) zcWBf}*_4%?4b0)xZy5&oReN^05HW@P6EVKY&hG4-4hRnJ(XQLlB;UK!&ts^WpV2Jk zRP39>9ex&!h}+REn)}e{c{DpyXQHCqW)3_hS!lkVq8e`dATgBhe2Tuf{a;oE$o5)E zyUTshUz44`@&0UM#KGG#&@(pQ6)}Spolt&pu(S$P`jf<~FDNH&Z0r#d$ML=sh$Grs zA&3^_pCDWZ2o+ldFnumCSs->8G}Wxaq+LqGvD6>_jas>LL+YdzRal70kV%3j8H5a6 z#ULzb&ZBA>3wcF8a@MQFwsd!#&jXq#_gM*I670hgG%o-`(L|C(RtiX%TF%TnT1m8- zEeSr}?*)Qr8^1cYO(N#M;0A?;D6lfiYQ*x=l`Cs(Co?$T?Z#7EyTfh+K$dAN1Ukw^ zmU%GY)_mCtp0h8QPKw^pRiPPmPaWp3gXFvoK5|3Cw7hIh75=+t@sw7GjLh-S_fJup zeM$07t#WQ$R|Fqw?3;K`I>V zH2KprHy=_=0R`#@XvKNPe#<^FVtHFcnL^)o?<(bFeS=c^8_iz) zN8^eLDwx3S>PMq_!sD+OSPyCHfSs^W{1!MMJOmVQq(0=6FTecv%rn4x(XAi8c~0yi5# ztg8SH!>X!08*q^M*IrqmU%c_6U*cPuO1P1bkhp;g5HAHF=d~7n#ZwN8de8Uf+fm;^ zDmF$XmqXaLKiQ`y3<}3m+&&-pnn;)WM#Ah>MKF7+6voHp*r2TVsqIWFwNs*j9O3pP z16A01ii_!A@c_!;6c2_oArIDB#R()c0o@SHdBF=FAnxnC1c6UD2CR79=GQ|ZwO_Geg*m#2B1GB=Fdc8s=zHQAzT| zPPDW8aRX?0qa}}q#c9VwQ>U$}RPox&C}QaiHg&I~AabRk83;g{o;!ByQ&1D*?xeHfg zhN{p1a?LN+1F>|$(O}n~#jW!E!VDyAV!Arq1oDx7^%zf zMo~X&LJ!Ncb|U#1n6}rye32v|OsTsgykvt|5KvL8Pb(rX?+a>nhHqnYhN*@ZU8&2W zZQxT*tPkSU&=!-8{4tk1=wSE*hm4jMk?)kP-mjerum#aznW%Ct% z+moT!kmE9)<=mE6VHi}g^!Fnj(x?>DZ%6PP%!)bY)Ev_Tof0UF)!PSpMV@pp za=TQ(%i2P38lCjoQwhv5!#NoA2Ilf)^WMgLxPDwSP$US<3d-BhZ!^4ucCs&V`CFy+`XAO|UNF`ORK$!OQ~jY`!rn)dtbA z5k{6Rm4V3yprCKHrS*Zig{6)8U%oB~3rVT)+Vz0JMsoJY?CZ|@UfK(rzueuJ4()@3 zDO>^d4hT&UP#m`d`G0An@&D}X{hvP(nGeA33JMD1j(b3V;eo!m+>UWNb ziIMpR27{NA7nH+>Vob&JseG_f_QEm^F%Jjlt0JnZ8(p9orJRHIRM|_(w-DFjhn4Lq};(aqdn^w?~f$pIdPbqOqc31cA_zmue0y49`nM zo7PVn^d>rG_3rZ@HN=Do=d8+g3K&^@1Hr zl4889l{f+m(>09WTz}_z5S6V`KQ$%L=S1$@A2TsEb*9E{J67!3WoeqJTEBOLz40fi z)*#DAS9TJ`KIQDAH}z*QNHGyo6|3ocOym^uV^l|ZK)~<7pUo(;xjjQYBv4mRd*N}C z@b1pH%E}dllGW*?jFW>C_8MQ!y8IDASSv^6X+>C%;ow%4C!48h+M=`NT>nFS%dLtl z&2@|$Qeu(5@5$9coO877ciC56Jpu>vZ(kd{`2O(~&p(guZ*slNeF!R!$^iK?ZDe}E zgf|dL+UhXjlfjc!m@vra$=de!z`(}9qtbc{z4Pmk?OJ2xWcf(Fpbv5yQr6=NwpUb! zv5RXqHL^*7bDwZ^cp{|1`ua@9890gBQ6&)*d6!c)tI3HIh?4m?;kA`ni~EIz1<7X> zn&FiRJ*%rHmtGvDc0OnPf*YyzG5C>{Iv2?maS){IuyS;PuD?!vcCwE2c)}`m8;>xH z2U^9Ukqp}yCrP_(*t%;b`MJoOZG_P6RB5FdBQkk;e0*$dY`otUm_D?Ac6KI@yp!3l zT3P1x>p_My7hB+4kjG+?dQZ<;yEH>dpK=AInL}l4Y35u-)Wuch$5h@1uT}*wpo>gn zC0$$u8?9$qQSrL(89v$Uv9hvNr=ZsKx!(NEwSMF$Mx1+YBp_FznWR+{{Wq@Tob|R& zmSZO;GAE+dwX;xyl)SbVm36^o&Xrxsz|B&uPEn514gmp;=k!G=*w~N& zvPFfehCU59%i|G$Ia^(P>(o$l5v1+tY-~9oK*k$WW%hmatI3=hRbcR0{CF~-6<{o*1NSmzd{F)fQ<}G)V++0H zI;^fnB3dVfcr;QdIg3~Y!EZ$MFO6L+UWQnSQU+)rk(wWViHT|TK%v+BY^02=RSY}& zSNmf~B&=Rau&#e{Glk?rHqsadg{BtR@vFG@RqQ23G&y<#6K8zsVLem40s0qv2i2-u z(#LzD0mo|2&KFJ)JC(7F{gg)SC_}pX)8MvKUEPe`s0Qza?9r{3O~z@wM6YyB$%`}7 zGE~RKCkR#6guGnQ#<_jW)IeqXJH6gbvRf&O0g=|KrypL3h=^ogG<*SmYil;3&aI%l z5w0o&_9Pb{+i()R!~#{$^$Gf7deR1BhEM#eF4Q?DPanLo>2botr(x5gwz0#`g#S*c zTU_1dt~O}louWKbyV@VM{o{0aQV1_;tP!T~%jsv|-u9`i=KT|&E&Qv^Z5?#v7*^Vw zT{!*ptJtq530h5)CyoK(beUVRVP@ABGP)U~wk454fz}SP6=xVeM0Ewe%G7see%{s9H3T!u zQgJok&ny{=xlUl&z{v{lct%1*M4~&G=;RlOl9E7o=6YQJV`T~p%O=8O`A=9FZi_(phF7jsXTqT>sghkm z-DZ*Kk@N@YF5V-%C!E)xj2jqyGgiF|93~4=l7C@cU^A>Gr&S(Nh3U{cWZN@8esbtW zo!g+uwk zgn=Ab)X`^D-$WhBv@*q_ymof1O)($qK}OQ8KP3SqBu!*_(w%|Qu71t&@o|-+9iJfe z7%8`)b5oLo&I-n`?ho3x7T3Z1|I})V{l~akeDv?E>>c(0xW9ftZV@;b@Q4Zj6N}Hj zbn-RRU}>3QPgQg!~N&oBovA`4+Dqq9_kgpP00r}{=In7A$Nw@qnrDl_=k#rYZtUwR@ba#E|bA3`0(4`1y>zSPJPIV9RrKrVz zMGYeSd<3F$Lj75SdB)JkbL!~iV+qiv6+t6Xme{L8h#v^IGGf9wwK+BccWfir7|FT-z78@@OY6Hh&jOqP7;iT0$`r z4vl=sr^HT5AW^|N6XhzT50IdMK1(5tJcc*XFg}`#GSOiH)U^|SEgU*ASp9XHU}5$` zTn#&5Ah8!1cz{ymRmibEae+wZe=@Ee>$c!0oSobxp4|9L>{s8CyI`AaeV$T?ec?B)Lg^^P1|Ye+VRFgo$$odwatdx5@V4T@aHr^j(e zF|PI|lIGN~Xtje!5ACTkRHB*)%_Z!=!%42U)%};3&gupWgpkljqFU!dDIXMZRbBP^ zpOdvix+8iQn#n?yp7R&;j-sW`mybF5MYiVaAfa!KP|+^vS6y;5fx=j9DhcPUVvNK7@F5#wqx8N_FwGkJ~| z+t<1n72t#mwI8r?Xm97|?K-}E_wIl{Hnq8<8t7$!FVs*A%Cai=Tmr0Q z>@Rw@wWOu@n_o{P5tt$B_)Ljcs78HjG%z6Zjz%xfcyIA&m{4h4n*=nJAb15RfX`Ov z?*Rg^J}$Q9!iBA%bUsS#;B(Qiz%=pjc8|FMk-o$2C;6hR?lcUl`k8fy1ta?*(V2ON8GudDNNX7JU?J@jYBm zD=~z_$I*(Po6+*-wO{jCrjeRx!Sv0fG51DA(#MQZIzp?vAj0CW>~tyYhT6@<{sg~n zOMBkozvIKwS2%AkvQd{eiq1jp<}`&Rk8f&p^vm_ADA15)(DsjOgGm|a9YoCw!#ffi zhce3_a%|c=b2*9Sk(8(Q26~l^4X|FvQi0}(`BzU|v&L|b^Q=Bpp`7MN;mbey3X@FF z_(P| zDw%ylQa@v($7knGMLUi~JJwEq(x68yU)c9vMNXcJ33g|=9JUej2z6993hEKfc)Ba7 zcVyMJiFq!Fdi%OmR`7w|IznDuRc172;lA_n$u* zG2MTRwh+@^iPi?+%R%tOP6-&0f)Q#t%rRGLCOe}lvsqohL)DL_9nD=UiaPODzt^ml z2S`7Ex4aMEo8#@uD~D3NHr7ols~5Dik`1V-Vt?hO=4jQ>mN5PMTVs2Q(l~3=_3U`a z%Y-cB)|Iw4uwO?+LzN2hCcQ0&-h5#@x4s$uA@fYLM`wVdFV>wuHRV-JK#*^Zqyd=h ztK4+d25!{x8qGS{tJ`TF2PDCojE+c%_9v_x4cKj=lZPbt8~WE(332$5p`d^40%=(o zIRRLsrTW{+qYZmyy|EBJ`0GjH7*``jPbZ6(R(5d#PS-3OT9?R%n$?TwiYgdhcxKy3 z$6`Qn&JgoH^Wf*Gp>6PUUg3y$;F8H5@Pj8$KBmno&qAeZQ$>}H^GNpM#)gIR=HODP z8Z~tz!-DY-4lj4d(!F@;JF^tkOIMWqaaVpSiI%Q%7p4ER1hWnbGEuV_C;Qa+XZmT{ zQ^^J&2d_24ByVRQZ5yUX^S%MzD*iUJcUH7~`<@$0u5kOVlW=9m{66jLqKS~R>F(x> zq1KT7P@hO88~iQtP3d;Lgin`XqFe|DL22<4)X117901+@7V2Ui;Qy+{H>3qlK}xeA z67(&Vnz*N%VbYs*sHMKszv}%&?G#V`GC_ZawQojh+jOJ5ip!0qOSn&nfoVJujd@V+ zt07Q|weB#j%I!=KdU`A86I&?e8?%FvZ<)LIN@@ISNkPAHnUh-lLoFm}%)HKcBZntx zc4G5&^hYn?>ex-fkg|hoev5`dVX-9({5lq8Zyr&AtQ* z=mA9}duxe(?0h@2#OEfm|hhh$3#HGA|++Lk}|g_`xR z*OV3l{Y*Hrte6HlkjUVDIdWCy#IcpF)YQ~)s+aXT9sxB%!U$mzh+bsN?97w!2~X16 zg9}e9kJdt$ck)90|MbWxE6+BAapcCv_by*v;UqC2jIuVjDM{H@dGA#o8`GAhM|Y2> zEAoTd>I-eM@)=#grLlT5yQy;JB)C*~GV*afi$w^|1Tr4LO#iU_TGKF;4@m2oo{6SUfV+XF=A+5)@ z{)#XP(3|s=nX1JMXO+?fGg>Spm(;0?39Ayj!dYP%+W-t zVf_R-)r?x=daK}@M*1p_C|););YTH8E^<;Hw(bYBZZfGU*1_l5=J=Hog0=BRuO{Q4 z%?&WBWEey*yP4yE@N<-j7w68HD1oP)K+ zrPQAb*j%l%D<~w2n`nR=xfSEi6~XXj4duUca_x3%KO|0XX=%9)RIIJ70UXqz&dvsn z6zbFwXZJx08BZxEzayT3B7^cLiUY5b=sT@Qy4&Z(Lr1i{tu)>WRSc*MQsshSf~)mI z!*$_IBltR*eLaIEoD?je0+wnvRYh$G_8HZd;+mecrjN0!*<0_}P8&DBiG!98b^X_owg1#al-gFf7`>K5XqdbB+ibb( z+8DKaAyu*V=X+u3a$Q9xE~w=UtGBjz%JzNJz?ti zZeVR{aM8G1P{T=otg)`79f>doL9j07+t9wV z6AZbw8^7jbA|uQ4E5G1>>Q{CuA@Q1GTEdhKUz5acPW zp9i{i%Yk4j->uilovwmHq1xKofJi@UiV{5m5E0=Q6wJxVff~1dGNmPY_)BT}ZK?{b z)+Qx{MUcYB^8IVMCTiIlHU`h$OjV|*4^Lqt<=vLGNxm6Fjy@HR^#(KuX=bHRQ3v-O zY5Kr;#A9+te9sivC}JBCZN*SlKeuc&t(ivx-_=V}p(RqJay#R7wEide_olroNOH%9 zfqH*#c_wSFI$Nqdcl%L!;Q8%f4+sDiUH-YxIyO35BRx_{4;L5LXzwRzU)-rbyX#5B z>Z14^BI)U60&(r_M>5s+H?(8AF_%VN zpP@G|zy4V1-BbAJ zVLNm6=f0$p_g6e-A%4NTA@KD+gQ*${kX*^bLg460Ne z{ppWILw-*cbrtOMWBfR_JO{-AOKn3P89zTMHvKL)7FBz&L^0T1|H_i~C+^I(QF)C6 zTV_-i8j-lqAi^ObP;HgE^yhQZVckv#YM1Lm&shP#Xe`m|E35pPw~LgYfq|tgwiN$j zCB1Bf{I88Y7DcU4J+QHmNSi?#d4`b*SAAlEu8BEVZcnVZYFH)l!G2BoVXPHdvs8Ir z>`SrST?HkM+d#y-H~`S$$L-yl)q%prw1tES-WZ2olwu^okt`?4`l0Jqn0>EMl;FZi z-wx-O8(l7-Z_RRA$BEkRQs*vd$j}bba`V2^QB=qJ=}yko$}kE}r#Uv-SUlQs-A@e(gp(pU+kfq6YSy_ep zn47c^3~*1<&=b+ngEnV@TBM-F`e~o!<=6sx%S|gI#_emVI!dB`inQZqO|a`&HZ4Q) zqE@{L0CrE-rB~f7935S?4P#Ez+CxBJoILmb=2<1cfa2)h#6k58-=uYXZC@Rw#f|M^*cg~LyhaE(=W_J(F>SK!G)4^+jJWsJa23!sgOg(g}R&a-Itx7 zCHo46Sv`f2)vgdj0#JiAD$12<_o^j#)^yuxy<89}MbcnjU$At@7HMdQmBYG|B=R)v z?hq`zVT-_=l^=Dv5PD4`fdRx5Iw66$kqq71=tvThN^FJPTy>!2J9Z(v>;tHMGvBJ0Q9U#l&Gm)8xiHu`oPJfGX+~%$7@ULNW@<(68kMHd z5S!rlgw>P;O^Zr>JvLtzx!mXfnwueF2nz!rAxLCZ9T*?SNq@cN; zgM7s9m=&UDUD9wAHg{}4A19QyQaZ&4LJ@l9)=;y$WSD@|Dhg2Dx>}7`YKgsXmM^R>G=Z*q` zPW%4;sIeEul6sySq^;;V2xCWn}JqN9jH$^mxFd@!&`#x5g~m8JA1o$ zi9|PhfJoK@Or!=o&~fURQMb^e4fJB5)J}#MBp5B(Om5DFoZn`@*)0yi#D$!9ge((= zj@G_(|LWoOygh1lcSI`*|*xEjJy0Z~yWxms=LY*4l zmKg_=4bgl0@-5}%Wi3ppC3|0GMPur9N+TP*?Z>`65D^hnOV+{3KqA2lB7Y32b4exz z>T*~(CL$l?LJt>3-uShSD^MAz?sdhERBQg7cn{xzKcq$Mx{HiTGK-2{L(MNH<5254 z!_CqJxBGwK0!9}X9wF%PN*}#j3&efW+An*4HTRhQ)wu^B{+C9%|M#v(?z+sEX@P-( zo?+dlAvEQhZamNpfS2)Zd5Q)&+kK7CflsM)=Ixa69=>CAK>j4R6>s|EfTUX3kfp#* z=^4)@w#f(J@Y}qC<98NEUcwJQ|A_*cdQM=DR2jE1=#O$%p6Iv*OZujry-F`9SP`eM zbpDjmu;96`PL&)0rju=0iX7ZrmXgQuEMhDlDr4dcNRsvNXb@~0k<=X4F{mT2giE`! zH~6?5`^ZK4S@}1)B^c?KGdRbl{7$OB%nrEPzhd;k64>GU_`apesHCv!g)QGx*iMCJ z{-`FuK)zWyNN3Z>=w8(ipz%2Xq|p!iBHr@rTgzSX@RUioVYP!S%7s5n>fMrHMN&X*Pq{Y0H;bYyOKZl(9^Ob2yYYRilEZvH&ZNWy!6 z_q|J$oeqJhS^9oio?DeVk9w-rO`DffM8s9uy?fGIqSwKO4(Gv;HIT}9Wc~*_N58Rw zseSPmzABcybQ^vq%?#Q(tao10WKops(=&1_JgT0uj+V2A^WuGWAWIwkrk?)hK!Kf z6s~CMJUq40(jU>&5*5kHBj`=<0KZO~o{x?J2#eT;)Jv_YbI$Z_8yf2L@Zuo8t7d`M zw$du@Aue_vntey%L}A)@4mAJ1q4b6E*+wt+h6E9#$rs8MnUH}fHN~MpM;hww*vM$r zM;-cO8fNk2k*s!PjrxtVDBz5Ig(B-z@%?pXm>NwB8tam3wXvg~`*R^Vs}?O+v# z`lmIMcx_x!EF5vb9MZS9$iXhIWsp{{l`M*92@EkdjdV#oV+0xfqKpoNbu&#n5@=Pz z$BxQO2H9pz!;<}S3>l?o=FD@H72G1u4*=+LqU^l5pnb5nMbYA&}5`s5B zYd5ySG|v}c`x(=cew?_#TzLp&ogP39%f0Y;;1izp-D)#j zuZyj@G?W>XvXt!V4SXD*c?G*TTqioR3;i)OfiGp|u(Ma-Og_Km)#m&Ep0iuT5)u&s z>PKg9mE|2jfOB&iSnDdL?5?9I0Y!lY@TA_C+WfmS8&BVD+%>eJ!;0mi5FXJ)1agf!bqA|fTdzPL~*)B*v>V80(#OWq_AAsbgz5vkw}!Cx}i zpZoyMONEn}(q;CAA3tXAHWw?+aaT%g>Mhn&BzRGV`+<1YV=6sR7u6(XYLkTWt_*#_C|UZYGkF&8)2G)B!@UJ;JZVnC}q|`w9^sgm% zAim`+Hza)Q?&gM+F7ej)|HUck%3mqp!tYmqJH>xL5XngaycmG3}PqUM~tNbRX zxOHQ6auNN8V6)r4KS9)}J^cymhY?XxT}Ej)0pWG_k8$K82fYJtz(_Xe7os5Ld7R1XwYiBp$j#+waSla-Pd4f8pC*9*3ODy} zpYY%Xz!DrjZ4P|~@Q!T;LTvqdO?Teb3g;&%svDS+^|_7`{QBu!7}#&?35Q2vJAL=Y>{t2M?|73F!@wFPkl2Jb3Hn$Xtm>9uT<()L<)s} z6ND~<=e~`TN5c%UMRUiYc8Xe%N%BEG!rU=?Dvpw$e8Li6D9}ZVK1i zRO&g^h}{s~aX&3l*B*C8I{rqD*4+oMSpLbO*42rpgpbG%AscLo3m7Akbu~y?_G|;q zbez2v*NY-poeM5xzt6X^0y7Rst^bv#OJnMZ>aHd)NuS=}-uF~kPgg8|nSxts?&wSx z;XSK=kO&+$qMZ|HKJnd<_H!#X21gImSkOq@JE!+wRI$2|t(UfQM6+eq^eOn;(fwPA z6BP6F%`PkDQR45L#;Y9bjpe^~@KO1YqCIp{IX5#PZ4Jxv^r5N%4C_ z22sK<%`cBb_y4pS?3D+toS_2eS+0Y!-ZnEHOzr)Nyc@&&gT3KXOjb+JxK80vN+4-P zP3FfRCGQ&N+m-D~AD&q{EBp|3`&4z1a!sfz_>=Y@*N$`zQMVd`aw>QuGJvV>1jb(< zGsGXN`T%3 zKC#)(-`Z((vnA4hnE8IMq@%Ig^E#-Kw$^9DRfBjQ4Rz~|Gh)vh92C0Zc6ueq_(I6< z>h&&y`i_YrtF6lJPB~8EV#TldxH1SAZhwX3MpoKK*<^kFPxQ8soZ~Amf+Vl<6>S1+ zK`wz7WxD(*PtPRJ7CoBiCZKfS)4$))UPD^LITv(Y9@?dB6xcsjM%;hgb<{JNK83t^ z5LMsP|9vw;I5iqnUE7fS)T1`gLA)CoNGLYsK9hl#^(L+rrI&c)*Y3eqWf7duL|Y#I z-GFbbc4D<8xr)Cs&_2>K%UOh``bo|8@K-PF&bDg%UO>SmU&_ol0`uoyUYce{yy4I}q2 z0~husbYDT0thDSIvz$W%p{2~stzI70+)L(T4+dw(zdC*4EkF5~td!nYG0FNVX@zaO zG1_x}9%iH&QY8G zuVaPjATI>YH1fXgmY1_ZT=q@Vvhn9Qx4xya6Y=AFbDpT{6c*TYcwM{9jM*AiFTBr2 zY~!(+2{B^Tj>?v1uHa$n&d})Aj~2ZOX<^F+uf%y;174$F+(}mz*@COs2OVBn4##9N zmPJewC+SFgaft6#DXC?+53$ASmlMjXor&PqlvCMU23Z()8)*B=Wg|I3;eV_ z=66&x30dxfsYxsKwZGSKi>piH=Ypv97Td{PwmqAyZJ01kM+8bIUcIl_ZHS%uM&5h8 zmb}$^(o@uYT0Od(%+~>O)r~%!8R8{x7*evMR;H1MmY&}v~b3W8@@Q~S>sMa=D^p0o)zp*MMr zZrA$7Tifmfla)3Hnbh4cSy@?FqZZw;X#*C$Yqt)sU@2Rs=cYl4LQnd`!ypSDzDHk%o%EXy=ZC6=Yf^O2R&bL zF{HxM^Ul$1$fV%;7#QcKw(P<)#9u{2%1663G-v@ar6C{ePG`t+Iq( zSdz2ew}5e4u)->&L0GcDAx-4t)UVYwRQK16a~yESCq2EZBwk}yU^(XQHl^G0$n6f> zY3pnD2^PK1s9mY_mk3Fbp57C^xx6@{O;0F^Igj~W1uTuqZdt;at|7eLhkW4!Qf~5w zEp%Iz0@vssnvR~vgormY=D}CBC}*ltLavxt-JWiIFWss*y$TNTV~<<7#I zLS`4=Hh4=a@c>)=a_@_oV@f+-Z@Y<#<5piPogtabwN7mjb??Kth&C^87>E-TU(*QJ z+Av5^?Fg)6(quh9i(9oFqu(&C`Dk?L;U(+uh5X$fA77*H3uoPaYHq&&-Rx0QNq~EWq7&`T1L39Q%n1|8CmXmvsv8TW#`C->jL_o|h2#L!5>)$Vu-KHp)PELT<E=)W=ccXj|+ExY~vbc?&Kqz{Gs z8w3~zYR1HZkvrp70h&qI3xCT4vTv&cu0}FKtKI)5DYNl!x6wIm{*`*=I;^?}&SGMi z{o978KjiTzXLZUaeW7!6cY_50t+o~TCj*p5^9FU!k)UAx-ya#L!3ZiS_Pewc!+O4{Io|ID^_p1Med{uApz|MN?S1t`cNTk#^~kZ5 zdild?6UowPhZYm%&UCogHthQQ?$tsMUjAqC4pkThxj)+WG7Q*?FOn||Is0n4HT3B+M*Obk z-)g4Mm946sHMCqw_|@!RJ5*9j8L7h4%c&4H-?d1_@Bs8MDEszZ9e)$-=o$^gq7DeB z^bc#()cUs_;PNY^cWsC=GGUuOQ5pON(Ui6SxSc|_qMUeHWwI?$rW zTXCo0d*Iv;OBOovODXX#T@vob7hkrX7UT6_Jg}1-v{iPpSa1f6r9&K2Z`xEbs5*n? zR*n2GG~P|oy`P7v7v@p$PSe(F(;D3D_HRi!Ld+SY?eEHgIt8&{>XUUU2iDDzXE|Ne z={NXjWin)-%|-`h;Ef-6>@&>wiO~K(ijl+V?73iJLB$MFAAQtC!L`+STW|zuSWT7( zL`)o_gJ|F1ABCGvKQl;nE)%Nvl^&vTgPomu$EkG$YRAMkk512uzp5_*>5FyFdv8pj zq4MYnf8euRTq`7Swqq&;L266qv7Ou;^4bQuSa-B8tq{`p0IhRY%_23>?rNcFP;2|j zNvFAz;Hq_X$Y|+zF5~x1V+2?Kw}A%z`+`RI%PDFig)5!vzc?)Ig={s$s;m{w2R87j z9K+azQ_9D713H_-iFgZHy!vsAT3z0V*RnfO=&z6X?clI}f^!M}T3}wmr+L~bOG+gV z8#8 z9?KH^Tb6SUtcyR`E=H&dZ=Pccbw+%?q0P{T!`)&pRk^_gm~FR?>QY~lIz)y!N=2c! zs_)zQCY9tz$9dtf&WYz7jCh?EIVFPySxgW|=ByA-HKd!H`X0Rk2mKxV|lN%f2U^Maf*zpA34iVz9yf8P0Sat=#*boF4o7I%qBKv#t8#zrF=<^8(j1vba#;Ajj^adj?xx_0W5(2^tW@teL`MvCWp~BI z`3t5!bD=JGYyKr?GOU`VmZ2q`cj@_Y4bgcN6UaIx_-M)Bp))!!58xDJF*hezg9&qb zqr#SLxD|h&2v;IzeCBxDJ2xNwTNNM`wC{cj)%cC3=~Hp+8Ne(GD&5b*28VJ8owW@6 zEoX(;)j47^kVJ9ZKrt)2W!gNr&>!htT`pp^sx$bl*Zla&qbJnn24DP9E(?R196cd= zyF;Hpzv?KN@uJSrOWPsLGU0BAv{-+JclA9h( zaFQp9vYI}AGdaZek3<_A3vEqni*1n{?CrGL@bu-B*GE&DnhP>R+KMxmg?)^}9EMZ*T5&Rj6bIbZWVu3mdJL;Ih)KXV$9B6uytn^?&O*1?{a>3OHEuayf;^9}qK`9`!u)_z}-n{)u!? zMSE);#>Y=jCOOi`#Yzz9SC8AWfmtN_zjRyw#v<3YY}<9@LX5~wigd_y?m986(j`>@ z78SZbX>20IEf^GRs1;DJ!CA%1S>Z5%G_V=0OR=jP<`cAeLMasTT(uQ%LElP9XJxw; zQAS*53oS2kdHaorMG)#Rs*qUQolE@FP6y>|>Wu8U9CMZ*YENH{o9A!??f&dzl~g-A z$5Y_?v!-}WAdQquQ-3@aK~K+HzkZBb`_gdq?O;&*93RpQKcB~k_%9qj%Cb3(Z7COd zAW*`mJE`@mUMxMy9ppY+4O!YXo;zk5B7-Dzu_;U*wXLo%t^XE8@$~i@n+G%1iv7)DrHT3D0}ZKhuRZ^Y2mo400DyiZBtVmg)D=H26mYZ>R zFw?IWZ%%{dlSSMSN9T7P9E&UKLLHsFnizgd)&-m_zO8QYwQy_5=gIe=hwyoh31?an zyULn#r6#Nf`8xWqJkj++WN6QIsLZ6ybvKU|qAKBc_l|?gLh9)ntk&Ee3##m8Eo>S( zv}e{07CN`d{VctS3etS=(scMnWp%iDW}q8CfFLsjHr-va$bghx4xmB;d4A-!% zRO{!oA8#)wB~aAL#s{1QNFlNs!Y8Yjzhw*C+J%G86JjTLy^eYuCeIh1D7ZQycel*) z1Of!+GW;Z+FAc1ccyX5rk}^_5E4Ylrg#N;M^gqKB=b64Hb#z>Vuz-l@t${a>Lg@T{ zNnC=iGCUaWE{<(1gi?RI`o=eDgb;4E)2;}@9fZ*SR{+xUB`yhhy|8EC#fXRmEL(VK0L zn4m5wIyZZjYDH(s>gd>W7KasGf7IV!^7;GP+{#%*O~v=$6-VJTJ5UmQnB=XEo?=<^ z$2`*f0N{aA&%ti<2Z24?#^d@m-{a5A9(Fn?L6TV~MS4Z4A9B|ZeoOfMs7>!BF*DV@ zu3`$Wm85bdX{PmN8k&(K5P%?xlZ~~j$8TKkWwI-P>ANd&3Iga6A)Jk;4O*a6`0VxhJ~gpOf6Qu!k(H;II%XasH7!abz`sdY~?h( zG@PnhPPU{F=;n8#%ji=g!lGZu&uU{**r_!0m^LBNk+ltxcUBY9rFX!^*xM^;=(){X z2~$^5a})FH?*6m}tf#k*5&pl;`jG6xaPu!9Zrus`6zIfu!JU~qu=JzjW=EuE% z8|HQ_L+!z|3n2-}A6D8q%t1PNycmPHC&2}`=GCp-{vMbsh_PI{xpj-gXl_sZKfNu! zJ7g75opcL8S|p_bl;`d;&>1EnwBh76Nf6CT)4ygi0Y zX2PWkdHV2t$81yj2T2K%Uc1pLLJgdgx2RlV9`I&V?$|sHN{R6(%4%|#ukj)ot*sJf zDiN~XI667*y{|4`MjtWH!GTMLcW3e0?aehDlvq=MIK|TOB@K@%oSmdLe4EX0&{cpu zBoFVVV3(v8?)b(I>yE@@W01Dx3bj;XMC1=qT*~r%wIbzBlD){sx~M#tFX;mPg{EM| zwuW%VQfi`A2tffneyU$`RA{E=YaY_3hWFD)jLC0Bif0R)E3pqbDzsBT`QQ9h$a!Aa zDAs{$VYEysqVh6l@0vW!z=F)A&nb6+S}}kE<~ES>rP~s;#4SdRJmjQ3}NEL>}sE%$PG&}-nps!UZ->6!&~~+djEF|x4*0J1k369 zfZ=Ox#ceP243}0f#S3Xy{PcC&KNQFW7(zT{$>$>PiCcUt)v3(!pJ~d#>R~c ze&uan@;I1>Nx1FS^1PwHGhvQn8}Be`TFYZ7?`Af97i%l(2KMOAqS9^nqBD%oCLT97 zHjW=AYP?JGvwKuRzqHYi!&aX0WsFgbbSaNvrER{Zvb~DHm?JHbXE;E5+G(rBLQLL9 z7ylK{sM*Bf+dt8Btc%qKwDoc@Q8Bx%XjsT2MaMNtVTX~9?^7g72BvG+uG-V65Qvjt>2Pxp&<0?Q zKp+iL`=^8ozAI4MSIxp|4j+6_C~e^#lV+&uSZIc*+v%fj zI?BY>&!`0T z7~IyHRd^#sg&cg%IdqhfTBiecv=-uw%X-t*Y2z0fME(jitTq!#~~(m z*;&B!Cd+EQpjJc`J)r~As`$4l(M2in7@Lh!xCwnSx$1*2GG!WyL?6w{<0Drc(@iQo zu<)X?K`b>|UliCAh2=j+v$95)BojO`FL*V(OU|t?B?R71{zuq?z79to^fPZ=ff#m5 zmFdu5k`UG8DNY&>AfCg;_uqOu?{K#JcaN)9 z`?RW0QL406D~RR`JCH>%caQ-9~TvtV+(uzS^z98bBU9iN=m&-?J~b4W_<4EQ?b-l zJ%^HQ1(*x|E!vC-%kiLZL*`04Fg$%Hb&>@b0gJ}P^jvwP>rVZ?oeR*{WrXwb2Ks6? zpJV1nFgRYVyYBJD+V2`!1V^!mLVxMO1U>8kddvPErg#35gx+`e_nkBZFF`%#4mn{AgA*eP4Li%EMb0mlWY`5UZrb0#rPDs#R62d4zA$rr~;4HL3H|w<#NNZX%pN z)}zzFe&Pk-s|h&wd*UAO9O(op0Hl?}T9=0f@XjEMCCcuQes1lAu=B^1Xwb)!c38g7 zK52 z|F&}gwaWk2C4MTM|HrCyFL2n;)sA2^o>!m<9?l30h!R56A=7&{^!}VKI?0SLKTiW7 z9)Qt0FAw77eO*kXY@gOffktj{G|S3*Mx9TQ7XlcOZheNHGB1G|YFWP+BpA z&}G5MmYS?m+*(fnDm!KxB)x^mw^*4f=cO;!TxAz*gGrue#EgB(^SEx-TWa8Qbt|Gv zKk~vWO;CU8d6sllGgT#!3VW-&Kq;oTRGqohD2v&$zQq)G-(UmZ!GpHs=Jq!kk~ z>7|6t6*ISNkiMgxeRABLp5D!kcXo-*_lvprakuo3D*YB)+#E0G%b+wHL8A5F0#1bI z(^eE07ZlKn0*7z3LTrea+V|}$k3?U7gF#Au<>2wY`KS)G7-w8pXdSdh`&wTpdstHq zX;S{nRXbDVwLZZroOnnqq>H&D)DA-8AmVB2VHNizNZJ4p{2kPn0TVSUHUj7~7e@P} zjc>7L(rK^w?OKdF5#7)G%G45=XsPafSP3l)sra?=p(y$RiVje8z97L4v%O#^_fSE5 zogz4YynR~_EoZql#61&CNhEkic2!?o1083mw^65q(m?|gD;;Y}xb~%tyb8uM1WME+5?D2v|~1zECp# zQhssrI-_yR;>`z1rnklW(>`~~&}=R~Jp6G1c(96s%pp6*@fqO1#`d6}nf9d1%Azk< zq-(8TelAy6Rb;uUv|=wXwn*zY>jN`-q;!8dq~!@@S;%Y9S%PvordQ3dLp7N?XH;|X zkI3O-sU@7Psv?fErUX4m@$S@>Mhb;`EO3~tuoN-BfAeSmE{KSdMyeUKV6u$bejdHV zjkAGDwD{?ND2dr$Jl*f5zKE?qd=PHn6Hrp;PII(F6s>f>X-i z(|gjdNg;c`cY|I1EY4ENw}lNHK8u$clR(77O6W{ir_i13YE z+9v%LjT^Ce{Wh1hWacZhyh&|F4_eIY3Q^;SciZQ~yK1z)HWMt;Bg}hUC9!kEPU-?s zZcaA4tNgU>)>}56UvL3VS_DzPH*1XV-{HlktLHrSRtT_BD9^h_E8E0ThVi~M7^yHo zk4Eb&o>Mr#NY7Z8Tq)QPb4!wc(vaDvPo|M>Ju5uF|1v)4RWN;C^ABol&`E;(y=&J+ zz+mFW8kWGCM4N&{I;l4Q15EjNxzLw=a=E`~87iMk)GENj|Gg=B-M2#|Kde*cMqy0! zqX;3s<#?R)c_0~Nzy?8Bb$+q{&$t8!?8fkR?~oqVXr6wPw_LT|v!9k541xo!4zG*2 zby?$mz*iwv3(f*+!vm&jy)#FTv>)p{RHuvffTWq}`n9A4Y_2)DO&^s{M#~$}Co`J4 zy&SNl=jpyspzCz;Wh}o|yvggW0jlH7;2CoqCEZf4pcEIV-ODF=DG054KJpmQUX1r` zy_iiHvS**h&MuQZyAC&cD)EPH`PJ~{Ak7#^b$Qw| zCZ&c2itl=_L%8(M>6*!(-F5+WQZi?o^`9Ujch9NWvpBf~U%MJ3zzVGJWBui|xp!tR zZ@&~><4!J+3bU2WQ*g?rOaBQdb8JF9p5!xD;A!kGbgxw6sNRe&R*C&<4?l)Ux%y%< zu3bDtIY*~p_|hBCm;i(wl%kRs7V*$ys9{0WMiE-DJyJMuV@I;JhBZXPakl9D%x^SW zhFas9P)Vp=oQFg>WND$Iq4a_ANTsYw^AgvYG!XKJgzlxB}tk1 zCeIx;wLolITlE*OD7GkKN+jkx@;w}$ex`84|4HSHv(Ic^kBYlW&W89e;(S<0q#RfI88vh(jnU5L*wYXkEIO!U zD<9G%1LjkwZrU-PA5nU+h2fvKS=xz1K4(_ZZ66P&kCUaXGji=R5(;}W`W;slV;rLKyo#t>Cu>`l z={EZ=NIqD72vW?g`E5cpOFM_pv(GKEcenPv``AN!2)`M8Er`vM<)AANWI33tSXvd+ z6VZSPxfpLB4xf}3Cf}`>{aDh{3R68tA|=F#X}YJ%G=!4J1*DVFWMnG}qck0_j-!OT zmPk~jdgdrBn(?yC7;cGql1sfP_Zdexwj8eOx!9##_TEgI9mVG94}*1+$9XrFn9JXr zH{X#vEx)6*=DCr><#m^W@^H%j$=RzPieI|Hc}w}jGmTNI+*htdweB)UzH^e4p*^0D ze&3#y^zEfW^`^6YiO16j?roX@R6RMVJ3iOXsB5>JZY*UUq7UiLToH& zba^%@gyvB*ceVZ%M+Nj~%lA4a3G9D+OtrgYRW(}1F1v446Q86y6V;1Ep{fFMUpv&2 z>NP+bI%hHM;`rlzByUEo+H&)~R%|+e0jgz?eeT@VY#xnA$#Ki^@=D75RkYlqv|;Pf zebDhREwhd++ApZDZIhYgjSrk$*M56E44#vlc;K*c?{$jG5Mvpmrh+{f*jFq4|fjb;oY6Q z(s!fjJ9~Mt@TDkz_KdYhLfsQ)>V=TR>rCx&7l(4z+6!zN55JY=^Qf4aBR69VYDr#Pwy(IQkEWNpPeDjO z+$%`ur4lZz-&+ar{O4$#Z72aiKVoAmc!>RIm{43XA-7jB{)Z-a(bNVZ#_!3(R>Y;x~GeB2f)oJr`Hb>llk)+2lxNpR@=euZH`I4{pVLdqf)6>yG^? z-56IplFo7i6VLXLiTu_$?TV;i}2ZqT9IXU7T)Ztx^6T+3<@x7XSBTwkm(6zGkKW|Qso*X}Z z#Gd$?TUJ&awYA^W|40F54@-{GyPuu|uvbp@kpTkX@8^e3&&|r3p1}KZ#!{AePc8?R z08j$#xu8$)8yg#UxdCq~;BN7PIwMX_FM%Z|c;}PX|A{+Ao2dtGdvc0AqMAyL?X(6Y z*CbBB-F5$J@QJ=lHDxsT6!I_F3PJz>230uu?*I5juki^dp0xyeH8Gl~r-g(qU$RHSF_d8&;bC(i(q&u0Gca%S<^6T4&Yt9SH z{`+&V**kgsk!n&^eS0md;qvvOM|&oW*d^`qH!nJEBiuleY!?yYIWOk8AXk_&`&f5-MdDV*3mCw8187FG%gq{x(KOv7Muvf zYVhqU-a}OyI1c%WtDTd4Ha0DMo%udgKF0zBzv>@s~oj;@=3hz!Ko7pqz*9pG0RW5{~Pn zr_o1qq+N^g7yTm%o%dHVBFgj1xg}OaR)5wPh`frBTA#<(hi0{O)vPa+YL&WOs*l-# zUO5|C!>Za}xDSB zwPdYzWF>{pN3qOn73h~t&!I``qx3ZrAAMme{`{tS<2b}CY24>N zPf6}RzVzGKVz>St2 z-7hO;e*c=Ps%l9|37be(Rh7i6JO6!$EzsFIqV0~)taJBcKcpwASw2$whEig~4tqZ$h#TPZwF8M3HKOAQ_| zo6Xu;wc<1@`l^t=A`h^I)9s5pk6LA8v(o~EuL`g?3f%(kDtm6xb=uQET65ty1^kzo z-W5hE3CSSU3U4aUqg8XRDX;ojWVCtDW*D#fp)&NfNm~SC!dyzta*=vYdM0?4IZdHF z4}@T|Zy!HWc*rHR=53#CP-C*Cw;IHD2*?Z4ifEsTQ@Fs?JfJSjD=M>sfnH-3JQeVy t?e`rmyx~8|bdTO{IbydNq8xX8-QzlI_Qy#QpgB@esVP5F!YV#~^[1](#footnote1), Microsoft Listings[1](#footnote1), Microsoft Connections[1](#footnote1), Microsoft Invoicing[1](#footnote1)) - -**Enterprise-grade device management and security capabilities** -* App protection for Office mobile apps -* Device management for Windows 10 PCs -* Consistent security configuration across devices -* Protection of company data across devices -* Windows Defender, always-on and up-to-date - -**Simplified device deployment and user setup** -* Single admin console to setup and manage users and devices -* Auto-installation of Office apps on Windows 10 PCs -* Always up-to-date Office + Windows 10 -* Streamlined deployment of PCs with Windows AutoPilot - -### Who should consider adopting Microsoft 365 Business? -Microsoft 365 Business was built for small and medium-sized customers that have little to no IT resources on staff and want best-in-class productivity and collaboration capabilities of Office 365 together with device management and security solutions that safeguard business data. The Microsoft 365 Business customer is ready to move their IT operations to the cloud and is interested in maintaining a proactive stance to help protect data on both company and employee-owned devices. - -### How can I get Microsoft 365 Business for my business? -Microsoft 365 Business may be purchased through a Microsoft Partner or directly from Microsoft. In choosing whether to purchase directly from Microsoft or via a Microsoft Partner, you should consider your on-staff capability and desire to maintain an IT infrastructure. A Microsoft Partner can help you deploy and manage your IT infrastructure including Microsoft solutions. - -### How much does Microsoft 365 Business cost? -Microsoft 365 Business is offered at USD$20.00 user/month based on an _annual contract_ if purchased directly from Microsoft. When purchased through a Microsoft Partner, pricing can vary based on the services the partner provides and their pricing model for Microsoft 365 Business. There are no planned pricing discounts for government, education or non-profit organizations. - -### Is there a cap to how many Microsoft 365 Business seats a customer can have? -Microsoft 365 Business was designed for small to medium sized businesses with low to medium IT complexity requirements. Customers may purchase up to 300 Microsoft 365 Business licenses for their organization. Customers can mix and match cloud subscriptions; as a result, depending on their organization’s IT requirements, customers may add Microsoft 365 Enterprise licenses to the same account. - -When considering an environment consisting of multiple subscription types, customers should work with their trusted IT advisors to determine how best to manage and secure the various subscriptions as Microsoft 365 Business and Microsoft 365 Enterprise use different capabilities to secure and manage applications and data. - -### Can I combine Microsoft 365 Business with other Microsoft subscription offerings? -Yes, customers can combine their Microsoft 365 Business subscriptions with plans and add-ons from Azure, Dynamics 365, Enterprise Mobility + Security, and Office 365. - -### Is everyone in my business required to have a Microsoft 365 Business subscription? -No, not everyone needs a Microsoft 365 Business subscription, although the security and management benefits are available only to those users with devices managed with a Microsoft 365 Business subscription. - -Standardizing an IT environment serves to help reduce maintenance and security costs over time and is a state that businesses should strive to attain. However, we recognize that some small and medium size customers update their software primarily when they upgrade their hardware, over an extended period. Businesses can deploy Microsoft 365 Business to part of their organization, but for best protection of sensitive business data and consistent collaboration experiences, deployment to all users is recommended. - -### How can I know if the hardware and software I run today is compatible with Microsoft 365 Business? -If the hardware you run today runs Windows 7 Pro or later, it likely meets the minimum requirements for Microsoft 365 Business. Certain Windows 10 features such as Cortana, Windows Hello and multitouch require specific hardware that is only available on newer PCs. See the Windows 10 Pro system requirements for additional details. - -Existing desktop (Win32) application compatibility is strong in Windows 10, with most existing applications working without any changes. Customers and their trusted IT advisors should read the recommended application testing process for Windows 10 compatibility and review the Office system requirements to ensure a smooth transition to Microsoft 365 Business. - -### What is Windows 10 Business? -Windows 10 Business is a set of cloud-services and device management capabilities that complement Windows 10 Pro and enable the centralized management and security controls of Microsoft 365 Business. Windows 10 Business also comes with Windows AutoPilot, a service that streamlines the deployment of new Windows 10 PCs. If you have devices that are licensed for Windows 7, 8 and 8.1 Professional, Microsoft 365 Business provides an upgrade to Windows 10 Pro which is the prerequisite for deploying Windows 10 Business. - -### How does Microsoft 365 Business help support our Bring Your Own Device (BYOD) policy? -Many employees prefer to use their own mobile phones or tablets to access personal and work information rather than carrying multiple devices for each purpose. The use of personal devices for work, while commonplace, increases the risk that business information could end up in the wrong hands. Many competing mobile data protection solutions require users to switch to a specific mode on their device or use another complex mechanism that users may find intrusive and therefore avoid using. - -Microsoft 365 Business offers customers a simple but powerful means of enabling employees to use their personal devices for work while providing the business with the ability to prevent those devices from accessing, retaining and/or sharing business information. More specifically: -* **App Protection for Office mobile apps** helps protect Office data, including email, calendar, contacts, and documents on iOS and Android mobile devices, by enforcing policies such as automatically deleting business data after a prescribed amount of time of not connecting to the service, requiring that information is stored only to OneDrive for Business, requiring a PIN/fingerprint verification to access Office apps, and preventing company data from being copied from an Office app into personal apps. -* **Device Management for Windows 10 PCs** allows businesses to choose to set and enforce capabilities such as Windows Defender protection for malware, automatic updates, and turning off screens after a prescribed amount of time. In addition, lost or stolen Windows 10 devices can be completely wiped of business applications and data through the Admin center. - -### How does Microsoft 365 Business help protect PCs in my organization from malicious attacks? -PCs managed with Microsoft 365 Business are protected with Windows Defender, which is the No. 1 antivirus feature on Windows 10, protecting more computers against viruses, malware, spyware, and other threats than any other solution. With Microsoft 365 Business, businesses can ensure Windows Defender protection is running and always up to date on all their Windows 10 devices - -### What's the difference between Office 365 Business Premium, Microsoft 365 Business and Microsoft 365 Enterprise? -Microsoft has a variety of productivity and security management offerings that small to medium-sized customers may consider when upgrading their desktop and device infrastructure, each bringing increasingly powerful features and functionality. - -**Office 365 Business Premium** delivers best-in-class productivity with Office 365 apps and services but does not include the application protection and device management capabilities of Microsoft 365 Business. - -**Microsoft 365 Business** combines Office 365 apps and services with mobile application management and Windows 10 Pro to enable remote management and help protect devices against viruses and malware. It includes a simplified management console through which device and data policies may be administered. Many small to medium-sized businesses can be best served with Microsoft 365 Business, although those in highly regulated industries may require more advanced functionality provided by Microsoft 365 Enterprise plans (E3 and E5). - -**Microsoft 365 Enterprise** is a set of licensing plans that offer increased levels of mobility and security management over Microsoft 365 Business and are designed for enterprise customers and those customers that are required or regulated to provide the highest level of protection for their data. In addition, Microsoft 365 Business plans provide additional functionality including business intelligence and analytics tools. - -### Can I switch my Office 365 plan to Microsoft 365 Business? -Yes, customers may switch their plans from a qualifying Office 365 plan to Microsoft 365 Business. Depending on the customer’s current plan there may be a decrease or increase in monthly charges. - -### In what regions is Microsoft 365 Business available? -The Microsoft 365 Business will be available to all partners and customers where Office 365 is available. See the list of Office 365 international availability for languages, countries and regions. - -### Is there a Microsoft 365 Business trial I may use to evaluate the offer? -A Microsoft 365 Business trial will be available later this year both for direct customers and for CSPs. - -### What should customers and partners know before running Microsoft 365 Business within their organization? -Customers that wish to experience the complete capabilities of Microsoft 365 Business must be running Windows 7, 8.1 or 10 Pro[2](#footnote2) on their existing desktops. Customers who use on-premises Active Directory to enable login to PCs will switch devices over cloud identity and management as part of their deployment. Existing Windows 10 Pro PCs should be running Creators Update if they have not already done so. - -## Deployment - -### What should customers consider when planning a Microsoft 365 Business deployment? -The most direct path to a successful Microsoft 365 Business deployment is to engage with a Microsoft Partner. They have extensive training and experience with a wide variety of customer scenarios and are best equipped to understand your environment and needs. Customers that have experienced IT on staff can use the Microsoft 365 Business Getting Started to assist them in their Microsoft 365 Business deployment. - -### Does Microsoft 365 Business include the full capabilities of Microsoft Intune? -Microsoft 365 Business includes a robust set of mobile app management capabilities powered by Microsoft’s MDM solution (Microsoft Intune). These are a subset of features, specifically chosen to meet the needs of SMBs and organized to be easily managed via a simplified administration experience. If a company requires the full capabilities of Intune, they can purchase a qualifying plan separately. - -### Does Azure Active Directory P1 come with Microsoft 365 Business? -Microsoft 365 Business is built on technology from across Microsoft and while it shares some features with Azure Active Directory, it is not a full version. The security and management policies created in Microsoft 365 Business rely on some Azure functionality but does not include all features (e.g. selfservice features, conditional access features, and reporting). Customers may choose to purchase Azure Active Directory Premium as an add-on to Microsoft 365 Business. - -### Does Microsoft 365 Business allow customers to manage Macs? -The security and management capabilities of Microsoft 365 Business pertain to iOS and Android mobile and tablet devices, and Windows PCs. - -### What is Windows AutoPilot? -Windows AutoPilot is a service that streamlines the deployment of new Windows 10 PCs. This process can be done when the end-user logs on to Microsoft 365 Business for the first time—without IT ever touching the device—by leveraging centralized management controls of Microsoft 365 Business. You can also use Windows AutoPilot for existing PCs that are running Windows 10 Professional Creators Update (or later) and have been factory reset. Details about Windows AutoPilot can be found in this June blog post. - -## Compatibility - -### Can I add Office 365 add-ons to Microsoft 365 Business? -All the add-ons that can be added to Office 365 Business Premium can be added to Microsoft 365 Business. This means that you can purchase Advanced Threat Protection, Office 365 Cloud App Security, Advanced Compliance, Threat Intelligence, MyAnalytics, PowerBI Pro, and Audio Conferencing. - -### Can I add Phone System and Calling Plans to Microsoft 365 Business? -No, Phone System and Calling Plan are reserved for customers who have more advanced needs. Customers who require these capabilities should look at Microsoft 365 Enterprise offerings. - -### Can Microsoft 365 Business customers use Windows Defender Advanced Threat Protection? -No, customers that require Windows Defender Advanced Threat Protection need either Windows 10 Enterprise E5 or Microsoft 365 Enterprise E5. - -### Can I use Windows Information Protection with Microsoft 365 Business? -Yes, Windows Information Protection (WIP) is a feature of Windows 10 Pro and helps businesses prevent accidental leaks by restricting user and app access to business files based on policies you define. Your business data is protected no matter where it lives on your devices—without affecting your user experience. Microsoft 365 Business includes controls to ensure Windows Information Protection is properly configured and automatically deployed to end-user devices. - -### Can customers use Microsoft 365 Business with on-premises Active Directory? -To realize the full value of Windows 10, Windows 10 PCs need to be joined to Azure Active Directory. You may use Microsoft 365 Business with Windows 10 devices joined to on-premises Active Directory but it is not recommended because you won’t be able to enforce policies from the Microsoft 365 Business Admin console. - -### Can customers create hosted Windows 10 VMs with a Microsoft 365 Business subscription? -No, customers that require virtualization should purchase Windows 10 Enterprise or a Microsoft 365 Enterprise subscription. - -## Partner opportunity - -### Where can I learn more about the opportunities and benefits in becoming a Microsoft Partner? -IT service providers that are not already Microsoft partners can learn more about the Microsoft Cloud Solution Provider program at -[https://partners.office.com/microsoft365business](https://partners.office.com/microsoft365business). - -### Where can I learn how to sell Microsoft 365 Business? -Partners now selling Office 365 can use the same consultative selling methods to sell Microsoft 365 Business. In addition, we are introducing more resources and training for your sales team to understand the customers’ existing desktop environment, Active Directory reliance, mobility and security needs to effectively communicate the full value of Microsoft 365 Business in a way that is relevant to the customer. Find these resources on the Office Partner portal at [http://partners.office.com/microsoft365business](http://partners.office.com/microsoft365business). - -### How can Microsoft 365 Business help partners increase the profitability? -Microsoft 365 Business will help partners reduce costs through greater operational efficiencies and enhance revenue through the sale of additional services. The Forrester Research, Microsoft 365 Business Total Economic Impact (TEI) Study, June 2017 (https://partners.office.com/TEIBusiness), demonstrates that Microsoft 365 Business will have positive impact on partner profitability. - -In the TEI study partners reported that with Microsoft 365 Business they expect: - -- 20%-point increase in \[one-time\] deployment and advisory services revenue -- 10%-point increase in attach rate of managed services -- 8%-point increase in consulting and \[ongoing\] managed services profit margins (from lower costs) - -### What resources are available to partners to sell, deploy and support Microsoft 365 Business? -Microsoft provides a wide selection of resources for CSP partners to market, sell, and support Microsoft 365 Business. They can be found at -[https://partners.office.com/microsoft365business](https://partners.office.com/microsoft365business). - -### What up-sell opportunities does Microsoft 365 Business give partners? -Microsoft 365 Business allows partners to maintain their trusted advisor position with customers, by creating a solid and secure platform upon which to sell additional services and to upgrade existing products and services. Microsoft 365 Business provides an opportunity to have an upgrade discussion with customers now using Exchange Server, Exchange Online or Office 365 Business Essentials. Partners may also gain additional revenue from increased managed services and/or peruser support fees. - -With the new Windows AutoPilot feature included in Microsoft 365 Business, partners who have been reluctant to sell new Windows devices due to deployment logistics and costs will find this opportunity much more attractive. Customers who are confident in the security of their on-premise and mobile devices are also more likely to invest in additional services, such as Dynamics 365. - -### Should partners sell Microsoft 365 Business over other plans from Microsoft? -A Microsoft Cloud Solution Provider should always sell the plan that best suits its customer business needs and budget. For example, if a customer must comply with privacy and security regulations, a CSP may sell Microsoft 365 Business plus any add-ons that help the customer meet its requirements or may suggest the advanced security and management provided by Microsoft 365 Business E SKUs. - -### Some of my customers have devices that are not genuine; will Microsoft 365 Business make these devices genuine? -Microsoft 365 Business does not make an otherwise non-genuine version of Windows, genuine. Microsoft 365 Business does provide an upgrade benefit allowing those customers running genuine Windows 7, 8 or 8.1 Pro to upgrade to the most recent, genuine version of Windows 10 Pro. - -### What support is available to CSP partners for the Microsoft 365 Business Preview? -The same support channels available to CSP partners today (premier support and advanced support program) have been trained on Microsoft 365 Business and are ready to provide partners with support. - -### What is the GDPR and how does Microsoft 365 Business help customers with their compliance obligations? -The General Data Protection Regulation (GDPR) is a comprehensive new privacy law that gives residents of the European Union (EU) greater control over their “personal data” and requires organizations to maintain the integrity of that personal data. The GDPR requires organizations that control, or process personal data tied to EU residents to only use third-party data processors that meet the GDPR’s requirements for personal data processing. In March 2017, Microsoft made available contractual guarantees that provide these assurances. Customers that have questions about how Microsoft can help them meet their additional GDPR obligations should learn about the advanced compliance and security capabilities available as add-ons (e.g. Azure Information Protection) and in other Suites (e.g. Microsoft 365 Enterprise E5). To learn more, visit [www.microsoft.com/gdpr](https://www.microsoft.com/gdpr). - - - - -## Footnotes -**1** Available in US, UK, and Canada.
          -**2** Devices running Windows 7 or 8.1 Pro are eligible for an upgrade to Windows 10 Pro within the Microsoft 365 Business preview. - - - - diff --git a/bcs/support/transition-csp-subscription.md b/bcs/support/transition-csp-subscription.md deleted file mode 100644 index 7c15aa33b6..0000000000 --- a/bcs/support/transition-csp-subscription.md +++ /dev/null @@ -1,103 +0,0 @@ ---- -title: Transition a Microsoft 365 Business CSP subscription  -description: Find out how you can transition a Microsoft 365 Business CSP subscription from preview to GA.  -author: CelesteDG  -ms.author: celested  -ms.topic: article  -ms.prod: microsoft-365-business -ms.localizationpriority: high -audience: microsoft-business  -keywords: Microsoft 365 Business, Microsoft 365, SMB, transition CSP subscription -ms.date: 11/01/2017 ---- - -# Transition a Microsoft 365 Business CSP subscription - -If you have a Microsoft 365 Business Preview CSP subscription, follow this guide to find out how you can transition your existing preview subscription to Microsoft 365 Business GA (general availability). - -**How to transition a preview subscription to GA** - -1. Log in to Partner Center. -2. From the dashboard, select **Customers**, and then find and select the company name. - - The subscriptions for the company will be listed. - - ![Customer's subscriptions in Partner Center](images/pc_customer_subscriptions_1.png) - -3. In the company's **Subscriptions** page, select **Add subscription**. -4. In the **New subscription** page, select **Small business** and then select **Microsoft 365 Business** from the list. -5. Add the number of licenses and then select **Next: Review** to review the subscription and then select **Submit**. - - ![Review the new subscription to Microsoft 365 Business](images/pc_customer_reviewnewsubscription.png) - - The **License-based subscriptions** will show **Microsoft 365 Business Preview** and **Microsoft 365 Business**. You'll need to suspend the Preview subscription next. - -6. Select **Microsoft 365 Business Preview**. -7. In the **Microsoft 365 Business Preview** page, select **Suspended** to suspend the Preview subscription. - - ![Suspend the Microsoft 365 Business Preview subscription](images/pc_customer_m365bpreview_suspend.png) - -8. Select **Submit** to confirm. - - In the **Subscriptions** page, confirm that the **Microsoft 365 Business Preview** status shows **Suspended**. - - ![Confirm the Preview subscription status is suspended](images/pc_customer_m365bpreview_suspend_confirm.png) - -9. Optionally, you can also validate the license agreement. To do this, follow these steps: - 1. Select **Users and licenses** from the company's **Subscriptions** page. - 2. From the **Users and licenses** page, select a user. - 3. In the user's page, check the **Assign licenses** section and confirm that it shows **Microsoft 365 Business**. - - ![Confirm the Microsoft 365 Business license is assigned to the user](images/pc_customer_userslicenses_m365b_validate.png) - -## Impact to customers and users during and after transition - -There is no impact to customers and users during transition and post transition. - -## Impact to customers who don't transition - -The following table summarizes the impact to customers who don't transition from a Microsoft 365 Business Preview subscription to a Microsoft 365 Business subscription. - -| | T-0 to T+30 | T+30 to T+60 | T+60 to T+120 | Beyond T+120 | -|-------|-----------------|--------------|---------------|---------------| -| **State** | In grace period | Expired | Disabled | Deprovisioned | -| **Service impacts** | -| **Microsoft 365 Business admin portal** | No impact to functionality | No impact to functionality | Can add/delete users, purchase subscriptions.
          Cannot assign/revoke licenses. | Customer's subscription and all data is deleted. Admin can manage other paid subscriptions. | -| **Office apps** | No end user impact | No end user impact | Office enters reduced functionality mode.
          Users can view files only. | Office enters reduced functionality mode.
          Users can view files only. | -| **Cloud services (SharePoint Online, Exchange Online, Skype, Teams, and more)** | No end user impact | No end user impact | End users and admins have no access to data in the cloud. | Customer's subscription and all data are deleted. | -| **EM+S components** | No admin impact
          No end user impact | No admin impact
          No end user impact | Capability will cease to be enforced.
          See [Mobile device impacts upon subscription expiration](#mobile-device-impacts-upon-subscription-expiration) and [Windows 10 PC impacts upon subscription expiration](#windows-10-pc-impacts-upon-subscription-expiration) for more info. | Capability will cease to be enforced.
          See [Mobile device impacts upon subscription expiration](#mobile-device-impacts-upon-subscription-expiration) and [Windows 10 PC impacts upon subscription expiration](#windows-10-pc-impacts-upon-subscription-expiration) for more info. | -| **Windows 10 Business** | No admin impact
          No end user impact | No admin impact
          No end user impact | Capability will cease to be enforced.
          See [Mobile device impacts upon subscription expiration](#mobile-device-impacts-upon-subscription-expiration) and [Windows 10 PC impacts upon subscription expiration](#windows-10-pc-impacts-upon-subscription-expiration) for more info. | Capability will cease to be enforced.
          See [Mobile device impacts upon subscription expiration](#mobile-device-impacts-upon-subscription-expiration) and [Windows 10 PC impacts upon subscription expiration](#windows-10-pc-impacts-upon-subscription-expiration) for more info. | -| **Azure AD login to a Windows 10 PC** | No admin impact
          No end user impact | No admin impact
          No end user impact | No admin impact
          No end user impact | Once the tenant is deleted, a user can log in with local credentials only. Re-image the device if there are no local credentials. | - -## Mobile device impacts upon subscription expiration - -The followint table summarizes the impact to the app management policies on mobile devices. - -| | Fully licensed experience | T+60 days post expiration | -|----------------------------|------------------------------------------------|------------------------------------| -| **Delete work files from an inactive device** | Work files are removed after selected days | Work files remain on the user's personal devices | -| **Force users to save all work files to OneDrive for Business** | Work files can only be saved to OneDrive for Business | Work files can be saved anywhere | -| **Encrypt work files** | Work files are encrypted | Work files are no longer encrypted.
          Security policies are removed and Office data on apps is removed. | -| **Require PIN or fingerprint to access Office apps** | Restricted access to apps | No app-level access restriction | -| **Reset PIN when login fails** | Restricted access to apps | No app-level access restriction | -| **Require users to sign in again after Office apps have been idle** | Sign-in required | No sign-in required to access apps | -| **Deny access to work files on jailbroken or rooted devices** | Work files cannot be accessed on jailbroken/rooted devices | Work files can be accessed on jailbroken/rooted devices | -| **Allow users to copy content from Office apps to Personal apps** | Copy/paste restricted to apps available as part of Microsoft 365 Business subscription | Copy/paste available to all apps | - -## Windows 10 PC impacts upon subscription expiration - -The following table summarizes the impact to the Windows 10 device configuration policies. - -| | Fully licensed experience | T+60 days post expiration | -|----------------------------|------------------------------------------------|------------------------------------| -| **Help protect PCs from threats using Windows Defender** | Turn on/off is outside of user control | User may turn on/off Windows Defender on the Windows 10 PC | -| **Help protect PCs from web-based threats in Microsoft Edge** | PC protection in Microsoft Edge | User may turn on/off PC protection in Microsoft Edge | -| **Turn off device screen when idle** | Admin defines screen timeout interval policy | Screen timeout can be configured by end user | -| **Allow users to download apps from Microsoft Store** | Admin defines if a user can download apps from Microsoft Store | User can download apps from Microsoft Store anytime | -| **Allow users to access Cortana** | Admin defines policy on user access to Cortana | User devices to turn on/off Cortana | -| **Allow users to receive tips and advertisements from Microsoft** | Admin defines policy on user receive tips and advertisements from Microsoft | User may turn on/off tips and advertisements from Microsoft | -| **Allow users to copy content from Office apps into personal apps** | Admin defines policy to keep Windows 10 devices up-to-date | Users can decide when to update Windows | - - - - diff --git a/microsoft-365/TOC.md b/microsoft-365/TOC.md deleted file mode 100644 index 06913f7aef..0000000000 --- a/microsoft-365/TOC.md +++ /dev/null @@ -1 +0,0 @@ -# [Index](index.md) \ No newline at end of file diff --git a/microsoft-365/images/M365-education.svg b/microsoft-365/images/M365-education.svg deleted file mode 100644 index 7f83629296..0000000000 --- a/microsoft-365/images/M365-education.svg +++ /dev/null @@ -1,171 +0,0 @@ - - - - - M365-education - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - diff --git a/microsoft-365/index.md b/microsoft-365/index.md deleted file mode 100644 index 9249c650ec..0000000000 --- a/microsoft-365/index.md +++ /dev/null @@ -1,90 +0,0 @@ ---- -layout: HubPage -hide_bc: true -author: CelesteDG -ms.author: celested -ms.topic: hub-page -keywords: Microsoft 365, Microsoft 365 documentation, Microsoft 365 for business, Microsoft 365 for enterprise, Microsoft 365 for education, enterprise, business, education, docs, documentation -title: Microsoft 365 Documentation -description: Find documentation and resources for Microsoft 365--a complete, intelligent solution, including Office 365, Windows 10, and Enterprise Mobility + Security, that empowers everyone to be creative and work together, securely. -ms.date: 09/25/2017 ---- -

          \ No newline at end of file From a49ba96f14336222ec24366afea87b03f71827f0 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 30 Jan 2018 17:31:28 +0000 Subject: [PATCH 57/91] Remove bcs-VSTS in .openpublishing.publish.config.json under master branch. --- .openpublishing.publish.config.json | 17 ----------------- 1 file changed, 17 deletions(-) diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 430506237d..7215ed2787 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -1,23 +1,6 @@ { "build_entry_point": "", "docsets_to_publish": [ - { - "docset_name": "bcs-VSTS", - "build_source_folder": "bcs", - "build_output_subfolder": "bcs-VSTS", - "locale": "en-us", - "monikers": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "moniker_groups": [], - "version": 0 - }, { "docset_name": "education-VSTS", "build_source_folder": "education", From 18c7fcd5a8aa2ded1caea2948e68b7f2f669afc1 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Tue, 30 Jan 2018 09:46:22 -0800 Subject: [PATCH 58/91] removing old files --- bcs/docfx.json | 47 ----------------------------------------------- 1 file changed, 47 deletions(-) delete mode 100644 bcs/docfx.json diff --git a/bcs/docfx.json b/bcs/docfx.json deleted file mode 100644 index aa19bbfd9b..0000000000 --- a/bcs/docfx.json +++ /dev/null @@ -1,47 +0,0 @@ -{ - "build": { - "content": [ - { - "files": [ - "**/*.md", - "**/**.yml" - ], - "exclude": [ - "**/obj/**", - "**/includes/**", - "README.md", - "LICENSE", - "LICENSE-CODE", - "ThirdPartyNotices" - ] - } - ], - "resource": [ - { - "files": [ - "**/*.png", - "**/*.svg", - "**/*.jpg", - "**/*.json" - ], - "exclude": [ - "**/obj/**", - "**/includes/**" - ] - } - ], - "overwrite": [], - "externalReference": [], - "globalMetadata": { - "breadcrumb_path": "/microsoft-365-business/breadcrumb/toc.json", - "_op_documentIdPathDepotMapping": { - "./": { - "depot_name": "TechNet.bcs" - } - } - }, - "fileMetadata": {}, - "template": [], - "dest": "bcs" - } -} \ No newline at end of file From 6b69ab689cd55ce95f2f8a894c9992c1121c0b0b Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 30 Jan 2018 10:10:42 -0800 Subject: [PATCH 59/91] comment out azure intune --- ...dpoints-mdm-windows-defender-advanced-threat-protection.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index ad0296fcc4..79c6f6ae48 100644 --- a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -117,7 +117,7 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V >[!TIP] > After onboarding the endpoint, you can choose to run a detection test to verify that an endpoint is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). - + ### Offboard and monitor endpoints For security reasons, the package used to offboard endpoints will expire 30 days after the date it was downloaded. Expired offboarding packages sent to an endpoint will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name. From 9c5f29dd739a0dc28d4e56c4af578347a0b55d51 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Tue, 30 Jan 2018 10:37:10 -0800 Subject: [PATCH 60/91] remove azure intune section --- ...ows-defender-advanced-threat-protection.md | 62 ------------------- 1 file changed, 62 deletions(-) diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index 79c6f6ae48..78c2d9f2be 100644 --- a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -117,70 +117,8 @@ Configuration for onboarded machines: telemetry reporting frequency | ./Device/V >[!TIP] > After onboarding the endpoint, you can choose to run a detection test to verify that an endpoint is properly onboarded to the service. For more information, see [Run a detection test on a newly onboarded Windows Defender ATP endpoint](run-detection-test-windows-defender-advanced-threat-protection.md). - ### Offboard and monitor endpoints For security reasons, the package used to offboard endpoints will expire 30 days after the date it was downloaded. Expired offboarding packages sent to an endpoint will be rejected. When downloading an offboarding package you will be notified of the packages expiry date and it will also be included in the package name. From 2d2709379647cf5b6c746ae92a7117323f1f08ec Mon Sep 17 00:00:00 2001 From: Nicholas Brower Date: Tue, 30 Jan 2018 18:45:02 +0000 Subject: [PATCH 61/91] Merged PR 5589: changing policy tags used by automation to reduce footprint --- .../mdm/policy-csp-abovelock.md | 18 +- ...csp-accountpoliciesaccountlockoutpolicy.md | 18 +- .../mdm/policy-csp-accounts.md | 22 +- .../mdm/policy-csp-activexcontrols.md | 10 +- .../mdm/policy-csp-applicationdefaults.md | 10 +- .../mdm/policy-csp-applicationmanagement.md | 50 +- .../mdm/policy-csp-appvirtualization.md | 118 +-- .../mdm/policy-csp-attachmentmanager.md | 18 +- .../mdm/policy-csp-authentication.md | 26 +- .../mdm/policy-csp-autoplay.md | 18 +- .../mdm/policy-csp-bitlocker.md | 10 +- .../mdm/policy-csp-bluetooth.md | 26 +- .../mdm/policy-csp-browser.md | 158 +-- .../mdm/policy-csp-camera.md | 10 +- .../mdm/policy-csp-cellular.md | 26 +- .../mdm/policy-csp-connectivity.md | 62 +- .../mdm/policy-csp-controlpolicyconflict.md | 10 +- .../mdm/policy-csp-credentialproviders.md | 18 +- .../mdm/policy-csp-credentialsui.md | 14 +- .../mdm/policy-csp-cryptography.md | 14 +- .../mdm/policy-csp-dataprotection.md | 14 +- .../mdm/policy-csp-datausage.md | 14 +- .../mdm/policy-csp-defender.md | 146 +-- .../mdm/policy-csp-deliveryoptimization.md | 102 +- .../mdm/policy-csp-desktop.md | 10 +- .../mdm/policy-csp-deviceguard.md | 18 +- .../mdm/policy-csp-deviceinstallation.md | 14 +- .../mdm/policy-csp-devicelock.md | 74 +- .../mdm/policy-csp-display.md | 14 +- .../mdm/policy-csp-education.md | 18 +- .../mdm/policy-csp-enterprisecloudprint.md | 30 +- .../mdm/policy-csp-errorreporting.md | 26 +- .../mdm/policy-csp-eventlogservice.md | 22 +- .../mdm/policy-csp-experience.md | 90 +- .../mdm/policy-csp-exploitguard.md | 10 +- .../client-management/mdm/policy-csp-games.md | 10 +- .../mdm/policy-csp-handwriting.md | 10 +- .../mdm/policy-csp-internetexplorer.md | 978 +++++++++--------- .../mdm/policy-csp-kerberos.md | 26 +- .../mdm/policy-csp-kioskbrowser.md | 30 +- .../mdm/policy-csp-licensing.md | 14 +- ...policy-csp-localpoliciessecurityoptions.md | 226 ++-- .../mdm/policy-csp-location.md | 10 +- .../mdm/policy-csp-lockdown.md | 10 +- .../client-management/mdm/policy-csp-maps.md | 14 +- .../mdm/policy-csp-messaging.md | 18 +- .../mdm/policy-csp-networkisolation.md | 38 +- .../mdm/policy-csp-notifications.md | 10 +- .../client-management/mdm/policy-csp-power.md | 42 +- .../mdm/policy-csp-printers.md | 18 +- .../mdm/policy-csp-privacy.md | 314 +++--- .../mdm/policy-csp-remoteassistance.md | 22 +- .../mdm/policy-csp-remotedesktopservices.md | 30 +- .../mdm/policy-csp-remotemanagement.md | 66 +- .../mdm/policy-csp-remoteprocedurecall.md | 14 +- .../mdm/policy-csp-remoteshell.md | 34 +- .../mdm/policy-csp-search.md | 62 +- .../mdm/policy-csp-security.md | 50 +- .../mdm/policy-csp-settings.md | 62 +- .../mdm/policy-csp-smartscreen.md | 18 +- .../mdm/policy-csp-speech.md | 10 +- .../client-management/mdm/policy-csp-start.md | 122 +-- .../mdm/policy-csp-storage.md | 14 +- .../mdm/policy-csp-system.md | 66 +- .../mdm/policy-csp-systemservices.md | 30 +- .../mdm/policy-csp-taskscheduler.md | 10 +- .../mdm/policy-csp-textinput.md | 62 +- .../mdm/policy-csp-timelanguagesettings.md | 10 +- .../mdm/policy-csp-update.md | 198 ++-- .../mdm/policy-csp-userrights.md | 122 +-- .../client-management/mdm/policy-csp-wifi.md | 34 +- ...olicy-csp-windowsdefendersecuritycenter.md | 82 +- .../mdm/policy-csp-windowsinkworkspace.md | 14 +- .../mdm/policy-csp-windowslogon.md | 18 +- .../mdm/policy-csp-wirelessdisplay.md | 38 +- 75 files changed, 2107 insertions(+), 2107 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-abovelock.md b/windows/client-management/mdm/policy-csp-abovelock.md index 09bab6143a..bdcbc5f8c4 100644 --- a/windows/client-management/mdm/policy-csp-abovelock.md +++ b/windows/client-management/mdm/policy-csp-abovelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - AboveLock @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## AboveLock policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **AboveLock/AllowActionCenterNotifications** @@ -84,11 +84,11 @@ The following list shows the supported values: - 1 (default) - Allowed. - +
          - + **AboveLock/AllowCortanaAboveLock** @@ -134,11 +134,11 @@ The following list shows the supported values: - 1 (default) - Allowed. - +
          - + **AboveLock/AllowToasts** @@ -186,7 +186,7 @@ The following list shows the supported values: - 1 (default) - Allowed. - +
          Footnote: @@ -195,5 +195,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md index e74c715473..2d0549e77b 100644 --- a/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md +++ b/windows/client-management/mdm/policy-csp-accountpoliciesaccountlockoutpolicy.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - AccountPoliciesAccountLockoutPolicy @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## AccountPoliciesAccountLockoutPolicy policies
          @@ -35,7 +35,7 @@ ms.date: 01/29/2018
          - + **AccountPoliciesAccountLockoutPolicy/AccountLockoutDuration** @@ -78,11 +78,11 @@ If an account lockout threshold is defined, the account lockout duration must be Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - +
          - + **AccountPoliciesAccountLockoutPolicy/AccountLockoutThreshold** @@ -125,11 +125,11 @@ Failed password attempts against workstations or member servers that have been l Default: 0. - +
          - + **AccountPoliciesAccountLockoutPolicy/ResetAccountLockoutCounterAfter** @@ -172,7 +172,7 @@ If an account lockout threshold is defined, this reset time must be less than or Default: None, because this policy setting only has meaning when an Account lockout threshold is specified. - +
          Footnote: @@ -181,5 +181,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-accounts.md b/windows/client-management/mdm/policy-csp-accounts.md index 14b5d262f0..0fb29f4870 100644 --- a/windows/client-management/mdm/policy-csp-accounts.md +++ b/windows/client-management/mdm/policy-csp-accounts.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Accounts @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Accounts policies
          @@ -36,7 +36,7 @@ ms.date: 01/29/2018
          - + **Accounts/AllowAddingNonMicrosoftAccountsManually** @@ -87,11 +87,11 @@ The following list shows the supported values: - 1 (default) - Allowed. - +
          - + **Accounts/AllowMicrosoftAccountConnection** @@ -139,11 +139,11 @@ The following list shows the supported values: - 1 (default) - Allowed. - +
          - + **Accounts/AllowMicrosoftAccountSignInAssistant** @@ -189,11 +189,11 @@ The following list shows the supported values: - 1 (default) - Manual start. - +
          - + **Accounts/DomainNamesForEmailSync** @@ -236,7 +236,7 @@ The data type is a string. The default value is an empty string, which allows all email accounts on the device to sync email. Otherwise, the string should contain a pipe-separated list of domains that are allowed to sync email on the device. For example, "contoso.com|fabrikam.net|woodgrove.gov". - +
          Footnote: @@ -245,7 +245,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Accounts policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index 6b16327ccb..4bea893b54 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ActiveXControls @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## ActiveXControls policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **ActiveXControls/ApprovedInstallationSites** @@ -87,7 +87,7 @@ ADMX Info: - GP ADMX file name: *ActiveXInstallService.admx* - +
          Footnote: @@ -96,5 +96,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-applicationdefaults.md b/windows/client-management/mdm/policy-csp-applicationdefaults.md index 2889bb4f2a..0e45ce047c 100644 --- a/windows/client-management/mdm/policy-csp-applicationdefaults.md +++ b/windows/client-management/mdm/policy-csp-applicationdefaults.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ApplicationDefaults @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## ApplicationDefaults policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **ApplicationDefaults/DefaultAssociationsConfiguration** @@ -122,7 +122,7 @@ Here is the SyncMl example: ``` - +
          Footnote: @@ -131,5 +131,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-applicationmanagement.md b/windows/client-management/mdm/policy-csp-applicationmanagement.md index 1ca01c5a3f..9ee5181bd2 100644 --- a/windows/client-management/mdm/policy-csp-applicationmanagement.md +++ b/windows/client-management/mdm/policy-csp-applicationmanagement.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ApplicationManagement @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## ApplicationManagement policies
          @@ -57,7 +57,7 @@ ms.date: 01/29/2018
          - + **ApplicationManagement/AllowAllTrustedApps** @@ -106,11 +106,11 @@ The following list shows the supported values: - 65535 (default) - Not configured. - +
          - + **ApplicationManagement/AllowAppStoreAutoUpdate** @@ -159,11 +159,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **ApplicationManagement/AllowDeveloperUnlock** @@ -212,11 +212,11 @@ The following list shows the supported values: - 65535 (default) - Not configured. - +
          - + **ApplicationManagement/AllowGameDVR** @@ -267,11 +267,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **ApplicationManagement/AllowSharedUserAppData** @@ -319,11 +319,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **ApplicationManagement/AllowStore** @@ -371,11 +371,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **ApplicationManagement/ApplicationRestrictions** @@ -436,11 +436,11 @@ Value type is chr. Value evaluation rule - The information for PolicyManager is opaque. There is no most restricted value evaluation. Whenever there is a change to the value, the device parses the node value and enforces specified policies. - +
          - + **ApplicationManagement/DisableStoreOriginatedApps** @@ -486,11 +486,11 @@ The following list shows the supported values: - 1 – Disable launch of apps. - +
          - + **ApplicationManagement/RequirePrivateStoreOnly** @@ -539,11 +539,11 @@ The following list shows the supported values: - 1 – Only Private store is enabled. - +
          - + **ApplicationManagement/RestrictAppDataToSystemVolume** @@ -591,11 +591,11 @@ The following list shows the supported values: - 1 – Restricted. - +
          - + **ApplicationManagement/RestrictAppToSystemVolume** @@ -643,7 +643,7 @@ The following list shows the supported values: - 1 – Restricted. - +
          Footnote: @@ -652,7 +652,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## ApplicationManagement policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-appvirtualization.md b/windows/client-management/mdm/policy-csp-appvirtualization.md index f1bfd67657..5ec36f8881 100644 --- a/windows/client-management/mdm/policy-csp-appvirtualization.md +++ b/windows/client-management/mdm/policy-csp-appvirtualization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - AppVirtualization @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## AppVirtualization policies
          @@ -108,7 +108,7 @@ ms.date: 01/29/2018
          - + **AppVirtualization/AllowAppVClient** @@ -162,11 +162,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowDynamicVirtualization** @@ -220,11 +220,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowPackageCleanup** @@ -278,11 +278,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowPackageScripts** @@ -336,11 +336,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowPublishingRefreshUX** @@ -394,11 +394,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowReportingServer** @@ -462,11 +462,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowRoamingFileExclusions** @@ -520,11 +520,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowRoamingRegistryExclusions** @@ -578,11 +578,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/AllowStreamingAutoload** @@ -636,11 +636,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/ClientCoexistenceAllowMigrationmode** @@ -694,11 +694,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/IntegrationAllowRootGlobal** @@ -752,11 +752,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/IntegrationAllowRootUser** @@ -810,11 +810,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/PublishingAllowServer1** @@ -886,11 +886,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/PublishingAllowServer2** @@ -962,11 +962,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/PublishingAllowServer3** @@ -1038,11 +1038,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/PublishingAllowServer4** @@ -1114,11 +1114,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/PublishingAllowServer5** @@ -1190,11 +1190,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowCertificateFilterForClient_SSL** @@ -1248,11 +1248,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowHighCostLaunch** @@ -1306,11 +1306,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowLocationProvider** @@ -1364,11 +1364,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowPackageInstallationRoot** @@ -1422,11 +1422,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowPackageSourceRoot** @@ -1480,11 +1480,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowReestablishmentInterval** @@ -1538,11 +1538,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingAllowReestablishmentRetries** @@ -1596,11 +1596,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingSharedContentStoreMode** @@ -1654,11 +1654,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingSupportBranchCache** @@ -1712,11 +1712,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/StreamingVerifyCertificateRevocationList** @@ -1770,11 +1770,11 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          - + **AppVirtualization/VirtualComponentsAllowList** @@ -1828,7 +1828,7 @@ ADMX Info: - GP ADMX file name: *appv.admx* - +
          Footnote: @@ -1837,5 +1837,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index b23d0fec1c..3cd9a8202d 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - AttachmentManager @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## AttachmentManager policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **AttachmentManager/DoNotPreserveZoneInformation** @@ -93,11 +93,11 @@ ADMX Info: - GP ADMX file name: *AttachmentManager.admx* - +
          - + **AttachmentManager/HideZoneInfoMechanism** @@ -157,11 +157,11 @@ ADMX Info: - GP ADMX file name: *AttachmentManager.admx* - +
          - + **AttachmentManager/NotifyAntivirusPrograms** @@ -221,7 +221,7 @@ ADMX Info: - GP ADMX file name: *AttachmentManager.admx* - +
          Footnote: @@ -230,5 +230,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-authentication.md b/windows/client-management/mdm/policy-csp-authentication.md index 6755d07861..881ae7ff19 100644 --- a/windows/client-management/mdm/policy-csp-authentication.md +++ b/windows/client-management/mdm/policy-csp-authentication.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Authentication @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Authentication policies
          @@ -39,7 +39,7 @@ ms.date: 01/29/2018
          - + **Authentication/AllowAadPasswordReset** @@ -85,11 +85,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **Authentication/AllowEAPCertSSO** @@ -135,11 +135,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Authentication/AllowFastReconnect** @@ -187,11 +187,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Authentication/AllowFidoDeviceSignon** @@ -241,11 +241,11 @@ The following list shows the supported values: - 1 - Allow. The FIDO device credential provider is enabled and allows usage of FIDO devices to sign into an Windows. - +
          - + **Authentication/AllowSecondaryAuthenticationDevice** @@ -293,7 +293,7 @@ The following list shows the supported values: - 1 – Allowed. - +
          Footnote: @@ -302,7 +302,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Authentication policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-autoplay.md b/windows/client-management/mdm/policy-csp-autoplay.md index 1691a0fce0..ea02a39c19 100644 --- a/windows/client-management/mdm/policy-csp-autoplay.md +++ b/windows/client-management/mdm/policy-csp-autoplay.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Autoplay @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Autoplay policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **Autoplay/DisallowAutoplayForNonVolumeDevices** @@ -92,11 +92,11 @@ ADMX Info: - GP ADMX file name: *AutoPlay.admx* - +
          - + **Autoplay/SetDefaultAutoRunBehavior** @@ -164,11 +164,11 @@ ADMX Info: - GP ADMX file name: *AutoPlay.admx* - +
          - + **Autoplay/TurnOffAutoPlay** @@ -237,7 +237,7 @@ ADMX Info: - GP ADMX file name: *AutoPlay.admx* - +
          Footnote: @@ -246,5 +246,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-bitlocker.md b/windows/client-management/mdm/policy-csp-bitlocker.md index 35eb61f9df..852a915bac 100644 --- a/windows/client-management/mdm/policy-csp-bitlocker.md +++ b/windows/client-management/mdm/policy-csp-bitlocker.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Bitlocker @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Bitlocker policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Bitlocker/EncryptionMethod** @@ -106,7 +106,7 @@ The following list shows the supported values: - 7 - XTS-AES 256-bit (Desktop only) - +
          Footnote: @@ -115,5 +115,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-bluetooth.md b/windows/client-management/mdm/policy-csp-bluetooth.md index dc992781e7..3a6b797bf3 100644 --- a/windows/client-management/mdm/policy-csp-bluetooth.md +++ b/windows/client-management/mdm/policy-csp-bluetooth.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Bluetooth @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Bluetooth policies
          @@ -39,7 +39,7 @@ ms.date: 01/29/2018
          - + **Bluetooth/AllowAdvertising** @@ -89,11 +89,11 @@ The following list shows the supported values: - 1 (default) – Allowed. When set to 1, the device will send out advertisements. To verify, use any Bluetooth LE app and enable it to do advertising. Then, verify that the advertisement is received by the peripheral. - +
          - + **Bluetooth/AllowDiscoverableMode** @@ -143,11 +143,11 @@ The following list shows the supported values: - 1 (default) – Allowed. When set to 1, other devices will be able to detect the device. To verify, open the Bluetooth control panel on the device. Then, go to another Bluetooth-enabled device, open the Bluetooth control panel and verify that you can discover it. - +
          - + **Bluetooth/AllowPrepairing** @@ -193,11 +193,11 @@ The following list shows the supported values: - 1 (default)– Allowed. - +
          - + **Bluetooth/LocalDeviceName** @@ -240,11 +240,11 @@ If this is set, the value that it is set to will be used as the Bluetooth device If this policy is not set or it is deleted, the default local radio name is used. - +
          - + **Bluetooth/ServicesAllowedList** @@ -285,7 +285,7 @@ Set a list of allowable services and profiles. String hex formatted array of Blu The default value is an empty string. - +
          Footnote: @@ -294,7 +294,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Bluetooth policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 51ca199a31..0e9aaf6db6 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Browser @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Browser policies
          @@ -140,7 +140,7 @@ ms.date: 01/29/2018
          - + **Browser/AllowAddressBarDropdown** @@ -192,11 +192,11 @@ The following list shows the supported values: - 1 (default) – Allowed. Address bar drop-down is enabled. - +
          - + **Browser/AllowAutofill** @@ -254,11 +254,11 @@ To verify AllowAutofill is set to 0 (not allowed): 4. Verify the setting **Save form entries** is greyed out. - +
          - + **Browser/AllowBrowser** @@ -313,11 +313,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowCookies** @@ -376,11 +376,11 @@ To verify AllowCookies is set to 0 (not allowed): 4. Verify the setting **Cookies** is greyed out. - +
          - + **Browser/AllowDeveloperTools** @@ -433,11 +433,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowDoNotTrack** @@ -495,11 +495,11 @@ To verify AllowDoNotTrack is set to 0 (not allowed): 4. Verify the setting **Send Do Not Track requests** is greyed out. - +
          - + **Browser/AllowExtensions** @@ -546,11 +546,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowFlash** @@ -597,11 +597,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowFlashClickToRun** @@ -648,11 +648,11 @@ The following list shows the supported values: - 1 (default) – Users must click the content, click a Click-to-Run button, or have the site appear on an auto-allow list before Microsoft Edge loads and runs Adobe Flash content. - +
          - + **Browser/AllowInPrivate** @@ -701,11 +701,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowMicrosoftCompatibilityList** @@ -757,11 +757,11 @@ The following list shows the supported values: - 1 (default) – Enabled. - +
          - + **Browser/AllowPasswordManager** @@ -819,11 +819,11 @@ To verify AllowPasswordManager is set to 0 (not allowed): 4. Verify the settings **Offer to save password** and **Manage my saved passwords** are greyed out. - +
          - + **Browser/AllowPopups** @@ -881,11 +881,11 @@ To verify AllowPopups is set to 0 (not allowed): 4. Verify the setting **Block pop-ups** is greyed out. - +
          - + **Browser/AllowSearchEngineCustomization** @@ -936,11 +936,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowSearchSuggestionsinAddressBar** @@ -989,11 +989,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Browser/AllowSmartScreen** @@ -1051,11 +1051,11 @@ To verify AllowSmartScreen is set to 0 (not allowed): 4. Verify the setting **Help protect me from malicious sites and download with SmartScreen Filter** is greyed out. - +
          - + **Browser/AlwaysEnableBooksLibrary** @@ -1102,11 +1102,11 @@ The following list shows the supported values: - 1 - Enable. Always show the Books Library, regardless of countries or region of activation. - +
          - + **Browser/ClearBrowsingDataOnExit** @@ -1163,11 +1163,11 @@ To verify that browsing data is cleared on exit (ClearBrowsingDataOnExit is set 3. Open Microsoft Edge and start typing the same URL in address bar. Verify that it does not auto-complete from history. - +
          - + **Browser/ConfigureAdditionalSearchEngines** @@ -1225,11 +1225,11 @@ The following list shows the supported values: - 1 – Additional search engines are allowed. - +
          - + **Browser/DisableLockdownOfStartPages** @@ -1284,11 +1284,11 @@ The following list shows the supported values: - 1 – Disable lockdown of the Start pages and allow users to modify them. - +
          - + **Browser/EnableExtendedBooksTelemetry** @@ -1337,11 +1337,11 @@ The following list shows the supported values: - 1 - Enable. Additional telemetry for schools. - +
          - + **Browser/EnterpriseModeSiteList** @@ -1392,11 +1392,11 @@ The following list shows the supported values: - Set to a URL location of the enterprise site list. - +
          - + **Browser/EnterpriseSiteListServiceUrl** @@ -1437,11 +1437,11 @@ The following list shows the supported values: > This policy (introduced in Windows 10, version 1507) was deprecated in Windows 10, version 1511 by [Browser/EnterpriseModeSiteList](#browser-enterprisemodesitelist). - +
          - + **Browser/FirstRunURL** @@ -1489,11 +1489,11 @@ The data type is a string. The default value is an empty string. Otherwise, the string should contain the URL of the webpage users will see the first time Microsoft Edge is run. For example, “contoso.com”. - +
          - + **Browser/HomePages** @@ -1543,11 +1543,11 @@ Starting in Windows 10, version 1703, if you don’t want to send traffic to Mi > Turning this setting off, or not configuring it, sets your default Start pages to the webpages specified in App settings. - +
          - + **Browser/LockdownFavorites** @@ -1603,11 +1603,11 @@ The following list shows the supported values: - 1 - Enabled. Lockdown Favorites. - +
          - + **Browser/PreventAccessToAboutFlagsInMicrosoftEdge** @@ -1654,11 +1654,11 @@ The following list shows the supported values: - 1 – Users can't access the about:flags page in Microsoft Edge. - +
          - + **Browser/PreventFirstRunPage** @@ -1707,11 +1707,11 @@ The following list shows the supported values: - 1 – Employees don't see the First Run webpage. - +
          - + **Browser/PreventLiveTileDataCollection** @@ -1760,11 +1760,11 @@ The following list shows the supported values: - 1 – Microsoft servers will not be contacted if a site is pinned to Start from Microsoft Edge. - +
          - + **Browser/PreventSmartScreenPromptOverride** @@ -1813,11 +1813,11 @@ The following list shows the supported values: - 1 – On. - +
          - + **Browser/PreventSmartScreenPromptOverrideForFiles** @@ -1864,11 +1864,11 @@ The following list shows the supported values: - 1 – On. - +
          - + **Browser/PreventUsingLocalHostIPAddressForWebRTC** @@ -1919,11 +1919,11 @@ The following list shows the supported values: - 1 – The localhost IP address is hidden. - +
          - + **Browser/ProvisionFavorites** @@ -1976,11 +1976,11 @@ If you disable or don't configure this setting, employees will see the favorites Data type is string. - +
          - + **Browser/SendIntranetTraffictoInternetExplorer** @@ -2033,11 +2033,11 @@ The following list shows the supported values: - 1 – Intranet traffic is sent to Microsoft Edge. - +
          - + **Browser/SetDefaultSearchEngine** @@ -2094,11 +2094,11 @@ The following list shows the supported values: - 1 - Allows you to configure the default search engine for your employees. - +
          - + **Browser/ShowMessageWhenOpeningSitesInInternetExplorer** @@ -2151,11 +2151,11 @@ The following list shows the supported values: - 1 – Interstitial pages are shown. - +
          - + **Browser/SyncFavoritesBetweenIEAndMicrosoftEdge** @@ -2217,11 +2217,11 @@ To verify that favorites are in synchronized between Internet Explorer and Micro - +
          - + **Browser/UseSharedFolderForBooks** @@ -2268,7 +2268,7 @@ The following list shows the supported values: - 1 - Use a shared folder. - +
          Footnote: @@ -2277,7 +2277,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Browser policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-camera.md b/windows/client-management/mdm/policy-csp-camera.md index fc227b1f17..635f9d4118 100644 --- a/windows/client-management/mdm/policy-csp-camera.md +++ b/windows/client-management/mdm/policy-csp-camera.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Camera @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Camera policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Camera/AllowCamera** @@ -75,7 +75,7 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          Footnote: @@ -84,7 +84,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Camera policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-cellular.md b/windows/client-management/mdm/policy-csp-cellular.md index db8f20499e..33931f6aa7 100644 --- a/windows/client-management/mdm/policy-csp-cellular.md +++ b/windows/client-management/mdm/policy-csp-cellular.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Cellular @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Cellular policies
          @@ -39,7 +39,7 @@ ms.date: 01/29/2018
          - + **Cellular/LetAppsAccessCellularData** @@ -98,11 +98,11 @@ The following list shows the supported values: - 2 - Force Deny - +
          - + **Cellular/LetAppsAccessCellularData_ForceAllowTheseApps** @@ -141,11 +141,11 @@ The following list shows the supported values: Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
          - + **Cellular/LetAppsAccessCellularData_ForceDenyTheseApps** @@ -184,11 +184,11 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to cellular data. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
          - + **Cellular/LetAppsAccessCellularData_UserInControlOfTheseApps** @@ -227,11 +227,11 @@ Added in Windows 10, version 1709. List of semi-colon delimited Package Family N Added in Windows 10, version 1709. List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the cellular data access setting for the listed apps. This setting overrides the default LetAppsAccessCellularData policy setting for the specified apps. Value type is string. - +
          - + **Cellular/ShowAppCellularAccessUI** @@ -294,7 +294,7 @@ ADMX Info: - GP ADMX file name: *wwansvc.admx* - +
          Footnote: @@ -303,7 +303,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Cellular policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-connectivity.md b/windows/client-management/mdm/policy-csp-connectivity.md index c4e91457b4..df9e662f31 100644 --- a/windows/client-management/mdm/policy-csp-connectivity.md +++ b/windows/client-management/mdm/policy-csp-connectivity.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Connectivity @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Connectivity policies
          @@ -66,7 +66,7 @@ ms.date: 01/29/2018
          - + **Connectivity/AllowBluetooth** @@ -120,11 +120,11 @@ The following list shows the supported values: - 2 (default) – Allow Bluetooth. If this is set to 2, the radio in the Bluetooth control panel will be functional and the user will be able to turn Bluetooth on. - +
          - + **Connectivity/AllowCellularData** @@ -171,11 +171,11 @@ The following list shows the supported values: - 2 - Allow the cellular data channel. The user cannot turn it off. - +
          - + **Connectivity/AllowCellularDataRoaming** @@ -234,11 +234,11 @@ To validate on mobile devices, do the following: 3. On the Properties page, select **Data roaming options**. - +
          - + **Connectivity/AllowConnectedDevices** @@ -287,11 +287,11 @@ The following list shows the supported values: - 0 - Disable (CDP service not available). - +
          - + **Connectivity/AllowNFC** @@ -343,11 +343,11 @@ The following list shows the supported values: - 1 (default) – Allow NFC capabilities. - +
          - + **Connectivity/AllowUSBConnection** @@ -401,11 +401,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Connectivity/AllowVPNOverCellular** @@ -453,11 +453,11 @@ The following list shows the supported values: - 1 (default) – VPN can use any connection, including cellular. - +
          - + **Connectivity/AllowVPNRoamingOverCellular** @@ -505,11 +505,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Connectivity/DiablePrintingOverHTTP** @@ -562,11 +562,11 @@ ADMX Info: - GP ADMX file name: *ICM.admx* - +
          - + **Connectivity/DisableDownloadingOfPrintDriversOverHTTP** @@ -619,11 +619,11 @@ ADMX Info: - GP ADMX file name: *ICM.admx* - +
          - + **Connectivity/DisableInternetDownloadForWebPublishingAndOnlineOrderingWizards** @@ -676,11 +676,11 @@ ADMX Info: - GP ADMX file name: *ICM.admx* - +
          - + **Connectivity/DisallowNetworkConnectivityActiveTests** @@ -721,11 +721,11 @@ Added in Windows 10, version 1703. Network Connection Status Indicator (NCSI) de Value type is integer. - +
          - + **Connectivity/HardenedUNCPaths** @@ -781,11 +781,11 @@ ADMX Info: - GP ADMX file name: *networkprovider.admx* - +
          - + **Connectivity/ProhibitInstallationAndConfigurationOfNetworkBridge** @@ -838,7 +838,7 @@ ADMX Info: - GP ADMX file name: *NetworkConnections.admx* - +
          Footnote: @@ -847,7 +847,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Connectivity policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md index 421980c7b1..d4124e950a 100644 --- a/windows/client-management/mdm/policy-csp-controlpolicyconflict.md +++ b/windows/client-management/mdm/policy-csp-controlpolicyconflict.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ControlPolicyConflict @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## ControlPolicyConflict policies
          @@ -29,7 +29,7 @@ ms.date: 01/29/2018
          - + **ControlPolicyConflict/MDMWinsOverGP** @@ -83,7 +83,7 @@ The following list shows the supported values: - 1 - The MDM policy is used and the GP policy is blocked. - +
          Footnote: @@ -92,5 +92,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 20a5e4fc8d..8994842055 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - CredentialProviders @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## CredentialProviders policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **CredentialProviders/AllowPINLogon** @@ -95,11 +95,11 @@ ADMX Info: - GP ADMX file name: *credentialproviders.admx* - +
          - + **CredentialProviders/BlockPicturePassword** @@ -159,11 +159,11 @@ ADMX Info: - GP ADMX file name: *credentialproviders.admx* - +
          - + **CredentialProviders/DisableAutomaticReDeploymentCredentials** @@ -211,7 +211,7 @@ The following list shows the supported values: - 1 - Disable visibility of the credentials for Windows 10 Automatic ReDeployment - +
          Footnote: @@ -220,7 +220,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## CredentialProviders policies supported by IoT Core diff --git a/windows/client-management/mdm/policy-csp-credentialsui.md b/windows/client-management/mdm/policy-csp-credentialsui.md index 29395b9209..869f016e13 100644 --- a/windows/client-management/mdm/policy-csp-credentialsui.md +++ b/windows/client-management/mdm/policy-csp-credentialsui.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - CredentialsUI @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## CredentialsUI policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **CredentialsUI/DisablePasswordReveal** @@ -93,11 +93,11 @@ ADMX Info: - GP ADMX file name: *credui.admx* - +
          - + **CredentialsUI/EnumerateAdministrators** @@ -155,7 +155,7 @@ ADMX Info: - GP ADMX file name: *credui.admx* - +
          Footnote: @@ -164,5 +164,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-cryptography.md b/windows/client-management/mdm/policy-csp-cryptography.md index 2957dd9d77..81023d5fdd 100644 --- a/windows/client-management/mdm/policy-csp-cryptography.md +++ b/windows/client-management/mdm/policy-csp-cryptography.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Cryptography @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Cryptography policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **Cryptography/AllowFipsAlgorithmPolicy** @@ -76,11 +76,11 @@ The following list shows the supported values: - 1– Allowed. - +
          - + **Cryptography/TLSCipherSuites** @@ -119,7 +119,7 @@ The following list shows the supported values: Lists the Cryptographic Cipher Algorithms allowed for SSL connections. Format is a semicolon delimited list. Last write win. - +
          Footnote: @@ -128,7 +128,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Cryptography policies supported by Microsoft Surface Hub diff --git a/windows/client-management/mdm/policy-csp-dataprotection.md b/windows/client-management/mdm/policy-csp-dataprotection.md index 0a497016a1..1563402e93 100644 --- a/windows/client-management/mdm/policy-csp-dataprotection.md +++ b/windows/client-management/mdm/policy-csp-dataprotection.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DataProtection @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## DataProtection policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **DataProtection/AllowDirectMemoryAccess** @@ -78,11 +78,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **DataProtection/LegacySelectiveWipeID** @@ -128,7 +128,7 @@ Setting used by Windows 8.1 Selective Wipe. > This policy is not recommended for use in Windows 10. - +
          Footnote: @@ -137,7 +137,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## DataProtection policies supported by IoT Core diff --git a/windows/client-management/mdm/policy-csp-datausage.md b/windows/client-management/mdm/policy-csp-datausage.md index 736ad17532..9d64360b36 100644 --- a/windows/client-management/mdm/policy-csp-datausage.md +++ b/windows/client-management/mdm/policy-csp-datausage.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DataUsage @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## DataUsage policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **DataUsage/SetCost3G** @@ -94,11 +94,11 @@ ADMX Info: - GP ADMX file name: *wwansvc.admx* - +
          - + **DataUsage/SetCost4G** @@ -162,7 +162,7 @@ ADMX Info: - GP ADMX file name: *wwansvc.admx* - +
          Footnote: @@ -171,5 +171,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-defender.md b/windows/client-management/mdm/policy-csp-defender.md index bcd17f7911..6dcfb31902 100644 --- a/windows/client-management/mdm/policy-csp-defender.md +++ b/windows/client-management/mdm/policy-csp-defender.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Defender @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Defender policies
          @@ -129,7 +129,7 @@ ms.date: 01/29/2018
          - + **Defender/AllowArchiveScanning** @@ -179,11 +179,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowBehaviorMonitoring** @@ -233,11 +233,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowCloudProtection** @@ -287,11 +287,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowEmailScanning** @@ -341,11 +341,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **Defender/AllowFullScanOnMappedNetworkDrives** @@ -395,11 +395,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **Defender/AllowFullScanRemovableDriveScanning** @@ -449,11 +449,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowIOAVProtection** @@ -503,11 +503,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowIntrusionPreventionSystem** @@ -557,11 +557,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowOnAccessProtection** @@ -611,11 +611,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowRealtimeMonitoring** @@ -665,11 +665,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowScanningNetworkFiles** @@ -719,11 +719,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowScriptScanning** @@ -773,11 +773,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AllowUserUIAccess** @@ -827,11 +827,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Defender/AttackSurfaceReductionOnlyExclusions** @@ -876,11 +876,11 @@ Added in Windows 10, version 1709. This policy setting allows you to prevent Att Value type is string. - +
          - + **Defender/AttackSurfaceReductionRules** @@ -927,11 +927,11 @@ For more information about ASR rule ID and status ID, see [Enable Attack Surface Value type is string. - +
          - + **Defender/AvgCPULoadFactor** @@ -981,11 +981,11 @@ The default value is 50. Valid values: 0–100 - +
          - + **Defender/CloudBlockLevel** @@ -1044,11 +1044,11 @@ The following list shows the supported values: - 0x6 - Zero tolerance blocking level – block all unknown executables - +
          - + **Defender/CloudExtendedTimeout** @@ -1097,11 +1097,11 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se > This feature depends on three other MAPS settings the must all be enabled- "Configure the 'Block at First Sight' feature; "Join Microsoft MAPS"; "Send file samples when further analysis is required". - +
          - + **Defender/ControlledFolderAccessAllowedApplications** @@ -1143,11 +1143,11 @@ For example, if the desired timeout is 60 seconds, specify 50 seconds in this se Added in Windows 10, version 1709. This policy setting allows user-specified applications to the guard my folders feature. Adding an allowed application means the guard my folders feature will allow the application to modify or delete content in certain folders such as My Documents. In most cases it will not be necessary to add entries. Windows Defender Antivirus will automatically detect and dynamically add applications that are friendly. Value type is string. Use the | as the substring separator. - +
          - + **Defender/ControlledFolderAccessProtectedFolders** @@ -1189,11 +1189,11 @@ Added in Windows 10, version 1709. This policy setting allows user-specified app Added in Windows 10, version 1709. This policy settings allows adding user-specified folder locations to the guard my folders feature. These folders will complement the system defined folders such as My Documents and My Pictures. The list of system folders will be displayed in the user interface and can not be changed. Value type is string. Use the | as the substring separator. - +
          - + **Defender/DaysToRetainCleanedMalware** @@ -1243,11 +1243,11 @@ The default value is 0, which keeps items in quarantine, and does not automatica Valid values: 0–90 - +
          - + **Defender/EnableControlledFolderAccess** @@ -1297,11 +1297,11 @@ The following list shows the supported values: - 2 - Audit Mode - +
          - + **Defender/EnableNetworkProtection** @@ -1357,11 +1357,11 @@ The following list shows the supported values: - 2 - Enabled (audit mode) - +
          - + **Defender/ExcludedExtensions** @@ -1404,11 +1404,11 @@ The following list shows the supported values: Allows an administrator to specify a list of file type extensions to ignore during a scan. Each file type in the list must be separated by a **|**. For example, "lib|obj". - +
          - + **Defender/ExcludedPaths** @@ -1451,11 +1451,11 @@ Allows an administrator to specify a list of file type extensions to ignore duri Allows an administrator to specify a list of directory paths to ignore during a scan. Each path in the list must be separated by a **|**. For example, "C:\\Example|C:\\Example1". - +
          - + **Defender/ExcludedProcesses** @@ -1504,11 +1504,11 @@ Allows an administrator to specify a list of files opened by processes to ignore Each file type must be separated by a **|**. For example, "C:\\Example.exe|C:\\Example1.exe". - +
          - + **Defender/PUAProtection** @@ -1559,11 +1559,11 @@ The following list shows the supported values: - 2 – Audit mode. Windows Defender will detect potentially unwanted applications, but take no action. You can review information about the applications Windows Defender would have taken action against by searching for events created by Windows Defender in the Event Viewer. - +
          - + **Defender/RealTimeScanDirection** @@ -1617,11 +1617,11 @@ The following list shows the supported values: - 2 – Monitor outgoing files. - +
          - + **Defender/ScanParameter** @@ -1671,11 +1671,11 @@ The following list shows the supported values: - 2 – Full scan - +
          - + **Defender/ScheduleQuickScanTime** @@ -1731,11 +1731,11 @@ The default value is 120 Valid values: 0–1380 - +
          - + **Defender/ScheduleScanDay** @@ -1795,11 +1795,11 @@ The following list shows the supported values: - 8 – No scheduled scan - +
          - + **Defender/ScheduleScanTime** @@ -1855,11 +1855,11 @@ The default value is 120. Valid values: 0–1380. - +
          - + **Defender/SignatureUpdateInterval** @@ -1911,11 +1911,11 @@ The default value is 8. Valid values: 0–24. - +
          - + **Defender/SubmitSamplesConsent** @@ -1967,11 +1967,11 @@ The following list shows the supported values: - 3 – Send all samples automatically. - +
          - + **Defender/ThreatSeverityDefaultAction** @@ -2032,7 +2032,7 @@ The following list shows the supported values for possible actions: - 10 – Block - +
          Footnote: @@ -2041,7 +2041,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Defender policies supported by Microsoft Surface Hub diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 066c6de874..d05d2cedb0 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DeliveryOptimization @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## DeliveryOptimization policies
          @@ -98,7 +98,7 @@ ms.date: 01/29/2018
          - + **DeliveryOptimization/DOAbsoluteMaxCacheSize** @@ -143,11 +143,11 @@ Added in Windows 10, version 1607. Specifies the maximum size in GB of Delivery The default value is 10. - +
          - + **DeliveryOptimization/DOAllowVPNPeerCaching** @@ -197,11 +197,11 @@ The following list shows the supported values: - 1 - Allowed. - +
          - + **DeliveryOptimization/DODelayBackgroundDownloadFromHttp** @@ -242,11 +242,11 @@ Added in Windows 10, next major update. This policy allows you to delay the use After the max delay is reached, the download will resume using HTTP, either downloading the entire payload or complementing the bytes that could not be downloaded from peers. Note that a download that is waiting for peer sources, will appear to be stuck for the end user. The recommended value is 1 hour (3600). - +
          - + **DeliveryOptimization/DODelayForegroundDownloadFromHttp** @@ -299,11 +299,11 @@ The following list shows the supported values as number of seconds: - Default is not configured. - +
          - + **DeliveryOptimization/DODownloadMode** @@ -357,11 +357,11 @@ The following list shows the supported values: - 100 - Bypass mode. Do not use Delivery Optimization and use BITS instead. Added in Windows 10, version 1607. - +
          - + **DeliveryOptimization/DOGroupId** @@ -407,11 +407,11 @@ This Policy specifies an arbitrary group ID that the device belongs to. Use this > You must use a GUID as the group ID. - +
          - + **DeliveryOptimization/DOGroupIdSource** @@ -467,11 +467,11 @@ The following list shows the supported values: - 4 - DNS suffix - +
          - + **DeliveryOptimization/DOMaxCacheAge** @@ -516,11 +516,11 @@ Specifies the maximum time in seconds that each file is held in the Delivery Opt The default value is 259200 seconds (3 days). - +
          - + **DeliveryOptimization/DOMaxCacheSize** @@ -565,11 +565,11 @@ Specifies the maximum cache size that Delivery Optimization can utilize, as a pe The default value is 20. - +
          - + **DeliveryOptimization/DOMaxDownloadBandwidth** @@ -614,11 +614,11 @@ Added in Windows 10, version 1607. Specifies the maximum download bandwidth in The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. - +
          - + **DeliveryOptimization/DOMaxUploadBandwidth** @@ -663,11 +663,11 @@ Specifies the maximum upload bandwidth in KiloBytes/second that a device will us The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). - +
          - + **DeliveryOptimization/DOMinBackgroundQos** @@ -712,11 +712,11 @@ Added in Windows 10, version 1607. Specifies the minimum download QoS (Quality The default value is 500. - +
          - + **DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload** @@ -760,11 +760,11 @@ Added in Windows 10, version 1703. Specifies any value between 1 and 100 (in pe The default value is 0. The value 0 (zero) means "not limited" and the cloud service default value will be used. - +
          - + **DeliveryOptimization/DOMinDiskSizeAllowedToPeer** @@ -812,11 +812,11 @@ Added in Windows 10, version 1703. Specifies the required minimum disk size (cap The default value is 32 GB. - +
          - + **DeliveryOptimization/DOMinFileSizeToCache** @@ -861,11 +861,11 @@ Added in Windows 10, version 1703. Specifies the minimum content file size in MB The default value is 100 MB. - +
          - + **DeliveryOptimization/DOMinRAMAllowedToPeer** @@ -910,11 +910,11 @@ Added in Windows 10, version 1703. Specifies the minimum RAM size in GB required The default value is 4 GB. - +
          - + **DeliveryOptimization/DOModifyCacheDrive** @@ -959,11 +959,11 @@ Added in Windows 10, version 1607. Specifies the drive that Delivery Optimizati By default, %SystemDrive% is used to store the cache. - +
          - + **DeliveryOptimization/DOMonthlyUploadDataCap** @@ -1010,11 +1010,11 @@ The value 0 (zero) means "unlimited"; No monthly upload limit is applied if 0 is The default value is 20. - +
          - + **DeliveryOptimization/DOPercentageMaxBackDownloadBandwidth** @@ -1055,22 +1055,22 @@ Added in Windows 10, next major update. Specifies the maximum background downloa Note that downloads from LAN peers will not be throttled even when this policy is set. - +
          - + **DeliveryOptimization/DOPercentageMaxDownloadBandwidth** This policy is deprecated. Use [DOPercentageMaxForeDownloadBandwidth](#deliveryoptimization-dopercentagemaxforedownloadbandwidth) and [DOPercentageMaxBackDownloadBandwidth](#deliveryoptimization-dopercentagemaxbackdownloadbandwidth) policies instead. - +
          - + **DeliveryOptimization/DOPercentageMaxForeDownloadBandwidth** @@ -1111,11 +1111,11 @@ Added in Windows 10, next major update. Specifies the maximum foreground downloa Note that downloads from LAN peers will not be throttled even when this policy is set. - +
          - + **DeliveryOptimization/DORestrictPeerSelectionBy** @@ -1163,11 +1163,11 @@ The following list shows the supported values: - 1 - Subnet mask. - +
          - + **DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth** @@ -1216,11 +1216,11 @@ This policy allows an IT Admin to define the following: - % of throttle for foreground traffic outside of business hours - +
          - + **DeliveryOptimization/DOSetHoursToLimitForegroundDownloadBandwidth** @@ -1269,7 +1269,7 @@ This policy allows an IT Admin to define the following: - % of throttle for foreground traffic outside of business hours - +
          Footnote: @@ -1278,7 +1278,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## DeliveryOptimization policies supported by Microsoft Surface Hub diff --git a/windows/client-management/mdm/policy-csp-desktop.md b/windows/client-management/mdm/policy-csp-desktop.md index 009265655e..56fcae51f5 100644 --- a/windows/client-management/mdm/policy-csp-desktop.md +++ b/windows/client-management/mdm/policy-csp-desktop.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Desktop @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Desktop policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Desktop/PreventUserRedirectionOfProfileFolders** @@ -85,7 +85,7 @@ ADMX Info: - GP ADMX file name: *desktop.admx* - +
          Footnote: @@ -94,7 +94,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Desktop policies supported by Microsoft Surface Hub diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index d2cc249634..bde8f4dc65 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DeviceGuard @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## DeviceGuard policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **DeviceGuard/EnableVirtualizationBasedSecurity** @@ -79,11 +79,11 @@ The following list shows the supported values: - 1 - enable virtualization based security. - +
          - + **DeviceGuard/LsaCfgFlags** @@ -130,11 +130,11 @@ The following list shows the supported values: - 2 - (Enabled without lock) Turns on Credential Guard without UEFI lock. - +
          - + **DeviceGuard/RequirePlatformSecurityFeatures** @@ -180,7 +180,7 @@ The following list shows the supported values: - 3 - Turns on VBS with Secure Boot and direct memory access (DMA). DMA requires hardware support. - +
          Footnote: @@ -189,5 +189,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index d104e70a92..5813ea9ecb 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DeviceInstallation @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## DeviceInstallation policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **DeviceInstallation/PreventInstallationOfMatchingDeviceIDs** @@ -88,11 +88,11 @@ ADMX Info: - GP ADMX file name: *deviceinstallation.admx* - +
          - + **DeviceInstallation/PreventInstallationOfMatchingDeviceSetupClasses** @@ -150,7 +150,7 @@ ADMX Info: - GP ADMX file name: *deviceinstallation.admx* - +
          Footnote: @@ -159,5 +159,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-devicelock.md b/windows/client-management/mdm/policy-csp-devicelock.md index 3b169444ca..2555067447 100644 --- a/windows/client-management/mdm/policy-csp-devicelock.md +++ b/windows/client-management/mdm/policy-csp-devicelock.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - DeviceLock @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## DeviceLock policies
          @@ -77,7 +77,7 @@ ms.date: 01/29/2018
          - + **DeviceLock/AllowIdleReturnWithoutPassword** @@ -130,11 +130,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **DeviceLock/AllowScreenTimeoutWhileLockedUserConfig** @@ -192,11 +192,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **DeviceLock/AllowSimpleDevicePassword** @@ -249,11 +249,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **DeviceLock/AlphanumericDevicePasswordRequired** @@ -312,11 +312,11 @@ The following list shows the supported values: - 2 (default) – Users can choose: Numeric PIN or password, or Alphanumeric PIN or password. - +
          - + **DeviceLock/DevicePasswordEnabled** @@ -403,11 +403,11 @@ The following list shows the supported values: - 1 – Disabled - +
          - + **DeviceLock/DevicePasswordExpiration** @@ -462,11 +462,11 @@ The following list shows the supported values: - 0 (default) - Passwords do not expire. - +
          - + **DeviceLock/DevicePasswordHistory** @@ -523,11 +523,11 @@ The following list shows the supported values: - 0 (default) - +
          - + **DeviceLock/EnforceLockScreenAndLogonImage** @@ -572,11 +572,11 @@ Added in Windows 10, version 1607. Specifies the default lock screen and logon Value type is a string, which is the full image filepath and filename. - +
          - + **DeviceLock/EnforceLockScreenProvider** @@ -621,11 +621,11 @@ Added in Windows 10, version 1607. Restricts lock screen image to a specific lo Value type is a string, which is the AppID. - +
          - + **DeviceLock/MaxDevicePasswordFailedAttempts** @@ -687,11 +687,11 @@ The following list shows the supported values: - 0 (default) - The device is never wiped after an incorrect PIN or password is entered. - +
          - + **DeviceLock/MaxInactivityTimeDeviceLock** @@ -744,11 +744,11 @@ The following list shows the supported values: - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - +
          - + **DeviceLock/MaxInactivityTimeDeviceLockWithExternalDisplay** @@ -797,11 +797,11 @@ The following list shows the supported values: - 0 (default) - No timeout is defined. The default of "0" is Windows Phone 7.5 parity and is interpreted by as "No timeout is defined." - +
          - + **DeviceLock/MinDevicePasswordComplexCharacters** @@ -911,11 +911,11 @@ The enforcement of policies for Microsoft accounts happen on the server, and the For additional information about this policy, see [Exchange ActiveSync Policy Engine Overview](https://technet.microsoft.com/library/dn282287.aspx) and [KB article](https://support.office.com/article/This-device-doesn-t-meet-the-security-requirements-set-by-your-email-administrator-87132fc7-2c7f-4a71-9de0-779ff81c86ca). - +
          - + **DeviceLock/MinDevicePasswordLength** @@ -973,11 +973,11 @@ The following list shows the supported values: - The default value is 4 for mobile devices and desktop devices. - +
          - + **DeviceLock/MinimumPasswordAge** @@ -1020,11 +1020,11 @@ The minimum password age must be less than the Maximum password age, unless the Configure the minimum password age to be more than 0 if you want Enforce password history to be effective. Without a minimum password age, users can cycle through passwords repeatedly until they get to an old favorite. The default setting does not follow this recommendation, so that an administrator can specify a password for a user and then require the user to change the administrator-defined password when the user logs on. If the password history is set to 0, the user does not have to choose a new password. For this reason, Enforce password history is set to 1 by default. - +
          - + **DeviceLock/PreventLockScreenSlideShow** @@ -1082,11 +1082,11 @@ ADMX Info: - GP ADMX file name: *ControlPanelDisplay.admx* - +
          - + **DeviceLock/ScreenTimeoutWhileLocked** @@ -1136,7 +1136,7 @@ The default value is 10. Most restricted value is 0. - +
          Footnote: @@ -1145,7 +1145,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## DeviceLock policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-display.md b/windows/client-management/mdm/policy-csp-display.md index e2302d2679..fbfc7878d5 100644 --- a/windows/client-management/mdm/policy-csp-display.md +++ b/windows/client-management/mdm/policy-csp-display.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Display @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Display policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **Display/TurnOffGdiDPIScalingForApps** @@ -84,11 +84,11 @@ To validate on Desktop, do the following: 2. Run the app and observe blurry text. - +
          - + **Display/TurnOnGdiDPIScalingForApps** @@ -142,7 +142,7 @@ To validate on Desktop, do the following: 2. Run the app and observe crisp text. - +
          Footnote: @@ -151,5 +151,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 70e051604f..3583549ed4 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Education @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Education policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **Education/DefaultPrinterName** @@ -74,11 +74,11 @@ Added in Windows 10, version 1709. This policy allows IT Admins to set the user The policy value is expected to be the name (network host name) of an installed printer. - +
          - + **Education/PreventAddingNewPrinters** @@ -124,11 +124,11 @@ The following list shows the supported values: - 1 – Prevent user installation. - +
          - + **Education/PrinterNames** @@ -169,7 +169,7 @@ Added in Windows 10, version 1709. Allows IT Admins to automatically provision The policy value is expected to be a `````` seperated list of printer names. The OS will attempt to search and install the matching printer driver for each listed printer. - +
          Footnote: @@ -178,5 +178,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md index 635152c9cc..63d4b5f3b2 100644 --- a/windows/client-management/mdm/policy-csp-enterprisecloudprint.md +++ b/windows/client-management/mdm/policy-csp-enterprisecloudprint.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - EnterpriseCloudPrint @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## EnterpriseCloudPrint policies
          @@ -42,7 +42,7 @@ ms.date: 01/29/2018
          - + **EnterpriseCloudPrint/CloudPrintOAuthAuthority** @@ -85,11 +85,11 @@ The datatype is a string. The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://azuretenant.contoso.com/adfs". - +
          - + **EnterpriseCloudPrint/CloudPrintOAuthClientId** @@ -132,11 +132,11 @@ The datatype is a string. The default value is an empty string. Otherwise, the value should contain a GUID. For example, "E1CF1107-FF90-4228-93BF-26052DD2C714". - +
          - + **EnterpriseCloudPrint/CloudPrintResourceId** @@ -179,11 +179,11 @@ The datatype is a string. The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MicrosoftEnterpriseCloudPrint/CloudPrint". - +
          - + **EnterpriseCloudPrint/CloudPrinterDiscoveryEndPoint** @@ -226,11 +226,11 @@ The datatype is a string. The default value is an empty string. Otherwise, the value should contain the URL of an endpoint. For example, "https://cloudprinterdiscovery.contoso.com". - +
          - + **EnterpriseCloudPrint/DiscoveryMaxPrinterLimit** @@ -273,11 +273,11 @@ The datatype is an integer. For Windows Mobile, the default value is 20. - +
          - + **EnterpriseCloudPrint/MopriaDiscoveryResourceId** @@ -320,7 +320,7 @@ The datatype is a string. The default value is an empty string. Otherwise, the value should contain a URL. For example, "http://MopriaDiscoveryService/CloudPrint". - +
          Footnote: @@ -329,5 +329,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-errorreporting.md b/windows/client-management/mdm/policy-csp-errorreporting.md index 8b4deb16d5..e33bbb0431 100644 --- a/windows/client-management/mdm/policy-csp-errorreporting.md +++ b/windows/client-management/mdm/policy-csp-errorreporting.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ErrorReporting @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## ErrorReporting policies
          @@ -39,7 +39,7 @@ ms.date: 01/29/2018
          - + **ErrorReporting/CustomizeConsentSettings** @@ -107,11 +107,11 @@ ADMX Info: - GP ADMX file name: *ErrorReporting.admx* - +
          - + **ErrorReporting/DisableWindowsErrorReporting** @@ -169,11 +169,11 @@ ADMX Info: - GP ADMX file name: *ErrorReporting.admx* - +
          - + **ErrorReporting/DisplayErrorNotification** @@ -235,11 +235,11 @@ ADMX Info: - GP ADMX file name: *ErrorReporting.admx* - +
          - + **ErrorReporting/DoNotSendAdditionalData** @@ -297,11 +297,11 @@ ADMX Info: - GP ADMX file name: *ErrorReporting.admx* - +
          - + **ErrorReporting/PreventCriticalErrorDisplay** @@ -359,7 +359,7 @@ ADMX Info: - GP ADMX file name: *ErrorReporting.admx* - +
          Footnote: @@ -368,5 +368,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-eventlogservice.md b/windows/client-management/mdm/policy-csp-eventlogservice.md index b531654651..10a8c1e6f4 100644 --- a/windows/client-management/mdm/policy-csp-eventlogservice.md +++ b/windows/client-management/mdm/policy-csp-eventlogservice.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - EventLogService @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## EventLogService policies
          @@ -36,7 +36,7 @@ ms.date: 01/29/2018
          - + **EventLogService/ControlEventLogBehavior** @@ -96,11 +96,11 @@ ADMX Info: - GP ADMX file name: *eventlog.admx* - +
          - + **EventLogService/SpecifyMaximumFileSizeApplicationLog** @@ -158,11 +158,11 @@ ADMX Info: - GP ADMX file name: *eventlog.admx* - +
          - + **EventLogService/SpecifyMaximumFileSizeSecurityLog** @@ -220,11 +220,11 @@ ADMX Info: - GP ADMX file name: *eventlog.admx* - +
          - + **EventLogService/SpecifyMaximumFileSizeSystemLog** @@ -282,7 +282,7 @@ ADMX Info: - GP ADMX file name: *eventlog.admx* - +
          Footnote: @@ -291,5 +291,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-experience.md b/windows/client-management/mdm/policy-csp-experience.md index 9c346946d7..162e0d9065 100644 --- a/windows/client-management/mdm/policy-csp-experience.md +++ b/windows/client-management/mdm/policy-csp-experience.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Experience @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Experience policies
          @@ -89,7 +89,7 @@ ms.date: 01/29/2018
          - + **Experience/AllowCopyPaste** @@ -140,11 +140,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowCortana** @@ -192,11 +192,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowDeviceDiscovery** @@ -246,11 +246,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowFindMyDevice** @@ -300,11 +300,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowManualMDMUnenrollment** @@ -356,11 +356,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowSIMErrorDialogPromptWhenNoSIM** @@ -410,22 +410,22 @@ The following list shows the supported values: - 1 (default) – SIM card dialog prompt is displayed. - +
          - + **Experience/AllowSaveAsOfOfficeFiles** This policy is deprecated. - +
          - + **Experience/AllowScreenCapture** @@ -477,22 +477,22 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowSharingOfOfficeFiles** This policy is deprecated. - +
          - + **Experience/AllowSyncMySettings** @@ -538,11 +538,11 @@ The following list shows the supported values: - 1 (default) – Sync settings allowed. - +
          - + **Experience/AllowTailoredExperiencesWithDiagnosticData** @@ -597,11 +597,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowTaskSwitcher** @@ -651,11 +651,11 @@ The following list shows the supported values: - 1 (default) – Task switching allowed. - +
          - + **Experience/AllowThirdPartySuggestionsInWindowsSpotlight** @@ -705,11 +705,11 @@ The following list shows the supported values: - 1 (default) – Third-party suggestions allowed. - +
          - + **Experience/AllowVoiceRecording** @@ -761,11 +761,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowWindowsConsumerFeatures** @@ -817,11 +817,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **Experience/AllowWindowsSpotlight** @@ -873,11 +873,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowWindowsSpotlightOnActionCenter** @@ -928,11 +928,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowWindowsSpotlightWindowsWelcomeExperience** @@ -984,11 +984,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Experience/AllowWindowsTips** @@ -1034,11 +1034,11 @@ The following list shows the supported values: - 1 (default) – Enabled. - +
          - + **Experience/ConfigureWindowsSpotlightOnLockScreen** @@ -1089,11 +1089,11 @@ The following list shows the supported values: - 2 – placeholder only for future extension. Using this value has no effect. - +
          - + **Experience/DoNotShowFeedbackNotifications** @@ -1143,7 +1143,7 @@ The following list shows the supported values: - 1 – Feedback notifications are disabled. - +
          Footnote: @@ -1152,7 +1152,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Experience policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-exploitguard.md b/windows/client-management/mdm/policy-csp-exploitguard.md index 9f742bb32f..f52eb4c227 100644 --- a/windows/client-management/mdm/policy-csp-exploitguard.md +++ b/windows/client-management/mdm/policy-csp-exploitguard.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - ExploitGuard @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## ExploitGuard policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **ExploitGuard/ExploitProtectionSettings** @@ -95,7 +95,7 @@ Here is an example: ``` - +
          Footnote: @@ -104,5 +104,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-games.md b/windows/client-management/mdm/policy-csp-games.md index 233f091ce6..2a651204e1 100644 --- a/windows/client-management/mdm/policy-csp-games.md +++ b/windows/client-management/mdm/policy-csp-games.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Games @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Games policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Games/AllowAdvancedGamingServices** @@ -73,7 +73,7 @@ The following list shows the supported values: - 1 (default) - Allowed - +
          Footnote: @@ -82,5 +82,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-handwriting.md b/windows/client-management/mdm/policy-csp-handwriting.md index ac276081cf..c03012e8f2 100644 --- a/windows/client-management/mdm/policy-csp-handwriting.md +++ b/windows/client-management/mdm/policy-csp-handwriting.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Handwriting @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Handwriting policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Handwriting/PanelDefaultModeDocked** @@ -79,7 +79,7 @@ The following list shows the supported values: - 1 - Enabled. - +
          Footnote: @@ -88,5 +88,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-internetexplorer.md b/windows/client-management/mdm/policy-csp-internetexplorer.md index ba26acd4fc..4e2042350f 100644 --- a/windows/client-management/mdm/policy-csp-internetexplorer.md +++ b/windows/client-management/mdm/policy-csp-internetexplorer.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - InternetExplorer @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## InternetExplorer policies
          @@ -753,7 +753,7 @@ ms.date: 01/29/2018
          - + **InternetExplorer/AddSearchProvider** @@ -812,11 +812,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowActiveXFiltering** @@ -875,11 +875,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowAddOnList** @@ -944,11 +944,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowAutoComplete** @@ -1001,11 +1001,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowCertificateAddressMismatchWarning** @@ -1059,11 +1059,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowDeletingBrowsingHistoryOnExit** @@ -1117,11 +1117,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowEnhancedProtectedMode** @@ -1182,11 +1182,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowEnterpriseModeFromToolsMenu** @@ -1245,11 +1245,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowEnterpriseModeSiteList** @@ -1308,11 +1308,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowFallbackToSSL3** @@ -1365,11 +1365,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowInternetExplorer7PolicyList** @@ -1428,11 +1428,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowInternetExplorerStandardsMode** @@ -1493,11 +1493,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowInternetZoneTemplate** @@ -1562,11 +1562,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowIntranetZoneTemplate** @@ -1631,11 +1631,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowLocalMachineZoneTemplate** @@ -1700,11 +1700,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowLockedDownInternetZoneTemplate** @@ -1769,11 +1769,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowLockedDownIntranetZoneTemplate** @@ -1838,11 +1838,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowLockedDownLocalMachineZoneTemplate** @@ -1907,11 +1907,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowLockedDownRestrictedSitesZoneTemplate** @@ -1976,11 +1976,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowOneWordEntry** @@ -2039,11 +2039,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowSiteToZoneAssignmentList** @@ -2108,11 +2108,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowSoftwareWhenSignatureIsInvalid** @@ -2166,11 +2166,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowSuggestedSites** @@ -2231,11 +2231,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowTrustedSitesZoneTemplate** @@ -2300,11 +2300,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowsLockedDownTrustedSitesZoneTemplate** @@ -2369,11 +2369,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/AllowsRestrictedSitesZoneTemplate** @@ -2438,11 +2438,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/CheckServerCertificateRevocation** @@ -2496,11 +2496,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/CheckSignaturesOnDownloadedPrograms** @@ -2554,11 +2554,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/ConsistentMimeHandlingInternetExplorerProcesses** @@ -2612,11 +2612,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableAdobeFlash** @@ -2677,11 +2677,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableBypassOfSmartScreenWarnings** @@ -2740,11 +2740,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableBypassOfSmartScreenWarningsAboutUncommonFiles** @@ -2803,11 +2803,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableConfiguringHistory** @@ -2861,11 +2861,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableCrashDetection** @@ -2919,11 +2919,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableCustomerExperienceImprovementProgramParticipation** @@ -2984,11 +2984,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableDeletingUserVisitedWebsites** @@ -3042,11 +3042,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableEnclosureDownloading** @@ -3105,11 +3105,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableEncryptionSupport** @@ -3170,11 +3170,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableFirstRunWizard** @@ -3237,11 +3237,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableFlipAheadFeature** @@ -3304,11 +3304,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableHomePageChange** @@ -3366,11 +3366,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableIgnoringCertificateErrors** @@ -3424,11 +3424,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableInPrivateBrowsing** @@ -3482,11 +3482,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableProcessesInEnhancedProtectedMode** @@ -3540,11 +3540,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableProxyChange** @@ -3603,11 +3603,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableSearchProviderChange** @@ -3666,11 +3666,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableSecondaryHomePageChange** @@ -3731,11 +3731,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableSecuritySettingsCheck** @@ -3789,11 +3789,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DisableUpdateCheck** @@ -3853,11 +3853,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DoNotAllowActiveXControlsInProtectedMode** @@ -3911,11 +3911,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DoNotAllowUsersToAddSites** @@ -3979,11 +3979,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DoNotAllowUsersToChangePolicies** @@ -4047,11 +4047,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DoNotBlockOutdatedActiveXControls** @@ -4112,11 +4112,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/DoNotBlockOutdatedActiveXControlsOnSpecificDomains** @@ -4181,11 +4181,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IncludeAllLocalSites** @@ -4246,11 +4246,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IncludeAllNetworkPaths** @@ -4311,11 +4311,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowAccessToDataSources** @@ -4376,11 +4376,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowAutomaticPromptingForActiveXControls** @@ -4441,11 +4441,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowAutomaticPromptingForFileDownloads** @@ -4504,11 +4504,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowCopyPasteViaScript** @@ -4562,11 +4562,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowDragAndDropCopyAndPasteFiles** @@ -4620,11 +4620,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowFontDownloads** @@ -4685,11 +4685,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowLessPrivilegedSites** @@ -4750,11 +4750,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowLoadingOfXAMLFiles** @@ -4808,11 +4808,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowNETFrameworkReliantComponents** @@ -4873,11 +4873,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseActiveXControls** @@ -4931,11 +4931,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** @@ -4989,11 +4989,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowScriptInitiatedWindows** @@ -5047,11 +5047,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowScriptingOfInternetExplorerWebBrowserControls** @@ -5105,11 +5105,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowScriptlets** @@ -5170,11 +5170,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowSmartScreenIE** @@ -5237,11 +5237,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowUpdatesToStatusBarViaScript** @@ -5295,11 +5295,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneAllowUserDataPersistence** @@ -5360,11 +5360,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -5418,11 +5418,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneDownloadSignedActiveXControls** @@ -5476,11 +5476,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneDownloadUnsignedActiveXControls** @@ -5534,11 +5534,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneEnableCrossSiteScriptingFilter** @@ -5592,11 +5592,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** @@ -5650,11 +5650,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** @@ -5708,11 +5708,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneEnableMIMESniffing** @@ -5766,11 +5766,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneEnableProtectedMode** @@ -5824,11 +5824,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneIncludeLocalPathWhenUploadingFilesToServer** @@ -5882,11 +5882,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneInitializeAndScriptActiveXControls** @@ -5949,11 +5949,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneInitializeAndScriptActiveXControlsNotMarkedSafe** @@ -5982,11 +5982,11 @@ ADMX Info: - +
          - + **InternetExplorer/InternetZoneJavaPermissions** @@ -6040,11 +6040,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneLaunchingApplicationsAndFilesInIFRAME** @@ -6098,11 +6098,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneLogonOptions** @@ -6156,11 +6156,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneNavigateWindowsAndFrames** @@ -6221,11 +6221,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** @@ -6279,11 +6279,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneShowSecurityWarningForPotentiallyUnsafeFiles** @@ -6337,11 +6337,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/InternetZoneUsePopupBlocker** @@ -6395,11 +6395,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowAccessToDataSources** @@ -6460,11 +6460,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowAutomaticPromptingForActiveXControls** @@ -6525,11 +6525,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowAutomaticPromptingForFileDownloads** @@ -6588,11 +6588,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowFontDownloads** @@ -6653,11 +6653,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowLessPrivilegedSites** @@ -6718,11 +6718,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowNETFrameworkReliantComponents** @@ -6783,11 +6783,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowScriptlets** @@ -6848,11 +6848,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowSmartScreenIE** @@ -6915,11 +6915,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneAllowUserDataPersistence** @@ -6980,11 +6980,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -7038,11 +7038,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneInitializeAndScriptActiveXControls** @@ -7105,11 +7105,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneJavaPermissions** @@ -7163,11 +7163,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/IntranetZoneNavigateWindowsAndFrames** @@ -7228,11 +7228,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowAccessToDataSources** @@ -7293,11 +7293,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForActiveXControls** @@ -7358,11 +7358,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowAutomaticPromptingForFileDownloads** @@ -7421,11 +7421,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowFontDownloads** @@ -7486,11 +7486,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowLessPrivilegedSites** @@ -7551,11 +7551,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowNETFrameworkReliantComponents** @@ -7616,11 +7616,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowScriptlets** @@ -7681,11 +7681,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowSmartScreenIE** @@ -7748,11 +7748,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneAllowUserDataPersistence** @@ -7813,11 +7813,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -7871,11 +7871,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneInitializeAndScriptActiveXControls** @@ -7938,11 +7938,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneJavaPermissions** @@ -7996,11 +7996,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LocalMachineZoneNavigateWindowsAndFrames** @@ -8061,11 +8061,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowAccessToDataSources** @@ -8126,11 +8126,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForActiveXControls** @@ -8191,11 +8191,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowAutomaticPromptingForFileDownloads** @@ -8254,11 +8254,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowFontDownloads** @@ -8319,11 +8319,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowLessPrivilegedSites** @@ -8384,11 +8384,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowNETFrameworkReliantComponents** @@ -8449,11 +8449,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowScriptlets** @@ -8514,11 +8514,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowSmartScreenIE** @@ -8581,11 +8581,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneAllowUserDataPersistence** @@ -8646,11 +8646,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneInitializeAndScriptActiveXControls** @@ -8713,11 +8713,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneJavaPermissions** @@ -8771,11 +8771,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownInternetZoneNavigateWindowsAndFrames** @@ -8836,11 +8836,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowAccessToDataSources** @@ -8901,11 +8901,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForActiveXControls** @@ -8966,11 +8966,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowAutomaticPromptingForFileDownloads** @@ -9029,11 +9029,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowFontDownloads** @@ -9094,11 +9094,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowLessPrivilegedSites** @@ -9159,11 +9159,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowNETFrameworkReliantComponents** @@ -9224,11 +9224,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowScriptlets** @@ -9289,11 +9289,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowSmartScreenIE** @@ -9356,11 +9356,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneAllowUserDataPersistence** @@ -9421,11 +9421,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneInitializeAndScriptActiveXControls** @@ -9488,11 +9488,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownIntranetZoneNavigateWindowsAndFrames** @@ -9553,11 +9553,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowAccessToDataSources** @@ -9618,11 +9618,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForActiveXControls** @@ -9683,11 +9683,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowAutomaticPromptingForFileDownloads** @@ -9746,11 +9746,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowFontDownloads** @@ -9811,11 +9811,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowLessPrivilegedSites** @@ -9876,11 +9876,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowNETFrameworkReliantComponents** @@ -9941,11 +9941,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowScriptlets** @@ -10006,11 +10006,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowSmartScreenIE** @@ -10073,11 +10073,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneAllowUserDataPersistence** @@ -10138,11 +10138,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneInitializeAndScriptActiveXControls** @@ -10205,11 +10205,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneJavaPermissions** @@ -10263,11 +10263,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownLocalMachineZoneNavigateWindowsAndFrames** @@ -10328,11 +10328,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAccessToDataSources** @@ -10393,11 +10393,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -10458,11 +10458,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -10521,11 +10521,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowFontDownloads** @@ -10586,11 +10586,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowLessPrivilegedSites** @@ -10651,11 +10651,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowNETFrameworkReliantComponents** @@ -10716,11 +10716,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowScriptlets** @@ -10781,11 +10781,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowSmartScreenIE** @@ -10848,11 +10848,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneAllowUserDataPersistence** @@ -10913,11 +10913,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneInitializeAndScriptActiveXControls** @@ -10980,11 +10980,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneJavaPermissions** @@ -11038,11 +11038,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownRestrictedSitesZoneNavigateWindowsAndFrames** @@ -11103,11 +11103,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowAccessToDataSources** @@ -11168,11 +11168,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -11233,11 +11233,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -11296,11 +11296,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowFontDownloads** @@ -11361,11 +11361,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowLessPrivilegedSites** @@ -11426,11 +11426,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowNETFrameworkReliantComponents** @@ -11491,11 +11491,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowScriptlets** @@ -11556,11 +11556,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowSmartScreenIE** @@ -11623,11 +11623,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneAllowUserDataPersistence** @@ -11688,11 +11688,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneInitializeAndScriptActiveXControls** @@ -11755,11 +11755,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneJavaPermissions** @@ -11813,11 +11813,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/LockedDownTrustedSitesZoneNavigateWindowsAndFrames** @@ -11878,11 +11878,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/MKProtocolSecurityRestrictionInternetExplorerProcesses** @@ -11936,11 +11936,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/MimeSniffingSafetyFeatureInternetExplorerProcesses** @@ -11994,11 +11994,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/NotificationBarInternetExplorerProcesses** @@ -12052,11 +12052,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/PreventManagingSmartScreenFilter** @@ -12110,11 +12110,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/PreventPerUserInstallationOfActiveXControls** @@ -12168,11 +12168,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/ProtectionFromZoneElevationInternetExplorerProcesses** @@ -12226,11 +12226,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RemoveRunThisTimeButtonForOutdatedActiveXControls** @@ -12284,11 +12284,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictActiveXInstallInternetExplorerProcesses** @@ -12342,11 +12342,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictFileDownloadInternetExplorerProcesses** @@ -12400,11 +12400,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowAccessToDataSources** @@ -12465,11 +12465,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowActiveScripting** @@ -12523,11 +12523,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -12588,11 +12588,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -12651,11 +12651,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowBinaryAndScriptBehaviors** @@ -12709,11 +12709,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowCopyPasteViaScript** @@ -12767,11 +12767,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowDragAndDropCopyAndPasteFiles** @@ -12825,11 +12825,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowFileDownloads** @@ -12883,11 +12883,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowFontDownloads** @@ -12948,11 +12948,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowLessPrivilegedSites** @@ -13013,11 +13013,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowLoadingOfXAMLFiles** @@ -13071,11 +13071,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowMETAREFRESH** @@ -13129,11 +13129,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowNETFrameworkReliantComponents** @@ -13194,11 +13194,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseActiveXControls** @@ -13252,11 +13252,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowOnlyApprovedDomainsToUseTDCActiveXControl** @@ -13310,11 +13310,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowScriptInitiatedWindows** @@ -13368,11 +13368,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowScriptingOfInternetExplorerWebBrowserControls** @@ -13426,11 +13426,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowScriptlets** @@ -13491,11 +13491,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowSmartScreenIE** @@ -13558,11 +13558,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowUpdatesToStatusBarViaScript** @@ -13616,11 +13616,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneAllowUserDataPersistence** @@ -13681,11 +13681,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -13739,11 +13739,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneDownloadSignedActiveXControls** @@ -13797,11 +13797,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneDownloadUnsignedActiveXControls** @@ -13855,11 +13855,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneEnableCrossSiteScriptingFilter** @@ -13913,11 +13913,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsAcrossWindows** @@ -13971,11 +13971,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneEnableDraggingOfContentFromDifferentDomainsWithinWindows** @@ -14029,11 +14029,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneEnableMIMESniffing** @@ -14087,11 +14087,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneIncludeLocalPathWhenUploadingFilesToServer** @@ -14145,11 +14145,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneInitializeAndScriptActiveXControls** @@ -14212,11 +14212,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneJavaPermissions** @@ -14270,11 +14270,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneLaunchingApplicationsAndFilesInIFRAME** @@ -14328,11 +14328,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneLogonOptions** @@ -14386,11 +14386,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneNavigateWindowsAndFrames** @@ -14451,11 +14451,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneRunActiveXControlsAndPlugins** @@ -14509,11 +14509,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneRunNETFrameworkReliantComponentsSignedWithAuthenticode** @@ -14567,11 +14567,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneScriptActiveXControlsMarkedSafeForScripting** @@ -14625,11 +14625,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneScriptingOfJavaApplets** @@ -14683,11 +14683,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneShowSecurityWarningForPotentiallyUnsafeFiles** @@ -14741,11 +14741,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneTurnOnProtectedMode** @@ -14799,11 +14799,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/RestrictedSitesZoneUsePopupBlocker** @@ -14857,11 +14857,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/ScriptedWindowSecurityRestrictionsInternetExplorerProcesses** @@ -14915,11 +14915,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/SearchProviderList** @@ -14978,11 +14978,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/SecurityZonesUseOnlyMachineSettings** @@ -15035,11 +15035,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/SpecifyUseOfActiveXInstallerService** @@ -15093,11 +15093,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowAccessToDataSources** @@ -15158,11 +15158,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForActiveXControls** @@ -15223,11 +15223,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowAutomaticPromptingForFileDownloads** @@ -15286,11 +15286,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowFontDownloads** @@ -15351,11 +15351,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowLessPrivilegedSites** @@ -15416,11 +15416,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowNETFrameworkReliantComponents** @@ -15481,11 +15481,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowScriptlets** @@ -15546,11 +15546,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowSmartScreenIE** @@ -15613,11 +15613,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneAllowUserDataPersistence** @@ -15678,11 +15678,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneDoNotRunAntimalwareAgainstActiveXControls** @@ -15736,11 +15736,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneInitializeAndScriptActiveXControls** @@ -15803,11 +15803,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneJavaPermissions** @@ -15861,11 +15861,11 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          - + **InternetExplorer/TrustedSitesZoneNavigateWindowsAndFrames** @@ -15926,7 +15926,7 @@ ADMX Info: - GP ADMX file name: *inetres.admx* - +
          Footnote: @@ -15935,5 +15935,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 7a2e9f901b..361a19a81c 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Kerberos @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Kerberos policies
          @@ -39,7 +39,7 @@ ms.date: 01/29/2018
          - + **Kerberos/AllowForestSearchOrder** @@ -97,11 +97,11 @@ ADMX Info: - GP ADMX file name: *Kerberos.admx* - +
          - + **Kerberos/KerberosClientSupportsClaimsCompoundArmor** @@ -158,11 +158,11 @@ ADMX Info: - GP ADMX file name: *Kerberos.admx* - +
          - + **Kerberos/RequireKerberosArmoring** @@ -224,11 +224,11 @@ ADMX Info: - GP ADMX file name: *Kerberos.admx* - +
          - + **Kerberos/RequireStrictKDCValidation** @@ -286,11 +286,11 @@ ADMX Info: - GP ADMX file name: *Kerberos.admx* - +
          - + **Kerberos/SetMaximumContextTokenSize** @@ -352,7 +352,7 @@ ADMX Info: - GP ADMX file name: *Kerberos.admx* - +
          Footnote: @@ -361,5 +361,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-kioskbrowser.md b/windows/client-management/mdm/policy-csp-kioskbrowser.md index 769c55b3dd..6606c038b3 100644 --- a/windows/client-management/mdm/policy-csp-kioskbrowser.md +++ b/windows/client-management/mdm/policy-csp-kioskbrowser.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - KioskBrowser @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## KioskBrowser policies
          @@ -44,7 +44,7 @@ ms.date: 01/29/2018
          - + **KioskBrowser/BlockedUrlExceptions** @@ -84,11 +84,11 @@ ms.date: 01/29/2018 Added in Windows 10, next major update. List of exceptions to the blocked website URLs (with wildcard support). This is used to configure URLs kiosk browsers are allowed to navigate to, which are a subset of the blocked URLs. - +
          - + **KioskBrowser/BlockedUrls** @@ -128,11 +128,11 @@ Added in Windows 10, next major update. List of exceptions to the blocked websit Added in Windows 10, next major update. List of blocked website URLs (with wildcard support). This is used to configure blocked URLs kiosk browsers cannot navigate to. - +
          - + **KioskBrowser/DefaultURL** @@ -172,11 +172,11 @@ Added in Windows 10, next major update. List of blocked website URLs (with wildc Added in Windows 10, next major update. Configures the default URL kiosk browsers to navigate on launch and restart. - +
          - + **KioskBrowser/EnableHomeButton** @@ -216,11 +216,11 @@ Added in Windows 10, next major update. Configures the default URL kiosk browser Added in Windows 10, next major update. Enable/disable kiosk browser's home button. - +
          - + **KioskBrowser/EnableNavigationButtons** @@ -260,11 +260,11 @@ Added in Windows 10, next major update. Enable/disable kiosk browser's home butt Added in Windows 10, next major update. Enable/disable kiosk browser's navigation buttons (forward/back). - +
          - + **KioskBrowser/RestartOnIdleTime** @@ -306,7 +306,7 @@ Added in Windows 10, next major update. Amount of time in minutes the session is The value is an int 1-1440 that specifies the amount of minutes the session is idle until the kiosk browser restarts in a fresh state. The default value is empty which means there is no idle timeout within the kiosk browser. - +
          Footnote: @@ -315,5 +315,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-licensing.md b/windows/client-management/mdm/policy-csp-licensing.md index 28751d2800..66109605f7 100644 --- a/windows/client-management/mdm/policy-csp-licensing.md +++ b/windows/client-management/mdm/policy-csp-licensing.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Licensing @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Licensing policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **Licensing/AllowWindowsEntitlementReactivation** @@ -76,11 +76,11 @@ The following list shows the supported values: - 1 (default) – Enable Windows license reactivation on managed devices. - +
          - + **Licensing/DisallowKMSClientOnlineAVSValidation** @@ -126,7 +126,7 @@ The following list shows the supported values: - 1 – Enabled. - +
          Footnote: @@ -135,5 +135,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md index 1207e03022..f67234078a 100644 --- a/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md +++ b/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - LocalPoliciesSecurityOptions @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## LocalPoliciesSecurityOptions policies
          @@ -191,7 +191,7 @@ ms.date: 01/29/2018
          - + **LocalPoliciesSecurityOptions/Accounts_BlockMicrosoftAccounts** @@ -245,11 +245,11 @@ The following list shows the supported values: - 1 - enabled (users cannot add Microsoft accounts). - +
          - + **LocalPoliciesSecurityOptions/Accounts_EnableAdministratorAccountStatus** @@ -303,11 +303,11 @@ Valid values: - 1 - local Administrator account is enabled - +
          - + **LocalPoliciesSecurityOptions/Accounts_EnableGuestAccountStatus** @@ -358,11 +358,11 @@ Valid values: - 1 - local Guest account is enabled - +
          - + **LocalPoliciesSecurityOptions/Accounts_LimitLocalAccountUseOfBlankPasswordsToConsoleLogonOnly** @@ -421,11 +421,11 @@ Valid values: - 1 - enabled - local accounts that are not password protected will only be able to log on at the computer's keyboard - +
          - + **LocalPoliciesSecurityOptions/Accounts_RenameAdministratorAccount** @@ -470,11 +470,11 @@ Default: Administrator. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/Accounts_RenameGuestAccount** @@ -519,11 +519,11 @@ Default: Guest. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/Devices_AllowUndockWithoutHavingToLogon** @@ -569,11 +569,11 @@ Caution: Disabling this policy may tempt users to try and physically remove the laptop from its docking station using methods other than the external hardware eject button. Since this may cause damage to the hardware, this setting, in general, should only be disabled on laptop configurations that are physically securable. - +
          - + **LocalPoliciesSecurityOptions/Devices_AllowedToFormatAndEjectRemovableMedia** @@ -619,11 +619,11 @@ This security setting determines who is allowed to format and eject removable NT Default: This policy is not defined and only Administrators have this ability. - +
          - + **LocalPoliciesSecurityOptions/Devices_PreventUsersFromInstallingPrinterDriversWhenConnectingToSharedPrinters** @@ -671,11 +671,11 @@ Note This setting does not affect the ability to add a local printer. This setting does not affect Administrators. - +
          - + **LocalPoliciesSecurityOptions/Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly** @@ -720,11 +720,11 @@ If this policy is enabled, it allows only the interactively logged-on user to ac Default: This policy is not defined and CD-ROM access is not restricted to the locally logged-on user. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptOrSignSecureChannelDataAlways** @@ -780,11 +780,11 @@ If this policy is enabled, the policy Domain member: Digitally sign secure chann Logon information transmitted over the secure channel is always encrypted regardless of whether encryption of ALL other secure channel traffic is negotiated or not. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_DigitallyEncryptSecureChannelDataWhenPossible** @@ -837,11 +837,11 @@ There is no known reason for disabling this setting. Besides unnecessarily reduc Note: Domain controllers are also domain members and establish secure channels with other domain controllers in the same domain as well as domain controllers in trusted domains. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_DigitallySignSecureChannelDataWhenPossible** @@ -888,11 +888,11 @@ This setting determines whether or not the domain member attempts to negotiate s Default: Enabled. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_DisableMachineAccountPasswordChanges** @@ -940,11 +940,11 @@ This security setting should not be enabled. Computer account passwords are used This setting should not be used in an attempt to support dual-boot scenarios that use the same computer account. If you want to dual-boot two installations that are joined to the same domain, give the two installations different computer names. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_MaximumMachineAccountPasswordAge** @@ -991,11 +991,11 @@ Important This setting applies to Windows 2000 computers, but it is not available through the Security Configuration Manager tools on these computers. - +
          - + **LocalPoliciesSecurityOptions/DomainMember_RequireStrongSessionKey** @@ -1053,11 +1053,11 @@ In order to take advantage of this policy on member workstations and servers, al In order to take advantage of this policy on domain controllers, all domain controllers in the same domain as well as all trusted domains must run Windows 2000 or later. - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_DisplayUserInformationWhenTheSessionIsLocked** @@ -1106,11 +1106,11 @@ Valid values: - 3 - Do not display user information - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayLastSignedIn** @@ -1164,11 +1164,11 @@ Valid values: - 1 - enabled (username will not be shown) - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotDisplayUsernameAtSignIn** @@ -1223,11 +1223,11 @@ Valid values: - 1 - enabled (username will not be shown) - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_DoNotRequireCTRLALTDEL** @@ -1283,11 +1283,11 @@ Valid values: - 1 - enabled (a user is not required to press CTRL+ALT+DEL to log on) - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_MachineInactivityLimit** @@ -1338,11 +1338,11 @@ Valid values: - 1 - enabled (session will lock after amount of inactive time exceeds the inactivity limit) - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTextForUsersAttemptingToLogOn** @@ -1389,11 +1389,11 @@ Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_MessageTitleForUsersAttemptingToLogOn** @@ -1438,11 +1438,11 @@ Default: No message. Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/InteractiveLogon_SmartCardRemovalBehavior** @@ -1502,11 +1502,11 @@ Default: This policy is not defined, which means that the system treats it as No On Windows Vista and above: For this setting to work, the Smart Card Removal Policy service must be started. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsAlways** @@ -1567,11 +1567,11 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_DigitallySignCommunicationsIfServerAgrees** @@ -1629,11 +1629,11 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkClient_SendUnencryptedPasswordToThirdPartySMBServers** @@ -1678,11 +1678,11 @@ Sending unencrypted passwords is a security risk. Default: Disabled. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_AmountOfIdleTimeRequiredBeforeSuspendingSession** @@ -1729,11 +1729,11 @@ For this policy setting, a value of 0 means to disconnect an idle session as qui Default:This policy is not defined, which means that the system treats it as 15 minutes for servers and undefined for workstations. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsAlways** @@ -1803,11 +1803,11 @@ HKLM\System\CurrentControlSet\Services\lanmanserver\parameters\enableW9xsecurity For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
          - + **LocalPoliciesSecurityOptions/MicrosoftNetworkServer_DigitallySignCommunicationsIfClientAgrees** @@ -1869,11 +1869,11 @@ SMB packet signing can significantly degrade SMB performance, depending on diale For more information, reference: https://go.microsoft.com/fwlink/?LinkID=787136. - +
          - + **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSAMAccounts** @@ -1928,11 +1928,11 @@ Important This policy has no impact on domain controllers. - +
          - + **LocalPoliciesSecurityOptions/NetworkAccess_DoNotAllowAnonymousEnumerationOfSamAccountsAndShares** @@ -1977,11 +1977,11 @@ Windows allows anonymous users to perform certain activities, such as enumeratin Default: Disabled. - +
          - + **LocalPoliciesSecurityOptions/NetworkAccess_LetEveryonePermissionsApplyToAnonymousUsers** @@ -2028,11 +2028,11 @@ If this policy is enabled, the Everyone SID is added to the token that is create Default: Disabled. - +
          - + **LocalPoliciesSecurityOptions/NetworkAccess_RestrictAnonymousAccessToNamedPipesAndShares** @@ -2077,11 +2077,11 @@ Network access: Shares that can be accessed anonymously Default: Enabled. - +
          - + **LocalPoliciesSecurityOptions/NetworkAccess_RestrictClientsAllowedToMakeRemoteCallsToSAM** @@ -2126,11 +2126,11 @@ If not selected, the default security descriptor will be used. This policy is supported on at least Windows Server 2016. - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_AllowLocalSystemToUseComputerIdentityForNTLM** @@ -2183,11 +2183,11 @@ This policy is supported on at least Windows Vista or Windows Server 2008. Note: Windows Vista or Windows Server 2008 do not expose this setting in Group Policy. - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_AllowPKU2UAuthenticationRequests** @@ -2237,11 +2237,11 @@ Valid values: - 1 - enabled (allow PKU2U authentication requests to this computer to use online identities.) - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_DoNotStoreLANManagerHashValueOnNextPasswordChange** @@ -2291,11 +2291,11 @@ Windows 2000 Service Pack 2 (SP2) and above offer compatibility with authenticat This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP, and the Windows Server 2003 family to communicate with computers running Windows 95 and Windows 98. - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_LANManagerAuthenticationLevel** @@ -2360,11 +2360,11 @@ Windows Server 2003: Send NTLM response only Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedClients** @@ -2414,11 +2414,11 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - +
          - + **LocalPoliciesSecurityOptions/NetworkSecurity_MinimumSessionSecurityForNTLMSSPBasedServers** @@ -2468,11 +2468,11 @@ Windows XP, Windows Vista, Windows 2000 Server, Windows Server 2003, and Windows Windows 7 and Windows Server 2008 R2: Require 128-bit encryption - +
          - + **LocalPoliciesSecurityOptions/RecoveryConsole_AllowAutomaticAdministrativeLogon** @@ -2514,11 +2514,11 @@ Valid values: - 1 - enabled (allow automatic administrative logon) - +
          - + **LocalPoliciesSecurityOptions/Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn** @@ -2574,11 +2574,11 @@ Valid values: - 1 - enabled (allow system to be shut down without having to log on) - +
          - + **LocalPoliciesSecurityOptions/Shutdown_ClearVirtualMemoryPageFile** @@ -2625,11 +2625,11 @@ When this policy is enabled, it causes the system pagefile to be cleared upon cl Default: Disabled. - +
          - + **LocalPoliciesSecurityOptions/SystemObjects_RequireCaseInsensitivityForNonWindowsSubsystems** @@ -2674,11 +2674,11 @@ If this setting is enabled, case insensitivity is enforced for all directory obj Default: Enabled. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_AllowUIAccessApplicationsToPromptForElevation** @@ -2733,11 +2733,11 @@ Valid values: - 1 - enabled (allow UIAccess applications to prompt for elevation without using the secure desktop) - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForAdministrators** @@ -2794,11 +2794,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_BehaviorOfTheElevationPromptForStandardUsers** @@ -2848,11 +2848,11 @@ The following list shows the supported values: - 3 (Default) - Prompt for credentials: When an operation requires elevation of privilege, the user is prompted to enter an administrative user name and password. If the user enters valid credentials, the operation continues with the applicable privilege. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_DetectApplicationInstallationsAndPromptForElevation** @@ -2899,11 +2899,11 @@ Enabled: (Default) When an application installation package is detected that req Disabled: Application installation packages are not detected and prompted for elevation. Enterprises that are running standard user desktops and use delegated installation technologies such as Group Policy Software Installation or Systems Management Server (SMS) should disable this policy setting. In this case, installer detection is unnecessary. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateExecutableFilesThatAreSignedAndValidated** @@ -2950,11 +2950,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_OnlyElevateUIAccessApplicationsThatAreInstalledInSecureLocations** @@ -3007,11 +3007,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_RunAllAdministratorsInAdminApprovalMode** @@ -3059,11 +3059,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_SwitchToTheSecureDesktopWhenPromptingForElevation** @@ -3110,11 +3110,11 @@ The options are: Value type is integer. Supported operations are Add, Get, Replace, and Delete. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_UseAdminApprovalMode** @@ -3161,11 +3161,11 @@ The options are: • Disabled: (Default) The built-in Administrator account runs all applications with full administrative privilege. - +
          - + **LocalPoliciesSecurityOptions/UserAccountControl_VirtualizeFileAndRegistryWriteFailuresToPerUserLocations** @@ -3215,7 +3215,7 @@ The following list shows the supported values: - 1 - Enabled: (Default) Application write failures are redirected at run time to defined user locations for both the file system and registry. - +
          Footnote: @@ -3224,5 +3224,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-location.md b/windows/client-management/mdm/policy-csp-location.md index 3d2a9f5773..ac9c25abfa 100644 --- a/windows/client-management/mdm/policy-csp-location.md +++ b/windows/client-management/mdm/policy-csp-location.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Location @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Location policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Location/EnableLocation** @@ -83,7 +83,7 @@ To validate on Desktop, do the following: 2. Use Windows Maps Application (or similar) to see if a location can or cannot be obtained. - +
          Footnote: @@ -92,5 +92,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-lockdown.md b/windows/client-management/mdm/policy-csp-lockdown.md index 38165bb182..a63d073566 100644 --- a/windows/client-management/mdm/policy-csp-lockdown.md +++ b/windows/client-management/mdm/policy-csp-lockdown.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - LockDown @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## LockDown policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **LockDown/AllowEdgeSwipe** @@ -75,7 +75,7 @@ The following list shows the supported values: - 1 (default, not configured) - allow edge swipe. - +
          Footnote: @@ -84,5 +84,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-maps.md b/windows/client-management/mdm/policy-csp-maps.md index d4c5ac8af2..4d5a5f55ec 100644 --- a/windows/client-management/mdm/policy-csp-maps.md +++ b/windows/client-management/mdm/policy-csp-maps.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Maps @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Maps policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **Maps/AllowOfflineMapsDownloadOverMeteredConnection** @@ -79,11 +79,11 @@ The following list shows the supported values: - 65535 (default) – Not configured. User's choice. - +
          - + **Maps/EnableOfflineMapsAutoUpdate** @@ -132,7 +132,7 @@ The following list shows the supported values: - 65535 (default) – Not configured. User's choice. - +
          Footnote: @@ -141,5 +141,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-messaging.md b/windows/client-management/mdm/policy-csp-messaging.md index 743c206a04..abd33e0f71 100644 --- a/windows/client-management/mdm/policy-csp-messaging.md +++ b/windows/client-management/mdm/policy-csp-messaging.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Messaging @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Messaging policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **Messaging/AllowMMS** @@ -82,11 +82,11 @@ The following list shows the supported values: - 1 (default) - Enabled. - +
          - + **Messaging/AllowMessageSync** @@ -132,11 +132,11 @@ The following list shows the supported values: - 1 - message sync is allowed. The user can change this setting. - +
          - + **Messaging/AllowRCS** @@ -185,7 +185,7 @@ The following list shows the supported values: - 1 (default) - Enabled. - +
          Footnote: @@ -194,5 +194,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index 1e104d4c8a..445d9a8d6d 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - NetworkIsolation @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## NetworkIsolation policies
          @@ -48,7 +48,7 @@ ms.date: 01/29/2018
          - + **NetworkIsolation/EnterpriseCloudResources** @@ -87,11 +87,11 @@ ms.date: 01/29/2018 Contains a list of Enterprise resource domains hosted in the cloud that need to be protected. Connections to these resources are considered enterprise data. If a proxy is paired with a cloud resource, traffic to the cloud resource will be routed through the enterprise network via the denoted proxy server (on Port 80). A proxy server used for this purpose must also be configured using the **EnterpriseInternalProxyServers** policy. This domain list is a pipe-separated list of cloud resources. Each cloud resource can also be paired optionally with an internal proxy server by using a trailing comma followed by the proxy address. For example, **<*cloudresource*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|<*cloudresource*>|<*cloudresource*>,<*proxy*>|**. - +
          - + **NetworkIsolation/EnterpriseIPRange** @@ -143,11 +143,11 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff ``` - +
          - + **NetworkIsolation/EnterpriseIPRangesAreAuthoritative** @@ -186,11 +186,11 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. - +
          - + **NetworkIsolation/EnterpriseInternalProxyServers** @@ -229,11 +229,11 @@ Boolean value that tells the client to accept the configured list and not to use This is the comma-separated list of internal proxy servers. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". These proxies have been configured by the admin to connect to specific resources on the Internet. They are considered to be enterprise network locations. The proxies are only leveraged in configuring the **EnterpriseCloudResources** policy to force traffic to the matched cloud resources through these proxies. - +
          - + **NetworkIsolation/EnterpriseNetworkDomainNames** @@ -282,11 +282,11 @@ Here are the steps to create canonical domain names: 3. Call [IdnToUnicode](https://msdn.microsoft.com/library/windows/desktop/dd318151.aspx) with no flags set (dwFlags = 0). - +
          - + **NetworkIsolation/EnterpriseProxyServers** @@ -325,11 +325,11 @@ Here are the steps to create canonical domain names: This is a comma-separated list of proxy servers. Any server on this list is considered non-enterprise. For example "157.54.14.28, 157.54.11.118, 10.202.14.167, 157.53.14.163, 157.69.210.59". - +
          - + **NetworkIsolation/EnterpriseProxyServersAreAuthoritative** @@ -368,11 +368,11 @@ This is a comma-separated list of proxy servers. Any server on this list is cons Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. - +
          - + **NetworkIsolation/NeutralResources** @@ -411,7 +411,7 @@ Boolean value that tells the client to accept the configured list of proxies and List of domain names that can used for work or personal resource. - +
          Footnote: @@ -420,5 +420,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-notifications.md b/windows/client-management/mdm/policy-csp-notifications.md index d9bb95050c..2f8a4559f5 100644 --- a/windows/client-management/mdm/policy-csp-notifications.md +++ b/windows/client-management/mdm/policy-csp-notifications.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Notifications @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Notifications policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Notifications/DisallowNotificationMirroring** @@ -77,7 +77,7 @@ The following list shows the supported values: - 1 - disable notification mirroring. - +
          Footnote: @@ -86,5 +86,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-power.md b/windows/client-management/mdm/policy-csp-power.md index 7ea180fcf7..5bc495e5d8 100644 --- a/windows/client-management/mdm/policy-csp-power.md +++ b/windows/client-management/mdm/policy-csp-power.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Power @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Power policies
          @@ -51,7 +51,7 @@ ms.date: 01/29/2018
          - + **Power/AllowStandbyWhenSleepingPluggedIn** @@ -109,11 +109,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/DisplayOffTimeoutOnBattery** @@ -173,11 +173,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/DisplayOffTimeoutPluggedIn** @@ -237,11 +237,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/HibernateTimeoutOnBattery** @@ -302,11 +302,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/HibernateTimeoutPluggedIn** @@ -366,11 +366,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/RequirePasswordWhenComputerWakesOnBattery** @@ -428,11 +428,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/RequirePasswordWhenComputerWakesPluggedIn** @@ -490,11 +490,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/StandbyTimeoutOnBattery** @@ -554,11 +554,11 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          - + **Power/StandbyTimeoutPluggedIn** @@ -618,7 +618,7 @@ ADMX Info: - GP ADMX file name: *power.admx* - +
          Footnote: @@ -627,5 +627,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-printers.md b/windows/client-management/mdm/policy-csp-printers.md index 709afa0ddb..2e10fa65e7 100644 --- a/windows/client-management/mdm/policy-csp-printers.md +++ b/windows/client-management/mdm/policy-csp-printers.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Printers @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Printers policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **Printers/PointAndPrintRestrictions** @@ -104,11 +104,11 @@ ADMX Info: - GP ADMX file name: *Printing.admx* - +
          - + **Printers/PointAndPrintRestrictions_User** @@ -179,11 +179,11 @@ ADMX Info: - GP ADMX file name: *Printing.admx* - +
          - + **Printers/PublishPrinters** @@ -243,7 +243,7 @@ ADMX Info: - GP ADMX file name: *Printing2.admx* - +
          Footnote: @@ -252,5 +252,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-privacy.md b/windows/client-management/mdm/policy-csp-privacy.md index 5422f5440f..c42149d2f1 100644 --- a/windows/client-management/mdm/policy-csp-privacy.md +++ b/windows/client-management/mdm/policy-csp-privacy.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Privacy @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Privacy policies
          @@ -255,7 +255,7 @@ ms.date: 01/29/2018
          - + **Privacy/AllowAutoAcceptPairingAndPrivacyConsentPrompts** @@ -307,11 +307,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **Privacy/AllowInputPersonalization** @@ -359,11 +359,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Privacy/DisableAdvertisingId** @@ -412,11 +412,11 @@ The following list shows the supported values: - 65535 (default)- Not configured. - +
          - + **Privacy/EnableActivityFeed** @@ -462,11 +462,11 @@ The following list shows the supported values: - 1 – (default) Enabled. Apps/OS can publish the activities and will be roamed across device graph. - +
          - + **Privacy/LetAppsAccessAccountInfo** @@ -516,11 +516,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessAccountInfo_ForceAllowTheseApps** @@ -559,11 +559,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessAccountInfo_ForceDenyTheseApps** @@ -602,11 +602,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to account information. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessAccountInfo_UserInControlOfTheseApps** @@ -645,11 +645,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the account information privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessAccountInfo policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCalendar** @@ -699,11 +699,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessCalendar_ForceAllowTheseApps** @@ -742,11 +742,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCalendar_ForceDenyTheseApps** @@ -785,11 +785,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to the calendar. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCalendar_UserInControlOfTheseApps** @@ -828,11 +828,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the calendar privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCalendar policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCallHistory** @@ -882,11 +882,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessCallHistory_ForceAllowTheseApps** @@ -925,11 +925,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are allowed access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCallHistory_ForceDenyTheseApps** @@ -968,11 +968,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. Listed Windows apps are denied access to call history. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCallHistory_UserInControlOfTheseApps** @@ -1011,11 +1011,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Windows apps. The user is able to control the call history privacy setting for the listed Windows apps. This setting overrides the default LetAppsAccessCallHistory policy setting for the specified Windows apps. - +
          - + **Privacy/LetAppsAccessCamera** @@ -1065,11 +1065,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessCamera_ForceAllowTheseApps** @@ -1108,11 +1108,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessCamera_ForceDenyTheseApps** @@ -1151,11 +1151,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the camera. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessCamera_UserInControlOfTheseApps** @@ -1194,11 +1194,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the camera privacy setting for the listed apps. This setting overrides the default LetAppsAccessCamera policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessContacts** @@ -1248,11 +1248,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessContacts_ForceAllowTheseApps** @@ -1291,11 +1291,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessContacts_ForceDenyTheseApps** @@ -1334,11 +1334,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to contacts. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessContacts_UserInControlOfTheseApps** @@ -1377,11 +1377,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the contacts privacy setting for the listed apps. This setting overrides the default LetAppsAccessContacts policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessEmail** @@ -1431,11 +1431,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessEmail_ForceAllowTheseApps** @@ -1474,11 +1474,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessEmail_ForceDenyTheseApps** @@ -1517,11 +1517,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to email. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessEmail_UserInControlOfTheseApps** @@ -1560,11 +1560,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the email privacy setting for the listed apps. This setting overrides the default LetAppsAccessEmail policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessLocation** @@ -1614,11 +1614,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessLocation_ForceAllowTheseApps** @@ -1657,11 +1657,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessLocation_ForceDenyTheseApps** @@ -1700,11 +1700,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to location. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessLocation_UserInControlOfTheseApps** @@ -1743,11 +1743,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the location privacy setting for the listed apps. This setting overrides the default LetAppsAccessLocation policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMessaging** @@ -1797,11 +1797,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessMessaging_ForceAllowTheseApps** @@ -1840,11 +1840,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMessaging_ForceDenyTheseApps** @@ -1883,11 +1883,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to read or send messages (text or MMS). This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMessaging_UserInControlOfTheseApps** @@ -1926,11 +1926,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the messaging privacy setting for the listed apps. This setting overrides the default LetAppsAccessMessaging policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMicrophone** @@ -1980,11 +1980,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessMicrophone_ForceAllowTheseApps** @@ -2023,11 +2023,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMicrophone_ForceDenyTheseApps** @@ -2066,11 +2066,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to the microphone. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMicrophone_UserInControlOfTheseApps** @@ -2109,11 +2109,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the microphone privacy setting for the listed apps. This setting overrides the default LetAppsAccessMicrophone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMotion** @@ -2163,11 +2163,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessMotion_ForceAllowTheseApps** @@ -2206,11 +2206,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMotion_ForceDenyTheseApps** @@ -2249,11 +2249,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to motion data. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessMotion_UserInControlOfTheseApps** @@ -2292,11 +2292,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the motion privacy setting for the listed apps. This setting overrides the default LetAppsAccessMotion policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessNotifications** @@ -2346,11 +2346,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessNotifications_ForceAllowTheseApps** @@ -2389,11 +2389,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessNotifications_ForceDenyTheseApps** @@ -2432,11 +2432,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to notifications. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessNotifications_UserInControlOfTheseApps** @@ -2475,11 +2475,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the notifications privacy setting for the listed apps. This setting overrides the default LetAppsAccessNotifications policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessPhone** @@ -2529,11 +2529,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessPhone_ForceAllowTheseApps** @@ -2572,11 +2572,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessPhone_ForceDenyTheseApps** @@ -2615,11 +2615,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are not allowed to make phone calls. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessPhone_UserInControlOfTheseApps** @@ -2658,11 +2658,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the phone call privacy setting for the listed apps. This setting overrides the default LetAppsAccessPhone policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessRadios** @@ -2712,11 +2712,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessRadios_ForceAllowTheseApps** @@ -2755,11 +2755,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessRadios_ForceDenyTheseApps** @@ -2798,11 +2798,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to control radios. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessRadios_UserInControlOfTheseApps** @@ -2841,11 +2841,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the radios privacy setting for the listed apps. This setting overrides the default LetAppsAccessRadios policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTasks** @@ -2884,11 +2884,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1703. Specifies whether Windows apps can access tasks. - +
          - + **Privacy/LetAppsAccessTasks_ForceAllowTheseApps** @@ -2927,11 +2927,11 @@ Added in Windows 10, version 1703. Specifies whether Windows apps can access tas Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are allowed access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTasks_ForceDenyTheseApps** @@ -2970,11 +2970,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied access to tasks. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTasks_UserInControlOfTheseApps** @@ -3013,11 +3013,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family N Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the tasks privacy setting for the listed apps. This setting overrides the default LetAppsAccessTasks policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTrustedDevices** @@ -3067,11 +3067,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsAccessTrustedDevices_ForceAllowTheseApps** @@ -3110,11 +3110,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTrustedDevices_ForceDenyTheseApps** @@ -3153,11 +3153,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to trusted devices. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
          - + **Privacy/LetAppsAccessTrustedDevices_UserInControlOfTheseApps** @@ -3196,11 +3196,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'trusted devices' privacy setting for the listed apps. This setting overrides the default LetAppsAccessTrustedDevices policy setting for the specified apps. - +
          - + **Privacy/LetAppsGetDiagnosticInfo** @@ -3250,11 +3250,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsGetDiagnosticInfo_ForceAllowTheseApps** @@ -3293,11 +3293,11 @@ The following list shows the supported values: Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
          - + **Privacy/LetAppsGetDiagnosticInfo_ForceDenyTheseApps** @@ -3336,11 +3336,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to diagnostic information about other running apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
          - + **Privacy/LetAppsGetDiagnosticInfo_UserInControlOfTheseApps** @@ -3379,11 +3379,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'get diagnostic info' privacy setting for the listed apps. This setting overrides the default LetAppsGetDiagnosticInfo policy setting for the specified apps. - +
          - + **Privacy/LetAppsRunInBackground** @@ -3435,11 +3435,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsRunInBackground_ForceAllowTheseApps** @@ -3478,11 +3478,11 @@ The following list shows the supported values: Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are able to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
          - + **Privacy/LetAppsRunInBackground_ForceDenyTheseApps** @@ -3521,11 +3521,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps are denied the ability to run in the background. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
          - + **Privacy/LetAppsRunInBackground_UserInControlOfTheseApps** @@ -3564,11 +3564,11 @@ Added in Windows 10, version 1703. List of semi-colon delimited Package Family Added in Windows 10, version 1703. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the background apps privacy setting for the listed apps. This setting overrides the default LetAppsRunInBackground policy setting for the specified apps. - +
          - + **Privacy/LetAppsSyncWithDevices** @@ -3618,11 +3618,11 @@ The following list shows the supported values: - 2 - Force deny. - +
          - + **Privacy/LetAppsSyncWithDevices_ForceAllowTheseApps** @@ -3661,11 +3661,11 @@ The following list shows the supported values: Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
          - + **Privacy/LetAppsSyncWithDevices_ForceDenyTheseApps** @@ -3704,11 +3704,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. Listed apps will not have access to sync with devices. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
          - + **Privacy/LetAppsSyncWithDevices_UserInControlOfTheseApps** @@ -3747,11 +3747,11 @@ Added in Windows 10, version 1607. List of semi-colon delimited Package Family Added in Windows 10, version 1607. List of semi-colon delimited Package Family Names of Microsoft Store Apps. The user is able to control the 'sync with devices' privacy setting for the listed apps. This setting overrides the default LetAppsSyncWithDevices policy setting for the specified apps. - +
          - + **Privacy/PublishUserActivities** @@ -3797,7 +3797,7 @@ The following list shows the supported values: - 1 – (default) Enabled. Apps/OS can publish the *user activities*. - +
          Footnote: @@ -3806,7 +3806,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Privacy policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-remoteassistance.md b/windows/client-management/mdm/policy-csp-remoteassistance.md index 1cf07a4456..79ab76a706 100644 --- a/windows/client-management/mdm/policy-csp-remoteassistance.md +++ b/windows/client-management/mdm/policy-csp-remoteassistance.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - RemoteAssistance @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## RemoteAssistance policies
          @@ -36,7 +36,7 @@ ms.date: 01/29/2018
          - + **RemoteAssistance/CustomizeWarningMessages** @@ -100,11 +100,11 @@ ADMX Info: - GP ADMX file name: *remoteassistance.admx* - +
          - + **RemoteAssistance/SessionLogging** @@ -164,11 +164,11 @@ ADMX Info: - GP ADMX file name: *remoteassistance.admx* - +
          - + **RemoteAssistance/SolicitedRemoteAssistance** @@ -236,11 +236,11 @@ ADMX Info: - GP ADMX file name: *remoteassistance.admx* - +
          - + **RemoteAssistance/UnsolicitedRemoteAssistance** @@ -331,7 +331,7 @@ ADMX Info: - GP ADMX file name: *remoteassistance.admx* - +
          Footnote: @@ -340,5 +340,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-remotedesktopservices.md b/windows/client-management/mdm/policy-csp-remotedesktopservices.md index 2c808afadf..79615e7c27 100644 --- a/windows/client-management/mdm/policy-csp-remotedesktopservices.md +++ b/windows/client-management/mdm/policy-csp-remotedesktopservices.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - RemoteDesktopServices @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## RemoteDesktopServices policies
          @@ -42,7 +42,7 @@ ms.date: 01/29/2018
          - + **RemoteDesktopServices/AllowUsersToConnectRemotely** @@ -106,11 +106,11 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          - + **RemoteDesktopServices/ClientConnectionEncryptionLevel** @@ -178,11 +178,11 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          - + **RemoteDesktopServices/DoNotAllowDriveRedirection** @@ -244,11 +244,11 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          - + **RemoteDesktopServices/DoNotAllowPasswordSaving** @@ -306,11 +306,11 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          - + **RemoteDesktopServices/PromptForPasswordUponConnection** @@ -374,11 +374,11 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          - + **RemoteDesktopServices/RequireSecureRPCCommunication** @@ -442,7 +442,7 @@ ADMX Info: - GP ADMX file name: *terminalserver.admx* - +
          Footnote: @@ -451,5 +451,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-remotemanagement.md b/windows/client-management/mdm/policy-csp-remotemanagement.md index 141fbaed7e..609bfc4763 100644 --- a/windows/client-management/mdm/policy-csp-remotemanagement.md +++ b/windows/client-management/mdm/policy-csp-remotemanagement.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - RemoteManagement @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## RemoteManagement policies
          @@ -69,7 +69,7 @@ ms.date: 01/29/2018
          - + **RemoteManagement/AllowBasicAuthentication_Client** @@ -122,11 +122,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowBasicAuthentication_Service** @@ -179,11 +179,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowCredSSPAuthenticationClient** @@ -236,11 +236,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowCredSSPAuthenticationService** @@ -293,11 +293,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowRemoteServerManagement** @@ -350,11 +350,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowUnencryptedTraffic_Client** @@ -407,11 +407,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/AllowUnencryptedTraffic_Service** @@ -464,11 +464,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/DisallowDigestAuthentication** @@ -521,11 +521,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/DisallowNegotiateAuthenticationClient** @@ -578,11 +578,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/DisallowNegotiateAuthenticationService** @@ -635,11 +635,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/DisallowStoringOfRunAsCredentials** @@ -692,11 +692,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/SpecifyChannelBindingTokenHardeningLevel** @@ -749,11 +749,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/TrustedHosts** @@ -806,11 +806,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/TurnOnCompatibilityHTTPListener** @@ -863,11 +863,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          - + **RemoteManagement/TurnOnCompatibilityHTTPSListener** @@ -920,7 +920,7 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteManagement.admx* - +
          Footnote: @@ -929,5 +929,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md index 6038112891..16adbb0e97 100644 --- a/windows/client-management/mdm/policy-csp-remoteprocedurecall.md +++ b/windows/client-management/mdm/policy-csp-remoteprocedurecall.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - RemoteProcedureCall @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## RemoteProcedureCall policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **RemoteProcedureCall/RPCEndpointMapperClientAuthentication** @@ -92,11 +92,11 @@ ADMX Info: - GP ADMX file name: *rpc.admx* - +
          - + **RemoteProcedureCall/RestrictUnauthenticatedRPCClients** @@ -166,7 +166,7 @@ ADMX Info: - GP ADMX file name: *rpc.admx* - +
          Footnote: @@ -175,5 +175,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-remoteshell.md b/windows/client-management/mdm/policy-csp-remoteshell.md index d1a746424c..5f9c72ad15 100644 --- a/windows/client-management/mdm/policy-csp-remoteshell.md +++ b/windows/client-management/mdm/policy-csp-remoteshell.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - RemoteShell @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## RemoteShell policies
          @@ -45,7 +45,7 @@ ms.date: 01/29/2018
          - + **RemoteShell/AllowRemoteShellAccess** @@ -98,11 +98,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/MaxConcurrentUsers** @@ -155,11 +155,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/SpecifyIdleTimeout** @@ -212,11 +212,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/SpecifyMaxMemory** @@ -269,11 +269,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/SpecifyMaxProcesses** @@ -326,11 +326,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/SpecifyMaxRemoteShells** @@ -383,11 +383,11 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          - + **RemoteShell/SpecifyShellTimeout** @@ -440,7 +440,7 @@ ADMX Info: - GP ADMX file name: *WindowsRemoteShell.admx* - +
          Footnote: @@ -449,5 +449,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-search.md b/windows/client-management/mdm/policy-csp-search.md index 743ea8568e..616c8eb992 100644 --- a/windows/client-management/mdm/policy-csp-search.md +++ b/windows/client-management/mdm/policy-csp-search.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Search @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Search policies
          @@ -68,7 +68,7 @@ ms.date: 01/29/2018
          - + **Search/AllowCloudSearch** @@ -114,11 +114,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Search/AllowCortanaInAAD** @@ -164,11 +164,11 @@ The following list shows the supported values: - 1 - Allowed. The Cortana consent page will appear in Azure AAD OOBE during setup. - +
          - + **Search/AllowIndexingEncryptedStoresOrItems** @@ -220,11 +220,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Search/AllowSearchToUseLocation** @@ -272,11 +272,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Search/AllowStoringImagesFromVisionSearch** @@ -292,11 +292,11 @@ The following list shows the supported values: This policy has been deprecated. - +
          - + **Search/AllowUsingDiacritics** @@ -345,11 +345,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Search/AllowWindowsIndexer** @@ -388,11 +388,11 @@ The following list shows the supported values: Allow Windows indexer. Value type is integer. - +
          - + **Search/AlwaysUseAutoLangDetection** @@ -441,11 +441,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Search/DisableBackoff** @@ -491,11 +491,11 @@ The following list shows the supported values: - 1 – Enable. - +
          - + **Search/DisableRemovableDriveIndexing** @@ -545,11 +545,11 @@ The following list shows the supported values: - 1 – Enable. - +
          - + **Search/DoNotUseWebResults** @@ -600,11 +600,11 @@ The following list shows the supported values: - 1 (default) - Allowed. Queries will be performed on the web and web results will be displayed when a user performs a query in Search. - +
          - + **Search/PreventIndexingLowDiskSpaceMB** @@ -654,11 +654,11 @@ The following list shows the supported values: - 1 (default) – Enable. - +
          - + **Search/PreventRemoteQueries** @@ -704,11 +704,11 @@ The following list shows the supported values: - 1 (default) – Enable. - +
          - + **Search/SafeSearchPermissions** @@ -761,7 +761,7 @@ The following list shows the supported values: - 1 (default) – Moderate filtering against adult content (valid search results will not be filtered). - +
          Footnote: @@ -770,7 +770,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Search policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 8d7edec458..fa48adfe0d 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Security @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Security policies
          @@ -59,7 +59,7 @@ ms.date: 01/29/2018
          - + **Security/AllowAddProvisioningPackage** @@ -105,11 +105,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Security/AllowAutomaticDeviceEncryptionForAzureADJoinedDevices** @@ -155,11 +155,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Security/AllowManualRootCertificateInstallation** @@ -211,11 +211,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Security/AllowRemoveProvisioningPackage** @@ -261,11 +261,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Security/AntiTheftMode** @@ -315,11 +315,11 @@ The following list shows the supported values: - 1 (default) – Anti Theft Mode will follow the default device configuration (region-dependent). - +
          - + **Security/ClearTPMIfNotReady** @@ -368,11 +368,11 @@ The following list shows the supported values: - 1 – Will prompt to clear the TPM if the TPM is in a non-ready state (or reduced functionality) which can be remediated with a TPM Clear. - +
          - + **Security/ConfigureWindowsPasswords** @@ -422,11 +422,11 @@ The following list shows the supported values: - 2- Default (Feature defaults as per SKU and device capabilities. Windows 10 S devices will exhibit "Disallow passwords" default, and all other devices will default to "Allow passwords") - +
          - + **Security/PreventAutomaticDeviceEncryptionForAzureADJoinedDevices** @@ -478,11 +478,11 @@ The following list shows the supported values: - 1 – Encryption disabled. - +
          - + **Security/RequireDeviceEncryption** @@ -534,11 +534,11 @@ The following list shows the supported values: - 1 – Encryption is required. - +
          - + **Security/RequireProvisioningPackageSignature** @@ -584,11 +584,11 @@ The following list shows the supported values: - 1 – Required. - +
          - + **Security/RequireRetrieveHealthCertificateOnBoot** @@ -646,7 +646,7 @@ The following list shows the supported values: - 1 – Required. - +
          Footnote: @@ -655,7 +655,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Security policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-settings.md b/windows/client-management/mdm/policy-csp-settings.md index 1ba96f10d0..bd6a64ba12 100644 --- a/windows/client-management/mdm/policy-csp-settings.md +++ b/windows/client-management/mdm/policy-csp-settings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Settings @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Settings policies
          @@ -68,7 +68,7 @@ ms.date: 01/29/2018
          - + **Settings/AllowAutoPlay** @@ -121,11 +121,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowDataSense** @@ -171,11 +171,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowDateTime** @@ -221,11 +221,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowEditDeviceName** @@ -271,11 +271,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowLanguage** @@ -325,11 +325,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowOnlineTips** @@ -370,11 +370,11 @@ Enables or disables the retrieval of online tips and help for the Settings app. If disabled, Settings will not contact Microsoft content services to retrieve tips and help content. - +
          - + **Settings/AllowPowerSleep** @@ -424,11 +424,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowRegion** @@ -478,11 +478,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowSignInOptions** @@ -532,11 +532,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowVPN** @@ -582,11 +582,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowWorkplace** @@ -636,11 +636,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/AllowYourAccount** @@ -686,11 +686,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **Settings/ConfigureTaskbarCalendar** @@ -738,11 +738,11 @@ The following list shows the supported values: - 3 - Traditional Chinese (Lunar). - +
          - + **Settings/PageVisibilityList** @@ -813,7 +813,7 @@ To validate on Desktop, do the following: 3. Open System Settings again and verify that the About page is no longer accessible. - +
          Footnote: @@ -822,7 +822,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Settings policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-smartscreen.md b/windows/client-management/mdm/policy-csp-smartscreen.md index 27398259c1..f52bfb67a6 100644 --- a/windows/client-management/mdm/policy-csp-smartscreen.md +++ b/windows/client-management/mdm/policy-csp-smartscreen.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - SmartScreen @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## SmartScreen policies
          @@ -33,7 +33,7 @@ ms.date: 01/29/2018
          - + **SmartScreen/EnableAppInstallControl** @@ -79,11 +79,11 @@ The following list shows the supported values: - 1 – Turns on Application Installation Control, allowing users to only install apps from the Store. - +
          - + **SmartScreen/EnableSmartScreenInShell** @@ -129,11 +129,11 @@ The following list shows the supported values: - 1 – Turns on SmartScreen in Windows. - +
          - + **SmartScreen/PreventOverrideForFilesInShell** @@ -179,7 +179,7 @@ The following list shows the supported values: - 1 – Employees cannot ignore SmartScreen warnings and run malicious files. - +
          Footnote: @@ -188,5 +188,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-speech.md b/windows/client-management/mdm/policy-csp-speech.md index 2c38f752bb..e5c27c3200 100644 --- a/windows/client-management/mdm/policy-csp-speech.md +++ b/windows/client-management/mdm/policy-csp-speech.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Speech @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Speech policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **Speech/AllowSpeechModelUpdate** @@ -73,7 +73,7 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          Footnote: @@ -82,5 +82,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index eabc6aabe7..e8122802b3 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Start @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Start policies
          @@ -111,7 +111,7 @@ ms.date: 01/29/2018
          - + **Start/AllowPinnedFolderDocuments** @@ -158,11 +158,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderDownloads** @@ -209,11 +209,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderFileExplorer** @@ -260,11 +260,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderHomeGroup** @@ -311,11 +311,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderMusic** @@ -362,11 +362,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderNetwork** @@ -413,11 +413,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderPersonalFolder** @@ -464,11 +464,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderPictures** @@ -515,11 +515,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderSettings** @@ -566,11 +566,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/AllowPinnedFolderVideos** @@ -617,11 +617,11 @@ The following list shows the supported values: - 65535 (default) - There is no enforced configuration and the setting can be changed by the user. - +
          - + **Start/ForceStartSize** @@ -675,11 +675,11 @@ The following list shows the supported values: - 2 - Force a fullscreen size of Start. - +
          - + **Start/HideAppList** @@ -741,11 +741,11 @@ The following list shows the supported values: - 3 - Hide all apps list, remove all apps button, and Disable "Show app list in Start menu" in Settings app. - +
          - + **Start/HideChangeAccountSettings** @@ -798,11 +798,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the user tile, and verify that "Change account settings" is not available. - +
          - + **Start/HideFrequentlyUsedApps** @@ -862,11 +862,11 @@ To validate on Desktop, do the following: 6. Check that most used apps do not appear in Start. - +
          - + **Start/HideHibernate** @@ -923,11 +923,11 @@ To validate on Laptop, do the following: 2. Open Start, click on the Power button, and verify "Hibernate" is not available. - +
          - + **Start/HideLock** @@ -980,11 +980,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the user tile, and verify "Lock" is not available. - +
          - + **Start/HidePeopleBar** @@ -1025,11 +1025,11 @@ Added in Windows 10, version 1709. Enabling this policy removes the people icon Value type is integer. - +
          - + **Start/HidePowerButton** @@ -1085,11 +1085,11 @@ To validate on Desktop, do the following: 2. Open Start, and verify the power button is not available. - +
          - + **Start/HideRecentJumplists** @@ -1152,11 +1152,11 @@ To validate on Desktop, do the following: 9. Right Click pinned photos app and verify that there is no jumplist of recent items. - +
          - + **Start/HideRecentlyAddedApps** @@ -1216,11 +1216,11 @@ To validate on Desktop, do the following: 6. Check that recently added apps do not appear in Start. - +
          - + **Start/HideRestart** @@ -1273,11 +1273,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the Power button, and verify "Restart" and "Update and restart" are not available. - +
          - + **Start/HideShutDown** @@ -1330,11 +1330,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the Power button, and verify "Shut down" and "Update and shut down" are not available. - +
          - + **Start/HideSignOut** @@ -1387,11 +1387,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the user tile, and verify "Sign out" is not available. - +
          - + **Start/HideSleep** @@ -1444,11 +1444,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the Power button, and verify that "Sleep" is not available. - +
          - + **Start/HideSwitchAccount** @@ -1501,11 +1501,11 @@ To validate on Desktop, do the following: 2. Open Start, click on the user tile, and verify that "Switch account" is not available. - +
          - + **Start/HideUserTile** @@ -1562,11 +1562,11 @@ To validate on Desktop, do the following: 3. Log in, and verify that the user tile is gone from Start. - +
          - + **Start/ImportEdgeAssets** @@ -1622,11 +1622,11 @@ To validate on Desktop, do the following: 4. Verify that all Edge assets defined in XML show up in %LOCALAPPDATA%\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState path. - +
          - + **Start/NoPinningToTaskbar** @@ -1682,11 +1682,11 @@ To validate on Desktop, do the following: 5. Verify that More->Pin to taskbar menu does not show. - +
          - + **Start/StartLayout** @@ -1731,7 +1731,7 @@ Allows you to override the default Start layout and prevents the user from chang For further details on how to customize the Start layout, please see [Customize and export Start layout](https://docs.microsoft.com/en-us/windows/configuration/customize-and-export-start-layout) and [Configure Windows 10 taskbar](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-10-taskbar). - +
          Footnote: @@ -1740,5 +1740,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-storage.md b/windows/client-management/mdm/policy-csp-storage.md index b7bc8809d4..dbcdfe8bd5 100644 --- a/windows/client-management/mdm/policy-csp-storage.md +++ b/windows/client-management/mdm/policy-csp-storage.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Storage @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## Storage policies
          @@ -30,7 +30,7 @@ ms.date: 01/29/2018
          - + **Storage/AllowDiskHealthModelUpdates** @@ -80,11 +80,11 @@ The following list shows the supported values: - 1 (default) - Allow - +
          - + **Storage/EnhancedStorageDevices** @@ -142,7 +142,7 @@ ADMX Info: - GP ADMX file name: *enhancedstorage.admx* - +
          Footnote: @@ -151,5 +151,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index f7c6e8a3f8..f45d4b3ddc 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - System @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## System policies
          @@ -71,7 +71,7 @@ ms.date: 01/29/2018
          - + **System/AllowBuildPreview** @@ -124,11 +124,11 @@ The following list shows the supported values: - 2 (default) – Not configured. Users can make their devices available for downloading and installing preview software. - +
          - + **System/AllowEmbeddedMode** @@ -176,11 +176,11 @@ The following list shows the supported values: - 1 – Allowed. - +
          - + **System/AllowExperimentation** @@ -233,11 +233,11 @@ The following list shows the supported values: - 2 – Allows Microsoft to conduct full experimentations. - +
          - + **System/AllowFontProviders** @@ -296,11 +296,11 @@ To verify if System/AllowFontProviders is set to true: - After a client machine is rebooted, check whether there is any network traffic from client machine to fs.microsoft.com. - +
          - + **System/AllowLocation** @@ -356,11 +356,11 @@ The following list shows the supported values: - 2 – Force Location On. All Location Privacy settings are toggled on and greyed out. Users cannot change the settings and all consent permissions will be automatically suppressed. - +
          - + **System/AllowStorageCard** @@ -408,11 +408,11 @@ The following list shows the supported values: - 1 (default) – Allow a storage card. - +
          - + **System/AllowTelemetry** @@ -527,11 +527,11 @@ Windows 10 Values: Most restricted value is 0. - +
          - + **System/AllowUserToResetPhone** @@ -580,11 +580,11 @@ orted values: - 1 (default) – Allowed to reset to factory default settings. - +
          - + **System/BootStartDriverInitialization** @@ -636,11 +636,11 @@ ADMX Info: - GP ADMX file name: *earlylauncham.admx* - +
          - + **System/DisableEnterpriseAuthProxy** @@ -679,11 +679,11 @@ ADMX Info: This policy setting blocks the Connected User Experience and Telemetry service from automatically using an authenticated proxy to send data back to Microsoft on Windows 10. If you disable or do not configure this policy setting, the Connected User Experience and Telemetry service will automatically use an authenticated proxy to send data back to Microsoft. Enabling this policy will block the Connected User Experience and Telemetry service from automatically using an authenticated proxy. - +
          - + **System/DisableOneDriveFileSync** @@ -745,11 +745,11 @@ To validate on Desktop, do the following: 3. Verify that OneDrive.exe is not running in Task Manager. - +
          - + **System/DisableSystemRestore** @@ -813,11 +813,11 @@ ADMX Info: - GP ADMX file name: *systemrestore.admx* - +
          - + **System/FeedbackHubAlwaysSaveDiagnosticsLocally** @@ -863,11 +863,11 @@ The following list shows the supported values: - 1 - True. The Feedback Hub should always save a local copy of diagnostics that may be created when a feedback is submitted. - +
          - + **System/LimitEnhancedDiagnosticDataWindowsAnalytics** @@ -919,11 +919,11 @@ Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combina If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. - +
          - + **System/TelemetryProxy** @@ -964,7 +964,7 @@ Allows you to specify the fully qualified domain name (FQDN) or IP address of a If you disable or do not configure this policy setting, Connected User Experiences and Telemetry will go to Microsoft using the default proxy configuration. - +
          Footnote: @@ -973,7 +973,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## System policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-systemservices.md b/windows/client-management/mdm/policy-csp-systemservices.md index e717d43451..7071a57f68 100644 --- a/windows/client-management/mdm/policy-csp-systemservices.md +++ b/windows/client-management/mdm/policy-csp-systemservices.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - SystemServices @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## SystemServices policies
          @@ -44,7 +44,7 @@ ms.date: 01/29/2018
          - + **SystemServices/ConfigureHomeGroupListenerServiceStartupMode** @@ -83,11 +83,11 @@ ms.date: 01/29/2018 Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          - + **SystemServices/ConfigureHomeGroupProviderServiceStartupMode** @@ -126,11 +126,11 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          - + **SystemServices/ConfigureXboxAccessoryManagementServiceStartupMode** @@ -169,11 +169,11 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          - + **SystemServices/ConfigureXboxLiveAuthManagerServiceStartupMode** @@ -212,11 +212,11 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          - + **SystemServices/ConfigureXboxLiveGameSaveServiceStartupMode** @@ -255,11 +255,11 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          - + **SystemServices/ConfigureXboxLiveNetworkingServiceStartupMode** @@ -298,7 +298,7 @@ Added in Windows 10, next major update. This setting determines whether the serv Added in Windows 10, next major update. This setting determines whether the service's start type is Automaic(2), Manual(3), Disabled(4). Default: Manual. - +
          Footnote: @@ -307,5 +307,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-taskscheduler.md b/windows/client-management/mdm/policy-csp-taskscheduler.md index 0da5ed456d..e55edde857 100644 --- a/windows/client-management/mdm/policy-csp-taskscheduler.md +++ b/windows/client-management/mdm/policy-csp-taskscheduler.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - TaskScheduler @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## TaskScheduler policies
          @@ -29,7 +29,7 @@ ms.date: 01/29/2018
          - + **TaskScheduler/EnableXboxGameSaveTask** @@ -68,7 +68,7 @@ ms.date: 01/29/2018 Added in Windows 10, next major update. This setting determines whether the specific task is enabled (1) or disabled (0). Default: Enabled. - +
          Footnote: @@ -77,5 +77,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index e712a54e76..ef51165474 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - TextInput @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## TextInput policies
          @@ -68,7 +68,7 @@ ms.date: 01/29/2018
          - + **TextInput/AllowIMELogging** @@ -120,11 +120,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowIMENetworkAccess** @@ -176,11 +176,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowInputPanel** @@ -232,11 +232,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowJapaneseIMESurrogatePairCharacters** @@ -289,11 +289,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowJapaneseIVSCharacters** @@ -345,11 +345,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowJapaneseNonPublishingStandardGlyph** @@ -401,11 +401,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowJapaneseUserDictionary** @@ -457,11 +457,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/AllowKeyboardTextSuggestions** @@ -520,22 +520,22 @@ To validate that text prediction is disabled on Windows 10 for desktop, do the f 3. Launch the handwriting tool from the touch keyboard. Verify that text prediction is disabled when you write using the tool. - +
          - + **TextInput/AllowKoreanExtendedHanja** This policy has been deprecated. - +
          - + **TextInput/AllowLanguageFeaturesUninstall** @@ -587,11 +587,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
          - + **TextInput/EnableTouchKeyboardAutoInvokeInDesktopMode** @@ -643,11 +643,11 @@ The following list shows the supported values: - 1 - Enabled. - +
          - + **TextInput/ExcludeJapaneseIMEExceptJIS0208** @@ -697,11 +697,11 @@ The following list shows the supported values: - 1 – All characters except JIS0208 are filtered. - +
          - + **TextInput/ExcludeJapaneseIMEExceptJIS0208andEUDC** @@ -751,11 +751,11 @@ The following list shows the supported values: - 1 – All characters except JIS0208 and EUDC are filtered. - +
          - + **TextInput/ExcludeJapaneseIMEExceptShiftJIS** @@ -805,7 +805,7 @@ The following list shows the supported values: - 1 – All characters except ShiftJIS are filtered. - +
          Footnote: @@ -814,7 +814,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## TextInput policies supported by Microsoft Surface Hub diff --git a/windows/client-management/mdm/policy-csp-timelanguagesettings.md b/windows/client-management/mdm/policy-csp-timelanguagesettings.md index ddda234337..c926c03e45 100644 --- a/windows/client-management/mdm/policy-csp-timelanguagesettings.md +++ b/windows/client-management/mdm/policy-csp-timelanguagesettings.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - TimeLanguageSettings @@ -15,7 +15,7 @@ ms.date: 01/29/2018
          - + ## TimeLanguageSettings policies
          @@ -27,7 +27,7 @@ ms.date: 01/29/2018
          - + **TimeLanguageSettings/AllowSet24HourClock** @@ -73,7 +73,7 @@ The following list shows the supported values: - 1 (default) – Set 24 hour clock. - +
          Footnote: @@ -82,5 +82,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 3eac735f1d..47a34b96dd 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Update @@ -17,7 +17,7 @@ ms.date: 01/29/2018
          - + ## Update policies
          @@ -170,7 +170,7 @@ ms.date: 01/29/2018
          - + **Update/ActiveHoursEnd** @@ -216,11 +216,11 @@ Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. The default is 17 (5 PM). - +
          - + **Update/ActiveHoursMaxRange** @@ -263,11 +263,11 @@ Supported values are 8-18. The default value is 18 (hours). - +
          - + **Update/ActiveHoursStart** @@ -313,11 +313,11 @@ Supported values are 0-23, where 0 is 12 AM, 1 is 1 AM, etc. The default value is 8 (8 AM). - +
          - + **Update/AllowAutoUpdate** @@ -376,11 +376,11 @@ The following list shows the supported values: - 5 – Turn off automatic updates. - +
          - + **Update/AllowAutoWindowsUpdateDownloadOverMeteredNetwork** @@ -430,11 +430,11 @@ The following list shows the supported values: - 1 - Allowed - +
          - + **Update/AllowMUUpdateService** @@ -480,11 +480,11 @@ The following list shows the supported values: - 1 – Allowed. Accepts updates received through Microsoft Update. - +
          - + **Update/AllowNonMicrosoftSignedUpdate** @@ -534,11 +534,11 @@ The following list shows the supported values: - 1 – Allowed. Accepts updates received through an intranet Microsoft update service location, if they are signed by a certificate found in the "Trusted Publishers" certificate store of the local computer. - +
          - + **Update/AllowUpdateService** @@ -591,11 +591,11 @@ The following list shows the supported values: - 1 (default) – Update service is allowed. - +
          - + **Update/AutoRestartDeadlinePeriodInDays** @@ -638,11 +638,11 @@ Supported values are 2-30 days. The default value is 7 days. - +
          - + **Update/AutoRestartNotificationSchedule** @@ -687,11 +687,11 @@ The default value is 15 (minutes). Supported values are 15, 30, 60, 120, and 240 (minutes). - +
          - + **Update/AutoRestartRequiredNotificationDismissal** @@ -737,11 +737,11 @@ The following list shows the supported values: - 2 – User Dismissal. - +
          - + **Update/BranchReadinessLevel** @@ -790,11 +790,11 @@ The following list shows the supported values: - 32 {0x20} - Semi-annual Channel. Device gets feature updates from Semi-annual Channel. - +
          - + **Update/ConfigureFeatureUpdateUninstallPeriod** @@ -824,11 +824,11 @@ The following list shows the supported values: Added in Windows 10, next major update. Enable IT admin to configure feature update uninstall period. Values range 2 - 60 days. Default is 10 days. - +
          - + **Update/DeferFeatureUpdatesPeriodInDays** @@ -874,11 +874,11 @@ Supported values are 0-365 days. > The default maximum number of days to defer an update has been increased from 180 (Windows 10, version 1607) to 365 in Windows 10, version 1703. - +
          - + **Update/DeferQualityUpdatesPeriodInDays** @@ -919,11 +919,11 @@ Added in Windows 10, version 1607. Defers Quality Updates for the specified num Supported values are 0-30. - +
          - + **Update/DeferUpdatePeriod** @@ -1055,11 +1055,11 @@ If a machine has Microsoft Update enabled, any Microsoft Updates in these catego --> - +
          - + **Update/DeferUpgradePeriod** @@ -1110,11 +1110,11 @@ If the "Specify intranet Microsoft update service location" policy is enabled, t If the "Allow Telemetry" policy is enabled and the Options value is set to 0, then the "Defer upgrades by", "Defer updates by" and "Pause Updates and Upgrades" settings have no effect. - +
          - + **Update/DetectionFrequency** @@ -1153,11 +1153,11 @@ If the "Allow Telemetry" policy is enabled and the Options value is set to 0, th Added in Windows 10, version 1703. Specifies the scan frequency from every 1 - 22 hours. Default is 22 hours. - +
          - + **Update/DisableDualScan** @@ -1209,11 +1209,11 @@ The following list shows the supported values: - 1 - do not allow update deferral policies to cause scans against Windows Update - +
          - + **Update/EngagedRestartDeadline** @@ -1256,11 +1256,11 @@ Supported values are 2-30 days. The default value is 0 days (not specified). - +
          - + **Update/EngagedRestartSnoozeSchedule** @@ -1303,11 +1303,11 @@ Supported values are 1-3 days. The default value is 3 days. - +
          - + **Update/EngagedRestartTransitionSchedule** @@ -1350,11 +1350,11 @@ Supported values are 2-30 days. The default value is 7 days. - +
          - + **Update/ExcludeWUDriversInQualityUpdate** @@ -1403,11 +1403,11 @@ The following list shows the supported values: - 1 – Exclude Windows Update drivers. - +
          - + **Update/FillEmptyContentUrls** @@ -1456,11 +1456,11 @@ The following list shows the supported values: - 1 – Enabled. - +
          - + **Update/IgnoreMOAppDownloadLimit** @@ -1521,11 +1521,11 @@ To validate this policy: 3. Verify that any downloads that are above the download size limit will complete without being paused. - +
          - + **Update/IgnoreMOUpdateDownloadLimit** @@ -1586,11 +1586,11 @@ To validate this policy: 2. Run the scheduled task on phone to check for OS updates in the background. For example, on a mobile device, run the following commands in TShell: - +
          - + **Update/ManagePreviewBuilds** @@ -1637,11 +1637,11 @@ The following list shows the supported values: - 2 - Enable Preview builds - +
          - + **Update/PauseDeferrals** @@ -1696,11 +1696,11 @@ The following list shows the supported values: - 1 – Deferrals are paused. - +
          - + **Update/PauseFeatureUpdates** @@ -1749,11 +1749,11 @@ The following list shows the supported values: - 1 – Feature Updates are paused for 60 days or until value set to back to 0, whichever is sooner. - +
          - + **Update/PauseFeatureUpdatesStartTime** @@ -1794,11 +1794,11 @@ Added in Windows 10, version 1703. Specifies the date and time when the IT admi Value type is string. Supported operations are Add, Get, Delete, and Replace. - +
          - + **Update/PauseQualityUpdates** @@ -1844,11 +1844,11 @@ The following list shows the supported values: - 1 – Quality Updates are paused for 35 days or until value set back to 0, whichever is sooner. - +
          - + **Update/PauseQualityUpdatesStartTime** @@ -1889,22 +1889,22 @@ Added in Windows 10, version 1703. Specifies the date and time when the IT admi Value type is string. Supported operations are Add, Get, Delete, and Replace. - +
          - + **Update/PhoneUpdateRestrictions** This policy is deprecated. Use [Update/RequireUpdateApproval](#update-requireupdateapproval) instead. - +
          - + **Update/RequireDeferUpgrade** @@ -1954,11 +1954,11 @@ The following list shows the supported values: - 1 – User gets upgrades from Semi-Annual Channel. - +
          - + **Update/RequireUpdateApproval** @@ -2010,11 +2010,11 @@ The following list shows the supported values: - 1 – The device only installs updates that are both applicable and on the Approved Updates list. Set this policy to 1 if IT wants to control the deployment of updates on devices, such as when testing is required prior to deployment. - +
          - + **Update/ScheduleImminentRestartWarning** @@ -2059,11 +2059,11 @@ The default value is 15 (minutes). Supported values are 15, 30, or 60 (minutes). - +
          - + **Update/ScheduleRestartWarning** @@ -2112,11 +2112,11 @@ The default value is 4 (hours). Supported values are 2, 4, 8, 12, or 24 (hours). - +
          - + **Update/ScheduledInstallDay** @@ -2172,11 +2172,11 @@ The following list shows the supported values: - 7 – Saturday - +
          - + **Update/ScheduledInstallEveryWeek** @@ -2219,11 +2219,11 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
        - +
        - + **Update/ScheduledInstallFirstWeek** @@ -2266,11 +2266,11 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
      - +
      - + **Update/ScheduledInstallFourthWeek** @@ -2313,11 +2313,11 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
    - +
    - + **Update/ScheduledInstallSecondWeek** @@ -2360,11 +2360,11 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i
- +
- + **Update/ScheduledInstallThirdWeek** @@ -2407,11 +2407,11 @@ Added in Windows 10, version 1709. Enables the IT admin to schedule the update i - +
- + **Update/ScheduledInstallTime** @@ -2462,11 +2462,11 @@ Supported values are 0-23, where 0 = 12 AM and 23 = 11 PM. The default value is 3. - +
- + **Update/SetAutoRestartNotificationDisable** @@ -2512,11 +2512,11 @@ The following list shows the supported values: - 1 – Disabled - +
- + **Update/SetEDURestart** @@ -2562,11 +2562,11 @@ The following list shows the supported values: - 1 - configured - +
- + **Update/UpdateServiceUrl** @@ -2637,11 +2637,11 @@ Example ``` - +
- + **Update/UpdateServiceUrlAlternate** @@ -2691,7 +2691,7 @@ Value type is string and the default value is an empty string, "". If the settin > This policy is not supported on Windows RT. Setting this policy will not have any effect on Windows RT PCs. - +
Footnote: @@ -2700,7 +2700,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Update policies supported by Windows Holographic for Business diff --git a/windows/client-management/mdm/policy-csp-userrights.md b/windows/client-management/mdm/policy-csp-userrights.md index 53cf96c3f3..b091456af0 100644 --- a/windows/client-management/mdm/policy-csp-userrights.md +++ b/windows/client-management/mdm/policy-csp-userrights.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - UserRights @@ -17,7 +17,7 @@ ms.date: 01/29/2018
- + ## UserRights policies
@@ -113,7 +113,7 @@ ms.date: 01/29/2018
- + **UserRights/AccessCredentialManagerAsTrustedCaller** @@ -152,11 +152,11 @@ ms.date: 01/29/2018 This user right is used by Credential Manager during Backup/Restore. No accounts should have this privilege, as it is only assigned to Winlogon. Users' saved credentials might be compromised if this privilege is given to other entities. - +
- + **UserRights/AccessFromNetwork** @@ -195,11 +195,11 @@ This user right is used by Credential Manager during Backup/Restore. No accounts This user right determines which users and groups are allowed to connect to the computer over the network. Remote Desktop Services are not affected by this user right.Note: Remote Desktop Services was called Terminal Services in previous versions of Windows Server. - +
- + **UserRights/ActAsPartOfTheOperatingSystem** @@ -238,11 +238,11 @@ This user right determines which users and groups are allowed to connect to the This user right allows a process to impersonate any user without authentication. The process can therefore gain access to the same local resources as that user. Processes that require this privilege should use the LocalSystem account, which already includes this privilege, rather than using a separate user account with this privilege specially assigned. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - +
- + **UserRights/AllowLocalLogOn** @@ -281,11 +281,11 @@ This user right allows a process to impersonate any user without authentication. This user right determines which users can log on to the computer. Note: Modifying this setting may affect compatibility with clients, services, and applications. For compatibility information about this setting, see Allow log on locally (https://go.microsoft.com/fwlink/?LinkId=24268 ) at the Microsoft website. - +
- + **UserRights/BackupFilesAndDirectories** @@ -324,11 +324,11 @@ This user right determines which users can log on to the computer. Note: Modifyi This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when backing up files and directories.Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Read. Caution: Assigning this user right can be a security risk. Since users with this user right can read any registry settings and files, only assign this user right to trusted users - +
- + **UserRights/ChangeSystemTime** @@ -367,11 +367,11 @@ This user right determines which users can bypass file, directory, registry, and This user right determines which users and groups can change the time and date on the internal clock of the computer. Users that are assigned this user right can affect the appearance of event logs. If the system time is changed, events that are logged will reflect this new time, not the actual time that the events occurred. - +
- + **UserRights/CreateGlobalObjects** @@ -410,11 +410,11 @@ This user right determines which users and groups can change the time and date o This security setting determines whether users can create global objects that are available to all sessions. Users can still create objects that are specific to their own session if they do not have this user right. Users who can create global objects could affect processes that run under other users' sessions, which could lead to application failure or data corruption. Caution: Assigning this user right can be a security risk. Assign this user right only to trusted users. - +
- + **UserRights/CreatePageFile** @@ -453,11 +453,11 @@ This security setting determines whether users can create global objects that ar This user right determines which users and groups can call an internal application programming interface (API) to create and change the size of a page file. This user right is used internally by the operating system and usually does not need to be assigned to any users - +
- + **UserRights/CreatePermanentSharedObjects** @@ -496,11 +496,11 @@ This user right determines which users and groups can call an internal applicati This user right determines which accounts can be used by processes to create a directory object using the object manager. This user right is used internally by the operating system and is useful to kernel-mode components that extend the object namespace. Because components that are running in kernel mode already have this user right assigned to them, it is not necessary to specifically assign it. - +
- + **UserRights/CreateSymbolicLinks** @@ -539,11 +539,11 @@ This user right determines which accounts can be used by processes to create a d This user right determines if the user can create a symbolic link from the computer he is logged on to. Caution: This privilege should only be given to trusted users. Symbolic links can expose security vulnerabilities in applications that aren't designed to handle them. Note: This setting can be used in conjunction a symlink filesystem setting that can be manipulated with the command line utility to control the kinds of symlinks that are allowed on the machine. Type 'fsutil behavior set symlinkevaluation /?' at the command line to get more information about fsutil and symbolic links. - +
- + **UserRights/CreateToken** @@ -582,11 +582,11 @@ This user right determines if the user can create a symbolic link from the compu This user right determines which accounts can be used by processes to create a token that can then be used to get access to any local resources when the process uses an internal application programming interface (API) to create an access token. This user right is used internally by the operating system. Unless it is necessary, do not assign this user right to a user, group, or process other than Local System. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - +
- + **UserRights/DebugPrograms** @@ -625,11 +625,11 @@ This user right determines which accounts can be used by processes to create a t This user right determines which users can attach a debugger to any process or to the kernel. Developers who are debugging their own applications do not need to be assigned this user right. Developers who are debugging new system components will need this user right to be able to do so. This user right provides complete access to sensitive and critical operating system components. Caution:Assigning this user right can be a security risk. Only assign this user right to trusted users. - +
- + **UserRights/DenyAccessFromNetwork** @@ -668,11 +668,11 @@ This user right determines which users can attach a debugger to any process or t This user right determines which users are prevented from accessing a computer over the network. This policy setting supersedes the Access this computer from the network policy setting if a user account is subject to both policies. - +
- + **UserRights/DenyLocalLogOn** @@ -711,11 +711,11 @@ This user right determines which users are prevented from accessing a computer o This security setting determines which service accounts are prevented from registering a process as a service. Note: This security setting does not apply to the System, Local Service, or Network Service accounts. - +
- + **UserRights/DenyRemoteDesktopServicesLogOn** @@ -754,11 +754,11 @@ This security setting determines which service accounts are prevented from regis This user right determines which users and groups are prohibited from logging on as a Remote Desktop Services client. - +
- + **UserRights/EnableDelegation** @@ -797,11 +797,11 @@ This user right determines which users and groups are prohibited from logging on This user right determines which users can set the Trusted for Delegation setting on a user or computer object. The user or object that is granted this privilege must have write access to the account control flags on the user or computer object. A server process running on a computer (or under a user context) that is trusted for delegation can access resources on another computer using delegated credentials of a client, as long as the client account does not have the Account cannot be delegated account control flag set. Caution: Misuse of this user right, or of the Trusted for Delegation setting, could make the network vulnerable to sophisticated attacks using Trojan horse programs that impersonate incoming clients and use their credentials to gain access to network resources. - +
- + **UserRights/GenerateSecurityAudits** @@ -840,11 +840,11 @@ This user right determines which users can set the Trusted for Delegation settin This user right determines which accounts can be used by a process to add entries to the security log. The security log is used to trace unauthorized system access. Misuse of this user right can result in the generation of many auditing events, potentially hiding evidence of an attack or causing a denial of service. Shut down system immediately if unable to log security audits security policy setting is enabled. - +
- + **UserRights/ImpersonateClient** @@ -887,11 +887,11 @@ Assigning this user right to a user allows programs running on behalf of that us Because of these factors, users do not usually need this user right. Warning: If you enable this setting, programs that previously had the Impersonate privilege may lose it, and they may not run. - +
- + **UserRights/IncreaseSchedulingPriority** @@ -930,11 +930,11 @@ Because of these factors, users do not usually need this user right. Warning: If This user right determines which accounts can use a process with Write Property access to another process to increase the execution priority assigned to the other process. A user with this privilege can change the scheduling priority of a process through the Task Manager user interface. - +
- + **UserRights/LoadUnloadDeviceDrivers** @@ -973,11 +973,11 @@ This user right determines which accounts can use a process with Write Property This user right determines which users can dynamically load and unload device drivers or other code in to kernel mode. This user right does not apply to Plug and Play device drivers. It is recommended that you do not assign this privilege to other users. Caution: Assigning this user right can be a security risk. Do not assign this user right to any user, group, or process that you do not want to take over the system. - +
- + **UserRights/LockMemory** @@ -1016,11 +1016,11 @@ This user right determines which users can dynamically load and unload device dr This user right determines which accounts can use a process to keep data in physical memory, which prevents the system from paging the data to virtual memory on disk. Exercising this privilege could significantly affect system performance by decreasing the amount of available random access memory (RAM). - +
- + **UserRights/ManageAuditingAndSecurityLog** @@ -1059,11 +1059,11 @@ This user right determines which accounts can use a process to keep data in phys This user right determines which users can specify object access auditing options for individual resources, such as files, Active Directory objects, and registry keys. This security setting does not allow a user to enable file and object access auditing in general. You can view audited events in the security log of the Event Viewer. A user with this privilege can also view and clear the security log. - +
- + **UserRights/ManageVolume** @@ -1102,11 +1102,11 @@ This user right determines which users can specify object access auditing option This user right determines which users and groups can run maintenance tasks on a volume, such as remote defragmentation. Use caution when assigning this user right. Users with this user right can explore disks and extend files in to memory that contains other data. When the extended files are opened, the user might be able to read and modify the acquired data. - +
- + **UserRights/ModifyFirmwareEnvironment** @@ -1145,11 +1145,11 @@ This user right determines which users and groups can run maintenance tasks on a This user right determines who can modify firmware environment values. Firmware environment variables are settings stored in the nonvolatile RAM of non-x86-based computers. The effect of the setting depends on the processor.On x86-based computers, the only firmware environment value that can be modified by assigning this user right is the Last Known Good Configuration setting, which should only be modified by the system. On Itanium-based computers, boot information is stored in nonvolatile RAM. Users must be assigned this user right to run bootcfg.exe and to change the Default Operating System setting on Startup and Recovery in System Properties. On all computers, this user right is required to install or upgrade Windows.Note: This security setting does not affect who can modify the system environment variables and user environment variables that are displayed on the Advanced tab of System Properties. - +
- + **UserRights/ModifyObjectLabel** @@ -1188,11 +1188,11 @@ This user right determines who can modify firmware environment values. Firmware This user right determines which user accounts can modify the integrity label of objects, such as files, registry keys, or processes owned by other users. Processes running under a user account can modify the label of an object owned by that user to a lower level without this privilege. - +
- + **UserRights/ProfileSingleProcess** @@ -1231,11 +1231,11 @@ This user right determines which user accounts can modify the integrity label of This user right determines which users can use performance monitoring tools to monitor the performance of system processes. - +
- + **UserRights/RemoteShutdown** @@ -1274,11 +1274,11 @@ This user right determines which users can use performance monitoring tools to m This user right determines which users are allowed to shut down a computer from a remote location on the network. Misuse of this user right can result in a denial of service. - +
- + **UserRights/RestoreFilesAndDirectories** @@ -1317,11 +1317,11 @@ This user right determines which users are allowed to shut down a computer from This user right determines which users can bypass file, directory, registry, and other persistent objects permissions when restoring backed up files and directories, and determines which users can set any valid security principal as the owner of an object. Specifically, this user right is similar to granting the following permissions to the user or group in question on all files and folders on the system:Traverse Folder/Execute File, Write. Caution: Assigning this user right can be a security risk. Since users with this user right can overwrite registry settings, hide data, and gain ownership of system objects, only assign this user right to trusted users. - +
- + **UserRights/TakeOwnership** @@ -1360,7 +1360,7 @@ This user right determines which users can bypass file, directory, registry, and This user right determines which users can take ownership of any securable object in the system, including Active Directory objects, files and folders, printers, registry keys, processes, and threads. Caution: Assigning this user right can be a security risk. Since owners of objects have full control of them, only assign this user right to trusted users. - +
Footnote: @@ -1369,5 +1369,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-wifi.md b/windows/client-management/mdm/policy-csp-wifi.md index 5d27b9d4f0..8fa7a54082 100644 --- a/windows/client-management/mdm/policy-csp-wifi.md +++ b/windows/client-management/mdm/policy-csp-wifi.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - Wifi @@ -15,7 +15,7 @@ ms.date: 01/29/2018
- + ## Wifi policies
@@ -45,18 +45,18 @@ ms.date: 01/29/2018
- + **WiFi/AllowWiFiHotSpotReporting** This policy has been deprecated. - +
- + **Wifi/AllowAutoConnectToWiFiSenseHotspots** @@ -104,11 +104,11 @@ The following list shows the supported values: - 1 (default) – Allowed. - +
- + **Wifi/AllowInternetSharing** @@ -156,11 +156,11 @@ The following list shows the supported values: - 1 (default) – Allow the use of Internet Sharing. - +
- + **Wifi/AllowManualWiFiConfiguration** @@ -211,11 +211,11 @@ The following list shows the supported values: - 1 (default) – Adding new network SSIDs beyond the already MDM provisioned ones is allowed. - +
- + **Wifi/AllowWiFi** @@ -263,11 +263,11 @@ The following list shows the supported values: - 1 (default) – WiFi connection is allowed. - +
- + **Wifi/AllowWiFiDirect** @@ -313,11 +313,11 @@ The following list shows the supported values: - 1 - WiFi Direct connection is allowed. - +
- + **Wifi/WLANScanMode** @@ -362,7 +362,7 @@ The default value is 0. Supported operations are Add, Delete, Get, and Replace. - +
Footnote: @@ -371,7 +371,7 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + ## Wifi policies that can be set using Exchange Active Sync (EAS) diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index a7f22fe4fc..65c25b116e 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - WindowsDefenderSecurityCenter @@ -17,7 +17,7 @@ ms.date: 01/29/2018
- + ## WindowsDefenderSecurityCenter policies
@@ -83,7 +83,7 @@ ms.date: 01/29/2018
- + **WindowsDefenderSecurityCenter/CompanyName** @@ -124,11 +124,11 @@ Added in Windows 10, version 1709. The company name that is displayed to the use Value type is string. Supported operations are Add, Get, Replace and Delete. - +
- + **WindowsDefenderSecurityCenter/DisableAccountProtectionUI** @@ -174,11 +174,11 @@ Valid values: - 1 - (Enable) The users cannot see the display of the Account protection area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableAppBrowserUI** @@ -226,11 +226,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of the app and browser protection area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableDeviceSecurityUI** @@ -276,11 +276,11 @@ Valid values: - 1 - (Enable) The users cannot see the display of the Device secuirty area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableEnhancedNotifications** @@ -331,11 +331,11 @@ The following list shows the supported values: - 1 - (Enable) Windows Defender Security Center only display notifications which are considered critical on clients. - +
- + **WindowsDefenderSecurityCenter/DisableFamilyUI** @@ -383,11 +383,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of the family options area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableHealthUI** @@ -435,11 +435,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of the device performance and health area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableNetworkUI** @@ -487,11 +487,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of the firewall and network protection area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisableNotifications** @@ -539,11 +539,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of Windows Defender Security Center notifications. - +
- + **WindowsDefenderSecurityCenter/DisableVirusUI** @@ -591,11 +591,11 @@ The following list shows the supported values: - 1 - (Enable) The users cannot see the display of the virus and threat protection area in Windows Defender Security Center. - +
- + **WindowsDefenderSecurityCenter/DisallowExploitProtectionOverride** @@ -643,11 +643,11 @@ The following list shows the supported values: - 1 - (Enable) Local users cannot make changes in the exploit protection settings area. - +
- + **WindowsDefenderSecurityCenter/Email** @@ -688,11 +688,11 @@ Added in Windows 10, version 1709. The email address that is displayed to users. Value type is string. Supported operations are Add, Get, Replace and Delete. - +
- + **WindowsDefenderSecurityCenter/EnableCustomizedToasts** @@ -740,11 +740,11 @@ The following list shows the supported values: - 1 - (Enable) Notifications contain the company name and contact options. - +
- + **WindowsDefenderSecurityCenter/EnableInAppCustomization** @@ -792,11 +792,11 @@ The following list shows the supported values: - 1 - (Enable) Display the company name and contact options in the card fly out notification. - +
- + **WindowsDefenderSecurityCenter/HideRansomwareDataRecovery** @@ -842,11 +842,11 @@ Valid values: - 1 - (Enable) The Ransomware data recovery area is hidden. - +
- + **WindowsDefenderSecurityCenter/HideSecureBoot** @@ -892,11 +892,11 @@ Valid values: - 1 - (Enable) The Secure boot area is hidden. - +
- + **WindowsDefenderSecurityCenter/HideTPMTroubleshooting** @@ -942,11 +942,11 @@ Valid values: - 1 - (Enable) The Security processor (TPM) troubleshooting area is hidden. - +
- + **WindowsDefenderSecurityCenter/Phone** @@ -987,11 +987,11 @@ Added in Windows 10, version 1709. The phone number or Skype ID that is displaye Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
- + **WindowsDefenderSecurityCenter/URL** @@ -1032,7 +1032,7 @@ Added in Windows 10, version 1709. The help portal URL this is displayed to user Value type is Value type is string. Supported operations are Add, Get, Replace, and Delete. - +
Footnote: @@ -1041,5 +1041,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md index 69290e276b..0b0a6104d4 100644 --- a/windows/client-management/mdm/policy-csp-windowsinkworkspace.md +++ b/windows/client-management/mdm/policy-csp-windowsinkworkspace.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - WindowsInkWorkspace @@ -15,7 +15,7 @@ ms.date: 01/29/2018
- + ## WindowsInkWorkspace policies
@@ -30,7 +30,7 @@ ms.date: 01/29/2018
- + **WindowsInkWorkspace/AllowSuggestedAppsInWindowsInkWorkspace** @@ -76,11 +76,11 @@ The following list shows the supported values: - 1 (default) -allow app suggestions. - +
- + **WindowsInkWorkspace/AllowWindowsInkWorkspace** @@ -127,7 +127,7 @@ Value type is int. The following list shows the supported values: - 2 (default) - ink workspace is enabled (feature is turned on), and the user is allowed to use it above the lock screen. - +
Footnote: @@ -136,5 +136,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-windowslogon.md b/windows/client-management/mdm/policy-csp-windowslogon.md index 9679d7b3a3..513b783cee 100644 --- a/windows/client-management/mdm/policy-csp-windowslogon.md +++ b/windows/client-management/mdm/policy-csp-windowslogon.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - WindowsLogon @@ -15,7 +15,7 @@ ms.date: 01/29/2018
- + ## WindowsLogon policies
@@ -33,7 +33,7 @@ ms.date: 01/29/2018
- + **WindowsLogon/DisableLockScreenAppNotifications** @@ -91,11 +91,11 @@ ADMX Info: - GP ADMX file name: *logon.admx* - +
- + **WindowsLogon/DontDisplayNetworkSelectionUI** @@ -153,11 +153,11 @@ ADMX Info: - GP ADMX file name: *logon.admx* - +
- + **WindowsLogon/HideFastUserSwitching** @@ -210,7 +210,7 @@ To validate on Desktop, do the following: 2. Verify that the Switch account button in Start is hidden. - +
Footnote: @@ -219,5 +219,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + diff --git a/windows/client-management/mdm/policy-csp-wirelessdisplay.md b/windows/client-management/mdm/policy-csp-wirelessdisplay.md index e7c65f476a..5830a05aa4 100644 --- a/windows/client-management/mdm/policy-csp-wirelessdisplay.md +++ b/windows/client-management/mdm/policy-csp-wirelessdisplay.md @@ -6,7 +6,7 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 01/29/2018 +ms.date: 01/30/2018 --- # Policy CSP - WirelessDisplay @@ -15,7 +15,7 @@ ms.date: 01/29/2018
- + ## WirelessDisplay policies
@@ -48,7 +48,7 @@ ms.date: 01/29/2018
- + **WirelessDisplay/AllowMdnsAdvertisement** @@ -94,11 +94,11 @@ The following list shows the supported values: - 1 - Allow - +
- + **WirelessDisplay/AllowMdnsDiscovery** @@ -144,11 +144,11 @@ The following list shows the supported values: - 1 - Allow - +
- + **WirelessDisplay/AllowProjectionFromPC** @@ -194,11 +194,11 @@ The following list shows the supported values: - 1 - your PC can discover and project to other devices - +
- + **WirelessDisplay/AllowProjectionFromPCOverInfrastructure** @@ -244,11 +244,11 @@ The following list shows the supported values: - 1 - your PC can discover and project to other devices over infrastructure. - +
- + **WirelessDisplay/AllowProjectionToPC** @@ -298,11 +298,11 @@ The following list shows the supported values: - 1 (default) - projection to PC is allowed. Enabled only above the lock screen. - +
- + **WirelessDisplay/AllowProjectionToPCOverInfrastructure** @@ -348,11 +348,11 @@ The following list shows the supported values: - 1 - your PC is discoverable and other devices can project to it over infrastructure. - +
- + **WirelessDisplay/AllowUserInputFromWirelessDisplayReceiver** @@ -375,11 +375,11 @@ The following list shows the supported values: - 1 (default) - Wireless display input enabled. - +
- + **WirelessDisplay/RequirePinForPairing** @@ -429,7 +429,7 @@ The following list shows the supported values: - 1 - PIN is required. - +
Footnote: @@ -438,5 +438,5 @@ Footnote: - 2 - Added in Windows 10, version 1703. - 3 - Added in Windows 10, version 1709. - + From daf1692292b557ffc2ec668f870a0e95e819275e Mon Sep 17 00:00:00 2001 From: Jason Conradt Date: Tue, 30 Jan 2018 19:08:05 +0000 Subject: [PATCH 62/91] Updated deployment-vdi-windows-defender-antivirus.md Updated to reflect new "sealing" guidance --- .../deployment-vdi-windows-defender-antivirus.md | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md index 0ba067be64..5d079ac93e 100644 --- a/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md @@ -86,7 +86,11 @@ First, you should create your base image according to your business needs, apply After creating the image, you should ensure it is fully updated. See [Configure Windows Defender in Windows 10]( https://technet.microsoft.com/en-us/itpro/windows/keep-secure/configure-windows-defender-in-windows-10) for instructions on how to update Windows Defender AV protection via WSUS, Microsoft Update, the MMPC site, or UNC file shares. You should ensure that your initial base image is also fully patched with Microsoft and Windows updates and patches. ### Seal the base image -When the base image is fully updated, you should run a quick scan on the image. This “sealing” or “locking” of the image helps Windows Defender AV build a cache of known-good files and avoid scanning them again on your VMs. In turn, this can help ensure performance on the VM is not impacted. +When the base image is fully updated, you should run a quick scan on the image. + + + +This “sealing” or “locking” of the image helps Windows Defender AV build a cache of known-good files and avoid scanning them again on your VMs. In turn, this can help ensure performance on the VM is not impacted. You can run a quick scan [from the command line](command-line-arguments-windows-defender-antivirus.md) or via [System Center Configuration Manager](run-scan-windows-defender-antivirus.md). From f77ba3b1d7e3e0aaecc7ea14a6aded6626b5abc9 Mon Sep 17 00:00:00 2001 From: Celeste de Guzman Date: Tue, 30 Jan 2018 12:15:39 -0800 Subject: [PATCH 63/91] changed drastically to significantly --- education/trial-in-a-box/educator-tib-get-started.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/education/trial-in-a-box/educator-tib-get-started.md b/education/trial-in-a-box/educator-tib-get-started.md index f448a10be8..1f647b7dbb 100644 --- a/education/trial-in-a-box/educator-tib-get-started.md +++ b/education/trial-in-a-box/educator-tib-get-started.md @@ -23,7 +23,7 @@ ms.date: 01/12/2017 | | | | :---: |:--- | | [![Connect the device to Wi-Fi](images/edu-TIB-setp-1-v3.png)](#edu-task1) | [Log in](#edu-task1) to **Device A** with your Teacher credentials and connect to the school network. | -| [![Try Learning Tools Immersive Reader](images/edu-TIB-setp-2-v3.png)](#edu-task2) | **Interested in drastically improving your students' reading speed and comprehension?[1](#footnote1)**
Try the [Learning Tools Immersive Reader](#edu-task2) to see how kids can learn to read faster, using text read aloud, and highlighting words for syntax. | +| [![Try Learning Tools Immersive Reader](images/edu-TIB-setp-2-v3.png)](#edu-task2) | **Interested in significantly improving your students' reading speed and comprehension?[1](#footnote1)**
Try the [Learning Tools Immersive Reader](#edu-task2) to see how kids can learn to read faster, using text read aloud, and highlighting words for syntax. | | [![Launch Microsoft Teams](images/edu-TIB-setp-3-v3.png)](#edu-task3) | **Looking to foster collaboration, communication, and critical thinking in the classroom?**
Launch [Microsoft Teams](#edu-task3) and learn how to set up digital classroom discussions, respond to student questions, and organize class content. | | [![Open OneNote](images/edu-TIB-setp-4-v3.png)](#edu-task4) | **Trying to expand classroom creativity and interaction between students?**
Open [OneNote](#edu-task4) and create an example group project for your class. | | [![Play with Minecraft: Education Edition](images/edu-TIB-setp-5-v3.png)](#edu-task5) | **Want to teach kids to further collaborate and problem solve?**
Play with [Minecraft: Education Edition](#edu-task5) to see how it can be used as a collaborative and versatile platform across subjects to encourage 21st century skills. | @@ -46,7 +46,7 @@ To try out the educator tasks, start by logging in as a teacher.
![Improve student reading speed and comprehension](images/edu-TIB-setp-2-jump.png) -## 2. Drastically improve student reading speed and comprehension +## 2. Significantly improve student reading speed and comprehension -### Telemetry +### Diagnostic data -The Surface Hub OS uses the Windows 10 Connected User Experience and Telemetry component to gather and transmit telemetry data. For more information, see [Configure Windows telemetry in your organization](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization). +The Surface Hub OS uses the Windows 10 Connected User Experience and Telemetry component to gather and transmit diagnostic data. For more information, see [Configure Windows diagnostic data in your organization](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization). -*Organization policies that this may affect:*
Configure telemetry levels for Surface Hub in the same way as you do for Windows 10 Enterprise. +*Organization policies that this may affect:*
Configure diagnostic data levels for Surface Hub in the same way as you do for Windows 10 Enterprise. diff --git a/devices/surface-hub/monitor-surface-hub.md b/devices/surface-hub/monitor-surface-hub.md index d8ddba730e..7fe0d6aeff 100644 --- a/devices/surface-hub/monitor-surface-hub.md +++ b/devices/surface-hub/monitor-surface-hub.md @@ -86,7 +86,7 @@ This table describes the sample queries in the Surface Hub solution: | Alert type | Impact | Recommended remediation | Details | | ---------- | ------ | ----------------------- | ------- | -| Software | Error | **Reboot the device**.
Reboot manually, or using the [Reboot configuration service provider](https://msdn.microsoft.com/en-us/library/windows/hardware/mt720802(v=vs.85).aspx).
Suggest doing this between meetings to minimize impact to your people in your organization. | Trigger conditions:
- A critical process in the Surface Hub operating system, such as the shell, projection, or Skype, crashes or becomes non-responsive.
- The device hasn't reported a heartbeat in the past 24 hours. This may be due to network connectivity issue or network-related hardware failure, or an error with the telemetry reporting system. | +| Software | Error | **Reboot the device**.
Reboot manually, or using the [Reboot configuration service provider](https://msdn.microsoft.com/en-us/library/windows/hardware/mt720802(v=vs.85).aspx).
Suggest doing this between meetings to minimize impact to your people in your organization. | Trigger conditions:
- A critical process in the Surface Hub operating system, such as the shell, projection, or Skype, crashes or becomes non-responsive.
- The device hasn't reported a heartbeat in the past 24 hours. This may be due to network connectivity issue or network-related hardware failure, or an error with the diagnostic data reporting system. | | Software | Error | **Check your Exchange service**.
Verify:
- The service is available.
- The device account password is up to date – see [Password management](password-management-for-surface-hub-device-accounts.md) for details.| Triggers when there's an error syncing the device calendar with Exchange. | | Software | Error | **Check your Skype for Business service**.
Verify:
- The service is available.
- The device account password is up to date – see [Password management](password-management-for-surface-hub-device-accounts.md) for details.
- The domain name for Skype for Business is properly configured - see [Configure a domain name](use-fully-qualified-domain-name-surface-hub.md). | Triggers when Skype fails to sign in. | | Software | Error | **Reset the device**.
This takes some time, so you should take the device offline.
For more information, see [Device reset](device-reset-surface-hub.md).| Triggers when there is an error cleaning up user and app data at the end of a session. When this operation repeatedly fails, the device is locked to protect user data. You must reset the device to continue. | diff --git a/devices/surface-hub/prepare-your-environment-for-surface-hub.md b/devices/surface-hub/prepare-your-environment-for-surface-hub.md index d649dc5dda..077e16a6a5 100644 --- a/devices/surface-hub/prepare-your-environment-for-surface-hub.md +++ b/devices/surface-hub/prepare-your-environment-for-surface-hub.md @@ -40,9 +40,9 @@ Depending on your environment, access to additional ports may be needed: - For online environments, see [Office 365 IP URLs and IP address ranges](https://support.office.com/en-us/article/Office-365-URLs-and-IP-address-ranges-8548a211-3fe7-47cb-abb1-355ea5aa88a2?ui=en-US&rs=en-US&ad=US). - For on-premises installations, see [Skype for Business Server: Ports and protocols for internal servers](https://technet.microsoft.com/library/gg398833.aspx). -Microsoft collects telemetry to help improve your Surface Hub experience. Add these sites to your allow list: -- Telemetry client endpoint: `https://vortex.data.microsoft.com/` -- Telemetry settings endpoint: `https://settings.data.microsoft.com/` +Microsoft collects diagnostic data to help improve your Surface Hub experience. Add these sites to your allow list: +- Diagnostic data client endpoint: `https://vortex.data.microsoft.com/` +- Diagnostic data settings endpoint: `https://settings.data.microsoft.com/` ### Proxy configuration diff --git a/devices/surface-hub/troubleshoot-surface-hub.md b/devices/surface-hub/troubleshoot-surface-hub.md index df8612a26a..9b2ef8764a 100644 --- a/devices/surface-hub/troubleshoot-surface-hub.md +++ b/devices/surface-hub/troubleshoot-surface-hub.md @@ -524,7 +524,7 @@ This section lists status codes, mapping, user messages, and actions an admin ca

0x85002004

E_FAIL_ABORT

-

This error is used to interrupt the hanging sync, and will not be exposed to users. It will be shown in the telemetry if you force an interactive sync, delete the account, or update its settings.

+

This error is used to interrupt the hanging sync, and will not be exposed to users. It will be shown in the diagnostic data if you force an interactive sync, delete the account, or update its settings.

Nothing.

diff --git a/windows/application-management/svchost-service-refactoring.md b/windows/application-management/svchost-service-refactoring.md index db2b1f18c8..ca43f5a4ed 100644 --- a/windows/application-management/svchost-service-refactoring.md +++ b/windows/application-management/svchost-service-refactoring.md @@ -33,7 +33,7 @@ Benefits of this design change include: * Reduced support costs by eliminating the troubleshooting overhead associated with isolating misbehaving services in the shared host. * Increased security by providing additional inter-service isolation * Increased scalability by allowing per-service settings and privileges -* Improved resource management through per-service CPU, I/O and memory management and increase clear telemetry (report CPU, I/O and network usage per service). +* Improved resource management through per-service CPU, I/O and memory management and increase clear diagnostic data (report CPU, I/O and network usage per service). >**Try This** > diff --git a/windows/client-management/mdm/dmclient-csp.md b/windows/client-management/mdm/dmclient-csp.md index 2e48728ffc..c48d6ddd3b 100644 --- a/windows/client-management/mdm/dmclient-csp.md +++ b/windows/client-management/mdm/dmclient-csp.md @@ -216,7 +216,7 @@ Added in Windows 10, version 1607. Returns the hardware device ID. Supported operation is Get. **Provider/*ProviderID*/CommercialID** -Added in Windows 10, version 1607. Configures the identifier used to uniquely associate this telemetry data of this device as belonging to a given organization. If your organization is participating in a program that requires this device to be identified as belonging to your organization then use this setting to provide that identification. The value for this setting will be provided by Microsoft as part of the onboarding process for the program. If you disable or do not configure this policy setting, then Microsoft will not be able to use this identifier to associate this machine and its telemetry data with your organization.. +Added in Windows 10, version 1607. Configures the identifier used to uniquely associate this diagnostic data of this device as belonging to a given organization. If your organization is participating in a program that requires this device to be identified as belonging to your organization then use this setting to provide that identification. The value for this setting will be provided by Microsoft as part of the onboarding process for the program. If you disable or do not configure this policy setting, then Microsoft will not be able to use this identifier to associate this machine and its diagnostic data with your organization.. Supported operations are Add, Get, Replace, and Delete. diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 0e9aaf6db6..9ffaf7854f 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -1327,14 +1327,14 @@ The following list shows the supported values: This policy setting lets you decide how much data to send to Microsoft about the book you're reading from the Books tab in Microsoft Edge. -If you enable this setting, Microsoft Edge sends additional telemetry data, on top of the basic telemetry data, from the Books tab. If you disable or don't configure this setting, Microsoft Edge only sends basic telemetry data, depending on your device configuration. +If you enable this setting, Microsoft Edge sends additional diagnostic data, on top of the basic diagnostic data, from the Books tab. If you disable or don't configure this setting, Microsoft Edge only sends basic diagnostic data, depending on your device configuration. The following list shows the supported values: -- 0 (default) - Disable. No additional telemetry. -- 1 - Enable. Additional telemetry for schools. +- 0 (default) - Disable. No additional diagnostic data. +- 1 - Enable. Additional diagnostic data for schools. diff --git a/windows/client-management/mdm/tpmpolicy-csp.md b/windows/client-management/mdm/tpmpolicy-csp.md index a86a8fef94..5fa0f29fa7 100644 --- a/windows/client-management/mdm/tpmpolicy-csp.md +++ b/windows/client-management/mdm/tpmpolicy-csp.md @@ -12,7 +12,7 @@ ms.date: 11/01/2017 # TPMPolicy CSP -The TPMPolicy configuration service provider (CSP) provides a mechanism to enable zero exhaust configuration on a Windows device for TPM software components. Zero exhaust is defined as no network traffic (telemetry or otherwise, such as downloading background images, Windows Updates, etc.) from Windows and inbox applications to public IP addresses unless directly intended by the user. This allows the enterprise admin to configure devices where no network communication is initiated by the system without explicit approval. +The TPMPolicy configuration service provider (CSP) provides a mechanism to enable zero exhaust configuration on a Windows device for TPM software components. Zero exhaust is defined as no network traffic (diagnostic data or otherwise, such as downloading background images, Windows Updates, etc.) from Windows and inbox applications to public IP addresses unless directly intended by the user. This allows the enterprise admin to configure devices where no network communication is initiated by the system without explicit approval. The TPMPolicy CSP was added in Windows 10, version 1703. @@ -30,7 +30,7 @@ The following diagram shows the TPMPolicy configuration service provider in tree
  • There should be no traffic when machine is on idle. When the user is not interacting with the system/device, no traffic is expected.
  • There should be no traffic during installation of Windows and first logon when local ID is used.
  • Launching and using a local app (Notepad, Paint, etc.) should not send any traffic. Similarly, performing common tasks (clicking on start menu, browsing folders, etc.) should not send any traffic.
  • -
  • Launching and using Internet enabled apps should not send any unexpected traffic (for maintenance, diagnostic, telemetry, etc.) to Microsoft.
  • +
  • Launching and using Internet enabled apps should not send any unexpected traffic (for maintenance, diagnostic data, etc.) to Microsoft.
  • Here is an example: diff --git a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md index 5999ebee5e..4e19920eef 100644 --- a/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md +++ b/windows/client-management/mdm/windowsadvancedthreatprotection-csp.md @@ -77,7 +77,7 @@ The following list describes the characteristics and parameters.

    Supported operations are Get and Replace. **Configuration/TelemetryReportingFrequency** -

    Added in Windows 10, version 1703. Returns or sets the Windows Defender Advanced Threat Protection telemetry reporting frequency. +

    Added in Windows 10, version 1703. Returns or sets the Windows Defender Advanced Threat Protection diagnostic data reporting frequency.

    The following list shows the supported values: diff --git a/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md b/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md index a47fcba793..d475e14ee4 100644 --- a/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md +++ b/windows/client-management/mdm/windowsadvancedthreatprotection-ddf.md @@ -227,7 +227,7 @@ The XML below is the current version for this CSP. 1 - Return or set Windows Defender Advanced Threat Protection telemetry reporting frequency. Allowed values are: 1 - Normal, 2 - Expedite + Return or set Windows Defender Advanced Threat Protection diagnostic data reporting frequency. Allowed values are: 1 - Normal, 2 - Expedite diff --git a/windows/client-management/windows-10-mobile-and-mdm.md b/windows/client-management/windows-10-mobile-and-mdm.md index f0535dc3e4..a330013d0d 100644 --- a/windows/client-management/windows-10-mobile-and-mdm.md +++ b/windows/client-management/windows-10-mobile-and-mdm.md @@ -2,7 +2,7 @@ title: Windows 10 Mobile deployment and management guide (Windows 10) description: This guide helps IT professionals plan for and deploy Windows 10 Mobile devices. ms.assetid: 6CAA1004-CB65-4FEC-9B84-61AAD2125E5E -keywords: Mobile, telemetry, BYOD, MDM +keywords: Mobile, diagnostic data, BYOD, MDM ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,7 +14,8 @@ ms.date: 09/21/2017 # Windows 10 Mobile deployment and management guide -*Applies to: Windows 10 Mobile, version 1511 and Windows 10 Mobile, version 1607* +**Applies to:** +- Windows 10 Mobile, version 1511 and Windows 10 Mobile, version 1607 This guide helps IT professionals plan for and deploy Windows 10 Mobile devices. @@ -189,7 +190,7 @@ Multiple MDM systems support Windows 10 and most support personal and corporate In addition, Microsoft recently added MDM capabilities powered by Intune to Office 365. MDM for Office 365 supports mobile devices only, such as those running Windows 10 Mobile, iOS, and Android. MDM for Office 365 offers a subset of the management capabilities found in Intune, including the ability to remotely wipe a device, block a device from accessing Exchange Server email, and configure device policies (e.g., passcode requirements). For more information about MDM for Office 365 capabilities, see [Overview of Mobile Device Management for Office 365](http://technet.microsoft.com/en-us/library/ms.o365.cc.devicepolicy.aspx). **Cloud services** -On mobile devices that run Windows 10 Mobile, users can easily connect to cloud services that provide user notifications and collect telemetry (usage data). Windows 10 Mobile enables organizations to manage how devices consume these cloud services. +On mobile devices that run Windows 10 Mobile, users can easily connect to cloud services that provide user notifications and collect diagnostic and usage data. Windows 10 Mobile enables organizations to manage how devices consume these cloud services. **Windows Push Notification Services** The Windows Push Notification Services enable software developers to send toast, tile, badge, and raw updates from their cloud services. It provides a mechanism to deliver updates to users in a power-efficient and dependable way. @@ -795,9 +796,9 @@ While Windows 10 Mobile provides updates directly to user devices from Windows U Upgrading to Windows 10 Mobile Enterprise edition provides additional device and app management capabilities for organizations that want to: - **Defer, approve and deploy feature and quality updates:** Windows 10 Mobile devices get updates directly from Windows Update. If you want to curate updates prior to deploying them, an upgrade to Windows 10 Mobile Enterprise edition is required. Once Enterprise edition is enabled, the phone can be set to the Current Branch for Business servicing option, giving IT additional time to test updates before they are released. - **Deploy an unlimited number of self-signed LOB apps to a single device:** To use an MDM system to deploy LOB apps directly to devices, you must cryptographically sign the software packages with a code signing certificate that your organization’s certificate authority (CA) generates. You can deploy a maximum of 20 self-signed LOB apps to a Windows 10 Mobile device. To deploy more than 20 self-signed LOB apps, Windows 10 Mobile Enterprise is required. -- **Set the telemetry level:** Microsoft collects telemetry data to help keep Windows devices secure and to help Microsoft improve the quality of Windows and Microsoft services. An upgrade to Windows 10 Mobile Enterprise edition is required to set the telemetry level so that only telemetry information required to keep devices secured is gathered. +- **Set the diagnostic data level:** Microsoft collects diagnostic data to help keep Windows devices secure and to help Microsoft improve the quality of Windows and Microsoft services. An upgrade to Windows 10 Mobile Enterprise edition is required to set the diagnostic data level so that only diagnostic information required to keep devices secured is gathered. -To learn more about telemetry, visit [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization). +To learn more about diagnostic, see [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). To activate Windows 10 Mobile Enterprise, use your MDM system or a provisioning package to inject the Windows 10 Enterprise license on a Windows 10 Mobile device. Licenses can be obtained from the Volume Licensing portal. For testing purposes, you can obtain a licensing file from the MSDN download center. A valid MSDN subscription is required. @@ -1007,17 +1008,17 @@ The following list shows examples of the Windows 10 Mobile software and hardware - **Secure Boot state** Indicates whether Secure Boot is enabled - **Enterprise encryption policy compliance** Indicates whether the device is encrypted -### Manage telemetry +### Manage diagnostic data *Applies to: Corporate devices with Windows 10 Mobile Enterprise edition* -Microsoft uses telemetry (diagnostics, performance, and usage data) from Windows devices to help inform decisions and focus efforts to provide the most robust and valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Telemetry helps keep Windows devices healthy, improve the operating system, and personalize features and services. +Microsoft uses diagnostics, performance, and usage data from Windows devices to help inform decisions and focus efforts to provide the most robust and valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Diagnostic data helps keep Windows devices healthy, improve the operating system, and personalize features and services. -You can control the level of data that telemetry systems collect. To configure devices, specify one of these levels in the Allow Telemetry setting with your MDM system. +You can control the level of data that diagnostic data systems collect. To configure devices, specify one of these levels in the Allow Telemetry setting with your MDM system. -For more information, see [Configure Windows telemetry in Your organization](/windows/configuration/configure-windows-telemetry-in-your-organization). +For more information, see [Configure Windows diagnostic data in Your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). ->**Note:** Telemetry can only be managed when the device is upgraded to Windows 10 Mobile Enterprise edition. +>**Note:** Diagnostic data can only be managed when the device is upgraded to Windows 10 Mobile Enterprise edition. ### Remote assistance diff --git a/windows/configuration/TOC.md b/windows/configuration/TOC.md index 24d1e1b2eb..2542a03b63 100644 --- a/windows/configuration/TOC.md +++ b/windows/configuration/TOC.md @@ -1,10 +1,10 @@ # [Configure Windows 10](index.md) -## [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) +## [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) ## [Diagnostic Data Viewer Overview](diagnostic-data-viewer-overview.md) ## [Windows 10, version 1709 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md) -## [Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](enhanced-telemetry-windows-analytics-events-and-fields.md) +## [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) ## [Windows 10, version 1703 basic level Windows diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) -## [Windows 10 diagnostic data for the Full telemetry level](windows-diagnostic-data-1703.md) +## [Windows 10 diagnostic data for the Full diagnostic data level](windows-diagnostic-data-1703.md) ## [Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md) ## [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) ## [Manage Windows 10 connection endpoints](manage-windows-endpoints-version-1709.md) diff --git a/windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md b/windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md index cf42ebfdaf..d6c2534f87 100644 --- a/windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md +++ b/windows/configuration/basic-level-windows-diagnostic-events-and-fields-1703.md @@ -1,7 +1,7 @@ --- description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. title: Windows 10, version 1703 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry +keywords: privacy, diagnostic data ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -24,7 +24,7 @@ The Basic level gathers a limited set of information that is critical for unders Use this article to learn about diagnostic events, grouped by event area, and the fields within each event. A brief description is provided for each field. Every event generated includes common data, which collects device data. You can learn more about Windows functional and diagnostic data through these articles: - [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) >[!Note] >Updated November 2017 to document new and modified events. We’ve added some new events and also added new fields to existing events to prepare for upgrades to the next release of Windows. @@ -88,12 +88,12 @@ The following fields are available: - **epoch** Represents the epoch and seqNum fields, which help track how many events were fired and how many events were uploaded, and enables identification of data lost during upload and de-duplication of events on the ingress server. - **seqNum** Represents the sequence field used to track absolute order of uploaded events. It is an incrementing identifier for each event added to the upload queue.  The Sequence helps track how many events were fired and how many events were uploaded and enables identification of data lost during upload and de-duplication of events on the ingress server. - **iKey** Represents an ID for applications or other logical groupings of events. -- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experience and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. +- **flags** Represents a collection of bits that describe how the event should be processed by the Connected User Experiences and Telemetry component pipeline. The lowest-order byte is the event persistence. The next byte is the event latency. - **os** Represents the operating system name. - **osVer** Represents the OS version, and its format is OS dependent. - **appId** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. - **appVer** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related diagnostic data events across component boundaries. ### Common Data Extensions.OS @@ -135,7 +135,7 @@ The following fields are available: ### Common Data Extensions.Consent UI Event -This User Account Control (UAC) telemetry point collects information on elevations that originate from low integrity levels. This occurs when a process running at low integrity level (IL) requires higher (administrator) privileges, and therefore requests for elevation via UAC (consent.exe). By better understanding the processes requesting these elevations, Microsoft can in turn improve the detection and handling of potentially malicious behavior in this path. +This User Account Control (UAC) diagnostic data point collects information on elevations that originate from low integrity levels. This occurs when a process running at low integrity level (IL) requires higher (administrator) privileges, and therefore requests for elevation via UAC (consent.exe). By better understanding the processes requesting these elevations, Microsoft can in turn improve the detection and handling of potentially malicious behavior in this path. The following fields are available: @@ -198,7 +198,7 @@ The following fields are available: - **HKCU_FlipAhead.HRESULT** The error code returned when trying to query Flip Ahead for the current user. - **HKLM_TailoredExperiences.TailoredExperiencesWithDiagnosticDataEnabled** Is Tailored Experiences with Diagnostics Data enabled for the current user after the feature update had completed? - **HKCU_TailoredExperiences.HRESULT** The error code returned when trying to query Tailored Experiences with Diagnostics Data for the current user. -- **HKLM_AdvertisingID.Enabled** Is the adveristing ID enabled for the device? +- **HKLM_AdvertisingID.Enabled** Is the adverising ID enabled for the device? - **HKLM_AdvertisingID.HRESULT** The error code returned when trying to query the state of the advertising ID for the device. - **HKCU_AdvertisingID.Enabled** Is the adveristing ID enabled for the current user? - **HKCU_AdvertisingID.HRESULT** The error code returned when trying to query the state of the advertising ID for the user. @@ -332,7 +332,7 @@ The following fields are available: - **HasCitData** Is the file present in CIT data? - **HasUpgradeExe** Does the anti-virus app have an upgrade.exe file? - **IsAv** Is the file an anti-virus reporting EXE? -- **ResolveAttempted** This will always be an empty string when sending telemetry. +- **ResolveAttempted** This will always be an empty string when sending diagnostic data. - **SdbEntries** An array of fields that indicates the SDB entries that apply to this file. @@ -1032,7 +1032,7 @@ The following fields are available: - **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. - **AppraiserVersion** The version of the Appraiser file generating the events. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Diagnostic Data. - **Time** The client time of the event. - **AppraiserProcess** The name of the process that launched Appraiser. - **PCFP** An ID for the system calculated by hashing hardware identifiers. @@ -1354,35 +1354,35 @@ The following fields are available: ### Microsoft.Windows.Appraiser.General.TelemetryRunHealth -A summary event indicating the parameters and result of a telemetry run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up-to-date. +A summary event indicating the parameters and result of a diagnostic data run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up-to-date. The following fields are available: - **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. - **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also diagnostic data reliability. - **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. - **Time** The client time of the event. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. +- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime. - **AppraiserProcess** The name of the process that launched Appraiser. - **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current diagnostic data run. - **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. - **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **EnterpriseRun** Indicates if the diagnostic data run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic. - **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. - **AuxFinal** Obsolete, always set to false - **StoreHandleIsNotNull** Obsolete, always set to false - **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser diagnostic data run. - **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. - **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **TelementrySent** Indicates if telemetry was successfully sent. +- **TelementrySent** Indicates if diagnostic data was successfully sent. - **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. -- **RunResult** The hresult of the Appraiser telemetry run. +- **RunResult** The hresult of the Appraiser diagnostic data run. ### Microsoft.Windows.Appraiser.General.WmdrmAdd @@ -1502,14 +1502,14 @@ The following fields are available: - **MSA_Accounts** Represents a list of hashed IDs of the Microsoft Accounts that are flighting (pre-release builds) on this device. - **IsFlightsDisabled** Represents if the device is participating in the Windows Insider program. - **FlightingBranchName** The name of the Windows Insider branch currently used by the device. -- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **DeviceSampleRate** The diagnostic data sample rate assigned to the device. - **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. - **SSRK** Retrieves the mobile targeting settings. ### Census.Hardware -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up-to-date. +This event sends data about the device, including hardware type, OEM brand, model line, model, diagnostic data level setting, and TPM support, to help keep Windows up-to-date. The following fields are available: @@ -1532,8 +1532,8 @@ The following fields are available: - **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. - **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. - **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TelemetryLevel** The diagnostic data level the user has opted into, such as Basic or Enhanced. +- **TelemetrySettingAuthority** Determines who set the diagnostic data level, such as GP, MDM, or the user. - **DeviceForm** Indicates the form as per the device classification. - **DigitizerSupport** Is a digitizer supported? - **OEMModelBaseBoard** The baseboard model used by the OEM. @@ -1545,7 +1545,7 @@ The following fields are available: - **Gyroscope** Indicates whether the device has a gyroscope. - **Magnetometer** Indicates whether the device has a magnetometer. - **NFCProximity** Indicates whether the device supports NFC. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. +- **TelemetryLevelLimitEnhanced** The diagnostic data level for Windows Analytics-based solutions. ### Census.Memory @@ -1784,45 +1784,45 @@ This event provides information on about security settings used to help keep Win ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition -This event sends data indicating that a device has undergone a change of telemetry opt-in level during the runtime of the device (not at UTC boot or offline), to help keep Windows up to date. +This event sends data indicating that a device has undergone a change of diagnostic data opt-in level during the runtime of the device (not at UTC boot or offline), to help keep Windows up to date. The following fields are available: -- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto telemetry from the OS provider groups. -- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS telemetry. Non-OS telemetry is responsible for providing its own opt-in mechanism. +- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto diagnostic data from the OS provider groups. +- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS diagnostic data. Non-OS diagnostic data is responsible for providing its own opt-in mechanism. - **CanCollectCoreTelemetry** True if UTC is allowed to collect data which is tagged with both MICROSOFT_KEYWORD_CRITICAL_DATA and MICROSOFT_EVENTTAG_CORE_DATA. - **CanCollectHeartbeats** True if UTC is allowed to collect heartbeats. -- **CanCollectOsTelemetry** True if UTC is allowed to collect telemetry from the OS provider groups (often called Microsoft Telemetry). +- **CanCollectOsTelemetry** True if UTC is allowed to collect diagnostic data from the OS provider groups. - **CanPerformDiagnosticEscalations** True if UTC is allowed to perform all scenario escalations. - **CanPerformScripting** True if UTC is allowed to perform scripting. - **CanPerformTraceEscalations** True if UTC is allowed to perform scenario escalations with tracing actions. - **CanReportScenarios** True if UTC is allowed to load and report scenario completion, failure, and cancellation events. -- **TransitionFromEverythingOff** True if this transition is moving from not allowing core telemetry to allowing core telemetry. -- **PreviousPermissions** Bitmask representing the previously configured permissions since the telemetry opt-in level was last changed. +- **TransitionFromEverythingOff** True if this transition is moving from not allowing core diagnostic data to allowing core diagnostic data. +- **PreviousPermissions** Bitmask representing the previously configured permissions since the diagnostic data opt-in level was last changed. ### TelClientSynthetic.AuthorizationInfo_Startup -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. +This event sends data indicating that a device has undergone a change of diagnostic data opt-in level detected at UTC startup, to help keep Windows up to date. The following fields are available: -- **TransitionFromEverythingOff** True if this transition is moving from not allowing core telemetry to allowing core telemetry. -- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS telemetry. Non-OS telemetry is responsible for providing its own opt-in mechanism. +- **TransitionFromEverythingOff** True if this transition is moving from not allowing core diagnostic data to allowing core diagnostic data. +- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS diagnostic data. Non-OS diagnostic data is responsible for providing its own opt-in mechanism. - **CanCollectHeartbeats** True if UTC is allowed to collect heartbeats. - **CanCollectCoreTelemetry** True if UTC is allowed to collect data which is tagged with both MICROSOFT_KEYWORD_CRITICAL_DATA and MICROSOFT_EVENTTAG_CORE_DATA. -- **CanCollectOsTelemetry** True if UTC is allowed to collect telemetry from the OS provider groups (often called Microsoft Telemetry). +- **CanCollectOsTelemetry** True if UTC is allowed to collect diagnostic data from the OS provider groups. - **CanReportScenarios** True if UTC is allowed to load and report scenario completion, failure, and cancellation events. -- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto telemetry from the OS provider groups. +- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto diagnostic data from the OS provider groups. - **CanPerformTraceEscalations** True if UTC is allowed to perform scenario escalations with tracing actions. - **CanPerformDiagnosticEscalations** True if UTC is allowed to perform all scenario escalations. - **CanPerformScripting** True if UTC is allowed to perform scripting. -- **PreviousPermissions** Bitmask representing the previously configured permissions since the telemetry client was last started. +- **PreviousPermissions** Bitmask representing the previously configured permissions since the diagnostic data client was last started. ### TelClientSynthetic.ConnectivityHeartBeat_0 -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. +This event sends data about the connectivity status of the Connected User Experiences and Telemetry component that uploads diagnostic data events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. The following fields are available: @@ -1838,13 +1838,13 @@ The following fields are available: ### TelClientSynthetic.HeartBeat_5 -This event sends data about the health and quality of the telemetry data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. +This event sends data about the health and quality of the diagnostic data data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. The following fields are available: - **PreviousHeartBeatTime** The time of last heartbeat event. This allows chaining of events. -- **EtwDroppedCount** The number of events dropped by the ETW layer of the telemetry client. -- **ConsumerDroppedCount** The number of events dropped by the consumer layer of the telemetry client. +- **EtwDroppedCount** The number of events dropped by the ETW layer of the diagnostic data client. +- **ConsumerDroppedCount** The number of events dropped by the consumer layer of the diagnostic data client. - **DecodingDroppedCount** The number of events dropped because of decoding failures. - **ThrottledDroppedCount** The number of events dropped due to throttling of noisy providers. - **DbDroppedCount** The number of events that were dropped because the database was full. @@ -1852,10 +1852,10 @@ The following fields are available: - **EventSubStoreResetSizeSum** The total size of the event database across all resets reports in this instance. - **CriticalOverflowEntersCounter** The number of times a critical overflow mode was entered into the event database. - **EnteringCriticalOverflowDroppedCounter** The number of events that was dropped because a critical overflow mode was initiated. -- **UploaderDroppedCount** The number of events dropped by the uploader layer of the telemetry client. +- **UploaderDroppedCount** The number of events dropped by the uploader layer of the diagnostic data client. - **InvalidHttpCodeCount** The number of invalid HTTP codes received from Vortex. - **LastInvalidHttpCode** The last invalid HTTP code received from Vortex. -- **MaxInUseScenarioCounter** The soft maximum number of scenarios loaded by the Connected User Experience and Telemetry component. +- **MaxInUseScenarioCounter** The soft maximum number of scenarios loaded by the Connected User Experiences and Telemetry component. - **LastEventSizeOffender** The name of the last event that exceeded the maximum event size. - **SettingsHttpAttempts** The number of attempts to contact the OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. @@ -1957,7 +1957,7 @@ The following fields are available: - **ProcessArchitecture** Architecture of the crashing process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **ReportId** A GUID used to identify the report. This can used to track the report across Watson. - **Flags** Flags indicating how reporting is done. For example, queue the report, do not offer JIT debugging, or do not terminate the process after reporting. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the diagnostic data backend. - **TargetAppId** The kernel reported AppId of the application being reported. - **TargetAppVer** The specific version of the application being reported - **TargetAsId** The sequence number for the hanging process. @@ -1982,7 +1982,7 @@ The following fields are available: - **ProcessArchitecture** Architecture of the hung process, as one of the PROCESSOR_ARCHITECTURE_* constants: 0: PROCESSOR_ARCHITECTURE_INTEL. 5: PROCESSOR_ARCHITECTURE_ARM. 9: PROCESSOR_ARCHITECTURE_AMD64. 12: PROCESSOR_ARCHITECTURE_ARM64. - **WaitingOnPackageRelativeAppId** If this is a cross process hang waiting for a package, this has the relative application id of the package. - **WaitingOnAppVersion** If this is a cross process hang, this has the version of the application for which it is waiting. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the diagnostic data backend. - **WaitingOnPackageFullName** If this is a cross process hang waiting for a package, this has the full name of the package for which it is waiting. - **PackageFullName** Store application identity. - **AppVersion** The version of the app that has hung. diff --git a/windows/configuration/basic-level-windows-diagnostic-events-and-fields.md b/windows/configuration/basic-level-windows-diagnostic-events-and-fields.md index d4a94c3455..7db5063374 100644 --- a/windows/configuration/basic-level-windows-diagnostic-events-and-fields.md +++ b/windows/configuration/basic-level-windows-diagnostic-events-and-fields.md @@ -1,7 +1,7 @@ --- description: Use this article to learn more about what Windows diagnostic data is gathered at the basic level. title: Windows 10, version 1709 basic diagnostic events and fields (Windows 10) -keywords: privacy, telemetry +keywords: privacy, diagnostic data ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -32,7 +32,7 @@ You can learn more about Windows functional and diagnostic data through these ar - [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) - [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) -- [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) +- [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) @@ -106,7 +106,7 @@ The following fields are available: - **osVer** Represents the OS version, and its format is OS dependent. - **appId** Represents a unique identifier of the client application currently loaded in the process producing the event; and is used to group events together and understand usage pattern, errors by application. - **appVer** Represents the version number of the application. Used to understand errors by Version, Usage by Version across an app. -- **cV** Represents the Correlation Vector: A single field for tracking partial order of related telemetry events across component boundaries. +- **cV** Represents the Correlation Vector: A single field for tracking partial order of related diagnostic data events across component boundaries. ### Common Data Extensions.OS @@ -148,7 +148,7 @@ The following fields are available: ### Common Data Extensions.Consent UI Event -This User Account Control (UAC) telemetry point collects information on elevations that originate from low integrity levels. This occurs when a process running at low integrity level (IL) requires higher (administrator) privileges, and therefore requests for elevation via UAC (consent.exe). By better understanding the processes requesting these elevations, Microsoft can in turn improve the detection and handling of potentially malicious behavior in this path. +This User Account Control (UAC) diagnostic data point collects information on elevations that originate from low integrity levels. This occurs when a process running at low integrity level (IL) requires higher (administrator) privileges, and therefore requests for elevation via UAC (consent.exe). By better understanding the processes requesting these elevations, Microsoft can in turn improve the detection and handling of potentially malicious behavior in this path. The following fields are available: @@ -262,39 +262,39 @@ The following fields are available: - **AppraiserBranch** The source branch in which the currently running version of Appraiser was built. - **AppraiserProcess** The name of the process that launched Appraiser. - **AppraiserVersion** The version of the Appraiser file generating the events. -- **Context** Indicates what mode Appraiser is running in. Example: Setup or Telemetry. +- **Context** Indicates what mode Appraiser is running in. Example: Setup or Diagnostic Data. - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **Time** The client time of the event. ### Microsoft.Windows.Appraiser.General.TelemetryRunHealth -A summary event indicating the parameters and result of a telemetry run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up-to-date. +A summary event indicating the parameters and result of a diagnostic data run. This allows the rest of the data sent over the course of the run to be properly contextualized and understood, which is then used to keep Windows up-to-date. The following fields are available: - **AppraiserBranch** The source branch in which the version of Appraiser that is running was built. -- **AppraiserDataVersion** The version of the data files being used by the Appraiser telemetry run. +- **AppraiserDataVersion** The version of the data files being used by the Appraiser diagnostic data run. - **AppraiserProcess** The name of the process that launched Appraiser. - **AppraiserVersion** The file version (major, minor and build) of the Appraiser DLL, concatenated without dots. - **AuxFinal** Obsolete, always set to false - **AuxInitial** Obsolete, indicates if Appraiser is writing data files to be read by the Get Windows 10 app. - **DeadlineDate** A timestamp representing the deadline date, which is the time until which appraiser will wait to do a full scan. -- **EnterpriseRun** Indicates if the telemetry run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. +- **EnterpriseRun** Indicates if the diagnostic data run is an enterprise run, which means appraiser was run from the command line with an extra enterprise parameter. - **FullSync** Indicates if Appraiser is performing a full sync, which means that full set of events representing the state of the machine are sent. Otherwise, only the changes from the previous run are sent. - **InventoryFullSync** Indicates if inventory is performing a full sync, which means that the full set of events representing the inventory of machine are sent. - **PCFP** An ID for the system calculated by hashing hardware identifiers. - **PerfBackoff** Indicates if the run was invoked with logic to stop running when a user is present. Helps to understand why a run may have a longer elapsed time than normal. - **PerfBackoffInsurance** Indicates if appraiser is running without performance backoff because it has run with perf backoff and failed to complete several times in a row. - **RunAppraiser** Indicates if Appraiser was set to run at all. If this if false, it is understood that data events will not be received from this device. -- **RunDate** The date that the telemetry run was stated, expressed as a filetime. -- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional telemetry on an infrequent schedule and only from machines at telemetry levels higher than Basic. +- **RunDate** The date that the diagnostic data run was stated, expressed as a filetime. +- **RunGeneralTel** Indicates if the generaltel.dll component was run. Generaltel collects additional diagnostic data on an infrequent schedule and only from machines at diagnostic data levels higher than Basic. - **RunOnline** Indicates if appraiser was able to connect to Windows Update and theefore is making decisions using up-to-date driver coverage information. -- **RunResult** The hresult of the Appraiser telemetry run. -- **SendingUtc** Indicates if the Appraiser client is sending events during the current telemetry run. +- **RunResult** The hresult of the Appraiser diagnostic data run. +- **SendingUtc** Indicates if the Appraiser client is sending events during the current diagnostic data run. - **StoreHandleIsNotNull** Obsolete, always set to false -- **TelementrySent** Indicates if telemetry was successfully sent. -- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also telemetry reliability. +- **TelementrySent** Indicates if diagnostic data was successfully sent. +- **ThrottlingUtc** Indicates if the Appraiser client is throttling its output of CUET events to avoid being disabled. This increases runtime but also diagnostic data reliability. - **Time** The client time of the event. - **VerboseMode** Indicates if appraiser ran in Verbose mode, which is a test-only mode with extra logging. - **WhyFullSyncWithoutTablePrefix** Indicates the reason or reasons that a full sync was generated. @@ -1461,7 +1461,7 @@ This event sends Windows Insider data from customers participating in improvemen The following fields are available: -- **DeviceSampleRate** The telemetry sample rate assigned to the device. +- **DeviceSampleRate** The diagnostic data sample rate assigned to the device. - **EnablePreviewBuilds** Used to enable Windows Insider builds on a device. - **FlightIds** A list of the different Windows Insider builds on this device. - **FlightingBranchName** The name of the Windows Insider branch currently used by the device. @@ -1472,7 +1472,7 @@ The following fields are available: ### Census.Hardware -This event sends data about the device, including hardware type, OEM brand, model line, model, telemetry level setting, and TPM support, to help keep Windows up-to-date. +This event sends data about the device, including hardware type, OEM brand, model line, model, diagnostic data level setting, and TPM support, to help keep Windows up-to-date. The following fields are available: @@ -1504,9 +1504,9 @@ The following fields are available: - **PowerPlatformRole** The OEM preferred power management profile. It's used to help to identify the basic form factor of the device. - **SoCName** The firmware manufacturer of the device. - **StudyID** Used to identify retail and non-retail device. -- **TelemetryLevel** The telemetry level the user has opted into, such as Basic or Enhanced. -- **TelemetryLevelLimitEnhanced** The telemetry level for Windows Analytics-based solutions. -- **TelemetrySettingAuthority** Determines who set the telemetry level, such as GP, MDM, or the user. +- **TelemetryLevel** The diagnostic data level the user has opted into, such as Basic or Enhanced. +- **TelemetryLevelLimitEnhanced** The diagnostic data level for Windows Analytics-based solutions. +- **TelemetrySettingAuthority** Determines who set the diagnostic data level, such as GP, MDM, or the user. - **TPMVersion** The supported Trusted Platform Module (TPM) on the device. If no TPM is present, the value is 0. - **VoiceSupported** Does the device have a cellular radio capable of making voice calls? @@ -1729,45 +1729,45 @@ This event provides information on about security settings used to help keep Win ### TelClientSynthetic.AuthorizationInfo_Startup -This event sends data indicating that a device has undergone a change of telemetry opt-in level detected at UTC startup, to help keep Windows up to date. +This event sends data indicating that a device has undergone a change of diagnostic data opt-in level detected at UTC startup, to help keep Windows up to date. The following fields are available: -- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto telemetry from the OS provider groups. -- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS telemetry. Non-OS telemetry is responsible for providing its own opt-in mechanism. +- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto diagnostic data from the OS provider groups. +- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS diagnostic data. Non-OS diagnostic data is responsible for providing its own opt-in mechanism. - **CanCollectCoreTelemetry** True if UTC is allowed to collect data which is tagged with both MICROSOFT_KEYWORD_CRITICAL_DATA and MICROSOFT_EVENTTAG_CORE_DATA. - **CanCollectHeartbeats** True if UTC is allowed to collect heartbeats. -- **CanCollectOsTelemetry** True if UTC is allowed to collect telemetry from the OS provider groups (often called Microsoft Telemetry). +- **CanCollectOsTelemetry** True if UTC is allowed to collect diagnostic data from the OS provider groups. - **CanPerformDiagnosticEscalations** True if UTC is allowed to perform all scenario escalations. - **CanPerformScripting** True if UTC is allowed to perform scripting. - **CanPerformTraceEscalations** True if UTC is allowed to perform scenario escalations with tracing actions. - **CanReportScenarios** True if UTC is allowed to load and report scenario completion, failure, and cancellation events. -- **PreviousPermissions** Bitmask representing the previously configured permissions since the telemetry client was last started. -- **TransitionFromEverythingOff** True if this transition is moving from not allowing core telemetry to allowing core telemetry. +- **PreviousPermissions** Bitmask representing the previously configured permissions since the diagnostic data client was last started. +- **TransitionFromEverythingOff** True if this transition is moving from not allowing core diagnostic data to allowing core diagnostic data. ### TelClientSynthetic.AuthorizationInfo_RuntimeTransition -This event sends data indicating that a device has undergone a change of telemetry opt-in level during the runtime of the device (not at UTC boot or offline), to help keep Windows up to date. +This event sends data indicating that a device has undergone a change of diagnostic data opt-in level during the runtime of the device (not at UTC boot or offline), to help keep Windows up to date. The following fields are available: -- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto telemetry from the OS provider groups. -- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS telemetry. Non-OS telemetry is responsible for providing its own opt-in mechanism. +- **CanAddMsaToMsTelemetry** True if UTC is allowed to add MSA user identity onto diagnostic data from the OS provider groups. +- **CanCollectAnyTelemetry** True if UTC is allowed to collect non-OS diagnostic data. Non-OS diagnostic data is responsible for providing its own opt-in mechanism. - **CanCollectCoreTelemetry** True if UTC is allowed to collect data which is tagged with both MICROSOFT_KEYWORD_CRITICAL_DATA and MICROSOFT_EVENTTAG_CORE_DATA. - **CanCollectHeartbeats** True if UTC is allowed to collect heartbeats. -- **CanCollectOsTelemetry** True if UTC is allowed to collect telemetry from the OS provider groups (often called Microsoft Telemetry). +- **CanCollectOsTelemetry** True if UTC is allowed to collect diagnostic data from the OS provider groups. - **CanPerformDiagnosticEscalations** True if UTC is allowed to perform all scenario escalations. - **CanPerformScripting** True if UTC is allowed to perform scripting. - **CanPerformTraceEscalations** True if UTC is allowed to perform scenario escalations with tracing actions. - **CanReportScenarios** True if UTC is allowed to load and report scenario completion, failure, and cancellation events. -- **PreviousPermissions** Bitmask representing the previously configured permissions since the telemetry opt-in level was last changed. -- **TransitionFromEverythingOff** True if this transition is moving from not allowing core telemetry to allowing core telemetry. +- **PreviousPermissions** Bitmask representing the previously configured permissions since the diagnostic data opt-in level was last changed. +- **TransitionFromEverythingOff** True if this transition is moving from not allowing core diagnostic data to allowing core diagnostic data. ### TelClientSynthetic.ConnectivityHeartBeat_0 -This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads telemetry events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. +This event sends data about the connectivity status of the Connected User Experience and Telemetry component that uploads diagnostic data events. If an unrestricted free network (such as Wi-Fi) is available, this event updates the last successful upload time. Otherwise, it checks whether a Connectivity Heartbeat event was fired in the past 24 hours, and if not, it fires an event. A Connectivity Heartbeat event also fires when a device recovers from costed network to free network. The following fields are available: @@ -1783,7 +1783,7 @@ The following fields are available: ### TelClientSynthetic.HeartBeat_5 -This event sends data about the health and quality of the telemetry data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. +This event sends data about the health and quality of the diagnostic data data from the given device, to help keep Windows up to date. It also enables data analysts to determine how 'trusted' the data is from a given device. The following fields are available: @@ -1791,7 +1791,7 @@ The following fields are available: - **CensusExitCode** The last exit code of the Census task. - **CensusStartTime** The time of the last Census run. - **CensusTaskEnabled** Indicates whether Census is enabled. -- **ConsumerDroppedCount** The number of events dropped by the consumer layer of the telemetry client. +- **ConsumerDroppedCount** The number of events dropped by the consumer layer of the diagnostic data client. - **CriticalDataDbDroppedCount** The number of critical data sampled events that were dropped at the database layer. - **CriticalDataThrottleDroppedCount** The number of critical data sampled events that were dropped because of throttling. - **CriticalOverflowEntersCounter** The number of times a critical overflow mode was entered into the event database. @@ -1800,7 +1800,7 @@ The following fields are available: - **DecodingDroppedCount** The number of events dropped because of decoding failures. - **EnteringCriticalOverflowDroppedCounter** The number of events that was dropped because a critical overflow mode was initiated. - **EtwDroppedBufferCount** The number of buffers dropped in the CUET ETW session. -- **EtwDroppedCount** The number of events dropped by the ETW layer of the telemetry client. +- **EtwDroppedCount** The number of events dropped by the ETW layer of the diagnostic data client. - **EventSubStoreResetCounter** The number of times the event database was reset. - **EventSubStoreResetSizeSum** The total size of the event database across all resets reports in this instance. - **EventsUploaded** The number of events that have been uploaded. @@ -1817,7 +1817,7 @@ The following fields are available: - **SettingsHttpAttempts** The number of attempts to contact the OneSettings service. - **SettingsHttpFailures** The number of failures from contacting the OneSettings service. - **ThrottledDroppedCount** The number of events dropped due to throttling of noisy providers. -- **UploaderDroppedCount** The number of events dropped by the uploader layer of the telemetry client. +- **UploaderDroppedCount** The number of events dropped by the uploader layer of the diagnostic data client. - **VortexFailuresTimeout** The number of timeout failures received from Vortex. - **VortexHttpAttempts** The number of attempts to contact the Vortex service. - **VortexHttpFailures4xx** The number of 400-499 error codes received from Vortex. @@ -1888,7 +1888,7 @@ The following fields are available: The following fields are available: - **AppName** The name of the app that has crashed. -- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the telemetry backend. +- **AppSessionGuid** GUID made up of process ID and is used as a correlation vector for process instances in the diagnostic data backend. - **AppTimeStamp** The date/time stamp of the app. - **AppVersion** The version of the app that has crashed. - **ExceptionCode** The exception code returned by the process that has crashed. @@ -1938,7 +1938,7 @@ This event sends data about hangs for both native and managed applications, to h The following fields are available: - **AppName** The name of the app that has hung. -- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the telemetry backend. +- **AppSessionGuid** GUID made up of process id used as a correlation vector for process instances in the diagnostic data backend. - **AppVersion** The version of the app that has hung. - **PackageFullName** Store application identity. - **PackageRelativeAppId** Store application identity. @@ -3185,7 +3185,7 @@ The following fields are available: ### Microsoft.Windows.UpdateNotificationPipeline.JavascriptJavascriptCriticalGenericMessage -This event indicates that Javascript is reporting a schema and a set of values for critical telemetry +This event indicates that Javascript is reporting a schema and a set of values for critical diagnostic data. The following fields are available: diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index 38cd69cdf4..ce324c8cf1 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -48,7 +48,7 @@ The topics in this library have been updated for Windows 10, version 1709 (also - [Create a Windows 10 kiosk that runs multiple apps](lock-down-windows-10-to-specific-apps.md) - [Multi-app kiosk XML reference](multi-app-kiosk-xml.md) - [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md) -- [Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](enhanced-telemetry-windows-analytics-events-and-fields.md) +- [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md) ## September 2017 diff --git a/windows/configuration/configure-windows-telemetry-in-your-organization.md b/windows/configuration/configure-windows-diagnostic-data-in-your-organization.md similarity index 55% rename from windows/configuration/configure-windows-telemetry-in-your-organization.md rename to windows/configuration/configure-windows-diagnostic-data-in-your-organization.md index 52483ff9cd..6a85eb7c57 100644 --- a/windows/configuration/configure-windows-telemetry-in-your-organization.md +++ b/windows/configuration/configure-windows-diagnostic-data-in-your-organization.md @@ -1,6 +1,6 @@ --- -description: Use this article to make informed decisions about how you can configure telemetry in your organization. -title: Configure Windows telemetry in your organization (Windows 10) +description: Use this article to make informed decisions about how you can configure diagnostic data in your organization. +title: Configure Windows diagnostic data in your organization (Windows 10) keywords: privacy ms.prod: w10 ms.mktglfcycl: manage @@ -11,7 +11,7 @@ author: brianlic-msft ms.date: 10/17/2017 --- -# Configure Windows telemetry in your organization +# Configure Windows diagnostic data in your organization **Applies to** @@ -19,54 +19,54 @@ ms.date: 10/17/2017 - Windows 10 Mobile - Windows Server -At Microsoft, we use Windows telemetry to inform our decisions and focus our efforts in providing the most robust, most valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Telemetry gives users a voice in the operating system’s development. This guide describes the importance of Windows telemetry and how we protect that data. Additionally, it differentiates between telemetry and functional data. It also describes the telemetry levels that Windows supports. Of course, you can choose how much telemetry is shared with Microsoft, and this guide demonstrates how. +At Microsoft, we use Windows diagnostic data to inform our decisions and focus our efforts in providing the most robust, most valuable platform for your business and the people who count on Windows to enable them to be as productive as possible. Diagnostic data gives users a voice in the operating system’s development. This guide describes the importance of Windows diagnostic data and how we protect that data. Additionally, it differentiates between diagnostic data and functional data. It also describes the diagnostic data levels that Windows supports. Of course, you can choose how much diagnostic data is shared with Microsoft, and this guide demonstrates how. -To frame a discussion about telemetry, it is important to understand Microsoft’s privacy principles. We earn customer trust every day by focusing on six key privacy principles as described at [privacy.microsoft.com](https://privacy.microsoft.com/). These principles guided the implementation of the Windows telemetry system in the following ways: +To frame a discussion about diagnostic data, it is important to understand Microsoft’s privacy principles. We earn customer trust every day by focusing on six key privacy principles as described at [privacy.microsoft.com](https://privacy.microsoft.com/). These principles guided the implementation of the Windows diagnostic data system in the following ways: -- **Control.** We offer customers control of the telemetry they share with us by providing easy-to-use management tools. -- **Transparency.** We provide information about the telemetry that Windows and Windows Server collects so our customers can make informed decisions. -- **Security.** We encrypt telemetry in transit from your device and protect that data at our secure data centers. +- **Control.** We offer customers control of the diagnostic data they share with us by providing easy-to-use management tools. +- **Transparency.** We provide information about the diagnostic data that Windows and Windows Server collects so our customers can make informed decisions. +- **Security.** We encrypt diagnostic data in transit from your device and protect that data at our secure data centers. - **Strong legal protections.** We respect customers’ local privacy laws and fight for legal protection of their privacy as a fundamental human right. -- **No content-based targeting.** We take steps to avoid and minimize the collection of customer content, such as the content of files, chats, or emails, through the Windows telemetry system. Customer content inadvertently collected is kept confidential and not used for user targeting. -- **Benefits to you.** We collect Windows telemetry to help provide you with an up-to-date, more secure, reliable and performant product, and to improve Windows for all our customers. +- **No content-based targeting.** We take steps to avoid and minimize the collection of customer content, such as the content of files, chats, or emails, through the Windows diagnostic data system. Customer content inadvertently collected is kept confidential and not used for user targeting. +- **Benefits to you.** We collect Windows diagnostic data to help provide you with an up-to-date, more secure, reliable and performant product, and to improve Windows for all our customers. -This article applies to Windows and Windows Server telemetry only. Other Microsoft or third-party apps, such as System Center Configuration Manager, System Center Endpoint Protection, or System Center Data Protection Manager, might send data to their cloud services in ways that are inconsistent with this guide. Their publishers are responsible for notifying users of their privacy policies, telemetry controls, and so on. This article describes the types of telemetry we may gather, the ways you might manage it in your organization, and some examples of how telemetry can provide you with valuable insights into your enterprise deployments. Microsoft uses the data to quickly identify and address issues affecting its customers. +This article applies to Windows and Windows Server diagnostic data only. Other Microsoft or third-party apps, such as System Center Configuration Manager, System Center Endpoint Protection, or System Center Data Protection Manager, might send data to their cloud services in ways that are inconsistent with this guide. Their publishers are responsible for notifying users of their privacy policies, diagnostic data controls, and so on. This article describes the types of diagnostic data we may gather, the ways you might manage it in your organization, and some examples of how diagnostic data can provide you with valuable insights into your enterprise deployments. Microsoft uses the data to quickly identify and address issues affecting its customers. -Use this article to make informed decisions about how you might configure telemetry in your organization. Telemetry is a term that means different things to different people and organizations. For this article, we discuss telemetry as system data that is uploaded by the Connected User Experience and Telemetry component. The telemetry data is used to help keep Windows devices secure by identifying malware trends and other threats and to help Microsoft improve the quality of Windows and Microsoft services. +Use this article to make informed decisions about how you might configure diagnostic data in your organization. Diagnostic data is a term that means different things to different people and organizations. For this article, we discuss diagnostic data as system data that is uploaded by the Connected User Experiences and Telemetry component. The diagnostic data data is used to help keep Windows devices secure by identifying malware trends and other threats and to help Microsoft improve the quality of Windows and Microsoft services. We are always striving to improve our documentation and welcome your feedback. You can provide feedback by contacting telmhelp@microsoft.com. ## Overview -In previous versions of Windows and Windows Server, Microsoft used telemetry to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server 2016, you can control telemetry streams by using the Privacy option in Settings, Group Policy, or MDM. +In previous versions of Windows and Windows Server, Microsoft used diagnostic data to check for updated or new Windows Defender signatures, check whether Windows Update installations were successful, gather reliability information through the Reliability Analysis Component (RAC), and gather reliability information through the Windows Customer Experience Improvement Program (CEIP) on Windows. In Windows 10 and Windows Server 2016, you can control diagnostic data streams by using the Privacy option in Settings, Group Policy, or MDM. For Windows 10, we invite IT pros to join the [Windows Insider Program](http://insider.windows.com) to give us feedback on what we can do to make Windows work better for your organization. -## Understanding Windows telemetry +## Understanding Windows diagnostic data Windows as a Service is a fundamental change in how Microsoft plans, builds, and delivers the operating system. Historically, we released a major Windows version every few years. The effort required to deploy large and infrequent Windows versions was substantial. That effort included updating the infrastructure to support the upgrade. Windows as a Service accelerates the cadence to provide rich updates more frequently, and these updates require substantially less effort to roll out than earlier versions of Windows. Since it provides more value to organizations in a shorter timeframe, delivering Windows as a Service is a top priority for us. -The release cadence of Windows may be fast, so feedback is critical to its success. We rely on telemetry at each stage of the process to inform our decisions and prioritize our efforts. +The release cadence of Windows may be fast, so feedback is critical to its success. We rely on diagnostic data at each stage of the process to inform our decisions and prioritize our efforts. -### What is Windows telemetry? -Windows telemetry is vital technical data from Windows devices about the device and how Windows and related software are performing. It's used in the following ways: +### What is Windows diagnostic data? +Windows diagnostic data is vital technical data from Windows devices about the device and how Windows and related software are performing. It's used in the following ways: - Keep Windows up to date - Keep Windows secure, reliable, and performant - Improve Windows – through the aggregate analysis of the use of Windows - Personalize Windows engagement surfaces -Here are some specific examples of Windows telemetry data: +Here are some specific examples of Windows diagnostic data data: - Type of hardware being used - Applications installed and usage details - Reliability information on device drivers -### What is NOT telemetry? +### What is NOT diagnostic data? -Telemetry can sometimes be confused with functional data. Some Windows components and apps connect to Microsoft services directly, but the data they exchange is not telemetry. For example, exchanging a user’s location for local weather or news is not an example of telemetry—it is functional data that the app or service requires to satisfy the user’s request. +Diagnostic data can sometimes be confused with functional data. Some Windows components and apps connect to Microsoft services directly, but the data they exchange is not diagnostic data. For example, exchanging a user’s location for local weather or news is not an example of diagnostic data—it is functional data that the app or service requires to satisfy the user’s request. -There are subtle differences between telemetry and functional data. Windows collects and sends telemetry in the background automatically. You can control how much information is gathered by setting the telemetry level. Microsoft tries to avoid collecting personal information wherever possible (for example, if a crash dump is collected and a document was in memory at the time of the crash). On the other hand, functional data can contain personal information. However, a user action, such as requesting news or asking Cortana a question, usually triggers collection and transmission of functional data. +There are subtle differences between diagnostic data and functional data. Windows collects and sends diagnostic data in the background automatically. You can control how much information is gathered by setting the diagnostic data level. Microsoft tries to avoid collecting personal information wherever possible (for example, if a crash dump is collected and a document was in memory at the time of the crash). On the other hand, functional data can contain personal information. However, a user action, such as requesting news or asking Cortana a question, usually triggers collection and transmission of functional data. If you’re an IT pro that wants to manage Windows functional data sent from your organization to Microsoft, see [Manage connections from Windows operating system components to Microsoft services](https://technet.microsoft.com/itpro/windows/manage/manage-connections-from-windows-operating-system-components-to-microsoft-services). @@ -76,26 +76,26 @@ The following are specific examples of functional data: - Bing searches - Wallpaper and desktop settings synced across multiple devices -### Telemetry gives users a voice +### Diagnostic data gives users a voice -Windows and Windows Server telemetry gives every user a voice in the operating system’s development and ongoing improvement. It helps us understand how Windows 10 and Windows Server 2016 behaves in the real world, focus on user priorities, and make informed decisions that benefit them. For our enterprise customers, representation in the dataset on which we will make future design decisions is a real benefit. The following sections offer real examples of these benefits. +Windows and Windows Server diagnostic data gives every user a voice in the operating system’s development and ongoing improvement. It helps us understand how Windows 10 and Windows Server 2016 behaves in the real world, focus on user priorities, and make informed decisions that benefit them. For our enterprise customers, representation in the dataset on which we will make future design decisions is a real benefit. The following sections offer real examples of these benefits. ### Drive higher app and driver quality -Our ability to collect telemetry that drives improvements to Windows and Windows Server helps raise the bar for app and device driver quality. Telemetry helps us to quickly identify and fix critical reliability and security issues with apps and device drivers on given configurations. For example, we can identify an app that hangs on devices using a specific version of a video driver, allowing us to work with the app and device driver vendor to quickly fix the issue. The result is less downtime and reduced costs and increased productivity associated with troubleshooting these issues. +Our ability to collect diagnostic data that drives improvements to Windows and Windows Server helps raise the bar for app and device driver quality. Diagnostic data helps us to quickly identify and fix critical reliability and security issues with apps and device drivers on given configurations. For example, we can identify an app that hangs on devices using a specific version of a video driver, allowing us to work with the app and device driver vendor to quickly fix the issue. The result is less downtime and reduced costs and increased productivity associated with troubleshooting these issues. -#### Real-world example of how Windows telemetry helps -There was a version of a video driver that was crashing on some devices running Windows 10, causing the device to reboot. We detected the problem in our telemetry, and immediately contacted the third-party developer who builds the video driver. Working with the developer, we provided an updated driver to Windows Insiders within 24 hours. Based on telemetry from the Windows Insiders’ devices, we were able to validate the new version of the video driver, and rolled it out to the broad public as an update the next day. Telemetry helped us find, fix, and resolve this problem in just 48 hours, providing a better user experience and reducing costly support calls. +#### Real-world example of how Windows diagnostic data helps +There was a version of a video driver that was crashing on some devices running Windows 10, causing the device to reboot. We detected the problem in our diagnostic data, and immediately contacted the third-party developer who builds the video driver. Working with the developer, we provided an updated driver to Windows Insiders within 24 hours. Based on diagnostic data from the Windows Insiders’ devices, we were able to validate the new version of the video driver, and rolled it out to the broad public as an update the next day. Diagnostic data helped us find, fix, and resolve this problem in just 48 hours, providing a better user experience and reducing costly support calls. ### Improve end-user productivity -Windows telemetry also helps Microsoft better understand how customers use (or do not use) the operating system’s features and related services. The insights we gain from this data helps us prioritize our engineering effort to directly impact our customers’ experiences. Examples are: +Windows diagnostic data also helps Microsoft better understand how customers use (or do not use) the operating system’s features and related services. The insights we gain from this data helps us prioritize our engineering effort to directly impact our customers’ experiences. Examples are: - **Start menu.** How do people change the Start menu layout? Do they pin other apps to it? Are there any apps that they frequently unpin? We use this dataset to adjust the default Start menu layout to better reflect people’s expectations when they turn on their device for the first time. -- **Cortana.** We use telemetry to monitor the scalability of our cloud service, improving search performance. -- **Application switching.** Research and observations from earlier Windows versions showed that people rarely used Alt+Tab to switch between applications. After discussing this with some users, we learned they loved the feature, saying that it would be highly productive, but they did not know about it previously. Based on this, we created the Task View button in Windows 10 to make this feature more discoverable. Later telemetry showed significantly higher usage of this feature. +- **Cortana.** We use diagnostic data to monitor the scalability of our cloud service, improving search performance. +- **Application switching.** Research and observations from earlier Windows versions showed that people rarely used Alt+Tab to switch between applications. After discussing this with some users, we learned they loved the feature, saying that it would be highly productive, but they did not know about it previously. Based on this, we created the Task View button in Windows 10 to make this feature more discoverable. Later diagnostic data showed significantly higher usage of this feature. -**These examples show how the use of telemetry data enables Microsoft to build or enhance features which can help organizations increase employee productivity while lowering help desk calls.** +**These examples show how the use of diagnostic data data enables Microsoft to build or enhance features which can help organizations increase employee productivity while lowering help desk calls.** ### Insights into your own organization @@ -108,7 +108,7 @@ Upgrading to new operating system versions has traditionally been a challenging, To better help customers through this difficult process, Microsoft developed Upgrade Readiness to give enterprises the tools to plan and manage the upgrade process end to end and allowing them to adopt new Windows releases more quickly and on an ongoing basis. -With Windows telemetry enabled, Microsoft collects computer, application, and driver compatibility-related information for analysis. We then identify compatibility issues that can block your upgrade and suggest fixes when they are known to Microsoft. +With Windows diagnostic data enabled, Microsoft collects computer, application, and driver compatibility-related information for analysis. We then identify compatibility issues that can block your upgrade and suggest fixes when they are known to Microsoft. Use Upgrade Readiness to get: @@ -122,50 +122,50 @@ Use Upgrade Readiness to get: The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. -## How is telemetry data handled by Microsoft? +## How is diagnostic data data handled by Microsoft? ### Data collection -Windows 10 and Windows Server 2016 includes the Connected User Experience and Telemetry component, which uses Event Tracing for Windows (ETW) tracelogging technology that gathers and stores telemetry events and data. The operating system and some Microsoft management solutions, such as System Center, use the same logging technology. +Windows 10 and Windows Server 2016 includes the Connected User Experiences and Telemetry component, which uses Event Tracing for Windows (ETW) tracelogging technology that gathers and stores diagnostic data events and data. The operating system and some Microsoft management solutions, such as System Center, use the same logging technology. 1. Operating system features and some management applications are instrumented to publish events and data. Examples of management applications include Virtual Machine Manager (VMM), Server Manager, and Storage Spaces. 2. Events are gathered using public operating system event logging and tracing APIs. -3. You can configure the telemetry level by using MDM policy, Group Policy, or registry settings. -4. The Connected User Experience and Telemetry component transmits the telemetry data. +3. You can configure the diagnostic data level by using MDM policy, Group Policy, or registry settings. +4. The Connected User Experiences and Telemetry component transmits the diagnostic data data. -Info collected at the Enhanced and Full levels of telemetry is typically gathered at a fractional sampling rate, which can be as low as 1% of devices reporting data at those levels. +Info collected at the Enhanced and Full levels of diagnostic data is typically gathered at a fractional sampling rate, which can be as low as 1% of devices reporting data at those levels. ### Data transmission -All telemetry data is encrypted using SSL and uses certificate pinning during transfer from the device to the Microsoft Data Management Service. With Windows 10, data is uploaded on a schedule that is sensitive to event priority, battery use, and network cost. Real-time events, such as Windows Defender Advanced Threat Protection, are always sent immediately. Normal events are not uploaded on metered networks, unless you are on a metered server connection. On a free network, normal events can be uploaded every 4 hours if on battery, or every 15 minutes if on A/C power. Diagnostic and crash data are only uploaded on A/C power and free networks. +All diagnostic data data is encrypted using SSL and uses certificate pinning during transfer from the device to the Microsoft Data Management Service. With Windows 10, data is uploaded on a schedule that is sensitive to event priority, battery use, and network cost. Real-time events, such as Windows Defender Advanced Threat Protection, are always sent immediately. Normal events are not uploaded on metered networks, unless you are on a metered server connection. On a free network, normal events can be uploaded every 4 hours if on battery, or every 15 minutes if on A/C power. Diagnostic and crash data are only uploaded on A/C power and free networks. ### Endpoints The Microsoft Data Management Service routes data back to our secure cloud storage. Only Microsoft personnel with a valid business justification are permitted access. -The following table defines the endpoints for telemetry services: +The following table defines the endpoints for diagnostic data services: | Service | Endpoint | | - | - | -| Connected User Experience and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com | +| Connected User Experiences and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com | | [Windows Error Reporting](http://msdn.microsoft.com/library/windows/desktop/bb513641.aspx) | watson.telemetry.microsoft.com | | [Online Crash Analysis](http://msdn.microsoft.com/library/windows/desktop/ee416349.aspx) | oca.telemetry.microsoft.com | | OneDrive app for Windows 10 | vortex.data.microsoft.com/collect/v1 | ### Data use and access -The principle of least privileged access guides access to telemetry data. Microsoft does not share personal data of our customers with third parties, except at the customer’s discretion or for the limited purposes described in the [Privacy Statement](https://privacy.microsoft.com/privacystatement). Microsoft may share business reports with OEMs and third-party partners that include aggregated and anonymized telemetry information. Data-sharing decisions are made by an internal team including privacy, legal, and data management. +The principle of least privileged access guides access to diagnostic data data. Microsoft does not share personal data of our customers with third parties, except at the customer’s discretion or for the limited purposes described in the [Privacy Statement](https://privacy.microsoft.com/privacystatement). Microsoft may share business reports with OEMs and third-party partners that include aggregated and anonymized diagnostic data information. Data-sharing decisions are made by an internal team including privacy, legal, and data management. ### Retention Microsoft believes in and practices information minimization. We strive to gather only the info we need and to store it only for as long as it’s needed to provide a service or for analysis. Much of the info about how Windows and apps are functioning is deleted within 30 days. Other info may be retained longer, such as error reporting data or Microsoft Store purchase history. -## Telemetry levels -This section explains the different telemetry levels in Windows 10, Windows Server 2016, and System Center. These levels are available on all desktop and mobile editions of Windows 10, except for the **Security** level, which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. +## Diagnostic data levels +This section explains the different diagnostic data levels in Windows 10, Windows Server 2016, and System Center. These levels are available on all desktop and mobile editions of Windows 10, except for the **Security** level, which is limited to Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, Windows 10 IoT Core (IoT Core), and Windows Server 2016. -The telemetry data is categorized into four levels: +The diagnostic data data is categorized into four levels: -- **Security**. Information that’s required to help keep Windows, Windows Server, and System Center secure, including data about the Connected User Experience and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. +- **Security**. Information that’s required to help keep Windows, Windows Server, and System Center secure, including data about the Connected User Experiences and Telemetry component settings, the Malicious Software Removal Tool, and Windows Defender. - **Basic**. Basic device info, including: quality-related data, app compatibility, app usage data, and data from the **Security** level. @@ -175,20 +175,20 @@ The telemetry data is categorized into four levels: The levels are cumulative and are illustrated in the following diagram. Also, these levels apply to all editions of Windows Server 2016. -![breakdown of telemetry levels and types of administrative controls](images/priv-telemetry-levels.png) +![breakdown of diagnostic data levels and types of administrative controls](images/priv-telemetry-levels.png) ### Security level -The Security level gathers only the telemetry info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server 2016, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windows IoT Core editions. +The Security level gathers only the diagnostic data info that is required to keep Windows devices, Windows Server, and guests protected with the latest security updates. This level is only available on Windows Server 2016, Windows 10 Enterprise, Windows 10 Education, Windows 10 Mobile Enterprise, and Windows IoT Core editions. > [!NOTE] > If your organization relies on Windows Update for updates, you shouldn’t use the **Security** level. Because no Windows Update information is gathered at this level, important information about update failures is not sent. Microsoft uses this information to fix the causes of those failures and improve the quality of our updates. -Windows Server Update Services (WSUS) and System Center Configuration Manager functionality is not affected at this level, nor is telemetry data about Windows Server features or System Center gathered. +Windows Server Update Services (WSUS) and System Center Configuration Manager functionality is not affected at this level, nor is diagnostic data data about Windows Server features or System Center gathered. The data gathered at this level includes: -- **Connected User Experience and Telemetry component settings**. If general telemetry data has been gathered and is queued, it is sent to Microsoft. Along with this telemetry, the Connected User Experience and Telemetry component may download a configuration settings file from Microsoft’s servers. This file is used to configure the Connected User Experience and Telemetry component itself. The data gathered by the client for this request includes OS information, device id (used to identify what specific device is requesting settings) and device class (for example, whether the device is server or desktop). +- **Connected User Experiences and Telemetry component settings**. If general diagnostic data data has been gathered and is queued, it is sent to Microsoft. Along with this diagnostic data, the Connected User Experiences and Telemetry component may download a configuration settings file from Microsoft’s servers. This file is used to configure the Connected User Experiences and Telemetry component itself. The data gathered by the client for this request includes OS information, device id (used to identify what specific device is requesting settings) and device class (for example, whether the device is server or desktop). - **Malicious Software Removal Tool (MSRT)** The MSRT infection report contains information, including device info and IP address. @@ -202,15 +202,15 @@ The data gathered at this level includes: Microsoft recommends that Windows Update, Windows Defender, and MSRT remain enabled unless the enterprise uses alternative solutions such as Windows Server Update Services, System Center Configuration Manager, or a third-party antimalware solution. Windows Update, Windows Defender, and MSRT provide core Windows functionality such as driver and OS updates, including security updates. -For servers with default telemetry settings and no Internet connectivity, you should set the telemetry level to **Security**. This stops data gathering for events that would not be uploaded due to the lack of Internet connectivity. +For servers with default diagnostic data settings and no Internet connectivity, you should set the diagnostic data level to **Security**. This stops data gathering for events that would not be uploaded due to the lack of Internet connectivity. -No user content, such as user files or communications, is gathered at the **Security** telemetry level, and we take steps to avoid gathering any information that directly identifies a company or user, such as name, email address, or account ID. However, in rare circumstances, MSRT information may unintentionally contain personal information. For instance, some malware may create entries in a computer’s registry that include information such as a username, causing it to be gathered. MSRT reporting is optional and can be turned off at any time. +No user content, such as user files or communications, is gathered at the **Security** diagnostic data level, and we take steps to avoid gathering any information that directly identifies a company or user, such as name, email address, or account ID. However, in rare circumstances, MSRT information may unintentionally contain personal information. For instance, some malware may create entries in a computer’s registry that include information such as a username, causing it to be gathered. MSRT reporting is optional and can be turned off at any time. ### Basic level -The Basic level gathers a limited set of data that’s critical for understanding the device and its configuration. This level also includes the **Security** level data. This level helps to identify problems that can occur on a specific hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a specific driver version. The Connected User Experience and Telemetry component does not gather telemetry data about System Center, but it can transmit telemetry for other non-Windows applications if they have user consent. +The Basic level gathers a limited set of data that’s critical for understanding the device and its configuration. This level also includes the **Security** level data. This level helps to identify problems that can occur on a specific hardware or software configuration. For example, it can help determine if crashes are more frequent on devices with a specific amount of memory or that are running a specific driver version. The Connected User Experiences and Telemetry component does not gather diagnostic data data about System Center, but it can transmit diagnostic data for other non-Windows applications if they have user consent. -The normal upload range for the Basic telemetry level is between 109 KB - 159 KB per day, per device. +The normal upload range for the Basic diagnostic data level is between 109 KB - 159 KB per day, per device. The data gathered at this level includes: @@ -232,7 +232,7 @@ The data gathered at this level includes: - Storage attributes, such as number of drives, type, and size -- **Connected User Experience and Telemetry component quality metrics**. Helps provide an understanding about how the Connected User Experience and Telemetry component is functioning, including % of uploaded events, dropped events, and the last upload time. +- **Connected User Experiences and Telemetry component quality metrics**. Helps provide an understanding about how the Connected User Experiences and Telemetry component is functioning, including % of uploaded events, dropped events, and the last upload time. - **Quality-related information**. Helps Microsoft develop a basic understanding of how a device and its operating system are performing. Some examples are the device characteristics of a Connected Standby device, the number of crashes or hangs, and application state change details, such as how much processor time and memory were used, and the total uptime for an app. @@ -259,7 +259,7 @@ The Enhanced level gathers data about how Windows and apps are used and how they This is the default level for Windows 10 Enterprise and Windows 10 Education editions, and the minimum level needed to quickly identify and address Windows, Windows Server, and System Center quality issues. -The normal upload range for the Enhanced telemetry level is between 239 KB - 348 KB per day, per device. +The normal upload range for the Enhanced diagnostic data level is between 239 KB - 348 KB per day, per device. The data gathered at this level includes: @@ -271,14 +271,14 @@ The data gathered at this level includes: - **Some crash dump types**. All crash dump types, except for heap dumps and full dumps. -If the Connected User Experience and Telemetry component detects a problem on Windows 10 that requires gathering more detailed instrumentation, the Connected User Experience and Telemetry component at the **Enhanced** telemetry level will only gather data about the events associated with the specific issue. +If the Connected User Experiences and Telemetry component detects a problem on Windows 10 that requires gathering more detailed instrumentation, the Connected User Experiences and Telemetry component at the **Enhanced** diagnostic data level will only gather data about the events associated with the specific issue. #### Limit Enhanced diagnostic data to the minimum required by Windows Analytics Windows Analytics Device Health reports are powered by diagnostic data not included in the **Basic** level, such as crash reports and certain operating system events. In the past, organizations sending **Enhanced** or **Full** level diagnostic data were able to participate in Device Health. However, organizations that required detailed event and field level documentation were unable to move from **Basic** to **Enhanced**. In Windows 10, version 1709, we introduce the **Limit Enhanced diagnostic data to the minimum required by Windows Analytics** feature. When enabled, this feature lets you send only the following subset of **Enhanced** level diagnostic data. For more info about Device Health, see the [Monitor the health of devices with Device Health](https://docs.microsoft.com/windows/deployment/update/device-health-monitor) topic. -- **Operating system events.** Limited to a small set required for analytics reports and documented in the [Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](https://docs.microsoft.com/windows/configuration/eventname) topic. +- **Operating system events.** Limited to a small set required for analytics reports and documented in the [Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](https://docs.microsoft.com/windows/configuration/eventname) topic. - **Some crash dump types.** All crash dump types, except for heap and full dumps. @@ -308,7 +308,7 @@ The **Full** level gathers data necessary to identify and to help fix problems, Additionally, at this level, devices opted in to the [Windows Insider Program](http://insider.windows.com) will send events, such as reliability and app responsiveness. that can show Microsoft how pre-release binaries and features are performing. These events help us make decisions on which builds are flighted. All devices in the [Windows Insider Program](http://insider.windows.com) are automatically set to this level. -If a device experiences problems that are difficult to identify or repeat using Microsoft’s internal testing, additional data becomes necessary. This data can include any user content that might have triggered the problem and is gathered from a small sample of devices that have both opted into the **Full** telemetry level and have exhibited the problem. +If a device experiences problems that are difficult to identify or repeat using Microsoft’s internal testing, additional data becomes necessary. This data can include any user content that might have triggered the problem and is gathered from a small sample of devices that have both opted into the **Full** diagnostic data level and have exhibited the problem. However, before more data is gathered, Microsoft’s privacy governance team, including privacy and other subject matter experts, must approve the diagnostics request made by a Microsoft engineer. If the request is approved, Microsoft engineers can use the following capabilities to get the information: @@ -320,27 +320,27 @@ However, before more data is gathered, Microsoft’s privacy governance team, in ## Enterprise management -Sharing telemetry data with Microsoft provides many benefits to enterprises, so we do not recommend turning it off. For most enterprise customers, simply adjusting the telemetry level and managing specific components is the best option. +Sharing diagnostic data data with Microsoft provides many benefits to enterprises, so we do not recommend turning it off. For most enterprise customers, simply adjusting the diagnostic data level and managing specific components is the best option. -Customers can set the telemetry level in both the user interface and with existing management tools. Users can change the telemetry level in the **Diagnostic data** setting. In the **Settings** app, it is in **Privacy\Feedback & diagnostics**. They can choose between Basic, Enhanced, and Full. The Security level is not available. +Customers can set the diagnostic data level in both the user interface and with existing management tools. Users can change the diagnostic data level in the **Diagnostic data** setting. In the **Settings** app, it is in **Privacy\Feedback & diagnostics**. They can choose between Basic, Enhanced, and Full. The Security level is not available. -IT pros can use various methods, including Group Policy and Mobile Device Management (MDM), to choose a telemetry level. If you’re using Windows 10 Enterprise, Windows 10 Education, or Windows Server 2016, the Security telemetry level is available when managing the policy. Setting the telemetry level through policy overrides users’ choices. The remainder of this section describes how to do that. +IT pros can use various methods, including Group Policy and Mobile Device Management (MDM), to choose a diagnostic data level. If you’re using Windows 10 Enterprise, Windows 10 Education, or Windows Server 2016, the Security diagnostic data level is available when managing the policy. Setting the diagnostic data level through policy overrides users’ choices. The remainder of this section describes how to do that. -### Manage your telemetry settings +### Manage your diagnostic data settings -We do not recommend that you turn off telemetry in your organization as valuable functionality may be impacted, but we recognize that in some scenarios this may be required. Use the steps in this section to do so for Windows, Windows Server, and System Center. +We do not recommend that you turn off diagnostic data in your organization as valuable functionality may be impacted, but we recognize that in some scenarios this may be required. Use the steps in this section to do so for Windows, Windows Server, and System Center. > [!IMPORTANT] -> These telemetry levels only apply to Windows, Windows Server, and System Center components and apps that use the Connected User Experience and Telemetry component. Non-Windows components, such as Microsoft Office or other 3rd-party apps, may communicate with their cloud services outside of these telemetry levels. You should work with your app vendors to understand their telemetry policy, and how you can to opt in or opt out. For more information on how Microsoft Office uses telemetry, see [Overview of Office Telemetry](http://technet.microsoft.com/library/jj863580.aspx). +> These diagnostic data levels only apply to Windows, Windows Server, and System Center components and apps that use the Connected User Experiences and Telemetry component. Non-Windows components, such as Microsoft Office or other 3rd-party apps, may communicate with their cloud services outside of these diagnostic data levels. You should work with your app vendors to understand their diagnostic data policy, and how you can to opt in or opt out. For more information on how Microsoft Office uses diagnostic data, see [Overview of Office Telemetry](http://technet.microsoft.com/library/jj863580.aspx). -You can turn on or turn off System Center telemetry gathering. The default is on and the data gathered at this level represents what is gathered by default when System Center telemetry is turned on. However, setting the operating system telemetry level to **Basic** will turn off System Center telemetry, even if the System Center telemetry switch is turned on. +You can turn on or turn off System Center diagnostic data gathering. The default is on and the data gathered at this level represents what is gathered by default when System Center diagnostic data is turned on. However, setting the operating system diagnostic data level to **Basic** will turn off System Center diagnostic data, even if the System Center diagnostic data switch is turned on. -The lowest telemetry setting level supported through management policies is **Security**. The lowest telemetry setting supported through the Settings UI is **Basic**. The default telemetry setting for Windows Server 2016 is **Enhanced**. +The lowest diagnostic data setting level supported through management policies is **Security**. The lowest diagnostic data setting supported through the Settings UI is **Basic**. The default diagnostic data setting for Windows Server 2016 is **Enhanced**. -### Configure the operating system telemetry level +### Configure the operating system diagnostic data level -You can configure your operating system telemetry settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your telemetry levels through a management policy overrides any device level settings. +You can configure your operating system diagnostic data settings using the management tools you’re already using, such as Group Policy, MDM, or Windows Provisioning. You can also manually change your settings using Registry Editor. Setting your diagnostic data levels through a management policy overrides any device level settings. Use the appropriate value in the table below when you configure the management policy. @@ -352,9 +352,9 @@ Use the appropriate value in the table below when you configure the management p | Full | Security data, basic system and quality data, enhanced insights and advanced reliability data, and full diagnostics data. | **3** | -### Use Group Policy to set the telemetry level +### Use Group Policy to set the diagnostic data level -Use a Group Policy object to set your organization’s telemetry level. +Use a Group Policy object to set your organization’s diagnostic data level. 1. From the Group Policy Management Console, go to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Data Collection and Preview Builds**. @@ -362,11 +362,11 @@ Use a Group Policy object to set your organization’s telemetry level. 3. In the **Options** box, select the level that you want to configure, and then click **OK**. -### Use MDM to set the telemetry level +### Use MDM to set the diagnostic data level Use the [Policy Configuration Service Provider (CSP)](http://msdn.microsoft.com/library/windows/hardware/dn904962.aspx) to apply the System/AllowTelemetry MDM policy. -### Use Registry Editor to set the telemetry level +### Use Registry Editor to set the diagnostic data level Use Registry Editor to manually set the registry level on each device in your organization or you can write a script to edit the registry. If a management policy already exists, such as Group Policy or MDM, it will override this registry setting. @@ -380,25 +380,25 @@ Use Registry Editor to manually set the registry level on each device in your or 5. Click **File** > **Export**, and then save the file as a .reg file, such as **C:\\AllowTelemetry.reg**. You can run this file from a script on each device in your organization. -### Configure System Center 2016 telemetry +### Configure System Center 2016 diagnostic data -For System Center 2016 Technical Preview, you can turn off System Center telemetry by following these steps: +For System Center 2016 Technical Preview, you can turn off System Center diagnostic data by following these steps: -- Turn off telemetry by using the System Center UI Console settings workspace. +- Turn off diagnostic data by using the System Center UI Console settings workspace. -- For information about turning off telemetry for Service Management Automation and Service Provider Foundation, see [How to disable telemetry for Service Management Automation and Service Provider Foundation](https://support.microsoft.com/kb/3096505). +- For information about turning off diagnostic data for Service Management Automation and Service Provider Foundation, see [How to disable telemetry for Service Management Automation and Service Provider Foundation](https://support.microsoft.com/kb/3096505). -### Additional telemetry controls +### Additional diagnostic data controls -There are a few more settings that you can turn off that may send telemetry information: +There are a few more settings that you can turn off that may send diagnostic data information: -- To turn off Windows Update telemetry, you have two choices. Either turn off Windows Update, or set your devices to be managed by an on premises update server, such as [Windows Server Update Services (WSUS)](http://technet.microsoft.com/library/hh852345.aspx) or [System Center Configuration Manager](http://www.microsoft.com/server-cloud/products/system-center-2012-r2-configuration-manager/). +- To turn off Windows Update diagnostic data, you have two choices. Either turn off Windows Update, or set your devices to be managed by an on premises update server, such as [Windows Server Update Services (WSUS)](http://technet.microsoft.com/library/hh852345.aspx) or [System Center Configuration Manager](http://www.microsoft.com/server-cloud/products/system-center-2012-r2-configuration-manager/). - Turn off **Windows Defender Cloud-based Protection** and **Automatic sample submission** in **Settings** > **Update & security** > **Windows Defender**. - Manage the Malicious Software Removal Tool in your organization. For more info, see Microsoft KB article [891716](http://support.microsoft.com/kb/891716). -- Turn off **Linguistic Data Collection** in **Settings** > **Privacy**. At telemetry levels **Enhanced** and **Full**, Microsoft uses Linguistic Data Collection info to improve language model features such as autocomplete, spellcheck, suggestions, input pattern recognition, and dictionary. +- Turn off **Linguistic Data Collection** in **Settings** > **Privacy**. At diagnostic data levels **Enhanced** and **Full**, Microsoft uses Linguistic Data Collection info to improve language model features such as autocomplete, spellcheck, suggestions, input pattern recognition, and dictionary. > [!NOTE] > Microsoft does not intend to gather sensitive information, such as credit card numbers, usernames and passwords, email addresses, or other similarly sensitive information for Linguistic Data Collection. We guard against such events by using technologies to identify and remove sensitive information before linguistic data is sent from the user's device. If we determine that sensitive information has been inadvertently received, we delete the information. diff --git a/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields.md b/windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md similarity index 94% rename from windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields.md rename to windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md index 4463ec973b..385988b6d3 100644 --- a/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields.md +++ b/windows/configuration/enhanced-diagnostic-data-windows-analytics-events-and-fields.md @@ -1,7 +1,7 @@ --- -description: Use this article to learn more about the enhanced telemetry events used by Windows Analytics +description: Use this article to learn more about the enhanced diagnostic data events used by Windows Analytics title: Windows 10, version 1709 enhanced telemtry events and fields used by Windows Analytics (Windows 10) -keywords: privacy, telemetry +keywords: privacy, diagnostic data ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -13,15 +13,15 @@ ms.author: jaimeo --- -# Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics +# Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics **Applies to** - Windows 10, version 1709 and later -Windows Analytics Device Health reports are powered by diagnostic data not included in the Basic level. This includes crash reports and certain OS telemetry events. Organizations sending Enhanced or Full level diagnostic data were able to participate in Device Health, but some organizations which required detailed event and field level documentation were unable to move from Basic to Enhanced. +Windows Analytics Device Health reports are powered by diagnostic data not included in the Basic level. This includes crash reports and certain OS diagnostic data events. Organizations sending Enhanced or Full level diagnostic data were able to participate in Device Health, but some organizations which required detailed event and field level documentation were unable to move from Basic to Enhanced. -In Windows 10, version 1709, we introduce a new feature: "Limit Enhanced diagnostic data to the minimum required by Windows Analytics". When enabled, this feature limits the operating system telemetry events included in the Enhanced level to only those described below. Note that the Enhanced level also includes limited crash reports, which are not described below. For more information on the Enhanced level, see [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md). +In Windows 10, version 1709, we introduce a new feature: "Limit Enhanced diagnostic data to the minimum required by Windows Analytics". When enabled, this feature limits the operating system diagnostic data events included in the Enhanced level to only those described below. Note that the Enhanced level also includes limited crash reports, which are not described below. For more information on the Enhanced level, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). ## KernelProcess.AppStateChangeSummary diff --git a/windows/configuration/gdpr-win10-whitepaper.md b/windows/configuration/gdpr-win10-whitepaper.md index 434bb0239b..c7dd56e8df 100644 --- a/windows/configuration/gdpr-win10-whitepaper.md +++ b/windows/configuration/gdpr-win10-whitepaper.md @@ -179,7 +179,7 @@ The GDPR includes explicit requirements for breach notification where a personal As noted in the Windows Security Center white paper, [Post Breach: Dealing with Advanced Threats](http://wincom.blob.core.windows.net/documents/Post_Breach_Dealing_with_Advanced_Threats_Whitepaper.pdf), “_Unlike pre-breach, post-breach assumes a breach has already occurred – acting as a flight recorder and Crime Scene Investigator (CSI). Post-breach provides security teams the information and toolset needed to identify, investigate, and respond to attacks that otherwise will stay undetected and below the radar._” -#### Insightful security telemetry +#### Insightful security diagnostic data For nearly two decades, Microsoft has been turning threats into useful intelligence that can help fortify our platform and protect customers. Today, with the immense computing advantages afforded by the cloud, we are finding new ways to use our rich analytics engines driven by threat intelligence to protect our customers. By applying a combination of automated and manual processes, machine learning and human experts, we can create an Intelligent Security Graph that learns from itself and evolves in real-time, reducing our collective time to detect and respond to new incidents across our products. diff --git a/windows/configuration/index.md b/windows/configuration/index.md index f41df7288e..c462632c79 100644 --- a/windows/configuration/index.md +++ b/windows/configuration/index.md @@ -19,11 +19,11 @@ Enterprises often need to apply custom configurations to devices for their users | Topic | Description | | --- | --- | -| [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md) | Use this article to make informed decisions about how you can configure Windows telemetry in your organization. | +| [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md) | Use this article to make informed decisions about how you can configure Windows diagnostic data in your organization. | | [Windows 10, version 1709 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md) | Learn about diagnostic data that is collected at the basic level in Windows 10, version 1709. | -|[Windows 10, version 1709 enhanced telemetry events and fields used by Windows Analytics](enhanced-telemetry-windows-analytics-events-and-fields.md)|Learn about diagnostic data that is collected by Windows Analytics.| +|[Windows 10, version 1709 enhanced diagnostic data events and fields used by Windows Analytics](enhanced-diagnostic-data-windows-analytics-events-and-fields.md)|Learn about diagnostic data that is collected by Windows Analytics.| | [Windows 10, version 1703 basic diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md) | Learn about diagnostic data that is collected at the basic level in Windows 10, version 1703. | -| [Windows 10 diagnostic data for the Full telemetry level](windows-diagnostic-data-1703.md) | Learn about the types of data that is collected at the full level in Windows 10, version 1703 and later. | +| [Windows 10 diagnostic data for the Full diagnostic data level](windows-diagnostic-data-1703.md) | Learn about the types of data that is collected at the full level in Windows 10, version 1703 and later. | |[Beginning your General Data Protection Regulation (GDPR) journey for Windows 10](gdpr-win10-whitepaper.md)|Learn about Windows 10 and the upcoming GDPR-compliance requirements.| | [Manage connections from Windows operating system components to Microsoft services](manage-connections-from-windows-operating-system-components-to-microsoft-services.md) | Learn about the network connections that Windows components make to Microsoft and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro. | | [Manage Wi-Fi Sense in your company](manage-wifi-sense-in-enterprise.md) | Wi-Fi Sense automatically connects you to Wi-Fi, so you can get online quickly in more places. It can connect you to open Wi-Fi hotspots it knows about through crowdsourcing, or to Wi-Fi networks your contacts have shared with you by using Wi-Fi Sense. The initial settings for Wi-Fi Sense are determined by the options you chose when you first set up your PC with Windows 10. | diff --git a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md index 3bfd1454ec..a34a6aa5a7 100644 --- a/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md +++ b/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services.md @@ -19,13 +19,13 @@ ms.date: 01/29/2018 - Windows 10 - Windows Server 2016 -If you're looking for content on what each telemetry level means and how to configure it in your organization, see [Configure Windows telemetry in your organization](configure-windows-telemetry-in-your-organization.md). +If you're looking for content on what each diagnostic data level means and how to configure it in your organization, see [Configure Windows diagnostic data in your organization](configure-windows-diagnostic-data-in-your-organization.md). Learn about the network connections that Windows components make to Microsoft and also the privacy settings that affect data that is shared with either Microsoft or apps and how they can be managed by an IT Pro. -If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. You can configure telemetry at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article. +If you want to minimize connections from Windows to Microsoft services, or configure particular privacy settings, this article covers the settings that you could consider. You can configure diagnostic data at the lowest level for your edition of Windows, and also evaluate which other connections Windows makes to Microsoft services you want to turn off in your environment from the list in this article. -You can configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reasons why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience. +You can configure diagnostic data at the Security level, turn off Windows Defender diagnostic data and MSRT reporting, and turn off all other connections to Microsoft network endpoints as described in this article to help prevent Windows from sending any data to Microsoft. There are many reasons why these communications are enabled by default, such as updating malware definitions and maintain current certificate revocation lists, which is why we strongly recommend against this. This data helps us deliver a secure, reliable, and more delightful personalized experience. To help make it easier to deploy settings to restrict connections from Windows 10 to Microsoft, you can apply the [Windows Restricted Traffic Limited Functionality Baseline](https://go.microsoft.com/fwlink/?linkid=828887). This baseline was created in the same way as the [Windows security baselines](/windows/device-security/windows-security-baselines) that are often used to efficiently configure Windows to a known secure state. Running the Windows Restricted Traffic Limited Functionality Baseline on devices in your organization will allow you to quickly configure all of the settings covered in this document. However, some of the settings reduce the functionality and security configuration of your device and are therefore not recommended. Make sure should you've chosen the right settings configuration for your environment before applying. You should not extract this package to the windows\\system32 folder because it will not apply correctly. Applying this baseline is equivalent to applying the Windows 10 steps covered in this article. @@ -69,7 +69,7 @@ Here's a list of changes that were made to this article for Windows 10, version ## Management options for each setting -The following sections list the components that make network connections to Microsoft services by default. You can configure these settings to control the data that is sent to Microsoft. To prevent Windows from sending any data to Microsoft, configure telemetry at the Security level, turn off Windows Defender telemetry and MSRT reporting, and turn off all of these connections. +The following sections list the components that make network connections to Microsoft services by default. You can configure these settings to control the data that is sent to Microsoft. To prevent Windows from sending any data to Microsoft, configure diagnostic data at the Security level, turn off Windows Defender diagnostic data and MSRT reporting, and turn off all of these connections. If you're running Windows 10, they will be included in the next update for the Long Term Servicing Branch. @@ -362,7 +362,7 @@ Windows Insider Preview builds only apply to Windows 10 and are not available fo > [!NOTE] -> If you upgrade a device that is configured to minimize connections from Windows to Microsoft services (that is, a device configured for zero exhaust) to a Windows Insider Preview build, the Feedback & Diagnostic setting will automatically be set to **Full**. Although the telemetry level may initially appear as **Basic**, a few hours after the UI is refreshed or the machine is rebooted, the setting will become **Full**. +> If you upgrade a device that is configured to minimize connections from Windows to Microsoft services (that is, a device configured for zero exhaust) to a Windows Insider Preview build, the Feedback & Diagnostic setting will automatically be set to **Full**. Although the diagnostic data level may initially appear as **Basic**, a few hours after the UI is refreshed or the machine is rebooted, the setting will become **Full**. To turn off Insider Preview builds for a released version of Windows 10: @@ -886,7 +886,7 @@ To turn off **Turn on SmartScreen Filter to check web content (URLs) that Micros To turn off **Send Microsoft info about how I write to help us improve typing and writing in the future**: > [!NOTE] -> If the telemetry level is set to either **Basic** or **Security**, this is turned off automatically. +> If the diagnostic data level is set to either **Basic** or **Security**, this is turned off automatically. @@ -1725,7 +1725,7 @@ For Windows 10 only, you can stop Enhanced Notifications: - Turn off the feature in the UI. -You can also use the registry to turn off Malicious Software Reporting Tool telemetry by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1. +You can also use the registry to turn off Malicious Software Reporting Tool diagnostic data by setting the REG\_DWORD value **HKEY\_LOCAL\_MACHINE\\Software\\Policies\\Microsoft\\MRT\\DontReportInfectionInformation** to 1. ### 24. Windows Media Player diff --git a/windows/configuration/manage-windows-endpoints-version-1709.md b/windows/configuration/manage-windows-endpoints-version-1709.md index dbecf39d02..1c52da910b 100644 --- a/windows/configuration/manage-windows-endpoints-version-1709.md +++ b/windows/configuration/manage-windows-endpoints-version-1709.md @@ -133,7 +133,7 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper |----------------|----------|------------| | backgroundtaskhost | HTTPS | www.bing.com/proactive/v2/spark?cc=US&setlang=en-US | -The following endpoint is used by Cortana to report diagnostic and telemetry information. +The following endpoint is used by Cortana to report diagnostic and diagnostic data information. If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-cortana), Microsoft won't be aware of issues with Cortana and won't be able to fix them. | Source process | Protocol | Destination | @@ -175,6 +175,30 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper |----------------|----------|------------| | | | dmd.metaservices.microsoft.com.akadns.net | +## Diagnostic Data + +The following endpoint is used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. +If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback), diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. + +| Source process | Protocol | Destination | +|----------------|----------|------------| +| svchost | | cy2.vortex.data.microsoft.com.akadns.net | + +The following endpoint is used by the Connected User Experiences and Telemetry component and connects to the Microsoft Data Management service. +If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback), diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. + +| Source process | Protocol | Destination | +|----------------|----------|------------| +| svchost | | v10.vortex-win.data.microsoft.com/collect/v1 | + +The following endpoints are used by Windows Error Reporting. +To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft. + +| Source process | Protocol | Destination | +|----------------|----------|------------| +| wermgr | | watson.telemetry.microsoft.com/Telemetry.Request | +| |TLS v1.2 |modern.watson.data.microsoft.com.akadns.net| + ## Font streaming The following endpoints are used to download fonts on demand. @@ -340,7 +364,7 @@ If you [turn off traffic for this endpoint](manage-connections-from-windows-oper |----------------|----------|------------| | dmclient | HTTPS | settings.data.microsoft.com | -The following endpoint is used as a way for apps to dynamically update their configuration. Apps such as Windows Connected User Experience and Telemetry component and Windows Insider Program use it. +The following endpoint is used as a way for apps to dynamically update their configuration. Apps such as Windows Connected User Experiences and Telemetry component and Windows Insider Program use it. If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback), an app that uses this endpoint may stop working. | Source process | Protocol | Destination | @@ -355,29 +379,7 @@ The following endpoint is used to retrieve Skype configuration values. To turn o |----------------|----------|------------| |microsoft.windowscommunicationsapps.exe | HTTPS | config.edge.skype.com | -## Telemetry -The following endpoint is used by the Connected User Experience and Telemetry component and connects to the Microsoft Data Management service. -If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback), diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. - -| Source process | Protocol | Destination | -|----------------|----------|------------| -| svchost | | cy2.vortex.data.microsoft.com.akadns.net | - -The following endpoint is used by the Connected User Experience and Telemetry component and connects to the Microsoft Data Management service. -If you [turn off traffic for this endpoint](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-priv-feedback), diagnostic and usage information, which helps Microsoft find and fix problems and improve our products and services, will not be sent back to Microsoft. - -| Source process | Protocol | Destination | -|----------------|----------|------------| -| svchost | | v10.vortex-win.data.microsoft.com/collect/v1 | - -The following endpoints are used by Windows Error Reporting. -To turn off traffic for these endpoints, enable the following Group Policy: Administrative Templates > Windows Components > Windows Error Reporting > Disable Windows Error Reporting. This means error reporting information will not be sent back to Microsoft. - -| Source process | Protocol | Destination | -|----------------|----------|------------| -| wermgr | | watson.telemetry.microsoft.com/Telemetry.Request | -| |TLS v1.2 |modern.watson.data.microsoft.com.akadns.net| ## Windows Defender diff --git a/windows/configuration/set-up-shared-or-guest-pc.md b/windows/configuration/set-up-shared-or-guest-pc.md index 7db69cb00b..196d95eb81 100644 --- a/windows/configuration/set-up-shared-or-guest-pc.md +++ b/windows/configuration/set-up-shared-or-guest-pc.md @@ -50,7 +50,7 @@ Apps can take advantage of shared PC mode with the following three APIs: - [IsEnabled](https://docs.microsoft.com/uwp/api/windows.system.profile.sharedmodesettings) - This informs apps when the PC has been configured for shared use scenarios. For example, an app might only download content on demand on a device in shared PC mode, or might skip first run experiences. - [ShouldAvoidLocalStorage](https://docs.microsoft.com/uwp/api/windows.system.profile.sharedmodesettings) - This informs apps when the PC has been configured to not allow the user to save to the local storage of the PC. Instead, only cloud save locations should be offered by the app or saved automatically by the app. -- [IsEducationEnvironment](https://docs.microsoft.com/uwp/api/windows.system.profile.educationsettings) - This informs apps when the PC is used in an education environment. Apps may want to handle telemetry differently or hide advertising functionality. +- [IsEducationEnvironment](https://docs.microsoft.com/uwp/api/windows.system.profile.educationsettings) - This informs apps when the PC is used in an education environment. Apps may want to handle diagnostic data differently or hide advertising functionality. ###Customization diff --git a/windows/configuration/wcd/wcd-connectivityprofiles.md b/windows/configuration/wcd/wcd-connectivityprofiles.md index 5c8c80dffc..0073f13e81 100644 --- a/windows/configuration/wcd/wcd-connectivityprofiles.md +++ b/windows/configuration/wcd/wcd-connectivityprofiles.md @@ -166,7 +166,7 @@ The **Config** settings are initial settings that can be overwritten when settin ### SystemCapabilities -You can use these settings to configure system capabilities for Wi-Fi adapters, which is a new functionality in Windows 10. These system capabilities are added at image time to ensure that the information is at its most accurate. The capabilities allow the OS to have a better understanding of the underlying hardware that it's running on. Telemetry data is generated by the system to provide data that can be used to diagnose both software and hardware issues. +You can use these settings to configure system capabilities for Wi-Fi adapters, which is a new functionality in Windows 10. These system capabilities are added at image time to ensure that the information is at its most accurate. The capabilities allow the OS to have a better understanding of the underlying hardware that it's running on. Diagnostic data data is generated by the system to provide data that can be used to diagnose both software and hardware issues. | Setting | Description | | --- | --- | diff --git a/windows/configuration/wcd/wcd-policies.md b/windows/configuration/wcd/wcd-policies.md index d95ae64429..25f5b58fc5 100644 --- a/windows/configuration/wcd/wcd-policies.md +++ b/windows/configuration/wcd/wcd-policies.md @@ -372,10 +372,10 @@ This section describes the **Policies** settings that you can configure in [prov | [AllowExperimentation](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowexperimentation) | Determine the level that Microsoft can experiment with the product to study user preferences or device behavior. | X | X | | | | | [AllowLocation](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowlocation) | Specify whether to allow app access to the Location service. | X | X | X | X | X | | [AllowStorageCard](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowstoragecard) | Specify whether the user is allowed to use the storage card for device storage. | X | X | X | X | X | -| [AllowTelemetry](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowtelemetry) | Allow the device to send diagnostic and useage telemetry data. | X | X | | | | +| [AllowTelemetry](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowtelemetry) | Allow the device to send diagnostic and usage data. | X | X | | | | | [AllowUserToResetPhone](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-allowusertoresetphone) | Allow the user to factory reset the phone. | X | X | | | | | [DisableOneDriveFileSync](https://msdn.microsoft.com/windows/hardware/commercialize/customize/mdm/policy-configuration-service-provider#system-disableonedrivefilesync) | Prevent apps and features from working with files on OneDrive. | X | | | | | -| [LimitEnhancedDiagnosticDataWindowsAnalytics](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-limitenhanceddiagnosticdatawindowsanalytics) | This policy setting, in combination with the System/AllowTelemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. To enable this behavior you must enable this policy setting, and set Allow Telemetry to level 2 (Enhanced). When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented in [Windows 10, version 1703 basic level Windows diagnostic events and fields](https://go.microsoft.com/fwlink/?linkid=847594). Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level telemetry data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft. If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. | X | X | | | | +| [LimitEnhancedDiagnosticDataWindowsAnalytics](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-limitenhanceddiagnosticdatawindowsanalytics) | This policy setting, in combination with the System/AllowTelemetry policy setting, enables organizations to send Microsoft a specific set of diagnostic data for IT insights via Windows Analytics services. To enable this behavior you must enable this policy setting, and set Allow Telemetry to level 2 (Enhanced). When you configure these policy settings, a basic level of diagnostic data plus additional events that are required for Windows Analytics are sent to Microsoft. These events are documented in [Windows 10, version 1703 basic level Windows diagnostic events and fields](https://go.microsoft.com/fwlink/?linkid=847594). Enabling enhanced diagnostic data in the System/AllowTelemetry policy in combination with not configuring this policy will also send the required events for Windows Analytics, plus additional enhanced level diagnostic data. This setting has no effect on computers configured to send full, basic or security level diagnostic data to Microsoft. If you disable or do not configure this policy setting, then the level of diagnostic data sent to Microsoft is determined by the System/AllowTelemetry policy. | X | X | | | | ## TextInput diff --git a/windows/configuration/windows-diagnostic-data-1703.md b/windows/configuration/windows-diagnostic-data-1703.md index bb63c4b710..954a8fc5e0 100644 --- a/windows/configuration/windows-diagnostic-data-1703.md +++ b/windows/configuration/windows-diagnostic-data-1703.md @@ -1,6 +1,6 @@ --- -title: Windows 10 diagnostic data for the Full telemetry level (Windows 10) -description: Use this article to learn about the types of data that is collected the the Full telemetry level. +title: Windows 10 diagnostic data for the Full diagnostic data level (Windows 10) +description: Use this article to learn about the types of data that is collected the the Full diagnostic data level. keywords: privacy,Windows 10 ms.prod: w10 ms.mktglfcycl: manage @@ -11,12 +11,12 @@ ms.author: lizross ms.date: 04/05/2017 --- -# Windows 10 diagnostic data for the Full telemetry level +# Windows 10 diagnostic data for the Full diagnostic data level **Applies to:** - Windows 10, version 1703 and later -Microsoft collects Windows diagnostic data to keep Windows up-to-date, secure, and operating properly. It also helps us improve Windows and, for users who have turned on “tailored experiences”, can be used to provide more relevant tips and recommendations to tailor Microsoft products to the user’s needs. This article describes all types diagnostic data collected by Windows at the Full telemetry level (inclusive of data collected at Basic), with comprehensive examples of data we collect per each type. For additional, detailed technical descriptions of Basic data items, see [Windows 10, version 1709 Basic level diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md) and [Windows 10, version 1703 Basic level diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md). +Microsoft collects Windows diagnostic data to keep Windows up-to-date, secure, and operating properly. It also helps us improve Windows and, for users who have turned on “tailored experiences”, can be used to provide more relevant tips and recommendations to tailor Microsoft products to the user’s needs. This article describes all types diagnostic data collected by Windows at the Full diagnostic data level (inclusive of data collected at Basic), with comprehensive examples of data we collect per each type. For additional, detailed technical descriptions of Basic data items, see [Windows 10, version 1709 Basic level diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields.md) and [Windows 10, version 1703 Basic level diagnostic events and fields](basic-level-windows-diagnostic-events-and-fields-1703.md). The data covered in this article is grouped into the following categories: diff --git a/windows/deployment/deploy.md b/windows/deployment/deploy.md index 10dc612bdb..2040ebf2d1 100644 --- a/windows/deployment/deploy.md +++ b/windows/deployment/deploy.md @@ -21,7 +21,7 @@ Windows 10 upgrade options are discussed and information is provided about plann |[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This topic provides information about support for upgrading directly to Windows 10 from a previous operating system. | |[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This topic provides information about support for upgrading from one edition of Windows 10 to another. | |[Windows 10 volume license media](windows-10-media.md) |This topic provides information about updates to volume licensing media in the current version of Windows 10. | -|[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | +|[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | |[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, additional guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [System Center Configuration Manager](windows-10-poc-sc-config-mgr.md). | |[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to assist in Windows 10 deployment planning. | |[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). | diff --git a/windows/deployment/index.md b/windows/deployment/index.md index fe0e5d5f08..f63641d04f 100644 --- a/windows/deployment/index.md +++ b/windows/deployment/index.md @@ -32,7 +32,7 @@ Windows 10 upgrade options are discussed and information is provided about plann |[Windows 10 upgrade paths](upgrade/windows-10-upgrade-paths.md) |This topic provides information about support for upgrading directly to Windows 10 from a previous operating system. | |[Windows 10 edition upgrade](upgrade/windows-10-edition-upgrades.md) |This topic provides information about support for upgrading from one edition of Windows 10 to another. | |[Windows 10 volume license media](windows-10-media.md) |This topic provides information about media available in the Microsoft Volume Licensing Service Center. | -|[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | +|[Manage Windows upgrades with Upgrade Readiness](upgrade/manage-windows-upgrades-with-upgrade-readiness.md) |With Upgrade Readiness, enterprises now have the tools to plan and manage the upgrade process end to end, allowing them to adopt new Windows releases more quickly. With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. | |[Windows 10 deployment test lab](windows-10-poc.md) |This guide contains instructions to configure a proof of concept (PoC) environment requiring a minimum amount of resources. The guide makes extensive use of Windows PowerShell and Hyper-V. Subsequent companion guides contain steps to deploy Windows 10 using the PoC environment. After completing this guide, additional guides are provided to deploy Windows 10 in the test lab using [Microsoft Deployment Toolkit](windows-10-poc-mdt.md) or [System Center Configuration Manager](windows-10-poc-sc-config-mgr.md). | |[Plan for Windows 10 deployment](planning/index.md) | This section describes Windows 10 deployment considerations and provides information to assist in Windows 10 deployment planning. | |[Deploy Windows 10 with the Microsoft Deployment Toolkit](deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit.md) |This guide will walk you through the process of deploying Windows 10 in an enterprise environment using the Microsoft Deployment Toolkit (MDT). | diff --git a/windows/deployment/planning/act-technical-reference.md b/windows/deployment/planning/act-technical-reference.md index 3d541198b1..a84f82eb0a 100644 --- a/windows/deployment/planning/act-technical-reference.md +++ b/windows/deployment/planning/act-technical-reference.md @@ -20,7 +20,7 @@ We've replaced the majority of functionality included in the Application Compati Microsoft developed Upgrade Analytics in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Analytics was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. -With Windows telemetry enabled, Upgrade Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. +With Windows diagnostic data enabled, Upgrade Analytics collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. Use Upgrade Analytics to get: - A visual workflow that guides you from pilot to production diff --git a/windows/deployment/update/device-health-get-started.md b/windows/deployment/update/device-health-get-started.md index 54f3d47f42..9350288947 100644 --- a/windows/deployment/update/device-health-get-started.md +++ b/windows/deployment/update/device-health-get-started.md @@ -23,17 +23,17 @@ Steps are provided in sections that follow the recommended setup process: Device Health has the following requirements: 1. Device Health is currently only compatible with Windows 10 and Windows Server 2016 devices. The solution is intended to be used with desktop devices (Windows 10 workstations and laptops). -2. The solution requires that at least the [enhanced level of telemetry](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#basic-level) is enabled on all devices that are intended to be displayed in the solution. To learn more about Windows telemetry, see [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization). -3. The telemetry of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the telemetry services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on telemetry endpoints and summarizes the use of each endpoint: +2. The solution requires that at least the [enhanced level of diagnostic data](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#basic-level) is enabled on all devices that are intended to be displayed in the solution. To learn more about Windows diagnostic data, see [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). +3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: Service | Endpoint --- | --- -Connected User Experience and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com +Connected User Experiences and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com Windows Error Reporting | watson.telemetry.microsoft.com Online Crash Analysis | oca.telemetry.microsoft.com >[!NOTE] -> If your deployment includes devices running Windows 10 versions prior to Windows 10, version 1703, you must **exclude** *authentication* for the endpoints listed in Step 3. Windows Error Reporting did not support authenticating proxies until Windows 10, version 1703. See [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization) for steps to exclude authentication for these endpoints. +> If your deployment includes devices running Windows 10 versions prior to Windows 10, version 1703, you must **exclude** *authentication* for the endpoints listed in Step 3. Windows Error Reporting did not support authenticating proxies until Windows 10, version 1703. See [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization) for steps to exclude authentication for these endpoints. ## Add Device Health to Microsoft Operations Management Suite @@ -79,7 +79,7 @@ After you have added Device Health and devices have a Commercial ID, you will be >[!NOTE] >You can unsubscribe from the Device Health solution if you no longer want to monitor your organization’s devices. User device data will continue to be shared with Microsoft while the opt-in keys are set on user devices and the proxy allows traffic. -## Deploy your Commercial ID to your Windows 10 devices and set the telemetry level +## Deploy your Commercial ID to your Windows 10 devices and set the diagnostic data level In order for your devices to show up in Windows Analytics: Device Health, they must be configured with your organization’s Commercial ID. This is so that Microsoft knows that a given device is a member of your organization and to feed that device’s data back to you. There are two primary methods for widespread deployment of your Commercial ID: Group Policy and Mobile Device Management (MDM). @@ -114,7 +114,7 @@ If you need further information on Windows Error Reporting (WER) settings, see [ Devices must be able to reach the endpoints specified in the "Device Health prerequisites" section of this topic. >[!NOTE] -> If your deployment includes devices running Windows 10 versions prior to Windows 10, version 1703, you must **exclude** *authentication* for the endpoints listed in Step 3 of the "Device Health prerequisites" section of this topic. Windows Error Reporting did not support authenticating proxies until Windows 10, version 1703. (If you need more information about telemetry endpoints and how to manage them, see [Configure Windows telemetry in your organization](https://docs.microsoft.com/windows/configuration/configure-windows-telemetry-in-your-organization). +> If your deployment includes devices running Windows 10 versions prior to Windows 10, version 1703, you must **exclude** *authentication* for the endpoints listed in Step 3 of the "Device Health prerequisites" section of this topic. Windows Error Reporting did not support authenticating proxies until Windows 10, version 1703. (If you need more information about diagnostic data endpoints and how to manage them, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization). If you are using proxy server authentication, it is worth taking extra care to check the configuration. Prior to Windows 10, version 1703, WER uploads error reports in the machine context. Both user (typically authenticated) and machine (typically anonymous) contexts require access through proxy servers to the diagnostic endpoints. In Windows 10, version 1703, and later WER will attempt to use the context of the user that is logged on for proxy authentication such that only the user account requires proxy access. diff --git a/windows/deployment/update/device-health-monitor.md b/windows/deployment/update/device-health-monitor.md index 2c35b7f05e..078a95742a 100644 --- a/windows/deployment/update/device-health-monitor.md +++ b/windows/deployment/update/device-health-monitor.md @@ -19,7 +19,7 @@ Device Health is the newest Windows Analytics solution that complements the exis Like Upgrade Readiness and Update Compliance, Device Health is a solution built within Operations Management Suite (OMS), a cloud-based monitoring and automation service that has a flexible servicing subscription based on data usage and retention. This release is free for customers to try and will not incur charges on your OMS workspace for its use. For more information about OMS, see [Operations Management Suite overview](http://azure.microsoft.com/en-us/documentation/articles/operations-management-suite-overview/). -Device Health uses Windows diagnostic data that is part of all Windows 10 devices. If you have already employed Upgrade Readiness or Update Compliance solutions, all you need to do is select Device Health from the OMS solution gallery and add it to your OMS workspace. Device Health requires enhanced telemetry, so you might need to implement this policy if you've not already done so. +Device Health uses Windows diagnostic data that is part of all Windows 10 devices. If you have already employed Upgrade Readiness or Update Compliance solutions, all you need to do is select Device Health from the OMS solution gallery and add it to your OMS workspace. Device Health requires enhanced diagnostic data, so you might need to implement this policy if you've not already done so. Device Health provides the following: @@ -27,7 +27,7 @@ Device Health provides the following: - Identification of devices that crash frequently, and therefore might need to be rebuilt or replaced - Identification of device drivers that are causing device crashes, with suggestions of alternative versions of those drivers that might reduce the number of crashes - Notification of Windows Information Protection misconfigurations that send prompts to end users -- No need for new complex customized infrastructure, thanks to cloud-connected access using Windows 10 telemetry +- No need for new complex customized infrastructure, thanks to cloud-connected access using Windows 10 diagnostic data See the following topics in this guide for detailed information about configuring and using the Device Health solution: @@ -56,10 +56,10 @@ The Device Health architecture and data flow is summarized by the following five -**(1)** User computers send telemetry data to a secure Microsoft data center using the Microsoft Data Management Service.
    -**(2)** Telemetry data is analyzed by the Microsoft Telemetry Service.
    -**(3)** Telemetry data is pushed from the Microsoft Telemetry Service to your OMS workspace.
    -**(4)** Telemetry data is available in the Device Health solution.
    +**(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.
    +**(2)** Diagnostic data is analyzed by the Microsoft Telemetry Service.
    +**(3)** Diagnostic data is pushed from the Microsoft Telemetry Service to your OMS workspace.
    +**(4)** Diagnostic data is available in the Device Health solution.
    **(5)** You are now able to proactively monitor Device Health issues in your environment.
    These steps are illustrated in following diagram: @@ -67,7 +67,7 @@ These steps are illustrated in following diagram: [![](images/analytics-architecture.png)](images/analytics-architecture.png) >[!NOTE] ->This process assumes that Windows telemetry is enabled and you [have assigned your Commercial ID to devices](update-compliance-get-started.md#deploy-your-commercial-id-to-your-windows-10-devices). +>This process assumes that Windows diagnostic data is enabled and you [have assigned your Commercial ID to devices](update-compliance-get-started.md#deploy-your-commercial-id-to-your-windows-10-devices). diff --git a/windows/deployment/update/update-compliance-get-started.md b/windows/deployment/update/update-compliance-get-started.md index 9a98859652..ead61e2d95 100644 --- a/windows/deployment/update/update-compliance-get-started.md +++ b/windows/deployment/update/update-compliance-get-started.md @@ -24,19 +24,19 @@ Steps are provided in sections that follow the recommended setup process: Update Compliance has the following requirements: 1. Update Compliance is currently only compatible with Windows 10 devices. The solution is intended to be used with desktop devices (Windows 10 workstations and laptops). -2. The solution requires that Windows 10 telemetry is enabled on all devices that are intended to be displayed in the solution. These devices must have at least the [basic level of telemetry](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#basic-level) enabled. To learn more about Windows telemetry, see [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization). -3. The telemetry of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the telemetry services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on telemetry endpoints and summarizes the use of each endpoint: +2. The solution requires that Windows 10 diagnostic data is enabled on all devices that are intended to be displayed in the solution. These devices must have at least the [basic level of diagnostic data](/configuration/configure-windows-diagnostic-data-in-your-organization#basic-level) enabled. To learn more about Windows diagnostic data, see [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). +3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](/configuration/configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: Service | Endpoint --- | --- - Connected User Experience and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com + Connected User Experiences and Telemetry component | v10.vortex-win.data.microsoft.com
    settings-win.data.microsoft.com Windows Error Reporting | watson.telemetry.microsoft.com Online Crash Analysis | oca.telemetry.microsoft.com 4. To use Windows Defender Antivirus Assessment, devices must be protected by Windows Defender AV (and not a 3rd party AV program), and must have enabled [cloud-delivered protection](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). See the [Troublehsoot Windows Defender Antivirus reporting](/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md) topic for help on ensuring the configuration is correct. - For endpoints running Windows 10, version 1607 or earlier, [Windows telemetry must also be set to **Enhanced**](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. + For endpoints running Windows 10, version 1607 or earlier, [Windows diagnostic data must also be set to **Enhanced**](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. See the [Windows Defender Antivirus in Windows 10](/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) content library for more information on enabling, configuring, and validating Windows Defender AV. @@ -74,7 +74,7 @@ If you are not yet using OMS, use the following steps to subscribe to OMS Update ![OMS workspace with new Update Compliance tile on the right side highlighted](images/uc-09a.png) 9. Click **Subscribe** to subscribe to OMS Update Compliance. You will then need to distribute your Commercial ID across all your organization’s devices. More information on the Commercial ID is provided below. - ![Series of blades showing Connected Sources, Windows Telemetry, and Upgrade Analytics solution with Subscribe button](images/uc-10a.png) + ![Series of blades showing Connected Sources, Windows Diagnostic Data, and Upgrade Analytics solution with Subscribe button](images/uc-10a.png) After you are subscribed to OMS Update Compliance and your devices have a Commercial ID, you will begin receiving data. It will typically take 24 hours for the first data to begin appearing. The following section explains how to deploy your Commercial ID to your Windows 10 devices. diff --git a/windows/deployment/update/update-compliance-monitor.md b/windows/deployment/update/update-compliance-monitor.md index 30bf291b67..cc368c6633 100644 --- a/windows/deployment/update/update-compliance-monitor.md +++ b/windows/deployment/update/update-compliance-monitor.md @@ -19,7 +19,7 @@ With Windows 10, organizations need to change the way they approach monitoring a Update Compliance is a solution built within Operations Management Suite (OMS), a cloud-based monitoring and automation service which has a flexible servicing subscription based off data usage/retention. For more information about OMS, see [Operations Management Suite overview](http://azure.microsoft.com/documentation/articles/operations-management-suite-overview/). -Update Compliance uses the Windows telemetry that is part of all Windows 10 devices. It collects system data including update installation progress, Windows Update for Business (WUfB) configuration data, Windows Defender Antivirus data, and other update-specific information, and then sends this data privately to a secure cloud to be stored for analysis and usage within the solution. +Update Compliance uses the Windows diagnostic data that is part of all Windows 10 devices. It collects system data including update installation progress, Windows Update for Business (WUfB) configuration data, Windows Defender Antivirus data, and other update-specific information, and then sends this data privately to a secure cloud to be stored for analysis and usage within the solution. Update Compliance provides the following: @@ -28,7 +28,7 @@ Update Compliance provides the following: - The ability to track protection and threat status for Windows Defender Antivirus-enabled devices - An overview of WUfB deferral configurations (Windows 10 Anniversary Update [1607] and later) - Powerful built-in [log analytics](https://www.microsoft.com/en-us/cloud-platform/insight-and-analytics?WT.srch=1&WT.mc_id=AID529558_SEM_%5B_uniqid%5D&utm_source=Bing&utm_medium=CPC&utm_term=log%20analytics&utm_campaign=Hybrid_Cloud_Management) to create useful custom queries -- Cloud-connected access utilizing Windows 10 telemetry means no need for new complex, customized infrastructure +- Cloud-connected access utilizing Windows 10 diagnostic data means no need for new complex, customized infrastructure See the following topics in this guide for detailed information about configuring and using the Update Compliance solution: @@ -43,10 +43,10 @@ An overview of the processes used by the Update Compliance solution is provided The Update Compliance architecture and data flow is summarized by the following five-step process: -**(1)** User computers send telemetry data to a secure Microsoft data center using the Microsoft Data Management Service.
    -**(2)** Telemetry data is analyzed by the Update Compliance Data Service.
    -**(3)** Telemetry data is pushed from the Update Compliance Data Service to your OMS workspace.
    -**(4)** Telemetry data is available in the Update Compliance solution.
    +**(1)** User computers send diagnostic data to a secure Microsoft data center using the Microsoft Data Management Service.
    +**(2)** Diagnostic data is analyzed by the Update Compliance Data Service.
    +**(3)** Diagnostic data is pushed from the Update Compliance Data Service to your OMS workspace.
    +**(4)** Diagnostic data is available in the Update Compliance solution.
    **(5)** You are able to monitor and troubleshoot Windows updates and Windows Defender AV in your environment.
    These steps are illustrated in following diagram: @@ -54,7 +54,7 @@ These steps are illustrated in following diagram: ![Update Compliance architecture](images/uc-01-wdav.png) >[!NOTE] ->This process assumes that Windows telemetry is enabled and you [have assigned your Commercial ID to devices](update-compliance-get-started.md#deploy-your-commercial-id-to-your-windows-10-devices). +>This process assumes that Windows diagnostic data is enabled and you [have assigned your Commercial ID to devices](update-compliance-get-started.md#deploy-your-commercial-id-to-your-windows-10-devices). diff --git a/windows/deployment/update/update-compliance-using.md b/windows/deployment/update/update-compliance-using.md index c97cf7439d..fe2d443d21 100644 --- a/windows/deployment/update/update-compliance-using.md +++ b/windows/deployment/update/update-compliance-using.md @@ -16,7 +16,7 @@ In this section you'll learn how to use Update Compliance to monitor your device Update Compliance: -- Uses telemetry gathered from user devices to form an all-up view of Windows 10 devices in your organization. +- Uses diagnostic data gathered from user devices to form an all-up view of Windows 10 devices in your organization. - Enables you to maintain a high-level perspective on the progress and status of updates across all devices. - Provides a workflow that can be used to quickly identify which devices require attention. - Enables you to track deployment compliance targets for updates. diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index 2fda260e22..f705f7b85f 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -28,7 +28,7 @@ ms.date: 10/13/2017 You can use Group Policy or your mobile device management (MDM) service to configure Windows Update for Business settings for your devices. The sections in this topic provide the Group Policy and MDM policies for Windows 10, version 1511 and above. The MDM policies use the OMA-URI setting from the [Policy CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx). >[!IMPORTANT] ->For Windows Update for Business policies to be honored, the Telemetry level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system telemetry level](https://technet.microsoft.com/en-us/itpro/windows/manage/configure-windows-telemetry-in-your-organization#configure-the-operating-system-telemetry-level). +>For Windows Update for Business policies to be honored, the Diagnostic Data level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system diagnostic data level](https://technet.microsoft.com/en-us/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#configure-the-operating-system-diagnostic-data-level). Some Windows Update for Business policies are not applicable or behave differently for devices running Windows 10 Mobile Enterprise. Specifically, policies pertaining to Feature Updates will not be applied to Windows 10 Mobile Enterprise. All Windows 10 Mobile updates are recognized as Quality Updates, and can only be deferred or paused using the Quality Update policy settings. Additional information is provided in this topic and in [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md). diff --git a/windows/deployment/update/waas-manage-updates-wufb.md b/windows/deployment/update/waas-manage-updates-wufb.md index e0d006761b..e26cc352fc 100644 --- a/windows/deployment/update/waas-manage-updates-wufb.md +++ b/windows/deployment/update/waas-manage-updates-wufb.md @@ -121,7 +121,7 @@ Windows Update for Business was first made available in Windows 10, version 1511 ## Monitor Windows Updates using Update Compliance -Update Compliance, now **available in public preview**, provides a holistic view of OS update compliance, update deployment progress, and failure troubleshooting for Windows 10 devices. This new service uses telemetry data including installation progress, Windows Update configuration, and other information to provide such insights, at no extra cost and without additional infrastructure requirements. Whether used with Windows Update for Business or other management tools, you can be assured that your devices are properly updated. +Update Compliance, now **available in public preview**, provides a holistic view of OS update compliance, update deployment progress, and failure troubleshooting for Windows 10 devices. This new service uses diagnostic data including installation progress, Windows Update configuration, and other information to provide such insights, at no extra cost and without additional infrastructure requirements. Whether used with Windows Update for Business or other management tools, you can be assured that your devices are properly updated. ![Update Compliance Dashboard](images/waas-wufb-update-compliance.png) diff --git a/windows/deployment/update/waas-overview.md b/windows/deployment/update/waas-overview.md index 6c80c9612e..3452191682 100644 --- a/windows/deployment/update/waas-overview.md +++ b/windows/deployment/update/waas-overview.md @@ -45,7 +45,7 @@ One of the biggest challenges for organizations when it comes to deploying a new Application compatibility testing has historically been a burden when approaching a Windows deployment or upgrade. With Windows 10, application compatibility from the perspective of desktop applications, websites, and apps built on the Universal Windows Platform (UWP) has improved tremendously. Microsoft understands the challenges organizations experienced when they migrated from the Windows XP operating system to Windows 7 and has been working to make Windows 10 upgrades a much better experience. -Most Windows 7–compatible desktop applications will be compatible with Windows 10 straight out of the box. Windows 10 achieved such high compatibility because the changes in the existing Win32 application programming interfaces were minimal. Combined with valuable feedback via the Windows Insider Program and telemetry data, this level of compatibility can be maintained through each feature update. As for websites, Windows 10 includes Internet Explorer 11 and its backward-compatibility modes for legacy websites. Finally, UWP apps follow a compatibility story similar to desktop applications, so most of them will be compatible with Windows 10. +Most Windows 7–compatible desktop applications will be compatible with Windows 10 straight out of the box. Windows 10 achieved such high compatibility because the changes in the existing Win32 application programming interfaces were minimal. Combined with valuable feedback via the Windows Insider Program and diagnostic data, this level of compatibility can be maintained through each feature update. As for websites, Windows 10 includes Internet Explorer 11 and its backward-compatibility modes for legacy websites. Finally, UWP apps follow a compatibility story similar to desktop applications, so most of them will be compatible with Windows 10. For the most important business-critical applications, organizations should still perform testing on a regular basis to validate compatibility with new builds. For remaining applications, consider validating them as part of a pilot deployment process to reduce the time spent on compatibility testing. If it’s unclear whether an application is compatible with Windows 10, IT pros can either consult with the ISV or check the supported software directory at [http://www.readyforwindows.com](http://www.readyforwindows.com). diff --git a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md index 96bec400be..bd9b717522 100644 --- a/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md +++ b/windows/deployment/upgrade/manage-windows-upgrades-with-upgrade-readiness.md @@ -14,7 +14,7 @@ With the release of Upgrade Readiness, enterprises now have the tools to plan an Microsoft developed Upgrade Readiness in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Readiness was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. -With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. +With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. Use Upgrade Readiness to get: @@ -28,11 +28,11 @@ Use Upgrade Readiness to get: The Upgrade Readiness workflow steps you through the discovery and rationalization process until you have a list of computers that are ready to be upgraded. -**Important** For system, application, and driver data to be shared with Microsoft, you must configure user computers to send data. For information about what telemetry data Microsoft collects and how that data is used and protected by Microsoft, see: +**Important** For system, application, and driver data to be shared with Microsoft, you must configure user computers to send data. For information about what diagnostic data Microsoft collects and how that data is used and protected by Microsoft, see: -- [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization) +- [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization) - [Manage connections from Windows operating system components to Microsoft services](/windows/configuration/manage-connections-from-windows-operating-system-components-to-microsoft-services) -- [Windows 7, Windows 8, and Windows 8.1 appraiser telemetry events and fields](https://go.microsoft.com/fwlink/?LinkID=822965) +- [Windows 7, Windows 8, and Windows 8.1 appraiser diagnostic data events and fields](https://go.microsoft.com/fwlink/?LinkID=822965) ##**Related topics** diff --git a/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md b/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md index bb097f89bb..a837d861dc 100644 --- a/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md +++ b/windows/deployment/upgrade/troubleshoot-upgrade-readiness.md @@ -24,16 +24,16 @@ If you still don’t see data in Upgrade Readiness, follow these steps: ## Disable Upgrade Readiness -If you want to stop using Upgrade Readiness and stop sending telemetry data to Microsoft, follow these steps: +If you want to stop using Upgrade Readiness and stop sending diagnostic data data to Microsoft, follow these steps: 1. Unsubscribe from the Upgrade Readiness solution in the OMS portal. In the OMS portal, go to **Settings** > **Connected Sources** > **Windows Telemetry** and choose the **Unsubscribe** option. ![Upgrade Readiness unsubscribe](../images/upgrade-analytics-unsubscribe.png) -2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the telemetry level to **Security**: +2. Disable the Commercial Data Opt-in Key on computers running Windows 7 SP1 or 8.1. On computers running Windows 10, set the diagnostic data level to **Security**: **Windows 7 and Windows 8.1**: Delete CommercialDataOptIn registry property from *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection* - **Windows 10**: Follow the instructions in the [Configure Windows telemetry in your organization](https://technet.microsoft.com/itpro/windows/manage/configure-windows-telemetry-in-your-organization#enterprise-management) topic. + **Windows 10**: Follow the instructions in the [Configure Windows diagnostic data in your organization](/configuration/configure-windows-diagnostic-data-in-your-organization.md) topic. 3. If you enabled **Internet Explorer Site Discovery**, you can disable Internet Explorer data collection by setting the *IEDataOptIn* registry key to value "0". The IEDataOptIn key can be found under: *HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection*. 4. You can also remove the “CommercialId” key from: "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection". **This is an optional step**. diff --git a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md index 70e29d0699..5c45338c1d 100644 --- a/windows/deployment/upgrade/upgrade-readiness-additional-insights.md +++ b/windows/deployment/upgrade/upgrade-readiness-additional-insights.md @@ -18,7 +18,7 @@ This topic provides information on additional features that are available in Upg The site discovery feature in Upgrade Readiness provides an inventory of web sites that are accessed by client computers using Internet Explorer on Windows 7, Windows 8.1, and Windows 10. Site discovery does not include sites that are accessed using other Web browsers, such as Microsoft Edge. Site inventory information is provided as optional data related to upgrading to Windows 10 and Internet Explorer 11, and is meant to help prioritize compatibility testing for web applications. You can make more informed decisions about testing based on usage data. > [!NOTE] -> Site discovery data is disabled by default; you can find documentation on what is collected in the [Windows 7, Windows 8, and Windows 8.1 appraiser telemetry events and fields](https://go.microsoft.com/fwlink/?LinkID=822965). After you turn on this feature, data is collected on all sites visited by Internet Explorer, except during InPrivate sessions. In addition, data will be collected on all sites visited by Microsoft Edge on computers running Windows 10 version 1803 (including Insider Preview builds) or newer. The data collection process is silent, without notification to the employee. You are responsible for ensuring that your use of this feature complies with all applicable local laws and regulatory requirements, including any requirements to provide notice to employees. +> Site discovery data is disabled by default; you can find documentation on what is collected in the [Windows 7, Windows 8, and Windows 8.1 appraiser diagnostic data events and fields](https://go.microsoft.com/fwlink/?LinkID=822965). After you turn on this feature, data is collected on all sites visited by Internet Explorer, except during InPrivate sessions. In addition, data will be collected on all sites visited by Microsoft Edge on computers running Windows 10 version 1803 (including Insider Preview builds) or newer. The data collection process is silent, without notification to the employee. You are responsible for ensuring that your use of this feature complies with all applicable local laws and regulatory requirements, including any requirements to provide notice to employees. ### Install prerequisite security update for Internet Explorer @@ -27,7 +27,7 @@ Ensure the following prerequisites are met before using site discovery: 1. Install the prerequisite KBs to add Site Discovery support and the latest fixes from the [Microsoft Update Catalog](http://www.catalog.update.microsoft.com/home.aspx). Install the following: - For Windows 7 and Windows 8.1 - March, 2017 (or later) Security Monthly Rollup - For Windows 10 - Cumulative Update for Windows 10 Version 1607 (KB4015217) (or later) -2. Enable Internet Explorer data collection, which is disabled by default. The best way to enable it is to modify the [Upgrade Readiness deployment script](upgrade-readiness-deployment-script.md) to allow Internet Explorer data collection before you run it. In addition, to enable Site Discovery on Windows 10 you must set computers to the **Enhanced Telemetry Level** for the Feedback and Diagnostics setting (Privacy > Feedback & Diagnostics settings), and enable **Page Prediction within Internet Explorer 11**. +2. Enable Internet Explorer data collection, which is disabled by default. The best way to enable it is to modify the [Upgrade Readiness deployment script](upgrade-readiness-deployment-script.md) to allow Internet Explorer data collection before you run it. In addition, to enable Site Discovery on Windows 10 you must set computers to the **Enhanced** diagnostic data level for the Feedback and Diagnostics setting (Privacy > Feedback & Diagnostics settings), and enable **Page Prediction within Internet Explorer 11**. If you do not plan to use the Upgrade Readiness deployment script to enable Site discovery, you must create the following registry entry. diff --git a/windows/deployment/upgrade/upgrade-readiness-architecture.md b/windows/deployment/upgrade/upgrade-readiness-architecture.md index a37441da3e..fd7e2605ab 100644 --- a/windows/deployment/upgrade/upgrade-readiness-architecture.md +++ b/windows/deployment/upgrade/upgrade-readiness-architecture.md @@ -8,7 +8,7 @@ ms.date: 04/25/2017 # Upgrade Readiness architecture -Microsoft analyzes system, application, and driver telemetry data to help you determine when computers are upgrade-ready, allowing you to simplify and accelerate Windows upgrades in your organization. The diagram below illustrates how Upgrade Readiness components work together in a typical installation. +Microsoft analyzes system, application, and driver diagnostic data to help you determine when computers are upgrade-ready, allowing you to simplify and accelerate Windows upgrades in your organization. The diagram below illustrates how Upgrade Readiness components work together in a typical installation. @@ -47,13 +47,13 @@ Important: You can use either a Microsoft Account or a Work or School account to Upgrade Readiness can be integrated with your installation of Configuration Manager. For more information, see [Integrate Upgrade Readiness with System Center Configuration Manager](https://docs.microsoft.com/sccm/core/clients/manage/upgrade/upgrade-analytics). -## Telemetry and data sharing +## Diagnostic data and data sharing After you’ve signed in to Operations Management Suite and added the Upgrade Readiness solution to your workspace, you’ll need to complete the following tasks to allow user computer data to be shared with and assessed by Upgrade Readiness. -See [Windows 7, Windows 8, and Windows 8.1 appraiser telemetry events and fields](https://go.microsoft.com/fwlink/?LinkID=822965) for more information about what user computer data Upgrade Readiness collects and assesses. See [Configure Windows telemetry in your organization](/windows/configuration/configure-windows-telemetry-in-your-organization) for more information about how Microsoft uses Windows telemetry data. +See [Windows 7, Windows 8, and Windows 8.1 appraiser diagnostic data events and fields](https://go.microsoft.com/fwlink/?LinkID=822965) for more information about what user computer data Upgrade Readiness collects and assesses. See [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization) for more information about how Microsoft uses Windows diagnostic data. -**Whitelist telemetry endpoints.** To enable telemetry data to be sent to Microsoft, you’ll need to whitelist the following Microsoft telemetry endpoints on your proxy server or firewall. You may need to get approval from your security group to do this. +**Whitelist diagnostic data endpoints.** To enable diagnostic data to be sent to Microsoft, you’ll need to whitelist the following Microsoft endpoints on your proxy server or firewall. You may need to get approval from your security group to do this. `https://v10.vortex-win.data.microsoft.com/collect/v1`
    `https://vortex-win.data.microsoft.com/health/keepalive`
    @@ -68,7 +68,7 @@ See [Windows 7, Windows 8, and Windows 8.1 appraiser telemetry events and fields **Subscribe your OMS workspace to Upgrade Readiness.** For Upgrade Readiness to receive and display upgrade readiness data from Microsoft, you’ll need to subscribe your OMS workspace to Upgrade Readiness. -**Enable telemetry and connect data sources.** To allow Upgrade Readiness to collect system, application, and driver data and assess your organization’s upgrade readiness, communication must be established between Upgrade Readiness and user computers. You’ll need to connect Upgrade Readiness to your data sources and enable telemetry to establish communication. +**Enable diagnostic data and connect data sources.** To allow Upgrade Readiness to collect system, application, and driver data and assess your organization’s upgrade readiness, communication must be established between Upgrade Readiness and user computers. You’ll need to connect Upgrade Readiness to your data sources and enable diagnostic data to establish communication. **Deploy compatibility update and related KBs.** The compatibility update KB scans your systems and enables application usage tracking. If you don’t already have this KB installed, you can download the applicable version from the Microsoft Update Catalog or deploy it using Windows Server Update Services (WSUS) or your software distribution solution, such as System Center Configuration Manager. @@ -82,7 +82,7 @@ Before you get started configuring Upgrade Anatlyics, review the following tips **Upgrade Readiness does not support on-premises Windows deployments.** Upgrade Readiness is built as a cloud service, which allows Upgrade Readiness to provide you with insights based on the data from user computers and other Microsoft compatibility services. Cloud services are easy to get up and running and are cost-effective because there is no requirement to physically implement and maintain services on-premises. -**In-region data storage requirements.** Windows telemetry data from user computers is encrypted, sent to, and processed at Microsoft-managed secure data centers located in the US. Our analysis of the upgrade readiness-related data is then provided to you through the Upgrade Readiness solution in the Microsoft Operations Management Suite (OMS) portal. At the time this topic is being published, only OMS workspaces created in the East US and West Europe are supported. We’re adding support for additional regions and we’ll update this information when new international regions are supported. +**In-region data storage requirements.** Windows diagnostic data from user computers is encrypted, sent to, and processed at Microsoft-managed secure data centers located in the US. Our analysis of the upgrade readiness-related data is then provided to you through the Upgrade Readiness solution in the Microsoft Operations Management Suite (OMS) portal. At the time this topic is being published, only OMS workspaces created in the East US and West Europe are supported. We’re adding support for additional regions and we’ll update this information when new international regions are supported. ### Tips diff --git a/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md b/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md index b75afc225b..58ffa25e69 100644 --- a/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md +++ b/windows/deployment/upgrade/upgrade-readiness-resolve-issues.md @@ -141,7 +141,7 @@ Applications and drivers that are meet certain criteria to be considered low ris The first row reports the number of your apps that have an official statement of support on Windows 10 from the software vendor, so you can be confident that they will work on your target operating system. -The second row (**Apps that are "Highly adopted"**) shows apps that have a ReadyForWindows status of "Highly adopted". This means that they have been installed on at least 100,000 commercial Windows 10 devices, and that Microsoft has not detected significant issues with the app in telemetry. Since these apps are prevalent in the ecosystem at large, you can be confident that they will work in your environment as well. +The second row (**Apps that are "Highly adopted"**) shows apps that have a ReadyForWindows status of "Highly adopted". This means that they have been installed on at least 100,000 commercial Windows 10 devices, and that Microsoft has not detected significant issues with the app in diagnostic data. Since these apps are prevalent in the ecosystem at large, you can be confident that they will work in your environment as well. Each row of the blade uses a different criterion to filter your apps or drivers. You can view a list of applications that meet the criterion by clicking into a row of the blade. For example, if you click the row that says "Apps that are 'Highly adopted'", the result is a list of apps that have a ReadyForWindows status of "Highly adopted". From here, you can bulk-select the results, select **Ready to upgrade**, and then click **Save**.  This will mark all apps meeting the "Highly adopted" criterion as "Ready to upgrade"--no further validation is required. Any applications that you have marked as *Mission critical* or *Business critical* are filtered out, as well as any app that has an issue known to Microsoft. This allows you to work with apps in bulk without having to worry about missing a critical app. diff --git a/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md b/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md index 15cd2c2bf3..d74712221f 100644 --- a/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md +++ b/windows/deployment/upgrade/upgrade-readiness-upgrade-overview.md @@ -54,7 +54,7 @@ Select **Total computers** for a list of computers and details about them, inclu - Computer model - Operating system version and build - Count of system requirement, application, and driver issues per computer -- Upgrade assessment based on analysis of computer telemetry data +- Upgrade assessment based on analysis of computer diagnostic data - Upgrade decision status Select **Total applications** for a list of applications discovered on user computers and details about them, including: diff --git a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md index 8b8805f491..f0f332312c 100644 --- a/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md +++ b/windows/deployment/upgrade/use-upgrade-readiness-to-manage-windows-upgrades.md @@ -10,7 +10,7 @@ ms.date: 08/30/2017 You can use Upgrade Readiness to prioritize and work through application and driver issues, assign and track issue resolution status, and identify computers that are ready to upgrade. Upgrade Readiness enables you to deploy Windows with confidence, knowing that you’ve addressed potential blocking issues. -- Based on telemetry data from user computers, Upgrade Readiness identifies application and driver compatibility issues that may block Windows upgrades, allowing you to make data-driven decisions about your organization’s upgrade readiness. +- Based on diagnostic data from user computers, Upgrade Readiness identifies application and driver compatibility issues that may block Windows upgrades, allowing you to make data-driven decisions about your organization’s upgrade readiness. - Information is refreshed daily so you can monitor upgrade progress. Any changes your team makes, such as assigning application importance and marking applications as ready to upgrade, are reflected 24 hours after you make them. When you are ready to begin the upgrade process, a workflow is provided to guide you through critical high-level tasks. diff --git a/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md b/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md index 4c6000558a..6e8c26d829 100644 --- a/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md +++ b/windows/threat-protection/wannacrypt-ransomware-worm-targets-out-of-date-systems-wdsi.md @@ -17,7 +17,7 @@ ms.date: 07/27/2017 On May 12, 2017 we detected a new ransomware that spreads like a worm by leveraging vulnerabilities that have been previously fixed. While security updates are automatically applied in most computers, some users and enterprises may delay deployment of patches. Unfortunately, the ransomware, known as [WannaCrypt](https://www.microsoft.com/security/portal/threat/encyclopedia/Entry.aspx?Name=Ransom:Win32/WannaCrypt), appears to have affected computers that have not applied the patch for these vulnerabilities. While the attack is unfolding, we remind users to install [MS17-010](https://technet.microsoft.com/en-us/library/security/ms17-010.aspx) if they have not already done so. -Microsoft antimalware telemetry immediately picked up signs of this campaign. Our expert systems gave us visibility and context into this new attack as it happened, allowing [Windows Defender Antivirus](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/windows-defender-in-windows-10) to deliver real-time defense. Through automated analysis, machine learning, and predictive modeling, we were able to rapidly protect against this malware. +Microsoft antimalware diagnostic data immediately picked up signs of this campaign. Our expert systems gave us visibility and context into this new attack as it happened, allowing [Windows Defender Antivirus](https://technet.microsoft.com/en-us/itpro/windows/keep-secure/windows-defender-in-windows-10) to deliver real-time defense. Through automated analysis, machine learning, and predictive modeling, we were able to rapidly protect against this malware. In this blog, we provide an early analysis of the end-to-end ransomware attack. Please note this threat is still under investigation. The attack is still active, and there is a possibility that the attacker will attempt to react to our detection response. diff --git a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md index 1a68cfc212..f44c485e39 100644 --- a/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md +++ b/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md @@ -133,10 +133,10 @@ https://msdl.microsoft.com/download/symbols Universal Telemetry Client -Used by Windows to send client telemetry, Windows Defender Antivirus uses this for product quality monitoring purposes +Used by Windows to send client diagnostic data, Windows Defender Antivirus uses this for product quality monitoring purposes -This update uses SSL (TCP Port 443) to download manifests and upload telemetry to Microsoft that uses the following DNS endpoints:

    • vortex-win.data.microsoft.com
    • settings-win.data.microsoft.com
    +This update uses SSL (TCP Port 443) to download manifests and upload diagnostic data to Microsoft that uses the following DNS endpoints:
    • vortex-win.data.microsoft.com
    • settings-win.data.microsoft.com
    diff --git a/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md b/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md index f5ba563109..0dd2646921 100644 --- a/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md +++ b/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md @@ -51,7 +51,7 @@ In order for devices to properly show up in Update Compliance, you have to meet >- Endpoints are using Windows Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](windows-defender-antivirus-compatibility.md) and the endpoint will not be reported in Update Compliance. > - [Cloud-delivered protection is enabled](enable-cloud-protection-windows-defender-antivirus.md). > - Endpoints can [connect to the Windows Defender AV cloud](configure-network-connections-windows-defender-antivirus.md#validate-connections-between-your-network-and-the-cloud) -> - If the endpoint is running Windows 10 version 1607 or earlier, [Windows 10 telemetry must be set to the Enhanced level](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-telemetry-in-your-organization#enhanced-level). +> - If the endpoint is running Windows 10 version 1607 or earlier, [Windows 10 diagnostic data must be set to the Enhanced level](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level). > - It has been 3 days since all requirements have been met If the above pre-requisites have all been met, you may need to proceed to the next step to collect diagnostic information and send it to us. diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md index ad0296fcc4..926d1d9c7d 100644 --- a/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-mdm-windows-defender-advanced-threat-protection.md @@ -106,11 +106,11 @@ Health Status for onboarded machines: Sense Is Running | ./Device/Vendor/MSFT/Wi Health Status for onboarded machines: Onboarding State | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OnBoardingState | Integer | 1 | Onboarded to Windows Defender ATP Health Status for onboarded machines: Organization ID | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/HealthState/OrgId | String | Use OrgID from onboarding file | Onboarded to Organization ID Configuration for onboarded machines | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/SampleSharing | Integer | 0 or 1
    Default value: 1 | Windows Defender ATP Sample sharing is enabled -Configuration for onboarded machines: telemetry reporting frequency | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/TelemetryReportingFrequency | Integer | 1 or 2
    1: Normal (default)

    2: Expedite | Windows Defender ATP telemetry reporting +Configuration for onboarded machines: diagnostic data reporting frequency | ./Device/Vendor/MSFT/WindowsAdvancedThreatProtection/Configuration/TelemetryReportingFrequency | Integer | 1 or 2
    1: Normal (default)

    2: Expedite | Windows Defender ATP diagnostic data reporting > [!NOTE] > - The **Health Status for onboarded machines** policy uses read-only properties and can't be remediated. -> - Configuration of telemetry reporting frequency is only available for machines on Windows 10, version 1703. +> - Configuration of diagnostic data reporting frequency is only available for machines on Windows 10, version 1703. > - Using the Expedite mode might have an impact on the machine's battery usage and actual bandwidth used for sensor data. You should consider this when these measures are critical. diff --git a/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md index 221265a041..f98fcf98cf 100644 --- a/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-endpoints-non-windows-windows-defender-advanced-threat-protection.md @@ -60,7 +60,7 @@ To effectively offboard the endpoints from the service, you'll need to disable t 2. In Windows Defender Security Center portal, select **Endpoint management**> **Non-Windows**. -3. Toggle the third-party provider switch button to turn stop telemetry from endpoints. +3. Toggle the third-party provider switch button to turn stop diagnostic data from endpoints. >[!WARNING] >If you decide to turn on the third-party integration again after disabling the integration, you'll need to regenerate the token and reapply it on endpoints. diff --git a/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md index 3a456f6352..cd4942e214 100644 --- a/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection.md @@ -47,7 +47,7 @@ The WinHTTP configuration setting is independent of the Windows Internet (WinINe - WinHTTP configured using netsh command – Suitable only for desktops in a stable topology (for example: a desktop in a corporate network behind the same proxy) ## Configure the proxy server manually using a registry-based static proxy -Configure a registry-based static proxy to allow only Windows Defender ATP sensor to report telemetry and communicate with Windows Defender ATP services if a computer is not be permitted to connect to the Internet. +Configure a registry-based static proxy to allow only Windows Defender ATP sensor to report diagnostic data and communicate with Windows Defender ATP services if a computer is not be permitted to connect to the Internet. The static proxy is configurable through Group Policy (GP). The group policy can be found under: **Administrative Templates > Windows Components > Data Collection and Preview Builds > Configure connected user experiences and telemetry**. diff --git a/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md index 43244d2c7b..79a751c4a0 100644 --- a/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/event-error-codes-windows-defender-advanced-threat-protection.md @@ -155,7 +155,7 @@ The service could not contact the external processing servers at that URL. 17 Windows Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: ```variable```. An error occurred with the Windows telemetry service. -[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-telemetry-and-diagnostics-service-is-enabled).
    +[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled).
    Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
    See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). @@ -206,7 +206,7 @@ Ensure real-time antimalware protection is running properly. 28 Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service registration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service. -[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-telemetry-and-diagnostics-service-is-enabled).
    +[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
    Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
    See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). @@ -222,7 +222,7 @@ Ensure real-time antimalware protection is running properly. 31 Windows Defender Advanced Threat Protection Connected User Experiences and Telemetry service unregistration failed. Failure code: ```variable```. An error occurred with the Windows telemetry service during onboarding. The offboarding process continues. -[Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-telemetry-and-diagnostics-service-is-enabled). +[Check for errors with the Windows telemetry service](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled). 32 @@ -241,7 +241,7 @@ If the identifier does not persist, the same machine might appear twice in the p 34 Windows Defender Advanced Threat Protection service failed to add itself as a dependency on the Connected User Experiences and Telemetry service, causing onboarding process to fail. Failure code: ```variable```. An error occurred with the Windows telemetry service. -[Ensure the telemetry service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-telemetry-and-diagnostics-service-is-enabled).
    +[Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostic-data-service-is-enabled).
    Check that the onboarding settings and scripts were deployed properly. Try to redeploy the configuration packages.
    See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defender-advanced-threat-protection.md). @@ -250,7 +250,7 @@ See [Configure Windows Defender ATP endpoints](configure-endpoints-windows-defen Windows Defender Advanced Threat Protection service failed to remove itself as a dependency on the Connected User Experiences and Telemetry service. Failure code: ```variable```. An error occurred with the Windows telemetry service during offboarding. The offboarding process continues. -Check for errors with the Windows telemetry service. +Check for errors with the Windows diagnostic data service. 36 diff --git a/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md index 05f7de339c..b31dad703f 100644 --- a/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/fix-unhealhty-sensors-windows-defender-advanced-threat-protection.md @@ -72,8 +72,8 @@ Follow theses actions to correct known issues related to a misconfigured machine - [Verify client connectivity to Windows Defender ATP service URLs](configure-proxy-internet-windows-defender-advanced-threat-protection.md#verify-client-connectivity-to-windows-defender-atp-service-urls)
    Verify the proxy configuration completed successfully, that WinHTTP can discover and communicate through the proxy server in your environment, and that the proxy server allows traffic to the Windows Defender ATP service URLs. -- [Ensure the telemetry and diagnostics service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-telemetry-and-diagnostics-service-is-enabled)
    -If the endpoints aren't reporting correctly, you might need to check that the Windows 10 telemetry and diagnostics service is set to automatically start and is running on the endpoint. +- [Ensure the diagnostic data service is enabled](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-the-diagnostics-service-is-enabled)
    +If the endpoints aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint. - [Ensure that Windows Defender Antivirus is not disabled by policy](troubleshoot-onboarding-windows-defender-advanced-threat-protection.md#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy)
    If your endpoints are running a third-party antimalware client, the Windows Defender ATP agent needs the Windows Defender Antivirus Early Launch Antimalware (ELAM) driver to be enabled. diff --git a/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md index 8fc3acc6fa..3027bbe7f9 100644 --- a/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/minimum-requirements-windows-defender-advanced-threat-protection.md @@ -72,13 +72,14 @@ The Windows Defender ATP sensor can utilize up to 5MB daily of bandwidth to com For more information on additional proxy configuration settings see, [Configure Windows Defender ATP endpoint proxy and Internet connectivity settings](configure-proxy-internet-windows-defender-advanced-threat-protection.md) . -Before you configure endpoints, the telemetry and diagnostics service must be enabled. The service is enabled by default in Windows 10. +Before you configure endpoints, the diagnostic data service must be enabled. The service is enabled by default in Windows 10. -### Telemetry and diagnostics settings -You must ensure that the telemetry and diagnostics service is enabled on all the endpoints in your organization. + +### Diagnostic data settings +You must ensure that the diagnostic data service is enabled on all the endpoints in your organization. By default, this service is enabled, but it's good practice to check to ensure that you'll get sensor data from them. -**Use the command line to check the Windows 10 telemetry and diagnostics service startup type**: +**Use the command line to check the Windows 10 diagnostic data service startup type**: 1. Open an elevated command-line prompt on the endpoint: @@ -100,7 +101,7 @@ If the **START_TYPE** is not set to **AUTO_START**, then you'll need to set the -**Use the command line to set the Windows 10 telemetry and diagnostics service to automatically start:** +**Use the command line to set the Windows 10 diagnostic data service to automatically start:** 1. Open an elevated command-line prompt on the endpoint: diff --git a/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md b/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md index b4176ad214..487679607d 100644 --- a/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md +++ b/windows/threat-protection/windows-defender-atp/troubleshoot-onboarding-windows-defender-advanced-threat-protection.md @@ -128,7 +128,7 @@ ID | Severity | Event description | Troubleshooting steps ## Troubleshoot onboarding issues on the endpoint If the deployment tools used does not indicate an error in the onboarding process, but endpoints are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Windows Defender ATP agent: - [View agent onboarding errors in the endpoint event log](#view-agent-onboarding-errors-in-the-endpoint-event-log) -- [Ensure the telemetry and diagnostics service is enabled](#ensure-the-telemetry-and-diagnostics-service-is-enabled) +- [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled) - [Ensure the service is set to start](#ensure-the-service-is-set-to-start) - [Ensure the endpoint has an Internet connection](#ensure-the-endpoint-has-an-internet-connection) - [Ensure that Windows Defender Antivirus is not disabled by a policy](#ensure-that-windows-defender-antivirus-is-not-disabled-by-a-policy) @@ -176,14 +176,15 @@ Event ID | Message | Resolution steps
    There are additional components on the endpoint that the Windows Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Windows Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. -### Ensure the telemetry and diagnostics service is enabled -If the endpoints aren't reporting correctly, you might need to check that the Windows 10 telemetry and diagnostics service is set to automatically start and is running on the endpoint. The service might have been disabled by other programs or user configuration changes. + +### Ensure the diagnostic data service is enabled +If the endpoints aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the endpoint. The service might have been disabled by other programs or user configuration changes. First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't). ### Ensure the service is set to start -**Use the command line to check the Windows 10 telemetry and diagnostics service startup type**: +**Use the command line to check the Windows 10 diagnostic data service startup type**: 1. Open an elevated command-line prompt on the endpoint: @@ -204,7 +205,7 @@ First, you should check that the service is set to start automatically when Wind If the `START_TYPE` is not set to `AUTO_START`, then you'll need to set the service to automatically start. -**Use the command line to set the Windows 10 telemetry and diagnostics service to automatically start:** +**Use the command line to set the Windows 10 diagnostic data service to automatically start:** 1. Open an elevated command-line prompt on the endpoint: diff --git a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md index 356afd413a..e5b587a7fe 100644 --- a/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md +++ b/windows/threat-protection/windows-defender-smartscreen/windows-defender-smartscreen-overview.md @@ -43,7 +43,7 @@ Windows Defender SmartScreen helps to provide an early warning system against we - **Operating system integration.** SmartScreen is integrated into the Windows 10 operating system, meaning that it checks any files an app (including 3rd-party browsers and email clients) attempts to download and run. -- **Improved heuristics and telemetry.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help to protect you against potentially malicious sites and files. +- **Improved heuristics and diagnostic data.** SmartScreen is constantly learning and endeavoring to stay up-to-date, so it can help to protect you against potentially malicious sites and files. - **Management through Group Policy and Microsoft Intune.** SmartScreen supports using both Group Policy and Microsoft Intune settings. For more info about all available settings, see [Available Windows Defender SmartScreen Group Policy and mobile device management (MDM) settings](windows-defender-smartscreen-available-settings.md). diff --git a/windows/whats-new/whats-new-windows-10-version-1607.md b/windows/whats-new/whats-new-windows-10-version-1607.md index dfcecb8b7a..fb858f7d9e 100644 --- a/windows/whats-new/whats-new-windows-10-version-1607.md +++ b/windows/whats-new/whats-new-windows-10-version-1607.md @@ -35,7 +35,7 @@ Windows ICD now includes simplified workflows for creating provisioning packages Microsoft developed Upgrade Readiness in response to demand from enterprise customers looking for additional direction and details about upgrading to Windows 10. Upgrade Readiness was built taking into account multiple channels of customer feedback, testing, and Microsoft’s experience upgrading millions of devices to Windows 10. -With Windows telemetry enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. +With Windows diagnostic data enabled, Upgrade Readiness collects system, application, and driver data for analysis. We then identify compatibility issues that can block an upgrade and suggest fixes when they are known to Microsoft. Use Upgrade Readiness to get: From c03b87d14f4dd251e8a48c6a8fcc8db0ced15bd4 Mon Sep 17 00:00:00 2001 From: Trudy Hakala Date: Wed, 31 Jan 2018 00:23:55 +0000 Subject: [PATCH 66/91] Merged PR 5608: Updated rest-api-reference-windows-store-for-business.md - spelling error Updated rest-api-reference-windows-store-for-business.md - spelling error --- .../mdm/rest-api-reference-windows-store-for-business.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/rest-api-reference-windows-store-for-business.md b/windows/client-management/mdm/rest-api-reference-windows-store-for-business.md index bb8e58dd2c..465bbd98f8 100644 --- a/windows/client-management/mdm/rest-api-reference-windows-store-for-business.md +++ b/windows/client-management/mdm/rest-api-reference-windows-store-for-business.md @@ -1,6 +1,6 @@ --- -title: REST API reference for Micosoft Store for Business -description: REST API reference for Micosoft Store for Business +title: REST API reference for Microsoft Store for Business +description: REST API reference for Microsoft Store for Business MS-HAID: - 'p\_phdevicemgmt.business\_store\_portal\_management\_rest\_api\_reference' - 'p\_phDeviceMgmt.rest\_api\_reference\_windows\_store\_for\_Business' @@ -13,7 +13,7 @@ author: nickbrower ms.date: 09/18/2017 --- -# REST API reference for Micosoft Store for Business +# REST API reference for Microsoft Store for Business Here's the list of available operations: From 34778119c5975a394671fc29b653e039f1ba00d9 Mon Sep 17 00:00:00 2001 From: ashley-kim <35980531+ashley-kim@users.noreply.github.com> Date: Tue, 30 Jan 2018 16:59:19 -0800 Subject: [PATCH 67/91] Update Note for Express update delivery scope Starting with Fall Creators Update, Express update delivery no longer limited to quality update downloads. --- windows/deployment/update/waas-optimize-windows-10-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-optimize-windows-10-updates.md b/windows/deployment/update/waas-optimize-windows-10-updates.md index d694f2ff14..6af7a05dfe 100644 --- a/windows/deployment/update/waas-optimize-windows-10-updates.md +++ b/windows/deployment/update/waas-optimize-windows-10-updates.md @@ -51,7 +51,7 @@ Two methods of peer-to-peer content distribution are available in Windows 10. Windows 10 quality update downloads can be large because every package contains all previously released fixes to ensure consistency and simplicity. Windows has been able to reduce the size of Windows Update downloads with a feature called Express. >[!NOTE] ->Currently, Express update delivery only applies to quality update downloads. +>Express update delivery applies to quality update downloads. Starting with Windows 10, version 1709, Express update delivery also applies to feature update downloads for clients connected to Windows Update and Windows Update for Business. ### How Microsoft supports Express - **Express on System Center Configuration Manager** starting with version 1702 of Configuration Manager and Windows 10, version 1703 or 1607 with the April 2017 cumulative update. From d2bb7fe913b4fb896de26d3bdf2d7365cfd5a681 Mon Sep 17 00:00:00 2001 From: theznerd Date: Wed, 31 Jan 2018 12:12:46 -0700 Subject: [PATCH 68/91] Update faq-wd-app-guard.md Fixes extension confusion --- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 71c3fac2d7..387b02dde9 100644 --- a/windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -37,7 +37,7 @@ Answering frequently asked questions about Windows Defender Application Guard (A | | | |---|----------------------------| |**Q:** |Can employees copy and paste between the host device and the Application Guard Edge session?| -|**A:** |Depending on your organization's settings, employees can copy and paste images and text (.bmp) to and from the isolated container.| +|**A:** |Depending on your organization's settings, employees can copy and paste images (.bmp) and text to and from the isolated container.|
    | | | From f9e9aeaa8b544203db7fe20f6b69cac35695032f Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 31 Jan 2018 21:28:19 +0000 Subject: [PATCH 69/91] Merged PR 5622: Merge fix-build-warning to master --- .openpublishing.publish.config.json | 18 -------------- microsoft-365/docfx.json | 37 ----------------------------- 2 files changed, 55 deletions(-) delete mode 100644 microsoft-365/docfx.json diff --git a/.openpublishing.publish.config.json b/.openpublishing.publish.config.json index 7215ed2787..7c6bb4d033 100644 --- a/.openpublishing.publish.config.json +++ b/.openpublishing.publish.config.json @@ -102,24 +102,6 @@ "moniker_groups": [], "version": 0 }, - { - "docset_name": "microsoft-365", - "build_source_folder": "microsoft-365", - "build_output_subfolder": "microsoft-365", - "locale": "en-us", - "monikers": [], - "moniker_ranges": [], - "open_to_public_contributors": false, - "type_mapping": { - "Conceptual": "Content", - "ManagedReference": "Content", - "RestApi": "Content" - }, - "build_entry_point": "docs", - "template_folder": "_themes", - "moniker_groups": [], - "version": 0 - }, { "docset_name": "microsoft-edge-VSTS", "build_source_folder": "browsers/edge", diff --git a/microsoft-365/docfx.json b/microsoft-365/docfx.json deleted file mode 100644 index 585130e915..0000000000 --- a/microsoft-365/docfx.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "build": { - "content": [ - { - "files": [ - "**/*.md" - ], - "exclude": [ - "**/obj/**", - "**/includes/**", - "README.md", - "LICENSE", - "LICENSE-CODE", - "ThirdPartyNotices" - ] - } - ], - "resource": [ - { - "files": [ - "**/*.png", - "**/*.jpg" - ], - "exclude": [ - "**/obj/**", - "**/includes/**" - ] - } - ], - "overwrite": [], - "externalReference": [], - "globalMetadata": {}, - "fileMetadata": {}, - "template": [], - "dest": "microsoft-365" - } -} \ No newline at end of file From 5e05509b4974edf4696d03f657067c543b33fe67 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Wed, 31 Jan 2018 22:43:38 +0000 Subject: [PATCH 70/91] Merged PR 5629: Defender CSP - added new node OfflineScan --- windows/client-management/mdm/defender-csp.md | 10 +- windows/client-management/mdm/defender-ddf.md | 1256 +++++++++-------- .../mdm/images/provisioning-csp-defender.png | Bin 23712 -> 29644 bytes ...ew-in-windows-mdm-enrollment-management.md | 4 + 4 files changed, 648 insertions(+), 622 deletions(-) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 36cb8e6e0f..bcab5ce598 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -7,12 +7,15 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 06/26/2017 +ms.date: 01/29/2018 --- # Defender CSP +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise. The following image shows the Windows Defender configuration service provider in tree format. @@ -310,6 +313,11 @@ Node that can be used to perform signature updates for Windows Defender. Supported operations are Get and Execute. +**OfflineScan** +Added in Windows 10, next major update. OfflineScan action starts a Windows Defender offline scan on the computer where you run the command. This command causes the computer reboot and start in Windows Defender offline mode to begin the scan. + +Supported operations are Get and Execute. + ## Related topics diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md index 126869323b..4077ab58af 100644 --- a/windows/client-management/mdm/defender-ddf.md +++ b/windows/client-management/mdm/defender-ddf.md @@ -7,12 +7,15 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: nickbrower -ms.date: 12/05/2017 +ms.date: 01/29/20178 --- # Defender DDF file +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + This topic shows the OMA DM device description framework (DDF) for the **Defender** configuration service provider. DDF files are used only with OMA DM provisioning XML. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). @@ -22,648 +25,659 @@ The XML below is the current version for this CSP. ``` syntax ]> + "http://www.openmobilealliance.org/tech/DTD/DM_DDF-V1_2.dtd" + []> - 1.2 - + 1.2 + Defender ./Vendor/MSFT - - - - - - - - - - - - - - - + + + + + + + + + + + + + + com.microsoft/1.1/MDM/Defender + - Detections + Detections + + + + + + + + + + + + + + + + + + + - - - - - - - - - - - - - - - + + + + + + + + + + + + + ThreatId + + + - - - - - - - - - - - - - - - ThreatId - - - - - - Name - - - - - - - - - - - - - - - text/plain - - - - - URL - - - - - - - - - - - - - - - text/plain - - - - - Severity - - - - - - - - - - - - - - - text/plain - - - - - Category - - - - - - - - - - - - - - - text/plain - - - - - CurrentStatus - - - - - - - - - - - - - - - text/plain - - - - - ExecutionStatus - - - - - - - - - - - - - - - text/plain - - - - - InitialDetectionTime - - - - - - - - - - - - - - - text/plain - - - - - LastThreatStatusChangeTime - - - - - - - - - - - - - - - text/plain - - - - - NumberOfDetections - - - - - - - - - - - - - - - text/plain - - - + Name + + + + + + + + + + + + + + + text/plain + + + + URL + + + + + + + + + + + + + + + text/plain + + + + + Severity + + + + + + + + + + + + + + + text/plain + + + + + Category + + + + + + + + + + + + + + + text/plain + + + + + CurrentStatus + + + + + + + + + + + + + + + text/plain + + + + + ExecutionStatus + + + + + + + + + + + + + + + text/plain + + + + + InitialDetectionTime + + + + + + + + + + + + + + + text/plain + + + + + LastThreatStatusChangeTime + + + + + + + + + + + + + + + text/plain + + + + + NumberOfDetections + + + + + + + + + + + + + + + text/plain + + + + - Health + Health + + + + + + + + + + + + + + + + + + + ComputerState - - - - - - - - - - - - - - - + + + + + + + + + + + + + + text/plain + - - ComputerState - - - - - - - - - - - - - - - text/plain - - - - - DefenderEnabled - - - - - - - - - - - - - - - text/plain - - - - - RtpEnabled - - - - - - - - - - - - - - - text/plain - - - - - NisEnabled - - - - - - - - - - - - - - - text/plain - - - - - QuickScanOverdue - - - - - - - - - - - - - - - text/plain - - - - - FullScanOverdue - - - - - - - - - - - - - - - text/plain - - - - - SignatureOutOfDate - - - - - - - - - - - - - - - text/plain - - - - - RebootRequired - - - - - - - - - - - - - - - text/plain - - - - - FullScanRequired - - - - - - - - - - - - - - - text/plain - - - - - EngineVersion - - - - - - - - - - - - - - - text/plain - - - - - SignatureVersion - - - - - - - - - - - - - - - text/plain - - - - - DefenderVersion - - - - - - - - - - - - - - - text/plain - - - - - QuickScanTime - - - - - - - - - - - - - - - text/plain - - - - - FullScanTime - - - - - - - - - - - - - - - text/plain - - - - - QuickScanSigVersion - - - - - - - - - - - - - - - text/plain - - - - - FullScanSigVersion - - - - - - - - - - - - - - - text/plain - - - + + + DefenderEnabled + + + + + + + + + + + + + + + text/plain + + + + + RtpEnabled + + + + + + + + + + + + + + + text/plain + + + + + NisEnabled + + + + + + + + + + + + + + + text/plain + + + + + QuickScanOverdue + + + + + + + + + + + + + + + text/plain + + + + + FullScanOverdue + + + + + + + + + + + + + + + text/plain + + + + + SignatureOutOfDate + + + + + + + + + + + + + + + text/plain + + + + + RebootRequired + + + + + + + + + + + + + + + text/plain + + + + + FullScanRequired + + + + + + + + + + + + + + + text/plain + + + + + EngineVersion + + + + + + + + + + + + + + + text/plain + + + + + SignatureVersion + + + + + + + + + + + + + + + text/plain + + + + + DefenderVersion + + + + + + + + + + + + + + + text/plain + + + + + QuickScanTime + + + + + + + + + + + + + + + text/plain + + + + + FullScanTime + + + + + + + + + + + + + + + text/plain + + + + + QuickScanSigVersion + + + + + + + + + + + + + + + text/plain + + + + + FullScanSigVersion + + + + + + + + + + + + + + + text/plain + + + - Scan - - - - - - - - - - - - - - - - text/plain - - + Scan + + + + + + + + + + + + + + + + text/plain + + - UpdateSignature - - - - - - - - - - - - - - - - text/plain - - + UpdateSignature + + + + + + + + + + + + + + + + text/plain + + - + + OfflineScan + + + + + + + + + + + + + + + + text/plain + + + + ``` ## Related topics -[Defender configuration service provider](defender-csp.md) - -  - -  - - - - - - +[Defender configuration service provider](defender-csp.md) \ No newline at end of file diff --git a/windows/client-management/mdm/images/provisioning-csp-defender.png b/windows/client-management/mdm/images/provisioning-csp-defender.png index b3be3ba7f4735039aa1fd80e3e9b1a9e0ae4b129..8d34e77eb9a9a00c2dbad533ed220a5bc16adf9e 100644 GIT binary patch literal 29644 zcmdqJXFyZywl0hXu^}oVA_ywdrAw10g0x8QU8F?1f`Fl_EKsBgBt%;1y-61cU$n?;CKheRetf?0fh5{(L{yiX=00zGakWJmYy2sIIC&dGhi}GBPqsB}F++ zGO|PIWMoG_9X|}-+3U|Z2VM@jXe!(#%Wq+r0)HHZ%c#hZkrjrW+BPQ#f1h})Xy8Id zcIFG|zeDv-nU-W^F6K&dGTP5f=c>Kk8S2e5X7DK9x6-rHUZF0bYWZv5s@yHOdkWL+ zY-s9h#G-oM%nGWOxSb!MS9oG+$;=#~SgnB+87i@u|mT<(EfmNakK96HFL5LiYL?l7j5q3yAFMb#+EE zxuduv&tLZ{AVeGo*Vo6wD1LmJn3!me6-g8j%4;yVt5d6q z;@4D1eYCS#aDoyF-NNS{)e##vS-1L89mQ!Np6bXn?KrbZbFAQl<%C}CoY$|Btp>p} zWP);>PFc00(@tsMcfy7JvreEYLn9+sESmVvMGnSPEDd531hccaF)2>b4XCvpc&*3k zwk8yON5!}i(boG<;V(zPU=?b+?W<`%nc}=o#l#Sz)I2re5 z4O4SHTdp28!|1ZhF(V%J$OoG2oW1_G%CaYOei?pa5ghi}guxmmcaTRu&aMxx%=DNU zdVMlT-jaLM@HV_uETUUctyEbv>)h#z8<2o%ymdu>!tu5u%Wjl?GOt)yd#_;ULxIU? zf}2EUSyZyDowR5LBo`IcOFYzs!4G|SGB)1+vREodu%sn~8-=)Bs?DD4W(nozCe-$! zg`P~unnagd2^7WzG>BX-Y zL?3Rn96fvT`|8&$_F}efm2OhMGA3~#&k)W;GVDxwHur% zBP&+eS$~LF+|8)@ncLp}VO67z{?^E4i`a>IsOUZdEpkg%_I~!RhiQ^FqAu#OGg0#C zaz3hyI8I0LobEbmZDPT6Z|aoqXs#x+^CH~zY>>ooJyGN3d!G?m+KY5aatNG4rAxJJ zQxglXm5EZ@&le|=A`-G%_o1>jRF(unJT@;5wOY_Os05aKZ@pcO!jCEv&Om1UTANU6 z*Ap6#_-v3Sf0~GL97OWQ4eN$$ICN+^WWN_6TBU0V5$EnBuH!tEoD0uz6g&!udUqNf zC|V`KEfdps${y}GD#r$`7zBz>>p}U8{_T$)9uh`)-LQJr3f4EYUnQ7_ro*1 zbe{Mje4-*gFkxP^ydwraAkwzMJXlN)* zdiNRMrQBQ|5w-%1I2Uqlc!EcaSlsLn;~EX@9~{KG&P4fak|iQ8a5;f7-5e8y6-fC& z3yf2{zreBxaqi)_3+6qyo#Hj>w<>fFG? zZ#*}p*rE!T8Wg_@k|G(1&OEh^ZS;vx^l<}yeNzbwJ6%CEX1^4@mU4#OOg+8tZBr*F z7?V9BtAHGbDodZu-%5C8Y_U5Tw3cUVSm#03EW@RCvk?{KeWti{a&lW!s;C*pIgcWTPVZgPph4)#R-AEgsI`+KpI;y;|aIv>h+U26HNjT1ELEqimST`lZ zI!_`T>~Puo-P6yHT}71_RZ3L5FES9PBIY(iH8jtTWO>g#OFx9$`nE`sk98MA)E#;d zph)EA<`#pM)Sc$SOO-HAJ66F>OR4Xt44l!6WXaiS$>u3>4|RTB;?=Be`swi+!^Qa1 zl{=|QDj7E7zN<}oo0Av!o$dRio12^Jn%Zq}rwi`cwqNCPGW_0ih5Pvczzak z)VAFW7t1*@)s>ZC!g+-!K8zG?9!?T*`fEq8aR3+=_uk_L(v$px4x(ZTbmH z#5m6wG2yV}IQ3Xdk5C@!<&%ZyAw5KOx9wi-f!W%rijh(2q zp^RGW)3S^NXR>!!rt4|po)1-S=al4&;v(H$7WAF+4fs)dq&q8{)7!locc?Cg@t`P0 zT!}m13O#{&UHiS9CWr-yH&psZZhK`i1N;W9!TGc#?A>f`7{b4c6N!#i?Lw9p!~DOf zm>@v5tgNVr{vBQ%2R}SP30||rgq@#1dzfx}^Z+X%Y<##N5aP8p#Ty9U8nIYo z6kB;z;JX>m<+L<)nvYW5wB^;zLV~g35Ai$JjEndtURs~W)*GGO-BCUcWVVNiHUzJ& z_Axf!sa#2cFN1rXw6qr!jD|1$)H|MdMjbQmuGj6eGLY1Kk@PrNonlsgTZ&L)U`=Pg9y z1cOsfi~i&pr#U%Ra+$+zpp0_??3&L=`x~D=GS;iMLa9Ub06m6pIIjFTqlHJMP*;Q z0%96t$Q|ZRTv%m3rMDHYW8!FkcdNPt+KtJV9A#qjQK4eZ$ir>*5B86snoleZ?ArP6 ze0Gmd12>ziNHx~o8VxwF?onDS{Jli;N7hSQ-HJ!an@<&P%~!5CG}v}DK&ig4X2I{p z1yZXGYzaU2j+51;<>7Kz!fJZANI>FdURK??x60WPJsin{zf`-ka}5I{;?6BqIX7C* zpXFX+tt`oDI0>A%eUl;{q=%uwaoXhvn!Utk4>USUnV=XJVsp~X)~d_cf2uP>!bBlN z|3|mYD-*`f!wbab^=b)&qTz-oiimq%$~Ze6jKQ^at`AlAUL*|LeFol(u1PBm;F!XVt7MA|QEqs*X86q~-Gsl?CW zMwnWPKtQlIvJ5(zWmohiS6ExAbo+;mXq%%QJ3ilutMm>6k~b8Se8Qx^JK8HrJNzMW zf1^zh6x%(tme^lCwCc2lTw%3^4nFJjMw#KgD7GJw+A$1LO61ezM5T2s)>?i&6yNCQ zA%ln!8LoLc-lY)FqG0{bNqQ%Z8dkrqZJ9}nL<@e{`~)y?&DO(-bFt!uQ}glOD6_AA z{W6G);^N|7U;6Hkg8vcShbMBbm|srB9$sf0p!>Mi`}xIl=R6D zA>1iSB!&8a@Dg%FmjIA+`2*bS?Cj4Bde&n^|GE+sDf&}MdF{<2b}|Zixoh6PUuTH6 z1vv;eSy}sRG33-XCGNmb(ER+ zf*+UH@W3TTSY`gzyxYhvppcV?1YMDHwB4-J{@K+i?kd2gjBVOK(A z+!v$$wpU?APG9A>n))KK%_5xOGh01O@9>FXv6+xt*M_|}8$pq_)J;$XchA&Ah&T}> zx}-lT$chM4U8%OSay6(m`~emy!~^9H#;vj|@V2G@N6V@gJae0@!(eE@XinUpA_mlX zdyNzIo8*2wcMwS$DNw#y?QZ+%sg}dy>-({Q{*6F9wnS>hX)O2r%;)VoLShx4w$Jm8 z)ebX5W2rAxk0oXHzelLq?l!CaWdeWE%=4;pz!SIvCu}-!>;q@v>OqM&@&azYSdo{< zy;CH^LYj^?p}miU_=}1wt>(jH?K5cakxRfKI%M0$D}n%fY&mV#BswMm>~lT8M5d*&z-^j&oIS0WuH~KoqP5zR)1<6hQDQkEG$Q&X&+1{9kcwCfpY-j`l~ZWl z<;G*EL3JH~9u^Hg9(?@eMxBpJS#wxUi(9*{gG~hP8_`$&tVNSmFX$4n)RQrXjEYDL}fAWi=4IlX#>C_|%HkdLp0 zYU70DW2hIY+Ou{8V?~^%X%9XmC7Fs|C!Dy4CA)&D_tVEKM|NyqP_R?2j&$c4!MNb- z<7>xA)j4)!m1XDl3nuUh+}*w0w`NU`cQ>$j{Cn>8mg0xLYgJr!n>2@=)ES>$Q~dyf z+b>|RT)WlH%OrghE2#-ZMst&6*mj#TO8X07{e~6)fyjr1}Nt_xcXv z`Ty|t>&vL}(o&)4QIA)qy9Uag*mxPh_cApQFu11+n-8S8_9}J5Ky+z)V!|5woFwu3 zwZ}dfo%JfBwy_3NyFio)PQ;4(L02`^P2*$`XF1q;Tfi_bAZg+1jB+P&L4sg7ES$t< z5+E2D&=MDEgmJxq{?Mt#XYOVijNXm_IkkZgH@j5i~!>@NiT_HyMs7;ZjqzF zMXeU?uxwAfa$Z<_;EoGh?|#T>+*4^Rw)LC8tI4Khz7%i_+|1axmS=Y?i)C*lyk`O9 z``y4WM43~R$ZB<476F)%h0Y7*)O{=`J4RvI4YvoDuILQUYNZwn^YIArgAu0569c`L zM5NuKbW zI*l(YZ`Lwq?#DI?UZT@rD8xsaur6^bgdp#BS*HbeLuiqwV2ZRfi=4b$HnK0EPER*x z4!jRzWF$k(W{KbNxa))vc|^KskuQJ_ff)mM6-n3w8!D zg}{gaY9-2mLYK7I|LSeI5ZoA5OFy~q<751qDbTw9i;MnYG|v^Y^blUpw2eN$QuzDP z{8KY<-Zuk-1tjWe_c8a?)gt@cE4b_i*uYZ!vg6E4k`WQ4aE;h9zFKpADq{0_B!z_^ z>j`2h3z!vg*3)QI8dC|a)cefe%nN`YC1&}}*_!Fe zB7j|e>OC-vjTEz5mX4EC`{aDIh>#t8CSk0OzuJU??ndz6Kr z=aIH0(1gU-m^$^Yct)Q^F%;|0Pkq?m;(xXn|8z$?GqJ^7JJdn-7cV9-H{++$v=Y1^ zr323cu3B7NOg<-5YtK%V{2%US)%N@VS59LpjaaS6JRlz$PQ3!5;vkg*VB!7qr%CDt zVt1L^E8^r=#cJHxmz4hVQW7Wsr6Io5A&@dV;R>p2x3%lGOJ-FypjrjB2|qzZK;A+1 z0N(`>Al2~{%gRJ<&PtsoVbDW-89Z6@vo>aMl(O=aEU|+MCw`n13qDq1udifYiI(~` zotJ>@T=inh=~zfZpXAKJPz?Dv+ji@!2*JD2EUNhU(icLl_enA6JkfjdJIxb|&kQ~l zd+`}H0B=X%i-BdcNfO@Zv$Y!EDY7nOLAq*3M&JVPyBxv26BoBb>kYa%yVsHIi&kpz z;@)B>YHwAo_GwhNJ+lsq4ktO6y%U4A`_7)DWoW>O-#{p4K_@-C(bgaehhKMt1M8FC zTrnE87dPL1>a$YAHtz~DF|$buHpTI$7Cc7Iw2zf%xEZC(sD!vDDZ)(hY7NZUs2b@* zDm&HKr#U)>_;$3VN?vh0E`@_P&uMuun6zG3QEcVf(e98)XR5nB6Y*Sjzy5;5xKley zXH^|j9UIBw9QmkvM`Vd~t-3oR>ycbjbIf@I5B1Vp$n6hboQ=(i-bi%9>*9!)7&sFc z>-kTg+`6+w)$ydjLQYf>SK0b>54aeJD(MV}+m0;-V^*Y9_!rg+e7~jE&GAJ47eHS| z(4GOoqcc$zeK9-cvYguxzj2BiYKI z<#=cCH6+cux%JOASFl8{2jpbkY;v*`vN|^8Kdx!+%^xCDo^UH%=*l_w?qkdd#AVVN z$#AH>;fM^U<4C{nKhe@cAaeMoxl{5hMNW4V3jLvD=9ZS1ai%Aoe@n7Hf(Ab4cY+ii zWD&YeDp6??sx~%56bbVc~i+ekmgXq$y@0&V{)~r@UOANZs-6 z=?YNU{s~%IHUF;@+d&!x^$K8+$`e^EeH~ayxez>L)_*tfn+2ex!Y3w|+q3L?^8ad? z&$NU7&6Jl$gNrp1sgZZ99y5-Y0i0?3M(*mX{IYAnW6~CJGr9dS)SKczct1vcE|uWQ zK(>siyBqmNuBn%fKGThLBQ5C{6dQRV$!ev)e~5@M!pgW`D|ma9c!hzTsxG|`7rB*{ z9GTK85_CtCZxwYaOq?6Yw{C95YHM)&UQMIImVuo_o?>zg+Iu#Q^WDlYyA88T z4$i@DM|iq_P}8_pVbl+Q0cof5P$op_Q1gGC&X5qA%c`*o1m+fDLU0c?J}1K3G=ko0 z7VV8uIf-Hud1S5aAC6*6@qi7E>$)7ftb(}iJdr)8UFHc^@Ls0!c0F@w+UD-j`!n^l zJ|?WjTm}c4k4|Y&NM@s z#I(=nl~^BWcSsdw8{o7AZ=vAJy1RGUk+(gPNfS!vQj=Fwp1$+#{2$JLAYax(a?7Sg$-@BwpA%EEp1P+sWX0648eJ>`8Dn*>x#!VR&Y2Q0<^~D03`E^0&e>MCG3}A z;v(Y*PPqOnv+NJ5u$TWFc>Ya9R(3)57|;*)4G6aX7xHi6G-}HVaB=Y)w!S}Ymq^hi zCJj5c(W1VwEKu%v+wnZnRd;Pwxcf}j0O(_Mubxd?%+<93(>#fDIawe08ym1YDFZYX zo6c1*TopMW=a}AZkIMsX>Qm>059jD?I{3;YTMxZY<#6^lF2zL$~SHeDiY#VNsTH`x{(&B z%^$#(=d9sdYL*|CRIOvMS2WljDI9+jkB!8!OA@AgW%VQZd3CfKCyi^+45ZBd*E%A~ z7e`e#9be>d?Q5s*{3tC==g?t};53PuX_XtLZc}Hio9buMu;YmLsN4Il&P8a1 zX-5>ejn$_Zq%sFEJpG7^)NpA`pXS6zZ#=?LhYM;runo{nVU3F}ddKEAvRpAWJU% zrM5hqWs6Ypo6KTM_5x+Wxz}zIv#zznwwf&U5mxPMXF$rbiGs$VmWcivX1|&16=)5+)m>9LPJ6RcSP4p3A-|IzNYgWX-Q40+*EvdZwd*< zpP1rgf&qGw(oMWKVnKdYb6SUyiLoo{*NDbH$3QG(#6GhM6)eem)AJ;#n66AaqPwy_ zAlc~e68LKHWO`A5yD}CHhrEUy`!(JAg5BK>q+qIx2 z_TZ`_RGaQ{H08*$mS_oSFF>>xSIB=&Pd(wUhhEh&EfcjuRPG7TA~s&CS@IiWhTZzJ zZ^WDx>HIm>)zY8%co`y5-4RV+>DoTbbeFRj{kmbvu^~%p&_M_J+G#1Ix9dQqw}{ zDLIX-JSUDELGEIdsvL~Cs13Ur_0^(G*V`ydOBbWqC;OdLya1bOZ~FK0#P7-sGDmH85sBhHGbH z@7qGzjQrsbCQ3`J`-S6;+PnfB8&d_8!^&^F3E>I3wiOU=En=61*7HPr(`lOAanOf$ z4xXEBucifgX`lEfm%S)6YdS$2%EQ&m%AFgPiY?C;qmrg#CI@r4rH7~sld^j1Z>hx^ zVfW}HPOwfVoaW7>*1Uj@G+s{RW0o zeQF3>1ugYY>KGT-^Te!}{BO8Pi%=dW#qQRqa3Q5y!m`OwQnqle#2DfdsjRy<2bmUF zq1W{A@p}tugt?pC35r_ZSK{Qkol_pSn#?GjQw$vMa#rK;`+oO}7B#z?oB=Nrto!CW zHO)Rolh9ZlK^05ArCDyFcts~wQ%x5hPeyrCF=X@E6EXhdf8Y)ODMxZNNn)!fI8cEE z>F81LZGTxv@1&pxW{LK)&G@iJCaind=N75NO>@9$`98PmmHX*rktaA{VmiW9o`mIi z2|cjyPm|!F9V?jcXj*?Do{GJ=57U$p{!E9iMzHg4o${KDyw^ni2+}x=S}B&EEzdvW z9s$=!$SVm<+TUywp20DcXYbkUe@h9WDIeMraigXcJsbbvVfnb5b@H3dc9l)pd1yp? zN81*XRiBNYsKLRw)4!pc>Mwy#MaF)K8Vo^0X1kx%9W`T-J>>z4ITd3kT?{&U^$@Zx zI_||!)@FS7Yt2Jf>^rJLp;Yy8f^vo-!uGg3dU84Op=!z*qRxtR2nnIC?yP@~3Q}Il z=dLZ;<58o-t*A~&nbfOX!NqQtwd}7q8d?tc{wt`YcN3ccAzQLhY>u?pFxDB`EM2%J zajs|Y7Adb8rc2PVyte0MRnaK4(^Bn36^9wGKnnzpGl5n~GTo z&s0HVb-w8o4qDheNAh5EcKr5Dd;o`u;Z^SW;? zaX@caf@6j)#ZsmHd-Qk0xV9^mt4+TM>F#HVEQd9_f9aWe=)t(NIAUiU^sWmz+}_IZ zg+`WHhQ7{rZ(KBCp4f7qh3d!vmH9`qgy+n726i^0?Q5>Jh)C=QX_vF;h$`K3b|*s; zE`E$e&tuOhBc^ZJ%9#|QCJ8DQEk}tVpcPPfLJ<+De2ji0yjYhQZ6xfDMt^gS>nb*Q zXLIJ@0wv@c=(of4oj!Z*HT3LmMY@Z_?D`AilZ8DV;!#nT^wNUs)G>HZgnU4mYlBZ~ zCP%%1Yv94aj1AGaoWDevj?g@;`L`SCT1Al{)0(c1=?!RY+G=8M*a)OzOZW<=jvqWx zNgrF}x?0U$I26nG%4~jbN^7spz%Vsh20<1n5V;0@e@6P(OUMvd7a!Qyd;iyeI{yOx zUtr6+lG!BEtS~mj5rxfW3AqI?2RDiRVfHRvTx$cK#x6kW*yKqU;QS z$3#LA`m2D`?g!r|OOCaP53e?iddW zhL5SYK-J4Ka4Y;8kp=*m0v&|)h>Q^x@z8x-6N>HM>hf2U#uFU^wRdC&Ut^|8%fsHC zj+y1lq14gjmVS0wwPfHjz^((z-0B!?xUQ<&AO+|{@NrNSNC@nYAQ5|!96axhI^l0< zW3YzTd1|*-ank}e_gV@tRfwhi2GVau-M>`J{6%*60#dF3s^W_bS9=P~dekI8cHTko z00r}c?=M2%5)8KU4JgXKzaXZ4qm7D+0@|7lAbI{)E3&ylmPvy|Ge`9SL5dU*{ge+; z)PlZeJU-zXMI_UeolT&8c6_qYq`;InLwhVyN*yC_KfgKYS!=xhi6pi$_+$LX(p*OE z@_1HlZOQ880ZE`cU;}7M%w_e4cvU(P2iY7_2v5!)4AuB(2)7ErjJtAfhP$^gCZ(yjlXu=X7;c*k2?rJ1CHj4mc= zF<0!4@f|AUa{Aq5waYz0x2j!Hv8ptHVuOI#Pip;__fE{A`*%8V)by`_#_)Dd&b8b(R+Dn z?@5!8+phas6G^uar7Qces)5Jg-SB%i%ZIVL?`0ab_4BaX4+a+c=L_<`hk{|9B-y0ckn|L25v3|48ayAb>d?Uu)346^;~IzG+l4?i zTgzy4%PQz`^BvOQQhN+E*Mib2iJGLA&IX-sj`IBM(}u*VZhBo)9|*;gr$GQBt6wcB z57Q^F<9bQ`wo)LNe0=eejdqRe_!4|``x9NK>@1G@mRpKK#QSf4AeVdYt1I^AK)blj zz$W#?xxLFP__g)#5}BuvY#ZalyDMMY`Ez?pjt_HV#GAt}+8!m^03n5s#|FyUCtEpg zV`Fh4aOX-5Ng*Q!HWQFS^(_*Mev`XSpbdSb5g6|-fa4fr!)G(`B4YTvbBPjYz+A>x zx0-=Y^cuz^bxYRy!NyA9E0O?gn%C6Oh*%zKuAGQ{2>OI8QyB?o48M0|3~x^fPO8n36u~C;U;w)Z-;| zH-(2J^olq1YS?J>ZEtFdUq4~?YMi8%0Ntv2mBs;SW<^gn?9A?XEl{WNZgg6Mw? z7sSVoXF}3mX6OB!DB(*Q5%#zrNhI;ti{u4SA|&NMZ?i{zMgKBj_){az=BP{@?xR~N>Eipno^YNKvJSbThtUIpVbU>^Mwz{fh;8V?#3Hq-`E zsS*g!M_;U(WmXf#Mc5Lri-&jc;m7=|t;VeNswv{x4;C$+R{AU+?;U35^XunU=o)A?0JzVOT4)gtv#y5+Q^Tz_6J z6z6b_?rIhbP!W<#&DAtlf>@M`TH`6e9Bk#Sd9-$fcSzxE+L><8yIclI%XfF9x{u?y zJb3Z;*Q<(fc_J;^ROw+)b5CUU#Zb30S5^ZKcgz~MbonV@Z%Nj0OBEpyh-ufC(kx8n zdkFjsTT_dn;PNK|1C zgyKFc{+(I<)%M!h!^RKn;|}87vHd+eLcDkBV5Y!&dlyd3fL6lS(L$mNY!mfck0kNp zJ!6SKNw0#Y$-b4d|-M$3433QU;Pi&?#!8&Nxc}MlH_)%01EnDZrn;pU&i7)f|YA=hHvdpQO=41Mtt;NSujD6rCb+9(;E#X|F8(CcYg5xfo z@O_#1S>lw57UEmi%|?9%=?ovYtfwEIN>v)yy;qBZ&dsGd%x$i+Z`yFgYWB%qVmWX{ z-@YAn3F$RSpN&r`3u+M*n40ZLg^Q$t9wu7N7!X42>L?ThKV5pR$$t0?Y26A^ZqoQ<>L53 zZNp(*Q*)zg=`PA1byI3mTJPbd{JOOCcdnIgvv2|sA-NovC7hbLfx%mcPG74or) zWy+<=j%=0TO0h;OR(c*tIR~XHF0b2nhi*?HgQH`KfwweF$AI+n$zCM-+me>v?s~#r zadBn(1ta|^jsO&#K_bl{qAI|nsdoi-CN{L}h{ZwK|NrSzt|o%SAk!3$s+$3f>?Whzu@hPm*5G9L>^ zw3lAmGV%he(o?NuiJY3vDcgK3$iJbFmZh$CG`n^nCIa1TIPdbxpC0mX>}q$!Qs5N;sQ&LPSaC{3z6Hqn3>HNF zb*9$lXICcTK4%@kl$2^*q~UL!-=j7~IvvG~V&St6A;B5+NLnc{+x~osjteOqPM$S_ z+ENeIP1nJcAC*Jhlm1VOLNK+D)ERM0q@g#Wdibr(-_%8f=0;-7QB%rDG<$AwHWyXp zsqVCr$R?Gv6$c_s+0Kq9XsQQO%a ze(F)9XfN(XMAgR6{KtPWRc&AjK)wC6UOQRh+}f;I5d_I*;vV4yFK2(h9Xh6Nszvgu zu`wn9mTT&HrJpVDC_%+zPSShR#Xxy%doxSP>a=h$b7~&;R(8yL!XunkKMn_TN5~5q zAtrcuL$pGnn3KS(otSE_V-gx%_AF=<5JWoAkQXZJ?37oVP0B{0-&h|eW>KajVZ#ZH zg4eg&>K(eIadxa=jU)W#oHm(iH`?Hly3{3b{czAy#8h=qPlF;>^NbO$%ALipk(D7Ty zTaEv${+E~?d0_Sy7jcmRmBr|9aLF9jnfN5=1`%iUZdj2bCV+afyIA3xz)zkJG`7ca zv7{p5j3FY>?=*tLZk8)(5wy#HtKx!gue_0Ub5zYL7Jm0eUxRQTSkV*E0e-+bP>+*TeGaC(#pD}+`Ja01Nquf_d_F#S|6pkg-^A# z482Z!5<^8}7^xBe{oU$KpR2Z?{V3bQIBK>vPE%dGUU~WHR>L8QE7zsNs4DGrmp-#8 zq`hAnJ&0o48*OVKn!{=q!)WLCD*^+K0k=NQUeHBw$jClV%-JbH5vy`3Y!0P7{!qcw zRHss}Db#VI@$-F4+e9ynK?DUm3rg~SU*P4T%X)^UYfol;IG*I9yNUYG67oOj( zl5mldhrSdre*2m9*f`o|7Fs<>*>(4Ql)gQKtJoy#v$T_wJ3`p;!;QtBkrTMw z8|2}N<{v6BI=0k8^FBCO%=peslFP#DD*Bn~5Nx1Oe)tGw%1!>3Z~kg8SH_X*`bR!kdk7Y{_(UF2gvOrj!W?&gF7*D>Hx~6T*EN~ zUXN6i{VNCf(@Q`#UXQ+A#^RNgLaLpoH3@SAe7FnQ#D4p+-3>7B%Sl)bVY_=k#Wg?Ykb6b5oXWL) zhUV4mV4OMJfsdvz87mJ$5P-`K+=QoYrVZ>sb{_Uw$q%|rVl?CsOO3yS^dPZ$5-+g; zdTSRr)Mh(_9guS`4-+XJzP5k&S+==VYkOg0h?P0p$5P-0F5)F+d|X8CSS4?Q?Ff5v zIjO<lGAnyZ!LgqOM%l zwY;mGIcM@PA&lq49)YuKa+bn=L_1um4MS``Cf5UBWlIGwr@Cu3QaS4k8qPKONKnLvS_#?=7mg=~0(&c)i7` zCe(>(J~@=sHK9rGcTg0p~O~ibF;yn)L8N{9mSm+{kk^7q$j?hV7 zIK!>A#p49p>ia~%5?h&kQm0%glv+{5n0noke3r324o8|x>WV*#E? zX{2u*d8-AZK@d9g?Hg5x&oP__BlkhAqO!w+vW(A3<8f6_lkhg`5wSwLM)V+knr!n| zR`oE!ZDERKwT;(j#KZ1Za5$lsS-1E}$7^-oGg)u^mkoMX0e$~;;FEv)*1zk3|NkKr zju4wArq)7Z&2CE#9qiM66T}8B1UKs}sBs$JbljU@UD1eG%+u}<^YVeJ+=Rjj#{IG( z2Lbk80a}&aJ7n`vqdns6%UO zvzb&(2XU|xS6t55(Rd5Vwl#=Zcy=L%4$~mDbDT)0CmAbF=cse#z}AoS5-AJh?E){e znb9OER!|zx<&;%^wa*t0+>GdDigqt{jAU$Q-B49t7W=sxd9K(o{!HXuF^^9Hs&1&} z)|)qDm2{-(Wmis(TkRC{OLTpfImM*GcyQ~#4FYUt2+#u)aCT@cMKd~C1^aV{B=QpN z#0?5P;s*v85FCPv-T1d0xwd5x!>P=|_A=;uba0xSaU!Q=L(%Rl>moJjYzHC_{;l<* zg}WnK>N@j*xekjt-;WCd3LQQPO&T%=0AGF2rrw?K4bm}Zv`kY zZFToG4V|geL(#Jxctu?C!^$RGoz>UNCI{&uq;}S4eSr}%_9w0dp1-&KJ-H%(F!Ni2 z{m)<)&K{Q$o&t4t8=(q^&MX;(yc1{k-NHxh`B+rBn)I}MDRkeTM$%0K(32^lZv+n= zEJW5`gfe4R;9VkRUXwF1YbDMk<}(kk+6(W9yJE?;Q1%u$u7PNdsL!9V%)>Eh{Ek9d zoN7Fc_8iK*KhxgvYIuIiSk%U}r`cjWuZ5Vu_?pdv)3OkYYSXZYMq4I)q53pk`+&7; zN1F?uZ2^x$XVG6JQTixy+=$A>9L7C;QovRT4K9=ZnV(jpSaLmrcjc?x z^=dIhDd{IU&Q%s=Cz#=GYZMym_WF+8Z^Cg}OMk&}o?H&R>$^{YVsp@ydi5s%-9IOlnkx#RdgaZ{IzQm{U|zasxC4v-S!hbI<5 zhQHC%0(vw1%;EnIhW-t~LFouub`zRrdpoSR5>C6c;&stfJrj zWJ-hO@RQJeUcT)tF^hMurMA`0V(zV$IlC4(Boav{G(F(iBQ8rM$RH?4bmcKpoftW2 z@@}}-?3OF1ljG3&R?=nc1wy2vEg1@6&_?=cVtOpkNU$#?f=Z(87%@vST*}&dMnc0B zu7d{Uq7uSjr^vZjo$B_c<+8OpEpDJ8%`(E~$`>v9gwboHUyMLN?5kHEwwlNyD2{@s z)*@`KViI0eF)^C<#oY*7IaVvW`lh&KThJ@&zDiQJuPsB0;V8MoZ39Pr)*RmEA~l4E z2)h46WE(Nie@R9X30Jl5yjJ%c8Sbc=p2Mq|Y>fHt;#;PnVCN|PI;G%mH$yDue{^El zhfdN_7}*>`^hhqw>E+K~WOqt!5G8Kt*Wemwf+fC+9>h5HDr}EkA8}{y6t5VpQF`93 zj$lc5I6~tk2!8T0!5s)6cL`$1t-oCUXjaX>lss-og>it@fVzjAniKCNpo);{euksB zdHv*fs$FL?%k+*KNx79RQTp6IpXMrML>GGJr(+}T)O@HEU0=oSy^Cqz1xn`%ux+m{ z{f;Ef+L-=tma#Ek9StJVcup2GJ$>^|JVlO&(>fuI7%f*~C!Y}9=Eq)G_Mk6uLd}^A z$u`RWM_bpW-{AZ;^b%*8(Q@R#+K=IK0DQa(s_8`RrXO_p@W1Zm01ca|>FwPEarCc3 zPYuigeL?^~iUe4>eT6h)3o`mEJ@@=7D4{^FnG;yX|LY5QDrmvgkaL6Ii%_Vw-#@rp ziDdHv`4{{kfkI3IIIY!^{|~&%wR?b9`I7Q)GlOkBL@P7M$!oxOkZ$JG4UPS#ly%NO zqR`zxrgABvia8SEbmqJt2hOQA42D4Ir-9}6aXBH$%~G)~wmi({Z*SKM8gcGBkj}%r z0T1?qDU#DvL#ctshRDmUxeJjZoAy-K*`08t_c73T9h-DQKdkZ&!WOM(dA;<7a!cxl zP72?GFrCH8-wcgzo8<(vszwtuy>T^OLYs0PK#{*Gpgc zyKd4#Ls}J;?W-vCb^ZaNV;gomaYed8$Bzk||3>cEyOFL;v9PaHe$> z+nFoCX}!ZWUR}EOJAp}g?I$qOuX?mhXNMa9!s#jnd>c=bpyBYh-|>udyApUI^xbOo zSH7Tu+Wy4ADpdplRRBS^nW^~i9zc4)iflvmPCme8G=6!5|A`F)=`_uFT7*Py2F0BpACvIj;eb{8-3;Jf4U zb$j<7BM4o8bLGc`-rE;5bulHH-G0V?#4Vp^{nK(ftXEG8=8Lpyf zr-;%wdOu2`lP_^D?Aq*Pz2L!G73-M(C`9%Ep~*ofl;aq&biX<3^hO3T_doPY|63oM zpP#oww-oFjyMd~5kMjbr?M##SU-B^U+bG9c&jVq^{t@$ip6KBT&<36YC#RK`1l>p3 zymFtDyxms&FB)x9(f5y?wtty53qhquIX^o`N4Idw9Mo!S^SPk&w1ywtB*cTW2#-hf ztJCOwrGyS3K}s8rUZCY?^c{XEsGMSmy!d@_WqEnO2uz+5XGaIda#xRVBm5;e(1=7U zo(L`Pv)4V?!TxlK3Yg&>j4rDqzwi{GfxfGK+DKbwHze@Q2|K)lHH!`OXY`M-CNF{7 z?LPCInV~>ldS!nBwTZq|*X7@q7PSVok6Df$mxUWD)rH=#m_)gGZiw4c)Kkm4dV|y*dUBw$>eIcg7)3M}b_4 za|W55KRJ@HZZCj?39UV@|H3T8Ar^saAWFL3gPFlYz^ zdjm1OZY{wZf2*hW9L{rfd=|;(ctJY~ptse&@hjn5jGXVO1R&WI8fI>wPZI;#XIL6gZ=lPh z{9VWCl*-OUXZr3X>)n$F{V-9S;2BK*p}^mOo)4+#Ex_`-)W562NcTI;{3D+U{9#?Q zzU&WP*JV;)4WJ^RNb1VbTUom+J67Q~7vn=rJP#T(t{hZXNj-}HB}IhQOX2qw6Nao zma=hh6SJW*f*6tOkorJzfY11~{(2zi;U~7?a+5t=g1)>giS7r-bgh%TZf2F%pTgN) z2aaG3x-H*azVf3w3nXCOoSH8Ki;NCH>^~zp@^-F&~xofQlsz*nH3H=+@J7HgCT zp!oE&v{8{!GLgpTH+k3o6?5$MZFeUq)(R_A&}1hB#-Bq$70N`g+AQ?Jt}pp%u(Lzq z##tg&DM=K4jFZmNm+=qLLRL3Rh%K~ z8F;B(vA;tsL64jTn}uv?*1=ow%)>f?L!5dkI|&(UOl#sRIRPGpoxF;P&0;1tYG;}{ zAs*=NRL1{0l)=p8T35ZS+O?5lrcxE`g>3NoU7PLiyIpk!pa8!DV))N6*g5}gf$e{- zU4Xdt55ja+h!e#Kk9lMkHI;nW-;jY7rkIKT(D65`s!s3M1Fe`_;zWd$oGI7ob>LOf zm8=!YMxb8MR&EWGuhiMcMIBz;8+UN=_cFRBywhx)a+6=O;Hta4rfFG(Y}<>;5m06p zXKa?XD_lvCU)xK5O7z1Q_19EnV^j%mL4ltRlM}nXwi7ZkplS7jf%VsahU|q*2phY2 zQ$Fl>T}^T=xb+VA7Ic?(X)KRkr-dF0O}(H)>@_mwPc>2l+plfCAw)^G{j$>WKrLBl zT+&-@m2&?@7lix;RLHU{mKeQ60#BkUsffZjc=k(ur%jEc)v)__WT$dU$tf4jnoDA{ zmIb488^HujmK6`x-?18uGJ2K9bBlvVKb`h7>8~dlq)oA)(?;X~_3q-pu^YY}D%X`3 z%XJ7%goRghq{G&lhvh4bs|Zwl?WBA((<06W>v3rKxEX0O<73jK93O}&(vw+Vu^mP%Hc5X6^q{fBC@=0}aVJT{9* z%yP2J=Lb?U%RHvnn%$&^>9EA$_;`XD#x>+>uZx_Uh@j86Wx&=V0G7z4O&u|x@YZ>!f1u95^lbE2azSg&ZY4#Fy(qH+JXq_x!N) z^@Ks6SM^%D?%tERU~|m+T^um07!RCH{+-!}AJ9(oygPzjnACV7QWA?BTr%y`v7_?Q z`538ckk9s+XI|((6HQ<9lE6C@FxnaobKw}bRnGkynRfrc2!C*njBo$@AJ;_Z0E$8< zWOF(BWiaR&cvW&_r-t_lDJH>|p7Z{17bs5QoNu(<_`LJza-f{d*=fg#j%v<3*+~r1 z7mGu9gN8Z2JT(!e1yuR4Wl_?H-w~iyh4oKWRa-cBmMdb5%2Pxu|(f(C`vU3)4FM;gOT)`Mc&@dZ(L4^>~?! z!C#URHx@RK&aTlZWuB(RRn0O@bmB$aaf4U)px)2{3S`}PyCMR8YRHP)X_RPBN}33B ze76*=74W|2NPY5i$wV@jZCAta134bjm&{|WJINqLV`1?tgZmJh61u1_ zXAY{;?2(k=)TbSZ%9#{R)s1tb?^QG!mRr9na@=A@Rw11^_w%errYff)e#I|XhU*b_ zOFWy;gS{tvN!!4UUjJPF=J_#-n2_bU#M_2x(s`8m1zES9JGp84xv-Em*%%O5)t z(4|M!c?L+1+^(SjXCTEiH~@zpjaGf-Dxhg4RtS3AhU$C`V66KYQx@QlS^kS3;I0fX zT?UK+rrR+W#zSFqTOK*w9KRMCxXzB65lS$M=^}if7?bfW@H&@#89)D(1L3Nu=2in3cCDf zph%oUita*z=H(GjnXE~zR?d&}Lfr>w%`R}I_O$>d(IZbl_dP=^Z>+4`eZN{g_le5E zA94e$GXI%Ar&{gD01+1y#Pwv7b7Crxfn-i}Boc9tlCNIioPD=h%fg_{s{V3r0ZlFy ztKr}Fxnc$TWk#>C4Iqs4ws!W4ql0%#7y)YI)9BWSxpk#R{@J+@8QZ906;2XX_Y8lo zwYsYD@yI<7@Nq)50{{B)ja)tMkNL z97Iuz!6zu?BC@^Ahf=W`Z*-trl!inZi=y82Ev7zc?}93v)GP9z#M)mq*;n_+zu1ESH54BobDG&H8a!=-8)pqobpDRfPRP3!F4aGdq{dWy^5FcWp2X=0_24nFjM`ceN^E|H;_5$WvLx zf1$;1#qKN>(jj!D`Y?^!mF$byqa|k!EaD=frT~hhsifbbC;qWI5ZiE?;X()QCo8j& zW~ue4se{b*eL_r1I=obkp7iEtKkg_c79JEPwYRPgxX~x8@Sxwvc02zIyF%CjCPUDXzeZJDh0!#bUYs!TFznaYUD>ezsb5>D|RMaiQzvF%B7 z3uer@mlXO~LjQpWp$GKeP8@QKyfuaicNi5O%~eS(1aFR*;F0R6dnG>8sx~BEJM>HIn`Zm ziF}bs%D~WWB36>)Y>&;-_oVyrA<71$XQqd1$S3AxQ3S{U&5MdjB7geWh1Nc*v*YNU z5JL%HHBXxPMXB2naiVr0IaVjo4CBvH_R^}8!biI3fUxc!QdjJ7%p5pIlka;5lYhpxW0T)$ZU46} z`F9j*J#pYmy_*c0InMT(VOsmY6ihpp+HEIcRC_iy->|3_NO_2-=cXilf>mMO<=h%^ z9zrs8hxBfGbXnB>Km1|rQavk#(s0$e+%(`;0RYuYT$E5@e`$*QcOYC2Hv>iV{* zTKdZC)tg(I|8{C{;6dq?Z|yQbcG3?ITEnkf7%q;zLeX~9c0`zjk&PFty*DB1;U7tS zwF&_TjBw$tw2nKB>0Aw~sJdIGr<5mG0JeO5@JB{pPOvK^%!Wm4#a97V5T2>b6J{Pr zG1K_24|R|5I~z2eGCn?;bO#G%7NOhqK6nyA3oBZgta1}i= z4QfG;;NGFDqYQW|)+%_}wx({kX_^~?)1Li;7LUjj4Y-i8OCEbu%|&BPc~y6ze@oDO zSLncokJo&mRdo(?5j1ABZmsule%jDYTR&R6(%$BrLXb;2=et*tpbb2h<{TtGY)d-+ zKE>d>ILN3IPeDx364Ky3s(Z9VeU!`HY!a3ea}6*g_;7B^b-(PVwF1oGD%G$!abxq@ z8`b&gplyk=F}*UVWgF6GZqXziSDM)Dr|s|ao9T9(?oc)AL)yrOnCkUfQNxVgA{)~> zGNbo7>UzTBA;Y4WGMf=09+wLkpM99h4_L+G#g9G(S!B{}DC2PFGGxIAlWP(kiFCDK zJVuVli1V1%>R!1^LEB?bUw01$p-8BbV!SQZmgY?I8Rp;jP~5jiGY2RoNNnd;&q{B% z<^qKUA6r|Ty1$wBnBO&2Pn=)5wyS@8|CVv+vTAAnZIj34<=NZ5t20s{;nA5Zq#?gHeR53&4HnzoL==I2CxCPe_&`P=&B@-|H7-eL?RdoI{wE4l>uE zRbL`Q1=k;wp_0dfy9*6~4*bfSkiLyFz~FM}+XUelYBh9plEEkXcow724lj}T2V>XZ z8m!wMASfg<$Z>F#*C#-S%Y>ctPL^}s{VVxC}fK_%~^2=&Rha!on|L;!BE1V<47Vtm;P z2uE|J(U7$pVPFw|6mR2spJ9JW*SlZ|BN}>lD$dbC!_?_QkRB67 z&p|d8)0HmqA~)VD5wm)K|Iq;a z=VOh&{*#~^{gXn~j2$>+qrvB!(F2vxiV&VF9A)s!-*^iwI0a?!O>7?)bW9YG5x{Fk z;oe>$b1wpOYaF(KObuU+uB%fPE7;7L*AEE#EGh>&!og<&#}I`M`~Oah#5wyB-s=rA21aHPC3#b_Qz^Br#e1W@$9#T* z*h-ebDxO0gbAMk)Md+#>)WWFOh??581qt`K|;D9+&h7=(rhCC!-=Y0h-0p=b{1tTZjsS=($lu36-A+?UIWSzy2*x*x5T25Os z6fHUhk^DfJ=h5`#B#vk3v@^73V%e_tB*<8E! zcPGuSBO|3HA+x@=%EY}MxWdK zz!!qD+aq(XGYNh4)pyS`he~_GrJX(AjD7P3q(#m5EM4=KbZox z>LUlt?eX!tmY1SoI^B2eM$}GZnJ`3ERfg)vcu%98gU$KfTc*0adM(CO8-d5Sn0XFFez9$UQWzy+lh+g7}-lVksea z1VAh=~UcarZWp2;_exaEZzfl;mQqG2DGOS zV+{1OkW#p1D|z+u7@^v9h5b)@UPzOi_8mi5F2I}l&s9Cq^mFpxza6!ra#bo@J+Pc( zh5id(G{UX=p78C9b@LMNENhV~4Msn%jp@f$WRRV6k^cQNVh!m_urIb>(w}C`?d>(i zSyFkjf}3~mW-Q1K;=p4EuXgEOYxfdL;G}{>jCeS$d2(9H{6njA$^<4B6VO3Vg)VQU zQJp@flOs+*(iEvft-E-u-rzdp?(<#S^U zA?=`Lz*1GHd~mHiz3oSCf6(~r znr)pCaDo!6TzIQIXQ+cP*GJIOLs0yPP}HE$vw)?r0ToJul40^$>$I7%Ax|gXY@g6; zPwz&)+b6gkZuss&J;^RC6xjfq&{`EOOk$uzwO1CUdktFg@Gl6%^Lr0dvJT3%HG3h$ zJ(|nj?SnHH*7eDfJ^+RP61Ez~J7N+d+H0DaB?vtRC(oHi|eqg}`=mQZSI+U2o69z-3*1^jyIMk&`G zI75FN@!&X&;}!tw)HMmp`Ki4jvUBgF4VKVzV|%VDuD%sHJD@9%L_1bFvaLS~Uk`~1 zKA)PU=GaoGC&N;nq)6DmJ-S_oBs*oo{laRp9UdtOA}%gEJ#Ts%_h?0PxMB?*9jlx_ zG~F|!u5a>evir#C0(;$GYxoXq-@QZmHE-8*uOz`oKX?lT+-1RHghfg|m~_rkcR}n; zb=umKxEB)DMfK-B-_!%G2o%(X-EXLf{i$Sn78woSZ=UyZvJFw)TfPocDusgDZlxy%wkIrQLUOK70MQFE>AH@HY|j4qXsCo{c3Z z$~_FIxUcQ!gf_|b@WNC}KfIEM(RoJ%nji~K;QR)8UQeU= I+@)Lp1JH<>2><{9 literal 23712 zcmdSAc|4Tu+dtl}vb8J1U6L%N$ZiNl_ML2_vXwPt8(UG_5<&VWGF8{-=X(M4}e!R%nTjCKl|PFR226WbzGbUzZ|kt&{WvBuQ-Zv>(OEG z`>|*DP2BhGW2uLJ_BXkptoQ9R7gN2fVBkG4H%yJ?=t*2%*rs_GyHp4WF9s2e?Dd(- zy(L^vlldyJ%~94#Hb8B5HY&jrW0b&QT-zw8xR?&d4Z}^$HkK?c zH`Z(Gno6iW`rKRfgG~XJ!w;%_S8rf$DvA`6;%qZ(sx3)n-{NWlfFGGnh4m73+aYWh zE?qFB1&X`O$yYHH>IuyXw+7zJ+H9k|eb<)9XLW1#!_9n6{KWg2Ma1NnV1^pP(dKvr zCAVP2Z)<#%)MaGTT69KPMR{>MYU3yadgR9Z)>b&Xu$ZDq7HOri;&l$bC&g>0&cghr zzrz@LJ#=)dUi@O0B7W4-II7OvvESKhu*jq(z%e_iLC=Aq7D?dBpMc%G5O`G^XApY_pchsb(MIN14>P5obe$HZ+F5fv@C^1VwlT~z0Pt`H!6}kFNH*Y z-xQJ5VvxZqJb-z`*Bf1jlL+jmOjdr>;&{LiV#e5Cvw5UD1$^ue3O_}t@1XU{2$ zq$9Un@J9XtyV^(egex|CVQlC2yK2>a#AZH7L6ARI>K$!QoCBu)sNW0FImp?gV#&*l zOqr)~X3>e06XfO~ixRy{7;$hkq;iLLSktb1U--`wlYUu6snFl-PI;G~j5!NfPZ+|= zMLthI1LRE435KgwK6|J_T|PnwGLm}ZssP*j;=3)^&L!s?L_PBtxs<5i>6viGfAtRs z$vEdYqm=;n*w*Ev%~^<;rG$=_F~Ne8gkI^zE`MiuT}$}ecXRo6IJ8!30apU==tDtO zJYt5}>Tp&rNclbsA$F)P(9-D3d$j$C>|#m5owzSWBawBo3&MfxxlEq()?<%Xi{(=a zkdmu5sX*+p<_JXUH-=+H7PzS)CTw+59!DqgLB)%}2ud);qvUkxj!x8xAOuR~r~-_@ z^XelP`J`e=I;lRCb#kZB4a+c{S?M6?$AZ=V3v~^h{rz1^9$)xtKcCsJYCzUdrKz(! zPixWEVm-IDy+>?dz%*OQoLUacY(Hz@wK|lsns#7KnVECw3NWd@n8pl;znZv%PaX;2 zVXVg+1t81s#R^FQjnTUgOf1KaRKBvdfSKIg`9)S)%(+)I!OJ-@-uq}Bb5vMFQ6wK( zkRjCClxbLvJsxv!!bCUmolw5lbVn*r@8!$^-M60FMVxl2x{4yXqz!(D7n`GznB$th zt?~BnTbey>3@hf;9%aaf552l;G%=m6d_RQXP@Y6H-f?*Ey)JhC&g5gkDz8LcZ8FFP zSeKD0kW!2Yv5f5#`Qf^G#1!Jmi!Vyg&w=|(6-f5utjHj=gsq=Q=!9d`$ci2K&^C85gAWZ5g(kIM4|dNNn%hsWvm7aNt@YfCzf3I}X z(G4$COW`7u&`(ABYHWH=Be#kVnhymK#Ce2nJi2s6kZgfRco0X~_&&nDTfS1=<9Nso z;*@3JGEcwGW+nAYfZuBsv&FP?>#R(|l8Uw%%rxcnTcuz!`Lt1IpO7;Cdzh>yY&@Vb zi_0ITXuDhkzj=o0>Z69KMOq%)MEp3p`Xqb_@yhxh-nCLT1LEAl5$ zJ>v+NVo5e>MlM-lp`S^y1cgk+caCc5FG!h#U$`8KK206JRGN*PAeXmt-#F_kFbn|J zaYpCP@m|R!tJYTg6_=GHl)vvbRX3^bY^NCeM4ybY0IrM-4ZYvAtpUyNQ(RW~>U3T0 zmDTolOGj$H9&N5hRQN`fxm)&X8)?`0jsdR^%7{p|F8qN^qpr1@_ePS}x8luXE0bG~&J`kLC~*s@2wUF(CH{r;xDAN4!{?4OA`7=B3?M=PgL6 zLx7$U?Q3>vLuQ@Q1!wGC9T(8Q-dmbV`naGLwl>E%kaUW{bLC0Vxq; z4z<0*MPBy`)jrh+JjgX$Two>@TYL5-`%>me5$&%$ys2A7^}#TBV76;xRlyHd-}`zs z;w{%`>YZGs>z_@{M!B9I0vgldd~UB_`8g^%pX5(yFm)I@4{{-GVpTNo;}=ZO-+dhD@j&YXy&d@^=;=WB2YNZs_5J(Hpz+D^`OZ?p zDdhrboLsvqaoTCybD(Hv<(8Ysjzm~rB$p3T0sZ)bu*D{&PFUS8U%_e79h;|cxZmP< z_OPIXdVy*%!Wxt!U(u62+a+Cm8yYp%`)~Jh--U@N0@kv;4tJ;4vVFTnOl$tzM@4+j-Z5pPKfPRb`y>k z8oB#4oz!Q~#&*?*X-N#!)v;T=-=yRchkiChAy5g5)))M%0>Az7RPZ+Sx{Tfp&kk(T zQtU)IsKO)ke7;H;$0YZ64=ce4>W@xYWg|q?Iq_9`gU&tE2h8`rmFKQdwORBnpNWVcX$8$Ky^P{}cOLRzlsMIuq2oDTo$^ETW~ z%q@fv9?6?}JuYZz_sa(?4sRj!yUG{krlvxj(nu3hqh7a1`$)1G@;N&uM8)Qz2+`DX z6o^8UqDh^kbvIh0?bi)-`3>0bOnGda>e6Pi4QEc{1lCi<*hD%DJ`$(IySc{7PmX8Q zPAXw-Ur@Ei}Hk0k7w(&aJ7OK#H#2vbovMhj-#gdfX{T4oDAU zAL7*PUm4q+N6QP4$0yX}P_0nQ+cbmS>B2aU=1qi3uNGbpAuXYQVZUL=%E#U8s0YDC ziQRJh)L}59gMd3?-dQl`o>za(DKZA3R57dA@Jo&8LH$*S1f(reEkp*J7Wn zx(6|y{`N+w=8109m6k#??74)I))fQgPrNgc9yyX5aP8dX0cqkvMAto;xZ{}OsHA7A zn3{kcCSg+o54hI&A|vAxH$2i+p#J&d4QV;%9P`x0!_POphHqhdVao%)X3M&Tfz8j+ zav0`pKGVe!zIDtQsI98|eCq}}G@#wiLKN;Neh|2CAKf4ukB$=xWJ$=#3`Ja-G{<}T zjC65)i|LQK_t~2NCLD!Q>C)K#IxEk)Bfl2Y{`#J=gq9lzGl7R+MeBU?m>>=5&1_TB z+j@HO!Cfxk8_F%aU(y5?{rYw8wJK@tj>+cF@o+A3^bh6gvt6^NH$AyG>%YF_T=WsU zD%~jcAlku#4B9Cs?b`?= z*q*lqQHZeiD6XkaYYAw!RNH}rJqYU-0C9HmTbIJWOk_+5^9Blo9fPD13cZMx{w_Lu zfbXWi{tWm{0e{RW{i#d8Ct5Do>1jtMNG^nATL4s;`=JJ;0u)gwen7#C-kd~0OVoAe zuMNX2@KXDKP?_?#zpN)Y5rw9A@zj7)<-CIVk+o-F-!a7(VS?nIv^Cn&5(E1&iUcii zW0}4Y9%m>6#HUkbPubWE7G>|Sk(npWz~Np|?=SUKg3CYc zi5$jEDd1Ix=8@g{;T)p^jvgC`oTV3PX|8rveO=W7izprK6W~CtpT64c`qB#YdL471 z6_Z7|Ws_Kenxe#<4?GF-cgsVKwS5Y@c<+KMokDC4LJZHtTe;(_9oMyZ=P9?6UxEu% zl7p0Af2h+53zT?|*znm~p$i6`9P#=3Cn_YQ%rH!O@Fy%1l$?)OAKs6YA+W zeg9w6U!zDz9OOs{ne-9!7ASU;>^qvAOi&UPj)NE@{|=WaKeUDU9q363C-Qn(T=@0F zAZddm>MnwJy3iZbCm(~q2=i5k%gd1D1hKH(u567hYFy-m~1}f||u$(0lim{=bj%zjg{))zT2}($TO1DJ1e)>iM^0~d0o%)kbMj&M6E(kg6%TkDy_?iIE8vlTu zJ3NoJ2Yu7zfSuDOvmKJ&QXAgmL%(!x-~9G;){7}syyd&(00|)UhP2u5YEdW+^A|vP zY24uMsf{LTo0eOxq7&Jhqzu;YzYfJaV+sp=vnp<3y$Fn&QGevKVeKH(SU5Sa&LB)Q z8{sX$H|3kuxHY7>%Oa9Oo&cXI<$9IdI zXdeoY1Zq|`kf6LcO3s%5B$i@M@pzQ_q{rUKbl{kb)#iRe_vZ7C_-}c4=%D4P49b!b zGTe07xQ!OjwOiqFG%xe#27+9R8=a?a*g=-&ciHK(w+ zrudHrl=v@z6mDtJx8@kp^5uE_|B%fvzm zGf$_Hm_36(W0dqbn;+~Rg!R9N6aL9rFmj<9x^s=|M7`rTa;eQx=R2@cc?>%~u2J$k z2=|=3FqL9Y*GH%oI`O!Ha{mX~#C0T9uzWk(CHtd)-T<5Zl(P_1qqsVb2-~*D%x(a}s-cx{Ec^ug^SH#-+S@evtbL9nID} zL*K878NocRPz>7N%u<-s;XfVEgK9a@!agj^>Z|D)cOg+aGj-aQD*BU{e_`pJ(9n^y#8;(Q|2s#DYqwEoIvy|`(e17dmoxSAg zs~}<)a*MX&DYDSI4Cb*2R=|EbYUuYMuM+hUsen&lOYVoJRXgg ziV6Jb=~ZlR{cn8;9dpqdC@&fbFW#)ZM}MbmsHZ9aH&60S2xa_40GsL5p$(64E1u-k zZm0X21lxAv^Vz$fZ;hxA-ZIYYmAXPZKS3f5CkLq{F;_~^E%Xx4K*Q^>11CLO=uGD1 z76SPyjJArf?NRcDI?`7>(zK{n>+KN&QRZP2UZRJstvOrJ+y@>fdp*9cM4DTETHOj>x)zMM;j=@k=piyPqx3@{ z#EA$e$Vqq@4fqRa}s&$kF`&1waWXtd5Ige}!J$*9VtA2$oX| zr?ysBb#7GD1Y=C-_I5-UV_|-NT&C{3L83Z}ohj95&ZtgthP_E3f95)Jfq+sr%H-&@Ip>0R?7+)wQywulQ%muzV0mb z!$l&~&V&gO+1F38KWtr_<^pHMw0?0PBk+_a2iw)g5w!(?2cvDVG+11(4{XSe{2kL8fg~b4|03P%T@xXP{tHMFiqj-r`Xd+soLyR?}JWbvI%?I0oTTRQ?bfex~ zDsizAy$)mrY;@E`J$yw$ia1D&jcj#&-tKzwwSvItfeDhc?Sy}@_1axRkUM2ih=G13 zi01Iqfb{!AG*6of0}2QGd3G#fXVfE7yZ}D)E!3!!LoKw4h*J4>J8xP|*Fk`9ZR`l* z!VG0y+g=B=6#PJS1L0~X3%-6mP~Yi8wmq)bpjfd^Weu`_U(S?IW}ZXRLlfru3U5@Ul*O$=uYv!$@8fH(!J47 z^=XAXb%P#j_XIY110g4xu$Em}|map>X{tnGkI;V zpRljwg9UOg5Y|%!t89LwB&ctC-1X0boGp(o!Vg{`p9GcUk>8#c5h5MB$IU`=pY1$C z8}h$3i+#x=x$@F83nWS^?KE(-IT(T19PQC($3aQQlb&aJqBIpyx^vL2_Xt(yH~JV{ z!|aU+P5cm3pDrkx&lB7?grEc>XYFD9O-zJbi|Cyk@uSKZ7-7)lMnw?c8@ZuhZ(+#$ zgCrq#ZjKF~anHwFus`y09bLIV=jKU~53f$E%vFXdI&S_ zS(4FRIlUPR2FY40PL4U*NP_mr`f7kbjAmxk5c=>YP$p8+qYf+VCiWLqX37Z^*?9YE zr@v3rYQhp}kABu7^RnyG*3!-ZM-#stm3WEh*p#|mC-v*7#B!gGFn<9u&*oJw6WVS^ z6~v@@-gIr^b|`Bfk+IP~2bpA&SQ+m_1>--3`zt;A9ZF!mreq7JUt ztvV=)oh?-=Pj=Fk3rG)*t3geOFF>&|eZTxpYFj3dR0_X^wqrlgWPWVUBvalB6Ysm- ztlvKNLCQSa^=^-DK5=|aH|m63XzRa4VKXv_*;6xS`lxCbzZoIxp?o-9Ki$s7d;F*QEe%Rg4+#h`XHqX^JI@CGC@2> zI@F`@GMkzrPMv!9CE`L83K@vIFN5oVLX3-OHvG$ir{gF>xNNk0>i`%d`s#JV0zvde8) z`6Jvy|8VZ_vL0C`%lsMb&+}5#ETlgC!W;krj71D^)T;O09KM!`sCDS@!gcn!-c(Fp zeK6Ul5o+z{*~#OQ!U5x2Dndwf6T;UGKXP5t7x@aXqjK9~BAy*oNb$Gl8M%4Q+3wRt z-!@k(z1){$PovV&8{@3`@HYAzN)as@D3Ra8S#(v>;oj#e2R}c*kMH=SiYgNQMZ>(NQJLKt2MxER29A(LXFWXNSiG?VMz;H{1AH}(( zwi>~D($*u#?4N$Ew-fM%4(Ym4H@{B0SNdIMrl$|+9vYi z&-GhVFe`GdAp<6b0kYx2pjql;;NI<8C%Vg+=sVTBd_Tw8x(&L ze}t!BcYe86Ir(#ZFqBB7_z5~|`jjHl%k|##=@C;|ufOl2@PjSCY2*_fRI@7&kB#@* z)5<^kc}0xd;C1@#NBqhecyfS43+s2H zX!)E6H`7uH06ObeC+GK(6Nz9)L-0xr(Mogub`J$O1KzO?u@h}uIs)5pZY&@0&9kev zP{tsMM>h~{wop`8uAOyays%I1cLdp#dW%}9Hkax%ZueAQ$7PNU2buUqi|mWO`cC6V zC2R{<6b8`s8cRuwvw1}N(7p+wCBC{f>sN;1u3y;GM%|h4nGid=e#m)%zr_lrz3nd+1I^F$p>$jjV!`@3ZL)7#&i=H1r+a(WU>_|q z1Pc8WU>-ll-{wt|K3spUFM-=-Zlwp*K&7CSuJch9ftK|_>zPcGum`U*$ zHqCCzLb3U7s?b6rc3^cjxWFc+z?y!a%8{$LSqy2P(&sC5ONNqHq^aeDit_|#{M4K# z$9m*~EtEME-X-&U{opc((OQcfQsdQB3dT*@WVQpI4rt=yWYBpy=HX!3DRc0=7KAPK zI#tsl7&E_VrKAL)~F9_{@qBRS0-3Sc-2=epNOQkSj4Lw+3$d|zkKV$iE@lS~0 z6e1-Zjx|P=J-54g<`!fYAKWK|s zwPs8DL{D#CbZ*O_^5{qHCBw=P8zMSCJV=1yK|=XDla;j%uI_Q^&V!{4;eh}|(OsI5 z=ZVsr`ym3re?h=^zVf+JYF62^1=`D~i|-zWt$+VuYT0XW!GXi5psPCLboKQsdKxuB&c zasfe?thd&R?JQ~0q`__@VL#k``nU&c-FR0@PWdAxicGeAU^WAnYVPAfIVdIHXNg}x zj)UbJiv{o~pue3`BbaGgf3b+O%Bd(I!Fl_yCwmLd_VfY#jlIC*FED>5as(hrFXAjh zEwlD=tBNsGy@h7RssWdw#P=)6xc;#u1mcx{T{$wYL))a)xnKwVez$Au9~!CwtIu52 zgAi7R+Mm#=q)++K0hphyZ(BKLvGEvMDDBklV%O_XR_?`}D<}z5V8Ur-olWeE^XO+5 zqp8HXj60aPG)oh+>MqA$=Xg;P0)X|y@{Q(Zu*~dG>RSR-<%Z*f%lNP8OAUVJi2Dd{ zArDu%PkWcQ9gn_HV9dI^L71l0=pG|y=RsNCc%t?lxGkkUbJumW%Y=jm&$RWygNj?9 z+PyhV*MF{12Wu?AXHWPDH_Op1|ZPTSMy8Pn|GXvMC=~?_VJ#*#o%9lD&E)i9eq78f< z{#<09?xLB1c>4@IPLD7@c8RDoQHPn1Q%7p|y$67adeM?|jC-RuE-En4-tik5nRXIa zlEJWLB4rdF8EDJ6CvX50OmpCItasBXf;zj2ns72jjaf95LxU&{>OJuacvwCg)5~(H zp^K=d&@RyTWg>-c^0q!$R3N@h@C#6uyH`I5?x%Eg55vyLm)vOHQr_I(BF#cgOpqVp z_T=WWhaOgw#@w(s!u>)fX7BICf%{gIk1{`8Q3H>D4g2k?1F%v&LKIG!iU7+Gw$Dx+ zt|jN4t+G%O&wXyUG=D)P*mag7?2~Ycz|k`tWQ`KUPDz6W5p1eZ+0xIBEU4JSXY~(? zn+I2H#UVf$jU1VcrF<>r^?*?~j?<+0L%`KcxR$<)KVMzi`auoE zssF0Gq8~Fs6wGN5$1Ti6^od_D+OI-zNe_^=kLc=P#YWhV~85OXvg95sTR) zZM*T^lHSVbF{+9GjkNU2gHW~<)$9A_rrE)Hr(b)oa=#NLJ;-6sEW%k*z4yU3Se$xJsdi(veY_-I$ zPmc@pN)|M6Y@r{iW+~IcQg&rZ>cYg;g51@VfDQaeqz-JDC)*h1!73(F7CKXXIEwuN z{#S98MU9)|F5z`gq{Qv6zH!G-d&AttVe+f*Cxj!sralo0h}m!*};ypQkJADIofxK&L5K zX$8n|uOvGQ9%kUlR+(kJ$=sbcaOTYbQU6A9FYf6EspfQ`b18!N(Bry4+v>TTIV%li zTmKm=aIK!b;}$4sMF%A~k%QSQ>y5W4I?$0>IG7ty!e>;1e(hRIcwowNUcdT(G0%o4s?}}v%rR6Q$0|@emp(ix&z*vRr zj`&i*x}gaY@2|&TEk(y8@Ri`b*Cf)7po7oiA2T=&lFP#xm+3|%oQ@d2?ynFn;d6Wj zvL_M~dbO=qeKG2l$3q{UD#XT2kL#t|ZwN;khMU-vd~(`|bKfr9ndYyF0MuqKMQ?xO zV&_FKy_?s1Ob8EbycDIgTYjEA;>3kjXowC{PAYYu7KtwCXcj?1T7 zl9dZGR>Aoz0?|2ZS-Y!ePkx;%G$dy%l>v7Y_1~I_+OI?%uVC0*I6E)%HNvN{?}zJ? zR~)jszZ}A3@++YX9V_7G1sC>~XW*&4j}a(97Mr|Pxb)j?;O(ZW68?KfsD9^j1J}LP zob(pYY?|c9Zy>gr*vl|>pPwX?tK8NHtu_&ArE9hDwsIM0cM|l0WkKUIebWW^O0aqf z0grrKxRKHoE0RLwNJPv_Np>eTDRfX?N46~MLrV-_=@Dhxeyg9>!Xe`~`KGx4xAAth zFY8!W7NSwyZIm7B!do?8uUavkPOwtv84Ho?=iX{Ep;f@jK?t!Be!&kUg1`@W8U?W- zgxbAZ-+m{c{cBy@qz&N1+LIa3UE!yD$C1s$I4?Q|PeQExpYiiw@tyn*VVuNl^5R8{ zdQWE>RNO+R>W%UAY3u&80&ETBgW!_zqngz83vSbayocQX4r-gaWtl(~nk&~(8_qIs zl^;CL1c%PpqlhoI84M^VyB}NqWZ?>pn-yrxf#WK_ua}rR^8aFf5>dgh0i`~KwaK%! zd;H%XiHKDA^06G3tt-$;tmc>;!S_(E**>8K8grjqwa1{?{2zW-r^O9_Ng4n;@@5 zCPRBIu|X)>(hLC05wyMPU}61C%;6|R%TdCY>?NDdTKKMR?&`0;Z3dOGj|D6Hvm-Wb zp2+ZkTZVT9tKNKNpAHttPtIle ze$m9r|Gww^etPh+Xv6E8xpfg^=cgZ773s~3eKq77)2j09ad|mSU!Xa1lRFyv_uyu1o>Kv zbgHiPnu7$ct^nIR{QNg|Av}K8cd(hBPGv0?M3>kYABQ$F6aj0AZh-Rnv0{-bupzM8 zVWL>gN&6z*rtrn++{d?45Y({){$R+AN)QE-?zuM6=9!(D>B|B-kz`}MPT`Ls*8%Tf z6E@s=K>AHPu{weyyJV&C+cU`ud=YY?IBE_&D&09q*?Z%`{9Gp6cCu6@D&Rr~#b>*m zMSHlhgR5G^-oN^nnj#Ci>Z1uEc-IPT-Mj62f#axl{$GPDqLbKOLW zD4D4_`|Yz-KC<5hm!dM)IwmK(SK-iP1={=0fnO|=DJOmv5Yx|r| zKW3p@QvpeI^G37$soq7t-d6;Q=c*}H5->2oxE7+{8P__(HAvJ?0=O(WDj=sp>eIt5 zO00uadQ`%0iH7$94 zqkcW$$#f_&{N53y#$%@2rPUU{y2xljNEJV_JL9%>^uM;RkqNS zIZPqx*G!r851S9(-lyc=%|5&jgE~+RIZ$_8(g@*t3s`9??Vq*A3_QYlP6UT0JinO; ze^Us(&(jn?RCyIHcn>$jB*C`gwt-oEnZn7r+y`|*yMazvRiQegW@1{{Jl`7s3W};? zn)Fx3;WU`7Mcl}>7PfpzSBdbB+^%(^?jqmItO=1mDIKZ-->x_odFUcs=K zzcY?{r}U|>Wb4;NRlWoKfl*5KxcK8@_XbPYeb@az^4uxYBJuf+0qtJuTl(bnS@uK( zA=ao-yS4?H=G3E(sq>j7XEX4#q-5O^pjEbql5bI&2{V<*IP&!@Msaa%i!$$eqv^gr zCqgEXauI6$93$bgP~KUhIv)ZMcee)Xd?*YFa`l=c)A`e0oS2nrhPi6Za|J6?<>q)B z(V_L9VyTQu9Jvn)gqkwNiaucw&Cz)(u&Sv|MDy$LXXCbbuoV6FG0Pr5Ue+jIY!4oe zFu7WrDj}~s9%8jPP(h-Yw14CRoZlb{H=UQfiiAv)@5Ii;8;xutzPylvi)n;&IOWyz z0B@Fx^e~-f&q}W6@-^koa(Jqn{`|=-v2@jWa>+f~;~BKm#u=osNz+c=+}!rV?e>>M z0^9j~(GOqUjeT%J=hNAm@JiP~bXADi@FqH5(>OoD`?tcwuiUQle!aHNLhbeQxn&iB ze8t<@d6=}R32l1|f%4$ahv65ot@TRi*x;=^1I-(zk}BCFKh+HrwH};3hM4CWCJJvG%Au<-s+~j zY=_*7J5)8;#&UXEAX(QX(^@#on7by%f9}md*kYm}A(M2Du%xOl_w>!50|L9a2lg0+ zfG%(WT^`;dGV=YbyU%>>pZm$l$YpT>C@)-3>q64u^5Z3Ci2BTK`&SDyZYT@$iRU+= zyDE51f?2MOdLC9D*{;Rs+mN<;#BT6454UX1*Wl*m7{_e-LjmN;2$Bt8xo*-C$%1g) zYsrXC02~xV&zgPjp=8grH9gf#362PV)GB&z{H}YSpL#}Nt1$maZu7{PUaVcSax#nZ zq;-vS!((STPK}Iu8RW}}Z_ucFb!jp#ey+64T#jCOxi#aq+E=o=C!zM^Klbzl(`LlM3*m zc?GupX(Uza_R51faPncVp(&Zw4=YFPpQpHHBN%6cBHH!Yu9I%|NQtjpEF=TcDmmb6 zvC5d$CxUnq>&VW;ru;go9032D?y!=@>bIaCQcXM>>lh-#U6bSf=*jpQ#&)wzu^S}` zduBl%F5E=4Te$-l}@@%ahkXNP~9 zwZW2Cfy=;~XyZHy7fg_#P|n0jSbuzX?09!$kdoqr=k)oSXd1 z!arc$>oD1WXHCCus9I_L*_H!jB_!pAL_sV(yb-UXmz!TnRD=TqbG9TU;h}&af{|_@}zA zaMR;ft0^|_NS~XDM?6>SVhqRMMk)=khq4_l`o8iwDis_Bi5JD@bt{4N-pLT}_qjAP zn2RI9vYG5E0t9gmuv$;5($~HKj@b@+3(x*?M)Je<BOyb>I8>7Cp583 zRdzlZU&mead<9BRJ3a`1UkBe~c1uehAlv11TG9OOg0yDd;E(_0#ven@ zhNo~A{88A=yNnQwKbl|V83@Ejm3G)GcQ%oH4~Id^z0%WanFyeZs{^_5YU6Bv!QTwY zXCH@Pw#qn1@im^)J=@|*B~QuTr&XKQ@_32a;{^sT#qJ|bq}2!o2n{!~iHyD1#wEr= zu!EiAxfC(jSwvcG5bF?O5}W4$iP4@i5?Z}%n0 zUWQ;o+~9cH&?@Pz=~-ZUtu9#sw5`iP5}t`JP=?_EqN4!U zH_x$566@AKcgh1OK9KtVJHP)wjDzk7XvYc3emmcUvGZND(SVuNXL&04_Ayaozp3NU zX#UFcf7MUnb$V{H)%A`}TM@I+q7>=l$2RNOEZ_P{_v4g--ntKr`ThYV+K|g*L3?>V z*V*y#eqKG0#xl0EETc3pbz{JLMaf-CJ6>-If;a8RYK7 zYBSWc#n0C{rZo6fNX~AsiMkw{=2((X*geyIQO1xt8TJZFC?&CRR z3h7RHoIHu|e4N2vmxV*%&nVwx?Mabj;9#qdw-ah?c6cI<%SJ^3Rqj=!)z_fTZAGeyRZIA90HF(|CSIG?3WXJ-Xjo@?8$zUOU) zCY}&(#PufCSHqX%_bZ*}F}Al&3!iOeXmV6k2#1i-@G|z&l|3v)!-bKnlbn`phrZam z!2Jn~gXl_{Oj`Lj=M*nSa-qjLXaT&&YT-+L=6Guio2IVsDx&#H6=l zc>Hg18>Ai5A!&@lF6h*<5?3Kz;idM!!QnA_KzR~eS_I4F>a%Swkbb;!2}}P^Z9tD7 zu@CT|O!X6IBtNzk!bwObr>4zW{ye~bb%LgC}BM(0S#PfzKyPM&2KO0Q7L_uo;EzCgJ<$Yu3Q0C(Sj^)Roa(<#L zyPIpTHQ@hnIIujYD?-&-7O%+_6Cuy}wndO%D_Y5fYQ%i@ZLAzE9}TUV7sEWoaH%CG z>`s{!uYzU#687O`17VMc?kyLdaxkCOa>23ir{-_H!DM;3-(SV@Q(K0Oeg{L|yMishX@Qzp6a@4SUF(bZMWwFvLQV5L_5O zXJV-=-tiUFp)}CS8D=5?F{p#l-{rONNFZ&X$06Ax9WGq7UKhgrGe)VJ%_sQmBWT9N z_=Q+Z$+Vpy&?_A1kxI4+oT*$YH^rZI;pM+tWfu`XE1hMA-`7HpIi6R)iC8F9hFT?b zQT!*s-jGZgbrjH5dVd>(3 z`5>F~4-QI=B}8>3^6azI3ZRo~zOL`Ge#Q{&*lqJK0(B2$;B-M<>h&_+kGqHlL3957 z|0d2lO;1}~2HgYD3eo3euf+xoq)!;Q;Vz{h<)u~812pjEAj?9i{%607Pc?S&es1a? zM)f}9S4wT((Y!kT%lcfv?Aqh;oCJT5JtbL=`ZJ#DVXWOE&#U`Px&&u^RBoCsoqgEn zCveg0|FkXgx_-HemxYixX)&xEs3W} zU*W3B>?|x2h2UA4U(}=p;tiwn*91gyzmb;GZ(kKr@z2wR_$y57uOd)q$@f;LlElw$ zn?8fNN7pmX$Y$O0c8I(Pw_7?XW@xcaADqVuVr1ioCjuY1*0AOhxRbzE*KN>dt$rA> zf|xZ9pexO<>mHT8H9BG(ext_Im#CAGe+b1vV4>Dxh~~9m)zwtaQk>=Q-9}G+@o+b> ztB(5;E_UI+aTFW{GcW{PJ9$!|=Ty1n`efs>CRz>>m*i|V?yrMRP9Ngy;$> z6E6*u59=7Qohw}WgALM2E(yN)F**MxA>r!D1aCg~#W-$ASVoRFgd&(F<}OFEE(MbH zFy)6Xp4LYedHCM&xi9No`9em$=<^|eXLUo!DzFbj2FqJc)?|56VXh<$WT!6vK#+KD z*hdIgUabT(Ih+B60_U`U_Oir}Bs43$`KP{&F7$|aJ8k!uWUw|>&1S@M?*9~o;jRKZ zThsDs&GQo!Ox?;7I8UedBRiC})E~j4o2xxq1cthm*@NKP+AjPL8HPP2aM;6JFTfbg zAPhO8a2xGo&=`wU@W(M?bqk)LxUBMGGZe0y`iX010mtM z`>dkj2=#!{Wa#Z1Zh^AN5h}uaA{0UP@X$NvWi;;|COQNWGD%B2mL7GT0mk|re(d}a zJMu(NR$jc=tjblk<+VL&f19?hQ_4jNmZuT15jR05R+X<{C%`c}1@|CM~wY#x2Ck1?iz1NKy8h5qOcFE_8C z#rUhuD^FQ+v3Lg6;iLj&#FKZ5>mjXA{h;v_cKFt9TK$(U%_lxjf07V#9gy}C9L(sw zQdS&DTxpPO_Vrxc#=mdh@%?^D3aeCXzC z9lrg-{9~?a)H-8r9^4Jf@*BI}T{3TzD#n1|Z@zNkoOhwbefJDCXd#_3wn9F>EhTV_ zE92Z(JSiXOU*Az+K)h5KyGQ48FD?99s^BnfVx|^@HN`)(mvU)8wF)3!7;3n6<}9R^ zdoY9*fRoB#V4_hPSmPn9ibS(@FeI-|)n~W;%n4XZ6>J`^e)*tH3B)|1CTF@>7A$G)MGn$^ReFVH;r9jmAKcy9#dGl7u!NwwM1TA{_q`3s; zy?*NB^rGbaXa29yM#={UT*bxObt2c-b3uD);bWB#uv>n(w&P!ZT5RKUE-Q$yupK{1qpO0ud--Qh?iJYy>p&+UL?yQ;titZ`_y$^9M*4w&Dg>(e zBm}S0OU6*X3m3Y-{1PF6v65|WEZ#m;uBOO%y+OrzFK`q5&=-G(A8>nQjHm`etwPkn zT@-e%9T05~ZZ1ojZuE|bq^!Hlso!i$abaQ+8feaFXw^>8%k%fPBAI%#ZK(LdBi+(#%5i3W&hksOo z@2iu3rT~X2va~#IU969t&M%T0L5|c=&~T3h_sy1tafOWVW+18wTsssN{#SbEA*i$J zU6gEYrp)jP1|u|l5Bf`EaxF0l1J^HR`P}N)9ZZY?xz-C2vbks$RVwfJK;Cz?z7DtB z74c!TVkT@ljMJU~d${rINjcW^9iAOXa`<9q;s8qeAtLV5DiFiSHrm*Z!0R4+a;nxZ z)EqxCT8~n#sfBmi9|37{kl--vm0ag;qoBI)uD3(Msz3hW=ZlzcNnHtq(P%`24@McU z?wd;w6*)5D&%ElA)U~uTCtDv5i#A;Yb?)1DPfjta9j`dPe^7K}WfZ{IJ??B?FwFBR zUUh_g#NaJJ`rHZIfNTwjqlYj2i?a#3#-(ckvQxpo;pM;OZ2#9m7%hq5yR)^PIH!e# z`A+R6+|p#X{!Ys?2h-&4fMk6x?e=7B4us3Uo}2tNcL%3Ixw5pm&_IywkaIBzDR}8e zBZYV)NUucP`PJp;Hfr5aFhzb(Kl7N8(fm$0Rp~_}hqJmh3Ac6>nt!xTHNHv7W z@}QtdEdsJe1Rf$GKmY@TNFf4qUsA?7ZRgB6^UwVI^78II_xHWO?Q_qa8px;oU6~bo z<}%LZn(3->y^s4V^(x)D=ZR%u{r(`(TPBs#Jt6Ype6On&zX=22;~J#QdmD|ox3ec= zPp4a%`sHyv>?IJg)!e%Vig4ar6$6$8IevOkwa1v3sm; zLl>+Yo1b%q4ioOz+N)B>6CBc&qO1^x&2bvK^>D>mkYb=Ib6};bu~@82aVU91rStW} zuoA5BqCn8)2-41sO0IA>j)>_V)0*!vpiorJ+FbJRZmc^DwU> zUPF@3}!tK~G{cCLaz@%?*WN_d!_`ys8D@#XNTojP6*iEi!qR2oB9J*;) zaC}=mav0%^2sIxUPtw5YQFkGHNz&&fcZp~skV{oAlQD2W>TPh@qf4E3-3R%anFAC^ zIlKK9f%|qNcTaR`qgVXy{*5|rrAe2J=SE#J%QWauEB#`AJrVo;$rE@s>Z^)hyjJU= zdQwHf)+O~=-(fa@5vS_)=h|H+2x^@^2_>t5IS=LkQK+3JZGUp2ixwI$it;ZTwIqLp z-f>sdP%6*ME9WPaFsX=uqPHLED^?lfAiV|wmPol%(s8HDSSZ{LcF#^<^T3-vY& zfsHC=ClUqCBzBI~G>E?Z?2e4F#vp|3>+>dKDM;Ph+)Gw>bv^w#ErE1aG+EVzF23eD zwFgK7f@`YZb`6eeXm_>13jvBt%&wpx2(#xsXInR~ZHtuDua!hXTChw)2teU*tE1qaF{>sEaMea;pxjrJdtPU3M<6n8-RpEul zg9Qw&8%;(gRb0W!enc*&wh%!tFcN3wZ|Y7MyEa#3vFw_yCG|~@?tY_~oLBd}H!KR> zvi`~Shp}oa9ZSQ8YH+lcpem*%0psy=#)@Y~S?QPVB3}b7&iED4-4k=k_g^{whb-;UEg?uTB6M) zRX{E9N*C!npg=S>64*m4KHD3nb!4T=zmqQJ{d_o12cP#ps*21}ZPP>8qQLY7%t3+&{RymdKcu-Nefz`_se)4rwF!{I6bWLHGAjNVG z?`veGQgW8}Il8~BfG9ogp zY)FNI$ho3VxC1!iGR#9?IM^qQ?LZ$O-z7Kva?iT)HCxL$^T=RC1su`FA;0%co_{EX z{{3oXct7!znx+2Y!JaBuF%tDDT<$XK+;Dl$FVc>?p;za0?@qsx0Yb>gRV$+gbQlzW z-REp&4>V0735M&2gfC{?pn&&7ZhBn!8_H8vZweDCC&M1BpkCN!ws_$V9$u5PPT$=A+;=Q=SkVY||EZPs* zp*wmGLQ6Y;E5UDlk<6HlS~_HfG*kM4^2s5K3V$Kw}x*urVzKoFDX$hUIqH8S-gF{`MHVI><(}T1*Bl) z4z9V6z-7XTkWd#`iVh0PhTSHdUCbLy`$62=gUp8(3aY|b^^%5Cvwmg?DeuII5z{`M zyi8|l{9PgjNh4A`kS1=&+V1b=hMU6Egy2@s#pY@XW)`hXBSf7Qqw@X1B&dB!wp6x{ zOt4w353>aOnFzUEk8<@+so-uXBo=!*;~%MoZ20!U+`O G{%zIZ5nOpx>nH90Qou zGLq7w_`{K#0)zqNAQa##V;|I0kV%i3X-e1!S?0mr-M6@1aCZ3IP)dKejJ1K|jNc#4 z_~HvdZL?LU68?kvN^GI=6pID6P6glI8QCR;msgXax_Y zf_-R*GDLpqx&M2$%IDhpW38iJYXFlvDPyi?^QrJ=HTbzd zJjUN~)pTd-2djw5*KnvU7=DZV#$|zK%gS^R-#3lzNFq8}Wy2;%=~GmjRL8W^rVup8 z{k)4zQyrDHm0c<}$kNp{e)ME-p}3so6SXa%W8;Aow$w&1fHgMi%-u_xO+JP%5FUd# z9oLvs@RmZsPe1B=EeaohUFs8~o%2j0tP3taRTwjM;eE4MA5z;TG-_Mfyl0Dx{NlG> za^$~)FO~)xvR>ygJ|)!E;78^VIUq-9-D+9$Z;g z`w!}5qI&YEM80~R#FhaVz;Ta5w$M5=-P7PA!Pr>_VOKPx@;3Roi|et*nWp>T2ygB% zJO9SE=+(*YlkCV{ha;~te4OwBStY%h{*L|jW4UnR*mn[BitLocker CSP](bitlocker-csp.md)

    Updated the description for AllowWarningForOtherDiskEncryption to describe changes added in Windows 10, next major update.

    + +[Defender CSP](defender-csp.md) +

    Added new node (OfflineScan) in Windows 10, next major update.

    + From 87019adff190139268d466f9129f8e063b7c80c7 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 14:54:33 -0800 Subject: [PATCH 71/91] Fixed XML. --- ...bleshoot-exploit-protection-mitigations.md | 217 ++++++++++++++++++ 1 file changed, 217 insertions(+) create mode 100644 windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md new file mode 100644 index 0000000000..0435dc738a --- /dev/null +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -0,0 +1,217 @@ +--- +title: Deploy Exploit protection mitigations across your organization +keywords: Exploit protection, mitigations, troubleshoot, import, export, configure, emet, convert, conversion, deploy, install +description: Remove unwanted Exploit protection mitigations. +search.product: eADQiWindows 10XVcnh +ms.pagetype: security +ms.prod: w10 +ms.mktglfcycl: manage +ms.sitesec: library +ms.pagetype: security +localizationpriority: medium +author: andreabichsel +ms.author: v-anbic +ms.date: 01/31/18 +--- + + + +# Troubleshoot Exploit protection mitigations + + +**Applies to:** + +- Windows 10, version 1709 + + + +**Audience** + +- Enterprise security administrators + + +**Manageability available with** + +- Windows Defender Security Center app +- PowerShell + + +When you create a set of Exploit protection mitigations (known as a configuration), you might find that the configuration export and import process does not remove all unwanted mitigations. + +You can manually remove unwanted mitigations in Windows Defender Security Center, or you can use the following process to remove all mitigations and then import a baseline configuration file instead. + +1. Remove all process mitigations with this PowerShell script: + + ```PowerShell + # Check if Admin-Privileges are available + function Test-IsAdmin { + ([Security.Principal.WindowsPrincipal] [Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] "Administrator") + } + + # Delete ExploitGuard ProcessMitigations for a given key in the registry. If no other settings exist under the specified key, + # the key is deleted as well + function Remove-ProcessMitigations([Object] $Key, [string] $Name) { + Try { + if ($Key.GetValue("MitigationOptions")) { + Write-Host "Removing MitigationOptions for: " $Name + Remove-ItemProperty -Path $Key.PSPath -Name "MitigationOptions" -ErrorAction Stop; + } + if ($Key.GetValue("MitigationAuditOptions")) { + Write-Host "Removing MitigationAuditOptions for: " $Name + Remove-ItemProperty -Path $Key.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop; + } + + # Remove the FilterFullPath value if there is nothing else + if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 1) -and ($Key.GetValue("FilterFullPath"))) { + Remove-ItemProperty -Path $Key.PSPath -Name "FilterFullPath" -ErrorAction Stop; + } + + # If the key is empty now, delete it + if (($Key.SubKeyCount -eq 0) -and ($Key.ValueCount -eq 0)) { + Write-Host "Removing empty Entry: " $Name + Remove-Item -Path $Key.PSPath -ErrorAction Stop + } + } + Catch { + Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)" + } + } + + # Delete all ExploitGuard ProcessMitigations + function Remove-All-ProcessMitigations { + if (!(Test-IsAdmin)) { + throw "ERROR: No Administrator-Privileges detected!"; return + } + + Get-ChildItem -Path "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options" | ForEach-Object { + $MitigationItem = $_; + $MitigationItemName = $MitigationItem.PSChildName + + Try { + Remove-ProcessMitigations $MitigationItem $MitigationItemName + + # "UseFilter" indicate full path filters may be present + if ($MitigationItem.GetValue("UseFilter")) { + Get-ChildItem -Path $MitigationItem.PSPath | ForEach-Object { + $FullPathItem = $_ + if ($FullPathItem.GetValue("FilterFullPath")) { + $Name = $MitigationItemName + "-" + $FullPathItem.GetValue("FilterFullPath") + Write-Host "Removing FullPathEntry: " $Name + Remove-ProcessMitigations $FullPathItem $Name + } + + # If there are no subkeys now, we can delete the "UseFilter" value + if ($MitigationItem.SubKeyCount -eq 0) { + Remove-ItemProperty -Path $MitigationItem.PSPath -Name "UseFilter" -ErrorAction Stop + } + } + } + if (($MitigationItem.SubKeyCount -eq 0) -and ($MitigationItem.ValueCount -eq 0)) { + Write-Host "Removing empty Entry: " $MitigationItemName + Remove-Item -Path $MitigationItem.PSPath -ErrorAction Stop + } + } + Catch { + Write-Host "ERROR:" $_.Exception.Message "- at ($MitigationItemName)" + } + } + } + + # Delete all ExploitGuard System-wide Mitigations + function Remove-All-SystemMitigations { + + if (!(Test-IsAdmin)) { + throw "ERROR: No Administrator-Privileges detected!"; return + } + + $Kernel = Get-Item -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Session Manager\kernel" + + Try { + if ($Kernel.GetValue("MitigationOptions")) + { Write-Host "Removing System MitigationOptions" + Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationOptions" -ErrorAction Stop; + } + if ($Kernel.GetValue("MitigationAuditOptions")) + { Write-Host "Removing System MitigationAuditOptions" + Remove-ItemProperty -Path $Kernel.PSPath -Name "MitigationAuditOptions" -ErrorAction Stop; + } + } Catch { + Write-Host "ERROR:" $_.Exception.Message "- System" + } + } + + Remove-All-ProcessMitigations + Remove-All-SystemMitigations + ``` + +2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: + + ```XML + + - + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + - + + + + + + - + + + + - + + + + + + - + + + + ``` + +If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](windows-security-baselines.md) to complete your Exploit protection customization. + +## Related topics + +- [Protect devices from exploits with Windows Defender Exploit Guard](exploit-protection-exploit-guard.md) +- [Comparison with Enhanced Mitigation Experience Toolkit](emet-exploit-protection-exploit-guard.md) +- [Evaluate Exploit protection](evaluate-exploit-protection.md) +- [Enable Exploit protection](enable-exploit-protection.md) +- [Configure and audit Exploit protection mitigations](customize-exploit-protection.md) +- [Import, export, and deploy Exploit protection configurations](import-export-exploit-protection-emet-xml.md) From 81b365fea65764568c4b0b473fcb994f49fca36e Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 14:55:46 -0800 Subject: [PATCH 72/91] Fixed bad link. --- .../troubleshoot-exploit-protection-mitigations.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 0435dc738a..549d76f11a 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -205,7 +205,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center ``` -If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](windows-security-baselines.md) to complete your Exploit protection customization. +If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From 6d85dc32df72789ae8555df426744b70b3682925 Mon Sep 17 00:00:00 2001 From: Brian Lich Date: Wed, 31 Jan 2018 23:34:59 +0000 Subject: [PATCH 73/91] Merged PR 5631: adding redirect adding redirect --- .openpublishing.redirection.json | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 395247be86..aaf6b0a337 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -51,6 +51,11 @@ "redirect_document_id": true }, { +"source_path": "windows/configuration/configure-windows-telemetry-in-your-organization.md", +"redirect_url": "/windows/configuration/configure-windows-diagnostic-data-in-your-organization", +"redirect_document_id": true +}, +{ "source_path": "windows/configuration/EventName.md", "redirect_url": "/windows/configuration/enhanced-telemetry-windows-analytics-events-and-fields", "redirect_document_id": true From 242bc46edd996e0f43366ee6d78b32a6967f47ea Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:37:35 -0800 Subject: [PATCH 74/91] Tried reformatting xml. --- .../troubleshoot-exploit-protection-mitigations.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index 549d76f11a..e95d263b12 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -146,8 +146,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center 2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: - ```XML - + - - @@ -203,9 +202,8 @@ You can manually remove unwanted mitigations in Windows Defender Security Center - ``` - -If you haven’t already, it is a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. + +If you haven’t already, it's a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From 203ec9597bddf5558d77a3e826e3b4b0861632c0 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:49:47 -0800 Subject: [PATCH 75/91] Tried reformatting xml again. --- .../troubleshoot-exploit-protection-mitigations.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index e95d263b12..ee23324d0b 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -146,6 +146,7 @@ You can manually remove unwanted mitigations in Windows Defender Security Center 2. Create and import an XML configuration file with the following default mitigations, as described in Import, export, and deploy Exploit Protection configurations: + ```xml - @@ -202,7 +203,8 @@ You can manually remove unwanted mitigations in Windows Defender Security Center - + ``` + If you haven’t already, it's a good idea to download and use the [Windows Security Baselines](https://docs.microsoft.com/en-us/windows/device-security/windows-security-baselines) to complete your Exploit protection customization. ## Related topics From f21342fbee7cd23363d02e058c1abee05147082b Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 15:58:38 -0800 Subject: [PATCH 76/91] Removed dashes from xml. --- ...bleshoot-exploit-protection-mitigations.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md index ee23324d0b..eb71a22518 100644 --- a/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md +++ b/windows/threat-protection/windows-defender-exploit-guard/troubleshoot-exploit-protection-mitigations.md @@ -148,58 +148,58 @@ You can manually remove unwanted mitigations in Windows Defender Security Center ```xml - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + - - + From 8b2d3858d8031c7d311d4de28d29ab5ae73a7f65 Mon Sep 17 00:00:00 2001 From: "Andrea Bichsel (Aquent LLC)" Date: Wed, 31 Jan 2018 16:12:43 -0800 Subject: [PATCH 77/91] Added new topic to TOC (Troubleshoot Exploit protection mitigations) --- windows/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/threat-protection/TOC.md b/windows/threat-protection/TOC.md index 42ede7cb70..58317c1029 100644 --- a/windows/threat-protection/TOC.md +++ b/windows/threat-protection/TOC.md @@ -254,6 +254,7 @@ #### [Enable Exploit protection](windows-defender-exploit-guard\enable-exploit-protection.md) #### [Customize Exploit protection](windows-defender-exploit-guard\customize-exploit-protection.md) ##### [Import, export, and deploy Exploit protection configurations](windows-defender-exploit-guard\import-export-exploit-protection-emet-xml.md) +#### [Troubleshoot Exploit protection mitigations](windows-defender-exploit-guard\troubleshoot-exploit-protection-mitigations.md) ### [Attack surface reduction](windows-defender-exploit-guard\attack-surface-reduction-exploit-guard.md) #### [Evaluate Attack surface reduction](windows-defender-exploit-guard\evaluate-attack-surface-reduction.md) #### [Enable Attack surface reduction](windows-defender-exploit-guard\enable-attack-surface-reduction.md) From af7480eaa7fa6791b1689519d831464855cf939e Mon Sep 17 00:00:00 2001 From: Maira Wenzel Date: Wed, 31 Jan 2018 16:53:36 -0800 Subject: [PATCH 78/91] fix typo --- .../whats-new-microsoft-store-business-education.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/store-for-business/whats-new-microsoft-store-business-education.md b/store-for-business/whats-new-microsoft-store-business-education.md index 38af4a8e01..80d4cc6d6c 100644 --- a/store-for-business/whats-new-microsoft-store-business-education.md +++ b/store-for-business/whats-new-microsoft-store-business-education.md @@ -11,7 +11,7 @@ ms.date: 1/8/2018 # What's new in Microsoft Store for Business and Education -Microsoft Store for Business and Education regularly releases new and improved feaures. +Microsoft Store for Business and Education regularly releases new and improved features. ## Latest updates for Store for Business and Education From 651904ea5f776b9cf522882e81694ea9c857c921 Mon Sep 17 00:00:00 2001 From: chintanpatel Date: Wed, 31 Jan 2018 18:34:45 -0800 Subject: [PATCH 79/91] Update windowsdefenderapplicationguard-csp.md --- .../mdm/windowsdefenderapplicationguard-csp.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md index 47b499d041..6b6afaec07 100644 --- a/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md +++ b/windows/client-management/mdm/windowsdefenderapplicationguard-csp.md @@ -83,6 +83,9 @@ The following diagram shows the WindowsDefenderApplicationGuard configuration se **InstallWindowsDefenderApplicationGuard**

    Initiates remote installation of Application Guard feature. Supported operations are Get and Execute.

    +- Install - Will initiate feature install +- Uninstall - Will initiate feature uninstall + **Audit**

    Interior node. Supported operation is Get

    From 7ea9974dc1c210b1b5686f782c5af1e663430aa9 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 14:30:33 +0000 Subject: [PATCH 80/91] Merged PR 5640: Add instructions to disable auto sign-in for kiosk --- .../change-history-for-configure-windows-10.md | 4 +++- windows/configuration/images/auto-signin.png | Bin 0 -> 13645 bytes .../lock-down-windows-10-to-specific-apps.md | 3 ++- ...kiosk-for-windows-10-for-desktop-editions.md | 10 ++++++++-- 4 files changed, 13 insertions(+), 4 deletions(-) create mode 100644 windows/configuration/images/auto-signin.png diff --git a/windows/configuration/change-history-for-configure-windows-10.md b/windows/configuration/change-history-for-configure-windows-10.md index ce324c8cf1..a12a531608 100644 --- a/windows/configuration/change-history-for-configure-windows-10.md +++ b/windows/configuration/change-history-for-configure-windows-10.md @@ -8,7 +8,7 @@ ms.sitesec: library ms.pagetype: security ms.localizationpriority: high author: jdeckerms -ms.date: 01/26/2018 +ms.date: 01/31/2018 --- # Change history for Configure Windows 10 @@ -26,6 +26,8 @@ New or changed topic | Description [Configure Windows 10 taskbar](configure-windows-10-taskbar.md) | Added section for removing default apps from the taskbar. [Manage Windows 10 connection endpoints](manage-windows-endpoints-version-1709.md) | New topic for Windows 10, version 1709 that explains the purpose for connections to Microsoft services and how to manage them. [Configure Windows Spotlight on the lock screen](windows-spotlight.md) | Added section for resolution of custom lock screen images. +[Set up a kiosk on Windows 10 Pro, Enterprise, or Education](set-up-a-kiosk-for-windows-10-for-desktop-editions.md) | Added section for automatic sign-in after restart on unmanaged devices. + ## November 2017 diff --git a/windows/configuration/images/auto-signin.png b/windows/configuration/images/auto-signin.png new file mode 100644 index 0000000000000000000000000000000000000000..260376199ecadc7ad234a071a4648483969e4a36 GIT binary patch literal 13645 zcmbuGWmJ?=`|gK^A%&3~V#panQo2KGXe6W?5hWE6RJuC{K~e`$K#&lW?ik9Xq*Fjr zKtj&;eZTzII$zFN{|_Rtobh>{z4v|J*YCO}&QM>I63PsPKp>RbTI$9S2%Z!8zJwGX zd}VQxqXU28`59}fLaImMo8SjRHx)e<2&6WJ{KA0<{7mMpW$6cjP<8+NgV*m>?hJuQ zENQE&m97c4C^(8v@pz8hHJF1?}81|-;niam|*)iza5(5R((@)HcFW-?s3{o-9#Y}}vI<&-+-!2@u)mUp96 z_l2Wo&=bXKBm&py{Pq?)%L<>$B9TZz!Akdu5&^SH_s>|$Fya_qz2{#V@6T*(Y@kfA z5_dnX3}p%ULK$WK-OKb}&{W&CD?0X&3Jbr*<%*{;iLV{+%osz|)zy!7W~6LB_=`+5 z`7E1N-MRfzE3G?*+A7A$@zKuo@9nxVViFQ7a208p-g&4G{+o_Gj*cNAAv)QDah)-d zk;*i$bh4)F?`FUcj*oAcVA0ObD`{Ms(nrI>?OKXFe(R&H?h~9VXTP_=V*CY<<@8`! z7)5YXEBA$509G$A`+jnJ`_;vtLq0UdduRG4G?7i=4iwUaH7dPjWMuU333KzzI>pNe z9hg>H`0OwB`mNzMKbINA!%#JT2L}1lVLafAQG6IeEqdW_wK|>u_Uogq?*<3$m&aE8 zWR#Q|lJ)qL108}4!nW$wcN$(lN#Wwy2z69%d;I&S_?W!f?Q~NlOq=oqQ=%M(Z=m>x z+j)Q1Z>+&1wp}p|_rBlZ`2`UR$4GikhPL=`egf-|uk_583I&UQ86AvXTwVS8;o&{PbD?r& zOxJ_CN7%`a0bby#Ha_?fk85-sd44mQQxt5Go&|^eFanYTn_^X>A-iT@o}hyjk=V@I zQm`nQ>PYkI{1*>kPz~emoh_KJ=qIu+STug<3zTx6n56Sq~zoo zD{h5P%-%U`56w6EM7(w#D-ingDCFw$B$Dm?c&D^uFoUnk8Z7V;Sm5pUCyY(b&_Kk! zZ_%{2|N&R1kTUTHPzK4BO|w`8xn-b z{&*@+o_?vadan{eoGc52_7a2#qtn2WfZb_9#zMueNMT}sVJ6FqH7Hahg2F^{XdleA z#3V9_zuPPl`4|V5JYOL=TP-AD>zj~WTS#yGb%8te8(VMNAN*vJ z^kmGM6pls0;z=MU7{`-eKlcBQ#WyXypMP3s*J2+~^X%&H#)i89D_wWB!&rfWSyxyB zgD|b0=X8CXf|j$hv%UQSxXcwARYOCXm`1Pp8%mj^;Gzm-{9J<@z?sDBP{5uB`&^#= zetrARba161l8xdo6WV8Iy1}VGd89x=F8Fx+tQ{S-)VW;P2?M8hFcqQpYqnYG>cUSz zx7bi#`9d7S$@PU7=|NI(g~#>Q&Aw7zbM>E|34m2R`lKt25VZMl^dev`4R_vI zVNy2tc&my_GudKOZezav>er8tRqEk1^z?lf;Dx<9d~9HI-)Z(;Rg0mryeri?bi6UK z{3Bq#;nUTvrV&^c|Lx~D@6k_(Y<;WxZX2AGPe#Yva`y9$?@=LXw77i-MBo~`q}QBv zqo-xivV(QY=~BXc$YD}eEJ5kF!E~O4#6;Mi2U;1tdM(1XXI3=Vuk(D7eE8F}IPtuv z)~TOa>OsrB?>7XVkgN{p*tI`x&C)`)o&S^#l>3%=^j{frAVs{f44I`r#t@+`MSNmYGLhy0E;uGeuKR-a-b7sD{ zI2;?!7OHDE7Lk|Fhrbr{LM#jVx*OrBz3Lo$p->EOGP}})g4HL-+m=SwA9}{6bLgny z(#rbo?(U!i*aa>U`R0cxx*07RC|w?b?QK?JtdVTn`uH~qNqHf+ZMk|JZJ;hwFSx8% zENid0pZ)z))^aB)h|cDv&Gf*m}5SCA5$qL@LqE3l0b2zn#Ah5y4OQD=$L7{fX3;_|8h9O86B zxqx5Xai5H@4|BgAJ-`f)qbH!YS3=gBo8N9de&ou5#)vf!DDfDw2 zuZ>8}Z-dh4nItN@oj#z+DDBM=t!Iw1u6H*w4Xeq}fim2ft+J9jJT{@Zc1`7KKgq(Y z^j6YFy5M!nn_hGIBU+%#jlGbINf^e6IyHEF?Mq~eVEc?*zW??0?H?Z=y1XL4&d)8` zF=?b(U!{>i|3da*$s`yGm}fq*jt8OQ@RJxt@tvFoZr=N*e)nZ)Xcc=_``@!ISnTjL zu~*Cft=~Vt=5n5qp^7dEBhVb5Z5upp%P#EfP-S$nT(ZIN0d8hRcOVVcc`3+$U=ggI?{I+55(rDVjNF-~6Qz`V#F7-ppb|G%9cD zZTny5n_FMsFo>JIHbtFpHQ?R;T5c54`|1s&0*FV%^?m;C&|) z#3rr+)doOUtUV(|((;eg+f$M12lE_7R+PF%Ctj(!G4ewDJ`_owBF-Wj#p!uz0#pq! z@!3LFU|G{Y8$I+j^b~vpUcS;H9CWzmvbe$W{9-YNU3OYK1Qe%jC8MUYg2zy34jdD1 zNuRq4V^ewWyx5tEGFhSARR4}ZAXHRTD&5bHHV2uMp0<2uvxsF{P#c#g#45WJiDXTR zZ1H(%#HdVw@hygmSwaiC@X7LS<>RHExHZB0DsaY0(eDk3?MsY!BW3*7dVV}PJv%FL z<}7_~A&4(2?(qdV_|k}x1dlaJn8rP`Y0yXHkwKe%CqAL73miXu1HPYA@$GIpqNp|a zg!AV|>HQkD^4L_iQC7Ck9Y8GPhzw-|7~~%jnZGsXF+Rx>p$@ zBu!pwU5jk?TQ4~x-4}}@i{&?~9H3n|Dbn?E?}3eHG<~CB64OFcc`05VeWvXizhA60 z)cukaKU2rkcIjHa&^#HUff|g0xhBSWKJyK)C)u+)|KP%c)rzUM2x)PAH-YN{ea+fJ9rHTM}ANlaV{>Rg6-;qfWz3F*j6 zt%2)$p?q$OqI}Nvg|E^>kd)oLxChhq6}3T2)E|_i@Ldr=$zZm^^DOl@s30B z;!x=fZVDY|WDJCvgIUl%x7bgWK>L&58iU*KzvsJowoKTLMm=Q-=K-3<&AXqmO!}hA zEa;ZfEEw*EgiTMtnn5m-_0*3LRY**el?b4_J=t9n$ zo2dJt#~z_R*b}yRd~MGgPDBf1!75)RIrTdf#c-0Vzekv9uMOuIG}hvO2&aVgAyQtwXTVuU(TCkC>rR8m;J64KC)MI-bxr(SRb{(BuC^2oTuy~YELaiq z_NjZduI`dEx(A5BXc8%>dO|1K119Iebd9r~=>$J6`Udgd5{-l!3xP$5wqHdehRC&e z6igVZ2I<;ONc7_JviRd8_dyA?%3u>Z>^|m&corRki-w(9N6g-dQ)0|^bC9nvvsL1! z*poAVLOB!6Jy*v;ObIuUMUDtjE#~x3Q|Kmc41EgEy=vl+mKx%>cZxEhRdc!St}Cet zbK(kBo<+DuY-M}wcESkFkhKF~Y;kPPRa-Ohopfm3>msjIxB7h-O#~Py}5rEm+%6m?%L--ILLiOb3$e5Jn}qibl zE`2W0GtZwrF{BeTa+ncv*3=@hUl|zugmm5XMC9$)rmBRGupH4Z58rup)lc#u7>h1F zr>}wez#J%}ZOYuP675Pl1Y@v(gMl)on0cU=q#^AH)LX~%S0u(Aw%a2pBN`)g49S^YmJAVl-o+}J4;SGTPw-3oS=FXdCpwIB*c&5?%Zn;qzcqp(Ihqn764Q+q9Wrvz_Ux}Df_HA%$Hb(eAi7r7 z)-t9{KWI7mZiuw~N$n+T6shXaxne+s3*Ua7iNPDn0g^-v2x%dnTBQGTs_psq!n?)% z`Y&0QE-K8n3p)>zwCMu8>%AAdJ{b`FRH;>Wy@Qc8&4#YNyHS?lQxba=AItD9PlJm_{IBsRaxAHkX2_-YPP45B%776($jN{{+b%icTxYA>&RKB`WTHN8P z(+a$9zwVn19U=IldLuw4Z0Igg7=C)hlh7RI&)c@sXl~<|T2Pi)84NRJorDw|3==|!;-aaM+j`wJcPdnRUWXzXicV@xjG7yqW=C;zMitk;0PT9LSfN{}V5 zeWBV}M>7q{k;*5M=9uVl7#kFON|2rgHQeGKyJ z*w~ot-hf)}QXyfN`6Gkv(8;C2`CG6!@-EKfYun7H+2m+w*#Ea=)kI&retmU!SLyzA zJs6VCPERQw(d92~ZOPsHCP>Zxw%ibz&P?VO52ji9lUcvs1ctFfrDvo0GOe_cV8~_w z!#z0VHXk3|9IFF_j+%wG3kJqAFylwEf^M|BzP|2n@baUy|He4r83Lx|sls-O&7Jx{ zje7#%0q8^Am9PmG_oc$5srdd#P*j;HF~yI7cnN&Rv$LBAdK%miTrs2x z2#te$B0yQ}oBCm828E+9n;GXG52uI&Qokd<-p?$ZtT0=6e>m-|x!e$6r&%bi~p=DamT z&PD~JMS~8U%T)^O8r{YUJg46M({kYilOAFCM7NURo1X@DlYrdJe7&St{V5r!G&S^r zAPNtb0sa}NH5%&bG%6IVvPT_Z1OQsTwyawNOyI$@pNXo)T98>MXiIBQd`pWQK{CfF zgEHq$k1uaGPXT^1 zLx9J@0UpOlp43~Dvg83))?K`JT3vXKc-F0-30Qw&!@!~~Z7`3$x#SS#XWq*y~=8RcXzB>#g{g5Z*LDs7od(dpFaH(nGTezVXdRa zv0TXed*4TongNYGup3KFO$FN`FNc^P7EjoH9}8(~YqPbrT_e(q!`~pz8_Psx1ifk1 z17S{obD}V z@EH_%)16)@{XKP>YY76!3K`%F#QR?Xu>Z;MeWb9`40L|7yt1ZBXA@&w7c#7V=jr2JHW*F`US3X1oW|vb zrc%oBy2riZsE^{ktIoB~KB&>$vx$_aY*EyWV|?#o#=8`9!+pQ^_o%ZcH#cbh=Y5Xi z6tB~zjj&>4&y2;cLwif3Vyz#DYHZ&-2fK9qb2KN@oK3J+;cWvaaY`AOHf^wmV9J% zH1G(HCu^O|&e+2b*T=+-%(|`vT0Pzp?H6Qp0qLi0yQ$D09T-J9>rjriVKE}gjp450m3}HV`GTB z0HtyH#UHQ-^a>S!fdBPv%K=m`Au%_Ouj%RKW3W+_eu?fIS^)!~GEzWf25`eV+LMme zd^S-HfQX-+ZSn~$2I|s0uyjUKSvPsBq)QV9RcQMA*RL?<%LOFwmTIO%M@1ok_u;+t zO1HLsw&VqkvnPV&hHcBhk|h}lBVW{N52%QCA0O!*ylNJA8|4_#nQsZo@Y|$b-FY~z z;s;YJVr-bO;*Xng_^ER5+5*0_JasR3OxMG$Z|+#di52ciLyh5UFgkEPzTb4 zWU&EGF)|6hONZ*0+})XL8}h6Rsix#i*NntuuYT6H9jj*ruMIGa-AE!eNwf|j6ma%d9agdd~W67k({1Aq*LAvvlR!ixQf#Xwy( zd(st229VGz>JYh|d&HE?M_)_~RtM4uo@vqAmPwxVc>~*q)59b5ZtXGXP1qLnDX_e7 zF9#i)M<`(*8$W&|UZ5w%!u6eCJ%wiXX;((@>l^y0G6m_x=Y>yl2mz zK__#=7s9LXVzi*C5#iyL>S&73y{6;t0H}W|GXSjniCB)HC9uQz>sOoC3rbroh_>WF zJtsVhJn(M==!qN9fp2fjg^!Z5c>3=ik7ocfY(%Z2L3{h|e47HR>uX?e#I4q>Y6EJt zZY>mR9F>b8p{_P8#$SKeKM&^hvRF!SLV6eA zuJ~q$))uj4y4Cuw;ZV64ZUvZC2Sx5HP!)!YciXSpJifj*6~H4klkr{AlD*|1+hM^W znC`yoH0bxYfzJ~6mD?WL$14*S78U|*&OX8zy*$Z>AF@05#vlGeUA`qvO_KMgL-smJ zNNYMk5lgJ`UDYun$IIxICOb$I<<3s>cm=VJh?mppwWlrtPU71#UnBoMrhqi%6gCAB zHo|hKrI?KF1qLrN9FJpM3T-L|DnyIh7#m@|Ch@=;(~pPn#2*au$CFN+EWljNL9*h} z_TX^ncl!UXegMBa1$eeJYfG~}%YE9s&ri;_-f{tY%A%2m{-S|nvF8UxObr9hLbY`> z&A7ek)mL*nja!QtZNgdDb|Pe>8@R;bp;gZVzKLH)-~5?8I7mdUpT=l7cXNz5wL;B1 z9z|m>ASq002+87NEJ}+sr)3qiYNR;O*gHHdmDw-Zc<)Y{>;^gqQj}b%AQf>qvPlES z7olY8P;~4LKKZqJ4o=tgulRdi=5|k_AbNQMtRmaMpw-A$ERrNWIJ?Jdaxo94}%uUZ%wHi2T1P7HgmCG!&vOIl^r7^Ey@{0jBGC2n)GQJH;Y4Hr_nd4g*U;HeQah)9Ewxk9vXND zXVLM;T|^bkN*JPA_`r1yZiyl_8pLu;Gi$Fx1N2L>H!{svKyFQ!XpqYcr5BwfN7Qz>I5?Sg;Z5qybyF3JWu%jBh#%htl~23$4S<4C z2inuQ`0HF~l|oCK!Iv|t389mWH@jebdd~@ybg;EZI2I!nN@{@*XGRblYEzjIwhtJ& zvhb9SdA0q)t}tHgbyNRyo{d;sw5D@aZPmssaV+?6AoB=DxU_d@s!1m8kLy?t&ot6& zz$>{Q${0iD3qF4~VaDs?u^s*is*u;=MAvG9X60@q za9C2wgrQQ)Y2A3xo&LL%wcS1<#3?GYVL{xGj3=l$+Tm+cRCFejx%g9?l$+5gLn=RQ zTFa0q2k7&<&qx-$-~meec(4ix5t&EWRCb^3JX_D`1=27S=b3U*Xs!pL1N00fk8kg> ze+a?ayN;WxUhh_kM#WN1HgYIq%cBU%BUwtMNTa86Jvd{5+DmxIMAN!#bj>|njMOI= zzeBM{a2vMG;zT2CqWn(G7*aQI(E+=a$0X=br*4t&_|&18f2w#=Wg{%lB_Ja4a`L1G z|ICa24HyQnlF?jf2f=)e$fIlH2FrX)Vt_C;yIxDng*RDY??A{|s;|`ysp28|j)baR zfN_URSq}76P#4HYPSoRx+t+^)A*!c6(UgT#R5 zNs%b}&Aq!>dM_b7fLBxzL;Yr9_Q*R3(qS0TSJrxcsxC6Ge+Kb@-{l z>(O<(uiEw8e^7n*lw`18oQN0C1f%e>^9QDDAUx0s>ij3ELxhMp@!S`l*l;V*#F?Ov zC!*`+qIGE-p^8Q6fU>{7^EZnNrE3*U?j5}D3msvkdrlK28a#CXFV<8Ipp$!;^KalW zceo5TZRAO7GiQzb0siaYwWaQAUV{Qq#E5-R@m8g`C~F`6K@qMeIwI`*K79?$4KHV; zjJwwt-~?Uk@sXEoqu~ulIoH`&lWO^y-YW@hLOYN?@50;|{oLQL=}VgCJZ#wd_@VWC zXVnlNCurTF6uPtEPCkvY&D6Y%4Ju{;sLX&!Fh)l_HZ=Fdpc_k!A;+DD8uVZ*^@^j7 z$_)|y`;!*5Z)r|64KtI9teo@lp5iY8@05O(}*6-U5K6PU z{kWU^GWgYBFJ61);JyADsMqj>==bY_SG z!U^J;#YFz2Px{3`X0lIa*g|S=GpoYm%tdSd*6K<52D?MPrx%?r^weLe$8z`5h8BtV32-id27QN~Ef$Rt(vW3>&9+L59B4 zme%gTMRJ6KOA)Rac(s=W@J}TBxH7(i>Ro7Nq?_wW4y@Imd&t*^;7!YZU8q zvW8L-1Pu-De;!ZT8T451hoT^dq)Y_CvB`AZF?FJ%6Aas0O!zHLGc=N^jvXSg*3%F^ z{rnC_byr&vvNXz)(o!;1MQU`9(4G*3A)bfk0u3CVh(B0f!|7-0{8@@X7B%VtqB#c< z2^oS#zCOj1m_=bOt^uP^H~ZX8?kufj)+U#wXJ;tw#N2eu8xz0Kboib2rwYejUHXr8 zd4~r(M%r62w(>P!IxLVK{ETHon%CVuy5)87m7;nDshE;rM;i&fya*^(8Th=(;=1Ls zVFU@Wm%}vM$}+k1iH6uHo`}B|L_gh%dAb@Rw8e)aMzx}jMmDJHVjPB3mh_9nO$EM( z;vUL+*jrP4Yg=^u;QX-T>l<^PJv`Io!=jd2Sazac&f8fZA;CILbBPRQM)8DrUH|FP zA1swT_qwGT%}dndn)K28p<%TSJA_%sHeZ!kQ+W{z+0pmuaI!YHk{C`Irx>^)3 zHpW$|kCfa417C1fgo)z-mogFAqy@^?&1&>kw6xjNDdUUQjxoButE8)WJ?O$KCRlZ> zSB?}OX)G_P!V+=a34yBkqq76Q&3Op*)d)!Qv61~xn(*Ji4i^gJ`01tgkBz|O5R{v<8XJfR~_jye+PM-w_7Bz?}thEWp;~mc2 zZhv}tcCwqoA#;?9UA}xv&LO{8-g>=nczj@GX2|#Ac=QB>8_){+Pf9~8_~hkV092#N z&DV(X9XK*Ps0iByLTa$RV8kejbAJ(GQiKJpjNkaBR)Ktw*3vxqX8-830T5-YAP<2C zzl^3}T1j?&_Uy{BH-2@jupMCAft3Za!Nra7Vl}6&4-w!VOu&5O?@PTgQL2d|IEM+_ z%7Y-<+TUwjh$JAYYU;8|uB#fj9IS+8Wgh#A9eGmnPMp_1{G*5tuo! zsvx;x&A0~=Lou6Reb#n%^w#gT0v`v!Ft{-?osdl|s@Y`cRgP_X-bL)p>J6^YAT=J+ z7%EoP;nlHGfJW2%=_ptvakFNgG0nmMX!z+B=oqRueC7H;8VfvYJ--C*)R|L_zLWSC zFsC1FeijA^Kc=&e> zqnu~6`Vt1F2o=tyxxxNzgBP+<&7VjP-7F%2gExF%qhpqlm~pfZSVUBC|^AD|E+x>K;jaJL4Y?f@X+8Cq*AXvp@9xAKPnRW)9nf3M>el!AaZ5ChlL@^(t8t{ z?3QHxKc)a?mI*l(;c9s2>HeiWZFV4Jxi1N1U`_4=8l{_wRC$q#I_DttyW-q717R}1 zeuOq@ly>yrm2bC8$i&GG*G9PPuUQsr@dF07@qU&_9;7csgXK(UG{{ZtRi%xsC8+3H zb69_Slfa3tNI0oV0-CF6W;!sU`i?ZB6oGhCPv2*~K!py75Mf=8cYx}=T+OiqQH2D> z0JbH36B@$7UlArNK4WiNkDtr$<2_GJ2Ang#7GNl?_dDNNl>t9<*~VYO$6*$t+SDUuwcWueU&;Tf7rBmLS4baPy6`FTZIK^JBR?X%QF#)pMi zF`@07k~+Hp)%d{t%Hytt3D6 z$i_GhWukn8Zin{Q(^>xF*6h)`u2fNzb+5*Pn!=W0UG!`{cNG+b6h_55Gi!L07E1)5uFSq&F zXl>HrpZ0=HfwZ|Mz+QM9)Bp#lJ5lM+>4rDJ;-Ru;8|PNcJ;h(A&RHGF3jk4AZ?og= zski|5Khoylu}w+p!VV!pPq zt-enea55?~C`l!JHb1>8FGq%x9&!_L&Fq699Nixipa-UrSX zC=2x5H0u(5#J^%4mxU2^jfNj`ke!ArOn@w0nuCN6?O%9+yj>yuU?)R4;Rvs<_zklO zD0KyP6CtEwQ!{Vf`C(9l{kP6gYYDk)bUGkL|DT_L?KAM-IQ{=q+LfEr1g^mT+sVGC zK53n=n*7S<{I4lkJQ zFB2`s0X=@`mwaD=?dtOeK=JdCvD_v9o{lvHR*PrG-E=jln4g?rRx)IS)k zzV1EYx^TAu79rtYD(Z$^%8lQPX_FQZa(1@VkU=bm*bI zY7pvN$5Vsi!8z~o$c)vGzxU&Q`1sq>9Gp>?$&FBJ%g9RdNwU9VY}`G`IBB3Hqo!t8 zdU^q}r6kmBm0m(-NLr=>5sk?#tJ*Ngv8PmUfRbWZ6ff(Uc+cZ{rPJTzSs`>0PJ{UP z%y0{@(b~L;8#lZQq^iu%o0vbuhhvNq-bYJHcqmWCM7xtW09gHA;5uG&=tx&p;Xh z-zN3sagBCuJEhitZ)<7e4@>RU%e}q#)Vr-&W$Xb<8 zHhLZ|s+mV)&kYO(^-_0Fcb3;9_FLv>$$;z#Jf3m`Q-H#Q*(N*!Vld=r79>9d_7eD1 z!~NN&Ycky2gfbi)9X`<@LQcXa_HSne@e*1E(@3|!@;pGDdXTaHCWRrJ>)`+j%DIgbzDfvhZm6<%O~ zF9j)l@L`?%Gm>_8c8etTqP?J@0eVabZWBrrDu_=&5XBza3!?n0KIT0=7wpa!4Xj&2 Tjw|3JP!Memef4Tp`|$q*;6tR= literal 0 HcmV?d00001 diff --git a/windows/configuration/lock-down-windows-10-to-specific-apps.md b/windows/configuration/lock-down-windows-10-to-specific-apps.md index 7e5d71562c..ea121c6820 100644 --- a/windows/configuration/lock-down-windows-10-to-specific-apps.md +++ b/windows/configuration/lock-down-windows-10-to-specific-apps.md @@ -9,7 +9,7 @@ ms.sitesec: library ms.pagetype: edu, security author: jdeckerms ms.localizationpriority: high -ms.date: 11/26/2018 +ms.date: 01/31/2018 ms.author: jdecker --- @@ -52,6 +52,7 @@ If you don't want to use a provisioning package, you can deploy the configuratio - The kiosk device must be running Windows 10 (S, Pro, Enterprise, or Education), version 1709 + ## Create XML file Let's start by looking at the basic structure of the XML file. diff --git a/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md b/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md index fcbf41202b..0fe1c5b458 100644 --- a/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md +++ b/windows/configuration/set-up-a-kiosk-for-windows-10-for-desktop-editions.md @@ -8,7 +8,7 @@ ms.mktglfcycl: manage ms.sitesec: library author: jdeckerms ms.localizationpriority: high -ms.date: 10/16/2017 +ms.date: 01/31/2018 --- # Set up a kiosk on Windows 10 Pro, Enterprise, or Education @@ -37,9 +37,15 @@ To return the device to the regular shell, see [Sign out of assigned access](#si >[!NOTE] >A Universal Windows app is built on the Universal Windows Platform (UWP), which was first introduced in Windows 8 as the Windows Runtime. A Classic Windows application uses the Classic Windows Platform (CWP) (e.g., COM, Win32, WPF, WinForms, etc.) and is typically launched using an .EXE or .DLL file. -  +## Using a local device as a kiosk +When your kiosk is a local device that is not managed by Active Directory or Azure Active Directory, there is a default setting that enables automatic sign-in after a restart. That means that when the device restarts, the last signed-in user will be signed in automatically. If the last signed-in user is the kiosk account, the kiosk app will be launched automatically after the device restarts. +If you want the kiosk account signed in automatically and the kiosk app launched when the device restarts, there is nothing you need to do. + +If you do not want the kiosk account signed in automatically when the device restarts, you must change the default setting before you configure the device as a kiosk. Sign in with the account that you will assign as the kiosk account, go to **Settings** > **Accounts** > **Sign-in options**, and toggle the **Use my sign-in info to automatically finish setting up my device after an update or restart** setting to **Off**. After you change the setting, you can apply the kiosk configuration to the device. + +![Screenshot of automatic sign-in setting](images/auto-signin.png) ## Set up a kiosk using Windows Configuration Designer From 7b9645c83a347b7690e46c82389c34e208ec7541 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 16:44:48 +0000 Subject: [PATCH 81/91] Merged PR 5641: fix link --- windows/deployment/update/waas-configure-wufb.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/waas-configure-wufb.md b/windows/deployment/update/waas-configure-wufb.md index f705f7b85f..b6260dbd6d 100644 --- a/windows/deployment/update/waas-configure-wufb.md +++ b/windows/deployment/update/waas-configure-wufb.md @@ -28,7 +28,7 @@ ms.date: 10/13/2017 You can use Group Policy or your mobile device management (MDM) service to configure Windows Update for Business settings for your devices. The sections in this topic provide the Group Policy and MDM policies for Windows 10, version 1511 and above. The MDM policies use the OMA-URI setting from the [Policy CSP](https://msdn.microsoft.com/en-us/library/windows/hardware/dn904962.aspx). >[!IMPORTANT] ->For Windows Update for Business policies to be honored, the Diagnostic Data level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system diagnostic data level](https://technet.microsoft.com/en-us/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#configure-the-operating-system-diagnostic-data-level). +>For Windows Update for Business policies to be honored, the Diagnostic Data level of the device must be set to **1 (Basic)** or higher. If it is set to **0 (Security)**, Windows Update for Business policies will have no effect. For instructions, see [Configure the operating system diagnostic data level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#diagnostic-data-levels). Some Windows Update for Business policies are not applicable or behave differently for devices running Windows 10 Mobile Enterprise. Specifically, policies pertaining to Feature Updates will not be applied to Windows 10 Mobile Enterprise. All Windows 10 Mobile updates are recognized as Quality Updates, and can only be deferred or paused using the Quality Update policy settings. Additional information is provided in this topic and in [Deploy updates for Windows 10 Mobile Enterprise and Windows 10 IoT Mobile](waas-mobile-updates.md). From 01c6963b9d395499d46df56fea54c4f60560c711 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Thu, 1 Feb 2018 17:09:59 +0000 Subject: [PATCH 82/91] Merged PR 5642: fix links --- windows/deployment/update/device-health-get-started.md | 2 +- windows/deployment/update/update-compliance-get-started.md | 2 +- .../deployment/upgrade/upgrade-readiness-deployment-script.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/device-health-get-started.md b/windows/deployment/update/device-health-get-started.md index 9350288947..175f553534 100644 --- a/windows/deployment/update/device-health-get-started.md +++ b/windows/deployment/update/device-health-get-started.md @@ -24,7 +24,7 @@ Steps are provided in sections that follow the recommended setup process: Device Health has the following requirements: 1. Device Health is currently only compatible with Windows 10 and Windows Server 2016 devices. The solution is intended to be used with desktop devices (Windows 10 workstations and laptops). 2. The solution requires that at least the [enhanced level of diagnostic data](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#basic-level) is enabled on all devices that are intended to be displayed in the solution. To learn more about Windows diagnostic data, see [Configure Windows diagnostic data in your organization](/windows/configuration/configure-windows-diagnostic-data-in-your-organization). -3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: +3. The diagnostic data of your organization’s Windows devices must be successfully transmitted to Microsoft. Microsoft has specified [endpoints for each of the diagnostic data services](/windows/configuration//configure-windows-diagnostic-data-in-your-organization#endpoints), which must be whitelisted by your organization so the data can be transmitted. The following table is taken from the article on diagnostic data endpoints and summarizes the use of each endpoint: Service | Endpoint --- | --- diff --git a/windows/deployment/update/update-compliance-get-started.md b/windows/deployment/update/update-compliance-get-started.md index ead61e2d95..354ad86c3d 100644 --- a/windows/deployment/update/update-compliance-get-started.md +++ b/windows/deployment/update/update-compliance-get-started.md @@ -36,7 +36,7 @@ Update Compliance has the following requirements: 4. To use Windows Defender Antivirus Assessment, devices must be protected by Windows Defender AV (and not a 3rd party AV program), and must have enabled [cloud-delivered protection](/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus). See the [Troublehsoot Windows Defender Antivirus reporting](/windows/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md) topic for help on ensuring the configuration is correct. - For endpoints running Windows 10, version 1607 or earlier, [Windows diagnostic data must also be set to **Enhanced**](https://docs.microsoft.com/en-us/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. + For endpoints running Windows 10, version 1607 or earlier, [Windows diagnostic data must also be set to **Enhanced**](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level), to be compatible with Windows Defender Antivirus. See the [Windows Defender Antivirus in Windows 10](/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10) content library for more information on enabling, configuring, and validating Windows Defender AV. diff --git a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md index 3e838c9578..fb04dd5bf6 100644 --- a/windows/deployment/upgrade/upgrade-readiness-deployment-script.md +++ b/windows/deployment/upgrade/upgrade-readiness-deployment-script.md @@ -263,7 +263,7 @@ The deployment script displays the following exit codes to let you know if it wa \Windows\DataCollection** or **HKLM:\SOFTWARE\Microsoft\Windows \CurrentVersion\Policies\DataCollection** - For Windows 10 machines, the **AllowTelemetry** property should be set to 1 or greater to enable data collection. The script will throw an error if this is not true. For more information, see [Configure Windows diagnostic data in your organization](https://technet.microsoft.com/itpro/windows/manage/configure-windows-diagnostic-data-in-your-organization). + For Windows 10 machines, the **AllowTelemetry** property should be set to 1 or greater to enable data collection. The script will throw an error if this is not true. For more information, see [Configure Windows diagnostic data in your organization](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization). 40 - Function **CheckTelemetryOptIn** failed with an unexpected exception. From 79a6f58699d372eb5a515347ab5b6d7e6b4dd0d3 Mon Sep 17 00:00:00 2001 From: Maricia Alforque Date: Thu, 1 Feb 2018 18:02:35 +0000 Subject: [PATCH 83/91] Merged PR 5644: Added Browser/AllowConfigurationUpdateForBooksLibrary to Policy CSP --- ...ew-in-windows-mdm-enrollment-management.md | 1 + .../policy-configuration-service-provider.md | 7 +- .../mdm/policy-csp-browser.md | 119 +++++++++++++++++- 3 files changed, 124 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 2065aba9d1..54c9115a56 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1405,6 +1405,7 @@ The DM agent for [push-button reset](https://msdn.microsoft.com/windows/hardware
    +### RestrictedGroups policies + +
    + RestrictedGroups/ConfigureGroupMembership +
    + + ### Search policies
    diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md new file mode 100644 index 0000000000..8b0251476c --- /dev/null +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -0,0 +1,96 @@ +--- +title: Policy CSP - RestrictedGroups +description: Policy CSP - RestrictedGroups +ms.author: maricia +ms.topic: article +ms.prod: w10 +ms.technology: windows +author: nickbrower +ms.date: 01/12/2018 +--- + +# Policy CSP - RestrictedGroups + +> [!WARNING] +> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. + + +
    + + +## RestrictedGroups policies + +
    +
    + RestrictedGroups/ConfigureGroupMembership +
    +
    + +
    + +**RestrictedGroups/ConfigureGroupMembership** + + + + + + + + + + + + + + + + + + + + + +
    HomeProBusinessEnterpriseEducationMobileMobile Enterprise
    cross markcheck mark4check mark4check mark4check mark4cross markcross mark
    + + + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
    + + + +This security setting allows an administrator to define the members of a security-sensitive (restricted) group. When a Restricted Groups Policy is enforced, any current member of a restricted group that is not on the Members list is removed. Any user on the Members list who is not currently a member of the restricted group is added. You can use Restricted Groups policy to control group membership. + +> [!Note] +> This policy is only scoped to the Administrators group at this time. + +Using the policy, you can specify what members are part of a group. Any members that are not specified in the policy are removed during configuration or refresh. For example, you can create a Restricted Groups policy to only allow specified users (for example, Alice and John) to be members of the Administrators group. When policy is refreshed, only Alice and John will remain as members of the Administrators group. + +> [!Note] +> If a Restricted Groups policy is applied, any current member not on the Restricted Groups policy members list is removed. This can include default members, such as administrators. Restricted Groups should be used primarily to configure membership of local groups on workstation or member servers. An empty Members list means that the restricted group has no members. + + + + + + + + + + + + +
    + +Footnote: + +- 1 - Added in Windows 10, version 1607. +- 2 - Added in Windows 10, version 1703. +- 3 - Added in Windows 10, version 1709. + + + From e7b1ba916c38173d939e931be40d831bdc0ed015 Mon Sep 17 00:00:00 2001 From: kaolah <35081118+kaolah@users.noreply.github.com> Date: Thu, 1 Feb 2018 21:23:36 +0100 Subject: [PATCH 89/91] Article title change The article title were not correctly assigned. --- .../bitlocker/bitlocker-basic-deployment.md | 12 +++++------- 1 file changed, 5 insertions(+), 7 deletions(-) diff --git a/windows/device-security/bitlocker/bitlocker-basic-deployment.md b/windows/device-security/bitlocker/bitlocker-basic-deployment.md index 8a37191b30..9a2d09f6a4 100644 --- a/windows/device-security/bitlocker/bitlocker-basic-deployment.md +++ b/windows/device-security/bitlocker/bitlocker-basic-deployment.md @@ -182,8 +182,9 @@ Table 1: Cross compatibility for Windows 10, Windows 8.1, Windows 8, and Window -  -### Encrypting volumes using the manage-bde command line interface + + +## Encrypting volumes using the manage-bde command line interface Manage-bde is a command-line utility that can be used for scripting BitLocker operations. Manage-bde offers additional options not displayed in the BitLocker control panel. For a complete list of the options, see [Manage-bde](http://technet.microsoft.com/library/ff829849.aspx). Manage-bde offers a multitude of wider options for configuring BitLocker. This means that using the command syntax may require care and possibly later customization by the user. For example, using just the `manage-bde -on` command on a data volume will fully encrypt the volume without any authenticating protectors. A volume encrypted in this manner still requires user interaction to turn on BitLocker protection, even though the command successfully completed because an authentication method needs to be added to the volume for it to be fully protected. @@ -240,9 +241,8 @@ A common protector for a data volume is the password protector. In the example b manage-bde -protectors -add -pw C: manage-bde -on C: ``` -## Using manage-bde to encrypt volumes with BitLocker -### Encrypting volumes using the BitLocker Windows PowerShell cmdlets +## Encrypting volumes using the BitLocker Windows PowerShell cmdlets Windows PowerShell cmdlets provide an alternative way to work with BitLocker. Using Windows PowerShell's scripting capabilities, administrators can integrate BitLocker options into existing scripts with ease. The list below displays the available BitLocker cmdlets. @@ -442,9 +442,7 @@ Add-BitLockerKeyProtector C: -ADAccountOrGroupProtector -ADAccountOrGroup " ``` > **Note:**  Active Directory-based protectors are normally used to unlock Failover Cluster enabled volumes.   -## Using PowerShell to encrypt volumes with BitLocker - -### Checking BitLocker status +## Checking BitLocker status To check the BitLocker status of a particular volume, administrators can look at the status of the drive in the BitLocker control panel applet, Windows Explorer, manage-bde command line tool, or Windows PowerShell cmdlets. Each option offers different levels of detail and ease of use. We will look at each of the available methods in the following section. From 6f04a90725b769ced4cbdda1d9e31aea075b08d4 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 1 Feb 2018 22:56:58 +0000 Subject: [PATCH 90/91] Merged PR 5658: update graphic update graphic --- windows/deployment/images/feedback.PNG | Bin 67206 -> 78621 bytes .../resolve-windows-10-upgrade-errors.md | 4 ++-- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/images/feedback.PNG b/windows/deployment/images/feedback.PNG index 8ff7391e844134fd4918b4d610e72fe749f72e30..15e171c4eda0876ae28d7a926ac0f02ff8e5001e 100644 GIT binary patch literal 78621 zcmaI7by!tV_bv)5-O?@6-Q7q?cc(PMrjd|tB&EAsO1itdB%~CirMvIM@B5u|Zanu7 zHqY9z)|_LEIpQ7f2vbs!LO~=zgo1)Xk$x|(0tNNL9Q^ge!$LtpCv!ti!3WSzDpF!l z72`y^;Nq2qsJti?)c0tl`wuYS8o~a(wi6T-YR~f@^nhKlDHPOGfwZ`&nw!Dj47hYP ziOYInmwEN4{pN2i=B#j|$=FUfPCC7z(Bxa`!i_fK{j zA941&NZ(~&w(>A<{#;m8RJ67&yrV}o}-Q@TmJjg5oWG(aohHrt#dty@uza7IIFkZ@m4U|a`e7BDWBH7t`>(WNWHH= zTraIX;#@A6M4uDfDJSzfnUA%yZ>Kv2lSlEqZJYH7yDE!KWFD@4p;U-1Vvth*^W(RI z?NZ+3&X+xZhT>*qYu*>A{ATvKk@YCKm@+Dq&*1wJq3^btpxLb`{D37HO#&HV?znf1 z#PA$pYzPb?_2#+1T(Yab??z%?IR94JUTtNa+a-rtqe?%c;F&+HF(=XT>7W~Iru(OL zC2{-11n*%_{$y`Q|_S}oT{v(!NpGaYD-WUDOCQ|Z1!uydgd zq`Hy>tMU_hP2`VeI{L>CwB}%0UiT*hA5zQ`zpo?C>p9809X4%uKi(aYwqLJ@Pquq~ z)-{x#9j;YX;O*1+atnT+Wa!;gE_b?}l_sjQXH+i&x@&487=cD5>?zM$` zSV9}48JQf7!m#B*{+ZI!(hh>w*VUY7e`_WRw?BgY2wnershcwNRf+`vu=Q+wvc_WK zc!1O=e?Iv5Pn=?~kk@T~k`5^^*hM5PdnB4u<3<#}4ILZX!ITtfT|%xm*q`Q`f6G~P zyWK77k*3awH%Nuq&+^zSNsZR|=On6! z-@J3;d71iGCnXW7mLrmgm#t0hLF-icX)DdHa9-`~u;nN?$-slQO)ZmyZf2ZspJCte zVx0ddum_c&;e3CdIo<1Wu~5I|u-W>0?dcIWif@l*sljP`oJ;UxR+VuERq$L%S71mMQ_K<)Ty~leK>`O|v03EjZ+MB-bZGiDEa#Hicj%{Jr_SX))F zsdMB(wBTj3V7KR=vxSHIvx(m`io$iXu~Qq`P%suh&yVQ1_0Q5}bmD-W1Wc;@ZF9c_LtM|+ z9$?NNA%!9jR}7@0Oyt7%&zrBa_n+WCLjg& z(QAmCA{w_X^!l;&q@S?oC7OWI((UDe?*7n z{Ct9EUE`NW?RQKOq{6G->{inhOVKy9s)d10_$G^JjAAwV-v=Yrr&HS|Z z-DF^HP*OEUwJ_`_I5sJ5FX?GFXE9a&1hbVxf$g9Y^93^2FT8D2LrI9dTJ!1naZ|IB zWBeNWs$u){Q5$YW+oevL@Z#rbmCO|;PMU}0Zyr9Z_0v8$d(1%VxcwG6=z%xP<^;)wh$e?`LV z#VBsdwd}q?MfwUd-rV3%s{O1KY0zoSTklq+($K+Cr7P?wa~Yyc3dGjbV}014lMVpJKjiTwliejJdyDt_2Uw#*_1C$B zf*A$=u|kn2_Unsz!=6wK^0K|O4JQd4rkoDdiUzJ6UTEWJ{T6c4S18;Ju^u2b*>6+J2BIHgnm_&tgk>?)hbz~v6R`L8r4deIvncQ7zr0`3v+6X zk4ld>C&)Y>P3Vx5;}J)$Qd3+yf?u1qr07le;Tqa_yMLdmhD=a$S{HJv``d8O=+PF* zwLISLLkfzsbW*4s-vQlorr?m3p&`kj6m<+xoKorUiKF)ZmHA;xz=?i-k()VGvY((! zTL!$=ZqvtO9pHw=ZU4L28Z#a9Dn{7Lnv{B}BMVtZS_t&`5OtOfqlys0CUEO@R@P?q za+oN2a`aHZ*8ap>)uvj+LO3!$OAb;v#fUe}7!^+8$yo@|ow9g4(1mpPFEq?Vtm$A$HSegx=Ft{KOO`L z;NyXHxtdo?MGcb8a4p%?q#i0GI~yTmk%tXL5?Xls(S2QHW8{4yVQNt?*YZ1Mv@{QZ17u&2$Rd-+;&GybCGZHt*U& zH9}|by4?+#utYOJk7)eHVLrk!#R85U6LcJ^uSBBU#uVlSyKdnDFvDG5Wn3UyE&&;| zcbEtq?*s{;&G=mQOo`LHBKUheJ>59(IQmcQWT}eeFzZqnXW)_J5WG##x@5J!XK*Ea z0qZ5K%?u!{NwHIl{_r;{U?uKFBqN&8b@o^TmE$nSdDt%<9!5ixNKPB#)ffa{2}@bF z7%u3ySLl}eq2y64iv9On=QE1jQfW`O^Br<`mKOHH79@ya(;3c9L9Y1iu0zfoaliBy zGksOQKD#}j*7({A{T3ZY$!aI0jm||$6SjjK=Rn@8WvB8Bt1!yMDpY%mbO%X~Bkjiy z{N{rh-mT=GVC)l1>LqF3;1Mxd@*=sBt@3e+ReBn2bI*K!?5mIYP1~6*l27(ALMHtY z1dx1;<^pp$FYu`6aH3NWrIrw14Z=&i9ip8P zhX5hzOkqG?*VP#4ESDn-QaYrD9kNUc@v`J`#;O(yo{h3^HGPTxC^YKVK$KZTw3=_T ztxSda`C`vZb+z4%vY--|*b)S0_NA;*7q`Ee9(%ND)Ef^d!$-wJ>pad$oj2(r6zgb1 zu7A}v_06Cgic?>-J5{!x$}FL-w753d>8*C61a*!kq_fG-7Iw*v{KeO@q9uHedc^-Z zM#yVjIJ%xEeGvBympO!QWz}E8IL6sEb*v~cO^i53K)OSWW8n4y)8vKClu##nLU z*P0{cv%LU$k$h(E5VB@daLFzT2X)$?q@@=cDLD$EeH*&aEra(F6(-`M` z{RPpC)oVmmbL{dyw(~aEY&|RGKl!XL2zo$x&5_f% zS6}EWsw&hyUr$XF_>1bp-gja2jXrtE$_IOBq&*}5iUB?p=b-KO3y0BeU7i@iG=DJ0eSN+&$at=-! zqO7V-$WlEDp>1PMBzr+L!8TQKV)Sv|Fk$g!Kabjthb<|UaBAMb)}T|U#vI#cOf3h zrmy`R8x}2N>CIoFQf=x)4l}LI#0k6p@ua6?}i{ z&7BQayj7&MLOtZ)%i`;`vBf!yLK`)k!p+qGoF3&u>}Q>QG$Syfm#)jX%#JVFRHmQV z*@;cDTI_z!X)%l}J-bXx_@9VFkyQJ!qqIt=Bjxu|QlGQc2fzCFi?$R=&ZDdYT3%~R zEq{$o)M^gmWQQfE*vd;(>ItpJ<0BW@#s-qYn}MSe?*V}$n`-9mS#LaJas2dOtES{q zX^VVxc^L*BffSz_G1%RUEvf*n^@};(2|kA`pU0cuAknYclB2Wq`^qzmv#}#lt8h(d zL0E&#b6J8m9Dx~*1B0UejjGKcl!_9E5t~EV(|Afn6tj;Sr@SA#wrMMMq!8tyw*5EE z!OuGO0WTN79%1Fx-qWc@|1H};*R=1Bh~LUk23$>llxg8~%aXRZ_@UWwt8QOO1V`+w zG}egMEj?=%^X2qSB3c`t#7UThEQ~x>mR7CWq&T?vcIY2WUzksSW;01V?nOJ3&gXr9 zeV(}IX5Q&>EAzsOVrA9X6M;o2h?V+U-vHz#5Mn_a=%sODg7qzgM4gW%u$8j448~Kj zxnb*=;Ti}2TOVAV%Q-fcW<)~#O>o8{`_&EFjdJHsmJYH0CVV5Uq)t>KRJqx=TiC{IaIHfYWy#6PhAhq~P zZ|;xQFZG}TE8G^R!~l0jB!EQ8B&7655vMW1pn&bJz(k^k1b!b+SaDrj>3-;O9AUIj zAZYvGwO`&)UlMK7Z$&N|b|bRjy5$?fcIyzh)mhCG~od zA^is8aTU#LfQhOLvSj$TQTTC@U%_IXEf!p!wOF2@;M=O>hHFO1PIVIbT%a9YT+C3)A064UIlJ8Bw99j{4#YT^! zi1~HM@BH9MET>|;Cach}wi09m_^VKvC7vFyI?BCKidIoyYK10=w-MRPjc@v?{o$%| zK6h&mLrg`#P>%KAnp%PnL^1TbNND2V*)OXZtt9B#juO0FU@;qxx9`Wd2((>kUi7{{ z9A%%V-HO0xH(%h>p%9=F=eq0ZCR}E(4FxNi&(*@yU&*cVA|4D?N?gi?ejB@ z7nG{Ca3pToThW80uWrwGO&pluiO)bJS!@PX*iVCz&Lrybd%Poro)EN#T~M#vI55^P zJC4{7l7(n_5#POjis)i&Sau9Q7;wO&{(_1BB=Uw1(XjMgF!FaZL|&73CmDYOECn=l z(zqah1pt&$%XsI|^|`{W*Y9wpWyu8t?PaLE+R)Aq+SH&}EDlonaqCxZ1!c9YG^9k3l-5+Blu`P>H-7w3 zHOe-!5UHM82 zXD&3zknvdF2x?}6h3F6gGpfkO5I{9aE!lwNA1+9QYSrdj=3WCc^r!lw$e9mQl7IPjcbAo%z|8QMerqzz4}Z4!P5>(>qd-m2dOsLWKM zt+mpDXckAa-b-c8)}qoY?3cH(Q#A=Df+xM0oVJ??T`0hBeu13jxU11uMU$HJhGJ;2 zqd9Nm6j0)nPty`);4!zIPoJxB%73_58ITanu;c~Sq*?Urhk>!RT}#uoo?F3ZNT~(M z!;K?rMweFvk>0DQ@0^Obpp7QnjUuadApE}6EKP!Ii%0ytqO4ENVWdLmc_T|l26b{*%=%GyQX=!jxmEgzT4ph6_9>i_Cf`+B{suzB9{d zSU75<6cj<%@5y&)DD-7j{$n+0d2xw`-tM}qkcJhTpRaRR(_t^0v#r7|_1a?vNd!=i zBcRCJUmTKj!m*uQjKMQVdSS?or6sqXW)BhM{A5#~q^R7+0~6lpu}e7QfB7gEPPy^^Xd zhia(S=<~v3VOpDYk@hw2%U8YG-|FtRJ1zQsp6(2-ar+*ym+(a?hok>jOe&DE8!$ef-ONmn1ttEdP)J17my?$z9NwxxP86;>ny!5Ha< z_{DnM*i$lKhd3O_maxPYRLvi_FQc_a{Uu#cR;C>c0!)%^?*62GQJ=KWlQD42kUOD^ zfpmDPg8Ql8`fr_i7EJH^ounXFKz3mwPf!`#vXu!tlX%X~TYn*C+!VTDZoXsCDe!T5 zyG?=RUkY6+j(0pAi$oCS$JUrUQC}XT#vqZGJ*D!l{S;kwtoL0kWXD(inI~!gxyZNtVoGrv=s|z?sANgvrN9|zNB+pl!Rd*38CRBCV6-3sN7OW zXQ@a2MfMC=-r~GR%sr)g><8|EKTlB(3FDFjflLq<2VLM0HC@&a`yMs|C4AM%O zih~|B;abnU*Xe8Dg%f7fv^E+7WGv|NP67jY1SPA!2R*#1~85e5kPU`6R+xYm(NXu(X!jsBJYmyPjGU&MAa!@R`=p#+x8Bcv&{-zqL z2eOz?qTy9y(j|Bxxei3n#b%Ydb)gfFdp$BIOlyc$-88))XsKen_>-)#$%5YWJnSvT zL6Yq-GS&w*9+!{KdwHa<$(xy*{=}X$i(8ZHb~I9eJkr*~_7lM9TF%q4tMyH8mu!L} zGLxNgoN<#zH@-j((6>jeCLeOCs^K(>>f1JLPRrH}IV0#=kYVPQD3M`GNCnAZ5o5C{ zJF5+fPbq^pihhY*0-z{=JFqybEGPnFBtQS#h}@1(uu}p><8@#VuEBx|RUEY<>PoW< z(%CqFrMtJYeZ1$whmb{@Jvl1*)c8!yO_@2dM5M!)i84(Ty^OhUaT{Po%*r)asZOpX zQSbV!tK5SZ`P&uZnNRF!(&Vsk|Ig3(@r&mIImNc_yfDOEizoDt;J<2t;xs_xfJZfU^Q_K9GXEF zV+jjhHq_c)%jSDucWyY-$Fmec28W7$hT2In4c@zltF;gq9IZDt0FJH~w&e~JalP40 zTB_qAIYQu0?=?ET-pk#Lt&71%WD*?!DY5}#ofv_K5yJ}$vmR`WH6(+tvdnsLA>_Wo zI=}SFWa)}5Q#h>1Fy9i=nda_b=?&U%dUe6z27*jMsIAZ{`B<4w;NF%FIW5+JY&eq- zX;F1XwzQ3JLHzh4_*#J2@dgy`f?%!umpS=7#1!$6d-O(&HAn@KMIkN z{Y;_-=L$v0oGO2Mim)Kc)G}4$u#u&{el}sScX68EoJDHxv}>z_V1q|0W75I^Yf7t( z2HEgfVJ)hX4;5VqP&vuxzh5&)qHx(@oytHh$JNpMS~d_E>I9vI)m{GjMXGhhcSvQ& zV{@PJi_-VM!l*N=N-S4^ZWovB%-4fPo6e_YdqAmS#R%0InyYExPAPExE1-UqYtC=} z5sipvvM|>rt}doYc>cB&lf?bc*YkAr3-AWQRD5wvSgxu)SdmW9H|>@0*6+ zH+_jg?^W!{0zjehMgWN3d~&ADxd(+izX6^#9O$vg2~;YI%m`CF)i~7vIt>QpV@08X zY-m4_Fk{Q#>YUG4hr5(y1X9mu9~pgUOS}=C2M5&owPC--Wa4pQaI3L3w8)5@Cq;J) zw7q&k$(=OWU}u=N=CNOH?b)j08^yB@p9V*&B~~u{Xt?HmcaYj{1u`;~1(1kCGBvr& zVK@3C*`1ZLU!ullo@KqhP%d z{nRNoxh_WZo#eGuUg-)%=>E8eQ^+JOE#FRi%CV#-#tYQ+yG?)H$X?#YFgE`3*SO32 z16qI$@+Su}*A~s_ktBjYBivxWL6yVu|E&rb69y>RhyDosEoZ!c=wWxUa^Bw_zZYIV zt%|gJ<4i-X{@s>SygFt|`fKH22#LpFB7$@eZca$drI>hE!J8@ENakS*thYxNux>cU z!opOn4qCEWbmE;urUwj+W#FY$YAG*z0Rj_-XLRN zh?ul`l(cNPwPuDmpvNkp3x}0Y>T^H!cH%@TaJB7o2!O^WTcI&x{Fx*Vf59w_y9*jn2My>V z&=lW~ztmUSfydiI^NW_st_sk+&vc%a=0tmSHg4DPV6Iw`F&UXcvlm}X<4}d8v4wj zX6@WtUB-nAdSj6GP!Et$&Pw{9eA1o?2F_Cw8p&00Jg{Rbpov-3miVymyq)1%fzUbZ zPMhAULt8wH05}b4m&3Xqy9MP+k$9|c(?LI+%M9O;_?4HLcGTTz-hTwKBi3&{owuz5 z2MaSDpECOFCWCXnUn7~&v01cHb&WTzRc9KwJ{QB zqKZP68bU>Dio$9>ntZNjtE45qpEDH{aoJ;I0&OolsYem8KMz;ACid%P4%xp%B27Zy zfPxfQ@423tl06y!WmhSSV5+c8LXyyM&3MxEkX)$VbAt0P!SF{)8EBT{g5y2+hWg2HgFYzfMN(x| zI4r3@AhQlhy7)S#>w22nM17g_O}To7lW@_aXNxeer4BgGJS3FJna2U>=2fVEVU&sU zrCf~E;4@PQKP2SvCiPI%lc(_;9pY<2!`;Vs0o*9d9NjaM3S&YKV>>f_O`hV|Fya1P zMmQB=LYAX5cxcb)6_?_X^(W9LP9`@aShSKgONj~9OLEmTR*QF4%0--WOsTINtnp#v_4?Fi?y=__-fWy-7+D zV}oC!27(#M*TBQcHjj&H*4WjT3Cx1+)8jlF$hupy(PBF$WDbV*M{QR>ebL%+PNG@8 z@7L2=Qc8S?M~t?wP*$iQ>?X+Qy83r<+vP+9s}coHlEo$&DocqhMjf61ARIK$OrJ z#MA2GZGtV8po;`bEbf1B3T+1JrfefqVV3m5xln0szOUW3nCJQz}Nzrt&b9q??tPOmZAhzrMy9SYpL7C&Hj%c zz8bGy!=RDkq7IDA7h*C#+b-Tp3dig#wItDWA}=+XA&pSER`s`G(KhR@O|6ergzQ}! zPHbMrf6h*(&}*|PCe%?u`sZ=J^FcLLk)_e=FJ&;JBr_>2fS%X_QoP)-`8a-DEAga$ z#>?9681UV?!n;K_bgDBU9UmIBYk%aSX7Qd*vtg-F7LAYIB2vS^h3&LXE2N09Z`Z>| z7>9$8x}@RIqu%Zu-2Q35-tE!Bq=VrG*--F{ei5?8lDe>*@q+ZNL2>daMvP5S-{>!b zuIP8GlM%2Sep3;f8**LpDDB=i3%fH#(b)B-nI7KDAP{pwq`{I?{XIKs_dcp!G0%8r zv)qujlt{PlNrVA;BR|&(K;9oFjD%^`&4)vP640A+fssZ19|@s-074`C8lVr1edAQp zmM);V_C;?64b$XIT#+Cel45+TaV|R5lF{BuykDwwpEVn|ZSK>QMP<;CqSd-td6^Fd z{0y)US2Hd&4ZZ5rO`CCTl?i}BieRD}rW`CaG<;Dfno+h!z5lwMW+#-UD0YQgsdgbF ztC#VaoOi|1o-Q3>z)bM*k!%;yukelM5ZeL;g3zTEGj>6Na!?toX>isjsoqG+-5F9n zVu@WEZ8FS+falc%gCHlhY?K|nTie3*WFMNnB`5pBmitQ#_9=YxZ>`ifq@^KHDu!pK zsvjSIX2Vaex8 z2#7bjrHmuiwp>7{us91`Uhz-N6$$9t!x+=l!L~9Bx{;ZPu)ItXRP==&X%g#roRiB# zS~U24V5Vv;`dTujew1@wZ)T2FF;pxy6W;R(z1cmSvA)XvQ3Sc(a=s#iu|eGO@zmkf zA|ihKsOKPwyfw1XNg}L&xPwn%Ic(}=>k955QnzND<}13qcShy{la57GL8Aj&(o)h^YN~0_~Vf=d^QsF_WlM4BDKSJgs%5 zp-$PJY{Xecg_eSF*(`2T^8e|V@g+-DHVZvz8etygtJ^B=X=$m6dE_tZZ#gH}E*jj4rG zQT*KdwBn+PpL}LC=weH>%b_)Cl9CwjUpgWo>Wv$!}mJ&FK{oe`zWRr$~U?|8y zTh&$^?T>{2kVRAp-M`h11{*Bo7KrK*Hyt+7a`%7vg?QC!qeUZohK9|BF1xEuBYni^nq% zYCIC!_0-wqC+N{wcb^?Q#3Dpvmd0rr`xiHM}0nors3iSOfZ*g{Z4Jw;EIp=25B;^kQ% zm4%8xb*AxVEA`v$tSoa|EjEYP*srVg=Ulnmbz(Z|iFMx4$1AP*B@QB$VIF7{Wiqzx zU)7BBjoceoLB99l)VKg@j{bsaoc!PLBs5e+s4hKX#5De>oZDAxBozy*Nm0?s6lDW9 z5dmi=or>@eyVrQ+^FL&KNR&OZ# z{s#7oI+-;YEhcs~$0Ad9LH_f{F@N4YRYT}G%%;_XBK9bQPrg<|m?;v}$?^=od>I=R z4>GHNIFnu+tT!YJJDyalQ0Yj7d?urfE2J~kqb5c!R)gI;tv*Onr28fotobqb)|`rs za_RBrKlcu7u*LG9^S4<-l1|}}ATya{DQB29sg^TiqjdtH-Xg8GV~UQ$qg!B#LIpF0 z8TpcTP`)FrX_B5}n7ozMiOV(Z$&Hw*HV#{=p%Tl_yU-6&wHAkIcEghO4~Wv6DubbR zomiB4VJJ!0wd59uNp^HCV!>$0h$$gK{n@s=T=sFi>{8r3-eVA(S z79bFHVu=8bRMEz+HvS*!rk2KFlb6I4sB-;7KB?$Tt*Z4!%n7({(-&c#8B9%IS4y>i z0tF~<4GN1)$q1R(_3w~++pW=*IjIP56VU%bLKD8Px;ZD{ve6pGouZxvw0}JRvEi{h(cg?~;0Bmj zH{0e{rzc`Xa*~1HBhg-7ZX2*o#HHxyk>zE=w)mzMypBUMCHBF3bW_uuB*%W4fNW$* zl+qpV-#3rW1=A)ygpO!ke`fk`cR9Uv5qPZK6;Mcn6Q+eZqNO$eMtY?5UN3|aiuB|4r;OEx=7A7VTELmd>^0S6Od!aDo)^VlaL zMaGJl1iEKUGg6x6&YPv$;7+Qj{NE%e`_I~BrBjN5Z-o0F-}s#1{jb;y5Q5&Pu5G-B zmOx8}8tm$`31ML(Q2uk4*d7ll4N3nQ2KbA)P_ToF;((M5}xnAA=o7hFks*!lZS&m-1nS z&^-9aTh{DB{<}&EB0d+}7V=8=jz{fY>9^D@b|MjrrH*7;(&56G6%Jl()aFXMh>Wj@ z^9sd?xKRp0nnLnH7baw%9d*pG*qWsVowtR&Ca-hdb7sG~1<}#c($@V6)c6qg!+89h+Yeo= z)-Bik1k&_L&Qs-)vXH?18|xCl8~2d8qb=N`c~TI@bBTzI#HzpVf#$x<1Ok~3f3(19 zs6-&8%g!WO8yB~N(9NH7y{ec2>0EO%^Vxotqz|0c<2J@yC+R2I!ATr^*uTZT&N)kF zA>*_4Hrq|&0t5#Q6^_W>w~6?EK=|>4YUd2W@n>%-9z8uHQm0YYdINZ6l4opYOETf` z=Z!sRn-^`1X}PYr%s4gqMP;*6XSx}Cj4|YzZ!(#S!B44#rBbqDip2{n*HD;?g`QG> zOzf3|SAG;9i%mu#8_p`$e$7rMeuK&Rjl)d6}CUYB*=8K-5t@};lK1|i(x=W!phzAKP_ApLU{Q&*YEW_(%#!p+KQPMh>u;#5`oZja)E3uaFts={c!qy`E|Y zoR=QZL4Qr+c`T~iu>OU9F4VA-!RDk^e6($r@7y()i?>OOFPkZz|4~-S^pCt++PqKJ(9K3cI~BIbV4VIp(zc?h8Mh zt9md60?dU~P?Njq)6UohNg%qsEci`tgpfA7`DpR((T_T7&9tqNbSI6^n}z(Zh*g1; z{D6r~By_nyKT-d?H}dg=vu}ZQAkuI!p{->HK8uk^BLE}H$r<%2lS6*@goLylwev3n zn64h#t)=a6^@vSo1)lQ?6p_3m$~iUvGh{@=zC9syXS2^FW}#g%B|(JN1n`Z_F(0t* zOG3WwZa^=yR{ho7_-PFn92U&9X|q6Ey3k+GqYwLm=+BnvoRtDdFDdc>wK2ndeTF92(qaS93u)jxGk_>mz9fESIc%k$dOV{aGitghzrhE=}Sr^mZp&bkvE z)vH%;11)vHnWr}Ic*O7ij;0=D=Pg}H69bqqfZr-AYi^Dk3ivDJg1Do1L1>4C>z)lO zpK9D;{n>q6z3whQ{H(R&6dEgb9%!4;u`V|o`TI_m=9e*zro!i1K2jcP6f~x0LgeHG zVGiWUbs4iqkf7S^TWUe+VNAI_b7GFcz=CcbbS9T2o|ezU1%%YQp$|uQp%wituvM_A zjl2)vCo$mN95oeng7eZ(F?QY#nHcPDN@X`6}kiq7&*rw3#1`dt~tf5QOMxaKBs_n zz+~M8qZ0CV7-FH*7@V?MDgPYiv%`Dl?ZiNO8=ZF^jt)Pa_Vx5}zWUA+7XfhL`vjo= zG_aJK(NJ?C<6d|qcmd}fC0(iekw2Ec0FYgXSAKykFN6Bdn1~_|-hQib!8m-8Psp#u z^~m)FU}Ia2&rBOgV+aJyY!3g0nk>)~L40gjaa6<5%jN7?qz%XT({4dhVFNsw z_-<%wLPzp%M>v8rtA2-_8dy&u6>iClx#y7}5}$jAZ%f_!sO?Xnu|>$WVDxec_sP^5 zuImBKPt5*X06+1I^5@RNZ{L@wRS%YOzizJ|mh3tp7fw8W6vgmDcfUbhRC*)V$NdCI zpHckwa0$mElf_kZ70QWgx$EP7yaz$n+qkeibPYQigPqvJN6X-F|h=;fxM z{W0*4x|p6?@XDS#5y_PD;^KKqY<&?p;{M*~Re^{;&0b31qX!)nas#tm=CprwR&zTDox&kH!^kz1)e5pAQDWs6$$-c;jW3ayputlw< zA#q)H*sZ%!U9;GlEl~v_S%*0U89&zGqX#S+iQdu9OEU49Y2)6%fG;LLp&n463h$iL z2m)F{d^{b^Z$6vuKm;r7X9to{I4%cImKqDp8H0VVsd$!Jq(Tb1=xvr+HYWYjiDg-XJ4ro>6Kd4PTi4%iYmigxz&X>9mqCdyHzub5&7OH~5`K@X~&UNki@cMy8l(6f1 z-)xrGy(Ya^J8$`%VG_mLzkKNYcVQ~gPoey|TEB3Rtr#H17aGK)?5rx{{jra@<>agRA8G4=s9fYHCJf{qh zVF!eokO@xz@9B=iv^n}MpXOX)uSAfu)~|fiDAuu|SP}3fCCdDty9RS0QUeDA1l9lU z?HeglFXw+#SS$U6b~dV>3Ci5tL|}$#OE-c>MtY+Dn%wCml?##@_WE6>Z?ix!&u`qw zlO$jJi=(x*@dnUGn0LP3=fe78c3<#4 z%aAY+5ll!~_O!wGib-{Wxy9Um?o{;L-LO=30+8#47E=66(tf+DeCXAck&(epSd|NM z?O;-PlMjMU82*Lctb{U}c!p|DI+sk_?FW!T$xa|B;{ygH&xAKf5EyHqU&3njJ?s`` zWg5f@yM*DBLx;lnT8goS!at5a^Ty6zF+rMvAqsttw-qGiSDZ8s=OGl#SbbDLz1T!6> z=gAS%T6B9FCG=8@Rw4%48qZ&@#;lq0t1|wGa!@B?e{NGPmo0Gjr-iA z{O39BF9jB3>BJ{d<9YEN z#F>KaR9K;c{TFtvD8DOu&VEPnAHJUmN@ejZ=oOxq*w25)Fq$n8nIh^P(%jFRJp@(}f57Gssj%&NLZ~QXJhA z#Fdqt9{#3RWI%7O103%9^j`jf(-e2m(hC8zmkVsy7BnaPA!wu|8ro*qx*dR*_%r@a z7Z4_F9)WMEolwZt;Dx8V68D_?&=Z^@>yWLuoSJ3f4ND{zx3NYs27PN--AG=9nB z=@B=7*q$!rdrtayu3YzdYSt#hQgDa81|E=T3njGP%15?nl!oW06$BgA2DlQ9OPc7X zp1sE7bGG!5R(nxyFj~cOtgEqRp}}?PvYfnoNx1xC1eZvT?FH06t>NA&S2t_iq|w)d znKWgX&If8n_T#~04mn@6sbPvm_-XWq+l#a@#K1q)AGw|fR6#%dhuWw`q0jI$cVG@K zTv6C3c}1Fhy@#d1R0&ImaF+zS)@@q-<<6JiXhIC2zdZ*NaN((PLK|OZ@s>(;T=4}^Ov~7%C<&Wx_%W1dWCc1rEfd9 z*F2rV-6Xsx4+0fULLefU<#ls9pBRK9hj0($IxxdJFv@#CMwfQb(NAEl^^I+*QA)>M z!YprM)FWFqWS$ySrd&XJ#n(ko>RT2XPQQqqk;vxvFCHD!NAv^lil`DP5UOgcIXO(p zZ^9xac5sr>8B@MgjaF4%>*d4P024yfh14Z@+1>;wAW`HtfS%~jZQKgi$CGHEg(8$J zNNx3$qg0WG(12yZIUk9D`LVWC20q5r_dj~bmM8_f@a2%_!q{sL@UNfB@$sK$kkd}J zc|jasys*!xHSiE-72>p7Ji}2L7hdx`TjXT_*eUFCGn-4!v|a;<5nAB|@4k^Tg~z&R zd-BaZ1Wd?PM0?N+Ih3HCHM3N#NhBmH@R2xqL4MYLS2R3KQCy2t;2RnbnMXgxL08a; zI-z>YiZv!G5sI%7&JE@EfVVE0oRh4frJ z=)eHgTqEc9P-dkz#V88mX5~vG?#fK*neL~q6DuQ;?XE8CLc(`XTiYu*J#DwYMCU+4 z#ZC)zyxnpeYx!9Bxyi6A+!dsyOJb*gu*zQ-2VJv+Fp&6uwrn~SAN$JLrr<{;^lvqr zXHrPLa??S3-_Ej3A7^>0+UQI(2+R|UTx5avAo@#=?re$R!u4;G*@!&A366BZ32lgf zo#WS`+BNp|sWOfBCJXc}*1jFZ`u{@|Kt$AG@)~@7Xx^C@#!fL1vZHi@CKNR-m^%G> zSOn5f$9BY2y~0lGUCU!T?ZR~kfokCKW_rtfb4FL&VA&D5QHf7%xzoVvy zTmDUsm-}uert4a2?#7GdJQQ9Y+1hyZ2#K4IXzhsEUEoTpzly@uuGgIxwkJ1veL3cg zEi+!jFzP_{Fl)Ssh_q2Lx_MlPM0z!Yv)RHR*mvstLgm-b@0(v5PYNh73a(=@j=Ock z@NIbrQJuwgG@zAT%~`t6{J9zXL>dxKNO9az6fIbw%0&Ea2-8RlCnJ{^cHfF2SJkF) zjdSYuU)Vh}*m)+q%e%X+)Vx9q6xIqfb27X~o;DXIQA1=$<6q%HXX<}H-Lvc?)kVc> zF!MQ+9V+eEHk9&AAVT1k!0g|BG;B2d@{;?x6AcaT=&BRnjR${gDi6#KIPq9(BLT{{ zze!lGiT!)INOYpcXkf(y)|?o9p-y}~CO(m<>DWKy^w)8$`zgI)`GYpOH`3{J7$oq! zmC2Dw=T8a}{Cr5`S9Dy@URDWs0kp-WleA@e|4?85kl*ik(ACB_Or)Mivp;ve$z?K6 zPdaN%K5;df6u3h9L)JZXt#ugCfwC0KjPZ*nJzRX%LGCcpiFLE@m(bxte_iM>*~dg7 z_Mm4lf*~vglr8@+ya|*~qr|u`GS#inI|&&Kj7k=$<|we+k@Zi%m=eI^O^X+>sJ^g3 z9}M_nKsRh9oj;v{!&(`-btSYF_r-}W8vjZA-Tdiv83(!{E7m{he|tDtoWo(!=$1+vw*~YR>uIEUyz_%% zf>FE`^I#@BJ9&%6Ei(6^b#96|ibVbHjC}|&Tm4@0kj%>vDbS4>f>MGXc7HL+^UWF$ zEDGZv*6nQ)Ji-xglBL+zrrpA{G6(-)l+$$BR~;mWksBw3hiRXG*^RG7w4QV{N!jJD zlU@@#jp?Dych-G=R03`O9J0{XO`*1_5XrZ6Pfa8hX>&@C3VPHixI~Jzwz=kYL?aP6 z0#}^<0%!!~1|$M=05z))sLlH;(h$;}=I$ZTmfUp=RALcUG|2hB)!U z&~vT+9Sx@m+{b=#y=w*s`oQa`GN-j`&&(6pPv4C)AK%;7oh*tPQb&zY(>)Yi|M}(C zh`L@rPK_|~itt3}z31tqMVPml=P4y4zL4t4<^(mms*rvtM(1{l56+ZT!lQgB;g#4L zy^z!Wi~{_W0DxU0V11hzXd7k$JSP9_{!*^o;L51VXy|-OfWC)y_jI+Sj_kKedixNK zzZ8fcePSS^ODJ(J+U8f95HsV!!JQ+SBbd(D@! z|3V4w9VPetyEeizwV1P%QHQp1xMHmB1vMFy2eMQ>Oq@5Uv`w~q2@6p!1EEl5yyF{! ze|eebN2z%t-=s&cIY5Zg_P5#7-LIZt|At`8yhFH>F?oqXEFy?`CH)Rze~A1k{W8Z` zkN-ww^`zmr1ADvs?H0lR#oAj(W%aFZzer0ybT?Ac-AJpHQc}{TAdPg_gCGdf^$=2u zgdimy5|V<1bf$-2jx{5!32?E-~EQ?kI*auC|2Pw9}34|HJ)2qBNZVnHu}d$L#L=?f`n8 z9;y=nb_df&(1Czk%D`VooANuFTeEp?YAv97_kQ6pB#_9;5cmzM!Yhr zxm9DQYjNzsC`BQV6Er$IzjSuI5kWZ!m1LCZ!6q{(rIF;R)s0y@Z9Siui|rH>6&ddw zjd0ob>3DOIMd zw3k%3fFe$`kE$$aT*tw4KC1{CS3h#ltcGv?54@Jqn{>)lWW5&?vp!MW0K z*Hs+Tp?;&l40K+QwF7Qvs z_PcV6oBVwAMJ1VAC{ty_ORejdJigRu66iiYn!@whsVh{Yh?{rngKWQ*10UVqxWyf* zXMjU+mD)nQ3U|c@kX&p>fSqYn{QXacl!0Qmz$2vlPC$a`Mq>Z0Xld zJgc?@CnnAA$G>_ee)D@Q`N9uv%5xDz9=;q$)XBhAq8dgqm*19X@u}_gzMjlY7S?HV zD%Rz+K8b^O#l^(TckM7LlOpL=Lld;i{=Qn#KU1(6AKQZGgBJT&TQj@@Mk0J9S@6T> z%DVcL#}1%PuJgCUHqwlp;~}}bkN<3vf86&clg@sc&F`xtPnr-D^{}4G41b^^sY1)- zq*$I73ns7Bo1V-niyq30aPVH=~K0}Ew^ZM*v!&tl&)p4saZ zz4`VQj$EsLo4PRLi5si5pn$aN`z0r6fldxG;Kcg+`g zwe8mlEJQ#kOu!TdIeuh-J8}Z#KB(S_78t;^$?_`bZ@+^8Kh@X}W!g{VE5D3!M=E0(4mawwhg?d;o+&g@s8$g2nVoHdEVQ$YR4<{dU z10K8IqRPnbuosbhIVqit0iGL{=yTm&{OMpdcy$pQaMfObxeSS4@`Lk0S*vueik@2u zs{sJ4A&l@Q2}l?XXr!_auQL)Dc<^z~7sI}*IECN}mq*0#hr;<{NM$X2xu3>)A|>mY z-^J!{g9)40?0osbEfoC6N_|wVy4mLwS>-AtMe8F$x^sA{?F=~iEWPT=cF6C2C`#0g z9`dL1PuZw9Q4Gx+*}pqKOiu9L|EcTwAM0+(&&Wx@*^`62#g$&TChXb45}s@sA8nn$ zb96HB9khOvvOeK9PPB$ZTb|f@_{!|roxoL(iox!H|Mv;A`}{R2%y(<-b2?Xz-S|L( zp+j9hu9{hcWh|{!8&GoXw^}=)mbFk^9MH#KjN~U9|Nj1(KPGnJA!IlHd|Dh)l6T0` zo=JUTwVf40pXtBB@Q#n!o{APyA;a z@tc@P+&f>4;%Q?=2y$Bz?L-|gY~1U3zCORo zW)kn;8-E2}osGJyY=;9N$CsZ&W`ctAcK|kh#2rx9*Np3X`APC)g23OK1jJK&ZwFHC zP1ernUSCR7Pt3B~MJ(>IjFY;(rwj<e^1&VXh750 z_Ot@@Cx3e@;M~dQj#+Af0(jKvVuzM$!)WE>22iqV~=AuZvfNpKg6I{-VTA-+@x{03R zNo+qEF^{tN0Yv?-Y2%TXKju&ilLfn-UP0`RSWQPofymf=B_3-^OWhP z?^+DXz*?T0m@`flxfD72+;KIY0=aZrf%fs{4{gRC+F>3|s$q_cuk0m0a9j}!d0s_t z`iaz6aQL1Y`u3=5guTAD36E+2#MwLXx~323(@8qT4Vj0;QiZnO_3zDV#eMk26H2~A z(stE&^OMa_Wogee<`))Pf$e$o>=p47YQ8T6IlMk(Sk&AHffaLrmbW&SyR#y!jY|{3^{9bRJn~s}?Up1{(zi zL#{ywX|f)m0yV2QV$%5cPPfn8o$b3m^PRZge`}|}>7=?o4u2Pi5M?-;dmr)WKB*bA zOwi#X^@w4*n8?)C?n3ht+S1v%AB|VfTzhPfP_T!`!tT=fSD=bb5MS-KIzG?7POIZS zh;xlAGom~1o{RHoXIzrxPBA8(zx1To?Nls{e-a|2G|X7AX;bl#@HHlfe>7c&xqWeT5 ze_FEwyrSTr8IvFDX8?fv~TV4DdX;jsmh%2#h}$xvv$wz z*zs_D2M%23%?RqQeE0G2DSnxt+v=)f{P{OcW^f_#Q4|5|Mua50gq3aYqb7kN%F1iq zT&Zy0{xX>(@qG%x6SDh#$s4HAp7%~$IV^}(T%H%lca%Kr>Ex`7vCDlh^sNzCgmM5} zlH|~Q{d#Lg{qc^;8)m-y4jg2Bc~pj*9>d?5_v!>Sl?olK6_4rFY+7CNe(idy@bYK&Kag zX96COEOjL;0<-#?`w7^m^;)xsz%9^N7D3srV1u-Ns_6k!|1rQQX%}Zm3$RBCKHf(z zFgkPRyN94~8~l+HYJoClMVlw~zN3VKXuN}dxt4W#N~jY=_R_ z5(rH_qW*i?~u^Gj;sA?aN4WrF?0G=rY-PtKa+6 zD;iLH2;1o|)%P&f6Fu1nj!n{t$SU%~8dJI(^yPif9kzKCPa`I4^o;^HDFD~xim6ZEK@WgF}2|(Na+GW!+r6+#859j`IvF69}D($OpAsr`{HB|5Z>yKm^xq#d8~w5$Of*V4$A z?56}qKz&DjalDo6ZfN%y^zPDv$GEK}tK^LzhkY&kgcY*nwl-xQu5&qngYAK!81Q8z ziJ{Xcxp}?c$GfqlUAqvbtygo~$LnZhJ!ju#$5pJ^5v}y4UwEp-nu1JIg|i~GPNpq? z^rs3B4MZpq@or`Uz4aAQ6JR%fiL2YG5?1o7{5Z;ZaawDhv3AE{#KKyy>DlqsPv@yG zjURUdHfpo{CaZzj`wh&i2=#~k!E(=Q1SS<9r}K1=cy-10l-~vT*^^DFT`yieGA|hA z(7YF!s(CWH*->))LA%!Li)Ma46}Y*3wr^Ms@_SWkH8{XB4cHMVJyI1RJwu7)MAG;- zx%Gc|3q;C-a)t(~(ZSDqA&$O)H4y?|f7|D~7|E*IjTwLc-yQCMb!`6=%X5D-nZb80 zQ1I2_Hv`LSP4MSsak0GW9}7S%Hh>A9X{(q%BIH(rOefOnxY z!j@b?iDAcH`S__63&;j)Jil08lA2dPQpJs;faPz1pC>@p45A}&m1*3y$;DhOAqU@f z0jTLe?*aaQN;o)MHBFHHXnnZdKPvE!>=O_U>>+_?-nD!77M3eHukzL=IaHkm!!wC9(7Lpzz_4#QS$+gi7mxHCfEWma zQ;*{-p9)D0ECvJG`(+I-5Te-*E+H8-)PZeYWw4(S`iU&yF#yNe|A8?7539rfJHh!M z-wd7V!RrnVEUQoehj%Hj(<2bqb3Z@%U`}7y9H2`0KzT6=gRsH0EzF#-X2+?-29vv+;^S--QBqjOc$8o zs9@y@Y!vnsqNH7&2d?1SzU_f`F)UTUW{j|MSqNYj$whbSq9#H3q65ORC$zFkE(Ju7 zy`mhn&>|D)_#rcM19F9aAAv=(YJ*UP^XU@NpNcNp%HpN2*74tf=z4Y7qHSCwrMF`)5AlY$vDnbSGDdnO- z%C{7=Ov{1~Bj0_U_)t*W(9q`Q!I48{eXcn`6acxeo;Q%D$505cPy@4~kg?t2p+@dab6iNf7!G{CE zW>J!VV+_3gPe-*hCL3V6=TMvA$Nz9g|9`v*_XGIaxdwoBKFt_FML&sz0DyD}KFn9X zOJFq_S`Iz|o7IQ4O$-@xz+?n}*$0Sx;o8TZm4;fD-mB-rE{zxfm?9Lq@4>eutJv*y zDKEZ~pyfiCr0VM=jJ)9Aqif`>=sJ<|7Gw{9So`Qq_wrF0X)5o725#W<1MVbgNA79B zZ(8bl7dzbS-rn#?J?jT+0AUkIg*y7lNp1`7+uYO@NJb@tGJJmEGbosKtO>~cz}d0{ zq1|^OXN^}T8*v6LZQB8Tf5A$JA7})@4l>FQG%~O9hAZp`4s&WyZoX zAYpncJSrDZy@Q-Tp(Hb*CCC28IhW7dHIS9rUFv8^zIxVzhCcjXk{6Vog~tdINC*vA zQ@9=E;GpA|h)CI=-vukdsxb!Zo3LO*TI6^0x^N6C820>xZ(9}+F>>t2ODn~+wr9T8 zL}CVGeEM9SrbfVCvr|1`j-4Lt6X_o1G+pZ~90p~JOuI0N-%R#NE~Z^+cYZ4U#w8BY z*VX!*h$98M^J2t%$J)UIO9iFDf(IM0GIeTo!XCG{;Q0BPT*lwmn>|Gon*odUrS1(b zlG+{r4j5)hK0q;A#>{>p85=vd!4rSgxvn`4h^>tt*hZD{`@XBY7qWs5Ha467U0nbf z8)AssTV@7$vs}m2w~y_s{7Tl|f8kzUq@n ze51ZVKblf6fYJ$F?i(^FEOe{^rv3yhT42XeLyC(eV*O2w0oRlEC2RsjO*Qw6I(qXS zQk@eFe74|Dc)$%a05}Z2OD|4i43$wuS`~#&>t;afML3p7DL9Az<@VMk(xLw!-?S!x z{jxlnN2GGMWgzTcU!^&(;C67spdULx&D_&#Bx>ie^G#0&n4U~J4NLYa1rBjU%zTwe=qy<+~E_}vlz9o zAfAFYB@x}QxnKGwa8gBxDlg%Xo@nmGm>faqY~Xr581%vaxCMKdygVdiQJDGq3+-9h z9?)C_^v}k(i@f;$7ZMD>3}s%jL^o$ZPZs4@^YD)%Q14 zyG#`lUtPrv)cj3>-)qNjhoG-ZSFWQMhVH*~?B2p)a?7CnzUr{={=wkp=b04vM~pLo z?+0ldbrKN!j*NsPkB&+UF=U3A5Cheioxr?gx;5bsNT+ZJ+0FnEq8T`X3qF;n{-XcL z&FHfu%v*TCv!vI1Q^5XB)}@;#&9S<-1togPO{d(@} z#+Jsjq5B;Gh9>`8fxej2##TV=7w@h66qgS^KaZl=(@$Ckj)1#74SRCl#lM-p1KHY6 zR~_KJpB?@{GYI%HIZ-UcDVjn(hwKn$>d+buB>+!=df_E%tQTE!58nYv<;>2*Fq0+L zW1uz>&mzQy`l4$Z^urbF|As~ezeUYfhq!N%AI^}fJ&dchVVk z@pXgKCuj#r1B4^Q)F`Mh|J&&TvG{RN)f-x*4V~$G+#9Nl^O{Y6?1_^MYzkfpsX}Rk^1r+on-G7nf;9>yv-e>-h zg~7B8ApYQ5>Y^yrNu2pT0qt)1z-ao&Q_vZFEs&)T$^@ps9{bak!54JkKuz_RMIS|? z|7-6MYEJ3T5E~(Ex_sXU68Eaz>sl&8VTqv83a$^?a~o7Q3!p^$d`|)N&pbVW&+?~A zo&0vcQETGYN^ckJK&1toy>NlMq!jInz8qsXb=J#9_rp72-IzLpp!W5L z+af?yFvI|;^0!w^Lp|%md0f1hvZ}Vu_ZWYIssUCCwAra-2WDX1`J||q8+8|EA3Em< z+J)7ef9Z2jHG-^uhIB$qOQ7YMK~X(weURUM1Pa?^(Yv9d=bQr1iDO)PJfZ;3yk!Oq z8r4H?AS9S-f>_p77sMi`6ViebboMWlP0)=Br`u@tCeyc!GeD#=DaTZKSAo=+R!$LA zkahRE5~PwHzIC6qqSB>GqG+~~+85jqZmWQ3`lZ&tJlZa%%Gy5rRMiWM5iovYx&YjX zzqTdLM}Bc#QbyF4JIT}NkFdGwco^3$v8ygY=~A!;o`}a_{ftTlZG$Apn?W(ACXB5N zPTPMMx9HhhWm+#wDD3pySq<$Q_;}-slp&Z_L%RwASYb2p5{x^sFepTUBlnHD(ho*z zko_sl6$%A_7=g6|m^ws32;qq9+a-|Vrv}Voy`ZxQegYTVEiCXmd@_Mu%l@(QvlMan zk2J9{zyf44quEt@e4QjPyT5ZJdLjc#wtLn+` z1xIR2rx1ut4(yemm#A40zAoz^Qk3g(@~ZcKSxSD7yVC%4G^_qoJ;kk>!rL12*-T5W z$_T8s+}41mb`=FQSUaeZU{FOJ4y92w-V1<*1D#K(q;~O5wW`e|k-8`Y4vqL|Qd!+9 zB@y!}B7A5X+!ZshrGK%aq=&Jsj~2hbb^y5$!cq7zsP_GAT}0&9Z|u2%mOcmc$9CX4 za6An3lm?y_kl5}}KDV%FJCrS3jZ3Bsg^B&qQoUV~gMTN0>Mx)9APm)^@)TQ4Pmsqo zVt5d8W2&bLXUx>2_#_6J)duFT!P()r7bJQZDxCp)0Srvvu>H||d-F~IS*C;s9>g8e zRDykg#S?Fgm>Q7s)|st9M{MKxR6+=(dR{|x&Nh%plb+}S(ul&08@(s@Hzt0-J_44! zY0Nnc#uW=bCO_*WY~OhAnJifDF|Z`LzX7b%7x=%ub!jGjw#9v<^x9zEaA(bsCypx8 z@8_{TW4;6obzgf}e7xogv*SD@?LuGbM=YmJ3l4xr3j*f)$1*`mjc_N82#q!5 z#-d76m=mDiX$i*Ww#~zu2RQQAVi;f&+4%Ch8bj8J^UDRzK4StWKs(G zs58{(pikB&bvkV^HD>52MfJJ^6Pc5Xk<$u~*rsmCI}o|eBwD67ujfYfNrZo+ zG=~#}v<3yO60xdRd9{s+={dISF)PG5Cx@mmaU=0^k79ffaJ#!tEJutWy=NWW)gf*G zGLPE81*aLO(@l18MqZvM^IngXlRq&L_S~C4iihP+RFU(^TgC^;!B9Lf67X>$?#+F% z!YK-DDbt;t=^t6XJy`C2uOa>7_*qA}wx;IC3_;VDz$z?3DX{Qg0(cT)GyhZi1B?e4 zPn4s!VSzsT?t!DsEH>)-7j(5i~y}DV5psV&b>jP_H zKb941Xm=#UeN=+XC&=SP^A2Al*G9%P^>}--Qui5*A+!iQkbn!Rw|Owvc4`>~~zx=bCO@c>`x)dBER64$C ztK`9Q^I_0iYVkx^J`GINDRG){9}j~%z1bD1z z90o!Z1rv=Eq`V5>!@Rq=micPZ2J(kKMTWM(x8$a&;gKL*Z!S0i!c?jUHYO_aym}P1 z;U>HwvuJNH;AVtVEheJ!QE-MO)&wZ;X`w(YDvf%`@#YNYD+kC)I9N*szz8NfQoDJe zO5mVi;Nbu-31mnqs5@pk`vCRr9H>rVi#=qd@0iuQr>Q&8z0_t{vLtC+Jlrp z8XBB(*uXl~%KiepDPf?5tpBca3M{METF5!{+(4x$<0>m}!(!2Mf{cXonnM?jqoebYVY2QEv(<7J1OND)wU0p&6(=o%XgWgV*en3AGv|G zcJc~{WF||<8CzoDVB4>W5?TVq7$Q*V!_B`7z;b{7#Ru<`@hgkbYlc0@1g{w=1OL;v zeBQbJl?OOo()k+mKYY-Bv=QeKWy7QhIpN3=lc1Gc4hHgsgGEK6QCMccJD1}IfhF(> zD5MsGr<9X%?z!*q5Odf?>@16v+1d>&ABFun#k!~gW~#Z; znvTKc9>2=kgyzo_;|uWE7=q|cpiQ0wFF~RTSXvngM~DIdoZtI`O+)yLzBL2@sGWj^ zF>Q%ITZ%p9h~W~vxor~_7VRC8L~4>o%$RUw1)sK05vPB0pUKcz=nuj}z@y%NkvObR zM()fDinFa5jpj<=SdxmS5-BaPDC=T2{m=$YOghBoEDu!kqw<@Fna2utN_nb=keT@M zK?i@KJS0){r-fJEVMWZquQKeFz#!*_c|3b|9eLWH%9zf9!O;PWhLur(7D^2{M%f zz#DS(`>LD88ji6Is25?Y2IkzAeIaKNg?XZZNS*NGRkL-NBqwi+_ct)|svW#k7Ni6g z5)^Gm09TmWg%M_`h)Z+6i9>=jy`>DTn*z?WzetYmxGV;ZWn1{y2*oZoq>gyL0vsK= za#2LALAEr(CxRRwP)hun(94qYJ}M``US{ahB$s;n0_<9LSYIMj4TWfxiOxdZ_)u<3 ze89m?b)wuCY54Gh!`$J5mF4o%nSe@~oj__1kDCpX2;r~i52a|j&#$4@;GL_Yl?Y~M z;l?f3;H@#<(Jh#ZpxXt@Kut052r0t#wSt^LXNLvSxISh7ilR7n1k&uBe3@}$i5UYK zTzTk8mFs2$R+#tKiwq@~&tYQ}V_iV-%gjorF)-h1m+?6a(>2OY{CZFH-G{8FRq7mV z{D)(Gz$9WYj^5JBNaMEetdxHNoX(V>KBt;O*B+>hB?IMF^Bl(xO?~V(;3tG*2L-QE z`oX{haaGqoqQOmaC|iwoQc6e|*m?yxWDx2{bl-yEAILJ+!t&d&0UN{Dw|Y0sWb> zn?Q~;s`5KPU&{vnsp1F2@eYJ=86K!`pQ6j(= z@H0fa4iT>4sL;=|;8?Lu+83b=u?>lORkR#(eGLc-eEdE7=b#clX`#0bY=LC$)u1NR zD(xola8*ZpGS8SFz8mp|!^-JsU)=3RHWov;rK^d&%}+A;_zku|i|j`F z8anG!#@2}@Dxhv0EZ~w?eLOJaRHr?&%nOmQLmhAjOilXP9dk4z5l)cRd*aiPtb`M@ zD?MU+FaI9NZ=g{yW_E<7%`I)c>LhtqWwkRRbrv51*Ep!DB4*O_oIty!8SkwC3YUOk z6VU7I>jA$IiYqcbwEChoU(vfaf&I0goASnN<2RbYL)vv|lm=#)j~ux;rkFafvp>55 z83}{+j%FI5FVx=tnje5wC{2&tH%;Al^7`Q35q(V)Ok&}ML`vAT(0a!|q_a(onv;n$ z7$|9zN!NGQJV1P4>AeIXi>s;0h;XvSbou*p8Lca%|t3iV2K zWdRBI-Bh!%JzaW^FUt4j3Uc0^v#ZCi?cIIZw3~RZBI_G{7b>}_Qkjs?jFu`Zr1@vO z1*(Y~a)Q0N=(N)AA`0>oxeRW0gAp?w?4Fwu1e2!y79MZz$_+Gnu zzj=m^9L98S21;hz)I0}xeKv5?)>=n%bmcZhSk!iFw&G$2Df`IT+E&f~E)w_#3hB?> zpF#f8m}rY*(VRJE;F{3b-JLteHlg$k z3RNGxv1#yy#&8mUb1TdTsZI-^JNb>W-&yP-SMLaMAmz3e#2j)DiJ0?i8Ak3w!Bcpb zn>*d*iM;k4bY}h-Qw&CWnl@^(?=UXEGl9SS5=${$VvDPYL~)_0!a5_4WJj3Oi*Ei% zkiEWgUbTfv!>A9bqQHdGYhZ{kTPPv?t|NWUaNr@*7@e-jc#5wWy!QiRM;}Jox3KWU zu&>JqJ~$pJ+01-?SE`)CMnZjM0r2XuUn=N44>Qb|t_1YCjjx{7`6HD6vj>e>U; z_%_*3%(^&Z@F<2KdU1OCNBhX3qai3Lh#JXl>K}$|8@&to5`OD2;riF~O?vKnntHl= z#ez?GNfUf>e;_xnG~n^v=}6vk=_Yc*XNID;`d`<7dq+ll64PKt<1{m?6BcxRV=mh# zigCS*(q4~>uvKnO*FjW3J0P{ao2X$hbkHUj59%dzbH&{N;f^jA4 z@>ol@j1n-s1bSk+*wau|jcV=Q5lUr84~|d8w+EO{N1gAO!`bQspAe|ydlp=UlZqK| z%zPF~JfS8#%fx4Te6hVIDP5FlcciOzV%AMGB`VW(>MeXLwYEQu+j1VChgW1@IPkWf z$3U;n#!(+t2Jdu9zPxr88W*%$9Fb=u<^FtHVl8htNDnJ3cGS?zkH&M?|3qF-iYJs! zm}Eb7<8x{h=NGtCi5pLLSbXbD3rfs!Yr8U<7|D`kG_bOr&t``7+J9H@u0f9JY9H7q zhrPA^GNTyv*yFpNX0b-{-Fk1{T8S4@47}3Q7(p$a!b=JS_y#;19CGb>dv=Fv=R@XN2it2^vYp#613+`ya4fs!tH8s|)(t&p>SPD%KoVvDKH$3)R*mG# zz6HHB`wX`8b{JE*)o|`+uBrt(R~iJ$&q#dEue!l{Y7h1p+kO-}>i#vl>+Xl|wv`n{ z&`YrC%GK;>W+?+>YO21}eQgbN+D&?Z5b}>r5tBBCF|=?f?3K?p+#_BmU0A{)AVqH< z`G|=*-VC~sX?Xd*N{hNwzS{*gL&(MgIe{-zjfxSzwip~67*l5)C+=w){LOV3&d`5BJ01Ok*^`U4@w*w@4S>49J)i z;KP=xXLRz@GnuU$R~#xd3c=>0XQbwd3<%eBOu1rKENRTUugkvU9BAQwGJ6)K7_`Rq6-4RcKB;GnX1`uBn@jqnW=Lj>2& z4_vzhX?$g#eJ}OiH%1?a-_Vf;KjIl?kFNe^Klw8Q&MN_7D&I|?`%c`oCN&p(3nq1P zOE|WBJ{z{j=1L5w`vJyuzhF2-y@`Dq8V2VEjP8DntcJRWom32g-xJJrkH$|UHLzcm z8jH7dg^fjs7%xYC#D1*&iKtQ_H^uMF4|8P66*^IfZ8Up)<>&KxX~1E0m;scW{Ct0+ zH!SzTaT;W9y!>|<&p!uxa8f_ax;c8%wRFFK6=$rV^DU{G_x^}^4~*7edHu8cCmR=q zK$x89Ulul6;{!V#LEfj(*k?ygk8!fB9}+CC-VvK__T|qmg~>hmtN3#A1c&nu#PdaX zMw|9AdEPRL*T-Y>w>@~7i^u1g;pe)4dM~sHL_UF2!38+^vKzRm-8b;({|w= z1&KN=q1{TOoI*&L|M$eF|KJ7wx%_`nr2l~ppaZnBPTM706BYn-;w6M~ZcdLu*qd9nU8mBprx%zUtM|jeBDC z?G&36Ra}XJYW1baX*ML0;)DoV29g>WEr`!LJhj8XLmziABx7;dZQ!H zGwKmrSM$XVd1^BtZ?J?+5`Kn942%;X$9OF&9n9}J3DgI&KYa_+R!G>-&S*zLF##=8 z(y#0rcapCOlozcQ(UM*%$S+D~0YKNMoK-E&63SDiN)L|kX1ckzwnQuGOYQUuPS%x2 z#CMp10mCh&kbK9}#h}a9wK)BtgS|A?;#?dx zW(+;_8>MX(Y5wKtKikT*@8*`7_Cy%zdWa6XBXalo8DnkwQl2iMjWe0-*R;6TD)*Te zrDK?!z;%Hc%*D@>l~&X#+r7m4`A@}KoEWbOZf@B;nfD3ZLs-HfH z+=0dijD~72wK7N}-K|(MJC3-+@PYS`{vxEMT>)lR6XWSg@j)7NbA3c3&-zhzNU_^m zLwZ|0$fkgz83qQXhC#=Gr1!O3DE7GO3U4f&{14tG)(M-`L zCc{n@rJbaV?(@I~f{Nlr^dcK@6jlH!h>OG(WVAWXkM=b`C`I@lT)#kZ5~lZwmRebx z^#7x;;h%R~$AB-7O!AC3<@*B-cX4BH$0Oehso_aMy7;aW2BpcpIAlB;n~nKYTqRPSn!D#3%A?FZ44RYKWC4CdIf)FWsb}kOdnc*7pF?`T?T0GFsNBR$ zx2B`dV2S^-U!3;Y*s~xnFD#Q6ARnDr>-_-Y)yp48)P;p&jSU-#I~FH_w7V^O8enP6 z%dp_5Y>6Nrmd|wkX_zs0$Xmga$xncKVkL^(W#fq>?;N}hc{ObCPbx~(8#@ifpG;>N;d)*K@Ce8(zFS)=gTw!R5t@g&2v1bopUKy3-tut zp&1su=D`Ey(?n}lkL&iX#dvZ%-M`Suw}{I8=<}h4kNx$gQiPGQ^-13hVA!JIQ}Au+&^WGE2z-ep?T#E0ZF#gha7_bUCg$iN<>+h`mzHp4_{iv3Zp05|Y zC4fcwS zDbyW(eENe<%>G+zd&hx^^Ic0d)IVgj^mo@#2iDH~QxUJJ$9EG^Rj+-g1r8>fedg5vjGctqwWUbBX1#xy( zgx`6>!r5q~Gp=tneXVL8-lj>>+LCy2ms#p{QC^O8{}!-C_XBzX*rK0tYJu5J+$2Bs zB;C~J-=jR0mrN;KA!wCPu_dnEYs3EhwI3}G%YqEH`Dg;sYhkcdG*qaWb-~23OH)=T zHwx>9CLr#^B(v4wOSOlxrEkTl$DChbl3y+gzMErA(u)%$b(-n%=4AkLIMZ}~52_l} zHXu{V9`xEdZQV7hwWa8InRhT=!{lb{-0$dTV$fe?`kgQ@pKAlZkA{^|_bMFg#mT8( z17nt5oA`1{iAC=@h!JtgWFL?99R3=_&Xw$s50WB*zV9W7B#7S8*~$LiXmc6BlpxVE zACTB-@wN9?E}ZVXT-S6ed+@E&T;`Hde3t1Qk)9<(ZFi}qOUo~GP&ub5@!C5nxp z-~9XeMfbXA*N6u^-2A#e^yb0P=0k>DxvUFzj;jsS-Zh#`0g8G#Dbg7saR0cY-uO~t z24cMT61Q?OLXH1pTy(~{T-)M4R>;EfAS20}fxWT|0xqGeZ4{SD3W zt1EO{(fOdo)}_Og>lcFA^MvP-m)TYcl1MudSqCj&hj{Ny6Ghf5Rv$h&v&Cp8n>Ve7*dWV0d)@|oM$X9&0td-^WLVF*tKO@4Wg$=DV(W-Px@h$t-nUv05 zBazegMpw>*pn=W?K~XxdO!mO#w;q=Zjt{@01{m@La8|~)&qey?dIyIyZ91P{@@wc| zm_L@{^6J`!neC9VMO^(6mA-W0f(wtUKIil5Z+t@Qi7uLS%f+u~(DxT;qL2>>q+QqU z)0$JLLEkl(UC5(!pe4s4 z&sueS)(jx3?BlDo;S?=RJckAgVu>)J@N*d+;L1ALVck(xClI0~jZu!`#3eH#!o4pT z`fe`p3BAj*RO9+&xXwBg6HLLe!|ZV$&T+it_B7Gn5ECqQOql21L7;_;MxdyZqx4aa zGNqF}YRIMB8SHT=%31n53{3U_N7I0l1;-YDOqM(9XW!0kBUKxA61NJdUAT;^uh3Gq zef!}k1Fcah*IqAzJ(yVr;SQZ*6z0h<{0>DP==E5HlCj~33NClb>YFV`#(p<-L-#x< znf%uac=LeRbXMEg>1ttBc2zc;cMqw28^4~+yT%A6T4T$mKun1B!I0VEyj%vK5g+5M zJ@Q_c5Ph2Db`R~&Rg&HOwB*@Mw(LRejT6e4!hxjZgc03%4@%2ahO5(HkL$UA3tynz zpkF!NX}B%pwo%0G*xa;UG3K*_g{9wDXf1p_%Cl$O9Mfc{%2{7xT=%E~<~>{KH;vNi zlDAHz-IvL{`u&1#)y@)>$&t2@%O8v4wRN9+#+B1~tpslc7#<{TwQeqUei!nlxa0pr zsQzBpT)gDM*)oq+i%E=eK`lbHVIO|zjM)AmUOFk`alN8E>)K3>5vMjwH;%=?z7jn;NQ)&liG|j-nZXlc#||uG#(1JEjdf@DsMR=72$Uj>kzAvf1j8rXzstT)&-5<674y7^mjrbl_YS){qJm) z|AhYk_wXxpJo0_A@MIqZFg`3RMz;w&4$}DKyZ>;q6P+gqw_->RJ0DEReW>#n#{6|< zUJVk_^4C6!fkCqUj%2jrcbe)S5a(yIYd`jk+uiPsKx&48z`)Im4Xs~ITab|=mGUAOz4)Ar+f596315zPlB zJ=ms}VX#Dqy79FpbR_f`J8SLwu^Mo5h@c$&So=U}+KD=)swBQua!=YDun~pH!JXwD z6pV5~RF>5YSfGPZ`N|Q>-OZl>+jUyG_b;zChbbnTLT;GN!oh+9S_{XozSC=Zw<+wp=wrfCNNHmY%ysYB9 zQ+_nUgLQ+SV*jD{qt0C^(;zO;2LQd78)$~uD%o?lrxHBK6_71aT;c9hv}tu$>8lxe z(66|)hsLjU! z?@@PB4^^zf3i2-Emz*{SsE`g*^&byNof=)19Kvi<=>tJ_vyON15$I7wrkAv<$X!#$ z#e^1F=347y0dmiP?*DY)`Gjho^f>J4u5Oq=(Z{w~j{()PK7{eoK`i+!F-R=P6hb^Z zjUth&LIP;(cYZLY`*@+I*~;3}_a#Tetr`dQwW$vIfs2mk>6W(X)~ttam|wUK_SofI zL0jH#e%q8u*xq!scCD`}hg$ANG7_F}a30_?dhtai>jwd7SR`9S6nE1glbvrJj zX*R{6vyfZ(G1m2j=-0^YtPTl!a{^ZSj1gA>e&c&Aj9IP5of;YWTHc*z56M%J<`3Jx zT{0P17}NbHAIrCfKJGb7?!MoB)_GZk<)KYw(8ldNrDLIGc66!OFU_C;0B!8APmX+>yea#|iISf?ASlFVg#@n7 zlred_=H6cNk_gwabLqtvw!Mhe9Xy3H9jFaStiQ|0dW(?UJfsRP^NZteo!a}pNur^y z5=JJoB2r8lg}t?(ivO_KY0;DG~E2ER1gs94yp`%9v{QhT?5S`XN%Y z`0wv57HSRWs)UI&mte&z+HHrErRavG8<$9v>XLDK|0>b={RyEGmNT52cI2GVl!m31 z3!B-K`^u)PS}fKP2WF<36WO2M>cCmwL3fG zT4ob=#ZEqw1;Bg&Py6LfiIf!^eE6hl&)S;rjWOK(To#2kbSIiI)U?fSn7?5SSO1w@ z0`}8NgIMq|awPvh`E{W8?CRZuJdTXjRXJ!?-C(!>xS4Q}W|=CP)2En<-T_>|kxHTLda zD+b+!U}CSoMC}}DCo37B>tOSabS6C)try385WxzDrALrs^*j)DU$|rYC9yMU*}Zo9 z#j&}tRWETm@S>En+*pEO3r-ipra#5c#K58V<)Ss@xGFf?IAv4r+1($=lo&tj=t}k{ z^xg0PF{`T}J;GE1Uru?HWv^QWV5|r=#hqGuQH2H3^oKgmYV&C^iZ8Mt)L)YM4irldcat|um(crbos7Q~{ zi5Uchf7>!eWuekah88QEv^mNUBnpF|M8gyEbmARmRLa&iSJ@9kS`(3Gz~0~(4(7^A z{&fI_!*jdw2gm!cZjCxifV<)(Ue*+#NSskRkJlf}RsVkZX;QM)42-U`K12;-7{W2b zhN9&ex?O2q8_3>$H3Q%rQh@Z*rQ1va zh)44T_q0r5$U_Xs|-ztD$Iw|?wpe#WFEWp+v3CYp&=hczv;!>M`ZB6scBuQ38AKIc zg{Ly=vDI~TFjLbwwptdPNe;h>|G0}59oWe2+fo77xSKIG_i=k|@9q!hyS>;wuX6X7 zIjoIqQm?2k#cQ(4+dzhP0P7q&Jo~nhCZ@}gjqHX>n&v!{jxMFJ?|i=*xMb3b^o$X@ z&k{I?dBHDK*kXOgNA#I0GL_9|lTZL3m5T#q*Xjw*U&Z^WzDj2Upes3kSIXMCR$nI? z*z|5cA4&l6&HjJWa9REhg8v6P^dAB^^!5S@A5{@BoClCg{~qup{ck2E{KvQbqpkf@ z1wLlA1|ji}23NwrNjN;-6F^`CA28U$%E zkP;Y>0qK&GmQqSWT2x9=QY2KQL+O$hq@|?0-gR)E*Sp=@wY~TI?b#kajS@3+%(3rl z?Q5<7@1F@Xs7Yk*Z1VO;b4@iR9Wc^mz4~{Ygk`R^IYFSyv2co_FnxD^LQ=gmtk_mV zAxP<93O;I$wx0+0qYwp4=HJ-Qx%*MMaZj0~n@_OGuL3Vw(6|`H51G?`Co@=UX-CJ% z(Pa_kKnyvjW`>wN1&eJh7y{$ zUW@%bNRo81BBx@HlbqY79LNTD)=?O7I|~wfA*q!ltB+4l(Hs}_s6ZSh{jA7`{Ju*_ zvxdSnaqHAmt_c}Ys4pNT>|nYvA2dbC^Cd%Meklpc7tf{`4*sM?oJEX;atO|g9H(#% z?jx)f<)|dAmXqhI)*Jm%46W^APe7Iz-%ycmk3w)$Q&lFWi20-Nq(0307PyhQ7l0(V zFQy$&!i|hqbCpYz2>5RRH2o~hI)BWOYZh09L>nL|ke4|lIpg$uf(=S&oWyxFVy}yy z6`tb_!8=ah1d+JzV=vu&O{Lz}h$#Z>;idIV(A4;?&wN+6SER{UB!_x@NBCZbhz-LIX5+cw zLqQe#ycFV#<;ob6x<^ttL4&CfRK6MDhhqLFz~btv!wAXWi67C{+sKsp#qCMA@y%_R zN&B_(7s5fY>5@m~PP1XZLVCzP(hSYv{W@x+7Cqh4`sRXk?n7(P9Zs&#WBnG9 zyPkNSP}dJT9xmlt5}peocU-4G+;N?2x)Z;#kgaGk+ncqt`YOwAk>TguaPY2#P>#FT zUeM33(Y&?+Lu!~h=e^zh8Wgu18|7@%#CX97}B=2qW40bFvS_-3w@ag7X@R59D8XNLNxwD~RPc zd+yB{9)5INiJ!@On?fH8Ai1wzC9S35h$BmOIY^YQA;bC3-}bB#(-tb~`eBDxp_RwH z+Lq5={lmID$aVvSGkt}i z=K@nAS&*Yv%Q|~!nRX8hG&K?T*z5ldDN}V=cl_zy%Vd*v+LJrInx*3gi|A*bHM&=) zlZNilTp-mbH>BC17oJ-@bm;y=O4N)RIjFzIBfcwhH-6c3NZ{bH#OcBC60HCkzKm)g z+Csf2sbI12lfSN+B^icd#GB!8Dohs4@NJiZY-#zqHkVJSRq1G;Fqt@7ywbq#Vzc(` z2#Jk&9k)tX6$KJjXB(Mhz!?djR5-bXbu)?{zg7?nHy?8$;ct*_2rfU+e(?l-EJegM zI9zNhzCG(U_wM|YioHobA+1`NCbj8B1)n41+XZWc%;NAMmV%X$FYy9AC$50}t1y?* z|MVrYGr?>|SMbs)M#otkzOxn2Zw8mC>^0?VnNqI``ov#gJ&0`}R;rR{pB>&(%B+Et)Uk$(*VHsKd=w z{oFm=QRG2|rV1U@T<}<)+2%O+IfqE4HW7x_VGXzjd+xEXYaM*9E~E7*{z_AQ5KL)% z|4_Wvp|W%3D&1@dIZHN)JSn;0R2J=csexH+Hg}Etd3#cAhUA9Pc*c>uCku$kJnX`W z=?UDpc(CB=JTXZRy=6A8mvHY~Q^R8K$+)Ym6~ftQ<{KkZ`DDFS%P%J$u~vHxKk)Kn z2@&TctLn86d%pLWmDNj%B-?gea!(+9WE-t3E&A*I`kcchfteQn-AekCD+E}FOLSX$ zK87qNxb16&WUqD)M3x?>Gj5G=CzwsJ?~2_Xf3^2(i+O81!WB>>K95G~RJJcOu`NWn zCK%owNm;INz4j`Tv@F5?AZ^P`{i?(k1O&qlk*DSI%G+=CUz2GUkMR6_ zRd$Gzd$5~xtLEZJK^;UW$S@Qdl&^a6OvaTtTFYVLB?lK@%xbKQvE8U1VLN&}tn?L) zOlH5h9TiU_0_>e64!p7ufQN<Uj<`kT z{P`(m>ko_fm0xn;uPc|%RM~3f&Oml8Kz6o2{HH!pb5L(Xw<5=JHAUpS1K>kv%43E# zF_OwnUo!Wjr5XwJ;n?Igg=fDw%J}@^6%z-gE#;c~YE$-!0xt^VN25_8C|Wtul-i$U zYU}+Qymxu-VQcm&!sVVWMX;-sk>AEska-M^2J#FpCSLo89rT)YBFgUS1?(kpHvF1U zs`U6fN){8>eQTw=XD2VLSTBjLpO>_D+ zT%BdZj0kL6w;sWixUn^NMP=+g68Key@x|1u+cWDm89)R&pJ8RJ@PVA>ZMO({e^3vb zYzv!lHs2$*Soqig-xL}2!?ZTk&PUrM#>AL2pV^+B+DK)qI|eSR=`%WSE5gvLM5j*& z`1)|p%e|xSvPelhN(>|&u|GhL{p9|VQ_LW~CpMEf1d+$?u&Wpwh zX6m!-;<@Z(i~$65s&HLqJJN#gGsyTAP?Lyo!^K_pTL9GFeU0LU7~D#79La6j^Z3C$ zgwu56>C&DPW=-&6XF5IBaXGcT`J}3GPibw_lRX4{b^R$ZbG_AWEW)gEJO4%erSUKN z)ivM|1b|b5wro2I;maWdgiCd6ETZj^>zJA%%Z0!I^3TaT{DH$54f?B2?`pFto{DD% z?SL1WMJyfP^H}GXa9`-3;UjMR3#0ux&9{WA-B;pgDKniWzi;dU{izVIDriDQ@h$hx ztgL>kvBKEN>ghHZvKLI^?4SfB6x~x=Y|g^OrN}u?6gEsdW-#^^GqR4dhU&62-a60} zIw%1_D)FBsg)Fle3t(%(l0ueQ6PpA;D71*>QeXd^)D2YLx0*{juW2hYlGVJfHsh6% z@r*8vYfnw$@ZzWb4G5c?vpJX2!h^I#a$oJdvf8B<5Q>YBy!R>GY-6mAQ>e&9g&yVM z1(ckkVxdRy89)ESQqSUlg+^2}o!GlAMM6#A-1mV8r>7MnYW#y_4^zj} zZ0Xb)E@nI3m?(APlqQ_HABM4KY^^IT1x4@y21Lzi>g-RGR6t(jM3|B@22!s3u;|i z#UvZzB|X2itkzFP9D%g0Fl#Vv@cEELcW1|6)(1QY`I}d1eH@|;eZ`K zp8EP`@D@j^&o)EIh@+}|u1UwT;*@?FuNaxPM=gr)y{en^#RrTmA2{7w0y1MS;LDbO zxG+=3{vcaP&`^NUpOZ}!r_L{)s4rJ7Q24GG>(+l$_`9RN6#H|lY1{GXOL*jMdT3@2 zyG=7S2{bZKhUXpM2`wNSYn7a!(xRQtNRI9eZAu@q7jHao8gE0l7rU3*To~r2aLkUG zFl@Y##WcR+jGKCYM)FF@#8%Ax10oXbmA)U3FK{R|uiOy7vsaa{Q)aump0LXuH@B0+ zXO_De<2FBWQ2wh#h|4}%-&`Hrq?)kVQZ}tPRZcpoalhh{mc{Lgx|;5F{K6%F(- zu783fkp2FbmE6r!7wUCsDE`*LMcR-1>K995&h&e|?Y2ubu|vRt|1tRaPXPb_FKPUD zZQ{S8|9^fNM92iSr}ElFFG23`k30`pV~j`>MFmcKuA-nO>(T>i#3#^7sU2zj!^Ky= z_jl5nB}e{;NETQZdVv=(LE2i_YXH;jd^|}Ir1gG?L%s|2vN$YzI?b!t{@T#C77sD6 z2RzyBUzM{?+@9WjA3}p`At}zjqw|!ty$)o5HO7H*LYMQcjGZfw6Q^%BzNBJS4*-AC zi+7E#I{DXTM**n}1+9aj_6(IcUD&pzklB-TPDC818}lS8@Z={)u&hIU(Cwa&r2u{-$_krGpn%OpaX*P zWsk|`e23VDoQrp(;^E00ad3z|g8)=|77`u;cN7OA44smq*zVNY?2G0L#>KTi1?1rE zRNn%$T2R5;>f(;^jpUsf}3 z)mqJVXW>BVKZ=wx5Zfwk$n$`;>OuJh4$7;Lt1I^*GVqIUlPQT%XmW5v``un*JAweM z%p?pfl>mRHIyZ8Y*Wg!LK=E%HftpXYw@0U?WVI*WCqUDHO8_4pMAFHO;NE+{WSe_zmBB-|fSH zZ^kUA-4Wd{xD&q_W$^)(>ncn$u+ikz+!Mufy*a<0{7T>f&VHHP#Iwk<_ljzga7%0( z$VuCwOn{tYF?PQz+hH*DsSZ1$xxS>J%YVABQvx4I)3s_n=8+_7n)1jB*d|3Z#j434 z!`zE9y5@8(-=|*{m~8}Q_&UaIhY5(p1#}KCL{VKeNL6kp zN*q0miofd&32PCA*$?x8f1CfYdArBqEztB1oGM)n0sRK3*R1`0MC`j)JC9TrG>@%C zy1~uXWf}0#61m^Z3?5_%b2%eU7C|;wgFrs+h(&ZHYEP>`v05MH{-7R zZ+fyZHC8|%7zJ##3g6x6gj4;oiedCLzy@8hgPunaOw4uX#7)QY%vB=xLO-c z976gtx%90Y1J_?D2d7|7OB5@o)(1-njf4}7%}^=k!T0BgHYmf(mJk#WV&k{Kmqd2;-w}&0;2Xkbx}$X9HP) zka0rmXOBD=mQOw;G(kxDwpGG;zVE0;_MI)L4;z5oX;)w0G6#mq8xX8(A#9q?$JE3; zSy4g{?&;eH6#W(I<_`*^x!pw%#>#B|;B5+bUK9=pesFVJ{9k?C)44TrctGm~q%Vx) zRP$Qm*b0yeb#LAaS{3g7oV2PBFIZlMh~ZLZBeof?Y^z!jA|;Pyi<$t6;zv*AI?x(Y z4HR25fGzP4jMv`Q+Q3-#cJAk?L_ll>F}uU~nGZpyO5G&nuf-hjj_+KB5Akj|ZUZbO z0{|$`u{Pf?01|XYs7HC-uuZ4~wc^dUxLD@?US)K{PUCTh$P}i4f8ANS7*|Z_3<{&!V!8RK}dHaya?KW0i3bg=T#H< z>rgQTCJlj5QxrsO;NC!|0taoAvv610<>*#G`Bc~nmJSYq4367{LD4u@DC8>0!;^k~ zFR(@wb7e*>s6wy(os7-*!p$IgT(d)L`2cIfmJL%NvGL1nA4NK=hiry{!Bd}xIR z0iv-h91@Sgo}DCqDS)Kp1NAQu+C8~b0{~DsHJBpUT-pmter@Jt;29RH!+rUV`kyPM zkkbv7^;xz3-Ayu()vFz*Zk6ITKpB?aODKTvfhsD!$@wk}(sFJ2ej=2Sa`!B=cxnAo z^$mnKU}50~RG&Bb&`anQR60@dCibjc?v=hEM+7K5BUFWA3Y8AUNJ*^%A|i;+U7Fcg zT4seF>h^RnzH`{O1GKY1fE{*C35=E~)y&sYX`rA!DD9pl45BFwSC}{IQmM+FL{Olx zDnDcZY-RW_6NV6r$Nru@Q8VvPrJg^af@%fvLIyb40{rNtu$F2aw)x%lexoO(vucQy za~~|^u8Iqi{U`yng!?Bt`D_;c2RC?YP&L-D~36TRZ5q40zl(x@m7?YrGG7=^8*ISt+1B%cG{J-J!E_bx7O?G%jCrBFk zFun?@vIEe8>e{`jZ9276Nd5-x65B1v-K-dP^A|yhZCs>Pxo&R=u+$u}vlZS@bDmG` zHn^(KH}~$>>UaU)u8~tU)C$aY?K~>D62%U8dMn_S*fFDeAZ9fuhWAIrFxn?tHKzB3 zn>a|#b0ZrAACM7eo=LRa0;IJrOhr=}RNx&biK#tT7$eTKL2w7K&%ie%Bx;RsKwkBB^If2>fW^!osuEa_fzamwei@Jz z1-~f@pA0 z*8P9zakobxT~#g;h1hE6;W_Sj)P$1D`OmYdlH+`$uv|yqkrzPYA-_ng%PfPp)M@!% z3=U>B$TG_&qOTtXPFu3U`#_^9!V%|p9dOSrT8%(_eA^53$Um(__2zghl?~3o2j%2V zt8jBD^Gy*U)-XwD$ih;!!qaCfNZU1aooAq9t?bFV!R7l}Mx#)Gp6L9}in z`^_D51utxS2Ou`dLDcY1>2S5zp4hK#)s~dnW zw}S#sW=VJ8erawxuF6*QaBF$o>?;|H=5O@xiDZU7w3W)O5%-E>Bz5q66K#t?53IjV z-=&n&nsWa=pwlLaRt6>N4R@9GZx4nEnqoNH9HpFv$DjRPM;IW=W_k!FI5NY!25wA=U_6ev8o`&7$<0GIZ<*2=Ko1*(r_fWkUjs!=W%^otB(OcBa z-{k+WD>DEnC5e$Iy1Q$4KheL2pn}PUS{XjS3YvMT}6~i=m3JAML`?2 zm{SZ2g*l(&cj1ge-28`gF^fhYPMhS_%-`5lfwXMD(zR{&^qW&v5P|?&G`^vztupdOn!9yf~+nd zYzY!HH(`I%$zj=UD375CbP!z`3CHqY8YqKnqxke<^V}=f!oID zA_jW@h;!877Y+^aWqEA~+14p#1_-AK@gWc7EQ5O;PqHFH3#%uQ0haDFvv{~8y^wAv z4qz-FX*mN=@VTOx464ielBhztLSsM-C&dT=lH#*9&+tt!oYXvZ+$3;7$ZWo^00(N| z!fnVUgJ8R_HJCzM?wy75qo}~d#{w86N?P_Al?yv-6z^u;o~{&q`BgG>`?^r5jcv#{ zUKr?+x+UtE)E6PFM#wFW&Jf^0&@bM5u-2t9=)r})i5BTr$E8~X&doUjor`4abUMqn zHk*}S)P(zMQ5;@{$VhL*Ez*{_1R?y{?UqL-{nfIh98HfVObRDQNh>@8sK2#`)d&Mu5}_k=aPvLVcviPk_sBnugfH`9t{-+#!A^ZPl=k<<=#&fBZ94f*Nyf1uD%G9Ya6ywY$j zO(85X=QC*yN!l?;87~B$=AbfL2!sIU`Q<~)2oPD0aDTd(T&D4d zefhXz-cxD~`r{C|%@pVYV+vvH${+S(et?Xlq)=Lb>rSU@fs=32{U^OwH6JS;AT8cE zFoyERu)?c2W&fO^hy7RKop<)u^G*9EOE~?Hp`$9KjP3q6nA;bZz?mt362eg6p z0-$N%oA~YXz3_22d0uw4Hhnoti+0SA&s>HAHGylAb#cKXr7eaW$iIX&4jT{-&PrIK zTpyShWXEd2Zhzqjwvg`&wWZ6x}+(E}i{tcd~Dw%Ut5y3*>@z4gJc1L$jL%8>*IwV)Glc7lg`z#AE z-a_308Ux3A`M6%8oIlYY;&=Gyd8sN?EeIE4t%5@9nq}`v-Nl zygkZo8W&BHR{JfA(L%Dn^&o{YMe46nYcKiNil5Hp0Sp%VyVKsDzG1>`QNPRg)hly5ITSQu%D@TQGsUx9{Qseqi%of*(jTN7_xycAOsG;`h&Z zj6X~=(O!UT2QTgko8S}&EkT?ItgbmL7FnUsw+&JG$Z=(Z&Cuf&q<3whGT|~QQPWn_ zi%JK^mrvkQ!TOIYDPnS<8eb)KxUF%LA9l%(qZC8DX8z05EW5to_n37{i|_BNuaw+N z@ZIqIq-0mJY@Pg9GTRMR2sdR_HCBk4IC6m6Sl$?I`eXq%FVs@COWrD4uWSulN+J`` z;ZyQ>Omc-GQR&n}d26y|+5U(`x-q>mQkEwKdHYIbQ$!|p?8n=?mDR|mH_ZuMHyYw= zms0DAYsmZl7O65mp-(qn`tvm_zrS*;M6JPq`x8wEbueDK3)^wxxA(HfugQb=c2jBn zmd)=jrf2d~p)|;xHO#qJLLS$(SCdRG`YzXhi|(yGs1r z)SgTXIY9mspW86k77E_O#LeB&4~DW^YYpVir7#5!BRPGWt?%=7D-uStHgDs0T>1?= z>wMbf(5JhNH7`A3t2@I?5PbYNGksRBr1{w*L!>MFGg*ug3MEB-`PAU)N;_qwMkASB&`KeZ{jdU zL#1gKX`ke3m+iQb%#po2?OFeJesN##i^E^<<+fex=4aevBkubQ@2e|+JUaaLSu0n7 zYV3irz8F$)3V5kJB{lcmMOMzOOeIljJ4eo{2b6gMFw^xj_Q$0*7FqnV%kuWEbtXt_ zH9sR;4`a>zLY`dTOi#k7ugHh$Yld&D&#(x{=JBi*w~n@$h5oDqIA*qUVEIk7No_?k zzp1jjWfwAdtSzoIW^wEBxDh$|V$^z0*!w$;SGP<&N*45Jis|)fuDE^SY2GSd^L9k? zWX>m0DX~WtS_eHC@mlbI-@e~J^{^btt^F_1BHM}0wD&(dCsGaix0ZK7=)WFM+Q#$# zGQpcWhM{1rfgGrGC!mJ0M_RbH_)kJiiwc+s>h&cwp-`L%p;v9}MT;dWkJ&pY77<%}j#9mCAMda%)!sHa_*wuL* zz20|6+g~`&x%a+{&e8&etV_tCQtVMO2W4Nq?C)@t>fF$S(y}!V{3#O6AOBovD@esk zbg>q-m}(dWC$^k>DOOl~SO}~UJ_%$K`u7tV%4~+@8j}n)zEPMTJOh;gZ_%lElWO4V zGafZ!BsR2v!sI#piacDqTmM|TVB`(|_nSw02gvEVMxafcN+E)oDaCW6AE~T8S8nmT zhSZM{O6dC2$FSEVW_(^xvMoOayhe|nxr;H#j2D9Bo5>guhhmzux>3yKG*je4YhHz? zeV(|1ERi-I#7NOdk#qY1@?n zf>Lm8_U9!J;KUWudDsMd!W%=<31PVxRrE)<66rq?dIKtb0SEzi3Tu82xWV-7BreRz zh+>P#gZTRpnMM)m6kh=B3_%#9%3}gf2XK_l>L>d)z#!!+e-#Cb;BzK({sTOOF&a+`mDSxaPpY~;Z~ z@+e#};$SftYs7r=KOauY`PPsrm6$C#wliCPt{z6_* z>=ynaClDzdk+%>-zVgB}UII>)xHgGRRld6n+K?vch(e;@T$Ih-dREN#&)C}*Th?bLQ3X+K&{PbV{Ct*Qf2NOhK@7ILf5awRUje7at!#bzme=U$@lz;+{da@|C z45}cb&;t61|AuUpiMw`pt9B+x7b4%w2!1a<&u5i@!A40;)c4<3sB3j znO^avBUO&(Yf!%$XnHu)_4aMt`=n>T9#=3VCllB;jn;Gjl@cY(5089X+Hiw8sp8b` z@!qQK&kDcGOBGN`8>@~hk5?+$$hPiJk=#Tsiy-Qs0vv{L>F_#BA>{e>D7HiadyB@V zU9h53TI}~g4yaQ*Cwi&S+&(3qBGOP>;}*D*;y!y(kF2z#veKVDT=YD2F_@n=7zX5I9-{0N{jCMP8GS zV(4(#5U+97vt1D~f=s{A(hsTY=);OUH|jHYvK7kKmILDIPSIX%jJZjU&?hage@mx% z(r$lwB3ff$1(|Iv9{`{Mqh9@14KY2^@7xfXPWf?7ESm;Cq!j|>20-Jt+EN1_LPJ34 zDXr8&;nIT$TxasluQftO{*l2dr_dt$v6Iko)Dm^$6%ute80D}Q1aZ%gD+G(+jGaDrX(iIw_rXEsb97|Zu*Z!Y z>gm)hTE&n0z2LHI%`gP%Z}Gek?yLd}Tf#dU6$F>3XMK(+K~9Zsu2idn#ext!#Xrhi z>ZQ<38T)MD`fDf`f+$p?7^VOC@L-?Ub|`@tq=F7uA0*gBvLKs!IIf2tEr1Wz4@Fj6 z4mm{U2mge?qe%TfA46zIFyXSW59i2TOXL4H#Os=k-S-C4=OF862PAE1#5AK9ZXic9 z`8l(#rO~PV*U88M*a1}-$*!0ghXmw~#Lu8*dJtdqfS$j3$tr?}5X8fOXdANg>rHrVPr zrslR6eyfOrEPY2U1%>(iP9<;D-PT zyqEY!_WOkhil@sp>y(XuAo!DxH$;@IcR$0u4r7)Wki}@q)r$>bOaw_rqwB+&EQzRu zOwn34eYkXr=_p;nR5D~hWTWmwIWfBnbPDf$y|NOs${)ct^CkyVY6PM0({oMv6HA#o zp^~YnV?|coLz>Zw+T4Ewpr8y44cXuxKUCpWR(Xp0V?v_c%DB+{`9N96j`-F?2whP^ zHC$|$sp@|s&QmQuP*AgXS8Vjg7`|!;2|YDX%851Lxk5Nu4jI+urQ(0n+&OjF(!M_0y~vHM zZyQ+OzEYIz6eBP~mBe%L=&Pu8V$pp^KaL7nT!H`AB9IvNKWiHQ^D(RofxXbt$ze}_ zQh+%PxuC%LHWmll;gmPZb`Q49kgzGjvPFS-Ur+nrJJ1JAs6mnzVO4PC+n|6q=zoD4 zNxVPQhmIDa?=FEYS`ZWu1Ce6i_`OazWmqwgORWN}_Tx5$rz8p&V4=o88A9{`J%>;$ zn@UqVinQ2&Dkl91KnTlwoFELNoXxJP`Ed%hw6^#rt$c4qg<;fJPA7S4%Y4>eM71odbfAPA)VW z6&l=6IC{f@`<&NP^-TmmUJ9ME8YE|f>@9ZqHuBPB|2 zzraHam+zTLyu|iIbTTWH&4pq~Si?v7EZUa#f5PxnB1HspmC0Y6MI!Uu-XScsK*Zib zJdj?<^ypj0&d9q-!Szt$1ph#f&1QHXPOR2*;9CtUus#n<0uk1K)I(CiUKrt23Lk=*K@fL}Yc*plo*#}PH}BpxU4?CK$z&UGsR1Q~ z_7*s+TO~cA@T2&?j8VoU_btMQt-MIlTxoQz!OkSuG6Bw^u5j40rh5|XiC9VKsaH$j zoFt)XP?Q)dMq5#J;pE>u zj`z_{e`P#G#H5cVI5(Bc?e$l-;C+%oH^~ZN2`otdc-+Rm_q~HSGEqxm^+e#g%`o3T zy`&RD4NlYLqKChXLwK#q!F#Y6xj`==i|#$D21Q`fz~u7D4dnyPW>zaGB99_ogf)M_ zob6*GXV0h$Y0dGpF+@Nk>3~*fV02XdgAjacj{1@0esF#JLs`NDI{XU82N^?&WUp00 zGsb`_#1W2>WQHEg0sFD#u9c6F!m@A$++Il?1jLMXKBVt|C!$B)ks7l*t337YRmkvP z(h166_3j za5A|_@p2$4wUE?e9NDAF#9%dBBh}lZI>`HMNxTn*&*)g-*%nK|EV1(8ste;H!`X4C z>IsQrzaG4P`YCrGtAJ7Wp}%TNRQEb{>QpIn;vbB8GRz`2Ceku(Of#Y#`zu{>3=I>m ztuTh8{b5_6|3Q~!nf%;UNl|m*~orGUtO?)SXqf78dBq?qbXqI0c4Sb92 z0kg!gx6=JH3zGq}CI9nr<`_MG?QZq{@%?h3xBnihUVgFnt$glhH-Vy46ERB_Xu%G)h{h)fW)+_3yxnm|g2?;aav4~Y}H?O{Kfd*bcK$zy7Dh;GO| zYlf9*nzc#mq+>bz{c_}@@HtTR? z*waT(D`tkd!X=sRkyB`IwvP^VhbA?RCYBYArny7@^gNnep78h&F(ENCa|a6tD+f4| zBp3QrioN~2^RwTuurDQ(;Fo9TrgzF>|Kq%yZg;k;CKW%fa*^ zc?104PvpS_m;3!tXV`(V8+iLH3banN@@y^$6<%(CuXxkLT0;J2-`MxDEW!p*cFldM zBd0K}y4yQoT{*iBUMyPs%;y7x@57{I6XKs)LB&{nSr>YOvu<+%p6eeBa~g8WY^!=< z3@i5v;a3=p`MD5JqGB0|$nAvALLI{4e)Q!nIQ1LUaAx-?4?c)iv(T<WPcUizMD=lt+#yl%U}BLdIY&xf^D%4VeWI*gUIvG?V>iip+NjJ?9F8!ZA?FD6jAR zW_Yj?H}_2`isQ$3_JDqQ#L;Z_AckJmq?Lq)bYo(}LiG~Yz4(WFCKR_x#eHeCuNywG zW#H1|*71Fn{~6kd*Y3se$QsY38^J8ZUyr#F{EzqRS|i*}Mv-@IYAg=zhhi0LDT6P4 zm~;I4Ey>3^+=z1@X3NUF4x7y+Z`a89W6l&)UMVocGuQ_&*?`5>q@vW0W((gYMXEm? zmWf=flhYX-A2{`Rb3i5gl6~K8QK&c{63(G@w5AR1aj&H$bC>(U2Ek^V3KR7gkulQs zulY>Ss1#xf)#K25Do;}Ji~O?3pn;%v{N$6zTb6@a8lJPaUlt;7`3AgYax;g3gp?HX z_H}0pabJT=-1s^6q+fUsN!~DYo-qS#mfaa6M)QyUOG~g!FrNeqB!z}xs<8_98Y|?qUYqE9qlewd`73(|-1HmJZGwHanv5H&Q)$%?h_~us| z#asZ}|L&uZ4B?HXQ0qkUK^=R;tNmxF{Y}>DmAUOB6+5;2pyj&@^n(P}bI}}1QIU$L z3)x!j822=mR9j2mKbQ?3u804AFcDd86)eCQpc4iE;<$bEQ|bN*GJoogm_X^c{vxSr zzCO_{K$v%VwnaO;_hV(Qz1c$8cQfkF>baXZ5hHJlVAsdIbL(?A>*qA6PG?fjP*dH= zJU27=?cv^9b^Wq|Z^>v$Z*#%ufjQT#ABR#P?ZxIm(da=FyvJ=L@o1R|qBsTt(=v3k z1;;SBN#$RC#|UbBt(P-qM41W;P;SWW-I}l8x=flPvpj?eoQHIGHhCdvWV}A?5@hr) zF9kakAhj@WIZy|m!|{TYOY$DtHf{uX!5s1!0j*7_7AT2O%%~(;WHCM?csKI z%5~>lQQKi4MxR#}HCD)@`#MBL^!Mx8YPw*8H<$GrpNre8mW7Rkh-1B;OTRGKBeC~{ zyf+S}o!5nmVGPLYH)h_NyEW#b5b4xx8FXNhv5^I%jLb%KobMhk%9E!_YU>2GipAl%i19x8h0d zVf`lv(I18jt%2tF@qRcc!uRjGHp2wuUB-u{`WkoW{8_@r02-wo7iKqXP}RLT=`;7ql#BctW(ymz1(GU{tA7ib6+_a5ck%{vCtbn zJ#wc5w>D4^rJ!x%4gV)MRc%2)TAr&0( z*OmNHEY~T?{TYqkr^I`4WMi+{B8H_;_zx0FPn`0ID*@StG-so6haQ!*>>twFxbn4( zQv%K}WZbTxxIAyLM6=6Qikg+3m)sjA>(#hGmWyTcbEO<9CKr;Ui@ovm`kPbq(dxlG z(bxPo%QwFrcGf6TUsSBskLi{EeA~t^!efHHNVPHgyI$J}^8KsFuU~!2=aPNb>_-AL zJMtvYaAjZkP}>j81--@nKZ;ViQiCLlj};2d)UUb?PqsmHzF#wx5`fx%I8~I;iYLA_ z*CU}1%joJo4kdnSC7f_=f<7)27fPfyIbw73a*6aOZDN({Hgu;0A=USmjfhbQMLXKO zHh6`^&u6G_LI+hz5`E`v=~>5QHI79tRgrn+J7%(Y&AsqVAuZ$zNC;+aU2{sXf7g)h z$v66%xc(N+-uNLD>ajSt@Jdznusmiq(qyN0bKO9Kay|aqeZpX!cVlntshy4A@{SFV z^SiqU1}>P&U#^gOpxY?hc5*YFY>1|cC^@BMSN0j|FTb@HGT=h(t+D(^;q<-k4! zO)l9>DN!&_+#yFkQ^0oT>vb}z)VQBT?k?#GqCS7vz6UEzPl{##;<64dEdi_Mq9J+o zM9HMWiDeFhbmCDW3C-AN%Vx54F^7Auzvc|?HR(w|_u43Ym1C;yw)QPd)U7!9w#0Kn zG|A%=%I@)M41UiqJX>ivw9`nIh#*XSoKAaN@+%wVse9WQn;MJBTRLa#fXwC3IlEvdm96#ER;*UG(;8nM1fzr!{5BCMcHeKXI)lZ+7Ay8)} z$J5u_2x>=LxDKQ~t?1~&UgR?K7^odne~qGU@C|?T6)X0TO7-CYnbUr4wP1S@)oO$* zg8*K2y7z;?bA}a7vc$<7C-Qa-E)B7MCyDoUzyIWET?h&17HjA)RV4$N{-h!M2&`Az zD}oapb^(7pQTkn1Mywe%G-EmBUQy%al4sbOkD>%!VmgLlOjS94o0##?kNa(jxoG?T zj-@e5%Y$3QqsxzOrZ)zYQ!R97>@B03l6Ig)IoySNM|WWirtsr8-+5b)afZ2#>-C?} z0uRcfdU+NWJdHN)gCkPb?hB++{Zl(IlXMVz@T>fi+e{+t1bRy2us>t-R-Zkq%F9vVU zmkY}empm%N{`R_5bE^%*x_lJA#=buvN$*D8TZCn9Mpsu(JVg_8WuN;YB8hy zzGAVrL(K)r2l!88G8?k5s}RNO;4#IMS5eP|r5TXC*7Awzb5R#hdMjR43}#qWq40{y z$PI#(Q@2%&;=}N-1+88^I96OWjHgRH-uvx=j}x{%nPg1(INqpOR7HwlSEv&IZQDjT zrsT)W5(+jWZK3rBZ8m~sQrEcFdWj-zO?#!y z34E*$KC73(+@^^u`fM{1HH)#VZh{9JQ+gOymoR9n|2Nah^LFe(Na=Z-7Lq$$sNW(V zZf#TCo58iUmy}KNt`AEyH(m47=>K^4j@9_jdNBd6jL5YY2i5a!1Z?4(Wz!Ptx7{z% zHu{vksP|8LJTVI6odyTH6^CC9E~$2E9Bc{Vs$M%UlM7Rc!V5`o&#|M|*HBGJ?)WAi zxb(=@eo})JYxS5!6$MKn3 z-ffNUXCI!DboOW8(u?Z9Ffy<6u=||9QdB7OzcKV-w@_*ObIXYnh0H>!wGlc-L{gTR zfp5gM(Scm;tdutNOMhfoIRx|bh0)oQ>DZ2UE@bjt#-&-fgGyq_n-LHDWYG^fOlG~B zZ3y0^EqC9XdHL-6!+=O1wky(if<+iZhIz;M{OL5)T}a%oHQR)Y_zu&Oa#fi)_$K&t zUL?U;W~M4o=RPeeB4L%4^AH;DtPa%(j++z>_KWbGH(8HYknEf_liJl;A8fvs`tcg6 z(2)D1<}0C}#uP7~dQ(!@$u)Lz8y`hTLMR&%A7Y(M(nyXUGsax&;0kL|e=+TUzZrkW zWH9D{axwpNBvv>FRP7bEQ+`~rv#e;|LD^7+{^%0Tz;qU0 zVjQcFv=3!Go|E$K%8hNdp39@Sh}+a{A!- zVR;nVE}SVu{-u=3d-Net;_La`79Q+{_No|^%=}oHwG#dP!f3Z>c)~baCtF)84O^Zi zkygNvM>QDDYCxLj@YRrD@M+a0{yf|_e3;B{1Gkd~pXn4QXH7okOE*X}{yNmN!-&d({+3Dk zfO$KqUGMKC`-kG;%NTmE@yE?q1aiN-qD`tpmH4;%S*^z-LnnPL!$`;C>?QnB1*2&H zu2K$@T2#KUX4P*qzs}#*e)4D|ABoM-j;Hown8)pr5#m##sQAfY5rcLqNc zBl?-IUboI!ZV!WgRcd3xNLfX2&~R+45C5Yyo8+F6YVs$HTh+1MzK>Z9vVEm|qfd_? z?6C`msZhJPWn0-re64?%P&ep&TVIWfLc?SybklEzwW3x{Y%Qp2zut(Vt1)GTow3nK zl~7YXtn7)N~ajq zb~(ZY@ddU<(%R^~k<4$luM|40gp6yvp32MQ+$1*Otg(`6;~@LW?YNwgig`obD}@W7LCw(QR5cE%mM zbk)uKza(&-pjwHY-J4z1j3N5vrffy^Xy}CtQ9hLYOGgM6`KYPQl`le`x z)aI8%bGXk?ivM1rI)0M&BqL!Rqe7GOGHF>ZGHKT5l1+S>*{Ws80t|Qx3GRQ`l#L)g zo^j9b!qb+Tb&EerzP-<|XIc|gW9#f*34K{h*O_jjJTt^CXuPaR${%^%oE+oc=^w%B zXYfHgHZ_d75Q-B)_q^B+NW}bnr0w{mf zj*9Ai+ebeN3K9Y$-JouJ@ede>y6Ap1t?;-1l`~LBVzLS;}7VSXWTkGcVtmhG?(3c()as zH@}AT(jRg1`$lotRP8fdm{9X;7yz|UqcXq##l>j3_2s2E5yF(lNSoazjbRCRL#LtD zweHT+%ntH)ctw;~YbyLweu!5MMlEVh(dv$nNhw!7NF~=!iKZ1*wYgm6*HJPs9%wGF zrK06v3cor3o4(pCe701h_3=;uAg32E&Pm05l@eBc@Xxm!X;nt8 zDi!>_6PWOJBiTFhNqjkaIdimm>}%c?iO6+*^|xfQ<+0|A(D2$QzAbRe*t^2soa?I| z8wC9rpkin%rE4lxZrS&is#Px(P|=f=B=!gjF`l11eA?`?TA^U3vnJT zu;zj|Myp{k@-rf7i(5dDl}XFG5iyRrJk^t6;*3Y_)~P!%z_L z)A(eQRFK>n(reiyL2IHRGXBjpHvjKKc!SOf{2PORZv%;h zn6WL--_}UuG6Q`{<#qc%|Nh2v(*L+W;Nq*HbY}}-CAZf+aw@=29N;j?G294^Zpwe0 zgDKu9(?6j=2JC=BRT+lfu|JxMJri5I_E4rsqP({GW2YY&nDjt=t|M__GTBYViKiuH z%Q^L*fWE@CKCVi!JlwMo1dhCs0Eo|0c*9f<+CdU9w7eImzH`WLyA-jyJ|ZqJ{v=;M zeDR1Gi<$3&xOiu{2bF}L&D!3%vhgemZ964d5S5w$4n}3k4;nWBkhCY|)K>%O-y@nvpJB7TfZbBRUcA&~ z?%G;wRrsjx>{>ra_45Ei!_kZjV)6hj3UF=^*VL!$zBMarEj{-|ljB5$EJ2}f%#ZJh=kjm}V z_H&$fyPmsSdxZ=n=Kd(i`qr03aHWgCIhEP_ZU~!+O5O=$g1IK!sYj06D2+QO)&hgtk;}>7ep&yd zq2R$`lGo#+ZOu(DcZRm=hKIP(aJg3w@G3Am;J12R$y)(fsNUIPn^&btNrT68>wT;H z_XL3jdKHk_n%E!!Qa0)p(Pmpg$#?3qp!du+KstK}YK>ujPc9@qTd)=oy zKiPvbu>7F#*_8V<;DZ|Vysp_vCx3wYMeoSNkK!)fMxHrvk_Tha;`k{Z9A^oJSYSlN zePMWJR2vZ>cqov$?j0*Im{%O>Z4`3@0Xo<1MSaVg zjbuw7vp$Z2PniMhW*vO|^UD)&aUrs?&NHl;sQmP%d;U8agj5Lk9SnCCf^R2N*YRUJ z7)g{zM7M7`bTYSq+5&nL)#8N>HIP74QmZ`X27O~n3E^45y;+ga!HtyAsu(Ha6?lxL zJh^c?`ujtL_$v&tm>)f1qR4^K2YK;8;IOJu=C{XA&UX6k$sMxHfCin?Cl=A9X*mR) zgmbFG6i)_W*IR>GFN-J9hXF^}_f6`Xj;G?!`e8T3r07|x+9Rmva|b;vXru1Vilb3E z`kWUJOO(F*sR>1GK7BHoR;vXY?_`=^2@JC|&C3=0N%ko(-m!sc^A)(2wm>Fr}n zTfVarbf$M1z%?D%HB%aqx11M~J?FV*qe#0)t%J`VaEi@@G!PNoQnDawzD$YwBotfE zY~s@GWA*J&Q*udHZ>bmq$fhu<=!s-2cySD!Xn_@V+!F9YW2YfBrF6gTAZoBhxZOB~LLhTYQ~On}<_ z3$AT?df~|dnpXwI;>f|0)5{GDyByqkXR@pM25$b7vw2}-glWR!km@^LmTielNjr=5 zoUs@NNGvR{vOVBF@N)A@q$2K`S?08#e1h%(1z}*T;p+V^+1BHV;M+jou<2r%Gmck{f83mYQ$wT*I%q6ydyPt!nj>$- z`35Ur(zS4O3c5_MG}=Z@fAVp!AJz%X0&PQ1R7ePQ!!&XiGV9Di+#JhdE(Ot~3qInd z%1QcVy}(nK$jB*7cz{^f+Dtg1$+tKe$*J}$S34{BrPoon=DtbYxt+^Y&@doJG3#S- z(UEffcDLmmDSLYZ(>ihPp=!$%sYKYzW{QXq)S~=4VXz|YivJ705QeqwYgumXyOiq< z@~3W03d%K|TVFaP*2J8e;}56X)G+KgJ+(7V_K)#*hZPwo?NED|I9bO+yd1{&84m7c z6*V3Bi%}yk=X(v?LT=?u)JxL{`^m8#75JUob?*J%`c_RHly>T}(fsp?Qo9qJXbOdS zToemCnFZJCYv#84g`4R^eXY1Ka@%PaZ~$$C#p?NV4vv<$#5Ss%eS}e!brm{q9zXv7 z`p6ppO>Ivd>ZGfFFs)pOcdK$?m=f_olBc3v|6ua|@U;~_v+o`cY+DPW!>8VvO~dST z1V>BXeFsTFlw3Ado5+!+vimn#nmUB6`B`t@H2o+xN>sh7Jk_^8i#OLcRuve!jeGEV zhPpq)2=m$QX~*${btWQH*3l-1w^|92Jbl(vrJs+%0ZI}K?FRM2)yTY&dOW_#?iYK; z*XnZuoVFg_3^JW#Hhxqurxox?oz$40pAKv}N|@zSUOnoILUlb`Q>X&Ad!_09LVOt| z7=aH@iP`wlOQOo^uEv%oew%t(6k1eqv5Bh7Cfpm>tz37?CJ`oAQPtS6%@_9mr1UZw zvF~=zhh68+!61sl5KNsx>;2)f@mUvDew5=Sudy!P72^aNS5rRC24$ly^Onx3R%7@2 zYi*w`upu?CCEZ(F60_+2$G)U}M6dtwJ(MIjUW~t_T=wN&(dRh4p&QgpbOIgR-wxl!evt46Qr4bD@<$t%xDFeQ&hKXxSXeRHe(oIy0v7NVyF zV>H5HA|muv1kyVrr0_AWu9UV~?@TQ*-tKoy6Sg z${i(B<|5QgRVZAVb!l_wo<-cMaE|p;q`#(KCpq-KIk{o@nan-@LjlrI zu>b&M6v5mtX;w^w*4?Pw7Pg2`a{NrvqZN67Ji83@xpt2k5J`pDn9wy8dkr$~z zhGt4gB!5t0`8qHGq|tiCFZTQB%;y9)N1CJ5YeKAtl+E7wplT-U({%iNlsCCgD#r=} z5{Zw9rr3DmhpwUK2EyFDUfQ-}1qOBBN7utZq|NlH@fi2O;8c(G(t8W_cSp9LnC6ns z>tF_md0q1F7dky;%HG_dYXgOF>^ie(Y`t0!B64fs_I~Df;o_9s3wo8uTxIUt#Z~u@ z>i9H^I&%r`+Lqe*2q};sgg<*q-2BlWL1{}*bl!P|v(=1Vt6f}z{&NuqPdOx*UW2rh zXxf$Z;sshcRXAZ-Mq2q?Qs%WqaYA}dmo2T^M|~UQa5ol;8~yMLP1B>?FIdhSsh*JJ zKE|Y0quY+hT>ZPvo$Dp~kmTU5NB}v6@ z(Xodp&LdX{iEM^H)_3q*S_+l+tLWy+emlALD7+oRrk(HGsguIyv>oC1>fQx+cHDel zLgl74?nT<7nxE~$=Cc5O@~M<`r;rMFlA#cV zd8~AZ+p)?`rq4aC+ij!@3-K>R^7!33(1O8@h5SU3HL;mrKZ>8eLC$BBP==@mCAeZO z{W1>H8g4{|t4k+XV-nBjxk!e-?C@!qza~T7OfRQlUI*t!An0PixiNf=H0p&!YUPtW zvEAHDv0mn^@e;eG6fMKo9=-lZ*SGZU#@8RpQ1jEP5G*HXs2Nk7nslgMO7pum$M-Q@ zTo_I@*~<5<9d0-{?6pKjx9b>?#!xpTa1ZM z4J8Xcrxdu%J?xF~WL0aK+#{ws37^(C!AR0EYl7kb|> zJnbAm)kL+N0^w-qlyFEJZ(AWz>Ch7QX`nM7hFNT=RA&46r^n6%_e}yG(ECXGvRXO? z>*YHPPfEsKJY;8`e-Ik}`&QA!d-F$K;vqAvD1pnDDYb7kjF*ax-R>r9y}K4b`hoN6 zG>vUO;k8!B%jef5F1t_$!BYuuwQ6)G&IpD^GT}Cn+ysRKkFF^~7bC z9d+GArMXUhlG3YDTJAJHi=8*;xkXiO?rsfBa`z!!V8NO+nJ8 zAPadeH!>L7zwV*sSNO(P(;y*F@qD`xn`w&wo$s5e?$>{g8~Vl9PACp)ws^%+4@r#q z3nnAd%F}4Kc*SUo9QydsCZ2fZ(VGOQ-ZfKM$@$sXfLMW-l`f}5=jpKckd=tEX`8n` zYZZqx8Hl*bFAjc*yiBo{Fr>;@+hs~E;xQek{Zh|UQMG}Rm1pK_E!49QAK@C*Zu^{! zWYqQV^sKBtv&KtAy0o9hRruvI!aVP|e%N_kfO&b6xMYeP;5+2jEngBecUA~5l*tHh zKQRqUGoN1kn6>Wp#FqbYLTq$m2J2A0Ol#}Cc$2+KYPxy)vHG6SIf5ZnMTk$Ma$Y5@ zk;*Gl>j81S$$91bHN}ShiV#!Vz70YGcEt3;)7YD_UeNuJjTFUA&Nd80-#e%!$f_kI~ zf=pSKY~MWlijVnO=%;w8pA_-ZA*|!ZMVp&0`O#`!<03W^HcFQY=B`_H=f!L4x0p5$ z;VZ<7FVs!s&y!Ojg?ChPzmRs@t}OFS6X>oFbj7SC{yhbP`@sa~hbMS)2ZR-QreOp=FKDXISE61hy$w z0xVVvu+seJTVW{HzHoE+F$tjxC0H2m5&FvqJZbYz)D;t-QP=Ivt)BcdU0AA#H|Hg5 zPoLJy9*d3iJ6wYgB;Jb6r0TZSH(nrUWQz^^oJW4d@`&qI|91C1f>-y@*(=)V6l43N zj+0fgX2r!5K-2|Mm7aQMYmURpXC+1sWB$P?9>swv-6Kb zx2_8oJ@1z6ea1KF1>{^54;fS zSgpKN&Do&!*Dj~t@kF}mlX6!%FQ|^^B&*%z4Z>#czV%(Fxq5JoU{Ew$B!1W6>QAzR zPK^aN=f(?TcZEo05At%oh>YfkZq2jFmWPXQ#Nel%4*%nB-L#cOxKO8={(Bzjr7lKP zPL^;7t4rT#Om_w30>>7#P|(EsG+grkA-|;`kwErKYVZRixmH|b@^82FZ`Ty&$IiCz z9%6}=e#l6sbN%>PscWYM|6H9j7E735rFS{ZB$LOJ%}CaF$bf?hn-=hmmYCSr)_^3h z+Ks{pT_o#`TuJb45VF@Njt`_zz)2Ih)3^>0`yR5zZL1&s6s-K&n5Z^SJCJ(1Y1!6f zHFK9Ewpt{+{M$;=pm7`C(mL~2GWDwhefvfoiz5M@Fx|<M`PQMw)&Gm-!21Oa5%IrA(jXCAu7RO6sraOv0v<&x`7k9Z z+3>?nSJo(Qs?$!ZD>^*%ZPBgN@UkaQCXu#cDQhNWUu(kMZoZ!ke*6YE!_Us8@g_L@ zKQQ_K*U<7HTQC0=8)wE9+y65ea2ozaR)6;1v9znI`~NrGdY7;o5XIUUfmPtAOg=C>ZDw-&cXYYh(eq z=IO5K3@sd#xdxSBfQc;@sQ*jY^#*2usjV^6{89AH5Q9^NlDC#@^f2Jw*IR(T+74pQ96W1=)@$Y9 znF0tYH3Cjjwogyn&emMVc7vdqLGbxOa57|C$p~n@_qAO>oXQ@vw_J-m}`G zE2@V95lq>Z$2qt|mhnNS3oJr^#shH>DG>|ASlnaQ!9o60Q!~cXvcS;tgEi#w)vETc z59sB^S<;g?w_7@+F5fOvNIB~v`-V<3L19U#h=Y#GnkXLygo8G&HN z@@O~<_x%Ve6=N<#5W_63XzT}Os!*lpWfw3&PmG4br$a{wSk%*|m{G9}@ z?>^c6d|?*MQ%lUHfK0o`sk+ZNJYg&ZLYybSohbQz?Uw}0;YWfGudW5Nm-orc9`$d7 zc}~(S2o19XvVv7c0lU+~Ey_;9Eudi09o-0-g>wSQ_S7;s72aQK8oI%nX%D8N$7kSi zb@Tt79l7jFE(GNK7K>v&?(q=12i#~^1xWZH*Q~LlfpRb1ha?+ zw|7!{a)8RjLLYK9pdaOkm#qq1wPh)BX#xHcSQVDzZ()9j1%_E}a8K+7__iO7+&3v> zcLT_9z#SwOyrCj&8F_Zi2jBP3cNESI+k<~{uoPdEF$LBfu$fs<^d zfwxR3?E&h+Jz!r2O1QQK@VW@ip3EGeHTlYn1mH!xk2+zc#6m3<`(BX2!yZD8qXE3# zFxP<%#6k0;9( zHiE4o1BA(ObtJ`WR;SKax4hOVGTQ<1w>G;Syp&Hj$X@5yI{vxvr~ zWZJ=f5S`TYLb=t9ZFhH9b;C^Y`W4@L?hY_WyC0tI76(A~h_|o2TLd1lfT7oRfn;kj zk&5Hp8$D!l{+_+J)MEn}#spe6QR4Tu9|8*Jm0qi7|NJ9*K|@u^sJuH`s#SZPs_^_U z{=DeX3Gh_lM+Qu|(5Y7(HM>EBL>zpp>20yS4 zS~+{mxqSd+96e!H3f3 z!J-({)LKGKZ5wm-U<5NSQaAe(_3H0*;lv z>6fuwTdIK9=>^@vV{iwxY$WJ6iTY@zTH%n8aPjxgT;IMDZ8`W?KDG}r=DSVeUGX|R zRwm7WiFkvq75v2i#Sj$g8|u6Ev)dSg)^P`2c0CdU@eWlL>Yw6A9H9d5GHm){qd9ca%_UAi-6ZGu8CBBvP8IyH*6%w;=YHhan zv#sh=YEY~cKX$&WOxJ135aDg=x<{~*Ik=JKdA2*-?n7D5K~F)4SU~Ee7|YZmF`IYK zZ?QXU@ExP=7k3l;2G;m|B@y#mi^u3Xnzlfe{*_MH&aX+Dw4dV(Rc*hTaGvuXYbs}B zS#F-zX1R?n$et54!esxxQn(Jijd_QcrM2|02pr5cs79e}MRF@({s>-_KAuMw?9-Zu zO!ro|PW5h{srq6QgdI9LMyJ+G9*8-HZq@Hu*Q-%x{iuMQpp|s2q~zB(MF;klVm+3FakzUvSdu(kR! z-@+%@nu;p;c3b^%%?*(ZlC3R zUQiCZ-@P)%X$k-E!{VfdGe~g7H~!mk@4g(i^4H8p{2I@}{>B%h{l=F1(_ckx9(Oq2 z$WMj&Yg4Kn1XXI}t}tXD*G|KGUdO(_p<21yFypbGaWjN5rlnKa)N#nTf|ziOWs#!>)N=P z+2( zxk%YVZEI;?!7mAN$ui` z&)=r)SWo8HGY0nYb@=qDo3SbAnziF9Ydh8h)gj~8}My5i*+UN;0UjCSap z)<4Dnfr>2n!=+GThTiqU?%oxxRu$h`A4>T4k%86nlXnhQ+_eP6_$cSTTHpHeHOEKH zt)}qM-5gTmhp@Y^?>&ZJ|C8AR9z>w*GX#3>EDvBAkpws;vH}9m_!Cf7khKL^Kb1S3y6?cizb4%S&4UG0 z1^RD&H8nMJu*qXfACT?h-bI(eh454S`&0u3x*lMVH1s0@L6*LA0#u)qN8*lkK%wLT zoE1TZuOTud1yV`S;3rNWiOc>uIFdkZ@9;Ei!nuBW6jWmW%I6GFtM6dtJj4PudW&N} zD}mV2yX}k*GWtIPvAWjnP%JwZsDp}Tt%)JZ0Ccc}sn7sWqF94a!>^$1f@CWc$HBebRtzRiW#HB9c=-vN*zYuyewV(fq9fnlIW*{?nh0vrrMh|A6tyxr%Ds5X{` z%F+o?dM=+ly%-&|_0qbu9TaH6Nl( zZ>xX}XaYnR04mVg;%>+vT?9D&CPTT>U0ZLo1dHcRKMNuB0ZFB@3Y7GTz=jn`BuTXa zd29890%7vd8R+dt;%}rfL)}*`5S&Vud*)>Uv$hg>7RWVr@k@{P3bQBzSha2Moj^*Y zZlphT7VvJ_j&%*pWwy2nr&_M|2lZ-#Z_5HxEd^wl(vt8!Xh2^k{Hp7-gx9VSs4>CH`v#6+ploTlO7DKUQU$KavG1SI(%89|5x`R&sT# zRXw9k&zgZZz{5u14fZss3Q!HdyTt;+Qe5*iX3k!t17xAzmj;RDthlsKDdeMGHh7$a64t+u5-}h)tX;AKhf4dzWy7@rWAFyadqr zRL_h>D4uS`2V=nN!06elukd*RGXI{v1%!o35F?7H73b!VV?X2;7sHf zF(1za^;1JrQ|9tVUv+)rb`L5j9p|A2*C#G%a-j^z7WZ8!jOhTp96zqOJWcqn05#7r zAik|>kkIGS{Vt>LdgNI|umzgUvL!0=N2vGxQJIK6cF8x7pKeK@J!^og@OKZX zSFFT;2(>qRAw&IRA@a^QL|1UxCu2np+VOO+)r6Joe$@vj@D787fg})PP(j3<=+R5= zISoX?hV3dys(Pc&{yX_d6G0qln$ib~`8q2ps@z~=oSbj2fn|}Dz4ak#51xg%XJ_ggnK$S(waILJfU*6E z12?OOEG)#~IRnmV=`6xwyqbhG^0KNfO=Vs;5j^4hh0MZzy-?smU9@lY{O-#Qpv5*X z6KYVAt<{&@G;F1MOLxj<=nF|f?-Rmt3j+zaA>RZZAOy8ItNv_BnsFkxgSxb(Pe2h0 z0#u6k68wtW54o5c?7ln?_|$&*R{ietc1$Gv#t^4Qf#ko`dJc;7pI1t6(2;_Rgm&ti z(B>ru*rIegrtwai;gB87{rSZ(QP5W(J`DYE{(%3AWcfdi%KsX0(}6*oqfNaJTJIM){&<0Zivc)m zAbdd^s;IMsPqvfWEq;NH5}Z&jz8RP<{A_!XK$`&IuS zR36ZoLH(Ve&3?v4V4($Q!Lh)Mia!{@GAotAASMC}jzD+N7tR0J@T}5wsD2 zo!&tBQkm+?A3cUpAT&7oj0c1oeuQGdzEgZ44?roqkW19u(Ag#Dl0OF#8i5`UU;@C% z0ODb+`2W@b`*54_D1h$ar_e@S^2&V!Y}zJZmRSvFI_#EPOfr2G4UfsP2IvhMSm9Ve zhLA~S4jHx3UXBI(1Co73Zo^;K47kemfYU6hIp{#oo zY_%;I0BY==C=oCj0d%PGSPrbahT65iBL!#(jCFPmFo#lOKRkRgZvZ8+!{f-0Rvi?~ z+id}ybKl|;*qrZCk>X!+S6?M}f_oAsN&vcCKmH&ADq@pu9uf{FLiAqdS*QkqaK`op zJeEU6IbQ(rBtZyS?V>ZZbzjtWodHmZp8Vk_GGn%AkOR{I{O$SoPC!Jt)n~fn8E^YYn0On?y$+4-Rt zZy9F#H;8xmkD^#|LP_WXr>-oNGE!PSla`Qoo&D#!|fVZiIR+ry?eS8M4 zzMNg~+gmlo-Ti%In>t_;F}8qMDI043PHhiWi4cVu4Iv(rd^F_DTgR`*;oUMb`e*DZ zfn@98hQWIgSx`+Uqpr2bSKbWHezdk|pHce`S6EDDna?;L4tjI)G`4d6<8f^mz%N!={LEzBpI zkqQ>^DnfLU(fvMBSDsv?>Eu_61ch4jz8Da`{9Drl_Bq2lc~C}VSPSJ6M16X825y-f z${YXXEWC1;or0?C@e zYHT_zbbS`3^?oVUGd@6t(VOFH*75hkrwyS{pw!HQx09mYauCO^VB6t5Z}}v-R zK1U_PZ)s0KRVqTg1N<=VkSjLVtPo%EmI!kmFdyoCZ-nj?sN$hV*mW~_Tf{kAid>bd zQt~?MH)uP146z0N>uvF`(%=up9om{}c7eFnIK%Eq>Wk=9Z!~a!ZEaFj?Z^GqW~lvb zl2dEzCt)vJ>67gJKrF=hi+q+z)54gK)eoIZYsJNZa-}tYu(N_cg6i-&C?5-VoVQuU z%7i5HO@(?x%bg+b)$K@y)9i9CdnU1-K*$-u`}HK{FN2cZZ#dkm~ zPm8A)x}sO-K*EdCwwV~-vrnUA)(9AwlTaH42TldIq)l~Uk5Iky#l|^fhqX}B&eP|Q zSF*`r#_c9^l!E#^4+?vHRCvu3S9KBFZ{e~P1<3*#rF8ap0;!fEz}K6kL0S^n)pOUcJ`Bi%YDOzAxdw0;nHwuSj10lM zD)oL9yoTN;7ht)UP>;NWSKgWN3GA2Ed=zYF&A38rF7J5QAS6eayOfQaN+=&qKw|z}aFlpk(_s z*ybhE^}IQg_Tv!`U?(wl`ns-y70GlZueq$C0<;~Ym;9I(B(iY;P6+AEP{gxnuLl3mb%7k8!i;KWwLgvbT0&IN}KD!uBScjZv)z?GAtQN zN1IX)s=uarP;q2K9T$5bd*?o4e{PqGsY~u4)cW}k!x?7C;U%jy*}+-C|54xVB~H@Q z*H07_=0Q0+^?h4NNPwGP!P)&Xu>^5p2CLJZ%Qh8u$--I$&8~`VPQX*q4y3g3g4OgC zUjEcMGv)~4xEw~zn7ctQ8#f%mA~ejD}RvSm0u%aW{Sd3xIufxGV%fe zW^bjjp| z%D37Y?k|f;yg4e8lsInlvNq~n_{NixeaI9vlR9#45j-lC`TsiaR zVKr7aQS5$j&6Y(p3q?U7_Xg^Q4oNa=3Zvmn-pdn(t!Q1Zb;0|q5e;uH&hEMLYrVF}DiKGJ`GUEsi1?Pc#QVRgyz*pZ;; z#-O2>i+D(Dt<|(}hDZT!W+o62;FvV|;ae6~;%M`4F zwgi`y<5}PQf+}!WZby*2D<#s9X>6y9bce^-hu7U9pwhGGUeZTWX zm0TA5mI}LX;=|rwxcZtkHbLQtmnG`ylZL%so?&!|aKk;*#0>HoA7^qGM^z^t$!#k< zq0%8uAsV(~3*xseQA~on%lJbv4UR&D+EHJ!pypjXo{%E+uI_tKW@5un!b}ds1a!}bSNhtj z0CcYwvzJ8avd%|#p4;9HJ6eGEcy#Y3F$pd6)yq$sB*`3OTTGX~w0Q(^{Hjpmz{IsL zB_7p$$qvHK^mlP+iQz1UDeM&#^6F)A7M|ea={LZ3h0XjyGaBL=kAt< zt%5#&u4V;|_Qjlm8X_2|qm_Gpe)d)(qI;z^IyIAwsy0Z}bMyR5`0vr?yh;N><%e7< z46Pcf9|DJSO9@;m*nVA^+&6~ge};GvU5?z|iig6oD}m(3m!`fF)pHSOm~cbG9v`aC zRQ`{E&<-@1{|hzY|7dh2n!-}Ur39qjB}wG=h9ZZFh{vw}RDUqJD@@GnEA&IAmgFY_ z{7&qp37I6+&n633&)1Vw`#FI>l(6f2aWqUsidDqr4#CE9)HO$Fh1 z-5vnn9;=f6Cg*tml&9A|z4$FOsjmVFq+{D3FfQP1w}WbgcF0KUIAfglH?GFy--|0; zX)lMiQKzP*0y{7>FNqzi5p(&V=QA6001)B$@4+E>;kIHxJWJ;~bOQdMlypLcOwOn$ zYjGxK6d*~XBD~gWo{i}iU_QFA22j`1ec%q81Tdv)#=y-_;w&j1s}?o3gB?EL$V&jw zdG3qm5Da7Nzu(R}B?I8@cHqz}PAre~fABz8SN9Jk11|-|A3hNyfprB`K|v@P)F0Tb zaxorQ#;0aRfmE&bKhy+>5(Dg^T?Oi$C5Mg$!Y6hm9dqurf$DELYXX9WAtKHFS3F1> zOE3LK5Nf%c6${KBVafv&pkX!z#-P>`7`F~U^@vOWjil7MQw{jB!T`YTK{)}3+N^JP zL46o)t7g-wlsrXi3Ii*qUNW8rC%bscQ z-|xq1osx>R_4x*pn#?y|yYS)-SG5+ze8TbKb*FpA!glW4w`;^-w-+4+%O(T9;#w?i zGkEh>XsunTIK>6|hsvhXUrJub7;PLgFRC@?3p1$Y37?qQNa(@6h(+g79l>A)Mu7AE9r1 zTDV3+BPV#&p>;|_kMptEx+umRQRZmByU;Bb^9NgUsomplc0|^Ido~co73>CxO=lip z&lwSsmd1Vy8Wpdep|cs4K=q2;1#^|9A{wyP&|`7@IZ;f{jX(r%-;z?!{_^4Tj}M6g zO6B|JP16Z(B}4D_!<23N)!Z4vd2QWtE3w#2g`4PQI)`+9nqOk0-IXC24X~K4I%fBA zr)nRU4jaC5pv?=*Mzz&-&opuL;xF?K{G*+rM?- zB|!$r{)SVvY;QGrc=Xl+!*HK6F}0JY-+6j356G_2bIUbf*5gZ~S3rsjEb|Cd7p{(g zr!D4|_l*EBXIep35-@pv3;SxkY;ETY-fccG-m?x$%l7TdvTDA-Jyp*3rDe@cw#OU1 zRd#UPmV)WUj?MUB=|1w-Wp(=^h&e8k~kwdTn;1ez8-$m&+qFTZgFz&9b@Av}H z(7WR|_xaq|U8f)F?}Xn5qlY1UV!^(mrAfu=_E<(T-iSEckmbU#H1^|$&(T7`Nm;VP zSL&rNecYmJw*`6|r8Z{v4>sF_1Qh1$cj9W#d@WiS;}`Q}?)96m-<6sJ7H(gyf!XtB zm|H~iI*o~o+PfnXU#56r(t@wnHq0)6IyVNQUl$-AUXY)Y>tl&j6qJ3P42@3^^{uZX zdhj0Z$DMJ@6^)|w8{Gi^ald%XjQ!&(BUQY(N9Pm?bF8*(1+zSEb87qIDA&u#7c3Y# zfGd~Gs>a)579~U%hL}@FMLheTmkn;SntP3&sb)uv-fCx};eu&gSp>1nh79I8Uf@R} zalm9hL)=NV$c{AZ0Hh2Rt>|2dEX!nU22-eI_gV4x_|BcqMJZLB>%%Wz^Y$j(vfBe| zpP_dzFU_OC-OVahFTygn#Z2U*I~FCnFi}}lDpDp(v1i|47RrkL0{qd&7@_&;& z>Xncj*Q2$UaD1n+ny}O^?0Y+!%eQy+=C|qGtA_W!hm;#$&5<|hF2+k_3V3{6{eu}N zP2){1IpUAXBY8Jce#-k6%{*vpTmUz@&AakC6IImW3W}0F_!{0hHfwvC?i%No8_U7x z0r5EEc39XQbM}@@wmAxd0nY4S($Oa)9qXP0V5?geU1^pGJ>Oy^O@iJaZmH*%(q869 z`^*yp2S z)KvG2;8QaSd)V*0<`;|45RKx8Mk+ky*=%2_e=&I z<*}3!7~d2-g^AwgY3odblj|cE;0NmCj5~{_L8UH+#%D)fmWL|?rTa>9p;IM2>Qj+|<%0iU7r9lYQg^NBvI8Rga9H{WV{n-IVdv})d-;}qm%Dq) z_^(ybKZT5}Dp>p)0bHX6p!|wEAx>`GC8Qvu)X#adc?QjEFMeqkVb@srk@YTe7B6>e zYx9U}LFr&);CZ)>`9RUD`4IQsR_8%1Gjy&m9x9zSSmn>nCT#k-9j&CeHAe=cXwLH* zxR`kf*8NP4wCCs2H9soob>EL$kA0z&V)PC(DD||6X|Zs{H0-`<=TzgTa`MT7(&BFg zR2=##Jb3UcKg&Ei84Z~e9nXL4J>=e@Cp%hC9Tesv(ME+Ch_A>W!pRI{kt~yY(Wx#ZIy5sOF}%<0Qb(uhA#ei&GMlE+Bns0>(E{Kja5Eo4^pt9E_{izEzao9csiQ$U_%A>80qG+fb zfZ9kflrZ{V&RPFEzncHiVg8phgMxTrD6hQ-8VV)>|M%^wSzH}IApO_@n7X7LB>#0c zefs0XWcZ5NvD-!6nI1MeXVE_xt_^iVCO6 zE7c(Eq47mkNawhs+Iv8IZ|4R17>~Nc|8&=H2CqQ>ErmTKGN5|U!(ZL|jNR!`frB#$ zNLg(VIXhg_Z^gDtuJUY5@B`YE*togmGEci~O}!yr!lVoot(6R>I>O+i>*G*ounwB7 zd!)h;>nTkFwF>Czr59I5tZc46hWyweSVX2=TftbW4H@Xxler!3956gIq!toX@T%`_&~--?j%;RUWv^7|t|m==zTp$YDFo z${2`9~3?;~W z^ofs=_z5~6f(D!I9#QoiEbL9o)Lc%R$4~E8yE-QLQv~kx2O@hvMBsR5ufzNx$yWlk z+|#_DkU3+3vz^Y|-j5AHH%qP*KXNYUiuDzrEvbO5c9`#t?wli!aD!?ITMqk7X+ZQS z(7(oK+rPo*I?3A8>jvH-j)9-q3dbzxhuu9O3)0+S_Z)zFC8V2>_cloGhyyCa`UDV> zlV<^vV)kgaeo5V;`M+8_^QWe+D2{j9Y7x*W(`q1!&Xl$kkg^s*pmi8wL<>|FBL;|= z28KoUr4X=FW)P-B6k8GmDnpAbf+Rr7T0**DDElHp5=c^-CP+d8Vn`s5F+G=P|AO9M z^M1H@?#nsvobx&7tM28wtVEARbJ2(teIZ2V%s(q8onnl}bq)6F) zap&xT!iFY04r!^csf^pj8ki0nRW2y(R!&W+^5ZpIX8rQrqYFwqYLt+m?SIG`=&{H+ zA^C7@A`PsG&6wtzb^4G61qO?^a46}!5FR-IRS+jYoE1nVMce*}g6D`{jyjv=fZAJ- zQU-eYLm_@=qSllO)U)?(J5=?%P&*6-UUVnKcHJwDv(TW_#-U-D(mMd3_In5R;6yUc zl$S7kBe@o#i=;Wi{Ba3^7c)Z;&mP0%F}^ajEry?&4}0;^0uhJNo$^nJ&RO3mHJ}Ar;)Kne^CGH@`qPvtA;yp6Q-qs!KyZvSEXlX&q+a) z^ziB}+L^Fmu_Q_w!*XXYnTLRpcU6HXeT$U7l>tOW0R?JSEWZmORbuCr9H>tApa1o= z@?jV$0bddqTHV!V;_5v$4&>clc8YZx4umOc0~65fdn>5f7v38Yee-*{hY$SC&}IDD zemgh0PAVFXQEmUjPwG2$eFMD472(rv;}OBAjDfdlpryc0h5}<543B=W-me~@@U|ER zVO`T9IbbzMceHYOUeEpWSCjAjCJ|w)i2C{5%`G>4oxYRk1L~DB1QAFkGOWz?)nDiu z;b;5jOHfxf$3g0_k>yMTctfdoMmm#KK%ljrTLj)N2}jL2nsqdXm89ub~{)Ttp>= z1L{qnC+4L_&sT2+gVt7U#!EYp^hNeQIRq))+UlyqPXK3&4~UG&gRDqftJhvN{JXLo zwDEOIHbP31f1U}TJbQ$50`b;7peKVArelCWsG{x|_XF`!5Gi&)dGvC@UOU43ficLT zXmGEbZtMTybp7$zMKbC7T0M=^;+(m0kj7!V*sC3A6B2$A&2h<+Uded5JY?E2-VGsN zhp(ych{RKgWP^auHF5LYK0)L3b?Dp!ewYyREAck7&ECw ztiX`8#>HbgURL=*lXUs(qQun1HAmXT%zhydUdGipDHdA>`4cU^%pWzkscHTwN&3@Q roT~q}p*op$$#}!A?mM3uRt#^1Ph`0~avt(|4OXCk@L8tc)uMj^vI>VJ literal 67206 zcmd43WmHt{+cyj-ic*6}NQaa(D$*z+dQm0}4FiZuH%KFm5~6e{qNofoGzbhWAV{fn z2-4jh&#}4wPptc0_j=a*?fKwB5oTte`#g{1SH}*$qoG26mfmjS1_41{B&IR32;&G!Gj&&Hie}?=6;_wa3pbG_?7I`bz9tR*;x8$e=X+yQR|Bfm#unnCgR@vZj90{ zR`3}T+)%HwgnoKrwS-kq5`zwu`t1ZHM zX>wi;M;i+RJs;H)Ug<}>=jZ2JwFs6JstT1|l*DwGIa+v(2GR`@6kXEd!-@Al=4@$e z)7W&lZudJ&yS*e%KnJt8P?DD7@SP7I`KjN!WN5yQQobPfrqym!+BX!usO@AdJ_ zYh~+}b)?&+c`Ql}n8m2ix62h+64cKy!YSh(;!Ty;ry$#6e0S)EfOljDo4 zHiNz2-|$Zi0`p*vF)_0(SO6Xa-SCfb)EB=VW`@l1Z|2x6Wqu3CiB3 zsw10gBc27Mmrqjp+jP9WvDvL>+c%e6m72l9!yG>yLV2I<60KjLdALMKxJ2nuLAzXm zEq>=)oqp06Em;5FJMP<~!9z{j0t}f3nG&od3)mo-R%(ELdnSRQr5$)SQ_`a1q-M(Bx;t}@qwgtyT!*Rqp{{R>->Ryo!RKfT@_|?>7@!s2jx+sI*pmG z4-2rNT$p26;e(=hs}6T9^DSI*C_Kkrwp=!t@s1+%Gz0H-6pU{LY`-`ytM7)-gZl>+F~D`R_Utx&i1<5ig1k*nm$V=Ld~PGeo#dC{*lSB+aIVg&XlC&jN)n$`^G7r! z_wi_z{lud%(+J6LhTc2o9#GY+BV{*lMdTPf+n6=~`|YLbW@`}H1w?I$4J)5DcNVFJ zp5wB5|5E&)O^5HF-B!k$hx-HFLNt-1+`)$<;+K{l2(0(o8nS3)^{EilE##Ff@Xq_K zrN^a*l-u4ryd91>)WaS_kL-o2qeGX~W*#1uwZ?!m)bo2wRV6wFkGND?V+HjdnKnkK zZyx$vK59=*nV(pOS97E1$G~!kTlI>JObV|E7*_Od`MG_2al!PxN@VfQ+7yqFyxvx$3xsG_1bUDT3@ZJB|+Z4^|Sf@ud z9%#~Z_x(-x{Vf0GF2&g6Wx4K0i$>?g3h0d01q^+4E;uel1rDfxkWQsr^tA6bPl{QR zExt@sDR{)^Xvk&Q-GYw&iH79FdFjnw)0j%8#fmizOZde3B{Hr<&T+xyKN7DN)KN&c zdT)=O9!cBuUR z=1Z)@#CMn4Gd#U;$T8WvMftp8*jv#PSQ*T>GD7>J&ZwEtBRr)ux^!vIhlT z*5EX&C(fu~p?IMG=y0oQeBP)6T66J6x84Ai3e)IRXqvkbKW4HuLF>amG)RYg#fe=1 zDTP7yBToBF2IrYB^EXGsK1TnJv>`;grn3zYcx$BXMGH3BPCa`pp}fAMv7f zTcc%Dso|@S@|tmXur z7Jj18sxSW&?7>cIO_^w>(DcNsmN)aNZ*Mx3ZuVQsVvDT@xK+}pXR~rQJ!~shzVXs# zGe_vknG(t9UR8t&r_`6F%FAir$)@OdkNO#M=WV}`k^|x`#G@A^6Y1|T@ zWb>6z5>wpwD5>v#q}_<8V#8`IR^ zb354R*{eTTr;ApzYV4=!1zfSOTl;lu*h7%kq4@$7M@$_%>6o+D;1tC0p;xrqXV)SgH zpdt$4Q~I4-bvRq+7!_TsoVsc>@ZC8j+THZZHXXy5BZy7@$W76{QY8+s@ z`XLKD)+cXD0qy3!dnHUtTk9L)@$l$rH+CjA{^%T*kJWqo9VyvK@;&#O)#scV*a!Qj zNw>#tL=o(ecVF_nB`O^1t`S1%w)W%N!un6mt%dz_Cm${iSIWL*Kh#K(D)W_Esi!`W zNe|o6HTdeJBlJ>@R~~xr0Ykkx>WzCdzi+RmUQQR=cnBk$YO(T_Z;W2v3~jgbtWq4? zB+HB}#L~{1lwOKAjzpUi9eu%iz~NMS$Ft~5deME#_`{Q5pYA&S@jJach;yQ46t|+6 zg`Lnm{M~)MQ{_E018xQpzImJ z8QRLZ`n)vZf8L zjI8d?<(AU~N~%7YBX@ku@@$%&72l$Y6Ctc~LgNg*HXep62eF#Q+m3i`ZM>`h@-S=n zaMss3c=Q{spzcMLSROJ>%x#QZZ`k0q0H+x4Nrj1&HCj>zMmbNnoQG%W{mt++He6jI zFTUH&z6)kal-5rS5+*C7&y z5SOOlF{1K?;-oix_rFaEiZ1b1cW_ddtbMgYQ?VP&tc$J(q0JY6!m2$Q@mzZ;yEk7T zCqP%vM?IUsU;H;hdiT!7Cl`fbB{L}ni5%PM^Xq>T#f0&&uD2n?*Zoe$oz4>pLs~1-jx<6?$}cym3JC1G31pbd%QSU1`C0yp_YY0!?MNVF;9hT*t-JP zUlsUJkybrks@#ge_>C#1rbszExRO6wo{X3q^bJIkVaicc z&cVzsAq>}Sn4pphm2m{iA8vC>EfoGtM;9vR`M%&*PaIeLAgEWYmeb@nT92IDI(D1E z+b6ZpBmMkHwJyqP;`7_5yc!Y>{jqv{Yg<)X%LJZ;YUjrQApXG_D$oWtiF0$j>hi`57f0 z%<{LE+yIJY+m7Iy4G$%^1|1jX3)+jhRAVoyII!gcEG!)I-dkvnzB-lH$WlOf;#4nm z_4#DSw%ZXok{Jv6EkXrXMdHuG`x8fao)M7h0|cY<^P_q;AiCyGCge=-0UKQiVzjvx zf%TeRrlR+opSK!#{Ql*9i*S`%M0_Q*9<9n}&hlG8moEY)EVch@)fz9_JiJ6iyYAEPg01$qSMXKE zWrw?S*_vr`&8dC$q13VlAz!Kief?2PNV3WgeIuYFCYdOo>b?7kZx91w*Ny~T7tmtPc2TCKL>=OGw z{dtMj04|!N-#7vw+%8%^*cut&iqjt(u$%c1*B?T~slSb1t|b-s++H4kfsh89rnu@_ z2Vj+gdWDap51>`K0HE0w>3gVcFfldL3*R;Q{pI1>K@oW@AC|vn_c=~#4qGq}n`_If zTFPmmsAsq1JV&?&z2(il&4n2L)-}hU>eqInbf?-<4nTaVlSyuu+iUGFww~+3z5sQo zHWlO`y{}H64`6G1lUcIZa}t~>zn`h$E#rHKiy6A1{Yt)Ajoyb^G`U&5&Hapzzmdm(*) zIn+=rK!`&>#kZC{Io>bC>R-JMqGXd$`AVhz1ow#8kA)47K$sR{Ud}}xO?US8LS;7q zoYuSRGcH?0uH~P;Jox;Il}A=TmE=(uqY3R-5G6rq$65U?y^cji9K*8SaX?>Sl< zh_B4)1w_06TV!P+QvR^lrhGws5AK11nOdq$UvRPbkkkF8!o~<@OJ*r2+*+G-yR@mm z1K(Z@n%w?dGH1Z=#qy;^1$z*|iWMm&%>uiV#LT~!J`Bj^qm)^`PG@h@^lCd&X7v`M zm|2Jcz)&F>Dk)zQ1re$dpx%?Q)#teW*)F@1v65hsns>Qf=BG=q$!UJ=oMhIitRFwF zjSSBI`fLjDHjeeg?D*T~6!~2rRP_#aH$atgaU>lC@xewt@yd$lT_fL#mCu=}4q2Q; zq9JiTMm|F=zJ&;u4^~j@M}2BdlRDh~Yn^0Wys}LwDhY~P`ySzGCSw&Q`v6vz7wk=N zS5(tVf_c?Q#RG-_hMQb{`fK@sK=C=CL%eN_&+H4aZ9vcm=tMX(LfU_*U3XR|WW9b# z+EH%w<{DLb>eRyl3whz66ts_W?Y}FapAHu&E(HiLy|2JR1<2NhBXp23!1j{^b77zu zDCfC_z=w+DUA%RG9=xEEBJCQ1u}8rhH$_Ibz2Z{c75Ciut$kPECJ+z?DW}IyD-Coi zd2XR&6a$efTW~Yi7AowPpz1I+jIr;I2D9$d+gla=*22p^?qCznx(=UV@<-C1_*O<} zpkG?MssKs4{L%j9zHpheyg$pfaJM z8Qj2&R=}B=Y@ETdh7*rG8uJ#&@O;ci`%>I?SVq3B$Gvq%mkMoyJG5if5(;VQJR%yH zku)O9r7{u_Ii%&Lz1|gb$`Usar{MH!9}@Ez(8nIH{6Hx2QAbop=60rvgz5`xfJR#y}!fJD5)TCVW$Mxm=hE$3c?V>^S7lP6+e~h8%d2{LE(+||; zGffFu>wlh8?&286X-M6P>9#~X<6I-o)#;O^e7KRprqsm|<}|5Y{pxg3GfIgplAKAR zgXj5LAeX%;d)l&uII>yzXC2y-C2x~RMiq-B$lEf=AFSWc(kb{zc}=YS?7M&HThr19 z=@S+AKe8KyIP{Z^g_qsS@|WN#nZSwEq3?5Vp!By<4l4@p-Aaos8m;#SkO zxi_Al!W#i2r@PWxlOA)ro}4y?Kq1Uai7J+zd!92tevMj*-2bJd8p)X)&ALIpdeYi} zGrjwDiPR_0nq=_!{Y~}VMzOSd)p9(4Lmp1KR=TQdNH9l_p<-|BNg(OHuOZpcPUSLu zg*b#KS<$T%lKk#$wNWg{SF1V$R91 zxy83Ka~ofN5bS))zS@q7x;^3Kj}5i_M@`fyhL8(`gvRV=*eL9He1C^G{|TW8QqQAh z25Dt@hBKLjb-U}O4+*#N>UL|wWiQq&O6tkHOB2MZl#4t#PbzO;_PgA9)INsv3|xk_ z#8|EEb%hsy7afyd<}RPYsS3xP+! z$Q52&ex~e-{D2^FbkF(6{|c9Ra`)Z_lfXKVuy?Ec_aId{X#afQ+b4-rLdS5HFJHXU z^|Q~-?LEO3>6r8I%K<3Mo6%=Kn&q4JUxP&@EV zD^Nq@nP_%QTGa|Bmn;UNf9KD))g9V=o|TcxACP;Aov6`q=}*l!Ll~SpAG{W$O=-=g zhhNOB`wMrHO8ue3)*HHw5_>=+u%7SDYwoPNY~6oFdc8w28$>L*)@`F@P#=*78B=+b z8k^@PWvr*Cp)a~G<+`XpB4^SgP(Ec>z=IE+kK6H{wiVDVY|;g|1lqbUK&BR20d!RI zjs>FPCS9{N%#W)Bfx|3PZufCM4+0-Yu(8#-RB01;d+2-(r(@#HT*FE%sJ)w2M+fak2tfAU-!=&EUDS)0{pH%=9C4jN-n#O+n<@Bia@&^ zbm=pvD@n9x0y1ZYsHj7(BSQ#Aq&x3>tJi%hCEKJf2v6Bc^Os)hDpr)5Tg`5?#;BG; z-@buH=usPhzwuidQo6-fGd)#+jE}+AN~;kNB0{5n@8Y}6d_K8J16dD1k=ov z#-L!!u7-|%3TG5z*NuF9k;i*40#H@R5NPc#W1&2|WtnN-{h-!T4p`<^da|OD!Oy}k ze4WdYYb6bM2%6K#H-?*T04;Frib30XS-JTBRQJgXRhaL=jeTRFz&ja`P zOWDI%gG!%R=3>RztNl-Qd^WNk=>*CViN{rD{FXxs`GGrN)7gHK7!a0<)Ak&aPa2oJfs$780y){|{TYYB* z@t>xW><@~14CflVPyL)scqkB4pl*19R*B8r+`OzKEWPOzCCmI&mQAd=e6Cpts%y-- zK7>k0gG$3Qs@f=kJN8x(D^&&}RT#B2l7{5LhAHpGL=15!S&cm*kh6MQ5k$^7NyPB! z#B96=h1|9=oi331_bFf*7K7tfg;Wo;HY`_S9$O2`0$ty4+58>uN6;du%7c<}pbBqQ`Tjon&iBJO+@Up7ZA14Dq~u+`zNDC?FIhRO zRUtvbRr_6ndLaMhh3A|iXXpjH(Gu`vv7VK0M4Cu`L4jlTWw1gDj`5w5G6mRjB?*lI zb_4-^pYFc*l>TX)l6;`jw&^lpJr(;N_{5H!`^|c`^P@dzee2km`KlVP5X9Z+37pq9 z@|u`H=jcniz9S6jkzOpVD*T~Jy*3t4JEx0fBjf0;u)XyZlZtxP8 z*KxA-Hn3GhQIyc>RN5w}^GNgF{jB#7TL^Qt|8wGSAD{i`_cCxOua$hXvub|D& zxMLxI2<2n(VFn3w~ zU?Cs7l)-eM*1t^@!!Eh{0^N`vg!5~AUyyAxL8C3D@IrR&w-m|h!|Y9HTrz;B}0rXqG9c|2^*C*2eR z!k#GGC!gO^ZZXi2##ui7+$t&UXJ)qZ_LvPQszx*88w9kkDVU{78=fd5)GGU)TA~HW z<$*YGG0KZR1KE??Nom{dHI3Xbkqvqqzf>1Ra}@76^g)$wZlEN0Zzx@{QNgi>m~Oj+ z&O~Iqx6;FPt~c+!ULmfSz%gLhb4{I2oms?YI0WA)8oj#Fiu6OkL5nZFdhceq!-lU4Co+y_f4L%;F$B3Ef-Tx@b zda`Hv4X?Quh+zGaQ^|iDQNLbGZjFFcWoVmxTELHe(3mEmNJk6le&2a@@uSSyI6{3L z*WbExf9<0m4zya8t2;{l5+5;ZRN!xsV@TpG%=vV`-iyP!tT{}2P_0gei`&>V+t}uw zAxg8gy{5l5V}-`g{G>@ejw$vNXbv5bYYj|}`SHJgFtG#?Ucg_v|M5lpK@Bi7Lok!4 zMP^u9NELlrGciI`F#}YZPRpLnB;)kRPFJ%o@nKZ8IxLDXSy_h6`A4Q$F$R8>={HK52P;%2$=x z6tq{vhWa7><^UM%F`SZ7F0~jrM)xt#?WfDYfHy5sy5p2{oORx>DW|A1^feRi9|GJ> zF6n#3c%)KxUoJqEY4ABerNHZ%9b;sz`ng9UZmP73NY56TYh^mbdL3Ds{dj7o)3U2P z9~4=zu#QIm&MCABc*r22G|GQD0A)lg_AVvjg6Q*@PT=Z&?MHgsx+vEZttFT-DIt#O zdMXTBJKim_qc%>9e)v+;ddm5}>`D%PZLulK8m~)@=F8e+s`6;r zg(xUwmaE6V_)yBFpsdl#@y0J3&d~3g+MIKYKsg15x`%UmJi6Ytyxe5ufESX<_|hj? zRA3b;NQw_ZFj6-y2-A)DXlw0X&H0?J`uO{@pN7QtKIu^L8|bHGBiK=i%_wHjM~}Xb z>i3~g`eBJ`tn6ju11cgcJBANHXRhkpRm(@p z8^nryC;zX8yP99}xSYqPl^zsK=tNv9$DbR01J5`?Q%2qBO2xq8|XoD=A}X?<^R zJhuWtQ0wzOE;zn=4#(L9Ox;BzqB-dI`Ow}5pxMp?Q(qI_4x(hWL7)rLT);mxAF!>e zM0_=H)?W=CziFPyD`7uSimrNqErb2%&81=_Me*S&h;15ehYfOj^MAYl4K9!;c>btC z4knTr(#q6erqkm;r~U7p2=>&$A?6yAVL`Myn-5<=)Lf`oYqM#-WQ4DHBdFJ%3vYg4 zRqac7+(W><%GZqzu$-|)&ARsO^EFDBe52cfV>=j>AMMnNQ}HC6BY7-dPQ`s{fI#%-BPAICMxwK zI{%4Xuxmxcen0-9{~ZOH)$f)zECnPBHsfVIip#NR?f1E_8$rSOHyF0xbN-eev`S&bm7Yf=W>7hP093XB1JY;) z^Amv;N6G=qMSuIbA$P#7k^ERkN2fX3M-wDT?O84#(5>K8fHno@4oJf>c4R--*dW3lOnZYJ?S0tXA&%9%_tq_IeS+TX= z9D>R%5MnR@;jj5ds%ZUiZ7(HLh6w6IL`kT73u&$VW6zl%+2PLW?-Iw`Fu$}7oZooC zZ*2mpD!14HRC&=tyKQ;2?pUQZY(rgCFb4rt$UlgJdDcHXFlVh+1_xgKcYuIa?J{dG zydcF?+{~R+N;3ztVj+UBe&+quknRIoeK10+XJx|bx$Nf!ts0+W3NZ;;EF%2gd_g}t zunc}t`ET;O&Jab>gOg=oHSvRb#cl|(!=W&iH#Uw9B71AwmiG$L97vKbs#N|Y0Pmjw zZChFJNk`{lv?|Teipm;%G?CTx8`iZHg>9mtc3OX{Qd`H%4~NI)H|jU*I3I z5>XRo_SZr0zCtdeY`fOqxq(KzH(AngU-zVDf0t6cTCIg)HzXY1F#Yf&F1WC$e^-hq zxurd0XMY?)LnzBQ1y0;{B5Jhj^L?JQ`wghUKsv)|+7utmTy{w@SREHVCaK4sbA5)S z1k3P!O<8jU*|L(hrbzeDl}%dSG>)K+6$wDm@(ik+L^N|+@kz@(=Iith*3h91Is%1R z2FcZa=ep#Zbl~gk5KZ|sO5NAyYw~!?SHvc8-WPUdNu6Qcd<10#PEQC}4Ex}qU zj)mQBw7HYW@TBZa{XRfqjNJ? zT<=7j(IWNW^XudM3fz?tr8)3fb5~BSH9G?9VPs81;y;_D!-fIHO7>IKmCu)w_asSd zhG5BHSEOjwXSD<|p+xkj#DxkJZA^c{RsdJ1*Q9aaGJ5bC7!>L`hN++}JY&E;Vs{E* ze5Z_-AZ++@zU!Rvr>Iexpwm=O2q!h!?Hr!UoD=1h^ z1NhBTY5|4C90~Uw>8%iNeZL?QlgP$SEV~?@*18(Lqk(06o2am00)Y$y98*)2Fhi{7aOOMfBu6@ToM2>-8FY`DYL zQoIi~4Bm#NO<*OyZIEB)jr{KPdvM$~#-Ab|54z&--7u8xDCp_MPk(>e*+mLRnqE=- zHa@4uLsGRCcZz*%u_}PQYvak|_38JKn;YlKK6sKo5?JC zx*BBX$IQ|$>(&B}NNEZ_4QfVyFspZOiB4n`af)AH8WhE+lsv7GCsx~bLtYb;s!|_; z<+aZgj_H9YuN>&UbA1JwjimZ5Drc`J+@T$8tnEQIE?Rv%OhkSj8aEWIpXsHF5#L@i z(j7o;?5qtWeLwRvQ^g|1Sx57bYeV`)$#cp`yz)woXd@Ffl=e%rkji_2 z_jH$cfnInMA>X!*MEtYR46gt)`~(gDu7F57#9Wq@KcrdgL6l>80bJVc5iqADz9ONL zq`8}sEDHm9e?mbaniyDa;*50LB}sC+F7P59jH{876M1awZpLX|n=4g$BH@_4$pIkP z=Ih`C-}Ktsd?{4=he%%B^xKP1(8cgbR!arci(uPKNzhN;hf?$0gh+&~jr$!<$m)68 z^xprdw(_+CvKL#yh!&vPY!Q&LfW_eTY`aAwS--AJAY1xrqXx4nL5l1NN7% zo*mAv0?bRf9WMjwaIU$Ls;UN#W&{q&BMm{H=aZGG0b(rb6|>P&*p&GrVd(9Zzh2U` z99rp0XTpgSQy{hCZ3W$6BXr;Q16fuN5Yb3u17MQI5pW*e58)h7vC@tSoQxeK56EYf*07}4N{lvjESiGV;nxjuClIsaa@FZ->a{bd6eFm=Da?*%0E3qaxMMlgC90=)ZDZN>C5r&F4ueEv6jCT; z@U?WqZoDblTYgbY;aOJ{ON2bgpN14j3e_6FGkI+B-pOEDG5MyS3nGfUK0u>~Iq14C zfq&8X7vn5Q3BSXC~+?y8g#Fp3!amWNjd z60Z>72%ZQLv9JD)V@?+#`#}sbXW0@rB#zxowI+k2q~+-%C%bx1PSKS_r7J{a%<_AM z<#lgRu7y1Fu1AZ1e-9Z}p>tFp0PKA(dfZu?%M}T=@k5e?efm_WgF8T5ucmX+O&M;; z6^*A6@#D^(KqN3(P`ekk{3P!ox09D?+%n`2mN{Op0hM0=1{%-Z(kSBpSOrb~|AjsM ze`i979bQSxeL@GI*Vdo~gw#?VvTlt)uyOkB^H-d6^2GOyH>Nx5n4gW6G3Oq0OWtJM z>>1UuJQ>yl?;G!`b#ZSYZ+m!*f&%Gc6HNnS{mp7F;T&;Yq%26cOkci-$~^hxRXNgf z|BqpmzBL3AMx|qiAXDedj=yT4HfQdSV*4$SG*^G z1p8q7Ss+wc^&I3C>vuKYokv3yp~z3)X^AkzNb*ZI-M~3EKpjw1%5A?j0KM7; z(iGe(hv^8$_=Kp)9sqS0z>Kx8aqd*6<2t?qj92EJvsf4{(FNHJg1<)>V2)rF`Ki7t zg+b7o5np7@ROH$EW5gU}^#Cqtg+!UbLiCt;qm6~ohd5}19#B*d@PK;c%UYnG$Q|>Y z#mX(iEHFSD$>a1LLJ_?3Raje0Vb z>=?oN{HLb;kTTuc+u9C&$iEwqnf$s(iboISFB%(1wpoL_Tb~Yiz{REQPtJYXFgwY+?gNaFT5rGv* zU}~(2eS|2yc>w(sMPWiu*4YUi!g2&(xs)p$C3Nx*f#m~OGB3u_^Cz1I%N)JvBiuFJ zf+$6nKHrMwXxSOshCblccD@^ngliG`S2%b*!=;|$u&fy5Xhs<~9AYpv{BEE#O4eVY zLw~%*i3xotSAS_{hv(M)Tk^x!p^=5Bpr>zKv*$x_ptCBTn3jV}HkYs3?gGZt%fIXa z3Hc<4dV*L3U;ux8Qkoq%2$ahFXnl^6`wiu5A@(C&`*1@Wu#?d-V$q<-L??SeLAQwE z(JV%2mva^*)m)Aaw)X6pjds{SqGSSGp#|=GLq6sp^-9160Wq4z%S4OCwZ-o4z zn+J3@FA{qsO>ZK7h}rpa??V_Rp;$69F4hk;+Z3_hoTKUUq3%r0L&yM;f!q?~eKrvF z1dNs`j#)&9EmT*_A zIQ4u&cmoXm_~v<{rkawFa!gMz>5#D%N-uTxEHovP|IEM1-7fdsSrvcMb+Kep20}1G z1l=@h*v5MScDe>Q0rp2-Mhhlf3U5Wm8#@fEybsR)igRnN!Jw&0d%+-^G~(tMMDB1c z!TTHZTxS$#|Ws6jhu+o`GqrLQ4qKNAXJPdv&N`< zLQsk;2YCrl*!6JnJil-zifJ8fOz#Qmo=ViugVX0=wyVKuImLh{ z_Qam-!Qp<8gc6qIfL8$RDMr{Ya7~@b46;5E&CwGk(^101-4i_lYG08%tTf6~8hq&% z^r>YCD6RJGc_x&I#mhv*x#F>U15OY^fH3ir<4Y~m2s~2K&(eEdkawI^GrGZj;Mc#~ z_S8$c6kpvXdcK(HDRRsLSu@T$;?8!dI74?rYMuhN9UGf;3i%t!O8fthfgnDd4Fmdh z84T!vLwk7u03a6ZS-i0$RR0A?@2^+_hNNSJxkzS+Wg&xu{Giy`M#4OuA*ge%51zq3 z)I+AmAiZTT&xnv^B+Tbsg*2qqGY_jVVE{r18v-|W~t6y0L*xAeg0^3q{LE-wTWDjM|0>~BZ=*C{Cr zd+7HlHJCX6|S7-Q50LwfMsDcxr( z2n0@edz}oPtX~@r^7^Si{Xhs16Ss|Ep0f5CO^tnDT?UR#5=?suT#(yRIyiu5c=!Vvg#9ucS zR{k~)0B4;C3W-DPdxV}H3yQFPy$z99#whZDN{+b8?9~X>?%5mgT>Ig5gcLz{?TMDS zl5nA~yk)w_KU>Fbq!^&T3hinDpwj$glI^B)bV9iEu=~`%FiIh$nju?x8{TTWCjc}& zjR@rTknjFGq(_qHunM}p*9V`Y!{Qd9@@?&xa4ND`A?MgL51#nOLhUz1T!e+xfQcGb z7A#rpHAK|%WNgHh4mBZy76t}vZ*Q)img~Shs)gXBDO9vH+apFKlF*~?_|j{+<}|_; zcvKKv>yMlp0Jc@6e1kX17_Kx0(hxnry#*4kt;54n49uP__Bxw0c`n!RZzu;5Ed0)j zv%UYQHB14K>{vIk{q%i*(O<=0A3 zqJ*}a_%U%}O8_*Hkri**+Q*0t0EviBgmX0_T~iuB85V+YEZ_WzN%tidCZ+Q8%MBJ5ONh|1KyG6r?dRzT4|u5!m7RIyFaK*JSq!SRqLzMld477k4~yT zK~OX8>+ADQ6&7xn_)Au`1n0?#@cH$M)$jZU#xLnbYiE0Mk4o6Zm8iNuK=h|6@EoZ% z_3700GjZlG?Be`>Q;hl>iP4VdfTyD8EfL|yA$-}QO-;do<>M$a0LLPZ;=!DuJjC7z zwW~LkpHs*1)mxvQ8HDbl|2SInq~Juv^@hMkn5SD*^m02=aiWszzUujj-E)WNjU8d9 zvM#0MIBKrzLwM#@-|O#_k9V(<-+45`L^POC5+rO9CZ829vgJ?5=LNA{nx3X&MFvqw zPhh1Gc1Rk11?}u#UF+|Ut`;QjrU_63jC`PP9HTC7pG7(kTgU|&BHDyl&o~jeJr!0b zB$|zB8yPd*6Ms^U%-gBw!df^OJ$l6&bkM}emVr`4$Dpp0$W_b~a9@lv!fN|gBbgyD zJWXv7P}!|8V-}h*RH;k2VDa*(!gUf+qi`` zrG5mqHR1|K4_LvmFal8-A|12}LxCzICL8*+^-8xB9 zrz&wX5SjY~XKR7T9D?dLlDD5nol&$Pxrh}aITN52$s()Io57wcQo~4iu2@n-VleU{ zPqkdelBt_;%10zBVt>8EhXQMh%A z@cefk;gDvL5>oq^RDsASF8#%ntCm_|s5MzvZgi*e1l;$nxJ&1@PicHck%XE8L%}P& z>euiR$!(O_%$%(YB2+TPVG(#j97x26^JOnNK`GM_Jc*?0G3np~2vI2Tyet|ACf8oX zVK1n9Sh3!vD(8BZ^ll>5zJ9nrSJJ`*rfX`QA@a}*y5@9>42GY)mW$*AJbYm?>~!(% z(`y;=d%*If(=5)PWFEVyAFfP3N7o~AgDIMZO}_OxOh|?zdW2k+6-3=#5E&N7bOa-> z=7>Z(N0r*zfJvoICvIU`;jltosrmXw!_s#@4}Wn>tfC3Uzr#I@q+ymUBri_tivIe( ze<`QoTmwo#;f#GCiD`t+2;R#e>XlrO5>QokGa-#*FX<8=*( zs*ftg&h#e54}KmiI0~Ab0tNh=*UD$!`kT_}3i^Q#VuTFvcrnY;QhhVMM!~uAC4#!u zx#34;zV#tTfk#AB{*Gi;JJO=lQTILu=!EA)FO+=>_ zRWs*dCI~Ois+H}`mqXOYz;d1sYHXSnoDN>A^GcB^;2vPJ8qZzAhF^m?CmkA_tqu0; z_*wQt>DsXlcZg7EIQ={~VN&)JbM-5lAx8|fp$L5Hrqfb2Hn*_Y8v%ZP9R4Ew zgFKib_)HHEjG@iPUJZJ=?SY&j7_|4q90s+*X!!!54E4=!a%5!g0NPpe@T@&_<-Tga z6EVoMOw#}0ZWc7)Xc4DH2!}j81N8FSZCF;3okIX<8}6q2UZCH5zLLY>*z918t`8b* z(!6;D)F+*z!-JU0tEND>v;a7mEv3!C#m0Fh!jB9L!?ci@?L?vN$nYlkYsc9KUI}b; zH6~x$5r^a|2Vk@i3u0Dt!Um~aR5Co4!Irc5pEx0F@T!xo0Vde^oxq179*lKnii<-{ zJYB>B@Giud+m=PIXvpoDr9}n>5`zwGa&5>d=Bn-RAWXzyph-FL_rrM03*0$_Bf zcZ_bJi7rG)FD@4f0eL|PQKYaMfv{mkDNOgZ!Wf$j^7sJfN8GaQ#wOUhPIuJQRYD9C2?Kk-@Zdc$d4Tj_Z`tnKW9Dhclc00trB9lKfeLN- zfb|v%o&_^vWFn*HRM71?$}mHArtRjP&a8r}n_3zI0_i~6hDsVES=+CX;F(>U?n3AF zOp+1M$*(Ul?W9+SvE>pI=sulb{iMw+cLLdYU-~=}#%f7Ne4w|cquG@5Lc+t~Q3Z`4 zSSJm-0mrK3rB%Q)ljeT{wuJYBaaiR%RM@l4`3nYs+`M00nFnDJ{{QnQy%HPvTEa`q zh#vyX{>iAyyA!G@4H7N!79fAZE`MDL43zZ21$2cn9K_Ya29B1yt%ux!LA4J}AYt3`{YLf;tkI1sK2G_mR4C8K2)(5z<4N9LO_ zgvMUG>-Jf<25;|4MiA3~ET4$ggJ=Axi}%%k)J$8X6|PpeZ2tXx)#(;`W8yJZV}qJR zVqi5XdOie}od^_|pcN2C_tuJ!2Ih{*?Jp}@Lh`Lap*?tjev%)az0*L{(w-UG@T$T8 zM~NxbT*Aa-tf>>)PR2`R@k>vEjq)CJpk5|8d2-)7S+$Hnm^di-QFKI44Sa!NM ziJnCGZdK~vyzRAj8UoJ07|oM%u0eGft9n#)QVZO`c_bkW+CmLHK;kl;J{Y!}?r37d zlP11xj5YR6?7@(rGPQ7v7{w7_#K=TXpcq`y#*V;Uw*HSs zb;Z^DTu-2|SQ#x9@qksq%S`ecqBesPbk{>doeYU?tP^1tV3>5dLNue%lUqq0rBa>Y zIvY_+_0|uZbzPX~GEh4u5wy&1edBHPFe1?YH5QYyM=b$K9-s2NGIdZZoFX4E0OceFH^|Vnjc+leLFVHGn*~1g2Yi9EfJ&nKp%p6e_(83EkhI5!pft zA*VeQb9kc7T4km|If#!5JIt=|ZTzoD>p`BtfKJx@{%y32^X>Ax}7m#Z900}AG1_0H{`P1T@1T6!1OaTk0mT(YB-l|C`J4>z7TjW7oa_7IDbm?j+ zLU$knzeTG1N6J3Yon$A@*SJ%n(J6Kbc5U_oRsoFxwkI(RixZv+V&;Pi^-%*5Gm;gk z<*9&&S$xm738?~p*|=0E7HWqnjk>*vIDD)sR-ytS9g3)Xr>eCB)WlRsL`7NW7}C#; z-bw}fX@)!v3q+PuH%>$Kk05V zdV?*b_4%~oFQf)}Uhxqgcxq*EtB2$K5k(MKl%ml(xMT#6&yk)(&yfVJU(tNLP-Er_ z-@$m@_^*!>idW#n+3{3oOfA!}Mu^*oxr1ZErEPXfUu=1T)hIuk?@43w+_~gbv6a*h zF17hLvPg|q2=TSsXYIUB#i2a&%D#3yQjqI8Kd5{18jB^PzTdL4IRl# z{5Z2HMhOvXEF@I zw%EWzM^aOFFzc`FR{cT2&~{;tQNp>wsBcyw=}d$syranr7Fnr2z4AXTFN?T;{>eXa zWLdh@+o3Zu@EP2=JD-9{R(`R_;mwTTN{h{~+#7!=diuuy4E3U}nf5j2W_&$spPHUG`j8jS_}bu9Cfw-C#ua zNS3mc7S$*rS;xqlG+dN~8B3PzDKhE){jdAD@8db1`^9tIubwx($-!a#m*4mNp6BPB zyP@(daMHO_C{Xo=@geC%R>$GyCL!ua&4sQM^xmVm`taf#tkoL>5?^ab*%xR^Pq&}Z zE{N~7e5^{RCA<#=vPt8r8Y2OLXS*{e(=1<_A5gxIK6jq9Mr{i_uwjB(cSPWq&5bBU zZ0?u_s@aJ>ofuvo95a}Z@mKr{C4;>a*Es8J_4oQWA`cb<`auEQpR4L2PL*czki%%0 zm{nvzjWnflF}-eSW+zW^psQZYByGq^H+_D|Xa@(Cx%Ho5@AXv2KR)rge6PCd>^?xa2P8AHYZ zpJCjOcdN;hGeG298s&l3YR|dzn^`JfLYrMv*s70|q<^vOGA1Plu6Fct<#B)Au9xd- z2Kx8&HpEF&9|!dHj3l%D#)HvPw5xc%C>L*v{%hrxDK;@hScXj;kFWv=pX`8_Ya2j1 zoBkXROm-UoA%2K31?%#09d1Yr{^RR%5pCfJB(PTH73t`rq?-Z=8dnbhPGxwbW4P_sxz_dptnyZOixIOJc-A~*bNAnnOpBWb3P&2t@lz(i(kML! z8dU(l_qycY)kO7AX-)W4Zf}xECu=M-DT&$&M*sO?SErlari)*>@f?mZI^t-qDpg(K zn(*}vcgae~SlsfZDI&yk{J;PR4lAQ+ErVN-S?D8}XQVpKM(TZVi?Q(rL&83|{jV;K zszT}&VNPbsfKEGhjWZbi<$TRmns8c*>s}44=Pc5|4Nql4?~dYb9}w5!im&>B@wAtFl*cqp{=IUG&Pc-b9(AV!<*$jwI6 zSTnVswiRf7^6WaUn!&B`?(1xg>8|ZBYoF0()vfz~b(X?4h;iXX2({{zV_YiS9s@P# zwUP8&TxrOBAun4AJXg~vp9SU}%^=BNQtEvTNF$HVp?qF1U2*(=dhV!38&xb|rw!={ zhVHTWzvC1_X$*bhRWABE_|UJPuDQaod5>tWCWOY%p&-~GILBd<98Xptr#iB?o2ddZhy-;~)jHpy2YU&dhWsCIf| zn?|>WZumRIfLqPEtUa~L!XM`{d5`4Ddwh3myVFFiMok$Stvajvz6-+MCA!|x^kc32 zNVYRFBlf>xJ`UYydrQ3vnlmRKA&~`IS&V0)$a`F zNy)b0-XO;D-OdyF*J9+CQ>hQ1L&_JGAr2(p7r;}u z>x?mng_@bp4+;QN!x&3D5U7E6SH9*YXXFWIm6^^hsa5Vb;aSI4O`kh!toONz9QxtW z`dXE_WnR*NT!4&7YEk^NHjTuBEGjIw>?Ox+pR=t@E@Z*s-$H*|i%GW$a5n^eoFmwXrE8Z95X1mK!4 zyK0%7b-~09_QU;P3)stx#TpfOiI#GM4!t`I2oYMsClh^}0$#FKaY5*HZnFO7dRzlB zQ9}m33oCafM5GJ_ZrmyLv5LUm@Y^kG#yv*1#C3b$bfRl+*?zXr(HQPh)4CMGxB|f& z0?bwZd0B1Uvlesb%$3)jqkO)SO3C)9@UlH_(sr(aJd2VNt8##bhL&k%KzFz%u7}bS z!*g-!Int2&Yw6yM!3g>{sN_@ch z74^)~Bi{0Y82+zN3WWnrI={Cs&303<)JXhZ#e-?9{oX>X(-ZW<(VXOryBR4vheLz& z_(?8Waet=_6lzDKQy{r8S}KiCE+tm5eiQh^o-Rrpd zg=B?PZGX(l<)hWP$paaw?GzzK+c8c(!vRq(zk{j+Au3>P#-34WH{JV?zM zd3!ztQoBUsCqpvWsqym12Sd2%wk{6$E@!8SU_0|h>PhS(gPEkkNjKN&$~tqP+5mRD zR{7w2x^)!>ubF2^VyNdLR+t_vn0fia_963X>(FQ8DLPXgJT_yC+zY$dfHU{5D0B1Z zhTT<7!AcC-VUxC%m%clzhnYyqi_}b1+7^iOpxSB%^Od>Brl;Byqge(_j`H|2-`=FA zY>#IZd&((U6G-b{23rNHqCXxHJoGkV(otjb5$`@@s3y3p$a{H8`42gErs~_($8?ZN z%cYu|1sjej;&{(8_stQP1Nh|Oqg!y8V+_CG2R>M)j^BkmfrTk;6Su6Y@4w9`Te%4h z=rZ(m)u~V*v!uL4?hlnF-eZ)!BF36r_F@X6^N%qT5k^!9-ByrV$hDrN0ArHp+s113 zjHYeiA$K^;G`9SUg22B|({5=?n(M|0k&!taZ~;pV%jy z4?dEcR)`hsS9dE?EAaJiBYSRS-~HgODENH-$&*(CvogKmXHDFAPH`8;rM@@0&AikS z>unkKj{N8Ee^JYsJtOgIJq9Lvv=r_gU;kISii?|4-U;C`u+~?{6o%s=Q1QO|ZQc>- zkkzU6^mND{Na<<~W*uF7#VaFkmw7ISDkxZji0E~?pm$}wVf;OFlsBp~>A51Kx8MSE zbN5vbu&~VZbs zibEWQKOO@F6<|S=Wb59yJgw-pBi&L?e@BOQ{YDdONv||67TAv?>}IM3=-Hm?U^L+6 zQhY70x$)*NVY_r5BC7&;;9AZJ_k~qT8bvh_nzKvrLpjMl#eghh6MXQ(p<<9he^+3P zGoa|}dTtzC@v101df}J4gmFyN%86qp;duX!U}XSwUH2i2!8wfIiYS>x1yxPkHJRx3 zbJ(o~24K-L7$Z_Uh=zy&rL1SD`&Fe7pjH)0VfvD@S^3f34s6Vx>W24a0feK*4a-w2Cyb>t^&KZ4NCWsX>oeJWCrRT%svJXN@jO`eKzdEd z_2@f5CEfAdFfHA9kQx<|t_d9(AA`IzAx$H8FUkoKME6#Et#=_+dhvUENm zR<#}{#cdSSRiuYbfc&hP)6yI3U9vwzbO`o|z8ostX|t?-@xFg?RNd0aJeP{d=YVX> z!O?J%DJ=*WXk0ou)bcp;=gRWW`hZCzZKG;`;^>;5O#by${cH7)c`}*d3QER)#M5M_ zA#QwEV!#7x;L!ze4!RY1qR0Df+$(|A??hm~kUWKmFy8I5Rq`DIi=jU}cbRfcXJ4{m z1BQo=Cd>Eem-Yt*AGkK$GAwZNb{2xI#q5Kx-FBF8lh_4&f-Q~amBuCDWjdIzhpTQl z8dmiboWEDN7{bRn12)4oyZ(r@Je*4?qep9t8882J7RKW`yk}<+&u2}(0|b;Z72%<}?pW7=I(l;zhwriuy=yL&Xh<<7xbss|O<31*`(4 zdaocnV)}ghd{t>=Z|40}UP@~jWcc{$)~18jX?eHBEQJ=^f6Ry<3p&XH1+Bz<3LNa^ zX5nAGkHEU989Yz8(qN)WS?8;T$)eZZ#^4D-UvIyWQ1vQT2FFb4JPE?B1py-c|*PcMMH=@!;=0Of=tl|r9KDT^Ob7{Fr zi8U`Y!MR=h?1NIOG9NKi&tEq+$z*?8^Fv^qX?b7X-ku-^pHxN_YCvB&hTny-o&IibMTk7_vxNYSF@E#`+Fkd6!BU^LGAk6%=$32 z*7*`0y!XP=x&daiCcuZ(PU8z-$w(?7a9W&RM`!pR7Romox!cj(_Nr2SIjAI5L@Pf7 zsWc+^jJF!!-$QGRpSG617c8?mOnuDs*GDJ54yk~tgc~6iI`oo{DG^B#6&kaw5AxIf2cQ8Bfd5X1s9#Qi=Nt_r_pgbB}^61k@0nP%G5|`0k_=0 zLyHs}nXu~!HX$0-9PcdeF8I5=xMt7m=|1$4d-e%`r){sTW!zUH^5epFs)Uj+;qnyh zJ~;E&`s8cLd5j6nlK;-#!uY5!jXvAAn4#vUQpuSnX7|pk2Sly#9+in#6m<;B2d$Qc(2Tr)q-@K zSW7r{wJtT6q^D?gl*|kKXd90B>N8!xaWV`3bYF=PZ$teJ#|u!J<`-44BhL?MBsl4; zWxqE8jH_pLIJn3?%P>*az02{WkJytEBHkZSE>>g2$xNIk_K&@yH5nI*JI zkK*}5_XLaPl6FxNlu~G)l`<&tkAo{n$pmoc8E0hxOTqObxto>7C8b%$i~(aF2clxi z7B{NQLQ}(RkQx$MS5g>D5f%VcZiwfuXiAS@7`v|X)(PTO`^j5!NOQEYydN$+qhiNC6RKlgu*eG zpMA3WFfp2;hTvO5$)#C7c2m0(p^g8iKkCq&hN)h2zxDL#YS+-bN)>$6P3MEEURQ+7 zZfyv5*|>JgdYS^t^T>1;7iCt_LC>@7Tl@g#Lp-*^sKdJtCcwjWQVy@se?flLluT~u z;rEXF(G~_t;!niTSUOj}w zK2qyl&Baw`y(I;?N_Won_muZjM4w2g$!11)_5a-wNqJ~Jj_dE1U%qpUXQ)plsC4HH z-O>Oyq2_s0_vEnTGPeIu#kg5fg^c>O^v(9jqWWl8E7-|u5=DLS&ee1s-z(Tw+c874 zf<|U(s2k*CF|nJiR+!g3wdDu?5HQ?E3dmPqIWl$gZhbINoy{)aw(;_nNWOc!t>{|t ze_x>`{eMuSz?m2>F3=xOGuQR3Wd5XdUR>|{>vsFk!A1Q3V%u#-=JW3woO@M){8`CS z%z-$<{`J}YZ9b6)7K<;@^fEYG7H5`>_k90R|7H~ZYr7!HZ`&+`fM1VKev&K}y#s9G zT7O^t=|^6bAD9jlS>nM|>n4W@dfHasN{&^KzR1#sd0Mo$ zqDmP-6RED&P3_Z40;o7+IkqVCNaFSN{CB6X5G!;BS_ew>-~3H(SZ})7;cVa+V#wsF zy0!hN+_mePSc$=2aa>a~u;Q$s^uy(?>C83Jui4w?`<&0~D0Hr({o2M7iEXY15$A+V zdvkZ=sD}`Yg(@ld!7h}^!3UN$TC65$`^ z3$#ep4v9J)WVkfuGC-_cYqs=2Moo-hz!R*Aw{(W4=puJd%G>FEDV26!}5Pv?Y6BeZP~vuXV;XD@UFukpaZ~s}RXVvN3(4ZJz7aa86U$>ETAtQQyg09nI(V6zF*0`n+r3x%#N)mkULrW08jVOT{+)gTEMpw@5yKSAus6!ID~*y*7Zi>0Y3QY2~r1# zx6nFGt_Np0BV>JtyaQ0PuWjUvYf;5jIl>mi(`{MSbQu*6?2U`^CPbJ${vQAY#LTw+ zrkrBYO%JCXaQ#8Cx;LQ92RmmlKlH;!G%WE}?zVt9e?_f-)7_yf$|3ZJV59XX+3X0F zp{7Y6y9mSO`?p8Z)vNb~Qi*@fH&Gcp)cu3Dm>@c8BK1QAW5>tOwDJQ=E(>Xm=T6jV z8%r8&Gy5+LPvMfzth@Y)p+5rc6TAMg@I>0cDAZ@tWDdFZ>T)tMAnkisb5XbPD*R_|wJwYfoZ@`Kmi~3)ik*9)WvXS{U0@P4=zS>5L zQWRdtulxGM7Uv-+9>u`Y2$x|Ju~aF}xwDaS3%TS?tm8Aab2~B8KP~^BqJ}r8*jJ}g zwmE!LxI4rB()t@P0h3AfOC%=(KF-`mC-ggf>Ak2LWuS{ zS*5P#O6d}1x%atwSOQ#01DZtoN8z8rhO`t%ozS?2&4pK==PPTrsce`x`PB{*?ne^C zR#TIu6K>XeNtzPnur+4t>B(YzX^4mmJH?s{p_Q9=>XcnFC{3Y-FWxoBO*MiC$l1Sm zK3K*e%VA19ynQp&`J=Omvnd-eWPsk4DLuN7d1m@Q@)}roYY(KU-)+InTdHx?=?ebp z2*2BQNmFlW-C1(W35_@>6E{)gpqeHZY+lfT4cp)MnJvzq!zh13n={rqAWuwgpUNo2 z7o!P~(jHoc=2%s`4omu?(7nQ89nqAiWEg6*HaD~xEIx_X_AgcuN+RYt7CzEgy(UUG zI^)YUk_YEMQa$eLTUT=l9^sTxGA9!?X?g*nAN$|g!XJeiEDWI2?6!Xi*$Iun$u<%R z9g!j{=6`+AY(~H6+zM$;Db^X={9Dikr>a;zG?hd&@8fnkJ-zX?=807aktY; z^zxc;^=Pq0W&7qDMAV-F&& z7CN)yzl#upa8{CgT*<>6xCD-K#QdIh!BmY}zG1^z>mBUH&C|;g$@ibG67JRU$C)n#2nhRV~+f2%D9(%ZbB4IP2kHH)4QDf5FC6c zVK>p&(JBhWwtaF$KiX&*I2@6;FC3(fp!yLkyT%0AX1atPjtfjQ!!li z676TL6q$)a#mw_uEs;X1_9J}N?$nk#TY&C@j#-}823gyAhH+04s3w7mZP!HZc3e2X z=n*-r!p)zzUC>JiKh%}Fm@Mee`TW~Xe1^vJ0BRU#$@d#*`L6bhHi(#~8lRF!#TtwS z_9jm9^Pp8-Mv~iTXN;Co&vT96nmHSMICsi1$+w8(n(QUlegT|@b(#A&$qRR)wvtDf+ zwA(c{ZD#cy9@_flw8lxl!H^hvMOQ-m^`4XRI5m|kGzhx_x1q6N&jumzJod) zodKV3uzQ}WR-&{ONn%O%9RWJqXDXyqFPZ;wNE6CTX!!V&{a>WYyV)v+I)an3Jp(x= zqD9c?JOjGtkt)FIk5{a70-j39K(`BEBvH!9 zw7*85oqY;+LMH*_zI6q}lCGtRdi`q_#f$WXsa+g?m<jMlS68eh_jG z0m%^c|5y1K#ODHxsxgpkj@ku|-tVz$VT*r32mvUS2XdtdDPaGEEU`a8;N(}tHu(3y zE(VW1TrtQ)8Gq`--H=vzjR10rp%C?4j|g<@L_@@Ms1+=r0HmO{v@`+5 zyfyakplSyYYW4-bs8^ukp$A|avZT)%Zu_UOX<0b)y&8wLqM6t7WTZ2e7ogwnLk`Ur zLl6QK{|o9;c!T^0TrbcCu@^Ukd*5MfQe|mPZQKtcnH>(fw{H1Dyg)%jnnoaSTXFHp?Q?J1oWV0`l@1U9OWp!$1E7v`exwxg z@W~E9Oqz^Jpes$dft!D5^}cxi#B;fxMcyDilxiw603-^n$Fw(@lkc zK(+%a9D8#tWgA=?E9(U+rv^Fz(xyHdfn(}`FsjF(hSon{X_cx65?Us~(ZFb5Z zVCHPl8Ha+>A3?fhF=!2I-N4BOzr-2P2{I-X*Dz2=21JG1G;IVFFaQ5Mm2xzt=P<_& zQ|rWkZ)QY76`l}{WeiB{pDUj@6lukH0_ahbc@#)^8caf+Ybj7GTR0{z>O;JU)(D(O zf|*qhZr{%!$-1z!0IC&J92y%kd_rrXK)d!tc!wnkr1}ls5z&WY7ZamSTu}RGSb0+E z3Jt1(Fp#A?L}N=I5%8Yinf?a;FF;AOP0!u|>cRC=Mgo$#3Eb9WRd-|l0Y=$o2>b?F zzypo~qy6`d`!b{*6KvMrV3{i5?=97V#x;zR-vj()#8;X3`dg-jE?t#CQ#-w3tDCb5 zBHbfU&&1MDRc3(;AbvGZEacg8``Q+gwFHLsnJ&rXo@2G**yURO4d^YlTLZaBJP+F- zf`;B6%7oql(~%&D&-SeVq4J57$hw&Vy{hycWB-H~Uw<`mmDUCkPO>0JwWauo>fVVF zh+MGV89=5U8Uk>GhGUe*x8?Ry;Me$V5aof{J`xlQ3?FQRRygb4vfQ|`_77YwC#~Y? z;MLcyfRN@<7uWe5fB+_}dh?Gg`2v)XV6387QhD>>)rSROixFW6Axf^8-tULXI}!X1 zrL{B=cQz!{`Ye6}@1a-VvM>kQl@4GFwRZS(h8N1(q$ha8GuJa?5 z86_c;GP(5m)A%(?q)KE<4k7F@S#61hjy{%aUR6UaAdDMzcYqB@8MRRJ-Vqm)O@_aP zV8AcwX;UX@c0~nL<8roPZHiY93Q~WDu;?Hf^5EKmP!`C^-?`>dwuwMaf>ioq$pS=W zgTPcWAOxx!$2Ak5K~7O0e58H(<6tKjB4}fv0|NEb1Hl4!F=T1K+#E2+g`(n)t&v3?*9MY=Q}k>T?^)V#&DxFitU~$E*>G^cxo!~ZK|w6? z+aby`9YK}TmEAM9zxjMH$&(L6)==`{sts*RqD+fVDE_TGbuHM?i$}p`yQT^rZ(0N~ z(wn6pBFJ#LJrEZOsd3WH33zt@DQhgE zS(ePCM~p>8VDY_DWl8t$J;fz2d`B716i`tmmGywt{kj!VojLAw2k@}IdMDM&IU>~~ zfFh>Udt<{&bA7jLdCkn!@M(9ity^yFST965JV_iAUB2}r_1GP~s^5c{2wfcz|882Y zd}=i;>z`Y|IVMh8)3=!Cq1?S{>ju(|?^HEV@s*o-u8!+vijIv3RPS^q4$>2fQO5r5$F_RI%alVC7Bz!|0z62L(7>jDHwS{;Q~PlaVQwN9<7P>R9)2-O>R>MB^lqWCLw>-Ppz*V^vq3L<5hKCjwO(~1Hl z#+V*@R|it~kC7OkI9Y0!he$!cfen8?V8mc%0dMY3e&1Z?s$lGXSCMk6T0SoP;2!o| zjYyX8Gjn#J@kx=X1A4$nW?n`1O%~37@gDA*;>x87}Ev@>Y;?hN#th~k*F$21g#!*YWaR;lHUJd8|YRrKH$WDliw z?M%mGiwOCLNY7dX?Rbi{1TY)C7!@1MAv}u(Y`1(VkGY@mgYCZ}!3!r+BJXUt)*7Q- zeeuQ%CHKYbrdctA1uc^uXIY99KDoF;h=C5z;Fz@z2VY#;YNJM{T&y}WXRj0?HsYht7XdSHXQdpDUAQk7OOwIR)dkyU%`ONm&xy-A@ z1MxC1@O5V3d_(w|ukrnf#r%3-k%BOzY7+55_-BO}n%6^4&K%*Q0pya<&yXYQYjrn~ z@T{u?A5iOcjwx}+lK7ALl~rK zWUOu*C%{-n7N@afyT~{-8-5uvb3>R^HCC{K4+R2`PucRAm5L@R5u0ywlsV|eKmSl7 zp|c!lK}uW+jwE&<1!ysB+khC!t)R$hFeJSl0YK0M>{C{3Zv7|-R_RLr24q^YyL|LWUckkMh^GBKb*^XxF;oLtHl|rO>)#N*!wyO@?`-00E{GQ&C$LDnaitW|cLs zUoShti%erK7DY>n4Ggo~$c{wmw4WbhNjn6oESw1Sd3;pMlqs_BUsAS=0i4{;&Ca)T}I{WG7_gxKl}%>@$UT zL}?rD9jk}V;^Wp4@>Z}kaJi@u&Ejf<)Ai(p`orX()6Kug+bHwv;psxm&4P?{okQ1? zY19Y2uv`s!gALn8G_&inFdOMqIsC?3!H)7`OVJA33^yVzkOK|%H2Rih#Iugf`7R47A(1CIj6WWJi8 zDPIB7n($~aVsvQWwN`Bn2UkXDAY%6IBoe)4cU|uHu;EU51}w#PomiwRi}$6R9pjcu z-FOhwjqodT;AywiiBr38uq}h)_ouYxxgB6wepd3Yjiw!(Knk}WqbYf8q-Mz-nYqdA z;P5pyvXKfianB?CB(q%yD$}NcYjl{~KXpvVfj;u-7)b)Q___Aeqp zq=A$zOV$KCsO$Y2d5JH-c&mm@J>VTpJD&7+kiVI}*>=^DY>+xh`(Mf1L)6@HNXfvB zoccdDbpJcC`~MBv{=X==e&8%n-4eY!2F_&p-wNLq9_=y$M~-s=5g=dDcka@cbuh_| zfvN)#l>v7xaNPGD1Pc_z+ap`RyqNphs%|oA}PCgIWD0 z`0s<)cM`9zLFE@96z~m9bG4uw<0A&SXAM%VqhiDK;aCvcI!mqlzHBmk2r zf@gt35jSvDZ>sou=anfK6PF)WWE}sY(Pah33q~k76R&Ckr{1}MEoFeQ1vMYapUzwevX7WQ^X}>CrMztV%0CW-u zq4qn{I~PEIQHpzfXP-?Bl>P1 ztFA!wpZfG@5Tk?IieI-eacQ&XKnfWneDVo2yXaff-Zq{9&5Te)e;NFo4dLq$vtc{l z0Kzpu=Xh~Gphi`uK|;u9fJ9gf=p#OAh=tfB*FiC;`g_?0Ch7ev>FE{-X23fECp38h z?B$tf)7Z1@X`EB($^Ab-G~yBjF@Z?7|7k;UYKQE=hY2z8J^^FgiVPEcD`q}sz=z2) z+5ixN>+iWsAPUE~5|OWm-T+L98|b;b3~I1SSD_9;0B4zwDD$x_&N9Z{B!7C~ASJF3 z`y^+%7kRC_w>Q{D2S7aoq%P;C0CXu-Vc2XB#`C!alP2ehVR$**<}=7BU;Iy+0N^u7 z;qeBQz-}!L6SnY^!W;X@9TC;;mDj;M5WEhI@=g)s-{dWz0+8oE&nmtF_Ey|;+)_C#u_rW<^74MrGite;kKr*U&2|$=0KbxYm9AiX7*&wtWekEcE z-7V|8!LTDl#Q3!ii*A{GJa%a$6eU>61gzvAO@YM*Cq~Ou8&<&0{Nwvehj8Wu)W`|u zf)(%L@2)5FaO*j$3_HC#P|o+~>4%YSmF3jXH7SKFJhl*`yY<`VZh16Et6j{cnVSWi zi>Z@}t?I0gK>Rb5Ve>sw>dl&-x%PejLn%MQGGb`rpV4Q_Um>aH=irqH55OPP_edeX zPuu@qkWm8?-oFC!Cy`qwQi^OSZ+X{l*b@*{njAqQFG=$oIArftmkDJB0KUzAKz)Sf z7;tBP&S{pOx5?CD!D0h924~yfn+s-u7&kO*{EkP&?(I}Hg9P-IPbSjqYF6`W971a* zY#>JcX1?d%0W7vUZ~+ZoX&Hh^(0$Ve(nYwrtX|X?DkMQFC>_Hb6?`+k|#T)Sm}_X0mN|(Am@x% zow)%6?HVc=1ZyL8Pt1jCh3e&T%Lw|~k7eqw=&XKU=I(B&0M2C&e0Nq&P`kWrfZe#3#vg~4<8YQZmT%j;Z97jo1I8y%LJO!yd6JP%i4_CwFB8U&{OzLW2?9VKk(I ze|GFJ@2qWUx9mw79%%xM_%|2*U27Ji4&`8Sz5MqFD~{|Ez9;Z46vIrP7HPeU!^fnN zK4wo>>bFJ25ZLlJi{a*qGe$zt&!2J!ndB24J_s0#sHEjd^Wg z_4cGN`V!WVEIH=daMz#aBpUMurWq4bDH&uPk*ifIKnY5AGB277*e+QwzGshIsFkvi z{E1ZJ!n3c$T}SRxE`rBN6*$8w9+?CpM~{basJ8(!LT8AR3*m*K8}!e+&(Fkxkxkbe zPBfyT14{=KO}aYG5uELT0xUkbsP|3BLdWdu5@^__|Ayl~_qmzOzBL{{oB^3bMkk=r zV7_Jo>qQN`zgi_f=TInoxBdrIFrU&M?(@~i!tJ)WsGgu+ST)w*p{@Kn?&|#IZg6;Q zm~YyVBI5?jynD*h8%lTMsS8MDL^3hlM`@X}H;H6X{nrefX=2^ErhJmKSC-Sl+FTMV zsBBJ0M=0J5?WWth=SiXs@d1KG>f;I9ZNVniU9U{W9)+~YrA)~=(am?;e&s6GB4B38 z4Ljm=;gkD#1boq00}CygqpVy0diFFE>8!b|AIO-A4f!k8GI^pTS4C<5-ng>kcz2=~ zH__{mQ!?U_lLepeI|F<#wpNT``X$S;HzhWYM3FVMGaU3_?8pf+oF;a5P~x3c^qPx|U?qIcD)i1hGY#P5#mGielb-;K{*+%t?Op zm^|*Eq+9X?;$f7^jF^h}vKGu}%7bC@8uypq8*+S@Ak)0rb%hw(!@Z096Ys1@!QdaU zuh<;*&-r2b#U**BAQFe51Tie!Tw@@q%~)mI-{pcqTKFSc&Q0I60@G6UTAAvhT5b;! z$qaF`{q8SVvSE&y&aitSv+aH6+5CElGZx$dIR=6eaW5RcN@NVVfo0G;*~m}}X}dFF z;nX1F7fh>OjqEE=OichYOf*Rmp#C4cPPbWxp2^eKBMijd3JbiG!~ zJuq|?`Ow`wI#|X(r;aaAd>4TDY|BK5g~^VkxMbj;Fwm77;iVW?3--HyMqUJ{T);H; z>l0`c5~zMd5lVJA%4^04=nP{C9OA$ONYpf`^TXc*8erC*~gd6w8&9;)N1KXkN-{D5i1q^ zZYfmkEPeP6BX+6Ir8^;_-_OqFqyW5$lKVhKxr zKEK@+J#Ky*jKmhC`zE{X-U8X0+qc@a(PsPBUXnkWWMPxnY&)u^VH{*s%M;|OsJ($x z*36^9;Se&Pf_)J9xcfKQm^G!zu~(6N2|U?}7fr`G%u-Wd!DKDqm^VQS$R_(~P7J4c zI83_w>}Bq~aEZBtQASm(pz|$FkI`23jUvLn8f45xXyD;Uwp#B>;^=S^Gtd2&Yeci0 zp^n>+9pO$OL`}Ru=ALF_M$X~e$PBTlj?X(bD$nRvi7*dj9u#eLmzIA&Q}SXKvtchm zInw5BHHN(Y->>ulyp*K*yd91w63T$;@a3sKF#u@<#~j=P(h7I8D(|_ zCpp8+eJR}R<*97RC1E)sxG<(;onR3TldV2O0SF;7(rPf%_oCq=Wrfe#PI=uD16U98+VIBMcR|o zUI~1CTqz&*)KYK#X=enRGh3X7^CUk0_|=FEn0HU@rq=rKvZT?tM{|DH}&+&lJ9xllIO>@FTMYKje5w8)?L* z`Ggm}FM@m({uU}DB(A+3jCSBwos7L7|KFU1)I z2`$Kh2&_hBwX$(OK_FzX8}3nqdJa>w5MMYLHKI48vr93n&t|)z(Nzs!t z9JY)kLbYYe_-@2VB&_2y3^B6w2JlAnMRQaV!$yc?Eq_}G8$*vx3=IyfFZZLn2<38e{Cu+qDbqtS4n>!#%>;y?i-krx)de} z>StpM>+8H&#-;0j1fp&}eKyLrH+REgZ{K@gx%-OKGl-?)f3}^UkEy~qHVgLfKM7g_ zD%+>eNY;{i5ul>FVM5?&xVMYl6tZet9 zK3Ia*RX_fCY8nyM_w)vsJ`_InG66ZN|6@qp1(fH{XAavkNmuJM9?C}{9<=k5))a1g zLV2vrRj}7Pp20pE6@Rlx7N=nfUOd|&-oZNgg6`aFZ5-nQQ>}hrc>9r&_Y6H8Wf+K9DG-)q{E|dxmPgZ zv%r+mxCWUZ`dTp$HQP6urt3b8n z-`5Wgtc4w=$})s1GnXg?2S6zNjTz$_b#93$i!m!iDn$tT3eYW!us7Lr=57y|MjMs~ z%p`EKc~Z=jt6Y_ablcy-N0_W%$^XijO$^NnUEY)udXK>#k*+#x_N$&hqVL8gz%d34 zWhBbBfeqsTu-#^U3n~63yh-d>wV@ol-`42YX08{Yr_(DaD5E!gmInf#sT!?)q90rb zCYN7D0;)oRS9>zEWp$qkgr8~G7F|JMBIj|j6t7!Mrb*Yk-)!fgpKTq5{`t>v_N=#O z^nPAVpZv8@2@@CRZSZTmq#N*zXcQRDVQ`s}N#J!WLVW1@thxR|6S4PXZN+iyb@DDs z4W{QVv!?aVJbxf7Wq)}BKmO-NVCRmqUpy31xG!V}TS0+_j4-GSSpT9zY?Hdr7n|#6 zzP`(D!V$vvJItIZFHRr{2mg<;6FE} zzMftY+8YTB@B6GJ!?WA)0w$}A#LU_?PjeJpwVN>e&AR;qSW(tA4mvf+;5=(xSlG*B z@_rRB+qd|_tUe!%t&C?oml9Qjj;HyG^$BgI+X?mN2QyE{IOU0L*+|`w=G9gpcNoW1 z0EFFo<9+UmFDKr*J2jf`0QboyRD^X~RxG1?v}RcMYvR<5#Q&h}Eu*U3+kR2$R3;)N zIYH?ZLAsoTqEd=eX%GSF6r_97AQF-SD!N2kx}-%?ShUh5At5ETuX{bu^X?DlyyxtF z#y%g`7>?m$I+^pn@BelEa=PE$@exAYANmXmW^m};`lkGS<1?xCvXcRakeLT)*$HJ)U|NU8l*$&Yt|x(a#p2vF7xc3 z${{D~)}6Yd*L3r$7mKcb6LP$8%crQ5U@b~k_s1aZuoj7=#<>aTKrT5u!t+}Mh1pXQ>v<$W88XI$s!%inBIqgJ@XO6cL9*St9G1##a8 zREaho>eO^p?nmNN^PR7l}N)GG#>WLoY_6yYdG~}n7&Qr;mA(BWY8Q(6G)`N z;Is`t?*`%H<0|xqa|+K`XI|r>F)o2`pmJ)ju6!jcrRKBIn0E)1N3NP0 zC`*sNJXu}`))9~1Jl}INt0MH*AR%O3DcE!wT{stA&1u^ivq8;MMs}2fzQRMb)uu4U zWIDj5&Q>6s>9u_RN;!WkO+^dO zO&#km*>pu!7Dq9r3X-9GAYo3@r{*J^$!EgK+Z}@Mr2kGJZo1C%?Q!$3u&bN0vy9Zf zzXD8XIivdQ->sZ6OE~1!_Z4gDmY=_MtXnw9y_QiHFZ``ZEL@tbFBFLcZ3rvBJ&NAv z<@BXFS_dhB^XVG9H;_nX4mN|=JZJXQn67VZ$e6JysXTng)b!{OszbN0P#)m>dey$( zG*A`LR(NrCEqsyCPO^+Q)3il{p^P8H-Fq!l@HMq)Xx|)br{tiR1?p#bwz|>t0eoGY zcy=RsJ`5Pceo@xSVJ%dVcC06|gQ%;rR-TfZZ}DX-mr^QYNO&CW_LpL=FVW=w`7#zRtV@eGzs-PkIK6f3P> zkb8@isW_#8GhYOW9E_ClWip`Y3^`m1M%_@{A7pe2m1ggKaSHP5pTZYj@NZo4?}Grb zmG2i7kI)8Va!tt+N~1(pn#_4YT!MoN%EZb{3$1wjK3b4v%3G>+r=?lKI@f^LVN8f4 z-d*+KKE+(}?`HwNC z62E{ot%l(Eb75r!4Q^xXYiu7x0{I82mlstMMU;PdwuO2VjK2`nGD6$sSH|1-nlgRc z36;Eax@)y3OToi$6z5TJ-6QmQl884h<#pXgjymIp!JFHmUjAFxyUhP4_=%%eMGpnz z%V2PxDJ0q#Svy??j$SPh9u#j(P2Y}ZlWgD5=14)2)~-2I4biaTj*2{WXV9u6vPT~K zCeD@&fh5;AP_bkgULNY(Q}dsjFL_Ce{wVOYIxl=W!e#$0&~ZvIy+StB++*eK_TtAx zl5;)Eo-~h3c)9GP`B*t*nQ=7KDp=XdqStY(Jp{{~Yglb{n(Op9>R|Ndd4E&VuUgve@-O-vrkinUCfZ5aN7RI}aULW6FFYb!Qk&&)_&o{2TMVJ| z>iX?5EOiNa+qptZR~b)cy4h?i#`4+(<2$^c%cyYsrmoi5Cv445bu|0% z1TF2ctzz&T5KL(opG%G7}D6JF*SuA3Ta^=iur_QEUxQ7~(QlLIUOkBQktl!l!Mtqz^ zpvkPXv}CC5`}q4llS*A6D3}?QsY&mQOP;Uy7ciLSM&XFXJMA>xAJ9dg31w z5;utUApLSbVs6MdW}b`Oz2!ZZFiAU)@x=vQxor1B)G^)thU`&!2itrbN_70_ZFpoh zGa=fKu~S*ZQMkc$4A1mA-I&mFuAE3&tAl+09mRt_BhuKi%^H)NcuwYMi_|j>7T@j| zS$P>~N}ZRmdj}aVnf8hzeMU_>24ysz;nJ-ST@bC)_*?I)q@#_rmJ-a->-cA{M)u+eH*-4MSVf5~4k8T*&orkkC zVueScV7`K|%u--?P_9ASH?53wjLh%gqt=}=xIaGX3}gEad^T)zqImQP&*en9f1NqH zRX4@DrBu(W>0A0j#ee?`+wf~YuNU0HiImwTY;Otr=-xSuofGD#e6ZCu^9H0HEJd0J z=I`fOe}+p>SGE1(7FdtP<_ZL34d+NcpaK-9l^TOAeDF)nwfBgx6*7wmH!j!LILe=F**rt%OtInFvhf6TtVZNTq2%bK zyvB3X5%be%`X6IM*YqwIoQb4xD6*juV61)fO{(CQfvNWFM+ur4@|37ri56Ou+oa9P z{vi}!gRn9p6TykW*#evNl*Oh{LvzIP;9s)+D^dUIG(s`{_kHO98#0am%ZsGoSJ6#F zaI-CRYt*Y3A(|2LYoK+|11+|3T*IqZ|7o9%x}}J0>;Hef4~GADO9F2ZzRgTa_z-Bl zy?|t0g|=Fan1U22RU8HRbJA+KTPuhpkd*O1Ah1C!xh_{y z-$o27ZmT1rQl(}RKRnEl-k1cC$bwe07$n(J5JU>|9Lp}SyIS+LS0!h+P*kBlH& zDT8LXE2D=`)1l;3!r@2lKXK?-FK7!#I{6+zditv0>0uTk$=wB&??Xm@_M;d& zKn6bQ1CzgF?kTeb0){c90v_q0fhcFR)Dxtb4{2bSJB5Sz9=$U-ZJhZ>0maBN*r7+p zTc`$p2oRRu6BSNxj0uEN$TG8MB8rkzggy0*n(l#CxiKPogQ-*hN~C2*a|Pmc*4j-v zU+~(;bFL#K>N%)yIfU0do?C5@Q1AsZ8MXr$O2 ziH$Fn+Z|~}h}iaXa=*0>A;#F7Nm2m>Lr9C$M8r-Lg|NrNa>$UHFMyKru;Ke)f~+%| zh7{Kgn=dy1#D+qNOzlJ^RHkKanq#-;F~K9dYUcBAcEj7YY^L%$#9Q*<6I0L>i*C(hi*3Dm zAyQ+~7j#0-D^#j6%#4V&r)r+8*dqc7OCN8cMx-i>yjs<+%RF?sNM=zoMS{&a=_U3_ z#NCsNls8tO>1;AB-+?>C74WY=5-<4f@j;$#yhD4S6x6^bd+P(f7^(!M$q5wSKM;`5 z2YZQp1#yvj3(Kq4jJ#H}Mi4nYG4|O>Yz=JeC7>&)Z2nz!$4Si=RAEmwv;|aGf!@AV zaHZnOnW2}JxqE9@y9CYb>5|@q_yju<&TV~lt7&GM_WX! z(VZgNTv0sJ8rWPh4L8%C$F@#|yz~ykrV}#o^7~b;dMw>vF^L{(T9O$U^B} zsCuCHM#9N}h1bVXodK0w3(MeA*=ZOwN2THsp3iY?!BNX&!XIy^EgsSH+*8uE%sW7pn*oD2LyR)UVq-vr#IIkTpW(Ui5-HK!mm&?cv)}+EEheFd zo}wc{0Q(wg<^~IBN>^gjm5}++tEM4j8M}aSC)<2BTc>TJKr0)i5QKCfDjWTIe0T;# z34(h^7}-YIOIKE&Lw0se$?4$vg%hMQPbdyeT6soK zm5^?GjfVsdWF`iuJgq4cBg#`V>ho)`Cx7j>egZgt8Gug*6K^ZGx6MH@7HK9rH;#%t z*YFg|Ha4p6qn;jV!`YUDb;K0MZF>1j8Fl4Vftb=qq49`s;XE8a{7B_^ZY7Ook3cUh z&dFYe6P|~nC(qZx?4br%u-|Xc5*}`1B~{^}7-6P8e^|U9VTPXbj8?h6Ui$|8nVzYY z$x@02%|~dH0;=s~kaSWb`b;=Mlh`bOJP=^^mJxBBQoNv4viCG)?-Quf4(qy1IgJ)f z;9sJwbNZ$T-X60izE0AA*`+X=SA$u_i#+1vD2lJoARmrRSUnB>XH%0{OWx?@0(;Dk5j-axp6r zPZ*>ZGFWoS6{?y$F9XWM1pX7o&}GC#li>#fNbgFmxyBZ+P(CIov0+mj1QuZNm1ugZ z@jLnjqv^i_rf(x(JL`EY5h{tqY)fX_ccZm6J@@ZvFmG-iSb96*3b{AwaePPC;C#&v zPIORVQ^+S@AT9BxsUP6G`!0@|7J1O111=+W)_7C$vVT=*{vUF)rhsJYaaZi>@24ee zBg3U@pXEn=SJ#D0>{bOPFRb{hXmktxVIP-g{m^;_vCv*6(lt?uXBiP1A7ja~V3QCu zlX=m*)ogsiFv_Ok?ULav4te#Rtph9}BbIZy~-Fy}GqNT7GX?pl0)xfQ)^zfXwtqTm9;;)!%X@`PSV6X{9_R zT)$NH1d>X<^twtS(o!JM^6O(E5t%pU<%zhE&iTy~Q5nkzd6M-;G@SaVJU4CTHt|Et z2N`yywyXIa>&I70?%z4mps8Rwf3TC57*(OkW0vgpwOlWZuDH{p`{T1iy`GY0_l}aV zhKSWt$u7C_t`Z^*4zK+V4%KsM^~rV`W`Lc?C?gw1N~ zOnpxmH;-kKuF3ESF>N(?@|Mb+`%C{fUFTv4co4}07x@y(G|8~Un0owIh^^Pt zIpd_&l_hsD&1%BmT#msfLN zH!wa*u}gC}x^Fq@aPtwBPllabFQ3`3biI~Ny55rI?QVH%qZa!QSr+u}-Q}vqJkpZq zs6@jmr8n1Xy?!n+e;xZ;Ty(gb*CBMoUSeY|IxKaEUa#ERh4awU=uxzh@ng2u;T-<4b%BRQa_?~&Wj0B2Y>_-3qI8}lwkv5p{??BRTNXQpcSs&rsWVB- zm9!S~1UWURlsmp3JuE)M^jo*wEw)g`^nPjP4I|;0))8y3Hhi%=15X<;yR*OIZ^xXX z3!Y`tM!qq3-WvA1S?(i`=Fa5uvKakR(|+*1C*MurTg-&$SJjrild7vF$qmtk(O=V6 zjO2O0#(0Z!qmA1wux7dGTMRUjV@ghS2GkVa;MrATM%My6`44jiuV>PSTV65k$kvr4D)e0&PcecDfQ@%SSGiRQWxA@bdgZpxG=o z#a4f4H4RH@dol9EPyGc0itA=huKn^-_$IlMBYbJ8`eAogQtYnnM%ii$2u$^2JC3MN z4}IcC2c_b_kMWo2Noctjt`RzA8;>@481AMe64rg|NSn3$XO+; z3$ZHQGgzxn4(aBbW|CVi-%D)W1#0ngeZSn`K3!;0<`&_u=NjTYw@eT^;{HC)V$Y9p z)III-s6==idEDO0xsH;cF^hJyE0(0rxg1h2&zXvxiRue#EoN_dl1$rP>S3Lfho{=z z^=0LoBxhJ#&aZCCiM>0*W^CyX2KkajD{dwV##_`VWYAc-ABEKt<8rN-f2Ctw@yuxA z+ogUIkEr5U?}~q|ugS;lTx5%!q;mPj|F2v5b>km5-$$0U32St3x&Nq@k1ss<@sd*~ z<&cmfncak=Cg)C)zA-~;&047~JdZi-H%IfXxFnQ(G@>m{_+U9I)6AJgkoeZrThJw4 zo`Gf5Yjd(Ems%&@=R8GFntb?b1;*RXkn3w0%FVkN2&L|Q*J)D@Uo*_eD5&V9EeK}ae~hKJ>&6a+oj(4?_1U}t>;$0ql-JF3SI7` z8Zn=L@FkjK+-rqH!tr7GC#Li@PhY;6y&B_^wE+3ia$TZQc(zhs*MAX{-(G23F=g7F z%9Ol)`LJz%g1@KTVmStW3%rl9h6<$o1PM%skFp&9s=j740oV9Y{c-m0?%1nvC7>k!-V_>|EGv5D%Pg zPS0-V{EPbWBSUki&>oYK{F_xB7k~9UatKa~Z9EVed(31xn({KfwYtN7l7n0D)?bC& z%H`3OuAYKXA@3F|I~H0OSL|){RB}ay^(#eNP{G(dJ zfNF_|EO;Ucd-p{&Q7cPbsn2=&z}c)ua`#?(Y)#40hh}lS53I`M#o?b;OO8`!6FD#B zb$1s(o>o|0ONgvw_(wO>poVY5;xB$SKt)OH(iiWyNB;9<8sh=H71SRnXjU6iE*xAs z7Q88Xpun9^E#^!}XWg__?#Ua@55pFR?tgWQcl#m@kHH-x{~tVGw*r0#eS)-XB>P2R z=nI%sZ+cv%<<}D!)fWc@r+-@!r%c%!#Gw*_?az_YsG}tW1nUnp=GpCUObeAj0Xh}y zYk-ShBGqwU;_qz(;8WG{O-u>bMAjQja89xj3fto5I{s)vYb;XpqF;=7GW2UboSg4M zAARE!amd(Ug2rw`$InDx`tNOn6aUZlD;R9c!NM~44wWOKm4hK$fxHAHO9sG$S9447 zYP8r(NI(nH=1filRbClBu;3!Wt6XY&-OwOohS;jW+Yh0tsF3idKRnx^I1&4bP!Es< zqcd*VD2}ZBFTeDggOo2Ak(*@|7LxvBsk;*OUoN{B_%=|1?GEq;m)C*$JsR`Hu9xOW zPnAQ(lfOGvqZp>gPeTI;NXEc^6t_Cxm>duPie*W%`FW(~G@;IK0eT%jL5=ujFF&;e zzt+$Wu;Exi`S2Y`_LiY&umtB8)hc8n7lDc7+v3xOFj!C?07#Nh*VPy%0yc zXs=H(P8+qT`;ja} z#{_*VFsKP}#1z!5OC$Oc7AOq#rQAOs5HGsx8bKZUDQ}TU+Wi= zet=9L-%0S@&7DYoLwYP>f4;WYzX_1fzUX=#0CY#C|CmH#KWnS8SisU)p)jbC$d}06 z9RQ!jZCnL_5AN^|#}UjGKJPj@5PvKxvJV3J9Z1ld6&u}DJaiT(%e+)#agkH?O}>_&(& zXk6B&$ea2XQqiG|hEi&=to&ZFpx=Pou_BH_0}a|<+L@ULjh^{CM==LyIio!6kuU-z z*U67Ac#))6{{79JmR*9j{sc#Bf2ZPN272ZrRae~ z&*{H$pKww`fMm8_D%pMLg#4L7P4&d!ZdaDVWGi~;J<#z@lU<&;E%#%<@W-I$TyAn= z4-8pYP%s>$kDze8D$xO4X7Vp?rUqm6`=~k3TX|W>w^|OTUr))mL;5NnRdjlTVKc5s?D;GZ$);pU9H6q2ZHMpsY&`+dJfsN#WOW;fW zJ$dO6!2YM7UE!-3_s1i!1sL6rCPVCT*9N^{=2=puiF+H~Xh9^LAp;6bS?PPv8%-6} z9yip91?)X}c)0KKO;(53`c=Tq2%Q@jUtHnBT;6s(JG?Tp<@|lmxtsoeWo1EeWHA5r zH(D5sj?PV;9Gp&$Cu@)I-k#KH;`e^Xo}FKVr|FY>+Xq>tdt(D*UJ5G@8g}wO?X~4m zA1ixIS8OOTbCNcmY0uegt>56Di(XLx5(2@|dtKy|=`R=7DQZoBmE<}JnWbcv9XalX zk8usay*;;(4yvmnMeUCsF^<1R4?*L-F%jF9L}lS3Ska4?eIBq#yE?YJBQCV7D?ov` zDurw}7l*djI&m?aIk$=+@9Q59Mw51&B(lf-XE}cOC+AKRE_SCa#!y;?&rCdbJeue) zj^lnY~- z2Of>?aBGdgjlH^!Dd3@h@g>loly?5&XaDcBG**JTbXHn;7O`wG^81uI*Z0qK(rUB) z5Te3V;x3~7Q4V-H_g;usUzVcNw&;`N6Z_D{YFUgF^=+UX;Y3WgK%c$Ld)cO!S2rE3S{L(%yB zbFnUz)D0p+WzZ#&cGeojq0ncNoyiQ%7~_0ri-3Kxf3k6bn7ppBDPSt!KMkiVaK9j3 z%@3t289z1XC{%Wfu*9r4yh;&{Kles}PmrQ)&ySL&A(j?h0CQpwUj9eN| zs$S>WV@|_6Wlkn$XlFP6l1*ls^(D*`7g#FyHBiAqrXT=yDu{H8ZmA?o;*sOChJ-6W zkakoxWtZl-EJ?^ADJj{si1>ahP8|Iu$;y>nryOw-{XU=fFPDFQAFOBQ?B|cY{s_rj z`(dcYPrKji-dN5Y)F&s1WrnaVAHTnQyY|T*{$Ut{<7!RNHS(pGF~TpcZ~ zqgB7g6d1H#3uI$;^XKsCD636T`*2U@hyFu6ALSl4k%|+Si{WBFzx6N5*6^PdEuvD3 zN#JJtg13Ulhi6Z5ut*)oD8Q3|J~1-Ui}$rDP)%Hp-<*Gq?m}9#V3?x`RQOC|f|c zd{gel8>j@Wc6ikqJw-YbOls)A)mG12ij?gMiFa}t+F|}0_2Zeu>jCxcq;fj-4Ko9} z8C)BhTELslkXNxKViuW1YS3S<`QoF?070(NypDDL5q0>84JWgEJ0!F+XR|$p&l^u$ zrGRXaB%OYdKJ+SkJskj`hiz(3T~mv}Bk_HWuY`sxNS}&~(_lm5k-Tz~@jh{OjOk-F zQUNq(;dwZ|2Fns7KKf7J7SjCPQV>n37piz4v)*2SOp?Vm9RCJ0A79ZknfINof^_pn z#qFb#I(mEx^c8wmjxSfQILFC2a4fuMfb@vqr?VS`hDHrn8rh$+dQWo)^Q3P)pR)70 z=5e2slZZ}ud-fh>)nuSRFc0%ol2!3m`Ce_KrR5w|Fi<$IRc?s~Y@E_!HvsH4q-( z?7nKyzcM1e{b!&}{kITbUF_d$g7tso0^R@KBwjQAo2I||AI-tzf18&6Z(fA)K(MLG zWpV8JWeun^Tt*UBbBdbVGodQ|3A8Y4zFGaVWZwIasK8nk%?^JJxa$AH>;4~kbN};2 zY-GAJ<;LrwU2!md|D!jsspY`f4yMC5q%HZyBft%aDdZ5>aamq8KK+yY-KAIVeU)J{ zGH8I*GktKvVG+n^B#h$q!nbw^O0oi0`lF%S-}iQ5?0Bv7&o-!{N|Aq-Nn!*Bc{9YV z&v!ZOMgrF;keq3$Voc&sUcj?jKs;FiBFb#$I}0XHj%x*i+tXW@%{KKNX+QF z+c5sv!PxWuZfOVweYFVr5lm}(_1>QJ93c0|EVt_CfR(G*Zlbau+9fSVLHXb#&(Ci& zP>)r(;cRUB44#H*<+n><6EqgSF%o)QU{p7j7jTr!tJ}8ym1=~0yimWQXEDKX9Y`y; z>GSMt`3-O+-|ZA`pT!F3H~7}|!pVGO0`gV0Cq1hWQt=4}eJ*j!A0OK#`0p3odUJ&D ziJ0xLttm8mZc;3w6d8Vj2Ex6QH*W-})Rdcm|D(yNo#vB^uUdb*l&aw8`x{+s6jwx zG*Vl+jI5A@MW)vk=(lu$Hn#%d&WQ{xipMFoG!%tPIL;Ux9)ZLE>1vLBrLZ z14n(&Ks%5%2lYtj-NX9@2BU@O7JR{<@I|{qTd>N`%5bci>C*D5B_vqL%X#l_yn{$n zdBJ}WHF!YX&Xkps{`oFf$3=>E4?uZWV2J z_i|(N;5Ar{*R5{^h(ovg5-c6N*2v8x5?^c>990*g65cw~1oE1zks(p79G{Z~p?toy z;A-{P=i5k%3S8C`h=Ak}hM_vI$n`=jZUoZCk{|Zr>a2+nT6G-xg-dwnBk&xTS*0`tf{dS(f8~>4rVx-UzW1Hl8;}( z^1BOKj)%>mXLWg{T5>uNzHR^semK>F#+Qa&MS622O$Xjr1zabd^pET%PX*nifW}6> zywgT5KjkjXhT4=~UdClpW2{-~pE$FF^o_Mu!DXkwFgN#Gy z8w7va2eC*BPZmuY86BswM%?7*dTMqDs|t-Sb;&CoTKE8aWdqZxMv&tkQY`Wqfqw8sQCKDP{lKf(xu_ zY9DA|U7NHu2*cO~nZ@B%Wdc#^maboZr(X0Z5NVYok}D+XLsJb`e3pZgmji{ejjU8B zry9CJE|64g54zH0GPxE?P0p=g&I4h+{E^4w+qQ z^y%P85Rz^_P}pcB&};DZ$y%s=K$oM6Y3TteLKat`gk=wN7V*{{UtC|Y1ED~iU#9aa zWZXu6nv)`ozu}A0Z2VM>02L#Rf71DjCfU9J1u&|T3*;!pf^zD~I=zQsGdwP=;S?zY zUD(&3gYV5D)y56oHW1oHV>q3m?b;2%%opS7J_w|l^aUN=kJi=|awHGq!@Unlg~_YL zv(|FeT_{SqXTR0oq#}0|qDCFSaaZ@_NYP`6Ugx`eE#C}WZlyuzq&qn8=F=#?5Q*J4 zk^6ByWJzfbNp!9-JtZxeK*f6<%qRO?{2abf1!lk_S(Hom%7x9KSG6#cA2SzJEnKXD z^VWy)K<%oNZ6@|Lf4mg~yTq@WU-HK8uroWHw{n%^uqBvFF1TON4Wbo$#D9rIZa|iH z$Zf;-%(?I!mcNaNt$q!_myI#y;J>-68y*#M|6VP;avG*T$;99SwTMw>btxpeIIKec z(%6Of2&76*!+6Xput@=S(t@WX_7oiY`VszXl$r1y-8Rhn=f$p5=W`IwL=>C3>LWLT zS^Ixj=f{I82w6xP|Nk)d{LjhapE--;zh7VBsYH(icd!r~a zX@Igp{moo7GKt`kFq=S%>diNE8_*!~0RAX@iY#F(n3h72SiTo`XP#&VcoMlPGHxD- zds9|JhD^D~rWt@yzw+VMet(&WWOxD5DEan`@H-v6 zD3g?*FR%i~&=dQw6A%|7@$9!%FX!I7SJ-OT_s44ve%sbtUy2X1*if;EhvbRo!owuknv2CLX(AfaCE!GOGI8oiP3I-oEVxAA)Uns`#$L>9)fA!J`1X-JgH+ zi&xlXre7Ex$a-wR^bn`~+5Vd7E8b=XfFF+J4?CJ2FXD%QS3>`1_~RqeX>dS?F2khbdxP zR*vke!k;D1LiLruKUhN2@5V}t8+R;{r_JVf)Sv6@?+B-dS6#_G7J|=WBY!|tZ=1^3 z-^&BnB85(7*-kfXI-g-S{8w&ej&cug!Cp`VbK!y8;`LE<^}&dFtfxx&hRGq!fPHX1 z`;6NZ*4ZL5CpX`d1Irq)qsWbY-kI71JaNCSeH~H4t`Om#IA)w~XPtTkOE|(4)(f)| z>vxo!r6AEIDmm%cp#SNK1+oJlo9C^10S&MVklms9xy5cLxK>Tm6#VLuoTmZQ0H{%` zjV*JM(ua*tw&-hCOTKz%F$Y~~5$A=r00#nOs)2RJ!?h9_m~2;*-_aB5H}-@xmoj@{ z9Gx|rHp3;IgstXG941!SA3gX5fbX8S6Kj`Cw3MZ7>XC`%3-m<_+ponqSF_#;nohSX zKRetOYAg2)9FknJq|RBythDdEO=q7%#h@>?$<@IF`}kpob0@FfrziI+>f8j}VRN?KmR;O!@aLdQqwAa~;mA!Xp?jzwC zNT;yYH#?f>xY?FBS>7WY9mIBDbvNt%|f92YY@is~KytJ2fl{P(r^V+M!AKetMs%y;`@>8?%Hi}2r* z%@j^96kTjAJ89L8t6#IacMDT33Vj$`t?N5>3yKazgFCK9{MHS= zyMMQ>Og#Zfzgm}d^0iEN3eC%K{dQx$g$l5JFv6zgO=I5sBhJ0TE@w6DyQ}XQ?#LfJ zqSwR3jnu=1vtIVT2(sNZ3u{rgadkjnePdC;Cy*36gqlAZ=3SPj6VqlWwG&_yYS^WL zUGg#HYd$?}INi3RzRMgd+xI4J^_lV|9no(@n9FXkw|Yn?k|drvJZfe;nL3!3#i7`_ zsM+t{Bz<{FVD_1I70Ksd6SQ*2j&i&1mv4W#vT*pj8kbX;dO~g{kw z?Dx|29w)|oss4J4Ba4jd(vY3XY6j^3;Nx7^b~&@`N3Q!&Nb3l1k0FFq@{$_oU(2zOx!CKCqR%8R`l!H=)23 zgLrt^nluIBhI+{|LB2?T9p_fSwig<~STl8kEO$b|)NherctxVgM@{52h}lgL^Vj`v zs|3^`R%lI}66OJl9Cxvk#B)X({Td(V)*?8ZbTjix%O?uu(3RMCv$ayJaSrSJ9K<#A z6aK2_-Er7AHB^UZ*+V<%MVQ$!-jxf?r@ekBr4$~3bE*Z?JjfByF|tC19MUzOR6d>1 z?{t9E=_peyx>BW<#Ls_38AVdWNGLuWEX%n>{X@=cw+sNs@7sYH10&Nvf|mr!Lo!@? zd1wqYwr-R~d$syBu}X3m&>X7yhqPUc=IxaI-af)LEOnJmQ+5+$tWcOAVK_(>RQmDW zgv7%lj*8n5^s0?t(u;Ky+VNfpbDv};}XRQF|diy!cHWcxMedF z!4;9=a@C^q1y6xM?nr=&-{JV=5&iw&^>-kOEVq(qeZVQ?0!Yy{`@ueZu~pDo(|mkn z^uYCbr8tYBOSiZ-93nZDwD32(JO%1H8oBR)W=z|~b0T7GjS;V&iQvzvY>M&StC@V0 zG>5v+r@i{yN7~*{?Y@zx#f8W;o`R{|kt#Ky-wX#~>E^LdR4dlq-C=iM?}sqatkkb) z`vbLN_08qV^E;=jh^ruGW~ju0=Ki_N)5`M^GdFo6_&a#$yzA}ljX;;Z1fuVVhvl}* z+fGC@txX+yvp4yl0Ya1u2ZUHeNK9U9PSbX3uq;<$FFdE2TWO=RI2SKg!UHWA`|d!h z0lEkJ0pE>#_}rzyNreSg?A~AKBC7Im{@V?z0WdiAZg)#%f&%#cVEQ2)#r3S1R`m<_ zJAHpCKlJx;YA7c>yzGaHT(v?r^0OoQ=U2nG!&USzP?&4Z%Ff)Bc`{Oz-RrXUXYUtV zD?Z1cc7>B^>j3PaM<$w%`9uLl!E(wLDW`C%C=jTlt9>Ez0}oxBJWC|$DOK^Au`YRn z;>MVQy4^7zdjkv&*R2hg=#aW`b%6*SoB0t;t9*1CzH(;$3!WSfFjIy@$|%7enTS~n?zRONU5U1UmX9q?LyAd`*5b*^7>O)5`Hpxq`T5_{jkFLJqO3Hp-1u(2GN%3SI3A0g4`k0YcOd=P)uOLW-9HuCmX3 zR`jZ7Q_uYx(xHC7{A@hW!{WIhS(=X=&IlyrMHofrjPpKYeoy&?07K!d_8tHAfHW6= zt8aJ@>hjD(>dV>s+&2u~ADr>7E_+Tz6a0>tnq{j~^m;P$VrJA|c#Fxa5jSJpOjCs} zb7)~~alU=`+T^bfGY9)P*H53sQ5EoNhxXAD+@g8#D4)8YgF_g@gnJdQKsp?4x2$tp z`B8v60bCiF^Fvg7sa~Jz@~~A4uC!uB8A91ugMD{2n|}s19_P0g!N22r=l-AyNctIb z{4o*i7$tu%I$KH4AGb&jDN$svKTy_iRjagwuC&IwuuETTB)(y8Y$_tX$FX{i(TA-3 zJo{uiw>Aq$v4J^)ZqRR2b9Zr#Ww5v|q|^ zjx`_fiOQNfiDi))T6^BX7_Xf35YyQ4^a@{cmu3gIqcD!kTytbH>*P1LFn847GwILE zuNxIVs2&b~Hy@U`$y@%;)cxkFp7gqn#7b$QQc9#c+w;%Iy7eoCwP_`Aw46D8iqpEjK$+AGY~ z+S1)L+E;dM&D?JhlqNs39K9^~w+hddG!DTclx7qZ@fA7kyC!N)_sLyqcRsgH zx1IR*eK16kC|c~6@_pnnvl?^7e!9j*{&E9yb+~%dv~Xr2s9=8T>t*4*{*YPB8wS_yj>)8#=Iq{-DRlLGl#woefATRM%nY z3aDv)mmbb$YLkW8%T|9b5^v+h`<~v2mDwVl_D~YJ9CC*Jgn>Ksdx>9xW@Y^d%P>cy zobsc%Uyj22vEQ%gi5Q4&wd^-dNZh37lxURdQ&$=cS--dS<#Ui(CH>Ys(%pSlNzT9ZZR`Q$RzKn%MYPbOvE z{P@wh(R_)w_t3?m+jck+roFmR`5Md7vJg@sGJ*Kf3)TTD8fouTz(8*}5-fVP%z*lu zD%(Yb%x=<0To-V8`_N2^QH#mv#~ItUU*(KIrZxL z4{H@M`4Dfd@DhdH&m)X&x14S>?8g?VE0@J6Rl!l5QBm*IH^*I8%gEX6TU8LHiPpJJ z6m;gca%*4_XG9|d8;8YRtqGXBqF!<+x7WY-ruJV=<36dBU{1@MdbcD=UyfH`jr)V5 zHcge)@^mrI^gHoXu*C4<2iSb|;keS_Zyih!7_@}1EmuI0V*=2=??>w7)oWzbimVZp z)1gd9Xo_{FgM~~^p#;a?CdGNJDi=z=;|)pq*{Tlu;jH6gW*GP?70}9<3&9at-snC? z<6s}BH7V|`=6Z%l-I4-Z!GZ<=QP#`B1MBkKKIzvp<6=e3=rGbbR+_45BgZ;M{wt9 z-pEp<-#24<}|*Y=mVm#wiRF^m3t^T}#T(_Qj@amFd*} z#>>ZfN8IDpXFJNPy&jED#_~PpmQAy3mrt-;F-N=JSTU1uQ+kwlwyT`@9>ZKFr+t&6 ztJOofubqh?<}syH2f7iXDN^wn421&@X7*&n$)MI}cl-3csFHXLP%Mx7B(x>srBI$2 zo;hC+GfPEQ)HT^l0Jfb90&a^t)7PrRAM12mKL~gBJDn>p%4hTk14H~vREFshv!DkD zGv>IZfXX77=aTu^@aNy6>r1mgyu?vci$b25;G@@#IW>{?!qp??Bpi{VG_@T51sC9@ zm2oV$0WFPi4vvMQpx$=0#Jac&IHEUigLxQWqPBpzYW*idVjWfiDny@5n~Cq~ z{UjN+Lzw&YPbE&p5g5*~)4Nib=?Z8a9sFBcHM+!8}FE(p>QT45vE#OI8U z${KTMF9%#Ek6bv+F7Z`x`v!=&x)#b1^x{GO>e5v`TS@3_0;e}5H z7v+Ed;YNyt@Uy>H1X~Ku6&8{1R=+WRTj#7e$5uz8fs@VIGg*`Ms9J%bnn%DvZWms= zTWIuscg#ju_>^(AiTpwx$%m<_>ih?#ZGbk+56it)DuNLhR3+a-Tg$%;?wQ;$p~WZv zN%vD)!(@%JQWb)(D-e(JKwhyr=r4=imij&~ij73mGJv^=WcL8jh;abrYyk!J&8R#% zq8iwb|0-0|rB`T_F?Q1y!a6hj3H5p^Ho5MkTS5EPgz0d=aS{aSBTZfSx$pEI!|PB@ zvZeu!g@{OoUMUeE_GPtFq%aGSlumF#o6q9pW!iC7{0}DCqK$4jQM#HyxP4Pm20Bl! znh2>Pn@qm6PhbA`Q+GeKE>TjgS7=a>e!X`U(p@kZjhdmol6gW-# zeR$8Mu*T%{Of>eC~9#S_5)!3|0s8Yf#oTcDU_y9*MT4--jSW6>0&MBJvj{ z7GKAJ{%}ATDNrvu>AsHe67fCqKs1QJQV#Ho^1X(o#o-A9u6w$gC-9y~pUBi0R1~yA zt%Jrdq1XH@Z z&J|s;=p2D2f;9-qD*?gmC=^K8u8tJD1ALBv%a;ns@wPA_!6>7*7Fj)Pf};1ZX7|}g zBm?;vrA$-X&Lq+%K5%}CA|lhK&(@doq`cq zramf6oIw-E!Ee*OBc3rgOY@gu-dZ2_FG9zOxx)H~IU*6mpQC&xswRuWWI_<&t5 z9T}!-_KU9nnfvSK8g%K%vRm1NMaqkU-&tn&e)XPG7Y*nT3eYM(#LdFQbQiug9|0h)>%1KqqqTbCmfWQni+_#`r+qXOI z<{Oy8!PN80IOFS_;cX|N8nr>RWgYi)4A3t&vSeQ<{g2wdGpMQV-Iv~l(0fS`L3$IB z7J(orNKpg?K{}$5BE5GAMT$sKs)z*vX%c!1y{q^_5LBwD6d^z$((c;6=YG2P&irTY zIeZ~7nPl&sowc6l`L*Yfm>V9O-yoa@5~^p`0J0-~AsA7Y-YJQKxs(*YJa}~{5~hRZ zrQ*skFOi}<-AC?mmJnX<+>PUA9{TMmjQCf4J%lvXY@VUBE19<@!=T< zl<1S3pC3<+X(?428lh9EELdq)I&;bTIK?97Uj&l(`OTx0g)Y*;!^x3}Jb)e0-myJh%QArowkEm{%Be@Ye`~%A}xy$8j4&Mo+yRCu}YvAXIId0 z9l2X)Uj2g!fcU+xZs#;3yIRAjZmU6(Iz8l^vZ^oxexj8E$o6qp8v^W<(D< z@np=V4_H{&J1JS-LCK29;ZF5f5Y*yxvel?SQ4U5e?aZreT?nu-_Q;8ZZbvNTpZ3QjKnG`y2E(_dM7Y+^7IuWV131C7irmsF*&-ek$FbBU0go|F1E38h_I9fTo%*J$$;XSTj2(ED> z?jb>#f0;X5yuX&t4EFv-KR@09RH_>>+n-f?J%UCli{8VnT1_> zeb!=OP>c%#2`QTI@(({SEDUDNB9fCZ{YktAgHzuC#N!?U6uYgxJt0+qe+%jue>J>_ ze>1eHcmnNz!$wdor_GBHR|r?IOsbZpOm%4}5$XC0(+6v;kHQY%w**?-p;*J8a3_8A zGI*PIaj}2J2fNgv=PD9)gRWTqIvFqJMWj~P-h4mz=ODrEY-@8&1qiJiiFjAy#T+_E z0%DFEr!TIt!2~awv%0(}nLk?ramS}r9+GKQ7?z(viHS9_DRCL=Nzw6JH<)Vd-~SnT zqSV&HqTZv@z&+|XQ&}0~IW>GqDW_te#ue?8W=U%wI-@j)Gp3XAJjEc7NDi?7r|fz^ zqzQ@O;A!+n3%`XMNA1SkguN6}^L?E*>?oqK&5Ks-pdZWIHksc^->FV}6B(qbt2+-|o_55Wk_p|HZZW>SAKu@vjy_$T zM0QJgVCzRvyG{7n5-!05bvxD=d0qiAUU;qP~~r=hpyL%hSwW=J;Un*3*J zC1px1%u)N%C3o|Jv?y{s?L{>jbywS$?&hZ(&JG#auT!0_CiHu@8SAwb`y8`bsTY+BmJXxhNE~D)+lJcbCKG%L8V%O?PrKRPvFlspo1z$5Sn(16dk zsb;(bsBO!rkLS0*#ZwV==ZH08Gs_XxQpX7_kFF@H8I#>doOGm`WUyhHl zk`|vJpG+6_LNI+zMt_dV=?@hdA4_cMZDt9#mR^e|Kvf zFp(A`@NyFi9c~SIj@Kr5^$8EhTG%)QB)PSANPr%4;HCk)6`GgiX%2A;POe)4jM?V4 zacsge2Ss~%U(i;iq~x>zVq&h&bb>Nrbr?|c+J1(e8lrY&Vh5pF?{mzVBq`jIJ&Au`g z=Efh(N*vZ$UI3M-54mxZgI1?XXca8Pxf%E~<@E>>RY58|Qnueo5S_l51KOVT6h(~8 zBYkvDb(r$g)qcOr38M}z)k^E<_gUHv6Du8byDaA?8guqDKr^!cXZGIV;?iK|(Xk`T zejYHi8wryQ=ls?`Gf{IYl%LgPjU}%qJGVc6vmlh6{r0f`zVe}WwLY4ezuTnl6c%Ia z9m>Z;mk;qs!bDdeFwvdzC^u9Wri;~I$)CLvdM}K6aCA^m6bo9xc!>of<^{s!KUs{Sgs$SSW&o3;ZL3pxA)$7n z(c7tE9Mt8(x^ZFG<{kQ1iXz%A$;>aBn|9HfZkaxD)WyiBvc~c*KfJP_j8CHrzvs58&&th!g?(iSMd=*jQE9XYZR|I#Tx=eB!}8& z?*Wu64Q$!s{GjlHnsYt2{v|$yKk#gtCtmvcn)c3NA;`@rr2R#4sJ3G0#95TM{)qPQ z+;XJnsN+egtBW`$%yi9~1gsSkH=u>ee*A23pW=RD|bGHp0K_;x}Jh4SL{xP~tj z6i})#IR>>4F;FiO$F*7$F$u8>glV@DilKVC?VQ1C ze6(S^LASeic%&*q;HsV;-^tnZcNNjP3##w-C3-mgi3z$rLGo9VlQlltcAr}ih{jp!&ZEJH28B_XBG<9Yhqx}I$fvZxitGbH=<4+)34<{ z=pj1rdNE<$YzR3VgLvdZ(iQrdm$go9OGL-1*pS!)*x3akQLjxiOuCm`)9-y*DkfYy z-6dzd=m}sQASYb^-gZ? z(McSt&(Id}9-i}(RaP7jKPVM?W;Wao%UFsEB`Dk(OZ-DQkNM_i!zY$c+3##i7!NmC zw1!Izo_{ES7L>4AOZM<3_WIwNan=+iBv4sArLUA^psc)Ot)lA5Bq0CES-XVnL-3`P z_Y1}6;xg*AsN;@m!fWRUPK77r3`(hyTVkkOi5`aw2PMU66bKi+gJaItOn-HPV<2>I`th*qtM=HK2QZ!(=X!+48SWRA#996nkxh+-xg6xIz0 zH0G#=OTrLlzWhGIWpmL5-k$JTw{R3)wT$%v{8y}I>~a^EL4v(F`P!3sYEBAlf>l43 zz;IyrStTRo5H07=yw8u~Y^SSh%Q2si=c<{%cmh?K+Rs z0D;ug1yCWPi_aOoh_1BHQI^FpnF>{VH*4IUVnPqz07^m=>AKC?)hC3#0jA_Mfy-Ej%kjO^VFYK{Amf z=l1S*14zD@tV;v56to%X99%}3mXfE6(Q}F!&^iVYt9Kiyb)H%2m z(c=292nJ;TvwNu&ooU$uC5a~~!p}Az8MjN^!iX_QI+?2q#qrJeD0KX?|BcEWLq zppWNuh~I>Js!|EC*oLpEmr|0RrTa+dQ?7KAd|GFN#D_W+FmKGZ6t$vOdunvWM*Q$u z41og?YIA%WlGr@i*FPGk@aI?hk9xFJP1c0@pX=Z*ksQRkCTl25rW*soBKej+Yh zH6Rqha?|S;nj_CGZ>~JLE#o|~KNvl(ycZdEjcb$im@yPiA{!%*z*M=0@fD+%@Z#HD z@ih@dUNjN#a|x|ADKu)hltuQq#r&8EmY79W*L)`l+QStMSa{R+=t%+nigEkE?K2si zZW>O@XJu~Z{~VKDx;(&m31GI#Nwx5#QwU%EjulK$bST-xfwvlo;*8nk^&JZ*)o2JvHOU^t z&mlojU(Bvf`y&$la*{^eHvXDj=7c&sA+mA#vkMz&m6lkOlBlu=%wLx>A@f8o3<-o&K8No9QC!$=53Ng4W$K7BL`%9QfUsBuWtO@ z4<@?}2PwOq{v?anT3Od4HxXE-vG#$BxPbPLUD;pfq^dB-Izitmt&GdQ^$pO#QSdVtm_seyk||cfT>V|g;j)}o!4w^rJXi8t z9FSj$WYs#U?q#9*<;7}i#jeroV01>Go^tK~UE~t;XKDZWV5ay%<-wG5b9i3Ne=X899C^wwX(a( z(;X&5XSac6a1*f8y+UD#K~VfD0dz+TKwvW;dOOb5#%}f+itkltDk>;g=LVB$aNQ*8 z^rCLmIO>%HHSv9XH9V^}4CVybpLM_?L_P}vX$#Dhr|*WgfofX|uUTa#J-N8P0X!!S zB=!FHg^%jBnI8Tmcxi+U82;}1L9wuwwthG6LIyHAn37R{ zBvAkY8?P3q{R8?xXP}oOcCA5kEAW@q6GfM6_c)n?uj9luzngv^yVf?8XOn|Fb&UFkHO%F|o3EN}0nB_i8ed_Qjo^SM0>`w6Nq6G4|UN z>26W=Qt+s(X?t(v+mtmq!Q|g^p&x>lQG1ZLe{xCW1)-wVJl`Q>wU4oV~6dv$*N z^K+UwACTcUgB%VP%yp5P)UzmebZ+n;d+?$DPW`mI_n(%Pew{L11#XM`_uQsO3zDWY z#kuPa()v?G59XpBi3WR)vSX52scXQZY_jB1cEQB#+K8*`i7Ga?64St`vla@|3AI=U zX~o_(H(p%fR0k|hTNKbq`GA4%c}UMw3GN;()H2YU5lKK$_mxY=dTD_kzWWM!H2B;O z^!$yWJRSu$$M?bgmk;u_@3$N8)0@3Fuur6j+cItGwb)Cm$=KC=nX4JBlYQfCo@goa z>!+fa+^=nqr|D1Cp}YG6j{@^zh>G_P00& zxfvz#Jj=ekI$QWFo*{Czir%6-iI=}Sc~83OtK7A4Rti_)*Z6`y+{?(4zOO<`7?A9V zzUSmWMx>L$vUC{zVQYcKvAJPp$jE5!UPft~KQZOX?2df$*1G-;P}IDqW;c^6xzTzC zvZ-!o`k;rp3&cZ2uoc*(32BB3_IbkJxsK#Itj{zwK-Qm-{CTvQJx;>lbTuj}2HE>U z(e)QgmD^04@Fo9a_)YBHwwr@^M4~ku3qy77a;1fxwv9*`bZl{~@##b6q)d<$Xp#-4 z{sb1xvWPw!Ym^Ds!4$B3khHsU1g_R+fHU8chsXX95&%JLKp_;Q686V8&3a2sq=yF? z%T+~>DCt!`a0um^sSO1_-jJA(U%@dJ=s5L(mL}p`2TYxkUfQf!ueU6dz~C&t#mGanLRuFYdymyr(Q9{{ucIzq>IHF zE}O{xg>x*Xl46Z`W`#=uOM5jDl`RQ3cL_JKW|D@O0%kBL-++{!P=*~E;PXNmj%%Eh zUjTPF;y0od7zNmBz+XPP%{fnht(iBdWDU5<>>6-Ueh(q8xr3d#?P|X22jEQL3e-)z zySqEZc-}St>qd9goOrY*){=`5QrdTPoHyIGOj-LRN2-48k6P1X!)dowJPE_en2aqo$<}13zSP8htm}(>5}kU?(JcT zfgL{C*3y$dJVt6wR`gYf>Ox!NwQ59~pjCPSC}f%NM0YqRH& z<9;3ZQtuN}emc%+R7I!)#i)>C}0$-xH24_M*d!N3|x?My`M| z!f6LHp66tkHw4(3!IC7Z5av|DZl^OukRM&;t)~3m9enuu^AAN-toWXoBKu#WNwmQm zE6Ek^9?r*7Pcq|S3;Nu`?(l;3VrS`AoIk1*=UWzdp`%)moH^W~2&~48u`J)}mJ=>A z;4neiTcR?g_`UbG11!%3v2oQMo2R~P`j-6t4*xBV{sU_SAn&`{t*2YNPAb!gF1iBj z^X^VooL6`4kPdlfX`JT;Jb;cL=h{t(pgu&t(hd^-4EP3_SEhFd4Wf3xp3exYmsmNv z42&^ZeqSiJ9jv%_ly7-|^Sj5_oYS!qd?GiXQbLY@l!G8sz5nq->U}`S!~#XdO`!ML zRr#CRilHL0SpkWC^+R5zzS}>D0GgYI=%T_uTY)C6Qa6FQtR5;b;7KZ^U(R{z0dJEl zpx~)yzg1VDYTEYHjvE*FTfbp67%D&&NYcOXEqGN%_~88uL++C+7lhw0U8ic8eUJ== zivz=el24GW1*kN0H2hc#0c%19>~2MNfaCHdc(u|3i@quB3&q%kK#1Qua07Y=3bf9Z zzbxtMqp{fg|vG6+p7)53*)oPX2wS#OEbL`!4Veybp@Q zZSE9E@hDsI#=Pv2wdCK=5ZnfTfA?Sqr(Qky_aX6rwpppnJwnR;@ZM0%mJ25XKbQ54 KQEzqZqyHD!HmBAA diff --git a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md index b22a841fb2..16de770ebb 100644 --- a/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md +++ b/windows/deployment/upgrade/resolve-windows-10-upgrade-errors.md @@ -60,7 +60,7 @@ These phases are explained in greater detail [below](#the-windows-10-upgrade-pro 3. **First boot phase**: Boot failures in this phase are relatively rare, and almost exclusively caused by device drivers. Disconnect all peripheral devices except for the mouse, keyboard, and display. Obtain and install updated device drivers, then retry the upgrade. -4. **Second boot phase**: In this phase, the system is running under the target OS with new drivers. Boot failures are most commonly due to anti-virus software or filter drivers. Disconnect all peripheral devices except for the mouse, keyboard, and display. Obtain and install updated device drivers, then retry the upgrade. +4. **Second boot phase**: In this phase, the system is running under the target OS with new drivers. Boot failures are most commonly due to anti-virus software or filter drivers. Disconnect all peripheral devices except for the mouse, keyboard, and display. Obtain and install updated device drivers, temporarily uninstall anti-virus software, then retry the upgrade. If the general troubleshooting techniques described above or the [quick fixes](#quick-fixes) detailed below do not resolve your issue, you can attempt to analyze [log files](#log-files) and interpret [upgrade error codes](#upgrade-error-codes). You can also [Submit Windows 10 upgrade errors using Feedback Hub](submit-errors.md) so that Microsoft can diagnose your issue. @@ -175,7 +175,7 @@ Some result codes are self-explanatory, whereas others are more generic and requ ### Extend codes ->Important: Extend codes reflect the current Windows 10 upgrade process, and might change in future releases of Windows 10. The codes discussed in this section apply to Windows 10 version 1607, also known as the Anniversary Update. +>**Important**: Extend codes reflect the current Windows 10 upgrade process, and might change in future releases of Windows 10. The codes discussed in this section apply to Windows 10 version 1607, also known as the Anniversary Update. Extend codes can be matched to the phase and operation when an error occurred. To match an extend code to the phase and operation: From 37cdb3720e5e948459926528495a5789ff6f01e1 Mon Sep 17 00:00:00 2001 From: Jeanie Decker Date: Fri, 2 Feb 2018 15:06:32 +0000 Subject: [PATCH 91/91] Merged PR 5666: Replace procedure with link to new Intune topic --- devices/hololens/change-history-hololens.md | 8 +++- .../hololens/hololens-upgrade-enterprise.md | 44 ++----------------- 2 files changed, 10 insertions(+), 42 deletions(-) diff --git a/devices/hololens/change-history-hololens.md b/devices/hololens/change-history-hololens.md index 6b4a3479c5..20d0866be8 100644 --- a/devices/hololens/change-history-hololens.md +++ b/devices/hololens/change-history-hololens.md @@ -8,13 +8,19 @@ ms.sitesec: library ms.pagetype: surfacehub author: jdeckerms ms.localizationpriority: medium -ms.date: 12/20/2017 +ms.date: 02/02/2018 --- # Change history for Microsoft HoloLens documentation This topic lists new and updated topics in the [Microsoft HoloLens documentation](index.md). +## February 2018 + +New or changed topic | Description +--- | --- +[Unlock Windows Holographic for Business features](hololens-upgrade-enterprise.md) | Replaced the instructions for upgrading to Windows Holographic for Business using Microsoft Intune with a link to the new Intune topic. + ## December 2017 New or changed topic | Description diff --git a/devices/hololens/hololens-upgrade-enterprise.md b/devices/hololens/hololens-upgrade-enterprise.md index d85bb461aa..1e4fbc3f9e 100644 --- a/devices/hololens/hololens-upgrade-enterprise.md +++ b/devices/hololens/hololens-upgrade-enterprise.md @@ -7,7 +7,7 @@ ms.pagetype: hololens, devices ms.sitesec: library author: jdeckerms ms.localizationpriority: medium -ms.date: 07/27/2017 +ms.date: 02/02/2018 --- # Unlock Windows Holographic for Business features @@ -25,50 +25,12 @@ When you purchase the Commercial Suite, you receive a license that upgrades Wind The enterprise license can be applied by any MDM provider that supports the [WindowsLicensing configuration service provider (CSP)](https://msdn.microsoft.com/library/windows/hardware/dn904983.aspx). The latest version of the Microsoft MDM API will support WindowsLicensing CSP. +For step-by-step instructions for upgrading HoloLens using Microsoft Intune, see [Upgrade devices running Windows Holographic to Windows Holographic for Business](https://docs.microsoft.com/intune/holographic-upgrade). -**Overview** - -1. Set up the edition upgrade policy. -2. Deploy the policy. -3. [Enroll the device through the Settings app](hololens-enroll-mdm.md). - -The procedures in this topic use Microsoft Intune as an example. On other MDM providers, the specific steps for setting up and deploying the policy might vary. - -### Set up the Edition Upgrade policy - -1. Sign into the Intune Dashboard with your Intune admin account. - -2. In the **Policy** workspace, select **Configuration Policies** and then **Add**. - - ![Click Add](images/intune1.png) - -3. In **Create a new policy**, select the **Edition Upgrade Policy (Windows 10 Holographic and later** template, and click **Create Policy**. - - ![Select template](images/intune2.png) - -4. Enter a name for the policy. - -5. In the **Edition Upgrade** section, in **License File**, browse to and select the XML license file that was provided when you purchased the Commercial Suite. - - ![Enter the XML file name](images/intune3.png) - -5. Click **Save Policy**. + On other MDM providers, the specific steps for setting up and deploying the policy might vary. -### Deploy the Edition Upgrade policy - -Next, you will assign the Edition Upgrade policy to selected groups. - -1. In the **Policy** workspace, select the Edition upgrade policy that you created, and then choose **Manage Deployment**. - -2. In the **Manage Deployment** dialog box, select one or more groups to which you want to deploy the policy, and then choose **Add** > **OK**. - -When these users enroll their devices in MDM, the Edition Upgrade policy will be applied. - - -For more information about groups, see [Use groups to manage users and devices in Microsoft Intune](https://docs.microsoft.com/intune/deploy-use/use-groups-to-manage-users-and-devices-with-microsoft-intune). - ## Edition upgrade using a provisioning package Provisioning packages are files created by the Windows Configuration Designer tool that apply a specified configuration to a device.