From 0e4ad812681d2e3c56ea8a05923bf8d6f7661601 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Wed, 25 Mar 2020 16:45:18 +0500 Subject: [PATCH 001/228] Update hello-cert-trust-adfs.md --- .../hello-for-business/hello-cert-trust-adfs.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md index f42095fd31..a51e3b166f 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-adfs.md @@ -75,8 +75,9 @@ Sign-in the federation server with domain administrator equivalent credentials. 6. On the **Request Certificates** page, Select the **Internal Web Server** check box. 7. Click the **More information is required to enroll for this certificate. Click here to configure settings** link ![Example of Certificate Properties Subject Tab - This is what shows when you click the above link](images/hello-internal-web-server-cert.png) -8. Under **Subject name**, select **Common Name** from the **Type** list. Type the FQDN of the computer hosting the Active Directory Federation Services role and then click **Add**. Under **Alternative name**, select **DNS** from the **Type** list. Type the FQDN of the name you will use for your federation services (fs.corp.contoso.com). The name you use here MUST match the name you use when configuring the Active Directory Federation Services server role. Click **Add**. Click **OK** when finished. -9. Click **Enroll**. +8. Under **Subject name**, select **Common Name** from the **Type** list. Type the FQDN of the computer hosting the Active Directory Federation Services role and then click **Add**. +9. Under **Alternative name**, select **DNS** from the **Type** list. Type the FQDN of the name you will use for your federation services (fs.corp.contoso.com). The name you use here MUST match the name you use when configuring the Active Directory Federation Services server role. Click **Add**. Repeat the same to add device registration service name (*enterpriseregistration.contoso.com*) as another alternative name. Click **OK** when finished. +10. Click **Enroll**. A server authentication certificate should appear in the computer’s Personal certificate store. From ad6f77669d1c77c8478e84d3f5cd5520a420459f Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 23 Apr 2020 20:58:23 -0700 Subject: [PATCH 002/228] review alerts added --- .../microsoft-defender-atp/review-alerts.md | 67 +++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/review-alerts.md diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md new file mode 100644 index 0000000000..562daccd61 --- /dev/null +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -0,0 +1,67 @@ +--- +title: Review alerts in Microsoft Defender Advanced Threat Protection +description: Review alert information, including a visualized attack story and details for each step of the chain. +keywords: incident, incidents, machines, devices, users, alerts, alert, investigation, graph, evidence +ms.prod: microsoft-365-enterprise +ms.pagetype: security +f1.keywords: +- NOCSH +ms.author: daniha +author: danihalfin +ms.localizationpriority: medium +manager: dansimp +audience: ITPro +ms.collection: M365-security-compliance +ms.topic: conceptual +ms.date: 4/24/2020 +--- + +# Review alerts in Advanced Threat Protection + +**Applies to:** + +- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) + +>Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-managealerts-abovefoldlink) + +[!include[Prerelease information](../../includes/prerelease.md)] + +The new alert details page in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) provides full context to the alert, by combining attack signals and alerts related to the selected alert, to construct a detailed attack story. + +Quickly triage, investigate and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. + +## Alert overview + +Once you select an alert in the alerts page, you will be taken to the alert overview. This overview includes 3 sections: + +1. [Title and involved assets](#title-and-involved-assets) +2. [Alert story](#alert-story) +3. [Details](#details) + +### Title and involved assets + +In addition to the name of the alert, as displayed in the title, this section provides additional context with impacted assets, such as devices and users that were found to be involved with this alert. You can click the asset cards to see additional information about them in the details section. + +### Alert story + +The attack story details why the alert was triggered, as well as related events that happened before and after in chronological order. + +Every entity is expandable and clickable, with alert entities being expanded by default. The expanded part of these entities provides details at-a-glance about the entity. Clicking on an entity will switch the context in the details section to this entity, and will allow you to review further information, as well as manage that entity. + +> [!NOTE] +> The attack story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected. + +### Details + +The details section adjusts dynamically to the selected entity type. + +By default, the details section will display details for the selected alert. As you work through the attack story, selecting different types of entities, the details section will change to display information relevant to the selected entity type. Selecting involved assets will have the details section display information on the selected user or device. + +Aside for basic details about each entity, the details section displays historic information, when available, and offers controls to *take action* on this entity directly from the alert page. + +## Related topics + +- [Incidents overview](incidents-overview.md) +- [Investigate incidents](investigate-incidents.md) +- [Prioritize incidents](incident-queue.md) +- [Manage incidents](manage-incidents.md) \ No newline at end of file From 873de166e6fc334843891b66d4b4477e2bf27d0b Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 23 Apr 2020 21:13:10 -0700 Subject: [PATCH 003/228] fixing typo --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 562daccd61..88d4bbfbee 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -16,7 +16,7 @@ ms.topic: conceptual ms.date: 4/24/2020 --- -# Review alerts in Advanced Threat Protection +# Review alerts in Microsoft Defender Advanced Threat Protection **Applies to:** From 302dcc067fff6b69e94112899d8f0c0a4cc4b5cc Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 1 May 2020 00:59:57 -0700 Subject: [PATCH 004/228] changing the style of the new alert page --- .../images/alert-details-resolved-true.png | Bin 0 -> 39171 bytes .../images/alert-device-details.png | Bin 0 -> 35743 bytes .../images/alert-landing-view.png | Bin 0 -> 80610 bytes .../images/alert-story-tree.png | Bin 0 -> 65436 bytes .../microsoft-defender-atp/review-alerts.md | 51 +++++++++++++----- 5 files changed, 37 insertions(+), 14 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-details-resolved-true.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-device-details.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-landing-view.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-story-tree.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/alert-details-resolved-true.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-details-resolved-true.png new file mode 100644 index 0000000000000000000000000000000000000000..7cd8e4cdde7fa49e93d39558d3a21c023cf2ad2d GIT binary patch literal 39171 zcmd?RWl$VZv@V(u0!i>B5ZpsTumHgw26uM|4ub`E2<{dVT!OnZxC9+w&>#a0?k*W- zaCpNx_x^cx-j8?hxmB;~byd%*?&m^tjgFSEd`A%*BBv?Uq@7yMkc64J3vtu!;?HF`Eym)V$F?*NmJ-RG zUpR7qLDbAvs(aG)<-%l#Ek1=^k|b?w$J+d5Xo{%$d)2j)Gk%i^=d;?ev*I+(f!2eI z{a8=N5sOAUcm4r!&O}cEsEq;s4v`WO5izJi9P}uD{%?vXTrte`3Bj5)6VJDPy~aIt zY;|W4F3oKW-rBYI*fHKz^9#bb>o_eZJa|9|s=$b<6fl<1hG*~l+N&C>; z&Rm?DD3BQ}kq3uN8*4=NZ0(p+BQlJ?Nh-b@!&1zaAL!gvwO%i@BtUJy@?KxOEQ6W7 z4TBDWKRjdv`f{C&EQb=W+^AO0AD%6#toBX5CHdgDN9xkx)rkgg2zV%bwgAr6SK1rF;Vk*@T(pgkl1^E}jeffUwG< zL7hYGWF70XtDLI$m6RTIN24kuBGgTW&BkhG1jy}&-2Tn@1~)6W(;l|2ve3uwq->7E zH+RJ-Jz}Ew&~0+P#c5YVVw4)y*8fC@Bql&_2AA1PV*~sMtdv$y z-&B1>4k>l9FbH0NVJ3GU3_PREc8A(O198^(*>Zqco z`RL9bdiwF}(N{F60v{Z1(dt`gHRUC-_xUlIOeqH@`{^d=HdO^FNrM{%_Ivd5yiY$0 zuKYt2_AKR*s^SX;I$uvR>5$FfC=1@3tEU%h)*T zvlodf(PfJ{i1Y)hLpWm9S_NWImDol0;6HYKQQv>3(AeyvrMg{sD6Q3BX?*#hVfI)= zsF@-@YVM?|C31;99$OID{97bM)T$S9?>LyU zXY!f(_NB}ack6x@6OLz~>LR~N4Qgaz{ zcxS0ot=uB4a~7Pg2*4G@6Z2}TG1Wr94*4Q(4~s4r))QeTXQMyv884fwq<6ftYp+r5 zoZO*7#7fR-j_?E>80I)=ueU5a65#GcPF9!$Dpsn;Sp)SC_Xmw%K5f-eV@;|+awmxrV2~A zIlszoT}JG=&%AmjLL3$*Y&zY=v+d?sgepN~gU@wq&Y%8+k~koKO~(C&q42Jd19$5s zWD*|`8XCa|0BmcH(Uv$t{dEF`5g0VOimluf0xXm3`N0wQ26ZF_TnsiF9ksWYKy2pV zHAC)jkiV{Cd)=GlA>Rup^SGU-lZa1s3?Ch#7!prjuS8w!tp9T)8ay;_@x_(Cs2*r1 zxcHs->2a{Q3VdwkJM=Iso>(}AUx@V!Oq=)ntiGEd%U`B^ZW}DN?Bk~qK*N5nzc#V+ z$0SYNYM|X7PB2-`wXdJ@P|3A`h!(9o?4mx(HZg8m#6AfhH zp6>1L=g0LQ8vvgX>`uwK8_Yn4jz(%6ic1g{BBeIHlS&l9hqntK0To@_HR@EQf)%?~ zOGBOw2s0Ta+f$=YRV^+bXbuWaQ~42DZ`b8*a<{G zA@5;LY|w!L-)E}e1{bmr^In>rBcni)@rEe@-0~xkk0r(rycUs?oOmw>OD6so2%LjyP9Hwh!9(!vHzUHq=Nh*l%9DNG{rwF zB$skA-spP9US&&M0oEG4-r<(i*CT;Ck@~idHx@kPy^1ccxn;bmTV^7!it6QnUFpT? zCF7mdj(U)L>nBrb_Zv7btiZ}yru0dn+7j|kO2=_d+jfwTFhuR~Nv6dC;3EE4`@P}% z-+nrv>--N&Xn((1As!OWa_cqm$vOD0q?G2yR4&=Hd7I2=V2BogqN& zc+j{go242G(FF#qG=E9h72U*)Vr!+ON^jRj_aHDP(nANIQY68p`MSFL? zNz+cG88nq`8gW0{-iCVpv@ilX1oAYShW|bx(reY(iF|j^b23d7zz3Xf;T`61tQOw8 zG+8%0bGo3}ePcfl6#D2vC0fi)yj)>`EgAZI1H#e~yS0QZ{HBuX$+57;d$7eU&jzG) z61j>`J+}8VJ>b(+oyoQ)pz_n<|cNjMZ+v_h`< zJ!ncUu@C8uO^L!5fuu z6O!Z#WBPGp%$}{vYJ1C&na5HP-iE};o`u%eM2 zhgx(6*yCtNu-DL&tKUsET%%S>!j*(7cDa9dGc_Ea`Bsi%qeX$4+*C+>bpz36pp~_= zb!FmRrnmEt*0r>j3Szb36MluQ8*#3F%~hW%$79Ed$Ej6V2E4JWxF7e0d0nDQn;}d< ziV%y)8SBV$++;3kbH+gPpkcDo8!T_M2(S(ghuD(SAg$Sjoqj|p4ncUIt*PY|Z5 z4yKpP!>iEI-m#4o#KFfL7bfv<@p@Vu@4f6O3|BzSW6&heD%=}h zZQ~thR&Irc4zjuG-0&05es6=!x4xqhX%`JrDLdy||M*X){XN8}RzMoDQ9HgVjsFOk z#|}gV!8{+#!j5E@UrjnxJtZI%Z?_gqZnJH%xc(mYyvq%g=^(3ZtQ2MVX7f~07S}&n z%LJueJosif_@O|c49m&$iGh1|5+*ksCT{1Xax)(uR z-!{f=aOi_>@8^>(f!W-bUm9G!9I`EX*YY~Grv7Ua5w-8@;czmvu{Kmeo zpmz@A_QtwK=O0@sr(LzvMT}@9_7`E1UabRo)D{27b5eul;qA|~c%JuWkwMCkzzCzn zNIPBqzlQBBdPmtIk{R+kTTbzp$n4jl_^|D|S|+F07@#tot^|@fH`P&Y?=k}NgF@fc z3uUhTK&G(e$Vw{bMK!1A*CbWJ19<-SGrNcv#G#Uoh{hbNWfR}qoENV4I)sQESynAD z_)iyKR(?E{Ub(7=p2&1bg1|l6+Kxezb56AVy?_4%K?4`*&`L4m^HC{g=aRG$fphll z_~R%kt^>2nPi_`+XV)z*@gDEFid-^3Np?X_9^_!6U;b%r@PvfNS0?>!C3^2A1VVav z`$uosmq^*m{S#JKI5y%Wghlz4JKcUD+*_AS?6@$~xBpx6p}L7-yq~K?=cVS%M}ijZ zbC!Q(+Haeaiq`#TXt7y>E-fvRd?wdAF;kr31_9@nZaJ})^DT2Nru<=`FTTz886nHn z{7b4d_T%o?_zgP`s*538f2-M=yz7`TWKDUEOmuwGv>>;Ps>*>7O-Su+0D=d^q|5Z#r>H#HwJ;A)4<}-v$57hI z)ya`dy!1tlAWPf6s~R;(VFJZ7Uyw|HW2k?&1^GrI2|5*41U5n_2F8L5gF!9-u`PG{kZ@!&&d&4nK3oToOK=d4t5H-U78ub9#?Vz(>mq6h^VYl zEBOs5xGU(eu%7+qJ2#ALKK#8iCAY5|vHl0x#myOBTzApuA;-~PaM|TAD&c|il%3r- zYT=g8ySUn%jU^gzRW@`&=Bw%HVArKi-tV^C`Nxg)*$aMkDxSp(PPmtf3=}wVCU}o{ zSN63yW&}#sJtRx;wHy)71uV2Wof*7|AG+10f;CkS3XA5y=B9?9Y5`zzia$C1BT{-0 zOn!0WVprsPPODb1@Y7#8^@*e+(&YK+G*$6Ogo!-Ql8n9>WX#54DB3$3wJuxk!(1|FC2i^@Ou#; z%P*L6A`K@N(mzFC@t>Ye`n;6A+34fK2bZ<{h$Y;Rie$l8P3+@|7WZ<8M&x#ZJ+N5T z3-|J{nMcvE{rD>E=X`c_!))&OG;CXYv+zx8mQ4>Pn(`95=kSIs0h@Ll)>6lmC;M#a`*MkCDPF+y5XMu*EtnVTm7enj*3t9ei)`+ zo)OXe7pf7Y#^0#)uF{^DM`4{(g?Uk7*I&G2WNq;uE)jo7!|$q@(YbHGBdaprQN^d4 zR`UJ)t>3r(l!wd4^*u!rMx)eS+jM-XW?8(L{EWw+o{fKE7}JGAy1}8l}aT zBxmzDT*jt`<0OV=gFIQ8rGHjxi5XkD=}dwb?D~91xRIPpeZQ*BjpMFMT#NnfKi%0U z9K~g8RV#q0uMC*`4?HB$V|s3zStUiZxd;jVIdc?Y`lv17(L6H{S_ozOk70J|?Tk+n z`teU-Yhm>Ya3OJwqA4cw;4aXYc7ki}456I~eR_*&@|UTqD&5oA%NCb* z`Yj4{LuoGjA)rG8b{NNgDZac!uOX>Fiv)A;09%8d8)9oGMFH~f%uvHiL_XyV!jiU5 z)&gnk?Sy@ee1%mT@})6g3Sm1B;{a|0<%`awD0dvEyC^^vL^t?U7L5V{?xZKUKNkJ4 zv{|hjYesyknhJk)eWGi8^O}39?z-mMU90apd9gC?03x82O=^*Lai)6bfcGH*C6RaVfWLBkgZ=NHOs00W8a95AHI#nO(V28w4vMm}Rzy zQ0G(&@4CgN#GMtOi~3eA=x=og`K`XLH$Q*MdV736H1=7{W5!ZH0vohK$6J?rs#Mu+gMPaBr05q# z?{po3w$=>}Ul~yyf&R@Z74KwxZ1VhB7|rj|HKv-3voHN@X$D=_>wYeIRqt&fadk1; zPGZNx>zR4wjM)<+*H#A9;Qp8`#G2h@NxwstZO=VrRKGQt1Pz?AkhiS+2>a`O{ETI) zAK~nat@Aj_`L0CH#9I(U0sg;#A*j$-MdtK)uUzgy?AE`8-!Es@E?mc^I#f|4sZ<`ge_ucbr(egCuhw^9Jt z=oUYIsW*>|D(x&fN+dF}{~r)b!Zf?#guCih{=XNCkU|? zo3`_p_5pr1>zICZcCb*A^@Zf5U^oIM)Qj+?rOksa9%;Tg*Kqv0N_&=g)N?FJ+#na5 z5_W@O3bNqBSS~IaHJzbmUZ@;Eacsjiv=S=rEzZ23FgyYZdy*ktf16hP^>aqZ(5}upT2Y}WwD9>^DX>wAn?N_CH)bQs06GgOII$XVkf{IB$hL9s z7+wTgrj@fDY(M`-x;jx*E5oHpa7Rp z)CB#rH9vpaBDuZ6%9j3$p+`mga_;Bq( zy@VebolJW6)r8_k1OY}~-Lu6dn&EqYwC8Elm-f#O=m|@llH7}<2I&MrzLGMg^u~XQ!^&oP)3MF%wOvf5KOWZ58|6wPC8vchx46}wLUTA zJZ1ZO4XFoh7q%ajC*I0M2#x62Q2j}oSeP}Z3)5QP(7*XSCV|uz{k;-f9(xLZM|FSi z58UUT;vf~UNY&+fk-z>I;U#C(m`(%%+Cpb)wPdh-#Jw9M1Zk~@|4i-BuuFs$EX^m_ zUa+dzN~6dy_>!exP=%h!+^eq$B%#h1d>u+HYP6>pSGi424Pc!Huc!~vy6QH8usF>t z)zW5PO}3ruQP5QqDaFkJgU-8WCv}ZHD!rI>ZC_1Y-=AK_(m__UtSt?F09`wdT9fa_(UvQmClNqhxh1P%ylfmk374% zpaU))iuC>@|6g*w|9?I??3d%$m-nc*A{6p7B~>;aiTR>#l*fpQ5xft3jNSZqiTh_| zfTqwDCw?JJEbfP>(Vg#8>j#kh&H%|>^-j-%Yl<>#Ro!nmUF3X$7u@$jGa@?Q#7Atr zjh~0ORRtq)J{?F#$UR~R%K>SXQESK>{eb>SA0{)`CVp$Za0lLX>4C%9%6V3@LBdOWAd&&)%WhT5aj|puRS~SWmn;mU?c`&n6N9{d2SPtsocA zXirOGgzggs3e%c?$83dv-evlIZ@6_fxN;xm5P$W1&zS9NZ+P+9ED!YCdfY!x{$>m* zVRxP?|D^Ev#)qgQ5u@Iet3SImv1f-6e)y~lc--?Z@h`NDPO3l z>C~rj`*r8-?I(U$I1BOjf-Vh7sKc+CE4ccl3(nyoMkbh@hsmG-w3$=nnbCi8tMEiJnW9@q-?r<*FLv$w#iRC5<( z*l@|BH& zxV*c+5*0=Ucql5ioh}jD1^lMnFCQ}Ht9cF)heeOqF<8HAeO7ABFHCy83^N#S64qJ> z8OY6S^~Z%O3JO#Db+&X2D8;8m?}TMV@BC<_*x-Iub#hGlv(dO-1bhSQ0#^eUwxK6y zL((~P<*R7s_Qv7Lby&>J{&i*zKE*7yv}nvuH#6o>2ez&~zt+Eiqzl^T_Wx)acx{s^ z+`-!Onz&Z#=NErID1*m>ZMXKET0F7ItK(C- z?I39e$KQN$Vd~Ho{>p5o+--(E*NZh>0S*9bYzKVfq-;6g-rKuPO6#l z%1l=GbI!M*{!KdmqxJM-8W7Vs9ggZPJtBqMS?ASsqXHS+9pL8rHSxH*kFb6USvH+y zhh=EcILRF;DV6QcP8wZpR}0c2&H`ai=y_{*!{lvz95;T%4YFN3*YjYto%4U%@7;-t ze4S+(HA%4@)KJ`|9>oX4-4T1@#ybND3Q9*YpG=$`gQzNVe=8E+o06^Ym1*q!l`$Qy zaba`a1TV?akCa|Vd|IZ+2Am6?W#*@2~^zXYOL;ZzB{=%d_YG{sZ@73Qjy*C{wqX2WBMj@rgStprSG;l z$8c@iSAJ|GZZey+eQqMe{F7M#>LH)T2TR$(tU8F+v; z&lhL2#PBsUS4fM&hsQ$MK^nM#kKN>;eb@p0T+F>TLGXU}VFDwGhcx}gGjVo4YsSVh zM-0UQ;uH}0tNBKW!qW3N>14&%kV?U3)TA6Do_}YJCC*I-)GH9LoSDPEn54{?XC%%HoC+umhusZ0$x;ORIH0zJXJ6--4_u_~2=K zf<-_4oo?B3Q)@H#2rIRP zj=3uhXkjxUC|RBlUehvpz$;&M@(hm`1J2Sm|6DFI?ZZdYyhmcEboz{4DiKx2)gAXVt}Fbj&41>G{*vu{CRc{oX=`1`h}7 zeJ~5R=?k{QK>onP2JX}HO63;X3}e?i=9)tiTg?n|@!F9~bS5Hjnb^GVy4ta-4=B&g z)3S7}n~mifRHr(MhJ;0aEh)5RccIJU zP=xeoTBaSf{ip2DnJIS2n$UvRt*WpY&lyn|rhk9fGml(-GM}Wmg=v;@0X zKG(HAr(4IylgPF7X8F;Mv}B<-QHQB4{l_263?&|}8+nWj4KE3ixl9>Y6;K0P?o)+G zq-F^xZ@PtjBS;u?!Ax%f=M}bOr^l{API0%Qk1}(lfJ&1EPE1vHd;r_97(4|x_e_2z zcP7vHR1(qlxz2)6v&wVKw`FE8bIS*ctDs*hyuLO1gbYRls_$H!9ocf|49*k5tj>Ud zJ4?o`r2p0P4vsI??`(H=J&SuCbU)pq0$L5s{?Jh z4Y|`N1rsayTpUl_grn9P??`OD(RWA_lBE09N6WrcCt=2bG(wHaGkgsSOIoXQkfXC_ z&HZ0*wKUOqfNia>Jn5S`;v7bLOToUUt=Fd04QpAvt&7Cpzax))ClLSQWroXRgr5eC zofKmmWul7^U_`+_$hC#Biuf-1mJB{IZ*OzT&kf6e(Z8&nc#fCb9gP#;K^jGdAw+AO zLphz@DyYnI`H|;HsJ6LkE#=`3x7SD{vbS?4;onKu+JtRv{{;RG1GK-PYipxY_aVIL z{vyceHeUX6t4>&tR}->!%R96aS6d{3L1~|MDaF$BT>{^kYbDU-l*^a$XP7vpkB9Mn z)DF@wpvy>7I}-vF3OKWewy5X$a(XksR1_;*n)MZaCVC|A%~aJzqNQ>#N$&hHbx~Tb zgLaX+F=WVnCRC5U+BW#o+w@{hK@Ph}OjAst*qwxEri79|*)(^}bJIQp=~!RrmGz4M zvPj*E=VD?u|xtmlQ3M6mD()PViPiuk5JxjT>h-kX;O`gb+P86@4y9dV0YUU zyY=~c<)IJDaR0ZzrtNRG_*cKm^K9C>OpY%}n{Q6}G6%atVlLv=9_&wlr;BsFpHJ_p zm_|&eC-qtVx^rWG7D(#Gvl6&Gy?HsG5@JIs!Y;JBUfbl~NyJXeN+}PW(siO3W<_7K;i=(?(UeZ|-^LyD1Gq3-})v6e+2v z@!bwNxsqvr^H#!y%D`LS+QcJVmX_DN?5>trvm z!Sx7saC+X~Hl^n?2#9+bMoN4>g8kF2-qPTPGsBJeF0`aZfLgH77;YC{wyf{frbReW z<4A!$A`qK`w-l;Pdm{FIjS$w*Eu?e%aNLvFmvs3rVE<=Db%?r4Hbfv*(9+YPZCx{SQ+Bv$EPrggf}w`Ci!_G7kKcEU-R_yb`(_|kP=CC3O9XqPQJU% znPV17&$3qJ9oQ-KtS7guU}w7b$$M6Nx0YLGQ`%tkuoLj-@Z$c@;N-ovcS`xn%T|oR zdohoho~dBq>Uo)2YGm1^<4N9BIr6=F8`DVIvWE&58!hibwYE=zyNY7l@wR{shm;^I z?#b2BQj?Nr-XAX3%Q=Bg596+kt9ySY#t%NyLkur1+$pDyTPE(op)J-3Vflx2;23&ur4|;RZ8wf{bw)ld@oNJC+!dVz~SuA zKnW9t>FFE0DOnHUwJS@ZEy2g#lNXv#NL4UB?rgYnB-y8S){c&n{a&Sod)6v=TquUh zl+btH2^(X^Z{LTAofQYpx=lPSX6HuI$6-u&(_&D!R^G)t3lFRsHN>Ret4cB&Ql(d46Jrn!S;q^m-+P;Fk#Vp0lg#VmKZ96n;F54BG zlVh09Zbal%oa};%9MBZb#Ot)Lw5Y99d2ReDfA2fy=Xz<7KF1Tj`@!G)l-=ofFmXoi za1_Z!uq2G)W*>d-|K9w&OmCKm&jPl_n7df5J`jj{XZ&7ABhCk zEpmaffybhT<7g!w6aQ3o`~DB`3Wa$R6Zf8%Lf^WGTfZ6=rCa@M!yUJVoPf)3X4*Mu z?^wKy&SbQwP))4i{x+Xs*LDP^_8FIar4|D=%}eNN@*v>p@F!X)rQ8x#$3)w!tHG|K z0U_1Je@ZB3wA)Z%ZU3*vVSAaSb>~29pZzYMXGuDPm3I6CoAA6FrS|j})Qh$Ji0^o? zi3jJ+u7`Z+-d=cF;aAI&o!TT_q02!TPW?csoHteK>05Iblumc3+~2OAxC=cq;*#LY zi1T0&iVfG_9W__X$&OR@SAl52=Q)Rr&0zY<`K81UR^Um`4^!z?RkXJ9g4sTGvCG)d zJc?|u3tM*RKAJl#aiycaKJw)<$@>B6%3elI@#BEy%MT#?8=-spY!{uCk`h0@mY<;) zW;0%qb$+HzYt4EEJXxayH~K~S89Mh0!;JRJz4;;p@*>?KT1sFPF9*OdvL-mAypPp6 zXZiGE=*im|vT8HhWNAU>S!R;)jNW6MfrQg^or^ss0*Qk1xfZ^c7q}-ev&#$EZB)2x zGEfIHmmXgBO90xRBFdn`pJklE*#P-E!Y%)8`OTl=BszFE2icb3&+ z1Kkulx6?~=L~o+_%DN_@(c3GZhgE{G&N>luBGdA4NYW-vvK09CpmS9%Sm3U0? znN+oMKi4u?iC7qb9y;>SPgA*~pmdO>u?c+ec9V!V;`P?Rrz z>8bDwR=pR$dTQfYT4|u{v0v|THg+GdhLC;e3FbPH>Hz0RPOqx#T%0Mr1APuXf(&(o zQh)feS~Uc_B^&a4kv_Et;-#(RyeFcuMc=HfI zW%kSh{*#=t#|6??QC>yXvUm&`Dm4rLrWsPhXIKI2pjs;OV<9R*OZRcAUeiH!LJ7LT z^ISDtQMEI1d`iH0&DVktV?A9-B4Xc8@Tb+~597>+cHN2Fnuw(OSpP(6+UN)?vHbfp zV^}}wF8aEvku<*VN_MV(g9W|ZqQr~swm&Be9OEV@vZm2UO1RIp%XlyH*2TjwG$uH# zTT)#k_r_Tb9ymbj`J5IQJLQfi%(RW7zEw+|Ux>pKRfeC+e6oD;nkL^cz;)Ol+&DDXlfSwOb%UsiAf)U_e+jZdL z7X{fXQgFZ}>B)FzoLAUFYI>j{zJbfjZI-zR=1Q^&FLOU6_besT+*{4d&dggnbh`9H zv+Ni0H%ddGs`cV?kmrXbO=G&?f6iUt#I)?t>I?s)JlQx@TN%_n&wa0>_gGE$7viAV zT|S-7uv4R54aHHHQ|jyfIMG#T(qyINyO^cp`0QuXw0P6LzVt@>PJ}0Tj=|xWU9oUH z5u1{%((kkRTI--h%^G*tcdo>ZPl|&+nC$mDC%)nX39N}Qt%x5`Ef4(R#>=%ydU|<* zd{weTTTR%>_JNQRFrCL0QIZ~2dvq^t*TjjzdV|XqZT;{UIf+0^jsb=T4vCbuJdQa6 zk`PM=@J=E5_X1}kvDlStR{P!%%$$LRcOnB1p>4YbijP-`pVemg4>m+65aOE z;;j6G_{;`2{LnWFS+PYQuW5l*G3@qKc?$Bt{SFt|1f-$C0Z`O5^Zs&=z*|n1L|v2J zc9+qMYM=7;bDR`Ct5)XV@Hv!BruiGnVr zlr`{;$p98)|M3R@_oXy~SYqKn@QL{Qgy}8Ho}=Cf&{T|~ALBEMX_;GCE$LY#^GIp; zZzHHcg=wkp_z4e`ZQn==bUdHTm7ObQc;xr*nI*%1FH+U36lbKh~u%e-K}zxc4n!F^3*)93S8)T)6#;Yr#zFFW^hKi1)Z|R9}kb(L`>? zA5Yt*$ls7A}l*}5me(qD|2;7GdCmVpT87De8h zTZw>2n%xGkH5J?72N#|q4&05|no|ICJybXN$tr<_!;w*Ym@36#>F(cNtx%nT?}UM` z)8;g-6;%`$SE#YtF7z`X9PEy>L|m-oavUL)x>~V+EB8b*b6c2S+bWk`1=;!6u|ykS z`P@y4wVUWm<2sqfVL8Ka4_@NJ&x<%=?wRTPV+DYPlt{O@vMY@+4Ik`D2`01oTk)U- zY*D!OYPE#1XfY5-Nsy+MNK@jTWfte*Gm1w0LtJwuQ)*X;IIOJ~drI%B<9jVbiImSd zF8eZt)|;hXi9n0G>O`Z?nMgvqCwNry|1jcG}~XU{E;H9q+D#+mB<=!_Xo)jJ~CV0|%< zHUV(0F5D(aY#9oW%pS477^47I;CtCJCyt^q2hP%%#%?v}(OZn*)BvhD$N21Z-w>GS zCVh~)K(W0ewdT86hnv2|M-eQ#>*=M4277d!b)+p8`9&^8{6dk_qMUBK67n<6mSx3IZ7L;BS8L37=0~1TwcyUAZE%Exe*eiE0E6WbamVu{c0zUgti176 zYoY|AspaL(w{w(Jf8D7Cw3%^bI|OT zt7cwjT{$!1zj;+j`RU^0-x>{jW1Mm3=XG&WbsrM4W-Kf z#mnwRvd~7WIy~(sug`})Jp@f&ywbsrS%vBk3$xESM-#JKm|AWPM^6f>6vWGFV~FC& zo6L$a8!V!+?_zN2P4v=9i|Z6IazhwV3V-vp1pY4_1SPv({oI>>N)_Loyo)W(l78;5 z8Z2pt6pqba<^EasJpU{FGkx{yoc@v|eX;>}L=Pv! zHf~aJ;7~fRi&yEOZX8CZN{*2R@IozJ9F*moXP1dhlJ#q0!gHzb8D2D3%K>Gh; z?DJlS)<)!oG@$AX{5o=&^?!s=|HIk)Ur%m1dzT;iV27bfb2)B_|H}|ttRR%SbMg&g z-+xr~zx1lcB_{S*B5)~!KEpnv(BL52e^HRoL^kaj!1%ZEW|-)5E zdzwe&Xvd9L(I(uE6RH+PjZ$koXmG2EDE8w5CwFhV||{ek^drfkv( zOO$6Sz6JdK=HRChY5>vFPN5b6$#C<%her0sh@-`uDNdlYu?6{$_+7{of@EwEv$GFM zEdzp8G|TBSew)@Rk5+N&9F42MlWYx?t%dy=y?6MbqI^fNQKUV53u$Gq${CsvX{yf! zviDu_VWcH3zhZ^xUNAOwyt;_T>p9kyE!!JA%XD_zHljZl^?o;a~`;|NeCeZGLk!T2m-#y@q$d3^7`JG~?kFR$^q7vvOqII^* z_>{3k!4p1lZhlU_D`46M)cj_q|L`oo0@BYn-uBe500qn?=Rfb4OmIidxhC6xiTK}6 z;uFVZidKFfTo0DfAPfYYfar!_xrG23teCpwXM;BMBB}!^}ybt}I)0DFA*^WtbmetChs*DBBN=01e?OML&$I9E`#vaf1L*eXQf z3m?aI)=2knE0T($9lk4)iX3c@s(1-pUTm4o|28WOm}OwBdYp?)z_diOnJ;ax|X0`jbuQXLSXr%@m-{x!Ju+aypL5RhD-V`jO?Z+=%+v~-2= zX{X{L(;qLhq2;K|%jhNb5Obub;r}wUT&we=X;9!iIx*8$Ny%h|)khI!QzhBuVsh=5 z;M0i9{SZ30HYuVfZJM~g9^oOM>Kt`$D?Ys=2v|JHx1@d3hDzE}qxq&Abl1Ff#z6nH zGQG9bjU(-ulQm@vk?qQK26&nGNv3Qh0M3I~hW3}FB6d1ueh^_d3Jm44**jQ(40JbJ zNGn;yf>l;|5p^c(xeC!XY}>WEM~&J?>;SyV7z;SoOL2}TqsD<cZW>>%}{}5j zgX)N+mZRksiCC|%59IP+`$!=+T)JQNcpn3?ygU+$vi~z+iztn0d73=vhHD$KMUc$p z1+2r5gN@bnaj73{Rn`KyGw8O72hHk}-JCMjy3KMqXdLS;hDSijC#54T+td;}&e<1PmN@tXEd%%f9$i%Y2@``&OVK2(TT?w9TNLZALeb!+ zma!;SZ@s|X51r&#uO8>DqmOdvXNB0uYeNibT4xj)CuitpEJAG)UHJ@!o5Tw8>Tkr8 zz+qqKIYZsPHU71Yz4fhR-^OlqbXR|)feIp`;s9Q40whD!KR<^)MY)2eFY^Ar`-~fz zi!3TFB@P@K2=EeRUU{2zH0MgVS7zqwc23IhED25KoDVmr^h4;GaY+Fza3t_;Xd)cX0ng7sVj7MA zCBIp^i|^`8N`yQnsg7XqZ&06QHMvqDLp~!M*9fkr6U_ zQGkQbAKtdq1Bm5@H6YQAY&I|QcyiR#d5p4f)e|nAeNfI5R02z5z@>7MlJiH=Zyy}4 zM<2E+>jzi34b4~D^x`U0`xmIUTuP4Wlr-YL17wMw6sUaBuCFjZQgY7X9obb;&q(HC zn1s|dICUUps$5!dE_oCwiT0IIOnZAnP4xQ;t3zHq}@G6rB z{}L8?0~gm`^M_p@kE{M|yxUM;CpWc+m2uAbFWuX<&!saq3R}vW55L;AhB%ifuzlYkp_6 zmW7`$fVp92iLgc%rk*|QL*c)a1hb?cOP$`GJJdXHi^&2@M$|q3Xz#TK_Lk?z58n

)-`~4#@=uVlo2P<$3 zQ1r&L+6qMJFNc!4sgU9QjsrTkI@Dc_cr&ZYX0K=_d!UJMmoUZkKSC>8mGbfE!3+O< zn>904KRdaVct4=bxq$anuMC3nZ0_9(*33+UyTN-Lvky>H*RPoo%+S(5?&+&uPJY>V zDoL(Wx9*CuZzX@;D8{}{^!g=;p0ymbIgQ+{oEe$!yTdUTA)Z+@BRjk^B`0jU#j!jR zF&Dy}Zzv)n94fAY>E$ng9Akw=3fKNK1J`C0tDSm1`wa-dRT7L`PkW!we6 zajLIHRHQSYY&P8&KXPe4y#(2h%A<@ELTo>~D7D3ZJhT64+RX)x$KOl|im+CaI7FKT zFgW>bM}D6x!$uTW96&K_GMe70!Cg>UXjnF%T!3;@=}`vLeY~@WgO-Id6^g0{!&lA% zWqgPKmfilv`Xn?Nxv%ev z*I&M)TD=bUN5#kH^3sPJzdCD`2*nKkKE+P3wwHtPKKBQzPP%{9bNBJp6XYO z(FnafT66$EKl7ctPSx``!!PLX`+6knmxwK@Z0BI*2=uj!_GHCXbtb-b!In9b^pUH-qzumF0e%5@2UZxG#gcu zan8}7e(z$aWC@}GTRziC45wA=sl|-H$9sDMLZw+|Jbr{?Bp>CZK^Cw@ z6b>rV>zv~kGJ-1}F_wAW=^DN6|Dx?J=h*_ht9we8*_z&JFSu%%QL=*`>6G zmh;PG`t82CFwI_d*L~o8*+2I8p|z}P?uLmT={M&8&yh@p2~Y=dQ8`tg@`2+QR@T13 zQHHRlx#3S2lNo#!|6Qx!#Q0_|G#e^Gz@oMqa(5PxtEv^KPnXwpFi?EA$7iJeys23d z|7c|~jjN>|UJ7XwF?<5gjo*5}1{$)~85SLMe<;Cot-$smfj!WOgSVi=7!Ru!uMqC6+$kG=wOAlW>ttiyqfPTaRhU4Ogu*Fr&fC4L^BjgRv zZO#uOE;~Ddl5%7aU5YxUu^}X+Z7{Gr7JXrM?RUC7B5Se3)=(h}*=lZi?M$$9x;;Mn z(i5J)%+OuMaJwuuN!QaJa;^P_7w7{kTzbc+A0Qb1pHUwW(Bt`$gs6?Z2cB;>P_6m& z*M$zebIHqenoUyr^I?C)v!6U{G5K~}{ zge2+Tp@xrdD;`b>8D@NNho8`3x5zRGygXtxLiH)SWx4U4dK8{eSUhMZbj{x~F)=N= z@1$v>RRxp5k!LTEio_18L&sX(eI?)hGhN)^b<0Y(IOwbOWgxz|T}LEWDqbN=7?u%6 zBc<;pbo26ZDM)SR7O6xOe0&7Tv>W}U6W_0u4aF;*mM<4!p?^~IX${qTuOq%S6t7rm zC{`*i2}CWb@z9r+Z+L~M0bm88W&t_Kwh2UfZ-o{d=p(SQ7?lDz*QCYrYv>S8Fd61o z+wDG~woc4AOUNr@qR;{>;4$27g_zjU<>=W}5#*saaPnY;Hi6K8qd@+*%;ZhvC{!?6 zhlr$WCCPQX0WrF0!}EA>THLt9Z@-fR4t~I$4ZicaLy(R}`RMBvoF-W4E_X-s)8HP( z`$qmz{bEX3&ekYZ5OA&gld25L(`Vw1qDcT40G*Dg>EjL5Qm7O?1FEup+^cfa$*AD#`ol1TysC?6d_xiofHv@$MHI+te&;U|?#0MU7 zLG*w`uO-*RW7(kC?F)C*h3h$5Ap8P3;eyHN*h5@eLR9PWn49~o;q+(fbRN=3f#=Qz zE@m&b9l0hu-bGCvN|r?8d8yK^JQQW(iXIIr7bxYvZE0pjhMqzt<_x3YO zu32Y#&*5*e=`vd$Dtp==f&>#J!Eh(IIkMu2LN-1uO`1`jDzu=lBk50J?Rc`_;D2`_ z_z(IY3h~Hyxf1xi1s_OmNL!lpeph|!FGdahY@1uWmqG*B4P;K&5p2Fl?@BY>I5S&?FX}vVFd+X*nWknE}?gqbKw=XMtlsbQp z0yr6vA4nQVWi!0ckBv1aqbztLv_jgYs(RC4b`v)G$i46;M=vVbbP()z*=@2YQ8e0*Y2fPibN0<~A_8njS@`k~mI z<`@6X`{1G5wPVo6s#>UrB>mQESHj*dhX>=>v5wX9JxTVXa^(qQt%4)bvHVfY8&86b zOLjd2`TuH(xL`jSs~)&eZK5w`lBEmJ{#HMPCy(O3)wyhU&g42v5 z#*y^7EkKB3MJS&9(>l>JZn4C4_q5(LYc(Q5udz%ohKThTkhkzdu~yWPT?n=NzGQ%S zm3xfa{Wk?v_FD3zCz9Mk_#q_rd`tDG0lZQ>__I8Tn2Q2$O(_-4h`y%_uhm3dBWa4^ zJQl*|VGd~J&9fWb^(5n0Z((uvx2|((I+>`0yarJTc>&;Z&Ofz(Mv=i%a8 zs#PI`rf}~CwRMXbvYImL{A2O`y64xbrJdr5#DVf_-*T(tE~lJ+5ucD*EbE|lKHIW+ zq-*-4y5MK`u8xPAkqgJ?y*_Gd4!>zvs0_zzC&WG)!@*1Ks*6cn{j;&b!pVpC#J*2{ zQuxWu{HG=Zv33OQ;5Epi4-uj5*k;P=f=TqT9X{@I1^jb`{8~|QK_Y0#g47|6TI6(I z*{^^m@AECfoMtt-L^=N%I4IezqMt3&EH6*C96h>i z|9fUe`b8v+O3u{TMKLbkSq!t%cld>-rGX!QKwiw_5f!&4uJ#z`f*{5Fc0&~&wVJ8l zk5L_m4ORqts%Ca(3~v@12jCs}f&eQ8(nqCn^4%^uuUN9K;oxyMbq=FJ>YTXa2-u9( z0OGRjE_<&uhNlvOu)Lxcy>I!Ia_?Ew2U@x%Xh@7d#WZ)MQ1S^cr zY^@?plD;T|8|v^%H3}lyDOYTI6{bc}st!Njtkwg5%PT#i2Pw<>DilXvU3vJ8W_!KN zoAclHB6*EpHiC&%U(6slFJ_PppARU28>GpBNLswUd$zTf8RP<`S|ZhbW^bVwN7vEb zPg(MGpyhRH!=$awjA1l`Rs2*CSq;f6>BTs8b?}`*mxRj<@_}qKx9$xQmx@aSr$cMS zmQLRd%#+W(xd$d1z?N(I7Ss5ZCU^xxRA;+^1yd+i2EM+87XD_{uTR+55Md2~k#267 ztXs)}uyX5?odwZL-Hs*3X^jil>Z zO@_z6%_qxVr+zL{EX-?Cgdnk{us@j%AN`5*0%xLrxAZXi(6PTcH zP76;~c!K6+MUhbQ`gL>N`xA1#YB5}x4NI?zr6ge|_U4f;30roc%p#*VN0vl*vUBo8 zqt` z-Vq(w(@Oqn1y_4W_e^G25Btrra-=W{Ac>wR=${xJS%8aj5?j6j8H5ku7Y23)X7J3K zccA&ClsGeJ{<1fc80CH}WnI`>R!h11@onjwueGY9wyFMB3-$wkf)kRWPSUYLX4@`a zx-a*+Df$%Gk1t*g$_%%_w4f#(cRSY?Hdb-2`#-bw@jq^1&E5YNjcQ8* zMzkpdj@lO;#dM0zU9Q>1cVYu*4EVqT;P`O?KHTa4JU~*)4;F3D@s&a=T&5toU-!&v zO5TR&MMvj0LdaHf1bM>y^VHPBq85Ha^+W^aho<3AB#$?Lf3=0l*#53Sm#mr-3P`D)<;L4hD#J9W6DXK^>~;ZRZL}A#vSo$^=h=Sh{3N_(A{0 zB|!F_f2TIuY@2_T^~u5=kkZHCh6Olb0=_N8C3C=Zdo~o;&-L>ioNUM>Skgw9uNPwebXVClpD3PsEZnm@%qb@ni{OTmRW`Q8 z`YPyk#PrqVw^dwBWwI%toB=3$02djr&L+0OlBXiWY2|_?NrD=QO5ILIi8I^{*|Z|hcizCN^ckkf>qJgOsELGo0++@ zMX(W|5m^ez@o~*%O%7L77HgCZOieTX;hx|j7#5s>M^{Xxy!kH&|n<)e?7 zz^z?QjYk0e(`Rs=48)2XOx6Tdl%v*yAcDe<2UsBB7(DxyVJ7*Qv4&%#azLS}gM)An z`<^5oWm=duh)Y=lH=jd=I%Aaz{uCUSi$`#ACcf?q+lLM`|BP(F0yrxC|KyYw3Px&&r%D+Y1)a%MPIR(AYtlfnWJv%aHq#*Wy;wF51b=`L6l~NM!ujq-*@H+ z^Vm6!BHeBSrOjxXNOHi~ihwF5V_) z=YyuqTeu&`WBC_9k;$%HrzN$D@T4n;TUZCi%)e`QwJ8#MADCEi~$ zu*iGMWNw}g6UmWuP~YofCEs&HK7PV08kC_WH0>>B_Q#5mo|jh3GRjza9Y%b1sKg?q_QT-5mWi^a}W76KzHBXm9c8vzx3ZiA(P$;L*4pcmedE?{9Y zxK&CRPytifNM)PtS((f;^#0aPuh|8;{rQRag(``_WmW|pJuE9b zKo?_!9c(UK_FL%#CD#}H;`Y3w*-YmPqEjjASXdy$rdRDDc3t#4+ZxW%Zgc=RmZdVF zc8)SYY$w{Ng2xDc8|9d;uQ}Tm3_{TZ!~Q(iP=B6hzBpVK(tDam(Z;C$u)gKQ$9kdE zvB$5DcS-5ta_}Ynv5$;4N8hNcu@#Xyt9>!%-J~zySCm3xjg*nEsASeh%=a8q4vpm% zfif%!VS!nO?MBKS;v5ck4vcwySoI=+H9a1i$_iz;>ubn@F@CI*3j=R+LTJqP$qd`n8# zum>@|IMm*jTaL0&>t+)1sUq95svV;n14t?;ccE=YXtGZitbQKA)mRzO%}1qJJ-(~q z-HA3OCw(&8wN=-E!Sz%h>O2)$m-irobNT+;%y1VsqSaxX-Lv&;xjZ{N^>@=T;5!2v z{eHJ((AHM<=Fh9D=>5qfaH(_qjW13#p)cANxGYpawXI-A{lT0YC5*JBGbGqR)0D#s zIGo2XX)n>h>;*KMZd>}FF2E(rX+bR;@D(1nD0oe$y99!f`sH3F8JH25A&zzrc5h9n zy|QtnrpG`H=q)bo5kVS76R0cp=m@Puz~780H_SREyVC zRt^NILKi1bkxSCYp&`B)s=Rgk2*xWd=LjZV9^$e(Awxc`cJLOAmQ}cG@vr5-dq@;OV+xwn>A91;uO%tAZ(BX%`+V#7 zAvSu;?bFDNMP6#O81Xe{-zDOd{+_H^-6M%Zna;~c=cbK0<+O{`!m5IVDGvH6h4NL8 zFxU_H4cIY2Yx-XK3Nu*T=i28$um>BBKX6A=8||>Sw%N|D_loD_bc~FymQII{r;od|SHXaK#zlNf8fZ+V+Or zpzKe86CLci={~Q194IqjFBJjie$wYV>E3oo|D-o6Dlb%`v?%HpXS>sm(C@ooa zt?n2n=}4*o=cWw=byk8=bHt=sV6Hn(_M|JxTHJDdp%q!W1QMjkXI(} zXRY$~r2?aM#UD(&Pt!A=JP%p5d4ni>Lz$Ej*SRszsinl7y0nnZhH@PGc0sxELI5n)s3{OV1W%mb9S*xm&RrL5w@(JZ#NM4#bf zJ!I9GF(aI!IQx>dHP~QV^{_yjr;Qe8^h$XLVvDEhQ;ZYpc;j^BhIBx6os)6h)q17> zE~ehG-wp5u-M39wrUO`ph2LgSoKkG)u()amc}AS%*^<}plhzt2x}=&U!bf+(X9{Og z_+lQj)WtZn_Q$rwLj}B~`|^AwMaY_@qQTk@=3ED~4`=1`n26b&Esab5upK!x0owAg z>~9$;)01u%%k!j5?ItpVQMm^)OByk|FkSS>CFsk~x$ZkNzuV=23i=smr^vEkP3NAB zmg-p2+r)_t77L}fXU(I+>+liG9L(_aG~uYbjvpu2ESZ^p>3u(wFnb{I;%de8s`247 ziam)J6sIZ?TK|>5nuZf$AI7@+>K6YL4;?=S+8N$JsY|Ja-x-pSmcV&IN+jfr!s^Y3v}8e^3k9Gw)&uRgBBSv{~}$TCH2 zpyDpv4BV&B9>+_xd-XK>2v7R{M^M``FSFyrYoa!lJ5zji6me9o zC`sbQYdg!p@(PX(b@*2Iz4RuZj>;5InmIvDsMpl5X#S_ zRue+fYC?sjkW{=D^JAK7A+SpU`h%g=*$mi@|TDfjd`9(--QPruL zlI4kAi$%Z*6yVO{K9ZJhduYjxcqfEj=6ka^8B+3aTm;DnpaqVGew=)ep|l-T%nj^= zW+}?&TK0fKI9!qYH5s@-*%`_syjc@q)E@BRs<=+Er-q(P$4|1|mA?3${}&!#X`!%;mGZOb zN)~j5JNm#j=`IXc@O@{=NnGF}0nmd_^2Mb)`TaT(ux8BDtnW=LE?c)OQbR+-b2iC$ zHA$i)I##DY1|n^)Hh3w^#dLq1o1zHushlm2cO-^Ai~bxIYlmK(19qRItof6zyX40} zlwd6kWFj(KQs1Yi61gX;zj{z97z39g>z&dZmt>(Tr_F=Z-)$X(Dc-XY1!0M*xGp_xrGo z3f<}vBf%aj_i-D)=s_!Cd)1h~ zL5Z$(=6rzm;Lyb z{9j0|e*1Ws+8QA%uK4sdcZYw1Ft?IJCpq6w`auDOo}yrkzo&p@kRS`}k`X7x;)$H6 z*EAkq^9e{8mqGX$e#Fpwsy%juC!E2Xk2haA0joq(26{|7 z)6vK49}&!}P^|@WkQ42xdRKeOW!*8{J_ZWx*#yX_2_M8YB`7Kmit9QKf&LVi#cK_u zb@+C~x+n0-egO4l;&4aVVz(KY^h0oR*ZbAkFr&1_?}fhnbkAdtl0mk+#qP!;37cj4 zL!C<>2~wXHXt-`Gpi5xZ*ni2qlWuh+7~us6J6BbryC&CC5ey_#G+P=FW@ ztl8lXxz<0nVX>0#TpTC^z51MGzKMkXWpl#941Eznw|S+vOIE`Jc_4`4=lcg34LU;b zm_VkZ9Tz`h$TdkvV|%?=KLLo3QL-m}vMS)W*k*2dm*<|tp@rGxmVq0wbkFbyfu3aw zcdqm&a#f$KnNqCT1df?93kCU_lcCP9vu<7vFBHU#T*!kdIWO`}3%EH##H6eoqh46P?qOJMIjjzh1R^WARHy zzB#^?i#Xd>Opko;b_>?$Cjc13x9t&z)G?wG^F!BuZw(YdaLXCyzRWbuK?lj#<6AiXbP*LPrs+;FWsB1iqEmpYO-?&8u99o<%-m@Tw~;1B&;aD`&01+3K3m53RIMBP%uaku+A{H* zkarpDy!SLRwSh>Y=r(j#GJVoFQ{l;O&D*wM<+0Hk&-a}oO803uA}K{v$1x#5F)D`J zpyaRy{WcIy2TlgXIaMjwzk~0(|4ab?8-HF*3Cgp_Fe=6NCtAFSa^M9~2 z6r0$8Vq?6~2)=s^8=4{~u7(jlv8<5Qx6aaCUGOskb;*#@hnG3z?T)>y!erKmlOZsR z3|?3)9k-;9H6EOtlu&wz(5_P7YZ*L(s7spZ$bAKUty|z0jt@yy#*HigYgZI@-v-*| z!ryzQR!Q&#ylHU)IbToUlC4!&7m2Rcrm4ZUhYs07Sf?mxv8P8Y+ z$k4wmhvtA%Bo5!VmYK|;Y_r*DzF-r)4fyl5-s+J60e{7?dzjk`qOc>Cvr1RnywaF~>lk#Z~zuJ*64yP4oDTUVCy`)_Vn zwcwECTlCa`J`qjknzjTs=mmdJ9D zvqG*aI!&fYOFR>s>F98o4YK8i&(MANC20cKJ`vYOdN1v57}Y}#NtA$(Q(K~c*P=j0 z;$e^%Q3KcMQ;T9u@^}A-qw3h3PEaKBug;;c%2^i_GafJG?V#HTr6+_ay#UmFSN|AD zj42XE+gX1>AiHGhEmq5{4sgO<+;0^Q$KkF^Vt)cua^uRFKE2hwSOSM9SAZcQwRboUg&%dl$x8zop)^LadhrE4pegrTR}rAJq`7E zf;DduQQfmfd%_UPc91iIp;@x?IY&wt!jZH^=jke2d7xPso0v4&PJ~)J+IFAK*k=|T z9FD3*O9T%ivM?#eE3^LMGQ7lLlDADk?$Xh8RBR-niu}E&5X6sW&n||2Bt!z)Oxc8z z>?y=DVWN(ujS@(nO|zUkmvY2!iNvCW$RUF(rjcop|ph@A0K^ByFR<=?((;@lA(O0 zxZ{=}g@QPl=5pU;CF7hux@R8CnXxn`XtI&uT1*s-^PLYyXSmxQ9j}ETG}e!ZNRV0vu7RoZcRHqE`{MV)wpznoYe=UOEvFpsnDQfNXe5@Y za9%xo+|}e+Sl@&Tx|fStD23ZD`n+)+}dI5>NaDSnY-1-{nAj3=t=u&qX-KEg|>*^Gt3udStW z5M=SWGQu5xFq|*8TwR}i-M2UMM&!b|k4@-Xf6uMevJE2l0_QQ>j5B>*@%+dK?m2`% zW2(GNsf*DEC|Xl(b^28eeTc-uQ3%>|hnHK13$UXqBpFRE!0aI!CNg%qDOxgm-TUR} zY;pkik|08mv7h`jfc<8SS!Q25vr=l~{EJ|V0)-L?-KQ_lV!bI zaKGTmfJsEr%yS^dyl^ndzRn(|2Dg)(P$G(SD(jP*E-W=nU^wbC@xX}6B(yc9->}vYn3c{qR41%#naute!JQL}6r& zf3{f*38?7ctfEiXNeaq~`!Mzl)mTHI3B&0>bL3iSrO zIVM%ed8x$L*S2#*FSP)Lr$b;-5)_k0@D{~|EF*R{O6_HtJI{6?AnZ6R{Xsg zI}zxD2#s{}sR|+i(H_tY4FC$v5K#Z_`_gobS~mWm&Pa!kPY1^QZk^&Vc0A&MuN2P5 zi63}zNC^VNk~flavMco>X;i(a<^dU|`?UgR^MlFs?%KiDgRg4FM(2sBQ*P%AsLITD z2$GHIZ3%1gSV7sWUBY>1{iMF?KKF;5!+_4oxHFPgO(f{E=&(CRKKw(OMkQ?De!hwt z)bUr2NE$z(!2~Ly;n6~AUao#;Btrc#ZPSb#SqahEnPDy9FTsrCa&)Q<4iE^= zmrvKlU2|f%JDrOWBS~p(`B}Q*WW{lYM>HaqW?Ri|C|wqMNO)z-M`FEbz`wH(KAF9E zk(H@czYLDP629qe91V7eqDa} zz)e2|2?V8lGv3kEY9~T9PxG04up-V>EEaf}aCrrZZu@$$0WI?F_s%;L+1TaLUN=`D zBYP@&;c5j}#cni+GEA6HwgAzlRwYqY&&X^#`Jjzh+Fe`pDeiupM@Q>=ZP0n*PHyfP zWpZaQPq=?yX$EzDevUWBGG@4fJlLcS&-fl!7n8F5_c_WA9sH9S1$sQ=mNACXhVkqF z;bZ~+Z>Ws?dXpAhs06#byj-AO2|8-nKmlB|B!JCSIX86IrT70dRGXVZ;C}{*5_%C) zp5UHVHN{&VaQ8OIpV2*D*kxBf1R?Glry)nYhL2D5Q2@Ux`Z)lee3v2mV5FxGCF z1;b&H_{-(#Yxke3GxZA+#EcO0l9B6Z`TxU`&9|gK_EYSQiFx}uF`|0nM)r5;R+&pN zkhZ;+m;%uX+5*yz+CGZj7o`27`6nKI?K7yKzlnp>9o*Ylq89{O;Xf(AfT+g9vRz(Q zoc(ro23J+^t)*#iW%PKWt1rezf|clmI*S0nxeavwi8J(C7f)60{rv91Df^rcxQ3=B z;PqKJb=9C!gVdwzQ$kS%)dSXK{iOF!@z`l$Z*5yK6V#*`aSopCS z5wdXqdarQSNS2Srb#>B-3C7hjq{srW8=)`xyhRn-YE@{IVs{%pm74Bp;A|Pn5c_k6 zm5LbIu_+X_s@#j)NgYf#92s{%86Oci1yCt4>I#zY=r2 z(vOLNj|GAMPpE?PJ84mxW?o(iP)ja=kevF)1fDu>WsJkd{uMoGllY(DqnjmXgl#f% zTUa+|50iG(Ih(FczsFz_z|JJKyb(o0>o-;@_ts;J-?|ES#5{Ac?OmheA8XA`)&+oaqEJZE4C7PANAhw zW1_eP{>!IS26Tv2C2tNS4scb$N%5n8I`ROl`aJMXA1wjQGDI)Yu>0x@J#palUXMk*!cDg%4~cD@s_mLaGS@zr2j*u zj~oL;PnEF3Vi6~;=%ADLgW8&#zFr`nWdbl$?bdAyA-w%~Txq@PxG5roM;Ot1`{m!A znWw(?4s&*$1Zp5yC&$RI_pi=n8J&!v?>>f?sZFD`RN1{u&wxs0fPk10E1K*0iG zru`$`(P!3ZB+t}$f@F!?29G^JtDAI?T0MReX&=h?%MT%JO1Dh#zm44{cYpu((f|UN zv#Anj{AI~<_(Z>7KX?@vo0~eX;no0Uw}xN{5-=8!4QS>(&T{slrF<2x zykxQbF#nQZMZ1NhkmT;Mj00Nh=^6Ip`F zO0q(h6ZT7{ZX_yl`Gn6GxfTK}7zVsixj%XS+(XZC9}#59k@1!yKUnN5_vX*A<@VNa zvW3+4*RXj?0#8PV@**3`k`VgW{9e$x?tQ7R_Mguxy(&LQ2qdZcClsve_;MT}0ahB1 z*L~#UzI5q!N8d{>w+8z*Kh4a5sYD=ErfypNz@7N=bSgk$ML$qtc^X(cD21eHy6tws z3V96-GHY37$0&}{fhDpmb9X!tKUY71WqEVDg7N|XC5e;1(M~K5uKQO36-dDX`aN*+ z;RToB;o(R9wB~Mbl8wKu1}3;WS`lUgm4xJ%nj|n+jHQ1vN}8WqUbsP*WFUA@=*+U4 z*$$9I_>hDXS#k8c#>`4MA1ZV{VgIY>$0>a}N)MkQ=Z*r6i}%c~_;Rw%0cf=inN&O? z!4TodZ*4NsP{@sf%o_?rfVWr*>nPFa#{ieRqO4BF>xCk$FDF|ml_0)Xx)zY%N)P8e z5fshUc1I@pwZatvG;y9@-azlg|6J*cbCN`b$3G=TONgcIV~u03f#!*k6-w8(V?o>p zl*_iI-j*Zz^|=`(VvB_L-YNb+C^AIl=a6U;MjzI*Q>=+U`ZHkK7U*!l9O+Yaye?uZ zah2-8^4Jpf;r#W1BC}SRa)YEs6<)f;Xxs4K>c^?ZOTyszl_tUR2cyEI`}OvVjfDGX zsUCyI{cp5*GxmItVPqdR-33+Qrna;Z;*B`+9m~{_on)?KstuNkLPW@(7kr`}I2J$*BW38C?I0>i#fz}s`I6T? zqpzFP{%$K~?1ufu&V%O0?9r`{Y>nPGQc69b=ZAbJFC)$d#^(YwA<+MfB?{nqB9X&7KL!4;tq&o&a#yJ15Rx`{+!`#mapmO!K;WyXh=;}O15iu+~k>98k~ zpUX>BZ&NNvO2BN^@vZP@H+x40fwX=Dw~F=#l;r|kqF^Xwu>#(&0WD`$+5ip`jxRFb zcZ;7et4EO;52Q&%R27; zOl($zICm(*V6i9y#5jbA_iG-~GHeky?Z{Pa{12jyMI#3IXnlz(26t!sm^O58vDJi>u!B#_qA| znQwUYo3Gv%ex~}2{P8SgQKxrGu_d#N6&_SN!`O+~G~GQo{L#HcmX$wQd%@ zaSAa*$f4pSQx`;F#QTlnSuvUnyP7zXYFt46bc2rvor~|sZ>HS5CTgp>S{&%883u*N zhAmGF6*@I5vIjyIZi>fWLQ24tskkNwfkSU}xU9D<02gA=feThoEXR=mIM;s00+`Sk zT~QNkAK~KvJYlN%@cWUrFNCPrZ!o)_Yp_LmVH%MpMDfNeY}I?uCbdA*6!V4pvK0hN zy$~BtsAaX*KQF)CGVWuREPsPOzJG?F_8I9UMn3M}Vx+yf8T&kictiN-Nd+eI!dX4T zll1kY#riUDTjw2ehQ6yD>{O{1vMR8q9o2z4a{Syj-0&w-~ zHrcr^vhbrhnve4*Z70a8qd$U51v&da78A0XNH< zpQo5`(&w@5{dF6h#VjkO`|k7 zmWl0I{?5y7&zZwxVO%QhgaqJ;oyU`L$_t+z)0(#>K`W(ONFsOs??Z>p1HL5tV(I8E zJkh!FPY|&`$DX6;FG;8=DwhWia^_5?huW@pFVe#GlpREBX&uY*3RqpX^z^dDs}PKgoa`cO=7y(<_beo% z-4o}0>gIimLL`_`9&dT)M%fo_o#U$AmK63gY@_mQ!ON`{FT^$9ReXBVv%+qhsAQB2 zkp(xN6rtlwrSe#QmTtGbmln}B(`?~zZHhul}z zYS#16qY_cze(eg5ys_j=BibZp13wp{d3WdNuJ#bY$RgGNEUtvQ0WFNE!D3eXPon8K zA{66fj5zex>_Q)xA%#g?t|6f!%RtHsuA6Y%V4=k9*HS{jgVY({{p%0wR_sEFF8v#~ z4e~YnbmbyrnPGU-lce#r0rUcv)?=i;4_VW2+^7z1wKA1yPgqQ-?$FQ0)a=jad zPCg`-k>_uTa=c0V&L+N9ue{P#htgYcpc^h(>zfB3@TsTt;C%@lf&*3yy`*|e4J0_C z2JQFtxMP5bFuf64l}mUXfZDjbrk5C@`?lSQ zto<@zm{$f;BRSuz5iAx1Tu)24-g>A!UZ2aAV(#K#XTGvw z9N3gnH4;hTyx`YY@`7_kBze*hYKsH`Te=D1ZxyzY);3u{N#J_e0Xj({4S;dWfG)4- z(vD%!E0rS-XnG7&eYa7x8Z&(VBLhr+gpU&%M006Dj<*(Hf90z(wZx|fc78erDhb%j z5ooGh$p*^Hl3$RrH&AjIc{yyqNDq?}EEqYoH7!GP+polO-RqlWDlrF!V0-6a*sIrl z2fWS=(HoVzICo|(kjRAC_cUMrVQf4mHJ?ukvS!Jl+IPJw^iOeBGJLGjzM-bQEpJjriiEowqmown zVr*jnSu``BQfF)((>ln2;sG7IjD+*oW*yvf3KhF5&KUE6tVYR&=p;yT+>}EIHCsM4 zkI`i6zL8yN#fG!h(T5S+9o@^?$7q1iEP4=EWRF(JgtY|6e9h>e=9a2gE(WtCkX|HSfpzxg( z&*;`}BX z<1)|ixkJX1xR$`LaaHuTdas+3B+fOXh{Y(%`pLqD;soOMB7CREGl)7U<#(lV!Ka+b zeGr46<0aL++e=-O^^pCK?<|}h7>y%!Q&rU2t4^tI;pWN?OD0$5!%y6XJY7}P@^V}W z*jjbQcr)~yc#&`EweCvS(&-9{zbqGZB0~R$#NKt z+f|mA?Z74Xe*NVFe85eUe_r9LMNQ|rAC@Vl3DsmiqJO_ljK^1kTU5;bk5W=*$t?Hx zW|?CH`Y7FQU^?Cjo_HBJ=eHQhu)YPn^gYTV&T&KT5~3!?!*R}26@WuX zn-&D4BEtSdz~@&jCwrrV1FGssl(^_D8qxtf%$tyDuS5sChuE8MBq4rPw9+V#hLvjX zn-XFi`>SJ7ec3LqzdAa_w zhUu3>&(^60GTQ%IK=I5`R-mZ;Zo}p&n1MMU2Mx#{X6tW|dRc)@ImH4ZjS_Lexd_$q z*g&HP|3fBj7MTyQD`z;5y)wO&wvek|L3B>Dm6^{8*s-%+Uizu8V|zA|Cgs-YD0+Ao zDcS_erww9FTf0y3?y!K14j3s(!~)5fYRm{JcM%qSet(;-Yjm2w#YO2;0Y^#@Y@X(=Pz!l9Gyr_pD{Jyw;k!SlPJ(_(NVLTn z3?6BxzgycvT_LatrjMV`^yIWP_Okzov~PFgC$#%6Cdj7cn`Pw~4hj(XC_tvRU5xSG z>my%Q*f1ayya>qC|0bfr(z9S`@|FfVq)iSatg`wJ_%wCu291hL{&e6lAX=9nMSg=S z;I9gqoB4z^jq|Q7dbj{!7I+~7m5`gABlQXc*T%O4siCh%ijTn+;YRsT&Gat~} ztX%0M#Aagi3;KPUSbBmuT}Sb{*rv5!^mVGGzj6HUIHovzV^r3*(qNp`*Ey zt}Cc;8izb7ypZayH8a4i8}0p{yIMt~UT!$lA-I~E-OL8=IIp{&16;fK z%;qg-@u5k$A{_I@k}TF{wZ(IL3->G(y-RWWmpR3I!e5k^jBuLBEp3iBpQ`#O-}uZg z8D5>GKfW^3x%nJ44{)k=W8Qk42#DW`g6D1i-V~Wl81w&bsl;E~Bw%y-6^>6tb)hw~}KHL_!Mash0J@`*#GG?PkHBD!s=uTarKdwkfX|9i-}2h{+Pv z9@~*_*ELJXzNtFE&{vvzEXXo3ZyOQb$W@yX6=U%Iz4Aols7@WEg{7b002 zAz=k%lu#<`H^c3H z60@EvC=Z#8sR*4QCV9A>sxre#Td>Fi?A?TqpvnplSUS$RA2Za=)zOiyQ46dD9wo>F zty-hAg()>oJJt8M%ZmdmUz&C8Zhj$#l$#%zm)`Tl+f!8-4z*UyBA?4EbUL$FEHe7i z5zjS^!0W%nl|)WknV?b7i(kC?YOOqk>4(*@=QcC3AmNY~i7s=6L=t4VdcUc{a4^xV z_0pM*;aQJ+3Q)tvUVO@Szxh}e!K7<&o*s%inc9n8QuWjnyQeVJLvJi$ObaMhJo}k< z3!YU!P#&SQLJ&-vJ>7q`qZowsefrm-f(?ye+9c7gAhjq)E@ZA zU2Ic@oOOeIlsli%V2YsbEc%k`$M!pBD%&`G;eDR`pgCR%pw<~Z+q3-1yHluzRtdz` zUN*~;93*uLw?6bB2$I~@FC)|T-HmNQP@xyE2rTs_U=4BZC&}&K1;~a>A{;%!yh0!S zsnL*W^baSVK>{y1elV_FwqCiljk45yhgYBPWosJ;5-vdnLH1RAW zBSz6kmG(bn?7>Tkn7v?KmG_xLuxY3qPfYklp|VV+0_rtWOnYwtYC{cgMQwOQw8r=Y zehgFlil;2Y#^{oVk_AYoJHwADP<#P$MzO_h2sOE^G^zzJqQPfGd&DS9zv{r3JWBFQ1lh*N-KZyut^RWH z)LG^;I7%Gly~lY{h;f4AgTZ*#6(aImYNoR|Oq#nP7OCHZg1Vj3t)IYlkkA1mM5K>p<>jDIuUwVGYUgT^^CTc810nyo(Ge$nk?G1l=htq38tJs0~)c z3K_N98&eB7pJ!&Jn_V}OLLkFAH@lo~7PKzXuDQ{RUV59k7PJNu4F+vW_4t^C4(dFe zkcOPlQ?+dM$=_V5RniL$u;97qHBu?P9-IY6Fn?l;qZ=93;TH(I5 zxWH<|mS=SCjRxC^(uznAfmJh0p&(lBHHWjTY0ZV(k<%{We{|4HTVT6j(>A!m;SLxp zgupC`ehs|cr5l4^b{cGyycv~Mbuc;~#_jIq;ai_dX3#QEJjE{N`Urb#?Ip@C1t*A) z;6CS9VI%`+pP<{_xL9@Z5|~-MPFlnL3)??p6_pZj` zoor5eZNq@^s7dX*ug$KBC`rb%rsLigc1n}qod$VrzFtm5HO160#isCx4)2&cDf@FW z$2F-1$^Z4tX=zKTHk8;3WN2rSihlbV zcV*mGEmi^HIrZRJ=M18$MYL>WO8ZtdXK_Lm{Pxjo*nD=2)?~pw1Gh%@o`@R)HO!$4 zyLcV*2|>!}C<6GGU}!`wkMFSE&tVa$nz%OS@l&(S!ryRxPO}los==B-1FZZjl-=U3 zH^Ib*<2sUp!^TYHT1~Y{14PYmrleUZeOKAx2)!Fy7Le1g5z1oZ$LHv6hxwPZlo-}- zON+J)vj1jz+1jB#yAWwXl!QRwl+#ZM6=t*SLi9-0y`lZHVBY*i7ueIaym03KVC>q| zM~$5e>4yk1svq9jdv9ZWV_J-cx(e|5f-9kY(7JwFeo)|UfmF)9sJL9K(PNzs9i)^_ zCoqX}nC5MlT*jWFC@)F8V6O3mA0 zX84}{g-oiSU>*CcEB=Y-i`Qfr?NDeU_GV+g5fzTp;&?$p(TGvaBrsGrN(^M2Fm_|P z8Wpll-yyj9Fm&)DMS)+D>r$LUQ&EVa^F8MylsnR zsWzdn`H!?|Ew9NCn8nlF}yazCEO73hJwdQSoF*)^32U^XxC-DQdaqrw^@;TQsmF0oq zk66z))D8eTj@j2%(T$ed4lEB{>v+8B8pT<|Y>=*;+uj9t3mL}s6K~iv6B9W3!&n(B zKQU0c5!1!YiQDA_wW0-=^p(!=f#xLNxc(~dwE+FUTV;}L477#DlPS?iei;_#G14>D Jt=D#l_!~jQHq!tA literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/alert-device-details.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-device-details.png new file mode 100644 index 0000000000000000000000000000000000000000..6791b18a417e5b63fd0a297d91d00e60a990ff66 GIT binary patch literal 35743 zcmeGDbx>SE7dD6!0RjX~Z~_5>yN3ix&|pCacX!trBm|dXaCc{LcL*Nb-Ga;D?z6-D z?pCeTZtYLLs{Lc9YUWHH3Yd2%`5=N&FC?zmj9z69dNCeB;a=YL>z{NHL8p;kAX7OK{UmV)p`FFoI# zx5@vRF9xQ={*8t5jhp^ykJ7g`LS0F)kzX>9rKX~y8i;tw%7H=3jtNhOHlaP@s(yT- ztZNZMYgg8th14}a-$3kMdYPi`A_h5uaYh`&vAv}}yXtgNAViFcc}+HSRI2a+GOe&2 zGdzA?ihN_}ZlkR!NT!@Ky3ha6+~V^!+lN0a3^>>RQN_~(w~lo`AoM%%J>tiTya`9V zrq?`&0cF>^z0i!hjVf|C&%w7XGiOpc1Lu43uQ=@L`Azz|8Qo29fYbHlIV7szYlUR& zwOQgSfGwaW%UW3W@d3PHmS#|;_zSrZ6I*$DPsIGIQ|-hd>O~+ahwqjsVtiD61K&2_ z+4N-D-j5D%qeEExz>*O1Nr$}v$cfxV0+Egp#mcb|*?7UP(B-zihwszV+S8|_$g3NR z^(0vpn)?aMZaKF%JvXYu!bN+_!AWzt%In6jytshe#mE}J@ z>oc1ZXXqe;`YxvNM??7M+Q^nr|r-7WNFoKXA+Siln_d4H$wH7W?1m%@gdn9aHAjxH42lwAEypRe5wjBP^*iBA}i#?ORG#& zy1)1ft`<8KuXa!N#-u<&mLFA#&-<}gBkb<@RwyQ3*(}s{Phv`blz_;~wN<>hnH{85 z|GKF$lr%$D^U{wHo3)&J+WJMczE#7=zjEef4#=&VHS} z4=b#8K+@5x)Ud&eJx~gE!NYN^#ZfqCoDo|6!=ds> zeL+ByviGNd2{zEhs#on4!p6K8qxk-rGJQC$`al2BnD(g+|7mFu{R|@bt92msetIM1 zSuIt+{4_2a$Zy)yp`=2n?eC8QeM%q5k9phVSX!5__Lf#lLkY7;WMHU}jnKrlFg;@DELiR}M|O>Y|73 z0l7aGT%|N+wfOt9-n6h1vhSbYzDqlhTfq7J7kv)V5aJR{_PZk-arsO6|Hr0d!~5l9 z<+OTu&V8!gG7Ni92w`a1B|$X*^$by#A;bu!<1Q01b389;$2TZkhznJaKKuVOo6SFY zBL;lQ_?`JIbI4)xF9}@OAnTS-oNTfkbxuI;=b>;C4W$}Rde$Vjp@u;D*3MUMEDQMW zdYgm0T{gz{UvQ~JtmH}}{N%U`p*s6Lj0$g^z+ii9#eB&t3YWaBIjo?Yl- z(7BDXaGLhzx!X$QoE*YRgen+g1dxM1iiI8`I^GSGp-HsqHn(We;YY|(-33K%9AK;xAYLSV|Y8R||>9En=XFqM-j zM@>AxUW96*j{>G0Noi0XY3Y@cjrZf{8n4_264r<_n_hzr4kM|5a}wdOl6pXkz(QLy zZo$Q;!J@P<4Or&Dj95Yx2JZd2rkGGxA7Vzw!CPlmeoRWkRMofpRDApMc-h)Ezr9BN{z;T! z*XfLL>Dt>6X-r;wLb+z#J`PMz^l?{P?S+2H+@2@0ASK)jy(&*VgWTBDWRDr z3%(Jg*dkV8?WPUL_{UpDES$kD3Aei?@})w0PmZwOOUh5XiabiBhd!3#s#nZen-A8oGUjVao8Kcwbj{jdQfcQQu&qv7BSB zR-|2@E+?i_^Muq2(0vi`?0R-h`|U}qm5a@&MAR%)_k?kD$XWF-c32njbQVZk{|uB@ zobp}Xt5dac_R%9NR{XMEOXqvd^R+cd7n1B}5fiK_>Lwb1*MOIu`7$KFuucO@v0XRv zB*crN*xg7fT>N+Q00$9E&|8TV5=wU0oppx4=a`g`DNZ^gQr-t^06wk$T9ERRd>+ay zad-geCkaf=0xKwo8rQQq-8_Nl_lj`hdD;Ud9wV8>_>UjTS|A>$R{DeH>^e6S3KjRM zjkuo0sg1AD$f@zf_>#e0l>zlRWb8?*JDq z`n|J{4?2P`!iJE}6!0%NCF!}wp@s9TR!{k2x$us`7rWC%WZ|FHn=pZHToTDmml7#e zrZ*TC<2`jY@`OGySB6b2s^s`Y7|=(O*r{Hdal0>DpKL`hq^k+d{r^I!#?L6Zf}!-5 zuWMP`I=8H%h!hr6%fH#wLRi9eyV74-NSPW0lP#c7;yu}7e@{8m85$QU?G*?LnXBet za2&SQ7`sZ2{XRPle0eq3$?zv+PbKUs70=ED|` zFsLAp#WY7_?E$Ur-@d<}ZFME|ApuuJ_U=Besm;X@g*&=*;>=het$-S%(z~|H!|ISU zFt!HwSEe=xa|}~xAn1T5zF~BCa@e7z4#E?~+T;o*J|b(6wXQ(J!PC>g{^kyzArFz{ zmY`a+ph^SpPfb&AI3yWEU{qsgrRJ+NW@;D5vTo?(6p}>pF4Aaos30sOw+qdZ#~VRs zi^LkcHk&_3%qKJ@Is_Vk(v@YA8ip*h=N(7#2Z&v(1!sIhR~CaIWy;lR@#amqZo;oH z#unlc8pFl)H$x9n*jkRLIi|3V#7c(@$;I;S8?jYA`ASdZY~{O^(6>?w_XVK1u$>DD zy!K9z9SvZ-Deld8fSbjtTJWy0W*Wu^nyq%~64JB>b-MpKH$#xGTUafG z@-!cTXP-TLEM*bW^r0~);-g6<9>rZ5>WB{U%A5(Bc3d`PCd9o`$qaeJ^%PV&q znqxUQ{-fsig1qvW%bD7o(-1mWL8Sdj#XOrdYKl!y>`QTL8dZlJTwR43i+k^KSw$qu zqxc&=gMUU%f~u#ziMLux4N^+)Y$Rv_4z#S0Z|*=PYVLmE+w>Dkv zrPrH6=R(F6Qh`$p{o@VZC*HOVi@OhzAUa?oHG$&z*V-CA_()^(P;r>#UaI65MA}m5 z8x%}I`R%F(TG>rJb2j_L5f%_Zpbs#8(=-I>2~Qv`5^`!7w_+OWUA8@VB}P~B2bHZ} zOwP^k24~8%jc`S)hP3s3)zsB91HtwD0Wf2E*`IV4#bA}4=2VxaY5rJLQd2Q`gL_WI45ALKMaTa` z$dAB9d9A0y2yNl&5dMDzi2i?hm|r{e=z4EyzWTG*{_8T`R%qYSg5&m3$OAGurCpmR z@GU|d#qA%p-Qih7F{v2*bkC9|u}tgtD#VkGqCE?XZEf_wL2+w|`mT&XZmJyly{zzi zlb^-1I?qsQ{4(B4dgy9MB8stF$A5q`1!*IY%s*5eZg zL;GENCsKps>P}0ktj6i`SBZf5nHCn!5mhJP*8rZVE0e>niHsT+H?*YKcuZXsW)EdB z-%f3vnY00aPpbSC-z_(y<7`rft`6DX!@Ye3hNo0}rrEuL42(pNABI7%QtGs9TD&`Y zY2*~E$rL_XSERd9nqCS8k4{cul_2d)e6lH?ePSE>qgqBy0I@~q_K^Wogf|5YH_G7+ zH0djsCLJBNf%ya%GFU#epz(k$?6T(ZT7UlMoy=Vw2Y~ZFU0#u+T#e0FV3tS9D_l$hba@* z&XTQmK9a-Rz9lh;0E_K#cq(WWAYty~MmSt@S9YU}H6i%`s>G;r|Sp2pH6Z~(>sx%cAJxbP$m#G@9 z?hhZavR_N@Lwoh=n7Kd#@7ZVe%1{K`@KX$jSCoUWU*<^{^82emNCb=M^Xoq2Q_MkG zeKa`m3juQFLC;`-7}5FD%J&7JR1T>4%j8UEyEbO5devJRaxNxx#m{7;e0qVimo21g z&D}$VmJgX>jcwR~*ka2FHk>Q6WMa$*lUuo8t=+OVgQ?rMW4`mOhb*xbGX+hvrv&ZN zeuy`a(FMtjKMEbfZ8DCio0akgcmD$shN94H{)0;Bx!4mCHiXOn+V6P>jS|fz8A4cc z(f!{}ClQ3v&Wb`in08vTmm0Af7R)Q^^>3Mzq zkV(2rB!mp;2qYujY_(`_V4g^mFX} zwfCP`&9@r0L-9D^0c1q2QrNnLq#R#&S2}jOW_flu1dIuN+tntRHjXR9#<@<_PIdoQ8qkj9RZb1HtZcd*go^iF{AiZT zQCvz)_q9?g6|FNMH+o5M`BrjP!?z8A(rwd`WQM3JJGOog?(%+gG-s*N%(M%mSWUHRS>FX|;Eof}6i z6`u8?H1J|c#4Q2eE7EdG4-R1c(aHPuH3jpJ%^p3^E6wb!^A2@xH)H`JsR*xtTcgmN z*+G`eVA;rKbQC*hgDz6QRI^|3-+9g~aFSYWrdn;x@qTn{@s{VrG@hxM&7hh~_)bGE z%V>!9Vt)Zmx#dL@!4?oOd*!*|Qqc=Kl3ai?dL0Lm zHD6opa*XWU)B2T6R1p|7hz2?ZP`Z7Q8P=>N4`yU4&{s?)&-zpr(K!^@I(CL8*m+2G z#Y`033wf{Br$n}ug4M0oz9%)%10U-9c3oSX{|Njpk9+r^v9pwuJh^$BUbziNU!<)U zzg>sIeN_|j+;9mu@-s^-u}#L@$JElZqJ!z*A;PDkf78X7IMYS>(uPx^z=Fus5g2*JMMr$wRT&Yb5YCZJXONzO& zP1*EY+FY^3DCzHyXA@d5;)d&PAOM{NdnWB`oHb8MJJ5C?lV83m3@`n&xk*az*d zmTkhiADU_tLIn~cA}p7KZIIS*qe2b&)`+m2Y0!7&pD+7qJ|M!9IVU2kp!hB|Wl7ROlfP3A>grT4nPynJ|51gFH7gU5$iD=# zt^TT|p5|RS{G9|-=a&{sV)~#eoQbr3zwfEX(RKi*_X5D5rPNb0NdrPd>GK^9J|)i|=w ze$kJ52l+s|&7{6+@Vp2bMWBAo9z{s-sgelIcgxVeTH?lW*V1@%KVND>gEeeNl{=F8 z#P{nZmO#*)JhTd1b=HwYvsTdV$yfg~5jY?N_Q!ba-Wr}mMU#?^YoM1<31Nq11)?uz zq#Pqh-E@gClMtJdLE5k7nmiKXH70Z{34W_CH|a0B*Xl*vArc`21FYs3VlSMk7I`mG zS3TcTd_|7J6jk`xfZlXL5zLsf(xoO`w4qBFzz_n);rC`I5quwx<5F@ACd*71{uS8D zULnr!FEE9t^QG8LR-3%Wqngk%9_xGJ!ZGhY$wG{~^r);@EdRvZjoxD(q;7W$;1w;l zY%laRTs17OP%q%~F&;FlRsps{Plm-F+ds^;X6E8#oil6Z%sA)O_6E(-kHfYGH+UwG zW?a?6_ipg(niB&{Wqedwd}u=DwxfoI?^z*$?yW&xnJWJ=sYZ0S|MEWbjL0pjb*Yu( z&i6AKOUmvK=4T(}2a283N&G6;qUy|x%SsuJPByfDXcQktYg4n>^jV{06`?<*>c5^y z7S*2190_xHG~Q$w^FveL1gt0InEHdhK7FF?re&gu!&Bm7Ul2*wRK74Q{`58OTJFod z%wS7i{Zz@Hci=G^2ij~t-R|D4|6yG7IOLJD84 z3@!uZAt;0iclDU*e49o=)oP1GMVgnGl>BPu<7w>kceX)?ZLhYI^83xX*E7PuMnhibyGqAytFJ;b8#11UW7kYUpFX-gcFLqG`pzBH@nwGSq z!c9LvTsZ}-vYNg5>@lN?=^+lMrE2P*Sm`YhBb8P3$-B2Lufol-`OaMAOckPt9u;VB z`no*Xo8(BwWn|1eT=#?TU!bZ~YK^dr1%(|4B+$U#o{CBr{O6(J^{4J(Niq1fy}JC! z-4u_Sl6dr~ABXzmI1bFE^ap;yJ;@w5N$pY|v8N9-_#0!$gOY-IUCQ`&Pe4RR&L159t$Xy!^>Y;jV;IR?kM%3} zlYH@#L9jX@!l~}$*u-g?3tUy~_kJHBax6~KoLK|l?|PqA5l~5Bam$E+g-JFwrO-b` zF=k#@#TOC7PW69jQ>V|y&;MOv2B52|RUh6dV%StjH{|ZC=s3+dwzA_Wjt=_A{$QxO z)%R`uP>oS?>Ld4-mt6CQ=Eymk%sC`7I16B7GZ(9}%4ZQNVxiHN&iWpjk17U~8DjgpynS&WehHG}`M1aaIb3UV%T zWcbVOX87)Z<M;}`5bA;}vbBnvf ztD?o2NqDfrcn`m?7rnOD5+Eu4BL9L!B3rHw(;D!$W4rQpy`O;x^Km=;vHZv>AC+M^u-Mqi^qv%E(G^Str#D=FmldX-KY~lLm7dkkM6SC=R|lPhVR=5pV+0A+AW$I*emPNA{zLy zgE^8=8Rl6*k4Sl-+mYxf@u|1niI7(t&UnAbki?MnE3pXcq96t*oz5#ZK&PcM1&S*J z_9_L_!;)sH`BSs_|1p5 zUa!?#)6eWs1C%b$k3Kl>tsYE@3dAk&XZ*rxmC^*^f@ zixp<{(v(sL9s!@NARb)R<9g6o+cwdph7aQ8jDCF-ZSQUw<2wG~g}BpL`jFTzm9pCl zjk(T92$tA{N_7AA-BnV>*2=x(lEiYGwe$td#0TH9ZT{JnQ_?h%yJoDFcF-_jwUgtT z-Dvb&|E*fLC0V??+l9c)G}Gnk{&h6do^0xQzE_V`5I&C*(3FHVnaQf~sEOe9*R&Dx zo`h46v8uq(sruyr>C#siX1A7`lCag0wZ3ZL>nJUb7VZ}3KqvhlVrjs2g&IfcvEO(rmM1Jf2ZTMXl(Wp6jm%laCK3R*zdL zDpNLPgKgfU?S=x^Od5casDqe%5UUkId-CK#&tf_tt^bSBOIS8QV zUN(5I4LWp6z1CyZ-JyP!_l6;eGo^i~`PK`QG3zo)^yW02gD5g`<`pjgg`n0OB}xm= z*HkbXJGD9oo(cpo=T39B3GdG4A*xbGl@M45of{AjAlSo5p_s$LgIrFb*aY^%-<$0=*e@1^(>RZc40{= z;WW{uivTu~+Q8(=?q0=OoUf}3^<6|n*>uL;Z5Zkbw0r{^892Uy)r+B-(n*8CiwO}x ztMcp2N8nZ4%wwEF?nN8B%+u_v>aW1?YtQlw-?<$k5+)k4E?P@R)i$`9%-+}l*@^F+tJ^K(R?2!p zdc_i$94d<;HaBwi)X!e zy^R+O;7f3Q{+`$6QoK$3v{D$@VupjJv~Moro=9L6axIi}kMr*oG`Z6yv^-Y_Qnvy9 zo^4u!tsIdYI~=t@x?ne#_R>2G8DWb)jxOZHu!YA0^0mRe*RwSp!VPT#?ma{T4ZB}w zYu;lmcJ=-sOouoYeOq5($196J&l`1mSi5D>Au3vrl_%9^L~2w)Qo?G^P7h*o%;D&8 zMpQ8IqAXeUtOxH>+2UMCCts<%p+`r|&NdxR4nM_?e!nBrsa~A681I5IpWU~eRkNiZnV;1ARI1wjJ+ zH5oeiD96s1_x9yh%Io4hM{Kh_-J)f;6i2SL#3lK84JCB^l2SX9_o=s^SC6dzuCPUy z(T&1>?mC%*Y@*ZXHh3yoa%L*k%SS;JF^Yr0bf5BBC0*e~mwz7NcbBzxiy%FL8=uyg zt7+JSd%1F8YZ(J%_Pb6oXY9jV>xdTm&ccH2w__WggO$K*PzOZM`<4d0>^Qq9KhSuz zc{eLDY9ag+W_%#IV<8L-hns8!m5o?>PSf=@wADbcGtcS%^}>BEuPaM++ti($4;#qG zg{5B#MNp`$ThG!I+4w6m3xdD{bDF#CZ>^vOB!e%}?hh@NWcuchn)XBGYt@7obBb$Q zVz=kRTBh%GYx9c)-LrLVx<8R|2D*BFc}XO+G?Si5mE61&XCw{nExlQ1_wPOMYs|&2 z^Ag#LAi`@RM+-9f_-o@jf25D^F?xUzY}35M7QX#x4Fd`YShTOt=%;Je`8AX44U=ZY zPm6v&dzEcuy(69PW&!b7&3j~v($2%!IF;F{JQhRuLCLtqqyP&B-|Lq7_FgAp%8qC^ z5&WQO3QA7PM$-9R>)`TQv+fO-OmYh`AV9S?-K zggsD$)n!#+-+JevcN2ZkN(Bpi8am744HVnGBm})Q*q4h_$@zENxbCJG!QAoIg31u& zLuk7outzj`p<%vAH=hq=qxQ~F%#OO+7-Vk5#n*W8?y3AOIa|C8=8jmI;dS;UJWhFI z@(Smd28l_0e2JGOVz=I5{xw>;IjcNykTIMdVbnj=m_C~cluItC5~?3~w6TFQQZ3!r zUflDuO~INc>TEXJI0>yoZ zsMYj!qjVV3>Y@dZ&A8jo-PN4Jd4H0;7GqCQ)0gCMyjg~#rdaVCWE@@4*VXGw&h;3r z`!~qI+oC0Mj2u}FAG$RhJVQ(B+y?&5K`+W$my98dAy}%4u|}z-Qoi9h1$&#C=2n4-Qo1*BQNj%UMeZ~Qu&aHtO?O3hJG z3sI--fEvF<(FAx)#2Nfj(z@=})y&wHjd*`G_}$UZE9J{@hX2WXb4*$b7^8k$*4a~LQg52KjURP7+ zc|~38GiInIQ5y9nB!`*bH)+TvP4yTxrzdMHf#G>_PG(v>rK_Wrv1J7pKOTj4GR$}~ zRlM%D9{DrEJ(h2y_hF^Khbz|5h-k3S8@n<+uxn8NSpr~&D&ZQ1k^7IImM2bE+D4A( zHAqMOSAxD?RA?RD<3OKwo7n0Rd&;ZpfEh{ieq$NqAJ8oVB|QA`3l}fE8-29`p;z?RlYQ`T;r-X?mVTKPk4{D`O3$X*wd)g zEU#2d)?II|Hz?86U;R=oxzD?hwN)N?i*AND&`Ty3byTO|y7j3oqY@j`Ik4_+ILBBe}SC6D$9sNCMw$Yw$kbh-LA5G!2mf%fE457Mm8C z9$u;i9YfW328_AlbM2hQld?6B+Sf9Lq;cFVpL3x{gPEKjW58AM1F1?D4fM5x1rF;) zLjM61$9-H2N(Ogp=Q_M_=kt2DGx7_y z=me><)l=l0=F#%*ing4gyfS1&(#C35C08bB;E|&^2i;Khuk@wU(ClR_xp!HIiWGfu zm_Mu3JzsH7dMw`kPK&&0 zRLQrQQ|BeAh)bL%bDXnU?X;$`>|m5#$S>+{>Hubbq&~y%sWxHLAEyaK|~GzB{HS_E?ynfxqC7U1_ep$_15VryCZGRhTUX2+s2OjStwSn9^`JE-t)&#Af`#E ztbijKv`^<{iyq0(C4<0p#;zu_9!2m4%hX`siPpcPa<NikPK)AEN9( zKzS!UANI>TB9BWvU?es#Y4@63tG$wMos*oY@kFAZNZ4k`V!{o5tmfCg5rX=CA7~it zWI^LDXLP+2L+EDbPwY^(=Ju1%rftfvy!7b9RBag7H^$|&LEs1AHqsPP>cvzxC6SHL zc?o&!x7dqPIHzFImoXk=c9iDgcf%Is@b7=zMI0+wz0T`P42M#X=S2-aWoR>{v0$tVUhO)jF4|i&(QdAWa~zKoMIP9HwP`*++M$Lj(liidw=hI z4lEB=Q^OMdE&0xGDjkRs4)@|HUI=t2t4<9Va(#?oGjUrxrE@gsNkDb@+dOr!AXRd6 z_i|rQaq7Xgi(9$R$g{4W$MCnwoFg0CmC8iA48DJ%ibpd65P@!;}-j2>!dwh7f@0Ou$jthW!BJnn3dB~g#xW3 zfIch_E z_4Fz^&q=qXd1kt7zPW;2#NM@@@_w5iE^mK=-ly*QqLQWOu zTAeM^;kpYbhk#aI(tjOb?2vU2swQivJJ@PQ6g@KV6KV#F+d?5RJsvnxPerL|hZO zXSwDPyaUCV|Gd6O!(eE|4)dMjOy{#SU_>I+#O6QG_~Z8?=m1r$h{S2ObvL>R;-<#C z|Cz6Ff?*mGT*VGTOS*hC@p-%?9LW%d81{tjHNJF`TgGf#bV5;{eZYpxwFGCT*01#k zon_fQf==qG8ZWfPoCOhr;F=g*DVVxgpqVJT?ORW{80JUe; z21wZ`Kk&;w+`W+|K<|{1C+K+9(HKP+9LFLyi-C|tksv-wpV#t~;>K_gEta0hzhGcX zwAvE+G!tD{7p_d4@Z@N)QNB~*43p}9x}y7;dXE9$*Cxrr-kx^CQ8Zo45EK)uuP9=R z>kXYH@6I#}+c@rt3F3@`U6HwKBG+Fp#&x>kVy^}CVeBy!EjGC@K>?-f<19K&V)8C^ z$^}2OjDoOwIdV>UM?&Vuk8i7O zUg6(p(cjbmns?gH)U37atq}IQyW;th9d3xQoorItPoG|2!ubAl_@Q19QB^$~Wp;`L zl;;rei;zvX`(KA$lg!j+{ac?VecxurDZRKXz@zyv)8N3DfLfNll0DU0sP#^xDhqD4 zw_s=2KGFHybx$+5++5#0q-$Y^!)S%Gj8-|Dmr?Q587wJteHFZorGx9M(pK6)(s4fvl_BCBmi;M+(is zr(bb=blU?tNB| z%TQuJa#&9NsIi_OC=`jkZFYl&W_1N-X;g1Z{MwsrCX@&#+o}#7N9X30d-+4ScBSp{ zj<~C;G>Tf{U(O!a5{#VJ`3J7VlMkEE9l^FK{LEBbec`Ua8mn zdDv!FUprSFfaO|O_fthN^g3U<6KB_3ecB)6GrbA9?@GU!l?T?|Wug+7kC2s#;UyV<0e!yuc}!&OIDtPMWbrYDD?oI zV%KKCOoy1yLHDpBwn5}hAv?>(g?hV;V)={}R(#WNgX6ucEfex2wRqesi?*xz)w)t| zD`91-Ma$K;G*Ak`@#7U;?PIJ((IKji-m@!f5`S!UC)d7%k$B&3{3hSXm?|%s_dtQf zH@>?)9xCd~AF+IB=LLRHA+k@f)WKc>xMg^9%Evi8MY$6&P zVj7wdrR)ZebJODL#wG}?)V zNn#k@HRXJEJ544}se+TWnR~8TZww$`B-TVR@)fD3ayw)S&PcPwG0T{XCS7_vb@->5BDN?>YPttYU30sOO-@3L(FdHe6<;PnF_rgFBwZT8z*++wizY8N|vyDyE*irdGT1_n(L3GcsNZ{z5s}hk4 zM%c_Qfh%Z)Y!^^Y6p`Ba`&#W5%S>|gDWD_cgIEkBayUFKN%8QjGrLIWsecxh<=LlP zm0F#f^WTb>N#sh|_~hia0y+$^=s>utJDPv2gw*9Tp_C1;7mNI}Id^8lA@abggY@6K z+ntQ%X)s=TlgqKKY<0{Z25hFk0$H_|B=;X-wNMcne+}4;<(Ast4B>V~AU%S*mYSN- z;&Ho5k{SVz4hg2mh=JJeO`NkO9kA*)2D-)5tv}=yySGX?ydMBHa|j(>3v&SXD0UxI z6uAo%S9g3+K4uSfJ?|6&CaUc35UGz_2pvxC+G|}bwoo{&Zg-&GsDXVoNb%OrZND*i z7x?Vh20A&p5;eSqUD0yl$s_{q9dkf)f(=ZBTCF(C^v|ZFF?adKRLuGOWc1_zMM)_b z!85Dtf5Y&|r=>=E3B>HUu*3cro=#(grEei-)$-ucLf+X* zyVa|8h;Ap1-~jO__N#BL7B6}mxZt7(+oi$6Yb7}dA+t-U|LLn%iLgvTi<$~j4E`h{ zs|ywpvwD&HI#_Y4+r}5aL}7mVPz+N2#){}A!f>_)5RA=jhHv)^Qvcu&Atjvt&oQzI z+GU#|Y2HKMl`V+jUVPe7bXks8{>BzTEtqjsngzw+&Nj&rrI_j|Fj8W&axhhHd_(t+ z59=d=ofQ7wC$0XeB=-l%WupU8(>LmqFpBuOv>eu_4;-W=< z@QYkJz%-)#u=uhrWp(yOvr zRo}MTZ8<0;U)%b}_!dSI5wxjpqJ>fBGtKhMNMs>4fAGN$4J_0{g^*I|m^GQYzD+2K2_!+APHvm9jQ zcB~;QF*AnecaSly;ZL~7f2w9rtXE6jZ@@isZ6>_H)z;T+*OjPkpUh^&pdJZGY@WZT zwFva>=go&sZZc|6PmU?spoaqCZUpe~;p%2;cy_{=N4}=kDN16+#yjW8d7$_2!>``G zza&-Q9cgn~MQj9RfO8)nf@#;Hk6%m~l!6U;n@_%9lPAU$Qxn)m*bRrUz{QoK6H>14h)=P#g^;7QS$P}PP{D>rSP44ij^ zN+RG|&tdJh9VCC+QK#vC-m18(P|X|~Ul@vYxSv^w&X)n!34?ai`hnSF?5(ZmB}K>nl%UKm#zp#`!up}vy97E8l(%Q3(8 z(fDsQ6jL!JH zFYSe$7D0d6#?WPT-9k>Rr%}O-V|fg!9f*}XUdp(P;4AM;vOk)CXqi`$_Lj~Tk-02h z=JssgFw5B=-KU-6BkfXi&qkJhs=y<4{lR03eBoUeKid0516P%KTnbHVPwKMm8O;8z z37Dr06P#g7Qyku1vyF{hz7sc0*?NmL7g`q@@2zgr&WOT%r9FG~VR>3z4@>{&s(njU z9#IoGDeyL zIaMuRa6hZnF=sb<|0OoQNL-Prh1hX8C6Ga{Z=)vs%R5LMTr8VwpY2*h_PEd3qpdPEj@cq+mKT0=6cweCWN)PH)uelGlXgy=)jsAeOwV-7QCOk|h zd&Z{raUeiDn!#s2bgq>Y=YEiwj3-`gW11sv<=$>6k*UjfE?{p%jq+)iSi9+wJhnj% zLW>w-724;-(ol17T`7R?;oSk_+y_OinT@VqDf|F&()KVmIzU%BSJOs+C?r#{Ymb#WP$YnoVRfIMR8i-+ z1G;9}ve5g^(p@bJ6xouOys&T{gL5gta*#Sfa=9SB4iousYWhl0@$anjkaqYAa?Yvr zO-`XoCFR1 zPNFH8KQd?}cru@c8%zSnUTma94DsdjF;98K-W2ZXFXMK&z~gp3tLL-!aC=U#T9TL^ z7F-o73uJtzx(9QHK8J|^=Z8$?5hn&r42V4#&nLlj?54LAmc)W0{V8AR?gX5$H34k? z+VwkQMj^Wr2LIhG@rEQ=o?aQ?A4%-`d0Z0d!%qiy`C)Dk-m-1(Urof1+dfQwN$5pj zp-UpFfw%wJK-DGu=FNoD$3$rvI7r6|iIUZrf)}0gwGFqKrf#cUV5-i?GXU%t*uoEQ zXn!XAzeGmgy}rZ||{^Gj(%Mwsbly))L@XehKrh`rk$e7{Yi&B7!;IywYgw$wt&$(=wi8C$1g$bkEUZ+^uRsqLjpSUfo`JOvq2nt7&=oT}K4Wg* zCpx|sZ?F68JakG`o`Q?^`y+KoN;TU|l@bf%pcG(lq1I}dPrZ>C!Ch!qZ+LTizSFlm zZnu_~@Wo)a!r;cSN9_e*tyHrS&*NxlLw9smubgv6uf^SAb1-2vNAqfMYY-O^W5(hP zVCr^S3unnfONNXs)PfKHwgH1Qk2m%gYDu?;Q;G|c zcOE-42$vRPH)35qICY_-Ch8G-`L~RkRPHzx*yy?j>l2xSs=;rV~UIh?CpZg?>`tZsXwiVyWqKie84eYBX)G!VTO8UW_P z|8=~QFpo}o2uvh0O7`#3+wc+Z35^T)Lge;hjbflW#jj1_$M@h>PQfv+7#k_|3JSIQ zqh+u+B@9^UVs*`HqPOWe@RZxTV0P~jvsxtxBMNx^m1(N~wp^u=^JnUbXJq$Jkr@16 zTh~SqA=8$how}tgi@=Lsr_DOc>4DY~*@Q7m{-Qd5ZDcl$_F62TKDOD|i$R#a z#cI~8fhC{zaf-iIuC34MlW`YHK3)d7GqBRqG=4^;mwVxosKj)d7yMwlpsJkn=SYl7B{GR;2_8)t z;EeWD><^190KS>Z8o}T4g1epL77x_j@QN$7h}pXZ4A{e8D@J3jD!F5$TF_2fr36p0 zim;~AS8p`kt8-@GK}JlBO`hhJXQQDPKl3u-fD4*EcyC^&k*9^rgJWqQFDB*trTsUz z8I~WfSM8SQ^M>Qa??%(Un$@hHNyf*y3<6vFF;zPwYI>?{nu8)=_d`x55X$`)K z7RCM2DA|Z+Hxy>QzddISh-K{hCNt!j#&^rorTR}6 zyBM4hIV+>f*T`#}+Uozaj%Jd%N)B|-lf;URr;ZNY+PptGSQ}bB)hZu$TlKPfAW+f) zuHQK1tgc$Q<~)-Y6+=s+Ic{y>ZCraVZyhxl=C7XJZ{CuA>257~{GW<@@2IG{Z%gz;MFa%|MKTCT&YT4Jj2meX(U0Z?dZ&r_Ky3&4Y%S&vG{G#qKZ`#yXUd%Q(xU!Ac8*?WQ_K!$%g(RR zUo@S~yaY9|aXPH+s9Mc*3*}NKco-4V0?(q-e1^~F_P&HNyYw<=TP>15&w)iSvfkI& zz{O7Gb3w4;Z3#I7cOw}Pw&FTT4ESzxjS>+bG-smqN3Bdd_OnaM)j868)-YM0i-d5^}g}qOF1ifFqwFjMpQg1-~ zc-LpbDn=9kDpgYVQL!%>svnuAeJVijVk>?EBa2oDTDP$DrV&j5Ht<&o0O`xQL<27EjaadiDKI5}?C+qkhwG z3g1cHaQ5F|I|<0-CYx|7P6+o*{B3;8PWJ5KO}kNg^4Z)+{i*Cp#|@c?n18hY`dopr8NKtOl=AS*jz z$#P5O!e%gpNtcJ@d~z#D9m2A5G%$F$>jdUIbS8KA%VSemSbX}E9P@sDkXoxOqZW%k zPIR?nh-)3R14MZG@lVLjaJ7p5gN?z6ZyrLK9)f?47H-lc2BmzOrYf0xh*&=>P|jpU zkyToGH3_2Ym2@qQQ1_KEEdMfjxp}Mc2<}gDQA&1RhGVp@CDlfoJ2oht!sV8*wXj@9 zmDNO7TBXby+;{|QS36D|Zw{gRez+CfwmDxQI`i5oy1@73;&}n2Tqlk9kwilxaBwD8 zIWGW^ynm5k%JF$ZnWZRGgXuEks+yMy3tEsDi#RJvUsFF4a}!YJC`L?`1RZvE&Ul~h z;&VgVlup?4^8pY{U?qitRe9sf2kK=Q|7jS44I#@$LA|xMdC52v5(+-6HL80&xZ!)e zuVfr9ibYuNHOdA}rU=bIBxibpsh$W0+zXe{tTcMm1HlUymo}Fu{8zCQecfMeA5bZ6 zBtl9a&$6GIZVEzED(^XolNaaT!)ynxURYii>IQ3bv04<|+KeMH*i*;lHExys99yck zW-SoLy}7Vw)hBi%uwB^!1cYG~XfP3Gmw+8#TG&9$Q4wEgwrw z1*F`WeBP8n^HQ|!Z-~pRH%P0JD)8Gb_uuB{e=%EK7C*S{kxprKR~~#PJ^8E%C?``< z*7u_)uJKpEZQVzFojd%s{obI&G`3HTu1Nv4ih2EpJVmI3c^Jx-ltRFT6k>fBB^t^> zV$Si@u-35?Ap4h>J0rkKJ%ogWLzz;(E47^YDyfnPJW8m?f?O=4GR_4_#djcp(zpME|loaVLpq)s3pXOm2kMqKtfu~^xnJU`9R#(G^xtNR*SBU z(1Wvzc5lzQ(hK($?9~QQEFn?-2L%25oqhXJOTjn}N$fyA0tm)|3Pk(l0fF~0xd1{_ zt4ODxG-o|)17UvD_eicV}?hW;?eFVo+CABI^ zt|jIk;O_Qu-OjCSr4+8o1~_?{^R=TjFx&7cnuC-ESZ1<>Yj?s@KDH3wy%wqH&*~ay zuJgWSH|OG!g?-SkEH4Xi3@X9Z>T6m*?TAEX>tY(E5hlOs#?=R_?ZRQFNCGMy1XFWa zLTzE8rN6!Ci2k@zg+=wN z@^yl!S5L=qaNp#KUu|Z~96aT@9zG$}%bBq6Pfyx-`w5W~{w(set7?fQj?JKI2=;;r z)zaId0-ypq=v=_vjezf2F)F2}{;NkVkP#wDIHt}0R*|yvU5mQ+w#&~I(&bYTRqnhb ziD68=fM7w{@Q@t=A$Y(uEz%^{4M&P)V-vDYy!Y@NdLZrrD@}Ny~3jBpOq!D%sZ-bapqDB0a&$ zZ;O3ThddL=jLbax=SxAXXHq>CYl?EsnHWqu3czE3Zx~u zCN9yzd7-&^>SIBwqD3K@Y5r+hRDDg9{Dfvhm5tm{=VW=0fA_8a>c#d%kHh8F zT7X}^iV3IB{HqW8mUp{LnmHQ=Ht46?if=E+od>S$pvf@kTbI_8yYqezx~*CaoPI{Vw70RPxt33tSG+By+fAjVro&YMLc-U z>{0pY(^r3H2}NclA{MPj`0>77AkxM@A*}H5aGAHP>RCBy!pHJlF@@&S_}K54mX>7R z#~fQ|%NqdK>Ak2sw`G?aon^PTFHydD1unLP>+N;Sss3!-B)=LuAY8vO=s~g~VhPYZ zMlg^T#?RL+Bqp0rJ|7^NF+K7F3tylPJJ!octYT}NyUk^8v|fr z@Q-uB$k5qvL)bMc7i804+Twkb>E~T&Bvy6jOdaCq@+kYoU7#(?4^cglTJFKMA`Z~4 z8{P%yKdw?$iD7#5M$9qa8?_W4j=*K*-Xv=|bh~0c;Oo>A`>%2D9_$%CShlPj+^jr}GenAd0FuxRJ!g!$$YvNtD~KKl)Fc`}L# z?wUiqm6K1=LMjOJA@y>1Q%|qD1bneGpY$Thn0%UZPKH|sM>rAYl)7Maq&uIr8e!QO zO4QlNN*Ec?c(So(|3mZE(Qmkv?N&81VDC`!VrA9J=n|O>IMW_f2Oi^R$dBJ+@}ArU zvrk6HS;{xQLKX-M*B>fq!$gu8$JIuj8Ye1bbc<_x~ z+`%Prb4s7zvc6mKJAIK$OED7Q4~78fEoyUglW0ae?n?NmcvlhRYfIr+Eu|3ACx*qN zJOk55&|#DqH=e<(`e-+_3fa?r@>+yXdiEzx$Ss2qb~Z7X!N8 z0rLx=QAAmM?C{)Kx@Z(9GRQ_Jbme<@zq(%Zea}BPg`)(^Z=5oq9t`g76aGX1=|-!d zY<;cBa9OK()LAi_eHZ$W=s4TzR1!XE8D@%S+JRW4>bx6oMqI$}4nmI`^8pnGq0-Mn zQzQl^o%c7KULJB z?>*8FBk!d3!>g<+3rTZh?GPtAUZ? zGF=A^X>APF4+ztE@>>n`qj}{>3M165Y(PcBA^j9lCADyfYkMm)%m?gPJ8d8MD2c;i z?gO&yY-!~w)K0+UUB$0{q=-?erUz>%O=hJo49)KMNMne^>k}+dPSRb;hMNhOdDh^W zb@sgM!1>@}&&BzgLX~8<*L`amapN$aOf+m>*Bq>jO&Nkm71&n=%EHr{korev+}79K zA^8L*(dl0~ta9Gyv6FBz6lh|da3k@lhm!l1JI6#`=2+1@q6Ulf%NtqUb02iFrpFKC z0q>uduQOrt0+xISURY&0zdZc{?nxp=Gt-Ao*hDLza}X`-({K0gL~TA7f3i4rKVB;} zB%uug=6WfX$UWOjzoQyZ_U-sBx`a>jgXeuvyWVO0vQN)TLXU^mod&xLV<(SLLX$7AS5_At=Srx!emDEw3n{Lu{r>l~ zjBZ;m7Ym?wa%K3&^AfC;NvgnO09!&S>!m0)sWZbT0 zpczB1ZiCS9W>bp_x*iPE_pW4Z0Et+dX)~yweZxe93IMDy{<|j?y=(ukQV0O+ffhg| zEnaha1v#|dg`ewCz)PfvpT-^Yz5WqL4N0rVI-i4t0-1^u^gqgCW2*#qQ0x~UM50Q) zQs7_L&$E=u=Prr2;63F1ESR;Q?a$-NAU zDX)`nRI#1_q5=x8&0Ef&7iDE}HNKcECdK6-&5$fsi^}e6o-pNFd01>rrM`brYjJb7I$; z^iim8#!4>NjxbA9gXN*c`O(>~9*WPp&yWgv=JDZ$DJpj6Y*)jeb|(?CXepNDzuH9r zns-fGt%WptGXIg`@TdNu^ zud=>1)Y5F<{jC!W?cEGG?&pVsVpOisG9;yBfnibO3HI5tJo;BVyjKth6c91Ga&Cyu z`-(1DCSe|Lkhgw@P(xxMRn)N`8tvkH_FO8O;gMuyE1%!Ylf77&{c5gXD(4W;RJ+e! z?a}*sni%C%0q^yn9W+Fp?asB|POu`sO%9X2Xfeq*q*MfW+OGWlJGU3SEutaiKNTE7}Hdh`m9JH=BF1OILy#rhy$sSe+FvMZlI;--hSwGlE^{1 ztZtR8pVP75Iq`FzK7fc-=V&VQ?d$hbLy#028XB29Ky3##rx|4hV)&C@aI+%$T9aIL z8HJO~8RJ)v-l}&IFP7W!^Jzsy=B7-0!(y`M+K*7>vefNSl(U+~rCp{kTMw_)d;W6D zNsCb?l4Bt&B$G9-_E<@B5P6YvDaUKQq0bmqHo3dyxv)82?6ky0yiKT-<09d#%@Nm*B)UQQ!)=Rwyp97;&M2Y(t52Olj z5F|tXO5FC}PAC@qg*28ex0g@Sz)aMij`Le{l?ylL`MaH?|AF zy9mk8I9oJ#uTmiO%d9H}gYwT9O%k0Mka2`LFkJG;d<7tx)WvjDZ?ZZksS=q_AjdohL}gGH=IJ|>|BBa3WbPPx!Km}x2}3Y*Bi2Wxwivbb z#cxhDD?;W8*>W21Zc&jM38k$jx%ofTeq80|1J)g0*!Kn|C4p_NC(^%FAJ z>|47?$YLu?KYMnrWoeiE#y)KaSkehIw>dR8aTDx;+w)!svJJ_BaQ6|o(!k=@sP%#G z>XIz9P*Y!K;O2mUZf^JLdbg6ZBBeN8)rz5;M)jY~+c;y<&}Mt_-zU+N7O3vtw`wL2 z674^x-3R~SMzvZ9Q%0{*N40-aJ{0hgz};XDzPhnlj%Peh9t8wkn%%N>?xZ)SNzw%| zL$3i%WwwiWYtY^mc1Fj}0}G%+&%(;YvfT8>K~LB)$yhap0s}|;PzmRXCNkoC=^h-K z#tGVHcv-yh9vXKkB#M_Jo^SJ4gcYEHYn=$nGv8@&W14hhuzu$$c|$g?p0AG&O%Wnf z-it!)l$-wYo;ueP@ua@LeUctlGN^?B!ToLy723@}fV4Kw18Q)MWpUdpUL5XNrS)lA zu%j3XU%OTw{+XovtH+S^r?AdLf5R`Z#WCl-rmr}?u-snfmykP^NPxhz0P;ozS1-S3 zsu9}O@&go7F}!I2sQ=37y!!R()SD=dSJsRF{T9%DmCiv zBu?#Znx>=rdb>eKxvo~~eI~v7#XJVhV$T#engWG%CqO%6?{jEo(RAp11uzyL^?DV6 z^(6Rwp2)E6GE*XWW#_u)0j~ zn?-RW@7#(=v?e8@gZe;PyxF+a=X0z5;YG#a#nRy|I9+7W<|RsLGV%YdQ|Y^lsPMaV zr4Vp_i=R6`swy4{B)yR|v^~!W`>v|Rz_=Fwwt09*Zk&I zk3A?!CN=jvOF-QNvC)$qD;Kfp5jpm})mF`y$>R4{tK&c;LEV=Dl$v6UXP~ib6H}8} z>=T2rrqXkF%7<}h+j74@Bnhrxb-wygXx%>(!(8c)<_ zay;~>O9Spui*Q%c!*+ae5@gINftBok1FPv*-wlPE@VO})&GnjRVCTjf@o)fWXU}V1 z?K?%YkTZLHEqr#_J5z{vSW?2hQC_HU#W9P{ZtFS zf1%lzH;5d)Mf!gb0Y*hpttGMr87bMYaq(BXL7f{du-W)iGjG}G(^vWH`zar3I48#2 znZpc&d@`53e@~er{m3<654xmnjF_zD4vzD9s8}VJRD2tGettbse7PWYI-kV3d@LX?Ek7(sw`=IOd)@ohGQl}l=vnfkq0a$eEfz& z+p|WjwlH?ZadRBc&QrD+(vw``xV}BLv&7DIbzwatnMsj8CYa9x=^a3dP=pPknq5f< zg?vK>PULSIRG-yP=!DQUWcskv7p1+qmE+2f{N)^NTVM*5fF{L$a_m^5*7QUYbXK5> z(Zg}JzZea8fP^&Lrx%)i4-eY$=~UB1E&u`dsUGdoi(i^aL+&2~Rf{`wLx z5k?f|7pLKEf9^68>eERaN)P!;jplSr0s_y!M|w7xI^xLKra1Ua=i{~iJTTu&*Iss! zvx=i>A6FJ{Yf>i3#W+oKPUO*BSz|CRuPChuRnn=a3;AKVlwzgGCHXsdH{?BjQMcoT z&{N#XRN??hsl8E%&X&9ec1-Y=+6u*{+cbT_Sg!M^yhAl~s~}$Ml7U{fvM1^nug=$t5~x998tlsn+w305 zaH|04t?~SR=o7iq230!dw%3xeEoo^6*-?WppphD8ZZlj&eNEJO2fplux=ojsqU`rb zG6%lPI>!#)du3)C(#|5-eYk?)Wlxb0k15`0LG85zDvfCI+l%{vJ!VW(8OYJV#|kv( zQ{!eJXVW$^%%f41!d#Fm_iWSk*u#mViak}a%Z}!h6GM7ep6I?tz}j#wG6B}GU9q(gfGTl0@u*NUiXM;~{Sp?ukH}(d)p}5$zZ>Lt))3gC= zXXVgv6OFG{yVX6f@OXX?%?LIAh9$bE%LE+SunJx3X{QT~1{!S`L7>i>5BG%CXIku0 zoqxW%G4q>KDnLu<)-M|iboQcuQr}O7`e-sSA6=5YkV&d|`}k0ck(Gqjwm zu{yt*m0@CUY<@HsQp&{yl@aAigZIUultsffdP=-K@wH~adTtj zq0XBRFOj~RnW0cyzhBD}glb%s3T6r3@nT76^6EK5j#dM0@V?zs?2iqTPUJ5sL+0qE zUF^S_?W70G)HBOJ#g-s7luz@}yvo`wo4L*jcAQIy2_RKMKCh^5doPMNFpAin^pn%&r(%c@%Z;nSEO8$nvX%#2D*lRjg5dpGk0Lbm4i+=Uk|I9qQ<+Qs8F$~ANw9V}}s8aZLUg3|%mAJJ*0kmhb~tcn&ME5A3C znL8XAW+4`;FWKBVWN^=)m{|)~R?EaId4pS3e*JiOc#Smvq@+M zs5}50#?4Dp;I4!j8=N$f*Na1sD7UoG;NrQb1Kup`CYZRTih&PR&(EGRI5eylk(=yJ zF8+|L1n?M^FFETh7%H`2qS5yC@At)A&CN zvMbd`5~kEt4&ym2o}Ld&B0g@}x3RE~JM>i`+`| zGsAW-TVfJ5;c~4~RMo+_=YZ$!c=c(E=n(nnw-Wt;$*gk}T*!usepRNfzj#F4^;?Rd zo3%iS{M&D3hr6|l4Mn>-U`{cy1rkmS`A-@xewQbNfw6z+=v~gRFkIJqtakPRqY*$5 zT^azAwCm$RanUFm7M7l=fPyTgqCOL9E6zYn-ctg$agC#Sc`AN`dKwVqi)sL79<9lE zS|S=n(CMgi`N>Hqqz^5w|wJ*Nd+v-STC7MZb!n(7r%~k|9HFRX!vSz<@teT zfG1Fqv8MI5rCn+MpL9|@ukY-(Qm=YRb4@hpE$xeUy+jKR!TK^PD(cYE?eVvkXIB8sSOc176mg~1^jVv7De4FMi9P}#jP*CbfW(7*Y`vxk zTEkW-P>Az1S@b)ORL`=CInz}YIeaitVr;L~d1-(53PX10!)3DSj9#jU&&VUj5l;H| zBX~-M6jte$-z)GdqA?%8c-_JvCD+JaaP?uPszCk7vYNXx&(NXPvf*H%r5M$?-@;pC zukB=z)6wG#897s)sY6Tt_D;cxKc>&SldTt>^h=+JpN?tn{jpjcd^;gqi}$ed1Kk#q z*iYMw&`Qk2P33EhSpp$8fkqZRjSSU2Cf$;hG>dNza^zKGa=*TsfiO9Q_0IuXK&{r% zn66k(Ehe9{lhSK0@F6Z4$%<8rc99P0id9Nn@w8L~QC^Onn%pd#eR8SUCMOJg|Fm1I ztLe9Jm%*sUW9#2SVyN3(D~LN1-8iV{cZn`nY(5UXmUk!*Z9~hwzm@E3ahP*sSd>F} zvdE*+iWvnz7*+j|6g9@KW$$Yhr0^6k~hPc?9qHuPYB5f z;ClQI40Vr8F-!m3+eCT-LHxyfz(gFZ4Y9?nj0iA!9TLuj{L^X)V9Vdd0o|4!6RlPa z?puT$Ms;THz%$E5wQ{|33KhNyj|~W9xIIq4gV8T+D|dU*0}QqmB)Hd!)m#6LQ}bSu zJ7BRqg*mcIN%Jq(yKO)h8$EabI>@$*qn%lu4@E!t7m%Nn}AQCGCkf6D%R1K0!AzD{FRv4fM zZolY9TiI~+sMpRG7gFD(g{7?YCGoKKd$(iI{jQZ8nwt2JsIz$r49yFAskoIxxA@+8|1-!KJZSsKk zrLV1bM1Az}(b(RYI*Gh5$^j0QxO-c9bvjgbDSmL3GS78qBjkKp`(CLmZ`=vG@v!eV z)$yGt_*>y9UTnGS>0Z)|m_E@)_?>@XCg*FuNrLhx;mnxD_gT4XWFNcvDjQ^=@(-Cy zgx4U79Y?y`OQ)Q<0i-60Te1B@W&sEVfF6jW0(4_*PIB+dy-LmN)2s!ELkn&mf-c9c zy?qBP{KiUo&SaZIye87P7}EcnWY2Eq-xYhgQc=daR2LSmjB};n{rwY~mWvOsw~4tK zF^ag%C-kex&S@6>%h^gkBtZ)nuN1r*xk10Yi+e}MrV{l*!kJ@MZ%lEJDn5&!)Wu!7 zAAar?YUh$uzRR*-(~6EqCuT(N;aSHELE&8lXC=>AwrrPIYb(pH^{h^y?}J=BkFqRN z#Wv5TtUg@YiK-NCwc(<&?Ncir4RDVByQoiYVuaP^>7K^%gMx(&5ug6sl=W8`Yz-}0 zHHH<>S(-0IB*$UwjVt}~%-A@R&h>d=?~Cqf;~>v!og{pYv(%{cW3GPYE#_Wn3hMw@ zG3(@!04$zG7wF+v=C!7-p!y8;%(E!n1$L07oi%X}RQp3+H&BtMJ*NM{{kPf4-WZib zaxFruKvk)-f=OHHywEIO_nbkO>L(p4W1yaM=&lp~e!}BP%dM2^5q%^oVY~dV|4}Nh znwynK!{nwoO4phlPOPzJ;}L`V)DKY1ds0FX zn*Wgip#FnPMbbK2Nn`-zZrv>cq(F0b`d&C8!1Vjgc zWr)Yw2P;dDQkx%kXC)5jclpY)n`$=*IrT0#a+Q%1V%Bf6o&2QAw1r2Jw&<3A7r zNt14==+mFpHf!7I!Vi-XNc*~t_*YOlK}Mq(t2W`x{#(bfeL`=`nocRQWXg%Wh17(6 zQ(%_l&d$osv$n@$m;-L|227!7J@BrPqhEdMkricNbnFBvkDtJ79(sf|L~20w%B@Ek z3(r{C!hfTy!S$gy3i|qBC6byNjpbk7FN~$kwtjiEkFGVh{f!IzBlj)=2L^{D?)qmu zDJ(BoQ5ar(%xg~c!T6rN<(dtwt_*}NdCY5nu|8dOHwJr9pq2x_Y6LzgUu9_#c%pX` zr0!u`1tMQif5$c6DlXyR{vfSf+p5PCM2JV)i=H+s{sJssW7pG2^;FncziXm9(Z3Lv zdxE9>_>aRJ8x3JTbu{e58Oug8mIDNK7!ykV4Q%(qkwbER945~qHcrLekkh+){{F7| zzT!Q{ADr6RZ%^_oV`s{-Z3Flkv;ECJ{{7Z5b>C`Zul1y7qJ<9^*q4)X!<-GHMhzR~~d{<5s)~O=Xes%i67*w^zOHw(x zi?{?js_v{CQCOe&kUq0e*(B&jE9Vy=aJuyzswLUw#Gql@A>yg;#)HJ@YxxC`!?Sph zM8?o*orCd%*A}DSIeAHZ53`bc!u5edPmrY9G$mvgJT*M94{+#bpu6r~aEHI2=#EuY z(u@4iz{-Ffc;KQx0^2^}xiLKE=1@+=on+&rX`@!P9Z3o7Z3J#G;8Mx~?N}A!i=q&A zKT1?I-6K;XY(;zTmydFt&c-Rm@2GS*!A-n|T8x&1G3paFb((E@?Z-QTmQ#Pqa(d0LBXcT|E3yu&Y~6*Q(QWi$02hvy9q^8S`hNO0_ByfLs@IXk zXU&qr8Xx&-BN?Wh*544-)*x;vNt@8BfnOTHeA9c-pcSf;@GZYrpv+UmB%r)p|J_Uu z=GEYIyXZdO#cw~LLnf(piz6#QE4{=-daJz3NM7jt~umJ z`{q^4@kIfXSyB7s^(|+x#d)D=IHOry((Yp9ef;w_)bR_@M6gQTo!o19lyRPgKG(J^ z2Ry?$iTO#8m?4z2K}Y9?u?)4*s1|Ud~VYDD`4UPMhk{?$F-zU!j z#8=h+t&LX7pvmlI_4?>~d;-F8vx9XsliwkG&iDx8POU9Lw#g-KoM?h00-k*lxsL=QCdfF!t zGbWZ)S6e-njHQAc=yjXT-6=6vHJD;nq#m+xfg9+Ym_;Tk#gl>lw`_tzW4A;az9p;7 zIakNDU94=F+K_vh5*tsSH7=5f-HjT2kgyu_DgMg6LlaFA@O3-pwD7h`;!)x76Xm1y z_CgX$rrNuYrJTAlMGd)q=D?lYK%XNHGgj^hY-TZ;GgWxUw&pIL(OB{PXOG>FR?7 z)$gDC5jn%tg0JBIQJCd{qRh#4u4LATJ;bG(L|4&-Zz$D%?9S~1bvb0;`a><1NSSXP zO))XTmk^(`45kX^w0bck#0y$7ME(6wp#h)*n%80cL}l{)S!^BShCkx&6zG|{Z94|@S#_?7-Injsv|6K zs6P%_9O_-jh&Mg+CB;nN3nZp~XaV<>_%2rIyjT8^IT5xt7|{`p${c;nKC~67{m4#` zY`=;PbF~1P_DnWge&G~0R4JMUJQi;+ZAEY%qTbK0Nws`RBsf0nwX1)zDauYY?yDkQ zs%9D}7gfsl>D)hX(v&oaUF`9=0!@`V^Uido@VE>LUM}uUiezYlP9{=Kfcirpl~4!= z3jaDpJa5JYMUp`16$%^eOKG)D`@KlGw&S9CAf|r@3D5 zhlgd+`U^Fh6^NLjg=PYY+|7gzv-N*w^Q+&U^IMzW(LuOwPr3N6fW5!rUHM;^`X<9) zNf*#;46W7p{~5YUZv*ik;mJ<}%yEXjA-ZoArW1$_Z}gs|(D+NCPtu;w{mh+BFe~(L zFXmCq7kw6zPx&ZFi0U68&^^O|IBo?S%nBRQUu|iO>MNDBh!$8zM@GSLEO9H<|aj-Z!qs;b$NNrp@kJ#@; z-m<`#;%;*3V9Y=usDr2{dE?himH8Yf37qLR+`V8X?kFPE?-=b|v^_$tFE$?f7}zkw zDoRg)v01cEzt2Z0e;)R$m^KqHU?GGN%~IFs*Z}{bl7Oelapb5Fv;y3Kv<=#;&dd$z z=x;h^@Y)P)ifJ~W*&`s3b^9;4Vg9|*-G3oY`p*xQL)B;TZyXC!aAz<1?tZDNUU>7y z$q7^l9if0xoXTT#P4pI*tagp1Y?=^Yj-{t%fph*>Xea|xn>`Y!@D#afrHqUPI-USO zxyB7a`US4zhkB9QKaQ`tpnlvWiM7S==4?e{&@(l{ra1$fk6|p`J6`(lky!e_BC(U# zE+2TUp8$4Bp54#>u;!b(vK=#qAq+Wj8z+1PPrQkHnvO=+q;*K4$$ZAR}o%#QYp2m0EO8_~Le^5DBIgb!D zDI7@4EM0%&EJNrGRoP7Rk~A<8#0xh?L|ZpSFl;24$3PxB3~m&C^%}w{zHY#0NsVaN zs$N*r{l2s-7;&iH+A~FcO17ZS8l&Ri_Ag2X#%KS5F|L6PcU6N7{}l%%^j334?Q9MI zurtN$&}iY51U2(|ryeKe&hv>$^cUGRG2X*Y8(xCLSI)~>@9(n#&=Og=#280tq4iNF!&!_fJ<>@}_@g_<~CM6A)ojeMQPhy?R_ z6*tdbN*~3g^0b@boG>bMllr)aq#v&DIK*I;_Y^lyWZx^8ul^4q4jgH^ec01||F8~P z!KBM47p;D@s*K}}IHSAealTvZrL~QEIk%Q=S)w&8*?>QlUS@a$Z4V~yKbR`>e+-?^ zk}<~Q$P_VR>8FO9V8eh#PRK3}@d@&_9i`mQ}r(e>p(HX^q$NTw^E z^QmrrvhL3U%!hLb9@rO;KK}ew?W#=W|*qWRg@(V(Mp&q$MZG zb@39NdLCr`#EQ3(hnxw&7k;$C zD&#-&0Z*r_*FDbUym!S}lVJ@2O+0fG-fiF@$C`;FsGvF6{~^FKv@&Ndpd?n^7jIkd6t!|n(`5$Np3KPCMi z$*1@&+T6o6f|;_XDjcaH)8*j;Mer2S8d6ig22w`Xd*Q5B*ZwKu#KBE%ZFTKN=!MVJ zU*g791WhOn&Rlgm9&T+H=h{YLsomL%%C8ngngC>#O4=#xs;Af618zRHH9WyY&x=V@ zwIO{{981itiOM|xXe*$RA36vK)W5vxWU5~13C-fFvVSac{=3(k@u6D1Jaceklwa1F zY~=m{SqmN*k4{!R^c!;&zGN;HwZ&?sPr3hc@8*f*;}dT>9N)*7Mf4y2FgfYgcN53? z3^LBEytQ;uv#evL%(TEdigEgnyZ~vo-QccJ;@_Y^Jp(Oc1!!ut#r;32X!F1GF1nsh zdWG?!xA)#V(F_rd2g0)tk%3CCCtgiFdpJVP#xLS6r+mLFES}+K`(lcIr3t^-JdLe$ zdMo&vqfpjonyUI)K^FP%VjU!jr(az;J)lSmTu$e7s-F`Q? z>#gex-UH2pFV*}{)2XzRsCtR}L%lu?T2xoFH*@mrrHdOP&%EX|w82kePrf!54hg_3 z^|BGO=fjIW-&P!pYV5yiNSl^^MqG|)SMTn3Y}Zem6?=ep`CXSOS447No8SX9uX^5b zNl);D%CU}q)U@_ex_IN&Pr(9&o=QWD-=Nq6MOw`$g;0ZaZP9Pv*7~UAp!I{Mc5qkk zoxj^DYNND7Ky-8FvItSJellOed6yq5`eS$CcqYnMe;-m6#b|51fU^BC>)!;P5-J&s zGMsQqe^IM>CA#5Kk5_bPoxXUy>OmE?Cz4W??n!k_>8Y%VLPGF%HWqxToAbXTKKP2F zm(6IZ7-S~<@n%7vf0&`mL4!*`mdO`-0lP*AhuH#e#%-$RPf|Qz zKTxlE0}YJ!&a2aZsJ&2+-t<=-_Iqy||LaoJaWq*P+4lL~4=ozoS$Xa9HoK;4ygwrP zh^*%YPl2)fuXPAh7JDS4LOY(%JltLhuMi(n&wRAN3?>k-PzG8>597v$l=iCepJT9O zRJY#0qabz)3ArTdu%_90uiG7O3saMAIs`HQ`XmWZdlvkV8(gU-4xfAmaGw# zZhHee3|7(NGwr?I4Jl*M?kQQr@YtnI`kjg9k+bcVEM1q)0Pv7A4puBq>$hXyIflx( zLvugFOI49wf`Pt68E4+#`u}Xm|4xFEJ2UD;H{vbzO$v_mU@^v@0XP2eX*|$zh$>eR z!PYonPPq3L8yolCaW>Tet?SQHjre=sO*{vKf;vp~{!#QM7@yqgrH0EX0~q3AME#$S z>caGEAal2oKc$rupC}tx%?=tPK1BY39Qe-Vm(jA=8o&FrKLiQC=rUG#I7ghKd44Ib zikN^iVsfwOmE0Fh%OW10s0kqSoV`sUkGAPKhod8fm-l>GM$f81M~tkZ>2IH(<>QK` zF+FF72s-?uYL(ZAWbTr6y>It@&%;M~f7axuOUVXtA9yE!MwWTlRUBj6%~V6oaS)`k zWGh#i&#Eb+3iP-k-UW*}*sYXDS2&rNW*|MDREQ2T8a1c)ocN~#Fo&tqM?9W%3SFlJ wz4jE3|MhA(vJGvG`A;*i|3}|_^y}_E75jt2tuR{Me}EtPcPi2)l4hU&9~30+ZvX%Q literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/alert-landing-view.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-landing-view.png new file mode 100644 index 0000000000000000000000000000000000000000..e925e50d7f9a19e4cfe3444c6e6e35bc11bada80 GIT binary patch literal 80610 zcmcG$2{hZ?_b;r~)}t++R`D1@TP-bBt(hQNEo!JSX3^FhVyIaRZ53@5)f#H1=EO{b z7*Z6iA;t(IRFz1Gn5P)7w$E?fb=Uh}@BiNQ-uJtfT3mefHV=vp>gcgNK@I zr}<7ZF)^_{(7I>D#B}lo6Vvhcf1NtIGx|2s}w~^*urZSuW<>Q(|%n|9t-6s^b^`f2pdF!`$5@Iaw$UM1dLU zRyB*XHb3W8sL~;;OW1P_ly__jgSYs_zF&alHRBeoFyc6Lm?{O_8@-ldqqFdE!7ex< z7-i;4UqG#W_Brsit+vV>T#hM-ygwT zOAk6(4$rFqy<)m_D+~`J9ZTT^{`8tuoUP^?r^r5isVs|jzh)m3$#S3oS6Gn73?b=T z`bxN!6E**EE?8Ty~~$hbh)f zw(R`D{p`GFwQ-r&V={``9T9Et~jK4{#c8b@R@Yfsl_n$Zjs6J z&e#>HeV^|Vd|0{jb9nQV;!})wOML$*upfkeflKQ8)>5kVb|bLC9u@&xs@;cz^@^e1$!sTY;WeL+0AujJI9VW~e8F0Ukpp1=Jv-+Sj~@l5TAmtz z1NYDL7dc!x{S(GZkHvaI*-Ye}m*$(f4ZkbuITY$ENeEcgy>_ zOsbw%?UHdO58S|m0nOvc)<#v#)35dt@L3!BRe?wgTy)wxt`H51@4Fl1m+oTgRWRa? zB0frps-d-~U{IPudKPBY1}mN`y8AVq5~&+M_@8g`bBL{P@>?<>4lYK}t~Yb8d*OXW z%e2p4%Ud(lcth9@I4q6bm6*#xu?X8KJw;hzwMj>c$3w0C@rs2k^3V~z+WB};fTZ_r zhRyc81ZI|Sb%0>=osW%P8}_#B8@}oh->$`LN47=Ik0bR-(OCmF!gH?1QUpi6{HoGB zj4Z;>G$+K@$?&Ly*@IW~u*`wdz%v=Hpni0bcls3Ep}51=ze#Y%cwLDd+hh=)0e>>Q zC_9c8J#Q>DQGKWTz&xDsGyNfESCX!ip$ zs-8A!zaUJ*J?6O%8~yfPV}ghLn19X5vzO3+%pDP$?s1>P5AML=>)bYD^+&44JlD#3X}}X zTe1XHg%nHC#AAmg58hqe_KGm^+zOGs21A*htWHwWS@CJ~PehN-R0XZ5P(vaChWvbv z&_|Haye?FA?3C{O&y2M`IZ8bKAT0rj)r*QIQ+T@f*M5}H$-)T^kl^|x7&^D;jL&6Fwp|Uf|6)()Q_26Z6iVfQpw_`3h6fhIS+5BNOe!iZeZipujVBzS zeRm}+T^iz&63|Ct+&gKR=9V2~Wb7-XVurQgEH3aEPwes0jI43C$X<8bIi=Se7&;rK zPWZ;|`E!ow&&{ksOmI4;^OnFp`BtB?PkGf++1Za*p zS7!#Z)$AMUiN3`Rx+oGTN{2!FB?iRFYEtYLn)_v(6Ao-+QrRQ@IM04m757H^Z}w4guOrn5@&}Bb8o)tsdqSw!V|-U1JnVeHhR*|wvH?iK?o6KM zpueJS6K&zz{Q+|Wew0w zV{d?7a0}2Mx&Lm2Yw)>#V_A5)3V^-SYL1=YOAeU5%a5iOH=EUG3}&51^}e*jp$wOO zeg?@AI=VxP7@oHL^8l6WFxR(jS*YR9nu{u^jbpxwq}W&FhHx2)+7D7`ftrh+J9hx? zp_$F(sgi}sfd=%2ACtcN8ZY{darnRSpj^dxDi| z)q~Ko(N*e0rA})k9>2^&%~&XRD2I$vrwEstEat;_)(zrfUw5DVvs7O3u_S49yML&8 z(ks@>OH#Ms^~)B|d(pVyOOD2ueww&PM#Ut&3-Y*ArnL1HzrCmTT&$DJMqxA4^Pk)y z9Nt%cGv=ip(ND9MnRlTHCiWN0wGdg@;6;ZF7qTivCS%C;-P7|)^H29S^h!|~N)GQr zRm(nDj*szYjy-5|f17Zg*swL&NU6h>=o z0;ca{l*v*Xd{qX-#rdx*B{(_22-;RtyG^dq?R^0xE!Zu2-Pf$wI|%oxk_tmEqZ@iSP}*3fC6aU4kX+4Vyv-gxwOeWfd;Ld;xGx!q5DEoT|{x-UNhq zSytKYP=g-|jo5pxPI1Hf-ZzJASP}kNLrUkLVh*Z(>+U^DY~HAqj?A zAsuwTm5MkKG!!vI3DQq6L0Oy+VkR~ZR-fX<3$p~Tm*o!+np_gx7OqY8{dUj>9bL4} z@DAm%@i&h1RNyqsfCZ_$5;U|`(LGAFtt$v4DT0k`ABDH@M3+tG@K?X#_ooRO>KUdV zTxr)DmM1(|v_F~_=(=`p41aIT7n7kGI@&7{dN_td)NFm<8e6U!WH)t|c*kk*4(Zx# z3xnQGAlZN!3$*35@j1~>r%lsBHFyzzvp17U?DfOiWW(U;C>Z=(C|!2g*UY3gM)$XA zd8jOV_J&T4A6VCUKFK^S&o<^vg5~bE&~B@rh|lsfHwmJ1LF&A4SU(au2kik{K+m)L zvLig7?D<_(7rK{hr7RF6Z*+ONr{m4ks)GP<3cr+UAC{xP{-7uNQJ3ng6Fy4CR0+j- zf=aBfBafan+7QX3KloW(N?5XJXVFH2@3!<{#}l>_$iJOptnwvXGY8)|4Eb(-zWK(= zSbi2p&ASbXP6%b|ZP1T?uZ?!~B;nW7O+U@T^aH^KGr=A9#Mi-GWijEq3e#z=oLWA8 zS1#ql^xENl3+ITTu5GSlD&7~F?mFkC$4_YJ0`Vp6T|E%G_+yuFiD-!GiH0u-5ceSi zX{TYtJSW(pA`Z0}r;}M7c6$rOKe|PAZRkA{s$E0lK(EhV55dpe{h|F^X79l>=acBV zwA_O&3GhIs6kt>62Z)I5XNj-f*N`!pQ5)P?^mc8O2Zs3?5V`x}Op;?}YD_a^Jhhu4 zkhQu~k;#Uin!KncJSvrH_cv+yD9~h{g>>dh(A!w@DedX@flnx<@rNOsZ$nqqo==Kb zvl6DInrefJPcwUTlx5=syDBqw1D*?ZNe6)h-cO^cEMVK2oTt*7i-+JevxGpSFIKK}O`5{veAoaB)O7iIfir&ouS!FV7)&VK*HvS5KkMDHV_-*QPU0}KUwknR9W|oOe zGKBG1!ZQbo1Siox+XGrEt~#t;7Hyve!6vDrB1AeIXY1oF=+xZ4^jO_yJNL1dwt^${`!L)mf_6r!#z$RIB5N5VQ(R?9ey`(`=steUR5{|@aS4V|$;W;5!fx`(QD$2Q?B@4iYZ&e@8^ zN1!E(#)%07_wDF0jS;|vtil~xw6$F7Sya}SH&!;!0K8wf_r*X8PqTM$zqc$#CJ=0VIyt8 zLhjw0k!4`GjA&SilH6KH<_IGClxl^x_<3F1mg^RnkTD(0_wrhbWEs{zZ_A_Q#hAZ? zSw9QBc#c!+rg=FR$Gtueh~_;ST2nO52fGOG;(L5OLx!~zi# zeSnm_;~iP!)~XC!n_9HFbL67O^toJ}s7=H^8aLm6t`gSa(p5v0x?znNRE!+6L;VLBnnh`Sou!z@ z_=6hyCcga1)RTkWhtzY<%rfG&nzG|xf8$c$zl?l;)#gXAa}fJy3~cO{<^@>ORZFt` z=NOah=Cm|l@P_)T*c&Ix63?oy%^)848^L`8{F!yyQ|qL(<9Nm304-?aV#)6Z zUUWE-#ALwifYc0<{9a!dSFqRO0hcwd<)EB%>H33;U5Pouyr7AJ--fN(@>l-sIEaW} z_g)9K5NL6YCUD8--&Mb#@JVm%Xtc7OUVU|Eu!F-o)f&;?3*A!fk%Xm^}BgU;f`~Q|8G@`&{cS0 ze6tPlYoW2(hLF7R$#w_7H@SB7=q<&CK#iR8^vwN}e6uC+VQOx}L#EG_|4OGQ$6I#! zdFRHcFwUt}Z+DV>GF2+Ca2I6xsm<>VV$lYk z=`N@<%Q2?de`n&E<%ofWdL**p?s$c?eH6gdc|)CVV&*c+!#}=EVD;T;kX&20$*ro= zQ{=Rzd_FfsVxQdX4GzSWLsejt^bJunta&X#_orA243XXU*7ow+qt{6>3%T7SC^eZ< zh@JR(gN@0+_Fn~nPPyp$My|~??L$oJ{5KRf`rzv1$p-E6vTuZnj=qJmb7wXt&Gd%X zo`alm8;*$PRO4-yrXb^_A%M}hsHvfkw&nf>VcPyqO-LttsMbkFuTP?4Q7enL>_U^! zJXunqJLoay=|iQDK6oD{HPXKruYkkVpy}ka;dL~N&z6IPuVuBjF9{}JJezrPd>K8w zTr=b|{>>2+sU*=xQEm5ea{2zUxofvz$fE#TSuXAN;Vz@6&OW1LsCkE(6spM~TdB^( zM2Y)@4;wHx=}ESBU>NS2Og%zji^H&G z)LZt&0K>#1FMi33H0jvXVH*;!wEj=AgNN}Y0VXQv9{^g7woA=MOIQ_sGTuda5JZfs zN0hcMT=%}$43PylGiOatq1L{PHb7tQPHjcv{*keX1MN0K;KA8X=rz?!u|TlG|#i^e(a z(ls?dIcrtEwat1^BMK+`TR!vzXsWMa=6@T@BRNne(%iHdliTY352SzZjJX#wg? z65?lDxKh!Ok4ANYp8`{M^S`k9aDRiP-;@MqW7A3ox~ZcS?3HO+5~yA4l=kW zYAH2!KiKwI5qmR`DUbPR%0I8ficSCO>(TY!+r=Zx``Ifhd5KBEa(jvC9s3|9A84k$ zUPeO*LF&oY#FI=~PDg!=1^#;B{?$hKqeqI4>sm+Od|o+9Y#jai=w+bQpXHg)yN6eg z(jN+Z&Tao~zTlYridBn8JV(>N1` zA51uFEdE*vf~ogy7T67b{#JLn(o3CzgX1xL7TNYmO67OLwLvIFJw1n*$zsK()KS&n z&v>?e=aGeN%Eex`gY${cr1NKbwzY~e<4;=E*v7$6legt$QqsoP}K_hmTYhrr3+(MKCp1q7kY^v*+Wrv`t=v51T#dF~_;y zzGZ!Sd4)$?W zUS;_te$ZB6xPsE=JDtKtQ!AcM0rk^{JO*2Am5aBGZhQl$O_`x~N&Y4RGj!x)8Q=Wg zwXSacXpln6`MEhk9ZW)C^^4FDip?JswUB+-#8mnHl1bg{$*9%axCnhx9dz;ul zcGIpiXtt!=dlRT5uYin6K!^=Q?%koj&u|U`S~SUAdwQ1U^q}$4qbYZ;*~trv9AovV zqXT{o>9gD9&o7nlH=qa$I=v63`rAPmOP<3h8i#YLFKXAZot5oi22N$<(u*k%(4Y+3 zc%B|92sv{d4Vq7QNF~8?JfGM-rN#G1Ra@3clwwtr)2fu&t zy3}Q2XbHBw$NxF2R5Db(XUip#@y}i}z`|fUvN8r*6Z*N`&8 zKX;hZ%2?Vch`WLP3`D#8?tJ$`3x)Cb`gQJPkc$;;8(pP>Y(lkwrZ$b=pmPC-f0S2^ zVs*8Vw1L@2PbY@%qN|5So-x!E?Tcw^A6bBFpB*~D$X)MH_bV6sMf6gXjB;Nre6{^M z^eF4L>N58C;W5SC=hCX=>Dzl3DV`&MVDpl%W0`{WmX3^`y)(3MCx^~Y=xvz!&2M@p zfa-iHpc3OkVMtH^r+AE%k8#A`)t{tjlMb=DhfFX8z}?6>Yxw77@=5?n!(*&{fvc+< zYZp(djtoByW1{f@uanFONVQf)_EBrrSO4hF!)68UDKjpeg%mm` zNJhE^%moh49dSUbh&(I#J|AM6LO=eYw=;>a%tuJi;7E`XsUQ~`WqnuF zGij~2_uD|2^33YR3J?RXUdssiEAlf}U5m@|UO!w z;mlXrtLwTHRbz=Uc(y>@Xwp3^w{bad!8*tpRSivTWIcGZsuRjceX!J42D*t5v+aBk zq*!rd%_nWfw7%CLc_}r@40Lu)``DN--P}W`c5J16XY*2xab8#18t(^Km=r~jn`pyPe$LJ7Nf8hf^hZ6+?SPKmMi96$<1ePW|*~m6t7nJVHq5#o{FXiuMR^T zv`?fRi+9DRiOB869W=ke-Y6#|wr(X_nEn)8>5Qr&vgz`Ss)?CnnTh6pxWBhm&g>j&|#`qod1idz?Il2kZpvgY~4-ZZ(hN9#YzaqxCIh1Q7BP<@0Ati zror)o2jyvt;rV7KZ=w-acVU)r4tohpB1@w#%1>xqk8;Of?W2|U*PFo2lP9JJlUu|Z zxVF39KaId9j)CX%dblBG-Maiw>MlK+?fkTvB9?NAEtc&{$WmMN+M_J2sz8AQdj>MO z0oI@BrERMr-TCB0fil2jY%YR7MJ!m!HUhRcV>!0osYq7Pmm;@dPuaQxjIRnjaKVE^ zKoCT-DtiBp5H>Gg$hQ1usau$DgwE%b^I?-ar;|*Tk94zz`i*9%J+gC^6Nt%A;#?-+ zOHkEG_5vh2vINJaj?3GuB<4?sDzp;0#E&GWRk!XPz`MdcS+W58Xf9)6h9LrsV^p4h z54{KW^;fOD8aVUXUpX}$aM+_!dghm6B0OKPB%PZ!Qab1?^;^XLb=gQepDOmY_!do8 zi6eM=@OtPse*Nth$-l=_qPkvOK`NV??b#VJCZ6Tr<=T7%cgEeZ6|lMdH9^Z)y<1H1 zYqdr>;fqZ{lWLg7^R*-rIAupCaZIu5r*@(K;45KGvHjsWnM7#H}y}5{EP`+aChY*e# z8#rJ7b1fo64!m;^ExN}ec|x0Vq80Io(&-6&0-HSsbn70Nu4U!jQT0|;m#dqB+QLF?We4&}Jx`w? z@S>xgH>@s8SHeRuRel zAyPRqWW}e0>!Q3c0tuJ6pf4z_K#GVS`*yr%o0asK=? zMcX$=LuVLW8%LRXQavOi^tLHarejpQ)X>?G2Ox8wIHk-dQI}vJ&%Y_Sms1RR*dK`) z9`|Qq8deJotf#$~k}?XY7Gh%BxHo<>DQ<6`8_+1G^E#6uu2l4%M}LTh<$ow^%2Z~@ zYu;R2mvtKVjX(m3AAa~Y{UZhAV5KinPq7A`Pz$;Di1i}iR{$UD@4{nFtqxZT81)lH zPP-_@80j#T*zuS*Bk$Lz4ZEz|%J6;lJ@VGOtj(_;GidBKs18pg6Ndj)r813mfP{OnD6=DnSkh6`!85oqIv38PV-sgbRxY*R1EKq%F zlAKzoOzz>mX6Z0QeBOl8T}W;82)^TmhPK~W0WIh7R{nf>SPT>iq`>LW$ER> zWOu`QK!R#2vTu|^9qaI!bDsDv;G`u6RRTc^nj!v0uhrpxQ2cvVz5&;druQRW1BMUB za+LZeUcz>rC*z1g;l{&zo&M0EINhQA^xNu*-bwNkzD3sb#;Ut(VRE|3d(_dSW|ed2 z{=j&MUXy4+rOo_ZL(DCW+~`h9J62#IK7?PUNt5bjr$^S@z>^o)@u>UKQbbDXr6HNa z+APy+DrteVyG>1f^+JcM>5)$IRqDn*P?i|DOKq&cSRtDn+i?;?3!c=DgIDi24;mb*8QfR>g~JBwlNPkSMM$;9`4m; z^`=5Kd5vpNbOHvv_Xnk4&0?5iJ^sY(&!E8day8!Cf|M?|#2imuAE0 zL)YpbV}Wu6Pszv4bL6Sen47mHN4yH9yHg78T5+KeJ36&x{WX_t7UdL#hR~m+4-vIb z#Kp|k>JqTIVB^T*Zhxzz27E#v^01|W)4(|#*VnsF_j<;v=VfSBXFg8d+yinEUzKdi z0gR^m_5#!Oqt69VIDulZ!(|Px5IC2UhrycS=?g`u20iiuBCE6?cvv&@Y1CCF_-*rY?d$q^>)CNB|CeP|okhM;j}sfO6kxV=9o`d1P7}5=lYI(9F7?)c#$W%?UP-;3 zzE(e5JPO|vi!rYn%9tc3>BzLCjaOpEQu9cyCFE>vBd<5IFJj3D5%+fQ(% zaw)d$QTSy(ifomkY0c<)Y}a~VXz1&VIlkV^K(Ku#w_oNn3FFIz4X{o?jQ(Kk@TV>H zFq93Gf&crRn?D$*)qIyp$1Vbbk64P+`bwkw3+cjh1A~Y55a9mT$PhpKlZ@CKSUD+J z7FP>vZl@mU35(EJi2Y9X-1PK7ma1k_*t{NU=iu`)BUvc$=A?2jL&!pKwLtz8dCV<} zFH30bb~QPEt|gFJD2#Z%?~oGDw&nLKRdjb~PpdBln2y>;cv;`=j$8K-2c*+p31kEqH7vb_rVqXDo`Jx7 zSyXtugT)&(GQ3qp1Ijpc7p&8a>2yvChpj%o-bpM?bO#or$~_dPi&Yr3T~T7yo=&}e zSMsPybHCwEh`b^3Ji{vvycco=B*N@59~qYw%Id=!YjtCE%ZqWD3aZwjdHMn7i=8{{ zL2LEG>TUbIcCo#&!b8=}L*sODlbAmU{4;3x-Zup{jth2YN*j%BENl9A_6uFWUcKEr zfFOtX4hhs%Y*nXg+p+R-I+1F-xXcnEVnrw5WWwR*!;O+V zj92;kY~W-T@ua%9*YG-aa41zA40~`n%4B=N%kr^&1?>yl?z)b*wJM>I-dIFIS#n|G zrQA~sd8Wn+`$)bDSI3A~Vg z^B2rk&r9mT%Vy@WB)Qk zF47zJa62&j#FSzDI9kKvmd((In=L7evUZEZZ$r&oLb&NcGh5f11K)X&un%K?Z)h9%ifM-FcY=4An|Hl~8-)5%P&fbq{xcp8~k%LB8mc2u$QL#yW zt8Ee?r#PEWSJ0_W%`6*&#p37Rt_`o1tx!27nXdH?_a|=#K5tECtp8|=zx8RorB#a< z|n>@y=cR$wi+)A=fb(6QEV1*0;4$*?zij{ zpyOSwP*c)PGfJ7(yzj0{Au_%}FDAjuT|Xw;m6eR=01?I*B7{>JRZ6EU8jq;`s z+_u_8zP7QcbWwje?Pcgrair~|sLsTri8{ErVtw&1-zB1A8j8O5b-!xQ$o~vd5~#^s z1*^>*de{I7sktv%T1^^bPTtN-FY@h%5c&Hw>CV-* zpSmm--m*j@XuRmHw`e}9n~p+qkWXQ?EPlY6?E9Ax7uP{ahLj#W%-ePlm{`Lwx0wx- zfq6lGpk@NbDN0T4JAAjqt7hrJ&Nz43T9=u#Y+LFzbNi^h_?$P*FT~;(ea%STK?IYS zg`axK1I1X4y)QJMK*nN#f8iY5#;DReWEaM(lvQr4*cSWFl;%|s=M77Dk{1?+7Zprq z&1?ur6uY^W2pY@!8WiwcIkbwDdgvP^k}x4Vvp0dccK*r~%3w{y&%hg0>bI19Ae=ij zoPj}8y&J-;bv7orB~@=s)mt27agA^Gy$aE*g8~V9ElwmE@R}%*g!Y9R$%a=?kz#z)NISjRN z2p{xStQ{V4KWpvD1G5X*iN@z(a!8gUc{bt&u_J)ez3TR#E1exm6`%h1Qa zh9)&{yq}B1Xp`k(rH{p3>Ft8~;wsaVAmjid1i6K#Y*d?H|QBxzZq? z(4SYYmX1>zP0>J?2S?mkmBPXh6@$UG1*1lzk9gCS@$KDW7XfEq1rX(;Vxp_a_G+Ha zc&3oTBuaGc&B3a0cZRE<0?|hcD7QNRvtpY!ov9m)FLrh3gEpK&{oo=8O@WKR=nGD3 za5(jSZl!l;WzCrzhk?u4o1xpys-x9uar+-<9>@NUeDl&W#Lcd)OA_rI?6(MwSJzrE zJuf~DFY21(+j5z*b#qG4fC5()X>u@A9B)}B&%G|Ih$QRWb6%5}hCs8P3L6iW$qC}8 zuEEFW(l-1WH}~Fi4>peuMhHcu=Ud{+Ofnu{QMg%%#xFbhH_+5^4W)&+GeSx4xNYR` zMnh{z%^8*lpHG*cuwL^DS{WjZ@2#Fv+4^c?!znpa+#$CSXrI%uGX!fgZgT=d9#5I= zFO(IKYtD}iq1s9v1M~ApZR#tla672c0EqT&H)k`E^S!$>+8wyR8dXmViKm! z;`~Z1G1fp*Dhao)Q|KDxkbg@rEm4?EX$LjsvT+K3>(mjtukE~}EtFDt-(yT{CTnr{ z6GQZC`Nv{+SR3ARMoHY5)_RAilX}Z9_4L*#K$@}9B_pw$OW-G1kSXsynX0sg=(hRq z!mL%tKJjw&oH2Wj&t^yeblQlEb`g5IEi6f;`O7&62Q*0**T^9vlOt<{8<*6lm&^Ag zoUoxO3g)^lX;Ni_!=jxL$bENSp!Lv!xvyK|ps(4GwrIw^I20Ttln&K_Dc+F6FfMNGwrmNwTR(kZaZF|rA&3U~Zf zQPRPx9Ew{@Z|Yw|5^A*jQjFd{_-2Abg}!alP7B*N+Gb=sVbk+;Vl{SX(PD35iJu0p zQYqMAr&;gRgT_*y%#gyMQ`!fY6_4iNylF@0Z^^$a)3&w9JEzh|pxD;JeuU5#pd?p~ zZ3j-MDg-d`T}=HKn>1`F6^LK*k&ctzXQLP0Pk;X~zfXUtrVxGaMWT8Z!lzG_C_F2} zA!>N;$g5avD1;LSYce8FPIgT=ErY=)E*wQ52bpN1#juBHk0SgP%xGr0WUwy~P)&i5b?i`R_|1JszWPL=ZO*tgrN^NoP=La7nyTo^l{%u zWu%x3&rT={9}quhxCS2VuUN_J?PNZ$*J*|-EuuA<5vt*%HzK=EE^|d$CR8Hl&-acd8cP~rx zI{h?Jzly8!u88>YNydA*!>2_m2e?oY$~q$M1mwj9(>B=C%`j@u!DKTKy%$_p;I1uT zQ4ma0G{!F;aZ17Zy;fwmJ^`mg$yhhNxpqIR7t_AT1IvTL-sf_v8FoR$yEJoYNb(h^ zm25k_!02dSN98^34dAm;hVUQMsCUza5b2)$s1&Lv&9j%EYd>kZr==TZx8k``GsTjk z(m`pz^Uck>!m`fE8GB($ZStC?acyH!@&00#VR7MQo@*T{(TlPlOa!7ZokB20JtPU9kXm32?$Z)p^rps z=G)U(;?5`GP0Kcn3td7|Xt2TioUu>L|0L<3`8Ysc%G}{}Gr!J;?-$}UHRbsa!^i+2 zRN60F5Mr}+UrW5zLzaHayKZ;5qr3c}!G?5&48ELUotssc72HHVD<+v`4A$pW1mW=~tw_s**TTG! zJ`dmy^8%!K{RZl>3|V@_vdjZTNdnGw#5ZXU>pX`uAh1TuG}-{!Y`>qyUMjd;$12{b z!?Cj_QD<)DvHAi`h}EnyY9o2+XneiN`KJRLrfKYayWMQ#^$KG=!I$E9k2X)b=6LhW zIkrt5$yi&7kmdL;-&mz}NT~$<{`B0ll24{`Ms$&k^_%yrzE)UeHV_eajHT`fZU z!w+4x?_+ed-kWVOa$OgLxF^as{m%Xw*0XW5!{gnD$~v?&p`2J!=UUmwG6$Oa8Ybkj z4TkJ=>urp|^M_z{*me8Gd2#k1!3+FVZZ{6#mB``m?)M1yetqgOuHFE<&&**k7#V3$x!i|<80{Ltjkj9 zJpQ>-?GILZ1YHm{fsP#@)?xAbhxdtn#mmA(0Q!FPuFes#V#hG#SnKKk(ULBr*@To=A6c=#rShNd1h!ifGA!0KmJB zQ#xF`A1G;v^yprFCQ-yG9FIrozSlyyN&}3CX}Gl73Wc^=SqV9rjX~^&9($Hs+SoYZ z_kfp|7mak^#y4}i(3IUpq+_gTMCFuIqHODjTVaQ_1VdiqAP>iaO%t2~Qu46e#%Ne&5qhOn2ClsGo(S*6=!|ColbsS=+KkNBIETP?gifD6nDD+X5uel1Z0VUggo+9>Qu2Hw_x5_Bg* zzqEfnOCO(szF=pt*5e0J2>fEYvk7v4^s%_d)$IC(ja5M`M(Qm)=aE;jHpC`AQ|#&1 zbc>*}6w4|dwNRfpIPAWkxW;L07#ww)K=TaUG<3Xp<&@`>%m1=MUtPb>n*co==+7aV z=*@%FEN{zLQ*U>*E2gFv0W@UI=KS@F=CA@CmA>((N@_@zxGoc*o8?ryY>e>1q ztUlV-NNPae)@bNzYBA=fAYzuVIUt*Cdc%f7$zBnNenU-qt^`dPF0eQzCsn59`7EE=_|IWUFoV1dvV&e(&urMyDbnZJ-QdTZI+RSOg?69k~?Uy1R`i%>m)dc`VmWEbAdW1J|i_fyFpZfHofET1@ z(r2f3NXIPgx9Zo6DdQ_2(u*8^0S6mq^$^Je?OaTlj??I+l|X#HFur|iAev>d2=T>4 z7Hg+o512M1oq)P~ZOldy^^!9hIt{~rZa`Jmd{#s9FfjRa!j8jbr*T_eV6cRb5 zfO>SEg*x@nzawe)7X_bMsy+_?eg(CsPvlQ#-BTST_4fT`!gH9qlo@ZmyyfVXjo8W7 zu*5EXDB793K@ufB>Wl;Gc}Q-w88|iR3l8suFV;oj`tL6ZK+FRJSFQ))Z*Jk;ZK2Pm zA{|SZ!w8d$)r(TNLCI9X!S|ldNB_QndbgLkyEIzndxPA%H*;I-PejDw-g~WvcP&)H z^XUjutaGq79tm{bix0uf?Qk2y^hAvK#&c9*QZU<^9=VVj;h%@Oj)|v&hujy;T|z7F z&9$qetovLB5-8)9Pn^@2fBB>ev4HJ{5rA{vEc5ZOxx}02fFUi3w9x#fLs$6B z&XgponL-#I{2#=R?`=49?^wwtGYO&~RN&}aij?WAf!GTY++v5;`(5F5 z4}vBVE{xfUSdimR>>`#`Y0q{E@gLNRX9fxRFZv0K9-_2_>b;xxLUB>*sx;wKI**vP zEAL==okF#Ad(1kku#Gpm@8Im3qZ6gO-Aa1&4l0s?B~|dBi@TeuYx+1w?RZZDDz~1y zGd}r|ltSTVX1r}V_g+L|R39&iMJtbKhpr0IQit(WZOxmNXga*GdoUccbrB@Hc|LaN z67Z+d^8s-#y8aXN4^N*`Fe@~AT8q+Re8tU;@3ql5^wxN#lwsiJ+H5#@?|F3flXv{u zb_hR%&U*2Mqx0w==xG^M)OYk1)^$7x+w|b+(rs|_vB%>$Y!C31y_^j+NZV&LyFKgg z|16~TsJ_d$Lu1gnz+_Od-|?Z$EcHQQlrUmh=zDpt*zrN{1#ZEGBHE%6Vb3y?*L8YL zbVXu@o10k4DwThs|9-2!I!KQ zxI9a#l4AEebLu5}VEQfJm7nRWU7Igucaq4wIFC?;q(ANKy5SgP^IT7xz>7E#!KS|{~?z79WpHcg$O+ijL5eM}fBX5`kG;v@f z7e?I$*o+8{3@*f;nELG3a7P3DEfJ9#GaV(RH-s~%rg!f@WeGVi*n5)P{3J151bFZo zPg!Vy1bx~|InL$hS3C7TvC=8RA`NiDK-gsP%bTZpCL}Hx5DpC$Q!BGqgRCt$k3PdV zEOz|s4Sr%2CubUZ4bW=z--(%wH;!-YW$yOg-gwYy-rzG<@*i{WHuxzIB}P zkJ+Eh6gUYv0{qm-D74cn(^}?S{7D>q5xBu=09Jq4b~~fI(=9)0=Z&P@^fUM;dH?vYqXBC%rGczDmJP{wXH}~}?*3jA40AsB zZ2-b_rBwqDOq?_lr;c*60U-zSP~DTer}MbJ0$bC z0l*FX(udQqS_k(85F=sLS<=?}M|CX#ZTe)UFUYpQ8>uhTpj$2W$mf~;j( zJXFW#A};Br6ug91x^f6dD=a4@1{y0t4?S#HNIoUO@P+3GH4;;m-N4snKK1eMnv)vJ zwsxztP2o)EU;B^lWage1uzlYr#%s-2naKe-Q~jwWf3{1p6f$6qhjum4uM~cF^WWDL zD~qb2naC79TahN*E}u5jrfEOiP_rD8Ft-#ZQ_Sh4s;w&BS!x(=Vm;nq4_L*#<>1uI z3tze8xYQY@e!i!>ayIhaI?{mx?zf^?AwC)u*bx1*kU5b<1uiIZ;v7@&Rvs5i0g-5M znw+py)T$TKbjLY{1(8)>avl+?j2KalXJnZNXObz0{7W12z@==~cGXeaP8T&>&|@;* zx3o@KN*>IIS>yq@K?K+Koif2=|3L9vg~-UYe4LG3X3Lc1S@H{wqt@iOCVk&-HBzI0 zc6urlxgQQ!7g3M85WwXfGg)q{*a0oxt}qGrZQvnxqVA_y+!4J~{{XxA-A}`AP$HnC z?Ryeyy?wNk3o^f8vH`JGQGB;0rK6_28V`(@p!j8ZCvw|jxp$xcFIex zuX4~1?CcihkERw*M^5%I^e8?DwnCSopI>&acIhwuE6mLK2f#wKE6H6FB-;}%=0eh4 zRb)^}#uD~7{VVi6BYlj+g`2d4M4WT-mGIdT87kq)C>@e+u3|W=UGGJEFeE|CfSPW* z_0wZxnvKUZY7#u^#Rt%dx6NGw(-H-yUBEJtqDP68;kI@Eme7jJgvDn zl2)@k&z4?-;LtTqC;C}d2{G6e6(y75xH^&h%ue7vWN$UkjR;ADe zz(mazb$ZL{CEEXi7USYR(OvBWCRF<1e^3{jv!#Uod}u|j6uUBm&IruDDi zTw2ffaX&oWGqxXRTw`ApkdR&ypP!Kx<4rpEQbwz{$!F)qLY~{}omGQ9dwRQhd65yO zV?RUsMgZ`U^W9p?du9uS-oSYBJa>Ov4oHj7!}~cj4>amD?TaY9so5r&y$71zUhP7b zd#x-Pi`nkRkpAHL{eHWQl|tSJXxJ-0|5`QY@mxTYtJ8b7OP}>%)d4zM`7ql?YGl-; zBF?{y19Fc-Cp0#A-#xvdKk28E*+o3AnA6VU`;xy>amjMr$3lT5f}k%flz`-0o6A?u z-xFTT%{!{F_pGzeii($aDdDWGEfkj7bC(k(n?Vg-v@{R!Y<1){i$&tO>xV8x-u;!1 zslIS2xCxT$u3~n5|6@@K>)J%!h%$pn*mk13n9ezhv}8Rs-{NP9RL?(_X6$7QRv zK#?ud6k&uu-(Sz3TOegC8A)*WMTP=^>k^j}&jr`W`0?7w2>hYtp8iz)M^1T(WXw2C;DAH#{+>CN|3Q3x(dvTZCW#u1@BT!cm@Qs0Q=a# zWe+ie8NwYmCDJTuz$tQ#lS$-A|8;c1b9ur>ftK8ukVFd7dOU|uF4dX}VN};HTfd4> zz5CTPsD)%%Q#Y_8xa@bX-M5P)RfK5{3jO+MZFW*Mo~7ZCsV2V}&_RA}Lsq11ZeOW8 zCc3__m49Dwm|7SPb9tCWsox|K;`=bTn{x~3S$^ajbH|K^QdE<#M%}&2L(2@ik*~~E zl6scG_bxW%*-AF9sRyEerwIksMg1rG$E>oJ;LEiG&zjI)jdw_!4u+Pm-k0#NR^Ky? zn-Jt(YR-C5afQD(#k1!ov|IDG^Nyi&J+)nElB70tta;NM6T|$fVOXN<;9OL5N3fLQ z520SaE4Gl%q31a6i5$LnIgg3;n0ub4h?an6z3e&tymAcWNQ59Pr%^1%HfpJK7C)N% z`pKYy%xoB`%72{?-JM6ZV4a>Nrb@rEJ#V2)Xhcp`I(+kimQ!kPj!5%t>X z%=d9S5$2g{p2c=>tQkm41>)nplcKB^&E3ryEet49{Fm#g(@5pFue#{N(#}*Qtq{th(WbT3*5UK`i-C9T0%ud%!TqtLMaiiJ_A3)m~th~rp`UtTyPvVX?4r(qhb2H^vAjQksn#Y z%P(G)tvG%fTh*EKn8@k7S6cG}mAjmnu(BE+mxc@-{}>+ll1J3GmhoVRy}^ID1n=af zTREpce>2V3T(Q`9fiaDoR=Oe!(mUQcUW!TMTI|u(9AJiz6^rg=EYTnLzJKu%+31d* z^j^3KrR+#eJhsO*w^_APlAwn-p@QQa_|2upGvRKn%?f=6xpy2*Yxp2zlM*9*8_+pZ zkky%y>0G=_;jPP~(W)h4YkqU*s(V2hk5(l0FIfaJ2oE|P_o?`1X!ziB0{2#KkoATR zW8Z%nNeLrKJPLGleZGwt9e(k8WngUnG0*cYFf79aoW7QQ3rW7Y-2h9Z_Ixj7?iWf; zPbu7|LqD_~zn`ABeCI_Xn%;e$;tcwuo&EQwaK%ex*+ngQY`NB&D|mvz(%=p9l@C@P zukd1us3PHbEcV>)rh1`TkFmhuUMY0qW4C?HAaZ`i*%uJMhEXMB-K*kPq@`E%%#05_ z8v=IVi%Rk}dm{$>_^HM`u_LLg`ZCGs2rlcR(qSeky^*!!Iu0*E$AQ@EF>$qbm_2)OoS%mvj?(RF~2@O2mcdUtR*M=F0=kmU zKyy#DAy38 zHRJndMy`4z&#{HGPQsxb2y+lQdB)Is$fymva3JUA6emGHPQv+yRM(v@vms*$&9yzu3VYm@qB5(Bq=_mf4{g)R<{kSXBjTvU^Mau6N)HR(qu#7iEhld#0(*~ z%ZLqe!Zmq~1CvvSkpZyXOG0bANyJ2`)(TcZ%5xt*iD&;q02&=2I^PuAKoCjJ%k%l6 z+)?v1X`THc$5f(~^TRYQ-}hHMwKLg_^assM*-Xd!?Ix?M`CTzbr6ZK3^*1c?XLJIW1^QM4ty!C{#t8Q1~b#{%@3*{^zIAM#1priQUZ>4KQ7wo z(tThMuDQZ4j4g$0^Bjun8pH*Byw29BGkfg$a4oo1wXm1oWckQBVP)r_RD6>tDN~xs z5fvP~aBX?_E4$ha^QU$ZQQhmE54ytI2jwQ6*y4{wi}qRHJG>i_&(*m07P%_p-fK`c zj+TP2CzrUWBMfb}4jFG?>dSS|ldI+DfoIAS8fd(O)?>3OotYMe_KrMfN`mpWt~}nk z3i?AZis}Rd0tTWm)L0;o|ApRYbgrm958q{Q8y2ouW=9$Dy{`IvLfc2J4EN;ey3mY7 ztlThipL3KrZGu1&UI>khl+`*l?&%#u_h|U|eP-tt>U)fUyy0&Sa=o`BH}w?5WX{M$qE+H86)}gp!kHB@%}mL_ zY8K=(^Tp@p@1GB^VJt*nN)aSF<#^)i&&xGC97jv`ll6*CD_xUp*t6DJS~A1HUj*0( z3kS-cvc<YX#UwXAIP??OsRo@ zHP?aG;1zgY<-X1G{92z6*GshGuYWuBOf)5yf=rbpRhV3Pw zSBKsI5I8+lJ1bl^QGOT+z&a=63v_-AO`22>mpMEZC(P(L%FcNRHBy?e+uiU=MgV}! z{B1A8n{~W4g$0U}OHrWwk@KXC@i zU+rqO7%kZ;rz; zvD~#}cMi1vCz|(v0@(f6f-FGs7XB}QU2Y@??zjL(XmX}3XZUli0U8is7^jX6z_1a$ z^xnO<+uGWQy?W1WZR_OOq?}fdiUj_%fyN(#gYW+ZapWxlAU~e6_a|Q6F7?@}cTbK7 zfKgTdjZ4&G@_F#mFCbR7o?Euj!$<9tv@$Sr1Y-4F^PQewOT~GnYj=PTKw_s~eEj#P zk#K#{RDF;1!D*3{SbxPOZ2Lt9+xE0rDRS!r=+_iaDO~tN5a}2hZz^SMVoW=n+Mk=e z=T#oY1vkvi<{F;XHxXY(^QQ7GtNs&26qtzj`VSDX@h#vtL|Ct8MWMUtwm;1(UAe3F zUf=Sk$DsM zx3Hbra!#l{4Dz1xw<4pyuvXq+lYhwGdvH7`oLSbK1>He6bzUFq1uh{+FS zpGe{>#nPZ*`)8|PfC=0sN*ve#vUc`Ni<^wb0L1b24>@<8_&aRlmcVaMQ^gm`Y$15e zhRtdwC}rvV!Xx>|;%C|Te49B~#jfF&+ztj=%nzz;@V>|ZFQatx!rA2+Yb5in*o6Ga zp4FFS401^ch1}VPyLXytuX#c++r@-a7ThG@(AONHGj^(hoLp0y zH9bBLf|?wuiT%k3Arb=c;+}CG^-zDf8%e#aR7+xMitLDR*DjdMR2%)>wSlO!D;b^QFW43zifL}8t@RfeBW2HrR5?6p2{O81j0273fEL2ab&WvabfIqBgtna z-X4xHc>~ke1>Ld^ebDvPaO~X)kfs;We22ToN)SG3;IAN9!uB}o z7IkXI>uMr-Rxc664$~v>!l?F-6@+rPx;MDJt+YP(^}wVqkF{Obdss#SdfoaE{F^j>Oki=psCN*yvH@mwz5Q$nyadB zR?4|vGG$L}-+QPUr1a$tqN5uKV_YW6GOgz~Q=lu~Qc&VCKVizXPZtGosN(?Cy^gWc zeCJQv_QF2uBA4VwI0ow7J>xK5Dy8)nC7WamY>=2LwxN;?OVK}@-d758#`Z|bnuUNr zH$;baUD?A{_o%u5h%q47CHE4 zB}rvb2u~!XL4zDuq~kIDrjB**Y|**Ap!qo*KhYeurn&&2+IQ2(`rH}6w(Ku)axAMP0G2)v8-_kh&BoQ zO0}xjj$y-uV^E1WHUl@O`fg!d>W!54TJ7GzpJMgJC8i^fL=5(J)|N4|C~$2z#ui~2 z^4vVuYCK*1zC}qzg*)Ev8Ln^(q3b(Hd&${Xyi`bi&?(obaVkC6K&US3Ax`()!d)k+ zOi2H8UqKvXUB>p4cVX|JjCpheW#&f9azj+5nCir8ImVuotM>QZ!d&6{4`rKPo=>-h zIvuu!7D!?Zf369UKnu&Jo(Doc^PeEBb|IX%DH66J0M~LT{$F1DX$o`=h{p!^at0#s zaT`baX`nf~HI14304O=4;b*|n2rfZA>Vfuld84zUI1F9`aRK(1HvZ22r+__9z$eeG zA)-$M^K9buhT+;t!E~VIANZ)(PkfY5I6}7}@50!a`F7gZaJD-671iJR_d5;-c+tQ) zdZl7$U1=goS%}Ew=Qzkbe$W-cy8hOi?B^+0HRrnRI1^rYtp0S5QRphA{z3Nmm}Mbl zy)6`NJ2S>gKF~lM>74pVO~*An6T^zIbf64}=E(Rl^~=3CmgDDpSC^oNB@t1RoKAY4rIj-%C=Zvx-sC8LI? znJZYgp#q`BHGaLMsUa&j@*uy2a}-af0B}0|by7Uhn$f4UXimKT&9L64fja@#G~jt; z1OM(=F4}F94U?)&54^+){TPk83xu)K%@NLlZn$}gz|meAr(dyYuJ6v`phg?!GPF(4 z``%X(PdmUgeuBAEi}i$VfA_D$vJs*EdE}nYj3cPo_30qV*w?$Hgc8W{)W3XzNzP?N zb4#uUu}j_#($-w=JzfYWArhyuY*i&!0@*;|t0ISrp!CE7`+!}4+f=dRIVs4%zJmIG z4M(yR;++ZY;RIL2z^f_w!s}1SAFz3``3ud}=gW?5ham)>N2nh1yU7g`_Vc0a3$NZ1C3vS z1acVR+r+sq0{TLZBv0zhA_H=_x#0s`>7UG}4CS;(1TVaS;7PBc%AubL)Z3Ix}FP&rR~7;59^6-x9Ch>^Uv$#`fr$KLQAv#|GU z!F0Q6$JO5zKkJkIJcg6F&Mfx<1h$_=H5o0TpB+rm$xRpeP8y8Zw@KPIZOT9l%u9&o z$Mm2;QG<(9#HIIei+8?h$VvL6$M2k_T9qN??t+u-s<|$wpw0f;lZZ~mE(OEA6qW|; z<}H01sXqkmv$Vy`Cdiy}wafb6=U6JCI0UbU^VGYc`X`9MlRQ(wY%kA;yn>`>F6pP+|FYJfzX8yc}JbjOd}K zKt}0v={;8~W}C88cy_>bm8?kD!L`LV_iHg_sD1lFQg)6O2_}i9l~4J|HXfj>(d7U7 ztH!6Uq*hM_`-CSWCHDEtGXYbs!^awCt}D09{HGtw)p1wsyj2}$nr%jEzG%TT?zaUu z?myA3w2-o&Xg=#RliL$`h`vATnE2d8JGAqA#fHdk9LuaR%IU(1UtF18~MP6Zhj&+ZXYStXi zy!`V0bv*P>eb(Pdj&%e$;pWaI^@9;n$wv!gnByAdgqH_fa8ws8`Pvr9Kb7k& z*9ez7(`xg=3>Wp36S2_2th{lLfJ{4{`WRC4P=wq=Q-}N>efpZlqu24IZ558-xZhOB zkMXHRY5^Ya8uz|m^vPWkLZgd0*ta6#i;6W7TOBfcKSZ{gQqucB1Dqd5kju0Xd7*<> z$}JwHb}_xvlVWC+u=pmArfT|V$!DHGzdeH!c`*>%zTE_?8q!Pfs5Ryl@iisEo7CV^ zL8;b7-VWg~u!=s?(BOR@!Dl%vPZKgZi>a8f5jZX}D?Ktk=lfmo?&6es>R!C$+QeMI zsgIb~ie0>@D!R|AzdJZ-`C^(Lj--j8*e2xqV9yl>1;mBdARNZfY~dBRhWW$nh7z^R zVCy>brUBZ7V*HU4MY~81UpRcKmwy8T=rL7d>BojHO>oD^TmcODV%| zAuN_W-N#o%E;T=${zl3}Ju+a;e zg=ugNS1LNn{%SoI2&BbIzd(~_*Y7XQ6Dt)&Rwr`L9`9xVmF^Z z`Fy$cza#$?Jpxr9_X8fjKSu%Ge<^SH7i!Y~Kb^V$8x#1)#hMXuV1EBkbmQdP<)r*u zL_=Y_zA^V3?DSixc1T3^#dg*}YoTBK?E$tx?mv5|;)CxfJepvGzWaCPpnY$wg%E3w zhD3^2DL`%lLL|i#B2>xveYSYz_VyJX`-2LzYE2pUX?2a2;h~-DY5h;Q{^TMn;r}ix zdepA?)EkBzt_D)dQw1i!NLd|NY{T7-bZ_Bp~0GlmH7vx9zFMtz1(|ZaC%~X%JHZ69ng`>sRH5O&b>l+r-WFf z9j7^akVTMc@A3$X*C29>YHJUFl1`Fm2l4@@36vdGYQ@VZV!>U_tRi6X*g_^F=O&0_ z`O@#2$8hRcbvEWwtj~LffQz4s8Peg-JyX<957a7)SU6Bn_RP6{>?7$~Af1+s;vVQt zfcvX@zdI^83w|91r)1k`c&l<-j0fcW77r;%aP&Eovek40>MK>a;B~piqer)LeY4ve zP{m;k@fzF3&T9k1X*+GQ^W3sc#?EzV(BiI0s#x1p7I<0#I3WTv(tKdr!(V;&JAZ!> z%n{H3qXqJ#9NgZe57@j$ox4CUip2ySDqLvXnK~3dik4rQ>3pEZsE^sJ6s8!-Tl@FW zDH{KlCFtqurWGD2Fsj)BCspel!N-BjRK4a23>$~F)R zK&E~Oh>2*PqohfL=ym$h;gTN&2fsp7aaMQ2ZLQxs zF&G$J(rIG!(8!>(tIIJVHY&=p?&Y$#zgm>=a$o-r_;YN4DNudsB@n2?@~VEE6krCC zkM#gE+c$iVrH#BXyA8=$rv~)uRiq%JL&QXJw`2^{a=orq1z^B^M>F|0Q1l#Q354vg z7W--74mj|lTNH>-wAe>hOX~qLb;Jb#LOS zd3!iV)~<8t452#cJ&&!eYVBUNjMuc7OxJrXP$H~7ZQWsiea>{~VJ8s*)B?d3&NX4< zRe3UZA>mxc^BOmP9%}`uNI`8Ug?K1twEqCx@C|4CI}HW()|U(@5?{(Z3)}F8Ke{OS z*)&tsI;2o?`navwKeeVCY|9BhY*9*^)ns!9-Jn%8xH|8oT!t%eQpo04cdo&)*i^Ty z(Ur(gN_w{{DILkM7*>-*ow#`FC#HEPWfR6h=#@E-qa6splwr#4s@OC}=$5k8~ ziQ7p_0^Q8g@EHQ_Z5+7#FBkWtXSgxZuEJ+2NTJDnoe#_9Zb?v{a(SY6QA;(4H4$n} z#+$CRyczRnS_@20ZD&nKb|zYJl+Jj$2L$1`Bs8|RIh>Ch_5{Y}y;dYhUoMHYkDCRA zjRgB1ob3vur2TOAU2W9&G2`m-t+=D?+(0aUyl4L8+A{n2)MH}%6l`t0aQBe8w_Iiz z150*%;vqtnbf~su2sW*jp0qihJqAcsL)APDo8sCr65LaCw3N?EOhtyrj-+8(p0)8kif*cK^Y zG|*3P?}8L!h2j~3{ID1xY3%F$pO*O#bxO{~C;iIwoNiS$N`21N%#bGtKwDb$dx7IO1b(h>P zrEZj4K8l^TxZh(Tk8es$wyJupo4zw_x>;3ehUpD_r;#Go*z5z-8=ibma;d+S6FM@o z&UKx*-4D*pJd#P%T)=D7Oh-P2{ks$fkdpzXmhYP66R%)|E49HVORgV>gEUq|4G})fg$`&CQ0W=Xs@mb}xx_(Sa1R z<0S=n|2jE0Qp+qjhvH#190E5!m2NcFAu}7Pbcp4yYOzDHhjeLA$Ipt5*pxgtk}JDA zD1_IUf4?MW8U5gV0B^2T9bDp&BT&ZOtCv;IB=&P08JrZRU!uKOMxfEs^ltLa%D|<< zV@g~DxM(+y%dQ;ECbu4XcJlD8zsKGg+_P2fzXsh%4m}4+uxn-5rUPz@Ayr3^^{q;< zn6*cvvX!PkxHQ!#gh)uuoClD3S_|ODUEaR zT?w-r;niDcv6K65n$P3MGB~!wh9S37I@thXj6W z{F_^QD$|$AjdS_UUK3-FXF8Xb!IkLzO5=Twz!x;C=6zz^@EZTqa9`ct17c5@v*zKy zR36UJHYMf05l~)a?g)&_#7lwPZ^cL()1Zi9D} ziiKT~!f3dwhTi7jfnqyV%{-T~)613D!smOHKgneB-Dgw1y3WG@E|xGA>W_V1(V7}* zk=2C@Ia8{d2XahZPU5*cin@jlP8WJ~RU%E`6Q}Ji4Xo_Oj#q8&;F+$_*gF^X93{E6 z(`JnsCi9!ot9QwZR5k4!Hr3h4yvqR1gA;SR(iygYMi-1T3vjWx0gl%Qt!dfANZ1@D z6Gf(k{$fj#gqd8NAY9}O39FE?eWSLg&(BjJiesz`ckR`^3<}u!8rI&T;&H^!zSi6* zLw2^ASPS{Xo!%Gxu^S~|n-+?&1>vL~vJMOE(91AAiW8TFUv+IX$a?VgDM&leJ_|t+ z^An*EG{$C>gABs%xL{Vj3%rWkYSS6aeZd>?V4WFG60v{Ut=@{M_ULdas9o@G_+Mo7 z`|;u3g-Lc#>v1V=8VJ?H-P0&f+BVvbppjDdaOJ{PuePzqA594r;$LMalGjLH^tJly zp21OzUP{PM4y0!LqmOYCGV}B%yje|6d3$03*(k9KRd~8h$76y=v6-}4Z@m@G?j&E| ztN=W_ow*_JEKFT;Bks->Q5A&qcVdg+3ic&_D?WT<{bTWDbp1v|E!*~b$mC$Or zJ|kn=Iq)sqV84x8hFBk}7!P=_XTSQIRex@PiZn93?NlfAIPO54ehHjTA2~+sraJBH zHz~OfHfne|M0MF42I^_AReAGpr~H<44SLkBOJC%zUhk!hcXxAF9QYoPtq`vJSc0u5 zHdZnKWn`PSl7&1_iZB4!d1%C;y&2&SHMc`_b8LZGfvhJwK_h69>4CiMu{x7_lWG&C z+4<mW=BM`U{^4^oa8OuiRUk+ z16n?~6kfm+kl)9Pl|qdeVGb@eBYwlcy+@|*+Fj_d#ne=uwV^0m7;oH7ylwOL?~%7A zv~n&zG!bN24Qs4ChUz#otmiBhQM$4?;M4c`+lGR)lC#fVB}b3hP@)C>pAx;1LNWf?{c z#o18eKpti^Pp`+MTAsXp>HNf6nx}HIR^gVpP=8T@Yt%}q@syhDqvHsb9j~klQ;S72 zvjGU=tPiq*VB8cT9RsfTzQdLn&N zrn3C*J) zk(D$_{5#r?>urA|d=al0;!Z+*vE*qsN3>|4jw*z)Tzc-FW@V|?B_l(<(?R=3D$UM? z+)wID=z{4Xf!sM^=WjYDpGSgcHt^wu!m;^$r%DL~f^+?{l8Q2=Lh* zz4)*$D@`eL$r+J^Wa${qM_$w>)S$`!*TgTduZ_CS?;5<|Y@T$V=Pc3M9HYiLX<3y% zcJF4kDbZ{kN~FlmrlmAsm{Ujeb1g1lkv{2*^xWsyGzUwZKT>%O5Zd0f8kPD#appQh zenl$udLkQT<#a};>9VD4;7VbIeQ&TkEG_i-8^b3qjmJ92zPyGAansk*J4eunL=Ve zn-DNmW5V~)eU7NrjfZ!VZOn=rji$={Paki{Z6EfNhs3KjN@E%`-@!dl!bkKt3y%L> zQLcz5j2^Ye%6Hi1tuV{y(Usy6NaltWIzE5L;^fFWWdlC}MV2YFDLKNv1Xb!?*pfac zwLCvkCjj5rh7jo<%g-=q1%^Z;zNEBY9O_oHtEZ_EAW7B+K8!n^e#2BlrWZ+Ey|+3B z<9#>m=%U#D9Eq?EmlR1E&EfOz=brscFr3$fsa1LfW}XjA<$A=X_u_$ilW`vH9VW_C z{f;j9gcPZk^yMPsjrxJKjLPV(NjQ((Id_3kkZX^A%Fxx1}ako1yg z{qskOfU|QvSD~PYT0zn?1cw=_W!3#NB%xp31!ld-<14Gq_Ym~`mfP7TgsMYQf>Vb` zAls#ZhDf$(ZduLroL8jf+hmvn=~TQgy@4c#_NvBtaSDDuU?l0|sNWh`AJSLKYWk6O zkLTO=n_5Sc#>R4Ef&qH!MqqTN)2Dd#50}aGfA6GUOwX`t(c`LKQEw*xe>(`YGWz)V6dA-fnuj?4Tj&NX)tA8Ivlk(Sp;*0iC)&~k8Oe9k>9>io19ld_z=ZHk8F&jmXz94!^X}$_Ar0NrEjp`FANu{Ke5Vq4whYRIz>Mn@ zvJ-cESBl8pl6dg$&&PJW^8dz0h-|Ky9Q}VqLl8Oo7aBrZI{32&)2F9=9Hc^ohXHiH zF#3FsgYEQ;+yV9GWh5j-4fOSGeZQ>M86Hz>VTNaD_4BuNH-)ucyM^&A&2_4t*=s?H zY33Nu<*9(@ud5;HT!Y$&rAy$Vj>SnI#7vn+>6J9VxTg}G%|5A`4k*khGv836ub(F`xE85;tyJL>I_*%`q#uK-FaUy|3j43(!X{u#1jmp+02U(~$M#394R7WDJY)`Xt zij~Tc@)mvjf^{)vdgDlud$mb=C+261pdpnHq2-0+G?xK zBS`*ipft7!gVEtdSg^m-F8hmw0Y}cZC(g+i-o~1SR~56g8TIB&Z&Qp{zO5lUBMe@< zJ{G?o^~$U1Mzmad0gb~8X^-1L-Q$#s#z{Y~vS71CE##J%U2^}oHAg^#*TsBT@IR1D0n%Pw3gt9N>71EOjalD*xAnD{{tu1V zI|)D|Mya{?;oFKyn1^=A-CW_9jO@QKf6f0MDP#PiV9!P2dgjkV+lsY(f!_^Y^ORA! z3=LVT{HW%Gj3?9H=0==vk5mM9%Xh{rbHO7?WYDLI1m)A)w1L)sRPhBGKqbTPq>|BG zk^a9CkVTRD{L}&jx6U4zV-`bO}%~csRI91+IVu6Dqf*# zq~`LN@Tu|>=omI*_{&`9gz8R}mDC)qMP2aLH`{4r0I+@eIqZU(H}9TsfdPxBpF<1& zySM?|*8gbzm+UKG5#&yD?%v)wG2-sWsY!Vi(xjU&1iRyBE4Sy2yVq)xV063-rTPB8 z^jt>K$nHePK7qHI>y*~YZ!lQmJ9SV~w9*d|EW@#TLe<=@;Mn^F_q6RF>CTj#$Pu|L z@DzH)?6}HFL*RXBMC6D@1f5*(BEoJjW@}c=LH^Xo;eV8ZdZ>IzlfBrg15;E@t0_>t z`EstBauu*25Ki;9(Z$i6Dk%MZPOOIlu4Yw-a?cE!$DxC&kq|M29vp4&k4A)Y*dm|? zlCnDc{rVsgk2gYWE9$f0u@Wtrfnp4Y?Vc!h>~JRU$KtMaUCw73{ERsYRw>jE{*2%L zk~C!gp15c@|}N#-N@cwA`;;^Z5%F)Xy*DS~v z_@A{McNN3tKbmX3k-Xe4Z-MwrdLW7D;fiobDRVQ85>Efih};Gn+93okuX;kU?Oo<> zxG8aPXFjdNjX5uD_iWr%3Cp=%>*6!mnKke`YpZPBsyL+p*RUbx2DO<9QqI-TJayOn z7w`B~L|Osj`vOuiqRQDK=OLi>r{FcPN3T@2i4R+2P={@PcGHBwYb3wJPboF2JGH<$ znN1fx*81BYH|Vv;-);~vK}x>J6>B2`GE` z;pu@tepjrLlb21VCUePZj?OxNJ8uGSkZ_!>s(8c)gF_iZux$VO501X}H8mmQn}5h; zBf{igOgW{$-{n^Cb?8_1Ii7_$*zVuCJ{FgmQsv+Ngkn_6PC!{jo|a-yEvyP#0?H4m z9PZe}mY zFjt+NlLQomfW%Q%PsxbAhRF?@{njzQc@F3pnKO;F#%Qh=YOJtQ#}<@`9Ph_&UOCjJ zL0q_TyrbNcycw(7SaqnP_K$lCREa}DoXu4k+5T>f*>sslM2|$#|`3 z%?}5ceF1ch%CRm5>o@ktQdMCykqBXPSut5NO5#9J0Mq8Wmu~L3`jk~gSe0H-PgyWF zbGF;QovKaWkzU_`-e4&rN&aYEWl6b)3Np#lQ7<%QkvB#xa8#-C?{62Doe%;i{}Mj_ z-728x3N)L+@GkF;Itog5ZRS6&j7Fe?%kq02J|=ey%9Q=sjftHkE^kdVk{TK zTY#R={(w4i=$domCu}BTx5@n^$v0>(Y;_vINKC78h%#%cbe!SG+f4Kg6WPy)&?G{} zZHzj5JoAChXUf6g3jem1>l!| zxJbMGKvtK*)pFj)*2_!P)-PS$vczW%`6>1G|6=VcgW~GCHA4s%++6}ef&_O>u;A|Q z*0{R{cXtR7+@*1sCb+x1yX!RX`+oO+GgUM9)~(q;po(tJ*?aACmOSfOYbz{Nf~*iP zXK`sp*zSga4ae4f@Lc|bj@|s|`F*8i<2JXdw6Z&R;PUp5hj3O3-aV-LT~a z8|Mx}WhEO=34|q^y(ZS%77IJ4dy&6ZRVL%oA*Nwz6x!Kk)Be?yEjIo)Be$ekS2Xma zQoPh+gm9drQNuu$3U3n?#-lt@1>F$1b;kPsLj7U!7vVSPJxO7hjYJ`J_Jh;Q!*cOX z;+H>-s@ipzx=PnV-3qezH^M5I#Oc;BDu1{$Q%pd#b;1_l+D1=Wosf8^9C3B8?|%j! zg8yzU{4Ou=kFZwPFV(mj=5D25xqO)7EN+&1NC+z4ksgx!63(2>PR*Z8i(@lq>9zJM z7R$_ubi2fyUBJnpU^u!>L>c*wn66F~QqP1N0(iWIjQ@||f z(5ex(t^~xUvx6b{W@4|~gOnJOYBdX^g%R*7V{IO9s1>KgQr7GF5=;dr$Z1D z3+>DEr4zvoOTU{bxbvYo&KgkErt@d~`xL+$BDClNOmWIa?4gZNV;1}MDdrrmMA{_k zx;PFd5z|!zSY&0TJ%?Vz#K&RS-D}*+N?TuDAE3fyEfA;8-nd@OKfEPt+z?l#sf&q$&m;Z)(!oKB?|m!wqfnihYYwxeYR-yT zhlFz^^52Jr7vj+`L*$(6qmuBQL^KKiQ^NH>>Jao+aP;rwn}dbOV{gUgo7H;H>rpUk zY609m=p9K;Zwj5I%JJP(^euvdrsmO$q_C3{@Ug~rv+rcIN&Y|BQc#McfBVRhKxCgN zuw#X)N<A$Scnv0+=E-~0h zuDO6Dod0&r-sK_wf2BReH2r5{UGWHs>faOV;2IIz-$FIUNpn_H>_#Of#k%ds5C>f< zH=EaNKB|B5ZnyLS z(_;`LedqIIphk$Gk}q+YhX59L9ziLavbK-I_cs;zw@Z{C0Yh%Z%;n1QrirZ-t)p^0 z$a1%$Et|=aIqfi!Cyg8f<}P$877fMrSk8F2UZd01Pnx?pB04%Nt*2V>G46w!aZ26= zAKGPxDQ~!&oIadJaV&0WPx`Ji&bl~8IX`X6Kl-i8k=JalJ{mu(?9ffe6EQxbzdUar zwJ%ym3AUV0eAGWF`8?uW7f?Tb-!o5fi}w*Bsx`mZd5P?itz=G<-|?yWn8T*Qr41T6 zr6P9p2)vU%pHWmvh0CUZ3V}=-tO_E#?kqP`D%S%=&U-5(xaKRx3DT$W$C7eMTxJ`o z8F+D)L=#Qs;%Oe1t5ph%vy$NQ@h#s0o+(Xm`4s-H$Ig}c2BL~eDDH zI&tpM?lH3QV0j3M56|wHw~kCF#npBHndCH(Pzw|9fEa&w(v^K(@H@F16TL$B(e1AS zNhk$&Dif(T=v4dm9f~@j!O*!@gGKCPhFKdj_|U{QiMVM->sDuN{kB|-Ah%C| zwT#!Q&^G@JPmL`P(VmYwo7{CmjYUD)bvByjQsCFKm#p3WO=I!tsYo>A!Cez?jq z)+IASZV)tpHsscd^ycag%bF>5x1L6(ADpCdROelS&!^C~CT>p;s?uwesO$8!IVT!O z>VeBjf#0Wp6xqjv}F;EB{-^pA75pBHup-%DCQVj30Kc@L!;eK|BG;J<_kiUb#j_cAmB zuHTz@U!Y~3{*`9V^98bJmX7!>IL{3E9gxt|_xjgHSwR(n1b zbG8qp<@I>e1O6^3@?Tgge%KZG1Mil-dm|{hBL-OKZ+XPbOvq7NSNz0ndu{G;7U-w#ySH0l@of6({ z>DPMeskj;|rS|iv{hwdtJ5Pr@n)HdPElqqL*Q&kizc-fEacgGKc{x^8&$9nm{(Aj> z=<{yKwh}x+ksMrc9z|)JaS8duv)A?aioD>mjXiqG{ExZp5jwwzb?WC=lBqr9rVqcX zuuF7{hv3_3RN=({5==--n=MaE%#T znSuEJXHa@czte}P-}V6hN`I|{2>TDCDt82P)V030Uy?qCu4`+oThOVNF+Onpa40X~ z*%{$v`rU8UAE}kp&Fj6hq`Xvd2O7H%*o|uUl)DwT(SmdJbxhJ##icn|fm@n1e$22} z*r=G~mAPpPQ)}lm)~=JYPM=@t2SO*N=xVJvDxuBq7Cu&oT702ecibN3SHNG^3rT3f zs{S1{?DlL4C>n|c7olBSO`_{X%0>O5rUs`Kj$d3rU6IJ4OI2t@9o<1%z+*uIFyNZ$S| zz-LiQ2WMKLQ?mtTV--`;w|6zN9}=b0)8Xq!N$6&N+|bq-U$U_+)OpY3vP|B#+dV73 zblCkgZX3~0CtsFWAkdrQ8NpGFnf=pRywb6JlaRd|7!QZJ_%pRrL_7mf{?l%_)Y|%=caH zj&O~Mz5toS>E4W)M$wC7p!#6ooUK)z@o97S&~3GSVF8b2QZnz1M$~=sDYAD%E|s+} zFXf1>&5qXuG-rag#J8PHxRWq<>oog}64?effJy=P%k`06VwH_b%LHhLC#AS9Zkdg? z`%_%ecR(9DS8DNSf?^8mBAZg`mi3~(uxC*6DbKAN9$IL8u#AIcPb(6d)+EK5-O0XV znI$u^F=x#2?MX;+u>kj=HpX*C6(FOY-rnuYiyIC1*O3M>*H5?Hqnh43USZBzDW_Vm z+*D6u7!=CAn$9DPS^5i=2u~vec*magP3_3k%~{mXBcUE9NI>tFvt;wBn9bOfq|;@U z^ONI%*`WK}+?wHaV^zOZ!Vy=-VGPOO7eeKjM(y-f%XJEY#Nx45_KeGoC#=wB?OPYl z_OvBqh@6V3((#wJx$6qCx{scOcmM4&RHgGSapGTZxHOh8dF+_vEWMW`p*FaQ7romo zq5Q*wIxF$*YmGC#job|Q{6qf7TY3#Kb8W1t&vGL#D$Jj?j{VBNxRfZ;(n!Pzi$zkH zH>41;l3cr(wdy-jB?#Bj4!>KR#%RflHzSQ*x8nBGqb52{OI$y{dwtH_y&d9V9zy6A zCOp49x!$sGA7!}AIK91<6p4bt%UOq%(H#)-2CNi$`|~&LMB!X3>Ex9Wy!W;oD*NT# zD6135Z5;Me4vQeGquG-rc9>KWZG%t)v^RasNhfKWoAVTNXp|IgQg3JYgCHOVO;mS- zDK%Le%XMCXl{Ym&*6V{%YX%{%wm_S2x%{(+$%Q%*9zf9+X?7^9#zc7SlQ)!Do1nD7 zG^GB)Y5JwkcxsL@!9#qZ3fEU26CqAb(5@2A$eYQAJc-c{jVV{u>(BH+a4)tXFAi>b z1aZC}j8zh2oK9Yy1r66GSIU5R-4V5`Rhgy6!SILv%boNxUbfu0Z(A2vL&O@F?=~`V zi*!_OCwr#QsuV;zWE_}C%xTzJ>2?oZVs%a;41j|ta^H-~nA?QHEM?-pao8fo`M0Vq4KW=0gh>f7e2ys)NbNBcf) z#FYDQ&5$(A0bc|oQgz)dl^t}ru)|f1bQPNEmsnWWj8dVId*C|}r=rDjkzCgIkxbP^ z5%CXLI&x)@dvYVDY{(nomGN+DKa-M@$}s4vg>4jZ*hk}IMy@lhC2IsIG5x?b9|^ESsO5YmE#PGl8H~lKrO)2+ zNy1mpk2ZTwxZfyMt>IGIrIpQwF#}L*_N7-DFH^d%7z)rra+-;tDA!ruD@oPqe1XI) zt|xGwbO64KIMDn+mmcd2dst0mcxwv5BD%Adf3)>Xdb{|^^ccea(W_GsO_o;T)QJ1n z%!D?(p@8|%nCJZJD00W}1!QQ#h+)ghOCkC-#Gz@V zkY5?KgRGQ1=y4;lPl3-k2C^x0nd8jZ%ZZ~FUFXF^VDYM+#eeB9bCg~clFR3Fo3P*G4tZhFbPTT}Eo5xC&-yHVA6X-vrDZ>%9nxuHq z#&(J?LLOWVd3zF>R9JTIKg+!YK@8s`(8@4-<)LTPJ+0i_4z;v@^`D3pz5VT<_M*0S zvmsVF(UDD#ii)Zf05PbZV^FZFQgk`=rIheR6yUbi9?f~-ynyq1;wi`F4c58d5ZG<2 zzVnw7??hNL43mU3uR;K`E($eExGhAn2wZy#5>p`K-hfUg#7gFDt z)!K|dG-!U^gv({oqNiu6roIM9Xv{aosF}tS`YBLwRhonfYq?ML)hY z^q(ur&x4eNhn*0-!6u9R{%xxXo&yy_XLWpIf^8zS^Zn5&ZcawGJK4X=gcJsss-S(v98z%s>`Ah@X2 znk{5Z^JOLK999?JVA_?1JkDwZT)~I|$Iw=Ho=^JNUYS z#6b!)z;Jx>BGBQeLXpjmZtZgM(_IZrr?@{>Z94mh_DdTt@N3&t!=NihbSAiJqOm@Z z(Ci~oU~@HvnJuO>q{Z}Mt_F+v2tr$v3FbNVor*M}@ILukIs9+a8^EfDI+_)Yn7iue z4MUPLMVNI5wP5b;3^W(wg{O2z7GxI0y93QSgmkJ9oqP?sM4$Lz4Ly zvX5+chCaV=n78~Hj{Lkf?wpG)Q^Z-Wo#-PRjUYv^GU_l?9cHT4E(LkExOfnx``yJX z(k4`uf%LdWZqF&@!tMC;6dBqdt>cj?F=5=|e{bJtGuiWC9jAs`@Jd-LDClTgV|C*$ zb~_<3%~^gB(0ErJpk_=OdPu(d2r$|qitZGiH!j%6OFpI3$j>c%TG;-}Gc4zG#cG5z7Jp~{P{@{y01vrbkm3QxNVPavGPbIWHz$% z*gdi6^UBpj%qcs=$lwsEMt)w+EHLd+@WnHZA85L1@o=ry>8Y0KA=S^OXQZp6`50rT zhFpSi^7)oUWK$fP*z*amTl5+otWr{*51O(cXpYV2>5HSxTWPqX$J~*`1s`+PZ{5$D zaV@SXf2I-MgIPW=&OA3AP=JwZ&=y_Do^4X9vTqz^Bw2RCu8f7FwAU{bor8kutt5Gw zhLv&zG?9WovBznxGD7TGPca=QdP?d(Vtmm%B2e#(77T4HEG=lO9w9_D>w7y&FeAw- z;@jWBqgtyV(J_ZP^P-Km3p!{}bE*dz57WfVANyui?5*luT++Oj==}(O*(la&Z@W1y zvs>?inucKk%*kGZ*D*~rRQY*y>H0$~-)eaLJo=gb55c8f8d2?UFR8++4HP<8aBcb? z{U|M5kL_pkyO}UF7KxeXwvz*uTS=Y?RX-d|>^(^7m$3}V8wy|3MIMvfm%3pK|y^x6JhE9FqqS*rImk(uNcg92~rN1B$gN zZlNitq-4e%>?|S=sA)B69gFP)AC27t= zB!tApM+8+gun1zvplLGtTdX*hZzu87dIZ}<9Z^jkdr+f!2LCY{Mq{_xi)fK*oNUk~PeqbgUY4EOi<3+)N0 zXlOal8tq=5$EzCKT|eQAkxl0+e;tsKk{0uVZ&yJAnFvv)Uh?U$n`UpBqCzH0gEf|r zP#qy;;uhvVGZIBm<=T~kkZ_Fv--o&+2M6W<_z;930lwn#-56mpu;p2&gzsO=$T@Ca+G!}QG4IE0JTccUz~2KX6L9q!W#{CQ{57|nv>@<2o9Ki-6L-AujF*Lf z$eFl$X)zSKE5haZJi{Y=Nvp3owAiaEW__DS~Bx3cuGc;iGiXy>9AVmt#mogbX-** z7Q&LxR7ShfUb)T@Z%&^nU#`ROz6m*SQ_~2}vreCe426zR9Qni1=MFEuFQbVW?~Qjiq9H~?<0 zu4B+L)D?GmE%DvT3e7Fd78u@U6CnJX3>3fa%y!6&achpKItANl<>|CNNxdltuA#-4 z5+5P#ORMJD<^maE&Lukczr?2m^<7{lX|s#eYxk;Jv1ieOoZ65s&%+0)CHyBeWC4m?Vu>uGvazv1DAMN#0^k`8h;TY#oaZ7PIbE%4;(w!4${L1;> z&DWI+X!iFO2yRFXL-yYrR!+RA=aCM4w;iPAb-e-b`U2zcla zTjVub|hjIu4kn{1EoODlnmiy`W$|DBF!i2&n->H69`#U_iZF)u z)Yg#q;s7URBJ&X(kQAO%$3A>6G%!bHY|?NJ1>>kwy4Wfo;KbtpTS+RpT9MXwI_uK<64&g1)kOV;IiG3=Iln;_HLJ(x^Syi}3kMor>{2m?&%fmke z*{o*%-bolEaD*=~Gmfuw*IVM-mW&1CYlV4^11It;ryWY7Hoo8Ot*8Gex}Y9vmZSFQ z3-;L<6~PmLhzPremycT%ut_Jx0{L;qYHMxw$ z-vtY<>Cm752&nu-Hb%XSLg)#vgQA*K3*Q$c=uTkLy&-zfUS!!n#J8`A8Y-yK&4*o+ z@6hXD;9ksZ^0NtTNsAvz44TFryS+4Vw9f$(z@y!waoRX<6F-|U}ySyCd z>rAD54)3u?J)(w7Ui|!;qBg76njUB!4{}@|ZF>5I)_iGT^f=G0_r`vIr9GV0i$c)W zZVp9ve+f)yemL6NPOTFu97Hqv=3W^}YjCrs$HGLzK=*Mxk-@>{xIU%OTuG;LI-N;nMLnPRd%=l(ojsWr zay54EY5!=uf$Mg=7R7#EC(N%-OrXMQs2J>1HjRH|H@HVy!&WM$Yc4SHhEJCk+)0wg zOXo4`tS|62sL84wA->y^>_=In&!_MICgq*`z~k_c3|s+u-&(urD%fLtY3W>l1VtK# zzIq445l%a4@CJ-u_>a+B;q~!6Ln+fGNB)YT&zVJU2N~M;<>Oy>>vX4n`8EeWgV^gf znO5c%=;6wR8pCdjRoep9DIW6n1pDdy=z!1g>e>y{1_gwO&7D2_yBM2e5VcB3*O54u zx~+{&A?U7olT=%3@o>>Xj6MNTXh45p&cl0icm?crEFHIw4F&9sNQ|#02Y(tB)T^1& zd`kR1#xRhj z@XTSrroMzIFIb+WC%C$o?pvdLe!1T$yocL9`hstf z)ZY=F1@JuKKLR`&gCD^wd||YhZ3$mBE9>f4Dt`eU_LLv6B(glvB(m<_!BFyA4FE7! z(G#DDM!)U_Ie#?HKHZiKcL5MoZdsHP$P&8_2CmIdLE}8muppe?;jdkJ85%;OR`HH0 z^67%ODmcUM=ysg377v&Zi9!6ZPotZAcdt{Qhw1P1wW$KXT7;}i7?b9co%KFiuOAaG z+S1y<-L&z_mbx>GAO!bT73}C)N%DV~ZigL=M7AxQ&SKDf>GD*UJSBja0DM$NdP01; z_I|;acpO-7*Bz!gJ|9dn!y!yV7*u$8h{g>2s;{!^k>ZD)`p3XafZ#Ig?0lS~_UVY% z@F|~O+jR0B_U+fsv1Ej+I}&WMsFYDO)R?3u;gkeuV{m{s&DH6W&?yeqa7}Pt_jc%s zSZuxU%UttNG`}O4b9x$-`kyAMP#$LYI4BS;^u7FtL-h90o=}=X)~)fMp-%)mkvHz= z={GxDna_`+_wRBvUxq5q?`SL-DS;47eY_#sWC}J-APX0AS*gU->t1e)q_uP6m0k%g z;_pFg*yj)BI=R15u`L%M(a|3_^u=l2BGkfOt!RT_HU2{C1Ml?`L3Brn#iqmiY?n=%{c&>t)KHD8| zPYzOu{}O;4CxWVc+4ZFJVGM^=fc635BgDt4JMqVTcYw#PWBA0(B^TBSmv2cWi6h`M z#q%)LL|Z8DX{crEBkKs!OGm91qj&jGVf^-PO_k17hAN>o-RVma2R=OI;bmm%6B1ii z{9!D*%ql<0}-{}_BH^BX{UFs zO!Daz4ELLs_HmH;CxmpcD5+;AL5Hi#UJJ1OBm8BQw?$09|JLcKr}m7MXhqip#|{^| z!$vDwt3-yld!wh)spRq6mU+x!egVVr>4n=9%Vll-#Pp$?4Lji}1fB#pn-n}$|}c8)_0Ig!H46vB%mg87cJZRHx>uPak%5nA69 z(QoXsilh#MlNn(6Vd*EeBS_i&AI6G^A-vYU<%3d^c60v;u*iz_;ZC; z&-xHRNo46=6z>8O<;NA#k#d-^G6{Re6Q-}}=n8l&LRy+VyY6jcJ5#Je3jB{;b6^3vEJWvCcO}O+hKCz&|D%9W>!d?JK|sm+FNDminKsD1B2_6 zQSQ2+^*I(0Jo;+@KM8sWqrR3w{zkVw;<%8MCCUWhHz=LWvsd@`-eV%bZe}?`U9kw^ ztGip9DkBq1J}rBP!$l;1PcFnixRNBSY zf7#NTu!CG~wUw8O@v6zwY1!#?9$SL{9X)#k-~#{K032BD{_|)F3H^_8t^Xg2x6Hl@ ztceQxNV%xd#u=-UQ_VV+Sj+mfIDOM)oVzaK@XGViHR7(GosK3x_D+S(y_!+nq)+aa znJoZUhx*`HOF82yfLVdh=40IH!XiuEI7yDmh_gQ6sD0{OZ<#ywId22?j60BS-!1bySiDq(#i4t%6cuav2=GKB7@xeP0$7wN;m@01`Xt z&rIz ze(O*Wrb3dc%m~}M03DogVBHLU8R#yP&V7PJ&Lku4QC$ zAv738?JtQpjudU@+pMaB=0i{N;=&w{o7wDVW$lvFuAWn-ryW%2cF^E%*g;u&Rz^fY zO#xfoI#5Ez`TFCl(50R|eLny&zKhjg>apq7OO;^7RSdy7 zqACj=wiHP>$1>I+@;fwZW=1yk3z#aGVtv*>na>sJ3L#YfyaTHWB~Ozo3mOK`U<5&U zFVx_w6K|zN+f%@dyMVr5*qt_mUl|C6c4X5EBTLa=Ue_G%I{B&sJ zlSyPoUZr(c_YR#f$y`n!a&kp?&LH+te)O6QC#wqer>AOKA=s(&r5pem7w05ZxJNc>)6XJFA-otpS7fk`F$w@Wo_qqLus zdiIp1laVVZ%$bZq;Hxb`Z=)R z1h(wc=6rh$JAwdp^dKbX5;^uc&OvPgPVcy!+`PEXfqVX6vptWDvo9t1s4F4t&ZX^n^}%k&(|7VXH~K-nAsH{gWT(JDnLen!+@zY(dgifVjts)OLK2iC7PYw% zB=%$88lHgY<%LLyUb3@g&xs?Z5t?%v5OrZArzJF^7CL8T#L@EP*y6rT-ts)6d1Zah z%Vu)aEzB90wt1z=9WIsTC!JGqUkUYa-+Tv!HL!Vnfwx1a6H?@jGP{QDd4f;DkI3xT zRcGf)$4pPR$aj~V7O?%pLB5VM?)K! zA}I|-d6Brf9|OUTYK#iAcn?2c1Adr(Cfc)%-dT?#L0g_N%2)5CpRQH@43#qUSBLzt zmwdC7M3PwDp0Q=PQ41amTyA>0LjVB(!QGb|v`E8|zQWyUC;eU?k=&z#Y83j!u+`|O zC1J8UOGFPZo(ZHsmI?Zs0out=Md^(2aob*>-DL;9PtRUK(56me$uO#l30b{q9FbP{ z12YJ*TvxGzg@BE5V>j#0B#raQMnGP8gwR#6YTnU#T}1AGQ78| zO#g{h5oe8CD?04-^x!A<1CNjU!8^nSo{-Fp@|?9X{%Hb%MG&#*Ws~E0ttV{i=7*7V z74+gl%K|Wnc}v8zP*gM5>9jXf#(6Mf87WE(kCt`f+L$s(L+&#j2)%_nBx`N|vsC za(XT$h36IA3`p@_#Q>ba(|e0?#SiINz|x{}&1L75ZXWxqd}%axlf&%6 z#smzJo>>G#o6nUVB@NzyGzz|?vdcfS2hi$3D@Tn%YE_3NcJEZ56@xiBxU>#2o@$jf zIK0H?wBb~cQJhS1lV4$H-}{Q3$y6nHsaU4i8RDnyTu#!%H8zUv9Rok`;Z&46P?b3k zUh}ac!3tSb6}{7R_mQ!v3SiC;I^jSZV-xA=7Z_62$j*4Yz^wp#U0cr{WBhDL85$3{ zQm3Xoi_i@o{eJSA-%pxo)2(07j3o)fM=YPlt2cEK?gj6WV|VSDt14*Ubr z2gtB04S)i-e-=JUzNff`72s`m!a-wxcRgaL*9;I5D_W#SG9W_q@lNx?c`3aEcvqod zoxApdX0an`C+yFyA$6vj#f*dBc7QScq`a1;eCyo{5B~qv*ueeuiB_jNo(TObsIEe zaNRd)`XFSo_h~WE^njAjRQpa$Lq?%$CI7;OnU2Hrx|n07LQZxV&AGldsHw0(L8F=F zE%P!nqhCHS5Lf#yv&d5hrOK6G_Fq=Niy@QkJSa*vapcFXo2TN+_6WQ1$jGqBNi#>ey(PkK&Ybtedf* zEaH5$m(xFx@#dA$e;miELk91lLmHeHng!dHgbIaAYe(A2B--NaBhTzm!-(V~I`6G>DJ(=ZRY^_4f#YpHg1?`Y%oE%)R zrN-CYi+nrR^hi7hP)Qt2&i*f!p;Vl(o-IOwQU3KhK9R4+|7Tdks6=Ev;;k<~1lw}6 zQh&D(O;qg3+3?MK;2KylMLq!PTlkbC-#!6ua%N9R^fZFpjy8CLAkYQXA@8mNK z`J0v~&tFyQoanE&b7KO@^9!<6v>5^^oq8+9`S!q`R&a~fJM|akC;NUsg9q58rzgms zS2`+2z9hKa(fC5XPWpG>HvC^aM_YehSLZEG^*YF2qJUGE`zo_g(>i7jC9}Q8gDWYW~*hqL)e13-cs#w%&fyDcDe0~Ny$0mS7 zC&lJ?0=n-tJFJgub^n1{`Xof7JV#kSKU~*&TPMI{e=X!wd$+X}w3jByXGrOW%V0dM ze|1a4Pur)v8SsNvkU$|$B-pG~=jP8hu z?Vb&QSEM&@P4O{_!BP?jFJq(==8sxGuRYweiFI#sq!C90Em|Bq>-X2Y5SRR1ej8(Y zzCq}Ro|}Mn@I}rHtH}0M8Du5xt1DoVcz^y$`R3vToXbpJX*3{D_0KVH@@XFdR|h-- zL4`2WRHURoaly=x1ajgobeF?Sb-G1I1V!Yix45Tic?p{hUV<{H^E6Gdg^>cyU>DHE zsWIFjHQ1TVZO^bkph3TbAJNE-x7mwhkDti5hw_ND;<13;j2$I%b?J}7ZG;%fauHM@ zRpK0+94yNZ&zH$WWPh2?a~BjGYz1emDqqLg9oy0+HT*_L$w~9YO&oF62n6S<<)jS2 zzowBcela5`|AUKx&o}zNvsQp_xFQ?vzOn1`^{f){n_C#rXun&`ciO`SX2;-zm#DbN zs0;oQ7`sDYQr$n+DF#1MR_rS;w+RpuyKk2UvueoK|07KPFGw;)%J*-W+J8o}SNpdM zci`Byr-9{YHZY!fKACz)!|ewmP2!LX<7u$nrZ<;a=MJKGU%=dF08g&S+p3m*k;*v( zZsIZ=m|sFFMsyVH-;gRLM6jFcuKDyH-lR1uOiR1F<@Xm=76XKZr>sHqoC4apI!sve zRg}kD>|$H_PZK6(zS~nqnk_jZZ~wepb)b9FbHl*`YFm8uAk3qq(I0!G#T38Au)LAa z=!qqSV>K!$sVnZtcr1rLbCiokAw*o&$U3W&g!C zchBL~U&pH@oLE?8W(irr9YP`zYyA>E>3s0DQ0?t=YTviZ`*CfKi|80!w;)#*gpw~p z=^P6zkBz`KwKEf4E(X!Jw-)EWfv7R|CedsqIInG2R20D{5$Q}z*WQECz#NkG}Hqp7N+Trn*WIXldqvK56q^YFx8M_Z9p4 zOtoM~Kbw;X(K6KU8KyJ(cRg3w-*lUmh(WHBKKzfBvQmdrw!S!aAfAdnFg&o35wjRB z*!P9Ca6CyXxdQsP0xph;R#x}Zj@i!f7Ja4Vs+G4Eu}P#AX!70^vvquTEUS{ zzsYfR9p4Te3EJsDR~_E%T~MnxYxi=uOD%ElUuMC-1V&t^jV6?p?A3`2tsH)pOuZmc zPHr|iLEH51Y~g1%eS>cj-VnL35nLo(w&Yl?=V+-KE1grAI%)4CqsY|X1QOyut|&E5 zFw(orpV_xl*=!wXt0?SndKgwbxm)(dG_;a{e=#C7#Iyjb_ zr!I}yO}@0^j7ZXA7AQ zD`>0u#}8D8K&vhS)yppcv7^wj9;(|4CDNv6mNuBGZz_!O-`=ti#UH><5xD0W1wlpI z9Y^$I*_R*o$OnIbbY)t+Q%VYX&yUUpo@8wF0V}(Yl8>`21*rvJx>wB=+{{Ck;zM=I|l`AA7{;-ZvNX_4fWHv-pn}eyn? za7-IYtHtOUjCYFdn+%3b`bi4X9)GFxa4I{N2hKX!OoV``5U|J7Qtk9lO}|V`8AAu4 zmai{Ocz1;qxmgWYfF9b7RBDiElFNSn zf>)cJjJj53;GNE; zfD0^?e|>TdJ;?t^I$@cBUQ|2)RDgq8s(_x7HZ<&+hXjR+b?|i%6a(U z6+K&^gJx$RH>Oc;l2&4|)>-HLZNO>a@~=JaqV$mcv+c}S#={| zw(Y~LI(0eIM6Gno6K;SXq~Ab5-W#zrBP#NYHuhq1fHMxRm02Y(WZANG3vk=Fq; zWlJtqeV2M}eawKzP0PgJplR%zN{)jM7wt>5Dd-`68bdf|^4}dv9BPe~SIKSAaUrKc zQi;OPQ2d&sTCGovIaI4!Y-1`9L*OdWRspjP4He#hue*3K6uNToLZoiHDc_q9pXsRI zWOV`y)KjX#%hPf{!GGm~=tLzT*=|>LDVHX6{4$0*!}ZM{Auay-mrZy%N#>$~Dl*&8 z(Fm!hY!4R2-;YbZ6-U|3851L(Vub_IGM>)e2rNtI_FnOSI?`qxMjeSEzoPrBX}4b>Eq=vrIjx2u3(^keqsN zn^^}phlBdZEt?V|)gcoo7@jee4ag8R})#%;c3=te?z`9 zjbVVF1wpZoNv zY^(*Xbk+p+pemG8IfqZQs(#ywlnr;oYDUw~<)`o>FFm)r@Dv zd*FACq=H*PDVn)`zO?aWPo44FiwgRn8-dR45^R(C$|gbe2R=jgqE z*1u5>{`lztuOJw?b{wVJ+BNVcX1ja>{3G+Gj8PyEktxSVr&e2;Kb~&16p^wcDDKj^ zh<}-~^Zw$C(MoQs@rqaH;`@u?2#;($-8 zL$Sj-sqdU`Hm!|PJj`i8~>19PswRe+6|*TxP9j+-KR+wi-;(!NmD700DuakW}-f}SCovYz*-rk4ASA=spocB-xO zstV8O+0_jASKvrejV+Xw?hsev&q6c^J2W>2#5lM24lGo0hepn*Hbt|3N{-N)xRaZ_ z@_HBjgTE&w-%~D$6ORaAxms~81;h|B{Y9X1x#d|C`Yaw2RzV2qq{@b&t-)$@oVlCma5|>5}KJYb`D5?dVcSp?DWmTpS7F4-6 zgj$SGe6Yv7pd4^Q4mai2aQ}i@wm4B^C3JGB;|>bQv3!{PtYE1WVwEq)Ov`n_*T5~K zhh0@VyfC|KL^PBNp~RQ%IUre2XpX39s5%t(>A=rXF@I=IE3F^a9~y&1oNmtD9J_8n zXMW{S_SB_SOa7p)1Stz;*I5C(E|$C9YQVkMBYdWEKGwFmg>qz0DDE=bcNzZQ|QqNK7|Ka{S=L%TDu#eY)rQ)>&Cy`Q(qU6B3T*rgxrS z#Sa$^Qgf}k$2c9)rcJ*DhaR#;VbDD<`qUgY`jeL`fk(JZR)#3JcC}G;u8_7T^!Zjw zBk}&uv(Sai>3iGpvmc|G3}%F;JX-i2`xcq=F@7{_Z~ zF8EX)DC+8M$3DX!mq!w@8skZn??qebL>&2|$yweMANcN<*A#==3;3F%w~t``5s|r20>j0X4DmI}(z62KuXmxw+?7C3?+6mFoBX`rMEb9~Pf)Axd^obx>g=h#B$3hDdb*)1d>6(EBKM zjQA;iP~lW+%DQqt9BSUnkrC4aJ+yBBEke9~p8jder^|#I?DC*;(QoFn*_R70m)7zj z;nAY{YNl8{JqRKuaFy1D)s;M0zxf#m47gId``$&V25{uiqb|kLC@isEEAh8~J2fQ= z&Aoum1`%W&>M}obP{F+o?=2Q;?s@_0lJe$GLh&# z6%q8HF1cK3*FQ`(N`CyJqo$EU7!I+cWjX3=itlJQ((B$lyLsc-xccn{Z=lU?R>3bc z1{uerV}-oz8cZUydZ!B})XRpUUcA`#`F4fsuMjL|rm;DLV%FxJH`1>KO$s9?mgn9J zJhr3nN+F>lom%JI`*ZOX<+r%WO7$dVT{ zZ@jI)#OLugas_)VY1Z%5!|^=4Wn46QBbEF!+s-}y^h|g&(bB8uTjSgALxRju}HkB8;ffr9T*1_CyFDIGgmtox+U7fUFD|4Li zmY&z7mUl*~&*a7&FvAhfm3KiY43NCgY@gJ|EPC=Sy4DSHIjVS}@Q?=YAOjs2%>Bz` zoxYAwDvoI7#jQk#;0)fK?(raN6`wLT{FFX#kg&P?f#mV@B&QNC_P_{y^aGBDjW#!V zF=Gg6diw6fZ*TRo$>R@e zMAoLKLwGGAcqRc4i5SI0UNWLC`**pn2d9E*yNxN@Vs)|$4DY_uti*T(_K+#@RoF5K z#R=C!{oA{fduuVN*b>Ev!4hvRq}E@l+QbDsa?BoLE&J_f}7=IY(kj986pl1D=X%#kK^whui{kO8le*mQbc=jK>e~O{#`lgESv%;+o4^$J} z)uk_{O)WeWXp@x-0tOFKhB_J|kg}uqF?Wj3lE7&X8w4I#g~y2EzgC-liEal=#qYzQ z^}^n)>cO^rLOeM2*WBHZVAw`!w7%{y9I#X$7s0r`6Sb+9J?AKyntsK_^3$E8&->jm zacmJcrRE0Rj;MPFTjjI2?xp+PY04r)&DRf8RC-#%CQr`W9K@QfYzH`U0|*jt)KnnnVVNj zhTf3@UO4TNL3c>!$e#UFL=t$MTbwsJxV!oa=IBZ!1qxH08P#w5F>7W20=hOZGd?gb zxvj{f;}7vT+IG zMJ5|BvYCme^@yp5pX9v1mradOz=dW$h&er^gzv?DIQmtx?DUGI0!B~Ze3+#+wYLGX zm{u4h9xiOXH&}X9cJUxroYj|XWPU9rzpY-_3Th_gLd4FVwKph?fknQ7?=$A<8z!+! z{hYFIb8yiQ2E{{r80~cxpnH%5th~(Tm;8nGn#h;<4u;Sxrfx-uNrkUgKZOhVmd*)5 zlL^s@P=Ce>d#muJQbbp!RqW7N>bs`^&Zv5F9K@JcEQGMgA`}~F0@$%(4NId!3@Bm_ zeYe=>M;rK4R^sVdMTO7b9Lh#~%D~$?+=uV{0Icg{R)1Mnl3)xEa>aJ~y&M%deTSE+7#SI`6KU&O=nH7NP< zibvmI!^}zvCd!$*j+bps(+eE{evw``ZPv)>&eV)qw+v|`SDZwfqILlzCo@pdj=XX# zlTjFhTsB4{|LjlYz$-OBD}6!@Q>!=Qeig-n>utkvx0>F zt>D`Xqu-~lz%fKZbM3-3VgEVCG$joMZ(b_dqWOA}iC*CA9`;Zw9IKb6aujayfO&Ra zVtjR}#>7q~LusAmoa(G}V|Awb5^9Pz+0#5rjRE?@#K^*vp3}0^OHx@iPkr6P;`3wd zu8R&=`-|p@AMXWkW+il4>hjBet)aUm*I}_1XN#@$)^lQ6WJ*7flq4NJ*QNTa>BTG= zXYr$}<#GxQ)=ft7Ts&pUQ8d1Bz4xqp9`jt(>p>fMc$H7g_Ck0I$%xxS)?33)TZW{` z!JRp&bID`1`3Jbi8EiUBPrighx#Wc>H14A3gfQHsUW)X_51rVKSLC`lkA<2%3sJBg zHWpA!l-kwhU}t`%oBqzt%tC_XGBv$W0NTdGZqRnQ;-Ww<2V z#GL!8hyG%Z>NgBz6J-uu*yTH*?A=)#1%a-Z*gVcqEsd{xLcX@I-b+ec@`b^mQ#5mI zZ?HnSj*3`)O*=^3VcnrIo8~7OW~gB0$N|xWl)6_?nNajc^o2fR%)p+EWNoig7Tr5+ zE5paw;f$$j{VVeiEcy_Wi{mj=2W(_)1e1MCCFr~Q-(X>bEw9;9=ODLqYuVa~A$Xtc zChVj6EWNdH89yOu4@!N>M%QX~{uHWYROV#`nwVZ_bbP-%34T1Y9EW*o=NkUA*EMQR z_}H)dp__vJj8`{FQ;aPyl%`g~l9EhDQ_8ZX(z-6AkmdR&_u@g;+$=L`X!XT+ueNYC z+DvDgvx+7Vsk_e0F3Gdbu~X(OO&`G*?C<0p!{$8Rr+Lz_mqvK7E=?j1lxzl2yz zU%hjoT3FLVYssv-$f#CC%inR_GkZUv>YUbE@RpWJkcE!(X_TkDI`1-)OMBGl(Sj8* zq&|YPa`l_KRe%yO8Ch#96Vt;tv>8G@Cm<4-iHl*RH2}5minx2AzFPlJ(?%^dqhhG{ zieDs#TNFF_6?A2}y@S`SSW36}1fY+Vl$8O`pwq6$yo6E&14Ma{aG0%jPm^Vs=MTZo z9y>Kd^|%E1#R0HFT*~+;9EY7cF_3aeonvO!D$*4DgO{EFL&ywQpOEt}X*D15OzB$NxRJuogYICH)tGBX zF;sO@5=c)Dxl&h?bOu8|N)q6$u+%d z{=5uM2V-n6*V|en*rG9Xm(r3x2vnvO#YM|eRQoC!oDv!~=E?UMw?mA~`sA?~$#UPW zX+Vv(v8oVD8%Z$V$W#yGG2!RH$BLF$wi{V_9s2174tyz>P^rDcM{dMKq#jBf$5=#1 z4^JdDzO?CDqJq=drjFp`;Rbfp96Yq6hWYFll9o35>bkBD&SiU)s@~MnD!lf5=zQS3mdfEmGNCb#230ZLad5d$~^ zURGwqCd2Uyc;Ji+6DoqC)WrsrrbE1~czxQ?kE(GVp3tz~`wIAgLZ|uSJhYgbn#Ko>Sumi(#bXV<82@2`f_Yhmj7fDwS{TEQo*&^#y`@)&Jak{;gDjZ^ zaz{%|I=_F^s7o@WPaV_Ib#76=j>{^wHx8hBYevQ*2YOepHQ1763_EoGvxqCy*JH{J zG+2TH&lmf3`?EdaZPeCP?QlkPVqWjO5j~ain^wzXW__&*@ZLP10w-z3cKF+Y5;2Vo zxwvh-r5V4KUi0cVbQ!tE_vED?=vDR)kC)YfqfDqn#(ooM?&egkr4f~8^I>mJ#~tpw z0sVusNZdg2Tuq#w886!tD+nvW$%2b`&Y^wafrd`Ld3Bpp-ID$*oAlI}sUnlzEGEg9 zGzC{#wO>L%_Fy3HghWB$+2Jtn4{}#AApL2c?yJ)9oF5c@zCDE?M;p^?m2dpxSw#Bk zmdR9D{Q&7%kB_ErPF_lrvCeJQKOfA7oUuVb5q0;Ar44Qfs?@ePM4ir!@VABLI_VRPPiPgrCgy5vrTSK5+n5tcF6+kdq~))`kX$K=cdO@o8+tO(g#FGl@n<7w z&bY|VI(R~*AomX9lzqthXwSx1!Ag8G`>JLx%=FQ3bi708@D2Cw_04a6zZq>|I3@i- zG^#e-nw0c4vc(ML%KwbVh)SN0atR#tB`s)R_%5saRMnx6b89EIz&76Iy*-;K?+g0< zl`E{Dfw95EJI*$AJj%%vBcmN{^p#*dO{uT6_kJVUL*EByVzb z&ygGXI6dFbdhP0Ky$W^jH(4ZWw{tEY4#TTxP(z`vryTvv?5zJb^l4p!Z^0)a0TJjXnODRaGfo^X_(lgl{~)Vv^{zd zHEpM6Ml@}A{cz~2F(bT%|2HIYf&0;S#F&=XSq6{xKUbi7j1qYodHIU#*_EXwTuxG| z5}{?)ayME$Dq6I#A=@i^`a1UqW*Cl|CnRUj-t4*bP#CWNBfBKhW`&;e$$P+T(;AW+PZ9`C!Ha9FxjX#TQHqrt$cGIa@aJqUB; z2)LN?u1rQhkn6fME(t-?Z2KLBT@`rRxCE{2mzojP5Xp_}t5mwC_tpW+%AAE~{toF` z(Y>3mXhC*N7w^a+d{eMHhbW{Eo$)J?)`I_i`qXBqsPph$PdkE#oa|-#YE($L@h3*3 zMM;x`-OxDRjZ?c_=EH|2s}wO3J}sr7s)^tP?mVK!x=XQS!ph&PzwVk2Q@iU})i_qE zamzL0!@I*8kYfnc0|~@tEIzGx*&PAuUZW)ck?@o`AQzO(jNhz(|IxtBKsYQ6l2*jcW`Y5{Tz#ox4*0C~_FrX+ zbs?Ln%XW@A_+RfEtwaFgXXVf*Nygf59&qM%S9eHJ(hmxXn!8*eh(#Z!jQl?ZRH;c6(blZpvRnv= zW`tOW7{K2Jchr>|4xDj>*ngcNv&fxETlDFFnnL zZG`9)PT)I|&8oe%UMuYsn0ea{e8q^H>prsEV@rz zJH`us)mj4IC;R6x3-f9M^}30`y&X<%3rI|mZUs%AwfsW-Ed4@RxTK0gg_APmWlAn1{nt%@16GnWf{}IdrS=!|hw}ySfW!^lU^?7vD1aJ48PWCx+j~NOO3Upo`Vz z>u!>8rmt1dyN6F)4bq=-CWSN(Pgl9iGm&u;@uk9K6~laGDiQ?jK0Ku~ZhWNnxF8&M zMgt?IMQ@%^QrkiZh_L0)tu4zD9;B}7Y?#MV{T0XbgbGxPR3-*UD=Tlc_st?h~# zSkbRBq;HYcglm80oFw@$tQK;c@VO^n)v!7?$?m|;MrWQj=RJbY$?km>AhHY?pR&`G zUC!Uh#2dJrAW-8YX!sc?xZondEbk{Z1v0*wAW*ryrnTJO3jTmtHC_Sf`-*hUU>YMW zF+pz5w0wl52+*i6=Y{<2-VkB$#+?jg0Y!&EBkeA$y7M0+7r@UrUUI6gDML<%-U;j-}Qj6gwURqdp*3D_v z=gR{YLOj{QcmFJ)G1xcg(EVe5*JySvc9Xv0_M-YW-fH0VdE*P=!)8Amj+?Jsx>cRj zF(s53Yd+ey)P+YP9rtBnvwG@NBkKIjm)yO{-3Xr-#Qq@J{(#g~z^TTepQJsO*!o$L z@hEhDE_^i+6L~6Lc6yHe^zQ8Q(vJ|ANuqQ$SbU90xh(JVID0dr^+yURCwwtL5%^D* z2}MadP_;xhLKJUuiQ=B1F_bg0i8C|kEgS69|J+Gd*{>wrLsrjr=z?OE_|J@&w=fMQ| zQ3D8v$keh;ZxbbX%Y>FSnF#{pf_FvC)E{a46v`*Q>Gxb|`+NB(k)@m1<^s^e2hx7% z<+RX<{&rECb#|ZNWkQpG6Z9{|aD!skIVZ&PUB@Yv?e8fzuxCp*{gIN&-(Qr25EjTg zGVz&KV0inaI;#n0F2#k`%j00cCoUF{iLLRj%}|Er50|uq++>l2f3GaU14j}_BKr%v zmmB3&0+)Ox25DF0K(krN6@>91#BJ7&bEG@}WBRvurF`zLf^Sb1TAd%dRIU~wJIV|9 zF+2=w6cv08R)f74VKQ@pQlJwJcJ?BlVlSVmB~J>GN%FQzBO`I%SM?LE&2xgtp(FAl zv>JQXQ8Zlxwb2P1GOx#ZrDytlM`7!{*F2V|&{AO`a8Vflc2Q?=K4B*-H_IBTFO!r` zT2e5?#KfORVvvTJJg<|`eBzkjx($F|6pg1-p}bfJ#?f8svE)D4J-^>V1xmAR`YJ@0 zY{^Ljn~1Y|x|O4|%BA-r77YJ5mKFtKJ#Gl!(acBSE~EZ^m-qL7zr^74`H%(PY^){z z``S|T&)On0;;!>sz~P#zv#3z~)+G`uxBvX?ENNwyjkvfBrHO9=icd^|$$5bSpHDf2 z>|csURIRE0O8mm$?V-&(iO55d#gSZ&-&0UeFKb9OC%%Mypm`2&HnxzxenexvUoEtn zO2c@I&zTJSN0Ob(VWM2S9uv+QTxxbxTmc9-!gIk>MBU^uKI(d{bV&i zeot41>(wUzbixRz7F0az`@X?pDH2Uo=n2g@(`a?AE0yb=({@T$`X3^sF=s+*8yd}7o?(t8c zKb-?FzCM^rSq$C2*fq#r#;SC_am4mfq3p}5hPBatriZg0M|*ICFPQTJ(2Ic<7xZ+1p0ma`nW-EpPcV5MHAy6)jmYD&YSl+q`y0Z^*?$0p`y4{~2@lKNdmYBK`-GuxJGkm1&L} zpZ=@>L@ukq@{DV%n8Lw-{^l($Kvt<<0uN=*FBq7Mclx}KBpe^0@{H`OqH_pK#2UEU z)|0361Y3OAq;@MR-5S-Fm}zaj0+VYN2FKqL>Bw%|ei*Aicd=ui-L$)krO*;|h0nRr zzn{k6ziqvDb*fzVU^qp{Iuvon<&N3xWy2;_8}cYvxY_-CYl3b>Wy+cxN_CzI5hs5- zV~!& zvw^Z9Ijk?se?F)A{R^C^Ys<=#w2FT~o`Gvz@fZBP9@kH(%A5$Kn7T?ERx>(izGp=Z zyE+JRe!{iB{P$7`-`Jytv2O4epHuum3ZkTLYJBv?oYZy}Q;J~(KYabn8n}i^5A5E- zM#g1qJ&u;wHhC~YMF-0EipsudYmM}ui$}R^DwN;vwHtk-&<(v~=@=3i`F+FK=lWP* zw8IC1PFptO6#U!h6|tm>)xw!Ux+z*;Myks+R;r@8u~6t7N_4rscZ642>9#f_vu+5? zJ6Li*7V&27`}UyIWxv=a-791^T{>|o=@`+LQW&Xv!}PodwP2gu%s1;7J6SrLCNllnj5QC+ECo9 z_7BasaBXx=zSffES%==!za^H!JG9>k=x5EP&TRk(OC-zws(j0;=~3nWxcOw+DJ|;F zV3}%bwa3~$;MG?pzzEg@Tqr4~{{>9KQDRis@t?pXG`CWo5RWc3$S|^6@uS4 z!bP0dX$c?Crldyu?~(0Q8Obh!Im$R^ZC}l{m=(35@`i26*3|fOt}_$ak27v; zYd=CA7wR>*_(^eJ_ zLvec<@f*1021Q#EH0>c>W{0!P%p?F<($5`@1ZKE>t(~gpB!cUb&*?hvTMq zhlCF!B%6V@v}3bYlA~dt)j5Vm6by{3Ph40~u?3xE zmVB3>3aoJhWXITu1t6FqIIxu#4GC-{lK7T55!egEw-AjgTL8%aG3ktUDR?C z_<(6+uRn*On1gV<*CPjKS3G4Ye&^(xqk6{t)=_AD!eLAG<=6a6Y3*~W?Hx`>?_+>n z`kUv%QKD4nEsB6p+q^L8<|@a2DH-RJ6JbS#*Jt~Hn$tEo{^KKHGj_QhtN74TcYLBB z0z*g;+_8K4D_zG-`3@`y9+8(#8lmB|Z*%_qCp2q@b-xm^6dagR4WBriL@Wb{|0!Wt zu+G}(qtF=_>ld}zk!j;K_jY*tSe?9xS=q_?BDK3hc@VJc*Ls;Cp+I5N~EOF+P|sp=n6HDcv_gna2Qtr&=$Z?|)ME z*y_kDu_w>rf}+BM%M#ker6eN+44f|{&qF2J@h@X8%%`R%6v7Y*8Fmj~g>y|eub8#& zK<{ByO_SLtk}^NEBY!i{D7Roe0@DwP?!n5(J-@)nA!-P5#((*&1*7cY4Hep6tUgh7 z<|8a6hWbMjvQ9I-x$pPvaEhy{5B}LUqUnPAgcO%{3to25~-)F_VeU4|)xk zDTJl;|GS7P*{?8$ZG(l|!g&`<;+>Lv$dd>p!NH_CMs~5%lc}>H>4C0X{;*!(?LAel zHn{!RM%8$~e;pOKs?K=Vqm#p2D)}yS8p(>~ZB8d4b7(`wOjbUXc-n_!N;x>V_FG74 z8wh@0h6UzWsJy2)9L`X`kuToGiNXYP`Xa~DUW1HuY-PqWPm|q#vq+{p%d->VWA?{V z@Vhw%_1{~3ZcY<5xW+OKeD2@yK|xApOc(Ry_H?Qi9zTRlIDn%fqI zNN%lC^|#k9Bv=Li^!{yokJB;w_+x4uEF3wCc2(i)gm9xKGwGIlE4*@qPw4`#TA9^T z=LvL6J6eEI@lm9qxopD#9(lC; z8;#EaE)oq_uWoFih}gkO}kMfG?M%e4mgs+((NV~oy{N+5CmvgjI9<5={p zKrNy06DofTNnqGs-`z6tb$*reCn_g8#<56S_&zV(C8iaIzOw~TphRC=!JfVjZ^!yW0W`J5isgl00&(!kLy&hiPMD6wuPDaqA+zNObG&b za3F~%$Hcyp|0L1W6ems5<%w{W?RO4 znJ@uL)}e{Qm-LC7M*j70b!PsVmXP}CcwzHVE9QqMU@H;lm3pou`+U(p;=JHr#>)u; zdf)|GS=4~_MIQP$S0dTX+a4RM&}{{j_v0s@d;3^Ouvw1CYpyOth6!z58trkepDfwO zvXRrvsD%@6HTj*T_-icpBH4KLC)-;u92d9)EzPTJ+LS(O*VE$#;@FaW;I2XBjwo92 zZ+hBb+?fQst=|h=ABTQ}1*ccIR;&C+3*D354*&5NT|Gm)<84OTGM3H)!_q^TNF>{{ zz9yKPFoK9iOsAdHV^nGOcs?CTeC(5Bk57NkIbE~vi2s}GRdy@(?dRE$o5`psndGAh zMMiHB(0(3DiJ9ofBnbUwON?(hX5V;94N7@UwZ%!)x+4LHaX?uu_3nwxqCwNS_rU!X z>W=q}+e`Ea^Aqod@|l@yzFRjpoYlp^GI^58WvlCnVcnU!Kp$a;6MB#kw#F;N1lJHQ zEbc;x>5?=i@m34UQa!D%KsRdS^YncW6Qq-(XPWB=H-wsTXXa+vV`p+;c_ma)9>3A> zw0m`aspsee#FZmn80xuoh+GlKm=EGb(9Rnqa4M`5+ z4hB!H@nNxLlXZqyPuU6Cczh*;q;sq#4U5SY-@*AgZc>CCbfRNfM0OSRV%}cujyM~$ z>rNNe2Wh3JvK+6lb`>_S6aSG}I0Orlhc78`C2>d_m2ujGsEjIKahxyGMWRHOzr7i2 zPvPLwkcZ!*$gFqdbz5kNyK@CXmoiI9ZYp-PMAD)qG`L?L+UFI5Z}ho=(5t8g*9edu zMyfdwpENSlUXuDm4fAz{Y@#$Cc5R5kT5i3L!6{bPP@?I6Zf(+|46}&VF`_0Ay^x_} z+pqF?Jl^RAvbGMI#T-c4dfTdZqucu*R!Qw+YZgv{Me^|?N3zLxJM3~OfuGHW*1g%N z_BmvLptok^mGkIw(~M)4rT5CAqKeA}x`U6xqpQZqJ4a~QJ&)}vl^I`Jbn1>K5U*+) zX|f^v4KM1B{3hgyG8@aqeQv#}6h9SEbgVjT&e}d9Wc@-zJKJG-Gfy+zPi7cg{}6}} zd+bUSiYiLRbq@uvNWP}D8%l^~w7wAMUio2%>L&L@{e7`dzR}mz#YE=J9wPh8|HhfL>h-|JS2tIPdju`qjH&iSxWLMWz2M216D19Q zIUO5T4GR8TXi;G|PWymrW4;uI81@sS5RlUO_J^8ZY96yeIHpCEl$xpF*Tr_HV^qfvDRlfD_#Z7P=_omYb9F#4Ov$7(=Oi-hQg z2r)@4#7e>S;jl)f531vQF`a{0SN2cUpk%@zW+*4tokQVL`=<^P91oUs`xmS6MHnew zqv48=O|V2kiV-Lc)#GE2I}o;3soDk_#K${w3oWyUi$z9aNfBo-whX^=HW^m~)py^+ zB~tJGgi=|hlrCFSk0pZ7286)pAIXHW0M<&WF z*~+7Wkamd9SG%TcphRd!gLh7DNBr6_mYLR3oy|l&MkrYWIBwaNli-JoxCKzBh7_cA z$Dh95p69_N6qjXf4d6xX4}MkI*TqWtb9n{%#&$VeLqb z_;A@%t+!GALkG;aC-C%-wE&b@R~WjN5oe2x{6R9WN%vFH)1$hYBbukD*t6bQNg^fp z85*X3l)j2W`rvm*qI}(5xHGf3xJ}Bnzc*v4;X@W{4;{EKATOe8? z&$L)J%}tgp3+hl~fy!U^VS5^HFdQRg;a%&AI|2@&G^{ddDA1F6 zH#zAd45-an4!^a)EsxL9sGbUw>V<3vs6!g6lsmxsc6 zIWs>IJm3H3~q%_~jXYH0hp*G8(a2gXfuGuW8Vxut}jj08x znrUGqL01qIKealpp>g&tuqxjy+nb--K#||Ej=8;XjO#m&I^oY6I7}KDkGjGm;f)d| zl-F(wxfYliGPZVMwY%__RHV|e8z##={XlMD)`ki)TnfhE|IpX>^jHIFW(o1!k1zRwy@~OIe9gTMO{D2k&^6-D;ZeS|7O2 zW9C#*ZFi%5_uJO^nii?ZFqZ=yswCi00U{*v1U-Z_?xHmhQ^BM6CCvOB`XWvH46^3+ zjtBGyO|Y257SdTuqyGh$S*v64FXoTJ*|v>H<7@q=#a0eu!)>$w2UO-1QSUO%%KOM- z$asdkp!WFZg5o~O_SuMX$iQAN{9o~ro4eZv&X7bz%kH`8OZ+w_SPH3;Ke}OTwobM2 zd8Xb9TK0h8phhHY_8)%f$MTXcJ`dlW{Ygm523W-N z3w?6jh@57Q?Km+;bP~tG?0(IV;S=TLDV_thx(M(e6s6K{>CUL2U|$#9DkzTXf*OB< z!YxAOKo=`7s7;BB^(_xi^=I5Frd|?L4E&<(_TLXj84eefY1vnVjm(plreacz4TcUs z_m^<+a!;59{(R}JFFpEbHih{p4!UV1u0AS?DWq76tf_rx`d!Tic#zr8W^3nJz#T5c zejYa9&hw2Uv{Of9i0rTAm176QlREkP6G_;N%vK20*oTL><_kHo^K<*vP%k-oI&tk@ z7_KHwPs~bcVxYkb_2XqZ1XuV{%0};}IoAs{9+!CB(;%U}*^pUvBmYU6^yxno>Y-${ zrRS7ytlvxZj%+V| znYE>jE0gI@i0I3gBytGygt6v33S9{mBfGy73`(tn7Q?;MSiRu-cb=P#+K*r?JN+bE zx411REN=ljOL$}B#!2hFz%-j1)Q)gq2CXsGh5;!`x_;EmoI#(sHP>i3lG(I2oLuJD{Rks9L(4zO$B{myOuUOPmxH+RhQh=n%!vS(Px z&&KfqJS_D`;Sz86wWz#st})OzJUJGgtxFF9Neh=3bb+oHd-|K261NM5uHKeKziFw1O1|KhAFuF+ zTh5-Qh9$}skC<`ciyZaN#7>3tl<1nt6d~nmR{`A%)B5f0PC)1oXs^G zYy_{~AmFhndIFewEe!vW{82VYC4gjN_;r0)eQGoKSx-^-?bA^3scHF7jYa-oXi2*X zcR0UT)_i&{r$#&?$VVa`P>lF9tV>bni-4lZc>An@WC<)jl_m34`$ws3Z1#L-Z7qR=^frY@XxBX_; zf3x@kIpkT3z(TH~x}>*%k)O*SMXG0+3ONM}`?f~#TnX+yJOZOcAL;^_(*Ax8BN8-}2uT_2Sp=gQpd)pa` zX1qR{4G3kLN_+BFs&j{^D;f!|}PZS^`#fxwURsLY>~%*>+ml zQR4Vj{Y9f5xP+7{tX-uqf8-3MHGnG|k0g(BH=EX(4f-0#e>?Ef^<$ts(&|7Q5WIX*rB0E{6gjjLv$PlQubD%p z9-(8gr8WezyoeaCf|9Sb48DWK z8Sg?{67av;@U$b?Q&N!403-~wnpUjno{PmOiWdOu=Blo8 z>5)@OIE@E*%C939+;fFPSb#%L?;yoI&DDxzGzgQp-VVJNZu4nch z5-B1y=S_1=w0&l_8+Okq74yc*A0UH; zsG$i|kb-$1vLegN_tD0F57*y$3#t=O+oZSCsxkC7dhc}$fIZ?CYUdtB3r(JH7;Oy^ z@HD`s$9~HYGY(8FxF11UspP}or48xH9hHV>kCh2D5G{j!%SA?1R!s%Jbia4O?QJ6q zguxqU?<&`7o9{Wh8cT*8`4wgzq&DCIF!c<+RSNAVD--jYFMe!F9Q6P4(WeH>l!XR! zJt4ImCubc?16Iwj=@ASOrUos9D(kMCbJQqJrJVmQCwvl1p9kcGJ%)6rCW66K+((az zs56uwC*%3gkwOa}HAWPuch25@5_9V_x@S0uQ$Byl(KG1}`jtX^_CNv!$45S%OOvKXMa4*e73F{~O&@X&7 zYQ3AJP2GPVOQqTKy?Gl}4tlgfL=hW^A)NiVM z3>Xg)F>3>9fXmv*+*#g8=NfzdEr@e4q27uiB89qhePkh_avk*;4?6%+^j(8O_ylVU z9KCg7c)jyo#!Ix;QPs!2KG0 z9ut~j4D}~Aiz`cdi7PoalRz>zGBoIKZKqj7GeOo5m9^1Kl7a^<%(&6S5O&l!(t`#D zbvCeLcT!BDMTo`=(T&^&Ma})?Ilk^HaoHB0k8f4#89L^v5CJ?_m$ zd3q%7kx}y_3xCYSFs{cBYh;1R9<97`F&Hr!S((IUh&-X8xK;H_x6D@2-Ah1@DUs}& zUngU74TmBz_|@q?d31@hTyW#Ue|dX{KeoDpm1(6QSlIWi$3RlQ@_E`STR|4Wxk$|% zJ+dNJ&H5nr=)HL*6gZvS?A6sT+yFY!z8oD${j3q$cSwE3$*58XF{$~om$Q=N`Ae3P zR$2vzwkRlGj#^)yVx4Lav1Y`atAOR4*}%%`e=Phwx%$uRdK>prlu{ISa~?`xiCWn6 zu|ylMttp^WOMo0c#c;XdRPzEh=CR}b)$Y6|82^Z@1#IpQ>!_N1pw2c&@r1TKbUxlR zq49l4n)2B7^GXko7Gj*GNhpQ@79bzmq4@8Xr#?!wz?linS{66Bvs=tyhYJooE%95- zTvJwBQnmzQp03S^xvCPXFVjW-sUD#Gs7IFUDqK`WeO=inTo3oB&2Z)af4ZmUzi5-1 zo`C%iny>3_QKITiXIsAQ7vu2j6h1pA++Q6Ow`pwthjpttX2l3^hJBPv|0J!TxQ717 z76CS^{t=PSIQ`Wn{v~$&ztnAdNN_0O0si;b_l6xj9rZYcotM1jpGFNB%gygifKq%W zqhAI@;^o53NI?Jxt?XvHrcTAyc86=XM5#MwFKG7O^_w-_|5w?0MK!VaZCgN!Qbh&n z0wPG2CLIePDqTQ|K#(4q^xhFcklv&tNDCbyl+Z(w-djRZI)s4K07>8*_kNze*ZS7` z9=ti3H79eBOlIak_x-yro16e8%2_7*Io5nu9is8AJ>hq^A37`(+2lQcY3)L_@~M30 zD7X+~77lJ&5F0Yq7v&~nv8Xg!!m-7dN7J*~hA1e=wY0t3-(3~e&-=JDjf#|=9&$&Y zR2tUe+afn3p{0%gA)ZQSYHR4)zEzYU`S1Bu{EE>%rYGa&_gX)nC4|OQP>*-{x>jbBZ zEvHW}BePtW(^sR^%!e{4y}E;QmYHkk~xJdXQ1xGWUiV|+jnElpE(Yl zlo$eiZl3g?nybdPpNBedd}Mo5U5p=gMzJOz0$s0>PE}0~FL_TpCsy5+ozkIfXN#4+ zdMgD{lWcsxSNg-zhnlrokWcnB2yCqA#`({GM4~6HMPGi4m||yw9M56WzN#D6P z9PR(0@>cZO>gaFOkT}bk{{7UK z!+P-cKj~Etazuq^7 zeF!a8?G?5la1nxlb-*kip`Kb0#gG=TtYudkz8(jN0=A* zbwS1O68F9XbRQk8y=dzFHV5uVxs1Zf89_FPrT;`)DYM5>owk_u++YJ*B}% zN7b7se$9MwmvlJJ#rUwTmqA=#J-J@V?ccSM_#V(Iiq46Qo*^+ChG_iWJq50=-juGc z!=F9@#X2zX_vmOeJ#OpHfO&?lx8m~VXvRM_p!m{c4|vQk&V)%abF4j@J8 zwS;xF!i4wgZZWr#7%d7jCC=#6(AE>89vcRO1FsBAy)TS+4B^_U2yv+~Ru)%-MsIDvtAngAXK%-^aIBzqJd@voXO&y&cp%?J&`n5J}Ig6=ZkPMW(2@db4 zVZ5a4IdTk733$4BL*|OZR89KgP2mzx8bjz-IDO6$sUTga*^t-O{{ni13aJAh70%dd4ro-pj+)7S!h08sZ#ZXqh1&RP^~oGGj3c{G6`n z4x0n7f+zp`-cYrN^t_3ONELmK6#pJXMbRwg7ly-#Qg?c2o=!^*C{{TN>8ZaP33q*n zOS`0HWBTUTd^pG^jD=Tf`ltkU1CyVB49_cY{bKYNhuKHNWmm|vVp5MRdo8nc;hg{g zTN|}~E0ulyVQiGb$3$wYWUZYS*ShKjp^!Jd0L9&P+Im-L>>Z!(WtYZl4h zoM5tG<~46)H+Oa=%;nZn=&`>V)DBx7NTcKgMoPebXa05E80-1*%UV#+W-WdcBzl5< z@B^KS)CfN`Me};b4$LSuqUYj~pWxeWSXZzca1D^9791(+@nHJ`-WYa%{QjpL+Rc}B zV#L65$*vYV6}nP#n!fN1QCG(To7d9|WZKzHvo-47Hs-@*mcwwuTa`*MXN33Y-b%l* z5Pp7kdTrGRoMlwM;`@XclR0xqSxh`gy;C6b>SeW`kC!|h<(NtV_L$*=H@1t%Sp$c; zVZgXZ#ez7qJ(Qlf-~NWqXr>;w;!B8ATiI@KEU)?2#c{zFlACf~wYq}xfvsio1{Y8? zG(S!GRBE19WwO(D=Rr)tzah{BCke35Z7tu)atx8S*=L%vJ29o1mUW|iOP*P)U1F)W z7{-;ckfbRycCSoemB<(2fPYFXQ~C20Opo+b5dw|Sp@jRZkQx^Rl{u{+S1u_tAGBOQ zy==0|77Wm?SJH6>3N*+cTHoX!vx1BrfesjMI2~U+I^5DZ<0(Iu-e9#o{KL>%?#eVT5$_S zivk8gpC#ZzHt2)7yyw2KLaboHNB)9rJS8k$XU1B9CpBd1ceG~R-RNIH7mi2$^Ruec z*9(79?69vqID?IQr0ecJk&IM^fNM}Dt8N)0qo(z&W8JsHW&GalMQW-fB?d)C()A>r3ppoa8G0qquA(W1-{bgJ>>$wO|2QAK=qh2zxR#rsc3GY&*9ySM-C8d^n z&(lvh|GdGVqyF0qZnRf-Vo2%30Ov@YI-ht*5&vT9Tx}qIIP~}!r5Ltxvx6)O7=_BP za}gB-(sw|gQwx$XSs_?vX2JwB-3EQfPGLvzJhxG7V(dl+AVeQxMwU!E(L@J5;F!s zLKksozW^X43qSL9|4w}IjH3)|T=j<9b|9!R8Qhe7+L@JfCqgIuirMc|d)4}8YkGvJ3V+n0)8MQwa&~h zv)H}PDgWd@?5+3Fy$1qek{3`3N zuiN*(Zq5iG{>4stH24f1EGEd>#95femdBZj-)7>ZLD0m0n5;%}pFPQGLk#U1h0|co ztMlbHHc@x*pgUT4FQbx0XoMpr34b5fcrN(E<0GY=B&E~4mxRN1)R!=F zb_MRAQ(xKhG#c*pY*co4KDdmL4}8&e^7j0Km*_KOrb`gs6$a2nXQ%nDFHBZd0IOpM z0*%84nEyvdLnbNGsi%V$l*OQ$g2 zJuPxQ)qcPxD`mlqsfaCA*q%A|yJcn~sF-L7XuJkYx)`RJrwp2kogf47yCdb963n75 zp61UV3!AXypD{NHe3~SL_&iET8B4medk>{WlI-x*pj@x)Mcn#mH>Zhcjp7h|p{9Y<$r?AeIzn6uNjnmSf_=IBW4!-S$;t(o># z!{+XRJ_e|&FHKNHkCp2Qr@(yid>(00E`guX>7q+nCK^om=16nIn+sXV?8<{mq6s+* zL*QUf7IO-NmiNshuQD979T8@L6V+x^+V-xi_L^o|XYKnWZm8nQ&mqgMZ!8aRk>>nP z&D6&8q$cS9tsZEx=|u8+x?H(GGONm0UFr6nj()u*Z{n|kUc?V7MQps4514`&4p(Sg z{3sVA7(R52#P%5NOU;4a_{@OAzgWI!hbS;S;*RYt{K%-`2T0i#hp6-m2)Z36)gFJ z7+f|!)AdS_nQQZJidYGoTyr&=rsE2o8PXxuUI{qcDWYN0S6 z%T{;7eY|C@Ig1M57eS=DZAiFl+4#rBwwC!li5^r>vPf(2&OwaOzjw<{ijZNBYAw4C z=}$QRgh_|;$$!I$*YlOsi(W(Rn{;xAaw$HZ&!W9lkhHKEHIRB>nz&MPtE-j zKh_4ysafkhuKB(Mx~x#d@%84MV~+RX5S($&2gmEp+1dev6>^ZeH^ z_Xbp}kbK_m=C-6OKC#-oGVnEon#Jgri=5!$XL%?5&tqchjBt0CY+};MAf5BRtvS!dbadl9CS`k^i}5q5dRVTal6?>Co*RR*3rpe3_(>hk*>uTF1R^7}SaE?aLSHUWv4g>x!9ux>K zl=P9EO{N}7+*MMZFMR(56H0X0Oob_dX2Q=z_exP1m5IjDSrct(`VHhPeK@`fo&Vh( zh0V*7kjj}@yN72+R5S+o^;9j0zlKA-*J@6%b{UQ`bW-XtLG|JM0Q3=dxJiQwYu9?Q zHXLj!VZ7ob&m6lHf9BWFNS)L%0Tk)Dis(s zO8_2?|0COIzAnn&H;~o2KKS}nqM7jY{A==(aeLa3m;b!s{BalC4SbjJsp-6hy)@DM z+RXKf*7juBZs*wG5Ra~1!|jmXzr>=J))rA06=W1nsZZYoh1H;?t+aC4?LV(rX)yE@#kU2@g#U$-3H}+Vy)5Rb( z1rwLlz(l6@BxKskfcQ`af)~Y0cAZ$fiDRC8WgEH=vCq*|Ph80#KXS3DACPq7QJU_j zH%_`w%>*`LN_$#b!&Qgk6V;4%wd{YLfD})Dj`%^rX?jd%?k$HM7yLf<%IY?kX@l|l zH`{tOyF@kPx85zTQC-=(WzJ7>k@t!Fmx>N#Q-$CaHgb%BYDN&jHYs9MzA>#3aO1^` zBYx2#2AJIg6RmT6aU$2u?fMZLz6nf(G<8ju+=c_)8#j5&m(?Zsp*W|jZ}KQ#IxJA7 zHP(0&$idaysC}bm3LUWVh2|5Y&G`eCJ6m(X9%!)P_Z3ylQ6ES7f)=t>IoZzB6Cg>E zRJOdIg9>1f$(ktXwE#DPoDM;i#O{45e~_~&jP0HV2p<1Jd|@J*wE6QpF!W$oQzKn+ z^eX2d{NQ}FozCZD?f#-weXP&NBMNJ@nB(n0(Kod{bgAecZ*bC8CY&7shG*Dz#7+m$ zR%LR~Wn{>6xePUg%~DTD-Nu|gMER!swREI}q2s!@(zpD5uG$Zo>coA5R9|G#Dxbdi zVw{FW7lMC3X{MQfLYXGE9YmkK8&n8ckS~>{{Jl9rv~P1}o#8c@X~5tY%UE*y;o-!e z6jAn%R3rj;S*zD{_?hiv8BRzRdblL))V)+ETp%L>4_vl5^2%jrl>dFTQ1z&HJ?mT| zHQ(+cLJM@Pgy?6lx=k{F9U4xsGZIA$+WkpGQOnH+sWD788W7Sl{QZPPmYzO|JWnb> z*h76O0CHl=CPB~v(Oiod1D}VoA31D>SYk6pB6w`DdpiTU531J3a0ybsxn!(6gnEUN zZVS4;@tuunymjWazk8ilO?bQMk+@#L6CeG1FEqn7@-*!$zS=DUb@UbT-6_%MhSUl6!p^?ul3~ zkvMaQ6&;db3r*GX0WZ)fVSasxmp}gv>{om{=Lz!r!9suYM?3Yi10Uss7T$%E#nscr zLPBQ*7HlHvvg$6Gc{oPDz2MAw%=rY3jer~}% zGGC|V@VQJn=|f_D)9HJF826#LXpUK3l`vf2Xp10q$9AS|mjS zX?w&>q;P;Yjk@lV>I*7~pu2LbQrlHiclUcg)g)o!^q>?nwCTu0Z)gt$=HSKmzVS`=rbM>If*(uk)~V^$Q!fddWblSI&)0d}3oPsJanmL-v#C_vUnEz|K*DOZ z_fhSB7yT{IRWZTpt;%%f8Hr^-912hP^B_m)$QQ{X=L?y&--((<`fj{=8^ zOcA-Hr^Lt5A3uvu4+KNMLSJiQ??$-#JRCe9W!dD)GJI~)t7t!AO}k2OSEp94YG_qI z`*>fUH7doMtG>-kuNxrUw^}}&FhXz>=^PMHp2LGIq^zq3rElXKMOJo`N-cN51wUfa z0B7e^UVm6uA)(t3+JayPxynWxklwa_kP6IoTW5+DYF>c;en`ro>m@%lNWB!_p~%o& zXM*Lq#clQWy9atP7W#3kpdtp-w3$h&ziKxGHTm)?l#5eFa|HLO!t+sAdC^Vm{Q*ol za&E54=;bNpJ3(ynURqB}x#eXa-tA;@V_m$Ac>d_My>~V<2!7DqkC}yx4L}?ohivZE zoj0+VWUN)x-MA;(cG+*KYI&OA7dRS{vMr6w3XcSl!sE~`=@vO$khZ0@PMq{uU~x6u z#p zp2ok|8qbhOFT!p54lea#+wF$3ki;mmy4eY62_iqYt#|?haMx;W$&94jZ_#hpJ%i&v zdEq;+^0RJs++6wqv~D!`|73P`0xG?y;b!MvA<3U3k2zp<6#qWt;`55vyDi8Z12hJ@nlgk=)xe$=lNP!_#x zOvNtE7`eVVRIcnIsoTom;=Jt1WUt--sWatsl9meOdL97DLKhiLrN7)yb?+!UbbPec z<`mD0bL=rxtk;^LP`(J+D7s{cm2)D;^g+#W_PSG&@ z{?jHA5RE5L$xG)FC0~PA+zI+BlVJ_)Gll=FdHd5NVq&cl>&wCHNirUTB7Va{aN?I? zXfMM2@Q*($v>77Q?81^>CSN|+6$Ls35ElE#@;^K*-aDLdjFtBS3OQRKO#`+7^x4B6 zp5Vx->}-l5zQraNMlQ2q+EKtgx-!l&xadt#pd7o5+w~JBy`km);{ibat<+u9s ze$&6WIt%sy;LhRO?Yzf^pL=5p&F0MlyLvy~z2`xQqt|${J=R;bn*TUb>hHGCpRcJW z!3hG*FrWf2O+VSKw{6ZMKSlY4uSIM^|Hxzh{wx?SnGkXuAN*EuO*ft2Vyk{iu4>W_ z(!)o16oO-I$iMWNu2Fj}v|Xc8^Sh!psn5~m|4%zWv3@%AX`u%{e*cHUlXoR(0&QqO zpqrD;-oa1C+hwb8&j?#ed9F-I`6F4bzXtZ3Z|2aNumVA3-P1E}zf%6b30qAddV5S4 z*5^AfrY2vkERbJrjuOw^YMJdAeD$}=9g3j&cY;5@o=3{CE2!WmFwEs(%2qW=l+cSs zWYYyW4Y7YaXChExk_zBC$}Oml5tj`8S^(U6r|$m~pys{ZydINN5lYvl70T1Cw^VF$ z_Apz#0K#VT3#5EJ=XM9dYKIH#y6N|mN~`=Igx8IQXBS?D^uL?@`s+{b{Z?sLu%+F7 z7Bwz9&HdqVd?2-lB)GH&K8h8lf4uyuFMMB5+d%5ZLN*XZPXWI_klW^6F14~`UbzB) zNHcJu?HTMxt{m4RX&>NpZK?4CkyBO}*A?Is$F5KKXUh=sf8V7MKD^??moz!ydFcA* O7%!F76)T>ZhWtNY3JS3R literal 0 HcmV?d00001 diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/alert-story-tree.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-story-tree.png new file mode 100644 index 0000000000000000000000000000000000000000..e7757be9b99aa8c109ce3e17656dd0c5435682f7 GIT binary patch literal 65436 zcmce-cT`hdxb6!`5v7QTGyxR^M0)RtfJg}-y;teI1PEPFP-#lV`MNgSxM%c?_9I|p6C6np{7WBhwcsz4i2f(8+lC} zoLg-;IC$5$39%&>Hl8!sKe(Qnimz}gh8}HV-{9NI0%UP;s$=h7S`c906T7`J@WjC( z>-zJ;g}N5K!@;@XQ<9g}_BGv}zia+*B2(m=XRIk{=A(0eZ;y#wEp(#EE|<7fXPU;%`$rP81y@6=3Db{s(|fUDk?)DUYg;~r@xoS2<@8L(|@kq zjINyIe@h>Rnf@*8HwY;Fw@`dtB=}`EP!Sd)dY1=v>TYZkt~rg`HzGmG;4p|}E|;zM zkej12Fgf86Z9<{8i-Q%t^92?49g(gIy{e+&r^l!e=g5&l^=#kMM79aKxLDN9c=F{k zAh}7Zr;*Hdb~A}w?X(gxE#iNk>pYa8_mBlF+uIEP{7;qCY%3+t=&AN!5j1DNikJo9 z(*;@CY&;nwY72JijFoA-$LwO5NVC9-*-3sv^$T(_oWAr8B6Pi~j*6Pq(Etra%Lp%< z_P#pqNQNCTp=dts-TY>0_e$;85NKQOc>1XrM{wfs{yy1tUvky3$!j3Wjy6jA?zU7j znfhgN>b04=`GvI_Z=k^$Wv4n_Mu>?&0cnRHo)))InEXFi;q&5xwt$=IDeAI`t8pmb zsTQ~+;tl=LF6z)KibjOmszZvL)I@&(G~M*k7yQg7oPQrmlXZ47G}a8pGB3)8v9V>mEG^Y+fh0{3h;|D4gwWu06K97q%X=HpM>l!u&UlSN{$fmC!-{Z zlUjd#xM`cwDg4Hv{@_{ERf<5-DX3boD~O;}8|Nz8d`E!d&oyel9(+$?iu&7)HKCl6 z#<}8LfLi;+kr=rM&$ZlZu1{v5c?V&s15Qb;izL@(5c&i+e(*@l*6KoBBu97F_wqg9I0lKxD>VdcKj#l6~3zTtY{8pM193df*BuD)| za=-ko=iGyy z(@P{0|Z)<}ckc{A@zqMfh=-Erw`O~ca`|y&HIcqtD#1pnH zGNr|_4h=6rjph=Ia>mB-E|9hLs7=xfqxM%FJm|~m+^C{6=E&vQvEVPiT*MicYR(v@ zPKRZB&3U-O4wi$F>#iO<%s+m=8Wad__*=J6KQqFbHRJt;%=o4p!^{ zzh(c9BZ^f{!vFgl&%M~esKTqM7I5s}#uoWl0{*vOXk+IOcl?jL{O(1c4 zzk%AT^S5=>mE}nnq5N---2budQlq1{rWzK5<~-(4N6Qoim;DieRHx3qR2Q*Z6oqf- z9c+xFzAQoL`QN1*WmMGMYQyYRO`8&;kgygRaiE!tG;-izU5>l zuUcW(t{&OAxy{c@)_I4F{2x1wjZ8_bwsR!ok9e8OfD-eT^~a*FZQj%k(Jb)5`wiA> z$Gs5+14`;k-esUJK_0cN7~UGGR2hrr-v^j6$8TQK(C#PD;q2HUzp?yg_|Jyqk4_ln zcxRg`nRC&smot!5Zao`RL0QXsE!V*#(QnJXp->L0K6EEgHGbK#5G4}Z5fHJ{Q5*0@ zFv3|ci8w00brL;Xqq=d~I7#IP@PISUAre+062pDk5Z4xQ*Ba^M_CZxDsUP*i6PLdkTvYoi z2&CyrMqSl1zCNqc!5~vy#o*)cayn4AN8Qmum=!ViZw6?eT7zbygVMjEr@x=n_9xKWG|t_`EV% ze&^=Na7TXkbVQP_KpSZ}7X(U2tq@p$Uf6`6M^qfVs(7=-A(*6-9$4OWxm3?i-uxu9 zX=X(sm9B{U?q#P0RJKy?@Fjp8xqt3Et2JNt)O-YATU(jYxhM2^C@BxE0~zn2)Ej=E z)>YL|8%WFgOZtPRh<>SMO0Zl&pW5hZ-h=AryTUpm;0d2)T|t}slg_)j>4R!7UMWo* zj%SajS3Dh51CfvbotUOwn7VR?P$bzS(O}}3EeaXi)km*(l14m?jA=U<1*ObF!%JJv zSsU+$hRWvg>F$gsRRQ(a=hA+1Xs4nLyzHOT_4b@PbA(>-tdAMOv*mwz=cP~ZN0(1o zg=eBi*`wOzP3Fgvh>hqQ#$WTkEjV+JN1ZJvryl8A<%$P6s?IRcx>jVIw1=CtNPKU^ z7ZP_}N%Q+TDCC92KlW#_t|j3+eWcIuBlM$3;4t(9i0ad`Gr-pL;C1GPD?Y`sIMiD@ z_Qq*&sRYbhL#R0R~*M1I>oe#)5Txg+w zyQ=N7U>nQV^~!`C{E(HH&e>z$x19~SJ#a=Z+f`bu^=!S$ldA^rZJu2#zF5+l1JwgP z(RCZmGj{g5FH_P2MNAcdpYj*7Q5o^P1OaT5krKC})}ZPtL)@T?V3< zy-2q;IQ$?}70-;=mnkiVG%)g>7(5F7l*G^fOP-8k&wAz0I)A2KEm*{Ua!3EKTHebw z3Eqpf#S-W>bc_{Dx1cV4P!5`e6!Qh45bSOedDeO4cM=t@%VajT|MhiK9Ys>JT( z^5$67e2Io?r9ZZvBq8zK(OA`R-dyqxV&RuxIsNKmkzd2Rto64WHzIC3zU8hTcA(D; zyu(9I^|U5-tV1cS>@`q8a$bVm4F)11r}FJE~JKeCFS}?ORo9M2{dS?W#=Feh_OHM9{)XWQ+I!m$3(@ZoXvFB zS_qy<=bl*k)-}7#In`d=XZvWwJuXI*({AnyfnKS5jjPQyoxOJ%!gbHF^{jlnHBqmW zUwGOiIoEM*8AAv+%!4OGgzN28yB(dsYA)EAjZvyvZMYxu!INE-28q6H|9-a8SYNqy z8U4YOX=&xrBm&38`+GxbS#h;8>RpjJ+iwltZVJy9a;oE{v}kLI)p3bk{u8%!*5D^U44!P!92}KdMJ8ujsU1wqRyKHp9%X1`2q} z7onzy4Bx&Fg-q~29}4`nnDBjsh|Bv-$9j%UC+K574+gDCVZ)Oi640DA&|%~B^@{#U z+-jlO5~RS!gz?Km*d577&vFMDkWq?E=M<*CMT7vGgwoAvqJy7sa?7rCn-6FhU77E> zqJFi509o2wTC~IiN=CnXH($B;fwz!9i4J}N*ZihFVyA|C5vFBteO{HkgtbwanH|a{ z1RKBJ?Z!-yTPYpiodUff4ZbY(4d_F-Ezj*)E#u{^DbP-L6*Ki6Cf%8fgT-pO(H@5x z>llUJDPNeN@?8D@dX0oAwVa&A9w zCBAc1)8{(QR2lU5~g}Q=^-=NmcvGCDNS8 znmJbdieIcfHafAKoe$IC?8k{5ACY+Yq&@&FtmQMtGU_beu1%o-(S=f@9%dMfneYwL zDa9#yz$}uS1}u8aYOrHtMWvgoIeZ#tXl=PrbfTU{34y_n0eQ+8etS*VwDJ}%vT=x| z)jMf>yce({7{9ob+DkT()Uk0>k(Oj&U-aR`F%4QMIQg>n7OdWGWK%`UTjH%JkI3M$ zc-z>7g_Cmu(&e|iN8f?2#N*9uA#pyYm2gvn3{%=sKuI~j>#9%uxVXQy0wZJ3{d9=Y zdPe?4n=Armp?7PQpUbV5$%JEbpo+F81H;OGjK@lA%XrjtYe&9sSpC9ySCum8xo2M^ zz0LfJ__|~~7(Ov1m;a##yk6H&IhNSwHGV9)_{h_6zMJWhvViMGM6~#A1j54BpC`H$ zn)sxH=sx=lW^)bYk;RG6F(?|iEthmGwUJ09+4J7eA7t+EOK#}HjMwzgJ9GdOoGzGw zeYKgc=RT^=_Y6G_e4cP4@)Ul_lIt=SOybgkF>{;9q~slo@`%1HbX_Rn3BHBMc75G6 zlpSJkc1^9C&QEv?R#cXMH();GG=83P{|;fB)KA>jDtDP7TDJ$H{`bO3#qau}3Ff3c zrG_9&rR*I`oRUHqM#-CpZj(6{qU%lz8wR!(>%G)fsIu>DW9lBOieoMIN<8kgXRl2w8eY;hG2YT5Cj$4grVJJuMOZP2~DSJ~4QFqlCVOOD)VM_QG@z0uxfZ z$5r2S98*R9&ij-3QruZ)acZT# zQWITKOLz8Uzj8+){a3gPiJcA&6(S9jugsNQkX?t}iiu*rn-A|_P77)1Vg?g3(k=!= zOK;yH6eBO2i+IJXC@R!&xbS?_UGt*KBOFuVTQlzj_4 zZJGq)2->|nCEES*On>Bv+?`D~9e@lBKAx*Ozi4v8Al!CJP+NQ#A{`-~yRAfKqOLfE z89oHNZJ0-`RnyIwxwCFP_t{dt?|#RmqKdJbpw=`RbOcvsm32mrs`Syy{CW*yWx zm=uqyvd^^u?xly~O*wU=cSHjpXV}-Ga}5r0si|ISpF3`}p8A!R9%%vDHWJL`uHgEy zgv1}_S;JXrUhhMtdWh-|p?cyX+~0BSGqeUW&aUmY)~b|O3+Dzq@?~y=Pt=1spV6y1 zTb6(ksh)UnRmY@Dn5FeJ%a2r6p^OqI*sYR$PSC32d_Zahu3B=w?il{_XXyoxW`vaQ z2eb%Td&Ij2en5llpFC!1nv`NQ`4+J4?EierIy+wY$x-|Qx__#iRVH6}Ty^8MxSgt= zCks#x!u}9wx?J^pu`zI&L*insevA33fLp-D+ixFx>P8b8rw6kycnl&)cZ`cp%mSxC2$n2sEL#15Y*BR|{~$)OR8n+HI=A zy6}Ex5P5*?eyOkbdsHrXc0G?i4a^oZ6t$1!#Zs*ES1wVc9LEC$f=tW0NYF>3%wPRf3UJ`XJ( z$fxxxt^{=e7~{%o(;Cr^aaS?T7w+N|8Q=kz8gfH1cm|R3))Y^DnE&bfPxJZ4;-@eA ziqpfY~i(Vt3?4E3GH8_*4cz&Zc)dlbKCHFR2Y@J-{@|Z;y)px$B9LQ3Y4* znL{_j5GZTJ%fLYaE?M{Butc>cf`4p#-UUEOuD$BFXUwzugJRofV5h_T>(h>m)optd z&c(lLL54LR>KA3>qN9LI*UXz!qSjDZ*H||kwCfp1R>#W4l;~=_-=LUP#n0=AUFfhk z!_V&~GSEQs9jJ~~hFP?Q$jv<&np)Dv`I>fHVb`QJV{hm8UYic7;@BXIsb-80Kg%>>xs1*N_J>r|emPDygLmF|7~7n`X;i8N|^C7aElL z%b5zQ5O{MPT(xQ<7wgme(hoEv*IGr2Pe7?4Jy>Q^{$Nk~MaeNCis#hfEQ2-7C1^T0 zNyYF^cVnIn-TDgf)PpJH4I4~thqatF^9Q|`g3I|L7-->m`AE~tQ}1;7)gg{7(&!{6 zam6w1)JN-f&)?G!Z~36hm~`10F)uwE#v6G8_#TAl;}`4u`QXy%Ct1@+qsk? zx|K8LaRYCk;1j@neBg+3aG+j09=R$FoX&O2FBG&U2%F!MA$r#NcDV*rse4z@*}IQV z{p4HQ?#c^Cn~cK9fvi~RY{XNW`c|c;hN7Bd&0ojDqS-;6abIQDPESobqEgFNs|vFwoV zN_q#16bkg>e>CGultj|Rq{B>ZwJvd$dFn^L(>-h&fZNf-=6+0F*;$3#IeJUNeM7E` zH>dc%4-@2;N~I37K$YtrV}=Ch6}7BZe7YU5OS&@Bg&Pt&j?*X6dHF+M*+9#!MJ zt9GE?7O}mCwpd1U%OHfWV7u?QfR13G#yQUK{v%!{W@W7*mW`lG<8^e6{B+;`sZdwV zl)%wfv;f6w{=9?{pYNMBT!AoT)~oAxqlu?h!3R1tRgU!1&E{B?!Rpm`}jUQ2x^FIYkV_6 zCT-p)dw9=B2iH{Da3}+{pw0A-`Kh=G?*hI{O^?0|Jscmc|=vtT~|%3ki9&E*gwPRf@61fpW}pSg89=Y z_CopUclP5)TCVU0dp-xU6x=ObUug>K?WVI+7Hm+HGW9Wu2ENw%VvMQvOp$tmd7z%I zDH*gy0=YkdK*yn+5VUwKJdKvxYUNX8wY=i;!Q$_xrUrmOtG$3oy%=*kwg2+#82z%K zq|5tBVj5woe!j1H+P=GC*xk*vJWgjX?G%$wLL|Qm!iwJdzx%dKOT%V=9Mh4I$WCq`T!u4Y`Q8GOn%(qx63X>Fs6y?!`)A*zOBzY1>hJ4cfz91N}b__ljVUC>dP z&;{)doK%(>M-u1}oj@N=agT3VrRhP2Qw=(bn`54QQ_)O0~PH zq!nCx9S8|+o+UW7NM@^@oIMy+X-se4JpF!pC-o7t&wN6r6)ZM4;4tqKBOfz_Hq5k! zq^l>7@G-yBJ;JDFBF~{~u^{ggh9;juoD2acnroMFH*8-D-oa#}-cNU}J~jA4@NvR! zru`ORSnsj0SdeU7Kf@Yzdg{hF ztstG%+gPs2*tcF7!<=d=|G}z9i<3!jY5YHXw$^@=38GE2p-TOpg$1uE9@BMLKuf}( z*CLlHR@k7&tZ6V^FA`<~Kp7`J74Cu2Pej}AOxsHro$bFF0}7FF!0?a8?WD^k$neqrZjX_MVa6LCSvSch|kP@^Q{NweF$~6g@K&p zkpFAs=N+1UCX%A^^;|aFu;JnHIdr(W+KBRg=SnFP-Kl0;uoCeXBg2U_`9tfX!e5HA zi@Mz>sj|Sqtx~pP`n#u1FNhj)aG%l4XUZvm$ki}H_?6komVaG(Ei<3BBwfe`^c=7v%yQoXqz6f+}W&$~A}pI9vZ zRx;ZUbH-u1q@7qhTDdHR!qY%^$hc6&_N4;v_y+-g=`#Bw$p zwomMK3ptHyVd%;3V0dAZoza;r%d+}^$t!G6;eHTQYFl&Lpvi@FN) zmG1ht-ofv<%EjJh6ttJ%B`lKvQ2QIxL%8FpOc0SF#fuj&OA&%ES~oRkOOHF7M%C_R zEb_~$#b?l_*o)k{JI?68tg|kKD+CCgvuL!B#dOaI@^~O9?W9)*mxbd!8o4%s(9|J> zHfMO^q~JwgQ;TyUx;x$qWVpxWdeTR4JGoBQVt>bo_10k+#HCj0yR=O~igWBN;!E$( z(3j4#HY@r)aEtYV{#h*ZOmaxGWa8PQNddo|tfO=$EEq`An|ycWl6ssR_6{oUoKN2OMjz{cX( zc(Faa*+j@D@!+m4N=wt>KWq}iIoHw-I`V5GpB8jJOEDe2b1?a#PY zZyESIG(ZBhDdNadTNRZ(6sxUShR36tdF`{MOlmUP?9F;E+Tw2>Oj{3N{6b;i%lF*O!~txk>;8F;Q;f}z<#r>_(zj(xnG<|xh9)H{l{o6gsmytlpA)!{o| zu6`txP#)+))xqj}zx#r0H;yABd+8M( zNf7Ym0S^1*&#nko`zpjL8TvQ{2!SJKM6p4+VPg=`zWEekmR#U969(S~if($qufG~T zZD(>x3!FV^!ZdG+%<^BXaWbQ|wgu0|)`zI$h-{>9uG7!TuE=NAHuyI;tTT__1o@p= z@5Bb*m>gW*@!q{eo1Mf={Q@Z7Sg_EmGNf?PH&l$qNO}iW+xTi~>5A zmmk$QNp@`4edLF7rih&Q$&X!)by+~il=U9RKDs`(?H1qte$=jyuIpFxrS)1r-V1Xz zG;huaIqc+RL5;GtOy>ds21!odGg3pBE`}Livt79Dmv@pVYn@SidI1BXn?SG;^aZc_ zQo95i5EL_OPyB-DM;!!{B6xAqm)%HgPt|^y+@yMl4mu2saaG}3&7%LlI`_SCc{Or# zTT+#cb69TDqHv%wYM$wh?d6>CS-NnbZu^HF&#}WN1I5RFn1QNvlrEAeDYj63YCsf? z0Y95}$uZ+uPae6qr*g(YIky`>Ly=1#VBicAA<4UJl5pu1YEwBv4K926|nx&={ zu|2pHtQ1dIT&_K!K-g8*C0Wk&_6q?7s|AidsNAHZqb;~O&f31vhn0Uoih%r{-@-~p zAa->lYu-p!Cru;n0l~E8$3k~Q?C(nikWK!QF1F_n%C+xJ@}M=+-wB(@SCL6fYCX>C z7Y87pp?>zD)ID30wNsT=#$R@)LrVDtdc-P<3yX_ebaId41K8&EbY1Gx{0s)3y)aYC z-k;q&g1~Sm8rBnY79A2JiiFiu3JAJ&*TaPU7_9XR2UM`?>(guTmmHH92G7#x+0bL- z)6TDV%U)a~>oS=XnhM7JnEEBcHN9bcjK(3BiHg^3hiW@-Ks9OX3R#COXC=uD+97Yg zcxuOdG+Glxy}0*99Q9(*-^ye6fj=zh8CKn1E>~7SZ2_{#;rewwgdwQV$I?QoLe-t@qf#KOrXm#+!hueEP$^q? z_-uPl%|NrjWXOH=Ey#m6p`u)h_Yu+x* z+7;Usb3(p>_E*T6kIZgCi<3)x)aP@n=Lg)|(9!16Se2G2$Ttkw-##uNKBwe0!M4j| zSLAVEeJOH1k;xXGj+L(zFTvejN?pmrpC-yBTcW7R>P~IGfb5wV7ynLUfBEvb5fPsZ30DjbK0^zQ0++UxgWk2t} zs(hl`nO)|@!bN0ZZ8+pFFuhKCb-*maYgov%Z2%)JKLTHyt4(>s^7G>gN-q>#s)FD( zUq^)o{1(_{H7@gFCnFf;hMk|)1^ha51kYY;h9$bxI*A3D!V$msQZtb&?+fGJHj`|O z`Qv7(2hDp*gE~k#D%)zl^;N6&_@^)`w1Hr3>5jtB`dJo$KwInvwvn2K?@%Cfi{JA< zNAODFRq4T>n4+e`XI%_pulxp!5e>!s*Fll(`Z|m5n6MX2wr=eZM7Uiom2aN}pUc+- zuT)hhAt9r!UcKPyk>YuvL*Tr2C2elOD2kQH6k;9G#r^1z)4k?D(Ak&^e;v)CRv2Sm4-xGCPERw8k-V; ziNvx|-}RzyFM<;^Wj)D7Zqdr03zcZ&Mm1;F1&EUKwxNViFE2wWMg5`bjE^^oYH20$ z>#U8ro!@efn#CtozA`ea(6f(h?ELJrDAXjG{S$~f8bb7wDC&$XL&TymRx`w*{%i%!zt@4_**Uu5^}UGG(#kMTZ|@_V?CxHSb@VBa4t z-Op5X!D%RmYR!hwGc_~m1wRn=GiN)wp%O)p1d&{i=@iz1YUu-%3bVy$0cuIbrR^Zi z0BdJr(=qtCwPWo?ohES1xYwU9#VK`AR9!Z64N5t`rVHttX5S+&7Nn0a{ECdXw_hs3 zo9TVc_9g}~lWL*h!stb5TzWPV$}%BwKwtb)JT5NK8}HpkvEN#~;+OH>l5~3FjQKVF z)q00kNl=oF!4}kg>-SSQ{u_e5yAul1)BLGpfUt?!HU{5fdV(T%lVhMlFdTF|Aj6IP z@O(mWJq4PvwgkT0!PlQ8X>eKzKZ`dR3S%_6TN)-)_y`Iw6vuQK3aT)mlY9kUn^DTA zPmI4!13>n~wANW=_|HJEH@h z-qXCS41(39xh3aFzdC2Br1d;#ct# zt#<~VF&jC22Pq#B{Fs0{h`{xD#e$9(H{;)2mdbVuwjFJ45Kb58%2`2YzlQlkq&zjG zhXk)o3SwJtJN;{YWMA*g=7byuZS%C>x#jKL#YSD`)4t$z(M5icc-GNlz0UCSZuI&> zRx-x{!Bu0_*leQ@`4B_WncmIMzK`-I@792;A4Mtq8ehD(0o4o2NKe~86+c^%)uQ4k zr@z}=Tq3758GIA3Mo0X0l6rvxB_|1-OTw##$K)|85!_PYg;IMd-HqT%9$ehhi2Z@t ztb0uEC!9=ZO1w}llZvHvJqu4#8^PuP9$Z_K_a$bnAylXH@987RJ5iZj%&}M`98taU z*=C|Jqr8{A1GjeXLfZ6FVGY+6;gKcj1K2Sj^zwXAxR$VS^w1Te+V*Mu5rJ!aezWJR z_<^U${NwwYo=lhKX4k%itx|V~3*ovO$BBMesr}vbX9gqkCk+@JGUs-t$QwU`_I*Tz zJ8DgCs>74*x~AR$=3ep!lcEj#0(p-p`z+M#b?#yMY-4N9#jD@TUErm7b881eMP7;= zyWrEMi^QY;csAWhudTXp20?3%G%+>-dyokCjq}R9%NZ3nH8uy|7BJ|q=l<;pES>g9 zv(f5bs%!Fb?_Yl~1?_)D*9Vc6wc2)m5Hxp));#c~Ya+-_W z5+WKT$sBDJJrn=qS1m*^^~6y`P6W$s9J8h-MZY}HRpIH4vniDEe?FET>g2fw78Xc| zD!ags)e>=-6}-i4JN|gy6l>#s>++|A3+FyqON`W+0880$ttZrOPOMXSe+_;mCVp@W zSIwOd%d9MaQJR=lvZlSS5VXT%oR%h1u;KN09=a9svHX+%<_kIjVzh9!8+&GAu7Sk< zuipUz391w}g<@)%WK*l(d&bmuYlH0E_)09lxrhy7V=&%=?dIH!34I#b{2FnM0a}GX z72@89X+IdBp+GoQWh4{=uj&67`G5w9$*hK>E+VQrl!p0hY>h`ZqhxtjqnJA`C^&4@ zUSqo{LEXQf_+AWCZv$JY+pM;b%a-6^;2P;8>5ASCorq?KcA}E(pA7I&7`Pb9E99-_ zx$aA8GVe6Oz*GO8A2p$4=T!DH(ZRUYruxA%Ysa^)6M|Sv5J|N=2aN+C^8?g*0N_0U zR+_q2T0IUcytQ0DV`H#B2pIi+_}%uw8>z>b6WKm zCA0C&3i!KnXo*2IVkB*C)ZzlIhB=4%sm9wHD1wBlTx#gnogMicj!rT`uP~+!LLe>; zlQkH%{(8vD07Dn zYbqK#oMctLbay8()m*kA_tAaw#ii(_QzE@vgN2GSz7~{xLayTSU_do~3%g$NGaA26 zPRg|~&J^KlN7l2WjJKl9q=?b2#}`7n(u9NY)@WWP9p5?p$ou&dvF?-4;k}c(;6NVX z;LGw)<1W<=%z(&wpf=R8PN&niAW?>@2r4esF{=MDv1lAV`Ji7eR6HRCs9F}psU$wO zR~eL|vALEAUum{Wnt4sj>t0XS=oETqzQ<5-V@Cq>VeM*POjpY%RUOatrdmIY-z=o1 zV)FTm&GdIzEBfeWIChA9`p(YTFE;?$vjpwXPn9mui0ntsbcyET%}cPVzdAc28a?us zK%Qfsw0#i08H*h0sHDxwvNkK#^DK2d$zQ81&>=9Aqj;_>tDmzbSp3J^OAutllHyp= z8~StXtB=caeFFB7sbJ+4%cy52r9|+{LUx>`?3=j}2~SUVukNq=vOS53Yk_*j#S9;( zT$J4D4UJTH3XwL?9}2oCIAsqeD^n=nfd$bV7>@B%P4$kHfa`Z+iXRJHn^xlwPy#x1 zjo;s?RhMJV)2163Y>lggu*sia!DK{oLoYRhoqdbUv%*&cM;PmU4!rJyQgG2vI=i2{ zXaKMSW(As)>=)fCNkz0%+ddxPMQwPE6Hs@9BQ(PFtg*5)msam_<)#d;&$;F}lef)_ zR_Bje7mg5xWkPYvqIHb4gSEJcksZ=MlSo^sD&fRR(c$_z1*blff|n-=#`Si1>wPb& z@Lw1kdd)6&vbv|b#yPKk?DF2h%ratQyl+(Yz@9GJi{>%&d5T zgRPFCvakwH`X+T|{E8G-=X*ZtY*4}pXl3wkl!`cS%$P2Ypf?U#%7-~q zT~$A|k4yhSl$GyY10h-EdPc)=IaY<=_$j9|D%QmmeY8Qh#Gws5lgRyJ@ZBP)G^m!g zd-lWGz5BxomWF>H-JCGYuXPu4p-7>5f3HMlK_|%cp?|0L?RMx+T79)(;iRU zJb9r<;ZppF3W=}lZ0j&>n2-*f>?(IoptA<)HH^;&or7CapQq^*hU%TYiEm*#f!1n% z#=1yE_JDAko6mWRo`WrrAxNplk}Gl!uuZOMVqml+q%bMlbo!(;Bp+0nLPVuj?!Hvb zt|){;VHd^RsH05{)eiNGY99bo=1_x3TR7H2V-+s`M`9H9p}Fz8{T87idlRKQw-iY8 z1*9M$;Sz91y;yL=`%iCwCXITTW0A%7Ar*{%Ky3-^2<9d} zbh+xScNI<-d~Y~tc4v?FWK#G0fW1~ zeu_x0bc3LIc&%ExOk4N&=k>?G+H0sa5D$3g*tcxys^j&SWM1zK@LGILegEg9Me#I8 znrZ_V=|LMe7Vu2#*WQtGcGK0=iZSW3fA-ZK82(*ZJ}!!mKy$g5Dj;X^U*mzM&N63|1?zWB{n& zNMwoqHW&<&cg7gq5P|%Ub=f}y>tFVqF!*BSMOw<&ct~aQEPK|rHoBD7CJedUpKfQj z<;6C_j{Q#L;YiJHi@xav;R(2i9h(K0iT%vxIfkeD*-VUyx_Es><2>fUNy!a^)2*Qv zUlPLWgXB-`1#6CHq`BB#^fxA=!$UI5*|ZBcs0o};PddDyfuZ3n3{Y<;HWO;Q=Z?4A zPs-KFM83pz$yn(u7Wy;J(Jd&r9-F7w*V zo75$vVUc_%KOZ{Hy59o;()sq&_}I5v?xG(`e%b(8|K1H8I0$o15-)wT)`eK$c5HJj z8Srv;Yxxp)vAQaT`E)wn+U%(Mlg?xS?R|Og;U5bHHrB`zSH^H-{V(=fYzwV=J7cOHNe(+4n5M3GW9CZ15T4mbb$J!!I{BTcRXUktDVR+9y z<;I(Q+%|?Cly7iwF&g?wKwT^9#|E^L>{ z%aakdjoD=^0*;x@1V0BLjkqFWC!`*wv!RsRXASd}%?fQz~ z%t+E;#*o;w;;V>QS&Ji~)-!Uw1&rScK~u%{)4H-XJCdy|v{xeI`I)sl|{qJ)T|GTpw|I9)jqPh{!JPW_KI^FLt zRO_0H=CTukL*_=?if%S->K^fRvDvvgC&urZV`t7ZKN`S4=_%f8I}U!csERIAfwC)z zp>qcvz^2O9P7W6J&-_BWiwBG3^XTpY8$}h-GMH?|)Iw;5I0*XAk_@&g`YhCq#++Vr zWE!w$V!aq~`4fFIKAG16QI?-+D_dAD(gXoS4!i=e8sgci!&xyh0S(VilG!6jyy~CR zmbfg5Uom28){Uv%;EV-%u1&ipU5A(G6D5bN^jXSD4f=WAL>sv#{mB-^-xX}%8#(ME zuSGroiM)9!-PiZ*&O{)Cf zp39Cs{msA$+4Oi2RL3;bvTx?5H%;(Mpf;mQPGa;B>N6O^|C>&-%95`lHf51A5kY<> z!#R(Wxz<_>+c$7nD2wC`>~WYoZVvLBjNiLw=)K+ZZP{l3fxUk{<2OD}4Na_Fz+gN8 ztSN}Rvr9<*0jf*nP*qca*GMAL_5BO4MS!I0BRX2^^O>rGhbh5flKmQlfKF|mD{M^b z8vwDmiBw9K-A^BYE;RBF-CtN<4Cb(NzM&W|e52*bFqt_2g*YrjNkK##r{1X5T(}r3 zD@{$6ymD8xvS3+x|N6l(c3);>NBGBi1i|J8Z&A(Ub;#FUc^C_M=g=;1oK`>i$_JQ; z*N_f=rYk83bL{o!J%6yKmK}9i)7RuY8hbC$h$qxUCitGu=7B@%rjGt;3$vOQYHzZ* zn9FxZ?f6xQI+Z#7yGICtwI$=>k*Lc|@&dEQUexVvEz@@b- z9^`!N3L+iY(?+L@6OlVfd}<>lUur0>*#S-MNBHLLzPm_m7O868mYyF3?Lov$uQ#uR z0DZ14g>!d;u=_XgW*OpWQnhpx<^dm1+I7@< zuV=YX7`Bs8-}?EayWy!v1!px;b?@yvsxR4Dnxc2qNQfnBqhe!9j6SJ@DUT=?`z4ToB{Ibiu@S*9C4IP4KY*ve{Viq^tr%R28kG|GEDwxbaKcLwaU_!@B4|#23rH75!FL zI5X^Hrn!U_hX$v*k-(#oROHZtRlc#WUI`fJ|`@#!JUHRjeOS_@GNM%nqpNlUG z!1ER?F!F`QqA(SiFp(}?lQ3TVUczIyRD?VNZXBU+ZSci>T0MBf-qU_VqPow^CN*bc zOtTyOA>XXr{U^U;EA?DbF0z86k(39Uj7wu!(4e=Low$j#wdCptIA12#Kl6Rww2M6< zKRlj#I@`eH^(Q|ZNQqs|UmWo?;oO=v>*dKc5TxTi7iX+6Ep_w)vI(WQc0{d4X31Y{ zxGuGjmv`oVHfVh_RcW?#(WT^=rK52!18!6y=?)=JN9I&r3C0_P;)dq^tA_n-8&}CI zOL5-eoTppNR{Q9@ao%%9y{9>(fTOtbpL1iG3MHo!R+aRoTpx-H(Zd^JsqY+x@kO<< z)M{vlBK(Tqo)CEa59;1JEUNeKA5>DLR74~Pkr0sXp+pp^p}V_Nx&;&z>1Ifkt|6pb zx?|`Vx?|`b*n^+%cc0(x?|Jt3?EbNP?fHv~nQP8D_c`Z2_xn|E@yCwnk}naVHBP;> zk#6C;*ERpBSvXCd_GtR_C@tvIln%L9)5*n*`>gs3MMG3G;vX3MbTM&vsf%64K6q9b zu~jc$=)rI|VQbw@*w2Lsh&oq)Y({ywF97qz_U=pm>MIwU$#X4>qP2^4KehMd@+WG=nOz@hiBNCmwbgy0a z(pWzDcAtU_dbvCjmCo*zLMC;_Ww6l2?4ajGsRo-4jjswfn1K0xb{V85%5{Iai9%e5dz^y)+KXu80V2yts{X-9lxkTEas7lJ~uQh*tD1<4Q!yZ(r zgi9YW{QNt166pl($5+2W+k3Ea1^YW4bm;R7Qm#<}Ah@CBZ$yJ4gCuqJqg;M}HzO{R z_UNqU9af(~9^C%#r5H|ct%C1fyOKMIsgM?N&f7=y)_?-o=FpJ&YVat<d^ePH0##F0rF2++3=U?G6fHE z<@3RZ(~5;J=2UHz@cjK9Z8O@tg8^j5aSVQeB4HCj@sz>wEd7 z{q@Fg*zvIDR@@t6kmxcc7l$&-q!R8^J^p(Th<&2t5`LlXF@_dFePHW{{#U?kKtt1` zq%Xv=uDnq_IFA}kxLW#wY?sr#lXiLr-(Cu9O|$)(bo}!Ce9?D9^qfYvZVio#L)`D2 zPH&qJYhs=s3sq&)!OPa%a1S1@Zg9C_XqNbQ807lA_%BZd`7>*OiQkaKN1(3>leIcs zjqZDy#m9WUJK`_t?O7lX{B0`thcn=*YyQiv!6@}>&8NOQ<<&MrYzIB|)BR8X9^saj z{o)V5`ES-#b6?ok&?NcqlHY2eOa|JY!4K%N5tnF3Gw_{VZnkjy z`2@tu6{#-SWHE~>S=lrBKpXkW?QHWEB|&resf0S-VvU5I2tk%c{Tt)N--Q^5y>o=-!rwZntL?>Fd@7FGx9e>$Cy)&A=(ry$@TDEw zy6vhXCPbE?`nRvI&QiVv@73HpaXlL}&pSXa4PeXb{k?7x5jvj_d&b<)wfPJsd(YV2 z#;nzbJOz4Ib@i(Xu1WB?m4EY*AAGL@lz}yJ3OY4nU)sW&g!1GQUy*w$u$y8-D`nKf zBu%qimRVZHjK2yY<FIe<0dLL6R+ZJ8K^ z>G@HvRmENeR0F83=ZvpOefe1#E8i^?;0J6zULI1_Bhe{t{LAOI=WYOmM#H>Pp^`sN4Qf;Xk^)2Ql8(HIH9x`iLYU`u{cke z3y(d528aE}b~w!Vvt9u*X~X=wv_;cI*xN1^>=nbe!V8#Y7m4hqKxRmMf$Y-=b%_!) zHFgtgaqHe!eN8Q)AnyChz2iUi&{m(WE`ByCgVDq6Hn;Bay_?y49?}`++S8sf{9GGQ zPX7rcXSl5wVxaj6*S>9P3B2e$SR?gFysAR}TqHE}=DVBZT9XG2@92w@)5jFP1(<_& zif(Zv1mZuEQbvX+_P?_4$&S9Sd)xZh?}SwKwsTaEub5qif@tqIr7 z0lR>FyVK=h()=BFR|>hsqhG6y3Ke&6ZzGi0#U>>?MI z=jDUPGWj*jZJ6=3G^k$PtYw?k@7%6bd>TkUuP+uZE&7^btpsHPDNh^o+(KfgTJ2c3 z$G8i2jVbosqfMjBB1%^b*_%eAUcGXr;ypiA$76M%Qt09|#k7D}JZZo#l@QL6w{g=x zJf!Yi2a;ZR)fS~S<;Ba4BU?)4-}Y#<6|CZG`sII2x6+cF>JjA&kl;%cEy2Wp)v~dG zp0@^W)93}T_u>d2JU8Ff<=SN5#crGr0AGyUUnE@IA58f9@sfMialPqRBkJLuj~vy% zqB8AwB=c^Dt@&a->2b&1l59@BF?0gK`!d)3z^-vyVTs2u9$HbPp`dL5otlOyp!%g6 z%m%Z~WZgz$$7~X%dYFisDy!Qw1RxlP~8 z&*0OzR+{#P%p@J)-4Hi_tfg)F_~PitnN4-0`2dFX(5)DKCf-@9ToqQyt|^i|ta0(2 zovm>$c2kjdp$KGL`70bbsg=`Rg%K4N$CSv`**h;QgyR!Bx7L&2TVm;jM!B#4VvYCx z8T6fC#SuQNw(~ueP9nktD9&FFs%L2M5$gxx7`H}@C3*k^LtE`Hw3PfFB zds^x=JX}yEZ3MgwM28x2!>Yj2I8#|b9w24u0H_GLU&@hKXMs7c0#lu{67n1j0}Rpw znJ)lYe>G>QGZrO?rJaTcd5r5{AEmDjZ}N{OOtviknRjzQ5}&vD@EZQ1pFLGeFH$wc z(?#6Y?^CCjx+2Q$xLUE+jAb%~JC@tjC0Sp(|HquHmOK|~Q__L`rxLbPQp3x?dQ*cR zZ!sGhp>--(HDD?XI_?O3nLrHlTC8E55*PgRiCD0nle_7v8h1y4%aCJjwu_VHA@%S; zCwEAZ&;ZDfnO@S%b@nn=ve<1D6)GN`w9=L9f-DNQwpI7(tx*Z1Er(nGbb z0qrZRYo3&S>K14f#MX`CPoOeh65Sar)&*mgHG0CtTRAxNyk}M#@@9YUYq}+LmaF8(9ER{`CVwfd&D#l54)0DJD@#`nhR6*pb z1ePF@eH;4~tH)PrB!>)_ITuqD*iKKYSH zQHHJ%YG0AUT|ou#5x@fPl`yb&8a?9v0I|)8T#K^i7@p-P2~+f6WU9(mfqr~DzarD0 zKB|=EJ)zQQWQ`DTUW0|(f5S`fB zGdCR(Fx?Un+I@LwQ}<@sk`H8x4iY`#*`F7afV1u1g$-5s(g|UyuL2EZCq3Z+jpK^)&tubOE9DtRr1X{>WNtOZp!2MS)}sk-TUM|J zi#&TfXPJ!4X@RgoFrHQ}I?KhFY=p(Wip?$LZXMR$Vc1!F``W zSKOR=5IJB3WMzb!QoO(MAqnCQFNV~&s8ay9XRql5erqq+Kx>43g55nk&Sm+E|0Npz zZLjgl&U;;Op5rev?abuT-!SF-y7r7Rv;nzX-4}{84J4r!k{wI+p<+p+e*DY*%7$N> z{jc=Y+7?9}U!?sIgA`x&X>}6J>wo9$SX~L$5NC|enVV%rtGoZz3jQBJT;ThESVeET zX{5jTm3@_acEK%jw>nSt6h_HQnO!k_2c{14rh@VuhH{Jz(h;JWxK!$W(_J5w6-@WZj)p^J!hK!xfk!DCZhG0^ss5(euu-k z=;|ih+@#0P%_$j>lcsc;h0ctcO%+W!OXsu#&kQ}%!W%+o(tqn@|BRTq3!7^dbA>`k zH%DFNk_KX#y^{7=6W+ax#RC@Qs#v}rFR1hy(c*}Lf2?AwY8+v6y%>G`j&C-2Cfy`* zhPT<-Jn7$UUNoG9WpMN z>NY!`A&V_{kq`@DyxxS=PfpL8pK)`emClXpTxkt!sO3i}4;KP-UOm`Vcp&rqKodU} z8`S8W!^#B8`yAh!nSxF7lBAMG$wmV6VniqSg2lAf#;l4GfZ7HOfz^*RV*XhCmhi0A zBjE;DdO$cdeq5!Z0ckLCdxjPMJ6UY2<<1lM)9x$kzUA;aPDyL(o$~r5dPUeh^cMlf9u6FivhtqXQ62kAvd6*}n`R8Z zyg$eFW*%}FCOtGuhBsFdJD3m+v}0p?>;|zXdwVTf_4)Ta<~XueLjD?lpW=r)JqLc{nJu z(>j|}Bb}rg@Okvh0zrq_n`E|bn!3u+h~Z@;4NE?$IO_cAJeDvS8?3^KtO-NDDwk97 zN_{>2!epDQVLLrC$?fR1bFc~dfpZX_`j}W>^|0O}n;D{+kgl46*qzL&x*Iql{@RA25R)!{Q?DADK|PB*MZ+m(2uuxJFw> zm*;-Bqa)dG?k@JRH9Etq(rf1Nn$1|L7`5(~`tZFc+&V1q>mre#$zwe2UXe@jT>6f1BWn4T6V|FX6~x*xlwxXti6G|awQOa0~pVJ_V$7N|xctajcCPDcnH1z+ww zkHzZ|M=T5)t<*HP1Wx%r`d+JbQ}dX+BbtvO?%qJ%CWYQslUO`docPV}{N#7K*17X@ zF4jb-iXfa2W(7mEDt9Mc%{#O6r_qKfH;fzsz8xZ$A=?J0!hqSyYHd}r6l#qCPlkP} z5XsV7OSxQ3rCzM$`@ODN-MN6-%0I05KJWcZVv4Qng4Ynu<(HP9gswR%!~yx)$?8Sh zShi&i1~Tz;o?T1YuRSR%@npdSMN^ zTl&z6UY&pND~xtv!vIN%?0LRGbs(`KpbD%9WF?a-Cv9#}by00J6B=cB8WjR__ z_XWU@Sf*a{wWtvdelmh}j5w?9rxo47yY@WFr&a}T#~JVI_Z2-RqIb`Cv|js?mkQf# zyQ&{?u2ilMez}!MlAj@&B_paZOvoY&-_7)}_UY;&Sz(Cku8iG@h|(1qDIF=S+lN{w zH|cbMcHT{>zld&kEVHhyXl@N#Srx^#Qz#D5vGmlZU6mX7AfR6VJN%C~j2^MMR8jqm zSXT6B_GYl)mJa0PP50Qv5%YWKNf?FKFJ7xyh> z!({ZV6GNShkzNUoaWnOr0hV!c%o-=q%AQZN&Q+s}2O9p$GP!{b(%h1fzt(w=@m*Z% z$7Lt`KP8h~ovKgJkb0&jTNl0o%UQK$36#Musuo8zq?Nk|ti)9?_o*yzHboQwP%ti+ zfRO4lg}y!{ZPdMU$bc_`N6b(>A9_K1+=|7VJKouLEHgx10Xr~Ig(lX`xKJgwjZfSM zzxrrJQJ~iT1iG8uqdf@RvdhM?KfP(!e{=3P2qu4fbL6}}s~zfDhvUULGCPw3ug#vB z;ag8R6rO#+8)*N#=X)${ORBbBhN`GM`A7@yoEG1%(9}r$xLcV~nI+;!kLLz0VQU#q zF@SbCK{;|fawAVJR#zeU-0w@@`3)oNg66uHCEqzi??ga|u7Vzg^SZcd<7w{KqCyz! z$p=jDI?N>!e)=7ISxtYN-GO&!1U~c-RpXnAk$aEJN1G?c#aFK9@S??RSL47&6c>W)^a z$#X)AsrBlc;||hAsbjyD-Tbo$Z=ga9_iT>G{s{8j-Z+vfT~%h6^e_vmT2bm9nRzsq zXxYwK5rm8#Ksiv4evl#1F{E-*gG@Zgw=k;cuA+uHq*X;DV3o_(?E~Wl| z@WsOax<>8%%M=0iUv-Ok5VZ05uKLq`{4WDYD%1avAO9c4@}j zlAIrhx3<%`5Um~2}9>e6gUOXavw{4xM6~67Z+c72cAAndkKOIHLtmrg(*bTLlRe_mlg&WgQ?Z?`V}NQ4YfQoi`iBt%8_RpP*XRSiB*9Kx<0cQMu4Pwhf_ryNYuLX;I8 z7;?>?tDtwdX2-i}2jaMsEWs%$s}auWHDt>`I)mANbR3QCA)b3cK21I1jX_!AVdmp zsb=L|Avch>vX=R+KfX0NE2!G}^`Xlk*SU4HOM6xFsa_Sh(x_te>*!~098Wb>7nsX6eQ9-~Uy6auq z^VU2bC!TAp{cM7jSt?%rdKGNeVb+6?aNxh-4ct6U6@2I1Q-3tWaBw}@a&BpYfq1SR zup8CX+95Che%Zc`>6itGTvy|+CxgW~L*r^88IU7|IhEgd+bS7l3s!#RqeBq~cSp{eXSuFx@t3E_+#ZkvV5X16auRS{f24;*^8jGdFap+vzm=i{sA7m&fk`{sh(0gROIGPTo({2@l=JC(hhgrf)z_UCnJyy#N^76@yd z0>#{;bJQ(Mm(xoNY~tZ5Mz)!_iyDb?TpT#}X%2#nYb6#6{iwc+8D7yt^3d;Z4JX^3 zu3glTHyH*vFc7Zr2d%dXUH8~w6@`ZhrenZQ9iP}HxE%T@P`1T3k>J)SbdiZL+rO4{5qUh^?dZK8 zlY8~2{~Vc)SuEA0_eC^K^qDB~=NVD3gv1Yy$`5C~5Y(MgsGHm0_bxLEr+8M&F!ay$ z`q*z%qGP1^$i)|odZ45%?1SZ~8yAx4a?7ldW5%j(AIQZhOD0yz)S-0{WFY zEbfp?s}p&bRD$}pv`IBt3T2ZZ&vKes8ba*xIsWe?BIQ8VN*?+SE4RoN7a4| z%kIW*agG9RrmAckmLAm%?Jv^ir~-x`rDfBCRC8PVW=>>KKGn4cO=870$iZ z&Ea|Us+V`*icND}1Zfyd^tCCVVLtkWTWxasVD2%7-O|W(gzfjaYsa$|NKPGPL4Ebr zdO_ARJFPzFxM$bp%B-^}=R1!th$btx6n+0M6`=giR#jOy(K>9qCc*Yy)6*d@1^ zoi45uJx-+vEDA;+jnej-@NsRV%P}8 zo55Wa@jj7Vq?@>?hG08{+2Q-yKo$|+CfNqM_RtVNj&hOdcQdJb2w*-A=bPbR(@-|^ za318?ai7OCp#u@ENpY>0EWC0-tm-QT0Px?s$O3??0jc=<6ygPqkE5vFpGeE?qg06D zS0;k9s>h9={8?NQk_^syiYcP4Q``EYTH~!HzqL<<%dO})Sfx2P_|`|al%m(3isQ&r&-^dHZ8srM*F|2bhX(KSbqoAcmXZ<>C=Mq3v8g-EF4T+ZnW&OgVdYXOH04)Mp5 zEWa{mtj(aLlsmbfW(zp3Pbbf>IzZp~w_R)cfA|r%-q)2WM4R=CKbBUwczAQAo`2S> z|8~Xrz$ZpaBQ;%0gxd^R*X#3P+Ux5<5jOf2H=19;JSc2J#99v_!}80Cg2>94YYpQB ze2;}tsH7zP;1Tk^IEH!hz1cyCwfAK(ja-eSUO1@ zYbr~%N$8h^P4Vr%&(`(GYEB9DqgQS}S}Pe_8zxGtY!>Wfl_Vlfx}z zZV8JMPbdhsVm@HD&esvkI54Q0knh`Ruhc;Z{BNHg>7e8V%f`#->Sw3CVLIwa_mW?*hNbnqILFIV7)s6Slr}@kW zdnKI(-wp>=o944?%3;Y_Zv}Dq$+T4`jiaXJ;a)~y2kscHS-G)euyc{Ki{=6)+}UHd z(VDV7e)=l`T9(Aq3hhU#_tTCdY22R9Df~DqlBgnhg^RPHyq>@+YS&*aLlvK>w%w5_aihK$2qX>a{qteH+Rx!}@T742GHfOcoD-*4cX$-W&j*qbq!gZ5PeYjug zZ9j$OjnqR`s(Aa0Da&<(UbJW#Yi75TnjZy#?dJ}l-PZzgM^>=-z9J6Y`Z}wx6r>#dgp^?C_rVBP* zYMqg`9Y?Y*dtOD^r~E9i4iPz)8RJJee~GZAd=HQV+3Oe@LX4 zoTlR~TJIx!NZ>S4gO~1_yg$!NsRKFIc83*8b zBygiT6PA<)*&uJpee~JGf6`BN`eoMSVgwl?8D)wXuKmy?p>l4JH%?eIq_Zn2M`Ca| z4-S5vteOjB+a48`33618!$+ z^>E9&+1Wm}Ay(iv4)?$wc z(*v`|9-I3L7vXWhXQwM5@Lbo2x2 zW442t{&hML>V=|5X?EW+dESv$6!!fv?Z*cq8gv!wK&DX2c~s881|#wq3{X!!wAAm* zcVjQ;Kw3v}AXSANTECnLR99kMaWS)ePWpdQYo}-~!t!T%b_4m{H2g_>5VuvA5~DgL z6za%CC!_oJd`FFT%=ht=^`AUeEC!Q_FWV+8M_7yN&7%Ii_4b78=r~l8W)lsC2i>|o zrL#{K(@qyTcT^PBIa3@rAKo-P8&JceiuO42NFyDs+t5NhdFScg44@;<)BMZ*T09eD?w^gwOC~9Yr6EVkeH=qPs6U;kkcPTAUJV z=(#=X`(<&C@)R1pvzO*#lYa7h<@aa;)pJc+u8-2!5jK8}<}G74IMf#*?;xMGQM%8vQ#A_y0z6@qY$A{9n`2{}tkq@;?C; z_WO}Pve^LrMy!%L#=kn>!!yo#e zg4O@e-eOOZv&@q3?&j$PcY6YK!cjYEBG2zJ06kolwphgMONJPpS(ApRQ%Hr}na3YL zKB2z3H&K&Qg=u`xYZAySR@x#KgFRh*>R-sGhboXKa-qU7hY0cf-T#IOE@HUuZ12){ z4&%3>f6>tLN#D&TaHLsjRL9Z>aer({mJK4ekMl2%oAQ-!YkS>u#LqqcG3_zLcrnAk zS82MPSxw=)$2Vbh+ z>Z9a4Yndj6f5Em)GN}qWJ&v?dmwNg^s`4AUB7u5O8WvOa&h+PCwP&l`94&iS$buKd zJB@6&%BU?-&hMH7uM5EIzaJg^br{otHUA*{Q>oQX(j0>>o3=)8Y0t+{Oy|450`z$# ze(G|;%70%0{TO5zPgXJ}SZgVt^Z`dY@p$)&-}kzDE9K1uj`y4|13zzAIuEIV&1MZs5Z@^un$=GH$ z9Osu6qlE}R%L+Q z2-RL@ZlCtZHBLM1dhYXNBkJ$BV~vj+8ZjE^vA%YqJt03A4FVnqPtu(I9>2LiuUDrS zXF1y$H*1>(fxK;Cd)2wo!&WmlQFVRrN!SG_i*PVFMByG0(%bZ8_ukQlj%P#&g z&3|_={TMvEz3t`ef@I_P6zUkD%OEi%+t-|t@G(HSWUg7g`u4ABRne{tiQ0{r10IU3 z6oW0F)LRC|oqrBb`?#U05f#B_P5=Pr0+|s^TS}9w`dI%wBQ?@{C#!bzHD_*@(RZ?s zG**N^Cu`s-$;>}T>$X8S4fTy6d;IJ^aFHom-~1IIZ5&5~v48;-=(HS9xqk2ZkFn#rL^@u7F22Bm%6>4t} z%2dI7&5{VEj+DPApeGO18G!3bWrOY5jOEfyy^4lcc>+;VetmK;d~BAlSS=x^GYiaI z3=S0XI~rNfD)-uaJ`TK}=T9Y+6ByWY7w{m`SC`b=lpCk4$I4`M%Gu(hcJSG_E`8X< zOWWhzNYy1Mabvu_qPg#0r+c_u3}bvTVJwVzo$fC5r_%O3+?2PIhGX~J#25Ii;}KE{ zxa6K+{~LMi|IQE}%d)X#eD+lB*PXFeSl@qgs(X6Ur4K& z5&wy*9Y@Fqv+^G1(?b=nWh3V>wlD~2~5lB|qpdI#ayi*j?BW)Soyfs@(__&)Q@97>dz-vXp#LU&z z=`E{a7OyMZE#1i}``pB=`^{fjllP&@wo}EvnrzDNzQQIlA`TpD=cbCnI6}k)IgPFF zPasa)TG21W{_7zd<9(|tjm<6Ji)B@+x>f2g$DM^SEnzA8n^YRKrgm0<2+Bwo_Ps;) zPi?=U<+p?vx@Myh@27+5rnYQEH2(C6{Sl!A+9#fPJ)5!ZuYeJUnP%m4n>*Co^t*hG zgS@qgOD1`rXnVMkCGFCXU&!Ub`vEqCf{ZVxv5B>g>F$%ezFnopL0&3^NlHvq!4CCD^Hjauw?_csAiJ5X4kc81nv6z0XKfSgCe{3qyRr@T+}aV^n7Weip)hOD2vZ zHbVlKpxvchM?5EdyxwxrMfdrO3peYBiVJ6H$Nts$k~JqmPEzYXzYFYT>Uu za&N!YJm`VkMeA@mD7{nExAk<2nvKnCrb{;1Sg~r2*CKwD51Ox><9HfDPDw}=EWbZO zsf!ePet^=@f(vh9H%VhATBC_s48JC}s1#bOTOBRS1*+S)_1aLxZ%b$-|$h_k-zb&D?xJcIYeKwa7E@hG7{G^+ws6^zZ`O649-%4-K zBM#%=i>6yC1v2DcyX}L7UVGH%jNN>W3j`1VJIj+|QUE(Bxc3h8g_;A!T>UemP7^o8 z1A+MtghEj1#=9wUpkDfJY_U6RszzmH3&a4CX7VH5rfZtWyri!46Hn~Ji`fR2I=;ej9a0zAdVE(fYmKxeNWpm5}7qTU}%~fdrqC_%YDr?fSyS=6rLT|9PRm z@PDAt@{t(z@c4VmIrn55fhH^ZSPjlrlqdlv5kKPWxhwWGE0NDl*Qyd}Ul#d*tbaa2 zb)O#nvGcVPjgQC)hp|Mazs)3pW_`z6-tx6E7Bec}f*ehs+Xhhr>f3Pae$sjNbLg~2 zzp3{!sv-g(clk)L-!=0BLOQ;gXRT;AzC3!3wNC86W`-jVhJ*!I$<|)H_a>d&%-K0` z9Pq7a-MjhBLL_I`L*wc@ePJ9Ahn(^X$Oor7UrnTg?M)H?ZsT}h2HF)0UDtnrGDePu zY(V3BMk1%xJ=h=nu}4R%_AVtv1pH~npD?J&gD7$3p^drx*zQhiOscRmQX27pyG6F4 zGD0a+hqvVsWA|azLk35}{Gx<*^CFp3lrAh=sJq{5Vey^ksfStW(F@bLBsUH#XChH^ zy}Fw8WYPD=0feCF^*6!rRy3pz=s3l@X4= zv0X)iKZHJ~wkmNsyAYF+7dT|qvA&N#S*sXX$b@xFX*%MCptEo9K{>}7OQv9!uOwX-dGh$Axj%3iC+8f_Q zW7831nE6_^n(zRT8bY`6qZufo&H6J#Cf?Sr*Q!)}7+Z{|=+aUXeBeNTh`8cZ>|ZJP zZdB*+O|}S{3uLkHq_JoQL7DG_S7B@N!G^f#A6&w*jPB5nJi=GhdhVBEHtz6HhX&0+ zV)@$#%xbnBVqE#93MK+9Ybx3HjO(X zWrD%s6}wyKb9N`NP|^LF@G#Npre#6V+|Bd3`{s?e2-HmYobA?p!rt!r#O*Asv%%}w z4;+3o7#05O17ef^a6n)1=JM3fjpDL5T@V32&k0ArI(5CC*h{6XGxB4nyL?wab`Y}( z7xXQgC-p=vE>d#wHm>41*CR^Ljl3pb9KA*uVzu3*JNG35A?iTBK^PqUNO1dkR0-9s zt8f`>(tP1y`SOc~@W+Hrb`t!wESw0bh(hHckdpS8a)0HVVX`o61|%7g{Hy{p1v?j^ zO`7lQTiy$nYAUanN|5DR_Sq!VrI#Ex+)a?PUh>_#J~&hwx6ctMAxN;9=rzCPyfFsp zr0c&G7@omhNmg|ok$SD|cwp%YHStnwnv%;uv9Qy0s(X`k^f_DjwS1v>Wkk#|gLc(E zB{qX7s&ho2*Q8c3CGpI0@d~8$4DBLv?o!A9T4DS5I==4sG}0OV-kU1NyM3K-iUBh6 zlvhthVvYptp^^antqZu%G3>~2l8F$?R>hpD<2$g19z?^6$t`o2&k-6)%6;&;_+Y3 z#G!a~=_i8sU1~jcDP-)0Jy8e87bE0}Ydck><0w~;=##qEfzreEDx>uuPvo7hHQFMo znO6zeHGX1#F*v;CcEiC=#(OKq&@g8NvyR8h*tAh6f@=~p0cmKr;I-)wpPjM8}%OjHvC%l5edLEV8%W=G1vr@=C4aC8icD!5tO*p9`EqQv# z>~e2Iy2tUdpUQk1W&*(g)}*%>*4oylgV*=SQcvmYI1L?esJ&=*s4X)*wpo`-RCn ztjJNcU_Q&3>9BJkp1~sm()7zLyodtXp%zzmd^i}EX+xE+AxD=^l>9VDJHo7?7rNsk zi^7=iox#J0ehTU7v+DYD9-amMm2$Wdxz@Tluijr~3GK%AK(b#`4me*h_8S+u!GjWL zqT2;4Jm>tMp^c~@@;04%7UQ;NL+$;dE9~WDVh%r(G3UgOocWfj_Zr7-`V?IX@3>F* zK4}yOk^(J9ieTEnEnOSKcskCw`8;kiS^_$ij{@2cu7o6DM{NoSbx+`N0=a~V8kF|= zIw?|4K1C1cNO_6b!tq?Rtg0t?^~qA>$$sz{RBZ7X-!17h8U8e1RaNRY*=raY;=JJ!hu0v})r)x=HUELbLM^ zj8n69XlIIDQeRKm+&+VnX^*uJ$}_P2@oOF9aSS@r#XjR95g6Px&Vd_W2Ex5zMwo-z zJQFN&uK0C6VGguS*}2;jLKh9S&sW)-;9wZ%H6@-G%JiIK9SSa{Qa4jhP74R`A&^C? zSl`VwVFXFGe70=w8>GFiYsvgz8uK}H5cNr9ElSSbbv|uF4*h#^`^kG$f8^>*lEq8E z`UmJ&P($_ko9bf_3@{RNw5A$N>_0osUT|wowJHm)FSmb}K}O`J}8A-3HUJa?pbFMb1tnwjpNi`e{w z^oMH=!ahfvbsP}7WT)zFT3%wpXzQ`*^9n|HTdtOr#xy9o=$<+Ln|>(zcR!W#63Teoa=~-N zJ+JSyKD)!fmUEb?Ct{W5TiBnNxvgnMnDh7)L)17M%QLRFbdTHR^`f7-rpSZ%L*3U| zT%eMVU5-kYde5UjFdiv~N8C>9{~JSHG#iDyH*+v@w<$8$3J+A*_<^gU}7r}~}8fxQEb%V~#!YI`-7R$WiR zT_T0{3y9bQC6E;DOM90u0CBYekhQVaU^%i^TM9;=Q z`o*4~iP%U+$YdrqWLRpzOm+_2zek=7kj%C=;T8I_#ou*`&O3|LzRlJoq)oxzA*jJR z_eBDUz*$$}`Ap_FY^%NK(%bH}qnvvag)#cdnRtTt>%G6tdfba!L>l}-I`8vI3~0i= zemaweiOT+tNIjFYcN(1rI&G-#xm4m0ues+RyAT-8dv}$^4O!C0e3}?by@MOUUkD6P zEc)$73Em*`9B-uv0rNi9$=e~+`Bbqu|L^VfYUB@8wNVE0EtX_ule5g_#n_My#}HX67|f#R(sgLa2JUjhC&KgQ8C$*1bfwO+f%y@7S^+mBV7w@wfCI{8MqUCNid z83hn{ua5`CHbGvu{Yp3IN^SMi1UY$$XAHzEi~e?p6zO_d;i?*s3Iaiv&&<|hphPGJ zYNa@3ALF_)5)9hn52nrdYE!?VwO@9P)j%Z=U$z8*2U45XrG(-eh45E>6*}?EWO4+q zmklhB;ATKLCz_JSy#>lE&Nh|Eg>mS4@rMdJx$=GkO?6#&TZ{T{S%oC7PLl0KSMv zksQ(Dc_8D8v0dVxhU2OzGXwyEXC#M44K_zrJ3Px}Q?xZJ}3M&5hIHSvY}z9@ns zO+f@f;BNz^OD_T{3QAY$5Q=mH0qMO8s5Ft@d+#lQKqw+0C3FZ7LXloVXd$$~8QkTb zbMHR;p1aSzukO4FpUKLwX3fl+XFcWnD`p>03av>xrQtYJEg`au*nl1gz0vMW-6P5G zc3G|Z7ZggG(?~;qu_<&C&iTeQQ3`L`hSdQ+L)i0Te+V#G7UZbj=`QF~8$<|lO-})ep<`z8T8K#1L!QPSc z(&EAjAEkAO+x5a$2#{$k{KC^M2CNPw7L&2-ymR&35_z)u?9DI7=b*Bcb5%?36+e_$ zCQxMgNq)9jTnMMUPi(!qeQ6}^Q|BG=95r@^rGt0pZju)%$Lm{}+UMQb+_Fl5CJ(~HBgsTf%jNIE~3@jPbnc6c#KWKe(8zoln(+U61 zP#YA_=K1O8j3PY#A2s=Us z0TsQo>zbG5YS&G4J|&!MA1wmEh-LXhTe*lh{-7VG=)4XDL$YVM(3uIi{r9w0^ioi^ zm$oaH?oN5j-af})_nxnyU1&yzR{E`|o&pjK$w6OMU;Xw1^>;ZkZPRr(CIAt>)&0LN zMw7?q19|nfE6jZco;1tKERpjgTdfjGxYp#fg!$<6(_-Mae;wIU7je9_zGdX(zeez~ zM`-^oO7{N%6o2X|lov~BWdE;z`X5MC3g8b{JdL?vc>=|IG23c?p_)J(;lDzk|M$Y! z|9w@>VNcTDUJjF^3S_1$K)CgyTOMZ#Jvapm3$}PN9Uc#cKF+M>pzICb^Il z;_PvJxK8OA%gYL}?poU`!;B!$r}4s4#7U*-nOgvaMXW9<%ghYJ>7ELI2PE_|N#u~P z9Rvb{3ugxqKayoCI#5y-v?k1xPF)MTZx5gag8HbEzCV9@W9}9sDRl)$$g_We7p^M) z&46`MHzTh>Ek7gCnfUf4t~vW@OeJKGB6L{yNpc-&RQQ0HT=y*#*W`uKHGdGB9uIa= zW+RlGF^B8+T70`QFxD55#aE-$%#;s+s;#Rw5;=wTPueD43QgoJO3{+UUsP9Gwf73N zxlY&`WAe>Wr#Jr48-;@^X?bfx z>gA+qkJ&21jU%Ld<0XgR*ATqPzJ&pJ8fG!C`kL$SoaM+qmQ4HC02PN15+!{L*&LUm zj4YBhaIH#lJ9C0ST_g3vdXx1IzWnvk@_WnE^|v}JWwRAkyHAbNdGte%3V$we=*0e0 z<{Mt4nj{K^3Szygjuz}+=emZ~v0CeGmgh(s=9FFTonNxalvRWn1-uq2e{MM9XS}taS17yL zr{#{mUT}bN4(p_L=1?D4@fq!LhC>IN2$HmgKa8JXyCO$VKit=;l=-&03`A#cP4KFeg^V#B zXn%2StZh7r=m@_gXSWydF!ulj(_e?-Bnc7NPz1{v>4qab=HCP$Me`6_AtdjOR>9+A=dI-^&vH!8hTl)^s>W{QKZsGr9RN#PxWDAiMI8_Kd} zwH~TC3LUn_jH+rSWHseo$q6!Ij-R`I^H$={5E7im29h%fF6Q%75N0O})G`Ivqv5cJ^TqfCz)# zfGQ483gBkD^BCTI85Q*`&X_BYQKb_yi@doer zyGQf0K9@qUSb!!v36OwYvPi=_fLZe7b!Xyu@z9LsHHgJGi?O0PO_|}vtx)1lsm34n z+F_&@rgqZrkJaJbz4G#!Ew0$Z6frmYlOPQsn&z$&?Q&xa;2r*BJ;S~HBKQM1)t#s3 z9g^_(tfK$pWTJulueBMC#t{6N6WjuVFf)SrG{y>+4IxCacQv#h7RY^phg?6lto?Hv z*RFo?TIHPGN-Go3u{TOha^pDmog+Q;U+WiNph_Joi2CMuQg|+v258;@jJCpSHFvgw z5c4~JAQ$A~y$>)iE&z0YxBoZgtFvooS^=Ki1v-|hV4=?l;x=YqxN~)96NWiUH?g;4 z=xG6kA}kJ_HG~#EhTpxpX_2|?|1Ugv&kN=V#%wNu@z4Acck0$LW#7bB<-gK~&6s0j z?0#0WT1}P1$71}eZ3_HO{ss~+h`-r}5ij`PiFNFpGgY44^3KLJ z?+M<=>b;K_3b_M-o4$^jbW8U)0g!a*rb@N(NA#t3GYz-+w`|1dA3p|4EqEq1f|4Ha zbpj#reutW*!oyIsH!>G{bTRm=qd*itHcqVaARyxR$u3=Kkztq!H{?}x5?yYPIt8C5 z>=b2@yCSgOq8*$csOzp#wsJMjbbGuf&)vf4UZj^+ zzGhTC>^fzzlU6+G4bWcd^?Lr+{dKRW?~#&be?FETX*~(K>w8CO%l?-~O{&L=@0r>} z<*7tnv#YQ)5$C=fXh$^8q;$kGbXE>BNS{yUcd%PKi~Dy?$LpRK+dsA>W`f{J!!Ixo&z67r7v? z=>?VAM4T~;!%T;%z;;y2t9@P(qh9+P(i_*qPsP6{xZOaHPlp1G$jFA>r#yAoN+i2& z@$259+t0kB=pD2nR+rA)Z`jWh-0gaA-ikK}+B+%1x&}9tIMiJ-;UcY-una2yq0E* zTs2wmGktIxv+0ORi+Ti`L3kA-)EFHZWMwlI9)Jpe@opBR1DkvCYJj`l4W}Q;?p-sg z`&y8_ncPix1M~ru4-P_W#!mC|4p3;LC1vM;RThFmTm; z2f|9WeE3s684L5`z(eZxqX&C8%6w?-*&x~rMqNVul^#y{A@cG7YZ*4=cnd$4&jSLY+H#k$Tha@wuR0A6ib)*xVDBbspzUL7`AZNc1QDIL=8cdjd) zVR}v8$mLSxsWTfyUn4XqsG>~_cQ^FFa%_9?ZN1Ogi1>tGW^x6)BF7oGd^6%EZC`2# zI^moxIA^j+;sapybi68hic(43@D~)ibd*?G${gMEUP#47$foti1@5uXa&;st(KqA3 z6qhU`nPzA2N&P_Hx04Fb^WNEIM-y{0j5wE>@xn=CShX=#2d3`lho4fVN?UneTuiI4 z5Sah9dG%tTmUw`R`*(}2`OlLV|BDUHR~<@el$KTH{wg)4g*33}4?^-?8gjheosS@` zBtC|y4bDt)abnuakEuoQ0?B{ts5bl1WBbs*ldaB)OWl;ONOGU?z+lLQ0M><=)il{f zLi3j}6&TYyAxZcst0gda8rOg9@z#ujV%pQ8xs%}v)#?~om|3_#me1@z>uGBffY_yP#*m)49GtLihCa8 zToT|&zsZ0UTu_GPQzeR5o zD#E0|Wse0^Oz85Q_C;*ncL_{_J5oB%BTJ7@0sOApe9K&UHRX3p3kj1@*X*SzAdSO( zTg2VC`=NBJP)R&fcrtoCtf+g`9gb zd|)Ge-*h?ifueg5FvaXei(uW-=6pW+Z3@liH5VWGH+6v?E}5=9*lZe5)IdH0CB>Q9!n zq0mgwPywKbWEPvC(rFjw`*{`Zd2{plD5zd3O1oFN;wOBT^;7b(FHBX%u1&~I^+J#> z|HwX0d(Z1tvev9=e2S}B{ODF-d4f*~jni2D692eK^yJL6rCzFak|SydT;kUY*6}US zn;n&KH%7nMv~#}!Q;D-1Xb+M7#p1$=9_T{^ESVG5Ec!3r&%0{43Ts7QwDj0SJl?bB z(F^S>kGSf&{>rTBXGIJ9rM(L(6y6X~u|(vqc|>GGvRn|*>ZHbx~jN)Ek`EOcV>yG&GqGzE(KDZABF4iNCZ z#SD=aVX1Lsxsb{SV}$M#75B`0FT8CH0#ZFM2DAO*e)+V$o#7uv+uq=V{36guFrHK4 zu3Xm7W7-WZP;XdfI$LWV)2Z>4;Giw;_)%auf;*=<4CP-)Q5rp5uS@h$3Nc>xM1!wa&51!*SQ~-_kMDhW6%=r2pSM`!^<80U~tbo zy}XGzyt1ygO`I0f-xF9nTS^o?W|}eZ5c74|=XiFEz|CcZZ2hDZY58T6^rXYrV(YSU zMKj|A&Drl?!_rQrP6gwCpZRX3xEn9o^bwmR$#IfSZYe+_+GC#Ja?4oepX-u-BgiJHUd{!v+%+P@(+G9lNz6?U&MYI~B-alp9Z74U^}l zy+Rvk9=ZBbWtb*&D%C7pyKRtW?PT*{((}W2e^*eFM85nG_4>rWQ{~x^XF$ zja24pMaV|hzWCE-^}sbvga+le^KAb^fZKVLQBc(b^i3ijhrHW*lwcHj&%=Ysecpkp z&9Dj2D3le`&+c*acm>~{_dvFU&i#^n6kA|Z)4lrr>X&nA559*?6dmln0>s#Rt)htt z=nc{_nKVKNSfDzkLIYSNJ^d8U!uFPa>bcYGpX(a+D#1a>fU(-xwp^NthdTNp6k00z zc**&KWn2%L$1%c`6G2kVrdU9_~8=P9%$BZL`aBFeXN$@j1cRo+7}R_sI-Z$cJeGd&Gsq&UGVdHac5BWtcJo_FoLehpyS zHW^{L1q7QRS9OdzbS6(@r(2{KZiWN4biEmZ9fPAN0K6cedrNZSsMqSFaH5dKHK18d7jp`An?h6EtxGT^lG{nY2%Dc zU{Iq`S4c!f@VHI7-#e?V)}s&M?E!iOJ<_=tET z{`_)lyZGJRt@YOIk5m$sH#ZEY^JEX44`~OovWjH+SdS=#x{9KmWl6~+n=Y@^p-k|_ zNGp$xYp%p&1s%fX3#z6+H4Z<|E-{H;b6**}iAWEyL6DmJi9zR#y&9)xQ8%#pvIV&! zD3i3)qlaQT!ypk3E!o?CgxaA|n(M4rEOrg8S!}c}fq#sfDOO_rqC}odauh$6GD$gN zlBSXTGO}6gVv!^OI1O(~*#n&6sx!KpE4$-T2qf2c=XiCqS?rWk*l1<;l^pYyr7VBn z0${Bwb;Hvyh+?Z=M+u&>7c??8EQ9PPbzyhY^V_O zF0?7yJW*=rgVoWQ^R$-e9hmH{;4V20iHxU2`N>B%-**xeFyw4_6J=TQOj|^JzDc62MRnV2?k*SE#;lr zQUzI#lLG-&v#nw+tK$^3ZL1}Gtzdvp#YzGvOlXvsAEO-`bv_w_ly9F4%=-Iw(rM><|W%LT!^s)U3e1wA({L;oGCLehHOBMWg z?D)qC|EBD=b>>KgCr76kwgW-mr*hI^w?H6oO+vFXt|bbHgs8c7X}XmXnPy~t?_LNP zDcx`hyb?$m@QvP`Q`G4lkM8xp{zYlj)?gEplEBK9AjONt%2pj9Z`8kvX0!xQTFvZ- zBr?Wup?+~v%l);S>}i?xb5+g@{>kWv-=Ssq3%0;N{}0yuW9zE76H19sUqvR8nlnXjWq168%(+cbXHpkm7Krmou1L-W8C}0x!SGF}f zIhlC`C1ierw*aEsbU>wq3*Gj?KBW|3>J4>|j^LvH?@9Bq0S~Gqd6J~4m&^g*pbPWX z@fx4BFQAvitR2B2ZPxTxV|1xSv|YZpQ^IDZn_?kq6Wm5Q@a&6JzUKTStnUqQ4!|mZ z`9C7fzmxngljgGxi}=$M_ntUUui(yBdVO{V2_Fl1wgLW3Y`-6ojTg&kvRVI<>eNAY zpWXXrKFBE`DKSg-l&%8L60~7|H|R`X)HH>0&d}ewms`MRUqI->{r)PJa;ALaje!9lDeBE(VMS%%uFIe4Y^X(l+k$|y9tM^X z41@0z6rm4<0vxBQ|7+$$YI7vI|PnFPffzznQL0vOY6?8Ia6#`@+*pHkz9=@0k%*3Ueepxv}1JW?5K91K-s*% z%t17%r*XHc&t~(i^}@T&r8lc&lEZ{&7~vCDYLtz%W7jR8h4}=$tKLAki0AK_4Hhc5 z(KS2RFDI)|XwxYLHM?hilK6*qE>&%S&i{H7+mL+QurNz*y0WqxiA^0}$qz-tu?<>c zs1@E6!;0DlUOb%F9oJ_r4@JG2ZKt7xHj)k5Q74rj-xizweZ*X|bi6jXY+0*h=4FlU zsU8?Ynfqnz`_xP!IIuc`@kMVbr;wD3ei_Cd%a-)ELU#HdQ$hrZm_}(i^h%2P9#U#K zra8^vWP^X8j<+#_$L{+AF-#H_o=H80(+_AOI-vVcof5DE!D$Ig-bxDyzP&^#Nlp?H zP(cOT;j)L#7aF52@UmZ~)RwGgTf!jatv@3fBa6v-$6K)Su_USHg2sdNEUIK@(n;}<|nU9Kf9GmmVjPXHP_Q%L_Sg*2G5!C^=UB+HZl%-eN zvMBsh7p*+9+S+rcrRY4kTJGF?JAEJh~%QZ!A@z`!zhs z%BP$IpJXNl3_Ye|aUoe`HIq+5@$ZPwkIJ&=peq`FeI7S@-CXZ$kWooE4r%9f{-OWT zZn9dHo!!fl>z1r@0+*7}csz#@k-zC=4g9?vUM8i? z+ZyFCjERMqRD1utYmN6jr}QXCxywHu8iwweXM)C;X6_KJW$d7!oy{p<_D0A&hNPTL>TU2ee z*4HAw)7bcuXA>2}(afM|jT**ldreVY1xjAFxxfSDGI< ztve*$-nRLUD}_<)#!q(MXZcHn`d!@YU3&Pr7N_f|G>m6h!v}h8+lGw{rKp< z4U7zCv1^YU8`)&&Q%ffh15=s4Ul$&Nl=_PBPiYQQy@2(_TRbZ19W{6*)-w)ztNHM_ z@ku**2~Ep)v~k@Fr!Mm*KaNIO2J>B5`i4kjTwkH5UN`7K99zAVycsE^jc>HZ>}q7X z7w9r`OD`MJyJo4N8B1Q72N`_n#U~4M^d%c_YI+FOm7?_MwH2mF5^+9M`aAkkP`wAl z?mx9?SH<8=^INWr` z?l*pdfBPXe;M(gwdOmFbQ{NO+_TxpuC}cxE>F8_{Zkj?O$p8Kh@`$-5u-?^a+moey z8c54)gf+9;5~iL;`$xkwYE3k9z3M1-B1EW7U}#40kK|PDSgGKq&Jx>5*0snE#u>1r zTJncC1a10J8*Ob@op=3wHPR1;`;)w}*6l`hv3Y?>#AiZ3NgCzjOc*T~Uuh?JfWk)L zluU$<$XRtMrVGt|r{(uX;8xud-3VmT)0BkdWAGrQ^J3{c_{oey zZ7HPTPW<}3ymgn@&;sE zrj!SUX8k%<783W0-)(fh+G4lG`=T5tG)1_m9+)Z@zR{#(n0B&Zjf2E;#41NP^FwX7 z@BF#?efz9ec&*||#{AW(e+(Yk$meR$JzIj$^r>m`d zPnb_69=->~v$B{q%?T+LV=IdxxHQOkZQvF)@_T_aIzy-dJwmSUHS2gX@NmFG)IFcl z*L2hv%2;Nj8g4MiBr)zI3bkRw9@sXzHJ<1@wfJRKr-JXXXgpw;zc;3L54|)^?rhx= zYwX*Zk&t>H^b6T=8#`rp9v;ldSM9=X-&OHEv<)p~BuUdl;y)8HNJ(<%r;Ual*>B(I z0Y|kG>L#e(;>+3Uxp@VsS3V1`Mz{Yfd1E9d82XQB=46lMV%7)NFfC_fTOx^8pLD9| zqDra$Lhv=OXS#J8P`mc;eic^zs4KRFr57IXoa8y7F0=O)@Z<#_RX^-I`k(JXb^Ilh zner^kQiU&9zyq5r;c;csSmMl)m(2t%_?0Q>BV|?6=2GreYr;O46Ao!Q zs`FI)L%mgGr#G27R3lkzk>A46m z>0^UV9HgvBaRCZLC+QL6Se50+mxp|M&tw)j8j34f3`_51eM=V6y$pt@Vw3h#-zL}$ zSlxiirEz%P8zOJtTuJJCn!lXu2ViCkIDz_RV)iqabe7be2@eIg)et@1d}2)m8n#6FwwXNf#cx}r0|-$yf)(1z45m^}wR z5^)*U;U)zm?Ij=A!=U*3hA!qTMw09%uTL1FZ`+(Nqty}BxlE^VGa{qP>@m zR8+O`;MM=Zp?JwoY)ew-!JCN87thx#mLIj9_ALl^Ef8(k{dD);hvCF2BTaf&ihd$< z2?oepp(`6Q-y)6>cxO*;ajSVPOISKWE!igfh4A3xL{0*6eqzWreBuu0Ru;VUl>q7%&e~UQJHm}lCGbr*#9;iY7njNn2y$3t}fj? zGRF~JD!RpuNJtbc4jD-CyZbfxQC?SZ6%_oaOD{vTJ)%IueU4NtWMOigx5Dc8VA!d}|x2r1$D~av-6xJ6D`dQ&Y33xp_wA5(!BrxS1V0 zgm6Pt49y-nQM)+_Vs%fzyicSR+|Gf*mH=0*?KlNzdSQ&3q%NoL;)CNaEUM!3SJDOx zqTV+6^qmvivWF=ztm{?s6PIpK%lnMGaxG(_)1H_xMgHCF;jsFgi|@ae7x>BkYfFE* zRkDj;{JITXQ((KH|Jm^3^SSNLKirEQL8T7QDrv#M4*!Y**~OZPtGYKmqZ$9UeXjO% zBn9X-35mls#KnjI1n^qF_~T<3@bCcJ7v7ir7oYz?|GNgPo*-IHwc$nMdVEH0<_-u} zs*YRdBqXB75nK5~3$>#g(0hzFg)Fyi-S(ta^aRYBkL*8#{5%nQm|V*fZ)#*Bs&@M& z<{&j`!A{ncCAbo8ptE0c{Ud>wD9(D4Zldq}F{4o~-KVEY}4w}(O9Li=AHyv1drleBRoTJaixp+V>I!DEdDz(;! zS%H=EmxIcRV#ih)tX01@*2l>H483t& z5d@)=)`?*&d7Jn>f$dFimv;B7G4-R*5{mg`zv$wqr!p6%Aj7r=fSJf4-~OrBvrIEj zJ|4c7ZsAa8fzydG?Di?pjTke1Z)ft;bIe%Gmnx2mk5-nJ#fsZixN%Uoym+Tbt=RA5 zXW5SjUQ?O-VRR%UbBC{1$s&JwRe&dbVC!H*)XJ0NPJ-b$I@DHsImvTMD-h+|)mJfc z+s|%o4(ND5N)u$*sN|?B`K%Y&RaN5?q4i46Fr@OMHFu*Fo2JjhS9zL>`pI#^=mu%Y z0rKB3%zbsjw60>@W6A`)FpdQZP;~L}+6y<3kY7RyHrHhdIbo>oQM-`~Ulz3v&|lW9 z4MKUw4bw&3O&R@TB{tJ$DqPiH5ubl}a;t3G6TJ&HY4p8%vdA9lbKdPT{Ow7!Pq?dE z{{)H*{Q+Hxi=G;=YRs*LK)!cIDmOm9IgvJ<`HRHw?NQ<9k>f}>4vKk?OE^{zPwl!w(z+80tl6w* zp&3Ocs3b1gbLX|(5fQj&09(0!xjAL|n03nS4bBz`kl%UP5&X{pvL^>OEJ*)P$T7c& zk?rhg7pF`vZq_ZL-+Mz>8eyHG?{AvtqWzxX>luVAgHBUL#R|Lp=I)wy{x<-mzE1YE zkyUCy^PZjC%GVsnU)J==w@W%*P?}8r$+shireC;}H17YsaFbj1;lL&4Yy|ZF;)3EI`kic%#4h znIdzBd8F(kEK=Nj`k=wse8@o!uvSE2rqG>pN%NvG9_m2o@-3Aek^_;!h zRTAWatxD~U6|K)IY4cVjuHF%VpPYa^lxv>_@x%s5cE4!(w!TShqnlVg3e}P!W-<_C zt8A6L5U3A`$N3;1@;U_wUrTB3Gxs%4TMgd&E#1Yj$k8=pb4?5(L{k=vgu2E3z5+hf3$JhZ6>0k>jY-H@lEu*jsq^Dn5T*Khu10*DfTd- zm))Q>-UPa$pQ^fi9vOMFM4zpCTTLzckiB608r-T`FS+05`nh2;%)ZdJlE*8Kn?U5&R@X?AO7 z^Ia_0cny1gUU%-#(*BgbXxz1r{FV03-h{xzGK@h*2>f%;{YxAT4MK#yDTf95uv^Y` z5R7@dTLYyR^nQwZ9^(|qD)kY4z4DE38fQ~(q%;$XAJyl1QFsww|5{D#FAc^@gSZ;U zG-{p6#s~TgCL$Bm(c6ZlKXyctSv|faQa4fORNIdjs=wj;bZOEnF_99PPi?Et-!z;N zM%`o@o4Ov^s}+Eu^J+8e9e-+5iDji;I}j@WGDDkgi5bk*h?`*vY`xnMCDAjZbraMA z!ZVThFI)xYY4z=YN@7%^&ta*9OGKzg7q6lzFR!6^Pq+RIeJ}r}h}6ARlpQKKUWfUK7(iDH7ht?t1vU)g zn}$AP0V4TIzX|T8>M?Nzc(MkrAzE)T9e3DJA0t2dEaa!`4>k+Al&9F=ujXTxkS`GR z8Q_un!G9vo+|+7;i>lKUwHH{kdl}iIvrJlMJ7GJW`D%X#L@#N!ywsE-7PWiFMRD|y zFyeXgRCIO5HX-SG?So+z@%qpaqhdw+Z!r`Ef6j^&7w492+SKCsK)#Oj-=t;AB&s|V z*xCwBbtF6o7)M|UxCj3Q$UB&L*XTNQ>mCsRB4fxIP6;jS#7AYHnqECZ}af&aN zhFzB;oYM|M!WFG`x}o<3;nZFR2lxFE{GywZ2CZ@#O;Bn!Gjr~_>qbT?%Jqu&xxIVe zpXMV2%ZD$qI1uNgoac{e#_KeXS3OL~y}~)RXGI^aVf3+~UNven(lbeb8?*8b2}xIm zj9mzen$vdcRR~pAO_{#o(Dy9HhNAS2bok5~IHcWG+*^m;_b^NBu3&pW&{gNd!F$w9 zR+q00#wokQ?SR=T^a);%R@lEOmg?}6LNZH@J;w1Q@%$v{_3CRwz~;NB{{-|tpRqyq7I6LK zIzkNLVx%OJbMSTfMg~$6l6^X$&GV~)MvSir#v~+zCpSF*ntoNU|7Z5&&HpbNRE-p< zvG2`_66gW5^7-_wy|j$MutaMo*^AEHW#6?VdCBi7jk`4bsefg=;uG4|^GiVGc=E8jScdwqs6KVQ=$$zuC`Fu9~73lXZB?fbrQF&p* z-eqjUoz0;9^iO*t2g7u>gUY3mL9I&L7e@0R-eZg`L9Xl?Vl{1=2seb0J3&qeICu;K z*X0V{)LSC8EZRL3mmztkck@jd>U%m zAj_7%2^^T@V+Uo^!A3J7Zk8REBg%3(FE)lr8Vob+0F~}s;jD2hFG$;5mgP(}KEole z0PSxG&A9pOrOo;h)CMjC?K`SSvKSGmynDympEiNjfy53{*C&wCQ{rE`biEme#+`|h zUh!yEYChBXqTz4&sNTlZ4=!=$hpd%7Tv(3sKO${iqXrKBE1Fo2^I3^9Bay1lyZAbR zwa;(ZwDSLY<8q4o(6Y;HMxfgw*(LY0?$B(g;fO=}G{8arkx@NbEO7qwl{0bvfo}&Y zcqS8O$wiX#=_UW}T6dP1=Q?z95bVna-J7yqm0k=sWbsEl-}GgZ*}Q5>A3#No6YUY|k3r)~uF?!(R6)T8q z5h-n*v!e76pl6GhD=69z{4AzVyUPCpdq$t~Jisg||rq z2m8c-J4G|dg{Xa17FfjWt`}vY(xGi%ZM%X-#F=2{LJthhQ6Wb5>D^6d-h1aVMR+3k zWwWu=#o;2;t=`nlPPT8`_|aAXLi4ipu2^ptS44qW$|s!Pfn}wy+4M=deF5^#xc$** zLmg?vF!;5aiPV-#O4~;3rpnbZ(0Rcfp&(+AvE|gcmk{+i?N#8g{-$l`hLE7r^Ra0k zOPJFpPmE_!hU>45-?nmPESHBqg$;%^dFrp${hR}zD)h490Eae-|KXvZ;=s1A1-T*c zb@qOUmnZfut8_&Br@fkv&oh@udrz$|x{R19PeXFmWub!6R==sMUpO1C4{1H;Urg(} z!&%2l2>Bg@zG(Ijwkrlxf}!V|-bRjnAn&*COI59%c(n(+1M(%(+v zsufbozd@Cj2OEgi9)GycHdY|cPLj84HJx>8x_SHZSfwe!R(}FH%-WKLcaysS33X`bBLzU zdP(SbT25_ahe0hdOBLqrTM22g_^j#*zST+oL#ayLgQF+0pBIN<~nGg@400RDZIo^O7Kz1pDWO2b;(fK|iMRk%%N3g2jc-4_3#2RyS( zMZ0l6(5op4v(+?tb^`K6-hrsnSb|D=5k8IjZTHw&Ev+V^0$n|HAI&szJ0G-M-HYrz zvmHhAZO7YE&7i1QR*r<;rNVxA&PIfMd)6|Q2Ac#rpXlMYB8oT|1|UW&hFG_~NF5;J zGp$$f)g|hn_1jvNgU$)TCo=+hQuk@#1@?Rp$u~v*sIx!X#>NWOBwzTl&XWgx!*1AA zgk{=Y`!TQzfvp|1LFhmsz_O}C)1#zoEd~PL`C7*ea*h+TiT7n$EB2TH+=hN52t%=c zO>OD&x!G)2kW`RMU|SgrmYgLr<=)gIVX)XxA9fN_tJ|0X#l^E?x6r=mB#bTE4YXC+ z=pdyFmsObJs+(>5j-X@O1S^32^;Z<2(wmToJIkGAw%FSYn1pcip@A+MYwQi5Gzn;5 zNgpfBNi+!?Z<8?Uu~)Cpsh{F9xTR%*MlV4l&Nd|pkKE%8h4v6cRjHQuE1Jcu!z+2L zPUCiG!o8yJPYg~y$TM%?&W}Gy%fd5!lbNzn3feZ{KP_vMl=($FC=i2Bucj{I1z4=$ zjANhM_64Jr_LIG0i!nWu%b4j;YYgzxjjMui&DjHkl8bO>uWe>g$-#17vAwSd9~`1M zXeX{SzPaoc?Q?=}Jtp9*v}smdyd+IWt(;@ z?BH51Yc!AE9h`06DeE4=r8#TR#dj}dc9HeEsT}rNnGWhqTra~*gS(j1Iy*&v0I&hR z4QXl`f+sZ6eDY-B=Tp8#{JX)`CMJhGV$tm|zM+8%pDC3?T+D`23!}T_RQghI>;a}) zKa`Q}v0(;U&0c1WLz1^h)*Q0Xy|M4auaTU2DD43YW6Yl+t7#r{h$l5d}^Ru=U3f;aZN z5(LkvPf(9MH>QVCB**Eu*DgNpHmBjsIn4h-+jo8)GD)aa(3#+xISW*5M?G$ z8CAFR9WA5af4r#*8T|Eb2~tc@R7N~iQVY^5GvY<23v{X!n6IJ<$yHlOIL8Sdk=wF;aePE@)?Q{`k@;}^T(SaC*ku^Vl}T5Fci)c%NN z-5MS>K%UjJ{nOrp@Gc|1htym}!L|B> zk51CI?{}TNJ?Riwl}uZ&#=;gx@*@alb}J9Ij@g`xXn`4Ht-ByrxrFK}XsgCWq93*8 z^;2|An!jMYYGtXi@d0+#UREDus@r78<6yNl+rVIheeG_*sk zNMZ*(kghp;Y~Fh3Yx(dHY8DP<6+CH~rr=D-4~+@M1V3VaT%94~Z1Fb#7e~zq+VQ?h zz|E!6H-tAKj5vaf9<*G>R2za>IIZ;->z0IUNpROg>#z|)$#Hj>@3YPLJV(BDNQadiao(o9;P=QO}M{rK`=-W?X9El)%bX!y-Z>BPB3<-{2II9P@!G}Z;H9SUvx#qp_ZUWM%Ev5&{*ju-!6(c0v1DJj zm3+H1HR>UpP5h4OGUztx<}xXR-(gq24F9?zrj@wI(U?i6p(cfQp4WhB+rKG+=5vL- zU_f9xK3677s9Cz+s&7A04e|=h7*FX{)@K}r$n8JjSI@{&1I;0~gDXVP$3o{!*_yMq z*i?cL&vPZm5?MN^SLC-7>72c3qm&9v5LYF|ZVcK;;K^^@Wp_jvsXo37cJTNp+%A+` z`8#%QX0LF2ppyrIC;|)|^+W`JiFp#sfcfNysdujw@(paqD(?@?Mn18A|MU8Z1GhGk zdELdD=BHM^_Xe!kBQ%!j`-4RbD@9D`FY6_@ zhvI9p&v{)GON5c+`2wkAl2#i)pr4tgb|xGKfvA7fh?9?WVZ5|S7P$VDgO4pqlpv(O z>8!nT+1K49PZO^cUjU-oc5!%-k9kdh9w--_vL3q*-)5WJeHYW`_khumJZk7ysvjSG z0toi@vKoys;tGe=#kd9bakx>&ilz_R85b53ao2hG);C)JsJ zp=#F%AxiZnkaBxlCD4cb&OEjbobCHl{EJs@8fPa|=%~QGtmXdnUg4GGOxTmD8A8)0 zS3%9b-f~CacM5lF6Oa1-a4r2XE7){4?aFSb6`Al@f6;)zhkn=oNAIN%LZ{=ll#kHT zSs$iXtV_lMP#KSxYoz7A@}uph>`L)+`*B9^vRjFiR~WVQR%ZXW*)^~92S(j|e)FtW z+v8hQzc1_hetUc>;1MaOZ0;jyXa96Davc-))45eNF2AJT0%QZ^E|v$L9cXlu?AaG? zY^93!2@I73@p|SI73J{CF*Pwyv#Hva?_7`qE`&@47f3s82m{T5(rnd11WowoHC^n) zN7wN-Q*q9WPa?zp+#rfoBcM(Y({{Qmw)hxZGI7LD=gz1?9%p{ujAGc7n6P6slyvnx zT7tt*HN+Tp)&|zr`F&IiGFJ0RIn#?xjNk_CGT8jao4_ObYQt0dTxl&~wh_3%M^Ye3 zAhQB>5(NIaO@NGE#$+jcqi9mq3EmHxlhM`o5Dw_ULDyt6Ej2Sv@XZ@+8((F39+yHv zSs${EHqn~E#F>dVB7%;7Yn*gzU2IyZLj1R1y^b8AX{+Gpx&!7;3Wn)RnTQB#uHnfU zs|Q$8iceRHdt68RlN2i&M$SV;7ZSh06Q;Xowq6*k$ij@gI#U>KK6B^c6%o*)Svq9TI2Qzviu~Ve#6s^O8Vd*Z#%)Sahd!%vpr zK5Gxl3cqeSb=hI-X4e(!T)&sB$48D@iCFE}SnqdWZsQ`q?ov24JvYL+e68qz-_h?E z-P&kH=X{lRg6%To7Ush1pPl>ue37U+!zsL?M06QL8j1RqvFgsL1W!HoGRkg@8vdMZ z63wMI+r>U^nS(K{v2wGw(LwGnHM)&yMF^GTO_uzGDzZ55Q6G-=%r#FBgV|_sM)-JS z%ZTPHr^>i49s=zOJ-K*qb90c<12bHMo!hKKZiL+zFuQk9kGZ7&5*1X_q0!vLC}mFu zW8zj|kMfSkmQ22e*0{++mMyhYBd0JWm6pD@+sGmWR^9&D{A24fNPM;;Ixtw71d;9Y z-6i49Y@|X>o+qB;aP+vNZ~fhFugh7_n}1clhvxP*$_gHX4K6%})i2gC;UCl}TnR?< z=`*Qr#5SQibL*c*v-(i zMzphL-xC8uZW)Cw8+~I7k4J9z7GvsTTFR)s?qz-oqMIizvBi4_Q8;38Zdg1p?j;Q- z6+z0Z1`oGANniO9qi0nl8FBM=9A;P1HhNYiovY#hv0rUwB@N~VZfzA58zVaqUET6K zMx3=MG?$J)plHJM$-J8=X`KwEV7S8(;9l91|GOd*P07Z3CSyaA29qu7tN>-h;w{$@ zJHa0CxrRoUnI{ltg}Kb}GaRwldq71Vzm`+bBU{cbLm%a-wap#M!=jN5ipTCJaWr4q zFw=(=oFutO9@o9{+hO#Z?{wVB_??!@+_3u5i>;Jp!Ofa55&A(IaI_a~;Sa2PVz4o# zq);XA%4S0Cc4o57%bEl&8*HqF3fjg?(5yK_RvHx-$jK+dlJ>)sAD5-u%`yU$R!d$; z*GspX{qqskZ-JMp*^Zq4Y`FM(RfS-$RPm1JL2Eq?O_CPf*86ODx8=PFig8W)QYH&_ ztc5qFzzBJsMRQg{(Xw)0CWEh&5?)*$;v#<0Cj-sNJ@PvV*aB3Bl{S&192gbisDg8s z1p8P+!C(M=SJX#2em_b7msq<&(-iKw)%gI%=l-pfcclx~_&H}QxDB0Jnz41~Mhp4$ z?u|1Fv4@+SwTHuM#bv`(IkH6^j6UJ5l+ONtW78?SKtBhmxz7rn%2UApJ%N#%|rRAR{~bxV=6 z5gHwxw<%^A7DA=ygcv4_%wcjEHYO>`F^0u#PBF|(4jY@z@6!GGe81n{_w)HYzQ6DH z_xSzs`*W9hUvJm@y5868d3u@dBHciP7;Nk&0ATM06)F=t4a)*l47d{jaYE{RKC50f z`B87vVlXdz{+X1{>04Jz85&$fTE+FxfxY}{**mYT5rK*-IooN;4ZGN?a~Zse5!eM3aBWoBwSl!Z z7s~tWxL-er0D`C8M0V>hY}@ML4U0xEEBx5H(5AC|DC$`s;szTF^rt%c9 zR|~t$Y{q-@j)X2;URcNsQF}+VHp1N|ybU_cW13HggC3Xkz8IWtx*z;MW<5f$ktqPV z&HP8GJ!-}dNc1sX`ol7iI=Rm1oFvt@sMk?KllkS`tb(%(2lROrE`4UC`xJoI(m{uy zdWrr9=#(Zeq&NCuV55dVibMPjl6gxZg4UY__^*Y8OJL&R#xzTqvm>fv3ct8SB{g|W z4W#zR=)Ud{2p-n5@5~~}E!VyWYa73OLd&a1Cj@QV?H|UuLv(Hm(l+AO(s&%xFYz80naUQ>FC#Xg2Q_4P z%GM}PVzgWozp|OX;0xgv)L=ul{QAdaXa#$?uA zPm@P8z+F|>0C#FdP{1@?v)8xk7Xpuct3KG8KYM1< z@o4vbwf2JN6CJILa9Rs9Nc`?1d2~QG-mz)S?wB=zvs+D5{vBrnIg3*rSP2Zn&pH${ zz`J5x-;FxCnZvF`eXq;rV#R{lB^b5brMIHf(sXqMTr8L>4COz=?ASk$Z)qIvh!GF} zRmEK;s&T{W1o3f*3v=fRAN302RMF7n-99-?ak3~R#@sCP%|cVh!h{ER)Gx|x-}xu1 z1gftdrM7DJ5+a3XSPWV_zF={0mV*mFCi8mS7%qFgyXxKAfa~H6IOR|ANIGtaq{Zo1 zb1iNRVC?d(ALK8n5C0}4a8gv~aOEcBIt1uKYgMLfP^?h)NLe{YUeAqs5fe4mKJP+a ziI#!=ZJuepcMq&6h-}py|&$wh(f8wwVAYX&3 zqI@q!zA$kLHs*6Lg&IdoUFdccb!BQb7!7Ip{*_y4F%kaY;{niPU1e z&SgvDh}zq2z7IT%;mI2K`B2;OYeQv`$ZOFT=}UFv2zjVSN@pqi=`%dLb|oUkUg0eM z?=*~L^1q^C>Tg%1*8j#FB)FofHN&o_C>P7Yg#-IXjw0zvUf;iYNmN{xMogG7gvvvo;q{t7GPt?+bLTxDqixh`69*t1v2-Y{?M7@%5lw)Q(AuK z7M$hgI#~2R89PXj&8&4VWcq9W0`FlzS49_@B^Oc2Fh}H}#b07tisq+pi+bCA7e{vu z(UfHv1aDTYDtPb>ieQjGSJHv$6S&_btUmtTGZou-ku^0M7Skc->p~d3gbqqKb|K;v zYJ&ls2+`W-#;cOs9BWg;kuVut4IrMprND^_Dt$U^cx8EcUZ3f!Ifw5n7`6*-w}-iQ z@xxruEqi~73i@&WIja34(qwqxh^b?>9ld%rO?$A`?-Y%`FZKf^QP})ldY$t5#Y6$8 z1fMqIlu9$iRVB>VOUs(!gEFBRdowMJdvHu$hyppF;Eu>XVpuvQpQl%N1IeC7ue}k3 z?h;3Ya_;q2k_PLHNJ9;*{l6v(&1h;O;d>Wa32)F_DY$r@y&2+H=5Bq4T5P7ZdHUnR zmDa+xCg5%ttvT-wq?je3+D?G9vd13@>DU0MwfAdLfZVp^RMBi!-9iR82;JBz%uH#& zCp2mvPTxrS_&3G}=wAKKRzt?9crDN#(&+f@%Imc0EiQ$(Yl}bPJ~)zA*`VU0CDO8E z4B9!V&?l_aBbMV^v7Tj+;nplRK68qMITI?MzC5ilKQJ$+dmkCoIKXQ%X>TcdWol3> zyiZgN+GTpow)Z%_UC;GQ%TUk}SttBWv+^~*y+!$p-hk8O!v!AP!}p~dUOI$4;OD1Z z!RCFNDj8Mu4Nj=UM|_#D2>OBWhY|JBt3-moeTE%GmbvMgk@uDbY?c&Da*lk1M(0z4$1_NRYanHRSQ3mhUr6$vKAJJ>fsh4kaXVedA-Ipr z^}1`6`h0$y|NGU(fO&6hkE*rs?F;MG^5m2-SL5oM+P5fF`=(wXmhKJvYwqg z!&`*EM8p~)B0)KjufOIZX-^&FvhVq66@71~rrtPnX>zyh6RHILlE&JfA7qkEDm90} z?>+#1?QNwBZ8X$Wa`nbK7!*Zox3bfGhd{1Xed%n|fst~(#`!&GKgDD(j#*Ay z&n~;fk#8k9jF&08d*6Jhz)ttajMThhHks&Da8u0U4xL`mR=ZRYUm@2Wy7~3FRcG1U z#<7mc9h9{J_UgjP>aQ=`ojsK5Hl#YRU446RCXDTJ=S7!F-xt5j?dS|+2}52&{AK7z zP?b7<*yel>>Cw#3tX^A`Yyd@=AlBOy_~<`yM9;N%%XTWLoc4TNQE~gqzjpF{P6>F?U0B zymbgJajdxewCj=W>MtU943H|WJZh3G28|VC6khEEXa&J z>iwg9pKmFev{GyG6b!KQZR;Yrb*|Y7#`&;bOM9_ZO2=|4b4fg$c4DsE01ao9u0$I8tq z(;qO0SU<*h7I+CRgjSwHxZ#X-YHbKw<&fOyZD^s--Kz)$*qpwk7y9lEcT9`?*bA>7 zjB1E^?JVG2aqZRF$d{LW;O<%o)Uw8eE6Xe!GZyM@-*(+7#KIOoS9qfjfd{R?q2X>|Qpwq| z1Js0pv(+@xWww)Q?M^TCY?nGWOO@dj*<+(QKoE%gZMu%RvDf*Ra4~Pb1Dkc~K&h<7 z;8BvyI>V zXww>7pJg|W_nfd;m2f7-?k$3t>c?eakhubRhq@2u*RHNe_tm&_$v)+KiYsFHGm<99 z4)a6%2i{^gKbFG!{*g+o*ZaE zj?VI(tadq)+!1)Fk!dji*v0MU32^cQ-8{pF>dQ+t2gJ9?@dMXibByk|E;$GY8_FR0 zWRFxrMjp!B%k zd~`sy8(tPf^X4_5{2Q-e6tt@>8mgmF0lpO|2`oqxQ__%FW4_CBPCxs-uR72d{OH4= zk;p|92ocB_0o9kZ`-a0 zyO-#7+;|S6f}J5ZX?rIT+TxDXHT%OE~B zGNOBg7_k99hnu)!pkJ$cnsaSFh7nWz3(>ahxQ$b7RH_DWw8knP{>e zffGGs@F|l^EY_ZF<$deSg$N}W{PHg}rXrSG09!h?e)l(j^v@6_I*YHErU!RA1zIi3 znjKn=`|*HrA>~zwjKpK{Z1;;F@fChHp`fuI`zXeRxWm@)4zhSSb)f9@2!X3n=-7=w z^0>`U{sY;Qndggc#{UD^GhRpWpMNAEcZifTZVudZu2ewIS5@B7+I$*jb2#jJQgJ5y zL_>|}Lgv|={6Q*P-L|*qvRx*O9zt(5^3vd}o>ZOg8RRcY%E(C(dl4+^k9=#)NE3Cx z!Ca(5;}1V}veW6?lcs08>~hIfBJ5`*9`O9_*XUn6XB{A2E&e7-6th zUT)moQaJCZW&+R=2XXN8dlKv3G+1!IUS^S9zOSGQtqs3rS-Af(7nA{HJqX5m6B|{% zeCEz&8FlyA8)wtj(%wsbzkrhsv7NG9slqu;#_mD)=s9($&i(X4{F>yJg;^bcm0x+6 zBd?+S^I#ot>#YO)e`Ff|=jN*=Z|%Y0wCF8H{tqCIQb9Oe^_fVl@Wsb8q;+Zh3GI@t}l z;AMR#pGj4|r@!k7^vNs_k2r&#TnsJuFsFXlPw+0FK~o7^S(Z-W@l}red%|#fK$qcc zaW>Za5GUowN-Wga-7@IzTq>zkWqH4dc=iQtf(C>m)+!rHztV43y%Qz}xrNUBz*W7e za+hQ20!)=PKzGT!vu`a)d-HUYD!V}rb$abNXF&WJS?Sq?)Cn2B$O!6{X_Ig6{Yi!upuIP}j0k~FL7Xn_TkN%P%ZD9X`85-1IW>Sfl{_u3G@k?Y|S9~hr-J6?k z#lKrW6N;q%R+7w~r+g$R)7>nE5oP8{(fI68{4sj#vR%%jKNu3pbT~_YF(~%>GLgC(<$po z5JpmTQ*8)_8XGsfw?$lMEeLFH{g%=q1IVIZSV;x|0RQ!ktl`IVkTavFk4Pp@SJ)2q zwAn|Lq*$%Q&dMXwI`*BhS%ZGOUVhQ~D}F*zWrMZ<#*YuE-o358*VS)xPZz!uTm<*u zzy8YlwQ{i=SE6J+hWbSDnAY^Ggr3RAxoLIN{jehnss-JfRazwz0UH528$_pER3Dt| z>dlQMT~6EkprxTVtyr?ySiX0j37gxu9*fg#T6O_}E{%lvYJGhD-snx6D-d7_%|~J~ zd+~YUFtt$`f={otdoMX|FmU**5mYc$KCrk21bOgst>~JnaY&&Ub*O+aK!yl7BwfJ1s#ElE<{G=f2puRfn`8-OQA-mDTaT3VMMVrvgIE72Bb1IWgzZt zg$T*M9keE$7Y(cGcYB$KbN=%96cr!&w;+qyw{dI zE)q1o^!cT6pRz^Y6a-XwU6tq5yNS=%(%(ig8CDFeKTvyk$+D!iV%&c?TC{yT6ywHx zhKO*IUi*&=*sx`BwCZ@B0Q_N+ASpYoTSq{D+(F3 z&p~!I6xD^4#Fce4Tok6>s0M+@Y6xK^DRDvYFk4;&V~jjPAUaL+Pq zMi79f`701(+-EUTs`a(MfqFFBVMh3Pe zNIWMQ4qcE1R|Q6O%uVc9S23tLSazrIa#G=VRIbCR2wSz>?OuJ4P41|iz8#ym?u#jA z%xp35bs#_UaYx@G3)N5+6UJS*H$$)3)5!MlH4|AEYxZKN~wlJ-YIk$^grMLpbrY|t9g zj^rDP=HJZ9)B-U_Mfp>U+1YVprtAQnH2tGXbNE*(8l~3vcn5;VhpNbDiiZ2oy=y4k zf#M7LdT{4U!Z$c1WW5;0S3CtgiSj4vw%ks|-tgL?_Mt)4m|+h@_GEWAstQSQ4lyzl zr`C#HDlE17p3LR>A*#cxx6kSjdxwt;hwKQU@IiDM0*D3ncVG4x*z8T1&*19VMtDil z2aF(kwdjGF#%d2s?L*;<(`h*ig;}I@?=7a8+hE^RFM1Y#9#}YZ3sT6?OKCtoUU(s2 zthjq|-P=BSSaVq=Vp%6VTtKTZ=n_TJ4lj=G^XY0~!@n-buEl3&geHJkPi)`smtKgnV45BI0u`J$i*YQK$|(9h|o{zCg3B zYoa2Iu!)%FyUFY8kv^l^0#XOz(!~Q0Z$iT>5Vj3vD{MMqj-Og%!o_O%KBQ z#LZGW_|{8YHiK-hB_hZ!`ex+ZMF$i}W~y-D{RMT{eQ&A6o=Ge(;)0YGNLy;IgHG1D zKKxw#c#pzspIm2?hlVZ*y~6dX-H`S-co3Otu9Z+g73Z0!L2#Ja@bg1tk)(z&BSX)| zy;{H~t@s$vO(TuJE>!_bQ_W|S!iWw_pcn~e$@toIY82PW(2lvOWEKC@yWNq~9bZc# zcPmti&|wh$!ZlMcPFN|5Tgy%fEPxT~3u&9*W2PmipQE1`;j2$T?5Ea6)35e6Q>I## z_H^AD@IB9XUJ2QHVJ)zLGMCSt)@Sp4Iy*81oznDndEmPnZ1w|jiHDJCt2r_9lz>#2 zYjCUw^YqndxFELU>aw&3UGJKVcv7+)C_6T6*c~_9{+aC+1fSgz2wy)k8uOQix#7&; zGsAyZK>q=k7}Uvyd>WbhDS3|KUgv{$g+6zJ%lwQDC&2$2?w@3k|K)i9_%>v!4Wz6WlBg#vb`75IWwwN{Y*g{Sxf zn4%jn7g_7RTXQx+HPb<*TYT=84A zeNN{$90Biw)d`;(%Ce;ba-sUJgMqOL#P!D{tNGw!wkyu~^E9U51O^-*B=+^NF><9D zg9+bVVMz}S^{Xscs&X8_rc1Zx=F>UTWJdpief}X<};W>)XcH zmpenda<&&1b)|R8F0&&w#ZgEu2U=*ycm^tNxw{5m)0*6dBVfwxzvSazooTi7DR*me znrbI&te@F%D*#zqKMnPiG!yfYiaRoM2RlBI*wF~miEc%~LVas5qsC#^0c&^K4sm0? zX5aVbTy|^Jiq_>WbNJfUG(Ai;72u|EDezyG{JIR5iK44`jy zc23gu*1`_s#`cHH{)x>>XHLHVIM}Ub=+!v& zT%yRgKW^yqsNOTk9rk%qdxDF%~r0 z{U&hQ@lFZ8Sz@0Z!xTaeN5(p!_>! zsrA=UUz5&U9Rhnosz&_%o3HJYEwXe?SX84Gz{bSS+%{UVX;BSh98Wyf-0P^B& zCQzp80}byaFWfecf^}0Fs5=MXxfoJaCbZK(6P4ID%awx$A17lsZMgrMUS%a?Ja?;Z z?pz(Q+Bs6gxW-+}Af(>0Zp33V^DRx;T6{I}xN|;|QPlBJk~yC!T(CM278s=k><>;u zcG3qB1(e}fsm^-~i6pW4w{1nT{tz1lhrH)o6>MJmz`Vf=JG5PFJ^I@2ME`CNO<|tZ zItS|Oi8-YHc7GzJ`cFWZ427gdYj!BovueituF3;Qn@IPsU4gx~N2(>cQ;3YzIMXYyf@pR48gU>crn;yypl9pg_#68`|eO1#gx7 z_9c&@s)=Zol_1=`@~o)%oviZ2q$#;=^JQ{`X}dgJbf*_)m?&Mzs}tQ?NMyvKj9=+$ zY#->>EQgeG#CcohE`kM+_MF}@1&`)l^XGiOqJopf4!A8)`fL7Gzw`do7MF$41t!cG zdXS%}J~_)!gtPz;*AsiQsbqZ$UW;jqdjmlH$)TYFEw_;T5+hpsuj#Hh3{Zo?($1Ra zlbt`c>DEoU$Wmw^3Eup5y<{tG;gaLc($ah1aOIaxQ^o& z&%ZO|wM_@`U}OD8>?}ih-=^SZzYEA^QiC?+*8^i8gjcwAB2k42jrdZU9)!>71a{1< z1uL!kYfdTH>Ab^6B0Y!**EzM=rmBVw#>a+F-IEqpU^MM0?-eFzhb;hIaOWV6oZTej zjQ`9AIv!L=Uohwm(HI%Pu;t6NN-YpaEKiWE1Zj{-p*{cKWmr6;eGH4tsp6c z9UobPt8=1+51~i&YfqH@0d|ImY9fY8h8Uy{_J>a{!_8lbz{n)m)4(5FJvZ}z4BTlD)kPq` z*ZLtCv(Z~wDIs*7=Bj}9cEF*7Zq@leOOFkJsT%nFe [!NOTE] > The attack story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected. -### Details +![An example of an alert story with an alert in focus and some expanded cards](images/alert-story-tree.png) -The details section adjusts dynamically to the selected entity type. +## Take action from the details pane -By default, the details section will display details for the selected alert. As you work through the attack story, selecting different types of entities, the details section will change to display information relevant to the selected entity type. Selecting involved assets will have the details section display information on the selected user or device. +Once you've selected an entity of interest, the details pane will change to display information about the selected entity type, historic information when its available, and offer controls to **take action** on this entity directly from the alert page. -Aside for basic details about each entity, the details section displays historic information, when available, and offers controls to *take action* on this entity directly from the alert page. +Aside for device and user, detailed in the [affected assets part](#review-affected-assets), the following entity types are available: + +- Alert +- Command +- File +- Network connection +- Process +- Registry +- Script +- URL + +Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. If you classify it as a true alert, you can also select a determination. + +![A snippet of the details pane with a resolved alert and the determination drop-down expanded](images/alert-details-resolved.png) ## Related topics From 877ea90171cd719b5b0ba220757c7093070f3bee Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 1 May 2020 01:00:45 -0700 Subject: [PATCH 005/228] updating date --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 563cd4b1ad..6c83a8f5d9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -13,7 +13,7 @@ manager: dansimp audience: ITPro ms.collection: M365-security-compliance ms.topic: conceptual -ms.date: 4/24/2020 +ms.date: 5/1/2020 --- # Review alerts in Microsoft Defender Advanced Threat Protection From 85379dec726123c403dbffaba0a96e2c3513261a Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 1 May 2020 01:23:42 -0700 Subject: [PATCH 006/228] a few minor phrasing changes --- .../microsoft-defender-atp/review-alerts.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 6c83a8f5d9..caa63bb247 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -1,6 +1,6 @@ --- title: Review alerts in Microsoft Defender Advanced Threat Protection -description: Review alert information, including a visualized attack story and details for each step of the chain. +description: Review alert information, including a visualized alert story and details for each step of the chain. keywords: incident, incidents, machines, devices, users, alerts, alert, investigation, graph, evidence ms.prod: microsoft-365-enterprise ms.pagetype: security @@ -26,7 +26,7 @@ ms.date: 5/1/2020 [!include[Prerelease information](../../includes/prerelease.md)] -The new alert details page in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) provides full context to the alert, by combining attack signals and alerts related to the selected alert, to construct a detailed attack story. +The new alert page in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) provides full context to the alert, by combining attack signals and alerts related to the selected alert, to construct a detailed alert story. Quickly triage, investigate and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. @@ -37,7 +37,7 @@ Clicking on an alert's name in Microsoft Defender ATP will land you on its alert 1. **The alert title** shows the alert's name and is there to remind you which alert started your current investigation regardless of what you have selected on the page. 2. **Affected assets** lists cards of devices and users affected by this alert that are clickable for further information and actions. 3. **The alert story** displays all entities related to the alert, interconnected by a tree view in chronological order. The alert in the title will be the one in focus when you first land on your selected alert's page. Entities in the alert story are expandable and clickable, to provide additional information and expedite response by allowing you to take actions right in the context of the alert page. -4. **The details pane** will show the details of the alert in the title at first, with details and actions related to this alert. If you click on any of the affected assets or entities in the alert story, the details pane will change to provide contextual information and actions for the selected object. +4. **The details pane** will show the details of the selected alert at first, with details and actions related to this alert. If you click on any of the affected assets or entities in the alert story, the details pane will change to provide contextual information and actions for the selected object. ![An alert page when you first land on it](images/alert-landing-view.png) @@ -59,7 +59,7 @@ Entities are clickable and every entity that isn't an alert is expandable using Expand entities to view details at-a-glance about them. Clicking on an entity will switch the context of the details pane to this entity, and will allow you to review further information, as well as manage that entity. Clicking on *...* to the right of the entity card will reveal all actions available for that entity. These same actions appear in the details pane when that entity is in focus. > [!NOTE] -> The attack story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected. +> The alert story section may contain more than one alert, with additional alerts related to the same execution tree appearing before or after the alert you've selected. ![An example of an alert story with an alert in focus and some expanded cards](images/alert-story-tree.png) @@ -80,7 +80,7 @@ Aside for device and user, detailed in the [affected assets part](#review-affect Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. If you classify it as a true alert, you can also select a determination. -![A snippet of the details pane with a resolved alert and the determination drop-down expanded](images/alert-details-resolved.png) +![A snippet of the details pane with a resolved alert and the determination drop-down expanded](images/alert-details-resolved-true.png) ## Related topics From 06d357d8466d6739e9f453caf2dcbc0b37102133 Mon Sep 17 00:00:00 2001 From: DanPandre <54847950+DanPandre@users.noreply.github.com> Date: Mon, 4 May 2020 23:14:09 -0400 Subject: [PATCH 007/228] Documenting May firmware/driver updates for Hub 2S --- .../surface-hub/surface-hub-update-history.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/devices/surface-hub/surface-hub-update-history.md b/devices/surface-hub/surface-hub-update-history.md index 8e584f17b3..f4616cd18b 100644 --- a/devices/surface-hub/surface-hub-update-history.md +++ b/devices/surface-hub/surface-hub-update-history.md @@ -24,6 +24,23 @@ Please refer to the “[Surface Hub Important Information](https://support.micro ## Windows 10 Team Creators Update 1703 +

+May 4, 2020—update for Surface Hub 2S + +This update is specific to the Surface Hub 2S and provides the driver and firmware updates outlined below: + +* Surface USB audio driver - 15.3.6.0 + * Improves directional audio performance. +* Intel(R) display audio driver - 10.27.0.5 + * Improves screen sharing scenarios. +* Intel(R) graphics driver - 26.20.100.7263 + * Improves system stability. +* Surface System driver - 1.7.139.0 + * Improves system stability. +* Surface SMC Firmware update - 1.173.139.0 + * Improves system stability. +
+
February 28, 2020—update for Surface Hub 2S From 8ec175022ee01b921f515103ae570807c0a3be71 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 7 May 2020 00:02:33 -0700 Subject: [PATCH 008/228] feedback loop 1 --- .../microsoft-defender-atp/review-alerts.md | 42 +++++++++++-------- 1 file changed, 25 insertions(+), 17 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index caa63bb247..7094a73309 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -35,12 +35,19 @@ Quickly triage, investigate and take effective action on alerts that affect your Clicking on an alert's name in Microsoft Defender ATP will land you on its alert page. On the alert page, all the information will be shown in context of the selected alert. Each alert page consists of 4 sections: 1. **The alert title** shows the alert's name and is there to remind you which alert started your current investigation regardless of what you have selected on the page. -2. **Affected assets** lists cards of devices and users affected by this alert that are clickable for further information and actions. -3. **The alert story** displays all entities related to the alert, interconnected by a tree view in chronological order. The alert in the title will be the one in focus when you first land on your selected alert's page. Entities in the alert story are expandable and clickable, to provide additional information and expedite response by allowing you to take actions right in the context of the alert page. -4. **The details pane** will show the details of the selected alert at first, with details and actions related to this alert. If you click on any of the affected assets or entities in the alert story, the details pane will change to provide contextual information and actions for the selected object. +2. [**Affected assets**](#review-affected-assets) lists cards of devices and users affected by this alert that are clickable for further information and actions. +3. [**The alert story**](#investigate-using-the-alert-story) displays all entities related to the alert, interconnected by a tree view. The alert in the title will be the one in focus when you first land on your selected alert's page. Entities in the alert story are expandable and clickable, to provide additional information and expedite response by allowing you to take actions right in the context of the alert page. +4. [**The details pane**](#take-action-from-the-details-pane) will show the details of the selected alert at first, with details and actions related to this alert. If you click on any of the affected assets or entities in the alert story, the details pane will change to provide contextual information and actions for the selected object. ![An alert page when you first land on it](images/alert-landing-view.png) +Note the detection status for your alert. Blocked, prevented or remediated would mean actions were already taken by Microsoft Defender ATP. +Start by reviewing the *automated investigation details* in your alert's [details pane](#take-action-from-the-details-pane), to see which actions were already taken, as well as reading the alert's description for recommended actions. + +![A snippet of the details pane with the alert description and automatic investigation sections highlighted](images/alert-air-and-alert-description.png) + +Other information available in the details pane when the alert opens includes MITRE techniques, source, and additional contextual details. + ## Review affected assets Clicking on a device or a user card in the affected assets sections will switch to the details of the device or user in the details pane. @@ -52,7 +59,7 @@ Clicking on a device or a user card in the affected assets sections will switch ## Investigate using the alert story -The alert story details why the alert was triggered, related events that happened before and after in chronological order, as well as other related entities. +The alert story details why the alert was triggered, related events that happened before and after, as well as other related entities. Entities are clickable and every entity that isn't an alert is expandable using the expand icon on the right side of that entity's card. The entity in focus will be indicated by a blue stripe to the left side of that entity's card, with the alert in the title being in focus at first. @@ -65,23 +72,24 @@ Expand entities to view details at-a-glance about them. Clicking on an entity wi ## Take action from the details pane -Once you've selected an entity of interest, the details pane will change to display information about the selected entity type, historic information when its available, and offer controls to **take action** on this entity directly from the alert page. +Once you've selected an entity of interest, the details pane will change to display information about the selected entity type, historic information, when its available, and offer controls to **take action** on this entity directly from the alert page. -Aside for device and user, detailed in the [affected assets part](#review-affected-assets), the following entity types are available: - -- Alert -- Command -- File -- Network connection -- Process -- Registry -- Script -- URL - -Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. If you classify it as a true alert, you can also select a determination. +Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. Classifying alerts helps tune this capability to provide more true alerts and less false alerts. +If you classify it as a true alert, you can also select a determination, as shown in the image below. ![A snippet of the details pane with a resolved alert and the determination drop-down expanded](images/alert-details-resolved-true.png) +If you are experiencing a false alert with a line-of-business application, create a supression rule to avoid this type of alert in the future + +![actions and classification in the details pane with the suppression rule highlighted](images/alert-false-suppression-rule.png) + +>[!TIP] +>If you're experiencing any issues not described above, use the 🙂 button to provide feedback or open a support ticket. + +## Transitioning to the new alert page + +When making the move to the new alert page you will notice that we have centralized information from the alert process tree, the incident graph, and the artifact timeline into the [alert story](#investigate-using-the-alert-story), with some information available through the [affected assets](#review-affected-assets) section. Any additional information has been consolidated into the details pane for the relevant entities. + ## Related topics - [Incidents overview](incidents-overview.md) From 88376e5033b61dea92f99d3873b1f02e6c29380e Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Thu, 7 May 2020 00:02:41 -0700 Subject: [PATCH 009/228] feedback loop 1 --- .../images/alert-air-and-alert-description.png | Bin 0 -> 48648 bytes .../images/alert-false-suppression-rule.png | Bin 0 -> 10794 bytes 2 files changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-air-and-alert-description.png create mode 100644 windows/security/threat-protection/microsoft-defender-atp/images/alert-false-suppression-rule.png diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/alert-air-and-alert-description.png b/windows/security/threat-protection/microsoft-defender-atp/images/alert-air-and-alert-description.png new file mode 100644 index 0000000000000000000000000000000000000000..f6545e9184fcb25544cce24497e9c10f36923d38 GIT binary patch literal 48648 zcmcG$byS;gw=G(vP^3@_6e)xjXz}7jgA|Huad#;079<6VyL)hVDDI^|A-KB~PjDyL zO@H6s=ZHKkbI6!j{W4xljqV>;$NOTLFs$) z1nu@22J$D}WFMT7FDTAmBtJc=9HH1lUZ7iu%8NdEQWK4HXY>?#jpZPvg}e!`=kFIv zzkRXklPB$&(&D139{T&sSca<8^TH3TV4eC3oR0+}%CP*s#ff)8*H(cd6+ev2D{yb}XMf|{Bd4UL9?AlA<>HYDVCSCL57C3 z)YKeoZ2z0v-x$NLqoGP{mZW`mm4K{0?uFXNK!c4=i4T(Pkf?o5 zuA_UVhiza4zAADpxlJS{ekZSw&)bQTb>H_S^8C?=PBKw5XT7u40;oUAS4{+MciR3e zv+t}bT5#fzv)7AWh8I!axB$aLLjGt+tePZraa%H0ekUR3)(0MOdhiH+4;2IZhpT}7 z-^K$zZ3$1^nI~+W_x>{G?jR>rbKa+6w7+|D(c3u#hqj%|-I+su>*ER@2&P?hi1>T% zvH|ZnCI48cpB*Zmga^AzSt55AYW%pKUe_uOz`8rgri{C^&j@ArtXjLhs_f6=AvQVX zD`;Z!;(NIKj2Z+yCSh)ou5hJ!rS|X?42fgj(4RVLedd1Gp*sUc?UZ?7f;>!%(F+vM zgm0p$3Z;ZT1-BAi*~Zj<91=rVQi(6;%ZiI6g^n=29-gOGz+GO|yX&<>{EUWc(miEQ7+g(OVb%+#BBRboZw-3Huebatb!Rc`M zH2F`%VlcJn=v(UCIig#?6T`esZ;`a3WbTJqu=LDz>$qE8F}Vb5ukXNy(DSR~Arh)J zd)D$kd-JHil<|Nu`w6S|Y!(X|pKX&SmJ*7(%6lxt^I_3}bQ`I6)M2hQl%(&9+qG*c z)C}4Qc<|zME4-*XShce0T1mm`@&$ct7yY30H@CAECPP&Q-8_AxJtmz@y$$_+@OR2m zO+;Ea(3-MStfiB7jq0_T0*^%75^-^MmOj)CBM)o+?lRVaH(D#@jseF81r{{c1GxEG z!?~;d-)aCJ8YBHMM9<89$EY@}dOcL*xZBdInO6^}59=+fzZ~{lgGdQpg8A5Vc9)*_YFSEgy3Z-!YYy$yLh0g8Ho8=9)q* zYx@|Jm|4l^d62IYX9Gu>^`r%(ipd|GYh*{Gp0X2@>X1YF!&>QR^0E*#vvh4c_%V)R zAGc-4cD=#I@|p%NbP#)`yu_4FQ1Xyvw8=8Wct+MqS*xKR)ZRX7x^XjmFfW<6H}Bcx z9FH9=U#we=+PYG+lSR==n_b=oa5a1mkG;2v1f~}ghQ@YXV_Ch@4HQ~!$BqZLq9(GE zWqGDwW}l`OG^zMYghQr1&%1t;ov|@XM;4lF|8hy41oXE6d&{AHhRX>;Gw_3EU#y^l zxw>eHXzRmYZ8-q$pmTxR7~c-yW7EwYp@;RXNw3d*6KwlJlxiDcG&HHTn}^42Nt>iQ zISY}W3UxWb0v^szynM#~&q1RbrDGlb{ODUpa8kE*VePQC$Bs)OPM3by?iSmrA-nXT zS6Vm)A-#iw?JvX*Xn^(IE_++e?2(6>cmhXBy$v@Bs_GHzCzy#0#BD zR#1a|`KlYGO{*CrP*_N%N<>`T<=mK>&G)o=D|z20luB4 z(BRobEhZf2JqutGK#xa7H7hLG=Dnpm5ai0|yx zQ$&Bv)D7HMWw5vn|+2`s@Zi#yKJMF~AoN#YU$}EtAaXTof%e1{S10L=JOw+9fcnxvrWCkcI z)p?Y+52H^<=mp&PWNzuj)RbR%^?3TUoM%MJJg$Bcc)$~f;%xwF`#C*pK*GP+rW45b zf5*~16xI))0(Q5uPKWD&0bzWURRvXdjf;r_IusM zreHva(dX$}l78h3k|Xlf6oB7Njz%~8YgzWKF}?F^qb{5y%ibMBci|B(94PLC(oEIK^x8Lj8e{=1$3mQM{>S# zea_5u{&eLt74(+ru6aNCETc7QWyf2E6{o$@M^L~gFehoR+t=W;2bJ$}p}ptaSyhm4 zN6G8g7lVJkj(pbazrH%Zb?x}6w6o2@w@S4uzrefd2UmW5R0SOS`OnDa3A$E#64?~^onYD1q zvDcG#pj@PSB2<|{>|vy0j@;|Lo8Xmm;8pcLjjG}PIE{@G+|fSpF_Q2@HRb%*Ha{_3 z+oyeK){-qV_`vhy;Zhf?iIua{8eMu+Fon;K>UGrJA_QzY>fGUZRpor|SN{hQkmyYO zLBue{{$};!qv*x%+a2C&2qnb=cnKCQJn?iCi~m$~3&jF>llO3+?o^^$Hyr+5WmaPK zG{=uaqSEGv!4Vj|Z@pB%#B(-oRd0j|>2&a8|LNI&!PojAlhWm}w%7HvVzvDxy4w8% z3(8OM$;VNXdVBq*>|%^Ff9u1lY0Pg9M`FZW5jY-m-5#A3!_Ch&G#?>LM`~AWaw}9x zovc^S&qk9)9^Cb2Fe5uMnJf@VZB~ki%L*Lt>=v7(BR-$7C{+yqf=6<~Jqq5P4s%FV z6_^sM^dbK3(MI>kT}Ou}x0Sxv1KxLd3ib0EVp5Zhk|}%Ko;bZxqiy0-i~ZT}K*gcH z;*Oo1#~<}`&bX^*R+hC?;f*c=_&a-U3!I(fm_3JSfw4J|Kh~#j;5TTOJ|keNF6XO3 z9d&C^HOFbdr(@&gqa?)D{6?6TX5&tXUeb{XMKQB@H0xgA+iAn$o=XH*7{WjqNIR@VC61QGIsF+c6ubmHC}@xiSTdT=-S6QDNsEKlzuDwJndc5WRky zDwg28b?ecM8@-(L*0fCu5_Qn>ZG-{kxw)W{L}jPVF=~}gKmyz!0 z8dpE?g-1JRiTJz)T_7!De5p_pzW+0EoX-q^44kd6D;n!jJp@+iG^00#h@Fz|4LDED zSflwY%7%9f^ttdZs0DUt$H1Q2n1^^(^6GiXNMDJcC;sBu(oy2GfD8ArKE4>6FG7ZU zTefW&nR0SI-3CIO-JC9rNrI~(G~Cu~(~k^agqSKm{7TaXj_Wh1)EJLT-B6TEW8B;w z)jFzWoyG84`utW*r@6hJZOA+lr2;M#jtaBe$zAp1PhAm3YcmRVlT}O=bOL~{e2U7u z;^1ig^XDzz+F5SIzGEx|@xz#M3$(6nO3_xp4>qkq_u#vLE;02AanGf!veEH{F4em= zW}vTJi}Bp@;VaxDStd3wIq>iRqCn=)?2Ao$KGI|=rOTlJX>?u z68pLG-RkrEK@Zx+A37+s&_z`iuLtz$#bg+t54+oO4LIw^G#~F7lUoB>0Fv0u2-dyQ zZ|+KMDU9fjQKFAr<_7jrV6{b|vB= zRP3hpUNc(a;ONwMDlh82eLaBC0x*30PFwQo%4IF4)$by{Qv-f<6q>+!zvxk!8jO8} zvahQXQVxy4m)Ef{*+fgM7_puK?YxpbuEsN2I1_s=y+@jtZd9}7xoUwRG0$BxRA*_vHpQ;sCNg@9K(nR&i?8%O#S#Rw)gdfzf6zl_SCN_IWS(sGPtWhS4oG4o{5tV6 zp=}(ItC$}xbBe_^4X*bD)L9ID-daR-O*z_Th7&)UCaaz|GeE^Bn)c->?%W3fn)aP%*?CPA$^H`p0-~E473&JF`i?e)WA4ogSpEX--`$@*z^ALn_x$kPkeIt029S^) z3k%+&Xv?z(HNAAUZ|D5wGe-J$yfbmcEqdHFi)CrdB&q5XPZcJ(ordlF;zAxvPT*<+ zublPAAwD<%RhF)zVR!O_*KJ8{G3;%?{0!g}kn{EKo^AGHx0sG%K|_5z@O)A+ZGORB zAMbi*x#|$ig%E0h6edibx}U)@MXy}^KYQUb6^u1bf_3sEy-wur2}nvTuzlZ^in6nQUh?!WB#bp5WsE z?A0L$MW51c-C0+A1~%TKvau>hovL^MNbUl-vy=x+b0(0uUDX(0!P#f(uULIo_2I-! z>ni2q2OP_gEW@jj`|KxJt%p3Zp^7rDc;15cF<`LnQ2GYOgrV$&fW`Xn+l-~Vf zn?v7q>9zOReV=cCKABX4FvwQh8HYIK9~q+7qtN>tk>Q}-k-5;W&J5-X4SGa9EHCQZ4I%_^{ zJZPeq&f66OqSHW`kZ4^h_>ngth>V4ba_j2@M2_YtEi~rn_%_*i+YIsi!4pSa^D3p& z*ubL08^Ccm$zuqL=uTUl*kTSzDACmBDmSS!?)|DzQ8L}UbYbF{2=|$TbfS4qSN{Ha z7o(UpxO$oU6VG#IJ%0>kqM*(!qJt)~V@G}D-0b<`PP|gCu;2OdMYD0fJ*)@rZ68#; z-S0JXZLUAr|L`l0Ylz4BApO*G=$>J8U@&T5`%gN^r=`juPRlLHetQu6wpCBNY=5|Q zghxgAt+lXY)8xZQ^jqCNi`zNh!AnG!v8mVrWexDVo83%A*6!br zo>h1aYn23yt~&lEwXGNpzW}sZd+t(=^Qs=`ICoOqMrV|N(ucx}5J@)p{6~_dK2Uqg z!sz9V*KV`UPBRG&`WrMIJhQ>YqxaU{0s$HaT@m91_qUAKyyQNTv@{fX$R{S8f-V}( zu5XMkQQyKTmsDd%^JgcBBJsBoc z{L_thYFYzojdO#ft;LU0y?XqM(IM`yU_0}O)grpXRkBkIE=yQZ>7DQ!!I##T^=C#X zFkS)kJZM+*WfLen*Zh6dJ(+m!H8GWZi8#^1j=W~4TOj1cJpvu@<4tZ1Qt|#1_aJ)2 zdiAS#^(L!Cd}i%|{dSonmoU&Tc9$pzfSc}0*+Z?Y^Y=#GXsQAl_&WAfIYp1TYA*fp z`s=?MIp=??{MFDe>pWf{OETmmt=O0=5X>@HP_$^TAxaVf`gy3?uotSl>(rx--jW(= zfmnKqPxt3~RV!S1=3!fgg&%UkUwRt7?jtHrhlgh3r6>Gy`g0EJjJ)Ddj}35z02HB* zxjJbwCZ?Db2O$fG6b%KVQNwWgeGCQPWc{FdK3;j&`FPt&5bWk@PRY1BzTw+iZH%kr z@hAn9m$aar**_C?C4?=ieH{h$;Zz|T2QEwOCN_=AP0lQAZfZ((bFzskK98BdWhN$l z58r<(N}XD_H&+QTm8g7@oo1J5GhlV-%yXf&h)Ca=@|7?;kX5M5u48q6>@O-g_OLuv zU!l4h*>6vkY#@zDx$YU~DdiPO+=pFP4N`k4`A_8nVP21(BE> z)g@DAUXbdbGpm^$=%7XHF_7%Y-}Vx=NE$*LsA^{xv>x|a5GKC_^flii5Zu38m|Z;UZU=&2 zUbK{Edvt5^Vas1m3VW=IPnGnl8lLZgDGxFadGBL;G1mw&^NNXftTG|d}d({IXGm=|992IjrS*D#w9qVOXHJK}Qr=eJ7*_k3SM zHHn6wEe?kZ96APE%jJb4iK)E9R{S`%0r4a&77{<5JKF8~;V7fgeyWNN75oB}4&~WJ zwUR|Q8kwxt; zO~Y=LogoYMtl-q?T{MhNKf+Xec_cvC`|@J}pyI55ZRFM>?=-YN#ogfT;g4FvMgT;0 z?IDw2mOY4%F<6CU=fY{dezu;w`!)>#oYqSUmbMHT2W8%(ylm!z$5V$Y zWJ>Cd$qx*l&M)nB%nwQakaYtUYFL6t^ogdXR-~OVj&yB`kG0Z4OAI`iYifcoZuxHR ztJQKGVBI$%p( z_&7S2vTr8jXtBa=(s;Jl{z$?ui0Z%SZ2Gc9_cYh8uu^K;NhXtwMbu_=XewDNQg+_I zQ06kGWm_PL3Vq%@r>hsR44M;cLKXYstmLLt^-6N8*Kwh5g#0o(@*>CRb1uAIcgu4B z7@u!ovS5F2094uzt9i5A?rO93`AGaAIOJ1!XxCgDJO0y{>?RNNm*;}-jINDsM$oV! zn?-QV+SOJx%K*$4edy-;;cQaKu4$-W*IdMbj+>#b`Yw*ePeqOxb=?nHN5nfS9S9Ac z@%lmfgMCg@LWtE0ltHY0@arcQ``)E!T!M7BWjIEy=yF6u4en$)hfKAES%0sH+R7U( z9yy6}_=3$xX^ex_!J!N@4qkcJhHPimvP*;f(Y%-If|Pms5R~GD+I#wu#9<#@^UUR? z;rUXz9p1&c%WQ2r!gq6i{yDV}p{mML?RJfGxM>HVVnl0m!|6xo%6OvJP=^OT>%AqK zKB5Tnk)m|u{fXCUGX%_g1M~juQ|D7452_`0ZYEbe zDY(pJHPIgSHbGQZaS8M$*R5A`Z^@BN?@C+inRu#{uu2x*Ljwj7erA^)nR`92Ykf*^ zGPRqMo8dOIZ@F7l`%q!8(k^gCXSu8Kz0$jWB($Qk^~ttP8p;A`9hG)L`jJir~@!kdTeqT2Q8eEURM1hJcuZNOK8l`AI1*q8y=kaim>|co4vR5s_7Ke>hwI9UDf$4)HL(<_^4;&0>Eo@ z#Ip6n*>Qe)_D^jU+)}J@)7sI*DP-;HBHUqPnj~k@5_$A6eu)^$b#-;4{WND9X4S}M zbdK>>z$+q)d=C0yK|QfKS%1To&y5b8BBUfH!t72brng8mjmV)rPjX1q+FvOm=SK{P z!NvRw{c~?Nciz*`sQL$F5aZV40Tq>{$i6%BH+>e;fQiLf5j@jYZzrYs>B|PAh?@0U z``+FdqVSe|JRyxu5Z{@cLkBpN4fsMDx6{oy``IuU&Y-pvs$Nzi&29gd>W1>v!GBO6 zqib>!@&#W+_4@#61rFHJe5{9+QiLP0|K3a{`@<0CDMtl9R<~Bp18=k)8r*| zIB3h*59zdN^Ntf<56isdy-$r|EFuNKEk{N8B;A#3j?7A7e0-=(bToGvgaB3T;Wx$Lx zGf$xOglNOJPB6G9QOoYCOg5bhI&$k62bNvt5PPFhhHV`LSs$a+Z&%UA`SiD5X125x z(>a_s8T{Y*(%27V<3lEx&JUhkV0TWF5h(Sn%Y)KThbcQ=t1{MSd1t5mXqiqv3=L8E zj2lrzdqwhdIzDry%?ZrOOfX);Jd*Y|*G4`6@2M=lo=N^%wZAC>&`?u{f%o+S{+f9T zRsT=zJ^$~N<^oyaeo!lwlq-TBrvk~N72wakYcv#p#a8JTNrr?NEABjtpz5R-X#b)p zetA6Hr5>8tc#qN~G3q>YU2wPaF?;um7ed_glBX;0^r+MT1-P%(zg+kDT=o8$$JcKV zMx>@-9O)W9|9@gAt3ntN=3dT>t4_Q56`#oj&~#%lpu3VFJ=GU zlt@r6;o|I*eISvK(EWI87w~0M*7T%|7c^urRpmm8PDzJZ)KRdHI5|&$l$zQ~R_{kkR!V4ecU5~1-DjK{_(Y$<%TZBqyZt~jOq@z@Z4d~z`vehbP1_F{% zpY4%X@~XD&KNk*pY9l!-p$6@v%Tn|Bx zFW)wy{drbUH*xI9;n&U%Co~tAoh3d8qJ{TX;SP=pWP^a3WR_wzPBoPZ{aJD+rB~`?uo&&lQMaC9y4)yYPCv(0yk@p6oct0U2!}4i2J2m~{;M$T zSDdt@w9?;hHmEkK!Aa=(t>1v4=Gq;ywenU!`Pw_`)DJP>DkU6_ecSg}s)Tl4kofFs zfK=*}yN9bTZYosx@TcB9cNvizR1c}a>vr^*cI$7eZI-M$LMo_GjeWB+00s!Y|HG2U zLH5J(x}sn1R@ck{%k76 zw!z2K?hfOOjTYRmtc=Z}K%%D}3Xa;%v3_OJG%{gsJQUP-;Qo^&(3y#e=mwfylI#Zq z`?a(Ejo(*)8Lj#dM8`UcSBeRZ$=boPsdI{{|2%giKDBQAo~`2xUWU+%-MpenS`Q!E z)XbLS;97luXtE@#JJFQ*LZrA5qgNvrG8O~72>^eW2x6#cy`Lr3to76r47lj%O z724^RaPD*)j!xA0Fb4QpbgQCk#;K6R5z;1X#dyorg?SnAmBhlIwAGUiZz6<5=y2JK1fpuUW! z^*&HTu@i1nLtDcdhmDo5(8l@To$!QT_WnaZ4jcVTwS+uTH`KN(3WCcbj!|E~N*7f?2kgGo^ z{zqvRuEJ%Be>S&bZZo>Oh665lRtUeU9C}|Vc5@d#x`eNee-3*DIWppzGO@{gRC z6d#}Tf}c*E(NNvV`cL+a;SV+y6Ya8OE6h}J0t6j(xH6;7K+aJi1JtpHP0{t9uKK!`Dk$3{%A93L^%gdIY!%DB~9JVf7E{P2eMOn zs5LCpk!%z=9sCMJx)+`LEH68~HjP_$GG~TcN>^Y3eH-`-_}ttBCuNwPFw+%ox@)hT z{z9_F#(lOlWlAhkUXLd-4WECLg(s8Yk4~9%=TDO+bAM{U&AAoHm(9*3J^wZ$e%}=h z2FFKuMPWjf3jI@CcC<3c_^YMK{B9VVVB-#Fp~XF}h^}j`JoJz&+OdH^kzVG>&!Cm? zs`<&n@XGk|Q!B%Mnyz04sEtcZ-P`bQcfz@`jk4x+v2ei6)%1%!odu7z1}0ikVQkaU z1nbO*^efUtR4gTiIGH6Lvg^S8Tb`HAUfz@Xm)y*F9o`A~J$wbni1P3K>q_&(lry%@ZQ8Bx#gpV z+Q%cL+0@R;G2@H_5r@W!gc(aOedGMNG>&oN7_vavncKs19%qA&k|9nuSfn*`z9RjW zc=c32u$ENhNIOW=&)QOUnW-3AE2oWPBLqHf{j}z~KxBPQl;dIpzhK0K^MC*6WN-W4 z1Zk@%u9a4qd`EC+6Ds(0KeoLCQM(maeZoCaSZCdQp}a4ch%CWfsQ=|eM%Lq$OcH+; z3W}kB9M1ohANDi+NxBc zd}e-?`NmN&DErvk+R1JX0#}Ov*$Vw9#>&nGlpFI_b+W|j%kySk9<`YyqqI)kJUD&t zlKS(?Lb>*PiS{V%!gPDMT3u0nq#ZUl6w3;)K20jqjN`}r)gMu{)ohUV8R~GQI1wd= zM3`{>R+mf>+M01h*6^V7 z@(MR@vnrDx({eN#u3)E`EBvNe&{&J%#SBcMV#swSzs=xt7+x9KVmsNKO=8sy)weie z+a;3ed$BZ1_C?B%irpcHAPj=fNR|7K;vjBb)lXAXQ`D7q2~BBeuX&zV$!5B$AtO(1 z1xgC%;$Ai{3QcVv+VeTkVe17J?LwiAPyvu~^<9V^% zc{M1<=XkKmP77lqKd9lsXuvP2)QtHdel99CkefI|0Ifh}ms_GIU@1yw(->8N^Su=h za^pA|>GAw|pq8-mZpHyp8veOwRe(rllu&8W`63z?g7))Wb`?>_&$*op(^gi~;nXVg zCwQtIOE%nj#>XPy8ENrx6T^JoI;xdYrzl@@{ z!yL19OOqqoASGouq*biKa(S^7^nE?NrWLK@MU{U|Yuz7@gb0Ds#S;~0I<`4NSK9v! zl3q%8l^m-FsHj%OeY~YxG_l01JcN)7cR`B)pWXE4SGPCJJ^tEWKGS4QNTDZ{?$)U# z->JfSsBvyM?!ifarmhFOG+EgK?h#q5ZB|(cA~I@)P_9+VUJuPy223WvGAzpW_&s#$ z70Uv)rc;WOn)Rc*5S6q3#dS);SS0^g4*lq7C{|()Wc4(QivDUhD&8gY1sy#z=SBvW z4RQid>+MGEq`Gd1Q(?H(dA@ezkvD^~HRDAh%*+*M_(1%)rSg8x^)wkiHK4otu1WvP zPmES(xTfCX(?rVL5k8nVdS;f0-jqv2)emXKmZs6*_MsB)b7<+r!Dsgya%4-3X+{SioCX#eIq%pmd1ee@20?=vQN_NyqTuN|jIc z(Uo<2_=-ozUbTajgZ(cyQi3-RL=xRQ_478q3q|Q4i(?mx)1jcz#O5J23fjE+zcS>u zA+UY{g5!atIB!yQmH0S{_ZeR_;i@a)v1}rep1Ibd#^~W6>0c$?whNr6e9)=wSOZDi zs@i*f7moTW?C>I!6p7?fhiI`;-kZVR*R&{TnD`QgT0cP|#XPF(yVx@JKyW|P8 z*22bv?Sc71^%o4IjB@*#GT%JV^?UKmsUDWNt*F)|JezhwG+JjCw`ot$8i0oCd~Yh< zc5CR{sGdVjJ~XseIGK3n6XfCzP$if@1ocm&lY3yR`0O}3LwLrf_hKsKu-gdVobf4zlBIuGbH{k;v@c@xtv^+%|p`E5MxRtVzd?m zb_I4D#Y2l#jQ?Yh=L^Lbt;|W4@3;z8uVidvx%H~jgfq89hqKiui)-$=iqi7~%uXAdUdEzx8WHh~531ofv0dzDpoW&%!KXf@= zZ2QXtbhJOsqyPfh}ZQaLN5PC9$@*VnkJ_a^Xpe!^c**3Gt_sLQQy>@ z%L$~SBu0NdqkP@yN|BSyH0;$bq9zn{4PQW_zFYQSt3gs}R0cG*uQ{qunK#2m}r0N}2C+&Kn5mh0({A9y*cD9s~AzS}& zVXeV85lkbvgmd}08#!4>8UIqsHnye%y9G1_QVPcZqqJ{?Ov)y!gmn<|`ZQGNJG6=L z+!!`*_K!QB?8-berRIv|<&MjB=gCy(s#d(ELu%58+XHKKMvDolC`9~=7C+N905t(y z4N-a1r#ZymE{v$j+-(K}XQ$7R4h|K6{Q%QY&_fIh*<3lt03@^z5un7UIV*2gpBmuN z8EcFu!1x}vIi>M7$fJmKIJG9{A(nz`#U(<%4~cF_MUMYNToEVz7n^?t(0?To!%SL| zBQGEBw2REC2*LU3yVuAMdab4t;h%qU*nz+C99*1U+{4cHWvO(v5EP%{7cn%g*>RGB zXn2#W@(jr>7^at}JWTVS3?yS-xK(MUCQZ_ae=i(Zpnl}HN_q9M3-*2_vPBm>`uali zg}K+o#+qMkX1QX;(Ybj}3IBK4fY>lqS~O#MgV#Vv*?W`R_+aD-Q9(-h86TomsRGo9 z=MM2dzWjxKwyw43@=GTIx1Cn={-a^yq}GuPR<&m@K{|_U!;@yK<=)aNapKMWLrBKG z$LZ;QHk}`z@Tf@w@b`yo;1_elt3us;qc%N-h>H%dyYu5;SKx`6Edum_xJER! zm3xuD(k=s9VvCrWkeSSsCmV8iEq$9&)lz#~ZYIbE+39S#8ShY}o=SSnGnxkBMIjlb z?JrX>S#KP>1nb|BRKq9Bc&|uI;o2PYW@JrjiVyjS49mVt7J&$JRY_C~JOC0l7@y3T z_z^tw^2FG!d4ox=oR}1%51OzdpUzWOmapnf%|X+*jb-m75wrwNk@KYc6ja8m!%ygs z;jhK}BanZE@W18MJ(pGW_bk&l6&_@RcrwS9G0fwZD@(`}kps|`MiK&2`JBbE$_V9U zl{OQV4{Z|hhrJ_&ML@#H8{`RYqHx!AO_FnS`w&xq(J zj$U32iCl%K?x5XY|0A(1m4NeE3vIc);8p#oMH)EkriNC)qFJ0P1cUOP)HPWD(Tuk5T^l5#oyc_TmJmcv zo0Lqp>pTwQsYP8>nFU~q!lW7LChOn`J!OPhzFI@!JQdt54`MBAhO@_4tE0TD90}x9Mr9>;bv8RaH%7+$ zy6e-(F_5QAwi4wtF?afX+)|5&APFpv;jcDN1lz?hKk;}iGlC`itVsV-$ZDRW3smXQ zN<+%nQjNcQ*T6S6S6FJuk5UOfS=-t9QrX1u@jBd6ttMnTs}h~!V`qEWeC|(Yi%d>` z^Oo~7Q~%-D$=&IE`W$V4y4suAF1_66Xc)7lE`Q9c72<}g^`#>FcwMbLX>x=5?n{H& zPNqs^4oJF+*MPx9AH0t5(oH=zfSsR{d>gHy=^8sE*aT^f+)pUxG&am{%B$rnYE~=( zi<^0m%OG2B$R<>(KohT3IGd>~hEvg~h#iE4FaRLIpk-u32UlR887^AJq^7+2jemA5 zeY&;r4rhoHkXs_D_1#tWec+9LF7fW^Nz=`@G3)`k9_0&}c)1zgsO?BI_4x`otr_t) zS^(yt*2K>Ior57a6z2HO>_s231qSe&I1$=;y99}lw^+@v=h`nonAImiZxf-Rmv?U> zkh=HyqE3Lefw1lbtov0NvtA#@{gW_mbm6bY!V$(v)`ye6DetCgyWBZrfEX?Z z3u@5>${w&XQY2-lP3H=wcdPjq&-~Zqw+iFmS#Yv{Ya*QT=izr=H!ulT6XAB0nd@B! z;r5k9C_kBRbZoKMG2ME|pQr!X-0Gz)n?H;NO$q;TiLrJcHyxg(+*WXQ-81E(;fLPI z`~Dpjw})E{L)lx5vCVl(_|2a3$fvnFz=*%t#;Qeg_~4dOxC&OlDT`&{8*Wupo}Nl7 z)hpn3t<~%g4dt#GW+N@#a9$VB%ashD)E(di-#h*qBn1;9w#fbC)M~P%mg+WobMw1S zU{J3FLB@q3C}+XEqkMd2k};W;b68gW^O@bhdayEckXzaJTPSs|TK}+qJl#@O$)dVH z!*3DJF0mkw3wH5kL2HUepA2(wSZ>AE`}s$wos5B+{8S&NQV||3&4Q#7qmR{stYgxS zTr%$yX~gV18J#7sh1fzB*pOm|VruV$VJ`pDQq#& zzhz|PNO1b!vM-`l&>R1JLmdNzkh~&DVJ5j7OrD+rEizA=bg~#-6Gbq6z|Z0?+%o>; zb)-SwANjY#{}*h~ z+GF*<(#?DRRODVgl;|H!z8sfTY}mGY$RJ(9@lku)Q1%AoAiy}@VORiaZafHXlrfX` zyVuP?RtlUV{SoF|AD=*06hi32SaBm>k;|8{vJv zRg-OVIFKJGDRm6hR932FC>v%WfBP%y6+^BBVkQY6q@6RO zqjy#N|KqiSXRpA66tv#kvhGoSL z*QmBuey2^{ygJW@ovIdu8S2=QiCrpd>+p)SP>3LUG-pt~pXAUZuOyya+oAw=E%rg< z;&jwKOK0}ugHK?VqRT`{)^{AY&EEu%B1FhOxDTJt&MoXbf7E?WBQ5ifEcf;_OTym% z7p>emsPo4;l@S-^NC>Wzhgbuvt5LR#^?jg%7RXa+-p{gNL}O}}S-8p9cB*Ll)t@ytRdqf}Y$hzySZ=_(#ZP7?IlmE;lGk3Bir3N-**3Pi>V|w)|7b5W zZx=_C5W6KNRnfV=Q;XN@Xa8ZB*+9uxavkJuiI5=`db&}{SgmIUR+s#>QDX&KE1Dt< zimo24`bRBIJ@gT^FCyKce*2EEdK4-BD{vs$5?Z8Rp|ph(P?C#FVztfU<2!Bn%ysU6 zlI1#@sN_^pB0BB+z3~^HW=oK?QD6=DCa+Y%GL(Z(lau^4ZQs^&>?v;77ucoeZVa5& zUhmFpNaf4dw+UTQk%|eBF!ufY#5Rn4|6_2kgamOYb{Nx3v_*T4+D?amSwT!H6s6pr z;LznX(#fq+K2cP>k(_3r$7z^H`I|yp2G@?Jw4RD`+pAzO24g(!SNe}d|4WIn7i{rn z=3TV%ZKgKv`^rC~Xu7rYZ2D;22Kb9(NrA)ry9eJyxYEl+6WbX`_T|O_%;*j5cPK4{a zZGp6Yjzl1P)-c>TWp-r?qSJjT~b*ZCL07JIvmeoWJj!~R`op~;sVg3Ib= z@^jF8wMNMeoK^j8SeE$cy}O%-gV!1NTj#HI{VyZl+6?qYxBo%97(2D%T-A0Rfy-id$)uGVVD*Vwg#sM%COzM zzctIuI?v&;eL8xe;tExb-rp!zYu*;x9nC-9@^%FX?864uLna%=RCek-?3!f&oF z?|6Q8z`5N`ME>_9NpJ_Ir+)cz>_DY14rr@8c3x>4^h#zzFOOONvXsuIIsd=~3>i}>m6;qah18Yx)DJ{#D`!N7UlJoGT|H2mVl=3$$-($0 z&H#7_X=^IVj0y_Go974%*~#W5zoKjf6vppM6_EE6=sj(7^+GescN422QJ;%z9;eFj zri&>mLX%5SeRGopXJ|6#MKa&ciqJ9cI(zy&wag332+V@rSVmMfws9ubzgN)eY|O3h z7M*B2Nf5h$tM82o)?761qBB-mW+T#T1i?#5fvs4Q*_Lr%pRD0385dBG*>cFMjCWkp zpY*iDd9lvyEfbMTi_^0Xd-1waJv%ZAClvHNG*CzKb1Zwpq&(n;A8F`0rEqJ4NN5xp z6z`A5!y9nkJ3lTYYwfivQKhB1)w#lK~m z^g@u&3%$l)B6@AN91J@fX+g0=gXBPfAm$uhFr)7r;FZ)uV&ZpsRO$%M8r4e|rbMX6 z=Oqk}Vk8FiR}~d1e``mIx8iodEWIZ8Dc*>yjITv-LwrZ~-QBAcuTTAz$qK5Ht^9kG z47s8EN?U;YFH(|DuQFkr87h*X=tQLS$YN*{H<_)>wbbdOaVblOW;%DePui z<#LRCy;~GU8|?bONv_F%2vq1^5TLzI?kO!Bxb-{N=MM`XWKTm=_McmiPgJRyI|Z|v z`BponRs5(C_$d6OMlQIbP(r@3_Upj=eSW>IdB~IgZ;Ct#`AT}>U(4|p?P_!a+Szyc zkSP+FezGTaENq~R>=t)~O(+&{v%jnxa$tL`sJR3Q6+tP#fF|+}d6tDDW+Ffz}59UL~ zfYzfEABbZP8ODz_3W+P~d%~@<~R-5N~CX zjGD(v@~QOBJ_1L`zDH8mG30>hyWQJTu|g5AN?bfhwrSk*C^2=&majB{Fz}wrxolrx zAa@=FMGk(K3t86aYmnW#EoOa2Ti?8`OLz8_399*$60y^j1xMFzztUU*eo)NF+VS$VSfA3Tvv=0C0XRU#76oFc*7euzg#|QN?drVq zm#QhSsBG@maS>Qca?(Q3c@YlPoUD2bW3R0nR{dcew018d7OcsrXqWTv>X7`L$reTN zk#1)$5L=cFDtvV%_{}!}GA+$o*Qkx59IwVvL{0+MX&T5E(64QQ7Y|Y}x{N=RT?qBi zg1rc5z9`Imjq8ma#IsEYp`&j)0O(C4K~{PRH=J<@(zwy2ZKSRU!7}h014`67z)Pn` z2l3u_ahU~J06IwXk`@1!KYUU0>CDdg=EfOxy-W;?&4qn@!7 zCMn-|h!kT-4N)G&6!1earqJ1%KZZVbe2G^XPZZJ1ye?$kd4%h2Pu_UYAdwNRb{7nk zv88FDo6xIV+PWn)Me_T(=e}ut0GM|X#jk)CQ}vSA@RcNXRA|+`=z^=sI`Sab6}(&Y znD&S4NkUo>o*+NapBBD*FaAa8rP^W)o-gJ1T@?959Q3ju0bkw%4@nWfcr7552YUh2 z9mabR!{`lhx5c?-Puol;uB^J=exbB{sk>2J`I_R)*WYks;F}T$vda~KF<4AGruMNG zVq;u@fV8q(B)O37lT%Jc&;EM62sjhv%$ai>7H6uHnPBzV$vh#P5%MArhi_CS3Mj)0 z0lKE3tVetuAsY}>$_{0V8{gNa9DlN z(rp3g6?ZV`L3NZ*NR3MqyoYWNdEfC?J0RTsvNtXzw|)6l%9Ql=foLJQHf6o-dxGBo zSR4_VDc6A!1BqETMm_&xZr(r2tBm4it#+M|FR$lYNrL2_0d0N3!>NYjSL?6pq2yv`mWY7{#ZjxJ;l2w1LxBn@9dudKOMa zBk2ynoVTy5TgUdczyBg^mp|d6c{+o)(ggkuxlBl5z$$1LT zU%um>!BkHg>DVtUC5`Co`L(fYT5&Zr+iHT=V}f!ppt(Sl(8R%|r3Ize7oT>CEoBs& zqe(j2+BEnA5vW(CI0Y{_ZV?^KhO26AOK_g2xht~(f2&{h+! z**x=zmJU_W%JAIq5E#lj1R-_V{iyG>)1H`RBkR7ZwNMH*T#O~rh>MNzL8W2i#_3mp7JQUyg0T31_=k(3rlM(AZ)ocw&8_69gc8Y3;RS;ysJ0ioRIxXVjd{!?IwmXAlg;4$zc z;fGwi0!WwlmK3^3WmUTIPemQf2$*qxi`9>KOsg}mgbLWN;DI5xP^Y=#ONT&R8>|lb zFpJe0Re2ZFY+8rlG(o^X*Dh&gUZKZ_WNkP#> z`Mkz&Ae%rr3Y|&(*Z&lH7xAwNlK+%wDW|C>*;*bB_WcI=F;h0QFHcf@V(9ci=GYfF zg)||~lKZ;Pt%}v*=FhyE`M<5~M`Wy%xgZL{@$cRE-^*XQ7kEE!Tq`jrwCCcZJT7Nc zTXgPYA~TuA5Am;6B{ok@4NTR_J$CIar*2Oh)oe*tXRl8a$ZT{%%HK%_&(3B7IA|G;7&0Ii{ul8tv+1^TSd znzSxMPKXJ}3#G>f;BF$NX$rZ9s&dHZ*&?IK)LZhLt+zQb=moR`Nf=}wM6%w_dctLJ1p0n9EXZSC^`J|Pta?E~~zk{^bWdQ+xeSn`A!DqXB3 zjxMa*egI)j(Dm;9Ha+U?wWb8hB!kxe$Q(#f>08~u2z9-j65TIdT-0BPNpEEy$p$jW z{4UtG3=XPEdtc2$nU%}us}`3XweAAJA0hc82yGvG&|@XWAzn_$9+Qyl!nfS@AV&~s(+X*lRb zHD!h3_`fJpPUdFqmcV2(w_%88a} zOAnHK5}oIo*zpD*ery75A^M>6{_~GyUg~my7&g{d0G@gHHv!TT+xEv<-kI$2rq%1c z!Q(hnvI(w}vdy<#XSs&9oXhG31s)t~#^n<#kb&L5jYZ9q%&di0g4VWX;m<*>je!8Q z%L$NO$4u44A^!Xn2n%qknWTLUD3o79!y6d06VXR7*FIIVlPd|=m`3+{S5L*c0rda`h))~PGS$mn3l7dg9 zp75{?psN9*8z7Iw$}mTBQGinh_Isx8cS4w1M^sIdz!&*IA4WrU*?|Mm$i<{tf&Ic9 zH8R-J!r9m$z6SKK`^i?>6jfp8m8~g2VubTk|LlGLhyIm_`AA<`MPDiVn}ZbXP{@%f zF;_M5>^=gDwW8pxe9}Am`KNQ4={$h>#x1Yz&Hd9I2q^fc{i;Ai->doV$A<)arj^gK zbN&+t^>4UT1ig-Eopvy!#WQx0c5e?%qkY+o&i+4`3}SU{mV~?4Ch(*B%k}N3qKp9} zc}nr9zW|NiKY#{h)%hdp>}jC>%1!;*pm9u4G(Cg|$C;y?`{TX=rWXn>nMY*$ApC6! z9UHl%r3{N=%$An8mdgZQO})T;SyePIS5z*qkDi%18{8ZnSCUtTQcKvGvj=lsph2|3 z6Wmzu#$kjMon3-VPdt{{C>qHdBt@Cxq{Dl{k>M|A8$A9;RexSQ7E{#>O!sPapITo` zsU&%XnG-b)0)sz^Lm|BJe7!;vaJhS5lt@7I!;oiG3*lD-SjBFic&%SIKU;Xs8m!a1 z@(T_{rm8Ms5kCebmF{PKOKQk`B=M=ZfAJd_r#~`6H`qM5=;bq>y{`duUNlxx8e^IA z;mCVnF+K$Swkn4G8IFWtXq8efHu&^A*=OGBG%&+`>y?=`)~}%I;0X9mcGw*3XoR!F zrBQ2uJn{$dK#7&HPrkb{G-OwZQ!h<_wl;vI%@D$=c|H-EKWZHCc=Y0Fj5b|rp1$hiV=yC?&nwnX=Vjc3_XBKOseW01IJ1~+lJ}6S zZj-y&L)e!WisS~s{BM{0n|=C5Ow$P9k&`xmsQN#8*_Uu1TmWal_1X4I{9REE$gz-XKeio=km@o!}%VOyT^d+ZQQ~UyIE)=mtRmNWag2i zPL}G&4TZs0_Imr(R0DeW6*BprVb9_Fwe0(Ra3(ReCCY*ld>eVJX%45^vd?KPUw5`O z+kgI@yS%CsR+!ZvX9BzBaGcw^^|@+vJRIS**-q6c`FJL9QbW!6Y%(Gc?QhaHuWVjx zYU_yy2&`13^-*SK@H~(7Hqc8{j{KF}G)KYHj!s3fj6Nf(vO4-?W)yZBTm0)R zYIEKW1~UtVlB0H-yTnfd2i=2G%LO@$lG$yntM_me7iCNU!wyN6fMxRmGB0>tjdW2=6V9AWLGY+r4xCXk z=t-mM6=hzcm{s+nPbGnU=wK8Jv}!wFA5RMXc9`dZ zqD5<9U9rctVV?&qJman3P*9Z^06v#vW%TFf`-fb$y5hwNk4gSu`$61j?`&fqcj-aU z(T_Vk8W@^6clC#%rEp{83t{qCM%Pb}5nqg<15f_3JW6*~SmJ#ZoL2bhB!AN(I*j4} zVMIJvI{w?7UOMFyG>)vCuggth5q_Cx=Ek4sYg{oy3o z8(8pC9I8V!~@z5&5Xk0#(lc&F;yh3sOVoTX5KSq6K|2k`xj%COt{Vv`@=tp*4p8^8Q z_g{d@G41<`c{WxC;{-;?M03>sp4G)M)?!J6;NcgwC$sE6)pjKfDiK8gI=r4;Z9DpUC4x1BEnrwUk z-BnD1eAOSf$iTaf~R(4MJpC#wNK$HLWbP9Tr#n;a@w`}bgzd(T=a062esS)TL>8OdAcSeH;o=cBS zH_$<}fm1I#I+TBql4%~`w!W6sh1DW5;esgtoQ%Lw{9es}>rR@dV1Ulqp>X2+_VC7F zhA(Fds~8Vjj;EtGPu{ff_&vb;piw<&R5rMg<<=trLSJ0g=%-blI54RnUs1PQ z$nQ`Kp~#kjUJQa!_r)lxtIIJb!oO;ZT|k<%rDBwyVYrwLyQ*cGC=vtq9Qu+C4!d6GH~K|Ew^RAEhr@xc;BOvV zsGQBd(1U?}OzHEfdhMzllwzFka|brLJ!P1uLBPOaGpl>@GO4=qdb*V8J93oz%fu2B?QZNA$E>=$ zoc!XeB??Fn5=}d(jj*r>L9Do1Bx3KQALjj6bWf~{>uxEIC`V%ycQ#2rzlxZG*?mL< zDVN@*;&;>E3qKH_imDRQy>jjV5p{{*BpTD4oUUEqwM*}c2n{Vg6(J!(f?GcvwwTHz z!ixSUr2z}*-pdDB^Z|4Qw)0g<)DCc{u1B1|8Uw~|5b#bzE&P!&FuL3WDr+B#)fzu_ zzQWwta%Df(XnmvDJm_+fy9610t>R$3u=jL(ci+mK2d!yeq$8$hodZ|^`m8MzxCNyt z)~sfxy6ove5NzEX&cXQX=nYRbJtGRP1M=pZOy6rHNlm&9wf(=nnbB5_m1 z9nbHFyjRAQ@bgEUoS!>ICbEF<^z)p2|2lOw{awwWJZiGn$%-t-FfrYu_|S3Q^m{Lz zqm_Xq=?XjFLWq)JR#%AJDja;xSm>6{Hhjs=W|W)Q4Pd2#ftdf*?%jX?)B*qLey%PZ z_KmpWQBdt|?nt|#2*50NoloOS0GnMS`=-pl8s}qGvxMGSk#6fgu{?>7q@&f&F z!aUD!qLi~&J=q%Q4iYwjR^cpGFinTqk_psGJ;%*vZJW|Ks;QMv#5Zu-nhMg{47@kZ zs;OqGRyf`&r0p5~0Hn}e5^xHz2f<`Hec6k(B@{=hDGw(T(9^hPix?1)%(n5>(c5;v zI=7yhDoxQ^?96n4F5AZTia18I8|7ZaYKFe;O5+DRc?AHrnih$|pZYCc)uM1trvVi3 zP=KBsbUHwrUqA)7C+zNeyZQa@AysM4O3+KhRz!IJAZ-fz!r_1VhLU`;_bL?QYB`;Q znH&ZB;tG4h&@e26bFS;tdU|21yq8{#n$B;V z8%;W0sOxo|z1-kc;7+*r&c=QD7XvD+CXJKrrK&_h3sC{~8&TDZM;^~jl~+gIRd(kf zZ-k%W6uN8bT&S|%w5O)L`I5J?bnp_e#5sH=*wBB3-0wEb@c&fKUX;`y%g0o~u7MI+ zE1R6?vPQ-dKm5|$Ii;O!e!4-m$^JOa7_cHN6gqy8enlFskK>xv*{AG;wH{{stObi( zIn^%2mLQeOnnWrj74>5PciM=OWV}T&XBfa-+ofQ7Rn%^H=uF5#gC<$x+1;MI<6{I6 zq)~)aNQ49d+=f*Sp1Ifu={Gq7sM#@r_XF-R$GSm0_(kG3()Fsn{Eqwi*f{!HH1;Ek znVOnI5oMhtRiLBF$}z+9&mBl`XhR`rT+Jw(gn)KM4lv0>D?2p9J2cu7%sx{-qTWQl z7jsez7X@)CiDhf>+JBum?VuZQA#KwvyC~#)t}D79a=a!hf62qq!x-VcLkl<>7qLu9 zS_YZCBPr@OKWS3#TX&gLp7XxPn+b>b_iDIdpW~_1rEbJ?BNdV{fNPchiWU=g4YF~H zSxfa7;U$s>YC75Z)`zI4W~IXS<95n9BSmx=nC|_z88V=x58E-UhsQyXymi$c$_#TN z#k@$^8#a2yE`Lh-cA^;6#!V&WNJ3;Av!~4(d_^26SH%KBC%?ZaVm!O|bGc3vgq@l? z`=a+>T2cDvD3Zx6Ad#xZ!Lc0*37mx-Q;P=-icewy4tju68!xGeJOxAa)OydF8k`^1 zam`+rRuVdFuj>4+9N-{@{H^}l)V)r5topbQ`6i8|WdB6_eES~p?3&|tK*PYGL1sjM zMVJ7sQVW-iQ;b(tpMpoTSe|cgCTdu*J}RpHsmeMPu(rOBrLU$J+Hws%_eWI&VYmd2TGf9irwLhmormD`oClwq@J_XaWIrP=x7RcP!Ug_iEIvd zkDA5XT9f5VdWIk;i|9orCC1bO^RUI68CB;@E9s>T z!sIgLrMZU*ae+=Ubq>dN3IIyxmBYU*QD$bbyQ`VOKG{}-chyPq+KR?(3`>9cV|hq2 zIqJ|_)0xzeY_Dfl{F zcDvR>_2qzlKblhp_^A(b7lRgi+JMO;M_>j>HV3qrdZG8v&g4)S5fsf_8z&}rv$J|gQ|KXzbhpN< zpM4B5cD?!9E_5;W$uAb=)16W`b~h7|a^{>CG9PMYdQ?=4@ObN{eqc!|)19OQb}@|Z zAD+!yhZr{ZU|5#OOQR>!1;s2vS-tQN|8eCO0fS0yH8pMu5gAU4BdPb6k`UoLM|%J; zgNWZd{+Sj69K-}ca-;wz81n=E)(v)Aa^;zIsftg{H}*Fc^j~rn75TYTZwYm#xp$eU zgL(dHQtux(uS@^6a0|%Z+$mwH`PE}1oHTzf&ejO_#ig$KY-i&S6{qXS7d@w=__B#^ zww$I=CP)59Xr}ID!%EG^Pa0$0vl)iJCwJWS%;uN(oT1hngy?k+$3~2K4G?jN9p35W zV9vDqmAH=;+q^u&yyfVzi2^|Ea_dy1$ry1*8NknT2k#r{-{7peu{|c3$xCIOuvogp zdzHd|j@5ENMuo6G>CQ!)c{CcJv8tDk__%W71ASL0t3ev!5q0GLc2+^nt#?QJY&Oqm z-hn0fx|;1*&683P;y2aXHo8jQ>pCcR@h`y^pI?5+hAl0^jHDn^22lsto%BPx?C^UJ zWw%!ciDWYCNh!Z0{eg_I`p9b{BTr9y)0tg`UtNd#(>VKzQt64eMwwTc6p2n#9zIdN zZQh>Ku{&qhFDTrT(;td)4CjIM1U+vELsdu?_0tfXpuviZt)I_z+{Rhj3ZnMsKw5eW zhRA$IZezuA!Z)bXD@H1O9r3>xx4YY%g?qv7KDX!Zwze>fNvd|0Dcn^gNHnJJxGeKs zaC9}F)imKNM7*ivj0|S&!mmo=l(}5K!IPl8BG(n%HMOnw9N_mhYEb9GMe})yOF;&- zsb0*Zh1dRa6FHn3=eYZ(YKJ38C(iGBKJpV$N>8TljjdW+Ie@kcOx?HHWU}{i(Jg!9-GsyIr)|F zAZI*Pi6>DS(i0_+lR<%e1OQitINY5`f-VK(5^l|+ zYTfmIv5i1tc`Nx@*eEt{ce&TQ;|}{(S2^l|6_nD*?dFL8tc&v&z5wtAC(AfkqP2EY z(pYcZFZ>I0j-aIf2OP>jSC;=LxsCr|-T#}5RR7wSk9ITsr;stZ@D^L1-&J-8*2<U;(S%w&btwL7f7bb)+MH<&&DNv`cNqx^AnB1(1L`%xR#NVbKb zhgC6=v?dWtypq`KN`x3=y%=uFaZVsmBW^^f%S>?McopBH3LIa_k+7cd+*$t&>Q#lo2eAljo*qnE~9yc7e~@VAKT`y}khDcUC^d zPobA?q2*gL1()`4vf0L+gnFr-w!0H^jWg3k$6pkhchR;+N7)vAg58o>E|3nrHKnBO z23n*X%Adg=)4}}(A7?cJ6@`_r$@E`dUvGmIX*1daAi^@$12=Q5QB7Yv=4T3;wpOo+ zu)Csp_NQLhvUJJ&0tsW?WL^r*L|&=FgmpuD5qhBP72*V(J=pYeDCEl zE9>{EiT=-Ix1V2D2zhHt$7!_w_&}i81zBF(t$^b}(<|CL4Gve2%_rE}wvqpLaVAR}Z`k*)HR;RY-sz&^1h(3ucF5o~`V%>*A8s1s>mC#Ro2?!5#JNL6$Lry^ zM1k9Pecx}5G_&n0ncpklx~e1q~~`c z#CZWmnvok4hs^A01}u3}WV{PZ7M9_Po9~)J!K*3_c(?qv%juE<)+8~?hqMi`reTNr za1O_oeU=xlOL6kLaG1MG$(t=sma{BAy2v84+oapp7yzPb-{ofR?9g_wvmhCzTrGxP zo8=mIwM&Us*pPag;g>Ux`Nq zd9_+DRyVI$UP)&?3NY-1*{fM9L_hC+|Nj)?1aWetk1|=YWLWq8w&|^JEQ0 z+q;iMc=G*72cdArXAdYw}C%HbevEbZUrkDXQ&4)aNgn*(cyF_ zMz`fG@a*RgJu27x!gYSu3wf-!gIYf32jdCyuG3-9xq zvuCb5#RaE@(uD38h|;9~{q^4esw(*dmyQK+FCmWjEn{OQ80$~^l8qik=|0Q05Xh|6 zR4FTnXoI{hP7g5|VNhP^Z8>brvOaXVi#udF%4+qmZ~EoS(*+DD$jDemGJ@N(Ub$)Su!dnQ^V#__g@` zVj|^!VmLWsJm-g0YT|XL&5E(vjw%xkm;0a>MwBa~x_lVH^8L}_gX?|}Z&ie}1YFp| z?K$PA@cquaSU#a}o>0?`^SfGvh8WHxj~eaTA$WC?WLtp0*}>Ti{A?SM%bDx)3JOE5 zWf_NEUA}tZHt{+HcLWJnG4@9ESog;6R^=zRm!RiVkdF~2O3(SR8cc5QXAQnq2Ge(> z2%XPlhpo86Dj`C}JxH1}27N?42KyxytE{f(AAbydujm)!`gYKD;33>uN*Gt@26Npg zXbtaWAX+Oz60w-JyqNG+@8?sezU!V*U|3%?h8Jx8{Nkp2iR-C+MXJlxO0r#kM@L`g z(#5>*fo`fU{~XEY0;#t73fYuS)$o!UI7Ik~1cUsaKRPNHM?AIF@YixE?-HE43tEm9 zhzRiXM6KO|Kap>-uDHHk*6rn0hd4bgv1RG!?Ve63pZ zI!ahx4m}x)KrY$Vzm?=M&@pE+#dgOb%fF>$760h9)bJ6vn3YMywcDuvxP1gl~JbG#gsR`zavW=Q4ekE=bTsT+|c|_o7_#7ViO(7V9IWmLJRxHZ_9ghfveyn7hgX4^W8v^7Wa*@*2Oj?7g+Pv@Jjp?hUdMhQ4*nRV6 znQ}IVSLw~N(`{ukJ*Rfz&(GjGtXQMH)@5eb8>}ehMvL%3#St~wugkM?&f&M;PejBC z{6?0K!^goZwW=u)IY3VdaadY@(YXm+PhZr*|G0 zbp^%wqFgt`b@4x5l(cZoUc0P!_eQzReAE`?Lt1XLNl&Mm&#Kc)xPf8~QfT(OYW4hR=51D(aVJ?bz#nKJBY(KZh(vHG^*^^7^u!892hR=7DTC!qTZ&8Rn` zXC(v9aNsI8lE8V?6Y^_>PWVln-8rx=%M*M~@38Tvb z^B=5WOlbOocR>00z>zF1R;*X?-N9Ytr)F^>93blTzbO4f0k$mU-kQz@*;h+%1YqIX z-;@JZgKZ*=`ixRW^%sTRaIm~?1^bt5;PsnXVij6<>2^IycwMBGdqIYl^M|i$hJ>0m z7eDjpdLRX~CWJG2lzcTdXLq7fBH1Z$scXa>D4q&u5xEmpe=tJ0qV6>tgKrxK*WA;MnlANTpAQ02KA}e z_Bk=nqP1IHvaFRF>e$)wb?087kuK|U7rK4~ z58)mLo?-EVjPQvZ^x*Kb@@4PFLb9-bf<;*+?#;mLbpTHMC(P`>xzYUp$9VVu?@ENf zUFiFlPWv^+=x`wn913)_;1*VyNu&LV-TQ0b$AZ59&qJbDH*RTvw%w^mC=6bXU$$=_ z?w~_rTW_eqUjpaXH&A66qiGu6`j7{<%pQPkd zgsc&J`m4&ojn%W21ofbR^w-#OJ$CBCMr}kTFh@x(>fV#~g)^6?b6Cyg{R=BEhxS0oj8&g6eWNPU1Mf=WcB8ZEy4H|fS_n1ZbYIR z%tT%p7E%rtyDA;*7L>ixF?@!;g6oafP6!!0yW!I>2`@@gQ!HVpeUBl;W6 zhmYL=>Dg2!&N$yA=_-E2Gw52O zNHkRb9L14pltSEaN)pN@VvNo!%+E*L&|<~;i5)!o!O>fl*PhoHbT-ag zbrS*hS!@nQ|go1etAi-ytJZO1Ex3uri ziAK+Mu<(p1jOu}UDg!>p&!_A1?>~i32hRQ4)nWAI zApyDB#ZqETYExk8#4+xNK83chE<{9E0l%TizN%%c+JT48q4YKTQ_L>!8nlcTG^N{r zy*=aTC9~~cb9I_~o;O%l#R}ug3K)#BzaIGLH5c(gsB^wkHf>^o4lgVLq#JcUEaNJ> z^`7@6O`dul$)3fNzQZl##;rVcSqtWh^F%hSt2KNTLcZF97v=t%#4RLNc*#>|S~hOx z#|4|@Bvab-Bbu#>2y*hU%!}Sjno;O0!8_!Tr1pAMpAHgrMB&K^b?xUwN1NW5IWLRR z4}Ws*A3K=5mh=~^I<6u`cd zXwz%}v*k~;MxsRTK2Z+I!of1D|d#Bx@Mn3XQG*)f+Hq7`eY>`8a=^UD3KS|@`|k0D zO20Paf|R>xG5JEp<{R5awKF%rW=adUn&syk%cvfBBT-2f8D>8`Cx598RbQpbMdIM& zZ@_lxw?RI!!pexZc&;x8uTzz23r`a^rTcz869w|Ta44ABYBaaGb$cU0HtQ{TWmLM< zz0VHcX3McEecGcHRSXJiXUvF9c%OOo?S~DYQr8so^Qe$9)Wr?wS7*{}%AN#{CaOfm zJU->&7U^%N;rTb~+BbxR*=!q93K_e* zJ_u>Uc)h<_;T8F4qw_@u&yg9ZOKtdM0*_7gv%*s3Bf)e8VCqovjguZoxg-xtwLC!K z?mO~WoFuWf)b;H@RbB+~&AiSC=3~Wq5$Eu1TXDZlP(Fn+`bYNgE{>0Gf(_;62>$`N z`18g&9o+Vz^;ARI414NXv-(Z$@N+sX4|ySCUFK_a8!!W8@(oI_905TbFoD|scx#^F z-Z<>_hNY+HQ`w-KHi}G5bgC4gfDmv6)2tA>9nKHOj=Fs>Js#zUSu7mt$T})HuzKX+ z1-&@=BfR>VeiX|g%$BF2HdR!rhe>%(_$j=F+bk+hRh*0$RKFlm*!FqGX7YWv#U`^1 z>okr8w^_!W#Ar9&g)yX0-uY*rCVal=mspXv4=r|e^^B!b8dgU;<8dCGHPfCGjQB92Dgh08>9vp zBK^Tnd3GoxV{rGZs?cDxIT++DkUVBXD zkh4cZ5^m!aZF^!|B)9LX@=%!^3U1so#vI|d!g)d#;?!Xn+^nToY3v{L5Ta&Y7Mjd} zS&avHJ+yrw>v-fiyC>XwRjXDthdGanhu@!CTAQzf91}q{CoOp4siSBcHzgJ`o~*9%m2ICykE3!`{J zMPD8X^L$CAmb&i~F_xQbtID|t#S=$;pTz2^ql*T6Cg~GmXw6zNr5v-#b(x18_Fl^@ zl#@;jcv=Xs;&HGKA+GsWyahOYPVYCGb(pVH?%FtBcF3e{=in9(w_$^0#K9DCD|~e@ zUG(?E@YcK96h+p!s^Lg5ylygraqG`C02LQiT$S%sEU4VG>GPpwYqd`h78?Jm(B|$S z$3Jfx^n=wj{axN``-k;rXh%In99OJ;FX%$RA{_bX(S4jiHb!4hyA;C`Z@U}RTM=n* z3rgpOWGaNPQNj=w7%0a9FvQ(7z&{jR|CE!ly0K&=Q0n=?Z%17DyjI?OX}=A3?R~EJ zWPS|UeYQ6r$^Q^Q{s-+0>AuMYIFSE-5}4%mI7YawWv80J$an)66^sbnLDtvLl`FW+ z+q|fN9)1tEH8olyz|kF|3cCAnhLPMh`us62g`|%AoBvEYUR&DU53NxpXT#LUPsJwE%BzEwi_pBZZ8IgN0@(b3Wq56plV#+Gk z!r~oRNYm}8zqh!pq-~#ssgBvZ(K+R^S4$f)niz7a|+TcRzeT_2WPgYrS%Rwu$Ao*47< zAvzTeth>?{1!rk(JGwDv{JNVGl4-t*8rR|Jp@fH}-G%r^&a=2{kku5*nI#{~VK`<* z>lMAw#0g_O;5iAf(r+y8*vi$UI&rh~c|Jf&*9z~)Ic=6I6>fJu0&cimWUBPnp>&Bj z@ylH%pBqW_1T&`s>1wbfP*QrX6R`6da=>N&9x5`)zNutJXeOWMNwL^QclQd8KS*Mv z;2`L9N*er4p{_>$7UFK<-93 z@ZJFq)etM;_&Fqh0H2i&Iq>+lWwp-7?I2u?%~RU_VM?5FAoZ$Yc!MFnsiM?yX9~Uc98Y+$|LOf)CQC7y6{Cd-@?mO&t0cSjL5OfAYx{=nNvw4nv z@rYJTy-i!%$ud*Kl$PrGyrr&q$11o#9;#kPzmk2p(|I=UTZ654KyMUKTxqpg`IBms6YYb55y=KnQ#4VO+N`Z2ciico%BD zeiO!34tO8ouGSfR>Z5P~jVRI}^%Ncn^>eP&!I@GiVgU;dIXvr)rToOT?G+!|!}v6mRyn!Ph=!zwaaE zUDE71J{OywZ};QaV{cUs0*w%?4QF~J5zSguRIBs0^}stnozO&sSwUweE%c_m{t3+N z3!qSli+-CYp3K&wdSF_QM;B#I?+;RI;30}_|FD6q>c*>k;_n`o!(y9pJg*&Zg0k=q zXf}^2!`DC^aA(r%I4;!iXdKeGTba?~1<-C)o~PH~LwAK8_A5C8K4>l9OjQN-sM~q7kGfv80aW6}U;_pZt8M#RUI)7gKQKx#?p?d^=}2o@ItP+N#e9Shl#|`^ zR!QKhDS*w=L~!_a^+D=HCDn8_j~;nvfMn^^!lcnDA9|!{k{m6w*enkQRHe2k*=v5b zCx!qb--5n0^I0Xrq3U^AqWZBW#^Rhp%OqES@*1P{pQ#VdT|I zxB3Q)31?50Iw|JAw)xvgYU$#*c$P|bwFJ<#vKVMky-NMu^eFDvY6o^H1fKOlA+)NL z-i-gL*7j8|rPpXE7dr(plrqEb+TO&)7>l&^_R-I~3kR1Sh=vD~oGLmo`!(twkLTIT z)#$#9L$mnRbi1xdc1HmYY@xuZ4Bdc*M&a;)cmjj@*n&@2X-QJkbl=LT#=A^#vkD)D zOx;u~bBB?Ww_s(F2JD5XEL?|F>hiOUPvb|+IsHsu`KZI#6$RI86FQA)o2XEG|b|dA2kc>m=ysZG9^K0bM7UxH;#gT;9=b`9X+B^ge6r+J`t>9iLr>6qlJzw zR?v^`65lSUI@R#~`THo?4tTKTdx&H~A?wMVDo59Zos%<8tFr-Xu6!dd=zY3m1rw*8 z^r1mw(+eV=T=5Id`h+c16i%2l&k>WhiK}UKY@<9wMv8U0^%PYb<&-HAiMQnR{{O1& ztb*En`*mI13lxeMXpmA|i$f{e777%1FIEWd!CPF5yA*eVOK_(Icc(}RZUKU<{QG?~ z`(W?2=UaPb=O9P#WRjUA&+mDk`@XK@NA$x&PG(pXLaX$ttu+5`gCP_$hgsJAVX%)~ z!)6x<03Xo_CzIYXO`eBLsA1z7>`?`&RofZx1Y&c z53x})cKNwxShF5#Rr~$Jlm0R6bE(nW93C>ZyUSQJmb1r1SFh8{6N0|F-~?(O%Y|o= zooXp>Uej6lAvzzLn=A^h*Yzyd@41-FdQXnG4jO#Vlpk2ig3>&urJszsuOV&GtjV!& zf9P%-Upjo-S)BD%>AD-!&(+5-6xr4#R7ioZuR6TBGBzsTes`Z{f1B9l<uW9X$Y;etrHSpC zE##C}CY5iDdfdWG#fE0%SudSt7&E9m4tpRW4DFn8#bn6~Dfelf&~abCgS(nm>&5JC zyW+OfKG%}qU4-roO&68?XUEPdX+=&+4W`X3ooMmKCdzKAirfmh1-v7(pQvxuG;Ze1Vr&ffX~%nA~% z+7F{OnuLwNeuYU3v3}PBdql5nBA0E%?_)|f2>)0~5xrEAQ+!7PY@dF@78f~*1?&iG z38LG7y{`_*2##}(aDW?&vgm@xl)44f@EqaQzy&^ljhxOWBmE32)4|t23I-;+cojeX zl3I`w2gT1I%REzWzDsQGL@@v79_LHE9(Hyys(_pKdL#AqK13I%SWk?Cgbt+EzuKEmVt#W-Jz<{6N5S`oe}OHmkYLJU>5qq| z(eEoeUn0RZheU%_0v(Stzr&m98c3SN8%455jfCZe)x>w696UbY331?n@@zR?g&#b= zc(+ZyYdqiVMP-=-b%%a`?4L+o>#pVk1!o>wh2>onQ?HrbX^MQQ(hUeLRmWy<$Eni<^xSA3)|l$5Iud>u;W3PFYh+CU ztFRST*R3CrPEdohx8B)OowZ{=j7S_=DbYv8pX{o4R$Ig!(*(4{N( z#&&IYc!jn$+%*#N=&oH`OA0rtApe$6cO!Y0J7ItJZQ;8U8S=;)cNl6iBaU{mF$*9q zUn@&imG?Scuy{bUbUoDA5j>m)WC`ISVPPY(f+Vb?+MoY+~sGHBXGVCXzVCl;u!Sg_;G4#FR;>xuLE(etPTND-F`2l z=&Pr|j;z;~IF}M@zIonu8;_6Vm~?+jFGoaJKjvzwR^$TPBU>5`rB)svNU$of>^=?r z;eE`0Y{gXmsyT&XseSy|KCi|>IapRNbQZ;Ux2~V_=SIWBO_}6MqpG{7jH=v~!_~IN z!5J-0ef?k}|Ij<$<>Fz*{}L`98b3$4v33@=lJ|H&>-STE)3YvZf`zMOMRAuOOn~eo z(W}&RAdO-EMebMz92Gn7i#StRCcys)pc998%|iX|Ar$eA(nc5mRwT`q%2!$DnU|#D zPHTufK?<`!q)08~&SvCgWmhYQ$3 zVa{Z7UtGE-B}EA5GlER!vZ@{%9>0l01@bN4DtnY$i_9R^&vzo6LbhCn`dKjuC(8{; zp1^!MKPFrt3q-!Yl*J6EW6~7i~h-#?r4ew1Mb6_!QGvurj+mQ z{Q=qX1zolYtXt0!ig`(Xg%$|`;@{pOo{M>TlO1XMy{T+|z`7b9Znn&|-gZ%J+YnJ~ zgJWb!Adh?aY8wp|2KG1OzEOBCH0E??gr)K>>qM?R#^3B3MWoC7 zj@$-5Dg*Bc`r$QNG0~t2nq6QxKK?`Gk<7nKkFeaV90H_BLqCtH2d}bqWpojbmVu;x zL8`#uDSzIFn9@jo2Ir8(IHaQxpVkViUZuRq@zAXE=UWHG>-U(G;UlU*f&6Is@19v2 z4(dzVQUdx8Vq;Z0aA5w)q_S$$0Y`a-t=tsWv6=G9qsh@Es916TTPkSOJJ#ics?iDI zzt}G>c|LB%vyHs&dB@2l{qO=B!H~l>bq)KV9jy8 zohftmd=1GUco62)T+tsO%k$9)IXKAiLXW#gZ?FbE)o3s0jr5{f<(9PS2=LN|rMpI7 zr`5wRady`rF^{K}Re4u*kbOU&--v5G@$^qRZS{(o{mC7U#LPPty*=(xa@oM^bNN#X zpPL?Op`X57NBoq6K#ckj^VdigR|}3Z;Q->}h$b2NuqaHK--X#pFY+MS9tlzt52${jJ34t3|K`2?KUT~B`vSoC zls&gn>mC{%rcaW1;uBw6i`oa*;1TK| zkL%(io@G80vMljpOP|?b5P{OX_nx#*q2)x4LjQ{yfqA>9Yy)W4%_*Hv?ZfsMLy@s! zSD#mxfA6bG_pcxIDR1PKLF2!kNr~0SS2@x6oLr?Bi(cnuJu`aWWoO%9d}#Mt$N-ub zJ&oiIl<{!F_PnBB0Yo%;d}2=7_4zl*^aK6!O1-KS1veI!u*~)jsVx-$&Yu#aJEOBiQmV)LWS$`;t+oIq=cH&qaTN2oOqo8zD@Pj^^D&Y&5!wx`9q z&_zwrJKS(*@JWQN`2)17o6Fvl2>MV(qL_Kfb~?)kK5&f$sl+atlF|$5ssE|~Io8mU zAyqCU#4oUF?oWO-8-=v=%wItL7N=A_Nnl1|)E&Bw80k*aGwxhh2e62e^XzUqIzRN( zHS6x#5T@!E=$vW#;Y=hmpk79EPR>3$ysEmZ-LqVD$RBX^g9>h;SQ}~?ZD!cTl-v45 zs@!=QpzAtpYQS_TzoSoSR)Wk7=Iupkom(r5pk>q)QL5NJ`8p(@X!t>9dg4=8(PwD4 zzz@FwyiZd<6uOkaz5x-OLU=~72ef7Ws}HGg=BvYGKM3F)X^~M>9+(?TJO%3tX3^f9 zvx<2)2{JFI2W7+mMA5FjAFy)V*F1xqFFEm7;T{O{SqzYOLMru{>a(EM4 zBlRx4LVD#K@?kJvGgP_JG1;^%0ASy$<^=`ek!;Z2RFS)Pmf~U5k>N^OxgB&5+``6c&Xhgm|w zceE&E;5cuK8JW+OL?%wzJT93i8GBlRn^8^2P|J<9JDQ)F1xbD{-h<44(^0FmZ7A^{ zmdT#pX;_ujpJj&}gcw80(-hZ$og~T-VNI`0sj@5DRhw=E!|byE`DA4uQ_*qX z79ldr;(e8e)U2!MH=(;08HL;W4tG)r%tY#LOPRWhAMX7_T|*8oezQXm!uK*RZM`bS zU%MmlkPGXw4vW5F81yr^=BK%U{m1&eyn+~Wkl_6uU)$}T%QEjdWrph|*SI_v-fkW- zpJN{efydd^Da8+?u%A-<4@RAylC2nm_XC#mEhn1G;0^yQTOqC&aIWkK+p)y}c_6gA zcj@eO)4Hd^Q|o%^Q;8BQ-YCuVEgs@;ms#KAm9TOF62;Lrpdd4#tax`u@K5H-30LAD zu`Ma>e{?$aKMt`!`gz0ANM;g`QSMr;MZ)5K;(`K>FdML2Jq0j}qZ)81=<=G%FO~IR zy3d)hlR`g}s_B_>tY?oeUWZJEI7XcHOBxtOJg;u8#BKq-`^*D4@rdUSx`_HiR*ULZ zwm|;o%bGAei*gK~ujg_0kFVrVqW5w0;}^`M;|JeeMaId$)E{e925yO_kgO^?Ubi`*nM(={6P%VLY{wvNZ6<6kI_va6nu5J;tlJzO{H z(Y?OH{6uKyXSS9>Q8u){Eh(<;OI|K2fZI*o+}K$MEw+iWHT=qSE?p-DG3b6hX63s6 zu1l_5m^VrEyM11?wArj_&(WTGIe6x#?Iv0tsPqB=UF*F3B0OVKw6fnK6~fM@0jt0A zFgEDN4W`h$-Z^gCQCbeK>=psv`=GSU60TMcfR6`5&1l4PcS2sSJ<16jGX~l?nJ}_O z!de3syE%V)6DYJdO(q8G)~{Tel?XMj@`a{JNi?h6am2iBJ9ia@!pLYyh++UV@Y~(R z?^_IFSaE_VL=>$iz+)0A9y+Yr&)mDs%_%>c@bwyg(vMmlOYf4qT@X^>ZE>p(r5MCVn&vS< z;SqHY0)qfWTQp7s0jNk8NWS-`I+qOe1EmfRR*qw{Fb&&7Eyp9yPm<13dgrsn;Zu=> z6=n;ap#^M`g*&@#B(a5#ELkTr>Gtgrd;)R89lagn&KxC4gg98LWh(g0jw{qGv_Ye} zx;}dIyDaUZ3h<+BJhlwac?c$ZKELMVmj{=mxr_L0cJgq=!Vih-a-W^}?QbXeFo8Rq zUy=mkzfMr!H??cQCWPCfuAuMkM)@NQ=~1Ke{;rGlsWLlW#L`B5 z6D;U5#)_k3@^>zx!+go~_Z7JM&JQoe9@q{Zgy_PYBwo`c(q+qjDNk`adKsxv21p#D$Sg?(*9+_Is`4f#x;+a3$c3vGE`8;_GXchEcb57YKIk zy=g0!plVhtnq|vYtfmjCe0cJfuLhIIZyu`)-TmGu^%Vz;h6(K$wk$#Y^yjiH>e~X) z+Wc|t;L4jXf9$TQt99)41dRwqhgoX-a_^Ahxvd5F;)Z8B-#MlOe-HvXpAR`%S0wD=dh~`1MesANmGk4u& z@<}LyfW9qHfEqM?qNz9@b@vQynOD>YCFCYY#CU}gWbE&XxS6y^vAWJeQ(_E)8V#eR zo3x*L+YpownHmf{b{|TJzQUUo?$45lo(lO`WHT=5&F5B`8CE?2h)qfSCXA*eG&he` zH@CI?B7(TiDD6c+buq@^Dnv8U-P%R{`wlKPkHVQIZ{6Yv1YFMIRQj@D{5lSk4_y8V zany#PlK)e*@ax2*<2^MLVi;P^y<+H(I)^9-8zCVi^xTmS^*M%sz;M}^wfhH( z!jK1j{zXSUx^E}Rz}^Mxx=~-YrFEt8l;6eUCib0c%YnP}A3DsRh=`!odnIkX=lT%J`7C%K% z2qX<8AA+(?HOZflSLN)x5UW_dSh1ASrj3mj=(aWaS)Hnb8-44EM)iL4?2p^!e529kO{-lP z9R9kB7Beq6Fo&$(MpIk%eIm^rq>Pn$qhz_Fm zIX$RivCfCpySFq;#!SIv3!W~O2+CiaqZ`8R=IxuHr9iB zDsf0Qw@uack^d=jB?%&?{oVQP4A5p!jRvF>!jQk9I$#}=Iv`!34Iyu2q%Q|Q1KPjt zuSaQad$M5!3T~@gGlu)!qeeXb5*p_gi$Mz(?;yvj-CDmk$1*gyMAh6O%~v%q?+?09 zK>xa!9n|}pfMuzcSZ}05%5+vY&T_JtVlDIB@ZpSx7{~TmwIw$m)knV!!%BfyAax5a z`-S$E(d|%$M<$WA0fMgZ&(wg-dyChX+77GYqBKhoNTsXk5WOB!YCJS%`-5rm-0+q` z+A{R3UA6M~@|f}$iQLhLFZZ@gGFzuV{IG3Sw~tm@ZJwsQu}e#1xZN16vc7&nESxHH zb)MEEQv1+x95Fik3EGK}>_tdjFd&6lC>vM=kun#`OedIYM8w2OfWKKKs((HIWga3K zOUMk-_kS`(3V*>wKaqz&0KmWJoWJcp{=d`(B*_7JuJhkrj{MUN}_Tp zyHd5~6o^)xEl-j!saH3Yeyuyh8>KdaBF2ZXrunKmB3-wUW93))Q;9YU(yIhcHYj{=z{Pf&wruNkhog{2--8brJ7Y>I|?>gG02bI#! z+$TKC(LxzECNCUX%o$?&rnsnb^+H=^*P`6=BJ{Ensg{71eev# z(W-jb2djM7l*8-k_FN9_v*CLHM#6Ik@KMTnn~k^lc-R^->EbdSZ-(yIdGRyC*uknN zxRG6jgs(OE`?ap?W%`L-HfALa0^9M8r?e?;R>H>S*4F39*Lt8$*`+Bl zlqV+=@4F^rvVUH38su7-k@G+5{5X;9VpfzO)-K#lKI`+Fn8;kxU$~^&HKkNHDYLB(lKOY=D zn|$#Vv<|o9T#pWWxQCZ$32{Qfrmw;s^bzNRsApEFoDP{kt;m>qTTURJDrq;BhY|)4nMxaur>J;6URlQf`7(4dg$$WHuNn#+{{)b`2DO4gP zWqipd` z>Y`Dhf5t2gs_6^$++yx$&vk_zrp=AHZ%MEadvafq3;cv80Ktq`&%2kCqJK)X;gz|0 z&-UVAq}7-GS*uzbhP*KLz`?PLxX_?+(WQLa$c|&Y1UZTdjD)}T7E0c-h^HcSu%6Oo ze9u2=@wgoeWkx?I3&YBVYS7wT6xkG5=HU=Efg)9J$J4QcA0pD8v+M5W_q?=~a}0ed zn9TH1B{q%3i$>1+;-P49aE>FfiLmA@0IjiubZImkd83OAT}cDXzkyt!n=rMnIohpL zhxuOLc2dHri^Td{@PU*GO@AWp0WneHER@?r`A+moC3D8V-ycs=A3`cW7ZQ#IaAKI@ z5CNJrJd(Vk;BaX(qA>+ggXqVweiaE4@&r*1C~zM77Qg8Ej8c!58D=Iq=z5L`U>N?zc6iB4tlQX3+yOON{=qkns(w5F7m7t9b-SK63_TzwLh%JT@^yH+JSPi~Ua*Ij#65~zC4f)Em0Nb6Ma@RZV?HzU3?iLCLV zP$1~J(q5b0Kz;b|9i^IXlfsxg%OITC-lFir8PAYu zV8|DA3 zTLQQ{fEP=tupeB^xw9Oi7vL)5-(N%7^{pzEO9leZ$42d%Y^j<#cTczLXp6@Y1Q_jA z(2O?oEalO+$qfdz2URoC3?rUMnL&MtNJUq0%y+M&xQc^NoC;!_dgG)c=w5|>8 zHGQ0;nN^L-%Wxsw5+J_EMl$7NVujP54cJE>+fpFMm_PE8*WVwSDL~d)Mm+QYDvbaC z<4mRXO(}jGs14_ya2k`Oyk0%4h_u3KLrQS$`OnQ?$_H{w@B#$*g~FO)*w}loC_=)U zY}}DYX~#X6YFWF@k|NxyUlR0JjDR$c|22)&kuSU_tIJvpPLkO4O$93J1p@)fbHu|pNKydZRvQxgfk!hB#fZ=Y6l5`-MX+p59NAG^_Xu0xJ5z! zPVnWX51LcXm-X4lSi7!dayqVXMbu$GQ=f$#sF9zly3w%P%mgDOvFsb%wzAknkzX8y zB(hTf)U>Er)%5~>)}s7vsIIik1qgRsLJp5Trc~!o){EWMq0Zrgh}hZ-jJDe` zCYLgLvm_H|$HID)5Z>g_8z$}M3e*?yQMVdCk+O)>eOw(01JeUr_mN5D4ULaY1*Mg9 zYC&Q(8E|VnDnbk6X4S=C-zrvI->!cm8E$Onp4ZefIZ`_u#TNKgpzxke0M$ocr_`}x z*Gp`;xze^NIC`sj2c};$A+&q%=6Im71DiBzgt?Y9B~d!W_C6fj%rUM!dTT};rgH3d&!t=v*eS8rCJ z_LeaL^1{gcgMc4SmiRj4T~9yAV1$kCv9)4j!5zM&Q}S;oz=ymfqgSN zd!2_|eK9(K`4l#EyuiXz9Z5iU;7kU6V7l6)ou~MO2dgeDjuZvhlJ+7wTVg|GEMMyE zt}A8#Ajn7TU53UVM~dxrM7B-7XQTQi#7B*GGqMJ5BVKKlrMG5Um5&#i)%73;xLrkG zUr$fPCZxg_F;SL_P$7#u_6s zSk!-Ww@pnP*dY%%PjvLW9Xa-Fdu16Xe3yQP_NOl~0=Xw%kv3M4`RO4F4AcB2*r<&> ze|S%l69nY%$O!3+fp09w;qtGhLC)34kLa$KzvYU^{!~}s!}7N zd$uHPz;srhQ5Vy}-j8R@H8ip=9}{skvwmEazUSQl3QjIAz34@c+Dco@*4| z=MM4Om@$3{F109n^@Sc%gFRrdX3dXy85YX?aUDzU#x*>?U7Kp!UwWZLyO|XYn9*R? zVz__7aMuT~hV@wqNvs6?67FlFX(OZFDe13CiT77RIL8VVpjha=F}1xBR9OD6LlP9AH#e*`<k1SBfOu3%GoL*d~QZfT|47hWby8-DXiZj)N6D(5P6B=zc$24pOJl>|73IguQP-HcrX1wyW9!ofzHT* W<&6f;O6e2iSjUN`{}@CV9E; z-raw6@>o_c5BV3LT@D$Pv<-Pr@_K^Y^Sx8G#>vSS>c>NOFBWKhKe3yWD{W(pw0kUi&WAgL zC}=wd09*u|Yu^t596A&xzh}3`kSDwKoj9>y0RVXM;$rgdt^NBy{|&o%=x_OZv~KPD z8ys>T0JwYiMCb0Uy&;gDgMdK@4^fa7LH@)&Y7y@Es6E{Yc!54UpuHPDXaaFhVmmhf zlYMskCwv}wttoWI-G+pH%K=|OmQ2-14hs&!B?2_vDTNk7C|^1{RM4Jkrm^TT`S zp@>?{nlX2Nh`ZHs@DfAus)&h85mr#iyxXNM%vww1BP3J-H$Tij_Ux-fbnUbI1|oB3 zrLx!uxNdnwKi~7rgJO$)S>SDpG-`SoM+WZJZaT+> zMae+?^Psxg$$YLB^d$bFrZ!iodRJ1(6GtZ_&~#EsKr?^l;m7>x*z54`gEo9XvckZGb$#I% zY$v6$-q26evg~L9vu`%6ZGj?eJP>kF2xifsCe4-;sk`_&GuR^g5lFY>r+9t3+2XV{ zb7bxzUnc($l4!ZLy&N-tdg!Y{(bk1tszLi8XDaE8b_$CiFvy$|bDoSlwT26Rhi}6Q zb(1AE^h`gK9syfv?2G{ z)$2=xGqNJR3Rf#`ba%(ebJ_W^KA*qx*A6F&RA1Yt=sx7b=RB2E`l$cbxf2sCwk3I! z4blMKQ98TIUf`DN6|c=pgjE>>Z8dPgSZR1w$uQv-*rxH7lGBe%@E|@-y*o_T(GXE&!6c_fo2J{z5_&CA|@ z(xT$!(z$Wn1tzTQ5zs>i(ErgmYV}|#Sz1*nfp?k!s>{EI>gcRmjKALXa9I~aO@SXM z(vf&&vsUI^7dUBll__wD-{`9F>^f@fGO}2+ul3lTM$wN-lTTkK)Uz}tW?f^FT)yZ) zHOOIpq(1lJ5pctYmZa;j3CM>W>%4Yq2DI6--?U4CXr({j=bAYmnf|RjhTLNeyoXK- zE^*0fz9+TDaRqPXD?0^3qCtJ1y*Uhmr%sq8mvf$)cD_YDI6^esLtT3opqfHIY6VL>fjd0Vqa8fam zur@#H1H19%qS9DVlV*ZoG})_bxVM2S(lqU(TPj0&zBGb3yOib*QKYSYq~7cL z(e>!y8l-aUx$U;^qH5}5owR48I*#ZdP?L$?ekQ8oT{hfW9&g&;c6(q*MbNi@_#c>0cxq=r zHNDo|1AKn3kw91nbZZWhNF7n0O~zdRny80jTsAM!yJbU-_!I6_*yMogc3UWF7{7~= z&8#OuLA)IuI4pqbN_jI1P=~s zTP3Od4|l`B2hYIslJ8Rt3nbfW%-B;ri(yTQ#9+R6Vej`%w7ve<%wGJ-oz>;lgdw=g z&KuJYC)W&%5u1H=aEWgE4BF$ekH#Atz@iH4^bH9#U*2-F*ahZesj%mTd`CY34&%}5%;jN z;}aK}<|{mCJ-k)V8@0jazwu6fVQCLuY4A&C?z3ubE8MQ)n~>R&TM^yoccEP@Hd1n| zFbMA;TJy(2ux+d@pwkIEF5TPWOk%&A8( zwmm>Ob9$SeZxAZPjAbv!pvv+ioZsrY;|@QmbFS;H-;A)3JJna$KU-IPVwU#zLPTxE zP+rr571^$f4(Dr3h|}PwSyq*NJ=djFcpE_SbWiTG!z}vk^oQLu|1+Wve#f|Tab#%q z^a)HSt?@S%${dTteb`DbQl3>>m>Z}MWjD4SA#P%@O5Vfa!7H5yu|cy+GFaKDdsxt{ zd$&rL@THpas^=^5pu(sW_SeMdbg||O?rqx(2=9k;ksWJe_zZTk?=}P75t~GAGfb>y zWKC_jm#0Bs6gHwcW1ISmff!Rx9TNeuaXmNNm>8eYvDot1Q5kF8FzLdm6Az!lPM%4a zftGwE?6h@^cl$x!Gos^)ZSy-h$KWh;Vl$&WXF+5N2W_~K0G=>%~fUuXDe4&=mndgtq^32Nv!E;fpn8JPk~G0+#kKmrDSAp zj7ym_2Vyp?%Hgk|^&RK*9rPukMdxB5wnZsaX^mr*#HJt&c#9IR_B>Xy|o0a10F&%Ew4_9=;R=t0)Po-kKDq}Ut zYUy)mc%HZMg=)pHnxua=|>W=-FpgxyHC|W5iO(! zl21_DD*c=79z2=QI71hED>UZLa?mNAtF;YW2%IgB zvPu<~aMQXqAk^~6bM`zb|Hfxe7)4EM zS!zz~Sxu~86Mj08rnVG8v9~!WqV|OC~G3kH}wgddQ@)~ zCuMZv?VZfNr{5iCg4vIg)nkC_{PYH^_!7~cb_<4g828t?!`5uRzQB?-jKe@09uYmN za%*j#H`LISx(zi``r+)-{cUW!fuTHbDLAUUfWo>kbRVeB5nd};PTb;CGgbvZ-N$!l z#=vMjTwVklen823bOFuU8NL3yEZ2U;&#kvJ@OjD$vpU$K8NSNGU*Jd$b}`l_w6AT8 zh4%&-&FsFO<>=Wb6BaF0pfhxAMa6t*uPZ7Jfhl{v5P-lNx6cK*Z|QP)jruKOTMw8i z{8x@H-2p9N$m53YwX5T^sUBM&QkCa}j5u?|W%`6@?@sMF9u#Y}?TJFBH*wJ0?uXXs zoy~ch03m_yQ;BVF_@^g(!R}^(kM-FvYabG$yr=ZaSx!vyO@*3+ z8Dc7fxd8=BM02I;A9GEtVs}c)tP)hDTLH1SlbPu=a^l&SPYbeb!BO7%hwu4jxqC>8 zg278uWsEr zkyLi)i|A4Bwul~t%9==N`--7n`xD$!RYMe(@iDx5kfQm~_kroOlICPusfe=t{GXlg zq3y^wd|8`~`e0LjEu*>x)q7o>^z1d|z%pQ9T(O+sg?TP+pkIZHH5Bsy{DW?d(-yGC zK*Tv0wx072R=$EOAnYyqoP2LT4*+K}FaI(-GX?}la%Mdq2lCtf;Zt!RU$$J_1T|eW z5g0VkxGa0q(y<=X{jp)r!btxkcj4?6e@zr(YMSM?j#rGGAE=?>->(LM(e28o7d})f z_ZF%5^oj(f6|)Y%ztkZLX}MzEbjjdXLZUiD{txyaObV^LZ=du7RPkX;Q{mIhHQeDZabVr&;3xC~aBg1w;*-n8I4AIlkw%G@wks6m^=(_?= zABrdVY+Suh5S~}Hc!Y12_b*RhqC(@Qp_M7Cbn#g8LMqJzoa%!TTUd0>sXOzCbj#{Z0&y>X- zyfGVCwE@Ec`-7`SWq5UnGs#UyVm%#scHbEB%|vONfIH}$ODsmIUvL|Od8w&u%+JTa z-)#d4g~S#A{c-Q(@Bvg}QQ34Hp=GLv$?q13SS2Kov)e>_3a?Sl z3Jz|@8@fas`*7{3E$(`$NmXq>=Cek>xi}{7F!EuGSlzGy>5i@)_{MMs;sF7Zd5KV^ z{{gs>7`)mccCy{HjcW%RkKaNXU1%?x?uKI@>FwA7d!#D%VLS2jqnB3iw-kn}Q|;Ic zIknc;^5_dp)ynsS*R*rln39Of1ZQ4-Tgmi{5v#^zr(B;CYfe%=$ol|zaq-eF?bBsT zk7=$}q`%&m`sa7JEvoZyYQP-tk#Ws^jKzr}17dG?9CIPTLi+~W>2w7=Kb(_w?z`z( zj(9Db`o(7GcIRWr2&_YM0Ns4tISFV_CA~y(e{B6I%x{{lUl`Ivd>Gd(eh&p>N>bP0 zVW<$SA>b~zjwhkAZ!kp6{)Wit7wNq4f2F#7cJ}^vNUr~a7wdasw*uX0{&%_|kn7!)%o>%)Xw)|Hr?#+QqEnU_hgBH%J90UMNNwsc6l&+zeAP&2+(M#gh zE>8z=)xDBjZd3D(LwOt9} zcVf`O?7*WT*20_GkkL)9jK%0;E2^gRjK8w;PMM0&eD)>y`IUCxZS%_Vky6<)`Q25& zVC6xsLu`|+rYs)L)Xc5K6y8u^VuR8mx96O93fXtqM0UVPu70C* zkvMhXMt>B46IXs=XYsR2ZHr}SxQ19?ROrUSGjpJuR)jTs`cY*Hg}j~y_oN;I00Lty z+Qwppa$|jro=Jx>UrnW8 zXd$0)?C_b`&H)OtLvd|Y7bPxh9ZzGygfqK`l=zoSdmudn6OaJ2S3tB@Jmfez;CNa8 zz82Ymw}^`VH7354G>5c)-^k4fCEh)sxJ7)%=#AO{=TB_s5=2v-*iyU$BESt>KC~Ks z=;;8fEjp-+3m@p*NukScg9z(CLkqU=Mf0f5wy;@+7OA~}7yc6+rX;z<*9wpuXt<%e zlF3>~S<{s+kZX~*4Dpfl&UVNVTxzSyc<Y4f|r>l<2{!LKWxr>{DHs znXdf=%i<-e?xwxbY3Mjz6TJ3Z)~WHzK9XBu&V(#GNcG7ZT?kbtdMqx+Jug0nuSZ!i zRwq}NB|WeYVA^FCTGMhd!DgOmMfLX4p{gkIGDIY8luatRiq;=+NMtZ4QjwR!K@R*Z zMXvnA%g-|MoY5RL>IetMYW8>CzA6PC+_y1S6m<|%5JS^V#586*hASs``gET!6V;sOYw~sh3M-`4e}l+)}&!knMN$M`yEC>bE%KnpXN%X-c-~ zzQvoo6BCa)Vb@khKWWg*`7z0o!bryuTQmXz``oYk~Id9jI7Nv=$*}yNPI^-yW}@!Cp)D4 zO!!Ij3F~w*)*vgx+9m9;hm^r$dHecG$zF{*$-X+6rrrpLhK(+btewo@I~-=d2XOaZ zp9jvmN9=E+6q!u_7#R`A>dvlxK9dm@H+9uPD?eHE>Pavt5DK9+DcXGiGfMj3Z4L+{ z{dn>Oe_G?#N;c4$87sTSdZsj}NtiaAjSK$TBp1K(Bf;Fragyq1!IOVA z9oGrs@^@;g5)6+iS4#vM>?ng2c5n}Mu5xM}reUdp9p?x|Ye+xHyPef~{* z`d=^MyBC(Gr?JkCoPi&|i?3-y`gsGEY1Dc|)&}!m>Xr_%(QtZo9-(+`Pa8T|rE2kWzCnRv5t;kASQ}QE7 zAhJqr;=Q}nRE3@{cu^^J<_eR{71i=D3sjfRl#1O>DLc4ieTrAnsC>?-Z&V6S?rpD- zP}t*kAFWb}qYs-?2vot}C2pm@I!l#7b^`k!iEB#s7Rh7`4FNT9-Il`%W@p|mmKD#C zimly;HHK|+&n7fo1pw$V4`10lE|A$QXVkgoH|Co2NhJNQ+|UUVJqY{u%sTLvTjkiV zB~-`pL<-KWN7%LZNtbP%trS55@@m!lu*#u?N}{JiqTE8z40KO+g}y?vDx=538Y63U zOt>9R#=V69?lTleHI=-Y;Y*?5mg26R>?W#Dd7=ZOc0bm0FudwGERTlI)6Y9O^IR-lr-%Eeyufa+Fww z9Jk+%Dp#-Yto=(%W}oj=n2mwp+nbdN^`lemk7CpPGrt{Iwel7(b~2lK3XNQ)tfli3zV>UIF=| ztFiwAnqlkDg*$kCS+KpXLSE8;kAsu#Xa#>NAllJeMR%vy^3av^6JXpWm*n9pn#VUYj&cDxJdLQ@P_xUyW2!)O=x+;ic%jd09F-Ohe#nW@foo z%fTBhN1vW0$1cqrquVZJVr6Le2)s>(5!E@BCzJrb}Ed-f{A#Q2SE%N{1a)w%)DA%W4 zuobSj;nXork&_NB@bRr*qx?RdT1_c^L*PfC?bCKP4^i2jN@#(9RUu0BMKL(~m`lZp0>tQp7E=AU0&9631gvagh^0&)51NJsF8e__*!8N_s zqnMm#wZ*5&WM0XOzxodj>>; z^@b<$pHmfXu7q;(j}|0gPG;-FQf{A}1*yz318Np#T|!XBdS6ufjVX#%Dr;TZPTxiRv!1STr*++DG5P+Bt;sc1T1i#}C>NOrA+iqz+pSzhi9*sns`L+fml*vhTZ8 z^U{0Wn6IjHUV#!eoc{L4)ET)_YL93*pod-U>LpSWfmB0t#pT+2 zU7*LODiroOeNz^Q#5awm-o7=qQ76ySVkkeoiApN~d%mq`gmSe;CrurPqrwV`JZ_++ zP!rG$c!euhJ?^mAdqyzDS?;^82S?x#)K@~n zqt{K|&vqvUpD9-1+{ryq(YQP3vLLKrDFx^o1#?jIa~N3$@@5oo-b{0=VY}zH#LX-u zQ)_{5F7>l2oh!UpQji`nd3?!MQQ%YiD|SZeg^&ZU#OLqVuWn6&8#yX7a!5}9UfeL2dNo0)OSeR zZM3Ln`)dr9)Rnj=1Ws~i^HRQbOL*mnF|b17OuN_}1d=lT@g(Y2U|Iv>X@L}r<%Cly z4@}$E&MCe+FL$T0F?DkhR#;Sa{{k!6>y~5sz`_b6E`K`rgJ@`pvxAjCrN_#Sk z=v4zSCFd>5El`w*emCmAE4jR%ypQsk`G@on-#S=k@af>Y)8kH#Hvu&2R_Z;Cw?1l+SVaI8$KLtUg8`HAm0t|3};* z>~{Qd&^NyDEpn8*L*#JdYUG!e+=F#X4l^*+#>V59rDDY)e7;mKCA|*C$;;;7-Z|5} zrvil3e?9IBxTAA>R|Hv^Lw3GX|J(l`1JIKnR>*Y>UM1COK3=(UJ05s_lFsgMIEM0{ZX1>tS`%_}ZnwYbJMcG2HS21avZyUbtN z`R2u5s2$&hU!)1YE0|cD=?i>|F82z`4SYTmRkkVZew<~&V`f1Hb-@xt{Zn8RjSoT0 z^sAV?lW}7(`JE5X|9RKjW1+L9)_LDv=V>10x}Sy>$=+}M<6Inx7Hm>Jf<$bLZcT^W zKiM8ueLdXW?Q- z3h?sa%%l2Q`VXv(_-xAA=wyb68^KOx*7p%RSZ^2lf1iEi7u0Y|acMH7w_qQ9^V4we zQGVbFThmsDv|;ak0N37e0-E6RBkpQnF^ZHJp>}iEIN`ztWyNuo9UU8%b5?9cWuoJ; zdj^gUc|SEC`#5EMCQZ2W{4AVlQLv(wIXPjwk_ zD|SAroe;hc(=#fHY6lDkWvC$|jrS{Danc?gD9>$qCj}8H`~_@tX|eGq*t8=j%Nnbj znkQQx2#+g*_MO5 Date: Thu, 7 May 2020 00:03:11 -0700 Subject: [PATCH 010/228] feedback loop 1.1 --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 7094a73309..cddb450dcc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -41,7 +41,7 @@ Clicking on an alert's name in Microsoft Defender ATP will land you on its alert ![An alert page when you first land on it](images/alert-landing-view.png) -Note the detection status for your alert. Blocked, prevented or remediated would mean actions were already taken by Microsoft Defender ATP. +Note the detection status for your alert. Blocked, prevented or remediated means actions were already taken by Microsoft Defender ATP. Start by reviewing the *automated investigation details* in your alert's [details pane](#take-action-from-the-details-pane), to see which actions were already taken, as well as reading the alert's description for recommended actions. ![A snippet of the details pane with the alert description and automatic investigation sections highlighted](images/alert-air-and-alert-description.png) From 006798b25b7e2bda32dec29db6bc8117b198ef48 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Sun, 10 May 2020 13:18:57 -0700 Subject: [PATCH 011/228] some formatting changes --- .../microsoft-defender-atp/review-alerts.md | 15 ++++++++------- 1 file changed, 8 insertions(+), 7 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index cddb450dcc..b466653ed7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -28,7 +28,7 @@ ms.date: 5/1/2020 The new alert page in Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) provides full context to the alert, by combining attack signals and alerts related to the selected alert, to construct a detailed alert story. -Quickly triage, investigate and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. +Quickly triage, investigate, and take effective action on alerts that affect your organization. Understand why they were triggered, and their impact from one location. ## Getting started with an alert @@ -41,7 +41,7 @@ Clicking on an alert's name in Microsoft Defender ATP will land you on its alert ![An alert page when you first land on it](images/alert-landing-view.png) -Note the detection status for your alert. Blocked, prevented or remediated means actions were already taken by Microsoft Defender ATP. +Note the detection status for your alert. Blocked, prevented, or remediated means actions were already taken by Microsoft Defender ATP. Start by reviewing the *automated investigation details* in your alert's [details pane](#take-action-from-the-details-pane), to see which actions were already taken, as well as reading the alert's description for recommended actions. ![A snippet of the details pane with the alert description and automatic investigation sections highlighted](images/alert-air-and-alert-description.png) @@ -52,10 +52,10 @@ Other information available in the details pane when the alert opens includes MI Clicking on a device or a user card in the affected assets sections will switch to the details of the device or user in the details pane. -- **For devices** the details pane will display information about the device itself, like Domain, Operating System, and IP. Active alerts and the logged on users on that device are also available. You can take immediate action by isolating the device, restricting app execution or running an antivirus scan. Alternatively, you could collect an investigation package, initiate an automated investigation or go to the machine page to investigate from the device's point of view. +- **For devices** the details pane will display information about the device itself, like Domain, Operating System, and IP. Active alerts and the logged on users on that device are also available. You can take immediate action by isolating the device, restricting app execution, or running an antivirus scan. Alternatively, you could collect an investigation package, initiate an automated investigation, or go to the machine page to investigate from the device's point of view. - **For users** the details pane will display detailed user information, such as the user's SAM name and SID, as well as logon types performed by this user and any alerts and incidents related to it. You can click *Open user page* to continue the investigation from that user's point of view. -![A snippet of the details pane when a device is selected](images/alert-device-details.png) + ![A snippet of the details pane when a device is selected](images/alert-device-details.png) ## Investigate using the alert story @@ -77,14 +77,15 @@ Once you've selected an entity of interest, the details pane will change to disp Once you're done investigating, go back to the alert you started with, mark the alert's status as **Resolved** and classify it as either **False alert** or **True alert**. Classifying alerts helps tune this capability to provide more true alerts and less false alerts. If you classify it as a true alert, you can also select a determination, as shown in the image below. + ![A snippet of the details pane with a resolved alert and the determination drop-down expanded](images/alert-details-resolved-true.png) -If you are experiencing a false alert with a line-of-business application, create a supression rule to avoid this type of alert in the future +If you are experiencing a false alert with a line-of-business application, create a suppression rule to avoid this type of alert in the future. ![actions and classification in the details pane with the suppression rule highlighted](images/alert-false-suppression-rule.png) ->[!TIP] ->If you're experiencing any issues not described above, use the 🙂 button to provide feedback or open a support ticket. +> [!TIP] +> If you're experiencing any issues not described above, use the 🙂 button to provide feedback or open a support ticket. ## Transitioning to the new alert page From 622be6d6f36018fbc8b307b1bb28af0ec78635d4 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Tue, 12 May 2020 08:18:03 +0500 Subject: [PATCH 012/228] Update hello-cert-trust-validate-pki.md --- .../hello-for-business/hello-cert-trust-validate-pki.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md index 067d2d3504..3fc4c88711 100644 --- a/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md +++ b/windows/security/identity-protection/hello-for-business/hello-cert-trust-validate-pki.md @@ -150,7 +150,7 @@ Domain controllers automatically request a certificate from the domain controlle 7. Expand **Windows Settings**, **Security Settings**, and click **Public Key Policies**. 8. In the details pane, right-click **Certificate Services Client – Auto-Enrollment** and select **Properties**. 9. Select **Enabled** from the **Configuration Model** list. -10. Select the **Renew expired certificates**, **update pending certificates**, and **remove revoked certificates** check box. +10. Select the **Renew expired certificates, update pending certificates, and remove revoked certificates** check box. 11. Select the **Update certificates that use certificate templates** check box. 12. Click **OK**. Close the **Group Policy Management Editor**. From f40be9acd178c699fa8446ca6f8882392d20bfa6 Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 13 May 2020 12:33:02 +0300 Subject: [PATCH 013/228] add windows version 1909 https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6297 --- windows/client-management/mandatory-user-profile.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mandatory-user-profile.md b/windows/client-management/mandatory-user-profile.md index 35227e3c16..211519bdec 100644 --- a/windows/client-management/mandatory-user-profile.md +++ b/windows/client-management/mandatory-user-profile.md @@ -38,7 +38,7 @@ The name of the folder in which you store the mandatory profile must use the cor | Windows 8 | Windows Server 2012 | v3 | | Windows 8.1 | Windows Server 2012 R2 | v4 | | Windows 10, versions 1507 and 1511 | N/A | v5 | -| Windows 10, versions 1607, 1703, 1709, 1803, 1809 and 1903 | Windows Server 2016 and Windows Server 2019 | v6 | +| Windows 10, versions 1607, 1703, 1709, 1803, 1809, 1903 and 1909 | Windows Server 2016 and Windows Server 2019 | v6 | For more information, see [Deploy Roaming User Profiles, Appendix B](https://docs.microsoft.com/windows-server/storage/folder-redirection/deploy-roaming-user-profiles#appendix-b-profile-version-reference-information) and [Roaming user profiles versioning in Windows 10 and Windows Server Technical Preview](https://support.microsoft.com/kb/3056198). From bb189ac1efcf8b5f016383f7e1139584d1c28989 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sun, 17 May 2020 11:51:36 +0500 Subject: [PATCH 014/228] Update troubleshoot-inaccessible-boot-device.md --- .../client-management/troubleshoot-inaccessible-boot-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/troubleshoot-inaccessible-boot-device.md b/windows/client-management/troubleshoot-inaccessible-boot-device.md index 5556b97262..e2b6c3237a 100644 --- a/windows/client-management/troubleshoot-inaccessible-boot-device.md +++ b/windows/client-management/troubleshoot-inaccessible-boot-device.md @@ -113,7 +113,7 @@ To verify the BCD entries: 2. In the **Windows Boot Loader** that has the **{default}** identifier, make sure that **device** , **path** , **osdevice,** and **systemroot** point to the correct device or partition, winload file, OS partition or device, and OS folder. > [!NOTE] - > If the computer is UEFI-based, the **bootmgr** and **winload** entries under **{default}** will contain an **.efi** extension. + > If the computer is UEFI-based, the filepath value specified in **path** parameter of **{bootmgr}** and **{default}** will contain an **.efi** extension. ![bcdedit](images/screenshot1.png) From 2337ec145edbbea78466ab156781f1de5fe42f11 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 18 May 2020 11:14:02 +0500 Subject: [PATCH 015/228] Update windows/client-management/troubleshoot-inaccessible-boot-device.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../client-management/troubleshoot-inaccessible-boot-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/troubleshoot-inaccessible-boot-device.md b/windows/client-management/troubleshoot-inaccessible-boot-device.md index e2b6c3237a..9f98c2a73c 100644 --- a/windows/client-management/troubleshoot-inaccessible-boot-device.md +++ b/windows/client-management/troubleshoot-inaccessible-boot-device.md @@ -110,7 +110,7 @@ To verify the BCD entries: >[!NOTE] >This output may not contain a path. -2. In the **Windows Boot Loader** that has the **{default}** identifier, make sure that **device** , **path** , **osdevice,** and **systemroot** point to the correct device or partition, winload file, OS partition or device, and OS folder. +2. In the **Windows Boot Loader** that has the **{default}** identifier, make sure that **device**, **path**, **osdevice**, and **systemroot** point to the correct device or partition, winload file, OS partition or device, and OS folder. > [!NOTE] > If the computer is UEFI-based, the filepath value specified in **path** parameter of **{bootmgr}** and **{default}** will contain an **.efi** extension. From f623eec27f374e087d8318385adda65213d669e9 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Mon, 18 May 2020 11:14:28 +0500 Subject: [PATCH 016/228] Update windows/client-management/troubleshoot-inaccessible-boot-device.md Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- .../client-management/troubleshoot-inaccessible-boot-device.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/troubleshoot-inaccessible-boot-device.md b/windows/client-management/troubleshoot-inaccessible-boot-device.md index 9f98c2a73c..667776a7f8 100644 --- a/windows/client-management/troubleshoot-inaccessible-boot-device.md +++ b/windows/client-management/troubleshoot-inaccessible-boot-device.md @@ -113,7 +113,7 @@ To verify the BCD entries: 2. In the **Windows Boot Loader** that has the **{default}** identifier, make sure that **device**, **path**, **osdevice**, and **systemroot** point to the correct device or partition, winload file, OS partition or device, and OS folder. > [!NOTE] - > If the computer is UEFI-based, the filepath value specified in **path** parameter of **{bootmgr}** and **{default}** will contain an **.efi** extension. + > If the computer is UEFI-based, the filepath value specified in the **path** parameter of **{bootmgr}** and **{default}** will contain an **.efi** extension. ![bcdedit](images/screenshot1.png) From 8161e0ca4fa396877e494a669485eb383b31d401 Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Sat, 23 May 2020 23:40:26 +0500 Subject: [PATCH 017/228] Update network-security-ldap-client-signing-requirements.md --- .../network-security-ldap-client-signing-requirements.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md index 56613b0b02..2e91b3b1b6 100644 --- a/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md +++ b/windows/security/threat-protection/security-policy-settings/network-security-ldap-client-signing-requirements.md @@ -43,7 +43,7 @@ Misuse of this policy setting is a common error that can cause data loss or prob ### Best practices -- Set **Domain controller: LDAP server signing requirements** to **Require signature**. If you set the server to require LDAP signatures, you must also set the client devices to do so. Not setting the client devices will prevent client computers from communicating with the server. This can cause many features to fail, including user authentication, Group Policy, and logon scripts. +- Set both the **Network security: LDAP client signing requirements** and **Domain controller: LDAP server signing requirements** settings to **Require signing**. To avoid usage of unsigned traffic, set both client and server sides to require signing. Not setting one of the sides will prevent client computers from communicating with the server. This can cause many features to fail, including user authentication, Group Policy, and logon scripts. ### Location @@ -84,11 +84,11 @@ Unsigned network traffic is susceptible to man-in-the-middle attacks in which an ### Countermeasure -Configure the **Network security: LDAP server signing requirements** setting to **Require signature**. +Configure the **Network security: LDAP client signing requirements** setting to **Require signing**. ### Potential impact -If you configure the server to require LDAP signatures, you must also configure the client computers. If you do not configure the client devices, they cannot communicate with the server, which could cause many features to fail, including user authentication, Group Policy, and logon scripts. +If you configure the client to require LDAP signatures, it may fail to communicate with the LDAP servers that do not require requests to be signed. To avoid this issue, make sure that both the **Network security: LDAP client signing requirements** and **Domain controller: LDAP server signing requirements** settings are set to **Require signing**. ## Related topics From 50bbcc3384cf9135b79f2d176019b6a13866dc87 Mon Sep 17 00:00:00 2001 From: rogersoMS <44718379+rogersoMS@users.noreply.github.com> Date: Sun, 24 May 2020 15:04:07 +1000 Subject: [PATCH 018/228] Added OneNote & WIP limitations to table @Brenduns Added OneNote limitation to the table (please check exact formatting/layout for issues) Happy to get sign-off from Onenote SDE jeffhubb@microsoft.com once you have a preview ready, if neccesary? --- .../windows-information-protection/limitations-with-wip.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index 3fc752f3ca..114edd9798 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -131,6 +131,11 @@ This table provides info about the most common problems you might encounter whil If you need to save an encrypted file in the Windows directory, create and encrypt the file in a different directory and copy it. + + + By design, OneNote only supports WIP protected notebooks stored on enterprise-managed SharePoint (OneDrive for Business). Onenote does not support local WIP protected notebooks. + Onenote might encounter an error such as "This notebook contains protected content from your organization, which can't be viewed or synced. Please change the file ownership to Personal, or contact your IT administrator." Supported notebooks (OneDrive for Business) should be shown in File Explorer as links and open with your associated browser. Problematic notebooks would show as folders or .one files (with a OneNote icon) + If problematic files won't open in the browser, then they are 'stuck' in the old local format - incompatible with WIP or viewing online. We recommend that you create a new notebook and copy the contents from the existing notebook into the new one. In OneNote desktop, File>New>Onedrice - company name notebook and create a new one. Then within OneNote, copy over the old 'local' sections into this new notebook to ensure they get upgraded to the modern format. Hold Ctrl+ drag-and-drop the old sections into the new notebook (holding Ctrl will copy sections rather than moving them - thus preserving the old sections as backup copies for additional safety. Wait for the new notebook to finish syncing to Onedrive for business. Microsoft Office Outlook offline data files (PST and OST files) are not marked as Work files, and are therefore not protected. From e95029065cabf159d076957432e973594e31997b Mon Sep 17 00:00:00 2001 From: ImranHabib <47118050+joinimran@users.noreply.github.com> Date: Mon, 25 May 2020 11:30:01 +0500 Subject: [PATCH 019/228] Addition of drivers info for surface laptop 3 Added drivers folder information for surface laptop 3 to support mouse, trackpad and touch functionality in PE. Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/6295 --- ...face-keyboard-for-windows-pe-deployment.md | 23 +++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/devices/surface/enable-surface-keyboard-for-windows-pe-deployment.md b/devices/surface/enable-surface-keyboard-for-windows-pe-deployment.md index 18011a1ca5..4f3c602781 100644 --- a/devices/surface/enable-surface-keyboard-for-windows-pe-deployment.md +++ b/devices/surface/enable-surface-keyboard-for-windows-pe-deployment.md @@ -97,6 +97,29 @@ To support Surface Laptop 3 with Intel Processor, import the following folders: - SurfaceUpdate\SurfaceSerialHub - SurfaceUpdate\SurfaceHotPlug - SurfaceUpdate\Itouch + +Importing the following folders will enable full keyboard, trackpad, and touch functionality in PE for Surface Laptop 3. + +- IclSerialIOGPIO +- IclSerialIOI2C +- IclSerialIOSPI +- IclSerialIOUART +- itouch +- IclChipset +- IclChipsetLPSS +- IclChipsetNorthpeak +- ManagementEngine +- SurfaceAcpiNotify +- SurfaceBattery +- SurfaceDockIntegration +- SurfaceHidMini +- SurfaceHotPlug +- SurfaceIntegration +- SurfaceSerialHub +- SurfaceService +- SurfaceStorageFwUpdate + + > [!NOTE] > Check the downloaded MSI package to determine the format and directory structure. The directory structure will start with either SurfacePlatformInstaller (older MSI files) or SurfaceUpdate (Newer MSI files) depending on when the MSI was released. From caeb203b3de70e7f0d8be6b0cf6553eb553dab46 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 26 May 2020 13:02:33 -0700 Subject: [PATCH 020/228] Update limitations-with-wip.md minor edits --- .../windows-information-protection/limitations-with-wip.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md index 114edd9798..609221d127 100644 --- a/windows/security/information-protection/windows-information-protection/limitations-with-wip.md +++ b/windows/security/information-protection/windows-information-protection/limitations-with-wip.md @@ -6,7 +6,7 @@ ms.prod: w10 ms.mktglfcycl: explore ms.sitesec: library ms.pagetype: security -author: dulcemontemayor +author: dansimp ms.author: dansimp manager: dansimp audience: ITPro @@ -134,8 +134,8 @@ This table provides info about the most common problems you might encounter whil By design, OneNote only supports WIP protected notebooks stored on enterprise-managed SharePoint (OneDrive for Business). Onenote does not support local WIP protected notebooks. - Onenote might encounter an error such as "This notebook contains protected content from your organization, which can't be viewed or synced. Please change the file ownership to Personal, or contact your IT administrator." Supported notebooks (OneDrive for Business) should be shown in File Explorer as links and open with your associated browser. Problematic notebooks would show as folders or .one files (with a OneNote icon) - If problematic files won't open in the browser, then they are 'stuck' in the old local format - incompatible with WIP or viewing online. We recommend that you create a new notebook and copy the contents from the existing notebook into the new one. In OneNote desktop, File>New>Onedrice - company name notebook and create a new one. Then within OneNote, copy over the old 'local' sections into this new notebook to ensure they get upgraded to the modern format. Hold Ctrl+ drag-and-drop the old sections into the new notebook (holding Ctrl will copy sections rather than moving them - thus preserving the old sections as backup copies for additional safety. Wait for the new notebook to finish syncing to Onedrive for business. + OneNote might encounter an error such as "This notebook contains protected content from your organization, which can't be viewed or synced. Please change the file ownership to Personal, or contact your IT administrator." Supported notebooks (OneDrive for Business) should be shown in File Explorer as links and open with your associated browser. Unsupported notebooks would show as folders or .one files (with a OneNote icon) + If unsupported files won't open in the browser, then they are 'stuck' in the old local format - incompatible with WIP or viewing online. We recommend that you create a new notebook and copy the contents from the existing notebook into the new one. In OneNote desktop, File > New > OnedDive - company name notebook and create a new one. Then within OneNote, copy over the old 'local' sections into this new notebook to ensure they get upgraded to the modern format. Hold Ctrl + drag and drop the sections into the notebook. Holding Ctrl will copy sections rather than move them, preserving the old sections as backup copies. Wait for the new notebook to finish syncing to OneDrive for business. Microsoft Office Outlook offline data files (PST and OST files) are not marked as Work files, and are therefore not protected. From dd11d5503112f1c07e8f0161e977bcd509fe7f52 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 26 May 2020 16:29:15 -0700 Subject: [PATCH 021/228] Update wd-app-guard-overview.md --- .../wd-app-guard-overview.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index 390bee5992..0ab4ff9f5c 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -1,6 +1,6 @@ --- -title: Windows Defender Application Guard (Windows 10) -description: Learn about Windows Defender Application Guard and how it helps to combat malicious content and malware out on the Internet. +title: Microsoft Defender Application Guard (Windows 10) +description: Learn about Microsoft Defender Application Guard and how it helps to combat malicious content and malware out on the Internet. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,11 +14,11 @@ manager: dansimp ms.custom: asr --- -# Windows Defender Application Guard overview +# Microsoft Defender Application Guard overview **Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. +Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. ## What is Application Guard and how does it work? @@ -44,8 +44,8 @@ Application Guard has been created to target several types of systems: |Article |Description | |------|------------| -|[System requirements for Windows Defender Application Guard](reqs-wd-app-guard.md) |Specifies the prerequisites necessary to install and use Application Guard.| -|[Prepare and install Windows Defender Application Guard](install-wd-app-guard.md) |Provides instructions about determining which mode to use, either Standalone or Enterprise-managed, and how to install Application Guard in your organization.| -|[Configure the Group Policy settings for Windows Defender Application Guard](configure-wd-app-guard.md) |Provides info about the available Group Policy and MDM settings.| -|[Testing scenarios using Windows Defender Application Guard in your business or organization](test-scenarios-wd-app-guard.md)|Provides a list of suggested testing scenarios that you can use to test Application Guard in your organization.| -|[Frequently asked questions - Windows Defender Application Guard](faq-wd-app-guard.md)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.| \ No newline at end of file +|[System requirements for Microsoft Defender Application Guard](reqs-wd-app-guard.md) |Specifies the prerequisites necessary to install and use Application Guard.| +|[Prepare and install Microsoft Defender Application Guard](install-wd-app-guard.md) |Provides instructions about determining which mode to use, either Standalone or Enterprise-managed, and how to install Application Guard in your organization.| +|[Configure the Group Policy settings for Microsoft Defender Application Guard](configure-wd-app-guard.md) |Provides info about the available Group Policy and MDM settings.| +|[Testing scenarios using Microsoft Defender Application Guard in your business or organization](test-scenarios-wd-app-guard.md)|Provides a list of suggested testing scenarios that you can use to test Application Guard in your organization.| +|[Frequently asked questions - Microsoft Defender Application Guard](faq-wd-app-guard.md)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.| From 9c21a3819afe78fb72cf7dbf42cbd8c3d5a42bcf Mon Sep 17 00:00:00 2001 From: VLG17 <41186174+VLG17@users.noreply.github.com> Date: Wed, 27 May 2020 11:21:11 +0300 Subject: [PATCH 022/228] update config https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5890 --- .../hello-for-business/feature-multifactor-unlock.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md index a3a94da88d..916d1cf629 100644 --- a/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md +++ b/windows/security/identity-protection/hello-for-business/feature-multifactor-unlock.md @@ -299,7 +299,7 @@ This example configures the same as example 2 using compounding And elements. T #### Example 4 This example configures Wi-Fi as a trusted signal (Windows 10, version 1803) ``` - + contoso 12-ab-34-ff-e5-46 From 21d010d8a96f9698c4bbf5b6b7785d34b8a14d9a Mon Sep 17 00:00:00 2001 From: v-jodben <65978782+v-jodben@users.noreply.github.com> Date: Wed, 27 May 2020 11:56:44 -0700 Subject: [PATCH 023/228] Update hololens-multiple-users.md Line 40 edit - " - HoloLens 2 users may select the user tile on the top of the Pins panel to sign out the current user." Removed 'Pins panel' with "Start menu" --- devices/hololens/hololens-multiple-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-multiple-users.md b/devices/hololens/hololens-multiple-users.md index d65929d676..806af9d3d1 100644 --- a/devices/hololens/hololens-multiple-users.md +++ b/devices/hololens/hololens-multiple-users.md @@ -37,7 +37,7 @@ To use HoloLens, each user follows these steps: 1. If another user has been using the device, do one of the following: - Press the power button once to go to standby, and then press the power button again to return to the lock screen - - HoloLens 2 users may select the user tile on the top of the Pins panel to sign out the current user. + - HoloLens 2 users may select the user tile on the top of the Start menu to sign out the current user. 1. Use your Azure AD account credentials to sign in to the device. If this is the first time that you have used the device, you have to [calibrate](hololens-calibration.md) HoloLens to your own eyes. From 27f6b62e67d699398b93a0cbc7f11f5ffce6d5bd Mon Sep 17 00:00:00 2001 From: v-jodben <65978782+v-jodben@users.noreply.github.com> Date: Wed, 27 May 2020 12:24:26 -0700 Subject: [PATCH 024/228] Update hololens1-upgrade-enterprise.md Added Important note to Line 19, 20; '> [!IMPORTANT] This page only applies to HoloLens 1st Gen.' --- devices/hololens/hololens1-upgrade-enterprise.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/devices/hololens/hololens1-upgrade-enterprise.md b/devices/hololens/hololens1-upgrade-enterprise.md index 5e535af10d..6a2e45d571 100644 --- a/devices/hololens/hololens1-upgrade-enterprise.md +++ b/devices/hololens/hololens1-upgrade-enterprise.md @@ -16,6 +16,9 @@ appliesto: # Unlock Windows Holographic for Business features +> [!IMPORTANT] +> This page only applies to HoloLens 1st Gen. + Microsoft HoloLens is available in the *Development Edition*, which runs Windows Holographic (an edition of Windows 10 that is designed for HoloLens), and in the [Commercial Suite](hololens-commercial-features.md), which provides extra features designed for business. When you purchase the Commercial Suite, you receive a license that upgrades Windows Holographic to Windows Holographic for Business. You can apply this license to the device either by using the organization's [mobile device management (MDM) provider](#edition-upgrade-by-using-mdm) or a [provisioning package](#edition-upgrade-by-using-a-provisioning-package). From 4e93eed6e0524d7eadcbd1ea621c56393662364f Mon Sep 17 00:00:00 2001 From: v-jodben <65978782+v-jodben@users.noreply.github.com> Date: Wed, 27 May 2020 12:31:19 -0700 Subject: [PATCH 025/228] Update hololens-multiple-users.md edited line 40 ti remove reference of Pins menu and replaced with Start menu --- devices/hololens/hololens-multiple-users.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-multiple-users.md b/devices/hololens/hololens-multiple-users.md index d65929d676..67860a5dd0 100644 --- a/devices/hololens/hololens-multiple-users.md +++ b/devices/hololens/hololens-multiple-users.md @@ -37,7 +37,7 @@ To use HoloLens, each user follows these steps: 1. If another user has been using the device, do one of the following: - Press the power button once to go to standby, and then press the power button again to return to the lock screen - - HoloLens 2 users may select the user tile on the top of the Pins panel to sign out the current user. + - HoloLens 2 users may select the user tile from the Start menu to sign out the current user. 1. Use your Azure AD account credentials to sign in to the device. If this is the first time that you have used the device, you have to [calibrate](hololens-calibration.md) HoloLens to your own eyes. From d25675b2c9c9b81c7c7b74a1c7372f3a873ae34d Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Thu, 28 May 2020 09:41:18 +0500 Subject: [PATCH 026/228] Update advanced-hunting-overview.md --- .../microsoft-defender-atp/advanced-hunting-overview.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md index 0a28ea14cd..977cd7c2dc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview.md @@ -23,7 +23,7 @@ ms.topic: article >Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-advancedhunting-abovefoldlink) -Advanced hunting is a query-based threat-hunting tool that lets you explore up to 30 days of raw data. You can proactively inspect events in your network to locate interesting indicators and entities. The flexible access to data facilitates unconstrained hunting for both known and potential threats. +Advanced hunting is a query-based threat-hunting tool that lets you explore raw data for the last 30 days. You can proactively inspect events in your network to locate interesting indicators and entities. The flexible access to data facilitates unconstrained hunting for both known and potential threats. You can use the same threat-hunting queries to build custom detection rules. These rules run automatically to check for and respond to various events and system states, including suspected breach activity and misconfigured machines. @@ -54,4 +54,4 @@ Take advantage of the following functionality to write queries faster: - [Use shared queries](advanced-hunting-shared-queries.md) - [Understand the schema](advanced-hunting-schema-reference.md) - [Apply query best practices](advanced-hunting-best-practices.md) -- [Custom detections overview](overview-custom-detections.md) \ No newline at end of file +- [Custom detections overview](overview-custom-detections.md) From d8542d4d592a043c44648c13c36fee344041de6d Mon Sep 17 00:00:00 2001 From: Mizanur Rahman <41208456+Mizanurra@users.noreply.github.com> Date: Thu, 28 May 2020 12:42:22 -0700 Subject: [PATCH 027/228] Update hololens2-autopilot.md Corrected ARC and HoloLens OS version minimum requirements. --- devices/hololens/hololens2-autopilot.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/devices/hololens/hololens2-autopilot.md b/devices/hololens/hololens2-autopilot.md index 39e0029ff0..17f06ef401 100644 --- a/devices/hololens/hololens2-autopilot.md +++ b/devices/hololens/hololens2-autopilot.md @@ -71,10 +71,9 @@ Review the "[Requirements](https://docs.microsoft.com/windows/deployment/windows Before you start the OOBE and provisioning process, make sure that the HoloLens devices meet the following requirements: - The devices are not already members of Azure AD, and are not enrolled in Intune (or another MDM system). The Autopilot self-deploying process completes these steps. To make sure that all the device-related information is cleaned up, check the **Devices** pages in both Azure AD and Intune. -- Every device can connect to the internet. You can "USB C to Ethernet" adapters for wired internet connectivity or "USB C to Wifi" adapters for wireless internet connectivity. -- Every device can connect to a computer by using a USB-C cable, and that computer has the following available: - - Advanced Recovery Companion (ARC) - - The latest Windows update: Windows 10, version 19041.1002.200107-0909 or a later version) +- Every device can connect to the internet. You can use "USB C to Ethernet" adapters for wired internet connectivity or "USB C to Wifi" adapters for wireless internet connectivity. +- Every device can connect to a computer by using a USB-C cable, and that computer has [Advanced Recovery Companion (ARC)](https://www.microsoft.com/en-us/p/advanced-recovery-companion/9p74z35sfrs8?rtc=1&activetab=pivot:overviewtab) installed +- Every device has the latest Windows update: Windows 10, version 19041.1002.200107-0909 or a later version. To configure and manage the Autopilot self-deploying mode profiles, make sure that you have access to [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com). From 46e217bff1cd04bc2644373c8faf4c535e5b6367 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 1 Jun 2020 11:03:34 -0700 Subject: [PATCH 028/228] safety checkin --- .../get-started-updates-channels-tools.md | 79 +++++++++++++++++++ 1 file changed, 79 insertions(+) create mode 100644 windows/deployment/update/get-started-updates-channels-tools.md diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md new file mode 100644 index 0000000000..464a910a20 --- /dev/null +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -0,0 +1,79 @@ +--- +title: Windows 10 updates, channels, and tools +description: +keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools +ms.prod: w10 +ms.mktglfcycl: manage +author: jaimeo +ms.localizationpriority: medium +ms.author: jaimeo +ms.reviewer: +manager: laurawi +ms.topic: article +--- + +# Windows 10 updates, channels, and tools + +## How Windows updates work + +There are four phases to the Windows Update process: +• Scan. A devices checks the Microsoft Update server or your WSUS endpoint at random intervals to see if +any updates have been added since the last time updates were searched, and then evaluates whether the +update is appropriate by checking the guidelines (e.g. Group Policies) that have been set up by the +administrator. This process is invisible to the user. +• Download. Once the device determines that an update is available, it begins downloading the update. +The download process is also invisible to the user. With feature updates, download happens in multiple +sequential phases. +• Install. After the update is downloaded, depending on the device’s Windows Update settings, the update +is installed on the system. +• Commit and restart. Once installed, the device usually (but not always) must be restarted in order to +complete the installation and begin using the update. Before that phase a device runs the previous +version of the software. + +## Types of updates + +We include information here about a number of different update types you'll hear about, but the two overarching types which you have the most direct control over are *feature updates* and *quality updates*. + +- **Feature updates**: Released twice per year, around March and September. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage. +- **Security updates**: Updates that fix security issues that have been discovered are typically included in monthly *quality updates*, but of course can be released out of band whenever necessary for severe issues (referred to as *critical updates*). +- **Quality updates**: Quality updates deliver both security and non-security fixes to Windows 10. They are typically released on the second Tuesday of each month, though they can be released at any time. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. +- **Servicing stack updates**: The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see s[Servicing stack updates](servicing-stack-updates.md). + **Driver updates:** these are non-Microsoft drivers that are applicable to your devices. You can turn off driver updates by using Windows Update for Business policies, if desired. +- **Microsoft product updates**: these are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using Windows Update for Business policies. + + +## Servicing channels + +Windows 10 offers three servicing channels, each of which offers you a different level of flexibility with how and when updates are delivered to devices. Using the different servicing channels allows you to deploy Windows 10 "as a service" which conceives of deployment as a continual process of updates which roll out across the organization in waves. In this approach, an update is plugged into this process and while it runs, you monitor for anomalies, errors, or user impact and respond as issues arise--without interrupting the entire process. + +The first step of controlling when and how devices install updates is assigning them to the appropriate servicing channel. You can assign devices to a particular channel with any of several tools, including Microsoft Endpoint Configuration Manager, Windows Server Update Services (WSUS), and Group Policy settings applied by any of several means. By dividing devices into different populations ("deployment groups" or "rings") you can use servicing channel assignment, followed by other management features such as update deferral policies, to create a phased deployment of any update that allows you to start with a limited pilot deployment for testing before moving to a broad deployment throughout your organization. + +### Semi-Annual Channel + +In the Semi-Annual Channel, feature updates are available as soon as Microsoft releases them, twice per year. As long as a device isn't set to defer feature updates, any device using the Semi-Annual Channel will install a feature update as soon as it's released. If you use Windows Update for Business, the Semi-Annual Channel provides three months of additional total deployment time before being required to update to the next release.{IS THIS STILL TRUE?} + +> [!NOTE] +> All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607. + +### Windows Insider program + +Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. + +### Long-term Servicing Channel + +The **Long Term Servicing Channel** is designed to be used only for specialized devices (which typically don't run Office) such as those that control medical equipment or ATMs. Devices on this channel receive new feature releases every two to three years. LTSB releases service a special LTSB edition of Windows 10 and are only available through the [Microsoft Volume Licensing Center](https://www.microsoft.com/Licensing/servicecenter/default.aspx). + +The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. + +| Windows 10 edition | Semi-Annual Channel | Long-Term Servicing Channel | Insider Program | +| --- | --- | --- | --- | +| Home | ![no](images/crossmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | +| Pro | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | +| Enterprise | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | +| Enterprise LTSB | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | +| Pro Education | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | +| Education | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | + + + +## Servicing tools \ No newline at end of file From 7a042785bbaf48c4281ee12ea3cfa77a92a0febb Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 1 Jun 2020 14:10:19 -0700 Subject: [PATCH 029/228] safety checkin --- .../get-started-updates-channels-tools.md | 29 +++++++++---------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md index 464a910a20..c5a10bfb3f 100644 --- a/windows/deployment/update/get-started-updates-channels-tools.md +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -16,30 +16,27 @@ ms.topic: article ## How Windows updates work -There are four phases to the Windows Update process: -• Scan. A devices checks the Microsoft Update server or your WSUS endpoint at random intervals to see if -any updates have been added since the last time updates were searched, and then evaluates whether the -update is appropriate by checking the guidelines (e.g. Group Policies) that have been set up by the +There are four phases to the Windows update process: + +- **Scan:** A device checks the Microsoft Update server or your Windows Server Update Services (WSUS) endpoint at random intervals to see if +any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the administrator. This process is invisible to the user. -• Download. Once the device determines that an update is available, it begins downloading the update. -The download process is also invisible to the user. With feature updates, download happens in multiple +- **Download:** Once the device determines that an update is available, it begins downloading the update. The download process is also invisible to the user. With feature updates, download happens in multiple sequential phases. -• Install. After the update is downloaded, depending on the device’s Windows Update settings, the update -is installed on the system. -• Commit and restart. Once installed, the device usually (but not always) must be restarted in order to -complete the installation and begin using the update. Before that phase a device runs the previous +- **Install:** After the update is downloaded, depending on the device’s Windows Update settings, the update is installed on the system. +- **Commit and restart:** Once installed, the device usually (but not always) must be restarted in order to complete the installation and begin using the update. Before that happens, a device is still running the previous version of the software. ## Types of updates We include information here about a number of different update types you'll hear about, but the two overarching types which you have the most direct control over are *feature updates* and *quality updates*. -- **Feature updates**: Released twice per year, around March and September. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage. -- **Security updates**: Updates that fix security issues that have been discovered are typically included in monthly *quality updates*, but of course can be released out of band whenever necessary for severe issues (referred to as *critical updates*). -- **Quality updates**: Quality updates deliver both security and non-security fixes to Windows 10. They are typically released on the second Tuesday of each month, though they can be released at any time. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. -- **Servicing stack updates**: The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see s[Servicing stack updates](servicing-stack-updates.md). - **Driver updates:** these are non-Microsoft drivers that are applicable to your devices. You can turn off driver updates by using Windows Update for Business policies, if desired. -- **Microsoft product updates**: these are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using Windows Update for Business policies. +- **Feature updates:** Released twice per year, around March and September. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage. +- **Security updates:** Updates that fix security issues that have been discovered are typically included in monthly *quality updates*, but of course can be released out of band whenever necessary for severe issues (referred to as *critical updates*). +- **Quality updates:** Quality updates deliver both security and non-security fixes to Windows 10. They are typically released on the second Tuesday of each month, though they can be released at any time. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. +- **Servicing stack updates:** The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see [Servicing stack updates](servicing-stack-updates.md). +- **Driver updates**: These are updates to non-Microsoft drivers applicable to your devices. You can turn off driver updates by using Windows Update for Business policies, if desired. {WHAT ABOUT MS DRIVERS?} +- **Microsoft product updates:** These are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using Windows Update for Business policies. ## Servicing channels From 3c857f50d6c07bf3fc2e38b0b988b087e67a0682 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 1 Jun 2020 15:10:22 -0700 Subject: [PATCH 030/228] initial draft --- .../update/plan-determine-app-readiness.md | 30 ----- .../update/prepare-deploy-windows.md | 107 ++++++++++++++++++ 2 files changed, 107 insertions(+), 30 deletions(-) create mode 100644 windows/deployment/update/prepare-deploy-windows.md diff --git a/windows/deployment/update/plan-determine-app-readiness.md b/windows/deployment/update/plan-determine-app-readiness.md index 29c3c93099..a952d5b02a 100644 --- a/windows/deployment/update/plan-determine-app-readiness.md +++ b/windows/deployment/update/plan-determine-app-readiness.md @@ -43,34 +43,4 @@ Combining the various validation methods with the app classifications you've pre |Test in pilot | x | x | x | -## Identify users -Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include: - -- **Location**: If users are in different physical locations, can you support them and get validation feedback from the region they're in? -- **Application knowledge**: Do the users have appropriate knowledge of how the app is supposed to work? -- **Technical ability**: Do the users have enough technical competence to provide useful feedback from various test scenarios? - -You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users. - -## Identify and set up devices for validation - -In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment. - -There is more than one way to choose devices for app validation: - -- **Existing pilot devices**: You might already have a list of devices that you regularly use for testing updates as part of release cycles. -- **Manual selection**: Some internal groups like operations will have expertise to help choose devices manually based on specifications, usage, or records of past support problems. -- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices. - - -## Desktop Analytics - -Desktop Analytics can make all of the tasks discussed in this article significantly easier: - -- Creating and maintaining an application and device inventory -- Assign owners to applications for testing -- Automatically apply your app classifications (critical, important, not important) -- Automatically identify application compatibility risks and provide recommendations for reducing those risks - -For more information, see [What is Desktop Analytics?](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) diff --git a/windows/deployment/update/prepare-deploy-windows.md b/windows/deployment/update/prepare-deploy-windows.md new file mode 100644 index 0000000000..3493cf01b3 --- /dev/null +++ b/windows/deployment/update/prepare-deploy-windows.md @@ -0,0 +1,107 @@ +--- +title: Prepare to deploy Windows +description: +keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools +ms.prod: w10 +ms.mktglfcycl: manage +author: jaimeo +ms.localizationpriority: medium +ms.author: jaimeo +ms.reviewer: +manager: laurawi +ms.topic: article +--- + +# Prepare to deploy Windows + +Having worked through the activities in the planning phase, you should be in a good position to prepare your environment and process to deploy Windows 10. The planning phase will have left you with these useful items: + +- A clear understanding of necessary personnel and their roles and criteria for [rating app readiness](plan-define-readiness.md) +- A plan for [testing and validating](plan-determine-app-readiness.md) apps +- An assessment of your [deployment infrastructure](eval-infra-tools.md) and definitions for operational readiness +- A [deployment plan](create-deployment-plan.md) that defines the rings you want to use + +Now you're ready to actually start making changes in your environment to get ready to deploy. + +## Prepare infrastructure and environment + +- Deploy site server updates for Configuration Manager. +- Update non-Microsoft security tools like security agents or servers. +- Update non-Microsoft management tools like data loss prevention agents. + +Your infrastructure probably includes many different components and tools. You’ll need to ensure your environment isn’t affected by issues due to the changes you make to the various parts of the infrastructure. Follow these steps: + +1. Review all of the infrastructure changes that you’ve identified in your plan. It’s important to understand the changes that need to be made and to detail how to implement them. This prevents problems later on. +2. Validate your changes. You’ll validate the changes for your infrastructure’s components and tools, to help you understand how your changes could affect your production environment. +3. Implement the changes. Once the changes have been validated, you can implement the changes across the wider infrastructure. + + +You should also look at your organization’s environment’s configuration and outline how you’ll implement any necessary changes previously identified in the plan phase to support the update. Consider what you’ll need to do for the various settings and policies that currently underpin the environment. For example: + +- Implement new draft security guidance. New versions of Windows can include new features that improve your environment’s security. Your security teams will want to make appropriate changes to security related configurations. +- Update security baselines. Security teams understand the relevant security baselines and will have to work to make sure all baselines fit into whatever guidance they have to adhere to. +However, your configuration will consist of many different settings and policies. It’s important to only apply changes where they are necessary, and where you gain a clear improvement. Otherwise, your environment might face issues that will slow down the update process. You want to ensure your environment isn’t affected adversely because of changes you make. For example: + +1. Review new security settings. Your security team will review the new security settings, to understand how they can best be set to facilitate the update, and to also investigate the potential effects they might have on your environment. +2. Review security baselines for changes. Security teams will also review all the necessary security baselines, to ensure the changes can be implemented, and ensure your environment remains compliant. +3. Implement and validate security settings and baseline changes. Your security teams will then implement all of the security settings and baselines, having addressed any potential outstanding issues. + + +## Prepare applications and devices + +You've previously decided on which validation methods you want to use to validate apps. Now is the time to identify users and devices you want to participate in app validation and get them ready. + +### Identify users + +Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include: + +- **Location**: If users are in different physical locations, can you support them and get validation feedback from the region they're in? +- **Application knowledge**: Do the users have appropriate knowledge of how the app is supposed to work? +- **Technical ability**: Do the users have enough technical competence to provide useful feedback from various test scenarios? + +You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users. + +### Identify and set up devices for validation + +In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment. + +There is more than one way to choose devices for app validation: + +- **Existing pilot devices**: You might already have a list of devices that you regularly use for testing updates as part of release cycles. +- **Manual selection**: Some internal groups like operations will have expertise to help choose devices manually based on specifications, usage, or records of past support problems. +- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices. + + +### Desktop Analytics + +Desktop Analytics can make all of the tasks discussed in this article significantly easier: + +- Creating and maintaining an application and device inventory +- Assign owners to applications for testing +- Automatically apply your app classifications (critical, important, not important) +- Automatically identify application compatibility risks and provide recommendations for reducing those risks + +For more information, see [What is Desktop Analytics?](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) + + +## Prepare capability + +In the plan phase, you determined the specific infrastructure and configuration changes that needed to be implemented to add new capabilities to the environment. Now you can move on to implementing those changes defined in the plan phase. You'll need to complete these higher-level tasks to gain those new capabilities: + +- Enable capabilities across the environment by implementing the changes. For example, implement updates to relevant ADMX templates in Active Directory. New Windows versions will come with new policies that you use to update ADMX templates. +- Validate new changes to understand how they affect the wider environment. +- Remediate any potential problems that have been identified through validation. + +## Prepare users + +Users often feel like they are forced into updating their devices randomly. They often don't fully understand why an update is needed, and they don't know when updates would be applied to their devices ahead of time. It's best to ensure that upcoming updates are communicated clearly and with adequate warning. + +You can employ a variety of measures to achieve this, for example: + +- Send overview email about the update and how it will be deployed to the entire organization. +- Send personalized emails to users about the update with specific details. +- Set an opt-out deadline for employees that need to remain on the current version for a bit longer, due to a business need. +- Provide the ability to voluntarily update at users’ convenience. +- Inform users of a mandatory installation date when the update will be installed on all devices. + +{I can include the calendar if desired, but the version in the source material isn't rendering well.} From 89a098d234cb534309e6e6a4821b3e861af4c9f4 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 1 Jun 2020 15:44:01 -0700 Subject: [PATCH 031/228] added in detail on devices --- .../update/plan-determine-app-readiness.md | 30 ++++++ .../update/prepare-deploy-windows.md | 95 ++++++++++++++----- 2 files changed, 103 insertions(+), 22 deletions(-) diff --git a/windows/deployment/update/plan-determine-app-readiness.md b/windows/deployment/update/plan-determine-app-readiness.md index a952d5b02a..b7e1707a7d 100644 --- a/windows/deployment/update/plan-determine-app-readiness.md +++ b/windows/deployment/update/plan-determine-app-readiness.md @@ -43,4 +43,34 @@ Combining the various validation methods with the app classifications you've pre |Test in pilot | x | x | x | +### Identify users +Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include: + +- **Location**: If users are in different physical locations, can you support them and get validation feedback from the region they're in? +- **Application knowledge**: Do the users have appropriate knowledge of how the app is supposed to work? +- **Technical ability**: Do the users have enough technical competence to provide useful feedback from various test scenarios? + +You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users. + +### Identify and set up devices for validation + +In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment. + +There is more than one way to choose devices for app validation: + +- **Existing pilot devices**: You might already have a list of devices that you regularly use for testing updates as part of release cycles. +- **Manual selection**: Some internal groups like operations will have expertise to help choose devices manually based on specifications, usage, or records of past support problems. +- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices. + + +### Desktop Analytics + +Desktop Analytics can make all of the tasks discussed in this article significantly easier: + +- Creating and maintaining an application and device inventory +- Assign owners to applications for testing +- Automatically apply your app classifications (critical, important, not important) +- Automatically identify application compatibility risks and provide recommendations for reducing those risks + +For more information, see [What is Desktop Analytics?](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) diff --git a/windows/deployment/update/prepare-deploy-windows.md b/windows/deployment/update/prepare-deploy-windows.md index 3493cf01b3..c5a28a2a9c 100644 --- a/windows/deployment/update/prepare-deploy-windows.md +++ b/windows/deployment/update/prepare-deploy-windows.md @@ -49,39 +49,90 @@ However, your configuration will consist of many different settings and policies ## Prepare applications and devices -You've previously decided on which validation methods you want to use to validate apps. Now is the time to identify users and devices you want to participate in app validation and get them ready. +You've previously decided on which validation methods you want to use to validate apps in the upcoming pilot deployment phase. Now is a good time to make sure that individual devices are ready and able to install the next update without difficulty. -### Identify users +### Ensure updates are available -Since your organization no doubt has a wide variety of users, each with different background and regular tasks, you'll have to choose which users are best suited for validation testing. Some factors to consider include: +Enable update services on devices. Ensure that every device is running all the services Windows Update relies on. Sometimes users or even malware can disable the services Windows Update requires to work correctly. Make sure the following services are running: -- **Location**: If users are in different physical locations, can you support them and get validation feedback from the region they're in? -- **Application knowledge**: Do the users have appropriate knowledge of how the app is supposed to work? -- **Technical ability**: Do the users have enough technical competence to provide useful feedback from various test scenarios? +- Background Intelligent Transfer Service +- Background Tasks Infrastructure Service +- BranchCache (if you use this feature for update deployment) +- ConfigMgr Task Sequence Agent (if you use Configuration Manager to deploy updates) +- Cryptographic Services +- DCOM Server Process Launcher +- Device Install +- Delivery Optimization +- Device Setup Manager +- License Manager +- Microsoft Account Sign-in Assistant +- Microsoft Software Shadow Copy Provider +- Remote Procedure Call (RPC) +- Remote Procedure Call (RPC) Locator +- RPC Endpoint Mapper +- Service Control Manager +- Task Scheduler +- Token Broker +- Update Orchestrator Service +- Volume Shadow Copy Service +- Windows Automatic Update Service +- Windows Backup +- Windows Defender Firewall +- Windows Management Instrumentation +- Windows Management Service +- Windows Module Installer +- Windows Push Notification +- Windows Security Center Service +- Windows Time Service +- Windows Update +- Windows Update Medic Service -You could seek volunteers who enjoy working with new features and include them in the pilot deployment. You might want to avoid using core users like department heads or project managers. Current application owners, operations personnel, and developers can help you identify the most appropriate pilot users. +You can check these services manually by using Services.msc, or by using PowerShell scripts, Desktop Analytics, or other methods. -### Identify and set up devices for validation +### Network configuration -In addition to users, it's important to carefully choose devices to participate in app validation as well. For example, ideally, your selection will include devices representing all of the hardware models in your environment. +Ensure that devices can reach necessary Windows Update endpoints through the firewall. -There is more than one way to choose devices for app validation: +### Optimize download bandwidth +Set up [Delivery Optimization](waas-delivery-optimization.md) for peer network sharing or Microsoft Connected Cache. -- **Existing pilot devices**: You might already have a list of devices that you regularly use for testing updates as part of release cycles. -- **Manual selection**: Some internal groups like operations will have expertise to help choose devices manually based on specifications, usage, or records of past support problems. -- **Data-driven analysis**: With appropriate tools, you can use diagnostic data from devices to inform your choices. +### Address unhealthy devices + +In the course of surveying your device population, either with Desktop Analytics or by some other means, you might find devices that have systemic problems that could interfere with update installation. Now is the time to fix those problems. + +- **Low disk space:** Quality updates require a minimum of two GB to successfully install. Feature updates require between 8 and 15 GB depending upon the configuration. On Windows 10, version 1903 and later you can proactively use the "reserved storage" feature (for wipe and loads, rebuilds, and new builds) to avoid running out of disk space. If you find a group of devices that don't have enough disk space, you can often resolve this by cleaning up log files and asking users to clean up data if necessary. A good place to start is to delete the following files: +- C:\Windows\temp +- C:\Windows\cbstemp (though this file might be necessary to investigate update failures) +- C:\Windows\WindowsUpdate.log (though this file might be necessary to investigate update failures) +- C:\Windows.Old (these files should automatically clean up after 10 days or might ask the device user for permission to clean up sooner when constrained for disk space) + +You can also create and run scripts to perform additional cleanup actions on devices, with administrative rights, or use Group Policy settings. + +- Clean up the Windows Store Cache by running C:\Windows\sytem32\wsreset.exe +- Optimize the WinSxS folder on the client machine by using **Dism.exe /online /Cleanup-Image /StartComponentCleanup** +- Compact the operating system by running **Compact.exe /CompactOS:always** +- Remove Windows Features on Demand that the user doesn't need. See [Features on Demand](https://docs.microsoft.com/windows-hardware/manufacture/desktop/features-on-demand-v2--capabilities) for more guidance. +- Move Windows Known Folders to OneDrive. See [Use Group Policy to control OneDrive sync settings](https://docs.microsoft.com/onedrive/use-group-policy) for more information. +- Clean up the Software Distribution folder. Try deploying these commands as a batch file to run on devices to reset the download state of Windows Updates: + +``` +net stop wuauserv +net stop cryptSvc +net stop bits +net stop msiserver +ren C:\Windows\SoftwareDistribution C:\Windows\SoftwareDistribution.old +net start wuauserv +net start cryptSvc +net start bits +net start msiserver +``` + +- **Application and driver updates:** Out-of-date app or driver software can prevent devices from updating successfully. Desktop Analytics will help you identify drivers and applications that need attention. You can also +check for known issues in order to take any appropriate action. Deploy any updates from the vendor(s) for any problematic application or driver versions to resolve issues. +- **Corruption:** In rare circumstances, a device that has repeated installation errors might be corrupted in a way that prevents the system from applying a new update. You might have to repair the Component Based Store from another source. You can do this with the [System File Checker](https://support.microsoft.com/help/929833/use-the-system-file-checker-tool-to-repair-missing-or-corrupted-system). -### Desktop Analytics -Desktop Analytics can make all of the tasks discussed in this article significantly easier: - -- Creating and maintaining an application and device inventory -- Assign owners to applications for testing -- Automatically apply your app classifications (critical, important, not important) -- Automatically identify application compatibility risks and provide recommendations for reducing those risks - -For more information, see [What is Desktop Analytics?](https://docs.microsoft.com/mem/configmgr/desktop-analytics/overview) ## Prepare capability From 3da5f277f2167b1c99cd15b1fc9c33fdc3feed5b Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:04:26 -0700 Subject: [PATCH 032/228] Update faq-wd-app-guard.md --- .../faq-wd-app-guard.md | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 1e8839b354..cccc536c12 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -92,3 +92,12 @@ Yes, both the Enterprise Resource domains hosted in the cloud and the Domains ca ### Why does my encryption driver break Windows Defender Application Guard? Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT"). + +### Why do the Network Isolation policies in Group Policy and CSP look different? + +There is not a one-to-one mapping among all the Network Isolation policies between CSP and GP. Mandatary network isolation policies to deploy WDAG are different between CSP and GP. + +Mandatory network isolation GP policy to deploy WDAG: "DomainSubnets or CloudResources" +Mandatory network isolation CSP policy to deploy WDAG: "EnterpriseCloudResources or (EnterpriseIpRange and EnterpriseNetworkDomainNames)" +For EnterpriseNetworkDomainNames, there is no mapped CSP policy. + From 0c531dd4906868ff63aa5bd0e5ae02a54c157056 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:41:05 -0700 Subject: [PATCH 033/228] Update wd-app-guard-overview.md --- .../wd-app-guard-overview.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md index 390bee5992..799cbc5386 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md +++ b/windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md @@ -1,6 +1,6 @@ --- -title: Windows Defender Application Guard (Windows 10) -description: Learn about Windows Defender Application Guard and how it helps to combat malicious content and malware out on the Internet. +title: Microsoft Defender Application Guard (Windows 10) +description: Learn about Microsoft Defender Application Guard and how it helps to combat malicious content and malware out on the Internet. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,11 +14,11 @@ manager: dansimp ms.custom: asr --- -# Windows Defender Application Guard overview +# Microsoft Defender Application Guard overview **Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. +Microsoft Defender Application Guard (Application Guard) is designed to help prevent old and newly emerging attacks to help keep employees productive. Using our unique hardware isolation approach, our goal is to destroy the playbook that attackers use by making current attack methods obsolete. ## What is Application Guard and how does it work? @@ -48,4 +48,4 @@ Application Guard has been created to target several types of systems: |[Prepare and install Windows Defender Application Guard](install-wd-app-guard.md) |Provides instructions about determining which mode to use, either Standalone or Enterprise-managed, and how to install Application Guard in your organization.| |[Configure the Group Policy settings for Windows Defender Application Guard](configure-wd-app-guard.md) |Provides info about the available Group Policy and MDM settings.| |[Testing scenarios using Windows Defender Application Guard in your business or organization](test-scenarios-wd-app-guard.md)|Provides a list of suggested testing scenarios that you can use to test Application Guard in your organization.| -|[Frequently asked questions - Windows Defender Application Guard](faq-wd-app-guard.md)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.| \ No newline at end of file +|[Frequently asked questions - Windows Defender Application Guard](faq-wd-app-guard.md)|Provides answers to frequently asked questions about Application Guard features, integration with the Windows operating system, and general configuration.| From 9a2f04de673938a0828a6d98f639ce660d23bba9 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:42:16 -0700 Subject: [PATCH 034/228] Update reqs-wd-app-guard.md --- .../reqs-wd-app-guard.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md index ca449ea92c..0f700a7b26 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md @@ -1,6 +1,6 @@ --- -title: System requirements for Windows Defender Application Guard (Windows 10) -description: Learn about the system requirements for installing and running Windows Defender Application Guard. +title: System requirements for Microsoft Defender Application Guard (Windows 10) +description: Learn about the system requirements for installing and running Microsoft Defender Application Guard. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,17 +14,17 @@ manager: dansimp ms.custom: asr --- -# System requirements for Windows Defender Application Guard +# System requirements for Microsoft Defender Application Guard **Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Windows Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. +The threat landscape is continually evolving. While hackers are busy developing new techniques to breach enterprise networks by compromising workstations, phishing schemes remain one of the top ways to lure employees into social engineering attacks. Microsoft Defender Application Guard is designed to help prevent old, and newly emerging attacks, to help keep employees productive. >[!NOTE] ->Windows Defender Application Guard is not supported on VMs and VDI environment. For testing and automation on non-production machines, you may enable WDAG on a VM by enabling Hyper-V nested virtualization on the host. +>Microsoft Defender Application Guard is not supported on VMs and VDI environment. For testing and automation on non-production machines, you may enable WDAG on a VM by enabling Hyper-V nested virtualization on the host. ## Hardware requirements -Your environment needs the following hardware to run Windows Defender Application Guard. +Your environment needs the following hardware to run Microsoft Defender Application Guard. |Hardware|Description| |--------|-----------| From e907e77e00ab41799bd645654d8e9d95dad0d084 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:43:10 -0700 Subject: [PATCH 035/228] Update install-wd-app-guard.md --- .../install-wd-app-guard.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md index e5630f24a3..2ef6c54364 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md @@ -1,6 +1,6 @@ --- title: Enable hardware-based isolation for Microsoft Edge (Windows 10) -description: Learn about the Windows Defender Application Guard modes (Standalone or Enterprise-managed) and how to install Application Guard in your enterprise. +description: Learn about the Microsoft Defender Application Guard modes (Standalone or Enterprise-managed) and how to install Application Guard in your enterprise. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,19 +14,19 @@ manager: dansimp ms.custom: asr --- -# Prepare to install Windows Defender Application Guard +# Prepare to install Microsoft Defender Application Guard **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) ## Review system requirements -See [System requirements for Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard) to review the hardware and software installation requirements for Windows Defender Application Guard. +See [System requirements for Microsoft Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard) to review the hardware and software installation requirements for Windows Defender Application Guard. >[!NOTE] ->Windows Defender Application Guard is not supported on VMs and VDI environment. For testing and automation on non-production machines, you may enable WDAG on a VM by enabling Hyper-V nested virtualization on the host. +>Microsoft Defender Application Guard is not supported on VMs and VDI environment. For testing and automation on non-production machines, you may enable WDAG on a VM by enabling Hyper-V nested virtualization on the host. -## Prepare for Windows Defender Application Guard -Before you can install and use Windows Defender Application Guard, you must determine which way you intend to use it in your enterprise. You can use Application Guard in either **Standalone** or **Enterprise-managed** mode. +## Prepare for Microsoft Defender Application Guard +Before you can install and use Microsoft Defender Application Guard, you must determine which way you intend to use it in your enterprise. You can use Application Guard in either **Standalone** or **Enterprise-managed** mode. ### Standalone mode From 96525e83294719c72416ca3b5eaef2563a4199e9 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:43:57 -0700 Subject: [PATCH 036/228] Update configure-wd-app-guard.md --- .../configure-wd-app-guard.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 5020c63596..e3871020d7 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -1,6 +1,6 @@ --- -title: Configure the Group Policy settings for Windows Defender Application Guard (Windows 10) -description: Learn about the available Group Policy settings for Windows Defender Application Guard. +title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows 10) +description: Learn about the available Group Policy settings for Microsoft Defender Application Guard. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,12 +14,12 @@ manager: dansimp ms.custom: asr --- -# Configure Windows Defender Application Guard policy settings +# Configure Microsoft Defender Application Guard policy settings **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Windows Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. +Microsoft Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. Application Guard uses both network isolation and application-specific settings. From 04e7635fb0cd233efb999ad9033fe3527f35817c Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:44:50 -0700 Subject: [PATCH 037/228] Update test-scenarios-wd-app-guard.md --- .../test-scenarios-wd-app-guard.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md index a5eebdf2a2..f380bebaa0 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md @@ -1,6 +1,6 @@ --- -title: Testing scenarios with Windows Defender Application Guard (Windows 10) -description: Suggested testing scenarios for Windows Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode. +title: Testing scenarios with Microsoft Defender Application Guard (Windows 10) +description: Suggested testing scenarios for Microsoft Defender Application Guard, showing how it works in both Standalone and Enterprise-managed mode. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library From da785f2a13a33fdf2ff276866417d1b37ce01d67 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:45:31 -0700 Subject: [PATCH 038/228] Update faq-wd-app-guard.md --- .../faq-wd-app-guard.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 1e8839b354..f410bb38de 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -1,6 +1,6 @@ --- -title: FAQ - Windows Defender Application Guard (Windows 10) -description: Learn about the commonly asked questions and answers for Windows Defender Application Guard. +title: FAQ - Microsoft Defender Application Guard (Windows 10) +description: Learn about the commonly asked questions and answers for Microsoft Defender Application Guard. ms.prod: w10 ms.mktglfcycl: manage ms.sitesec: library @@ -14,11 +14,11 @@ manager: dansimp ms.custom: asr --- -# Frequently asked questions - Windows Defender Application Guard +# Frequently asked questions - Microsoft Defender Application Guard **Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Answering frequently asked questions about Windows Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. +Answering frequently asked questions about Microsoft Defender Application Guard (Application Guard) features, integration with the Windows operating system, and general configuration. ## Frequently Asked Questions From 3d76e12ffd2498f10fd9c41ee08d1741119f3953 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:50:24 -0700 Subject: [PATCH 039/228] Update configure-wd-app-guard.md --- .../configure-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md index 5020c63596..e78a0079f6 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md @@ -36,7 +36,7 @@ These settings, located at **Computer Configuration\Administrative Templates\Net |-----------|------------------|-----------| |Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| |Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| -|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| +|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Proxies should be added to this list. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| ## Network isolation settings wildcards From 68d4ad7ae04d7ba38d7a4e60cb9c401cf836ba14 Mon Sep 17 00:00:00 2001 From: Rona Song <38082753+qrscharmed@users.noreply.github.com> Date: Tue, 2 Jun 2020 00:54:57 -0700 Subject: [PATCH 040/228] Update faq-wd-app-guard.md --- .../windows-defender-application-guard/faq-wd-app-guard.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 1e8839b354..6fc40a60b0 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -92,3 +92,7 @@ Yes, both the Enterprise Resource domains hosted in the cloud and the Domains ca ### Why does my encryption driver break Windows Defender Application Guard? Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT"). + +### Why did Application Guard stop working after I turned on hyperthreading? + +If hyperthreading is disabled (either with KB or through BIOS), there may be a possibility Application Guard will no longer meet the minimum requirements. From 290993239d57ff82996af881d3255455faf936e7 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 2 Jun 2020 08:12:17 -0700 Subject: [PATCH 041/228] Update hololens2-autopilot.md removing en-us from link --- devices/hololens/hololens2-autopilot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens2-autopilot.md b/devices/hololens/hololens2-autopilot.md index 17f06ef401..d92aee8369 100644 --- a/devices/hololens/hololens2-autopilot.md +++ b/devices/hololens/hololens2-autopilot.md @@ -72,7 +72,7 @@ Before you start the OOBE and provisioning process, make sure that the HoloLens - The devices are not already members of Azure AD, and are not enrolled in Intune (or another MDM system). The Autopilot self-deploying process completes these steps. To make sure that all the device-related information is cleaned up, check the **Devices** pages in both Azure AD and Intune. - Every device can connect to the internet. You can use "USB C to Ethernet" adapters for wired internet connectivity or "USB C to Wifi" adapters for wireless internet connectivity. -- Every device can connect to a computer by using a USB-C cable, and that computer has [Advanced Recovery Companion (ARC)](https://www.microsoft.com/en-us/p/advanced-recovery-companion/9p74z35sfrs8?rtc=1&activetab=pivot:overviewtab) installed +- Every device can connect to a computer by using a USB-C cable, and that computer has [Advanced Recovery Companion (ARC)](https://www.microsoft.com/p/advanced-recovery-companion/9p74z35sfrs8?rtc=1&activetab=pivot:overviewtab) installed - Every device has the latest Windows update: Windows 10, version 19041.1002.200107-0909 or a later version. To configure and manage the Autopilot self-deploying mode profiles, make sure that you have access to [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com). From 3a52c98053cf6dd74c29b322e4de0c2ca93c42bd Mon Sep 17 00:00:00 2001 From: illfated Date: Tue, 2 Jun 2020 19:56:00 +0200 Subject: [PATCH 042/228] Security/Threat protection: password length values Description: As requested by Program Manager Robert Durff (MSRobertD) in issue ticket #6856 (Bug: Password length value range is inaccurate.), the upper value for the supported values for password length should be 20 instead of only 14, verified in preliminary field testing of the GPO Password Policy, described on this page. The actual upper limit may very well be higher, but 20 is a reasonable value to be used for now, until someone documents the need for higher accuracy in the documentation of this value for the GPO Password Policy. Changes proposed: - Replace 14 with 20 in both occurrences of 14 as the upper value - Convert Note text in line 83 to a MarkDown Note blob (MS codestyle) - Whitespace adjustments: - Normalize bullet point list spacing to 1 (codestyle) (3 lines) - Remove redundant end-of-line spacing (8 lines) Ticket closure or reference: Closes #6856 --- .../minimum-password-length.md | 27 ++++++++++--------- 1 file changed, 14 insertions(+), 13 deletions(-) diff --git a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md index 7917efbce4..b57e36e03e 100644 --- a/windows/security/threat-protection/security-policy-settings/minimum-password-length.md +++ b/windows/security/threat-protection/security-policy-settings/minimum-password-length.md @@ -20,18 +20,18 @@ ms.date: 04/19/2017 # Minimum password length **Applies to** -- Windows 10 +- Windows 10 Describes the best practices, location, values, policy management, and security considerations for the **Minimum password length** security policy setting. ## Reference -The **Minimum password length** policy setting determines the least number of characters that can make up a password for a user account. You can set a value of between 1 and 14 characters, or you can establish that no password is required by setting the number of characters to 0. +The **Minimum password length** policy setting determines the least number of characters that can make up a password for a user account. You can set a value of between 1 and 20 characters, or you can establish that no password is required by setting the number of characters to 0. ### Possible values -- User-specified number of characters between 0 and 14 -- Not defined +- User-specified number of characters between 0 and 20 +- Not defined ### Best practices @@ -51,13 +51,13 @@ The following table lists the actual and effective default policy values. Defaul | Server type or Group Policy Object (GPO) | Default value | | - | - | -| Default domain policy| 7 characters| -| Default domain controller policy | Not defined| -| Stand-alone server default settings | 0 characters| -| Domain controller effective default settings | 7 characters| -| Member server effective default settings | 7 characters| -| Effective GPO default settings on client computers | 0 characters| - +| Default domain policy| 7 characters| +| Default domain controller policy | Not defined| +| Stand-alone server default settings | 0 characters| +| Domain controller effective default settings | 7 characters| +| Member server effective default settings | 7 characters| +| Effective GPO default settings on client computers | 0 characters| + ## Policy management This section describes features, tools, and guidance to help you manage this policy. @@ -80,8 +80,9 @@ Configure the **** policy setting to a value of 8 or more. If the number of char In most environments, we recommend an eight-character password because it is long enough to provide adequate security, but not too difficult for users to easily remember. This configuration provides adequate defense against a brute force attack. Using the [Password must meet complexity requirements](password-must-meet-complexity-requirements.md) policy setting in addition to the **Minimum password length** setting helps reduce the possibility of a dictionary attack. ->**Note:**  Some jurisdictions have established legal requirements for password length as part of establishing security regulations. - +> [!NOTE] +> Some jurisdictions have established legal requirements for password length as part of establishing security regulations. + ### Potential impact Requirements for extremely long passwords can actually decrease the security of an organization because users might leave the information in an unsecured location or lose it. If very long passwords are required, mistyped passwords could cause account lockouts and increase the volume of Help Desk calls. If your organization has issues with forgotten passwords due to password length requirements, consider teaching your users about passphrases, which are often easier to remember and, due to the larger number of character combinations, much harder to discover. From 21b393ec12358d73b60e85822e8f350004941db1 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Tue, 2 Jun 2020 11:46:00 -0700 Subject: [PATCH 043/228] Update faq-wd-app-guard.md --- .../windows-defender-application-guard/faq-wd-app-guard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 6fc40a60b0..3f305282d0 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -93,6 +93,6 @@ Yes, both the Enterprise Resource domains hosted in the cloud and the Domains ca Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT"). -### Why did Application Guard stop working after I turned on hyperthreading? +### Why did Application Guard stop working after I turned off hyperthreading? If hyperthreading is disabled (either with KB or through BIOS), there may be a possibility Application Guard will no longer meet the minimum requirements. From 1da415b64d23fc04ed2df11a923ea31b6235da86 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Tue, 2 Jun 2020 12:12:46 -0700 Subject: [PATCH 044/228] Update faq-wd-app-guard.md --- .../faq-wd-app-guard.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md index 3f305282d0..de036bc4dd 100644 --- a/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md +++ b/windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md @@ -8,7 +8,7 @@ ms.pagetype: security ms.localizationpriority: medium author: denisebmsft ms.author: deniseb -ms.date: 12/04/2019 +ms.date: 06/02/2020 ms.reviewer: manager: dansimp ms.custom: asr @@ -83,7 +83,7 @@ To trust a subdomain, you must precede your domain with two dots, for example: ` ### Are there differences between using Application Guard on Windows Pro vs Windows Enterprise? -When using Windows Pro or Windows Enterprise, you will have access to using Application Guard's Standalone Mode. However, when using Enterprise you will have access to Application Guard's Enterprise-Managed Mode. This mode has some extra features that the Standalone Mode does not. For more information, see [Prepare to install Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard). +When using Windows Pro or Windows Enterprise, you have access to using Application Guard's Standalone Mode. However, when using Windows Enterprise, you have access to Application Guard's Enterprise-Managed Mode. This mode has some extra features that the Standalone Mode does not. For more information, see [Prepare to install Windows Defender Application Guard](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard). ### Is there a size limit to the domain lists that I need to configure? @@ -91,8 +91,8 @@ Yes, both the Enterprise Resource domains hosted in the cloud and the Domains ca ### Why does my encryption driver break Windows Defender Application Guard? -Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message ("0x80070013 ERROR_WRITE_PROTECT"). +Windows Defender Application Guard accesses files from a VHD mounted on the host that needs to be written during setup. If an encryption driver prevents a VHD from being mounted or from being written to, WDAG will not work and result in an error message (`0x80070013 ERROR_WRITE_PROTECT`). ### Why did Application Guard stop working after I turned off hyperthreading? -If hyperthreading is disabled (either with KB or through BIOS), there may be a possibility Application Guard will no longer meet the minimum requirements. +If hyperthreading is disabled (because of an update applied through a KB article or through BIOS settings), there is a possibility Application Guard no longer meets the minimum requirements. From 4418a6e7b063bbcd5c80f8d6db22950064f799cf Mon Sep 17 00:00:00 2001 From: jaimeo Date: Tue, 2 Jun 2020 15:18:46 -0700 Subject: [PATCH 045/228] initial draft --- .../get-started-updates-channels-tools.md | 70 ++++++++++++++----- 1 file changed, 51 insertions(+), 19 deletions(-) diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md index c5a10bfb3f..4fc8607bbd 100644 --- a/windows/deployment/update/get-started-updates-channels-tools.md +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -1,6 +1,6 @@ --- title: Windows 10 updates, channels, and tools -description: +description: Brief summary of the kinds of Windows updates, the channels they are served through, and the tools for managing them keywords: updates, servicing, current, deployment, semi-annual channel, feature, quality, rings, insider, tools ms.prod: w10 ms.mktglfcycl: manage @@ -18,8 +18,7 @@ ms.topic: article There are four phases to the Windows update process: -- **Scan:** A device checks the Microsoft Update server or your Windows Server Update Services (WSUS) endpoint at random intervals to see if -any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the +- **Scan:** A device checks the Microsoft Update server or your Windows Server Update Services (WSUS) endpoint at random intervals to see if any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the administrator. This process is invisible to the user. - **Download:** Once the device determines that an update is available, it begins downloading the update. The download process is also invisible to the user. With feature updates, download happens in multiple sequential phases. @@ -32,11 +31,11 @@ version of the software. We include information here about a number of different update types you'll hear about, but the two overarching types which you have the most direct control over are *feature updates* and *quality updates*. - **Feature updates:** Released twice per year, around March and September. Feature updates add new features and functionality to Windows 10. Because they are delivered frequently (rather than every 3-5 years), they are easier to manage. -- **Security updates:** Updates that fix security issues that have been discovered are typically included in monthly *quality updates*, but of course can be released out of band whenever necessary for severe issues (referred to as *critical updates*). -- **Quality updates:** Quality updates deliver both security and non-security fixes to Windows 10. They are typically released on the second Tuesday of each month, though they can be released at any time. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. +- **Quality updates:** Quality updates deliver both security and non-security fixes to Windows 10. Quality updates include security updates, critical updates, servicing stack updates, and driver updates. They are typically released on the second Tuesday of each month, though they can be released at any time. The second-Tuesday releases are the ones that focus on security updates. Quality updates are *cumulative*, so installing the latest quality update is sufficient to get all the available fixes for a specific Windows 10 feature update, including any out-of-band security fixes and any *servicing stack updates* that might have been released previously. - **Servicing stack updates:** The "servicing stack" is the code component that actually installs Windows updates. From time to time, the servicing stack itself needs to be updated in order to function smoothly. If you don't install the latest servicing stack update, there's a risk that your device can't be updated with the latest Microsoft security fixes. Servicing stack updates are not necessarily included in *every* monthly quality update, and occasionally are released out of band to address a late-breaking issue. Always install the latest available quality update to catch any servicing stack updates that might have been released. The servicing stack also contains the "component-based servicing stack" (CBS), which is a key underlying component for several elements of Windows deployment, such as DISM, SFC, changing Windows features or roles, and repairing components. The CBS is a small component that typically does not have updates released every month. You can find a list of servicing stack updates at [Latest servicing stack updates](https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV990001). For more detail about servicing stack updates, see [Servicing stack updates](servicing-stack-updates.md). -- **Driver updates**: These are updates to non-Microsoft drivers applicable to your devices. You can turn off driver updates by using Windows Update for Business policies, if desired. {WHAT ABOUT MS DRIVERS?} -- **Microsoft product updates:** These are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using Windows Update for Business policies. +- **Driver updates**: These are updates to drivers applicable to your devices. Driver updates are turned off by default in Windows Server Update Services (WSUS), but for cloud-based update methods, you can control whether they are installed or not. +- **Microsoft product updates:** These are updates for other Microsoft products, such as Office. You can enable or disable Microsoft updates by using policies controlled by various servicing tools. + ## Servicing channels @@ -45,16 +44,24 @@ Windows 10 offers three servicing channels, each of which offers you a different The first step of controlling when and how devices install updates is assigning them to the appropriate servicing channel. You can assign devices to a particular channel with any of several tools, including Microsoft Endpoint Configuration Manager, Windows Server Update Services (WSUS), and Group Policy settings applied by any of several means. By dividing devices into different populations ("deployment groups" or "rings") you can use servicing channel assignment, followed by other management features such as update deferral policies, to create a phased deployment of any update that allows you to start with a limited pilot deployment for testing before moving to a broad deployment throughout your organization. -### Semi-Annual Channel -In the Semi-Annual Channel, feature updates are available as soon as Microsoft releases them, twice per year. As long as a device isn't set to defer feature updates, any device using the Semi-Annual Channel will install a feature update as soon as it's released. If you use Windows Update for Business, the Semi-Annual Channel provides three months of additional total deployment time before being required to update to the next release.{IS THIS STILL TRUE?} +### Semi-annual Channel + +In the Semi-annual Channel, feature updates are available as soon as Microsoft releases them, twice per year. As long as a device isn't set to defer feature updates, any device using the Semi-annual Channel will install a feature update as soon as it's released. If you use Windows Update for Business, the Semi-annual Channel provides three months of additional total deployment time before being required to update to the next release.{IS THIS STILL TRUE?} > [!NOTE] > All releases of Windows 10 have **18 months of servicing for all editions**--these updates provide security and feature updates for the release. However, fall releases of the **Enterprise and Education editions** will have an **additional 12 months of servicing for specific Windows 10 releases, for a total of 30 months from initial release**. This extended servicing window applies to Enterprise and Education editions starting with Windows 10, version 1607. -### Windows Insider program +### Windows Insider Program for Business + +Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. There are actually three options within the Windows Insider Program for Business channel: + +- Windows Insider Fast +- Windows Insider Slow +- Windows Insider Release Preview + +We recommend that you use the Windows Insider Release Preview channel for validation activities. -Insider preview releases are made available during the development of the features that will be shipped in the next feature update, enabling organizations to validate new features as well as compatibility with existing apps and infrastructure, providing feedback to Microsoft on any issues encountered. ### Long-term Servicing Channel @@ -62,15 +69,40 @@ The **Long Term Servicing Channel** is designed to be used only for specialized The Semi-Annual Channel is the default servicing channel for all Windows 10 devices except those with the LTSB edition installed. The following table shows the servicing channels available to each Windows 10 edition. -| Windows 10 edition | Semi-Annual Channel | Long-Term Servicing Channel | Insider Program | + +| Windows 10 edition | Semi-Annual Channel | Insider Program | Long-Term Servicing Channel | | --- | --- | --- | --- | -| Home | ![no](images/crossmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | -| Pro | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | -| Enterprise | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | -| Enterprise LTSB | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | -| Pro Education | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | -| Education | ![yes](images/checkmark.png) | ![no](images/crossmark.png) | ![yes](images/checkmark.png) | +| Home | ![yes](images/checkmark.png)|![no](images/crossmark.png) | ![no](images/crossmark.png)| +| Pro | ![yes](images/checkmark.png) | ![yes](images/checkmark.png) | ![no](images/crossmark.png)| +| Enterprise | ![yes](images/checkmark.png) |![yes](images/checkmark.png) | ![no](images/crossmark.png)| +| Enterprise LTSB | ![no](images/crossmark.png) |![no](images/crossmark.png) | ![yes](images/checkmark.png)| +| Pro Education | ![yes](images/checkmark.png) | ![yes](images/checkmark.png) | ![no](images/crossmark.png)| +| Education | ![yes](images/checkmark.png) | ![yes](images/checkmark.png) | ![no](images/crossmark.png)| +## Servicing tools +### Tools for on-premises update delivery + +Windows Server Update Services (WSUS): you set up a WSUS server, which downloads updates in bulk from Microsoft. Your individual devices then connect to your server to install their updates from there. + +You can set up, control, and manage the server and update process with a number of tools: + +- A standalone Windows Server Update Services server operated directly +- Configuration Manager +- Non-Microsoft tools + +For more information, see [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus). + +### Tools for cloud-based update delivery + +Your individual devices connect to Microsoft endpoints directly to get the updates. The details of this process (how often devices download updates of various kinds, from which channels, deferrals, and details of the users' experience of installation) are set on devices either with Group Policy or MDM policies, which you can control with any of a number of tools: + +- [Group Policy Management Console](waas-wufb-group-policy.md) (Gpmc.msc) +- [Microsoft Intune](waas-wufb-intune.md) +- [Configuration Manager](deploy-updates-configmgr.md) +- Non-Microsoft MDM tools + +### Hybrid scenarios + +It is also possible to combine WSUS-based on-premises update distribution with cloud-based update delivery. -## Servicing tools \ No newline at end of file From a7f517d4bec03fe990f804d04aede259960f922a Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 2 Jun 2020 18:49:00 -0700 Subject: [PATCH 046/228] testing 1 2 3 --- windows/privacy/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index 8d5740bc52..fe5b89eda0 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -1,4 +1,4 @@ -### YamlMime:YamlDocument +### YamlMime:Hub documentType: LandingData From 459d69216fc2c3c37beaadd121cbd2636f283d08 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 2 Jun 2020 20:10:04 -0700 Subject: [PATCH 047/228] updating hub page --- windows/privacy/index.yml | 306 ++++++++++++++++++++------------------ 1 file changed, 165 insertions(+), 141 deletions(-) diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index fe5b89eda0..c8309a41a9 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -1,156 +1,180 @@ ### YamlMime:Hub -documentType: LandingData - title: Windows Privacy +summary: Get ready for General Data Protection Regulation (GDPR) by viewing and configuring Windows diagnostic data in your organization. +brand: m365 metadata: - - document_id: - title: Windows Privacy - description: Learn about how privacy is managed in Windows. - - keywords: Windows 10, Windows Server, Windows Server 2016, privacy, GDPR, compliance, endpoints - + services: windows + product: windows + ms.topic: hub-page # Required + ms.collection: M365-security-compliance + author: danihalfin + ms.author: daniha + manager: dansimp + ms.date: 02/21/2019 #Required; mm/dd/yyyy format. ms.localizationpriority: high - author: danihalfin - - ms.author: daniha - - ms.date: 04/25/2018 - - ms.topic: conceptual - - audience: ITPro - - manager: dansimp - - ms.collection: M365-security-compliance - - ms.devlang: na - -sections: - -- items: - - - type: markdown - - text: Get ready for General Data Protection Regulation (GDPR) by viewing and configuring Windows diagnostic data in your organization. - -- items: - - - type: list - - style: cards - - className: cardsM - - columns: 3 - - items: - - - href: \windows\privacy\gdpr-it-guidance - - html:

Learn about GDPR and how Microsoft helps you get started towards compliance

- - image: - - src: https://docs.microsoft.com/media/common/i_advanced.svg - - title: Start with GDPR basics - - - href: \windows\privacy\configure-windows-diagnostic-data-in-your-organization - - html:

Make informed decisions about how you can configure diagnostic data in your organization

- - image: - - src: https://docs.microsoft.com/media/common/i_filter.svg - - title: Configure Windows diagnostic data - - - href: \windows\privacy\diagnostic-data-viewer-overview - - html:

Review the Windows diagnostic data sent to Microsoft by device in your organization

- - image: - - src: https://docs.microsoft.com/media/common/i_investigate.svg - - title: View Windows diagnostic data - -- title: Understand Windows diagnostic data in Windows 10 - +# highlightedContent section (optional) +# Maximum of 8 items +highlightedContent: +# itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new items: + # Card + - title: Start with GDPR basics + itemType: get-started + url: gdpr-it-guidance.md + # Card + - title: Configure Windows diagnostic data + itemType: how-to-guide + url: configure-windows-diagnostic-data-in-your-organization.md + # Card + - title: View Windows diagnostic data + itemType: how-to-guide + url: diagnostic-data-viewer-overview.md - - type: paragraph +# productDirectory section (optional) +productDirectory: + title: Understand Windows diagnostic data in Windows 10 + summary: For the latest Windows 10 version, learn more about what Windows diagnostic data is collected at various diagnostics levels. + items: + # Card + - title: Basic level events and fields + # imageSrc should be square in ratio with no whitespace + imageSrc: https://docs.microsoft.com/media/common/i_extend.svg + summary: Learn more about basic Windows diagnostic data events and fields collected. + url: basic-level-windows-diagnostic-events-and-fields.md + # Card + - title: Enhanced level events and fields + imageSrc: https://docs.microsoft.com/media/common/i_delivery.svg + summary: Learn more about Windows diagnostic data events and fields used by Windows Analytics. + url: enhanced-diagnostic-data-windows-analytics-events-and-fields.md + # Card + - title: Full level data categories + imageSrc: https://docs.microsoft.com/media/common/i_get-started.svg + summary: Learn more about all Windows diagnostic data collected. + url: windows-diagnostic-data.md - text: 'For the latest Windows 10 version, learn more about what Windows diagnostic data is collected at various diagnostics levels.' +# conceptualContent section (optional) +# conceptualContent: +# # itemType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | sample | tutorial | video | whats-new +# title: sectiontitle # < 60 chars (optional) +# summary: sectionsummary # < 160 chars (optional) +# items: +# # Card +# - title: cardtitle1 +# links: +# - url: file1.md OR https://docs.microsoft.com/file1 +# itemType: itemType +# text: linktext1 +# - url: file2.md OR https://docs.microsoft.com/file2 +# itemType: itemType +# text: linktext2 +# - url: file3.md OR https://docs.microsoft.com/file3 +# itemType: itemType +# text: linktext3 +# # footerLink (optional) +# footerLink: +# url: filefooter.md OR https://docs.microsoft.com/filefooter +# text: See more +# # Card +# - title: cardtitle2 +# links: +# - url: file1.md OR https://docs.microsoft.com/file1 +# itemType: itemType +# text: linktext1 +# - url: file2.md OR https://docs.microsoft.com/file2 +# itemType: itemType +# text: linktext2 +# - url: file3.md OR https://docs.microsoft.com/file3 +# itemType: itemType +# text: linktext3 +# # footerLink (optional) +# footerLink: +# url: filefooter.md OR https://docs.microsoft.com/filefooter +# text: See more +# # Card +# - title: cardtitle3 +# links: +# - url: file1.md OR https://docs.microsoft.com/file1 +# itemType: itemType +# text: linktext1 +# - url: file2.md OR https://docs.microsoft.com/file2 +# itemType: itemType +# text: linktext2 +# - url: file3.md OR https://docs.microsoft.com/file3 +# itemType: itemType +# text: linktext3 +# # footerLink (optional) +# footerLink: +# url: filefooter.md OR https://docs.microsoft.com/filefooter +# text: See more - - type: list +# # tools section (optional) +# tools: +# title: sectiontitle # < 60 chars (optional) +# summary: sectionsummary # < 160 chars (optional) +# items: +# # Card +# - title: cardtitle1 +# # imageSrc should be square in ratio with no whitespace +# imageSrc: ./media/index/image1.svg OR https://docs.microsoft.com/media/logos/image1.svg +# url: file1.md +# # Card +# - title: cardtitle2 +# imageSrc: ./media/index/image2.svg OR https://docs.microsoft.com/media/logos/image2.svg +# url: file2.md +# # Card +# - title: cardtitle3 +# imageSrc: ./media/index/image3.svg OR https://docs.microsoft.com/media/logos/image3.svg +# url: file3.md - style: cards +# additionalContent section (optional) +# Card with summary style +# additionalContent: +# # Supports up to 3 sections +# sections: +# - title: sectiontitle # < 60 chars (optional) +# summary: sectionsummary # < 160 chars (optional) +# items: +# # Card +# - title: cardtitle1 +# summary: cardsummary1 +# url: file1.md OR https://docs.microsoft.com/file1 +# # Card +# - title: cardtitle2 +# summary: cardsummary2 +# url: file1.md OR https://docs.microsoft.com/file2 +# # Card +# - title: cardtitle3 +# summary: cardsummary3 +# url: file1.md OR https://docs.microsoft.com/file3 +# # footer (optional) +# footer: "footertext [linktext](https://docs.microsoft.com/footerfile)" - className: cardsM - - columns: 3 - - items: - - - href: \windows\privacy\basic-level-windows-diagnostic-events-and-fields - - html:

Learn more about basic Windows diagnostic data events and fields collected

- - image: - - src: https://docs.microsoft.com/media/common/i_extend.svg - - title: Basic level events and fields - - - href: \windows\privacy\enhanced-diagnostic-data-windows-analytics-events-and-fields - - html:

Learn more about Windows diagnostic data events and fields used by Windows Analytics

- - image: - - src: https://docs.microsoft.com/media/common/i_delivery.svg - - title: Enhanced level events and fields - - - href: \windows\privacy\windows-diagnostic-data - - html:

Learn more about all Windows diagnostic data collected

- - image: - - src: https://docs.microsoft.com/media/common/i_get-started.svg - - title: Full level data categories - -- items: - - - type: list - - style: cards - - className: cardsL - - items: - - - title: View and manage Windows 10 connection endpoints - - html:
- -

Manage connections from Windows to Microsoft services

- - - title: Additional resources - - html:

Windows 10 on Trust Center

- -

GDPR on Microsoft 365 Compliance solutions

- -

Support for GDPR Accountability on Service Trust Portal

- \ No newline at end of file +# additionalContent section (optional) +# Card with links style +additionalContent: + # Supports up to 3 sections + sections: + - items: + # Card + - title: View and manage Windows 10 connection endpoints + links: + - text: Manage Windows 10 connection endpoints + url: manage-windows-endpoints.md + - text: Manage connections from Windows to Microsoft services + url: manage-connections-from-windows-operating-system-components-to-microsoft-services + # Card + - title: Additional resources + links: + - text: Windows 10 on Trust Center + url: https://www.microsoft.com/en-us/trustcenter/cloudservices/windows10 + - text: GDPR on Microsoft 365 Compliance solutions + url: https://docs.microsoft.com/microsoft-365/compliance/gdpr + - text: Support for GDPR Accountability on Service Trust Portal + url: https://servicetrust.microsoft.com/ViewPage/GDPRGetStarted + # footer (optional) + # footer: "footertext [linktext](https://docs.microsoft.com/footerfile)" \ No newline at end of file From 1007e02a81407f6294d035e99e1c0693a8430de8 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 2 Jun 2020 21:27:49 -0700 Subject: [PATCH 048/228] fixing security index yml while im here --- windows/security/index.yml | 110 ++++++++++++------------------------- 1 file changed, 35 insertions(+), 75 deletions(-) diff --git a/windows/security/index.yml b/windows/security/index.yml index ca0486b130..8dee80970e 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -1,80 +1,40 @@ -### YamlMime:YamlDocument +### YamlMime:Hub -documentType: LandingData - -title: Windows 10 Enterprise Security +title: Windows 10 Enterprise Security # < 60 chars +summary: Secure corporate data and manage risk. # < 160 chars +# brand: aspnet | azure | dotnet | dynamics | m365 | ms-graph | office | power-bi | power-platform | sql | sql-server | vs | visual-studio | windows | xamarin +brand: windows metadata: - - document_id: - - title: Windows 10 Enterprise Security - - description: Learn about enterprise-grade security features for Windows 10. - - keywords: protect, company, data, Windows, device, app, management, Microsoft365, e5, e3 - + title: Windows 10 Enterprise Security # Required; page title displayed in search results. Include the brand. < 60 chars. + description: Learn about enterprise-grade security features for Windows 10. # Required; article description that is displayed in search results. < 160 chars. + services: windows + product: windows + ms.topic: hub-page # Required + ms.collection: M365-security-compliance # Optional; Remove if no collection is used. + author: danihalfin #Required; your GitHub user alias, with correct capitalization. + ms.author: daniha #Required; microsoft alias of author; optional team alias. + ms.date: 01/08/2018 #Required; mm/dd/yyyy format. ms.localizationpriority: high - author: brianlic-msft - - ms.author: brianlic - - manager: brianlic - - ms.date: 08/01/2018 - - ms.topic: article - - ms.devlang: na - -sections: - -- items: - - - type: markdown - - text: Secure corporate data and manage risk. - -- items: - - - type: list - - style: cards - - className: cardsM - - columns: 3 - - items: - - - href: \windows\security\identity-protection\ - - html:

Deploy secure enterprise-grade authentication and access control to protect accounts and data

- - image: - - src: https://docs.microsoft.com/media/common/i_identity-protection.svg - - title: Identity and access management - - - href: \windows\security\threat-protection\ - - html:

Stop cyberthreats and quickly identify and respond to breaches

- - image: - - src: https://docs.microsoft.com/media/common/i_threat-protection.svg - - title: Threat protection - - - href: \windows\security\information-protection\ - - html:

Identify and secure critical data to prevent data loss

- - image: - - src: https://docs.microsoft.com/media/common/i_information-protection.svg - - title: Information protection - +# productDirectory section (optional) +productDirectory: + title: sectiontitle # < 60 chars (optional) + summary: sectionsummary # < 160 chars (optional) + items: + # Card + - title: Identity and access management + # imageSrc should be square in ratio with no whitespace + imageSrc: https://docs.microsoft.com/media/common/i_identity-protection.svg + summary: Deploy secure enterprise-grade authentication and access control to protect accounts and data + url: ./identity-protection/index.md + # Card + - title: Threat protection + imageSrc: https://docs.microsoft.com/media/common/i_threat-protection.svg + summary: Stop cyberthreats and quickly identify and respond to breaches + url: ./threat-protection/index.md + # Card + - title: Information protection + imageSrc: https://docs.microsoft.com/media/common/i_information-protection.svg + summary: Identify and secure critical data to prevent data loss + url: ./information-protection/index.md \ No newline at end of file From 95a680b27ebcbc767ea76397b0b543088ed89baf Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 2 Jun 2020 21:28:53 -0700 Subject: [PATCH 049/228] small fix --- windows/security/index.yml | 2 -- 1 file changed, 2 deletions(-) diff --git a/windows/security/index.yml b/windows/security/index.yml index 8dee80970e..bae44d7224 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -19,8 +19,6 @@ metadata: # productDirectory section (optional) productDirectory: - title: sectiontitle # < 60 chars (optional) - summary: sectionsummary # < 160 chars (optional) items: # Card - title: Identity and access management From 0ad5086beef7588eb495280fa7e0bafba440d18b Mon Sep 17 00:00:00 2001 From: Ramu Konidena Date: Tue, 2 Jun 2020 23:43:02 -0500 Subject: [PATCH 050/228] Removed TOC item --- browsers/internet-explorer/TOC.md | 1 - 1 file changed, 1 deletion(-) diff --git a/browsers/internet-explorer/TOC.md b/browsers/internet-explorer/TOC.md index ceb4d9b0f2..060f6ffb99 100644 --- a/browsers/internet-explorer/TOC.md +++ b/browsers/internet-explorer/TOC.md @@ -188,5 +188,4 @@ ### [Internet Explorer Setup command-line options and return codes](ie11-ieak/ie-setup-command-line-options-and-return-codes.md) ## KB Troubleshoot -### [Clear the Internet Explorer cache from a command line](kb-support/clear-ie-cache-from-command-line.md) ### [Internet Explorer and Microsoft Edge FAQ for IT Pros](kb-support/ie-edge-faqs.md) From 54e20894b4e9d3bc48ddc631984bdb9909e2a4b9 Mon Sep 17 00:00:00 2001 From: Steven DeQuincey <54139783+stdequin@users.noreply.github.com> Date: Wed, 3 Jun 2020 10:33:09 +0100 Subject: [PATCH 051/228] Updated faq Added in partner question on moving devices between orgs and needing to deregister a device, --- windows/deployment/windows-autopilot/autopilot-faq.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/deployment/windows-autopilot/autopilot-faq.md b/windows/deployment/windows-autopilot/autopilot-faq.md index 616f6b21ce..1cbfeeb11b 100644 --- a/windows/deployment/windows-autopilot/autopilot-faq.md +++ b/windows/deployment/windows-autopilot/autopilot-faq.md @@ -144,6 +144,7 @@ A [glossary](#glossary) of abbreviations used in this article is provided at the | What are some common causes of registration failures? |1. Bad or missing hardware hash entries can lead to faulty registration attempts
2. Hidden special characters in CSV files.

To avoid this issue, after creating your CSV file, open it in Notepad to look for hidden characters or trailing spaces or other corruptions.| | Is Autopilot supported on IoT devices? | Autopilot is not supported on IoT Core devices, and there are currently no plans to add this support. Autopilot is supported on Windows 10 IoT Enterprise SAC devices. Autopilot is supported on Windows 10 Enterprise LTSC 2019 and above; it is not supported on earlier versions of LTSC.| | Is Autopilot supported in all regions/countries? | Autopilot only supports customers using global Azure. Global Azure does not include the three entities listed below:
- Azure Germany
- Azure China 21Vianet
- Azure Government
So, if a customer is set up in global Azure, there are no region restrictions. For example, if Contoso uses global Azure but has employees working in China, the Contoso employees working in China would be able to use Autopilot to deploy devices. If Contoso uses Azure China 21Vianet, the Contoso employees would not be able to use Autopilot.| +| I need to register a device that's been previously registered to another organisation. | Partners registering devices through partner center can also deregister the device if it's moving between different customer tenants. If this isn't possible, as a last resort you can raise a ticket through the Intune "Help and Support" node and our support teams will assist you. | ## Glossary From be95597575f89114ebaa7871f36b667b7e52730b Mon Sep 17 00:00:00 2001 From: jdmartinez36 Date: Wed, 3 Jun 2020 11:36:04 -0600 Subject: [PATCH 052/228] Edit pass for security articles DO NOT MERGE Copy editing and requested edits for api-microsoft-flow and planning-to-deploy-windows-firewall-with-advanced-security. --- .../api-microsoft-flow.md | 52 +++++++++---------- ...windows-firewall-with-advanced-security.md | 38 +++++++++----- 2 files changed, 51 insertions(+), 39 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md index c093fcacb7..1cd0814c99 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-microsoft-flow.md @@ -21,61 +21,61 @@ ms.topic: article **Applies to:** [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) +- Want to experience Microsoft Defender ATP? [Sign up for a free trial.](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp?ocid=docs-wdatp-exposedapis-abovefoldlink) -Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional Cyber defenders, forces SOC to work in the most efficient way and automation is a must. MS flow supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within few minutes. +Automating security procedures is a standard requirement for every modern Security Operations Center. The lack of professional cyber defenders forces SOC to work in the most efficient way and automation is a must. Microsoft Power Automate supports different connectors that were built exactly for that. You can build an end-to-end procedure automation within a few minutes. -Microsoft Defender API has an official Flow Connector with a lot of capabilities: +Microsoft Defender API has an official Flow Connector with many capabilities. ![Image of edit credentials](images/api-flow-0.png) ## Usage example -The following example demonstrates how you can create a Flow that will be triggered any time a new Alert occurs on your tenant. +The following example demonstrates how to create a Flow that is triggered any time a new Alert occurs on your tenant. -- Login to [Microsoft Flow](https://flow.microsoft.com) +1. Log in to [Microsoft Power Automate](https://flow.microsoft.com). -- Go to: My flows > New > Automated +2. Go to **My flows** > **New** > **Automated-from blank**. -![Image of edit credentials](images/api-flow-1.png) + ![Image of edit credentials](images/api-flow-1.png) -- Choose a name for your Flow, Search for **Microsoft Defender ATP Triggers** as the trigger and choose the new Alerts trigger. +3. Choose a name for your Flow, search for "Microsoft Defender ATP Triggers" as the trigger, and then select the new Alerts trigger. -![Image of edit credentials](images/api-flow-2.png) + ![Image of edit credentials](images/api-flow-2.png) -- Now you have a Flow that is triggered every time a new Alert occurs. +Now you have a Flow that is triggered every time a new Alert occurs. ![Image of edit credentials](images/api-flow-3.png) -All you need to do now, is to choose your next steps. -Lets, for example, Isolate the machine if the Severity of the Alert is **High** and mail about it. -The Alert trigger gives us only the Alert ID and the Machine ID. We can use the Connector to expand these entities. +All you need to do now is choose your next steps. +For example, you can isolate the machine if the Severity of the Alert is High and send an email about it. +The Alert trigger provides only the Alert ID and the Machine ID. You can use the connector to expand these entities. -### Get the Alert entity using the connector +### Get the Alert entity using the connector -- Choose Microsoft Defender ATP for new step. +1. Choose **Microsoft Defender ATP** for the new step. -- Choose Alerts - Get single alert API. +2. Choose **Alerts - Get single alert API**. -- Set the Alert Id from the last step as Input. +3. Set the **Alert ID** from the last step as **Input**. -![Image of edit credentials](images/api-flow-4.png) + ![Image of edit credentials](images/api-flow-4.png) ### Isolate the machine if the Alert's severity is High -- Add **Condition** as a new step . +1. Add **Condition** as a new step. -- Check if Alert severity equals to **High**. +2. Check if the Alert severity **is equal to** High. -- If yes, add Microsoft Defender ATP - Isolate machine action with the Machine Id and a comment. + If yes, add the **Microsoft Defender ATP - Isolate machine** action with the Machine ID and a comment. -![Image of edit credentials](images/api-flow-5.png) + ![Image of edit credentials](images/api-flow-5.png) -Now you can add a new step for mailing about the Alert and the Isolation. -There are multiple Email connectors that are very easy to use, e.g. Outlook, GMail, etc.. -Save your flow and that's all. +3. Add a new step for emailing about the Alert and the Isolation. There are multiple email connectors that are very easy to use, such as Outlook or Gmail. -- You can also create **scheduled** flow that will run Advanced Hunting queries and much more! +4. Save your flow. + +You can also create a **scheduled** flow that runs Advanced Hunting queries and much more! ## Related topic - [Microsoft Defender ATP APIs](apis-intro.md) diff --git a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md index ba9cedf313..74dacfe608 100644 --- a/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md +++ b/windows/security/threat-protection/windows-firewall/planning-to-deploy-windows-firewall-with-advanced-security.md @@ -27,30 +27,42 @@ After you collect information about your environment and decide on a design by f ## Reviewing your Windows Defender Firewall with Advanced Security Design -If the design team that created the Windows Defender Firewall design for your organization is different from the deployment team that will implement it, make sure that the deployment team reviews the final design with the design team. Review the following points: +If the design team that created the Windows Defender Firewall design for your organization is different from the deployment team that will implement it, make sure the deployment team reviews the final design with the design team. Review the following information before starting your deployment. -- The design team's strategy for determining how WMI and security group filters attached to the GPOs will determine which devices apply to which GPO. The deployment team can refer to the following topics in the Windows Defender Firewall with Advanced Security Design Guide: +### Decide which devices apply to which GPO - - [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md) +The design team's strategy for determining how WMI and security group filters attached to the GPOs will determine which devices apply to which GPO. The deployment team can refer to the following topics in the Windows Defender Firewall with Advanced Security Design Guide: - - [Planning the GPOs](planning-the-gpos.md) +- [Planning Isolation Groups for the Zones](planning-isolation-groups-for-the-zones.md) - - [Planning GPO Deployment](planning-gpo-deployment.md) +- [Planning the GPOs](planning-the-gpos.md) -- The communication to be allowed between members of each of the zones in the isolated domain and devices that are not part of the isolated domain or members of the isolated domain's exemption list. +- [Planning GPO Deployment](planning-gpo-deployment.md) -- The recommendation that domain controllers are exempted from IPsec authentication requirements. If they are not exempt and authentication fails, then domain clients might not be able to receive Group Policy updates to the IPsec connection security rules from the domain controllers. +### Configure communication between members and devices -- The rationale for configuring all IPsec authentication rules to request, not require, authentication until the successful negotiation of IPsec has been confirmed. If the rules are set to require authentication before confirming that authentication is working correctly, then communications between devices might fail. If the rules are set to request authentication only, then an IPsec authentication failure results in fall-back-to-clear behavior, so communications can continue while the authentication failures are investigated. +Decide what communication is to be allowed between members of each of the zones in the isolated domain and devices that are not part of the isolated domain or members of the isolated domain's exemption list. -- The requirement that all devices that must communicate with each other share a common set of: +### Exempt domain controllers from IPsec authentication requirements - - Authentication methods +It is recommended that domain controllers are exempt from IPsec authentication requirements. If they are not exempt and authentication fails, then domain clients might not be able to receive Group Policy updates to the IPsec connection security rules from the domain controllers. - - Main mode key exchange algorithms +### Configure IPsec authentication rules - - Quick mode data integrity algorithms +The rationale for configuring all IPsec authentication rules to request, not require, authentication until the successful negotiation of IPsec has been confirmed. If the rules are set to require authentication before confirming that authentication is working correctly, then communications between devices might fail. If the rules are set to request authentication only, then an IPsec authentication failure results in fall-back-to-clear behavior. Communications can continue while the authentication failures are investigated. - If at least one set of each does not match between two devices, then the devices cannot successfully communicate. +### Make sure all devices can communicate with each other + +For all devices to communicate with each other, they must share a common set of: + +- Authentication methods + +- Main mode key exchange algorithms + +- Quick mode data integrity algorithms + +If at least one set of each does not match between two devices, then the devices cannot successfully communicate. + +## Deploy your Windows Firewall Design Plan After the design and deployment teams agree on these issues, they can proceed with the deployment of the Windows Defender Firewall design. For more information, see [Implementing Your Windows Defender Firewall with Advanced Security Design Plan](implementing-your-windows-firewall-with-advanced-security-design-plan.md). From 4c5f134d04b6b70b817e7492e7fe0134d06130a5 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 12:53:22 -0700 Subject: [PATCH 053/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index a4e6e02c6d..3b1df50bb1 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12863,7 +12863,7 @@ }, { "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", "redirect_document_id": true }, { From 5e5fe04f3364aa6cb856b270c2d624bd822cc318 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 12:54:32 -0700 Subject: [PATCH 054/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 3b1df50bb1..fa1ce5201f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -2043,12 +2043,12 @@ }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", "redirect_document_id": false }, { From 75295d6976b5c2474d31849fc077ef22461fbc88 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 3 Jun 2020 12:57:20 -0700 Subject: [PATCH 055/228] Added DDF downloadable links --- .../mdm/assignedaccess-csp.md | 2 - .../mdm/bitlocker-ddf-file.md | 3 - ...onfiguration-service-provider-reference.md | 6 +- windows/client-management/mdm/defender-csp.md | 3 - windows/client-management/mdm/defender-ddf.md | 1 - .../mdm/devdetail-ddf-file.md | 6 +- .../mdm/dmprocessconfigxmlfiltered.md | 4 +- .../mdm/enterprisemodernappmanagement-ddf.md | 3 - windows/client-management/mdm/office-ddf.md | 3 - .../policy-configuration-service-provider.md | 3 - .../mdm/policy-csp-activexcontrols.md | 2 + .../client-management/mdm/policy-csp-audit.md | 4 - .../client-management/mdm/policy-csp-bits.md | 4 - .../mdm/policy-csp-browser.md | 2 + .../mdm/policy-csp-credentialproviders.md | 2 + .../mdm/policy-csp-deviceguard.md | 3 - .../mdm/policy-csp-deviceinstallation.md | 3 - .../mdm/policy-csp-dmaguard.md | 3 - .../mdm/policy-csp-education.md | 3 - .../mdm/policy-csp-kerberos.md | 3 - .../mdm/policy-csp-restrictedgroups.md | 2 - .../mdm/policy-csp-security.md | 3 - .../client-management/mdm/policy-csp-start.md | 3 - .../mdm/policy-csp-taskmanager.md | 3 - .../mdm/policy-csp-textinput.md | 4 - .../mdm/policy-csp-update.md | 3 - ...olicy-csp-windowsdefendersecuritycenter.md | 3 - .../client-management/mdm/policy-ddf-file.md | 5054 ++++++++++++++++- .../client-management/mdm/supl-ddf-file.md | 5 +- 29 files changed, 4879 insertions(+), 264 deletions(-) diff --git a/windows/client-management/mdm/assignedaccess-csp.md b/windows/client-management/mdm/assignedaccess-csp.md index b8eb37197c..3a48ac399e 100644 --- a/windows/client-management/mdm/assignedaccess-csp.md +++ b/windows/client-management/mdm/assignedaccess-csp.md @@ -14,8 +14,6 @@ ms.date: 09/18/2018 # AssignedAccess CSP -**Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here.** - The AssignedAccess configuration service provider (CSP) is used to set the device to run in kiosk mode. Once the CSP has been executed, then the next user login that is associated with the kiosk mode puts the device into the kiosk mode running the application specified in the CSP configuration. For a step-by-step guide for setting up devices to run in kiosk mode, see [Set up a kiosk on Windows 10 Pro, Enterprise, or Education.](https://go.microsoft.com/fwlink/p/?LinkID=722211) diff --git a/windows/client-management/mdm/bitlocker-ddf-file.md b/windows/client-management/mdm/bitlocker-ddf-file.md index 19421997ba..edf7ea7a4b 100644 --- a/windows/client-management/mdm/bitlocker-ddf-file.md +++ b/windows/client-management/mdm/bitlocker-ddf-file.md @@ -14,9 +14,6 @@ manager: dansimp # BitLocker DDF file -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - This topic shows the OMA DM device description framework (DDF) for the **BitLocker** configuration service provider. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). diff --git a/windows/client-management/mdm/configuration-service-provider-reference.md b/windows/client-management/mdm/configuration-service-provider-reference.md index f93af2f2a2..59751b300b 100644 --- a/windows/client-management/mdm/configuration-service-provider-reference.md +++ b/windows/client-management/mdm/configuration-service-provider-reference.md @@ -9,14 +9,11 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 05/11/2020 +ms.date: 06/03/2020 --- # Configuration service provider reference -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - A configuration service provider (CSP) is an interface to read, set, modify, or delete configuration settings on the device. These settings map to registry keys or files. Some configuration service providers support the WAP format, some support SyncML, and some support both. SyncML is only used over–the–air for Open Mobile Alliance Device Management (OMA DM), whereas WAP can be used over–the–air for OMA Client Provisioning, or it can be included in the phone image as a .provxml file that is installed during boot. For information about the bridge WMI provider classes that map to these CSPs, see [MDM Bridge WMI Provider](https://msdn.microsoft.com/library/windows/desktop/dn905224). For CSP DDF files, see [CSP DDF files download](#csp-ddf-files-download). @@ -2699,6 +2696,7 @@ Additional lists: ## CSP DDF files download You can download the DDF files for various CSPs from the links below: +- [Download all the DDF files for Windows 10, version 2004](https://download.microsoft.com/download/4/0/f/40f9ec45-3bea-442c-8afd-21edc1e057d8/Windows10_2004_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1903](https://download.microsoft.com/download/6/F/0/6F019079-6EB0-41B5-88E8-D1CE77DBA27B/Windows10_1903_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1809](https://download.microsoft.com/download/6/A/7/6A735141-5CFA-4C1B-94F4-B292407AF662/Windows10_1809_DDF_download.zip) - [Download all the DDF files for Windows 10, version 1803](https://download.microsoft.com/download/6/2/7/6276FE19-E3FD-4254-9C16-3C31CAA2DE50/Windows10_1803_DDF_download.zip) diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index a9993b1e63..8c398e4992 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -15,9 +15,6 @@ ms.date: 10/21/2019 # Defender CSP -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - The Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise. The following image shows the Windows Defender configuration service provider in tree format. diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md index e5c1dcd59e..6ca8fc6f49 100644 --- a/windows/client-management/mdm/defender-ddf.md +++ b/windows/client-management/mdm/defender-ddf.md @@ -15,7 +15,6 @@ ms.date: 10/21/2019 # Defender DDF file - This topic shows the OMA DM device description framework (DDF) for the **Defender** configuration service provider. DDF files are used only with OMA DM provisioning XML. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). diff --git a/windows/client-management/mdm/devdetail-ddf-file.md b/windows/client-management/mdm/devdetail-ddf-file.md index 47df0219d5..0ab07220b6 100644 --- a/windows/client-management/mdm/devdetail-ddf-file.md +++ b/windows/client-management/mdm/devdetail-ddf-file.md @@ -9,14 +9,11 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 07/11/2018 +ms.date: 06/03/2020 --- # DevDetail DDF file -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - This topic shows the OMA DM device description framework (DDF) for the **DevDetail** configuration service provider. DDF files are used only with OMA DM provisioning XML. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). @@ -724,4 +721,5 @@ The XML below is the current version for this CSP. + ``` diff --git a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md index 25b59bccc1..6bfc9c4ef7 100644 --- a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md +++ b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md @@ -24,8 +24,8 @@ ms.date: 06/26/2017 # DMProcessConfigXMLFiltered function -> **Important**   -The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. Please see [Connectivity configuration](https://msdn.microsoft.com/library/windows/hardware/dn757424) for more information about the new process for provisioning connectivity configuration. However, this function is still supported for other OEM uses. +[!Important] +> The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. Please see [Connectivity configuration](https://msdn.microsoft.com/library/windows/hardware/dn757424) for more information about the new process for provisioning connectivity configuration. However, this function is still supported for other OEM uses. Configures phone settings by using OMA Client Provisioning XML. Use of this function is strictly limited to the following scenarios. diff --git a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md index c9d550f250..aa2cdb680b 100644 --- a/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md +++ b/windows/client-management/mdm/enterprisemodernappmanagement-ddf.md @@ -14,9 +14,6 @@ ms.date: 10/01/2019 # EnterpriseModernAppManagement DDF -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - This topic shows the OMA DM device description framework (DDF) for the **EnterpriseModernAppManagement** configuration service provider. DDF files are used only with OMA DM provisioning XML. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). diff --git a/windows/client-management/mdm/office-ddf.md b/windows/client-management/mdm/office-ddf.md index 7f8b60345e..88e2b4dee5 100644 --- a/windows/client-management/mdm/office-ddf.md +++ b/windows/client-management/mdm/office-ddf.md @@ -14,9 +14,6 @@ ms.date: 08/15/2018 # Office DDF -> [!WARNING] -> Some information relates to prereleased product which may be substantially modified before it's commercially released. Microsoft makes no warranties, express or implied, with respect to the information provided here. - This topic shows the OMA DM device description framework (DDF) for the **Office** configuration service provider. DDF files are used only with OMA DM provisioning XML. Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 047fef66ae..0a8b288709 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -15,9 +15,6 @@ ms.date: 07/18/2019 # Policy CSP -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - The Policy configuration service provider enables the enterprise to configure policies on Windows 10. Use this configuration service provider to configure any company policies. The Policy configuration service provider has the following sub-categories: diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index d14be473a2..de8b3c5a94 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -109,6 +109,8 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. +- 7 - Added in Windows 10, version 1909. +- 8 - Added in Windows 10, version 2004. diff --git a/windows/client-management/mdm/policy-csp-audit.md b/windows/client-management/mdm/policy-csp-audit.md index 96103d4ca7..378f92cb1b 100644 --- a/windows/client-management/mdm/policy-csp-audit.md +++ b/windows/client-management/mdm/policy-csp-audit.md @@ -12,10 +12,6 @@ ms.date: 09/27/2019 # Policy CSP - Audit -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - -
diff --git a/windows/client-management/mdm/policy-csp-bits.md b/windows/client-management/mdm/policy-csp-bits.md index d7f56e3f4c..d4c64c584f 100644 --- a/windows/client-management/mdm/policy-csp-bits.md +++ b/windows/client-management/mdm/policy-csp-bits.md @@ -14,10 +14,6 @@ manager: dansimp # Policy CSP - BITS -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - - The following bandwidth policies are used together to define the bandwidth-throttling schedule and transfer rate. - BITS/BandwidthThrottlingEndTime diff --git a/windows/client-management/mdm/policy-csp-browser.md b/windows/client-management/mdm/policy-csp-browser.md index 4b686d7c13..3f68b4b8cb 100644 --- a/windows/client-management/mdm/policy-csp-browser.md +++ b/windows/client-management/mdm/policy-csp-browser.md @@ -4303,5 +4303,7 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. +- 7 - Added in Windows 10, version 1909. +- 8 - Added in Windows 10, version 2004. diff --git a/windows/client-management/mdm/policy-csp-credentialproviders.md b/windows/client-management/mdm/policy-csp-credentialproviders.md index 003b1ca8d3..d9cc3f9647 100644 --- a/windows/client-management/mdm/policy-csp-credentialproviders.md +++ b/windows/client-management/mdm/policy-csp-credentialproviders.md @@ -249,6 +249,8 @@ Footnotes: - 4 - Added in Windows 10, version 1803. - 5 - Added in Windows 10, version 1809. - 6 - Added in Windows 10, version 1903. +- 7 - Added in Windows 10, version 1909. +- 8 - Added in Windows 10, version 2004. diff --git a/windows/client-management/mdm/policy-csp-deviceguard.md b/windows/client-management/mdm/policy-csp-deviceguard.md index f34ee27dd5..00ab26dd22 100644 --- a/windows/client-management/mdm/policy-csp-deviceguard.md +++ b/windows/client-management/mdm/policy-csp-deviceguard.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - DeviceGuard -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-deviceinstallation.md b/windows/client-management/mdm/policy-csp-deviceinstallation.md index 4ced8ce8ab..f1c54d540a 100644 --- a/windows/client-management/mdm/policy-csp-deviceinstallation.md +++ b/windows/client-management/mdm/policy-csp-deviceinstallation.md @@ -14,9 +14,6 @@ ms.localizationpriority: medium # Policy CSP - DeviceInstallation -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md index 08eaddf872..d553a30d50 100644 --- a/windows/client-management/mdm/policy-csp-dmaguard.md +++ b/windows/client-management/mdm/policy-csp-dmaguard.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - DmaGuard -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index 3f4beef3e9..e316fbdb3f 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - Education -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-kerberos.md b/windows/client-management/mdm/policy-csp-kerberos.md index 200fde9087..f61798a6d7 100644 --- a/windows/client-management/mdm/policy-csp-kerberos.md +++ b/windows/client-management/mdm/policy-csp-kerberos.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - Kerberos -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-restrictedgroups.md b/windows/client-management/mdm/policy-csp-restrictedgroups.md index 4935d3f947..1707ca7bfc 100644 --- a/windows/client-management/mdm/policy-csp-restrictedgroups.md +++ b/windows/client-management/mdm/policy-csp-restrictedgroups.md @@ -14,8 +14,6 @@ manager: dansimp # Policy CSP - RestrictedGroups -> [!WARNING] -> Some information in this article relates to prereleased products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here.
diff --git a/windows/client-management/mdm/policy-csp-security.md b/windows/client-management/mdm/policy-csp-security.md index 0a4dcd146d..46499d7701 100644 --- a/windows/client-management/mdm/policy-csp-security.md +++ b/windows/client-management/mdm/policy-csp-security.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - Security -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-start.md b/windows/client-management/mdm/policy-csp-start.md index c5e74893fc..17a91ff2d8 100644 --- a/windows/client-management/mdm/policy-csp-start.md +++ b/windows/client-management/mdm/policy-csp-start.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - Start -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-taskmanager.md b/windows/client-management/mdm/policy-csp-taskmanager.md index 8a69418c47..7d502e9af7 100644 --- a/windows/client-management/mdm/policy-csp-taskmanager.md +++ b/windows/client-management/mdm/policy-csp-taskmanager.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - TaskManager -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-csp-textinput.md b/windows/client-management/mdm/policy-csp-textinput.md index a116d3b084..79e47c91f8 100644 --- a/windows/client-management/mdm/policy-csp-textinput.md +++ b/windows/client-management/mdm/policy-csp-textinput.md @@ -16,10 +16,6 @@ manager: dansimp -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before they are commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - -
diff --git a/windows/client-management/mdm/policy-csp-update.md b/windows/client-management/mdm/policy-csp-update.md index 9949285fca..3942b48f24 100644 --- a/windows/client-management/mdm/policy-csp-update.md +++ b/windows/client-management/mdm/policy-csp-update.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - Update -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - > [!NOTE] > If the MSA service is disabled, Windows Update will no longer offer feature updates to devices running Windows 10 1709 or higher. See [Feature updates are not being offered while other updates are](https://docs.microsoft.com/windows/deployment/update/windows-update-troubleshooting#feature-updates-are-not-being-offered-while-other-updates-are). diff --git a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md index 4db39b31f2..86ea14fd52 100644 --- a/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md +++ b/windows/client-management/mdm/policy-csp-windowsdefendersecuritycenter.md @@ -14,9 +14,6 @@ manager: dansimp # Policy CSP - WindowsDefenderSecurityCenter -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. -
diff --git a/windows/client-management/mdm/policy-ddf-file.md b/windows/client-management/mdm/policy-ddf-file.md index 8a9c1a34dc..7a522ee312 100644 --- a/windows/client-management/mdm/policy-ddf-file.md +++ b/windows/client-management/mdm/policy-ddf-file.md @@ -10,7 +10,7 @@ ms.prod: w10 ms.technology: windows author: manikadhiman ms.localizationpriority: medium -ms.date: 05/21/2019 +ms.date: 06/03/2020 --- # Policy DDF file @@ -20,6 +20,7 @@ This topic shows the OMA DM device description framework (DDF) for the **Policy* You can view various Policy DDF files by clicking the following links: +- [View the Policy DDF file for Windows 10, version 2004](https://download.microsoft.com/download/4/0/f/40f9ec45-3bea-442c-8afd-21edc1e057d8/PolicyDDF_all_2004.xml) - [View the Policy DDF file for Windows 10, version 1903](https://download.microsoft.com/download/0/C/D/0CD61812-8B9C-4846-AC4A-1545BFD201EE/PolicyDDF_all_1903.xml) - [View the Policy DDF file for Windows 10, version 1809](https://download.microsoft.com/download/7/3/5/735B8537-82F4-4CD1-B059-93984F9FAAC5/Policy_DDF_all_1809.xml) - [View the Policy DDF file for Windows 10, version 1803](https://download.microsoft.com/download/4/9/6/496534EE-8F0C-4F12-B084-A8502DA22430/PolicyDDF_all.xml) @@ -31,7 +32,7 @@ You can view various Policy DDF files by clicking the following links: You can download DDF files for various CSPs from [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). -The XML below is the DDF for Windows 10, version 1903. +The XML below is the DDF for Windows 10, version 2004. ```xml @@ -57,7 +58,7 @@ The XML below is the DDF for Windows 10, version 1903. - com.microsoft/9.0/MDM/Policy + com.microsoft/10.0/MDM/Policy @@ -1646,7 +1647,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically. -When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension. +When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension. When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. @@ -1657,11 +1658,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) @@ -2119,6 +2120,30 @@ Related policy: + + AllowGraphingCalculator + + + + + + + + This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. If you enable or don't configure this policy setting, users will be able to access graphing functionality. + + + + + + + + + + + text/plain + + + DefaultPrinterName @@ -11023,7 +11048,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically. -When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension. +When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension. When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. @@ -11034,11 +11059,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) @@ -11541,6 +11566,33 @@ Related policy: + + AllowGraphingCalculator + + + + + 1 + This policy setting allows you to control whether graphing functionality is available in the Windows Calculator app. If you disable this policy setting, graphing functionality will not be accessible in the Windows Calculator app. If you enable or don't configure this policy setting, users will be able to access graphing functionality. + + + + + + + + + + + text/plain + + + Programs.admx + Programs~AT~WindowsComponents~Calculator + AllowGraphingCalculator + LowestValueMostSecure + + DefaultPrinterName @@ -19509,7 +19561,7 @@ Related policy: - com.microsoft/9.0/MDM/Policy + com.microsoft/10.0/MDM/Policy @@ -19578,6 +19630,99 @@ Related policy: + + Properties + + + + + + + Properties of Win32 App ADMX Ingestion + + + + + + + + + + + + + + + * + + + + + + + Setting Type of Win32 App. Policy Or Preference + + + + + + + + + + + + + + + * + + + + + + + Unique ID of ADMX file + + + + + + + + + + + + + + + Version + + + + + + + + Version of ADMX file + + + + + + + + + + + + + + + + + * @@ -19607,6 +19752,7 @@ Related policy: + Unique ID of ADMX file @@ -20165,6 +20311,30 @@ Related policy: + + BlockNonAdminUserInstall + + + + + + + + + + + + + + + + + + + text/plain + + + DisableStoreOriginatedApps @@ -21098,6 +21268,1785 @@ Related policy: + + Audit + + + + + + + + + + + + + + + + + + + + + AccountLogon_AuditCredentialValidation + + + + + + + + This policy setting allows you to audit events generated by validation tests on user account logon credentials. + +Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative. + + + + + + + + + + + text/plain + + + + + AccountLogon_AuditKerberosAuthenticationService + + + + + + + + This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests. + +If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request. + + + + + + + + + + + text/plain + + + + + AccountLogon_AuditKerberosServiceTicketOperations + + + + + + + + This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts. + +If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account. + + + + + + + + + + + text/plain + + + + + AccountLogon_AuditOtherAccountLogonEvents + + + + + + + + This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. + +Currently, there are no events in this subcategory. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditAccountLockout + + + + + + + + This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out. + +If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts. + +Logon events are essential for understanding user activity and to detect potential attacks. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditGroupMembership + + + + + + + + This policy allows you to audit the group memberhsip information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. + +When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group memberhsip information cannot fit in a single security audit event. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditIPsecExtendedMode + + + + + + + + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditIPsecMainMode + + + + + + + + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditIPsecQuickMode + + + + + + + + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.If + you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditLogoff + + + + + + + + This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to. + +If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions. +If you do not configure this policy setting, no audit event is generated when a logon session is closed. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditLogon + + + + + + + + This policy setting allows you to audit events generated by user account logon attempts on the computer. +Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included: + Successful logon attempts. + Failed logon attempts. + Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command. + Security identifiers (SIDs) were filtered and not allowed to log on. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditNetworkPolicyServer + + + + + + + + This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock. +If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts. +If you do not configure this policy settings, IAS and NAP user access requests are not audited. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditOtherLogonLogoffEvents + + + + + + + + This policy setting allows you to audit other logon/logoff-related events that are not covered in the “Logon/Logoff” policy setting such as the following: + Terminal Services session disconnections. + New Terminal Services sessions. + Locking and unlocking a workstation. + Invoking a screen saver. + Dismissal of a screen saver. + Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration. + Access to a wireless network granted to a user or computer account. + Access to a wired 802.1x network granted to a user or computer account. + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditSpecialLogon + + + + + + + + This policy setting allows you to audit events generated by special logons such as the following : + The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. + A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121697). + + + + + + + + + + + text/plain + + + + + AccountLogonLogoff_AuditUserDeviceClaims + + + + + + + + This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. + +User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on. + +When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event. + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditApplicationGroupManagement + + + + + + + + This policy setting allows you to audit events generated by changes to application groups such as the following: + Application group is created, changed, or deleted. + Member is added or removed from an application group. + +If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an application group changes. + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditComputerAccountManagement + + + + + + + + This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted. + +If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a computer account changes. + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditDistributionGroupManagement + + + + + + + + This policy setting allows you to audit events generated by changes to distribution groups such as the following: + Distribution group is created, changed, or deleted. + Member is added or removed from a distribution group. + Distribution group type is changed. + +If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a distribution group changes. + +Note: Events in this subcategory are logged only on domain controllers. + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditOtherAccountManagementEvents + + + + + + + + This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following: + The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration. + The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack. + Changes to the Default Domain Group Policy under the following Group Policy paths: +Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy +Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditSecurityGroupManagement + + + + + + + + This policy setting allows you to audit events generated by changes to security groups such as the following: + Security group is created, changed, or deleted. + Member is added or removed from a security group. + Group type is changed. + +If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a security group changes. + + + + + + + + + + + text/plain + + + + + AccountManagement_AuditUserAccountManagement + + + + + + + + This policy setting allows you to audit changes to user accounts. Events include the following: + A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked. + A user account’s password is set or changed. + A security identifier (SID) is added to the SID History of a user account. + The Directory Services Restore Mode password is configured. + Permissions on administrative user accounts are changed. + Credential Manager credentials are backed up or restored. + +If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you do not configure this policy setting, no audit event is generated when a user account changes. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditDPAPIActivity + + + + + + + + This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720. + +If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditPNPActivity + + + + + + + + This policy setting allows you to audit when plug and play detects an external device. + +If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category. +If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditProcessCreation + + + + + + + + This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited. + +If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a process is created. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditProcessTermination + + + + + + + + This policy setting allows you to audit events generated when a process ends. + +If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a process ends. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditRPCEvents + + + + + + + + This policy setting allows you to audit inbound remote procedure call (RPC) connections. + +If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted. + + + + + + + + + + + text/plain + + + + + DetailedTracking_AuditTokenRightAdjusted + + + + + + + + This policy setting allows you to audit events generated by adjusting the privileges of a token. + + + + + + + + + + + text/plain + + + + + DSAccess_AuditDetailedDirectoryServiceReplication + + + + + + + + This policy setting allows you to audit events generated by detailed Active Directory Domain Services (AD DS) replication between domain controllers. + + + + + + + + + + + text/plain + + + + + DSAccess_AuditDirectoryServiceAccess + + + + + + + + This policy setting allows you to audit events generated when an Active Directory Domain Services (AD DS) object is accessed. + +Only AD DS objects with a matching system access control list (SACL) are logged. + +Events in this subcategory are similar to the Directory Service Access events available in previous versions of Windows. + + + + + + + + + + + text/plain + + + + + DSAccess_AuditDirectoryServiceChanges + + + + + + + + This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted. + +When possible, events logged in this subcategory indicate the old and new values of the object’s properties. + +Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged. + +Note: Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema. + +If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded. +If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made. + + + + + + + + + + + text/plain + + + + + DSAccess_AuditDirectoryServiceReplication + + + + + + + + This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers. + +If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication. +If you do not configure this policy setting, no audit event is generated during AD DS replication. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditApplicationGenerated + + + + + + + + This policy setting allows you to audit applications that generate events using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function. +Events in this subcategory include: + Creation of an application client context. + Deletion of an application client context. + Initialization of an application client context. + Other application operations using the Windows Auditing APIs. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditCentralAccessPolicyStaging + + + + + + + + This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object. + +If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows: +1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access. +2) Failure audits when configured records access attempts when: + a) The current central access policy does not grant access but the proposed policy grants access. + b) A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy. + +Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditCertificationServices + + + + + + + + This policy setting allows you to audit Active Directory Certificate Services (AD CS) operations. +AD CS operations include the following: + AD CS startup/shutdown/backup/restore. + Changes to the certificate revocation list (CRL). + New certificate requests. + Issuing of a certificate. + Revocation of a certificate. + Changes to the Certificate Manager settings for AD CS. + Changes in the configuration of AD CS. + Changes to a Certificate Services template. + Importing of a certificate. + Publishing of a certification authority certificate is to Active Directory Domain Services. + Changes to the security permissions for AD CS. + Archival of a key. + Importing of a key. + Retrieval of a key. + Starting of Online Certificate Status Protocol (OCSP) Responder Service. + Stopping of Online Certificate Status Protocol (OCSP) Responder Service. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditDetailedFileShare + + + + + + + + This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. + +If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures. + +Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditFileShare + + + + + + + + This policy setting allows you to audit attempts to access a shared folder. + +If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures. + +Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared folders on the system is audited. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditFileSystem + + + + + + + + This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see https://go.microsoft.com/fwlink/?LinkId=122083. + +If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL. + +Note: You can set a SACL on a file system object using the Security tab in that object's Properties dialog box. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditFilteringPlatformConnection + + + + + + + + This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP). The following events are included: + The Windows Firewall Service blocks an application from accepting incoming connections on the network. + The WFP allows a connection. + The WFP blocks a connection. + The WFP permits a bind to a local port. + The WFP blocks a bind to a local port. + The WFP allows a connection. + The WFP blocks a connection. + The WFP permits an application or service to listen on a port for incoming connections. + The WFP blocks an application or service to listen on a port for incoming connections. + +If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked. +If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditFilteringPlatformPacketDrop + + + + + + + + This policy setting allows you to audit packets that are dropped by Windows Filtering Platform (WFP). + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditHandleManipulation + + + + + + + + This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events. + +If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a handle is manipulated. + +Note: Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditKernelObject + + + + + + + + This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores. +Only kernel objects with a matching system access control list (SACL) generate security audit events. + +Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditOtherObjectAccessEvents + + + + + + + + This policy setting allows you to audit events generated by the management of task scheduler jobs or COM+ objects. +For scheduler jobs, the following are audited: + Job created. + Job deleted. + Job enabled. + Job disabled. + Job updated. +For COM+ objects, the following are audited: + Catalog object added. + Catalog object updated. + Catalog object deleted. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditRegistry + + + + + + + + This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL. + +If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL. + +Note: You can set a SACL on a registry object using the Permissions dialog box. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditRemovableStorage + + + + + + + + This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested. + +If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts. + +If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage. + + + + + + + + + + + text/plain + + + + + ObjectAccess_AuditSAM + + + + + + + + This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects. +SAM objects include the following: + SAM_ALIAS -- A local group. + SAM_GROUP -- A group that is not a local group. + SAM_USER – A user account. + SAM_DOMAIN – A domain. + SAM_SERVER – A computer account. +If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made. +Note: Only the System Access Control List (SACL) for SAM_SERVER can be modified. +Volume: High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121698). + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditAuthenticationPolicyChange + + + + + + + + This policy setting allows you to audit events generated by changes to the authentication policy such as the following: + Creation of forest and domain trusts. + Modification of forest and domain trusts. + Removal of forest and domain trusts. + Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy. + Granting of any of the following user rights to a user or group: + Access This Computer From the Network. + Allow Logon Locally. + Allow Logon Through Terminal Services. + Logon as a Batch Job. + Logon a Service. + Namespace collision. For example, when a new trust has the same name as an existing namespace name. + +If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when the authentication policy is changed. + +Note: The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified. + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditAuthorizationPolicyChange + + + + + + + + This policy setting allows you to audit events generated by changes to the authorization policy such as the following: + Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory. + Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory. + Changes in the Encrypted File System (EFS) policy. + Changes to the Resource attributes of an object. + Changes to the Central Access Policy (CAP) applied to an object. + +If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when the authorization policy changes. + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditFilteringPlatformPolicyChange + + + + + + + + This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP) such as the following: + IPsec services status. + Changes to IPsec policy settings. + Changes to Windows Firewall policy settings. + Changes to WFP providers and engine. + +If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP. + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditMPSSVCRuleLevelPolicyChange + + + + + + + + This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall. Events include the following: + Reporting of active policies when Windows Firewall service starts. + Changes to Windows Firewall rules. + Changes to Windows Firewall exception list. + Changes to Windows Firewall settings. + Rules ignored or not applied by Windows Firewall Service. + Changes to Windows Firewall Group Policy settings. + +If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC. + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditOtherPolicyChangeEvents + + + + + + + + This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following: + Trusted Platform Module (TPM) configuration changes. + Kernel-mode cryptographic self tests. + Cryptographic provider operations. + Cryptographic context operations or modifications. + Applied Central Access Policies (CAPs) changes. + Boot Configuration Data (BCD) modifications. + + + + + + + + + + + text/plain + + + + + PolicyChange_AuditPolicyChange + + + + + + + + This policy setting allows you to audit changes in the security audit policy settings such as the following: + Settings permissions and audit settings on the Audit Policy object. + Changes to the system audit policy. + Registration of security event sources. + De-registration of security event sources. + Changes to the per-user audit settings. + Changes to the value of CrashOnAuditFail. + Changes to the system access control list on a file system or registry object. + Changes to the Special Groups list. + +Note: System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change. + + + + + + + + + + + text/plain + + + + + PrivilegeUse_AuditNonSensitivePrivilegeUse + + + + + + + + This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights). +The following privileges are non-sensitive: + Access Credential Manager as a trusted caller. + Access this computer from the network. + Add workstations to domain. + Adjust memory quotas for a process. + Allow log on locally. + Allow log on through Terminal Services. + Bypass traverse checking. + Change the system time. + Create a pagefile. + Create global objects. + + Create permanent shared objects. + Create symbolic links. + Deny access this computer from the network. + Deny log on as a batch job. + Deny log on as a service. + Deny log on locally. + Deny log on through Terminal Services. + Force shutdown from a remote system. + Increase a process working set. + Increase scheduling priority. + Lock pages in memory. + Log on as a batch job. + Log on as a service. + Modify an object label. + Perform volume maintenance tasks. + Profile single process. + Profile system performance. + Remove computer from docking station. + Shut down the system. + Synchronize directory service data. + +If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls. +If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called. + + + + + + + + + + + text/plain + + + + + PrivilegeUse_AuditOtherPrivilegeUseEvents + + + + + + + + Not used. + + + + + + + + + + + text/plain + + + + + PrivilegeUse_AuditSensitivePrivilegeUse + + + + + + + + This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following: + A privileged service is called. + One of the following privileges are called: + Act as part of the operating system. + Back up files and directories. + Create a token object. + Debug programs. + Enable computer and user accounts to be trusted for delegation. + Generate security audits. + Impersonate a client after authentication. + Load and unload device drivers. + Manage auditing and security log. + Modify firmware environment values. + Replace a process-level token. + Restore files and directories. + Take ownership of files or other objects. + +If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made. + + + + + + + + + + + + text/plain + + + + + System_AuditIPsecDriver + + + + + + + + This policy setting allows you to audit events generated by the IPsec filter driver such as the following: + Startup and shutdown of the IPsec services. + Network packets dropped due to integrity check failure. + Network packets dropped due to replay check failure. + Network packets dropped due to being in plaintext. + Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated. + Inability to process IPsec filters. + +If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation. + + + + + + + + + + + text/plain + + + + + System_AuditOtherSystemEvents + + + + + + + + This policy setting allows you to audit any of the following events: + Startup and shutdown of the Windows Firewall service and driver. + Security policy processing by the Windows Firewall Service. + Cryptography key file and migration operations. + + + + + + + + + + + text/plain + + + + + System_AuditSecurityStateChange + + + + + + + + This policy setting allows you to audit events generated by changes in the security state of the computer such as the following events: + Startup and shutdown of the computer. + Change of system time. + Recovering the system from CrashOnAuditFail, which is logged after a system restarts when the security event log is full and the CrashOnAuditFail registry entry is configured. + + + + + + + + + + + text/plain + + + + + System_AuditSecuritySystemExtension + + + + + + + + This policy setting allows you to audit events related to security system extensions or services such as the following: + A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM. + A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account. +If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension. + + + + + + + + + + + text/plain + + + + + System_AuditSystemIntegrity + + + + + + + + This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following: + Events that could not be written to the event log because of a problem with the auditing system. + A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space. + The detection of a Remote Procedure Call (RPC) that compromises system integrity. + The detection of a hash value of an executable file that is not valid as determined by Code Integrity. + Cryptographic operations that compromise system integrity. + + + + + + + + + + + text/plain + + + + Authentication @@ -21759,6 +23708,30 @@ Related policy: + + SetMinimumEncryptionKeySize + + + + + + + + + + + + + + + + + + + text/plain + + + Browser @@ -23021,7 +24994,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically. -When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension. +When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension. When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. @@ -23032,11 +25005,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) @@ -25494,6 +27467,30 @@ Related policy: + + DOCacheHostSource + + + + + + + + + + + + + + + + + + + text/plain + + + DODelayBackgroundDownloadFromHttp @@ -25662,6 +27659,30 @@ Related policy: + + DOMaxBackgroundDownloadBandwidth + + + + + + + + + + + + + + + + + + + text/plain + + + DOMaxCacheAge @@ -25711,31 +27732,7 @@ Related policy: - DOMaxDownloadBandwidth - - - - - - - - - - - - - - - - - - - text/plain - - - - - DOMaxUploadBandwidth + DOMaxForegroundDownloadBandwidth @@ -25950,30 +27947,6 @@ Related policy: - - DOPercentageMaxDownloadBandwidth - - - - - - - - - - - - - - - - - - - text/plain - - - DOPercentageMaxForegroundBandwidth @@ -26328,6 +28301,30 @@ Related policy: + + AllowInstallationOfMatchingDeviceInstanceIDs + + + + + + + + + + + + + + + + + + + text/plain + + + AllowInstallationOfMatchingDeviceSetupClasses @@ -26424,6 +28421,30 @@ Related policy: + + PreventInstallationOfMatchingDeviceInstanceIDs + + + + + + + + + + + + + + + + + + + text/plain + + + PreventInstallationOfMatchingDeviceSetupClasses @@ -27888,6 +29909,124 @@ If you do not configure this policy setting, users will be able to choose whethe + + FactoryComposer + + + + + + + + + + + + + + + + + + + + + BackgroundImagePath + + + + + + + + + + + + + + + + + + + text/plain + + + + + OEMVersion + + + + + + + + + + + + + + + + + + + text/plain + + + + + UserToSignIn + + + + + + + + + + + + + + + + + + + text/plain + + + + + UWPLaunchOnBoot + + + + + + + + + + + + + + + + + + + text/plain + + + + FileExplorer @@ -28767,30 +30906,6 @@ If you do not configure this policy setting, users will be able to choose whethe - - DisableActiveXVersionListAutoDownload - - - - - - - - - - - - - - - - - - - text/plain - - - DisableAdobeFlash @@ -37961,6 +40076,102 @@ If the user has configured a slide show to run on the lock screen when the machi + + LetAppsAccessBackgroundSpatialPerception + + + + + + + + This policy setting specifies whether Windows apps can access the movement of the user's head, hands, motion controllers, and other tracked objects, while the apps are running in the background. + + + + + + + + + + + text/plain + + + + + LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + + + + LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps + + + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the user movements privacy setting for the listed apps. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + + LetAppsAccessCalendar @@ -44048,6 +46259,90 @@ If you disable or do not configure this policy setting, File History can be acti + + ConfigureJapaneseIMEVersion + + + + + + + + This policy allows the IT admin to configure the Microsoft Japanese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Japanese IME is on by default. Allow to control Microsoft Japanese IME version to use. +1 - The previous version of Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use. +2 - The new Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use. + + + + + + + + + + + text/plain + + + + + ConfigureSimplifiedChineseIMEVersion + + + + + + + + This policy allows the IT admin to configure the Microsoft Simplified Chinese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Simplified Chinese IME is on by default. Allow to control Microsoft Simplified Chinese IME version to use. +1 - The previous version of Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use. +2 - The new Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use. + + + + + + + + + + + text/plain + + + + + ConfigureTraditionalChineseIMEVersion + + + + + + + + This policy allows the IT admin to configure the Microsoft Traditional Chinese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Traditional Chinese IME is on by default. Allow to control Microsoft Traditional Chinese IME version to use. +1 - The previous version of Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use. +2 - The new Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use. + + + + + + + + + + + text/plain + + + EnableTouchKeyboardAutoInvokeInDesktopMode @@ -45857,6 +48152,30 @@ If you disable or do not configure this policy setting, the wake setting as spec + + TargetReleaseVersion + + + + + + + + + + + + + + + + + + + text/plain + + + UpdateNotificationLevel @@ -48510,6 +50829,33 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi LastWrite + + BlockNonAdminUserInstall + + + + + 0 + + + + + + + + + + + + text/plain + + + AppxPackageManager.admx + AppxPackageManager~AT~WindowsComponents~AppxDeployment + BlockNonAdminUserInstall + LowestValueMostSecure + + DisableStoreOriginatedApps @@ -49577,6 +51923,1960 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi + + Audit + + + + + + + + + + + + + + + + + + + AccountLogon_AuditCredentialValidation + + + + + 0 + This policy setting allows you to audit events generated by validation tests on user account logon credentials. + +Events in this subcategory occur only on the computer that is authoritative for those credentials. For domain accounts, the domain controller is authoritative. For local accounts, the local computer is authoritative. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon + Audit Credential Validation + LastWrite + + + + AccountLogon_AuditKerberosAuthenticationService + + + + + 0 + This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests. + +If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT request. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT request. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon + Audit Kerberos Authentication Service + LastWrite + + + + AccountLogon_AuditKerberosServiceTicketOperations + + + + + 0 + This policy setting allows you to audit events generated by Kerberos authentication ticket-granting ticket (TGT) requests submitted for user accounts. + +If you configure this policy setting, an audit event is generated after a Kerberos authentication TGT is requested for a user account. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated after a Kerberos authentication TGT is request for a user account. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon + Audit Kerberos Service Ticket Operations + LastWrite + + + + AccountLogon_AuditOtherAccountLogonEvents + + + + + 0 + This policy setting allows you to audit events generated by responses to credential requests submitted for a user account logon that are not credential validation or Kerberos tickets. + +Currently, there are no events in this subcategory. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Logon + Audit Other Account Logon Events + LastWrite + + + + AccountLogonLogoff_AuditAccountLockout + + + + + 1 + This policy setting allows you to audit events generated by a failed attempt to log on to an account that is locked out. + +If you configure this policy setting, an audit event is generated when an account cannot log on to a computer because the account is locked out. Success audits record successful attempts and Failure audits record unsuccessful attempts. + +Logon events are essential for understanding user activity and to detect potential attacks. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Account Lockout + LastWrite + + + + AccountLogonLogoff_AuditGroupMembership + + + + + 0 + This policy allows you to audit the group memberhsip information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. + +When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the group memberhsip information cannot fit in a single security audit event. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Group Membership + LastWrite + + + + AccountLogonLogoff_AuditIPsecExtendedMode + + + + + 0 + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Extended Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Extended Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated during an IPsec Extended Mode negotiation. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit IPsec Extended Mode + LastWrite + + + + AccountLogonLogoff_AuditIPsecMainMode + + + + + 0 + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Main Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Main Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated during an IPsec Main Mode negotiation. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit IPsec Main Mode + LastWrite + + + + AccountLogonLogoff_AuditIPsecQuickMode + + + + + 0 + This policy setting allows you to audit events generated by Internet Key Exchange protocol (IKE) and Authenticated Internet Protocol (AuthIP) during Quick Mode negotiations. + +If you configure this policy setting, an audit event is generated during an IPsec Quick Mode negotiation. Success audits record successful attempts and Failure audits record unsuccessful attempts.If + you do not configure this policy setting, no audit event is generated during an IPsec Quick Mode negotiation. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit IPsec Quick Mode + LastWrite + + + + AccountLogonLogoff_AuditLogoff + + + + + 1 + This policy setting allows you to audit events generated by the closing of a logon session. These events occur on the computer that was accessed. For an interactive logoff the security audit event is generated on the computer that the user account logged on to. + +If you configure this policy setting, an audit event is generated when a logon session is closed. Success audits record successful attempts to close sessions and Failure audits record unsuccessful attempts to close sessions. +If you do not configure this policy setting, no audit event is generated when a logon session is closed. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Logoff + LastWrite + + + + AccountLogonLogoff_AuditLogon + + + + + 1 + This policy setting allows you to audit events generated by user account logon attempts on the computer. +Events in this subcategory are related to the creation of logon sessions and occur on the computer which was accessed. For an interactive logon, the security audit event is generated on the computer that the user account logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. The following events are included: + Successful logon attempts. + Failed logon attempts. + Logon attempts using explicit credentials. This event is generated when a process attempts to log on an account by explicitly specifying that account’s credentials. This most commonly occurs in batch logon configurations, such as scheduled tasks or when using the RUNAS command. + Security identifiers (SIDs) were filtered and not allowed to log on. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Logon + LastWrite + + + + AccountLogonLogoff_AuditNetworkPolicyServer + + + + + 3 + This policy setting allows you to audit events generated by RADIUS (IAS) and Network Access Protection (NAP) user access requests. These requests can be Grant, Deny, Discard, Quarantine, Lock, and Unlock. +If you configure this policy setting, an audit event is generated for each IAS and NAP user access request. Success audits record successful user access requests and Failure audits record unsuccessful attempts. +If you do not configure this policy settings, IAS and NAP user access requests are not audited. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Network Policy Server + LastWrite + + + + AccountLogonLogoff_AuditOtherLogonLogoffEvents + + + + + 0 + This policy setting allows you to audit other logon/logoff-related events that are not covered in the “Logon/Logoff” policy setting such as the following: + Terminal Services session disconnections. + New Terminal Services sessions. + Locking and unlocking a workstation. + Invoking a screen saver. + Dismissal of a screen saver. + Detection of a Kerberos replay attack, in which a Kerberos request was received twice with identical information. This condition could be caused by network misconfiguration. + Access to a wireless network granted to a user or computer account. + Access to a wired 802.1x network granted to a user or computer account. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Other Logon Logoff Events + LastWrite + + + + AccountLogonLogoff_AuditSpecialLogon + + + + + 1 + This policy setting allows you to audit events generated by special logons such as the following : + The use of a special logon, which is a logon that has administrator-equivalent privileges and can be used to elevate a process to a higher level. + A logon by a member of a Special Group. Special Groups enable you to audit events generated when a member of a certain group has logged on to your network. You can configure a list of group security identifiers (SIDs) in the registry. If any of those SIDs are added to a token during logon and the subcategory is enabled, an event is logged. For more information about this feature, see article 947223 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121697). + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit Special Logon + LastWrite + + + + AccountLogonLogoff_AuditUserDeviceClaims + + + + + 0 + This policy allows you to audit user and device claims information in the user's logon token. Events in this subcategory are generated on the computer on which a logon session is created. For an interactive logon, the security audit event is generated on the computer that the user logged on to. For a network logon, such as accessing a shared folder on the network, the security audit event is generated on the computer hosting the resource. + +User claims are added to a logon token when claims are included with a user's account attributes in Active Directory. Device claims are added to the logon token when claims are included with a device's computer account attributes in Active Directory. In addition, compound identity must be enabled for the domain and on the computer where the user logged on. + +When this setting is configured, one or more security audit events are generated for each successful logon. You must also enable the Audit Logon setting under Advanced Audit Policy Configuration\System Audit Policies\Logon/Logoff. Multiple events are generated if the user and device claims information cannot fit in a single security audit event. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Logon/Logoff + Audit User Device Claims + LastWrite + + + + AccountManagement_AuditApplicationGroupManagement + + + + + 0 + This policy setting allows you to audit events generated by changes to application groups such as the following: + Application group is created, changed, or deleted. + Member is added or removed from an application group. + +If you configure this policy setting, an audit event is generated when an attempt to change an application group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an application group changes. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit Application Group Management + LastWrite + + + + AccountManagement_AuditComputerAccountManagement + + + + + 0 + This policy setting allows you to audit events generated by changes to computer accounts such as when a computer account is created, changed, or deleted. + +If you configure this policy setting, an audit event is generated when an attempt to change a computer account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a computer account changes. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit Computer Account Management + LastWrite + + + + AccountManagement_AuditDistributionGroupManagement + + + + + 0 + This policy setting allows you to audit events generated by changes to distribution groups such as the following: + Distribution group is created, changed, or deleted. + Member is added or removed from a distribution group. + Distribution group type is changed. + +If you configure this policy setting, an audit event is generated when an attempt to change a distribution group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a distribution group changes. + +Note: Events in this subcategory are logged only on domain controllers. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit Distributio Group Management + LastWrite + + + + AccountManagement_AuditOtherAccountManagementEvents + + + + + 0 + This policy setting allows you to audit events generated by other user account changes that are not covered in this category, such as the following: + The password hash of a user account was accessed. This typically happens during an Active Directory Management Tool password migration. + The Password Policy Checking API was called. Calls to this function can be part of an attack when a malicious application tests the policy to reduce the number of attempts during a password dictionary attack. + Changes to the Default Domain Group Policy under the following Group Policy paths: +Computer Configuration\Windows Settings\Security Settings\Account Policies\Password Policy +Computer Configuration\Windows Settings\Security Settings\Account Policies\Account Lockout Policy + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit Other Account Management Events + LastWrite + + + + AccountManagement_AuditSecurityGroupManagement + + + + + 1 + This policy setting allows you to audit events generated by changes to security groups such as the following: + Security group is created, changed, or deleted. + Member is added or removed from a security group. + Group type is changed. + +If you configure this policy setting, an audit event is generated when an attempt to change a security group is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a security group changes. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit Security Group Management + LastWrite + + + + AccountManagement_AuditUserAccountManagement + + + + + 1 + This policy setting allows you to audit changes to user accounts. Events include the following: + A user account is created, changed, deleted; renamed, disabled, enabled, locked out, or unlocked. + A user account’s password is set or changed. + A security identifier (SID) is added to the SID History of a user account. + The Directory Services Restore Mode password is configured. + Permissions on administrative user accounts are changed. + Credential Manager credentials are backed up or restored. + +If you configure this policy setting, an audit event is generated when an attempt to change a user account is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. If you do not configure this policy setting, no audit event is generated when a user account changes. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Account Management + Audit User Account Management + LastWrite + + + + DetailedTracking_AuditDPAPIActivity + + + + + 0 + This policy setting allows you to audit events generated when encryption or decryption requests are made to the Data Protection application interface (DPAPI). DPAPI is used to protect secret information such as stored password and key information. For more information about DPAPI, see https://go.microsoft.com/fwlink/?LinkId=121720. + +If you configure this policy setting, an audit event is generated when an encryption or decryption request is made to DPAPI. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated when an encryption or decryption request is made to DPAPI. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit DPAPI Activity + LastWrite + + + + DetailedTracking_AuditPNPActivity + + + + + 0 + This policy setting allows you to audit when plug and play detects an external device. + +If you configure this policy setting, an audit event is generated whenever plug and play detects an external device. Only Success audits are recorded for this category. +If you do not configure this policy setting, no audit event is generated when an external device is detected by plug and play. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit PNP Activity + LastWrite + + + + DetailedTracking_AuditProcessCreation + + + + + 0 + This policy setting allows you to audit events generated when a process is created or starts. The name of the application or user that created the process is also audited. + +If you configure this policy setting, an audit event is generated when a process is created. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a process is created. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit Process Creation + LastWrite + + + + DetailedTracking_AuditProcessTermination + + + + + 0 + This policy setting allows you to audit events generated when a process ends. + +If you configure this policy setting, an audit event is generated when a process ends. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a process ends. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit Process Termination + LastWrite + + + + DetailedTracking_AuditRPCEvents + + + + + 0 + This policy setting allows you to audit inbound remote procedure call (RPC) connections. + +If you configure this policy setting, an audit event is generated when a remote RPC connection is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a remote RPC connection is attempted. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit RPC Events + LastWrite + + + + DetailedTracking_AuditTokenRightAdjusted + + + + + 0 + This policy setting allows you to audit events generated by adjusting the privileges of a token. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Detailed Tracking + Audit Token Right Adjusted + LastWrite + + + + DSAccess_AuditDetailedDirectoryServiceReplication + + + + + 0 + This policy setting allows you to audit events generated by detailed Active Directory Domain Services (AD DS) replication between domain controllers. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access + Audit Detailed Directory Service Replication + LastWrite + + + + DSAccess_AuditDirectoryServiceAccess + + + + + 0 + This policy setting allows you to audit events generated when an Active Directory Domain Services (AD DS) object is accessed. + +Only AD DS objects with a matching system access control list (SACL) are logged. + +Events in this subcategory are similar to the Directory Service Access events available in previous versions of Windows. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access + Audit Directory Service Access + LastWrite + + + + DSAccess_AuditDirectoryServiceChanges + + + + + 0 + This policy setting allows you to audit events generated by changes to objects in Active Directory Domain Services (AD DS). Events are logged when an object is created, deleted, modified, moved, or undeleted. + +When possible, events logged in this subcategory indicate the old and new values of the object’s properties. + +Events in this subcategory are logged only on domain controllers, and only objects in AD DS with a matching system access control list (SACL) are logged. + +Note: Actions on some objects and properties do not cause audit events to be generated due to settings on the object class in the schema. + +If you configure this policy setting, an audit event is generated when an attempt to change an object in AD DS is made. Success audits record successful attempts, however unsuccessful attempts are NOT recorded. +If you do not configure this policy setting, no audit event is generated when an attempt to change an object in AD DS object is made. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access + Audit Directory Service Changes + LastWrite + + + + DSAccess_AuditDirectoryServiceReplication + + + + + 0 + This policy setting allows you to audit replication between two Active Directory Domain Services (AD DS) domain controllers. + +If you configure this policy setting, an audit event is generated during AD DS replication. Success audits record successful replication and Failure audits record unsuccessful replication. +If you do not configure this policy setting, no audit event is generated during AD DS replication. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~DS Access + Audit Directory Service Replication + LastWrite + + + + ObjectAccess_AuditApplicationGenerated + + + + + 0 + This policy setting allows you to audit applications that generate events using the Windows Auditing application programming interfaces (APIs). Applications designed to use the Windows Auditing API use this subcategory to log auditing events related to their function. +Events in this subcategory include: + Creation of an application client context. + Deletion of an application client context. + Initialization of an application client context. + Other application operations using the Windows Auditing APIs. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Application Generated + LastWrite + + + + ObjectAccess_AuditCentralAccessPolicyStaging + + + + + 0 + This policy setting allows you to audit access requests where the permission granted or denied by a proposed policy differs from the current central access policy on an object. + +If you configure this policy setting, an audit event is generated each time a user accesses an object and the permission granted by the current central access policy on the object differs from that granted by the proposed policy. The resulting audit event will be generated as follows: +1) Success audits, when configured, records access attempts when the current central access policy grants access but the proposed policy denies access. +2) Failure audits when configured records access attempts when: + a) The current central access policy does not grant access but the proposed policy grants access. + b) A principal requests the maximum access rights they are allowed and the access rights granted by the current central access policy are different than the access rights granted by the proposed policy. + +Volume: Potentially high on a file server when the proposed policy differs significantly from the current central access policy. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Central Access Policy Staging + LastWrite + + + + ObjectAccess_AuditCertificationServices + + + + + 0 + This policy setting allows you to audit Active Directory Certificate Services (AD CS) operations. +AD CS operations include the following: + AD CS startup/shutdown/backup/restore. + Changes to the certificate revocation list (CRL). + New certificate requests. + Issuing of a certificate. + Revocation of a certificate. + Changes to the Certificate Manager settings for AD CS. + Changes in the configuration of AD CS. + Changes to a Certificate Services template. + Importing of a certificate. + Publishing of a certification authority certificate is to Active Directory Domain Services. + Changes to the security permissions for AD CS. + Archival of a key. + Importing of a key. + Retrieval of a key. + Starting of Online Certificate Status Protocol (OCSP) Responder Service. + Stopping of Online Certificate Status Protocol (OCSP) Responder Service. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Certification Services + LastWrite + + + + ObjectAccess_AuditDetailedFileShare + + + + + 0 + This policy setting allows you to audit attempts to access files and folders on a shared folder. The Detailed File Share setting logs an event every time a file or folder is accessed, whereas the File Share setting only records one event for any connection established between a client and file share. Detailed File Share audit events include detailed information about the permissions or other criteria used to grant or deny access. + +If you configure this policy setting, an audit event is generated when an attempt is made to access a file or folder on a share. The administrator can specify whether to audit only successes, only failures, or both successes and failures. + +Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared files and folders on the system is audited. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Detailed File Share + LastWrite + + + + ObjectAccess_AuditFileShare + + + + + 0 + This policy setting allows you to audit attempts to access a shared folder. + +If you configure this policy setting, an audit event is generated when an attempt is made to access a shared folder. If this policy setting is defined, the administrator can specify whether to audit only successes, only failures, or both successes and failures. + +Note: There are no system access control lists (SACLs) for shared folders. If this policy setting is enabled, access to all shared folders on the system is audited. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit File Share + LastWrite + + + + ObjectAccess_AuditFileSystem + + + + + 0 + This policy setting allows you to audit user attempts to access file system objects. A security audit event is generated only for objects that have system access control lists (SACL) specified, and only if the type of access requested, such as Write, Read, or Modify and the account making the request match the settings in the SACL. For more information about enabling object access auditing, see https://go.microsoft.com/fwlink/?LinkId=122083. + +If you configure this policy setting, an audit event is generated each time an account accesses a file system object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an account accesses a file system object with a matching SACL. + +Note: You can set a SACL on a file system object using the Security tab in that object's Properties dialog box. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit File System + LastWrite + + + + ObjectAccess_AuditFilteringPlatformConnection + + + + + 0 + This policy setting allows you to audit connections that are allowed or blocked by the Windows Filtering Platform (WFP). The following events are included: + The Windows Firewall Service blocks an application from accepting incoming connections on the network. + The WFP allows a connection. + The WFP blocks a connection. + The WFP permits a bind to a local port. + The WFP blocks a bind to a local port. + The WFP allows a connection. + The WFP blocks a connection. + The WFP permits an application or service to listen on a port for incoming connections. + The WFP blocks an application or service to listen on a port for incoming connections. + +If you configure this policy setting, an audit event is generated when connections are allowed or blocked by the WFP. Success audits record events generated when connections are allowed and Failure audits record events generated when connections are blocked. +If you do not configure this policy setting, no audit event is generated when connected are allowed or blocked by the WFP. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Filtering Platform Connection + LastWrite + + + + ObjectAccess_AuditFilteringPlatformPacketDrop + + + + + 0 + This policy setting allows you to audit packets that are dropped by Windows Filtering Platform (WFP). + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Filtering Platform Packet Drop + LastWrite + + + + ObjectAccess_AuditHandleManipulation + + + + + 0 + This policy setting allows you to audit events generated when a handle to an object is opened or closed. Only objects with a matching system access control list (SACL) generate security audit events. + +If you configure this policy setting, an audit event is generated when a handle is manipulated. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a handle is manipulated. + +Note: Events in this subcategory generate events only for object types where the corresponding Object Access subcategory is enabled. For example, if File system object access is enabled, handle manipulation security audit events are generated. If Registry object access is not enabled, handle manipulation security audit events will not be generated. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Handle Manipulation + LastWrite + + + + ObjectAccess_AuditKernelObject + + + + + 0 + This policy setting allows you to audit attempts to access the kernel, which include mutexes and semaphores. +Only kernel objects with a matching system access control list (SACL) generate security audit events. + +Note: The Audit: Audit the access of global system objects policy setting controls the default SACL of kernel objects. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Kernel Object + LastWrite + + + + ObjectAccess_AuditOtherObjectAccessEvents + + + + + 0 + This policy setting allows you to audit events generated by the management of task scheduler jobs or COM+ objects. +For scheduler jobs, the following are audited: + Job created. + Job deleted. + Job enabled. + Job disabled. + Job updated. +For COM+ objects, the following are audited: + Catalog object added. + Catalog object updated. + Catalog object deleted. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Other Object Access Events + LastWrite + + + + ObjectAccess_AuditRegistry + + + + + 0 + This policy setting allows you to audit attempts to access registry objects. A security audit event is generated only for objects that have system access control lists (SACLs) specified, and only if the type of access requested, such as Read, Write, or Modify, and the account making the request match the settings in the SACL. + +If you configure this policy setting, an audit event is generated each time an account accesses a registry object with a matching SACL. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an account accesses a registry object with a matching SACL. + +Note: You can set a SACL on a registry object using the Permissions dialog box. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Registry + LastWrite + + + + ObjectAccess_AuditRemovableStorage + + + + + 0 + This policy setting allows you to audit user attempts to access file system objects on a removable storage device. A security audit event is generated only for all objects for all types of access requested. + +If you configure this policy setting, an audit event is generated each time an account accesses a file system object on a removable storage. Success audits record successful attempts and Failure audits record unsuccessful attempts. + +If you do not configure this policy setting, no audit event is generated when an account accesses a file system object on a removable storage. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit Removable Storage + LastWrite + + + + ObjectAccess_AuditSAM + + + + + 0 + This policy setting allows you to audit events generated by attempts to access to Security Accounts Manager (SAM) objects. +SAM objects include the following: + SAM_ALIAS -- A local group. + SAM_GROUP -- A group that is not a local group. + SAM_USER – A user account. + SAM_DOMAIN – A domain. + SAM_SERVER – A computer account. +If you configure this policy setting, an audit event is generated when an attempt to access a kernel object is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made. +Note: Only the System Access Control List (SACL) for SAM_SERVER can be modified. +Volume: High on domain controllers. For information about reducing the amount of events generated in this subcategory, see article 841001 in the Microsoft Knowledge Base (https://go.microsoft.com/fwlink/?LinkId=121698). + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Object Access + Audit SAM + LastWrite + + + + PolicyChange_AuditAuthenticationPolicyChange + + + + + 1 + This policy setting allows you to audit events generated by changes to the authentication policy such as the following: + Creation of forest and domain trusts. + Modification of forest and domain trusts. + Removal of forest and domain trusts. + Changes to Kerberos policy under Computer Configuration\Windows Settings\Security Settings\Account Policies\Kerberos Policy. + Granting of any of the following user rights to a user or group: + Access This Computer From the Network. + Allow Logon Locally. + Allow Logon Through Terminal Services. + Logon as a Batch Job. + Logon a Service. + Namespace collision. For example, when a new trust has the same name as an existing namespace name. + +If you configure this policy setting, an audit event is generated when an attempt to change the authentication policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when the authentication policy is changed. + +Note: The security audit event is logged when the group policy is applied. It does not occur at the time when the settings are modified. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit Authentication Policy Change + LastWrite + + + + PolicyChange_AuditAuthorizationPolicyChange + + + + + 0 + This policy setting allows you to audit events generated by changes to the authorization policy such as the following: + Assignment of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory. + Removal of user rights (privileges), such as SeCreateTokenPrivilege, that are not audited through the “Authentication Policy Change” subcategory. + Changes in the Encrypted File System (EFS) policy. + Changes to the Resource attributes of an object. + Changes to the Central Access Policy (CAP) applied to an object. + +If you configure this policy setting, an audit event is generated when an attempt to change the authorization policy is made. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when the authorization policy changes. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit Authorization Policy Change + LastWrite + + + + PolicyChange_AuditFilteringPlatformPolicyChange + + + + + 0 + This policy setting allows you to audit events generated by changes to the Windows Filtering Platform (WFP) such as the following: + IPsec services status. + Changes to IPsec policy settings. + Changes to Windows Firewall policy settings. + Changes to WFP providers and engine. + +If you configure this policy setting, an audit event is generated when a change to the WFP is attempted. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when a change occurs to the WFP. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit Filtering Platform Policy Change + LastWrite + + + + PolicyChange_AuditMPSSVCRuleLevelPolicyChange + + + + + 0 + This policy setting allows you to audit events generated by changes in policy rules used by the Microsoft Protection Service (MPSSVC). This service is used by Windows Firewall. Events include the following: + Reporting of active policies when Windows Firewall service starts. + Changes to Windows Firewall rules. + Changes to Windows Firewall exception list. + Changes to Windows Firewall settings. + Rules ignored or not applied by Windows Firewall Service. + Changes to Windows Firewall Group Policy settings. + +If you configure this policy setting, an audit event is generated by attempts to change policy rules used by the MPSSVC. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated by changes in policy rules used by the MPSSVC. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit MPSSVC Rule Level Policy Change + LastWrite + + + + PolicyChange_AuditOtherPolicyChangeEvents + + + + + 0 + This policy setting allows you to audit events generated by other security policy changes that are not audited in the policy change category, such as the following: + Trusted Platform Module (TPM) configuration changes. + Kernel-mode cryptographic self tests. + Cryptographic provider operations. + Cryptographic context operations or modifications. + Applied Central Access Policies (CAPs) changes. + Boot Configuration Data (BCD) modifications. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit Other Policy Change Events + LastWrite + + + + PolicyChange_AuditPolicyChange + + + + + 1 + This policy setting allows you to audit changes in the security audit policy settings such as the following: + Settings permissions and audit settings on the Audit Policy object. + Changes to the system audit policy. + Registration of security event sources. + De-registration of security event sources. + Changes to the per-user audit settings. + Changes to the value of CrashOnAuditFail. + Changes to the system access control list on a file system or registry object. + Changes to the Special Groups list. + +Note: System access control list (SACL) change auditing is done when a SACL for an object changes and the policy change category is enabled. Discretionary access control list (DACL) and ownership changes are audited when object access auditing is enabled and the object's SACL is configured for auditing of DACL/Owner change. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Policy Change + Audit Policy Change + LastWrite + + + + PrivilegeUse_AuditNonSensitivePrivilegeUse + + + + + 0 + This policy setting allows you to audit events generated by the use of non-sensitive privileges (user rights). +The following privileges are non-sensitive: + Access Credential Manager as a trusted caller. + Access this computer from the network. + Add workstations to domain. + Adjust memory quotas for a process. + Allow log on locally. + Allow log on through Terminal Services. + Bypass traverse checking. + Change the system time. + Create a pagefile. + Create global objects. + + Create permanent shared objects. + Create symbolic links. + Deny access this computer from the network. + Deny log on as a batch job. + Deny log on as a service. + Deny log on locally. + Deny log on through Terminal Services. + Force shutdown from a remote system. + Increase a process working set. + Increase scheduling priority. + Lock pages in memory. + Log on as a batch job. + Log on as a service. + Modify an object label. + Perform volume maintenance tasks. + Profile single process. + Profile system performance. + Remove computer from docking station. + Shut down the system. + Synchronize directory service data. + +If you configure this policy setting, an audit event is generated when a non-sensitive privilege is called. Success audits record successful calls and Failure audits record unsuccessful calls. +If you do not configure this policy setting, no audit event is generated when a non-sensitive privilege is called. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use + Audit Non Sensitive Privilege Use + LastWrite + + + + PrivilegeUse_AuditOtherPrivilegeUseEvents + + + + + 0 + Not used. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use + Audit Other Privilege Use Events + LastWrite + + + + PrivilegeUse_AuditSensitivePrivilegeUse + + + + + 0 + This policy setting allows you to audit events generated when sensitive privileges (user rights) are used such as the following: + A privileged service is called. + One of the following privileges are called: + Act as part of the operating system. + Back up files and directories. + Create a token object. + Debug programs. + Enable computer and user accounts to be trusted for delegation. + Generate security audits. + Impersonate a client after authentication. + Load and unload device drivers. + Manage auditing and security log. + Modify firmware environment values. + Replace a process-level token. + Restore files and directories. + Take ownership of files or other objects. + +If you configure this policy setting, an audit event is generated when sensitive privilege requests are made. Success audits record successful requests and Failure audits record unsuccessful requests. +If you do not configure this policy setting, no audit event is generated when sensitive privilege requests are made. + + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~Privilege Use + Audit Sensitive Privilege Use + LastWrite + + + + System_AuditIPsecDriver + + + + + 0 + This policy setting allows you to audit events generated by the IPsec filter driver such as the following: + Startup and shutdown of the IPsec services. + Network packets dropped due to integrity check failure. + Network packets dropped due to replay check failure. + Network packets dropped due to being in plaintext. + Network packets received with incorrect Security Parameter Index (SPI). This may indicate that either the network card is not working correctly or the driver needs to be updated. + Inability to process IPsec filters. + +If you configure this policy setting, an audit event is generated on an IPsec filter driver operation. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated on an IPSec filter driver operation. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System + Audit IPsec Driver + LastWrite + + + + System_AuditOtherSystemEvents + + + + + 3 + This policy setting allows you to audit any of the following events: + Startup and shutdown of the Windows Firewall service and driver. + Security policy processing by the Windows Firewall Service. + Cryptography key file and migration operations. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System + Audit Other System Events + LastWrite + + + + System_AuditSecurityStateChange + + + + + 1 + This policy setting allows you to audit events generated by changes in the security state of the computer such as the following events: + Startup and shutdown of the computer. + Change of system time. + Recovering the system from CrashOnAuditFail, which is logged after a system restarts when the security event log is full and the CrashOnAuditFail registry entry is configured. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System + Audit Security State Change + LastWrite + + + + System_AuditSecuritySystemExtension + + + + + 0 + This policy setting allows you to audit events related to security system extensions or services such as the following: + A security system extension, such as an authentication, notification, or security package is loaded and is registered with the Local Security Authority (LSA). It is used to authenticate logon attempts, submit logon requests, and any account or password changes. Examples of security system extensions are Kerberos and NTLM. + A service is installed and registered with the Service Control Manager. The audit log contains information about the service name, binary, type, start type, and service account. +If you configure this policy setting, an audit event is generated when an attempt is made to load a security system extension. Success audits record successful attempts and Failure audits record unsuccessful attempts. +If you do not configure this policy setting, no audit event is generated when an attempt is made to load a security system extension. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System + Audit Security System Extension + LastWrite + + + + System_AuditSystemIntegrity + + + + + 3 + This policy setting allows you to audit events that violate the integrity of the security subsystem, such as the following: + Events that could not be written to the event log because of a problem with the auditing system. + A process that uses a local procedure call (LPC) port that is not valid in an attempt to impersonate a client by replying, reading, or writing to or from a client address space. + The detection of a Remote Procedure Call (RPC) that compromises system integrity. + The detection of a hash value of an executable file that is not valid as determined by Code Integrity. + Cryptographic operations that compromise system integrity. + + + + + + + + + + + text/plain + + + phone + Windows Settings~Security Settings~Advanced Audit Policy Configuration~System Audit Policies~System + Audit System Integrity + LastWrite + + + Authentication @@ -50264,6 +54564,30 @@ Note: The first sign-in animation will not be shown on Server, so this policy wi LastWrite + + SetMinimumEncryptionKeySize + + + + + 0 + + + + + + + + + + + + text/plain + + + LastWrite + + Browser @@ -51675,7 +55999,7 @@ Due to Protected Settings (aka.ms/browserpolicy), this policy will only apply on You can define a list of extensions in Microsoft Edge that users cannot turn off. You must deploy extensions through any available enterprise deployment channel, such as Microsoft Intune. When you enable this policy, users cannot uninstall extensions from their computer, but they can configure options for extensions defined in this policy, such as allow for InPrivate browsing. Any additional permissions requested by future updates of the extension gets granted automatically. -When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and extension. +When you enable this policy, you must provide a semi-colon delimited list of extension package family names (PFNs). For example, adding Microsoft.OneNoteWebClipper_8wekyb3d8bbwe;Microsoft.OfficeOnline_8wekyb3d8bbwe prevents a user from turning off the OneNote Web Clipper and Office Online extension. When enabled, removing extensions from the list does not uninstall the extension from the user’s computer automatically. To uninstall the extension, use any available enterprise deployment channel. @@ -51686,11 +56010,11 @@ If disabled or not configured, extensions defined as part of this policy get ign Default setting: Disabled or not configured Related policies: Allow Developer Tools Related Documents: -- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/configmgr/protect/deploy-use/find-a-pfn-for-per-app-vpn) -- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/intune/windows-store-for-business) -- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/intune/apps-deploy) -- Manage apps from the Microsoft Store for Business with Microsoft Endpoint Configuration Manager (https://docs.microsoft.com/configmgr/apps/deploy-use/manage-apps-from-the-windows-store-for-business) -- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/intune/lob-apps-windows) +- Find a package family name (PFN) for per-app VPN (https://docs.microsoft.com/en-us/sccm/protect/deploy-use/find-a-pfn-for-per-app-vpn) +- How to manage apps you purchased from the Microsoft Store for Business with Microsoft Intune (https://docs.microsoft.com/en-us/intune/windows-store-for-business) +- How to assign apps to groups with Microsoft Intune (https://docs.microsoft.com/en-us/intune/apps-deploy) +- Manage apps from the Microsoft Store for Business with System Center Configuration Manager (https://docs.microsoft.com/en-us/sccm/apps/deploy-use/manage-apps-from-the-windows-store-for-business) +- How to add Windows line-of-business (LOB) apps to Microsoft Intune (https://docs.microsoft.com/en-us/intune/lob-apps-windows) @@ -54424,6 +58748,34 @@ Related policy: LastWrite + + DOCacheHostSource + + + + + 0 + + + + + + + + + + + + text/plain + + + DeliveryOptimization.admx + CacheHostSource + DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat + CacheHostSource + LastWrite + + DODelayBackgroundDownloadFromHttp @@ -54619,6 +58971,34 @@ Related policy: LastWrite + + DOMaxBackgroundDownloadBandwidth + + + + + 0 + + + + + + + + + + + + text/plain + + + DeliveryOptimization.admx + MaxBackgroundDownloadBandwidth + DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat + MaxBackgroundDownloadBandwidth + LastWrite + + DOMaxCacheAge @@ -54676,7 +59056,7 @@ Related policy: - DOMaxDownloadBandwidth + DOMaxForegroundDownloadBandwidth @@ -54697,37 +59077,9 @@ Related policy: DeliveryOptimization.admx - MaxDownloadBandwidth + MaxForegroundDownloadBandwidth DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat - MaxDownloadBandwidth - LastWrite - - - - DOMaxUploadBandwidth - - - - - 0 - - - - - - - - - - - - text/plain - - - DeliveryOptimization.admx - MaxUploadBandwidth - DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat - MaxUploadBandwidth + MaxForegroundDownloadBandwidth LastWrite @@ -54954,35 +59306,6 @@ Related policy: LastWrite - - DOPercentageMaxDownloadBandwidth - - - - - 0 - - - - - - - - - - - - text/plain - - - phone - DeliveryOptimization.admx - PercentageMaxDownloadBandwidth - DeliveryOptimization~AT~WindowsComponents~DeliveryOptimizationCat - PercentageMaxDownloadBandwidth - LastWrite - - DOPercentageMaxForegroundBandwidth @@ -55429,6 +59752,33 @@ Related policy: LastWrite + + AllowInstallationOfMatchingDeviceInstanceIDs + + + + + + + + + + + + + + + + + text/plain + + phone + deviceinstallation.admx + DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category + DeviceInstall_Instance_IDs_Allow + LastWrite + + AllowInstallationOfMatchingDeviceSetupClasses @@ -55537,6 +59887,33 @@ Related policy: LastWrite + + PreventInstallationOfMatchingDeviceInstanceIDs + + + + + + + + + + + + + + + + + text/plain + + phone + deviceinstallation.admx + DeviceInstallation~AT~System~DeviceInstall_Category~DeviceInstall_Restrictions_Category + DeviceInstall_Instance_IDs_Deny + LastWrite + + PreventInstallationOfMatchingDeviceSetupClasses @@ -57087,6 +61464,118 @@ If you do not configure this policy setting, users will be able to choose whethe + + FactoryComposer + + + + + + + + + + + + + + + + + + + BackgroundImagePath + + + + + + + + + + + + + + + + + text/plain + + LastWrite + + + + OEMVersion + + + + + unset; partners can set via settings customization! + + + + + + + + + + + + text/plain + + LastWrite + + + + UserToSignIn + + + + + + + + + + + + + + + + + text/plain + + LastWrite + + + + UWPLaunchOnBoot + + + + + + + + + + + + + + + + + text/plain + + LastWrite + + + FileExplorer @@ -58055,33 +62544,6 @@ If you do not configure this policy setting, users will be able to choose whethe LastWrite - - DisableActiveXVersionListAutoDownload - - - - - - - - - - - - - - - - - text/plain - - phone - inetres.admx - inetres~AT~WindowsComponents~InternetExplorer~SecurityFeatures~IESF_AddOnManagement - VersionListAutomaticDownloadDisable - LastWrite - - DisableAdobeFlash @@ -68232,6 +72694,102 @@ If the user has configured a slide show to run on the lock screen when the machi ; + + LetAppsAccessBackgroundSpatialPerception + + + + + 0 + This policy setting specifies whether Windows apps can access the movement of the user's head, hands, motion controllers, and other tracked objects, while the apps are running in the background. + + + + + + + + + + + text/plain + + + HighestValueMostSecure + + + + LetAppsAccessBackgroundSpatialPerception_ForceAllowTheseApps + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are allowed access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + LastWrite + ; + + + + LetAppsAccessBackgroundSpatialPerception_ForceDenyTheseApps + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. Listed apps are denied access to the user's movements while the apps are running in the background. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + LastWrite + ; + + + + LetAppsAccessBackgroundSpatialPerception_UserInControlOfTheseApps + + + + + + List of semi-colon delimited Package Family Names of Windows Store Apps. The user is able to control the user movements privacy setting for the listed apps. This setting overrides the default LetAppsAccessBackgroundSpatialPerception policy setting for the specified apps. + + + + + + + + + + + text/plain + + LastWrite + ; + + LetAppsAccessCalendar @@ -74951,6 +79509,99 @@ If you disable or do not configure this policy setting, File History can be acti LowestValueMostSecure + + ConfigureJapaneseIMEVersion + + + + + 0 + This policy allows the IT admin to configure the Microsoft Japanese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Japanese IME is on by default. Allow to control Microsoft Japanese IME version to use. +1 - The previous version of Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use. +2 - The new Microsoft Japanese IME is always selected. Not allowed to control Microsoft Japanese IME version to use. + + + + + + + + + + + text/plain + + + EAIME.admx + EAIME~AT~WindowsComponents~L_IME + L_ConfigureJapaneseImeVersion + LowestValueMostSecure + + + + ConfigureSimplifiedChineseIMEVersion + + + + + 0 + This policy allows the IT admin to configure the Microsoft Simplified Chinese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Simplified Chinese IME is on by default. Allow to control Microsoft Simplified Chinese IME version to use. +1 - The previous version of Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use. +2 - The new Microsoft Simplified Chinese IME is always selected. Not allowed to control Microsoft Simplified Chinese IME version to use. + + + + + + + + + + + text/plain + + + EAIME.admx + EAIME~AT~WindowsComponents~L_IME + L_ConfigureSimplifiedChineseImeVersion + LowestValueMostSecure + + + + ConfigureTraditionalChineseIMEVersion + + + + + 0 + This policy allows the IT admin to configure the Microsoft Traditional Chinese IME version in the desktop. +The following list shows the supported values: +0 (default) – The new Microsoft Traditional Chinese IME is on by default. Allow to control Microsoft Traditional Chinese IME version to use. +1 - The previous version of Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use. +2 - The new Microsoft Traditional Chinese IME is always selected. Not allowed to control Microsoft Traditional Chinese IME version to use. + + + + + + + + + + + text/plain + + + EAIME.admx + EAIME~AT~WindowsComponents~L_IME + L_ConfigureTraditionalChineseImeVersion + LowestValueMostSecure + + EnableTouchKeyboardAutoInvokeInDesktopMode @@ -76956,6 +81607,33 @@ If you disable or do not configure this policy setting, the wake setting as spec LastWrite + + TargetReleaseVersion + + + + + + + + + + + + + + + + + text/plain + + WindowsUpdate.admx + TargetReleaseVersionId + WindowsUpdate~AT~WindowsComponents~WindowsUpdateCat~DeferUpdateCat + TargetReleaseVersion + LastWrite + + UpdateNotificationLevel diff --git a/windows/client-management/mdm/supl-ddf-file.md b/windows/client-management/mdm/supl-ddf-file.md index e2b10b625a..2c1db8dd46 100644 --- a/windows/client-management/mdm/supl-ddf-file.md +++ b/windows/client-management/mdm/supl-ddf-file.md @@ -9,14 +9,11 @@ ms.topic: article ms.prod: w10 ms.technology: windows author: manikadhiman -ms.date: 07/20/2018 +ms.date: 06/03/2020 --- # SUPL DDF file -> [!WARNING] -> Some information relates to prereleased products, which may be substantially modified before it's commercially released. Microsoft makes no warranties, expressed or implied, concerning the information provided here. - This topic shows the OMA DM device description framework (DDF) for the **SUPL** configuration service provider (CSP). Looking for the DDF XML files? See [CSP DDF files download](configuration-service-provider-reference.md#csp-ddf-files-download). From 5985efe9067645af3ab5492e78b51a623875a963 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:00:00 -0700 Subject: [PATCH 056/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index fa1ce5201f..26289b0be6 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -2218,12 +2218,12 @@ }, { "source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -6133,22 +6133,22 @@ }, { "source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", "redirect_document_id": false }, { "source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", "redirect_document_id": true }, { From df87f3d497aec6b431f2b9e094111346fc98a3d2 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:01:33 -0700 Subject: [PATCH 057/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 26289b0be6..fd2e2252dd 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -6153,22 +6153,22 @@ }, { "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9388,7 +9388,7 @@ }, { "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9418,12 +9418,12 @@ }, { "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus", "redirect_document_id": true }, { From f681cb7d6369761bf6cafeee1f5542de74665998 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:02:53 -0700 Subject: [PATCH 058/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index fd2e2252dd..5daac41691 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -9438,7 +9438,7 @@ }, { "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9468,12 +9468,12 @@ }, { "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9488,7 +9488,7 @@ }, { "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus", "redirect_document_id": true }, { From 2be1f24778cf2a11f0ee07914ba59e9e0258689d Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:03:17 -0700 Subject: [PATCH 059/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5daac41691..efc40bf67f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -9493,17 +9493,17 @@ }, { "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { From 7131869912c575286d0be7f9f93654889bd9b2bf Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:03:43 -0700 Subject: [PATCH 060/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index efc40bf67f..4cd4ef471f 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -9508,7 +9508,7 @@ }, { "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9518,12 +9518,12 @@ }, { "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus", "redirect_document_id": true }, { From 4da55212acc50ea0ebf1f4483aed1965ceb89757 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:05:17 -0700 Subject: [PATCH 061/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4cd4ef471f..5de0db03ec 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -9533,7 +9533,7 @@ }, { "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9573,7 +9573,7 @@ }, { "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features", "redirect_document_id": true }, { @@ -9788,7 +9788,7 @@ }, { "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9883,7 +9883,7 @@ }, { "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9893,7 +9893,7 @@ }, { "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9903,7 +9903,7 @@ }, { "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9913,7 +9913,7 @@ }, { "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", "redirect_document_id": true }, { From 1822d51cc7b32cf0a697b97be539d0937f62fa41 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:06:07 -0700 Subject: [PATCH 062/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5de0db03ec..5a055d3aaa 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -10073,7 +10073,7 @@ }, { "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -10143,7 +10143,7 @@ }, { "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11778,12 +11778,12 @@ }, { "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11793,7 +11793,7 @@ }, { "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus", "redirect_document_id": true }, { From 6c6772310f2fca2bcefcb0c28c61bffb17ff06ff Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:06:38 -0700 Subject: [PATCH 063/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 5a055d3aaa..7e0f6e7a15 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -11798,7 +11798,7 @@ }, { "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11813,12 +11813,12 @@ }, { "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", "redirect_document_id": true }, { From 8115869c1640f3625e34cbab1d396bd25c7bbb0e Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:06:53 -0700 Subject: [PATCH 064/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 7e0f6e7a15..58df7287bd 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12293,7 +12293,7 @@ }, { "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", "redirect_document_id": true }, { From f4d244746bb14a465043f84348e48aaa959d8de3 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:07:16 -0700 Subject: [PATCH 065/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 58df7287bd..4942f73ca5 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12398,7 +12398,7 @@ }, { "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12463,7 +12463,7 @@ }, { "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus", "redirect_document_id": true }, { From 11525dbc20b407d1599864097a126671d21f8a11 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:07:28 -0700 Subject: [PATCH 066/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4942f73ca5..57cef0983d 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12473,7 +12473,7 @@ }, { "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus", "redirect_document_id": true }, { From 806224834c8498696d0bbd18777f118eb6babc18 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:07:43 -0700 Subject: [PATCH 067/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 57cef0983d..691053f995 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12643,7 +12643,7 @@ }, { "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus", "redirect_document_id": true }, { From ef28159942235d32a233b16916f4a20a92f0bfb2 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:08:11 -0700 Subject: [PATCH 068/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 691053f995..032114d273 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12858,17 +12858,17 @@ }, { "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", "redirect_document_id": true }, { From 6ccb3b82ec048736ac32ca74c99616f953951809 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:08:26 -0700 Subject: [PATCH 069/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 032114d273..4fda6179b1 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12888,7 +12888,7 @@ }, { "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus", "redirect_document_id": true }, { From 2456bdb920c3e82baaf62e5192fe835b5df3aec1 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:08:40 -0700 Subject: [PATCH 070/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4fda6179b1..77180ea1f9 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12983,7 +12983,7 @@ }, { "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { From a835a694246979ae9b2d261da60e0e8f65c192e4 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:09:14 -0700 Subject: [PATCH 071/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 77180ea1f9..0ded623b21 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -13103,22 +13103,22 @@ }, { "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-offline.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/windows-defender-offline", "redirect_document_id": true }, { From afdef1cdf45a2c855d1c313240ce6c408b3ed9b6 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 13:11:53 -0700 Subject: [PATCH 072/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 0ded623b21..d7834051e9 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -12458,7 +12458,7 @@ }, { "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -13123,7 +13123,7 @@ }, { "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus", "redirect_document_id": true }, { From 0a215a57153a401ba30eb30cbe894923b3c55081 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 3 Jun 2020 13:54:55 -0700 Subject: [PATCH 073/228] clarifying statement --- windows/security/threat-protection/intelligence/criteria.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/intelligence/criteria.md b/windows/security/threat-protection/intelligence/criteria.md index 311c43f82b..74c19eb50f 100644 --- a/windows/security/threat-protection/intelligence/criteria.md +++ b/windows/security/threat-protection/intelligence/criteria.md @@ -175,7 +175,7 @@ Microsoft uses specific categories and the category definitions to classify soft * **Cryptomining software:** Software that uses your device resources to mine cryptocurrencies. -* **Bundling software:** Software that offers to install other software that is not digitally signed by the same entity. Also, software that offers to install other software that qualifies as PUA based on the criteria outlined in this document. +* **Bundling software:** Software that offers to install other software that is not developed by the same entity or not required for the software to run. Also, software that offers to install other software that qualifies as PUA based on the criteria outlined in this document. * **Marketing software:** Software that monitors and transmits the activities of users to applications or services other than itself for marketing research. From d12475b3fc793612e0ec46f28a785e4e06511b46 Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 3 Jun 2020 14:23:51 -0700 Subject: [PATCH 074/228] Revert "Wdav redirects" --- .openpublishing.redirection.json | 112 +++++++++++++++---------------- 1 file changed, 56 insertions(+), 56 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index d7834051e9..a4e6e02c6d 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -2043,12 +2043,12 @@ }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus", "redirect_document_id": false }, { @@ -2218,12 +2218,12 @@ }, { "source_path": "windows/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus", "redirect_document_id": true }, { @@ -6133,42 +6133,42 @@ }, { "source_path": "windows/keep-secure/configure-windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/enable-pua-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/get-started-with-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", "redirect_document_id": false }, { "source_path": "windows/keep-secure/run-cmd-scan-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-for-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-block-at-first-sight.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-enhanced-notifications.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9388,7 +9388,7 @@ }, { "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9418,12 +9418,12 @@ }, { "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9438,7 +9438,7 @@ }, { "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9468,12 +9468,12 @@ }, { "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9488,27 +9488,27 @@ }, { "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9518,12 +9518,12 @@ }, { "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9533,7 +9533,7 @@ }, { "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9573,7 +9573,7 @@ }, { "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features", "redirect_document_id": true }, { @@ -9788,7 +9788,7 @@ }, { "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9883,7 +9883,7 @@ }, { "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9893,7 +9893,7 @@ }, { "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9903,7 +9903,7 @@ }, { "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus", "redirect_document_id": true }, { @@ -9913,7 +9913,7 @@ }, { "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus", "redirect_document_id": true }, { @@ -10073,7 +10073,7 @@ }, { "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus", "redirect_document_id": true }, { @@ -10143,7 +10143,7 @@ }, { "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus", "redirect_document_id": true }, { @@ -11778,12 +11778,12 @@ }, { "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus", "redirect_document_id": true }, { @@ -11793,12 +11793,12 @@ }, { "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus", "redirect_document_id": true }, { @@ -11813,12 +11813,12 @@ }, { "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12293,7 +12293,7 @@ }, { "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12398,7 +12398,7 @@ }, { "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12458,12 +12458,12 @@ }, { "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12473,7 +12473,7 @@ }, { "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12643,7 +12643,7 @@ }, { "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12858,17 +12858,17 @@ }, { "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12888,7 +12888,7 @@ }, { "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus", "redirect_document_id": true }, { @@ -12983,7 +12983,7 @@ }, { "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus", "redirect_document_id": true }, { @@ -13103,27 +13103,27 @@ }, { "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-offline.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/windows-defender-offline", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-offline", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus", "redirect_document_id": true }, { From c5a71cd9390a24a39a0e9754aec4ef339af3d587 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 3 Jun 2020 14:28:36 -0700 Subject: [PATCH 075/228] Corrected first note so that it renders correctly --- windows/client-management/mdm/dmprocessconfigxmlfiltered.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md index 6bfc9c4ef7..2e1b590d91 100644 --- a/windows/client-management/mdm/dmprocessconfigxmlfiltered.md +++ b/windows/client-management/mdm/dmprocessconfigxmlfiltered.md @@ -24,7 +24,7 @@ ms.date: 06/26/2017 # DMProcessConfigXMLFiltered function -[!Important] +> [!Important] > The use of this function for automatic data configuration (ADC) is deprecated in Windows Phone 8.1. Please see [Connectivity configuration](https://msdn.microsoft.com/library/windows/hardware/dn757424) for more information about the new process for provisioning connectivity configuration. However, this function is still supported for other OEM uses. From ca9ecb1530f1b7982531d35b68568371a0082af2 Mon Sep 17 00:00:00 2001 From: Ramu Konidena Date: Wed, 3 Jun 2020 16:47:22 -0500 Subject: [PATCH 076/228] Arbitrary change to force view staging server changes --- browsers/internet-explorer/kb-support/ie-edge-faqs.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/browsers/internet-explorer/kb-support/ie-edge-faqs.md b/browsers/internet-explorer/kb-support/ie-edge-faqs.md index ef07a2a337..0257a9db03 100644 --- a/browsers/internet-explorer/kb-support/ie-edge-faqs.md +++ b/browsers/internet-explorer/kb-support/ie-edge-faqs.md @@ -1,6 +1,6 @@ --- title: IE and Microsoft Edge FAQ for IT Pros -description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals. +description: Describes frequently asked questions about Internet Explorer and Microsoft Edge for IT professionals. audience: ITPro manager: msmets author: ramakoni1 From 7db505c54bfccb673f41b9440f0e39067c2a844e Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 3 Jun 2020 14:48:43 -0700 Subject: [PATCH 077/228] Acrolinx terminology: "Active Sync" --- .../mdm/policy-configuration-service-provider.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 0a8b288709..3f32491bba 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -4052,8 +4052,8 @@ The following diagram shows the Policy configuration service provider in tree fo ## Policy CSPs supported by Microsoft Surface Hub - [Policy CSPs supported by Microsoft Surface Hub](policy-csps-supported-by-surface-hub.md) -## Policy CSPs that can be set using Exchange Active Sync (EAS) -- [Policy CSPs that can be set using Exchange Active Sync (EAS)](policy-csps-that-can-be-set-using-eas.md) +## Policy CSPs that can be set using Exchange ActiveSync (EAS) +- [Policy CSPs that can be set using Exchange ActiveSync (EAS)](policy-csps-that-can-be-set-using-eas.md) ## Related topics From 864149f7217056b678a86e555c2dbe2330e47362 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 3 Jun 2020 14:50:00 -0700 Subject: [PATCH 078/228] Acrolinx terminology: "Activex" --- windows/client-management/mdm/policy-csp-activexcontrols.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-activexcontrols.md b/windows/client-management/mdm/policy-csp-activexcontrols.md index de8b3c5a94..7a981c49d8 100644 --- a/windows/client-management/mdm/policy-csp-activexcontrols.md +++ b/windows/client-management/mdm/policy-csp-activexcontrols.md @@ -74,7 +74,7 @@ manager: dansimp -This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved Activex Install sites specified by host URL. +This policy setting determines which ActiveX installation sites standard users in your organization can use to install ActiveX controls on their computers. When this setting is enabled, the administrator can create a list of approved ActiveX Install sites specified by host URL. If you enable this setting, the administrator can create a list of approved ActiveX Install sites specified by host URL. From e926d3162fa46749dca161acd6cc76af248d34a7 Mon Sep 17 00:00:00 2001 From: jdmartinez36 Date: Wed, 3 Jun 2020 16:11:29 -0600 Subject: [PATCH 079/228] Edit pass for Surface Book 3 Overview DO NOT MERGE Light copy edits for surface-book-quadro.md. Notes: Changed sentences in Table 3. For Adobe Substance Designer, edited confusing sentence by removing "powered" and replacing it with "that is". The author should verify that the new sentence is acceptable. For Autodesk 3ds Max, removed asterisks from second bullet. Not sure if this was a typo or meant to imply that the following text was a note. --- devices/surface/surface-book-quadro.md | 48 +++++++++++++------------- 1 file changed, 24 insertions(+), 24 deletions(-) diff --git a/devices/surface/surface-book-quadro.md b/devices/surface/surface-book-quadro.md index 8b1599f5b4..c1e6f3bcc2 100644 --- a/devices/surface/surface-book-quadro.md +++ b/devices/surface/surface-book-quadro.md @@ -15,29 +15,29 @@ audience: itpro --- # Surface Book 3 Quadro RTX 3000 technical overview - + Surface Book 3 for Business powered by the NVIDIA® Quadro RTX™ 3000 GPU is built for professionals who need real-time rendering, AI acceleration, advanced graphics, and compute performance in a portable form factor. Quadro RTX 3000 fundamentally changes what you can do with the new Surface Book 3: -- **Ray Tracing** - Produce stunning renders, designs and animations faster than ever before with 30 RT Cores for hardware-accelerated ray tracing. +- **Ray Tracing** - Produce stunning renders, designs and animations faster than ever before with 30 RT Cores for hardware-accelerated ray tracing. - **Artificial Intelligence** - Remove redundant, tedious tasks and compute intensive work with 240 Tensor Cores for GPU-accelerated AI. - **Advanced Graphics and Compute Technology** - Experience remarkable speed and interactivity during your most taxing graphics and compute workloads with 1,920 CUDA Cores and 6GB of GDDR6 memory. ## Enterprise grade solution -Of paramount importance to commercial customers, Quadro RTX 3000 brings a fully professional grade solution that combines accelerated ray tracing and deep learning capabilities with an integrated enterprise level management and support solution. Quadro drivers are tested and certified for more than 100 professional applications by leading ISVs providing an additional layer of quality assurance to validate stability, reliability, and performance. +Of paramount importance to commercial customers, Quadro RTX 3000 brings a fully professional-grade solution that combines accelerated ray tracing and deep learning capabilities with an integrated enterprise level management and support solution. Quadro drivers are tested and certified for more than 100 professional applications by leading ISVs, providing an additional layer of quality assurance to validate stability, reliability, and performance. -Quadro includes dedicated enterprise tools for remote management of Surface Book 3 devices with Quadro RTX 3000. IT admins can remotely configure graphics systems, save/restore configurations, continuously monitor graphics systems and perform remote troubleshooting if necessary. These capabilities along with deployment tools help maximize uptime and minimize IT support requirements. +Quadro includes dedicated enterprise tools for remote management of Surface Book 3 devices with Quadro RTX 3000. IT admins can remotely configure graphics systems, save/restore configurations, continuously monitor graphics systems, and perform remote troubleshooting if necessary. These capabilities along with deployment tools help maximize uptime and minimize IT support requirements. -NVIDIA develops and maintains Quadro Optimal Drivers for Enterprise (ODE) that are tuned, tested, and validated to provide enterprise level stability, reliability, availability, and support with extended product availability. Each driver release involves more than 2,000 man days of testing with professional applications test suites and test cases, as well as WHQL certification. Security threats are continually monitored, and regular security updates are released to protect against newly discovered vulnerabilities. In addition, Quadro drivers undergo an additional layer of testing by Surface engineering prior to release via Windows Update. +NVIDIA develops and maintains Quadro Optimal Drivers for Enterprise (ODE) that are tuned, tested, and validated to provide enterprise level stability, reliability, availability, and support with extended product availability. Each driver release involves more than 2,000 man-days of testing with professional applications test suites and test cases, as well as WHQL certification. Security threats are continually monitored, and regular security updates are released to protect against newly discovered vulnerabilities. In addition, Quadro drivers undergo an additional layer of testing by Surface engineering prior to release via Windows Update. ## Built for compute-intensive workloads -Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance of any Surface laptop, enabling advanced professionals to work from anywhere. +The Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance of any Surface laptop, enabling advanced professionals to work from anywhere. - **Creative professionals such as designers and animators.** Quadro RTX enables real-time cinematic-quality rendering through Turing-optimized ray tracing APIs such as NVIDIA OptiX, Microsoft DXR, and Vulkan. - **Architects and engineers using large, complex computer aided design (CAD) models and assemblies.** The RTX platform features the new NGX SDK to infuse powerful AI-enhanced capabilities into visual applications. This frees up time and resources through intelligent manipulation of images, automation of repetitive tasks, and optimization of compute-intensive processes. -- **Software developers across manufacturing, media & entertainment, medical, and other industries.** Quadro RTX speeds application development with ray tracing, deep learning, and rasterization capabilities through industry-leading software SDKs and APIs. +- **Software developers across manufacturing, media and entertainment, medical, and other industries.** Quadro RTX speeds application development with ray tracing, deep learning, and rasterization capabilities through industry-leading software SDKs and APIs. - **Data scientists using Tensor Cores and CUDA cores to accelerate computationally intensive tasks and other deep learning operations.** By using sensors, increased connectivity, and deep learning, researchers and developers can enable AI applications for everything from autonomous vehicles to scientific research. @@ -45,14 +45,14 @@ Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance of an | **Component** | **Description** | | --------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -| RT cores | Dedicated hardware-based ray-tracing technology allows the GPU to render film quality, photorealistic objects and environments with physically accurate shadows, reflections, and refractions. The real-time ray-tracing engine works with NVIDIA OptiX, Microsoft DXR, and Vulkan APIs to deliver a level of realism far beyond what is possible using traditional rendering techniques. RT cores accelerate the Bounding Volume Hierarchy (BVH) traversal and ray casting functions using low number of rays casted through a pixel. | -| Enhanced tensor cores | Mixed-precision cores purpose-built for deep learning matrix arithmetic, deliver 8x TFLOPS for training compared with previous generation. Quadro RTX 3000 utilizes 240 Tensor Cores; each Tensor Core performs 64 floating point fused multiply-add (FMA) operations per clock, and each streaming multiprocessor (SM) performs a total of 1,024 individual floating-point operations per clock. In addition to supporting FP16/FP32 matrix operations, new Tensor Cores added INT8 (2,048 integer operations per clock) and experimental INT4 and INT1 (binary) precision modes for matrix operations. | +| RT cores | Dedicated hardware-based ray-tracing technology allows the GPU to render film quality, photorealistic objects and environments with physically accurate shadows, reflections, and refractions. The real-time ray-tracing engine works with NVIDIA OptiX, Microsoft DXR, and Vulkan APIs to deliver a level of realism far beyond what is possible using traditional rendering techniques. RT cores accelerate the Bounding Volume Hierarchy (BVH) traversal and ray casting functions using low number of rays casted through a pixel. | +| Enhanced tensor cores | Mixed-precision cores purpose-built for deep learning matrix arithmetic, deliver 8x TFLOPS for training compared with previous generation. Quadro RTX 3000 utilizes 240 Tensor Cores; each Tensor Core performs 64 floating point fused multiply-add (FMA) operations per clock, and each streaming multiprocessor (SM) performs a total of 1,024 individual floating-point operations per clock. In addition to supporting FP16/FP32 matrix operations, new Tensor Cores added INT8 (2,048 integer operations per clock) and experimental INT4 and INT1 (binary) precision modes for matrix operations. | | Turing optimized software | Deep learning frameworks such as the Microsoft Cognitive Toolkit (CNTK), Caffe2, MXNet, TensorFlow, and others deliver significantly faster training times and higher multi-node training performance. GPU accelerated libraries such as cuDNN, cuBLAS, and TensorRT deliver higher performance for both deep learning inference and High-Performance Computing (HPC) applications. | | NVIDIA CUDA parallel computing platform | Natively execute standard programming languages like C/C++ and Fortran, and APIs such as OpenCL, OpenACC and Direct Compute to accelerate techniques such as ray tracing, video and image processing, and computation fluid dynamics. | -| Advanced streaming multiprocessor (SM) architecture | Combined shared memory and L1 cache improve performance significantly, while simplifying programming and reducing the tuning required to attain best application performance. | -| High performance GDDR6 Memory | Quadro RTX 3000 features 6GB of frame buffer making it the ideal platform for handling large datasets and latency-sensitive applications. | +| Advanced streaming multiprocessor (SM) architecture | Combined shared memory and L1 cache improve performance significantly, while simplifying programming and reducing the tuning required to attain the best application performance. | +| High performance GDDR6 Memory | Quadro RTX 3000 features 6GB of frame buffer, making it the ideal platform for handling large datasets and latency-sensitive applications. | | Single instruction, multiple thread (SIMT) | New independent thread scheduling capability enables finer-grain synchronization and cooperation between parallel threads by sharing resources among small jobs. | -| Mixed-precision computing | 16-bit floating-point precision computing enables the training and deployment of larger neural networks. With independent parallel integer and floating-point data paths, the Turing SM handles workloads more efficiently using a mix of computation and addressing calculations. | +| Mixed-precision computing | 16-bit floating-point precision computing enables the training and deployment of larger neural networks. With independent parallel integer and floating-point data paths, the Turing SM handles workloads more efficiently using a mix of computation and addressing calculations. | | Dynamic load balancing | Provides dynamic allocation capabilities of GPU resources for graphics and compute tasks as needed to maximize resource utilization. | | Compute preemption | Preemption at the instruction-level provides finer grain control over compute tasks to prevent long-running applications from either monopolizing system resources or timing out. | | H.264, H.265 and HEVC encode/decode engines | Enables faster than real-time performance for transcoding, video editing, and other encoding applications with two dedicated H.264 and HEVC encode engines and a dedicated decode engine that are independent of 3D/compute pipeline. | @@ -86,7 +86,7 @@ Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance of an ## App acceleration -The following table shows how Quadro RTX 3000 provides significantly faster acceleration across leading professional applications. It includes SPECview perf 13 benchmark test results comparing Surface Book 3 15-inch with NVIDIA Quadro RTX 3000 versus Surface Book 2 15-inch with NVIDIA GeForce GTX 1060 devices in market March 2020. +The following table shows how Quadro RTX 3000 provides significantly faster acceleration across leading professional applications. It includes SPECview perf 13 benchmark test results comparing the Surface Book 3 15-inch with NVIDIA Quadro RTX 3000 versus the Surface Book 2 15-inch with NVIDIA GeForce GTX 1060 devices in the market as of March 2020. **Table 3. App acceleration on Surface Book 3 with Quadro RTX 3000** @@ -95,23 +95,23 @@ The following table shows how Quadro RTX 3000 provides significantly faster acce | Adobe Dimension | - RTX-accelerated ray tracing delivers photorealistic 3D rendering to 2D artists and designers. | | Adobe Substance Alchemist | - Create and blend materials with ease, featuring RTX-accelerated AI. | | Adobe Substance Painter | - Paint materials onto 3d models, featuring RTX accelerated bakers, and Iray RTX rendering which generates photorealistic imagery for interactive and batch rendering workflows.
| -| Adobe Substance Designer | - Author procedural materials featuring RTX accelerated bakers
- Uses NVIDIA Iray rendering including textures/substances and bitmap texture export to render in any Iray powered compatible with MDL.
- DXR-accelerated light and ambient occlusion baking. | -| Adobe Photoshop | - CUDA core acceleration enables faster editing with 30+ GPU-accelerated features such as blur gallery, liquify, smart sharpen, & perspective warp enable photographers and designers to modify images smoothly and quickly. | +| Adobe Substance Designer | - Author procedural materials featuring RTX accelerated bakers
- Uses NVIDIA Iray rendering including textures/substances and bitmap texture export to render in any Iray that is compatible with MDL.
- DXR-accelerated light and ambient occlusion baking. | +| Adobe Photoshop | - CUDA core acceleration enables faster editing with 30+ GPU-accelerated features such as blur gallery, liquify, smart sharpen, and perspective warp enable photographers and designers to modify images smoothly and quickly. | | Adobe Lightroom | - Faster editing high res images with GPU-accelerated viewport, which enables the modeling of larger 3D scenes, and the rigging of more complex animations.
- GPU-accelerated image processing enables dramatically more responsive adjustments, especially on 4K or higher resolution displays.
- GPU-accelerated AI-powered “Enhance Details” for refining fine color detail of RAW images. | | Adobe Illustrator | - Pan and zoom with GPU-accelerated canvas faster, which enables graphic designers and illustrators to pan across and zoom in and out of complex vector graphics smoothly and interactively. | -| Adobe
Premiere Pro | - Significantly faster editing and rendering video with GPU-accelerated effects vs CPU:
- GPU-accelerated effects with NVIDIA CUDA technology for real-time video editing and faster final frame rendering.
- GPU-accelerated AI Auto Reframe feature for intelligently converting landscape video to dynamically tracked portrait or square video. | +| Adobe
Premiere Pro | - Significantly faster editing and rendering video with GPU-accelerated effects vs CPU.
- GPU-accelerated effects with NVIDIA CUDA technology for real-time video editing and faster final frame rendering.
- GPU-accelerated AI Auto Reframe feature for intelligently converting landscape video to dynamically tracked portrait or square video. | | Autodesk
Revit | - GPU-accelerated viewport for a smoother, more interactive design experience.
- Supports 3rd party GPU-accelerated 3D renderers such as V-Ray and Enscape. | -| Autodesk
3ds Max | - GPU-accelerated viewport graphics for fast, interactive 3D modelling and design.
- RTX-accelerated ray tracing and AI denoising ****with the default Arnold renderer.
- More than 70 percent faster compared with Surface Book 2 15”. | +| Autodesk
3ds Max | - GPU-accelerated viewport graphics for fast, interactive 3D modelling and design.
- RTX-accelerated ray tracing and AI denoising with the default Arnold renderer.
- More than 70 percent faster compared with Surface Book 2 15”. | | Autodesk
Maya | - RTX-accelerated ray tracing and AI denoising with the default Arnold renderer.
- OpenGL Viewport Acceleration. | -| Dassault Systemes
Solidworks | - Solidworks Interactive Ray Tracer (Visualize) accelerated by both RT Cores and Tensor Cores; AI-accelerated denoiser.
- Runs more than 50% faster compared with Surface Book 2 15” | -| Dassault Systemes
3D Experience Platform | - CATIA Interactive Ray Tracer (Live Rendering) accelerated by RT Cores.
- Catia runs more than 100% faster compared with Surface Book 2 15. | -| ImageVis3D | - Runs more than 2x faster compared with Surface Book 2 15”.. | +| Dassault Systemes
Solidworks | - Solidworks Interactive Ray Tracer (Visualize) accelerated by both RT Cores and Tensor Cores; AI-accelerated denoiser.
- Runs more than 50% faster compared with Surface Book 2 15”. | +| Dassault Systemes
3D Experience Platform | - CATIA Interactive Ray Tracer (Live Rendering) accelerated by RT Cores.
- Catia runs more than 100% faster compared with Surface Book 2 15". | +| ImageVis3D | - Runs more than 2x faster compared with Surface Book 2 15”. | | McNeel & Associates
Rhino 3D | - GPU-accelerated viewport for a smooth and interactive modelling and design experience.
- Supports Cycles for GPU-accelerated 3D rendering. | -| Siemens NX | - Siemens NX Interactive Ray Tracer (Ray Traced Studio) accelerated by RT Cores.
- Runs more than 10 x faster compared with Surface Book 2 15”.. | -| Esri ArcGIS | - Real-time results from what took days & weeks, due to DL inferencing leveraging tensor cores. | +| Siemens NX | - Siemens NX Interactive Ray Tracer (Ray Traced Studio) accelerated by RT Cores.
- Runs more than 10x faster compared with Surface Book 2 15”. | +| Esri ArcGIS | - Real-time results from what took days and weeks, due to DL inferencing leveraging tensor cores. | | PTC Creo | - Creo's real-time engineering simulation tool (Creo Simulation Live) built on CUDA.
- Runs more than 15% faster compared with Surface Book 2 15”. | | Luxion KeyShot | - 3rd party Interactive Ray Tracer used by Solidworks, Creo, and Rhino. Accelerated by RT Cores, OptiX™ AI-accelerated denoising. | -| ANSYS
Discovery Live | - ANSYS real-time engineering simulation tool (ANSYS Discovery Live) built on CUDA | +| ANSYS
Discovery Live | - ANSYS real-time engineering simulation tool (ANSYS Discovery Live) built on CUDA. | ## SKUs **Table 4. Surface Book 3 with Quadro RTX 3000 SKUs** @@ -123,7 +123,7 @@ The following table shows how Quadro RTX 3000 provides significantly faster acce ## Summary -Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance on any Surface laptop, providing architects, engineers, developers, and data scientists with the tools they need to work efficiently from anywhere: +The Surface Book 3 with Quadro RTX 3000 delivers the best graphics performance of any Surface laptop, providing architects, engineers, developers, and data scientists with the tools they need to work efficiently from anywhere: - RTX-acceleration across multiple workflows like design, animation, video production, and more. - Desktop-grade performance in a mobile form factor. From 0a89b16ebe686e2703f230775ae0ac662b04eba2 Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Wed, 3 Jun 2020 15:32:35 -0700 Subject: [PATCH 080/228] Update .openpublishing.redirection.json Added /security/ to keep-secure related strings --- .openpublishing.redirection.json | 96 ++++++++++++++++---------------- 1 file changed, 48 insertions(+), 48 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index d7834051e9..bab6e4aecc 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -2043,12 +2043,12 @@ }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/troubleshoot-windows-defender-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", "redirect_document_id": false }, { @@ -9388,17 +9388,17 @@ }, { "source_path": "windows/keep-secure/command-line-arguments-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configuration-management-reference-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-advanced-scan-types-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9418,12 +9418,12 @@ }, { "source_path": "windows/keep-secure/configure-block-at-first-sight-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-cloud-block-timeout-period-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9438,7 +9438,7 @@ }, { "source_path": "windows/keep-secure/configure-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9468,12 +9468,12 @@ }, { "source_path": "windows/keep-secure/configure-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-extension-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9488,27 +9488,27 @@ }, { "source_path": "windows/keep-secure/configure-local-policy-overrides-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-network-connections-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-notifications-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-process-opened-file-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-protection-features-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9518,12 +9518,12 @@ }, { "source_path": "windows/keep-secure/configure-real-time-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/configure-remediation-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9533,7 +9533,7 @@ }, { "source_path": "windows/keep-secure/configure-server-exclusions-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9573,7 +9573,7 @@ }, { "source_path": "windows/keep-secure/configure-windows-defender-antivirus-features.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features", "redirect_document_id": true }, { @@ -9788,7 +9788,7 @@ }, { "source_path": "windows/keep-secure/customize-run-review-remediate-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9883,7 +9883,7 @@ }, { "source_path": "windows/keep-secure/deploy-manage-report-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9893,7 +9893,7 @@ }, { "source_path": "windows/keep-secure/deploy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9903,7 +9903,7 @@ }, { "source_path": "windows/keep-secure/deployment-vdi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -9913,7 +9913,7 @@ }, { "source_path": "windows/keep-secure/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -10073,7 +10073,7 @@ }, { "source_path": "windows/keep-secure/enable-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -10143,7 +10143,7 @@ }, { "source_path": "windows/keep-secure/evaluate-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11778,12 +11778,12 @@ }, { "source_path": "windows/keep-secure/manage-event-based-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-outdated-endpoints-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11793,12 +11793,12 @@ }, { "source_path": "windows/keep-secure/manage-protection-update-schedule-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-protection-updates-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -11813,12 +11813,12 @@ }, { "source_path": "windows/keep-secure/manage-updates-baselines-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12293,7 +12293,7 @@ }, { "source_path": "windows/keep-secure/prevent-end-user-interaction-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12398,7 +12398,7 @@ }, { "source_path": "windows/keep-secure/report-monitor-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12458,12 +12458,12 @@ }, { "source_path": "windows/keep-secure/review-scan-results-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/run-scan-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12473,7 +12473,7 @@ }, { "source_path": "windows/keep-secure/scheduled-catch-up-scans-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12643,7 +12643,7 @@ }, { "source_path": "windows/keep-secure/specify-cloud-protection-level-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12858,17 +12858,17 @@ }, { "source_path": "windows/keep-secure/use-group-policy-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-intune-config-manager-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", "redirect_document_id": true }, { "source_path": "windows/keep-secure/use-powershell-cmdlets-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12888,7 +12888,7 @@ }, { "source_path": "windows/keep-secure/use-wmi-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -12983,7 +12983,7 @@ }, { "source_path": "windows/keep-secure/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", "redirect_document_id": true }, { @@ -13103,27 +13103,27 @@ }, { "source_path": "windows/keep-secure/windows-defender-antivirus-compatibility.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-in-windows-10.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-antivirus-on-windows-server-2016.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-offline.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/windows-defender-offline", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/windows-defender-offline", "redirect_document_id": true }, { "source_path": "windows/keep-secure/windows-defender-security-center-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus", "redirect_document_id": true }, { From f49e587c935e99beec36189d60334f49a6437178 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 3 Jun 2020 16:00:40 -0700 Subject: [PATCH 081/228] Boolean to Integer updates in two settings --- .../mdm/new-in-windows-mdm-enrollment-management.md | 5 +++++ windows/client-management/mdm/policy-csp-networkisolation.md | 4 ++-- 2 files changed, 7 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 8a720f94a0..22c842d346 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -59,6 +59,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [What is dmwappushsvc?](#what-is-dmwappushsvc) - **Change history in MDM documentation** + - [June 2020](#june-2020) - [May 2020](#may-2020) - [February 2020](#february-2020) - [January 2020](#january-2020) @@ -1980,6 +1981,10 @@ What data is handled by dmwappushsvc? | It is a component handling the internal How do I turn if off? | The service can be stopped from the "Services" console on the device (Start > Run > services.msc). However, since this is a component part of the OS and required for the proper functioning of the device, we strongly recommend not to do this. | ## Change history in MDM documentation +### June 2020 +|New or updated topic | Description| +|--- | ---| +|[Policy CSP - NetworkIsolation](networkisolation-csp.md)|Updated the description to Integer instead of Boolean for the following policy settings:
EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative| ### May 2020 |New or updated topic | Description| diff --git a/windows/client-management/mdm/policy-csp-networkisolation.md b/windows/client-management/mdm/policy-csp-networkisolation.md index 3d7afccb49..601cfb8378 100644 --- a/windows/client-management/mdm/policy-csp-networkisolation.md +++ b/windows/client-management/mdm/policy-csp-networkisolation.md @@ -228,7 +228,7 @@ fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff -Boolean value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. +Integer value that tells the client to accept the configured list and not to use heuristics to attempt to find other subnets. @@ -468,7 +468,7 @@ ADMX Info: -Boolean value that tells the client to accept the configured list of proxies and not try to detect other work proxies. +Integer value that tells the client to accept the configured list of proxies and not try to detect other work proxies. From c4c9356d4b84347db44848f9090e3ce752ef2fcd Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 3 Jun 2020 16:26:09 -0700 Subject: [PATCH 082/228] Fixed build warning --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 22c842d346..b2ca393530 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1984,7 +1984,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o ### June 2020 |New or updated topic | Description| |--- | ---| -|[Policy CSP - NetworkIsolation](networkisolation-csp.md)|Updated the description to Integer instead of Boolean for the following policy settings:
EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative| +|[Policy CSP - NetworkIsolation](policy-csp-networkisolation.md)|Updated the description to Integer instead of Boolean for the following policy settings:
EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative| ### May 2020 |New or updated topic | Description| From ab0d61e1628577b683cee346f372ed7dd4550fb5 Mon Sep 17 00:00:00 2001 From: Thomas Date: Wed, 3 Jun 2020 17:45:21 -0700 Subject: [PATCH 083/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index edd89b7792..9f1b77566b 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -15988,7 +15988,7 @@ }, { "source_path": "windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-antivirus", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-defender-antivirus", "redirect_document_id": true } ] From c895962f32be608ec61f1efc9e744682c3103ceb Mon Sep 17 00:00:00 2001 From: Justin Nafziger Date: Wed, 3 Jun 2020 18:04:42 -0700 Subject: [PATCH 084/228] MRC updates for Windows 10, version 2004 --- devices/hololens/change-history-hololens.md | 8 ++++++++ devices/hololens/holographic-photos-and-videos.md | 8 ++++++-- 2 files changed, 14 insertions(+), 2 deletions(-) diff --git a/devices/hololens/change-history-hololens.md b/devices/hololens/change-history-hololens.md index 9a1b48b3eb..f4655eaebf 100644 --- a/devices/hololens/change-history-hololens.md +++ b/devices/hololens/change-history-hololens.md @@ -17,6 +17,14 @@ ms.localizationpriority: medium This topic lists new and updated topics in the [Microsoft HoloLens documentation](index.md). +## Windows 10 Holographic, version 2004 + +The topics in this library have been updated for Windows 10 Holographic, version 2004. + +## HoloLens 2 + +The topics in this library have been updated for HoloLens 2 and Windows 10 Holographic, version 1903. + ## April 2019 New or changed topic | Description diff --git a/devices/hololens/holographic-photos-and-videos.md b/devices/hololens/holographic-photos-and-videos.md index 10e6bb4756..11255c8961 100644 --- a/devices/hololens/holographic-photos-and-videos.md +++ b/devices/hololens/holographic-photos-and-videos.md @@ -44,7 +44,9 @@ To take a quick photo of your current view, press the volume up and volume down ### Voice commands to take photos -Cortana can also take a picture. Say: "Hey Cortana, take a picture." +On HoloLens 2, version 2004 (and later), say: "Take a picture." + +On HoloLens (1st gen) or HoloLens 2, version 1903, say: "Hey Cortana, take a picture." ### Start menu to take photos @@ -67,7 +69,9 @@ The quickest way to record a video is to press and hold the **volume up** and ** ### Voice to record videos -Cortana can also record a video. Say: "Hey Cortana, start recording." To stop a video, say "Hey Cortana, stop recording." +On HoloLens 2, version 2004 (and later), say: "Start recording." To stop recording, say "Stop recording." + +On HoloLens (1st gen) or HoloLens 2, version 1903, say: "Hey Cortana, start recording." To stop recording, say "Hey Cortana, stop recording." ### Start menu to record videos From 03524a2bca9dd744ca6ba7b3337e642527fb8030 Mon Sep 17 00:00:00 2001 From: Thomas Date: Wed, 3 Jun 2020 18:14:45 -0700 Subject: [PATCH 085/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 282 ++++++++++++++++++++++++++++++- 1 file changed, 281 insertions(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index edd89b7792..bf04931bb3 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -15990,6 +15990,286 @@ "source_path": "windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-antivirus", "redirect_document_id": true -} +}, +{ + "source_path": "windows/security/threat-protection/windows-defender-antivirus/antivirus-false-positives-negatives.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/command-line-arguments-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configuration-management-reference-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-advanced-scan-types-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-block-at-first-sight-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-cloud-block-timeout-period-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-exclusions-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-extension-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-local-policy-overrides-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-network-connections-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-notifications-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-notifications-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-process-opened-file-exclusions-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-protection-features-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-real-time-protection-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-remediation-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-remediation-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-server-exclusions-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-server-exclusions-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/configure-windows-defender-antivirus-features.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/customize-run-review-remediate-scans-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/customize-run-review-remediate-scans-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/deploy-manage-report-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-manage-report-microsoft-defender-antivirus.", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/deploy-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deploy-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/deployment-vdi-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/detect-block-potentially-unwanted-apps-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/detect-block-potentially-unwanted-apps-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/enable-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/evaluate-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/evaluate-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/limited-periodic-scanning-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-event-based-updates-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-outdated-endpoints-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-protection-update-schedule-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-update-schedule-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-protection-updates-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-updates-baselines-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-baselines-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/manage-updates-mobile-devices-vms-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/office-365-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/office-365-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/oldTOC.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/report-monitor-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/run-scan-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/scheduled-catch-up-scans-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/specify-cloud-protection-level-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/troubleshoot-reporting.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/troubleshoot-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/use-group-policy-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-group-policy-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/use-intune-config-manager-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/use-powershell-cmdlets-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/use-wmi-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/utilize-microsoft-cloud-protection-windows-defender-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-antivirus", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-in-windows-10.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-on-windows-server-2016.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-offline.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/windows-defender-offline", + "redirect_document_id": true + }, + { + "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-security-center-antivirus.md", + "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus", + "redirect_document_id": true + } ] } From 9f6801ac9cf2c732a230211fc341c5f643791b74 Mon Sep 17 00:00:00 2001 From: Thomas Date: Wed, 3 Jun 2020 18:22:16 -0700 Subject: [PATCH 086/228] Update .openpublishing.redirection.json --- .openpublishing.redirection.json | 25 ------------------------- 1 file changed, 25 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index bf04931bb3..d84ac75c66 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -16156,21 +16156,6 @@ "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus", "redirect_document_id": true }, - { - "source_path": "windows/security/threat-protection/windows-defender-antivirus/office-365-windows-defender-antivirus.md", - "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/office-365-microsoft-defender-antivirus", - "redirect_document_id": true - }, - { - "source_path": "windows/security/threat-protection/windows-defender-antivirus/oldTOC.md", - "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC", - "redirect_document_id": true - }, - { - "source_path": "windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md", - "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection", - "redirect_document_id": true - }, { "source_path": "windows/security/threat-protection/windows-defender-antivirus/prevent-end-user-interaction-windows-defender-antivirus.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus", @@ -16181,11 +16166,6 @@ "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus", "redirect_document_id": true }, - { - "source_path": "windows/security/threat-protection/windows-defender-antivirus/restore-quarantined-files-windows-defender-antivirus.md", - "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus", - "redirect_document_id": true - }, { "source_path": "windows/security/threat-protection/windows-defender-antivirus/review-scan-results-windows-defender-antivirus.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus", @@ -16241,11 +16221,6 @@ "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus", "redirect_document_id": true }, - { - "source_path": "windows/security/threat-protection/windows-defender-antivirus/why-use-microsoft-antivirus.md", - "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/why-use-microsoft-antivirus", - "redirect_document_id": true - }, { "source_path": "windows/security/threat-protection/windows-defender-antivirus/windows-defender-antivirus-compatibility.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility", From 22cd538c72a6840ca63c8189e1c3099103fa12df Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Wed, 3 Jun 2020 23:19:26 -0700 Subject: [PATCH 087/228] adding some links to hub --- .openpublishing.redirection.json | 2 +- windows/privacy/index.yml | 13 ++++++++++++- 2 files changed, 13 insertions(+), 2 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index a4e6e02c6d..c975833477 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -14728,7 +14728,7 @@ }, { "source_path": "windows/privacy/manage-windows-endpoints.md", -"redirect_url": "https://docs.microsoft.com/windows/privacy/manage-windows-1809-endpoints", +"redirect_url": "https://docs.microsoft.com/windows/privacy/manage-windows-2004-endpoints", "redirect_document_id": true }, { diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index c8309a41a9..934a834754 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -161,12 +161,23 @@ additionalContent: sections: - items: # Card + - title: More Windows privacy + links: + - text: "Windows 10 & Privacy Compliance: A Guide for IT and Compliance Professionals" + url: Windows-10-and-privacy-compliance.md + - text: Windows 10 personal data services configuration + url: windows-personal-data-services-configuration.md + - text: Beginning your GDPR journey for Windows 10 + url: gdpr-win10-whitepaper.md + # Card - title: View and manage Windows 10 connection endpoints links: - text: Manage Windows 10 connection endpoints url: manage-windows-endpoints.md + - text: Manage connection endpoints for non-Enterprise editions of Windows 10 + url: windows-endpoints-2004-non-enterprise-editions.md - text: Manage connections from Windows to Microsoft services - url: manage-connections-from-windows-operating-system-components-to-microsoft-services + url: manage-connections-from-windows-operating-system-components-to-microsoft-services.md # Card - title: Additional resources links: From cab1f7ca74592d1300971b0cc6e274dbe61e228b Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Thu, 4 Jun 2020 09:27:30 -0700 Subject: [PATCH 088/228] changed Windows Defender AV to Microsoft Defender AV --- .../update/update-compliance-monitor.md | 2 +- ...llect-diagnostic-data-update-compliance.md | 6 ++--- .../collect-diagnostic-data.md | 6 ++--- ...-reference-microsoft-defender-antivirus.md | 2 +- ...scan-types-microsoft-defender-antivirus.md | 4 ++-- ...irst-sight-microsoft-defender-antivirus.md | 2 +- ...out-period-microsoft-defender-antivirus.md | 2 +- ...nteraction-microsoft-defender-antivirus.md | 4 ++-- ...exclusions-microsoft-defender-antivirus.md | 4 ++-- ...exclusions-microsoft-defender-antivirus.md | 2 +- ...-overrides-microsoft-defender-antivirus.md | 4 ++-- ...exclusions-microsoft-defender-antivirus.md | 2 +- ...n-features-microsoft-defender-antivirus.md | 2 +- ...oyment-vdi-microsoft-defender-antivirus.md | 8 +++---- ...protection-microsoft-defender-antivirus.md | 2 +- ...c-scanning-microsoft-defender-antivirus.md | 4 ++-- ...ed-updates-microsoft-defender-antivirus.md | 4 ++-- ...-endpoints-microsoft-defender-antivirus.md | 8 +++---- ...on-updates-microsoft-defender-antivirus.md | 2 +- ...evices-vms-microsoft-defender-antivirus.md | 4 ++-- ...rosoft-defender-antivirus-in-windows-10.md | 2 +- ...fender-antivirus-on-windows-server-2016.md | 10 ++++---- .../microsoft-defender-offline.md | 4 ++-- ...soft-defender-security-center-antivirus.md | 8 +++---- .../microsoft-defender-antivirus/oldTOC.md | 24 +++++++++---------- ...nteraction-microsoft-defender-antivirus.md | 2 +- 26 files changed, 62 insertions(+), 62 deletions(-) diff --git a/windows/deployment/update/update-compliance-monitor.md b/windows/deployment/update/update-compliance-monitor.md index 8e4da6a05c..311272e93b 100644 --- a/windows/deployment/update/update-compliance-monitor.md +++ b/windows/deployment/update/update-compliance-monitor.md @@ -1,5 +1,5 @@ --- -title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10) +title: Monitor Windows Updates and Microsoft Defender AV with Update Compliance (Windows 10) ms.reviewer: manager: laurawi description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md index 532462188a..691027c34e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance.md @@ -1,7 +1,7 @@ --- title: Collect diagnostic data for Update Compliance and Windows Defender Microsoft Defender Antivirus description: Use a tool to collect data to troubleshoot Update Compliance issues when using the Microsoft Defender Antivirus Assessment add in -keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av +keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 @@ -17,13 +17,13 @@ ms.reviewer: manager: dansimp --- -# Collect Update Compliance diagnostic data for Windows Defender AV Assessment +# Collect Update Compliance diagnostic data for Microsoft Defender AV Assessment **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV Assessment section in the Update Compliance add-in. +This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV Assessment section in the Update Compliance add-in. Before attempting this process, ensure you have read [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md), met all require prerequisites, and taken any other suggested troubleshooting steps. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md index 708ec3f869..6152f332d7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md @@ -1,7 +1,7 @@ --- title: Collect diagnostic data of Microsoft Defender Antivirus description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus -keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av +keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 @@ -17,13 +17,13 @@ ms.reviewer: manager: dansimp --- -# Collect Windows Defender AV diagnostic data +# Collect Microsoft Defender AV diagnostic data **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV. +This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV. On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md index a48b41622f..9ca273c668 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configuration-management-reference-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- title: Manage Windows Defender in your business -description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Windows Defender AV +description: Learn how to use Group Policy, Configuration Manager, PowerShell, WMI, Intune, and the command line to manage Microsoft Defender AV keywords: group policy, gpo, config manager, sccm, scep, powershell, wmi, intune, defender, antivirus, antimalware, security, protection search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md index e2bba2fe2b..3464a06430 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-advanced-scan-types-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Configure scanning options for Windows Defender AV -description: You can configure Windows Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files). +title: Configure scanning options for Microsoft Defender AV +description: You can configure Microsoft Defender AV to scan email storage files, back-up or reparse points, network files, and archived files (such as .zip files). keywords: advanced scans, scanning, email, archive, zip, rar, archive, reparse scanning search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus.md index 3906d071de..5fb8feab26 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus.md @@ -34,7 +34,7 @@ You can [specify how long the file should be prevented from running](configure-c When Microsoft Defender Antivirus encounters a suspicious but undetected file, it queries our cloud protection backend. The cloud backend applies heuristics, machine learning, and automated analysis of the file to determine whether the files are malicious or clean. Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/). -![List of Windows Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) +![List of Microsoft Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) In Windows 10, version 1803, block at first sight can now block non-portable executable files (such as JS, VBS, or macros) as well as executable files. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md index 6fb6d97688..7840be58fc 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-cloud-block-timeout-period-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Configure the Windows Defender AV cloud block timeout period +title: Configure the Microsoft Defender AV cloud block timeout period description: You can configure how long Microsoft Defender Antivirus will block a file from running while waiting for a cloud determination. keywords: Microsoft Defender Antivirus, antimalware, security, defender, cloud, timeout, block, period, seconds search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md index 13346bae2f..b7af3e0452 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-end-user-interaction-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Configure how users can interact with Windows Defender AV -description: Configure how end-users interact with Windows Defender AV, what notifications they see, and if they can override settings. +title: Configure how users can interact with Microsoft Defender AV +description: Configure how end-users interact with Microsoft Defender AV, what notifications they see, and if they can override settings. keywords: endpoint, user, interaction, notifications, ui lockdown mode, headless mode, hide interface search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md index 6407947fe2..78dd9f20a7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-exclusions-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Set up exclusions for Windows Defender AV scans -description: You can exclude files (including files modified by specified processes) and folders from being scanned by Windows Defender AV. Validate your exclusions with PowerShell. +title: Set up exclusions for Microsoft Defender AV scans +description: You can exclude files (including files modified by specified processes) and folders from being scanned by Microsoft Defender AV. Validate your exclusions with PowerShell. keywords: search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md index db259755b0..de3333fed1 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md @@ -140,7 +140,7 @@ All files under a folder (including files in subdirectories), or a specific file >[!IMPORTANT] >If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list. -For example, the following code snippet would cause Windows Defender AV scans to exclude any file with the `.test` file extension: +For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file with the `.test` file extension: ```PowerShell Add-MpPreference -ExclusionExtension ".test" diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md index a7871d1232..16fc08a832 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Configure local overrides for Windows Defender AV settings -description: Enable or disable users from locally changing settings in Windows Defender AV. +title: Configure local overrides for Microsoft Defender AV settings +description: Enable or disable users from locally changing settings in Microsoft Defender AV. keywords: local override, local policy, group policy, gpo, lockdown,merge, lists search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md index 7b14f8eda8..ffe624dd8e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus.md @@ -101,7 +101,7 @@ Remove items from the list | `Remove-MpPreference` >[!IMPORTANT] >If you have created a list, either with `Set-MpPreference` or `Add-MpPreference`, using the `Set-MpPreference` cmdlet again will overwrite the existing list. -For example, the following code snippet would cause Windows Defender AV scans to exclude any file that is opened by the specified process: +For example, the following code snippet would cause Microsoft Defender AV scans to exclude any file that is opened by the specified process: ```PowerShell Add-MpPreference -ExclusionProcess "c:\internal\test.exe" diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md index e09172a74b..2f09169a15 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-protection-features-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- title: Enable and configure Microsoft Defender Antivirus protection features -description: Enable behavior-based, heuristic, and real-time protection in Windows Defender AV. +description: Enable behavior-based, heuristic, and real-time protection in Microsoft Defender AV. keywords: heuristic, machine-learning, behavior monitor, real-time protection, always-on, Microsoft Defender Antivirus, antimalware, security, defender search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md index 096a6816cb..a906762b9a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus.md @@ -44,7 +44,7 @@ This guide describes how to configure your VMs for optimal protection and perfor You can also download the whitepaper [Microsoft Defender Antivirus on Virtual Desktop Infrastructure](https://demo.wd.microsoft.com/Content/wdav-testing-vdi-ssu.pdf), which looks at the new shared security intelligence update feature, alongside performance testing and guidance on how you can test antivirus performance on your own VDI. > [!IMPORTANT] -> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
There are performance and feature improvements to the way in which Windows Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607. +> Although the VDI can be hosted on Windows Server 2012 or Windows Server 2016, the virtual machines (VMs) should be running Windows 10, 1607 at a minimum, due to increased protection technologies and features that are unavailable in earlier versions of Windows.
There are performance and feature improvements to the way in which Microsoft Defender AV operates on virtual machines in Windows 10 Insider Preview, build 18323 (and later). We'll identify in this guide if you need to be using an Insider Preview build; if it isn't specified, then the minimum required version for the best protection and performance is Windows 10 1607. ### Set up a dedicated VDI file share @@ -194,7 +194,7 @@ If you would prefer to do everything manually, this what you would need to do to Scheduled scans run in addition to [real-time protection and scanning](configure-real-time-protection-microsoft-defender-antivirus.md). -The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Windows Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan. +The start time of the scan itself is still based on the scheduled scan policy – ScheduleDay, ScheduleTime, ScheduleQuickScanTime. Randomization will cause Microsoft Defender AV to start a scan on each machine within a 4 hour window from the time set for the scheduled scan. See [Schedule scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) for other configuration options available for scheduled scans. @@ -219,7 +219,7 @@ Sometimes, Microsoft Defender Antivirus notifications may be sent to or persist 3. Click **OK**. -This prevents notifications from Windows Defender AV appearing in the action center on Windows 10 when scans or remediation is performed. +This prevents notifications from Microsoft Defender AV appearing in the action center on Windows 10 when scans or remediation is performed. ### Disable scans after an update @@ -253,7 +253,7 @@ This forces a scan if the VM has missed two or more consecutive scheduled scans. 2. Click **OK**. -This hides the entire Windows Defender AV user interface from users. +This hides the entire Microsoft Defender AV user interface from users. ### Exclusions diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md index 69f126b8f8..84f310871d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md @@ -26,7 +26,7 @@ ms.custom: nextgen > The Microsoft Defender Antivirus cloud service is a mechanism for delivering updated protection to your network and endpoints. Although it is called a cloud service, it is not simply protection for files stored in the cloud; rather, it uses distributed resources and machine learning to deliver protection to your endpoints at a rate that is far faster than traditional Security intelligence updates. Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/). -![List of Windows Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) +![List of Microsoft Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) You can enable or disable Microsoft Defender Antivirus cloud-delivered protection with Microsoft Intune, Microsoft Endpoint Configuration Manager, Group Policy, PowerShell cmdlets, or on individual clients in the Windows Security app. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md index 8e83b95ad4..fdc1e748f8 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md @@ -37,7 +37,7 @@ By default, Microsoft Defender Antivirus will enable itself on a Windows 10 devi If Microsoft Defender Antivirus is enabled, the usual options will appear to configure it on that device: -![Windows Security app showing Windows Defender AV options, including scan options, settings, and update options](images/vtp-wdav.png) +![Windows Security app showing Microsoft Defender AV options, including scan options, settings, and update options](images/vtp-wdav.png) If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options: @@ -47,7 +47,7 @@ Underneath any third party AV products, a new link will appear as **Microsoft De ![The limited periodic option is a toggle to enable or disable **periodic scanning**](images/vtp-3ps-lps.png) -Sliding the switch to **On** will show the standard Windows Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page. +Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page. ![When enabled, periodic scanning shows the normal Microsoft Defender Antivirus options](images/vtp-3ps-lps-on.png) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md index 6f5db8d1e5..c29455e452 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-event-based-updates-microsoft-defender-antivirus.md @@ -129,9 +129,9 @@ For more information, see [Windows Defender WMIv2 APIs](https://docs.microsoft.c ## Allow ad hoc changes to protection based on cloud-delivered protection -Windows Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates. +Microsoft Defender AV can make changes to its protection based on cloud-delivered protection. Such changes can occur outside of normal or scheduled protection updates. -If you have enabled cloud-delivered protection, Windows Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Windows Defender AV to automatically receive that protection update. Other important protection updates can also be applied. +If you have enabled cloud-delivered protection, Microsoft Defender AV will send files it is suspicious about to the Windows Defender cloud. If the cloud service reports that the file is malicious, and the file is detected in a recent protection update, you can use Group Policy to configure Microsoft Defender AV to automatically receive that protection update. Other important protection updates can also be applied. ### Use Group Policy to automatically download recent updates based on cloud-delivered protection diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md index 6d5ec2c418..8956c31df7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-outdated-endpoints-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Apply Windows Defender AV protection updates to out of date endpoints +title: Apply Microsoft Defender AV protection updates to out of date endpoints description: Define when and how updates should be applied for endpoints that have not updated in a while. keywords: updates, protection, out-of-date, outdated, old, catch-up search.product: eADQiWindows 10XVcnh @@ -56,7 +56,7 @@ If Microsoft Defender Antivirus did not download protection updates for a specif 4. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates**. -5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to check for and download the latest protection update. +5. Double-click the **Define the number of days after which a catch-up security intelligence update is required** setting and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to check for and download the latest protection update. 6. Click **OK**. @@ -96,11 +96,11 @@ You can also specify the number of days after which Microsoft Defender Antivirus 5. Expand the tree to **Windows components > Microsoft Defender Antivirus > Signature Updates** and configure the following settings: - 1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider spyware Security intelligence to be out-of-date. + 1. Double-click **Define the number of days before spyware definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider spyware Security intelligence to be out-of-date. 2. Click **OK**. - 3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Windows Defender AV to consider virus Security intelligence to be out-of-date. + 3. Double-click **Define the number of days before virus definitions are considered out of date** and set the option to **Enabled**. Enter the number of days after which you want Microsoft Defender AV to consider virus Security intelligence to be out-of-date. 4. Click **OK**. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus.md index d3a6243859..fb6976a1fa 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-protection-updates-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Manage how and where Windows Defender AV receives updates +title: Manage how and where Microsoft Defender AV receives updates description: Manage the fallback order for how Microsoft Defender Antivirus receives protection updates. keywords: updates, security baselines, protection, fallback order, ADL, MMPC, UNC, file path, share, wsus search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md index 81ba39a7cc..fb9cbcf454 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Define how mobile devices are updated by Windows Defender AV -description: Manage how mobile devices, such as laptops, should be updated with Windows Defender AV protection updates. +title: Define how mobile devices are updated by Microsoft Defender AV +description: Manage how mobile devices, such as laptops, should be updated with Microsoft Defender AV protection updates. keywords: updates, protection, schedule updates, battery, mobile device, laptop, notebook, opt-in, microsoft update, wsus, override search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md index f0ebabb8e5..4be2a05301 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10.md @@ -1,6 +1,6 @@ --- title: Next-generation protection in Windows 10, Windows Server 2016, and Windows Server 2019 -description: Learn how to manage, configure, and use Windows Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016 +description: Learn how to manage, configure, and use Microsoft Defender AV, the built-in antimalware and antivirus product available in Windows 10 and Windows Server 2016 keywords: Microsoft Defender Antivirus, windows defender, antimalware, scep, system center endpoint protection, system center configuration manager, virus, malware, threat, detection, protection, security search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index 4cf3a8a1e7..5018ae9f9d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -1,6 +1,6 @@ --- title: Microsoft Defender Antivirus on Windows Server 2016 and 2019 -description: Enable and configure Windows Defender AV on Windows Server 2016 and 2019 +description: Enable and configure Microsoft Defender AV on Windows Server 2016 and 2019 keywords: windows defender, server, scep, system center endpoint protection, server 2016, current branch, server 2012 search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -91,7 +91,7 @@ To use PowerShell to install Microsoft Defender Antivirus, run the following cmd Install-WindowsFeature -Name Windows-Defender ``` -Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Windows Defender AV Events](troubleshoot-microsoft-defender-antivirus.md). +Event messages for the antimalware engine included with Microsoft Defender Antivirus can be found in [Microsoft Defender AV Events](troubleshoot-microsoft-defender-antivirus.md). ## Verify Microsoft Defender Antivirus is running @@ -190,14 +190,14 @@ If you determine you do want to uninstall Microsoft Defender Antivirus, follow t If you unselect **Windows Defender** by itself under the **Windows Defender Features** section, you will be prompted to remove the interface option **GUI for Windows Defender**. - Windows Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature. + Microsoft Defender AV will still run normally without the user interface, but the user interface cannot be enabled if you disable the core **Windows Defender** feature. ### Uninstall Microsoft Defender Antivirus using PowerShell >[!NOTE] >You can't uninstall the Windows Security app, but you can disable the interface with these instructions. -The following PowerShell cmdlet will also uninstall Windows Defender AV on Windows Server 2016 or 2019: +The following PowerShell cmdlet will also uninstall Microsoft Defender AV on Windows Server 2016 or 2019: ```PowerShell Uninstall-WindowsFeature -Name Windows-Defender @@ -216,6 +216,6 @@ Uninstall-WindowsFeature -Name Windows-Defender-GUI - [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md) -- [Configure exclusions in Windows Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md) +- [Configure exclusions in Microsoft Defender AV on Windows Server](configure-server-exclusions-microsoft-defender-antivirus.md) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md index 636b470f3c..103ede404e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md @@ -48,7 +48,7 @@ To run Microsoft Defender Offline from the endpoint, the user must be logged in Microsoft Defender Offline uses the most recent protection updates available on the endpoint; it's updated whenever Windows Defender Antivirus is updated. > [!NOTE] -> Before running an offline scan, you should attempt to update Windows Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx). +> Before running an offline scan, you should attempt to update Microsoft Defender AV protection. You can either force an update with Group Policy or however you normally deploy updates to endpoints, or you can manually download and install the latest protection updates from the [Microsoft Malware Protection Center](https://www.microsoft.com/security/portal/definitions/adl.aspx). See the [Manage Microsoft Defender Antivirus Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) topic for more information. @@ -75,7 +75,7 @@ Microsoft Defender Offline scans are indicated under **Malware remediation statu ## Configure notifications -Microsoft Defender Offline notifications are configured in the same policy setting as other Windows Defender AV notifications. +Microsoft Defender Offline notifications are configured in the same policy setting as other Microsoft Defender AV notifications. For more information about notifications in Windows Defender, see the [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) topic. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md index 36f41c59d3..c2d53844a7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-security-center-antivirus.md @@ -1,6 +1,6 @@ --- title: Microsoft Defender Antivirus in the Windows Security app -description: With Windows Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks. +description: With Microsoft Defender AV now included in the Windows Security app, you can review, compare, and perform common tasks. keywords: wdav, antivirus, firewall, security, windows search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -27,8 +27,8 @@ In Windows 10, version 1703 and later, the Windows Defender app is part of the W Settings that were previously part of the Windows Defender client and main Windows Settings have been combined and moved to the new app, which is installed by default as part of Windows 10, version 1703. > [!IMPORTANT] -> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.
If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. ->It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. +> Disabling the Windows Security Center service will not disable Microsoft Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). These are disabled automatically when a third-party antivirus or firewall product is installed and kept up to date.
If you do disable the Windows Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. +>It may also prevent Microsoft Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. >This will significantly lower the protection of your device and could lead to malware infection. @@ -108,7 +108,7 @@ This section describes how to perform some of the most common tasks when reviewi >[!NOTE] >If you switch **Real-time protection** off, it will automatically turn back on after a short delay. This is to ensure you are protected from malware and threats. - >If you install another antivirus product, Windows Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md). + >If you install another antivirus product, Microsoft Defender AV will automatically disable itself and will indicate this in the Windows Security app. A setting will appear that will allow you to enable [limited periodic scanning](limited-periodic-scanning-microsoft-defender-antivirus.md). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md b/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md index 6e1deba9b5..3c99217e75 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md @@ -1,12 +1,12 @@ # [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md) -## [Windows Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md) +## [Microsoft Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md) -## [Windows Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md) +## [Microsoft Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md) ## [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md) -### [Use limited periodic scanning in Windows Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md) +### [Use limited periodic scanning in Microsoft Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md) ## [Evaluate Microsoft Defender Antivirus protection](evaluate-microsoft-defender-antivirus.md) @@ -35,18 +35,18 @@ ### [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md) #### [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) #### [Enable and configure always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) -### [Configure end-user interaction with Windows Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md) +### [Configure end-user interaction with Microsoft Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md) #### [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) #### [Prevent users from seeing or interacting with the user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md) #### [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) ## [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md) -### [Configure and validate exclusions in Windows Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md) +### [Configure and validate exclusions in Microsoft Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md) #### [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md) #### [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) -#### [Configure exclusions in Windows Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md) -### [Configure scanning options in Windows Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md) +#### [Configure exclusions in Microsoft Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md) +### [Configure scanning options in Microsoft Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md) ### [Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) ### [Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) ### [Configure and run scans](run-scan-microsoft-defender-antivirus.md) @@ -59,10 +59,10 @@ ## [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md) -### [Use Group Policy settings to configure and manage Windows Defender AV](use-group-policy-microsoft-defender-antivirus.md) -### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Windows Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md) -### [Use PowerShell cmdlets to configure and manage Windows Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md) -### [Use Windows Management Instrumentation (WMI) to configure and manage Windows Defender AV](use-wmi-microsoft-defender-antivirus.md) -### [Use the mpcmdrun.exe commandline tool to configure and manage Windows Defender AV](command-line-arguments-microsoft-defender-antivirus.md) +### [Use Group Policy settings to configure and manage Microsoft Defender AV](use-group-policy-microsoft-defender-antivirus.md) +### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Microsoft Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md) +### [Use PowerShell cmdlets to configure and manage Microsoft Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md) +### [Use Windows Management Instrumentation (WMI) to configure and manage Microsoft Defender AV](use-wmi-microsoft-defender-antivirus.md) +### [Use the mpcmdrun.exe commandline tool to configure and manage Microsoft Defender AV](command-line-arguments-microsoft-defender-antivirus.md) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md index 4b5dfb5cc2..18c0fdfc15 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-end-user-interaction-microsoft-defender-antivirus.md @@ -44,7 +44,7 @@ In earlier versions of Windows 10, the setting will hide the Windows Defender cl ![Warning message when headless mode is enabled in Windows 10, versions earlier than 1703](images/defender/wdav-headless-mode-1607.png) -## Use Group Policy to hide the Windows Defender AV interface from users +## Use Group Policy to hide the Microsoft Defender AV interface from users 1. On your Group Policy management machine, open the [Group Policy Management Console](https://docs.microsoft.com/previous-versions/windows/desktop/gpmc/group-policy-management-console-portal), right-click the Group Policy Object you want to configure and click **Edit**. From ee2c2b28a39520e961f73b9cc0bab74f04d97736 Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Thu, 4 Jun 2020 09:30:07 -0700 Subject: [PATCH 089/228] Changed Windows Defender AV to Microsoft Defender AV --- .../deployment/update/update-compliance-monitor.md | 2 +- .../report-monitor-microsoft-defender-antivirus.md | 4 ++-- ...quarantined-files-microsoft-defender-antivirus.md | 6 +++--- ...view-scan-results-microsoft-defender-antivirus.md | 2 +- .../run-scan-microsoft-defender-antivirus.md | 2 +- ...ed-catch-up-scans-microsoft-defender-antivirus.md | 2 +- .../troubleshoot-microsoft-defender-antivirus.md | 2 +- .../troubleshoot-reporting.md | 10 +++++----- ...ne-config-manager-microsoft-defender-antivirus.md | 2 +- ...owershell-cmdlets-microsoft-defender-antivirus.md | 2 +- .../use-wmi-microsoft-defender-antivirus.md | 2 +- ...-cloud-protection-microsoft-defender-antivirus.md | 2 +- .../microsoft-defender-atp/alerts-queue.md | 8 ++++---- .../microsoft-defender-atp/api-portal-mapping.md | 12 ++++++------ .../configure-server-endpoints.md | 6 +++--- .../enable-controlled-folders.md | 2 +- .../microsoft-defender-atp/investigate-files.md | 2 +- .../microsoft-defender-atp/manage-indicators.md | 6 +++--- .../microsoft-defender-atp/network-protection.md | 4 ++-- .../microsoft-defender-atp/portal-overview.md | 2 +- .../microsoft-defender-atp/respond-machine-alerts.md | 4 ++-- .../microsoft-defender-atp/troubleshoot-asr.md | 2 +- .../microsoft-defender-atp/troubleshoot-np.md | 2 +- .../windows-defender-security-center.md | 12 ++++++------ windows/whats-new/ltsc/whats-new-windows-10-2019.md | 4 ++-- .../whats-new/whats-new-windows-10-version-1703.md | 8 ++++---- 26 files changed, 56 insertions(+), 56 deletions(-) diff --git a/windows/deployment/update/update-compliance-monitor.md b/windows/deployment/update/update-compliance-monitor.md index 8e4da6a05c..311272e93b 100644 --- a/windows/deployment/update/update-compliance-monitor.md +++ b/windows/deployment/update/update-compliance-monitor.md @@ -1,5 +1,5 @@ --- -title: Monitor Windows Updates and Windows Defender AV with Update Compliance (Windows 10) +title: Monitor Windows Updates and Microsoft Defender AV with Update Compliance (Windows 10) ms.reviewer: manager: laurawi description: You can use Update Compliance in Azure Portal to monitor the progress of updates and key antimalware protection features on devices in your network. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md index af0ed9fd05..aa0b387ceb 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/report-monitor-microsoft-defender-antivirus.md @@ -1,7 +1,7 @@ --- title: Monitor and report on Microsoft Defender Antivirus protection -description: Use Configuration Manager or security information and event management (SIEM) tools to consume reports, and monitor Windows Defender AV with PowerShell and WMI. -keywords: siem, monitor, report, windows defender av +description: Use Configuration Manager or security information and event management (SIEM) tools to consume reports, and monitor Microsoft Defender AV with PowerShell and WMI. +keywords: siem, monitor, report, Microsoft Defender AV search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md index 5a30c57794..325b0800ee 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/restore-quarantined-files-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- -title: Restore quarantined files in Windows Defender AV -description: You can restore files and folders that were quarantined by Windows Defender AV. +title: Restore quarantined files in Microsoft Defender AV +description: You can restore files and folders that were quarantined by Microsoft Defender AV. keywords: search.product: eADQiWindows 10XVcnh ms.pagetype: security @@ -17,7 +17,7 @@ ms.reviewer: manager: dansimp --- -# Restore quarantined files in Windows Defender AV +# Restore quarantined files in Microsoft Defender AV **Applies to:** diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md index 258b495b60..1e4a2b7142 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/review-scan-results-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Review the results of Windows Defender AV scans +title: Review the results of Microsoft Defender AV scans description: Review the results of scans using Microsoft Endpoint Configuration Manager, Microsoft Intune, or the Windows Security app keywords: scan results, remediation, full scan, quick scan search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md index 0d9933fc95..a0fc81be46 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/run-scan-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Run and customize on-demand scans in Windows Defender AV +title: Run and customize on-demand scans in Microsoft Defender AV description: Run and configure on-demand scans using PowerShell, Windows Management Instrumentation, or individually on endpoints with the Windows Security app keywords: scan, on-demand, dos, intune, instant scan search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md index 6dd4dadced..a155de8626 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/scheduled-catch-up-scans-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Schedule regular quick and full scans with Windows Defender AV +title: Schedule regular quick and full scans with Microsoft Defender AV description: Set up recurring (scheduled) scans, including when they should run and whether they run as full or quick scans keywords: quick scan, full scan, quick vs full, schedule scan, daily, weekly, time, scheduled, recurring, regular search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md index 68ce4eebbd..75665404c2 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Windows Defender AV event IDs and error codes +title: Microsoft Defender AV event IDs and error codes description: Look up the causes and solutions for Microsoft Defender Antivirus event IDs and errors keywords: event, error code, siem, logging, troubleshooting, wef, windows event forwarding search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md index 8abffb90b1..43310f4b21 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/troubleshoot-reporting.md @@ -1,7 +1,7 @@ --- -title: Troubleshoot problems with reporting tools for Windows Defender AV -description: Identify and solve common problems when attempting to report in Windows Defender AV protection status in Update Compliance -keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av +title: Troubleshoot problems with reporting tools for Microsoft Defender AV +description: Identify and solve common problems when attempting to report in Microsoft Defender AV protection status in Update Compliance +keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender AV search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 @@ -51,9 +51,9 @@ There are three steps to troubleshooting these problems: In order for devices to properly show up in Update Compliance, you have to meet certain prerequisites for both the Update Compliance service and for Microsoft Defender Antivirus: >[!div class="checklist"] ->- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](microsoft-defender-antivirus-compatibility.md) and the endpoint will not be reported in Update Compliance. +>- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](microsoft-defender-antivirus-compatibility.md) and the endpoint will not be reported in Update Compliance. > - [Cloud-delivered protection is enabled](enable-cloud-protection-microsoft-defender-antivirus.md). -> - Endpoints can [connect to the Windows Defender AV cloud](configure-network-connections-microsoft-defender-antivirus.md#validate-connections-between-your-network-and-the-cloud) +> - Endpoints can [connect to the Microsoft Defender AV cloud](configure-network-connections-microsoft-defender-antivirus.md#validate-connections-between-your-network-and-the-cloud) > - If the endpoint is running Windows 10 version 1607 or earlier, [Windows 10 diagnostic data must be set to the Enhanced level](https://docs.microsoft.com/windows/configuration/configure-windows-diagnostic-data-in-your-organization#enhanced-level). > - It has been 3 days since all requirements have been met diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md index a6ba01f23b..37d31d6dc7 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-intune-config-manager-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- title: Configure Microsoft Defender Antivirus with Configuration Manager and Intune -description: Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure Windows Defender AV and Endpoint Protection +description: Use Microsoft Endpoint Configuration Manager and Microsoft Intune to configure Microsoft Defender AV and Endpoint Protection keywords: scep, intune, endpoint protection, configuration search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md index fcfc8ca38c..2ec659113a 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-powershell-cmdlets-microsoft-defender-antivirus.md @@ -1,5 +1,5 @@ --- -title: Use PowerShell cmdlets to configure and run Windows Defender AV +title: Use PowerShell cmdlets to configure and run Microsoft Defender AV description: In Windows 10, you can use PowerShell cmdlets to run scans, update Security intelligence, and change settings in Microsoft Defender Antivirus. keywords: scan, command line, mpcmdrun, defender search.product: eADQiWindows 10XVcnh diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md index 73d1b7d19f..5a54bd4546 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/use-wmi-microsoft-defender-antivirus.md @@ -1,6 +1,6 @@ --- title: Configure Microsoft Defender Antivirus with WMI -description: Use WMI scripts to configure Windows Defender AV. +description: Use WMI scripts to configure Microsoft Defender AV. keywords: wmi, scripts, windows management instrumentation, configuration search.product: eADQiWindows 10XVcnh ms.pagetype: security diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md index 6e52508bcb..e998e86722 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md @@ -25,7 +25,7 @@ ms.custom: nextgen Microsoft next-generation technologies in Microsoft Defender Antivirus provide near-instant, automated protection against new and emerging threats. To dynamically identify new threats, these technologies work with large sets of interconnected data in the Microsoft Intelligent Security Graph and powerful artificial intelligence (AI) systems driven by advanced machine learning models. Microsoft Defender Antivirus uses multiple detection and prevention technologies to deliver accurate, real-time, and intelligent protection. [Get to know the advanced technologies at the core of Microsoft Defender ATP next generation protection](https://www.microsoft.com/security/blog/2019/06/24/inside-out-get-to-know-the-advanced-technologies-at-the-core-of-microsoft-defender-atp-next-generation-protection/). -![List of Windows Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) +![List of Microsoft Defender AV engines](images/microsoft-defender-atp-next-generation-protection-engines.png) To take advantage of the power and speed of these next-generation technologies, Microsoft Defender Antivirus works seamlessly with Microsoft cloud services. These cloud protection services, also referred to as Microsoft Advanced Protection Service (MAPS), enhances standard real-time protection, providing arguably the best antivirus defense. diff --git a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md index 7f13a487ad..34e1b7c512 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md +++ b/windows/security/threat-protection/microsoft-defender-atp/alerts-queue.md @@ -58,16 +58,16 @@ Informational
(Grey) | Alerts that might not be considered harmful to the n #### Understanding alert severity -Microsoft Defender Antivirus (Windows Defender AV) and Microsoft Defender ATP alert severities are different because they represent different scopes. +Microsoft Defender Antivirus (Microsoft Defender AV) and Microsoft Defender ATP alert severities are different because they represent different scopes. -The Windows Defender AV threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual machine, if infected. +The Microsoft Defender AV threat severity represents the absolute severity of the detected threat (malware), and is assigned based on the potential risk to the individual machine, if infected. The Microsoft Defender ATP alert severity represents the severity of the detected behavior, the actual risk to the machine but more importantly the potential risk to the organization. So, for example: -- The severity of a Microsoft Defender ATP alert about a Windows Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage. -- An alert about a commercial malware was detected while executing, but blocked and remediated by Windows Defender AV, is categorized as "Low" because it may have caused some damage to the individual machine but poses no organizational threat. +- The severity of a Microsoft Defender ATP alert about a Microsoft Defender AV detected threat that was completely prevented and did not infect the machine is categorized as "Informational" because there was no actual damage. +- An alert about a commercial malware was detected while executing, but blocked and remediated by Microsoft Defender AV, is categorized as "Low" because it may have caused some damage to the individual machine but poses no organizational threat. - An alert about malware detected while executing which can pose a threat not only to the individual machine but to the organization, regardless if it was eventually blocked, may be ranked as "Medium" or "High". - Suspicious behavioral alerts, which weren't blocked or remediated will be ranked "Low", "Medium" or "High" following the same organizational threat considerations. diff --git a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md index 2ec8ca9023..2fdc0af72f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md +++ b/windows/security/threat-protection/microsoft-defender-atp/api-portal-mapping.md @@ -43,7 +43,7 @@ Field numbers match the numbers in the images below. > > | Portal label | SIEM field name | ArcSight field | Example value | Description | > |------------------|---------------------------|---------------------|------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -> | 1 | AlertTitle | name | Windows Defender AV detected 'Mikatz' high-severity malware | Value available for every Detection. | +> | 1 | AlertTitle | name | Microsoft Defender AV detected 'Mikatz' high-severity malware | Value available for every Detection. | > | 2 | Severity | deviceSeverity | High | Value available for every Detection. | > | 3 | Category | deviceEventCategory | Malware | Value available for every Detection. | > | 4 | Detection source | sourceServiceName | Antivirus | Microsoft Defender Antivirus or Microsoft Defender ATP. Value available for every Detection. | @@ -53,13 +53,13 @@ Field numbers match the numbers in the images below. > | 8 | UserDomain | sourceNtDomain | CONTOSO | The domain of the user context running the activity, available for Microsoft Defender ATP behavioral based detections. | > | 9 | UserName | sourceUserName | liz.bean | The user context running the activity, available for Microsoft Defender ATP behavioral based detections. | > | 10 | Sha1 | fileHash | 3da065e07b990034e9db7842167f70b63aa5329 | Available for detections associated with a file or process. | -> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Windows Defender AV detections. | -> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Windows Defender AV detections. | -> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Windows Defender AV detections. | +> | 11 | Sha256 | deviceCustomString6 | ebf54f745dc81e1958f75e4ca91dd0ab989fc9787bb6b0bf993e2f5 | Available for Microsoft Defender AV detections. | +> | 12 | Md5 | deviceCustomString5 | db979c04a99b96d370988325bb5a8b21 | Available for Microsoft Defender AV detections. | +> | 13 | ThreatName | deviceCustomString1 | HackTool:Win32/Mikatz!dha | Available for Microsoft Defender AV detections. | > | 14 | IpAddress | sourceAddress | 218.90.204.141 | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. | > | 15 | Url | requestUrl | down.esales360.cn | Available for detections associated to network events. For example, 'Communication to a malicious network destination'. | -> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | -> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Windows Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | +> | 16 | RemediationIsSuccess | deviceCustomNumber2 | TRUE | Available for Microsoft Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | +> | 17 | WasExecutingWhileDetected | deviceCustomNumber1 | FALSE | Available for Microsoft Defender AV detections. ArcSight value is 1 when TRUE and 0 when FALSE. | > | 18 | AlertId | externalId | 636210704265059241_673569822 | Value available for every Detection. | > | 19 | LinkToWDATP | flexString1 | `https://securitycenter.windows.com/alert/636210704265059241_673569822` | Value available for every Detection. | > | 20 | AlertTime | deviceReceiptTime | 2017-05-07T01:56:59.3191352Z | The time the event occurred. Value available for every Detection. | diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md index 6893fc8c8d..c3acfa8df0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-server-endpoints.md @@ -151,7 +151,7 @@ Support for Windows Server, provide deeper insight into activities happening on 1. Configure Microsoft Defender ATP onboarding settings on the server. For more information, see [Onboard Windows 10 machines](configure-endpoints.md). -2. If you're running a third-party antimalware solution, you'll need to apply the following Windows Defender AV passive mode settings. Verify that it was configured correctly: +2. If you're running a third-party antimalware solution, you'll need to apply the following Microsoft Defender AV passive mode settings. Verify that it was configured correctly: 1. Set the following registry entry: - Path: `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection` @@ -168,11 +168,11 @@ Support for Windows Server, provide deeper insight into activities happening on ![Image of passive mode verification result](images/atp-verify-passive-mode.png) -3. Run the following command to check if Windows Defender AV is installed: +3. Run the following command to check if Microsoft Defender AV is installed: ```sc.exe query Windefend``` - If the result is 'The specified service does not exist as an installed service', then you'll need to install Windows Defender AV. For more information, see [Microsoft Defender Antivirus in Windows 10](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10). + If the result is 'The specified service does not exist as an installed service', then you'll need to install Microsoft Defender AV. For more information, see [Microsoft Defender Antivirus in Windows 10](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-in-windows-10). ## Integration with Azure Security Center diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md index dc345b0974..61cf625503 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-controlled-folders.md @@ -41,7 +41,7 @@ Group Policy settings that disable local administrator list merging will overrid * Microsoft Defender Antivirus **Configure local administrator merge behavior for lists** * System Center Endpoint Protection **Allow users to add exclusions and overrides** -For more information about disabling local list merging, see [Prevent or allow users to locally modify Windows Defender AV policy settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged). +For more information about disabling local list merging, see [Prevent or allow users to locally modify Microsoft Defender AV policy settings](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-local-policy-overrides-microsoft-defender-antivirus#configure-how-locally-and-globally-defined-threat-remediation-and-exclusions-lists-are-merged). ## Windows Security app diff --git a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md index 47494dd290..ba6d70f4b3 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md +++ b/windows/security/threat-protection/microsoft-defender-atp/investigate-files.md @@ -61,7 +61,7 @@ For more information on these actions, see [Take response action on a file](resp The file details, incident, malware detection, and file prevalence cards display various attributes about the file. -You'll see details such as the file’s MD5, the Virus Total detection ratio, and Windows Defender AV detection if available, and the file’s prevalence, both worldwide and within your organizations. +You'll see details such as the file’s MD5, the Virus Total detection ratio, and Microsoft Defender AV detection if available, and the file’s prevalence, both worldwide and within your organizations. ![Image of file information](images/atp-file-information.png) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md index e3e6a5d05e..c2f2dd8964 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md @@ -30,13 +30,13 @@ Indicator of compromise (IoCs) matching is an essential feature in every endpoin Create indicators that define the detection, prevention, and exclusion of entities. You can define the action to be taken as well as the duration for when to apply the action as well as the scope of the machine group to apply it to. -Currently supported sources are the cloud detection engine of Microsoft Defender ATP, the automated investigation and remediation engine, and the endpoint prevention engine (Windows Defender AV). +Currently supported sources are the cloud detection engine of Microsoft Defender ATP, the automated investigation and remediation engine, and the endpoint prevention engine (Microsoft Defender AV). **Cloud detection engine**
The cloud detection engine of Microsoft Defender ATP regularly scans collected data and tries to match the indicators you set. When there is a match, action will be taken according to the settings you specified for the IoC. **Endpoint prevention engine**
-The same list of indicators is honored by the prevention agent. Meaning, if Windows Defender AV is the primary AV configured, the matched indicators will be treated according to the settings. For example, if the action is "Alert and Block", Windows Defender AV will prevent file executions (block and remediate) and a corresponding alert will be raised. On the other hand, if the Action is set to "Allow", Windows Defender AV will not detect nor block the file from being run. +The same list of indicators is honored by the prevention agent. Meaning, if Microsoft Defender AV is the primary AV configured, the matched indicators will be treated according to the settings. For example, if the action is "Alert and Block", Microsoft Defender AV will prevent file executions (block and remediate) and a corresponding alert will be raised. On the other hand, if the Action is set to "Allow", Microsoft Defender AV will not detect nor block the file from being run. **Automated investigation and remediation engine**
The automated investigation and remediation behave the same. If an indicator is set to "Allow", Automated investigation and remediation will ignore a "bad" verdict for it. If set to "Block", Automated investigation and remediation will treat it as "bad". @@ -153,7 +153,7 @@ It's important to understand the following prerequisites prior to creating indic You can create indicators for certificates. Some common use cases include: - Scenarios when you need to deploy blocking technologies, such as [attack surface reduction rules](attack-surface-reduction.md) and [controlled folder access](controlled-folders.md) but need to allow behaviors from signed applications by adding the certificate in the allow list. -- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Windows Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same. +- Blocking the use of a specific signed application across your organization. By creating an indicator to block the certificate of the application, Microsoft Defender AV will prevent file executions (block and remediate) and the Automated Investigation and Remediation behave the same. ### Before you begin diff --git a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md index 874368fd85..eb56826c55 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/network-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/network-protection.md @@ -44,11 +44,11 @@ You can also use [audit mode](audit-windows-defender.md) to evaluate how Network ## Requirements -Network protection requires Windows 10 Pro, Enterprise E3, E5 and Windows Defender AV real-time protection. +Network protection requires Windows 10 Pro, Enterprise E3, E5 and Microsoft Defender AV real-time protection. Windows 10 version | Microsoft Defender Antivirus -|- -Windows 10 version 1709 or later | [Windows Defender AV real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled +Windows 10 version 1709 or later | [Microsoft Defender AV real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) and [cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) must be enabled ## Review network protection events in the Microsoft Defender ATP Security Center diff --git a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md index d14ef73895..96e8c08aa9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md +++ b/windows/security/threat-protection/microsoft-defender-atp/portal-overview.md @@ -81,7 +81,7 @@ Icon | Description ![Not remediated icon](images/not-remediated-icon.png)| Not remediated – Threat not removed from the machine. ![Thunderbolt icon](images/atp-thunderbolt-icon.png)| Indicates events that triggered an alert in the **Alert process tree**. ![Machine icon](images/atp-machine-icon.png)| Machine icon -![Windows Defender AV events icon](images/atp-windows-defender-av-events-icon.png)| Microsoft Defender Antivirus events +![Microsoft Defender AV events icon](images/atp-windows-defender-av-events-icon.png)| Microsoft Defender Antivirus events ![Application Guard events icon](images/atp-Application-Guard-events-icon.png)| Windows Defender Application Guard events ![Device Guard events icon](images/atp-Device-Guard-events-icon.png)| Windows Defender Device Guard events ![Exploit Guard events icon](images/atp-Exploit-Guard-events-icon.png)| Windows Defender Exploit Guard events diff --git a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md index 8fbea48837..7d64a9e1f9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/respond-machine-alerts.md @@ -116,13 +116,13 @@ As part of the investigation or response process, you can remotely initiate an a >[!IMPORTANT] >- This action is available for machines on Windows 10, version 1709 or later. ->- A Microsoft Defender Antivirus (Windows Defender AV) scan can run alongside other antivirus solutions, whether Windows Defender AV is the active antivirus solution or not. Windows Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). +>- A Microsoft Defender Antivirus (Microsoft Defender AV) scan can run alongside other antivirus solutions, whether Microsoft Defender AV is the active antivirus solution or not. Microsoft Defender AV can be in Passive mode. For more information, see [Microsoft Defender Antivirus compatibility](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). One you have selected **Run antivirus scan**, select the scan type that you'd like to run (quick or full) and add a comment before confirming the scan. ![Image of notification to select quick scan or full scan and add comment](images/run-antivirus.png) -The Action center will show the scan information and the machine timeline will include a new event, reflecting that a scan action was submitted on the machine. Windows Defender AV alerts will reflect any detections that surfaced during the scan. +The Action center will show the scan information and the machine timeline will include a new event, reflecting that a scan action was submitted on the machine. Microsoft Defender AV alerts will reflect any detections that surfaced during the scan. ## Restrict app execution diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md index 5c669d24fa..8f87ff3707 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-asr.md @@ -46,7 +46,7 @@ Attack surface reduction rules will only work on devices with the following cond - Endpoints are running Windows 10 Enterprise, version 1709 (also known as the Fall Creators Update). -- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). +- Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). - [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled. diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md index 2ee2db32a1..12ce265639 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md @@ -43,7 +43,7 @@ Network protection will only work on devices with the following conditions: >[!div class="checklist"] > * Endpoints are running Windows 10 Enterprise edition, version 1709 or higher (also known as the Fall Creators Update). -> * Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Windows Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). +> * Endpoints are using Microsoft Defender Antivirus as the sole antivirus protection app. [Using any other antivirus app will cause Microsoft Defender AV to disable itself](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). > * [Real-time protection](../microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md) is enabled. > * [Cloud-delivered protection](../microsoft-defender-antivirus/enable-cloud-protection-microsoft-defender-antivirus.md) is enabled. > * Audit mode is not enabled. Use [Group Policy](enable-network-protection.md#group-policy) to set the rule to **Disabled** (value: **0**). diff --git a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md index d6c9634430..0f263a291a 100644 --- a/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md +++ b/windows/security/threat-protection/windows-defender-security-center/windows-defender-security-center.md @@ -42,7 +42,7 @@ You can't uninstall the Windows Security app, but you can do one of the followin - Disable the interface on Windows Server 2016. See [Microsoft Defender Antivirus on Windows Server 2016](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016). - Hide all of the sections on client computers (see below). -- Disable Microsoft Defender Antivirus, if needed. See [Enable and configure Windows Defender AV always-on protection and monitoring](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus). +- Disable Microsoft Defender Antivirus, if needed. See [Enable and configure Microsoft Defender AV always-on protection and monitoring](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus). You can find more information about each section, including options for configuring the sections - such as hiding each of the sections - at the following topics: @@ -77,20 +77,20 @@ You can find more information about each section, including options for configur ## How the Windows Security app works with Windows security features > [!IMPORTANT] -> Windows Defender AV and the Windows Security app use similarly named services for specific purposes. +> Microsoft Defender AV and the Windows Security app use similarly named services for specific purposes. > > The Windows Security app uses the Windows Security Service (*SecurityHealthService* or *Windows Security Health Servce*), which in turn utilizes the Security Center service ([*wscsvc*](https://technet.microsoft.com/library/bb457154.aspx#EDAA)) to ensure the app provides the most up-to-date information about the protection status on the endpoint, including protection offered by third-party antivirus products, Windows Defender Firewall, third-party firewalls, and other security protection. > ->These services do not affect the state of Windows Defender AV. Disabling or modifying these services will not disable Windows Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. +>These services do not affect the state of Microsoft Defender AV. Disabling or modifying these services will not disable Microsoft Defender AV, and will lead to a lowered protection state on the endpoint, even if you are using a third-party antivirus product. > ->Windows Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). +>Microsoft Defender AV will be [disabled automatically when a third-party antivirus product is installed and kept up to date](../microsoft-defender-antivirus/microsoft-defender-antivirus-compatibility.md). > -> Disabling the Windows Security Center service will not disable Windows Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). +> Disabling the Windows Security Center service will not disable Microsoft Defender AV or [Windows Defender Firewall](https://docs.microsoft.com/windows/access-protection/windows-firewall/windows-firewall-with-advanced-security). > [!WARNING] > If you disable the Security Center service, or configure its associated Group Policy settings to prevent it from starting or running, the Windows Security app may display stale or inaccurate information about any antivirus or firewall products you have installed on the device. > -> It may also prevent Windows Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. +> It may also prevent Microsoft Defender AV from enabling itself if you have an old or outdated third-party antivirus, or if you uninstall any third-party antivirus products you may have previously installed. > > This will significantly lower the protection of your device and could lead to malware infection. diff --git a/windows/whats-new/ltsc/whats-new-windows-10-2019.md b/windows/whats-new/ltsc/whats-new-windows-10-2019.md index d39a343109..8c41f40e80 100644 --- a/windows/whats-new/ltsc/whats-new-windows-10-2019.md +++ b/windows/whats-new/ltsc/whats-new-windows-10-2019.md @@ -83,9 +83,9 @@ Endpoint detection and response is improved. Enterprise customers can now take a - [Configuring features](/windows/threat-protection/microsoft-defender-antivirus/configure-microsoft-defender-antivirus-features) - [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus) - Some of the highlights of the new library include [Evaluation guide for Windows Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) and [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus). + Some of the highlights of the new library include [Evaluation guide for Microsoft Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) and [Deployment guide for Microsoft Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus). - New features for Windows Defender AV in Windows 10 Enterprise 2019 LTSC include: + New features for Microsoft Defender AV in Windows 10 Enterprise 2019 LTSC include: - [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus) - [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus) - [Microsoft Defender Antivirus protection in the Windows Defender Security Center app](/windows/threat-protection/microsoft-defender-antivirus/windows-defender-security-center-antivirus) diff --git a/windows/whats-new/whats-new-windows-10-version-1703.md b/windows/whats-new/whats-new-windows-10-version-1703.md index 8421a263ce..2f32d6a64d 100644 --- a/windows/whats-new/whats-new-windows-10-version-1703.md +++ b/windows/whats-new/whats-new-windows-10-version-1703.md @@ -138,10 +138,10 @@ The new library includes information on: - [Troubleshooting](/windows/threat-protection/microsoft-defender-antivirus/troubleshoot-microsoft-defender-antivirus) Some of the highlights of the new library include: -- [Evaluation guide for Windows Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) -- [Deployment guide for Windows Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus) +- [Evaluation guide for Microsoft Defender AV](/windows/threat-protection/microsoft-defender-antivirus//evaluate-microsoft-defender-antivirus) +- [Deployment guide for Microsoft Defender AV in a virtual desktop infrastructure environment](/windows/threat-protection/microsoft-defender-antivirus/deployment-vdi-microsoft-defender-antivirus) -New features for Windows Defender AV in Windows 10, version 1703 include: +New features for Microsoft Defender AV in Windows 10, version 1703 include: - [Updates to how the Block at First Sight feature can be configured](/windows/threat-protection/microsoft-defender-antivirus/configure-block-at-first-sight-microsoft-defender-antivirus) - [The ability to specify the level of cloud-protection](/windows/threat-protection/microsoft-defender-antivirus/specify-cloud-protection-level-microsoft-defender-antivirus) @@ -150,7 +150,7 @@ New features for Windows Defender AV in Windows 10, version 1703 include: In Windows 10, version 1607, we [invested heavily in helping to protect against ransomware](https://blogs.windows.com/business/2016/11/11/defending-against-ransomware-with-windows-10-anniversary-update/#UJlHc6SZ2Zm44jCt.97), and we continue that investment in version 1703 with [updated behavior monitoring and always-on real-time protection](/windows/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus). -You can read more about ransomware mitigations and detection capability in Windows Defender AV in the [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/). +You can read more about ransomware mitigations and detection capability in Microsoft Defender AV in the [Ransomware Protection in Windows 10 Anniversary Update whitepaper (PDF)](http://wincom.blob.core.windows.net/documents/Ransomware_protection_in_Windows_10_Anniversary_Update.pdf) and at the [Microsoft Malware Protection Center blog](https://blogs.technet.microsoft.com/mmpc/category/research/ransomware/). ### Device Guard and Credential Guard From cdcaa4efc02c8eb66ff3b9b2e3287577175ea26c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Thu, 4 Jun 2020 10:56:30 -0700 Subject: [PATCH 090/228] Update enable-attack-surface-reduction.md --- .../enable-attack-surface-reduction.md | 6 +----- 1 file changed, 1 insertion(+), 5 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md index a2ebc76a15..2506f2934b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md +++ b/windows/security/threat-protection/microsoft-defender-atp/enable-attack-surface-reduction.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium audience: ITPro author: levinec ms.author: ellevin -ms.date: 05/29/2020 +ms.date: 06/04/2020 ms.reviewer: manager: dansimp --- @@ -201,7 +201,3 @@ Example: - [Attack surface reduction FAQ](attack-surface-reduction.md) -* [Reduce attack surfaces with attack surface reduction rules](attack-surface-reduction.md) -* [Evaluate attack surface reduction](evaluate-attack-surface-reduction.md) -* [Attack surface reduction FAQ](attack-surface-reduction.md) -* [Enable cloud-delivered protection](../microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md) From eac2a8ed95c1ab3e22317685729e417208a1cfee Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 4 Jun 2020 11:01:27 -0700 Subject: [PATCH 091/228] fixing the OTHER link --- windows/deployment/TOC.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index 7c8dff22d6..a4413bf73e 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -126,7 +126,7 @@ - name: Deploy updates with Configuration Manager href: update/deploy-updates-configmgr.md - name: Deploy updates with Intune - href: update/waas-wufb-csp-mdm.md + href: update/deploy-updates-intune.md - name: Deploy updates with WSUS href: update/waas-manage-updates-wsus.md - name: Deploy updates with Group Policy From 373c159089aa11f70f266556975a6d889eba78b8 Mon Sep 17 00:00:00 2001 From: 1justingilmore Date: Thu, 4 Jun 2020 13:21:15 -0600 Subject: [PATCH 092/228] Edit pass for create an authentication request rule DO NOT MERGE Light copy edits for create-an-authentication-request-rule.md --- .../create-an-authentication-request-rule.md | 26 +++++++++++-------- 1 file changed, 15 insertions(+), 11 deletions(-) diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md index 873ee01d4f..c274213bfb 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md @@ -19,7 +19,7 @@ ms.date: 08/17/2017 # Create an Authentication Request Rule -**Applies to** +**Applies to:** - Windows 10 - Windows Server 2016 @@ -27,9 +27,9 @@ After you have configured IPsec algorithms and authentication methods, you can c **Administrative credentials** -To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs. +To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs (Group Policy Objects). -To create the authentication request rule +To create the authentication request rule: 1. Open the Group Policy Management Console to [Windows Defender Firewall with Advanced Security](open-the-group-policy-management-console-to-windows-firewall-with-advanced-security.md). @@ -39,9 +39,10 @@ To create the authentication request rule 4. On the **Requirements** page, select **Request authentication for inbound and outbound connections**. - >**Caution:**  Do not configure the rule to require inbound authentication until you have confirmed that all of your devices are receiving the correct GPOs, and are successfully negotiating IPsec and authenticating with each other. Allowing the devices to communicate even when authentication fails prevents any errors in the GPOs or their distribution from breaking communications on your network. + > [!CAUTION] + > Do not configure the rule to require inbound authentication until you have confirmed that all of your devices are receiving the correct GPOs, and are successfully negotiating IPsec and authenticating with each other. Allowing the devices to communicate even when authentication fails prevents any errors in the GPOs or their distribution from breaking communications on your network. -5. On the **Authentication Method** page, select the authentication option you want to use on your network. To select multiple methods that are tried in order until one succeeds, click **Advanced**, click **Customize**, and then click **Add** to add methods to the list. Second authentication methods require Authenticated IP (AuthIP). +5. On the **Authentication Method** page, select the authentication option you want to use on your network. To select multiple methods that are attempted in order until one succeeds, click **Advanced**, click **Customize**, and then click **Add** to add methods to the list. Second authentication methods require Authenticated IP (AuthIP). 1. **Default**. Selecting this option tells the device to request authentication by using the method currently defined as the default on the device. This default might have been configured when the operating system was installed or it might have been configured by Group Policy. Selecting this option is appropriate when you have configured system-wide settings by using the [Configure Authentication Methods](configure-authentication-methods.md) procedure. @@ -49,7 +50,9 @@ To create the authentication request rule 3. **Computer (Kerberos V5)**. Selecting this option tells the device to request authentication of the device by using its domain credentials. This option works with other devices than can use IKE v1, including earlier versions of Windows. - 4. **Advanced**. Click **Customize** to specify a custom combination of authentication methods required for your scenario. You can specify both a **First authentication method** and a **Second authentication method**. + 4. **Advanced**. Selecting this option enables you to specify a custom combination of authentication methods required for your scenario. + +6. Optional: If you selected **Advanced** in the previous step, then Click **Customize** to specify a custom combination of authentication methods required for your scenario. You can specify both a **First authentication method** and a **Second authentication method**. The **First authentication method** can be one of the following: @@ -75,18 +78,19 @@ To create the authentication request rule If you check **Second authentication is optional**, the connection can succeed even if the authentication attempt specified in this column fails. - >**Important:**  Make sure that you do not select the boxes to make both first and second authentication optional. Doing so allows plaintext connections whenever authentication fails. + > [!IMPORTANT] + > Make sure that you do not select the boxes to make both first and second authentication optional. Doing so allows plaintext connections whenever authentication fails. -6. After you have configured the authentication methods, click **OK** on each dialog box to save your changes and close it, until you return to the **Authentication Method** page in the wizard. Click **Next**. +7. After you have configured the authentication methods, click **OK** on each dialog box to save your changes and close it, until you return to the **Authentication Method** page in the wizard. Click **Next**. -7. On the **Profile** page, select the check boxes for the network location type profiles to which this rule applies. +8. On the **Profile** page, select the check boxes for the network location type profiles to which this rule applies. - On portable devices, consider clearing the **Private** and **Public** boxes to enable the device to communicate without authentication when it is away from the domain network. - - On devices that do not move from network to network, consider selecting all of the profiles. Doing so prevents an unexpected switch in the network location type from disabling the rule. + - On devices that do not move from network to network, consider selecting all the profiles. Doing so prevents an unexpected switch in the network location type from disabling the rule. Click **Next**. -8. On the **Name** page, type a name for the connection security rule and a description, and then click **Finish**. +9. On the **Name** page, type a name for the connection security rule and a description, and then click **Finish**. The new rule appears in the list of connection security rules. From 29e78996e0fdc1c233d08d6e27d7cfc34f2d1f3c Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 4 Jun 2020 12:57:40 -0700 Subject: [PATCH 093/228] new lp --- windows/deployment/index.yml | 27 ++++++---- windows/deployment/index3.yml | 94 +++++++++++++++++++++++++++++++++++ 2 files changed, 111 insertions(+), 10 deletions(-) create mode 100644 windows/deployment/index3.yml diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 753f83e575..73bde8397e 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -22,29 +22,36 @@ landingContent: # Cards and links should be based on top customer tasks or top subjects # Start card title with a verb # Card (optional) - - title: Overview + - title: Deploy Windows 10 linkLists: - linkListType: overview links: - text: Windows 10 deployment scenarios url: windows-10-deployment-scenarios.md - - text: What is Windows as a service? - url: update/waas-overview.md - - text: Types of Windows updates - url: update/waas-quick-start.md#definitions - # Card (optional) - - title: Get started - linkLists: - linkListType: get-started links: - text: Demonstrate Autopilot deployment url: windows-autopilot/demonstrate-deployment-on-vm.md - - text: Servicing the Windows 10 operating system - url: update/waas-servicing-strategy-windows-10-updates.md - text: Deploy Windows 10 in a test lab url: windows-10-poc.md + # Card (optional) + - title: Update Windows 10 + linkLists: + - linkListType: overview + links: + - text: What is Windows as a service? + url: update/waas-overview.md + - text: Types of Windows updates + url: update/waas-quick-start.md#definitions + n + - linkListType: get-started + links: + - text: Servicing the Windows 10 operating system + url: update/waas-servicing-strategy-windows-10-updates.md + + # Card (optional) - title: Deployment planning linkLists: diff --git a/windows/deployment/index3.yml b/windows/deployment/index3.yml new file mode 100644 index 0000000000..753f83e575 --- /dev/null +++ b/windows/deployment/index3.yml @@ -0,0 +1,94 @@ +### YamlMime:Landing + +title: Windows 10 deployment resources and documentation # < 60 chars +summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars + +metadata: + title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. + description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. + services: windows-10 + ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. + ms.subservice: subservice + ms.topic: landing-page # Required + ms.collection: windows-10 + author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. + ms.author: greglin #Required; microsoft alias of author; optional team alias. + ms.date: 05/27/2020 #Required; mm/dd/yyyy format. + localization_priority: medium + +# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new + +landingContent: +# Cards and links should be based on top customer tasks or top subjects +# Start card title with a verb + # Card (optional) + - title: Overview + linkLists: + - linkListType: overview + links: + - text: Windows 10 deployment scenarios + url: windows-10-deployment-scenarios.md + - text: What is Windows as a service? + url: update/waas-overview.md + - text: Types of Windows updates + url: update/waas-quick-start.md#definitions + + # Card (optional) + - title: Get started + linkLists: + - linkListType: get-started + links: + - text: Demonstrate Autopilot deployment + url: windows-autopilot/demonstrate-deployment-on-vm.md + - text: Servicing the Windows 10 operating system + url: update/waas-servicing-strategy-windows-10-updates.md + - text: Deploy Windows 10 in a test lab + url: windows-10-poc.md + + # Card (optional) + - title: Deployment planning + linkLists: + - linkListType: architecture + links: + - text: Create a deployment plan + url: update/create-deployment-plan.md + - text: Evaluate infrastructure and tools + url: update/eval-infra-tools.md + - text: Define your servicing strategy + url: update/waas-servicing-strategy-windows-10-updates.md + + # Card + - title: Prepare to deploy Windows 10 + linkLists: + - linkListType: how-to-guide + links: + - text: Prepare to deploy Windows 10 + url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md + - text: Evaluate and update infrastructure + url: update/update-policies.md + - text: Build a successful servicing strategy + url: update/waas-deployment-rings-windows-10-updates.md + + # Card + - title: Deploy Windows 10 + linkLists: + - linkListType: deploy + links: + - text: Deploy Windows 10 with Autopilot + url: windows-autopilot/windows-autopilot-scenarios.md + - text: Assign devices to servicing channels + url: update/waas-servicing-channels-windows-10-updates.md + - text: Deploy Windows 10 updates + url: update/index.md + + # Card (optional) + - title: Also see + linkLists: + - linkListType: reference + links: + - text: Windows 10 release information + url: https://docs.microsoft.com/en-us/windows/release-information/ + - text: What's new in Windows 10 + url: https://docs.microsoft.com/en-us/windows/whats-new/ + - text: Windows 10 Enterprise Security + url: https://docs.microsoft.com/en-us/windows/security/ From b8e29f76ac660bdf066251990fea2e9f483307b9 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Thu, 4 Jun 2020 13:04:07 -0700 Subject: [PATCH 094/228] pencil edit --- .../windows-firewall/create-an-authentication-request-rule.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md index c274213bfb..38155aa557 100644 --- a/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md +++ b/windows/security/threat-protection/windows-firewall/create-an-authentication-request-rule.md @@ -27,7 +27,7 @@ After you have configured IPsec algorithms and authentication methods, you can c **Administrative credentials** -To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the GPOs (Group Policy Objects). +To complete this procedure, you must be a member of the Domain Administrators group, or otherwise be delegated permissions to modify the (Group Policy Objects) GPOs. To create the authentication request rule: From 0234bd6361886e44f414f0ff05601549537e107e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 4 Jun 2020 13:19:15 -0700 Subject: [PATCH 095/228] new lp --- windows/deployment/index.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 73bde8397e..7f93ece2f8 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -45,7 +45,6 @@ landingContent: url: update/waas-overview.md - text: Types of Windows updates url: update/waas-quick-start.md#definitions - n - linkListType: get-started links: - text: Servicing the Windows 10 operating system From 538162c012dd44c2c01c0fc043c724a1e23deaa3 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 4 Jun 2020 13:46:46 -0700 Subject: [PATCH 096/228] new lp --- windows/deployment/index.yml | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 7f93ece2f8..2198000c12 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -58,8 +58,12 @@ landingContent: links: - text: Create a deployment plan url: update/create-deployment-plan.md + - text: Define readiness criteria + url: update/plan-define-readiness.md - text: Evaluate infrastructure and tools url: update/eval-infra-tools.md + - text: Determine application readiness + url: update/plan-determine-app-readiness.md - text: Define your servicing strategy url: update/waas-servicing-strategy-windows-10-updates.md @@ -88,13 +92,16 @@ landingContent: url: update/index.md # Card (optional) - - title: Also see + - title: Windows 10 resources linkLists: - - linkListType: reference + - linkListType: learn links: - text: Windows 10 release information - url: https://docs.microsoft.com/en-us/windows/release-information/ + url: https://docs.microsoft.com/windows/release-information/ - text: What's new in Windows 10 - url: https://docs.microsoft.com/en-us/windows/whats-new/ + url: https://docs.microsoft.com/windows/whats-new/ - text: Windows 10 Enterprise Security - url: https://docs.microsoft.com/en-us/windows/security/ + url: https://docs.microsoft.com/windows/security/ + - text: Desktop Deployment Center + url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home + From 31a8ec974b24cef3f606e18c376de87c987a5ca9 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Thu, 4 Jun 2020 14:14:19 -0700 Subject: [PATCH 097/228] removed some comments --- windows/deployment/update/prepare-deploy-windows.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/prepare-deploy-windows.md b/windows/deployment/update/prepare-deploy-windows.md index c5a28a2a9c..76cbb5eea0 100644 --- a/windows/deployment/update/prepare-deploy-windows.md +++ b/windows/deployment/update/prepare-deploy-windows.md @@ -155,4 +155,4 @@ You can employ a variety of measures to achieve this, for example: - Provide the ability to voluntarily update at users’ convenience. - Inform users of a mandatory installation date when the update will be installed on all devices. -{I can include the calendar if desired, but the version in the source material isn't rendering well.} + From f8cb13887d63708a5872ab642b26bc08428d6317 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 4 Jun 2020 14:17:57 -0700 Subject: [PATCH 098/228] new lp --- windows/deployment/TOC.yml | 2 + windows/deployment/index.yml | 14 ++++-- windows/deployment/index3.yml | 94 ----------------------------------- 3 files changed, 13 insertions(+), 97 deletions(-) delete mode 100644 windows/deployment/index3.yml diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index 7c8dff22d6..ef87ea0981 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -245,6 +245,8 @@ - name: Delivery Optimization reference href: update/waas-delivery-optimization-reference.md - name: Windows 10 in S mode + href: s-mode.md + - name: Switch to Windows 10 Pro or Enterprise from S mode href: windows-10-pro-in-s-mode.md - name: Windows 10 deployment tools items: diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 2198000c12..af86c3120f 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -72,7 +72,9 @@ landingContent: linkLists: - linkListType: how-to-guide links: - - text: Prepare to deploy Windows 10 + - text: Prepare for Zero Touch Installation with Configuration Manager + url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + - text: Prepare to deploy Windows 10 with MDT url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - text: Evaluate and update infrastructure url: update/update-policies.md @@ -84,12 +86,18 @@ landingContent: linkLists: - linkListType: deploy links: - - text: Deploy Windows 10 with Autopilot + - text: Windows Autopilot scenarios and capabilities url: windows-autopilot/windows-autopilot-scenarios.md + - text: Deploy Windows 10 to a new device with Configuration Manager + url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md + - text: Deploy a Windows 10 image using MDT + url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - text: Assign devices to servicing channels url: update/waas-servicing-channels-windows-10-updates.md - text: Deploy Windows 10 updates - url: update/index.md + url: update/waas-servicing-channels-windows-10-updates.md + - text: Resolve Windows 10 upgrade errors + url: upgrade/resolve-windows-10-upgrade-errors # Card (optional) - title: Windows 10 resources diff --git a/windows/deployment/index3.yml b/windows/deployment/index3.yml deleted file mode 100644 index 753f83e575..0000000000 --- a/windows/deployment/index3.yml +++ /dev/null @@ -1,94 +0,0 @@ -### YamlMime:Landing - -title: Windows 10 deployment resources and documentation # < 60 chars -summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars - -metadata: - title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. - description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. - services: windows-10 - ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. - ms.subservice: subservice - ms.topic: landing-page # Required - ms.collection: windows-10 - author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. - ms.author: greglin #Required; microsoft alias of author; optional team alias. - ms.date: 05/27/2020 #Required; mm/dd/yyyy format. - localization_priority: medium - -# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new - -landingContent: -# Cards and links should be based on top customer tasks or top subjects -# Start card title with a verb - # Card (optional) - - title: Overview - linkLists: - - linkListType: overview - links: - - text: Windows 10 deployment scenarios - url: windows-10-deployment-scenarios.md - - text: What is Windows as a service? - url: update/waas-overview.md - - text: Types of Windows updates - url: update/waas-quick-start.md#definitions - - # Card (optional) - - title: Get started - linkLists: - - linkListType: get-started - links: - - text: Demonstrate Autopilot deployment - url: windows-autopilot/demonstrate-deployment-on-vm.md - - text: Servicing the Windows 10 operating system - url: update/waas-servicing-strategy-windows-10-updates.md - - text: Deploy Windows 10 in a test lab - url: windows-10-poc.md - - # Card (optional) - - title: Deployment planning - linkLists: - - linkListType: architecture - links: - - text: Create a deployment plan - url: update/create-deployment-plan.md - - text: Evaluate infrastructure and tools - url: update/eval-infra-tools.md - - text: Define your servicing strategy - url: update/waas-servicing-strategy-windows-10-updates.md - - # Card - - title: Prepare to deploy Windows 10 - linkLists: - - linkListType: how-to-guide - links: - - text: Prepare to deploy Windows 10 - url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - - text: Evaluate and update infrastructure - url: update/update-policies.md - - text: Build a successful servicing strategy - url: update/waas-deployment-rings-windows-10-updates.md - - # Card - - title: Deploy Windows 10 - linkLists: - - linkListType: deploy - links: - - text: Deploy Windows 10 with Autopilot - url: windows-autopilot/windows-autopilot-scenarios.md - - text: Assign devices to servicing channels - url: update/waas-servicing-channels-windows-10-updates.md - - text: Deploy Windows 10 updates - url: update/index.md - - # Card (optional) - - title: Also see - linkLists: - - linkListType: reference - links: - - text: Windows 10 release information - url: https://docs.microsoft.com/en-us/windows/release-information/ - - text: What's new in Windows 10 - url: https://docs.microsoft.com/en-us/windows/whats-new/ - - text: Windows 10 Enterprise Security - url: https://docs.microsoft.com/en-us/windows/security/ From 76b9354f4588642d6300e5d406456069009225d9 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Thu, 4 Jun 2020 14:37:16 -0700 Subject: [PATCH 099/228] new lp --- windows/deployment/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index af86c3120f..5ccbf1c1c7 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -97,7 +97,7 @@ landingContent: - text: Deploy Windows 10 updates url: update/waas-servicing-channels-windows-10-updates.md - text: Resolve Windows 10 upgrade errors - url: upgrade/resolve-windows-10-upgrade-errors + url: upgrade/resolve-windows-10-upgrade-errors.md # Card (optional) - title: Windows 10 resources From 596578fa97fe9b562ee7c0e979a4e3283fdc064a Mon Sep 17 00:00:00 2001 From: Bill Mcilhargey <19168174+computeronix@users.noreply.github.com> Date: Thu, 4 Jun 2020 22:19:31 -0400 Subject: [PATCH 100/228] Updated licensing changes for Windows Servers Removed outdated licensing information for Windows servers and added proper licensing server information for MDATP based upon PM information and Product Terms as of April 2020. Confirm with proper channels and review Product Terms to see matching information. --- .../microsoft-defender-atp/minimum-requirements.md | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index 736722c00e..ba0601d10d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -40,15 +40,20 @@ Microsoft Defender Advanced Threat Protection requires one of the following Micr - Microsoft 365 E5 Security - Microsoft 365 A5 (M365 A5) +Microsoft Defender Advanced Threat Protection, on Windows Server, requires one of the following licensing options: + +- [Azure Security Center Standard plan](https://docs.microsoft.com/azure/security-center/security-center-pricing) (per node) +- Microsoft Defender ATP for Servers (one per covered Server) + +> [!NOTE] +> Customers with a combined minimum of 50 licenses for one or more of the following may acquire Server SLs for Microsoft Defender Advanced Threat Protection for Servers (one per covered Server OSE): Microsoft Defender Advanced Threat Protection, Windows E5/A5, Microsoft 365 E5/A5 and Microsoft 365 E5 Security User SLs. This license applies to Microsoft Defender ATP for Linux. + For detailed licensing information, see the [Product terms page](https://www.microsoft.com/licensing/product-licensing/products) and work with your account team to learn the detailed terms and conditions for the product. For more information on the array of features in Windows 10 editions, see [Compare Windows 10 editions](https://www.microsoft.com/windowsforbusiness/compare). For a detailed comparison table of Windows 10 commercial edition comparison, see the [comparison PDF](https://go.microsoft.com/fwlink/p/?linkid=2069559). -For more information about licensing requirements for Microsoft Defender ATP platform on Windows Server, see [Protecting Windows Servers with Microsoft Defender ATP](https://techcommunity.microsoft.com/t5/Windows-Defender-ATP/Protecting-Windows-Server-with-Windows-Defender-ATP/ba-p/267114). - - ## Browser requirements Access to Microsoft Defender ATP is done through a browser, supporting the following browsers: - Microsoft Edge From 6d8ab3c731c458cb7e5d020229632c513547f852 Mon Sep 17 00:00:00 2001 From: Bill Mcilhargey <19168174+computeronix@users.noreply.github.com> Date: Thu, 4 Jun 2020 22:40:09 -0400 Subject: [PATCH 101/228] Update minimum-requirements.md added a note from Product Terms discussing the number of concurrent devices MDATP can be used on per user --- .../microsoft-defender-atp/minimum-requirements.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md index ba0601d10d..3bbf64e500 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md +++ b/windows/security/threat-protection/microsoft-defender-atp/minimum-requirements.md @@ -40,6 +40,9 @@ Microsoft Defender Advanced Threat Protection requires one of the following Micr - Microsoft 365 E5 Security - Microsoft 365 A5 (M365 A5) +> [!NOTE] +> Eligible Licensed Users may use Microsoft Defender Advanced Threat Protection on up to five concurrent devices. + Microsoft Defender Advanced Threat Protection, on Windows Server, requires one of the following licensing options: - [Azure Security Center Standard plan](https://docs.microsoft.com/azure/security-center/security-center-pricing) (per node) From a455dd96ce7cdef1abca268a72d411056bb472ad Mon Sep 17 00:00:00 2001 From: Macky Cruz Date: Fri, 5 Jun 2020 10:41:04 +0800 Subject: [PATCH 102/228] Added configuration for passiveMode --- .../threat-protection/microsoft-defender-atp/mac-resources.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md b/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md index bda42ad846..f7626685ae 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-resources.md @@ -87,6 +87,7 @@ Important tasks, such as controlling product settings and triggering on-demand s |Configuration|Turn on PUA protection |`mdatp --threat --type-handling potentially_unwanted_application block`| |Configuration|Turn off PUA protection |`mdatp --threat --type-handling potentially_unwanted_application off` | |Configuration|Turn on audit mode for PUA protection |`mdatp --threat --type-handling potentially_unwanted_application audit`| +|Configuration|Turn on/off passiveMode |`mdatp --config passiveMode [on/off]` | |Diagnostics |Change the log level |`mdatp --log-level [error/warning/info/verbose]` | |Diagnostics |Generate diagnostic logs |`mdatp --diagnostic --create` | |Health |Check the product's health |`mdatp --health` | From 781c275e35f700db283a6c813df7b53d00c8fd1f Mon Sep 17 00:00:00 2001 From: MaratMussabekov <48041687+MaratMussabekov@users.noreply.github.com> Date: Fri, 5 Jun 2020 09:51:17 +0500 Subject: [PATCH 103/228] Update network-access-restrict-clients-allowed-to-make-remote-sam-calls.md --- ...k-access-restrict-clients-allowed-to-make-remote-sam-calls.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md index 5f46ca3685..f5a0e5c08f 100644 --- a/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md +++ b/windows/security/threat-protection/security-policy-settings/network-access-restrict-clients-allowed-to-make-remote-sam-calls.md @@ -22,6 +22,7 @@ ms.author: dansimp - Windows 10, version 1507 with [KB 4012606](https://support.microsoft.com/help/4012606) installed - Windows 8.1 with [KB 4102219](https://support.microsoft.com/help/4012219/march-2017-preview-of-monthly-quality-rollup-for-windows-8-1-and-windows-server-2012-r2) installed - Windows 7 with [KB 4012218](https://support.microsoft.com/help/4012218/march-2017-preview-of-monthly-quality-rollup-for-windows-7-sp1-and-windows-server-2008-r2-sp1) installed +- Windows Server 2019 - Windows Server 2016 - Windows Server 2012 R2 with[KB 4012219](https://support.microsoft.com/help/4012219/march-2017-preview-of-monthly-quality-rollup-for-windows-8-1-and-windows-server-2012-r2) installed - Windows Server 2012 with [KB 4012220](https://support.microsoft.com/help/4012220/march-2017-preview-of-monthly-quality-rollup-for-windows-server-2012) installed From 1f9fedacec779a309e84507ddcc5c028657fdf8e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 01:06:41 -0700 Subject: [PATCH 104/228] update --- windows/deployment/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 5ccbf1c1c7..3827964e67 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -82,7 +82,7 @@ landingContent: url: update/waas-deployment-rings-windows-10-updates.md # Card - - title: Deploy Windows 10 + - title: Deploy and update Windows 10 linkLists: - linkListType: deploy links: From a44c6fb113f2efda2a9d163ff846ca874dc51725 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 10:14:43 -0700 Subject: [PATCH 105/228] new cards --- windows/deployment/TOC.yml | 6 +- windows/deployment/index2.yml | 128 ++++++++++++++++++++++++++++++++++ 2 files changed, 133 insertions(+), 1 deletion(-) create mode 100644 windows/deployment/index2.yml diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index ef87ea0981..db3b462fda 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -44,7 +44,11 @@ - name: Define your servicing strategy href: update/waas-servicing-strategy-windows-10-updates.md - name: Best practices for feature updates on mission-critical devices - href: update/feature-update-mission-critical.md + href: update/feature-update-mission-critical.md + - name: Windows 10 deployment considerations + href: planning/windows-10-deployment-considerations.md + - name: Windows 10 infrastructure requirements + href: planning/windows-10-infrastructure-requirements - name: Plan for volume activation href: volume-activation/plan-for-volume-activation-client.md - name: Features removed or planned for replacement diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml new file mode 100644 index 0000000000..ddb29941f1 --- /dev/null +++ b/windows/deployment/index2.yml @@ -0,0 +1,128 @@ +### YamlMime:Landing + +title: Windows 10 deployment resources and documentation # < 60 chars +summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars + +metadata: + title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. + description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. + services: windows-10 + ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. + ms.subservice: subservice + ms.topic: landing-page # Required + ms.collection: windows-10 + author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. + ms.author: greglin #Required; microsoft alias of author; optional team alias. + ms.date: 05/27/2020 #Required; mm/dd/yyyy format. + localization_priority: medium + +# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new + +landingContent: +# Cards and links should be based on top customer tasks or top subjects +# Start card title with a verb + # Card (optional) + - title: Deploy Windows 10 + linkLists: + - linkListType: overview + links: + - text: Windows 10 deployment scenarios + url: windows-10-deployment-scenarios.md + + - linkListType: quickstart + links: + - text: Demonstrate Autopilot deployment + url: windows-autopilot/demonstrate-deployment-on-vm.md + - text: Deploy Windows 10 in a test lab + url: windows-10-poc.md + - linkListType: architecture + links: + - text: Windows 10 deployment considerations + url: planning/windows-10-deployment-considerations.md + - text: Windows 10 infrastructure requirements + url: planning/windows-10-infrastructure-requirements + - text: Windows 10 features lifecycle + url: planning/features-lifecycle.md + - text: Plan for volume activation + url: volume-activation/plan-for-volume-activation-client.md + - linkListType: how-to-guide + links: + - text: Prepare for Zero Touch Installation with Configuration Manager + url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + - text: Prepare to deploy Windows 10 with MDT + url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md + - linkListType: deploy + links: + - text: Windows Autopilot scenarios and capabilities + url: windows-autopilot/windows-autopilot-scenarios.md + - text: Deploy Windows 10 to a new device with Configuration Manager + url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md + - text: Deploy a Windows 10 image using MDT + url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md + - text: Resolve Windows 10 upgrade errors + url: upgrade/resolve-windows-10-upgrade-errors.md + + # Card (optional) + - title: Update Windows 10 + linkLists: + - linkListType: overview + links: + - text: What is Windows as a service? + url: update/waas-overview.md + - text: Types of Windows updates + url: update/waas-quick-start.md#definitions + - linkListType: get-started + links: + - text: Servicing the Windows 10 operating system + url: update/waas-servicing-strategy-windows-10-updates.md + - linkListType: architecture + links: + - text: Create a deployment plan + url: update/create-deployment-plan.md + - text: Define readiness criteria + url: update/plan-define-readiness.md + - text: Evaluate infrastructure and tools + url: update/eval-infra-tools.md + - text: Determine application readiness + url: update/plan-determine-app-readiness.md + - text: Define your servicing strategy + url: update/waas-servicing-strategy-windows-10-updates.md + - linkListType: how-to-guide + links: + - text: Evaluate and update infrastructure + url: update/update-policies.md + - text: Build a successful servicing strategy + url: update/waas-deployment-rings-windows-10-updates.md + - linkListType: deploy + links: + - text: Assign devices to servicing channels + url: update/waas-servicing-channels-windows-10-updates.md + - text: Deploy Windows 10 updates + url: update/waas-servicing-channels-windows-10-updates.md + + # Card (optional) + - title: Windows 10 resources + linkLists: + - linkListType: learn + links: + - text: Windows 10 release information + url: https://docs.microsoft.com/windows/release-information/ + - text: What's new in Windows 10 + url: https://docs.microsoft.com/windows/whats-new/ + - text: Microsoft 365 for enterprise documention + url: https://docs.microsoft.com/microsoft-365/enterprise/ + - text: Microsoft Surface documentation + url: https://docs.microsoft.com/surface/ + - text: Evaluate Windows 10 Enterprise + url: https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise + - text: Microsoft FastTrack cloud solutions + url: https://www.microsoft.com/fasttrack/ + - text: Microsoft Intune documentation + url: https://docs.microsoft.com/mem/intune/ + - text: Microsoft Endpoint Configuration Manager documentation + url: https://docs.microsoft.com/mem/configmgr/ + - text: Windows 10 Enterprise Security + url: https://docs.microsoft.com/windows/security/ + - text: Desktop Deployment Center + url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home + From 9b73f89bad4f2eab7dff883a55c15aff9bd716f5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 10:36:26 -0700 Subject: [PATCH 106/228] fix yaml error --- windows/deployment/TOC.yml | 2 +- windows/deployment/index2.yml | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index db3b462fda..c0f9bfdc9b 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -48,7 +48,7 @@ - name: Windows 10 deployment considerations href: planning/windows-10-deployment-considerations.md - name: Windows 10 infrastructure requirements - href: planning/windows-10-infrastructure-requirements + href: planning/windows-10-infrastructure-requirements.md - name: Plan for volume activation href: volume-activation/plan-for-volume-activation-client.md - name: Features removed or planned for replacement diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml index ddb29941f1..d7fb460e38 100644 --- a/windows/deployment/index2.yml +++ b/windows/deployment/index2.yml @@ -87,13 +87,13 @@ landingContent: url: update/plan-determine-app-readiness.md - text: Define your servicing strategy url: update/waas-servicing-strategy-windows-10-updates.md - - linkListType: how-to-guide + - linkListType: how-to-guide links: - text: Evaluate and update infrastructure url: update/update-policies.md - text: Build a successful servicing strategy url: update/waas-deployment-rings-windows-10-updates.md - - linkListType: deploy + - linkListType: deploy links: - text: Assign devices to servicing channels url: update/waas-servicing-channels-windows-10-updates.md From fda3cb3d78daa239f6ac6f2aa56161bce0e30bda Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 11:10:51 -0700 Subject: [PATCH 107/228] fix link --- windows/deployment/index2.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml index d7fb460e38..63c3cf0884 100644 --- a/windows/deployment/index2.yml +++ b/windows/deployment/index2.yml @@ -40,7 +40,7 @@ landingContent: - text: Windows 10 deployment considerations url: planning/windows-10-deployment-considerations.md - text: Windows 10 infrastructure requirements - url: planning/windows-10-infrastructure-requirements + url: planning/windows-10-infrastructure-requirements.md - text: Windows 10 features lifecycle url: planning/features-lifecycle.md - text: Plan for volume activation From 0cf94331be3a1c2d43c392717bd00f85a5d2baf8 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 11:22:35 -0700 Subject: [PATCH 108/228] add card --- windows/deployment/TOC.yml | 2 -- windows/deployment/index2.yml | 22 ++++++++++++++++++++++ 2 files changed, 22 insertions(+), 2 deletions(-) diff --git a/windows/deployment/TOC.yml b/windows/deployment/TOC.yml index c0f9bfdc9b..0b76ac574b 100644 --- a/windows/deployment/TOC.yml +++ b/windows/deployment/TOC.yml @@ -242,8 +242,6 @@ href: update/windows-update-overview.md - name: Servicing stack updates href: update/servicing-stack-updates.md - - name: How Windows Update works - href: update/how-windows-update-works.md - name: Additional Windows Update settings href: update/waas-wu-settings.md - name: Delivery Optimization reference diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml index 63c3cf0884..aa422d777e 100644 --- a/windows/deployment/index2.yml +++ b/windows/deployment/index2.yml @@ -100,6 +100,28 @@ landingContent: - text: Deploy Windows 10 updates url: update/waas-servicing-channels-windows-10-updates.md + # Card (optional) + - title: Technical references + linkLists: + - linkListType: reference + links: + - text: How does Windows Update work? + url: update/how-windows-update-works.md + - text: Unified Update Platform (UUP) architecture + url: update/windows-update-overview.md#unified-update-platform-uup-architecture + - text: Servicing stack updates + url: update/servicing-stack-updates.md + - text: Manage additional Windows Update setings + url: update/waas-wu-settings.md + - text: Delivery Optimization reference + url: update/waas-delivery-optimization-reference.md + - text: Convert an MBR partition to GPT + url: mbr-to-gpt.md + - text: VAMT technical reference + url: volume-activation/volume-activation-management-tool.md + - text: User State Migration Tool (USMT) overview + url: usmt/usmt-overview.md + # Card (optional) - title: Windows 10 resources linkLists: From a46ed80759ac45854d4665bd248919fdd3cee0c5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 11:53:34 -0700 Subject: [PATCH 109/228] combine cards --- windows/deployment/index2.yml | 7 +------ 1 file changed, 1 insertion(+), 6 deletions(-) diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml index aa422d777e..5ef8d541e2 100644 --- a/windows/deployment/index2.yml +++ b/windows/deployment/index2.yml @@ -101,7 +101,7 @@ landingContent: url: update/waas-servicing-channels-windows-10-updates.md # Card (optional) - - title: Technical references + - title: Technical references and additional resources linkLists: - linkListType: reference links: @@ -121,10 +121,6 @@ landingContent: url: volume-activation/volume-activation-management-tool.md - text: User State Migration Tool (USMT) overview url: usmt/usmt-overview.md - - # Card (optional) - - title: Windows 10 resources - linkLists: - linkListType: learn links: - text: Windows 10 release information @@ -147,4 +143,3 @@ landingContent: url: https://docs.microsoft.com/windows/security/ - text: Desktop Deployment Center url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home - From bc2af3dd96751555ada50646c5ad9e9857a65200 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 12:13:42 -0700 Subject: [PATCH 110/228] tweak --- windows/deployment/index2.yml | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml index 5ef8d541e2..05759feb1e 100644 --- a/windows/deployment/index2.yml +++ b/windows/deployment/index2.yml @@ -99,9 +99,11 @@ landingContent: url: update/waas-servicing-channels-windows-10-updates.md - text: Deploy Windows 10 updates url: update/waas-servicing-channels-windows-10-updates.md + - text: Troubleshoot Windows Update + url: update/windows-update-troubleshooting.md # Card (optional) - - title: Technical references and additional resources + - title: Technical references and resources linkLists: - linkListType: reference links: From 48d31d2a94e5a1f8b3d3d75529d36b9d6c4a6491 Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Fri, 5 Jun 2020 12:16:32 -0700 Subject: [PATCH 111/228] Updated tables with MS Server 2019 info The tables I changed were in HTML, I converted them to Markdown. --- .../app-v-51-supported-configurations.md | 244 +++--------------- .../app-v/appv-supported-configurations.md | 12 +- 2 files changed, 39 insertions(+), 217 deletions(-) diff --git a/mdop/appv-v5/app-v-51-supported-configurations.md b/mdop/appv-v5/app-v-51-supported-configurations.md index 7785be89ee..fbb61d173c 100644 --- a/mdop/appv-v5/app-v-51-supported-configurations.md +++ b/mdop/appv-v5/app-v-51-supported-configurations.md @@ -43,45 +43,13 @@ The following table lists the operating systems that are supported for the App-V **Note**   Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. - - - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Operating systemService PackSystem architecture

Microsoft Windows Server 2016

64-bit

Microsoft Windows Server 2012 R2

64-bit

Microsoft Windows Server 2012

64-bit

Microsoft Windows Server 2008 R2

SP1

64-bit

- + | Operating System | Service Pack | System Architecture | +|----------------------------------|--------------|---------------------| +| Microsoft Windows Server 2019 | | 64-bit | +| Microsoft Windows Server 2016 | | 64-bit | +| Microsoft Windows Server 2012 R2 | | 64-bit | +| Microsoft Windows Server 2012 | | 64-bit | +| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates)| SP1 | 64-bit | **Important**   @@ -155,44 +123,13 @@ For more information on user configuration files with SQL server 2016 or later, The following table lists the operating systems that are supported for the App-V 5.1 Publishing server installation. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Operating systemService PackSystem architecture

Microsoft Windows Server 2016

64-bit

Microsoft Windows Server 2012 R2

64-bit

Microsoft Windows Server 2012

64-bit

Microsoft Windows Server 2008 R2

SP1

64-bit

- - +| Operating System | Service Pack | System Architecture | +|----------------------------------|--------------|---------------------| +| Microsoft Windows Server 2019 | | 64-bit | +| Microsoft Windows Server 2016 | | 64-bit | +| Microsoft Windows Server 2012 R2 | | 64-bit | +| Microsoft Windows Server 2012 | | 64-bit | +| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit | ### Publishing server hardware requirements @@ -208,44 +145,13 @@ App-V adds no additional requirements beyond those of Windows Server. The following table lists the operating systems that are supported for the App-V 5.1 Reporting server installation. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Operating systemService PackSystem architecture

Microsoft Windows Server 2016

64-bit

Microsoft Windows Server 2012 R2

64-bit

Microsoft Windows Server 2012

64-bit

Microsoft Windows Server 2008 R2

SP1

64-bit

- - +| Operating System | Service Pack | System Architecture | +|----------------------------------|--------------|---------------------| +| Microsoft Windows Server 2019 | | 64-bit | +| Microsoft Windows Server 2016 | | 64-bit | +| Microsoft Windows Server 2012 R2 | | 64-bit | +| Microsoft Windows Server 2012 | | 64-bit | +| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit | ### Reporting server hardware requirements @@ -368,44 +274,13 @@ The following list displays the supported hardware configuration for the App-V 5 The following table lists the operating systems that are supported for App-V 5.1 Remote Desktop Services (RDS) client installation. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Operating systemService PackSystem architecture

Microsoft Windows Server 2016

64-bit

Microsoft Windows Server 2012 R2

64-bit

Microsoft Windows Server 2012

64-bit

Microsoft Windows Server 2008 R2

SP1

64-bit

- - +| Operating System | Service Pack | System Architecture | +|----------------------------------|--------------|---------------------| +| Microsoft Windows Server 2019 | | 64-bit | +| Microsoft Windows Server 2016 | | 64-bit | +| Microsoft Windows Server 2012 R2 | | 64-bit | +| Microsoft Windows Server 2012 | | 64-bit | +| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit | ### Remote Desktop Services client hardware requirements @@ -421,59 +296,16 @@ App-V adds no additional requirements beyond those of Windows Server. The following table lists the operating systems that are supported for the App-V 5.1 Sequencer installation. - ----- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Operating systemService packSystem architecture

Microsoft Windows Server 2016

64-bit

Microsoft Windows Server 2012 R2

64-bit

Microsoft Windows Server 2012

64-bit

Microsoft Windows Server 2008 R2

SP1

64-bit

Microsoft Windows 10

32-bit and 64-bit

Microsoft Windows 8.1

32-bit and 64-bit

Microsoft Windows 7

SP1

32-bit and 64-bit

- - +| Operating System | Service Pack | System Architecture | +|----------------------------------|--------------|---------------------| +| Microsoft Windows Server 2019 | | 64-bit | +| Microsoft Windows Server 2016 | | 64-bit | +| Microsoft Windows Server 2012 R2 | | 64-bit | +| Microsoft Windows Server 2012 | | 64-bit | +| Microsoft Windows Server 2008 R2 [Extended Security Update](https://www.microsoft.com/windows-server/extended-security-updates) | SP1 | 64-bit | +| Microsoft Windows 10 | | 32-bit and 64-bit | +| Microsoft Windows 8.1 | | 32-bit and 64-bit | +| Microsoft Windows 7 | SP1 | 32-bit and 64-bit | ### Sequencer hardware requirements diff --git a/windows/application-management/app-v/appv-supported-configurations.md b/windows/application-management/app-v/appv-supported-configurations.md index ebab019584..dcf1e72905 100644 --- a/windows/application-management/app-v/appv-supported-configurations.md +++ b/windows/application-management/app-v/appv-supported-configurations.md @@ -104,17 +104,7 @@ Similarly, the App-V Remote Desktop Services (RDS) client is included with Windo ## Sequencer system requirements -The following table lists the operating systems that the App-V Sequencer installation supports. - -|Operating system|Service pack|System architecture| -|---|---|---| -|Microsoft Windows Server 2012 R2||64-bit| -|Microsoft Windows Server 2012||64-bit| -|Microsoft Windows Server 2008 R2|SP1|64-bit| -|Microsoft Windows 10||32-bit and 64-bit| -|Microsoft Windows 8.1||32-bit and 64-bit| -|Microsoft Windows 8||32-bit and 64-bit| -|Microsoft Windows 7|SP1|32-bit and 64-bit| +Sequencer is now part of the Windows Assessment and Deployment Kit (Windows ADK). [Download the latest Windows ADK](https://docs.microsoft.com/windows-hardware/get-started/adk-install) that is recommended for your version of the Windows OS. ### Sequencer hardware requirements From 358441ef2db1f4a28fa99e9724dd4c21c84274f1 Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 5 Jun 2020 13:05:26 -0700 Subject: [PATCH 112/228] add video link --- .../overview-endpoint-detection-response.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md index 261734d68b..0d13fe8b36 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md +++ b/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response.md @@ -28,6 +28,8 @@ Microsoft Defender ATP endpoint detection and response capabilities provide adva When a threat is detected, alerts are created in the system for an analyst to investigate. Alerts with the same attack techniques or attributed to the same attacker are aggregated into an entity called an _incident_. Aggregating alerts in this manner makes it easy for analysts to collectively investigate and respond to threats. +>[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4o1j5] + Inspired by the "assume breach" mindset, Microsoft Defender ATP continuously collects behavioral cyber telemetry. This includes process information, network activities, deep optics into the kernel and memory manager, user login activities, registry and file system changes, and others. The information is stored for six months, enabling an analyst to travel back in time to the start of an attack. The analyst can then pivot in various views and approach an investigation through multiple vectors. The response capabilities give you the power to promptly remediate threats by acting on the affected entities. From e174ca4f1d88c41269d5a14af3ec85edbb9da81e Mon Sep 17 00:00:00 2001 From: Joey Caparas Date: Fri, 5 Jun 2020 14:53:30 -0700 Subject: [PATCH 113/228] update image and step 7 text --- .../images/configmgr-simple-value.png | Bin 53294 -> 67011 bytes .../microsoft-defender-atp/onboarding.md | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/images/configmgr-simple-value.png b/windows/security/threat-protection/microsoft-defender-atp/images/configmgr-simple-value.png index 78d20dc4eebb0f9694abbf4913ebc9fbbc922051..6712c068457972c7eac06c6af39cb7b1e4c2280a 100644 GIT binary patch literal 67011 zcmXtARa6{Zv&D6=!QC~;;1Jy126uN!a0n2b;O-jS-8BSv5ALqP-7fk5bsu`ontte0 zcIxb1Ro!9Aic%;@1V|7N5GXRz;$R2}$hMCw3jyxqj+sFd^2ZP2S7~i$2nZbNe;1?- znCjx=CcKM`f&~0794s~mFTDO~4+I1mgp9a|nn&hor+cFQpwGc$X@x(>5n7tNwSp?eikL;trWMmb7f0giNxP zEEaYuy9he38}}4%Cy_(hve5bo3`Z)&{!`}l)cIOlbD4p#&w2In{d3Y{r&qIR{mDUr->4Ee%NwrPmC(&psK_1)5*^G0@8RFqL}YT=r#ovqUM|VBHb4gh z)t5FX63X4KNf0G@y{vpIBA02}4VJCccDrA5UkGxbb}$Yf@&84u;gfA-%x-gt%zqIy zJV|n^%{|pqWh-B{hfhG1V_Ve~Ul^x)J)ev7o@t#KQRoybiq~k`NE%u44${ah{*dh) zY645bRGoZNQ9!BUi3r0hIp}j}s#mDbv*P8SFXLBPq#8ph88QV6s;oe0lA!gI zKH++KJQJUb04Qw%95&uZHjkaE{q8qW z6r%aZ^Ow#53hc1>DUqeLWDK!M)gfjr3V?68+enCY#e3-+tzS;B0LhhUDE@T8BRN~Lla$fMx_3U;_-+3=njznu?Y2&TP*m>pSU;+h*tIJ5G zWAdel28)Fq+!*5Tn1b>rl55o=pswt_zuQQ8g=8nJ!$ z24dSEY@=k+(KnKRn0`GDFT~$EJ(I^VAc~M17$x~(H~<>j?D~4Nbrnfw6#J(df^X=7 zIr+;E#@X4vLiYmmzsE8qe812J5;lSOQnse0vMr3s>s=lfFDd2CeBihNtPPH_F8rdK z?N|}iqOks&~0-?nL*1c`Ch^#w)K(DV90Ng z$SXz`Vjj4P5>0xj4a4-7YyA|hvak>{1^&@~qBK1cSeU=zU2~`fE{Us_H6GSO@H9w=ZMe`_buXy$2V|sV`zLbtJg+) z1XgL*i?gQz)F-77g3rHUA;D6iKd9F&F&ei*MBw~Hw8c zR=sFUTE(e9eIb2;Yh2E2m3DQvH@Y{e24a7j;9YY^0XpjA>dlS zw9z;O=rRo=c1A}NGk_{y5T+wD!Lj)}@?;*6iLP1xpj+amu@E9~VnRdF!pV#c{mYSX zI!T%yjyd;KW;h$CfQ*+eU+@xsG+GR6%MMtFX?XDgrmALw zMoTHrJXTv}YW3&drz%)K>SJ@a*YP;Gy11Z+kU!s_TUuF#&d<+tP700YVTw9lNQYFv zzCsy3Ci~Ys9TG0eG8>v~tXr09gzI&KY7?g>@kz_aE;T`6KJTo8T z3wVi*uWk@vxx1Sfdz_NPmWV3t&nk4Av*F@)9xkX9n3xiA2hzr{G;d_dPh=hNXr@Dl z9}W@sBjWc55LDUOwVL{0PKjm{>d}=2 zU>cVL$;g0F)mAJ<4~vf5Oec$O!>9!IIjTGCsmZVijH5;-yFAy_63z@GHxG1DF=&{! zI)ir+%{9g)Ir~j+^S8GqA?ir|fL>aq+11W8;uM4MGi+W?P9;C1wJD9KWuUxb6iZ{a zjh#O@WEOMQ<))&T6Rub>Ye1$*W|15@jUQ#4iKCEsdpzog^9rM<$h|k}>Tu^7aPOV}oU1giUxc z7-xm)V{^rqWSSiCO|BlkBT-1YOA(5O1Q|=C2g%9FWGCLB+7}j6H_nmLQ%eWO$E%u} zrVd*WMYuD(esmuA3(*+rQ6M8)r2Xrn6N|VXL^+41pYxt?}GJFS zR{A_ZLCP9SzRnn}2g3<@i}Oby1iAJ>Y5V0?v0ozxI_@XDliC=8R< z%E7_n>(|(#BARGoKFLzG&$dM)9Xru{Z`U9HlToFQ>dy;z%=Rsgju`XBvukTHbY`9P z+{gRvmg-Pub!w+*0R*auMYM{n?9JUhdT_?PF#bwna(oKIc>N~X%Cg(TG!#WtDNJBS zY)7DiOEWh}kX59iG{a0>g;BjG6E6zInz0_|J}E29#Eo2vnO#a-aAcdK~WMil$H?j6Taji z?eN67%GccX^5D{16$?wt%Q2onXrIJ7-tA$k?DN@$g$T`&9hp$tj6*9KHeRlgQ*YE! z8KAnlMZGyiQ+H_Lp|$Pi%^}FS-Z|6*I&h82tj;ri`LoI&es%Nd>6wn3w5KFS-UXv; zWg(42Hr5PFs}l_(b!tOL`hx>4Iv8;#Xz0K?&7a^ZWhUN+22LQHIyfq;V4DlGSP9Ii zHf&zk;Nmiq8P4Kaaabz%5!H&utQv~+{fCEiOiWA-&CSrU@-&w|Il;lO=@}U*15G~9 zcjRv8>y;XCk?MF|ss_QQxQb&|k1tQF$cCZol!Va1&=1C^W}Jya zk+Uc{*Pu&e=u1EmCq~AHlZHvQ2Esv(fNB9E^f|qQKWoVw=TbZv6m9^M<4)vK{m5bc z34Nxh{<<`pPS#d-eOxg9q-65Y^wdq}7%k>k)G6W&5`9ewt4NRFBsDS0CVViRMwobh z>IWk z$>|Pu3>%fsiKcOzDpnhbXt~DI&^(Ro#;5c~Wfs+<5BOUBV?n4W^r>R*xNW{{Qipl| z{^Xo0dE8mOelxjy0NHh&OEs>T-!`5x1GG+|}KMre3Pj;G9 z8_{MP9xvib1`VyCI)`ZbzW57#&Pibb8ygOSsC|X~fM8q%m7FiwNQGvvwW*d)tW_eP zvLrtU&br>j%1K>vG_^RrKL`LrBbs_!_op>*QipWrBcn#`qwIGCS0%GJ)}|-5KG|Ap zQwfUtqbIvrP5sNa856KIhgAM77$M#F)Jwro!J=t;Rl=I?p9DI`$tLc~^i;%N&quzB zFok|Fq5M{m)>p{@`9?g)u1p$P3XI!QnGIz6lut0mOp{uzdgjJW-QMekS~n%TS3?pf2PCPM)b0%?&1T+e2W(fZAtn_Q6;XK`jf|qW?<@nXgCy#77 zbOxt1qI&1+U1akzY?(hO^j?r5#y|zmSiJ>V)jSLx9fWw4G1Bax){K(M3bhBph@yMj zJmFSj6j_R!JaA3+v5NgNoPA-7I6WM!=s{bf3aQ9FIay8o;aClRh~!Gw+Ab zikK7#25z9?kxm9)gh^8NWdb$CH@`t*3>uy68vw%|bRX0HbFO}0S*aX3OtQJj3K#M< za-`yf3J$B97=f)m`|zCxL3#oQm1#k|ib<^wo%0Hd}`#01^6R-zV1 z03sd}A-$VJzqR6a9}@*DD1S3U8E3QI4-5lVLHT*SK$0Ca<@6Og!MjRcEFqAbFVDENGNS*&MIt48*M>dJ|=0&R>|?1)mCuRO2b=4V!LZVb z@;j)yF$S4qz=hkWo4}y!!1+TKsmMK3Cv~TA#+Ab;Cv75Tl(D6zGvtdW3P16vNHCjz zy%6?KYxNVQ@4MAw#A(u12Z0{CDz=`Tp>8zgJ1FY2(Z*lxu3{^EsRnW zKpu;?h(IJ}j1U};&VYc?;-3ffD<|WyOHAu?{q5>g<}cNR4su&Qc(~-xMXIqEnWNv) zA{W(44T&&DAl9n-7iGwj3WvKRb9&)g93jogU^G&MoWY*vJR+;J!pQ;{_nBnT32m)Vb*B{v-Ifo;vGnT%8)G* zg%OBKYZUycyV1!oq+xS`Fu(xiEm;xufI3Db^Dux9h$_T*lLxiQ+}J2KYf_n6<7*~@ zY#Lr;)TM!HtjD2d>L`{BXA{u<7#EKDdI{<>#KL5veC4M|h+w~6nzUGW=qmx2t8%mA?fg_3~mhW$zzN{JIGVKu%PSX=l`lX z>UcG&sh+ofL~>Lhl)#enEe!!A!NlX3Ja||oSXa0IErY+5O1t;aKyW+k-UFTO<3jIr<+Wovf4=BB4#1R<9L56o16zJ)j zaw<7Z6<(6_Gp0Z~1ZofeJOWX51V)TOG3UJrdyxU)899yk58_{1nRqR?jkuPh{#Gab>tyEytE0qobaL2(w} zX5gfLD9v)YAll2Sq-JgPy$NU);&9omO3wte*6u{gx7sbX#lc_?C@E0Rj8hG>v1RAl z{!DOUmb&XRHn6Ln;j0Nt{)?iwzPSy9&4#R9R9uV*JhNMyib5p&goTVD__nukPX$K2PMqRxkuA##Vf3&mw`&fK`$ac~n{UJ))0CsSJrre4;o$Q2 z9~x-SaYoYTAjoCSqM*1Al??_%6(BYtCaYjpru&-Nt1wmk!1M6;|3vLiuFNJXDSqKs zU~UuyS%d((bUfu5KZ_FIVMTzQMP?sb*a`s3O1zu552YwMn^8gUvm&{XHtXf|FeqGH z{5`*p`f(S(+L92n+LToMc9)a-#jcyhQs&lPLb0Py^jhI%{mUsuh5Y3Z^u`{d_Wq3F z3mfT@)|RdBtt;xJOjXNuf?euLua6MH!LgEF?~wl>{V22Gb-$8PI`$p^9oe7(T|(P- zz4xWfj~s!okrC?){rB%zf@Ye~!Qtbyzi#+eJMyss@M06r@A|&|({kKSvsuk1S>6Hd zBzQXszwWhBeNDNYJ9TRbW~ofb;eFqTyT08+Cz|SeU#OBAZI{CH@S9#lRpgmP~_k}r9~Q47eIXFFeW0@m07HH6<?_B2{A~e{>`m7_jhK90fJ?8Jm(5g_!B@!s*hPCHpD#2w(^a zIKY~ZMSv4p`}2nV{#(vj zZ%V9{L-G5*(pALyh9u7$6y`8a+w*doV#5?AVJLT@6$tx#tL$dGnk?_Y!4*P#nwhtM zlfV7yTkvF^tA2oG*JsiBu&LGBD8py@;A)?}^T(4B`-W8OCoeB)?(qZ!y%!t5MDiX` zXg_24k~WP6b?t5Ga#rxoMGqeL+GDw0%-NRLMpq7Dvs9=!4j!*tX8ukBjKE4*8*>*+ z7!~2-*GF^jyXcc68~fkP(U(!b-ksl0yn}@v#to@*|NOJogp9)BysSi?jcAIzL|A5- zva1hNFNMkcX{9m(0C@(^1zF~ca(8-mf4bgJ5owdA0#5s>=|4gC+7G$n2w~QUK>8mh zxk2Y%LsR)$WqIC#-N>w=jPAKz<)Zdq+8Q0>6>h#97Pi*slsi1}pzKR7>*`papP0W& zv>#f8w39vvx{qgV56I24H#Cw;g;2G79VVlYF|~1_&aBV(KfU2(cbr#ye4gn(Gkm$% zTVfqpe9-qksH%3n+SkQ9B{ut63tP?e`<~Q0R5eM_fmkO-oyoM2F^Jf5ZQ!<{!DZ^# z5*cloC*MojhQ=>D$lQ7=+_}VU@Xuj1c>q0c6sF1VF?u%)O#sBMJ8oa8IVDHA zFSw5R2m-qJ%OqRpT~F1kKIa_VdS2Ln`yzFUOx#k{R1);!T)*?Ppb!l?jfAT z$!-LT*Q<`-pS(lX!YU)BbVHGYF%gf#gntp&w1V>-1?3#g!c}`EEW%;GZ|!8+Ew6Up zc)&K>7$afw*#N@`9*mQQhv~1<`1kUZK8h=O0TWd`w5SSG$u*CG?3GMy}G8g zGtO*G``B<39-+5~1GY<31Ro=^W<;+^nm>*LKL$Mn*jocqpff)hN`{UfrW#>UO+vM2 zib|~}2mb5ItlO^o+^>y3PiL9WAc|0JPpvP>FAoDNv1(13POWh4SfM{(vr{Qeva{;# zcFPM_G16-))WG4V#dPd|WLFHK4QBSu# zFnHcQf50<>@$`ztPNO}7tPN5acO{wa~-xTg)ZqtASy3>4ZBC4TGTsG>gh=$B7n zt1DU2m73Rb8PxOIzc>Fu3D0^h;O9a$CS~2ZD+3J%lG%D^EN7B&`X9Hm>^EZ?hxTBO zFHy=UvzbKdJhib)_}VMjda2U%Ll$*J0$gIM46=;d=rP<=SaLg`Ns81dfVSNnRLR!p z9)g&?p3#4a^V7#2r*HYt2inE(0b)iSa_bQvA>E-`3sDgN)5g&;g!}?JW-E@~dosVc zJ?&=P(diLb8Uj;V5C|wA8#9wW7(wX$tsHJbEl!7tjTagk+_&5PJ3+cx*4G#9XaEiz zRVhx%S`ZHWM#8Sj8%>gGWXv_%{lwLEVN1GQr_bkSZu@sElIfqK(;YZAt<0r`yrp3g zzfaYogC7|?JDK{nQ7i4oAz-@Xa<%e~VR@p(sK7LFLGz0KaTs_re#+bQ5*#+OtIP8A zLO(EF(RkX ze1+COU1S}KV9DCt^fy){!k2_o7rZ^XcYamSoSIojV*G*GT}NG>L)RD+U}uRzdw4H2{6%IxbgyBsSE3Gi@rdPPt1IF}NBl&D$>?3IAzKK_OxE zW@>e2Wc>V#`CyYmWL7%O8kVKe*R`?JgmL#*y4_#_Hxh7)@SQH94!))fXq0e^X_fpD&=mhOduA3G(w; zHDgvKPjGcahTBPC&*cA}Xk#6nA=D74wB|_|))0sUNsb-@Nf!i~X#IVh*J3^T?@Z%3 z7}Z|6VGN5wKV5E2nuvzW{{933e;;*a(%~tQQ7e&rclDF2%7y0+JbnZaszf!b?Fh=^mEIzOL@{tOx-cI4Fw8g18 zli;Df(l!z{fHV(|fSAnZ_UEOJ(wyJ9w|%O^*tc`VWWjfN|EZfX8m^a89#{{HRElL> z0#ZoGUMKnX%}bd(h%;u4Ok5@migC8PPJz*OZvuL*sjO7@tIq0w^#%>)=0hB3*(!8O zW5zQQ=0d#@A$pJ_5vHZY)i%3!VHO)~D?`4oSV zyK@_WqQjB9O<`e?wM5zgAA?ld-IyHb7%^*^yqm+-;+1{H3C6wRmH)huBw~4VN!4og zag0+dxsL}IJ4`c0w|%?up^O6`lh%K5Hc{C|4jL=yt*9OBg+mTpRAR>JX)6s15A#8x z@yGmEUCxgRmMfSMXCbq&RE^wsr1Gv(R;VvPZvGxN>_)bN+8x0!_RtJsU~K2 zPwMKde5?a~^81{eCn@zE5395MPkroTDK85yXXVr-`}iazzfm?~k2%x1vpT)*ohAkD zfiS;kYKMnqy4)7@&Dg5X-hb{#i6O78gdX?M`CbqD4x6$N?JxSL@Nn@rsc{K8`4t=R z_l+H;cs$e|7&c|^un3H12liH%o&}=$=KN|oSs~)RV)VVU^d0xu>M5Om$SwA~IocVT zA&TL@f_dCb`cQBk@pQEnbF``DAlnNfH7#o^+v|LtbfAvH_HO!Z1b&&e7F66 zU7_n1__p)KyTA<|nCy9!mcyPN`1aRzh!9+ghKw0BQ{XEq`{B*}GEL2qk6Z%fZIGYgLOA{1F0?*QHFh z0RON$w~rsn8IID+3%TL}kweSTs|%-u!Qa3ct935%e3kD<6MT-qG$jvC6w?v?xA9uN(S?#(%`-cM0-+}%tIfus`| z-!IS%r3SY7ue!M(7vM>^%YC2k)haj!vmaT7Jh!z;Ugj4(-TDfvDMy6P-jG<%Rz^2o z7v5urLBB5#e22J6y)8;TX-!yNk3mWTmk?#P@cQ!CxbLsb6h|7_9lqS}PdC<23ys&C z&A&#R;Zd(U+utHdyLc3p8jLpT4~g^lJC1*qrW5K8L!NF;^1Dtimz8s&ctnhVzE*0we*~BzxUCH017s zP9c--wV|#3eo7th6?(&fSBk`F!Die`VESg)`C{X+$Tif~CD>%QG@-0Sh%vamIUD2b z?UL-&Pwi5Eqwmd`b;7 z;pTjO+m0p}@H?X4ek1vtui!RKxHCvnp8IZ?^LuRQ^S8gF|3D)#@%F}1f>qNeopdhM z&W(dB}SFJ5ihzbT03ODKq$LAF@4fLYD1--&&Z>!Cli@CG! zIpGWW*)#@_GV*05B4NY1>5aaBeLk~0lvgdqqEA6?L3mnlzdG#|+V0MM?cm_=osW8b zD74Q0zU6s$?iobCuz9SnIkQYe8EhI)S$f~x#Glip5+Yee~`aSmy) zk?H-|s8btv65gW&hYd~bgVahf(oi$z{+`ugPOuwcjw;`-*I5cZsHeX!(2(WAGpIV* zIW#l`!{kGFbYfHd%QrTW@++8F&+TY$EQ%<2KEmU@@Px|W8mPD%by=Dx9OGqk2^n7D?Q9;>h+#;W1L>AKFLTyeFUxu)t|8< zl#|fHbnRbVIrH;e14?LOWl{d?Bvqap;{^e*sM$ott&p<*qgF*ZA_Dm0P z+SWfE>^yF#c!AK+{}OLWf1iElA;m|JSf+Tk09;yMg-A`5etW2h6qG@mEq}z*#vPk4 z6+`i_{VMo09aE*kSVR2d<q2O_)sPH6GpL55>_ym&5;OMOxVqvrTzVwocV3+pw+>dGW-6o+hD{Zj;U(B z_jMuvuiH3cs!7)D(e7#=i@R2z-~eTlG&nW{<&ZE>#d@tRc;E`#q{`dzssRWx7FV7t(`d^^Lcm&%Vx_cSog$q zUnPEY4@FJSOcy%qclp0;!VB>X0)JH0|HL~Hj!fYstgs7FL6!6L$B<@itv@ZK#X76~z%sj? z&Z+T0XP4ugxgqK9ZYwjtz#7p>l@{N?>L8lMVBmBe-qXr3#P&;T*yW&a_rl+2-aRu? z(zjElvG3=69kIAAg^VjgZyDZ~Wpo=45!E#ZYS|HjZhR>`3Et0tEtekq4G%{4G5#*S z3e*jkKUNyH#(PkNTl;mTdBPj>036m|H17ZLW&`YMBUFR}%b!6KV#`}oVnXB%+h#d0 z_{GTN_6ib`Axb-YTTgty`kJoTUq+o-E=n}_4wQ(CceY82XlSk2>s%b#qm|a%5|#!P za{(ErVbGalc4BzA1Iz!qfl(Gr6GxB~&@y?Z#QO7CLNC(^F!qFtTvJjo!I*L&m;UjW zfs}WqX2VYZ(9r4iX<0U6S{+x!0tMR*3&EGPjm>63cfvKqA0BnEY(E|kNIUyNvbetv z8)1rUepKm2OQ$rt{&gMJ5hmzej5ke-<}WV|JBeAZFyHRq&)&DJ3X=4>J7QvdwrL_u zaUb@ZyGGZi**Y^866&xmD&m@Mee}Nfj_diTB<6TOXL!F)`-B!b%-<2a~L}&(5DK0H%`aK{7!m!63O}({lv~MVD-XP@*h~>l;(eI1wa(*r&%bQJfqxP#c%2Ozu9n!0K@{(p9sC^?D2V&>wf=O zRIME{c1VXN;4`@}eb{+x3k=M8+aa(n;;w8)fh7(y`?Us{;!%^XF7X*X*aA^ zy^d@z*jBvq6ux3;td31$Gz}%kb@SHEV*Hz(E_!1huWEMZA649^3GfGnC#;1Cspl*& z;~JX}GL~5lf>2LDJ>DDbZPEFhXY}W?|HRfj@B2E%sEOH}Zh~c2Z}{hlrqBIp2MGS) zh`WM5bjdYPQh8P79~w=WX(ztMI%nkd)}X^N=abt^a=j*|)FGLUntfQc_7wD%s)z$m zyaC+|I0bqMMx0)b@n$`je-K^N7;^Qlk=Le&60(&cu&}3sP!vhtU-@T2S=5{;`EDH} zGoin0uBxjshDpD?m5&YtCr_QvxprpM>ckn0_O z%h*77fXFUvKb3?aiUt6Fqy1+6U1N&~Na8m&!mR;EV!8UOHnxo|3%57?q&50ub_@2= zIO8=|2omo!z@O7}jcVgzy8B&`^68@d_WR0cYcZD5h)%0oBNvKo>p4S(p<#}pK9)oy zU6JhzD9L0ANzcR5KfOqcMDNJO3-}G-8?XLKQ5Z{QTt8#O`R*2f5)mhdXBfLC!e|L}V-JMD?zi+H-d}+HdCKG*(AJ zplE0ue9T94zuu~XuvW7*NXQMUad@rtC@Dh|2{o2=*jVaAS%WJBSLo+|3^IJxkA(|@ z3iyd*2J|b_P~HP-+S~12XQYP)!TGb)*ypS?HPo{fb&rxm<9at2iF65L>#sNS{?1vO z?j`-+67_yW5fOA{V^5DrzWIE*oVq=`GDBsKzsjIi=K5*U-v+kBY5Z1GCJ2DRR)P4c zgNDtlTM-d+EzTTyb=Kb1JM9#S0)6&@dNv;ut`GEC^12g*UU|Kgm@|F#|BWM{{v?so zbl=xvB#E&r&6a z$BjO7WSHyq=FyqxE!);_;`66)(kF{~;{v2&qw%o{yU|d<8liQ>BiRb7{DGP%M<)@E z5`|-vc{2NIei`Lgb1em%h-OqGY;cavBbhg`J&=%{Oe$9i=3T57mwXFFJl@ND#n;$D zp(abH;G`o5lvWCo3w$rw-yqfrre3LD6%ya8 z3w~9|j`MAtCKL&ew<#<`f$hsU{mRv;N*qzuO$}9_ z9&RsL(jb1@TDJP6Zk|AoE7M%~(9BCu}fsL%!mZNIE~7_w|?7^G9IwstclN%=%FJR|9Fvxw`z%ce+TShs z)}7PG#~6HPg*##)8O!Cq7{F!NO7qv7OZdg>U1QWJ`TDN<3_)GK%#S+QJ=}r8g^Cd# zMgTZXDhAf&hU>x~#o8o$b2<%aICS?~ldHa*y~jv1-4<^4^f0s@q`P&r1Ux^t-yDP= z^(fjDBc@3PMglY+N024HdCht|*``nGrRPx-@3gtnGoLF=q4INqEq;!Y3z1%Jmh^#X zx(=MrbD^dcGxW1?bol^qc`8*WVYTPV{?7yY4og#_3Fw<`(xS`ryf4eV zuFVSVl-4o>tp)7iM`FB*t8MuSN~kamypW`e^Ajk6)^+Uh&mrYl_J|f=HM}>E2MNV8 zvU1rxBl%HQza3b%7}Ndk`aycoUFs+2@C3oF$0gnu#{RYc$77+AcX(wM#+|?$)s6%E z!rGlk6`qZhxK8W-ddNVh=QRpqnAM;)?5ibwab&qTbryFm<0vDtSB zRp=49(bbW3Fo-0-9T$$6owlKM&N%(YjV{$NWTr&VvFoiaV<`Ob|js;Ga zqQSN8JY$*A!2DqL?QdtrKx)JZRd3&<%ZU9otBmAE$9Wqu#iPiB*k;ftHU*BCAU5Ade7*4*_VbmuU z1;>&09LfX|?(Y}9cBf}Q>x(Ztp8hog&awLbuC@PR`PERq?_xcqQ$gg%)}7eEP1gbY zBM(8Q(A&u~;!Z0dUgzhguHCtdRg89Kb`qm>PMPgT`(Za|44Z!@3?`QmJvVS2?nkJ= zV6Am(`DYI9o;w-`LG5$Iyy-^R8j^xA=o=^e*mw{W{1!mT#EI6 zR3sTqthaf21pHCQ%J3b6p@80cD-Xp2YW)$Dh{T~+K(PE`PUkH&#aP;N~(i#_|pGK*o*0X!Ydo>Q7Q zg$P5^=Z*7g*Zf2i2M1JgnCP9uuh1VukliJdP;2frBUOr^(Rvq`duDvXbmYm8{!5*X z5~&Hyt;kBrpck?Q5_u{KL>dDbjH)@>DIR*wxm97dvG`oyw8l@UA~DG1anbe4)>BzMi1XEyQln@$Y4FtpLhFY^fJ?JHqgAZ9Nd9MKN?Yyiy!4xfIP6zxU6+ zx6B}`U>(0!5sL|U3}|xg)RB7S$@#0f0$nsM_#QR{WX9iz)BO1mO^}jF7#r37C^~s0 zH3qo8x${lC2ION7kNlA8G9@l-mj8ACY9Is~drLckI3rr}(RM$TrL7^MjPY($Prjwq zL6S-oB>$D02U{Vk&IL3TmQiD=AoYS`i^OFK1N%=2jn7(3!pdSBBdL+XfVX!+kYI8| z^i(;SABAeEZlSn5cI`aC4RVg9f^6$+e4VdT(>W#%3jG<4LqwyGlo!g*?EovD&A z)MRRnejel$7w`4=>(h>U?%C%D>t)A5l9ZNy=&6*cfplOBiEy=Kd+oZxI}d)|)3H;# zROh=a_X)4_(=Gu_H;avs`}y_+{+(KZyTy1$?K%n>>Ts-ns(m7n05Sv$clThg^XL3B zLI|0q_)4SjS9ORf{VfgG+t)S2r|(hfr(vJ2yph-^gt1HddT1VP?K3fe&QZJx$>U#r zv&+Q&svm>Jj3pk8XQGmndnzM=Do-qMc7DDuqA2LBYSEu6rs8555E#iLbYvxQOVT-) z4_RTMsYJtBqh(A*p{aVIQexd_$O?p0rvP}AVwONmg&J~{lp3=kG84e(JQz%j{uEXy zYV0Nzm=RIvrl^QL)d_wF+`zy9~1pR2Rr7KLHN*5 z1rNLYJYrL%qNzx)6CHN=%T$F0>V9r_1L_09?HtA**Dwg=HH;D7f-&Ic8W%7kwRfnp zY@9UJSEAwuj~5tYXqcj(q7ZocyZT&y92n;HQ&uWd1fijsgXdC1k9b@fKdKQ-DSC{s z&#=D*=Z=&iHb*_py0G#~i_hdms7Hy0#wN*^PZ=TkPf^SXq7$t6&B0NM^+qsE$=eE( zMfQ{^|JIbOgdzxx9LjU$sEr7fUPf@#U&#y`aDS~Qa1hFc_7}Z8?u%+9DW-cPLGC0& z=&^l=QP$9qq=Mx6e(ZcC>J@AT3)vRNR2PKw4HtB3;u1IQmiSFPdlD_rP{ z_!4RGMG&4lstWp5*w|iFdUZa!&8~_f&y~mhaHP;l>fPFdLN#k=KW^0-G+J}#Z}E54 z{kN0IRfWipm&<~H-@jvBtrniovcS<0w22OPz@jtY_hC9VobTBBJ5u$C!%Wfj9FGl2 z<721eWA0ssSLM9ndfc5B2dQmMdqaNwE#l0b7J*na zPW=RA!48&HAkXiKAHqVy(9jI=m$IY!Nn!mNSx)>Dsc~>WEk)#6aPX(R8rMVf@Brrf zAAvJE-b*y%!aPQC#)l8VNW>a7Aie5hDcdO? zPqKoiHXI*@SRaR@uF*E@sTq(jPINIo2)meHC4@ME&i-pCMuc_=3`}(JSs!{+l&MU? z9KvW30Ga%EGr)h^w4dldji?hZ1VPjJm@3gD2tc;zI>{l_TUFN;&DQgYrQNpZi+$DN z)CLRQtL~G`qVTds2q|~cy|E<7A{M=XW4<9<+WME7l&%3g=F3&x_QS5PX*auRbB=Lq zv`!TsyD2U8YbK+Z?^$PS*cIzvg`6`#y&NVHXOa--**`J}Hd}B8J{y`lyJsfZ;+on< z(I4(7ec1Rzte)pSm>5N5?NcA*Reo%CjjP7$)!yG<-ss==2!-+vMzGf(rgd+2u~HOI zjqmxqcx&vDg}l!I3bz-5UtTDS*N~R$1o-P8neK>|dS*A)B-O=21Xu)nC%Sml-OyNG zj4-p!^X0RNCtqVV4ZcMr{BXa1BBV{_C{4#aKRtM8HMk@8NQ&rE0uR)%YKcm2jefW$ z_rpIPzNto>L8zZN8W6s&G3HZ3)^mAhzn}O%6W4iV@3*hqZ5HgPEt}KfOX-*wn3yx_ z)Fuype^kMl=a}+52=sQ`L1OcH)f<<=Vbtx-|8+-=^GA)%^hnJ6=q;%s@}|~((iruA z9#roP?3tLcMEq>QyzgxIs_?h$-s82@cYk-t&cU!2CIbTo$ry{mj-h4m^)oruj8m)z zz_=fs?P)TcJpVn2(R$)PBgzBxangI46c|Z*&jfo^Cy5J%xch|b!qpRsrWS4)H(n<; z;(Xi*?_S`o>WR0z$oa}@uz4JkMK*dpn0uNXO>jK9g{?!q#LTjIBt0_uTw|*ud^qOj zFgJw_#9~d=`cu80)v_PZ-i4n#e+}-AV2zLt;Q50f;ZDR-`dXLB3WDcj+nwMxh+*h4 zf(-YOkU~;a)DHBRw%Uca4&sOxuT0)v^K9>P&(?U^*uamEY6VrMotS z7{=$6v{gPB`)0oF7;HaSOM&gON7&JA>A^FoeD27G;#^{ru45v_^5K66Z9UD%01O1m z8mPcp_SMUWl-AL@sjirl$A$^R(O)_Z(cQq0!4d?~v(GHbE>*2r-M6u6r5p`9WU!C~ zEa$AYe~9TO2U9uZGVGw3mL7tSq@lAz@F@tTRceBdycb8kRSs8(`aQo}ww8M+PX~|oD3Hz5> z-@jbm=3g_X5W-6k4P%PMpZ#K+#KxlMs2T=t^%5cFbf%s2r_XbZn9UcF9}UixS~RFG z#i8f{R)I+T9b{CmZ`x!9k#t*q&;JLxKt{hFLkT66aP#Aa4dW&^wRE^^w66%M!=e*tqr;BysQ=p%0;C|9H&nGR_8)HJ2Al!>imlYJ-g6XFObbC`bS{IYsby!$-9cY>w{5P zw#0E9gfp~HobbP!%2FF)}-yAGcxT|bGn_dU$4rgDtdC>?HR zi%{RsvaFCaTdR;o#}ruVLUoCd&p<%n6Lx)k5JVS=XCENCwfN6 z<#Kp#o_sdX{LWd-o7sw&&0>T>tB@yD2ob3|n2DaV01-=KhA;5q_rJ%1d>wPA*VDD_ zE%vu}vSwx(XZP*n;OSmuRST=v&Ld?c(vG1#52*z4RE&N5jzO%Ec{5uGbbv7mqb1U| zL4g)|JU2jC7T)k#w!U?k#<>fyM^E$mrv1$Qt@T*GN1zRkH28r;8jWo`fI{J;T!UlB zkdDOjeS{ID5}F;azDbX)roG0HSJiaRnS?YNr450BnC&2i!SnL?o4>mD|)T|tEiBL?L) z9V}h725~CJrXBnE{y%k-yXsNhoZ!TPGgRKTkh_+(ap>)B96f!B`Z;&=xd-QPcG}%J?Rb@A{YgZHOV)FkI=780@4m|Szx5;+vJU%CT&AkQ0ws}gn{At4 z#Lo55*wo0OU7I-hwnx`x&GMC%oY=94SyMY%G$%tW7H9PAUjEyEJVeLT*>o-}XXlT% zGpln3`?eh+-ZGQkGjH?c`JG(4kY(PYDV%-#RsMPOD5ti+$hls@-b1ITZBC`GpA7AT1Dp_w==ylgDv{;RDcw6T$sJ|ES6Bh&5F*blHp)#H2^> z+0&fp9wJlIM8}L)WFSEY2x$Wv%Ls(9P-tXSXd;9`2!q5zm;j{=N`?l`76K!QR1QEG zP?4&+kfGWEhHI3#Z^bEQoXTGGtB4fbbDe(9lw!32ux=IL}~HuJl5&($?O}U9jV-l|^uEZS z{-<}5vW=GZEFzyp=Mw~;#M2%MgH)QpHdI&EQk8MIA}sn%oK%@bi++dy`6p)?6)~DS zGYss0gTMW+d+8d?arZ;(89sg-*NS5*o2Yh%@DmC-beRKhpI~HWEp1ch(K_h@S{j^+ za?);&?tvVaub#!6pMt@{vUEsuZVLCIA&3(m%sVv7|(6^`1J@?-!OG z7N98=M(=FPLM!!&5cAtm2sMsDpb?fp4_;>5vs)OdY(XA9K##YIHJww5Nr^AY(EbQ9 zWzcq#93GC57-=JI11gX9!7>(ct;xl0Y$Hk8f>Gs?_bkd&Hp)}vy#PBIBW_8I=acn4 z0u_XLC@DkZcPqk}vFSDHSJOsev>keMgcX<&p#2Q_{w2h-Yf1Wp%*YKe^6K+cj}DRT z@1;7QXY|r#UiBqc=jq00zE`9jjr(V_$^Ln>l$Q$J}KP zaYtPp6`2%4Q#s8YSGaU?fR>IGG!bL-uCq*Dx}0ST6Obw+sT!HSw2bWew|HacAPZNn zr>zqD-8im@bNjj_RJO&@BOW5r%w21fv{nd$oTe;2jSVXsX`9?k{YH-`HXUO2k`=V4 zj_~(yyo2Rduwdi;Jh*5M7q`90kKQ~=!@Om5)|Ek~f+|wDgQtnjXlHWkB+S4u-rRJM z@@WfL-r3F}YYV!08mn)=lbH7K3oDG0kt^X7fK~yXr?72%LYgNkav0n2n!hc}#vL*Dz(q zLZ;MtTsV1*L%jjjnGAI`aqLk;*X4eyT3e`%W!ZW7JQb5>(cUaM_|8!-d2yyqo`!#B zFK4cd(%i9thMEduF$cSzB^ zcq4y!=l%GBOK#W@lM)?k;lUY8(4N8z6n4uh<}6u{>v?!tk9A-8RqjQS%MRnKU;>*= zsTie%j{*hm3(K;R7?josDX=Yv{`0$e=JiY5_t|@C$w;!+63vzFF8YV_#M2eDG**XgJJJffYm~yWLL(+E3rk7@-^C9!iL!E3|1q9^dJmmz z)-!){H9?@!-U#Q;bd##6rm7-^v~4U5p66kNMLg!910UB9!fO%|$MQI|`APPVOyjG+ zeINNfFY!26{R+$L%E@JO1j-FRbao!rBw=T5ThzB|}^>?~)yhaq#GzMKQC3Ep{g7gjRHzV3czuG@fhbUO$8 zD_HG}uxsxg&RrJNb@$QJV6kU!H?vo)Kn|W@)9X7(G*73_aS$R>Ar}H^xFzYUin+>2 z!CeTVT&E%Lj$rV^+!_)~r0~oT=Xy@kcjN@QOFazq#~@XXHE@N6BYlYM5IaSJhJX9- zn0?Pi&X2lyegHyZqA!@mjr-{eb9}+G)~+JwX@t~Km|1`{@mKtqA_X$a*XCRLVzbUDl4&!qN#l@bu*Lb zY>rVCfNi4`c*9Xuurzomj0e6a0gW*lV*-YPQM54#6z<3%xkC1MoM9^&xe`7KM9o%6 zAU`}nR@tPJF$gpyefqjDaQe(8jvm=ZuD+he#zsu;D#uP-Az4*NZB-e=z1>{7dX+>) zBaOAyNa5m+^s)D~&Fs5e&aeN@SC~>8Czs9PX-LK$a-*XJ#*iNwU~t%{wz-A6OoD;# zbDTQ7hXcpExNSinXO3NBM8~O1jPS#6KS|Bv&+z5@XVHE3IKy6y)=90{-T=o>Um;#u zM}0*)Y)dl=EmF)|x}3Ma^&(F_onz#{PU>ge&*ZW^`}Uk6UE54`xy`6+NX9KjhI3eU zs89M)%=OoJbYle~+E~O8#QM*%Z%e?G_BpJ+y%qQ1Iof6|V9DHRyzs4qta$iwrk8i| z?2B7DaH<|>%6uNbZ!RzW&3DL-WC?6oym&FQ8ZPqcnE^6Wrw~tB*djy6ZHlT)g1mi| zww4BDZ8Iqhi6D!zB6nSwV)O5wm(`2i+|Gl~S$M1@Y{DtX7AVZ(&F(XrB8KwyL!OHPK_-!M#T!m$?XbFfen zOyHqR5Y^L!J)r35*%79gd^UytmT25#;};=`LDWtorMy8%ri2ncEC`edE0^11HfOiJ z$+JgX7IsJu9?P>}aU(l_yqzmoM|tKScj6~n_{?Kpz#M&^Ctf*7<j}ftveX; z2cTvVU;DM+V9_Ltt37Ag`Oe$yyIRQ|7anA8TMI{aY-Rh|6kmLJ4%=RSiDO;eTsU{0 zkx`$<6%X>&H4QxXt?#h?;CTir=CgjJi)WvEnmy-ow6?TxV$V)$E9SFk=Ov!}&JQ`C zFJtXzAEUN=JKuX{8&xy!3(GL&oPbN96H@{eAncJ7_rwWt|C?|t;>!&9YiM54iBTR>gj3-y=FAl#ibg0b z&M{gerOoVxU*bq0*>(EIR9-zzs!9--3NtuFegt~^1tU%q4O7}VZaj_)L+8KwBUb#@ zACgrT{ewPkKJ>1_$viyAjm=!)Ju%T96?2D?$5Sw71!E$j7LoCW?b_Tzv|Z75Vxsny z;z`E#D;!9StJc+^0ENZ`8cUe4x;HXr#)#ta#~a`1FwqbSZ8Ttv9M|i4i#~KEd@Kmr z^E89G94;~H+nPwd`wDyak)z{!1k@N4SuPQJ?< zeQ6SPOZcO&F5`tKUgYGNZWd2&Vz_^hWW#LkS-OyA(;6^3AUE1i-;jmvNV3CMx!84u zhItS0$M?4I?XUlUub+Ww3m@h$e`a0w%N}6u9WA{5%s1G5 zdXTzWmmP1t$rNjlvdTu<>#LCjAQNHH90t$Tv`y<|?))z1-7%k`GrQO~(9ZwyXJ6&* z7k6%k z`F2hpeuK;1A&;o`?!%~cm>Q5nb!3NzXj^wbRh=tX^vho(pNlb?%YlgFtI&IqCTbn{ ziDvHF@kE%=@K0n^%=O#BSTbFV*}gGTQYfk!zrPs&E))7Gi#f&cq(X*acOn*_ai_e& z*iAI-YeyK4p~Qqz!p90@2>gJ$_71A7ehv(^v$EZ1&$|a%`tUmPDo;~mB_l^IJTIWU zX);S6e2AKnZVsM4OHkiNLtPq6NCK_L7IspE6^>eCghSj(VvP(lFfc&>@F;FG@kEaX`7bY=FunuMn-Z}v~}{>7dpvFjntZau8fvx)3MJV zrKj5>RaeWLjuv#zBj;sVv~n$rZ;xYifHEGFrgRXG#nHy2desIJ@i@k4+jGnijD9V2wq%3&d`Fkd$E%*%`p4zcLb#~B(j42}lmBWf$H zVR*zNa08@mhm9fc&(1}IdXEi%niC`nX8Xoh`V)73k7F2NqOp$!Gsn4zAMi}K_On*P z$A~Br605_9nHPafZ$zB@3_zF9oX4cBJ)cD7Fee+9{)wj{w z-i{xO;k$;)nrh0+VkiY=6?JrUxO5#k#E$**s9!gS+osGS^X9ks)4$vXb``BP7JFX& zHb?hV(y@F4zpCgTf zZOhm4g-6@i`qU5jlfTT8rIDqX)JGOc5#RdOx6FeNJ{aBmuw-2#v7*v;SA_W)2Za(c zBx@E1w7}L5NJC%+NEB{gKl^v=;!w{3t@CeZ`I0$Q_(Nz73WH@yBo0P_k_sydfN7&a zhE3y2DI@}02m%UBE0VFb{>_WHV{@UWm+$Q9=XcjlBQ6vMK{lJEtgMXk@^VH;NAZ1s zVlhM^P-wuQqSqus*a##>_=I(r7Q(VH2%dOu6Gu+bP@Rh(e0e)a`Vm8Y6!H(mQ=VI3-oQhg%Dv|`A#&N80&afODTM+mGV8{=TpyFjz zlqaz;3=j0uGvHEJljhKyFYxxc1P?yEik6yM%99pXuUw*U*d$r-Bas~G9IzZt94y-=7K`EK z2D#MRPo}no+H#xz-b?fjx}+zFzAp?-Ut#EwJhIoKTCur?l>XIu+|u1ArTlY2uwJ+3vEz@AyXm3#J?_djZ@Gn z7}wwNplbUNmLEMhv=>TCgGP>86v`8nH z(A-dopUWZSt$mM6DBR)bky#UsjUbVQKGq9S{5lM zhE|Fo2yjxBOqo)H3Orm-Q&HPWO@lydh41?xSu^={RhOpdGlW6IFo{3w zr4a_Ck)2N79XrsvI zeGJhxXoJ?_+$6MOG_Q%pV%V0%vOotu`M?i}K%~I;T|DojuWp`Dj1m^XO{|J5Qda6h zCEd6ZJtl05)&@l=rdp_6GtmbD$;b-~d><_=Y+>-dAmkF(3M-ao^316m-}@@vG;{l!6z}fb&%zZ; zXsxY4m^@m9Mlu$Qp#ncF8j%)uBvlo5+l1qjmQBJobRU10m)|%>vbmEf^Jmi#xAB!m zs{oCKWr5?w=s))^FKz2){-Q}-?e&>HZzg4ND>T%BMpzbw`K#awe$==@d%-nTb5erV z2%|AVVx)-NiGr`jSlM|o^eDoRCZS;~sydH%8j5A@Q7xPh7!!JkSm8m189Vk^Pt&c@ zQTJXwToX#|feHO=#cjgc3@O5XG>MG%3o8@D-J%kF5mrD&M=BY+5=!`(V1z}?@;SEk zS)PA&FS+t27R;MYeN7wlW>m6w$4N4cbqpMThpq2kX2!}@w577_+WH0;sOQ1YK1S2% zF7{ovShRQ%X`xWc$H_Fadj03Ix;4ktG#-1jhJnN1=9zE)1)Hi`S@+;$G~^ER?2osh z>!!2*-n(h5aFEjH)H|Da_WA9I_W3+=-<@3D{}Ru>c9Hq(@1!!GBo$APC`*#NbeQjL zew~X!6?Z@K0Im8YPkiSEhSIgvm@7QJo_XdKdYHt0pIgq*(Zd`% zvY#PQ#o7lSr?agb75rqXvY!{%%k&U6{f=uku&mHp3uzH(Pz91v6Kx$9`W3^J;ma~& z^MC?pqcCBgleBDbeFAB)3X^YSKONgfi7?+JqRClC@;;%&Ph>u?H3A=`YVcEqV*O#U z6`>%At5vjEDEi^iO%?^+iD+M4%)SlL&2sw4eujv1=;R5i%HpJ|8%YLd*|pT$S^}!d#G5rni}2BmS=wi=ilZ)Zyq>!ls=xF20@Q z&=uZ%`ulVbjxv2tD+hLLrYv1WGL^(u18n);x7c~I53S%_Z!gm-bJ)#um|d3R;LejY zcFds88DZ~^Z5$N6n6h^2buZ68{X+(ipQCN@YUbLK)X!@eJid?K)-+>j|wo@25x7|^mH#xv&CdDktKZ|5J$fb6v&j7t!{`l||t*i0+etNF#}& zr#ucfs%QOl-qjLH_{D%hU|WX1o^JZB$$a+nkFjpaEYd<^$pmF(X_9fng%c;}S9RRJ zaXoi*c2Jh7V$P~Z`0cOW$(dc7*?rYw$;yRfEW+H{_;VP8F`7UdQqA*NfA4*)Triz% z*HI3h9HnE)YVNt~cG{~G7!z>iVmAZMR37^LBRu|<&(Kh&pn5UC{Iy4zR&H~pX8>(m zsL{(DJ=84Ze2(voNu5GWmn`94Kc^Noz$&t=fX zM88j5^Ii!bE=sH_CHyo91A!LQH`Eh*=Np~59=_#Jm#F{)4U?zR^w!h-uRr_GB!r}{u8LUi z>->j*zZaE?)7}=Nx2q3oT3B}X0xk_0vV)46jz!ee?&q1W{{>spHuwP-&y29$ZbVhI zF|YnIKmMElf=F1@%xK5&vkBZ$^0_>Q1ml+G9~mYXI$cOUN&!Nmy&<-5+e&YI1`mFI z87X=g8c1M!gY@@i8E_3XEtQmMO>QvH;K&dJd7 z;SUWnf%B9GZ=XmwGr!gIOao^qZnI0b^oiJnvFVS^r5FKxzsV;-g4>6D% zW;my)sH!KE{Pfku8)J$L<67&V-*dgu{ke$@+|6bN6`0zUxyx zX%_c=Cc(=)b}~AwXq&cxj>KtRefJ{ESFh#Xbqg6hxRsaQI7!RuJ6T+lz)n-@I8yk%a>E5GsNsTYt}EPJ{`xj&t+p{nx^srUjD($j8si$ z_M8?(E>F5?F84h!%5%@Xi8Xlb{qGcKbz^tlhx$3dOmutJs-(Cbw8@d+Iq( z=3}h5{dU@8lX>=^p5=19iZ%DHWY)fS>5pYtFnJ0cl`dPJdxhTgbRJqihyDu#)THC6 zDT`Ux;1K&5H0mZcjO&OiFrxe$K7WkYx141D;~SZpmZ%_sv~!%<`zBkqo@X%OGkwl_ z<~I%S;*a0LNP)2uR94s0d*LMMnQPfFH_hu$ze;yZBK?4+>+i-oafCjrgK3k8*tTUi zS3HNdX^otHZ9Ajwt9f8qD}(2{X%3Pfrh{qoc*i^Jbg$KMdS#Mx$itZcP|t&|1^j*hnUm z!LqEM*f74V(O~8JXq!BPq&32uFTH_VGm|@)O~q0Qtpi-wN7ymqj*O}-Z4$u%FFgG% zb`Ey%8^5%Xj2&R2qCpi=``NaIv?N9=f{qdEyse=J=^oq?JG+8 z2xq#pRJ4^5I8{uYHJ|FvrF2xD<>j~gu}+*|&~4?>f3co{H=gFynG>k~EX|Wwv1+>F z#TO6LGrW-YN(n+2A2zu8Cdcs@KlXGwO(Kz)@cON0>~6Nt@>ctNN(l2~*=&}+zCLW* zexJ`kSRCf%MhK*2{;In$#*iHv3Tw*?$51%}udvAV@Nrmi-`BXqw!wtu`9h2<(bpaW z{Vq--MIvsYmCL2>LE_02amV0=Eq7!`e1tF)3ax|u5EuG<;;AGtTcF$=ffuIxZ99h0 z0Rsbr_{2!3<55iqfF?KUk1fW1f5Me!1AnYuUKLK}<9+a3{WIYjW|VLw+8A6dNY+(T zpX%Y2%{xe}TSA6Q^bh6HM&r3IYS@slDv3E3wY6n5G}P0RtRYC-q{~v^DF%HPE0H8+ zgF6&Q+ZphC$@y6_F+q9TWHxMAM@`aY$Ju@4wNGGMjYxZEO< zOkknN=V3mnSe5$z%edJaTS;6$`yW-^=5A z@BhAhn3!njv_S}ilp14fbfSfY%a?Fv%PxNWl5sq(sj07~(t=aj%e?U8?^2s=VZ~iD$)3@uL@l#A%DKE{KX2{W z%JiADXm6=z>#@C5$_`qZ+G)A15&C!Y!grn|Uem;~<+B+c9mN#^fsWJE-a^_@QRU~S ztG`a`G1DCc!G~X4JKM164Bh(Okw!B84C}Z}#d6?cq96R4fvZ{%W z_BOo!Gjv@zjZU{Rd**afwjsz5bMoLJy8C@<+omw1qnVx)dpWpo8@rBPp>?IA>*yYK zZhw`1Ctc>;1D0)Jf)NhA{Wh0IQ_Nd54YI>@pFhr!PSaLn81C!g(21i=s-2HD+ReqB zOu(70K<=u5y zjzyp+CVxK-^Z)x%xc)^p03T)u`TYu@mV{DE_@wbczLQ~#tA#Cd?A`PPPd>YkQ71-M zk6~*0QGWE~OZ3S`RxF**#eKWU#{;rKH4l90cer^H zrl;9=vX?H=%H?xAcz64o96HramoozsixIO0r*=QjcfS1^J#Ga@`G#B`(ksK6Hcy9d7SQ-rP0B z1ON8_=8iU-^Jls^cO*eYc^%!C1~`29D3wj~`TgJg42ORF1Q*V9p_aFT39zZAx}u8n z7moA7i=#}M`3V2dA5Y?2VX4^;k`+s@^QPsxUMH$ZReVL>A1hZGpr6QGN@}j#*h-T`7ql~P4 zoL_&WmGA!TQ#}2Ajs*|=KEF3}gs*>h7pD^*HO-T0p4Pz0?Ju)=_eGkgH!^VUIA<>p zGr6V~f%mb--zMtOnF0y3g%%o6U|b9W*DEk@7^IMRu8Ut-K?_abhh>j}F=*w1koZ|m ztgM|i>)VJsIeeuFgpE>OC>LW4zIG8xgsdqTJU`;=P&!H(TKItirNWj66<`YE)lnO| zxcS1C5{(1`1L^~YItnPTdVRF>@6E%JGCpin$ZHm;>3&v2_w!)F;=W`jZ+d*tkYs@> zkqP^S)sYcb6oE3xvJ~l9o=fM>a@sc>-?yKgubyV+eGkxd^lf%^NI11rmB$g;fWY$zT*<5rOL+2s{xu`5ck|2hTM@x9+RxM9-%C8>P+n0<%<}P! zO<58KFP-IN+{X)i5)}>1o|od{iQQcGeP%CR&E4x3a^=`%YRc>nejh&sT*q}8stb%U zY!r;!*gPS|{w@$*GQJ`Zgp|?8s1Y(wG8U3Gs{)-D5n+`OW9s2T+_33eM8v0sGf&*) znwjLLz_{xaj4{jH05=N76^wd;&+?;aIWXh?CnI8SQzQ&~?{j@pUTER^O~mRGQr1~v zZc`SNGsZYV$LP=|vcin1i>oN-D9sf)emQFfikP06mjYJ}}k6n2i>+hM*_rCK@w%bW=zw-f>tjx3Z?M?KLT1=Ta zgWDQwA%L3ZHmp0I$8Yg(2C-=kHt1;I3Ern{T{HtZ6=9x_>T*Uwx6k z`t}vdTNYDaX5q^WtJf~$@BiUBzD+atKD3VD;s6N?>|_2VbLT2nR+UAD{^P}jKDrVx5Tt zG>IA$G946_2m;XJ=jVkP&zxce*U^L_h`2|iVBRmFqgN2SynOjG+qZ8=1p(5si(Z`( z8cb-iua_k<(KUt(FcWcv7Urf%`hmi)V|$tFsF$wACuQhL`1v7(DE7gvTD6LFI{m&Y zDjnO#bzMBqBb7>_vh9?f?Sl$Fy_6iLx?Krk1J2Z%EY%&$)2$g4OXcS?`NhRW3 z|MY~!9xBK)GU^daBuORXC@;@w-Xoq!k%-y&`7BvakxV49WcdBIYzr?tjH_+R(@D(u zhHYVyAkWs9zQc=q9De0@e~FH28_!o^#Le}=c5rN23@KTbg`XcK7YH)tWmp6ZkBnmM zB$=`VL2iVhQIA9>OL_=ILc2oc10%BpS0133MnK*gF{^HyULO!i$O?&hzQ&Y#S_DPn-KWju$>e&HR+JkGEhh-L1iKt zieW2-9Zyk}5@@9&17lEuBA&{S6b3&CWznJzYNQlsZP7Ms6~8pUmexuKzfdJ9Es|*m zqjjh|SKMCVB-12>AqadtBFbdCgkxr7TniM(+K6WElK*`Ykg5$c-rIeunk^$Rs zkitSKFQjj~cHijdPY5S6Ao#vIq@|ceMELa z2!YZHFx1!AF}Y(hf!1INuq_;4;~Fm{)YaCw9m6q((~k^k*APfcfC-|ott=Y*35Jd+ zWIFyXizq}Ng;Gnnc~LNQr%s*vXg^D12*x*A8-=g0H>hSp*w3I;z<9fBRKWP%u6@6- zUl5F)YwWrVS_QaRv`n6ZB^0jf7td$34!=+1P?&dA;4^j_jqi`Og6nI>^huy(=x!1e z6()?pQ<9V;P$R>PYK>i9O-#BdO;N-#l&&`zNth3al-!K~5tm41P=Sd;q>P)yO))6y zV}bADjSL~37%C7r!jOzZV8xI{?Ibf6&of}exawCOCFBc*As=N?M&$h(!rsGdJ`Yv` zI~XO~JB&ayjctI9R#3`t72m#Wv&_TG` zE?#RC=QKuyvW!Iy!0U$jsi_YBw4-3?KD^cyam~+PJO~WFm&gCM$LqC+9rK8AK$J7yybniV`V_O3s$Jw(nir>$QBJyL;1m zy}oN-UE6Y4UrUxLN+Kx+Fo1*@5C{?=0T7wUzyJeGPTkYp70$VTRQF&INP#3k%na+r z17N1Qx~jUT=ltqB=lgzNQ9Opw29A}*MPUR(1SH^Qu^fdN2+(nGD^EZ96#GwR(4jc3 zi*Mqa53Qj*Xo51qbkLZfT^z>(41xg@VJNbegFs@Uah2mWcon18y{_bYg(udAG(bp@ zo^M~!O|kXW=XrJGR?_iuZeIN`vl~k&tcqd^iJi3xBC$~3waWlT#2_38A*c4bRA~>rbEnJdIOE+5iG|YiSP{5L<(?h=c*go z`dmJSVT^cHg7>>8rM$vX+_@Q)u`6>ElaF3S_ZbtM%k~lwHb{0K;>GpbXj%OzzxUf; zqmo{_dQ)WjdpNrH053fKQ=WQt7a}Ym*-39t3fl-^Ym4E*A&%}lP49p}x>-6pyU8jG z!xUJVetP>lNjd_MIF3W2aTbq!``4IRRLi2JU*P_`t|MrgsI10K50iCM4ECI1pvT1s z1PF*>27CKR4%i6OKxNWoEsZj~^cis#L=N(q-1(&KeC?Y{+sSv?^v-EkKl)uBSh19B z`vDG|JxMC%knZZo(vqP}l70#ZsVsK?aXR`_;3heKU_V`h4vH-4-a$|X+LUPRGSD}K zt-%Z#xRynBIK@D34+F_Gjy1^9!zbuXT3%$Qya7~7K{`1^|3DIiXO8Q0?GZvSFfc$S zlfg925z*`G>$~Eq@aK}({h$43i67C81GLVU69@tbI*uK|jZWp}>*rHb08=MT=h=UI zoFBcn4?9{w|FM0z6#>3*Ln&`P|13KX53zXFa>AKj-rl@{zIY=K-*+p!UVedB-x_4m zeP5uZWPrC{-pYUtm9uW<8xO9gIIK|7YAO=}nrmt)Xr2zI-sfirBRsTb60iO2AJ}#x zLPYhFiB|K#H-C+i_D%fo7q26WTY2E&M@S4GqrEr4+#BX#Dhsd3kfXlaTA@LCm>c1RzD@vW>RNc95{HGK|9Kd zI~EYCZbS{8X8ljzV)y%Js9bzIx8JjZ7TL#^SDvJ|ZYj&FUDm#NkSUW2+57GmIX|hEdTRQ6*zoE)qUH5`=eyHb|N0hQ z?mJFl`7*wBa}7U#em5t(hA3}}F>E^w*%@rtBB)$Sii#OJzJX2e4sxV3#ZWrP7asi< z_Mu<0?ngf&)3KkEDGS=(=B0{h{Khw~XLiOyW*uB3zY=(L(MqF*M2Ikn`bDgM#Nnl< zU*gICZx7W|8c-+N=}sEVSh|>_I}R~<&RjZ<9As;UX2z;7F)6;C=htnZxNa87%`b3Z z&oQz^lD+F+W6r!*TBcP~-IU-F0ID1bI5edNhS2r+cb~AMmiFJ)K(R>)0uADk`DxIC3{PLH-BpQv<)z!ta zWy=T#gJiSWYkiqMpA!F8WejtkrB?oX0hJZi=)oiGKGlmslD+S}MGtXi&X`73C`3?3 z2t`Ar29m^@=J3En4{_V|bBPznnbJCgrpg4FA&C*4#-!<$6zG1mnojH7B}|%9L@*@D zx?V>J1t0{r>youJwNvIYtIFjU&%DdDrE6H+P(w{)6AiU>Wc!bjv0QFg^B@o3^95#2 zDj`CgNGOJq8PHcV^-7#e?9_sw2oMl9?I*X<=hX7skNqKEoRZ+!`-d1Th!ZZWpsB8y z%K93bn`$t!5dy&k)ssqSt*^%vE~JJS>Pu75IGua%dx$SCo!4l8+FAMsZ5n6Yz`gg~&5Bt~m?(dpZVaH5 zqOh=#TW+}ptu<|JZLC_giu(Hc%WIbFU>zsoIZ&eZ^T6q6s2fa5-SVP)pnY-fB)BPDQlv2$s&ShY@+j5 za^~Rs?A`D-(fYYejg^v8LzI=2Q&S9PSCG2;CQgLm%#r<^$PD6!%PAyS1g+;GR2sGf3+Gea4gTjvlD3zT7Dv^KCLonf$Zh?>bwOe!p8&l#JB z$x|o`2f=W#r!*0Y6q1=anWo+h)27a##O^0a0R>^neGlG6K}jLDuO!qN6#f|Zk*RuLjSl)?$eFbu(zYC$*_qNO3o zPk;I{WyTa1-@JsD+A54xFHSs!UEj!|Gu>27n@oMg#mHvpx1%h$>o=KZLvg?$ao61h z4;~?D2dS>9CLWCv4Y^F2-bzgAQ%jO zilXqb!G}em7xuOs?F~D6+oy?Q$D)CPFLdLCk&HsEF|~~jmoQ^dHM6m?ZG{j9j_uun zmJ|nQsE15CO=9vqZl4(q}kjS5?GlGN|jM0AnQshYKzdWg?2s5 zEG>hS)fJ+(V&Fs{#ZzW--Svwo4E1x%op;kbYc6Hc0O_G5I#kJm6-{X6GMq|d7FQ8R zVc8arI5)j`wSE=yHEIDN2^t_}kebO0X_)5XIxdb4@#0F9uu+c2GzBOVUC_+UH{MTS zO*0MEVTMx*Gg=Ccg>0Qh&GayCHi@0hU=YStidc0$MN(sDY|O$c7TwU`b=Gif9Hmei zW-hG3lwN^u)>5?2Tgp@kRyKp}C_iEtgN)oX;R(P*YJ5C8i&Se(G#d4~nhy_8nAdnI ze4!gBj5u!yJOgZHlSx^i6$ptC60MbI7vwl2&(T>MJ7bZzG!`OX77hv*JF7>TmI!aF zl||+)PjXJ$wq@aJNvw7@k4#>GWjWYRF|+1ZqP0V6*z#Oel*7>Apm&Xc?bfV%sL09=_9_G*f?9WK0QvBs#{w2|9l>YvH{^*bXh(G@0KW1QH;96hu6~h<0 zG0sIrM;+A%=s~joU~o+!lf@bzRa5&dnbqdGquLR1qI2Jg~;c` zyJ@sgBWBR#{6lh2%AMofw^v&1E*yLW5DJAD=-IN8U5v_rFg;K>^?U-uFnS(_}Ik7A{;!CNr^a$b6w2w+Jr0zr0j^n!b#Q z!b?4R$$QtljhFHw8>RDF@nJrec|jJJc`XJUc~B zm?aWKt|#CqZ_a%5H*(S1yP3!fomY^ae*?y*$c^_1WGoR1g(xg6#J0z;F;*s%VfE_O z+;PVpBiq)kTSrMr36DMY*vPhQHap>_GJT;N!+g9C+W7{}=c6y!>k~2(0p&f|^PZOC zBRniWyI&Ts@v4iEl8TB7gprGA5eO+jYm|0#qLuffJons@^)d}gyXQ4d6$sBcUf>C6 zE=0|5*Xo?Hv)3muw=K8cqq&s9^Z7R+LWqw&xQsTA9{v2$c2*a@M?N2qe6rJc7CG=< z$MEnl!^7Sbd%hDx{&n^D_n)`#M8X%kG0c@SlD$&o-Jf$!J*=j&3-6-t}?*?Zt)HJhnbl zK0a3;U+Bge`Rq%XUq90zg+>U8n;XpXd3-82b9Z&dwXru?o{Ma}?gja5IZwE9!@vCS zCbc8Nk*iz0)Z<#8pNf4c0U3QAjGQ|caa}acdrp?Tr;VCI6{C05qXaOYlQgQVV$}7> zQ76AJ;`8zOJmL%8IAioZe!g!jxwQRJ0oNxCv#z8I++&epG)I7j{p9RQ+%Nt%$Ej847`C- zp}hu(xnv2gy+)y4{j@rNu=~(6T{xJI-(ToVCQElu56NT-p%p@m$O_skyU$lmS=APY=ff`trks6$bek!;WLQ_)+1j32a%)p3+98V^07dVA-du3VXJgOGUhDb@V2EmlhhC}G?fBP)Bo!oaxX0=}w zCME|hcR)s=#MWeM>{XA07fTOan~oq(qUB0c5`>BbQP9YhR^?PWG$QFWrUA#u5~Hsk zF(T=a_ZUPSW4MXXqhY8MYEzUlq=6SD0tn1g`r||J|#K2x`qY-@f({?7#9ZwBS4NE37wPzi}uuw=`RMKRtA%c zu zQ{TiGfmiNLPJZW>E-l)=1_mry)7iSBiLTnF_EgU-dYd&K)+7aoTf*VT-9@B^yvd&* z`z0%$zr0UO#>$z@rTim5ceLy(%c)FkEk(_9Od3o~ETYAo3P?0nB>t5^(&D9I6_ToU z9sTiyBoR~$4UxKEqm{QeT-W_Y6SdK?E&qi`U*2Yf0*67Q4f%MRBd9=@1*dORw@ud= z3Mte@1RpAfWDa+$CyHsJt*CXELh5ID)-z2KNo|eue3l4_#4nM88jcE+Ff@}H|I>gc zi-7wf{@W80`mS3&zo$jqksu5*Ycx0LUJQ zZU63A4xkyge^~EbXoos`;ku5FC0uj=s98u2=WV*vd4JjU^}bbl&*1Ite?5I7uLfQq z>&j8;=$YXds-M(o0F6W8bgUkq*z1&M+LJo8IFj+?cC1BdFvJjIQ=459iw5c$bDR&% z&+0~F1HtcSK1MF?6Z4#t-KjQaa&{GuzY}|I^WX%~nX~`JbMB%flfN{_bJ20fPLw>; z>`j|Cd*f}o;Y@~js_gfK16|3k9W&!3CIP?G_oA}JFu^R;rYQ13X8jX6n5Nt^4wYDYD}0S?|=g-7L`_{OdNBy5EB)& zmxk}49q}$m^Q8`@a@7(RRri7Y1OcVW9UslfDAO?-h~oH`c`NwT1=gzCoFH^*o;lBO z5u4A+l_&6pxJN<*u6ii0^Q|8llKV_A@g7b`3-DCw7_-7l!y-dPfh4hTB}=yph!o?F zhpkFm_^GqdQ$6{SSntKt{4h7t_n4XPtvoXyav7))#!18{geaba+wxPMQ`2=XSo zKcc0NeEvFn*eyx=_tRA>gs~@-G?qu4pA)tFa@021@Ha)+U)b#~9n;9kP~hP!tR{MT z?VfpB>n0f&bY$1&1$^5bY>S(mNeFXcgz@oZDGE!NM2n?K`s|;x@gl^JhUI>DhXF&V zNU%1ZKv+-+B(f?6W`Oa-~KHC4r{`%$QJ6TYmrBc*^IOwmrfT@BwbZI#I<<8^_7& zs+ps}{Dx#TN+&njFYquRO4Q{`n+;|GCV$3N^dzE2voCqMM2?YEAXr`OXIH8zubHrSG$RmpO4~M$A#+WTpOx==!QU+Fnjpz;z}4hhVTla;0%`d@Z;G+{E$A!D89+W~ z=MOgb^@zdEa>KcW(9tBCd4^MU=zNFaUJa=As<&RPZL*5>#@4P^46Cj^N*QE$pOYg? zmU9q`Z78wnfvr|#FL2Yx)!xB>d?pl4NJECz1h1t?m3D4CU1&hC(G`U28IY)9A^3WG z)tu8p#-QDmu>dY=eEP*1RBTk*Py}b81G;6u@g8J}x#44v@qj{rg8UAuJyNaZ+r>3H zs>Sq%Mcnp(6f#dI@L2#s#uin##MGiw&)i8)e4{-qH?Vh;|DloxkV%xR#CWSP3D#(y zppTvv@Fj%~Atc~iR$RoC82=F1vR* zQPJJ~hD}PLW3ip}NtD3C_`%I=sx2z;p`5#6KO+8S?*UBcBQK}TT9X6S8z41N|1@wy z+%&@JFRjGm<`-5Q=MY2h`|{nQiJ$L@No5-zfbSJ6q#_s_WJn z75>=uX@7Z9`LciHL}>JS-CE&)Cb{V76K5?+kI6Us9IJ|Kk#1TXd+b!JU-{=`TYXWnAe)Q?`7rlfz43YQW!orx-Q1%X0_N) z_dXheDnl{}?Td8EP(7Pj_s=R(k!3M9T^4uCC#1kg%ji|)>P$7?_TSvbpGAM2|5{$p z2+N41KTf78m|HrJapABo8#qR0BQAvxRia>IMg683lj^xKef1z*;N7df;(2i(BfR#Q zx_Q_#MD%`dWVi<_XrH41PdBFEVZR&+r|$Zo)jbq@Q#ESom)L;?M+)|!$YnWoZDC+w zq^f(bv5did4r3Oc!ZN!zOYL3cpkho#(a%QSmqd#UHN6Px&bwK4m(3Omq2qWN>~&EE z!IeW5)$K1#4&63HFNS*4QFai~4sCgvu@>@%ZuHz!b>=tiS|eC#%6e$~6J5Kv)QlI3 z7rNaO@shQ9@}E>q;i5b~H>p!4T5Xz~yp$jDTnq6lxvK@fF^oY{jjD5pg!jb^ReZ|> zpFDyCpId7Sin>B2yh)|G-jm3!iq~#tLKcP*N6ZOSYh&H?0jOj2wlWf5SQN}Zsnd;$ z48hm{uwYg=aCm+v-(9q@TKx&B&iNBu6aCZHS-bU|Q5TER`0pw2MDDuS!*(mLOH2Gj zLNt;@hVPqP*JEh}(7P90y_^zbh&&V_nwE~CCjm{`#%`QSS2*>B_>nBST-~(ehx`zg zAxD&N*DH(b-{7YFQwsKkvc}ekydY8LXIFbWJu?{v4<1=9PwI+W7MX1eM?S26+|igP zZopqKeBS>|LP55@JUQ-M$fue?swlFkk0wYWxTudsjJHkm`==i%xl$737=vgN9ow2+ zw=?3^IsBPkDyUap7-oL{zo;;xB!asiqq_@$z|51{jyN#!9qjw3S*U1f4ZDL3q+MOv zg&%uSWGK);&n|T|0TSHEvtzxOtPTN}_yu-zI+J$~0+BPwEuUN0XnqlZRnR#;S& z+0)Vt_HvmTpgAWhVjBW)kpJpdT3aKlCc^D%1DNf%%52zqI~)-|&V=7$LNdV-9^wI# z?>d0Pi7Dc1E8!C<48`rjO)$6Cj9FDJ7c~)4D5n{w3x`56NAGq`ZH0{>a`z6d@Zk)G_-6R39dV-8jAS!CtX?w zG^T#{4i&PrD!4Y!&|>pPkFJHP;U5ukcV6gi$T7L-s8F(haBVsNo_697&g@G3w*4UH z`nHnf^1xTNX+hrvV6-I*?I#oQ?KX63IUGkM6cksmBgSqsM-kjhl4juy?%9?wY3cp6 zpAH`;1}=u0!|N&)lTVGXGc5dG-v!oy+B8#4E&hzc0l?VRbDhbiEV>_6KSpmoTzAa*XDj8# z`dHb- z7Cb4NI(&ao8WBg3PEt!j)6b0H;I-!%vt1g;XSt%06()#^qw~LH#gHjj)L;k3L`GlB z`-48rrQ!DBej88an=Kt&*36%PtU?Cx2|z}$db0RNI)7`1N&6dV9^8*=c5Y5gL1EGY zG!HGGY{wOCp(8>ptJp3*Cx1H8dus(g%$;llS#EuCd-Bb zB#LJf?K9=W!H|@waoQnW+@Y0b+qXyu0ruy9zlu6(Fl_v!J>Bp9=xoeTl$G;C7+Qd)cK5`7sC zBblE0l8m(Oz0t|rCg0Y3#M3%20n6YX)cFWs@CG|@K%Z3lC?~gol)$mMG5PQf( z`x}-n^<>#h%P&N94$Sldg4n9UmS1qg9+B!GHO*abdPwZ`PV3Unb0qBF5YQ=F!xfdO zH2XVC$n`tl%F?~p4+*vQfA=fnRsPLpg=(t}IrGX75g~~L;DI#YY|v2P!M!67$jlvl zyT~Ors-@wA5}f76=tO}_Eg>gj7XIvi#C+?>FvbPOCs2{!3CS?&VcD~u{4p&Se&>7@+P*}dcZbu*)=!I z0eXxtGM{rNeGD^4a;_SzaH%fs7MeZ{&q^TL0-Y7eR}!?-zEb55s37Z#anS>GP2i$X z>$aXH-Fc2VDhe6KLfxirD9VKm=TxX%^H6Vxd&hDbKi}l#Sv*2^F9_h~5_x|FV5ZMQ zY>OFb(!Y!v4Qq?aMeXvSJJ4O+gfqJdp~IZ%jDXqOzZkQ@dQ+I9B|#*z`za0pg@k@a z!{VX_jGOv{>|?11c?OIp`2?#JDN(y!c|Fmx!JZ+{ z9SzewEQ<_dtqt3{`M%2o&IeGS;XX7HM#7bxF>%294s5^B z=CtVyQXC}Htb-A^hUv$Df`=bGIvtmxV4E|Pj%{in-3)6;E%C=fqF{8T|K{;nFfl*E2QgE~2*&%C5G*F_O;s_OSb|LQnYA`Bzc@q#B2U zpYWOzj{;VqU7nJ8n?RB7Poz-L(9juW$KBk!7)D2aetrq6bMy1!zP|k1PLH}qQyFBr zifVd#UlkN$^JCZ)ufnE=hhZ=0j?C(DQd3j41g>`aWUO!bjz-MHVt_yOWwEWq z^jN*_Am+x$PkSHb41!X{@E}Iq8r|n#ZvR4BPW+Cm^!lVl8wyxDhL}QH!AQqIX9M!6 zX@;aw1$`f=Khv)mvFi7V-SIOKA{HJT8y-HaBrORt|L$q%7sbuxc=$WEuEF7rh^-fL z=ZYsRjI|;6#rqxDdQ?wQ@0DZS^l2UdXQK*;O{QUx(9P|9IS+tgbO~P+5=xIJo_%_J z)aMN4n5l5MC-`Rdwml>qX`hyMvDzbf2?5OUT>bB!nSF#iJ|**gG1bx|cMi zt-r;-yL&_b-^)4tTZkEF%VxX$d4X%v^yUQL`#C>A;$i#k=L%INBFQr7E5*U})Z)Vt zT-wYWj@8i-mm#)=z$Jd*$XFUnhoR9|bKmf=`M<26EM%In;0kB+%xG&*^xU5G@%~ef zTD&==gfqUruNVFzY9|NjHbK$U})S`wSGYhJT9K@)omZeCrpdqx-^(L^1O>X8liWLS2ssHz| z{a{>+8%C^=PrctEEI>Ck!n)tll8k#KIuJ_sf;Kbbioxka5(&o5*M8nMT{O7N z$kOOv2GDqPwoF3lzjEqJiN#``eG8%2Gur3i>N#61v#-P5sJ?L_)+`A0%lLgo}Vaa$%MMRWf$>w(C~|D5w()GU)pLj-Fg)g$T(qOccNiLDs00b@G7lvqvNNW#o$6mtlSmNNnbR;KQn#VMW5z* zTt@`&Yksw;8%;;eT|cgR%QNl4+v+fQkH9OK%?R4c_{PDna#hac557vs779n|yZJEb z#!_Q)jLOJb*w>$mp;8|8jpA+|_q)cbs=87FXpet}C$Z;^U=}Y)4Bm9cs>a~uMv(4i zlhxHVQ%x0FuI|XeJF;}Z5Ai)Th}uOX;(Vna7-*zhVP7t;4yI6+TI~gepRQcpET+%c z-R?grz3**4&US+v1}BFQJ2xTmZ~Et(QBVI0d~i^7r(!eChh^fbeRns}e1(L1;sydQK9sXjw8a0@K&hiS@ zRI9$k_%@_|kz?0Cyu@@~t0dVEo>x7U zc=vXG>AfPM>=E})MdYI?w4VuhE+KNyUU<74xy#!rtg10Ameo#$g+wIld%NNQU%GDq zsVbjspy2SZRt;Zx`8{(BtBO&$heGAwZ^5G$OT_-X>fy9LZHa72CLPn2;R6L3RAuZ@ zgEP|B=Jnb6dV zZgKKDzi>|jTW8}t=V_iAMhewT1%>Q?tOLoX*WSWy^xG#;h5)pQ}>-Y=g?+%_> zy(kuNgB^TVaM+UwHK~9W=je$S(U<_9EU=kbqBU~;>-cBUs= z!Tii&jbDx(Bv@;R18wpR#DZIDhp~q;#F2f5X3!OgD9T9xjVrtG%iNn(tr85meD%3U zmce4ql^g(@TDEZsq4J`u_n;?YrMhB%_(rX@!SwUrQAr76h*2Jd46CAeRK4G$TnGuI zP4@KXpn=t*7W4Ceq8R&9u!aG1JseOi7R9I;5a=}mtxh2KVFi;aK(Lp9qK?jTGbSG? z*x{^Tz1`Ta8+Ctcu}&8?JSv(!!W67s#9M92X!fFPU3<~MK%@Pn`;>oJP1dcH%nLs#jyy%PxwdTt+Y+Se6g24E7i zaUMcsns;1!&Qac~Mc9lL7V<h02&d_CWBpcb4giE*%t6Tx(;mJvsW zbq@)E!>NYBM%qMXx3l-?)$B0e^~%`&DuDRyQTjZ;Te)dLh+Yl_H1wK zWrDxt$m54+hojg5WBHDu>RQxS3i@%ZV0>aC=hzd&Fk#EYe8r|PC5$H}LC1H8o ziz52QV4jgX`$vCHVk2WTULAwW0Q?%ihIJ_C@J{)Xt;F(hfd4Z-h1I)Po(_#viDii9 zDUK%LB!#h{=6Ad@g@n5fs&$x!&d)W)IV1p5Mu9%Tup~}6_mXW8*ry)ub0!5K`2^dP z^ST}&Nwp;;NkGhTutF`ReNi>VgBf$LXBW>oYk{j!Tyzu~{nA=n*32ePmnxb80a+I0 zL1;HDi3bzD9aV0zN)B>_3WidMGSg{WiLO;)YB}>#n*!RpoK}0r7Lt@4TjbS+Ec=Ac;%7%#^1azhj4ID9_CSkobR`gPqXwM;~$2+ zuYue=3(2K-&#S$fQaYvFga##{IMH^Y#<0&p57Ni#He)=p5FkN%{>xJE{|ycLqD1@UwZz z`G}$(I8W>Rm6n#C0uN>!lJ5q8=vWl+hkXrM1sXHpNT+uz5ZB19Jx{Zgg0_aZu z@;3XzhHH#R{pMm8dV?H>{XEeTz*^}q47<{>_I_8#I(laMQCkx^W~%<7viM=jOqXK( zhtR0d@6tZtYP{x1n-K9pes`(%0cQ-!R1y#P@io4|Sd}%iR=o2zIscdUCW~6ydQVf5 z$%cM+vMl%7*yjgOBHt5}()%qgvd5CVkux^80%~XbJtlI_UsCP$v6OHr&1zj)GXDf_ zkMc~-RP(pz*xNRE%jq1cHWINOj*)v$XQxdrn5si|!Onc@fR-RbIqjQ2bxy0Ne0Hlu zTEaI6ubJ%T}JA7dx>5JbQ&XbV+Ec{y_;ruhfq zTmCVDLR)+PbK!FFMUB__5{^t&!h~iZvn9E+!;C*fiZK3t@uKk;Utc15Iea)Ltmp5q zp4M1_&sN=v=9h4K8$uFiYuVmg8`(6hNp}AGk{c`TKa6KAE{3q5o>mCuJN9i~hcEo1 z$b2JPTA1uCz6;7bDhUTUq1HRa1jVs;c0a(iBv_Y5rl~hxKJ#k}aZa@mQfohrTwLGr z>n{Jc$Cf>ulSM|4^#ez$GudhB>CN7r@2U+t(h3Vn(-?HbSa3R@=hKC>2!)IA9jzrb zGbg%^4ZBu(l4~jCvw0C8ZY}%n*tNaq5iAvQ<;C4uGn1IrxSpU2uXQWOceQmCOgKi; z1KFkYh5_{ra&(BFZ#~OtDk_Sa+k;w!(q(I6aUAfpLY8MCGb zj7Fo|f)_WvS7r=)LX&#vsA&Bha9L=$3u| zG5WeQiW451@j=p&l&~u8#*#30;#0F}o%FdKF|jgpZ3M^lX^l{H_XQ2i#8VX38P`Z| z6uk-U0D4N;md5V!qRPs|l^-;|CAUSEq%Kj+Wa+QPBp8KFoiScZ5~~PbWwR`q_ox2c z91HqHu18F<ugpO*M2N=wv0)QOWQ0I^@ZILW8aAaYkts1De zGk-I$%ToE!DE-oTJ7+_slrQGrEZ%eZ7d7O{R80KL&X-!evlCU^)|^F7!5uwl2DQcBC$}p_ zL2{fz4xxW3jY>76CkDEnVRV5P1a9zz{(AV)kgGGE{;OoP7dhBoudV%ispp0qNUiRA z&h^CF;8&8K7KL`ldA?4%94b@xbj`e2=kvhk+=I9*rCyQfaiNh?qOM&U5& zNEb68LQ{M@bOwoAd0B$TbN5r8r;Ph7E!QpDhbY_hZ#L34*$ zyWo9X&k*gJB`|Z3yy!i{)9&JfgMCy4y0&x29HWJWi5JXE5auaBddFT2$o(ax zhlhg4$H6&b-Os7dN7OdGbpor>AT95^fT!Vza1OC7bxkajQkY{oLlz#}>FcxN;gjjv zzBLQ7(t!pBw#*o2uU(vf_eavTO;H7B-Wrw}vbi0HSYl9`KXuG#>?O0z!h#94O4b_- zxFl#%kGL8C#ipr{of9} zx(~@Dx9!pM1r%R85e@Q;S!8H1t{Yi~X}e~g^Lof8sh)e?u&7>M0F$@I$0$Kpg`Ci&Jq72`)~?N7=ANmH@C1l4i1bx>>mk+X~iB8 zL3o_G=^t{1qShr?Jt_Zu!O`kNA8Tx@*xod$gDO2@lCK2}WM z{(02*ookV@nLO;-_37J@22UNi^lpSt?yxZSb=OEx(re0J;9id#4a%eYHeSHFAmJil zm&nlfm3Y~$B>N-(H+Ov8?$|j;_X8Q3Cxr(jNn0HmtwWK7+(K9SV$!!dmu04oD!bNn z52e-l)y$S*c0vECiJYsPOOl5J@hc-J(YJK6vqj0Z#-8CG|>${ zyq|ZwGUQusH%QaUpp@I4(Yc7&nVPzry|q;l)4OSripi9a&&WxxvzJI9&{=+9$w(VF zy)RtXR1RcpXJU0qgtsN^y|}>jT&$0~PIvVM4Mo7mjK{_YB)_QrzNKFN`qSaMdyywuK`s`xc zY3Zb`HDx_-D7^M>`p3I>c%qh-*Bko;w;Foqb%h_x%lRH{r|_F~Sm-cl!D}AXvUO_b z6vm-E4PU%|Ul&ZuN-;jvo4&chZY7(?WjjWS3(PqTc!zx9L!{UtB5@)BlTNs?$Wi0d z#hf6A-7Dt|wer-M@}<34ed6r5D$)(9Z=(s;x>7@iUB8R3oTcjCr zhp5Y&xxrD5o}L`2lE=@@>Qra=wcyod4XWm97j}#(uPAG6hBCRiZjI2=AUD{)D7sN8 z23o;NE4giBNAS390jQr{RQPIV9|Iy&SQdPLnB`KdNRh$g{>3k%D<`a)A;k=R3?mz| zF@ArwR3us&YRP?B?)FEltNr-Y>WszcK%C9hIXEoHYT4Af)6V!akFc}h>Jy`y71=Y2 zs|$&UZf>J?E#E25x<)v%|4uBs4qsI!q4d4ePu3~t*{LrT4grs6ftE(C=A*InvZVxE zHG0v?4-Mbir?ap<*&G$qJdFaP2#3WSo+r}1E{9}K{T@CwIvB{Qjfrd6^slUp+BXd* zameeAfC3#!1BRvYHdXf0N?n(K9n?K`zhAL5Y6(tZpX>MFProt>KW@Q|=e=^T0a-@X zHs9zMa{vt5cP!j{MkQP6-;U(e5SIczu*L_55!U~Nvs$BD-3Mpd>9^*$ZZIgbdowkb zE1G7<%)0ssJO0i!-fq%Wyt{R2m>zZ)YmYlMxqy9Ha`~CQf)}42_yoz#@FJ+W){Mbu zt`U{PVyS+2f4b^mMWvi)!nhbf9^Z^xk|OX-|M5cu1tqaIUt%nT`R#z%bu(QY4-Y?~ zhdbaxcuw!rbhNX}A%5hx_X-_dL(QBH13KQn#Un?HSH^7V@`0DPk#oQuaH!Z)=N~2J z0}(I8lL-4b{JoVOhN@SODbQAEltqNf(w0;< z|RB6^p2YqtZ+8UYH z8`Y_$s-7_jv#yCO$Isv_PPI!Pj>&AqU24oj#~0d}=^_XM$+vj3&6nA>)V}y`_|a0x z8xCuA-NWfE+Hc*Z$FaITt&bFB$1=OI`0w9wlvPo>*|5wNlOHzjO61+Rw}J~|0gd)9 zKOhO}GSLM|Gy0BzpF;`%)@p_Vke;%pdI6%R^G3#*31IEUW6d(1Wx05FyryoY|CUTb zW(S|Of!{3rYTO=2s9xi=^`R4W|7~8p|Z=;~->^i*;tA6s*Y~d0|z!FYMn8-cQeU5lCgw%&Ohf97g)b zrw*Xweow$OSLV0jhjqL;=e3K-+4OIwLxA;wl@I9>0#G1!4P>_x)_j_sehTwD=0q(t z@@J=tfH6fLAmnL9$cmn%sTb2a!@<#VtYvTz7Z<<1zfU`$A=sQwJZT@;y>ebZNbPfH zR;;X^(Wy*AEq1FN>i?0t??NU5$H&iqj61T;H`RuayO?Fi_0`t)gc5c3Ygh`J*#z!z zwhRRTd;58%7dm>-6d0^uIa11cP&BYDXB^Y(4lac7belT;`D9jy0c#vn4372HmA1vV zdCQwfI-Y1h(<-m9v@}eb*dJs11}@lGzr|6I4}6z z*EVmD#o|Woe|M6!Rbb291Di4e{{H>~FQ<)7O-)W6!rI_)@5ejK9C&=Ia5sZ29~@xuNs^60@q;j*RgZ$}g|0 zyO1Lu3oU7BNi%2T?J}kAu@?V{(bEQ+wW*0{<(-vW!3jC^22ZS@S%`e~+BAL>A-B{A zHA!0_=ui#{rUoORUZ!9&><<%s5O(w~5ZM}Bq?<-ib&ak>0w*MIOUiaK#C1kmhhXx3)gUv7FSy`g7HUjer}h^poEeo}3piY7$WZ+XsN8lB`eiSp03z<|EF|f2&478)ERSJ z$H5M&HDKjK|18F1exjP=^X7k_|HJu33oBu=q!>783U8XnE}+(S9sP&^E+nZca)b?^ z((6n~r`!e~F;#QoeU6PUGi_bsI!+a^0qQ>mA_C3+h@r(zPfhCKIA!Uyc=1uG8;kuI z{8YXNjZjR3fe^a8hT|o`I#iH?=NYdkgUx(^_6#is?Z6OD&(UR+g{UH9nis9v8`>e1 zPH{?IWc2whWbX&eu)DCk@S*J%^`b^6PYf%^0%(q{;yAbry;01nLaymL@!0a*XHTnw znQCcfb|m>>dN(BYB3ZvBX=|&hv!gYlpgSV@GgB3@Z%(NK1hdc$8SD$8rtl-l{EoNK z#_V8|#f^;z0gSKW9HXhg^|FzfM`wCBm`k40ZP-o7oK|i%{Bp{dXEn8hf5iJr`f_h4 z-NJNO|Dxsk`rAtT`yuzy&B*ou!?9>Xw)tu%J=-sW(RHDFHFL{X1v z$j?hdO%XvAd&XcDVclZbSOU}Egc>8Yo&`cmMLh&*|K>4Bsq2E`B>#;vfK6dq??n4% zN@(S9vuEO2z&6i2ub*?h+W$!~TzzDCSUli^o2a0SDr!KPfzGnFErLHjAiw)HS=e$# zp*8Vm?u2?>_-A}0i+Sl`8Sb*B%dz>}TNnmC)_n9;p{?aLc%S%FiaeXG-Pj8@vv<{l z7KM(oP~_vCFkYdRM=bH!=nPQG_AVF_Lmhz5U9E_Q4XMU65bl1#c2R3-sZ?cVOww~> zzUTB6mbS-Q5)i7fT>*z4<}w|v1Q0XOHN5wrYxOH!m!#4~tdEZ3&@OCL=PX*-XF~d6 zUe0vD4sJW7l;!h{!Ct>4#LgJf{?kD&TL|TUqN6gr#-=WL<6O|`>e?VO9{Wq^iBE4v#P5FyH+=XK`3@h)r1wruTvG2Q&2# z=QQT7IIp?g%Z>PD-4nLov%hR?sgtQejfWwvOCCJaKRPbVo^rU{aMZ(=NR5r10Ny(T zZ4|{`dD2wLxXXT{pZ{K5NLN(742|K4vt?4G${EbKH-J@|OzvhZlcq`mE(Cx~r~Ekh ziP22I_11^4>t-{f@tP}Z5^LjWKb{AuQE0_{(EDV6dJ@H2!5X53=uj9L~!p(teXPU7aPKM^_rMo9Fhj)xvS9}@f<*=Tr$z!iSrL~@^TikQvg*hSrU z<-(@EEf%Ywf9)se|4~;qLb7$bTch1>)QJq;s1eKms9cKIvgV4@OLjW2vD?CWKldj@ zluepmram0e^E9Wh1dg2yTJwi3F4=$c@#G&0lGid}G*IjvN(M@sLOR!KRwl}3YE zbWKV%JAmGOt>-mL5e9H*e=#fpAl;%A#P;GSsL+cT%X1`^{gK&EUxXO+gA+?b`-~*2 ztrJ?VOm|JutBiw3rYW2|?SEo~MkZUT>Qzgo45QN3!37$L%$=oS%=8#f_Oo@#11h-l zJgoI@Yk{2GK->5H7bd!T_{nTZ2H6{ydRBQF+;s;V*@wSQ&a{@=UMRTNI)cMXwq|-o zC8XFm68dF(jW+?!?HDaBG4xM`0pTu^A_;Ofs)9cOfJey`wgL33ZBUM(I3Ft5 zFsaZTGa544MoUuXgNI2$-I7UREfB>C8Y+moZu;7*6a$0)mSS!y#lGk_}K5gGivh#fEtc{U zf}>Gi6IJXc7U}FL&51y`1N%J%t_JQ0InkMuk<^*m`M4>|&mQU2G?a(|iNR;8m5oxI zAUaPe-~r8_efVL@+{(gQD$$DyrXN6oIT|oi=5j|?pEhw000RyF0#GCXJ>K4b+4h1* zGm$a+AjwN7Nv`R2uZ?N63Y$`0S6`x0Q&f$r-Ww^p_R@J8H_(ZursGoac^jb`{Kf4N zPK$v#jqJF4+syRq@PM*t4dh&1pJ9th3I#T6DUwHRRWG4b-io*&K{q2P2S-yVI}xON zHxxV0`pi;Bj?Cg=pX7<82CUw<#}6hET-NMv+u;2%PuBOTfECEoyB_kvxF%1!D{vxF2jr z?}ci?Tq|%k=~X-nHAuD+yY1t$!|@ZN)af?@F2ND?tt-Z7Nh&?11mYeU>UJ&!BxG7G z)6fudXfd(gX*D-?ig}v^Cdjapkwy;r?pyHDtIZ%n;gD{+2sut|7L(@{#W7?YN}-`9 z&SXTgkR`8>=0>KtB?ki&;nc}fq0W%?ORHyV>ys4ELP_Jm59pE;mFy8V7M9T49SXE7 z`h#ZO!bY;12IK$30%$X&(T7stO}iL)OEIpbN+-yJ668RiW@8h$@VN6zNE2i7=%IIF zgWAJ~w(m@@9xt2JzbHg)AJ(at^!(>!=&KA-=Xi3V(pps+&TxT^`mAp;MDCrIkKSta zQ%mv8Dbbj+|2Z2jVPIIu3q)-db31g#Nu2%EIO%Z}5IRG3tmPAUj%iiVKhsLPYU5Uh z4x(!fIEJ>oH-4U3*Ek!b-{0SVO_Fg1Mh)*``^AFS0NDLW?ZHt!#)yrL-JQdq!*LBS zkfjCN-8Db(dg`Yx^y~jQBn(=iKf`o*89Xb{I4gUzJG5&z3TpnjMGS}E!DkxylRBs7 z5d+u{QvLIvn6bWUn1xOKyFerM|Jw!fB14Wt?*EezGz(6N+oitMBkys{dtec%+%P@U z6^n zdWwC5n*!gkj2GutrbP8#!RB=B0ieq(z=~Nlo zE7z1`!q6eEB+zUkYyAh<9^TiH2D7!>{ooBZO*S@tzDt}iU`^TYKW-?T3U0HzZitm}m-D`EWWWB2fB5xW z`*fT8cl$SY-r-h>&P4949HPThmThe{ZMZO{xCTlgxVyU+mlU@aFA}u4 z6?b>H;x0vsySoN=_d;>^o!-y;{)D~x2*;WuYnWU!bJ|rOm02ayKl)VjJVp9OkT636 zn67sGAc*-xh1ZS18l9U;6@Qw&KkO7H_mSW8oJ^|GFU=aGIakQr7V*qxrKcfZi$sx8 z;OWUc%p#f;dJ-s#T22g@Kfs%)`)}!_;FH5i6aFAR+;wFbonP=ClCu;sdK)HL))?PU z>U<-dw_5I9P14`df0_8e6@ut`wBj>f`3g6qLyd?*WJFfJS4o>i^?IT0{kruHclGfj zi7wmFKc6pSiOE91C|f3ZqmYBhpGpOxD=2(Vawa-RXkq!)iR85VZaPDVKa{T~`e1!A zT+j^~74tj%lVv9)otEm(>$dTsqH0~T@(wNp;}m>b`qe$gYHv<0oj!b6=r)Lz;Qri;(OW=55ZuZ&<_a8K3}osonds<>(krV+oOnQ&@j8yx9(jF$FwzVR65ws(D25q z#S~Ie;#IjpU$Q@Yi_IpeYktPdx;}mD7ilw=j{HUJt&@byJK?f}SX9yP%@Z zM$9UUcQKx~xXKCl%RbK=51ntLonW3;*P}l-f%VR*9h6pU%_&gl+eF5Ld}YKIqr~xF z>eZ(-NX=0TE=NVg!1(=!3xWi>4o`AUB`W|7zV3y(CUiT2_ufbJwtp&sDE)%xRaZf9z7Y=XQN)SB-3NACG{A*-O$ z@&lxDBbd_}xt8DqoNV^pO#{h4NJ-a57OXHRs5GgEWKqiO@H~XoDvGkAC_ag@Mq%t^mplsyqmNpyHxykqRw;D)OCuryeDCfHpn9{Rl{ZEWkr z>cQ^AuT!mPMlOl=PuFP17vFyl(ZKZtfdzT&DN=UVS$*OjQ}nmYS!B*izXgYr57z~N z#oc3mIFv}R(Gk^D8lNw!V3;8ArwL97LR?}q>oZurYy>R7tqdzy`hrD6ge3ypXvTHK zMvpD;*9nX7^WQG1r>B*XAa4#j|Mp|(+K}8tB-asquYFLtxdkt*^yvnZ2wBLcdOXJbx;+A}+NVp@fi*XBd%(LFcyLjd40>%>mmT3vOl$_PFJqp(|#= zsA)IdSTvmlrVm929Guv4j*V|K>2-eubes-h(<%dZy8U&3g}Sm6;8|-@PV;?(Wp8@Z~$mj4eU3H zBSV6^6M*1YSb%@Fm+ofKS7on3i)?`aN%_f*6*;;c;~DxumPrv!vaC|-Enp%K5;+!Z z0S?;DwK9O@2E86hM8?)9%T<9mt;ry#I7OMJWVC3KK}r7%X8CjM=YA~7LfA?!v}>mi ze8@+~mT`uDr>EbHIpp+sfY2bRt5;38S(Z0o#BG4-i&nz7vspY<`u9l296X zk{$g%>SljvD@!FKasb7eOv8CCw_x*LZA{JYxm;T^s)SN63(Lo35C81!*m_fnK!#196iX{a{p)V^SF>`DS?)#DB#q(?=%c zbdU#qC6^^E*x3>QAiT@PE+8ZrHbC+srQG4-qM3pwbmtUxV9EIFGv%F^*nX#P=UGmk z4_B6}QAiNA6z>eh#z0Td7G?A|!lG4?0L#J>#DdT-nqs?jQ}Z$LO= z=AjFN$l>p_344@x-08K8S@$CJvp$#8C@^7}srDpB<8e4g8N-_wP8Css#mNG@M-}&S zs~R{hO$A%*UMVyN{&)H#moHToy1v4>gk5lq6{nysVUr{bAXJ)eywmf(ymplDJZo(7 zu@I!oR;CBQ(u)S6fN>0SV!PSrJ6ls4f<`sjxaHV+L3goA6iGB#E_ShW708~XFyz$H zI3;AF=_NW50BnB};l*?Ekk-ptrL5j@-U)I9b2tOGflUzN0iwh>Wc%T9OZYFwQ`fkEN1wDp$IRB@0hNR+Nt_Blf*u!|&J3 zD66FzWgl1OJ9ICGHCbr)y)DopA?WKa;$BFhB)^|57Ut@6U0;mQulZcE?XNpU@TQ0Oa`r{Vh@g--iD zbWUh!7fN2b9awl@)<#hstPXj(j2qvzxGefyk_oi>(h9%9@7KG+nO*F%!2fqV-{YXn zD+i!RthKcpVp^*eRUb8&@X2f(AZ~aBcP}%Mo(RdV%{F^J?9-Tj>%_^hAo6}wz<6L@ z^-=oivhMnBZBEYfh#^^DB)};L>f4iEK4@@!etD^5Y089ON@%-z6j*&UB|t5{cZHD0 zt7-o^W8HMqYUsE`Atg!@dah?p5VVWM%l7`+-N!}JG_zOHxSq$8Opzw5{CBxu>6=f8 zgdbunhQsCTyCc2s@Ihf2g$?g@VfPG^QM@?h7FV;iuSDTY%?ICFFuePIW_wB67H@Yz zMEbVw*1A1h0@HP|oEMxouF~ly?J;}gEJJmx%V%Dz|y)f@#9w59HM6^)~XY44BO zO2BRLO$hPw{BPaL8i->reO`TAJkaVeMpzS!ndb9hXDm|K9_MYC`h7^V-%vPwfXbxp zg;#6Bd}4j&x@)-T-eY)^$%{RDm%mdF*9<#tv3oj5YV;Q78~o=)J~NS~2={6?rAV|q zxWzRt8Iy3x?7;4L8b45ipWvW;e+nYd*6K!TJ!)%q)5BB5Gh0(Qx^pY20bsqhFN4so z@r5C{AP?hhl`;Ymnq^#52} z>y&x$!d#+bSdf&wJkQY*3r+ejbdAs@S<;^YU| z#e7MFo9r>grGN}|b|4y~)Ep4`BwsYyxdahJ3K)fpZHTjFf~2?XZ~u?$G(tjofPHx% zFlB|%?*OBObsrR7pC^975wuE1Dfh*qu%uy}b@xK%gt9=B$N~c&AxREC=K__V;fD-6 zZyzY1SxWQ5wWM?VMl7z|z<4}o8%R!6FJF53I(kgULfa7i{~9>>zX4wCeEakMcjN%H zCFi~@X)tuokpAAe8W{%J_>%>~kdegfw49#5LGRQ@efC5>Y<2#;?|zH(iqYXlG@TBu z7WQbxQAgV>x)C84i{y2iY2AOQx* z;DD5&#*Vvu=y9~%4o7BLttCPSTm7c9_!$xBbcGWw@}cH#n@=Em5oZsLfCU%&em*pb z_+hGQ&A)AT|A4DfSfY2{=JyY`6oZfG;Zp-dTn23797P(OR=m<7FOs{mNjzV9o@qE9 zdH{R1N&1d0p;@QhVR0K2m$2LjVegnV=T2)1`Zo#Ri&FruZ?ElYS_x$YdJh~c#Y5gv zQiKsA=l@i?5M&Ihe2%|tKISZZWZG7nD6;wfUEo(J{s-<*kQv8RQjNIF*MdYeboAUC zEt^?k_sYJ9gHiSA7#UMOBYVfao zQZS&&x6go$0()lb#8Wj@Syq`mnhOX|tS9yQ*N=&Dc?Ks*6oeR%R}77JQ(K#zo0EE) zd_)5aFgXce>odcNkAe;hq!Xjrv`Y(gvVlEJ@L(ybh#nAym#TSz1 zQg9W^hpHmrA+j1G)dx($Mh<{P_pqcXjOgp8ng+-ehV^mcv0_U9wuiBQq6-tX6q6^2 zezf;KX!fOmm1zQ5OagHbDB+-u6ZiM`4~cF-bar(zv~1eBL6Wjj0n*37f%`ro#0qp- z8Hz9bD0~j(`TgHuQ~}680p_CSUsQ`ghZFmTNkONJ)!>CXJ_V}(z6F6elNs1!HUKnS z21#j|b&%A#9S&@lZ+wpZIZ=u_QLuOz*Cvn-TY>@6LLAhuoZAEEMpURmvz!u}WY|-a zDrwl~Fgcvd#0<;2A3OfBBn-LE9>51GMXr}72$*i+nlGAa!QuEMH>7GIL6*yd8?_hI z5kN~63(fX(8n)*E5J!e`DCh4GSoAOfK<{(y0ocY&M7SP?c~|Vk8%*loM&l==8iz7% z4=M1X(#Y04FBL?+BVu*PAk!~R>#TmtPZACa zsP7}|ri)YsLA#+-6pE_h)=lkjQue5$$P19vS4y09oCv*K>SPcNRUakGG}-i9)#Qar z8Y!E$4*TA|H0-to}ms;7a5nQE|AG&;)ZO7B=lOR8EN_MI2?m%Jom zO9xx7pdsPOhq4hU11n;qL;F}9utFLIlMSQWgb*Q7hL5+G5eM@Q^7GZ^-Dj^_)h0)+3r&@sQvW&c$emheKv@8NaOvIuD{*# z$V3}+=U{&4;rX`mCMm{a|59UOcLYSdv&}Ci(|ovJNIM}mIuYrVH)DY2rHOzXT{9N+ zSHd~L3=0c=pK0N3R=X4YMUStzp3Ef33UZET=^sN-_@b{$#a)VA)H+6za#t^-f+Gj8 zM&Gg(sw9IBtgnHLnc0(>>c}dJIBhp_{W9n8wvIl(LmpD-iN`__&^wC^= zOqWJnOzk0W*Q};B7cY%&&W40{W0l>+9Oi1WPk7m;iPA!F@6F-j**GdcZcR8;4mJ~f zv8J*wPNpB0Mv*`~WGG0*mYbYuO=3Rtl;jZ(_|iCATTdzDxZ`x{dG5%CX}u{ZvfhPU z9H#%)3vt|`>JEW;WiQO5u^rsDrf$O#(K$^@@Cv8{9ED#*Cj#hd)wcO2_>uJ_-EufD zlRtdRNIl3^5Ut)!!B!>`-ENxl$Q9Qr3n_2Qn$n9Br6}mTA-k5VPxi&Zs3fGG%NcOD zen1-_rI)E3cBLNq#}HM*GlZ9pn#!t{aZ4CRilT}E8NL$~*+HzWpAAkh|7=_c$hZ(2 zT$puqj}5T!6nHd0+zN&gzrMNt@lfKt!Sqg`Ph%VD;v$nze6{r*p>TZHn-$wlCbeW4 zfvr4Z;$l`%6De!J?*UXG0IJ77y3M53?CEtpW!he;SZDcV#YR)QO;@1L@&{)yVblKS7(+=7(Zra=b2zMdSqbb6CiqrA}>&J*h9Hwl#+ceOPl&)%i zp&QRP0?w}49mnS_sH#oKL{wCn(eACg<=J)(L?YUoPlG_E}yzTjhd>e&Gd!O@q&jO zRw(tiZue&BcOUcPxbg8t4XJwgkXEOa>R9dAdg$w);^`#m*Yu_Ri$}@F;#0(=-o{j> zCe3vrK(**PjDz<@g-7ama_Q8xTf!p~O9jpUhQudzcpczpvt8uTF=m$C6qM)_`P-DCaow8~bKMg)%L%CmMy2|U(GM^+ z?sw3PBY5|FKij(xmGw1|^kvQQ@1hP=z9msq6#OXZ7qj7+$;;yuZ(c^31cHKPa)qBw zRGXqjn=!b#NemAZ=gS{r#dL{SgYg^Q8VV>&M1VaN^&@on`Ve*A0nd*4Sx%r62?o^ufy(ZlQ?3d*^B z=}Xsc%IB8`peb`UXAWjrQELn(h=Yj&k}0scDW%;U0mLEkCWahPmr#MkNYZXkNlYQ- zDEz+4v{Y#=b-rHk;ll51Iy&U+0ZJ4@frS0bzA6@)1IA}4<2LK*J;BTF7eI+4YZ2ZL zXtW_tBIm{dvlUG)OW|Fbo4_ zMbfQVMJm>0LebN28&Q2@hv;Yzpm@?jq6>rj9m`YDpfZQnhfTW*w{cWZgtZC z2+hgadSz+odu7g=ol0GwZZ4(VVOLpf-OoEe-=8${xlfy&D#TpWS8d4T|6=n)P{9Y2 zV*USG01}Oly=NzqUj!JP7GU-Q&yXMS+oYRuf&uX?&*#0d`ls{x+DwFl8K!|~l$`j9 zA4@o#ze%=JDumjh@zvmbn=SlG@nAlwfD}kq{5vJe=K=SP%eMTv4hsog`T#4s2b7{l zi`s`vD+~UCP}dVN7#p2a+=y85MT*%ysF6-KE&b#0M^!$R=Jcr?Zf$=`q5`_Y!_gsH zRCOfj%@z#UfB*!dMEWphm5NL@noE|#az0we`9@_VEQL-rrf83axXZL-vOY_lE<7JE zY@KztgoSVJ$-H&Omt!9HwYI`tUF$Axk0B7{+9OoYom|t7w>yyoJdx#zYVY3irE#Z| z)uCF%X`zdL5o1FI#J3w#{en&rO!kz-4|(Cj7fvF_`l~(b-q2D>MH_RP>vGPr{Bs9K zflXJ4wNMhSEK!$>y;|HwfsG^4_5rFKCxq3$PuQr?ga&4ZAMPi3xNeG z^`7#XMDyqD$~svf+ME0!(IYx3Z`XMem9l*7kL#-zt&`HZ_3sA7@ZYO$@{{!3X-)rS z(?pu2k)2kSO&Fi20D%5v@a#na!*r7&h3a(7fvCZ%G$kxiq)}ALsqy!c&K9s**p`O! zRCR^%sFafZ@<=V>26A}}6GEL^jFxEQaukwsRIcFPLvX9yggxp<6B2 zWs`rv#uZ$8y%^kuM(Iil4=1*u<=zhOO!Jhc6~Uu6JMMWZ5-pCee`sB5_hIc2k~ah; z$iw|z>`dR!!f5$|RVSyXhRSFL*$*Zxo|%d({$~Ez>NwP-WRG-?R_PF13Jg=Nnh6X2 z*uofCa^F0Qw$P*g*UHG7h!#O3fASB==YH&2bJsOPC2*kG1cgA+v2W~fI&h@?{d@4~ zVZsl4_sq;#>Z-B)P0LF^X}&2YWNizMQm%ULrJ)FRaAZ`HP~WAP1n2jQ@)v)ezV!}?iwNG4 z z>Qq-C-)m*CrH(o~vvk{phnw@H&A5DFVcndubztCT8R;t*QdYV2WN@m@17<4G)8U%f z+G?KngcrseH-EKuZN?|jcakPuOG6YK*f#XBjU4_WLz2nj^bzuf$Cf8)bRa7!7h7z0 zv?fxm`-k*cU5s2pYCy_6N(QfRrS&TQ@x_>_ zeB;^WUY|bAQHW%sNXFg;w;D>cEbZm_WDfdrVmL`b`QkV*+lX`Z_F*jcgnxLdSy<;A zh3vwW=dvGukMdSCMy?&-Y!djZtN(lpv{$M3cb}21NV&pEnoEwg-yoql>MWdlLs51l z^5g>H%v>n;j3PviOay~ijHFltJvRj_Gdi?@T5>TA(FBl?(W#C&`cw)p7NPCvLJQ3^ zs3too674fmsVcpQ2H}~93*c4pi9RM(>;7G!{l4#234eVM{IO*eRKhi^9&cNzILVDe z0eK8#Lt5y)*rx0BRUtok`Ge(eRPD>Y7FKhkqI7V#$%G#I;QSz2Yfr<*98KRM;nm=y zhTQ@Fetv$A>(MN0zr$5YN5v?Cr)Csn`T`t=@)n-ePCH+hX0X*{R}5X3b2+qARimed zHf3io1|*Rs3(swr(s>j2Q(4_Qve`VQ_#LZj!(xJwpo)$b77yt@Eqy~&i zj6lFF65&UuKmg9=RHhNfp5mfg9@9=Svl&7WqkJkm9wD-b%Lv$LAd%zapf)*29-f1c znRjwOXs-LWy-+rKHf|-+&FZ41bi!hCEt?3wpQwcxLrUQxo;^|2{G^E8>zU`?6TidI z_H`j;#KfZ1k{qem4p@45K2h&9-ZjZqV5Igo=@%Pi%|biaMjdzdffWPx@Q6`B^1O&`QwKg{Tv;-p<)@l!j2||-wR14u3ElPTg&t^v9I@ArNS8xTF??0)W#s1SyeeZU6`l2{X-{T(g z5B2Sjp3<6-b^AtJn0SN6j63>8uDNbo+>EeMT%#Y_@U&W!DjV{jKthArB-b$mHGOXl zMK1|^ZrjZ@%S;Likn7$g_NL$&LCPn;@c)Q}{z4rU&wa)wsB)xwJp&3i&sXok|MMl4 ze*aJ97g1RDKP6vs*#OEKTmgq$L59512ibogt>-_}5!3(v((i5ueT+j`GdH~}@?#HF zzJojZ@DH|DJymmScw_!YoZ2ki1O`gJq(<#+T=NYvtD6tp3akqfcMBB8FFZZQ03A*oRu z`U?ap{{k3Tz-Qks1JN;q)3nn{Mn@6#FG|izcSK}{?@V9t`EYh3;x+sD_gvO=>Ub)~dqF74xeV zfG#X#WS#KH;{^krI+O}kwQjR!^W@?vq{0V4VW$)l4%UkFK?iOi`V{JN=>s)O7O8OP zczLad0KvSzciU0IyyCLo=~W9rQ$YGDz1@L5063$RQTeS%)!49dpZ|O8 zYw&DdD+ud@mRAS#1)E?4iE6@-qI_q6AIOyf@G6DQerbHQ1ESE$CMyxEbx^b8v{lPx0ojvJA zZGK%@*$}xw#UlAsESW;lj~(jcG+bxJxTIjztQ`C3ST9Q_py5~|yzplPN1Sq6cHlct znNs}fPx|G(Z62w-M>)M#ZF~a5(n~^g^`o<>74j@8i?59XH=$J)x<4q(xxDmi^e1E< zXg>=tZKS{oTc|3AL0^#?z!;)QJ|E(dp(OoN`hXz1r{5o&JG4ykqcg64K1T{=e1X5x zH&VtvDr6RoZyW=hZh9|C<4jS7N1cgia=Gi@6I5Ab^Hb!f+nev6C1tOG1Ku`lz5OnK6n+D?T4Za6(=Mw&Akhm128;?Lsf{=S~VO4XX>*sk)P zW)skGLZU=fh>Ym_f1% z+uMnuOpzZn{A_C=2n=f+-w!~doFoq-r|dVS=)v)wdPmNTf(Dyew<}-pRjNW9iPQpn zCWwYYLFE%7EIBTcwW(?F{QTF;2haMBJ%_aFYIcWaBABcLZY#XFI<^mkfk@c}>{t@% zfvcZ`N-TGiLj}C>MkpddpgEu%y%arlp=#KlKNic&%g}V_IS+;;l!J-P-iDLV`!Vs> zfw^M*ss0`rMeyg&4oMF}(eMHmUSNXIif>n-DDXYa_W+t?P0D8CK|@p1B2yU3Km%{@ ztf?s#0Re%s37cPfoe@>B&Knvrg{ihd)RHf}oSYJ7W(V=fP)}nDg_H!9i%TO@L~=5& zySw{ure7^02E9{u<+I3N>bnDF<&fB5{UlMud=bF0z6g;}^d66fLLjy$JXA46b_y7Y zfh-;B>driyC(r;BT6{#I%FZzhiKE9)0GIF9E?GH4dNs44hE*RQpL*h>mBL%mXAPMf zJahUfz(@tU!1T2^VL{|D+q05P0fqeZM4^C)4*1U;8j#>ltNk)Xl|xW)bZiVQ*&J-^JuAs+1TAS|vOn^e+;iHsS*6L&-DWE8F_>e(5FfQV%5uPFcJ zaaRKG?h7U6^rF87&9Ad3)SB53tw<*da^@V#RHEC*FuCBGXfE%(Pi5Cc3W7(<=839P zo0Q2k(>FB9Q-B;SX{-;wx_yI1;ka+U*PY_g`sjz#)y<#sa|!OZz6*e7{K*1=kHAMFBWCCeb!SaGU)^0{|#~lBiKU1cj8S8mT4vA`?^_ z+YMS5pHhc@CnH%HeqiJM)bC05Tc^gjTv^di5`+wdMb}1(#G=ER&_u$*u;Vi5`4e#{ z9fjc;7^{02d-|{1Y9b7)IFvl&4Pj7;e+O(HqiKcias?hk;JH?kyF#<*Vvu5+vgdf$5lcnoT`1fyB8LX zDhSyshrm$mmye=;W4Ro#3snY)S~W{VCZEE@$mL1Wus~`9xgVtvlp-lteQ|5x8iFjT zre{E-6kw`%7&e;;D*PPNn@?hDJ-=e`BKKZ2Z5|OKe|OoCA4Fd6vu16V;%yi$JJp_5 zdMrBb@K}j%ZaxrvMlkWCuD$;jM8-B0DMe%HhXKtnDu^1X9)N3HeUo~u zCD_n!4rOwNFUx-DQ=DVJFM^lr&)ZqMyxItP$k==u5G!xSs^U#ejlOa5ZL{s72;Y3{&ocH{0eQxom|PB_$VqK-nsU0u=((~KXF$EiM?a8 zg|5i6oA1PKZR+joB`k1%*BD=12w@uba4)2V(U&J<6bKHa#pi*$inxE%Cyk70D1sZE z4g7uMO7UBG8zw8YQ-uYGQ?D&f{uIeTw#F=_NB!kJf^{uPPQIpQV-D?E6+{*b5`NI+ z3`x2|B?g$ox$T^vqKa&nz6bw(8F2wJsHfiP*qQC8vW#OJ!|4&9Y<{I{bsS6LvhM$J zsTGFp5AC)_Z~58QmNYGA>@dx3`AL8tlD)V1l&^b0V0^o?TrT%t+4^Zv%GV53MFH@r zeg%p=pmciPz=TYU+m9Z&#Bw53d>l|I5szlp;n|65?|(}8=>2juBlPl;@~8bu(dH=i zAgowFZ?z?kSi?B>MB^NC_pN_LWCOCo2`_NqS=nNZY4+_NOT_y@Av|-z?ts)AAEUi5 z6yFGvMFe^4-f+hR47ZjU}bR-q~Sf%ji_*>vP5XJ7yPSXDpyxNCogHtq)m0=JIn631@qq1|H*TL%PugK)0V;S3B-N+4|x1+1>FN&Tn$z5?{o=&lY zBp!*p(Txrp0s8rS?Raj_^>=pHLTf8$ySY^xU8Q*Xn@=$>krSg;+b(C#>G~pfURfe` z;R@Lg%nd(0>gtSDMm6`c;aD=2A8_bdcz}LWxsACFMQ+=+Z;_pD`*4k(7b~l6?Fo@0 zLGQ}vnXVE-9!5ppT%I>HL^fMIY>L?2;vcr9JDjfEyFfG1FDO$b;i)GcHEkt=hT=l-YUUXsAd73XiAlgxnj9*{xM{ zj?bmL|7HWh^&FN7%5ZEFYZ{M#$&@{+gr+^8M+TDFoxk8W=z6{Ps5;yZO3}~9p;I>r z^jUmk8k8yKXZKE3@nKv`u)W;qxIJ@*}l6%}~+X_#z0Aq>ETEu>SVS({h7EvF%ZySSH%xv6m^k{Y==s zXv0kRWOqfsH6*TaeP7)oJkLrZ3S$4aKERWWdklYOBUzc@{*78JxV>+GgA)J)Glg$B7o$iS1Q~LIs zbCg0aceeJ&UK@K#B##p1YE|a}GTsxBoP$se>sG+b&x|^iYALUGasN*AzXtrd^QTg~ zXeZZJZ{~a;?_F*$w`1OTSxGW;5=TQuv@{KzYj!wYE~9Lpu{xdiv`t6e9Y69+&LvCb zFFMbx30+T;UQOcNR=1x}iM+NJryVtipQLjjk)O*FNCvOhTaxDwLpv9-5K8!_IRewu z3N2Txg`D2-fNm!q&zpriu31r2u#`A)I-+0vl}zD?m7)j=k~Kk|onx;2gWMi>Q+HE> zf8UmL_-G=kH!lg#HU&4Hd7rya1pmZS(@ZE#&a31|G)!82q}#pXtdA!FrQN~7O@Avt~6cUk;NdSDi! z6iW}A#58fuq?Sx06P$Y!fM(qq$vE#cvrr3_T{-Ix;7oWXuSY>QFU!ze?slucBsrGm zzF7?@q(W~Ltgq8MBZ8Gh9#Ik|-=@_58us4m{p~0V(a7=)Rpxa8ZXuP zfQwBLg2D5g*S9)}vea;Tn$nwm%B!yU3#%BbB+5$_hwsH!Q&owgyLdv|1vw5-fFTOU+tJlzg~bWET^CLGGWlEa(hZC8`FqBJmSIv7WFs@?)`G^~v__K3$O z#wX`p_&a@G5O{7dHlaa4y+QhVQ@`*gdET%Wb2-DX6rC3m~*4_`Nc=`kTGn*A8YmVUZ2 zzPvjW+S-RBk4Q>WOUe1|pCtN8_g6#sTRafxjW6qTSftJH+g`svcY63g@3&j&tOV<% z>Bp6iS88zwilNv^(ekc)3(}GY@zgf3(;Gy7tFeEX)xtU)vgRi@*3nsZR&$WdQc7g)!`i4!K z(!{T=;{1ifM1!(|C=^94pITenan}mH&S0c=EZKUw#mef_#1!Qq@a7|7$dBsWxr6&d zqIR!Obt>C`amux75nL|yFy7qblhId}1Qx^6h{5-}bURr&`4uszxG7U{n5mFT@aVj^ zz&l=~fEo#=*rWqDc|}DIK0Xjj$}fRjc?AV_A)&FZt}ce{3JS#Jj6QzBAUsW+7Qx?k z_<~-^RtEyhs0kT-KQg9dvvAW4bE>i{N%;7WrV=>OvV|1}e~w=}9b7max*9$pC|Qmy z_nJq=W78We03K8e&=9lf0+AwQw6+@esI z!^vsyf~J^!MU1>SjgXZ*9DV?jQJ_0A&G|dHjqQFpR%ao~aod{2W0#(1;{xDO`L{s# z$In||0BoT;H|kh2v(9fO)Cz7{dKwy<`@{SgAP{H{uU+q-PS+-KvQzITS`6|x};x!+vNII zIkfyr!lA8pXf7d*jANvgERk_x3I$Y{bsCsPG=BE&#E4{RJJG8$1ucq!yFY%qT}9o= z*hVAB0jQEk$~6Bqn9QxmgCpZ`y1DhG&yT{?PO!EtuFbJ~L5V&x9`~ zy7}mg1nG|Bv3#smPNQAu2qL`Qom}pvA6FgTU95AY6$~_Ttv9jl<4G(16#HI0TecnQvioGU@`ZrOPZf0VUWO$cwk|c zZ#_`^)3Z68;bl2Y1$>t6OsBWtF)yPhBwy&jz~$Out^RnZ%(v#3eH2x(XPd0(@lRpT zEiw)*_xal`La~ni08xWGw44`|N>+SQ(P_81Cy8 z-OgrIh+}g7awPj)oxWT}Kg*or97n!S5IdbG5$10X=q@NwPS#bLI8_!ztg#jfFo9+5 zVlY0BQd+vAyS+1bh5>6gKR&MIaDQv|UsxWUmM9)BwsT z+Dt&u1lLH3RJAXoRBBWKPZpC+NE7omF`6V!8uNA}uXz5HCXGD&ehUfN?{X%;`OqBs zB~;Gf-Kc^491fHKD2#a!_XPWy5=Fm z{9-x0NJ0|}YOcE;Zt9ZuO8)z_TdxoYd~Xcn z=;aD5(k+v;=%qpl(6ARpVM6me2~vnME?y1Q$f2ph(x zBPr=54lEl^kOEYYmmaxig?f>o2Tl-*fo%Hl*~Bl=WR~Jg;DN+CDje)R7(LwR+F2pWxS{YQ8knZdGXpD=US4PFuD&uN-5Z0wknL>`rfbh{{7 zY20!EZhwb2^yJj1j=W@m{%fk`d#QSl^BO?}^Xp$e3^g@1Zsd1AE5}g)0^0S7&XpAQ z*;s+^iEyX4f;yvqqvMq^;YQ2AGqvq(b=h5bM~o)8m#TkHb!x-{(}87@Kul*Fu<|D>g%W-=%}r@w}i zGXE2rYvj{)rz8!$ZAWmGM)Ou6WG#wxI+PrZTrl0YWV&W z&zxMkin`DyB>|fH!tT$u{LyZpTJ6oWD(D}FfB>revImukA|hJO*RnYI9tVl52H$&d z1hZsAY7KjXrPRC_k+V91xrt@*I$oVi4dauOlX=7g8sP=1RrC)f9ql zxVf9KsGYOVm>aIlv=1+;5~}l>4enLFAGLTDekVGPg^&KK#yQ69-)+3^@EjJFXL#N9 zX!)s!`khhbDPw?EDnMyGy!>Z7W0l;LcPF&C2KV6Z#a)U+kfyi>cTe#EkKX&g zc{6X#oRc{@XZFrnd+%?p@7pWkA64bBFi0_;J$r_wAP>-Z_Uw7<(~*w$>ggLV{gAq+ zkLNBLa#GK##>w}dE?!uDQ2FreSxpQk(&XjSHM*m`p3Adm#JGQt=OYXV$!E_ddKCa4 zG(C+D?@<#ebkbANFORc$(=(^7-NAhMN%iTll0tPdEjJyll%wN)j@~kwNSO&5^pg(M z-##ZDS1bQJVf|)YYP#x7QTWF^{sr1Qbb|H4n^PmeQZp{+dH?--Of&AugcvfwN$2B} zd9M9%x#(FIL}SGEKV0(FI$8EZp;|}uV%O=+Gj2imyYVuOsUSczBO|txuEH}^RyzYz$Kn$@TxQoZ%o%iE_2HqyK=aegd>1N8q8oO(@fD;h=dYc*CVF6f z{5ADGQ0HARduG{M$A}iX*Yq23Ie-Z|^*TzOHsp%Mn8Td0PFfEBSyA-1%fPjeqC<0v zsKjW?QLDP7xyv}UR_!&^>HH!R!OZm6#5iJTMVL9NhlE}qWh$_jt6SKDpHrs_wZ$#| zVkwdonV5~N(x0ns2~U>NVW^FP#h(DQY4u%rs_l-#d&ppaz#muplIu)3o2al$UP)p8uyPGclIAQ9^LSNbeJY@ zU#Q8=gq#Lg>U)Y_T6VtJhY6V7=uo2?#; z^;OngEIs6v!8G?~L>8_)?1sPt9oP35&5?7YEtI*8c@Q=h8g}kJ;*+iHPAFyYa_c5l zH{DSI`pmCbo=4psS~MS*v3nDWutOMDLf$~A3c@M?IWc93-3$U-Z& z`8+4jrNHOm2BC+wz7U%AVY?(ODA#bBlMtXl{oO)P#5iS70?pYN3q9Wy)m4G1VwRNq z`AL=@gmr&7zuD|Gd`4?cEpl*pm+t&CjGr#x@jCkf|8dyt`U?P`>6Uh6f*O6z*TA5GtGGm+Yb-LBU>yutSaQQu zj^7rWoPFvl4j#Cp4%1%mLh}-;Y!yWs$3M*JX#s!h)|+7J$#{nwZF{jAp|t z+T{)DlQ|EP(;`{&_uz)d->g6B*Nh4XG0pcg zL-6Dv#B2tR=omj2`U6+XjI_43X(ba<9jm*OSOYLsIP9MMKQ>O7$CD*gKwQJcE_kDieYWFJ`;}@=jlS+ zcWq2O98UbWxGXj?S8SjHbso+}R4Ip5RTQQbMWAgfR^ga$bbI*Ed{swIYP@oE62wGN0z9rX}#xjMUf8jCPNG&w(0n=B0?OM=}Y1--KA*#xN2&p^@kYq z8!~d<`+&3BM%fo}ctmBHD>?gz-s?oQ1%SVdVt!iuF)cdke>1LjEe{WjN`B76Lo4L5 z#becAi&nj>$=_@Z!@}Rq9e#fBHVI<=a(?ea`_1uJv519|d(6=s;xs` z*pO1gwnUf(6G(*3swm12Saffnae~G07 zSUI@A8vEu-9puDQyWZ@)!Bfm%fyQPJ%##^R-0XE@=++U|4Q?lE`wco!w zD^+hUPR4MGj?+nxF1qBefv|qLqf=+PJQ~g8I}{g(P0nsdf!Woy3^mcH6^2s;lAVtJ zsQ;lUFR@|Y7(I)*fjRicNV}62S}>Cfd!cj%$o8yDg>ig+$F>x>L0s*K?6G)b4D01> zOWvH~;xOnOtvM*V-V#(_Sy6u9%=pSu;H^-^(cILx=)zZn)z&T#+gcJ_j)ghWxXb0E z8)2#utaU}<{trh7NdL!P|IIte2j<61_#-MgGT_qn*Q}LmKv@=u2a$e;U>g|Dr>Op+ zZK_eGFnaio&x=&9$`Q3aJLS%w=eJF;V+cs5A@!Z+e+OIDap%wV z*v49sumikT#rj~R?dv@DdLs2pRhBqZYr@reHy7m0OUc3-jpcV*kDLYxPv;XaEm%btUB1r{2gPJ5kp=hv2l5ZujBaZtL86Drob>& z#m&Ru^3)fDCT4j*sjBA^W|(Wa;-)pH&7Dv0H*||;!fh=XGvW_^>4uNrARydV4DW=K zU97;)W3-`vDn6=;(}^7Au$?Q__5D%Gd(gF2X}GzLV6Tx$gNQo@=x4261758q7=$&z z=#50bzW*YF3VK5P3Yt7Y_SO{hYpL__@cOOn$2~0Nf6Q9Ex1SZW z_b@Mv)qA%()ez#W4*R57M*XvQFBxgT^6K`x;f0w^&rm&h&XdNcDTm$!BV5-ce_{46dvb z6WcNEFAV2-bn#+T6Bsj!2pdp~71~%pu^%6(ejw1_<(Fj%uH1hUgx`InugCD3*3LT1JIdO4;>hu zG&mnE@RjGYHfjL2%eUl=+&1gAYJ3#)a%!jmq60TPKGV!;+n+v+HuGx>J zL5V$&nj9Sat7F&Kg>PR2no8xNgAAJAP>3`!xjgZrjQi^{0=NDUQK#K{q9U+>LG2qtl17T+3kojoUz_n3 zuL}(+cCD%U*@_a=*S?M%AX;1>*aXh_rFNwYtcvr@N_uO0PtH6X3>ot(V)avEJ}3QF zl=cuNmS~Am%JP)tQTUR>e{wL#TFhbWM9G++kXU~e;ir2zTPvM-nyg&ADU=5B>pV0I zuj;JE#xECp2=yl(>$>HfZVs`>kFO7F(|LQ`iQ8vITw;Id<0tk5qLMdv7tV`$?x z*v#OJJ%>v&0-G}}?$=Ua-HHsz|7XZ^B6t(N_+0ieycxahCOBG#HLw1mm2kiPFOnIL`K#yY6BGh?(hMlJFxA5sW zIyuH-DOFk?C1#@$Jip8KokK^+gi5ADcl-pKH1@Zk0;2CNb(S_{_6$GIWfKBs_v%Op@*+i? zk+5or0*F{halHI0OK1{Yis8fv%6_g^$nSXFm4|B~2MUpIUwt!&!enF_Wr%fD4Ry#E z7Knv5-l|Psixp}OlY8$l-G2WH2o*ig2uu%3+RS&^pnH>MI5lH+b|zZvNU-?B%Qxc3 zd!>fmL|{raUks~=@Wa~IY${OdAfBO$8n(6oGjjTB=?2<`wcVRQNZy$m6B#P0w`H+j zqIx_!!mJcLm~Vi_*u)l$9~$F0-i>~e`eG?C;BBdD0p=p3FTEsMzC_7s(11ZOI!%wVDqyA$ zA{05vEy~kYJT(4#b0`T4(Dqo%@%Ug4yln;mR!LG+bv4mKA3V|gxT~!Ibd*lPiGRwj zB1aymP1l!i-d7ZZU7kt6YRV|hsOP2T7~i-IjN+d(%i9}teEaZ`xm2oqu*z7+O}2(x z;=AR0hBRSxa_>hoS3lab*D*an-^Ti-7hvC0^rof2Q#34wf*-+LRIDpPo+w@M+DP(o zmpPFDI=q*3CHhL$jg6B3U9s`NJQCLv%2{$>xSE14`X4TU4?BRhp(=8T#`php*rNu ztVz4=D9n4ig^DW!Gz(G1xn=%|woac*hz#MBnd)>D;^rwcv9a3k&CO|6zSnpLGvH+d z-)ZzyQcG`HIt4T4*ZQYMA^BV{>V-Xkkv7RjeVPI|Yf(y5;!B_Wr_@K*2^-UUMzJ#s_-y**{9F#MP9@$%&Dn(2uet(>H>&0 zRs>Z)$VjMC=N9l|0~g+nWY{>}h6pf#hV!yaXnK}g=#u?Z2VY$M`855NaN3FpT5@>A z$iNVGK-whap@d2?D_;w^jMqv0o>jwPW&hP=HydDbg?6)bBNQqVzbx|J+~65#{@mp? zKH*WX1(teOBl@_)mgXNUeBvF>f#uEks@6b76E|+zkk+@atZ-AvBY>tgETYg+r4P{e za%^&Bym8cJBKZUbtE5@Vaj9A9lrfptux0EDy+eZ#8bcYj$`T9OuDS>gIMG zavfRG1f2dxI7MJ$TT*zdPttm0il0VZyZY0?6`tLb{Yu029QQLr<9PFnpm3C@3`sgK z3nS(i(_zOyKM<$D%;P0}SLZcxn!1B8#r3U_#3fq{(hM!pm6XB=3=HE?v1*Q(M$MgB z`ep02LwBc?VlquR7tu+rVg^mbkcn3!1L-F{ZF*d%O$Hy#k*mBjc&1fTmD-**JdB-F zyL>Ut0lr%yklV8}Zt52Tn6?tJ_s)Uc}xV9A7@z z3ZLJPdyib1F6^{fL2t@7kBGA0L>`^(MQ`k1q+C&tDBsr|QP0SLUbQF-w~J1U@35a} z&law1iyqKz`wnom=@R+LjPofDpx0*i6*KB;_FT1#*zEV1* z`d9K<>)%m_HK2XxkBn03@0LCUFXqaubp0xB4gGuf>3;A=F4Qh2tSYZGC4E43KmElR zHg)LB2J8-PevgmLCDynnSAq8i$pKH+qomZ3Q(vewJ-mer(+ab#s&WZhWVNxix36hv zxW{q6rq-Nnn$yIRG&uIE&4z0HD}|-)k!BQmGM4)QTrUhaZ0+G&&#%;_(CHIDN`Js z5XoxWr6gR;r*bAO3do)RZUDnSl&rVPiw* z&xHjMR#tsw<tftq8Lald3P#anm(hUfj=Z9@-K;

+KVsGO*4Bufl~!7$i&n|! z;{$(OR$G!+)6rtVhk{|)cQ^|SRF-qz*VVzxW)+o3V` zZfd6Ip^2oB$ksEvbUI7dq(8x;1l92TZOW;LdFx~G9M6O2B&;~1kKb}g9QT&{`tqaB z<2k6u7nM~ixy0*w4wo=6F>T6#sk9qPQ&TFqgp-k((yS?*130T0-Qscc%uiGB$KOhTS*Ej#GeF+r(OVuNE&$LjVQ4%3mrZA+)`_1%$jOH2*|*p<)V@*ab-V($ z6B2_i{nsr-IirUebvg0VYark+%74%A7HJ4WboU(bz2$K7#jDIH+SE_ z;kx;@`V}p^Q*HMT3U>wN2^){(!E>&C@9xS|>UJ@kpk0w+*4=l!#nInlMeMB;oz^TR zQmQN*FSIchLWaNWGq_xr2yVYJl5(xpDf(}TD~cJ3)$E#AR8*=PPAkiszMNIsZkb2F z{Rd(6gX~2Lt|J9un2uoFPho8FZqVv;BEQdbSm}9(g#~(t6lDO0*$+nQ#Ct6iFG2-! zbJNE7Gj&JpcpWd;dMAsC%%E)4BG}3o?V6G;IsZeH7&2q#*2;;@*2H3V3u6EI<*tUp znA9njDyt}`PIUXmZ}x*IQEgP8nS(5+tBEpv9bk9Q5{~b78+zT;kEK{4s>TDqTSE>Z zZ=QJS(9pp znq;%IgTtS04&^-9n z`ti1+t1LRE4?(*)OwG`XtbF7s=-!y_?dINE%Zq z^}Qv*=ir%O3`boAzW7QSughQ0`-*7rZtpO2723Fe6pq2SA`z@(jw7;Djc@R)i+8K; zEmL^^brI@D#DC*J$=X@7OGHG(JnqoP_v5=@oq$*I3keqg9K3m4>W=()YwE83JMwbh z?ho7#y|t+AI>>Ku!k?UzCr%@^DM51r7)lGnBX&CB!$gUfhFHZEJ+)oc`Tc2>lr>>Q~xq!$lI0ET}_8&B8o<++rQVnYv&VSEzAaP(|Lmc>e=0AJ*_~)BP@E^L9qf>kCcKU%w z32ac()i?jq@BYdygN#HSfFOYc;{{g0tb&0C{y-6Ws=oQ!fpMtuM-)m4t<+D2F56MW zmbWXmb`qVt=?Q^9rro;7dNa0vK983o4>mAxatkY@5e+hP@ar26q;i5Wes`QafV8bC z*T;~cf(__d__OpGtMCn1WTVd5ISxGI-yTMkMiWmLmKt2I(t;_3NA#2gP21Um!^Va= z)pn3uP)|84UJ=mav(aN>MLFfPI!2uM4{jQWL`ON z+Ti9QgIvgo(r@;4a#M2H?`g*NoY0nB4K~iXkEs~}`6kb{f}J3KC$y>*w?Qu3S)M|> zPn0BZU0`0VE|uJ;P$#xXPVG3gLsYUUm(I81G;NO&Q@MWy6kU zTd=QN-aaC1soN^pCBoBoqHH)97})9P>wyLPQNLxJHCTxR6lgFM=rscr8C7EJC3|6r!8BS)ryt^N5_{?^Y zd1DQiE_lmA|CP*4vYo|u2My+$ZOfqTD;NJxEKYq|8Wb^Mr&E!iXXxgd+6fe^AqjE< zHWfft9&ryj-uSY8^l3rb7Et2wt@5D?l35=lYrL5wL~zd{p<2jBdJI&4D8_ zYJ9z(IhgQev+xZ}xa)mD4Q|a=Z$(tH326FzUONE<>s}tiZDY!bod$nHfz>9bsW3vG z3e})DAx+($|KBX_n(t}3nujLluIbVAvUoy$Qo9sAyWvIM*uXWpy?9h47Yc~w+HJ;9 zLKVL1eMslcQTdi^dVSkSNzod$PzHs7&^0!5R?1nCRdsytZF-;C*UXSY8MYz@*zT^3 z(_x9Y<*Q>ghE`8watfecs@?WNZg0@6%I^f?;J~4>eOADL`vcMOa}#qxz65hK8Gt(( zZ%5&rkw=a{LLg0h`$d5!j*WW)W)quZ4NuPsZ^HLRsrm`y-k-E#QxT-+|13MXPY{sI ziM`x|r5Z^DnkiDQ$r2R^g1Iyj!1;R5UY?l<%?$z}tNnW@vyM(p{X^Y>Rr7Asq?|EY zpS@<%ACBzGXbo$wREn7vz!|cQLi08*=Met>o64V}L8NIg6>|7@BSJ}z)RnGhDGR^;HWGUXTZJp_*?Kw6%q z)U3H$=i+T$WwhS;@AbYNsFmrNK>ktYx?ASOOX@lB2g`wwy#umBkrnJ^C59J+{pz!# z%!w6X(F26*j7KevtS$R%;Oy_-o+T!da2TM#YEl#4yEOX3kR8P~+&@$6Wl*G>JiA>^ zN7c93SRv~LMv2OQ*Q-=`G4Ap`YDJZOe9H0&{h-K$bT`o>2i}9MxvT$ZbD+~L+vWG= z)QH2Q^-`LZN3M)nBQ;qdYf}2HgyP7ZyrK<$PdOt~Mb@t{%O2DH8aIUxK*m&k!9Xr9 zw4cMgcwL7$_4UhKv&pl&642eJ-C<69KDw7{$8k3=nuPvx9z~`zl?`S9<9WIdc1bDe zduU#OacH$8hXZElACmUKMW_1m_Z!yCp9HRVtjo@ES(c6`p|KcEYuPw1%R(rV16fX$&!0MY{zm8fdsX-IW}hocLqq)f#uzR> zJ{1s%YCf%_ULcxVfTcF62KW3tBOGkgH(W}I(qa8N+8Q?N@LsJ8M>NHt!gi8dFq)1| zC_Ay644PtyOKbRiq8Z-dN8t``NYy7?T?0m?c;McC0yPT*Ru2gxi>)Z*oCpDfmK(=- zqgyW9$x_eCW9QtR3)Km3msQwmb5xt5hH#NREo-F?gJ;rNv9t!DtSvU3Y; z^EfVTz31eFTY6ik$F1QmEcgtM+S4@UB;@@1A90@7(i_@1D}e-B=TVXw1#^Y&Q#o0x_v~thf z-aWZLm_9j0TlbTZrMo-02FCpg_0`_~VQxut8b;hrp;bK&zK)!MqWHs4dZ8A}4XT+T zx9E3b1~koe9hKg{N8Ud&?Ul+9Y$isEP<4!xS7t6#fQ7K7o2*tg*DVHvjjZ!Jc-ctum zw6wji!<4J4n~deFG8!9I6%{j>SiTfjHD=cT(U9szJjLq%<^0siL2_Y_(Qh+F9B$Jz zQ#3x;_d5j)sDu;$QNyzrXS#Wdtd>?OVHli!v%G=I)HP2M;q=}})-k1sNb6VoCM zhj9bU8ij@zA<64|X_0a2FHo^l9gpj|`(={KfXV-t?zOLzMXDBQH>EfL6OALw&G?8c zKg=!4t{)^Rn(ID~Tk8)B+Fn~v52|qzn&t3zKEwx(Q}PdtQKw#BQXU^cz?ved|AUXe zEggT~-;v&89zz|S7@O3cmGw2}7#H}Ny6=_e)&HH0_^`!&{0$1bhXI9@g4#%NmsRXh zv>erj+hZq<=zoKgrRFOQ6UTXMeCg5W6Mow>fA4cOw>0;8>k>l=Q;BVqv-X|Q*6EHv zmzEJ|vEvmZeewTw`VOu!P3r>%Od{_5tS;Zm3Pwo=KP1x;csAz^5 z@?jeNChbZ4GP2FGIvnIleBwx0H8ma75lsF;RurtPO$yMV?s+J&N7uWTFN28*A3rbo zA*JxV;3sctV{|nCi!6(Y~JFJmsvcc~07%L={z4 zJc5Fu38C1;QI$f8%i}ErFUM!bSeTgF!}vH|XvDCy1wjfIKRuX4e+X(xeNOu4rqkEs zI>-AOp-JJH(d_|W)%{Fr6|6kb@RY_M4Cw05*LHS}4-B+=8u}E**=-rw?FyQxOic@m zd{B^kT*=GOxkzmvvkSHgSlX?ts}pKv%>#b)WWFYaDU=fWA&FrA*ZjjL_h1(4CR1*5 z#EcDHCqjSv&%{Js)2{N5#`>H3@9^^bkJpw%MvoM-q|OcBiaf4gPMTeKp8`C+1kXF5Q3 z92L2{u9R0*vdQ0U#)O4{pmDD0Zbe=Dpgj*eH!j&hpbclT*{%hKIfHdh zxbF{epyFBj6QU2{rX6@U?{brPu_kWX-W{Z5t8j>xhg{{63F%!4@3D%Fm_b?-^$gO7 zwm}b6j}(uxXvhBd{tqz*_dh*Kgiep~EnR2I1f+16>tt}3CGx}UyV5p%Ctp)}UY|Bm zWv!#mj$QA0p@8;)BYQ>s9AU4vr3OhE5!Rl)0wJ_oK=P=uwXq?h@h0~2eIdASMxlxBrVT+_?iZvvW8Q|IMY}x}<95b21P6YTOsF-FDQYnxfHo`uRo0k-v5?lQ@hY?! zVYXX=!-%5{?~ zbP|Entc5EyBaKJNgb2Y>-T|efCSmdv=t(cB&}<{aiq)xT3OP8^tKiv0WUEAmnq@aM z29&ImG>DT~u(uoP*>UOeZ7ps8zU;MVh# z2>kK-pDwJgTLFh_Gh)4G5$a%b%`=cLLzl!U2+{lsY}9!Lb8J(kN$kxwpYyvmpt-43#B^Z$0seS3o9~UEJiirS z9$0ATOYl@wwNiteVUClg#~0Oz|0iPuTe}rG%8>x|^YDbO^1xe&y4Nb6vdoEXl@w*L z=D0Ikeh_^A`s_&`l^7=jj(O1Kr^n!p+yvTib-Al!8^{$R);J&cnvlAKfmD=2eKD`igqf?OOL_Pkc0tw|Kl`(=9&-GH zyLcnERW`_w{fosn!FEJcgO-TNe4U%pEX>D(TqqpUNK^~i#L5IBZ>UtyC$=S!yF&_~ z9LD`h((NmT8KmZH^z5I}o1Zd*52^ZtYVZePxbViv0azXR=UPt6HRZ<7R`et_d`r*V zv8Xm1zMp~MMZpGDTJ*pTuQu`v*g$`V2_K9GAuIl{IK{lXVi7t#9;I4 zlQ;4sD;P+zXkfd$zB6cly4d|{g{yt^s$N=n(LEF>TQ31l#5V+H5>c*G>LPw|5R7-A=_7gNN`| zZrGVmI;zZFIiEd61QHq7yYSK7ZLf(D$O*)GTemktk)yV5_$9Llbz*ipqjT#;R%|TJ zGCvtuXY9N&iBOVfV$0Wp|M6as>db7C>tQuxlnTi!r27j>=B;znB3%_bYAA7rn>XpS zvC%F6a4wD_QKhG0xFdo`){iYwv$Z_*7UVn}B;Bw`j()MzMn#5D7-rk)hZ|&3`a-1= zPQutu-6mc?q^=CM2*horEv;G!v`GE#MIz2HkwYxmb(v%aUr4qEi5qT`e1siRzn%hX z-s~(k3h8V2!0(OFeyv15o-cd_9c7MCwc~k-wkP&_H6Ra%K7g_%CS>B4J8jH*;Us;L zZg8BuHX1<6PdSb^$Q`)hx*+Il+09Bg(}w330cuZAPR;CCGGER@Z)+75|vnmW5% z_NL>ig1TBa9Z_Ief|7d=z2YA31o!F!6`m5@OWf{X4!Vbk#4X9V_ZXWAM|3 zjSPAx-XP-yHFko&?Rd>t`_+2UrB4hCNg|Z9> z?!Jm6Verr{Vb5r6%)X!Bb>SV2XW3$+c?kTxa?wBF*x5-SD}cBn%pUG(4XdoEs^O88 z{c4H9U4x!Db@k(q@`HRHcuTL9ES)6F0LTBjW2D{p332^5J51$(h?~8*N#qrZ)%7C2 zcRR`KC~DSm`*z&K-nI&Op#R*Z{4;o#-HDDP?Zn?T!2g_WL)TJRQq&95^{~k&*}Ol> z_>#8$WPQlto>h3V_UGCV7s#HtfB4n{3}8IlNZ8S|@GsbcuGI>I3oXu+fX3jd3Kur& zaQ|QDJ0Dwgi(h%&I)ky>#cz_VI$L=o_gk0QPTJZ|(><82(zS(v{M{$fDnW;;h~@m* zYnAuWWsEx~(Hv(w*^rGBaOOt!n}bt(#jY})UAfK&_E2BN=L^Sb91fCH9PpcrJ0JkdHI2@t$j^L$Jq8jy7kI*gWL3^05l7schp!n8gT z7@F0lt-e~cBN%az%FJ!ou|LI#%w)v$cuAGkQSx%8+Dv|O;$es+donlkz|)rc4C0sT z@UgEoWu;Au+`!S&m3ymqJdl4sD`|(c=qB@l{wc^Y&scq*%%i;U^WS$90*V$Ip>iXG zEk@kR@U!K78+k7f`(Mv5|DkT<}T6v9!2i3i6KFnx=2H!9=^n zDz0dWiObSfoSZ~MdqdOFoYFAFfF&Z-jA>G~< zaT4~3+!T><#lWyG2(t8q4~D{nBMz(12*>L$@x8wNYP~(2_j>=0rgaAj47YbNORN22 zY%9i-mT^Set&ML8eUdB?za(74o{G1eR(>bwQt?WF9{+K7XCN0fQ`OSJw-+3DIqc?E zHGt8I@kb%LB)`d-vWr&+>mFpUUd*Z`=otqt%BcM9KU>byKvdBEsZ@d~&!#*)O3AX@h!fs`g9n0e1nRp#Hc`i{S4H1POJ9LIyLmPx}CvC!jtz zKVXG8QUN!QxBasc{M@cA4~3g=YUA2R4xN>=|0q70M&xBMXO8@_8oG?@L`re1Y*TIL zPg@5&Pnk6rJ{ivhGnPk*W@9_zhg zVEOxEhE@bW_ZLVf#rd1(G9oL+0_w{os0&|~@%C^}Pxo@Lg}0tdVPIyYCUo!uYxmw} z6gCN9`ru1PW!^KFmgaF)29+jhEhypF)HMEFl#JNU1&siCzEY%HxVfEdb=mr+?T!y| z`X2EKDuw=H-jmaRD*I4N$JD~l9#O?zMr@VJFzV?U>MToN&HK5YKQv)o2zgOKV%Ls6 zZ}J1qJB8*CH2D3bUsqSvcGeVq8sA?S_st-y2$#G}hde|q$$8XThV*59m1Qg@NljJ% z`0*OwT>clg$Qb|po!0Q~Wv~@Zt6`^O_2TS9jZuf>wodr5=MkHinbMM8+t@-GQp@0p z#!K=GysT4#8rVR9fF?CD;8PvAxG`fZ1STUuCGt6T{y2RoY!)DkJbHH$h@5PeD9bse z`N5L#HeY zsvsCK5%KWQNO3_$#QuV8nayQN`T|3Q63g%?%jd5O=9eSm#W|-_e=)yP(=}su%ZWX zmfLX*P1J9)^7IWMdDTrZYvEqUCs97F&Bgn;K07P<4eac2hOQh<+{}O;-X~W2fY8mm zI|jd&h)L{&qxPn0Ubj42Mc-8Cues77l?C>(lOB1@)8K%fyMPn_;o3_n#Urem3Xk4t z#PC`dcJPMjy#FIT^x^wke=aOnj5S#iq*TRKRV;liIQvD9+}Wub$Y=IUGi=NMq!e)V zZ87j-j`YCsY=Pf?Z!uOw^!iV2o1m(){Ohs%NKx9U+%VM-Yx7Us@X?C}He7MEZ2lz; zmG`V{qzWK?JcCjhcv{4S(8(J$4nI_|)YFJ^rc6^9)(MAjggPXDcL+~~YrT%Ftp%lR z4SQ`dcP)Eu`J~wmpPeU`eTddI>P)q=>hwno1S&|mI^Vn33WO8PRQ2VdzSA8g{{0d> zZ>r}^BAR_xy|k91o~MjTj)Uj#dB24$Q~uaVY(cd`6f*{lI9{0%8Me=QVbxT&+1SaY zthLCczsTw;DENCud~_hwj;M%n*S0c0-#<|_Z|P_rm(-e!Bva4Q%q(~<%U)zb^edqS zY5GEH=0VTId`cNuc-q-r`tL~m)dn6Ant2I5ad}XZ??Iog<dbVE{4%qxayWDG-PZs6!^nS{{aoOtv4A#XWnWFoGM zKj8dg9tj&gNlYD7Qua3<^>}X{B8fM@OkHE-PjC@ZAFe~)+9YG>tXJIEY#ixT-|y2) zPAy#nS)R;N>jOsEA6+txQ(8oERB+Acg@lG;3pXs+ZwBZ208y|glxWsBYNlX)a{x>g zGtme#(J(jOt?dSVU7?qF+dJQ9uxNde(vEHdfQleo5WpLeq9mIIp2w=gC<_fAJw|=oIguyM$a3AYj47)AY}oHLDCQ z52GM8m~7oIj>(3}oQQr~oDw_kUMhVVhw;UikI%e%9kqs7Rl`Qq6a9fh6Ccq8jOC{d z&^V1MdQG^E6H5@*q>13~!Maq;mHJXy&VK%MJgr027v6yI^DcbnHocb;c@No2=#7!J zrXBZvR;^4%8+{`55w}n0`EcjqN~wA&Zw&~XsoduitkQP%DLd?5!cf{+?t3AeXT>IT ziH@pjxY{!x`DJfE-)4L8bcye4+=GyAI%4?X#PMvKpTn>@B%}!a=htYq*ZgZ{mP0KG za>8DE*fzz__6cCjOkz3&up>z|_SUPQ*8u=oH$!u)=ThV#saHEP1B7%zIhf7 z9*^U%ge8uJWRq*_8?sWtPQO}I9kpM&y}SwX^!~h+)$@A+Zx0tFG%speVJGXQ zPZnImJ@-j8L32UX;v4qyu|gtIUrw$~P-!%FL*~D;J{9lFzClX9#MMu&wT zGJXs@xX`60p^idG1)yuNNb#To8a)idM&;0ssDkN`eSbFA0w`d65ohx>F2C{c(BuAz zAWGBWoQqrwG+o({QeKmC?ZQi&(xP%x_9Wjb1*q$k;4ISDNZ?B4=>TL? zM3K+@sQaI#Wrm9sq!#Y}(=S3nIKRr6rz%Ok5-DYRmS;~vy-gk`vw|aqAVwI(l4K4s zsQ@T=fJnQ7TV6WMI7-57kE_-d{IkTogc@;pXmzE;psHcd&>UX%uC=UpL`|z_9GR52 zFg<-AV@geJjg*DaD;a*n#QqkSn_Vx+J>JmJXi>%2#G6ZvQ9cf5WFNDuZAVzdM4r#) z<+#TGhqF=J*?>TQ8U-{!`(t42&jT9$1aWRP427Yr7}Ov~+n}M>!G|l6_)q>o*2GSm zaNqN*Up6qsO^2U3pyPhUDAkKR+zayLJOJ@NXX|e-k_w>;y8$yqc=e0z^#6!vx(bh7 z6g6E@3;G748K5Ez@RqKK@lCoYjqh{pO zrk5j;swg(gT`?XRv0<)$s_1l9JcP1F>~_BFe5xL|@=i`kp406ZYwh7R zF|!NqztMwqZd-XvaEf@T933yW1^Cjd;9>Oylq2|CMTwes^xOJB#TZ)-a=YAJ@}G+Puk*S0bgl|t>qI3ppQt&I=AE#m&pRU--lSjStj;9cz?S8e7P zm$keiGL*XW9b@}RJuPJu1y%%tmY{g^_rkQSz3c1mM)u7&Aqgo-VJ)TT>NnA&%9nA3 zlnUR9St*~#ZCdu3SXwLEnqVqL)@{m&n%N%!WbLpwmfZl&K5MIA)LhjohZtt}DmmX3 zw*McdzA~zw?-|u#`+N+rU?MHHj!xjv@?f%v%p5(=1=PS)~V_GUp--kDr$erPc zwL2%&f-AK9rBW_?_knkOB}afSk$AKs9Wrt%2umoRj!4O9M<&9<6CKpgi#r$30pkDP zGjEq@?x=)%cR5=o-2ycgtkTg>Y{EKii>=0W!L4?mRSY;JN|4KPbP7Ks%&ah{L5^rD zSqYL7)53cYDG4p{hFv&^dTP=$E(MraGvbrdVj7$1+g5m6%4`+AO+FT{_{%xeB>pss zGBx@d58&&oZ`Q^!S$2Ik_?+8)xT^pXUhvVas|)gE9V$bgyUW#tZB}hi_}Rc#nSy?G z71NwM1ekWki?;&L*9>+}x#BqeGK(LvzB)F{ac*hPk&B`p3`0 z0@i-BdzME#xY?&1^=M%J?dyaVoA2e6+Ssbhfz^9~j6%!V{w?sQFjPjIk`YQ^Xa5~+ z{xu}TnQ+whi0mZ4Sc|JSD(aedX>Oipy!VOj#@r1#E>0yGTjsOY-#Bja*LMx7nvl`$ zL6THSLbjP!DdoFQSu&Q`+@Po4C+t3<0pvyrjt!jtH6v^!O7M8xAcr9KfVd`tklRK> z>U*|j^{Pxo|G&DF(qJKl^9#m$RL@*a8+NI;n1iFM7bu+W^(HN+jE807Efw)#IL@<5i>oaM=Cz8z-)<(nwqN1D`82MrGgvmQCo^?p$tfyCcIUYe zs($(DmH*ER1~lglOL)0_4>@Vjd$e?{zs2+?$jv&`;1wUt9@w&8j zYY%r8c{UA^XxX;+`(7SLi$DAHUIz^C-UsvjP!du1Q@;QTE`6}Qx{c4#1?=|OdJK(u zch@;ATni1Jhw#O(cpj!EmvjnO7_b%@D|-t6^X|&TX<^*W&D7zm#oW5U-%as`TL+YF z@^Hb2a62!FdmysfS?7cp$Y-9A3kO~jGxA^EY*^1V1Rq{rr++@PUM@TlynPlMAD`sp z7wYTZ<*Mg&W%zlj{;Ej{Xcf1&U~5~+Ooy~9uL>30p|J^P#7Y<>L*i#1i%_tg7nj$SOJ3uNh{YVDI~#d~0uI+*hg z2jHx_8G5~qnb^0E7)fVjeN4L3Ik8&=Fg?JZ8U}d}Z7we>onKVgmK*YsSyg>6t;<@N zVCLE50{imY>vw3Tq-d9D#Xd#Pt$SG+@X|JZ%==8s_+$cwv~)9%MtB1x=*PxZ<#&0K z&ei)wgX>C;Ec>8y$F4!@_m9*wiyKl7UxZw*u3LOR27Yp5X?o4%D^;n9n?0oS<@^)C z|Ky&{`>#H_9?R$ivpGI@ zfKXpefQ$i(`-U@D1H#d#vsjwX%en>39G~7+xjxN_ z1W1W1Gcpf=4-Hx)f*k)=UjTUO5V<}VqdEiR=Plq}Z?4t#L^;bU7^#0iFspRaoG|;6 zqOPnjRDkdC30jobHxz8*iJEveT2@wnZXZg2O(W5qvc^bM2iRLP@PrDiwHS-)oW7~= zyJ;aj&M&f+{bK+2vPbw(|0zE2WgDi9M5MA@n%y)AZqzfBbtL>PNgwHcFgT$rzT4!Y zJFE;r!_LM2lS*LOJmY}AEjLu{5%jvPI%Dsv0OZ7YjqE){k{fsAOw9S>V}%f9YFbXB zEaB`XSi+Uf=f0kpk)aJ<8(M}0Gx0jcZJlq4%6K&|CjgonIst~-TuYNgKTmhQRS%*l z7&euFir)lb!Sj2Z64J)z?(g4Zt#LR}Pp`s>anjl`jgJgZ_OFZ*b5f#ITR~LSQUlAt zlsNiH6mu&k)y-dB$^84lNeAp62o#+3;Y3Sz;Ze7P%k#NU^}4~`@Y)B zYUeC%C>ecy4A@=V8x{CZ5rLZnO`cXbc;gl~+BrsF>g5kwEv#V4$Sr*xJWZ73Y)c9C z(3X1j7zaFekD!VST&(e&&Lki|cq^Z5_3v)6q4iJlb$5IL%&{%SbmHfwV~_b|cbE7U zA5pXh#_~yE*SQ>!+9H|m0(^}3(Iut*Kk*a~TH#Ah8{|zw?of@%FlD~BqerDsSLZ*d znZ5sBVIB?E=abEv6Zc$3{3~ONK)vTQ#6XWJhu)e95437l&Pb+O|Jl1F6-EJ5(3K{> zJsU|r2-(@n=~+2t8NZQZ=WL|jbLwnKUyS5;t6aQ_a3HD;h|*;bFO>c@;+#SCU^iwI05-=7>w z-XHjRXf?K1(2SrsMLpa1&J~Nu4ghxmg+^M6vrrR=(&Z++yvktGW;(U48xED{2 zw4aV?uM#vT5e04=*_5}V%O0b9m!vJP=wX1Oh9)V45&}OEUso4YRfWasqLWV!X7lF< zCghXyC}$)WKbnwp2>Bo}>IIK8k%*Prjt*UXLp?Ka&}x-P!nF=7%cowXaSsk1_-R%? zc0;7e-h^gur3~X(?i5^@!6xdvZYIhv&Xbj&D9xsBEib?O-c*^jvnXwH+}e}U38x$` z@-7~hNe@95!(hDJHT`F6;#^hz3r#mVbVzQ;ch=YCx}dL>k{cehVZ6J1Uh85GT9*bq z-y zU$XebBqf@@0fR%KN2linUA6Ie3ciEm5Gs!0B0C~Wte_kNlt{!u9f2UYsvJ=Lhq>XCH? zH9tk>TBOAzK#YJ0Q$ofar!OgJmpT}WH0QJJD}p)%F*sO4X^y-21@imx~|BO4jmE@B&Lke4|&;HVUqqyFrg>A|(%G{^Gyxy2WM;Uo<;j9(dJo zc$7BV2f49CXmXW+i3_k^dabqZcCi@xQDXhKa_5}=$Z_U)1K>7+u*W4_^x*2&AWh|u5q8n2aeIfAQp)yy+9O3YmWb8DULovw_L@#~X8 zDD%g~!e0}Qi_Wy^(W-ZE05^|gy2y)*3pezgEI3{CiVOmbvP3*Q=2J$O>$(KJn~~_@=2Pa>smaO$} zlB`xu43mEc=~UjGZ5Gtf5YWb{Su8g9ce!ddzRHEaozDIShigXS;^jh?^!xjoA#Cs- z;C26aQ@$MVyF7_)0SIz<;@N4W$6t3Tv;cl-F!g|}CI5c0Jg%o{9ufN`f|jcT^mEg0 zS@8^~e31I&OL;_iOg=l38s1^C!k}__8C6tPm7o>icx7`Oj&@Dk4oVnT!s`IJmJXx# zZSZGKZfJ<+*f{}je?a=;3U{UK^n$EU2#q`1KhWYSMnc=t_0?pJYHqv;JYlsg4#<`v zrkHx`)u{1AveLc0X2yQvLG{4rTkxC+)4QRabiZ@SOl9S!fn@-Oo zB1+jhgInW5GMNXhCQlRMcNFA~!2$O#ux`&Wh!!h{eo=!4sL>d~EwP# z!Nd@`n9q+((=iHm%Df5?}ACemQ?a;zf)Q(4yzYD*_al5+WAH6&ilp*hm|h5PB6YT;I5< zCgdrYsqv}XKXauXVBrvm8t;59FUd=s5sLg|LPTa)!m>{Zr`k0nI%mye;j0GHwe`*m zLG~hBe-*EN{yl%qgzohC3GsETyZ0GhB%iG@Ij{^iTyacbT>P1sABVm^FUt&j19*Y7 z80)sY%(Y!^@yGC}+qvm6VF|)`3c1^vvBTHn+~8Yznn~@rdP^3UmlHR;lS;mTZLZYY z{k3T}ica_B_SGnCntRvF>^p?1KRqk+C za%ao{{GbwBs=>VdI(sJd5M_KDy}c8DcHc{euqk|HrOddTeE>_Y;1J~4BKSSL)AJ!M zu~31mj5b+C7Fv$AHWtCY9OGgMYQfKxp{MOPe_3cwFV>5%{y>0N^dR=D)7ClZ8JW-6 zzMaY8xuTwB2`?Chm>K#iWGHPCy-XPs}NV@2Ubtq$~PQcg~atZ5hIcRQU=+r!v8 zlTiVLJe+-65hTEDZ3^OpU=sjR&)XP!0Y5?vj;!>V#f1u}6x zCEuBt?thk;K-eMSPbbQBzKY@Hch|={%_77nJOtSjOzzGi&*WCaDqrWjNs9O2KzyQ1 zlY^we-7CVZ<1ta-i%CmxRilC41oKRbxv0s&n=Gs%tL(PGrZVOtlDTLuD$`R!iWMhb zWFU~=70QRlJ??}wRlvTKhvxr_h4%*7>a3slwU(_Cg^L{%#9()5X>PkSXA2p-B3)ll z7R}ZRXFW46=G8QF?;79Kr{OimgxTyS|I7qhd(h zGdli*uWE(f}{|g&Y0x@#sjkw&c1|3!1&h6T9)Wgadkk2w%C>Pi}0}+RUh^E@jLk zMQwax~F0*{M*Ca#>w`%*112NO75CQd=&Hvl-9Wdm+a^?18DTu(Lqa zEa&x%rJwj~Y+B?>Qg27aso8_Fz&-p6`A1Vuw6$o*Elg}#Un#z>>RbF}iSQ=(XeCSd zUYB{$Sj=sol3|{1X6*d6Tpc+_RqU*1G|WCMoA5`7Ea6&5c}$8b8~6*V75^jFo_$28 z54wYfjvhC7;Hi?Q>k^SKV{La_UZ~+_eFRTBB4v2c>^0J8O38#m)XCjN{J59D15=jZ zgvi9Kxi7*htVuKUqQ0J%p*v_V1D6=+xJ7~+)!0dWM%txyB#@X++%KJgvF{Oms#m}2 zBPh(QNDadm(ekE7hbP}&VaN!cFYzv~tf)K(nzMp#Gbs{H3ND>4agj*O^hw{J_+fB%9PAui56<*KDv=R# zj-W!X&`PK?CK7za=n*AXLEKh@fgWgu&wot)&q$4PD}tkqXi#sqG2hWQb#~j%rv0&$ ziJ{odD6*`F#^pm6K2c?lnAG?zdwTh!jtderT|Ya&xFwu00mt5sX-3%);BU~56V8mRNBDq7saQcT4`$jwU`|IoU? z)K1JqfhVwube9J>9gi0T4khh!1|VPa?3k9smFeQIV)v+L@9xA7;=;I1dt)^!XkH4jsj z+gP0w>@_8ClJ31EL&#=MW7bCMK2)%|BlHckBftHvbZsv-(}?nANy3QaTa!Av#BHDn zN%zs)T-dPO9d`Cd4AR^+7RwEKuIN8=^eJx!&_FQ>W(PylH5=aRu0nHTk2wg?cihwJ zS07|(5OsA|*E&5k7uvNKY_;VyUwv2f&m37*;uEEm`_Mhk)|GGe)r34W78teH3si26 zHd6cQ!ivy~eB-;GTDiP_R6^a#pxn&+5S2TXRQr&VH@8+4ptGN??FJRcP=URUx}oB7 zmIVQ!72984wKbrmVIo9zv`N4B)U*#gFcOHKo|(6I=uyT|Sh}$VJpU&Vks4@q_tF!L zFA+DD6nO^Djjro>I${m<#dwG!uSdQHPR~F9nwqpE>q5~Aa`iwTuaa>NSrCbqp3bAF z&{*E;dD=jo+IbpodPXj6fZTwF6or-osd7!rS$*$5b?s+h)P8fy`J1IpGsjUESZDA+ z{UmUk`DZRV;^{I2IYAI*7R;a@Igz}%Kn5F*I=i$n$f`<gt|$SYFdFsl@%+@4 z52l?t^BPOjBEpP|uDQ9X5`;Q%=|ojM8_UtUnW<)r*K9(Iiei3PVpy)C-i*<}W@W=A zI*t*Bafc)H1Z@dzYm`1!PGn${lICX5c<>*c=5$ zuKn<#233)wZF7xF((sNe)S?ThAg7u|5~TT=;?jU7o6j?NE-eNT>2CMw=Ug_Q|A#a! z^6Cz&6CuhBt+j~@Dn`3?eVWasunsT$xKhEBpX|75oNun)kDrLrOCfD7w$^9!S424azMI5dJUoOXq^Eu>SoA_A`xF_f zj=r}yqP5vJcteyn-Jaj$)9r(#4^P(NOF5!|DEbNoOp z2WZ<2HAm~?n$zAzpCM#26KHpO>g41`D^Qc-1`*V6Ab{>g zMxRYmcnNR3lTc%0UN^x{pT3!hWH;aVhCt&kCgGP@|&1jgj;$Fm}~c}an$wB_J(9`INNZFf}Ny|U(C^S#&=VT zy`|$&smSY-iwC`-S(yY`>LRtO22|^vU)v~HZAP81)T32}hGE0ovi73UJ6n^r{Y3_O z3Ujnr1`~gE_k8uV_2u*;Cg#A|&@ZX|WOhbQYSg0q@-g20?Kfj>2K_!~xfzGMJnArT zgdDQ2m?s5Xl4q+07xHZ=nu#p6f~=*)HE>YgC*bS1hmDcH&5xUsXREgQ=)9H@N2wf@E zXEBs_+Jw$KE8M;msu3<8gOj6C)BVJm$5+nmv)kn`D}=^{!hWh5;ZM{Yv%a7tM(z01 zTZgP$Vy_P~BR*6bN7ch0sW^g;8kw8+P}Z-|I=STK9sVX|VG%D(Wou;@XL-f}%+?wb4^ zbWuOux6}|Exp8^r1o~JyJ-vt#Iy^Ud)r>?bGc!8Ut}kjp1%$vZt-2(^o_h3kSVNA5 zg(asT_eat8QBGcgotwL;Ek^RJ1lHX9ArTd8rlx1$y2($~bug{Wt&WY$DR2m~Lb2h` zul#rSpNv>GYm3`_bQVxqC#Nb_pzF6^a*uQjbWEfdaso1nsNI_V`4!xddae?+mJs)G z(}d*_cBu=BLipMJ6W@dNGT6q;97Gb)^b9cE!pD`9)8HXvQAlzTQ;bu!WmNpU72fDi zpmcX#xvZQFoH;YgBz0U1%XBrN25tSJI;}i&@YA~63L1>dY};(jB1b7u6yu6xjisfrz zdE!7AHCYzPR-ILfKkv~lefa<&bS1aokQR_3H?9y3bDW_r%%2S3t?P0kkmPodG(qe1 z2TxAzE3c1!oC-air(PwzIYol%qU<_Gmn+0YJ}mSJ-b8Xhb>YmOpU`=qd^uyOXjn zKDyY#We}EAO;dlH?FIfV>Z;Y&EbnH64_Po57yPZl-|*vmynVbOAr@nnV7KJ0$;a20 zDT;z5L(*1Gm}Pwj{xDg#ffjm3?C_!cdx{~E2pEmeUbs__l9QUh8_JX+L*=67_X??& zE37ml@H&!Q=&H1@ZRC;@HRHGuO0sistmlBpXh{(UxkiE#kxZ`*4Dmv zgX0eiUG@Rbbts8r>WJ3XxnTB$brf!N!qkEOtCf8G;o+5o`Sh3%#NXCsC zNcF~FFTIdS=pAn!+xGU(2vd3CA5$?AR?%JxL_~!`TbuatAD>6tXbBvcKhBH9jNEv+ zd<&wtvZw5sAjRuu6MgcPVzezOV#;Z0kZFUNg92}GW@Sr2jY)OEA3upET3InsjML`c zc3DvPbs(a|VHZwwZ%8IuzEKbQB?|Nk4zu8FeJr8>Lw&$QOCc`AcMpYanwoXCp5f_W zYp)M3&appx3?AV_({;7f5P>Fk@jdw%3)TSjtd5TH`Fr$dKfiL?yi!H1Nscw;@PsCm zhY3n1*70e5lBo&ZYTyJ@S&^4d#N|(N35k*c0TxbP-mzsT5v)1R25bpq8?2tMPk?|K zROaz1w(f?(SttH|iRxWE8e^+NF;z#_0#huevAG=AIpo`@cV?EkWtYaG5_=8mxR$g8 zhgfds*)P7Hx~H^?v;q;I>d>|IELA(DHf@iH)6pf780C=NR8_UbriL5Xo;Xb3nuswm z)w6N-OmFdxF^)x}p>T4GNP*e~ogqbB2pJO_2B!Wl$qDRUecKezB+P2+OVh$^lWX^H zVwmltW8)%Nd+=pV`eGvF6om!r6`y7_mQwMLh>R?hp8_og2}m)CbV)N#8aFmE|D|sH zsWEMJoVMc5jknPO@^0+0G)pbO2L}I{k$VBY?*(oNQE99gs%tf)!y34j!>IK;`zfwg z>1`^T5c%XJ7E4sWen;VsFW%0m)q{lDkGmuWA~p)=Pam>~Du6g)Am>}+gBqPgUEQxq z`Q$5vmaWB>@@8sOD`~6+#$=QC^K{Nj4sL5559V+Y^XmBr!Oea{vA|yX1Fyu*(bDM-IlFbynMBU zHh(h;G!QmY%N2WRKwWT|@8nb;OE9ELp__N>kV;IV`=d8@^Q?=W#74r>XPEs3c(8f0 zkKyy%eM8G)<$TlY28zlooxJQ@7EXDXKv~q>FO@-&IEQ*|_`gyuvcTvkk24GUA+6x| zgEWJl;%2jR@x3_AngW)=hqykMY}`~`-&3=-c(2FhTK$#7>S9qre){ZeY<(*mNV57u zCLB9#>^B7g#yP8$d+7vi%6f_42F>*&SAC?AJn$en?{RN8xSG|C&Fy8KzO(Y8k_`S> zOhP9gp*-&zgG3$NUj)rjEu#8*N4j-;@qm07aMj~NGO)ClqiBi_0{^Q|G1hBpvP^8v zB|O{+5*%Web>K0Hjt2LRbzqQWiL+H`?v<0AU6OW3{lxfZes@i|aCzy^hPp(iy0Vqo zrWv_*eJj)WLVjX@Csw4NjqX3nOOm&#^We5Qad1$V7=O)_3jiX^vvZ-DLvOi`dJGPs z_}efee1k+RGC!x#c#yXS?^!Jei@3$U7ytlQTudI#%&J6u9#!3hfjenT@%wlHG8j5N ztkoMN>eR?1{<@E&kT*jm%o@g4qcqw+D6V_UVF^@>c$!&QHxLeh(t&=vD+!#_ePV9! z{BZZ^??>R$HH5Q%oSEu-{ZsHz=RN@kuV=!wgwOl_O^G9cu>+aZ&K7p(!X=-#WqnKI zNL_qXO^-Zzl4-}yPySw)4+w1Cqd)uL9}c4tz21*#t+oC5NlE6qTaNS=sTs1SmCrtx zgd`ak;axRMC(|=R9tj?xcQF-(X(WaO%Y!%CxD?0)WUXKSCOW3@(S!D$U7;{lp0MF@ zkmzO?@KJx8K2++-}(Fw-gXM*vW`D4i$lrCC~KzWR}L3Ya}F{1RCY*u9HyDaE2=;QGchqF-E@7F4TouT z_r0PNNE7T&^c3R-AtjQAUc5jP)b)wf2=C#+LD{!{5rpb6IGn@jf?h>t(=L%SY`z7Wc z?p=G-67V`B(O27}l9~M}YI7pO1)0@tO&3R>puZl=?NnqGVf_@NVsskbposq6!FU0v zT~@o2tl9yrroNwqo*=4VjaA>=?B(=IdMBPrYv@rg^zc%hy!Gq_dio^IN~9dq?Q@Vj zj3^Q%nJC8YWcbtx!wL(^EkQ6eyj^Rbx0`Ox$K%}P+?Kea|E2%!WiufGfwG^Wd)OYQ zd2{oChggTE_}$eX!vGjhE6F9}tY&a=K4kEc`fMFyVXHo#haWw;fRrs95V%A3l)6dG z1p>E+pbLskX1B>0sgRFg2wNHOO%kBM+hj6cvb9Ynh%H4h(9tsYl2K0l%Iimk@gnj#XM-q5Mp=9m!s@*DX;qpL`l4yfH%QZVxY071v6F@{?qKHLKni~f^Q8MO zZvsF|@|!Rlz~u!0rYrd8!6@oWd`yk);&P9v?f9giAR_=)&QG`1m+YHH@Zl6fCV3v7 zlo`@^g*#B#psK4)yuVO#k;xoEaoz$gyZe_l+O1=S`qau813w-ubW#*l(|r6G@|66B zt6Kl_+;sGArQRB`5Ms=jv8P4K<=F>J&a9&{1&QM)0J5DJzFt>>4SLGGyO=v4A_9UE zNg*~Ko~gBU8D=ksTt2oVf;>c~a16ZMmxT2Bygao7%V&pT>!0eSBjNdhn`e*7ftL22;i?SxoTIBkK#`_g4h??x`?NOoBYDC|*d< z@NEuv(BlU_%fb;7((w5_ZkapwLBxipx#zd0mGz-R3zDy=?|YVi4DOs}hU4UZgR0IEpz6DbQP(*%?p3YN4KYRa8&H+_V_hMVQPH z3=0Z+doYzp%fuu{Eks@5(+V@HnEJ#zGcrjYg_Yx(m650<_+x+nLxFt}pY95Js*0%I zcg~fSVoyoD#3R$ejImI0+Cj{dv%rYfs9`l31Rz*ackb)-IGhE%%=8jZ|L}aow|(bF z+a$0{w7IXe!LL;eeN|x|&9x(~6|;Py5KcTt<2|T^Ry=Di#==@|b)V>Fu%@3S z`XSplu{i>RME%%1M@fHiAlexR4^7un7R-^Ytmi6~MQ89L?MTQ zjxGKV&DwL1aD6Q1pP(F}VDOsAYs<4I0m?56>;mJ4wh7=92x6saE2tETxNGdMwLw4o zTQjiGgyJ6)nL3_FMYW4Om{Y&|4VQpT7M#%p$Lo0X6CIbDgGl6q?%-j?*bj(cN`(H5 zeI@&>&bM}hH#t!iYwOuRpv&!A5@{-!2fZ_KtRTizN1_yfsWwyU3LO41;ZGc$A3v1v z_V^p+B5pP|RntsC11p785Lr7izwv9POH9z^CF&0dB zi%n$0Pv!mngF}Z(P;F(dw6cSpS@01AfNMcRK%8sjY^m+?jC)W_a7JVf>pBN#tr}Rh z=RUCmjI#y3X}Yl0=h=Dc`v(W@+iV%=n5wbI49uJ@zICx&u6ui~=TYW~xOsWl$EIdd zM2_id>#btvnJW0cSf@JFRQU62--w4jNUKnEf;|ul8p=aL8tvKba~ERTnPP5K473KP zPwdtGpq@WgdMisUrKu|?1~3>#Bk3#3Evaa+M?QijB~EXYx;(T%4V}D zIem1RhXyDA%X5E7%;4U^{Zwe%wMSXGLY4s|NN&~>Zz}G75@>n3)VzUJT|?UPa!AU!=jG73sr)6ROk2U(C0$l2$k=i1eWfb!w<=ub{^ii)t*mG~!h zJB0=X=s0-2$*m^tY`pWVPTP;n+q#4 zCB`QvP9N4E8UDu?g}E9D4zoTwyaj!~kcS+%->CoL04u@b(=co8Kdr^v|EQGzK>)Dz zBmY@HOnpIO2LCtY5OzHuiXy{Dewek1BN^;B$D3)|G(CqB5|g@_auX8rA1~$JhtL8x z#59$ZzOQ)XiHrX4D`0>kG;bK=eBjB2R<#=sGCnwn=Wy?@9^Z^dMN1nM%8=L8!~?6{ zu(3&ryyB@0`}+Eh&d>iVBVh(m|1msi1eE=~jH9oz#i8)HEkY|2!2#IJNx#OCm#~gc z#pEPV<^-q8)uu`|^4$YIx_Q8_?$x(>7#OM)9;&FS9vvT>o4O`VOxQ1={8+uBXE#~# zulqeu*m`m!R4gL62wCYWFj%}@+!)i@L|+vpeNz^;*E78z`nYsN?V@XcD);)-z-s#J z>h?na(VW_FPGv5cXwXpQpXw9o$ydC2G!tFFA&XQY!~Qy%%4PS47qRlJq@FG~34YS4 zk1KrR=>39e%kCrt*=1uxLt(Cm`pMS{C~N=dsX4p9_6;AK_TAOh6<*pMCOHv3ecRa? z>5Nv*thS-JxF>eV!YR|)Q`d&UFFzdUpj4+l>A9qtWM9Q5WiiWhgfYXJH)D?nFbj-Re6vf&(N4P)8Cq^?m~PwP|NdQ=HX&TX zH)AyTW2Jp>ge*$m>@5Dlu*)cBHv8@M(0wRRXecjR!%d-^(KqP4QM6k$V)zKCgNsPe z6v_8l?BbVG|MHK-!dX-cnnyYr22-H1cIBMGnBOG?N56)TkgP^Q40iL}zPrZZCdbFR z!l;{^@q<|3t`fR#in@Gz^~FZ=re~Np{?yT0>fUZaPm`uK9V4h5oU{*>$!w!tPW-jm zI+i-@JwJ7et-YhKJ=A9Nnh*!bf>!hbmJk>jRe{{&^j0|<@@XO#FrRH2_Bh|&`E5@@ z`m(+8jZ_jV9`$3I;}kbLd&i1JK%>In3uQ-P!WEGVD7f%4E!P|5Tyjio+-x)g%}FtW zMCEQtaW+I&j#RWg@bZ0ZG>f~6Gj^(ZB%uY4xUL}Q4IRUeBR@ZMix_==-KN-+{;TC3 zUM)k@%-I1%-|}HxtyTE$Y(2k*0~71Fn#S3trS6SX%ao9hx|#2)hq%|}%dM=-o1*Zu zJxQ3E(61+PT0-Cqe(e0-mbG9+f_A9mpJMjXkEORJ)d90O*fhzN+S zD4A&@!&|iKRIp$cu%=En5#02Gmwwut@g-saN+xmMP2K1hej>t>{Ze_f{!xl#=ps435>S-*iUW^IOj%c(8yU@ZqEA_B zb7pRAozQhlQ*LWBA`?yii6)c@90S6dD;q{Tc*Mc-^?f^BafY!u^4`WZ>GBt15vVF} za$m+ojFPVO$V9sGc=QVI)qs@{7XAGHYX_SFtubXhmGYBLkD;t$Z}s10lI;J8c|&OH z0tm(HzaOP&RSwi5vT?mwSG^ygML#b7DQ534C;Up! zByxr>%YQTB3`c0#8+<4r=J(5pvYayA+EV;lLS*r%ll{pLtNRW7wOn>M>Se#0nF=Wj zO?I1|;@wFdbiTGDG!tY0$BipqtyA2`;l96py2U?WiLuYl?m=fvv%B*HbGL>Ggz99k z!0pbFNhJ!-yUW~m%s2c#DsSIbRajXOf{IK(`#Pf?XC0U4376L}6oY-l%?fpyP*Po9 z(9WGM=J_4;mWC$Qv0M+RQZ*zIT%CXXn8x(+kp)Kk4s32BBQe5X*W^gf3FQn-$n$9I z!(hbTkp;BZHy#vyqF^qb-XA=f5h2#IVtUi9WfLi5I`~KWKL_Q-fH%=jE^K?t`SmSr z%dUOHxh?lfTvORwCuKXtA|+wqN%?A9e$@@0A9eTb9mw`kuyp!QYIDWO876LO+DBj) z9J3BG(pXFjZ{(Xm>_d1I9IdTIFthT{gdsCey{4D-v*NmaO2nsvJG+O$nsV=-nai}S zY(O;yaXCI5os@pbMVf33?&E3d?s<{bHE4?ZtciqhEgrAJI};g)wooVix!ks&)Pu*c zd-<;5Xhj~=j|Wq=vUH6dO&JL9s3d4tE;!kTdR5|*Xju!ajU;7^--Ejx@CosaPgBMQ z_doi(Yph|$_?sEiW+BOIWj@YQ*Reoan4?b2wavtmo*VfH(s%GM>7l$omKQUEzp0pX zp0HuMwT5?xgy{YqGoVcTbQ*RDS&sB(0ylCG_3%d7C1}G9?W5zJ$ctNG*{)`d#{n_7 z&E-A2@C`Oi@@w!Kd2<3`_@8 zarln00tRnDL6$~pZUVM0rFnrph`7O9kB_0+S_Wn&X5rv6{$lY~P^BJp)ti8b#MsF! zvN6Won}}g#f*xe+89DGk@4fn%jv=@|<_qOer*8B2t`lu7Hdl0UV3-V*@EoEsDliU~ zR3iRzW|96IfMHhE{nJiO|jLR;~5;FL?+XOCl|o7 z^Fso>U5sdt;moaGT;}si$lMxh)MWuGvV!ReJBqjY?ELKZ$#IJI|BdpZfFmE?_9xCg3~rj zP$Z6u&}gA&7z&5sm<>aFC(J621$6bdCds#aj3fxfM)O zZEHHZASPyfeSOovvBtFZ4hJ-H71}`|IfjW)!gV!A?%d*Hz6a{*`4uT;Z6YKjRWpD$ zLK%V40g1Ho7n;Co^1?klWi2HsY5BO}Qrc3cvciI@*f)%Rv0Zm?jt0&aW?!BQ8l&d= z3PYC*YAhwpbV%l0-@env|Cy!H2fgCTz;H-kZC71f6HQDb%fPX}=Grx>aTNWm_ZRa- zW3r~l^oE|KpDV3=V+xo1sA`H}fGy6u$6 zcw)xJh}6^}yV%_9v${cP!?-c0LL(K2yG^BzH@6h0ZhP|$$o1eZIX`28R&{1IvtZbm zmnoR&i-7?~$_)uHa!Pk@Sz6W)#T)?fjAYW9>Q9}Ibl_>iqr)O7E$hOeA3&K`*PL17 z?E0nudwUZKFw+!(B_V_VYSa!u$pu|rM73^*q2@EgMDOxBZedbHZ)kp>Fg( zsny}9%sv>SL2n?(E`ItvcH3`0n+doGdpSZL#o!U^E>+0HD{EUjB|HF`(ChOmB7t{i zOZ7}prK+g=tWnz_-8#wrK?ddrWBg^f8P2Xk0k(u3=_WOJ{EBj)<=vJAZb-dyWt82= zy|!WJZ8tZ0(y!rr{$*_Qog@p#j5XjQKkcuVzmSoUVSN+gpSjMT$^LFxT~E&!7(!lJRi&=v zX|n54(%PEw@bEyJ7!T88!CI<+S~GYrY!;%Nbz4=K$xv`-m#$&R|NRig&;C~r{U7;? z6{#Ji`dema)6CKzmFQM`+8Q`{k?yLWH9^6oZhHdY<)So=yJj5!$Ue)TQ-%Pkbr^XBkzMj zKtxnf*pj}srU!fG^#5DDKszW2vNk;(52ZP>9GKpEBcxB#(AYe;B=Td6a_)CRH^IHr z11lRJ)h=htUBf|evVOv_1I|om$G^A&ea9heS|!19E zvHp=V==47G$mk#s5a2;+9pTmB?xCcvBCc&N)CjmdgtjWLF39U^BMwk6TqC1$E^kVE z`IGK(yX}g%J70#9sGoKsqn*Z`{4e9c+*4r7?2fL^Thl^w(C-edDiATR(#Mu)b-G=4 zR>^zVBe}(8jng5Ke~1aTv_VAyUP3f|DC@NtO8TVgzM9vS?P^Y z_4xe4lW4gRM;S`m*#2IxKWOy@#QmtH`}AZ&&k)|bdj*)xo1@@p&)nv6tS03jZMD^T z7Xnw{rV~~Ar1D`qX@s7Ml9nd~H0m2$(>b$4fp?m8p`6ZP5rAwL4UN; zLCMU3g!po`-+-*sCb6Iz-lm^K)d>{YoPlK zWj%k!$f*U;kD>sp#_w51qT~Yb@8AP=rrZH{z7F_g7;dAw@WK_EU1`mj(cyQLlu+mP zW-MQxxVCWzFLi#eomLytoBIPdtTvav`~SE5VzF~zVZ^|I)XmMUoQ%XTrL3lgmYrSs z2B8*qPnu9OB<+7^ydYfRCqPnozO}Ma?&kABVIh?|1J;-wOJ3oAjh27N*57&LENG<)}pM<$Wz^Db?t;Uf}sif))C=3i0P(!a>ce>S(u zM-$+fAuzTztzoE%^hpYC6D)8v0%&>vnv`;r;`PHNQp3TWo#&SDu;qNlVierDL#0R0 zXl=xmG(OP&KjghtR2*H`KbYX|?iMUK1Zf-^NpNC7a6*9K(73x>2<{LhxFoo{L*uRi z8h0A!UwNMIedn9|nTuI-*Qtd5=buDuQvne=!)_`#3X>W6qmsyOVFSDPG>?@f-0x`r3Td1nzpgM?KAgp+0dT1IKj$x{B4z!YJOv1dSYcpL|h zK@Yn>B|tkC(~9GnkEcJ#m$xKa{lenNN4cW4Zm!pMVYwiuT~d;Ox`gL8G>;5Jm<%sC zNz5=En;*dBpIC-3BP*+MI{Q{*)}#!qMwIQHtGl` zjH?_Y7>3`|eqv!6&6J4vsFU{93;ykYIM7f7=rDsnwdrYTi*95mp}=~Kjg2?LvPMtA zvoM?F4Ra$Yxvv5%9j`A`M|sDmrM%=H&Nl6{{K;&P` z7V1yaJq~EF*+SGz3US=nHCJls zR(>uJgf$~eC-l5N;gmA1<^ul(|fA6(91( zwlqf7y9+ibCdF>R1`yfz3R`;_+A9h_vQJz?pWfYNiD~Wa?|YQz*8Hk8zNx+aNyq2m zIjyb#!E78kml_cE1g8N0#nG^deyr5P1J_VnOmJ!Ab#DTg%Udj#(kWccwx=&%!Q`=$?DRaX;)MyTbM zS0N0Q6!KmTn0nj$Ped|(n|MQ>mYJR38VrOpzfyjJeWf+tebImWcb2IYuZUpp{n^YY z+Kb02<2JCFnMvU&L&CKH5Cks?Ju=;N3se1~AD_`fW+@C6d$EU?GOK99jM7(bf3!iY zJTd|u=b;m*3$+u~E7xxw+$y;RAP~E&K<4M`yw`5pxn74@q&5^lzZ_}E@;6r1Qz~g}M z=sfykD{1}sK=DHt>w^Tee5OEZ#7Q@QLym~!tA zwR|2hKNJRQ#3qJc-0zU3B>O7=?xx7mDH>{n0M-IXFosqE<_Yd1J} z?KY~(?hCg1aE){GqZ`FfUgfXU4Brbwy5_G)Xc~eUxgN=NP zSc<)9R9u>NPCmrnrsQb216@VG2;*$j*2u20jDM1Cz2Me{RO5`8OX^UBR1V_ko;N@S zz;*RQ;Ez#z2g27kcl3;P_(P~11)}Qhhl>^V%PYv4Dk|L=9?RTU%SzRO8XTA|bdF9G9x~ z?B>4FuE9QSBnkd&$q1E-v>hh~X@0aTsqgsw6w&ecGev-l!@5Nf;`e+n$A)kDJ8mm_ zt!xfDkaNtYle3pnM!j#lf-nLPrva|_UL-7r`g1SOxVb(TMeQU#~wiF!pbWpt|sa$^9NN&&u7;>){ zMEgp;OBRuGZ*NZ#Ldp{h8^$BZI9-oYl9Ln3l=R_(P#+&138H20n4IAopm;8x>nHE- z?yCQM#{^=;1vVWBHuJo0{64e=gTbWC%vhw!uvT4eZ*MEBs~HZ|Zm;;gVqp?qbkG!f z;IR9_1-8ayPlH3~BuHeL`qtg9rE>4C{lI3yu`n)_M=fNZ@BVZW$X<6d$I`iX7yted ziM#5P^x;F!#E5i$hUtl#zp&_=+Ev&#Nl@Duv@XUAjbOR(KP$O%t~)(&6B3);$A3Q& z-M>*gCIhiRWl*|MV{E0H6U5=R3VQqI)t|Tbk~Ba0!+B8&GRS3e`6WC=MMF8h%CG*w zS-cCGTM#9ZsDtAK9*d$@Ag$cC_?+FDFKM(QUb&?wKFo{`n^;@Ig|ScbJK+IQ8D4?J zzm2s7O~)nS@&DN^z9PHz*OgH&iU2Jd5PBnZ7b;U@})lY!TQN%({a9-ji^=8&1o%R_ht_Cw~9 zDWrZhy|R%wm0i51`rMLlSJM^-%#$OVvBp4MfcT()!`QFvz^M*~NG{dZ%0o0LkHp=v zqU1S$(qGSeVPb9Y5WN0lJ=$B>yMBG=4}Xw}`^lO!?z%?wr!tDbwor{Vm#G+jSJ?kw4VG)eT-%S0{sn|}`_trEJSdi?38wX~vOpn@W1e9p@Y z4MMB1BQovl66eGpCCI6C2FKn2l-sXEt4f4+xRG25B_ruMTDT%ym4iF>O?yM zMH}=~tt+yY@^t==3zfa#zPzS@-{{>)fjI>q10Ejq5@Vi(s7a~PMql*ddGDvRiJZ5> zzPoNGGaX!G6OYBt2%}qDl5FrhLUpyDC5;y*Yl*Z6S5tOm;)(vBaQiSPPRBQs(`&-3b31G;O{7LzBhxh zMEGIjFl7N;)~Z%IIU{du`4CaO!}VvBqTEyA-;*_P^2#d_F?C~0Ic^h8RhwTn24HiB z%Q)~h)CV-2esP`C?TT^9%+75T7oqu`G?@5gp& zPuQPb&(QTt!#&`Y%h2F3{x93!LOv~e%uQi4aDgy-ZbU*A2Lj%dNLjoQwmM$!#I|HX zLPqUc4-*19b5`*#hCGW=4{VU^-pV>^-#&6$a#jxXG$MY9`BH1P2Fvk}9`xaMpIdlN z-1h{jqoSg+iZ5h7{}olGQ*%vK|a5bUIDw_8bUM&Rom|*Qd2OK(79z|l8U0%gTy;kC`kjm^XWu+iS}-yy@Zl^)LpE)N!T{hF{zeCzY~Bu}r+JLq=@h z9z!;U{EqqGM(m%AdA-hU^8M$nbuib~s4chtd<>5AstjW%oZO=?Q!{OW=2{5(IuSwh z7NH)WG*+h&PLly=YbX{{ms9lXpP05megvROzBZ-#O^weI~EBFBo<)& zPKU+Bdi=t3?lCVVvn%>}R9Q|gCMG)J#N^51$?fGB6UcEBh?`XYj#_Tfv#Pl{Ile;; z5f&38q7j)hf?_{~{AqbW6g*mkiHO#g#;@MfZMX2;JimEi4UdXa;ixDzwn(9q0LJ?| zwE&93s0fDe5D@5Aj z2yu!`zbFfYODig5J@!m7o6}L<-FeRSN8;n-0jdRn74Q-f!&IM6%3)v3%;Hi~*mP&a z!~vyEL_jUAg~J4T=xWN{Ok(qJcaKd^=lK5g2OpClBSq%#>-@llK7g3>Tr*WsQj*os zfTlUb|KD$1TwPT#HGNTCU0qpQ>nxTCHmm(-pLEb&+7;sE`+KqCVxW*9xe(Bsf1f$* zM@{HGcb$8kEPrJJb~#(3B%SGNKYx?2DGj+_Nn*pHq@+C7Yn&1Spd%(|3L~HwLMj%8 zU@11NS(Xw72o+<`ESW4VEurJ%QasmlFL`<{?Rlo8b2w>;~Ov^xeRf z-NJR;_7bgI<{2E-v0;E6$iPxMdKfJ@ePixS<`%^KTWTmXKe!k<1t_@Oo_pdkHymEN z{UZ9&zIAF6*llJ4776LeCtlB5s1uy!$(uB`v4208=)Pl=YX>DJA;Hk_Q!OOq%J=&4 z%e^;+hriU%+S0lwf|MJ{e)li6@SqPVVWaC|{5qoU$T}c*i7-KVOVPZM3v-jL4Op5p zMP{&qV}8Q#qJg95zTmR4DqnZ&L&*m6a8K=5pvf@{4dnnKi>5|BGUM z4i58iofU+wv(#~4m6*1`ka)_$R5|s5KD@hYg2(elQj7>keApLUOAqeP#D5r<#wbN%Ne9u-H=pN)@k7WgdkgiMW;5W)YL;0w}!%%TJd3QETmn2UTJo9!)Yj0eGrY zD(csl7G53fKJc_K~r9yN&H>-fVD_+>4 zr7tO=zM?NFm)FCq@`nq~N4QWe?A@q|{TG~<`;?tm^Yf;tY6|53x-?yJ)9X(!3GCXRjPIlzKR_fkQAb8rmswVuf-ego(Zbb7rAMN_#a>>4_7Hh zKl!YlHh(G5+7xRE4=A(vjO4zN8HGAAl&X<>Nz~(H&8i$77}6xfz%OcF$*JI}PDhnh z&)8-`wLd9-0#^w#wpexm_l@(pIlceU#UhNn0aZnE4bCoN!c>K~_W5|ZpwpudSfz6> zwRCE{TgBWmC(LEw8`t`X7Lq2pey0SF{Vg?{q2G+6deDj#qC#?|kkddMcduCCb0Ne-dr z8_{g4pFuSlq`JojJ+rHNT^W{=8;yEMDB6n`S1m2)U9R{Ur2Yv0ftk&nExI!(>FDd3 z$BA@7)6)q;L)+Huy1<3vQt5a+A)BI~bxKb)U?pe~L_;;hMe@y9PA4Amj^)FWVW(5^}}n{9PV zz1-VN`}rit-r920D~{vs-tcilU>Y~x@jgz;(CUV~x>KKiML z9OMyenM9OubqjlNU><1Gva=d9Ru8|b%b~DR_#%VwO|u#*%FB6i<=JFKI(8Et9VRP; zeR__x)M^@&Dox&q`OV027Q@9xw`UqP`UE{p!Ce=DMzS9B<^F#CSIXeMVgXk%PqZ|T ztI(n1J}CoA_6Q2-7pUZ9m+2b2qUc!UP`4S}Pu^U>7^nxSt+z zYy(IF+s3uEbWHDV!w#a2?!?-->w6^Bb{0Jtd(=WO0c!(50hA-GrQdmUN^pgSQ|sPN zc##NR=TC}LVc7Z!cdxKqF^O`Ieu6ab{LmEiGn%;`N>EnD0Q!;Z=eFjcw=nR^%fE|q<2Hqx(z-Xxg-jw+kEq!O2tJL|z`|9^neu!bN=ak| zWqNzaMP$|rLN2dz>(r38F2dkHZU3k>Uiy5{+U!|%D#G_xlNJ(Z6iY5M*}Uevsc~-HwHW4s z=;)&)>R*?25yg{_jnRtjFpx~}UvHw_mr=SW!O>3~Y6a@F(qV#$Q?Py7p1n~nL6Y}) zVe(b|gDuTGL$%XlA3ko+5A>paNt&%}6!sCYaU*%i$Vi^zGImLub_}+zX^^w3_Ik7G z@QC)Wk)}+|)!5uDc5!)$UST)^mylDE`T4HZZRZ84Z>!T4{qQFUMJP&dWn)W7K+7vd za6oJ&T4P%qsh7Ao85Mbet1H%<9wwBzdVRriH6|G)6UJ`BdyQ{ZLKRG#@Mae*4#W_! zSpi@rz72_pZrkA#5kV#=Cr4srV?$qFUM@ZT{UbCw%*KvtzX?@%POrn&hjt;2Qe$>5 zFuL}`uUe;ETlHavdcffj%57=EwzfWmkzkv++fY1ka*vNsG3Z_$QogM&8a?rF0idQJ zutG8_rIvvK;UiM~8ZKwWuC{_tBv9hmlgrEdB{7M&B+<|u>~C)`iSmMdcx;z0DcVGe zBe=c-6)}$ws2GqEVGAnqdG=<6NFMc;r+msN)!^$4r(s$drq|G|H~?5+ghlg^VtGR^ zNr(H&F&#;kuNJ6+le=A+7P)D94ls`Gn|)88;}d41@g<;O}<_``%Qd5RVtavARkq^#jW&inWq-R~~LquWp&6Gz?} z09q%>|I2^YM8*zsaZywJ5s$F>EsUSPcY9)SjMOZW) zM?ehzvPReADHQWm;vbvs9}mQgA{G{j_4j|kg|Gl{NWOn|tOzN1{*OrtI8^`{Q2xJo z0~WEKp%j`k+_}oyI9D|87>E1mDrE4A&42q`q8L6iBlrpRZtiBy0Sh=V|3gb=5G|5> zlhl+@f8Eq)AQU84~~qU zPM+OaEj>Oy$C-!gkz88UoQ8x{*j3hbEksc#ZpS`s<3pn>J-PBZXMzu^6ytV8h3Cvx z;dUqCTlm{!46G7uA4BF=m%kj2;3#z^df5qB+j^iMUS7iX_WNpz$lke>oSt(_ngGQ* zrb7~jLmroVuLQpY$0n^tA}5B-YJ^T`eRl3oJP%JwNH9&>THg%1tgIPI>^f_GByYm( zLWASTc&lJigjcT{?F8e@iz$umbr06`?b|o2N}~K@B;p5d8HU0hr|F-~w%)mTUd9W7 zQ04mHU`a#dk*Chngy*!o6yZug`ug&+>nY^s*+N6#$Yptw4Eo7~gOKT38cEMVYz~{9 zczEgPRh|fkoGr=vIzcuLc-$1J8kt#PQ-yBkMK5K4RNxXg6!W}l3oPH$4MdU8sWl@w zFE*-8R|gj)NVoKVZr})7U8c34eSr{{vwi|Mi!)PX)yFBO+bx&30@H0|e#sVliS_ho zJFBr$(J2_ew{nGnLVn$4uO-pj^RgZhC6_M2Zfpq_1Xy4^NeEr}ssHjxGbo7F8T!=iw>o64V*nX+Bx;C?k z7Z`%nH8e>)+uG(IqRJbJ>#X3aBSLXTfKO%MM@%9P$UvljWuSf|mP-SQWQ_TD$qFgW zcXZ9m0pkM2J?oDQ7@H>Qb8|8G&pzq4?1u+-Yjx-U$ra$n2i;Kx~}(f`N~ZJpV?A{Tq=7BHtzBMsJ~a>%MK5}>14_lvG~n8o&!F2#A2 zwsV0i$Vdw%el9yPbilfR%PwE%+G)T4uRHt~OBz>75^8(;=;<{7ocw2%ouhs5p_j*Z zh%z6PlTlIv!wuUwbnor@=25_0s5#S%Eqak|+;V-J$~t@L!ATz1MvtzsSxo$!7m7~j za)uDB=4C6ppI-T8&@;c^J8 zRnq!p3Gw${9O=3AoJ$}(P_&bdQ?3Wi(5?(#05zGvYyz1aokR%yFZtr3wTW_ts-mb+&K)7Gu+{9%;RSPT> zGP;{4_(sLGS!@YPOa=zuWRU-hq-855T}c2jU=-8eE#s`c>fbUVmr@0X%dL!DEU^i@ zj1}LX&n+d(eIh5+b>QkAbTjW=I6bi7%XCqyGzPMSx#CoZZp`lvsJimb+Mb;cQEsyToi4d z-J-t=(ob5PlXMNrGH3(s#kq+c#^&#cbGoU$)-TV?Ol3KjJfa@hscPc982{5kA0$@V zEGpUz-(In|9oaOycU4o-Cl&P3SJfw3;s2Ioc|7t$o_XLw_P)6;ko3J1*_UtI;yf{l zL)(tk>6@#bdZ#z%4y_A|{zY8at@b_1dZtc)hQ#y>X@LMR073l)QQtvsS0g)HZA+y= zbK%cPcCD_hl7v~IfSY6f~aE0}b$Yj3uuRY1G=d`sXzR>ZmqxG#%a)Uzj7h(!9-4CWg6TkKU} zJ1RVGn$Q36;iK#2o_c6)bf()Tl!|bqmjEp8mHa&%k2Wz7XMn)FhkH)vU2c8@E+*w7 zhx^9ZXofd)ltRe8NWJXA5ztfrrb?hf8(c3uANdUa>^kHH(5@Q=NE7q=uIg%n9zzwA znYF0*J}+M`kZlA>XAz~UzW`k$Q{9{S<>N3-+RkgQ6+MMs-~Y;VcFDlzT3%7fyThX>lzx0h?gx zw(8CuQ^i8!de0J703yiHJA`vIs&9uAC1?CYl18T~r_>Dz(~;4x%@Nz%er(OsgY?Qq z0`0_6+SLlfUnYy;B|FkgUHMu^JXz>>B@Tk6;QDno&vbEosSF0HG6Z{{Qt`J) z{Yhm({q93+yL-r_t4QCs^V=^67_UP<8!9*XcUe zX?bHjPX@;Itv}dVYl`68dPX_{WX>|~*bH6Y?^@j5rr+}(OtBq|WerV8qf=8o*R`8| zu#yazCNhY=!dNkqJ~{J1nO~x!I5);moC)4aKpr0DGCJpf6z!mu{*QZsMUYV@wB#?7 zJq2N0=y=YhUj<7TL3b-)xl`9(jQKtC;ujIPtGAcBr|bdG>34RSL9ogrTKg!*g3<&& zb!y;JIB9aSPM}RLF0p9>Yspt>TSpPGbQ*e&Jc@-L?1O^?V{2*uQYl;@aUl1X6ICiS z>BPko>$u*y|9e*vd$H8bIkVz>!Xjl1zXwE8qPj>EdmEykD_oV17g8!8aWQgDV$V2G zZ=_;0`` z*jXMO2aN#fS6v&oSd#PEDgX-A=Y29PI0> z+NyRAg!>XbqWh|drf{o`(c-S1@3aWtI9e&}YU@jI*J3?p6cQTl)<*lByHSgq_4S>b z9bF4t-F>F%Jd2^RUOOi#sIhPM5@oC5{qIV2p9P0TKN{V8{`U$KX!5^u4FGl!|D&z| zuMhh_M+wjZ0{?%#Aw>;;xwjWZ8t)6zzf?$xAzrR%dkpXDlJ%z>4xOzqh=(aZ1IWe; zh72h~R7R)|?rP~k6z16-_b5QlB8ohZATt1*;{l4!BosC?Go$`#H8PmA%-nikTFFuf zc(S6KDfJ%*VrOR{-{Y@`o&Fxe0^|yl@Rp^~qjg56WMp*R-Zt7P$HO9VfxiJn06@Y# z(&*6mcfk5gpiKb3;0q3qrVHf;!icB;K-Iu!C+Nf4xCyzX`B>htf$YCI9u7i);U?nHTFM(#-yr?+vn74K-bW8Cw+0 zCgLfo14^@!+_p{9)>`b|ThOSOj`>YV^?{XMs>~mR!=V~I2a`|D$2;!b?y%Uc>ztqNrB|!l?d=p{=xZmjioTyj3Q(k zF)UixRuxRD0gX9D7bz$dNS-K?e2!h<1R7Sh%n_$4G(DeErS_V&D9pb5V_L*3Bpx(T zYxL*0(kh{zo*p$2n9ecT8m~M{4`M4LnVg*Dh)EnV@JX%VMdmEYd$hQPR-4Ae#9(T$ zh8=Cv{{tXxG>hQt2@@`df`i$9Q?MuOZL0Gd6%pe_+>S55?EImL9i@Xj-;Kmk$vrW+WcMRp?&#Wp+U{xncrd)R6xp}(0;s81IEIPv89fFKhIm7r3!9cf#_1ie4I5MNoh7_BO_VL4kn)m8_Y56l1Tk}z5p3B@*hTgC2FeGmBoP;tT7fN< z7&AXgDk!Yd{g^<%aQU56ekF1noUc4VaZ%UYe!hT$rN);t&^NAY5Yam$fmKVq){#es z#eb7g2z#_Tj!+P+W#xXUpsk(K^DQYUWMxHvy(Rmc&1(m?cu&`NAVq z2G($WhG2{li+>pE^Jx1-{p3FR*B*o=t6z-m9C(sItISmksiXpvgdFz43h*6BP4YKf zM$S(14?;fvzXODfWghI$_c+Ds;e=HFd?&fg*wH{d+SCcrJ12$Jn17@hnMz~+ju2Kl+_hZs=-+lf8&iMr z5K~#}=G%1jS{^S$$g|lq2uG-yAG2bgwsYe20_3$jFMQavdC@sh1$&6;%aFX+wD<53 z1?m@pg9w0*!nP7Iuy^V;!3r~r&uA$Xe$2p)OYcN<5A@>T)s*uZkBY43vX=J3M@vq9 zL(dz=G2gCwjt=fLD)b@i#c$vOZ2_>9BlGgvDWNMzm2ITHdwU3T%S|D7F?x6j^Wkh3 zjKEh{lEk@jM#;l*B=y=s?7((KUQq|V_{;&1bR$Z%wraw5k_55smHb+xqs)Im)^ZNK8l1-1WG z3O%eC?KrfQTuW;+khNM-Vts}2-Aq!>#)$^fKTB+PN z>ek0?+xjmLWIbC>X!gw^ZBGv`J6;!<@T&KIb<4#?r4V-)L)npouHx zqQ0E3Y`bSHUv`#PHNuf$IO8qnqlen>vMa>Wu7}aK-M;j0zCoH^CLBLikSZ|aDT&YF zd4)fppqHF!ieDByrshTT{OquMzhj$Mw5wY)&aeIg#eB}C^#Nif`s>3FM!p7=J@Q9a zln9<69MR+N>r`}5FZx(m==ru|cr>FxbD!A*#mw4I?Ep3~p=awsykuShcUF$4Ae8rd z6S>*`<4IAl&$U>Z*S4hdIDI&m*jN;KWK0l3{ z@{LoLH_Y$o!w-4a4)I@j-!{=ydD)~*-G!HABIrM=>zBI>o;J|`XZ>IZ ze!>F~+T<jA_P8R7XqsO63-2e{u>5aRJl3$-Ld%&VO0| zFitqu)H{#fbtCWWxf};;eWnQcNAD5Ou(}doWtUo`spQ%VTt%gbl`)_*40*&(vv;hE z=9Ux}%ec8Uj31`A(f3TPYXUVBU>%)>hS2D|jLaa1Uzj5H(yn%6&mVKV?aoy@$s#0B z(=74+T%&o1y-z0d#8IFW5^K0bd_1c=wtpBjU2;1?o52+yXQhz!Qbn>^^};Ij73iNb zQAEe_t*Lprq}yV*wfcm;x?Jzq=5r}7!%vz0Iqr{}yc1I+Hvsz?VF74)+#<8wfg>-$ zUhs%NSRR}}rl-05iQ8$rPua&uGCU$eLqo$z@cZ}g*$oXhy5K$oCBbox5dTI&m;ga{ zQ$y$IJUZYEki`y+Yp39k)(6i*z{{*jciz`2fszv>v3txEr<2~NEEG_H;py(p>I1D~~J zK1v@Z_f1jeO|dRh2Te<&h6Jc6sQVNO-;YvQ7(Z$3G1dFEMLzC zp}n~>-Z5_tM6iQ^g`OznTBhrF?PqWv*bsIX)|dsuO8SzzB}~HPma>4*Phs3^c^)1f zw1L3LfiD(TWR^6(l6JFfZ;4Go=~;`Xi{i*>G+pxBq0;d~S=92-thrM~+E z%TmP)bh9tBef~7L5Cphb)PL34qU*iw6{2jH{p38ROG|+L>`U0N)?HxxLc3UD!zQ`w z#q!;Q1(Gxw?aSVlK2tn z#|*bcA=j!1x!?v;n}@_OqHT1p_wCG(*nSTq6cq9yTxJg&by#!Q{3Z${c#b+>=-N*4<&*Qh=7X z)*h4sk@muuU*Ym$lvSMfuX8O_!;w3@P8M21Wh3a;-hqET|iLu|FK__ zhAu9o9v&VBSfZk$$J24gmbVkBFFn&vK`o!u^j*AmM-p(Yhq$e?mRDB1D>7+;fD=G3 zE|S*A+1XjTgg3mx!mM;85hIE5prYx$I;Qrvv9U2}G01m$1ARyTStE0EG$kdaQk%lM z9p=w`^J$ma+!YOWny3xBj|JW=K;ote;4&TT_lx}OT3R~zbaw#MdhqiD4l1T(1W;bu zRbw`$uA>uPT+IIN!-rJP>FMeIfdTwI2N1#B^0Kt8E%&$h_#lDXvsA)n9CUQ_SVg8| zuoz|k=%|dewBNj~lKx|7r_5(lQ=mZSG78Dni-m2blWn@$GZ#2X6Jr8xH{HBk z`#Z4RO%38Hwz_hAmWlr1cue~#M%?+j*2>&m3NVJlj+BDHE>)g5(4X3Q74Q1#;|Jz# zXI#_WXx^}HVX!9L7I;zZuz-S7Bkt>M%!=~HL%&LtpWZP_=s^?~U(?4+kJkD<3Xl%D zg{yX*{d|wnKPSQck(K-Y$6xL7H!%~7I3xAdmClS}dcSgBMyH(_FOBB|cI(3tpKd1~ zPw9BI07VY|#`#;zg1L_2Gc;_;c;qZn%EGr%c^4LZZz$zB%0BpxeM%lZ%TV-Jh-jvt zKs$#%mMcoO!KRWYEXG%3ku6L5ijEQtZBzqpBVC#Dr)6@cjl!o@v{+;wT<5hi*vP>%^i~ZDmH)2Zht|o-jXsj$(S6{nCCP$G%)0O;r5IA z#+D1!D6RFiqnJw3tnK7AdI!-<+Evu+v+FAlOHdLArOU-b*NMOmJ*f53G%rK(!YlG+ z5_iXnBspTdXWMoXK@9v*=u)($1(;T_qA>r+N`+aPIa#A~(Z(tRu>+xOc|Ljiq_m-i zjUoUQ4;;avswHW`AL!+jmK}dx;qq!%1xppmxxA+;eH?l|_UY?71TK;J9xgS)&>WXz zq}-nntE2#374o$oK>AFm$*LWY^94$EtjNniV)Bl`EGmGYD}W)iyGy;OP%BV)V35&d z=zX==L1~(tSNvv|m4p{r+FD%RBi~u@v15d)Xr8o(2FK&o>JzOPkQZ*H6D8BeVs|wf zWULc%y8iqkLY{}0-tT*YTlg!8=4)JIDyubOeYBr@ivID8h(#5y(cV9)Caqc?G-RJV zJi}pA&8IZhev@UWipAzVQnr{NFoBWy%kN@?iRk;8aOd>zktTNPSSd1oRXIS1nHY2e z^=d^snPfpGaA2O*!dibloybkMFxabwj4Gje)$>lx@Utu0#=3^!Q=T=q>E>sSZxbI| z2}fliUla937NYI?7EdC$rJvU5K#P=6&JR)`kgq=U8Ix7k`J^OPuCJ^wkbfnmO1}uNnC+3yN%yiyF{1MmPP%;&Mb;Z*+VEH2a)N{CzDFA z<2=v}IIWJcR+1AkUX~dbV3o7necRo;ox{XQQTxH!6>^MnAa=jD`#GRwwlr>*UB>AR z56!aas3MO`9#Vv2C!t&Nr> z3b%(Jsp!_6%Izm3EMKPBHTp!9@%z+{cC)IXbp(jwu2aW_Z``{I>mX+*ffZl@f0-o* zWQgbKEa1)#Jw;Z~1ZKxjUo>upetuIZYv9H3c;)lReg81wq}2q@QHdoAY=1HKk1^(Izh?jZ*>&RvcCn5`a3`z6{bHM* z^y@;fx%nkG9Dc(D<#qj>mrBGaG=W}MM#ETFjASD@pHplQetYq(zM+?4{+QQBMp2A$`h`Y$Xvf`)0Z`R%c3b}wML*H99K?Jd+6OR`PkLQ zP~MD{x#}GfyCnZEU!jY;7!UjX7#>N+fU2>#WU)9cR3)e6fSg7$y0_9<2d_*%ujkiS zg!e!FuJ^N^&<*tLWi^bbfG8x*rZ!oxO!B{3PWCyV=67AH z?x+c-#}eA^7?OM@H?Lt=iQdz0CrZV=3f45m4F>J4ncOihO;8|PG=Eg>bqgzh!Hsb> zvrhKql2f&^&)~7It(}(@8>%`}f5S@loBI<~k}tB@4)y*Py8>(!}638?q#m~>V z1lLdwjU(MeB&~b)edf2xJNCQm%BN63rxJ%F()P7TqnA*2h6bUzC;e!IX zWBzIof~6xZ`quC08{dd0(wLGdY=YZr#E--sq%5V*I=CUfZV-yGW_Vj)$4^&o!#OewV^S8O+1-I_Q~@-z zQe^si;%QMMYBNG`{rjJA{rV$3EAPU@Ks}tTzQcF7uH(n=A0W4+5~1FY@%>kq5mnVG zbd1nf&hrvoN7+;OxF$lZU4Uk&5%>P~|G_@K9G$h9u)cf+H}BiQlZnCGD-uPi32+Ze zL{_Xfezf;rbj=cDAL?zZhB5gsSjW=EnPoN<)5@8V;$chX>Olkwh#$Lkz zA-}XYftu7XL`7!fX`}}(U%!D{tnOKL&k^;|0l6-IYJin)L zs*&QI7bc{WP@JSuDKROXfLyK=8Y`J}6n#uG{X?Td8X51jA(OLt@$VDDr67$;jv-M$ zM1vzx@MW-R4`G}|X}m6D;}Xawr5F?sVtj(tRhZXt@5Dc7;LpORh>oLXjr{~) zzpTL?8lPlknquo%Dy%!+;Y7weqpCrZpk0UMA71801=|l46BuCIy;me=a5e)l$(-@rkE}kg=s2g#eKhX3?Q~S;-|GBZ8utAx z(@xe0AII6PYu}o|ol(M0W%)-|6}v{XSi<15XQZ;eon8i zlYE9kqO$-+6Mgd+N(;PVjp2I_eW0 z7XTLl->&-dUIFL6IFimb-vhp-E=o$Y3c=>rfczsq^-xpn6T-+D2EqNXIOVwLjTS;_Z zDkQp#g|C19W_TX$w6wGc2b;Om+}td@)R;^Bq@LT`Tf${7K22X9bA?9(CjvNuN3>r` zJ$XI&OS(_D4ZOY!^9#aDkoDy;N19ujg-f6BZp#lrqBAo{bfy81c)k?)pIGWUGv?ys z)AZ#rM|fTIHH^IO`qG;-@79sm`%BxFr%%lO2ojx{L82oFf-npcotZ(RBM5>p3=*B0 zL82oFf-npcotZ(RBM5>p3=*B0L82oFf-sCf6y4hT26kBEx=ok_JKNj%<(HoY+3^z) zeQ5}SAc)`K?WR;Wt4DMbN_0vTkSaBhtEM0$Oat{4)HAbCP0#3`P7nk^yoH>#oBhmb z?}?7nCXu6gSV|BCK@et5>)7NQx4k904rV}tAP9o^BG4;3f*=Tj_@Yqa{|9TO3h6b3 RKwtm>002ovPDHLkV1nZ5Xx9J$ diff --git a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md index 2fb1181ee0..15f9de0423 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/onboarding.md @@ -95,7 +95,7 @@ below to onboard systems with Configuration Manager. ![Image of Microsoft Endpoint Configuration Manager wizard](images/configmgr-criteria.png) -7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is equal to** and value **10240** and click on **OK**. +7. Keep criterion type as **simple value**, choose where as **Operating System - build number**, operator as **is greater than or equal to** and value **14393** and click on **OK**. ![Image of Microsoft Endpoint Configuration Manager wizard](images/configmgr-simple-value.png) From 6b774a3be84639ca697e0596a88e006cabfda467 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 5 Jun 2020 14:55:51 -0700 Subject: [PATCH 114/228] Applied correct [!NOTE] style --- mdop/appv-v5/app-v-51-supported-configurations.md | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/mdop/appv-v5/app-v-51-supported-configurations.md b/mdop/appv-v5/app-v-51-supported-configurations.md index fbb61d173c..c37972533f 100644 --- a/mdop/appv-v5/app-v-51-supported-configurations.md +++ b/mdop/appv-v5/app-v-51-supported-configurations.md @@ -40,8 +40,8 @@ The App-V 5.1 Server does not support the following scenarios: The following table lists the operating systems that are supported for the App-V 5.1 Management server installation. -**Note**   -Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. +> [!NOTE]  +> Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. | Operating System | Service Pack | System Architecture | |----------------------------------|--------------|---------------------| @@ -215,7 +215,8 @@ The following table lists the SQL Server versions that are supported for the App The following table lists the operating systems that are supported for the App-V 5.1 client installation. -**Note:** With the Windows 10 Anniversary release (aka 1607 version), the App-V client is in-box and will block installation of any previous version of the App-V client +> [!NOTE] +> With the Windows 10 Anniversary release (aka 1607 version), the App-V client is in-box and will block installation of any previous version of the App-V client @@ -323,7 +324,8 @@ The App-V client supports the following versions of System Center Configuration The following App-V and System Center Configuration Manager version matrix shows all officially supported combinations of App-V and Configuration Manager. -**Note:** Both App-V 4.5 and 4.6 have exited Mainstream support. +> [!NOTE] +> Both App-V 4.5 and 4.6 have exited Mainstream support.
From a36424937fa9c0e9ec58ff8a93e6545ca44d2eb1 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 15:01:51 -0700 Subject: [PATCH 115/228] update --- windows/deployment/index.yml | 88 ++++-- windows/deployment/index2.yml | 147 --------- .../windows-10-deployment-considerations.md | 278 +++++++++--------- .../windows-10-infrastructure-requirements.md | 40 +-- 4 files changed, 202 insertions(+), 351 deletions(-) delete mode 100644 windows/deployment/index2.yml diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 3827964e67..636b1fb88b 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -29,12 +29,38 @@ landingContent: - text: Windows 10 deployment scenarios url: windows-10-deployment-scenarios.md - - linkListType: get-started + - linkListType: quickstart links: - text: Demonstrate Autopilot deployment url: windows-autopilot/demonstrate-deployment-on-vm.md - text: Deploy Windows 10 in a test lab url: windows-10-poc.md + - linkListType: architecture + links: + - text: Windows 10 deployment considerations + url: planning/windows-10-deployment-considerations.md + - text: Windows 10 infrastructure requirements + url: planning/windows-10-infrastructure-requirements.md + - text: Windows 10 features lifecycle + url: planning/features-lifecycle.md + - text: Plan for volume activation + url: volume-activation/plan-for-volume-activation-client.md + - linkListType: how-to-guide + links: + - text: Prepare for Zero Touch Installation with Configuration Manager + url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + - text: Prepare to deploy Windows 10 with MDT + url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md + - linkListType: deploy + links: + - text: Windows Autopilot scenarios and capabilities + url: windows-autopilot/windows-autopilot-scenarios.md + - text: Deploy Windows 10 to a new device with Configuration Manager + url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md + - text: Deploy a Windows 10 image using MDT + url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md + - text: Resolve Windows 10 upgrade errors + url: upgrade/resolve-windows-10-upgrade-errors.md # Card (optional) - title: Update Windows 10 @@ -49,11 +75,6 @@ landingContent: links: - text: Servicing the Windows 10 operating system url: update/waas-servicing-strategy-windows-10-updates.md - - - # Card (optional) - - title: Deployment planning - linkLists: - linkListType: architecture links: - text: Create a deployment plan @@ -66,50 +87,61 @@ landingContent: url: update/plan-determine-app-readiness.md - text: Define your servicing strategy url: update/waas-servicing-strategy-windows-10-updates.md - - # Card - - title: Prepare to deploy Windows 10 - linkLists: - linkListType: how-to-guide links: - - text: Prepare for Zero Touch Installation with Configuration Manager - url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md - - text: Prepare to deploy Windows 10 with MDT - url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - text: Evaluate and update infrastructure url: update/update-policies.md - text: Build a successful servicing strategy url: update/waas-deployment-rings-windows-10-updates.md - - # Card - - title: Deploy and update Windows 10 - linkLists: - linkListType: deploy links: - - text: Windows Autopilot scenarios and capabilities - url: windows-autopilot/windows-autopilot-scenarios.md - - text: Deploy Windows 10 to a new device with Configuration Manager - url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md - - text: Deploy a Windows 10 image using MDT - url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - text: Assign devices to servicing channels url: update/waas-servicing-channels-windows-10-updates.md - text: Deploy Windows 10 updates url: update/waas-servicing-channels-windows-10-updates.md - - text: Resolve Windows 10 upgrade errors - url: upgrade/resolve-windows-10-upgrade-errors.md + - text: Troubleshoot Windows Update + url: update/windows-update-troubleshooting.md # Card (optional) - - title: Windows 10 resources + - title: Resources linkLists: + - linkListType: reference + links: + - text: How does Windows Update work? + url: update/how-windows-update-works.md + - text: Unified Update Platform (UUP) architecture + url: update/windows-update-overview.md#unified-update-platform-uup-architecture + - text: Servicing stack updates + url: update/servicing-stack-updates.md + - text: Manage additional Windows Update setings + url: update/waas-wu-settings.md + - text: Delivery Optimization reference + url: update/waas-delivery-optimization-reference.md + - text: Convert an MBR partition to GPT + url: mbr-to-gpt.md + - text: VAMT technical reference + url: volume-activation/volume-activation-management-tool.md + - text: User State Migration Tool (USMT) overview + url: usmt/usmt-overview.md - linkListType: learn links: - text: Windows 10 release information url: https://docs.microsoft.com/windows/release-information/ - text: What's new in Windows 10 url: https://docs.microsoft.com/windows/whats-new/ + - text: Microsoft 365 for enterprise documention + url: https://docs.microsoft.com/microsoft-365/enterprise/ + - text: Microsoft Surface documentation + url: https://docs.microsoft.com/surface/ + - text: Evaluate Windows 10 Enterprise + url: https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise + - text: Microsoft FastTrack cloud solutions + url: https://www.microsoft.com/fasttrack/ + - text: Microsoft Intune documentation + url: https://docs.microsoft.com/mem/intune/ + - text: Microsoft Endpoint Configuration Manager documentation + url: https://docs.microsoft.com/mem/configmgr/ - text: Windows 10 Enterprise Security url: https://docs.microsoft.com/windows/security/ - text: Desktop Deployment Center url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home - diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml deleted file mode 100644 index 05759feb1e..0000000000 --- a/windows/deployment/index2.yml +++ /dev/null @@ -1,147 +0,0 @@ -### YamlMime:Landing - -title: Windows 10 deployment resources and documentation # < 60 chars -summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars - -metadata: - title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. - description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. - services: windows-10 - ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. - ms.subservice: subservice - ms.topic: landing-page # Required - ms.collection: windows-10 - author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. - ms.author: greglin #Required; microsoft alias of author; optional team alias. - ms.date: 05/27/2020 #Required; mm/dd/yyyy format. - localization_priority: medium - -# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new - -landingContent: -# Cards and links should be based on top customer tasks or top subjects -# Start card title with a verb - # Card (optional) - - title: Deploy Windows 10 - linkLists: - - linkListType: overview - links: - - text: Windows 10 deployment scenarios - url: windows-10-deployment-scenarios.md - - - linkListType: quickstart - links: - - text: Demonstrate Autopilot deployment - url: windows-autopilot/demonstrate-deployment-on-vm.md - - text: Deploy Windows 10 in a test lab - url: windows-10-poc.md - - linkListType: architecture - links: - - text: Windows 10 deployment considerations - url: planning/windows-10-deployment-considerations.md - - text: Windows 10 infrastructure requirements - url: planning/windows-10-infrastructure-requirements.md - - text: Windows 10 features lifecycle - url: planning/features-lifecycle.md - - text: Plan for volume activation - url: volume-activation/plan-for-volume-activation-client.md - - linkListType: how-to-guide - links: - - text: Prepare for Zero Touch Installation with Configuration Manager - url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md - - text: Prepare to deploy Windows 10 with MDT - url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - - linkListType: deploy - links: - - text: Windows Autopilot scenarios and capabilities - url: windows-autopilot/windows-autopilot-scenarios.md - - text: Deploy Windows 10 to a new device with Configuration Manager - url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md - - text: Deploy a Windows 10 image using MDT - url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - - text: Resolve Windows 10 upgrade errors - url: upgrade/resolve-windows-10-upgrade-errors.md - - # Card (optional) - - title: Update Windows 10 - linkLists: - - linkListType: overview - links: - - text: What is Windows as a service? - url: update/waas-overview.md - - text: Types of Windows updates - url: update/waas-quick-start.md#definitions - - linkListType: get-started - links: - - text: Servicing the Windows 10 operating system - url: update/waas-servicing-strategy-windows-10-updates.md - - linkListType: architecture - links: - - text: Create a deployment plan - url: update/create-deployment-plan.md - - text: Define readiness criteria - url: update/plan-define-readiness.md - - text: Evaluate infrastructure and tools - url: update/eval-infra-tools.md - - text: Determine application readiness - url: update/plan-determine-app-readiness.md - - text: Define your servicing strategy - url: update/waas-servicing-strategy-windows-10-updates.md - - linkListType: how-to-guide - links: - - text: Evaluate and update infrastructure - url: update/update-policies.md - - text: Build a successful servicing strategy - url: update/waas-deployment-rings-windows-10-updates.md - - linkListType: deploy - links: - - text: Assign devices to servicing channels - url: update/waas-servicing-channels-windows-10-updates.md - - text: Deploy Windows 10 updates - url: update/waas-servicing-channels-windows-10-updates.md - - text: Troubleshoot Windows Update - url: update/windows-update-troubleshooting.md - - # Card (optional) - - title: Technical references and resources - linkLists: - - linkListType: reference - links: - - text: How does Windows Update work? - url: update/how-windows-update-works.md - - text: Unified Update Platform (UUP) architecture - url: update/windows-update-overview.md#unified-update-platform-uup-architecture - - text: Servicing stack updates - url: update/servicing-stack-updates.md - - text: Manage additional Windows Update setings - url: update/waas-wu-settings.md - - text: Delivery Optimization reference - url: update/waas-delivery-optimization-reference.md - - text: Convert an MBR partition to GPT - url: mbr-to-gpt.md - - text: VAMT technical reference - url: volume-activation/volume-activation-management-tool.md - - text: User State Migration Tool (USMT) overview - url: usmt/usmt-overview.md - - linkListType: learn - links: - - text: Windows 10 release information - url: https://docs.microsoft.com/windows/release-information/ - - text: What's new in Windows 10 - url: https://docs.microsoft.com/windows/whats-new/ - - text: Microsoft 365 for enterprise documention - url: https://docs.microsoft.com/microsoft-365/enterprise/ - - text: Microsoft Surface documentation - url: https://docs.microsoft.com/surface/ - - text: Evaluate Windows 10 Enterprise - url: https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise - - text: Microsoft FastTrack cloud solutions - url: https://www.microsoft.com/fasttrack/ - - text: Microsoft Intune documentation - url: https://docs.microsoft.com/mem/intune/ - - text: Microsoft Endpoint Configuration Manager documentation - url: https://docs.microsoft.com/mem/configmgr/ - - text: Windows 10 Enterprise Security - url: https://docs.microsoft.com/windows/security/ - - text: Desktop Deployment Center - url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home diff --git a/windows/deployment/planning/windows-10-deployment-considerations.md b/windows/deployment/planning/windows-10-deployment-considerations.md index a1156b67f9..fc5210567d 100644 --- a/windows/deployment/planning/windows-10-deployment-considerations.md +++ b/windows/deployment/planning/windows-10-deployment-considerations.md @@ -1,144 +1,134 @@ ---- -title: Windows 10 deployment considerations (Windows 10) -description: There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. -ms.assetid: A8DD6B37-1E11-4CD6-B588-92C2404219FE -ms.reviewer: -manager: laurawi -ms.author: greglin -keywords: deploy, upgrade, update, in-place -ms.prod: w10 -ms.localizationpriority: medium -ms.mktglfcycl: plan -ms.sitesec: library -audience: itpro author: greg-lindsay -ms.topic: article ---- - -# Windows 10 deployment considerations - - -**Applies to** - -- Windows 10 - -There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. - -For many years, organizations have deployed new versions of Windows using a “wipe and load” deployment process. At a high level, this process captures existing data and settings from the existing device, deploys a new custom-built Windows image to a PC, injects hardware drivers, reinstalls applications, and finally restores the data and settings. With Windows 10, this process is still fully supported, and for some deployment scenarios is still necessary. - -Windows 10 also introduces two additional scenarios that organizations should consider: - -- **In-place upgrade**, which provides a simple, automated process that leverages the Windows setup process to automatically upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications. - -- **Dynamic provisioning**, which enables organizations to configure new Windows 10 devices for organization use without having to deploy a new custom organization image to the device. - - Both of these scenarios eliminate the image creation process altogether, which can greatly simplify the deployment process. - - So how do you choose? At a high level: - -
---- - - - - - - - - - - - - - - - - - - - - -
Consider ...For these scenarios
In-place upgrade
    -
  • When you want to keep all (or at least most) existing applications

  • -
  • When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)

  • -
  • To migrate from Windows 10 to a later Windows 10 release

  • -
Traditional wipe-and-load
    -
  • When you upgrade significant numbers of applications along with the new Windows OS

  • -
  • When you make significant device or operating system configuration changes

  • -
  • When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs

  • -
  • When you migrate from Windows Vista or other previous operating system versions

  • -
Dynamic provisioning
    -
  • For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required

  • -
  • When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps

  • -
- -  - -## Migration from previous Windows versions - - -For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall. - -Note that the original Windows 8 release is only supported until January 2016. Organizations that do not think they can complete a full Windows 10 migration by that date should deploy Windows 8.1 now and consider Windows 10 after Windows 8 has been removed from the environment. - -For existing Windows PCs running Windows Vista, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware. - -Note that to take advantage of the limited-time free upgrade offer for PCs running Windows 7, Windows 8, or Windows 8.1, you must leverage an in-place upgrade, either from Windows Update or by using the upgrade media available from the [Windows 10 software download page](https://go.microsoft.com/fwlink/p/?LinkId=625073) to acquire a new Windows 10 license from the Windows Store. For more information, refer to the [Windows 10 FAQ](https://go.microsoft.com/fwlink/p/?LinkId=625074). - -For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed). - -For organizations that do not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements. - -## Setup of new computers - - -For new computers acquired with Windows 10 preinstalled, you can leverage dynamic provisioning scenarios to transform the device from its initial state into a fully-configured organization PC. There are two primary dynamic provisioning scenarios you can use: - -- **User-driven, from the cloud.** By joining a device into Azure Active Directory and leveraging the automatic mobile device management (MDM) provisioning capabilities at the same time, an end user can initiate the provisioning process themselves just by entering the Azure Active Directory account and password (called their “work or school account” within Windows 10). The MDM service can then transform the device into a fully-configured organization PC. For more information, see [Azure Active Directory integration with MDM](https://go.microsoft.com/fwlink/p/?LinkId=625075). - -- **IT admin-driven, using new tools.** Using the new Windows Imaging and Configuration Designer (ICD) tool, IT administrators can create provisioning packages that can be applied to a computer to transform it into a fully-configured organization PC. For more information, see [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=625076). - -In either of these scenarios, you can make a variety of configuration changes to the PC: - -- Transform the edition (SKU) of Windows 10 that is in use. - -- Apply configuration and settings to the device (for example, security settings, device restrictions, policies, Wi-Fi and VPN profiles, certificates, and so on). - -- Install apps, language packs, and updates. - -- Enroll the device in a management solution (applicable for IT admin-driven scenarios, configuring the device just enough to allow the management tool to take over configuration and ongoing management). - -## Stay up to date - - -For computers already running Windows 10 on the Semi-Annual Channel, new upgrades will periodically be deployed, approximately two to three times per year. You can deploy these upgrades by using a variety of methods: - -- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet. - -- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update). Note that this will require updates to WSUS, which are only available for Windows Server 2012 and Windows Server 2012 R2, not previous versions. - -- System Center Configuration Manager task sequences (with Configuration Manager 2012, 2012 R2, and later versions). - -- System Center Configuration Manager vNext software update capabilities (deploying like an update). - -Note that these upgrades (which are installed differently than monthly updates) will leverage an in-place upgrade process. Unlike updates, which are relatively small, these upgrades will include a full operating system image (around 3 GB for 64-bit operating systems), which requires time (1-2 hours) and disk space (approximately 10 GB) to complete. Ensure that the deployment method you use can support the required network bandwidth and/or disk space requirements. - -Over time, this upgrade process will be optimized to reduce the overall time and network bandwidth consumed. - -## Related topics - - -[Windows 10 compatibility](windows-10-compatibility.md) - -[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) - -  - -  - - - - - +--- +title: Windows 10 deployment considerations (Windows 10) +description: There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. +ms.assetid: A8DD6B37-1E11-4CD6-B588-92C2404219FE +ms.reviewer: +manager: laurawi +ms.author: greglin +keywords: deploy, upgrade, update, in-place +ms.prod: w10 +ms.localizationpriority: medium +ms.mktglfcycl: plan +ms.sitesec: library +audience: itpro +author: greg-lindsay +ms.topic: article +--- + +# Windows 10 deployment considerations + + +**Applies to** + +- Windows 10 + +There are new deployment options in Windows 10 that help you simplify the deployment process and automate migration of existing settings and applications. + +For many years, organizations have deployed new versions of Windows using a “wipe and load” deployment process. At a high level, this process captures existing data and settings from the existing device, deploys a new custom-built Windows image to a PC, injects hardware drivers, reinstalls applications, and finally restores the data and settings. With Windows 10, this process is still fully supported, and for some deployment scenarios is still necessary. + +Windows 10 also introduces two additional scenarios that organizations should consider: + +- **In-place upgrade**, which provides a simple, automated process that leverages the Windows setup process to automatically upgrade from an earlier version of Windows. This process automatically migrates existing data, settings, drivers, and applications. + +- **Dynamic provisioning**, which enables organizations to configure new Windows 10 devices for organization use without having to deploy a new custom organization image to the device. + + Both of these scenarios eliminate the image creation process altogether, which can greatly simplify the deployment process. + + So how do you choose? At a high level: + + ++++ + + + + + + + + + + + + + + + + + + + + +
Consider ...For these scenarios
In-place upgrade
    +
  • When you want to keep all (or at least most) existing applications

  • +
  • When you do not plan to significantly change the device configuration (for example, BIOS to UEFI) or operating system configuration (for example, x86 to x64, language changes, Administrators to non-Administrators, Active Directory domain consolidations)

  • +
  • To migrate from Windows 10 to a later Windows 10 release

  • +
Traditional wipe-and-load
    +
  • When you upgrade significant numbers of applications along with the new Windows OS

  • +
  • When you make significant device or operating system configuration changes

  • +
  • When you “start clean”. For example, scenarios where it is not necessary to preserve existing apps or data (for example, call centers) or when you move from unmanaged to well-managed PCs

  • +
  • When you migrate from Windows Vista or other previous operating system versions

  • +
Dynamic provisioning
    +
  • For new devices, especially in “choose your own device” scenarios when simple configuration (not reimaging) is all that is required

  • +
  • When used in combination with a management tool (for example, an MDM service like Microsoft Intune) that enables self-service installation of user-specific or role-specific apps

  • +
+ +  +## Migration from previous Windows versions + +For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall. + +Note that the original Windows 8 release is only supported until January 2016. Organizations that do not think they can complete a full Windows 10 migration by that date should deploy Windows 8.1 now and consider Windows 10 after Windows 8 has been removed from the environment. + +For existing Windows PCs running Windows Vista, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware. + +Note that to take advantage of the limited-time free upgrade offer for PCs running Windows 7, Windows 8, or Windows 8.1, you must leverage an in-place upgrade, either from Windows Update or by using the upgrade media available from the [Windows 10 software download page](https://go.microsoft.com/fwlink/p/?LinkId=625073) to acquire a new Windows 10 license from the Windows Store. For more information, refer to the [Windows 10 FAQ](https://go.microsoft.com/fwlink/p/?LinkId=625074). + +For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed). + +For organizations that do not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements. + +## Setting up new computers + +For new computers acquired with Windows 10 preinstalled, you can leverage dynamic provisioning scenarios to transform the device from its initial state into a fully-configured organization PC. There are two primary dynamic provisioning scenarios you can use: + +- **User-driven, from the cloud.** By joining a device into Azure Active Directory and leveraging the automatic mobile device management (MDM) provisioning capabilities at the same time, an end user can initiate the provisioning process themselves just by entering the Azure Active Directory account and password (called their “work or school account” within Windows 10). The MDM service can then transform the device into a fully-configured organization PC. For more information, see [Azure Active Directory integration with MDM](https://go.microsoft.com/fwlink/p/?LinkId=625075). + +- **IT admin-driven, using new tools.** Using the new Windows Imaging and Configuration Designer (ICD) tool, IT administrators can create provisioning packages that can be applied to a computer to transform it into a fully-configured organization PC. For more information, see [Windows Imaging and Configuration Designer](https://go.microsoft.com/fwlink/p/?LinkId=625076). + +In either of these scenarios, you can make a variety of configuration changes to the PC: + +- Transform the edition (SKU) of Windows 10 that is in use. +- Apply configuration and settings to the device (for example, security settings, device restrictions, policies, Wi-Fi and VPN profiles, certificates, and so on). +- Install apps, language packs, and updates. +- Enroll the device in a management solution (applicable for IT admin-driven scenarios, configuring the device just enough to allow the management tool to take over configuration and ongoing management). + +## Stay up to date + +For computers already running Windows 10 on the Semi-Annual Channel, new upgrades will be deployed two times per year. You can deploy these upgrades by using a variety of methods: + +- Windows Update or Windows Update for Business, for devices where you want to receive updates directly from the Internet. +- Windows Server Update Services (WSUS), for devices configured to pull updates from internal servers after they are approved (deploying like an update). +- Configuration Manager task sequences. +- Configuration Manager software update capabilities (deploying like an update). + +These upgrades (which are installed differently than monthly updates) leverage an in-place upgrade process. Unlike updates, which are relatively small, these upgrades will include a full operating system image (around 3 GB for 64-bit operating systems), which requires time (1-2 hours) and disk space (approximately 10 GB) to complete. Ensure that the deployment method you use can support the required network bandwidth and/or disk space requirements. + +The upgrade process is also optimized to reduce the overall time and network bandwidth consumed. + +## Related topics + + +[Windows 10 compatibility](windows-10-compatibility.md)
+[Windows 10 infrastructure requirements](windows-10-infrastructure-requirements.md) + +  + +  + + + + + diff --git a/windows/deployment/planning/windows-10-infrastructure-requirements.md b/windows/deployment/planning/windows-10-infrastructure-requirements.md index b5615f4412..7ca82acf70 100644 --- a/windows/deployment/planning/windows-10-infrastructure-requirements.md +++ b/windows/deployment/planning/windows-10-infrastructure-requirements.md @@ -26,38 +26,24 @@ There are specific infrastructure requirements to deploy and manage Windows 10 ## High-level requirements - For initial Windows 10 deployments, as well as subsequent Windows 10 upgrades, ensure that sufficient disk space is available for distribution of the Windows 10 installation files (about 3 GB for Windows 10 x64 images, slightly smaller for x86). Also, be sure to take into account the network impact of moving these large images to each PC; you may need to leverage local server storage. For persistent VDI environments, carefully consider the I/O impact from upgrading large numbers of PCs in a short period of time. Ensure that upgrades are performed in smaller numbers, or during off-peak time periods. (For pooled VDI environments, a better approach is to replace the base image with a new version.) ## Deployment tools - -A new version of the Assessment and Deployment Toolkit (ADK) has been released to support Windows 10. This new version, available for download [here](https://go.microsoft.com/fwlink/p/?LinkId=526740), is required for Windows 10; you should not use earlier versions of the ADK to deploy Windows 10. It also supports the deployment of Windows 7, Windows 8, and Windows 8.1. +The latest version of the Windows Assessment and Deployment Toolkit (ADK) is available for download [here](https://docs.microsoft.com/windows-hardware/get-started/adk-install). Significant enhancements in the ADK for Windows 10 include new runtime provisioning capabilities, which leverage the Windows Imaging and Configuration Designer (Windows ICD), as well as updated versions of existing deployment tools (DISM, USMT, Windows PE, and more). -Microsoft Deployment Toolkit 2013 Update 1, available for download [here](https://go.microsoft.com/fwlink/p/?LinkId=625079), has also been updated to support Windows 10 and the new ADK; older versions do not support Windows 10. New in this release is task sequence support for Windows 10 in-place upgrades. +The latest version of the Microsoft Deployment Toolkit (MDT) is available for download [here](https://docs.microsoft.com/mem/configmgr/mdt/release-notes). -For System Center Configuration Manager, Windows 10 support is offered with various releases: - -| Release | Windows 10 management? | Windows 10 deployment? | -|---------------------------------------------|------------------------|------------------------------------------------| -| System Center Configuration Manager 2007 | Yes, with a hotfix | No | -| System Center Configuration Manager 2012 | Yes, with SP2 and CU1 | Yes, with SP2, CU1, and the ADK for Windows 10 | -| System Center Configuration Manager 2012 R2 | Yes, with SP1 and CU1 | Yes, with SP1, CU1, and the ADK for Windows 10 | - - -> [!NOTE] -> Configuration Manager 2012 supports Windows 10 version 1507 (build 10.0.10240) and 1511 (build 10.0.10586) for the lifecycle of these builds. Future releases of Windows 10 CB/CBB are not supported With Configuration Manager 2012, and will require Microsoft Endpoint Configuration Manager current branch for supported management. -  +For Configuration Manager, Windows 10 version specific support is offered with [various releases](https://docs.microsoft.com/mem/configmgr/core/plan-design/configs/support-for-windows-10). For more details about Microsoft Endpoint Configuration Manager support for Windows 10, see [Prepare for Zero Touch Installation of Windows 10 with Configuration Manager](../deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md). ## Management tools - In addition to Microsoft Endpoint Configuration Manager, Windows 10 also leverages other tools for management. For Windows Server and Active Directory, existing supported versions are fully supported for Windows 10. New Group Policy templates will be needed to configure new settings available in Windows 10; these templates are available in the Windows 10 media images, and are available as a separate download [here](https://go.microsoft.com/fwlink/p/?LinkId=625081). See [Group Policy settings reference](https://go.microsoft.com/fwlink/p/?LinkId=625082) for a list of the new and modified policy settings. If you are using a central policy store, follow the steps outlined [here](https://go.microsoft.com/fwlink/p/?LinkId=625083) to update the ADMX files stored in that central store. No new Active Directory schema updates or specific functional levels are currently required for core Windows 10 product functionality, although subsequent upgrades could require these to support new features. @@ -72,8 +58,6 @@ Microsoft Desktop Optimization Pack (MDOP) has been updated to support Windows  | Microsoft BitLocker Administration and Monitoring (MBAM) | MBAM 2.5 SP1 (2.5 is OK) | | User Experience Virtualization (UE-V) | UE-V 2.1 SP1 | -  - For more information, see the [MDOP TechCenter](https://go.microsoft.com/fwlink/p/?LinkId=625090). For devices you manage with mobile device management (MDM) solutions such as Microsoft Intune, existing capabilities (provided initially in Windows 8.1) are fully supported in Windows 10; new Windows 10 MDM settings and capabilities will require updates to the MDM services. See [Mobile device management](https://go.microsoft.com/fwlink/p/?LinkId=625084) for more information. @@ -81,20 +65,17 @@ For devices you manage with mobile device management (MDM) solutions such as Mic Windows Server Update Services (WSUS) requires some additional configuration to receive updates for Windows 10. Use the Windows Server Update Services admin tool and follow these instructions: 1. Select the **Options** node, and then click **Products and Classifications**. - 2. In the **Products** tree, select the **Windows 10** and **Windows 10 LTSB** products and any other Windows 10-related items that you want. Click **OK**. - 3. From the **Synchronizations** node, right-click and choose **Synchronize Now**. ![figure 1](images/fig4-wsuslist.png) -Figure 1. WSUS product list with Windows 10 choices +WSUS product list with Windows 10 choices Because Windows 10 updates are cumulative in nature, each month’s new update will supersede the previous month's. Consider leveraging “express installation” packages to reduce the size of the payload that needs to be sent to each PC each month; see [Express installation files](https://go.microsoft.com/fwlink/p/?LinkId=625086) for more information. (Note that this will increase the amount of disk storage needed by WSUS, and impacts all operating systems being managed with WSUS.) ## Activation - Windows 10 volume license editions of Windows 10 will continue to support all existing activation methods (KMS, MAK, and AD-based activation). An update will be required for existing KMS servers: | Product | Required update | @@ -104,26 +85,21 @@ Windows 10 volume license editions of Windows 10 will continue to support all | Windows Server 2012 and Windows 8 | [https://support.microsoft.com/kb/3058168](https://go.microsoft.com/fwlink/p/?LinkId=625087) | | Windows Server 2008 R2 and Windows 7 | [https://support.microsoft.com/kb/3079821](https://support.microsoft.com/kb/3079821) | -  - Also see: [Windows Server 2016 Volume Activation Tips](https://blogs.technet.microsoft.com/askcore/2016/10/19/windows-server-2016-volume-activation-tips/) Additionally, new product keys will be needed for all types of volume license activation (KMS, MAK, and AD-based Activation); these keys are available on the Volume Licensing Service Center (VLSC) for customers with rights to the Windows 10 operating system. To find the needed keys: - Sign into the [Volume Licensing Service Center (VLSC)](https://go.microsoft.com/fwlink/p/?LinkId=625088) at with a Microsoft account that has appropriate rights. - - For KMS keys, click **Licenses** and then select **Relationship Summary**. Click the appropriate active license ID, and then select **Product Keys** near the right side of the page. For KMS running on Windows Server, find the **Windows Srv 2012R2 DataCtr/Std KMS for Windows 10** product key; for KMS running on client operating systems, find the **Windows 10** product key. - - For MAK keys, click **Downloads and Keys**, and then filter the list by using **Windows 10** as a product. Click the **Key** link next to an appropriate list entry (for example, **Windows 10 Enterprise** or **Windows 10 Enterprise LTSB**) to view the available MAK keys. (You can also find keys for KMS running on Windows 10 in this list. These keys will not work on Windows servers running KMS.) -Note that Windows 10 Enterprise and Windows 10 Enterprise LTSB installations use different MAK keys. But you can use the same KMS server or Active Directory-based activation environment for both; the KMS keys obtained from the Volume Licensing Service Center will work with both. +Note that Windows 10 Enterprise and Windows 10 Enterprise LTSC installations use different MAK keys. But you can use the same KMS server or Active Directory-based activation environment for both; the KMS keys obtained from the Volume Licensing Service Center will work with both. ## Related topics - -[Windows 10 servicing options](../update/waas-servicing-strategy-windows-10-updates.md) -
[Windows 10 deployment considerations](windows-10-deployment-considerations.md) -
[Windows 10 compatibility](windows-10-compatibility.md) +[Windows 10 servicing options](../update/waas-servicing-strategy-windows-10-updates.md)
+[Windows 10 deployment considerations](windows-10-deployment-considerations.md)
+[Windows 10 compatibility](windows-10-compatibility.md)
  From fb6d6c348d44ece9b4a3498ee8fa0c2dae7a78fc Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 15:21:09 -0700 Subject: [PATCH 116/228] update --- .../planning/windows-10-deployment-considerations.md | 8 +++----- 1 file changed, 3 insertions(+), 5 deletions(-) diff --git a/windows/deployment/planning/windows-10-deployment-considerations.md b/windows/deployment/planning/windows-10-deployment-considerations.md index fc5210567d..acf11aa0ee 100644 --- a/windows/deployment/planning/windows-10-deployment-considerations.md +++ b/windows/deployment/planning/windows-10-deployment-considerations.md @@ -80,15 +80,13 @@ Windows 10 also introduces two additional scenarios that organizations should c For existing PCs running Windows 7 or Windows 8.1, in-place upgrade is the recommended method for Windows 10 deployment and should be used whenever possible. Although wipe-and-load (OS refresh) deployments are still fully supported (and necessary in some scenarios, as mentioned previously), in-place upgrade is simpler and faster, and enables a faster Windows 10 deployment overall. -Note that the original Windows 8 release is only supported until January 2016. Organizations that do not think they can complete a full Windows 10 migration by that date should deploy Windows 8.1 now and consider Windows 10 after Windows 8 has been removed from the environment. +The original Windows 8 release was only supported until January 2016. For devices running Windows 8.0, you can update to Windows 8.1 and then upgrade to Windows 10. -For existing Windows PCs running Windows Vista, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware. - -Note that to take advantage of the limited-time free upgrade offer for PCs running Windows 7, Windows 8, or Windows 8.1, you must leverage an in-place upgrade, either from Windows Update or by using the upgrade media available from the [Windows 10 software download page](https://go.microsoft.com/fwlink/p/?LinkId=625073) to acquire a new Windows 10 license from the Windows Store. For more information, refer to the [Windows 10 FAQ](https://go.microsoft.com/fwlink/p/?LinkId=625074). +For PCs running operating systems older than Windows 7, you can perform wipe-and-load (OS refresh) deployments when you use compatible hardware. For organizations with Software Assurance for Windows, both in-place upgrade or wipe-and-load can be leveraged (with in-place upgrade being the preferred method, as previously discussed). -For organizations that do not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements. +For organizations that did not take advantage of the free upgrade offer and are not enrolled in Software Assurance for Windows, Windows 10 upgrade licenses are available for purchase through existing Volume License (VL) agreements. ## Setting up new computers From fd0b98d978b0b4e288186ce2f2d4c9c5e4bf6b40 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 5 Jun 2020 15:34:18 -0700 Subject: [PATCH 117/228] Removed extraneous space to fix rendering of a note --- mdop/appv-v5/app-v-51-supported-configurations.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/mdop/appv-v5/app-v-51-supported-configurations.md b/mdop/appv-v5/app-v-51-supported-configurations.md index c37972533f..1883e4284b 100644 --- a/mdop/appv-v5/app-v-51-supported-configurations.md +++ b/mdop/appv-v5/app-v-51-supported-configurations.md @@ -40,7 +40,7 @@ The App-V 5.1 Server does not support the following scenarios: The following table lists the operating systems that are supported for the App-V 5.1 Management server installation. -> [!NOTE]  +> [!NOTE] > Microsoft provides support for the current service pack and, in some cases, the immediately preceding service pack. To find the support timelines for your product, see the [Lifecycle Supported Service Packs](https://go.microsoft.com/fwlink/p/?LinkId=31975). See [Microsoft Support Lifecycle Support Policy FAQ](https://go.microsoft.com/fwlink/p/?LinkId=31976) for more information. | Operating System | Service Pack | System Architecture | From 9369fae1a383dbd65145ccac501c08e25186891e Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Fri, 5 Jun 2020 15:48:04 -0700 Subject: [PATCH 118/228] added index2.yml --- windows/deployment/index2.yml | 115 ++++++++++++++++++++++++++++++++++ 1 file changed, 115 insertions(+) create mode 100644 windows/deployment/index2.yml diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml new file mode 100644 index 0000000000..3827964e67 --- /dev/null +++ b/windows/deployment/index2.yml @@ -0,0 +1,115 @@ +### YamlMime:Landing + +title: Windows 10 deployment resources and documentation # < 60 chars +summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars + +metadata: + title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. + description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. + services: windows-10 + ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. + ms.subservice: subservice + ms.topic: landing-page # Required + ms.collection: windows-10 + author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. + ms.author: greglin #Required; microsoft alias of author; optional team alias. + ms.date: 05/27/2020 #Required; mm/dd/yyyy format. + localization_priority: medium + +# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new + +landingContent: +# Cards and links should be based on top customer tasks or top subjects +# Start card title with a verb + # Card (optional) + - title: Deploy Windows 10 + linkLists: + - linkListType: overview + links: + - text: Windows 10 deployment scenarios + url: windows-10-deployment-scenarios.md + + - linkListType: get-started + links: + - text: Demonstrate Autopilot deployment + url: windows-autopilot/demonstrate-deployment-on-vm.md + - text: Deploy Windows 10 in a test lab + url: windows-10-poc.md + + # Card (optional) + - title: Update Windows 10 + linkLists: + - linkListType: overview + links: + - text: What is Windows as a service? + url: update/waas-overview.md + - text: Types of Windows updates + url: update/waas-quick-start.md#definitions + - linkListType: get-started + links: + - text: Servicing the Windows 10 operating system + url: update/waas-servicing-strategy-windows-10-updates.md + + + # Card (optional) + - title: Deployment planning + linkLists: + - linkListType: architecture + links: + - text: Create a deployment plan + url: update/create-deployment-plan.md + - text: Define readiness criteria + url: update/plan-define-readiness.md + - text: Evaluate infrastructure and tools + url: update/eval-infra-tools.md + - text: Determine application readiness + url: update/plan-determine-app-readiness.md + - text: Define your servicing strategy + url: update/waas-servicing-strategy-windows-10-updates.md + + # Card + - title: Prepare to deploy Windows 10 + linkLists: + - linkListType: how-to-guide + links: + - text: Prepare for Zero Touch Installation with Configuration Manager + url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + - text: Prepare to deploy Windows 10 with MDT + url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md + - text: Evaluate and update infrastructure + url: update/update-policies.md + - text: Build a successful servicing strategy + url: update/waas-deployment-rings-windows-10-updates.md + + # Card + - title: Deploy and update Windows 10 + linkLists: + - linkListType: deploy + links: + - text: Windows Autopilot scenarios and capabilities + url: windows-autopilot/windows-autopilot-scenarios.md + - text: Deploy Windows 10 to a new device with Configuration Manager + url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md + - text: Deploy a Windows 10 image using MDT + url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md + - text: Assign devices to servicing channels + url: update/waas-servicing-channels-windows-10-updates.md + - text: Deploy Windows 10 updates + url: update/waas-servicing-channels-windows-10-updates.md + - text: Resolve Windows 10 upgrade errors + url: upgrade/resolve-windows-10-upgrade-errors.md + + # Card (optional) + - title: Windows 10 resources + linkLists: + - linkListType: learn + links: + - text: Windows 10 release information + url: https://docs.microsoft.com/windows/release-information/ + - text: What's new in Windows 10 + url: https://docs.microsoft.com/windows/whats-new/ + - text: Windows 10 Enterprise Security + url: https://docs.microsoft.com/windows/security/ + - text: Desktop Deployment Center + url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home + From 0c09d4a3953611117876e5121fcdee763285a100 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 15:51:45 -0700 Subject: [PATCH 119/228] trying to fix warnings --- windows/privacy/index.yml | 2 +- windows/security/index.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index 934a834754..ccdb140595 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -8,7 +8,7 @@ metadata: title: Windows Privacy description: Learn about how privacy is managed in Windows. services: windows - product: windows + product: "windows" ms.topic: hub-page # Required ms.collection: M365-security-compliance author: danihalfin diff --git a/windows/security/index.yml b/windows/security/index.yml index bae44d7224..4bf6b3f5b9 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -9,7 +9,7 @@ metadata: title: Windows 10 Enterprise Security # Required; page title displayed in search results. Include the brand. < 60 chars. description: Learn about enterprise-grade security features for Windows 10. # Required; article description that is displayed in search results. < 160 chars. services: windows - product: windows + product: "windows" ms.topic: hub-page # Required ms.collection: M365-security-compliance # Optional; Remove if no collection is used. author: danihalfin #Required; your GitHub user alias, with correct capitalization. From d933bc8eaef4dc6abfc739032694900964d97e89 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 16:12:10 -0700 Subject: [PATCH 120/228] trying to fix warnings again --- windows/privacy/index.yml | 2 +- windows/security/index.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/privacy/index.yml b/windows/privacy/index.yml index ccdb140595..43423ceb3e 100644 --- a/windows/privacy/index.yml +++ b/windows/privacy/index.yml @@ -8,7 +8,7 @@ metadata: title: Windows Privacy description: Learn about how privacy is managed in Windows. services: windows - product: "windows" + ms.product: windows ms.topic: hub-page # Required ms.collection: M365-security-compliance author: danihalfin diff --git a/windows/security/index.yml b/windows/security/index.yml index 4bf6b3f5b9..d7b6fbe5a3 100644 --- a/windows/security/index.yml +++ b/windows/security/index.yml @@ -9,7 +9,7 @@ metadata: title: Windows 10 Enterprise Security # Required; page title displayed in search results. Include the brand. < 60 chars. description: Learn about enterprise-grade security features for Windows 10. # Required; article description that is displayed in search results. < 160 chars. services: windows - product: "windows" + ms.product: windows ms.topic: hub-page # Required ms.collection: M365-security-compliance # Optional; Remove if no collection is used. author: danihalfin #Required; your GitHub user alias, with correct capitalization. From a7e91c21a8074772de9abf02a2919bc482d134ef Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Fri, 5 Jun 2020 16:25:12 -0700 Subject: [PATCH 121/228] Update audit-windows-defender.md --- .../microsoft-defender-atp/audit-windows-defender.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md index cb5f42efe4..db8dec5ba9 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md +++ b/windows/security/threat-protection/microsoft-defender-atp/audit-windows-defender.md @@ -31,7 +31,7 @@ While the features will not block or prevent apps, scripts, or files from being To find the audited entries, go to **Applications and Services** > **Microsoft** > **Windows** > **Windows Defender** > **Operational**. -You can use Windows Defender Advanced Threat Protection to get greater details for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). +You can use Microsoft Defender Advanced Threat Protection to get greater details for each event, especially for investigating attack surface reduction rules. Using the Microsoft Defender ATP console lets you [investigate issues as part of the alert timeline and investigation scenarios](../microsoft-defender-atp/investigate-alerts.md). This topic provides links that describe how to enable the audit functionality for each feature and how to view events in the Windows Event Viewer. From 5c07dae31721c52d77f3ed05406124e04950467c Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 21:28:50 -0700 Subject: [PATCH 122/228] a few small fixes to commit before automation kicks in --- .openpublishing.redirection.json | 35 +++++++++++++++++++++++++++----- 1 file changed, 30 insertions(+), 5 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4993abaec4..4bb70d0db1 100644 --- a/.openpublishing.redirection.json +++ b/.openpublishing.redirection.json @@ -2207,6 +2207,36 @@ "redirect_document_id": true }, { +"source_path": "windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/configure-md-app-guard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-application-guard/faq-wd-app-guard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/faq-md-app-guard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-application-guard/install-wd-app-guard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/install-md-app-guard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-application-guard/reqs-wd-app-guard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/reqs-md-app-guard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-application-guard/test-scenarios-wd-app-guard.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/test-scenarios-md-app-guard", +"redirect_document_id": true +}, +{ +"source_path": "windows/security/threat-protection/windows-defender-application-guard/wd-app-guard-overview.md", +"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-application-guard/md-app-guard-overview", +"redirect_document_id": true +}, +{ "source_path": "windows/threat-protection/windows-defender-antivirus/collect-diagnostic-data-update-compliance.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data-update-compliance", "redirect_document_id": true @@ -15972,11 +16002,6 @@ "redirect_document_id": true }, { -"source_path": "windows/security/threat-protection/windows-defender-antivirus/oldTOC.md", -"redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC", -"redirect_document_id": true -}, -{ "source_path": "windows/security/threat-protection/windows-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md", "redirect_url": "https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection", "redirect_document_id": true From c51de3ee4ae7aba38e8b1404d1298209979121cf Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 21:49:52 -0700 Subject: [PATCH 123/228] removing leftover file --- .../configure-wd-app-guard.md | 66 ------------------- 1 file changed, 66 deletions(-) delete mode 100644 windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md diff --git a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md b/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md deleted file mode 100644 index 61bdb73f63..0000000000 --- a/windows/security/threat-protection/windows-defender-application-guard/configure-wd-app-guard.md +++ /dev/null @@ -1,66 +0,0 @@ ---- -title: Configure the Group Policy settings for Microsoft Defender Application Guard (Windows 10) -description: Learn about the available Group Policy settings for Microsoft Defender Application Guard. -ms.prod: w10 -ms.mktglfcycl: manage -ms.sitesec: library -ms.pagetype: security -ms.localizationpriority: medium -author: denisebmsft -ms.author: deniseb -ms.date: 05/27/2020 -ms.reviewer: -manager: dansimp -ms.custom: asr ---- - -# Configure Microsoft Defender Application Guard policy settings - -**Applies to:** -- [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - -Microsoft Defender Application Guard (Application Guard) works with Group Policy to help you manage your organization's computer settings. By using Group Policy, you can configure a setting once, and then copy it onto many computers. For example, you can set up multiple security settings in a GPO, which is linked to a domain, and then apply all those settings to every computer in the domain. - -Application Guard uses both network isolation and application-specific settings. - -## Network isolation settings - -These settings, located at **Computer Configuration\Administrative Templates\Network\Network Isolation**, help you define and manage your company's network boundaries. Application Guard uses this information to automatically transfer any requests to access the non-corporate resources into the Application Guard container. - ->[!NOTE] ->You must configure either the Enterprise resource domains hosted in the cloud or Private network ranges for apps settings on your employee devices to successfully turn on Application Guard using enterprise mode. Proxy servers must be a neutral resource listed in the "Domains categorized as both work and personal" policy. - - - -|Policy name|Supported versions|Description| -|-----------|------------------|-----------| -|Private network ranges for apps|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of IP address ranges that are in your corporate network. Included endpoints or endpoints that are included within a specified IP address range, are rendered using Microsoft Edge and won't be accessible from the Application Guard environment.| -|Enterprise resource domains hosted in the cloud|At least Windows Server 2012, Windows 8, or Windows RT|A pipe-separated (\|) list of your domain cloud resources. Included endpoints are rendered using Microsoft Edge and won't be accessible from the Application Guard environment. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| -|Domains categorized as both work and personal|At least Windows Server 2012, Windows 8, or Windows RT|A comma-separated list of domain names used as both work or personal resources. Included endpoints are rendered using Microsoft Edge and will be accessible from the Application Guard and regular Edge environment. Proxies should be added to this list. Note: This list supports the wildcards detailed in the [Network isolation settings wildcards](#network-isolation-settings-wildcards) table.| - -## Network isolation settings wildcards - -|Value|Number of dots to the left|Meaning| -|-----|--------------------------|-------| -|`contoso.com`|0|Trust only the literal value of `contoso.com`.| -|`www.contoso.com`|0|Trust only the literal value of `www.contoso.com`.| -|`.contoso.com`|1|Trust any domain that ends with the text `contoso.com`. Matching sites include `spearphishingcontoso.com`, `contoso.com`, and `www.contoso.com`.| -|`..contoso.com`|2|Trust all levels of the domain hierarchy that are to the left of the dot. Matching sites include `shop.contoso.com`, `us.shop.contoso.com`, `www.us.shop.contoso.com`, but NOT `contoso.com` itself.| - -## Application-specific settings -These settings, located at **Computer Configuration\Administrative Templates\Windows Components\Windows Defender Application Guard**, can help you to manage your company's implementation of Application Guard. - -|Name|Supported versions|Description|Options| -|-----------|------------------|-----------|-------| -|Configure Windows Defender Application Guard clipboard settings|Windows 10 Enterprise, 1709 or higher

Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the clipboard functionality.|**Enabled.** Turns On the clipboard functionality and lets you choose whether to additionally:
-Disable the clipboard functionality completely when Virtualization Security is enabled.
- Enable copying of certain content from Application Guard into Microsoft Edge.
- Enable copying of certain content from Microsoft Edge into Application Guard. **Important:** Allowing copied content to go from Microsoft Edge into Application Guard can cause potential security risks and isn't recommended.

**Disabled or not configured.** Completely turns Off the clipboard functionality for Application Guard.| -|Configure Windows Defender Application Guard print settings|Windows 10 Enterprise, 1709 or higher

Windows 10 Pro, 1803 or higher|Determines whether Application Guard can use the print functionality.|**Enabled.** Turns On the print functionality and lets you choose whether to additionally:
- Enable Application Guard to print into the XPS format.
- Enable Application Guard to print into the PDF format.
- Enable Application Guard to print to locally attached printers.
- Enable Application Guard to print from previously connected network printers. Employees can't search for additional printers.

**Disabled or not configured.** Completely turns Off the print functionality for Application Guard.

**Note**
Network printers must be published by Active Directory to work in Application Guard.| -|Block enterprise websites to load non-enterprise content in IE and Edge|Windows 10 Enterprise, 1709 or higher|Determines whether to allow Internet access for apps not included on the **Allowed Apps** list.|**Enabled.** Prevents network traffic from both Internet Explorer and Microsoft Edge to non-enterprise sites that can't render in the Application Guard container. **Note:** This may also block assets cached by CDNs and references to analytics sites. Please add them to the trusted enterprise resources to avoid broken pages.

**Disabled or not configured.** Prevents Microsoft Edge to render network traffic to non-enterprise sites that can't render in Application Guard.

**Note**
This policy is no longer supported in the 2004 update and later.| -|Allow Persistence|Windows 10 Enterprise, 1709 or higher

Windows 10 Pro, 1803 or higher|Determines whether data persists across different sessions in Windows Defender Application Guard.|**Enabled.** Application Guard saves user-downloaded files and other items (such as, cookies, Favorites, and so on) for use in future Application Guard sessions.

**Disabled or not configured.** All user data within Application Guard is reset between sessions.

**Note**
If you later decide to stop supporting data persistence for your employees, you can use our Windows-provided utility to reset the container and to discard any personal data.

**To reset the container:**
1. Open a command-line program and navigate to `Windows/System32`.
2. Type `wdagtool.exe cleanup`. The container environment is reset, retaining only the employee-generated data.
3. Type `wdagtool.exe cleanup RESET_PERSISTENCE_LAYER`. The container environment is reset, including discarding all employee-generated data.| -|Turn on Windows Defender Application Guard in Managed Mode|Windows 10 Enterprise, 1809 or higher|Determines whether to turn on Application Guard for Microsoft Edge and Microsoft Office.|**Enabled.** Turns on Application Guard for Microsoft Edge and/or Microsoft Office, honoring the network isolation settings, rendering non-enterprise domains in the Application Guard container. Be aware that Application Guard won't actually be turned On unless the required prerequisites and network isolation settings are already set on the device. Available options:
- Enable Windows Defender Application Guard only for Microsoft Edge
- Enable Windows Defender Application Guard only for Microsoft Office
- Enable Windows Defender Application Guard for both Microsoft Edge and Microsoft Office

**Disabled.** Turns Off Application Guard, allowing all apps to run in Microsoft Edge and Microsoft Office.| -|Allow files to download to host operating system|Windows 10 Enterprise, 1803 or higher|Determines whether to save downloaded files to the host operating system from the Windows Defender Application Guard container.|**Enabled.** Allows users to save downloaded files from the Windows Defender Application Guard container to the host operating system.

**Disabled or not configured.** Users are not able to saved downloaded files from Application Guard to the host operating system.| -|Allow hardware-accelerated rendering for Windows Defender Application Guard|Windows 10 Enterprise, 1803 or higher

Windows 10 Pro, 1803 or higher|Determines whether Windows Defender Application Guard renders graphics using hardware or software acceleration.|**Enabled.** Windows Defender Application Guard uses Hyper-V to access supported, high-security rendering graphics hardware (GPUs). These GPUs improve rendering performance and battery life while using Windows Defender Application Guard, particularly for video playback and other graphics-intensive use cases. If this setting is enabled without connecting any high-security rendering graphics hardware, Windows Defender Application Guard will automatically revert to software-based (CPU) rendering. **Important:** Be aware that enabling this setting with potentially compromised graphics devices or drivers might pose a risk to the host device.

**Disabled or not configured.** Windows Defender Application Guard uses software-based (CPU) rendering and won’t load any third-party graphics drivers or interact with any connected graphics hardware.| -|Allow camera and microphone access in Windows Defender Application Guard|Windows 10 Enterprise, 1809 or higher

Windows 10 Pro, 1809 or higher|Determines whether to allow camera and microphone access inside Windows Defender Application Guard.|**Enabled.** Applications inside Windows Defender Application Guard are able to access the camera and microphone on the user's device. **Important:** Be aware that enabling this policy with a potentially compromised container could bypass camera and microphone permissions and access the camera and microphone without the user's knowledge.

**Disabled or not configured.** Applications inside Windows Defender Application Guard are unable to access the camera and microphone on the user's device.| -|Allow Windows Defender Application Guard to use Root Certificate Authorities from a user's device|Windows 10 Enterprise, 1809 or higher

Windows 10 Pro, 1809 or higher|Determines whether Root Certificates are shared with Windows Defender Application Guard.|**Enabled.** Certificates matching the specified thumbprint are transferred into the container. Use a comma to separate multiple certificates.

**Disabled or not configured.** Certificates are not shared with Windows Defender Application Guard.| -|Allow users to trust files that open in Windows Defender Application Guard|Windows 10 Enterprise, 1809 or higher|Determines whether users are able to manually trust untrusted files to open them on the host.|**Enabled.** Users are able to manually trust files or trust files after an antivirus check.

**Disabled or not configured.** Users are unable to manually trust files and files continue to open in Windows Defender Application Guard.| - - From cf0048efef04a638c13fcef5f1078026a07b34cf Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 22:53:33 -0700 Subject: [PATCH 124/228] removing old toc --- .../microsoft-defender-antivirus/oldTOC.md | 68 ------------------- 1 file changed, 68 deletions(-) delete mode 100644 windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md b/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md deleted file mode 100644 index 3c99217e75..0000000000 --- a/windows/security/threat-protection/microsoft-defender-antivirus/oldTOC.md +++ /dev/null @@ -1,68 +0,0 @@ - -# [Microsoft Defender Antivirus in Windows 10](microsoft-defender-antivirus-in-windows-10.md) - -## [Microsoft Defender AV in the Microsoft Defender Security Center app](microsoft-defender-security-center-antivirus.md) - -## [Microsoft Defender AV on Windows Server 2016](microsoft-defender-antivirus-on-windows-server-2016.md) - -## [Microsoft Defender Antivirus compatibility](microsoft-defender-antivirus-compatibility.md) -### [Use limited periodic scanning in Microsoft Defender AV](limited-periodic-scanning-microsoft-defender-antivirus.md) - - -## [Evaluate Microsoft Defender Antivirus protection](evaluate-microsoft-defender-antivirus.md) - - -## [Deploy, manage updates, and report on Microsoft Defender Antivirus](deploy-manage-report-microsoft-defender-antivirus.md) -### [Deploy and enable Microsoft Defender Antivirus](deploy-microsoft-defender-antivirus.md) -#### [Deployment guide for VDI environments](deployment-vdi-microsoft-defender-antivirus.md) -### [Report on Microsoft Defender Antivirus protection](report-monitor-microsoft-defender-antivirus.md) -#### [Troubleshoot Microsoft Defender Antivirus reporting in Update Compliance](troubleshoot-reporting.md) -### [Manage updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md) -#### [Manage protection and Security intelligence updates](manage-protection-updates-microsoft-defender-antivirus.md) -#### [Manage when protection updates should be downloaded and applied](manage-protection-update-schedule-microsoft-defender-antivirus.md) -#### [Manage updates for endpoints that are out of date](manage-outdated-endpoints-microsoft-defender-antivirus.md) -#### [Manage event-based forced updates](manage-event-based-updates-microsoft-defender-antivirus.md) -#### [Manage updates for mobile devices and VMs](manage-updates-mobile-devices-vms-microsoft-defender-antivirus.md) - - -## [Configure Microsoft Defender Antivirus features](configure-microsoft-defender-antivirus-features.md) -### [Utilize Microsoft cloud-delivered protection](utilize-microsoft-cloud-protection-microsoft-defender-antivirus.md) -#### [Enable cloud-delivered protection](enable-cloud-protection-microsoft-defender-antivirus.md) -#### [Specify the cloud-delivered protection level](specify-cloud-protection-level-microsoft-defender-antivirus.md) -#### [Configure and validate network connections](configure-network-connections-microsoft-defender-antivirus.md) -#### [Enable the Block at First Sight feature](configure-block-at-first-sight-microsoft-defender-antivirus.md) -#### [Configure the cloud block timeout period](configure-cloud-block-timeout-period-microsoft-defender-antivirus.md) -### [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md) -#### [Detect and block Potentially Unwanted Applications](detect-block-potentially-unwanted-apps-microsoft-defender-antivirus.md) -#### [Enable and configure always-on protection and monitoring](configure-real-time-protection-microsoft-defender-antivirus.md) -### [Configure end-user interaction with Microsoft Defender AV](configure-end-user-interaction-microsoft-defender-antivirus.md) -#### [Configure the notifications that appear on endpoints](configure-notifications-microsoft-defender-antivirus.md) -#### [Prevent users from seeing or interacting with the user interface](prevent-end-user-interaction-microsoft-defender-antivirus.md) -#### [Prevent or allow users to locally modify policy settings](configure-local-policy-overrides-microsoft-defender-antivirus.md) - - -## [Customize, initiate, and review the results of scans and remediation](customize-run-review-remediate-scans-microsoft-defender-antivirus.md) -### [Configure and validate exclusions in Microsoft Defender AV scans](configure-exclusions-microsoft-defender-antivirus.md) -#### [Configure and validate exclusions based on file name, extension, and folder location](configure-extension-file-exclusions-microsoft-defender-antivirus.md) -#### [Configure and validate exclusions for files opened by processes](configure-process-opened-file-exclusions-microsoft-defender-antivirus.md) -#### [Configure exclusions in Microsoft Defender AV on Windows Server 2016](configure-server-exclusions-microsoft-defender-antivirus.md) -### [Configure scanning options in Microsoft Defender AV](configure-advanced-scan-types-microsoft-defender-antivirus.md) -### [Configure remediation for scans](configure-remediation-microsoft-defender-antivirus.md) -### [Configure scheduled scans](scheduled-catch-up-scans-microsoft-defender-antivirus.md) -### [Configure and run scans](run-scan-microsoft-defender-antivirus.md) -### [Review scan results](review-scan-results-microsoft-defender-antivirus.md) -### [Run and review the results of a Windows Defender Offline scan](microsoft-defender-offline.md) - - -## [Review event logs and error codes to troubleshoot issues](troubleshoot-microsoft-defender-antivirus.md) - - - -## [Reference topics for management and configuration tools](configuration-management-reference-microsoft-defender-antivirus.md) -### [Use Group Policy settings to configure and manage Microsoft Defender AV](use-group-policy-microsoft-defender-antivirus.md) -### [Use System Center Configuration Manager and Microsoft Intune to configure and manage Microsoft Defender AV](use-intune-config-manager-microsoft-defender-antivirus.md) -### [Use PowerShell cmdlets to configure and manage Microsoft Defender AV](use-powershell-cmdlets-microsoft-defender-antivirus.md) -### [Use Windows Management Instrumentation (WMI) to configure and manage Microsoft Defender AV](use-wmi-microsoft-defender-antivirus.md) -### [Use the mpcmdrun.exe commandline tool to configure and manage Microsoft Defender AV](command-line-arguments-microsoft-defender-antivirus.md) - - From 2c2c5a1e6dddf6ead6046bdd6d7a0018622a7338 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Fri, 5 Jun 2020 23:34:29 -0700 Subject: [PATCH 125/228] adding redirects --- .openpublishing.redirection.json | Bin 816257 -> 2577134 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 4bb70d0db1570400098d807227a83382d118f02b..e08222ad833111340e441425d1b6ca165a2c6231 100644 GIT binary patch literal 2577134 zcmeFa+j88<(YD*ij_^G={GWdO=oyc<*YMxLI&er7CDB8QGB=}<9lrIoRz66j3WWwx zKsR>X{f0sU(Eur_Dxb=2W&MBu?|*i`-Th|wyKldKzkAxH^VRovU+ib_*8lDv z?C<;i?tcy(-59O?`TIvTBKNg%`e^@#7yBPQ+l*e@FaGa0cE`Vg|0AQsSiiTo{%DP|q%_+Y=8^Jg2cEBpP%#_@9{J1zWdL^S4oglid4SZlRDcWBjxLV50=CEDTm5mDmjIzYom!7=Qrcf_6f87 zu_6}+KiPXpf%T2mdXAMuGB;f2UTqEdU=+SFDsN5hoKiFj zdg!j2vF)$=L#6Ovw%WMO5bM$N?*G_l`55?GoNJP+?*#j3eYShF(3R<*M;ocD-CO%P z=vK&mmTZ5w)ynJm?`$0?Sxtwmr=jiM*y?j{GsOCfZG?^VZ=0oeXR*HiVE?o7|8$L& z_I)+hSYXoc==A0+xy9}l?Y6Dz?)9~~8e(0t9->R)|0mfSvIfRG^Q?tX_)=-QbI|6j zdFg+&hJ49$NxsZgW%<;JKV=zfu4t@%Sc}++Zr>3#iM8#@o_@0X<_am9jP(B|5uW-kfHK*2`Rg(d_45f8~cik0zMzPreDrj3jfdE|Jq}J`Tw2l%10Xo za&MlGb28VEVZ~tTSr?+UL}AFmz4>;1wy%&`e};}buZYY$`~N|yq_4bkrZ?tULmw)s zBNu!7JtK;x=xZkV!qd$9Nw$*Yl)oA;ThA7Ic(S$2y^Cv;9ab-wBdqcI)2Jf2+Wqm{ zn)YPxf3decDoeJ@*M!qp>GJHq%D{+D;(cuH$LtA5`oNPf#wo8CBHe(N&0eUDfY znC8Cz)t2jT^6dS5bzrx!+oxrkk>9WJYp;2vLXZkdssUeZblrX@8c&VU{`j_4S6)?POsyp~ za#3@s>ZCgBrLW66p)418W?oH$eG~H#_DrcFcHDPUKk5~?cz*obKHD|bWq!50dcKE$ z(Sv=)-$EXhDj)2Nf7{pmq;ueM+z96L=_50I_QsBX*SN1?xt(v;BcIbYt+}L(u!?^% z%7V@>cK>8iZn7(U<~8c~M&Vl{@ZLTbh2!Q2YlV7jyh-v_$zx(fy;2;FiQmb39Jwu@ zku}&m=XmC}=sRYG7Kh_FJZ7xxR)~l!*{SvCr)INK1MR*h)@f+PZkx4kGl|G?L>@EN zBC<}|n6FQb$b8-Y#pt9KFfxlGH1?pjMO~VEHIMTkj~n~7iM?cx5-%=dF+*cLtj^8d z&mIX3pOKxEPv+UAyw_X%gqm@3|FI|9cf?XPg-=P%#{IWAP<;=!>)Nyr_Z)QTG^74( z``7Uj$!6!V?Y48f_4&@D2YJM_xl5mD{JX05 zA?Zje9)7T2+h?jRBN6`}x)UVZoblpq;wiqD^v>>G2YRIu>kprJl>4o{OPv_qASBbn z?ZxrdVttm_(}7f9TMR5!MC@B7^{3?IQg@G2j5iJ$fmplqcog}NG*0Nmh{j50*Ou9Q zW@2?=O-Yem@AX0DzUQO8O6FW;c*uw(Z6yhwQiA&|iG8~~yyfWSlPq?;g0_wg=VdF9 zy+Wr@tm?CE4Cpin*aO4gbvN@4O`S<{PW{u0(aHpYyI1$YJ#B=_6MX zIi*DAe#HJ-LH%Ai2I$!=B6LVDbL%w=*S45FLuI=lHU+iP3-^6bt2J6Hj{L)L<~u@msZyk?xJ zEITIoiRYnBjvv#uF(l4JCA4P-@QTQ=c|EkM=Z9NRL;4>s!43HbqJ!7~^i?KHQzs$W z&cE36dz)$I+`VHeA^7f8wGWMC2e+?FmKfX9;ODY!uj5xqJWsR;76^8=cfjMgR3vlkVpKkVqUlE-C}uw|cbo8w-ng z)KB)Cwfx_9<$pX^*W*h)0ibEgE+xNczJFbq{1Smi+KHul4>YR5v>p%ld&k#r?ML=} zb@doF{%fo`#3a(WP=5Xjdr9}}4^$US#Kx-+hh<{&Ri>{mLsXK@IqD*AS>pERGLN_V zo(~a6bh%kg+LoKx(h4S)w#kxv!x3TiJuJZ?>u>ZtJ2elYorf`9V1|y2Bzv2Zoh-U~ z#I$K){IL6j*={LA=NiYmQCwn%VTw@`5!)n!N(C$j{1P(IUUBK4HoI)&?{sA?eCH8S z7Bs{qQZm;_ikxkelh=Pn7A^>4k0W)kL}bY|&|A?XmZukiJ>Gr_Mh+h{(XeeAA_mj6 zsi^hzT92HN%kv?Efw3bc$=|l*V;K?GWEUhgF90+U5_Zs`N%l0ycjgO@K6s0`s%YC2j@LdG*F6XA45U`^QI8zI7@0-R#r> zk^!S{Hr2^-LJ9py9_`7ieNI&9^v+<+9-pzuV`<)tKyLq0_5M2^+#ZMOR2%X*RJs|ze=rZb|cT4)& zW3`;5HkBl_cb^vfO~SkHPmld3hx71XuZT&yKi{85m9Pj2i$ z*pHKcuFQ%if0+7*-B`Sa6Dp{?f?W1$P`gMC)_v9OhyH3G?75%m`Cvbldac~TB*J!A z^|OsETiByyGH>nI<>=?}^Ym;%3Hy*_@H#;yX(%ouZ~RiN8zZ$3FSFa9!U9O9#d2a;Ph=_K>W zZJn}}E#2y|>iK=*JTC6%P_rAT-U~DG%$K4Qr=$?=M_n-;NI3_fd9FqpTb`2pug}OD z8ciN<$-|8mIK_adBzRZ(M0lKDF4XB&H6LC3V=Z!;e01M$jhu7bsk>}-?NBSBIntu0 zo08^}tx=P*aOBg;h-1sBYJJM6-%zf`&xOcq^3{ER8sw$A6}pf588C`p%;jIT6W2Be zBCVUO=9BG`Mx}}Ow`P|l9qT?-F%POsOha&T>|4qpj9FY{XI>N4%GEh;7lts1z7C8=|k9w&s(q(MM&$xpi3DX7r;u(xRrx zM)&>JsPQbX#OvuVcY#h!Y|b!*wEC>Nh|@pjd;#U z*3l=xBd+dOio&@mJZ^qOXp_V4`%@z{bzJahy||pZR;J!h!B@qIkkN6WeckMv717vD zU-QZ7(fDeePv|s=u5|xVTs~SK#@HuvNN@DEdbMkdZFgI(-CPct9}(K*u={>XgzoQ# z#xA2D4QJ?J-NwqT%I#??x0?)(nE_GOO;z*Bb|`b*=CwBOD=)Dvj}fbV>*s;Wr<~rWTx#w_c9Y-k`|XgO&a~OzF;K6)^IgBJ~c{X-o5!#$IGK`RTr2lPn~J>;!uPh|G1>jmOMNXHCJ>*ijcv-Sjk{ ztW8t+Yo+}c(fQ?VRiPGM+y|qO$Qv|v*A&NT!&JD@#a2{KMdcc^C%T&qci(S^?x3{a z)1&&-_u5Y(80=Oz(8TnOOA5t;a#@kr%H9_rBjS z*zB|$c5YMq#%ZFWbt+nynJ*FC9n#?*3`( zgWKD`*jK7sm?kdF>d@5T)69KF=n*k_Q^l~TcIVV#&R%-7lbEQ4f2t_N zdgeS&&h|uCqXCF+MXmgkJtOY*RQ(*UaljG}eN8=JbTN5nZ?;}}1eR)cQ( zn@`qV4LAk7ULWX@uS9DQ{G@pGB$?TFHr_)=Tog4~>Aqi=A}Dz^?TLP*Mv&96AMKOR z_I2LT7d?xXY>Q)shD^*QG8Nk*M)=M~b&i^Pe(qW`D9XF3Za&!-$)DoYtxU45KR>!Dl^tT{vxcKsOFP32_vuKU1Pf|2kSPgbk`KRYwW0t zrY1Ap_gkT9e-~g>CP+I?qn+v$^^LaZ>87RmWLb=PO;*8Q%Q)#Na|9k(KuR#+1A?_`Qd%OGX?l-$`$?bab z-`)Ql_?`bb@cZIlvMx)%R$7RPv!uC_ou~ZSm#Ug~u1GyS#IXX#kN+Bsd9Fu<#V!hJ zkJ2uR_Wnl9F!6_{Dw8%WMnT6$GH%qbP|@TgQzj&?~^4 z*I$i9svM$^sz_Xq#J+hEk!2F&jWvnl&Q~ij#CQe7&VPh|{%0$H*Ym-GT)_2== zpZ$c#NBvfPhkdHZlg~GW&j)G8&xObfuFBVS$>YQd=dLYJ+tg-s@TMnCz5g3|RCfOC ze}DS!uZqY_vWJd+R?Ezn2riQwZ=4pvzQVs6uhf-^%xU5@B!gNO^B%GY&?qXrW@ zl1QOWZj@CE zoi(>+?3x$vMmg8qiR?1b@y5Dj(+`c#Wv(5&^e6oZv2cn0xCV9GHafpZmrkKey*u6U zvmyF|t@3qE`n+0=KRG=Z_PmGS{ti#YQl~!U`>?SWS!JT)jkU@8m*pw$%&}phe>!aOn-`C^J z-`&_9 zpLhgS@tP^(HN&|aH#?#;*ehR8gU)(3K6YFT)1kiqf)lJgH^O(b`ziW$cb(WN!j~m{ z`5D$KQC=P5jqR-xsj8jXzO_ug&TMyVH>1W-G_W5X^cBVvaFj>BCjoQ9C zbFal?cf99yhzKK-pQ>txH%4mg81$Sfc6rhn;&(27=bJN;TqZc)I3<#iM9vs`wK!*9 z-zQ4fptO5FL}2h$zMc|+p%=-c-`dW~H@jb|$kmgo*T2Q*r;jK1>B;W-5P@a#;*HZJ zko-jR1XJa8=F960dHP{!#+*g(Q~<7vm-joRK^>p zNhc>j5|QhF3w#|u149?2et&$i~`8cWZs`3-P4^RJ!jNByuDfO9@ z_MBULPCsWNxlC}pv2~K^bclqcyojGl*R*%VFC#ElC+0p)8~h$SQ=&GQEMK=z?W;v; z=`M-x&AY>jUurbioszP@b64mO<9Dh#TZ3eBbL>F4-Tij=n_Zcp<{SUr{m+5l`JV&7 zFa8DVvK;-m(64@$BG;%UBzEy&o@<={N?eJ(HT7NIsj}h0<^U~3SLiN%T(4tN@4YE~ z;q_;74er?^@ha+#Nw58D>XrR{I@jNK#_c~#EI%9P?~UXy#xg5{uMg}1qT)Ddu6>@P z2083PPE4Ufk;*6UQ^wjLzj_+KI;h{T7mbSYxo1+;hbAvyx1j5T%QpI(JF?lK^2OMF z`ew(I^F{kV7|Zk|d9lw$@{}Y`Jv*YaOl7>WHl652I#%CWWfL|yb%xY9-F{sE+6#zqP|t4*J#9iH-ar}cGXtz2s6M0J_wcw7tG$*lV zWpwAt2$jcK!~_rJ>$=3SmL@sjPAB`Zg0x4}nm#h#-*mdI`O^=b4bfMoF5Xy|K2Dte zxyqN|`}K7z+mE#>_A*86<%>nR4xa;&795qYr$bs)3o5>eZQvCg;o%%P`h4jzh^mC?lASf?i*Ix&aj_6M0Hf`O*Je1qI{YyXf zq$N__LaO{vPsRIK-l;0knGOUl)U1t;Pf!5T$c^-O2;aCcDt&5f9JAB=; z;-}R+(xhC|*PXQG5O)2Yt!Yb6@T7wF-mEMlLZQ(TpU-A-Q}0F8f;gq@;y5Ah+Q#Ff zjf$T@HGc#*Un$p{Iq`nFyi+y*$$oQMFZ}`ABL3k4BX4b5T)K6vZmpjVGL3JNBKPGP z6|bkpYa4am%QO7k)PcSdQV7be#`yXIr{cjKG?eRplY zsM5HxJ5~lF8+^UXBkt{EdEN5w8~)wHWcH#Uz$U*sk+v$l!=8R9iTlAq4v`p)C8#PuR_Bf^q?8@hHKKH8%0oTx)`!d4_lhmK2x zMeiZ{h7mC(S|r-W(>8vTMcFw~Mr{aM?Y=r|tX`R`n)bSPHdK4{ji<;tFLKD(5nV+8 zP{sbq?&yW(`-Ix-N~EL4>nLiQ#*egUJ15#cR&hi;uTRETzWYNb(>Hgx43B3F8CQ{X zP9)(|vFpJrMN4&%(pTg4)wmHBUFSd-^_ZzU1~SvEfavoeMA>l4jvHywwtd<-cggD| z*~xNcHP319FtK&^J=|C~3~C{%gT&|dUB-9`WSi@qhr55;rBFwFC$9o)tFmHbKU)@Y z>Jh{XG}P z`Br_Ef_)<`!p@Jdrk&U3RiA^-I-ZarBPBvkn~+JQyGITG0#O?5&QvZapV=AJ~i70tTQ})_uCv3h;?YKWaL z>#i+|m+Ph><0x{@i5%_Yh@9zhR^56_aXi+6NJ@3c+N&Dj{y^|BvcQ^jb zuqEgy?>{<(}=#xbj*pI!1k5qNAO%mu4aBp_N?e4d`-&CWTOI+#hzq|iA@H@}Z#=0|GBAqPhR&|^+ImE_B z!#vn;Y_wnPtNV-T-8#+&n|_?7g-WES=Udc5Lt;a+-^SW+Lq=8PBr-~0ZIK+Rmgynx zXV&|9ii$|LMWowCO447F`Sg5?((io|Uca3;`fMJ>qy57Ef`lj8U$!o!e&6BEltxWd zB&jcbby`#m^J1{(n|)?fcawL%EVFdXSc||Ccj@_Q5%|d>46@J0X(h%?L?nqXeYHg* zj>&$Cmo{F8=$AF9xulr%&t_lW+Ui7a!{~&4TXma#S9Qqr^Sr!+oA-zz2SOe5mF4eC zJ)hrL$2V#{(oZR8QcsVS^8cxMs(XK*-{zQMw_&Z#J@RX?h9~!G|377as00~8RCI%0 zOG-|U&$P1P6@ImG7O`Q0{k~ew=`+o$PJi})*qZ%lU%ghDK!w@EzjFWTjf~cuwy^SqP2COn%wJ}FEB=99!pzuHvUyv zhELTAsP~l@;r-7(n5GhmWdh@kQzY@N%`v^={j^SY&qAs1pq1yjEl&I9N}L9Tn_8ZU*a6ZA^C)}L!p}70jC=h1>*$ltLo3U)pv-&!x$Vt`t?y?L*pqczO24`F*+ZN zHSZA#kDMt>cTMlH$u4H^H3O5P5u%9u?eC>2+ZJ^iecY3Gj#cwmt$@q`6>6-CZsnBb zL!6d1i#E`!A+l?@iO#)d}HxHdU!qBR~|9+2&{D7)Wi)RZLxR$>_OZI`%PpZ zI_!(NshKN}vRFHR*3fcP(-RdwD1vyuoq-$)&*ZK36ud-B3J=iaLPedK5;*{f0LMvAv)hpNXIS`G%+bw?r zPO1W1v#$t!^yzTrm7=WoUb`v==VmY;c`i# z%fe3+rrP$Zs`>hCpTU;8=h8L(n2t$fY>D+|L)6Ym?fh2gdXgiHv|X!~XGF}MK66BA z+y*80AQrk=$VW=DfBLddXFqlZP(w?65*zZ~JO)wFO+nX~iHA9P=spdP&O&s!`LyQ+ zQ4t)uWJTY@2b$XdTzC9M-JH~&m#kchRvQzq5WU0s;m!Z<{^!6GF;AtY>vW{&Qg|MF z=EN|jr8$R_zf{+SG3>omeM)Yua}6g%v-6lPRH?@!-ujTAr}KWM>I7b%5ixh#%)J_O z>=5w&(wx0c{*KMNjn#YOW=AZZGK+7GLA2gY74@Nu7t-RE4;>do z-?H?T=R>^B$=kG%8b6mXY)fL{bfdDt~~3}2hS%!yo_!!=)r4L|X#e@4XIoXmCAsWs1H zV?Q|O_}rLWkT>{fF%{+O=BZIzbL>UioU~2v!*OD4oR=s@U#t?`d!kLH&&GLmYt4qJ zos-(bETPko9C?0So?nS&F?W8<;T`&JbbLcjA)#|P=R=E=;hc1jqL?{lX5s|qcgDuE zd4O*%$Bs`Jb!Evjd=@XZcEACZK6uU^`5!ZaV&#-sY4_ptid$l9?@cz?^XI*T-dViu z#$?6&$4ck4F*L=t?ScedJHnUC;T*?UCs zZz?~*Z9i2jFIlZjEkK?}S$B>^_;BsNy}hn&>-xI#BwKihEsPgFY@WpDoP2iGq;N{p zzWv&yt?tn@b8!3TJe9Tm>9JG(KQ*)CS5>6)y-ELm%(6MYP6_X&KF#x4DC$BDuBp;! zZT_A#T9>9drO4_z**>So>0wdRrj<_CT(+od%gc$op115=3d_f5K->qd`uAgm7Clh5@wjZ`^m=p7SrNtiw03*1X)gXGS#dQ`_~)c$&AOb?25M>DgoSY|M^W>>_Xf^YJXM zr&;On`Pu3;_dQ;DxMO;s4v7z>4&XyPT*#Yyc0~0)y#tezc zE&}&IAJ61En)Vm--tMGhH|N35J1-)6pV+QX#*@4i?K-avNv|HGSAA~8VHb7#pPvSY z57sN{xvC<5w!Ma*?H7Ah<;5NwBR;-@ziVd1;67_zpNwa4eyjGg@%6a-wK^+~J>W04 zPwUC9x1w(4%*+}yBbvL|-T!<%&1+b;YequAj;nRxq?kEpL6mkex&QfiO4rex^Gb{~p>ml|os;aV}xhFIHYs_T=bSUWzeU0)J;podSKb4a!B^C}%FFUc;PKQd7# zg8jl&g{CviIoJHvqFc8%*J7lN5l+fUws!vrN`rLii~Y}+(jdbvG*&^XrJrm?aRzLm5EYGhd3qv%4I<+3(sdeoc z5xx7Ac6~CQ-no6pwWa4$bmzDj*U(uJdtIdMe?FeQsWoTwL`6=qcrbg(PfLGm+VkFi zzesy7nBm*+uDATGh~j-(yFM9D@%$Q8T;F_)ER$EDKf$y8es3$;|Jprk+;zhnxUS-E zL|yS2Sn;my&yRL@Tdjs&R`FOZI(%ltU>9-wpKp^v{7(R_u`xYTAgZ7t5vmKfB-VezVIz8*{f5 z8;4piO|3^37d!LbymG8ce0yc{mg;?!uUTnssNLiw3Mw}FddO^#xAdj+hLb&>>z{4r z@V~vf$)jJl7WraUnBy6=~W zTl$49m1!GdU$(_UMe;e4ocxe6+1gW+q0`gJht10|QM3}@vT29%|2x}vNu2~W5cmxL z_*Mz_(LVos6>s`|!^=OkYGMqB_%QUr@+^8(^oxvki==(D#K4>kOl?)t@tvJ#S9X1} zUqsl*u0K|`sA8YXb*a6ry6>+s7b12}Vh^)Y#%V1vyq&tsGRNX=PTr>0kiVK`if+8K zO5Wg1)n`-JHji2F)}0a2J14#KYs+<|N4{jcFF9;h#NPJU8yim>Hq+vyjT2R;L-E{W+1A%PH@>+g=u7 zefbg7&8qIUIU!E4zs`!iKHBnUr@>zPJYNbU_-80g4^K^kdR@aT6F>zZbv;XV!(#L4Y>3+2GVQxt%4!{_F~#wgPC^*MvY6|mEPpnhxoJB#bj>H) zfs7T;_oFY<^fbN{|MB?sZi(3twKR@EWi%zb!0;;NQLgV%&Oa9-Hm9=hZalGTY03HJMmn-9PTS_+r}+?XeT3!DPKP&a zqZ`wk_>uH*mF_%NcTQuQ?$3+(%Ngst8_(Y|7V2HKSAB>tIX)+SDSBkR`8uA+xwYSNaw2`# zrtkL0Up$pLiZ`~$Q|`%MHF~oRS-+K0yt3@;eqV!Yi`rmM)KB8Ps_G%$S2jlTOoqOh z5Mx15`MQ0^$Ps-u%SyWxv9gcNP#i~DJ{RJw%vZcIp0jDawS2uK(-%ADuZ%5f4$~fb z#Wa`lqBs~WU&m8Cw}-a{36k&E=KGDA88KL9FW%TXgI89e^Ts?wRnx3%tHvyd ztstj-9naSER_dpUo?Ej}InP$zY4WJj{J916*0OUTLd#^v8{-LG!UA1ZUSw}}*_-Y2 zAijd0@^$-sy_$W=*=23@P+l3X_|0+goAEKyI(Oyy5szgK;lk7o$jBpVY%cusLt|Hoqg?^ zGut&&VzkU=ym6|Ga^8H@hTQIcH643zyi$?M9!b%&yH9O(#qHIEKXgu z!diM~J6Pyj1!K3nf7#dG*D7op#UhT4MdXz*{kwzKoe|MnrZ(OfPw)H{E$d2;{KR%Y zaoDVgy&$W6-6DHftDjAahK=Mq|CA|THdEd{3u3FxRJ^f0wmz9%`fF8n^1;619JAaG zCK^q3$}g3V$nyu=$MB-KWi?unWu(sMv-Nm6bTq|K5K_KwkDx{fe3y#Xy@uZ!Llw3-5L&Qep`%=$vNE-3Ze1@;)Gl=1Q zWo$bE1nc15P8a$6j(2}=mi0^JaXs57*Y*qh^2V$U){$n%u>Z9u>*d$WnpYY!pZ~tQ z@fvbz-rUpqROQp@pmc9m@Q_tsJpiZa0odeie?G)pA7S~kt@Cy%cH_QQ>&tZK3`pK{ zneMyWy1dhuk60snMTsmDjn5;EBBCu%oD)$VMKRMyN&ak$%;dc*#Y8(3`6x-|bGh!j zTT14~>iv91CHHM|KXgpTdt_@6^xpLUeU)eV?d~^Kbfiyi_n-au;1gT_vpei>jDN#Y z3=Q$VJ$t|3^O(FoJp<{|;nhb^W_@vw?L|%RJIh?9^H)V&8*#^v>l$QT&bh+#$H;QM zbYN=0^c2-dU#ctm z>aBeRN7VDN_n4jwsY8|M8b;UHaTQl(p5l#D;3{cLn0hviMKwBK53w}Idllkx7?)l1 zvIc+h${+&WGF4WuX+d_)wrFXirCDj2w0?aBTZ0sNSyOV-MFsv9w%^BE6{tu#EmEXY zN;+kT{pFFq&qf1h2a-d5G95)Xrq5MY^`_EV(J4@jv@tSt^rTP1uPI;0dp^_FjmBx3 zWD|7y-_$juV^${L+q~>Nh}1Hn@y2*klT|iP&9~UCpAbDYyF>HEVOjL?E6#$V@^w6C z(`&>pm3{cuqUD~A3evQr_t+i1<22&(^B_{ogvJ}=NnJuCE-y3k7Tdi=_B7*Xx2>b% zEGQ~p$8$E9MkJER-X?rS`p3MnI&|VEWWk6vQ_Z1#SnTCrZnax;UPN-4;CN#^$(JER z(xCksbO_(#Feocum*Q}I48bj?A@eO}+L+nzYyZx?c+c(-p?S700{?S#1-n;(drxO7 zSN~y_51k0;`OLqHPwwoq=v;6~IlQheP~Lz3y^Rl}$9V(ZAq@@pVk1Z2s3FmTOQ@up z+J0xm*BJRVSi79cl5>%gOVMOQR=3C|h}g0f=Wl2y8+9ye%gv=QJkFx$^id*Waq64& z;ZUmS_Qg&WI)Gs*{=@7;r2OM|oBH<+Yw@}oYwtQbCf|PCj7sj?ys)yZFB0Y?VGhd> zi-btO?g_WzTW2}CE1@-_UBmPf3cY5tyxuy z!!4J=g_*g>T_ny);xbxjZW)nY>-J+}?8VWX9L=lIJj?WA8t#*wI-)w>CF^)|9k zh}Jo2U0UlcB{kB6Wj*NUJJBI8R#UMyCu>t{#@BBZyzDh3zVTA&Lvj^9pV5JhE*_q_ zkVm+jN4TBY5!G{2J--IsjwDH|wrkb#GbASGWO8av`?bng)5lc%Wyt2gxAB;IpZ1sx z-J0_ua_1y>er>v@>_~sM>(3!`BJQ@w-Pr8%ka-p(ZH#C?OfLQBcX|c;>p7W1F`DCI zG~?E!7)O;lH*%ycILmD!AzRR!4 z*&4GViu<_DpN*$@Y3;d&1WAVu(V=}aBL;KM`tFuuaBLJId89CZRq0pis{HIjF>;EG zsN2tVwQDY7Ep3vmXk|nz=d;+C9CzuWKJAk~8?TGbLq;w|n;quKiPoHw{7zkdunqV9 z|0Sj7Quv+LhL>i{N$$H_Uo*Z|wVG|G(sN4vvk@rEH7r-wp7H&b#%Ra&W<%8Wahg9H zPwhENjr%PdeT#Wbdd6KT}TMP1M<8|${c~NHhsp`f_$9X)Ymug+7 zGmgB}CB4+8XF-(aB=+5nr?k0xUK>{*tH=Wx%`3B@p3IISzrtB+Zbe-;PIthj@-wVH zRbM^X_eDNb+&L%_#j-eTe80E0OH{9v(YNu zxLhyQ=jxoqwdX}7=d||SjVF12Z7H@ntM%DBQSEEDsk>9{{|)_?%$T_mhkfMb&&G2& ztwzm%8v7^nbBV92Y@DBp``N5uY1QSl>UQQvMCa7@-Hj)DZq2$KIZ_n2Ek`Stn}TTCPzevA}%4@^;p|=oY$D^ zwRSG^`4NwO1m@4S$0K%Z{qz;(CYQ=hVjnzIvG1kkK&0k0_T6od)aB(xmTSA^+QqH- z>LV(DHlDAtWil+!kB@d&RpvZd28Qk!to`V}=jQe`& zhut5l4D`F*JS*X=X~=u~*?+eg_?=xpRzBlrBjE404qRLQaeGIz`{b19Jj|<@LRuazDiXVvZf(!RrI0q%BP-F?96xEXHWu4I z8y}TeN{bQiVE5jm*$r2Ay=(Em+V&HTw|Xvxw<*@D3E9Q({{^A(4}xa zl^)%n88O&KTl;5AF*x6BiQta&cWOKeB^Ow!(eUpd=PuT&WJJz}6yh!72LuDfy*>!e!@{a>iWeYRh2UuoCDvAYiDTPxR?HLU{e#J7Dqeic|R z2Gp*N*N`yj>f?3wRh7N!TG7RD8?Ei1jc0f%P5x~D@NJce8KPm7gE_td%kTz@6W(kRLjkQ z2yLga?bGpuE~VL)lNV{bZf!?jR|u}xB8#s!lG;C8im!2%aouaOSZHHGb#S?K|L4FR zi}6#IqGCv-!Ydt}2(t3za=a&tY{cVi#6#AkdY^tG!1{TfH{=?ozD0A*{Im|6=vr?PEGdi;1FOqdIW zA`4^3R(zGYiZ{-QFSHxy`011bKP9v846egTYaeAX7etk>+hcBs1thPm%PVVRX`GI0 zdwcwNi@`E`@y01K*tBf1jfg{|^U_Jtm*Ta}L0$g{i?5)keBB;jZSs=GHg9*on&$>f zL`}p|dyZ@0L+cwwF;iwG-WbnJKJsm6A`LrvfQZF?<$I^o;jYY&dbMZ`xZeY|9C>hQT8srj|NXGsA#W2zcI>csCXihgG~EBaV?O&^sMx0cN!tHp^(`N_qQ&oG*$uCII&@*3}(k2>*&^UY!hDJ4;^B_XYWX2m?BQ*BwQ}bT0jj#9m z3Qp+?b!+?k*+GKjp%I65hiXd9rI0%$yWJd{{k;gw&5KA5PRrLVlk8fyxx<#KF0}EL z>D;f?PB3ZS+iKP8+W9;UzjM!qs4dePZ)}~~w`M0l8mB*3b~0Wo{dAtpM)tZ)dh2|w zzCJ`YFGcSjYRT^FUf3NzCx`yMA~^UgU$;(hy`NKEa)>u!Nz+FQmVGBSm0EbmqS?oU z-dM!n4yj@*Thh>c*!+m>GMUTQ@5~!JuKUJFjz?RF6I16(M-n1hNGrZ`l33A<$J%96 zA4*cYZXP}-hyK0N&1LfAjjiiuI-s!rL$KFK%LDHBfDfgni`KUBKlJYqnZaH8dJ1Hs zN!bDKWV+`|_7=_CCO5K~m(#MpR(8&q*%8%cD$m_w_E;AEEU*SSQG}X{uXY#v9ob*Z zjwI>fCH3&Qc@fDXnaYh9i&8zBuS;y&cU$sl@_WVbk_-=>5z#Apsdyy*OfHEWFkiDn zSi~+%Z1*gPQc>#tO{uDSuE>0>azw22WQbr_-tb`^CJv>mJ&JYQJRSOPQM9YPLc|+e zk9M_nGKO&1M&5r|x_L?6Jak4xZ!p$<)z2Q&ikgo0T&MED%jJQG&xr``CO4j3 z0>RW``HsNwhQ;f$ytd7N=nMwCujfvuS66vIOyz!WtXhRE8GAOa?az;Px1?n}WHv-? zH?8sH+^IdJ8e`w*)eZ%(X!QD0c57jsG`ku!D^m~UZ-4w1WeQ%)*KI|asA+t$tPZm9 zZ_^O$)_pbk@m;$}(5>Zf{jP3#@n-A{RLp5U%{tZm9Ll=LE)yMZY>8~Dqv%5OSk+C{ z_vJgw)Kzh!qrBI7yw~C5FEWFl?&~>O!MS7{V*kq8Em^zy7>lrOvf|0P5{Au+H*{s* z5OG`SyZQCq{+Nrv;H>+4ZUn}D?7R~KcBk*yAwuD2R#MrI&-umfeP?Vsflt2WT)rhb za=tlgBYrGow%HXu z7Nt!VyYII}=`WRreYHPX>1F%QWBcBkZ-FI~##y9w6B19($=+p$Dsv8H*sk?1P2Mj& zawVVatxwjCO)SpC;vq93T7${%>p9VyXG2)MBS!Sr)^RFVV7T7bUtZ{3Ug%+SA!55p zjVI?ztoK5UGdEz>{TE_O-djz)F2n1vnGmhPWcT%aX>E@P)wQcv5`C=n?(4VRs)`uR z5i!cO?O`(`n!72ECznjKbnh~{w@fcHAzFjU?(6x|TGz5jL-@CGs+L$?hSeeSAX2*t zjVG5w>Vx^RZ_S(a-Yw+jsKxg#FVr$URJ~qgCC_gqH`yIFGom?|?Y^E9%~)ggNU}$y z)b;<-s=7E;cj*pHhtG$|?It#!oD;cln|8ynx|5@2PaJ1;NW;#dVf)8i1O{i_*K;E< z?KF)_3E!voY4VJ=D!?Am5(`(k2%HM zw9Tmc3gt|n6VZpT=x2XFSmX#TbN8*b-OndcoV65ZJ(RG%QCB=RC$#TwOYzvl=p$yd zZ{hy1`@>H3%|~DNsEfWn-tuRsPahH5efshtRJc!Vo!oIuHA{3cn})FQBQFYb()#Y^p^!SWM;6=O z$==Q9i}7RD8)4Da$5Z}nUb@n5alFo^CLvqWBo4;9qp_EwXM&xn$4_MB(%*MC4;fME z*31sodlI>h;gq!}t38AUDu%Jk@YM+Yelj6vo{@L>TG?*cX!tnfARes37pnY>CA^!5iYz|E2Xg=3yQPzbKxak&dUkey zwckVpqO0G#ip5JIYn{;*RXI6*cXLsNhIwZ^&?C-uOYA&%xNc$} z+U0OE&3H-j`(!DxVwnrZ^YrLdXS@~L7 zZp5?S8&TMT9*@8lq`u(Av>O)T&!WxNF5>^C74DcZ7F~Tj<St*9NQ#u4hQ7N~ASLC4zDm;+G)*@p^-&ZdeN5!fPJxi9H}I}c_vS-M zn;fc5_Qz7R& zQv1WM9y*#(JLg#*DtDr$&Z`ut5AstyiEV$d-|Ru=&wE?dWibxdZEMe!Xz$}Yf3{89 zshpsS@4>DxKGe$-rNb#bbc{t;PEg<7DbUqzLy4wCY3d$R(bLCE{%kAsxW|UQhz$Lg4F4G{e$nx ze=w?u@Qa~thQ^Pki0NY_f3_83{#oU&SS|639x8T-H~-5%=WHymB~Lrl(N|QuMoqd1 z>Lcjb(G^iSHGOwmA*!A`_O4iCs|>_cA5+JVuc+$dD1WvMs@Su{PC>5`XXm;{(!FBb z_cSS<-j^#LHi9A}m;S!HZIj_On&dS<*sdk-DTH;$PIKRF`)nC3JR&*{p`o6>?_5;X z#UUgeH{v3%kG1^SHpqLmXoKgD-xy`_HB#XDrTV^IkL-P@wAfqosmL_>$^Jz3Y(Q1)JXkow4(E<;UHc}&XQOmQA5b}&a3R=r*eZ1 zF7n5^{jq);rx|}y*~el2Y-?0{$_UeW7Hr1 zVx&BoHbk>=S_RzvY|=taqO8O&EAg#a2V+K3q~tX8-ED!C{M?p^`{y_kJK{O8ZMNdsQ_&qjmqmQR%tqGC7|U1KOZasvA9wns-^L!_#q zmnsHd&%*3yjj^NZI-_q4MMobG`LpfO;X7s@%%Z}t@UG%y4*Yy3s(nPvA;gRwS5cIc z(s#E#iilx7SS~Yi0_?gV+WWIAQ+skGxsK@@L($R4L;h?Fbi6bB!OwO**EUwCG>=*(@|B?PZriH_{Q{{EV&zEn=2|6)=CD%IPk>H| z?`;M9-*1dwTMZT~V4M)Se|Fxrz5VgKUl)A|s2@&i@BVl3Uf4BbSBWjo;~J~Pdz0sT zo3Y#7Z+E}h^>Nw$?7zGJIq*CGbKv*IzhfKg#I4!Z?8^+9{a{i|UqaOac2^)_DRqt7 z8VvZ!nj+w^6_(fxtFQO0#s*HEb6M4O%A#inV}+PPtIaj$qA#>d`MMSTU47>Vm2Abt}}-#l<_-5^G33@QB6} zS@wN`M4FKeNMr{v^&)(y_gp6{m-ii%eb;B-%`@hruS{LMv2FU;K_5Hhy(0-(b??{j zyK`^9cS1{j3xBb9IC+b#d)kFB633G`<@k%rV6J@KB9-(yyRG*3dab1Q>te4j`{v2Z zKG;`iLO)Fb4H|mU`=s%G-sSq8y?^(8udv7*O6GiXAUexb#v5Ctvsq8Z?tAZ8=v=mC z&+o~62Ak#UY0&%Lv?u+xKX>N7MX!4T z=tS>TerzpQiQc*9MD&)ajW@PIZ#oqWJxflU8Xsx}@j9POZ`LD7k*D$}^|SiuCzYyM zsP3j?&O6h(?!Ee%O4>`&uXUH74G|kWmanHm?7eaK#`LZ4z2Jlk=k?h<)elB^__A1a zoOtG4;fOCmzv?mj>M_fN9y|IXvP@#UaVkVY+WT)FD3RQ@{Z!;(JRTMO)BH?NJlJ}_ zDDin5pVQ8TXbl$2*X_}Y&STGS#B$M(WJTTPrS=h>$X*?~8j`KS&PA`fCav#oj6RX< zS7e_gr`@23`Dt!Nf3dH=O269Jbw`Qo`gNVz5z%FmGRL~xnhc;gfZel{yO z)ilWy_WIoEtAYE8opKgLXz*9QZko~0q;H(1QRDtcCB|@`)oQi*dr=TCMQ)PdL3hAeNycN(P%$|h*MTj2l-`RHi51*aAiMnT~UQ(<#hp9~#vIu=HSAN320SK&lA%`a#}X zr}s9^_=>7vrhMH3RqXkq`i9=3K}+QKBilt^V$MQVt!rO3`q+^aDP=<9jV+Ku=Z`N{ zq=8N!zW0N3_&yjN=$m?NTaeSACzfT`W!X(X)}k#~Dqpui8yPh}Pl%rH#0p(IVcp$W zt>|5)x4a(+9pSwq6-`Bc7@bD6@22`bMg97F*-t;#qOD9>ys-`1ylR`O3bJ0*Uq@GI z?~Fyf-S=1gY+QLRjW;=q;lZrKd1f5VdT&4b@74JMzc;d9?AK@eH~xKhZNI!bm+$a^ z_HCUJ!8pZvPh&@Qp7HeYqEf+E$bZ;eGIu_{>Q?V|+acZR_vbp_(;LiqKOA;N_}?XZ zx@^EhM^xm5W+`8{qI=waBg2c;#{S#rN#n6`q7Tou?o*vX{cVc$A|)QVq82DJyyz;o z0?7>Xm3wFPY7Rd=!h2~@+3`-A%*MaHe?6nTjX4tCWvb(i)1jM)%BLz`PsK*gI?NNj zuTzgdhz%p{c^t8aj=Lxf#>&^zq_A19hi1kX!!x|EXr$-ay$C!~XVwWEI_9FUOkKQj zO7wX*i>CeyTQ_tb1fmVoo-wR5X~JVQ;W48xB7?W`^;C$&pWHviJL-?!KjmbAI1eE9 zrBRzgyj}iecg5onfAaY87nNlilL~ohe zc;j^GMJsxbVe$LXVp>yok{D*&Hu;@qRzz^{S-zeM!JjPKnR+fhn%4Eo9Pe3=_le$3 zJBiZHSgPN=uehJiL*-o5_fQFfhlR98HEXkzxo1ctFT-hfyiY#H`_U-obWF@?yYs45 zq`Z2>8>h00_*ofll_!fmPS~sWOJ;Rpm3aPE@5gR>_Sn0%KqUqC|7TkXe9wrgYfII& z<=Tn4XGcT_ujT8h5Z%lc4$8thRYh-39Q6sffZlj?>_&?3Z>thPA`S zT=bQxi#N7F9~Jjc6*<0V3$HWzQ6i{|p#E_a1tH_*>lP@$&w69l8F|y_cj(@ie_B6R zn96vaoj#=d{xPE}g39E?8(SfWDm;%`(u0Nkhi5g&lG6o>)2O6Tx-?3P^$_>%9zl^2 za$mk~g^Ulzg72UtqK}rrTOp1|#Q$pdPkZ`SY;?v3U}M-AijFcB@y3?vpicuQ0243L z{=)94Sr-}k_=$>;`SNuOR8SE@JvCMU+9LY?MIC2&Da^8;0hlVTSt(^@by-=*j;u&3 z6BKW3g{1nqKqB!$w-9l?jVC&Ve*pf_;|YFwNCYmPiUt%GWKDv|nB8{+5UtN=(-X zii|Q5@x~U(;G`&arcqZ;=hV8Fw0}YzU7#N;PsvaC;5*pQMZEiN_iy_d(G5^!4JB)? z84#JlUHQ5VGVu)R-IVFiM?@leKsURv)3xY>{iaI%-hO!>Nj{7HWe*njpthW!oY?fN z)P3cTaY~O^?PhhYIT5{OYU7Q|qnEg*ch@Cv7UwX0u+`(%eu?P57|W7Gm*z>72gBv- zX;Mz6AypajH9G!l)v3i#P2Tscun38va+WLmNW9L9y(O;U*_ocxFXE>peyKSV{blOo zjZ>jNGK-;;sfEM>XJ452k>KXji&udUucaYMvUN&Gx> zB)ZE~#~Y_fx1w-yuGY1!UUPJJqpNHwGMek}spdrV2Ak#U<a zPb2m7Q6EQ9Ql=x`*ajt!RhIL8RqsGuGP%>Y);S|QH}8iptF7N^8$OC6B;>z*-5w$D z&DMG{ON;%LR1y%U_*C`N@XCDlK6?d%`#`UDuZp2Qf2U5)VWTUe$|S`bTOg`gY0oJx z?1rJfhOQjc*FPFze9h@BpG-G-Z4b{m7xb6!TW|JL zyxxq7{4(+JhRA<0tu0M`n5JHWanT&CmanHwGp8TXM>sm;#VL&WIcaq*O^q0PYTVns zv+umGtoJx`bzeWdR&myNzrIISE5Ot%z`FCPRinIG#2edRHHhw$-S^x*`|0q=@x0k1 zLoAGQRPoCB+}DWD_RROld$oO=A0OR+WC0v%<s`e!ypsPU za^|P0kpbewr|{7|F6aAa_c?}g>F>kz_gwQKYRk078{4NAJDceDi(Or(*5l=O#wvQi zJAcxl2HOuU?X^I#UANoW-TJnw67nZv_b_(nofQ!re3q}5L9jSok5kcDrZC<(4H{iX z;&);7?pw9F?HhZ>yX-Z-ADdd4t0AY??MDXd*?;uv{IesXgV*x)6p60y6Lsr1YD(OX z^{CW?kBM7fY&iBDH8EIa)O=>{J0J5BD$+H)x%HMnrCz*mz@$1WHj@ErEoy%1GU-eown zBm0K#?QLnop_*{LITGDvs^g7QraNbwoee~U+^0%aPguCVI&k_tr<;o5sTn?WCPZp* zSiYVfsh^EC`un~blbq*Gyd<=1y~fyMy#KN{Jip*|PpS7m_xrlq6LZu zfM_fNb|>>LTIyH(8D2YyeedT1Qr*GnoBYHN_KpZYobYvKOyrk|k2g+(eAm8yif;4} zeqWvNq29vtWQq4}_NnGTbOw9n>uJ#0rG5K-bapbRL-4Vl^s!?v8p{;M8>d1eowz?& zRxA-LkB||?_7kk5b^yzn7#Th8$Y%L_$`23E5AW;9d&~D7Gxnk}SSw#ogGP4D*E{MW zGxc23z6?dADKf;6OAmf_>f+6MRWm=8`r22MxF9R#p?hm{snw#q zO2ivlErzWYtRYX8UCzloihUg(`&xgs$mde4MXUwo>uIbO*zNiLxnwiEF}r|Bw%hi; zkH9Ngf^M>4znX<`Yj#5HFCg=^Z-4ap@me7cUm> z+_c>bApEAP|KiyDS5qfjJAjip32v45?7ZRS+8Bz>pna6aT5h)>5n(IK>_tlUeiFwo?pyLq-v6S zXWuVKjDR==J+r8(o!PYry03JKZAt*1niLYJMUH+ zCwq&UZfb^)q6jII5pQghkb18;KS3`vQRo_xGMtq1Xo{HNp?uu}F~p1L0>VB}KgY^@ zf;?AN8kSh$=0nRP+QJ(#i4zWZ-1PU&AuEA?rmBKDI$@|Rq$&oZwm!_I?)J0&K zym(_f1lDWeh%-hELQ%qQ&&et39yyT^a$de}lZ1Mm+WuZh-zoLpY!&Pk*ICjz{W_;k z%lOe1QDu_ijZ-8_^h`yMNC^(g*KLsUv8u)JoX{83CPc3}jSIb#>U2a%HzC7DP-K*e zh&Q%G2Hmopi+Tl9osFo0c>9f-eR=p&#SK1wk8*P+%`e}xuf&_8!pYCH5p5;f)|eF$ z9DJ6q+a#FIxwpn1CpyF5lj*uwyXS0J_K}d=_v%IV4sm8wM1V!)a3T*MWf4{;E8f@! zVJTPA+-*l5ihaRRV??aNtAqLMZABs-D~VsgT#EgPwQknt7;jM*OqH+Opzdo$%}3*g z6AT#GaEUqvf+n1JdGqzMLfAqXK^)>Oq4xg4erDA0N;CFRdkQnCl_9tT$`X}5*1s`HCE`8e$8*oBjy0;iSX*p*@J8Pv*9UJ>Gr?X3)t=F$H1o7RVE zyxr94iq*hReDm(ltQDV(eX7aWEf?LOVkP+W%?==L%nmvt&~7Wd+TT-;J*!TpuTCcA zuduAvnjw)L+?KD~C)@3Q`2Aq?k|`x;%HG!Z#`vpgc&`w}&SyV+IwKN->AT` zPl2lNw1}gTfxWA|W-MfMBDOPH)H_IcJgjL4(^J;>XAsNwTvFYWrt1v*2EW)-Eb;xb z1@7z(^meKR)!wMSJuTM_3uT|>Ezhb}kn+kAZ){-&fodY^XkcouSSLIN#_8#9Lq}zX zTh+wWIU5yw+`q1Sd$ORrEa<66TBHR>OeJvc63Pm6SXfT+C<9p3atT-&>RVBaRM z!#x=9Slw<#?Asf%29CD|mY+4P0A=#yjni5I$m-o!o^PF1;saedLwpI=0M-l76-H(4 zZKdI(-qs_XclMd*Dc>o^FhPuA$@voX!F2h0F4T{UQ8rfs;sVK1@b$oB1$pd|h-e=1 zlwEMVUC_NYtTn4zLCPyfym4A92sK9@1H>o57HB(-O7TLkZN^^@Kg)AG)CWa2CU!HV z+NxtS5%bNChz?%M*V7{U`CAT=o!pUsjJ!dT)&0yNxyPvLuSWqQ``Deel+Hh1=Py5N zS^>)B#~Y`$0^}W@qDw~94Wi>c)`!>s!E%6D`riHNi(S!TtPbqzp?--DvR;!MwG3Wq zn4;VA0*3DlNTXJ&J6nGiwL%2{hSczG?izkug!Db!c8*+L=9?0fVyNxY~^fCF{Yv?*eGAuqh~66 zvA!=G%eB5EJfb#Xz1E+KyqvtX=R?$%X^l5dpIXs34}GF27%5+url>9M;(HOpw}?pN zmD!Zktso;Jg;6+c>_kJEf_P&|8t{~SC&xRJ^LqDd&zE)2_yy z!Y5tR(4LPrD&Chg`i19}6fZW`*EV+KpVIkwzkZtm>Ji)ZxcDk_6>lub7xkp@0}IIq z4xUt9Lq)Cc6&Yr&PG#L+S2QM{gB6Q^2i?rr`@?#b_wrAjam8AYRK8Bn8s{r;${}-w zM|f>B_O9w2$BBJzL8iSOE?dNi;=7u8Mcz%;=;icqNh31PIEs=o9r4EYC~=waoe%%I zm|VrNO!%lt@R=!)9+3>kabw13DdzJThjb&&{mR56Lm+y}I**N1g+e`8N(|V9Bt@;=_8+pHEDg{_K*kKX9h9v1B$K~tt zlHN6o#C+IMb7d#NrMlvXw21-lx|MjybpSi}88v8-{FmiE-dJA#S<$^`0-kxj6H?RT zuFt9DKjfd$bGtL&!6P1!>HqA0yZen@5B;??4@9E87Ruv^`56iMoO*XLx(~3q7VguL2@Oav=QWG3<+ zq|Ssaqv3jCX#$u(I>!4xd+J-rUU*cAjG%X$$=5VLtCEOGZb?Zupd0o_G{uKFA<%pH ziis^VQ6`{nF-h)S?#rWA_pM|Z4JY7tW<^q&Lp=hv=ReG5A@26kKL2}VU;Vz(3B^0B zr2Q++d;)pt(B*A$KWTwdWpa7^yj$Cy?h;>`Ro3~N>V$W9E4D(T9PaqjS-s62dAarE1a1_HYaZ!K14kJV+*faQO zmi#~MYoZjAf8^P_%(LJ5y=<8cSLwt&eUjW(>o65doD=ekv7CC#BG0~`2io%*K1E;Z z>+tZemtL`1t6waWOWh5YXg-Ufo#m(c4(luPX?zzJBf~kkUaN*D&)B(F@0Cqd=wF$I z$eXh3w@U!0c2cL$K02?lNwt_s4`}CN^cIL34(z+`k@EGKA$3?NkX?(l#iT9I1Lh>t@13Y zcJdjN>?8Z1%`aegbF*4c^1WU8&U>U%I})|HUPCL%cFCqDiE41SW4xk?PL6bEjCy0q z`F7uExAUn85JrF*hv^YM$vG@#N30GOmA7HKUY!dx>qH+My{VtdLI;f+;E07sqk}F-{d;vJ*)G}5abvy41|jBN_s+F)Z+GS1m;R=28Fhf@(1vglmYUz4SNLE{{92=2idLF5T^)E+O+>y?a$l;FX_lxwUnF7&>xo>xEYSc8PEM zbWI9|boFpjJgR)TdZ3GjWE1AuHWAP!>+PSdNkDfch-AIL-@W2E?b2NObWLgRuJ(|$ z?@N0#pGv-o-A~>hODlXy($n)bWj>EmC=bOMWOZw1KhB%Febjdx+?mfS|2D~V`KzU+ ze&|e+$>Lp|BL@qqnuzSw@bi9}Bk1S+ctnl8^=YLc=jGY24^`E|S7m)Smi4XA)epNL zc7L#6munI2kH(LZ*v(7qPm);EXjeur{QgN2yLpNIt0cCP*q?TPHi`YKBzD6R%N((; z$SPos_0jl261#bc{ZSJ8eU1IWr``s$| zqdcz>R_rpTyEQ$ppLUYiw8s9VcP@^u}F{i7uId#vCuipP$y3D$|n{>5sTwZ_I8 z`&Y#ZHZQS%-6v zHC9>LB#-5<){$6M!qnGT?My7oX?kNFiIwLS5=;I-8H6N{<*$~PSmsC>gu28kgHV>! z^u{_8E6=MgvGTlxmV9X9G~?B67@8<*H0Exx5SHr81Bji^4h zYz@R4Ypk(9ny(>=O%kipBvv=vJ}{e$?*o5jMdZ72SWa6;?T~B(Z;#Rd50l zE32R`v9bz=SOf9S8dkv{Rc-ja+7OMS+O3erA=h;zR<&Dcjr~crTbs8Eev%zqTVsEc z9eV;2D?7Hn#wvp_#2Scq*02ixqzpoBjs25p9Aywf9?REtBvxJJ(;E9H)oyLxD)_T% zw`yzbpLJ&92}rDJx6&H>XVq?y zuw${1)Z4IZy{0#ow_}+j?enTjtag7Vc`Sdmj>M`yHc2cUa+Eqx9(1xaFmP|j=PSz69fR?e#~vC4Us*46s+HP%>8S5XGRGYFjgEvuj|k)^NKkk}u0 zvI^1~`$t&?o3{$o@i=7=sE(CYP+C{(&(~OE|0t{Ad(I1qRXnyXk)^NKkyyoJ>sEo{ zu_Y<3KVL^;6^~64`;*q#&D*g*sjGa=D)>qDu_qw0T4U>LtfE_WtzY_j4XfZMMYn2e zEd8Ig2caaV>G>KGOIK=T5F&%{Cq=h5Zxzs$S`wQiR?)4rf|kEpXN^@wcd}#uq>jfY zu*RzIR+3ou5Xp`$udVUM8f)xd72W#gdEs^aD2d(l8tZeUoR_b$J{s!A8SCee>(Xni z&ylQxy2Pp*=MYJach-gyCMAXWgsRIqxB5 zL8wctI&6eA4!N!)v8pSmORVY&hDd6>vyQ}S*G!UFounMHIPAKH#Qw?Z>*RTb=cSz2 zFiDNK){$66x9V%GqFW)2L#}H`?4K3gs^z@?tmxL}b6$V8%%rS>unPXH=++5HtfE`V zDp3E}A+|tzXC13Ro>yIBRacPYvHaCK5-ZQEF0t~w%5s|CSVLm}BG2o)=S2@P^(#p7 zSpI5xiDizI^NKZ=(NNB-ET`#>btG0fuOzWQnZ{8iOp?gbS8GV@PufdcvkHFFUfPXE zw|=l)BHBw^Ut_h;tF*4xpRcpVYS&C%Vr9qHC9?GOIua{8Hc2e|5M;-eqxBZ*!mhPJ9dbq#yjgstnApj#43Xj(m3S0j>Ia1P?uPFUPB}` z-dRUt<#{EE{j+jj8;{45qgCxzNGzkF+O1eWhg_FmW0@n>ZiU2h3W6kdh@{3l%S$XZ z_u7LH63b|)!$wHskn8di`xlErN@7D||7!Y1p4SjbjdzxpSY}9`SCZJjDd)9m&x@U- z*lyaH$j(F`4RtY!^>fH|={1&pw0~8#;kRl-`g8w5YwX6?SmsD)&A3(I604Jxhpesf z&hl$4605p`y2PrkAf$1~bsdRST|r%9RaY=XQsbR8x`JA);0KFNYY)PZ)z#lwV~zdMRu#o#Js!(WTAkc6TwZ@?bU*JNcdxsr z-OcWH_mAD@-J9LZ?xTJF_iC;F{qD=|&Q^qX_SP4B_u9U?-Th*p@&1*4a%*4l{de|# zU+wuDyL(sN@qHic6W)(~BE)lkRF<~3#{Q_fg3Vh6oDz7sYwUZY`TiU2Uyb+|`})Dy z|6rd!?%o>l_jbou|FkDJ_Wa5|yQx-)XM3N!d`*x|F?@|)VugON+51$j*^jo8UsW@Q z-}3ZrZu8mvY;WJ&+c&n}Gq-4mD|`3#o0Om-kQx7pch%2+zF>a#NB7=F?XF@7o%z|u z>sfa82raM%6HnDFC0hx}f2kO`vz71FzQP`o?B}*$Q}(ef87HjAAuG&XHR_Btn&i>G z@2(p6+iK0hHsvQ?RqG8p%C(KJNbjq4iWzwlUnA&R#w(agGMIlzL`FW_ulq_Xq0jgv zNrw9>Pn9q7ByD6P=DI$J9J0Pamyc}NgyIcL?mxTV?tU|hu-yJzL!ZUGzuMZ!iu`D6 zC{`S{{i9Lx#2@E~yfd4Ds0lF= z)}}kVvS#s#{G*(YzPlyZd917q?1(EPAfj29Ec@tLq#Pg5CAcp0Jbg4hoSwa_R+LYb z-G{f>j2psC#0aiTi-(8l_Mdp@BOrga1P^G54>r5Rf}SdS>+o36<;K5$ z+gppki-cU-`|g$?0i7Rn^~Q8McGIv`F23v0R=XGb8Q9g>1y~bTl?_&p$h|YlKH1NH zus3h)c^;9wslFQ)SvRreQY`k8wNy~UsCwLCpSh&ZuPUweL5z*?WR_s;i_INUPn?Ii z4;FXg#r>8%ONo8)T15k}%sn>HWV7AgAfoLw;o*L$Y;>Xv{`Xz3uG-EVNCWoiy!_c5 zbb5@9NbJv*WkSaPo&8D~AhZ~ zs?@Lr$+c2vLIjnFbi|&p+#agv(I@+y{Ng2fKg|(C{+pj2I*KABr=ag{Jwo0a5kw!t zUy<~CBsy$W?9%24NwWK7Ie)gEWH;lWmu=PTujeix?o@yHE>q(D@2j;Q z>j!-xk2v>;hmD#D$fdmRZW#iaRY#H6ii(MRmUHVisx9g@P1F;z7wVGvm}^W$PaiM& zv(upmjp8JsS5nQ}%Xd+69pXz&kF5RlkFr>M!v=)2nr zHUBru_U?QCo-vQz=+ZN}p2>+BHQnVod>_+m~K=M$A?6Y&B$JbDkXJ5Ty1)$U%~XdJ@LkWm#ueaz&~)*)y= zR!l7Hy;){-5vF59#EvgL`;s#eXQlr)*$a|MMitS1bUV)VlA|chzo^`3xKF*?fTh(fXzfJf4sI%y< zbB(@*u}ABYEv0%iW63cWeK}!$cWclW6h#~?$vp9a18r5lhN4~Gws|6lR!}-~g zmvm-bGt1dd;<~dTV*41)pRGsiejF<2HEMF&&rZ3kPT#rg3Ix2hrVgBDR7FruN#EU4 z1W}RT`A_@@G!uDG>_<9l(|_#AG#Td;d7VL=3CUWF{TLm}IB^&M!%qkEY6UD!k0xGK zm2u(UrBfmNRB>`Bmv-Jto5tJLT!_{_KJ#Zw(TY`Buaxu1NLx(pvST8{$4OG2OLE`c zQc|AR-W(d|2!AcK4%I)3ee~tF)*E+G*vDP|Y%L1M`v4DSPtviLQ^X^>7!iE>9Ykl( z%hpv*>gF3~QI?a`ceh>2qNZ8Yr25<|%YIS&Ua#2bQU z=4c-^5s*uH-`z3<#3{#k@?G_J^$wtyy!MYBD@l8weCN-Wm-c2HH2LV4y}H+>yl;#o z-MIw!-7O{E_`Gi|QcF!hRAjxg`+Drw^N@VzCz~q&K{n~oaT5i7a-Tn2j)Hn`<-Ta_ zrLXk$D!jH_PF*KT(sOC*#C$Yu@TJlX`_Ydtm9F{uTg4&%^GDMq)YD%w6^D(OBtMt# zzPn{4|ISwW@vB?in)+mXc-$#^P-<6+cW#|~Y(-NaKl!sQ)0Flb%QvCd%VFHKjiLz2 zDd@XfhL8vIzkR0s+7_vzYA^3#b;*|2VIwBV@00cX*>aK}^{GfWy;XmBKE6NU2xascx%HvviH7_d%O$#6?~oYx%RK$n!H((n-Yo(o&BT z5FKz0lWG^PpojG<4MMq9R-`z5Fcr^-t`nki})t9<8w|CY*Y{Vq_eX^cETTb%- zWl^d-v!+tl53B?CLh`fi$UD+czh8HFAO1_$6pZCOqbh=OO8V~BCdeyTiGQ`{Wkg8Z zx>Fi85zr^|`Lm@6@V=q3ca}4PnMM2uVqQ1jJa&8va+Gw#f2y9rMSbTLdHa9clP8M= zTs9qZjHt-T>FB##hMZ?(9Hk@0B0$$e#e2V zci-JIl27!}y>YL%@;ae?ANCNt!Dzfo((bb)8UR9r-=^jN9 z(#J&pZ0m$j2iH7bNb$dB{BIa1?PDogaw7WfPJtGD8>&b>R$i}_ll?W^{z}@#D{;HV zRP^-ml0VxzJ)B)aM9q8BDARPfMb{j~lqH(S*7P4PC5;oiPBQ4VU*vg-6hctQ;Aqy$)9J_#W+e3UcGiJm1I(B?TRZdRd z-Il0&txhqfddRCB#Mf=L(vWASwu3tDl>KV2U>%~rKAV=~yy)XcTBP-{l|NgGwCL6W zJ>++=Ysj8@tq?x)gUJ&e4tPS;;nDuA@4@r^O6&u8F!@7^(X+5io7Jlz)Hx@0OIdIH zMP*K2-`&zwHZ7vW+Ou)^-bnjmtU;{H50x_1`=xb%pSP$04F80F)zlwRk>p)WVE3|P zim@uLH~ylskHh@gvQ!2)ZTmymDMdtpdL-(NsI2``X->CN$#|hXAM73WZogc7&AXE} z^_YsDoRGe|<>-M8`YGO8T?95JRYX)s+6nBxArLL7uWGRKUbi0ES=f3`dk z$5?Z*FJxbC_HDmQx9WnSrN&#-`}qQC&%j%I6G``z2luN)qU$bs zfA*qyu8`b6{X)El^`(%p^tg(moRq%1=_x{25EXhha>)9kEw~SD(bNy@@pP7`jN*)s z%dwQE7%NG8pM2-frkD1-LeOob4`wN$Kj^6OTCM%aH*!yw8hKCW7f@y5`!|t&a(a=$ zr52N)z}o6ZFs(mm=ZEj+3N3m*l>? z`K5ecqA%BnXiD~wv5_?Q$#4E_yfkC6Q%TNlMKWRg(V=Ur)5G3R^{w2whs@rO6lZGx zZm&??fBx-A^S114R{##dBI$^L|lDODAd-BGv3C`!GancS`P;`A}C++IC=+{IrXarv`z z<4=0;7`-=+IdPV=)OU9doROD!Fx@9V(EElTo5LBa?@Hq@9{UK)pPd7b&lV@8|BZCs zygDz&S$yRT_1$feFRGnBTgLCP$~=s-brkPByjEeVaTkAm#O2S#$Qt_X!G6;pKWe3eCEqV8 zs=ROVII4z@tN7_7CV#d?euyPw??F#=b79}eOGOj=kfAAd?2DyCSUO~k#Z}Hu-`y6u zdbGXw)GkLa?&kR}?NP^wFv|uUr>%|~ZL!uzSN`l=SQBCM6DF>5cKYtN$W^}Ml-)Vh z{iD@*La%S?|J`xkAv8U5Js&d`CJ4hV7L?O5K%kFc2P zqbPs2MW*UD;-l#^>_%)w#p(~Qs~R$<;wERK?{16SM7%Ki{j~dHSdQ+a{c1!h#xX9& zamW~pt3HzQXXClT%ZVPg``rt#D{G8Ormq%}z?Q&M`dHa#d_@2E4OgyS{^!8P2$(yOY#=&t|$JKH9ISx8o!(Jo@wK+%{An zOfg=P`dqU6?#4@f$;x@Lb^gIlu|_N0*tvV0rh(-1>6PgNj~IKs0X-?YtX?X7sPuN* z=&~r7YYat39}D@j`N+sm+zOo#gkWWnKjGBY&nEw90MDenI|Cnis2&Ic4j(JYdM?j> zck{`5Sh-D$hbW-$Bgp0d^gV#F5B-eeCoIjgSuCZD?m(5v6oU-TLC9&$m3nt^u zeh+LOPC|-x{n@+#dYs4UNaset_4lY&iV?I&e`1xNZ!|?qPDJ0`e6)B?`5U9bytAJKNVXhm58;=_4b5wjL*! z6``HS1{*$xVj`FOzPt69h#Gg_(}m>_-gs0THTMTZWS$jNHdvPpcHFp%ojzLfXIo(h z+v|v7VIe@S0->5Jw_NxpL#?z>x0zM~Q}b()B?x2P%f%Aim3EldlN1>cWQ z4I4kP&?o)*v-Mc;-S*_f_vbnFo$Jb!;I&g}$o?Sr;OkaF+fS7)>7r`snGl~jgMD|~ zJ`Eyp5VVCj=dFW5G|s2+K=noi;vPHgHO3!|Jb zO-~Z>mH3)&OvOyjMc>^T%!JOlF-;TuoX}(q9|D~SPomF}}qfWUdiRt)8w^xchT2Uqh*_zOHmn{R{ziI8cY}6%Kbs z(7kcwy+z;Km982@|A~jx{kVEojLIVPAKDM=^E`A|8WUJpb38>&A1C>^&sIJJ6tgO8i|C8B>j!q(7JNzPq`kAKj7nrN)mzGf*pcSyJ6U7LwLJ`OKfqBdu+< znq+LSYq4XH2_g|I_N%R5Lp9fM z66YOr(U%j}cefsWpDo9X2aLz`tI z*}B|Dg;&_cifw9E=UgP_KEt%5E2460`tH^uij&u)^KH|M#CwbiY%-pBjX|HtsgrZ) zD2k9iCh}+N5#qgZIXCI4stJjR2R0pqoJ-~OuvlT)qNBb%PD|?=F-d+d-F>O1DC^@Ye|8F#X13FhVXg|>eQ*h zpjOdq2gPmP`G8T`-?iJ!&w0PCW4N7bmPB|T)A_SgB|NHyyR$vAZV$C?+jMMsyhUA3 zR^Q#JQ%4o!{yCMAnHG6-kk>!vqOXs){Mo6~x9?@XGfVctEL!Yb(KiQu{bMfra>DxV zwng9n&)&Q3NOBzOnsqHe@35e`nE_U=5=oI11?UtIHLkAJ%yABH8e@NynzVm4eu`Jmxe{+y zon?p0*4b3zPkL|OY+^kMJ2b6giIEdW34Pt#pHchB*IAV^r*t-NR*~=b>bw%0m-?De zS$??Bvb|F6Ct+t+iA(9dc{3~L`Jy*76966rZNw6+>njyt9!nT2Yd;?YZ1eJz@5fo4 zGPiU#CsxxRQ0uAbBm!%(l5Uz9J>Ac};tYxG(_eO2qo zJIhigmCokGvi=Mg?Zd3=)?>47!9qGZYkd=aCE*<2)yJk6QQm9d9ISKj6mP*9TH<7S zZ%z!=sgT;oC9V0k98X{WhSw-{ZOP;0>#RzdQ#zXytE_@0jv?!chqk6Cg>|3EW!igu zA&oC|S#_LzomC|srT6B@s#;&hU1Kxecy)s4nlL9N=jkvW4V9=fCuK+JY@W=agT&`= z*<@i#PT7B$-+6T>2l%=*oNrUU2WM%Cm+8GZv9zv*)rNc#`;kc!*pl?I--*|s{N#A{ zr~3Z6_vKq$0KbZPJMjoG3q&J!WUAq1!P`kE8Rv10$8&j8&h(VcrL*%h{kdTrHW#sn z()3dLuM=;GJ)qj-2`lcoxl1j=op?r_t$DUiBW-6~iDT)#b29F!i5alsg*jJDyV6;x z@K59BtexP;o^v*}*>tERohd0BN@wR|3hPYFhB#LAPT0bF!-NagE27?5ky-^upFvhA z^<;95mC4s5BpQ2N#+R@&tHh=B-aMI=<}JtF9(?^7&YpfLIzv(xl+NbD5M5hJd5p{& z(OIRza~b+nTdd6)RASIrQg()wIF;U84#Tij;)w~)scs(`a)wizuFk1GxjKtdrj*X+ z#G-aD95RKe1P?uid=;v#LUkEBJ4$>=@6DMV*y+!W2f^2qq3cPT9bFkZJ5mOe&gRVy zGT%c)7OrTe39~#{S@5$ta}H^X!z`$*WCRpL^5ZywBQTj^${k$0Eo>V+N9lUQ`lrG73QDpO}q%8=68JlOL^ zd}g=86na_Q316672y;F*{sI_8M+?u)sqcLDlcY1H#EtacxtJ37GD9O;PtkhjF;Bo8 zGIg%SgTMqrd!5Nyeuyl4#hU%Kd zD)!L)150hyf>&=1zl?kIo6)>e?d$zj);YMSdEVyh^Nto>4o)LyXIY6?>Amx@jJl*Z zu@tShnXZM#GMfYFtZB1msN9?dDbh=4=VU?X#}dznvmSqGE@W)CXm1y){j^iP`yNsY zFHAGkYDl_Ju}<$VS!Ys-JL$b8GRc`U7IT~_DH}>>=VA)>*1M)M93Pxko3pOqt)pfR ze?q^n*0~aMYc_+SH^{%KNckFm( z$@ArFNqa3h{~K}UmbjYUJ0EjH-8FlDt9AP*)*IeaG7b9cwtXE-*Rf+{>1;_EQ97Fg zTP%iPT?(8FeOzcu%8_2ec6#qzNN>-u^F6y}uWCoE&;zPpPLA>v$)&UTpxk5a*nQ+= zX(za$^HI7y7%oX?N{Jiky>l_;rrFt(vrm4p?(aEjK0o;@!Ou%%Q9bxO@c>&MWUaSg z+7Z`s!rZEgt*Udq1!ri=!qVAt8LHI-_>r_HD477S((jV`HfCii->E3j%7V9MjnFx@ z&eL&udd$0UwwCyr-diqP@rHX{L4H?u{5qLR*BOCI4G)vI@O?bURc8M9^n^4+!DhFVW#;HF;XS=KFZAcK8GUs~SBIR|$jQxFkRrWw zHZK;m<08(0Is@7=bM%++p5B`m`r~S5b_crFziT|n%xfceM!n6Rzd6J@+DD$wnv@x( zvn8>HK2LOy){bhvp48WqGHX(KI%`TiN$;JDHMg>k=&Hd~?61vgLU*Q+YcNIS0Ub6T z<-cK>31q}Q%Fg~yqM^>hn1%CuKhEluxuvu7vD&)W7{e^jXj)#si2k?{FCBdl=nnJX zY!>YrGF)%}=q_~b_u?!r@ix78J{G^os;FI-w2w%-=Ton*ubAm>uWg}PB*AvdCN*b3 zit^IgJQ?7YV!F1Jw1uO+gzxm;9MEp|+B>nNo@7_Fla&CwD%fvnMyYe5j|=-s(wUO7 zp>%dGrr_&-X!58n1H>ZWI!(l`#`cmkBxcAV5_D#ixRBmE7c;0HV#P467uE~>d?mk| zP2zbctIQNWKl2SZ4`UwA|9v^@Q)ZXW&d2&k@#Cup->S>I^MZ73RQ+%#mSoI${q2uU zBuwK0akn&`wQ6xP>p`H?8B$&0>`vJ|m-pf1-+SBfU2twpcbmF6QaBTWq^^*-?_6vmr%% z>1S~i zX$(0#%SyaT@6Cs0w!^X7T({B6HdoQoS7vq zruXK<%;5PRH={-8a(N|O*ILf`%}?_doS`WTOK0a}C=o3DdDl`6!(M`&*qi)Y^NFZ- z)v6ghzxey!Bu9eiim!m_3V5g-oh2n+r1#Ft5}P-wYfYGHh0f*eGl!l@3Uno7c8@Zs z?e%??XWz+hXbzvVsLP@$$)bYefiv2l$wcwMHyC9=VP0XQ%l^Lm$IvLwiM=JX~HzK zM4e-gVw-EE@m6GW49Ci{bvBjwlir&To6?+v+^R-Dkb8+u>r@LmM}BP9zc>#{`$@9) z`6^as*x2%R)}_oUot=wyymOrzZ#y>jYg8_3M;$w(vyMJ%y?5}VU~g)^I9mLD(`kzp z&i>Y|bgsmX{NA}IatPh=PbGC{V2N|-y>l|qCNt%;6g^iY7ez}~t9%|jd1)^f&Vm%_ zrL+06AkHyNqsw?Ee;2QZO@eVduf5ik^~-R{I+IG=N$)L@NzR!#Ay`q-V`5N)o!xbNIN@hOYAzgtetHsqe^GfvMul==gZX0$t^Nt zh+G`SCETX>PKjbx0z8AnzM09%dZ3Xrd|Ip^j_A6K9Nj5`OJ}D+x8`&Zb2g9nJ3(_= zO}S-c50Q_fx`gBO-YHR?TI1+%YWTOUsTI$Cl5r%bXf2(c2Fcs(bYy!;vzUVv9HAvl zruR;RP^Q#Vk-BRlyE?aweV_01%93#;r)Vvmod(J2eh$xH==ig(%*eL>Elb9cT*7X8 z?=(mzqgQn>UG2BLe@i9dNKMgLIy((gLV#pAQOet+=T*|7_*%BB> zrxutCf9X+1CP3&8!e03t!4x_^xAX=9m=4*Je@Tu zGfHPmV2$ONVegTT=zKYpFKtOWQ%c-O?=68Tui}%v7mMvh_Ez`e+uBx#iDCP}p}U{1 zES)VWBT8pWU`wfgfn_nLHo9g+`}%X}`g5qnop~j$rT3P>JiG|*!Fz0WfT3gVu(fHp zztn0uhOLawvXn`svuRkS?~Ckd?QBk*l1?X9K|_x9qj=*&&Cbx@pqBt0$3BZ~xTW=L zsCAZlnAF5f0bnCbguY~qRAwElQbB?TU@kDp$TuzIf=Uq5k zQ%07~mc!PzZ_62X9OK&Zbk>x3lHOYmYueFV>h`cO>8%y$Xy>_ z($2IJx6*raU>g0>-V0->IJchA96vUG4zdiLLm|I1&!OQmbatc+D4orL9mK6{joH#p zD2Ma@H6)gjBfNy^^xhm0PId$S@h7pN(mjh=R9)}fmc4TOF=GtrI-^q7l+NbBDC+~4 zLrUBM4l65;C()f>uW-B;R??}{SDn6{%eZoOmX&yw-kSrkL;Fb48IrP~bT$Wu~_S4wb93sKlG} z-W*uOtac(fv5(pJKi$mL94oXJa!q>9h!pjuvpF!LJtv^=%~Rj{Np>MKV_BzoZ+rk`&`TKvzOs6y)w3CYsK;z zSBlP%5+~Aob79DP+0Q>V`IS1UQQcsm(iCT|NpwwzMzVf91$CBPT~^ zNy>!M*}Pej=4Wm>3ON>E$`W@Kn>TYbOYBx`E~_NN{?h4+8jt+d*PEheB){Ga zk*l*PWlHI6X)Maw8*aCiJd8tml#{G8sl=W1-qM)#B$54FUxP+jgH)EzmXr~tv$?P( z)_PXmA8OQN51OwsrB!CQ9GxX4UZnTt&5|&`)VZ-gH-hw>5h?0RXY*!+brB>|sc{!) z#{SIcO3@io;zW9HE)2oTMWz396R*D(J`kZNp9L?NRvur;HJyvNy}8Q!dz256s52*J zN9k-n%&{IYyNe$#{whDdij-E7&<)1q<)|;=JiRv;)Ngr0?*3~*TUw6z6xF4(xgg&9 ziBLZh_hoTyU()t{Qga5BFrVI=4+FkRJ|6o5&3MPcg$oa|EBGQub_qIj^G+(_ofl?2EOOUj7S+1%OU-lkzyBA=u)dQRH}`8g{}JV@^?hZQ?nUDzYyYr64Oq!{t8b0n3f zGbUw4>1;`ip`Oa}6utVeT*EnpGpRhCH6@;;_vX%;FH)!bQS1uM?WI2?b%-9%VE)Qs zyeUc4nUk`kbhaGkcxB0*L`sMD4Cq^L0&m*#bk>x3lHOY`YqZAKy<~@Y$@;mYQgsHU zEGeBWok3nDf4t?^UV%dY0cTQ)JL$b8GwE9PKJp#n=&~=ZwfTJ;7cq`XH1S8`D@EzOqy-wE6i~#Oe#%hOr9ONtMg_|h;f! zO7e8p)Li4%ClxVTozNkO>kh zNPL%5+U1la=S-+Gz@C^h6XIzLKD}~CUOTIzm=FFNQ(-qzN+SmFTB2{OQ@uPlR7K3tDhI8n64&~(PEUL4| zo>&%(JSJ23h~@0I?%LyV7-PWD<6M|>FTUXi`R7J7R6H}oVCzAx+-YVH!ZD~2;mxuT#nUBHh@bJyYwUbriO+I5K zJNirLFG$234`LJWmN|Qs&%34rzVo8&1=gysA#!wD+A6sl-@L4^7PQova;d zPqC(4Ut9_suH}dPEzQ)@C+@#pVLxtnwiRm}S8~pT`7@#R#<#ThsLA3|vOBR!`!$Or ze))*s$y-JdcC$F=pE>UOB z8kmFM^H&FnJp zR+%TCeh&1nA%@<6cT0Qsk{rrXa)i$x;pBmki*CIHbq`J!71>w%?jOZ2BGY7B8o!SF z{bc8CSUMZ%(r_hQzyi|FSU1gT@h0|=b0b|j%iJhS(wQ=Erd&4@v)?s7rK>+yiM$=< zmXg_%`$)|hFmDFj$sU1Dh~(Y6jg)8prAVh=N{;Y(Bb;~vz8)fPk5aWvoX(Nnhx8%R za>UOY@m-rV?%+!ATXJRH&JT9}P>DJ6mxg?zp7bKTl7CZMcjvg570@jCF79*ka@5Zs z_1b}h7=T+h{gDvxUXqj}eeOu7#{jxqcdW5pgP#to*8Ma=yVs@Vh@TSiRHe}wN%eAj zwY_Yr*24WbieAAP3r!nEHg$kB>N^U!<|+mBw7=Fd^iX_r;{yTCZ^ z>AyM0GQ-g`Zcj3f9&|@6YM*oyE z@>1XasPg`&+`X3n)<2rvzB2E_f&bnAeenPB>HQ6$_Mx$?*qy|EAaju+qQ`jn$q2=( zNap`_gLonV-(CDHX#QmZC{EWtdY+CY1xM?c8hM}h^nd?hzx=;~NV+%7Uz_gp{jkln z*FCEdo_1_2JaT+jG!~w_^e?LSjvdt3Z+vC%6fC{Ae~-U+E!=h#kBMU57IB!+alNfu z+vn&~>;mmPW4m2D)4#`rkf$b_fllvBK>H9mTz$j1&X3a_NBX^EIi3Tj*n{N4uF*Oe z@`jkOfi=sU$|Ey=L-W_cL%y@4vR@xgZ?g`0Lx##vjZK>BjrC|p`MMD3Pl9Qy`L(>G`P%^Lt_gp@q0C+yuGehMw%;mR zmK+(?FxtfhzphTovOMPyT~xhe5ezi6_EFWyht2CGGRfcKDjs0=Wn`Ey5A{Q09jQz; z@}v2@tbfLM+qs(TEZ02E9_DZHHqs23Sgx8eN9U;zXVLo3j;?Ps7dvEKPHP4 zvKkN@slPv~ifBLSoau7L))n?oYHfc0wvKQ|d4`t`zc=gggUDa`r>nSDG_lgRrR}^* zcgE9uchWa-+3baLRvI2*_Sx83!Sd~Ch@E}dgtnQUWSa!c+~ID;l+w}Mv+ zCgG{)O3FdaY)S1oXU;I@u>Zf8ALMHLMRqUjE}tb@7cx$K^+{Kn+}V6qAMADBA{O}< z`9v3}PjbY@Fh*hVk;mnHqQ=c^G~4^vbxdw08e8t&|Az09a?HzL+uxhqw@a#{A-3%C zENT8fyi+TXTJulx+5HLRHL5?M?R`dL4VB{%t>x@FZ8hlO>~a5F+auY{h>d48 z4{Z&GpT^gc{JN35ddjt=n>(qK5#!DzYNsr*3)UfVn;}Tg`~LeS=PO7K=kc}E?`Pte zg1%2YXXrw_(rQt%caqV+Jo~C`1%|zafd=-KH2d+o^`GSYN{SxB?Kr=%e^d(UjDpKZ~DF zYh>AHk&UmlP|N70nSM9zPNayd$teD&uKUXRF1~xL?%RpK<4yMSyermja*aTw`jw@AWBF6F9{HFc&@RJdO*0koGC}L5+pv?`u!rgz-r2oqWg>NGR%ReuUzerm*+a0| z|GgclvBs=@o<^gRF-goyyGxLRul|4!ve&Zpe+gdNK4ktMvQH$V5#If;f({Me)mQl% z62tvzFbM`j-l67Z<7K2{*7HesO6XJM zm`?{C7_M1jR@?YE8!YYn|9zgGAzQ*&>aPo)k5CmZn!q{{K6UP@V%}YqmAhT*h?OB}?+1{GfAw zZFG)Cz{7rc{)lRSKlGH`gA5#<0e!Vk$D%XD93I7bCE`zv``?ZAnp%U~^gtXY6-RIlx8eSH z2*!pWpINg-@f4?TFVv^6Q_BV}50``^H6XF}X*{IHelU7Nsy}S)sLX$BM_>(i;r@6C z#51L{bC+0CpIRnqfA@NxLFv0Y8UxyDpT?fBeaIg zaDP06wtF3+HNS{&X$!b4eRoG=KwIt8cxcodRPtdgGiEzzEPZ!JV-17h{&;9KJxH#6 zsEdfFO|5-rQ0zO~jHgqaKf6fYc6rhhd3I6Rv=jtI3o z*s*d`iLurwW$;Q4lY(o?ntlxT$J3PMchlYh1W$Te|G3s1r=b`gE+%!aNWZNku7}v+zD!nnEV4AGf1N1Q?|H7i%G<3WZLdJ;r%X{tB^BL4iIiZQ z6DjA3xQ{LQ$~R3WGua?vyC%LWlkcGphw@95m9Yp(Xne-V3wbrky})JVJ%4$hgMHhz=2Pv6wMk~Dp+9sPBX5M>{W_sS*@H*kO@Utz>0% zY}VF;`2PND!|-+7kvc!5ZZ!(m)uHjbu}-Zy&s@;2XkD}pniV@8`<$xo<<7F)kIUmr z>>Rp!s|*MoEUAvcMo_C=_m?)00uPt&JGGN5Px0JRCRC&h?)vs(zuy=VaRkTKMEUdn zwnn@YV#>7C zq%|z5J+d~RNL;BD?|*e_ZR|f~-?6`~Qj(?fB1V4s^Rc`zZ5DL=@8To8TbU0dMOz!s zeKK$yma!M#Jr;+mpX2EVOg_MV#9xiCZ70=e#ER{0soiY2-JbqETvm?j7`f%o$KqON zv|LN9k@yXn3)jsKPcs!NiEUx3dBC*3;+5M^KLZ^O_U4J7# z8bx2H&+af8I7(w2mOmeh(!72Rec9TRr>%F5McJ`C$O;K{b#&%mn@3|RDLK;1=#K9m zi}bd~DwkEM-OOLbnkKIDUXDww9ch2l*vH)UKo6CJV>L!&`SbBuB~JpcG1*4i_s%pe z+3RTA=f+y@)70y-ib3tM5^?;NF&p1K7QcO{+zEE^ooU8Uh+VG>t^0m^M`nz@^5^N1 zxmDjn9ksD!9J6Jd#&?g!Y;NtV??_%`%_L|4gY3}oJG^fys#rzwtlh|!_4Gw4S-hu~ zo--rHe);oUnX%8@aI?$F=(t{4RB$Tp94=pHSD8`q-MO+WwjNz5dY4LzuzNG9xX;1%WA)?IJ2s;C_pV(NoT^M5rFC@L6H}v zg4R?vj#|TH{Wvvhe-qS_uR-oRxkLBzqj?-_t6bsR^+(d`k+zbg9MN?o+Y?hGI@Dj$ zH@#ge?$Nf`+AYh*BrC zW6^WtYlBwpVrRXl<9uuSb>yn;^ly=?y)JxDBO^z-VYq(WALXS?`f1*$V?N(e9{qw& zaJ<)XZcprw_c-4;UmKnF!eafU$L=S2J8yDi(%|*#{B*aqb)kK@hQ4gpwdv*S zj4_L)emvHuv2Ku5TEU%dXn0mK*!=rhtd6Z}=h&K7JAzKDI9L3I;VPtT1G z$97zs_v1KOxQ482Mtfp^4T)wjpWQw?nC;pH!)*vhuHmwNoDR9Eootz2TefWb5!@#$ zM{*s(_QZ5Z#$Hgb#a+`mY>j<3`mx#ep_Nvvyrdk(hSBkG-Uu`=#Y*Hmuf<)1moItc>>h>8P%ux-K%%1Is5ea4k5i)Fay51m^L~;am|*=H z$^It}Zqqo`Hg^w6oXHW;-<70eypC;qVtkCF$LZm#U4EG@L_A#Q%(m?q#lG({ySvQc z(sQ&Mmg~pq&`w6j)rPY(`fVANjH9%UPJ3cHl%^GhOwd9juPwgakHvJ~T=t9f$;y#z zIISP2L-M`kINvok@^4Mn=xt*?zq$q%Mz^z_`())vt|Qo<*dNKCMX!>}p*cqM)~05H zOn#0QZ=r^eXF|p^RkCqy78?3ht}IheQ;%TZmv2c{ERiNA>S|8@WhbkfZ~Rf7qsvH~ z9h?8{RG#bxhs)C$VEC>d&&L4vLRX8dWSJlOO_q-QI^yk#sgVDhXex4^&F|-H!MJNd zTfV+F7^2(9|6Kg};!k_@!fXHjcnqNqoouQ{;f2nbcrRy~nL;)kRuC4|t@s!i|6oSec1ue`sokQy)fdWpM0w{YEu8=2iqp zysZlL<9Jqm>bXrGaGwb?GW@R{yFx&-8^8|{e8OsIJx?2P}l$I6Z@|Qv2X5D?D?l});->PtE}ic+cbs(fg2RzKTsmu8{7MdH<{v55f+$pq7X7SSI!@R3`-4 zw9j{qG>{u?w^&&myB;9_(dwe zHZc%B85hpef7a34uakK@!8=d30ocVuNp>x(w(eTLE->FX=CUEM&FS`eUK^vGk%;9L zXx%RQTJtm5^EkFsOS*ivzn$F|W8&R_SEA}5mP`?{X?Jq`y+O0SB`gb`(fYiX#!@F2 zS^F@*id}LqcWufEcKrPHw^~&2_fftN-%iJejdGRm#`AOz^{&?|s`R8vJ|EK)!|7vm^{zrcEyNmzJdw=ec zZ8jb&LY&q1kT3#`2wF5FfrvV`IQ&Vo@+}X`vd`3)V;1QAdC|sv`n|E!v`Rtq$1Z#2 z(tk%~+3wn~6aSayefZ3Xvi?u+j)(j7O~(ia^X*;(T9*;>lC=_!x2jcE{Enkt*VoXk z)oiJAqkT)>mOkqTPsuy6TFRNjX7$jCCZJuj#+QfhX|jrkNz%P9spc-7ji=S|mA}eQ zuw|^1j9T;0vg%S_f{kCca^k8ywQAxOV~L$-;{X4+0&{J)jca@MZuerTqwB*OoQtsH zW2fdK>~CRC>~Uw`dm~R#S@Lf=nrFjT1FguxgTTs)=Fx0@v`b!Qz9y7bf%M*ZYeM@C zp$CW51f@BbL)hb-P)@`#srl7iZO6;sw-*?KbK^C(|f1p zLhw+#hF^kR2+PIzV_#}9J{N}we ze>^dJ{0l=YcgMHld$?R3_a&sK_r}Bh7qK4c$wIz?+1BKekz1o)e9bK(=bgQkJ*gVr zcB77VMY~CJm?UkTG$}d*Qk0j@#$*6{%h2m3-c6|=UM&}RfHs32OUyHvCJy^v$p`Ro6j%@)4dezGEN(XAE>f306mj{X$krL#Kvhe-TXZ+43eD06CFEZCA?Cf4nS ze{v+_UW=A@Lp2op+@Sw0o4CCWVDYQ$*9e#C#Pf>HYLxeHBP?dMR%_WasCHq(^MdVt)!@~< z=(#t|Gg>$G*kqk;6W4K%w!>xT_%9(oy*D2I@f)ZfqSrQlcg4QyJG55H0<%?K8t)`~ zRLzWm1=`of)_2>%-U~y>J=-QX_~upxg{pIm*dDXlK)y<^v!_A0`9knTWt(kp=8XmK?Y-XZJOz>yUrbWZ*#YYWp9 z?3tXu=3btk<~_3(-pSwoM^oMZ7g+_VPh-0IKV(l#-T0%dq*_ll+>g|jQ&??NFNE#O z=ob~{%OS78fwp{+A6_>7o7Ru_YhxX=R_otn&BoT%U14|wUFmAAS@7C<|C5w6<+EcM z75ekA>L?0^)OW=Q>AutD*mk@(hU_vEkdtSYD?LV(=%zB6;oHlK2&a}dMoy`=2ms0 zMjCI}HSc8ijm1mP7Ak3K?#1658wCrItDnW1D&J>^q#diQlbs{DY<~U{*i!3PfYF_zkTeY}}Lar@)r(~hV`2=iBK7LsE$Mq&B$ z{us3=CRPGb1&avW3towAYR?~gBSa81e^>K3z%nrponWy%-1hs(;@KUs_1m?2@u-ET zkq+$89EtQ^uFt%qyNu}g?ilE{SRy^&(L<(ta@j79XLvn-Ja5UD(bd;oM6)9a`6sNR zj$}u2tVz3{|8w!@i$Co#wV?eM#?j3ouheW|{QOU{nrhefrS|HDwU1)$+qcpSTg+|iAe_&^&bSkcf_+V>_aU1bzY~@-THCFSV4L_3Frc^lX%2YqX8FE|&4FK8 zbA0>ie90cPe!0Fw^c`Xs-SL$rAe}e_+3ar(_L*kr7*BoBuFYdiw?8idhh0sP#+WX{rL=yH`bI;&w|3?MuRXmlKY1@@uf`9OZLI zIW_6@#Ug)%{UvqYny2QTaHi}nEf;Fb5g)CA1Fn9GLX1fsZ^8ni5U14J>|x)e+gF-ZPWP|<|G&MKwvE~T^JD6@ zG|P?-^7tDp=PqZ{2493%Zh3sKAB}qFyn0eIM{_7vq~mE*zngiMiIJQ~YmU=-8bo?! zVhxq;`%AS0+L_V0Or%q;{ElHm)?dUzQ(rzuy0CaZXPcyb*=Q&t8`=@}L1K6|m&W{S z+PTKD>)r-qRQ`Bg`vPvOb)jBi%dTig@nV}f&cR5dAZ|~)J)K8+xH><)6SKBl4DExb zJ(##kO$(lihd;Vxgx;B@JtkF-)H>>F;H!YI0)YX!Pjh4i*ll;A2J_6XREtn|o@tJr zW8JZyLwLA0H>{I)M_);_H6CfTZ!}&`*M)8#s$<+S9`Ky|bY6_(3&bx-=a5{+2UfrJ zSfC^Gt(nW-8{?OOd3TQ;`O?=+*{9llN)mZLi>V0gUE!pc# zni@48+O20NY~B_kuUb(+`DOSvw{o^cX`1|z}k?=qBiu4T%)U_z#yygu1Lmdd?vaXCMtgVe z|GHRa4oqx!2ei9SQhSd$%G=s``6%z|DxGf*`qi3wX)Jc_X>v+iG0{| zFBku4=Is5YQ}c>Fji2dK(2U)vc~T#xmx$?YL$}R0z_PT--aJ#zA@u$^-e=XASUR55 zBMpk#Nw%xgLlii+O35MA?38wwD44M(9j`kQtd=jLBbZ%G6@ToNruV8nr8~|y(GBlK z-yGVvz%b%kd#Kh{>^=)7i5gPv!2XhM@8kiJE%HT<@8w9gD>&Cql(q+56JkAnV*KeI zmuYEZoxB&!()~$m*n*#gD|nQzL@POp-RIZEe0=4c7KY81%H}=>t2!Wj zNVbRjyWQU%<2?8IoY)T*qiOKq33Q}`UH5voF}qA#1&jNp*&k7tqjmSx7E^0R7AiZa z&&@8%{3lfBYxZhdv-2wc7p4QdRpVAon;Yr*IW>EV_pWv~&ta~=m1%xQxFbA8bo=a_ z2-kiQ;9O@Os5pG@3=)`$!h z@1ft7Pp5GN*O6;aoD;z>qK5-^ADbQELxSaN(MP%b!Fc!R{y_H!8k+l#=S4Zu9PKb= zdRi;nt@8sYC(6tbWHUYQw#hT$3H&IpvMRGSn;(Uz`JLRH5Z__?4zrI3dVOwe2>$WX z-ZHk@9pjGirDB}b+UkMh+^V4G9o>%Zd7~R!#cY|Jo!`{~@)HhagXX1Az2 z%$)tPCW}MY70=@CA~C&kUR-JyOY-dTc<35ORXhFZKS+M7)*Q6;?W<>qh-6&frbtfD zmWFHm8c&XE$92V~Jtwa5O?>`i$A>N4u7X6L?<9-Qrm&~EQXw~RO_oO3zj;P$s)LtW z=WabyhxjjaGOI;$U&yd>0H?J>0s)EsNX%q)6z{&SOc$Q?(%BfpFG_{uqvPtKp= z*5_|~U#S?EeV^xo*HY%kz364~yqQxIraPgTHA4AOKGC@v8~sZBj;^I$OZVYjub&h3 zHgD22b?||gIN%iw?K~&nca|`IPK0YeHS4DKCOVt`4&EThl-aFCNkJ5+DHMMK% z5{l2;i5?u^iAC|)krSV%^H$b{z{&ewI*S;bd zw<1bdKCcylg&g_}=#-?JCg+c+%tPa=3pI{9yD07%NG&j#C*%mSgA7@M^S3*?--a&3 zu|&?%L-UPm%aML;a=O$v z&I)r5JZ^K&a~qMwW9^JEE)86y9?FB5@ z`R{Vt$%KP2aNi|8uZ}Q@u~z@Pn*! zn(LwSnruJ8+l+HmiPSLdiU0Gvv#bctvY2J@j@*2&%VXD7gJfOh()n)ooz88CY#nu2 zA!;2n-=1AGYjoRMT%xAGZ&oby8J&ASHrm|2t!i-V40b8soTpjc*d0)(a{o>9v%YC| zKUY*^vg<`dGfBg3=h!+fe;&tn<{i>wWgRF@SL|WdNBTRUmC6(HJ6Sc%O6jv*Qj138 zeAqY74dU4$gLtdm!W$eiqxmmCodxq-*VE=>)0i%vChR)iHnwYs#kZrrOSBoVM44vC ze%LyZa_v&IuKL0EmBKl+^wtrZTYp(WiKi`hJ}en*R_D~GVLu5U?;5NIA7eYBcqukk zcq*Qcj#aVywy(Zzco6T@9LZ%HBfUG0#bH@sx^l8lXGKIKS@r_BCO)UrYL*x;*8P88 z>kj|kmyHd9SEw!{M{)WF;=hu!!m!SC|$TC!~G z-`6!~8MpD>actD?JJF0Cypoo&)80*YSG@V-H0K|&>?G}|trB^MM-GnP7@_6Q zb^H!_2klxDohycSerpIWBivD(N8>y#fw(51|IN)`>!zzq&Qp-P=GJT;t9@5bk72UU zne`QCN99)0P=OX_eQ8#kdf}Ic;UO7o?Myu^Cc22Hzl+Ak6L`~jS*#jw*Z2nW9B})h zj|1K7b^Bt7c4~Wx9Itc7>y{$H?cFvySaVm&INgaSfhTU2bl~Pe#rbdWhf9 z=kc9UonbX!M5_2J*Ui=Mq#o?A7eB1bJ2AD~Tz7YMbl;Wzb$5;l!|IW`zuD!=GV74q z-z;RST?*HS)M~Z=0(Y75Zn=x(0D!|Wh`u`If}?$?i4H0@A9SC1wG&zfsIy@|*0NX+5XaoxTi^ zg=^iecI~@zyw>eQXKsIjeM~O==f*p-#I8Oi)VA;S?b6y(aJ=@RvwQt?cqRK1za2HZ ztUc5x=*}(lUtiA*(l&NuZQQ<>!*$+^8S3eVO3t~^#eCnDuV(-aFzh??msz6MP-$`_J-;PDX3=a`b=ap)zs(UE)Q0?|A)fws-$~BWr2t zvyR#fZLeDW-@cC8wsai7DMm|Yr@`-|M7V#FUZ?Bw%Yo@*aBEU=yp|A}-a8dum);$2 zN`2eT$aDOr7%iQh2ETNv(0DZ-5AyC_<%j+Ijhwj_j`sm&Svj^#Xio2)4%^J=dTyc% zj^#F%gKQkTDLzYQr@`)vcpc~|NnR0NC^Ehr!7+k!5^@}ukel8+7mmMo94FqzE{?xH zOZP#~xai-ZV;Q&g@!B%+kM&XHB;@)y)w!j!bLr#1xjwGwjytycy!K5gOx zT02x^(@j}(_}A9ilkQG@)5GQA7%rhUy*C|(^R-hkhS|&0Takz$b=dEl`V`*2W@^ye ziz#4qu%m-`$mv*H%&?32DW&K9NI6hCn>RoDYfP!E)y#ip1lr6-=Z)@t%35b%sXCuZ z3`+0Kn@__#4FnsFJ;(Lxyh78gNQcYUIhOLMbT$shnBk{=Rmr4fk`^|a^>No}aP)8F z4ijF|`D!|?dR^BIFj(-2P~U*}EAjndgTy!kBXrkg9Z!Y@sSN33R@<#n|(yqCYL zW3Pm^^xpBD6vEwSO1C-`$E=YW;qW zzZ7Gov(w^FCuP1#TnBxD4f!ZPYl~OLjO+Wxj?oe-(|gBbl#ViYf;8s3(|MEqXsi(@*)ZRzZ^m|mCtITW#u#}We5d*k9UXjnQ?v44MS z@;a=y{=+vN%=!AJpBO&(m4f3n#boJhD!i_7ht!|FK;Q8$T74H)LSF9PIB2|Y;!o-^ z(v0PYCYE~D?C6>Npz&5R;O<3pwll&W#rHz&N&Tgk*Z)<1i|loNL$jdCnQ&dXHW0_ZZSJiZv-`@zv719_{@PgBjc4I> zZBVjkEQSVd*M`>k+w)y5lL(7Ewb$#iarEYqn!7p>;Zw##)+ zef(Cpgyv&q<>=1gIDc(Sbfb~bz*xBCH(tqE$o2*4wQGZi*O0{Mh58_x<>3VhILAwC!^80SDviyR_J=Rywk z`D^Fkf+Kwx(jCWn%;v66g=4H2y549;$6Zrp{v>DQhpaJUvulr-1k!KK?z8{derY+T zbLh=qn;O$;r<5Ykb^m?CUa)9i5kyV>yr8+|{YE94Z5U6MKUk5IomwtGpTq&3&?RJm-*` zzcw|V+3T#W=R~}#)re}G71EDwm4%}-kHp;7snMD4>Bz_h$=f<{RBh*MSeBjn~!(W2l}j``V}tYRk#>a2~U{ zt5f4xJET*ULf)xXZnbyc8mIMqjF69EQIg@(bIj+^oxe6U=HJ9q(Z+bX);iX^Sg%XX zF`mbB?&>%g*Y0t2m}P#&JNYNB{Rr9B_~w}9Lf(dHdF@KOE~FnX565s0t@&$HVL0x0 zW!=E@H86HptGhlo_6tm)i>y`?tg)W9i}LX$<~+z_K6mwa9%zRJuzD%`$q$V!9(4Nn zZ+DGaf8QRej_@3o^Vg0?I34rGKz16_NcH@>P@R6$*sjClGPNw79eF0?u1>*@v>*PX z_!*g1_aRn-834ZdYmDS?Lb5rBlzkT1{@tH$n z{@SVV8Ed3%>Dn4|W63yj^C-<-9Ur;ad0Jg`-DHk_ZLEk}(XZ?4ZxHL$^7nR3=FpeF zHa;fN9<1x{8$?p$s=fW=`Qhu*r!g{ze0#@d9*eoF$Kx~g2Zyz7$eUUhPV;e}7`>^j zie1j0OXEJFpALCQWXv*ugLTI7oI`H@+VOZ+@2~Efh|b;1TSCWvmCw8lBGuM~nz*#( z*Wg_sV%lmC8gZHBA9vVG}{ab$<>t5X*eWzWg;||J~fX* zm)|B6$LTq78vC|_2I6h8SHPczmd3M1RE%f@Q6u_+ho^&Yn4BAI*QIvHk6C@Jo}N;& z&Y8Jz=CfcOX2h1YA*VfEa3?FiTQJmy1%LWs@^k#36aVdfqxzC#%}@NqvCb;GpR63$ z=fL&h*3P4#oQ@mxO8Fq~dU^hmF)W_(D&a>0=>{`}|+i&ZI)~P%SYluDOZG;$6VMoEU zI-#rmTTDiG7KRypUAcByIOlib96dcp(19iK58eOr5%EobfdfeitrJjV{ z2tL?HIeQX6i}qsOI&z0g$FX~E?4~+*ClwItU)`oRNi}bZ-7dXljvEZT|~=% z7u`#qxb}czy|mm=jRY`_z9iYmN;uIx1Sj5oynp6 zaM?NP=Z1Q)&KykZNxK#+B*uK#-ZJ0gFm$(NYkIM5$`C;c6*PMiG__oyg=xe~ zuNv+h!X7;GWV@Ngu(dU%&84a3>+Crvd)hTtno9r%KFU8FjZ0xw+Bzc+k(s0Xd?@eF zva}d$?A=hmU%moS*%9Yux>be`SZ9r~%MKNYZL4e^Z^3zZIv%F1>aPP1D@&U5tb5sQ ztv2Jx%u#+Wlz(aB2(O|CccK^9)G;MRX7_tK=FW$?bPeuWDVASmJ6pF}Qi%ntrH%6R zxiKZ{e3=(tg0ILX;N&Y9Lv>P!9@9UR`mE1Q?$4Gjmi*p$JlQ&H=E52<&wTX9)#MdG}+HqNMzqhc1#&+DZ4Z3j&rG?m*(sqGVN zq$Ru)=jiD;N=24tJQFK=ZsOinucCfbJvZ?Y68RjO5l5W{wYR-bwu>c=GlizrQJ6SJ&kIt;~ z)lT9_p!?lwb`(SAAMGa@$LuLF`|wR$-^u=?yVqbhV%S}a1|Ejk;c{`jo)52|Md#`s zIj%3=a=$@#v}%7TqlZbzF?>D@*Lp#2S?|_l7PW z-S6k;7H@I=xBY!tB9771VU%u$SF-x!Pt{7p+zfy%Vs$^sIA%|WS>{}jgQT5jbGif@ zc8i$ZPcn|#b73~`DRk5l!K=&0aeFS@noiwjW zP9T~pWI^K8{|)X8m|PdP9Ycc5cm0 zW~CNoozo9O^-WxBw2velt#y>z6Jw&)a=dIJ9`Ec`JPb?-!yEDVZKfDgCD+uGD392E zrQxVGOxBObqn0^uSO?UC;SI~hf8*IUTb&Xp>@$u4fY#Vax$K$b$O+eg%V?cO29vXW>bN#5y zcVs@$wIDwJ-u>C;Wa&&HMQ1{t0rteanBe$l|9qGhanu{8>&K~3Pd7vAG&QztvA(oJ zLEP(!U03&gYe(XcZRA}Gkzk0tgsz2sE6BOugLARYL3?5hEl4~@vuzo4d)NC~(YIF2N%qdU zI@j!p({WBSvfi337qi3rdAF9;WY}JPID7V!qBFs8UO$e(1fr3@H9o7fMrx~dW8iv- zOdO|meA*LZ;8gwLI`P-7B%;#HUSvK3J_GXAHG}xF5FDvh>Sl09wq%Z07YHa0U9(S!s+)2gwzH)Lj8&>PbY0zv_N*%*FuJ=pFky}Ts zJ#jp8ZzZSdL!)8e$tSWAsEsBPL=3&_CB~PxJc~lV6;%cFsI~nZD^KWT75wBc^4$JX zaoidz>&G#0doQaZ)g{`GqTlZvueA1#4c+_}zfXNNKDh_+;oUZVxd*|9_GDQe+H>Ey z7X7hK7GVEWl6A(^nPN{I%NU)O@+Muc?i##*5}W$5L4E4AWd+c=?CbAiI9w)pvRNNl z6VVplr_gXY7{<>*PcEI#xE`A#M($7~=Vjv9ofmdvKUUily=DBC*+e5+7QDuag5}=bR5s~!ZWk-h?VHB@42xmt``^)%ptFh+4i|j zwv7G2yJmV|S0awvdEr(gy3AO(70;UXiO@**mMw{XsW^V;g!BnU*T06)`tcMP zuEnFajN_VY9LseK+Y@7Bnc3-W-|z0CJqheZJfUP?k_E(+7|jHtzLYaM_)$4})6{uT zm&cW~)5&_eXr*ZG=4+l#qRty*Mg4dl-Y~_*rn{$o^!t3XpohNBpM_7`$esT2_+<2LPmIl~`Xq?dI}~_h``>gH@mhFOmrGbt zj5YP&*-w_v3qyVVI2JEbpCQ!{?S7}W`(?G@UVg<%|IV5#+0?2^zi+-4Uf1dUbiUYYw@FDMVEo(!H^{@`4*O$$KEq7#9jmB)Z`)0?HpLOsgUXw4f+n{qRUZ*?x zSqsAJmP|nXA#!r9ZaTYu980T%)%UVD2HnriBm<(uVU~w`Le+DypOhTQbp+cJr$zEw zbaCvp>Uy@?-pyewchnjt>&G!rt9HcuM&IJYq)YZYiB{2XO11D>(2AFxZ>#n}{d+qS z>j<E`AP;7ung$eQ>nIb~1sY0VftOd^h6!)E11gB`!7^9lYuJd@zo6p2bbnlw2)x)LY zD6XT|o){CwzsuTqC#xfRC!TH{c3i}&UgZbfe6w1=-yGYFPAjX!Qv!Tucdty8`kTv}4sx1rshK?@7 zPW?C@x~Q}v&X3Nx`=(JJB$HKp9I36l?kLtU2{=0IsI(`>Lnoes=VndUe3Z|dUfuVX zhNIRnSwD`6TB=xfva7;+{UY}2bJHVb&6X#*kGb#c2&^N|o){m2cv!c9I=-hP&2Usd zj)%0q9{(EC#(x_8rQ7i}9WE6|aUH$(#FQwu*lEbrCsW0)##t-$xw&h6tW>S8S=)9| zZSvSxN{({FaQ!$X${(8=6z%J$F#zIPakt|wMF_h1-d{eB>^h?Di7AmyPKfpq*p@~P z-`kOBIIADWL?U^s9(A?sELN3$<>AP!Bi5c654m?@$1;6Tdp>I3%T{XtYTw-vX?Uw2 z$3^5#vg=y&S`G%&Z|kV5qs^We4|Q>_A9+(BWY^!f_or6nx$$wa6TTAtiQZhd7hnwe zII<15_2YENw!H%RfLHSK*!1+LCTq=lwvFF@DL6{&=(H!ML1~B`5aH3zDP*QFO^E&} z7G2m1UWdxVk!!fDAIC%PW0Ng5G_SWB@f^V6ATSuK?s(u_7b-&8$j?QETv1-h9@6!3Ex$o=< ztRv5!7#D%8*Kdt~GoJ^wrA!gfxvxANxrWR7aa`oSeA^qXzbiDjOuwz8u8uZ)VqDa{ zHv4h*=6Ker!C(K1o%_y?K*Lx4I35CD1a)|ZwwTRP`|gg&Iuh-P@eoO5oR0ALg1{!# z#;jNA4s*@E%3%_4bQ<>R$8ph#uH3FCT{Bl|5^!|ZQE5+%iB2jJ(3|VFA&K(a_jIHg zj_SuTk*0nPi^1qj8|x6Z?$x>U%^i((6xtKxp%H)Mtyqe5Qn+3H4!Zko9d(AO`f)te zg$}jXvL4~L*@-X5Dq7h>?b@bU2$D%MyQU5GnNBUC{jalRLxFNIU>(X#+8uIGL z@vw=G$Yr{$Wv{&-Hv6RE*sNpHo){0Cc*H-5M{XxMxnJeqcD_w)+P7~@!?9_|s~?ZY zCYe{a5;X*muM$tBMwbkW2g$KeKatK$eUxXYZ1gVi_adjuZ?#F&OU~I)XMsI&JR9ge z_txzEwTc%%DV82b<-xt2J;*=wxi$|0%wbmj-D*4o!>o*BrRCT*Zt*`SBgb(azxKqjIL^s`*W`mzyZ9(}Owh_?u2J2wzWL$DNx|`IXsjPk ziC42C(7jz>=UR4&`(U>$5yx>IzxKp5IHm?U-X*??cjKmsldUa7KmJ~qVjp!arJbxb zWobBG4UP5VRCs-my&66brrZ&`(4J&Jh{kRA;8?f5)vDKFl5pJC@oG;@gWD%T=apde zUNp?>YW8G#Et-B;$DSdpew-G2?54~&On*kYYu-1j{kk=!;j#bwJ4Wl+v?r#-=oWD3 zSTiKmkJDf+-Q(=Uk|aLxNo>ir;4l4#eY>6XsaOt<(K*Qs5o+7k;!Hz!ZSNX1lYtACsh|Y~Si;)> zhnmIbh58`qU`?(L`&MHzyVS43=JpkKu4Eqa8=6I*PQvcueLU$pTk0&aC#GTxzBVGa zAroEusKSwtjh4TcPnOI6Ab5I}cs-tv&(4m{>UfMaoehTd`f+SF*mNms(}@j#mVd(o zav_;q5pvd-X@5_#A`F+ABfE}hd*XD+j@Nxhwb?oSsE+03h&H^|kEcU4t1s5+iyX0O zuiZlV!$RrDbysSR?mDXNiRsWC^v#mHi%n~Jv}NSTHC)z@Qz4hVB++8x4fIpSv!WKX z#>>-ru3EQ`eT@&s?U1$|a*Q;c4RsdS6H~H*ex-{WvB1Z$z_WlXsEsxx? z?b%9%Mmxcv+sJDn*N_ZYVy)_Bzm`v$on^6C)(xUl`uA_-jLvcV`%WS_Zb9WNsB^y+ zXQy$mew>n>c!%g(?Zl6lq_d!oetTkU7SMGMdxw4+ ztl3w>1bngNd!_r5CHkK98(4nop&6apn{cR<9Lxxlj!v2*)gZU zc3EbQ^g6=ri7}CWE!x_uO36V(XIqsMxy=?=4c;NMY1rG|i?+Vy~Z#ZIf@OV_2alG{+GNlwQh7LZJtu*pglHvJGOAyL#xk`id*tFmWS?X^!BlG zbOzLsZ%>TNfH-qocedSq-}+GA{f@e~9U=|Ksv)s{oEoe9TAAxZ^1c%2!}-2{$5~KE zzdbQ73z(|*AU;g(VA6eW@5FY|X$n{?rG6jlV?+4v>bq66k0&ulyRjfGdnA6JJSyg9~ zJuxn;$TRpNEZ|7?f!2J5`ZBNlx)GhDj2I#-N3!9xemn(|RWFjKc_SHXI#OW zd9*K*pF`F%xoqrjpQ8-8<*fr#c-+Zn%V~+@Wa~_+GsK=4lPOP<1E9Vd>Q*e8sy=Gl zt+`djWc5ptkM{lQw-ooYs?H~SXPa@UejJx=tSjV9e-f^d0ja%;U>NAq9n8}LJx7Od z1O1}8vE(9!yz{==8ggZaNYBw-N3}gMHoA4MeJgp)cuTOMsDfuk5Ej;re0r24_Lg4d zy>rJVQp7nA*k7*=F35%E4jB^~djLDyFIu}wlmDXASe9p{4axdxufe$r1Nd=%`8)fJ zTlM4g>`VLd(-(|AJ*y2Xk6CzHtw~NOxkz}+fH`W7H5>KTeC$kSC}8*EJ5&ovOR!9qw2t-d|RZ^E$rmiF4qb8M-%O zOK1n$rFw9t#dl6dj%!10{dg)|lOd)aO8lN=Nz(%qFAH7Rw`+R@tzDLoW4exIdtz!# z)5XUs4YiAjc{1=B;^ko0hVKCJ{-kx8!=&X{Hze1O(_+0HW!kQuZcD;3TF0h6F)c>b ztNckcFY}W%O9%flxy>9kn|Zs)9VQ>gv!S(q93RhGKSBNmb0@$taR95QU=@w)1vT@S z3eWF$wr9Cun zC7!1CHj#MZ_L}z+@@baGg0V7Q#+9S9!LVLGj>!hoc&rCk@?&$UY_gF}Nnak$>wZD| z?m^qzm6|jht#y>z6H}p8<7{e^TPz$;HWs;hNYLDCoDUr=w>)x(O2$!a7_A>qjpESB z`(89NzHE@K8G`HVI&8XkKTMb9%qDvn;mX8kxl zda1I}tWxY`>jbT{rf!aotU-O+ttCJJH>7&x!3>A44VMC^n4NkJF$S{L(2;J%UVe&CR<{?GEiUNljboDb1)lxB^Y0A+8;5KAqUkfYi#TR)x;)z}$sT@OKbUQ&+oI=bzN z=}=AthHR7fjc1Fl5!x4}oL{;{yW}uQIm!*g_2X11f0A9H_PxipCQd_c6?Jdh!*RbX z9I17L+7r_tHMeKq8bWh2aAX?p>c{Dk`L)Sar6y;~*bGu|bk3lhT;10oG8b>qr!lAAyGp1aZ8--Lqr2B zom?XIk;nZi;#!(q29jD4HJs;V*R@oEN zuq*CuMJI`SVG)_G-;u6Vsp7ekmx`mej#_(Sdh}u&pnG)6>ef-)m4>6$uvkA%kJewsg2ku%+3_k;*j?o0;fSpx z)t;CJu{vQ_eFRKV+KGfe*<@)hdXm3}fkTDlxio_Gy&4rE! z+sow z9f9`5v`Bo|EDj$o9EFCl`f(Z*(uIc^Jij$N=;tOTMvfT0a)~prmZy0WTh0wSPFjxk zI?C;dY0!>M_ImL}*8k_mYnCG0b{$)ct__!rqu4N7KTd^Wtt$nu52CxNzSF2My1L!% z+$NfD&DwnsmJ`X@PfCvNI;!o7Y0&*BXl6!6u6LsCV0f=;pU{VHdmghxWaP*;+}4k$ zN493ArSrKQ<9&LdE-goU9p(1K^k@%y+dkocb9@`VO)3wv-wyuCR6dSq!)yIGJ)-0I z1`+LenwMK9YP}7Wkt4f~XnSIMWT!rn*xQ%tqpj^HW1D-Zj2zj9+xqbo$nNuvII_(W z>GvO{GIC_s5p7RQkL+|-sM{ZEfAmYm(QDYOAE!a@llW$JYUj3l$o0v=5n4y4JuwwR zL$`qS*}6nU;vO*VC_ne(E(mdtnDkjks^PGHoC>M*C8F~JnH==yqDOGZC|)0W%awQ7 zuqAmoV(Un?Cr*P{?JadLQS1lD?H@eOOU2P^*sLF?K`+{sDXZGUdV773+uz?2Sx2Hh zF&!eQvu6_D`zCjjyceB{qcP>J*#Ka)ED=YoVX}Ul3bjvStEPU%?cua514m{Zk@mzi z$b1n!y1kCv`mG&(hOPQ>D)hB|Gii@G`j@4dVq4RiUGG&*LXPS>n(c{Gp&AQSyRYK2 z(tdO|Vz)V(`y}HiHjLJfr$cd=UV$xZ{m-b&paQ|s+>XPxCFH2CquHLA4%J>sq;*se z;@eB3U0y+C=xZPUbMfbkKV7u14nLm?&7YbMQ}j!Hlxk0{0*kfut?cgZMOQO#Q!S9Y zW_t8(la>C~*w^Mq)9&w@m))J6q1~+bJL{}N>RQ@q?qfMlOiyrneVzVI_?mKl7Sh@3 zs$m#i1gx@QixyFzBpjvZM`^k)P)|y9k4)h$&NNMJb>i`V>f+<#<0A-ig|flN2({`Al{Hqj<8|4aJ^}?d2|k^kZb?$euH@ zx4MHIit3zv9MN+^bldvIK2d*3*jvWkTDGva>_hjyvT~%)3F#r8;#P>pU;8aHNA8@E z+us*z%i6eKDvsVcp*PKc*jnCdpDocZ6-V#9(A(DoYs#z95xQ%#$jo}gnto~!{I#i6B=cx}nmLc*{UzfV zo(qOUo*XqQ)Yy_Q_SWni*O&o16v1V=IDY4X-?ZX_`KokN{wliI`~bT@a-Yd4!XL8h zcm}?^`0IwX^>{LLUd)9T9~%w+t7vjKfo;ux2;Kf!u8`rc_vl=t{<1A=`$MGVSf2~l z<6d&X^OxKIZ`UFpE+fbFTyXtKEElX5?PwG4FtKUqlGBcG;9+_GR_V1}tRE*g$NxO> zj~x@br9TMLUj_eE?0yy|Q0qm8HU2|KzG{r&5_8PY1@l&?YkSr0V!15|$LL%z+N~(R z5&e7HWR#FKK_`$U=9Hv+a&;4U(~&ZUniHg4^YxcC0M(x@;V^^Fpm-wasHk=y?!I zE(>vc-Ct5ash#|=19T1(RWF|#YhjHQm2E#vyDo?OaaJ)tnf+wu$UXtM`Qt(@^0 z;*2;CBf=C);x2EpR1IZk4^k)yNnoHlFo?pGXk$0 zyM(k)12z|x9?QdeEke8hULo!WhHfay%Mm>vL>q>KpV85LDZ8jxiyNA|vT`KP3CTLA zK__3bC&t5}9v{tbyk4QEwn+?qh^@=SF?=oztG`kEbTfsR99+(HIy}+LZe}_w_ec4M zdVj?@b4Gp>oKvx<-ky4laCthu{++sgigL1oFRI_qCw*t!c^P*nb~`M?>ra*dep50F z$qJyGV%m|Q+s~@)DPJC&#`2G1DshH`V)ab}o^f<_~%= z{G(p7o2%y*VcjCk@vJUcXUvirldt@-3|D8(ajYpz*O{|q=5#GQ`f*bshtI;9a~yNZ z(sky{hdEaJVxGGGemswozxuDn>Zc0G84@$(P$@bS=F0>a5q2cqDGhO6m$RY7hJ7UI zjF>MY*qy&RCmIh0SrMAgnNG8bW1%HZ>?ccS#e7+j^SfL%5j^&fS~2}7F;Tjly1$w1 z=l$m)<^9cVtLv0+!WlUiMv^m3Z>JAU?l6qAy$pPdC&YC#5Bh7i+@cGs*EAA#1}%d@ zujgdGJqefcDR&8zT0FW{T2{idqNimd)GOo_>+5n^8Xnc*1M7#CR&Y zAZ5UinxgxLL3jblYX8{ijv?}aOZ&WoL;pL@uXFJ$t{aN`D#cx^jb+-)oVq=Hz*?y{ zthUd2cL?u}e>cv@IeSu>DI-*$bUy`l(2xFnl^0sO8Z7(2Qx~X}8CpP7^SX%7NU@}uS*SF*9%0sQhc(qcV94|e$3jttwoF2IdPY6f=l!^j8!Y1 zvulUT&CwpvT>CUF+T)oVI=e%&d$bRUMncsy?cTWl$tH*H4Dxo?@ON_Pf7kg}V_mpE zE&s@HC5IVrc>Lb2r=R9Gvp>N{$122=&c#!4@v!&fybS#5`!sJ)0lgFGcL(#jxz@XH zy`}LVgx=B`&5UPNEN^EtoqaftM1AGz<5Tzgv?~{R;#7Ix2?HKvU1G(;c8vE+L;cv^ zDU$uvew`w_JFxS<5oczXfqhq|W+uIVn6aqYc{^bxz6>l#^gB!iJ#I(pjyJc$Uy61^ zmmQj6(e|C=O&a!24*l;s|N7Y0y?zS*Q4^)SV-;jZ<}kkbS~$*H2;WZk4xD{mmi1jZ zJ^Stj3(N`{;x}>rO~t=y--0u+k8j=Ur)MBJPFK!B(L>tt;!>>e`o#1h`pPB;hGrcy^Z6LbIS0B}@4Ipe4%{_9hH!n} zv1;Bc-hF1ZnP;C!9KD=&@(=p6{nm%-#isPWJbIeiaXZR+jJy z))Hg7YvSlsfe|IbcG3!!uX2X<^W4~tA-+zH*z#<`>9R{sA#b-N`?%P>KCLB5y(P@h zwJn~BtT`#{rtXDR@W`{Wn8{CeaD>m*;UhP*3h;3*k6^o=<80>}D3 z&7FJ4Wg)x2V+?;sDHq&1*2k=Hecl|?TvNXPu*?TRY$Q zxcB5d4SekTv;>}}6GE81rIr`Ht$ZhFb5HU$eq&bv|`C*Loz2O*p!{P75SHT*4{_A4i zt03>1ZdvqC#NTe2DV}+9s@Ox{8*pwdom)f@c#H6Bomn6nH^HC8Q~;1n96x+(x3lUP zwkM{wv$V&6#+WT5!?O)_mdTJBuS2zQzIWV^w{hry(K%;~svoE3+-+lB4cohTMe`UH z&E!^N(M~0EXIGt7_QcfeBKP)9qFQ8d4B4+Z!^UCQ^m2EW8Heh}X<4Q{w#kIo?&)dg zxSeQQvK7_uhBc*myw88kj$7WohwoFGd}op%lasvM=boJ1VDSBxOXzw%{2sX6uy+4bXTux}Oacz3im3UAM^Vt+ByQ7agkO!q8nK&YNy9{Q)N zeX{l7FiAQi>P)aFPQ!@yjsq_!O!(5&cM#E}s^Dg&p5NNH&-=ZM1GV2a**WSB)Ai%2 zP_H!;I_o^d3z@;DZ&&vMaewK)+E`W+d^PMRi9N10N>W36jVn`1+!^y>GnWv9e1vG;w-JR)1H`urOyppuotz) zyRUZ&EK~0SYoPU7(JCf#PpFsIn%!m2{2iNV)5z7?VqB;n$7Rb?6H#HMVKM<7iFD1v z&!#m(c;2{A-NKhYp4;-8bEwQ5<#lx16Jw&hjpX-&XR&>Rq^Lo>=E>c#{*AOgBwL^7L|b1{pu<$0->UcUe;lgZZS&1@Hk! zw9g3~p^u$mdKE?EU7kYj+dpgqRs|;;#90i*OEt>>H9BX0{Gvqkvs_C|?c|=R>r&~jIKBKUW-F;-_xHi<*kEg+P@OA3E zSMsRv+nB!IHNMan`L}f=#45M=`ueo_zL-Bwe$IzF5A2Ea@&UciyLJ|k52HFFX#PGH zl%(d^H)Pk3=f?h<>_o9>SqC)dLo2L(Eg;kWt=ZWS1F^Vax|Tl46LtAHAL=}?C#K{B zzDBAj@JBA&15>l_$Jn{{Nz2h}SgjwYL$mtSOBt}tz|dS*v+2okM$;3aGTpX3JAWF# z`&jaHcGOv6Pn?q-_&TU1A_LF)(Dhu_`OqgpXMo|mew>y8L|)&Er9&hZey)G?Bb{*07#A%UDT!u+_j_e`G?n=v%ZMdx;PmOG*K!$vO%{XI!7dl=z>W86z zA4xhR>P)aFrey^7%WGoCboH0-V%2kx9Wz8;j&8$l{djtG@1v(2`DNtqBTHvRoelQH zl&oN{s(oW`C0l_^E9#KRu>UCD8nTC}e(bC9UmhcfE?Mr4Rd}WodM-QN2HCA@{lR?` zzqT&wxoI*v@6K^DcBU8)>c{DrqW$q6o2)gB-4Yl2D0m=l8SjR-n!~n_gdEd#EZY-P zVfsdJOJr8(RmU;fH6r-fC~Zkvj%LGZ{Wukx+a6_$xrUB*)(IkbFP}u4FVBLRA|`vN z^c?wh#M={7AwT39Jc>Pn{hsUPtG0Z*%YxRMQ)_dm!VN~n-q9#d+W zJ0_`M)wQknQ_0qOWGty4r{WPal%#Smx2xc>e9?fM(`k3KbAi`fNOc4UNp>cW-qWj+#m1fJXU6o`#Rq3iF4uJx+yV1 zb&bBAx;MXu@>D{OX+v!NcpglL7_aMW?VfHkD?^pS%Z1~(j$eCXY#g&PV^iEp6p5K( zH)3ZHPa>M6y+4Sy@)TK?Ry)2#?L5TxR$qF*Ow8Nf|3q18j&#Fu{dh{Ge-aCu?)7v$ zW0p4=ILnMLoeJfB5_5#tk!??$65*OPpxrE&XN#N))v=Tu$%fPV@svo`=~(T`2%X7; zFBf|T3x*m9w^RD9yZz+oY^bxqo;W2Nauq(BA%j==)frIO-_&L2s5ea4kEcYvbsN&T zA?6o%ZQrl$`y}QFuOr)@I3>cdWUyhLT!%N_r#>H5Dkn#?VYPld9h!Z=nMbdqwT@DI zVobD>T}xfjz4-d@Xlq3hN3w;;%f%aL^+@d*=-1MXfC>zDns~|U8BNQ>fBidka}@E3 zw`KJz>lZ%rQ%l^LWxS~$r(xFZ#lHm)8s#J39sBb)VV6#c7Jf2j9XW{}0Z~Iv?$c z@pySHyrNE!?ynZx9l|hQ=^jNN?X%LIPSVaK<4OHEE|Xq`L#$R~!mOA>yaQ~u7nI@|1tFn3Z8s$1->cQR#TdAmKn zFLpGN>`LiUB*<*yFblO^t;+p$^69laznnMbtTxWpkEdWYOk+xcc6@PGYyF4raNGN? z|M|wWwv~F>>N&nKXLX&;_QaU1{vi9zx2A4MzwP?} zC3oMuFHJn?tOd%0;c|0?8-DA@Qz9HK7$&v3mLG!dRA!FsI->1~>5+{_B5UVPe!jZ4 zE@`X)%n@Hlx;-%!;``pR?(SndVxPCX-L+yGc{)>!2leCWnZi!~ zo$U0?HlBj28wh5^wtZSZc*Zs9Eb$nrTr$7S}$zNi|}UCmXN)_#`dA(@nPd+Q$GEOuWZmPEDbq$5dN{4$#s7wlqdscy4Oo|t zGIG3k(RO@q zr;(?xXMODIULSuwi}~`UsrJ>5MdpvihZJ_(TIHyGVPAG5|7bQSwKLd;YJci_XSI=9 zjllZGZ)(@+Zbk8Sd39d7JO8>o>$@^7|GJZtQ})?hPWE3+QKtI%{l&k8QyLliO+KwL zzs+NV^6&8W*-cr- z{Sx^wo_`{?;Kq}vGo;IezANK0#892ixXycV$<5NK*UPi4+Fr+D**8PHDq0CxURT?F zDD!dCA%7{&&9xn*zCC?6&ZR!)bgxgtCEe5D34av7ociswTPfZ>FvS{#9|6zbCs}o1 zq59V~L&s|2*zYWlYw>E?&2&Aib8@`?;#nC>y3Up^EBdaSf-P!`DGTD*eDJ1y_+x(( zdJ-^u%5t#Li8?{YnWMWJTjNu`G^V7TMSYy16bPRg>QS-oWs`nb71FX_>?+|q(^60YbbkcXW^>M3v{giC`*szB^abLGn&6o)J z5ze-54-}1|btloJ`>8J5rjow1t;?#uD`T>ap37wNzx&1}Rx|Z}>uN^M0`VVqPcQOg zm3l-Hu_se&65lz<(p3*Xy7sJ%^O$tavq($oA6uV2Y2P!AD9uai&b>aSb+3=fJ6a`d}~$%d;-K54#|A$B0O}J+BNG+=z?gm zjID6sd=hp}^)aY>eM(M+`~u@iY9)2EbM9r$ur3P57pwZTiJx1_*lBZUI*B@Gy4>iy za$e5RcL%@SR@ad_2TVea={^K^ub&pvVMh?`r8P!jY~2gr7f*0qtB2=f`8b}txb3?# z9iAmW(pbD!@!@607=E7^OW2Y!~c|8p^0+ zHE^GTI8qjH2x*>Rh&;l z`82N7on2iP^<9~YUHFfvh7488ZCi#6cUzZ;WBe}9-Z$~}4-51=jkn7Q*4%M2bQbhs zzI%NhELfhm_57%Jly}kGcV#M+vwygk+7aDr$`G3_U*sYIq!(DUo{!hu%zVmuJdk8`8(tK_|?6BI>wQ0 zAF7w#YZuSOI;>kjd1V_@-p;5lbNa5FhEeP(ei!|FFP`pu*>`cipC4RnU))A4@6pDR zvoolVFWu{>VNe=j#n++P5Za-po$vDf#b28r^Ngt9++w%*$+2Lx_L*LLOYHA{+TGXG z@^{8{nbmh?OvZhc*eY=%_6ECVRkED@cBcRG)}A5W^z@lD&x*BXxO^PJeR%C&9}mG~ zvQc3UcJuX%X`FO)N$jFS-9Wf+d?UxxO_f!~%zQAUdb~eN}7o zvj2R#RW0s51T%)MW9?~zRGHx~>0bku$F}-+8rDzzRW#bA$R=IKP9=9|SwE}Vccx;Q z_9$gnOI0E{X;_hbdf(WTOhaDw?kDvrI8!lmUdSRWI5A!9W_r$Vn|mMX3`W*w>h$ZX#k7pbBDD_I4lSmg4MTeAYX-&c2M!)4;Q zZKJdQd^+5AJ895$gRDtvMLpkd8}NW5&aBk-x-$?nhC?3#g@_D7F2bxdm@6yoI9Q&^9o!%H2=O?AQOgo zMZof*5^)T-k=lPgCWe^`d?z_whSPTClE%e(vwYGnue@dEp3+^CwR?HH&UP-=uu1p1 zwQh)fuh#QTWjhbPU;rO307Q~AF^WL<#*`4(zBeTTx95#f1iCk-jk41DlnDH3qjum=ZU@f9 z4&0_U<~#91`ChoB_0oIO>A>&BAG1Yo4By)kn4+w7HYEbLxflLkd;pHX66Vr-QzCGi zd*Sadd@r10tb8^l0=Kyr{{F)E!ez{*cc(<)Huu8cOGMIF;S^=1vndhy^G0_fKRW_v z;f?u0?4d30h56pD14~*jy*Hf>{M*Ggbs*o{5tyQ^bT%adx9O4on|q}9ScCsd*viC} zH>sm$%H2PuO8|A)pXB;Kn!odxR*mW91=Arv$a74bq<<~H`=RL_^qU;1%-+d5^ppJa z%O+Q0zPIbZlGaP_O^3iA1%+F*1Nq*Lz!YVrvndg{O*`;Mw*zOg3jes#IuX9N>%fxM zOYcpm1F2Qo;wsGdb_Avn5@Pzs*oUXK`v*{4{^G0_fd~Zi!33KVaDG|8MoygC=6WL=8o-!); z^F}My`QEMrQ$1HYn^FgEb0_k%?7$p>CCsJwrbOU2cOpOgPGmN#@HXp2e)c+%nIQ1* z8;uL|y?qrc#@6VG@Z4S-lcH?sTTKM6vo_`juZ@|B9r(jaBhoy#uYp6WUV5$O8o17g z^ba19p3NG#&WQ969+9360@oRl{=p;CGeO{ciA$`}7v{O$4oq#mp>Or#U9W(c^)$(ZcJD2ma{s zz}X;hou0^#?upC{a@+ z(ZcJT8}qZzjhPJs*IAwQvsY)$27&9$iTvz2k(nTniOOsAg?VoGL~?(l|9d@8geg+% zM4;zH`tjDjQWJse%!&NsIg#0D;dSOj=ooe_++OSY&eU83*O?Rf#d9LFSp(PEt@(@R zL}r7)b>>8V@tnwP5V+2q$SGSw?||8 zVlVCU^`bHVSZPj#=XM0Pk=A#nCIZ))6ZwbdL}sFef0f+88uP+Dx37VHD_;A2y*2RH zmG+77+>XFD()!NSMBqB3F~52=W;R-Qoza+IJsL9$1QL^2V}+_dw`<`(o!dTNOAGTR z)>xsc&+Q0oBdzaDO$4qn8Uq4-KaoDPb)Bz?z%@o=K%hrsx{%g)t{wv4NtM$2;(=sD ze)ee07QRSL1g^0<3k3e+2%HH5*BB23f&Xv>&IEyLj0b|iUmbz7Kp^|>o3Kd>8X-DhheaGhG%=LdEpt?z721gZC&Tpoi#fj@{(xJEmW=XN`=8*N=@Ya(!+zVHw33vW>&{TE^D z%jR+Owt3!MZmu`~+B|J8Hm{qHa{iyq@A>QI>*j9rd2=OqeU*F9H=pFbYq{@CzFo^t z@w3-*{(AF8{`)LHeI}VvCP=N*7v{Nr4eVO&y3f@_;5vQb_wEbNW({1YFZ|wp;n^T? zoxbpU_l0MJz;)IKzW4gT*&uM8^?~obK5#Y&TxWgYd#?|i4FcC$ANbzu180K3AH^P8 zV@`zU_IO}-?62!=y?Ee{Vh^nof!-(5g|xnNH4(T@JMc%h181X!*J%g-=yu?25V+3T zm><11W;O_1XKf5s8SaVnS$*yE_3Xf(R$3dwb2|dtNb5UO6M^fjjrqxIV`id-f07!J zHAZ82ZeIiYR=oE4nrq-XYh!-$+L+m_f$PkP{Ny>2*&uM85$T^iB0U=ft}`P2lSiay zgTQr0q<`{=^h^-A&fOe-6&>ugF>Q~x|4cn!_#Z2+jp4aH8q<%s{7M}Jk{9@4h4q2< z+>XE;XZ_!6B5-~6fr>z11N-sTzETr`>+^*bfj-5zjkEqUH4(TzUsw_7lZ*QC*1l2` zf$OWzQUrQ+RvTyiXX+tvjgyN&pieI9M_bpGnh0E9b(SK~r}%aut?yh-1g@_-OA+YR zS$$~hI$slk>#NRE1o{-;E~NFHtBJt%Rc9#zJuBCTwyyIv5xCBXv`;ST!dd^hnh0EH zMB3-Z^rNloN=*c=Ga~)otFvZMou&5BIwR8Wy*0e)sYHHzi*2eto9qY4M1J{`o`PpY@%?5$%%!&N$v$JM{z;)(Ce)j6D*&uM8 zIgy_|Co&TR{<6}X2+!>i=^^hoy;jQ?ekW0}HF_fY+>XE$WkcU;B5;kK2nh7aMMH?o zuhm508a)vZ=#z_blns5aiNG~_A|TKw7Y!jUzg7={Kd#afc_))&-4n@CHuSwF0@v87 z1OmM}YY1`qwVDWAV|5k?^vOjz%7(tzMBo~$vp}FvE*e5yeyt_~*I1ne0)28(jMRiGv-F1$mtU)iz;(t0fAo0ZEb_vv1?!9l^4y-4%U8Po@AcL|W~i*MTl1ah zV2=m(8woWbV@xY-qFTYlE4P0kD z@F$N4&SniF|GlObUT2N8Pq6GqTi2DE2wZ1Q#3xvG z;jI5$O$4qpC*l(<`_a~Qr5*z5++Jfe#yi%#aMpjW76R!QTcanU&+VQ_KjQK$H4(T* zPXq*dw`PvAq3<;jxJE4u0=-*v2yywfS_q_4c#UhIKDTS(9B2LCYax(Xwri|R(C2mp z_9HI8QWJq|tV{rbUYU@iZ0LI}1pXpjvuj)f^|^fw9Ku|Btri0RA@=whJrR9wM_`Jw zp>H)2xW=3a2=qRYA;jg^>LKvgRrZO1KkpOCQ8x6w4g%TPinzquvU2v^u7!s%mtL!h z!1YzADgwP@J;m7Yw^|7NLF}RR^~$lQ9MA1*;4tdqtF;iw6utHJ3$vpa&+Q0|F*f|U zCIZ*E27*9e1BWq}Uag71^+lw04fOeeDaMAs)kNU>vT}+*&&myBF1=b4foqJ$poM*Y zV2ZKfZ#5CP#%K%(^k~d5=F+P*5xBl8ebvI=FPvg*_*+c`uCGE>5$IL=!F~gWkuhv80JF&^vSDC*j9rS-w5WC%$w3M*ia*KXbOZkWXLa@6Ymc*Yf#n^Sb#cSFYvUt9*NEe($S%zm)HH z@|!*{FzQ%-rt?v;Q6J|fn6G{z53tC z)1n2x%9G#AA4B=BQgfuoSRVdd2kDC5GkKSHf`iuuuFccqIG2f|bQqcO)oD@sBx?;? z_Tl@Qiyi;g;8a&+R$sU0)sH!Ebknep(q7TKd>^yte-r(8Jo!88VqOh@o|<*|%veEq zz+DzR9`IwMGcLvcO>LyJ&24k_6svG@Pe$z@WU;@z9Ph&zkFOpZ@2~R4jUB&1zJ$Mdbiu-en@VP{}|!JpQpn=9-T&RUSuW51GsK{-CH^PC{Z2!ytC%hzvT+i zPH-Q4ju&E)UCD337W*t~|0%Bf=@XtyOkirMIr@hYA77mo{c$|QY?qe>qBv#cuJN2a z!V@Io2#ql~{JADVQ_CCO{UWQ;ZDXkubH0%En|S*YEs*J`2fxr`SZZ1a@l9By zIppQ>W*Q6aSn_su#rzrmJSTQ(wGH}5>&rgNr&rNYaO=|_TzwXv62YPd3Fg7f^?E`3 zb8H`}JJW{Q6AWo*0-dgqd`MVt- z+k9@N1*>=$`8oQB5g%Wzi+;s^zi*@d%$ZnO*Yf9TwONp^^?zI0IqG9v4}YE#_4o*^ z@0z*J<1}6^Sf^U>R%Ct*xjV~-nH68H!!nBor#&%LiCERd68(tSe(&n|**-oTGh~d+ z9N95;hd)n=Y;wg!YpF1&CxUMp@uffXLNv>_728E)q~pjPMr(YvHgeI*mknm=Yg>1( zn%1S~-0qT)BRIzB@aNhH&MVT^8;$8&dvobHa);3xU#*Q?wI1%pX29ON`fgKPG#O?( z+32}s^?4O5!%-dETiZy^5g%iE`15fQkI(enObMZq&k;W!@u}n-@xv&OuTF{hH(9Uo z0Cg%55e_^;yhCcR$sbX5PlXJYw$4`2c;nLo(N4UZ3|argqjonjwNqU+Q{CMNw-O=R zU82r{80W*Er(*%RQzm~{|0DQ+5{xiKMC)-lb1B$?9mKp&b)}Cbp_peSU^)RT(77t- zO|E%cc{#F&(Hvi`gX|CT4$;n3nUVXxl((u`(=$1T#f~Mzs)nU{sx@ZYBYa!AInrY+ z4}Y$Mba1RQ5_J-yPBqgC=%;2SV>LHB;FRNs+oOFK**W5eQ668dh4?V1^1aOKU*dj2 zW2*3X!E-JdM{A77;m>u@`cdqVuZ``2e`yu(Zd030-6tPM?l4;8t96izXRo%hPDwrc z9{IbI2*Da=XKug#j+dCDJI3$u=Q`-7KK!%%M})&XL%NZu9Q`c#{#}lzop0YB-`mK{ z5k8FS_-Y-56WyR=m5L`Y&Me4B`CF$&=_D_rT^{`~TV%Y%9NjT~hdCE%!Z=SD z?^IHfKw!XhQgwC=Ga|lPiydmG!w8*jV-sI(ZXn#@s&+d(evi};v3Y8)U$icK;0mHCw_B_%1Ii{wM*WFBwA85whK`16#Ed=P#Ri^47=+kj6Fx6nMHdxSGL z%{A3gr?gAm^d1hoNlhzNXU8xj;;U1$15d`LX&y#ng=y>PE0Bi=7v28qEbeScw>X{%o~OHDH{ zr?<|xV;#epC$zxs@^i!wqddM^6Y(!%!B9hSB^C_cxpmRdC5C?2I#@@07uv_k&XFEt zdHD0RNZ0)xiOW*ks_VPv1T_beX5Oiy&}on_!iYPuZ`nigM*g-bs_ZfSaDo=TK9?fA zj?A0`!?=&HPRjviJivgkwzJR6ZL_ZHv{@`2yy3XVflhGHPli2@sl1c!voqlVJFPBt z_uw&kLv-OGr03j-(LeloT5f2>#%7=BE=Wv?Ae#sBVakiF`9w^qyA63^u+cR$gxXU2 zhl0+)s-{LoyO8O+fLZ)2m$D1YGUt_-B1XG;67zT)&c!*-RhvnJ-n@aJQ)hOVgph#u3O{>WZX2Sybbwjdc1*7kd6jO>kx zj^Ba)_3&)bD#I{iFF#P$@4AHonO*6q#|E;meY_6%r0f@I@t8oWaOGLUg%c)f>8u8O; zx7%;y>^Gt+L^Y?CzO!wZVe!>tvkk4I9huHIoj>|2If8TH#J1hbtVX3cLz{2Y$lnjvUDcI zSRej;SSED6tuw(t@lWPtY27c@BKD;Elc(6ZS|=8>n{=Hm!wiY9PR$l3UD4kZX1|N-tV@KU3 zPN7Ssm&@V2d3NMThXI|zCS8l4EaSa6b7O7}f1Z}PROD0BOTP;214ZaA?N=eqw2UIQ+Q|QmrpbCr;xx=p3f7n+rX~uM!zzGUcZQc0Epy<85W;C?7_4e04gMGwJL3 zdpE~p6WmxtOHi{_96Q&010 zf%x4egU3qSHS@3Af*vb7NA@t9 z+zx-964mTNNUXvt5UuM(&!$@Ys;Nb!&WF9)mWS^2X>yBWmriW@b9R-VBYqg=@zrS& zPj|CUFpMWnEfLXUyuWmi{mE}xu1W8cND|DN+LX4LTKT71*pRg76=gmoqcRak13JKL_C zb*Fm*2%MRQZR6g=uK${IZJ1y2)mmI5ug6}l>OX1q#gphYW0+RTwSDB}>8(=5Mf(|Z z-LtE#9Op5ThdhfHBp3dy@G=WTw_YtgSMCLALY#9qUi;fHOuKPuIi-YeaXA)3FjogCfDD>KFJnAXZ8w_)`wVKNIA z{8Q8Q@J+M~*+%ly>`h8N89dNE4Cxrj>yY#5QhJBwO|C?5;d4`uPj)4bwW^+bk^iS# zxodg8PukJf6;H~m(O6U1orF4Xq~DgW2g%3~#li!lq6Q5G zPlJAfSE2I-zLEiFa?R@kSyhTCv{#YRgc>4$`%BVUP)5JqaSRrOX`V6ub@w!;kLilL zJS}rfK8%y8GsAFSKF)_3&II*e#%YFbCOGoTh_^fHA-}z!x>j^K!rKV%la(Xca9Tdr zLo%MW_Hdcs9ISlJVn2yDK+XNL*#DPuFH>WfyYV71EIe)Yw_?u2-R5_(da;D~=1gca zp_Z(jNo5Av9aAz1PFNo#@f72RawYhP+RIC3lc+Cx-C|-I0j9Sr|M~FKr#SDY{k*W{ zQ1W!X7#qsRWAa7or`QRYxTW);Z(YgdMb%0|s4(UDl zoWZU&=CWtQ3Tr?pZr^n;wydQ2)`UgX+~ zFk87F$M0U`yvMwmQ8kva$9qH0TH|E-cwE*}7tO?bv?}cTQTX?R9Iu7Ba9A}e9SmWj zCfO;bYf`%gL)$wrxz#()>dhHi=WRF}%Ph1zj>$%k`cO}<_W7l(L(j6hV7c$IZ_pT@ zGiBdY(s#BQm&(VbvQ1+Q=)n-P^{7wWW3`L^+lPUrH{z@;v(fH2HY=G}MQsyNpUcKB zjhUw1vP`sMzb0xy=xE~eM>(Q3xZ_&-0_cgt-*jtqS2j-lCY*)FvGVblEKDsU;xX_G z4^S(y@D-VruH8!X0-_1ETU28-FjJ@6-aG$BMp$#H$MLm&-+?o)%s9JaTIP|Xw@$xy z#=`5_NGorb))r!?fD4Q zDdoE$80;s?_p$QhuiPWP~nRF(t3fkweShS!bLoAE#v9qxcF$Y^chhABv3e z2id9C{C)CE)MwQg>kWORyfMzW zhKl1+rlF>mr8C8NP(IdYiq0U03G`g@u8B*M9sKY;CiNnA9C2NX+{Urab^7hbjD2P2 zOeizJ?x@EEeT$m6(5W9W!gW5D_8g-h*vp(408vZ&1#L1GXVz$CO(#8PgJHdVoQ@6o zJhC)jp)=qf#hX{(9ear#orsIU2Jn9+=d2$?t?bWop2((UFiwvb^h?Bj!g*$g>uFEo zA>`}~Dl^CKI241fge!C`JqjM+5Hl6~`9$uJotcP>1^$?I_R{c--$G8&X5PeJ%S#g- zP>bDJcP`R|hhIfj&&@>pbagx4yK$x(56j0>Vybg;4xDuMm04$Z9G`u8{6QlXc|T*U z1)0`J7D_8|$V%y+qqg^MTPu*y)xLgg)_AV5Gj?~z9{0^T%ZQ?`YE&mDBBtZLI0k549-7DaIqG_BHFj17}{DadyX{m}fB>olMN$ z^IDM+vYlu>`r+t)Gar+Cz#l)w)s%Oqxns-Je5)mSXPI%Rd^{A(EPqB76zoWOMCG8? zd2=7TY+xaw1<`-Rdp^n;Wg3iQBJqdlirbn(%&#J*nRNY0LBI~jHWb~J}V@`2jn951J3+lZGXJDCmcE_O@ z7-#I@mR0wHdn?=&(UsJE+6Zm zy&VaT>$hS}@ggxictQ2Nc}SX*vORO3B$lVsh;(-{%T4S4fTn$z9C0td!`ahj&+*=d zv$4!VyW{w5Ou0xsB{i42w@=6|WAQ1QKgjV?sso*KyK`<=nLD$LH|688nDr#wU}wHJ z;Sh6s`YNTgdyE}6iTS0?rOm6)BOJq; zabEAw8DD0)-Em09>%K>HLf;C5iAU?~*s$}pO}-2>n^+I5pFwLx%#QseKmXiRk}!AH zGXPx~fHrIEz5{2T@v3}0B=gcP6f`H@D)5gUIx4dASPMAb zXJf(_RRw%Q*A4f>wzc6@(sni(SIWmjvZ+tI4f~kXPcn<$_vaX=!S~7b}2c3K&8ABqS+(UII6*n4vFgB9a_)RqM zwdi4+Pex|aG8ggh>d$q0t-zRCfjPV>XK|UmcE{XU9IwZHyv5?yz6q@`AYxCxg!9hQ zsaU%2n{XBy$I8d~u+a9fpkfuj7H08@$+tmI>da5_AVm9}bNh2{7r8sb%FMDm=E$(X zr{VmE>$`pPio;fE;NBE(#93*aD<9{=O4oHd;eM(-{t(~B%i5V#W{}-67bZ=yg1SAq zuRS@%TX6Onx5~%4u#dj=SMk*zi$0t6Y4k@;J%=$ahcTq5tu_U$-x%Z#-2iHpuI<4*ZlgI%TfvCFo zIy=g&usfz@2fhWl>fak5i#~}b@gp9^Zqv?m+iygxzSL90zFVIDNcXDEZPRnHT=QpF zZ)#TwIi?M<<>U02eiT0hpO`oTu_pEmAc}C&oY85P?H(YI{oMH5TBBh#CzWN?_usFrB zldFdHL`QBL^mjkIBhheHK2C{5`ktSgm04G7EF4y++eQ!Ad>&$@wr0hZ?P>{VZM^Qz z-5t+5g;}oP*7PIKLySI;IzKjjWq4534!o*pe<@p0+ zke_?GtoOkavbCecn{DLih&Mc!k2Mjmd*`MY>Cz(T4N#%+qc~UcZu9pAddcY%59@<~ z>uIFr*e_$=?wAhy?59VxM<>+N6R7qN$hI9J`tDKeGl@;}&sbg9O-vGIPJnTv9a~wR zzDRxFaq*)*xz&}e^T=3IK2FP{bc!G|GvEdlF4yvhPud$qjFs+MiyUEr`|O$S`Dbuw zYPmW?%FM7kYBFTm9z;naxSg=aeAzWd64G&qUE(F;#(8xp{KuG>&iWrC5kz6s+r;Nw3ZVy zJ{(4(&YCh??2bdQhRONCw#C-PBBHiJb7|CP=rkItDN;*1)D`FzW1s00i?>s)foFJn z`lU}ELCdsRbx4Uj+l)))V@6(nDS$wq)q+)VL?pwcGY^oQ3rYx6?BeslGyQ3~*^9WtLnt3^Y&4-bB) z=zM|D|Clq3_4P*nqaRdz;@TC1%fo0~|9aA!p>@gi^ z9M3kvo?#Vcat@yK?{W;aRF;YVAXnJ!J)Ik<{Sd+bwu<`D({`%W@NIdZ&5k8s=aaFe ze4Lt3Sc-H9qRX%b&zhcawF&VYsE23L_ftJ?XEG4@ctmqFRiS{?(-&$OMl zhJFh^@uB4IEHe(3kM&sQoT}rGrJSlGWoJ;CId;di48mWcACf9&otK3zryY`5hgzRW zJrDWZH?e)Nb(W`Trm9`Q?%PFTj&Q?o`8YMg$=qu6j+_zmlJ%Qbu<$ldvxhhLZ_@gs z?&&|^dz`!+(Pbpt9W@dCP0))E{~#+gJMV=_K{g9$d8;)#20I>ZDo*2F+|C;f6`$D! z*=4yo!VSOWb42g|;0RcQLHx~c z;5)TuH}ZEL_hWAXejmSIqebcJdU`%b&Xak`+c{_qD<5ld&~(jZ!#?%O>2Rl>Olw-O z)#B;BaMEg0xSu)~om|R!JR9^_YTfZOuu<9B_6AOmdF^M+J)U_;-Z@z2p4~Ae2ifa` zT1|8o)}ZRT*!t7lhDHaTggb40hW7G$=~Tz*yt3^w@bh^W&PL-}`8XvTzcrdkr>lDP zG}iO0_?^1zO3tNm6=%8a-L+O(_4F~N?~E%m&F+|vap*Qhm(C{x9bGX&MGck`wxh1? z8dt>XRE_8n5`1Ed7@Gc@R>IB_<3Ra1JxjE2E<{0eIxA5R-9PS8d@DY`2?~g|Yy6C9 z9`w&qhYNr3)$r7`0-B$u^WawgTVg*dE5o$eR%1+kX*-+BEV4U}#ipBv9ZwQ}H{R(d zi+rTDSvns;*+?{>$UZoVV#&IDu$G! z-BD(qdAtl9r)7NF9n<3!dpztUjjxO)&csWrQDZ+3DljcGhsPXhQBH4F-pyhM@B7Nq znP50CAE#x4&bHGUb@KGOu30|`F(KkA*UjpUSNlmmdwhtQF|75wNzc(q+|(g9XJkDw;#qA*~EMYt~h8MmMki{PHZVF}^~c5zlAy zs)jj^#9c#`conYKVwh&awGPa(4EWO;2mK}*Onqx?wtPld=yKP}Xw5v>oUt_a81@NX z9?x=*Wn3-FSiPh5C`kE2qIKGDO*N3d0oE|Hm(y(fG1zk>|Bv^wvR?0~FaCG)w;g|S zt{Tet5!Z*r{4t%>jul>}yzL`>f$6y524fK!fW>A92)0|r$3{6;^b>oH}8(|4xD`@&V}n! zvk!}$wO4nfM9;;wv{&Dw(o|D%->G`-yIOj?NYBw8&|La7J=(!=S8bqrrdS{MO(iIN?ZxokH;E~4T6Q!nEP@Zehf>| znGld(`c#t%*bHG;`xGgvO^EbANQR61RA(?PiE6N0IYUJ4snH~=bCwrBOP_gM1fV+` zpK6b(CF_hS@g!WImND^u8<&E7>Q^+WZ!H@A(y+Ul43b8TLADgq!-+*%}aHjNW zN=}iNA@g8ta`yC9i=2z@#UDY_ZqJ@v&b$6D=Shhj;rjGEv8k2qnGM=QuKj~lB4MM^ zgF+;X`UZ=H!7p}|TxM_8ZrOXq{JM_6>#YRaUM{XD%DA^XrqmPUI&|l2 z(3)=_8ez}y?z%Aji8}Ii#uy*U$Eg`ZFO}81<3(U!Y3$d& zp%e7&YwhIc#@8SN8Kx}i5UXJ%N&h3txc-P&YH7}$!Qp=pTIVOvp-lNE+N`py> zUD)oHjU(4^Sw7Z8?qd_DG5h=U*5BB6R_khSGy zm5q6kx1v|ct^Fowe-MnbaxHJ2PA!UVt78g`kC&mdpp1UIV;(GU)YH-2rTh9(?JDI#nAbUE{mFM$L(L%fyjdMyTCU52?1(2enS)YR&UXM7k1)ZeyEM zc}NZ}of5meb-esc`QFe&6Me}3#7sDZ%$;4vo$_&7cD**0ggSrF8O090%we3KQHPMT zv#87-yJJcgeUv^ZvwSBX2&Yand03!VT#8=qQYSD@R*q!DY56!kk^_#l z%T@O+kFji3>dYpg|F8X4iI%_uoBR7wEG{Z>wH8}r`?{|=6{)^+6`ztyqAwt zGJ*-Rx)&Us=FCl?qfmQy@Z8xUPUkFW4&sx1quNmCsRz&XRO47LB7s~&sy*80ca@xD zzl?diqdxZ8Z;h$e7N?>T@l>;H+oHQ$HjZCIXZctgzr@p7&vg>6P7lFr(AcY5F>$3t z8h>0~G&apMbVZo4^xJE7{~ErZ1f2_I4%i*X;sWb=*ijNYpS~z^9A^1&=B@Dn;?6*4 z2VL>q>&vb(b-oxI%E#J#!NUI_xWAP@7CYjo-LR~oHV46(pgFy9(sGQKv2AzM#`ty9 zkFV>!qnKJk<`bwq9H)lD^078fvopR%FdTUM5fBeslGyQ2nTZ>;gZev!AY5z;I9#Qs9WPqk-&yL56j=RPz{BwNH>Cn}=ZJ4I)5E>FkQsD!Q| zS!YR^9d^f*EJ4%Qo?A~1-p_;q{2@pfOZP=-u)DO*_whv5~-$UiZh1^B2kgg0?nPpWddfu5l zp2^34SI*=zgYAx5Onww!>)*myY*E;XT^hPIU@xqL(eR5;x{nj_2qJ&FBZe{e^LIU) zM-N{_(|(Yj4iiI8(P!JuvJE=-c<;iQXgn()55+{agW=n)unfDEI0)X=jc}4Z%XP{d z_A8NL;)}L#5BBcOch0JX`?=A%SjB;Z+!eFmb!V0qdWVn8l|A>4O z>(sm#R;byN>@{#B*S^YC)?KwvRWnj^WLdE|hPc#Pj5=}CU|qJkH|O`~j4w0Y?wF48 zu#ku=8jfj?*p?b|VFr=fls1zKo)TZ>Z?#YLvs;w0tw2S|v@&&O81Bo*DVc#D)7T}N zti8KYtb?$HJ~Vj?)>w;J;)&Vs$ajH`yM<2A4{J*cUIb~>mZ)>4%oV$%7H7!9y@}tX znQe3o5&SZf*2sokW#u?G6qk?FJMm-030An2Kw`S zkVdiL2%qp9F60xP)4DS^>t7jh%hL?yXKJ&kOIB1v!kD?d31_15tbCl3iJ|+HS|_W6 zQoezXF6(M}tSLpty1k2CWaBt48iCz5(G5gSmbue+39(wu&I&&K z!}TlqLW9Lnxk^~`5l{OOxhh&ViVtqYAVgFF;D7I))6YT zh&5sd&?iG?%F5q3PCnZJlG^R)u|}=sYnNl#j>b z2@waX1L^%D?&;V!?B|kkJeP57cT9bD0VT zrrhhkgzf$-c8RwApUHkN5B=$UzwX+MlFZ0t98${8B;!f>I3<&qL}vXQ^cUg}kfpo) zKC8+4Hogeg?gbI#@w(@jg-IRDV@xT#_d!;SS9$)&MlM*9@S}$8oCjt6+a1&KK(o}^ z8v*)NTePbX6#2>ts-Y~aO&@96QFwYBXiMW<)&r~eB2P7i+#LUg?(*>%_>a39)OI3P zc-vTGtfH6ljWbwgr#KN}KNf5!J?BE119rzTxIoO%x?yeYqspnQA9VH#6CiX>F+Yty z(ewRrDc35o4My+qq2GXW(im4h*5)Mju-bK$_ul25duS%I9gkwO2b)bjV|d4;l{Ir~ zT1h%b%G|I!>T<-YR@znzo<6ZLGRq-822VaWU9Lm`Y!-v|g%fWJ>+O2kQctGN8)HTJ zcs$;~k$7I0bAoO$o8Z~j#QpMeyq9rqcN`DzhHvH{EIl&<7O7@YUyGPsI-|d>C%a=@ zLwN6(m*d^gTt3bL?{tb_BY~1&3%TXfW=XINHOJbPnq$9=dAnmS*eAA6-pjiDL&nQF zQ073t^qdQZ^zv~ITwtal7DJd2y5?xnINPU7W{&$Z-tCUV;NIeXHUTi~$&hRGd^H0F z#Eo))&o#sJGIib9V^1H2W@QGSCY<=GB@mwLvuv?s;LXn zjJLC8f3{2|Q|FDbqI^6oZ%P%~=}f46)>xFWEKmv+1UM3=V$6q<0H{Sd(q^>sE6(IlH&T5 zQ{CO5?HghV9$(VVF=J5qSc7AE#2{3k?7laM)lJ%({UY3>&I_%_^dx2CT4EE%vExbF zIacPD-7!7Kd~VqPh;D}W`RrY~w&Dr9<9Z{tf(3hkPdeLJ=k=OCJDkLwS;m|4ae8L4 z$N8gJF?7eLy&Soh(1jW1pXwf~)QBuGhm?Dj zkJEDvJ@vKWlE&Y4BF3dyM^{a4+xYz)^7VOn{?xJb*SL4!{3`R~znedA{?%VX7URn;1$m|A+SYx?c-?s{Bc+t zrg*@^v@XtK60F#8(B`sP1(W7KADYgl!0hWLE(r7OCqk_u%!TQo7KY!-XIlvZ_ODaaSs$kQ>MnS;AN8|ncIWYNcs%q@oSAI~_MJHfGvipS z>BxK0p0RbV+Em{%R$#Eg(X=*awp&ZL^|`Zj8b;^BK?68|X}Sl2?%rt3)Y$c%M5DQzYs+KcG2_jLd^66{K2EmJ z&x@toMV;AMEoLr}qhRYQe>IwvMw4~!e{2gom$%WV{ailQ`*X&(nca8hIE-KV?$5`v zUh{pk9qE0zZl6B}(y5ozst4_j@LUHGDYdKf3E4p_>kOkQ>l^C52WMcLX?iQOBe(C&w1_tQj+h4dFr8`1oXTJ=nkRoDTEupI(aLTrx2*;|=p1@M z=6w$L;LvHK3|8S zai1zS$o2QBEur@UX5}*-PfruIpD|_7ZgO&bw{hHerVhTDLd1k+^^b{O@M(#iLBw0| z)-;pdT@}T%F)xy*whjr6u{<@AM{eLKQ{h|#jDf0 zQ`H{v3QN?N$^G$^Ui=Q9xOyW}=$%Lhwqig(lXM#sD#=VKrH+UKX^qt^M{345qo z$GTC=hUu)YV!trC;Zt+vS+3m3ANBL8c}J6h8O<$$9qnaVX0>e^x#+gda?1{Bp!cx? zs2@3RCO8ojn_8aEjy4PW&P>S;^~IGLT~#qus)wmv=&jomtTb=OwJb`pon#!veVA>Z zpBBX-3rX}BKa?}f-?r{vbo5hWd7%l?Oj!5NEHQ#RW|bfJ?5y>1cDGwbYI|)fSLaEa z4}E72%@fvpv^_a}&CloAl;!#Chi64uiq3&P#JA5Mngi_5fcDVt9W=@5+Wccy`IpA> zAEOPrCFfXgW4iCmp|PHKbolCCwk30!IllYQ+&+J3d^2bKL2Q~A@dX~ldwpJ@|9W`) zr7bnbcpJ-oXAX^Vdc5#&nO(&^0ltN*9KLBBC)o9R)z|v+TEDAooiBatXrDhkU+`%? z3RFV>c)MR~^v6onxzXl8-D;vn&C}W*-vU=WAi}QBcbC zetH#buT0HYT5r**S}t8UEla~O+s0#cyKt}*}HtQ_AQcyK_x|yUDuVW

=?r9QK`=9-pcA!(JzG_v$+EIV=OmXCE5d=cmUf z9S&MwPj~e?@R&ZcCSq2chHMyd{9gemCilS=dgsnin#Na z`g@JR5Y5K}ruWMJz2&XbL@TJG?3*haq@Yz7=h9F0vAO^F(ss7>ajSiPO17mF6y9zA zE}UTY&GuYG6g;rLQkaa6FQ2h$E( z?bN1wnk%=_iXS7Jtl5XAiVdAWj$(QGAkO=Bcle_L(iNbF34Lb{%aD9}hk6VTf(7*y)K1drj?3dlZrh!U zo-5DY+I8~CxmcEXC+QTLF0O4Ob>~hWQ`+Z`%^hrw_EaHkZ0FAKRHc2m(=T=BPMafr zXO7Js^8an_u!28J)JG@O{~%0yxB1!G)Odbq7UuTThlH=E9maGB?8ByQ-h=b2k4^3K zhvXM=TOK87+ia;s9rtZ~_nkQ;?sMGW&1j6QZ>4m*Y#O_4d&xV8 z`WVwbe^?GZh($rBkxqW%%pe3SgLy?{O>7@^&7Hh9wg=TnOYFYLaXV#%Ak0ULB{|kM z>;CC+@8KBSVt1)~!NB$A&znDO+88dK`QOdocKpfz?)Y=|e>4Yn<&#caFU5MPn+y9g zDVMpk#uzc?I0x3S+E5XrIX?A(uOxe~`B1EQs~2%T)#uarx8Y11!!Wz29@Fx<(;9yx zM}nP^=lOD5N$(-&!A@SfXGN$li+@+{UsKEWRoKZK9j1OW^Llv<-KG8@mv}qln%@!2 z@zC$&7(8Vj!JA;htw=aRRp`EmKo8pFVB38%t_5=D9Y)U1Cevu;<9u}-UJZ@qN z!pwAIg7Uc>FE{^bI>@P=G7k`sFxSm^kE~GKr8@dddUC1XW>sIxJln3Gr|@J`%fpdu zI4vK`NDl9*AAwW9!TGP$yCZt|C;MgWs4k<~?kJ-=U1zBhOV{Tsscbltb(Z*@=5d&% zU@J8f@tFjVw}{nw)~v>OjqGWqov^V*{cQoBpeq$0-oa8_uh6=$cbB zGi5i#q*H#JNk`oh`%^EQ*rP^znCTNZZZ!^y>wP8TNG>DT?${s68ovX}pqD5f7BZ8} zy58`5ZR$hF$&qikE+3~se*YRh#!^28%NktoCk01s8Lf6l8MR|@ho0U4y`3IPj)xEN!sT=N%*R2 zYi9XaURCqA){jZ`%dvsann*FTOVzK#-vOyt&D5#X_tX3NS2QQc-}r*@zhhpK<;7p* zH&eSb|8+Q*p5^}b!~EeT?VKue$?mAdDJE+Z*Mmnegt>Q@n@{pL*&NH-IEz#swq}^N zXlss`MYUw>yfIdkkJIudj-^puWz{EUFU55zr_$qxCAhCWmFnnSBhg%X zWbJZw?(CjfX>(^;g%kNg%TJ5Z{@^So@ zacg(f#xMT!RfA{sC>*Tbw}eR zPy4X}#&d#SY zkL-@Rd@^37c80E=XfN~@I~TFShN!ak9^5pndyp&kThh3uRr+XVR+;7uGpoR4b|}d^ z=ZsP1Qar_!O%g00F zH}CVHen!vX`CAX7quXk?WA6-q>rSl3(3jLLJ;#0-^LEG7*jGE9eM`yQ=KiwoxlN^s zRxM!T+nx9eykB}-=!i*u>oYlj)7-1Ix@%_0p=9hlGM1E&Q}PHVC`XhVrD#eV{S6hj zsW)v?K(%Y;w&_Zvo|8^0s@=QpPT9NGZnJpJn%DbqewKM@cN~+SYt>cTu49g8Lu>h1 z7td%BqPRq7^Y}iR$vn@lZZeNfnHSd|ooX}VP!e~JmAPei)Z|!dTVYpdmS1;Ugk$-f zGw;&0F3q+@HjOl$8;1Py@%Y?utI8rL@l?0ImBg`K#chyvtTX>bU+b(KD*M$d+G=2g7^}jixy}kkj^ZbG(;vZgI4NeyzWeb(!N z1ns@M^c?$!?DFwA*mrz~ZsP9M!7*IMuH8`w!y)#*=1z{-AIK%*7&Qczk99HHwaYQK zJ9V$jHaOe-u=)Guo&1N@fo2W1sjtO`>wTo?TqtwE?wAJ`-ZxyZ-FZz5I~%rTL$@5A z4~F*gaUOj5+4&H~i^G0J+w!4Xj?RZN5A2S*d^mI@&NYfL=+KgP&KaZ1$GV*Bj^%}Y zd2~-Jt8$BHg*khSJ-f@$c~Hi`-Ej;aJb#}d;#eQXy2;7$Y-lYX>)_d{YUsNDDDkDs z%_pg#(A==2ct|>q-7;qFjw!MGO{y9$q{~Jt8~SGjtQEau<>UA@be50P;g{-vs@JGv zCUSq(AelNHt;VrFe5!hMs&P6eDW7oW)j#Kw2f^C7l6t4FB1M~lk@p~N*J-f4_vCyo z^VsgF#b;{kn3}=FNV9;c!t1ILh<)R@g2<%`}%RHP%+Vi9>mvXCj4FF^?jCacTL5!?se$V5h5aZ z#TMJdKVIUSa!wm#%g6eheh@B_jliA=nNH(!SG=u@`x@Vb%T$Fuf9JPO@n#ktoy5xH zb!xpno*r8I&b>0{?2cn`FYPK;W@$$;UJrgbaTCsyJtX%XGtBuFTP)rD+E2pHA!A7S zSf4{_X58{^eQy|j_8^SW>0!>DAscc^$vS7sT(LXqbEeCx>tl@ifv$D7@xG>)uk**) zQ9jn^4_ryR9o*`Qt**9w9KU7U+8xv37cYV8!Vtmhsw={Wc#ykvsw%aF=KX7qA-#Uq zREXb;Prpvg*OjUB#8^;1PRA3xL_7!lYmVkctb2+;Nh*%jGDhu=X|ZbYT2^YSlWce6 zK1J&5Mjb#LsoB7SN)Iv>hBusf#Y!=uEZsQS`r>-5aAUzYa88bi`u=kQ>#(%W`L z>JhD#8TBOU95DuzkF_`w_rqx|$mgbJ^0uj{)NUj7J;E+RT`^#12hw8=p}&q@T-CZ{ z;_kMxbY7JCV0TQ*3v8i~>j*Yfn%g!D>$BKUTATd*{e62K6}2%_O3}GsNG~6!9f!odW4asD zj#oot`FIGthDi|@vPM&xiAMg=9Bo!Wh-%x)R_xkz_dW@$HqHnx^_sl!#1*W+?Vlgchtna z<}c%QKK5yYMa1+mjqOlD#wvIz+JXs8HxlppD*A)i4}P!Boxc<7ib*XN3*ug;mfD%M zW|7)a&SSm<=b^Ezd^{EpUC*eV8RCiKxQt)BV@e$BbOKg?vzoriI?n_?sx6t^M^*rh zv3CDqdr3K_4YB3p)R^XNF_i&pMrWbJ4nz&^?Z&cZ!{^ojXz}ncKN}|q@GB@mw={SN0 zzHRIgoqii)_Dp8zx=KY=i~_UJ(@KR9<8fA*k7E7h`Go8)DQn*381KM&Xe=uqr{y8B z&8|~rYz>9?D1|{?S~jI zBgb(Wzjnv8IF4tJ>#EOQFkk=hVslNgPKzh6@*E>6$Fw1~e5{S>H1-`=bovAvoBG?0 z@$Dq%m@i}9?wAtuZxZV_k4)|S{+UB-tz>wSY{)iJax5EC%g5=ktos^&6wj3!V|-cd zFTWA1gvi;NCwq*OjpMeASG!|M+~V~SZ&9RTAzsQKGDAdHLWdRAkX^IjxT|}fSUQ)L z3E(%)ZzRLZzw$}`W`C8~uJLScDVzH$>&a5zm~-41Ts}_AajKg?G}%k)?;hn39W7L- zuhTPzMg1~yoR;xvcT9&<>|C7%PCr)MJ)!Yy>RLjzLc2EM@6FXPE4+Jla++NT^8we% zgX7BFd1fpsAE)G5=oU76E1mrN&{!B=q532%%9oAR)v@}--NL)e&T(JHyWKGz?#T;V zj=<(dq+SiaNPni;d?EUdZ{)r=v8R}mo#&goe*>Lmzsdc?0^lG2GQN{nvLe@Xtue;s z>^r45=xcy6ynLK~4KVvMR7Q|T2$S%-YtZq{*&&lzy&TtRGa3u0k)iXTjDNdhe;yFk zV?PIcBgKA*-(5?$vrT`z7NjpBT$lhUjVb+`%)(Cc(P? zccTF=7ieFX<7m6c!BJX9r`@qHN{Q}ZcZ9uJm=na5QL~)Q@3G1ysy&u(Y3%mgj!eT{ z`M5ta^C^WPUWpeM_Q?&?tgxf+1kc1PxI5S5#!BiQb!jbyDS3Mg(zCf4c? zwkMUQYd|f@IXevdxk zOd0klOAHCQ)z}lY3QP4sneTl1h#xBnU+4R<+CEkg6g;eotUB6|4mygSRp59T~hspN&eNjqnFg4p$<+ z9&c*8H2R@a%&4y-*74lr5V4>Yzlv|V4BrIXq3)NuEbNFS@9;1t>U=2aIV0N0?>nxy=~AzqDpa_b9=W z#2&UBdR!^7gc|AmdB@nu8V{ml$+6dmwD$RFu?ObB+Vjq~!l|vT`%A>p+(vERnKGJp zu^;w-ho_C|U9AR3b{~%0=gY{>b>@(b&>vx--j0qzo3*k8Yhf6FxqY%D!V%s^a^IOU!nd(3 z=w>zl&nh!Q9(UIW@~I)cj+7kreHd?_FQa~!b-m7eT_5^=-ESi{KXdF#=Geb%TjyHM zp_Lw?D~3qQtwg1nIsJQ5(L~*cMh>YBiGR1%KF^;8xt<&owT_?k5K?p1 zZ#;gRX7lUhC6LcfVWuH$UI>+(?9h42=pH8lM`k|~^DFxz({>)}uSrdj%|5z+KT(YC zCJRSvj>-P-`=XVIEk5P-_xgUO8c;92UT<=0i8z}3(VJf>qj{X?IQ2W6zXdVu)txup z4}Clz{#lO%g3@DqgsjjS**+8BuFsoEEBxcir1>K_wThUFL`RSI?{s^u=Z)UlM=HKH z=PPjk_ww4DzroaFqgxAa49miz*H7~Oxv3%6xt#G7>}@Nd=a2B=brv+&m5`&oAKm$t zGTO&kBDLS?x==sNAh%RN@v$wHcK#jPCEfY3ZNH3R)AF%iPd2``=PP*s_o>$QdT(>`s!(!1jcs{PhyyMynPus)?+9NA?=+Z|y(t}F2| z5X{b?_f6(*x7oP=yZPIWQ+1E+H}>tRzMBobd=yVBk7Hn&CwLQY{`8PMZZ)3v4W2Th zeT6nlVCZ=46&fzHi#dC2@y6&JfC=Q}`F1PU>>eyejpyaIBXPg4&Ck3@yzg4H-F@>r zb;9b`<~PqD>*-V3u3S`*----$+K=wiecs4K_o6oG)R&;I_d`rdua&Lu{B5U|D&ya( zpOe% z+AbeDqxG}sg0|aLf*&G`&^_vleZ+5ez>!t2uKV*sX)L{X)>)_I1~W9yB~1Rj`_jwNa5*$}hRYxQ_$ z{=9Z65WB`U(u%34?^cjrvpH;DdxaM5s=aD+>yXlQKBb%)`ZgV($nBW#pmmDv^)%3a^lNX79xgxK`jRQT2Dgy0k3HuMe0xr-%F=I--%x>oOPWZ_s%@i_EtDy)J~>Zquo z0;`|JAHV~^E_t{4Stb|%a`I8dF*0y$4xurO!_XpC+v(P(>zmd*MJ#`$9lY-+j#o*Al>F~)q{3hKbI=da4l?Z^Y$)}IY zp{I8|4k0kTHWePJ4bs>@9)6flKu4ff3~NO3iy#!-5~oVzH>YpiP9Y=5c8cGjZ_{Br zR8d$ClWGdh{dQNvGlzn14>~-s9`e0EyMJm895|dTohw7^NUu%Bm9Jtm)7QlMZo3R( zlf)W9`$^Jzq*J$8c9n}`IK}DEx9KnpLO;oxtu+i`ttYDydZ4;0?yOqKCL)-=Aesjs zH21;pKYhd>LW<6hAx5Ov_UFfwt zDe6nfQJ*4v=vx`};q8T*pAXGSj|QNo;-#r@tp8q54gJGh>6dnSoj3*qPI+eVI1YT3 zl^e?_&gf{p-0OGih8#K(bD};k^52d40;z7unYB#Jzn2=TpJY`)mpwFf1JCmLTF!*J zXX0R~bY3=&+o82OzgAwmQ!6Bu{&{Oxn0Hba2SS;`bk{`AS!uMs|DoxDoIe`#CmypO zZ~8M-2$tk<44j_s9P3p6C6p2^{LpxcRDxiCtOJ$p=XMn4D`Nlmsn^Oe7D0Oto%thm z*gk3NjNRnm$n8gJer12;_C=alQSjivDN{&u+Y{~29HS+yuw~rtF9k+oP6w zSy-FrO%x2jXk2~G{MXdnzUk_iIv1Yl^HWnrWPMvXI6C{$m|xisojTj?+xPcGoCa?R zv_8vP32qZy>Yq>sVg@}e~$6~@B5%X?CF4i z`B9K>k%DjX-6n6E%^S|-h}T$bm&JU#45%+VXF)&e^DFzYfc)3C){jmmGjD>O+_W?N zlo3CroE+UbhWo$QLN`9~Z?e*x7tEAYoy8GnfNfrk=D^i|xR%(5=5>O9v9|TUpAGfp z>g?%fOMay;dvson*-E)(^bcWIe(o1JXBqqa8XXtdU>7IsI}Ak|lsUCz>a5AR(f@rv z*5EsK0n_C8*h>$qhsz_xCJNj*@b=i`ZdI=>d4E{o@2WI`#xx= zK8xMGs6REWVQ4l@a3$F9_iXs7VU4oJo{!_o)!Ea}mi$UB_M~?DwOAU%EHSp>`Cz5! zEM1Ed{6};U)xks&tc%byiQOL35clT(R-CyxKl{J$%Urw~=E>0A7)QscG^4@{%SQJQ z)IKgcwLEL7J1=$lNbv4BGIiGUvn0Q=A8XiELw#tnnQ3JUnk${^t6EQE-=@jd(+mG1 zHucofa-`>Y?*G0Y(sg138JjhAWf?oWpWD&bkGA~EKIp^#_#nt5=7i1Bw|1%rpi@Yg z#Y)A=>DHF)BNaz(j?ez@`yrP)5!-d^Oe|}Qo_0r&upzL(+21qFL%{Y1&7b6NEQ(Xk zEWq9x5_81&BRs#d58}ywQ}xCiC{`%GStQl+XK~%fxJs+jUB&Cj%h8@=y8rurXb-zp znN>1`=>FJ$h-02I)~A=2BfTHl`IV`W{vvBT^USmw>RKwfnRKK0*9rlm{9(qbMe5gu z@Li?k$jSx&v#5vh)sfhby!=WnBobx*UF_*+S##I6ekvDZ2{ zbXsG-4|uw3_qLL7gyuNx|2{oJx9_Q58*;aokR!Su!TFWx5v}$Jk!LEE=;c zc9W7LyC2EFo9v<8vHZQ#m+Fb1e3MKLkocb--!b1TkLw*3%#ZM`u48^DFzJ^Q&lh zVqwgRBPxcr|0w@a2hS|&)5K%xsU3ki&icPkhd{EqL}%&Bu!!te`E(=LJarrnJ-ef^ zAAR|i>Ci}C5)X(99G!siC|&_QL-Y<&BgSVCd+OL6F9}C#j>rD*(;_vWCPywy`+?By z-C3U4Dm$GVSNv4x^5kaUbk`YdD2+8JL(lGL%rV#h zeL6ITshr?2UT;`yb4xDR33MIfVQF{qsYav1iW@)eK5}xD_oF($awwF4m6!n$n^U)a zhcRqYaD?VK?Eii^gs#IrC?Qm(a14Y}6M8Re#P#OSn?G&(5z%+$e>Z>I@hAVgi}mtupQK3+=_aAX?p%E#@I8D|pDlUfzE{9eTx zR!>kZ0(SXTyO?=(r-a+fhI2YWA+6f6nIKcj$5CBIv)!>hs>i*{E5SRx%S4{k>%-=y znu{tIx(6ScZ)t}@T-y~#0m!WBK5oQM)Vf~Y>b;%hc9)FK-MMLe5I9G_v2(%@Uq065 z1n9*_yp=c8#fjX?yp+427HF%i4ee{H&e`VO-X#^h>8hTu=|4EmWo6L$5V>sTvZ_1I zncNZEt!nFRhx53qJ@ylxMJupd?OoHiN#F2tyW+N4C1QEds~Vm=jgog+g3gS?*Jp0? zZntBG&c%TRSW0f?yFTc%*yoRWEO$q8YV)-{d0)Smg=8|9OUzwvqqE!|`O9WW{UY1E zTQq9CGV`-UDVNwmy3KPtrq_gNx-gcQ<8(y#*}L86*Ro3E4YE#CLC7q%JNf2Th}IK( zRHTa=%d)Ctd~59YNsvxojIZL3@-BSqxn-eTcUz_kfOXuXdmi2EL-w+8tx@Y>msr$~ z=|tp;mN?nPE%82VcAsC1C9YU^8%3v;dVaE-4e{9}uH`wtweFC)iJF_oHuqKCE%O-X z>E|V){)^Zv_hOy9ZSKfU(HwtU7P8r^g{kB2ZMwG^qd5M&EJRaLVf#XRl+Z2k7|GqA zmxyn-MI71PXpYY=3)#%fWM=t`{LN138bi=7P`6LqK8cYXe_jU4b;Tx9qCKCEXh(F6 z;`sBt5zYGiAQe=CSkH?OkV}kUJv3bSJvy)Z>ytN@I~fBrC^%tP@I~>rS!=Z+1NXv5uGtbJ~_p zkj%E2H~BcuOW2OD&j;rp1>g70f2{N`n^T`?u|3k;5^}7^ST22@FV@dC?*#E!IoL}~ zH=?GU%qxs|`eSAWR?yXVFM65#J=eATbB63HSLaoUOY!w3@d_*9q2bfB_>yslYjAp$(~W=pi`~6>q72O+aE6g z-++qxv&KWX6$@s0Yc{jGZOXCDHqst-tL`{&?R7);P&10m{a@79~p}scEr2HsJCnx&|6^&GijDM;~;$!avZuc;GKMv)giqe zo>Z?)D?MjHY1I$cw_pEbw4V!NpPJn^utCY}>bl5!A9g;{+8}1ZzsSl7!nKxSc`JYX z?DY7e$#NOw-?x*AV>e*4^l5wSf;-;fZws_K@+tA}Hh&lFg(q_4l<*R+Z;zZTBx_r zcg~$Z;vVGPvhUfW__vP|ukY^){KophS0-BROqnJaeS`-YZyTS|%B@+Xll+%mSx6 zn~F`3$Bth!(>u#r8BV`7E1l)e&l`@Lt<8GKnsIfsh{$>KuaEtI)QOtvCxrj^crWlS zuc9r5W2|iJ@m~AZwJz?X!A)<4PCwponhU2^o~m8qr@ro`>wtdqc#6e|{+iVhVH5UM zUy)h={N3(huMCSo(2r)b48l)$BRF7n33g)o4DFgL*T`M$8h5U&k#p&%kv?p^G9Kff zIs3y?iQ_n`5%FLig$wl0^H%5Y!{pLQzq_^grzQ?Q4vYC++hemkR~h4s)#F0`=!6FR zZ=D8SuFT*Bd=+>Y*$~w?yr}zod-$#2W4!d5)2k+p#&y`@c_x|L*tF zZN=K`I_7ydroT<5XM|KJuq}CzchR!8)tJey524Q{kOtVDoT{0L>H}h4z|KV za6w)gJNruRTprhQ36c5yk7ypPr0T}~Zn8O(xjcWDKR+HN7r35?`A~I1ZTu5e`9$voexFbX=}%?t{=9D%r1)$%eRkeYX#Q@{cC@IWm@d# zdV=b;w$ImP`)amB;2?Xt;NZl+#ig{ZZywL>prlM~0kj{0(#qR#K7Vwm5k z8R)K>Z}L%AjkL^);oN$kzl@!KIm`OL*W_Q$F3oJi9qkc=IcoKjSA$U@j<IJ%xnng)WdHYLVs-he=ynKoT=wHIzp_0pyQ^%|8KQj^ zi9}NH2~E#yM+g=+);7O+i4`zYN+gxzak}15x6-BEdz&LQ|4x;bR?%X~SsfQOPF-(( z{wwVm3D^^dx?!Dvix>Oqx%H~K^)6KPV=}y<_B|SfYro6+V>H$FeUp^Zy8=&#WYU(# zF>Hl3O%)lA8|Ck?9UE94TDN;*t7z591H{ooT;v$oJYC(NV(nZk&2*+i-e19cq>m_$ z8@E?k*6Z$W4V?u=^*1_~^@){5c>v{HAp_>Eyf>;>$J}of&y_-zCBIY&a zdJJBzY0cja1t~vu7t(2%MRf^Pch0G))~Z;d&Za!3GW31>c+2tFbR(WG`yJ6Eej#~J zW_qKsuu-&Piw-wBm+oCxi5%J;oBcMxHnMew4KXUewj_oz&y%Wx<#{=~tx8i_dL}n# zMvnfW?@MCFqxektL%QQw&^}Ad4;+^({gQO{46!A@wj}n9@uhqYMBmP>W2C1OIo_J+ zPKfO|qjJ^^eV-qrx_0yqal0|Na8^01!2JJi{69VuwNUOqzkxz00**!I{P^;`(_&w-I;I zf@U|)&qfSPb2jDqaA%X@cIfD~As%zCx9YQr8jEF471+%}-!9tTwXS(QV~EH3wI%4P z;CV3*pM6Ex#l||f!wwBy^*8Q!x!(omU4ISfufsCTb=pv+SX-xcznx>~Ij^+U8rc2U z)ULPOj(srwA&ot{)}xNgV<5R5*ZtkK-muoo8HX+TAby@sG~{pM{mwb(TsObE&N}Dj z%sIC`x3xXTt&whxcC7{7=avz3$=^FWeh}}Z8_YFhnu+urLO0UWv#uGp(~O5?oa@DX z^DaecU*K0FN9TodlA3DfuFI&etqrPr3J1BsZj z`#N4Bz1Hp>x_6l3ddxT1hTCbwL$l8H;=X#Z?~S>J9J4;?J@eI&Y3?wOp0evX-4EW! zz{C;HCyqzF>&3QSJU-W48;;S2QgvWz|By#a{iJS0c?I|W)rQ{Bw@ZB1 z80mb&nx*@x8;Pz9yH~EXTWnYt=4+$tLt|h0xD|`n$%L59@j2$YZb;XSe?PA4%FMSr z=BMjENQU82Y|2lf*{l}PwVG=+Lu~ozS}kZb>(32LvZ|Knrb9672k9|P@5e23OYd-o z&4*!bH4a&gW7j{o8OL(}FR}~ii&$uHQU!7;5r}_D=K#^bk8=K>&HkK!&GKROyUN;c z+3Qvwo40f$Z{~mGJuwf!yBl`Np1H0Y(sjq+nQOf5G~UoVa=mxjdha3WX{eW{Tgxt5 zW4vU|mwT(h0I-6a3GbDJb2${(RVclk4gMrgeqgi1G=~-E(!% zvv~mB((|slzij@yW4)O%(RtR5K-YmooZD_KbiHS6D<9{_$9z&snum>h3z#VTVe{|r zeFg3jx<^>XyWQa)Vekm&#yHo7L%ML+x8+*VxL-alSt~L@C5;(qC!Xs^*N>p}TAU!9qHkZ0mEYSfh2sz*(|N~Vl$y~A~4TPGf#TdwoQ z=)C^-;yP_C-{)8{W8Q!Me%XRvVb-^?+1=vtDMv8I;nf8T4_hvY%((l4bKIasFKYp{MPI%~#jujP1h@%!$} z$$HN2P<1S2P1g60oSkcBr)#(Crfch3G+!x}JZ80XCY>UaST{W{=XtrY*!H|!X)UeC zD33gD@3+0kPTPOmyHgY&{Ytz@j_e%sFZuQ;pWdV+8ZFD2J2_{&dcVq@Z*s+VM0jfa z?$_^f)B68iBL6xw?pY+wn{eB1$hJ#m<@g_~+YT3<*exQJzSp&IKxa=}Z+`QYd^0~J zkMSLJT7|`M^66PG68*+zdJ|1?=iZ3e74D6U#kqSUZExf_{Bqx9jBhghZroBE%lpGw zYUB0WgXpn%HrAM*+9OiR-cPOrKxxKf7cPzhBp7uFJ+F+;v&dWyj-|>$4$!R(>z8)5bG?o;rIlU*383yI9!lN0)Xs(s40Xg3guG=Su32 zJv24OH{zXPF|DO`e!D({aSR%gtMh7Yyn1T*q$}|U(M@QuC;4+GF_A~vBb$}l*|xjB zO4&9>+Rj1epiSL&7BYct*vA@UHI`V|C2!~9dU^P=`6!z2UjDf5n_l+?={m>O$FXm+ zqJI?I((THdJ>np_MhjAPPMrp)zKGrPA~jeSO;oH-H`-dX+ZgF-m%Cbm>IGBveGE4F zOkFZ3)6CQjF|kAN$@5|3e6{#p9D`v#-)Sm-Q9Je6#0$|=?1M?Z>q4rE`A+rlXW{ah zOj5t|%Bn^}Uhy&BKJ$u?Q1LMrrn!zA(sA3qCD(rASA+Rgeb`Jac8Vg0Mywj!)utYx z4?}DjU3eqf(yJa_2aZR*>%gD`=fyYIghQHew|C|GaQwlROkF01iI=Fm zNMFh)GHW`Cxo&rW^{SScbY9Ymn?wx!qX}LDs|lF^7qHa z&Yvbm?Ky`(Z7~@+=iYp^;ISCyT5pWjE4>}payirbzb}DNPW7Gc$zl^qO0#!AebY zRa9jY`J`Wr%sl?zm7Jj`^MhzeDz}|&hw}+bZ^t!U%Iu+U^V4vpx4V}7z;^avNovR7 zg!kkT+nA=_q5Xc*IA6p^yBF=mPI0%QowWOv=>zB_{IeII#vt#YJvnc8c^-pF-g`F{ zkC-(HbEvG;zJmw(Ok|_I+v2OR=(e%;((0z}xLH2KGDX;v{CkhW(6oY+K0lw#*FDo= zmpA3y9J2M&YxA@G4pCj=QUC7MOD8$RZ@{^f@@44T{J3-}`bKr8#_~h2oyG^b%DT(( zv&1yG%e5R)^?l8I`{CGs&y5r<-e}V`!wYZ^t<}#Jcp_{5Z(2N!04I8&3CJA!pw)*jIip&byRb zL*M4dJ7*giE!H0N%&SzNF}v(oT{3-d!#Os@s`T3YIQAyiBlY*1Lkl$vuF;O6(fZzo zb1dc2(6{+zwG~ z#1~mZsBu1%_{0f^zBgWNUe#X>^=PnkJ5|sp{Z@6FY;0T5PcZ)JGQT!cdm7D zt^X}Ne7BdMd~dd`rluZ>Y1`?c{`ah%EYH% zQHjRBTFi;NmKX^=3VgfVeERC<+D_f;>SCMgp|Tzt>#e$OO8GSWZF_&HJF1%N9*r{dR;g5eZn8T>6No#!G}SUM zP2~Abu7oaa>)HMyu?ai7JZ@|wq3vXG3~a9_()_W(WnacbHs$-3NEswpC~ z!0-NN6Oa6>)Reu-pC@6?KP3uvF7`NaI-PIKRQ_>YCtVzML=CTx@zw3u%H3if`FmnL z>7EmNCwVE&n={21|3K^1iP}CjXKn;3x=%Y5sI0y|cXzBjHS-rFN{s?i&SmNxidi!J zd43$CNAI(|Q+D>!j4so#^Hr5z;*Sl(bf*3F=C|)?pg&}JHp*@*Q=i*^td9(k{mHd6z?7qW%$_x2(wJJ-fTN1}W?s_7e zyRYcoZ|h8a;%`zn2$CJWpDWpHzV2Eses}z0SyQo(=V=xOpP3Pi7drn4PW%Mptb>@F zzOD}Yi}BSt`i@u)%oNZ_%2H?S?#|z`ZKbkNIXT*6JP&`KGupKufy$5hug@t$$#|?qMH4eSYj7B9FP2*$IPSTQfijPTvDVoxsPskC9ep9I z-lask?wS>lh=J9K*hF*I#U)mOjI&Wy3SIY7%d5FdWW=0^<7o4B;nplCq)!A3G=j}< zQkS9lr8;SOdb<5IY0XvFgdkrfhrRpwYT45#lCQB=UC|UzYWHc)&Y2*N$~Qc7^w@KQ zxocS|-^ofDuMuZWJ)KTbK9|orC6oORSv9rl;hTKJOQMREEboQn5~wj!G;0qU7(n;y zzcGJQYn&Fz971AuMTt2>Vh#*{E;EEl8E=BwP?G?*H8zWfgdT)1SHcTy2Ig((v<>VB z?tnMo{z1OMCVn4W>G~b>M|)RA==;sjo1f(QyJQuw5RS}YG{#q_MP@hJ;`O%cy|&+{ z<1>Co?azM|t|K+AfW>q8mwcmlXN^@fZTt+aooNjivC}S0+KS3`jSbkE8n4l(jnnfz zBy)^4_>^N=+hClUUo2i?T;1r#lDKFrg;Phc=CaOYUBp8O&ppIy$8KBW^q-m5g3$fc zv1swm^zG@p!{TL{95o6b1;5lfVi&(ir^gavWL;Wj&K9k&rmVRdskoH2luAXdt0lHT z*Y=D2A^Jd^;Y_YkM-wtzr@pchkJv>nzPk3WrR^)zuCA#z)Ln};TdpgS*|@4Hu_CB$ zJar_8S-#jy--ORZzR@)7xvla!+n9u~Axtuk%sBT|5B+lD@p(DJVX)jC35#Gje|CwnKu023l&~Y!tdZTXJ%EPhS zkJR>+GIq%&1q%Tkiam%wOifDuo%L3y+pCtfU9=Bd(U|{V<=^A~OKe(ZH+_{SB9D;% ze;)%)r(0*!);#^W3FAGrPrBPD`{*d1F67gT_$K(=r|yrHp8psKJ>_Uv>J_kZxJ^)Hh+FhBk`_? za$D+1_Gt$RJImU(L;snwRWZ#wPk)R0dgED^Gq9`j(V5kq_wHxb7^ym&`nl7-G9NZ+ z1f0ANHZvC5cIY7gj#hJ>MARG(5m`5#w2cNcNgjhqr|X}j`lO!iHx-YlC8YY5>8R8} ze|2Vw6uOwjs?(O1v!|_X`p#^tg}SV<>2ObUR4c*RT`{hyjpL@SXNK4?PKM5rK1Q_9 zZ_AM-XqbMK{9827gG4o)WxKJ=H$cRq-}@Zek>;|0Y#&qS&JcI{q~>hu<4*hh z8rbwn?6}{ASI(ww*kn?3HnmyPcjgq?gl$jV9v-vDw#$A{kd-s1k0zHp{f)u)GX>e=QQJ_ z)4k#;psa|in;(51w*0Fb4Y9{<9bppLm*%EYj+@^g5^_fA1pIk2>W5xN!84sVjxERp#+=J* z;?-Q`!m5NGl16t1$7L?7)r0 zH$tQ^eXjZVxat2_m%KG%L|lnps$=aN?Gq;0kwj~VKp2rd_BCSf&(EEa=~85^HTiU1lZXVB=fWK$6Xvt}$Vg7dCf!q$I3SUA z_8nY{KH9FkDP47R0qpW3Xa98V2;2_jkueVd5maZWArYEd|{{;N9jI z*{l1#AfC5JhUagaKX3lD>C0x9&v)(JSIQpkW`m8DL;mETl)Y^(gz4neus|)>R_FPL z{S-$o)0#sy!ns&8TA_2_WJJ-#c;?gcT3{Du`U9FDBrOl{l7TmT8>{E z@1CGlxa?S{-duV$eWEkDOP{kX0iW4YMrZdOWz0@(JF^zMjRBI)5A?OTjm_oxgul9t z(fG}d>o%IhnYrLPwKUQ-p4|+t#MVgTBz=)PewJuUuvhvr6M4jipJ0dbd)Zfs-*HGw zB=3O$wU=U@@c)qK8~ZB>Vkuhwq$D+yEg2c2P`1yVS!?;b==wL}3G4d%+)@u5D}S2G z>WS^ncC-+C^+M47O|T87h<;yees3&b?0TC`!aeiHK7Dte8}H**IC3lKRiwWNd*Sg@ z^K|(WpUV~XNbq~;P;{i0@fq$o9#a4B&HuUif16dEdKG#v$y>h2O3#`NqL-0vciirh z5uS^kvi%B6B!M`IX3&}aL~h2{*RZCPK6O$2z&QY9+%}KuXUUWHe2G{U4>ik^8Ydk)U-h+;@lUic;+JhB2?vrD3H%t;Cq&xRo z;)JZ7;k(x1aLu~fG%|YCoUy(t^gXr1+S$Pz3ij1?FKHZVxyzAzDC9m%bf0M{))`2R z%MvO@2SV}$FHfruI|=bky-#_vD)s^Ag)iJ|D9MA zOQ;y|6?T0qY(Q;ZGvn6l_?6bJ*TYz^9!>RV>Nc#Lrq^;8dw`6yW}ok*4(XfNuoq$l zFi+3d)otD&zA3R6j?AF>mwco8(X;zQvHxv7tuzZjFH5isEUVzSb=-DIV9Kh$ZE?%0 z@E=(VbbT9=&X@+(ul9EeduhTcf1}3ugr9M{-b_{iH={z ziv53N-x^128 zUva^y-Nn^78%m7~xn!F~8?#}lRkKW=ziRc(Q+J7!;wQ{AgJ<96r#JyMdRe|%o$=ze(f;Kq2BaTR>5?oZd)Y^vTw=bId*%wq=c&B@82z*nVuXKF#X@%qoA=j9~Q?@#qNNV=;@l(C4 zv)dW#&^!ya=3im)mNM0KJuh$FRHhncf6CTIl{827W{a7tIlHYmi8|3o}ozT}_ zYw53D`f7S_9{sf-kvu$R5n(GWa25y3%`d)5e@wpGS3LQ@4mv#%xIP^t89oH zoc82;YyNezW68-nw9%K?jp2{$n@T85Q=~B({rw?2(4EX?srbQ$4ww~DeEpmQwqDT=O%R8Dup%W;7z-d zqNt0S^xoVQ1LqF1jXKF9-j9f=d13B8yVO{>v%pMpPwG*Xib%Y&d5?LQQn4#>OOZ>@~%t1rT2!* zJ37x%3&F&+C(E)v4YCQVnw-y*XJ2ugTj@2rX-uiB+RuP^ejazn ze@sc667TlzUU!K z4A^I>^Mu8&vXZ2Iw3(N2+J84ha7t;{b)Mi|(0DKHxhD&PGae21!A{w;(EYHuu71)_ z;aCR{Gd$3V=mB>Tv{J8Jyf>Y9`3zP6bWnrO?m}>7HleH0c*JngfI=>YrUJT!sS2h)qnZ4njO~jgRL7mR(Pwh zP&r-be7z0*vB;)F;);<-K>jt)NLh#R=N8{aanhHo*kZOnJ^9Jk;Ct(5`_4KfGnMN? z=eeHMP5v2;pU6L}uW=r6F43dU&!AMc^OR!`F!eX~<3j@AZKEQ_PqFIXJN9kxtV6ti zc&Bgd^LXekHXjavo9e%49?39tCnP5#S^3ww*sDG_eRU~3I@CIOSIiHakDI@YlrcX` zI#=0BZ_-HSJ>pc(vPZ5m zZ^R>DUS&~@oQc;QudlN&;yO~Be_b}$Xt3VbkFQR`qi2h^9->B6}^0r6% z$4bi6U@;HfiLt*;{N}lhpIA1(-%JjZ8;G9>rIB2wX8Lo;YkB%ud0IiAXGpTPkF0(9-iYx?V*BfH=a;2b z<1UfUL(Pv9jHIBJ2#G?c&L1JtA}QTnsWp}?m(pdjhwRAM-zu5i&VPF6uw*t*PdWS1 zHA|u}kHHRx?Hkj-uY<;^h|E-acS>~sJrUC>f%WV4$>^iYHiIQJT1@5w=47V*(-$cl{Jbg-m}UrAQaDXWL=i`cHSoW8R@w#hYlGXEF- zLH;#Qn8&?%x3Hf@^_*1q-4XGe(p$e?BhUB7^G(Q3AvVp|vZAl;beosq_FWLSbxzZF z*2k?^=aNso3tIGj$RX3#IRli05_=W1mljfQQ5j`K#{r5ynM{?U=*U2>b zV|1x5tZETFFTqVaAYR)!jd#|^D_sO0ty;r-Unv$nbfV5!s+z6lKD#mYH_A4Sl;>X$ z&o&;DFH*OiRX6E*nSL6!)j+3K@K_@2>n}$0Y{pM4ol!C~=|;)Z@zdlh)y-c*4J0-e zJ+Lk;p6oTxWqplL#(GIbl&6bE?Q4I=(l6E{$@$l1vra}=oIgP4JLHDXJ9WCr1!JP3 ztl(*^;Qs4BmeoHrL1BRt6vpVhry>8cpmog8kd~a&l2ao4Ohv3~+meuZ$rwLzI1&DY}&OD9Ij9(sor&wpPw|4fZ;^irTJ8BGkPMCMZ@-FZ(TJzaH#UwJ(ISrj-c0&BF zo!@Fah7&&epU&*8C*uaH%kvu)b)72eI&Lq-uoy1KRJ}K4oVEhJ5Pfcv`94Ts&48G$ zinmH|znu`j;=_9VlSO~8lAez^SGT6-{N~1-_o$>(XjJ8vlHT1 z{FeDGOJbgnXeY;cU!r#&di(5y*cH27?B1D8d}dZLlT4Xc>XirHKj*}JVRy>jur--O zw@zv9w=?2(Vrbd&@<8jc!-t_d_hNon=Tas)3LI#EhvDWGaiYt)|Gf z>Rxj(DJESf_G;Xi%i)!KJBth78lSRwr_zyKw~4jT?W-?N#i>`%7te^~yPzGqLVYsHVvsp$$+_D~{k2Dcr}8$Rk+8zy{Frd)l~g^p1t^q zW!JyA@495(6f&=Uy(P~gG3~F%U6)QTKJpW;p5@wueNCLCn4l>pr(iO_?qai@$#`cS zY@$s*na;_qtvLUZd0W)Gmb1te$($-y5@{W>6XG{g+Wxu@evzl&jNQjzFXG+7zq2)V z&w~}IC?~PVX)*yLx&8J)%(k-{@2rE_Z=p6rUf5}=jH@i}B3j90rqs1xA0v78TbkxG_2kJWjGe;S?dHy=glgoF;+2QizH*?xWK%%XQ)2FsTCjda$W&YHIpsw*m% z+Sy6(96C!#wXH=$AI%cP0>n@fOyn-Mi9PCmp`>;xeVL z{d(D4ZbLp0`L5e%4+67ku8g&NBMjcQ#-4Wt{UqYD#0^_dan#ODdS}@j4U0wR^&m+* z&YvNE&C{S0kVU0@fGRt`HotG)YJZ@4bu< zJzNi$T%u8txCNZb%*fp0vPC0lG&7q0_aA@eB8+kolu?=#fBy3y|KA_~{l}k0TIGTG zSLT-&{OHd@1XUiD?}ze|3%~TTJT29Kad?Z8Fnue$P@F^(irn+FERF)7KIa8#Qs!xV zD57%`C1)>7@mG;3ytk;lc=XdUP2>N%hJXHNgX3RS9@C(gvdoHq9u8p|6#sRNf;=tK zQ~6&(dNqR{*5axPAyJ61fmWtQJfOTUo9CbXC@D&>^skx7A!SDvfUmA1DgPCPkg3co z@yGxE&jE%*@fro9I9$>=jYZP@#(TT?W#J{_Z8=T-kL4m3K7>v%f5pZ?tL&Wnq3|HB z$g?~u#5Rcks-T|4Veubk2+Wb08^tT8% zknPFqeRX0=PJUc0Rvt3|7A4lu(q-1sA476crn#V1K1K0EU<*-J*-DhOcAh->r3o${ zS%)Q+bqgn%A=kGC-$7@s+Fu<3y zFaup}innb3GCRP~uZ~!dmozPFK+Q$LyGCVnme+zQ!(sg3=pl;|*n3xX(P+jocLUf~ zgMS^+1xCPp%#_Lh?x{og>R<7nlvRRL{_iS(z;?9^unlfvrC2BMlD$rswIlMvyNDRag>rg9C#6?tgS9&YTk&3$;;Ik+AZK8Wxv z4vjkpDD+0Fk4)o}^XMN+eT&4?({f@Oi$ad57TG~uBjLf*6J5bP%zZfi;E#-sQ4CMy zLxPz-T@64krGv5-YokH^(Npfv6(?GM1a)jGf1(~mo}e2GqCZVs#gRM|;gl>ga@M{+ zV#SYB)*ne~#Y6IRHLhNV@}>u$uUwS5XdHoCshEFEs}h!}_AN_2-ar83mWC_zLUSOU zmp8*~CBhkIw>D+rSg&st*sY>hKX~`9&BgOPWeUyR4&aEcedSxp5P&6YAeV@IOYhQ+ zyTP0o)itv*5WK)?DB?Ie3ry0%fAw(DEmy4ixg(Wn<`qFo!2%d)VO5ln+E1`Vqr55< ziU~DbVtw_Gn2yYIkgS>IFWE`N}r60U(p#*oKG!TNcqM*qYu^C)F?cR^;Q4i&NM*h~5ky$Rh*EB}J z3OiSjzh^Rt_afeROUII>aCbfexGv!2Cm&`WoiC+VQw7_jJweM?#Bx0y8+%GQmauVe zW61pkuJasv@DA^8mgeOKQr{WW?7*wGg1+hX=KJIbP_`E$ViAR@+p$8=_aBJo-F)$Y zxHwsKbWeainR#EKKYx3E*p0e%{mJ)twnxM{`F}k;SvZg+K_lW&FiA!f#5%F+qY{&W zgRgui+DuNt@_Ww1;x?yKUpLJJH>nK|T@+VobInt26uahWn+dZ=iaxn;fhWp58E@D? zJw{HCq0#KgCbdDGP)0eQJ}J8eY5{+z#e@3(*!JWuv+LmqvkW&K{MJMp-#gw-cnW+> zw?zh)ps>q@zA%xcLVToe@KSl1Ulcfi9zV&Ny>LX?iGazW?MmHop%gG(wfy#0Hwip8 zs$E&51mQB7X(at>NTfSOXWR|cTo)JE7ckse2v`KgE-T8JA$1-eF8s;%avvCwO+vb` z!aZeIyITV4@$AZ1AoDZ0cv*l2cRmxKPF8Ttfqh5!#+kb!&K#3o8Hp+1G7K^1n{4DxQ09SFCM#)(Q?doR z{KWE_r7asXzApGM3vursb#@NQ7O3|;cZ%EtNtkXP#7!vfIvR~mnA}!lgdLiAdLl|0 zrog)c+GNA%9MQ`r7;JcsM@cro&{!usHbP6<$tUt=02oY4e+R z0pZmhGjkD6P_#;)rpMnaFAQv$i=pS|!6l-&HTmYr0-?;yG{MQbh2!I~z30yZ1&Mzx=$hm(^nbB*5Dp=D5U zG67TPLhgYWNjN7#>7hH@djpbW%b_cLa{-oFUgHYGS>XbE9wuy=h+`}J*x;|h&{%Wrp z0yKUVqxcwQ&g^Mp8%D^+5OfK50ld3xj14NFN{KIs#!xKFn&k$jUaTz(B2m34LuT`eQrX;AW;@Ls8$(@oMj z!re_Qmi7*#oRlxP4;CK)&dKK+DrsN3rU}&n?Itb3Ou@q)++mFqSjN38h_)||R|><) zdwuR1_YG9vI%Qu;XuYvrvg*V+0$D~?#GXOL27Zu23MfDsnz|$BMazO=M z?~1fJEUXj)wWsbhe7S(L;LTxvag@JWc!k2~_-e@$Z>n=DP zM8?2~?(;Bp95rUtE)S+v5->8{+jrAM-g*bSRvF$2~1mAZ+$1B2Bb4h zAmm_3#o}+4?=DnErwQCZo8V-t1ak2U9kNO}G5fTOCIL(sZN94fqVJuv zbQdZ#2dGoNaErki_UjtUSm@3<>w>k<8x`wmR=+H;jB=_0y4Iccz|;gh``n<8_VgM= zQ#cjkyk>jxvv$-q;J zN_>>S-Q;S(r7XS6`&+0pvD#-XMF#Q}ZBm;B>7fq=E{>SEeY_Z$Mrfa*PSPhVdXyAv zRTZMzM^u#o8E5;vPqx7#FLMce25zaA3}x2d92f0w7<<^>WCfNxIPJ5AyAkS4z~<=L zXuCKACg5>!(=?rt8l^Hyx~0C1DY6HZYIn)G3z(TdI0JMOWmO|>cYNIfWZ(z!Xqiw` zA$E;|nRr--N<8RCgXfq?M^k(MTl6<7neT$F`Ec!XR|I*K>EzKy$k`YT zb%X68a`&Kln!YKR3|ysYEbFY2`LI9#SUC>QJ~yZ&j{LT=Q~a=<^J>zucku#ZHdsfz zscj2Sab($&Py`WmQQt3hBX}LLr>s@dMExLua;}a3!9qiD38g0C{~>FwT`PPK8{MF4 zJ}eRI3=C%Ew<;-Z*BWSbVV4%mGf{Ig*}c}|Dn`*{s54rWA;VbJEu*}5sTTWE+C|Xa zak{$~p^ZXz8SDUc#}{ducN7=@HA;8!v|@~}4p7H@HTilwJGr|mCMj!Sba}M+gPPa;hmLZ;jhoSWRPB$nan|dPgY8R^?o~EJat@EXrpn9XE>P|3CUQ~+o zRKC$`T?BN?Jd!t-x&#K@x@j9L(0R@a5pIf--7szZ#t%us!*ut)YF^D|=^NZ{7lF4T z!8Jq;iG7%yx{ZC4|1gf1gFP~Q#VdJ(ULyg*cId>diaQ{=c$!|rT|e)hG7l7ikD#~D z>>E{(i;$;e_L)6wd_7PMJVZ&DzM-wp&a=zRZZ(CIfvq%up-rJ1ajMVLUFgs>L}wh4 z^}LIdke&by%%Q|*i=B2?vIFIrrU~k08`~Gz4k3&%G}|Ivfym3~L`5iYHAcpw(fob( zHqtWmB$y4Ig>qf>X%3b81-MSMqQh1CCmgHq;|-Bk-7GqKi)Kiwx9I{l-R+24F?FkY z1Z-5{NfjUER5~nVKTgk5jbzF~QDySk-5hOn$Df|$Rp>cszWVeeDQp=sw0X7_*d3QD zNkti2Q`@+*D|(VJ(MTP;RsUVkR=3>M#RXoYyu>3Q&Ox_|z8UfD z;_BxmvO9%H`i%%%f9d(JeiX}!0H#mJ7;%@f%!+>=4k(WTn<)zNlx|V~g-&8-gsEQ8 z^?yLSo}g?XuLYyk_;cv52T<;YK+}k7j5dd?8ECuVirzlrZWp~qA=a(l2zN-_AWrKn z)(O$@K#BbD78U`y0=#36%djfyO_lbn@YOr_%{B_te-e!oR#Xu^dbmf`2a)mut-{Gl zPZLrmZ}A{MlenBPrEQJYt48l4{J6Y0)S^*LP8d4**9ebU)CHKy88E0kT_A3_h;s3U zgfh>xutrWEbq#g9s!rpmoUn93#~lwxUhGjH6w`F z+0nl2#;olg^N#l6JE&~4B!1y8hcbuf3Qqu#Ve}(!s9jhFkyI#X((xJ<^eBQ;X$-0; zc|~4BbXHyoU4np{AX$_Z z_2V8GN8I!lFP=FD=$_()n=vqsxaluuC#>{gIO3zfpq=p1hvA5i|KmPD=*(!R@;5a( z-VU$DEfCC_p?z=7J*GvHK~;pO6-`xzR^@g5{gWS;Tdsee#j7CwZM-Io{pQ=p!plXLiyZxD{X%dmMl&j}v`DqUQ$P@qyA{P2~EK_QTW&^CTh3_N}?|D<;mKTbmLQzpr>$)A*gN;C8$=q5S@(&uDhA?o+dkC$>98}5@-U9 z((te^&%!NdN2;fq&jTKE6eK6fw!oLO12@D}JEC~U)gIqpX7?h$C9?t(&HONx>%6Ldg(-xZ6u;9jek zdZrws7(O&u)N;w}iN-d-T~gTw2nP3}iavUvl`^EKCv^v>M-P*0MU%%Zy%526yfdx{ zS{ssUs-i0{|8eTW4#2jyADtS+<(e#1ve=zM^)R_6>FNiUC=q1i?&gSW!0dz_9b#>8 z?O+@4VRFt@R0KQQmfCP!)1&7Lbuq40LM5~IciL%)dtwdgCzR1CD>=eQiV6lJA&OaOJu0`bDC2|1Umgm_#&&uxkA(s-&8?wViQP%F!gKv| zVzv+Uyocu;pS!uO1h|SRCX7~=&hQrOlFh}N@Jg^&XdPRh16Wt7-eR(Jk%j15#q#dE z-@Kt7QeL8}65UNoSsu1kFl4`Ujo@V^?dTU#;GvwIuJ5v2wt7HU(KK`aN9GpQQ4&dk zGQ;S$T%smdfBWUl8tRXayYNb&tGHacp{>Nqx%m%3T}9PgwNtLn@_nbu_6WRHye(F- zM-Z|qmI262i|(BXhXUt~U}E}4tS)34g~;fT9W)fuRYbKfMka{~jo$JAcce?nv&v?# zeaZsEyO@XItzwAXA00%%N~43r*NrWp z#b-O7EJdhW-mc2+oU}XByb|(+cCLB@U>CKUlW&0PRrIwDbU&;YYj+PZMA~@gw|sr* zaP=aG&}JN6(se@k{|91m?3GJ1o`+K)`r<7?^zs1Xmu$0?jRG|dK3 z*Z!x94J+q*)ske!YK7FhmPoyXR#CM=?atZmEsuJaS%!5LqgyE7GPsWQ&pTT$$TPN~ zT*K?f(ZPjaoh#u&ysotna92^bVkb<{mD3!8=GW#h+(R6)_JP!=2JVm#fnLS&7JK7^ zxLvDf3-&4sSEy+b1RrR-T#9xTt6M1MQoyb?lJKq~ZIvqKQN|SE+h%T;;$6k88_4bz zl1N@f+zOR^4Ws%H-~Hje5bP>Ww@}7~cwK8E;5wr0S`;YBS!J?jwQF1Qt`DM(b`@cZ z*DYQu{(7f}5F*Db&%H0)$I-50_3@SaIAAwRw~KcbX^T}6J7^H=tZa&~g>a;wpLB`@vf* zM!AZ`6>7E^s3S#_IBk)1*Wgt1=}7eHH8vv_K6jDHuCQJic|KmD_D}OYIFuiSXiIbY zERoIgC`wiZYlE~!&)C9hkIgCc)t4#4s9!>rgVMa15PZhMTD;~iZ|odXtSOj)67a1Dn(3Ki$5J%aWIh*&)WmX*~F@H!{=K4JgB z|4rmX&phZPR|S?oJr~IG=+zH)`nGN@())}~u(@=1TMO2T{*9bKLs(alHCOe-2@V^$ zZBV}s8U2wgRlHZ_Ta9%Uql?vVHC$E&97M}Z7@GgV3}Sr;5(+)&Dp6;yHr<50vB&#I z{SGcQYf!FYap?+M1C(=Z-Qu)G(#Y9zJ3Oc8jxRV`bfZ`vu3Patx?Ank$Zx|H>P_4d zzsD-Q8h)VQ`{5Dr4*;x5o4Uuv4JBz@787%8C!M*^D9H4Rzc~v^PS`<%H@@!(Z?bwjxd8 zC~{Z2H44a)j*a4BC5TSA9F_7Z%?a;WOt+<|d8V&w>Tr@Y7n3cbM$D4AusEq2f;t-1 zp5V(uy5oJiQoLY#jl>%#Ve?T38)2y*-c1ajs%=jmj;D>PqDl(p5w~ zpmNj;ey5Jmw#F@nxr)a%3bz=kD}9qdozWB}K@=kV>R$I|oCY=6RdhYDI-{LdS8OlM zWf)g6xMp20gXwBfMl4kn+tX*<13ZatYi95fq|Vgs5wNb5&R|_d)&sj+h588lSG%Ps zSFyNeeJlm)O5F(ODw1ZZS{wyv4%jZgzN-t>L-1Ddwp6(uLddCAH9%Hc^mgg#xKiIi z!|Na#v0u9=oe-1@Dqyx-3*RuLVXmTR=9XkmT94eUp7FQt^9)>%brqvaH>>qEWz=fWM(vuwG^UCY;#Uw?1t$3;v3LvJ1(hPqc?~hCOBmIGu<|Vs%Db@^ol*uw zJ+uR{apdhh_)|Yp(Kua@MD@ROQP3XZ02+i|qO26rHPF@SJQjkCavDR&m4u z(8`+YYcLKxcRViLqgElcLg|7(3YTM3(JA1Lr_NTqX|ANyr?m=fI3N~AH1MrSAOyX zfy-!E$ye>HYeCP=D3}Ru?!TXz*o21IFUnfzw4SO7JZ=cO_<8u| z!v;S31p*jRk;d}%pA+2~1LKAosdNuif^$ahx&5%rOv)bAqI9V_^IrVO} z2+~|kaIk8-8KIypxflAyMP9P^%fUK57~FF+KQGbD0sUe!B*w|9U=1t`jlW6@X5NP> z$qXGV>P65eXVhM>q96V7u|!vZT*aYW7g6~>_qpZ@oL0yjS?)J5S5Y)u&E7owb~W&`4(uvU zA5yz@c-hsj57!oDqkHY(By$o`$K$u@6xI$#AjWYmizYbYxq=GcIaPxh^kzf}K0Va*Ep9BbZiJE@A<%kQGtKmWdv7 zm4p+sdS_TGqK;@1W_1f;=Wmqq(NCX%J={)nu@oG)f-J?ytVslK6(tMR=#dtfRw(J~ zGkH6-K0ShR6^jq-JW{b90cwTL@x7{pa}`N*RjtAuRKGJqDtmH<>jSSVcH53R+XU|_ zW*4j9CXiVbaTM_?;^wO4dwD@R^apT^tOL4=%f(8#4lAqn^`Y9LYHTC!Bj6-pV@JqR zRmqQj;M@~AGBbp2l`_oSgK!8UeIfMZo3rK5aII*|pb@qb=qfH3E7lH49n-Tu)Kye1 zR6Ct#XAHCc%;4yF$6x~nBVZdi)74DJ@5LhhLM4Z~eU*-SOm|13&$ULut=2t>Bm?C?$CuHtp6DsF<9QyE7A zyP&PpK(G{NWq3KDV;G2IO7`-QV`N*?n$)6hi$c{)7vOFZV+K#wGP=Ud6lIC*ltqU> zuj)ODl69rFL9U{wr?`jy+$Cl78s$}SDAAnxh~jpaG#zr^nSaN|gc-04Y-ov^f4PdQ zcHH6rP?2FR2dD?tCBLUVtrm$-pFXB$EDTBAQ4I?r-#LpIfs{vqty(mev02fmo)Y`6 z*js7=bf(xmvbMs}&@Ow+k^#W3KtWZM>D4Qvefk(Wv-A+wRgA7us)yh@)4&?7EyCt3 zgBk=U4I3vPKC+GL3V6G1>eX3>kAbzNR`*Y!$MAA$;0V2|C|jw9BG1#@yP{CHf8Ifj z?nSfwIQCVHuR1JRO8Pkb9q6prMZb#BM^w0o#PtK1GD~5u;&GK?E=B502MOpZnr5mS zJrM72M;7j?OQ&riuvJ`H#>S~cpluZu3)H4IZ}+P}4?$eT-y^E@5K3mH@@kN_=oz_D z(LPX*%_;Q87pVsnBlq%j$1PkP&PtA`0)CN_qaL*r!Y3KxFp$;O9%ey+y)jvFCdur>&B$UZP2Ir&qKe^t9E6%8Q@ z@t9NB;vb0n8JJeM>|fc;Rq4Sc8KoijdY@vZUh$KFr@r7q zSJBwglVMW|U*xJR+fG>>gt|LEe+4nBUZYXzURi7a?vJ}tB*dL6k}4Xc< z6``H#YODT3jdX8p<^qS3ti{kmyU(M35bFN;yb5^Y=qTE$R_3BXxHtBwv>TFtcE4rz zaqf-D@g-dEnl8=uDY|Naj25MQAs+oLyd1@8bq6f7P^grtzqh;O9Kcf~^Kl!BEKc7& zoj9)wA?<2w90a&4?#350{~9)I)v3x&wu13XbL*CjKfH!RFy^QH84b)DbymD2Szff$1pa;xm?iV z)sHI*TkmPht3mC9qd2-ov{Y621>t@&Pm2mmFTxV}vywqIEms1>Wm**JKW$-3P1GtDKJS!K{Qm zZJ3il_raxh%v{qXDp3_{Pwd@5+Y4W+t2-s?Ap}*$JF|GS6H_J<8hkrp4lY&+YgamE zK<$GgWA=q!;FrM#SCbt&p+`aPgu_e((Ft`NWa?teyozyZ;I$}Pf23~(4&f8d4|;O$ z?y_7=L){0ToeGX>PlnTh-?K1`gU`!HwTI5AeV>_Ru03f|58OUD#ZMR8F4$_7FmusBWRk58wq3B*N^X6hXY2~PDOa}mqHX02)R2~Q;K6k}V3$O1dk$(f#v3N$=P@+`{K^NRutgf;+NYq2L#zPCzM!tbmsk5z~^W(Ub)i67+e z8Q%RPH8#D18C+x199@=BRDmv~^gtNXCTma>@7Oab#uXNk6>e7G*_xT2SFu&Y39b(~ zuVOnC%ouo;tSVSpm&ZMH_rv$Pm*>F`dV zR*CagUbiZ$etOEOU)e>VYO{Rc=!B(dNNnt+FuFXd=0H12SXpd@Jf${+DBN(Mo)ELE zM27)|!HxW6jiTvn9J-~ThQZ5%RqONa3NWLy%8XMZyhaJ^Ei8Vr%7Z{EBdWfZl^rwu z9ud=!nAuTx#O89W`EkX}7#wC+&Xs_Hz6)I$g2K#(Ovk2U6wiGPCv>BLiGGaz$&U_nI_`?Kr0Iud=nUnOV;9x&m$O2e&IHr&R&>#W*B4>~vOx zTUI(yxY)p^RA9N~@_tN4KB`5KRSU<0x+rsVau*O2Ga+h;p_&UF>#~vyHli@S`jH)f z%J}9pii3-Xf5XR&zNA<3zy4LFCGDVK@%%<9qRuBtG? zW-tFg9Xv1uWwoM{caGB|EJJnvclBIzl| zYvWj)?SuixHoSwH%w|ew0OVv2$5sG6lT)jFMqW`Jk<%>Bbhs6wB)do6IZWh>d67zJ z55VMPQ8DL&7&S7dti^@gyy+X>2*{|B7hP4oB7rgm(Fv6bq4rSlO1an zU>;_V*skaa0o9{}=L)-480FaE)7(}VyPg-b==DNBOhRE|_s9nzwd+D)l^$+3R4$+g!^H*pDxsTu zj^<$u3@anW`}If#si_^x3$yj4dFVpmkv>FI93-U#7i9UGOEBHz@<`W^Mp{?Bal?ra z&Kpf?Sz<^fs-E> z;*bCRpMU)KAAc5Ug}e2?GQYh1`Okm+sZ%izv(vOfajeedQ9kGXm3i%V$DR-v$zt2d zo4lLFj@#pOb`$eb77L&;vZX!BGHvfD-=Y6IJvyLf5Qifkv@h8)3mOGK2Qq_zJGy{8 z()XM22EXKYJoxSu;tnt_rc@~-B=sT`RiU&3TuyIMd7-S$i~p+A=G98(=4t^n2W;UY zg7XM2=quWlk#kN^^hL(7UZt;7`ad0VHV+^#bEcva;vG4n4u!B&Sd;4V5T5dLx6UA)Y!*$kf3fRFYJR#SSesm51=!sNnWnsFb8faJu3# z4t+1?JAgWK!y*>8k`5r!3yrHEnh0|M(BAIq>GG!4sqL;GH>6;0Y zl|>}49qIgy&QU4P6OpLrg7Bh|3M%&+#oq9e5XHD;$7(-*^WWXjxdQJ#c$MzT8$RDI z2y|pAUaF!hJ+lp@7WpWxcj3BabyP)nNa;MRZul(J{iX4=?`H$8RdXIj7yMoQU(vPd zL@K)cA^zZUShtCLX3S8*P9o?{I*5gk6Qnh zV&&n}Gzm$snS75-UJ1Hs(?yX~P#WP!QNQJ;?DS9|`%z}@^XlX}tXzDm48z)V)YVnE znHomH%YoD*T!^vu%-x<|d$^%u1Pl)&YBnf;Q06;ICzdb$e#nz>@f2tVARcDUXrGHG zQD8v?RgSuNDutL?Nybp{aBzVi9j*>lE)`vF8!m2gDtTAVY*;)jMOP%!6ltO|+JZQu z^dA32C%j)Fy%ELAkZo?OCQq%NH&b$$4U35-+`a|+c2LrvZc$Ay?Z{P*6ntI}QDS?r@JAX$7-f>QyJDYBL2?N{au zYvUO;Yp61dU@pZWgF9;>J7YKX(8M0DF-3Ch};F-ebinm)gKW%K3ynyry z7v+Zf#N7qxnz;xy0jcLI%yn6}!}Vrn2)o7Qj3=C$lrmh3U!{D|PpcE}u}Tz2MA1#FZ$m$hL!*M*8{!xbUfi z2ig(g7SRuZ!w@8+#((vrn0)@O^>!0OXJv z=~7m-z^X{Zo6qbl9i(Rf)jl}lUQq+O+~S6plln%X@A_7Y`|(ZU2p%4j=5 zT>zEvgsz9MI`FJNKt;hM`rAPW*>JN2Arp5|0E;|5m8LxfS}e=Bdz0=hV+~;QS|vLE z4*S7DdUsP4U3b!00(IAHq7)h(ew62M&IR`?ga>)O1?`yO0*$}n;n8ms@Z7E5hv4}^ zfqFk417WFWe{bjra-#69Z`&osisb>T%+2){%Xk3}RrF{}kn_gQ`egBlsKWRlbMa z10AfGl|gYafrp0|b6MAQNmL;SKS`5!+#w2NGKO-4MG5Dmz;izK^#0}eobVQ^Y~EY? z1hQjf#~~a{xQ!LQEC8e4^~p#BRYzskycuN1_|OvIw}V8rI{sFdze@#09npN3l(4X)qGv(W6% zGOyLCdM`%ngi|`i;9`t2I^@1VOJ_-+B4xP0`;mg z2`Z7i@E|lzX)8$?U)`L?t022)SCgAmF?x9DH|^-L5L1`3{SZ2Z(kX}8OZBz9Y!r->bs&f*x7==QQeJXaWo%Il^C7OLP4kUoi3KfR-%o7AAi(g!nd!FiJC-j=v_@neAJ;(g6K<sdBW%*@Z4kW9z0j9QCV!ARYLiyWFzZ*GzVp|`>fr8=ZLkd4woBq zsl7g=A?g)HhL=JGuIDKA6r;bgtTKfRHfY zIGTmp(?b_9&kv~^ymCaT%xv*15Gd?HH5AM>?Z#Smyb9I}up8!eR#S^|WVy=whkE9} zJErde-UqYTzDwH2Q!Lf9+TW3NaXLl8z6c%1xg#FcHqi-6gWLUTsU-D2=v^?pe;pk} zxC`#?Pw}o6`+c~(U=_vV>#0Ng=C_k>J_{>zV*FG4t?SJ5{a~g$V>QP{{usi(gb? z&fQgQJ}zdST+~RZ$xwqcNi1?0)K~8{jgiU-#~f9zN#rwL2OYtX4K;~|iIY4%MM!%o zu;t(vUFVs13e1X^Px{V(Eg6PSF zf)Kc;(zP3zD)^JB`OHhvLlB*^r`sh4DYbV*BAHH1$6=1}ifS{eGR#hC9I|&D9pQ5+ zXfB4Y(9b54E!$pDyI|=jEFEO?lRb715f?WoypBLfQ>I_~?_o5)2P+~>(QBIR@anT8*q(0 z3Dn2pwi0U=M)A1i#gR_ju))LuI&h(;^&5F&-89~!9$>c!_+*!&tDM6o+YrxC8dPsl ziTVJgM@4B727uYC%0e=0iRqN~5LRYBgIM^vhv&Ryg+yRgwiIbXXF+GSBi<%4G4Ugf z1>-a-kPt`;g@W_AG|5*xP5v4)N%Mg*F;y3zL&1G*-Jueds)H&UW-}9X7Y`RN(!V3y ziKpk>&n_|v8n-6h?-dO- zf_iX8q?_-M#-mn3-S`-<9@V+defLow&{c??aEpyZR$@VMq)?pv3cbeKFP^D_9pVjW ztc6zt9T}bIvf=k()T|tvYq+Pbe?*~M^_&9ah8fzA0+E*yvTUfYXfDo8DRy^|UJo^?+seW-A0<60#dQ!S=_Sgj+=TM8VOvdM zHQ@iNJ(zd3&qc+<5$3h-29J|JDRb$8Lu82xLgXo`7kTs=Qkq|6Y8|Tx+bI2Y6Mh1r z+Plk3<;LJ$G9Jfh6J13*9!0e{>Uzt#rDGzfgA^GA0+9q6TY*`iF7xW@C0!oWWgE8) zQM{CCwuiZ}AeO^fGTnS=D$<{`aug7bqe-?}y_cjxXwwSElvUYH&^e5srhajsQfzJ`MLP9C)MvR^(6*@32a z$X_Fi!}-W7n3c%G`6x%|BD@ZHEnq4J7Yg_Etwi-oS8dWx zM`@kIHewH%=TvX7)_ir%R!^W!o(CImi;-F9>MH9y(Q9yN{6nwktZ3t8Bj-L8>uk(f zWF}=zIey7pr?sm5z-(Nt1-c6+cg2=XMyNTeC%1X5EZXK}4f%70DoY$3Obl;NY6Ri( zG^|v(1Ls(KOPSt{rDZio!R>R$AcVacsAG7jz)g`VA7%o4{-&BrJBUSl{yrGD0NNhI zNWxEKWg0pK&MJi&Ni66}*JQDD^uD$FaXAZ6)Xu&RZvfIBgY9>sa^1HXGVIEYlFHJl zfNGmjEA%xzj~ZjU%nsU;L>HzwMcoBVpw42lM-Nhwkh>#yPkB3Vwnpa+e9-$0-mjGr zB8+u*MvAc4`=%tB-rEP4&kB};U}Zphef+V`Nr)C~!3 zGEo&NgD|aBTQ9X);8KA{fwEQx(pZzy&W77CBKs})RAP%BbINgb+B{N3e05d8VXIyu zT4G6#dh;^NvLdJm={O=1iN^XOn@$ ztk+G;9uta$;5Ow&L>I1e7|s1$dV1=rBh(yoT_cfB9a-bvs^Go114_$TMD2~O*0NR2 zc0a*XTp>DE^7+B}=FqS@)tR3~SkNjDoMVD{R9KB7Gp(6~LUuQqd$`z^a9p6Ph-#c` zd5?mew*zOWM2|=CVQwie@5bC1LLl!}y0EoP?bRzqT#qX8mSd`6P*E>>nD9|nsk|hc zBI22h2voTcJEaS5rc;fF0_7CX3uQvCeetLolN^d;0+ob+RZ;L_T|84g|E7kkG1oZ6 zts$6qfGFrg`$LLc0F_c?bAB;;g8nut{hdQxRS@2$NHl_-$|^TY@tPIIYanBIsv9`p z?Z%WAH`f|joS0+!=nP54>G!(e-@<^**uQM76MJ56YA+i~Odc&rd<7cGu+KN_68>I8hqA@`@ zrcw^Ab4Qcbz{}qX^+;iEA6Urd)SU) zX@6EbmL#K;Do@Bm2uxOCwJ#{6@v5e?KHcQ4TwT3U8^NZeLqk&iCW}=lYnMZvjyIsp z27%1NMpr{=uhF9bfucQ@P9-(Q)6=I-Q%Xy}~$8mgV@&GapZ1Ez9wZNsjN9O!M*0@_c+}I?umb-gmz|zdwJn zE64K_&pLm$dj9}VUzp^ue11GLo##I+?^i#V&X1p#*T+w$_3_j4`uNGTK7LwWA3vGa z$4|?4$xkM`@%Z7MpMKhv<1^2__W85refKld zzH8Z^_{`)_e75XQeE!08o`12dS6`U)%CcYd`3uu|{>84n`}~E;-u-IX-u=q7KE7IB zA77c)$5+ee;5Vjo@S9!#?(;Vu|L*fQ%l0mlfA{&jWqbEKlfC=hvc3DA$=>~Ld7VEq zt@CHg>-?E%oj+S%=g&;{+Goq_{F!N;KU-es&rIw5+44I7!L-hQSYGEpnAZ7E%j^6n z(>k~8Z+~X;xBsy0Z~wvMZ~tN0-~NNi-~QvtuAlnH6OW(z$CKUr`Hv@_`}q&c{;MBM z_m3Zz?;k&y?jJua-#>nS;yDL@T8^vzWQwc(v>aFa$rM-nX*o~-=O>>1>gSVPf8x(4 z9)IG`C%gW{pHDpg#Gjw-o`XL>GwIbA%X-BW$N6bFj`Nc#j`P!U9Ooxf9Ovg3yY}wS zFFf|{&#!j#WPX0-iL3qmYI#1G-c9_p{BGhW)4PeE-z@LD-}Ec@=aPj>Tt@O>^htm+lyV9_g#V>NE@?b8>QxBvLQL42RZ-o-dp@3r_o%f0s7C%btv_&&>dj&UsSyFBMP zewNG~aiI9WG-hHy` zPyF`8<4?pmme&W5KM`_RULW6>)`#8tKH!Pz9JE{C2XZj2^Y3===U;g8kiUJgn}>|= z^VqvzzuLW@e`oT;eYfm~dw$}%*Z#0u7w6j#p1L^Se%P&x^BwjZ$2)qAW7RME{qql& zIOq4TcJrz6eJ(ky+E_SN^VcJnOp zeHMQr#Ql+?^{04TMcWybDSR0XQtD^0v#m7s6>ZZ zJLP7sX%dxb?hUs!N6S;yhA%d0ehRzhO^t{8!Fc6+W~=jp87LP;TIGT8{8Dvd z79P8>>HMdigKeZfyLF{d;R(f-!1UQ9tNFMjFySr)&0 zXq)IuXtKkp$a$26!1d>^AT$nWLOUZbJps@)eQkG9gFd}RfnZuVs-F|oqtjT)3oF^B zx`@t+7bSLdMzyn)jV~+A{xu3r$4~T0FZ0x#c9s=}nDA)3 zsEJbjSrhDCNb+W?p~ zrqG5IY>2!e!#W53A#F)#i1++FxJ0E0$|{GghHXDcuUVSdYt?Kk+NXX3i?xdTWHVbU2#Nw>Xqt0m+P4Mv83ieXgQVu!%Z~!1}DVMwVu$ zGr615d1QX4uJvAl8=ap=sU^#1OxbP*w=c2k2&wO+)Up<>A$d0{-I99%f_3RlheWpJ zYzDM08IIaZ5(RKa<>DlAfqNC3kON~|lGm8qWKuNtlWO|;uG(J8F3D*Uzgrf62^42+ zh~$)#vn;RRg>p_v2aR=3#IHc;TP;ZFDh%<#M#nuM)|sG-G+D*i9%!fcV9z8a`jkuO zA6#8*Oxy#)#l-*8cTlraYUdj_4c060_VR)P`^~({f}>vW6lSWEr)ulngh7v0<%ANpaWq z64n~z9mxqr;Tf{eJC`)v5K0Q%Sk`dmZG8-yUAD}PMO_%Ai}W1l({|l{*f)I4tpSN#7a+-Fr*(7u;=-*Mf_( zWyvQ-wj^tWY*@-FAJzFpJaPWZ}89iI! zIubha-;QldUIesc*tgr{+TK-(RUOzgY!eC8)a^9*+DzZFngqj%LlFX$*8s@-(*4&2Fzc70~%XR26P<9y#y($Z35IGR(>et1L05vQDLvZmDy_! zgH((_;bcQuKcp$Gq&t(Z2@3&_7?5*@`!ZPzGIL$WR9vXe!(i<*I+$14dj7AoKloUi z3CKD#-FhuBy(u~ab;IL9q@<}g7+FZII_ zO8-|5B59&c1oLe#w$%V_GG}&cNm7xX$~StQgLn!`2}^^v3B+TAqOGFvuSl(g_c^ki zP1$kgKLpSsbKN_MDUF$>Z}3)J1Ts&9Ylt_L)-4`r*IX#p*r4-WRU@S;rHIM0`lQrD z&57}?%00bix^64!Be5TtQ-nMM%o0;?RAxIutlaE2mbcvAc(&xy1#ulFBbbe63W6=^ zk&Q|#zq{D$^TPHVPmj(kGZ|yHcX~?x9iUqdy{WXp#ZQomcfq@&6wfHBQkbs9ZlZuz zruP1@n@Wk&mPhzzUZcE3`WzzWvJTkMFYp!_4o<4mONGHu3MEKG@)(!mOi@@XvOfxD zQ%26nuQa8-Y0}MXdqhf1^&<_oUP)Y~HQEhUr=R;g!Ym z7Hv_uYGk-a(C`wXz2V>@Qw^H*4G#Szw%F7j<7EmIGd;Qn8=`w?LlT`3-%C7kLM^l$ zwI@VgMkmTf-=a|HgH+7~=!CY{4B0rKj+9F$2B=FZ%%}=QbNs(iBWHuNVik3>K<<&g zofGGTvR!N1B)C1%2(G)+D+0w!k1pufo3veM z)EsboqRW{+O%ugSkw{|rFiO1r2t9PA%Tx0BlaF0JN`t03qv<|0UaIKsE0$z5! zatU$7C!(YfAax=zjm({INHg*Al1A^cD1cM9uX9e*C?Z~BlnX9>^W7iseJH$C(1}GM zfz}R0u|M%^i#ncNF45LRF2-@K%$Sy)WKHFWoW2X zvh<@qRHdvQS_SWE9+8_!RiKfF2g5`K^P%&yd$lE5mjl_D2^nBhxqv44M6v2Ll~FQW zbhe1<)Ks@-`ToGGB)!$&GP@p*=%!s|9)62V)qt!T>Oj!M{gC?WL$z&5yadALvgG{3O5+p-jDrnoJ`Bw;$vZjh=0ehHGFpr*V7zr!;;vu3WAcrSxVdQ3cB6zN zM8V*Uz;1Pl&eSnN&SY`H!Gv^^&E!3d3A_l$<}BbQOO@_OgUP}L6E+v?z-TrlqILsm zwS^@yHhC?9^kAFIQ@{m;PG4D&BjG7Q*-_+E&~$zFKIwEon=>|J^vxwE>CiDg#QO$V z5V1}1ZiliWOMN+0KE3sO=jdKS;@ph3y+k=0eo$^^?3Z-XBR?yo$F;_%VN<+2L$k?> z)+VoLPOIDQ)h;*HkjkpQjxaC{h>e#r&AbFzx(;-}485tW$EcJoYx2V}2u%SC71gQ# zY6Dr@CUeW6uZNfz-IlmUa7wa`0vt5dppEup7I8;Mw=QmwR^$u43cr9YxW!VwKe@HE zH-lRjR$u9~dq8H{;|fPl$7-X0lT6|T6wHETofy=y{Hubpqoki-yx_3IpWw?x**9MG zAID*xf_7P+dgtSneh`9n!RZ1DzlBaPfU#}vzjVfK(g$zBa<~JAiwylN#za1o9q)$U9Ax`Zw_TRf^?An5=A z>q67J{@Tb?5eNigWLScXfx5<^_Hxw!ly~JnijtYWdIF6P7*87M4ZcgV#xPl;Cb*=j zE`yL$MqEp|x~44$C$qs=A|uO1MkPFC+q^VC`-yqmN^d&rwIsKigu>+Hh2F3*!QH)Q z6+mmG$p^nJdSsU^KvfYmzbp}QVmWn9xU!k4K`3^KAiW4;a=76cFr3i1ioB+Ag+{wl zUFcyrx$p58zR63`IfFH9j+@4oJME$T2q-o{t=~zP)l(TfAP7_;ecsqa` z%*o>a`{ZmPH0x|-84{SIU(g~cB8FyrGr@7y8i7lH zrZ8BSA0fohMg$T~Bske{p&=t(b?=Qw15fu!gCr zl^@e-y=N+yV0O(f-CR4?h}*T>=wlDq9++yyTsiOc_tq|Pbpve=Y}IRYv)cEwu2*x| zx`D>X78RkRqqCDUl^*|%>bY#!j}}8ya2&7_C2})@k3;#~Hfs#FRC5e3!+;zxgXb|j zqhcBHF&mNBk+SG$r}A&j{LXEf-(FY%&KYB~@BGf` zn~l^Nm&$t37Jtv1s;2McfW#3jolCRiixkQC@<+I z?``LqA$M@_@gQpqHMt;oT@eK@(gC*VOM^Ks^Cn?o1}Hv;I%YgoQK-sPBzcNH)1$;V)C{;=GrsSh5N7I-7A+ZMnK zK)x=F0$hi1Af9t7ZH*2%^40MMRb&neErTskvv7>M10^-HYiS}dJO3hNw@YXtf6+AoR(UwYpy!#>Eidxg5d zBN$L|SvEdqBVy)8yI+*g*by5Y3|#VK@9o~p#4qH;$zxAOrpa33=3@>fXZ)Dtg82@JpYidFfdC8iE7qwY`QU4045`9*}D;h5_+0Q-^NqS>az6 zeGD$-AD#)9Yz!k};>PS%wd29GH_fwvnUpCgOl-VeBg(dyY2x&ngFGOd7P+!OM^M=2 zK;?m}0ATO7sXADPuhb%h(%FKFI{hNzn!}1ev)SltFxux2dUHk5P=ruPaY|hgjyyFe z!go^d&GmyAuC*141)!`mlm>Vpt%A(N5T#VHxyQqy!R<>dUECv)I5@&t6Vs<7mj;bn zPS_SkIyE!4Inc$D;B%C{D&%7>mF*)BVlEQyz~E=0wh*PK%3joFCVjz+N>sdX-;lkFyplKL9EKq_9 zxj%V@Hlx~>u}%c$e4g1Elug1;TBTX^T(eq>JczBi2}o-&I_D4f^BgxVQ+kSM&VAh0QOaVYzVe$;I1SS|i_DkxyBeqQ@bQw; zGQ~sK7$$;@&Qf0inRvprPc@v3W8ve2ycX>p3nc`x!~|PDNW;b$66;)`G70<$@MzS} z2-#GjKQyDX%|*$9yv^W@5*ri2fxKpDMrq9pLG2{d4~rbgJ`BVi6Z&;D_9$5EjG6)y zde`E-G@E^j%mK>dr?Hvk<=T^OMCFlEMq;x}R+g0dr<*+R3O$CxHV1K(yqNeq72_d$ zS1B5o{No60%YH@Q<@)q#8a$~}g~*`x)Us7?^KO15K+jv;ZFAt(nNGv#^e!{8P2LC5 zn`P)PBzeYPpM>? zrPx1}lft2e^oZ0$<s6F4TInW|IU5igGx`>xOl>+~S+m1xK89hiv4BgIgHTs3eRp_1soSb4<@8m@DvUQB~1*f{7F zfpMb|!!Q_GD5<8ES{EaQt=JXAl+BgBjz&PSF+`gMr`xbz9%f)ZNzKt}F7EfdC+v!W zJFz-k<|1U{?g0llJ9`gcw9a3i;=K&@EBD;B>_GX7aS#j)lz7Jvy{31V*oX7<>Q%`b z(n*l@ZjMMiBRZWTwijo*!qq%bwiz;I=9?J5t~(-I#E~Dk5J`b1a43pk_<};ERSrJ6 z7TGG0_8CNGTLdN3_8zv;G=T@V$V3pGBIp?wA3DF_Ho=_Hg?UYccj{O8XJzO^^lk|=y zM_X6)B3?gpk@W~R`+Vhy7`2L-a@yLx%NGsKF7aT7IiF74@IQ#gEhqcn!Zrs;JV(?t z>0fQAZf2|6r#Sglj1J}E;=e}eCSBU+HuN_Xa&Aq|*1DrbtU z|ANg>+zPL4Ua=`tFkP0aGgh^}g;1TpR#b*ByL$;H+x*PcGC!n}2QX4pIZBy^V*cAK zeS_{^L>zPNaAstaKa9mvUOc~7w_+aZy>Q$LII#BmoXh4dzWwkfcfg%;)?nKSUprf* z8?*A7C5KD;Mt2r?13bE&APY%O0*sOZ?^#kZ)bY<`A@4V;1k}FMSYl@_EDJ123Oa=s zEy~^>%$`KZBF&@o8M6!rAazx?FIR6!OVYu94&fq96SSpQ&I`-3^#`;knRY99<$Gp( z${Htz9LXwfd5I0PaQU4l=H@7qx z6mB>uv+HXST+gjV%cCi37C(fbX1MPpk#LEEPETO;$x+J2gk@J!~T z*e1P0cd|d;0kbh9l%kc&*N8_-+eW(JLH&pnF!PH7W(0CHWz%k3OJETOF8Pm9dKL77 zqaYg!mbJ*UJSuD*mZKbu;o#zd)KN7wLNeWnT?KB2cObP6$6ZgpB|B+!>RYlmARI8D z^X4sEN^@wqLE?Z5TqB}TwlBu^n4><}Uk+>!-Kex0^&XYAJvN)X z@5emC&6m!wL_qcgSyk4aGmVQr48sKrPB!#QOMVH!ndDSJ0;vt$8(NP5jl&%e>e|EZ z3Fs4{fw*Ae?Q%NOQ-z= z59!Qw&q)~NUh$p;`_UAG$UQd>d?(}T!stPn0FlN~V5T%r~m_32QauaxyRse zX-VCKRF)@0j;M=Z)*uKj251JPp)LId+}lNWbbgte913@mHyHTkzezW8N5TydekS^v zM()VyV{ynwqn@2hs&|FQu*9O7Pz)O<8B`A+xRMyJy-A;N>`Mov>b_SGz zF*v`1CjLBl{b%JT)6tk94F!S&r8wtN2|pqw6hK}S z=@!`*DqLRZm8rR;;X-mS1(ib7bD|z{o}XnHRMoUG)*NozRK@@uyh@q~{9D<3PemH- zk)nDmU_d>-57!R(p=LbvYL=ecp>Hp+3R#q9guKU(=E)gb2yPC~_Lzi9{2p{W{y^^;;MgOA)aWe zl%g^}RSrP)-Z#XW=tuxjC_{#d;uK-0SJ*iUmBH;63UW%WdVRSLNe{?Ftf)1D8p2h6 z@&jRhHQRZRUNaor$0#P_q0?jY>5~_i#c{csJUUeHkbqjB4lq1U(YaEQq{c>x{Bx2P zC2rp+tK@r6&!2uSmuS%#8%ps%Nm>6Nw8Yv9vPckE4sceNB1V00s-kb!qmKq}@8GFW zOT-*CA`Tzx>n&hANR!aah56NkV!^3Q3y*%mzw@f>ocrMeQuYT?r370aS0E-P<%FxA z_~U>7=O6$5$Dc)7<$?GYmc-@HfBxgo{^tuUk>Jw%{POwff0_aLB{0ahA$x?4$H=Z1 zSsc+8tpZY1=;?3`uLo@fp}p=en47`Nn)XA%)Ciq@#FXeHO?{;}^@M2HuSe8qmSjPZ zdE~@ecjVX+ZDNTS*L|KCsWa9_dON`Of25%-j=@@tvv(J(*t4;hIdgU&l* zk-b0zO6)A~OvLYAmArv2XsFa#25MTZ%RmF#i1)^HM9@~6vT()Z6>6DXDg2MDw|#H{ zyBI5mHmyW>ett&(6GZCz;Ocd@*}9?2O4Ht+c!|Z($WBybF1YP!>8XWU$M8&^@HiMf z38V9+v~il$n^rATebo?pGwFihP?8=SE>4ynh?*g~N}IoZT30HseWaLA)>BenXOOm| z+`720uW))VI#`=?zB76)c#X2AWz`;`4shsRUgE0eLFcFgOPw<1JwLAeMiO;hyBT3( z#E0Y=bx1Tfb?RR65I90y`||yp*9>A!j*;<}3uQh8 z+=pxQ3-&ESa^&VaC@BusM4(O(U!4!-m8t!2onBO;l&H45tND=!4=i2si) zdQHp!(cxcyc4P9k*xLL@aFr4hjyN@TjUP09GCf^awJKItTIu0-+pL{&F8g!EAg6Vmz#q% zAKnb9N^7ExL@J>;HvtudIUY6;4Jjj>&l+_z85&L(0`>(x~v|!QjYH!{i)eXD7|I(2atgkyAvaaST!Y`11Br-%IfbXWMgsRQx@RJ zSewZcia5eG;N8=Mt&A%6wO1a~gQILFgW47Y9~<(Psw9!OzP%aVYlun)ZNc-hMKVId!9$bT<>F;iaQ(I_S$#ARL67hDv3Nu-a8P=pJ!ows( z7TeUoG9#IYmr5ON#toZbluR2P8hwk|p``8E zK}ak_jWT%Q;EeXNU@HMe2iO9=-lRZTqSC$L3C@w5X4XoY$>KER;CaWBs;j)PA(Teh zAn^FrUSE?bxZ>*8owm(^O|UiJov7!+H~Hh_q9t3_J}KIiLrtc$oNL$Z=StS%YmM)qSnh zw^yx{Tb&I0t92MmokYGjs-j&OTZmqtuD`CaC9&E=Yylawr9y+KGKkk<$hkZUiVz~F z9$6x9E85LH0oKjl1lm&Rz276>fn+ww~*0{-drVUfA@=*qrc*=Yrd+k zE3N#~mUw!QO@xroGsqoIiY9)^Cj;#%+iDpd)I*Sok+u-0joiaF4ck?kNLxuU_I)eZ zt?pwzNz`at2-3`SOJ~)1s4gau)aM=X6hl4_QmG_sU5wpD^XT~8vJWQ<(K?KR6%9Wh zCu0&2H#;4ZqV+^@tEId|OUAHl!pTjRH?oY$cB-?zH}f*wOZM&!Y(qLz_S1XXY#zJ( zjpwjGS(WEAyF8z*%JYR?o-bDA`N}TOSF7@TW0&WfRe8R%%k$laJSkG}xg?>nY{(Gg zS1u7Slnn{wqsrro7w0!N)SV+n4`)M?*EB*FpMIjsW(ssiwIP?T@nHN@T>5r1tPROd zLWEScf=eVb-WIZ;R0E<3NFGh!1-aoVI;QSv<)v|R;9upNxz`p9xk|$Bie514R`WPM zWGk>p%&rns`Sn_EBkeGkZ$s$O915&#CDGt@arg<$giJGHdPXP|G@|D_6ho0Opo|Bx z>;K(KJXNIU?r;;L%?^F(ejFgQkWPAfd*4x56LPML(`HA7tU5Dp9(Romvx;t&mq=G>($6v(=czmJ=5pZ`G)fKei`5x-bEzu4 zp;a2lFIjKwO{GKrno2ooDp->ROwS*glyU;W_L9n1!q62Jg>Aos=9IQZv8jN{aZVj{ z$VxN{`%qZ|9lNScX%v1O_bIyd8QE@g7sEa`HFOc-r*3EFkHm^6>nqdn~AGF__} z#rV+I426IgWoi$*N~U%RCVfhZaIlEtthh37CN06(dTw7c z)QF(GkG;&X0kphw=d!uJh&V<)VqLfLLOIQ)g?H3v=v$1?shP#8i?)5q;y{S*qv1QC?6!`)B+7@!$iX4Q@VKV zP9Xsc6H~lQeNAl()B2=Yzl_4(f@r3BGdcBQYI#>wX?Nw5=AGMVEL+ZQFA+l~`}0aW zjA2VDNnIMRnP;?#QGwUY=)x^oBrz2&74)8=arf7kFy6Vn17__cYv*F`A)*&uW%Vt2 z^8@#<(QRR_$LGH5IvxCY*RN%2flX{xGp4u}RrWN1DP{U9psHL(Wh3P~Mv+)H&t!Z&&RV4l(Rz}jjNAr zZfrQT##9VTw+Je;tL&;!JzyBgVu@*0kl`vnY#MzWBH1?1{85Ih&@Jxsr>D=}|NB|q zG3fV)fB*aYmv2A5ef_^)|HoVLUr$f}_bMfAOD=D#bic3PE6Ub+rvAUIP^aIMVQs9L z;#bPZFb&X9b6@`1^yzE5bBASSl6oq_uGW7JGWskeAMV?cc(h!Yra42O^Ep{y7=Hk%}K5y?b~jhD_($}Q?IOqNL-1hbi_ zZx`HqjNqoE`>$M1Ru9{O=mSs1d zhUzUlw5p&I(Thf&5cj?{)JXfP>zL^Nt9RrXC^K*5Y2!Bw15P1YF|YLhUp;fJkV z+*$ybGn5V9Yd=UCs|9*?*c7cvMjsu1GjUD!2nj2B)k8{Gf+|)7iK(|7(vgw3jk*(~ z73n8x!Ox#p!GZ}0Mz1Z)gyB+~MYdFe^2jm_oIfPi5q zb#w&G7CK=Rpm_*_dKcO$L53w3L8iiUr#OA1pEMitwYv*dc}zWbXRHb{sLH-l`yFjG z8&z=If*0vGmVo+Y3)K^v56#2;MS`-ZswNM4A~F5OXo8y5b@v}%4UIe1lvUq4qu)G` z?^v^s1MaG>`M7T8)_bOI;-6b+KVpSH zG+}-0BSTB0*onk9)XcpC%(jUuv6)HS)y_)55T>uU?h+48lCjK`2Fg$3h0m)Wywm$L z*gP=(maClk>Ii5PSd!K>yj)~tz^+~;02wX^WJJl_SLD*e1+8osU5G1BslwvpqI9-q z6`R(p)@ZH{S?d;6`cF;ZdK>AeeD9HB(;aH}Db|erub#D9E^Y3uaUt8Bszow2!BJfk z?&HtXIZlhh&$rDV*lZy!m>ukKDlRGSl&LJ#WmYnbBR^P?54{%!jPd?OmK^p__4yj1 z*zBqTx_c3;u3@c9Shugy$VoyWi;us~Ze^r|hl;%YzpH>c;p2A^4=D|@aw|EDOw$Z$ z0_G5}-UZzr)HyfE)8g^%zb*GWF^;_rdoRWR1e} z56`nKtd8FzvJJDPS`lyAh0)TN%R>~YqFe6=pE1e?|C=UFW`UEHf>REq$?5)0ce)QQ zUOSFjpK%{srT|`@bDBrL@2mwE)btX^G<`7NOQz{h!-FHBr6&}>|v?4M2~_? zTU_}Fk@nn=KDV(@C#uSI(pxR1y!;khky0XQ{J_6Zr(pkPCrV4o-}Fe)JBtb1AqR^h zcl0zEzQ2(rcxYetCO@$Lz9)Y9^b`>LVoaeMq_O6!dVwjpl#*fI#WxjH)jNsDa}egb z#8vw&xpscf%|T68ZKZV2?vL-%!Wm7nb;bG}d=RECgprOe?55O>*vzBEuL7dYxixiSfoD_uj-2 zrOJ?M|2ss3WB(}7@%OBD%ikfjghIX8C1sOU8PitFOx}W;6=qDu4}Q0kE2};Yeoq{ z%FFM%!ZxzT9A!c^QV#_B)w2Ap1Z=L_dPYCGbcuAM^<8`;( z?c4W*jWp2FF=k5sc6UB_QRpm3zcnhNL9hI=fqd}yA9$u*9b-|z6|O=#AAR8s2qax9 z@-^J=;J~~UP!_9b=Q{b;QJ$prZ0BQ7*_()=nX>ZV zhhJ!K7r!jLM7+sZHn#uoE6OtN!K!RU=j+xXbU#BJ9;xV*Q_@Odd|++W-!UoN6CtVl zg&X99^cG}w2GM@7?Gx_i1~#K8%G^kr!L8d85X+C(4b&e)@o!V&+tj476AP>rpQ?mV zlU$KMzAH5!tAE!n)uT(hdr#j!JLmReDnob2vuj&d|?Lp9a3lP4q4im2Y`h z^+m8HdG(%TlJ9-g6_C{xnVLf2xES3XtoPxKsIR{(YYn&W zFZCoZ7oph-Wko`BO;ptorGaZMN%bHPi8D~|kVT#w`8JeD!#~vfNzL7+H_X=OYv+ey z4mtfxFKaV4u66^L)<|ZznS3lhBSpAx-WWTc3MT8ny<)pR>-0%vg*GrAQojCF8DW+$ z81pS_V$7H!v)_mVE*nwc#Z*7PCJFDb&q-RK{jDdPm#FeCr%1%;4EOZ>>C59nn}Oxb zEFOH-+?k;TiV*k-ZVv5Bc>R|(3ELT@Gl$z$IMuHYAy))kQ#32U!x-{-Hp^hEDOAGU z9d0Y(w55+$i>j3wBq}dyg3&C#B6xxa&M!86JJ&Hrxz5pB@@&liBMFu|D2? ztD4i2nDH!$lYaUBZMzL*S`-?~mKeA%Pz;|<6g{3LainpCV(hvKC6`n;!&(#WP2|Uj zPbfK@C1HvHeRS~z$9v+Ery0?AvrdLz0+L9CE>U_9dg69 z+cC+CCgT!AY(&1wKBhx?qc+W3Dct73wk52L(3Flc#*6BFMy1?!E$O;DwibP8h;4;< z!*)k+9$}RsTG%8dZ#;)%!)zstjDCCd`U{0LoHvUi-z-A?$KG%oNdvo8c3g{)0@O() zu^Z*TH|%!Osk~>H!0MV4p~o#+(&+NqRQho%?Hj%U)IXg-U`1G2;F3%Wxord@FUi;k|otyd*(PdnORokqDC9Sfg-|#+Zx!0Xxd3beHOU(Mp|L*VQq*NCGdgAvA3ZM zv!iwW9iOCXjcP+E>9}}BzJSkmaFbN+VQq+&oHp~&-I$M^DZ?-}&}&VAM*|HE@zQXs z?R-j<+c7Q5#knb%MP)^t6nQ+wMZ}x=`Z~&Gpf?sEt(>eL)P_ii??oB<2c`AC1AA#J z^_wBx;P^HKtxy+MZReV1Mj?A+ZzLdG=pL17)T!Sp3YEO4iF}xi*v(cl-W_Obfs_xN zqG~OdFZ~g|f|oMQRHI(Bjow_s*(1*q`5*YdKULrLf8llf<(BOZ?@w&lB^Bh*HaYgzil2xvMuXA=4Vyj{h(j_yEe;ak z13;DHC~2a`Ec86QSF;%20EgZKxb|Xqxkkxyp{phEIEdFrhEy3n7s?qVnLt_? zW#*nvMYQeX8gk`AIfo`Q%y#h{XYsX#)uO?S;K7??=r_%>@xp_1tD6Px(1kO2r(h?p z3glZMYZZ6UA6Mtyy{veqsf5qX^EDxDbswILQF#R{S9N=ze5^qqye z{prSTl~5hsA8omvnzmx|xDgPagv-BB{lb7+`^WKwfj{D`6QiX-SXYak48~a9y0>g3L|hS2eERM#EPGwQIXs|FUEx z^SsN>UC$erhz=AeiGwll}muy?VwYel4@kF1k|RF92b<- zzu3N*dM2!-SqGM0ddy(Vx;S)hYy+oFkp)nKF>#0B2i`p3C|=aXm(uFgJ4n^m?0`12 zc!1f=Em_AEi(pg?^f1n6YKaH=5d)M@^rF3LyD}jP zc%y~ur_GO%9^dbynthb{@mcNIMjQj<#}GbqF;~}4yDPNEt1mxt z_i~eXx|lIm;n0f~j>Uf!euO?0!_si5MhF&BOb_g8&1HyH8Z}oh#pH}s2}MP4#BmRk z=0q6PZxG}Ml_y{=`hqZ)4ujrjUoh~bPwk&dDf- z!NecvC~ftVTzaxg+v;h#W#(`rBL-!!>9xKVohj#oVSC5nTOek#yKP6l>l8m=%;wwzXTZKt>%HzzGs17WETZ^CT$MH7@vh6#g6GB zMlp3YVTuJ-H(6nT8VeAUUT=52FZn=VbNQRZIAOe9V7$VBVxz*39TrOuMNUBNhZHFd zvsD(REZz!_6N=!=lU)oV!NW2d;?Pqj4V)F_yG4hCd0M-29vylc*gzqR>a@HnI&y~S z31Qg~1`7gMq}p4gpfZsqYEj|Pu2Jz|E2oV+xk%CZL4?)j3?j^+oWOrfP|6OMZ`s zb{_V`1ZDCV^=_y{C1nwMr7^$*4`x;WU~c=Ofdy0g&>+PF0mmcKg{s_$2h(p3_QV9$ z(5*^@u>UrNS5DP?1aq4m9!X?zh~n02Kcnf33g|d~n#OD9WmF#1&W1E#eaESBK(aHb zoSwKa%L;Z}-rX2UR!IF0y)>$Rs;t0z&wOcIy+m1H>E229j-W0Q`yi*D-fOxg)^=3S zjR9d6YS`3Ilo=J>{I&$tpvQtGIQXj8M0Lz=G(umlb=14r2EBBsnv#Wf*)T00DCky7 znI?@htI`!}^X@t{IImtpwH#&jUNyhHSoVtscQr@*p!_D~)t zHL@~CH_ZHB{_~Gt{{72PJ2|Z&yCR~|TNrJQhZ!{2EiF%*LYdEjV|uiPvSdK6%6LX1Z|YP1@h&P*>XR_CmbS?-xW zibBv*?~E5DFE7#+4M*#0r~PH?#MMbjfzkKt zAj{CKRan#PWnL4L0c4F3@6+p`!ETe|1XVj0{%(hB4O;EQ6IMT|!?gm_Jnw|zG>OS5 zUS)Glwf-iUgbvqgooYv(FrXSGnH6drc*0;Bv}E9eZE~ETP~TX4kWp{brfs1IKNY2Awvfopk)x(V zjXaGJ461T}E#gF26q^**P7uT`J~+i-)gd|4xRmeCGc^fd>iX1%IzWpB4i1ADJ|cqA zD2l`*LRv)V`tfG6$L-q%%hqjrRP-*gLs{k&^4lQ2A4o2IY6BoG8^KVQdLolfA{L6i zs#b;YcwQae_5OvD;8(E4DVfeQu`$%jAEsJh*-S~&b&|wXHn^bMbFm60Ln{UfH(0cw zG+zL0iC1pUFmZ0cQ)oUa;2BRjkg_T#s=b+3Gv8S7bu?Dl?O~!^3;E&iZBKJG8+(h> zXo#jDCYCiCI9z++@E}2%++K~JN+}1`;|gw4F$p~zwm#0rvv-bTY?$iBv#Rr8SqA;& zNdQJD@u7(?Fysd{!Wn(kqul+$jiO6|m3!QlIAi0b`p}f=^4r`T*R%)MKg`07nL_(* z_In61Vxc+N_Q9WBZR#Iqy&o zxR@-(Zaz&fM_OJ>fth=1(qy%VUHz4O8Wh;LKlq5(T&QY|`nk~!N$)alB^so|h6Kki z`s_728tKz4gXEYu^e8PpL_fT+IH1mpQjpXh=Py-N-i1F%h!G1SDjqtcD=cbg96FgI zi5#KV49&S}wjFU7_VxNPi#i+Xqx&yr&BGVjxI6g~rq1A=A4l($G_h&`a1}>U9;Y&&3D;2HTMR`KVm3w>9Kl#ifl}(I$^)m-6qJ6 zjrJF+%)Pi^OUEp)*%nTN1~Y=HWenm3=`|srkNL=GIr2_Lhz$#Gwq>~h_Oon!s%9Y9 zxJWAxm08$56xg^&I4M3wxH~sTTfHN|=kEDKG`Gkx;xZE&nAf80^~1<1cRp9C>+HGS zbf%=}R)SGdHR~_rw+$0wlzoPc%m0u=nP%#{jGUrWD8eNkO%B;ry81L5znSM!Q)B3f zh$q(mJR9Gr$vQ`HWT@w=j0NeTz{ox7Yeml@Rl(b&z{h=@u=VOJZD6iG%Eu#&ADxSM zQl-ZC%v-Tu1&gni}h;t(Seu42~4U1k<@KM^(z>H#X$)m(U{ z-luMQWk%3Pf|Y+M>qm^2-{#<0W#qg?@dxXpdN=#0Lx+v|x|hbHCIigZ>98@6G4_eG zzarz(Pb8VI(_vxWPpN#Aaue||qU+2ZG~CmZ%?0ixM*=-&hZm_RF&> zHlMf#s7;3(2G#T=X@E>Y|1)o!={ksBD$G!l*rQ4dZjCaZ6<{{==oCU~nsYhvlu*?~ zPHZ;_@BzW?C$Fo%JV_^zm4xl#a5y!Pew7U26tN4ENaWBby z5B-&Pc*;Zi8Ch7wS5^!^G~dC#qs~ouRBL^?^;>rSQ%d~J1H>k^*N#U@Bn&!e7>3&s z2Hm=0xUR9|J8BxV(1QHBQ_{mPoFqnW4X${8P9d+XggJ>HZYkvFfR^%-;0+>mREi;8 z;vzq%%&Il^V;=f(J~&a+Gc;cEy*E6&IEO-;lWlH(EvGcmlH|q$D|$e7d|>OrP40)9om;FrxaR>J=Yt>ho~#NS77w0e ze9T#LUgjbm;(;IS3Ejv_jCWYuKKlG9!{CCufga>&^%%)U6x-ZmT+W-5xLJmy@{my( z2)U>+5>1gPhRQLt*k1KeF?a3P^2#s06s2txAnh{;+gWdliVgE2hPt7kcR<^q&xjJ6 zK7-n0VmLMdIg9N?;7zdJZ^WXRN-09zCQS5QI(-4wY~V4J<`h0LEs?Vt3XsL&I75)Onz8pp{lBoZbsE@q!EYs;s&ddo~QaU*c<)CIq}&x=y2_V zlSa8*vAa9ot0Fn40tI)Z;XNc75&eOX71=X7o&HtCISy#r*)G``3f3)0*WR|Jsn(bL zS`_PWiwQ=&`gTcW1=d3GAuKJW$i4kO}s7mXGUD*U2qZ+AeVGL1ID zt<`7^1^v+Gp?auTj<)luoplc@vU##|7c#~unGmJLRPTm3hKhb{6Uqp?WMwd6A>!h6 zMr7cE=O?5CWp7ArhG|OG9bx$jPd_m0SZ}byCxaw_y-joV=#?a7Ai4^8N4;Og9;1|y zgz2B%_W(|mnIgL)9dmfo2NB#f^k1P8!^*tu;DU7NbE1QR3x2>o%v9qb=agVzvX34@ zRA8dZP|1C?FO7?0^!`mRxM&L&AQD8o zhbr(c$oE9MRCQS*x#2k(K_cbb_|zkW(fzJY{F;oGvc)MQ6DOz-a8S*6=xG@N6<#4& zr=K>;ZNdUDk42<17C2YdLaBi&$p}EOg}cjla{Ht!7oQV{@PUoY#ayenZ@TGp}6KK04eeV94xn zW!?4;nU``{`lv}FqK8zITuLQj+W>13<;JJ9!knev*^N#s?t-^;uS-h=4Lt^%osNu# zQyA|N9x=0d;{6|Z^=I_+OKW9hXb-uazA)DmkO{+b@P0l?A z*}!2DGsL4**%8_%aipI7f$J*Nq|9*DldevV8T5mUckE> z20COYr;B~mm=U2txr-CwP)m+8iiks_bnV0-P9racS+#e~(CJvt11bSlw7AifS&eq# zw8fNLvjKwQxb(@*=*hJVWR)LkC21&%Bim%Fb(XD0l^r1}M}j@NA>m-tm--FPfdkd6 z3{mAqn7DZ9RDDD6o+P)|8f2I;R3=G`|B8eN?^o1$UWA!fH2Aqkgo|Du>BW{_kg4z_ z(nYkAc!sIUBcv>49|fCfyy7MPM!*63)`nOky8*^c?wEZj>x8*+Vm2(|EA?1TR_v*_ z^@-9|ZTy4MjOn#7U6ozXUf>(?1?-)iUTWNk)cXLMXQ`Uv@)eJguf(=YG)$8jU5rx*#TsQk1a)4J zOS@GTdYGgrwkim=Ex-<45tPbeX-m5eye>fzT>4nG50RT_W*hmSZC0(1qzpEj z?VyrWH(9raX*S{%!Df|-*VOF}|85CKNn_cl;!w3yMP{)yhRP%g7X&jL8;{sH>9s<1Hg;ysyIz^<6H6HJ9 zox)?DsgPB+mND0+{BVEPbhd^|ZiywnM@^;G^-|7?)~RqK&>Mwn*G^RLEC-@Rh#3ds zTUB7F3Sx-C8K5VD%Di)Xp&MKnw^_?YQh*wy*s$!8&f%cGfKq($l!Ph+n?JWr59Cq$ ztSA98PcEua00PM{nzfz}Fqx-srt^bAwEk^1XCj*ExbYvTFhu{za;xojUHxb60#hSF8rwX zq3U#I(reXEm>FGp@tc?b>;-6Tnqu`7nCa+*6M=Qa=4Y z$aQ}vK4j%5cl$wVe1I(frng2l0!;+aATOgxd z`X{@dy(9&oozZEPdaR>hHoj87ReS7mr=ImK;tk?*a50gEUiobPTM^MgA-kXkYcFL1 zpwaxr%0uT;)e^}8V+_`s9(!DE&k{&~c3(~Mf);#@Uj zyq7P3xBsu6(l$zt4;uP}9b5#SX|N5o`d#7cO}Qd=$jKmCz8rHw@bQ18Ekv;tSXCGy z@9Z-NRmw|j%Te0x2S~GFtJ=fBxVoxeG$!FSdJF0J1YZ1A(`nK5o6XJka(E22ptcB0;37aP zr=qo;zbU9nvLcx9B8#LJgQF+d+Un5bZ<7=wARHiwxMAohy7gmTSCN&M z$7-I){l+<{18zBgymAVW4@-SAj=>3C{Lwt470kAQ%jJqN$v|Pnrg9>TznZz{Moyqk zYXpyU&|&3%Uo456JZ&ZuEeCZ6z?_U687gi_4)ntbY7V2DNso@Def=hIhh0_aQiq#O zVK+uZb2kfH61kih)D2Whdw9kT(gUH7f$5_ssA6(3PXRZf<*1a~w%u!qI5 zf5Rvq9ShMxdi~l-5<~FoT`s$1A1BA*a&!G zTpS$D3BB*&g6bq_WgQ*a=I*5;bPiNH?t(U&!J zqBswZW+YSJVQWw1jvKaIHl0uHy8Am%YA4M~P9$~^D!1vZySVTq+d(&u13)}G9~xok>E z?T6>9N*Ls0(LJkv|Dk)w@)L2&wZp$bT?TMiP%EK6$Kd{P3m=(}o@H?B6U}y6(zBpz zjC6gO$B>li3f19vW5G2ZZK+#Fk;i_N#vvw4QqK}yvr~HqSP?^<<%G{?Okl^o`BzeE zo%&hMP1yQAa)S#2+$a`6gD3OCLM1XZwB}K*&H%F;ZzNmiRSl|oRC)Dry0x%w+;Shm zL^p5Z8w<$xiNG|D2sw*tPTa#EYB!kPUWB=x80Q?(xR+|cdoFK}plOg>htuta^@BQh z;e{0Dp+`=SaQ}du7BVStL?Y8BbW{p|ZTTM4+3aO?V+BJqV%1fXQWG9kN)?A23nz0f zt7>Yxj&=1csJ|_+0Zhip!=FlBKDS=oz<<;zST>V22{lT>B6{nw36F5%WV4wQkPu}v z(ZjcS6>@MDgV&Omy$ogJT(_vp0senbv5xw+Dp^N|<8 z-aD;v(q(`jb{@aM)zrn^TiT&IU3OHRE1CZT_b_!=Q=JCZB@@j!N2V|$kKXpRx*zO1 z2LgC)xqRSV5>=tHT$5)lZilWQwj@qb=e8;fZV|SUt|T^d&!wJFW}M4CkoI#SfV=E+ zPzrY=h3yg+Mb|IT&9U~g!H@jlAh9Yq;+l>wtj7$Edfj@wVma>Nf{yxVuIkykboY_) zH_8&b49a>*#QxkO)D}zh63|bP8`vp~_ec*|-2|t7skwDwYtrRLWzR1%w(6mP!jbBn zNxbFSI{la#qtA_1IeygHrFwY74prH(xT+$g=DXh6*&`i0qIj$db}W}cd!0LXx+Uyz ziv)Fy7dN8%`Rt5P>S25J9^!x-X?DHrX>dI?R(NAHN4K_blP))^_XPI~nD~z%u>l`a z-xH;M714^Y($e$h21DHV9|rdTBjR|e(rLMkTDr;|w8REG)=NN9Hl#1=Vjz0Y7Jui^ zam9~*(%cBIae*4A(tV*>6%lRTL+q)xFUuG9=HYXTv@}#Q#k`ZztQf85+eT<83IkJq z)OPEp$Z)G#%i+_t)*G*%Au5Jy(}m(gQDiv=f8+rivEZ>%mX~tIESum@>iHER zX_sbb;Xk^j0<%NVLGHoouawAcFg%w0$0oW1G6VK8`A{~Iu1bZxUl#l#t{7#4Zcx~5 zDf|%}-@&`loyd6k2Rzl%IE2O+Y=5!jZ@k&C|eBGg2u7tPDJ%id(hrz|$FY zEQnMtii5i(e0T^tI~+oc`H6D($8rnZzE76KO@36FWpt3?Tt>2?TSSQX{skq=$2p&5 z{e5w=`N}I?o9U|7AjpX0h+bMM=jVcqqhKF|RG9NnX59AV#b#T^BBQiIpE7n4hPDBi zl_?7C^)J7>JNW&y7{Nq%xz*+t&q4VaS@$I30x?KEAC6*>rq{w2#?+s|53dwZwL?># zT}pM_yE&}nAMt)G$i2kn@R@{@d!RFdZOuXbXE4vV+2NLleulwusWQ5{H<!7;Hj zyKIzARx~S_6A)LKq-GmIA>%4Xr)HCf9lZODQH{D6Vzp%g1MIME!~&ZHS0Uu@poxx8 zBUcqO+G}0`yPJyDwyyBPH2z7PFyem?Fh5JD)@f%z9fhX?Id;o6-(F^V#`sy_mD#Q~ zCMDRBs`X5U>HZ~iqpa9v77D`5VTeS$B0}yfb&kW}EsR+@yYFg=ViR3lE+lgoD`jPW zVO{^~0TWpccyFD?kBk(sC2$YH{DTX+-OvHzQ`ZX>^?X;CNR@!GwJfG_#V!%_MtZ0E z6dDDDJn$3`<3R+A5u%QRo*OB~hlg)u6X4G`l*uf<*rj5htQ`;T1w>LkTABDeZ5V36 zfpb<3QR1CdcysqG;!jRW$1qN)fl>Li_h3?*!yliN0<^+(siTyqGtG)LbS_9Wp{$V) zYCop;T%KOZ9#IMy-U1=HH|SN(!{gg@H3x->H$Guuc!rLjQ}ZSJ)GY$Nml7WkQ(H22 zVJY!#b9Gt85x-ytU1A-rR6Y=bgp`yeJNpOf zI+nZHn)03L*MoQ|bAs{-53bIFfOu@MvtG!sTp3o#^SDLw&Vo+Q+c@&q{ph`W8sHQO}CZ|lt=BlcVJ0CiwDotZdNG=!mM{p?`)htc9 ztSU}kxV@$@B_t2ym(de*i~y#M(0_V*dLp|`lLDv(9_$XzYD|gT-1N+4kWWt6$i<_r zjnWzae>wi{d2N1TA3hGf1ljOlHWr2Nt7wsNy_O?tYkL`|*$vTR24mx1Ius@cq)CSl zgwDb9!nin4o|m1_XE$N>Om@HQ29qb);c=66220%5ywKy5dOpC;A*-$K+BHdr!a4@o6{)Py?rPBeihQk%mN3UHA-s~QnpC_PG&=n)SCy_+x3agn zQ#&JoA=-i%%jT*pbL$s@Y!c^2Ng1mL^E83ffiT3Av{27`vwi~<8G(7}HK7C)v_8aG zbb3Nwu9xkz+1$k&U*~3>TttfYQd_hYSNciXrexJ1D1~PE8q5d6hyiCIl6y**OwdJ& zdP%WEDZ`~GgIzabroA^tj&}{MO`08>a%zwwfemC+6`ftreGJ?%Eb)C5=$x1N82O z1tmyYKj$HCDVC{9wYqF^i-4XRtq`oUhadE2@Hd|~R&4CeB!qcpCs+WCw}|z=|#|#7k>GEkvuQH@Shi7UIq2{%PYJ7ewDNjU-|9BS4sW-%CEm)CH40! zzy5xcyuW?pzrTHx^v}NW`)A)I{j+cU{@J(Bg7)m&XLft`P4Ybc#(y5aNba{6{{8kM zx!+#+_uGr)etY5HZ!ePj?S+58y-4o27lHjId4GH1zrTH#^dG+S`w!nG{on8W{_m@# z{e9)Pzps+^_m$uNzDnBPSAP5ZDrtXT`R(tkr2T#6x4*BF_V<Muk7dBi(tOS7kr%i{`T@Dc)sD|{QL@@Z!b^m=iAGZ;Q5A+ z^UGK8e0zCfKi^)S1kX2ooL|0z=iAE@`}y|rBzV5zM{l+1^D;m?P8 z`6PK>eBwVZB=dJ(`15yOB=dLhasK@#>7ViE@4S4LyuW?szrTH!yuW?szrTH!v=5*8 z?So`~)C+%p)XQf{fATZGefTWt?|f#DpS^sR^mjh<`#WDG{hcrT{>~Rk`}>98{(h0P zzhC(6?-xn?`-R{BO6DWJ@aH4Ge3jg9U-|djSIPbMm4Cl|mE3P%`S;sb$^G_~f4@oQ zpS|$spS^sO^mo4T`#awx??d1C<7eL_<7eOa<7eL_{mF0q{^U1FfASl@KPj2-`NE&? z`68L`iI20#OC<9>U-FZ{PXvZ{H>FZ{PXPx9^hox9|M-H_3e37yf+O7s-5D ze4PC}mdu}g;m@CZk<6dO$GPSET{3?XALr*+(4Kwg&!7DMBxuj@aeny<#-qOT=TCl@ z%s0Zv+2#8z=udv<&o}!1Ea*?-|cV9v&&a9{`;Lj{`*}r{)>e^j6^uu{^4ABvO4bM9!hq_6z_NMD}??{D}xzkCJnZ?F9QNM9xEaqw|=`F@hL z51-iY7q6cr?ZYR2`|w#XUj6!+J-+iQnO}{Mv+J*9e)TJVe)X$lel{b})WetnSi&-nAfUnTRw@o{$fO6G&V^5=uUO6G&(<5jH^XsqVeV)G`^sD517Cz1{-|v$C*>`UL?CX>;rwAU%qnwB>3fy_kDd5jQ7#U+2t!3?*qTw@jiS~?md7$ z&M#j%e-iw1$NTU}Ie(Hq&M#ld^MXCz2N6h~7wqvf@GE&8PlES( z`Z)W36TH8HU+#DxJ}J51*za%PS8~6x-`~Km1&Pwf34zCM4Jdq1X+bDwX|lJ_@!oS$DofAX3C{`M?+f5XSw>}kS2AAx%pb3QmW)^9C#_&B#de3Q&C!N>Xe6})eL|j`AP=I`&VTo#+@X&*zKl;57yQZZ z!2uNVwD5oV&p&?o_bwfh~Ie#7ea{KGwJ_+{Aq>ppU z_lscvzHj(AKfiME2k~?Ue@AehFyzbc?+DHl2EY9Nj$l0`_~pL8`Dq%bju#*N%rUn- z=indx=-{W0dw6#v&p$Z%IrZJ#Nzyp?y*!AcPs+tT2C4tyh9Mywqs@#Fs_KM6mM>qc$&f55Mg)nU1{9ugydul7OnLBFd-TUT z200}ar@7D(7#M$5y5+}Q6 zxqop^VZ3)kC*J>o^T#oJ(ndEK;o5lVWZH~qwSgp6MR<2<1bBkEvZh#3;^*INJUA4= zDRTTD?j>2Hk#hj`l4eBs!zrS(?}q36iYR!L#pz=?O~+s*hkUY%@qFN9=OV|uL}aaS z>R;eMnmxT-$J_SUK6hA~pZPgGdStufZ7$dlpYT+I<2pLQM+DuA@}wMh9~ZfE#cK+T zRvx_j&H;{)m&fT9{w^HJE1mDlMKNJ_tYK_B>EOXCB~K^v^N%=vBO#`4h8HO>FVYnU z8i#3*$61Vf7l4? z5P3eNe&nZc*{m^ssGG}a1#`?2qVv!^*W((F=lT`^E2v! z%hNa~Y>3Z(7*g=&;3RIA!S_8l-r0>#KI@WdD!7+8`yvY>1Zj7}gqgAJgZSd-Y2c~w zIX0!ACTWndI`xD2hKMs`R1X!Ib3oc1Zh#5dA9^ua^-|I`K!YfU$#dgWd4!+WlCw1V@1voI$1QrOb@(;zsU?E=o?Ep4=$- zbGtp&PnsEDlKP38`cC4|*pq!$|*#$L+I=swO@WebB0XL%00kB4MDQ`m!U`Ds4G zhTPzR4>4>?`82Fei-X5!z_T04Dbm>ytcMDS zSoDi{VHF5Cph&idJ3U^d<0wz#kpCR*qoQQc_XnCh8%lku9k1laskpt(im`WBtag5` zQe#Sut-|@vDRx6v9cc5gW8;!fZWkm2WO0NmxZ|4Jx8okk=yPS4w5?$&`nItMrt-px zKJ@7+XMx%%vyz1FilnOUdDzt$dWK!gA*Z~?6DJ}aj7M=(Qb33JPMGr0+(Aob@vsH> zAfjXnsdSYQ#1&yam~~B7-fJTXXc&#LlF`{1UO=< zz}pgK4|zt6s3Ua4;7=Wyt6W07?!)Y#gT#rC@a}PiNiKY#@v&VH%^=MPILnc)NNafr zP62-Hcz&Ae8#aQGa09K0eSUH-@qSg>Ro8w8(R})h;9+u2zCswEfb|e$IH9g|J53wU zmLJF)RqLK1rbsD}xa+C(*cA_%)6aQ|C9dUDQfje-bF36zh=c|$!N|R=2!F1T&lpGY zl1Tl3707>aygUsZH-u>Xkk49-90VOb(Q@eHM^p;9HPyEg>4Ag9dgTHJD;&U8DlyKK zpgbMVf@m`%i65s3 z1$=Y=NAA#b6&*Mkwg{4d@$Qb(82&MiB%Hr@u^X4^{B0qnAV*m0k;OEDK|wi1#bpnF z1)eFQ-S0tMkZ%HaCL=BKV0_fef=720n>CB<+J6(`+XCI#hX9gnWsHG^g9MJS?kQHMG6`$=yd z%NxitySOL<^4#=3ZiAIi#fBi}iU<;BFY!CBr+feG!p1R%%4Yb}Bm8hmA&n162&Zc% zjEu1arvfYPya#DsP=G>h5N8jYeyHB7=#hqMTyb^H{SyUdbge+JCd;O6iR%0yYJsN_ zc4ir6`HtkO0NLK~zH!>+k5$MLL~Ga+k&?00Ht6#RHPUq{&1X+UN>n%ZxT-XpI}sTn zR{E$~G>6lCB<0{b-21O*Lob5-|q`A!TNywyu+Z&yDIjzn7t`n3(v-}R)ePOVg zWAhqzEg;MoD0YLlSM_qD@+wTF-v*F|NV6eCGZ4fXVl=)`O$U}kYP*z!9(ao)8xj?4 zR4z0bVC1=Mn{?kto)KI0rk<*(yax9NdacxM)A9wIu&wZhI6#&US?nHEB3gk^0e)%J z=#Zk|cui@@WOY5|pU03%Kh7hTAl($82Etjs!^jJ6#DE;T}&{J$Y6hT0CwXuja$ zzNRd0#_Aw^)FR7>iGuNtiy%F2-MM#m{)qR>H`EMJJ#J{kT%9-sInm{-PZTO z|4`|x>KE1vc!c}xdKMX_g#Zqf5tiv<0s*7)+dHaQ93aOCNtIGOV6?|nTFmE+T{fou zk2*_B-wRJh8|-~6gdrBVvFeWSI!;<72LuB9uG~myMP#*Dan@Qf?z$D2WefYz_`OA|^3*=|f7Xhs!O6l(^m-yc+nRbivd4@wTNQ-`1&{ zOQjoQWV!XAYJKVG-Qt*ZOTQpTW`3(dSobi@Elr)h}91Z;|$Sac^=V zi&*E3DY(dGiKt8Ta)oFgC8egdO9Xpi_pq`V_6NYsj@1_WJGdNdh_6nT9aA17T}HJi zqP$yMpNN82%F)ZN5i0)U^?fR4>+u}6_+;Xz$ki_IWo3xW*;AzuSzVlj)t_^}j+KOW zmnDqIivfo*a?(P^D!>VlEm1yrcGTb&FE5p+W}kTkaM&iZx<{NX@C)I%QHKY*j1`gT zq=RRT@WZ__-pq!Nq*Bfc_`A21f+O}ib)ti8of0L_NhXdn3iW>e~{21*K^9>Y|#CpqL{#P^%>Jm`%<#wF*=P23e6M5Vk&f zR6XhzZbxU|uHtwDN$P4UC;L)-LhJ)|+vsPrSMN_==mwX1f$v@AH-k@kshKkH$2%pA zwoT#h-co|?HD~S}Pl-wLYIC}U??|Pjrh#Mp;EFrc`7cPJa2IKA?Vtbc;A5O&~i~Y;%#)7)O}k#!DHv zD8@m<0ac1kQH`s9IlwX>eKiT@&lsH{5MrYgR;u`e<8PAHmaF}g_W~`9bsRFv3*C<( z1d@=6NFcHXqi$YQM6)aq$DBf&9jpiKr_mvHwe%!EN-w4%oRlo2dP1R&f4L^K1FUwI z-0osfPiKN3zq*9w*MxKTcL7#Z*b$(83;b1TfVksKguw|XVuV*_PIXzdN7|UDR~@p zFS@o^eDwaoOS6h&U~gpZrF?&b@X*}ij0*$f&X_8xRqQ^F4EatMIl*lrEo*9_V>WyP z=LHIe?!9WZ2zr^T)TDC9Fb#`ex>XwrxRQG*35N(qBKDYG=@N^^=$M2@mskk4yy}+r zkBsph_VH{MrDR3MA1|N*t~;p7g*)gW%(GWrA<=D*stT;AI5R1x?%FxrNl8f0O-6`B zpP&JGNU47cFdr9>=*mlBd%8cDnXu(pILeQW@{n;HK*>fso7=jkSH~QEv>$a791{el~4b+gRuxx;T?XIa!$- zCfzN42ZNbP1Alh2vwoMQXmvzQ%I%%m^gO4=A0ni6uCM5fNk zFoiEUsnnIJ)#-VwT&0dgZt)~2jf0!mgg^>lyW8H%C2(pe8 z22UoYvvCl4Av%Sq3LB3`bEb)B(+2M$H7?#CSh_l+Z_7YksQ{~`Yj~HFZh4I-habZ+ zk*b02W_b2Dd651O&&T`@ih!2d+_Zo9(AxD}Zz<8PDAAuv`NeCy7|xEwmzvp?;4LmU zlNdEpa$qN8?4Falh&p&-JYq!p1E|_CbKA;CZ`a0y4rKOVTBU?_o71f%_nOB}A-#Mjmk(hSM=Ju^} zq7foMe{WR(#SVJam&cF_(yWUA*j&@HV^x_DZ+n>R)-rb&DcSy>7R5j(mgT#XS#T5i zeF#}Ttk8I+GjU1er7@8aM)W8$RwIvXnmwg*;QoU59?pKiRa1u;ccfv8tia+38TK@w zny`(PGutZzvpG4WwEk=+AhDc8kj5HH@%|Lp8fL>W+?V#Khn3!+ zC@5U+&+ffXWXDdR%L-CGZ;_$WJu~V4@7mJtQp1#EAdpB@IvfdLFW^K*66o2WhI+$R zr{s*lPodktF|&HIXRX61j#CdgGkn@mC$wuwW*KMvQmXsnx>-Nhv&n>udnu7yT=3&I z^DOmDGV))k9DK#f&q3Qyn;#?9m{;1pT&w3`Ytj_JR1e%$;FN(^W8dzwqK$Ck1g`ky zQo&Zd=zAF1x()SuoCki)Hq*rDrv|=_n)j0CM`#{9E5UBKn*FpTFsd`!L=GtbB=AtC zol>LbaP>WUj_qo+Ri|lVJ)H34SI-eiywTZXsR`h)hmCEcQZ1sM*wXezx7n$9$BMP{2yq$PvGS?Ynaih z|6#RHEvu}eqS=+D8_*Tc9ZeF%vy?e@2|c1ml*qhLGFQ4YA`#xZv4AuIbfX?CcZBU~a0Xc2w5IOYzhpvv)Jh4JWX6LY6+ zNrik8C+zrf#`|fK2B?%pZ(}VITG#I$!6Brdxn~BkSFHz-b}nQ|cpe0tv^5+8G6PvTbM8m33R&J&_|;2~htkveqi&T6a{y<70e5 zPdX1z*B6Kb&0FxhcU|baA}ZFl(}Ug_$ze8M(o#8wagvaz@IMr`Fy074n-n5Hq!5rc z;Ow1W=gMg=r;L(2!a$!Po=%n6eVk8f0t1l|0?h_iz}X&UR5H!?!BS6oYHnb%3wyIhW7FeyR4eEuZTBvceGsy z`BF@XCdRPipk&|470ZrOfsc z7Dpq}Kr5-t|K&gb_~qZf{H9m+cWMdw+dqH(&8*1o&G${^oNpIJi$h}tu`B6Gd6r5f zBbI5?^`vCwRqMCleg;Nx=V`GNHoP?IUsmE>ZYbL4K>5k0oZAE$VX1Muo~H&S(t8@} zH*wk&6z_4|BmS2UoYiNWtZQFofb}L9oQRVc4z~(Mn`nTwJdbewhb-3c$1bOf>z%1% z+5?MfIg6aqQk}o55ex^MsUCjD`V>93gNEs|qSWnSJxZ#kl4|tRLvcgmd%-b4wd)5K_||VUMxR3 zCOL;@@uzabCVvv21Cr!K-I7fW0#4*%Q1H>osDOgs?Z_E zkB6SKko=|RDwW+3bnYo5v@*a^VjCmO4^y|qh8MqPvP@S=%};=ZGB|c6xEeWrET(e> z-|CcXx6|6nKQJWuv9u_{Dl)oT4g#e_KCE!VJxQUDu{3ol3zaa|5; z`W8d(n4!jqB%}vR-2@)JJG4WKvrqR)S&ph>>1*b2lq4gx6j=gJRhWmmSJq{+x1#cW z!`xh(6y@+3?bg*uHlb(vigoqyHo#sMHbQ(yq^t-7dZ5(-dsg-A9MtGNR3pWXf!@$D z%F`;%BgEcmLlWlstT9T*l+HeuT;?;yCy_H=qz>_ij%?_OGt2jK`?&j#xTcXlzF zpOlXj9b&vVjwt*I;{yGM%h?eo)80z8iiX_r&0J-54YIn;%el&GvpsXECj)s@)K?_U z)J*#-Ykj%do_-6Q&JCZ!APRu2io{D%;2hy_riQ1<#rfnsnKbhi_rNxCe0Z1LCddcw z8hPh5MqeM)xSNDY${f&PII4QzVpVT4!H8GQzgC47@hNqa^OaKARmc%yIANCVwQdwB zzh1TY!Ot^4<8LiTA zj8^wsS;eN5%#fYxM<*oXMKIGx7g?e-3FZ>0`R%acM+g$t6*N-Cgntc;?R3w|Z859d zva{a0nLI+Gxq~{5aUq77wthWWrytg98_WOUdqqy=UD|+U@iG6P?s!N+&M7IMI$o=b z>^2n#Mrli7@d99zbMC(R4jzx-FP<^O1=~)SXuxdgIXc_zx~Z)2VOQ-E zux{+WcnUW-1tl$78b4 zxXRUxlRrfcJ%3ozZT>tAPOyKKs%UIH1NWXpMr z03Y+1(m>9~nYs;nsB%M7zWlK|XCc9OC5tlBilcpur+hMv)`C{?z56v9Ylv$Zk23Pg z0{`;3lA6mMql|QIDSD*jxOQLACWPv)1j;OwEisj>L)64!*({glE3Lh6@Eu)aV8?k7 z7Xc;vL>RNW4OmN!4_1+4h-eiXvWd^?We%R(F*qU5rwotmeM)qTS2UdHKI~X~Yf0~r zS+s;FKABt-T;OpHH4S@J0L{$otHmTK-pjY@Ra?$7asM`XHpp<)aQn{bIkt2YkqD&X z-sHeBJkqw^xRTCpGI3eB&BXTu-ZC>P4&+>ccV%|}Py*e|I3jqPBH<%K?X&wsYIrtHZN=-E_ zjuW+LvMMr*6>(A6_k+!WHwcTvBzVqxCt%81&|KdJ;cZ}gXl8B-#JALBg|tR{E3k;y zsrL!xe%t|YgZ?(4{T~#Vlt1KqRJkH81eMMR)jy4%&Xql;K&)9~oaN=gBEQs=SrHTk zwM)Fe6mD@LDFB4s0t_}wA3zFISP>LO`@(4=?l#I-rZSi++|@qagez}#1tMEP8)g}k zd{VOyX%Uw@DT;QAM^@ zfi|W(?C4zF$UVX0SWEaQvgzk?Ga)5$IsMbS973AD^k@?5VR19@kddt{pp{IQBPr`U zl|HL2u`sJGVx5^zg2-~*olo^o@uiJCgC7w&=$WR7UL*TXz3IYh!K5l=bai~ypGdCgg7)Ov%43$ftL4QJ`7` z=6XX$momO6oI61Anj~8vBT95ty=|9aQX9!3M#`*uU{rk*?j~aaEV9zKL0EdH zB;BoKToZglk5$dE`bks$?r-^>#|VKxhjyz8TIl6_Z5TWK~vn`g~OmnXwJ( z^u@!GF%N(5*#?xtt`ob#ukP+;VYQ~ z9OVhz>9Q+?x(0x-oKY4{z5nmCS82#5QJ2M-qQyP*qv=LJn)@+}Nm+RfDf)eMWQZGK z8R(LBTpY-oHAcmDQ~RJ2P3~Iq8-a8bynMWuGmsv{TLg;4Q5P(q#9XhN)aOKrm^JsOY*5hoc(qzzWn5_Lxhq2 z09|{1ZQWJDzrAW_MUupr?&8{5sR~cpdSBRT)fPd$cQQh@m*0;w17CbnLXWKYBXgdg z5ER~HluvmxbXJ<>_L^Ji4^d)=gn@`CT+XRyIbsdR91*cRF!Ns&Hpkr~RTOp2%U8K; z#x2b0)Y*YoQ8KIGo#fu-h&!L^&l9#{n81r5ej6oJ1y0z|P;f+>mV>v(cGs1{Sdelz z_J>X0wh#u=I_&a1KRuW*8oX^Gj9Pab>NSMx%%`X4Zx1GwekSF_6CaOZ5UudZmu?iR zm!;V-oXA17oTB$Hb%RC?awlg#A>9J3)caT$2pP7m_mEcO(-~$76T} zdI05C8$(6UH5Yx>v-Zb5OpXZWh-Q`kFaP<+FaQ4Kw=6Eu`2Tk*+y3pJzy4-)Z};Z= zG~tgD*Slw1ov@94KA=o2Ya2-d+JR)j12)cqrbBAi?*YZq%O}5#>|36GYA>%D(FT z7dKXkR19q`jYrr%?3itCw(j$xlWs-BGbTJRMwcCAX(#uXc0zvW3SVp}3ely(2qU4G z8CveapG?vKZ%LF`=l@s{XXxHHt*1QD2_E@f15EJY#H32fc2dVz8PO9>ucG0YBP6Av ziM4+lz@_M|0;Rhw>|9Te55g){{RGr7E0t}%r~Eu5fX+9WRbWGXZ7QKfn7aH-l=g@%zWX@Vs|#;!+|%rvj)gd}fFD2q{zyC9I&VtwaMCB=j55=5xd zPZ5cG_koILgf;>`^B2mB&I<$BThmp961oBH7Bv=3Se_ty2f;YK*2u#uYJa|~wevxC zR&72}CajJ15`uPv#v&wLR(Hx4*0ittS6CKGp=m83zr{$Bcf4lcd6W+Q_xX(5ZA8bo zE#=kLNbe;m+&f9EPG!+TSVGp+sZYWPp%_7pWJY_Jc7q1xUr@Ga#Sl4ESsbniP)-24 zm@96<6bS}Z!u%($_lBNHbb=#;|85eQ!w#b;v^7VTHe61niAoAA;gZ`*Z_bio>Ow$m zI$TX%@3{Q+C78<@pMX>|kJ{-Tr>fQsQ@1Ek4a;B?l~n2a0;ks6sG87gwuj7MX$)ub z!Y729$|kzurrH-s9W|binr*3jc8eYda~NTTPqi8}x`J~0>5!t8uM#(OdE}NR0)kk; zl7L85!RMn0Vj;Y3ncP}jHn!>F;N3dN#j#VWhPSsVj<{8KOqmy-}EWIs7DQB3@=(0YUxyt zvQG8dMm|fq;}jHW4e1K;vTYc}XvZ*dZkUu&p_`ViEJ~`~Y$}n}Z+~sYS9cCMIQGWv zNBC8|vTMl%gWs|>WocfGJ||e%EJQC$6NUsdDz!&&oqm}5m`hk>*08DZeZqlGtnLz) z_(Y-v0Pr0(Q@2`mv8vo?DjGe7@g9x2@H%8haBSmU>y=_+R9<|dMt^9{1YqeA2T+dQ zpvN5yeTjVuXZ!-Pz7RQWp^rC5JTYt-4=Q)X1U@zazlq-WfaM2g55oExW(nK>)>eHJ z;4^t*7YfWjP6TyS#(yYh&%e;%XwfG!tK);jd12ZJxAMm5H%92_cBK0|*#_m}D?XVM zJ^?7BN`0OBG!40BJ`zT#H@h-%cd-5p{ILn^0E3SnH(l3BQZWXJ^24%5?oMl6BAvho zBY1k~(J#Mf@9a`;sL}T9U!j9iks!%MANx%ED4aU)&M*fefQ_IHUTC+6*%1*sla-z3 z4wP3F>{V9+{8YCm*i0Nt`QsKA**&#Brj$=@5Z5S&?B-Y6IZ9s`?Dp`O0jWb(_)@R; zu%#pbpvv?@Zm4taz1n)QPIS#3fedi8-f0;JrUZC@|sBt+K0Nv#73~cJp$|+ z69TZ88vAY3U@3P3f~uVcDic9f7uy7#ZKN^Ef-GdJrQaMR5oLy@bBoTt_l60}D@u6k z(Te`}gnBNMrN;-xwEAuY3`N(ck02WylkL|{12nO3`;PEXF0&ZZ++t0AYLG;yDjw5H z8)BYVHw>a0fz4ruTNDPpgFBzEhS-^xX34E%U=NYzgQ&X!TX$F#Qj-)L1R54%@^vNI zuaRM69nFE&7F*w*_~uJ>ixeA#Gsb8*82{*_d1mUJF@D6OMt71cF+h?HlBsmAtX>uB zp*L3hDy;Tqmc?G6Ua8A+Vsx@Z1DRuh1RQ-6*rq^1j%yLYR{oDeLapq3C2Sl#nV-0L zx1*f?OH!biS~Q+j7vWO=q=jX|T96HbS~*1LhOru{uH_@S?*_zkgCh}v7#EL@tvY$C zAFCGLZjffzseN&gi9Tj6TLn7iZ3IDR!&iXzm39`WnWA~tQ6=Mt_%FaIK?0J_1 zp0m)06_%0)3h3WE__IV($7iy_CW4EL(k1-=7G7za79)rVm74l3qKrskCZR%AnQzQd ztlRG`JqCTmt>utgVC`Ht^zALry88=j1$VrHqP@{!M$#B4ZRw@T2P{C9v$_x=Pgy@ zqW$FMpl%9G28N1Wny$*K7yafsnmQvq$bc@d$vD{T^LMRr!)D8RgAW<-X5umJROQX+ zw4lu}_mk&`3a>?5AZ-;C)W^tEEba3;7NteDiAFRW;d?i^th6o?q=0PBgJyo}D-j-U`Y$$=xkX8UIZUciG z9kBMjVg-9_qAC+C5cVc%Y!E^kAjt?xX9Z(nBmaZ^X4`sIQj6^+s7qA>m^l=;eAuc1 z9H7nzR1cEGeuY+6W%#0jO*6c*Lz4{@a=6YYEyEa})IY*26^?TDkmG}rx={uUwsDgR zKQvZ~+S1r)J5tA~gjV$yvFXEFakqCX(IZ`ub4CHjxMKL(IgaV&O44qj;IU4M4TA1w zOztwN0=0HkzM;t}rMam38M5|1XO3z0h#?7iC2M>l!gL6T2X`y;I=1Z4i07$x<#0m-dOG6#vAUv3-Px>z$$RkE(o!F%BW@3UHsgooKVSa zMiQIA0t@6!&BFp%-Le`jI^wIpB(zjjJF2+_J9psA99&m>fqH?ehNJY-W=*8T;Dp&E z7vb!3zMD;WzGk+UZh&O#ud&aJ09o4=&}7cK?%@w7@#Z5kny~8}4fTPXk*bXraQVD&d1Oa_t?i-c(?r;RFa@+QmLZnm>Bj>N$*NI8E{M^B!LMI zm3|MfW=_;(lpQdPMCVXngucgmtl@!wsk;(rDLK1MY2#O+=bE=jBcJ$j_EA~1qHX(9 zZ5=a)n%tBHxBHgZcQrB9Kg_}N5o4#61KSw+X2$`qm;LznIS}aHt!ltoU;_0hsj`z4 z$v5{8g{LlG_*JknldOAWEuqhW`;WLbj0)GzOS}&-&xCHJf1;)iF$^^|O=mY@*x3BF zwCdf(JeM{HUTqd^Xa+Eu55Dp5b0QcYs_5LO|RD#wUJu5t5#>YbM$G>ese{ zb%L!wYaC3a02d*(O0TI|;d*fjN0Hnt?L;mx>h{Ck-2@Zt|6pV`PI29$a#Fd8f@Upl zQd)#+SlMpUW79H2X-v-+VY6D$RIi39!#lhx^j@H2Eq1N;_J5v{f6MU}IyZsVB4oo_ zH-RFX-j%dkOWCk+i}3Yp9<>EGrGf~U3s3tsR$~UuMM#HNat39#746X6Xl1SWhieE& zQC+O#^yEgtpV}8j0gInTwe+X?h^k2JH=vw2vw-j0!Tdm8m4ixjZ9eI8ZdQ6GhL2sgxF>>ainJ>CIoPmQ~m_DYgET{WM5@96U(z zsMO8gC$+yjACKLX-Q9DG)}pntgs+SwuxJimxJGUGP?p>_nP3drH-Sy%>3H zSF9$Q-u6AwFaTXZbFc6Y%yrlO@d7a^RzdRr{o zA|#8}iVw}$5{=+Fx?$%3@}GbF^6y`M%TO5P`M)P_e*W#Bzy8)*ntF2A$nIK?XdoWDw)m6&4eI~M>zWzmm}SGXr-o5<$~y)-RNW!7LQa_ zhZN>3W%UxyLlGi%I(M_T1>sn$3j;7GQ)Yu|k`xJTxdUtOmq5LzVNe24r&1P$nq5%? zcX2%RK3t}3nsAsZ168XLWWLhyuBP6-N)v5~F4~N>fx!7&>2WDrv^?fe3O;p;tB2*KGW=4D0d&9kn+z#vu z1ddm9=@~ErQwcKzZE(ZCJq)TQ6;=pzP?bRuDl1fNdaNUoA;3?6V?!TOL0-!hyNHyN zdBUltl(<<~eh=X+3b=lH;X7G$-Lvoee+g{KpqaWOO?61bQs zzMC{S*+0|R#Xsr5sDdnJ(3=W>z*6$75td>CT`rhC1-a~ydT6k*->ehmXTAA-F1B^8 zr?0N@s^Ap%`#p$@3_h%C8p6NDZnYv~v<;v6bi)wZWDO_1<*b(zbV?O5dzyd!( zzK~yDRJxIWN^6e`IPlhGoxj4>0i!;@D`wMNgtUug0cAF{Eg>|r5IQm*!8`I4)dQHc zN}DQp>N#|`cG~N|zNee2pDnOa6{64IzM?+za`EvnR%Z5Udf754Ha@K{@;iG~tcpo! zQ=*1<{_@x_ce8&6iHtxPenYc#S_r~mpQ6Fwswig|(1lumn7YH2;weAQ$#GY!%D3$K z(yw$zeYWI$ga`|kx^WGm@AQabHJ_;zu3^A?X{<8M=3_Ni0>Mwq8IpDcGgQ|kEk`$oT=ast>)3poDK=h`ckEib+?gJ z;S|reCu0jgllXeH>ebXoS8B3mR|StYRRbqZuxhP%@y;gCfOuG!Rf>D2#tW=?wWwrO z*{6{WR42-f?il<~`+84(FRQ~B-3_Sv?nD*7rExkAq{{m=CHybi4-r@bdI4fuzu@psw6GWmWJM2&5yiHsHW$kgff94 zPN`t_SCY`6JH)xOj3%nxM?>cFv0et%2By50TF2AIxhQb{&mhc!@||3qLx4GWCubl3 z;I;lH`@H)6dXCj-Ze_*j)Cw{Hlc8pg`X#9M+*$gubJVu507~ZL1SCuE@pWV{^R(l_S{FlHNT;j2mx({DV@E zymn$WJL@H4pX{ z^;ic<$;^@`>xpz`+>$Bab4Ouu^U5JhuTa%z>NZK?G1Q48=%*6Qw)LROw2vjMFi7GY z;}VGk1?@2-n4n+ZpjbGDlVq}h#P(Zcz@%7x|@K$1n@ zMKJg1t{EX&x$4y=f1DNr7Q`k=yVN;VGu?P0%Y&27=Ukti*Nbch<@GoV^l(by)kTNW z%~K9+kE74)i_9R*fUN0SPE+@w9u&0B||A9v42&t2KRxeKcuO}70 zF`BH{L|%bvIL!CCdHz7=PkLb9LZw!dDc2O%^KILNlNHy=izp~deLvdN4_nH`di*vr zjklP_rsZ9`Au6o=SH}yW)PrkcSOzJw;zCw~?UQEl&T+GY zZv}mnS+ZMHx$)g-dwS0EB>U%XcZfXz4!ktZ;$!|lFfBH{Wpu4H8cSmp?>ez=*YgnE zO1XP}Vp*9P^f+)C5M;B%Ko74+Ybdz3Y3}nJyav!HAsHkWWaF<&E3KJ>K@^6F387q-tOc4^nF>&q-%CuF{}tKM&Gm!>2o5sXTBA&1!z0jcfJR zfwX*;O`eheTMaHW2|6p%^eg$Btnr;%mMKJ~5PoC@zn--K5e+f^C6uepKWL2bKaxFf z{p$KAG?NRY_IUI2BW&MJGp}=PENxZQA!w#XXz}5}`9aYF_EUq?=~mVO_d4%Qd!+2l z*1pXqS?VeQ@0p!f^IbMRY5sfQQT$pvZR#0OcT5%3?MYMxFq(`~YCO3i#u2J)7%d2-xy7Tdhb*8M*+D z2THeW%s3$91Xm&Jp?SFMRMszsDcP)|rvIyLmruC^@3hsHFWvz4hPU0Oh7hM2xGezu z;Oo(&7P#FFUY0x{$_XB4zk~z5phmQI9Y6gSK-9qXzDgs^<33`DJH?a#3$UZVScFvh zzZcRh`MY9r4=a3@{(V1g$0u3V6*fmNm4`+hk9cIP2Nox+;|5WJUJhE;DMO2n!qvDC z|MaOaI0*li`l#XI48+Wg{BOB{NagX0{BLRZail55q%$CLk<9sbJlp{C@2s9Rc(_eO z86etng4&pfuF`6*S*dvUC z7)y%VgLIzJm)w@rABj3}JOQ6csQhA`ORa@L7XfcopNzmAMqd-MGStw>QK>m%?M zhNz3h^B!ho6xh7Fn#Dl}julta{7mh1YDKp;iyPH3@Odt#GO(=49c5z#@9mtPI#!*I zX42XYU`6$5Fi+_9*_6wVV)GSS^oyi*)zaitpsdMcuuq`B3b96sgu7GfqF)de0!53c z{?!fjvNJkouDK*Ma{3gB8>Ci&LGp&bq796F)_i{2sV}YK#XOEb5=&;SSF%)F()ChO zJvR9mD$8=#b5=J6D;bo~EBnoE8`t^fsH~tt9vvKD2IV)okt^j^)3o{rS8YpsT{bA^ z3(E+;`3AK@WcxJ!zzbG}PoMxVLV1n<1G(?1pYGoF_S(5q&x1~Y;$teFK>b&Y(RH;t zV-Pq^XMw~;;PbVFTSeyD}xe9r9(*e$TiTw|!C&UDxz;BG6M z^l}bxw(I{VwSTU&pQ>F|{)1JTTbE=7y%rMCP8zkiRgEp~Em^xvb-sJ*_;8bARwILn1D3o1Ot(N$YZ8PpPiDClAbnPSwY-rb z`Mdn#DjfDO*bU$Q4oGRFRw|C0C-$#lGHZB6Z|h2Zs=sx3rxH~f9n!i_F5i%=xjeYp zc^~6GSK5aO{7w=qZtcGgjYdyWXu5aZp>bf~IUz;dD*AzYieglYd$tt?88N&rhjtX0 z`ZDIjqGI05e=pLIrmjygy_RY@U)HJ-nrIG^bUr;jeF5MmQB-yp6e0XQIDq)=i@SB} z)b^eY+j)L@`n+68Ebh6|R%9ow_0T%6hy8jV*sphly**+^uy)0(QnT9Tq869bQKr)f zay{f_bQyuSVN!V-js{y$wjSXP0*p}n2rdvERBe*hURH;kX%^JB(7&y)&TFVM3gL7} zQaY31P<)*6){(f#G+e)my`N=d+xY$14v}sUiD!AbjN7HtgGb1_wsYOlJ0p&8l&Rq> z)uqs6t**GG*<**DC4O;P>A;;!VniM?2L+}XoNqb;8IB+$f({u*B=+0wJctN6aNqM<6}r$HNVNJ}kSAf)@Nm|^-OQP74}_mlhmRgjTP>t}C|NJl_tr0?>p$aKwLD+C0kjrtiI^Th$1L0T z(lXSm=6D&JnJaxq!Bq@zDl$BW8->fvM7}sZ{k)V{m-5vD+FGZ28QxT<_F;^%1avX` zsYsO~k!@Ep`T6eE8}(i*pRM;>*>Y9D9WN;iBD$MeHCOe%nq|GY zpZ2`Rp4)|5BBZ-(mu31s`c*l-KQ*gIvzCeHZaP)5dlzleZ9Qo+pX$>@1r}XL``Y$H@8SN4(u8G(;PL=xRoNhvtHR%y@zI1 zC+$z2>gd!m;oM1^DrPs;BLoSt`&7vHXS}x&GFUE|tu?60>89#qTcHNgJ4U(&C)Ihx zNnG#EMdP%eUU!+y&nBp?m1~soO?B-EuN{qGYsoK^x=m9y+urV@<|yFC9?FVlUDOHNzs*cjjUSG1pjs_{3Q#;#l{tcOs!I`fEaI>!?vnf2QuWQupi%EtSzdwW`kZ-IVKR6n-p|!K&AC zDcw`Snq1#Y#r^_LKDn)CsTj@qJmwj4zb+&z#B&cz&|-H}ZL(K_uBr__hHNb&!{Vl5 z39^{F8dx{_=LV~iBvy!KYt3n~x~T>gQH%Od9jbI_m2kG!q7Jhg>k-;d=V^esv0jWB zqy7&JlcmW^KlQ1uPYgoZUatn2-c-M6+z=GZb|;?U2Z&rCy7ceX&u(CKe(t+!-!X`2 z>s>d%^0s@fh#c4Y*VumPl{yTI?5BZiaoWqly@g;pq+c)yA3FIpo11D)hFQ1{P2&4k;ihhsQzyco9bTHHq#QEZ zTAzk^-c-5hxmp$8mSwo=RQ=gbwW(iBV%l28M%dn5%klvIQxAdXVgO0~{eMnW;2!cD z;(K!emK!srv3)2F}@xBKPM9iei%SRBNEL zEb|IIE3N3iPPdi_>F(NPnch^tf+)xXHAJ+?ykai+{4nPzBO@|dl{nh9wRmxM4+jSmCR6_szgJmc zxqF&*{%>uYhq>NXc(Vs9ZZ0Ur;if{dGsB58om43hjAwrgBy#aY6p`kpK(?zn634w-si-yyQ#R$?Z^}oKCmV= z7`>l}vIsY`Eq%uZZbf}l@bU4eZxn_P%4C`of7^OL_3^u@z>*l*mW{LQfj3o$*-b_D zSCLYk&rJnXBnK5kQcmRqt5KcLO$8K0UU2ZEJVV-nUuL`3UiJ_8!k-~dsMl-BL9CxYLM z3d}Br#-kYdDw_tlEKRYs?%faS`A?_EbpQNeZi2++h+J;R_zr#&#@7q1{VoaJC<>xe z*&y!u$-yQH9Tm`^%nkhI)JGNvG7y&Q{0)lFFHf%~gm`d{c(y4}d>{$2L}$+1jX-|p z1vwHo?y4`${RQtEXc~;=jX(T@qo!2gzageK-rf4oWq6f#FbZz@o)}?b;2;`VzY%eW zoQWf>+(9B$qM4W+#`Loy|Ipj0V)M>Yx`T%F*}Qd9s2yomH*j|1O!d4ul~b;hW8RYeA7Coq)XBfi%_`ya>`)gu zL`e|Fd8v`*Pt@83c*j;jkjT$J;`D8~rCLG!ZlJ>exeOWY^vj{a#Pp3W1ABrCvw|?% zMd)3@Z=Xx;x}k3kX*aFnTI}jhdq{(KALUH$ie_e`60T7h!E)QePbK1}gx-H>_udEJI2ITJxwky8Ht~w?~Pg>uxxI zwG96|W{_*u&{{tP2JGo5gpIPU4*ok%nX%x`T0HLIg4Ej#e)yxqAU7MC`@W0YLTyz2 za<+Ru#=Sdm$8l3k2%@BF@+0Zp6aDFz^W3u=K%@F;m0-CN3h5o@uz6?$nO}Ff4EsNp zb6tMNc+XXu`64d&DW;`Dj9?4Wg!75+Rfy51e!2_%=Vv1h=TzX0Zg;|~O#;EgUAyA+ zxFl}w?t>7h5Przd4*iSy$QDu#+LRaJ_YZ{*F{?T9rVZ)NJG&9$m1k_`7@c3x?F4_% zp=|cWjY_L)&*yJncNJN!Z;ZUxxYVmsQ7);@U!>|IGua<8swF#3+4tNOX&F$9j&$Gh z-*7|NRS0{ijjYdXfXLd$(`Wr2?7No*cC2E!Z%OdjhN`l}$?4-w(Q$%7?pu(ZVcl}j zqTT^JB%GoiQyyI(Jq>d)&5JgQ*0F?E?Db#6gw)N@Q!5Kl0(G-OEx5I}!I^0Zk=ajYK zLxiR+*01=#-!dq)=l>4Z=1d`Gb8FaTMS65S-~QJ@sN@aim2$g`x3B(n>K_ov^YY(K z;L84e`(ORLI*6m zPIiqv{$0`{FipyB0QPb^?AVrJhBCyid{mh06B^YVc5a?yDlMKp)Dj^S0Q;ccJ{o^* zKKu!sRcCO?8}ft(Il7mGtRSk(f_C$*2)C3?mzV9NLQRd{gS5zM-d=s-sG0bdvglVI z;$lQ5w_}-ew$c=lI3H&>&o+L!f)Gl&Yoq}u!L|UKu=+TsaK%F!lD^QYLu*rw0O}qV z)(Bu;+TCm!{o!7Yca;z^@WArX7oyAIa#tahTs)?v@HSpx*In-=BTN6Wq@&%#1^4LX zo(oxBL-w&`;r~z<_Bh&H92Moqk_fV6O?~p_BB_ynFqstY)+Qt=+{cnZRwPM`3U*5M z*;*KN+K(xfH~+_iVAwi?YNbN7A4@7o7<_lV&5vC}_OWDvL;@B2+1#3zgr((S?}g30 zBj=d97oU>O%0SDlzj(u}obVV}>{T9SdBffPAK&}G(M$4wm&8y7ut#M8z2Yt=+>Dfs zJjG1dz~--%FSUbG3jKFKbe`)ew|h4Wyz*bNi)S{)JIdu#T`qovmsAg>9#*4-L^F@* zpmaLnUw*auTo=zdIMLgg&I}L|&2)l;Vp$Qgwcu`SrZ07=Am$z?nY3Kyki4U0@Q7Ds z_S+1jlzJOW3upo5yU3}>ZeNlxAiHy8OMzV+_PuojR&RHmG@Hq1RrfFAl<-4z)gMbj zTNT|cvDAW|c#c5WpPobkjq-sW2p+k7&sNQL_}(RlCYG z8$o_s9ePslb_ikTMb!rnZ{{d;{k)=#rjLl-cNag)sJas={BY&iv5246LEea4&JH5o31#Zg zCa`Q)|3beKUk+nYy?JI-Z;R4(tolN`f9j<76tB|*+i#>CR+m~_PATM@z3DkmrsMR^ zHkM&K3I;L!@Bi!nbLu^978U$G29#Qs^ z9WZfruu&(JP1)F`)dDbp@+oS)>-mfklIF1q<+JqgtZ~FN2ClYZi|Be%5)jMbyafBI=`wAd8-=poDTv10?YjVh4s zLGQ)J)Uip>?DR6s(6i&4lB?LMxRFpcwU#4xsE-desq~lvJ7P<9HNaVbPKtUc7$SKU zFSR9d==n@&Co17A=15XZEy>w~tXD!}YV(jgttABQo zYRABtsO0RjqN`{H8#$ zr?(d z=>FYX7sC(8wH2c~!I;>Vru8x4R<$+su9Xn2;>zDgfLoQn2XhcB`NI#QSe21cR5=gEW)eEHJ`)62G zjJ)3(gKkEr>QtrJhXN-)uT3Mc>yJr#PK#2A$wIJ_Licx6LmnGtvLV`S*-B~4`m+P% z``%FxQ0-H>$nrC}yo9au{~lO=f?QH`Hh&r#L)J(pm3Dibiwx>bh>@sBy8ISgjY22R zWqcYP&^A9LuUF`S<6kr9V%A$G>23#oeKDu|I3fB=dc*O5gXgD6@ldC7=nTspy->Yc z;Ax*`%_Zp-B_IEpGXV4qn0K1=HS_F9#ZIwDGO3!(SDBxlpj5+5W@<@>sgw;kWvLzU zmxL`n0v_vvH7A-CbPl&>>@fwCd0VeBRyB+^!Y ze*P;zc_RU@UZ{mKy1S+j38P)_3a7IC`X!U~h2-?GSjxmm7`VR0|$ftGJ;(p8_>4|(Qw($9^}X{3zlRSuMF6Qo@}sJtCWr;Ohj>w(IjVAPF?)eKF?*`YyQ zlP$jvr2Of%E-clAcG~SR&5QaQw_`$?u?KO4bhEYQ5zWwE?+c4?uCVy8$@HRz^dPZ^s5lw8rYcCRx{)%c_t0GO<7uClWwNWXGH2*&61NVR z%!$2J{7SFHB;n#rU0Vpv&>rH*G2(VLb@w6nzh)c_2fp>E*%Y(W=p{sIs%Woa&Q%|A zLwtN`90 Date: Fri, 5 Jun 2020 23:57:38 -0700 Subject: [PATCH 126/228] small fix --- .openpublishing.redirection.json | Bin 2577134 -> 2576186 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index e08222ad833111340e441425d1b6ca165a2c6231..8c4376c1c1c5abe31ce88220bc14188b82154d9e 100644 GIT binary patch delta 119 zcmWm1ISztA7=Y3IilexKJK%ycLQlyN43#Ic_$n(KGZl2)fP} Date: Sat, 6 Jun 2020 01:01:36 -0700 Subject: [PATCH 127/228] one last fix for av --- .openpublishing.redirection.json | Bin 2576186 -> 2576176 bytes 1 file changed, 0 insertions(+), 0 deletions(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index 8c4376c1c1c5abe31ce88220bc14188b82154d9e..af5222988d92153d130950539faba798275c0555 100644 GIT binary patch delta 141 zcmX}fO%B0806^gxKZ9y1s?=X;Yr1m)XXp{wyM)Bztt^SmO5+F?5{XlE={Ur~;(f_` z gYm;ZGYc@x%pSM6o^8enYQ1A0euI#OFgeCSrKeW~>U;qFB delta 124 zcmWm1ISztA06@`<;s}C*E8@oD0KJ6;M=->5cnphQS=pGW@C+0tCZ595lUN$Hc*U!) zm3aId5j1FG&_dG2#G-?ZLzf;d9(@K388K#p&y;`}a~3RF5fTxTutt%R-SR`J>q2gI YdCEM!`v`SE2XZ6+SC^-J>GwV_zUAC0q5uE@ From c3ba6cbf5fcebf289abc8dc232d094a8f345e172 Mon Sep 17 00:00:00 2001 From: Joyce Y <47188252+mypil@users.noreply.github.com> Date: Sat, 6 Jun 2020 09:35:32 -0300 Subject: [PATCH 128/228] Removed statement about no conflicts in line 41 Removed statement as per @lomayor Related to issue #5636 --- .../configure-machines-security-baseline.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md index 00d7f60d42..f0c6bf839a 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md @@ -38,7 +38,7 @@ The Windows Intune security baseline provides a comprehensive set of recommended - [Windows security baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-windows) - [Microsoft Defender ATP baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-defender-atp) -Both baselines are maintained so that they complement one another and have identical values for shared settings. Deploying both baselines to the same machine will not result in conflicts. Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls. +Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls. >[!NOTE] >The Microsoft Defender ATP security baseline has been optimized for physical devices and is currently not recommended for use on virtual machines (VMs) or VDI endpoints. Certain baseline settings can impact remote interactive sessions on virtualized environments. @@ -100,4 +100,4 @@ Machine configuration management monitors baseline compliance only of Windows 10 ## Related topics - [Ensure your machines are configured properly](configure-machines.md) - [Get machines onboarded to Microsoft Defender ATP](configure-machines-onboarding.md) -- [Optimize ASR rule deployment and detections](configure-machines-asr.md) \ No newline at end of file +- [Optimize ASR rule deployment and detections](configure-machines-asr.md) From dfb02bbe803d29f220d81da591143d3491ab5511 Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 7 Jun 2020 13:00:12 +0200 Subject: [PATCH 129/228] Set up AADJ PC RDC: Note reference "UPN attribute" Description: As noted in issue ticket "FirstnameLastname reference doesn't resolve" (#6902), there is a disparity between the cmdlet parameter detail "the-UPN-attribute-of-your-user" and the explanatory use of the phrase "FirstnameLastname" which is not used anywhere else on this page. Thanks to tomten for reporting this issue. Changes proposed: - Change "FirstnameLastname" to "the-UPN-attribute-of-your-user" - Add MarkDown codeblock fencing with PowerShell syntax name - Reduce excessive usage of "then", "that" or "that are/that have" - Replace "that have" with "using" where grammatically appropriate - Extend "using:" to "by using any of the following:" (grammar fluency) - Whitespace and codestyle adjustments: - Add MarkDown indent marker compatibility spacing where needed - Add blank line before bullet point lists, where needed - Remove redundant end-of-line blanks (4 lines) - Normalize MD indent marker indentation from 5 to 4 spaces - Normalize bullet point spacing from 3 to 1 (1 line) - Remove 10 redundant blank lines at the end of the page Additional note: I am looking forward to feedback and suggestions for my grammar changes as well as the 'net localgroup' cmdlet phrasing. Ticket closure or reference: Closes #6902 --- .../connect-to-remote-aadj-pc.md | 86 +++++++++---------- 1 file changed, 40 insertions(+), 46 deletions(-) diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index 54f8565c87..c1758ce310 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -20,40 +20,45 @@ ms.topic: article **Applies to** -- Windows 10 +- Windows 10 -From its release, Windows 10 has supported remote connections to PCs that are joined to Active Directory. Starting in Windows 10, version 1607, you can also connect to a remote PC that is [joined to Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/user-help/device-management-azuread-joined-devices-setup). +From its release, Windows 10 has supported remote connections to PCs joined to Active Directory. Starting in Windows 10, version 1607, you can also connect to a remote PC that is [joined to Azure Active Directory (Azure AD)](https://docs.microsoft.com/azure/active-directory/user-help/device-management-azuread-joined-devices-setup). ![Remote Desktop Connection client](images/rdp.png) ->[!TIP] ->Starting in Windows 10, version 1809, you can [use biometrics to authenticate to a remote desktop session.](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809#remote-desktop-with-biometrics) +> [!TIP] +> Starting in Windows 10, version 1809, you can [use biometrics to authenticate to a remote desktop session.](https://docs.microsoft.com/windows/whats-new/whats-new-windows-10-version-1809#remote-desktop-with-biometrics) ## Set up -- Both PCs (local and remote) must be running Windows 10, version 1607 (or later). Remote connection to an Azure AD-joined PC that is running earlier versions of Windows 10 is not supported. -- Your local PC (where you are connecting from) must be either Azure AD joined or Hybrid Azure AD joined. Remote connection to an Azure AD joined PC from an unjoined device or a non-Windows 10 device is not supported. -Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC that you are using to connect to the remote PC. -- On the PC that you want to connect to: - 1. Open system properties for the remote PC. - 2. Enable **Allow remote connections to this computer** and select **Allow connections only from computers running Remote Desktop with Network Level Authentication**. +- Both PCs (local and remote) must be running Windows 10, version 1607 or later. Remote connections to an Azure AD-joined PC running earlier versions of Windows 10 are not supported. +- Your local PC (where you are connecting from) must be either Azure AD joined or Hybrid Azure AD joined. Remote connections to an Azure AD joined PC from an unjoined device or a non-Windows 10 device are not supported. - ![Allow remote connections to this computer](images/allow-rdp.png) +Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-guard), a new feature in Windows 10, version 1607, is turned off on the client PC you are using to connect to the remote PC. - 3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users to connect to the PC, you must allow remote connections for the local **Authenticated Users** group. Click **Select Users**. - >[!NOTE] - >You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once and then running the following PowerShell cmdlet: - > - >`net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user"`, where *FirstnameLastname* is the name of the user profile in C:\Users\, which is created based on DisplayName attribute in Azure AD. - > - > This command only works for AADJ device users already added to any of the local groups (administrators). - > Otherwise this command throws the below error. For example:
- > for cloud only user: "There is no such global user or group : *name*"
- > for synced user: "There is no such global user or group : *name*"
- > - >In Windows 10, version 1709, the user does not have to sign in to the remote device first. - > - >In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices. +- On the PC you want to connect to: + 1. Open system properties for the remote PC. + 2. Enable **Allow remote connections to this computer** and select **Allow connections only from computers running Remote Desktop with Network Level Authentication**. + + ![Allow remote connections to this computer](images/allow-rdp.png) + + 3. If the user who joined the PC to Azure AD is the only one who is going to connect remotely, no additional configuration is needed. To allow additional users to connect to the PC, you must allow remote connections for the local **Authenticated Users** group. Click **Select Users**. + + > [!NOTE] + > You can specify individual Azure AD accounts for remote connections by having the user sign in to the remote device at least once, and then running the following PowerShell cmdlet: + > ```PowerShell + > net localgroup "Remote Desktop Users" /add "AzureAD\the-UPN-attribute-of-your-user" + > ``` + > where *the-UPN-attribute-of-your-user* is the name of the user profile in C:\Users\, which is created based on the DisplayName attribute in Azure AD. + > + > This command only works for AADJ device users already added to any of the local groups (administrators). + > Otherwise this command throws the below error. For example: + > - for cloud only user: "There is no such global user or group : *name*" + > - for synced user: "There is no such global user or group : *name*"
+ > + > In Windows 10, version 1709, the user does not have to sign in to the remote device first. + > + > In Windows 10, version 1709, you can add other Azure AD users to the **Administrators** group on a device in **Settings** and restrict remote credentials to **Administrators**. If there is a problem connecting remotely, make sure that both devices are joined to Azure AD and that TPM is functioning properly on both devices. 4. Enter **Authenticated Users**, then click **Check Names**. If the **Name Not Found** window opens, click **Locations** and select this PC. @@ -61,33 +66,32 @@ Ensure [Remote Credential Guard](/windows/access-protection/remote-credential-gu > When you connect to the remote PC, enter your account name in this format: `AzureAD UPN`. The local PC must either be domain-joined or Azure AD-joined. The local PC and remote PC must be in the same Azure AD tenant. > [!Note] -> If you cannot connect using Remote Desktop Connection 6.0, then you must turn off new features of RDP 6.0 and revert back to RDP 5.0 by changing a few changes in the RDP file. See the details in the [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e). - +> If you cannot connect using Remote Desktop Connection 6.0, you must turn off the new features of RDP 6.0 and revert back to RDP 5.0 by making a few changes in the RDP file. See the details in the [support article](https://support.microsoft.com/help/941641/remote-desktop-connection-6-0-prompts-you-for-credentials-before-you-e). + ## Supported configurations - -In organizations that have integrated Active Directory and Azure AD, you can connect from a Hybrid-joined PC to an Azure AD-joined PC using: + +In organizations using integrated Active Directory and Azure AD, you can connect from a Hybrid-joined PC to an Azure AD-joined PC by using any of the following: - Password - Smartcards - Windows Hello for Business, if the domain is managed by Microsoft Endpoint Configuration Manager -In organizations that have integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to an AD-joined PC when the Azure AD-joined PC is on the corporate network using: +In organizations using integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to an AD-joined PC when the Azure AD-joined PC is on the corporate network by using any of the following: - Password - Smartcards -- Windows Hello for Business, if the organization has a mobile device management (MDM) subscription. +- Windows Hello for Business, if the organization has a mobile device management (MDM) subscription. -In organizations that have integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC using: +In organizations using integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC by using any of the following: - Password - Smartcards -- Windows Hello for Business, with or without an MDM subscription. +- Windows Hello for Business, with or without an MDM subscription. - -In organizations using only Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC using: +In organizations using only Azure AD, you can connect from an Azure AD-joined PC to another Azure AD-joined PC by using any of the following: - Password -- Windows Hello for Business, with or without an MDM subscription. +- Windows Hello for Business, with or without an MDM subscription. > [!NOTE] > If the RDP client is running Windows Server 2016 or Windows Server 2019, to be able to connect to Azure Active Directory-joined PCs, it must [allow Public Key Cryptography Based User-to-User (PKU2U) authentication requests to use online identities](https://docs.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-allow-pku2u-authentication-requests-to-this-computer-to-use-online-identities). @@ -97,13 +101,3 @@ In organizations using only Azure AD, you can connect from an Azure AD-joined PC [How to use Remote Desktop](https://support.microsoft.com/instantanswers/ff521c86-2803-4bc0-a5da-7df445788eb9/how-to-use-remote-desktop) - - - - - - - - - - From fc398fd62478ff2f209c4783918730636d603ca9 Mon Sep 17 00:00:00 2001 From: amirsc3 <42802974+amirsc3@users.noreply.github.com> Date: Sun, 7 Jun 2020 14:29:46 +0300 Subject: [PATCH 130/228] Update tvm-software-inventory.md Removed un-needed words in a sentence which made it confusing --- .../microsoft-defender-atp/tvm-software-inventory.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md index 7153eaffb1..7ac4761b32 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-software-inventory.md @@ -58,7 +58,7 @@ Once you are in the Software inventory page and have opened the flyout panel by ## Software evidence -We now show evidence of where we detected a specific software on a machine from the registry, disk or both machine on where we detected a certain software. +We now show evidence of where we detected a specific software on a machine from the registry, disk or both. You can find it on any machines found in the [machines list](machines-view-overview.md) in a section called "Software Evidence." From the Microsoft Defender Security Center navigation panel, go to **Machines list** > select the name of a machine to open the machine page (like Computer1) > select the **Software inventory** tab > select the software name to open the flyout and view software evidence. @@ -86,4 +86,4 @@ You can report a false positive when you see any vague, inaccurate version, inco - [Weaknesses](tvm-weaknesses.md) - [Scenarios](threat-and-vuln-mgt-scenarios.md) - [APIs](threat-and-vuln-mgt-scenarios.md#apis) -- [Configure data access for Threat & Vulnerability Management roles](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) \ No newline at end of file +- [Configure data access for Threat & Vulnerability Management roles](user-roles.md#create-roles-and-assign-the-role-to-an-azure-active-directory-group) From 4d9540ac39ffc3b7effa199d30ab3fc96d6910fd Mon Sep 17 00:00:00 2001 From: "Trond B. Krokli" <38162891+illfated@users.noreply.github.com> Date: Mon, 8 Jun 2020 12:57:59 +0200 Subject: [PATCH 131/228] Grammar/detail: if it looks like a sentence, then period. Add period dot at the end of a longer descriptive text being one of the items on the bullet point list. Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com> --- windows/client-management/connect-to-remote-aadj-pc.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/client-management/connect-to-remote-aadj-pc.md b/windows/client-management/connect-to-remote-aadj-pc.md index c1758ce310..9478b21555 100644 --- a/windows/client-management/connect-to-remote-aadj-pc.md +++ b/windows/client-management/connect-to-remote-aadj-pc.md @@ -74,7 +74,7 @@ In organizations using integrated Active Directory and Azure AD, you can connect - Password - Smartcards -- Windows Hello for Business, if the domain is managed by Microsoft Endpoint Configuration Manager +- Windows Hello for Business, if the domain is managed by Microsoft Endpoint Configuration Manager. In organizations using integrated Active Directory and Azure AD, you can connect from an Azure AD-joined PC to an AD-joined PC when the Azure AD-joined PC is on the corporate network by using any of the following: @@ -100,4 +100,3 @@ In organizations using only Azure AD, you can connect from an Azure AD-joined PC [How to use Remote Desktop](https://support.microsoft.com/instantanswers/ff521c86-2803-4bc0-a5da-7df445788eb9/how-to-use-remote-desktop) - From 6fdaaa5d2a20a168033e060265657b7783a81263 Mon Sep 17 00:00:00 2001 From: jaimeo Date: Mon, 8 Jun 2020 08:38:30 -0700 Subject: [PATCH 132/228] small tweaks from Aria --- .../deployment/update/get-started-updates-channels-tools.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/get-started-updates-channels-tools.md b/windows/deployment/update/get-started-updates-channels-tools.md index 4fc8607bbd..82a5957f04 100644 --- a/windows/deployment/update/get-started-updates-channels-tools.md +++ b/windows/deployment/update/get-started-updates-channels-tools.md @@ -18,7 +18,7 @@ ms.topic: article There are four phases to the Windows update process: -- **Scan:** A device checks the Microsoft Update server or your Windows Server Update Services (WSUS) endpoint at random intervals to see if any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the +- **Scan:** A device checks the Microsoft Update server, Windows Update service, or your Windows Server Update Services (WSUS) endpoint at random intervals to see if any updates have been added since the last time updates were searched, and then evaluates whether the update is appropriate by checking the policies that have been set up by the administrator. This process is invisible to the user. - **Download:** Once the device determines that an update is available, it begins downloading the update. The download process is also invisible to the user. With feature updates, download happens in multiple sequential phases. @@ -88,7 +88,7 @@ Windows Server Update Services (WSUS): you set up a WSUS server, which downloads You can set up, control, and manage the server and update process with a number of tools: - A standalone Windows Server Update Services server operated directly -- Configuration Manager +- [Configuration Manager](deploy-updates-configmgr.md) - Non-Microsoft tools For more information, see [Windows Server Update Services (WSUS)](https://docs.microsoft.com/windows-server/administration/windows-server-update-services/get-started/windows-server-update-services-wsus). @@ -99,7 +99,6 @@ Your individual devices connect to Microsoft endpoints directly to get the updat - [Group Policy Management Console](waas-wufb-group-policy.md) (Gpmc.msc) - [Microsoft Intune](waas-wufb-intune.md) -- [Configuration Manager](deploy-updates-configmgr.md) - Non-Microsoft MDM tools ### Hybrid scenarios From 221026a73ad16a2992186d5f82a36ad838c6cfcc Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 09:25:56 -0700 Subject: [PATCH 133/228] convert table and other updates --- windows/deployment/s-mode.md | 3 +-- windows/deployment/upgrade/resolution-procedures.md | 6 ++++++ windows/deployment/upgrade/troubleshoot-upgrade-errors.md | 2 +- windows/deployment/windows-10-deployment-scenarios.md | 1 + 4 files changed, 9 insertions(+), 3 deletions(-) diff --git a/windows/deployment/s-mode.md b/windows/deployment/s-mode.md index e8a3556632..bd9b8af4d0 100644 --- a/windows/deployment/s-mode.md +++ b/windows/deployment/s-mode.md @@ -7,7 +7,6 @@ ms.localizationpriority: medium ms.prod: w10 ms.sitesec: library ms.pagetype: deploy -ms.date: 12/05/2018 ms.reviewer: manager: laurawi ms.audience: itpro @@ -42,7 +41,7 @@ Save your files to your favorite cloud, like OneDrive or Dropbox, and access the ## Deployment -Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](https://docs.microsoft.com/windows/deployment/windows-autopilot/windows-10-autopilot). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired. +Windows 10 in S mode is built for [modern management](https://docs.microsoft.com/windows/client-management/manage-windows-10-in-your-organization-modern-management) which means using [Windows Autopilot](windows-autopilot/windows-autopilot.md). Windows Autopilot lets you deploy the device directly to a user without IT having to touch the physical device. Instead of manually deploying a custom image, Windows Autopilot will start with a generic PC that can only be used to join the company domain; policies are then deployed automatically through mobile device management to customize the device to the user and the desired environment. Devices are shipped in S mode; you can either keep them in S mode or use Windows Autopilot to switch the device out of S mode during the first run process or later using mobile device management, if desired. ## Keep line of business apps functioning with Desktop Bridge diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 41c49f7eb9..6406a51c0a 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -38,6 +38,12 @@ To resolve a rollback that was caused by driver conflicts, try running setup usi See the following general troubleshooting procedures associated with a result code of 0xC1900101:

+ +| Code | Mitigation | Cause | +| :--- | :--- | :--- | +| 0xC1900101 - 0x20004 | Uninstall antivirus applications.
Remove all unused SATA devices.
Remove all unused devices and drivers.
Update drivers and BIOS. | Windows Setup encountered an error during the SAFE_OS with the INSTALL_RECOVERY_ENVIRONMENT operation.
This is generally caused by out-of-date drivers. | +| 0xC1900101 - 0x2000c | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
Contact your hardware vendor to obtain updated device drivers.
Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. | Windows Setup encountered an unspecified error during Wim apply in the WinPE phase.
This is generally caused by out-of-date drivers | + - diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 3f32491bba..070dea30cc 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1075,6 +1075,9 @@ The following diagram shows the Policy configuration service provider in tree fo
DeliveryOptimization/DOCacheHost
+
+ DeliveryOptimization/DOCacheHostSource +
DeliveryOptimization/DODelayBackgroundDownloadFromHttp
@@ -1095,6 +1098,9 @@ The following diagram shows the Policy configuration service provider in tree fo
DeliveryOptimization/DOGroupIdSource +
+
+ DeliveryOptimization/DOMaxBackgroundDownloadBandwidth
DeliveryOptimization/DOMaxCacheAge @@ -1105,6 +1111,9 @@ The following diagram shows the Policy configuration service provider in tree fo
DeliveryOptimization/DOMaxDownloadBandwidth
+
+ DeliveryOptimization/DOMaxForegroundDownloadBandwidth +
DeliveryOptimization/DOMaxUploadBandwidth
diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 8a8184ba9a..f3b34ef7cd 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -7,7 +7,7 @@ ms.prod: w10 ms.technology: windows author: manikadhiman ms.localizationpriority: medium -ms.date: 09/27/2019 +ms.date: 06/09/2020 ms.reviewer: manager: dansimp --- @@ -31,6 +31,9 @@ manager: dansimp
DeliveryOptimization/DOCacheHost
+
+ DeliveryOptimization/DOCacheHostSource +
DeliveryOptimization/DODelayBackgroundDownloadFromHttp
@@ -52,6 +55,9 @@ manager: dansimp
DeliveryOptimization/DOGroupIdSource
+
+ DeliveryOptimization/DOMaxBackgroundDownloadBandwidth +
DeliveryOptimization/DOMaxCacheAge
@@ -61,6 +67,9 @@ manager: dansimp
DeliveryOptimization/DOMaxDownloadBandwidth
+
+ DeliveryOptimization/DOMaxForegroundDownloadBandwidth +
DeliveryOptimization/DOMaxUploadBandwidth
@@ -289,14 +298,16 @@ The following list shows the supported values: -[Reserved for future use] + +This policy allows you to configure one or more Microsoft Connected Cache servers to be used by Delivery Optimization. + +One or more values can be added as either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address by commas. ADMX Info: -- GP English name: *[Reserved for future use] Cache Server Hostname* -- GP name: *CacheHost* -- GP element: *CacheHost* +- GP English name: *Cache Server Hostname* +- GP name: *Cache Server Hostname* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -314,6 +325,83 @@ ADMX Info:
+ +**DeliveryOptimization/DOCacheHostSource** + + +
diff --git a/windows/deployment/upgrade/troubleshoot-upgrade-errors.md b/windows/deployment/upgrade/troubleshoot-upgrade-errors.md index c429b8496c..cd9734bcfa 100644 --- a/windows/deployment/upgrade/troubleshoot-upgrade-errors.md +++ b/windows/deployment/upgrade/troubleshoot-upgrade-errors.md @@ -26,7 +26,7 @@ ms.topic: article If a Windows 10 upgrade is not successful, it can be very helpful to understand *when* an error occurred in the upgrade process. -Briefly, the upgrade process consists of four phases: **Downlevel**, **SafeOS**, **First boot**, and **Second boot**. The computer will reboot once between each phase. Note: Progress is tracked in the registry during the upgrade process using the following key: **HKLM\System\Setup\mosetup\volatile\SetupProgress**. This key is volatile and only present during the upgrade process; it contains a binary value in the range 0-100. +Briefly, the upgrade process consists of four phases that are controlled by [Windows Setup](https://docs.microsoft.com/windows-hardware/manufacture/desktop/windows-setup-technical-reference): **Downlevel**, **SafeOS**, **First boot**, and **Second boot**. The computer will reboot once between each phase. Note: Progress is tracked in the registry during the upgrade process using the following key: **HKLM\System\Setup\mosetup\volatile\SetupProgress**. This key is volatile and only present during the upgrade process; it contains a binary value in the range 0-100. These phases are explained in greater detail [below](#the-windows-10-upgrade-process). First, let's summarize the actions performed during each phase because this affects the type of errors that can be encountered. diff --git a/windows/deployment/windows-10-deployment-scenarios.md b/windows/deployment/windows-10-deployment-scenarios.md index c67c06b664..80dc7ea0eb 100644 --- a/windows/deployment/windows-10-deployment-scenarios.md +++ b/windows/deployment/windows-10-deployment-scenarios.md @@ -25,6 +25,7 @@ To successfully deploy the Windows 10 operating system in your organization, it The following table summarizes various Windows 10 deployment scenarios. The scenarios are each assigned to one of three categories. - Modern deployment methods are recommended unless you have a specific need to use a different procedure. These methods are supported with existing tools such as Microsoft Deployment Toolkit (MDT) and Microsoft Endpoint Configuration Manager. These methods are discussed in detail on the [Modern Desktop Deployment Center](https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home). + - Note: Once you have deployed Windows 10 in your organization, it is important to stay up to date by [creating a deployment plan](update/create-deployment-plan.md) for Windows 10 feature updates. - Dynamic deployment methods enable you to configure applications and settings for specific use cases. - Traditional deployment methods use existing tools to deploy operating system images.
  From 9499b037bc5d0f5302dda8bb3929239adaf54de5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 11:58:35 -0700 Subject: [PATCH 134/228] convert table2 --- windows/deployment/upgrade/resolution-procedures.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 6406a51c0a..ce86001b76 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -43,6 +43,12 @@ See the following general troubleshooting procedures associated with a result co | :--- | :--- | :--- | | 0xC1900101 - 0x20004 | Uninstall antivirus applications.
Remove all unused SATA devices.
Remove all unused devices and drivers.
Update drivers and BIOS. | Windows Setup encountered an error during the SAFE_OS with the INSTALL_RECOVERY_ENVIRONMENT operation.
This is generally caused by out-of-date drivers. | | 0xC1900101 - 0x2000c | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
Contact your hardware vendor to obtain updated device drivers.
Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. | Windows Setup encountered an unspecified error during Wim apply in the WinPE phase.
This is generally caused by out-of-date drivers | +| one | two | three | +| one | two | three | +| one | two | three | +| one | two | three | +| one | two | three | + From 4f7d7f83933bb65cf2bf2998d3ac4ab97233e8b0 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 12:00:59 -0700 Subject: [PATCH 135/228] minor tweak --- windows/deployment/index.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 636b1fb88b..bf40abe0b9 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -13,7 +13,7 @@ metadata: ms.collection: windows-10 author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. ms.author: greglin #Required; microsoft alias of author; optional team alias. - ms.date: 05/27/2020 #Required; mm/dd/yyyy format. + ms.date: 06/08/2020 #Required; mm/dd/yyyy format. localization_priority: medium # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new @@ -123,7 +123,7 @@ landingContent: url: volume-activation/volume-activation-management-tool.md - text: User State Migration Tool (USMT) overview url: usmt/usmt-overview.md - - linkListType: learn + - linkListType: reference links: - text: Windows 10 release information url: https://docs.microsoft.com/windows/release-information/ From 4b51b75d6b7c7ac8b3716f15e79499d13a828e8a Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 12:26:54 -0700 Subject: [PATCH 136/228] typo --- windows/whats-new/whats-new-windows-10-version-2004.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-2004.md b/windows/whats-new/whats-new-windows-10-version-2004.md index a722dcf90c..632ec84175 100644 --- a/windows/whats-new/whats-new-windows-10-version-2004.md +++ b/windows/whats-new/whats-new-windows-10-version-2004.md @@ -207,7 +207,7 @@ The following items are added to Task Manager in this release: ### 2-in-1 PCs -A [new tablet experience](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#new-tablet-experience-for-2-in-1-convertible-pcs-build-18970) for two-in-one convertible PCs is available. The screen will be optimized for touch When you detach your two-in-one's keyboard, but you'll still keep the familiar look of your desktop without interruption. +A [new tablet experience](https://docs.microsoft.com/windows-insider/at-work-pro/wip-4-biz-whats-new#new-tablet-experience-for-2-in-1-convertible-pcs-build-18970) for two-in-one convertible PCs is available. The screen will be optimized for touch when you detach your two-in-one's keyboard, but you'll still keep the familiar look of your desktop without interruption. ### Specialized displays From 0eb3a2a66b18fbb6de53922922d5d42cfd2e2d69 Mon Sep 17 00:00:00 2001 From: v-miegge <49650192+v-miegge@users.noreply.github.com> Date: Mon, 8 Jun 2020 13:12:59 -0700 Subject: [PATCH 137/228] CI 119651 - Created article & images, updated TOC --- devices/surface/TOC.md | 3 +- .../secure-surface-dock-ports-semm-1.png | Bin 0 -> 96178 bytes .../secure-surface-dock-ports-semm-2.png | Bin 0 -> 34252 bytes .../secure-surface-dock-ports-semm-3.png | Bin 0 -> 96680 bytes .../secure-surface-dock-ports-semm-4.png | Bin 0 -> 68558 bytes .../secure-surface-dock-ports-semm-5.png | Bin 0 -> 21239 bytes .../secure-surface-dock-ports-semm-6.png | Bin 0 -> 48622 bytes .../surface/secure-surface-dock-ports-semm.md | 160 ++++++++++++++++++ 8 files changed, 162 insertions(+), 1 deletion(-) create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-1.png create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-2.png create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-3.png create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-4.png create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-5.png create mode 100644 devices/surface/images/secure-surface-dock-ports-semm-6.png create mode 100644 devices/surface/secure-surface-dock-ports-semm.md diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 27582aebe5..3040211666 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -51,14 +51,15 @@ ### [Surface Brightness Control](microsoft-surface-brightness-control.md) ### [Surface Asset Tag](assettag.md) - ## Secure + ### [Intune management of Surface UEFI settings](surface-manage-dfci-guide.md) ### [Manage Surface UEFI settings](manage-surface-uefi-settings.md) ### [Advanced UEFI security features for Surface Pro 3](advanced-uefi-security-features-for-surface-pro-3.md) ### [Surface Enterprise Management Mode](surface-enterprise-management-mode.md) ### [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) ### [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) +### [Secure Surface Dock 2 ports with SEMM](secure-surface-dock-ports-semm.md) ### [Use Microsoft Endpoint Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) ### [Surface Data Eraser](microsoft-surface-data-eraser.md) diff --git a/devices/surface/images/secure-surface-dock-ports-semm-1.png b/devices/surface/images/secure-surface-dock-ports-semm-1.png new file mode 100644 index 0000000000000000000000000000000000000000..d1eeafaf12d616351162591cf455e8c0a632d00c GIT binary patch literal 96178 zcmdqIQ*b3;*f%(Qw)N%zzV)4(b9=7NMOSsL zTHUo)t$LpRsl()D#Sma|V84C)h9Ds>toZHQ_t>w?1RC;dWMHe?^xHS0ZxX@+%I=wG zSrCcZLrJy3gNx&A0#i{0^Fm}67R_Yq5uyg8Nbroe?>wy%t{i^#8P<4EXZ=)K%>(1( z<1D?z7FZo6*q?JXVx&?37~{@3{d^AZ;tm8Bd{pjFRM*ShYR(4i`1Mv>TJ3`Sw$1MY z;QfCS{e-p+fPd4hV&6HsF4!OKed~RqB=pe)?~edOh5iB7W7c!*O{aTt`<$8I_yf%U z_mv0q5n>w^(|?aTL*@PcZ)}<_F@O2%W^1fx-+9NLGj=4v$OE_;qfIYXvqYM(p2a6) zQ&n|@0I5u)a>$f36*6MnYtEW4PX%z&%;5yT{?1;5TQV2Cw!L+i*N3<6_D5%}MM*`2 zT4(ohnHuQ)J!EXoBWD35ZR3MF`JgGAoEbOUrgXN}n92`qJ4!C&S}oV8djfaG=e;j$ zTTsp1a;y1>6J0w@ncS_PnVyeSdl{3GQX=);a(u>4_P!%tb0v(Q)TZSc7lXre+)}4@ ztpHcb*e`C3zS!vLjY(0^SbA7te$4Q=z2|T6cm#}AlwZB@w>*9AFXzwi5*-Z{5h*8@ z;%4?TBRh_aHfOO&5r|)94U`03s~dJ!FOX5-r?}1 zSE{P&{3A?$<0GD$t7WMehnp>fV;nyvY!=Gst(b~v=Z(jPLxP>-L*GD(`QJuPyEbT{ zz+Fsb<(5+@A79`doW32+eiM+Ef{i62>lCnOE}?Pga*m+#c9H@#IF2W$)oMgJrF5+% z(0zZlGp{cVgNcJ8zw&#?ZvEJ?^?kYh>>+zM*=hRxU@JP5yLthB20p4)Z3~*v*(8-b z_qgTkug4@SX(){)t6W|WwW#T&ghy<4z1e)+a`>5E=LcDXoLURiy`SE@CsFc^lpT{? z?7Dg;jo8Ra2IQ5L0%~>>Yj*i_KG1x<@zt7Ca`v)B#u%Tgvu^cXYkm{8MzpTmDoc`= z9UqgG6voDw!G>Ra z(8#E0ui$=0k>WJ@BOA!T-8aVn!en`>v7yLg-WZfRdvKW|1HIO^MXoSt2k zE~Sq)Bk+rND0orob^|}=6TO-H{J_t1RDa{ouxQ$INxmL@^qab%!L*})j%75d1-dq= z-mVh*4wa1&=)Qf#9Hnd-tlUK50et@)Ef{V|9*vO9f!8=1}+t;Ex^J3EMq3GVl~n*pD}9P)I;4tR5CVDLUXOtjOP+>Lqv zTl6~G+S1~m)Ahzz&AIcu;P(+~?*a#WuHi>TP3mjdbQiuO{p;ruO~BW?Efm6t(^n{l zkQxtWnss;QOd*}=K19f`pC1o3uFL_iTeN%A(ZY+LYC@}9pQ`5j#B3xQlUJ%H*KD`x zFI(~svRGFfl|jGy2ZqVROlb7-9wV>S9MyF?nOjv_@?tj@$`Oc+fl8{gwg?)oe3pwV zy{)&}G2r?Uvw7-c+(G!h}?VG_LQ*XT{ z+w|D}&d#9muiWMI`F?YQ$aV|uh1}g^|COJt*&Q!{IqB_es0KxYHL~YD9A@T(`iv(u zF5uOEAzY2sl7QdCk!&-aCmEj-r#1ukNq+{m%xI&*5#Q@UTYm=E&tS~oDKd@IKR;hL zFa+zGt1HmLr1NvIX1Ue|$?s!xiODp2d*yjfy>ScS<7%7RlPvgZX9+0K#+9n3pGjZ| zFGlxXG?=@DjE*mnQS~=P?-^j%1q|zNRHn~aACj8#i|9KXW$HK6pDyJoba66%lpsj; z0v7T@`)2ml_&qymvZjq=Wla(KJwkmQ$G=lTpMO^tkM>UmK&PXAh~mji>CJA4Oi)8q z45p3gKs*PR>f!#3msssl6wu+IpGmb^TjpP`yZt?+t1Zt&Jn%D(4vL=9Q<;e%CH_T8 z>-o6GS6cYm-gF{E$Tc%P=i>^hA5G3ku!d3heXOHWr#m``u%=|`YC8uQ1p7lzfL^bA zygI9cj2z_&pUXRSy~9;OQPXjWVDOV%=3$?iD=jU}db2Jo^(fVr8p)Oe96JjvEI?}- zah#O?1z1*5W;DD%#;c7iprMVoOV|p$)lAzINm&24ry%6M+rp3l(5FQL@TLWn(C15! zlXKCe_h}&|EV#k$ioyRmXdpAYI}rPPfCj!!wusYa{`;e#gw^iDr_yBV`^XR6z9)ZO z>262vP#Ni5ahlQkwfq*q!8j&1b9803`I`y9SGMOm-$mGhbTt!QmRMvZk zHs05O5_{!r!`DTn@pQhV0kMqQ(_Jh+gP(DlEJZ0@ypJ6kWa^WOFAXi!O8qze!1q*Q zAC~ro+8=*wa2`P{QZGIVKcwec(rrLh1GlHoBQbvCJ>XDe*xBxH4hK^?Q-2}g0B+nZ znf^!U)08afZfFAxxu9R+woMcxCd7#x^A?W zkY&b})N5+*c^*1xKYjR;CE!5J=dK(ctsMz3wJfvGy4xpXbd_&_-{(lovcj&}^74nW za-u?=8yvX|4kY}<9uz~@@GsySIRt4qb##NGYnkfk(oxg(LxtboiCU~p6Q=t!6#w27 zp*0B`T}B=_)J{2|7wPjIvy#jGn_ns*SKs8mzHMRSWMtmq&8O%( zu#kGuS~n&hj)1&_r@BB?o7--KN7V$ z$ESSnjR5NP1PvpyiiQ}d6wv}T^1F>qTk$##R)B|{77O04u#%i-Zide*uQNV7)15@( zw>O^6-Hy#quDGrntOP;{6RQa4t_5nLDpey(+rojJ!C$xfH`LhdrauUMp0sq|-x*f? zZcv^Bf=M~D4nz2#v85i*22snQnov|igIAqOR=O;}Qz|B&-e?r_QC6DuVL}*EQ@MHl z3Hje`x^G86QMl~MxcE@(bXu4MiGG4Kz>3K-7HDk5%d5)rUPjSREUhd`Yc91PyKvv0 z<@^li4rFLG+La~Wt6DY(XE!FNd|&3KvN8-$?x;8Mm;GY5i&>bth67O1iWEK87Cf3Z z#9e&>4iaIJSZvWVeNf1T@RX##ViFVK4d-T$;`sm279^vpu)*W7WcPGMFa`(5XKDx+ z3k+P3$?(3vwH#%jPrWSs8b0BOH_L8~0f_jNw#kPxRixVS-4kgBB{xRWqU;!rOfmGD zvL$40LKTSmYkohJBRs4hnQCC@{4FYpf_;3gU0r4H&?m>_Va_x{eQiuJWHcWVo1QLs z`5^*N0E&>pq`_t~LhKugF4i;9JDJMqMMs{>ESnRbep>c9!&`YCFeV$)ro#(H#Fe-m zP;w`M^LSpH`k6ncA3Ck5qZFZOWPDT_x3_j$NY7ctxzI3p^!4E1_L$J)ykI^ROQ%U6gijEr zKiXq|S`hQuU)bgA?lllBh|x)uXG$FcJB^Ce_uKgL;dg~SjwP5j=*2v2mqABs3< zes`zO>+<%Lqi1k>ZR2eu8v1^YM)Z;vf8oN@&W9zn(}9pcJ%{{VB^abR1x|17+k*|# z#E{=aPrW~3_kKl>{_Fvj=)HY*VSO=@ls{KNuxy^;V=AEoWq`TshA%{E-TGo^J38iC@$pV!&v3>p};Q z%NH_YU4rOuxuTK&T_QHxVbP|7!b9bAXw1^N(ef~|u(0rst0y><4saf}g;m?&a6O|y zyj8#0U3HE+$!xk+2Or``e*i*Q>{@S1uKjOJU#tWNR9~A&o9b0uw8e3k@J}n zK+Xn_2gn31i+9@cgt%UsZuS_tDf>TF-JgMc{(RpxV{uy?jt%V&q0y9H+V31mOv9_o@C0g1KfgO-A#u-{n(RKuEn^=Mmk90M zy%vx8!e4)Bd5d;&pm-K*{;Bh7{Le}j3?Em?@p#wzZ#O@YgN_}t>SOTvkt-(rr;u)V z&{9@RT6PjD#3#kOT(5G74jKfj$SLTfe@30KV^W1hhmp_cp7N5ZQOyL4GVOm19j%dm zEIy8)&$@JlMDOQm6xb$oWDcjg!;ALeyQBO^O?xndb8azzNleh4<@173Eok=6uTBEj zWNe<~e_~*)?sJDs{9WH3#6tELg!HWmS!72I4y7`Fz(B;~lvWpH4|+~xWzUc=S5{w3 zuhTTTBJImXikq!VOXqU?0HbI~Ito;Fbaa{q<#XJ5XlwIoN$Lo(&}8|KXKL@{_tkXt z%DJp~&?oDOnnmV|`4Si`xxBfB|Jk^G1(&-TQKAC!6U~&IN3}c6G5+sb10(wbv1AE4 z`v*=`>l17Zx{vi&c>MAdkf+>qy*tOQch`~|ZhoV0dOw@&H0s+_ZOZ}u0=^p!&1w4v zCy<-K6Py>kyeYU|0K^p~X)qt{jMws8jyaA21er|XyF9A5J@HY(uCfTdGZ;mtjT_I_IaZwVGaK(%S2L{C zJH{pwZZ`Uf%i|u+jWik59c=d>%An(I0vrR~esUMsoZj z!0eTl@zulo?Syq+Ma0P7uJ5mYV*E4-BMKur)|;(i*K>zgdU9QVHV^aL+M)uVu-I)u zqOPBHAQldYC?>`BlDxbqVkJ`+qZ{)?=2pjtZ@|}04)u;AN~aR|xavA~m7CSePfQy} zrq72g%23#a?fOQC?lnH4C)lVIW@Pf+P*T!&)&XhH20XQIsf&OzYOp;!mtcJm#?(1N8q}jmwIvW zYY}M;mqltZ)e(oQu|Ea(Rx|n)%h<5sUt~$6w5$6M9plsa10DKa#fOX?n;L`ll~*-7 zRt3zZQI4^(XWM=c@%T;(>2R;_bqc`KZ%8c+C=!+aW~bHr%fOss=Y1G7X#=zr;^d3? zdr(mvo^ZykInp=f!&Ayjwhce-wMRYbdyo5Y$v@c0S)4uQAe5TzQQvg_Sez)Y00Xn=K5FVSNhd+XMEVy!5x$NIA=Xd!KFJJ+<$GdTRxI$ zg!ke8v+rNQYhjj1&BqV}7Qh7&X)0rNg&4vV=R<4t8HdUHFMfAqDBWWz9W_oc|TE+%H1$PZb?tHmy&vMVugsux}s{5RSRK)~yCQu~z zs@ZAV8b&q-sYo(l++y(3Wo}XNvrL4hQ*Krm$JA9`TSH?N3EzOU?bhh0bj z!D{*IVIS1$Fh@8qzu({O11!dB%;@#sgo_a0vhb>xFv(NJ~(7LAvmKOm_2$e7b2Pwxs@ zGip2D?{FB?H#Az}q!5dfF=jo#8j+W63*6}>$^R6CA~v%DhN}}?#p8wXc&h`M*l^M0 zlj^&bJ^og3fdAxEaX?FP-q{bku8zdsIF?i%FBDIgtAbvY%eOEoiiSJCw!6GM!j>VQ zHRm^5C;}1aNB&otou)14wwmz2ie*QJBpt{yp^$CkAuEPm`yMH4(R2HPCBSBI8O0(1 zgKo<%Y7PUZ)AJ6mGK`-3*H;Q|=V47O0R^=PY1cYhAF51&x=w4=uDzhUTjOOzU}oa} zc$PF|n$nobZDU?`|GRFwrZiO|&M||DGl>Bt-Qi?rn+hoagV?F1GpPSo9; zB^y=JsGKsPd|})4=ButJN4TUkPNcG=#}`$?1&^?H1SP$N$qN zZBXMkY;slg?u1^umqI6iN}0^*vvyeT7FXGZ$D5AW?O?Ap7@DCkS;hUO@pkQ)&*B-M z;u(NFemP`nGqmffZ)wvvzbGmt1&5LGo*wCc_?|e$3x*5h-OY1L7s_Y=^VK4Lv`LEX zrwMhwZiJvc(2|jmzysGN2b|2}uy;HTRzliVgC4P&;<7{Jt_}!&$FAZ?ue35OoW@4R zM|QMbNGGE|rVd@^R%idNJ2-`$Ke`vPeb3lUr!IGYa(6xF?>Pm2()EQP6gIVk<#!__CVs)?#==PVDej7`m34L-eW zIp8aVpEn`xm^nVj^xpUX!7!b=W;TbLei%zj+}f41VHKPmCFY~G79`}sYCZck>8P`{ zri}V>P1ay&igg~if^o@_l`*ut;{e(31SLtRLvqL&$ug4OOUNB-wmb7>iup>n;!(hd z`_{6&^e?@@p{P3T>WS4BuN?dZv^lIz7xrz=x z0J1xi->(k7Wr%^U6bfSn{D7uoT|(QDg0CK&XBd>p?TRO(j?$JE)-pMFxN}#xOGUaf zGA7-1&z2Ln^zmZZ^}pEk3G@RkR2}@QRe=e#{Dc+$f~`N+1^>fDUotw}|CQ1Ir#$|D zG+{4#cgUc@kU7nvecc^IKTd(_S^^a_H}2o%WntmAk$9ZsG_>4kg4xX=KPzP>>-aXm z(vdE9To;hp=Dv?%_Lj-p7;~G{xwtB#J?&7ck&-2seLu zD*>b*dh_*O!iVb=OMY-&U0bVz%r3ZXyWuRR1GwHO}YD#rlpbNwm`i^~mpqf7ykp{@)hk7`p zAZdynmX}FkwqISfuw}YVTlL?RvZ{c|>Iqd{f2ZN~JE3B;B^?m)aH|4HB3||-amMzZ z?cq*7akaZ)#&s?16_bOS-ae6~ZK{SdC zt>9E|FodYOF*hWE&+MN5qlxW>dD|hXW%Y|jhsv`GrDR>wNlD6HpXgPv{_?LpksBUF zz@W5gt!7_!la$2+R_f=T^;@aD0Wm8tSd^rTQn7}QX#73)rd3Q=6naE5qxCAUV|-tG z_T8(%!-{5n50+@_&=riDw_ru54uAu13AYa#W@(c-tTq%Hp4+Bn{}V686`Vgqm4TSs z466WYe>3*l%v<9!_s>PMXR=RcxWeNECCka;z6WV_^BApqZ74`!7YoD_aWE)~wklVC zsimZz6HGZ>NT;se}UP$N|{!@{+r1FxZ_Wp;X*<{j8pjnknw)yajFYoC5K%Jw5z z&t)Nrb06}UbCTV7G&kSQvU14i39ZPlg8L2c-lU?Yc;Linv4ACv$r6j@d}Hc%czwvq z;Cx5q4vQ|Qh}DKopQBr6RwEO70&uzTQLOT&7gYDM11 z4SBR3k7R|`SYq1aPt4+?=E}hM8`Hrk-0!wXfUqx;HB z3v~|9A*o`~MS3-O(oOr;%bf|X841gY)`PNm5#0r@HQL;L7ksaEtGs0UXw1GK`?4Ky zrT2fAs>+E3Mz53a?&zL_vRM+MhMWldMVY`^=~jV(o-U}ck&}V>kpk$*kn<`R>y7%T z)nE*i2G}%K3)b&!Ws4{F+!J_fz$_mqxwv&NBGfO}ve}mUQvbuZCCdhP(V;s(cn?HE zA&VD;Q_H?o>(FOvnXyVuz#g3U4$ECs1#nC3J3L8qokF8#sOcMjxnH9q;0h}gr}JX3 zI`H;DaCCtV5RE2gV1ZHd0@rdQD4x2y?hh(s;!v)8l!qaukQT1#X72{nn$Tg6T9#U@ zLes+)h{69eu{9n$u$gCX&V`FGn!TeI#%bh8$sQWLpj+eAQVko#8tU|DuxNGvs~Hh9 zIC}dOl_s6R7D6p~pshiEGHp&F+wmnIGT<)SPq zArR8(A3aguP0ADrH@LNPG^qcj}~-z zypu#jdbVK0e<`8l;K_L#>x&YudPEUIID|R$i$LB0i?LjYJv%uNrMbVULWz9_TBtthC!; zQbYuy6Ve$^W_p=dQVrxu6}$P;w63ny`|@F0N$;Vf{~eRi)YY3M)vnz1{+$jnh_%qT zpkw$sBPE^69rw@b;M7{=<^x*Zp6yU@ePL`eWzb9uc!!cxWOZjH zg+hPt%gRv)Z;Np6(ggwR%ph@WpqrbyC8zX^{|$#7;URc;+Lt+3ca^0pk*5@XGWcHN z$*lP zt_C+N)6#mo$jIzAH0({Jz8e-7Jh+`zRT{h@|D_O2J`1$_o-##XdVT;NnaY&n{|r;9 z(~i}E2|Axp=cOs0%91lJ%p8E@?+uC07I_vH6Oo^GBjT%9vZ&%3npM%F!r=;#=!0Eu z_QXy?IM*Qyle`>y67cA}J@Kpa`3yUqbmwwAKy#Tm$nDpqG?UHhHFoizor-Sy#pQm$ z>>@U4FRWWpz=ZV9R(qJ%$p-QhY-rYwTU?Wx0GY=X~ zN{6Ij(9Lb`Zo56uLWsnn&)TbU<0k=>aO@666Opjy8iQ!PPi1JdyrqF|>}gDr8?UFE z=CuKubVi%aE_eW?p5ZW-+^TRSeswTrd=EZH7#Ntm+{0yZovnyjIg;h8Ucau+wGeXP~x><+F`Q zT)>~BR^bc3D*&j9O_?K|%XjOihY%&R_ithtY7LOzC+!J+cK!fd`P%Yq3_edV6MGa@ zK=SguGw-4%A|W6`vxycTcWFmgq*z@QbZGqXe*bJNeNpbUL$*=D9$>t zsX1MVQq1vB?7M*f^bZlUsT4okt;$ZW~Nc}-1PC~ucOw8%wbOgjiU+X?_hJf6Jk{4yhCN{aH)8YmgZ z=HfQJzJYt~$F6x%4LnO|Q+2tIIlk~hqb`1x&8bKcoInK}j46#$E`ov-0u`hFjfZx; zfZ1fiRISauHA+(ItcNZ>ifpSuOj{dFiJXAr zThl<-)sc9wV3T^K@9{tb-)v4OHy+@eTsfd6pb8~P)U?9%4OXn#~6{3&0 zJ)hZUaZ+aM^6#k~LsnwQJ^ZO7Apz-~rZDdD!fyaXGZ!0x*#@k|VQ+94FzJqw4_u|JS4pSRG8g09*HVDV5Rkni~j1U$531-zNe#kNXdiqA}KFDDqL}s=W-91I7Bc znl(B=3$v?#iMiA4ZI_iz$jO<_h$b#E{@KGfUDUfE+l#q3YsaMPlk5E({|p-=7nO14Fi5 zTg`3VVpkd}U?xo6@)pXe`F#Q#plIFS051qQp%=lXltVFd=O>Qi=eK|Om#1kDTuI{R z(%5YrQ>?~qY=kKfSw7>qW(QGn_@8(;v@ZTR?%sKdOH7@mi+bgDqwq|0ea|N$spGQQ zx|Ouy6~<+)8A+mX=9angxqq?u=xpU)mC?r_R~u$bo51Qdf?0B_bQ%?$4ml#T`k^bA zTb3se$)W`Lah^)urcK`)xsBD-V`fgp-#6;A7Ai48yhubzODm0I53wOvG8VAu#J2le zE0!!in}?mc>Xysd;5snSyiNm8k@{4yrYg&#k()Qih-L8nCrfOHxIXUAy%sX~!kJ6Q zwMRf!{1Psn%m_D*e(pLHZeb?V+~whMNJ*X3xgx!CMh7(YtykSDZEL3hi*%*JRFIMw z_mr9*r;JcXR%EAiuh1SIpJU}MXdt14amBb0%cPYroBjquf%JBCT8zT+5(MRL|Ix>L zwdGUTk5kK&*$S$jq)W7IfohWsT3i43&_#*mGzAWi%lzkO5}}h3b6rkV@u;S$T)6tUO8#b z)FF2U^v1kWrHWU*WzR*;l~z7mz^Wd=(7C28G_X&DGB?)_N{CGrzukAzE=NdD;HIPY z&6$_@@k>4m2a{M~1mv`-eK3(T)d_Wgf?94eASM+?k2N|kVI&a~le=y$x|p|Dne19N z@ngFDo$798Jk^KrmcTbPgupkpcN~}d$~B?U>6GRRA(>m1lTW`G)8n$?N6gdRr<7IL z305FZit}FN*0+Z<=m#f3bcEkmETLri$#nmVCTfzEag@dyipD#S2NI7{xwv+PM44T@ zJ@eiT7f5HZmK%L@h`QUuqEF7w8}Ve5qZC8Lr(`ErZ}w;3aaix{;rrrAGX^Bd)ZAtS z{*R{zu2sFI3JwQH+w@|)s7mH#Go3Hp|S z*0Ulmw3ezx6Xrv_iskafGd9Xn?*`uFzV#H zeND^fvY;jETrg=H-BClWTM=*z0W-M#a2)r!A&y32qb~ zJN;|ui|cgR8`>SAq+@1XL@bRE-UyQ?2JjuSfzUg3d+tE-^#S*7|DHo4Dkit{3|44R znn-^epVb!=0C)B0HGdT>tN8>fJxQK@A0+~~9>R&$)=@~VRs(zKUKQ=~4bI{?F7tSKmJPJeMl zLIN-ea4&7x3fMH|h8|6ne(zo|VmVe_n{xND83(fOZji2Ggt{jW);(O=o3vTDVD{fq#C9fksDy1B;vYQMtw@eeQ zW<8{iGKyzX&Ph7tpj;NcjVBhXGb3C|Rqw34|0L>BESOFLe`%>T2Jg~6&@}|1WrF_Q zZ}_Umdete*n;r=f2|klK0<7e*xL@V!SPw2MLeLOL7J9kYKj!fx2NEGAfdU4xf|bKg z)FJOiP4{2z6jy3ECQ^QZHMd7M>Zn^MZ%L~of(IiSEhN9wYFP}#xb@Td=v82Ivi>LArsvzFpCm{O8PN-_i&Bhbc6kkjuATrK1*X)z1~;tR~7J)SS-<%iMiDKqR-X&i(=CSV(j!4*eaoMpiV)ONY8m@ zKuhJ)`)#s*k+_)xN(D$ZjEsQZk3Otb;2~YcZ%0)m6eGbpF5W`p{n*5xQlU)ps?>ol zsmQD^jGlX@TMo+#r+vc{Q=}ksA{y!dssNM>t-;#3g5$It8S~QbMI`cv*gul{dJ7E0 zpy4PP7%+2&!nDx^WqrTHFm3DXO=EvG3yh`5e;K*D% z2jaY7c~%?*rfZn~A<=>pbu8GJPzrK#Y@<@$`ngT2oSvVtaxzoBV2Qp+%uxdIbmOIz z^mHk$&|S(k*VM;*d!_{n>%41YG*t1cL4C)>e8ALeR57>36k^uDsmoNXICP=~$VTpD zFkvIY!66B$@w08N?nzgn;);rjR3-lutD^ZoxNa@koXd5eBz;qMeBy- z6=r^-QCLK2rpEq{Y)sVZ7?NC)QQ3ie%K4@i(4mtfD6UZZU|P@lAHca1*@ zgrsM$Rv#>bThL1@Y14V%fQh!&8R#82?T#F3htO@V(wK~MO8T^y{E9|gaQoIo)JI@i zv~1vspH>8}nI6mrNpbS&@L=VPjTXTj)^YNCHIj>Ugh^qJU3teL_jk*C#|QKkFFyE@ zqyf^_7A~`hxQTtbb#?tzq;br+Zu<*RL zylmHs-C{C43>E~0s2{xa!{D;Vy}j}--oFp(wU{z$*me1flPS`*CO9DG>b1sM*;%(? zS|hJKI-WS|TUut8=Nc}-UuR# zJ$($=_w?4~aP26N!uH^^&5W+_c($;!NgmyMafEH(X9&iu*^}(wel4NeC%L>RPlpc?t-? zf|!Hl(j^^Ys(s5PqtA>V{aJ=he2*iZxtz@M2d0wQ#_UI%p0aE*fy!gCVJui13|PV^ zz1LmV%k4-)%6O3EPiW=2ORJ~QPvCH^Rs2rIn6H*JZ6JMvxAE7bqzp10XZPkE18KYk22RJ@*P>S%S;C#IG#bO+d*wvE-V;^k=Z)84+31sT;fsd4qbvxts5F@z zf*$DT3e2t;CZlggkeKy03n=v37NY)8GVUmklUYH!+h!9xLH(GBM)EbZ$8h^5gx^8?88r>K0_G%@J5ovN$D>xc` zzHMBUHDdIVr|`nn?FHwef@yC4$b8@Ju}2{$HOa zq5p|V*w>~+DKA!d^RMrg5%lwJZ#;V<>hes4YF)@?0%N+Vq7T;&i zs?}^)Qd8Uix3lYHQu2&dKN&^j5w3T((~w4kM+++!bd;3Y;u&@z)jwsoFq5&R-Mhc5 zKL;XLoI(**wi(&#_X=W|yb{UCMP{ZAi_*h&q$2F)Q8@F11{}(U|XjXzF03gn)E1cgy-% z#MuCccEN0={*bkSz|a2>crDY3aJa0cDJ1kP!G6v=c}A(X)n-OO%EELKJamJClQsN) zOL%x(a~8Mb8%l`?)>{T2_?CDW3beVaQk}b0JS9GMpATlf({9icIq-Kn)HwC z8;H4<8@0GR_MqdAgLtn&5ol(?b&fNJ?c+wu27w_|TrRXnv{RaHaX00V;o)#AKm(Ye zUz+YmWhEXbX*B{`5E03h35qT0nssiIMBedEA|b5IDh}6oFekK*1YRdFibgeVX1fVH za#XusH=qaxMjv6h<{BO9thhBTYCf;HH{xB7533ma{k!jonQ((mdT%|3y|b@3<1BIt zi5cQDK3S|hr{RQ7R=BQWL$qUuamMjwE{SLA1I+~{yw5vJ9tU9|;!@%HUEPsQ84t{^ z7pT0iQFbT?)n@0(1-bA=Hy{{GX+XC3*D0K*Jn3IU4o-Sx)&TElA-KwP9A!cyO1@&e zDH-cq*2V4he@E-}ss2i#s|=$NA1O2AR4eaHi(XADO(~>e^$s@mxOUmCE0&*g>$)GG z@_uZwMxU<=CxG8+5}L^-{Y=`(!0f(vQ9giWw_b6Z`?cTLY{U#3SIPA*;IeIQyU-b~0s&#dndHz(=1(thuJ3awMpuEE4_HjrpRR(*5C-!QhU) zp^VgbGM~KSn9UPos{4tgZ3cF+8g3ML763uD3+Mh3WQHvtE2HES!0P@ah72oguca-E zN!`|Uyon4^Yd?)#w2SoYW=gH1vV`uZy-p(IT5v?n*;`M4g? z7ZRTp7do|FaPy||Cdqb>ZpNkMh*Q!xxH4xJDn3j?uGts7P*L}^7f)DSO%)myS$K9Q zz;3q^G*=_MxUHsc6q#@L*)uy9tE&FnP@8H3gR(>}i=4b9G(R$zKTjY464_?jz|DmX zf%E+PrexgR>8938huNl~po=9fJ=L!oVN{gfqIeWZNrvs(W`|=*IzUnJ+^yxm#Kff% z!Y&@|1tbE#u%B%a;bU|U_r+)T$sjlLhz;MsT5j+J*8gKC@KT zQ7Y=%y1jh?`wYYh1xRepPpys;w&PHUgmll$bLQ1S8m<}D@=NA|RdmwBR25bMk35n$= zkPZk-$UvJN1~1GvwLx=iZ2e(n4%#ckDj%hx;!zX0j%6al>0DmTu=jj7zCR0UsY0-E z=Y0jq2I2pbFmSKzvolzab3y(4v zT~B2^e09IzGAQ}a$nQKwodzdJ_H%0Iv%h*K7Q@i0)E?&v>EX$%1Z}UF%!tGIp+RF*w|4bJ30~k zyF}qVcFht4SJxf)IqSSOF?$ClOR;S4>TIxJ5e#kiw6b0VJx$iiql}o1UGiT)3!Z|v z7nsI99%L3Bs-HbJGpF~g%E^u=XXwZAMqbU+JF4+n7=7E|A)%vGWWU(5ACe(0PjP1~ zlhE#lji-ubSby{$d1SG+djT)eF-#r*-8#9mhEPbraa3^w3w7ffpQIYc&r+vw& z#%vV(V;$FrA1NmRq=iNukMH~s8{pCnr}SqZ>kkjiUFYLG?73C{Hw*AUaxPh+Qb)Iv zOuijmM=q7j%H=4piB0hitZdH==Hiw! zpN}nd{S}sKp~<+6_|XD-(6j}vy6<_J%|G;% zbdSxMiHVafEw4nux0gDc2)}2_68fe4*KsKx(Rr@xSdlQ(Ey}9Z_?;UJO+z z{~z|=sv)ju*&2~^6>XKm zi~7Ao!{VIIKG7Yu%(l|;ke#opw~g!hQO{buE)|VuTgej_mIYEHQ%BZPN-o}d_ao{z zt&8j3e&1hC7wy#NxHzSAyB%@wI;%u0z3b|Ae`0f7{DADRTD|)l%-USpVVF~axLRqz zP0#DiYZ=sI+w$u;ePb+&9Y2RGS@r7|KYfz8-8C$Uzobo1ktXaM_&Fv3F6 zNncBm`*Z5oo%C{?59`p3BcycVDGR$x!`s`0jF*eW6e_p&rwZ57uu+8eJNozc8~xo` zm^@Orn93}<5%@FDejN9CnK;nXV|Kiph7%q~%kTyqYIQ$*A2BWPdV_XBhjQ;rQ?G~U4WD0Y5WE>R+H6YpjMaIXNkO+HIWowyOPb7#YDL;= z+ijBSI%tsD+J z9&9-T*L=?#yxuz*knB!0=yg8^nm!mOHs9%d!H2$rGf;$0nN94tt4$wMnXmIje7)iy z4-`uqSw@4=x|o*Dvyx=98aR~^*;|#Kmj`v(Eio|&nF27lF1YPstG1lE5JEyaQ}8HM zSeVqwR%J z*5lX9`8E%aYrAUA{_(7*zservH z@I7ud8T~0989=4}1gqn)3J-2om%n=OeKPoj^v)YvS3Uc&SG&H*ZQLKMKJ9pC@3@IW z%8eg9t8a8Wt6%QnUA9L|zOSo4K5p52aHXqCJ}x;b^2-4oF_4gO82_9Jf|Ii!wH09k zF$wTd`%61Y6%9UT#@PgDl^9TMYG^))^uFxutn|Sl;v(aB^P2@qk_`zQ`=U&IY&m?M za;mThaACFQFpHJYgJ9qbCEY}X;WB!`lMi_C<0htmDYxx){dFuK6Bie~-@(Rxb>}P* z^N0Xdb#?jCUr0VOlK>f}zx2vmf6nsmv?NiwM~}-EGxR##F=!_x3s-gbSq+b+Q8n&Sf`xBIY^g2G^d-$fV=WaM|&yDi`?Li>+Scf zQHzUcBrIGwco@t1JYK7Tn0g-Op8x{j3G&1Vmnx}0`N(7Br}_B;*(YRh*QP*48=CX}m5CeFZ2HpvsdVJ% zL+DLMHQuHQLKE?Ne2Koo4DZ+M$DO9-8$1=)p<#$JFfi8tJv2Pm>@9~HvswAL*=c$-WQ|iJPYF+P>yTY`652gH9G@}mFQzID#Bn;-}K^E*FQOHz~q0-;}5dv zpIR*F5f^zKMTCwGy_9E>{CPDFx#D}pf?oS5+-{E)ClC-y+7qLrwPHdm5gB!5}%CJ zzB=Q*S9hOl3Lk%8k1fA_yqhQ7VUc*hZoy~BpO0(a4>d-f1O$&=kZv#Q4?1y893vtz zp`oE}=seFuuFd3~!x}`x5pkb~7yBYYqZ4L|5%Q`Tfmnef%lb>+x23LwaR_Gbs!-j;dS9BSol+FKg>+N;q>JwEN88ass?Xx|3 zyxNg%$M1fx$zQm#2W{J8$_~25A@KbC;og6(*bITPdzVC5)poDtWaJ&?QCAbc@TULt zOFUX<@WuD#?R8K7ZLXA!nO(%e_Mh+iyV+!>De>QPNW1Nir#Nm&2Z|3luJi0ya{i|} zP|ulh+{bP9J7CB4Q(QgwzcKIImpAe;e6kOf!mlU3UhKT%SXn+-qh7Z+n|qnA>%-tY z`9E(~cDwKV&kQ^+9+B_Y;!B{WRQ=~Bez8|h6&zx?Pc{|t4zh~XUH`b&DmVR#0+0$P zJ7v$z_u_C4xt%6X`bnzPD)}jClx_1K{i6MedV>GC$@+A;x9Y<{*C^$je`2`iS;$D< z=hR0o17~}U-#hx_<2wPlz-}GEYgPNT^F!&SJn#J%-&_8796Pu3^VhbI2ax^kuo;K@ zMaHwO&l$wWRex2TPf3|C{{MOqM5>G$D<%O>o4Ihy^Lcjw(3Jc^ zxG|6aCsId8M`<^TJYP-D&uxx76CV?oXJvW3UDl?}&dTwJEH|MyzCZJ-r=4}@)CQ#i zAFrEyLIt&5+;;1e!oDAeUIqN5SY_#hv}K*tli9Bm3^&5Apol77pXkcQ)~VtZd@YSd z2A}IgpS0dKPwck^yvtT3ZP&3w|Nrd~{+;KmExXa&DQRg3+M8OJ5StyI?7ml!pvl4a z9R|k8yUP8Z9paBeK(=DG{@aOq)ysQ{owvU_=mee5ev{qpEGGmLH#zzdllPoUXfEU! z^t5xRk-;%8&UedHzCq%3^&KQku84u?z`0LY9P*|Xfzjie+!I0YItV(9qsZQFfrpL$ zpIByc1^77FEEWU3t%AtJ4^+9=oELT5U)Djj78IWX`F5?X;qpIM5|~bIbewi>cJ5*i z$n#9ZfZib8o^0$6YPMrHUmg#e*&v%bFCaOmP{09mD+s(%h&l{&CIwU#^oc{*8*RAx8zGTof zn$NqLFA(9q>cd%++xz13J-Y3(CB&F`!WHzw0f~UOQmtFTG58sLct->yPpd$F(ZI87 zSD4)Z9v8#E!i%6t8yil1&!ewn_Z_%LV^>QkgB-8n+SAe~JT7Mtkao>MSqm^P!SkZ{ ze9s&$7reN9)i<1;a}JWL|7#}lnJ}NdAtX~%v!^)MH%5Z@EAgTIoAirU(C66U^_Af@ z_xW|v_s+uSQJ3GLf6bCgfEY#XKN-Sgrp^XO|KoX)quQ6>_iph+98LCheDe_w|80Wg zGvG6^vi67V4nFnizmthqa<|j+yzj+)Jcc9VON)dBe(C^e(!X~RZ@cEwCt3f!K!3-G z;Dh61v+ASuInHX{s#R_aax}B!uG4&fH6qyMy>v&& zeoLRcj)LqQ-s<|2bvZq~F)?1%oa)-Xi?;?|S=5_uVnZhU&+oMNy5`kyHXh#8H(vOz zco2|+`*y&|W9O0o<0Xz=1q(l0ki$NwHUE8@_h-&HTL8jyW>36oc6T8+kmqw7E163u`oUL_)SRoJ;>QEy^ z3^qS+5oxWi(BEt^;Qwb71?IUL3qxt&y=dcfKY#_|Ub5n`HxK>Aw-+T64W|$C5H3Dj zZV5nm-6jApaBsSZ>YDv0Q)d~4NBnqSpL~r(#z&SPjzXNBO1dZPJF&RBhIN4^V#}bc zvTB01dI51@m#O{$ek@=E&R8k@$Q4$i=l&(K%_$i2l;Byk&ZIzKG!Fa7%vnHbe&`^V&21{g+HbkFMS?Bhoxok)t6mgO`6{?uOhf14M3l};?U zL3^MxW(QMfYbS_SW$sSmBl?i)yf4;YBvz6tSs{(g z)+kN%RG#$`@%KM*i)RqCHRq?Os8M??z;^q^tun*{+w#8SY)=nAOpV(pd5pqP^JwZ% z3InS)(?8aXR_7aaZ@1Y6j=^L&Wy_aezLAaBzpdyra}A#B>JrPceOLV6~mHH?7l_G}ZM-VE!^dO3X zQ5Opw>(%J{>90WZPXdQ-6%6T9CP8pYtKx%uu^!v)LHUzsUUB891t>1SFwdL)9$bFu zYqXuSmxb6@U?CS6=%>($cRWc+i;kI%sjg+Ft(}e>Iz!6N$~oK{!;_n3rjvG=NG1L8 zzEIovzl{uRw2izLHorXCUr`4owUj8DPT&`)rF4fEeNGBgwMLig%p{AH&iMZbzzuxv z!1UPbR`NRpGD0y`U?w@l?M`M8CXdgquIBZ4Tg_8{7Z$esb9!--n^%TYWa@ZULSbQN zrM{i#5GzlnBqJ+Z^0lh2F5&*3Ej|qOd%*Xx@$u>T^#U2Y!;ncDxRSP_bT`^Uh=}_2 z(dGLK-Zp#Pm<6EPH!Lk4!1&P+6cf$Bgl?O;rLC!p3$WYIFF3(_zuX59b1U}!RqXr6 z$o&qng>^b~e#5st2Z#g(B&Q^Y)WQRDy}J|jn{zww^x3Y9U*qvBz|JE;UFQuG%EmzqiTgT9{S+muy~o(vY|AMH@QsJdFMG_j5to= zTb@qIztf+2c}7yg@ix4Z>TjwxIIH%UcsRX|-stFul&T{m`2|#Uz(Uh2!*f|p{55B1 z?@`lcXPxLT&2IF=1rgd6YQU5RRsUPP5Nk%NP-MqDu_go3g=GDjxM z?|5?~BP$;_x}WGmbbeqamraaHlv-1sc05X1WZBSjJZr`zt7}1#12y-B-{GC-Ei1wz zC11$`9RoczJySUg_E+n6AXqn@s}ixxBO^XcK4rBUkROy z#Vs1>%daq9sI4GPl_>=kVA)z*C)U(3Is1&@V*EUc>Yl&jCF}ZU`yLN)eo~G(`32@h zpfN46IoL@yshe$1`oOO76TaR2?Vys&|!gnnzdy>IBsR+7h zX}>;|*v4X`Hyyqs`J{h~kP4`6jcRHa_?yzN17W~dIM=iR7Hk;;HqX)e#x4cAW7Exs zFD7Ca#csam#EUII=>PGlO!%h8ityD@BwUn!E4)1`_Sxb=6Q45>~m=UF2Z;MPj4 z@pG`;vZU#=s}QIw^C0?ndi=4Czi;MsRLDXjauRMjFRok0J|D1ya%8AdWg7V&Pq^kS zqg1Fx+0wfk@%HV)26s8K@^J5|n+yX)>XygBqRe?`s}%3iA1_6d5vAQ1l@+NI+Q`=)@&jqoO86nm(#Tos{@{MU2Z+tLEpdWJi=r@QcL_ggqmRJnlx5Ei=5y3m-+uIu{vi)65N+?B2MvB5mHCUwG zJ`BTtp#pQYK6p8uwW2?b4#Ne>YG5QvZ$Vb?zG0sN$Zbh#X0a0Fvj`RI;T7H3>U%DP zF}i8#j77$V6|xw_SjlZ<^OQyV(H1f9tM8I+H2_m{z#&bSbhGTd+~J9Um$^O~P@BQJ z@t?`Vd1V`0XUgGM+0DlRNjO1EVkL=N>r+MYGKUf&>QuvN-M;Ytr4~mD<=NR0$ereB z2M+=sx7g?jxoCWE5erm2UEO?T$d6~zlSYl#g7FKpe6%DdB$^1$Q#bc_&hc^;WB#^f%T%vY%4By|rpJd^4{1M2E zVA=0Oflf=x;t0tu3YdgF<>KhxW z`6Dx07{se}(UXl@JsNGYWM5!xPH)h2kj3_S6%E>@zlmtIe#7RAqX|jQ_)?N6^?KB{ z(LX&%@WIEC9(tIT7sFpuIT+*py6d&&`-Qo;|dGQDJ$8gbS^ zhlyBfjL@4+tWH?*&*&OrDndn_7og6oxOjQ>CPk5Ctz(x-$m#Be@rKEPm?rs5Ezu;9 z<`qm~%}a=skbgEG!UlK7CdbQKb!kRb_v<*x2on)w`MxZwvS#T_st(2;09H#%CTBp* zY;4_qefcY(k`he|oPI+^xYBD6`FYC`EC#&G0O5cr#4Qi=v$NZBWG^K2UbzYc(s2F89c`gfsQxwz+G_0wGP(c2S+i6FIAe~K((aq{Ov$g?FV z+UyhRU251R;!K0Rw4n))A*xhqj>OiRh=8(`G!3oKTNP)wa0GoLMWrL*M+2qaBm2yP z3hcc(4%h>U%hDDwa5p*TJb1^+EwOpIRFLf~6~nRmst3ZI`e~IufxqA?5lWrMcYDh9 zw2?cbJ|xfmEjvb<+w(c~De+sB=5-lJfif91lQo^*=h`g?bsE?>YUX%R@0N{uf#t8X zZ|W`9YN=4pc^h&`UeH1&@a^$#!_bJD*#ot(Nmy-r%UT|)D!Ef8lvU|9anidpYV-4( zRd|1r?>Eod*&@U>pIWlm(MvJCy`!!)ym@N2yE>MiY@9A|yf=!+k!gbZpKmn1vuL7z zTCEqBUDOrQHEAQa&&Z$#GAJ+!*ZAFaY%3(a|DfUlGPlmwV2Z;NkY|o=t5|b!b0z)e z@V=%>;+|=8jB$w1KE5pKXvnO0&>CctNsVBPIDE|TG}YNRU}<7!V&sX`bry6))Z(QO z4sDH9AZL*^jrBBV=I?Wz76~;V-8<4nVDAxlBqI7MbfbEmm!plD6Goo^wNIN!1X#AoYEH)-Hzr=I*uG z4=YsP)s_4}bAdGEX_ZbY^gRa#SH~HXlZv@KCF95N9}3ODviIe=ldu$KU(pSi@g934 zsBzM)*hRf;${&7X|B^YmsmWpG%{fYeNfCm7Z3SuZi%(-w=+>F%J78J;${*K!h*MA8Ehpd5*u?p+J~BJ^|t4SjxeQ7*sAUU zslX>%o6`^2#4p+wz46eVImm`jh3(A31t^l%n?_wF%&r%(g1?m)bU7+W)_&2gtIw`< z1Q_kUK@E~8L2-1t#n156H((n#;K{(@`Ul25)qde74;?4Bf5VQD#jkM#1WPDaCQhO7 zEz6+zG)T0t#l)R;OC3lYu5=C6GV+TYp)v-_o1;wwplPS0kI5tsw5dEy!n-kvFA#5F z$4aB)EQ6+kT9A-ssmgV-QZ}W=8!6FY0_CC@5B_0wK6k@i>Bda4EG;_6b{^>cEHcB& zN)a(ft53=Mc`R_$y#Iw}Zm991%i=W1G~J1*i?1zx;S&wFVLw4`R?_ly-GBj_SA3YN zmXSk-us4dkk!U5o3)-N2pig9Szgib(Ju?@;Ue1ymR|A_%9i*3}!S=6Uks=ue`t~o| zY|$t3hc#htjb~p8CIW`{F-NjOE5BLcpAMZt3$~4(zsQK8=cWs~v0MFayq%?*;LqIz zSJPQP%~3h+W%nzbR^qvSrAp3Zv9iGtgKN4yPTUgqz>=#tYiAY#^@J6gUiP= zx}-NN%k@hurvEH7X?#2s^4clDOIjrs6fdiqjOv9yB!4epF&V;3)6!CLiivy=r7*N) zI5t)#3R6zVpT)Y%ot&I35mZZ4GBz*FU|IxZCReHpYZrX)^5_s>-D0;|srKu%=aiEM zMnPU{6}-KHDYEk!;z;$WiHubg3wnBIl~KL3Me>NxW|;QRUVaz_NJHb4{+4!(U|t{M zu@Mi9JVFnMh=ADt_M^_fY&bU%zpb@uTj0TVLT$j_GU2QimOPV5j3>s)F)~Y+4wYH* z8|R}gnMOUFVV2m0)b5;8{ef%1{OF?yf4*hCvGyNRoA7+bRo7UH4L{JK2eo_mo>2U6 z2fw9M``fAh6;M>lf+Tmx<9SD9cpZx~OWgP^qn>j~q#TlC8e)OL7?{O|PIJc7b$bz> ziC59I(Jgw4I)}^)b}=L+qh6KK%*n0sUPt@*IIjLvM22D7|tMU*KhB((?it&XU`4UlX28+SSE=(wAJ zrZ+br>3qQYa)3$>c~-ve^w~YF{i_(LrfV-H`VaN3i^_3(i%_nprP2ABw3)j}WAZO{ zfE*1;p3#_BM_->xmyS>oA_wZN=t?Qmb3OSTh*;Jm1RkF_K~9;HmRfoD$9Ka_iSO=l zB=ch_CW>)HF;T>SMp`f++E0>w;yf=}l2>t(DI1bng;mO8zG(I46$c9O3ai>;L@_FP zFXQVpty)H53y!)hsy3?ESmUU(9g$J2QMWl8{jtHkNuDr!dJ)TJW)z^;Avxbr!Yl+> zu&!$B=%^sE%?$9c1M-+H3jQ!TE2k3W@2b47Z!DKwLmHzdz|M~yT#rOsX&eN-{Ig2t z90D;)c;29xO;nrt;NM8=6Q_nbC}mDJ}7$hes;$k08#Wovm>dC-ASzR#lhE0@SSyBS&JY@a09gwUz(a?U;_Xclb}wK`~I?0rLMgJel^di%(htAO@h1 z*UjY6CxSmJLu84*9VyL5NxX7Ul8?TxOPne9+k`vi&hy`#ytvCx5O0{6|9zpH!~A+Z z#EYb7=A#yk@49_xjt)bAkQpW48?WgE+zzeF-_+h2mzh?8d@z;&An&&(e9~#+yy>*` zq$(0~i0`3d_M&01^v(ZG+sBc&s%TR%y*VsY&4OK5Mf~H!W|QC_C2A3|I*nmc4dwAA zN@4Zbq5Fh{X6Ft`HA*GLroGG;+VIsu{i6GOi8VJf6Ev%Z%oa(n`%hWOD$zy>!=@^R zN+lXf-+iR5B4)yIS5;GcnKJ-Mu?JAAZ zp}1Elz3FveZ)g=5p~&tS;y;WhR*m07D^3b>IRcK$rEKd)(RTWCsVVfPoFm~}*0nVH z78LFZBZIGW?KLd)aIo;n$+Kg|)KgOjXwaaHDO*gDSQ@s^qjn2MAC>tcSYy!3g4|Nn z@4d#eDJT~htuZdoAbvFFu{#?A!;c~&+T80zchVVWtIPDOmH|EK`YXTnq1c21VJYMy!FyeZw(O+bMk7Vr zYP7URgv86CK$-XcSor03Kq%OpW~A7|p4Z;B_>WG^_SX`~p| zZZRKNjMXXe(6K>5q9%OWrx9K?*E1-D%Z%*VCSnem1VyXv~mBcRj)r!(V zTELN?z~v$!n)>$?)SuLzYH6gOi)z6#>0J7f@*zlqE)XqTc!A(UM! zFIcZCrR-VO5AYi;g*L}YW@`~go1{q*J~R7SEqgV5^S1f1aG1_&M#w7Dt0JVckT+s_ z@?AzD1Clq$j?~^$DgVKSB%MWb3_*!bHo<8(R%RBduA0)mk*jE|Z0=h<_?IM!=-5&2 z9uP_jt-cV#pgj2-`MsQ9QyGrq^gub*RzDK4Afx)1PS7^FP!h;lE20`x%G zppA_DlzqIS#(CuMw-b{?_TDUmuK-f=YyV3z0-{jQN27EPAH+AYw ziIRPB7U5M0l=%Rb6>%}PlU3m_#H;qdncN=pA8F-~jkse(^n3a(mONn)LlNkj(h_2Z z7Gk^#4SF1^#eo!bsri&LNp!e%GS-8t{=%v%N!wWF`LkjjJtcDrJDesz%NWwWAIpe| z8Wl5YtShX9WkgAIBe4Ue#4s&m6HLpTNb;I(g}wvON#bNmI`?Tse~}4#^V*OF8n1PZ zx!9zb7y=7l(R_?D!#o~MIx44>{s|CUl-%6ol=YJ(`sQW15>DE2zSbJJ0QMUR6->)C z=t}})#zbQ^r0v-m*nkp3K`+nT44`j|?wzY4h*zO#EGm?c!Y&>{?@oSU< zb#y5KKZ{oN&YTi8n=*&QjcuDSPi1a<3#XshR#90l>MCC$m zSwY_lAl4xt)dx_?l8~4)Mf@uWv22n%>_%rkE=$o!$@RL%x&^R0#R<*I_&bD!^UJ;p zVBA{+l}n)8S7>WW1<6;%dLk96Ehe1_r7oDz*!!Kh27T~nfTmGxDkj>5dB5a}8xk9fNNd7AQW8Q|e`lMjx z&BR82<51+2!3JAmB2*5m(SV#6vkFltdEbgUyNnGi*qxA6Hj-eT6_O!MO~6az8rFcF z9aD%dN^FsG{=K1*_ybAl6Nh(PKww2+b%)}9@gzIl4O zs>?yV8aEDGfTngACeGhfDq8i0b_b};*o`Inv~)XT(zsm94D!m!sX4Z&JRCRWuS^u8 z%7bhUdKsTICr3k&bZoR00R4AkDv`pTqK-gWt*KEJyl?YBTtkckJGDf z(S=6Uka}FY)%Nvd^n-sMs_bQZWxWZ1KRHiO`-K+ydCU*YyIe^>=ucSuBtHY^S0yWz zUL8F`GtGX8j*%uI1R#m=QxNDYZ0_z$RRGGGN{Sw)l+R5aHju z1Lo;Jm7@ts37DK$(z0wAi-;ARg&EA-La9vBhtp=2gRBqJt-F$Aw@`BBKNvDe_Y;T7 zm>&gUdz(yLzL67Ij1Ed9Bee!l4&#Pta-Gv2cJ3*s668GLN8RJOi>>Y|ut*lBP508? z91i|bs-wN2N0Ey`mQf2!=w?(pl7ky(``nlu$QN$l5N%-&({qs^CBoPg!VOeLC+4&PRtwOV3hkbCAi)_8&Um>H}=7HcatJ(xWam1RPM1sGM)#ez> z^wb|1wz=`5^Gy7cD>3iPX_4L6IP$3W4Pc9GY}|tOeKKzJpfT@wJWy#WEMLbNe>O`r zd$Cw^%42=8#d1^eAWexUKV4?gD+SBH`)lkwsd66M>W_U?uoHA#9khe$?T&j-k>@d$ zlY{c8Pjn-O`;s@Z*>rHpH?3g`G`8u*bvY~A0CyM6$%;}*i>=X~h~ODM<9=hCajD== zEtRto=zZ^FQ3F=|jamz%VJ9PO(gVn+gG2rxecir4-^5xsa*@lOY8(ctH3=^Z+Iw(n zJOqI7qQXX^zb{w#*d6$EPP`T_d`sTxT{4r~Z1NnJhpL^J5T5%dQs=2cnX%}zh@Ge* zRst|_$Y4AFmJXR3Nsy08)1e5LD1?7lH^wT3Y!nsc=QOYa)TZ4n83#6&k$T?9OJ3!6 zT9AiD@Okh$Y6bq-!umSlAM?!iLKryyikkzYTP`^qYtj4&()14_x?RC-wT-)27Ui23 zvGI|3(i3TyOm)lG3<02wJwVV}(r@U%%}T~YIrB&hOAnaaw8oXWb_Q$BAMEYy&fS|r zP2lc7XNH17Ps z#iw0igaRj2fm$S}bMPgwoZ9{IY}xw$-Fm_qaK3AJ-ZJ#tm(w~?yyxeGRbH=jHn6}a z(53r3QDR9==Vm&LeWeyj-bz?%(Cd;q3z(U zYNXI^Cwn`EL-G10oA-kErTkT2n=|5Y+;YVfDv%~x%pH;h40hp{A|EE=JVv1^7)F&& zF!OnKNvN@hrwFYIHR^4!xct<#1A{D}Xjw*kZ)8eaz9?28lBS0ibyaZ$cFs8?2eQPC zopsxPCpR0c=7l4f^@mOP)$U$vkl`kn$H6Ub9z!DY#|k~n8fUetHEUvwRmIFkF4HR( zTrYpUWm^kL4uz1y6L&v^d6W1m$pQ*Kz&W38Z+=KJXIwxATk!pKLYzLC~XYFl*ClHXO zKnBDmSvOK}B6L zo^=l|&EPdeCvqNgYI68sT1qg_+AeEh)!|%z-SoeY&$GuIShzVMouTd3pZI{pzf~CE zK)oQ!sC^rgd|mp4LZx|$LG6;nGU^9%xgrNQgv^vd%7dvpax{&c7v`BE0hLk+HVC<2 z2Bc6j0XsdgX?Dm*&{L((kayNWGt2I4=YYOw86$+K9lT`nT5OL_j9zBSC79B=Fp~jr zg$ou=l);`P<~kwXS>@MEte*Cawff(jS2~==cZ{f`w=p~uDyo(;n*QK#YKJ@>{I^gM!xXOnDoB+G)%27Z^B?%`lClF+0;3>hQJztJ;y z-^dj9F!ebkRs{XhXD#HM21J&AC}gfMjVK)-h^AN(`Q&B$@i*Kt-I#e3M_-3P6u}^^ zf*?)x!|5H`;kwD#jMRc7F5D@l6wHxuA{dF0UxT$PH6tz44XSpPsQCA2_0-$aa(|bs zya?~YN)()(c5=4H669m0v5jwJRq}7JYptSWIP3E)Xj zv_(dh>Q}5>5(DlVCN2sBtWS)VkJefOzpM?lH#BDYguSZ;K26Zj9NTRLp%UWYN@WGm?r)@pqBP@2>-Jh%_9WE(CXutE7Ix1G)xMfGB=WEl zs}RL+y2h0I=4zm@pe9b*2IZJmN~ z=CgY3@l*#+N23H`c)mlX_2o+c?b8iybTSky!8$T&oww748=S6<_|+(z5s7dly6F@% zvtfwVPj2{y!?CEpsC; zvkTOqV@~RQN#g@)ha5B_8Y-3+YMu=V?ZBEJY3ba{ZRhahW+S-SID?Bj#s60T8A)uo!!KJmsD)!M(p6PJQ` z=8)1(@+dDC>3K?^9%QN*q6Hy?p|PYT5XBR_PL)bv4@J&w=)q=?a$;u~E0O+&T21YE zjgUGt$v%$;1d5!Dy3W-qMgr{h#&W`9zt61Tr;oQLkH%NNbr`N{C5)RcR$q9rKfmwP zeT=^mrr)&;cTBT!ZAN4Y8>PQO&Y$v^Q|?lz$)Kvpjlvv=Y+@d3RLonWqhm-8(4vj2 z1CvZ<-IH3Z3+Za<)(O+9cP+d$Sri{6Er=>f*3mh8WMB;SX*N1JR?c_^S~zNI{kA0u zBD&a7NFB#nT=fRm*4$qW(QGEjtF5R>bo*AOD{zT%17v<}+KJId5+ncgpbpArsa_Vt ztg}}pInv9}Izo0~iL+giH1PrEW@z0x<+jwhfw4=h+0|+@mFx0U4#lC@kWIPri%!*6 z8g=FAkapL4I5WbC9cKeHQmH#KHLXECYdxffg(LpegjUE_HH=n2daC~-P5#qf$25Qm zQ~5THPP{To`YIPMf429hGjfTump`96(Gxwa-{uww?-fU!Lba95vqLP_V=g9N|J#Jf zhIDzgCELk|-G(WXw}lq3gtl3=u<)fO;(PPFz3Cl?V{4Gz&rlHxtUR>dtUd>sv<91c z=Z1LJ8@CBcp#?n>1w~En#s~0;`erHcHR-f)F+$^HGy%h+C!SyZ7eluad0FOBu0c;c zw68r9vwG!@j6BLfTTNuJS~YXK6A4@TKReW=`oe6+asqx>h(`SZuySBDHhz$Jm@HW(0vM@vI73 z8_-x#hbJ6#T-;UX2as(Kj)l8Cn~`vNnf6nK0{PrT^@M1`^{%;a8R8LU#)8g& zoa(*4ZL*~5&@w7x0vlAPZq7r`d5>UJUqx~FsjhCg!oIsZRB(nDa3~M{lzi6I87ITc z3|v6Xr@h_4Bwi0!PMkP)R9V;bXUjHL&gxtcK09~kmD4eDd#5@WB!?oWnBKi{x_60# zqeGvJ*`a$hSJh+_rGMW?reTPkLpeI!* z0CvJl#(q_!HLfwvMlhDN7N*E@IUO88BPd3;z!1>sbsw~(pD(=^ri2ji+zwe~I zY#gTcn}ngU{6kmcB*z@4LhdM~3>?dfd4iT=>!ZW-wMW+uaB2<9x7~q&4<5T_`*zzb z_Zw&+9>w?V-rGHKp^*6PWd}AKBK2wA{HD&lK{5Yub7v~W=QJcY8+W{IYin4~(7(w>P;}pCUk@PZ(~WXd+rmb> zUgus$In4#q+VcRyrzUe&S(VN`k48E&cACeJXD9)+*Z~G{N7aPWyv{s$W1+rn(i-GXMqc;75=@Xx>%t|@<@DG!Lax&(O zW(j*>-$=&DJ_Wg3w-=$MA!4~CI!bYI#?vzA^W@!Z#%NrkWMB*@(EOx&(Wsoar*11@0`&eo#ceiPu@9bR~9gRAJSQXW{9%*3HAC4=-rT3C%IS=Coq6We^lz|sjQ+9nj6 z9pcD$(T(d}~$iXgd>EqYA0)KCcFlB5Tk}quDl4!)I3CS#&6qL$r_NFL? zVpgoh*K^iYt+TR=u1fRC8(%^hoic@rmM0Ky)@(Gcy ziIO7u9WWn*f*vX@tcF?Ltf7Je)nE%%Hfk=-uVLKd5x3+1{_74bgjuBp#c#U3h#L(D zTk0PWrUKchV@YS8^bfZf$2`p8DpqU%zLSq^?`L6A@qQN!3gRfT)v}yMT7g2D0-RUih2Ra_ zh!Wnlo1ZWyf+VTY+z4x69I>@D z$t#wYL*^~-bbk(K$bz=#Q(s)boatl&cD23qkDfV}tkmuXLmoH!d@feG-)f=ULqw7P zhXwcnujUSK5MwmxWNtZdM~CmuD0Vp-o^My0OR*pSP4a9RdA>vv8HTm7fi=&$A?|`z z(8{2XAjdi+1qR!ocm}c zvKgbc0d;!r-Z`26ae@3NN4PRTjYNEzUZD(FoHQ!a`UAZTJ{V035(*IZ*P-|m4%k@XV%(R|51 z!zBk@xTqV<6c}~p}v~MHif_N56F=81Mj>3a#9clO|m&uonEpe zG@4O>P~ap`)^1kRi$>boAV0Z|S2sA(a@)bouwVX7r(PD}BZI`7FzTd?rb;}Obf4M_ zoWk5Pgl*=d(CuhS1SC&B7rW6V*CilGP_g;Bewm+ZQnO;1LKZX9@NT=|w)S@!RfiMP_>nJ<9tHN^O7aW;j z*9#&x)^LF5FDA}$|2GGvOWf^+Q(kgy7#ZG!cmkB8`EN-hr1f}(Y|}zFHb(WN6E{n8 z-D~Y~hA!W%OyjC83DHfD&ZP{`ex=BwL4h1Ytwuaso(hw1_Hibd*{&GDbzGTGWyi}d zbXqcIN;Jx}Z5a%xB|mOBz|01P;m7lPt$l%xto1?6$0f{6R9!9w=F7<@^0hJL_zJKG zsl~Sd)wBZU)7=ROl_1&J;W#^6W#?YwYJssKqBTxjrkvbQ!hLVFMwWVGN4!f#Iv_%{ z))u2myxVT)W4|o{{d$}n7^xgdS2@H&ON{M z4eQql;s{+)5IU@b!4Q38nfbYs_(Vj3Q1uj>Hh4p4=ld2Su`tPsB;qUKSYR7?dL-Kk zo{*Y|Vhk_9uq_D}eVc>TdtL8kX7aYz_5QF zZilelXFRNuFBZ^Dn_X|rAQjVHEfan>$44gN(D6JQkw&UlAsWZ5x3>ubPYRF@n<0a} zK1$k0%?wd-iCoZ%IWolq6pS2mMwUbf{l+eVavd$ZOGoRm?ru`8xA5AcdMl#pWeml} zGIhx`AB}txxdD~5CH3G|$3wbNpXtPDo-TiiBgvC=+-;8Mv-=fXkS0Nq$N?*vWi;q< zt9^s5VVhL!GnLF?saue|b#d`_XVefLJV1L^&7GL`y(RUp2E*Kr>p zsqNS_*Vg#@wQDHCQgr@t)LaQMC5uCoa5Q+sDC!;8y{Fba0*Ctog-G9qLz8(*l{wCS z_gkd$10Fbel+QfE(kGgi%fZfes{?BZkx{bHVk?wx^bWR&OL7& z@8R#hcU*M8VDWAz{{4UfcRhv_Q$!`YJ9k-#=ejFnC7l1YCwg(fU*ms@y0-6Qez_t<&%dAh&T#?TKF zclyL)?v|Q_l~)Pd7WM2D$vuzUjE&0;oWcxHVbFXHqt(IKyG&QH(WV~9Oyn?IyO512 zEY1-78Y?>uM%pa8W;6BJS&D-S&*n{Tsxc|u!m%n0*RM0^3rTyEP%!`8ec%2#nOd>~8S4ehxxI1;awGLi=n_gNYPzSg{2j57cni*70DD)G7_U&3CwYulI`;O zpZ!@ZL#N%WvAVv_Zey2J*2G9vI5K&Vyiwxv&UyO2@V*$ae(^7)nyXOzoICOJl;$3h z5YK&d*1HX|W4VEa5msE77A{fb5)P)O6A9#xs$=WW7pND(>0a?}J21XWS@TYVhC6q; zUx2vZ{dkAqqr5}Fx#uOt();91aN2tXj{UHf@`eiXn}2XD``-bnREnv}G`=^YQ>`%) zj(*bLW1Fs-A*tC|euACaCZu~PwObP6o5&xGzOAm=lOR%>|oOe*w zNitVA(aI$>_LxbO8MZUD>t9EiOpsHLq3=`$*qE_7BvAG+)d6~OpWiXu8!;5VHr_7d z3q8W3NBs1NmkTEuZ_Z=htkb@76Pis)eiVnau6Za!pRh26HY>ga?6rmMr_hIKs?{5K z@dkR=!`pW8G~s_@NO8${kc23WmdO+6@M&1+vL z^xNbsCn3@#91`BnL68Sn9Fs`dc>N}4|HHqcP|TA}I#N-7&}nh)h40X-ZKI5PTnko;Z@u(*WE3#GgU*<%9*MG-KES>9g^-a>}-HE~by%bfGLH_Qg-X6BO?tt^> z&&dPFu}t)+Pcm~DCj@_3qn|2EKaNgy1J~WeXpNzEi{W&dz??>DY!W(Y2>MbhN+c3S zEHdj5x8sp09Fro3FKs`I8VtxPniNFrmvod&3Uy0E-Sg3!A(3a1$Sp{+Vp~t640Xb* z7qC9{i$o(IBkU0NJX(8Q%;F&;{{m__MC}XzkrZ9WA}u6hYOfNHb=2HLxa}^@VNcEo zLS;vamraHwG7#`#m;b@ z&Gs6j&Nh+Xk`9XqQ@Ess<~YQjMw}2@XbDI<=vo>(X^_w&^ihI=VbRJu_@T)}vW_ux zi{Z$iD`twSMVy|;%UI~c3dQ6p7#G>vTcz*aMC}hzHIrksOXaJ}ARc4CHO zGxMyvLtgmaOT^M|XCHL4xxOKtMa57V0_GNRWT$wYrR=;8_@(q;og5T}}TDLb*cwneWsK#uX< zv0r8C_(w1lohS|o1zGYQdszXAOr3aufHAG_yoMbwVQUklQz_crU2dHJ3%p*B$>cOE z-}oJ>$6g>mafn>`Fm}3#W;=www?Dl9FA_!GWr<2s69F#1&nI)6o&G+`nCx2w8*h0H zQdBR3TD>mylIEtT*=x2bWD`V53&T3e#@add{0>fLn#u8Dw%0BZ>N%8?6SNOnM7J~w z97prISZNF262?qDnzPeb_+Rh@ssB-6x6zVpB+-6vr0tW2`^xPilc)(tLh+44&g+7Hn(r^v!DMQN~}tP+5G%0siZ?To0UVjQnAR+?k<1)Cx4D<9FSSspx>3` z!+}?%*RP0KAaipE$mCKqs@rlNqUnNDpuLGm5;nW4O0qD67mrC#Orux{bUQ)*;0Z<( zWggI65}7jT{89EcF3{M$%=Ypby8Ts-KlbZVYf4P2#Uc2vJe2~WDKpo$ta^MKf=mGk@789{gvfz+VPmr-nWW-FRdW%}S&fZXvCrdC? z7LjL>BhF6aW;OKbF-|_gxZ7t`jmZQ_tdvj2(wK`KRtKxB*0;Hl>EjeftORKWTTQ0J zNh<0A(#eSR{w4HIiBpF^#mV`TXm*}&d0*k#ORur)Yb-qU5Dy+YKvfvS4SJL^Nv0o%TPnhUGl1q}i?(vF{{mI+@;mJgTv8qeUTcco5 z-&^L)pS{e?fhT$3r+!V&4@4HOyb}}r9hRNRQNMYG&hnq~w|?dCF@E6VjNFc7$7a(> z$wArN+~C^v>yj*Z_~=pj9GlxU8qGG@Oj^py>sFdlE_40czs125pJD#+$M%hz{@RD}d*`mamq!w4wdgMNH22Oz z{xd(bzs|bfyk2M`>4qlBggZM`De0cHEjns|lUg7gZeo{b7}R&^?_OfZeh}X-;!TV> zs(Jj}^);&71FCa-oSALW+8&_!0Y;^QnOA6q2HvoXez?qMrqcX;b%t*o%<(TXHqlpJ z#|N0wt{yG;cy@2j$S`i3d8S>Jv}Q5gmVoaD0{S@-<3_KZ2f} z=0I_dxm=MmXP>2In&h%ejH~MmEy!m}H#-RP1? zO;Ii#lT+)O&=xU$CdU!!UdUEdqh<)SQwhx-$jZg^!5y@TIzzTc6{!_A>nOB0+k`E@1v^GdIC#iUio$7~@@tKGsK>`^*!gk+(F z7KfPrkiz^d=U%N*yYxC*B1`7T5{I7rSyII%jADtfxq}i0@*?@`t-qN{MgkL*{ja-u zAl&T-a^GY9hqLx)MQ=WroWW7dR*0{T@v(6=AG^BDz)cdSk{GoOtW=4Pka|DSXC^a& zlKLrj8xbp;XK7vk9#acPN#|zqYr9-&yue6_Nf#$cm^Q7}CeLs7h=U%wZ(vOwW3+XF z-THSKs3XkWH1kJ3#L1}zHn+EES1&W(zQmwg$M;9Xk%sEF*{LV6mzLR>sIb~RNMh9_ zvD%lmv#RY9=?#2;jh^rxDf+01B(0YoWX^?$KHBE_${H7j&l6u=A?(FuttF9CGWWuMue$lS{|w+#0Y@O!Ls`$r6w48Lw3ypy`_>u2P+huREfN`*l`JHRjzR@OI98kUfDt~zHcd5*#C5*N|br9#5K8vE&2)#DS z4vFg@Mt$x$f9L5Z`LhQ+&TqUzczu`6E4O%L zzKy@LN^{UAcjy!NxiUl3qqTm4*zK}7`2d5i&y@?$5i&$yJi^0Ao}%QWSaZ+w?8+Z7 zxNw!gjfn+VqZea4Wh_-AnV7-|)2!^o49yg2uTNpqlUj9ZF^`d2ME6zVn$MuwBb+Ld zNM-13me{zG;OCY~^baj?ZJ~#4dJ!<*)uHI(xfB0i6Ey&ojAjn0~u1iHRaeh|FCKaHVv!ZcDhPYKWnniK1JK zjRc!#pT%!%kt>u~-`eKdwd?p}kJ8iuZd6BHdhIzjR&O!Cc!b9ue}c)03H&f-YyAf8 zy_&3s2J}fJ6O8>(B2k7TPxjTt^J$jO&ZZD?TNg2d{PaA<$ywGfzszv+8m*VUMSXLd ze9C5Ss>ID}*T^p}N%@Mk^B1{UoI!vQ#hfS#0y4(F?8csIu{PReJao~=3R91K2=(D7 zh(|7l?noxDR11DLnC|`fBi|36tGvT`f4|==v3&pK^?45g{0&aX`^f{j&lBxGy()w4 z^768LJp!qfWI!)D!Oq4-QkgtSr_5LlNRCDXQJwtk606T%#@C)@>X&!e4otdN7fISF zhNC{gpi8FTm#Ve8p|ZC+WVHGvN?**AT>LydcN0oW`0fZZ=wdh~oq~pS#O9-mX>JHG zM)V}fl~wG42eH98Zex@UBCo*O>o(6nG^979qgL}Q6jOx$87^FS9^I^PVCr$)Od3;J z7Wg7MQyL4^63s?~?dGnWQDhfCL3(D2Bt5F@FS5S3#;~!C5scANNgREK^2`)=c0pD# zyNye7PGkEqsZPwKRwn6Wi4r-+g!p?cx;xtpY7K@;pJ;tr>W3XU+#y>y$koXV+nSDH z&!H9`0&(qX0XyodfV$zWt)pyDQl1O2i+!dF3z*3S=|qtzA`C(fl~xQL@40B>TNvB-4%#G zmfZ#YCjsO~YY8VXX)JWt5*e$ZDzeo4-it3vh1Aww9nX(QRhFo4Tx0UUF;0B)3-szc z!7PhvASfg$gQj2CX=0_+o@4lIK}L-r#Ml`aA10Z)qcZim6hqu-y9X8!$Qhu9P?Ifd%0=TO_B6v5lPc$V3vBiP9lexR_mxh1n7ZS13Z z9;Jmj%v4@xVNpWIHZ+WINDygk^fzfLRg9!V$*$1dy2{mCUz3h+k39LyEG&JPe!F(p z8_NBE=03mweu3uu-T(HIGb}}Un?UAUik0^>f~ef1lfS?Gz$ckXFlr9_oD(g+YRyxtnrNK? zO4lOLV5o=e1QsMz{ESd3?xK!LEX5CSr1St~GsKJA?2U&MwFCv#W~D!3De))^v$JgW z;AYs6?Ps$*W~3_A+%$`RhO~8nP(OnfyOO9pQJSDoEOPeMGZJ`n?@kacEI$Zjweq9B zK2QN(?d)1UejH&>P=5hx?Fuuw4gG!8!WX{llJ;#Yo~ z-5alR?2%7Wnp&XKSZ8xrUwbh~5+vU{!Au6*ooS08DTd8m>8l$KKwpv$l2R4rL z3DW5zw&h?t3ChI+M~|IAG{hRU8s{!v;?~Md4j-7MG&Rr4MvIB584SypFwnh5lSDR$ z9;=vfo1ALMR+f-7Z#J5AdtI8H8e!b$=l;%b(0J%HSFc^6-fdHKN~Cm!R&O9WSva;y zI-h55eqOf8V%20k=+SEI;)N=CZwga=1b;AO+#fQGLaZpmcs!uKe3_(PA|qx;{%vUD zJ2Bzk?f>pqk-Xb&@BLZAcw_EXba`XFff#!~hv;udgK;~Ei9IMB>l`P6W!dD@f;sJz zGF{Sh571j(#hP|-7v`9B(xi4aF^?T(`oIY;UU{C*<`xe>_9VG_l18@)g+s*oBOIJP z#qO1}tX<#Y@UMOX%P+9L>#{Uiq1N4CX>gp~<(Jrguh$epj*eVvopAE4bL!9%OzG{I>O-h zlKjfyh?QS>oE1CA=qrE5&CUwmQ24Qj7^xx!!6!-OP)}7bkIv8PCc9nMO5FV7e_9jrC*poB#kI07*naR5H4e zWX&3o4INUEMo-_tZFPw|Jrar6Nq#)f&8)_DDvLMtm=hXxv4X1UwA&rj+p5_jNJMXL z0QpTMYC;(t$9doOz9(U{VRw^aF;8dx z3g7wv{x?bsCz+jFVq$U<+eyi`P9jr4`1NG-6AZg;%Eft#ih;lS8h>%orP>{`*XeNe z{I|&Eb4-_}dFiDWdEwcwQQvE0x0&6Wt#kkSq6ddyC5nO1+yA?qlWa*6fL zs+=2~e)tjj`nGqg^g2BT;zHGuvekC@zzoMy4(HCEXJ>mCJDWv|1{BER1}5t_R!Ai$ zm|R#O4!rL_^tiV@#XUvA{dCyxz5jjgD=HANkwf*Z_fzh=&HHMH{tnNjYliH9zk2oz z3ELr|X)G;1%x*el?c!@#QxEar!%wl^yUBs#VZw?-DRq;Vm(P)#I!Qj2W!10B0q#sD zNvG}O9C(mq9AFiSWDY!x{@TC8i_#2>5rsyX$0knljC+<#Ti?Oh+ay&~>DOc8**d%b zXp%oHpCN2}SeXe-Q)AHHB@q5I-Ytx+JnG;miIm2`xj|3xi<~7AxoKH3^x`o>zf#?D zIdJ^1F#q8xzI-6dCKid5B`dD5x=mr}G|9<1;$#Ld_884aD!V(Eb!BTA5ZbW(RxOe;Z5okE%?s)D+XSuGxZbOB zx!0#x?-RC14Acf@>Joib@MZTDD^L|Yx(ve??%;>L|-CMy+bzi{uia0dg)M@zpy zyYYv*K5!KXw>blE=<7<7pC*-28}&NN*RM&v8UeBG3r}W2%u@`;e!$3WqiYJfm6D`C zVRtK~;FEdDL9nxqbVX}zH~8M_sw50~-cUYXQOjbu8cNtfPbQd{EOYwQQOQ)Do}T5@ z=?7&S%`y!3_V!p=IYgy0$)Enom(i^D#s7bbM@*~Ij?XhPf!&Oicu(g zt3!7v2XtP$O>T0DuRs4PH(!5=NR7!`d9Gc2opZe&h4PgAyX*Ca1Oa3-83_{bJriA5 zx%k>kT)*td=bNpRSvqo|0Foqm+Llcx#1!EF!s_t+(Rr&iVXyYHRg zq2Al75|+gA?bq-o3hRxz`5P?Y_h(5b$$R_T3bz$oV?O-hkI-$mxO(OlT0$DLatyoL zWXs*-!xNA2aN$ADZLQKPPtej;9?nj3akqvxF;68d&}#2dm@hF=$G*d+G5WPFVj#5}curQmHdpThzu`Crg7?8@?6f-$|N5_j5 za%PGtL$H|!jMWG;k;YS?7RNMG2ib~ZqV5e+YKl}86ZmZg?JEqMH%MYpP9-pgEqdY_ zAy4F|@%tSV!K&XK5`_tQ-3TJDuvXTM{R%{&Am7;Dx3d_b)H`%tD3#u~J^900AFvAK zO&zR#w9ajar|=;U0w&56eD<@S=MVqz_i47;6et)-_{4yRj{FHJ~>T!*vsX>`Ew~fYhprPM`#I-5v#{f|XFXdFBE}rb21E&&6vu zrOm9+>IzkZ`u4`YV_PE6L^fn+wBpC=rT zJ;_c!bm$1@UptFoTC}%saNvojIrW);z~yVNaP8)K62dt!7_t7$zr{`-C7V0V!Bm2l zokxuujDu|kxgx_$%ZzR`a6jp=dU%~f*N&4i57BSadg>u`HKlGLnP# zK|A7bVu`BY3Td~{`U~uxF-RmsY`?)|`Y5ew1IG!ewL9$fcCkhKSg)W37Pi@@=jBL` z9Hxs?ydqQtUcZ9jchHq2K}#pL9P}_p)J~yIIhYeE(oPXe%b)}*vvH0r&-Xr5ZqOWi^rt5n7e~;o;zT~J^dyFIl zsR-4!iIoWky*9~U6BUnUzeo_6_=5&PSJ)D3M2aH`!QRMcZhnS^g+*x|b_cQ>-!&E! zis0Vp$AgXjfn%a`S0->9cZ;rS5>nY0S%IR+!&uieaw&~b7qmDglQhXyrkJUe_RCVq zY}N?Ip6q8z&P6yD>^;&MUwTvY`ldX54cnAl6G2ckHJgNGlCl)E=?M%c&CFDZ#f3SE z=o0!;*Xy!VHwlA~q+|2TzxeaC`y)F20rlO8My)Obfs`=`V^Rr6 z`WFO>N-C2j5_0VXQijDeZ5+`GQ*~MDi#I`_#|+b;SSXUqgbYPnLLh`v8Tq}KPm@Wd ziPaYVphFOhQKJ~Q(>DL@gX3ytT^MQBg(>;=WC$vP76u*)t>3$t)&f25^zoWRW6MF!Zr?jond; zz~AK~Cmvy3IL5i&kY2BbHr${&Y!WyI$v|P&s<2degd5kNWpwpCxr3#Dxc!saf zpJdq`VO`yUsz%UNFcN8UxfxV3Ku=__b2AtPn|>iCy*STYBG0(qWZY`g81%7SpG+vc z#zR`Js1lkC{UM#PLQjk2d~mNlLs^_3mPHy3Be0l^X0a!1a#5P7v&Nv)mh$nLR7SQcg>jT=8T)%L zzKe-2cxFE)u7n>f81HQffja@@&J09k-=*>dM~@t)UaJy_Og;+P-MF=nRx(UXE3t1b zB@SL|U*})I^qf>mG*D>QwmBv}Q$&_Tr3P`eMr7(r}#L!1GT$1VB{(M;#L`Gc((BVi7)?;aABv{j#bW(15 z0XG~+k-Q)T>qWHLgf5tvy9nJU0io62vvK@=*8PmP-tFJ_EYZT!mHn@KL&X~-^!L#d zUAd2Jig;<_Jr>Evv7^UuY?~Lp{WWGEJVH}X(75$F;q(mp!DCpp6`EJh5hUg?p3E^Z z>e9~rDOKkqw1+dK@<%b78~9lGlPx~v4DkOipF`z7JHG_4{OM(yD=TiKhK@y|yea7rWm>3neKv&pZ4{6l zv}n|?GVbq?Y;-XO8m?h63PZ`a38RQeB!;Sj5*ZR4BE8ASee`jRE?^ECQb5wwiul1v zc3(F5nZV@8g2}Daszg2}J0`XgaWrv?6WLE;=r)#OVg?r8V2mod4_?ICmwuOSD2R}0 z);Bif86w(P%6;G)f~@@GVr%;WQ{%nO09BN?h$)W7V2ee6<1u|NWaY*U?BXKz-jK`Ju1Vg9HyV=3PtdMy^UMpcV5UkmF5lqltxZhRq2F!M z+uLDk=>gnPNZ8wvY==8a?%~)Y)(qy3KgG`4GTv~PWGatFh%RntS|pQ6@|gq)$CPTW zB53rwt`q<~dh8IjT9ew&h76d7VN>7RMKv4=9PovwgxixD^u)qJGPxY1e)qPo`dx1- z@1bpUCotUWWAa|%ymvi}cz#WJ6aDl~iu&)@x}S84aDx6HnT0Ti;L1Cp|Cq8+K|8`)YU3{4r(|^V@`Y8hSmq;$2Ak!J~#A=$G*Z%|G zI`WTc_Y@|d{VM6z8w|T!eEE-mi+}RZ{wdx6kmdQ`|9wt<_P@bc)H%2FEMDme%H>Cy zD;H6AF0g%R1(OmKm*@oN$>_6uZ2bf$jwbmR*#-LFc!ts17B^R}vstS#C{OTE`NOma zI%jTNqc~q6j2$vlhgi^5N@|Ono$G9N>nP(6JH0B3(Z|SUh(-oOJ&(6Ff!V8(&{cG+ zLgMHGde&jw8?o7_(-^Lz8w!JDSCag4uN~&dRKQO00?WN!l;!|C1W!xTG=|J z5*bE9bs`uLc|+;tVWbo2Mu?TP7>#t)v5KRosCPBus!-Sc4%X-M^rme3`7Boc0p^N_ zDc1+2T1}1^vmDJHl$HKq)TQY*sI~eu{Q>QMLlQ$B-INvk_VyOtZjZV7IoYPvgofN( ze9;4$4E{K*51gSCcU2&=V=mfLsRXs19sc|O>7U~d`jV+FnBM7Jp1tZCrP3smW#O=v z#5%BuZY3lsOgQ<8OhO*s{zyV!g|UnnVyjZlTVv4LL?64P98=B-R3|CXUegmP9y#`L znZ*kT?V-cR83#TCcPO=VO!HBS#S&loz2C!3&9ZRdFs|$3_Isr4Q2j;fVG14Z4Fdwy26G z%h--X%Y;VD#j!L+$%Jk%Zq&I#G|}sDKZNW4is6*3~Al`D~xMr(XGR%r9*_VhkbM# z?b;Du`4M=jdi;S$gmniM<}LuB=LpHY;1g9j3`l<{4$0Yz+D| zHm=icTw@reQJpNa({m(qCHf;#4SGbW1(`VbwadhQjj`e2wM~N6{e30m+QadH$TYA{ zjxqgXZ2h|@`RM6eeDohU{M!i_SGUM`2FX$mwbjQTxR?Uoo~>XT76o0w5n5P+|Ak7* zwy+%)f7Bxt$0SXMrm8a>L`*t;rhaCKQ94OI%(FBK$OaKft4ojoGu*>%j@a&X*l6FP z+Fhr%*QXte%Dm0dKq0MJGC4hd{Df>fYpPCjZ*O19ZpzFEn;Ez zq#Bgt0rf^*h;`6xx45#kj+HD(q?p&=!}o)I-K;Q_NFOg!>8;)%X_;V_q?Cdfh>KZ= zsmB<03d7FG3rgHR2x1zo7HSkqou*)?#@O>%-PmFzkY3$3rSdej`X2puRnB6>^QnRZ zpzgN`!Q&!Www0?n1_T3~F_nDB)1v_-!_qU&nuNjuZdv(`;Y*8s+dbPaT{fm|y0|+-LcNV25t= z5Vn^`R~qO8mqFtI=8-MzznkK>GcB6CI?2Q#GV@su&E@HhYV=%>b_!_*mC(274;%Qs zBzZGIyVIrC9+LEDD3(v58xsureH`5(WSu}6p^UCE_Cki?E>X9R-UdC+l1}HyI2PR? zAW%~HR*vCX$ZY9#awl!lX^WCJi&H5xu07A*$||Fw%B(emCZNN)B#~v4vQr$&lw`|w zZEr(X$yqZ;Mzg6n8aV+CwhYpykKfwlMnA{3hDFEqu)5c3LsPiBN#!)>U&Xt4$1PXfq~ z+<$X=ABr`-657aMai%j>g2HE~QA4jz$=Rlb>WFpJnO56xm#!UboNI zZk42>adiGs1m*Gkh1Y2|+YH8`%&mLvCh=&<^ucL%w>KGeIue3xsJg5|6awOL$n5cl zWJT0%Y{^#JzLBDEAJnDvNq^|k9fnkdj*_ln*(TNPU6xnY=nOoP$rPnRj&|QA@`s}C zmbXhK5)20}LxlEMgr?o;_eXyNS^f{MRi!HTC4avSLixU|yIJpdclP$R@G0aA@<6Sb zE>{{)b2Iojdivk9aI8Ybs6cy@ho+|4vK(IDx=v>c9{*W`moJ^+`qey#pL`OvKEl1e z$M-J&pXiG^IfSOx70eeD(*6-bdx4;Mg1`T3kE8y==kT)uhSK4CFMN|DRtMv|Q#=sZ z?ES_s@q3LwA#;5LHNV6ls}lFC^tN9iHT9R=8vQiZjgwS@3}dayYrCtI^F_Y!@DsE< zYrJst3af%6bW~>?A7T9e9_7;~u2Fkrj%RPw(0UzGYMW8JN3Xky>vc$GDtO@#*N7=q z4l!5xD8rsWMyX6?i@gm87;ZV#{66zP{Tw&)hk4dk84i-<+y&x9l0@1e zrR7N}7Oio>NbCg-UfDOrbErQ4;2piP=IvWigHAkV92YV>k;$83(#6sBsHLNk~|IKA)FKgqQ=} z3+Wb#-W_ARANBQt3Lw2+Uw#)K=-vM2LPEXQ>v8q!WhN&pcp}hfhLoV*xOSeY`9;c- z6l7r@If8CEGNTZfd6~gSA^BWVx{`^L+8evF9VCY7(ylY~F>U8|(21l3O2UACY!fLO zj%6`bE>JEMr2O;R#s==tBbCib#`2^<-ee1`Z|z{0N<47*k^Ks2oMYf}_0vBt%n4cg9i{@&9k_-yh3|Kjj1PH%sNc6^bqY+l4Eevat)EXhLxI{Pv& zRV)1c$thlZaKxW)ZL$y?Ms1xTP%7B@BH@%rFuq7UQgI>&y?cO$IfK5IW`Ys3n#Les zLQ_>9KX8bg4jr}3q!Y78jOTiktZhbWibbm)`NuBPE7Y*{7ulm<$aLXD@%3`W#3HtB=gH-= z5-cHrF?SEmMfE=V35@qgY{ju`%Ww~sK(rM6@t8**eU#bRS-$bLuS-B`E|VhcRY_VZ z`I5+(6xy{d;&ERhFQneTKPEphjVmB~t*Sgs1>0C;PJ!TXXd30kLyYRXc&$w|LzOM6 zrZFbaBX%}!(J4(+Z4KdtbJ&__Cn-|iq}!Pn=hk`d)5RtQD=agQZX|zelJEb97dkV%yPKNm_T*Op`%uGHsW>6c2n{;`oS(EQ>9q2`Kd!k z$)peP-0n>_-4zD9g*#5MI8i~@8{8N*2(*BN)n|~+5t&C&1XN!LvKF!^36&^w6SY`H z$oobD?G^6N;B3d1iK@6xM9}r3H!E~80}*iUABXjU2_ORfG`hzL><&I#9JE5#!&h~Z znXK&LippZ_cCZ|q>e@1DvLwAFg3*vf+Lqi0Ma&dTTh15yf)^n$=?O<7mxPS7fC7)2 z+o-;ap-P7jl9@D#Tw0d4hfh69CaH7c!~-M>b98pDaO>tWwxRRH&;N`Zl>f*7_#X+B zq--fQnoSD%A_q<#K{1jP>`D4PQ>yZctrC6sm$0@}=Dq)!t+7os6mz?SXibMlb}x|)KF0EeDv7-o+rQ<~IdqcDksQ7H ztLVui7{yQGDHRICWu^uj*h-GLU{KOkR&HLW(-`y70}taXDHcmQN3(fezq!NJwQJJD zWUHE`@9m&#*JYxWta=RkBdnx`O@I}tv^<+(JA&y32`A6Q&Br)(#APkJ&DzQ;TCItq zE3(~7pp!C%0HQ^#LpT^==~)ab#7_>0O&>i_iT{80-ZRLuGrjNooqTh?w{!P&Pr}Rq zGXMs_E*2ZG;I5a;)lv*5#b8;KN-CGCRQ5N0aFxsaV!7-Oc9n`MO131E62(l4+~qQC z1Qu8T3t$i?U}k!zdph0@H>VTtImh+Bw`VX2%TE?)aQCf34LaX&&ilO2|M`c3prLyx zwoBkgXvfQF!v(@`p5*-U4(?N{T$*tR8VYL9AgLKdS_RT`l%}f88VcUP#On_^=;~zL z1WFm4fLPm-htYH~)Di{cZU=Jj?v~;nMQ+YluUtb}+mJ1%=h!&jnA*ZQ>g(4iSBjJ? zc`Pw}Hcv>$QUOK9LO>|2+g)3FX?embC5|U^0r{^XH!jh##;V0w(HZsnM7k(0!g~8Q zN~X&GL5pNMLn@)l07Nt2NAof$#nRJog8gBEI+Qe;w26KF5G}KKTQFof7}RuYQ=B z=#viZ{eMp~<-(9}eB&FWQVH^!>4R2L?@fDF6T<07*naREEOayLF6w3SZIC2;oL*?e!R&g!%k1#yYm!BC#D%OItFBWTBg*s$AsGu>*Fym&x7< zDXUqGxXOCnXB@0Eo7Pw=oy68!*t&lE^R|+IZF}c>s)~J_r_@;}Y8flFXnf zCG3~KfW7r?O378C$dui#h-0uUi~WOrCS=IF+5E_^-nM^KKt57SvXkx`T;1EZ1nePj z(;&dKhq%5ggZ@Q&oDdLNW`cZqTC%X3hg;bF1IcC*j49u>IrhLKbbA8^?WTlJeBpoP zjwIA$CDW9Ovnc*p`sSEcl1wHeg?NT#QJtMfPv%IK77+~Dar}@= zZ@j@^7)o)UP=k+#U7mm8d(54DjJ;-$Y|>K~FRO;1icB69Oc z?5Byjg=tEmV8Sx-HHEQmkt|N*Ih)K^e7b#`etS%*S|*)HNQ&=%vnz4iq@j}%cH5eQ z?>OSnFI|A6IC^KtzgM7tfTklp`l6&4|20>U^4AoX`_^5X2u=N94anqoeYlafAGE{} zUAP6DdEg9%e3sSMUZXjV*&T;Gbn-YUV~*F~-e)wtikdVz|M90u6^a~BEwQox8r8GQ zEbkV0_O(2E=9^?r?o&CwAZIIA54XuqwdrsMb}wRxmsTV=ZB{1iLp7$d%d`DTNkEgQU=ad<1O^YQWp!a$)h3Q1O$*%>s+ zjoYM>u(o@EuQ;54_;Kc!A0aDP-buK6XB*uW&sUWPjfh#<39q(SAsnG6LX-`K!ql5& zpYlk}))-dKVO-1+-K?XuIxG|y@k~>u9on{wnbydP0_=y9^kUetq{)s2)T*aZF=&qt zQ0zYbRhMA4&DGk8jqb`;K9NaxtvM8x6NDa zHFn#u?-+FA0(w%HCZ@5c!MFs16cdMF$JA5@pSGMIhQ`FeMjTc}H$N0PEkPg)iJ;)a zJL#08BVWFc`ud?MAifve^QF0ePZBq^uq`okLyEiv6eA*G)5#vao$FY7gaCj*f4}dK zK+j@Hcxp;2w}ls$wDGVk<`xPJg#bzJs~|5{KkUGt4Iwq*E5I?a7NwJRY&x3+1_EyBLPb)1Uk#XHOmD=8fwduRb8XwuH{3 zUO$kh8aEhA{f7uAN~W?5`#ssc2r0C9++){g;5JF+r!ZWXk>f&?WiY&r(`(T7P3$0= zD0#zB5)4X(qLd*@%l3FOH;NUNTp^8Ns*(mQWiR&;6Yjmhch~#64dopXVRZBblmW}yXiKYmz&gl3v;W5a{CotE3VK#bBw~x+teE_n~u)z!8ggyC&_;?O+M&w z^R~mdlSG>q-YLL!P%EEh`}n_O`t1Rm=QFsSm-u^!XZg~{9^!vp8nWLCaJ;vuE!^hH zuYQ@&EosdE^IhIdl?XRr%Tnob9!-X|nMs0X;+79J{& z787>^0u2VoCl1qby-7S6VGHW^Sm9Q$g))wby`IdsiM$$zN*Oyf;zq8EUDu%5MPGLb z`wsoM3q1$Xb{|9~b}MHnnYN@fq2kRFm8Gh*aQH$O++I79){D)lHcbB3M_VHFce#9G=Ifh3kY;uqPDd zhM6Eyo{=H_LO3LT&KFU#X1)+UkDlp$DxWhIzfzSzu-G(n^h_Pdg5tIO2DF$#ieERO1y zR6+~Lr(ByQU!2BqhSGcM#L5({!yN|whE(SZs9|GsQ#ufjqcOQcl0r7ifqEcw*`oMq95?P{(j=h2nz4saBnS)92=Rk3@bJbIawDv5LCW zvl&Qm((k&h{1}c#PrgQ&Jq9&_+?m5^{2eI(J?dYVlnV zW{bNASmTf&Wl)dzQ9VtHW%Xi`ag>txLzE6sXG*A*5~-ezrX?6C5mEO5&DCX6r=p0w z{(wQtmuZBSGsGN@(X}86YHZiL>@-H$*%V{d!gsSo`W&;C4|W%? z72=N-yzwELbdm@N4UKV>;LuCqPxYA2y5wS25>CWrFXRB_N?E#JNMc7kaqiY6q#gaJ z1No>eF&_~51e5j7CMD^WnkI2e0mF#Xf|!8_y+ppYh`V*0L9fTiSMgm3r@bv%Qo5Oz z+KAcX=V&$$@P{4wvk_y-a?+*hID{xb*J8$zhpDJ!OC^%&6v=dfso7(4bWc4Ja4V=y{!NHj5HRv|3FX zhYdRI22o&ATRbD3fQ9>~V26l8MUQD-r$l>9TaS)-IreuYQJO-(He;;S|uC@Amd`j-8+P*Kq{0DiU#P4Zg-pjO_ zq!Fs>`@OLK|Fi@YC@7u+RusAD!WySAl?PLyad;g)-j$gz@qCJp7ZOZe&+)r^PmzA) z-(o%eixjQLP&Qtql6{ti zHp-0@OP{DRYPNafFW)9*oJO6#$oaX)c}S1BHPhsGrZxIsd4X(WoksJ3?dSiDpZM%g zGJoZTIivLA|tDH2yE2B9pcC$_AT^50?jipG6|Hlg|B${f}yBoQ3HdnC!Bgs^n#9} zSj1k$RHSj-Dlst9XoVa}CBr~4#FUtdW?`UmC>WeZ%zjp5c=$H?_%gm5${dihXU?*8 z>=@tv&Nrp2_Pg(mccLXe>g$K61MvgK{zUy5-@gaNVi;yh-zO0?Bm9a~sc`@!cE}`E zd~bl6Es@9(}We3B>- zbmD+cx64lbP!7G5`B{>gBAwQugy>XZcqqM>44IoPIuJ1=Po{Dtb5&{jW;-^yT#iRB zoM83ZCE{^W!ei?j8$`Z`nJP%D>TbU!VKqb37xm&JStB2f9E^U!H3y_d~p7VgazYR=I)D*$nEtxQK&h9q;qhlTR|;IKlImeigD`qdHZhyWunU z#w&DxB}FhgLu{)kw$LQ$lNZ1gFT|q|egl2MV=BAJ$NDXP|MD#Lxf13x&#=2^Q`}x- zG@PQi?s3j=2v5#ZUb;Zh9iewS>}}iBRUt@Ja1S@J`+}qar^+Ut`Zi0kPBgzl$Jr)$ z`4WcLAyrr=Os3I|9Bxi$oJq?Z^g_RnAJ~L(Ou(3=punp+!o(DrbP5d%rKI4-9(EiM zEewdeCGt1ssa~kFHw96ngc+!qmPR}^jarHbM=nv|q4<455qq1|F$xCQLNFW=41JQh zY09}YksUB_9qg$jTEQi)4jJbRTt&wmrzq(qYAFlF$S{|$U@8Hv;fRu+A+PAHHMePm z9g^OVPB3IFy?GRgXfzs!wA(FteF`Z0o~h?i0dap+Kt5VaoZf{3`~DRl$-KlHEd6SZ zhP%SFkg!jCf0r=wWyeu2l}My>64nw!vO%X!;EYJ;%k+C~x~)T5B!VCz3zW!JPiFIE zrfC z_}=%P$G7{OeC)?L+}Xkyx6yS=YEXoBMR-#Y`^14Q`Q}#AlDNBw(G>2%dMHfiJQORG zVORFywuJU#k-=_hY;JAS=nOCnQ^HqM)iOz4r`h);Oq9u`34@5C8&IrOW$~QYGQ4|; z{_b)1dj}wQ*AMC#KB#cq|1-+_zE?T=oAJ^2|4n*fP2h_68-WQ{o1jn+MnlQcD`e7q zcWsNFUnNsIiEsvtW{RY{FNGhGf&{ULz7FjRA z%7`cg1$*Svv0ZAVY0AY6jZu$VzC$=SAlRwE)ny)i_<+L)N9=_ob{Y;-zDj?zPqWvi ztfv?aMqKOPk;S>&*`aT5k<4evIAR}Br2WuvWYg>Q<$fUC8>E2r=wiG(8}r9MvNHKd zEx}THpMlv?!4R9T5C#ex5HXM**e=6f%_iW5dGR;M_AYzb3)m}X-i!!mei{;ZsF1VJb<)%xBZ%~nV__E5uE;>Y55 zhQT`_P`aXErqXg#$z*aE=_0*OLqcgn3nEnSqwYSv;gGj)-on&1rb~H(u_os{>2zLp zY3+8KVW&kdn~ygr79HjhCG4xMk4}Ys3A``gcvZiWO#hRB*Bq2$nmF+=elnL0Tm#Z+a1lgAfG z9XQ;%e&^mbCyItppicnS_g>k;*!4$NCLgIKyl3v(3A}fRF5YbUCW}-wp%@jj5CJ*a zLrJ}zT|ULA-zJ%=p&dJpCh%P8AUHl^ZKX*WDu?wA`LPh+3DKBMlFoOOh?<4Tp+1ioclPG4` zSigxD^yQG;@jd!|TW;baQ(feJboRGINtDozcwFH)CKCQ!LMxI&xUb(319BvTfB5!N&4)9(wb7n4$@OuNyMGZqnKl}MQ6@)?SSj5Ly* zoWzlFy8=EO%OT7=caeC$krXz@@-~wqURAxrmCol?Es4x4l8t`!0A@&Vk85n57I5QX^xwPr(Wb`Ds8s3D?tBfH~ zKTTYEiCixtIr|!;-Fcedvibhft7w&rOeG(rxPHh^XN#d3%N&`*OolL1ps~Hf{&1D* z2_N&|GfXQZ_7Zh&^bg6ZeUeO59%+nYgY{$@-`ORVR0;Jd!m7y95u)1)apXZ;M-@u? zW9LXjB9*Ymlz6=y5$fjB60r%6jggEog@Z!Z$F{TV+5!66Tl~&cg2qrM-8P9Fl~9dQ z1pMre87eU&rHzt|8T$eBIv@nHVh&-dsCp8`)fjss`gsgu<`PdaGt(pgV>|3mAET97 zl%7_h?lTZ+qOo9IhIE3Cblui04c&A|<`c|LpQgMpg)_Q6nR&*_(Lq5wIxI~ft$XK} zyB)}nys$o6%k|!!0(SpxtxC&*$yq_X>q$$;?X=M)T~%Rc^%A9-las+$04KCaImw1sf<}ZSEN!ZVF}t}7-2ahl2ZH^G3@U# zZ0~`QlEq94CW&S0pcw9(hA@fLCDc})o|DvLVbYjL=_dSq%*W6L@I6AawV!u%Xyqbk+1tk0$QQId!oyO0d7UobX^Qxq=v#cp%RM2h$Hk`;4~GsMB?aTo43^j zLpuQj4RgFiq->+c4whz<(Mvc+nmFO2<%V>OK70O%1*MD=-x2Sw^kkD1{3F`AxE3UY zb)PE&G97hd3#92E?Jf9+r~`5DDbe4BjVruQ_$Gp#1Z`EEtVK#+QnhIJ9oqYwc-B<88 zdj~RRR%j~%F)I;lovbD|^Fg4Ju~bg2EV49PC5}GD-rhbV$3ci$9Z63Va7h~1>#%vlKg;>YE@FFQ_O^HU-Zx$beT0MbbAMA?tVXO~UqKiVWDH8~|W!UIk|_+tzxvbS@SYHgZ$_ZrQeSBdg5!Atuj=l?OS7R0?rvX|U0Q5G@RuK_^zaO}`5HUBvpD%0KmK?BcQ&``?5_Pw zT8;0qwKGS0=4l*lnpu0DQ@Lecx^e|YA9A5^p3(PS;lZDJmQnQ_SG_Ei#Tk~P6rC{1 zj-!!Mb7WH)ywno;a!evlFj%`rbL$GBw}n!iB2zZV^-jaLk8$zmZu9!0L+g@3Dhe5S z`>2+RnoALPTiAAZWJ2nqkCSMfG|IKQgq+7oAJU?|8bP8!s4M7m2~cY2mzH^8rA>P! zWX&IAY&6O15dj9S7o%7Kaj}HsiFqLmMoIdOGSofPYd6tEu5(|^E=*$IMT>0G#aW_6 z2G`g{6=$8a&W_q-DISrtDzY=4AQdYcWGR@4?V;JTqB-K)igQ8Fx44S%%m(XSOtJthPr_E^C zm-CEN^%$-88^Xv3%@nDA8d@BXFHe!L=p@p4iqp$<+J_9fO-w~(8R%?o-sJjfM5R)e zOs5xKd7bsCs*JHU4GS$>WxKvRF>%xl8AfI528C=AZ`34k`_f@ovr^K1S3qi-8puw> zv`jQpCy~mMDW)ZbS0o+gvvbUq(-Kk=1!6vtB%hmje)R^z!8A`Mmy&|W&Ow80p~i`o zB`*BkpW*NQga4Mp??1~QeDyDQ=<`2LzFMS67mciRGfkK#Rx*X_`s}P;Wn+DvH*VJ1 z|N5&u^s!IKdCldGHd>@{VtNHNktQ+wDC2a8`Fb7^_m{$w8WpOHbk!>gZ?w zls7JaA7dOd3LEUNdYFNRH)j*(ljJ{<#a16;yW=xBrc<0NV{hHT@0h5cdYrI+lDI96 z(U|y}$CJF4yh2nj(7XCM5|2O2#>^w!N#uNTm_!k^J@qe(=T&Ebn&W%$` zy#AkUs>#dz_=Stq(i(dk`~2n20jUdF-kMT5xaM-KQ($4LKy^GMJsPt=>d-t~MKLN+ zS(KU%@7PJ^=Fc*!AJFdYFkbDFuJxH;^7*n`p>wLt_pf~y_4?Z=rm$g2ieVjO4D`iW zbR$LF@1gZYC|d!|ve8|ekrER54t}G7Ux6@{CNUUOwj8XH!h_8O!w09?Tx`=_y@9>g zB`#J`jVdH^2q(};xMh!8sJ%9^vWyy}P!A4?hb>|&KrsbFEQ>Zu(n|$I^B%EN!GCjw zrF@sf>0MrJzCg7RQq?R0YD*XygL{M$-87E&mUng>5$YxmaHeH_XxHU`iSCA$ z=N>>w=y?4$oo1b3zmI44D9@dcIuQ}H zWQdJfov^v&pj^xyoUXKe(3G^iuoU5wCG;YKg`sOw_YtbQOwX^7D^%s|VmRpV*-t)( zYB%_uKmG~}#~r ziq#_F{^__9RuLDnGa6CI)?^H4x6_g>x0TFLD(AVi{x*A!j=)wV5#Z6YOR@uM^=u-4 zC~3x#QQ+JcpCn54#wB@!7D`#!bqMHh)E`jS z+MK(vMCQpSNId>Iv~j>|zwxi=?`|@C?jagVNSG^PiIX9>n(MUgIFhtr z8#+t7cgX50)p*F(>(|+|TR7ub(oEmiZ+w_mSns;B-dVa~NSkqyNGRrUa`rY1*q@2W zeBv8ae23NzPr4=x%M;5;5)4~(nr$vVQ{v&wKjTlMQ#hCZIl29t7)v!$Gop|OxZGe= zKMDOg8Ll-c9uwFx_9iR?#RqTuvxJ|olE2g83-h=6_O(kq|E;euS6bxs#V(zV|C%3r zdBmw_p5tHDET)Dlv{FU($024m$e#9-eI(Zs>3 zI89WTW;beKIy&C=G_`%5hv&w8t7bAttWi|0sl*j^kAB^=5>GUpUIU03jF_FSA0m%0~;!cP0sDUX?FM_F_%92i{ z$>q!JMjk=nQLap(DiPg|F7bN7;u1D00%{T0P~^JgYX+l!i@{(-dEpe^Xuw-9eq9>v z`OZi(o31?DC6Ou6v?J8Led&O^GCwULpq;%vxxv@#`|KU;NsD-KV~7q*z*IBk8JQ8% zsITLC7P@N4LAvNd#J~AcnaCUBid^&g75Vf5i8B=WT%JNE!%lsNcBjX} z(hB`flU}=lO9=apex()bpM0WJeK&BcIR9>#VPj7fw^~`{a~8>TwgV-DT%Shwai536Zst zsFEy)6Z} z(H?5XB+jK!gqF$QA@JJ-ZciQ*6mgjG1%blCZtRF#LRu0Wb}RJLA^@v}ySI(e=wO8l zWaj57O)ue>r={I`-c{%hhWM>I>i!NRr-Q9IjEhMWiUhGL(>`rNEN#q8F(sX@V`G)X z;|*fH#9FaP*RTi@;p7qvCxYbr*>^%S^ZJ17$I9=(U?v zXO_s;j?)`n!Vp|aMJ1Wf%b7@R?ih=yEUp(&nLowxBkO0OL22yXV#*q^vT~e!DNnE4 zrM}-}bMKJdtqnOZsm&cnPo!8`nwJCTet#(QJPdrAo7YGcYm}!Jq*JdL;zwRc6l*f< zzc;*1I+Mdn=Ot%dybgOCw>X?B@Gt(C|Cy7=kMZL7U+3E|T%uM=Q%GBEZ{DKO>B|kU z*=+OX@BTjj_<#CU(hpwb&wu0J@$e^~;?()as2z0p#(WAhk>c>+Cf()% zsnk66%~dJxw5FzLwVMoj1FT}1g2DUE)p{&N_L12_Q?wN+uQ~0#JnVb9Mos{da%Lh_70JCn#FvD z%+OzWF=0Dgw%in`IJje418!pI;phIT=05sWXf0 z>)+ze;0C$J3tT#uVe_j#m1`}`N`bR;pP`r9XJlXI?VHb&%^b%Y_iz#^l)1B1+ylzm znEI7xadH{7+!VfuJ5J9M*qcO|6hNNL8h|wkr&oo z3a|1mil-`1i;6rw2;5q@@dgnSHER?|_uPb~%OT)lBn}vpc2u*{sL`16+;KYHz7!S; zmX!#T5-g`&t|Whcu=h4eIpo$Q17|qwlc~(Iw{@H0$Rksk<6v)>WF{wvg+d)J+J38C zl>Swtfy?r-lT1y`GwL<)&mJd?BS{K~qNJof?(OeOcGYm;vVYj&kx%`E6fs_V=^Ln; zjy-VY9wG#cie!c$=QycMf#Gn3J?i579=aM~XtA8-Jpb}r{L6py|L_lg;V0x!^pC#s zX9S*$W$M(X7bwjw5vm5S{pla!Z`|N^I?1I=m&qtG|NZ~)PgyD?_~SqLBVOoqn4X?O zD^Iar-{p}DPw?e0{2aT3A)%F^ef>>_x2|HPbGXigl6>R#8ZT~dlF?P6d_xA0J%v%K;fWxk)f>3`d+3(+PWJtM>%&B_ROS5zOKcwEJrXe1*S_{u zq97zE-gDhS&u3AbZQRHvp&DeCL~>t|QEHlw+aT~Z&|A>)J>1ielMQAmSVOwomnfVG zh=w1hc|*gP5ea-V;Eg8~YC#3kx$8IyNx|nf2>#QjK>0)5&y+Zv$>5d(l1o2LO4;Jg z-}(l@mDeb&oTB{r7fE|J*}L<56lb0yG9SiZ2Y34xvB-?^RYEh#xKv`COfVMLuNdC9 zR&i2E94&=fN?^_vm`bGSi?FrT3Yo3j#O6R+o0z&VPmEB7+I$q!z5EhnZecuhn(X`n z-pi+1$qpGl*kiltW7Ta6Rg>hxaSFBLq+*NAt!u<;M5O9;>=B2ZZLHWJKTZ?tY3!Vd z?TqEU>29r|W_l>C20Psy@{vV)?*PZ{V`t2(i*(sq$#2>WDmuDzVFUXD7u##kRdE8O~d)T4h z@5x~?p@yQH7|A@{?#&5aD^4TAw?~6gb(UN?mL6F7@+^mYJ5nj$I@rNd1HN(XC5%j2 zs=&km+f1Z6cVdxIw}BsOq>59FM{VqW6UQIR$1T*iiwiR(8L)NzraTFch0a3Us;LxX zaRLrQQu(ahV1$A^mB~s)x+o0o?vP*m&94$h3O8=7v9dfzK9`nC_}S?xnJ*%!hx3&T zYwnP@E?*`y_L*KKb4k#619gG*h?hqYqm10b`zLdu9_B1zZnFzk2QHI11oqi3u1e2byiq@WKNWi3XnJwlR{k|qU8+={!D)CR$h&cItnw*m-~#CnL5 zQYK=;NE8rp>N)B{5;0*zp|JQRBK=z=^Z{vgmSXO^>|NK0*Yjioh4F9~=fyW@=QQ-s z{wy;aNqXzg)51hA9wWJQmT=g{++8I()@j%Gq)NSV>KvY~5L~~CwtXm0ETrdWDW@Nz z_pK-R^v7Q2>P4L!2ThXu+mKE|Iz}&)QOzWQ-IF%!L8ucRjwl`W2%8#@b~G}NRQT76 z2h?xAKxb=6W`03l+g3J9YA#1s6Ew4kgl&-0eDEVIO-Ico8Cw;aPLjdkKo&Wst5CD( z5zy_8DCcq%)g)$rh#d?V2ad?HqF3J}-dZIN9E`xhGvHuQr%;%sI(v?+h`n}P^eD}K zcqsReds?!iW2$nL19NYPezyaWo@hVnKt3{SeAI!&N4n#Z*%!4}J0TTv=V`xj+9ZC(}B;oh^QAV^wxIdv#$X znBnagpX2l+7g;!QoZ9j-wZXf-*zv?O24-`eZai&ShB8n;&2c>5YVS6-)FDo(_m zx+y!q_bSmp%t+fwBBAoW&&5Yqp7`3#^bGqWk8s>0N@dVV<6+TPO$x%V$x?8YKK=GC z!TvT0vqXOJVd8_KH2&*ueVvuh#DvQUoa-fw&;Vy5c#934i9K>SnSscMqC!G+;tILM zJmt^)H@toG*Llc0$(NSle@nf_jgC+0OXM!-QVWW9dhi<&r+K?hPnGK zc5lCqpR3@{9A{?s3*_A{?$#>Nc9;HM9krAvkuDQ7Mlu@Lz1AV0yw17#n2TDL#?(Al zPVJ!|u41?r+1w&g>|&b`=M55}fwj}2wbkX&fKwO0&uC$pdgTOaU=!s6?D{_T#*jwq z0IN1bVs?>awm?P;NNPUwrK;4}h{In-Pm{`4=*LAi`&G6S8>j4HCC8+4CE^n`mZNEo zcO$aHF&RV0i(Q;BkYtQuuO|(T2C$W`abC9{m3fee=F z)NeEDG>P=29F_;6iZ|?V?CcZRj!UnxO(Kz$+7N+lCX*$EZ=u_*!`Q`%CkpFmWK*cA z(lD{ z4bhk)IeiM%_2`er3_E{DqTzBFi)`%^n0L;g7y+>^W&bF_M64(wD^r!HaY^g-6^sJx zulJaLG7YJDhRNTg?ViJ~mq{pN#y7r$e*V8g{h5D;vGGmlbXdFmRT@*LczF3~Jn#E- z_I6NPeL6GCbQ4LE);#{XC6d~UgbkIRdQ#4()PaXP&T*&VqJ65(A12$NT=FmW9YJI`VI!X|tdkzU97A^_GN}6ms!(JjqFKXQPjvo~u@Vj+*y*}=@^F?F5#?YE>_J6WiaFVxV4 zd7)v-If>YS#U?p+`xNp8dF*I44;YNvB+^+@wUdn2FB1j>iq)A(h?MV;uFT3IxELTW zoW981aTpG|lASf|9&+*F^O9ZE?TYx%l!UMp-I5n(Z|D=LCfayFO7Tcni{#TumKSPl z@9bfBM5^5gGhM()X0WUzQ^(Gd%@?E}mzaA9%}5Z~66P4}uhS6ll+aFzA$xB?!n(rT z+zcyAizG~gk3aqh$ClNC=14Xe@E=<#Xqy6TtfVn(T~(%dME9JoI3h?!gA#jxDt@cjHF*kd^2k z6vHe0u>`HVm?@yf8m&Q_grHRiHvV1@Q%zwR7OLVia$Ve^gJz8>)*PZj1+URzbg+Xq zl|b9rLK~&f))T~+e}d?+hL&;PvC&sTxoM$9#N(qEz?irp=m{9LHLl-Yqj>x@-&%tg zw*tv7nyQ^3SW`KC6e;qCAVwBQ!_7q-xBTIa^i?w$L^G-};lwf}HaJ~Kw>4dFS3yhR` zw1v}TWzbuQFJ>xVw;6Z#N!kt60PI3VYCcFNP)b7JD%>H!omyn9C26f~671KBTL%Jq zKp(GRB(fmj*s4aQlEV(Gl*1e+?LD6FwYk>Zp)nSsLyJ<+kZFU1a3pE}dSuD@W+wJA zoB_Q!BxPh6dOegwmsZec-0PDHJZW4SA7y{sy%yxPCq#y#`#k!*un`)Kh9BNF`Cn-L z&=e5wULN{=pF9e95%I3FfC!6?qjbAuw#4D#4*AMFk3RDYH0rlxfR5;k1x-&5$YM=K zRqpR@;*EOJUndNG!m+RypV*3c?G3WoB(57vZ>@1ccoP}e`%SsK3AOv)-k-_N#meMa zKKn5qz3?DUJ-#T_>}$I%rWcmc#v`u2`6{JSdE!kqa&T*TEW>1b>kfA|HyGJIJ3HHq zh69eBxkx-5(mC9dW|0fWPT=_gdpqm0D4jljf~=vizJ434P~zl?vs``q7WsUR=~|g` zu^NSGVkWV~%8Z}!Xs?0E`Z!_%l$j>hD_!Ad-=)xIVLz`5g%!;Yg7r3%!@crk% z$G86cFXRm7mw)B&GqtqH$VhYR$`#T{lOT$js#YZ&XM183(I*~5M?O^V+QL6fE0gy$ zJVzdo1W`aaRi$dp^LFq(T(3#e%8|(QARZC8T|6%$iVEm+NvsDN6rE{$>%xm{2lLbz zW!Q&djCP`e)A?oGx4wjG8DJ$QU4|MEOWNpo0%3_QPz2tK;qF)wM$II~DOx>25mrf0 zKSMaUMK&j*WBbg{t}xg)$?Uz(bnowTd=uI~-{R%<845REWH57z#j{W1_UlA~&U)vN z(c2yi84)1$2xqkv`On_sKlWBI|16jl{q<+wC#vHL=x@gH{8jH^NXgsSP`3LrOD_s>XZXf8MPf5W-*YM;*vVXSwdg ze?PvjwY)n6k(_;*YNtreN4qcr?=_Gb5&#jx!v7hHCv|X>x!hCirkX@| zZsI3Q+RF~7)kQY;N6cS%j$dM)ujmzCSf0bawT)^bu_195%>KHR~SVl-RTqm-}GRikW9<4K!UTEgxH08wv{uUT2{_t3ti0p599(%V} z(!_~Yzo$f(RyN`d4u<6aU-sTRNRs?I5B$<+mN#9lefRWuv$Nj80|W>NB#$CUiV`JC z7cwWqxR8P&MO@s)QM?G=Kl(=o3h4|fx&;9)VF&`CL;$-07Q2hZ?#_;P?QL~=U+MGW zy{zi#87xSNCk!!5W<*U-RsAY`zW00Yeee5X5r)pLUi>CJ$3|)46rOnWgP|~x6Rt1t z0^|#mP*oANy=_>7AuIJ!6hJiX^sw+cZ4c#u@3J!+m<}RF z3^UVdT)KV>YuDdIESN#`@kP9KWd*OiaT%g-afD;``^e;Sn46u$t=m=@KD$IUucA1A zlARspk7J69Sh@(;8ZZhd5{>gsyf{C@FvDonKyD(9)wL})!W3nlJ985GYz7yvULUa) z1Iw%H%*IQOggR_zrY4cgW%xKq^SfGW;M&aj7jiiI3*FRx;Ezk+k8Pcl8q z?Ui*@_p96$Z|)z%{^~7sO&hrki6|XGt=`1iP6c!GvxvrH*j~PkJwZS^m&IexJO#f| z#+3_i;mYM}5SKR~Qxl@5g$%xj%3TM~?0uv%3H4C!-X7gk3N#F-_OUNt#)kVZ&{|)> zk;zXY-qo<$Q&3aqSYy8wxq*qAf}QV7;P~-87PDW*3yI6N{UVwD~-8srO=e{|2TqDjG@? z(Gx{HGI$y{m#^breyof7rB&q11E}x$2sBs1mHIx0?HvsI64dlGq9+w}YfbFdve+bX zwY|5X)!VEHNU1TeNvW(1t8m)&3VfI$F=@?)M~$dM6^d0vK0c49d>O0x6WBOyz;#~X zXU6Q?um*cTixdkL2(yb2eGlHA2UC_|oLt4AbR7H1c?7Lpq(~uCqgj3*L05#Q>k#5` z1d0bCDnTTqSD7Nc2oggdIVX={N`VlyF%^v?Pl9s0YpCpQ;C8o+njRoowh<9DL?I$S zk%H@Vk?aW=L?iHfJ)DpV@b=1Zx*aI@2yosD;NV0fJ-g;#Mj#K&G8~7Chpr{(B#F15 zlmv$+9MY5!1EiBNE`GCyh#z3-p?C94zDc!>c8l}u4&DD`d#8u0K_A3(d^LS=7*ol$jfi%Ir~>V%A7ty;r{`Yxns7T1<{ zkW8kzE+fh!3(?531YM3mCCYhC;{qLZ{TiBvYOTtgOIo`P-|S$fkU)BB65^?8G#X7d zE}2vc1JlIq)pfl5+MC=FAJKKh;}MQJ$jMQ`_vXzNT=Q=+UY(Fzu z>2-9=P2}}WJhdcXIv&AZYa8v>I-HFp#MTrL`$Yu3C%H45!`L9njhdW$B@vKd)cH*4 zLQxGn2)&Wem8YzJ-wXp_&(19-`uz9PB;6pd?^0~991S!Z`6-sUa##9MP%fWDK2g8_vm@6>f zR!r3R`So%~;cGT-iIie;p_^f(rz9mdZoyDN&v#)Gyf`|99}FP4LkO;oXxqf3ub_}C zpf{0az>Jp2LXX9<^>)~=>V!g74i9vvw(h??kM24j+6~!oL^}glZ9^8i;tP zk&q^BDrs3<<(e1TrC~vPal8M$pH4WP_;W%-` zV=)9NpVL(uarxMx&bX$loPQ^@2sH-MP2@R4t})EaEuh0qP_Jy` z`7it$A`9<_JE&o1aw25&C9M(F;D|w!LSz|<^du8;PR$XsXt7kpL?(@`-3k(73rnQ} z>dh|qb+mf}HssN06-O54urNCfT~pXG42Krpx^xW@Ll1?qxN~1%=P{8@v-04~R0*kg z44a#~*xoI(u~teu@$f@unbT`97~-ohew!nkcR%|ir@WHsG)|p7hVp&|7cN{vv(v-QejO){E^q|3 zwz-YHat-mA%8ba=(N8G1yBK-za|&x*b2&(%i4+)lur?#e)rWX0`NznoUPDXHV$a!w zFZ8h>t)fDFW2T91ZyD3kCiYw(m;EgSRRczY`1IccM?MeNS%XAkAD#_YY$Nb=h^EXb zChElZT?LAvLX8>-9720peD~X=NNKCE_dQ5+MIuc`OnnpQm9sE1N!-de(Y|0|Ptp;e zTfmW34|?f5nz|2j^BTl_5oaeKM@C6vUrS=JeFN3qO$Y{2=;WdHYS!K+-N|hsKj<)^#@EBA628!^(a!V4butG_azL1AzZT!bO5~# zSkVkNiQ>lqjtBxGy*`GNuC{teW{P++S-??2z*?h)j1r(I$r#!?Vn!a7OblHkhTU!j zdv2E{8I%$K*qBI>`LIZpkQlZdcSM&ILX6FEUG@Q9{z5nqn&lH~E=Iya2Ms;G57ji$ zI(HUpCr=@B?HXpU-bAa>#ze9d;=JQA)V5c#yK;$@3AI?3(=L%{6jSp{s8#pT?X;je z3JXTjb}D;2h{V&7Q~}LqgL_A)i<`RFO<%;T-}o|Xs^?2{OiNOlJ<9tPjm40e$RV(I zaOB8Q45R_l1r23U=h;>)Lfz^T!*7jP9IEa?)f6@uw(H~3M;=1A*GDRuz}(zC7sJ2v z##N-#DHIAhtggSwH4UPTzk2;PpMu4OIn2#WLRAL%vA^;oh{vK#7r(z>gX?=-@1PV^ zwN^*B-^F*{xX7YXw(Y`ke2z>EL*oeP_|gK7EY70ZXrR1b$HLqkr@SbtIe+dH_R1C1 z>n)Dh1V6ygvT%EC8-;uxlf^vB`&F#0ZK2+5W4~I*GfzB>N6wyMc=8J`y@t~#jv|+v z!1~rM5;23*T-1<7$S~@-pPVdVZTWi0diy=g{Vk%4qeA}JgAnDqJ9Lmr$8dE1Wjy6o zu~+kP>GlA#Ge?mr#$XS6+^16>)*-qQ=JEiNKyAO%sMf1EH_Ss-72qTgC^aNv{~NN$ zlN<#SWIUOQLzYxd)7sV$v3LwdB*yhR;!Bfs0RpKsyB?;Gk@BU5>({P9c}2u2s>9t( zAT_8!QMa*Rn3!@jNd8Mysz!loUb2Rw7chG;Ju`vyIrJnMQXoQyj~UnI+L~b`kaj)H znSFR9TqcJ|MM}47@=YjOltC+&)93w`#E{iNpotZMQ#L%{g;ya`=QcC`yCHkDs>2s0 zh(bt0>IUI>&LIc{W)UD#p4bcZdq5|er63;yOC_eOocVl&J4V6j_%~qF- z^tW!W;^O6N3}-%mbdenuIh02qKEp+IGF**T8;<8-Wp#^bsAs2&7@8JGUDVC8S81Tr z?ciIlyvC8q```5h-neuX-+kjvhSMezF^+V|7(}Bwo_Op$%KQ7cy}ZHE&BoRaws-e& zY-t{koIAm2v3!BVxDwdgukzSZaRQNu&RLqpnIbm#DyTL(yj_YqbXmgs`Wi=?(ui5$ za7X%mh4BibGS}gcd>@`9qZ3O*$xp*JZ8WWIXqim}`UHA{fuW#*OqrHUU}k0p(^JzJ z+Bcx<4kOH{e=ykEWrD0^+0+MsmlV0LyhT3>-Mj#t?%djym(9jA(>BIy^SWL-cc8RmdJ!HI9ONKEJ3y@25YQUI zZ|PofM*nXTF(O2$k^x5y;P@V7k(zNyJ_^tzqHCAAZrDwwfp{D}>S!kiOIkdd4$GGz z6H0DWhaKOQmi?Cz$OEy^jMO~j?eBD=gR$fZ(mKC#4IRfuAWN8?o5q0Hdwmb7WRfYF zsTdy9MQDl)DQmDZ@tqd4%pRF7a`Bdn;%p|fkentWhJoWt^RO(JC2|9wkXkB)AUV=R z4w#N12)YPbYgnn@fgw8+HsbL( zJEr~p3Oka?ToP9dnxmH(}nKvtwilNtOqt$G}w}vQWVh|LKfeDoU zA~nUu=>pCyl+Yt>dO;j*zlZhZo19uB=r7&|40AsgM*1BT?MIBP0bu8*@Xd#R3`#74 zVZRG~&c~AolwKs`)D5prm_u~%ZZBbwl9Z99WFFc z#&q1kW_O65=W}n=*}(>)ULS8o7ST{6nCTDkMAgKtgo>BrGR|u%X3{x67aOfQF7yV7 zsWK$jXQt(l^+Doo5X-Va-0fnBppzV*BLR9(d}|58XKnwXq(V9%r}^)>2nQf3ail0H zj}UzHe}D8>l|oUtAPBFmA98FT{FZvGC=(D@6~r`!1;h|fpue*L;iZ=#*6O1s({R`S zGKKYkEL1BP*FeVk$MFP_ir1c|p%;sx*KV;?t3**jqlrj_kRTo-l03H)DvMF>-VCXj zg}~=^MWf&wi;7}Qr@>XSHcZ3doHNs?@MJ7NJeJ@NRH88mJ5+&KJPLC-U~Lb&CCTAY z&4F%V`iyhL)L|?Dt#&sgVG9EEdsY}-*%q&le&>&t(O8scPlMrr5nN=j={-dlRQoa6fd+hh z(P$Kc5JDBl+R&7CXtkQC*Xu~8!=_7Wn4=jbJ)ordE=mdtr77(0?qVXDf=2mrJ%+X` z(V1aK;gC9_-$z_@u_XcFar5OOFHWj`68jtImxm5*cKc>K90OGxM{T0@&>!j>D(vj?`v z&Yy@u>0Y6Tg_#v>56Osvd_={SY8O#OL@^m6@CKfT+R%dPi;zh>T@SD}jN)$}UBkcr zz^nMbE}X$XedQ<~%d7a6XO5$8TKESq-h!vYPZ3&XR|BKp$T@ME9+ zO?>7@-h~UF_(?wgn_u`0>&HYs^rH|G5hypx_-Nfi_uUKl;=qAw4^dLThEg(v8~tZc zhmU8MJNS7^!)MM!@q7^Ae6ND9Ie&~dlgIHh($mna9wOqObz<-~4H={N40@3yzGv+q zz|+MHnx>66DlH^bnSp&dL&5op6u!Dq!BRSkADt`Uw{L7=t201EkvOu^Bnfd4A^m*NmcI}V#2gGT=!beB;C$$~Jvq!r(gW9~T7{uwc4m%e z5@hfQJwdrm%CWM}G2LLIz!#pw=#f#B*Z_J+rBY#-EQItZ^k~!UTD)gA8jHs{1ZJm3 zH?F2}r#W?#^UPJ&;Q9jg_eo_?L!qE?!(p%6W#<;pCRq1?+loC05*JbdR}~@JKJx&P z9*E#s@PatpKw_|tL_9zy^{^De8Ee;tCAbhHT6i4M0G<^flb+zPylj&Cp^jWchbT+X zOdB4l=w-4am};ndATULT%WzwIh{!R~@ze1|W5Pk|fXN-%$cc>BqVuj1jFZwkp2yCC zobavNw^#(LTB)#9usN*q3^W!`@OkFUwlG2!jk?YE%KIGEX{yE!{$5Ix`@00+<3DI$ zXy%^E74X%bfU>C|Uo65%Cm_copi4^k#E@t*h@?{%pu0W{S>gyHLdhO-7*qs@h-4(Z zRif0Ng8okib=uDekEQR+tma+Zu;c^;qL zk#NP!VX8ENjuPOvxB57jOE5al7DQZp{BJ;6crT>M1>^+*{l%mB)ZhH8*qWU|T#q55 ztC&7}7J=uYSD1uO6P&34*AosTJ&pvCDmW&(!9$2e($JI)67W$iY51Bap_PoF$oyRr z{@?CHXrz~r65)B6Ll3KR{Pf5m$B8QyB)rDTmUjV~L3edHD3|+-P{Kx+gue|&+nzb6178f|}Ly-d+VvGu49<$zx{E(8t zloW+$`VABmuZIK1V3IKF_A_5|X21vkoYqoTqh z-Fjjv^&GCfOij+RV_006=VrxgSFdocUl0S1s3MUFqLB#alF2xCdp2eG^jojbK)h}{OdUw#h%{P$hJwXl$k;)bH&rXRo^okL;7!pFIIjwbHZ zayW8kw%3p|{&1Z~V(`!R>TL>K6lSSS24HMi7CIEohyrg<9+CErhC>m3e8X1pd@q8y zaRo)gLe2H@8~hsyh8!B%W+DxdWNW|vMF_TqzHVSSk$|>#3C>&J!nUC!H95uCYwJtT zq1ov|H8i|LMXbvm%)hy&P?6#SwXgXX-5Ntj&l z{y|L)4pLDFu;Yf;L!*@8sMbQ!{cYDnR2H%02l$TTBBfIO>5h0*TM+NS$O&;NDh3(n}MV znMz^M?W5oA@|{Kc8q_F9{SuaGLDeC3hahgo5g& z+l;Vjzjqo-&|$u{4twZhKJ#v*3<+;EmtmML-d8eUXA=0v#Z5?o0rjB|px<4Vh&Wbw3?E7+4iv-2OL92$m*`3;!lQInF<-*w)*f-rASx-$ zd9;|HMrC;mM<(VlGgrcmSHA=`szVG!BnUn%yHLC#yue|8scyRrv(pYm_y*zZZrrMs z7?khZtr{G%a0iSBkr=GKZS4K~|AP$)os&%fE2H~R_&)RK;7^!mA2y_aT83_%(o_B` zvw8YRfM9zx-W$DF4s!X$;c`K14XKP1$<*0|%1gK~zRmDJ<%wGJ=VCq-;yzG?S!@T$s}Xi}Nv- zVDJpx^)&>R3nLO>Xq!mHVk|SeQ>j5!M5ZkZkqAu|eZGPyiRd}WcMfEtH7G_#P@51{dQ|gJ(n=~d&{gKmQ-IB3U4ivbS z4^n5L5Br z|GWPqe&e@(8&N~Q1L;NBlXQ6b6KB(ZT4v_Yu>Aj8o$#ma@ZGz909*a@kfi_fTE4G` z7Y0YHitH1eke+|F+JHK;(SrYy`E}#65|91Z!9f4Rr@bkaEjX%0-;ppG{3`!jX z?LM%O1JXLM+yFYm02hf*YG`t}s>Y%itS>{+;&3Ago>LHXaWSu9y=udyLYZ%(y<0|* zU0_JBBzQQIkr^GdS+|kRs;F-50D2sDBo0;bF&Pt}=?c`qM%__a2fe#jft#OWm?h;; zA1MVeA>!JekI9sX?Hk*0X~vx=ek~ueYvR+y6sN)(h!EgRMqsGx z^(ru#1{!N?Fw-lP^aHFItZd!xKWiI$sCY5qrhqbU#Hb` zy3oB&lQeAU4pUaDYzG75iaU|4AY zRv&u<87wL0LX&hTtqK&4n)K30M~0ZlQ{lRYcAqpfRP1kcA+@T|(^)Q}&rJhM zlReztc2PHpid}x1)I*`9Kym|YH*EBM1)ZiqRuFn73(+)@%Q~1Tbg^A= z(HsU?+tpw;+law|;}b>u0EGfzpn zDigq_uJnP7t$`0glwng7W+VpPF`*=T&=g7s#xbyD^i1m7cOee@2;$*7g=WhLs_Rgaaaj9BSY1G~J!pYDO3wUX7m7sZW*2xH)JvqP${l*| z|JLRE<+boOxvhIQ@%=zYe_9^w?Z)3b?oS#c+_O(_=PCcJb?*m!p+LkQ)nm_{JNH04 z54@8d$i*t~ufA5nWKKdnxrkY?BwVsQ9B*9qt;pJ~2|IkAiMoSnr2FRB*EM^_7_kCzV1pV?dqV67ylTV}71sAuE zPX-LH+!bOxMRu;ejLh5=+)NHu*F`=l;n8Uab=O1RH(=H_Aop${^Thkn=&JBzX)I3q z&?Oh^o(M@-VBUBIxm+CHQ~})%kc$R5pLKC@KS0w{;q+S&dn-sCe;9po8;La1X%7p@ z0IOaAS5si$zJQn(K+G;cAV&lN?<%=iX#qFdGE<8OdpDuX9fNBm;iZ$9Fan&)2Kd&d zfW9DLSXo09Wk{KGu(c>Rd_7vAR9k@WmPJPNpn46FWCC7x8nT*Zt1vwgpxgmk1Wc&z zLUp$w8*>nfIe0++!*6u6@96_rg!7P`# zV0_imF>rh?#5v6_!(PSA0vcN;{9ySDHPGL0L6$w->KnM~ z3Ghf2QF2*BM9-zrtPYr_J}@*~b5+#)K1*mjLlX&dEK&mf-5wBFs3#+Mqa}jS(9}IF z4n64EG z_8@rskm6t$gS$5|*3yd2~C(#pB_FlL9+{%k@e4$ys#2dja`k z1YY4ddL0i(vjXN4z*+;SPM<-q)q_~MgyNawF#QDfhdv&f1R^qUv7CgKe+2F8TS!Pv zM2?+7yCZ_i?H@WRV5=2iEqx3@T!8)BCFJH4K&psV8<0 zumD{M@PTPys~y3nf09#B>h?uMCMO}J(l8xhQui?v3vj(P2_XtdyLH668_)}L@N^BH z8{lj$a!3ie1)7EyNS^LmZc_5aB=!M6#+XZUFuq_57O_zum!1O2KDN#tFFF{0+ zF`2m!(Fa3nWriJ7ZR^P=pA5kOeh~6B9q45ThX@x(y)wbbjE#DgfS&!bp0^>~LpXlOLi@M_J-s&#H{QRouFm&-?}tr} z2m3f)#{sl@1ey)}5wu>o+l&Xn0puHpooNt4o`Si!<4LEpDy+*W;49Ded zj$qIT?u|R=3XPTkgQbwyP7fdRq#WdrucE#yifx@HV!tpi4iRisMo@R5wDu4?aTK+(hrqR9sUo&apk)D; zpfL?4c1=P0(P<0WOBw(W*plyp#yDHpr1-U{1)08l14WVlS)?5KLb(A{_0^5Vq zsv){qK%;Jj=^|0Ug%#pb0*0c-?5Qb*P+|%i$>iX@-S(Q3z*> z)QlJq-AS*5n3`l`NU5!ip<-_0{`G=fc?Y_tuVn_ur7KN(*#$nvPD zZ`;;EQz%WUf)Vj3akWvStZ5B-om2p3gUUu-WRL)HkrA^p?Hlbc8)VuCVXU{KGN^zE z6vx~1N9Tcf%Lq+KO`s%GEJ@Nqs4$+_Yq}QF5t(M#Z#0T(f>HRSt06@_vFMJC`q)9z zc_QQ^of~3H2)_-RV1rSEYj~bzrWRpGGje3XD8!;;pmh+dg6ld5$3PJDkYPfArs;eP zM35Mw?nVv?clvrHNxBP>NBd_O5&Zlw{KCOHAGGBi1=OR#*y?#%gf^c{RX|x`)JU8iM#3dYgMl zWKsyU6dUyUB#`uh?Y4{T`O~nv19*GOh?gee3Mxd&$MJ-KhACjb8zA=h)97wjp*R~* z3$rjC0iGJ*cmY^%22hG|=#N0ZTftQuiR9J^?TAVXvkUJ8bc)e7+S0Q&_oMbs=x|| zX*Iy`(;G(Ii{s=x&cxV z0STgFQByE-&!D^20L(gKr4k%LLd^qai-htDFo?}VqR4Bx3{hwynx81Cy#&S%z9OY?;XVWI$K$&wWV7n7P0f z7eit`;sayGR*wxKUC%He5a75DH$H}RE|h8u4KMwk#&x<~7)F$h7(uAVGil;hBcnt8 zMl=If;xacQ(l)3UiFlnBQ1d5&Nr*y+bZRCir`So6g zoT2Tu%|dO-Wa_|yhmnmxLS2RM-B8|GIA|KZ@W$(CH5>RlfA8;eYU@E;-cb(Z|Golz z<#H8^MFTc6=#*^)nuvrZL01CANO<29U|In`zz4c<5fytYD~Q?~Fpj+!-IfSN7m$wn zh)EtJFMY#6>(XW9vH_&R5{4}jQxY)|_t6>pkaZaYTf*ShYnVJU13MCf(+iM{OUTB2 zv~3@1LPN9GhOl=T6OTWRfk}*=K2mYoKcAg|n$%HUUP08^L1OM*=+;E;-yo_BUGyQV z0&Go3`_g4hlmy7RMf95iA~6Bf_}v?NP~#fVmJ{XIIzN#Qh^PFV0IvsFCmzJ8iA;AFDJ345&`7> zSeVO9)7a>O4V23>SLQz(&5Uo}youSld1Nwa&V|z~f6Ny~Yz6gN4YgX0HDD%+B}`6F zaZ_u+QH6q5tA+CJ9`~Fil5re6b{y??n~gGc@spw7+*n7u(`KHqvr0>cKtf+nuQPl$d97e@3Fz8*|wsnO#id8x{OPg-oht7@w06FI-NF0B|7WIIH>IJ z;l&qUz>j|PV>o^0EVec`L%}n{;C&!M%!?Ni-wPMtWTSrK*h%JLOC;jxlT7rer{c!V>*#d*ICJhCnvDix(HImG za_bNH{#jXGMzvPP``-5fb{a(bnak(-wEjN+pKC-Q?ExhsO8@&IgPM$)$)8Xsxk0|Fu>K=_{ z5SWNm(+<*pu~-b(uV2T1{P&;4|NPJX8Amb?(jtBA;~)K{Cmwq;_CW3R+bp*_z(4vz z54zJvqA-O)TZG&1L**HYhjPQiX5B--?*g_5*Yw~HU3j(!v*|%1J!2|h6M~4+G>sm% z*2~yvNe}`Fe$z%i<3q^Jqe)@`kTEQ`u(sJi!;~PpB7{~4#VHL#sf141Wwz1%jRtOQ zcF}WW1f~Fa&_#AWjcz{;tK+g^-(78DyK3@yrz;{R*htOhP~8*ZTRz-@hn3YPHtP-o zPlVU>QAh)7dIGg=4{{)&-E^_M+CXa%a8sYqaZsF6;mb+1_KDU*MY}S@_BK(o(|Tnn zritPlQGq1TsoIdBU}vj?o7+7Eo(!ieL-7YF%*4@d8L;{y0teVwZKKj~AO$i^?$IE@ zpg0;85xyhA8hEH|wlN&I2wX}LTF6ZZh{ofn>{I1i#js^zZ@bIX;=ZLYfFPQsnXrLg zQ-fa76vj*nqa#IPAajmgl9S@^cd zy(}|v2S0a|2nm1ib0%U%-rLeWlEhyTvY zk#S^ciN{dxozf~~;A2FkqsVyewb$6$&CSj6?7Z1%a)c0#M^P+JV!ynH*Is`OCr_S4 zCX-L33XoH%h3iDZ&fXykZV+om+hsj_dr_yVrqxQ>U;o##me z(dlH;X-vw{G6V*>h(P#{94^-+kk?{yWBj{L+g7 z-nw1JOeu+>9brEI$!QG_FKQ?iR1^v-EM0|?P+=q$=qUw8MunD8V5B4%MG9|qBnmPD zuMKbeBBq{NfRRff&}BS)M8@f*3|872qSG?`b{R_VI!aF-hnk2$j!Jm)xXwD}+XESi zX&Kh;O+>{C3g?eOjw^_#L_B#i3OSlWCy)`Jl3_KfNG2R)7W0teDq<-C&z_0HS7PWX zDw0JRcB_hH21rk*Atn?|6(oG@(Kzas4l|-6mLY`J9&$&bh?SC%3=yY~$ar`mj*h27 z$g5Dr0fPE6CXVM|WMiD3d+bC6CudS{MG0;}g*a$H8t$NQvVd6DfSv$y({X-ayr_zJ zQ9{tGLqi4GBRNE}Dk4b{Q!`0uktmQ5fM$(OF(==LM$UePl||VM4Vp~ zu{b4Swj@DHQ)*xU&+;H=(hyu==mQ0{hyS72VPx13dLhQ){qjDGY!RhCrHeSNGjb+m z9P9N4*97L~=UF?R_>`z#A*(7}+hxN-#?~-&ZZ;#MMAsoSOyT+_ayg!1Q|hHwts~jHhTOyie)qKq5~rF+QOk#VN=6WM1rlR>3YVK!!Z(eLSRB9UYkXxa`P7cnyDbGcAmQ`b4_ zqR+`7({WICt=(!Nl}__E=seJNX**=3C#R;+Y&JQKHo?aflC0=PWRwCEQ7o0Px4Xyd zrTwK;6J;HYh{4+-p*3R1u2%PvoyalUHkHcBiIWH%MR_x`GaNw<`a?c8b`FxnJZ$9L z9LL4cW5@W|9nU+6I{6wADWK z;q-m<>n^%Y8^f*&d;L15<_xsFc{G-L@H%~T+5v8?IoRI!FlYec_FG8LWzjTC=&W?$ zbxqV70hTvhv|0grRS$CQD&nOS>h&xJyM34)8!ZDEL$bRtq9W=$0-S+_ zVZ%as&qaCPh1CPvTP75-2SxHwFH@g~h+f^o@|MTPWOsqi&H#onfamFGZi{exF6vbm z>)Re`H4pu!jNWD$$yf)bokqJX!S1@eo%Jmj<%)-1TZXy4fn?f8x0gky?7{4K7`6lK zR|K@n0}LAita<}l0;rb-3_3cjrh`sHK(!X2SGUot2ypf{p=EWH_oC=G$)Pytbwq6M z`sh_%wD%lH-A$-b5#>z-_ArWm&BlPvTir*e?r@5**YIGsJ-8hYorcHPsNWILsr%^G zXpDzJ)5A{L$NG+ka@j+@CZV;q4^0`sn3;e(2p!0@KEz*L47l&-2fa}0gwh}+#Y;1K zX~a$}j*K?VL`g1yioTS3a%_vgBjZB6V#Fv+v*2?NJ;dzAZ@m5*wzf9$%)8#jQA4ZQ z;+*^Z{2b0bbRMl{8{hfPD`?c~c=vnX8hu}R&oA(AUVPz&5i;y4jtFQx z8SjT5c?7v!j`#V6uYV1t$rAsL3g47Q%Vx9u8&%V>y}gC6{^vi!$y28=J2%Jmhsypw zjvhUR^XDJosNvG3i+JO^ui=R&pJKyJ27fs0^ZWVvc}7A}B(b`(60TR*IrT)x|ID+` zva=zj%jcheo{ROAIwFVIXg1k#Jn`g{JbS10e&*A^i$bx4BS(&K>X6cS=g&Wk6UR@m z!QR>4#^-+j_i_Bh33hZ8$x&27=aL*bY4&{k+b`qA7r%}to_qrFc!C`^)gzvI`f1)S zMJ=EI!e_C*zK+Kqe_~W)aWKEIfDot(dl`tGih)02AMH#ac zO{fxDL|>;#FrpGvLxx6zQ2S*VQVo$(27#hsA|>MNG*Ng2kS0{E1Vi;vNlrqVm_qmV7UD@0`a}vtNx@WB#ACApd{Qo)o`sk$V7Rf1XxfIB ziNm2j23>?65urszju?oqL((KpyQmQnjv_%ZBp49^T1-SFpMt0v;b$?@Zx%6-==b3m zJt4!$Wf^Ir(fb%3ugFL;TA!}@h-Bl?i&H!U(_#|8d`*N)oLW&4h6Y57DX0^9erSm9 zB$5yzXyi0@pv6TPi3s#U67!QuoG7SpC><0PA!#lKjVknL03)Fwy;#JF=`79_M92{d zR#ah)_+euYk&J>wT7^<7Vs3H*les8*B=wylL8JiAumM%~VI&MbC%J@($&3h-3~NG$ z>~~>xD=^|Bk~tkPB;->fpZBIf`zS)wWC+Owl&A`yP+C4P9~s~$k1LRsAAF9PQZw6I z+dRXiVmQ=$zo_^ zJr5RBVHoTrs6b7rF>)Z3Qi(=mp`e%NvNZGT>@4T*Dd$fHnp6+zTGRg0LJ>{AP(-WI zZ83svl4)j~oyg8E$hh zqtrnNFO(RH)34Pa)xLxHOa{IjfggxW_f4|{RVJev#kGq~h@Fc_&Sl_=24skckU^G0 z&1FY2P`|YYeQ*uY=`37PV~T7N{GsL|QB`1jDjLg8=+ZtS#SDUg#>kx3pzbyrWA-Fi zLmi^3hb4VM=A1Pd3}28TC@RdJ2+Pv=|KWbhh!DFcL5paNtZ*&D^;FiA4g`rGPMr;w z41o+iJ*+JezM!)qgCH>lItfV8Selu7fy&VeV=L&!jY_a;yD;n(BvJ~aZG2aRO|=n8 zW6rIB&R1&>DRBh`^@Tu&XUlNfQkcFWw1P&|^BYLX>xhV52r|J+6<9rm>i|sbs7P?? zdx(phFw{X<6Ocqiba6zdPwNqY{uZ**G7P@~-xI?049(sZ392ZOlnVUD2K?p*Q^5M8 zz6(w8ApTkDME)BWGNKI2Bv1qwq-9QJkU^6faw@O^CF3$23=!enxXP6FJf71Y8qd_p zKrb9Qf-`5%FiPs>Z+|;1bn6T9QA4ZMKxuLcANue|aO%uyeD}52xRyY9ewuYt>WWfBCr+Nk zk9_#UY~a7~;tMQMK(z`=@6h+;jGlh_X}s&*?_me^M_>60*49?J>5le;v|?<_#0Nk4 zK|J%!)0`&z%x6B0?X4|jb2*NT_A3?M=8ylxPvZO|kFX>B)Tf?9uiN3e3Dt=9c6K=J z^i!Ys8JswIicxL9`5V8%IDa~JS`Rs8ax$Oz>7U{Ayt%P~-~O%NN>E)(d2oF&~mCr_Vd$NO8q{_6~n{$XAo z=m_M~%fP>Sp@EWaLz^hU=?*ZgbvYU zWc2oJ2)2v8nuY7zHhLWgeuo+}y2vc1(Ax1aXogC2W@iYiZ^P-ja7_o!kWx_&?EdK0 zb71ux*aHVv*MU29;EeuHoL46O?YX=Tlit(#A${kGNJ2uscm;7BbA^)ow~$l-{ijaDB%?kG9(etd52Bd=l-ZicVGFZLU-u zT-tQdXu2>PJ}f&xn%1*tq0uzBAih^~uu*p54L$Ul0o;BEiRm~x?Fc$e5w_`J(09;m zyXf{@^y&mP1roCGLw^{Vmhshp{o}zaJr0sM+SE3*ik-aihy)YXQThtg$rC*ruC$fVS%6O4K#-K znIgGYUwH*PJKMEk^M2yHm)JWem%$csAaHk)Ibwx%F zV%!Hr>y%}M?**C!9qt36b&)vT=K4B2#M5Wb{!m6D6oEXjFy5U3@XIfl&;|`eXQx5x zkXlMdDW!5}ZP=(A9OzLT&?^vwtGb9l5|NI%$j;~^WnBLA!WG8%!KRA zQZ5}~Ga^x;i|Ra!%w%F7vSNTc3ezJtQrf;c$rSIIm=8&GVKur?1j6tO=u1o7H*s)GmbqwhpsV!2Wm_AFU(ul{CJcAw=)5)N|{@w3l zYHEs8Erd#<+&rao$e=R>FWTGgC)=Ng5Y7{hPX=#b09@-W;EJ_(sZD%5r zL7|w(m%jLijC`WhRw5Q>=q;hY2+m6oTY7!|v!CVlL}F3o3wd@R1aGEV34KrLwlDp` zA7E}STo1u$ho;F91MT10ht6SlcN<^)!WXz0PGcyNpneu|a?Dz@Z-<_Quc5shA_87Kzw(+Uweh0tw&;JFds_49u!=NaTBAdy{N%Z;y)(8?u zj(D>ndcEYTJN@8`Agd@j}VPkzAzxTVpi=X_& zC-}I3*p>%Y59AkL1pd>DTR4_e5hM!?FXabTI%GV@96yJCCypEi^#*X$t8hoq=dOh) z6ufYK%Wo&F|%=g%(dpK~YUPcX#=H?c>fdVaEWIc5f;Kw2P)4Nsd#v46Ec_ADY z@CjIImz~+&o8v;J5Zvi(K1@_`zz0NK_;;`H?GItx+(x?4y$(FpL1cOYzIFH5QDgF5 z=j!nBj2SG(lJWPFw~qIn2y=z;IT!B!Zu}b(f8^^T-l0vp=hB628AM}Z0S(W`-#Tw?Y8 zP(NlkWF<;6pda|qk1%?R3=!2l(%CF4GEzUqmCKjd*?i=qALW@a70IdJgp4LdE|i{G zy?q-S8=Lsp$3M>dNk)*?MQI|E0%qg7xrx=)HGJfwKgtLwl7yzHfQ~2ZH3^YSKI{66 zoYxOK{vE^x!7V9EhOPk_Xkio$(0dxwYPayW z{?^~d^71XTT5XQDXrVd=IR}zg-r3s5&;9kkj*X2CUUz&HNzt{T!FK|G$6O8^pCRhs&eddo0lz->@d&j{)G?Vwg z_qzk4wL|L(4t+MgGyz|#T^gg)f|NNaW`b@Zc9dG+0eRVpystz$0xg+No96CS3q4RR@c?g4v zgGl4v>*60ix5A<8;T^h0-ktM%a9zAR*YmFH?%#3n9@D!7cu%&Arx&94t#_6R-eFNR z8+L1tq6+4WB1mpBiJk3T+`MrU)6rgw)hh2V>rxm7r_!R4 zC`TjpS``nSe;Czj6|V2IBMHZtT#P3JNc&5FxhtKD?fpKFaYu#saEu*}8Fl1S^WHdp zbTEdy%iR%ei_6;}M?>d|j5hs_wn0U3mr+k)mpDZ^G=`~EM%wyRuaeuDdM zX#13wV<*OGz68GVm9KDr38Bi!=pW`WBd0{E!OwsGbGUKi20r+q5AiWF`f8N!(ixc0 zK5$TD9xeKwoGH~r%Ku+`-yI~!b)WflnC{7Ga{#azkw^qV5=>%{WKpIp$(DEumQUyN zmFzoT*=PN6F56}Q;k$D+$yUFM0}Y@l!9>$Ayl&<@pUWRF*^u`3q(9wwgOr&Kk<2ZKYD4Lra zX#|j2AF5dORoAHiAx>qIFG7U#)WihUI#gq6RB{Y)&PL{Dv7)_$&e*SBzCxY!M9>i- zNQHbpk9aIbiG=tt`g(iO*wAQH%q<92BFLz4_jsteha~n9GZ7&wVvZpKS~K=5R@*JR z7j${a!dz~lhsvxCW~>3P+kPvWTlGSbL(Z&gWvhhCnR6JDmtm~-ryB`;Bnm5BTX5`O zzI2J2&`b?RGf2kNNXV@J;>7`Kx)Y3~Kh?MorYVVxM}J=*72YNY(QtHy(n5PA*rETz z1?p!aky>V$F8NI`vg?UT64AS5I~oX{kPgP31vw4F&bWHu`lNQwxb zwiWG2rV4edG^1)RE%;{$MKU`l8RR57iwH3@8mOWwuZ8TaRe4Jl({;ZnuZ}B}hADc2CShgrrSJwN-l{ zZ4#nc*4j#a7uI5k=J^U5gbPnS^9&+nA8X}dOM8SIT3cFaZViCaSQ&rBheYdpn*oa(MYn6wBQTbbkxAm*4jE^>ze)wS5;k zyeMoJ=>v(hO;5~0kUZc?<>7yK;c8k`#lF@yjPvluOdf)z6t$%fi)v@pwpG(COijWP_)v8W zEE-3}eYdx3_(lYfin78T)Dey!u0#mN^X&N%V&zF?|Tj zlnsgJ*3!SG*{(rfk|j^!j|}6#95QW)LoKO{jz6ZtmdJ{6OXEn{pjqwJ1J^KJ*;wTf z*J-?Rn*S9y$lB&5@Pu-A)nq(dEHbez+duH})<<`^A@{lDq2Hb51r z!VWIFm!O9_Bk$|ea@(|x%|V55Nv*#lu7DCe-jh04Y0u~WL$vEc7H2J-DD8+q?TId- z8n_IF2sTby#CP|B=waYTSQI+cSuPXpq>zy`kf7YRfaOWr_i3NyRnz2T18XpGZ=2BzL!aair%9xh>{?j_YKB z@UagzH(=wNh<6!F>Sd?ey91e7tJrTrcTy`6q-;k-?rBr4oa5FZ;RB~kM{G&Z-O4NO z-zN-kQywt(0&o>}#lMt!$iKgb6u$RH~1m%2z5{{09DQWTgT|-@#z6KKlk&rlQ6n*Uo+bYOn~2 zW=9ny2x#?S|GK8$vEU$=dM{{)gS&7s_NDK4#2x2PK0J$G!(WDSsw+gbYo+D=K;I=q zME8F_fLkTdv9t3~W5=?FwdD-rV(9cB3WkL&Sg64dvr6hjEAT zqd(1kH`SoQ)I8C%zRAtQHbpVYucppvdUbN|vSp}bSczGKv!)YE{@J63T)QeOtrZX= z*)eMBylrLNWHJ7INAt{m50R&g3&vK*{T;~Y3Wly1w-b#P2Uj*Z-`n$_Oa zvr1zv7%(7Zbz;RkSz=2Vgp}npg6?N0r$`WCL34>h?&-EqF`x6JjY7#9IU`yNV@Z*9 z@d1Yx2E~Kd^jgYFF^1gOA*{XLVr&pSbUfFQb-U&$uX+tAHkQt~#)gYMvr6?>X0GGDq=Zb?&G0bX zlk|C#Px5_m50bH`8A}>g{_GqB^3N%n=x)T$@BvgKeeOn#cUbhp$~StnMZ@VC&UEces9r{`D= z`YV2HMiJFLDFd~M7EgXXiaFz%532qB{V>;1W1KKYFuTdIH zO84q%N($xqbq9nMkHi8>9mpID-O{OLN>f=hWUW&&)az`1cXeh`n9Mbbgjb!M|D;X& z#)KA0k$G;wCFNq(*=qT9hCo}tCx(p!)zhhn1jU3hUCVd8{g=vAyPCVwRMQ(74u5AI z>AhZU#TS>Bud!K8jv_FgX-XzrOBT)SF5m4JF=$G@`iXp!Ur;T|N3~Ad;aXofz059} zgd(Y*MqHH~^^kjmRbEOe(S(|&n3Nh87E+R0!d(UpXL8Uu_Sd}YygBAo6cT~xPZgx4 z{z!%%_%n5t12L9&%KmT}NM9K2CGnS50qwavX(<6Y&6$Q85#F`47aAg5h~m0Fpwj^k z=aNTv%Wy3p)-oOYtO&Azq&QrrQm&G&#^m&@W1(sRcR%q4o`PUG1D;m3b%=mOs3n^2 z$jql}RTsJV!ZjaZ($@5%2ppw9qj%N1wi*h}ER7VFYEEH#HKm^e(OF)s`ab+X?{eP^ z|L|A$K$dhz^5Y(rs2f6}*qhK@>IUk@4Z?M$b-_q#qJtC*4rkDr6S5_z)*-qs$GPf! zl5tr?+NEyMdK$lhBa*RCKBB10**4*NpFY^sr=X^fePM17Xn6H+vD4s?4gD)Yn=4b* zKM@SL25hs{vmkpdf_`6HD|M8KLqE9U`ae2h_vpw<47AbV5mhxjn9Z$r)Q6VFgiDe& z&2v1ONtPg1K0JtdeoI`Uu@MmG?F9YV0%v92~Pe;6(! z>34drG7oAn4sq(xUAhnXc-`>F;(h|-f!=IsP7&dfN<0qS=2-G@Iy9=#9}OA8v5}>o z^~So52-&^wCqwnc!^3Oow6Dy^V_{$*fE?{vO|p4~e7Ov@Vpi@dBh+ZwHMnmU?VrBj z!`r}p)}EElg+9Uam9Eq*YsE`?yxgsz6t%}!W1v;6jNvaF5*Z1IcOLExdZy#4HmZ^V zlU`(&U{8Pl5wN;8Ocpy|wxBPpI^sEdZK9_md}zf{rq@`@N8H4{?uI!(QvFQB!1Ez~ z2pQ|wootlP+0d{;8!0FJP!Hg?>`D0bqg4Wd3+h9f*aog^Nu0nHs!CCten>5vV6 zn!u>9ot>=Uz1LMEV1`rfWt~la$Te%?p2%`5n|~kr>022lg|a< zibvHW#Nj@stx7gvHQEwrt{ETa{F&6s+@HM2G|3LA^G{8?))yAfj6ajK#7Tuk#f6Cx zn|HWt&`WM=K3ysN1AO247a-iG-fNN#5J5fQIyLt8&oMGBHc})O>aexs&o?YgOkk=K z5Fbqwxz4G;Q72ZXX|Sz;z|xA*y-Rf`?P-b);WImF^^}(8R~mpc-$%zYkSa!#!PfX6 z4$*R>=El@?{+gvF69~&E_Iby6Y+c{2T z@DMA80}ry0b$D{N!OdgD;UT*+aLid!RiE-j{Yay|F$PSdAWqYtDJ)@eb%0J63EGP6=0A7he02$4bX{|G z!<;T=;Kpnt3u&`vLHB{r!_iG&T3Zv*^IaS58=ietilTl`vTMz|5Zb#JT_TjKh|Xcy z-dU7TTkvm(1sM2X19Y#tv|qShe!4H2;-y^}(0S~?=dHTC8Q-lvVbl zV7btG?OqAQSiGD72S@y&*HyiF32vW%zZCDdF2(o{s93q+%uL^*hntBS8?qa=BXDtG zRh<2_8rRvx2~%34CD5~GP0acWCy7*HF?SvV!wWr5l30AHBAdTE81ENlx~)^SZ*Eqr z!(Rh-_|Vt zGHm{cY9pvYgvS?*9t|=S9iE17m3n9%C4aC{E$LCM>4>D8QM_r+-Q{UWqa%SYvwemM zZ^?I3HgX0f7*VgjDm2_Og0;&RX_lQWEW(VHKC(+Krl#%d?_9X3OD%hBbPG#ooYquV zmms)`Hal)Ii2`K2a~KL~V3V^xJn=?!UT|8Y_;ea+R5Wnf!ON3XNnww?qC_WcWBg+J z6_SN*&8>>_nR-|%JV=O~gW#gshVwvV`n!gz8y`_%G2Ncqx8qbUt_{m~2HVf5;nLGk z`+WA17#K&n#RU>TBJqyvZAC?m$!Mx9Ez$22!#?|o4z%G(AImFe!Q8PkIY9?rVJLi> zVcdk=d-0#4R<@6O&fPE}oG6~|nD$cmu>};NFd1y~O}C&fCc^MuC6BUx#y)q$%C}@T zrIv=hg#~Js ziXg%aaAXVv`R5DIWk_C2CsVCD=ouK7)oU9^Ba4fIWb1=T1CpDQ3P2QlW&1Uf>)qI3 z#1-BpxlGBe80x?q-mP&Bu!1yH+0j!W@*5DKC{5dIp^t-jNBh34VaZKU=V-)be-sAs zeqj=hNOx0b!1Fj=h$j;S;v{OiJKlhcipZHO3v(@oD<*0 z3D7|J_XBstf3h6vh~1}PYTkfFs6qv)t3#?b;3h)*Px~Ox2*{P$+=&N~pI;EiOm*rr z0C`hBym{;_Wc~|!hGyjCVX3{Tkdafnk=jQD(7pPUM$>utyUBWAYWAn$3Dv;V7}=e| z;}lTk$+D^GV|&PlRSYjoP}>F6H(BL-gX<)rH$3dQ_p7I2`)q7Y%J(yEJXlUrIOAft zFJ-Z$!g-)*ZK4fIL4xxpE$qDmuZ(rMiT(?gzYI!%P61?`+a-xPp7lP>)-YmXakc-f zsAb71sV_r8lKwChd3leQL4Oq@T8DW_euq()0h{P*sL>FE5b!p?}(%i z!9jt4$56_DlI8zTuklXUUm55A4?X_W*nhB_Kc-WrD$*66iI7SCml;Hi;c2R}{s@%l#IoSGkjLQ7IpK`l*ChM$|nxCYCGgqURqUfvW2e<)@u?KDp z<#GL}<%pRV=S1IsEbWGTPN9U7r8eh5O{|zZ5R3 zJO}>RV`m-9xGnc!Kj0OD5YwKye!q-(o!a-bInY~wWr)(s0*aCzkOG?~&+We&fG7lN`siH?oQWI9w`aNi`Er0OhK%bYUVrU;AR zGPFwiYsW6O58a-U9dcX#q(3K`iRV7Ab+-bkAtjZ!krYjG=)t|z0iVr|1{pwV`8qQ@ zH~at#c;HT(qhuzY96AJ~`KI{mE#*d;153JyS{4vB1)=_?L5(ea(B9+~X8faW0N4e* zE=|PEZAy5OO+l+)$K3p3V)ErB-JPR_iUe7Ee)kR$`_?a64MNK!sD2pCiCwy`sOdu= zJ#oquT11`ZfqUwZPpO!<3sp6;LszdfwTBxU-f36>p%{9eqZ7u%lv5o-VI`5Aw|^(DtGEfMX37(lX&SS3x$ zuU)U}PpzTU55mIFQW~%tFx|M|TzzU3Fp3ZYbv-OcbQlUC1}RBAWuQysTi6(T|A0F- zBEVN|s5J_yKDGRq)-m~5K@h?j9nsd~wwo(F$Q!35PFNVac{+Hzf;r6V6D|V_`bFX` zhAYolhMki)xN?92w=1Fuz;Vhz7nXzN#0_Dh$jjZ zirg2;Zz~X;c?+ChceqnDr-*+ojqBzrO8-7Yg_442oQSuolHQxybkKi3C1lQwIbe!i z*}+`OBMidD>2AKk%E6{3hj)rfL2nA)fR=AcT)Ar2eVeMg ziy~klr_9cmpdca=AF^d{W3mWuJOj+ot%P#eq{0zor_cdKctf)ENcoFk(z=m;%!hQW z+D^%p5ci72NjiQ2DTR)y=1cLQ;_P~SyzOxJ^G}jck zaGn9)n@;cbhg%hrRN4;h3+YUW>3Pm1!85g+2)?$Akqn*~U}s^jWL$Iu1^m~gV`Ha9 z>;m0~FxLr-91e>0;2Uaco`NW2FjN^Fcs~gAx`xct1o(j0p zTDcLyRy}i>5ZmCv$_P_n!(4bqVERJg1Ar=#(-$E11qTJN#^}B@RiL9+phvF+*->u$ zNrW6RAcJ7$l`zGLu*$>2)Q^(JPoP~sbUX*S%ZQ2u&^YfiJPg+Qc;b$4<&P!^jsd|ENgIH?wS?C3CY%{vzCXhRbTcKRFuog zjw_|hK6i_NP*cuB$M)ekuZ4VVh@4d98+?ZBrWCA_bUfO7j2{C6QL;lTv%a(|n#fU; zDi2a&gicuo7-L03$Va2!$WXvxQO12y=+-m4dpn4RUEJ~MOFG^o`XPEz4NZgC z-uW??>nWdH2_KBP?%)nGcp>*d7=HH2Bz4&a`(yDaT$i1Ti+1sEGF%68zTz73^yQ9XAaB3>01aRcUs%eN(`p@pDv!cwzv!qmwC<^JgiDrt6dXX;wY$SL? zB7y~?dtM%7aL_EYHTQ@9Tu2P~l}FAlEXXo)h0e>2+1i<-skxbKay-6L(j8g2JWE6U zWT)hhcdwpKN~3K!G&Sd4o&sDta-lvOilY`DJTh;Ka*Tt4$Xfw7s)l5F5!;s~sXspT zgI6n=CEW%N({ND6=8xfFUGY$JUo_ zjOVL7(xu^)DPLW27bK(z2hkZ&y6bY~a;(+u!Ub3z+u!@fcW?aD+=VAG0Vz5K78tzS z$X2I%*l;1v84dzSe8`qm=t8!)52m6}+ZlHOq)Y+n;DfqY(bNccmbK3R%sdf*;R`zg`N5jurS(t_##lUv~Mq@E4c(eSxt~q(J5_>wbSW zlgOyu&78`&e#U(M)nGQrU*euZEHb@K8~fXr?#I{5{bvwvwa(X_zq_wOE{{y!8B~+w zDk;d3U{0B2yM{79VJl}tIk7Pr7jzrDi$P6waX659yZ;@UfY=+kK<%j{XphASV%ZRQ zXNT?c@;g>S(q-D>ag9hK3<3f0Ek@3IJ#!gvzY#+6dxFyw7Bf49qcQ@YN#ENXa149l z!jQKIiqMxEt%hFpbmoJTS56W8M=5JPAwR0bq7PA6O7u$dE#5omdr2L>&-6xtY>@dFthD9 zS6VF?2OaIP@$tNGYT<31&ZLjC@AQJU^$pKIz^Ycs`SlP%KJhNq8YZyHEH~Umn+#@a zPbR4z@47vGGB^uGBPj|7XOk^${J>#N=eKb4CFKYiI_wn}yZW{*ogtJ!q3{Ad7{c1S zuIwR>Lx$FF{}manGwk=^i}tMcP5LP7`sc*ekdjjNatEc|5O>)LVm=>9NxpRhpb-`n z$+j;9S-GCP;#C;5;Z}?0xVjv(630b(-zI~1bc9g=i1lwLh`Bv{VUfOAU!8+c=Y=JP zr|{eQ?nwh6*&;f$0XH# zx?IBM3f)s$-BAm)EbrB31Vsga6U+q$O3G`IIC~yBiL>@+^^XUNet7K+wz~2y_(0Wz z?v|rs%vx&CrQ;0-S80(O_AfTyqZ0idmEDybXVaNpc;a`#^vTX;nw{jNnZwDcVI9na zbOavZ66z}G$}ES49b0_RhxEZUN^ZzF+Euuu0ph)DJ8;WSwifGc)j2ChhYoiiz*%I+iFY@wTZZWEU<@C@rWrX zt5u<;T75)z-o#f%B$t0fiNJ$#U^?tC_Y!Z*7d5e) zzd?hqthqwI_vG?*iIM=Xy{Gc7hMQOM8slaFnXitN&NVT)5V(3@@G6V*AH%^dapV|d zav}qcg8{Nx9hD&M4KZ0k_;0&+&EWuyi8MHIsu4d%-^SA-g{$EbEE-Yq;0I2%9jxBh z?Ihx}q19NK_OF)YSYl5kHJ5Y@w8&2PR6`zH@Q(Lrb<=Q(4(k}GB;EI6mo#S%?|y#H zGBh~gq0^D?nwNWj6)_Se?&$b`7*Ta2KuBaY^RPIAh@)4zWqHMxT9)^}Uj`sEB9B2Q zO`drM&2j7B&Q%S2xG@$tgB7S&qLP&vagt?Lx|{F>6~KkAa5{IlrdIyM$1^5_H+?sL zvt^t`KZ0PgcVt(J_GVwk8vYcGVSk0Qz_VD0%g{hrsJ9vH*tec-HRA;_Ws;K*cZ3A; z)o#U@1icAw2)$6MCDL7;G79WpP&n_eZa;o-ut|r$yX#BD9QQJ_+ z6aN^g&Xi+fHzVjm86`@%O6q}1BDAy%HF5hNwLqOoymAK8?Dl%BqJF>gd!r$>=&wXg zA~3hx6HETzjf`2EslDNTwxxO#RQgnAJl-FcgH53;dK7A~!shZR-r)gay|>|1ccGD+ z$Eg*b(4>K(eH^Id4-5|E8Uvu2YDus@r@FSm-Z|}2`D$9iwEbqg0KURyOAL6q13Pb0 zgYj342x|8jY<;YZG;F@%acJG|@el>YJ!r>EfVXK!_$p|kXa+im)F?9pQ7J0(q)7L{ z|JxVj4g2BjQlURNf}u0m0cj3IXun)vy39Nw?htSSwCNDLh8DL%5|eH*^E> zR5$PgulK1!(D{nK_YiEQA3{IEF))@%os)@Vgk>|P(jt5EDbV2DI{3o{y@C7UAGUo_ ziAFV{FPjUELIp8!5b8FEUMk~+%&++4091Hu$ll+PoC;efsrO525JT);wW#eU3lF#K z6q>B~z^m8-aHhKSF=AAQm=z-}pB=pjm5hfmY`HLW#oc6NIq;&{r3$sw6V>GLxAV@# z7*$~z^DmCZR_s){9QBda`Qr-HTCA6(7=@%`S&z1b;-XsQClCAtNs2$)og@RDBG68< zIYqeK>~hGdtXOF7pW$l}P7#r{*-v=EgQwUaRNwbLL%!J2rLSU-P{FXSqek%&nCja|IiCLsg{0d`Ky(gl_dK5aL9)O#Y zK0GP$2-^a+^WSGJ0B1+T1Bl=_D2SfxOFZSU#6m+sG!YIWGVJJ-^|2!L`_UM`hA(Nx zAAkSojh~U&2r2k`0&c&Yo7t22x3sK5Ri)r3)*>L5{Ew?-&c*ig`!>}NGIK(7$7LGZjj*iJHBd-M$Hq$4vY+Wj@_R%F^7`|yXitIDspp+bJF#|9k*YF z!FO2Vk%epncqk?I)1>cJQH7UVW`Zn^elKa#U%jpKu@wijvo^8trQqNpzwLo>2ec4L z6g!6Zb0}3>)Bs~5nj57@c&TTVrM7p|3kSFhR>49)OCtXwm=-N^pWj4Z^oHLn+ICC8 z%^dl?;ZHM`lH%_WSmtUowlbRY-Q7h4S)W4T@%>v*#LZf@DK(a; z6R{-$k&_|U=Z{DRI-T6EykVsZgU?p5%QPaChQOV?Exx)qs{v7j8Yj1%kFrDiMry+} zXl1y;%Cj0&9e70FsHrqom=F02_ zZEEU^;Hrw25+AmF;boTVETE%8lrQJ?=7EoJ0ICnsdMxNa)}zO7@!yXC8oI@Uqmxf z8tPPPBG~MzAuhIRjw^MP1 zA*rchcW+ZqvaL-o?7TCo!3`G)wS21n!%4xbN4&)MA`|KE4ilx_dkSw``OGa>{8pgp z&*91Yg#Y7vrS5i4Olpw6J9;8SF6Q$4fP_yFan7%o$S8*@%tQ+~0T&5othDew8FX#W z)}a*@MAJ^%{d80z?C8OeP>Ur2YZ-`(3^*Ti7!4^GzaoZENgyb^eze)|S!q0mA>Z;9 zyFb{+MgSNxB>XTA!YgraZubs&-;8e%TcFL}SKoRb_m=xmu`-Z^V0mdXxGNXUG_5JN z0v`hWuO?^A4)&<2eRd<`2sX{my)U#?7$?H@6?pQ7Uf1&nr{7YAybt(%IRR#?KWkC0 z(IELE=+*(OA{odHXBS?xe)nv4%MOyYrND28jb-Jq^*#3hLw*Vy%r0yjTV$ewVY2!^ z{dZ)`+^MtBog?j)t}{o&PQLKWVvG5sJK`?!1Wz&@vy<}|?+2(-oUt(2aGuovPxQ36 z^O(Bp)ipufw4L|+0Oypv#mT9|*sj->barZyRZ4}k38v#8TqOD9q~pAm_B!}f-IwZKAsjg;6xBH*9*xzT+T{=Z<~QQA=|`(Z8hkz6ej6F4`kUb_I3;WKb1zY8 zIPH7~I?u~|PW6+z9R9;JE~zD8tj^MwZZSX=5I1$emAuqgWn79?g_hv^SE(gUF;t8X zz>;-J3QY8Un= z=sc0J*Q8kR2hi$*xd>*=hRUWZFoj$lZD0h;@${N~zvJW;OQn&2a{qGDjnZc@Xlg=* zVDdqS%{fGKcFyY$A5S-t!JqB8iE1JjTM$|vt1fUS-IgzblUSNTBt+BtdA8RVUL;-6 z%*q^LXc>$%^ZVrFyi`q-zFr1jam9&}#r0z>K!lPq2nE0%Jzox?;cTDnaU=K*&yg$a zgCWcu9)G3_q|6Dca=U${NfxHN2Zx8I{Ds2}ICMLC|K~`!8M}vVy?A^k3PK#i`h!U2 zAnB(J&qES%RF3c(7-!rSH_;xNpATr4gI%sO4*5}pdFO}YLCyQILg5s5GJELyV6El-I;E7@R=&IPStdJ^kt4XjcZojAL9aw#+)l68s3`o z2fSPa%>UUB{K@yx-V{pnJKfW4^C#ezawCCOM#KMNxi4nnTu4hTyzbCOsDZ9);D%I4 zRfZ?;`?3^BPgNCLhDgnVq0)jr`b3(t_#i|VPK`6MJ`r%a*K+E zyA#!$Z64L~Wr9R-6_jJKkiSw&swB@YX@CzMjVe&vxqL5hpE=_3?>%9Y_28TYQOR^> z{d%c9Ybk6htEG5^!*VQe7Wf5d$T4UNvWKEIk7w5cs6-6xxjs-74bXOGGopzgfc1*> zur*B_+X;hi9{%~cNx|*Lb;s-JfY%2G24LNpF-d2D=SQ{`25hzSQOwcE+9pa-RNT6j zi=p=^kQC&Ya+c2`3g#)Er1U8oikT$+wvqtyT)JzSIqYkc1u5~2B^v{$kRgAau=xqv zlY?X(zA9;75MlJ4Ye<=0k|75Q-MNOwuA4}bn&pm17aHoZ0y(j7Wk+cq zEOI4^ilF5DN%OBx05x?O*m^woWD=0OEP* zqC7CC9()EH4NfBP8|0U)cnbN+74q&wXObENH&IsDJW=7CCf#qV`~&8s_J7^di0@`} zKyW(_B=Q> za*^=4O4KQN9`D<%8B_# zpm|hT3+DC>p0pb2ZH4?uA`~dku&tP;#A+4-=)&del;9VzoN7{4$@+I znEJZG+2STpVhrr3BvZdw-SGK$LZ^Ijpgu)Rw%O>kKPgEW@}^6ZAuKLJnN0lL-Wp zH;`#u#u&=y*5<+*)aCg|OGpduM5Y86x0ah;;BF{tRSwuF42aQh4i{sOnbcjX(@}oR zzA|spu6ygMW>%96rp(AN0ECTX9aV`ZhQ+*7#;tPV(i4piGgn^Pq3&RFiPNAX-X6*8 z?@lPZnpUNL%~D4d0QR(&HCEEJ!9?c3Y+C6NNxU^-Pn+R(Ey>{m$lOQa0Qch z72`H98iGWP>x!xNda>TUuGckZPm}Wiwljk}_l@Vkl~KQB>*3Bkx}D_UaQz=~PkM3L z%T?Mb>{MO9Et+PJe{TN_WNK?mJ0@YWNgGyBnNqGQ)9DrbG1vDCi)m7_{v28hOc_-Y zV4fMwe(#@Xqt2G+NFDU(G!1kWDh+ZM%=szAp6D&6K$|QcL!BY{+Y)DhQ~zht#;Ge^ zu9PmF$4|Aa6}_P%(l#34f3M_=-@A~6!d$>Bg0rGmUjH8cwKuJv=hmG~2@L=5qF*Rs h-tr6J4%0C6@t>vy+X`~V+!o9`l;qT8>!eLX{|^~QQ3L=0 literal 0 HcmV?d00001 diff --git a/devices/surface/images/secure-surface-dock-ports-semm-2.png b/devices/surface/images/secure-surface-dock-ports-semm-2.png new file mode 100644 index 0000000000000000000000000000000000000000..db8de73dbf5d7dfa68fbd1ae0b385cffd82daa08 GIT binary patch literal 34252 zcmeFYWm9EAvo6@((73z1yK4iDI~#X*cV{Dw)4034ySuw=+}*Wthv7YUZp54u6LbH- zeAuyeRIZ8@m6es5&y!hU@^a$vFgP&ZzI}t2ln_z;_U(Jj*UtnB;%j7ZyUX<3H==Kn zB7(~98Rwah8QLl2~2q0;WRcoOmZ5}`1Bt4h`#)5<)g~( zGw}p$9^MEeg7POi2Wy|ad;=~VEez$73umfnzkoG1D9NRL$!Y|C?K|+^I~IWpA_cl5 zeMkO!?h1j6Ab|^p!scgie2rE^c5g*5orxCDS-eJzkR0E8qM)F73h>T2ySf^3q}OUz zc4{Gj|7h7Dh>PperUF)DNT_=Sg^36~ZP+d{==Q}0!KSjBAta)!@WDQpR+kQ5AwE_u zZ7j-JrQqIDNg(YZ*H$J7GrZep-!U0kIiB-3V~Y%dtE@2~*zRHne^A0Lv`~ zI?luZbX0M;{hemDyQ;@EE5_Xn!mYm>v69WruhN{B(G7Nct(aSe6Hk&8pUw#3iz<%{ zCsw70VZ&MaD|H9Je;>t954EMf{P%E`y&@S!j9U?l^wLl7nU8y*O%L~fn~>_AKCr&+ zS8^ZC+psw4?I$IxJy$+%sDzAK05htdbiil4IH8wG$i*+utBbdT(xp_+E2Bg2F4yjd z_d}=Yn!9jIF@*8_!uCKVwzde^ z*cRXcI{~h8zE1(;<`xz^t7mpIn*#s-kpdr946C{yR=;$z(N;4b-+1bm?Y(cHDg7zz zHHqC3gXCAcC$ZpilW7;Bf9f!7G5*qS;NH!K(f!Gg!TLRov)2CFQcTwq8N3(A(R{q~ zeQVgmMvhwTeILep{(7Q3`}UnsM`W%D;Qnwxp7F0TyyarZ>t)ByP)5 zueiiWdT*qfcSz7xSD)4GlH-R-GOLOGpC(3=#2_K!JcuH>*Y?WF)VuRs;3p=h(!Sqc zazZBSKInDle)?6#=}BKiJFfgkyzcwzSM`?BK_>v;%xh|MeNyqqhZ~1-@N+Nw5(~pt zPxy3K-(s5LtW=T1L34L6>~!Zh(&-_KnmPQxr=Q&f?a7hwg2B-#BPWzm`g?~gMY8E* ztJ4^U_J=V^$UC{OAA=Kfa+I9BJz7_lhjoN{qJweK&!gzg@yZRsN)VzgpPL~iw*`(H z^qeudR@=RhA3_QscZQbzb4G6?=)TyYn}h7z(e>7XqN0Z;?N%=-DF~+*&MpV}D6!UZ zSFzSAgrrxRA=qjD{?12%o|drq6h1Ew!j4Bd?X{K4pErW&+W+#RJzBT)A6hYIH(UG} z`PKjA=B3^ge@J(cVv8%rHCc-*;U9f$!^ENT(a}{JO%+Rz;IfCI4&9s0l|6Ux`SR0t zJq0dperDKZ`+oPJ79{AnLO$mvuXx{g(e~_TLVnWHJ`bG~$7E-QZ&*_9UMuL;#NYF8Zc&wNk|hjn#9z;?hN$-$sAg zc+n9O9b}^E^x0va=V? zv46$G0>SE;s+iqY?vw6ZR z6LBpNif<+*Tb*5=pu~mP+BYV$_yW+YyN5b`y@S!qIb%{%|G-dY1833ry`Dw0Ja6o* zOCMRUpLUe3*T!z#KEz9x`bIuZ-adlcTkoSNN3hxacfgd)ZNnfcWH)p=Zst)tFOEyr z`ZC=%d+V#GN!z!GC}pH(~p06YFn#dN+%CDl#d2;pd^@%@|c?%OfB-iAM7?p1(u!*$a~{0_}freXqTo zf0D~!@y4;^Cfh&qxn19A-IiE6D9Ou@tgsH{KP+Ed^h`g5z9*`EpaB*XeO%TETVD~~ zYTC-e_b8*bueE%}!Q8gOdQ-=*S*6UKMFY;d{0KUy{FXK%hcSt)q4tEP_o2xGIY$aRGyQKbcLBGg+ykiQN!P-*944FpJ9d&`NVUHSIh23JO-yfcY*( zY*uS3h_`(>f#ayZhiwgg~~a}LWB zXc!O0IW2zBMq)~BK78>2zI5zifWiL1od(s!U0I2p^m;jB-rk-YmqIuKjr6I%W8_tw3%Y;AIv znke})jw;jMS@!t^yP_2iKY>mA=UN{ra6vBcUw2P>JSIdt$Z~SsKQiQJKp9t!8 zz>uZBv8iHCT}i3GY?^=AJSv|m;R|5cPaxkxjvQx4D&W?GeEqoU{{uAMN#S_fb&ZAp zgEA12kpz*zi5WzG|3}jDKOo3|7seR=^(VqR5P=HGM`gRPMQ|kc`OmZ`&CtMp>ufhb zh;B7+&ZImlTaf?vU%CQf@yMNNWPoDRhrj^Nt*zQ1s8AxP5V(a>NHG3NCC*g(ln9W< z;}0J~ZC_N+KT(I?*1XX|T4?eF-edrL-P$9JBUI#sru zs$M@->m}2JY975Zqa?Tj%g2L2hJ&`@a=n#P(QA7k@EXRky1JDMb$SY+T%^lOTcMrM zrc5l$SBm;X@b*TtHJxJ_43u*Y*@12t5~8mqp(qz0-nW2KE8qzE;y#|a)n&w#)iB}Q zR~l^L57;A9=rFqK=ux2e-~+MvFS#h9s0^(vs5dq?up%Iw|9}z8UnBqXs3k9CF}%Y% zrD>j>Sr2Ok;0u{BpU`s*$r6N>7Y6@L6PwhQl94q#4*eD3nRyr-K9yS4Z^$99pep5} z!^+Vf5ND7tAyf090WpCAYZJ+CO-(OsCu_X_Gz#9HMqOSZYRBST=tTd61gejic>B?? zhAYK$R}yZ-QBgxztbROlQ$J5nkof2Oi-M|x@cuWbP|vYuZY64LZIP81bRg3stIPu# z3cl;)%Tt@Sx?ne=v=GbQP_&ta8CYWDBrlYNI<$lk45?Ujp=&@k{aRVWw2h=i1OY38 znii?9FV*Sg+=*n(R~}zJaCEEhQo!WCED=X05b3oQ~ppyAs25ffZsh?_P_-z62xGBpVr8Aj!{uoKlf+rh%|yAd=QQg zFstyGoc)_AV$f1>Ywz;<`3-9l!+8g3!?yXsjqJETE2qC8dS-R8%tpG^gAG%GEMn`3 z5(x?^N~9rb(X!T%1=}lowfTzCZ~BN74Iy7RWYl``p>nmL3o*q1sYCY%v5Jm-$co`$ z9yoEGSD50f;+eCn^EM)c8~iElk`kGWni?fRcK73}J(Wn$k>NpIkael`;<|$OTI#X= z9T{w33Ef6d$6z_r8cL`~-8>71774OWime)^ZnT=!xEi|Uf6fX5&)8BG=bFT{M1Eyg zT-}&u1@x%8EJWp;YE^oaoPcS4ssxviP#!9uL5HqDt*-p@4Lt`hLOwzDaIs60XJ>2z z8>G&~#W5Xp1THg*n-}Ur<2@NAIWio0EhSlOVrC>LXZYxT2Nqn?o+3UyK48IcVDGe` ztPUo6DP+hjJ6sG26#CMT7hHg4=b!*O?)ZtIUqNoJ*vOce@ z23kB>+(l^%Fgy}zxJ5_hx%U;$b{A)RKn97h)CGi|Je~UV>L7m+5<5Bhe3g)I&Ms|O z@+s0jaun&bxFFtmrt}ESkcz$&w3Wfoc>G0D3=Tm4^Mjy1%<+F<}@Xt zuT=Qo;*<+Kx3_Dwqax7e<{x(ASP*GQz4?cB(?U~BPDLr7I>~k2?V@vM9ODBtzf}SUW?EXSgQm6CRW#hz%N}moSw&DvnAhNzDge-Kj=%^ z$E3!|sJG^lKu{36{UG-kop?7#IB1;2szfNtF zkzFND7%(pmtvt*jAjPD_^eNMNqZvZ?bcrucDNxvd&@{iiFbi=jyMLd0nE9eWiMq5@ ze{z-Gn!cJspY74P1zBhZiI~1>rr4yd1eX>I4&~%TMy2C-VSCfOjq&{|{Bb1$$qo^{ ztc|qJ>t^z;0%)^1Mg6AT!Yn(ndurnWrrPr-=E zJ^lG#KET{1MAC5?+G9gmwKXACMD9~C0dB;M@Lng5-+xQR(i6B{`i+MO`&D}b921B;dS zs{s|^n+X|`@N5wLIN|#gdpO?wdzYf-J+Gvp>xoZKFYDaqjRg-u??r#^mg~GYgZc^u z8IXc{Zfu(Br8;NCepW)eCB=j`1oUHU_`l;R<0?J^eY?e3QKPbI0<-lz7eyptwaex$ zX7zlapE;GgTJa}?pr5&FVx6ihfpIhJ4ibTH=&pegHm4<3oBg-uwMrA)(kX5DG1wsg zw0|jZGY8iwAY9ilBN1naNfk6WVNg!)>T;a(|H5G zGKh%>y#V1=gXPm`6^KlqUePQXYu;YTvBqE%S_Bco_Lw?oPJ#k+UvMebOc)i&bOM(q ziu&(0>_m~R9%e$d+?09cwcuJztKt10qEOueLF|~}f29oHwBaevUA-C{&}p)A-<~Wd z#H_4nJ>#+CS0t#gNRZ$RYBj=+Ni{7H(B0$#Z_v=L&JKw@VMw9Jqf_IQyS4_Sb?6Ok z9hw~j)^0H=DPMC2attXp7}|abI@Yr?qs&8GT9BapjpA0YIk`L?h>Hnas3^{_RKZos z)3q$<9D9QS?`wy5E(iaX$Z>uXI5Iiem(z50E3V|!Pu!+$n?apQrg`7c=wiMo2iM4* zczJ&N`tS99RXS1u8bX*i)Ow4qV%bU@#AhG+AI~?VkZFX(N8T@{IM1kb7O|i&h<+zK zeKI_PEbP$80ouIm%Yg;0u8LWz^1nOP**7-N%r5r&2?|p&j12BQ41m^;mAY`o4eGc@ zWTYvMBVh(>6!J%=9WD2MC-^;SUszLbNXcC@4MpJz%`C}!dGU6|L{(JK#i7v6D<{vL zhMA9kYqgNm-q`q}v7IS!gG7V4&MExI+LoaMMkCtGBkOKpUf^-2o|yYVA;RvRx;CFH z?~sn`2@VYlYVtZ;c=!#=0W?}BjocD)aziIF^SYy>lFQbI=CbA02JW3LHD75rSqbIE zM28Rr02^SV14a;ycn874Qs1*Q+A%17eDi0{wy47y?EUqK+2)XXA0q*od8HPIq=Ahi zJ~eJRKC7&*Awttn8{H%#u=z1Z6ZqRK6k^)T5Dg>#&sb$THO@>ls#&Jg=M7Co81=C~ zfunWC2rI)Vree z1nt}ysxi>e>+TH2Z5xlozHz<-5L}Q98(g+8`5tEM!x{0&uRcHoqGbb9ihqb*xpyv=D zs~t$@Z21|&yc`(Tr(C!3Hs(dhR%U8qB-C*!b1dZuf=N2?G!S`T44W_=JoFK2CXW$8K%HgE1<&}0_=Wv)Tx&8gm;gFc&k;}%+ z7Vy)3K4{DoYk;FsS=}hh`ujTHsW|=u2J%z@#qDF&njWDXW-pr7*Iw@#md4C!hw%6b}b$h-N5P$IR zD{c#2w#l%aNln%pjmqt-0I~>at)Ynb@&qT$|5a7W6aOv3@qfm6{{sN#ZxQCScY?hW zh{^s3XA0@fcaTC4kwsVz7;1i!_34R|Gkn3vols%)wa4v#E}PYB?a$ltM$4G5m;GxP zD^zJ8Kkp4xQ0X-7biKcZzMyKrECO^M?AJdB;x9DgPc-mfxX>R7^FQGLN=W-Z{^_?q2Hc)T}vB@I3EKK3+II!P{fXTLHQ{kW?eiWIV(#jp(fLou=Vh)uwO;>T!6z{g>#Nd-p_^I% zcWEXOSenr63O?Q?Xp z`xDiLp^=y~In(8r8SqnWRdwrq8g(7``kt`Z{CG}2vK}P;e8_ltxByvww3w|oKv}pE zc&5tiqt2|h@ln#G>~>&T6ph{2Kiw^9*=-0@XZ`E(vHRa~IN|913l1|uz4!;a{nP@d z!zAWe%V$+P_gO@|`qLt93x$Tn( zem#%yHQ*?vrk?G7U>@F#%vG~|9*935Og1Cmi9MNLYpQy`q`AuX`u&Lm31jo!({*uL z(Uc2(Fm?k!0UbL51mw)5u-=0|HsA9SG4(!)0h>;& z-JMrg;C()-wl)Wy#h>2-!_=+eaJds#Fe6P)B5F)} ztws=|qyBdPRfyJa@cbi;GxGI??; zov+$%TYI=bL5)I?!sTf_xD-$jxYF=(zUA9bfHV78|GWnIvy*Y*&vSZkKT>v^XiFly z3j0~aQ`Fwwci(>5ff5^4v`ylgdTm#n5@Smowvn{?dQ;F#lC5c`CxO{y#;jA6^Y*R0 zMs3nhM*f}~c7mcPy4*Jiq6iIcsERjn}%zp(>gCo}^TS8i^ z{rdd1CsZk0p9kM|inLOg^I|5L6Y0DjEo`;g6McbgLE+VHt&hKp2sl%%uG~`;t^`H_ zzK@tbj=jxTSQYzYxL4ntP@dmkSWWdgmL0h)WcWXQC}qTKkssf8Xdp1)41luq)qI|e zh4A+km9|I0xuVL+)rRZPlq?o^G5H@n&jxH)tzM zhAo`+=%P!Zw;?#2m4*zGU!xp1f1OT}*9g<+CVJvx-|ozg6t&s@pwiO1pTveN%PWny z-B9?jdk9VI%E(}I#)a6vBUf|9Kkw~LJNAkeZ&$5MEYsoc0XkC-7(c^X8TltBZi{9< zMz$mwv3k7`r;Yc_t{g71b+>zQ8RBRk*mJ%9)e5+2-^Q0`4DW+{;lTsGlN>W+!>>+} z#)dwi70q3=((^K+B7{JNkYYuOg$6oqd;gqT8cTfZasL2{)elVbtP}+)QNUr)2-d0`SSJ0LOLB+Je^|zFj4~Uf3?p1 zcix&S&ydKcn=pGiM3=FR66n#l!(>{I9e%L=G`Y2UY-kXa&em=qkc1J4Z*hv?AQl#Y z3UeVok;0pDL~t?YQx#NS`p_k_~RqT$rmAo}50 zBcBv9M#h4301XI54A>#sycwk!X%+LbP21Q2y`e;Ou^gI&_<*PN}xBA%O8S{Ck@p$ zWQY}NsVx`z45IUJ8)%4G#psIK4RK{Fe1wn(l)(PjknYsVPVgOdL4t#y|3^;$f8=}r zU2*^K!l;Vb=sxDrMOoaE@~S*v1LpVezt_)TSa&>?JoR$L@##WHT@)g}1N#xGhbM;` z%c*HM`s#k(s$Z}CYHM#BnK~1f6C}Q`v}tH+W;Oq(Z~NNcX>4+Y2g0mvYKj{EeBi85 zE$7%P8b6plWZ<6PEqTBU6M1;btf4&xmYyZ0q=YV=Eo^??QL4pdWB_F{=#i0jYVtZ8 zQ@7r>5`iBpzy&LV<~4@`V?%%xB?`2B+a>JGiNh!_#mwf*qzHA?h;_9<4!E zui(%o5U3wQXDZ{u?-uZrtln!BO|MOX&tUaNl50=ZrxGE<8%j+Xnb{%znqM+E3b>UJ zX>EK+2(@P;aVxc7X7b!M{u>h6yP!CIUi(gjS5#Gqn)yW!R2SFf2E+!Ptb2~K{RitW zF0vR8U=7J+IL>Q}jJopNa3z5onf=F9{*G6-;rKEMd1%E*4wk}=0t!pVhp$Orm<#l9 zRAd zFV=_!R$Axy<^~4HpZySk{E%(WRgqcW*Y_RrU|p8if#OKllU$2O3!9@yQu;*k7cpwE zzYkUJ9A3iZrL3;IVcRK|&=I>vrs;)yz47$)LR;JX6 z5W(^<8YGvf_qU&9e9^ycFhnNj;~22bhj7NugqL6n7+BWQG8>}VS&5k=@&W*fv0M+H zZBGuM&$Kx{BhB$H>wF_;px>Hf@4BV5+HR?CL7Ar>XQD{a*DVAEoSbFsKs=i2>Ag$0 z_P5rM-&YN!s&c`Ul93Vc3N%Aj7%xvosi>CLpZ76RRg#f^47NO*0%Kk9q%raIt*lIu zxU$hZZ7Vq-@IGf|XungmvCs9Ch|FD7qh1>v6cvw5bd&jVN;xjO5vV04CFJyzk`fze zz1s#eb)=9N!&WTJW>XS?Yv|iT8Q}&RO)cw}wm<&#Agmp?S9Yz1 zszNWfs}wDreQ`+!m+Juck7qMCBy&+ME8Ib_aEJBDU4uKnZDSquU~zb>R49$IZ<+q>b-)HL$KIh`2a>XXWbM1X$mx za6Enkms`5+m?SrGfKn;m|_X@gD`gH&@ue$v>8#A1@2?WMkz1$KY1R)b(@FW)aT z(d@hcEI6@=!;4IViv9@xQb;DO$o7`Gua)qur=40(dP+`@kdTt*t0^BFVV7K#n7H}u zHmm0qYPvQ-%yTGr{8y0tt>MSi-^*nUDLQ(FmQ9X@~Wfp=C4*oX@!N(rHaVPCO&AKr_A%u z=k(`OE9|DAAi2z?$|y+hw^>ymt=CT%)wTWoz1_2b|2J)DNGGc&3Zsst{%L;>@VvL- zOGMl&;vzdK$Xmz2S@HbD>fdEM8#390Dx<$54x8#eq_J-Q+9|%^vGM$|rh`*`IgEA#>ubDF*<|iWGEq26X%yCiof1|D*8BQEh^7`=e^g8bSEb#o$uiGE6OYT zZJRCftBuY|qBhR%Yiz8j`Spa>=Fz6acTJxi6e_~hUvXpeGunEKAHyH~NM(B`r>9>I(L1DqLxoIfuquioiu!xlhQH^%@$M~XaWg6_l!5?} zp(;0beB6c=wpL>o(Z1B?`Hf#z!cbr&ANrnDUPb&Kav4sodva_Hfy2(CuzWnEKX;v3 z?5>T0WJPHqpD6c1%9;Y7xHFNyu(D!nMn>>cL@eqT2aB#UWKzQZyf!EOONF#hgrx%+*=JIKeSX4Trpx}dEItenoRrMdOX(A1UF;kk{A z#kUD@T&dsl(I3BG9C&%XD>T+bq{GE|eW|HA=rDw*QTL;Ijqlsl0LiZHl4n$9WjgzZ zJd)D9JpOTB!Y(yqCiC6C2#JXBcOepgR}v~`)k z=SDM?Oy{Xes5>+za1F!D?BWLQ$_w5rVH>TV`6@L$7{`~m-8ps{1>!C94{iuE#l>cK4DB0bpo^NVWsdom z*R*`mOooFd99C00x6NlrMJ1(1>t-w|_r!mtGHv-mU+eS#^VQsRvKn;0)t&9SXUtv_;(L`X&LyuYo|L)bE9op8^q{bu%t`8AibsqH84up{@STf2f8JyXVCK1%YzHzjj7TX$WT+Z9fanPLlasde>Q!`z8Tv~tP7>#1G#x|@QAl)ezUM7S;B)TMuNlek-2<7A?tC;&>jQtlXfWwl!E056NO-$dKOLVDV@C;-r;_zMVV`zkVaRQVg?Q z8^7cFP}d2VHE)EY9xIAb-OO7zI;ZX(%szps(;;OlAr zR@MgIAO2=L(jzPyN7uhSG?g*MS9>$36BV^sbsXzFxE85|z4w|wApw0i_(HT!D6tX} zuiAX_T66|1EO8|j6}d%+@Kbz88Jo;};$U9Vgd1D)v%<1;Se1%VM!vMQTj|m?NuB7p z<#p{uA3H-+g@7p0C|S&;w%B_f=b!I66<9ioeFifn{n?>wAywwzuqN*?3|~+xUbnW) zD>?OXJdy9&@0F7|nT*XjinBT7rPm^NoYO39Px`DcNs#_+-@DGPYDzjfLPI||PogMl zX!hnrOQJ%?rEtkOC3d`S;w91RO-*34M!h+0#0NDtPo3CbwImE8pBX=@02RE82l|br zmJKrdQ~B_xYssjFfp8*RY}PN^+%y>q!^m5g?mBNAkfZ;O`k0SeDy-ww4=uVLT+J=~`DX|B4|G(!A(4Sy2R-Im$ zB;T%J2O~-=_9-dp=DNa$gzLQ_i^Y-HK$tf`I!9(CE~lb`LJ@TC(%x6U;Y1j;L>_C{ z(2%E%{a%B`uu-#CbgC24k2+3g(Cm3E0%C)UU>d4U9G|8>B@&6^5`?Mnos$w^2VbyX zsXOt2aZ}t&3wD&XYCs?GrvOiA3aDybmDAn|QLV~4k*`7M;~P`M|8i%;MB!Hkg>+2D zS|4gaYHFn#HrB&}Rnf9hnPb&&-cYB%BUEWvwqQC(0}F?z4jj<&^Y{Pw^*X`2?tDv6 zr`w?}{p0xZa&*MDr4* zWWj5KI#Yxv3j)`eapn5+S(@QY&s|v|j4%z7!z9$FYjTAfDW4`L;40O(VkZc%y3SJC zd;>`dkz+b{ZgxlPZ_cwBjwY1EoVMbxocgB;f*)YyTDS4C+RhYtcsI1&`vsnkyTgfJ zkpQ*@QUKa=%DkYT2w{FFVf;bt9P>N3c^Zg!Xd2em)?ay6Kv5fx|FaTQpo?;%O1ye^ zps_FhOAcf)gN#2&ZbV-x%sy}i6%KbMsMlX0tw|c(h)ib2m~5s4XR8QP66ezwoG(*3 zVY;}mHKT16gNJvm^`T8KEA=p;@ndtkuMcuNZ(UcTn9uy-MGx z{h6<{tO*J&%LA>ndH)JLopFJ5^7)&hRoM!=&M(m*F5u+BP775Gk5X|Q0XgDZWr+>Z zw|(>5i}t%2&W=QASbQ;y={XsNY}&wVp|pjC&EVPn&aG!-o_E)8`SN6R5cY8cV(xfc zB>66B0V~qt2{YtIig#s-uq(WC$oOKcb%~W> z|5!7TA!y9Fxrwb7_{`GvTv?AWQ48b$uMp|`3U>S-iE!8iD)ou&Gt-MhO|is%rM3B~ zh2)7IQ)Y#^<>2x);r1nfh6}5^jtGr#jCs&LIGYLg3^Q_PRHy*>f~;{Q&3=cSoTc&Mt)a9`;RH+Ndy9rS|^LSW3#vp*3Uj zpg${VfA~zGpiRL9Gci#G&nfuu=@-~I*pQ$g8f=^);2S(qj^Ccp{WVvv?lxBlNO#zh z=ym$el>l>f`d_UO4WWK_qAppHnQ(+!6W2;o?jBP|8B9Jz^~LaoMY)m6W8qPzwqmR**6y_C6ZJJh-xm&;Ys zAVB7F8nXY- zbf0&`sQ7sj!RNyjFOH!9R`Wv&q98uYdd}2tt)>yLc}ZN&%*-yg%lx#|Aq1|(e)`#`Ig79uD*Z&jw=My}yrHYN@x@{!KiyQg3dIy4SM0 z_V_WgDO<3Hn(0VSj@&snw7v6=%}16^Z3Mw$D?#v_Di;b~YG;|-k(V*8=6WYbfsW5^ zy-H3>PJwmmWP)CTrd7X^7da_!#5S)DlAI#D*h)w+zSvT40-YX6ADdHA($W@-hmv@U zz2dmKX*PH-EG~Y9n!Y7JC<(m;zXF~H!|=+=4RBI}Q%#=ZKOsgWijKE5H*Z961WQY(zSD7OyRrT6kxJt2HB!c(w<# zwr=;sY?0fHa9sbGNBxlFjs<-vxY4Ye!gck{lfcsc?Axh?I1JuN;nsh1?h8 zv!bXgZE=EOBNL4Bb78bxuG6ka$$G!WbMUZKm9&Q*qh9q@f<8Uvn24NP6ct9rPa&~g zHJwF{cDB40yre_{e0ClBgd z?$S{~8WYaXKYl$OHRn`8>o|0o7M7?F@B+Gr2jYMXuMf)W1OkK%YklzDzFAW*uFf>1 zv{9Z4?Hn*97q&8~l5Z!RnED*YrIv0M@eCI(>^k$-CyuXd4$=);$H|#vfjd9hnw*&( z+`nVgOP045p!@`WCkfD`TT0Xz?i;K zH7q!-SgW<{A(8muTAa{wK|MY$zVU)qTKpXsHJvXkbis7#Fbe~GXNL4g9cmjmYwQg~ z*7G=ShC`n`%uW4rTVY%!`h865CM^t4{U0a_jIUr;cqB_s%^ueJnJ#^_h<^N+vgBLO zcME`sO9%ahw!=ni1kP&o0&e*OH34r0qH!^0eQQTndloQTsR-fVJT-q=8RVA>h@d!3 zQaouHA~47)-c#+pUUo+`L8np}85zm(^$~y*BXzlVF)lDOS1PATPDF`TS6O(^&FzX> zDDNiXBXtTXm0Zy0VRx9_lxm<|QkRwvr{F@7zzh@)|FS?s4LM@M)cz1Fa_Bc*!lVIk z`pyPv6Ep4!&^b-z?Y$KkAljL+ksknFsJN5ADj<4I(y4A^N)tzEm6uKDn znj&6Ww5=Y`?aDThlO4^)9>jU%o0H<&&nSXiI5B!Ugd|-#hp*35faycbEk5M%-rq`E zm_NBKfJb?#&$pSM6tmXfLeMSGm`zL^d)zV!|s)NKvb zT#P}c-p=-m&vV!uRLL${mR_tqc&@O3&JSz?J-3YN7p;APuz%K1_O0@JVt3v+S27Eq76z6hvNFBV&v z2WI*#r>RU`DaZki%TJ@2Ip8A2iDzW9^Vs+i#oD|yJ(-E%mJ|b>1Ck_`y8p-^=O_^d z4sI+Lg=|e>w93+2PI5o52YD@7=y194f4$5^b6X8Taafm=(sTc@VV`_^dpLU9Ohs+E z>CO)i9T@@2b+;%gL`2TeXqk(QOxSaO+^_h>1CxlYJxth1kKu<@nx$t%AmE54j;Xfgle7o;MFwCx;iJ%4K-%u zFikx1#g1ivdphDDvyk+mx}cG*tkm#9%iTuqaxMoUW?@*Tk_x+nw5!SeJJev%?2hSt zkM@Kqsmmn(GCjrR$Lp&mj-8VhXZ5c~>H>1n`eGpi5(Yx@JqX2h0kG)lXx(C?lT((q z)i%(5sKfy73^+Llhj4y=`gc-DCfkxUNK%t(G?a{?q8@Q?YInQ;fG7fe@E7tDr zBNK{Zp8*Rt)-t0G z?i#b%4iCR}N9w^@In|abqAY&S;kLvvwm@8ZS?ir5O8oKVjn9F`o@%8gwk%qxHDKj} zmZ)|q%l{vZ3pW;=dD6sXUHeyx@gJuv>Z1RA(!p&4T+>m9^OS4b|Gt>a`G+1llhSY0v~O!!aKQX`ax9i?x1$G^O5AWkSb%y%L&B#| zO-4*{By~TFq$JJ0xEb!Vy9YU-t1&591-IpKr@8gf4O3BRX{=cefBJKZCsv8EE4kga zGX@rbEAC>1o5_I4sqKpp0LxNpXHLpUirqdr5$=?9J5V0J(qIki+}2|o9%VQ!OT6eJ zZg^P*#@5qSSQrL>wiKJt;N3A1wFt?VzZRhB2Xu>vKe>mH{RQN&{_5GrGZgvlD)e(8 zpiBS%YVWP0;s~2}-;f|7xVsbF-3boC-6goYYjAh>;I4za`{1s@28W=7v*-JN=iKa@ zv(~xYdv1HJ?&gb6BEuPHd_B_sPiW-@+g zwx-8m!Yv_P=sBMO7<^nI4$?U~lDnD)E0i=19QFLJclh=5mw z^(Q%d{b3!{1v}o?jLtI`4p1Y)Mdkl2dQ3<6>=i(l6cr^0L4_V19Vx48(^_=|IcAVS z(&{NmJJ;te#jbd6)Ptv$bfs>sr}G*HUEOJ-_}*|x%_{Q6V0VBdKn&ySVY0)8E2MSX z=b=DQ=N87)8V_>Uyc)ZHPE&xzF};rGXDX;!h+Vl_nTRdtSpOxlMoE>y*_w`Rq$z<1 zQ0cQ?th{($7gQ!mipup2hE6RhPP4L_3%Zx#rNy1K(jL*J!{@aD(UivE|7lhw3O>yU z$2q#0>YQwUuk5utJB9_>L_&o-i&jrhBTuy0Ej89Xk0?Kn2rROx#_`8F(nz0xfSov~ zH6hW&-6Hm8B0P&@b@t4bPtjDQoT5;mRzXkYQL75+^Z=Lm)fw{VEIyj2# z-Nv_I2{te{R!4BZl!8O_&`DFW^_X5|ME9TvLw{I85ojh<*-mPtSDW9nB}r1mmV$XL z6zV=K0*Vr)wuFY#Bz3NCr`XH`|EUwrp@)nTAiO^ctj2MvT*UNy9gu z9XITBa%(UBd%3=;gc2=n##%L(2(Z~EChKD(bb0WzQ2=wy%HcNJ=$wiUP$$nK?-$Bd3>BszdE|~FcgtX z<$fB0z%oxVIRgNdpA9%)uK-dhQo<&Iu`>|(=y zVMV{j?R~vv`dL|}b>I9_o~t$lm|SVFJMyp9;UNHw|G8ksSF{c)0RhgfPYwun-n-Mt zN+U-<#M@IDl-yd>z|~1K**rncG$9tIN$>NB0}pFDYGop>H(IdkkZI&o*`n zn(t{~U_zlkLlw@AX|vBvb5*E#p1qbt*H^s!i3;`ZHmE@&=3k!B?76|hX4Y}l-b6x6 z;0}JS89|q;U_PV=>r1K1mZeQpEyGmQ&>U!iQQL{()W3VZUWe8QH2A`8fLoGIAH>ML z){&RXuK*eKng@-h?y;cL4lkK61=4!is?HxiAeF2$^WoCq*NZRQD(ZPvWN%}CIhIYilEu(wl>&qDr3Db>ppwc=kHfQ=@J?)-W>AISz{vW@ng1w zuxPmts=nJC30Bt|Btxo;7dTY%`!tDd7q-T=t`$_9q7XrAxM?)aqiz8!Sdi|^@N z`O}~dTr^qJcIUtKW7xhfJkN~>dl@LXFfOV9B){OPiwdGH1?}+2CCFi1UIShe)focJ z*>CN0hQUGs?ChsMt@zdltH;gsgnRRrYeiZv><)!{+_<^QQuE&e6zl!hgy@8B?cZ0V z9QrO;Y@&6ooW9KN5vmfLt^%$;?K(zkOp61rXqcyWt9Al%x(ObB9EM`Wn~cWI&CNyn z={+T1L*4D}lF?OFYPJ3IWWHoOwmmvLv{wIgbBmy`2t|-@M5>27&AqOAMGK`&AyqW@ zhq10Yjj>HH0o$8N4Ur;oxv@b_13QsazK%PY6}M^px5>ewmzUWv7ne{o=ES#I+AlTO z0Z~Isg*)q_O77vAv@Z1jK&#DHixpwl}Ahe{_bo~AIP+4AbQsz`gl2ATJpN*2Ya!Xu~>K`y<{OND2?nt}9&8vId z1&>^5VFGV-ExK`* zn0mkZzEt%ZJMs*DbbRo|xg(+~QdZDR&uIv}?t+O!_f&M^?i`n--cz-aN{UtR@U5e0 zCtPgElP8Lsn}xD;I6r^Uot6@sKM~;=0ES5dn6NBN6wvE z&WGyMLiy?G;cKQsM=^Ji(}(sERQM*~GiMxhv;;uGCS1*y@4p4^YwmnM6k$J4tcA0v zOl9?{0+a4_=f=t9i=yH_U{e5bp(-;LfC zNvu{w{#=UOH{ZR%m3rGZ|A#A^qWaQ^{+>_pZ%!n3d@d?EKaTi`by<$Bgf?qRpwA{; znA<#Q`1tvo*N)240)){76u)ab3wXYd_?!UZgcfZ~=*bO!?veN3Mh+edc&BK1!#2UP zVjk29`C%YfXaHK<& zLp6+KHk<^_?cdso3Dmz6fAe)Wj^v=&h3*diMWqRH2ELd(g5fM~6H%t|m!LW&2$Wy{ zN(Jow&?Vu5c=lNy-+H@qNBy59mIYrq)21rJ;>he$3fhAa9bR*Pq%t|_%vNM+;H=tl zO4^)3%&4T#sxjSMyUvt9WUOeTvGeIjGXV;5n%{RA*E^^&I+=@y6gRanlILvOWfz*g zg-oHHxz4feL=Ao{#oTlpgW;OBL7`7V@7Mh$O_$bT9nN2=j_uZgJ8xIvPZwf_MwWf? zH+w=f)HZ?t1V!5cB$Bmlpx15y$PKQ?%O%3HSIyoaKUW-? z;OUxFNg33_UgYlC-lj9PD*XOBhBu2ZRhwMq-x~BKobPGHVMo4aqc#>9ndkykVW!)E z7Mh3~8p_0w3__EUSZy|;PE~gkH)bv6UYuLxniAW2nwgudW{**jZeL8BXOX|I*s~(ZlcS$ zo&Mbq7M;b(q4M#qH)tv3aSFBA)&lL#`h!BtawCA|E5@W1?6HN5dkN3cop@C#hxY_r zmKfxt1n%EIpFSlk3Q739utKzP(=Yla^b(TfMRvdBq!+vJLYJ(Q=cf4ko*Ds6IFJ`F z$QlkWK3I?dg=KcXtf{XI2=+XQyhm)hvph3Kjk;|BD;$k@VKv>y)L-?X#Za+pPG$Vm zyh6R|^+zTkY0E5$ukBY$i{Ac2Jx4++`1k0a4O!2E(3GZd&+jM!0EJ=)|TO-f*4?lbA@OAIzJA*rnvi^tr``MixkC8?SI;Qzqme`7g z(%gqUYyufds`Gf4!^+gnfR8U3@$ATw zq!PBCwjWSlpp@Z-fSq$qkm^Il-21zwr3G+)y(bjF8KhF)VORt>$HoPw!y1 z{(Pq8MKl7R`Yd#hhqsg)_jQcc($17-%J!LkA|CJi&+8)zHAHeb3ufLq&|F%b@9q{&HjY;(yNJl zVoToB1^4v4wLTsa)rHjD61S*-oGL<(!^X-;@?@(?bH?LMc-`El)~Qcx-TIe)G}k3F z3`qf=%N`Zs*=ymEhJi?H*sHza=$Ve1tP_HGDMcSaF;K`0$XFt`F6ufPSi~CVy3S#J zzK6}&vhVKm6;^6HB@jQ_3u2*~0u4ppfz;?6$+4Yj3HZJfS0Zte@ckLaV#MB;v7<$o zSJl@3sjPeruPlUfnnjza4fLypYCE-~Lr812+;eP=~(+BBKnMXVfUhMX*tW-6Oxpg|&5uCHl($5}Sc4SR;frQ7%qnQl4fvXfa+9X0)#R zQnJfnN4r%$l!D!YhPw{2bSC|_h3NJJ`V_ZD0|4qEaIjSiC*$T;tiontL+7zmJj&w9 z{7EH4xrZxHWyi|c%yE6F^kiCnfg4*nm?|K{lA2I?qO=xqTrPVaYd2ckX^=kP=v(m{ zkjjZiBA$*rcKF-hb+=f~1_iM>5$`63{{+q1MOM8=Y}r=*zF5+SHBl=>iwBWN|Fo>m z>_@;s@{04@z)wE4akt!DF*uz_4idF0{eN};{z1Zk} zPw&$@HcB(I!+<&M?k$=@u9imf{g@bh-ii{>88vyW;UCi}gnxvpYS-$8eP3OQ>}YEJ z+(1b)eJV#~wIcF%xoOglr#?Sp)V)5q3BKUFz*TY;(-G&K4yb@7+DVtXF>sbo^wK_~ zM~gQVe2n(K%TPJw#ST7FcMBx~=Hd)EpK3tf9|QpobY=^4+^Cf~IhC-qa8R z2WGD06VV~>xoMZ@%`1-a%TFdfua7$Xsc*}}W0&82Z=XrrZ?>`O)9;2VRmdN%rpK2V zDPquF8QPv^vd=RV6EhR4h=~JtA8F+224u+lbUJFuuNSJiq%-^)nUbto1jnplU-p8L zlg4p(9$U+-&WM*kzdF3QMN?N)RgL6gkPD#uW9W7TRyvgUE>l7Lv=`!ARsB#@iuOh$ zQ<+DbJ=N8p0po@DEp8aqRYb9pk;76JYw=gZ*8boEvZ$!&@$qqfGgJ3V7d6>o%d^;6 zc*XPiS`C4`28Hm+Lm@j3eyXnyp{&Y$oD#n0FC$cyc~xESxO)Q~i*pq*ItaS0wtIsf zSjsjtD`6id$M=<`YFVTCzNf_n)z2|H3;S^}_B9E{e96B87W|VY%IZoq%poL|%>emY zDuFF2_nXOFf(G4K-_z1Pr#WTr-0;@x>|ovIAHF-S3R1%?Du1<++F0EKuYgR@5 z3@)!Tdcvm%H=f)UG%h-qG%E%hb*J=pEXfuUKH@ex+!&o*Tm@eCsEi|9HPR~qsxY(R zv@{Gt$_AQtB*-wC>>k@*t%_9Y_xnR37%0QB+$CLRv4cho)Fni< zzc;PDPguh5@!>p&+&)2z+Lit>V2&L8-en?iTmk&_alW^IC6K^Jv3b1VN_A$GTkL-O z5mEo*jlF5Xqr*GAQ64!wvv5zPu##&f`#?+g#R=R;aD;{&-aJ(dV=>-?AHR|vyl}D{ zv%ea`UlSw4R#Eb3FjbCzv7)c*xJ&_2Ll{k_F}iwqZ=)a~ zIUcI7SkrbK6_vN4woXa}1PH^%YpND#QN}Es6xO$S1{tc-E0l?`zwh%J;@6StSu(*x zDGSpaT1@8*D^{>Eq+E5kw4|BX)nN8U;`I(Zosb-t6%>dNK$S=j9TIKw!^EF+JP}O0v z44#-)-lR}YC}m0O+cd^?I{UKc#8IXE_NzhgP2Z?cDb`<%cW1Rfn)1fF&E`ODRRwiL z?e?77j+>uUikYJF+Qc^DEsaOgaHSFmRymw6Ku)#fNQc+_0MKlfFyP~GXLpRz{F(Y4 z-%y5ABl=L@cW`LWmVGWXI{unT48BnDM~Y(GNgvrW9PIe`buMcg*D^*LpU8(x3=I1W zXaCQdi<;U_bkyOo*-x2D!T@LXsmDGaPXHO=y}kmwnpz6`!I%-3Bn{KluzO@11mqj# z0u;vyi4K*ef@O2K)Fbx4V+9(u>nYT%_*BY;P&f!3)0@V#`A*beA%=aG8i0^U;S^#J z!}+uDjxYc0MV(!%0X-*Q95FQ$n{X18p}gKon%h#ojtoiZXd$sen=`rn%V`dxb z%I@?ax!M}au$YYKaOG!%y6CGY&h^1k4^7C%GxSE+-_<(AQhhZKN;4tNyPG zt?|ED?6GhEwW$5?2h9r&$;(R&PzZUXS$IU<+^`@;#q^i&XiVhfk%;nstmw4mlkB?y zeVx=4W=-)QR6K8Qe!l1X`F}%k4ERpOeGTA*U!IuTjxIZyz_OHjKaf$V+ODpdxGoT! zy9Bt3=TlO3o-Xu|g>nXZf!2=3m}!=V_BVFksdTw|N45p|y-q7eGv{Z= z!i8K(S~tBn4*fGj5Qb*BP*h(+1?tMU*?~H6k88mj<`|&{6u*lg^NCXko#c@%_h=*u?%(` zL|Vy1jo;oT4hsuY;L8j}z-e?obk6g!#|!X$+?{+&g1p@Hzd1oFQH=k1eymKQLM0 zc-^LU_xY@Dw{z!h`p|zZ#3KUE@Z?K&9!bD)tn#pM&AG)xysk`Mqw&t@kxzxK>veDb zS?UHm6dF|KZ-Ix^eYq^PfnpgfYGff{;rO1OUs2J~PYe0!d9Erb0{@)i2(8Khs;|I- zjhSR0Q9VImsFxnppDW-*!9Q`LsGJ?7!D+r79)7G3R8(I6$eFLx@b-UO44^(}3s7GOiGynNro$mF~cJ z#ecngM^2xq7WVG=^YR#4Ea(^mHGVW2lB_I$VWy|wtL@yD-a!hJT(RWJ-dSgB3`#&! zD2gliH-3%G7|NX@iX@9)H@>?}3#ofr2q59H{Pb`iAZxY#?7XC|3AkY>ilwfQ_fzq_J{YhQtHr(>CidlH2>zPqA9<-Qy9RvYi<*_SH0~P!gZrLcvVM45=5wO;+HK3=H%) zpUxVmh!>c4nPE&_*BaoTm<&)2ov|8vAK&VlMHjML0lq`S1Oz0=cYf)5xX@|m#lXZ1 zlrwU--I?wtd1uLg94dP{w-5qixq$vUx3BdEkPs0G>de@0b*M9FcRf1ystxeR=)(yL z=S(5>+U_r35vSF7GycC?fB|JI6ZcRgfXL|OC5<1P80HF}<@>dowJ%k>;Qw66@%?d( zf>3aNs!aG+`!kd<5D1saRuVW$>=WY1L$^n!$D#(htei;!92u559?9W!Q^>?2j$|6z z?+-hy%s=JopvA+-#r$A`S_~P;e?KUgd}I5HLtFWdrPdswDQryUZ zT0y7jT**QiJNpQhYgDLABWQA`WuX^p{~LgzCEWJ>;?Qo~oJ8?**B!%5?I!dIwEPR$ zrVb`7%=7R>>S0D7kS><}mWZ9VRxRs0w+MgyeZvN1E!f?FY; z_14XL!5Kg~tXg+}J-*{nZzJu^gMpL@$JT#*g8!Gq|B)h#9|hnl&)(cDVfxdTaH}II zRW~~#*7gSu%B<5PDnYCL;19y0ZE+U1DJ4?Jc0-|EyHbAG4|fkVyKXWr_w{l{PUX{O zfY}V{hIcY_oMgn(s^v-at#?(TxIpB#sVUDFv0ci?V)83-QAtvaSkn{(-`D+}fWRfi z_ZUXTUpG^O0uMvCS_t^%4|qI|3h*2=_ie zr@K1|QsUyt@mb6qdK#x4HGWvOL+4>O!qGI&Nj_=uo>Pnh$^!mrdEWL9a>7#gXZ#V(+e7Ih%QYZ_ld=hYdE^FzEL0@k1Ec zh+Mf4u?oKo)7`$f5?nsv$^ts~hejub9L;;pFuj>+nSI`Bm>0@Ru}Eh z!tbjiAF;yQ4IkD7MRO5@y8>jCL5^h7Bm00au~;!lsbbW#91#~w{8hZ{i~~ZMr$iqaLI1 zrg|0Iou*KxfDy`W$K3+Vd;pJdQ4@GJ$Ie;u$%reMoi|^vm?8q!s`W|myuRWfKn(FP zB6uQ@UL@YIC5I#f_Cg2+cC__JDjC?@rCy66Ywn;8N@(qG{5y$*+6*PC!^qz}s{^*} zi1=ZqMVEW6w^%{q5A9rqfcc00R^=n?_)$*o#moo478hJGI|nY^CL1bzay>-I!;S;Z zIRJrkxVpMpk|#=2ehn9+Ml3}S?dc)DaIyHt6pv@|ovKpGp+T$p$N|@ROXf4nc3*Gi z>M#MUfS;rYKC^jIywpd0B3E`)ehaXG*IsDKP0m6IVn z4$S}DRjiPt_(tdM7VkeVp8He05E z`v57c`+t}Y22^^+B+BIXd*+L@-FXLd-QWWA<{@~6`VFG2zp=t)b7--*5vRw;mk=LjXaAVfyu83kQ|@I&Xfc=rE#vUq%>Lrxq!6Fo z+rYl3{C>gHR~bdR9uJ`IEJ~?Axu>%0H5u_aZ{RCkFyzj;%ktk8Qos(J`!H$9aET3? z#+KGZS+GE77HRwOpQVgxXi_`ux$*W}rz!00OioNp;nIl^C#P=D9YJgwHx>BRr^vYt z8+=XqMcDj65$nr+KvyD(pKr(68PK_fm(bx=ih#H4nm2QjOwJdAB0w0au&3(WQqbQz zSO7^M&+s_&2yU~Eta;y+nOi$W1(Li?=A;R_or1pxu|$21a1_BKKyoBEnu;7X$=U7{ zZf(F3WBz)D_@7ljTAce$`W53#W&jfeY4(3ySQ}BI5qGemmIP?m{(*!tM}wqm9+>2x zEDCu7p^Cnb`ym6r+N~i#lmRcN)r;x?KZ=p(XYb3-t3l`C|8VNK<#)zNN2Dp`_%ch& z>ZEFO{^uOuZV{B%$wXZL118xJ44{-6>w-}JH0$IcGk z+cOqm>U>yZFNo{6WZQSaO<=TMt@uCd!qv;L1Zt;Zqv)62rro*aud^;#CVJ zL{hagv1_(N)||;g{+B1Nu)*VU1|np`5-?hF-YOLU5^+htZOZ}sR>)h_pe=Xw`nnOy zXJ57DHGdBYe5>aQQBhG%x0**)m%)Q4L$>oaEu^^7t<|jG%9-EcuU5CXv=lV8)F74J#=g{@CwJIaB2~r|^)CLX zcqw21vv4vS=i&Q;=X2@m)4UJ%(p$go(f5$eE!^52GUj?6c3*KEl)rigr6OSKitf%@ zIb_AKa3qb8K*fuB7+ZMXBg_}%{<(a-ZAe}^k^C4Tjt`ir4qp!B;44DTCU%vKkYIC# zWAn`AyCBcI=p1>V)zitS!S?1`zYgC!IP!{=Oy;Tf_I?gKKD#IZbY^!IqPw18^1WFS z@K)#_yRGjxkQ5sTKZh-+-SORdvt-#(ioJFHn|CIBN>#%?Lj5Mu6b8ES#5)#%d^O)$ ze3rq$I{a>`5}EAZb^3y2&i-tgl5XIenK36}W<@-1dNbs|)NtbFK$!pj*g(gCjnUoR z4Ltzw>_;p*7#w0uTS)Px>v7=r+}gUtb)FJ-Bg+%iZq@`2cUrZB4i?cW42G|GA$P$_x0#3-7i?7sZPAcdTEq>v6&w z`FuxAHy~m?>t`G>pR|g@u>F#a@%)m1%&s(SIxS={k%0V*V@wAv(s2<~8naJUa4yB- zqFR!SxRZC+V`u#Js;Vq&Cqf0yI7Qwx>iNmuaRbvgx(QOR8$Tj`%j6}|08O|-3gw#{ zmk7!IwsWcuZ&(WMe&xpzPyqQKVRni#G_7{o-NI6yDl15&yoAgDYqNL>2GM_B=ikw$M5nFk`jq z{?3X1fD&)iwCco1C{FIAM~pIV8Dcu}2anL~0R5V0R|~&xC0Hn#k}&*LfTXTQOPeca{@Oazb!>B~=MjAD%zC<=FY8Z>p1GjRliquH zBt@f06UQK|0tRjwQ{u}iD`m_~BhmA&FHbgECCe1gx8>OHC4S`tAhk|L&Y2GUf$N?N zSu^dk*BrGcMVGarAiNjs*%a-FyEMB1F=m|G*LV;j#uzoOHt0;P^PaNf8Amp8owDjy zXT*5lNpc1?CdWwNJ;2e@G8s*lENg?<)-hR*jBYcFMRsO zbVn+^y)y`=q?2ID6L+f~1iq$JV1VwMaw{?KLAQR*mZuuDe=$?wr_oIuKhy-j7ip|pn-l?H-eJB*oVvubIVvoW<0>4aW2<>Oj&NYikfEC z{dow~kL9HUV`y%l?f7wP9W6(JQ%(l3uay(`BTKIpDq2MRK&9Unkn{~&yLZ>^+i59F zNnwN=y`i~-VoDYE)Vv;%)slU7EK@~+x%}8` zFpi z&Z&mEs@3fM1y2esPmP42<%+7eD=sU`yHvsMps&Y{QjWOt+vaMQgj}x5XhRDV{t<)G zPcP&|N7&8<8Red6X_fdbbI~$xwq_@~VF|B0*ZaNtV%}Nj7=p{Euj-{xX*D||&6-T+ zw_)mtW`w?XVjc@ijoC~AIoh%JA>l7;?It+6Z@K6Ei;=x``ThMOrHc6@SrC%*C~z?a z2Q?P4-hWW?Mi$?yn(@~{mgcHIPhT@a?d%YFCgQ(&mznu_oMC%~2InW2A$c$HaDMG} zYa}0(mIPI;pVc3@%sn00hEB96v!u*jZ8^cfaMsTA^PR@Xz&05DV_Zd{-lPfujz$w&EcEF$+dP5;qE}(@9p+^K6_4|Vd(>F6}W6y2MS8{ z??$E;(~oZUTxJ?gcKl%_lQ56?o)$3T(Z*IC@qWF4R(R&mMy=+qha3XLW{-;sozd;H z6ZNxK8vM@`bmH7pRrROO=nZ~tEfaB&SW%Rf2MMGn4&jL($jAQR5t>j9z^)2>@1YFv z6$}}+Gab%j$?i~*qvuL2lD&OS_e8U0l1GsH6Btr*N>>tj=Wr&Bw72hX;lc3ij?`iXL$^_RtPI7s=cZ z?oD>6jhW8JP}VT?7_+_UkK!I*^pPku9#;-GwQwwKHYIarw4Hdwb)%veq`;7dT&c`#&a21sTQn(D=MxSU0Bb+`&%eR>J+3SumP%Wu>)g z-w{A86-^O^jdWoz>)O{70Nb_Z{EjDxL(0eg*Mh997iejvp%_-XC0XbxB}-{#>B0hmsO^GN18;gW>t6LgiLjqg-R}|OzwIvZLO`NSavY)qtxC_7X zUI&?H`6t@#r#XPBWs+a`SGuJgNT(Jnl3CXXGm!9-tRNZf!2xK`ZC!>AN0M#IC0=+6 z^afXv(et|Lq_an(6{d)_LQsK0-RN<96q5L|7mGY4*{FEA#uXnzqR@ zmz~^JGy)z;-C1dql6d*-R>wm-u+ze(^~0ss=F8Y>pe{*|F%)krEiwiQ{X^0|uO* z9Kny=>-oHKHgR82SWO=-p!g;zo%#DeR|zM%9^4)>`zMw6rd#Cu1xnA4bxA~D^IR-0 zt<(pcnY(jJx#QB5N#r#vsyQYH(-QWZnH)B{#%hP@85(xWA#%FnK zm^6xz!zV{$)&LPm_XVvT6^xEbhU(*g9dp0|$Ntti6ao(iD)SGb`1qCMHPwUWY_l6z zqn5MD5!6k6T^q*VGk>yja7@KKY2F6c1q7`ucaPNP-IJ4juo%7Y>l$HG+ z5Mcflz>Jq18@B$LYH1}Q4k_6Qhqb7IIDayB%hZGtcP^+w*#CmD*AEeAlORu=4Ou>P7UPqlB&NoOF95VX{T=P;gTq#Y%FY4@|5V`d)s1sF)&|p)VLvGt?>8G+q+ZcDS;IO z7){pv>&r_;7FTqX0D|!2QNFUWrlNXJsMdM}8OASD%AbQxYpV>f3<}%}=F_4ir(zcF zvr3l`WdQnzV*Qo4UapisO-;CfHPIcTh`k$YtbziTQF(`e1Z|h2U6neXZVnEvKdo4*e_LjkIe%!Y z=bnO8GtT~4@C;3P-O{?1uC@5_zc*zHv_{L3E8tTwwGy<7t?3J2cA;1QFtbAQ)Bmz4 zpDV9!2G0~uq)Mf*CxGr`fTKZ^U@Geqv@0I=xh~On(lVxK%C0X%8qmosp&gfK%2pK1 zCMTIoMFaGst^7HKc=ug8^G=SDvp~_p@>H&|e(tA~MNr$;*u9x#hcRC%Hi6a(W)Xlp zaIUhfU{>6a2e`?{eyya_IqtOqHZ=cr$|b0xHowB#ElH*;^tHyeN65*XfMQGWw3FWzi0@qj){Bn-fMt=9zs z2z)ulMN~CVL#&|WOt#@!@4^8r$W93l1-3xxrD66&!A|INQFxx2%qHxx9g*M|N%e(IbA&KjX;c%YSd33c%6 z;KmeNR_6~$)BJRkfO>JaHQngJ&dNeo(c%AMVj7{TVP`&bNkz3JM=@GJk;J8XI_20# z9kG=%w@1LG59?t-Rx!kKW++@dY%C2yXLwE!Ix;88aJ6is$A`#`v);KCpZLYyQ(Fvt3>AfxPDhjHQ6dE#>yaEe z>!SR;(O}LU;QUbYgzzhCz#KaIJF!NM!MM^;U$Z9Tuay@0_3r40mPTJ7pWNl=GzNq6 z`6_9tFzr@vqKiN@i17T^a%!uJ`8ntbE4%%@+rvaLyw9|#?BY{kQ#O62v!|UDM(dUn zT=)amFAn@`Z|8rhZQAz(07MCP(|M=8Yo1$d29VaRfrj1Y_;fd1rkZf90K)l3H=L{i zd`YN+MsG)ySf|HsMRnPj6?s@Dt@=|}lP{;FCcK0J00gTJ^^l&%Sk`^9XD01P}oa$4>YV@Zvg`-#dP%r0Y9yhY# zzsJhims5C$@kN?2RRg|7h)ho#~42162(0-%U zW`um=8bxRb^&RHPQ&6a~ik{W1Fl0|jxFoQ!OD~BJgHs&~`lWNM%JyI)RCCtn;FCxW zgO)2NlDY&X#bB}R6GIMv^eZ8^LHw7pnKBqNw~T*Y=Q>i9`0(g5y4oxbT=(i&8TWWW zwCpSTE}Y*(g`B_LM1D8+^p)`JhEY>bLq~boXR6(gI$5BhXClQwK$9iN;CEo+(vK-3 z`huCBV%@KR^>~M!qN1%Kz0tr0Vt@>fl?lZ~a-SNRYdN2!FKp>RZru_UARgYGE-7ro zoOeQRpg}f7i@k3~1m7EJ(AJk=$<@@6?OhF~2}eEwEdDlVk6rULCCVuKGeJz12Zx7$ zT|56_VJWNXht3=t)%T`1jStIn>&-|T!bvm(w0SJ(+@lf7hNXX5!5CDk`!;sZCtY4lSOt?mBP;WZ zcw8&y{axg=6bSl;MRIyt>|+!HqiG$n;Lzs%?>U0i(#4& zzf{4zye@ov;fT%08IMukC(_hb&uxjE@pq22_`d_p#H;&X?%t4{C#Fn(batj;qV3zg zRo2yyRL>_xm0@r132c1T+q3$@sh<251-wUFv7aSzi)Sl5rGOfHhJ|qQZ}UmBT$qs@l8~DYzly(Lw6c^y zV!tK6JXtg)TNZ+>SvlpB$)M$SwzFO49pAt;B5@~iHdNSv72Cx3(qKpOn!~UcTRzb_ z4)dZofii{3-)K}qbS|T&tOd@m#_*|cCgj+PmKAj-?Jo_U-xT9eOsGUiahEp@=t|Uv zF}t=2=f`P+gZ*upxQWA43;LlL*~ioO2a9FdSy*D`j8*2K$>%tDd5O^*So)O^a}DAr zFZ%6SEhQDqNZY#&7!hbOzaZHm zQ~*Hw755>r<`BhGk`Ybu+vyT#)X0LTpMjh=2TpVcvwdB-xMzr#j-q{By!5OhDdq~u zs@xUSP>g*cU}wE8VSM*;=UuGElxzPtrK9bLRRk*U9ZX}jpY zoLg>a5+zG>lmZ=;?U;z8Ei2Ao0a)2f;tYi3iE65JQwNU%>u+kK#trx~L+I-b_^x<` zb3;~E8-#VC_lhWQG>#fjyPmaeS$7sZiVFYuLnmw$DCfLs_#%rC2C_#?*{r+&1vAzx zD(1>t_2^;{1@GR_O8#QO$HP0P$XQf2P?qFjDU7@o7hMxf)u|e~7G3XSg<{P+6FYs} z!zrke9uh;{#&6L2?BI{KqOO6VEcmqBXZD?#1;5A%bdX$y4jJv3=jqtR7cp)-OH9ce z6nDo91DOsc`{gi933gHVd}aDb&OTC>Xvs#AI$1nv9DV~~Ns@H@E^-tHzvx>~MLU7D z^nWHheLWJh3gb!+0KW?cLIjHOTZxt&q?+;&6$lRrSJhIt&&PJ(2a3Uy3OSb(fA}ZJ OPewvPyjIjG=zjq}?o|W; literal 0 HcmV?d00001 diff --git a/devices/surface/images/secure-surface-dock-ports-semm-3.png b/devices/surface/images/secure-surface-dock-ports-semm-3.png new file mode 100644 index 0000000000000000000000000000000000000000..c9cf60aad353f0000ce027b5fde18efe89508f26 GIT binary patch literal 96680 zcmc$_1yr0%vnYzY27)`m9R?fRb&x=CcOBf_g9k{0JHg#u1BBof+=IJ2+{xbi|KGXi zoqO(GZ>{$pi&@iOf7MmhRn^s1)jg3aN;2puL?}>DQ0Q{9lJB9QV6-3~0we@TPmOS5 zHRKD~QC8ap3JMkH&j%VRErS3G3jW+$UCUJqqzE*1uxB+kb1*Sy^|W_{Ktn+Zig-F2 zo7$SYQka-qT7!kCPTRVuD6Gwds5H4j>>x)8b1Q3EZ)bBgZzXk8Z(CD-Gb#~b3PDdG z1cAM|t1*SAy&c#E=qW_?7hWKw{imCaisCO2S6d+}u|EVUv_L8p5)RJh6g;f#ET-)2 zoD{tLtQ3?WJo`k5Z zTwNW3Y-}DL9;_Z*tPakWY#jXj{C{w8aE9tVURR;F?F_fbhUN> zQ~bebY~tYNDnte0^zSLyJN_Fj*ySHFK?KI;Y3#_x!OH$;N`C>Gnf@Ej(aqWJFXCpV zZ02_6_U2$$7YHoJzhND%99$h-tQ`IqsQ>-?eUg4w=S3 z0{JhYUDUlC&Dq|YyEwQxo0?0xL)fJLGaE;sgtNJ^tAn$;gM;0_6s7VnmMJ(PGohf@ zv<90wc(^e9hXLl2#;)c6;%W>wHJ6hVqJjvA z)!Nz&2;ku3;N=JKuyFH0fVs>8{49Jt#uhB*#{3+nru=*W6F%;LjhA#Vb^Buif5!j4 z8q6F_Avpdo_RP$92VwWe4GGdo_}FecD9Br zNMpPIi1iOwW`DRcH|ORCnDeukaai!Oa2Nx)Sopa(*jczNjCr{D*?D+OcuoJ9{a=;@ zl(lw&=-BI@g`{Tg^iRvqn&L0x0UDeBSrkH4rhlx#+>Gj03oc^6~%{|)Q^N2>grr~kzI|J`c;pRoRqSWK;q z!ItI_56edNXEJPme9_-ZVf)Ye`s>|)@LT@^hd9GO&3}7g$iu(=xH%Yt+8N@dpBwhk zprBp!Q647wCfDUm}(_d0G@({Wi|0}Cj`XXIrD~WM zO`sE2eNJgQZV%foAGgG1WrJCKCr%x*goERkGBYz-njSkBQnk%zJ~K@R2M6c9m14ky ztf$0xkpE}5s62|$Gd6m9Szb5;zO*!tUcO=bKL0*oRs^#;6e=D?99l|jIwU+??A0)OrTu836W&jSYLr+~ z|DwUXh-~wW5b?OJzTbIh?#57cZM~zNlBF^@XD*-Mk%}7qU*u0Sj!$9Wp)05A7>kS{LZ*_4$Ym?ziyLz>!%l_e5*~k zvi%-mA2CVb)?1{irX6l(V*=JK3Rm4&`lQh;&IL|2w7{>*4jkZ%SrVp_jNJjYY|D$- z_&jKv9fxJd%TW@ByQQVeCYFFL1K=&u@K4e~D0&9QUft2|8xg-JlD>%R0)^xg!Mnw# z05AQ6eYY5*spLn4dz3*DdY3QqO6SW-<8@54`aDCKtoj8H|q{v&Uxy*Zt)tR7qsN1vMf5u!Y|gDmIMw=0}Kob;Ls`rM9QoleJ}_&r>X zBwoK3??scPNmXIEWXS^slK~ z4R+IBCdGCeXrK6kz@;9SrJHlzPmydeE(<2gn^wOFse1dEn3HP*5Donw$Q*n-?}JG) z+wUeanV-#QFht20KIKXvzA<@<(7o0yiO{bv<$LOvAs_B++s+?WuM>ckB!gzuANR#f5)ntYiRUI* z;>uw;E$5S9tNWq4v3A58*`!bG?oSW=`&W-{Y8vndN!LI_+1)=A`>**1TaY5Mw>vOF`M)|M>rN?6nher<&z|<;uf23X z=%btlti`LswqctHH_?EF@9#Br#(lr=bG50@4}8Xn7*c(F>LN>13V z9Nt6LR1uho(MTEMRS?-OV2E+rqEnqa4NlS|Kt{Qcu@nlhLf0UD5fj@B)N6`3VHrH@ zo{@WtH|()b=)R3snFTm``o0`Hk0d%ChV4LESJfJ+F`d12EHj|))tNEhl(pRjrl4;W z+M>PcL*PSw&+nr{!e&6dAR-j^Lq}0&&Ld4yZaYCRcl_iv{>CJEGkpKrm z+pgEd?XFWAkxPo{@Y~kOn0K)oA$@FgvvudAd+8a_qQ5y@g`vpR~ z<=QVMn)kb*w3UQ&*~;YY!9~gC`R!G!0pW;-FRe$H0+?$iVdsk?2R;`TVqZe?_l#s5Z#FUpvTdUsi0xM6`}m~Y-#LW z&d0+l;$az)WAmkpFg>5?Ox%|*`RJh$^YeaY@Rw^^BU_lly-j7eFh&#BpMO7+F_o@P z$pn9xS%)rozG1b7t{L$wK3G3UZXz>3`h3Xe$sE>{-JBVOLw;RB?Sh|=*s#%>jPLZ& z4Xz|yNiRw!MO?oddUrAXe*W%JLowWB2SnO8oehRvU-6nw@!IuO`bN4@c{srCIHHHv zz2kt-dAdMjeyIO2^Su0e#0%B_uooLcz#krV>Zc5LXI%3=W9%Xm99|gBcA6%Q-+-A) z98c7>vb=4K{q4!}sXjI#1o7;+weRTVTEhD_dt}F~J7xU2Zjkf5l+gFApRvAl$yFW_ zKA28hD$>#Ngf|{9YTV-!;r)cg6n1QhzR&*E>c*t;a>b=qq`0&DR;1SSPy_c{8u6-# z<0KJt6XV@==+C(bcmp5Y(W=(?y}XLh-$y3HLC*y5Spf7S)C~LYdhW??P8SAa=k#RFx( zMfwlc`M{|HF&>5oqiu%1@=b8Wv>n(X`%n3_)Y53ZxBRDj*aztTpR2Mu5CWeMH7Aw> z;M5))VP=OrFj*;t%0f@4{dYsQ4bPU3ahi9>1UNhbvQD$JkUXKN*;e?|KyeyJhBu5x zmPYY6%NG}pt6dGJ_b{af?czCVV}oNrsR%4aMxzFzp<#i(a1ilCHmEmc9yU-%l}9)& zfR4`NMb=xI_0r%j%G!^rRFF+6!}*PkY=P>B4X-ha6aPclN*{X`-kTU$XM%|`RLmF0 zxAAW1-6u0#PGk9sc36tH-n^Wz3o@y^7t|+h9z3>5$>&pLx5nb%s#R!c3oy){yG^@J z*7F-8_Q)`NL~bpYpUWJf5i+6k&wVLlIy*2#&(9?!>pOzhR@;_5SO-_7qw5wj7HU5q zW_c%V7m=GCJiFYRX$rd-_+%@&tsgL1nvnVO8VYfs2I8NP{LH+>uYRfU`61+;apSVO z72DERx=aU&Gr2d?%Bqada(c8XelhOi8;IZG4!AMr-cItcZ5qNk$S0lr#% z+byp-QSnA(-MPBSS6TZwY!Ixk3N7TG+`Uz=*=7ig&*=M=;G*SvNH2{}EcLU;5b2zY zQg62l3$L7D0*bxA-r`4Kkol#g6LSAc=VD&@vxv)eNEJ@z1VWcMFZQG=?q^)pM4~Z$ zHa+du&{J&vgL7ZB1t~o)KdLY=oAwPm!fflhS51HDtW{5OR+Se{DR%T^46>};Sib3Q zD)aODH;voTjv=JTh|i`G&D4lYRhA$<2J10^l!0c{u)B2+PoHPU(_G+RVf(guvi31qdz6y z68GDd28z1uv&@9D03*q7Dp=CHOvg_%VmPpn0Hi$8rgUQy)1ApZbDd&aFEw@w`f@id z-^1GG#c2~Nh=O%$*s^yR2P$}7D08igvo3`WEZ95)r8mN!(olN5zbtPR{oEntbNftH zhCb0fj?{>1s%+1mhn}~W(XKI7?xzWkE?M$HiWa&1 z%=XoP=*GUR*-Nkg27K2=|lP_)bFDJdCg zsZBSO`mFKvAqN(5nKPd)s`j_(o0GfDYnf?eSlp`QcATQ&DRM!#P(c^#Zfowq?5e}F zs3HTSLu}IFF3)IzlQf0m!8kQoJ@;kt9#g1~-8h~f9hw}NhaIMK(amNsWg_6?N7skd zAb#Ls{9v&TF*P-ngn<;9lA}i0$NkiNwY{zMNdHdxsYM`sRkC6cxwtgSplZ-2wrAVf zn4RFKH|pn-P5#2RA4-vZb6s{5BMflM&rpTmH)dc^j%ZZWV=x>K)uSYZ`MZTM$BHDH zN@Dn2zG}H(fTYLGWnBp>^GwDn&R-CBr@LMoVu0zA>7I1aB6|H2gS~)qaw@J0UIJHst;fPZFCxhQr?nM8TBsVf{!&Rc-!Bjrww}w;Gid zIDp< zs_YZ97kbm&PT60SsErpGK7QP3KR@cw;>Nu1$8X%5qR&Hmi>czDfkRC0`y|{kuq?U@ ziRL=ASrXNhj6fv)KFXsTH@RyZZKk@7%Yq>|x?S6$P1xCSwumAH@iw@m{=LfyYwnyu{sks`i*+^AHxCR=kL$oFgQnAf6 z2hZo!qWxtb;Pma9V);EF`^oWRa+d*81_f^y5{WY(A|zRJ5hTMbQqHEOpnw8RGmcCj zUYl83Zk@iK?qdV|HzlX0Ir+SftitwLbQ_K4DuwE;r_+E=4XFTYlh|_QwNi;g9~pE~ z>lZHc_MaY2PfROp&*HsSQ>8-ahl4?H6mNxL373nQHi9g0^F^?)(XRBK|b z=kq9kt;5lxAM~U?rw?64o80}tu8)nTprQ?uMt?H_`|C%zBFTKLnh&qj;^8=~a%Xq* zm>X1B%(TpW!zDqcv|c}K6G#*~JeE{hw#S->Or&ppzv*Im+4`FszeS$O;bbdFEtmx; ze&Cj4UZ2&s;O>2WEFr2*2Mlv8i<_Aq!fhi3ka30;k+on)!?gYwKs#7Yfz|zmvto&M zX)%&#ZzAaAlq(q;F`Z|QLj~h2CNC??SFzYcRigyQ;vG++Gh{rcO~<{N0?ID+k@Ssh2pLnOHeL0Y|%C z_o)Wi9g#~SHSbwi3U)@4I@Mgh@yH&iuicARdrOf&J|ev#YM`a8T&5@kQYT8WUQ;Uy9hnEKUU0!8{$JLr_ z_+gEg>*+zD+5f?6Q=A$J^Q_3QXy;ufzr1IkMm=~bq-I68+Hw$h0lTSvwybbviwgx7 zGgBwkskf4>zFwQ&hSb*foq@asL3#8aFs9c}PnFfx)xW?d7+_#;VE@_5;NalY)9^`2 z`+qP=zab)$R~!)`rjkYKsU`1nVVbrWr}sT==!bqStYLh&Pf|4(moG`3O&PSa z`URy(!(UIIPUcTxuhk9!GTq6rjWWxBvu`+R&*3GefqyJ(GwcUy?WP-3OKr5mPWk(sT39j zP%oT8G6%@}lJFrYh5x2Sc;qfn)%60D4uP&>lqvoCXN=r~0GhWDSrvZUN?gx|d4*b#ek) zHAFK7!?OJw7g$LXpWQ3cao!m9n6uHci6ABqhvZG0HtHZFq0mtN7)jlV7-GJ9Qif%Y zUs7iO_#w5LOWKQS@BA95zdZo)~Z`m$wT4fr7Ca9*ULhz6`e&0PJcl*>Hv z9+wm$ge=#(nZ*6#(pgpx*k6-m=~OITZn0&KSql|9ft9viD=5<$_zy<|+pgGpWx~fx zjo;UD5}Y^L5#!17bG}CwBI8PlIk0b%lZbTyv5TX~`d;hxV@2Nr%U@o!6uqNrQGc*F zuj69{${Fg!1&A4)D>Fm|t8_Fk8@R^7#F2_91*x(4kuXgVD{7VF!N7z>#>7xj74jG- zs7i)M)Vd8C9I?J|i~Z^f`-cy4q_?0N6<*39sOYSW&(n4*t*LrN!Lugfnh!C9Tjwfz zo*Cu!by_2|BZUeshwq_4YUibl;`Dpy2!`xM^m}N)&r?y@QbiJ~@Usmc-hW_Aa~GbN z*uUO$^L|lmh?-DuFVz4?RqYfX4C;3_+HMQLWt3SzwBcrwNqNdC^DF2C5i9I>;)&;! z5+USA=2RmQ@z}^8?>XAg0CJO5w7cBc$Yuj`OD(ifkU$dGrMtI*c{y{$cT6?T-=0gS z^I!2BVB0?ZYbsWZw6<8#Jj5slwbN?!^|o+u2=6rjQGV!z(2CutVUe8(7Xa!zcHU5h*GMP#|21V0Cf;Yv z)^p-)TB9?;^o6P27k#9IFH`AC8Wn=IV{Gna67Hlb`O8`~ zBnIs!`)99Fo%%d$ZVBI!5^e{!hzK!4CI)WM!L_!nx^NP~4LD1+p zX4%lks+KR|)8N7F3zNo_SI0J7sh%zO4c8WE_B0kP#pK2T&|l|3Q|8oI6ma771Rz>m zDT>hI+5zbzCQaR3?{lK^cRUV?&DmK6Tt%|O3x%0omk|{X{XISvD(a+dWW^F#Ytl=Tzr8>a1lH6R}D)4lxGRYh3H9b7^~Gn zSVjc2W`3U?+csdXULMFOvh6R-+YQ?g}N<}Cmv=F|){ zs3HM4y=LE(GA&%Ku;kp`G48|q2}Ym+wuBLrRs-up)NEU541^d|TL;q(GWdD0qqz9L z6OytcG~eDKhN+af3+3fgRUggwZcL}{DcI^k?C97vrw(qi6r}rR%ar3#-MOxAh`}{? z4-GC%YMOaD`>GyN_HE|ae|zMPpUZK*Ki|nRnfrpfZJvpD}{w8D(aFiDMMPlSmdQAHx%wZA>(wwh-dS<`HWE`t-)Sm8o}+H zYh$VM2nM$!C~#fn4Y7=x0Bf9tkB8&BC#OO5weJ~&I*Af*!g;LqbS0hdJB8I=NE1JE;{Gc`P+uSnMF?Cbm&~=;;05o47t+ zRGthQ2}HhWzy_+bOUztQ1gjS2$(H(iAPp;gU4KlcuSeshLOxQ^w1K#B0%E*OnKPDR zCJb3}QeLk(2`fH5&~TVR3OaX#nSoYUEwXG5H)+#smd#dfl%aPMKX5XKuF8sdDB^9f zZU1yJm?W;pK zfO<-FFB?v-NAp3l0bw{1?vCpd$SCp|^a#|(s%};b?Su^nJb6-b*t+hdV%%D`?O&yH zjHXagE?wxIW~qPJ^^A{WCTu~0dMXaAr&?Jm(q{VAG6u(15c%AANF#=0^LUL=kqZ4o z24<>o6fSv=omw(Tlz#SDH002)yEY@m+KU!p*dy_XT|~l?2s+2K_r7T_?KZ2y(q_U- z-|R8s+_?5G)rhbLsUC31_2f?`fXW%OxwHk3gY*2^72x9pcIg_ zA}wi{HUo*^k&KliJM>FXXaquHQU)RdwNjJ(iUp`dQ{at^7@m*2-S*i6^N0o$Z9aCW zw6QzUW8E}I`Y6FQk&XFQ9p$7XlTs0qxh!o@i(QV4d}js3^SXu69L z?f0ndT5Mv2P#p$68_t`KUP#CQ6OQyrPxd{KPu4u}GnnLTz5#+(mi z*mxF2wJcRwS1VR}ylLMN&}D~5`YTbcdPBzW@N& zrJ>Xm;2ATR=@XmJA91rX32D>? z%_Kc)HCdxtPSs+2qt=|G?@g32=?gT`u?k{Y${~Xr4s=QbewuN9%Jlv^Q!Wkz^E}Cb zf)Ik;VGuuLN7=nb9zD74LmI6VKWotkF(i@nw;dQ)(y(D(`|pY@O>Zu5uiJ6bs^&5= zYB{HVu+sOKaT?dAKn3kw8(pD(Q?dhCEWgVX{u%k3`3V+=ofsVwltaS2TCHlW5qcC) zJu;ZS{F1kCqsl0v`y%4sA8{LT5o4!?tGH@aNOLA74gFx~J|Gv>l11u0tT^{W=)BQN zlj%SF;MW1;hJwOaIwoF`Lh!`mT{|`Acw~lx_bSRvOC6P$GreE)0B>}L=koL&`QjK1 zBhecfht#umzJ6XTIq)4D8&6VB3@-wcBu|U`&EBc)Qvi4mqii;+BuY%_t(4exv!kta zTEo8RbSQz|J)zxNYgmCGBG1w{%u3N;ePDjs?@P8d%s`ojlKx1|o3v z91&{wyI@ zgOfh0v*G6h%p@G$>bLgD*@r!=TV&74bwajLhs#k@k)LA&sC1Bx1igg9A>??Hm|2)_ zOt{XY$%my3%*72$%J~bo+|z{4UQn}BKxL*y+MH1{Gvk)2e#-cwq!a{O)_=20bjXAv zez|^yMAT>}GaP>I8C^HuX^&IH8FhAfxfO8Dqwsf%mz?Tg1yweRIeWNsH3?hrF7una zFHGe10XETZkC+d20o~7 zk7(t!(&M+4qFkjD#+-x`PGG32t_H8!DZtyhp*`Xg(d*5N)^i(_AX-$5B;@#|pgx1( zygAKhJIx{)PrYUmC4fGbMKp4V%6ZD@yd9pa0WYMC-5iE7oXyf!xcNTUpsrC;YOW_C z{b!~A5`U(~nFxBN=-)9|S11+?B-zOB!mb(|IuG%Ym6OZ;kly%RCPJ;q*yRHCg5Qx5 zr{lc$f#CcW1_>UH$ZGSHHEw#J>K$#6dxb7G4tDTCBcv=BT37J#sJ`y^f{^6kOs>XR z%Xu0cjF5MKU>=T@!P|`rZ>y+MBuaV2g>rxB*{!?+0zEJ$eJc@WC6u56(j{i^xJmCZ zb6#;X!Id|z)G4Z7m}v1P6O`pMtYARNk+_vrROU?Dt4_r0s73mHwYl9ea+4m^L55$LL%-N)uizROR5y6*ay5^95p`5t+I`4eh(x^7yY-Qc*jPW; z6^3j z&O^g&JysL2oe6u8>s9DRWh|so>^XCUVnw;$?MNRo0$wQt^Bxu4l%mE0d(y{)LIyvU zEPd8-igZ2BtMxhrAA#Y^hR#HMGUM%jv;N8MZME%Qif_adxoRhH;gg1fXU!y8I^MVz^k7Fz6?=+s=!Jh|auLKcF%y3msh zN*qn+7#LZrP~+!#3qKFpNmiUiWuVei0D`8ErErXGAv$;4Hq@9SnY zJE27tj+FAYa3ZVTB9I9T4awoQz*~f1G|h!A9rhRjOl!2UOLg3^0dM>FdcC5 zKk3)^TUMdu;mAQ&}^8E!}z)T`*k zi`n&rVP25QcZ-_5In*fB3&&;v49pWd!4)LCgcL^b>d1q5Y^|%emcShb%En^QG#H4# z0$^=f$ zqi@atKLrOPqhfSJuKlu!kQ)O+mXwT*vBAa^f>enVWza=SYAuPXR>cQlgC8g+Hg+v( z4v#1sPlaS_baUOGcU*0z2{Pv*hx1>QgPH&FTVWG|dm};bX38S6v5#&{jxgxJO^8)< z(M!j9#no6YqI?bcR1?(IOVRXB-V=whR%D3o5u{axbj*xtqNupZd{}{n-t>&lSlF7$ z^FKrdPkzFxzPNmge+U&-gU2gF?;wL5g;JdH9rFo!zj;H9WjDQbo`va(CQW_Q&dgbR zse-0)@XJOuJchsiI|f+X1J2 z_tgn_)Z7k9j3@J-8)WP{@#!B{mv&t@oHHL?w$5$lVfw5WTVeGD8fiIy$b%QH-H(I= zQS(pzK1Pvc&ME2W5VSSk_EXCb9(UCNROibzp6qC& zP*AG{R_KA$9M|bnl~UBW@vtC=Uj5G?XB%2^OG#`-0_N`nv$Q`-sfD;xk9-9XB(@8O z463A6JOK^))Q-X1o0?bgw#a+2i=2E0y#N(v1gpqCAAI%X0eT# zxHwVOj=dO*UMi}{sF-(xf*C3EdHT=2ax*om+A(7feQ zF0iFVY@}qcad8!MvXP5cf~L27%TSnK!~oWlX*xZ$Q&XJ266RVV#cBc=Wt+78{E^}j z-6p~1SFV73kp%3G&~PauRlR}&i=6!!0@f+jbq6(3j{W7@gtkAyy%#-7+FZzRg=(9I zpx6dSbA}R$5}g6ah@IdZ6REpclYVS`r#mY%V~oCAZ_#SWj59IQIf}Z7%4)V6qX8%F z4GErve*$R|%cqoLb|unf`9>nyWQ=o9=Mf5DZeSEv&R+HW6B63lY^T*M!2cJdrVH32 z$NH#abS_lP46@-Q8j=<6-`}GrnvJBYk+Y@BJ5)KkdV`B6*NonHvZ|os3ac}S;PkUt z#;UVXgSPIij6dU&yIqk)`Y*}3Qiw#UVBkr6E3Q}%^$;T-^+p~O=tjsm~|+eh$gx%4Kc%QjSufaMJ?GM24*?;t=`~; z8E85QDuJ#y>ytlu-|#WWS@Qewz&A~3B2_{`^1G0^o}QJZ$-_lR63JY#+wSrKjek_ zUSK1BusY_<9Zo_jo~lDi$~0{`a3G`@TCNvp=(`0w0+pd5+3oe04icfHs6wuX)$KdF zy(@3^_@s;@MNTfRA3uIjP*2|`XC=r_rK*t#xqr?dRQ{BuAGm7PqX()I?CANp)0mW& zCZDhpREo^Z6A%moTdgy~7k$a+_Jrhfb40_^L=ZizVI0GlxeAq*9y6ov94&uVN<^C! z7MLUYWT(*{N2Nr<-#w`|=Iw=PwJVOZ?E4p4-F5? z>|OIkqtZKh*$Q_vR`k5DOaYXtd@hDgHo@YA1T=D`S;4{K!`r>bv(;J^kdm-#RAv2F z*>z`rM?Ss17+U7SpF;3orgYegmO}b99@2=q58dDEZFXDLxiDuEFYLpR5A%*7U zSP@}FkTx+^>)5Bnd@*cu29p{z;j~SML83sLhCH>gITJ`xd+>M(K_nnR5y7y}xu^p! zLbuO`W5XTj=*7*9XZtNj5?T<9&sr5ex)ZTr#_WgR5YJ!Y% z54iB4>vhLg_7uCj1$miLe3){Nl90=gUy58Shs#i7j=F4ZUs@S7{&I>HG zHjmv@D9Yp7n|zHAr@E_S6>RL>y0j!Sct8R%&7odavAv3@v34ig|8?>a0H3L32rTbj z+wj44^>S$GlnH$eT{XI!UZMzPn_$-O{f3Ca!VWGc8>!;0SUk*KrzrQ~P6rtgtZb)b? z^sVNz3ND(MSWx@j0qVRRPlnR&Hf!2HqZ0c~dcaLCkFXv_D!8PSl$3j}z;cblZPxUE z0KP8RNvpd4y@|Y&dk;$bt5yVQq5pr;YO{mZ7&{j#zq{vcPcDOkOlRAsdkI}lX5*>71i_ZQ^kMzaBIb|d z+3e<5j#*k)UfW(>&)*CE=-4DmUi4Yz0
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - -
Code -
0xC1900101 - 0x20004 -
- - -
Cause -
Windows Setup encountered an error during the SAFE_OS with the INSTALL_RECOVERY_ENVIRONMENT operation. -
This is generally caused by out-of-date drivers. -
-
- - -
Mitigation -
Uninstall antivirus applications. -
Remove all unused SATA devices. -
Remove all unused devices and drivers. -
Update drivers and BIOS. -
-
- - -
Code -
0xC1900101 - 0x2000c -
- - -
Cause -
Windows Setup encountered an unspecified error during Wim apply in the WinPE phase. -
This is generally caused by out-of-date drivers. -
-
- - -
Mitigation -
Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display. -
Contact your hardware vendor to obtain updated device drivers. -
Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. -
-
- - -
Code -
0xC1900101 - 0x20017 - -
- - -
Cause -
A driver has caused an illegal operation. -
Windows was not able to migrate the driver, resulting in a rollback of the operating system. -
This is a SafeOS boot failure, typically caused by drivers or non-Microsoft disk encryption software. -
-
- - -
Mitigation -
-Ensure that all that drivers are updated. -
Open the Setuperr.log and Setupact.log files in the %windir%\Panther directory, and then locate the problem drivers. -
For more information, see Windows Vista, Windows 7, Windows Server 2008 R2, Windows 8.1, and Windows 10 setup log file locations. -
Update or uninstall the problem drivers. -
-
- - -
Code -
0xC1900101 - 0x30018 -
- - -
Cause -
A device driver has stopped responding to setup.exe during the upgrade process. -
-
- - -
Mitigation -
-Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display. -
Contact your hardware vendor to obtain updated device drivers. -
Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. -
-
- - -
Code -
0xC1900101 - 0x3000D -
- - -
Cause -
Installation failed during the FIRST_BOOT phase while attempting the MIGRATE_DATA operation. -
This can occur due to a problem with a display driver. - -
-
- - -
Mitigation -
-Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display. -
Update or uninstall the display driver. -
-
- - -
Code -
0xC1900101 - 0x4000D -
- - -
Cause -
A rollback occurred due to a driver configuration issue. -
Installation failed during the second boot phase while attempting the MIGRATE_DATA operation. -
This can occur because of incompatible drivers. - -
-
- - -
Mitigation -
-Check supplemental rollback logs for a setupmem.dmp file, or event logs for any unexpected reboots or errors. -
Review the rollback log and determine the stop code. -
The rollback log is located in the $Windows.~BT\Sources\Rollback folder. An example analysis is shown below. This example is not representative of all cases: -
-Info SP     Crash 0x0000007E detected
-Info SP       Module name           :
-Info SP       Bugcheck parameter 1  : 0xFFFFFFFFC0000005
-Info SP       Bugcheck parameter 2  : 0xFFFFF8015BC0036A
-Info SP       Bugcheck parameter 3  : 0xFFFFD000E5D23728
-Info SP       Bugcheck parameter 4  : 0xFFFFD000E5D22F40
-Info SP     Cannot recover the system.
-Info SP     Rollback: Showing splash window with restoring text: Restoring your previous version of Windows.
- -Typically, there is a dump file for the crash to analyze. If you are not equipped to debug the dump, then attempt the following basic troubleshooting procedures:
- -1. Make sure you have enough disk space.
-2. If a driver is identified in the bug check message, disable the driver or check with the manufacturer for driver updates.
-3. Try changing video adapters.
-4. Check with your hardware vendor for any BIOS updates.
-5. Disable BIOS memory options such as caching or shadowing. - -
-
- - -
Code -
0xC1900101 - 0x40017 -
- - -
Cause -
Windows 10 upgrade failed after the second reboot. -
This is usually caused by a faulty driver. For example: antivirus filter drivers or encryption drivers. -
-
- - -
-Mitigation -
- -Clean boot into Windows, and then attempt the upgrade to Windows 10. For more information, see [How to perform a clean boot in Windows](https://support.microsoft.com/kb/929135). - -Ensure that you select the option to "Download and install updates (recommended)." - -Computers that run Citrix VDA -You may see this message after you upgrade a computer from Windows 10, version 1511 to Windows 10, version 1607. After the second system restart, the system generates this error and then rolls back to the previous version. This problem has also been observed in upgrades to Windows 8.1 and Windows 8. - -This problem occurs because the computer has Citrix Virtual Delivery Agent (VDA) installed. Citrix VDA installs device drivers and a file system filter driver (CtxMcsWbc). This Citrix filter driver prevents the upgrade from writing changes to the disk, so the upgrade cannot complete and the system rolls back. - -**Resolution** - -To resolve this problem, install [Cumulative update for Windows 10 Version 1607 and Windows Server 2016: November 8, 2016](https://support.microsoft.com/help/3200970/cumulative-update-for-windows-10-version-1607-and-windows-server-2016). - -You can work around this problem in two ways - -**Workaround 1** - -1. Use the VDA setup application (VDAWorkstationSetup_7.11) to uninstall Citrix VDA. -1. Run the Windows upgrade again. -1. Reinstall Citrix VDA. - -**Workaround 2** - -If you cannot uninstall Citrix VDA, follow these steps to work around this problem: - -1. In Registry Editor, go to the following subkey: - ``` - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\CtxMcsWbc - ``` -1. Change the value of the **Start** entry from **0** to **4**. This change disables the Citrix MCS cache service. -1. Go to the following subkey: - ``` - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318} - ``` -1. Delete the **CtxMcsWbc** entry. -1. Restart the computer, and then try the upgrade again. - -> **Third-party information disclaimer** -> The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. - -
-
- ## 0x800xxxxx Result codes that start with the digits 0x800 are also important to understand. These error codes indicate general operating system errors, and are not unique to the Windows upgrade process. Examples include timeouts, devices not functioning, and a process stopping unexpectedly. From 78f0b528ceec47c4c198ba52f7425ef3d03f14f7 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 14:03:19 -0700 Subject: [PATCH 139/228] convert table --- .../upgrade/resolution-procedures.md | 229 +----------------- 1 file changed, 10 insertions(+), 219 deletions(-) diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 262b3f6c46..64ac6ae16f 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -47,8 +47,7 @@ See the following general troubleshooting procedures associated with a result co | 0xC1900101 - 0x30018 | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
Contact your hardware vendor to obtain updated device drivers.
Ensure that "Download and install updates (recommended)" is accepted at the start of the upgrade process. | A device driver has stopped responding to setup.exe during the upgrade process. | | 0xC1900101 - 0x3000D | Disconnect all peripheral devices that are connected to the system, except for the mouse, keyboard and display.
Update or uninstall the display driver. | Installation failed during the FIRST_BOOT phase while attempting the MIGRATE_DATA operation.
This can occur due to a problem with a display driver. | | 0xC1900101 - 0x4000D | Check supplemental rollback logs for a setupmem.dmp file, or event logs for any unexpected reboots or errors.
Review the rollback log and determine the stop code.
The rollback log is located in the $Windows.~BT\Sources\Rollback folder. An example analysis is shown below. This example is not representative of all cases:
 
Info SP Crash 0x0000007E detected
Info SP Module name :
Info SP Bugcheck parameter 1 : 0xFFFFFFFFC0000005
Info SP Bugcheck parameter 2 : 0xFFFFF8015BC0036A
Info SP Bugcheck parameter 3 : 0xFFFFD000E5D23728
Info SP Bugcheck parameter 4 : 0xFFFFD000E5D22F40
Info SP Cannot recover the system.
Info SP Rollback: Showing splash window with restoring text: Restoring your previous version of Windows.
 
Typically, there is a dump file for the crash to analyze. If you are not equipped to debug the dump, then attempt the following basic troubleshooting procedures:
 
1. Make sure you have enough disk space.
2. If a driver is identified in the bug check message, disable the driver or check with the manufacturer for driver updates.
3. Try changing video adapters.
4. Check with your hardware vendor for any BIOS updates.
5. Disable BIOS memory options such as caching or shadowing. | A rollback occurred due to a driver configuration issue.
Installation failed during the second boot phase while attempting the MIGRATE_DATA operation.
This can occur because of incompatible drivers. | -| 0xC1900101 - 0x40017 | Clean boot into Windows, and then attempt the upgrade to Windows 10. For more information, see [How to perform a clean boot in Windows](https://support.microsoft.com/kb/929135).
 
Ensure that you select the option to "Download and install updates (recommended)."
 
Computers that run Citrix VDA
You may see this message after you upgrade a computer from Windows 10, version 1511 to Windows 10, version 1607. After the second system restart, the system generates this error and then rolls back to the previous version. This problem has also been observed in upgrades to Windows 8.1 and Windows 8.
 
This problem occurs because the computer has Citrix Virtual Delivery Agent (VDA) installed. Citrix VDA installs device drivers and a file system filter driver (CtxMcsWbc). This Citrix filter driver prevents the upgrade from writing changes to the disk, so the upgrade cannot complete and the system rolls back.
 
**Resolution**
 
To resolve this problem, install [Cumulative update for Windows 10 Version 1607 and Windows Server 2016: November 8, 2016](https://support.microsoft.com/help/3200970/cumulative-update-for-windows-10-version-1607-and-windows-server-2016).
 
You can work around this problem in two ways:
 
**Workaround 1**
 
1. Use the VDA setup application (VDAWorkstationSetup_7.11) to uninstall Citrix VDA.
2. Run the Windows upgrade again.
3. Reinstall Citrix VDA.
 
**Workaround 2**
 
If you cannot uninstall Citrix VDA, follow these steps to work around this problem:
 
1. In Registry Editor, go to the following subkey:
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\CtxMcsWbc"
2. Change the value of the **Start** entry from **0** to **4**. This change disables the Citrix MCS cache service.
3. Go to the following subkey:
"HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}"
4. Delete the **CtxMcsWbc** entry.
5. Restart the computer, and then try the upgrade again.
 
**Third-party information disclaimer**
The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. | Windows 10 upgrade failed after the second reboot.
This is usually caused by a faulty driver. For example: antivirus filter drivers or encryption drivers. | - +| 0xC1900101 - 0x40017 | Clean boot into Windows, and then attempt the upgrade to Windows 10. For more information, see [How to perform a clean boot in Windows](https://support.microsoft.com/kb/929135).
 
Ensure that you select the option to "Download and install updates (recommended)."
 
Computers that run Citrix VDA
You may see this message after you upgrade a computer from Windows 10, version 1511 to Windows 10, version 1607. After the second system restart, the system generates this error and then rolls back to the previous version. This problem has also been observed in upgrades to Windows 8.1 and Windows 8.
 
This problem occurs because the computer has Citrix Virtual Delivery Agent (VDA) installed. Citrix VDA installs device drivers and a file system filter driver (CtxMcsWbc). This Citrix filter driver prevents the upgrade from writing changes to the disk, so the upgrade cannot complete and the system rolls back.
 
**Resolution**
 
To resolve this problem, install [Cumulative update for Windows 10 Version 1607 and Windows Server 2016: November 8, 2016](https://support.microsoft.com/help/3200970/cumulative-update-for-windows-10-version-1607-and-windows-server-2016).
 
You can work around this problem in two ways:
 
**Workaround 1**
 
1. Use the VDA setup application (VDAWorkstationSetup_7.11) to uninstall Citrix VDA.
2. Run the Windows upgrade again.
3. Reinstall Citrix VDA.
 
**Workaround 2**
 
If you cannot uninstall Citrix VDA, follow these steps to work around this problem:
 
1. In Registry Editor, go to the following subkey:
**HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\CtxMcsWbc**
2. Change the value of the **Start** entry from **0** to **4**. This change disables the Citrix MCS cache service.
3. Go to the following subkey:
**HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}**
4. Delete the **CtxMcsWbc** entry.
5. Restart the computer, and then try the upgrade again.
 
**Non-Microsoft information disclaimer**
The non-Microsoft products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products. | Windows 10 upgrade failed after the second reboot.
This is usually caused by a faulty driver. For example: antivirus filter drivers or encryption drivers. | ## 0x800xxxxx @@ -56,223 +55,15 @@ Result codes that start with the digits 0x800 are also important to understand. See the following general troubleshooting procedures associated with a result code of 0x800xxxxx: -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - -
Code -
-80040005 - 0x20007 - -
- - -
Cause -
-An unspecified error occurred with a driver during the SafeOS phase. - -
-
- - -
Mitigation -
- -This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. - -
-
- - -
Code -
-0x80073BC3 - 0x20009
-0x80070002 - 0x20009
-0x80073B92 - 0x20009 - -
- - -
Cause -
-The requested system device cannot be found, there is a sharing violation, or there are multiple devices matching the identification criteria. - -
-
- - -
Mitigation -
- -These errors occur during partition analysis and validation, and can be caused by the presence of multiple system partitions. For example, if you installed a new system drive but left the previous system drive connected, this can cause a conflict. To resolve the errors, disconnect or temporarily disable drives that contain the unused system partition. You can reconnect the drive after the upgrade has completed. Alternatively, you can delete the unused system partition. - -
-
- - -
Code -
-800704B8 - 0x3001A - -
- - -
Cause -
-An extended error has occurred during the first boot phase. - -
-
- - -
Mitigation -
- -Disable or uninstall non-Microsoft antivirus applications, disconnect all unnecessary devices, and perform a [clean boot](https://support.microsoft.com/kb/929135). - -
-
- - -
Code -
-8007042B - 0x4000D - -
- - -
Cause -
-The installation failed during the second boot phase while attempting the MIGRATE_DATA operation. -
This issue can occur due to file system, application, or driver issues. - -
-
- - -
Mitigation -
- -[Analyze log files](log-files.md#analyze-log-files) in order to determine the file, application, or driver that is not able to be migrated. Disconnect, update, remove, or replace the device or object. - -
-
- - -
Code -
-8007001F - 0x3000D - -
- - -
Cause -
-The installation failed in the FIRST_BOOT phase with an error during MIGRATE_DATA operation. - -
-
- - -
Mitigation -
- -[Analyze log files](log-files.md#analyze-log-files) in order to determine the files or registry entries that are blocking data migration. - -This error can be due to a problem with user profiles. It can occur due to corrupt registry entries under **HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList** or invalid files in the **\\Users** directory. - -> [!NOTE] -> If a previous upgrade did not complete, invalid profiles might exist in the **Windows.old\\Users** directory. - -To repair this error, ensure that deleted accounts are not still present in the Windows registry and that files under the \\Users directory are valid. Delete the invalid files or user profiles that are causing this error. The specific files and profiles that are causing the error will be recorded in the Windows setup log files. - -
-
- - -
Code -
-8007001F - 0x4000D - -
- - -
Cause -
-General failure, a device attached to the system is not functioning. - -
-
- - -
Mitigation -
- -[Analyze log files](log-files.md#analyze-log-files) in order to determine the device that is not functioning properly. Disconnect, update, or replace the device. - -
-
- - -
Code -
-8007042B - 0x4001E - -
- - -
Cause -
-The installation failed during the second boot phase while attempting the PRE_OOBE operation. - -
-
- - -
Mitigation -
- -This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. - -
-
- +| Code | Mitigation | Cause | +| :--- | :--- | :--- | +| 80040005 - 0x20007 | This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. | An unspecified error occurred with a driver during the SafeOS phase. | +| 0x80073BC3 - 0x20009
0x80070002 - 0x20009
0x80073B92 - 0x20009 | These errors occur during partition analysis and validation, and can be caused by the presence of multiple system partitions. For example, if you installed a new system drive but left the previous system drive connected, this can cause a conflict. To resolve the errors, disconnect or temporarily disable drives that contain the unused system partition. You can reconnect the drive after the upgrade has completed. Alternatively, you can delete the unused system partition. | The requested system device cannot be found, there is a sharing violation, or there are multiple devices matching the identification criteria. | +| 800704B8 - 0x3001A | Disable or uninstall non-Microsoft antivirus applications, disconnect all unnecessary devices, and perform a [clean boot](https://support.microsoft.com/kb/929135). | An extended error has occurred during the first boot phase. | +| 8007042B - 0x4000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the file, application, or driver that is not able to be migrated. Disconnect, update, remove, or replace the device or object. | The installation failed during the second boot phase while attempting the MIGRATE_DATA operation.
This issue can occur due to file system, application, or driver issues. | +| 8007001F - 0x3000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the files or registry entries that are blocking data migration.
 
This error can be due to a problem with user profiles. It can occur due to corrupt registry entries under **HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList** or invalid files in the **\\Users** directory.
 
**Note**: If a previous upgrade did not complete, invalid profiles might exist in the **Windows.old\\Users** directory.
 
To repair this error, ensure that deleted accounts are not still present in the Windows registry and that files under the \\Users directory are valid. Delete the invalid files or user profiles that are causing this error. The specific files and profiles that are causing the error will be recorded in the Windows setup log files.| The installation failed in the FIRST_BOOT phase with an error during MIGRATE_DATA operation. | +| 8007001F - 0x4000D | [Analyze log files](log-files.md#analyze-log-files) in order to determine the device that is not functioning properly. Disconnect, update, or replace the device. | General failure, a device attached to the system is not functioning. | +| 8007042B - 0x4001E | This error has more than one possible cause. Attempt [quick fixes](quick-fixes.md), and if not successful, [analyze log files](log-files.md#analyze-log-files) in order to determine the problem and solution. | The installation failed during the second boot phase while attempting the PRE_OOBE operation. | ## Other result codes From 9abbb019f9379adde731de2229d308dcf0e0cb57 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 14:22:17 -0700 Subject: [PATCH 140/228] added some links --- windows/deployment/upgrade/resolution-procedures.md | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 64ac6ae16f..10d8359b4e 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -24,9 +24,11 @@ ms.topic: article > This is a 200 level topic (moderate). > See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article. +This topic provides some common causes and solutions that are associated with specific upgrade error codes. If a Windows 10 upgrade fails, you can copy the error code, or find the error code in the Windows [Event Log](windows-error-reporting.md) or in the Windows Setup [log files](log-files.md) (ex: **setuperr.log**) and review the cause and solutions provided here. You should also try running the free [SetupDiag](setupdiag.md) tool provided by Microsoft, which can automatically find the reason for an upgrade failure. + ## 0xC1900101 -A frequently observed result code is 0xC1900101. This result code can be thrown at any stage of the upgrade process, with the exception of the downlevel phase. 0xC1900101 is a generic rollback code, and usually indicates that an incompatible driver is present. The incompatible driver can cause blue screens, system hangs, and unexpected reboots. Analysis of supplemental log files is often helpful, such as: +A frequently observed [result code](upgrade-error-codes.md#result-codes) is 0xC1900101. This result code can be thrown at any stage of the upgrade process, with the exception of the downlevel phase. 0xC1900101 is a generic rollback code, and usually indicates that an incompatible driver is present. The incompatible driver can cause blue screens, system hangs, and unexpected reboots. Analysis of supplemental log files is often helpful, such as: - The minidump file: $Windows.~bt\Sources\Rollback\setupmem.dmp, - Event logs: $Windows.~bt\Sources\Rollback\*.evtx From e6db972163cfb5d137e194ef6ebfed4a0a304ffa Mon Sep 17 00:00:00 2001 From: 1justingilmore Date: Mon, 8 Jun 2020 15:49:54 -0600 Subject: [PATCH 141/228] Edit pass for work item 4001116 Windows Defenter articles DO NOT MERGE Light copy edits. --- .../antivirus-false-positives-negatives.md | 18 +++++------ ...exclusions-microsoft-defender-antivirus.md | 22 ++++++------- ...ecurity-settings-with-tamper-protection.md | 31 +++++++++---------- 3 files changed, 35 insertions(+), 36 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md index 243ea0e80a..80b05cf051 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md @@ -25,17 +25,17 @@ ms.topic: article - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -Microsoft Defender Antivirus is designed to keep your PC safe with built-in, trusted antivirus protection. With Microsoft Defender Antivirus, you get comprehensive, ongoing, and real-time protection against software threats like viruses, malware and spyware across email, apps, the cloud, and the web. +Microsoft Defender Antivirus is designed to keep your PC safe with built-in, trusted antivirus protection. With Microsoft Defender Antivirus, you get comprehensive, ongoing, and real-time protection against software threats like viruses, malware, and spyware across email, apps, the cloud, and the web. -But what if something gets detected wrongly as malware, or something is missed? We call these false positives and false negatives. Fortunately, there are some steps you can take to deal with these things. You can: -- [Submit a file to Microsoft for analysis](#submit-a-file-to-microsoft-for-analysis); -- [Create an "Allow" indicator to prevent a false positive from recurring](#create-an-allow-indicator-to-prevent-a-false-positive-from-recurring); or -- [Define an exclusion on an individual Windows device to prevent an item from being scanned](#define-an-exclusion-on-an-individual-windows-device-to-prevent-an-item-from-being-scanned) by Microsoft Defender Antivirus. +What if something gets detected wrongly as malware, or something is missed? We call these false positives and false negatives. Fortunately, there are some steps you can take to deal with these issues. You can: +- [Submit a file to Microsoft for analysis](#submit-a-file-to-microsoft-for-analysis) +- [Create an "Allow" indicator to prevent a false positive from recurring](#create-an-allow-indicator-to-prevent-a-false-positive-from-recurring) +- [Define an exclusion on an individual Windows device to prevent an item from being scanned](#define-an-exclusion-on-an-individual-windows-device-to-prevent-an-item-from-being-scanned) ## Submit a file to Microsoft for analysis 1. Review the [submission guidelines](../intelligence/submission-guide.md). -2. [Submit your file or sample](https://www.microsoft.com/wdsi/filesubmission). +2. [Submit your file or sample](https://www.microsoft.com/wdsi/filesubmission). > [!TIP] > We recommend signing in at the submission portal so you can track the results of your submissions. @@ -48,7 +48,7 @@ To set up your "Allow" indicator, follow the guidance in [Manage indicators](htt ## Define an exclusion on an individual Windows device to prevent an item from being scanned -When you define an exclusion for Microsoft Defender Antivirus, you configure your antivirus to skip that item. +When you define an exclusion for Microsoft Defender Antivirus, you configure your antivirus to skip that item. 1. On your Windows 10 device, open the Windows Security app. 2. Select **Virus & threat protection** > **Virus & threat protection settings**. @@ -64,8 +64,8 @@ The following table summarizes exclusion types, how they're defined, and what ha |**File type** |File extension
Example: `.test` |All files with the specified extension anywhere on your device are skipped by Microsoft Defender Antivirus. | |**Process** |Executable file path
Example: `c:\test\process.exe` |The specified process and any files that are opened by that process are skipped by Microsoft Defender Antivirus. | -To learn more, see: -- [Configure and validate exclusions based on file extension and folder location](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus) +To learn more, see: +- [Configure and validate exclusions based on file extension and folder location](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus) - [Configure exclusions for files opened by processes](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-process-opened-file-exclusions-microsoft-defender-antivirus) ## Related articles diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md index db259755b0..e7fbc46e41 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-extension-file-exclusions-microsoft-defender-antivirus.md @@ -43,11 +43,11 @@ A specific process | The executable file `c:\test\process.exe` | File and folder Exclusion lists have the following characteristics: -- Folder exclusions will apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. -- File extensions will apply to any file name with the defined extension if a path or folder is not defined. +- Folder exclusions apply to all files and folders under that folder, unless the subfolder is a reparse point. Reparse point subfolders must be excluded separately. +- File extensions apply to any file name with the defined extension if a path or folder is not defined. >[!IMPORTANT] ->The use of wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. +>Using wildcards such as the asterisk (\*) will alter how the exclusion rules are interpreted. See the [Use wildcards in the file name and folder path or extension exclusion lists](#use-wildcards-in-the-file-name-and-folder-path-or-extension-exclusion-lists) section for important information about how wildcards work. > >You cannot exclude mapped network drives. You must specify the actual network path. > @@ -62,7 +62,7 @@ The exclusions apply to [scheduled scans](scheduled-catch-up-scans-microsoft-def > >Changes made in the Windows Security app **will not show** in the Group Policy lists. -By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists will take precedence when there are conflicts. +By default, local changes made to the lists (by users with administrator privileges, including changes made with PowerShell and WMI) will be merged with the lists as defined (and deployed) by Group Policy, Configuration Manager, or Intune. The Group Policy lists take precedence when there are conflicts. You can [configure how locally and globally defined exclusions lists are merged](configure-local-policy-overrides-microsoft-defender-antivirus.md#merge-lists) to allow local changes to override managed deployment settings. @@ -91,10 +91,10 @@ See [How to create and deploy antimalware policies: Exclusion settings](https:// 4. Double-click the **Path Exclusions** setting and add the exclusions. - - Set the option to **Enabled**. + - Set the option to **Enabled**. - Under the **Options** section, click **Show...**. - - Specify each folder on its own line under the **Value name** column. - - If you are specifying a file, ensure you enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column. + - Specify each folder on its own line under the **Value name** column. + - If you are specifying a file, ensure you enter a fully qualified path to the file, including the drive letter, folder path, filename, and extension. Enter **0** in the **Value** column. 5. Click **OK**. @@ -178,14 +178,14 @@ You can use the asterisk `*`, question mark `?`, or environment variables (such > >- Environment variable usage is limited to machine variables and those applicable to processes running as an NT AUTHORITY\SYSTEM account. >- You cannot use a wildcard in place of a drive letter. ->- An asterisk `*` in a folder exclusion will stand in place for a single folder. Use multiple instances of `\*\` to indicate multiple nested folders with unspecified names. +>- An asterisk `*` in a folder exclusion stands in place for a single folder. Use multiple instances of `\*\` to indicate multiple nested folders with unspecified names. The following table describes how the wildcards can be used and provides some examples. |Wildcard |Examples | |---------|---------| -|`*` (asterisk)

In **file name and file extension inclusions**, the asterisk replaces any number of characters, and only applies to files in the last folder defined in the argument.

In **folder exclusions**, the asterisk replaces a single folder. Use multiple `*` with folder slashes `\` to indicate multiple, nested folders. After matching the number of wild carded and named folders, all subfolders are also included. | `C:\MyData\*.txt` would include `C:\MyData\notes.txt`

`C:\somepath\*\Data` would include any file in `C:\somepath\Archives\Data and its subfolders` and `C:\somepath\Authorized\Data and its subfolders`

`C:\Serv\*\*\Backup` would include any file in `C:\Serv\Primary\Denied\Backup and its subfolders` and `C:\Serv\Secondary\Allowed\Backup and its subfolders` | +|`*` (asterisk)

In **file name and file extension inclusions**, the asterisk replaces any number of characters, and only applies to files in the last folder defined in the argument.

In **folder exclusions**, the asterisk replaces a single folder. Use multiple `*` with folder slashes `\` to indicate multiple nested folders. After matching the number of wild carded and named folders, all subfolders are also included. | `C:\MyData\*.txt` would include `C:\MyData\notes.txt`

`C:\somepath\*\Data` would include any file in `C:\somepath\Archives\Data and its subfolders` and `C:\somepath\Authorized\Data and its subfolders`

`C:\Serv\*\*\Backup` would include any file in `C:\Serv\Primary\Denied\Backup and its subfolders` and `C:\Serv\Secondary\Allowed\Backup and its subfolders` | |`?` (question mark)

In **file name and file extension inclusions**, the question mark replaces a single character, and only applies to files in the last folder defined in the argument.

In **folder exclusions**, the question mark replaces a single character in a folder name. After matching the number of wild carded and named folders, all subfolders are also included. |`C:\MyData\my` would include `C:\MyData\my1.zip`

`C:\somepath\?\Data` would include any file in `C:\somepath\P\Data` and its subfolders

`C:\somepath\test0?\Data` would include any file in `C:\somepath\test01\Data` and its subfolders | |Environment variables

The defined variable is populated as a path when the exclusion is evaluated. |`%ALLUSERSPROFILE%\CustomLogFiles` would include `C:\ProgramData\CustomLogFiles\Folder1\file1.txt` | @@ -215,7 +215,7 @@ You can retrieve the items in the exclusion list using one of the following meth If you use PowerShell, you can retrieve the list in two ways: -- Retrieve the status of all Microsoft Defender Antivirus preferences. Each of the lists will be displayed on separate lines, but the items within each list will be combined into the same line. +- Retrieve the status of all Microsoft Defender Antivirus preferences. Each of the lists are displayed on separate lines, but the items within each list are combined into the same line. - Write the status of all preferences to a variable, and use that variable to only call the specific list you are interested in. Each use of `Add-MpPreference` is written to a new line. ### Validate the exclusion list by using MpCmdRun @@ -271,7 +271,7 @@ In the following PowerShell snippet, replace *test.txt* with a file that conform Invoke-WebRequest "http://www.eicar.org/download/eicar.com.txt" -OutFile "test.txt" ``` -If Microsoft Defender Antivirus reports malware, then the rule is not working. If there is no report of malware, and the downloaded file exists, then the exclusion is working. You can open the file to confirm the contents are the same as what is described on the [EICAR test file website](http://www.eicar.org/86-0-Intended-use.html). +If Microsoft Defender Antivirus reports malware, then the rule is not working. If there is no report of malware and the downloaded file exists, then the exclusion is working. You can open the file to confirm the contents are the same as what is described on the [EICAR test file website](http://www.eicar.org/86-0-Intended-use.html). You can also use the following PowerShell code, which calls the .NET WebClient class to download the test file - as with the `Invoke-WebRequest` cmdlet; replace *c:\test.txt* with a file that conforms to the rule you are validating: diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 06fb8a10f3..971482d70d 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -25,9 +25,9 @@ ms.custom: nextgen ## Overview -During some kinds of cyber attacks, bad actors try to disable security features, such as anti-virus protection, on your machines. They do this to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection helps prevent this from occurring. +During some kinds of cyber attacks, bad actors try to disable security features, such as anti-virus protection, on your machines. They do this to get easier access to your data, to install malware, or to otherwise exploit your data, identity, and devices. Tamper protection helps prevent this from occurring. -With tamper protection, malicious apps are prevented from taking actions like these: +With tamper protection, malicious apps are prevented from taking actions such as: - Disabling virus and threat protection - Disabling real-time protection - Turning off behavior monitoring @@ -37,11 +37,10 @@ With tamper protection, malicious apps are prevented from taking actions like th ### How it works - Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods like these: + Tamper protection essentially locks Microsoft Defender Antivirus and prevents your security settings from being changed through apps and methods such as: - Configuring settings in Registry Editor on your Windows machine - Changing settings through PowerShell cmdlets - Editing or removing security settings through group policies -- and so on. Tamper protection doesn't prevent you from viewing your security settings. And, tamper protection doesn't affect how third-party antivirus apps register with the Windows Security app. If your organization is using Windows 10 Enterprise E5, individual users can't change the tamper protection setting; this is managed by your security team. @@ -80,22 +79,22 @@ Here's what you see in the Windows Security app: ## Turn tamper protection on (or off) for your organization using Intune -If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the Microsoft 365 Device Management portal ([https://aka.ms/intuneportal](https://aka.ms/intuneportal)). +If you are part of your organization's security team, and your subscription includes [Intune](https://docs.microsoft.com/intune/fundamentals/what-is-intune), you can turn tamper protection on (or off) for your organization in the Microsoft 365 Device Management portal ([https://aka.ms/intuneportal](https://aka.ms/intuneportal)). > [!NOTE] -> The ability to manage tamper protection in Intune is rolling out now; if you don't have it yet, you should very soon, assuming your organization has [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) (Microsoft Defender ATP) and that you meet the prerequisites listed below. +> The ability to manage tamper protection in Intune is rolling out now; if you don't have it yet, you should very soon, assuming your organization has [Microsoft Defender Advanced Threat Protection](../microsoft-defender-atp/whats-new-in-microsoft-defender-atp.md) (Microsoft Defender ATP) and that you meet the prerequisites listed below. -You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations, to perform the following task. +You must have appropriate [permissions](../microsoft-defender-atp/assign-portal-access.md), such as global admin, security admin, or security operations, to perform the following task. 1. Make sure your organization meets all of the following requirements to manage tamper protection using Intune: - - Your organization must have [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (this is included in [Microsoft 365 E5](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview)). + - Your organization must have [Microsoft Defender ATP E5](https://www.microsoft.com/microsoft-365/windows/microsoft-defender-atp) (this is included in [Microsoft 365 E5](https://docs.microsoft.com/microsoft-365/enterprise/microsoft-365-overview)). - Your organization uses [Intune to manage devices](https://docs.microsoft.com/intune/fundamentals/what-is-device-management). ([Intune licenses](https://docs.microsoft.com/intune/fundamentals/licenses) are required; this is included in Microsoft 365 E5.) - Your Windows machines must be running Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019) or later. (See [Windows 10 release information](https://docs.microsoft.com/windows/release-information/) for more details about releases.) - You must be using Windows security with [security intelligence](https://www.microsoft.com/wdsi/definitions) updated to version 1.287.60.0 (or above). - Your machines must be using anti-malware platform version 4.18.1906.3 (or above) and anti-malware engine version 1.1.15500.X (or above). ([Manage Microsoft Defender Antivirus updates and apply baselines](manage-updates-baselines-microsoft-defender-antivirus.md).) -2. Go to the Microsoft 365 Device Management portal ([https://devicemanagement.microsoft.com](https://devicemanagement.microsoft.com)) and sign in with your work or school account. +2. Go to the Microsoft 365 Device Management portal ([https://devicemanagement.microsoft.com](https://devicemanagement.microsoft.com)) and sign in with your work or school account. 3. Select **Device configuration** > **Profiles**. @@ -113,9 +112,9 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal- 5. Assign the profile to one or more groups. -Here's what you see in the Windows Security app: + Here's what you see in the Windows Security app: -![Turning tamper protection on in Windows 10 Enterprise](images/turnontamperprotect-enterprise.png) + ![Turning tamper protection on in Windows 10 Enterprise](images/turnontamperprotect-enterprise.png) ### Are you using Windows OS 1709, 1803, or 1809? @@ -131,17 +130,17 @@ If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release ## View information about tampering attempts -Tampering attempts typically indicate bigger cyberattacks. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats. +Tampering attempts typically indicate bigger cyberattacks. Bad actors try to change security settings as a way to persist and stay undetected. If you're part of your organization's security team, you can view information about such attempts, and then take appropriate actions to mitigate threats. -When a tampering attempt is detected, an alert is raised in the [Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/portal-overview) ([https://securitycenter.windows.com](https://securitycenter.windows.com)). +When a tampering attempt is detected, an alert is raised in the [Microsoft Defender Security Center](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/portal-overview) ([https://securitycenter.windows.com](https://securitycenter.windows.com)). ![Microsoft Defender Security Center](images/tamperattemptalert.png) -Using [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) and [advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) capabilities in Microsoft Defender ATP, your security operations team can investigate and address such attempts. +Using [endpoint detection and response](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/overview-endpoint-detection-response) and [advanced hunting](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/advanced-hunting-overview) capabilities in Microsoft Defender ATP, your security operations team can investigate and address such attempts. ## Review your security recommendations -Tamper protection integrates with [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) capabilities. [Security recommendations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) include making sure tamper protection is turned on. For example, you can search on *tamper*, as shown in the following image: +Tamper protection integrates with [Threat & Vulnerability Management](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/next-gen-threat-and-vuln-mgt) capabilities. [Security recommendations](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation) include making sure tamper protection is turned on. For example, you can search on *tamper*, as shown in the following image: ![Tamper protection results in security recommendations](../images/securityrecs-tamperprotect.jpg) @@ -216,7 +215,7 @@ In this case, tamper protection status changes, and this feature is no longer ap ### Will there be an alert about tamper protection status changing in the Microsoft Defender Security Center? -Yes. The alert is shown in [https://securitycenter.microsoft.com](https://securitycenter.microsoft.com) under **Alerts**. +Yes. The alert is shown in [https://securitycenter.microsoft.com](https://securitycenter.microsoft.com) under **Alerts**. In addition, your security operations team can use hunting queries, such as the following: From ce6e4bc0deeadf0d5eb13bee90be17bab6a72d0e Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Mon, 8 Jun 2020 15:10:18 -0700 Subject: [PATCH 142/228] Added SKU support table --- .../client-management/mdm/bitlocker-csp.md | 23 +++++++++++++++++++ ...ew-in-windows-mdm-enrollment-management.md | 3 ++- 2 files changed, 25 insertions(+), 1 deletion(-) diff --git a/windows/client-management/mdm/bitlocker-csp.md b/windows/client-management/mdm/bitlocker-csp.md index 8611ab72a1..3a1ecfb0f9 100644 --- a/windows/client-management/mdm/bitlocker-csp.md +++ b/windows/client-management/mdm/bitlocker-csp.md @@ -930,12 +930,35 @@ The following list shows the supported values: Allows Admin to enforce "RequireDeviceEncryption" policy for scenarios where policy is pushed while current logged on user is non-admin/standard user Azure AD account. + > [!NOTE] > This policy is only supported in Azure AD accounts. "AllowStandardUserEncryption" policy is tied to "AllowWarningForOtherDiskEncryption" policy being set to "0", i.e, silent encryption is enforced. If "AllowWarningForOtherDiskEncryption" is not set, or is set to "1", "RequireDeviceEncryption" policy will not try to encrypt drive(s) if a standard user is the current logged on user in the system. + + + + + + + + + + + + + + + + + + + + +
HomeProBusinessEnterpriseEducationMobileMobile Enterprise
cross markcheck markcheck markcheck markcheck markcross markcross mark
+ The expected values for this policy are: diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index b2ca393530..58d58b3935 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -1984,7 +1984,8 @@ How do I turn if off? | The service can be stopped from the "Services" console o ### June 2020 |New or updated topic | Description| |--- | ---| -|[Policy CSP - NetworkIsolation](policy-csp-networkisolation.md)|Updated the description to Integer instead of Boolean for the following policy settings:
EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative| +|[BitLocker CSP](bitlocker-csp.md)|Added SKU support table for **AllowStandardUserEncryption**.| +|[Policy CSP - NetworkIsolation](policy-csp-networkisolation.md)|Updated the description from Boolean to Integer for the following policy settings:
EnterpriseIPRangesAreAuthoritative, EnterpriseProxyServersAreAuthoritative.| ### May 2020 |New or updated topic | Description| From 73442c7b73c73c00e46c5413175d5eb3f43b04ca Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Mon, 8 Jun 2020 15:38:39 -0700 Subject: [PATCH 143/228] wording change --- windows/deployment/upgrade/resolution-procedures.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/upgrade/resolution-procedures.md b/windows/deployment/upgrade/resolution-procedures.md index 10d8359b4e..a96205d6fd 100644 --- a/windows/deployment/upgrade/resolution-procedures.md +++ b/windows/deployment/upgrade/resolution-procedures.md @@ -24,7 +24,7 @@ ms.topic: article > This is a 200 level topic (moderate). > See [Resolve Windows 10 upgrade errors](resolve-windows-10-upgrade-errors.md) for a full list of topics in this article. -This topic provides some common causes and solutions that are associated with specific upgrade error codes. If a Windows 10 upgrade fails, you can copy the error code, or find the error code in the Windows [Event Log](windows-error-reporting.md) or in the Windows Setup [log files](log-files.md) (ex: **setuperr.log**) and review the cause and solutions provided here. You should also try running the free [SetupDiag](setupdiag.md) tool provided by Microsoft, which can automatically find the reason for an upgrade failure. +This topic provides some common causes and solutions that are associated with specific upgrade error codes. If a Windows 10 upgrade fails, you can write down the error code that is displayed, or find the error code in the Windows [Event Log](windows-error-reporting.md) or in the Windows Setup [log files](log-files.md) (ex: **setuperr.log**) and review the cause and solutions provided here. You should also try running the free [SetupDiag](setupdiag.md) tool provided by Microsoft, which can automatically find the reason for an upgrade failure. ## 0xC1900101 From 50a7a7e809bb65ed69b90cb8df808a04abc6a52b Mon Sep 17 00:00:00 2001 From: v-miegge <49650192+v-miegge@users.noreply.github.com> Date: Mon, 8 Jun 2020 15:44:03 -0700 Subject: [PATCH 144/228] Made corrections --- .../surface/secure-surface-dock-ports-semm.md | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/devices/surface/secure-surface-dock-ports-semm.md b/devices/surface/secure-surface-dock-ports-semm.md index c744d232df..6ee0fdf411 100644 --- a/devices/surface/secure-surface-dock-ports-semm.md +++ b/devices/surface/secure-surface-dock-ports-semm.md @@ -69,23 +69,29 @@ Prior to creating the configuration package, you need to prepare public key cert The required EKU values are listed in Table 1 and Table 2. -#### Table 1. Root and Host Certificate requirements +#### Table 1. Root and Dock Certificate requirements |Certificate|Algorithm|Description|Expiration|EKU OID| |---|---|---|---|---| -|Dock Certificate Authority|ECDSA_P384|- Root certificate with 384-bit prime elliptic curve digital signature algorithm (ECDSA)
- SHA 256 Key Usage:
CERT_DIGITAL_SIGNATURE_KEY_USAGE
- CERT_KEY_CERT_SIGN_KEY_USAGE
CERT_CRL_SIGN_KEY_USAGE|30 years|N/A -|Host Authentication Certificate|ECC P256 curve|- Host certificate with 256-bit elliptic-curve cryptography (ECC)
- SHA 256 Key Usage:
CERT_KEY_CERT_SIGN_KEY_USAGE
- Path Length Constraint = 0|20 years|1.3.6.1.4.1.311.76.9.21.2
1.3.6.1.4.1.311.76.9.21.3 +|Root Certificate Authority|ECDSA_P384|- Root certificate with 384-bit prime elliptic curve digital signature algorithm (ECDSA)
- SHA 256 Key Usage:
CERT_DIGITAL_SIGNATURE_KEY_USAGE
- CERT_KEY_CERT_SIGN_KEY_USAGE
CERT_CRL_SIGN_KEY_USAGE|30 years|N/A +|Dock Certificate Authority|ECC P256 curve|- Host certificate with 256-bit elliptic-curve cryptography (ECC)
- SHA 256 Key Usage:
CERT_KEY_CERT_SIGN_KEY_USAGE
- Path Length Constraint = 0|20 years|1.3.6.1.4.1.311.76.9.21.2
1.3.6.1.4.1.311.76.9.21.3| + + >[!NOTE] + >The dock CA must be exported as a .p7b file. ### Provisioning Administration Certificate requirements -Each host device must have three provisioning certificates. +Each host device must have the doc CA and two certificates as shown in Table 2. #### Table 2. Provisioning administration certificate requirements |Certificate|Algorithm|Description|EKU OID| |---|---|---|---| -|Host authentication|ECC P256
SHA 256|Proves the identity of the host device.|1.3.6.1.4.1.311.76.9.21.2| -|Update CA provisioning|ECC P256
SHA256|Enables you to change dock ownership and/or policy settings by allowing you to replace the CA that's currently installed on the dock.|1.3.6.1.4.1.311.76.9.21.3
1.3.6.1.4.1.311.76.9.21.4 +|Host authentication certificate|ECC P256
SHA 256|Proves the identity of the host device.|1.3.6.1.4.1.311.76.9.21.2| +|Provisioning administration certificate|ECC P256
SHA256|Enables you to change dock ownership and/or policy settings by allowing you to replace the CA that's currently installed on the dock.|1.3.6.1.4.1.311.76.9.21.3
1.3.6.1.4.1.311.76.9.21.4| + + >[!NOTE] + >The host authentication and provisioning certificates must be exported as.pfx files. ### Create configuration package From b902efb189754ae90c1524a979eadb07e4e6c74b Mon Sep 17 00:00:00 2001 From: Aacer Daken <41165107+AaDake@users.noreply.github.com> Date: Mon, 8 Jun 2020 15:45:29 -0700 Subject: [PATCH 145/228] Update policy-csp-dmaguard.md Added link to DMA Remapping guidance --- windows/client-management/mdm/policy-csp-dmaguard.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-dmaguard.md b/windows/client-management/mdm/policy-csp-dmaguard.md index d553a30d50..c1e5dd8c30 100644 --- a/windows/client-management/mdm/policy-csp-dmaguard.md +++ b/windows/client-management/mdm/policy-csp-dmaguard.md @@ -73,7 +73,7 @@ manager: dansimp -This policy is intended to provide additional security against external DMA capable devices. It allows for more control over the enumeration of external DMA capable devices incompatible with DMA Remapping/device memory isolation and sandboxing. +This policy is intended to provide additional security against external DMA capable devices. It allows for more control over the enumeration of external DMA capable devices incompatible with [DMA Remapping](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers)/device memory isolation and sandboxing. Device memory sandboxing allows the OS to leverage the I/O Memory Management Unit (IOMMU) of a device to block unallowed I/O, or memory access, by the peripheral. In other words, the OS assigns a certain memory range to the peripheral. If the peripheral attempts to read/write to memory outside of the assigned range, the OS blocks it. From 47de690cd11a5da27be4b9be2d0be0c2e02a1dbc Mon Sep 17 00:00:00 2001 From: v-miegge <49650192+v-miegge@users.noreply.github.com> Date: Mon, 8 Jun 2020 16:13:49 -0700 Subject: [PATCH 146/228] Updated images --- .../secure-surface-dock-ports-semm-5.png | Bin 21239 -> 43779 bytes .../secure-surface-dock-ports-semm-6.png | Bin 48622 -> 73947 bytes 2 files changed, 0 insertions(+), 0 deletions(-) diff --git a/devices/surface/images/secure-surface-dock-ports-semm-5.png b/devices/surface/images/secure-surface-dock-ports-semm-5.png index b517ac8f94caed5aab62621525c4472e478423fb..0d4c7df937e1992dea1e7b9c5cc32fb6ee04255d 100644 GIT binary patch literal 43779 zcmbrm2RzpO|2BM58fX$KD`l0ftc(Vw%qT07osyjuk+LE(3X#%M5uwN?Wn{IG5JD>1 zgsl7coUY&R^}nCzKkny#dcCgea^*a~<1^mx<9!^*`xBzAd2ki|CVC2mvg(kkvJQo^ z1V7W{tXPJ>>Bw**|5@p%YUo0tFffsSXec)m*(emcZrh^lp=}z2t`61{&Jj z`yHIExTQqIge}CxB)FwzMZ~3cN=k_daZ89vh>40xh>A-Ji;2sLNy|w{aR2j%2X}L} zw3gFRKJd@I@P7(Cr(9hf54KTDC8vnk> zfBGzE&;I)sF0LwWc#VGsh zmJ<_O{HTV5rLDE+fA-N`Vshg6=70DomW-vDtJ(kfVM_}+YX|4EW_V%Svt~9{qK@`9 zJly{tM!EeCb`H+CF`iEHKmPrp{rk0@9jtBb@Cz56gZsD-sqB{$mz9zdmJkuAKCXs_ z+#!1xS2KGHt3%2PJQy4iTU$#xYgt(_2}@ZEVKa+e*2317J1vFHWW}t6EoH5&%%#Mo z#VyRG{`Gxj2a9uL3H7<@C=_cDCHqN_PDe&;_@kJ+7lGY{fa}%dyje~{%&{oU~Zh59GT3qlPaRn{N%9Z(b%*1 z=7k5rcUP$?du%ruB`cDmt(1nKRtzMDOypE%>o}1CN4=j#qLgQ zTPdiSDXYa)+_l4aiMSic@QoC7}nd0d<`T80T&2%=F z-QQo&-8b4Vo~VDY*4gTr$smPXJe?)bl>36yZZVGIYrfZTXbi>`cDh~e9A$XjGh#gG z*t7kv@?LywTW+C!;h(k7f{X`MM{Dgo$}IES%&Ly{Y_ASbA(!dV(YedbL;lDL99g># zeBueg(jl5 zwzfM@e+u4vX<1}qqIye~RZD@p=#u5DUpF)i-F>!@l1G2woPLc#ZPG<_Ze}CJrrl&QZ9_vp3&Tg3cm6~zt!~K=lcj#9%G(^07DdT_X(#lnH4tPxCEk1g>C@XOU0q#MGc(;2UZI^i)DfD^HNIT#jyQ$J_E;Lc+tphwvxevHkdPcBGQ)`PtSR zO7l~fhKGk=6^l~W?}BZf{Sh(7B|+sE-rW%o#*HB*B}x}BUL^B(D4Oqms=lb^ZN)lle?h%8wsZYWR)5ET zmbTmoD=ppgs=PcTIQZnJM@QrrX2*WFWG~NcJyDgrpE^a{YlP_o%}%~B@>$cja^*_( zII)Z378Pr8@5a+_x*REMH*Gqss=9(RVtKjPv(^FGUo}-#or48K57px($cX#-QA|9# z=stY>ct}Izf#=xw(w4oSSV9BF$6X~PB|ZQCOv!8=SV~7{mfiB{CUvLlEOovm@Vc_{ zW44VJ=lS2_d>S{E_w1ppQJmsdnjK!!nse6T&+nGP`M>>fb=I67oisdKw_eN^UhyWB zb+VC(jZO8j&I7E0G=oh4`MH^~FK052q-b(%*Gmho?Cz?Q?y&576+m7C`xpZ^)p=U?m?qeE1ud5|5PB zjS~fKnNHmYetmje{;M%{x+{o_?7`Mt2b-oe!=o7{90l$59li^7SRT{;86}U7+*^j# zO_l|o_f*qXYJA~2`9wEG^A%>Z{H#Y*bq={`3mA*=&lwo7 zVYX#%X;Sd`E7z=PmZPUGNEPnp5Pvc%!L#mUSjgk7n;sJ5=S?xs6fj+k&T2rgsIBM?-$VU5U1n3_KcU?~Jie5YepgX-lkOIB8=dEAY!%0@ zZ=-m~C)IFJ?^m^}?pM95xx@($g=<*moDo47fvyR!#;nCfqny^+d-{xy7~|GfUux#K z?--wvvyJ2!W#ubh8{hY-QhyW?7SZVN4C1en4cbLrf_DkV5jYe`|mCpY#ht1uG1NSP%_^Lqp5WGmW36Ra?I59$Cx96=B8}z;cN?FP5?WEOe=j zZ@bEas%vXs+lds4zca~TRZ>#gw{IUJN`PJl^>aO@=}dGP&1%}(+L3g37ss^cZL(nm zbwsxX;Tf@5!q{b_j@#!2OifMgW4Pln@=eI-c`$a_`i&b6Pfc7QS5lqtecXQ})BKIV z@f^EkO$#H$VeH<<#f|SwS3Qw-P=8YEB0qa~TDkbK3Uw-b-bVH- zmsv_gMn+yl@UxWIU_?Q9$}||BoYdcOk=&$e1CN$4eOXzVfzXY8K6e^^Y4*6vG3=tD z4rt^ohJGz8Yvq$;sYu6%l9y+?{?swbu{(71=+We6;XZ4r1lupq1vhLzT56v8%%XC2 z)6?VbdF4?INW!kaKS$oV!%b3(v2k1P>O*+{bhA9p+TX5nh~cZO-o|WEP$+swyJE$P z&f%_dA>)^8gUX%Cvh-_CejgroeD&%TuHqrjDIp=Ds;>U}r>n`}JHKp64WF?(>E{j| zUvtma-Q3mYJyzG;_R1Zx208DfRD#QFJt7_Xj+$Ec_|K2}<3r4Tb=KXlLzt8g9QcsD zfBEb}--|onGhul+Z?ULhjFr3|NxU+0_ z{G(Q^VE)3`8&*^DyBz!Ww^JkCE9vRK;RXgzn|P+DO*9{<#ahq&8Cbe>X<}~J$DfuH zzZz?k6cRcv%v@DC|Ht^%iZQ;_^CkxlR9J6s%pl zFV91sKi>%?^2jiokA{XO?L@(iimRJVn`8hz>M*_}Gw3}vVpsH@%Bs-)giu{I*j@mr zmS$3PlSI(jS+RI^01AS304RFSQ=}O$O?LR+&h5C6@afa18g?HyL`lFoteR7piBJ~d z{I)H~YE`?0nuY0|FANoqttJmtU0uz{Cgz8|iD1{$$_21f8O{M5Rupz5sWH#RhH?Se z;f&%TzwArHXQeh%=KfAtbXQ!JeS7q=PQZbyn??Y7J`{Som|U2)`tsbi{Auo2qetz( zsqfGCJ(M+);ju}PoM`bB4+RgX)Lj|TaAO+<@GZ)rcseiwf!z6WoCdZ4B{(9Yq&Cu6 z&hV)gOK5N6%;Z38<^4m^r{3SC(~=)qO1Zje*SA)Ok|IlSvUiMaV+5GrA$^6_SzBOI z^i}lN=C=Ce?SFaKXQEMm{8uA`pM87&`)r$r8um!C4SJK6ldoA?S{iRy)7AVX?SM*G zC6{kc5Z46?fisE@YOk-?+UNGMX%nas#p)F$a3>~)nUY>I@AdZjj@Z6#oBG6Rz|1U- zV_qV74}Nj+NVkD6R;?GXTA4UF>b|`Rr4i6iXU8r1L`1?reL9K(*?;mRH_3mWGcAhK zcdd~hrYv8>xs8u65O~$GL1A+0*K-4*oep0US2FQEv#MdyOqAKHuFi;fVAffB5%|?~ zJpb_Z?QfQId6(W0J}z@%Rwgqu^LKkeEU?3SKv5S?i`>?Y5|%5D=i2ikp#ri#Gb>+~ zL}i;7=z7x(bbgn;D|bF$sC6cd$vHcG}Dr=D;ODTKaK#bNHUg-ae5DzG2Fld z-!fwhd|%)`WY>xXsaY<@Xn{{0XwN@)6$yHCpc&iGpFi>M3MMUiv(I)?TO}nwI_4P% ze*C!;S4q@NiM)C9H0l?8@!t8#!D6{sAwzS^5fAwaK!K}MQyv|7lbnrju58%tkalVL znm^YkyowH}tA{zwPC0etxea|iE5jacSLyoWU75_eUok^3fBg7i*Jq3eJ91Y!M1H~h zZLFw+N0AA+fmwN=r<_!O-(OTO-#_a=IJ}{wL8Sizr@Y5I_k~sEVt~k5?aeMefvY)g z4w&4Mae9TCK}wzz2_`TTU$!ebV>tN;P*e8TUko?C5vGwKwXwG*w&eGM!;gCrihs$! z^d}Dr)6?}h=Xng~^;K0>-MKLLmxPRh!TcS~l{OkRo|zL2Sw>PT!Pimn>Pyz_1my1@<~EQ0m*O(qF4y z1u)pQWbpzR$L!D#H-B@*sr#yQ)|qAz;PW>q4xH*`f>v#=C>SaxARi;h$HU{V^Wg9i z)Ia|I{vK0ZLDSegS?50HBX`FuoR>mYA&D=FSIxQoT=S7M1Mw$%Pv82}F`RmLhX!l2 zcEU%P5mA@s&b|QpmK^;IlUoR@I;ncXh>xUtaT@MvMO zWMR5~BNvy$(RAZ!{|RrrDOreswDoyP0s>X1K0SKx8R5{JPL{CK-*MZmJ9qAEEnd#) zQ7Xn*j@mW<6uTi8=EtHTNr8M*S4-hsy#)4#LALc(@}1@r?!7@2^w_&W;jaU$QI6HE!QF&GFGvn25ob*D*0!#0VKm=#M03sF>Bp ziIY13-CylbFBr_4o$vqGYHI$9)f8Zfm`)1!$gKyXA|v;roHclHdIPo?KM&8hsMlil zZ8Cp`I(*9{43`);NWa^~%Ny|GOmouY6vpJ1&&;27C~AIwc#u7C9`y+go7l-xmF}t! zsG-Q*n)=SYA;V%=A;!q39!DwlnQV_u^$AjkUDqV1&cj1h8!}iqBiYF7I&-sb~Zx?HIPBPKJpB9;Rad8im*H9X|To`obb2Y*2&+=$RtN z{rK`?NAKI~B;0&@dR+RT>9lXSxvpoLe{iQ6c8te0SGB61gK#V-a1|_BlU#%H0#n{tN zuQ>OZ5an>J$W@fk18y^e$C@Y;g;l?tKNX#KrxefqIljsm zbwVUhvU1mYkKwZAEg((+Nbi7wD2@;6T;QA)`82Rhq+Vrr^j>G zv$Dnxl)W^}wvG`#F4gK}c<8W60Ua0(ir3^|9atN0hmnRir(YnXd@Ha~`I*ydzg0jW z7@;o9rBActPg)OOZoiymdjztHX;gIMxf<*2URe=rY{v58xx@ouY-Jd|IB5ryq<#R- zb$M%f>0?U)6UYw3LspIW#WyY}q$a{e^*833Cne%N`fj-!JUdB4N^gApKC%o-Z;6Hp;J@I+h-H$d zJZ=SZiLKd2^z#b(3rg3845L6Ov8WidSgsNxckqn93}|;GRqrW#Yxc4apm2)%PE=2I zwAo9$e6Ou`8{AQb7kGT4KE?PJ9j4sane>bZI7HdH#yjzH<;f) z%6wd}Mi|NJE}adElzrTf139-@H;2EsE)P5ixj1 z@zXc;xsKd5;%{|U>UiX8%himGJp}4yR&pYi5?1V6cX#&ncYEwN;TKtpDpETaVi#-kri)w_xUOcIPLD#!la z0A5M=j9#2>^Xh+^c04y6F*fsTs}z_~5||N6P-Z$$4VwY0NA~rf%QFTv1$f(v^o7L@ z<{eb_W5Ai5i!Inf-`*eOs%tv-qk}Aj43i=t2`)C^b)UcEW{ppdVYM->U;j!tx9!{J z^5JixqNCjrO5Yz@fW^iXT^H1SINavaFjBQO;u#)zJrmPP6w`nEGg5#H!!}EYW0!X) zHcx2b<;e7NDtJ9R^`1x0eXtfgC@JMU3F%Q9sOI+_JsRV*%lq&RAzNlqlQvY4u|9|T z)2Of=jQ++mO=;qVCK)3RsHP;bK5YPv8Jfnx2W~q`wt#ig`zBJdfAtBp0U)R$m<2*%X=(c z7fw?^=xziK46J_m%n0_)W`swJaEmm()Db`ew)gMf%ZAJP{Cz%Bzk7%c6o=>h^wCG! zWnl9fj`S(196Y$$)Mw)Qdu$2$#`Z@?wpx6zjqgiCh>GtktoQZB;xSWClzBhwAus#O zpx8UlX>Ou<=Is|dsctZRc;bcpuQOW8Ml>3{L&m!fYHC(|W(VLln~$ zixeBE9JLP{_(f5GuUNB&Uq*(lpgkOfBJdK@0~iVCV+XO-j~qGjdB6?JMO<9GScGJA zfWsKduq{Fna7fp?Kb7#pbLFu^_)ljpI;sX;$FK-KE$eShjdb1OO0i-yetLqPoEAwbqg% zv7rEmOeA%h#H;f?Ir`Wi&x68M-lo>A;1>Oc?Q1t~Jml>yfBw(!>dAA2SMW{vH+^_1 zo=P}w`)?@0|9{M4vg&%e+}5kj{cpf`sZ3yjgCc#M7GN0v#(ayc?8b=7OJ-~`?5h!` zO)_%Dw6;<|p_2B_h#4>EZbA7;^m3C4nx5XLniD?2m8`A}4MJ2d^M9 z8s-L@OdjDBRL%OeYwy^rQoo{qk(QU1_>`hexbLjNFb|Xg2cYd0m_i)S| zRDkTe-NHccLnahwy!7s!HlJ2fSnI&|Sknt+#UssbNNv3G#$53C8H9WU{e4jxECFF* zjD&AnnBNWD@xY;@Sm=087)r*jzP=!6Fi^y>?C=S2T@SpcN5_XcZsQ)-wQ+kvrzTxG z7P?4pKZwlmRMX&N0&hul10Y1~nq_;yrszIYN6KDBM7P|pUZEI8Olop+GGU8Rxw41L zPr4E$wk}dlz%;}k_dImy5K`PVaCBIs9fTQodD5*C?=?mII>%QZw~ErD?lwuH+-Fy zdfy$o7atzn6|atw?ufgHMFdbLV3@TH5e)Kzsm`_d_{SS=Qa4HZdb-2RS@|1|flWjC zeFSj*w_AaO>8Vo!$U1cOZVF#e7txe&SbU-6Jt6+B1AGv?ND^DkA-9&DUESQA2N;`O z#?cR`JIlHEFd~`YiTs@yD8aOsi{$@`cxo*3zAEy^tB84r9+_7R8?@7ynAZ@AN5;ms zZr@H1UCoRQge+l(T)s2votYnHf&hyUr>JO>x|^#1FelT#5Ws4}-Fr6s0-Qj-!qpJ{ zK4)1m4EwH`+PilzR;jI6Ht;6s=k!twW)SH0Co&s2md+@ZD9SIhg z<*{}$Ev63Z59^!)gt!drXveTD^eeCz4g^KT%Q%@|>}MjQUA^j@!gjyfT6MBmo6@!* z+5`2YOd(YRo1Civs3qZHS#0T-lV8sZ8fIB;Q5GT_JZkqZucOEq(L?<}@yLR&fog3( zKifjK7KQ9Bd=mq-j*F||w(tBQ9i6D5myaF^+}vsV3PcHEg;A@0$7V)}z~+}=pC3Zt zibIDYB(WuXK#4>7Scw2av@`3vO>Op*yoJu>k@NHfj|k8r>rn8H6fXp45W=B#)>{Py zLx5ue9)5m$%tS4BvAWc6?hGL$>_JY?rLi?{0#|K*gzAto(3;x^#NUfxW`lbbPJIgn zUAG)GTUt}LQU!~!(KGDZ8pk)}U7epEX}-6wbHXdzrvs>z(v)GUg|+*SFiFxL;s(hd zU}?V=dIC7nLTy-HS~U3;i0lO5($2GAV!pgMvqa4Ghc>dTXvwSuD6zgvYZN8RC`sww5L{jgWp4LMFhr5KR?}ZEVGq`#JXxwMdL^Y^)=q7ilwgl0*-tKE*JO&Eu zx016RF;5Kd-n)l_dNlxZS@+2BCtWR& zvn%z|jjLf@ko6emR=Xi&29Skn;K>gWJ#w>oT_FUaOO(pq)!U@8su1UH+;Gd=Pg6SJ zMyPt+wjO1B{qeyDr3E5@zkc(^sk4*@X{ZdmOwXB>6jhK+kbs1sAGYqZqY#e;O7l+e z_(aD;wLykAoL%-6NwX06J-Px|@g2deGbC0=F0kkVbJIG`>wnW<`>znHSlPL#V+zXu zT9owuI~&jc9ezrqlf~v|g0NZBn?DtjriW++s7ojNfEsI!X_0V1RTJvgw(X@j^v#IM z=zC#r%**;GvY`DTP6pLkmjhY#JSR&E$cjEj;QqshA2Ljp2rUe17d4aYTSzJIo|)|@ z%6*z)_A>(^=!^b|)ZtgYVsLRi9k4M}IVftDJynr?>J%))jKWcR1+Vea{)s2M7WK>R z+IPxokz(1FA&yfn2L;XKb9)we|k9JG4Xh-AKD!disR~ zXiMNMr~$A0C%(DL2|{}Tk|KKv5O~>Y_9`T34Wx6kL=)-?q&F;PqJwb(RJKSg17uwa z*4uH-BM7mKt$BfE7Vm^d4n}UYfy?Q>;`ao+n@jFhz^qcZiKd0fT2j z(qs4}FxUYAZO4Lk#!Wkef%I>WeFhER-h6Cv1Es4^Q%C*L(Z}l%d2A4Cz$vhTxdT2| z`RYBUfxMyt-3M|Y#32-=D^{=OgZs(XcfrnrmHPBOZ=*BHYLV$locol1A^~Z;d&EOk zRkaf&9b4c;Ks1qjU^0=kW>;I1cmf9$lmm!C({e#Zi_W+!ddWpi(u_;61}rUm z=(xUJ^7r>%GfRC(XRGZ|^GbcEH5NS^sX-697E$E?+h6yeY|PZ8kYLrMV^5BT>>etN z1`hi+G^BO-Fged9(2Li~{0dMas(bPBa8-Jvx`P!}0i7R!sI z-`K5|SZ7O#39-jN$@BY0z$(wqi^~ZoM!a}JC-P$;auS1-wY7DQ1$I>#2CE#*$14RC zNwTk4)ftl#1n2~voP+IL&gXVlvcyAQR?4%nP32i#cq zx+2QPh$IQb)yB!k$9>c^tCv}2vc~w1(i6bs-Pi;cmEjK%dtG7L)T&ej;{*68ZvHx$ z=ZYpC?Lz<)UGz#9FP^|R;o0VD5*cUws-r^$B{!&_4qLl!T67A!BDU-Mdj~<(WesGv z4p0!Q?OGG0&b~z~sD*d}-206;6nl!kf$sJnje1Mtb=QN3W>>9rkLdnX)Zvm}r_ETh zM?L+y+J<|0rUOWYcie}*l4=)dO_zwF#j-Bn9Y1PFli}{j0sWPEx^X)|*pIJ8GrcPe zap{Y^0s^Pjc2;Fp4xb$LlKJSymcGe-UxlsMOqWPAv+iHP-$Ah!pJ_#GpYcVnEEiK% z(~ZKM3Z8Ar3P2Lz^cg?$cXCJz00CQ}8&nh65%%0x4e&Qpa3OdAW;w~-+Igla?CNG| zI7w8Lx7}WhTOQ#GCem?2uO|~j_|xR?^Cz`)G6(oH3-Mg=VRYD&skS-opBe`QvB=Ln z73HOycAhG|ypo9&))Y`L1O)=2ql%%5LWGWm5)vzU6f6D?gZj0zuX>!!HDyCmJXWdh zrsHFXJ8Ph0E^^{B9{-I&$prQH@Oui)DN7Y8Vo)yqhlIq&ay~ zQ|W5z)P&{Hyj9UVI2IIKp53o7o1$A1n==!U&q-+iVB<}!KfIQntmt1+$x^~_yv?n2 zskKt!pH8*)iHo>^ll2gDeesLQzd<9uPnYwFoKsu$wHX`X7xRZw#i=oSR{xZz6*Z$& zZ-Eoi(?%)*RwY#FBBYy3x9^8TPWF*91^p=o-m zD_Qx99%4VB0dPH(?py8}Bq1S|R$)vjpt_jhEq-X6=RB?Obnz8wk%Y}HEPxuPA+ZDyxN!Zu09?tcL10%+SY z!iTf7hk+1)jTdMKITKc9h}>f4uU8;K5GO2!>%!C)>ukQ`)MSzu)jJc?4#l(Ywy#d1 zhZFK4DN6aZlI}yv#5Hw+YzZlyXG{no@agYiP(}jT@9OGmX0m8gW0s&o%e6_dm%tiU zgN^;1ZL{X%Lydd52D^e6GajY6f8qrj0u>y>$iR0{KT-$}gPQ$hZfmB|Sks-zUBPmS zit~ltJk&&bzmxvcasj|CctwUmzJddLIgrx|8(9iUMc}fJIcJX}pI*#95e|Sryq2I< z${HFnv_%&Ei}a=!n~tEMvqLCMs5=055Jd7lq$+qze2XUj~J z?mP1{)a0w5?#)jqG0Zhc+r7}kNUD==cV$9K-2%fiB*<`-dBkm8;5Gm*SJpmvb9D95 zxDmB=&_nOJ{`|le7@1;k!WSKalAW;}?&H+ZxL{)!pnnjl2<0anuME3@RKt{G7%qSO zDfCJ}MVVft!-AP?L?U)#Rx}Y_P!eV|Ck(84SZz5vcSIe_5lSoJoNyOj)6l23VXq#L z62!Vb@equm#2552Gtg}9`t|;Rtir+?lExubyQ)#TO2j+L-SYIJv1VI_g-hflQUI>l z%DhhSr8igh>mLObeY3akK+00%pwt}AiRj+fe>=6_s$yh|h-gfk< z(RC<~EN1rs52CT%ATlBy4-*sh^k-swe)VeSfiC**u5!eO4Sf4oHYAui3r?r#YuE0S zWFVB)=-=%e@mK+uKFkiL{Eb|dJ8m1%A`AsqTfQBe63z3v4!Lo(Wu!8bA>dGbg>)q**4HE8O=3t zUmIfWq?=!#K_YLIZa)$aCgJ zY?A-;*@Ea(;9YvBi>n?SxwGii+?E0=TMYOeTJTj6h4_7){#|WMEpfu@Wth~#a+Ni( zS<;%3INy=3iRM?ED9eOL12BTfvkA5CJ@{2fS&YwYf>9djRPcC?5MeTI?RK{Y_sS~o z3vgjr=pha(k_CtoyaIfC%8+n>wB`=UMogm{;t|Ahf&od5MC^I}%^3iU{;?)rA#l4! zz_vrIjnJkzQS{vCo8gHKG}%moGIJJu9Ut<~odN5xY!9$i@h^Azp#T#yc;>eT(}#EaB(YD2!_t4_;+f zSab*nq=6GAixJe_%vo}3u6&JB z4;0)U*qDe@70##+%}=YkM}P!h;ks%@Mw?)HdNtriJR@UGte{4~aL-H*HJnR?DGQaB z+wad#^>akZM>N#U$y_z|y{_Ck`~980myB;86yaDLRQ+dTyekbETCJxs6qtO{4FF$f zskC-W|HOJ`=GVX&P!bstO}jeFE`d8=5?!r~NJ{*F@Za$v#1b(Yn}?>yHc$;k9AXbT zhpKWE;D!K6PAUahrQX)x+U+xgask6dd?$b9oqsO6@FRD`fSE?WYvmPR7m)f;i)MRIJ5!__ zzN&*HoWkOA*>Fa$rc!CSsy-GWIIk>}vRHRFEUxH-TxlJsK)9R!s`_4+Dj!twLedpR z#S@vD1rsCkAWG~yyHz~hZXhBrBYG0C0vv*F zj-4Tki1CV2$lC#prypSC2)zlItqr_Q0l}dPC)WxHgCMWJ!^nCPE(>fQRDnM`N|bK< z{MiV*7&9p{#25*b!740Z?-u~UkOeZCASKYv#9DL;md5uWtJ^v4^T9#h6e6#T@9S?ZG4r5Uw{`%{!-mp&45?YLFf74asDUOTt z$SaRjE49uRKmW(BqoK9enJDR|v3EjS3OyykM1vfl$7+Lg&IXqU6Q4ST8)Ws|%w#w8 zq82-FAh#eb6NlJTleS;>Qzp;=Nbn>+gIRZd?*i1{LBbY9H;lXY4#hPba^r~&7Ra~b z1Ff-Wlc7K>Y&?xTKm*DL)E5$EC7uIZ7ff#ruvMr7t8{>aNgoU_HhTEz(W9l@v(C$- zU}RkxQMupSyO8r_s5ZdNMm!^k)I7Pw0^@hQ_E!wi7FSVR2I zkfs~yY5*Uju=I7|zksRSD}*Pe@Esc}NfZvuNMDQ`axp+1oI%~Q9C~PzvZx3ncD}>w z(@$=?M+Kb$)~|!t&0@*08ejbacuBlk;M3ID;(M+yO0I%C1I+-dzcSoFRbTVb+}_#q zQU5>6%E?`Mw-y%EmZ-BZhIX`MP{p7grJ7$aY=p0v(Uyl+_sh+^prYeh8^i8`*%f}$ zci8^yuL+Ku5i+SfCVm_hC`mEvQl$%DwPg6KnJ0c(64>Xzyy``R7$eXnU$oH;0wCv8 z(`2F>E?6;8^f&!-+h(1;F}3lD$^i9OG0OE&xr@H}u`WO1U0{YW{&B9= zP6|aqrhyRR8Jvw2bZWigaBsU<-u2SlS|NX=VsjpVFmRl#xkS7=;mH7QK(a5k;_W)f zfpdN)0!i&=#e^A)JOyo7w*4Fe=GPK zQ7*;$auU2v$?B27aZ>ICBW{>+^P?~QG;%puxt3D zNEJ*q=%dqxVHO)H4mMoWte)xo2;GDMg0N_o+lo5P63g>3}HOu()I>+nuJZr1b|dmRijFgf@oC%gzLScz^5y4&{CqjlgRJ)fk40-Z&c z#n&RiZG^1nrTl2ilZ4_a($LeLqOqS4ZNcsfd!I0e-=PW^!xk>C2CF2C| z|8R@V?R7}bfN#Y0iFEu8-#q!_T{3a{;cv5`?xAQtCeX~IpCivpkAQ?&);dr>S)K}x z-cHJN%rKR6Q04wJ5`>yf&Xbl8v=#~?&nH#1LVqU3_v9qMynG@8p&#zM!R$31LTe={ zbr7|Qd;+BePs8HA*!0k$mRyIkVfk@IM*?@Ld#^NI?D9I_%nTWZH`0hwI zD4K;v;0_!`aukQXZhm%5>urqS64IzjQWKVE7fc6&G5yzem?o{KLuaLdQ1Qa|iO*@$ za?M^*+_6dPCG+&!T^baKrir_YqxFckxfw<~7`j3+_oz4n)|z$Az@R!FF;`0zlDkdMfrhDi|(Ue@{0?}*>=M80bmDMJYN1%ZG7 zb1aH1$F6-8QbZ;xocDmcjqEFE0XywJUjw3gk8p!x=rG>KFT0x^&6?#vQKT9Gb7fxY zM?)dXAZjz`N)C7E@k>hqG~jqD)Lr4OlFs5uB`xys0G`vmu{1C<<;m4sN|;F{$a;=$ z+aJhih7tYcep^ld%h3n1m+GtwPQ{}uE3GMXL2fsD_^TC%dZM1S*fDY`CgQe|4qxSo zsUARH#mLAgsozMxUJzx6x zvj?T+^E1uiFkFkP@63y9nMfoG@$8x&B>(Vl8jae((3MRf#fAN!Do6h(jp zSZ{=@<7LrIJvP$xgu_fMRO@I^`r^V*G^#GzDTWA(tR% zMfJIpH_#lYW~||5U+o`olk$L!y@-ujKUJbH=eYd;g2tr0x;sLIlzz#HK-9vR%h?q>6S!{RWx_M)6hU!zuFzYg5QQ*%B zT*Fn5YUJm;!h)WqbS^g8Q%a}=Jm2*7G1V6BPeILq&p(@nJhsC001p*c!=RQQrSJ-pcFJ43)-aWt;zoV`$-Qd zIoO~Q^8=qvm>C;eV6yU-H6SVG$J(uk^cAh8=vgKKXt-5a_^P7MU*l(O;C2lW_{{?O zbu63GPcW1s{A)n3-zekAE#2Ym5`Hl%Z{6CprRaVjtTmxKVBNBLe^(`d!}+2xW+{l% zYXy8=&^l^UGl~zRrX4FZxZ7e^fzc!le%LPXuKIfmyYWVG5w|faXrelybVVP!G73oe zY`;Hl1$aJ3{%nQP?45m9Opko3zfsZo%KoTJZ z<#pGYfT89LE+TwGC@_Z~mBcf=o-SUmqa)EjZ56M6iabBP;hMiJp>HPh*h1gjy>Z!F zN78gq&stMMqw#I6vxe9AcpHNpyN$@WHdDi0xC08yF?m7dCcASuCBPiXj>@X7Ja_~> zZyV7&XAO2=es;LL5S|e-yWzP!N4p2BRL3|YzgVQBc2k#!SC?!HRKc%24F9if{&!{99UeEtPry6 z^{qibkS=|)k`US=ladBEzhvLMxdznETSSd9&x1Xu&s8@asoM08@#cgo&g;M&*AVV7 zc-_{if!q#Nm^hoqAAwN@2to5W!jL&eUWM&k8L_&-*hB3<&2=z^Nf;gu&-vV~smF+Y z0WFLDSAL)7ZGITQz-r>yIfRRR5htM6D7tqU;b>G%!ns#Er9F=x%o+?G4Hy>FP&K7bu>WB3y;fQ!gc{i2X4^2T1B}> zNw9%fCAYw5>mS-ljEduf?Fq#3e>1e*UK%VdDZ#S0}uWCFwGzRA@s@x!)~QfsysM1l1qA zz^@hJkK$Wame^f8T+id60zx#w?4JN=7JRvKNi||(&OyqNT)4KJ9*pB;}v+qiSekX zWD6d_j18ukj+aYe4Q}r5h4+(~N|hF7qhV5o4^K;5do9u45nf>#j>YIA$b+Kl1G2vd z2vUl)E zO;dl%W~QejVOs-O0(v413&4#qyGI4=sIrJqIDprFWK#5Z*DfonVAZ2>aeYAA@5n%?q`QHPf+7DV94jXV$+IZ;NNkT0JXwF8 z5hUVow;8&KnoWI<55@yxvw=m)aXBLHq&u9)dExkbbPEX1-*0t4fKyeJlp5)?&yQ3D9z}_6%5-buy0~^E!>=>n;K1g zwa0E@``ibd!6Z_p9VUci=w9`C)*n$D%eeh!18ePAoUxxih{}mX?gKKCC!8IaH5{%W zgc2eds@-(D0}?{vpD$-XkK@FNm5>fkzi=k74FzWL^!Lp;{DndOcygWfJ(LkxB%_5^ z72zCes;a?5Gr-97;P(-i8w}_1kd|0v+xYpH036g}F&n&e+(IGDJxOACH42U|Y0p(` zzD_DSa-a=p&~MH`&ee~p?2PJ`tkwZi=#hR}I6=^|q28Q+A`dmi*s%^kh4M2QMHS?% zAVds|E0O#iJNLlox~de0pJ`-6hC~6VS3bG4ZS=40zxSDv3iamVbyTFwMwQ^68G22 z-qOVT6S0HF03AF~xi)OL-j`2`KH`NWK1g8V-t&I$a<{_R#QhODX-Hiwj(pPLgfh$w z?m7sY1W*&)iCKLKa+(H1vV@%Sf(n5+m+{hTDA2GpG~R$K^qz7g&N>i(KRQZEGKfhp zk({!#abxxD^cXpt3W?w(L?5&oZmryfpkPW1&&45}@**i2P2%49NqbN zi6j7w`V)YL1Yej3S?8cERt1d4j9`4M;i!RCv+Tjoowe^%l?R60}6|j%*7w z=lSzN>=cToIC)R!q<-|Y^i9tUm7pDMp01`H_!<>c+vFVThewcxNqvf_)Q!5J2i&be-E0Y5OhzI}ng};Ib{dAoV6YRfX#qa}w z6B7=s$7nwxU7fJi>>iq{irPgtgT2Rwqkj-eh{X~9nn5{6146V7I?>x)KWZ#H3E6%#EVp^TOLSwq@0Hb(WD)QiJ3@Z^ z-TwRc@4w5mI0%@b0fi<`(nd4sms3G|i}f;aeBaQ)_7F|J6!j$ec#JhyY)$WukN7y; z;SGe=db4C<(z?WVVV=<6IAjBq6^-{fh@x;7Lllf$T|NCM*&-zJ(W20wopfnV*Z!OG6Ox zd@=;FkrZQEN^>#j>Xk%{gW`@~=VshiBC2gpcUsd}$#E&hZvRV0jWhB}{a zc=y6B84M2kH9!X!E1$$lBZed-S%m&LSrxm3WM(*m@Q z(-xAUn_?#oV=@SdK4$XKH=xnWd@JRvG`!`)21smy`yz)K(#Q| zjBBic%Z-?_gI06opE^Op5fL*1RLux;RV+Q=IJkU@;9b~*kv!4Fwv-&;MnTd14mvGX zdpSB82%?oo>%;I1A+|uInN{8sXe@*5KA`42KNr~E<(TNAaJdafyM?~_c0Sa13kZo~ z!K1J@_N%>~7lf>M@UD}h;p89?C_DjuiTwu<^}&)9XAGUT5te$1!kJGH2C zY-=EmzT~h7h+6xhfwvd9r{JK7;&aTT*ND`94wa&os56M+oupw>LWBKkY+jXuwNM<; z2LGauFf9OnAF+RcLLu#@$n&GX?zA=qU8HJ6Dj>)Kj=VKVsHW}u#y#ZQ+*;3)7)jc} zh!6%*oSZ4tX{Ub|mAIYwpI?okM9ap>Htg*;fLy`OA$8KCmFT#~0LuOzyd*@r4<)|7 z7*XP`CtJ(tFuGPQT)2SdO?E$0q`=1{={0@|VGcZu0_is=ISMNNos?`ZPnKV~@D zk1vyeOF%zSVc};Waxewi z+()D&Mz<%}ZgMyqp&XzYFRTAE84(^{f6fQ`s4!Y~zoRnk1vy#)eH)HZf?m*5KwpX> zL$~B|ZX9}pxF>mG)&oN&izlIe1p9g)dX;f12Gzw1=9xVr%8$)IQ^aYI>8fl!CDt!`l_>lV1318TYZ88UI-hS?3@OdQ%t*=Q)=Gmc=&G;m{j} zv{G=E9g`|t%@>REG%V!4p@8W+fIb7mmU6Id#aMR9vBo+{e2Ndj<~ zi0oh~NMje8I7#0$k~aV;pZ>;07eVv2%a@m;ymQPezjmh7*PU)9sVLXUit^GsYc3?- zBOXqiW^?n}e&uv}G%(1*qC_O2tr7D6D7b|;F>!JZ9^X6Son`%S)T^l2GfG7{ofo(g zAs*VS$Y1w*JE>?e0x(9y9{^c?`_V^x(6lYx?EqqY!g+P_cgZuZjaaM=o z%x}pKiQjz)i0~$W{thj+Wm=cF3Fpbd2Z4M+4rv-5GRE^_VWuF`V(0Wcxu?8Wwor@3Psv?XiA_0wK>)G5)yu>TT#fA~)tbJ#X zz!FVdeD@BlA}Ji=2(hKX+_H4uA?+WVXbXK&e-r|x7##3lB{&pUqaWxhPD(?# z1=q6S5A_|=4X}#u0%3n1_(R*Mo9}9i=L~8z8eYAH>};qRqz?ogEDhN2aT)msaK;3L z6|sb|c>_aOmvAE2U+-J`S4@(LA{GMw1u;LJZc4+klJvXXexHPrKzbz5x)TSkv}?oz zkAHKHoOd|SL^^z+9>Abwck$Q8U8k9W>F*;U(S-{N359L8e@RRNh{^Dp`inYMr2;TW zqTNnj>x3!TMxs$bH5)tk)t7$7ijzpCI9BIT>AC6!!RO-i@UcM>A=Y zV54#YHg-aUAWkM6*RjXL<7Lx6bQ(mS`O@y*QKuo@PE0J_BRvI4s0@;@2WZ}bBSfW? zu`fgvef=OEBpo|Ty_?1HG~OJ|u;ZY2y973f;)Yufpu>_AisW%*4k2zzC#ntUs0XE% zi@}bI7bi!HVWE&p8Q)<*p4&x;U7TWJQ*~{NkZExuu_}ei@;53BJ9~0h%4oi(@(6WNeZy{I$gdbrsBG ziphZw$i=Sj&u?dq9qKTE%?17|L=Qj}Z~<7-W;o}E$ehT8F6FDFNqZA&R>DW3&5#?1 zt08H9b1PsNlOw4y9i4RQXu`gM)DsM4X~Uz|2|t=8Q%L)ePqkoHp*JKV0Vep?Q*Ssn ze?sJ?Ky8Jx8i@*)99Bj7iolMP09p+0X@n$YY*Y%NONg^fMkWqG^BKCDF*|Pny&En3SeQpz%v4F?FEAXtKL zdDaE6@Er^cD&mSJn48zjqXDh#s0rEoR@zsZtZ&!5d`6Kf4twxr)YT$KNAzJr&Q^#x z1D4fRjA}$y=xSWG)>sG85UGUO?N?ZI@r3R`VG0qo!rigJp{(Na$z#XHp?Q<}UTFQc z$eO-{9~Rq=#}vid1D2%7j0-&@A`>xt1kw^Y9ZLYmhUxaUvg1q*Ok`U~=t>FL@)tryD0qtpx6R);6I=$+z6&x*~^Xg{YwSi@+<47OdG_*7NXv zty+@&#p2lneZ?9KP?XY+8eA)Yo%Vboy61-r${XJxTfm{|%4n;ZJ(G9-sK(n9$ zs?#2aI@TFO@Ff8;1OQQ!V>cCKzGl>@EfHb+QRUcmAHHl}hX28@)=Vvydiqs-Icad@ z8r`G-NpRP7YY$uhTzftIoU2t2O)4|jM#_Lw@v##+?RU;Or*U%K6|WiC&XGV}v4$bg zi7HZ>8g4I`f?n!(K+L+RMsB`NeC<-Tn@Wm|oE6B3uJ|)jZL)H1Iz>5L%2o*9{~OI= zpMg=wjB7=mB@nNSwNmmjcgNTSP(&;upfjKYab`FFwIsrQ0QmT5=4d*p5tLl10%>ZjJ^F^D~Zk``YK z(a{OJi1?B}Q`4VC^|!aXC1X>N|Eba8JmYmZz=>ZDa)sYR3~+%wnx0m<2vRAMby2F$ zjV@;Q=!kY!#yBWWh0B-vLI5L?OweDkewru*)q#%^fJl_jQaxtJA zEyGs(Rw95C6L?-vDI$Yvoo{KK!_IGrHl~VF2&+O^6u1m^O@Q+TEZIc8C{iMeu#AC2 z1JRvJcvMK85A`QeP^L#keu-o#B4ZwK6#!Z~9T%*>%!siaw5}(tu&@4*!Z2Fvfy>$= zT9$h{q=Z)kXo`}m=(20VEj;jH!7tK2RtBMD-{ z_0w$n9PnXrol4BM+)Ng|LvynE?mP#;WE3bZH=;1dA4iMQIFZ+BPH%)pyccCk{nRGI zUtM0bza;59t0@4*u*?#%XvBlHFVL`vTwU+D6D@LM#KD1H4GW$4Un1?KlTOUeK3?E0Bo+O_R=6(UEP^^nSgmp%;maMaOCxvxi zgd4U`Iw;NEj{T?NM)`_8Ssy#%eutd5H~yiNNjI_55M@Xz&CP8(#z`nj0kM^=tp6Sz z`P;7=KB!^@P78Y%TV=i|QyWr_8Y}Fy^Lk_lq7D5|I)B)x?OktNI6!eIDWNUSU}eU# z1OQRx2V`p8xRV_&XngM#{s;OGn?^T$wLH~Gh7T{F%$%WTyRGie+>vWDQ^YTmfPk&< zy#cdM_wM@V1cjLXWkZf+_ihBfLhOoPYWYU}YqQ^TNh?;RhiXVMu7}L*w`lYKojZ2f zkRhSgFTkNkgBsAgyC3_U`CFS<>T#U~i(SHw-s9Bw-UpQvffg=_;X9AdM%l`orVx?; zGn+DsmWZj68#Ht#JU{xz_>ON~?>j}I06F+KX1@Aex~PPtZzOyG-iglLR2 zX4>lCP+`7BK7(aj4>UvOy&2k>6&_P-AXkFR{DoPxgX2%ulxon?{B%uv43Nepm4CgG zTD)4kpZcPRq&r+;HZ8FIU^+JF2Lx!!Uw#d|LUFLpHf+WS)AMGOFSOTa_&?^xBKV*$ zQZ?#;-?P2bg$&3X1JyISFE3`%dpDv< z0;x|K5Z!SgdFU$jiD=b(9`61kUKAvI_6!Hqafvpc4Ti}Q5LFOR&HkfDw;`2AQb1QW z_fj^*h`885lv*c?@xUK1e5UH#XKHTkse3XjNmk&WqN)3sBdKJ%QqGI z7iSFrBL(;V#H*Q4+z@9m*vAX2K3afO9xL*YrWJ)&SGeEZo_HyqV&DFr%LZT)I)q3m z1U9;=x~EWbig6>*zW8PlP;`C|3K-TtTr!{>jf0pRkn&NY3=zJA(&zq^)u^{bM8JDr zPK-dec1J!E-8t2fm>@7z{$i#KzLInUhPUwN5vDV8f-lLw62sIGnnancmu8kz9w_!` z4i>q6uVMz$?+rfVrPjUg5SI*-#?so|4u^8 z%Vjdr(OOIGK1JG5PXSFkTw#ZyyY zV)^3+y!d>1fqC9#noufrGtArw!k2QmTQZPHx znLrHuQ%d5U%oqfU1WAU!4~#&~bD`H3u>al=E;7bPyG3&>1R0TjIov>B@&dBDdr)rU zY10*{G2On)1Pp(f1mo&Pf3FZ11G?@)IHh|Q-zer@Lpa`>lDzcFOQCdI_i?DN5aNl| zEn~9i#iXuPEKB&cS`m-&2;!XmAyFacmH$KnRdA*HG9gQr7QB@6KJ+mCPmhT6o&I|Q**xA61S4n0QhBn%9#b`IWLFE{BO`)5dYL9|tlj@hak-l@ zwMsdYNPMdWLrq}r^9b=p;SnIGSXpfYMV#|BhXPCwOatn+p0!JG85P_2SFxQtcXmb7 zg6jhXqa4?Pidk@anK7l#19n%4LQJgvAqb};K1RKFpA~RC$jqJt0w{k(*&=%nJ$4Ff ztWl!OkV`MQIO*N93mwQXC>%SDKEX|hBBUs8i|7s^bNiBNR)5ZEI2;TYfqH!Xe5?Ox z<~;vLY?B@hEaS@M=twneLpAHh*b z5UDxQ7zmOkUcDP5;=gYP5Z@_+>le$e?P9hx_kvbA{i;aW5zDQ7e6eWuLb1!nNA3cj zN%L8-_`hG+qf<23iI)lCn$7@YFd1pIzqv{)Z zUS-7gf~!}6R{^hA01vfY9_^H|o!xi=WHZ;Uum@GP7{3Nq<~jYrX8%>e2=gH2uubIb zN7W#zK%1$94>6WRcX4qkF;<5;<^`ZM61&B7gt&tF-_Zd}wPh$##sv{S^hRi+CE)KC zd!YV-;(1I68N-8=!&ZcQa(?ympHe<*H#h8ubf)No2YACR{@`(f!N&9~`WZr8ultA@tlXR5hUFGIR$S?YP((5&xdmilJMq41 z!ANbR)ja^Ling>_HpqFM@B@TcI|wPQ>xbCJ;$O`hIoIIVxvSiY888y5*O(9y#QQ?B zP)`OyZHI{JRoD|i=t0*qO*5^UGbTD;4vnA&U?a*QN3^RE^BoZTi>h6Oi};vSop`we zb0h)fnMI0Uil+H3&`=212<`dxM3$Dew#Tc_<7S2}Uc68as7jfi`R~{kVkAn>lMIXD zMpK7Kw;qJTK$ma!QBa#u&3M#8ZTJZ3&VP{8Nd%RQa>}T}m|l8pCaeP>g@v9Hjgeca z13e8;zaF$FUtX?QF@`7#25b!u;JCnwu}b@VWp@+U+4$n*wr zM3@^?qNslb$zcnrie0k|?5*+?r6^L6ILz1Ci99yO!i17n5_c7@-(r0sh!IZ^Q zTf%WgZZ1y?1CiGtZnu|R5uu9+G1bnCsS)+R+@#!8kZriY#jpu>RUI6#7Ah=PZwCetd&HR%{U4f^~(Y{$&Vai;FwW9EYZi)VT* z{(A%Q?+(|#C?m8bT2i_=`n-uCY_g^oy^O6u5xRX3e&0(5_^(lY@{=mi?fR?op$+CN zOknE1I4#X7g)#h_z1Jm!L*Q}y`#~)H@BhXwI-kj$+_j68+Smja~ zD#3eOznt{j%wcGer;zW0?^7UXo$H{hyNRXyENjL+H+!p62)t?3K%7LtLZHWFv#rWFtb}Vt=Cim<`A@b!^`3`k$@-gn!er zx6}&2O@S$C`wzDIX|yRN41VR3M}-sIuRDfoA`a^1@c=;>uBOmgHjz1G3&DVsN$qMH zZw{V$)Eq|06r~Q2`j7CJzHsZ!y%B}_Lf}<9&qh!K`z}UNN}-M*6Hq~0Y1DGvw&WoB z`Du1vq~S^pi?>_knd*kMvt}Zape6o;$e0}*^gv4m>E;P7`D4)OW4#lZfPRfdGw4-N zUo8{UT7CRANCl*Jv<4VRaO#+hV2YR;S+i*Cdd^7iE8d2+F;4FBAk1B4HT7-V-HC(IX<}y%~UD1kL(l$422JVexwHpAjDrS zYyv<5WYkB2tSJy$&AUZRN=r0{PjI&aX^mYHHf;gQdmL#=YGA&Y3RlIwEFlaKtx*7p z2%+4<|KkayA7tcsnbsG1WeWP#{8G1dFRt74 z0)IzrL9sP4q+ha0OTC#!@P;%pG8aRiQl{Ucb`s(lG6+h^@l=0=-y6%W_+J{z*eeJo zIJF2Q(E8X#75=m}_*mPE)qp&oIlbWlw#R)mb_I?0WhzqatbK=kdsfh7wCURuWqw`e z>Fd@wZ?S*t_T%Wmww!g5+CXP-9LbyoB`z>DR1N8{jb*L?B=xZIN!$j1J0X+Cb{zV} z0~T2e72PYP`x(G~z&z<-V${05X01j%CTuP6`VjZ+vrT)p1Jx085k9RIt%nSd%2`x@ zZ(TPmis8=OkqP9MydI-0`x$B6F}_-sTToJxhSKaF!%g1!*^1htW5+tpbaYZdXE91* zTgkkQ>*_k)RB6ZNQA8EJv?a~U&=gfVk3DsUHAFPEXga+nGbSSeP$_+eIA(*N$_yK_ z-UUi0_fHEiSSz6KV0?49XJbdbJq8a0 zGrOwC$hjLrK?&0@=^w7r6fg>?jB~MEcTcz%K`IrV3&<4LN6Xy_{(5>v`yxz}Fo*;*hFUxo`l>$kw~&geKBzMTWdMsMQ44Ly=Zq}YL~xS0p=y4 zN&XR`jM$L+z2RTep_O#0X5qEEoFG>kIv8{y5PG+F$~!*PT@a$v(7b zr@dvpV72l9lk?W75rr~ENNw(6Lk9sBkPU?#@bkRX$9RHZ=-cak$$5n9=p|t?t^40i zm`)>2is{Hd^Y@+%A$iNp5k-y7p=HPPR#e=b8At#~A$ZGv7xI*l-H$XW9Sh-{F#@7P znf?O{xP5Yc#`AKQ1O6Jw$I%qv*t?beXO8M8{eEvJPfjM5*{OD-}%%qGSj1w>YOr` z!c$c^E;nOQf)YdoQ06*W6CUsO?DzmbC+!}=KmP9|8GFL$Sw;rv;jn(;5`>Hv;4@BlaH2k462Sgbt5wE5d!ui%a-UPLv)$CO3o9S11K)I?lemG#A6xp=-6;yceZmk*7wPh0ECiXC_q8x zm?&Gj`*gXqyyQ6-W=bFZaZ-e0dJS=4&rBaAcfy$b@k~U57zjd!3bHC1rc;K8Eie8X zVWvCmqVj-Tm@t|CIQ|f-AMd#jSrH(ev3Z;8#?aVz7qdv%{DRptu(X;AJ_WFIlhOGk z4&#uaX4Q2)?;aGjOygsv6o}I!Xeu~H)1(isrVwk@wn`0}@2QJd$ zw8OF|o+Vc*W*-2V=Qukyo_EE^EU~FXk%jm*#v!(SO9Q;7C{S2KGB~Cb%B#1svb1_T ztbMN6(IGlbp|OP>7YQ4eA?5M&E6!=`B$;AIYjX3o%Wu~@e8~v!GrBbGx1t!tvfUPY zk+D}tv-@|_0r;)ae#8{MIB$Rsh{c%r+bGH5C(p`vHA zHG-&aepo+L4U~g&0`8bGDD-%_e=2Oq2;lm7&zP2+rklMab(Pk0YQx-wO)k+<&j|uN zSljy``@tYgk9QuK8Ch4~i53f#(t(F9@UjGCS{m^hL0b9{ohzg5GTq47X0xo?#U-gX14Ao^ZA@_7V*gBckD2<| z$*u#>SH`-iO*p7=lieuk??{_UT=*p9E{c=q7`&xIIaA|tomJ{}B7>w+& zrhZE^&1{FmmhlP0))nRyHqrYr{JL#gx%A3isU5e0GPJe|*F-e!vuoFF4vonxEZhPKa^vB{#!gY%nwpw} z)_iUY%;cSulapL{YI?Wj)n)U~WH`C4T{~=bEpb*30D1Ds%V^E#TfiE-h0D?6b$nWa8N8Zk#XKhsim}kk)*a%j(sI?dFCW ztXZ>$Tfvjk+NlloFd({BSk~bK2ihANibp+%B-T|xJc*DvGCKNv#<`KJ0{pYphI_@f z%J}#6@;cws()T2#l7mJqU*1Q~0@SWdU)bLb>kUp1RFbC@yg*AJAgFvh?tRAt|TYaR77|bRR~%@=t(99qxeusnRn5{Z?>n60wGx) z=6~zQ$H!Nsnom-(-*?vK<60dj!;@WO11u~oOu{m1>_b}A1g&2-t?ET?%@*JlJCdIa z)8@Q5D`T!*BUSz- zLJ2{diHCN?-6*SbOjp62|*`OzA3FMbZu9;rsI&wn9ltW`RO%iY4RtgRdu7WVxCFoc|L4nK4l?RkZHqWpC zeVA-z)ooRlp#2O&dGQoq*$wO0uOA?l&Wsr|MqLU)Yt{mVmdlzo5}$k8#Q8jVG8GHy zJaX5=Z5@$6MuyY`2N z{=Sf@XD3gc`VUlv9V5`lKSr`UKMa{H)JYPOGIW5O5Lg5vJH~wIOu1S3(W9*&JbWnT z{s^J98O^*6(#o$*iHQ3;KI+DGlYoU!)zw~QL}g)=)$SHc zIsqWv1~Mt7W~i6gLF?hVw!d1P{BZK^*$k)mC94zG|B~#c+o_YX!iA>|+G(Dw*ht=c zgTKqwwUtt__)?@a>~`?Og$-+q()@j?y}D?qO7Cu+F8B|hoK^a1^0dX5o!fBP-Me?6Wo5-O8|VAM^6$xW-aD#1 zu{D;W-QC@NRC+6%DL5QlbD;C91DWq1-A_v!J!3{oUOdw_+jt?1CiiYV_3ZTC{rZh$ zwT9cGDXuefW|l{SK=T0>VZoob6IIa$9=xn$K4;$i`Sw6WAbcCITp5UB;Str3hnDKN z;O2m+gNIh-)f;4FG?#ee;_4b!-op3d#lBz;O(=oKOq@81&JLV>dc=wK-8*+~fB=8c z^8ETwomO4$^XvI55|@_WFyN*4B+?&z?;H^D=s+ zy-S%K|0FRb_es-dPu653k=!&c*r8pD)4LywvI;7r2dp{e6xeQz6W5Q5gV_ZW?ROS4 z4<0;-pzBKi2|*J>7C*|V>U*@&w{PD7*fh}jY@)Nubl>^U(58zQFV@h~>d?KrT6A>u zRnH%*ub0==S)YW?O%waCjr;dcyOgsnD`MMzKfhhnfj6-jO-jCe<;v*w>xWYLbbh!w ztF6{&UY?-SFdvV)_yv|&}q=|1+3jtz{AjGn!C@di!b`XyKV zz8@R3T#wEJW#d1Xj0to&)jsg?Lg4&*v?BF*y+Eh87$ajO?Q62m8nQpj>?Sp}J=^=< zy>SBV__htngakV=)HC+^QcM<~p;w_0_9h&UDF*b8()Jqj(0At7r}=LS3vcA)v?W5O zu!xbHE?K%%@`zX0U$~<8Mwsd3`?{dOJ2bT0BJDI1)6EADJ~fTHI&~=kE1U-r$ zK7#&BCJSbkRB{ZY-czTj{-@uUY^XIl;pg{p#=2RvX62F61n{KUSJKkbdOy*^Qzohj z+YC_-qv=w@TfScFYkV!LrYDl41r;)bL`J*8bNOg&F(M>=#t-Mp7w1Eil$7KH zIk#DY8gdo^&#E94gD*@V7N^|1cLVt03rvLrns8y%5g=^>SvGe2qG-~j37d3JY;Ocq zO+^s4ack~1;TOP1!t^ybs*4803v^F==|>P~8Y<l|o{=@u4xz{XvtIY*(#+elT0Y5pg- zPpx)iEb%NmTaMjo?2#rl2mH}+fU`)*4BF|e>TUmw?=*7${EpqacfWxDg7~hq8o12b z>+|I_))FXAGEk9NS0T(A7jGh(ueHItZ5&Z+nL>`=-q0+ z24{bJh7TGvDDlCAa}$4s6s#D`CLw35k}?4KtQo=?;a(>Z;BPCvoIT9PjB@v1;I%u&!4xu_voj<(#|jS8bMsyZhj`D+V*A zx1942&w7%kBBP=_-_GK|CzS`s4Ah`d478s%`nkqs6{anm#5SXNS^?@4S)cTIJq53# z*81n4x<8AC)sAp+iJTH}%HR6dMfa9zLIqKLV$Tg>ci zhsJlH2Lh7$_wvIB4;s;D+(5HXO0Q^O)$RqLzN{^UwsDs$eHtu0bolUGBsvQ1Ls`xt zW0sydbg}m=Qmohat5*)xlp6X?v|4v=u;ZM*QFpYPK54#QbM{4wA{_uUffX4Fs~0?V z8*VFa=sU=TOoAIdVunhf3Ev?WlzHNu2XoFI%BS>v2W}&%6arojy#-L!c^2c^nQ-eu z_phS+1?46qgG|{E8a%j;+tt9;paG)Y7C1NM;ltaI!?TNj#9q7B0aFp#9w-ZzL{2z6 zUDWkFt+S7nY5-RHAc=Wjdsu(=mYf`GcEF9?+;;4M$jg`EKtlUp3-I-A>U{e0C+2yvnvYi2{{kSZel1?^n{vnBhX9NK8r! zn3&LjT0r>tFU)-p4|>doXarw+6HSteA|*9-6xRZoS0~&;&2QpX>?$Cr0*C{vSFfgL z>I7tm6Ht9uS69NEHF*(x)=x84$`RU zh!J&Y&&4~6u|COPhJH;*bFe?+Jn%T)b1nDLs?oC3hej5D_+X_tHRD0+vk69r4uxuD@#kL2V*xEubKOnsx)ZO06JRalR`HCyV}!#^{;cy>71l;;VAl2a0Tu0B*VYg54Gj%7{40&3!D`Uu*b+x`bMsl2mLq~5pSpT=R;ve&{^(|Nw(qdCHDp7bnX(Ur-PYx_&QA9>YCQ|O~+MbNw z3Cikq+J>5b?e=FqW(71}a6~WN94~kJXxX9mSTh)$&wQ!D((bR_7?sb$NGFdu^Bo;K zv~RBvl?~Ao#P_k=*vx-S0yfgCz-;X1;|G3Rd;FMn&(Vt(bwyCoaf0@g+&4fgO#m*O z-Zt8>VRN&Lp_{@U<{!%F+N)PYsj>~!aa6)IqR_FNplAliopNl_OEr7h$N>%xWT8Q* z2|Lut5=`BTPE^s z5z)CD79!azF zskr!ce*V-q>nZu%ilefQoip!l&{j>!sg%&ZWms)>8ani*(tyj>v|U%KgaE6)ZvB;p zf03{sCv4b&=haP?DEf=#UPb3Z3LTxDeTV&eKk4e45}le~B^x^Q>eZC%f3h*3I9B!j zy8}9_l>7HbE?c(j(#owF9i><+tt|Ee2U7cS&e@UI!cCWp1VA zy?ghhs$rnGE)7U4qt)m7`>459buk_|Pz%A*9fW$vS1A?7rbgsG`|3Gy0-=V;(ZFOnbnF;xsj5U?#Y2tw*gQKs``OjyL666`1Ebt?cOJy( zRxhu5YD%Gdt-?py+v^hiHX(*J|9E8jl_$pPd(TErK83@?^|eU*Mzb-1=>9c|)!udb zmFLhlp#kY00}hM}{>R(fY{xObkoe8bCWmD_a*Fc(bj@bUlsZvXjdzVoKj&}hkI&uw zsFx?XO1AF5@jp!s?xv+BL$$Ag(LTlNr(cOaJ55io?+q5AK7XaxGX+1L?O1j>kg&Sw z>o1MYUPwIIzGFupy2kzAvYp3&S6hB`{1zZ3JvI=Vm!hSaNqd?})OLafSXx?Mny~b& z?eOrxz`Ao{SB_xy0zGtj_)K~rTr`#0K{t3EvmaR1dAh=K_H06pJ)m}v=00a`I|K}W zIvjp}1j!VwvDb+cCl+`*uU)$qkk$b|vxnc~Cv@b?WJ;SGL&?*Gn#k*YJ*r$EwiRNS zhLr6O2bB9-_e_?7O*Evk0$;s)g?e-A)0g+t(_36|&b`A;x^Myl5vsqr%~KC|50AjO zxD#H3ww*DX%SEUFjQh~$nFLQYn7yVI^ZhU9J2#wUq3ty)D2eb;Cvjf+iO$mSJtz#TM^!M>`n)iIl5opK_ z!-;-m`qLA=e9nyOp&^P5pA;1}rQbSoc_+VrvNLjW``l z%N9jh)%bM`)J%KuwBh9YK^ac3i;H(bQk?qt-})vh^oxPWW+$JWZm>S)ZovxX!%l^U zs?r&;Tpu18tUjf@naS|543o3dO;o15iRXDBO(83}tXgGeW219&Lyfy^;%U*QrWFLr zoyY+ks2tug-!abI+r|I^%qWd>;L zdHs45>{%YadJ8UMyk8UbDPfmzy&~p1K%1YQ=CH=tEEPr5ZnbR2>0tW`7Dc;Ta zU`cUcO>f`6&7)PhL7(RML1VT-)22;fMU@G2PpYr4|7A!4Ecgq;(P<$}WmmNSe^@`p zD!Qx|gG&(G8mXeYxl4~88Z?U=-mYi9p(W*$imn{+FyUmSa}e1*A3EPeMOS83 z?dQ&&R=l2@*JRlGQZo}D_|t*zHdKfCAnN=QVRCa&(A=mWt3Kyga&4-*n+2_zuzu*` z7PJM;O;q-tIMD+#ZBFq}0xvEz)+)O62b&P-_jZ33-VvIk+vaBZsGI^B-OKpgfuSrk z5u2NF-28MO7Q``QXJxM>yQh6;b?I&8fyt#gA7Ep15_8<}r#j7=wP#Z87FkCh(zI*T zmBm>TSz-;tExLnVJC^;d5aL*Ov$*r^dzuMcbHTlQ!E&BFKt&_3U)0Rr%}nTcgU6Qh z2Zy;uh*R((T+U^LpZIn7IWPqmlrKg~)q}&kBB|nU+8VAL<20>{2F;@_FK8Qs?_y~EeyP2KQ*Zp(2E;H8pe!XI>dq!2hPah3dz5}jFQvSGN1m@@XPQ+)bz%%=c z((HP-+G$l^O=*<5`1`8qZXVI+3zWtVYBd>oAKjOexQ?ni&-SZI+g0?(ZrPv}=YIId$9&6*EH9Jsg{Gqh4AM_#(LKRV6NXeOV+ zJoSRIv`70!(&?W#(RQz&pMKl6ZU0?8Y0{)A78aeT)^4%MZvlUG1-lF`MsL2IJBGSX zf9t;~iTjOG(Nx`esI8RXJXh2%Z7y>qW9R$@G|3M{oT~hTB6&0~KEmeu`0v7P$feLp z^F=+k->o2rdn9?D*eu2)hq0l-G_So>;W;bJNwUqanEl zKGS6N@Lti^_N`7Evr60)c@%^+eiJ)T&cGGM%k-+^88Dkj;Y4qm)3PJ1L_SkYcr zH|f;NyLTJ5Y}xWEBlb}d)50=*cJ4H#SEh5Q?UZ&YN}GeJ6?xQcQ;(B7m?aPd;c3-# z1o_l$c}E>jE_%{-o6nio0+bFw#RJGJ;%46*M+gvz$pNud*Va|{RV2QAd3~%aw2|3I z%IaOwT{TqCOqXs-ra*o#%AU{7$Bp{}eLC>2qX3JFRxNugA`vDjq+w9$-aX98)*mPq zF#62&&{1jOx-2Y-+RW(%ojR3hcRV;)z!O1=k+sbD@g1gDF&qWVG2^Vv6p9VhAUDuv zyAXcP4&ek9+5)=%TU<{mW)DfvpFe+B0X5Y?L1OJcJJr;5`Y#&@Q~!zg-wg0mVjgORJ@8k=gFuzu$}e21-S-(yDmctXV2F zCs0xWQ_5Gky4L&Rav?UC*_1Z4E!$9nKV} zgO*m7?n6`211J*D zEY?s6=LNP&jxl5Lp_|+lTMZ4uW0zA_cO5%i<2Ek%$th3NmqKTyo*c464A!VjKnq4i zT#1VEMl@Po{mYh{*xF3chfy!24xoz(gpU;DUK({0Uh7XmweIN=k4J1ND=V99ZM|gW z`ieR4Q2qHb!7ezq9NPz}?-c1@Q@O9`u+NzSx&{5`0B&@domb^nhtnKL!vP(ACN#9~ z^H;FMiiKa*KE;CG)!*o}<0v3DnVgeh8iI>$rjKMK^xtCmqpEcOny)ECD;n>`H(ybe zJgi1HsxbrEbXHaOZEOA!g0^qp=I}urBG|=v$dKS)LL*d`_yQPd`&S(?0j!Yw0vu#M zI@@kGL?h*v!Vbn-x@wF+lZGO?tf!zfA28`g_)aizW@f~S)62ghu+ZD0qBoQnbrsfe zZt8H)wBJXPKGv2UPEaT=Ub=L=*CIW=P%TZ>r-6Qhme<|*`gRWmhXkuI_1zz4)Zyu> zQJhn{NU^hl$-pZFn4CCw8P>?}aII9ar>EV9#oz=26IsMB9Z$(9QaoVT?yDBZt|(At zV#%AWql?^I$X2eM+HQVi;Aar`$M_t9%!fZNcWT7ckwRzpa(4~j3LvQ0q{^wsy}gxc zs?#?71_*S`?w}d1uTW7{-S?d5QTO0DZ(yxDZnFl#2`+lj;7ep8beAD@zYDJ73m$?d zeAtv8)Yr-b#Wi^ZN$AF>-++&VBNH;@0&@`RfBmHocl!6zrmCux5=b`|mHpgQ+q0%3 zAw6!{^UGs#x0ubTTa#F>+kmaio-dd?w}Yyh8jCg{$+~t|YsjAS%dc<4U9uJ4O~{v- zZ>F|@(Ks%dj%BIWuirFcSgY{^ui@{~2hfB4)sE%xH-&E_ip&F0ziN3>c|gWERbIG!S%V$Z zlB)0U;m%ZjOUvRmv|*d&L%ecJoM6I?LC6AIqC$;ml8+2B@(zgW# zWBV<6)NV92Mzc0;b`YOY8rg#aix_BgGb!YM>lFxJW~|nvwk7)B2M@O7`~bbir-rbv zU?#VqE~u)iY7hVLrx^w}4qF}j^fYTPQdB4YL;p&=8S^;-AsH<8&5Vqe;Dk>SGe}d^ z(t(y`PL24%vv^M z;lmyD^y+e($<&9N2%qL3S0Nc8?;K z=+_j@g~%2ut2peX6x8}n%OfobQH#WyF7elbv@phySadoJNIUml>IBLnj15A&{b_nL z+JRcif9%BBDB+9i7+b#(r~p}qcYl|YA5!V9*d=!;LK|iN074T*U?fsrv_!Wyw{EUJ z#ZzE7Nv!WUB8ETs#M?*LweOxfq6P&g;C+z4vh(``8nz@%$-1E;a70Tet9)l^$!|x`nQP z>lT_n_8ssFe3=#l{DPyDivS7z zLqj7Bxx!*?IhW4o1c=7y+@6LeB&deF%z-Q5U*I!v7Dv10kq1WZbIw+$?>i#-`S5u-V zvn9oD!buHQdea1HZeL|fI!oVfPZfm`NN$xIetB8@{EA)~p?m$P6_@*;YV1j@SVYm7 z{ZtV09}&WB+gHs^juxXmfn#6(3DymvC$9{U)A@A#?ITRuQo?nky3e0QITj|=*o#?$ zB#`9t{i0W9RH&JwSYr3pe!8Z==AW;&K~@7PK_d239jI7l<-8Ag3RY)bqRqr9LN+8D zKZ{6PYF>}?xZdfb>VhkYDbK)Q&E~YqM<+#4+uTVdTGwiDOkyZ)!aFgs-1l(e@rI1V!(~ z6+tb`VRX-@TEgWQ5wG>})}$#aiq3SV4$g0}AE*#Q5UD;@tXIb8eY%%)4__bp*pEzw z_gLO)vm<^ohR~958#hap7=4pSg?CXc=6`m;C1raa!N|Uy)Jv4xEnSfI_8+_#;pE)7 zOo|a7#2?zTlOVn=@jdlF181mj+MMvtnA|nk1r|GE(iv@83cY46wj&G72bGr zeSusX_-sxswNaSUZs;~k1~&MfVl+J+=Rd3IN?&;;GRTbF$Sb9mf-8tzQ z_vJ{_^}#gL?WwP(vkk7MVE0T{x<8tBMNlo4R1Mb4MWQJ5ZmU)|aAOKcgdB$93j*2R}*dag*M~r~AnTs(YXS{a5RpdqGBdg6h z6f!tdZmUZl{dA}2(63(Du6Z|F@4W8a`apP?S?M2IK`T}70Ol5U?fi~~pWxV1HoKEd z3E0S6$WAd{oa{2ZCug)bo>BqlktFDb{rIF?Xocbp!DP^?57q4e8IwTvcjP|pv8%IlPbTv18x6mlWUFa|gWjk! zy?08Oxqf)~s85vbQT|;F zOvD8KYJvDEE%BhlW{EVlfQ8ab3k*ZI;CY&St;4KVZG2^e>!za3G`L-~EW6h1o6(O? z>8W(T{PXoG)6=Mk3kpFK;txAb2ZK)YJ|{uNWz7=D2P)H!>Vx9zse66K*8(NREiyj~ zHJMy9c*8m7z{T40)jqd>JDH<#Xg*uxbNTiCr_V{3^vMjVh~r#pgIX*z9T8Y(js0{N z0@fQvCS*6kw_{x5@7m9g3Y@<_u3g+|+$9({bTd31t8FHec)OL()dC)8$c_UnCm4{SCtNc=8oea7Zfd-w)zAZkwX$#MW=Q zx!OgFwww+8wAXo(v@ze}ce+UEm(=j(vZ13nu>3Ah-F3;-Ro|YcNm$Z9i_MMIl|b7Z5S_={ZMpFcI+FG}#(P=oz&*kn%0YpVHippQ zoN+?pSA-q@>EjI%cV6po`ZIrXHNW_!b`Dp&;CUoU_U7`Sg5z+`Yd2_r8MQuyOfoKO z`lC`p{q1<_H9SUVOgqiP2ng;DnUbQyP3uhf8w6W(KvcxgaGR$q|e z+n^d0^Lo+4-S>F$s&O^pWjhEI>e`_US=pxjE}9CCL|P{0SQVq+m?hv@1~J^6qBKph zsU_dqoetex4hdXU_#PD-2ld3Up)9Y7wSJL~Ra*A(S@wR~tID|IQcV$JCt%{Y{aNUA z{<|RL{Ad$J{Oe|W{+gTqsbAU6dD#taqQM*GU$c#FN&M!D*7MCiVh8<#NM7Il@b6z= zkGrd7_#D5$Q|obNtK*Ja;o`b9L_vSVwV*9ZAb+XHc@S(LSUIKTPdMm)RxEMospllH#X{DqMnfohH4 zy5xN5;`=bdY244V;9kgl_uexEDiDY>%NR9#d*I1qBJgQMI&i7z4s9x5);XD8*LAd9 zZ?*)pWq1on?RSu#l|4)3`2wvf+}EP4<=WG3>|zf|$Z5CkLBXX@bn%a-C1=Z3`(56M zvNRJt-_Ia_-T$Q6sWOUj$2-qFNYx4WiExIKjGN0>cI2vqPv%+9MKtrW=f{Tpt`FR0qVkxeZ+;bb5|R2{ zOwXHjiy!^eM#k$IQ5pBm)H|D#vRsvtbN_RX)A%q;WiVsmx!g6Ji;SnM^!y;>h8DG} za-8Kyp_a7O=LqA z(QTLh^K_kHG{JH>1#c9pGO}4CHO?M07u0yvk&D=RQf|h*tD@KgHZk6S81o{b9~qq7 zAAaDS{nS?P9EUYmd4o_{-dv@oEc}F^8CUAIkh~iFML9GZ6@&r_JXSZw2g>dQCU>BG z{y@+KRAsVcsBjc@zhx-LR*PVJ!uBR%DX&Onr&p{q`6LU56RL;Y$(x$P)I?6%tG*q6S4i(cj;oN*q)kCwf5cRyVWL7wg}Bh90w$vKTw6%DUb!ERkB+hB5` z4|A3^kvKGN*YNpWUs7g5XSsIP_hQ@hU~ORWe6uV%T3vkglM^U`9rYwQ`f+UPHM;Vl_;J8O1m$N8ZF$!b;_n7h+5dT19ezr_D?#ELmgu<*BG~c`F-C!@sDc? z?PN@Sf~V}JoZ=Ar@ztgNd+@0F|Myb}o``8EPFlTo8Ie!gL_*EK4_k#$AMdiqVo3Ge zd*$O(#WV@mu+0fwU%$T?#K^OCiAQE<&TFp?YnccK06iQ%V;|Qh=V%O2U0+)LuXmX- zAs_G+z5+D>38H>^A!A7P#=FFXzeIlV`forqg`tIKb|@lrBSgQ#m%GFa2SE8*s)NBQ zCycKD19LJw(+h3ykthZ~+R~;!y_Ds3jYmNgM%W;lRA!CAF*Iq_`fUpc%_*p#G{w3K z!FV`#DR?3_>vLQ|Fp(W6G8a9jEQd7=0(c?z7`v}8kvDp@*n&oWPAn7kIc zZapI`;~;>WBe6vTTRW<+eQ~EP`LzKQ#H$@f+FH*VlShegJWFP@om7 zRVij!o&;pIDZ7QNy^qGXPZ3eV*S5jaKSxLbm;fF6EK_8#X{$dPzxCB#h%8>B;oBD* z*HEDHqU&C4g`FQb;3wBA6vFpUP`pi4m_MxpPzMQx z*4USqi4A4U$}HKL??&s4tbgnlYOH71$}cOg2Z^X{1S!0%Rl$d?Qi1hvj+YrjWXt+T z_LGgbV8u#uP^MG(oPQ+$`A)K39fFQv;7+~*VJC$g;*vHH=kFPwqd? z--PZ>H)9r{kAFEC;H3nddZl>l>0S;^pEsev2F2?G76rZezsZ`iJZU+SxYBKBhN`r2 zr=c9^0ZxlS6u}Vhg(#V6Pb|y+Li@jKfHL!b@D507e_`8`aPpuybs6zgkF{h7*5HF8 zAMrmfZBh%+YlZS&y4OxxpLQ==v2q;iVuauz_Nxq^xB5-) za4O91k>`?M+CAxJPLstzmF6sIJY5Q3b|SWseFbV&A!RvbSU^QEAf2RE{Yk`tuG6xD z>o32jFud)I2Bpc%eDe3sB>V>$Z z2HcG=XQjaY_4iDx12I>Q) z_#2B$!?ppzp0u7=7`_gkzOuf`4n0@&^F6F#K75GDJ5S}=#~mwzdW=+NOZ(KY{pcsC zV0(akbn)D>nN9>~v@4o{A@NN1G0Q2UxD*%g&M?%>n?CNvFwW8s7_F?R!`~xpy3NVG zg-!wv2!9ZfcoYUsa!nq=vYu;085#3D%A=~C{$F`j#7*!SWTbTIhijC*-uJ4x;_AZ? zj^B>P+)1BJ9f$KYJcIx@PX-`_{HpMryU{QF*3;aAA+pu~S(MkWAM75-r5y62>rk+(H@R=y<=**&%7it;$o~;&5Lpj79dACn=) z*Ks2nM_*GV3WPQ+x5jRgBueT}x4=516N?+e!BLWVRA^tZ?w8(^-=A`ALCVw7amCXY zT7_3(-Kh75(50X;_?|B6*GmA&z-(fP$E>S8C$`h`JlF6|56k|^EsT4l=}AeS7Zhc= z1_c2&cBj1(gGd+Ze%CdWjnu+|hS-%y1JRx#5F3=`ztojq9hVw5cF9<+){-{V<-}U< z@Z|H7iK6W#$>`c#(O?nKQl32Hc+r3Ps5AVt750m!5LhM0>lCoK*8eQdn4+D^je#v% z64b}tpIkFfV-X(>li$vFZ`qFIzO|mMF|>6@;9?{Y+yMz%i)_31r*WO7-pI$h@}F6c zw2|66pWd`CDOBw7u-O2kfd%*QbGVGmaE5e5k)mxJS*f9I^?4D}%Ghlm{Q z4?l7M=s$PAd#d@A?(0ju4@y{WDcJSWQrq>2B`8h!U2Pg80i0gn>!NWCyx3{vh3Ii; z^ot?x-!`bC^CAbda9N_$mM#W7n`s(h+j}=daFp@XTV<_0jyqiMNNTkOBkvp#BJ|rdb zPw+9xM7JRPbtXHiLLp{Nbv06xcUFlM@&>wN#?vAq-;>7qAVeCT-Az$Ue2swov6=qMGNzgg&1Hcl#D4iT@X$*0FyV(ZeIdPRj4sZJO#5JCG=ofi( zEo`IQCd4t=8XzA>i3aZZaLf!|JX!r{iSWPt_=G_Tp$AHoI-YLroagIHl}yh+J#5JC zk4%5{9d{;`#d>gpwEu;H!C}5v=bdS%;lkqnga{yacUq=6H;4Im8n@bPk{Y{_EbVn4jL?DU1j1JgkibBE1PC)Ujl`sEI^p9~y_ zNc6TsP;o444*XK)v3ktc=vUTA6MnO{rd7L8Wp1R|trHTQJ66hwKaVAlC&M5Q*f^ec zjBX21A(Q+Qo|HxSD^Bi)oa5ys`V|K{`2dOcBQ16&RkG|qk3wd8cRW=DfpEq&LHfl6gWd1pJb1mpA=M%;z-Txj z7gNlEU_*p1_oMyrp!97nOPYdn0}xsVs)T{hqaz<77=n|WP! z*^ekXNi$=ra~mQtZ1L2EVr+dc`BgiBPAU}aEv;G2oHWlr{x}Ii*{maQ5%e>jgL+2B zrow?o%JJ%>8GjQiSh`%OmApLW6?>h}XWZ{>^;s{fH?h)oO$ICA@b32iUpOv#7K2@TPI@wB>#H`1h~orK7? z>RV~OrB9qM0N`X_{O-_lT3sxH5hDSn1O5sg!acI^U7bH!p`3_mPmqsuIT8MfcX^07 zlakdENca3nj8utH0Txv3vQ!GulAhwS$VTS%S0-9_xVNWk9aH(=-F$YN^LW)n9JF6G z5h9LHWtnd2P{SAjKNu)CMJ`G3Mc}nKQfjlUK*h4i&pZv z5+f^f?O)kGWOdIUVj*LHhlhbi8dLW>s2&UF351nX|9tptqHiU^{%-WgQwBN=iV+nS z^Kt%_yV_*@r(2}zQp5^W>t-A*`J!guM`#?I_~*X%*A%3Cau_iobDX%GmET+f0!s0I z9^$sqynfrU)ftu;V+l94#XHI;fyZC*^@pLjxP51jrQ}}JM7oJ|&R1>C2Ma{0NtaT| zeSoV)!ZCg4NV~es5vdlKC+ae1%mn29$Dm=dHsmpFU)vd@xL_ukbK;!HYZ|R_3}hXt zC})&2QNMNi7LYGepND?7rxXeH(4tz8LQsrwvW)U5b1*gvsIl@)k7n-%I_V$e7cCZX z;OR?H!V3I5AGHZxum}qAb$Z>y%XVq0r>V%F|P`(x)7% zu z<<8Sig*J$rkV{g{IZ~=?rT4k(tNdn-Fi4YgN91-Ix^N z*Il>bw}x(BB5W~v&plYGRQDuzV3LQ2=0lYB^+# zgaSaWU~gmWab2x-K9iHC;R9ISHj}ahHu~7FA34jPWG`=fcQb}`SlxCYQ*TZ%PWW{Y z$8}KEme~N)vM$X=x=sxxGb`Ul__Z#*|JWFrl$&x*e<++qi0vb4y>Y9rBrax#9m`kd z7pKdR^ht;B6CuOAt5nco%-lc=$0ZuBiGS0o^1bYRV`h}(PTghhcOklA24)Ygti4x( z8H78wIm%qy>ngFi_q+)7U8K|;7S{%uBuW$J*B@c)XU1_21iDPbb0Fy)gQAPx3JY z<(L`rXQ8V*l})XohaJT7mkje=qGNm%=ukig;{z>~H2_rT%63nugGW=I%7{Ba-H0#F zeG&Mw((kO#I2iQtI-4Ix7$a*S?Q1w7H0mOvA-x9w5`J_zq7Ibvc|jwcVN3t{+x<*+ zpwfsLk#7RLQ}HEsIr(YKEyV+=Wt|_7hddQ+*Vjn9syS#EKG}G<6F9Ke0mXiaF0DsI zS;8NNr;o`3Bn>!{S8k2MycbW=!FQ*AeW`nZ)&LSUTud0Zwr1)DpC6~zeDgZlfy=Z4 zg`)#^)MGu3;v$zHc028Q@)&5tD9te(^%s?p_)$Md=X6-3H7;a7z+X4NXSFCP_ zpn(KwYwO}GO_&_V1<%?+q-)w7J&RQ_==AU8)lfOP)am7IgTRn%#YV1j+>%N7krS2VAW)i{*bbS{= zo1|Z_u+V$|D3J8|hl6_po%ln_l;(678KBP!=s!MOmerkAqoTi@T{Rh5xF?m6i=hE6 zWB~lKbJ*|Z`U)wz+eC_rRyo(xn0??+29aU{E+Hg8-fgwOA(;z1{YndEv9%=gKhw!8 z$rUX?+#%zf?2!s|n}I(~El;)`Bhxb=MpF1iR517jYG$Du-W4O%;f`wDYrnfZz#qY_ zSpHcIZgy!HC&XXLkh7xA2*hBNd7T+YI=^|>N*NGh?}Msz;6er6ImL*!Okqjp<)36##)>(V(eGhKD8JJ64akr5iwC?8 z$ecQO`Z)6BEI!To_PiGViULw5+xY*g5^coglsO?4Z-4PV*v66Nw2|dK6C zj>U!D_>Th3YvM&lV``lsJAA7G6%3H`V=fAZk+$%R+pK6$7l&^5-6iMxAnKEgZ*yN+ zD`1169KxAU(EhX^o-=b&W%Em5-j+Ke)Q39h%bU4?G~an|3n``WUjfzISk%F0ne3nV zi-v0io8$$q4F&ukGF7Q3@i9i_xc=09+PT_p-b#mx=t_@hAH0==ht_rti+F)LyMs>+ zTdR{#t>utQSY)8QbO(yT{zWVv1*7r>5WE3PBroS__?0ad<|VKLn|dox+=oZo@Mg7F ztX*Q0GAK<>j>=AmYLTv=5nyw|U_eR4MEa_tSat6RTH?|vzIheZM$DwxvF0UDZyJ_m zf^CW^7F7>*;~}LDpv7e;e&s4Io(Y<$C{YWYapN^wa9}LLOTR^!C9DCIb*Sr z1w!jzBJa-4+j9Bl7eEI=_JM31T3n<~rxH#Jt@@p2610jI1?toz3mTmdR)~Ue3u;Yi zavGf}SmU|IG_O2&znz%*=TIx|nVr)`y^=g&AX%%+^3Rt=XhT9go^gr#oL^}``BPFh z?UVATgD=4K!1HX_7n~~uqTzN4Xi1`QW{ddvg~`?IgQkmAA?^X^(J~UfNvw;DRnAOK zP5!Q+lx_BSgl?CREEfP66stUkn(CUWANLydia{Xr8j}T0+#}Lvh^bKagO)FCEw53N zm@dNF7W5<1^E&_=;*@z_8huMK>EE`@eV=A*o4y2Y&I1W%8`%lxR+Tm4XVVFMCcjM} zeB+ZID{1#x)RBIjmb-;e%_)#BA$cY3DtR#gCB(q$Q;o~7OL?JLq;md>-$UqPq)2A6 z45(`r@?A5*fu-Zde$w+;#Q^wcfjERbA#mD8pgRQ9Nxog-v^9B%|4s)0*kww~!_Dky z3ZKSUAFzfZ%5rQK)s24Rh^-ERmKptgT6L_EKXEcNW=yO#afuFw@2D9S;1HIWI@N7l(J32tOKq^VA7zmJ=!{NP8L!`vTHaAeIbmY@=)4 zbchOh-wg5Nhb9(l?dAyQ)+K@>=OJm)s0)SLVc(In&s-2{(=APqMaVy1Dqp_SP;*ss ziKGczr)L=$BAWW)qiAYFcv!8ki*e_ee91=!bw2EWoDkinwW*tqK$uO{zYWQ_@Hkj| z;?lde9@e-E0D@b@=wr*+^=EO%Qn9%hMxJbLB7aQPzlOE6)_Z-h;&jM+uBgT1r|OEQ z58D+>h^mgDRueOmVwfX5FMx+=Pr-xSZ|V-XJo>k{Qwy9jFy%yW9E2GEpc(pR$ip=2 zw8LL>9i8oCi}d)%HMz}PeU*%G>(E043q32iveUHBTNb>4t)`mD9>40?{X>^~5}0w- zzH6yN)Js+4zrHdd-$Vfk+m{|HlDe@jttz`KgWS{J?);he<-!RS^Gi)|ad&bhD0d#@ z_O^vQs7(}{BQy;&QGOCls2E(ffbp4dwtATqW^b+aKnij^>|+Sm4}6nKe;Sy4E&*>p8}o!_UsPFi+b z%;`c}RF#OQZF!b4Nn>=mA%W{fEa7#KdovlQZif#}v&}ktv`^7Peq9pOC)xF#tv)_{ zylmyp@QfTG1FU7uJh}_lg>RXYpBagJ9hcXIJihb{arxcS=v=*#ko9UR2txVau=PLH zuZx;z^KSX&);+}NBRyH>#Gs5&1mLQL)~0y@!(RnmCvk;>m0@Z1q$~<8ys;A`mwoS8 zD~>tBW|GQ6zWugtEZ8D^b)QlGhO=3hyaabYK+%2qeSPKT+WRmS)y0qpizSt;Pnvm~ z=oR}|KM|+&0U_IPM)&$Xf17_)pv=xgOaJb6^ElLHDr`(V<61>ET3$HpKFX^?GUDUo z%z_swtpAL~%d+i~s!bYb|GD15L4Ef=`3^*X8Lic!ddUmw^0(uus;5gkGu8IS!tZzv za7ZLZYDNeJaWr7sHq`50s!B`Ir4~H$b3^URg)V-FKb~5S?N{|MP^PZ0eRhmmU;Czd zt*)#k97kXNC_aoZ$KuuX(h5@4ejccwV!^(8JzF%V*R#t5C9F>=k&VMA%`nU=7YN9z>LsIbY8R7F9ZGr~vbyWfSn zjIS}X+U-~4ci-#iG;Y3sQl2^0VLjd>Q5u)2S!euiO-`misWH-)6h&@EH;R)|Tu7Uj z_MYP|Lw^5(qPFqkJ|-In31)e<_%Bt={?7UM? z@xjseHpYHoGu?V(>8Dek4kBj4;Atm2H|4?A^U}!Bv@;c*#QSP2;Rv=-&gK*E=u>)a zb{_zW%!rtj;CMQGDdlJ4%tUOvSUyrXYh2)V%v%w740D%%)(82~vB~HatJg8!5xS;) zwwAFJ0`elM@sn0`wRe~_DKn=|Os6pND3U|YoY=q|3FC^IvH;PsMc0b<#3jgFNuI=NibLf;Tt zTb&fTt&T&&DThWH%j13L!3+Inb?SKbE+muczMvxIGN%t=k;V_vk1|e|84EXPH+tAQ zfn2`yl*8{f*js4a39Vy6{U$WO9p~yzh@JT#1^%_$X=Ww@i6!nAG{Pls%p80>^B;wB zCCSq7dSvCTGw>}1jS21V)AQ~O?!0GwYgdK1=u~PRho&lbHN7)QNvvbd=Bu4Qp|GSG zw(c`0f*j$bfPu#3(LZosC{ibwRWOAqxjLzAwJa!8PJeQG^C7EmX}zvQR)LzJ0;PJ& z{wcjyo{B^8!i~JC*os%jZomq^Azmz>=bXoSr!8Gu_`we@<=cHS`mqRhjInelF2B5y zrY9qJ{NN)qnxnpghqFsaVf*Qw?`VyC$R_>M)@6lwTXcpP?}_b!OZ!0Tc7}l*%;yMt zSeNy+@^p)oFOc8Xz2u+Rsk@0hn5@0rx0xv8!`#C6ZMGpXx5n#w%9Kky(Ti1pIq#OD z9ak?!Xcef5{*Pre=&SIX=-l=TB`vjPotb{QA)aupc4(R9r=>%rUpTY%jBh#)NNSyf zTP_Q19Y6Y&v^A!hZ3=sd_=-~CZY*R%60*BCbzvLtZ11Uc^$bY{IJ*rGGAbjE@$`+c z&bi@F$w#9Rnf2j~vk0wklP_T@lxqRadWRX=_0Ep%!~>6D@2~?77atIjGz=eqallrE zt*nO22sSAAN*kh;}Lgq$1%;!Ln(!0O1mn{zoj&Pj>b}RXs&RL1nA4jpK*Q)XDT6p)+3dOvqRJ||Q$s1t${EGi zXm?euygSMC0wFbc@NOL>K7vkjbS#P_>2>)YzcX($Xx+l8b3oF`zm5R(eqjMy--Mt! zl$0$P;$E6Xj}|40q!9Y5V`<0Ez-JZqo(-ZyK5Bovtxv2VCiFiIm;L@aWRSN2II(bn zaBfovnyT_c>C)OK(=>nv5xC9!xLv0{rG-D<@Qwcs5Y$xMI~Q{(3W6^_rpm`7|I`1u*3K^3$96*z{2{4(g zr_uC97tdm=8K}zN7C6o~FM^^F+6PPnVLDt!yP0zDms;a4{&*I_Sk^HyGLCoWWe+#U zdGCAxz52w-7AZwyzl-f!$g;9*&Y>1D(g9CB>C+vD@+P0-TvJ^W5HwDGER$nA0F8^E zJlT8$*;8Ur0*iluk0z=wqNEuZ;RG&JVqxe2r7DaDer$?E!PIq2^obLJs{TVv$)@rP z0&0JF3x5#bF0EfnDYxi}J$1i0-UjkBj^#0L^jdESz2`$7L3!y>R(Y&w$A;he`ed9l zevTU7JV9z+5_n%(ncCl23oLY$Yq%#j4Uqe6al$-0lJO5PRdQ(mW-|E-?!6zF2ex0` zDVb#~=Zh!ki&#XTdy zB>f{7BBPH%Bq6(xeV&~9K1jmLIK#XIf3sIB2-g!Dd>=Ov##IUMVSv+<@NDIfLVjP%1?*Ltoh{I z?kYpZn_hN)sqZdIBgQ~+?A&)$NW4ZIF$3{sDbxbFz=(Xuvr`_F1TJmlv$Ss&$I=TnX54y(&~5 zcW38ZK%P-le$(t?D&!{I%6%U6!TARGClPNL*w9gBpr1IQ7uNg|=KRa=$*YsuCJW!~R0keOUb=@Y%ICP0rmc)z5^S1SpvlK$Q@&!|H09l=za7n6}Z_dn-8tJ(sTe^?EaEVe)W9u=UB6k{*!=Ut3DRay9@xM1P)iZQd5=XH)z`!$zYH1z zkbR$H>m?bG)b9cz^x3T9qlU{redbEGU=E=UIMSBSLEr{GARtz*K{PNlNN+iJ}D?NTE@iaFCi-kvO}AL!-dI=icvkiSi3f z7JL=VaJhhG3N8wHjNlALq`Qo$QJ~t;d$rxB=rH$iXx1}WW-myMou31xK|gfK3sN^x z|mi;q5l{De4?zv4003Y`cW%ocsCr#Y#iB4S)>^z$-qV^FvBp zpaW85B%ZtiZghAHV2+|~EN~5Hw;5DL+W{Gezv}4m~J{*2__Wh~*#Yo2W zy%RBaR)0*$O4|zZRKP=Rq83W(Mlf>bLm% z)PaI!E(Q#F>gHd$Y_6BDEM%J*48~o@4Jja7WF0<*u{RtqKx#hP?{b+k%-uea8J!As z-PdyY%-gZzKp%jV_VHTl9}jfx_47FtZ-*^|5=JvloPYf% zvE`GE?!|zkFX=c-bQ@ebFVbnhw&jXDILd;CG1RGhc{xgwCtXxLK|{&f%nyCg4K()o zfR;yjjt!$7@@+Co*)80H^B{a6&!pUTFpa|pQ$caIfh1TKHZ1U4?(o|#s#hH+VFy|s zOWz856KS7zMz!{ONn3xR_+YD z|7bPP{OlGRrRK-1FnNvT_vwVTDbv_&hiWS6;r?CqI1jyljbwZv^h6&AqY@17iPQ{x zTs7;nsgFSF=(4?w7V-N2r;2o^qc4s=oOj}ZiL7(;K9>f5j(Eg@6F0CBJ-4egpN2f1 zU*ULV;RwpIkD2YSZ&u>e|1d^HtqVyHcXS;b{Nuq;nD8U@1hgzWTc22d*puJOeb?c< ze+`#GXUqCzdryZ6p^eEq1^~;eGgciAv!>c6ECW);590$h9ni!BWvc!)G+AKez8F-e znisLDa$ZFION?QcVZJ!yYU|a0!>KRvJ&##fiF?`2?#(r??)vrB{Ef73xwRQfrl#rg zI;V#N2wS4OksdnlLXz0RC?}(KLZ8eAm*25B-+{Bo+`Q#Jf|gbxJ{)yFm00Z5Y+j*d7P|RYzypYU^u|F$j!~6ZG4=?+)KJq0;=DSP$BR-1Y@6;; z7C=|UW;$fPs&S8`MINz5$6YJZes(chr!Fe|Q5%X1r;Wy8$7D~y2|Y9hPHLSd zUHQ9LgOG{lvp&uzA#Sbh>=#idg7xVuGlzK(y!V@$P7L%a>4b(@cgOb@k>kUP3WT`eCo@I&1(ioBRBb-*m3A0qvbfVv zm@FgcELUW8d=}k}-<>Re_#uX>UdV#F1}~Y_Uf!xZ+s=BEMgTQSEs!%vkeoao)W0G; zdF8n}D85x4Lsi9Pu_26;oG`0k)!u6tBgtCP&anL2vY780g; zf>ZBG7qZIn@~}2rOL#Nbpo&h-b3kHc%$4Tz>oKMebTZLR&tF1m#xF??C>@t+gf z&ZRizz9TU zI6}fhck+31-uP5ZSt*b)hWly;(r{=W7N@+`;W>5by~Ep177*ftttDNsg3t-9NT1B? zTy|J~L&kf|R`PX#$BiMQ*l0hgES1TZF3HO`J<-<~)`M+9%5%O%dG4a~Rxbzm{^wt3<8Mav3Ofcn6=lMn>(X*6yVMSUMc9 z1jPkH=Klk|(siJ54qE;)3;<&vzrfY`dz=%0)E7A=k+a!n%$h0%M=1=~veePUl=TD- zKlcGK*i6krQjV>p>Y<>7nC273{#CbH|J#=GGR~CrROO*r6NjSHjpFRg%zK6BILUFf zKKzeta>nWdc7E7rN?6JNZu(twjK7Q#MY5xq5%*a>#FXhA zjJ=fY{R0;Mw(K#w?tAijoTOyG7>y?^#l|9sc;ey~Yxcc&vh4O44{0+Dt@ef%C;f%a zXJ>6%gt^=(hZDMqIGj_}t_(SMWf^r*Qim~2XjG&V`NIVd{6!lh&NrmqpJO*c`T zFgyFzCvUZgtasA8_5`2Dp~s;Xco@>_Yl%qJrXNu2=r>0n>UpWK_C1|(Wb>EZLJyB1 z3&AwDCT6a?frtxnlD?HKZGOG!6fHvMTfw@bUBO1@{cQNuXSDj>u?P?qJ8{Kt(=PsT zaF8G5m+_*5m3A4&d=^S^1y4gq8-z*Go1|AUCLNdWRb7!Qy=jUoiZHf4jbv)LRcUC< znmmVI2t)i`y^+#>HB0T{x204c!^i@{5#*yhDWo_spQ=r4TlzIo3rQV; zwZ|6ktOpfXzU-D9z6KMbDta7f#pVuXYx?%*-bSrx2X7b)kuh86HubpVXdjw&`$fA& z)~KZ3ymd$x$H1|YV!g-j$f))XR)VeLlD!*eI4^t=zi#^ORn+q9Xl2GhbtOK@?VcIE z6wc)7a-Ea^e8dB^V%_7qe_Y>?6-wa0al8Bxkj5%aUquhRE?wt!saMpsmeFd*Y7#Ap zvO}VkeQ??4H>F$SE8biOUy+#x6J~Qr>K8rE`G!>>eKmlQ6tFv^A%EvVy8q{i)uoC+ zJt;V?w*T+`NnTUNg{^ujgT432&{iM`t z>uufbeUMn+rjVQx+$LAVe3U@}<@5e-L4~zbNrimm!i*DcAY1;p&6teE)FFOy#d?V9 ztR3I$Id+R+o0 znqr03nBG&Ro7T&mCt_ee^{y!%uEbtPOme*8koB$tc~HNN`pO*=OI1!*SEE06Jo^0Y z7yE93{fEWQ+S_~Hcm@)e5i@|?QaBR}OkI?ZR4#5e&G4&!M$QDA5dEwkX9Rgs03_z0 znL+g&KRq1R@{1W)_!_)WS(A_A@QuHC1*^u1)Ys!Ar+O%g+*dO=dosaD#9w>AFQT>i z_@+;%&Rz9(xaOQVLp%qoyOqnywX^eRA#2Fmnpm!xYkzz_hyI&%!RGkJ(kO*D@zrlJ zDuuZKSIMo<6 zo1&AaTC`qy!KmG0!*icMh#;O@(U$Ge4{s%t9J9`QQd@)wou{gO!aBo&O0MC(RBd)M ze`etQe%-X8tHvSV{PbXQ$rEPQ_@5Vc0zF^?r|eU!E+w zNcG20RPK+%`mi|pR|+Jf9PPx;_m2D1Ls~lzi0a&pYASe1ACG)eDmRmye(uR<@w|z5 zT(t*o@bnw&@3JRgtauANNjRHv>Phq&cGY?&hIpT_t#^g0F~@PJduqv$uVsscc=8BQ z&$4^zP>6|ALNZVyo9y~zQR}D*W28bQ8aGXQN)2b-*w6|0jRY9OQ(=W9M;(U$OU>bh z&FvCMF92p(J$+fgI|MdE0JkIn>=9~d2wbGOFNJ17Ued8`WiVL+*%J<;+0;_*fr$w% ztBj7{1sU{U1~;+6-dHtNjGq>0Yejztwu`IL$99458L}6DdNB?L#P$G&?z-P${%#Di z=By2-(L_mX6!N+6EtCTd_B+rI_`Hs{-06CJgVx#o>>;tx7zdUr`$85-U3?yYRxX!2 zps!&d1oNtwXK~AjEuYJ)nik18#e8k@?>NX$<+_ zm|X2$U;>*INfJF>ZA1EZb{q(eA&{B*&ZlR*--P}$#5A`#957oN0nIE?_G7;UW?zD% zjnTVoX)anbyTDN$A@^Z<2Mpdp_V2|HOi|c?&fjHAb&{t9V%kjYoz;sCa(YP^#!gt_%qQ&UJAe16P4nQO46CE``RMEd;Or3o@ZO@Na!O)jz z?CXKY3#O-|Q5jx4_59zR2El-hNbmy=l^$0E*HIl)Afx^LB8ThCGx!-a<%_oSN&7ht zI3$rnNLS+4(&qDxJ!r@rj45}mO9P?NJQMn|33KMH_GM`3=(zR)<`3hIHY|pSP2kw4gT^L{jigu$HEgmyqEUgIHKbwK@~P`!oc=D2 zs6)iGocn{vn&R1EiZ{H2l0a8>0z-(M<*tCUp?q-U0vjPO8_GcRsvA3OJ=OWS-2($) z>cUf_J%JQgjZW92tx3TM8c`mGe6e&Zjdt>Nrv8d31idi}klAvCfOXnidE~zJ6w`N& zqU_DznpG;0_mCelojZY}X_ zOq)2{hTB6G<Ef%Q;lLGs}e%usq2BK5PS348i(8tMdQ$MHKyzLlR~I zRwI_c?x4TMInuYaojY*x?#D!OAD=x9xNU7Kg2%y;4_k(I_U7=Yg$ny6x&~B?Hs`3p zZ2rc%PuuCsp3BgtQXplNwtw9r1hOcH;60Gpu^^E}l_C!BP6N;!on~FfJNJ;wK;KVasPZru)~n>alkZOJawQSd_=DWZRG;2lr-ZKH&=c z|7qu1quERoaHq9XnL*I0%L=86)@a>Q(jbbu%|uUIOi@i;Lbb6Sq^xv;5SLb!DAA-M zs?;Ub#8|q?o}gGnSIKDIJ2Nyy(J3Z~xOLwzGrMQc{@EY;?OO`NVY@sS;nz-8x0ndy{IJe`OHy4GA=>Lg5B3h8z zj=1g5m4Q{%F5h9mIZtTBrba?C!fDs-71VQ=id@R6$s4j4j**no`7O`;X?Xrncw z`zDM76S8hEg#VqymTk*_ESQZ>YfTe+NzkrJ4-+i_QA`(4E5*S|Dnr@TEO;8kZ zxs&-^W5@_Yu5)*RY7s2;{D-$TM%wb}`>Lxe&_&qGRBt2Fp|47UcEEz6lo{;&UoTnL zb!Zl^-wR-<60nj^Bsw4nwbvy5)&l_-q$0Z}Jw_{j_KceroX97bT4^H~Jeo}Fk0?j~ z_Yk#wlUJ6j;g+q?fL-V-@}cK0xf@GRoD(2x1*3|hYI>ntb*CaR+wK~H7C=ONweV;ILg zpyqC*DqKZZYJ*Rh!E;ZVQ>9xfyDaUnV(iI?3xlyet74%SKXM+i+h{6hA<6}C#s^tq zHLsbxI8U?O2R0Q7|@pdzH0o`{(`V>+e|&nSZ8=R&A5}O`5CkRK5?-A zz7T_RoGRW%=>}SGl7zYe5>yY+$r$AuIol-64}X?=RQ>F||JJ5h>LT(J$f&w_bfRu+c>{GIyzp6046w>N}xGew#?V$f8P$6#9Z|Tzgn!y+w?F%a^z|kay+)p{dn4u0H77 zH-t1CpxeGjH7KpYFw1W#fjnOk(sH8s{6`a|%{)Fk@ea{10BjbUXJLP+XBT-y4{~Vw z#A|LMPT}TwrX^Bxns*-VeB&ep7cTV--Nu0>Y36^P0px z`t2Lq90r5eanZK((3yE^IP3&iFEu94-y?b>P!Q%2;VbHEF~x@@eaf7w$>|%FxmS~V z8V3OASy???NICwlDKspCG(AXT3e64pT+z`2v=e^gg*wx`-0{PzD+cdXZeSN#5=9-R z(DZGr<$U?dyPeC~*vb-W(5cf(_G{6({yurVdmbpvcCJJcBWgD~;JN-0f+*uK# z89fq;nrG4G>`ni=SlE-@$Cr6Ti#uovukT|Uo^#6+NTQV&T-S(@V|izPI(U{C5OYEH-T^V8iOVBR+F1Cj?_MG&np^z5E!z?s7?uJAKs&xSbPI5_)>vg)3C zXJZGB2zEjYKb{?qS1W);lFee`$u+UYgzc`(J}|_kN^Oo3guwq#5b|q@$p1Pe{QfKd zUAyvInz1!RLr7DM7RUmkvum4Dl#d2V10MU8I#d9R5)X2P=q$F&H{CP9o}UTyZTgt5 z@{JI#P(bU!XhV3AAR!7|Jc3$oB=V=S4I=m);Jj1|%lf633@VT@fCU1x3b8&+s}?$d zL-L-U5Y&H$jpkIA!vMK&J$KG=g6n&TwEj&|M`4d6fpRdDsAat;d3}wHQE?2B2$*L1~Ye zA0Me)7XJoPgRn1vo~{9a_NQN#SiyjbsSZIrpabXc9q+ve*pYK{Wv>MnXok?4zf{GV zKbZk3c6=_GpP?)cv33bdHy#4k?ydg3bh-`~vR#8>oqxwN*#F6s>FoLHYRtHSavFD! yQC4#5KkV2wPFaEuv=9AkupG}Bmnb?vz$0`Q&c(H?J_2QxyL>%QpW?cQW&9Hthqv+o diff --git a/devices/surface/images/secure-surface-dock-ports-semm-6.png b/devices/surface/images/secure-surface-dock-ports-semm-6.png index a2096d0d8169d65fc2c2061614487870d655c547..c5f6c3ca1f24c9fbe286596127a2808b5322d728 100644 GIT binary patch literal 73947 zcmbTe2{@K*+ctVrk|7PsP(n(QdB~KZgv?4R3T39uWJ=M1N`+7|HW<=itPmkGWh|A1 zC{u+pWXiPm^Y*;Y`u??j>;KpK+P2=ehwHwt^E!v)*pGeRkL&V2{k5Br z)-IMdqCQTpxSB#yRPk}OusUhu$!lq2=iscw_q(u!kJrIkiSO_ZJ#jtPJvR0Znttv! z2mJJnto%+|$y@WODDx`%DBug6Y&$?$)*nhH4uB+zbDu#Aom6>8cMbSe;%+A(Ng6)dd9ttD-(Ek&fHr6ok@?=7WmKSt^a?1-oV`fN6^CYfBZejOpqcO#dM!iM!{JrxTIaiFca=qv_ zsPEc!W%(6tdWLsPRaYF;3|#fD)?sWuqTct~(=A&zmHzfH^Vn^h=-Zd5wcH~qjWatt zJ1+3VE^a>RADeO-uBSBPlztNy4K?zoA>bSv@3`aMP1IkrUo>Jm9zV2=`m3Jv$Bi4j zmQsJ={&gQM^&fn_8Vr}Hf1)<<^HP6g=&T(T$PxUtQ`@hY`WsUp#|lBya8ItCUd*>@ zgFc+#S5)LG?6}_8FZ7wtN#@mWQE6vgg7}ljh`G!44C&d6=mlMn3a%;TM_rfxFDQ* zf%|&cML1NmlmO{k>spSXnPL_IH1Odw>1~ z2A{Cg+qN{2W_GxIrBR0I?edV7GhrdY!E3m=_07$>Ls&MB{$7dC3JYINPTmsWEmkgm z>Do2Aee9yE@h8G#SHzlC<>JHB{_iu7B?Sgj&Q5)$$1D_j|E{#m-k0ZWHb0&jAaUle zr;N)N-TK%az7wr>zQ12ix+)~JpK39?7!qAT z-jThyt!UIw&`9V--nqkzotHoKyp2QJewA3stmMLMze>UU-vN2QKilY6a&Hk3pr>TE z=o~q+Ui4ONC;tE*({`+{e(BPst_yRMV+}ihuVQBpY5uWAS~{vBVP|AqoKAwmsRxEB zjEyP_ir(#R^d9{U<5jD9cpC5S35gN6piOmf#{x+DPr1H0HISNqMxBhPfu`bw%r*}D z`7ft`ug2Q@_{b&sk1}9u$E0fc`6*B^aXyON%;lwDUBhEyG~L}LDbYfQD}Q*dS-qO3 zbmn(SWOQ&ax=?>AogwTfb5TNp<=c* zH~2k&zQ6qayS=-INA{5?a$GE2EcD@>Hnq-q-6K9(#=`9$jY@xheh4+mwH?9Czs+~E zBAd_ERlHGgj9ILBitp~-yEw33zrW~Vi|2KCZJ<0m*;0Ap8SZ&+_jl^n=?~<47KoFF zooU~avGHU}hRuhE2M0et3uW1;Anr4Kd~|fwXR^cF7k_c16$XkUOO=yWCN+jsSR!nd zsc4j2X5)!9_w8GyoD??FT{TuO+nHtmmM`PQ&+QA3O(xqtR+90=$v9aKeST&dFgO0^ zcW08uwe=C<;iaR!wYPVAi|#n_o>xRf&uZ5{n?}RY(UH&fjYBflq1S!&s#T@y4x8@A zu^RDvS(mW$R!5;X>$-L7STETQPu5dE-&=ew3nE(uK>%m{)WAoZw&zas3bE1-s)mMZ zw6wH(`uf~whVr_{{Vs=wZdO!`-?-Dub?}qK=VvGPBFt&&>)XD)r_QD56Tbc6!=_w2 z1KK4^OrD)shY8`AmVO$~eTzh*OY!HD`S^LmOU~|fb`}*B6r4XpLqnsscdu2p@$AWf zUGv7P!>ac5zKI_3QA|!w-dEsm<0!MiJoDC`5SG&HV%*75q zGpP*FQXO+_<5NZ@zQtpP7(QH`v8Ed**q1N%2(D;HP7UWfx{z1Y%$Q zRIAcIWPUk>jHz0FbGqh*riGtIVzUA}Cno0t=3eBF3w~WiBA2|kL(g+^)usQEGNJ;h zKhZ4MPfOhd|0S=)SvHN^8ln3~PR?_Egyp>H?`He^cmRv+B_Y zZ7(mGA3uKB?OaRlwOTOMBZnvQi1Okp>h)Xy^Y#5(|IJqan_K_iDeZrFQRSidvS5p- zgIqDGCbp-jsYA13U-Ht|;>^0uTad^yTaIqMtZ8h_fy9;6c=+eP*YvQhN^0DD{5UUu zfs0Pitlc6@7jT8lQuXw}Q-(_x90*Vco*dc1CT6aS1L9U-n!*c}aQyGR2lsGdDN?L3cd&t9t?R?-p_KeNPq>c)!GE z85xh(G=bnqD%HgOA_77rja!N|Hi7<7s47c96@}AaEe7NYy zvlBKltT(H=_qPa<>5mvQMV1P!IFGc~_3DBRn2&*=UY`8@M>%Cwp~jqz1i z6q#p+OS=+eT8s}-T8an88+e2ihCwmi}$^{R*(k4&gbP9$pku~?c1*)P4O?n zqyB81yw=uMFfdS( z!FqbMmxQ(O@Kw*wN9FzvVq44IL6Y5#&EP%CtMnBA!^4 z2d{X1tYqFXq`#%W!!FezN#DpQD&QCb06>gl=>F&@!^5uU&!2ZKFb$g65PYs}sIq$` zJUaT+&3i({dwI@8t=_CLTqo5y+-jGUFyu-eOFv!HEDPHKVRmZDXW`z(lnQA*=5pTc z+ZhWx&Ndj7w>>;4WPWD+pmYA$;K-W=NZTAcy&UB=PFZ3Vt>$N^kwdoX#+0s9ncX$_ zcig1df4Y_BiSC*44~I>?T5aSK^f4gDxw?W5XC!OmlCw%WH-#-G23s9FUW^NCoc6=Q zZ&px<-F{GC{&oU3fMyU*S8^BK6T=j3ENWx_&i=@-M;R}!I5em3N9;p1BN$?2WQ6j% zvhv+ihXc;V)3(kp$3HSg1S&4fj$uH^!%Ezz2eWfG>K8bC%GyLiVz0X!0y!eEgdQul z^M?~De&aulGR+eS|m=Z%Bx>h7N#2+TDD_wD^7B^F_(AU3l*j9iZoD`uYDVpd7gbj z`OIJOlOKf#y>^DH+$6x+JN zU0S`{t8h-_2>Z{cRY>(|B2pfGx}Tpqlurz`r5|~=Jqbu%UTrJp#C_h7NmEeJUOlUI zd&A~u#=@T8n`lDHcdM$>0>Mu3)YjGgsftfbG*A9}B+pq-Q*(K+1vcZs!H@B{o#9Kr zQ%JOg95%J^Sbt-hS)o^&a9f%I&)L5}1W*fjwP)vj z@e4&^67lfhqcv;Ssv%a99sKG%U0sq2PvGtg%SHw=OLF|iPb?(U;w$=Z9Xo4*xS$&+ za}CEaAmQ!Xw?)HcOpafQZUaMPd;T!IDQr>}yW`}g(9rJ64K9j9bEkf_-@Ywnmvgd3 zbYWWOmMFina$-d&`vJgr)ba2AtfkV2R4OEnV$lKU_De`sv zltmMG)aB)Pa<6Fdl%;J$d<~#CzTRr&TZORMi>RTtys@!HmFCQ2C46STN%7QjEWl>q z;}hYd&+8WIyneOUyuQrJz{DivKByNb(;LEb_W1bE4+K}KD;pq8BnunGhYd8kN!iwQ z{T;|mvujK=_3k(|JJlVguH16s*}FWKW2&mEQ>ebCP)8UXd5%Z*9QwSjS(;PH&-1R; z%hQvoh^gef;W=(TcWRS#c(>)={rlOij=)$=IW{^O#eYw9EgYpF1NCNZM!khFjgawR z|NUh`hco_^3>qXTkU|1j4A0YlLr2u&<6{#NJO!LqaAJr2E*fK@T)upH_D{0`GAjXd z{S65}P|Z1ge)<)N{!dc3r^0P%hcz$##%a6STuOS8(GdFIy*%yxtMIq7g7+`oTcT#4 zN&*5RlE!Yw%6n`Dy1b7XK)_Lp>_L~Jk!3P**HFxzou9V5&Lyu3V2n6;A8ST7rq|Ht z1o!x+!r#TU_-2|<*;e$SY$C`97e0M5#-^`Cv@rPMKc@Hb$x-jmF(*Ght|4&~HAjrJ z!#iJkIY}b;N<3Zrd@X;*I2l3c6v;&Sz7N_t&K7uaB97+ z(7OWtwC464n^1??RNszMEeSb;C=+y>rR#y3dAx;1MH~K1`}ft|ma507b8TvG&RZcB zrIvpcx3aXX>#L88!-DTvxlzG7Hr2uF$GeKhW`)mNADc+!?!T`wpPz|E!5znf*v-Ws z9em`~K902Gj7u}j3MVd3`t>Jx$I{Ku{SJuJPs?p`d-UPN#P7~d>~-I}a~^$l5*RMK zsHwe-lT5z&% z0|-|obmBNR4|&Dm8Vu(rL*_^slUNM?i#x1puq`jsfkWeNw}pj8pVDNz)yIbiYfFAl z_b18X)=7Rp(^YL2{wi@J%$h97-ovwEFE}(W+p?WTu%iBlXDsVh-Qki;^Yb&m`^>yM z4knLjZ>E_ZZ#g#CQj8R=f4bxRt>&K}9wiO?pj@sO%EhCEywHvV^G z?5DcNkA=xZVIPT(N)@39#c%7e?YSp!9Lu6xwk#GIi#+8D+4g;dzYl1!hGPmbk+A^p zwvLXE0|M;r9~1;EoW-|ze9E#&d)$5VsPjlb*w6Rr2fiEUId{yCd;fTsQtg(ojRvR2 zR#o*p7Jd5j$;{~5#*)S7O4U2M`nlRQ8bNi?*nb9E!m4-z;+N2~G(C4ZT0A?dL!z1} z(uicq+1AA_*S2c@1@fWzE9GUNyD&th!$vg$4z`DiW1W&sJ@aaWww^i5zLv zVypuCJ+)#b!rwNQN;N7jDMit$1&Z0?c6+;N@!Z5w%KS)Jz}kXeQm3YdEqE8?7fw-5 zFU-%S;{B*Mss6%N3F?~6f6^vi7d)y1=Z`a*0;=);2 zm_*oE=-i{K`n@$*fYM!gP00NW*pPe34ychvQAoz;IKH~`ciD>dYXy3w48_ZD*V~Q> zxKOY~D8pf=^;w)VHg)4#r!uT<$N=uf;j`i^!yN^ZMb(X2>((27wt&Rew zy=~niQ?<`ee7Mrov=5N9p=aXC78x0~Kw0$L10N`x z!9ho?y}Rn3Jtl=-PM7IFh6Dvkxc6xKP5!DkP?=K$R;aG25!`P^(xi<#gC^$;7XHVF zN9>z5u69+hA4}dF#?8#59Dn%OnP=}aZSvaA&1URRNjWn!QS|4Xj_K*4XF(Ho*4E(> z5$DRk@^0H!UGiYlY=F*gQ`7j8HpBgEw`>3q`-(3T9`y}yy0%S+j-eWvK+bEBBfKQW z0{n+&~&9BiOO*N@t76>tB#$;3D~+g z6lvWzBF}T^yx7)_754p^o>pC7Kc4q<_T^cWaM<}^07_?0CW2_ygf;2{o!Wktk9SHOc11*UVJaAevn=+JaHOMHc(smM121WR{wV`xN2#b+J1JF81obkAB=`^8(OvUQ|PU|1e)b zPjv+2eoflpv1-Gz!UZl#|FiHwO>$U53wgr=0o+~Vw6 zBZv@&gn@NyRK7CxJl)y-y>}249RC{Mf!9Yf#whvHz9J9y~A67}Oq zbwSrfjI$_#JHdM<_p5->ly+{PV&)Thao!{mP~ZKXB+r>YZ?y_HzQhitC=Qn{dFs?Q z5!JGtgZ?YPcJoB>#OIUqyE_G%5elSEtXA;*^Ib5^d+2jCSi*Oi$5a4_e>B~_5b&_A z-NEIV%rzgqJM%4bdWyGxVT0(*hHRuOmmruI3{#lXkM=WaJD3M;VM^AhWD?s)|T z)A!xxl(MBXVFC$uS@5|;yYRQAghRpoe2j_w{aRHe_+@fqLiXeiLQ{$W!GISA{IHYWu0f0t-p9ZmNT<9edz5SqN zl{6$xRF4n4UP z7M6xOK_J0!3j1Gis_Vk8v){&X&GgY1jHsni7fL8E%zA(bpPQLfaUPxp5Ujta9{Rwv zKoTRHH26JpST9!kD*@Oxmd3~5KiFS1`bLQ2KT^S7b%uv9SPfS`efsnom~PCp_2J=6 z=irc#q#^zuCMV#PKIF|h+K`nzGKU`!Og^3wwmB!1t-IG5(;phSGbAAp9UwX*vbau%xy2c-# zC_X!d?cHu=(aBwV{ z(w1CQJs$6pwWv1-2%VmkJ^8UN00exI6);dS&V|5ZkFtvl^J5TUPOcAj`?yeVkMm9N zn&>Byx9iue8Qrp~Ouo!A8+`Vx*~RU&NsU!+qJ^LXfY!ny=p$>UA4p>%Y_x4|w$F$q zGW_d+g_+LCkGbx>+TeB`;MeSCo~uQUK2OFVuo*P2a=gO6B>eWlM~7@0;^l*u?O9^< z(C9LfWvYIHwzl>gL96G+!mnSy&T{Eg#(*^Z{QkPx6wmzHiOTcZ2H8|Zd~*KqE5g_z zRabz3CL{6n_4P;XUG*#&_~Efht|pExK;fW91&(4h>#sLID&<~CRo1RVDt3p*rw*tIqxwBLxtuKt$)1apXX58EuSTw`PqhQZ!P8^~}Uj z)d#W(@y#g3L586^>gVf>BmrHpR+^ME=eFDJym2q5)zRA4_Ga7Xl@;qyN&}XG+N%_2 z256~%^Je=*ED!rJe+e8SC=4Gn%ygWcojKM0{h)Zhe|V6outOhnFG!!7bQM&ATX*GB zdiw6MY1hII6u@7f_RA;eqpA+Bx7{oz7FJhR7wI+gP?ON42rrN}ru>xwHVzGb_*`CA zMz(@}8Y{#hM9ibl9p$?}F(NKR9;eLN9 z0s;QKxweK%ivRzP&G}@}vJM=6>AEC8; zb_Dz|mx3oipoTao0q|g>VwU?2#Hiz;IqG0!nQaW%!q3kiboy682xfA1;KhqeiKw{! zaK@m^#>Ig%wQ$PnVSW|4S3+xG=9IjMnS2XzVi^lpb$fvaA*B$#uqw|k68v(>w5#C( zT~DS64@y;WQe%fH|J{~r*SPEsK1lFZQIR5{OChh^-TjmLDDD>7!51$oGF)6c^LpW# zKbMkU6yZrwWIO!x<{x#;NdX8Kw0d(G;WAfm*boZZ+%}hpI$=|@kb<(Z#8+srlLam) zjj}g4{gN<)p?=vYl$`>a4+!KqmiiLL^})brVN;Xk1>i zs##is`NE}3%O4*)c{js|JB&W8>VgGFzG;SP6{uoV+Oby-lbzW^d#X}s$!A9y)ch+; zk@o^;vw3l<5ShUi(#S#SyG)r_T;-uu8PeN99}1Wq%Uh=#HtCVUzU zCdmLG!U0J9M{5L7`dH<)WgBaMoVw@WvnV>5+@>mk`%?1ljtH|sOu#Nz{$&hH0wxgL zeE0Q(PmX}F(otOY+BP@h_HC^rM~+->pw4PU?$-3zW?8@t!4~@vwz{wTzBGS)Xh19M zG8tfXQ2J{I&2tC%*J{fw9@)$WA2#8|19#7mmU<}uiy-#DQ>FT@rhQ#!|1O!~u&Eo} zBK?os;<(i+nvGa_mJ4_=GZw)2w`8{2dezP_zwl=Hzn`xu_cj#r0SN zo0^(bXYyP+S$65_UJW>g(&YQ+XF?EEAaY26`vXWHRQZx+v4<3ACo^AG!oZ-Drk{Xa z!;9**qSyT`;Qf~~lV*r?KG4G`-@m-vNlIouzVj*zvyli#;YiCl#ZJ^4TOPoGnae3% zU?qYkCVw>3=d}S6oTS7koZ1c^X6vR+=fEBku^{oxgbDF_fLNiiM;(rs#Pv^QW^H3b zpaW`g=sd*J@ej*DA-;x0pKlD{O0^&i5vKvEtq>2dt4L6Fr*u*t&}O!PiX#*4*!KJy z5Xdkn(&l^WOutGN<)~N?0z%VETXrZNI&~jBO9g!)-Y?z5}Vc79cAeTXTYtv?0cS zN8L^2btX1pUL~cCk3PHsZj4bnEd!lGEY;y1W{!*}n3=N-_6*AMl`92c%6atR;VWtk zHv9@kLJ+bbgvzZ3iFLrxQxk124quAo0eky%8hPpM3bOazeFdOx zC<|*#!d1S%^#1)tH(oB{0{zNSco0Uwk!QL0zRAhgqb{^mDqFbWzHn)ONbe|=2{->X z$)AFiqv`Tg2;14x>ki#;wwI|gQjY7oYA@piyYBSS(RXc7?xMA10p9J&$Cdb18(Qpw|Ufb~F?fojZsu!L=RE><*A_iOCoufN2Ge5rG zt1tmcZ=v}7Ydi2;MGNyY#K8lC6|3PM>`hgS3}xQaJz5+8;Pm@r&=cp!k`}}Pkv?V~ zBVLc1nwqZwVBZqFzgQqAKr2`=wUAt9D>VBAzuF`v6X`Z#jKK8pDrzYg4-#tP>5C!Y2pm=e1M4yX8dE`ZZY zWW)h6yKG}zS+#;sRxc7$A>rIER~g3B7$tZhA5W2fG*1-b3O@{6Sfb*oZ%m-(g8rR& zTSzWjX%9Ad@v7V8wqkGn$;7G08Qce6;JIU~;e*ikmpOu89XxCnRQ~li0>@x`L2lCs z^3VDmC)7Y#1}uAA@(}hKgiy`lO_4olEFzV+^YD|r~x8*+qzxfU6 ze_@-|&Spf3ZSE$`(v5%Ise##@W#@gO=L3aeZqh_fW*aYOW>$=>U5xGW zzpk!X(W!6=IlqXJX2YD$2UW{K! zDFI4x_ZweDZs?$&a%`AnJN>1c^Wu=PPgPOlMgb*S4t6GF&Apg`+YlWP2R4g~0}Fn0 z>4mV4^%E@|lniFscm-A^Sy^^u_m%;XXL0|e>~hX98n?m@5cfCp^W}uuY8eVGHUdJ< z&&@<8CK4wa@XW>F;Oz|5VHT9ej|dxM2&kJVM1e6D244{a{~7WO$mpjoor%z3-a=v~ zLfp&KvM|$q8k&$QUWC5#-tlgPgEE%K{ud5PL_}hBr=0F1bVCj+}G66 zDerY(rywRE5CTXYar0)dL#(mzkxSJ5)T3&6kC|6q{x*31^V4JfQeZrIL5h<|<#OrqH5``B&ivz<{1A^(DD;>0kO$k52X>NhB0C#W$i(whN6`l{& zaDbBGNsi3iiX69UE8^unw3U3QOCX=Ob|($y9qfy^*Pt=LnSt{37FabF4I{W_u%nPY z5F6+%bkLmK-0AQ4!zgloe;x$9Tr4&UvN%u`UEUS_E#5lYSW`>uRsWa;sV2US`?)D3 zz<3~O*T4lPMi#Q1oagsd!4|}S2`3zQ&>f)5lASwVV4=8J_GZ&QrVed;b^^*DF>7#aB*w9hG{r9Tyw>F|D{EsnvwpU|PhZR}74= z;o>qq;Z0p*zIDegAK9gE9AQBTkBTx%&Y}8}>Md7l9%iC~x@!4H)*`$Dm@JG9zDmM` zn!px%uV)W+5DiW#FBp%%`pm7)c|2qBXFX;2(;rZO`TwyHi~1>SjM31+fI*&{ASTdD ze5enf9L>vtq3lqm`I+bCtiUa53>a0^i@n^w7m2r#NUz*sP-sb!fD*cw>o%l0r=RB$ z1X5tn6nFY84X)-4ERDo(N+^4j{@{u(An%PKWw{dO3wJ0OGv0$X9Bkf@kT#IGaKh3=&8&OW?HSi8@(?k4%tr79r&Y#+_yu&Vj#^ ztwUZXpjk4B6_q0E?lv-d@7513HjGq|cpe0KBWG}n)veUxxPkchK!EV<^cp-4x_utR zmZWRft}nj*8xah%TJ;qNhrzPZbpe=&g}JJ$^#~uJ#d6tgk(9gvZYLL-jp~dN_ex5z z#c?FAX@3Dl6=0!2@FusM?f?gGq7Ko}fI#_iiRxC>@#9mLB|{l`4ts#E-73{BY>3*LSgsrh@Zo|zq~ zf{TUQfA|$Ex5~lE$0WcIa0fte|8W_%4kLBz#Amw{PX~iq8iu~kEt`;G!GX*epB4I% z5KOS{_(J+bau>{`KIq~A>tOY2bIP;GHYTo4z}|75F^Cyp@qla|HOXTaenWvvyhQ$p zr@b2?5XbW`)-k<~^oB-IqhVB8xU+Zl>U25h7eBUc)r(bw)k3UjnD%$cf-)iFdGg@R z82ES%yixG=jXNbl?-3_(yYr;U)gvG<_TL~3hTuVvo)#d(kqkHho$+aX#6RE%kX8HO zGo}#oHxY_zF4q&B6e+T;4FAIIg4IhiNK!^Y5De}IJ{5?D$3dm(CMw=mIz16TB(AQO zJWHMPoL*0b?6x7$4;YBo^Kw!!2-SE!-@FRh^QgZ5b=!R8M3s7S%JApEv!?%tohcB^ z+x;E2?1DE?sY7h_uWQ zDRAe9s!I|kSVux>APphgze2C>&!*Cdz47jD1(ol6ZE1*e8jFHqJiSvpXTJWG%G-_+S+nhiR0oz7XbmR z`1Q8s;>@V2>YzzhMISc5+%ix>Qi6s_JK^E5pZ8Vh??Q&hNKhvd<&^luu~m?EP_*Fl z-6O|yTS>0K(pW=*Mxh3hLLU??K2B-UC6Sbmk3DA1O4UXPXkds*+6U?-=`trLC%-TD zB+>Fv+>5}-oCXOK6e}RH>V;)1NcJYy6*xPMpL~2*L@ldVr*~aZTHY}*ej`4<4%`zl z$D*{8f@KCbx5#Z>r0o#BQyp%^#%cpm`hxM-)YK%s2B0qEks@IV>$S`~Z@=mVdCY2g zq4d`xytw}6O$`7k-+?E2;1=&egW!^PzbKShM1V@u{k50KjTec)iyHIlseBJ!!mzuE&Kvb_jI0ZH zq1RB^kQectfQc~A%#;58PbQ<`*WU$l6kmTA$chMYsM}*hMPFQk?39E$2b=yCg4%6- z3A_ZB;Bs|i#Loe9)So@Yf=%4@PDgA!)AE=pUB`%;ny6Z;1GdGXN6*yEu8)n58pA`) z9hP>LZ|!Qq0DkTzkgQ6=BO}Wptsx?g7(6;E&UDj)WBynXPBRJ@;!lRyOGpO%07 zO?oNL?SVA?6sV1m$x*3YnVTaqiaqDXR^DI>knYQwn5+=RnK{G*i;9XQuNrNCv7Kg> zO$bHEI^W_ji@oT6`Mv7`HmL%g*4uW&{q_|u3_D1csLWP#ab2zLE$elkroVIa$ssW3 z0Gfaw$ex6H257{L+pqt^m;oly)U9G2nWG&iKLSuTdTC-57tdGtiva|qDkCSa73Zy$ zMW^9>!~SIp4_TbbnE8gfvUbI8nCLId3(-}cYu;iopinEH`iahU+Tmi{`K4*(R^X9v-zLO z>Nn_m*|IP6_q-U$=!UA|`1xu2r~YO1^d8vIIiLx;k9;S7C7^raj{04QG8r1-5`-1v ze|mi68Dk*vqXNZ4P6a7$g+g67L1A59n^_O>B5A-;3hE3d192e5iC-P3-;IKqum#PD z4_`rI^uT^cP^*PZ5ChaeAyNe7g^NL{1hf;=kRVO}e-8jN+w3J6>5G+ru`q!mlQUT%fz zleCh`WUWY|IRg=Z%J1uTKj!y?9}?B{NEHuC$X2&108YRvG?NgzGgbF?87epULkG16 zP-4r#-YE}VeA^*m$Vz-LYGN8`s=~C22XktdGct|}=zva!nD`cEOG~r8`cGb8Xd*OC zvZs1mDU*+s9_>T*{Q;v2kH1EXD`k|?tyoh2v+Mie`*Px=zC}BjRUfZ%47$pfvBC6R zc2UJRtflXu%@j}fZ6L`#&ZW3UN9?5jD%> z$E&PdY@7|3!A*$4@x#U_Pj1UNt?#Z1v%^2<=ZI*CJvN?sO2AH^6h4^0h+lN&OLgv? zyB*nZSHi$@1!IM0@7#j4F(^8@^EF?xmY(#PH+pHZ5SN-)Wc*~hUPK`F$#yZZ%qHP< zs6nZ)Ycp?X((3UE#{K;K2U>evv^FrjIEUzs6a|X_hQw-sTD9?F7~o83d$; zdU0ZWJXL;+VB}Ml3J4YoEid)#cmFdm5@XINz(ZGb{2HZ9Wa-hb;k8?Gxmd%`e+*=O z#z=L%nC>C@75o;R^4y;TkeOct8>r%Tz#Q1I#IH?Z6E)RDO*V~PUr$)OH*ZE)p756A z!T`W6Xz1&+05t;c7YiB|1xGBbVp@|%OVly!T5e#TZ;*{teidm)ZwHjom;0!$z1V80 zNjGAZQ*&4Gg0_rYPww$d_n)I%yT*3=Q0nAq`8n(Nzx$E6676#c-<%4b_IDjll$Vzi z8*8KTj4%Zv(L7CGU_eAS>P;E}?$_qP=HO=`*^nG(*AU#GYVxA=nQ&lPi&E!vg3pK$bGyIlPP*@*QzT4dVi$mh2wbB2~>9+?Pik0mp z@7>*<4g=akF*(TsN&Ytk5`E62u1*~F&uk$E zSd$_j39{1&rHB)S+?wOiymfx2bAfgk7=`2}a=h?!A`Kw5q@Y}(z`y^{D7}nqbC`~h zhKZd6UdG>1R-&lFc3WCn8sm$J84>A0KwLZ=8DbO+3{faHdN*8ICq%4&NES;Wy>V0S z;6Svymajn30SrdQ)0}27$ph%S5B~KXWJE(3*NcSBY8dfv zriJ}BdIoX-UericKRn@t(O2*qtVYpJfunOHY{MxayHPK=4tMP)ZIhtt{okA{>~Mw! z=oJoyK5~ddXE8*(FoeTg*RN%)iNui~ypl&BIFzt+q3mK?!99VrSTf!56bFMy34j0m zz&sLQj=(>{r?gUVJ+&oBPH)Mv3hYLZw~D=W%MBHPI*D1}M@wd>RvbSHwLwzO5C#Gc z$a4S$i9@c*Ty!QD+B!@Nmx6lQXKzN7Ja>^3+1JKU)!sC@GLmku&c|y%)y$%`-+XnY z#6Nv>1GR*0?nYUerK43gV26a+bS@Vv&@EkhJhqR4zGC46eD$BeJdi?~CaY~I=!MPP zj!LqKAQ_0?o3&De|3>m+yV~{`N3lPq{Z_6;HD634x9xnrY}diP^GV8GwHLPDdNLX< zHyzmB@=A^sW{WgkZbj}!tz+L_nu|H-&0MWCfn?ddm4^bSI#o&`g$cy6t!$2T63EXt zh_fG}%J%7PHj5RPALR4V2 zmKl88xHQo#Wgh_w5k%7zcn^IJSu*A0O7b(ogXmO|Bh^c5j*UOg0zr}0)z!HhZ;&sK z7jU%ONfC@C1sIkZCX+YGXQ3;Xf4u`HlGwRO^niGe=AMtopB<^~iCqVn9uqsQN0KLe z7xMHd7>FkaBqp5mo5aPl-e+1s$F8mIMpFI?Gf@wMG(^3SJ9q9d?pWu75KM|{w4KDo zoo;tS)`1>KvWX9D>&qD!q*^f`u1bNW%gV}%JeF z3uL+ipfJ*2BBDrf%_NfoXMxl^*h~=oPVSkLSQqpP;Op)L|`v#G5yU_sJ z|1^CIAkPqd54$JP#`5#?En7&hF{1YaliaQFO@Q$Ln^})Wj#^$z`6N8VW+M3u9eUga z9LNut{(2nw6?peG`a96EXe_AVe$Ra4)-5{+IC%Zd}b}4vG zh(q|#kLJ*Whdn)|39W?kUI5+2s4R%m2j^hpo!uASd}rzLzq2&?Dv&cedMXj+8uCRU zT*Bpb0iLm-YOG|B>N>PCgCli#dyfu1-phFLJ+fbX?xRwx>Za);bSu~{isIkz_lqEP zqH`f6>FnQh&kMK4g4cvgg5TD0`uiEPj<6E6A#4-hy1l4Mf3z1!Ayb1DnL5UN1>7`5 zf!ELxbTl+HIMq!45_q5h*Kk^De(OP1IU5- zl2?p-26w*wR7F@KpOJ5tVWGl4JhKCiH-L5E3PQ$Kg)z?r=?hTI>P?g&F@6ghX9W_; zlJFV`siQz2Gpymzx+0NaNTYogIva=~4=Q9WgoND)6eNq6EX?mLnVZ;PpftV~Hn%>2 zsjbN9D2TFw9?32OkZkN?(DL1Oh?rJLzrlS6o%{FiyUB6=l`e^is_V%;@+3_!5ES~M zN8?Y;K7!Xl$7zEvWb}Saa~jT)@Uh||qo4l23i^%FcM8V43xQ@^w1Q5X%KXSma0*pu z3#h|Z(@AN7;h417643>N(N58ixbh2iB8-RRodLJD`FahKU5zwi{K0Cns@PWJzy%qz%>mOw~R_E67Pte3|7jqX$*sAKcw z(MIUN5Ks*}%8bu%X9+1kS8*?BAav9NjG?O>SDKzE=$1daz42@)>hFgsYr|~;DveO{ zXl}l@(g*ku=#uopzq&x*jFu7Nz921fl9y)dpzA_0ApQm7`6J5?x}5*7Yn`+nW}E;K z)NWmHW%Z#~h%{G;?3a~^@K8s@z~o?yzJo$AkJ8<;lt5O}ng;9$P?6saOAa9&fB}gyVBfwbhNPo#vcXKWRX`w3 zv5ZZSl@x{u;;@)z!^Z`Av>b)L-tptdvsG&T_$UIHk!~5Zxs<~WR|R3}ROLy|=pb0T zP{|Pr_?Z6)9U?#=eQy;z6)#vXS_xoVB`~h6n#63=U@LA7yUtP0cnnhNBgYGMJ zW8+T@tn1(iz@aC10jTR;{X#Q+C%y?vBZW9%(K^?R{?awi#Ap1KL0Y0@AnlR>B4{-i z>IwJ`0*E7+#23aLAy88R;s& z`}$6#tU$~vPs@3-QFsH6Pos@*ZU$|>0XO2}YN1 zQ>N;g%O=8X*u;NUhR%u#cta)=tbLzh76+H^NM^v?KvXY$c8$QtKxFbKfwI7nlaoVO zGdCQReb~I9;jhdUeiUauf8hc(-=GCCV18Nv5nJefb)zmyRxlY|aGDc0J#ie7JjI__ zAcO{?0AxQx9g#}o^rSObZR-5oMHA9f=Z^Kw($hGS(DX53*r=d$WKr7Kz{Ei;|7jbS z918z)IKy;0-wJa;bX1&8vbw};LsB&CTcq%uU8p?t*!UH3-D54$=)04G4wYnh1d3)y zYbju#Ny`J-5^#jo0%DL}c*HN#UVN)o-N$E&^GV^>-bVlojs3(D33~}5&|Fe+0$ds7 zZ5zYG!;Gy_0U2;}{LImq53TyKrWI=fCeZhDbW`Mw8}F-*HaNiKLIz0+I(!5Aw&Y;| z!F~Aun#Dy&W70(k>q%Zi17=9g#Ps)CiZv0 zhKLkD4X+zU5G4F&Iu~pCkZNA{k|)oaH+;qpzc5g$o4qj0mO$B}ZB| z2q6f{p74`FTk8NeH>1bg0>Ebe3`qe9OF&;=N`8~xRkSqp;=Ma}P(+fq=b-+>`P2hl z39OQx`c^q4%4bWy12%ebbMadCqHWtp!r$$CAKfIvR_jp9mU2~7Jr7OGAWAE+rC=dj zCVGo0t=VL-U{l9Dn_pM-ZX-SqK;FsN;7+s9B9dij#(5210qRiHTy zH!m{J47gei@b~H2$y*DNDX_gc${fvRuTwaTN<7Nv(B%@3!VbKyWGUW{ASfj@<{097 z2$au4;9+p2QwM#E2Uag1^3(*97M?Q@mveFXeb}tfbiXiY(lzLwTQ_bMYy{r#PG9LwNg1OIg>!?fli11nzcu)!Gb*FtCeNMi>VCua@Z zyqB(Dw?&%q{MF7GR^?&-{5*_$=T>Zxi8^uyy*ARsst;w7Kk;jy5i$#&KInyn(d&a{ zp*J3|oeF-A{WIuwI{j2MF_cC$3%L`!JEAy=Fle2L*G~(W2*rB#?xC5ks< zOK#71Ll?wlP}qj|HCBLyBhCd*wCKZz0&}od_xdZPwz(3Z=#*!N_aKoTxOecnLCSIe z%Xk?Gc9k{yWXW5l5Fiic-%Lj;b#K;_gSqMW9@B_VLF@TaBI z-OIom0e^NwIes-T{#Qk!5mhyMSi3Q}suRz?jZK57!M85jw_9`Vgc#BTVf)EzcV|L2 z#!AVs557+%(`Wd%!DnMQ>|}UH)X;Aom)urtq*Qb@5_1g9aH?j(jFlVkYM5-i?g0KX zAtQF4=>XEHf-shrpr=g;kmLsqax{1`6aG0xKfONqTva!DsY04ki*p_;l>DDo>ytgn ze#Ci3Y2N6ysI@0=j}D%svNM|Lg1N-C14FdOLE1Z3Ti&mbB&3k( zB^@b~IJf7USp_*4U5e}WWqmkqY?l8hcK6ebgUgIpxK5YatQR)e;cLS#Z1BNYPd;yv z0@9>AP{X3~e1}hQ@wswZ`qAU3WgHvMD;2obtuVX4g6*l)_X8=G-q9JrN#umFgxoj! zc^aCI@1M7O4g89Lb4c4|iL;prteNcJ0ab2)2q>odX7~)xseL-$SHY&BR(g|J)9YNz z(l{ELWgNSnvp=`loyuOBC!U{e_%<>e?eK)(CNGMBZ`{7^`4DGSJG$)q8WL*J@i2u& zpGLt#-Woz79R>h|y|6SXb`MbNa%#F)EJmj#x-U(V{}MkcKoZOzGLYGA07LO=j3gkX z#H=C<4x**Oe)2?ZB=jFz*~Uld0!zfIB)Zwmwhx`nOra4;;ahsowOyQyU2l|=RO}3< z1_osvsOSWIlF}Gx2OLp`TJ|zDEOv*fjN&-KY({$3!ODLFSJ8)-tR-D|^#W;|-y|xU zq1G~02o*6RCdTJoH??+$qZ)g4*>Tj_kSYd~d+`c{d~gh;L7luVPDG@>WcS&!2`JJt zwQ;HBB^t(9vOZRg=~WkiLm{WO7J7?Oz+nginKG}JzJxmY(WjAyIN30W2=36$vfa8h7Un@| zK!&10Wz>(S*!guD`u?YrWv!0S4uLN>tbpXnK@OiSdsfdlp@bImSqwSo zI%n{!jo$6M5fOaBzezAJX_kiBW`1d}C-{HCThiNVq^4%3VNvQKWg5Ouq)T?$+7fn*bls5dDIiuiuv+X2c>tW` zzVMqwVpZW#VBUpx7~-Adgp3RnMr3G(Q$L3xEi{qC(U@caLlhb%HhG=?YWoEEmmvKt z@89Oc+)p9>Q(&B!N{NvLa0n%m{Est-mY(=WTNPcggr}=!M>ZY(>N71A;f8&~el;$v z(>&$pEpj6Zoj6SfZboiAv2SM+?;Bh9_Z~k_8a+C6jdXHh46b;cl9c7^auUr98UYF6cJNG4q#Zwnqp%;t^ANcK zk)#4Ha->Qo3e1OhAVh%T9VNmHUjIQ#f1qm8M2J?vJIGvDx#Vwcczg2|715DZ{Qe8TWi=bbTchHc2 zde8`vTvf;`CZTkqoudo;0zvðE>6aj|VotcN(+0IIhR-?R&eo0D_hnd^ODZ8>Fy~4s zD}RA3JYf>1estQ=MOLQn&q^iALmBy*hrKn=z=Ya7`Z?{B!|p2aWsdZd?8OlwH2?%z~p2o2niN z#RKuA4;Xx|WhdOgsF6LI;p9f}k`^#XG<}c(x;F-luQ*LJI6(z;8>o=Z;KzqE6B%L< zKX*h%M(P!I{1O|(a>d~NDbmd4MWD6oAoRqd%#fn-z?mWMnKAI=0f!BPyA<`d&}RFf z>er{}+=|6%+IqYgev>{hXG{sX=$G*zB}yi4;Di=0=)T3N6_z6^E$6$Dp2&+>+MYUC zJ$GoXM2j+)`0>C6AH2g#tn$;2(p0-nxm~mSm~8YAUPrJyVJgG%`Ukd?RbR!FczL{F@^@?pr!ierH%(jk^mbSU3OOP8!9 z{p6C4pTq&zp&CR)?6$Vvg4cS%l>2<28QMhe0_RY`47tMA>Vdzk>(^_e;e{=blRz_Raq`yFI^su~Pk~?}%Z=3Vtc6W|ixFh*Xd(RQqxE zB*8l_w2*gzBG4rxD9uZ3M~v%6K!Z^OEZ%IR5HA1o#}jXm`lh0SMmm5w)fsp$-fRw2 zR0R!%B7@=&qv^$q7ePS~WdMO}*St{`MuSq%4Z$|@%Sm;M&EmAoOmg>2*WBSE;lD?C zT4aUd)}_WP6wP^lU6|=|DF{hoxXC+AcVv0q|Ha;$hxNR^?Z2N&MHwnl#*&$oStunT zbCM}i$vmaZG!sQ+4xvIwlFVb15<)EVSV=NVl+yHjU9I)}_CAh%9DDz{_aFN?*7IFU z>eG9;?`t^E^E&SvB@1?Z-4VKMKopr+MumRDZR)M*`kQL~GCTdUu*kr{3Kp_*QHD1J zV$0-+BP2h>Nz>wC`zIei#Xk0ZC(>9M+U&~w7qx~Yc>3AIq?3r#e(I{C3##)z)FR=9 zMrc>c&6Vcuv+ioV8!={#y4k7n?N8=en8b7&b@stBBvcsS&>6Ytt8rfh-S8)|6Y+ME z-hmCmxZ1{nn>4H_H>M^C!oktGq z=UpjK9o%!VZwp4U83@{I={tb?4!<{qxuM3Hp9(tegJxh`x)9XFH>;`=vPk?A8L~92 zp7{p1Q;a;}wM2rH7NlKOL|-BHF;y|k)B(-mbS_h;?4?N;Y>~N$2pez`X==t|!fR-m zA{unuH<(&Qx`%=x&~Y|Z+3J_&W%J9DJk6Rj{?T&c_xL)tDHc>vEDdOb4`(t>-1tS9 zfQ6t!lBi#!lm%uFU30VXru<9qZ%Ko<|WijAZovg{kw`j8rz(nx%3vtYYk^_RmKe ztn{|C)SuNRCE)O}A2&r}M$suax9C%_jbwVklg*{F7)Wi&?~h}BzodT>0W*s0wM=P< zt^@-qCU~QfbcYyNw!Bq+#F7~el8J&~X7WG&BBZh=@PAlcR)vY<*#Rsj!a(c0qus9# z@TC{E@|houG*0Bz6a`=3UJpmZ-W83yq3?q=#QaLre8F7=T;)&ZRi$|uZw3vt?l$v| zuE4s)KXL7aXH*u~B1zcv$AysnZu{C1H>zrB7Bvinabsq**T_dloRfUSGf3v4kq8i9 za-BD&(a$Iqi08X!%y+Hr16#UjRB=ODgwhGGT1}-5~K{7ra}bhj~_co z!4Cg4hJJA4@5=sDPUh~u*1pTBlUgID`Rvess_5iti4$f(W`4if`}W+QN&Ea7q>!2C zwMUK^d7YG==LB^Cxa|(O%f_qjDfRuc@OFUPqD$9L_`6!|*7IstHLcTt9+v7Jj!_=9 zjYoC6Jb%Zq3EHd2v~APo^rAQYC=tK_Tv2|sMfiW;k zI2}YnEH~Nk0(bFa(%zzh5PP`=uP<%Gh2=(4p$kB#Xyr^y>N9$Sl16Yw;4}F8K(3=6HKC~76KFog6P$f zfiK1!vwf>Ah}!1NO3@}S|N2}eGw>NwD!MxQTXs?e3BEL94d|SZW@Jl}h#0Rh_2dU= z$$}6u0_<5+Ke9Zpm4Wu+_Un#0u6b|#pM%0ii^+w~2&&1+#hWfQ7ndRWa6J7iN%Ov< zrN5l>f6{J5J$PA<2_1*bob%)?D?gN=rhMuZMfLxjM$#dGK;n zuEIy)5Wekfi;X+4w~14cBx|p9{bJUPu^Vq&JgL`jh;`5t!(>0*J|~Cw*t=NksKKdA z*C&h?g5n4%QHCa%o|kD+X-!ZkdR!Q^!}CzBe_M-}d+LO`_o#E;y3vMV$Ls0*D!RC2 zm#hBkrH@7lhs1D&81}I5E8pyWUvcceAIdDW9#ZmR%b}%SG`{lxU~^1pZt7JWzu%x{ z2*AN^z3cv^^X#@QIluyc)#}z{&%eVC<_F*h&+IrR3Z)A+z-bTcw>U?EFQ)DM?#K{2 zKSsHbzx=8gbcmj6%Ed)($p(nIxn)NEyV&oD$trl{yWhw&rTe`KrBrfz^`9LKYazXt z6^G~t#lc~8(qQxDJ7di@1?`_N8i^Lj%Nq9gMO9r!7 zIOV>6QJ+DXYmefl^kE|K4!dr}g+a(KIy&0K0c$&E0L5Ab-br{*CSGhP zyeKkcRw3~SsL`!e#~ckq7R|{u*k$-YBQa^IVZs!bB}Y@5tr^*_?TOjJ`=<;)uelrV z5k3icMdV+PV#c+X_`!3$N75wYw(Ha9&(1GH1%;aW(Q$oK`ysiPVUO$f-1GE~VQ)q6BZGGL@l8^i zR2?>d<=yJGZ6+7aYPi<-Nr%Zg|6E<+-h0vOTZ7Sk59#)Y6hZkXQ*8&wTByq8!=lUi zjllyUxY$S`boi%imO0^;CzDE3J#V*7A8-*ZiHxPPC3by$+5XUE*Ad;sxu47h7vHjJ zpG6}H;PgELwaPp{FiQe9HE2N1Jl_X74wSVpIwxICt=?Kj49twnf-{1j*S%Gg(yh<6 zx3?lMoLy;pfuttC5nG*iA&%+_Lt#v`TeWo%65oLlrKoZU)X%*XvU;IPGj`2~_EwN;NdVa9cCAZ_ zLJQHwVF0`xNQ-^+otS5jmS3JK6e*af0#c$PPK)Ph@u>`ATaKx~y03XyW`4Fa)7tpK zEqQ(E0~PW9(FGpm8aJ)TjQOweQWViJ6$@qGm?nS9PNvBK1tLCDa$iP+xB^-WQ9>+% z9mOA6GNXuNpvxqIiZwP4GJ-KMOay-sy~>nZFe*5A|Djq+?_0n9(+h5#&uZiTtj>iu zWxlKJN1j}6_Bo)ptJ(#l-T?xRgXoFJUoNBkBh)tLSyq=d0C!`VyP=I6@)SfHZE`{OK}y$GYPEdM4NDmh^T%TCLqm#mOWiS+Qxv-sKc zYCd*yv!Q;cg|!ONKq zG>|6_Tk`Fvd;;eo#J^}`6n;=)YiZ6o)#J@O^AEp<2m8F#IP;LS z1Dh}xqi^UK1hCxoWke(5xhN)8Vk?Uy;9-6rNNp> z`r{+Kn{H~Y|LAvR+!24*gss=-YR~;Odwa9FQ72T47A}6@GvddP!Goo2l}(Eqs}-Y} zOem#wlh-b@MyweDxOhH@<45}JTtASv`Qnnt;iPMrEumoHv=Nm;G#cFi-=_IiE)(T0 zm|vdnuniTBH*tx78-_@I4X;*20o(&eIn;JH8BIW`^Lq7{xQukYCQXL%)GOV#swgXe z{3m*o@4F*1$pEl$mU%Q{@EP;U2UI7wa#CKQbb=t8{O~m*M;Uh*ke2xD6H3NPdZv590y4KMeRCx3tPw1y*-m#Qr9A9Wx; zqiNINPs{aM)}5}eujF6qS>MBWb~~HK2ao=75Y@iGPDJXVl&*^5uX|O2Qj6WWXkQfq zFw#(g@1=oj5f{Ng(Qj2(x4b?Lk}_$;6Bu~|`2?nA6yl9XDe+!9%`kNtv{O(o_LIVs z6j~f6GkFBJsSJSNdUVPzL|6~#(5qwnHm@(r0p#}et?*cqkzDf1@Aig*?Gp-e5fP{g zDlUhEP(~+!BO3ZDs@c~m!ph-ihSyM#<;{RgSmuOagkWl#WvMokmZ$ynRN4k)^DMQOEj+Zsw0n5?a43lXk9<_)V|6@xzXhic-&%TH|Hq>u%hDvh`Zm;O}^Csh`cJ0WzL;O&>=GSN)9hbrq#vWpVvzygNTG zl1cTYuTRGKc1c3{W}P9*1!nkVXvm|E?ZA_&c>^GuuzBsY)QevisP-KjuCIkdj}CjAy=GozVEXhZ7C)pjx^Y&o^}j{m0E|os+`{5-Y(5`(78tQx zZfYRot=wE+?01;o&B5Z9EQ8LhE0!pk*BRcMcmA*QT_zENLqd!lR)D@lg{>;B{xpBk zpg}Pc;$C{>^BHBrwx}2*lLNr(MBfGa1AM_7K<999i{!reN{LL`e)5 zPyk)SYt952ZD>;O>5+jo_>5VXNdd-XzE$3uXIx%(Sy%ld?|q%%W2atyTQ27^$O%NE z*&+mqnwFAYM5cH5_uawRG6l`Myje^7ZEH1XJ@VtrpN@uq%ucctO`CwtkOi=;nc3+b z(HbGJDs}#g=5v*z`lJI1{9QsuOLlcrKZX`|BCdU&-E`d6mAdDGr1-&G@pX2Q7G`3U z<$<>w|o@lIZP!fJ}bpOh7@a=LDQOW5x z+%_YU%Hpz$Zt5c@aiG1?q^x5nk73SJmGaoP+Qt_>k!VqByyry5%5bn~k_DnbY^Vsr zy0wO$p>-B82h5>Jw4o&TJjcNr)1H%D7jf!QGU-GVDg26jIkJEm$j&{V9>J4HJV7kK zEo56@LzeNxsq2vU91i7*U?A|VGXQ;>j6cU+e0zt^{62zC=^BJt;KEdjt}a|it_H&H zjuQ`6^&ke$EnUm7#}wl+#`oKi^A3~Ok9plJ=<)BoL~*S0tjXJ6oEh}ff1)%_a(uuoa-M0S6_&qascr5Daaz?S4!xZldCzT&#~ zeS3qH3CEi$H>~anq7rU73)B!NTG|QkX#9*1Gr*uD1T5*EGLhZIaaWZ1k|;{5*e-oN6A8xKjq9^r%FRR|@a zv9VP6vOFmgelZ@(^I315arn@oOZmH}P`*lm0r9hkatGe3&inR*;2Un{F2;5?&HBrx zsaD$&B3Sw8$Wcr4o}IeKStT~W>b%1NPFI%Z(m>55G!n=fwrn}=#Ov1VYTy4~gZ07xK4R%Z$kE(g zznqD(O*jG#_m`h5H!j0@0<{ud!o2hIR?h+zqI?JU29e%yW9--LwUnBaGeW=e5bkss zuDz`&x|Yr8JD8ea2PMxRVv&P}jEgSU%$d_*(e`gWaA5PjqXvDnFP}zc4st+QM-ot! z8Qj<1m6?Bt(9(0^%bg6vT|Sx0Ao|4Bt#|J5>~}!KDN+~8VwN*!Ol*;u&IW=c+3%jA z-Pd$Z-JtzD0V%Kn%E`$AfeN~%nu)u?{{1K453;%6jIolPI5tgK0gu|z>92*cQ9-k1 zHAnr#M1EEK9W#CL_*xDg`n4wK25DZHwbyIMj59sT7YyxS@Aa=~XQ#+mqujWgjZNwY zPBmSrh^R9`WpzeV^9h+bH!O24`+Lvs@6Z>s9x+VF_dM{;u2Zf56dfZk&e`+!rL~{x zg_-`teBLR!?91uhs-0p;Pe0r6l&x{?29Fwq9U_wCqO3)8FTSGQkd`ie<3m6gFl`E9 zM1WnE8e_{AkyQ{;S+6Lg$CHzj#U2q3wW6FNn1I*{*LyI(bJNH4UzjjSR6VFCnMA1H z(tKsACtT!=*|X(@G2DMwctDf2?ba>9ZZaBKW?jU9f@y?t3Gd3T(shZ=Eu~6yj}rwm zpq?m3G{C-j`xN3btXM+@{gHXZ3WV`9JuBb+^Pi64$oS(a?{_ygZ@1u{@+PI;Ds?F_ zl=s&R_gA3HnkY3besAkNsCO^xgOQ72G^_X<~|lRQpr) z6&jYB{s>oE@#jV^f*H1QGM;C*=~$m%S=Jdw%@sUU$l$?S+_0Re`gL*PE2ggduLST5 z?Yu%fbjUaon?P!VL6ML^F`5iSM4#hOG8R>G>f0m-^x?v$3|$tKT9 zd=a;{8U!vGjR+UHLcygo@z+b5Vi+%_g#bIkqR(^R@ zN6&^#@2+>w-szGY6QMqV^cs(uozqutPWf^F|E4t4yL#=G*I;C{*}MtZ@-6^*5fKyt@#JfpHX-ya+J|eg9tJ&!&JANPxruxg|qf;oBm?1Le9Vx?>ewl zGJJjVX1g9e8ir=%nXY&-GYnEM1$a#ATuKO}cw#&Tt2T$VBZV(s3&*^C1ZhM&K*zq7 z^hYidM{vl9WGePdQtl>5McU}aQ(N#wGZ3I-Ni*~I&OZ3F{SNB&cTpQ!z7q!wx;;0D zB5^E`BSE77IkBYO_O4j=_aiH13txSR=Z^JE@TslYPd>%Na16zE4!P8gVP6_F zXi(r>{a26PerDABycsp;akl7}MitPtt_p_<&Y1DuDUB{>pO8oL|yGeqCu-9B4DpCf&v+5ViwN!KllS| zBwGUOs~PeCo5JALVOCOh91(i&yMx!447O3Uj}nFK18K{Xd(r zXMN>RrMDvuN5_JQ_tkL!5BQbY0Ib-GpdU$8FfQ5 zxa^;P;rK{nB1})#|66gr8zLon$A>8j8!Wec`0gN~o(x-~riI0(g{q<5fr(@k>T%qZ zFe-26Dz@NbT=455yedjbKtrkVLz?#5C`f01W|+aBshW-pD0Oe*)F;+A6sb~u%Jbr1 z;(O_`ubtSyLejdiFf-CQNXv;Jcbm;RdS$k30s{GLD6y&u5%5;jV(=38IySs^rp9ax zg_=>u2%oUdijj3UsEk;wzy5}QZtaT94{1%CD(%_xzQM?>U;YKZ2U+dGfi!HYXB}2~ z6p37fH*!?OXK!p|tu^NipidHx5Nb|HF(e{+mb1>jfDaJAV)lwy%=bVyAqT)HWMD@O zrm83KzZ_3oFPK<9p*b|DDp}MZK2r_1!6`yfBn!Wh7 zLe@iAP~FNjJ@sZD$?i3g8g+l+y0y6l_rfy(2FFm|D2g00YPprr zI3yPqwEy=#*r+bLsQ0oDJ4k>W)a^2Tc?;o-ICK)&+k!AjLz#(@&>t^!UNW;o4ZWZK zNegK>n@L837~qgIu~;n!d*2u5PT#7EyrVBF=La}MM$Z3df8Qlr`j^1JiK!X#9gw@$ zh|@#?$GDOGxN()^-ZmC@a1QqC@cN}3n>h^ysup zy&k96M=Vg;^eFjD;GAYBM`t-39Jz!h0ivjLNk2n63T$DYSWbHv&pz5{J>Re531xp8 zC$v~o>-$$5q)mI!OQR@b8pu3Scp2N}K!AF(O652&IwB)l9%_+p%tDR3Z~uf_g1k>- zB|6VZN}t}>)k``$wp^b0Nq*mxk(Von@({;F@Iblrh@SwIuvxkCQc|PCkyVJ&F`d_Z z-@d=X4iq_8iqS)h4;t}J8YL(=WRgZ`1UXA#;P_@8?Ri-(GdMiHda)t zl+IrpJ-XgE-)p5?)vc@5P;;=hovyAfr$;USQ(3+? z`+iuX1y~AO8iZyI+FN>e_N>{<3oL%sITGvdv@JrfMvMco=y&Rr32696DyQT}j~c=o zbr^f7mIw?cO`h!CJ%WG*{@IN2lyowHU6i#dCK*le-|ve5=F6!Spa4R9(;RFjT)IAp z97w+0`@m;V4=q=cCxyEoG`Slh2&%ZX51Q>99<8iBw|K}C%A1d$8DQwD1(afiRhJ#E z!NyZB+3APN5MkdFU4w0mZq4ZKaB`A19JvieQa8fz>qPHnB<>+3({=eFn>Po}n??{E zMB$~?s8QQmsyA=mv>iEeosCfnm6hFjcIt}ZTxlk5FSYJVyqUEeLFTZziv%KbSDI$3wK$Qj(v zusk{M-N;^%ot01i_Ny~+-LZ(ichd-9xnIAAa9O&YC)7Q7@Svbeib#NUnY#O)ofNuf z&z>O-V0j#t@OBe(gGJX0XyP1%( z$^!-r;29)6=;g8KZKC%k3||j}{hKZOth-?0!fpHZY3S+cp?XyBzPGN?w%YbFx}?V& z5G_*q6BF|Pu5WJ{%%KB^6uJwXr#f48+J%*0+h>2*8@qq{^5sTWRs(dx$?*IdSIl@t z5y)S=QXBj{`}xXQ-_WM*l4CwkwwQ9=R=xX~@h{pdbQBZ1Cr{PeW1ulov$CRJ<4%#TZSO{X>AvSo{1?2}7CwOcw304dq9cCAWX z_Nb1I(d+jrlQ+kV*wrb}I#6R^yB)dYd+WlYzDMjk;@asiUyPfON1tuiL02>=#0%vq zQ>GAw>tt?9pKfMmmi+W-V^*_Wi~~>Y{&~IAtWA-#xWB#TA06G6f%f|2#*H)gshHHk z4JYf<(57a6`$pjq(qZDM=GU%Y=TwBw@5h~*+LzIX+HPz4NO4xWwCqb`9^!iWv^H&Q zR%)I>#ewV*RYhCXYg z68}E=&f?V1Va^W=^DJFBL6h{Cj5L-Kp!QuQt*j=4ab? zap!G|+wImWD>Lm_C1y_BO(~8gA7-g{dv*KUj9Ro zFjMaoet*+{>DTAlIRB&ot$2KY-52*f1DIMKA*jD{kgfi?^);W^tt9)`c%>j4BT*AD zdgJQmww8N+N5Np`Q(?Aqc-zqj&4bB<2&uIDxW7%q)xl-v%s@ygC?L{UA9b65{h}# zF(rZBCY)xn*JaL}AXfO#JtIRBd;{a_TRC)Ugo0Nwqj<_l8|#h1!P-MS9b%t!?bS;T zpC$|jYBy<;IiJ|aKMdHZI^q+ozH-&7T%dqUtA5Se(tFJCXdTbX%{%SVVEYWk;-V0~ zp?2%tAEf7%xDB-36~iFKa=fzgZ!g43e{atmY^2R;znidn@bR2X8Y3uc^QMeZwytL6lOhA%g~FLpn{g(Qw?;$|H0 z?V&idYI`%R@-drG@zZkf3i_}qfw0YDVUei){{1`g=(P|fIoMzWvg(vOcQjqwKe9Y)hyHao6s!i6-z$C3J1iX}4JYGr1 zy?fvPWi`;a@t|mXIZrsESJNKs`e4)gRz34pPQA8Lo3kHSaZO02E;RSGj0nn()*Qvd^cFAH_a@4%ig4)iR`M*s4|T+Drn)aRCzc)zs8fyFb;@CK=y&@}!YqOCKtjHxWsVvQ^@b&=3AE zQ5@%f_^>WXTeWYBkWMWP)A-nVMCZdh@2*yz@fl*9jE zr}5-7$p%w(by*8|lS&{o@IG7KO(RhG!i5W$7UwDh3GdBlTk+$8w$jmleh#&c#QNDJ zZk}$L5WiZ*NGI53`t*QqZa0%(ylC?0NA^(a{KArNQ=Y$kDPqD&_y$wZC@ENUgUHk_ zZf+{UHp+WPmOKn^fAei0`Yp45{ZjAWAH8S75nFBK!J2XkoHVxN8AKnVEr5Jg;|@21 z54&*kisH=u8#Lhp$?!gLDfzvkW2{4`z^NwHITaxxA@1L^oF`8FbNHDZJFkt-u!C<- z1G>r#s(1*|P)9j*YPD;)>-6c$rlzJC?x~V+SDoonvJ9NhRKID{LtbS?s!qBDYcXS^ zfT*4r=X_?yFiza6#fwa%+9=he`1y^XC`c4UCPAyUw_!rAS5^Rfx}z8}pv}V4*8IVw+s6=7c$% z9x@t!ww->INSlW!K@{%c-~XJ*CBjTw2vVM+{p$KHP0GHOZ$% z5|%*UUteBJORC$+p*EM0!H}w!zJ3tmfL#8Vea)g|8BB=BpYKkJWFX`9#B|w%S1+pQ z1ly!;{)E~q_tU3f5WYwfyYqo#fq|+_4CE9PY{0+44FLe&UVhe5rQa<&Y)qfd+j>V4 zz6U6pW!8%AMt4;`RSw5k%T3TeR)_!6s8=sAF7De!z0a1jA`jGFGGdcUe0cHAK?4;^ zT_37pa5&p&cj)$vIQM)xBuLqTk(qq33h@b&B0 z#b`ztsb~aQkU`{fnLj^s^Yj;b;f#tCHgWZ9AWEh& z&b_XaF35f=Oj1`)gTz4h!>U!i@^U#IZP1u8V>+8rw5Nk}oiE9sKlS?RMu-kJY~EZ? zF-Nr+^m1!ve%J2Z|9%KRZ!~yg4y~{>p-eY4h+9Pf$3Mew!vU$E7*OIppXBX1+!E7{!1EA%o`Zy(d z3`0HZrkZS^)#p0ty#0VU2eLJ&{vNX2sULR3M6jJ72| zc%X${TK3K`e}APFN!5YtpQ}u1G1%5YdCVilz1-FcBgI3FWLu5j7uD|`nf}}N_>fe+ zgGaeEc!qW0B^8yGNu{l}k8HPg$Bu?bQax*Zq(-pov}W7PbtXJD6LIOvJ?!4Hlxm%&1R)8 zH3xz^9lGdzDRhRBv9X&dnBw2wr%0B>*Sd72Gg(JlS9cwe-{)y*`-n3OUUZip zgQMM(NvWiilJR{^u}nBVKDMzaSaH6X4&#(P^@7N0NFxN34Hqx=q1a7a*<5X#?K-3Y z1RhrgqV%zpg5djkZ|1m8y9AZuQJ*G_yWjsYV(Qi9^+dPA1u-r2^Io5D%3V5A7H=xW zoCkwD=AAwjh^CC9Ea%gwj^++7&Y_{%VRL7hq~6?UbZxuJ&%KksS$b}|{>Z_~Md!hN zwMnP6+-!63z!(qYq-Q!!_r$Zog9k@}xH~(HNWXu-J}XtOiEiz1uPmwp?#p`NT8c$C zBLdYn$$@(E08vfDv3;}bL!M7>#*X8>2v1>Gq01wPeSXyoxRJO z^t*WJ(liEIY62(mkiyFf)THqJ?S_bq>w%GoPMMwO$C0~UB_6I3B?}up+*aJ$l{O57 zUo^ao(xylqfl8G*djqSdb?&67mp3gbDG`7NPu!qTW{k=C`WxWV zJjPpWXo-Gut@H@hu?G{0om77E5@p*?^#My-?Ji*)eF|seUB$DWUP-x^(P+FZ>3{*!=d75gm68 zN2)RZdP+sScCd}A=hx~lGp4(2SzCLavQBrU1EKo^4pomaedL!?lAPE<+vKMA-!<7O zDN6WG;G+Dj8`baeC-WHDn4({uzhv(EX0$=}~(N~fku$?$qN_j!n`t>j$LVFY3Zp!W3b*S$s z#nXsS(t!usnx{Sqq(II1j<({e6MC3G%NAQZtka;>~1}B)F|qTL*t*M zkUxkF=2}h5=TS#dC9f?0+(;4W5MxgQyLDb;9Ad8AoE!x<%*_k-v%#R@+to6paY?n> zx2j9h>Xv`^T)Q;)Gwz6R#Yc+&R=APjC|$;0UA}NX4?Xt6+%&lvXhgA6`6KbkBVRD=W94;Lp7S zeZ1=5d$pze%saAisy}U*ZIiaJx29DiH|-O96!GsTTTC1KAtP&Gg1&8=Zrz_)Wu+#k zXU#dWlx!+B282MPqu$?FcrV}grS-)hkBNJ^^(w$8fBr3=PaUCVHDO|rkB?948CqtD z%u7oO>O(qFd)5WFX~A?)`HUu@bdtl!qp~F!E~|RqEFS_smla~YEDpM+cKPDs&*Lv$ zz8pnWq&U;>^kt7cH7LijQ43$~xnN%2``OZM0OqbNSs(*a}K&}0Jh+TeZ-~`PcsFtW@`T~rGiwJQmQ??=RM;3dzCklxRaLd>jHzWTjw10JN+)!L-! zt7N40aookR_EtmH(mMKksu_LU^yzTDf0iv>>OuwuCOr%RiI>p;mR8uYZ|~n;M9eQG zJrf4v#O@iQet6a5_B(DzPKfQsk<&o*IcL=xEMkU2fF}Zt2ubAVJK(edW*rnr$5_X$Bmtd<4U^ncd_7szgMxM14p_5_7ffdfpx{;9 z8>ws*xs;w&hHT}05NfrO@!uu|)h2_1`-+5c>eQ(&GiLlAmA9M1jbj1p5P35&WXj3Q z`}L$?8&wE}Za2t7!b~z46v%G8PWr1dk@OO5zuT5+;-q?TA#0Ckk3Jm9!P4Dn6z3Vfjk!f*6r9t~{CH0^YG(n&M1--NML89-t9UiKz%_ z6R#{tu0HWLJtL!Fvipo|`z`KmSAA+N&`0kltw08iMK|0AsL@mqCRh_PgmD23hk+1RKmjtyE%H6w zpma>7m~uRb9-+tFxgc7|c~jAwx-43>1xmmT_)6ginJ=gnUeV9gRkkujWED3-bNtn_ zxIZ++uzU-uh1AT<5qnzd=qR&IqINVW`Brr``{dVSg<$z?07*hp5%JofyaGAt+J%NY zV%JcvQ7A?poW>&oU6?ubj-OuLdF7flt?4ar;!8%{GT?Fr5q>e-acXRacQ9G)#+x@S z*fP>!qiqj7wK8el@MvpH9oUr{FvZN{-`VCRnY6NkI@MBBn@%??90@)&iJ#kb88D!w z02n@%{a~6zO6Be|<>%pR%kIZ|R@5Hv>$9%AuI{LCquoi?|D1X0V_PpR^7o8u`?{*x zDQmTkZSeMM?X9}XX^p3U4EBFM(lEcFsYb5@;{`0B2UGY_Yq>r=H264SK~L3i-+YUU z7av1x_U)&IBbgQDz9=H(iHZ^j7(DXWu?^6f49iWNG$C$+8(_@y3k#cl{r2r4)`Q?2 zsQ|Pe4_)Nj!L3u!cRe8BYiZML3i3=!Mfuxi=;ayRn^631`SFc5lG>#495(8f&vQT* zonKo;Ksy+I-S8(TMFo6!!pHHWeyv_c1z(DJ%781UXr)H)H}eNY$pL9n`0)S_(+N2` zm7jTC4;B#=@&<^%<;!}XNtT>Gvcr7t^LYChVeJHQgS*E;Rq2TRC%x>)8*Pk;m8=q( zd|34~@Ev>uk#8-P>R}cD0BO~UW{b!&(e_eFyHH?NUmp1Vxo@WL`KGU)nKc^`l%<>E zP&aK;`qmdG2JT$b=bDY5t+Dk{ovzQ+O>S!Mj417=p{Y3tqU7_lc+-mdpFe-L9y8|0 zrdJu1{2W@V43Xr2_3G89*BCyUPE5FbY6XB->EFMH=rR?a?r8_NZZ*6X_zI_&Q|{8( z2I8|KXUU#Eb0)w#%FjL~4atN!6!BKuX7t+^Y4d2nXye9t)QYFipASq-^f{IPB&75B zt?s+47n&(tEw54izvE{h7gOPFIdMFMTg~N`sS4yFdtO%pO>0A7T1@L7XBx$oq-11l za6as_o**K0l??x&CK0oNIp?n@oIQJkexMt+1xtUtZ9(z3>cThn{QJq%R(%^}xn6bH zFNYsPx9;2bca+oE5dym&a&LO0T|C7F)JJvuW{2m$)as~fFxRedZ;?@G^~RvOIW|4J z9@5teQ{Fl$q(Pv&(TwwY9gk{WyRE2yy=-X}fUOK8p|2B@NMYB3Hm&fwAY^Z#Nk0sx zg?D9Md-ZlZGxPN=eaw+rtOMhaGhbz8GUxY`b_wZNeXFNyZ|Jlgo_ynm3N?-Z@SNon z#MV{0HBaB2Y$3*W$`)UL@#x?F2W;=ZN-xDQWjkehyznEpwz$bBU z*5l)gIt^LY(C}k*|JFON=>=*jqMM%H3FMl5Tw!fGO-B-Z^H6#j(k`SW0P|j zKLoKB`&f)_8n++4zx3p`hfI3a)zs7!dkvzps-m>CRMZNbGp(+WyAf^)??h@1Mq9S< z!Zh7HuCM&5Ot<`;i4(XctrjgdlV{uraR#p!ksGyjbhfuHRh&^9xYWaAAi9brwG7G9 z$w1hGC=$#Eb=t+VQO5K%13+e0`yTy~efgJTm+iClPB{hR=|x7PN9v;|G&+2yj@H5YZ91Oa=O1J<+1+Ak+GLAapEmkyht`?m?7eEd z9lR&&YW}j8M(9hZx~auXPfR;;?3g-#qoqCV+RANipdbT)dJTEMEn37qxp(#GMCo6G zZ2}ko9#b-D4uAyhd;^n-v^mV&YN{NW^#|7vnL!kE6$XLXzrv@xgABLXV!azot+WRY zhuiyz9OabT)`a+?^(tB=11%jD_D~wk@TgD;4o1x2dF>ylwY4D9pthbN&Z3+lSG^-{ z$Xxe|E(J-w2&Dtq+_FANTxA2)8fv4nfH#)3NbtGYC%^qRTfs)@uB@Z&^Vg`X8TDof zfM!(FVFNoJR~$i^W#;|2CoYJ=bT{rA%DmX`Sirc2v@7uloSD4;pXp1_sf9%QZ9ntU z+jj6|cdM3dRL&mMzMoXytzTs6EFB#L)(LnzL4v!c0Ta8nt2=fOCu$;B(X&Z{a_3sZmo+<64@Bt5ubm){ok8FM~+&i(4hD)hiuL*%F_wEip{Y>R| zx>bnsrM-Kee4Lt|kfApY*#m7POqg1*O;O6*IH5Rk<6+*pZ^Vew9~nxu%VUK0M>!(h zjdY0=+V7}3FRl4wLPS|NQ1ctL$?>tR5tP=4o0oUHm^B_?GN4?I9hmVSFNts^mq3)- zc?s<#(`2$pq-Gl)W>U}6GRdp+6p%A*gkQhM|M>Eyb4cxoZQGPss%&IQhk`T!Z=_wH zmXOu1@uon(3uIJDrDD57&oRUZevR?GfQsWNqRB9nQ%$AhhWr^NSPEPU+an8N-r`gXR!`kR@xP3#A z>JH9{=0NA`h9uam!zm{f?Ha>as`dk-?dzZmh?*C2G}GQFfKn06c-^+>>Mrg_Csolk zLq4Q28wmCtQrQ`feNxN*_!2aQ5GReiV-=OX44lJN(>F`|O=Vvd`_^xc+MRh=_WE#G zCwRm>RYT~9OUu7C1>+AK`{S3`x^oI(1Aen0tPE1 zQ9?vGObSmWfx08WM8hp4zfOHC{qp)CWNQ)K(x;D&y?FG;sG&pEMb#h^>q`e$oW)S8 zk>5#w?FKFS)rxWGRBICP8xRV@1(8?T+lISmtr2LKNI;?A-r?*&*S=8-thbM`nKy4< z;_l6r6*MJ>vckVsqE8T8RO3YQP`&SsW+nw69Mu-!V-;A57Q8&4j z5ug7*|E+`02{hZCWvOm%{p{;1DKd3$>wfAZO@Q(pv1 z`cUOyW;E;6XHjDk@BOP>sHFf)k)o1mWh+jd@zD+IcC$#8{kc}~MeKGNkJE)+qIxbx zq%2i}2xUMw44jeIo2kLF;b~BM>@m$XX@R}liEII#_ zJ=)h*Bk6TW%g?W`Sus#AP`+*3=FOvY{Zdt(wq~{6HC!+!hHPryf-JSKnb&d`t!(oD z?)sWLP|q*nnmso`Bt}PJ)T&ifDqFE4H@)I25|ZL^+k`V ziC#_QIFh>c>Svzu(dh3kU@_NfOLbb!eW) zq}hHm4`sgHY8E3nVR5R^uCVJZq$p7m;S8kg|K=pU~++3=oSOZEs%PA zl`Wm$`v3B7iUwIUnWZZArdVxoD{KMb)wxBAwJ5}D&>$T2u1j4UKnt$B)WdQPnO>%| z6@mZ&*Z9FyLa?KL;@POs$S9)-7m%yy`~nQ+Q-CuSk^xfbt|;k!nEFvxNVSJ;#b8cF zN!QV^c9rIs*@d9ZQ0q)2#7W>og z_9nqL)?BTP&C-&ulQCr)yk#b9VGfVN#%3o6P*ca47Uq>*j-f`<<$Q1(8+el=JciE4IbXg9lGF>Un!c_f8W|>No0WzmBII_=z`*R}HL` zvT1qNZU7^koXCui_f6w%{$-frT+5bX2ak>hIl$WC$i;GI7SQswAD!LBLy`KaU^uJ9 z$mkG1RQnN|;S;#NE@Rp-H#_(3JJDzX`0`i=udaKS?xN>}yqvSh083cVqn{gZu(9Bg49ut6UIpxX!zQz&q7PEGd z#XDdxL~sb4d-Ukho=`H~`}AqA&~4s)WKA_0kMhFcdd&T-Hrs4Jg1NGuVwasgb?n$s zB#4IOEM+TLp{PB3^y!FGyYu8KPL00<)|Z~1J{Cmd)Gr!^jt-fteczHCf`dHchL;>Z z0*l^I`yosI+|lrT`#5VhYYyI64oN=V=+w2*an0?5AH1895w~mS|05&xAgwe`=6flN zPW8GD^J!!A7?e@jibUr4th>SyRs$=-OP6#@eHPPEH$3)Z`=LvEv_Zn{3%COpZHSB8 zo`ZY#1OZcV09<{=;-dG%c0z4U|5-iy2e6m`_>AfVI5?iZKBj-aeuwA^pmkIp&pY4M z$s{a~&xMgyQXsENLFNHTn%bSAT4AdI>5851Jf-U(f(bWWL-S4ttzy>j-uW+&iK<2x z7A>fVt4(HRYSN6VD-e}WoxfUytN_})P8lCyW5a(waGXVhpzx!m$R9e^cOL69VB0or zR_vi(*P)3~kBO0_LV?so?qAq;jlg#s282r0B}sG4VZyvZz-ynSmo*x75?<5LDDKm= zY12BeX&6%Z`{qt*-=5_jRQhqBUS!UPf}kKx&B#zE*rfgj)fHhBhT{I`&o4U|7Dvod z_>r9R_gn<6qR0{PUkCdmwp+@mCNHh{(UR?3t3`_g=BBSM{`2I?V7A8M>MC#CD(2lg z3v!9r9C*G~!-hMiK70222se24$F!#rPKE?YP%c6N}spgvp1Z`p)c zhogCG>jbxPzLQBY<;!;UY1+7PW5w3I+e?>A^#jV$ZB^0x=1M`cTrM|wkC|lmVOkXZyptps9ijC;whd{OD=H~|jr@vqMC~9)3`$o%AOSUA%Gl2!jV}r~9 z-CtWdeF-7kJ${|}-!@2}E88Vm_*OMnc*a@p+P!-{m5D2uC zf5MU1+BMc0*sN(gwP3t%N_S!FnEz!LMz2Usn&!E69hpZjX=d7S+=Ck zj9#apNX_qK2zFTGS*Z1+`o|G;7&whate{_JesOs{;}tDiwp1`9uU7jJEHIM6^8v3| zso-GqD{~CuHl2J(K;1+mp0jsWrW)OyKnD(C(TIat>p)UK6>7H$1i3ok#G{jmIdD84; zKPBoVl8mxxQoFeUM+qpdb_1y#nE}#meMeo5&u_0^J$)ZDd~!N*C;R*YhLb60 zB<%Iee)Hx4Gjs917S@zn=XiL^mKP$1@B2BNiL*{4!zoWC*^_;TMcF-I8=rsLm&r11 z?eoZ!B~|l8!!frR0%K@XwEEE`|?Xds~wH1xJ zIPT;C#4)&F=+NfX$sCO>PEgQ6^HtkTTW=0+(Vz2uy}Z3+*kO*pfL71Fy#tFdLI1^- z$k0y(?NFl_89CyTO;X-w+vX4?Qv+Bn zHlUO}f#+A37Dg4eaqe-YG;}xIdzY^naDOp?(nsRs#~|5q0K?tKao5Pyw6q^WjNE$u z+${S}31z#+Omv4$`u6WX4m$Vt{rg*hwT4h19SJja=7B;RogcEG`r!_TPSG&C+S+3g z5)*nvE@s=CE zV#>RQ@5+iU_aZ8%1*mG~ynDC(O9fMs(r=Ly?-guU;_A{Un@X5) zQ_ZO-a2{o%^dPAM_FcI`8c1VLqg@XB;^J%B38+r;FG86OC=2NKH?SjeiOi}kt)Nsi z*(EX>C)gK_1?`*)S{%y-p%WuADU?{QR*>l~bLZCCJ90g#B8Np$TT`?1$9I*nqK-2Q zrD8-vnvnkZXIDF* zn>K#^`nBB&hmHy>TJ(qP5cAtti9bRy0$3HbNeY;NtWEe;JPe!(r~TRBWi_ucLO@?1xAb8|b!PvYOUD>p+jA~-lJKkJcK@$cUvDZmrfV$82feQ;(* zuB4ox6`+h;wXZtt!?F1I1{A@~AN9)ql3nx$R8^f(B*=^>tGeEtK zwNuBP38>#fduwIEuv%6|$~HzhV>NQ-)HOCOFSB$J;Ta)Oe7=O=AenHq&DeuKGRirQ zXR|0{DK42(tNQ+GO*RI&If$lBEl*PZ;c==-xvHdKxOqc(_>_b1-=Lt`Z@x+gZB6-! z;$MG1e45gTAqT>)6`MAxUnrH0OkO?5t{yCV1Gqu1sD|p-ze$tfY3$6im4h(p5VP%< zmS`gv5itO9WoP@cxhI9Jz3iz9jU+z+;v)RBA{lhgqw?=EjFe=G8?JM(Xx*+hr_z@bv_*L@ zd~k!7=2nzsNz48K@?FhSv}v&Clj70vV6CvdPo7UL+O}r!C_|n7`x>2FnoxDEStbcI zB{^9^&PpfNG2XV38c@c6ot?g;Ty}%-F>pGH=2E65FeTbTcjsMvVZeqO^fUbFxMEt* zD4H@xL@Q3cQuCwKU2Q#PRN^cw$`Z0>*faBHOHiF2+~wz;r8 z4gV&*tVg8*me<r9|C~{}SQ#gK+`J=A7!OIk2mcF2UR#6`YJi#ek z-Q6SHrr`{0hxl3{ZIjHvh~A3#C)6ZEZJn>xnfKyMThvFVeJWRrVnTiaFVOSeA8#y2 zgk6xQCu21nmshb^yfMzdL3R^|#Er#Q1{{i8>ZLFQ=ITrlmrNK*#xBLkspQ+|jUq4!?Ro9&uMI%he})4R5zy z$kt#+iM5)7WE4J&Hv|At0ak(VWv z+ZB_(_Uzqz1E(_j9q$3{xJVcpBEX>0Wih@NT2PTEih%Wedm8V^1JF1%ZPsky$dTG4 zgvPGti~+<(!A6LEpR+48R8gQ1HF{{ml|$9Y`!jyR`0-4(t4GtwDs$m32<#7i;>T$b z7i0T#Q=*{*uxL?U^Uc{fRa#m0haR`c@>mLiP3U|u$}<$na>c?h^;#R=^W{?0R;uDO5b1A4$?PY8T6KUx;o(>BFFBa@_nni(*&|JF>WUlIXs1Ds^ch3q?CC z{APKQAs%~8u~8HnI~`fN>$&4#s8L)SVEx%zuiH)UH)i_FBQI&{H&*G`OMk7}v<7tw z$GsRhd&YLd591mI*gw*7oPO2hn1|8Y+?h`p%m!&!!>?1r+C-B&rMbkqV2WSjvlu^! z(FJtsfcG#dH*>s9gSH?%BQW93pf|~M2dFV!ooo4@eB(}Nkh$j{Gh>6$+r&`rNcGP6 z(&&Vf8#it&9yA#}Jd#c^8xy_sf11@=Jh-XL8R3P-P@J`8c$(`+&~X)=f<5ocb=X^cwbolb1tqg-ES3? zVK^to5-Gt&5I3MYXrV%eL8Ad3H^X%j-Fs?II|-QdRfMw$m4Mb;4Vt&&$};siMrSoa z>r$MY9%Q6}J?CP@zhJ?FWHf2Hz!tbvNSeEhF3DeLc5WQKT(aWg@88#6xNyO7xS9gf zAecf_BxJ0vRPuGIgyywY4aN1n)Ev*e^Bl6V#3mGfKK%$=%^fn`z-w?U0lkeVE)Gz zDU(F0TU=~KX~=Nt(4vJaBkYa-6iyID={wLOsojL`1ze@6Jpo)~JphO>M&XXvC$DJh zcHwzR^|SN6<_;ips7V<`zgDw^fp`JUSHzDy={$n`2LTs6x0T)eIHYpt-YuxrT3LWY z?)~syb?6)11W05~DHCXr1Ih~9f-jR{*QjJSqd0|d@ zuctR1g~GZ$3s*06T-+e7#CF=5e^&W6Cw3oV`_=KgFz5NUz(5E#gP?;PLLuPo<8y=x zeH1aqn3e@A%%F1;)h<8+Zccs8&GE5luzcCFG|oxEG-&EXCg2IgocIxozr7uN2~`V4 zWsr1W*b|FO@`uMx$Je)z?WE=p#d1@iF|8BefZYKN0 zF*-KJK|!;|;F!GJ+=1Zl(QLv7x}#VSnu1}_>!nkr25Q7EdV{YSq?JTq=xzjrT4SW9O-Mv||$zk4Yol5gJb za3~rPqkNzA_3{b}k0x9Jej%znMr-#0=40NcPs8%_^T!Z_4Gd;ypN~B~hdBzyJ$r8d z3%wMQLEG4v(n!YvzP6++88YyQHG718T3>e*kxf&Xi%lwn?T!J9k0BlOt@za)K2R`^ zh@8j?F5`gZ-`68%7((7H5L;|%&d4OB(z?3C8JY#XY^0bg=<3G0C2mt35m3mB5qmS1 zLR*fx7iXr|5vWTBACN*m44VmdVN4?j(SSWM^AMz-bgrobHk_PGvp{NWY&@n-vsTEk zw*&?Pt;FsO0ij{>I@#L?c8g_G(fa{ktYJl5ISl;ykwD-a=e7rHppiB*L8rmP;E;(- zurt*+h?dXslSl2t4Ep{&!XBiH>dC8+yZwltI9iD9$Xhq1PNRR-kV$&86T)k0w;IOE zZqJJ3{E`(-Uf<{`JYQn}ra(`+$ZGx|ehxsT5O&+5jcuu`TM4~F&7U*Y&c+6|g(;SG z(#&eh^apnF`XWxm?c9#ZzB2B&J(dNRd`mk{pD|+_zDjJyP&hTgm|M%slV9a@+eXA3 z@9HY+mI`YWHY)&6-bRgsI^aD>a@l5wAvS)}Di$c0Cpn6ixpb4+IGV~}TU$^rdMrn| z>%4*jI~${Y1+9ldnvMh+4Lxz9Q|!3-wXAT%mAC3L;vz6mCZcg_9VA|WwZisLiR5Yk z#xR#y^7+M1dawwb?K@SoxzTAwOLOYkQWPq&xWX!q($NJECbxcoyFH=#V8ThhgmXTf zU3>@d6m|(<^4FMhml)f+1_mE725C|`q9zX8x?x-owrvsU#|XA`IrJ6T!8SH16(fnO zj=ZxD0|rbi>TgNq$@1INBS4T)2^sX?@x5$Cw{t&K>tmqiDP zICUSexbgN)KQglW_=1D36nT zmdROshrfUO_PcPYc8fk%7_X(|@LzO>4<+13rtC=~sb=--+pL!tN;Fny#kxdl+8 zO&IAnj8$?set?&kmn&p>*?LN7OiYZ6;*G|1YIb-f&6=pFS^MmOf+0j{ROz(x8gurQLK7kIlh-$N=uiWLKkSKPWG7<~gppqEDDKNU*+aOq7a=Bnze@+1 zH(jI6aB7vum*Ue8lCF$qA|-W+uHsAPWHRZ>xZRcl6xjB;a4>Ptm$ayLnLmF0S{4r0 z4g_0YSF@l3@Y&eVa8REv&z+F3Yzka&C36#j-3Kb`^}CiY*YKy0GZLbonm>pBfubc? z|F^19)g+LUt4G!<-Jnzn)6}sU;c?H;L)ce|giuM;+tV$Hx5){RmuEEWY(m1*+C5B% z*x79)Qhgw}r`*s0gvAcP6#ePcM1jU3Pcbn@H+0E6OCD$J6&XKbV?$wJq!?|#b1p8M zMx*EF`55il$GSL4N91WY-IN>0T}dpC6jo z4@>Q)qng`n{Hq_UH^cRz6m&eYlnx^8H#7f}vj>ASXSyQSX!)_I$jgMKzdh#l*~1U}g+5K_sH?doQsoWjIE5x9<>?C-HYVW(c;28N!5K~( z^{z&S@r2U##4AIxMz8&3(h$!hL4;B)h*MrBCA9Avb{MT@cWR+%#!>*z%83_+DC&8M9seSOVIU)i|AZ)et-5WYk_ zMh{^vIw5^v13_yzbk2QTcq=t^APvM9u}2So%q-vE_)|_&Yy6F{l(61&#;3#FDN~d^ z!wx%_7FDjKH!X70*bn#t9Cc0TnCIP>^A5-7){0ZW5$1=&ZG9;?-0r zT|?6bIRR{mwuXv0f1Dk9iu{Z9#&q22_;iRMTN9^4~rN@OLm{d@g(b#;Bq-gPZ+ zg)I#XTTv!kxg1e_{>c47{Daj4Rt6>}_N7&|hCd|ISb)-GBDNS*;Dy&>z@Oj0elg!o zmCexT_~73d8vV`N15@9+WjjJ(!`7v?A9+60YpblJ`&*Q0vd?^pL*dI5pdQ|j4LmiG z{YgCx+I53Io{GZ4y-8XiHhMz3ATw$d_wJMP9LtTcYIvLH4s+Plp3caFzQj7saKE!To{h`~tU#F(H@zkV{LG)4ROkxQ50 zLAzeHV020|Y+yWLM^NN!Aa54SotWjG^OTLqRKy00Nd`28(`JW+va>S(Y!Q<@&JV){ zJMMU-Tstx5c#Bt!8-!)nJv`&SlIT_sS_Ea5NY-dJS_9vV!pBv7U?IJvWn|o2_!2?J zztiH=PWS8gVECTH{oI2oA=U)0uXXRMpG){6lM9b@Zku<7F}3K^WpW#x#c`9a>OFk; z&=~m~G`!Og9o$MBMvS=03^+P$wrrANdBOsCff8GIUrq8!?dwtsrqWUWChrxL6G$<|H@wJY z(U;k48$76>N8)z*U>E1(JJOm?G^#(VrR9Ta%gisv<=yX?^vN{s?B~~ck9day81nl5 zW9(wuTBTl+WqNM4r3MZW!m`4NBiwyIO%c0XS0XoElz)VrcGr}XTlXU@k4C);gvtJ^R`y~b$& zLGvxr7d-s z%*Wc4Qc{sU6-^dyJ<>e9_18~k$*`wU0)b9~fNh|$PcUwO{}kR!!l`SY7=ED_#7FC|6U7OVZok|Q_@GQPZd9Wcp$jNB zwtejLvR8nScIk4RU5>BWn{7VkrmxxxxXk*~l3(3z)` zV|i=M$)cX+R;!*{$~5pBe2v$YItHR)7qdEeF|9~23$Z*oIC|FB*IP{^jzK&#g3DjV zb{AP+Z1M^qVM5Fe&L$Yiw$D#l4*zXh?Q(4N`*rWqR(dA8fQW;4P9e#Wl)?Yx-cOt| zxdd|!Ev<%YKZgVlAW;nj(VYsCnUbBwrkqOJ%Hn%Qoy`qaRh7>dsP8}TPQ0(t7ep1e z8v=H(a)@e@41FUNYMoax?c25m7gLj<3=`TQmn?*yv*ip$v}p^fYEDxaU(#%f*GEE(0d&pSZT1 z+=PF}0G1Qp56VGfS-B>;^JzkSFD*Sp^TYSgk7H^2OM$o5{Lxf~#%%qAdTPj_(P8`d zw^WIw*9?V;FNRZ+Mn~Yz>(>XAG}31zO2Vq8SWly<`~YNVJ*kt+N&Nupfn3}VTv0aD zW%;;8H4^k=R2!wt)+Dkd*0f$Ye$1qJchb@ zCo{8mk#Cqohu*#a!Bw!!$+Jw*aTqe>_nUYb+ji*i;m1;QQXMv|U*8&#g?T$C5?=B= z08|(y5pg9BmgJ_uqa5k38GgUtH=(W)JO(;>6wxIrtVih6{9E93bomO|5`t)OWS_(B zwnkOf&4UEz)-TTwYZoKr?Sc}5RtLZl6k1kRF6$OVSNH0Yb&!n*f(O&<)zuZdSiugk zXRZ4krJ*yLHA9B=nB{K_OW5-=U$?WxXHW5}hlR}PrV`1@(d)PLYwBlja{ z7o#0)gfwd>Vu{9-eq*Y)g- z;L~DxyCW=YpfJ}J7}kOv0*JQVaTYojFcj#0qg;-(Bspkn5Y3(Cd;T~u;p2;hPU!cxyLCB23u*J_&C#^X!Yx+$ z#@#Fb^(&3w`~k+Lyil-+#rOvFpjUqv%M)9NL)+N$)*Rb0ygYW|KcO2>o$3nXz`j!s z5Z)*jdg{ObrZH@71PT6O!l{(|azAW?+w3^bU@MY{lyABJZp!d8AN-%`dd1hu3T;}N zV!CeU_uI0D*B*_29XF-jtQ|O3S?J*5d@B0nJl|j={{XGPduq07_4`jNJX|Q)=b6P`x2es2C+^QD}YR~M!@}x!q@u5q;K??^mjV^ zpP;)ITdcu>WR>x+Uh%pcai7mF`71%7{Vjw$GY7q36=Oyc98>qL&CKQ*OEMr5+FCV09cN zFOgOs{)>^^s`P%5|EdD=#LjN|)r)4|iwpC$>8RxP0q$%rSn8!s=ukQ!a2Lx(k{h&1 zBDS?|C7f#pkEX4*ro&7`MsuW7%aiF^okhIMQs)`vEnAV6xM-$O$3VQqk_{`u&75&e z?s&UyI!Ky64tnB4Hz)i2@ZA^&rJbKU0r9M6whuP=n9C3p0^)0(=|plZ7S3FB6l>I& zU!g;@FJ`zs-@6bOE{x_ioOLWc;JG#BTcNjy$CyWRlmq5!0k(>v2?(5PNzxDVU!gpp z7;5@uCHZwpN)0-9-RY2yjs+dFzFqba5>qO^RwAMz8$+QP!jUkA!&_`0Vco!>2obhE z-u#lWk==_CHH{oPmzwiU#D5>K>kRkqR1ET$pYs9$9SE`Y#T7ikTbd=RoMV;J;Bzy3nE;QB;9R zmo?3n1;4*fmtGuf9vd7^;&LVcgRO(~oS9I5jo%hwm6+dilm%Q^PFo#hu4WfnA?|aw zz4Uy@ezXA|n7ph`Esy<%RH@dqDv&fH_&f2m>L3f1?%RfLUD62;>&@y%U`Zw7;YP>% z&Az1mXgD}9+|CVzGV$dS#~~h`_sTL+VbdqMPB%3ki>BD_j^b3rUoAdciGY^xoeI@< z+0ReS{*-+UA?*-z9a0K}6RD(X{G5+imANk2&O8Og`=R~Y)#!F(;QA4n20MD)4v%cM zquVG=w@vDY1CD;HC{hodVHrw$#GPf&7?DRybo&2O%}NsGqc|%p?mK*E6mirm;n<(B z_r0&B(zT6;C-x|mw~RepbSIf%1L-ztd~nithXD*M*KwhqdIa60;k~q9%oJyLmYG6uviQ-$qXHl?(b} zyhUcIiXjNp=1T4I-o4CVOhCgNB&<1~} z549n}swm)C)pyf(BKQ}7YGr)PoRRn(kvY{+@Db{rbGc{2*|QDqxaoK7#+>w&D){OJqPhgK%{QGVYc!<#~51PhQE*XEuj-(@vhlMsEMyEkVx z9Din&J)YSW)<+0D5KM%O>$%lxS@;WrQo;UU9z2T z$eK`i`jySyvwQax61tR`?~01*XlsXjz4of&JYzA0)&`vreeZ5dKMTYuwe>qiKK%MR zOR5*JvlLJ>G~Co)RzwAh#7RVH@oK}nJKsDaup5E|2#Xya-JOk(4Tr-!lKzX}cEtUT zE&2)JH{^0|si$Tt^hJStQi%5s0i&x-u(t$ zI%KPFRRZY_h^U(B{MY>-m8^~cl@y*FFSX7qU(VT@(D|*sy}$e9Tm!VVj?%GpVzz5i zo5s~&$KM6fgW8i|JE=MyCd^cRbHSoTHz@p66!NuO5Jk{55KA}HgM|Q9L&1o{!n{Uh z*=Yu~O9bar?CD#GH$tIP-zf#_k+Tn|K)Va`RJXFh`*$da9Jr2mP)ki+{T*2_f*xCT z5`MN1w71r;It1q=5LkDaukY$blZf-;h06%oHT{j{{o_9T`wp!b$`_&CW%s7Pqd9hL z*2?Tjli*c7zBHt=;e!dNoLVXv@MrsU7(36q`DgQf!uT{>M4bg|FXytS;tz!EPUjX> zpmB{*;ZpDbf1g=Z_d&t$s$jgyG8j4j&8en7Z|D})2QHND)$~DdPuvpg~`FafCACoI}*q7_6m%Zjz4~?rHIUdOr{k!n?DuMZ~e;zA& zPB{&jKV$f=<2cJO;O4jRIg7u2TeESay0A`&HEo~`Qu_;~2mb%x(ER5YhtExdCs(6R z764K+Xtx=NsutBD25U_SiY$Ls#fmOCUe}sjni%J?LsIF@t0=-t`a*PDHm7dgy77<<#2khCMqm-N=K;+t89p@y8br!> zlFwuchlR8Yg;Nh|BSJW~+-5T3sccj6Q4tvEN%o`R#NG8PDP-!=1kurzt;dVtg+Jz-`U14H78osKmJ+f^}w_g3lwm{c0zCj-~MX_a&_mB1$e?VR>TMPLyf4y1{JEY3NDlLx7WSq{8LV`m^qZq%RZ_^BF`N z`Dw=d?KkX-a!trbME`Ykq`C3B+@@j$r$jmy%;Rey%pFSq^`-fbB0`|MhzYkC##L zFokTHt?w@IlgjvJLQ_AbKVZbh)t-)+I$*0?^b47S}2X3 zfgN{l#xrFQJ=kbqROx|I`ROWH_8AiMYFN=`H2~5fUp*2vXyaq@hGR6D=mDb2OVhB|9(+%PgMNk0C7e{Twut~hKF2K(9AkkmK2+l+Eq zx?T&@4uZ-Ckc``rqKnpvYma9ChPicV4?xhl3Eh0CY3-CTz-a~s%>6z`Y@xECKTF$j z6?LXx9H}%cVUXjZpP_S=kXbWEv3|Xb0#jWwkW@0|Om)7>B)c6LkVa zf;24ZMDxw{lk?QDqRj?dhxY+fsFgq`TrNL=t{tMjEin;I8@&Jg+Y_Kk&{+`-z(1yxdnXC{yhaq%xf0xck+4Bn0O+L?;b_G9*it^<}8`y;}XppOmuoTC? z#0O(@^Kf}(@*oWATkHb0%YaQ;NYtWo>?-Sv5JQXf*LLFpw0^UMXaOxtbXf33$VcUY@k{{UQDp zno7d_oC7%bt#7_o5LMbaP}%C-JAyEi+EP=gS*zA#qDjK{e#?p@T^z#(U?ag_^{ZI4 zrn$V>sX{)l~C;TT$F9Al9V(ck6Bz$ilk~WG?8+@((7xJ zcJH(6z18~t6$mApA#-bt%*n)6qFpI#+kKQ1hq5g&NZ}{@W7X1(8k6( zv^&J0se2J(L<3Leu3TxkyWgVxEep0}CwM`^!;mrEyfv!@I-iw`(t|QQ_YVkt#@()L zQ7$a3sA~3Tpa)QAPUY5aH}BrvjKLN|R-Iilt^(`5xdOey#wO)=O@H!2YoKV|s@3R) z;qwgZl=JB~cM`~`3{C$9CSa{yvwBblg)rt~Ur~Pw1o){f=RP|<@Zt!*^uwv7Dg))O zdq$k<_?%b@Ekm9NKNZ7$9iMO^uA3jJHThLfcprw!Vwf1dRCabDCL(u!zfhPnmMVZu zR3->?d*5QM4=`%iZuV0jhVu4>TE}9tvH=Q8LG>eDRnjf-PINYxT!R!{^QkaHYtm%m z^q)1ifHTXr^x9y9Fh>&^`$!AJHQ0Xst4jf3-zv9{FU7DPKt#tkV|fIgvx3F-@4tXa zgHgVLGs?-HFZz}qKfMxWG-<#_nvPcOwqvu_(=NnWu)Z~G2FBeIhL<2g6m08fQF8>) zojh(dJtqfmnKxt`81CEz9T51;K=|Rp8QEX!_HpwPuAi2xs=rIi3O*Obg#-4b(bqwY`)nY4Qw?>VZe(t*M~Zl7Noyg5?-|yvBKGfKxrC2_4Z<9?h06~>%@;&> zt0uFftQEwJXV1aAhGm}r?4QHtBY#c`=J!J{u#IWeoHOqr4vHi(0Us@4OhKk^`0z3r z23bHdQVyjUH5MZlHRZO*l%-pV7|^Y(vhq?TPscT)lua%}Vllmxkru!lsT6vP9u$%6 z!VT_31EMzeKFom_<2fOwZ}l0!TI?U?jBg;!K`~@|gCsXHGP1>c_A2>sSJIRKdS107 zOhTRC4}(E>qTf`5yQP1A?LZ_Z_?7tclNrR52rA>BenAjKk+}w5S|f$wk7^{g2$>pN zWfq(fQP^c4ZB7kUCAa6@)pb2Re}1Ey6z6mvvLvelVe(~)vS?9Bi{O)!uPj?51mNS& z;a)LZ$zLlFaR!BOxRz2sEG*rwtRFOUW&I*!GXWkC9GJAV)xQWW^~aQ$QiQ`MhP}|` zeiCNo9M>H_B{3i%b17FTzWB`45?JpB(7w{(10f!YU za#k7U2qe(7S+naYDK$tzpSsS3bPqloKntD@5$2WWuKAempW^wG1)iLpUB2!X64Yzz z^{iIc_^S#t%35e^;*75*ku4X5mm$Z#`Yd+^% zPVYB^-lrkKYV>i_P-ISX2YB>gGNWVF&+Pf)>qqpZOB3K*5dPk|MPQG{c_F}Y_IHd)vw<4>TFsB z>^O%*qx%$iqpOl}i;l+YXFU&z7=7%1!u3;h5*Li1O%OG=W@zbe`Wk4}Fs!?tlhc|U zek~=J$S4Fp9Cc%6qFa}WYEmU&khR;lHxRJ{t&V*-cx6>`3r#SmSxZk+N-FD?m7mIY zS6+lrM+g#&Yvzxnvf*VG1e)9KS+#PQ#bSrq4sITGN#X50?O<CXCEUo;G?XMjHxRH;^F%*8h(siKqwh<|K8@9X5C z=U1x}ljdWEA#D~hMgPAKKn>WY z7bujb=YgMIde*arlxWuFxu2u|$=0jzJORiTvK$wBlhGr^z}l<;&AL5ulG0^lHU4G7 zcbJ8a$A+DPublBPLxWg<{R?~BJ}^ymiz_{s1+78mV#`7sD7M%TAJ)KY5y@K0gSCh6 zhwFc+JmcxR5myS=_g%SqpaDi~{@SPBB$@uP3}>4)385N#pm)_FI^!%wd-8(jw3aIoEA`J# z{|281ys=$0=$Pgu)9fUU3Lt=UdOO9$iS){~?uD}vJ;UE&HdULPNMa>@ic~VxH($PV zQB!%oD{IckSQoEXFT)YfnN7tok)%azhy>h3Ry2(~IkA-`r@9!6Qc2u`g0-Od%|P~P zo$T}$XFt7PP5%-rJI;Dhq{;jSlBIjSrtGpeV(QN_loh0{8noJe6lIMxjsX%YK0grE zsc?f1=l}9Znq<*%%Lon>RFF3^ggM~ra1NuJB(Q8x`WNP5LBnLg17 zlPwiWQUQS^e!WxmSkg4CIrjIw3y}~t?KxvhX5wc?{-8{yNv5#&1>nkuGr{svXV*8e zKrV5zv~N=N6cn8rs-6D9jg|Z;nQN8tJn}p+ans$JE!Y;wImO)U_eXxW>M-VL=;`^1 zHCJ$srot>2#~+TDsq`e2Gq3foF4ML*StX1uoAm7LJ(sjRg z-gIr8M1S_Z*!*=wGWCxfDR>4qBlS+@TpN|NdKHJSI;lH0(P_uMqfzN2%SWpSIkUDP zC{!`uIMSsf!+_vr1~cc*jV*n*9lJ2HdkxD99?${|#KD~wxS!(f=4_Yj|Yhmk|EI&y*9o$mE}&B?vBH4+ATUnCyv4|IQ7T3) ziIIl_uX9J|@uQFaIS+Ct8blf9!&2!6f&eX7bj0G?Pk&9iRd|R=<_U#P4g<;x863i4 zpw3nQsw~R^OJ76Pp?cf=>zN#d#fB<2nu2Q?Q&44E;hSU?k^Yg6uZQUEm|E+$@5hsx z4zIrsze8do?Kh&DSdht4E_!&Dz(5;pAtuJ%a*T3(!%yvoh=y6hD1sIQ2Ipnwv56xn z;sch*ivT5+Ubk3y!HemJE`mz5COh!S-5g>lk=~j+!OI|sT>2fLJVI@OAK@Cvd4loT zG$0N-IVpWjw%?gDb7uQ}A*7NJq5_MT&%D4N8MfbCNPMIegCTe_EhpfSIcD92L(U#U z#4!3NeYi{d8h>^6CHcYKrX0>c{EV96;zOBUN-BE&QbL*fU=CHlp~lXf(>o_bQ%II5Gy#1EbCj;?(tlTn37Rm z3}Q_ci-4C^3OVjyfG<2f{aLrQRcx1v|0mZXFl^MN9j>uA3DzQ=73UcmvN$f-lB9@9 z75t2YhYyR&Q}%)A;AvgR7+{z|DFw4(OVaFWk?pZ1{_Buw9v-Hxl5cg&sx9lq5T-)3a=b2{d>g;#GF5(?TC>QKXtyZnK z)J`&hnEaMfsnqZDs}-|*b3P1 z6)Rix^;V-Xu^!EQ)wdA8DZFjt4jp8|u*t{shYr;wHb4Z0oPji@H#y(N$B#$Db_m>c z6mZMSZFh835T48rx@aoo7TnGvfROB)t?f>atv?2+42!wD^hd0prG*v6y>LX^D zwU%AFbdd_}^{TRoSPH}(J*t5WNHKpM>p7HUa$BngbEy8?UpV*zwD2^yv>_yHx0Ixm-qH1(#xhx zmMlq|oglAml&kCJOP9!M{>nyLN3F-GY_H*VW(F++|{7^6PC-*EhHg$|xN& z({6gfu;v;T{Gb~6_3^|h$MNGkJoMpIP3^ursZJ~3!Zr&tqRyXhOmMAVU~XyI+S%Ee zR@pj@)4*LJSFZHe(lgbdJ>B){kNP|(2Fz^!{@wdrLIQ8hYR3_tB$=CWr%s~K78yQB z@Y{9T7Rj6hj&5#SPM++{`OCVWMu?HaiDmLP_jgMiy(1Ch3sGn+T-Y6Zzc9QoSQ{Wx zPo6wsWPMHETZ4h#vu7VS(*N8Un-R&i5Vh>w*$At2`4Z_2Qd#r?gj&`S&Gr`IG$$4u zSa*GjPPI0;`dSM0Z$39YdPE&Os3yn9gbB?-cT^(XwbEG1%t+|{&B&NT^6RzoF2|1_ zm%BTEzPC6jPyx|-3UE1*%J?`5m25^4eDiw<)RT#yHa-s?YSmH&iw;DsKjh(ZZbLel z00jiGH$=&E&WL;WGVa1QDuht)|n2W`+2i4KN0%rHxw z-1ZTG?%QCq*E;UQo>kkPcp442g_=(Y0|P>aygajg-_p$oshlBU>WfG78KOPlbeWgjhsGIwR-aOX`6oiCTP8`Yi?peAupwgQ<|&gbZt zE@W>ITDC1)QSvB$L9R8~C@9g--v4~s_3h_R+hN1Dq~6mK>-44N7^^+2HYOO!_)wxR zc)st2phXh~R21Kk@(qZ_&*cvmI8t!arc6B&vD$a<(6XHFN$D+=#pW#`t*yZt>1Aqt zArJX=?ys@`RqwA?O6rjfux^)K2=boLdD4}pB=A+wgTJrX1F(b<55vf(n(F!WsOVbiGr8|)b5qx)eQisefWE}gs~QU6 z20b5;JBMvId1}mvS7f3)HGl#MWgQLl!PkJ_-WG5o-?)A~>Ru%<^pKzP8Ixp_)gstd z6?YKQus3(wNBm1+OL`H~r3Ae2H2k9Fg^SHcW$sOc(?=Wl%m^x{%g+%kka_PlS~d1o zZH3<0+K`ZtR9|&<^-=Tl-7hwxv=gHf4z$;=UpHRz_QQwg)2BR6j7xAe;admm@%Pm~ zOG|goDWYdYKloDT?Vw4(@-JVRd~NS(s;9Ip#r4``d2PIC>%t%EQex^gYt}$gaSaRe zUFq4`6Y{hbx_Iys)~9>g5PDPl_AdGME&gb85Ymt2p~6}~3AydhrM|nN7T+?t_v&c^ z0@AIZv-$`t=gpfJ{iW-~OCGu_!D4ynkD~95FYt0XHl`}SMrU5&r%A~pt-k2O1HMI< zP6mewg9A79o17tG5fLHOKJH}Oih_5G&;SG?Ak}GX;<}!=91WVUZCTNcZrN52{{H2k z&US06#TCg$_4f8&0D*ydma2@M;_&!)@BC{Wep-U!%L+jSEk&|8%{Q66Qr9*{mlypj zZ~Ms5ojU{QLO#jLiXocwmTaAz8qoPF{#_8^P6oWq{Ze&RxuA!VXi#dcw~ZM{?%j=0 z@rkbL!ECrSSR$lnW^UkD-=y2M9?WSc;!3i&cbC6j8-&VU3{pT~BodK+qT3uaYSdpQ z+0UO#sl29DS5+#Cfi?JdHk2m zkJ4QJ{Hd!y_3$QLgZlvBX$k-`8na~|j~(GmsI3Ho^dNa5EWIIAj-9-!5$A)!WZV@w zv&W1XBUn6sdGO-c+Vv$cVelmrg$dj#09NTQUhpNGHv@FnaBy(IiNmLnQY7}-|u!3;tC>u zaV--rgW3$zv>OxVUk&)@pT->Acp5PQ!5s$%xvzF34`|8c$#(6gk<3fphYJxEK`uyz zf%V+ECbnCes&M^c+zX5$5G~&cxtz%kr^L!nm6whw}#}w zkh4Lk7S|JyU~(qWEBKaEc|@XW)ov|f#^sL?-OKK>bBE{!Z%`_xHjZ_{YrpmCUu~AJ zSdkIb^_o5BfBRtDK{hsBlPb>G3##2iFZjn1%gRkk8fZXZpmF!^VRYc7am!zY6en+c zLT#rd3x+RkW-->lt#x^Rv%ju~^|M#4TvZm3Z1{}n>WXDZ^$qur zuzUXeIaap|Yinpkk{7tP7>k%iR~HMUbnc@A9u0I%HwD@s$@l)WoFK`yq%8 z7a|1#!oa}y{m!u(O5GNHLSMXifx*EV4xa%(pSh12HEJLoO^@l*2lv>scbJwm6%7@JNy?&J?RqqcB#M(k75>G>jD-?Ai)M5Q@3cQUf zMK}fWgd7}16T%9f^`GM~Qa%yO&|tm9>f;*`Q?%bR%$AZCMnn6EmD@NpaSIk2z<;JH z!gsK&C|3PY>I>JhA>hUq*hihtt44xDJ|@@=)VBDg&(uqQa<~tqw)$`$0P@E;I$EJB zZK$JTMceePUJHmKDv|Uhx8L!Io_S#T2Jy=QRpT9)yOOt)1Sic5e7*)! zrr5EL4vy*g^^Z@@u2+gv>U6#GQuUs5J*zKkQeWEpeon};@3JeXlmiQA8T`iMyXfot z)5db(xvTku_>EwVZL4UtJWtoafZH}w7K1MS`H?ZQ?JPXlhhykvGRsu2W7n=nBttz9 zS2rLq5Jg4^vQqCfgaD(0|wb^^vEn{<@WHsdjXGzWEPeBf@CA{;+vgj z%{u0>V)^pEl_e3?pUzb9WMZPD4Zf9gIY$p4zG*OV@Zg$ru`KrAsu-D>mDxQig8?{; z)9h{8kpsT)n}BnTGk5OTk+!k*YUl`nN%Y}6+_~}6arLj$H(%0K%D*x}R ze|OKhm8!S4uoQ*H4KOh9RF*q%v*J(Lt5`WXZMXO8u_rAvv)xUB=HBuMwpCoKu3Dk! zxYv~OW#7KeL$>eSSreu=?E`6>f*ZygI}IA7%AsG6Ry46UaODHyi_tr$d52w2jB;_= zK#g|C_v$2Vu=4Izxg^q^M6<#{SnV4>R10IRa<&GisDOK~d zlR*qZ&Z{5|RFWY!6{j|tEUug(1AaC=bM~y?kA1qj{#zHV$W5skf9>kkmQSBPowm}U zV4=O$t&5=)@IxjsC<+(_F21Tl<|3@XZKkxjj7>}$B@rxZDBx+GGZW68OQ!iKpMs1+ zRVtl;-S9=UYOOQA09|j(py;+ZE9vVRBsIBJ7BX;a0W$a(DjS?IV4K8 zBV!i&mLyLnrGsBN(bQL6tEv8T(#Cp##B_0otMxN8OV0C79K0^+ECnU0>K!Zh$e4In z7nfQjC}c>(_Vv+~7LclTe}DY%XozV4{{1`6)09TZw#vp08w!{SkhqT243(SYhbZg2 zs2@;QQwvn$u3nw^*t3?o-i!UJSN85{ep+!HGsdWy#{7H+Hgf6lArTpl2|x&zm>}we zdF)R}NH|)?iUoikVsXmlgjAQL8%oQpHGLgFx_zM{(MJmlg)wDS*{h8zsiG*7d?t>UQf>Pi zC9jnXmLU0vIeAhGZJfom%AXVDY1v4tm6CDH!HKw9v}oCKa7-e1NKZmuzyH>o#gGj` zckOEbCGg&RZwcMeYapghF1p^ZG|5F&Vj8J#E^LF;ilVFEK zXZmb?_`Y{m@N-awZuH9-N;dH%7DwySJ;lj0b=YjPtc2ekoC>^^(EI<)un-SL>N>Gy ztm4=p%bp5|y-j)SX^N$Z7DXl80+Mdfi8T-r$eFUBg59o78HUa!ywPq!U7PzC)!yFJcz3NH?w z?C7Xa2=B94r3VK~koTcouNqzIG1$)T?{pk03XW75B)UzSwBI^B$}uq6uHE+B{XVbP zxSSZwNyO5Php-CIQdL2(u$eQ}9eB@k?%cuXa;XEE(pLoK{7-t8PaN%vLAyq&xDxOLg+)@7IJmz`Kq1oaJO$KUos z)-UoB`l!N;rg(r5^;cVe^r$~=Gpg*odaI~pq{R!hath365bA+k2Be4Q(-Q;jcK~u@ zH*CLFDM`HeyF;*blofy-vVy3mv*Y2H%hVmKTjwtEG$m3y>HE~Pf^Q4svF%8w`{kc1 zPH|l{WVYBEk|=HzKS^LQz{x>Fht>h|AWa-Kd2$FT-W$4Ix8PQMBLy0CDl15NPCFfLzxM`z$_=w?bshLnyfneyD+?3<7AZ%U z>Ahaz4_%u~Vz<}>p#j=1U!M5vOF_X#oHMLB&q+F(_FvXbj_olnF4O27i^Gx- z-htd>4j-;XtFivX7%rEsPj}vyx=d3HMW{Lh*!<&n$k-&%x_^CgR&69R*;L9VASBw4 z9BJq5yfd#SU>xjKHE~b-V5Y6WHh6YvNhbmGC>jqen+mrt)~6)H-RWe~GKq|ihW_ca6*Ux@%fZ8k9pc*X=)qGR9z*am0O-TkRRB1& zBHYBUn2Fe|Z;7|;rmC)=w1{@Zb#4?0Hgv*a)MD3p%JY|(l`qxQ*1iREz8j;juT8iw zna0ms$@8tNuP$1!pwN5DxjoPcPn;++$yvR+AEHLFJa4QTA`s)vXJ2<&$GUV?BCGD~ zNYW+R;@)g&ez|_RADwn-G|@4bw}&ZqnmH>=f>TW|UD!MN*!t1Oq&59(Q{%s1(R$DT zpX<{kmb!0w)d6tz?>}{4TJXQQ5SQKmH+S^^i;l`SG V!eRTiXDj?QWbg=^IO{2E{~uHJ=Gg!M literal 48622 zcmbTe2|Si>+byiQG$=!ZLWm?X&!Gqr$q-VRZz1zMMJYs~GL(ceCJB`(Q!*=+3?*YS zL?R($>~-q@Jp0+-_r81Y?|Xi~|NG{4yYK5d&*MCfb*#0HE9k^=rH#~#)KpYd8BxV}sP5j|PDQn9%u-v=Sx-$>($vo8 zfU%jK3FUyhjXmB?MRict-QL*rJjHpp3FVxntu)(cVJX{gOEYOUT@f{YHG6rAh2>FC zM~ar`acxu2^QIDJY_c-D54ua@18gYH#=G5ZtZkhn-KE)#3dCEpO*Y*)4j2pVyS1UvRgW!~p?OVIfg|p521{g8Y2^f_wr(y!--^{9=-V zg1i6u9~-{S(ac;@^N8X<--Vx~*({u$?Irp6+}zv_xCtGwb3DfVfWvB^uK@o zzkC6fR!!~S-|=5wi;c~{zrx8`!4UGi>0+{tb(T}xXtJ2$6&|M3TuBgW1YX*RNJy!;}(f)d&S zB9a39k|LtK*gJmyzi(BuGqW`J_|LcE*8IkPsk$|MxVQ*_q-q{^#Y17*hlVD5h8kQz3I+ z2{U0aUU2~vAzpJ)V<9nPaWi9KfxnA~t5J8f#DO%n{?AV(S7nAz6c8~H5f|V$;}tU& z72-7!5a!3{h>GzFi{g{aMa+bS1O-UgFGZ5%QA;Q6vBy6LNsHp}&%dlKcP|Bxq_HVE z6w+*_BpN7YZ2!D$`CqKZ|J67D^Y?BR6nyCaCQAN(yOW){vzxIaL!@u)5#TFm!h%B8&Md_xZ%1cx}a#-8_-f)MDv$pQk&#_Ux_OrXo zq&NE&7BcJ~(NB_FPtWC&y4s)meN+@<@+$rIoR#WXREOCrI$X?0=GNHtPbKZKxbbq~ zu}FITo8o~HspuQA>~jy>J336M)OXXdUfC?S)(?p-9EldAC zX!$%$lIriP$vWw^Z{F+?6WbP|xZ+}&(aX1QHyt~6Y{Tku>AVchG%g;VBgvW%nmdoi zPIyWOC){rwJVD==;-sRQCCs>SaB$G<+&NPU#Xm8T-LrTh#kA+^SB>=M{DOjxi5IvC z){635F)`Ny1J}5GZ>h8pPH3>GdHc41xb+!5J^h_qPrQtU8MAY9IVB`^?BBnC!|D~Q zR;?13k_rzGzpQ^@{Nnwpsw#74BZG-6D#>gd9INc??BaYEJesUT%F4?0^z{=yeizuj zp?6>){N6p)(avJa4@v6+H!;03;y1FfQSwgyCP^F1faWVApYp~cOBow}C{nqzc#`168yvcg@%=Fv)2X~^Qv+cTM ztgWqWyH4z*rKR1@Z$$NHcGC1~RY-4t|F5z&Ecdyn_a49Z^7H4}(p38PrpuAI<-$TK zyW+{MhYuhAHt9J$JbWU(*&;_DYbYuzDs27fhOXg-$kEcpIPQ~=j3|`K0;hqWlatBv zft#$mN@7(axsA`AQ#x^C^YP=yr<$erk`4T&ra_O(!Uv@o=Ola)OKfmARF1lQc?EXC z`&aGWBT7muHZwA+#7er1NZBeWDJ?9_*>$>q-B@*f$K}XK2G8QSjMI5Ny}jB!5@H;B zRylWziVohob&HFO%V=t(<4v4&4Eg=QKwwxHO^#JFo3L;M-r;xovSnK?@7L5v|Q?s70 z=#Z-FhIQ-KP0!7l+Sr6dNAFNf97}PsRmlnt_-)|+WmW&%*w=gGz2%M{-xM7k{mof& zs5!lQW_)1gXF1J29-bsQe`>DaR||jUJQn{Uwy1eERf>-+S5~fwOkwM#R3L z?}9hI0_(wp_wL-;&cnlVf_{~{x;mq%^-)(>QQtq4+j4Vr-`tZ3cN%!xkZr0o{Nu;W z*D%?U^TS%?(DubECbEi%FkCJ(V%)@|AC%f`HJYBcPgzS$ATvF%W0)OMky>qXaj0Yr{fnjYUK6vlO)$6Fa+i zQM{*dpUy)~LAW{-6O;FY&b@to#^=u;^Y%Wtu&{tlf95u7@aSZ^;&^}ksZt;5=0_(J z5vaRlyzlt=EpPmwxRg+yM%=!wR2j@*`TqVge}8|(yrYwoghS8D*4EZ<&M&-d+l=_T zySop`$t~B8QZpr)ozxQCYC$q0>FQr+lOs^Q(v!kgOyvhY#E6Z95Uo--ktW&&U^Okxl(y;TVk`-vCkU% zSk6jVW(F8$7qzg0$85`u6QpF>Wf!ni?7UB9bmc zN5Yt;zqMrSY);qpHTvlFXY!**fAl$Ky}6}}czkB#mf6`^$Jq%>ZEl7@8kVZAuK0WR zb`3S9$@};$T*#63nRhRl8`MRSs%EQ&CQZhiI2fBoy{XO}jN|A+}-TKtOba7$Mr@Uw{j{5cx#m{+m?*n5Oi;KMEFFL2#vxbN-)Hj%`uY^G z2wBgcue5!`v7d)$<$@gt$3+~Q6{|PgH!crI&g~l*sD62A#j#x<(hW;x-W?p@@Z`yp zyz5HIn#TOwgBfhpjvnpqyKRW`FRB_N8e&lF+2L$}qP7F|t+TT;IrnUVBW3lbUGA^F zF76yX+%UHkf^*#?BXM6wMxI1WmcM>|%)!-F=c1q&S8#&&Smn0lk`m+c)s%(#naa5D zZF!lF(?5+HKfaFQ)smV0#!l%fxu9Zhp7J62*tWjce5Km-3K}0ie28dj(xzZVz^&Kf)(IKArbOukFBr19h#>&P6_dF3ce=uBSn-FxXL;x15VHM6osJ{Owy& zQ7QMN+>SSVpRBvMY=uflG3t(rfk7M!nQqT_)ZaSP05!vpk56f>Tfbf_Au%yBe6Kop zK|w(sR@P3^4!5jgZ2Z7+sA->q20f+a@hR&2_YQh!dJM$6saB&T9&gRFGmQ2r?PaC$ zsF7#><*vfAqtB|=aB<-e$%7*2Taw&HJH;|4#>dCm4;*;%$!XK3O--4GT@x<#cSQ!9 z(&)~x;m2&NybP!;{E+dn_~(a_z)W6RE+ULU7? zdTX}KP7JPSztiQ4=yx6dbQo*C?BU7ut=kTq*)1g%gJ52Ekx9z+{gbm&+&Yhso;kBC z=ln;&tg0q+4ZBv<(7~=!Sq5(H{O|eXkUKnc6gsjt3%hz()JA3CZ7kL~8p`P&W4 zg^xuZ;}>_zUsM=>7s?|0)_?uBZy%D^i&!S2dSCQm9lmBw;YxOeZysKB& z#$EV*N-=bovOhJ$)zHwA)K5!U{Y=47ncq(3>&H_~N7@TW)K1UL2srdqNXf`zfiAD1 z>74M^_>;caheL-FuiRG`i30T8w&O0tejTd!>AHNbqn&4aL>}p8hNhPI->dMxp&N>HlHhk8TPA&H|OZ{BK2~_oi{eV1W+q3z8zqY3U%~U zzC9~Gs`#~3F)nn|E^&LR{Olh7y?awDyc!3cQDcpajSs7+sHFX1C{~}DnYnd_lqJgJ zc1}GiL@0-ZMD&xhg-r&>C21DQU*{;)ST{U zYH1zgb-WAkZDPX4;xqk)$xuC6Gx9~|*QPYBG=pMECP`{uk(NY0L-J1 z-MDi{uSY=Pk#^cEl!2eWe#vRjqYRpzX2-=OT#ty6(2I+U6Siu4_{j;#1kmxBO`9my zCgy`j5oOnygxp5jr5-g*b_Gvh!Bd`Yq~g_oejf$ph@#?hG0*piWc^{!mX;PO9>bDd zVq#(d$sr~mEj~VBl97?gyZ+VJ)WzQ3XmY688yl2t>30xt7ToV3?gDYw?A zl$EPiEz7cM<^~YCBkh$t=;Gw$1e9@UC&Sp;GiUU$(o$|Cd-m~} zKQ<;R(HxJLQNybZgU-U|TOL<@KWAokzu5{YjYUI4=UTdM=7&;WUjQ`Kb%s_}+@y%?6tyy&}dxi+s+HB=oP1;+>8 zRRcz%m9gF#8_Fal=rW}JT%T9Ub+{WRc3(?>dx2ASUfw`Y=LAC6(ftPdaxNi;p(-7gW_dVncv)rikPtagwkzu5NjJ>RG_>u(i&UGeOUuJ^SZ-7ZaP9A5Tm;TYY>|k2l;AFkOwq zzfSC~Q9`CVH`I8<-E?arjzw zGd8v!&@1cd)1ENdg_kWYxt};|70}${!rI&0107hF?l|n4pQcw9UIv+regMZFMSU4U zv&xA7M6ss}FdkR~i=5<8L29xY2P17yr;s+QAyJ6{r!VD!Y1(PD?26aBak8kmf`7fd zOiw?pWMs!hn;^bN+GghFJv}{gXvNS?erjzswzO16q~RX7hg8w-Y_SmjOEb*x z{<@9)v3t8&XYQKUb#=jS-l)-ML{`>^fXw@yKW@EyFTb9<{w^}mVMex$vw*x(&v=2N}{`)JABfwnw5@_y36baxy5`t|FMAcdOn zLs(3XV^Kdly+#{~Je-gerXJcUkVsO`$DJ1B=i39L;TS7;dP<&rq+Mpjzj^!iwJ*{1 zXFq-Vs;VjgNo5&InDJfT9HX-3etv$RvQ5_`=UvoJU6 z;O4fMo&EA{L!TXnhK6tBq_62`i2m5J)D^PY-ZWy^xJWTKcl`FA75Te1NjY5HZDbdY znrgfZla!Q{&)g3&oNs3RmrI`>R;amGV{p)i9znhH z;{E%($#sCE109-V+wsD>;{}7$xM0`brA|BHOkrYu98edi38ay&UY&Jy)PP(Qo`2K^ zYRun}yL4Bfbmpo8nE$i|;E#+v8I-xy@n2nJKSuSpWxlgVPwpTUTG~|gco}z3Pnn?; zB%3XF6JGP(pk^1(nD8U5)J?B%^C@NM(9zM!gXa_XT{wumcK`nUZjC^2Sv_BBBA9tt z>yBba3Fk65HJVC!9d&)XfFHrgJw30`ZnC(z?T?Y&y%t5*{_ zD#_frTRd?}l-1P-5R74L2NCcz(O8s-OK4HQ^!8R<<11O)el%-A?2A6|m2Rd1Z%aBd zZBK3TQk{vI3Gn;(K|CeKTVcA7i|Z=dn_F>lZ?S$UcsZu znB3h@>Jf|dU91&9R;^zB;kl)j&-|Fu>J8gp0z;*p&O3mVf+hiNGqcN8vUarl8h2N$ z*t~i3A@HQ)-qZYmQel$2$OY@B;EKsvr5qdj2NC2H-n~ppHe<-1y?aghx1->_YG~L} zY_NF0hmO3L%T47+*$1l}5N=yoSk#dhKztI)@y3mpKs;{{;uZ}FtH#F0XoL*#(Q;R- z4br6bP!Gi=B|kinUxWH%A$%)5TpsIZ+3`XIcPVW7;fl1^?}PvI3~=g!idDTQe)IQ_ zHYX%fpw-&9Z&QxlK7eqJ43n9?iZ&Y+<~RRW269#I!yS&BbWjk{c@V^o(7qKJSqYXj z8vW^-O}o0=>`FOgWfzSrxyiB7IMD9MU~FK(jDnVcK2H0w-c4Nj@+`Cq*ka^>GueMy z$U9jpY&^5@^`wvem}!`bv<(!7TCD*31$PBhD${VVlTy{|< zSuR;q+V9&HuCoonh6)<*ErdB1?nz2YI!=7k05$V#Et~hjQxD6IuTS$oG2Oe+$a%$m zt%_Qfvm_HMD=Qe;8&Oe;`udEQE?vUXfpS{AX;VKs5EOi53l>IjsRU*sSg-i16wT6n^^YrYeqBi$* zM%*<5b{hk~k6!7wrn;+(3yK?cV#D+yKd%TBpQ~4|8lhJq1)q5>oLYje+&2+2z-nI8!a55_Q!CP)9z5l&tEubIBl zhMaL`f<+g~54kafbEg+PtsnMUO7GsnIPMFP*Xq0>ZDa6 z5Y@zJ7fZ(Ps;+F(mm$RzO?7(BBb}q=SRbM&|1M6NRGG2gzs<}1R#krf_A!%%5bVB- zf5gBvu!@O&ocMfo3%f;Ukpz+qDXTko?lgaUFGxSb{LLK!%6LC`+}5)v9k=EIUS0Gyt|RTr&d$OO4GrKV z=pj{=O!ut!ocMMLAbNP!{tEUzXNBdirruqB;`;sET&1tyLaRFas(g8E%JgPsZ(;2@ z-q!OZG+PM(D^LD9jb@yG`yDYmW}I52EO1xr(TCYPIk5`}Y(W)8$drk7dCNoAxEdVH z?U1)2MDcP+$i{(p@oS8J_11oBYZLPNZB2!e|4=*a!=EBvXn=drko2Uv@@x6mX~+)+ zGh9)>dt{=><4Q>Up@q*~FAvvWnz$9H@s}XK2(I76#^&tsBoqM@$sJ&EpxuDjiU;w` zt^M#N#1D0Jg@C6VfCDtL^Edv?O^pvfdq>O2Sck<~w_(E`Ztmc`E+6dAPDU|X>mdOl ztZQm29TQW1#6B(3MW9FF*?L;B%J)SF(q|;H=hf8Dd;-*^O54*;pZ3>f5)qAT)_#{FCWIe6ju`FTgFHTO*_gV7UT2S}OL2xO~RVGK3z zO|;Od5^s;7oX$8-tL`6G+yNesvKr+~mU-_?&Jyn#<86F@|L}?c8kVSv1V#*6!BgELhJP=c(A8v!6O%k;^?=-u-~tPG%SFJVNW?v}Qkl&XfDX9@P|G zp!BPnE1RkGT@1K`t2R`=`CX-|P5?*p)=u|`ZKxz-(%YDr{;Xx&A~%1##b{uo;)+MF z4&JyczEq~B)MEL^HV^(VREmvRuJ|W0bRZj=tiX2Wae?Ke)Etaz`sDRMPvZ5@ZeP7q zr@jmg%|0w&0+|v?oMJ1epHkd^%Fh1&aSRO#v&;6Sauyi(?c|mI{{H7y&D0q>*9?5; zzNjl`K%%*CUVqnl_|r|CdFd-$1on(2c_h$1UPs6I9*7?d&Q)YVn=r5*5RNo8HTANL zmZ6p5d#1;E{9X+rW-Sd(b$k20hYz_zcS*>hsll;)sLc)Kn~+=Rb$OqCCtYCAm;JZb zwLoVEr@{(#`Q$$N7*s{@NdagVoW^=83riFcDcR4S6?UCa1NUUvo-YuxQ*8BaL@Wdo zXamtE)h9FbPXf;{JK415QtBf1A=iYTOxKC@YzL~fK&4GR9&3URqv1QmTEVV6Ld&ye z%^E0vdIgRg(1?<4a~WA!!XTaC;Lu3ClF~YH;*f!XLD0Kvf$!eD*+4@>(`1!n>D0NH z+-y}_Q{#Sr)vnmsSWp*y4&tYQ+jY`|LPB`QoYv)vh`h-3%RpK8qtmUZsJIh+CjtqQ!wOkdo0Lws`r_OvOK)J#|~Cur}Oj07iI=nK#yGw z52q^+q)Em43np*QWD9D;mjZf?GE^=jH(yRIiEQ_{+v!}OJ< zw}h!2IkFPz_e_cR4ixDpXA0!p-NnH^q?8^lE-pUy_ze&9F6`m#omjAOutsxF9~f za5?{~yc|91#>=ZW_B5)?QXm3|OGr2je-Z$atq$}KMDEux@rwk0L(U~+J46VyJe?Ez za7h5=rYeVXqD@$i2zmaw+9|2Qi2tCdatnxnPcK~d3kV2+^xCp*o06X1b~F_bxZl2g zTTxvt+jBJj0QMf>YFX@YC1?OaVPSmP+cW?dU|;~F98DwjebV!ZL9q(tD!?9O+Jp*I ztL8_9msv+clZtx&Wx+QLDCW-5L-c-kA8}Bx{8hE7_%_c4DiYB|GF}11I-D`L7HxxK^{WCD0DcjPtkmm%wxi zGpYr}Q;H3U7!UTp4`7nw`KQ=xDnTcG?B~yJ$e_sw+Tlk5B?JaOSFpGw-wW;NOF-QW zonrucL9(xLe2V5q3M=DI19IXeVk!`3M3jhS?D4_LR;w=l^SccP8oh;onb8f|7gx9f zf!MXVBP}bn;XTmL*ow1<1P_{N0Ob;QbR#Zq;k}>#&hc`BLXgvsDl6~H3FL-+vw9
(#LIX)fU2?j$7Vmn3-)9r>s! z?pZ=lEHg9nm4JXwjctYc8H$-7=~!46Uk=z>=IBFxIp%FZ`og}`L8bK~j2j`Al)rr& zx|LVIdtg8bUq>3>4!17!>%7nHx|o5OkUp2GoHbb34W;HHqOkpUK8^!Xt)UYe4rRUe z1y2lb5&R__0s><`@*<~lt#^=Y0bfLpz8dTx=ou>mypYk&yqHN@TzA66ukXv3GW7hf z(Fa1%t?mY^Je2A^Y;1lAt4&Oj zSN#1eO{Ltv83fF-v9V1Pv?b+g-MVHE>23FRGO0~#(62(HB_}86j`+V;Yz|KD*|Tw* z^hdYF0B{H9XU4-MH;^xkkavqPVo)nu=rYJyoJ`_CUlJ!MB*gMBC}LKtzYjI`@i)4j zeZL+D29I@e-*edIIt8U~8IQPIgf$x))_L>Z&)h$3{mA5= zZmrX?LNrpaYbijmv2FW}{Hcdk<}03{)z63$Fs(XK;Mms|CkA&9I8oc#7pPCycZxl! zFrAwiEJts73K$0DZpr}8P(99&ofj{njhI2kw7(BO?wP!6^+bW|9*qdCTgTD&3hWLJ z)USuq9-6p}OTb8F=riLF;_1Wv!>-M-rCl9}JW<>BnrH81UW30qGc0LZb^QwtgLP-o4p3B4Jg1~$(_;F0wjny{6rgFs4P~2F!z5QhWCM-F)$#!wj3M_C`^sVO{a4%* z9yaJ-s@h=2cNkn(jmpLVxvYnpH0f2bSrg}jT*BYpnbQtjp2hPZzN@m*AG=}jRqFVOq zl^=pf5G#TLx?Rw0EqFP0`1(*qP9!RB#4^3RC*kz)Y@sNa=)}``wm8`Q&fiYJ^fxp6 zJ(Ht=wr5kCz|diVm!|sFDqy~n=vujjLm6pH4OFK;oeR1veffOinwyi~X}TYNaW^0H z-DzWE1F4ZPy^$)FIQLYl^0o@Zi3loK8UBIREaMeG3r$bX#-NKtT2$LvcwU$hA`TkC zipEAdqN5HEgV;$?OR}-HhFw&&dFS(I&-S}!%+GrheBiVA#|`FFEG+QF2|YcFA>;j@ zB_E@{p}Y#&bsj{6q^zvG%y#(Z_AOfuqeF$=3&BpzK%1CMz$xJGy8HT0R*jZyRzHyQ zdg@13*VF;UV@fBwT3rQ6Q=;c{*4Xf#pW#Uc*T|+j9%&9w9;cX77-SU~?evxJgol?` z1ks(!v0{L$!U)l!dRI6I%qhLp0Vw2X%EPhfzu=a<5g-2!sEtUGi1Pu+bZ=tB!ce1b zK;J!jbS(hznSA?8pFZgkfP`Xx3Vj0+Sdqgabs<436?;xvwB=?D>cde%T%J6qp012N zUJWMR1Jx76HM@)qbAEQ%_gfstK0T$Z2LgOmR(1(AF&zWLszaKZv_P3$!E%6k1YV+R zo)~VW+q-u!*%NPXZ*LH+QOEB`bgZskYH__A&EEb>`P<_T zr_?6N9o&avLX2AYhP@&plNy2JM_bQ-d980Xo9~yrT5#g0>GfCbC;V?MoP3^>Qwg)> z&!6^i3qWp1>5ukIUbu~31Wu%isw&tzj66Hr+F}sR;|RC$fq37i-ZPHGnBwhSL`&OajLhBBH0iy z;Kjzk0NlE9<6?uwk&K1Xz9V2efxEzVCN|u!;Z_~nzHiq1RmiN;;@pfdV+a~vY78ek57wx{pLCMF0QhrWh)L0KJ&eW?c?V>L##k~f)#Ac zQb0O-J1!>dd4$u3;;xfvP~Qb!j!T{%h5K$@M~C!^tm5#?=%|2X;r>A%=KvXXqx`(C zhoQoBX>hhId0E@=U*RQYP z8@hk|sK3ds^box`ylgnDKjEY|f)g3)pQ`d*NO~nDC1|C7HYl;&jE`3bYwy(mrVNn@ zgtL`L?-8%*Yfhj0AY!|j9%{=`XVex*6KUY>!c~x7R)|49$Gy>QO9m*Kg-pdeHnfwN+=BJcn0h^fW zKnD^+8|e!wk_K3Cu+(KRmJmi2%6bwIBNav_8uA@Xp^K8a1GJlXfxOl8_i$|x-Cm@k zM6_7fcL)X4)EtHP{TfImv__{-pT;&%qu&MLSg=P|?%?iZb0s7))wqMvfLdedD1cEn z47FqsBR44l*empco57pXiiwjb>~;>NRud6f*X2z;6Mz51MH8ynNa{>#M!!tPON;xf zK0i9SANmO_SK!t!Lkm4{CLcl!x6bqC=4J-aQV9tOMACZqE(|RL%-b~WpH9diuc21~ zerd4E0dF3Y`;D91Wrf&pDwOgSwvVku8ADKo?*!1I-V?7l%zxeBJzm193tZ4$u01?>ZESAkt-2k^LyiNhoCyBrT8;v@+ zHNdD?h;%!2!+FdMTEVSj17gE z%L#-vas}xKTaf_dJ@fqCJtOojg!%YraD#voO85|@LZo`yEn6-X7S7qwrSDC9{}4iG zzxnF@LyrcBHke!02)rD1;2-z9StRvoyaUVu%sZ%6s_$AqeOdxd{;-kpPaa3`g`i8& zx&WjxbaTnQc_!PnxTwh9)s+nD~!X5h?p%A#6sWz~vJH<_?F9(8t}~_DaP%#O_`fQ{~G2NUy9w z)&It@5>tK0%;@Ii%{@1{rOUWAg4$UR@ zx+gd3YBMiMWGxw|!((I5_Ou5i#7Rd_?Pk`^yL%gwRXxZp;O%$vp(vGc-nWc8h^g?X zni>Z;_fU%8BMbnTn+GItp`WVbf8@?H=qx$mc_Bzy2l)n=T1kWc_ejUw+5|e(x7&O4 zlIc@SPqC9Fbp{sAS zriWg>y?()@x;4pW~Fw`De%{PoLZ`sWuk z043^I>sH!?B{QRO9gIT=6koP9A7+Qshc>kCIA zv4SII&d-m(gWdA#jT@Wc<{imrVvXBMwlL00ZTL%!C$|Y51MO3W=Zx>aKX{rL9KZA7 zL#Gq0CHJQ#KvO0{bR;&)3epcxv4$sI?RNdQZ5z%oiAWz%rSdnyw%nl1VA=CU5Z1Vdi{MT&_6C-07e2*ueYlnXH9hg_S} zK&oIiQCb246VirDSmh3~k|~XY&8rKSd9t^HMRQsss6Jn4-?| z`GhVJK2F#-O)ooqif3`>bE*{NSeEad^beoV&S?$=K^>V_zONfJEul>~jXF{l#-a{#d9W>y4}B0C3Gl+I=$A<4 z07-%vBa{GOjj9bQq7$J{Niv4SJ_BTZH7raiv7vi-*xRsc1#8@qzp*>uq;0_@Qjs}* zCu?7EkUsyVEM@7VbAL|TH`&V!^waWyvgJ9QdmXLvoq(Z*{YY}yJ)phS?GMujy1OqL zWTv9PqDK+JI0=LgQq3VT_E&B*B;%9{8fXhr0h3|fTPD`;yli5mBL-Ce3Ng_e2R<8l ze#$aN>m7is484dr{=s0N@&p1jVAK0n_V&Z%Ys#v541*v^iR!wL%9hAq_CRYODFJ9>x9-fcWU@jJXsNJKj? zkZB$DPFmZzUK!LShL*fz+xA~8v#O9f#P9g3L)@Y&&fCDVRrC5TTSIhIV<5lIaj zNth`z#Rx()3dC|0pW$(Io1;bJo2bbDk)8j!0wzsPQPC)rT+CzEqflSk>2D@G(@O_S zkOaI-z6&#Z0qR)U*;mNQ%EIxA`hkNeXjZeCSV^I&EY6S9{NrU@vt|u8I1AIF;1Pj> zVFpYynSx-S29w^8wmc%>lSUk0>iFZc2sk0iyHl(x_HFfXqbEJOhFj4V@6$@jLZL?5 zWN{IfJGdF%c}^%^P@N7AonTIb)j~^J#D?i`#_HlNE!E`}o7s2F#)M6cjXgk!5wks< zg5DP{D66XSILPRLu5oa2;o#@r4D%nR3?70!MT3n!GlF}RXf!Ya;;zMF?I;ulY>&88 z{|5X~qGMlO$`=Jh>hk5w!CikrnSB}Zpaz68aN0Fg%QZC2y+CfOj4-~phm+HUf4gcm zlKfSCJ@LDNvV%M!LO4i7Y07r8gOFE96hVwBLr4Ac<)Qv}@$b-1>A@nq!+RT;E3;0~ zGR^d6WLwY=ehFNJ1^M>vY64eYJDVa=Iel*#{b32A{w(?Eq1C!`PrLPIzviuqQcOIo zL4RHG>)BW_1Uk4CFjC)n!{(4z$RGxIfYQMnxH26EKX9O9RL!QZ-x+T5My`F&vnE#3 zdBUxUCXMW?$FC(x>)AOP^iwNd0zPKwczu)|2IZ13z?CJY@Wr81xW^dl-k<>3w3)F8}zIk(FA$HA5Ek;c;o?j#y+3Vycr#>j4VYM9m4lPj6~y+g^Fl$ z%)hc66?8u~ss^&>#@3Y7R8!1VfWugQc^T@+($p{=GDBlkGbC^DXIY>t8ddg;Ib${| z1wG-?xEy6Tio%GfpFt^wB>w>ZsEMKG^@$BNI6hTCvPr*dr5|EW3z^ltry>Z7&SFVt zIa0Zh>#!b-A4If~m5oO?BV_S@HyOrJR9wv%vO2NhYEF&_V(S$gVAxh@O>ngW;sl_1 zz5RtL_}3nE*Px3U@tP7-Fcf_a+fylrQyWRcLlk$=1DPLVbmFuho*+z=@Lk$RKZ9bl z(=`3jUPEd*4oHjro1UHhRkhR3eym5K1d>6a?K9j18UF0@ncGMO;}k*wlGIm1bb*Mi z49&~VCZ~pg2jXA32=stv#$!>8t1cNbz*as3)o14Qs7#4zpQkgnX3+zj?3R?Aee(Mm zz*cG{FWqB!ZyHeYz%rey?Az z2YZ3}mY49Pyd-0~7!-a5h1k*Xqa~(1Fn2;m7*eDw7Cw^SoX;#)L?dvj$bC%uY&jYU z&|^S9$BGm^PGXTr3kMX5p<*5v-+~XAJ_Q+G2l!1|UR#gH5P(qOzv7^C1v~2cGhWjf zg)S6M7+JJzg~8*cU}T}uP|yr&%=>M+(+jb0Ef%!@&B1Qd1? z&HSx(4Ojz}v~^Js-%96ytw#>+g|gcRHIS2sX9IEv$nQFE`l?tN^kz?ke{KZ;$HWn( zv&aKxW&d}wi}z4WFohG%Z@e5dPti<&j5lN~GB!r2M7MTVV`Elgq=tDNauIH#00)AX zE*^N9h{~`4Lkhc(IU`K&O1QOv~l_Kr^)QTlCPA< z(+Kl-8BnAi4l<#6ps{_02Y`YT4FCCRNcGB3Y)vsXhUp!Lk#-56nZ9i$iwj;D=(6$r z1Civb|2Bhe{6$}SW(ho+H=CN8q^zXG#BPI+=Xd{U1ZEl>M=y+hC4CarVJxWtYpT(L z{%BcYZ+e3$vGdsU5_FIy>M^K8c34kXSXgAHyH_B3rU8y@y?n^rW?tT2DXGE==9mP= z^Y9JejL7EMWTMQI{u0d=ZQ%3Zfahn=o|W*N-~!8>Pw_&ghuCj&{yfm?X_euSeIX4N z6-c4bao@(vhNY&SORJWYk|N*-iH7JQfU#)3yT)?xa~iysn8&^+bKx!mwad-VMHZ7M zdN_f+U54kmexLa6O{_5&ym;xGkbgY@B_naNiku#srnD9>F@p~c10(0~T8 zJYvQD5Ir%Wf>Trl;()Jo{uXZj=Iz^VO0pk8My58cgdd%-xWE+n5YsQO{0Z#whMfUV zNMHhc5xC=AL0^A=6;aV)=$3$rl-)~h^n19KNB{X+#4~greD67gwOdneY%CKAN1&2& zrfS%y%b{LlDl}bpG}kGM5YDhndtew)E%FgNJ3G(1CBK!Q$xAqxX>!y+P9F4L`utB$+b; zLDlheDoq&OJ5ZrUvI+xWmBEk$)(C-fOs%6s}FMqxH#gM2fs2hJO4DP!NOMR zp8oT}v9Gh$cj7nB_olK*oMn|fb~wG@rdhMIc6ODaLaaP>nt$axz=oxa0Yw)lDDsYx zgp?Fv*on}D-isszsFBIoByn+ZfR%MG!7PEqNkA*)?&Z~`{p=A21&Jr~?`-LLPh3tM zh@_w3BQfZx4hmG2eIvkzfK49z6?b7I@z`Re94Tqb-wvg4N)t(z}}=s|ci<<$etw3^ylR=5h_ znx~_sb<~yC!!$aM4>0Qv%*-**C>Da4nmRN8%R!)hg>dlAh~Va|JU6+0ZGiezg*}T7~~qRG)NL4J15NrEdRr;W-u^%@8_`Hxt!S@NcH;WF(MT zOCMKKWuWhFKj_Yn85RL)Ss)t_Y7!U-RSMnp01-qoIU4o|Fi{v@KgGie=J`xs$8dqg zJ8qf=jC4+1Q$)pH(dF91vg z>^hl{U$mb56b=!V2sp82Qs}A#tb`5C2yFEiwgyF{s=a}DF@xI@dPhvpkuAn z;}?3<-A9wwe0LalwBo{6@d=hIIlfX8`y4FJ7S)JPi_On49ABK#1(3ZPP^kOlOf53k zbbpMUt(9(i^VXduErZUO^ArSXBG-2fMm$q5K2Jx{M+j7t+djo}3; z%`Dgt4^vcl%e7nCkb39hq>>v4nLYem_SQBR564dN`}e24mwco=Jti-lF0+#1K9vgu@&8ji(b$g z-Q8uEUxthx^HBHp=NcUmFQc6@N5f8tYmnmhaNUs7jIrT0z_n}FuDy?sfvy}2Ulbl7 zV*h$ZD(nL;H`5K%#XEaO$_UPS(r(l5*N zoV0?31k+Wyg>aPknG85D!C`^~%l*;X)&|>}TiaJ#g#TDn%;kZBfv;%wb8;px=)Q9U z7Rt){`FoAbAu#W-fITrR4bAvb?^U%81lG_{FuYf$F=iJooHe#uD+oJWp;8)Os^e`)pL}FJm6Mzv~MYF9HVObmlF1B2uFuC}U9@{-%%qw7)grgP!ZZqQm(xzS zbRY*vMF{Cjz)X1TN>OUFvjTV`3q0ToN;>p>JkN>{dO||uPqvz%bz64+{CBSd_a7}y zA9CX5sA`zQz*S(JpfFX!4T>_@L;%#$M+Ume#6t?z5Ww<2Y7JbgmUypeK=2e-4>i^!iS9Z^wH;H3lr7)~Fj_q`=-*Le?>5W^E&kKYqN42Y)Y zQWUIns&gY?mE!g7Wgsp-m0Xa*DM4)`u2-Dtyuu+7FFoI}{lS|3#U4{ck0*oics2zY zK~zb8g$EIY(y}3l$mB&Mi$))7(2K}}?AAxQ45vssVNgJ@f? z?e;la>Jtm`&0k1U6rISM@| zxuH+)#}f=-f@Z*oEavYppZH2T=k~2zuh3!~$Fkr6f_=esLY?r<3%Br;iKqBtC8hv` zpu?Ur?g5y)Ec8!m8=z%~nCTq`zaC-frM~`h+0PnXHfq+2@T1hp#C0eaA%Mz7eEW4| z&XBxBQ3dBiXS%D|aeAZX2@ddvxYxCm`1$Mp0851r%yO zcGy1UsVFxQX4FW(w#WpZd(gFO>>?tOK)bZtw@+XFx3WU87M@~+6D$C%M7%F>Un6c_ zh9qJ7XoZ-Mv9kJY_gxHIw_-@<+Mg{L<*EX{#f%??_R6_SEiK*TVbwOabjh zh~~G+w`|*XP9>{*(eufk0@^SzHR&-j@qb;VGJhttVAEY1x)?LlDkv;GN0m$I$WlyX z1=rHs+xygZ_CdN{HXAY$(M&PG^{{+PPYIMP2T+VV7~y(Yvsde%b$lARFa4j#AN}8~ zu_exP|FV93oqh&J+3}FN(=BSZ&*Ld|*O{cE&~g}?n^%F?V*ZqaamA{do9x6#gtld> z!vJmD9Z45%BE=m!g2%#~T&>Zmk2K{zQZN9ALP6TBy9XZiRfS%d42J=r;gLqNLpQM9 z2Y0Q)5#1aD)e{XjtZ!-nf+*d@TMLdSYS4v@c0A&M zf>ybRha+ud6yA*;1N6Ra*}j-#Ue5?H69)Pch>@rh5XofUpO1zJ0rAc=$2ZFDeQ&px_1zZFmckfPemZ`8uM;eLp-btoOoGgIR_Vee$-RN>0i#YWMC;7Z0r zoPzOm0Ft%((8Puvlv#Qn(2eR9zGg>hTIBERq!X|?*pRpe<9JC>wyv|t#*qhH5S|>U zZya9j+qF5JzKa)#1pu@kNw=6f=|?#*M@dEJdKFKZX+P;jo+gJu0n7(%zX&cgHde}w zcE=9O7c?v^@q$6cHNfkbv`B$%A8yK6!u7xs1WX==hxg%|$V?^0v;HZbf`kMwjj=Ie zHpY`qF5_tu@D&fXKHH1r`Vl2gBM=Yj=vfxN@;mEx_-Qb|Mz-f7@lJr^Uxh8FBIg7+ z3Z9WEmst3BiLVW-KqZceTG-VvGE?Ww1fdI)pCkG8=-*2I{60;^C~R>E-%Z{`1=H?c zJk1E4WS4IHVl#X-#KlKNoR=VqNFJnuj)O@M0l2OOi_K5%kaFcAZIG;Nm+;~bJQFLW zz!d8sjg#nEp+RPL-|s2&Tnpn0gcz|4KM?F#67rlsDo`IpYVPR)-8W;WehUm5bQw-O z%-|wA9rS?M@chKz@HF5NHjp}&{lxP>o+5fdh^SU0tHW$Qx_@NR5sy`ax$Ytq!Y#D4 zuaJ?5(m)03cdE`7dbuIPj1iHc`>vB~P62Ofg)N+DG8+B(xfM%E&fgSQKtNBML+?om-Ou za2-@w>@z%-m>p+;LJ5cQrkvR-rD|l_ro@vvpeE7`OG^fsw;niC1Ki<`=b=%N$8BKc zNE|qVwgtr*wQ>xTXO`BQ280~CV5!?ceBji6g#Q1&O#@(N52 zEIp7#xq|pzP_RelBwVr|VsX6f+TL`oUV+XS4Dewp%or_lek0*fCS;Cf$W$_g zOc63Pn5QM8WJqNUA&E-TV9c8VJ6p2tOREUa@(y(8bweH_Op5K1{ z*!%b$&tLmKj_0}WG<-k9`+W`Pd0yvxZPm{;Ojzwk2@E*woM8oiB=j>j2YCRTyhgOh zsl;C%Z!>x%O{~7AEbPy&+{q*cxtf)uudgpI7i?A=@FY=|0Hq%JFgR(KRcH@FrR?I? zt{$Z=moIL4?mnXn$ z0xvE}=j$6OvcPrC6=L6~ zdisRlW-ebm27#88DatO}&BiYDH>lJ%Vo3F>nV(jl3JeX}_0nA1cSNwa*{E?V4UZ-F ztT@I36Ms`GI!kK^?G3_B0$-ngUQ|-Kk%uIx0m;dvRsN+%tLV>|CIDMKh|~>-zrK4# zn*cIQhH_ZYysS`61MI9}Vf_hCHd+WvydjAK}xRqAuXm9-{ZFc6D#>lJKd8kV=T z7U-YNv@^1^`=r4D)lpWCre5Yk5vEW?qu=TKWj*YHxy9GW2ofz9DG1&3HHXdsT*5U{ zTh9JCAl0C}qwv~z{83{Z=UYlZ#VXo(nP8Zc)a{7Zq>JW9D>c-_#f}$1j~tL;3$){W zd>&nwH}!{oY3?XdZkd}u>$|rcY0jf#!-S`&$`FQ?7AKej5m5wyzMts6QTmCKBseHF ze2uZcm#X1U1#J!ahB(%xXV3SS-qa^FBX&Os+?D-3nw{0Hm!84w)D7pnKVGs=c-FG0 z{nf|OLl;dCsN-_YX=vfueW9~5kC{~+V`3r`Y*wFz5WQ zM3e=R0cL|nv4#XelGG28emeaFlkFlXVuJl&6%K6?9?xrNfP};7u=?gG7+dPSH$t62 zV$8d>;V?=y<`fdC5qUjbiDbe|B1~YB-`k|Df+|XM^`cKjUqbOUjsg;~eHTqlPX?ov zVFyTZ(Kv=+T?!H|aW8lL=GN`nO#<%}IXRGpZudn9_=6|{gryMRiRpU~`1`4;K}0U1 zX?sjtsdA?@1ivkWiqflo(hQLW3A#xq!(+5rYsjWR>dms=kMf~DX1j?87#Q{!N%1S5 z_Y)xrt#b!GySgWV`Djw9nL2?ggKgf1h`{AW#!pErKrZ5&g2=hmxBwOoL!dr9Z(Vv5 zPzAa*i^w-Ho?uGtAj1K}or|XcmU<6e(}mJw z5o8ZE*Vp13CBBA6?2J~udg>j_GDsdZN%_xOrzqoJ&4U(1*te@4KGp4>smZdt0bAEH ziuoZcT30qY@(USbh3SJr5TjNgq@}zUAYlgpK|;s<`%wd)dDGh?hb8gLPqP9j`2-^a z|5!KvpamXjJag$Kf5cm_35;hy#@ds=_2j$?Vsx2|%xpLtEUsP!aGzP6|AA z%*aE$iPBeqAB&p-(B^K6XJxUUxY29aO~66>t^=eY6}S_e zOL`TqNsZ(}b?frs>`@6%qNOM50uDj9NI^!cBJyYI=(IDFTFQ7k=(yaP5F=FB0^BkF z4<_tA!nvQ&;^4>~hdIb(RN&O(llg<*LsqpHCkVXk#BG2`FUD!479YLUuZ{gJpgRSV z6KIcr{Cy?#4Qz+A05&pA#YXbo;LYZPF%9f&0A_&Oz#Sq9+fJ4E#FV@`FcTEG7#&r} zh6oEg$<~EU0|E7KqOig#~;JodA zUU|q3sjUkM{PNyuVNdIg_y^11vdsKZ<5k-!O!vur{&J6Xa zIxv3~JdPnR`_qX@G_DBH#GsA3k_%W!PGVT!cf0vg>RC321XCJ!fgBhdCPiu%k6MQQwS0pOm7You^4%R zI4BYus5I&m2BcV^AxkJmL%fT6+HZpux-0IyM}sC!785tce2K^=rpFi;+?SyizQJWn zyG5T~$|uQ@1^kOR;^%BEYf7GDl3*uQ1%YdGM1(Gliw%!Oq~erN&2c91^XmZLC9J-f zZ$h*94q8rxQxk_+lE4|nCc+$mACy8ggC04h7Y+f(qR$IQlO%}>L`|e+yt9*3cEl&x zh8*udW?`*#_UzdYt}9lo*nRP0UwDYqz?vc$!T$6RQ7;{Btf(buFLwY*6W|k3nQ^t~ z^sL^bS|LeCET~JL4U{F*@6v)1?uRi@gd?>$8FO7C9%7-R5=izPyjzkd$?4_ZtDsWh z4~;ip)t$4z^wj94u4(5-PLEr*b@;P=2UL;p-ym;Y5HFW|}$4*po1bk`2xGuyf z;^y!D$F`q8*F!taxUf{340;{9)q5hIh1NjCg7@*OZ)!2z8~4wBd&!g@Z^E8J1ha%O zWF4-mUf#xoP3GkK$35m@vCE^r7on;JC*`HPm<9Q$>1P|IP>qlePhMmNAIk$i*7U>F! z`H#6Wia+F}ydsIYL>XGhrQmPkCBzKS6NoB2JpKv^2?@@ok0g*ypj4i+CM3f)z3LqA zSA0HA_h!@hqYEC;-BbZeMTQ82%M)yh_DAgQM0db=bmxHs4U{meUB!Af9#0$Q|d_wL3Bp+xtK z*G~%#jj70HC{D$nm!O5L&lG|-6F*;kFIe~d%0s9(v5Y|HCP2?y5*KYGK*c1AFPIwn zRREDS;+eMU)p+c>35p^aqt28zfSF6wG_7beMLYw->|OjF^nu1No!XdRF~8v48(V3j z1(jn0K@{xCP(VD&FE*Fo_R;+q?;l$JQcSU47 z94cXo7ht7BB_OU_NXki&WTFR8U$r955N3l}!-6rfTd-no`{$oY3&)r#fK1WO1s@J;pTKw9r-ZqC7yi5Gxbv#a-={J z5~;4ednbLX2(^eTR?i7R=L;T#lP_=I>* z#QJQU`m3^XAoA^}wvOSK8=P%7e4XIe&g)WG%`#OY4E(Hc1Xir4x>*zTFJ8P@@^Pal znmidJQT$_YY-ALB!>({@#wE)Rv`h%>Ntr_Pk~khC7o}FWpSB7z{UDa_XkCoIN7X!s zkfEbE@S%vX!3UMRx@Hk-Wq`Nz19TfcXgSmqaH0AWSl`Zd9@=<9*CX|-!bsHUe=(R1 zKq5ss=us{|MV1c6t3Zf;pmI?^F<>TMg$Ro$F%DuJ5`)0V7%9HE`?APkwx4j8j!2Vv z@X~P8^h@nQmPZ&SK~g~)mqth0WmNOLhqgc}3YvESBdd_QS+m+Bap%IbV5ui8d8{5U_VhaiA;lB$siDQrrZ>j*CR-niBqP$L#gr4 zktL5ng+>$GhPqb`g-8^4sippIM@S2Z2*v7G45BC@zm%`RaHN;gFrOpz?!mr^#|o{#Pz-K_hqb8$Vh-Vg8vHsD!HwJ3fT#7=w2 zQ5<1~+Tp=~#)%hj?)cEBymK&YDuy&>UByp}Wr9gkS70LYEePI1ZJn32easQaC_02+ zXKrKb_U&TIN)bPq%JfC7hY^C_c(g2(p_Ec>@#bJ2`o8fior{(?jtFrj)g7-8)>$wW za7OwZp+KZM66Z*sEb%9gGJGipQj%Mxt>nS_UYlvlX;+~)zcwOw$(dLr4nOU?YOO8* z-n%!51S#bc3Vepur;wxI6vZZpVxLOMB-o59sqD$0{TW#Hc%?Cuc)82qg@LGSPm$y# zJ@6{T34>onP9g_HZ1wUw4R1*2D_o%HsK^hX_FlC6a^jL4cqX2tP`Sj=rL<=vZ{rH) zUR(J<(0ya$!PO4^5O6R_BBKie$_P5gzGYsfExw*o-=Ruj3{|Y4=2m;;?4nv#1B0e; zqAsI|dyMJty*=tlY*)c|mNVrpa0)Bl20Vl|HU7#b2WF)~j%C})uBZQFYH#|585Bz_hc=iDfaM7hCpL#-HU?$Nd(HH>|4P5@DTYBI_>K^u~ zTs`|hj$4sM&Po#%iWw%ffNul%_1y6ewG^hOdNyKu39OW=2}88jKpA5~GL8&gU_m;= zu8q!Iz!c-}_e85mUC7dwz5cJ;wY+z>%z`<;a85?=z9Jg@_b#0*U6hL}SATJiIKnWZKB4HGU_!EJOy3#~`|~CtS3+AzmjYwCNpv;$qSn0S5E4Bm6*=x^J32d- zsTgrkg5i;m44MXLZ}R+h+C7vYVxR{631LeV6*E}?IigBD43YRL;FY6b7*FQ?M3BUv4X;*U#3Miw z5RO;yzR#2xsQ09t8@THEA;e1H2@}!j%MezdK7Ua>vQ;MuxIy&^2Pkf0fKRe8h)6O* z0&YS^RErAVHiH(53PsND5Gz#~i6nuD?g3h@-T( zc~s;KVqgQ%>KCzt^v1doC={F&HI!>w(RWe1L1ni9m8Lt!xRFCP_wXscIJ}Mz-N$PY zj)2lnC_?tL&xXYuPRWn}dykgWhvN}gJ@};8A!JkP>?E&ZoUX+hW9uB3WJjoAK`%bP z!yjiMlB$>kQDNMp1t%b3eaNWT@u^E+X0;R9UX%8Nc92_dw<;oH`T)Gs-?N<|hiKcC z?Y=#0y{gF6>?1>B`&lWp;sWCehDX8;;sWU=eG8t>45H*Uzvmmhy@hNz%GROA!-+u=`pAwSs2f}pFG#Q2z zm?}G49jPvlqmxunWE^Uk-guCBfTXL!cBZ@R4c-*Ps$R%FBlv!_x1axdu5da7~ zMN2a9uierigK^Z}}OjVyz1OkM@SL(Z;pCfY`G;aKs?J0FAwRI_w6L9D_5+Y^dVg`rc zm6~5PmkFYY3~aFsX(Diu7)1=EHC;%79axTf^dKEOFsRJ-5CAye^91inX0E{scu4f< zKG%NVC)-vQ6yWVzN<5a}T?kR3qN)2t%1oZ}eVxQSPz`odG@f{a$%$ow7cF+xbRYpw z4eH7?8}uNNl5}l7C0xVEU5q@)&fTy6oSmAZSJ5F*Ur>XIG;(5Hxp$%TO>RW6%Pd7zC zR7CH@!?$b*N(V3G*Eod8hk+r=!D$3FS!9usk;`Mp6L>`{)O(^c!~ASU$iL2nZCXyh z0+mZRnew!J3a)Yp1{7uzpN7OHmx+UUH`j}GxA@hv#^mX;(uIOyB`@H_+6^17FV9%S zyO2Y2!8^5j_H2NGG6RP6!H0wYh>49glG9U&i4-snWKxjOPWSePq3@iPA93K<7IT0p z7@l3!V0ht1UhsX*+!7d;_@c7EmQX*dcE3mLnGrNqozq#?CcPEXSB4O&B|FW2{OIzG z8&0c4TEll2wSU-3b?RgNn6ITTs2Uu`H~Ra?UFZqInj8f{;&c-s_qOZn z$?vRWWDmN9ArpTcklSl8Top zJB^QyJ&b)(Hgp>_=v#o5nx>&)%-xF?6m9^FD|}M?KB9f2`Nb8(N9$x``S=GdZ|zFs zHh^_tEyVT@w->69C)7_uH0iqx6dIN&jmyRsDXtk7!M=Nsc}PA8yr}%x_omE>B2*AR z3aFs&^fVHkscK9Y%6T^8d%-B_F8Cmd9;woVH>1a5&5D+X4WG!s1&u9d4?UpP5VBSN zPvC22=rGCFq1ln%l3vNUEDnzc0}26-l994s#;L$Z?7@&JTvOO1a*_|FqEM4e@(Oc^ z9fX)xLy|0|TLy$EWumtta$lKL!!(1AK=KU@pPae{IHbsZ`!=2^!BNP{)NH4@ zZs-|lyQp*+E*~rt)586Ocmu#mtIAzYh7xB{%NwMBmF^9F=3V0VvZv?v2Y(yO85dkP zgQq6|@%^-K#D2NgK^`OF53xlu=l{;v-Z01P%RJOT>!;|ya166@`#w`<4_SM1QX5#6 z%1KH+@lC=tLPkX>o~7ibvL4*}kI#rOxzw|eA7Yw>YE^!WCQY^$EZgtXySf}!fRUaA zWxvVi3s*?U5m97Q2D9b-J)(hBn=&~_Idd91orr2AX&OoHz%_5ia#v%4BgCGPP#6b; zBmLr~HT0SStr@!P&|vl)F`Ij)LwNi%$sgrUR&$$GdO8+_Yn&kZf$;KWab}DLK^H> ze_?oP_Q|9ZMXb7z@kox4z{(T@AgI*%Ofxlhrs+v1$aoK6$& zeGRYt9JJ@j`=T|LRzA^%F{y4gfAqI{{_EHQIetEUy#*Gs* zDDu4MCPki1(#iIJPLtY} zK3#`~^hq?DS?kh`hjwhH;r?@h-OVrKNz)SmS71W4sK@1-MrqcEcI>zxo9GlgqSURj zBGuy&O_8K%^Ng%?YJdhWV7^I8P<^@$G4NmoU!PUXBxHT6E?vqJ=2JFJ zGpyKp{=7DnzMOOjv|q?M)2HB*)lwq0`}Hdz@>3sPrkVd(RP=)L{^*{BYGMuFNOc^3 z{9k+DFpl`62p1P^7Lh8#9TE2JP8iJ}WwueyT2sJ#ex(_lZe>OBbo9op#w+H~MaV&f zkO*S%dG+d59{nF2Giq+$=KJ^Wf(C=DGROZ&jywPxqN$d%M}!2B;(~6Q>gU|~^KZCl zu_Gk)1L+P083)am=R?64&Rd39m`oQ(y)L%XpKxM@e6O0&Ve0N3J2v{eKW%*hu$T?@ z9+MUk1;flSTz>!zp1hy^OV!FTV8#E&>}a?#(_pEbuPbFY@mk!% z<*)$Jenii^`Tdy%fxJ%I)2CxCEsy`wXtR48xm_lEAjhN7N=hdK2`c8q1qC+c(M0~@ z!e(B|3P3oSAhfa3qN!ZM&ZAa4c;ZB{m75#OSVXP-A%LoWwk4x;ua}mM&f$XRpmhLf zUP?d|c9mCU`825UbF_m`(x8xS&jti+3K-)hRztQcRtRDr6LZ44=Ic>zOh|c|2E0}N zI%&~fgYlCl?HrM1xhyH)L57B$YsZZp+wW?p?*p4+gn)_XK>%jcdGnHyb|k71RwfvBi8>n4~ss?vd}>4O-Tm5*B;RV{B-dqvapaU1-8N z(~n5OhD%{HulQSEe{3_T+O=!fdsI5qL<16)IGYI0Y8?y6EPZu$SuAyL&%S-7PyYJVVdanxc*6}EJa|Fm zD`B1){aQ?Fgh9QjzbL~tPvOz`Lj8k8V4SBKVH_OOP8-_{fmdsmi>Wl zTmS3*uEpXW+Le!B1fbB!wu~v&z{{5p#MV}qocI_>Xu6_rl<-U?A0g_iep}bOyft2F%uO5%#je&j?EgeA1l|;#n=t|>*1qAc^^q|zp z6X~!L;=SP9a|4i`%;qYbZXA!T`5p?FS^KK~UP(1vc z+v&vmHw`I_>yKQsW&no?Q^H1ts)!H-V!rnBd7FqA^0OR|9&qm54q}f&<^t(~_QdDe z`xl`-1F2S=J9qBnrAy6p^7?3L-E%vUZI_6BCQ2-izM3NNO6qqbxjM`CDkoP=!KY=K z{+GH)!0tUizYIoYA#0y1S1Irh@LCzgz)tg%OYD#Z>YKl%R!Un3#Uj45PoNi=in=@72e|RBUrl-%IiC99x=7%{{ znlcmK^T1K74Ld2Go>sel=9N%v#-2M4Kubs0vsbTx@bDHoqc+HujU5|hbg=O%;XCfU-~}KKioQHv|c1FBv?~x>uJ7!g%Y7BlokZ~vt|oRDBQi z=nn93>QomoHNydrz1ZVl^pb4r{qdu%!Y-!5=9AM1aD+wlaZKACpr!m8r>q(kuP!H) z!*9G3rkCw3j&xK_Pe8=v07k;6oTrN%xho9-XL%jv-AFo?-Qr&6mm_v(V&9I)Bon3w z{iEdYW5XSH)oa{F2mXx8@h;m+-0LW{f@rmbbpj!vB^N~|Bs#^_ef6#5#=Z->m{7M5 z_z-wx#nrb0OOfi|?e(bYYH@9)#Cxgx1vd54*sudwC0vHX`>8o+tx;jZV?HU2li&{! z_tIiLJVdY$Vb1*G+weqmia?&`BFudh z4FBwb2s!BOeIGoF!!8|TYhj>1e*E||Wwm=eeVYsRKEa`(7<3ZPNc_#Rbw-i-<} z3#LhO6U1qBd~2D{;^>7wqMG4VSggKv82$Htd6`*jQ>UAm-9`U8*3HcTVRqt&bz;sf zgVDuNZ<|qX+DFgJ{Osgjkz{?D(v^vlQT!y8s%$U<(_d%^a~-0EKa>)GufdPZaj~X= zamS|i08<@$d}?vbFFO#7XkJ49Mzh8E929n*bG9R;mZ_;}Jehz2lm#p^f+wi1VkDMu zky#Fnsblo3zopMxlhAq|vb1kS&s8bgiNt`*g*$tkn2)Zr5Bhzu{%}r$6`>}@z6`=p zm5Ypq173K7K4cm}MTis{KYOdS*xzY)8{M(%5rlaR`%(c~kEBpdC*Fy0zkqBYG!Q+d zQgfh4fw`6~lj=a!anP}>K827ojE4zG&zq-=tilYPqFs)-^W+ojPg&D^O=eU6a$sr&R;WD;Z?i#K0$?-Pt z_%xRqdm)Knr zG9;S=sEYsy$b_Yu2myp(PM+DSReh1gQGmim*Bd!zj50e~9_jY&^~*~J15Uz-Ncl=# zE5&4aY^_1;&xHP*g7=2(DQ%=^Hi$6s28(-=+85S&hL>InuTySVE&>+82wZcJp5Bex zJnU9QE5z={s@9kgFD2xVA*d1>dwbkeR#pa)X-Yij zt+ZGPOWg?*BZIdH`JzG%kca}#Xd%eYHs=%IAT&YTA>gF*jjNl+0K)l@kYVfIHwOal zO3epKErU1A0t-q{)dYLDTdPE+e*MdK*~5uv369S#6G84LBfcd_qg#@fiCV(-vHp^Z_SF>*j6SM7JmYIAZA+m>RO7W9EPk5Vvo;?9DieK+LFqVU_uCG z3ybVb%1GCymuEyB7DSh-EZ06`?DK8!pyycKel*}?zAw0IU9N@kV39V-d z#m7r{R~%2wz!6gXu0V?AC^&k{rcImDuU{tb(9`nTsQm;704Pur5eL|k)S)7xTh^TEvs!!FPxpIiu=YuN$B<-JLTQa=Uoo&gc!C^sZB-y7S)@yW|m6aP< zDI+Z{)vY&vsmClv56Dkc)Z+TKFyaM=!1thmBhJv}b|6%v0jNKv?R8269Pr+4Qqjoe z7&kL>^MQy+C2o=2B~epv$~FRhTX1!*==Dh%&{bYw|2)}je~Yzib;XknF77O&Ba+ZT z8l-}{bp4|?u$cInaM)PUxY!Z|0dkrx!3MSNnc(1^04)&|FS{T0?%Ow?7XpvcPG@EW zVMS;MxF21xL;)kTsE8v`WQh=gATQ^R>X#+!D$Hih zDg%aF%cz&Ft*y|%QO{6d6VHnGjm9(=7ik~+p9BJ)zhc%5Ayrb zfGR@{bljw@5``u}j*g(8J$l`ub}0!WNXGRr;Xiu4cTP_PfilO%G}4KUUnimOWQym< z+2SMMTIFYNCQNZCze0t}lekBX0GlzCKM?!WvU0CLv`Ff#KiX{!dGcficMwlp9LlDp zMov3h4AyeL{9_M`+b}vUDoz}V^qy2KU1Z;Fb@<~uc6jxg&&J=e-uu6PnK`ZNe3$A$ zucafca$Yv6Dt6?)_#m;by;@7uRxTRr47w z0=n0`aHe*Xxw>ZcnD^znW!A6lh90!DQr)?2-w*2(pX%iuzx}Gyvih^y4$|9{(y)bP z+`@WZ{WnIh(VeO`yJmSxM%vH@b}KY~Z6CS*rb||g(Y)y9eVp13QrR$ddsUNkRh`dX zjsuO9J{dND(fU)2wNui<6Tj+vOzXsb?x@mRHo&#TlR(vDSq)$K-}z7-=-}8{vtHyT z!{>KCxHW&-VtaL?V>M|@2EF^d`Q#9jL#yr>7Y+)Wt+}9EvG!9>zr6Q73f81PNL$jX zmCdL{>gzf+zUaC+qghRh0>fzQk)gE%5^a-=Pd3`&*}HgqS~IQ1`Nf+9$~s4>H@VsF zVOi%uwY$x9_V#|XpH({)TOR1wVCAYiPkh$33>+RbYE8dy$Lb^u z3oA4p>ZWkG7Jnl0WcY2fn{`eF+*CZ%Z(_JfYo*Jay!53fOTB|H)k_#T=JTwXdh)KP z+YVDo8WC4lO=s=-ue!PO0)r1(9MzhB|o1ajejSeen zTH0{)6Wx&!!J6t;O$YfrC~@l4a=p_nJM9?>(ScuQI{ab#FuA!^&;qTFpFPS$eqH&{ z)M>SDsCKoou5*%J-G`~8Yetz~v^}@|=B>2h54J|XnRl+&w(HtG4VRyvf5S>S$loWa z_3;LUmrq{1vo-WsYCyMCU4M|s9aWLRE7~a~6*P_EDK~RGY;WryJbGBw$>7ILT36N` zeS5+CAsX`n>{m86JFz9MZOdyP&wJXeHFn<~ZMdLrtBwP1_qgom6OymqAZC-v%(~_( zgP!?b^YhcxY^2>Nx%#7avi<1{JFQzIs*{H;I6md@r#pi$ne3P}u=-Nykiyo5qgVNS zxFOe&`Skx8B_2DkPA*@JW3uq7-|BbOYez1>pyF%%{l2YU>#kn@J}Mbc=Wj3a z{g|R-&64c6@cgtM&c3;{z3WG<-QqKAiKF+5_C?91{uv8i+FsBtkI0meI|tMxWG4s@qM+BC~G7#$S%^7n5DohR!Q!U)vz!ePO++9*~sv zHeF1)b4oF$U`)}8w3>l!H{O`DW6ObV>LA&W|h~O6%`E-u%oJ5rXT^U z%vFBYj}NN#chPv!^nliujD|j)#$>p(+#EBz(F5JiE4r>zUvlT~^iJkR%YO8pa$@-< z=b!FZ|JXRub)v8B5Jy9^CewEYUfi{IU!=XVNt zCOnHba&NlomrwJzYPOG>?ie^TWZ&$T_Zu}ERcq~Sf2C+}W@V3vC6DUGbZ)NK_OhPe zHLsk;+Y&Wh+SDB%f3161twGCoPO-~}xE1TfnO&-LYJT=x6U#bdO13)n3aiw!FYT1O zOUKVNvD>IeYK>;e6K>JB>-;$@we(lHG@CpvZpV$2*FS{}Gc#^#V?D|%)J3D!qV46A zr}^cY&RT92k$E!a-pZO!Wz)uNaJi9};iFU8IqK8+o(A=<=9fO`WSrlt%k7m8j<;^pi?peL9rT>`P4w_5av{K)4Io)La(|Oh#8a-^3o7KYf!}-wdrmnHJ zMqz`uI&JN`BJW+Z2DXj!jt6MQH|bhXynSl?{G1VK*Ft@EJHA=l^7W%7zC#`rj(p^F zu9w##f4^a~W+rIudvR+)Vot#IpI+5jtk`!4!v1R&H^b7hI=e&JW$y+0UP)Uu{FM7R zox7-$(@)={W1TJm=Noi%-*-c~Dn1~l(dJif!v;NX^0(vst7BHRJN8mF?~6@?wElJP z4ENDApSkkUchxQTHt4$Cy40voo4BOp?_V1aXszq7d9K$M^UubIo1Bb(Z1(Ww58auU zBPM8G?tRRt;n`@dKD$^Jd*>XV#ig~&{qns&$eGYDty{a5-y>=1JvBRcQ>S%j&+F}5 zF6$VhwRP}Q-_<|otkPOPc(CtC+3UqCr=GhwXw~eM1%vzdUuHY7^Fv$Ra@z}fGyD0q zT=}}-)#ksy7hJ7uzqbGGgsPRcg9`ZrJ4^Rx8xOwlv)i#rdY|>4`E`DD(As;`jUGR7I28HUzo~!6f6ev(Tk8MMmsgK@W?TgG9 zti=fP5#Nq2ZqvCnVZ{Fo!QhY3%`ZCnD$=v+D%%a{psT!I#oND4hcmAiUwc~7J~Z@4 zzi&-zHViFmye({KS*C65&}G#nw;K1)O10H{RrYiH$i&-ezicDUz4uucQQFfpy`FjE ztml<=eSY+_|G6nL@o49ke9oWemaIIioV!cmuV`S`IPsdVfs(G#c5kaR$14pjrW&<% z_kR(irS)Ltn~ezuHoK4I4$)d);Wg&#lpV&~K1~aFs~PpiE@HsCC7pjx7@gXyV6bP} z(D!TmM%@X>ZGQLL_DiSZ`X_G&Ks;XcGyPa%oWd5vx+j?Oq{so zOs_Pzn{yh*Tqm6QzHg#4W^D(xF-ITUOnhXk=i20i zQL`1DNNA^aHyoidYxKj^yxp@ppSjqsW<*W9s5?_!GrHTvzdzsQzR}`674`k{3`0JL z{L+}$F!a&p$FZBbLtMvRAfkYLl6&m#J@eUe9fW>s|fOJ_8R&Htt|B z>!`2x^Sr^Odw(r>7-8LX8ara*?&l8LvpcUc?x{W8Zu8_W{GA7T0!1hm{56+`crbdv(*tg}P%iO&WWd`vkl?jeBg|e1zg*S<3dbt4q?Fyz8_z?9smH*IT2b zIycYAo@Z@;|BCgRNBS`)gJnS-xxi5fb3fY*y%^l0>h#H>iOHc~8*kbb(fp-S`wnpn zxB31N=IWOhe{e){R`Az4L;aOsZ!+;-a(+_92b)I+v(-mup2opXs;y>o95#r`2l>Qv#1~-(cG7vgOd&hf{_|W=^S>RIqB#oX>$N z+lQZ{t{duB`yo1gibH5f6bEUG9p|1`NicaUp-u~X5F-wQM;!3o_wCQxbl4? z-FUx*9g&L2`))K@A~m?Pe%9rZ(D}{#Et*Hq4@vw-PyYv&xX*X zktwi_8G>Yh&aeM)aA`eY63_U&Tslt8Zr$FUdR_vON~itfc;z5$F3>e^d>jsM%(;1` ze?QOKP;{}XKrgmpYI(J@SSp}J+gMUA+avT!l;?M8@4#kjlb*{MAWjJVhChQX7P^N{ z7(z@Y?gi)t^bltCrG$%2_V`Z}&e;h(d{Ie4p@Tk%Y>}gQwj|{*DwbdIwlDIrd)A^%EOD z_JYg~pL>zp;(#m&{1rcotZOHu#pOR>@OC#o4-xJ~jKko#?l#rS8VT(x15MBq!cK_q zL>PaMf%(y>R+)A=Hc6rK$2f%nT&oG1h$;|c_xo<3*J zPLNd;J%wtqKkI>!|7Na$y|UIMs^iiX&LY?Fs9K}p@~#D(#FzN$(I7VNcjqQI&#SFU zt%YlRj{=YzS5R|U-Kc!5XATMigcm0Ew_%Y9!(@vZh z^s?8r6h;CI^8k?gz(6f7Ljl|c-(vt8DbK%z z2D=kdQ%hE?vTWeUUqYcHv$3GS3Z!HD-_pkL&_o}ToV*x4MHSHZ(&DUW(M!T9&F8te zN#~mSzk#~a4jg~g2r&!-BaurL&tC&1&!neBM<^#Ab!nne&3@28kvI`s5DduhpHPeh zynUPl19yVpu8uG}XcvS6p+C*(JGDRwW& zDf-`^3Y&G5&?xLG7nqQcAg>2#)uS+n2IBs-dH=RDB_EDl{7)<6a(%hv&{~`PzBW5d z1U5MP{|Ywv52&yrTq(&eQeOJ&KMH1m$}*@}Yn0lU!4#azPA$s0ngiWsZDH^_F|jb` zV`^+y9i7q@Za>bTI%C+~{c*V9`{erz=0)XB*3*!TXrb$!;f$9>&7W6yc(z71hSn=P zmE$;4p|K$O9aeW;+Y8~t8tlL3hj09qIFtb?;VjF`V0qjM|2{kcJ{JC#Is;8(F|>Ng z)8cw)268!6wtS*R?L#5siG;cChDfiNd7Ol}0;VPBm776#ef_Lk6_Gr!+GkzrJR>@C z3Z#sWDCW6+&p34SXaod_wzf9Me=UW^<&nV`Zbm{vyyc=6gwIA#qLOU1i_L*S0qlrpLt~f_^z_U-)Ddxx2!6-8wTHpy^N9mbP_nVPgarkoclMXl$7JdbmIez3 zg$$cgGu+U#LMS@~GPZaH!~#(MBG#`$%)%i#qV*hL@;Xy~AnbL(20%p4@M80aY^hnw z3W8`Eh#|IUYeX+RUwb|g33f&RZb}0gQ3Kpo(CHGRL?{J~(K8mVOOO4`TL?nqIhF6jiJgPGm3XIZY zSa+%t8D$tZ^ENCwcHJ^QgjSFAxHjEbuZ0|PP15AqaD9k4Qh0M)Qfz(?7OpKe zS4`-`n}YUZ;9oeXXh=Jv)4L-UcAXh!5?cUtB4|v6;zuLW9byVGqmKkXR81|y>7^oCTO^9ee>pbJ;Gwlj99vN#L6o4vVjBx8R4XU z6w60M4bvc*P~W_vL@t!GZ=`7L-o3lb9aDJ<55ZsyZ+HRaibA-3VlXW8T|yY)GmkB^ zl*tJy1=XWT2~hS-mM~Vf9~JXs7$laK2y#R&OT>|hTIRcSnB3$WB0ZoO7J5zUP+SX4 zOijl?;|bvoy+NIUuqm0N&5=QgNsw@*63LKa4Pf0%lw`0}{4DwH(hVD0)Ttrl`y>UmnQR#27>hJgT<{2J=N(%JD}CDlV_i zF?9d+Drd%=IdaZl1&2qukfKB$PT+~7`hf*n|E^Z4MT_MFKF*yI$6Ir#Rd)T9Ie>!z zMkCaaszve@GFXlW>-3vrrQX*FN}q%{gc7Pd^8w}Mz@ zn(p4haQk=nTkr*k%J&^Scraz>2_`BOY%CGw2|12+v4~+QA?P0xDGA4NKhzkvZLf;L zM|dkzvrwf-9i(bdAlH=h0wgVAlTX_B47Pvq*$H3L+Zd{dpw|P9i0mzqo55Bh>D-J& za36d-^ge1|O6fHad91a9OBV(pbMz^|CgoH-jJ-eSO<=yu>QuTA761o0Na& z!#W29buyn!4=>gMXj7hMWRNs(BY)mZ$m&>)V)yMx1*!cQ=(@WwJZ#xxk!gus zle$$TFNjqcvYgF%qZ4X6H3zafeQ8{i7Im--$t@`%A!fzHht~JxY$j$wB?xfkhBZGI zNu9{zC3Y@CawZ-Ls)j$~vLEHt{Lpj%9%8))zml5D=dn+?P*Lg)J7 z+b?&D3ccj>?Eq~7IrXxl<`xjzvI_-HY*_RhLloRjRngJ|*lFnluFseN2imn_$%Gz;s z91OffIY|q+JSV2Q_CpEG&)jQmOmEjIyLbzY5_@!0hHZCAW)8`TU2L@z@`Br9h$zDqq%XFoh#$x;h)R-? z8fLE&8yF6r;v!yPQ-qo;9!Wc`xac{U^pP1o5sC46$C!F&C?U-4mlL}^8LZ;V_wV@( zDRsk+f_LwLxKbgR7S*N8_l#K_dOi#%W%OSnjbM7*c;?L3bau395o-&l@|u;z83{4X z>^^N!Xl41&LX1mkj&)Bs20skwCW($k+R$i+?yMkQ5Z5g$Pb40^Z3OVhe8d@@BX<^H zCxIr91A2C4*vjGIW;17sjZ%3@R8&;kqew!aL)B*lq^n7f0 ztW%T_&&gjx=D=r(Z8p*6ALY52{vc9^^%px13QzH{W~q{s)XA{&c9^m4cNF!>Xofr( z2y~8&;E6GpJ`oi^cPC?82yS+R%>YoKToDsUwqn?;&(Z_1AY`&3(k@$?b1|z#4JoIF z;_KfW9RtV9Ct(|MPqrY-Rvgo8BBb9DQ(^vd;|Ud*(FR8=g4`0%*dU8*b1zDVYG(HC zLtyMd=1jch{Lx3pT_+WLEN~%U75wSo!4FrwKK!bmqpJHvZjVVXs|_E{{`pL$UT+$V zPO<*;>itP&`_9$;^+K)a+6g!Nn2R0htZ}XSf zZO!FlxjCdZ7FT#x!SciNQQVdLhL=i3f3QpvAquAw^N*_}=00Z9{k z8Y%l5DmTqYTl%v5hAn~wEPCuv=b4YPP4P_AuE%~Ro1NITHl^G5O54ou*V`5E{^0n< z@sYy*=cu&@UF@nI&aTZd&uz4&Y*_Orw>z$_8yCIED9iOXPki=B!~xghsbvvm_RG$B z8LYnjKz)9=Pu}gz8}FwoVw;y1A@S-D*;RimQVt&IR*=i6L9;JWBmyZYan>9p?Y z7a2Tt@Keu>hJQCLa9Op@<>IwtyPw6J4^{Ft{(0)f6{WOq`8M%R)@zeL49pqYN-m_? z+=+4Lw=A;g=h&YIKenbXuTpsWiH!sP$Hy)H=LR|c|Mr)!)jn?s7EA>$6G@8}btPed z$4a)HB}?*EpG=nzIP!*v!Vm&3B?_5Z;-{s8B6D)pi>}U%t+j%= z+i^uRr)?M=q)eL9eesiFs8wam7$L9^Zo6VANZHFt2JgH+h4LHsJ#MY8Y7@Yp=F`Q+ zi34emF}epCB0rC3&M-ROPRu)Fm6B^cP<;fP)bG zEj{6~9aJiv&ZT|(_BBhAD%%9`Syf{Xdn}5p)AF)HUcU_Ut%q3XcXT&=$Lf`Hlq7k$ zpL!VU*uA`QkwrZf6_3wXS2q^rL>HqaFF(!U+jrwz{T9LKPx<}R|Le=-`eyTE#+@^+ jCviEZgU87?wJJrCo?WJ_OV(2GpGo7Uj=eN`{^tJ+Jiq{4 From d2d591a660518aadbdf2c3af3c0abd12a3677f40 Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Mon, 8 Jun 2020 16:23:07 -0700 Subject: [PATCH 147/228] HL2-6B Release Notes Remove dongles --- devices/hololens/hololens-release-notes.md | 42 +++++++++++++++++++++- 1 file changed, 41 insertions(+), 1 deletion(-) diff --git a/devices/hololens/hololens-release-notes.md b/devices/hololens/hololens-release-notes.md index a41f581400..5fa0ee3e55 100644 --- a/devices/hololens/hololens-release-notes.md +++ b/devices/hololens/hololens-release-notes.md @@ -20,6 +20,46 @@ appliesto: # HoloLens 2 release notes +## Windows Holographic, version 2004 - June 2020 Update +- Build 19041.1106 +Improvements and fixes in the update: + +- Custom MRC recorders have new default values for certain properties if they aren't specified. + - On the MRC Video Effect: + - PreferredHologramPerspective (1 PhotoVideoCamera) + - GlobalOpacityCoefficient (0.9 (HoloLens) 1.0 (Immersive headset)) + - On the MRC Audio Effect: + - LoopbackGain (the current "App Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal) + - MicrophoneGain (the current "Mic Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal) +- This update contains a bug fix that improves audio quality in Mixed Reality Capture scenarios. Specifically, it should eliminate any audio glitching in the recording when the Start Menu is displayed. +- Improved hologram stability in recorded videos. +- Resolves an issue where mixed reality capture couldn't record video after device is left in standby state for multiple days. +- The HolographicSpace.UserPresence API is generally disabled for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. The API is now enabled for Unity versions 2018.4.18 and higher, and 2019.3.4 and higher. +- When accessing Device Portal over a WiFi connection, a web browser might prevent access to due to an invalid certificate, reporting an error such as "ERR_SSL_PROTOCOL_ERROR," even if the device certificate has previously been trusted. In this case, you would be unable to progress to Device Portal as options to ignore security warnings are not available. This update resolves the issue. If the device certificate was previously downloaded and trusted on a PC to remove browser security warnings and the SSL error has been encountered, the new certificate will need to be downloaded and trusted to address browser security warnings. +- Enabled ability to create a runtime provisioning package which can install an app using MSIX packages. +- New setting that users can find under Settings > System > Holograms, that allows users to automatically remove all holograms from the mixed reality home when the device shuts down. +- Fixed an issue that caused HoloLens apps that change their pixel format to render black in the HoloLens emulator. +- Fixed bug that caused a crash during Iris Login. +- Fixes an issue around repeated store downloads for already current apps. +- Fixed a bug to preventing immersive apps from launching Edge multiple times. +- Fixes an issue around launches of the Photos app in initial boots after updating from the 1903 release. +- Improved performance and reliability. + +## Windows Holographic, version 1903 - June 2020 Update +- Build 18362.1064 +Improvements and fixes in the update: + +- Custom MRC recorders have new default values for certain properties if they aren't specified. + - On the MRC Video Effect: + - PreferredHologramPerspective (1 PhotoVideoCamera) + - GlobalOpacityCoefficient (0.9 (HoloLens) 1.0 (Immersive headset)) + - On the MRC Audio Effect: + - LoopbackGain (the current "App Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal) + - MicrophoneGain (the current "Mic Audio Gain" value on the Mixed Reality Capture page in Windows Device Portal) +- The HolographicSpace.UserPresence API is generally disabled for Unity applications to avoid an issue which causes some apps to pause when the visor is flipped up, even if the setting to run in the background is enabled. The API is now enabled for Unity versions 2018.4.18 and higher, and 2019.3.4 and higher. +- Fixed an issue that caused HoloLens apps that change their pixel format to render black in the HoloLens emulator. +- Fixes an issue around launches of the Photos app in initial boots after updating from the 1903 release. + ## Windows Holographic, version 2004 Build - 19041.1103 @@ -32,7 +72,7 @@ We are excited to announce our May 2020 major software update for HoloLens 2, ** | Improved provisioning | Seamlessly apply a provisioning package from a USB drive to your HoloLens | | Application install status | Check install status for apps have been pushed to HoloLens 2 via MDM, in the Settings app | | Configuration Service Providers (CSPs) | Added new Configuration Service Providers (CSPs) enhancing admin control capabilities. | -| USB 5G/LTE support | Expanded USB Ethernet capability enables support for 5G/LTE dongles | +| USB 5G/LTE support | Expanded USB Ethernet capability enables support for 5G/LTE | | Dark App Mode | Dark App Mode for apps that support both dark and light modes, improving the viewing experience | | Voice Commands | Support for additional system voice commands to control HoloLens, hands-free | | Hand Tracking improvements | Hand Tracking improvements make buttons and 2D slate interactions more accurate | From 9020b1645a7792c7a08b3371079aba26b7271ebc Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Mon, 8 Jun 2020 16:24:56 -0700 Subject: [PATCH 148/228] Update hololens-release-notes.md --- devices/hololens/hololens-release-notes.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/devices/hololens/hololens-release-notes.md b/devices/hololens/hololens-release-notes.md index 5fa0ee3e55..324ed9bae7 100644 --- a/devices/hololens/hololens-release-notes.md +++ b/devices/hololens/hololens-release-notes.md @@ -22,6 +22,7 @@ appliesto: ## Windows Holographic, version 2004 - June 2020 Update - Build 19041.1106 + Improvements and fixes in the update: - Custom MRC recorders have new default values for certain properties if they aren't specified. @@ -47,6 +48,7 @@ Improvements and fixes in the update: ## Windows Holographic, version 1903 - June 2020 Update - Build 18362.1064 + Improvements and fixes in the update: - Custom MRC recorders have new default values for certain properties if they aren't specified. From 2cdfe58df53b9c3e4b46d111bfdba85106fe78c7 Mon Sep 17 00:00:00 2001 From: Mike Eggers <49650192+v-miegge@users.noreply.github.com> Date: Mon, 8 Jun 2020 16:28:53 -0700 Subject: [PATCH 149/228] small changes --- devices/surface/secure-surface-dock-ports-semm.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/secure-surface-dock-ports-semm.md b/devices/surface/secure-surface-dock-ports-semm.md index 6ee0fdf411..615ba03a3c 100644 --- a/devices/surface/secure-surface-dock-ports-semm.md +++ b/devices/surface/secure-surface-dock-ports-semm.md @@ -28,13 +28,13 @@ Surface Enterprise Management Mode (SEMM) enables IT admins to secure and manage Managing Surface Dock 2 with SEMM is available for docks connected to Surface Book 3, Surface Laptop 3, and Surface Pro 7. These compatible Surface devices are commonly referred to as **host devices**. A package is applied to host devices based on if a host device is **authenticated** or **unauthenticated**. Configured settings reside in the UEFI layer on host devices enabling you — the IT admin — to manage Surface Dock 2 just like any other built-in peripheral such as the camera. >[!NOTE] ->You can only manage Surface Dock 2 ports when the dock is connected to one of the following compatible devices: Surface Book 3, Surface Laptop 3, and Surface Pro 7. Any device that doesn't receive the UEFI Authenticated policy settings is inherently an unauthenticated device. +>You can manage Surface Dock 2 ports only when the dock is connected to one of the following compatible devices: Surface Book 3, Surface Laptop 3, and Surface Pro 7. Any device that doesn't receive the UEFI Authenticated policy settings is inherently an unauthenticated device. Restricting Surface Dock 2 to authorized persons signed into a corporate host device provides another layer of data protection. This ability to lock down Surface Dock 2 is critical for specific customers in highly secure environments who want the functionality and productivity benefits of the dock while maintaining compliance with strict security protocols. We anticipate SEMM used with Surface Dock 2 will be particularly useful in open offices and shared spaces especially for customers who want to lock USB ports for security reasons. ## Configuring and deploying UEFI settings for Surface Dock 2 -This section provides step by step guidance for the following tasks: +This section provides step-by-step guidance for the following tasks: 1. Install **Surface UEFI Configurator**. 1. Create or obtain public key certificates. From 5aa4deaede30b3095a30825f817cf519de7c6794 Mon Sep 17 00:00:00 2001 From: Evan Miller Date: Mon, 8 Jun 2020 16:33:53 -0700 Subject: [PATCH 150/228] Update hololens-release-notes.md --- devices/hololens/hololens-release-notes.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/hololens/hololens-release-notes.md b/devices/hololens/hololens-release-notes.md index 324ed9bae7..38e382a7b6 100644 --- a/devices/hololens/hololens-release-notes.md +++ b/devices/hololens/hololens-release-notes.md @@ -8,7 +8,7 @@ ms.prod: hololens ms.sitesec: library ms.topic: article ms.localizationpriority: medium -ms.date: 05/12/2020 +ms.date: 06/9/2020 ms.custom: - CI 111456 - CSSTroubleshooting From 0925e68431c3051abad5851b0036a0a3e6f0436c Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Mon, 8 Jun 2020 17:28:59 -0700 Subject: [PATCH 151/228] Update antivirus-false-positives-negatives.md --- .../antivirus-false-positives-negatives.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md index 80b05cf051..e9fd6a400e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/antivirus-false-positives-negatives.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 02/05/2020 +ms.date: 06/08/2020 ms.reviewer: shwetaj manager: dansimp audience: ITPro From d7a12957a962c664ce5c95f1df44bc9fe186e3a6 Mon Sep 17 00:00:00 2001 From: Louie Mayor Date: Mon, 8 Jun 2020 21:02:24 -0700 Subject: [PATCH 152/228] Update configure-machines-security-baseline.md --- .../configure-machines-security-baseline.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md index 00d7f60d42..ace57f0c77 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-machines-security-baseline.md @@ -38,7 +38,7 @@ The Windows Intune security baseline provides a comprehensive set of recommended - [Windows security baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-windows) - [Microsoft Defender ATP baseline settings for Intune](https://docs.microsoft.com/intune/security-baseline-settings-defender-atp) -Both baselines are maintained so that they complement one another and have identical values for shared settings. Deploying both baselines to the same machine will not result in conflicts. Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls. +Ideally, machines onboarded to Microsoft Defender ATP are deployed both baselines: the Windows Intune security baseline to initially secure Windows and then the Microsoft Defender ATP security baseline layered on top to optimally configure the Microsoft Defender ATP security controls. To benefit from the latest data on risks and threats and to minimize conflicts as baselines evolve, always apply the latest versions of the baselines across all products as soon as they are released. >[!NOTE] >The Microsoft Defender ATP security baseline has been optimized for physical devices and is currently not recommended for use on virtual machines (VMs) or VDI endpoints. Certain baseline settings can impact remote interactive sessions on virtualized environments. From 70cffda84b5c6be4d46950c3a2c85318bfe499ba Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 9 Jun 2020 07:36:42 -0700 Subject: [PATCH 153/228] Adds new article to landing page --- devices/surface/get-started.yml | 4 ++-- devices/surface/secure-surface-dock-ports-semm.md | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/devices/surface/get-started.yml b/devices/surface/get-started.yml index 131d77a578..0c309e50b7 100644 --- a/devices/surface/get-started.yml +++ b/devices/surface/get-started.yml @@ -72,10 +72,10 @@ landingContent: linkLists: - linkListType: how-to-guide links: + - text: Secure Surface Dock 2 ports with Surface Enterprise Management Mode (SEMM) + url: secure-surface-dock-ports-semm.md - text: Intune management of Surface UEFI settings url: surface-manage-dfci-guide.md - - text: Surface Enterprise Management Mode (SEMM) - url: surface-enterprise-management-mode.md - text: Surface Data Eraser tool url: microsoft-surface-data-eraser.md diff --git a/devices/surface/secure-surface-dock-ports-semm.md b/devices/surface/secure-surface-dock-ports-semm.md index 615ba03a3c..0141a6dae1 100644 --- a/devices/surface/secure-surface-dock-ports-semm.md +++ b/devices/surface/secure-surface-dock-ports-semm.md @@ -91,7 +91,7 @@ Each host device must have the doc CA and two certificates as shown in Table 2. |Provisioning administration certificate|ECC P256
SHA256|Enables you to change dock ownership and/or policy settings by allowing you to replace the CA that's currently installed on the dock.|1.3.6.1.4.1.311.76.9.21.3
1.3.6.1.4.1.311.76.9.21.4| >[!NOTE] - >The host authentication and provisioning certificates must be exported as.pfx files. + >The host authentication and provisioning certificates must be exported as .pfx files. ### Create configuration package From f419fb20b4c9f2cd60df70cfcd1b3471f54d257b Mon Sep 17 00:00:00 2001 From: Sinead O'Sullivan Date: Tue, 9 Jun 2020 16:20:02 +0100 Subject: [PATCH 154/228] Update configure-endpoints-vdi.md --- .../microsoft-defender-atp/configure-endpoints-vdi.md | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 2c8c2b2f66..95b1de3abc 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -30,7 +30,14 @@ ms.date: 04/16/2020 ## Onboard non-persistent virtual desktop infrastructure (VDI) machines -Microsoft Defender ATP supports non-persistent VDI session onboarding. There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario: +Microsoft Defender ATP supports non-persistent VDI session onboarding. + +>![Note] +>To onboard non-persistent VDI sessions your VDI machine must be on Windows 10. +> +>While other Windows versions might work, only Windows 10 is supported. + +There might be associated challenges when onboarding VDIs. The following are typical challenges for this scenario: - Instant early onboarding of a short-lived sessions, which must be onboarded to Microsoft Defender ATP prior to the actual provisioning. - The machine name is typically reused for new sessions. From bfa5a34d63054cbee62a1d2f1fc11a4578d8cbf3 Mon Sep 17 00:00:00 2001 From: Sinead O'Sullivan Date: Tue, 9 Jun 2020 16:52:37 +0100 Subject: [PATCH 155/228] Update configure-endpoints-vdi.md --- .../microsoft-defender-atp/configure-endpoints-vdi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 95b1de3abc..306224120c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -33,7 +33,7 @@ ms.date: 04/16/2020 Microsoft Defender ATP supports non-persistent VDI session onboarding. >![Note] ->To onboard non-persistent VDI sessions your VDI machine must be on Windows 10. +>To onboard non-persistent VDI sessions, VDI machines must be on Windows 10. > >While other Windows versions might work, only Windows 10 is supported. From fcde4299af9e04f8391ca5d5f64f3dbeacbdf72f Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 9 Jun 2020 09:33:18 -0700 Subject: [PATCH 156/228] link about how to get --- windows/whats-new/whats-new-windows-10-version-2004.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-2004.md b/windows/whats-new/whats-new-windows-10-version-2004.md index 632ec84175..ce0d855b61 100644 --- a/windows/whats-new/whats-new-windows-10-version-2004.md +++ b/windows/whats-new/whats-new-windows-10-version-2004.md @@ -18,7 +18,7 @@ ms.topic: article **Applies to** - Windows 10, version 2004 -This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909. +This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909. To download and install Windows 10, version 2004, use Windows Update (**Settings > Update & Security > Windows Update**). For more information, see this [video](http://aka.ms/Windows-10-May-2020-Update). > [!NOTE] > The month indicator for this release is 04 instead of 03 to avoid confusion with Windows releases in the year 2003. From ae1ced0fb676eac8a43ccd78ae95ee20a87e2a40 Mon Sep 17 00:00:00 2001 From: Sinead O'Sullivan Date: Tue, 9 Jun 2020 17:48:02 +0100 Subject: [PATCH 157/228] Update configure-endpoints-vdi.md --- .../microsoft-defender-atp/configure-endpoints-vdi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index 306224120c..b640c52453 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -32,7 +32,7 @@ ms.date: 04/16/2020 Microsoft Defender ATP supports non-persistent VDI session onboarding. ->![Note] +>[!Note] >To onboard non-persistent VDI sessions, VDI machines must be on Windows 10. > >While other Windows versions might work, only Windows 10 is supported. From dcd344015bea57f10195ccb60d25d0e2ffd20b37 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 9 Jun 2020 09:49:39 -0700 Subject: [PATCH 158/228] https --- windows/whats-new/whats-new-windows-10-version-2004.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/whats-new/whats-new-windows-10-version-2004.md b/windows/whats-new/whats-new-windows-10-version-2004.md index ce0d855b61..0740a2c4fd 100644 --- a/windows/whats-new/whats-new-windows-10-version-2004.md +++ b/windows/whats-new/whats-new-windows-10-version-2004.md @@ -18,7 +18,7 @@ ms.topic: article **Applies to** - Windows 10, version 2004 -This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909. To download and install Windows 10, version 2004, use Windows Update (**Settings > Update & Security > Windows Update**). For more information, see this [video](http://aka.ms/Windows-10-May-2020-Update). +This article lists new and updated features and content that are of interest to IT Pros for Windows 10, version 2004, also known as the Windows 10 May 2020 Update. This update also contains all features and fixes included in previous cumulative updates to Windows 10, version 1909. To download and install Windows 10, version 2004, use Windows Update (**Settings > Update & Security > Windows Update**). For more information, see this [video](https://aka.ms/Windows-10-May-2020-Update). > [!NOTE] > The month indicator for this release is 04 instead of 03 to avoid confusion with Windows releases in the year 2003. From 65e813b943293ad3f1721716a68767ca3435a2d9 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Tue, 9 Jun 2020 11:50:15 -0700 Subject: [PATCH 159/228] Update secure-surface-dock-ports-semm.md --- devices/surface/secure-surface-dock-ports-semm.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/devices/surface/secure-surface-dock-ports-semm.md b/devices/surface/secure-surface-dock-ports-semm.md index 0141a6dae1..dfd2d40c11 100644 --- a/devices/surface/secure-surface-dock-ports-semm.md +++ b/devices/surface/secure-surface-dock-ports-semm.md @@ -30,13 +30,15 @@ Managing Surface Dock 2 with SEMM is available for docks connected to Surface Bo >[!NOTE] >You can manage Surface Dock 2 ports only when the dock is connected to one of the following compatible devices: Surface Book 3, Surface Laptop 3, and Surface Pro 7. Any device that doesn't receive the UEFI Authenticated policy settings is inherently an unauthenticated device. -Restricting Surface Dock 2 to authorized persons signed into a corporate host device provides another layer of data protection. This ability to lock down Surface Dock 2 is critical for specific customers in highly secure environments who want the functionality and productivity benefits of the dock while maintaining compliance with strict security protocols. We anticipate SEMM used with Surface Dock 2 will be particularly useful in open offices and shared spaces especially for customers who want to lock USB ports for security reasons. +### Scenarios + +Restricting Surface Dock 2 to authorized persons signed into a corporate host device provides another layer of data protection. This ability to lock down Surface Dock 2 is critical for specific customers in highly secure environments who want the functionality and productivity benefits of the dock while maintaining compliance with strict security protocols. We anticipate SEMM used with Surface Dock 2 will be particularly useful in open offices and shared spaces especially for customers who want to lock USB ports for security reasons. For a video demo, check out [SEMM for Surface Dock 2](https://youtu.be/VLV19ISvq_s). ## Configuring and deploying UEFI settings for Surface Dock 2 This section provides step-by-step guidance for the following tasks: -1. Install **Surface UEFI Configurator**. +1. Install [**Surface UEFI Configurator**](https://www.microsoft.com/en-us/download/details.aspx?id=46703). 1. Create or obtain public key certificates. 1. Create an .MSI configuration package. 1. Add your certificates. From d9444b26a1fe9672efd042e323d0315a02267a34 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 13:37:00 -0700 Subject: [PATCH 160/228] Added 20H1 DO policies --- ...ew-in-windows-mdm-enrollment-management.md | 13 +- .../policy-configuration-service-provider.md | 9 + .../mdm/policy-csp-deliveryoptimization.md | 262 +++++++++++++----- .../mdm/policy-csps-supported-by-iot-core.md | 3 + ...policy-csps-supported-by-iot-enterprise.md | 3 + 5 files changed, 218 insertions(+), 72 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 58d58b3935..18e004f4d3 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -105,14 +105,23 @@ For details about Microsoft mobile device management protocols for Windows 10 s
Policy CSP

Added the following new policies in Windows 10, version 2004:

+

Added and updated the following new policies in Windows 10, version 2004:

+ +

Deprecated the following policies in Windows 10, version 2004:

+
DevDetail CSP
+ + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procheck mark8
Businesscheck mark8
Enterprisecheck mark8
Educationcheck mark8
+ + +


+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + + +This policy allows you to to configure one or more Delivery Optimization in Network Cache servers through a custom DHCP Option. One or more values can be added as either fully qualified domain names (FQDN) or IP addresses. To add multiple values, separate each FQDN or IP address by commas. + + + +ADMX Info: +- GP English name: *Cache Server Hostname* +- GP name: *Cache Server Hostname* +- GP path: *Windows Components/Delivery Optimization* +- GP ADMX file name: *DeliveryOptimization.admx* + + + +The following are the supported values: +- 1 = DHCP Option ID. +- 2 = DHCP Option ID Force. + +When DHCP Option ID (1) is set, the client will query DHCP Option ID 235 and use the returned FQDN or IP value as Cache Server Hostname value. This policy will be overridden when the Cache Server Hostname policy has been set. + +> [!Note] +> If the DHCP Option ID is formatted incorrectly, the client will fall back to the [Cache Server Hostname policy](#deliveryoptimization-docachehost) value if that value has been set. + + + + + + + + + + +
+ **DeliveryOptimization/DODelayBackgroundDownloadFromHttp** @@ -816,6 +904,67 @@ The following list shows the supported values:
+ +**DeliveryOptimization/DOMaxBackgroundDownloadBandwidth** + + + + + + + + + + + + + + + + + + + + + + + + + + + +
Windows EditionSupported?
Homecross mark
Procheck mark8
Businesscheck mark8
Enterprisecheck mark8
Educationcheck mark8
+ + +
+ + +[Scope](./policy-configuration-service-provider.md#policy-scope): + +> [!div class = "checklist"] +> * Device + +
+ + + +This policy specifies the maximum background download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. + +The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. + + + +ADMX Info: +- GP English name: *Maximum Background Download Bandwidth (in KB/s)* +- GP name: *Maximum Background Download Bandwidth (in KB/s)* +- GP path: *Windows Components/Delivery Optimization* +- GP ADMX file name: *DeliveryOptimization.admx* + + + + +
+ **DeliveryOptimization/DOMaxCacheAge** @@ -952,70 +1101,27 @@ ADMX Info: **DeliveryOptimization/DOMaxDownloadBandwidth** - - - - - - - - - - - - - - - - - - - - - - - - - -
Windows EditionSupported?
Homecross mark
Procheck mark1
Businesscheck mark1
Enterprisecheck mark1
Educationcheck mark1
+
-[Scope](./policy-configuration-service-provider.md#policy-scope): - -> [!div class = "checklist"] -> * Device -
-> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. - - -Added in Windows 10, version 1607. Specifies the maximum download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. - -The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. +This policy is deprecated. Use [DOMaxForegroundDownloadBandwidth](#deliveryoptimization-domaxforegrounddownloadbandwidth) and [DOMaxBackgroundDownloadBandwidth](#deliveryoptimization-domaxbackgrounddownloadbandwidth) policies instead. -ADMX Info: -- GP English name: *Maximum Download Bandwidth (in KB/s)* -- GP name: *MaxDownloadBandwidth* -- GP element: *MaxDownloadBandwidth* -- GP path: *Windows Components/Delivery Optimization* -- GP ADMX file name: *DeliveryOptimization.admx* -
-**DeliveryOptimization/DOMaxUploadBandwidth** +**DeliveryOptimization/DOMaxForegroundDownloadBandwidth** @@ -1029,19 +1135,19 @@ ADMX Info: - + - + - + - +
Procheck markcheck mark8
Businesscheck markcheck mark8
Enterprisecheck markcheck mark8
Educationcheck markcheck mark8
@@ -1058,20 +1164,15 @@ ADMX Info: -> [!NOTE] -> This policy is only enforced in Windows 10 Pro, Enterprise, and Education editions and not supported in Windows 10 Mobile. +This policy specifies the maximum foreground download bandwidth in KiloBytes/second that the device can use across all concurrent download activities using Delivery Optimization. - -Specifies the maximum upload bandwidth in KiloBytes/second that a device will use across all concurrent upload activity using Delivery Optimization. - -The default value is 0, which permits unlimited possible bandwidth (optimized for minimal usage of upload bandwidth). +The default value 0 (zero) means that Delivery Optimization dynamically adjusts to use the available bandwidth for downloads. ADMX Info: -- GP English name: *Max Upload Bandwidth (in KB/s)* -- GP name: *MaxUploadBandwidth* -- GP element: *MaxUploadBandwidth* +- GP English name: *Maximum Foreground Download Bandwidth (in KB/s)* +- GP name: *Maximum Foreground Download Bandwidth (in KB/s)* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -1080,6 +1181,25 @@ ADMX Info:
+ +**DeliveryOptimization/DOMaxUploadBandwidth** + + + + + + + + +This policy is deprecated. + + + + + + +
+ **DeliveryOptimization/DOMinBackgroundQos** @@ -1901,12 +2021,14 @@ This policy allows an IT Admin to define the following: Footnotes: -- 1 - Added in Windows 10, version 1607. -- 2 - Added in Windows 10, version 1703. -- 3 - Added in Windows 10, version 1709. -- 4 - Added in Windows 10, version 1803. -- 5 - Added in Windows 10, version 1809. -- 6 - Added in Windows 10, version 1903. +- 1 - Available in Windows 10, version 1607. +- 2 - Available in Windows 10, version 1703. +- 3 - Available in Windows 10, version 1709. +- 4 - Available in Windows 10, version 1803. +- 5 - Available in Windows 10, version 1809. +- 6 - Available in Windows 10, version 1903. +- 7 - Available in Windows 10, version 1909. +- 8 - Available in Windows 10, version 2004. diff --git a/windows/client-management/mdm/policy-csps-supported-by-iot-core.md b/windows/client-management/mdm/policy-csps-supported-by-iot-core.md index c37cdb1b86..da5c51c493 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-iot-core.md +++ b/windows/client-management/mdm/policy-csps-supported-by-iot-core.md @@ -31,6 +31,7 @@ ms.date: 09/16/2019 - [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize) - [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching) - [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost) +- [DeliveryOptimization/DOCacheHostSource](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehostsource) - [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp) - [DeliveryOptimization/DODelayForegroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp) - [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground) @@ -38,9 +39,11 @@ ms.date: 09/16/2019 - [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode) - [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid) - [DeliveryOptimization/DOGroupIdSource](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource) +- [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth) - [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage) - [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize) - [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth) - [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) - [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos) - [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload) diff --git a/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md b/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md index f0837806da..81f8617638 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md +++ b/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md @@ -30,6 +30,7 @@ ms.date: 07/18/2019 - [DeliveryOptimization/DOAbsoluteMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-doabsolutemaxcachesize) - [DeliveryOptimization/DOAllowVPNPeerCaching](policy-csp-deliveryoptimization.md#deliveryoptimization-doallowvpnpeercaching) - [DeliveryOptimization/DOCacheHost](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehost) +- [DeliveryOptimization/DOCacheHostSource](policy-csp-deliveryoptimization.md#deliveryoptimization-docachehostsource) - [DeliveryOptimization/DODelayBackgroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaybackgrounddownloadfromhttp) - [DeliveryOptimization/DODelayForegroundDownloadFromHttp](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelayforegrounddownloadfromhttp) - [DeliveryOptimization/DODelayCacheServerFallbackBackground](policy-csp-deliveryoptimization.md#deliveryoptimization-dodelaycacheserverfallbackbackground) @@ -37,9 +38,11 @@ ms.date: 07/18/2019 - [DeliveryOptimization/DODownloadMode](policy-csp-deliveryoptimization.md#deliveryoptimization-dodownloadmode) - [DeliveryOptimization/DOGroupId](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupid) - [DeliveryOptimization/DOGroupIdSource](policy-csp-deliveryoptimization.md#deliveryoptimization-dogroupidsource) +- [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth) - [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage) - [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize) - [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth) - [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) - [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos) - [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload) From 7631c95f05e2ebb84ba8fd3cce80474449b13164 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 14:00:45 -0700 Subject: [PATCH 161/228] Fixed build warnings --- .../mdm/new-in-windows-mdm-enrollment-management.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 18e004f4d3..877fabf20d 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -109,10 +109,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s DevDetail CSP From c8a91716b700ad75ef5ad673a61f8039d2053ac9 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 14:21:58 -0700 Subject: [PATCH 162/228] Added one more deprecated policy to the list --- .../mdm/new-in-windows-mdm-enrollment-management.md | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 877fabf20d..7ca5f2091f 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -105,11 +105,10 @@ For details about Microsoft mobile device management protocols for Windows 10 s Policy CSP -

Added and updated the following new policies in Windows 10, version 2004:

+

Added the following new policies in Windows 10, version 2004:

+

Updated the following policies in Windows 10, version 2004:

+ +

Deprecated the following policies in Windows 10, version 2004:

+
  • DeliveryOptimization/DOPercentageMaxDownloadBandwidth
  • DevDetail CSP From 0376676b047c05429f9df2ad62f8729ef5fa64da Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Tue, 9 Jun 2020 14:25:38 -0700 Subject: [PATCH 163/228] fixing redirect --- .openpublishing.redirection.json | Bin 2576176 -> 2576186 bytes windows/privacy/index.yml | 2 +- 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/.openpublishing.redirection.json b/.openpublishing.redirection.json index af5222988d92153d130950539faba798275c0555..ef2e397e5bfec17fd1858d9f948e661a6c8c7c31 100644 GIT binary patch delta 113 zcmWN=O$vfQ0Dw_U%ha;cQnONX{MpXddv$;oA9w^I$X)vuf*>wBTJzw2`?of!Pc# Date: Tue, 9 Jun 2020 14:45:04 -0700 Subject: [PATCH 164/228] Minor updates --- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- .../mdm/policy-configuration-service-provider.md | 6 +++--- .../mdm/policy-csps-supported-by-iot-core.md | 6 +++--- .../mdm/policy-csps-supported-by-iot-enterprise.md | 6 +++--- 4 files changed, 10 insertions(+), 10 deletions(-) diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 7ca5f2091f..430601798d 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -117,7 +117,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s
  • TextInput/ConfigureSimplifiedChineseIMEVersion
  • TextInput/ConfigureTraditionalChineseIMEVersion
  • -

    Updated the following policies in Windows 10, version 2004:

    +

    Updated the following policy in Windows 10, version 2004:

    diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 070dea30cc..68382e2326 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1112,10 +1112,10 @@ The following diagram shows the Policy configuration service provider in tree fo DeliveryOptimization/DOMaxDownloadBandwidth
    - DeliveryOptimization/DOMaxForegroundDownloadBandwidth + DeliveryOptimization/DOMaxForegroundDownloadBandwidth (deprecated)
    - DeliveryOptimization/DOMaxUploadBandwidth + DeliveryOptimization/DOMaxUploadBandwidth (deprecated)
    DeliveryOptimization/DOMinBackgroundQos @@ -1142,7 +1142,7 @@ The following diagram shows the Policy configuration service provider in tree fo DeliveryOptimization/DOPercentageMaxBackgroundBandwidth
    - DeliveryOptimization/DOPercentageMaxDownloadBandwidth + DeliveryOptimization/DOPercentageMaxDownloadBandwidth (deprecated)
    DeliveryOptimization/DOPercentageMaxForegroundBandwidth diff --git a/windows/client-management/mdm/policy-csps-supported-by-iot-core.md b/windows/client-management/mdm/policy-csps-supported-by-iot-core.md index da5c51c493..c43363b357 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-iot-core.md +++ b/windows/client-management/mdm/policy-csps-supported-by-iot-core.md @@ -42,9 +42,9 @@ ms.date: 09/16/2019 - [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth) - [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage) - [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize) -- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) (deprecated) - [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth) -- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) +- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) (deprecated) - [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos) - [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload) - [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer) @@ -53,7 +53,7 @@ ms.date: 09/16/2019 - [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive) - [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap) - [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth) -- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) +- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) (deprecated) - [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth) - [DeliveryOptimization/DORestrictPeerSelectionBy](policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby) - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth) diff --git a/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md b/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md index 81f8617638..617be22113 100644 --- a/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md +++ b/windows/client-management/mdm/policy-csps-supported-by-iot-enterprise.md @@ -41,9 +41,9 @@ ms.date: 07/18/2019 - [DeliveryOptimization/DOMaxBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxbackgrounddownloadbandwidth) - [DeliveryOptimization/DOMaxCacheAge](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcacheage) - [DeliveryOptimization/DOMaxCacheSize](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxcachesize) -- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) +- [DeliveryOptimization/DOMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxdownloadbandwidth) (deprecated) - [DeliveryOptimization/DOMaxForegroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxforegrounddownloadbandwidth) -- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) +- [DeliveryOptimization/DOMaxUploadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-domaxuploadbandwidth) (deprecated) - [DeliveryOptimization/DOMinBackgroundQos](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbackgroundqos) - [DeliveryOptimization/DOMinBatteryPercentageAllowedToUpload](policy-csp-deliveryoptimization.md#deliveryoptimization-dominbatterypercentageallowedtoupload) - [DeliveryOptimization/DOMinDiskSizeAllowedToPeer](policy-csp-deliveryoptimization.md#deliveryoptimization-domindisksizeallowedtopeer) @@ -52,7 +52,7 @@ ms.date: 07/18/2019 - [DeliveryOptimization/DOModifyCacheDrive](policy-csp-deliveryoptimization.md#deliveryoptimization-domodifycachedrive) - [DeliveryOptimization/DOMonthlyUploadDataCap](policy-csp-deliveryoptimization.md#deliveryoptimization-domonthlyuploaddatacap) - [DeliveryOptimization/DOPercentageMaxBackgroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxbackgroundbandwidth) -- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) +- [DeliveryOptimization/DOPercentageMaxDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxdownloadbandwidth) (deprecated) - [DeliveryOptimization/DOPercentageMaxForegroundBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dopercentagemaxforegroundbandwidth) - [DeliveryOptimization/DORestrictPeerSelectionBy](policy-csp-deliveryoptimization.md#deliveryoptimization-dorestrictpeerselectionby) - [DeliveryOptimization/DOSetHoursToLimitBackgroundDownloadBandwidth](policy-csp-deliveryoptimization.md#deliveryoptimization-dosethourstolimitbackgrounddownloadbandwidth) From 4f7f130dc9f5990e137f8f0bf6d1ac6d0bb3adea Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 14:45:24 -0700 Subject: [PATCH 165/228] Update policy-configuration-service-provider.md Minor update --- .../mdm/policy-configuration-service-provider.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-configuration-service-provider.md b/windows/client-management/mdm/policy-configuration-service-provider.md index 68382e2326..bd877c1e04 100644 --- a/windows/client-management/mdm/policy-configuration-service-provider.md +++ b/windows/client-management/mdm/policy-configuration-service-provider.md @@ -1109,10 +1109,10 @@ The following diagram shows the Policy configuration service provider in tree fo DeliveryOptimization/DOMaxCacheSize
    - DeliveryOptimization/DOMaxDownloadBandwidth + DeliveryOptimization/DOMaxDownloadBandwidth (deprecated)
    - DeliveryOptimization/DOMaxForegroundDownloadBandwidth (deprecated) + DeliveryOptimization/DOMaxForegroundDownloadBandwidth
    DeliveryOptimization/DOMaxUploadBandwidth (deprecated) From a7dfc201da306eba3d5bb519ecfb21cb0a2f71f9 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 9 Jun 2020 15:07:51 -0700 Subject: [PATCH 166/228] switch landing page --- windows/deployment/index.yml | 94 ++++++++++----------------- windows/deployment/index2.yml | 115 ---------------------------------- 2 files changed, 32 insertions(+), 177 deletions(-) delete mode 100644 windows/deployment/index2.yml diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index bf40abe0b9..6e694f4e3b 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -13,7 +13,7 @@ metadata: ms.collection: windows-10 author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. ms.author: greglin #Required; microsoft alias of author; optional team alias. - ms.date: 06/08/2020 #Required; mm/dd/yyyy format. + ms.date: 06/09/2020 #Required; mm/dd/yyyy format. localization_priority: medium # linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new @@ -29,38 +29,12 @@ landingContent: - text: Windows 10 deployment scenarios url: windows-10-deployment-scenarios.md - - linkListType: quickstart + - linkListType: get-started links: - text: Demonstrate Autopilot deployment url: windows-autopilot/demonstrate-deployment-on-vm.md - text: Deploy Windows 10 in a test lab url: windows-10-poc.md - - linkListType: architecture - links: - - text: Windows 10 deployment considerations - url: planning/windows-10-deployment-considerations.md - - text: Windows 10 infrastructure requirements - url: planning/windows-10-infrastructure-requirements.md - - text: Windows 10 features lifecycle - url: planning/features-lifecycle.md - - text: Plan for volume activation - url: volume-activation/plan-for-volume-activation-client.md - - linkListType: how-to-guide - links: - - text: Prepare for Zero Touch Installation with Configuration Manager - url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md - - text: Prepare to deploy Windows 10 with MDT - url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - - linkListType: deploy - links: - - text: Windows Autopilot scenarios and capabilities - url: windows-autopilot/windows-autopilot-scenarios.md - - text: Deploy Windows 10 to a new device with Configuration Manager - url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md - - text: Deploy a Windows 10 image using MDT - url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - - text: Resolve Windows 10 upgrade errors - url: upgrade/resolve-windows-10-upgrade-errors.md # Card (optional) - title: Update Windows 10 @@ -75,6 +49,11 @@ landingContent: links: - text: Servicing the Windows 10 operating system url: update/waas-servicing-strategy-windows-10-updates.md + + + # Card (optional) + - title: Deployment planning + linkLists: - linkListType: architecture links: - text: Create a deployment plan @@ -87,61 +66,52 @@ landingContent: url: update/plan-determine-app-readiness.md - text: Define your servicing strategy url: update/waas-servicing-strategy-windows-10-updates.md + + # Card + - title: Prepare to deploy Windows 10 + linkLists: - linkListType: how-to-guide links: + - text: Prepare for Zero Touch Installation with Configuration Manager + url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md + - text: Prepare to deploy Windows 10 with MDT + url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - text: Evaluate and update infrastructure url: update/update-policies.md - text: Build a successful servicing strategy url: update/waas-deployment-rings-windows-10-updates.md + + # Card + - title: Deploy and update Windows 10 + linkLists: - linkListType: deploy links: + - text: Windows Autopilot scenarios and capabilities + url: windows-autopilot/windows-autopilot-scenarios.md + - text: Deploy Windows 10 to a new device with Configuration Manager + url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md + - text: Deploy a Windows 10 image using MDT + url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - text: Assign devices to servicing channels url: update/waas-servicing-channels-windows-10-updates.md - text: Deploy Windows 10 updates url: update/waas-servicing-channels-windows-10-updates.md - - text: Troubleshoot Windows Update - url: update/windows-update-troubleshooting.md + - text: Resolve Windows 10 upgrade errors + url: upgrade/resolve-windows-10-upgrade-errors.md # Card (optional) - - title: Resources + - title: Windows 10 resources linkLists: - - linkListType: reference - links: - - text: How does Windows Update work? - url: update/how-windows-update-works.md - - text: Unified Update Platform (UUP) architecture - url: update/windows-update-overview.md#unified-update-platform-uup-architecture - - text: Servicing stack updates - url: update/servicing-stack-updates.md - - text: Manage additional Windows Update setings - url: update/waas-wu-settings.md - - text: Delivery Optimization reference - url: update/waas-delivery-optimization-reference.md - - text: Convert an MBR partition to GPT - url: mbr-to-gpt.md - - text: VAMT technical reference - url: volume-activation/volume-activation-management-tool.md - - text: User State Migration Tool (USMT) overview - url: usmt/usmt-overview.md - - linkListType: reference + - linkListType: learn links: - text: Windows 10 release information url: https://docs.microsoft.com/windows/release-information/ - text: What's new in Windows 10 url: https://docs.microsoft.com/windows/whats-new/ - - text: Microsoft 365 for enterprise documention - url: https://docs.microsoft.com/microsoft-365/enterprise/ - - text: Microsoft Surface documentation - url: https://docs.microsoft.com/surface/ - - text: Evaluate Windows 10 Enterprise - url: https://www.microsoft.com/evalcenter/evaluate-windows-10-enterprise - - text: Microsoft FastTrack cloud solutions - url: https://www.microsoft.com/fasttrack/ - - text: Microsoft Intune documentation - url: https://docs.microsoft.com/mem/intune/ - - text: Microsoft Endpoint Configuration Manager documentation - url: https://docs.microsoft.com/mem/configmgr/ - text: Windows 10 Enterprise Security url: https://docs.microsoft.com/windows/security/ - text: Desktop Deployment Center url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home + - text: Microsoft 365 solution and architecture center + url: https://docs.microsoft.com/microsoft-365/solutions/?view=o365-worldwide + diff --git a/windows/deployment/index2.yml b/windows/deployment/index2.yml deleted file mode 100644 index 3827964e67..0000000000 --- a/windows/deployment/index2.yml +++ /dev/null @@ -1,115 +0,0 @@ -### YamlMime:Landing - -title: Windows 10 deployment resources and documentation # < 60 chars -summary: Learn about deploying and and keeping Windows 10 up to date. # < 160 chars - -metadata: - title: Windows 10 deployment resources and documentation # Required; page title displayed in search results. Include the brand. < 60 chars. - description: Learn about deploying Windows 10 and keeping it up to date in your organization. # Required; article description that is displayed in search results. < 160 chars. - services: windows-10 - ms.service: windows-10 #Required; service per approved list. service slug assigned to your service by ACOM. - ms.subservice: subservice - ms.topic: landing-page # Required - ms.collection: windows-10 - author: greg-lindsay #Required; your GitHub user alias, with correct capitalization. - ms.author: greglin #Required; microsoft alias of author; optional team alias. - ms.date: 05/27/2020 #Required; mm/dd/yyyy format. - localization_priority: medium - -# linkListType: architecture | concept | deploy | download | get-started | how-to-guide | learn | overview | quickstart | reference | tutorial | video | whats-new - -landingContent: -# Cards and links should be based on top customer tasks or top subjects -# Start card title with a verb - # Card (optional) - - title: Deploy Windows 10 - linkLists: - - linkListType: overview - links: - - text: Windows 10 deployment scenarios - url: windows-10-deployment-scenarios.md - - - linkListType: get-started - links: - - text: Demonstrate Autopilot deployment - url: windows-autopilot/demonstrate-deployment-on-vm.md - - text: Deploy Windows 10 in a test lab - url: windows-10-poc.md - - # Card (optional) - - title: Update Windows 10 - linkLists: - - linkListType: overview - links: - - text: What is Windows as a service? - url: update/waas-overview.md - - text: Types of Windows updates - url: update/waas-quick-start.md#definitions - - linkListType: get-started - links: - - text: Servicing the Windows 10 operating system - url: update/waas-servicing-strategy-windows-10-updates.md - - - # Card (optional) - - title: Deployment planning - linkLists: - - linkListType: architecture - links: - - text: Create a deployment plan - url: update/create-deployment-plan.md - - text: Define readiness criteria - url: update/plan-define-readiness.md - - text: Evaluate infrastructure and tools - url: update/eval-infra-tools.md - - text: Determine application readiness - url: update/plan-determine-app-readiness.md - - text: Define your servicing strategy - url: update/waas-servicing-strategy-windows-10-updates.md - - # Card - - title: Prepare to deploy Windows 10 - linkLists: - - linkListType: how-to-guide - links: - - text: Prepare for Zero Touch Installation with Configuration Manager - url: deploy-windows-cm/prepare-for-zero-touch-installation-of-windows-10-with-configuration-manager.md - - text: Prepare to deploy Windows 10 with MDT - url: deploy-windows-mdt/prepare-for-windows-deployment-with-mdt.md - - text: Evaluate and update infrastructure - url: update/update-policies.md - - text: Build a successful servicing strategy - url: update/waas-deployment-rings-windows-10-updates.md - - # Card - - title: Deploy and update Windows 10 - linkLists: - - linkListType: deploy - links: - - text: Windows Autopilot scenarios and capabilities - url: windows-autopilot/windows-autopilot-scenarios.md - - text: Deploy Windows 10 to a new device with Configuration Manager - url: deploy-windows-cm/deploy-windows-10-using-pxe-and-configuration-manager.md - - text: Deploy a Windows 10 image using MDT - url: deploy-windows-mdt/deploy-a-windows-10-image-using-mdt.md - - text: Assign devices to servicing channels - url: update/waas-servicing-channels-windows-10-updates.md - - text: Deploy Windows 10 updates - url: update/waas-servicing-channels-windows-10-updates.md - - text: Resolve Windows 10 upgrade errors - url: upgrade/resolve-windows-10-upgrade-errors.md - - # Card (optional) - - title: Windows 10 resources - linkLists: - - linkListType: learn - links: - - text: Windows 10 release information - url: https://docs.microsoft.com/windows/release-information/ - - text: What's new in Windows 10 - url: https://docs.microsoft.com/windows/whats-new/ - - text: Windows 10 Enterprise Security - url: https://docs.microsoft.com/windows/security/ - - text: Desktop Deployment Center - url: https://docs.microsoft.com/microsoft-365/enterprise/desktop-deployment-center-home - From a8344213fdf34d13638d8484e5fcd38f24e950d5 Mon Sep 17 00:00:00 2001 From: Greg Lindsay Date: Tue, 9 Jun 2020 15:45:34 -0700 Subject: [PATCH 167/228] minor tweak --- windows/deployment/index.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/index.yml b/windows/deployment/index.yml index 6e694f4e3b..70fa4b92c9 100644 --- a/windows/deployment/index.yml +++ b/windows/deployment/index.yml @@ -102,7 +102,7 @@ landingContent: # Card (optional) - title: Windows 10 resources linkLists: - - linkListType: learn + - linkListType: reference links: - text: Windows 10 release information url: https://docs.microsoft.com/windows/release-information/ From f9c298797b47fc2678ab0032da16dd07ee13b9bf Mon Sep 17 00:00:00 2001 From: kasiak-msft <66700245+kasiak-msft@users.noreply.github.com> Date: Tue, 9 Jun 2020 16:07:40 -0700 Subject: [PATCH 168/228] Adding "endpoint security" to product description Added "endpoint security" to description of Microsoft Defender ATP to ensure clarity of what the product is all about. --- .../microsoft-defender-advanced-threat-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md index eb5b02f1ac..b6eaffbafa 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md +++ b/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection.md @@ -1,6 +1,6 @@ --- title: Microsoft Defender Advanced Threat Protection -description: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) is an enterprise security platform that helps defend against advanced persistent threats. +description: Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP) is an enterprise endpoint security platform that helps defend against advanced persistent threats. keywords: introduction to Microsoft Defender Advanced Threat Protection, introduction to Microsoft Defender ATP, cybersecurity, advanced persistent threat, enterprise security, machine behavioral sensor, cloud security, analytics, threat intelligence, attack surface reduction, next generation protection, automated investigation and remediation, microsoft threat experts, secure score, advanced hunting, microsoft threat protection, cyber threat hunting search.product: eADQiWindows 10XVcnh search.appverid: met150 @@ -23,7 +23,7 @@ ms.topic: conceptual > > For more info about Windows 10 Enterprise Edition features and functionality, see [Windows 10 Enterprise edition](https://www.microsoft.com/WindowsForBusiness/buy). -Microsoft Defender Advanced Threat Protection is a platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats. +Microsoft Defender Advanced Threat Protection is an enterprise endpoint security platform designed to help enterprise networks prevent, detect, investigate, and respond to advanced threats.

    >[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4wDob] From 9f0c908264cb7a584afdce8150495256589944e8 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 17:05:17 -0700 Subject: [PATCH 169/228] Added tech comments --- .../mdm/policy-csp-deliveryoptimization.md | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index f3b34ef7cd..bbba8094f4 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -307,7 +307,8 @@ One or more values can be added as either fully qualified domain names (FQDN) or ADMX Info: - GP English name: *Cache Server Hostname* -- GP name: *Cache Server Hostname* +- GP name: *CacheHost* +- GP element: *CacheHost* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -375,8 +376,9 @@ This policy allows you to to configure one or more Delivery Optimization in Netw ADMX Info: -- GP English name: *Cache Server Hostname* -- GP name: *Cache Server Hostname* +- GP English name: *Cache Server Hostname Source* +- GP name: *CacheHostSource* +- GP element: *CacheHostSource* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -956,7 +958,8 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts ADMX Info: - GP English name: *Maximum Background Download Bandwidth (in KB/s)* -- GP name: *Maximum Background Download Bandwidth (in KB/s)* +- GP name: *MaxBackgroundDownloadBandwidth* +- GP element: *MaxBackgroundDownloadBandwidth* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -1172,7 +1175,8 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts ADMX Info: - GP English name: *Maximum Foreground Download Bandwidth (in KB/s)* -- GP name: *Maximum Foreground Download Bandwidth (in KB/s)* +- GP name: *DOMaxForegroundDownloadBandwidth* +- GP element: *MaxForegroundDownloadBandwidth* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* @@ -1191,7 +1195,7 @@ ADMX Info: -This policy is deprecated. +This policy is deprecated because it only applies to uploads to Internet peers (only allowed when DownloadMode is set to 3) which is not used in commercial deployments. There is no alternate policy to use. From a8cb570d7ee4863db1d9c64f15ecd34076a45b88 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Tue, 9 Jun 2020 17:32:05 -0700 Subject: [PATCH 170/228] minor update --- .../client-management/mdm/policy-csp-deliveryoptimization.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index bbba8094f4..141762f884 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -1175,7 +1175,7 @@ The default value 0 (zero) means that Delivery Optimization dynamically adjusts ADMX Info: - GP English name: *Maximum Foreground Download Bandwidth (in KB/s)* -- GP name: *DOMaxForegroundDownloadBandwidth* +- GP name: *MaxForegroundDownloadBandwidth* - GP element: *MaxForegroundDownloadBandwidth* - GP path: *Windows Components/Delivery Optimization* - GP ADMX file name: *DeliveryOptimization.admx* From 6bf3d85f31d61efb25ea4ac33e0c2658abb31a10 Mon Sep 17 00:00:00 2001 From: Obi Eze Ajoku <62227226+linque1@users.noreply.github.com> Date: Tue, 9 Jun 2020 21:33:11 -0700 Subject: [PATCH 171/228] Corrected msftconnecttest to HTTP from HTTPS Corrected msftconnecttest to HTTP from HTTPS --- .../windows-endpoints-2004-non-enterprise-editions.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/privacy/windows-endpoints-2004-non-enterprise-editions.md b/windows/privacy/windows-endpoints-2004-non-enterprise-editions.md index a224c93fd2..d0be97841e 100644 --- a/windows/privacy/windows-endpoints-2004-non-enterprise-editions.md +++ b/windows/privacy/windows-endpoints-2004-non-enterprise-editions.md @@ -84,7 +84,7 @@ The following methodology was used to derive the network endpoints: |watson.telemetry.microsoft.com|HTTPS|Diagnostic Data |wdcp.microsoft.com|TLSv1.2|Used for Windows Defender when Cloud-based Protection is enabled |www.bing.com|TLSv1.2|Used for updates for Cortana, apps, and Live Tiles -|www.msftconnecttest.com|HTTPS|Network Connection (NCSI) +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) |www.office.com|HTTPS|Microsoft Office @@ -144,7 +144,7 @@ The following methodology was used to derive the network endpoints: |watson.telemetry.microsoft.com|HTTPS|Diagnostic Data |wdcp.microsoft.com|TLSv1.2|Used for Windows Defender when Cloud-based Protection is enabled |www.bing.com|TLSv1.2|Used for updates for Cortana, apps, and Live Tiles -|www.msftconnecttest.com|HTTPS|Network Connection (NCSI) +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) |www.msn.com|HTTPS|Network Connection (NCSI) |www.office.com|HTTPS|Microsoft Office @@ -198,6 +198,6 @@ The following methodology was used to derive the network endpoints: |wdcp.microsoft.com|TLSv1.2|Used for Windows Defender when Cloud-based Protection is enabled |www.bing.com|TLSv1.2|Used for updates for Cortana, apps, and Live Tiles |www.microsoft.com|HTTP|Connected User Experiences and Telemetry, Microsoft Data Management service -|www.msftconnecttest.com|HTTPS|Network Connection (NCSI) +|www.msftconnecttest.com|HTTP|Network Connection (NCSI) |www.office.com|HTTPS|Microsoft Office From 1a1d27ebdd07f50ce88880014bb59a2245340d01 Mon Sep 17 00:00:00 2001 From: Obi Eze Ajoku <62227226+linque1@users.noreply.github.com> Date: Tue, 9 Jun 2020 21:43:50 -0700 Subject: [PATCH 172/228] Corrected msftconnecttest to HTTP from HTTPS -ENT Corrected msftconnecttest to HTTP from HTTPS -ENT --- windows/privacy/manage-windows-2004-endpoints.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/privacy/manage-windows-2004-endpoints.md b/windows/privacy/manage-windows-2004-endpoints.md index a8c5513c4e..75e9aa6738 100644 --- a/windows/privacy/manage-windows-2004-endpoints.md +++ b/windows/privacy/manage-windows-2004-endpoints.md @@ -12,7 +12,7 @@ ms.author: obezeajo manager: robsize ms.collection: M365-security-compliance ms.topic: article -ms.date: 5/11/2020 +ms.date: 6/9/2020 --- # Manage connection endpoints for Windows 10 Enterprise, version 2004 @@ -80,7 +80,7 @@ The following methodology was used to derive these network endpoints: ||The following endpoints are used to communicate with Microsoft Store. If you turn off traffic for these endpoints, apps cannot be installed or updated from the Microsoft Store. |HTTP|*.dl.delivery.mp.microsoft.com| ||The following endpoint is used to get Microsoft Store analytics.|TLSv1.2|manage.devcenter.microsoft.com| |Network Connection Status Indicator (NCSI)|||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#bkmk-ncsi)| -||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTPS|www.msftconnecttest.com*| +||Network Connection Status Indicator (NCSI) detects Internet connectivity and corporate network connectivity status. NCSI sends a DNS request and HTTP query to this endpoint to determine if the device can communicate with the Internet. If you turn off traffic for this endpoint, NCSI won't be able to determine if the device is connected to the Internet and the network status tray icon will show a warning.|HTTP|www.msftconnecttest.com*| |Office|The following endpoints are used to connect to the Office 365 portal's shared infrastructure, including Office in a browser. For more info, see Office 365 URLs and IP address ranges. You can turn this off by removing all Microsoft Office apps and the Mail and Calendar apps. If you turn off traffic for these endpoints, users won't be able to save documents to the cloud or see their recently used documents.||[Learn how to turn off traffic to all of the following endpoint(s).](manage-connections-from-windows-operating-system-components-to-microsoft-services.md#26-microsoft-store)| |||HTTPS|*ow1.res.office365.com| |||HTTPS|office.com| From 8e32cb0fbaf0c5dca34eefc700104045f8b70d0a Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Wed, 10 Jun 2020 10:41:37 +0300 Subject: [PATCH 173/228] Update get-started-partner-integration.md --- .../get-started-partner-integration.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md index fe2ddd1f2d..04eec16b78 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md +++ b/windows/security/threat-protection/microsoft-defender-atp/get-started-partner-integration.md @@ -49,9 +49,8 @@ To have your company listed as a partner in the in-product partner page, you wil 6. We'd like to request that you include the User-Agent field in each API call made to Microsoft Defender ATP public set of APIs or Graph Security APIs. This will be used for statistical purposes, troubleshooting, and partner recognition. In addition, this step is a requirement for membership in Microsoft Intelligent Security Association (MISA). Follow these steps: 1. Identify a name adhering to the following nomenclature that includes your company name and the Microsoft Defender ATP integrated product with the version of the product that includes this integration. - - - ISV Nomenclature: `MdatpPartner-{CompanyName}-{TenantID}/{Version}`. - - Security partner Nomenclature: `MdatpPartner-{CompanyName}-{ProductName}/{Version}`. + - ISV Nomenclature: `MdatpPartner-{CompanyName}-{ProductName}/{Version}` + - Security partner Nomenclature: `MdatpPartner-{CompanyName}-{ProductName}/{TenantID}` 2. Set the User-Agent field in each HTTP request header to the name based on the above nomenclature. For more information, see [RFC 2616 section-14.43](https://tools.ietf.org/html/rfc2616#section-14.43). For example, User-Agent: `MdatpPartner-Contoso-ContosoCognito/1.0.0` From d517a31d2d47a73830b0ed474bd9587bf51d3d58 Mon Sep 17 00:00:00 2001 From: Kurt Sarens <56369685+kurtsarens@users.noreply.github.com> Date: Wed, 10 Jun 2020 05:41:37 -0700 Subject: [PATCH 174/228] resubmit... replaced Windows with Microsoft --- .../collect-diagnostic-data.md | 20 +++++++++---------- ...ne-arguments-windows-defender-antivirus.md | 14 ++++++------- 2 files changed, 17 insertions(+), 17 deletions(-) diff --git a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data.md index c3c1d2b052..195c50060b 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/windows-defender-antivirus/collect-diagnostic-data.md @@ -1,7 +1,7 @@ --- -title: Collect diagnostic data of Windows Defender Windows Defender Antivirus -description: Use a tool to collect data to troubleshoot Windows Defender Antivirus -keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, windows defender av +title: Collect diagnostic data of Microsoft Defender Antivirus +description: Use a tool to collect data to troubleshoot Microsoft Defender Antivirus +keywords: troubleshoot, error, fix, update compliance, oms, monitor, report, Microsoft Defender av search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 @@ -17,13 +17,13 @@ ms.reviewer: manager: dansimp --- -# Collect Windows Defender AV diagnostic data +# Collect Microsoft Defender AV diagnostic data **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Windows Defender AV. +This article describes how to collect diagnostic data that can be used by Microsoft support and engineering teams to help troubleshoot issues you may encounter when using the Microsoft Defender AV. On at least two devices that are experiencing the same issue, obtain the .cab diagnostic file by taking the following steps: @@ -35,10 +35,10 @@ On at least two devices that are experiencing the same issue, obtain the .cab di c. Enter administrator credentials or approve the prompt. -2. Navigate to the Windows Defender directory. By default, this is `C:\Program Files\Windows Defender`. +2. Navigate to the Microsoft Defender directory. By default, this is `C:\Program Files\Windows Defender`. > [!NOTE] -> If you're running an updated Windows Defender Platform version, please run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\`. +> If you're running an updated Microsoft Defender Platform version, please run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\`. 3. Type the following command, and then press **Enter** @@ -46,7 +46,7 @@ On at least two devices that are experiencing the same issue, obtain the .cab di mpcmdrun.exe -GetFiles ``` -4. A .cab file will be generated that contains various diagnostic logs. The location of the file will be specified in the output in the command prompt. By default, the location is `C:\ProgramData\Microsoft\Windows Defender\Support\MpSupportFiles.cab`. +4. A .cab file will be generated that contains various diagnostic logs. The location of the file will be specified in the output in the command prompt. By default, the location is `C:\ProgramData\Microsoft\Microsoft Defender\Support\MpSupportFiles.cab`. > [!NOTE] > To redirect the cab file to a a different path or UNC share, use the below command: @@ -58,7 +58,7 @@ On at least two devices that are experiencing the same issue, obtain the .cab di > [!NOTE] >If you have a problem with Update compliance, send an email using the Update Compliance support email template, and fill out the template with the following information: >``` -> I am encountering the following issue when using Windows Defender Antivirus in Update Compliance: +> I am encountering the following issue when using Microsoft Defender Antivirus in Update Compliance: > I have provided at least 2 support .cab files at the following location: > > @@ -93,5 +93,5 @@ When the SupportLogLocation parameter is used, a folder structure as below will ## See also -- [Troubleshoot Windows Defender Windows Defender Antivirus reporting](troubleshoot-reporting.md) +- [Troubleshoot Microsoft Defender Antivirus reporting](troubleshoot-reporting.md) diff --git a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md index 8a16818ba6..d2169a1969 100644 --- a/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md +++ b/windows/security/threat-protection/windows-defender-antivirus/command-line-arguments-windows-defender-antivirus.md @@ -1,7 +1,7 @@ --- -title: Use the command line to manage Windows Defender Antivirus -description: Run Windows Defender Antivirus scans and configure next-generation protection with a dedicated command-line utility. -keywords: run windows defender scan, run antivirus scan from command line, run windows defender scan from command line, mpcmdrun, defender +title: Use the command line to manage Microsoft Defender Antivirus +description: Run Microsoft Defender Antivirus scans and configure next-generation protection with a dedicated command-line utility. +keywords: run Microsoft Defender scan, run antivirus scan from command line, run Microsoft Defender scan from command line, mpcmdrun, defender search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 @@ -16,18 +16,18 @@ ms.reviewer: ksarens manager: dansimp --- -# Configure and manage Windows Defender Antivirus with the mpcmdrun.exe command-line tool +# Configure and manage Microsoft Defender Antivirus with the mpcmdrun.exe command-line tool **Applies to:** - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) -You can perform various Windows Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility is useful when you want to automate Windows Defender Antivirus use. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. You must run it from a command prompt. +You can perform various Microsoft Defender Antivirus functions with the dedicated command-line tool *mpcmdrun.exe*. This utility is useful when you want to automate Microsoft Defender Antivirus use. You can find the utility in `%ProgramFiles%\Windows Defender\MpCmdRun.exe`. You must run it from a command prompt. > [!NOTE] > You might need to open an administrator-level version of the command prompt. Right-click the item in the Start menu, click **Run as administrator** and click **Yes** at the permissions prompt. > -> If you're running an updated Windows Defender Platform version, please run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\`. +> If you're running an updated Microsoft Defender Platform version, please run `MpCmdRun` from the following location: `C:\ProgramData\Microsoft\Windows Defender\Platform\`. The utility has the following commands: @@ -60,4 +60,4 @@ MpCmdRun.exe -Scan -ScanType 2 - [Reference topics for collecting diagnostic data](collect-diagnostic-data.md) - [Reference topics for management and configuration tools](configuration-management-reference-windows-defender-antivirus.md) -- [Windows Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) +- [Microsoft Defender Antivirus in Windows 10](windows-defender-antivirus-in-windows-10.md) From 1732ea7a3ba154eb5337fb9a0acf491098a77cfc Mon Sep 17 00:00:00 2001 From: Denise Vangel-MSFT Date: Wed, 10 Jun 2020 08:48:10 -0700 Subject: [PATCH 175/228] Update collect-diagnostic-data.md --- .../microsoft-defender-antivirus/collect-diagnostic-data.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md index 08d45c281f..e366bb2066 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/collect-diagnostic-data.md @@ -12,7 +12,7 @@ ms.localizationpriority: medium author: denisebmsft ms.author: deniseb ms.custom: nextgen -ms.date: 06/01/2020 +ms.date: 06/10/2020 ms.reviewer: manager: dansimp --- From fb26968068fb9a6d705af33f1462214109055c3c Mon Sep 17 00:00:00 2001 From: Robert Durff Date: Wed, 10 Jun 2020 08:54:28 -0700 Subject: [PATCH 176/228] Adding Windows 10 1909 Certification Document Links (I am an external consultant working with MS FTEs Garrett.Burk@microsoft.com and MGrimm@microsoft.com on their Common Criteria certifications.) We've completed certification for Windows 10 version 1909 (November 2019 Update). Editing this topic to add the 3 links to the 3 certification documents, hosted on the MS Download Center. --- .../threat-protection/windows-platform-common-criteria.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/windows/security/threat-protection/windows-platform-common-criteria.md b/windows/security/threat-protection/windows-platform-common-criteria.md index 86aa913f16..d1d4e94a38 100644 --- a/windows/security/threat-protection/windows-platform-common-criteria.md +++ b/windows/security/threat-protection/windows-platform-common-criteria.md @@ -23,6 +23,7 @@ Microsoft is committed to optimizing the security of its products and services. The Security Target describes security functionality and assurance measures used to evaluate Windows. +- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/b/3/7/b37981cf-040a-4b02-a93c-a3d3a93986bf/Windows%2010%201909%20GP%20OS%20Security%20Target.pdf) - [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/c/6/9/c6903621-901e-4603-b9cb-fbfe5d6aa691/Windows%2010%201903%20GP%20OS%20Security%20Target.pdf) - [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/3/f/e/3fe6938d-2c2d-4ef1-85d5-1d42dc68ea89/Windows%2010%20version%201809%20GP%20OS%20Security%20Target.pdf) - [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/0/7/6/0764E933-DD0B-45A7-9144-1DD9F454DCEF/Windows%2010%201803%20GP%20OS%20Security%20Target.pdf) @@ -61,6 +62,7 @@ These documents describe how to configure Windows to replicate the configuration **Windows 10, Windows 10 Mobile, Windows Server 2016, Windows Server 2012 R2** +- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/7/7/3/77303254-05fb-4009-8a39-bf5fe7484a41/Windows%2010%201909%20GP%20OS%20Administrative%20Guide.pdf) - [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/0/b/b/0bb1c6b7-499a-458e-a5f8-e9cf972dfa8d/Windows%2010%201903%20GP%20OS%20Administrative%20Guide.pdf) - [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/f/f/1/ff186e32-35cf-47db-98b0-91ff11763d74/Windows%2010%20version%201809%20GP%20OS%20Administrative%20Guide.pdf) - [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/6/C/1/6C13FBFF-9CB0-455F-A1C8-3E3CB0ACBD7B/Windows%2010%201803%20GP%20OS%20Administrative%20Guide.pdf) @@ -140,6 +142,7 @@ These documents describe how to configure Windows to replicate the configuration An Evaluation Technical Report (ETR) is a report submitted to the Common Criteria certification authority for how Windows complies with the claims made in the Security Target. A Certification / Validation Report provides the results of the evaluation by the validation team. +- [Microsoft Windows 10 (November 2019 Update)](https://download.microsoft.com/download/9/f/3/9f350b73-1790-4dcb-97f7-a0e65a00b55f/Windows%2010%201909%20GP%20OS%20Certification%20Report.pdf) - [Microsoft Windows 10 (May 2019 Update)](https://download.microsoft.com/download/2/1/9/219909ad-2f2a-44cc-8fcb-126f28c74d36/Windows%2010%201903%20GP%20OS%20Certification%20Report.pdf) - [Microsoft Windows 10 (October 2018 Update)](https://download.microsoft.com/download/9/4/0/940ac551-7757-486d-9da1-7aa0300ebac0/Windows%2010%20version%201809%20GP%20OS%20Certification%20Report%20-%202018-61-INF-2795.pdf) - [Microsoft Windows 10 (April 2018 Update)](https://download.microsoft.com/download/6/7/1/67167BF2-885D-4646-A61E-96A0024B52BB/Windows%2010%201803%20GP%20OS%20Certification%20Report.pdf) From cd4b4f3b44d83bfd78f3a4130d8ac242e223eec1 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 10 Jun 2020 09:08:47 -0700 Subject: [PATCH 177/228] Update surface-enterprise-management-mode.md --- devices/surface/surface-enterprise-management-mode.md | 9 ++++++--- 1 file changed, 6 insertions(+), 3 deletions(-) diff --git a/devices/surface/surface-enterprise-management-mode.md b/devices/surface/surface-enterprise-management-mode.md index d44626e6a8..c983e5f0f5 100644 --- a/devices/surface/surface-enterprise-management-mode.md +++ b/devices/surface/surface-enterprise-management-mode.md @@ -32,6 +32,9 @@ There are two administrative options you can use to manage SEMM and enrolled Sur The primary workspace of SEMM is Microsoft Surface UEFI Configurator, as shown in Figure 1. Microsoft Surface UEFI Configurator is a tool that is used to create Windows Installer (.msi) packages or WinPE images that are used to enroll, configure, and unenroll SEMM on a Surface device. These packages contain a configuration file where the settings for UEFI are specified. SEMM packages also contain a certificate that is installed and stored in firmware and used to verify the signature of configuration files before UEFI settings are applied. +>[!NOTE] +>You can now use Surface UEFI Configurator and SEMM to manage ports on Surface Dock 2. To learn more, see [Secure Surface Dock 2 ports with SEMM](secure-surface-dock-ports-semm.md). + ![Microsoft Surface UEFI Configurator](images/surface-ent-mgmt-fig1-uefi-configurator.png "Microsoft Surface UEFI Configurator") *Figure 1. Microsoft Surface UEFI Configurator* @@ -282,6 +285,6 @@ This version of SEMM includes: ## Related topics -[Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) - -[Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) +- [Enroll and configure Surface devices with SEMM](enroll-and-configure-surface-devices-with-semm.md) +- [Unenroll Surface devices from SEMM](unenroll-surface-devices-from-semm.md) +- [Secure Surface Dock 2 ports with SEMM](secure-surface-dock-ports-semm.md) From abdc7edd5c7f59196f486aab7ca902dc9895afb6 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Wed, 10 Jun 2020 11:36:58 -0700 Subject: [PATCH 178/228] pencil edit --- devices/surface/secure-surface-dock-ports-semm.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/secure-surface-dock-ports-semm.md b/devices/surface/secure-surface-dock-ports-semm.md index dfd2d40c11..266f6d92cf 100644 --- a/devices/surface/secure-surface-dock-ports-semm.md +++ b/devices/surface/secure-surface-dock-ports-semm.md @@ -38,7 +38,7 @@ Restricting Surface Dock 2 to authorized persons signed into a corporate host de This section provides step-by-step guidance for the following tasks: -1. Install [**Surface UEFI Configurator**](https://www.microsoft.com/en-us/download/details.aspx?id=46703). +1. Install [**Surface UEFI Configurator**](https://www.microsoft.com/download/details.aspx?id=46703). 1. Create or obtain public key certificates. 1. Create an .MSI configuration package. 1. Add your certificates. From 425ec93914fea13c653102d885f4329d68f4eff6 Mon Sep 17 00:00:00 2001 From: ManikaDhiman Date: Wed, 10 Jun 2020 12:33:35 -0700 Subject: [PATCH 179/228] More updates --- .../mdm/policy-csp-deliveryoptimization.md | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/policy-csp-deliveryoptimization.md b/windows/client-management/mdm/policy-csp-deliveryoptimization.md index 141762f884..902ef8e8be 100644 --- a/windows/client-management/mdm/policy-csp-deliveryoptimization.md +++ b/windows/client-management/mdm/policy-csp-deliveryoptimization.md @@ -388,10 +388,12 @@ The following are the supported values: - 1 = DHCP Option ID. - 2 = DHCP Option ID Force. -When DHCP Option ID (1) is set, the client will query DHCP Option ID 235 and use the returned FQDN or IP value as Cache Server Hostname value. This policy will be overridden when the Cache Server Hostname policy has been set. +When DHCP Option ID (1) is set, the client will query DHCP Option ID 235 and use the returned FQDN or IP value as Cache Server Hostname value. This policy will be overridden when the [Cache Server Hostname](#deliveryoptimization-docachehost) policy has been set. + +When DHCP Option ID Force (2) is set, the client will query DHCP Option ID 235 and use the returned FQDN or IP value as Cache Server Hostname value, and will override the Cache Server Hostname policy if it has been set. > [!Note] -> If the DHCP Option ID is formatted incorrectly, the client will fall back to the [Cache Server Hostname policy](#deliveryoptimization-docachehost) value if that value has been set. +> If the DHCP Option ID is formatted incorrectly, the client will fall back to the [Cache Server Hostname](#deliveryoptimization-docachehost) policy value if that value has been set. From 848100bf527816af58e1d8056c5da152c8884b4f Mon Sep 17 00:00:00 2001 From: Aacer Daken <41165107+AaDake@users.noreply.github.com> Date: Wed, 10 Jun 2020 13:32:43 -0700 Subject: [PATCH 180/228] Update kernel-dma-protection-for-thunderbolt.md Updated document to be more generic and cover Kernel DMA protection for PCI, rather than Thunderbolt 3 specifically --- .../kernel-dma-protection-for-thunderbolt.md | 29 +++++++++---------- 1 file changed, 14 insertions(+), 15 deletions(-) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index 5474e7faf1..8cdba0cc57 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -1,5 +1,5 @@ --- -title: Kernel DMA Protection for Thunderbolt™ 3 (Windows 10) +title: Kernel DMA Protection (Windows 10) description: Kernel DMA Protection protects PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports. ms.prod: w10 ms.mktglfcycl: deploy @@ -15,17 +15,18 @@ ms.date: 03/26/2019 ms.reviewer: --- -# Kernel DMA Protection for Thunderbolt™ 3 +# Kernel DMA Protection **Applies to** - Windows 10 -In Windows 10 version 1803, Microsoft introduced a new feature called Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to Thunderbolt™ 3 ports. +In Windows 10 version 1803, Microsoft introduced a new feature called Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to externally accessible PCIe ports (e.g. Thunderbolt™ 3 ports and CFexpress). In Windows 10 version 1903, Microsoft expanded the Kernel DMA Protection support to cover internal PCIe ports (e.g. M.2 slots) + Drive-by DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. This feature does not protect against DMA attacks via 1394/FireWire, PCMCIA, CardBus, ExpressCard, and so on. -For Thunderbolt DMA protection on earlier Windows versions and other platforms that lack support for Kernel DMA Protection, please refer to [Intel Thunderbolt™ 3 Security documentation](https://thunderbolttechnology.net/security/Thunderbolt%203%20and%20Security.pdf). +For Thunderbolt DMA protection on earlier Windows versions and platforms that lack support for Kernel DMA Protection, please refer to [Intel Thunderbolt™ 3 Security documentation](https://thunderbolttechnology.net/security/Thunderbolt%203%20and%20Security.pdf). ## Background @@ -33,9 +34,9 @@ PCI devices are DMA-capable, which allows them to read and write to system memor The DMA capability is what makes PCI devices the highest performing devices available today. These devices have historically existed only inside the PC chassis, either connected as a card or soldered on the motherboard. Access to these devices required the user to turn off power to the system and disassemble the chassis. -Today, this is no longer the case with Thunderbolt™. +Today, this is no longer the case with hot plug PCIe ports (e.g. Thunderbolt™ and CFexpress). -Thunderbolt™ technology has provided modern PCs with extensibility that was not available before for PCs. +Hot plug PCIe ports such as Thunderbolt™ technology have provided modern PCs with extensibility that was not available before for PCs. It allows users to attach new classes of external peripherals, such as graphics cards or other PCI devices, to their PCs with a hot plug experience identical to USB. Having PCI hot plug ports externally and easily accessible makes PCs susceptible to drive-by DMA attacks. @@ -45,15 +46,14 @@ A simple example would be a PC owner leaves the PC for a quick coffee break, and ## How Windows protects against DMA drive-by attacks Windows leverages the system Input/Output Memory Management Unit (IOMMU) to block external peripherals from starting and performing DMA unless the drivers for these peripherals support memory isolation (such as DMA-remapping). -Peripherals with compatible drivers will be automatically enumerated, started and allowed to perform DMA to their assigned memory regions. -By default, peripherals with incompatible drivers will be blocked from starting and performing DMA until an authorized user signs into the system or unlocks the screen. +Peripherals with [DMA Remapping compatible drivers](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers) will be automatically enumerated, started and allowed to perform DMA to their assigned memory regions. +By default, peripherals with DMA Remapping incompatible drivers will be blocked from starting and performing DMA until an authorized user signs into the system or unlocks the screen. IT administrators can modify the default behavior applied to devices with DMA Remapping incompatible drivers using the [DmaGuard MDM policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-policies) ## User experience ![Kernel DMA protection user experience](images/kernel-dma-protection-user-experience.png) -A peripheral that is incompatible with DMA-remapping will be blocked from starting if the peripheral was plugged in before an authorized user logs in, or while the screen is locked. -Once the system is unlocked, the peripheral driver will be started by the OS, and the peripheral will continue to function normally until the system is rebooted, or the peripheral is unplugged. +By default, peripherals with DMA remapping compatible device drivers will be automatically enumerated and started. Peripherals with DMA Remapping incompatible drivers will be blocked from starting if the peripheral was plugged in before an authorized user logs in, or while the screen is locked. Once the system is unlocked, the peripheral driver will be started by the OS, and the peripheral will continue to function normally until the system is rebooted, or the peripheral is unplugged. The peripheral will continue to function normally if the user locks the screen or logs out of the system. ## System compatibility @@ -107,14 +107,13 @@ Please check the driver instance for the device you are testing. Some drivers ma ![Kernel DMA protection user experience](images/device-details-tab.png) -### What should I do if the drivers for my Thunderbolt™ 3 peripherals do not support DMA-remapping? -If the peripherals do have class drivers provided by Windows 10, please use these drivers on your systems. If there are no class drivers provided by Windows for your peripherals, please contact your peripheral vendor/driver vendor to update the driver to support this functionality. Details for driver compatibility requirements can be found at the [Microsoft Partner Center](https://partner.microsoft.com/dashboard/collaborate/packages/4142). - +### What should I do if the drivers for my PCI or Thunderbolt™ 3 peripherals do not support DMA-remapping? +If the peripherals do have class drivers provided by Windows 10, please use these drivers on your systems. If there are no class drivers provided by Windows for your peripherals, please contact your peripheral vendor/driver vendor to update the driver to support [DMA Remapping](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers) ### Do Microsoft drivers support DMA-remapping? -In Windows 10 1803 and beyond, the Microsoft inbox drivers for USB XHCI (3.x) Controllers, Storage AHCI/SATA Controllers and Storage NVMe Controllers support DMA-remapping. +In Windows 10 1803 and beyond, the Microsoft inbox drivers for USB XHCI (3.x) Controllers, Storage AHCI/SATA Controllers and Storage NVMe Controllers support DMA Remapping. ### Do drivers for non-PCI devices need to be compatible with DMA-remapping? -No. Devices for non-PCI peripherals, such as USB devices, do not perform DMA, thus no need for the driver to be compatible with DMA-remapping. +No. Devices for non-PCI peripherals, such as USB devices, do not perform DMA, thus no need for the driver to be compatible with DMA Remapping. ### How can an enterprise enable the External device enumeration policy? The External device enumeration policy controls whether to enumerate external peripherals that are not compatible with DMA-remapping. Peripherals that are compatible with DMA-remapping are always enumerated. Peripherals that don't can be blocked, allowed, or allowed only after the user signs in (default). From 0519e9264e18abbb1bd4c50807475b09ed546da3 Mon Sep 17 00:00:00 2001 From: Aacer Daken <41165107+AaDake@users.noreply.github.com> Date: Wed, 10 Jun 2020 13:41:59 -0700 Subject: [PATCH 181/228] Update kernel-dma-protection-for-thunderbolt.md Updated document with new snapshot of device manager --- .../kernel-dma-protection-for-thunderbolt.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index 8cdba0cc57..eeca0b68d5 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -103,6 +103,8 @@ No, Kernel DMA Protection only protects against drive-by DMA attacks after the O DMA-remapping is supported for specific device drivers, and is not universally supported by all devices and drivers on a platform. To check if a specific driver is opted into DMA-remapping, check the values corresponding to the DMA Remapping Policy property in the Details tab of a device in Device Manager*. A value of 0 or 1 means that the device driver does not support DMA-remapping. A value of 2 means that the device driver supports DMA-remapping. If the property is not available, then the policy is not set by the device driver (i.e. the device driver does not support DMA-remapping). Please check the driver instance for the device you are testing. Some drivers may have varying values depending on the location of the device (internal vs. external). +![Kernel DMA protection user experience](images/device_details_tab_1903.png) + *For Windows 10 versions 1803 and 1809, the property field in Device Manager uses a GUID, as highlighted in the following image. ![Kernel DMA protection user experience](images/device-details-tab.png) From 94a4f320cc8e35794f18a1d38d37d232d0b0720c Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 10 Jun 2020 14:05:11 -0700 Subject: [PATCH 182/228] High priority new article with brief info on DMA protection --- devices/surface/dma-protect.md | 26 +++++++++++++++++++ devices/surface/images/systeminfodma.png | Bin 0 -> 122315 bytes devices/surface/surface-manage-dfci-guide.md | 2 +- 3 files changed, 27 insertions(+), 1 deletion(-) create mode 100644 devices/surface/dma-protect.md create mode 100644 devices/surface/images/systeminfodma.png diff --git a/devices/surface/dma-protect.md b/devices/surface/dma-protect.md new file mode 100644 index 0000000000..68e0409bb6 --- /dev/null +++ b/devices/surface/dma-protect.md @@ -0,0 +1,26 @@ +--- +title: Surface DMA Protection +description: This article describes DMA protection on compatible Surface devices +ms.prod: w10 +ms.mktglfcycl: manage +ms.localizationpriority: medium +ms.sitesec: library +author: coveminer +ms.author: greglin +ms.topic: article +ms.date: 6/10/2020 +ms.reviewer: carlol +manager: laurawi +audience: itpro +--- +# DMA Protection on Surface devices + +Direct Memory Access (DMA) protection is designed to mitigate potential security vulnerabilities associated with using removable SSDs or external storage devices. Newer Surface devices come with DMA Protection enabled by default. These include Surface Pro 7, Surface Laptop 3, and Surface Pro X. To check the presence of DMA protection feature on your device, open System Information (**Start** > **msinfo32.exe**), as shown in the figure below. + +![System information showing DMA Protection enabled](images/systeminfodma.png) + +If a Surface removable SSD is tampered with, the device will shutoff power. The resulting reboot causes UEFI to wipe memory, to erase any residual data. + +On devices that do not support Kernel DMA Protection, IT admins can: + +- [Block DMA until a user signs in](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess) diff --git a/devices/surface/images/systeminfodma.png b/devices/surface/images/systeminfodma.png new file mode 100644 index 0000000000000000000000000000000000000000..46c86e9dd613e9568fdbeb669c05af0ccdfc821e GIT binary patch literal 122315 zcmYg%WmsH0)NWg9P+W>bDKfYe_ZD||*TDyOE$;5_?(P&F++mObiZi&oT)yv|bMJkg z{U@`N?99r_%KNUo36YZ#MMA(sc=P5BlDL?V!kag6-`>1=oAmkP>o1buSi;}D`SwO! z=$Dd9`eDY0WaYUfpS2EI8FoU!kk9DfNwSN-1^c|C`1p&o@=2|Z%gsDBDqVCDz>ZcDzTu+Mp!x@^Gi~mfq1TC zH&E0tU(HWV_$-7xIuBEF(3nq12C1Gah-o2U4^=;#KBtMxk;e%9>nyNxlJia!E*rC= zmJA;G`I3}Vl73Okb|9FKZEY^&6#r~xTInsF&Ti82=UP_=qPi$vA}~q^ea91DaQ~4F z+4MvLDj(nxsFMoYx$x!3^<_m3TQu`gBpPjJTv5#6nKh8%E4yw(aI_A;de_HSx0yh;LN3?K*DVi+J>Fj!RBh5bMP!l_N$-TcN`NN28u@)=z zH&NZi>Lar;jr{2f{i)kgwTPk9QVIn9+-fMz{2_&M0(fsKlbW{O-A;_Wyh}ypg!`k{ zYDd3#AW^jr#CTHHnBMZk-o_m&?1R00-^0X(~8WW z-&IIjvw z?QJ_MEz=+!e4>T9*UX8;A@_q++&eTOTq2G};8A9>z=DaXlw{7X8K}=&h4YcVsq8v6@;Epe<%3_by2_XdQbvBhk&1YBV<%1E9$#llQqdW9X*&kX=YFE&l&@f^?Ohj9&bWj)ju0l9H=zJiHRq^6G?i*&dFC)=TRO|3T!YoRQWtEu z(L_mR{wpEPznFghv?Y<1`UN2)#sRYOh;34PPJCscBrFu>b|7@jo|&&kZMH-}>43Ap zfD6=`UMko$4fsu!6le}11kR^|aAh)+&-c&VXw{q66zN*z2(^c*^JPmsMX#FaIGH9K z)2q{rIV*ECOU(56O4ML^OFwdPR9r(~c&WHLbxS`GG0UX(Rgyi##VP3nqSbe)WpL*+ z8s(h#Wva?5=_IvOGp>7i*p{sTnT?Tu_ta!sHM>e@=qZlV;0rk%3sWZ#oD`wxSBWKn z(vU{AGW(g*7wt%Q5pC`i7l_#BS`1KKWrG8b=&$P4i=|`SNFx1C>qfX%`6BSr?}jMD zkVYmF%}9P6#|g6BXwyyf8;8vzD_4Qto~g|ZN15j>cH8txZgddEl0w;$9hAxGi{geS zukD8a1W(l*N%0IR1_Mr83vrRmjnv-p*)536TOeuf8z&)NWA(~vEt~ zcHK4r)hBp;Z+f<&2A+^4XBVe!==aQXLBk*l^+d-_Wlq{VeabfDc>N5`B4Cb$7UXD6 zsJoupb2oGSbJT{APEDmg7KLICBh7CYEqiJiQKF0jZkRDzF&IY}G>Gu|LLZJH}5H{1aiAY&2&HAvL`Kl1neXKWBs zVM(Ei@VMjdq55}LWbfzEPe2=*CRABjmpb)E7efh!f7w!(3-y|S%VY{^HG79{{I#fn z1xHG;4UM%|tvWP*WO&rfYnXE?mWXY>O?c$WCCaJg=@p)1?0-R`XZ0Jf{JN6CRDFBSflAMbMEtrO=N7FH z1=R-&j&nJ8(2gs#Qgc@0PBNZ+u2QlB1x*IG36FhF{_|1ormcIq4PZ;n8If?VV0PFa zH_L?wNabE=2cn_~)OOa8$hpd-!v}I)3f-~4v?vulcXKsvM9U@9a*wDipgR`9qDoj= zGi-2G_*%^)-a0WOLP2e4rOcRz=ca`v2?LSxmcxqQE39lG7Wn;3?G+7Iqt&UQZ50a? z`@fj^u`EC6*exppQcm$#m6(WmkPrr1})B6D|@npHf; z93sFG8suO@yvAfFi+cJfjH4(?$3yLkN@T}jr(DD|5ME@C9#PtQm{}@$Z>9e`;7|jo z!?3Udlt8HIR-bG|nLJ!{JZRE`Q**AVY@PtD%U2)nP!7VCVa_OS+uvs^tDpcC`R$il zTw-bRdFr%9h6o8ZusKyg^}T=AUy&lsZPzTdHmgI@tbB47uZs7bmQr1;+KiJ>oV9u5 z2T4VVtC7C z<`&w{TVqa;^O5i*^O4|<_zM5()(jMU4XHAVBmy{&n4-X$Yl?l3wg@%?!%^g@6sJJL zVzOa@4Z*ZnQviBuLF^<7x|LpTMDG00aKO2iven8!^$9N7)=E4sQWV6xMZV1BsL;hi zWOSSq+{k!reyP5oxhyYme2<2@ zKhGmJr^_Gsx60^hsPBLM&*T5X=5%69!1VK<;`?8>igFo4DF4;}{Nh;73Qv~u;eRW? zzGaq67qf%&cC}BkU%kDWwSY#(k7}hhjqa3wQ7lfvC&!7*E&a%s^vkI*Yl{p8 z7p8tqA@%$*|l2AsZYX-<}G}BH@4WuHu$;+hyHo?S>Ua zENwoODDoHTft|*=Z*td;APkp2eI+64?qf5ZnykH|tl#LEB~%KdOjg(aoRUhwY)*go zMHop?XV+8sEN|bf{Jy6-->gNsvy)*p$>0xlNMR-Y$NYzWC)nfbGZUR#H97(TZX!DPZL1p6?F)R5Wu#A6cNg!tN!%QkYUSKoO=gS$>w*mX{ zPVJ9NWdzYr7C~mhYE2+s7!q>!uX|z(C~ej`%Y=7pTu^31woj2T-CTuW$uh|AOGG6*Qow*JGJSTvifmx3a**Tw)!7XNra zQ)l0t^O|g#1B!(TNXY&rkn{UJ1%1ak!Lge&5t5gxlD7r{OCi+bocmc?|u4@tfo+MQ?4t8&8(nB|}F{>RbvyKLK5gucgkc7j%&+g`Zx zf+9JAsJdR~xNw1px#F9^t?fCJKhcJ+Pur@vuKViV>7oxBAIfrn^d(lj_07RK!YlKC zhZjUN>l-S8^81M14XHRtbIj-rVQ_*9(2@d{I9yq*f23)2O|xIhHmoRHal6Sg=ojVb z`rhYSl(oa7K0H#@J|>?xFk>{LRq3VoeZ3wC^*F+!b%Qx|>NY30(RccfFth~bakCpf z#74F3_R9tX=QhW=j|+1UXu7fl)x~mJO({;i>q6X#T~pJi@3ibD>Sj-P{Fle?Tql0B zlgG8+yC$C1>@UMC%dUMIlS_2z*7um2>;#%rFljS;!gT4f`?QDSv=wo^hxLL%o5$SN zMc<33&#UX2_u@%uZ#q*rzf_flGORv@=S^@Wxe@u5>X9q1x&>^F8#coZNpEjq_$jR( zfIN_gua0zFg+AzuN&9#h@wmvGUCVWh_l(wJKaw+aB2+jH$N2~eY740lf`EWYU1*$y zGjv_6-gjSj%4tPqLEsGMNWfUVdg7SzQQ^1ecmWFUN2E`e#A5+~%co6$;s0IP>)xYB z&d@)F()ic7!G=+Uqk}Wg$yHY`YkQCrwRu|IUXqn%c?`DXrxgM>C;mee*?^95Q%X7{ zCVLsGu&-Ekw`mOoi{koL`qa#c?t3!;zw~?u70cp@;f4g$DTGHa$OII}hgQeV=Zm7|o01#&@+`2pAvijHEtSRDrzcuOL?x58d?YDR zS|c{AV2y7gWYap=tgdluj@Ia~B}u-d_u5R>?(k2yWh5o#?*fOT1z-CUcl@q3@JLfe zx3R3uiX^Re;)lk^40n#>_)gl=;OPB|zu`F@cb41q(+bn#*RFr$2E`}7HM`QoA@j!< zkb{0GD!6O}#&MqH$kHaQwp$~LqP$|nZ$2Yf+llgU&9~3aa&b>mtv6(D#Pcy&bM)=& z1?e1*9P`QpBpQDn??y}=HGmX-yN6= zIy-3s#wBEq-G7*{y{-Q887{{-juW)S)ZSwL$;^uwl4VQgEUR%YIvD)FL83?Zoqc2v z!xL^GNy-(soHob-fTUfSb#T*#FWf(xZ*GXn7yhxB6Y+y*052)Sp zv^73(rpjkQxMnl3KG48W#gcol##VcwWVnBBDK;AQ4UT62r;mjb{6|PJdW$(P3lB8L_q6)7u)0NILc_7Zf z7@(f%qxN~YebE93byvvQ9=4O#4lh&BpygW0b%){dHvWxQ`zlu@?UJ6y-MIZgF9eY} z)!9_vauTU`;kMOwt2(D)Lf6AVcC*mrEB-p6Vz?g{p^@bp9TAvlY1YMV9@!95?;hdD zeaU2=eqgP|JIG&bUs)ecX{z^dQosay<*qJD<$4c zvo6G?QK4^&1av&y6Yq4E><}&8`0sZhcbiXUqdBk6PB9U{5nDGwu? zX*6VBZo8FPa^j4K!(Xtc@K8tM$Tl0|vudzm@q45=vY5bcG#6pfu8VY5Rz|Z)&;VO_ zBTiaRMlbDZeY(!q?jZ1OeT&33**1}Ljbw<8guE{_B61yFVy;TG;!Xyv@i(>q^Ogk^ zEeSi9#qpZTAh19GtkGa86IK|ItQceN^c5q*f6;6Q?yqgzX;Cw!_6^*p#sksKm7diy zLlcCiB-C-4LUq4uvc$K8mb1YW>)t!1M*jd8Z(|ne-rb8MX8#>e>98kb1E!|~1{}s) zH66ES;Ygm^F2|#~sG=Wxx0~ge1v4^tPZvK&uN<+AiQ^_wI3|?_mobn(FLm?-nA3k z#6{%3!)(3bi~udlVHM}wzsO6S@P~Gfb!a)S{Vase#Pn>S=i1J!E8)$Si8_wtxjs|4 zKZ{YyiNwkpd#U4gr(!NU3zEudOEY3N${0>D$_u`zFNC`g&;jvr`|{rVCN$iwmJI%H^|JqAM&7%C0kHaDyNPi1P@U8Ar~wn;GfF`KqPrL z7sA;0S=4ZgMZ);l-yJ^xW;=1D62NgF5Axh2gd#LwqAoin%mHOs@Cr(KejZ1Ys_|K% zTGMs}FmvsqQ6~47*(aX$SshJ&m7+i`uSLYM*O6pI{e~yG<_(Yb59Yl75(Vx}cMWqn zZUJ21-$PH5>xrWjgOp>P0E75VS|H)U`HvbhFZcC}91 z9+^Hl;SMlZ3Yl))6v-)}>un|?zO)$4W9S%|ll3;vNV2~5pQ&n13K#jbaRkl! z5}1aeV~4Xq8&Csw*iM1)Z|Fv~|5+@`lz9m_iIHGx`GmNg@=#ghWXMi8CN#UDfw+SE zTy%h!`t?P<-GMjqYt!1)Cch^|rEthWt9^NnK0o_yDS*S|OfJyjNZMbj#U$DLHd+Y^ERj#TOCZll*uS{KH|ATB9%_X1bny>dh?|k?iiC zC*q+ufns5Y;L|7zLTJFmmLOs@fT2m?tB}@idl{UsNztEU##h7dt#`=Y(l#xH%9p>+kDex)yUy z$fdwg#V0P_cJcuo2usJcq^lSZv-krqdR^I3xBhg%xxH>Yn*4;TvKD}5bnUDwr(rc& zaiWJ;$jwWgqwR5ZgqTV=odmbP`?EMWsw>s_L(A?ITuIV9W8vlEP`4p#4dQT0d^QkS zotK53!peJzFH|LwGvB+0WWVFk(&SgOh#atuQ7(6;AdJb5c(^AkOJdGVQda;-@MV!9W$tsUh zZ<1n-fTFO@YLlXUF`_stMW}zLU{tN!Cq%&dnMB^j1E@x6onp3p19tyIBA-K#Of*d-+s?lHuGzJNusZbk$&hgprS9-qx%Lu*S zuiO(6-wMO^LB))(_KAy&Y4f}~0_PiCcw{IEa?9)AS3x9!D##J|>?GVYy8zyA?n3Ov zz zJghL{=D_pc@1QT{S zx1>xCf{3X9w*#KOH~$8Q_v^9(ZvT({&Y;2x{nrOSe9}Jp|5yAZEZ_hCnoV?1ZW{Rf zJ9ytyKn~^qSK6%s(~SuVkKEq3wUn=EN#UF}5cU;6ORHTy@A|hQt`GWklxKCKTPK0) zhp(UYe^*dx^<1W0EL6Anf1b=f_#Ak1@bext(f3YMjnf-@ERrXAFLolOaa4M(20W#8 z=jkQN<}sFQ;FlP5o%b8ufbcujWTz>96D@WRr=*D=Ekz`%XRcv={BIt68LyiW61&fnKwFPf zN$11$B_5ns)Vd7IQqtw25o;5MSCMa~1}%w*m?GJel%8X9^kMc8CeS5T`_3)5^%3&O zo286Di9=A{!ykNWXoYqMb~|I*(kVH0hU*TUPX@SH53siD%`aLuFIMgKmB$*}s)o(? zb0wCP_c6xyUu!BPUf?$F4oVjJ0=zRAGf~(@oZSKAzVNDcSBtV|n>t#diPD>$`kOB9 zu2)%jI{%J(fqfv;?I%mAh8|$SAZyGzO3n=y?XSc{Ca`6eji|1g@VX#6&U7LpMm((7?JTr8oEyPZSf}Wr_vkfte}PLt- z4t$?Z7gjPzMsq9&xZ{&|SruIyE#GIL!2J1J11BjL6hcEVr3GS8ut0ap`x zll*-5fXS_|efx+%s;OX<(NC?)I6TNMg5y0ctktweq$S# zmemtQL$qP>rm(oB2mYklt@RdZ?jq2SbN+upo*-Xm_%Y+ zf>h=D13L;#H4Ph#axjsM&2JqXTX#(egPCU-Q75e?kWLw-@T8+)7Z-fw zk##YF*S7~&*|_P2I7jTZr|o|8tNSNR`SWA+Gx1$>d=d)7b?I1SF2lD3{WD9TJdT_EdJX*kZhZ9hT3XItuu zm%?WWq@_z4qoG#os!i=&ysAzQC7&r4=hiS1F421UiXwFvn$aI{2vzQ@S0yq^acAsE zbIf*O?MoWZgTbsyN@$H22drpcK-^#gNW|<@@)yt^S13&Yw6LPWqxwZ-hLHxTDMqMq z@!@QEv%SfjrY#gnS3besQIF})%G5r>i<7JKKdE*nU$6rQ+i(_D- z+P8nebWc`9?x7j7SbC^0UTPC>8i2Unph-Egv&i5EcfHgXy)>t_PuT4#Z*M-A1U8kZ zeem&cG1VSIQeJmDJ;lRmX3eMBj@x2jTL z=s@2Q`{&fSnXr)(WUM+|4jb$?;uEM!(T%eJP(3!ZiJ4cNS%v)r3DAcoll@ic5Ulfa!*s+P0@zYTKQ&UU*BVQI@qYDLNxJeJ@?G-qMm zy-;%HEZ+Vpa@}yzH@6^L2hE5-1V=Oe7i@TwxpPi_F{sGRar`bNw0zS#t8*j36Z(~% zadOI+r03a4!47&0_iHJ`lg7mOvGQ*=wQXrxsF%5rQB&SsYfL-4MBLJf@AlcO*SSX8FeW zE@cJ|t$S=TmynipM+%`ew$iStqM!ih6ZL)R1)^pk863XG%tz6M1};0X?pvRP)exg9-Fsm_|)GAIU$|G z(#S0-i3hAwx@dC#-Rt$c7V0`dI6K~wH7_v7i!RT(NkJu*{K@(oVW?Y4(82P~OoOIo z>osqNDE8q5DlK-)*i*Us^_yO4=hlYpVhcd+)Qq3S$=-zO%kc=w%933_K>%EAotP8V zJgu7_-n*Yg>npZZEm;`%I^Cb}uXS-A{UX29?C(a;M+~ib#vyeCp4XCT5W3SrqL3In zm1(#;p9W5$5@PsvKZd#3$ELOGhu_NH_}!k>{ct0g_IH3h2Z4u!d9|1~lrh&$_P#jV z*>oe-?->-SPjIgqD{_R~!-(87-s&2jYm)$Z7^5p!mTbrNdB$CD?NW!n#{ah@!gDDp z1ND>Z-YOilvwcp)l>2%b3(3`4k)!;6xKxk9TgJzk^0D9`Ob$Q!f@Ks&woRMGl++WA zd`xiO=1^pHZ4GH{*cX@wEr`j>bMAa5k$t*$IDz^qZIr8DvT8aB4<6azROI1he!a3) z#ZuHlCoNMpR4CSeIPWi~5zmp1qGyqQ!Xi43;n>!6&Ni6^0D6yGCJhrXtt$V_G;_Ah z%N1+W-hue~_2GD2>-U%Z=5gg}^=aHhkgx0&N8c)0s<-%!&fgi`-b}ok%EQ96D(P7( zr&90i8+G&3J98TL)v?o<1uQNx*iv1nT7nTHmx?humVp@bl;F91l5J+99o;0_><3Bg z>GJOaB5CxOmWz7c82`b+>omS6S%lY32<=(?k>k#szDti6`zU=>Z%F;06|?Rwmi0{f z?tz(I;}(B?!cxd9?c1?Wa>~Efefc_9klVLu3wwJ9Fx=bYq67k8yk)=q*VebRbT6=5 z-cJUp8Sd>O>PA-h{`KZXS)cD*-!)^F_P==Yc{!g9fPpAHdBp)*nI!Li>E5fsV_Ccq z{Ff;a=N{}76O3snL!dgc=K}ws&=+1JxgKItT?XxiN3^s{xq7=!%tKPnW)~^Q_p_Q-F6EpD_JbeS~q>c99c+a_I}&K*}`JJFlZ+r zuLPY^iw8=l+Vr3<0$%ClXVD&^JpBWXuQP+g!&~8svNf$z|C~#CePLZkoieSzMpACr z@oA<#=zCl;ym9+UhMvPEM=nVJ{E6(Ggp{|AjsN}n1Q|hOH0;tzO_v98L0LsYM<#O1 z?=-5YIsbDOL{vni(5UehwJ>|`064r_~nhVe9x~oo2^}Q>ee~LQXEOpQ2B2L`2$?E*6dNl2zQitu%EY- z9*MvzApyn60U`KZ*W4Yjz)#+##N>Ds=n*+D>ua~t{7UW5n6aKR@%5j(<${wzVp0FN z;p=SuQv2$=-?Mp!9^&s^m-oQy4GALvp-wc1k{>toE(T)RI*$qJv8oAXjSbXs^% zOs=Nlw{Ev-+a?#zZ|4YLPS=T@dFrEau6FYLkh<6qmnrEN?!Y5~I2Nsq_^)%V-_*99 z=~pJEY{^m(AU~O_j%7@~9zGQp^D)F^=$@Y5TDUqoe&9pwAspWw6RljY9!Nng%PFPs zjSSkFRce1<^0`l(3CkOdr42Xt1cwpX5?DKPyuD-3WuTOV!RV1+0O0QJ-I!HUK@;xJ zN{m!x{i#|LxNgp>B&;;8_}J*aPF+fByMNC*YI7f=O1m+aM!%bB-4vZqDTJT-#}j3( z`;5?Dym9plYH**8tAe<+6GmmZkgP=iiKD&-EqxQ`BAbBnHxYAzp(a$RWHU%cpTZyvzuT#{8WP)wvMJNtQE%_mjqX2KNc&q_X#g3Zb9o|qmyo7j$13J^<3$j!J^+R3%H;rON<sby-BN~BJMLp+2Cyp>12(nm0!&qi)Jt^g^+@p9gvBjV zzX%7s-=t>hh&Hy6802kcSV?nJs^}}{-W*A6yf$rWU3zXPW#twDm&1WLoOAMdslmH|kEK=d#v>zQ z!_s;BAat|E3NfetQ=Eiy9p&GtnId`Nv;1mW@7KEmWUBMyQK`0e$Q8Al{i+$_4iC3F z#&|LOy8tz)+Xc(wrI3#=vOw8^MRko|O43E@iMuB9U$DIXAU)}B{%u+{)Y>%~^7w`N zJfDm)CB12Qu_MjHxBg3|Qp>#JuUqd`Q(Q{SRarQyp>>&_dNT34Bfmszl-{iH%q5Qp z%$0?wiY{jQs@?Gcjc4uAm9N8t(TtVZ<*~TbNF(zpO?IvAhtQ3sHf33nsSt7(7WYeoCYcv0w@#sFx#a5o&EQrlyEL>Lp zK?^+Aq3HSq6IJUnV;-YV8?je)0H{uV7Dh6W#l$vGjVh(ifX))&rFt7qkm1Zvl@-}9 zpK_nAa>TTW5KDDGiZ;XA6Vk6XEm+(RD2}~$++**Z*Mnfh3UlX5M7(+ISzT`U_9~V= z-cXwM`@bbyqDA&kKJJUG)t|5~ifVMs{*XgfknI7d`_5k$66| zuFOKlSOFvO$5d^uBxlf}xXaXg5XXsCJ!x94TTayYCsnyb%)-s$MX0A5`qZ83kMpGl z#LjE8XI73O8Sh`WBZ@<_G*$YkP6!hnjs$h%g#Fk-t3!Ftm$Bs-&+6|XOn1-gqr~mL zCiexi!W9nRRafqr#04qNda|?dzq#>9Rkx?723yk7eC}DpuiNc8xH{X6vS@kfZlhYL zNzmzt(tCbfggU=usK|(Vsf%%pH*kKd+c{UT@s~% zf7hAL!*xR-1uK8&3kt4W6ElVyH0IOZgHfw$F|m6Jf}+MKQ$Uyb7aRRSn!KU z>gsR0i6C=)a5!$;;4@II0>U;3rMQaT&K!HDNZ1XYfi~N)0_yRu-br?OrvS5{eG5gB z&AS&7v@U0M^L#b{;tHC#y0K3I%3re0KH2UU8=5LV;sCN-2^l(g!!km%;`5E5ZisY+ zXwDSnIDw#yv_{p~qU02d`JBrZzk;x?t=S4$oBIzZc875m>i1)Ul-AOJ3sTZ1r#&&T zEA^EvQ5CVP^fr9HHHCLZUkUOVz&2z#Iz7IktlshM(55(IWw@R`S<$MuXDaKiN-l1` z>~s(oxG3b6uePS<24XWAPCc|gP8Jv?vFcwn(Nx$xoi1vn5={D&wzAZ9)`vWiJn}L^ zF0NyCsPtgdQLZK{D749}F``{+5&@)rzx(5oInHob(_6#)*n|qw8s%DZe2y%Nm~A&C zJ=%IZJN1T{r93>*4@hI5dUV4_f%V5Wh+lMGt^w;y&*Kg}+;N=l*-;5=ouHxnK6XG2 zh3T3z4ZQ~yZhm2@KTTsTa2-!#Q_Z;O5R6r>)tK2Z&iNUuE@z4@9kL2{lfQ`If>x<;$&ynjbUMb(948U^mC;{3++u3JJQ^Oj84 zd9S-4!Z+}=$!|2U|Ih*(ep|oCo4k4A9g3Auq*$faAIBY8Lzh}xVy&8LeV=LpXy#}= zv5`4kKul<6#no2!Os*sCVYOJ`Ta$bhaJ%O6q#UhD1Fr)8)cQGcf4dRPwDA`?v$vIM zPPK`n;9VaG`zd`;EfVCUaHYrkfM)QC`g(jc5O7Bt=n2K>1d3HFG{~9qb^o_DHa+?ZPU&`c=t7x0d(9xbi4reBh>X z`y7BRe=@rsKk6Fh8wIo*narfU-N${6!rg{-NEEytKR!_m{iI*768K8UML51L%Qv<) z+>JQG=%+mBjK3c@f9BC@dFx+x+?s+lB}J(*;HT@K{CG%-EOwJ(!4f+qSD-g;54AZ) z3D>zH=~Z9_J|BE1(w#~JW3Na)l)6HluEg7GXp=sA`B_`wU2M5#h(EX%g?{_o^YXs# zrU$B3?Es;Vgz*PojN?Z^4z`DBs!R^%$KvBLUks{8k9}HBuL(r$8sC>2~=@Yazmx~OBMUD30+Df>=$qfg-8(pZ4Cqtv>B^kT6-6w00 zrVPrVW~>YstvU*G8hSWhg|X}Yth3cm*45cuX@0UC3G@E&2Za#%LzHYZ3t^hxU`<__ zymd<3q)$y2O*O`Wk;f7Zi1>E*cD*BCQkwq$dOV5TY2D>FE=mnzI3{2G!SyFAQ#dtO z?Q1%xkTko2kYS|mJZtYc25ERj?><$`qK0f zl$AAuR_};+_bkSXX(Wlxc>b}?5a+2q`B#Vj|EUvCpLN+AHOYDfUyskdj3yc@# zwqvxM2J@)Z`V!V?@lYL5PAXK8XvP@p{-6O`!&h-(=$mIaKmIVEa1w25d_6}K-{sw9 zr%F1E9SV149WFU}`2*1%Gg-nYnwlic{*KcCEe#8kphSdqh)h#*XE_h>3V`AQ31-RR zNO8Vi2;REq6gMli^^}AM7MD;J4RdMsH)4sK66=oKN{(+oh8+X1d#di<7E@0c+3ebL zG%?Sc|E)+x{CkK7XKI=0rpcIHg6}M!fGCXltdZYXAR9Gx3zTi-EA)JU;Wd^|7|J2A zz~(|(t+l#e`_q4%yOGOQjYU@t_E$D%M^SmbU7(=}rYUV%GNcyYVT3yBJX)C8uO#d; zKG$B{ZN-Uu=;EM}YN7gfA!_gdr3Lssw{R3<6-$tn)G@|KXogJ}YgvoZJt%(bT`_!g zUMth1(uq}omb+Y_gIZePJC<5Qgj8!3TjIk+FTX9qNox>FMGca+D|=yOvHh?Cw_Dy` z>Ql6{`S~y;90|J;cut|>m2x`3uy%9X0&C169qqQT&-Cpu@xV*do=AOOo0#FZg4TZ< zV~~QsTIJ{+{2Es~qcl!ys;;XaDD_WpVdehP6pKGy5xOjJ6&-(A@HcI_`EVb=`4~-h zdHa>EfOZkK5;(Fr^ z+AsJziy4*pQc7FipYq)*wH2N!O5YQN4;OF-h&IYzF>(UooM!PbZwS*E@peeu$Lf45 z3Jn{kFT;kH&TYX#BUI4FjQwU`b2fn-R1qLCJ?MhXuMxYBsfEF$NT6CP<_Q+iMddi) z{!S3`SruCz9m1%v%=~wnnG?rPx({BYjIt>+3@zjn{Ol|TZUJI_P>lg&EF=A|tU3D{AP!(Z%&Pt~KVS84-PU&KNzWEg^e(Q1j?$`jD-Z)e+E8{d*hdz&@sy=qnYBl`AL5)!cHtM)y# znY;ya@D5~^y&}-t7~sg1#G9XgR`NLGSMKubOH02OhV|h_tqul9;wEbRK~yy?DaS6i{?JbrS9TAwn=tzV;JvXh!|xP@9Ra=oPbxx7~dOL z&!Y#lTYR@Km7>YP6+Gz-V0zNnKnQ}lJ|8@mZHTMH_jBCFLR#`!BsOhuCYW~Zl;INK zzU%jB{OG7^&k!-^u9fbJm``^&Iig&_kJ*n>qPQq42c=Oy?^;R>N z&0020r_SZEoO^F|Mfl}lU(f+vmA4@=k7CSZg9KR4w;BEwyDsm0&7p5(rTgG$uwo@c z;UDwfuoPAc1pDa+HQsL(cyoV;iNN{045;0&XpJ~*?qU7+>8|TiC-lQjc#3CzFIZ2`Lche%{v5P~pV?}9u zyq&CKApawEuSHh4oQjU%!@A*~=@Qm+e@y?}k^3pXvQ~p)HzacACcV#Qg|(SpnYXp9og2@F z5;m5?1`?O9uLb3rPB1$vmOSdSTeId=8A*DJ(T|+BS@vOOynP?-5B@f_Jmp6sTBgZ> zzWBLv=cR8cOkSZDEH~BW^$CM^F<@&~UIPxtz4_~AmfC2f9rhut45c$x?30(t_NEJ0 zj$HF_$T(w$H|gNtwT`daz8A)D&ugFLvgPF7cxsvjPhqJf0B#pxc-NV57>Pl3^6U|X zqq5`|PxkAbFmFCC^82YS$G#WRnq}U_p;NjuE#`72rZ|_u!!UwLowhrtU z^+&>b1j}7ah3V&G z{DUi;)-_~H@nmpz$eDlQO*DU)88X@Siu!$3SHazLxz2#H|B>aU$y7)5+~ag3Yp9{v z6i}sixlo@)9y4aiJxwCJiJoeI>CSO!MXq;aIIZ6})Fh(F>o=jT3XXNYw5jAD5_Nj8 z^cV`Vy>rJ9V*_v$IBexUbpCmmH;HFI7*$pz&Mnbj;0fAc<83ReDt2s-i z3F$xg@FUt&*H^+QEg%(T&-ZO9C7T10HNd(wp*(qC*5AC5n+jSwP!XiEqOQTwjd?_T z=kH_Y@07p>iNd67C*HVC5YcuUWMZj%qMIobTVT|HKh4-mzBZ){b!wXw#knBrv(&1~ zE+O95_Vh_{-lB4AnD~kJAQd3;8v{V}{MRj5QKRuo71&~~`!xai&R>9}CuXuLeN8?H zv}a@tycpmhH0mi|O>shTLQ+w1^I!fPpdWc*2C1CML_)1&@7-Q{ z_&c+;WrWOqXfv%ab90ye?_u=kcjF431=|G=?BJPn(pvK?gr4GWXr>s}r;EhCA`|@#c$+7HN z;A8Nwt4L|fdt1OX;D6-)hYTsW>iPNkV)yW`t&-%h40RuT9^=)d3|~2gzrZi0IpZsz za*c-R{mScyIMaDr;wng8Qj?#hb}dnb*Oznr0*D6hdT52^Gm{u7$!Y7k5=92D?%DHg z6a$C| zoQ#tker~&w{bgoz?~EfSm9b)}emj`Y^XB~8T!+VsmVB3I3=VQlab{%(J~U}QPRB~W z>&29L*49LH8I-U?ivlmC!C$Twg;S|!3}dY+&y)(1dhBSWM9fJoo_)lihy4;%o}b71 zCyV@?mG}G+&S<$Y;&N{>==zi6?P3QpWV70D_8)dT`f;emy8vfVMf}?!e;`rVv#+cXEE3_GMD+ zd)L}fy8BkQitJdbwQB6_pNUp--Sd?JitrX7Sw)8&%ayKFvZlECNRF1%_3IAR#7`nY zIq9P~?ipG{gkyShZs{G!XGOmiz_(^A330HPh$6?Z-hGn(Sn&{PEcG%U38y@o{PnsaQ z>cPpY(X%db>nj?c$DO3WQJ~#o$;xSV&5mE2i>EkJ=VLD}=edgp04}X-s{~S5BWN*X z2GJG^+7gN`w4V^n!kEqRYE#7VbYq7N{i|>C0(8ATiio`VDGyU6!F*3@L6A zOVRDibB~V$`7{S&(m}b(x~J!)vdj#zk=%{G@F!LIw<{r9lad57LysTOjE<4{I-;fOBg$5RB3drX=1zDH9u2ckw$ev zL$XUU;9y&4K3&K2w3QZL0L(!x(wvmp-AAfovV$sPvhN8xZ38LBGr^k-T@&IFKV!wk z{?h^=0#}_s$d+>_?y5jV-5by5KVa8hh3~pNj`L&^O@+xW6Uo%I8{xUQ|0Vg8i&ABD zxvgkAox>{3KRXHA+ce8~;>6bVhQLV9JPtdy-`gR zkKW>tpg2|j531)>?f0v!$)4Y9j)?7+?Yb5sXJL zbo8MCouysi*|T2WOB0oDRlMHOOSx%2g+8cz^z{;)$AM7!aa~zGo{s}8SK?*OffyRB z;wF1DH;nDtKek7*HoLv63}-`GwXzTk;y~-6pVsvH@bglf?&`=Qo_!gPt&|T^RqDcb z2Uf%uCj)5z4;|ka9$DKh{UkH7Jz>YTZA@(2wmlP@9ox2T+qP}%%k!T1oPS^a?!K9@Qrklu6fksvPN;}df=7y-jq_d>(W@k zjI`qWh!IaC)p=m!^4Odj`-4&Kb(Ae1o+q{v?y+%OWa6vF6p-=l)b^bl6#H(2$Noabw){={ZX>ifL>+G zk~((9BMg@b& zIC_!DOcG@d_kcxtWM1LjDqS+RJKREv-rx`jmea<9%O15js6v0z=;G(RbWNmi)sIu9 zRqx0;45ntE;b=c8SKa*I&>4tp<{t zHr9Ggv+i`9iHdxKc@}{J(^s-n{%;n^EJ32q)n%yg0+-AOm(+N0l#jnYYwyHwDRcVM zN!6ER#+Dqa*u2e+7{TNzyN3&p8M`fRMmb&nAoEDVNvP1OR788zIS zOrG&Xp%>#NH(=2wLOT*%Dw!n_@+CI$MOEwLFP%(^Tib!0g-7S-O57$AG`$hdPVmki zxpwP-*saWwPBkX`4_l9HR~PcpLaLE9C);hYOBV4i$b z@0N1R#EO_H7rRdr)w2UJgfXVoKRS5)C~+lIL)-MmylA>eR$>%{RQ4qi#-7w%-uNsk zs|)6UYof^aKnZ>lcetI1b6R-TvKMwW$>)WmqpcDKP%#$MNoT?3Yw?)cQ#^Q?pRP0F zTK42{CqU`Zz{f*6o+qTv;gJ*(G0ykT4xMmMt=i9ePM)hq^1e12L73n*Xmfhc_kO52 zMFsQu;sKbbNwFfB+_$2$UmG`}Q;!b-%=H^oo!6i6HklLo3r{6loUlp~m%7oSB;@%T zKLsQ$3@AATNw#1L63{FX0^5sD>Gc_p;(}S6!?lm1(?z_p=z;RuxW#s#mNElB?}7_y z_*zXIAG#GpCwN5kZs@Jh7W0X93AE+VArU2bQZUVp{wgKmlgkyCS35ot&Eo=%DQEKq zHL*B&w}#G9xl)~yC(gx{@xM_0HJWmEcJbli%7f}eBL%I)>vYL=On$JU4I#-lQGNaq zI?M4oEZ#r6(0p;;caxZSjv!5Fx0@w*V_eEJ0yWKxrA-xpuqeRAG7tX&zt~tz;|JW` zG?*meV1OHalhjOLRVhX_amX^SDW<7ubnN3A1{92hg(-T@ttltP+T`Z$oP&>g>Qml@dOq+RLCLb{*IDS+bR#Y0 z=zTtUqe;m#S1qn&`1KGceF;W0c@N0>rnCeVf*{c^dh;6Nu+XHw4`@E%)x7p6Tg+M3R2k#-W?jWhuGVkcIL*{+J)h$Kc*8mEKuA z_y>I;6J^oplf|7O__^iEXfjwSxBLT_bsQjD+6UWde);sQ*6<^A;JS8|1CAj+|BL8uIG$#vTK^~O8h!ub{} z4EXnUwA4A{MW|-Y*o(mgD83ET6UhMcyc0Ev$Hn;A*cVTtLl5r*ae9VcAi2~2!HKxU zBmo77>T6b78Pzz}TkUuaG~(^=sJ76@(1xeWfmrK<5LFrKwk15m${o(bah?8j%q+Rt z^wCHs|9O6f*+lYxc>0;}QS;7_J6B`0s!5L!seCksDA)ia#3KzOn#r`6#+o{`llrmD zR(S>ot}qPs=6{QNhYK<+pLw<=eGt!5S(3ov)wLw4iX~%CYq@9cXMd{D8_XTTbY^sf zsLyp8s1;$k@hypwKo`W;?`sl=g{Pi+Jt=d|l1lGCQCHtl|5eQAAC75J02KN1hGsrU z?#Q{-i+vD`r+-iZ)@Y4x8t;zFEfvb29R{U0l-x|{>MXwK)@?WObh}sBBHL1mLXp^v z&-ESW#V?mRcK*oObp{MwP-5=%{@CL-$s|{cPe7M-D8yZ$ETsn)cPHDTGnhVdlSZA2 zC}#x&1a(_wbo&q8afesgBQor7=cw8Prr$4_t<)00BTuh)!uE~}ylraS&y83!LPU$ zt52E14&pnttx`V|Pk3bRx|X)Arx3vogn=*7#Pns~JBh4WQ};Syq+LXEvO^P6KuvGk zo70qZWYFuhJ^kNhf}`qkar0U@5KwJz0<`x4u;WknY23$3p8X$=O$ z;=SBv#Nc>@qvzttMCPk8m_g>bt>OPPL~C@JJ}~~_LZJIZJ((^0$duELh5cq1^y${F zx0d-5psB6jQ!`Ka=Iidw*2!aqHmWHmN2`gDyYeb;Sx`UJ_*YV!z`PE)C|-J*rZTc`TiYImne%A-X_M0}0Q zqd9hL*vHQNbkmUXs29KKZ%Nqs@Uh+DD8gy55Sz6ar;p0_K(x}lZecO|{u}^M24y+0 zZ2KC^z^b*{wFk6q-ct+3*EZ>a=&;h|rd?HFq{ECXF1e-<*8xV&R^~FbbHQz0NPTRj zD%QCWNAg;X)}B2EXlUlIiD7UeCAAQI_gZQ>a z@7BC8D`UFssJ5UfK9I!@9t6p7?8`*=AsvU*H7G@Z*;8Y6F?~9i2X{d-q;AeU{q=yX5ztKA;aKnM zC6ILTO;DcUtyh(L2BF zPmy=}F!?K_xZRq*QFSQ5D+cY2g_mSU0r0VsCiM#19I*zrq5 zXrj=~Z!3|=t_D9ZZHvG7K9&HNgE57+@~f_fA;xcfK>?u;%F^_dE3|O=0DMlI6+oyD z0+TvSY;4WITg7ap_RL6O_V4xP3kW|CY9Rsrvn~u9$UhV!lWH4EXcP$(CU$mlWnLwUd&xwNt*FZE7A$i89enk4=vfw^rwMa(Dw0R`DRDFi8MH$X(e%qRKF2#uk_;i^4NlCmLha>j79fI1C&s( zbAC=MUTYSX<3$s;8E=|Q5d|Mgygt5ML7$P?&{Lm9EbpFaC0XKjFac3!@g5#4NYC?I zOCE8k^PbAy$0T%Obcsgw3NV^=DsgfTeRoIay6}cuEul&km(=q&y9?cK7vf)z!*XKN zZHh!LTj`_u8UAW(qu7@;dv}tcEM#znDz9wkD#iW$o9Cae%&~o++j*Tih;?C~8|V%m zS~Tlc+~g-KK!Lut*}ej*%{DgroxeXig1iLrrJHNo$>fvvh94yjCNPFdo+iW#>(S}< zA-#f{j8`Hu)K2RMMtY)acPgIU?&T~b!j#!kRW!x4w9rkCxEU3&nH&YmeC6D15#Dji z?UK2IKfHbNYrK)MmwbkzRV{1o!4%z#RDDJpb`?t=j`LzhP5@%JpSvi<>ynHXi%ab& zpY4%3B#*@M;&5gF74r1_j~+Jv*BXXRtgh6o+qrTZR5}x(`Bge|9czk3j?DHtHI&f_Ro3jaJ&SZH*aWPOQFoo}iOk!LTNXn*vSGP zTi5(I$v3k|*_GiV!c}tZvAObxJ`y;j3Qz8%=?l#Yl8sU{?NY{anvLGD%|qo#0?qZb+&QAmcdmDivXzZEOhGQw{ zes}be-9h6M}C?B6I&m#RA-q9 z7kt8c%7Oy6B6wF>&-6&q2;te5Uc9LEi_qXD=Swu-=+feur>x#zX%zKUh+!>Y-`x=<%WB8T{pE;4uhvs^^a7r+d#+~|mv~ZrRJvd1ltA?Q z8;<1#EAb+9%NM6x1qF>rlFzrSkva>JtXGz1MlQ_wE@U*(dJfQ}qsH7>ZW@z3bpM65 zdqmHIx*VV`38i?|oR-pLLNP$D(GK)C{`eGH2M0z4L2P?_(7n}zT)?zkfs;t%6^8_& zb zWAm+QSer=^mM2gym7wd(C*`c?!e+TreP7bIMv)BfAYD?pBd?;Y=TgOKMGz>|$RJtl>5&ju{andh2&dg57v>5X-uh%QH>l59{IG|= z@!o`(FMR0R!*a(!8Xr1aK$!mySX`tFlOZA^y6fuB;)-@Od!voY30O@ZoOs63 zc);Tqrr@)1DG@pfOnc6r=Q({Uqr$qRH{54eNe!;m*S4l!U3=$#7P>4tB0S{|AiH2@ znS9o`to{mK@p8(AA6uH}m&qEq9Qm=5QYmsTrC8<=D*iihyq(xF^ZZUL1g5Z|izl_s zWZWd&NWpw`VraAubmMR$KU4H?WE~3aByTgfW8}R%C-Cv$_O$~h86Ht8@(&=%{CeYDaQs`Vw!^J^fl+gt1tl?eJ||2VSd&m`+R_S<5Y>B(g>q8T{E}63HIq-E!J8 zkON@jq$yWB=0X|8R2lV0g;8r%fLC7xIr}wSviz`3`shOV8f)^MYf6Ll6p@h)G*Psf zZuoXRM#NLeL}0s!-YgO5H13?*`n32w8gvnR@F5DdVBlZu?S|iZ(c>R91V{7mRt6)F&D7dPgo2}KjIcg~x zEUNDsX%Zo4cJ`_G9g+Kw!^5gEEI0>GM#T6Rqu`)N=ej$@S56y8yE|DL>$!1XW!<=q zT_W6AlLRjkK||VZ`;O&d`fZUSX1;*6jRSOwyG*mE+x8jaSV8gH`fMmeCbiid)9^wl zK_}dPzEKWa8vQ{*Ok7^?Sl^GTKTefd(Yppw>a%~;(rl`|HyBki+C-h4Q13*2yQ>x` z75irJG_5(!%|r83@asK{afE2?$R&st&h#$AIx0?E%1q}E4~|Ppg__p;c+M4jeKI`1gnw zQ_6;JrP^o)xohX@hNVE;*O+Q6QU`RU_2aeK2A$BOr3l%W{9#Kr`7K-$e5U-$>x?cmX2jEAc~f&wM8~GF2CC4x=Crwp`eyq+_&T0WB49a z?N1hAeCx~In|QA}nvy}Q2yxqzK7Zeo5$vpHu33W8bf)AM{!s0p2zE;7^uhh5P+k`cqi*OAR#q+2 za`Re_N-H7`UPyv0Md~A7@1G4GGYwlj7h7eLTnj)@bKCEkhVpP%qjJ);j5?3HZ3Udy zKQ`~}`qj)Z>7}>%ZZ8IAwLO#$pDhG&p(vpA!NQpN`v@F=q#4&QYM613f zNmC>l@EHN5faevWQzDC~jfs4aiI?m(8DQhz2p!h|yuM)jnl=8@r8lhLCQB6gG6a9W zjQr2mq$qsq;RI7{fpQ!#3Y{Ecyg=IrMqB4>&n52jRp&xI_-`)5h-CD(8h#>C!gd3( zS+SBaDV>N zRLYcnhYmD>7`@l--F?!^Cs(T^>7_`yc#BBPL$08D7qy+D0M@)hU_l?ekHqz4sM~8Y zKTr*AUp?LkpixoWrbOn!z+1q95nj;Pte1&Thz<~2#{~33V3c`9$yoJ(-prZb6n-WH zQa0*9r^0*mFgX5RbS0Q5?ddpa=v2!fo~3gk$^Xr*(7+qWxrjJv2Luj;foIunk4^4~ zB$E8wot^~v2@0E=efC5rbNa+^!5=SZNdECeyS=-6ao&=_VzCPH?>h??^FVaWsxy_n zm3f=IjU*ttW7A)FeRy{Bm@XC&QkYXvZ!(9ua&d!@eIjhn8%L+Gm6eB#<46#cpj0D1 z^t!#BATPhDroxGUj$WS&qnzf?T!gg1KDVBqy0D$MWJvxw@AA0JEkUf&{4s(Hr*RwM z$K2ewxU5(3>IxSSuRc$auK6P`d1hI)RE8dVc#1Bhv}k@=G24!!G|8mi{Uwe+x2B2a zm$1hDekiMs3f6gr^4IHoJG>uMg^I3R<*}#19cP~^(JJ>3zgaBLH4L|5zTV!_r*@9b z8~VD{;IBQYYQ*thw|5L-7)sXR9TVZ5Dd^PbBqH7l6EE)j;T8meERS?ygk))dQv*DAoD-*FzKj#jVPtjrwSG6F5_)#xbAlGkNnWJkoeEwKeg;g~&e>p|LVklXp({A&bbUm8)mdUwxoKTYtP z!~>*zQx?j(3bL6NKo9@zOqn1B)-YM=;2l%du*XxvCb5P zF!RFg^?f2UfvultUhHV>H(tmT^|w{vVS#izW8@3QB%W>W-fLvvbxCxm%bydI%hA~g zPRvCm^!h~_B46L{@Ch$`l{#t)@EM7n7ry+e$%;Qhp^xj|G$&Gj(bUoxPW}SFNndGB zm|L353U|0urO(GTd0A#S5Ba=m(E9gs{)58;avdhvs${QeQNyP&aY)^WVgaPFmorG5 zjFk*L90^kdFc0`}5yfnAj~OLCrg)d=G$0*|)2%*l9zCgSgn_ z-;FpF>i>5+wtw(LKrF_;+Ud^?-1-taEU#yRxZ?iFN6cmSH6iQT@cuwHWW5|hWe+an zI-DLKLaES;uJZ>4@!ia*OWdjO&w_DR{}ZvYUmN;0|mc-~Y1!dqeZaN$S zXrX!($iX-K!uxFY$-DuES_|3eGo|G!y)aGd88Y8U1C_xpt@qu{3fH}xz%S1WWP-{<)7S2e813DZ-* z%7C{P#JrhoRO#x%Prm|VR}H26M8WTz*mM{aSDigInt-}0n+#s_u=9qu#)H4OZgf%X z5n7?|JwccD0%0*0(_@nTydwqs#P?cmM;iH&?t{o>zI=oxDw>_)CuQi>j5OhL86f1t z@=BY2R!hcA#u6gU&l&4ght>o+@tVV_D!^EC)|7!fJL1d%Q|F~Rg5@p;vn$zXTole) zL!jfSsMK>Y=##1l3TrK!&XUj3ZKx3{0o3@X4O{1h7^ABm4Bkm5?ZmD>lx9nbD$>oS z-0AulNwqCo>1#(QB=Nr${U6*V2RADI+paUFGt#wnIc$f+5m7KX**UvzKVQcctv)CJ z=B#BR@(Nq^gt0x|Fm2}2Ew@XEsTWE#tzsi|D7}wC{W46Pw}2Rs=m_r%P{}a@Z-3JIMHFjV()4< z$nX!9v0%HsJ!G!d3v#pOP>tm}=;XRqFlD4=paol(HJ*<0Fk!%E)k( zE>rfqNmLt`YtrsH1g`u2(`-vXaRea6(&N|mZqP!_7b2RiCQ&%=H5B)|Fce{shhwlp3<%b8VFNGy&O!6qPO zMxKa-<{UdePmGhHHGTG=5X#ER8t30y7ml4krJS&MVv|M8`9hP5fyqABJ)&N>;@E(+ zrTZL9YB0qMonzg=gLAbS8-;ZFyc#@HzV=h}@h-=4`kz$a#?1PfJNK>wkGRj`iE;!k zgE5{*Bi{K-wLSTAVk|z(+FAH&gIg%9$(C_8X#k84h9O<7S1D~>u&byL>RBRA-g1A2 z6yB?p%hSALdRsHx)ss&=I?>igvaMs6!Rt2S;%e8#(3o$&H+h_HsDQ2HO%nuzxf6;R z%J_FZb0l)d9B!hWFd6b>29`L7<5mr~lXS(;4f+6gdkYqQ}iy#fBs4TBJG<~JF1m`s>sPUk z7{a=h;|#`$T88931=p#PxhlR_2zygri#9J?F7oig+V+8R;^BjLzBDHp8>Jg`+?|_) z3u{ZO5ngMoT3Hr1jf9c~4adpNvGc^Q<@*t9bc1-NO!h|NK6t4?7e|;;RfMBC-FU!7 ziqioo20U;(13nN7FmzjwSCe?aM9Nt0!>HS2(F61r{{!>5sLyPvrL#&SJ1sYe>69DS zKNcoAmMY)jfmy0j)n9J8bPeO$2aaMw@aI*!RFOO_8;wa$lA;*Q;jWwlQ!XBSASN*b z)SKMeTHxM2x)Vq6E$HF9GuvC9aLzl~4Xoz-#(&q|oh`x9CTpSVCvbzoR~nzS(8k!| z?$ztf^V0WNFu!&$K1V9cGvr=%S@XZW1`Y)&3<~mUvn}v@T7y8x(b2KR(fCMeMWN&+A(BHq_%3s%r zi?l***oibk#X`6W*|dn*W@zX}uCOkDD9&o$P`=aL#VF+qj8UdMM|FUHR24Q)@L*S| zSV`(tyK}(}o~%R7thvz&G|MGx>ciJQ>VBn(z2yV3sV>v!cb)HB1YIZAXivK-e8_85 zqi*GXSSMBnnUBEOb?%)tAnTpiP}G|EuAwS63LE0dVR!t8c#JRdUI&^}nNkWZpAO~g z^tm^zrAh`Zj4S~}$yHpL3{fotKgJXy}vg3oUh9oU+l@tgNqO z((Nu2iqx6x67Nk1C8#2n=1?MqTOnl-5~g}6@7*Vmce_a?GGG3n_o%{)*pOA2KoJNdAMw0w9qD#(J@D{v;D4lSqK|JwOIVEu1VD{N#%)9yq39=qKw(0<=Z@ z2RAx!&iy_70BynG$*dX6EwC2r#2idT6J+m_Yg&Y2}E+9@Sx$q)DR|OjHgXY z$H4^yH%7m8tR0!d5~%^#7Nt~QadCTACdyyE`d;s6QgZI-tFxcU3P6pF{&UaK7?ESkVaI+P<0C&Bb zC^-Gzsy+}7O^VZjsewF#Q{ifZNE}z7qX|pCDhL;f%?2gIG&X>|W7#AlHn@+ur<{z9 z3Bw;BnnA;X$pHoo4MfNWonys3#IY}ulXAt=3%+b>NZfjb+mpMkHjaL6I3>*ZlLda~ z;d^x6p;MPWE$9`8`LQCIoL2Tk8qBsJKSfF$^{Rr{0fvTEdQ~Y`=3{V2NUQ}29PJ}t za#t4zn-Y?E&3jX;s2$pv!VWg|Ygq|=wtw&av54!T0m{+wsX1-}Ce!HytdviR)3Km7 z$;U_K}53ObFT{0gzEh9do*gWe|TwM3X|%8^_1UO$VoosT4uu zw0qgPHXW@vmA`o4+N(}EI_<&w&=?52>0hWk;_^xt#!#5ElE7jr;6j~5FY2+Pvvwzo zdkGS*1d@^P5k)=sD`hhMVJV0wZ)Bpl2>o09XGBgeih(ZSIe?kbp|%E67A9DuA`=4) zJIOuH%|+^Ds@vXkm^NXcp*h%eqBlj|f7xR!31Q&PH-apDNXmHPpeQh={0`>DltRa2IQCL%>ndTK&QJaDnX_k9s7m4XS-7~@ zy=$A|%G^>M_b=W16eZ8+#;;aq`1C>U*D1%alLfL$KD zswBd^)`x54BIma&ob7g}u7qfOII1(uiQ~=cl+MGXyjNktZ1ccczy&6wEVu=NZ7Z-7 zSX`Wk>V_O2fM7lS^Zvd;ejJL0@rB>Mjw@&2ulf5Qbb(+6w9(=g$&j<@EK#ltL_sVD z+c52r)#lwj%jn4}*bWHiy?IZ63KRyMB$Ecn z$YcH@L~Qfw9pc87iJe&Cl6se3u5kG%G#n09b?5VmK=9v=K{r7W1+f@ zu@Qmk0Y4q6VNRH)Ll4Hj;Fq&?rnH{Br1 z#-7mLy{YI;a)_0~Qoe6xOb(iB+X+ndKnX3|5B>Bp$Kn3Pzb1+iLd6ks^YNxQy88RR z6vXMJ0h}ulj&vXJEBT`>&-;WBm0qZ$|4{(-twJkZe*~#z0`j9J9A?GtJpt&_FOX zyDk~b+r&Y?4LQK7rh6Qw_xxLXD|)NTJozg=&3h`;9%Jm@tYej=c9a(c9pu%a=cT5q z66Yi(Xi|yKGGm6??;E{F&CMxuUNsNnD4+|l@m}6Ks%n-AS$PSSqp9wyCVQButQhA@ z(p{`Tfydz_Z{Qo5@2N;K%5M1o5bKony3~#@RTR}6h;&1`++~(; z=WGZROLro!%^Ms919{ti-b~cAs?+3Lg**uEGF?dUHvRsk+~rSiK4_NXU2xg^Dt1-G zyfZ}W9C(Q`2ovx5h&C9pLTdyAzVlRrB)AW82X+G&>tPi&T{eYGAcPnIVc7;{gHpXVi7lw*RT|@SZ%EL-XQclf=}1d_azaX-_z91_8*gevPip=C~fdrnL8waccz z|3L2@eKxh2T%mx4E1{O+kb7P~nG0MyiiR|$)kQL>g`2%=@Kut`kzerX1+VD@>j=!b zQ-Q`{`ot^x-r98dg|1Pd@_Xtx3L_KK=WLc+1b!sdB1{*6hxB7|d>omQ?HqWw%8Sot zqcfoAR=1LPo^EBc+5V_8wCef1cSQB+zIz{$()7KVdG+w(z1b7G0J@<8t+cne89D)r z%Cf;IyiiF~-?)G>Lb{ya*f>zbL0C1rwo$OcW0#r34Fh;_*ekRVtw6*%+m<6w4#P~P z(B@^Q#Bbxm&Dm$SS+aL8g`l*|d+JXo6CF1iet~@EH7{3gRSqaA15YpD?GP8((i$PnlyMM(gSk@t$)aW;tty)Hsriufd67BM7$h*vYNQbxERxagm~~ z2diWGNj(k!p3h+^k>|18Qwk|Gw*^IG#o=;N)~NBZXVxD8rJyYsm)E=6jfkB6EmMh$ zCe+Gkp=8-!a8$t#5+%dV`7F0Cv@RAnx(VXB)>|ZH?%z>|E82mzwVPnJFrUFU;DRgO zJJaW9xz1BhUhO_ZM7STHa3JvEqFtiA#|l%JPOau^#L73=ELZpS#;nvIABFYTNaku< zeq5$6kO<=CJ0-0kQ@PVz3_0ppU=!*SajFcFd?yhbQWcq@#z%JBYA$|c|1(2 zvlKk_rs6G7tDHhOvZ#+9Kg?S*(X-ux#>9s+sS{M*B9kZ*Z-myY9*3^`5;SJ> z-EG^nhP=9QHrxHabvBnJl|J=$1caNxfK?-}rj`P67B}6#es){0fQ)B{Fq{-tUlE8` z&$sbN)i0aKo$AEdvLN?OZzrNbF_bK$GCJZwD*DO4eGs;85h~BO0Zzc zirMU}hiB-sWT>LHgR>I)k2#N7IdkBlRZFr`R5SYu+AGYl{K|5+ye7T+Z4D$zDEW<= z!kv?2ALj$_iozx-S|e+t>~kqFSNq7V@Y6k&ag_K{#e57BTm9XQNWqoyVvjDQiY1%} z<8-^2r)S@V=Vg&GjiG`FrZT6FNJ60Rp3*=7O6)zdbB3uL!TCci;ZD6Dihr`vj&U=+CIp-r(`BK>l^D#_PV; z_-N=h9~%T!AqzPLR4+xQnLU~6W`ZjWjVLbZniSW3&+Gll8=xy|TuKhrD#sI4FPAdm z7S2#F0h7Ect+=q;-@+TH7a<@-wVD(+{HiGd84XI$U@*P;3KWT}I3ou9%vHutxq4vR zCu>`0#yIy7fSrsNKsLp|IO`7#NcTOdu8=zxm;KQ-xM99d`4?fWK~F{n(bjhpPjgnB z3B6tjmSATa(pc1LzrUm`o!33|!;+6o!HZ8K>bkIZ8ws7-52|iJ%T0zl84LvG+p>6< zhZ<9Frp>8#;VGiSCCaf9dKacClJB-+3&SC4f|8{89O*lgIR<<>9RQ|S+#QRO|w z7Su4~J4}w5_}ISE*`{*~pA^Or3KkwYQ-G1}?hjC4sUM^g!;^cCt#xST{BMsmgvBjW zg{c&vGqsvEgHb%9Zx(g@ANe$i^$T_fJaHx!UpM!=mX}pG|Oh!23+($N_jhQ?9U2~oB=V# zCtgjBxoq$|oVgI2F&nxlnxVNk#LD|=mBBCp%Lz!Rd!R>k$mV^em;aS$BVm<(0J)9h zrzpm&w;X0tg!H{7Ya*wq;;$uRdZ8$%oC!o2>2}(>qjD~3-b;yL#|6(Bi+9FP9QHr5 zTX?@enxGlEH~75&IgReuR%(U3!FheK1ea@4(5gBsLxV*N~k&glWvknbJ*+QO|@t+x*u{dKLGi?E);I7vUa!97qNk z!lI$@PL^9h{xq=(fs$*ITmhE%^6o{Nh}#FsT^i|@;+razzl1N;MU`uc9mYJRixrVC zi|V<#HoNmCIDmvQ!4s2)VnlW5t~Q7jpHFb{%7f!+6MApTr0y;U$VC$vUS&%p%$+es zkO<+9Aku(gQDvxVFsdnh!M;B8&04C2cIa1pwQ{IZjriIfUbjRuk-%q|^YGT;4v3rm zR;4`c3cZn`Fj`rv8~M?eHR--9*bUQ~n?j|Oa!278 zqnHF+i65sAou`Zr8LLe8$dcrV;sl&!JV+o3u-4fE`4n5!s2PCKXhpy|_?HzhzI(U$ zDU!u2{ma(*G~%^e;c>l{3aVi+y9txkmH2=q+d(1LP=@UA6%Nk`oWbdm5M0UOO}Fbm z8Cj5i`>qiy4`YrU0#MLKEX~~9s_p&b-@oM$J-m6x7Oj}b`^nXU;Q`LSmYbULSKQEq zkM8D7WfWQzl&!3F`E-RPEEtpRFG3sk}c z?SGsnoe-I#cn2*CG~WqFp>d9b)7`<+2W-geyF8tY)$e20O!dbfEsoQ+f8EJ1#3xs8 z!7C4fa@Vi8$%P-rJ3{};t%qG9#{rdIJY-G+h|@=w1z)y)$K$k#|B<)vwt7Z;er%Oq zF?KXSAXfD>f10^67}K?iU-0wi6`jjYMzO4i%SGP6WC-g^rh+h#tk>?iSks_M&0ZDPt9R7%vY?bn5P} zpf6MCdhHXdp}KcxGq~&CsPT*`LcvdWdw#g$AL>CvEY_Zr|pI?X)ZQ< zPoA=P*87K*;#Lo(Vq8hP?0o0$<2H}PV0Say`pp|JfizEHmH$=2|MTZeR6`yvp?v>B zvC!QD5YFZ|s-(|MttZ65V@HFT*v#vI52bEIUP~R&yIVNo z+(A+@ye=ESH17*^n=0=9PG;df4|S$@TG)ie4zOxaE1BnfGG}amu=#eTNl1P}VrRT3 z?biC=jKlxn&Q^4sgiuXq4oX|Y&!7Iw@viY%3Wg5 zip9mqG;8O4m+jGzN=GA>S3e|{B*-A~ib26YI-fdfcQVf@*P*hbWLrNegYUdv9?{J$xWC97|ccCMg zg?6AycZyN?d0$ME7UVhI_0PPDtf)@x7v|@xa_#O~4Ant(OuSk#&OI!9xEnm#jy`7C zpW)PKxC#;p**znqS-K#jQ3J-Z{d;IG_jz6H9^pT%Uv zPc&H0#NiW}C^gm82;|ND_T9Y-KEoqaqt2e+{yq+xX+Q2vJ)bX=-~`o+{te{@k`I$Y zSb9YHhKGBaGUhDNPdYvSxg5BtVX+v&IKOU0ZuWhLZF^eZ?Ryv_X0isRQ%0!t(ILXVo$Me!NerVkzMu=~k!Km-5V`;V7>rO`O8O za`)uw<+`HhT*7nUltxqmpoK5_bqkcJ#TOSLf)C$7`7&YYcq_0`N}hUr^_d% zFur4pDgX83@rb)k1fT4X5TlZq2cVaS=;#8AK|2&f)YbjjM~vjn9Y(xy*KmBLLwKsN z4pSK$7~zS*?xBa>=4xyB^trb_?DjIi$g`|leRXMl&f}CkHUjpBU1!kjc1iy>VBLjB zk`vPS@ALVNi$tW~@tu93uK%f`qGCHw0|5acC=~wf5>rzBpkNSFf9lg3M|#w2A6k6j zGgLJujMrERbBy079*7r4SMccL1Tc`(#XR{s8n2ePEQe=B-lHdj_I=Ckqy~(8eJ~F zmPs(x>DzFQr4$^sR916v4X(l2sq?`|N0g*F6kTgOk>u4y6uC&1_fl%J(~*fb(CKZu z%;`_Xs}sLp9i*96Q8XhcgowgZ?P*5f~RQIr^`wgQPR}Q!>I24cjxz zU_gSqAm_QvtU=>D5JRrXdYcec??Nlt(TKL<=0yP$9inTBK#9QDU#PPa=(#LctL~X9 zCxgt2|HnpG_Nc#Qw_UY-8?5TF^miSezS@cOPt}T%O z&Jgn7eaP^aOZBsjJ*E0(EQVvq{k3Sb{^4a{#(wh>0rxO2i;2RO&XH6r*94U(il+^3 z+E;UQwo|UwSS2&8b0R6yWqL<6V>5APBmDBpTCM^{#QvSl)xnW=61}0A-o;_NVoNe} zUPJ|3&ZYYMA8aeIqtnW$y+S=S`^7LB9C6GSTIZ%%m`*2tM4R{6v~yb0_wLS@@jf4) zKHe$(e*dxz@0K(OkEzvWO<1iG;KYken@KdYD_s)Svy9Z2`H_dc_2jYirHY!x3t9-kzlvPK7ji4bW! zZ14se8n~c|meBsq;qFPYv<=OwoX5v(Cn)Up-c3@uTIsQa-V^NO_1V%xUuWMbR4ZQV(}`#I;lRo~z1M_*N4-Fx?5 zYwfj#wYhvY5_!OUnJtGT;zCMBHBW%pqkS2zO0kY8<9*{dq4x<0foQY9rMvZd$xCo> z9Jml1dA_dZy+{Edn=kmZUTW6UTQSD&5Q+sUP-ycUK;(hxdb z-NN&wpKPh#?brO`awY&%Q>w*OXg?m2`Ti7^(p0~9DlDc8tLekEmHKLB3=|~#fd;oW zR4|%8>+AEWSRP@nLZ7MS>G|m|51e5sm^ zCsv02jw#;;jL}HFm~NMu+b0MT{WHLLA)zkLA&reGqEPW zk>8SIJeQ<4>7qYm_#zEpa>UbKz*op*VDg(|E}_q!t|VSb+o^{tnTvcY>*RfwLVupt zYFIeXd{{aGc=Uy#!enLiL@5i{8@M1)Zf3D^HyQtQ)HF01)FpXZ?d3Y`h~c)CJ}6RM zOVLtk$TDp2TgTq=ypaa`g&a=DZFF>TCtQaAcx$W>q_4uduJf6sn##kH7sZz-cW~-D zdYdC*>>jSl@5RhpN;u(;V0>|VEF(?-YwT38!A^IiLY}NIOKABA86 zhLWzNzN+u_*42-tYd8>}R6>U{6nm#eq}Hj=;|m&YCfR5q)z!g8;o-3u2?Bxwj@??M z&Ty#q65d`SwZq-KZI~9o;mR`>y@BF58>p4S3d_)FBBlN_r#R2#jJJx*dStR5tZd&q zny`b@JkcDj7%(r%?HMe4r(9Ou^Y^CH-NEhN9WSjhU9&pSHh^b2>TLY>hLsxqTF7V< z53wQ3enU;zdUag&ulqw8p&~@Kz^Z#WErX zMmI)*+#eHaE%aZ3UleS>Ziv`ShOJi?Ix<_$PG*8S1FApCG)KDq;+3w?Gex4^1ejOA z;6aWLTNBN&j(Ud-??4WI=$o%SBI#6Ux_~LB7wFxSt2m{6f3+GJ8kH<}8oU_^)YV~} zj^7A=%JTf}gZ9MO0J^&>ET(c0Hk&PT?+w@FnQi?gF5ss&tIY0Um{xw@5_$rs++L)= zCYHN&%>e~!&~$^zmzVYi!SHk;%956j*?re%h_?OZu8$WAva$7O0S1P;{N^UU4U)Wf zwnznehN3`qQ?~cYP2(BHYSvwEjj_)bG<*VNc4&-{F*W&f4MAJ`xecgTNeyqNn{E^S z%gEJI+cfUPF&!zyGot*QADYqh%-{MmaT#j=ObFbRLXJF)q=*L z!Q@<4&vx1c`|(fNUE$OqI?aYm9e|@_OPt+Gl7BV#-Q?BKU4%L+!u zEO~W!q0&+YyzSlPn3+Bn%LBFGoysp}_2mevWcjU92F=_O+YSYiJNM_Rx8Un;sD}Od z#2ZCwPt=W8fQaZlkaPRW7KAFmECaQL`c&<5ee8^Xf%Atx7L0ERJKGh<8BbGQsTmeGv}lz3F!d!7cECn)KpmB7 z(83Krnys+&tBKNZKVvXa{Vmv)S0SQ8gLFduv}DaE6d0a1dMUr|(xOh?5wjiion&M) zA>W9i(e`Imsy?+duQRg1R6F8v@O}_l2iAocL@#r3BjDD zEkJX1JKU(5Xg^vTTqKyxbjRFFZWf!HVT&sKut!0+mM@>x=zx#z-r$kfW3U`4UfM~N zq<1S-C2FvuJ?{X3+1sDZWJi2WG1MUy9DPVzzV!g)Nm#wu&E8wT3zi>y_()391;Gli} zDCHJ7KWvcJ3dB7<)Ap?tf!}tdw~zH#d(LTlu(oqzYMb&F9w8<(o^hdAO+5=(TtB#( z-0u)sP-phu)o8QY2c~ny=iT24U?Ww%~P&S`z-(NgKDCv(? zU)8OJz9UjK{BM7h+UfryT*xKb=n*Fe(Nn^)j&J-m=ApWL{`r9_f7ukV3jHIm9#Nn_rA z&{Id7{!^_6XXcEUza>7~x-rofFH@r_?=`M_)kvL7r%YhE7V?b)PXTY$DO4Rjj@bOZ z=Wr3xxw2{HoW+`XFCjbD+sj$x$_2rWAfx@w+D+-qn4fJ97kMc{okoMzPVKO*D(Q)WZkm#a!M5u;+f_ozm*XtVmI z!nxDCh1M5$xA0eTwliB2#>tnp{Wo=C17h`W+dFyud zvpj~GNkG4n!9t!2!0Vp~8n9Cy_RKKR6_2} zddk>L&786Y-+kdSMdG!4!n_37s3nsFRbTH+djony6Hb}InR|=TDIp!kGV9HeuctRu z-y--&r+^e%*?0DQKtSVTcV_Ci#V9E&KdNR)%GBdwy+Kp=D7gxvoJG@mK`jj|@Pd7d zM_dM9U+zE4NP>RjJ7MW(H(Jlp{(uJer!5K6Z@3r2!#B4#)_Dv{*@OW^mla2zF1LLojQ zMNG>HB|Lq$ZK?Bd3sc&DXWR$Z5^3DxT{cJJg+|^Jl6tcY4M%9bp4z7B9Tn>H`YLYL zyd*9s(S8CwDK|w-t>(^en`q=O1zQdGpH|$JqgF-Q^o=e;X4;H$ro(D0v!rQ=KU)zx$SfwFwcU6j?p6veZ9w zF7~WFwb~XRx!IYbVoD^Eo(ea~v8U~fDKQ|5i&V8Bw)B5wvV}q$YSI!GMyDAUu_cfB zSQ3@TI5BgEk}@U562i%djQ+~>w5^BNH`CU$O$H1`hKtDS|Dw0|uHrnh&Xm&Y8(47g z?+7(#j;_3Py%gN>KfkhMj!R4wOSzLo7GW_<$VrU6t2v%ZYe?iyES>KGj)yO<-TUld zbtqFtVM!RZd}L7GiS&t>-4!(1d7_)f{hQ{6uBp;8i$+UIpL=QuXS?1ebAsn)&i6st>D@#80C0(x9Y;?29OXCSN`%PcRB$su?AXZq|(!OpY=IH zMsrG)wmH*1ADMi^wpEDx=LpMFAzhd{+|jIB)vE5akP;Ws3ioP3n9Ba=e*{&Y$Rb)KACqctU8PN2K_%TT2jrHt@&O1g{9JNg2GdOpm9(C-nt;etBX!+Lj{% z+PHsb-9Gb4lNDTVss`T?&{?tmDrP; zY}q*tR4RIp0Ovfbmazvs67nLP=*Pt6h31J}l|TQ%##ASlQ}t%@GPMTeG99@WPBjsh z*%JD2^3?^dwu`UEAIo2LBEXk%rrlNE18qYq!*{D^S`}%W5K`}}@(?KpQ|t@iKU3)P zh>Dm13Az&EKXuhHV|V*`#(Uqf^_SHR7v3xi&-h(A`_M6+=>`I~cHO$x@&j%AZSE|F z%Ut8zl04b=!iO`2+FNo&MBcugZwzy>ypZTa=03)BG-959nmT#n7hexMxY6Cw>;O=L z%wg~Y^mNmhCgKav-tu7bC10*pz82WI^o>Gm29!C|ZO=mb3w#AtwcH~cqFYCacW!+j z4fpMf43$3aoqAWo(XI)Bp&dd{&rU_B%Z1u}q=vr(#MfJ(QLHd8@3-^Gi~>i2PyPLG z6EjnXhhYQ~QrgHnk{^7Obb38_0``nXxEv(x^vR}`%d_pqP+k1|L-J&=0up9dnV)aW z&4@b;xP1Z|;K2w>S2ty0q+|;q#48tVVAo>BV=c3fgT48AVhk$nA;$R1*KNMKfLgz%7z{%)? zFIuq|4@?v+Sw*^<>SpOe!_huq#>Ca7-H*vglQEwmhEtaxW_+>EwSD2BPy%f=Gi`?* z_o;20GNv@DVq2u$XqwS9sQe}w;XWu3%p6Y2bzW~=PIudd#sO z0PhUZt9c<+#XlsW(OnLARrK)&j-%t#`%0T{<~6@qYz_)5$ipkpWe3ETELX4DkMU{s za3lVJQa{0-#Ev9B4Bla;EtT*apAZn=MFeVNa(e?{N&No3 zd3Lj2$ahNo72pw@a{u|Ovk74w33vVkPMnh|ErvGO{`tO?NIE6hk1y=uDv^Zi*ZHfD zV)%+{5_7Bmp#weKs-hA6BPA~osZyp2^~Y}9`fUlj3J`HjR!n();vMR+anny*e9ldt z@o;cbE1>dQI<;T+nUYT8X#Y&w1g%Y>Mod(P5OE^cFJi#4UBk7eXkWN4_njJZR${&R zf~@$0aLx@l9Hrg&2}9GJ^SD@NcXG*vEQBBAh!(X)L42TnmNwQS3Hbu#qOkIkJZoM$Rpu)XJ$m}#SNQ`rO2!{f9A{P{46%F z_!HgS@E!Uh=TqC1XzLO4NTu11RYl`brIMGLz(kx$O{mu*aeTFH*x_=cAAYTUbL|ZB z!-9%NHDl~CoQQN^)uA*F=a0tIMeqD}wHo5W7R6YB) zf1TU(_*UYKeNeKRn8U+`{%JU=4CrcpMsYKVKmIZCY8rWppEWYf$y?8}fE<#V19yj> z*8YTBp~>-J_@e&GzXg^k%>NT;zxC5Jm^?*_d1&I5m^NSL$A7?GE&HO>cTUg zTKO+4`1bbJ5~kJQP^dtqP_BX%Ew;fSup{Iy)*OV7#n5oQVLyiCESOLGOJ<|QBR6LX zm(Z^NO)~~-9S1exbKv*@J?)V-LZRQ0U6^ahcL$kD=1yee zSr0bdnjy*JYA6SgDOCeL{I~pw>e^%ZlGTn(c!!0M%ye=q55m>UKHayJh zxkL6akoO32o^D8Xd({%sNNe9mA(WrJ0}pVx*+B zh#PiKWf9amH(bfdb)$#u&Eox$OB0>!+6%_GDaC;P-#NA+k%$NX!40b>)bHBgFNH}9 zUrXmwR8kz5n=7uR)j;2#pM@)eA$aK3$g<$*{L;nvyQ~R^Y{B)pDn~Rc5!O^tSE?oY zX!#tKYt{8+LJygv6eCqF(Zl)v9|rrMf%y@f+j`BO-iQCtY@n|z>u$Km@!lb%y=voY zzr{Idf+bEg;Foiib~-(VrVmPDXKi$Y`nH0wjY;p0wlMwNUV-w@T#@m_X+53ngWx{= zIY*0tW6M$c^_t$~VXordiqmMHSZpI^2a;5!2epD4na2Bq$=!yXp5ekLtC^;l?^-4E zy#l4UqiblbegEd0#g8}CM!2z0X75lXIzeIE-t@tfo?+Hir8jt`ohrHRfl>;o3d5J( zw**((?j<3fjYJBK=t`u~9&mGVE#el?s}L71P~IY9263$9a?X(ygNzt5EeJu$)hiyP z{+Hu;`ZK5tF0;*nD;Ml-00#Yy1mb_OVo0O_ND&_S5dZA?;-D9GtZQv;wN#{0t+HBpmjDjgHZAU z)%fbO3-+C|S-5lSHbcrKsj2g`A+X-K#DP>DN(&z%9kO2sUr`Z@d%}vk4hA}ggZP(F zA?)DJULSUruC4={XOUz`gRIOrmYQE`T`38Thtj#8$epQehCBUK;MmuDp#{sa^M@D+(5m#PT}zcpUv)v z>3#CEw(LamCeLg)PjFqH4ktQ0L%@b$2mOo$gtnNOoESPil2LtK_(k8NkUaX`HE;{tN_KxiqYQWi`hh1#RBcB++Lz)Y$ zL;2L`(`TwvY8B)%2XeS`Sr!iTFB4~)eJM$4&f1(QZ+do3n)$deQ~t^FL07@*4#nq< zsWX1C!;n3f4}m$#^Q%30h!7gaBmTU59O} zJX%V9GiKheLz$j7mT)i-zu|3VizGOYD+}%6NOt4QWGCTGBH6MZQ6xGXgTmC1TW&PL z)0Qq4&Wz2sB~9<8qDp#*X()`wchw9hracP^Iw0Cl{EfwAX>*5oUyK;!Wy`!8X^^1L zG=u}Gs`#c@_k$aa;R>IxWq2n3veEVqaJ$0)btYBp)eP-hiduUlmQQQEzgxk@LW4Fv z>|{5bm^ah0BNyV!)=i;W{7ajV$2Dw7^GsrlLin{!TV)P1V%I-#QQ2Cv&5akcwpd{o zO>PEhc&<+5E(c-ek4QhE^qb=YLCuzoxF5|cJHa&675TiK&WN5p@zJ6ZMNdn-oO;HO z^IP@vpJSZ%a{F!DupJ6UkWu;WqI=NfzcV)k4i<(me;xdi`IvjOJAN2c9pmK)x^sSU z9s$>T5;&TGqVX=$-oWOxBeDcv(P@0ycB#PWeWWaU%rGkJyNdA|4eI8xW-BBSn%V2F;*7ZAmb_Fa9Nz}t?c zawYD-gfqu1xs}55%^bs8_@gDQ;#>Hqp{0#fCs!*zF0~^;4HwLU`xuAY7?9A2YHSW4 zI$c^1R1Io)bDz6sI{8qur}7{B0sY&tRJ~Xk91P-lm5{Lws^Lw8j&#IGQe7f5J%lW6 za+X~*Nq>hHBIlc}lxw1pUX0Q`Q?DiH7hL6vj|^I<91*<3)1*MqW>)2HNgUrVHC^Ol zf>UTjdw%9No-iup`)~sr;&SKVSb4==_o_AhcQKHIj}LWvc>YiKSg)Iw%aHpNdehHSMr?$6G zX4vDCX%a$;ex5Y)i5-IpP-b@in8q;k=}3Z4hLj%viD4@cBs`_2^5EwYPLbIB&||bi zO`6ahf?rwcG**i-H33l|vDH^4@5S`}N1(@zQnT|2WtfHClls>3MU4hm3~_hCbwqKk z)1X;nl*=oSwH2+&Ry|SKxP!@JSPzdhuugt+JkZxmsGvf5SQnZYSds}u;t`G8Fn^m4 z1zle38QlCmYdmpqbfX~STE#H1nyb*4{ZGC2+;u}9IYh!w3mNolz2}pYnvwA)J=PN^ zT++QLo3|CC5)pVfb4}+OOy^thH*8%?ib^C{doyXtOH01SxbKUX_%o%pHt5?vzTM86 zosNq9Smn{byp6*b3x%T=yG(`42Q~<$DP@rGt#~NtJu1tA-=Y=|I=ScfEd```{dvic zwzquEo~@N4Q<#-1{gjL0Ziyaxv>t z?w%eqf4}j9xJD^^MbcVY&UTjCR=Q}JY*#}_B?_ETyX9k1`E~Dj)?tz$N2g6<`{CK# zTvTYroR+H(TQpddIDc*Yf|Ew)`=n-E{^jjWXziHdaxQiK`F%|n6`yof zB6%;L+4d!TmOT1%ey#HZ!_`x>V#_Na=`-o)$mhID1dYCOhU4Yj)fgp`M7vTzQ@uUw z*%HT&bcpbA++w+(_E~nZ`q!BNkav9rnwiX`&a=)JO-@GjKE}t!+dM=Z%}?`(%#2S? z(v@o^syjyRY{N>qGRkcDMU7s3|A%*vD_vc~PJ0ZQ*H;9ZV@UF*Hw8?}qt_8Upjrt~vL>R{me zwN{1$esp8hzX%rls)Al1SPq&!DQaq^iP=eP}8;zWw51dTj5J zRQt3MGJ>F@8wT&2XD2;9S!inGn~9;B zKbN;ulwh#o9Lc-=6I>+4Ga~##GsVv>3kP+Xsp!1WyNh;dFdQ_>ii&EKF={Za19!x! zxLi?=ECwAKe1;o#Eww95vCf3@45;+Wq*il`TVgu1q&6yp24`eSfJmb06jC0vc1}w~ zWY>!rM5HJ0^czAl)v?KLTy`&YTOrp;-%9B!W_@$a7BG&fEvyagdSMz9AUMjHMurQo zBJ2(cBc^<-NF_9>HCM>2eeHgM)$-!=$;P{dZ)mVy+gPmSoHG-{diY`y>(Pl}F(huY zHa!zTY%qweSKW zt=8LNE!7vzWYMgCpy0~mvyb-4O=;maGqwxqnz(1TE#GEL8tq}VRPS)OPscx#xSU1b zOj{3Zx+%STc!uubYEM$PO%?7h=pA>@1w^S|G}B>e;&YAOz8|cvR}$z72V+k?M28o$ zmezaaBHhqM`85>Z(Vl)RdoUEIm(4#ZV{~g$iN3NC43;j#_-Iwa8mp>pcKD5@+AkhE zzK~r^@#D!`h+HUzyda)^ym^fpEEk_c*E}HZ_$(HVb?)w- zGxj>kU`jA6ku?wfIY6dDGhAqV5N&aoV@-;SSTTQ+)}@zGA*s~M0=?=F9xPK_VmXDK z7@XAo zl`&0a#z#k|PG^Z&&9NS>ujtE)Xg;iLF)8MZp$?C^6v0gO9-&s?Hi^&3KN?P0DQ~U$ zCy_h%QN*5Pa%h1L?rTDWv2nL?Z?an<^z1;d^v{j*c2Eww#fmEtH6$vvI_LfL2}X&} zeD9cE%I>uj9F<_E&w9u?Yw!;HLVbjXN%7}?}J`1;tK=}H7)AEK)^i}JiF}}XZ{_P^u)_{euY#(b|+>4ar~=*TBS*ILEMyd zkk*{F0d2-cbMeq%_+`!_IO7WFJVR*$eXZGsl>T17tw4Vu|0pkOBBK6g$y->t$Qhl^ z7E2`g#$?E+>q?@_7tKn*><6V%f#QZ@g_t{}TUl`7Itb>CQW6X@F=3AO{lQv`35vf5 zg4s3zL#5097ajUK`f6REwC8%4RvHw|cWkRi`v76qjc$N-Cq~`O1Fl<-+CU5A)GJG^ zEzhqt0$hvtIQEAALX@Kkc;meUjwV16I%3SP#cQs#@#k?aV1d=Eo|+;0ZVfY6u{eL-CT6B&ubV$WHiQyfZidG528qQbMQ<1X*rKa2h(wb5Y!LHRd7XPQ z)NwTudhb>ZQ&1kPHC{!$Yek@|&3T@nvUJIS+>k|v9f~!?9 zb@Ht6zgI95*fY|91Z~ zZvu54x_+{10-l({aT2XXKKuTrz(W5b;>A};Ni3H2&JULy-}yQ5QC-z~p9V5tmTti^E z^TSJ@_}f}B_jgE2BDCB`zZ<1lOs-H@hBHI_^LG#=AFiy)QWOES`u+(rLdM|)-gOdBUx8W#p6O-YoWaKZNk{ps#o%0$RQ1 z%llGSN%Lv8!Yv;t6b`~U>p@?%^cxM8vH!GM2?bGyXfZb$bNQA`)?3aw(I%1DUdcaN zx52swgq-e4WABhE9onD(BNjL;H~dYEuD1)=`?KG1nOeg?D46c?b#?PYD1r@*jcv{+ z9LUH=gBHlpIj9(n`Z2k!nDq#_K$dd6LDl+nvmR_aCr92kZ^&eju6%aA+>=D8jXHZU z2~S1}p(Y2UO$s879cS@{kR4;v45rc#-M7Lg^d^j21{+JYEMrRYNKK6ZLoz_@B&4?U zz?eoGCUP!VG+(ID_jEG>B5^KCsZul~1T+!7SS<3r##Gtv9$`MZ0X2)?PH($yRp4zi zvB5quPWSgEZK>mP|4xgDt;r{Dwx(Y(&p_(S0PjYy7N*4S4`Jn>#yIXuPSgt4jt{pZ zqSv)*LGN}4PKh;%c1l3Q?8wqaUBk==*0${U=rvdxad`lrE6L6DLj-khRF;g>J>lxB zC0_UKg9~V4Jm{iDGYxD*g5>nv#&FFtJ(j>p=tttzRVH>Cu*nrWEcT%HyIHoJQ*sd# zme-0>9>DL?;z+6~dw6V;kX=1e;6g?;s}21xztkJ3S36>`Sf~PEAE2%Tc2`XW4Na&k zkP!V&>u?3~CloCUyPG7|f(&{*;tC35`!Gb@YlB0&KS09-Z$S&^*FWEaH7^46cL%(X zW%tOaZ!pZ|a!J9&H@-_xqRqt1*C#Epp9Du8o=IlkU`Ap?74jOq$J^0qnx0>je-||S zyR=SIVr_jpwxctEfb$zlFd9mAN&>QB+uGhy0Zq{RZaJ^19vTV@d@R(9Zz(?an=#km zToGuYjNn@0oBT&J$~cwHow>8B2j{}OxngPV#JgjCPo);!fgV~FdLc@Yjg?3w3Ee=} zW-gA@5MA=0cwa#w>0|~q3>WNdIdKVzRo2wjjQKW42HcftdQas5%8_6cbggQZ>` zhFk-|K~>wnh~3ro0c_`+k1*oOz>uBvSG(0tq28$2oHn;BTC$pB;c*sz9cuGo zeZpv}wJ_bgf_Z{7B+=Uf8Fd?f!Ywj;$}*{oF9qKxQ<4y|aMPK;9U1y76xwRaoL2i` z4Q|O8!F4-RD*Ggl{6BDMSDZwiN?Ak>)ZoYpVRD5>%J}p1bBk9FdWceVc45}qYd~@P z(J@ENQIX>N0)xkqt@-FJ!DVGvR(GQwwTnhFB6Euz{<=KP&<(2A0b>fo|ADZ9-``Y+ zR2ri21GMHsGm{dHzL-#nVJze_m?E`8zl`wYs_Xco(iL*xGwZ+0e0@lStj$K!{YFcJAIh1X02PyxB8kT7 z2CT#=PxK)^ydAvTKEJ~sIBzT`ELOP$g>?EKfa8}xDR`QWo3?bO9BwJJ3RElqi$4Bm zL4bSwP$#$^`m~J5+3{4 z+T~lyi zlx`hY1#x(y(h-N;%Nvpu@;5 zIFUgE#$(v`Et#vutTiZQ$?lG1O<~G&osf{zOibRz`Xu< zi2ThbU(WhK<*_)Ri6dg^qsFKKA8n{|OTS++iU}B*`iqkZS@$>eB_=ryRofQqCQ*KR zwI6rNLw>_vF!&eG!t#}pE?1@|tbpu%ZX=4a|1@YsVwQh6w zr^Up2e+J5yH!wHSK7II2B!MWp)5e~Z`Uwg8excRyyBqDX~XfsdNXZs2nHjvp`9HAr`;eb zw&q*^2`X9Et)LN5ZuzE9Xvjj!s3AN*(`@8SR(h|w*75neBNk{E=$Uu^+p_Q?@m8ss|>>FTU!E4yOb+TDBSNLnI z5&Zxl5zj!WR1~BejAg{m@0re7MZSQh3Sa&SNq(Cc;a0gE9iheepS!MSq1(+C?~22Gvl)b{H8XSc)Iltw&M5pa zXU|eJ^-oWFW2(-^_616)_)@F z)p#j|0gH**WOeo>Lw&VN#v?v{1(UyVNN*B`O!P`yL~t~+raX4W6M8fJQXk!psM~8I zl8ce_Bx$Ian$q<&_Y24Gh23o=*69!cw$WPzq}o=?8TEZ0K&mTJiFs(E><(H+_kSZS zOeMqHVH$Q47SO)4n!F_o(f35{;jwzZDK~pzTOnNw=3axn7Jb7rth;G(bA6y&smG7F z;!}JQ$DU942<)=@N&Xx=#c0OrIG}^MpuBhM9Mc&gaL?pD>?UHt@XOuII#)Cei?JJA z42s>Lm6BNAu*sV3sIy(NW_D9%pr+g@`3}8lWNoZV^4q~O(#!38!$UpO{+VYr#nN)0 zy`w#*KlTg^iC@gBfq_IW{O#vBGd6FfMj?9J_#M@krD z*-yHsyvW0cM}JsKnV1tFKHh^Wiyq32<&H40MWXdUo?@r-cLsBU$@Y#XMdn8MzN6LC zc33p?Z8zX*jqU84f1`!KV58{y@^u&0FCtZVv9#{;z;AN$YNl)GLW8Rd48r@E`O^ib zK{ek}774PtL%7uwYV~;oSLe%)gV(-&!F4^f>k?n|24?5M&V`El?u5&ki~tOFv4yi2 zW$h1rsoX&Q#_TossIum6M|cMS-IvZ#2r=_bZbMPTpoI48Ey431*3v4}kAM~aC8aTiU54?hn5;g#;+8+p3I^@C&c zqtoqLk8WK$+w~z9#|hKN=e}16kA13{hC_e=*Q!k2{tF?+kq-op%5ve%3ni5`ra0o& zVF{K`pn1Q{^3_I>hH%a;Kiyzz5AHLQznAyMV2>J{`zcM1CYA`0Vj?iGV8$5P#)(#s|$@C}wRgRyzF25YP zgw62>E7bDUu~LG#d0j1(yBqb#QU z6FR~e7x1VpWi=FI_z2ieiqk&W4b0wCcZx%V=ARr1hBD+5~10s``Dr-u~sgsN-)GU>~! zAU)A~-L6C-5y;LwBX|h3(KnX*$}Q9xth;v%lpTWM{mdPFgLMs8^gg&=3V`X&z@FbX zEwKh*-ycD4hdmXXZWjQ{qTFC5kYZ^rG+i(htqL|A*}G+S7asg#sgTG3@*iDwSd!g# z1xioxRoreNsOGJ=cE0}F=1#5AMNbtCKK{=*rSf`)OLc$R4v*Gtwm$>sxo~=8wq822 zfo_xP@`;zH5mFonPRmNJuTn9&ZNudU>T8{Q)<(HuM&yRgzq`A6{c5g(#;?FWs{AB6 zKC5cemQTjBCxrqW!mDU5Tt zSYNh9K8>=!9Tl;u=Kx?Wcs;{ssOnsPHvGOcT)xP{^n`6+IB;5g>EA*(Bp;MrxKC8esNaBp*l4X-{}t z@a5iPbhMiDirK1>jDXRzT8SU$-PsMAJ^)Tq{B7Ka=tg-#ZCd(EnrLbV$@qNmD{A5@ zrneimwL#WGo%69CDkV8W5M(Kn(DkCdt8Bcs|#7Z4zcxbakMeTxP1_B>T(hbsMi=*RH|8 zkLy_fx!>!+yoF+9FV{4*(;uE*PyP08_S&NK`IeqZG z>I8_-2^;OUc#q~kmvAF<98{r=n+llBqu`*w3;}TEeS8 znG)m4>Hd5mPj->&Es~js7*?XR?WShG+IMFio@B!l_0x0$S*;caL=W8(7heo;{$|7N z3meJ+R_3;b%_~oM&PgLKXkr`~V`n(j!=J_Fnz7-QY@x@QH6jY(tAP#1C1?dln4>Ff`zD|Hk-gqt*rKaaDU-J-MDHLlqI8-cthU@d(;&KyhB3q1;8P1WB z;&d@MI7i5uh%(q+HSIztk3Iik^+D$Bv?1n(&ntB;-F=Fy7K`ILfqH%+IrKi|xFL`$ z+9@BWQ2|*GlDz9g!2ZGB$6E)}T-CbP<4YeZk9VR{fQhiNO!oH|3FlP26XOcyBE;mo z4O#2_qJHvKaw&EJ*o9hTgOb*|4dKHmYQ&mLkaMVxA-|MxDLhhcZ z&Lw^`H>Gk8ls-hc@_w-u9AMD++pS{tvo(;q8!lw4AVq)!I(+_+X37}nAw0<&#^X6+ zjVQ)|T~RT&ZYJ%?89K_%f#VR%|BoQYN*o*QvF%Mq!(`MQU#qu{wG-UgZUGOP3C!yA znaROltid;yrqED9NxXLW+O)*su%Ur05xmW+^LTRtbajW>u7)i(siahE37^E^-#$MA zZrGVV;Yg&v1Q!TfA5=ejnLRTFZwZIShl;mO{fn4$Ij7C$Mh}|!+rmkT zEL#FT7cRc85VtFNLL1w!SA3YOn#0`4e*lE%E}pQWypke%kJ}BCtJ*p}fj@?o0tf%0 z+=|%Fz2?JiZux$(6kfnQaBOda#c9*X?H7uVreiMpbtD z3$t4Ab?amFhXPYjLYx@k?H_h@$#2>fMm=)s>RD<)I&*2G^_PMlpOS~**BQMH;@PA- z>6hLf>C2$a&)jG9ivw@gr$jHI*ME7UD4}Ay3{;*LwsW=rP^q!07oKYH<=$_0w>r}? z?H_Farv)$~e%h4k!Q)ToxAcOCd}|E4^M$+}Yq55>?i{T`mOT~t{^9wjpQY73>bNO)#fmT3pkBObX?bwv z*WS1~G`==<74{wTr-&O5^4pu95Lql(tB0>x!g;#+s~g)WAWE07P~I%+ER;&kgdIWu zd$eEtSHK;%6h^^f$1di1B$(N~^A)xJv+TAWcjCDF3!^<=UzmI9ecxC-8E|^^gF4qk zUrqL7x4A!!?a>tu{wZrEX{fmB5D1((N7Ug#yEygVY{**wz7Jbz%u0D+mdC!W9{J07 z!K|P|+xHEOF69ii3mT+f$S1{HQIX4Zvd)0oJH1)Ym@Wj)#1wq8xqm z+?`+IGIe<0fiTOYwhAg z+Gki)%LKSz5hmK16*RSVJ4(}TJ=rPai^|!}Px*oSJnH2B0Q9p%3B=KB?-*Dx>I7VJ zbjcQL>QNsgC| zDnw$g30o;ri%QuiZR}YM5xARiK6e2B%WNnQw59bCf7V7{&dxJ3Vg%^!AZWFsFp`LF zPMg)*?hEv)veV|gK))92k;($9Rot??-;V^)#0c{j%js`9tepX~;Go-;EdDus#JmqV z?>np~*$)`ye}3DEi*g*7tH>7xsf;V}r-Ix|nU(W%(@^kAX!em*gJlGT_NgyPhN*+p*(=D$vD`<`({kb&qQ}AX|&@}bgR;0<-kf-=nK^bVYm`$~WbL5&5 zp;6|#`@^)IxmL(6Wj!e9NR@8RIod7xT+*W$k_`>ek!@1`2f+)sLjpJ2ulX?XwDt6x zg?|JqR@MuYpnS}uDg4fgR8_fdL?;TU?oW@jR6@Tn(gBEGSWKR{YnyapKhPiRPWJ95 z8e{5YRl05ek#}CK(QaE+tH{%OF-Rp@g~s(6-~1D)i-1k+9o!JC?>06>l-yxos$+A! z(1nG$a&acM)8aH|?}Oz0|A_j=;K;r&+EJ_tJ4wg3&53P$;)!idY}*stwryJ-I~_YO zzyGUO@5`;~54Y;}xp(h<)?VwZT_8iVg#duNWgC3Z@|?P}YF0NN@0n~_?n!CmJp>u} zt8wod$Ty*c*(unT=P9>q(Ip*?Jm$O4TQ#Rhn)=J(aySC%oDYAyAxPcgaETiy9EbJ~ zG%x3`Nrc+fl-1io@v%DCwPXohuxSTCZZrgjZ{#BkYFlo- zCYxjd+w*5jvzKCC&4pu(q!n{fh_j99b0{n?o~aNY^~=^oft#vd zPPg|8zC>I^zL;jw-;nt5(ouV2oXbuEG*~Rng*eji;_`Lr4EC&F1ivXbh}vy*tXMlA zg`e+u|FmgZ_BVm$JKkvr@wlRe(-G9%*}l_d_U;ee_iKQEP|w+q$ZRSID5A76a~UGD ziU)Lk1Q;9pr#@}tR`A0z>4U!Xuh*iJCv-9*Kw4NoO17X)BpgbE{X09FeqX zlms3Vd8k(envru;EGjD+0UNlM6=J3%*9pLJkrQd6NoT)x;8rGUgBvtca8?9L3S&vu zikC<&MTuBL$sAEgfaxrWG%FIFgv3Tdj4RM9wf;!JKd5MmGMMtl(WjKV|1z(IVqMY zQMK{kXa$2TixlTV}8FyPBj8b5`fy)tJ1okY>fg; z7qqpAuno{|T1Eqx47f(*foYOymU)s(2pWXsMBRh>d5TNo$+(sbM!Z4NQY(>ZqQDi= z21GhTEm~wjBH3Dn95W-#+8rw+HK5@k!yqB+AbBt{v?fvYl6FGljzNN)0^NZ{EGBuc z)?PV})uhU;IVfC}xY9RM zbY4#Kf^u7vwH+_x!VT&$KVwO9Nqp@)T^Luc=PD{)m@|j-=m3FYgq&uCoIcmU^GaMe z?Gl?94aHNIgMvlRfC*niQ1~dDHk#+CHN&2bEu|Y7ZaU3TaAU=G0HS5Ex^)Q&(C9K-(py-Z92?I z+&HMNM#*`Mig>{R*ntk!v;ZwWQz@3ny@Nx`lFWETYz3}My_Y{KbAMFO%56EuYxkv& zRtsME_P>@?mgMHPXK+*{7Y>r0A+{l(NKp`k<^H^avTe;U$`^~&0ZQ?0XXTkXT-S;n zzpgQBGoNhbZ~4G%ly&Vzg~D;%HGH1@f{*!N3DyAx)S6#%qcL9x zSVSR{!4nBkSPxG`?R_?&1t>bQqJ<7debA*ZZ>XP20)P4tnNKgtleN6LK{l)pT{!aV zSK{B5@)G?exy!ShhS3H!x&iR$zeofP!-1=t!+HjSZfwN*XWt<3;DjA8QtCdI90-ELolXeG9>4@;XX&Te-h^S63<2L3?@Cw!Ch* zT;~o%y@}MxcD*n~XI5}mOAxjN@O$l2mHJV5WW2;2q>ro?eO}-q zg`#^pMCis_Tehw=MhPnI{kcoH$s>Hy`h~jocZ;%(UK6<<_#T~JESQ!{B`t3e;F#f+t{%CoHQy?DwOvEej}wGU-gSd{1Q zwIL_SKBu|AVYVXM5i@I6?rHt2ht6{hhv+;!yD9_CO2NP(lOw{DF)7Ljk$OpP3zP?w z#q0OT=vtzbvGb-|b4g-Z5*8oMi(l(Amui(p%@FBuSbYEZkKOHIgNN9RR6i-R&a__R=ymDY z*&@t`Sp&-<{+{4V?UBJ`S(B?+FHX>KXGH6@1_mkOPBYs8ni`t|*NfRCFh*$ULL;N= zOuq81iyZ5*Yx2aXw_opzu{lOpF|PpPFY&;?WISUAMGx34B|qQkDIl5Y(MN zUc|TmNfuVD^)DBO2tP_F2|nZ1v~PbJlK(4%up9t`O6H6NGjL&lh%fu^ zV>=(0%Sq$V1NU6i?xs!j0Fm}PVrN=W=Ug?1)_RN!#APLKBIIuKuJgHn&#X@A ziZ&t-dt&~roKCH$1T)>n#n0b0T+*&Wo`R&&jg)xQc4gRJK%^r~&vKENYMCbg1?}V; zAvW=Blw`>ADK&;76AeilO|xU<#KKot3s&1c(I@fY&^BH zPF?}F(<3Q$OqhyIsWsV)in$sL#I|P;B)p|DqZszw9O7)v6-p{A{jFip&9nsRVVR#x zDSZapJGEx+RDUr;Ec;8fLRVH*b&`*ga1dtr1l{ps-6{GanFQ|MM9gy_%#d96iB1oe zmfxA&cz5%JdkjL3PTx`H%gDvRel2K}^`%;cVn<7!;uf`DEbTx!q7G+z@SLqePoJ7Q)HoXpT& zc$(2hzhd|r6$}I^i3P-%%~ASBS4k6APzhH|NNPIK8tT!3`hK1L5Q)y5hK3NGr&I+E z4y(>lv_WWdp^3vcbHtl+v)ZqE1(x5pFko=lRUO6uDaV{Th}U8?c^4m7Qw&z57P1*X zc+bZcm7ypkQ8)lMErOd#2sLOFNTtSQI8>`-z9!?S^rsz)Q8F=0o{RNYMvT`+PF^5qF==Tv4vIT*bcPhvRDuMnW2KppB%XR%ktRrBc$1Jlt~4_ar^9j{lp#FcV+HZf!KBt!oTQk?B- zstRf0WgLhyua|bOC_feDdf$r;54{m)DctKyDAU4KsyIHQvIYMyx?obPaH%dPj? z7E=a*Boy!sku}kUwaHA5sNfR}!zuiz|8|jCzSG?ke?!I+k<*cNz?Kqo4*62U(;VP}PA>C9b(b70tWtH{Q&{(4$Z zBT8PHP|9@JsxtYOus)WFFw%0#$RzbsWPEF){3>~LgJ2d-o8L3cW8`?5yf<# zepwfXayql()m~9L@Sh5Ib*|uGj1#chYiJ7R1hpzpUg8b`tI8reSkvbcp%d@6$8Ec- zsD^xIf2CHYklBz)r*QnsF{462V6AWv1Uw1O&aPpT6TW;4?h`Oizy0n-C!O**)@j zosO3dLXSjx!uqw17K8HnK;zLX0V<_SVkmBxWGrtt8ND<)fw^RH^3JQ{(X!V~H`l?M z=P(~KwVvt^jx{FY8X-3^x4JDVXhN=Z#AO9DW`D3XKA@baAg;0`Aqfh;u5J^{8RZ*t z>35V;s`&GWt6s5FEJq(kW^7z-J6Q~33wFClVrndwoESAfJ88bTf!Y#MZMLnc=ZS@k zm#R-kB09TSx73VEmAT^s5%|`olv2FVj6{>3%)QUj0utPWTQLXoBbjBK9|KzSoVPoPRI&Q%;cIbSpPK>hR8GT40)LZ2E0IaMhA5+=JnDGhszgXt)2o!!fULG@u| zIkA>(KqDrPu8xvibfQT^7t4T_DiHDF`ZO5gKIW_0kvo{7u5&xE#ebXA!Aba+$Kj-! zqt`Ad7igfHlF6J*1ny3GSjS7-wk_wl?!7>Rz6`C~k?mhiI=CdHBk< zS;=(L4>oOa{(63vK?3aDN_H}%6i+)1eqp7t2B>9ZjP-M`-q<<^Bo}=;^-*hBf0Fd2 zsS0R8Byb$-IGI=m*J=xv$~5x8y#Y6;ANHW5WP)#M5~AF^MB70Zx#?=TJ;sMS%nok1 z8N!HWfFS`qYO6S0$LfWf=|cn}TDAoz{Ze*|dOH}mR1UHECgSpwAIev&I`C8Q;B_@t zOB6ox1p%@T)#%MhA(y5rt!WJn#Xjy+!65$OQ51BaT*0_J5yYzRFuiuO70H+FOl7yw z`(eT;hCVl+KD5gP1YpHXyKiwn>Fap9{7jQpnlF20_sq*$9Ic@(RULJh7U81TB$J(C z%_+Le_~)yqtEP3ng%hEgZee3dJ{oi5Fv*4oY*Fb8v44{bogx(>nlUZ1NQ3Y(Khfah&tKD(C zD2-0LI(lX)HjD*3AdhQMKind`$v-IL)Hp!xV9reyqiTUb--4foc6IZt(VE34hMbS) zum^%ryc&y+j4eE32!quyE-gC$yOvN3WFJ=?4VL%T#EXi?s(aUjNsdzM_YE@e?q`Oe zjr!M=IKw(|mA!=mBOUFG+xTwX5*6-#s%>L*+CB|`4eNOp2yRuMdHVZ7yNMU^}h}2EA4NE za*oWbMXfwhBEr5&H$8$q5nK%<8JN{{aKpX z@OPk3qGLB?OSz{PI}jCwmXRhYpn;k2Wk9fG zO?e26ROxSy1u7qeiKCYxU5W39=om}kx0o!MoqG9$W}aY~(%L^Y-$&S??)>J-(M`!=zY*j<*GwLb_GN?i{~#Af!W z8QJLxrf6+d1ad@k@GyO1N*L6(UleGT9p7?AiC)V8LMzeb41a=6P!)uV8gyvFKO*~z zHA$_i%uc?@%c6??kN_SNotelUTsDT2Q_Vq{@WUZSou{*DGNN96FDufe4y<4Hn!|UL z9BE6)GDIsDqFj{UJWE-Xh9co1e3g~j(VD{!HNofcC=@Us^-7Pr$3TPp_vm&t(d0U24R0}=Qy#>q`%>)(16-L-XgF1N z`33I4=!?JHMakgFvi*n-W`Dn;4w{Yf+?Vv`!(Drf%F4Y@Yr1w<6EVJHETT2+?f2-g zM|TP0rmVzKK$C^`dp5&e7^Vx>g5H$Ur4?w~p-$a1I9V_|9{GYntzBNITc2>inDt-? z4-SxlW>a953GL$f_oDI~#oX&VQoEMqWZ?0ub6e(A7|T`jaVpvY_+xE&7orqdmTSX; zv;!iV*;6%af~4uc^5a`75@DKef8MaP+2SpfQ{l74HyHbx^@{>AQAH)cpx`o|*qs6M zUrkMDL`363L<$3#yeH0h?5bI(-exI^%m;N$wLIUWsj^u|i}{R2+2;4;D>_Z%LqTgz z*2+`lc-4%V{U1y1xqxc6T2UfTC7j&+>QH=QE?t?t-YP|Pyx-P|w!?_brkUAp=v0xt z66?82+E~9Ap9w79xLWh$yGEumW*G*YsKUe3ehQTK4|cRO_NJlmOP#1l0{veT@PBJ$ zii#%?FEVNnp($wSpb~XSu*YR4tFbbfxx>)EVF*h#Vo64b|9lkc%tlAxA}kt=^W?t) zEHLCr0vO#RnGUS3l;kUF%d11#7k?C^6=B(7gs2sl!`8Yhg>027mx>@FDRdD@7b|1f zSb`2`8PMIsjRM&+uhR(XuD{b%EI^0hP{s+X=;Puio%9ck%qv5=UYs)NYUK%jQ%;0< zY|vyjN=^z=Pu?0XVnyzwZ>7ss&;=S;OQe*NB{qmej>EytF(r}?cz0?p{qi)uk;7nq+=o!csYFWaq5hk+W<(iJUV3snjz`JTMT>f78o?Iv8-nm&d}4HM zZycYB79o`Ev!~BfXUGj2d-=qjaC#pUDW!SW#5O# z$odMQ*}}=f-Igc+81p@d(c^3m`IAY#U!&&$h2%7ER7{m9XsY(s7KCH+dG2MwuuL4p z)5e!o;rcp|yZo0u9>53lCHVy;%$CFQR8-Wi4{u1E zyYouo602!54lApq>yNK;p8H&oC*}fs96u4!i6nI71G&)4F|J^SzJ8Wp;kxtK5bOjB zAt%gUM$Vmb0;4jb86#IB&TQLP48qEQ(AY<&7nNdbeeuf%KQ+IwYTM?J1#}N?`k~sS z@P1ob+(KTAka$B0WWzg3Sl7hjJPAXNRe(YlYf}Ccy~rs*GeQdUf!$OSaQ~qX-9Oqe z$OmwOqqnI!j&2fuV@yLrpsC?XUt9A`Bk*1bj`$G1?Mar>9rbK9Vx!(|w^#g!1uM~r2boC81jO+$9!uG?f z7&pWgGtTT|xWz>T{Ta5xwL`5K{n!12w7FtKl~hUeBDNKz(N-o*g8x;(z-r3j{&0tu z9eMl(R@R`A>&;(ttSBHXWz_RS~d?H+ygHwiZeGah*~K-@E}w05G*MZf1bGSQF% zKk3gC5$8YGoVc^)MqR?S^1hHQJ}G6xpOSGg=o;PWmyr}RJV=epTZ~0uTG+_q$%`Kz z<(?G-Ht9|lYj+qx72+Xr%MCOb46R1mNd!CE_eH~6A`edkxEEY7#)idrn=$W!LFpPX zVhby0`vgE{%?r_iVT3acOJfvCMLaP}tduIrfFSivNQR zz9n-CpCjDN1z|^TOJ&Y*-00nD!ZvN|VbUA)v(l#y1p&xO&OfN-65Ss<`I?Mpym&2o zTi?+BZjD16wHZ+`#~{mjj{Q6!&^HzBaG-^F;jvBi{4#Fng6e~BsT!X$H;b#kI}_NNvMVMdqI;)%~@IVVZazP={n(qlfU!#L~NsCcO->Qj7V#hWX@%^XO8W}O@)C{;11h>)=B|Pt#aNIA4BPcelRqWzNa`f@D6n> z46gOP)5NA!WcA)K`2iG9GGF;uFe|e%{5fVFzL9Nga`(oTA5tqBJ3IUo)QMJ-^iws> z5m=%asgOnSkStD~ho_KTtd?MxZ%lbJ&(lgJBKjiCO-#XZjJP_ivR8&B>Lc70qz=HU z&F#wF3f4*j?h*_NMTBGGgRjcxbOxI%HW2^=kB3;=(*49wO|}Z-OQVg0y)-0iv7t^M3UXlu$p zp7{L_1|D=_?_rlS<(L4qlGMQmOKQNI=oU8>>EOflLvyp}1c6W`Q*$x#?pp5v5k|3F z+qQwJJ0%47J_wRFu#(&MlLP&bZNZ$j`eCR|Grc;kL%B{1fNM~W%h&Avq);>QB)>Wk zXGXAD?;Gev)zg?}t@>6-UJ)zi3jO{3M=fb(D)!9gD_MD;(#iXkj*?VQH_e>%2y|BP9sns#y@4+2Z( zy&wU}Wg3u&_W|L4!G6&*4HXdu=7>;Qs^{GU_(Z(NRV)rQ8C1N81rPvkiUOKV2!N?r z>m2={2qRrX>)Lj%+O<+G0wDRuDMHR5BUl3f+}#`(VZ^^zeqUCO=F71QG=PL%^pT;ZxHmusBI}_V`#OO6mBq%*ig?}Y3_d~!cj08e+@wvi|*Y8*S8`=K%8ncn5V`f zba*;o>FRy^>SM?v5!z==LMbgSZL-}HEPP7qk-R46HLNeUCA{xry%(7;mg@CDD1VDs zq{EcD{!(b$1Lbmc^*ke;bUv!Zd%3?4B}?3Spj63!ObO|82jQR0GtvNF&&O?yW>qzp*nlQPp zYLdV0E?IxHCVHUtjO__(=;gx0^kknLyVx$g;kp4~C4+zu45p6EnP)PuPSxam1b-He zBE4Bgf>5|CRbmzLq4hVyRA5o&GnWfQUt6Jy=6}h%7$(04IB}~|Migqr7>-aWqoGma zv|$kZ1pT$KCea<0slyH@j4REUu+jn-JG6?YA>Hu8tllJ0P;oj3xmk;un)EhDE~ zG8vFQH5+SE<}jpVw1SVgi$T1fu;ZF@EfsRPdj7PvvC4+|c%*gvM4aX@+msBd_l8x( zOr=p?1-ib6kDTiK)@@s@!S`lnS(dRNry@HqEe)(Emq)Zjs{`Rbz!eGr1i7UT4Zx)* zG}FOO@2Nho+-Urw(m4IlX-Qi-Qf4{JZpNH~hufY}T-@bVrkUbkp$5N298OlaW%;?G z!b$tpaIw+K_%0=HEz6dXi`@qY;NRN!=ktfc7H#%@W;nOr+B*lG^;nS!o%K{v$9C>T zQEyhD7~D1>_{&QVRDMop5)8ZcG8g_&yKl1%Qb?9;YkXFv!nbAl`6T74z)UV@MznwD za=*|DL}Gk)qBZ7z?z_Lhq#-a&gmuK=t z#cpi~$S1}m_(s@sObepG*d6bY0Q-cdlO%Lsv~wwuzq@+jp`b-FM9weX=|6T?zzVy| z0^-IFlxRqZoo78Y@~zAaJSH(alElJ%jAqh^lAQ1coQ?~xKizksIlofU`6hh=?~g4{ zI&9WS>5wOb0h_0`r`A{Q+9>{Ci`U$>jc;VYu1p#&BdsidO=rTj*R@7`qr|P)4R32_ z(zV*DF8cJVw%Rt3a9z0*|Jb`%b2D%Dz3gI5LyAzRMhTh|vMvy=-ErK#FvQcEdPy zK?D6ySZVEyC0kLzOnrtdIbHJDBk~6zJJf=faHptnRdVnzGp3U!>j%#VQC5bU$je$4 zIcg;6OOPtnJ0~qurkqcT4F-CR!Leu({WDTtCW>#N=(kvcNYQ>Q1Qi5i*x<&;$R8@W zGBv-65u;Cmg z;olV1RC^1rA!+vP$5k?)+(ug>JT5=Cht2@@t|tf>_6*BE0SzkY%i7uv71XL1B^g#) zy}`^x^`{y7d({8IyZ^YN|2?lP$9%nwLiK9X)LIdRx(D1q>d;ORzMQK0EyeJ{G0TN_ ze$=ZhAjZPeAaC~y6;o1e7n*WE0g(FGHz1v24`6n(MS3Rx{*ozRzxgXDGfSW`hkvA= zcTYV^_LRcj8)nJ16`vj3C7GoUyY^Bg`zFZ~euoI;{`pN`84btF80V_ zhWEDR&yeiveZ}N;uL9W8q6(-GeTs zP|&?8lf5ls6mQHX`Zsib=9>yValT`&sNqdLt4R6VQ=G5`cz1Ynxl^U)M#vevQrm_+ zvFvg$?DRKZ@$+vco%g(1u}cj3yFL#jZ@&bq$+8O^#w0imey(tPz6n}Bx*?{Yx7;2j zcL3b#h%8_CO(k!o-4QK^@WB;qpY+`pCW>qONCk5b%H)np;{KpSNN7c|)+;QM&QkQt zqIP$v82svm(I-Uf!hbE}-%ZZuFR*{fVy)agzXa6eln0>Kb(!8BWIlzLpuInGZh5x^ zw5mo+lj7_7Fz%9j`ZDCwq24>$%aWu zdwjmAS+^VGPBp#E?U-}&K<9@$2j=RTp``Eo=q`O)pnmS;Y&7Qz1n$+u=^%$@!2Rwjn|e$6pgkYlfrNN*7*B1z?>`WROxZtoVR@0tm3ZTEE;q!D zrDlNAnU6O6U|8Z21oYJdRt({Zkn|qw~a=cCKvpyNV|5EYbbULkz_Tmd{`qYtIAjSjZSea_!MahiJCA zZ(+?xVFRI=q6eMVgt7jj(~a*|7d{6T*pAej^KAKKg|jcOb{R8--5D+y2P0->Gl{NI z?FWpNeEnl$4?2U~J%YEP+wO4(KB$;-QUJ))Z>5nELC+XCs05tZ5bo{m~ zfB4MO2+ogpWHA?Zy^eP#xK|17oBkV|R;3rJ#E=B(qCNZfn-kvgS4-ri$K4j2Yjv*v zi;!~9#PC6{-y|PWoJK4Ux-MTS2NNMXy>{7jUyX>Va5?Vo+c@&%9Mv=)CmYuJtiIc? z&G6hl7Faf5QiJM(Z9s`4-k@mSpj%ryTu?3+q;vP+Qp@Aw!=HIld&JHpZfhL8yHM(v zuuvD?iK@uZ4Ev?IjFq`Iky`M}TC@A8{($EdF+$m|{qCUsZlK z=GL^NuD1i_v40SA?div6(Io!lcC#~Xs_92i8-2$3X_cM;%XF)>wkVky##YkLBpSE4 zbo{rVNd3Ta)GU2aOX@tGXDX1~yL&cdu))yUcsz2q<=;}&pj;yJpxrJI4thEI_d0dc zv`WSd?Mv$Gegnm^2oLKq9FuHk5R54vmJ(hP^L{7PlZhLz>#8mIjox0GYuO0u*a~zt z<&g~3^^8Z6Lg}N=7&aCo$MUrF_G2$w*`K>SC~N|th5<((DVOHlq{2&|c1p_J?hheB zLGZ+5*-}FsSaXp7RU;3$9Ij&I1}AcYZ{{QhR0N+&hO49DL>=l-8qbhypn;*n1M=2@ z-k?D6-4HOVFT9Db9|@f+_A|n-KYbJ2Udh+_@INOi1aJ5afJi3KyNS@j;0+h>b-l3y zYH90AyX%_J_$p3ets~53*DFNqqpK(QsoisfRr^ZT7rAad$G?2JTCp#J`{H22W-(6_ zHz;1qAkF`7i+?IW%v4{Ez-MyElfem*P9f^{`$L8g?bJAR-|-}YtZFqkiny&hG{&US zECLc!8Klri3LjW-P+HfleueoGPqyXVy^~Q_U+ro}r^s%;=ApJ1B#^}(SV!j_kIo$_ ze?h=kkb$Kqv*W+ts-U_T{K9eCxTJ2e>}9praagEecv}-yh2I&-jIU)RPWSdu*UsdI z%w{)n*i$K-d~vs>Hy{!16@rE@_j}(5^I^SLUAa?m(`TE9&W&=bn7s1Vf$#l}Th%q* z;3=vxH)jt}sC`2x!iV4KifPRUrZ15!a6exOlt2AU6RY` z#txpF5tb044BYA*?Xq_BH6FwjI0%Wa5$j~>P558}TL!_mB+*-}_qUw?N$=c$qQ*C| z?ibYdLkc$NOWp1tq33yBt&@JGH5XQUnQ&UapWme^esjoZWM7=$9pwoex#SVsi~w>t zfWns1t;S3?UCY#-@eZ{e@V8hWBjnHK$l(u?s+M-;Gah*mX=)LQmI4jQi}(_|HpfOD z_{B;{@$~kKULAVB8Ok;we3*{N+wJerwQmJ{3G1#Fno{4iC_5ir+okmO z+i$Xrynmq7Sz1zL^f1Sp7$9%8Tt)NPo(A%;v444taoSbMNB-!#SmNe9_63yG5A4!p zPIjRBR)~>G|ZugqiJ! z?h73km9yRoql82~G@jOj)uVBxvf-(fCGzVhNH-yC2Yi9UXdN(M5%I}yLzf!tlZNy7l#?u)Y1%L4kSGB);Q=5&HN$~c< zr{;f055nn9o3hk)+`**7JKCT6GJuj}?#1Ys)%}J~cUTQa531zb0&m;Whmo=9b0hY8 z`n+_MkGN+{Z8Z;HL1^>ep~-gM=~!p`aLcVL{W@CYx^Q*JId?gl6Mc7hK`S5f83nk6 zPE$}fTP?qhzYmo;x{$|ipA1fy4S|1e*+nd`XLI9uWydL5_s*T#>*723lt-NYk#5eQ zPuBZY#D?PgH<{0rf85YCA9(ZJi?!hjYIJDh2a>q}&a7MiP z>d$z7J$>jYlOnnKHY1rF;4E5+Lpy8vX_U~pDSLR9$6@y8#zTo8Saw=sL18R&hMJy> zNzVa~r6GzDDiGS2p7OOzdvLnvjpMplsO7u}!pISfZ6m*zRHZY zBn*x?_-De6ds?FHTnzMa;th+F9y;;hJSg_Y;dK33)cHzz!4pdKdpV(qgX_Z19f2<- zd^1IC`6pdr;jF+;{%(XF7S9n%C(W`jt^BnXDz5$HVVd)V)y1g34%AFZjWZPaaX#K5 z^ZRk*`fL%s&{Rj%%2z{zl6e$6jE~-lJYf&S{r3m{0_nH`^y?*@p1Z?`4b2eR1E;*9 z14I~3wrCKk2SY+%@tkN3a$ARPe9a1pUxPj@dy)dMyl}d>2?21sDeXD1mSC>$U5h&? z&>=_Y^>NU>3MEc4UsnmcisJ_Oz*8D?Xwsg*p{WmV0v_Tsc^^z(jt&$dZJ~sayo7{f zYVt(4U|Uj@74oT%1ZA@2rj@$W?_cT+%m}^M?d_0*duCP8sF@-W5Z&v6gP}G0(U&n2 zHWrD<$^=ypTzH*l3{hx2m~MpK z-xc*;Ka(ujG$5Igyx?XRi8|$Jglp8}_Mcu=@tvz{xKm3&?$HlHC*?)#MSRG9q5vb} zG#PPn6xCST`=eeXg_twD`kW9>{Pz9|o01Ht8T4kBMAA#XKG3gz*Y9l=q{UIzcG%Yo zdb|T(Qo%QSjAH{?`Ws)tVg9y|ckYk&EN@!Aj^t}|APteKZY3m3yJ zU`qaSgdU|Rxe$-Wp&sbs8zPOaJdC-iBv1=N*yyO&XTFD!% zcMtv0thYNyUwD1S89)5KjSaemj(X$?%Hm98k?GB3io)|p94vc_Ft5n{qr~gDnFb}P zrlPD871@BGPr7JXNImwol$t7{lcfHNlVOhqT}CYgfmh=YXS}d>_ zYQRlGfH8p-E_m~vZ`X%2TJ7WR+Z&3#I29m6;i~zRlCq5HS`g-kdD$OF5)kTW4Yue4 z?HSKwwfsNYd?(;&$&h1rC5QOL+DO<0TcNEAt7m);$m_zI~+kqRZL7I$ui#sf3if#p++N< z#Q1*SHe9*}We|VW=&CDHK`9|u@&`a&R@&r>PZ}<&yP-+ z5hNVfTh{#0TXc1QBD9sF)=(J?!v+ZrmoCRD{I91=CPZ5T3HeWX9v=-`4yTa|4QR=j zU*RWW9k?&q%|@x9#*I$v8g49O$YCL+CZgq$1EusvLlcz^EizYRO^aQ#LI}ML) zUR}z|UwTvj+^jfz_&grtCt@&+w-Yz&82jw~p8j%4PHB%E1CGP_BGC_E`t)9AN3Bcz zk?s(Aw(S0mUx>nDJ7qG{NS5G-td+ub*M8aaS8bn?qg_m{GN8IHfQhZtAYOL%%OsWq z5@2t9Cpg=?Fzy~68#!luEiim2V!yX;%6Kma7Xd%|;`#SCwVI0d{~s=XyfseF%GYJ=vFcfffLat;zRI! z`eijI4w-zHuZoDk>Or$vLg&t!ihi#Qv+Ki6RjTO&);Y|}+YceF%q%CvjBmmbNRGWS zPV?--@&gQo*+U`l^jqtU2&65{-``&d` ziSROT*lJ^Zx>&NJC3^$MY5t@!MEZgiJJ6YLY_6~R1%4t-;uUwrHQfK2T$!Cl<%VmOqk~p)wV?@r|n9>>#*l| z936X7!0w(#3*X7GaB8vTDu?#R7xQGY<{i#hvN0HK6?wgy{{4JAT5#FDi`i9;kF@TM zqCtLa!gSvZW-+-*^T27lDA&s4S>0V(w?zT3{cBmZULt6i4*T7A`W`(OF*!Zn~@Ct9V{{eD<~NdB4_i z#u0(l5{!s6^{F@`4n!WREzN|XTHAiW8cHv z(}vW@DPg6P!8|WMFsd)B&&FVuwbOiUVXL3tYEC&{Ga7bF<$c;@aK1oOZfIQ zyPXv*f{=O%O<}d=WNf53BiWSy+!Fd^%V`hUok*ItJRz+Fu|>j^GDxRiqEe+X+f%fn zM?V)ZD?*RQZ|L1AuIJ5pD05)P?b1%=V}|E`?p{=yE@3&vv_uWuWM{I50dT*JSMY05b{6zS=HW(i77WeJv z4stXD7`6(zLKb7aK}xvV{-_xS{@IMjt4;Kj_vD#lqaNg2kO6zOMK$nfB?a_**~xW5rNJj)PHAnW50Flah_&z9$$$ zEi|97Ut9{VF5Hhfy$8iOC2+*z=Ow+OpB6`s<(L8izFhoa>|fO^hnCdqV-nN*eoy7A zJ=`vfG6)M9$jKO^HU(feNh1+dAgPoMT^mE1-C-nR%E*+CO za;8MR<}ZRbf}FLfeITtye>7-~&Bq_FGWWL`p9&X6B@36+$ZFaKm-f)JN?9>VS{7;S zdephN{oqNZcApKCki^!>aO(evE$f?oMabS)RGU7Qwl4%$N>W7A~!lN z$XOW^F9sMz=$C2rg}r{UbK@Ne^?zQ90=;I>HiKqdIPT@p%q0+574?AqSt%h7z!&1g zv{|OtN~6_B1BL#2nQ~o4@eZopi3_{NCiHK$^>_AnE6WZ%Ii>sER$H zi2^ZQSjB4J)mDbey&q?B)+tV`BIT~}?drYzmg*g`VgJI&i)EFsBRU z>Rl@-eeD;xSClhs>?&%g2^+44Px|#Try81?z8uqa&-TZwgvQ~$N_FmEpAe`j%XwB? zI>d8C_gpXOq(?qM64=FWtD5DCSjxkcqu>}D1{~VXdB@Ad%!KLrsLwLL#Ax;!iQrNG zSK8}RhKbqXXtRPFS*4(`5hmL;-K?hC{f=s}LT@6~G^6WORhVx-iI{FD`NHL<|D(Y!AOPu_v}|+qP|-*fwUuNpfQ61QXl##I|kQPJWqtzx&mnz1H)r)!o(AsJ&|| z=^MO>W)+sk4Xu~xEH@lUs>vG^LdxpmGv{oZ%48I8t3s+>uLWd86zF2pV0h5IIZciX z>e+{qaApk!%Nge?b=0onehiojZl_2=@Sx(Z(W?CwPo@6S5gUZ78%*p+p{CJVCzIPXGOLNS``98EkW z)uQh41O??PP)-a|nrveb9ue^#o4TTJI5%WfoT3yVEjHd^L;h zb&Z8_2z6%h8eDI<80C!>WL78#8AvJiS1(6$)%vIZV6t#J`+KJ&=pGwL)0zn|86h=*Dx+aeG^v?-usqCB6~hFO^>?Ns=_z)yFirhVnJu)krk zU39;Msf_2<33-ZG$KCAAW+peU_hIs%kLaA%(+aBR2NuQ$Xt^yv`v;(8jIVpnpra-6 zAb6n>-NnP9Af^aL7&KUSVM@m#-`?!xE7-as%iUT@E68Xt>LrdB%C8z;%P<}l&hFXj zhoax4FIAr;0@qL7f0k>fta$t3zm9?w(K z($b8mzy)P@m!6GkYxD8A@p~8*Ri=)k2Eys7ONPnF1`;xEGLDXlHAC2&o{pusbsCR# zO?}&YsPdBt8^fd%+;j2VqhCFGo7>8$9~YvHZ|A?~ak4&J31_qe2G>x#!R?RxCc5dh zN(m?5+dQ;1rn>_Clk$YcKIISUmhkVfQFK{LKynUDU`1Q_Ke!Cirj# z1-8d%F*hQzq`^mWjHd2sWjyVsC>uv*y2(o@U`e>qVkdXfAMej(#GTU;C$y**Ik8(8 zNKOEdH1@lGX*krf$6&4NtbPIpewZ)H_!uG;ww?`lpO?7N zc7ZdkZLPnp=_aPZNGic!U{T#m)<{j0isSWBsfY{Qm2J9N@AoN=CHZKK`0}gvkUntL zw4)3f5)zUd!AS6%+SyG(c;TwBdZ2A+z)a!;!uc_iDR)_6%wU@yxBa_s(B7O{I)}~e zMURGnXG^(QMPkS9A4K&|>c#~E#v~UY?DNC{N+R|$RtSeY1pl+hwQz$N7JQn>LPUQ zt*npL{0ThrX4}N5B7&RaeZP{PaQij>_4j}6Ejs}Oy8hrL!fAj-O%RFEV@-ny@_quC zsTY5@_x*e<@a(XhWly_@gRJFzzJKiXiZ>6HB&SF6*X{{j%56drtYu_@1iiS`NC z{51IDS74#0V%@dBEdI=)+O6z3cVYNM85)HrrykYzV?^To(xbJD$eFh@dVav99NxZJ zXYE_G4pKH3P}IeuQ`M@t#v4eP{?DnWG!g(hPli71CBzNdq9qksvYHZ6ryEF6;}V~``=1B+ed z+DY|J=4Q1}hl^07_^(R@)m5@Pn=onMi{E-{I9y_~;qM(mn`YI8qTS!hy5wEo> zcega1Z@@uX=tjl{ptf0&;pVYm|AqteJlwU#$v>X-M=nWq z5}63f2da}isLuH!@ViWfGyCy$nUm84V^pMD>9v2BhK4CcSzRXs^-d&8NPGtK&Y37$ zw3OiKn`YK5SEq1qQMkb+&6RUs?KR|2$Kamtd9u&8gIl;&A1M>;)`5&g6~E`R37 zAk?oT@cj?V3K?bGn;VIFmY`=uXIkSl0jASp=g~q5g%-FWZA46hIon>L)BK zfd;gPHAH1rzg|BI2h#8ctsREX|4@YFg(rjkRg35yR^Ng3I{JC#6Cb%;ekOQn>;nBmy;>9x2B z(ja-Nv%wSVlC%tRcO+W^kKq|FIXEAKdWHQuRD~S5 ztvtqj^TN+7OJ+V=o4dQrU$hqq*Fm7Z=Clm|J=6uo-W`VMcplH)k#fhFI1~L5*Y8K` z60o7o@lbk2DbbTzC`#!Ui#+D(p6NnKxW(gvC?DZkh2KGI^ltd-pBU`h6-F3|UbI>) zv7{1FC@LUlXgK%jxcME!-t*_;-(QJ~C&~hHMBH~2*9Hg%2|S;Sxv;x$3t(zz9KYN* z4g$h3IykY77rA|I1Q_ZLXX>dypJO$UQ zdqLA>*qJiLuQsG>vDx3hdU1@yg4ce60gr295hTrL)-FU3b5m4uX1PAbRJRwGwhq)W zLMqNQy&6;q4Yr=#+0`}Si*^XDGLs_OggKi531X4{{f3>{PR7KGRlLfb<3=Y)PqB|> zUt@#XVeozk|6_MT($*Gje^gzFA*D+a=HD4h-u0-!e$HVbYB?`VwYY*QqSgNVdb2Y! z26wzjo|;ujz-as@!C7>oiJ=|aYEw+nS%)}K5KZQt+2`15tx-;(uX&m#e+?yVFJ?;WennJ~zg_%({}t;T`^dmr(5D@4>ovV zn(F~$aY?MZQm@cGx0-FgE}^^*>FiKxe1uIa;lC$yRtYM$*1DQ~@#_Of+;2cFF_+M! zU_Mw_X~9PnbJr7?8EwvB^i8Y?nH+}0JJ==GN$p=HzRS>b#m z#YJZGr`(JwevfHkHPBP+HIFL#z?GaCo`tzR%^j{z9+l-`9&WxTy9ZpP`T5cz86QT# zkTr0PjSWcHJP{aN#6!^ZX0Adu~vXZx>pqHOEZ~nnywyh<~W=Tl-zHkT7b`*8l2=?a$eDa~5m!Er^0P zw?6H2A#u>6ya1RJW|!&A387~`J5#H)q6EX{aG!TF6&NP7Z4ZNpnvvsqcRGKh<;l~5 zWomO{q1(Pt&%?Wrb(eB8^rg9zeKz+!?R~D|G94mfmW<5nHSpK~8)n<~wVoa~us|#M zbh7aBK#ANE-)2G}cjh;Jea+2IF!aOkj5%S&m`?7qZq75Y5Au{V|v1OQ4(L=FW?tNIDq({Z-%T8wZSq8M#NnaPGu zw{@aQPVyi4D-VLj&{Gcd;bG2tKG^FIjNGyeFlzVK9-sf_<4W}h0j`dDK%MBcN*xFP z9U$6?T8)}kemZ7Np#@8yCZT7uyb6PvV~<8%?LR~l0C`K$2iPu;2?~81e$C-z*V$^2 zGJL61FA536Vc?7ecjPYko5dZegT2mQhtO2!-FqmT1lX) z554M9wRdXcF2|nbqrw{a2sGJx05>k+e(gr22xvj_OQ5FHtqtAoTzs-!G9iF&-LE-I z;|)v-KMw|szAQOfdRZLkvl7%%?0>jZFs>oVQ$P=?-p50aIf=L0XRpr`bXm$!{p5rV505gXMlQ6b#xzlCwW3qBdSu_+P#Q4!r0mQ3Ihz z@Y05fb=*Il+N1b2Bc_WtxBZF@r z)w0dzV>VGzX@#?K``7C@f79O7$|51`E%Yl1*9wqd!8SPz=8DSPB_YUVxWzeVGZ+mA zBXaGB))SO74l5&nXiCa;oiIl*cDr|_IG~_Iya=39 z(J@7!SvP2r9$e^oviO$6HndTYpTmrq-dgZ~RA`LOTEtMR7SgdSx7C8aE+KDiHTm^A zGQZeT$}^NIFQGp5`Abf0!iO{S^my8ns%vc0w!D*e4=aV56f*esBn~g~j?a#V0C1EM zEkY7EUeON9Om|Bh0+kOYLhO1Vr#Rr=f!tF*k9q}van@{dS<~rMWr)vosTnZ`;sObIe&-OinE(GP7M;Qv=uq_MnrCrPynUs+IEkQ}@G> z1DpBuMNn!?s!UsLfmDNoM2wC>4|spyG&(0H40akOS0i&mcbMXgyb}APLR|x zVh-oQ%nX~=To%mwsS2WxxBR8_U597l{hH_gkZFYK`s9*FIhvvTYj7ynCK(T5)|c?{pq@CEsWWX|f!&R#?~c;Aocs>vta)_uiNzT#ufCT0T2L zoPp*G`A9v}iWat0f_+_&ykCogrxZ0#)g+A9WG;fG1DZWAAau8v3$w*BoiB|j6mIik z?gmnKZM&_jFbl|9t77tTjDvjQ)0>Qpx!B#@Gr7%Ho-sPQ z?lQ`Ii%AL^jfpAu^J3e_|28M&OSZqq>~V0laKr6lHNOzSc=2mBnRBrN4<9&pjg#)d zH==W_WqH^1t(nel!`beeisE+&I0yA9)L7vkITsN2m$>$vAEvS_P_teTb97K{Nx`F+D_(uDNDXWgaDKr;98dkk?JI(aDapUSKY&wDSPV z9{*r8Z!kPj*?GkdRy00Oh?I^R%|yGLh5kf+yT^>Z0<@U- z9U>#c{kLtMuy391pK8#~rZYk}x`*?wFr9jOihpm&XuZ9tObY+lbZ=9dW*LJp??f)! zZJxM(cr5AIOa(ZDLgC)YrL!3*aG>l(d43ULbx1X1tvPdQIMPa)=4a&gB=I&&{0f0q zXc7gZp6D7WJ3Wqi-}Pv%!mpcPmoUZk0eZ3K27&Ia zuNpQ?M%wgm)MqcLd+Q7vAUc77-6}Pg<2z3`(s{FL!FM;@Md1;BG)QU%6?TYcSf;t& zu9Z^@W?{xAF?5gcmh+C(VkYs@_^DP+ZQBiNAPFrJ?V`rmQe9T#7eN~w?lnG8S3G(k zKHk0{BG7oAi)-nRWVlK~q=qi$Cr?#{ip*XytQ_@)Qu+?#CWGW;^rRNDM^KotGPveZ zAEkTrP=cBkx2ICUTiHz#EqlI>X=t@`W*NgDBEbaHzw^yOWbDE;>UnfS!bMeKpQDK~ z=AJ3egKtGdGe=Qs4${(^9*9N0_)NOaP7?Xra`7wwfpFiEKUm6Ll-z{6;EcTZ>2L^m`kRLj>;cJ zvhd1S4^nYAGA0(zM(_T}nP1Mz>lf1%Iz|L@6q42Rl|E@K=^jPvbKmgPUM8Nknff#M zhf`F8t(S?jN$6vt!TQHX(?Fi>bxI``iVOZrhM0na)!&--@A=;74F0#(;*%YglBG#i zx|Y6Jao*cjr!o;5w`D#=q_V$M%82u-ANvNmRMv|&$~=EqA(W<8kW=u0(HCq2SL2?h z%cN0BCNoK37{BKV9jxw{Y3J?!7PA(jQO;F0b+&WTwH_OlG?_9vylkWO zs&6-=b49XAY4oeq4;b?4zvCsJsdSLe)#q%EWMoTt zuuMm?%ds(EPPY@^$3FOaRFLvaipsoowf8oxZN&0)L0P?@Zt?$N0dT3h@#?OwflcJbo=nUJ6E2ir}4=86OrG2cTVpZgkmj zlm;D91B31P+*!+MDS4*n`JOg{%mHx8!&RPt64RLiWhKhZY>`E?UUWMb~Io_r-Y*h4UQ_eGb;Xbx@$c~NSLz~w^Do^vQSufbO?|?;r(t4hgNK}I?TT^e(Ki!3K0KzWD?GmB|n;A zZuD~qV?N`$oG@6(U}AEVM;gI)P+f&&y97<<_D5Rs6^3tFoU7y@vh&+^7qa%co?2c5 z{b=IE%eeba?bgQDt(GJ#V=^#0951wdamSL@^RUZvz~G2}0Tq>oJ+c;dw%Hy! zBd@nT{0$?xf97-)QEF;y&rDoy>l;V5OOcN%`%ArPR?)8@KUJOku(Vl$0e~-|ZEk?+ zN08&n_;~~x!f=Un{)ux0ndH1_KV@86nLq1=c*0O#LYemURG1rL%NoyV@X-YIuao`W`C%1F`Z3alN6*5U2b z4TA>0OJQs0PuWd>VX?`ixmXZDH3u7EmC*5JpxdCiTU*y5X!5B{yDAQk(%WUn>5WNJ9Hl$)@_Fj1%Z~PId zo|LDAPX%^zp?&i*-@#HeY4d|kbP!Egeeic+oS-~ZL*8Ehu^iU^Xt0JtA3^5uzV|!! z_F;7U7KJoS_!2c-6=D=gP~wvs>;_`Ih@!nUNjS`K;Pgpo;>2u|W6lf{WWa22Lv~}H za2vaA<}Ew=OA@C}L$l^%UTqneodoB8S;%Nw?aVJkf*%21^ouTLbIdip1)l1B9Te53 z8{hKr6P7%-XoM#!f?xB9?zyR7_;%T{)()lfEe^ZZx~u8u0}K5Q>fT1h=LpTkc6dZUW%b>MgJz5 z%Hli!T_@GG2M-(3prJ%{0(o?x!^xm7*kW5Sp0^1dL%p4A{r;PD5PY-G@2+%`PkUh3 z3{M3{LJeSW0vHjVG+(ORVd?X@zSeom`m4zyHvT1}e$G^`K!+rkBs?;bnC}f6f(E@{ zUAC*OnjvaxRyK{p5534?ed}OeR!_FRzz%e>^ftjArI*2qA^r-;Sec4J!C2H*vcd4` zfK(a(@Q8fRMsYD`c;}7Y_3Q&&Y{G9HjQ_`ShC5ZRfc=q5kqRDj0Cu!e!Tgz#ZA85& z;bw8Jj_K`s`;1#JxhHx{MFws|E6X>UOx{J5{k73QsZ|Ci73}j)mcE^isGMwEiXEz5qiu^IpoWofZ`E!2op-Q%$*U9e8dH^y1A*imE=BGe;n3#C_Hr{-YSIe?K-0O=PSe zp6^t8smX47fPk!3)0O=f)3V z#ywr=hkB+$s+@9@r-169=cl7Ya|F*Dz|~VQiU~dDSY!t(4UGH~6%r5c2iXsjD+o&A z9vW5c(n9fwK07$-zZFY#7#-|Co&Mtl=F3OBb$rLVdBHEAuIR#p#z`z|h_@Mi@91JB zHF-ep<++86s1LhUb4*#T-xT}uU^FyIMy(U3i5ozJ&MKbyo?+WS%PwFoHO%=&z-B5& z4$v&EUA;=>8<_iWB~-8i^b21Z}r!(9vD z#Iy(Bnz5tX7fnL5*$Cy??#N|i&pVuI@E91s* zoCew*{e^7=(!P>FP7Lg@6HA5zIG@E_)^zvT@l|Fo_<=zD4; zs_}0Nr-R9d(*6D1N2-snAEL{6!%=F>W!=Y_7q0UG)1AoNy-CUrZz>fp;<=E@uPjDU zYsRb+epOJfVP^gVR8nqpgTi@1d;P;5@Rhzo#R7CS@SI<+z+CqH{08R&M-aj{urL4_ zGgF{kroPthC`a%0a;AMzP_|eehV-E}ba}0d_hgT$?q{>JyK4h)@b!`;W&Px7WKBX& zcSh}T`7U>90Jf>m_#q7&+VVK{JjI<}P|J@UdWW=;c&JM^&4FBJCxxK^Vb2%v?Ul0xGQdc|)NkUzzj`0sa zi{I)=`LhR1|c0@L&?|O<7(Yvau*^&4mYV$__RH;|U)!C^p;ZciZNK z-2!mSCX06GODXxSz1pqa`>-3|96|6jQ#K}yd}M#*Vu-0pkXmGM!jRVgmKtD&a#TpI z%~z#8Et_OX*-RPVfJ?Yq$uBqIUy6TBpYggvb7ETPa5xC-c;i5I2@X)Mx9;qac{6lH z=J|~{7G9etM_bckQItF`uoN7k^St>22_^!%9y%kRein>jd1n)NAWc7OV(-K+tyJPR zwHMXepAWu$K30f-BwL=P;3A_)61}!@_=5J%Wvu`Ow-6-S{)uy%FaZ zhNxO929wTV{hNdnq|PcyyRix}I;R#|NOjvHW@0p!!M?`RsOMNTWmzAnd;=PyQJSC) ziWJNQ_y!^N6h*Mx$ue(OeGd%C82DTBTFq!kkX2z6Fs9;8{{~!>RQydNMfthRu3)IC z%)k?DY6of6ExbmPL-9UFAi~ROR@4R2tsBaEV9LHAd6{2e!pXYOH|z7{dt$gb(g;=* zo2ng;&zF4(pm8zxXLr7+%zd1?WV&4Y9uNEHp~#gE{qNgw_SHEU5}&?HO9|chLHGw+ zlh^Fd>?!#W{rN_X4f13S4E|EwjzS29y(v`ImXL@Y!-VVJNhh;ynL%b-FOA3sGsZ-^ z_)31SoFGpYIg*d#)(RJcg7u_kct7>NCTxYCVpH6?6w>DSU*p{&$C5~KZ*W`(@Y*j% z=NrD;n!$1kVR#^Ley`&gy6+>|FFe~BPw!ieg~9v9Mnr!C=b5ZN`a1gCEBPQnKlWd^0uu44X$ z;J~0Uad3fIJO#q`OJIUfhC z?SmNdcOy|kUo({ox`beAQ_RUwL=?paiTH1IRD>UK9>znXM8q7BupdxC>|c;C0U{JR z`LRtw$i6wX2tD(j@JM7n=&0`g7Lwbp7KM4(izn~&t(~*J*`l1l(NH}KN?uCP%RLST zMx%9~MK3O^*)sH7kM4ByI-3Rp&0Ot}XLZms>!hj|0N!UsTXe#JhckN=n+&6kLx)9K#D^{~T6O8R$ zT*scSoWZSBMJ4eCLki z%a$Yx5}8IUlllk`8$$mo{acFx@w&g%ss&^HAI3nfw*2$S)JczL?3ped77J)?Bc_?V z0`|vPc_m?;?KR*{Q*B^bS)_F%GQ`k6A2d$njfp#PL91V~vW(5zf?W#>Sng zxHo&Bfj#$|I2+$+C20Jt8GTY>SgEn{lw>20wI8NLDtSbV~#<=D@Nn~Y7Br_$g6LIv$ zuBa~*W}p5GWB|pQtA-XDR8ld9UJ)sW@@CD|#sgG2ldCA?c7!7^Dmaj%IzWH0v(oIP zgJe3eH*P{uizBYYXz8-`0X_K`6Xf6&C zW!r8cD#z{!$GfU&iorrWsx+GPqT@yoEd!p(ha6G~53G(`PHZcBfr=1-^cVE``DC^0 zGqDtbkQIpufqlyxCUk&Kt*bf#tR0I)cgE)L7i8q;?7@<2K6j1}H^vHC_MFKKiqGPU zRj-EJ%d<@$YuWd>?5?C|U9mlRvf2?}zOq`be-Op4NM>N)k@Wor?dGovc`~^d3&c- z87CSAbsY5UjR(5~^&6Fjt4HowFQc}*1uIy4O5N}qUDM7%4OtUH1)r`-Uh{CRRU~(k zku(cTlJ<{dXS_CibfL&iKJioeJ zWJwh{IG#CSc&dxSnW4E=8m@p-Uanz}YGw#ULR7j^1J+qp*jm|!ZEi+QNg>*xf=IG} zNLOm9OeC&KoIU|gIAFl_iGspBRa@Jn)cwzR`8QWOKn$Ila25+_4qg~1B+!>#X11s1 zRo{d6|6p>+aULY%C2Akvunj68OTy7IHAEEz#@piLFdxon66EsM~q6X22i6)EEHTMrKeg9#3{8P@fN0F=F7Oaunub+ zV4f3L4Nnf`3YDPOa?`S~P)(twBdrAXbYdJZGW{7DC*q|IlKb=0-s1U!lxuoVpI8Tl zy6JSL%lX4bR>{;fkH#8E!5DT1L<6=&o<>`at;CTQe@cVna>xx{5~5hr{)_kj>}Io< zNGct4v%%6nuoRt|N(Bph!_4eu)^y~`Gd507^_8}Ees-W-qJ|cjcw8hMn!$0~ik$Yg z6ddVr=X;o;P~e+@Dx>k8t75Qfkqx<- zNVQb;ym6t!P%l*(Fo0Zf73sZ*JDp1B5wQ%3K13pnEoW5NKOvXy@CdVQt4(A)d#Vd(`Yy?AFAE zbegvlF=z`ps&N&bi%`IBPwu@Bg#`b$v)A0+k#-Jv+|FpqflKicv5M&~UE`~mT+M{+ zY{~9RwL%SQ<+qYO*U9D8CR){l?3W~+?Mq^yrUuJ(&2%4h6*!Bam@{8T=v%wo#s@{c zb>3X-OVuLdKR;v?E>n(x{MQ{r;o;|!4(yp%T#}9AeU4Eb|1nKLiO)kx&6M8#eFW?P zmXmSxfPHcdMuNU8)Zu_)p8JGMx~%nZhm8xFJ{j+c&xnK?q~*;9oUBZYxTlE+K4Wdr zj2cd-@=)F_1(McUIf(%w{q{5OsDOER7jKfJy}#u0V}I}goI;J)t*5V)aX?HK-Re8q zaCYS-dU|T6EA_tcsW|4w`>#C!e7SZ+w4tH!bC?Y$B_&B>@sixers*6?bv3Vl676iR zKIsZO{lC#9stb<;q^mL}Hg@cvaM z7^ZxsAzMG)6awHR>`eEkoncinKZw15!>lyu5I0@WwV5eQPQ1O|oy!q&Ht^x)+(IdN zB$%0-JV(0MJWxl-T=}&dw!u~-@^C&V43#wE8HbEGQ&y(+%ye5Z!(-x*v9}k6Ho`?c z^r3$4t#<9)+#Zn>vmsDQda$CH(V9e)=r^BYnzhkM1stugsB$--d*-H6siPVS-+q}d zTZ@tR(~i+_h)S~Jh|5W7xj7DAumHN)Oc&>WsIR1pM*Cm;;qrU1KKdWSZ7>nl> zQ>J;DkotHKos1*92Vo^weJ7Umo0i`+?-xZ zA+%^LH5EJFA(~O|69t&j@gtFJoj`oQka!POj#m^>`ff%8G~P_|(L*;F#8&_OHz$3C zZ1-i)s2xtoDUl2Z7GaMlX!b@z4u(?&sNSPXRYLKbOFyLdFUE5(PyNSu_g4RLVm>yo z0Da?fW~u4v9gm}9at{-!$h*6$Nh!C3EII#J1?^F4=0ORv!%ek2K1#Luyfl6|n2idi zRi_ve(Zx`$UxY1zB-!zUTDn)FNDoNBbUvRVqk(9qtw_T&uQq!#v4V?HQLFb2BZgfDUMm z^cXZxB}XwmJG+PE7lu;i?MkhhoT>`)}7YmFf9a zg~)983LVk$100^e8woQe{%|p~@GDPoUJM9SEs38iN$mO94@>QI!BSw%8i|Qx9mv!DwLS5?)+8LlYru34Or>|*kSZnEZ#^-^ND8N z(40gH5+oKn2}!Wv(X2xmYO4;#?jKPK@N%%N1xuUm5)dr#G|Ebek&c8p)8$W!IKcUi z0dFL$B(Tt_!G~CHv5>VW$9i!`oV#m5%^F$Jq+~n&e_qdyaCj;!BI0clF zQ^O%B*}gDhVG9lC+cxR;76KEyr7}i$qB%G2ARp7EH(R-PDfSKv4kD7S$-R?X7R9JvR&_bw7vM|c7efysPkZQ7PE2B3TQ@-5z%Z}0TwE0JN zsM&G+6Z^Tu!2Xd4W(MWtkkoLY;wc82YN*qJF+4eM715PHxUk^;!Eottd7IH)-K6hPJGy(`wXC^fGmfWwEXAr~FgkcC zujh}n*};~Fc9`r27gF|7A}RAC!py&ky@)`r58$6yWIV#S-o*rtA7KPGyy%K1*|A%E z!DWv@T1RpHD=<)B{IMj8%)@jYIfHtT7d!5Z$J^tY?gp-;8<)=@!a>Gh(;ACE)S`zH zuQ6DHCieUI-coA6)3Y(nyd)mU(MKmI5Q(%k&{mDW|ITJJd?sa~mf^iW&Qs%}Q=-z1 z*PFAERNt5lZk|tXCdNS}%<0M=T=?;lY2lrX)jShjZyybbliB@65e*ced$ii3d>&`9 zNh)SRE>)hL$q@na_wn)-3>++iMCm-C_4o1_9a}QD@I+~kDPXMXCxjV(6Jo}3S3g>D z`av;BS$n)hoK>jJVrr{C;}Km_s5XZ}$xhv_FnMJ+Eb~dAMo>j`c{e{bPlGz*3~H%1BGMjw7`-)t>I3g2w>E z=`z=;b?fj6#n1LT5wrL>MGZ`7-ZP2#20|O%B$>;dlqsC#wO;=Z3oweai>+!PGm!u_ z058g%gt-SuqeHahHT+^s@FD_sL{nl&j;?y$EvS=$ImITLep zV#C#fB&_}}R8V&uBp%Mx+J#hV3>R@fh;n7AQcg>xDjO=%~LunQ85)*Reu!2}nqh1dQ zC$;`=KUc2%>*P2N3%`brZhvS@E&`qiMrsW9mZo5R@1Q?oEOV6*YWI`j9BV$8_hIuA z6D7&IZvANLg!N^?)2Ap0Iy`-i4bIy2LcDGP7Ez9yy1k0OB{1)r;VA}3BC{R5mb}o? zYhw7a9Glx3++XBYcBbyp(|1yDt7f|3{7IC~%ujox$ui<%Ii#{7T}gm5l8*(t#VSI7 z&#cp+4VYAh^uzZQt4U?kK9>4`Lj?s;b^ShSa}BRJE2tLR3}cWfP+-$v^=#Y2z8AGH z1>JmG_q|Mw+Jlo0Fuvjd-Ci4`tB9(MGcuD~#cnY;z6Yv++QcXQM{2s^lq89JJ6>$7 zc5z45ul^rbp;5`3n=Ai>zzx9D=L$#n?5Wl19gdukG{}QxZ!4%h9pY}4xro;efGiwX zLJp!%c9tD8Om_M^UrNXD;JjBnU6M$~-`Y1k2!UnFp?0>Aa)b4I@pSrlz6ye!cgDQi zqu#3w6VYEE>!LH(B}dT_h(KAf;^@1%JR9$-@0L;7#S3cyZ@DY~^eiM&y9UEjH&_|k zWrT)Bc?T&k@NDj`X2YMARR>x3wr$i3m9bg>bZMQ$ zpSal)_C@ndG_q4vNOB?OQhlC@X%sSxtjoh?d?Y4&&^o;t8eYsnCAiZ`6bH*=p@|)a zEkHyFsbG@``onrOeOljB8KhPwPUF@){;cj(PCpj6XAXPKRY(Ep$}@in9xFSwUyz`> z^I79TsHCj--aFW(d(=Tn6bOM#>)svRAt4@B^JsvQH$dPcpDQ5`tm)rCm7QBc_hB^B z%>V8B%Zz$;qYey*ZW1-`OJzjy;xL1MyShwv^wt6}CG6w7W({HXwv z-RWR@=(C!lF2Ay04f`i!A|ZbR;Ah7j11!H(YP~JmyhPi+QS0B3(%`TZPp`|u3b`aX z*Q%0odoX34$#H9_uS}6l5&E>CuKQ=m>)hJE)m!2(?)s&%G}458tWgOG{|NqcnFNb% zy5D?IPuGqh_#ymbBMd$y9JrRjX3&Y936!z1b;JSHBq!Re1&!Wv-dwGzo-_>EnD8w3 zxp2LaEoL*SC-KE-TL7x>sl&OWsn+2W(|v(KP?JuUm&6+Km%&gxEbQKQkiCQqq-FJw zIj&#Dfw9_BM>z>pj>p#t9maDE5NzRWQn7iWZ51U0PtYwJM&bAJPnmPj^be8%E(tHd zrwfXYP58vXTDtXs;R-p)y8AdE32rlamx%4@Q_AtYm9&rs@ zy}q==K?A)JL|H=X#OnTuCDc4ltguBH;Af|=MhjZ-7n#oJbSJ0=fzIVh!dRJozL&e1z04&W-NsR-eo|UO`2YB9ac5mi5!Rl8@`HgZ0#<-K26*314jc3RM-f7>LwC69}+zchW5&-yKFrbl?Iy*_HQ=c3qz?%(in7 zesn1{++}+(R zxI^&ZE`tV`L4v!xGq}6EyUR!RKIeVTpYOWXkC9$o-K%SLSKobC73XarkGd{ zcH=GEuANu3iwl#K-AgDcoIlYM@`UAe&PS0ifwu-kn-XNqu_n3=QkjCC&*EDH?pB=c z_sL+%8EGHMw9bxZTj;HsQnV5NzT)v*jmIm3b2Fsa`NOwlO0M6dSao*Pz_P4jnl*m{ zYL-w|d-a%dwJe+lm_-CwJZ*Z4XQ|TRt}fR{{9>1^F4^-XTg?=XQzw*P(4A#7aZ<(zUL{c+9ep^YQ!tc=C~CRu+mLXa51I_s`e z_58C#XBO^)A)v+_>%lf9m;1|Si-dj>_pV2JVdX@2)^fB!Q+p(GlJY#QD&&G94@BOJ zf{rSx`Entz5vm{}@FPw&T(RdnN>L;wF6se?;)I2!l5NkZeh=pG{_8T)gRiQ;>8_?> zmQ!RGpa=MDL~lVLDYQgtxDmg~z!Nk#N2NG{u%?odS@Vp=Y)g4Q%)vB8S?0Ar zjvQJmLx$<8Ihxfm&5TPgnmp=VZZ0*l5d=?#P@yG)!1(|lIT-sTl9HSf)Ir;v(w&~eKdg> zQ1x^1S$?DH2f@2lCsJO#H||K-!$Z!9BC5|J2N+t?z{KJ{_+qf!>E^fcFwx)#H;np2 zYrlYGfo&_*_QiP=2bN!988X(x>{nDq4D7{arvQIx!f$VpLO|WdYl@yI5K8A>9$&XG z#|oFJIDu{3VA!AuynK|7Df+`;Z~$#j(d=)pd6F_Vemyh8W9d+oOl1p!2+h({o)gi~ zx?J=bFz)0xcX2CUp`ev^>L0%MW#jBH-OV?uJc5H0f{HcE#3%AYjiFrST9NH zWl@)m7*R@8HlD{nwC-{J>ILK5(`|i?(!-fSVP+C zr$VKc?WP-Jgx@Z<4T*_&$dV3#lRV5(E>psGtzxq!gdt^Z0XhjHWvd zlFvfeJ*H(9gEbw)>y0Glo8-V(IZ;so3JMAw$4k!TFpsLGCGDl<&+D6;kOz9L^NX|J zvcvi;D*Ily+eC@KxZafeXC;6M{Miq`wdc?5Z6I2GPkOFmY<%h&f!rO&TZJFivwD9g zhXaWGiM+%=hbbQp>AzN1pYAE?|4NEGAjLeF(ZdZ3fA~kXFU)2qMMJ|p$-A!~)`eL* z+6F#7>G1?0n7w{W7hQ(;|NEAOX=i_hoPB=#{P#M$l_x=k`t|P@qEEgbv0)n;K7IQu z_wRLgX6yj)04siYlm1V6A}=?O3=An+t*<}-{r*6XgJr$MyMq=%d#hKr7|d#AKNwkHjyQ=@^&ajxV!(iL>P~rG~GOW%F^;xY;gmRn3KkbHsXQL5k1`zpgah zWHhM$^>FF$5=M#@qHj{9DEf}%Q|Dv_Z*4M=!{Fu3_b5kEKz?&XL4kzRHSyduU+2rYxZ~S*A{Fh{C%?nE5mwSd zPBA!Z#pQMB^xZYJYZ}?f6q-VPVL|^T*l~B<-tJI6b?TtK7Wb7;@zSBPqjLcTbv|vy zxo>4eh-MRa^@Ybm5pezd4%W+KL$uxOmv(y~RJND*^XpCg-|?0+7&{z0bm$5A1S9B1 z$U=9NZvUgweH+q^7t+a3G`jXQe%eoiCMn~KiDqoSdqmCvu_-Xk6HPWCqJAX7_2rMA zsf6vyyXjedx>e4pjWWDBH!cpVHF+|lFXvoA6>v=|wkD@JmQX#B{(T+;SAA3W@Js~8 zpB54zwORsfcz)afwgFsj5v5NWnIEj`1T_(r-V>yCt-<@nElXqtN1Dlm;$%ghHq)`m^F(7*9y!Oq)7dj;?PrM~* zUxCth&xzC0nvVWxgUr@`=ftr#cd{4)-` zCGgr#1Q&IU&vq{ zKE(4;_z5m)NKeKsi6`4AUvZW7m6PO_OfO1HSg4l3^He@K!Zx_CX;2=86hEF%#qB^TIE29H11S}g(rdJ;;pQm zNC^HeINS1~I|~~{GrV>ZDK6nhtV!47xN}!Yv*SV8#dM5p#4-vo{;mF@rB9T*bYsvp z?g`mIObaph7_YiSh(gyK{#Uuql51&oELmIA_iDZwl4Z-TmoAd4BTM`A_dA&wQy=f1 zCToXyaO8wK3G#*(`j^q59i&*dUQISaEmwUeSeAe_ZH(gvm~)=%x4QYokB1gK`Y2)> z8xrE7YyBgL=}fUk3_Y;1)|qp$x~rM7gDGAP&^)B2@oS2oaC0CucAr|5%-H7xt{PW;+$sMXL?!iG z6O#xHXQoTBw*u{z(Z{9JTw_gS<|lek7QBMi@(tDii<9tn`q{S zn19zGf(}#c_UM;UR%9WaMj9Fo0H|fOV%*kHMLo)@*4T=~ws^k`jPrtJyd(UQSgk~I zry>E}{8jykq^ukMfitN>p^Zg4BsuMgC-Wxdde6_7>&o%oe zZg)ILDQ+$_AW~qp{kMMK`%|8;Q>~n&oqbF#Miv|xb^~StBY9EuiqMXi{qE*k_?uIh z=s!KZ#@%T0AB)M(PBeF9T0{aOqcv~>+32WQNyDY8_>GoZqSYOZsIMc^7;o~0ZdJ6c z6#OPeZc@_ROW_OybtSoF0a&j=o)@EUNAs&nS z^8-f&Jit9g+J+mO0yH8SJNA?=`aFfEO@!Lv&tiNeU#?4e=8S#2XNY?m_`s-5nNFKm zJ)(+o6Azh$Riwpq0h$2A(mT0b38T?M>#>9!$qH3%IUT939wxR9L?-4XgX=X$aRk6n zVnYqMg;Bb2gi@HiZdSicmllK$dUW<7TJOfsoNoPYu z>neXNz0t5VRLToSWiweFZGYxPTo3Qglky9<+K7!1b~#|GbHszM4#S(N@Y1lwa^-MN z=Jd8(4~J@*`3Vd{)om3$_ddVq*3G7zT>GhXj#I5bx2x=*N-F{D5FQ1_`N7kh8jQ}L z-4lLJb&RE5_i1L|wVxvNh|7^=mjk2_pUP&<7D#$)hYDj1S{VB+Eyhpt;MrQD&3ir| zP*+rgVk}8BlO;YK^0EFcGTz9_?gObnBTsW-F~wXx`p9S#BABKO&aO~ajEL<`6%LQYYgelnCLm5bsT#Z?9f?M`|`t~yWhK^ROOWt>vKp_ z3+(&pm|j>a1mF9Hs7982zB@F+fWz28Vu#HUnh$OYU5X(UN_z)Tj+%i^5P1HG&zzt_ zGdMiQDZ2(CWePdPqX7U%RuX-H#Z)zc74l0jc?RxE4`f2QH5k{P`lvBkR(ehPeZ=~- z5-uHKy8gFCeH`{e$kQ>8d%=WZJ3{=c(<99`ks3P1oeO-T&(U%ZaBJvCr(=Y`^2WmT zLd2ooX3q(MpiQ9}Q|$Y$rZy8Lur^_^2VYycARCnijGi+$_FhG0naC+WF=Ld

    s-K zUU`GC4Gue8_U+SYeSR1*B7CDYc9g9VpCyMydphKx?oW1|ff8lH*g^7q`5H-(0FV?h z-y?nFS5KD`f`@{fRzqS;fIm)zo!`Hf8ZK125M%U z_cRCwJ+pl9UfJE1OvS9!>*9;8fht z4dmI-R^$EB5|!HFvdIDVPC7sO(Qz8oBey;8Z$uU$N+B{kC}rlpcX(Cm?L{QR1oz&`e)-h}Z=i z?Mkv;Rkn9_1_%)XD)f6iQh7||i%sAx-tvB$GSyvztRp4WEw<)dutZ9}ZbxJO!>t;!!i$E__G%(lrrM7xamS#h2FlZ&nzvA-StCsFVxU@K zHvq87pxs%WtGCSA%}sjKA!CQiWV|xHKa<}M30Ho0c4m^O2%im38;nyVOt3GA_oZ^+ zbYm&8s%EV~LbJ0J-AkdbtApJN#x7`^@I-|7<+G`(q&0AinTz{zia75E` z`vmlx1X@(_aY~E5NRuKan7djjV4I-!~tH43WO_b%Y`XLoW2WRm@>*Lp1wG|%Y;nUD8&V30YY zjE0X{*{Xi5P4nZns0MsDdKh$}98`;|Vj0i!GwMCRQ1-HWFZF@h7b4f-lc+PgPFj*ApEqEu&R)AB%MHX&1wLS zG0e#R#zAPIFT;q8nd(KW~J81iB(I1+7UBP?-BS3S?Qdw&0nRcatdX?49{6iHWaUm43=E2Y5ib8A=q3Ogfb?91sIcjhq3b~r65FC>{|5ukC`-oC zQnJL5&r*~bhs)#wqIO)UJ)L#nU8Z0+fu@)8co=07TRV9M~4#iW1t9=u+9E%T8rtr9r7dO`Z!GDzF2!YM8RGLi`VRn=uez@ zN`;MfCNIdn)F~%cLu`KUJCLHCsm%Vjsh{s?)UI=~^bz-e!*c!*QvoyQp5LR_~>@ZOT?2c}^roSDAXse(^x9D5Td|f5+Zu3_!_x zSsj}^WWo2on6v=Iq89!xuM)KwYjZ(#;&gGKIp8m$7|nKERY1Vy4$E$7I-j0fNawH0 zl9EvMs@|jYXGF*|RPpuacHXLXw~?fE23fY(-XmaK(T>bKHDWu^L79!}H(vv{a6Bch zJU**N>s)7g%@lFr(zx&FrA4RslG#Ztk)kdr=q#wFM+#N}mnzs?fXRSz6UOLj*a?F4 z?Yc-x&`Q$Xq~~1Iar4z{9q}{NwDE44ziD$G{GQ4d4I$=0Sw03T7cn0Rxqr~`d$3KS zP+ksJT~KCE4`vk6r&nF>77QC(j7lEYQ&T*E&qSkM8A1Ox3BlJu-==G=+O?AnY4Mf^ zGIGia_eWXoYOC<@$uw9d?0z>CQOi43#iNi^h zKhs1PSzySW_U2yEJx!!z3v03|SYUHuAhqY|2Uk-sMW`wi#Bj>)^iJ2y+Hcvi%yFa2 z=Y8go2<`Xg1BLGOX1moz;U^PZ?V+fLqx3?VQ+O1o4~aM2egHOMGH}2oqsTj+ZZV$} zRV$t<$A+YO$m%+&Aa&z+f<3&I;ud3}^GONX%1;H;Z~uU5 zj5)K|l-XwCDsS`Q+v50leLQnYwRTXJ_`5*<`_uZVK9ftpuXiH<7Wfi~ESJsHGc+Ol zzgSzZ#GXS?=>OtzPTcf>dEh_QxCz|OG37w(*|f;ad@PipUtdhVoQ&QDndPNtzA(q{ zo|2z<#}D&Eke_)jmb2Y9e=WTtgY8}J6>E=M{SFX;QZ1gpWG-hNFT0c*|3X7h{SjT| z#(!HBc$>Yx&=};^rcZeOhG}K#DD750ZYW*(x;|T~q%U#>dVjSjOXmqYZYwq!S-*RA z+e_P8S?*#KklEQNDp|X#8oIOi7;+jA5Q5C$vSaroT(+LyY-;TC8Vq6?A>yTLaXx#N4luH0vSM!OiJixdb_qsMpz*L&rMeX{vg|#{OpH@#;01R8ZVd zTHl@Jo(J_8Hc9xj0ay5)i@AjpyTQOW{S-+1o=Z-zMF0NZ(^IQk61T@jgJ(sWC^QBo zB;-l9o8rBZW@y(7Pg2AA$1d&f$AE#FWm*jZD=0|oV?txc_NPC~@saB=r-}LHR>~^= z{t$(-OXZS(Z%vgHdy@M|=fooC-wtbEFk~}(k|(TSGb|qr2aSB*002Y*dQ-QMgAcQXBVk&j z(UQ9psXmMsi>4C}ITup&oHbp7p27QBb@3M}RUK>$+aD7pg;#2ZUq3#V)I=26Nawyc z;?RCP^jx9iwGc3dVrN&O6CS@j9IDs=lF^UQAg0@FL;@_0#5VU z&2HQ`-RXbvKcIW_>q%QSlp#Lp1M1D_S;QbPo8mGZ9*>YcQ^MYTUnxf-An&!3g8MB+9RMM zTI+53%K)xxcPCh-nT>Owg}fJznd)A3HArtG?64IsTzw#OwTRsG=Cdv3+e1}O+4AN{ zpkGKF4R*@QJa1?4(=Hl|-27NJ1_}g(V2FNYGorOwbo=cRnZKHXu8pmSssx5dZ{}w5 zGWJcCqQ6wWiLmSo3|ODgIqg;IOqp%Oa$Za_S;#X2)zQLX$~utpMpDpfugZ^^b0F?@ z3_13CPC6_M^Fg-0GcX<-j1ysn)Oc#t@%eXbzOS$KV$`hr;!lg+^+((Kv!}i-u~?dw zf0Hnv5h3kc^p1M~h`>~PL$I2bPgwYj0=PLNTi>X@i!4>yUGal>ivo5?2L3CHIi5?Y zdzbs?)rS6H#;bipJ@Aa2_@S;hm6v@^4@WCvv+p(= zG;=Ih{km2O+RJO1Z#a4irhnt+Hr4e62&F%{yi+TsoLK4m)2>5@EgMwwtMw6j`MvA* zN10Zq)QYHzVI6xHTH#5IF05yJDRYpqUIlr2%Pn9#Oc^w}_j!&RC)zx~bW@>q#W}2c z+^?T4DdEq2fShM7xSY8mkGnMaC3JIBAg?tPAPI!2m8@^FL;k8(#NwkQrV0GHldO3J z@QN{&@z}ghesNe-%pW!j)V38)gQ73gvLr&~UEey=b4wjh+D7G81on0pTXw`kt_!qD zLPDY^3goMJY-peEHF)0apI57hI`9>D%U`p_jSy#Ivj&ZRKC~6SX`3B|TuozTn^IXq zvY1vmM-a%2S3i+eStut#Jt=01wjy5jJ3)=;g)t{7j17)%5Y8lwEl?_daARrcAt5sr zF4a2WBm=~=GOuBZ=1ePS583V0P%1ffYPCzIUbbC8h|mjF(E9~OTfB=r08*dYZ$MXClz z3V(g$n)3?_k500oTSj8bLD_AVlLWjET4ED;$J`~IEkaq>DUFQmdn|R<%(`ciN98oi zbc;<4ruPJwX;Q@RW+@FPG1JehxG)IJR>fcZmhX1_(LpJ_@-Is9B3kszb`M z6i4Mj$wGzNss$lP+fOK)f)oI)RP|-y1Ft{;t%|odm%|qCsCmSMen49rp*wqS&*b!H z;P+cea%^$Aq28V%z;oMc!o&oJ<5D>8$0$CskCcOnw5fGwQ4u6js{PI^TX`0EdJ|EM z90I*WRYI8rL1NI97MYTzy`k-v+df&R8&fem+b%ISM+TDvG1&-+Y3vo|~8 z2;{-lA~ca_od?iQwh&1U5>OoKsl3oY9`hlhEPnh4wx3khF>@R$8$H&c>`13UQQ4A)9dVKZm-R7QAi#Fdg z{s;wQnk=w`UO9_?P@{&*P0E4G2py~FaujpG1BXE%BZePzLZOaYc69yU%uL0`er2WH zE5J!h4^=R+3Wr9;Ytn0^4!xJEdUF?6gGyElGtjK(jTGXj^cmow0j>73UqN2W9TEU1 zP>DZY11t;X>e)`t6`t;>o4vPtZGZ521i&QK zQWQ+c{out2^CUq8HeQp#HON_6M^;HXaZgz$R;MPC1B?&1)oJwX#Ld7~<<6f#&ev;d zrD7B~0kDZQjN)wOY{qFk>m^NnBkrts8w#AV>6XzFJE${=NBtv#2o90HztKkPG0`c9 z4Pto#y+ABI4^MSNj3QC9F^Lvk%^I94p=qp2cbLfItrT@l!#pM*UABTrmX0M@cvijx zWp+s(EorBDV^d3}s;ZtVxzTnteYFBa;-ENc2GQSu{wmh;TdR(tW7Yz5@~)u?6!4Pr zL-YKji;26N6iL*Ofo3uW7r}iZgRf0p#9zBK_CTH9|MGzLq%r# z{VZh7>phk(AfrBKQA%lSP&$?q zM-ej≧{oD7MZxx8kr!HeygFBk1qsilO1p!NOSZ%1Dy1t7HgN@Pt&~kxf+T9z#I| zX^U=^kXp0l#lAK^5q(8eHCK!iSK8h=E>MZbNsd_f-7cLOK*NwEV&uch@Wq8Y{Y<(A zt#zQ%w#s$VA&F3c6wJO}#aKU8%rU)XN;MHL;e{jRk0CjQ*xPzWJ@fh$Gnaxza!MIX zZE^}*MKf!@rMe0bDOPyo0q{`am7IH`di^)+?rl8EMo)~B~CUp+|lT#2Rx? z6iO)kpme)+)d!3SDHUah4EJKSt3AYMWac{t*GcOqjfgUuiaYZJ@o8!a1k004st;7d z2bR@2^`VTC+^U>40hVkfksWN%XyjNm7g(yonk>e9E@PNE``!3Mp9OJD)#@$3Z1eFl zB@S*06>ga%0FdoCaQ*`L!jUfC+!zFGAK3P=;E|i4?S2O${ zW~PmDVMT!*ba(`!s}lJ4#)-^##lyRh=gA=?nwd&T;cHz#ark&26+ zA6|W0KV~w063W0MdT&8d-Mj46omhci9W^gQnPuvt=oXm5xuX=Gcw3Q+P+4O&+`e*e zG6@g1E&^cQj8x42*j#z4*#G5fePh7HC-FbCtMh?iEa{}f6{=-{w#Yc_RwY7QZ0zkF zJZ@7ZmPRpkKCaiE5obyAeZ=v>ozFDEq-D9h196r~lm83jG!*Rhb$5#x+1kF$XbcPw z_biuu;pcBHUadrDL`FWCLf9D@rp0@5E|R?ZyO)BpfLmn^L8rZSoVCY!))m2lojO_LfB6e*5yk-`DKhiMt<2=*YcIvSf4KdF7-7b4mjseic>f>I3cH;M^?#^aoUx(* zhaR;BoMRK^N&bUK{ReV-{9kZsq#mJ6*6ts9|5CXKGj;90<)Z&>z^mg0fx}hSo>Qh3QeVhbFty#?5 z%~WdB>I`~+>afM;c)qJfyUH4g6zwm)6kXh88S}2?Goxcy5+B^+vrz(hnG&LCI|Z)h z|LPrO3b4PTisheYbSf-&(51E1f+{v6RR}`$yhLJ#+XvK)4l28pS4L{(K8 zwk!uE!?#ttWk^ma&lbG5rb0wS0v#D|=EG$Gy(=Mj^Z<)-5s@WQ;>$#;Zw7wJW(G4h ze9?c}O|OB^BANV>`|pwkG<2bv)of$3|8&;VKhBwYmEefY1gk0&GzRazH}P@1%}ZE) zlv4uHH&$bfWbt*(vr+<_Z(! zs#t(1#2nYJBt|mXcL2d`EqHyMPJV(D)_^^3vRj*IZZ|+THQ)fHlFd0H> zFa?EeAM7Gdu*A(ndaL)C{1Ic_{d#M*N%zN_*|TH`rOiWDircb10Iw{pVH`(-UGZ7~ zg4gDTL8TKC#KdvNG6AQ8ufaQKtkW}WSmQhMauC~ zZzUlfHWD%r@v1I_jKP{2-UraP9N{f}#OH^v;GvlL(pg~Z{E0mY&>ihk6%~ILY+%6M z0z=TMV*d1$4rOxYQtN*xFqUocNiPd>2oGSZ#V^4ijDH_j{kS?_Wg#QPGnKEh3J3)A zA@5h#*B+pz&cMfB%vuc)8!C-dmMe(0!b9Ls45R5x9f|~t=PD9RJ~G-f+Hh_@3=`Aw zWX5}IO}O4+#DV$Z=b0M0BNwnBn#nPl@%0G;B=m;MTn}tEJ!Y#zWYxkd{!Oyv($^lG zu`BxiI@ufU+ccAz;~7FfR?5ShdRLMgTK2~q=}BAhM9f3v=20!4wm@f>_1tW>^U5?@ zEhkF#X<*9ZC0DPO^-p!I$gCxgR5QzL{OdHKdb_nCh1_NkzazLckUF zu#~mwxLofc`ao>B1={E5;1}KfboHs=Uc`$F&aKDGEp(o=6q$H)`~~sGmFKoOO(K2t zH&h-oF70P%;=dc!&&7CX-2!k%lPCB`KIaRAL4juK=ni1*ZCGBe8>-W&=ZqgY1k3sM z8Qk@MN-J-+G^DNMh>wowM_!e)%J;J_j_uL8r>yZ-LX@suzS^?}qfXNNa9hBk=BiNQ z)t@Y6a!S;y9~4K)d)Br`2%%k3OP{;!!z?jai zxY9xsYa!p|^1Z>i)J*IVLWfM=p-nZocSJMLW_sSDPwl;s>)qN3mncH3zvbPGq`wMW zjTQvYWQ#xof^>imx!B>+D;rPqq)s)u!!e;^pr=I|l6j9EuEK3f$Co2j%k;%|(7YJ@ z)yx)islUIpUy#kp=stERD0N~oNA{HKwDWW` z?4#PS5hI_T))P03$Ya@M!)0|BH+o^3!_emnPNSPNmhHH6P3x}vJ(}8Jz89+dfO{L``916 zg7!>%@%KCdnS9bRX172g44&#!XOoiQb^+PLco`kg=l+(M+xTp&5MPBiY;AWjRdus% zCoCH}O74wd&ldMWAUPtsI8i@A1j~NivEU}&&jssIOY*dUK5;nba9a@9nOQg2NFN+w zWx&f@w*I-LTm>)=T6z~;OAmC#qt;$+Oeqwzlj@4WkuH!0ClO3pE(8@y`H=cJIkV-L zI&6o>qfJB(QZy96UOZ@gfOBUIP!n-=o0*gWEvlPi%037HTCRMrU zLB{-#C9Ue;-A^~FQ(7W_wN7HUtij?Z;pfW`lVi`0oKp>9L}Pf)H6oHQ5^Tv92a^fG z>A9e`RR&6l~MM^pe#8BB2$C%p;p_ogpdPj2RAx|<*NSnw_6|1frGHR;RHYr=9@9-nw`nE!P3 zs|0GKW{)-xmlgSvb)7Jz%`W#nS23RVw7-zKrhf31evRq8-)`-`*~Sh;%97R6+r+SH zyv6Oh9(&f-n|lB8qZM5O_YwF(#qq_McV@pwf~zsJgqQT@$u#cJiKtpOwrveLGfvUw zVPZ$f-2=(0v%DkR{2d+_TF8Bs5GYG?R8^Rw0+SO}k2WD`8eSp0Fb)!)tgqBWM?7q0 z^tj^w_f+uXqQe(+g%0s}Msj}JfvK#CfbaAH!d^_+9u zPO24|8nz!ctTH#bi|Wl>GgmJ-)Cmn7;D7NkOqv8kXb8h+m zEf}1mD7Lhgc+)q|RKr5w)iQTlE;6AZrhArK8-ucskwlAmo14J#s}nu%R$M5nZsMSR z+I0**@_mYkQMDlhaQFEc&amd2~H;})`q-}g> z=$kk?zqn~{)kksQTflRq8|< zJe0*OjB%Dn8A23%+Z@q2CE9+4g&Q@gtjwHUF{lF-Sr`tGi3Aixvnr==78VN7kqN=Y z-=gJ_=I4W`bnk9kY2VyttSh4o(=Ci*b7^DL03N91*m4Y2HuH!Mm1rsVGue*r0>v*^ z*U!jD5C#6s=RwAiN1TMD_mFSWU6H4gy`d5Xr?W^FyPs9KQs0FUk1ZEiT*umR=-$O=z zZ$<}S)8dCKW*2_Eq+rMme&!pzLH5{nuynjmNd;^^8cHGX2w3zh&aS7I9wP2~jJ?Qz zL1sM4`4rR8!b7ZQEFm22L|tf%E4hWARu#$-&oFLyjGrW~(8K6-jW2Uibu{}HFG&-c zg5t(b+nr|j%B(oby1(2ZU%ldrgm{xCm#s!vwLgeMYlLZ{bZrIbhTbxm0532Z^pKE* z(oaDv<+rj$0Cz9rI2}ov&gsV7efOH6>`-uJST7$nQ~y*31;gQ1Z*4X%M|dt#Q#;}5 zI%>NaCufw0tp;Lw^OVif!-e+POh5o0)vVF5l0ydxlja?-h~_6#B5(U7zv(_=yH%`)*b6;gNNsHCeKsJFU&R6w|M__C>aaRFc+o;7R+|qeNJ*T@ z7Uyl^@jE=^pG4C}lGD zm9kKn@$fBMo_jB&Q6zXn{&8cBjvbJWf!O@J(P4`DiYYPGb*H9^D@l5CLi*;(2th}u z){1IR5G|I$8XkF4%?>SrcCqLK0t{dU%tS7(?l5u|uUc#Yp>q9m? zA#!iT!YOakMUNV=*6Y0!BfhlqBTFwo(fh@>1oJX-2a$L(LByo{OT6KlJ*)~z_#Ibc z-?&|d@^nXoK~8kvm+V67F(<_jRH#&&cq^x?_Lw{U;T$y$;5{5!|H}o)_mFf_evgA^ z4)EqW4EB*0e?9q-BCx#{`Xklrk`Jl?oIm6((xZcpq5=KTUmbsB%VPS?YD^&|D*LcYV@9>CIcrx@P zz^e9*{4*@v;3c~c0z`Jz-7K??_f(O?gv}$9H>vIRP-If~*kU@5M@C5M-m*3PrZ2M- z?)kDXMIiZ|Q7;g|ZszqW&OHPvq zv1h_Y#J}I^E?ne z82=;X>v6T<+071>Vbu(Q;alee!sD?U2pE+2$jtGU?=!{-@sUH%uwaO&3* zDud%Na%__U*Hsmnv~!8Gqe(eY6|m8tFP@DOjIHAK3VcXdl>*>2Dfjh6>If_sI?`To(~dlxzC7Ql!{c#jE7UF-C9=K}Sc zpid>+Pw;PrJwL#}^NePHAQJku8k=U@)i-`@hAVF|XY&qmd+MJ8NUY&;p;GTi0>8X9 zHgJvuQpqGUd4GEIAh%i<_yxNw%-g$c>{3`vwdusikgeakB zqD&#ra!}!Xmx*uU-s<`y^vh<#89!@VSfN(nT}42&HN)j)Te(9FMEw86dGd;l^k<)Z zdnYtJ7n`M^OeZ6@1NHUa+n-*B@Fck@{@Z|!WDVsya}g4E^VBE{;7Hc-t49m}?&ZSh z3#kgU+_(2%{)+rW+|5|kq(2YU`vl`?-?V(!?6W(Xt)Jq=t@7M(a=)Eu&QE6-`~MoK zx8q*Z9pr_sV5)xDnRS#|LHbM7n?j{KyEZQQr(GZ=d&w7rwoVP zcCcnP0_<5wkf4_E?9iy&6SQ&h|DNNW$qmBJ&6a;?V5dO{z9^k;4`?@Y=QLU8@B`tv zd5_Bwx}l+l2Hcy*{3D`m1W9NDi1z1?!<9mp#j*z>1h<99aoek?3x%FiEc1Uy z@Ytx%flLXma^70!%piaBd3r53$xs~rzdG?aFDTBC?A)lMFv(K6j0S=c`M2j4wCW?T zWbghnkViNe6EISrDxT>e55r~ETFL{J>UpsujAZbCP3&_TLiS1Vg0}l}&m!hZ-a=;>Y8rbQVPW>P+VHv-QA(MJHg#0IF#aE+}*vn zyA#~qAxMDY66B-Ld++a@Wbe$Gy=L~+`_Q7(`^0cY3_BN}IF&C*C&vHjQ7ar-mbO1G=u`v0NuyZMTC)_x_h(rBxoR-rsm_NELq>CBM?ExOTH z6K|767&_9zFUKQ09<(XpKL_=8K_?#jU~P1HG~SL@e{|iDH=WiceX^eKdt#q!BFb!+ zPrLTnLT_mHrje&}Ex{`KI87ygWqCJ+KbS8 ztbMirZBIEqZIMWk%40p~4JibZRy;ba;y#%Vw;pL)4|`Y6pb2KAqY^`8w)01K_{KKQ?j2e_}`!o>Y3#POQVB)CdO zCyNhzwVK%mm}=o1vB&*W!d-~JmFa#u^)TaJTDiTGm4d#f#}};qeOHp04boddE-D>d0*sf4xQb1Kr?d+FJJ4Kdi*nhw}h#~^HAOc1V ziDT;xzKEg}(5UaTfmdMG{vEd(uNq3Y36q(6yY*nlrVY`69SN6{*6R4+MR}&TTmWod zv*IuM|EbQcfio{WHC+kVq$khpd#?%2H<;;vvRRKLG+9F7IsDs7xLSyTzG6$Vz3@+j zFTB8nQ zK~nACdZGN9wvA#?ErVCmm$gPL8yQ8b4Ph2Nu9~d;9KT`i;oM zz+%W+8q>>zIMzXI;t!e#WF+GU71n&=ul>aA-fUf43E5;&kg0l?f@YF`Y-H}TV4#I5 zR{3I;YbQzIQe9$#O&(Jx8iZ_r^G-$I4?`}QNJ|8A#FC1HjL+djgl4B#+$`)P zkRd>ry=W}RPxkX4!1Y(x0dQsGGYl2ia)kA&!$)h8sirN&6U$nE-PS`y;B#BbXun&{ zUbN`qag)-*z`e;BzNXJ=lh&mv#)fA?jq)zkvVjrnwj%WHSsN^GRn}>}RyOZ{N6#o^ zzEfkaQ=KZjoCh(fvf$~UvmSX&HqXU~kt^6d_5RMdx z?bx)cmrSJl*v{#u+svKFFzq7 z`qjzjU4XHnY;UoyPMH5eFr zG=z(N^NaHG9tBTc>;WfOv`ICkF7eKp``WLL^Phf?r?D678=|MmdX^j4%rePfSLiXs z%h%c8Wf5>f0{J1s{}lBVlI6E?R`7na^>(!ixtfa6d?36qu+Oj*_Z6lNCfuD*-dC7E zJOclP?p+OKPeZly_tcz{k`!HzXG&feFO>CD(}&CROzV|qrFddElCL-|86Qd7()gE+ zX;N3}P_*B~bPqeRgbFIl`r|^I#OmBALWTKVuuI>Sg76|_Pg&2Rb?8XGsZwahj<5!1 zf+Onojm`CI0qd8aPfE+8D7DKjdgY5>=PR{u=ab+4XQZ%(E z-Ipp!fYvGZZ+%GIs@bjM&z#8dwy#nD)ava$LQLeX!Hm_lJh)kBh&xv;N|}Q8F)RB| z?j3dsr~1*^bmiw;wf}oGbUn@pj>J{(PZ{7+FD+ZByN;ZO*_jL@QH-;KEdTLy@Uz9O zn;-jk#fZK`U3!xs(R zXBzxo^xnr?qSg)@Sd|IhFxqObsHnG<2un1{KpeG}D&$(c4zZhQ|NbgaGMt}8M{;#K z8B1Jz)8dCJ9MbtNraQuW#-Im<)?C4sC{ln=nbAk&}6x9ALGZ!zA2 zSkgoq)BPQVWlYrBKepDFdbqV+X%WKWSDO6`m3d^v=rp5!w$DV+4&#J0B+U!@_o0~{ zB%()`$R#fUEjIy_xX0mN*!e%gU?o&V#X3VBy}ndv)uRCTIc9n<%mh2 zycapc0SWqrw4A6StiVctN}r{(mnq08;W1+vX|)#+x1S2*t4{7O!m8LzAn&pjXE*b2y84_M-e>Ji8 zKu0s1a(QGR0krwq;7zXNCLk^@%r-0LWd0v4E-EVOQ5?C$?$_Yp_PMksdG!U|SIAYo z0FkpeIxO@6Lo9xk!P-5A)Fwvd_qP%3fvwj?YPqXfBKm_PXGpg>7RlM|-x=}E74|z! zvG%4uV_k1;^^uPG-m4S2vv;@55*tbZ39*(lJ78!SntmlN_cswwnw%btlR+$%+vN^@ z4B!?z*`q@`A^pn=Yap~q9u7)BTOWaA_OiXibO!Lz!)fzV-{H=?0X}YA5XN&J5 z7=1G%_EX^#QCFb`uhu%g4lA*;)@wwI2i#A8^*(3XrHqq;8;ga; z|Lj#dWrv0aoumhZ#599HR!#BP@`w zIL*g1GFwc@v|p^_ae!%3+!Z8wOK$L5sQ?LU^qp3c=l5faFXpIM>Bh>30@m#``JQw7U9ZnuuYmOMU-LbM2e=`-Olv- zVQWyDI#blEkKAo`v<#_gNzGFxT+3BsTS_AJcUf-C3@P`nat9r5mJy^PAMr?nvZm0- zo8F};jXk3TI~vlYQNtG9=71nJ26!HGs^k^fkw+>^#I`g{T>7$5SRf zR|MzK`{!$5$8Ey>Z8Ji=i8t2O0xEbjTOj7PH;BODq0$>T!HT5)mupe)72!oj;2{61 ztv9^*Z4R}icOq~emPCR;eV_VX>{qae~Ri8}E7Q~t8prA$JYOA7wule?! zozDXvk0zql@}1Bl&?+(uWGm^M_z!LSwv-f9Tqtqus;X&C~YNZjveG=2;6|qdNA{zv> z8(o=DFj?5Ol?a`lY~AnGqq};Y{t9;VP=4Yu_4lFSyg9LDkNyh9vO78hBr|O(q`|J= zwq~cbYMu_69loP*d=*z2} zQXs+fofPM&X?#-9dvk{#hV8~`+`1+X>kj^k_K|rcR^lpe86J#!qwqRm!Zj`QSb=`; zuw7u`UZNh3p?4fOLgnoJ7ftqO)Yzt0YI+1dBnQ3qFd`F{CS_b78aF#h8(q-E#bL?( zgTJ=49g(|7_&|}5GYqvYA5HhmHJ?nWk?+oBeD_&8(>lHuN;99$n0hx=#kt@4)>og0 z$R-RRn%A}WcH>9p&~ncNN94$qo+vQB@P^BXPA^=YRaWl^o-zzZ38YAQ^5e5Su&sd& zcorGWttN<0Y<@{nZt0B}-|2VDO(xX3fz2x1_dE_#?;IzkLt+6e$<%Iw{rS#GN;z#* zXH%i?{rDq$A>JF#c+$?5idAumBZ>3I@*o>X3AzgM#*9qYdLZm;xd z_eZ$tO*ogMfO}y5%x?+J|85K(Cb*O9r3@yj<3WOKRC3xLR#&Utzsu=Fu%HO z=REUXJew<&D!to6=)2}=jD{)*<=k40bC02 z!ZO1?mY3+J52#|Y1V_l~4RoYC^cxI3V>9{w_{|D<{e}Nl)cmsI5Z$~jZFUV2Ilt!R zdlF0YiUT;ObV%8;I?|4szwrn4ztV0UAZIfnxL=QKgH= zO=HQ^LB`cdmIu{7DbnRVSknfx>9VO0%rc00XlswFTJZavdBzbmMU&4zA7Dkf|Nh?i z$jZp#aiGnk$ApvUr2OLsXw_uW;vMLWpYpoGWmn#w!Od!R`La6OZ0qpN6w4Akq@N)?)_5yx zNeOL^wIT!wNt3HE5)5d8W44w#0Y)PSPNPn~d{rwqtLNJY>I}k1D}{7`&VS&J?i3veu~iCK$ZlsMzR)l}^Jt0Z2bW;HUshq_H!k z5pbl{9msWYiI&M3<3o~yg9XpLiY5i2qa-f>-HT|F#2LyJ>opWwZ`RTcc!W8U3);zy zW4PUx{6j4dhRu-wu==d5`^+6XzW*`aZq|U+Wi<}|;sc=rKI&kUyW4AHZOWLc_T}#z zmtYmp6YJaK2#&NOnNHL%mf`DN*|eZcu#d)tn_nE8=eHyX*SB*JN3v+U5 zb<_fqRJyIL6Z>KveT@$zBGE*CyhrkK!xZuE>8PgH{Cd*Q;9sH?a53eII8&x;#`D_wwwOGix-+WL zKUxf88g=`0b5>K*kv`ijs`KKw|DD3O)?Zbha-#E9`BuIFo-)3k??$^S5}Mj7_AT9J zfI2?Q+`!lT!wA`DV@|H!e;3B3d@g#DqmMNfn6$}*N9uV`E6u9B^!7yC2IQOenhNn8 zwp1uBnmp%lKW1>#EXyL_FH6&bgxFUd`==fDqWYBZ7`GMzRup5#EA+TBan(-C0DIDL zML&JKDh|@%&U4lmi=D(n1}l7^2>K2|IP0b4J?`YoLW~Ta_xucx$H3rQ{E68`ac+*y z@AJ*y{Cptd!HZ|W)uP zpUq$iicU9J`$#L~eHD-0#3s$Dos~+@@23ou9aXUXSxXYRO4Xzm^N6+6&)Dz=qvjBDQ8M>Z`!5p+RX_26nL`hCU`*0eeNE((hclz8Ov`o z`KL=n7H27$F0P5~N%cBYS?aJvB{wG(z3j`s{7sInCznz4Ah(<+ugm|JVlhfq!VJ*m z5T`IUpl1ITqC%ZXo<70V!AD1WV#3P;vC}H!f6z;lr4Z);=PMOgRiv_KFQ0ey?y-EAG-HFKbZc7{tZj}f4arWrF&~Uf!&f;x$!^?rd6G@++~L|Cow^KQwl*X@ zt`w8ngNX6f=fiS(9oJm7@}dG|>X{?e@!H$STpfvC$^6w6>46u0h97LL^X3hk@mv41 z90|f4yTyi3J50-OYusLTsGt{|@x{Q7w#B|mn!_9I>CW;n4e8j>HmbF9*3OJ{p~es7 zbKzBbt_w@X?^PLt2FCvu%~HKjjvrNpd`t>EW03-%gC5-E@_nF^sV(24bF<2X$p3#W zz$eQkR~+cUiMQajNY#c$zShGh4(ywQI2}NdG*ly1CoXRiebM1K^d+!%KOyA-GHcJ& zlHjlZhZ7pZ70=LfW1|dpI+~xHuD$Z|23Y1mZ}XI<)Cf~}B!81?eU4R^bRIE&rlzWu zDt4AX89Pu$?Ob1sp-De;cqWYwDYQ&u@&zeqdd;ssx=W@1!A+Gky1n&1eiX1SyfA(EzI2Gc6?v9!?t@eSl{Y0oT zB;zUMMofHPE!$3g!UIWl*&gW*CSSj-q2sYt#7ufT*AEYJC~DSo#>jf&&PS?rn!#LT z@Ru6E;LRbbo9nP+*laY1Sc}U=m)C_gzc(_|&}6-tt<0Pu&_Ojmfpoep%I3 zGwkpbli}ccA6sZ~3qeU48Lt3zJVa_AE|hBOMdI~7rkc{*(!OpILmj|?FZ2mufj{}u~Qc{Z*NRYzUUW zqzK*DRx;UPfD)KEYk>h5&{~)XfEQ)_ma(}C*}LUL2wud_&Y<_>G9}-`9;w%a|35_T z>Xzp-jzMjJMuWDjzP+r;g5utpXq1(e6=>BR=(KQ;TvIPk< zWXCsG*E#x$lj9#Oc(t1#7xb^Cyb1Tlf1CLy90FeF#HZNE-z^tH+J|n@*s>STpJ?CS zU#QhBXjCB}X5|7UOzgutVLUUcpTTWIJuAsuin{Rwdhx0j2WSxaB*U#RqXvIJ3X8WN zMTjHWwn&Nem7}_$aG2y;Z?rQP(p$&Tk@GKD@WR^11phH$4|@(8!&tQwlgsm2p)>v# zsIv}%Ookt0^S+m|Jd$WB`?tz1^l6Tk>OYTAG@3rP~qT|FXKPpfhfRN#eKE_sru3 zrQ&LysZG9XU*|&W0kG9-q~T?^t~#I4doPlX{c}mChtSRiP4M-)*Wv`se?H>Dpd)=Ikj=a-w>bAUf~w3S@ysGwpwg-hYYz}0hF)n*(*OV>}m;{fPRy&<> zW4~G<8+eH0PRe`!+6~T>(g!`YzU$ZDUeLRvn|&e#=_Af6{|&zU+d_g%PZ~5jQQB4? zBH|Gi=tI@=F|h`-=&ggKqy1MN&FyD{A?+_sHpw=>%I>4>?uy%Tb7)4-y$ONj(6qMC zU|0t&%d$Mj$k&6XP(gBDzo(T3>y+!YE-v5xkv;KCzYC_*ukm51n;_rkPcyZq<@E2R z#-CL{E89>HNlp1|&2Q$$zMr3OZ97WXRT ziQt}c-~Hf`|DM>hR<#K4)n=#q^`aUvdx+=BC7RoUxV@BXd6S8{;yHZV=>h&D8_OGo z`Pe3y2BI7uljBETt;-yHV;f_5KjK3zJ0$(QxTyP-x?~!s$I-A}OuDGg3T%spq}yZ1 zR>{QJ`sd|)`P{EpwN5&fa$UIGy3tI!e0U#(9HGCH3)fjV%bv_!vXu3kz6pZ{HG@yY zUDVKpRGcrVf2lM#>Yf=^&du2D;9}T=ahv;$FPdoSgBy#yx{=^pa({yQ6TP)efPc{u z8OG}3P0n}iv&iR?(=yYRUNI5wPM-(mPuD9UL>((L#)lUAPx{|5kyN{oPW0RLvsot! zcqD2vCe_AOu3Av5SAE}CSMfTv@E^9~H?8VV1jv+nlrH$VZZ5h8#d#24E)*QuTpu0! zr@2xsOcJf!W@9C{*=fb-G@0+0Y^0U#mOiXiwkTpD%dK`-fB`#o;^a83(M4qzS!uRj zWp{OU<7LsSS{pHw#1xoM(Zv(ZKZiB}QFtSL`P%aJ#a@jzI)y;u)6=#K_vd>U-={2O zZ{{O%0UcfS4!wO!$y^K9lVzt)wzaIvi3pG!$zGw=5p5*z1&^63EIf3LeYI>|1FAXS zdh*kmzTNf2;l$1*rtP5p)uc@yHLYw;Uzn{4PR@Dv!adVD|3u#S8O15WRf20o*9gdsm~ zI{cIeAGlm>Ip0MnbAyg@qB@b<{b$3r98~w-&k#~S9{B6!7?2K9(J-@lsC;dXyzqoL zl{aQM^LCl*-OVNXPk0`WcD=LHqpUGxIG0Zwy^}^2@Ozg%q;j=x3!UaaQEpT!TDepG zDMdEXrjaq(+$Q*)XoRw2KB-RU%u+*7>na}FQAGD=QepkMWgghH7H|u0xT_q}D%SJm zwPd#jnY2~7p1AINj4!d)ZHY9MNQ+Fk8L7ZAa?X9Tz(CO`N;}=!6;A%Ot}g3jL=my9)uHEC%%sn44j}b>$sp;?ugzA?Yqkz zF5Go&sZmZ8V@OM(MiN8j^P)Hv)T;?LyoLK!7BBBh%`Mv)S&< zu(2ik5ZpFr(6DIrdE|bE?LD-Lt4(xH71$?zN(M~)^yUl)MQCVb8do|+&&TK#dvdSG zNJ{fIhpwr|HK-QLWDj}Z z*0$ww+atbl1@MY39fufqc|Tk<*Y+D<(h?!&&7W9)IN+IAX|;0~Prd<5|@d!^1jNxSwb1vLBG9J>B5FtjviHKWbNZBZO2U^OjuD0b#zx0? zx$U~2k?PMHoc`-ODuca1R2mz(0_aP*tWk*_7Dn^N^Kmb?^Pn z`wVj=a+{!T$m7$}i3WUNfIE8-ojyW3`ylol)A8sfy{XZexoO^;bAg-T*7*7&g{Aw0 z8>CTbY;3}mOz1|?7fm?Q;-))N!@r6a37+y!PxU-8ygu(@41kN=ntotz--h?KWo4zz zl7IcikHglC5g?&AB02poR`D&iCzy=S*cRCZa6t+{=}1dW1a2N;R_k>!`oIB=yZuF5 zyo6z6+dVNqEnc0i=O4{>VXRB657#Su5oXb&T93{a`JE z{#}@nRxqf@ zj+$=_js)^Macv3v{u?0~=2VmCa*3TZdVD(~ORqq;8_i+#=a^J;+s`U|qepwAOEz`Zr7 zVBQ!u#m)`JWly9Rs$(bW$eZd`4qoyt!^E_Bvr-fUt4_X+u^=O@vS1NeHr zIl$wiPlU(ioJz~h0WFv9o+APGG2Y<1Hs=)Fi=N~ zJD7?AC>9$b{Ze8uh=J_{N#QKBPSLwG!0w8Yk*;kqA>S-ob)Gp?BJdi!$nZV6$#69x zMkuSbcpud=nK6#;1KB(!8I;u$p|I$B(zbE;LK6LSdXj+Q6U`M}{1plxf_cE_Ldcor z!`u|j8zd|$aXFWVwEZ*PBL*4VEwG*eeR#tD`m0Oe264xm-4sdm&RQWx^ksAx&;}o} zCWs=S`~J#sG?2z!{;aDBlR`d7u~hPszle}<=AvFg0Au*p>`(gH&Ryn7eB+zZC7qig>z>rfNP@{;#P^{VR55=x z_xk)GlR599EEWcwC>__#N!G&Ozhzca#+XAav7MlL<}4P&18WZJ@C-hG&CC)c;6r{D zn6D3_gVzQqPn-iq^i|sfMG!XSI+D{BI)3sJwRS#gF+JKHn4P)?D|Y!N)djnjGi-V` zf>)Y2b|b_}H2<>gzIbx%61T?o!MPQ_zJ-^bkJR?;C!gRFx&B2`?DCuEB z-?t{}+((js6O#(Xo2Q>;2L4DAyxuyU_8f9s=x}rz*?eG`M5m{a__atl-wg8s$xNOr zl^MWpGNzJ!>34^`T?frF5Y~b{(Wo?21Nss9-8lv`3e6^fq|XxCy)v zZRgvYUUpTPc1hu~o(Y6mo84?5hfO-Z>LpLfP3|Bk{N2zXuI+Z_drfn}8W-^OcSP-y zRK8i{6Jzs!zf^zCJ_x8!!8rHIzLtrVTokBp4unhkqMn7iZnl!9n^FEmVM*#^X}p7pwZDgrNpwt%;P zA0`Fw@H9B0SnT`0FHq?>?wu()gotR;7CD@%?cNv6-^lu&aaR#8WIxtmc|R&;z$p0r zcH2lF0cjBR<0o(QuWGw7G(UKM!o1xcbG&n$&!rC?Z;raM^NX8mcs=MtB`Pp@!RO<) zBr1{whZIj9*sJtraQPy{6K8k-jMMPgo8?Y`^VU4k-yNkr-;204PI+3xm*pcLFmB2m zAg$}!4>ry2>L!e--u{hGv~$s>knck>d_qhotf8iiXwGE+5;AAMimNuVGv-rP((HpL z1K>)YW=ugMyrYTF_W1pBagpJ3rCO{;^;@gEpEGNVGnN>hXrln)1>}D+Ug+Tp^L*BN04;{NpZIC9%byM`{#4j;IzB3GWlQEyH@QdYI z8ilXs-6eO%-L>xH>n`G(u2ApW^9`+LGf*1Z?L?ewI}8;ZdEfWQ=uQ>G#+SA{8ktBRLjpS1Mjq%RS z&aorx4&h|hmyrj;)migy@h9Uk>3YNjR?{)ZHG6`|t7^aD{$p;}T70&SK+gv@5yWQo^?$))kGMccur3BuRUCBA$kT5GKP z%$@KV!+X-4&JWClsW(SFW#6!FNke{Sr-o7A6Qy*JR5Z8kdie7|^w!DVx! z`9?wNvOxGk7ys(|l{{vByczt}p!Dywt)HpLBTklwEnZC4W&-D+ph7C1@j-uB`@NO( zVAmb&xxgzXn0W02X;u!9?f3f5&WNqiV~07DnLMD%>r#$l(-ma}ob0gi93dRFMe`cU z3vds|vSl>9oHbVxxL_ER)0bM%2sKOjC`xn;#{Ro81X9$aX*usS>4CU8oZBXcv9x5p zmEY!ZP1a=2d@w>QA64Yr`%%<>tH49w9%+n1)DP>{F&W&9nEXgcte`FLsLz;&m1gqv zU~!dokQwwj{1$iEkrWQCN-9<@ZMG&cySoWdGawqY{!28v`6p`(zF6`E{Y8=a-4pr0Vy|@V zTOvE_`-+>D+)o5ExpeXQG6p1wY20{2p7ev{*z={cx{{F4>{N#q4Nccpghq~eG0I-8 z2j&r$&C?!xr^NQInN$Nyk#IIlwUM+Ap5$ ztQ^@to>kNXmEqdg-~`=Kv^6TXD$zkdueuL4c84;K?u_oj=S;qV^tXL1!3w6V*^ zQkf$zO*3(pR?7qy!g0saZ(wP)Kyz?kYd8O%G~W+rxg0eM4rO>Fz%5!!8471G03*!_d+fORCPiQK zRtC(`%!8`L4UO2V5sEeZ77%w2Gw2a6d&E(2%ZC&kijW^B3w>84aBPB*wyw=N9r4pe%r^~H|&I$8Lyu(oi|nIK8R(N4XX zy(M9Y{e45Ez@yOP z?F*vhwWatKu!Gx5Q&41|y4DJjr^z9A>=iHHQls@NSY@q*73S7Tc8Wb7H-6Nj%Z>Ai zfm0w`Walb5)xO~Va=%Hdu~x8&-@)Ix%Z=-aKpwIl*1;ro$pxdW=+*LPcmZiPCYJyzgkHkewcdFFRH((ZuXE{f7~qmIq0`fy$e4m!e*I3<`pvS>lTc1-2jz(5fjp4)gnC@>9Mp{XZrN+S#1 z5#>J5KzBLjixlNW%}K3Bh9h1MW9XRJ3sk3AuI@A@lu3DT;%rcc& z3tF|#ZBdfzBwX+8ZikXRJDD=fb^XR7K!P#&^L& zdn##J^d5#MYXp|kwHVY{?C5=kG{Pi!-~zu1tmFi zDOA=}`AqpOBsJjVIjO^IOyLrdu|GGBamMy5U7s(Iw#z5FE}C#KG%DU5Jkj}a4S`lL zbvTHUPmIDc?^CO@lq0`W`T_G%wmHjopR!96HVud3RL8q<{o?K1KO`~7=5}$K6cRkM z{@-l-3YfkX?I5=@J28CsXY!aJ2>;y1%8*+zn$$1F9hZpkU@O0sRH|RaZ}l-GI?7>Y zNuk-!9gTmFvhHY;&vWAanuc8t6;D9SiBy(aJhem(hWGxTo%9Dt&n&mM2*Lnc>Ee<7 z9OVQgj;RuF71f+6FA?o?06Jxow6Ut10VS2X4?_Rq)%JaCd%A3{_9tZMx)8eKK>}ut z!qsj4pGlMNurEby2zx5AAX`_YaAy=6nzcDb3kCD)j!G)-E>u5~fxC0T?t$GbQ`?y! z5cs^(q~50QOQWw>sOZk6GNg5^6I4mb+=g3tcbT!P)%ToUs;DyR&Q5COHk;z}+;}H( z7W)X7+kC#5$hS}kE@`;ANKjFl4!0xJ=Ay^@{cS1-3;9c(W+Ib?sfE}FSWGTIt)QKo zxMbx&C$guNIKlj69jqZl^`X+)KGI70_L}n-T%IlLOtUQYDos>!% zWdwH?SSR)wiz)A2Mq%YOhDY~_na<{7q%=~ge!v8uH=ueXrl)WmAuxD*zqf0G8z>Q> z=GkZ|Rt}cP>iYe=L#33!ot7%5F=usSJR>Pel`VjC2iU6p*lrk}!ALRO$|homEhu+w zrX+8=pX9}%mNymiG|G- zJy2Max6?HS9iHas%oe&g4;`+Z1oa+%_F~C4n>3c||HSRN>MK z9=9$9Zp9xcnWm>KrgG4GW=w7BPyW(HwF`|mko&KmlUro-7GsXaj*3}K74Y*z*Zb$( z1d4U`twwpG3ffdCM%~%pE*bfa{UF>yd5iZoZL@nEm(O`Ebm8UhJ`b2KT|cdZvEv@^ z#Sda74ZCv&rj75rv_KD@+dsbgatA5NC9~{D%QWXgl)utzkMy==J84x@^mC|lqw2J6 zO`6Q8aw=N8UwgW@6aQUVbIQo-6CNgqnE613SPC*3@%E4qRa|Xd4ZaqoQlw5%*|_py zU{`KmK|?O)#X~NX$He<(cdS-Im|2r*9HxJCYTv_POhBRp>(a_Hj>gzU24mDUhhLf| z4W@r#(djma$7Ho7a1@MK|4Cy^>KyverlUv}i5r6vp&nQA%Rx!h{0UwfxiAM^lAkH2 zx~n!BFz$t#Els+!H~;Fd@KwP)%xBD(v4yyZ)ooXKN8fMV{c~|P{1^}-ai?K0m?rkO& ziSQ_sRB^dAa@|{T=qyJ)fj63cq*vf5GX9Z+1)S7S69NK6(#!Z5%X{$T+)v&$>pN#* zgy6yI6VL@|dAUQj_N@<~^${xAQDw#e{#dLRgWFS4n*C=h>Zo4O8}J8HRWYi+oy0`HqTZ9cl_syOrL1qK&m@EEhxhiw5w$PQ`pr=7!GY=>{I-lt z-hi$f3t1cEv6efded&53pNySu_*@V6R^59#z<2{_U(Nev!u>H1ZDez7(R%YBUU&RC zD+QFX52%|a{w5^w5PQ^qdG?f6t7X2vqoAd}7TXBipecXs9A66ZH;R?*+mMVd;7i-T z(IG1GIA6eI3+GCt*U|4d4JQIo52;N2kfT%z#iA%WlgMN7P_GSr5VaQbJPb ze#Eu|6o6XsD>SAI@KXZDD3AWIQcP%-7jEAy^i_5ZAfD5ee{N;*zFXH_;5?B>bTUC| z6ZZf$G|U#g`gv)5AQyM7>e89#U+14?U1ud}V}+c&gX!xWW*Mc(V-9crE%qgb;@g>* z`>|JA@x=gK-e8Ia-$%EowC0ZvVa;M_V#2!9IOqguDI3X0Rb|kL^|ErW;DM{i$>h@4 zjNJ6&vbHDC9iy5n<2-_wGHxo}FSQOPg9Yy=(*Y|8^iTyUbMc+YdK)oA%bxPkcdX1B zHz5cwNpNh4AR5+ zP@QcLME_AsO$S5!4CsmT-w2o?QBXP#aK{qflys>nf&|o&8bsEH!u(M6{@(VQr3+5N zj5n)e7uFjcDbEyY_FH-#E%d~KYoBbcQYX9|doysj!iwx|iqTGc3(m5rDC8=0_^d&3 z)&uY0r34AA=ScL)n+4G~FSp2-M?QlOo;5kcf8{P|JA8oCcqD-hs1>E@t*pR?BE2=C z_Ua!#CEn}~;Tz+1=C0y>)xFkdK@Z**j~S#GBVL88^J|4~0(c-Y@D^i#jk+*?ZEG?< z?VSA6J>x$0EyIPDMFKv`xhrD2`UReoz7=nI7iK9IKR7!QFLXpNYhV!0uBYrkKh(zW z-N~I_aLrF}eCiu_H31mBih<@w|B{Vc_$)%F_v%PSSo%W<0&EfON-?m><3qcPdclRDFBZoe zk&+sM(cQ2L`9uQkc*_y|yme>{Y2P3Av6s?Auja_7+wq~=JA4jrsSP-}Sj4|m$@w*T z8!;^FJLN?!b2VY7b`wlAm-(*0+#A)Woa%Z-n(L@J7N=`VHFC{?$c}5@s{gaa=4Pnij3gvD*7XO)?djM^Hy$eR zDUkYFe`t$$=vwrtqrn~WfNBs#`}gdHt5xm@29VSXAL@ux`Srs#MTU2e)Dxtsc>4q0 zz?4t*_TovS@y@(kF5(Q=pL0aWvL2ARn(p?`V@1qr;|lUC^aaC(~x*sQn0+IKx42*18O z&N#bYR9ia^9tjFHm*Hu9xFO-Pete1Y>y_aZ=&RC$PM=hqID#IAE>~y#{V}Fr>)ig1 z(OO>&9?;)2EyK)$i2{OqTuYX2aftMxc#SjiDSW2rUr|m&1mfX-L7-pu1BMLdQUppY zZbf&7h$9)*(?6ka1Gpp6ci%;}d8G>3z$nh?EGNF; zuRP=c(j7xxhyEz#`*-n$4{_Lc>#PDvJm$E@aOM$Tvf`QA?BA_sJ;7x8orr!68SjPQ z&NABxeVnZDLDz8-{o}BqDrpf+6b!tv zw-pA*`$e-J7v&nd0Ol4Jgg7s~Lrh5R^D3b5V-@ES&y#Bbl$;%K`LhlLUbkPyKA&}O zE>!kJ;B%6&zR+c8aem6Dh#LBvD>}{o=e>g9&DT6vxfE7s3JT!G_BuQ2mIucoYAu&% zFDBBtel!uOLigWcTK6pl#;xaPYT1lCQPs{yRLN{+RMP0Gp^Bmli}gPUs2%mV#JEF7 z%ZwU3bKmfsQgQMCA37*xd#5@xw?>K$@5`pBAE-B;hV+)^-LZW+7D80Zl}yYkW>$^o z+@|MFjrp#ovM(MRW6AKkSvS)SV}iNyE168Tq0$ zIBk1x^?Z@CeUXAWBSl^h%rEX)8F!*4^A0(8b?J^bQH{Zo1Ha`BU5I!H>+q~|y`Btc zJA(f&fD?c02G7N~{5CxC^k1-f+inb7@I#F5>On3S#Go0IP#4T26^%mcJQ$;AHlUM{ zmz$DWe0l8J#*;82@(Lb&_C;)c?@J6j^J<(lwKpoaK8y#~y@qY%C`{p)+6&z#4a3-m zYJ9lmdA#~T1tuLg6%(dRL(SjT;PKbjW7AvjpxIZC=@a^+qU#78JG2g8JoS4#`Q|&Q z_|EAV^?8Udb35kvMhvL`E~bXw#2+78gE!u5M(qi=<99!u2tA+TcB|D4z^ECca1^^6 zVdX&l-BI(8YjD3-j}zvcjo~#Jq}cMlTu0f`wdT$V>qgEI-#8haH@t`^Uw;Xkwrs^0WutK7^g&3z|1|Et{a!rx=0@!8cQ%$?|8q>P zVmp^xVi|NR57QIGkf~>3wD~mdd+=qv^^ZKpE&eT5o;esapG5LN48C5&F=l!_!d4cs zFI#cc$O#xetQxsJdGwq#4g>pkMpfnj-v9I#d^B<;E*=*`I%jlrQ+3HDmpT}+Z5nd< z9Pa(y${dMCBZ)wuJh*e`XSn^>w;&dcLe~%dY6#mkeZYW0Si1CL)KquEwry|Yp4F>R z)2SLh!t3CC&xn>t1oKZ^gb5Rx;PX4zus4y6#$b4Y2nWkbS~ro1#^4LrpbU8=qY32M zej)5J2I5CmRlsg1ACK^t+ABP)!rp=m^&l8#OT8LMMdQd3aT}bih{TqC4OJD^l|nv= zD7%dh9f8Ua{Emmw*rQ#EoEPD61&EPGG?@kQRv}d3;0w(n8cTx`0$)Wn%I%+WNJLYh z71gNnivLHWDQIO?s490nNMWWCO=S6ADE`VY0`{{-Y-2+LE1yO(m4(IU4)KTqd*Hzz zM$o4?VDiVkw90Cfmpn{oWMX_@l8R7Byhmds5lQ9YudFWg#ahV35Xe;;Z3T!AXnhMm zpMC2W#7t*Wxb3!EzzQqu|A!*eG!P1hvGgaGptiOS>2wlA zFXziaJ1L)vAZ37KMle+6ctjFtO+=8k$`A@ww0W*|<16d&$a8BD@)?Njji8kfEIefq z#*Li@-R~*1!}b!g0;nwaBA;yGcR>Q7F#H6_L|c$0TG6AW6lJIkRoIVbS?LH8RyjgJ zU&#n8p2*~V)d&Z~?m}sXowOX`kaLbX#9HDoebuO`aM*g}W{j#`f#El=!9717fqX0m zkHQsBCQ`9Da+JVdC9o_LYeCwg@Ktw05WvF=`{L=LKgTs!{Sf_)2;zn^ddeSj-OX zA3t*mZoc(#d=k1IciewEh6PMyQ+f9V^bSrIwfN&#RaK#{#E48LgKTStFXQ}m5d+&7 zURZAz=pcJpm%su`@qCv(XY&k zuN$Wl$vBQXZXRaOo?mqQ+lq_4@^6`F%_NabQN-dFx-PsOcU`*}1IjXpM6*XeW-$DfFIv^Db5(v1+B3bzI%FyvQjgPXp4dF)0g1#<+IQ;okYxCD8nU}T4!@${V&L}Oc3^{R_QaH*$7%P6uNfg2@`9}Th)m#Ny{GZiboQB zMX!!jisG0^e5ejd7n_bCl4FUki&QST^vQ#hZUW+xOD?(Ol1nbRO4!1%~DYbcWm9}$ClDf;>F>W>=?wMY4 z1n2xKP)C{P5fCj=etHo0lp4t4e*Xrjutrhw_tIg}gM4@CU!Q2HF1Tj@&CEU3>>+!(n3-A*?)WL1yL=C3}+21MK+_vrElFq1DNw)a7!=eursFXUj zL(Q&@18f6;rAG@>W1mDGS1e#JU^@AsE>lY~^5uMq_ADIxbHZi{}>jL`Y$9YHY+YA?J8`TQ=Vd z`s3{DU}GWeJTqNz4h4-OMLaB?V;g;S_OH$-l7DdU!Dcn#T~V~pKh-cL4&^MmyjWIZ z-o^ZALr0LrQ+vEhmr1)T(iNsi+FUQb5M}1D9QMMF^FB)CVYQ<#kSj^I>A$@^%c(?_9NdSLa@8r9k~tGn zJnVM(L2a%%pz9#^Af_zZJ*2HT{!=_hr+$zkMYQ`Yo;;Tw0EuQ zgA{P3^c-3+S!bK2JZgh$s%7HntqA8Orj+pAG4+Gv<{@mAN^IonL=_gI&2=^|9?I_N zVR%OmjsZ?TM;x-T`;!>gM#o4=JGNdZZ`*b};yP;oTI9oQY%7U3oby0Cx>H)$u`eyb zh<3(9oIkY%Bzp`+Nrcn|D)FE&@V1Q*rSA^=g3_0E`Ye@UJ8Y0Xr68Na03CKxq>$~v z6meQqapP@yTA~r{$;N4qrN7exZw?ZHIGiAgdD_Mhibqxg9(KP@q%S`IAOY*4WKSHL z>NL{!+H5l?+K!w_$>*Vn!m??ati<&rO&9X4Ildx?RmIbdy`2W3{1}`x|sD-jJ4IY@# z*^Y)~8sDK8REO@-_`ot56S+J=GH)VhT3jbh)8YeUZ@`PVT@y}>4Mz6I`ex^N*g2ZU zbwCBSME4fZfqz)iFo~_0nx^p=tHo+K1#iI^!CUmyb60#z49_%|CKPaSJ6$`1|KjgSL?<^CR$-Wa1#(yrGVmYyP zl#*EvS=b4iMr2y1@iFnfbj2IOE)eZ)@ zyv2B_)G<4WAb`o{rRz5T_<4?4i%EmaL>iE;>$cwWv0IcM<8r6mdIVoJ4Z2Rmsz6k< zA#6zuO!P^_J_6K~=YjXn=OqIX)3TiL4%ZnwxU)>&E;M1J7PBAA;&WpEXKh-}pn?e9 zx1=n&EweUc`@C<3t3>IsCG}tQ!TRI!WxUWFfTC1T(``G|JQ|lF?@!mbzB0Z+_G4Hk zbdS(`!?2{e3u95b&iKT2l`4BC{5$Vk+6vbNhYcv*W4o8L7kvreFGuJVw%B#-qU)J$*;vf{i|!FNDGOOlhu9o- z6)a24QL^Az?r_;u>OVW=(RGn1L&%W(1g_(1{(_I}96nEBWxP$^4qwvQBj#vPIrc(0 zATWn*3<-Fo+?l-*zQLj<9Ia}b7K&YvbK|m?*kJ<_(;MzLxY9~}qnw{yP7;Tq^qB}8 z75kM)eUSb^Q+UTP!xS4IDqLV=(7n1?Sbzh9_KIBSnF5 zfyJf_Kg66Ys~{K~GZcpE57;4?b`|k4I*P$L-=fIM*?p|j3)Rg`rNtm zQ;_l?nswb%K_M>G9LbL*^^WmOZA%p>D}xS`2M+pv1CgMQOpAQ>pMOQJ_S( z0h0qZS5U&0w2;k;AYMjljtZ`o9u7jLG*l6Yi9lOr$|}KA36#ZyAJcY@ zTn20|Jc$*-qDq)72ToEMEU@68qYC#9hK#B_LMie&@!bXoY8zvLACU63L^7hOii9Q; z9m-`U<5;_z$`WYB3p?;LEj})$KOT>`#!ya32I1gAoJgQd2_TjPXP#VfCv3@NMg&ck zolpurgkcDw>zc~4N~#`?PZek@LxWX(iVW6-BFSW(8G#R>;` zQ${tKJV!bs-O;9EqVu>)IyDDaS^~IvKT2kh#}taFxv24(j=+~VN{SAL*tW!7QuR^4 zx2gJBh2J2(7&k7XxGnAoEfqCLU~^RE6u;GKQ_h^kSr(_NZH*T;_#e|FJ6e&tui8nQ(hKJ(K4{8eh@z2JLF*e0Z-4O{g2hNfN zg()%s)4aOclT`*Cga<-AInXqjaLVBjO$G(TE{JG$qC@P!QTZ^1>l}wni$4;;Iw}-Z zG+8_lwyKH{Pzk)WHA@DejF=7cLKOR+&+{>{K!+FHEE67&htI*3)lKE^Ic6!jX~O=B z5p*h_adXy5fIu$Vgj;OL{2Gzl}r;YOuON_%tMw5A2O<1Bz{r1&=u9ZqPKZSuHI zLI%+sH!Mkk53*)zC;N;iri=+a3KktV1$bCM0I#ekdpre3DL2a1NV-=Z7wgK72+X`G zV?6O2ub;EzLl%UH$oA|fN>mYqCo0sy-U9}<9%w7)e^u(_N9un7s<*HJSkX>000000 LNkvXXu0mjfTx={% literal 0 HcmV?d00001 diff --git a/devices/surface/surface-manage-dfci-guide.md b/devices/surface/surface-manage-dfci-guide.md index e1df0dc226..d9b08bd9e4 100644 --- a/devices/surface/surface-manage-dfci-guide.md +++ b/devices/surface/surface-manage-dfci-guide.md @@ -31,7 +31,7 @@ Until now, managing firmware required enrolling devices into Surface Enterprise Now with newly integrated UEFI firmware management capabilities in Microsoft Intune, the ability to lock down hardware is simplified and easier to use with new features for provisioning, security, and streamlined updating all in a single console, now unified as [Microsoft Endpoint Manager](https://www.microsoft.com/microsoft-365/microsoft-endpoint-manager). The following figure shows UEFI settings viewed directly on the device (left) and viewed in the Endpoint Manager console (right). -![UEFI settings shown on device (left) and in the Endpoint Manager console (right) ](images/uefidfci.png) +![UEFI settings shown on device (left) and in the Endpoint Manager console (right)](images/uefidfci.png) Crucially, DFCI enables zero touch management, eliminating the need for manual interaction by IT admins. DFCI is deployed via Windows Autopilot using the device profiles capability in Intune. A device profile allows you to add and configure settings which can then be deployed to devices enrolled in management within your organization. Once the device receives the device profile, the features and settings are applied automatically. Examples of common device profiles include Email, Device restrictions, VPN, Wi-Fi, and Administrative templates. DFCI is simply an additional device profile that enables you to manage UEFI configuration settings from the cloud without having to maintain on-premises infrastructure. From 4fd793c680f5219bd2c217c24c4bcd1a7cbf9d40 Mon Sep 17 00:00:00 2001 From: Beth Levin Date: Wed, 10 Jun 2020 14:19:23 -0700 Subject: [PATCH 183/228] simplifying story --- .../tvm-exposure-score.md | 21 +------------------ .../tvm-security-recommendation.md | 2 +- 2 files changed, 2 insertions(+), 21 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md index 0305625c65..023e88ad09 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-exposure-score.md @@ -49,26 +49,7 @@ You can remediate the issues based on prioritized [security recommendations](tvm ## Reduce your threat and vulnerability exposure -To lower your threat and vulnerability exposure, follow these steps. - -1. Review the **Top security recommendations** from your [**Threat & Vulnerability Management dashboard**](tvm-dashboard-insights.md) and select an item on the list. - - ![Example of Top security recommendations card, with four security recommendations.](images/top-security-recommendations350.png) - - Always prioritize recommendations that are associated with ongoing threats: - - - ![Red bug](images/tvm_bug_icon.png) Threat insight icon - - ![Arrow hitting a target](images/tvm_alert_icon.png) Active alert icon - -2. The **Security recommendations** page will open, and a flyout for the recommendation you selected will open. The flyout panel will display a description of what you need to remediate, number of vulnerabilities, associated exploits in machines, number of exposed machines and their machine names, business impact, and a list of CVEs. Select **Open software page** option from the flyout panel. ![Example of security recommendations page with the flyout "Update Windows Server 2019" open.](images/tvm_security_recommendations_page.png) - -3. Select **Installed machines** and then the affected machine from the list. A flyout panel will open with the relevant machine details, exposure and risk levels, alert and incident activities. ![Example of the software page for Git, and a flyout open for a selected machine.](images/tvm_software_page_details.png) - -4. Click **Open machine page** to connect to the machine and apply the selected recommendation. See [Investigate machines in the Microsoft Defender ATP Machines list](investigate-machines.md) for details. ![Example of a machine page.](images/tvm_machine_page_details.png) - -5. Allow a few hours for the changes to propagate in the system. - -6. Review the machine **Security recommendation** tab again. The recommendation you've chosen to remediate is removed from the security recommendation list, and the exposure score decreases. +Lower your threat and vulnerability exposure by remediating [security recommendations](tvm-security-recommendation.md). Make the most impact to your exposure score by remediating the top security recommendations, which can be viewed in the [Threat & Vulnerability Management dashboard](tvm-dashboard-insights.md). ## Related topics diff --git a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md index c3e900103b..16f53d738f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md +++ b/windows/security/threat-protection/microsoft-defender-atp/tvm-security-recommendation.md @@ -85,7 +85,7 @@ Select the security recommendation that you want to investigate or process. From the flyout, you can do any of the following: -- **Open software page** - Open the software page to get more context of the software details, prevalence in the organization, weaknesses discovered, version distribution, software or software version end-of-support, and charts of the exposure trend over time. +- **Open software page** - Open the software page to get more context on the software and how it is distributed. The information can include threat context, associated recommendations, weaknesses discovered, number of exposed devices, discovered vulnerabilities, names and detailed of devices with the software installed, and version distribution. - **Remediation options** - Submit a remediation request to open a ticket in Microsoft Intune for your IT Administrator to pick up and address. From 25681fc3dd8046230b88c78843f7c72c0926b04d Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 10 Jun 2020 15:50:04 -0700 Subject: [PATCH 184/228] Update dma-protect.md --- devices/surface/dma-protect.md | 4 ---- 1 file changed, 4 deletions(-) diff --git a/devices/surface/dma-protect.md b/devices/surface/dma-protect.md index 68e0409bb6..93909724b7 100644 --- a/devices/surface/dma-protect.md +++ b/devices/surface/dma-protect.md @@ -20,7 +20,3 @@ Direct Memory Access (DMA) protection is designed to mitigate potential security ![System information showing DMA Protection enabled](images/systeminfodma.png) If a Surface removable SSD is tampered with, the device will shutoff power. The resulting reboot causes UEFI to wipe memory, to erase any residual data. - -On devices that do not support Kernel DMA Protection, IT admins can: - -- [Block DMA until a user signs in](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dataprotection#dataprotection-allowdirectmemoryaccess) From d7f5ce5d1c2fe983c36120d99113edd9c4c060be Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Wed, 10 Jun 2020 16:07:30 -0700 Subject: [PATCH 185/228] Punctuation corrections --- .../kernel-dma-protection-for-thunderbolt.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md index eeca0b68d5..a68fc44c18 100644 --- a/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md +++ b/windows/security/information-protection/kernel-dma-protection-for-thunderbolt.md @@ -20,7 +20,7 @@ ms.reviewer: **Applies to** - Windows 10 -In Windows 10 version 1803, Microsoft introduced a new feature called Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to externally accessible PCIe ports (e.g. Thunderbolt™ 3 ports and CFexpress). In Windows 10 version 1903, Microsoft expanded the Kernel DMA Protection support to cover internal PCIe ports (e.g. M.2 slots) +In Windows 10 version 1803, Microsoft introduced a new feature called Kernel DMA Protection to protect PCs against drive-by Direct Memory Access (DMA) attacks using PCI hot plug devices connected to externally accessible PCIe ports (e.g., Thunderbolt™ 3 ports and CFexpress). In Windows 10 version 1903, Microsoft expanded the Kernel DMA Protection support to cover internal PCIe ports (e.g., M.2 slots) Drive-by DMA attacks can lead to disclosure of sensitive information residing on a PC, or even injection of malware that allows attackers to bypass the lock screen or control PCs remotely. @@ -34,7 +34,7 @@ PCI devices are DMA-capable, which allows them to read and write to system memor The DMA capability is what makes PCI devices the highest performing devices available today. These devices have historically existed only inside the PC chassis, either connected as a card or soldered on the motherboard. Access to these devices required the user to turn off power to the system and disassemble the chassis. -Today, this is no longer the case with hot plug PCIe ports (e.g. Thunderbolt™ and CFexpress). +Today, this is no longer the case with hot plug PCIe ports (e.g., Thunderbolt™ and CFexpress). Hot plug PCIe ports such as Thunderbolt™ technology have provided modern PCs with extensibility that was not available before for PCs. It allows users to attach new classes of external peripherals, such as graphics cards or other PCI devices, to their PCs with a hot plug experience identical to USB. @@ -47,7 +47,7 @@ A simple example would be a PC owner leaves the PC for a quick coffee break, and Windows leverages the system Input/Output Memory Management Unit (IOMMU) to block external peripherals from starting and performing DMA unless the drivers for these peripherals support memory isolation (such as DMA-remapping). Peripherals with [DMA Remapping compatible drivers](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers) will be automatically enumerated, started and allowed to perform DMA to their assigned memory regions. -By default, peripherals with DMA Remapping incompatible drivers will be blocked from starting and performing DMA until an authorized user signs into the system or unlocks the screen. IT administrators can modify the default behavior applied to devices with DMA Remapping incompatible drivers using the [DmaGuard MDM policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-policies) +By default, peripherals with DMA Remapping incompatible drivers will be blocked from starting and performing DMA until an authorized user signs into the system or unlocks the screen. IT administrators can modify the default behavior applied to devices with DMA Remapping incompatible drivers using the [DmaGuard MDM policies](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-dmaguard#dmaguard-policies). ## User experience @@ -110,7 +110,7 @@ Please check the driver instance for the device you are testing. Some drivers ma ![Kernel DMA protection user experience](images/device-details-tab.png) ### What should I do if the drivers for my PCI or Thunderbolt™ 3 peripherals do not support DMA-remapping? -If the peripherals do have class drivers provided by Windows 10, please use these drivers on your systems. If there are no class drivers provided by Windows for your peripherals, please contact your peripheral vendor/driver vendor to update the driver to support [DMA Remapping](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers) +If the peripherals do have class drivers provided by Windows 10, please use these drivers on your systems. If there are no class drivers provided by Windows for your peripherals, please contact your peripheral vendor/driver vendor to update the driver to support [DMA Remapping](https://docs.microsoft.com/windows-hardware/drivers/pci/enabling-dma-remapping-for-device-drivers). ### Do Microsoft drivers support DMA-remapping? In Windows 10 1803 and beyond, the Microsoft inbox drivers for USB XHCI (3.x) Controllers, Storage AHCI/SATA Controllers and Storage NVMe Controllers support DMA Remapping. From 303006305275b13e233932300f9d59d3fa26018d Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Wed, 10 Jun 2020 16:53:11 -0700 Subject: [PATCH 186/228] Update TOC.md --- devices/surface/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/devices/surface/TOC.md b/devices/surface/TOC.md index 3040211666..bc2ee2a9fa 100644 --- a/devices/surface/TOC.md +++ b/devices/surface/TOC.md @@ -62,6 +62,7 @@ ### [Secure Surface Dock 2 ports with SEMM](secure-surface-dock-ports-semm.md) ### [Use Microsoft Endpoint Configuration Manager to manage devices with SEMM](use-system-center-configuration-manager-to-manage-devices-with-semm.md) ### [Surface Data Eraser](microsoft-surface-data-eraser.md) +### [Surface DMA Protection](dma-protect.md) ## Troubleshoot ### [Top support solutions for Surface devices](support-solutions-surface.md) From 8880251640b8941f2f6ace0845beacedaeede79e Mon Sep 17 00:00:00 2001 From: Steve Burkett Date: Thu, 11 Jun 2020 17:33:11 +1200 Subject: [PATCH 187/228] Update update-compliance-configuration-manual.md Add integer values for System/ConfigureTelemetryOptInSettingsUx in MDM and GP policy sections, and for Allow device name to be sent in Windows diagnostic data in GP policy section. --- .../update/update-compliance-configuration-manual.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/deployment/update/update-compliance-configuration-manual.md b/windows/deployment/update/update-compliance-configuration-manual.md index fc22965271..21fc9f1681 100644 --- a/windows/deployment/update/update-compliance-configuration-manual.md +++ b/windows/deployment/update/update-compliance-configuration-manual.md @@ -43,8 +43,8 @@ Each MDM Policy links to its documentation in the CSP hierarchy, providing its e | Policy | Value | Function | |---------------------------|-|------------------------------------------------------------| |**Provider/*ProviderID*/**[**CommercialID**](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp#provider-providerid-commercialid) |[Your CommercialID](update-compliance-get-started.md#get-your-commercialid) |Identifies the device as belonging to your organization. | -|**System/**[**AllowTelemetry**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) |1- Basic |Configures the maximum allowed telemetry to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | -|**System/**[**ConfigureTelemetryOptInSettingsUx**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-configuretelemetryoptinsettingsux) | Disable Telemetry opt-in Settings | (*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy order the effective telemetry level on devices may not be sufficient. | +|**System/**[**AllowTelemetry**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | 1- Basic |Configures the maximum allowed telemetry to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | +|**System/**[**ConfigureTelemetryOptInSettingsUx**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-configuretelemetryoptinsettingsux) | 1 - Disable Telemetry opt-in Settings | (*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy or the effective telemetry level on devices may not be sufficient. | |**System/**[**AllowDeviceNameInDiagnosticData**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowdevicenameindiagnosticdata) | 1 - Allowed | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or set to 0 (Disabled), Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | ### Group Policies @@ -55,8 +55,8 @@ All Group Policies that need to be configured for Update Compliance are under ** |---------------------------|-|-----------------------------------------------------------| |**Configure the Commercial ID** |[Your CommercialID](update-compliance-get-started.md#get-your-commercialid) | Identifies the device as belonging to your organization. | |**Allow Telemetry** | 1 - Basic |Configures the maximum allowed telemetry to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | -|**Configure telemetry opt-in setting user interface** | Disable telemetry opt-in Settings |(*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy order the effective telemetry level on devices may not be sufficient. | -|**Allow device name to be sent in Windows diagnostic data** | Enabled | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or Disabled, Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | +|**Configure telemetry opt-in setting user interface** | 1 - Disable telemetry opt-in Settings |(*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy order the effective telemetry level on devices may not be sufficient. | +|**Allow device name to be sent in Windows diagnostic data** | 1 - Enabled | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or Disabled, Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | ## Required endpoints From f68acff31774f13f455e99d4eea84177c264859e Mon Sep 17 00:00:00 2001 From: Jaime Ondrusek Date: Thu, 11 Jun 2020 09:24:30 -0700 Subject: [PATCH 188/228] Update update-compliance-configuration-manual.md Corrected some terms and style. --- .../update/update-compliance-configuration-manual.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/deployment/update/update-compliance-configuration-manual.md b/windows/deployment/update/update-compliance-configuration-manual.md index 21fc9f1681..1387e22018 100644 --- a/windows/deployment/update/update-compliance-configuration-manual.md +++ b/windows/deployment/update/update-compliance-configuration-manual.md @@ -43,8 +43,8 @@ Each MDM Policy links to its documentation in the CSP hierarchy, providing its e | Policy | Value | Function | |---------------------------|-|------------------------------------------------------------| |**Provider/*ProviderID*/**[**CommercialID**](https://docs.microsoft.com/windows/client-management/mdm/dmclient-csp#provider-providerid-commercialid) |[Your CommercialID](update-compliance-get-started.md#get-your-commercialid) |Identifies the device as belonging to your organization. | -|**System/**[**AllowTelemetry**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | 1- Basic |Configures the maximum allowed telemetry to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | -|**System/**[**ConfigureTelemetryOptInSettingsUx**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-configuretelemetryoptinsettingsux) | 1 - Disable Telemetry opt-in Settings | (*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy or the effective telemetry level on devices may not be sufficient. | +|**System/**[**AllowTelemetry**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowtelemetry) | 1- Basic |Configures the maximum allowed diagnostic data to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | +|**System/**[**ConfigureTelemetryOptInSettingsUx**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-configuretelemetryoptinsettingsux) | 1 - Disable Telemetry opt-in Settings | (in Windows 10, version 1803 and later) Determines whether end-users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this policy or the effective diagnostic data level on devices might not be sufficient. | |**System/**[**AllowDeviceNameInDiagnosticData**](https://docs.microsoft.com/windows/client-management/mdm/policy-csp-system#system-allowdevicenameindiagnosticdata) | 1 - Allowed | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or set to 0 (Disabled), Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | ### Group Policies @@ -54,8 +54,8 @@ All Group Policies that need to be configured for Update Compliance are under ** | Policy | Value | Function | |---------------------------|-|-----------------------------------------------------------| |**Configure the Commercial ID** |[Your CommercialID](update-compliance-get-started.md#get-your-commercialid) | Identifies the device as belonging to your organization. | -|**Allow Telemetry** | 1 - Basic |Configures the maximum allowed telemetry to be sent to Microsoft. Individual users can still set this lower than what the policy defines, see the below policy for more information. | -|**Configure telemetry opt-in setting user interface** | 1 - Disable telemetry opt-in Settings |(*Windows 10 1803+*) Determines whether end-users of the device can adjust telemetry to levels lower than the level defined by AllowTelemetry. It is recommended you disable this policy order the effective telemetry level on devices may not be sufficient. | +|**Allow Telemetry** | 1 - Basic |Configures the maximum allowed diagnostic data to be sent to Microsoft. Individual users can still set this lower than what the policy defines. See the following policy for more information. | +|**Configure telemetry opt-in setting user interface** | 1 - Disable telemetry opt-in Settings |(in Windows 10, version 1803 and later) Determines whether end-users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this polic, otherwise the effective diagnostic data level on devices might not be sufficient. | |**Allow device name to be sent in Windows diagnostic data** | 1 - Enabled | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or Disabled, Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | ## Required endpoints From fb4f3ea1686b17b6de3aa45bd751910199344d53 Mon Sep 17 00:00:00 2001 From: Thomas Raya Date: Thu, 11 Jun 2020 11:11:12 -0700 Subject: [PATCH 189/228] Add image file --- .../images/device_details_tab_1903.png | Bin 0 -> 32620 bytes 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 windows/security/information-protection/images/device_details_tab_1903.png diff --git a/windows/security/information-protection/images/device_details_tab_1903.png b/windows/security/information-protection/images/device_details_tab_1903.png new file mode 100644 index 0000000000000000000000000000000000000000..beb0337379e3c5939a3a9d129584155f03bbf660 GIT binary patch literal 32620 zcmbrlWmKC_^e#$WD9{!wP@q78;>8_GDQ?9bN^uV^L0XCwZ*d9G;_iVUf#Mp11x*6M zQY>gl@yqXj?!D`LIiJpltYos*J9}pDnc2@g&wisnYATUDrhQCAL`0&Z{6U9^=+-e2 z(QWaEw{QNLA_9K9@u@@21bMOB? zx6pQs{zOEfw^TmJ>G@miqVAbdoOjAz?Ole35<*tzP+^lOo>!_F-%B5cF~=}JoI}N+ zP$a&;^O?;jQD8N{Ipx#qQQYmel)!{9V*%2PdtQ5EqxLdKne+3rV`ID_*L9U7q@<(` z_V5k$AjStu14Sn%O-;UPF0Sd^m=stNYhfBM*w5R0t?}IUN3dC|cUe_c6$!O~qrJTn zl?UxDqKn8YEBn2DN+KeM@W+1lpqn5LBBEdSIFYHve9P*$h=_PTVyeY^k_2z2*7z>s z{NJXRm@W~~J7PV^cBY9}F%i)hDkF^B=3wTHe@uRLo6maE*xxwM;j0fkn4z1V=!-!q zfKikhLrV0Hs}j&$i~XNYYrBItq{b+Sh{kVI;;c(X|36c1pRabg{F)W6{|zvUj`do~ zx9Uh{^=E!^+yMptsj`Z7R6;DE1D%Njn!BcW{PN7QNXj0~4!bt}ZWM?s)?YMl5T9{s zHwO!B+hcH9Qf|(LyWCFt6)PI>(DzVN~a4}R?K=@BRA`JqsF%YNnjBL=s;zZ*(fe{kwX z=6Fp1pge#}02Z7k8xW7;-qMAYg=G^}J_ zSdIy$`%;0wJ@!)?aKC;=ju#3&YFU$pxH@7v9GWQW<0?3e=e8b}8o;Q9+`csvyTJ^c zn>G!==t#ll`S<9drl^VgPCjFgVKc01A*CgZ6Pio1t@AUvshw|6nr1IB@{1j^k{@vR zs|&XfvPmEpmM(pUZeO!0V0tjD_|%4;vp3s43Vc}e9M|49*q~+8if1|$xfrq^w|s^+ z`Q9vX1pJ8U_!G!)U+!vFa^HuWszv)cJ;KYV^nN@osiQRuj-Z&!G6KA4X?kzv9xd3F z<+3a8FcVYcNC#_mnRF4()dv4YiL}!>$&~s=b#*QJ_0S@nbrR`>M_sBOoNUmg1MtY{ zd-iOZ6OfEcNSQnu4=G+?@V#^LP>h^p0T)jAyH8s07~_Cu2iNxbW;ND5I{8aW?Rg*Z zS$@ZEXC9QgNGs?#4RJ;$KC0HIwQrt0BFmp~_0vG#-y!j2`z~U@-q5mf3L_};8ShM+w$Np&&z6w&Mp zCOwE&wqt*$6CHR!>U>08Z2F>qb-JIw08j--#WZ3}zP0H$;Ee}Y3=;Sd)u%4iuKQ2Y ziQ!ICbZ$MO3;Vnqv_xvo-&~qvVdwTdE&-_CMK3z(j}4{)2@q3JWZnuc(P`eh(kMsB z1=MCtN4G8qcI0mhVAtS*6hnaS?a}>Ewq}v0v6&6FxkS3a!n0*`PBBScWPa0k`&K+@ zz|3mM=vJ8XE>K>1#-F$HJe*FFVLud$`Q1T}k0i54nYjf@v0m z2TNWrj7h{{w7F*@bY8`@>?SxCXVTe2#dZ=ppq1;@c`lBW68-dVJee4A$WuxjRoc=O z0Xc+mn5z@odbYVsRKB?$7p{f16kk zK&C-^A2D3qq7BQEa1yUM1F|ee`n%Bn6G_4J4^!n1Kvi)4)vrJI5qK9Z@9zoT_5-I}PvT>gTTcNev3}GoWXiGDGf#j#)dn`U zxjh45%IYYM!BMIs6X`XxMThr3^V5zaD2F0r&|73|m&3FnyjK z-HPjsMU>R`!Kmw3ghEABR6H<8B1ZsM6))0({$`{V>T5i^(sePE8UKTVU-e&L!C~QtGRbC?Ho<>dp3Sdj?nK0lr#v zTA%Yw{B?^U0`UN^qvB`U9IMxVWbN}hqwB%Ki`!KmV$;{|Xx-Jfi#uQauvxpb6(jwW z+4uqA!z{afDJS4uyuZ?)2{(2PVvhEkC0?u2V7@woX7g7XKs|y-`e%b@nc#s^UfDI> z{fkF=6LzyC{&Yg_=(8;ww+2NJJti*wLKaQKtpPLH!#^NpiEu*iPd6`RG_TsBK4$fg z6xhnAF}}2qdUPG#Y%B2^*@8VEl*{1U&DItvHNc!gaJ9{T4jx$2BZJitE1H!23N?82iGW{(jU`}KG zZ9^8E_TjIEMXsK&lqTpKGqa>1>?9}EIQ_rwg^rLSphSau2HmABvtU~n*65t&>` zNhO@U;XOWGiN9P&8I6dvj~LU^f|nrkF)&4~AL1|xJIDDS5zTEUqA08GfIHCnHL~B` zmk&a*V{Nh1dOb|bP9Hw%Y9u=<(RGwAi`UzPZ37N`|Kz$ksfi#Kbh{bk8%RWjUdKWt z*4&h(-Atw{V-@3<{ysCi)PZHk7v1s>FHB1~~a*^2J$M+S{TUo_j=of(8|l_slFy zMHp44o>X@=dW1BgGX(n({D>6iByf8fKQ-=_m*b52Vzyh*++mj`Ioc%Uzhv^`({)sQ zJjs9AWFUSau~`0{hA@s&SkBRCR6^oqe7t`mH=JVDV9to%Gc7qnYQ$g2B{QM|n9KCE z{SI~}aLM&p4Yq-PJn?x4x#$L5My^^D2D7G2v_JtQ@=gwu^$&cri+O34M!=%+1?&|^ zGQ}Zl{awP3adsb^>DId>ZztI007#;oLv9Y_ti^mSDqOCKdHke{FV{ecRoHu;4cGoj z#V8&!7I?lQ$&u;i=>u(OQysBOJBd-2;^anCK>wJaoW_A$tyN4j&8&e~L+ANhPuM!H z7T^EjD1naFbK~GihH1ksQ3o{r#947!OJ!La*;UwnlYD!Q!tSfCD>6w*$uYfjha-+< zxdgPOv_H|l#u6d$0)OcnJrNSraFio>5UgD5=L2b2+FF#(8$9}uNKU#uOMuO;){sTZ zT|B>mXhgEq|3S9Mr#K=ap>V(hqF+p$$aHSw?*Bn|H&zlir%L`8=u@t}mRC}W`d_#( z?2@s;4z}_?(C#J>)uCcfh=@X1md!*hj7Nl*7uBqQp)qX`*NRbxg9uXXOuS|;D+ojmqqdr{h6_u8j*4F+I zJm5Ojs6mPsT(kbfP*PKSvHeW|$=cf5f*$?Vc}=I%;q^Zc`vD&exJOFbuMp(AbC%UF zQ~{3YSf1 z>7)-&5;!ma73DS@Yn7j0j9sroYvU%HGrJO{(CwFI1IGLGPjQ_T;pa7XFlgbBSwPL@ z#mas+`g&7T_1(LVA3rK9n;Do`?W9B`GQaTIy&JS!@=|f84K55CqAHKk72zFUTFrXt zJ7fS@Noq{u91Gj~0=O=Eg$$)XCL_ee98OM7K2NK!ACuV~R#h7w<`N?}TOjrm_;dm= zR#j7ZP<8xHFGZVJoLqK@5Z;!8Gudb()7RI}lSwV?KdlsGWGQtyVB6*?(I5u1cJ-Gp zoagp}kD`ASpQ-t{Ucw&}4i5#!FsnKy2K~m!mIY!$jOW;LR!S4z`6ljdw0UoVVm+d-m+m%&xGrv!=%V zlX8$8tB+bq^_kaay^nzt=ly`1tB(|vH18JL1ITj?4|5S-+a`|)htCs7ve(2P)JA8` zXAQ>jLc-kGkzVi&{%FOwdyF6lvdbz=+Jr~ zkx|^!rX}K_bYe1_7eei)+Md2{TPZ}5+qBDIpQR>=vB=o}kYm}~Yc+B}-a8QtoK>Gp zq14OVe;wZCIPr>O5Z_wir!o(3Km13IxdNB(^y+-$kA;VxnZTcf3b`k()MA3qpS*Zg zT3CmgFR4$#IJ{lXyFP;B?nJ?5SF;&|1{^@G@2;8@hQAi^DwaZQMQ6zT^9n_Wxb1N-j-iF-|!uLN8myT8*TKy00vzTMInn6YPf z3JrGV2GFwwQ74%W!|}A%G(Q$F1oqf4_XOI>?M~@HzP5`8e_lD(fR#oEp>yR*NvY%DPwbq!%#6)1{sl> zAQfxV`GJ#DwZU3y!#Vb^(XJZD&ORM+C>yeZiEnN_cK9N3 ztcHR@*#AZHwa98qN8E5RU5ElB`n2t(QQe;ZT|rUySPal7wmtlBRq10ipxGld&;s22 z?;uK!mG$1E-+nJe-40Zl(l4r%K_a}@mI>5(Ss02$4}|Z z)OoAg%2M_XWvhcz`{SNbqL@ommQ0I@uQu#1K>3}EdpjT>3orh~E z(C0clf(GG#5)%*aPExT}?De9Hmx{#<$qjE9E|CoZJ4bXaWpzJmJVCSaXfW?i-0X5;*UC6p;MO_#2_WD#xGRVZ?9(Sf(~>3yutetfx|r+S`> z!v)*t_OO>F;vwyQt@IWiG;4!v3Nn`UgNMCfXJ;zSnU|7iyT!igu)`P4t7ngUt`@yY z%TI^D_}gWqH-J;W78h?6stA%<`sP2s z?BG0KytkgVj=xu8JPH#P!D{PAFol`bZ|Vy7Kns7E z6lO?B9L*||7jY5_Mk5A7s)B!hIQKMqs3i?i@bw&zmOiB&guSMOO8e2vgHL%~ zNXm3gdJ)zKOMe{pY~d;2sTX(R8^HrSivV%qJeOi_ra7Mx)dr7MAs-Fw%Qoy!Q_bq* z7~IQ7)5i6`h@OOGywCuhDH2s^$;%Lb>S=&xblPeAD&^8wGQvpxr(A9B4g;Wh``bQslO zj!30Ac)18IO)5qo$8Ek|W+Axj>E1kchJ`RBr*7?Wi|#PWzfN&Ucb#h)^-TG`|Ag*b zzrt`4mdPxjxAytd0-TtjsyMDNA;*~>M1H%PcW>$PntV35F=!pV>)RTZypwCW#KZL} zm@g)fD)xC^0%h`iARdugWp_I%X6B?~rm{Bg7gP0HpgcvvJ}e&bE$||-w79E271;h+ za9&#Uh`syLTD!8S|7{NnjxKKDBq0|v`3rFrT6dki<3JddoI9`2r17 zH)ui}zO`IJbr}@;*ipahSXd{?Jm@c`fSj~I;q}G>w`qgt{P98k3c1T|-J|-;nxS~y zRA}Sj=qV`|Rc0biWb&YUyYN>OF-dA0*$<1_RlOhA1!eg+bP?RV!4ChtLM3eS&|ZqJ zCwxG(J9yuLg$p?LYPQNN!}ay+U*2=VNoJ$PXJ!*Av_fP?Lu%x5`i`O#JbsqrB>@|Mrk)460Zw{)?Wpe-7ik;fa^hM*5#}7x5{$2R@Bf2>> z*IQwe%3qC-TxKeb9c{~nRfFq+F1LWxS*MB+V$BnEn_A0n5#rHf+oMX~OU2Lob4>WZ zhGq;R6;4Ldc?~FDR()y}XJfU>Lx{y2pTAfupS~_19mHLb?~vE49STYnA0E}TVFu#- z1&meRO$~akmkX<5>4+by?X_=Pg0efjgKDmi89vny9xRvH$G7|;CGey(8YSo=uf;&^ z7kBntl4lw_fR2KaNH1#(8jhnf+RUm~Q9fn(7hOL$Bykie1|1SE6V2{R+K-cW)2f%r`+1>ws^n>l6-Zz%Is+3N-q_d}4@<9Z z%z=r14@KDKRf>_3YiJieDjqScGVYjD|EL_)7h$;0ddlvS0z9GPF0kH!xMcp0gY;%7 zxF_kj)0@4Lu=yT?>7L@V7CTqp29Ra*aku^bqpJxqOpz9={c)t9P`Q9!^mEat=+CNZ zS>4*$IJxLJy5eV1a3z(6Kk?H~rU9>&I%`@57|U2^*HLtC;@aEyi?(7+8Vu{`WFbBu zV=boxucyRh?QJJQ=xY4aQVrJxb?>xWNO^d*gmAevgXLPmTSqo459{VD2r_}H{pS~x z6Z*{1!UU(V;EfrhBdC|E@-6 zTNjSMI46VE86s`9F}wxscugBv)O69Ro}G)Bse$=9xK#qR-P#IL9swk(C?DhFc|$FA zbuY`lU}UsEOnVZNwOlVwpjCi9{8E?aFsD;|<8iY&o_AQoNKkjeVO835mm(lEJ->a1 zM^=mY(a=zAGtyqVWsJIcgzTwtD2%V?I;%0|Z}}0!DJx~sJO^puZ2^&z;bB!;_mRSI zbVkR%4>OMim&MXp+WWf~e?`e*7qLl*j4PK=m9Wvv%EjK-=wo)H+ zcnD|~ocv~^)gE`)*{)-P8W#ocPoVoIV^&j&^vuGhl5%(HImAvhKd!;>8%Y9@>~6BJ z?*yOxYlYoaD2mQrsV@V}){75vubrmel0@d1NhL~d(TU~qy%~~ib_v5|O`&-u=P?!* zCQqqXR!`0l2Om`iqwX=RDC1GZfJ9NkT%Sj9-Oq088e8Lr&GHcE0k#hx9>dFD_RKSKgJaNAXDoYu-PzS>jBd zxYLMw-k<`xPPaT-85vKiAJ&7bO%|NbzYKW)x#V?XyW)KZ2@nMA`n$07iU|vxCYAB< z5YkICu%y*}7a_SctbgIC#PD_2 zka*~g^h4LZrRQh407elr-vq?%?&0CjF&!eEUxt0{YswdD@WOe)ywyL}u(R3X_Fvb{ zcog^}0xEPlE1cANG+sv(3Oym@g#c{U?}lhciyv*kMMbB6QsdC}4o85zPe)r8cafF@hx&@9qIMzsxxnbXQ#_}H0aF}Occl0)Og4+^`a>{ai2+p5EAq#a zkVCQOJgi!8FI@%~wY?WdBG}hU#jr|BNDAt&DyZ;TyZf)V2p?B6?)$t6+a$lKeY3%epel*iGglXdSmr|{wf_`*}d@zXlkjCBa zJBgX^L^h45nz6}lN(G#grH}PNjeA~&Rlpz~oi?vJ_0n2kl9XqB^JLEr#IJLv?2r}M zeZBpC<*O zu32oGa_Dil?~Bw`nhLf2CQGpiH(2u5P0Imz_DHE%Xpw>mUVoM12|2MB#h6wi$(G$40SRgM`-L_*kc`FAup+te`coAo-BO$w#Oa`G!8jr)3xQlbN{S{2fxm zoZr4W$DqN#e$>HX%->8IIkeZYnmk799tc{Rm$!$myl{8BSO?Tp#Ds)|{1lHWS|65= z0u|_Z$shpL72Dg+%)vF{b8unNW{XaOg{L+v_*eA?46iG)VW3%JflYsHjs}Nxw6q|y zd}i}dORd4lN;-Y%o*So^&hAlbCI05-KKmw^HbUK%-)tpw)#&c7sMJyPl^$wisq*SC zb@@FGhO?yl?L_*C_yCWG_B1Frf5u}vM${XP zAtfCxuje)X{xTH;(*|r=OYvEtD%iOZhk7M4$|0@{7If(AOE{ zxCkb)lNi!;^wBtr__rY&8&D&{NfP<3n_-Wdk*#IBL$bnSg9b>?iKKbvyD)5LYBq-@ zI)Yh~h;t(48Fnb>e+MthW(kkS{r!VgIx%}_PZi37bR`9uTUGvoioJ>kn*_GPle5{i z&}#PPE!Vp}(E55YuFtV88vx_WOGEc4r4Jt>BW0leqk3wXPUwSb$l)2NM=0drAj&*f zDKZN3vXPF5yKT?I#=;qsYnb9?)xw{bG1iq0S6(%Z+PxQU3u5?CC=v1C_9;&`5eVQIgo7%Jo}{bEy{{UmI)au?Hbv(vtuv!dz#6GBHPUD zhFwYW3YmYc?V;_6Qees~vQ@}D=jneus3m>0>|^6Fo@#E;6QR%R&t}t1k1L4WZu=J= z)!r&J{|UV=i7s4y#b@v8F%e+8*BHon7S#={7ei}X+Me{Ao>CUcq>DT{P?Oy0q@rRt zm^`hm7rRDECqBObk+6?S@9oGno%ds_bK^>fwgeY95@>jS12Ji)Mu6ps)T78F4tnqS z;Y5!qa%^_Xn#-q8zm9(T==5BpxRJy(&(sEp)#4g_1L$AuoDYw^lUr~&Xu3C*mA6F* zldhK3$lUrjC!OIkeL2C8xs@+ze%l1fcXQ8!exU(>NVW_Ct$$0u>Iz}l*1+G7)$)iR zeGM;I==u76Fx(H?=>hrRECGUhV!4TuKd zQ_W_i3BKLX_WFO5p5LzSoF`fa)O@6+Gh60;qf+L3#>P(@IF_DK0+j8P6U)y$y z_m2p;nW}+zGCl+3yqW8iYj3v8RbB=SKOz*w>Yv)}4fFAisE~S^Ncc>@FR~sUv+ZA_&wyBZ~^4Icgd_Wv$4m_~(4N&m?L*gUc=S70)2xv-~ z&R?~)Evj?F3P&C9&1kq?SG6s=vJofX)Fc?*e(DVuA8EHXm95>4Y-?z*JrTwMYAS;~ z27|&|6+Wt3cvu{s@*EYhp6jyj5k+TKkSS78P}?Z(G-b1Kk0-h`hhAH?vZ)l=F_Dur#$x2w-B=N8# zdl<^NVyd7tW*Iac!F9ZC{GI(`8v0B$4OOGJlb(k-$2Fc2b`jPYgK?X>3Lg|mbr`c% zznSyV(kY+dY{M1%g>!$XL_f13x56A4S6a5|01Z>f zsp%A9PhtlLKkoq*v}KZm1(eu}sDwY526%+Lq;WAaVrEGPjnTL>CjWk{*<`>=fvx@>YW9pxC`iiOOjHy3~*RaiTp|quOth8t5X5)#)PyL9AX+O@GqhLcM#mVN;&@yE9 zoSi_v|5Qw{w9yNknmEVz1UDUocRt5;7T=^8=Lu$HD9>)V(VN-Wk> z0+acgm07|j-rXZ9)j{acZvekq(>TDM&_hBVDdtM_*{-jgnt{vsms^)-cuJ}y3$Gn* zrajbe%@extw$(}2|6dIbCBK1^S z?5;P*;fJ@G>SG_MncUxk+Bfhwz!hU;GJGU>=im0Ac3-L_(S^@$ke%y8zw?<;tmfyx zBk6pgbg_%qduV7yjXO4!e=l8r>?;|g41kSjIbBZYj1HrDB@eknbYY>a%5tOX|BWmZ z`cLwA`@d`60KO_JK863cWjws6zN&7j-_vMS4~KZ=EPzjNLrtC;xw#1k@Fe z2ZMd^plI2Mt=~-@zhlo@B__>-=`&~5=}YcaJi;=O8OVYLUh2u36;xoinjL*(-55vur8ubzGd%NbXfRQRPkYj$w zD@+lhkOt>S38D$r_Gwv4CQd6h(b0Jx6GNMjt?AEhJL?Tl{by+`=yR%V_qn#JZ_W8? z9@HY+(^k1$G*yC*AH}LSe0zdvp*ovM_mY#pj7Ro(nd-uLL$y>2yoLU&(Ih%8IAF#z?Ze_|%7Bx8pnXOqsxF+2^=CVt0C!--u*cq##V2Aah-p zOu6*xDzk}8GgrcArPoT0+*Ph+XiRR@J-)J~JA5{~IT!W@8{)RO7Ba5qeYP-a)H$@( zeU1_k_qxu?(xSXK`s7 zD(tcN^A4$j#DxwybW+s_mOZVXnrAF+jdz4=sZ{5)oL!VC)ufK`gKRCgt=-*s7B55F z$W}TT31uhNnFCXc?gC35RK7o2SLk(ZDcOv2AO~**#T{l(lKBHteGqvJE~1(BE8Wdn z<(hIjv>0@;dn8c5njq$ZAZOrMdO|pZ_dTHAHr@eRm>)%lw~ZF^D3~3XgLVY9E3wrj zYtqZkDsy-b336!xNHs+#B@R&rw<$^m;gs|cIwM2uv#)E^wh9zM`@>8aUS^>ou5Vr_ z6GH-Sf|NKwzrw#dxijurlOGsXAbPqMR@TH8Tvk2}GEbB_%*~6?PV}}tR~u11@N<4l z$Y17)d3m0GKO{Xi2e&pE1a&6&E4ZvO{f{Co~*l(qkb4(XFFGf z>+J}joAL9QC}{k-aQ9_!3`|UaQ5W4_lX+H1t<)R&ozdd}c%9iW!Z_?jFyi>0y~A^j z+=*YNOS0S{r^tDx-|e;0Sj5sTz1+<_F~PF7*7xATv=#w?leCue2!Axubm|R#AQTBq zfOBvJAn4@gZMMwa8jHpTTiBsDfue{&jlXnXOVzQ++2Q2mmC;lR1|d3bpZu=mmG~qr zXAGe2- zbBj`X&--YvAHb*SFJPhE!&?8>*){ft=^9B4;8*cnM%z11+faJJ*7!-4q+0m?ERYeh z!hQ^SP72O~G)B4o&kuCXQM0XljQKscbz&>BB7ng@r{8jp8u2rN3xn}|d!Jnpsq_hf zLO`d^c0Q65LY&$OI5o-TAz?u|U89_H>ivAMVP{*1Z`R??H!~*X=}tb)jsUx<uFJ!}lM&j82N-XsO$87eSwx(WR}{TvspQa;kc z)88K$*xzpoUmCMEAG1FR zlsmz>vR%kf@JGPHGG_4RG1Qfmjhsz=p=mD=*CtU7sNq#5lh|mq8K!`$P#tMX9~8LR zd7K+SLd!oP+uEHs)TN=DQ?q%kWBzI=wu+E!zw530EKXu)YKCI>SU1cT?W79*;Fy)+ z1gvF)gjHFMud$%!=l;kb9AWaTbr>1`XJ5#((5Zq;-omoEPGmY;%;TyU)xmMk29S4@ zFDf?H>3@y+jo%2oPwvu`2fs8jeCn~}4f=Dln`asU$I&pUx*7kXsd>Q>R|8j{p~1(p z!10OkkM3b*^S>o)IE@Gq*%3f<*g1gDzOApa!LLUX-YYd(n)IxG#_sGZxuGcB+<*KO zCi<-*g=Tk`{^?Gz95@?Lfw9ofWL(>(%wFcVd{@YXbPnUK{y33EJ`z%Jq2t?cl{C}c zAm#qihjMl{Yb$e)r}A|8v0n>iTN8&fO+b-$GoDlM!rqaq%4?zYm3qW^`efW4XCA(Q zBE)Q{W-O%5_wN?+P;jw zASRA7*6q7Ks*#D&9d(ad53S;zbCsA0oSh=QTHZHTR-F<=%7$Kn^78UhQYh%@H5jI+ zFXj}Unp#7W;em^=*XK_dsstRn$|*;V@7)z1^(|Vr5#MWgA?y(T6;U4btR>nlsz~9U zJ&*TXZ3xOt-bWjjiQ{06$1nu;SwV0~qxGD=kVGo_W{-68fwU?wZ@nUR9<4XFD4FXs zge#oeXGHp5ylB(S$%yw6mJua&e3STMv_@cz49X8=!SG5cj|Sq|PKrh5 zjZ4c)b9~jD)|-~o>#1iot8;6rB!-4rz<9O9v$H1;j5i|z*B4t~;*Zs|ac9h284u$DNDjTPMPzxJ*)g802FFB*vU)C~AHNZbDlEY={+-9(S z?M60*lfl1`E70^80pjfG8Wj2roi4)0er3h^rRZU=KF0D@_ZoVEU+{JOb0} zbd~MX~u(Me=osRLF&SUPZ zlopbMfl1#fM0BS*)Jf$$aapRPqQ`Y9+rYd1i zQgvw1b6(IN2Z$T$cm}>l|0(Jm+in!=5w?x%wGYhGej)y$#{qZdvmMu% z`k~QIwjGk%xp)1re7o8Vn%=%Rl=z}jG~PtQTq#0pVOhn+!ZGHY;@OS-7ICvm8o&Zi z^`_hDj4zJ=hE06?2cw#+GHy{fRn_xc$SOTv%hsI9myax`G1)`=c@P47ZUrmBO**C$ z@#T-Cpdb5eSQ-xDcgNrgI%lE}31??#TU$=`6JcRtJ3BjZadCRQj*gDT#>T9ytTv7} zb=Ap3qobp7(a`~?hwFW@)QR+x8(Ukd^|@2Ci4Ih_`Xd5=tjrHXoBhlpC}n(@AXm2A z$h4h%W@(wYb9{y0yBjhX8ylOiQjI zG9_})E=7n2+IDc-yDM zkd;H#9oMq*;YaZXMt)mYZE0Glk{$UIFTIq)*Xv+Xndma7-HHh+Oox%aRe*e!VGCoU zcB*Cn*#Tn58&X0PTf7n8dJu>W*k?7r16hJTS$BxNU_-?K4m zwmoFti=%nnaxo`-(u(!td%jb0Do_<34zx7BTnyRN2U{+&0yl>b#m&h0l!J;9p@pcc zZ0%@{d+Py1WkaX7d$c{~@&-10!ky)up8STs_Oa37D=R64JR?j8VSPTn{`P7D5~!Hl zM3hIpSmn)XTa_#efC{KU__C4BjGY4K59{9y#+>XaMF3UmD`wu-L7VT$CX0qIY<({o z=zCCsO4Mv^=r=M7iHtP`n7H|dSOvbfv#4mc-P(S^l~Sb9yyPs5+^!Hza~>Wu@?p9* z7d~~-N!t*YH|WPf3>{mSi~>Ry$@#csW@bXTWgXbyqS!w-)!^~XwuAQs9ucA|#-Qhi ztTXu9*PSOQQJR}8uW%kG<4(h~=b&f$C(-Q4yg>I!#sXpBuAsZ;;eG#B^Ncraw!zD` z1{WiBNzfVd1I%gU(a7T8?;j@N!R8S1T1cMKO}M^I}+pa0fY!!x&mfNoTu_1+U7+f^`s#M(kh$LpEk ziJ%5p_U`M#UO2EMw2EiWwXoVA%m)oOIg=4Z`c{HA({32#X8rR7lYk2gZ%-#VW4F($ zo|-dsg8WS91zMakh#y)}qx(@N7n4BqRp;Rzd(H|sK=dp2#{^dzW^7+By1b#M!C$t^ z_uli2PB+Lb0`XJ5ro23mfTJJU#=`URWP$^yiZw(;M2gKeVA;(fmuK6vHH@+$L5oeU z6$Vu%H!tFT`}PeAy-Z?N+koe3(Waz}1~*?_W<{Jg=4j2a2VCq5ORtf96X4A1h6?n* z51D2}0gs&~-D6gxcPM-z1LhXxmHeSf{L#+nMFAhM{t%ivKBa%BgM8xORr28{FVT79 zpW+&_Y-JpzS=`*s2X+pt8u2yw)Y+FM@tIATt=Oy6%QiwDt)(qKPqs)3DrRf}KwD`k zHUM!5N^L(fRaMTMBbXzP)*yTCd#tn_bJ9j#-=25_WIyse{ZA~HUMjY)Vd>kJ3~I@( zTEL2q0Nq`qK99OMvXmBo5H9ekcE9D_maXM^5z@9I8nU(KEXo^~`gAFXJ#Im`8lVLX z_WyT%m3{u@gz>fiuxM;}+p>S`T+o(7@aW^rLXp6OqU9~JqD0M_sh{M_=_z@i-CEC< zS?z|R`T^KhtOea(tCormUjOU?Cz2-zRF@=;LBl?n%gwiu>cLk1d!iVeEeo>D?^gE^Njh-%eDe@wYheim1MieHqSpdehbdX zi8e%}Mra!9pgh@=8Y(-266;3SQn82Rm&f`F2_0k1M_V01?SD)8du_Bv0C{zUfM9c< z<<#|Vr;|9c9oP(iSatd17%64{5prBJL)Or~uq2Sg5TqLIU&ey+gEx53w32v!V=I5u zK$nSwp!WGIhsYw&?cvr;i`&k2PPB~6SFXBN7sTduG9?$K?#A<&4y=lI z43@(cX8gO%ir5=WXzOQfIf^_liV`syHUOd^HJg*j6XoF{WMcKjnGC|WeJhFFf<)`+ zoXb~YA+7DjJ%#4P>X$6SPK|N-7^FB|;*xqS@HbnfFYDXnU}F4;Qt`L5{fGfnh3di+ z!o}=^RyFkl700U_0G5U0GB#3D#kc;EySuw59vX18p%6<|XT8wf{do)|4l;B9FJ2vZWjv@^?WN&vdT_RY2v+0m|N~E>DX2ZrG zwK%G;oAQJzhpVP0y1l{NeORgnl&E2-%~(H6TedZCrnyGqmoEZ0)HMo3Aw=VAhP6^h z)BSP~B zEobz2`xgcO^V__+-YWSx8N`DnGj?8XU@uSgi8Eq^m^3IU&`;h=<%Mu0F!I{59+xAk zvg6Z`bek{7Ta){A+6j_8u-3h0uHfO>oy}E}HWdE?>Oklrb~b%Pc#4gGoTS*LP|4+| zRsuY)v`yt%ve~E;(Ro3>?0ayL9L8Cl;~D!B`Po#UJ4Mx79m$#HeOLKO0564gTkNG+ z&uLPFs$o~qz-3b7O(>qG<5!*+*V*o{H}h^Hv;(f{Y8qq@!_O~Eh!J{JJ1u#A;y_*V z8cQ!?_2EQ!9_02m=dh~LZp`qKXDEN~!8gp6@b0Obqdq-BXp7td)pj8)$ja^-+8s=l z`v0`|-BD3(OP_eXiim&$f@F~_Ns?qxaz=6n34-J%3r&Mck}Nq$5CO?KHCf3`&anwC zIW?han%KBLdIY`zOw}P@dvvKNeI}H~siZ zV9M%Ay8b0)CEiA+@sHO1vB@PXud;%u>hcfz=zL>3u(`XAG2NB12`&KS!3h0qM~hB91HBtNpAu>Y(fyvNiD3-@pxwjNL%CO<$dy@ zG&?)Hpg@t9L%;k73>JEHtc9$vqec40_C<@s%2>hBF}vz%XttL)1%+){nKLEHVX(mWYE9p&wAkD(rZ1muErifO&9%+r-hFVUKe{K>MPn~_fDn_u#ygfy*>*X2wh$)A2yczgE1A&SJl$*I z(}VZ3sfacBBz}Iih@1!CdsJF^1XcF)*v;E1PqCCuH`W?!ipIM`(E=-cjKI2I`JS>F z)ween^3VIl4)>ds7T-KOUTHe0np}9-CxWJeu)d}?aAX=1taPqJ&NmVz#!kZBkXYPf zSrZ6n`&8$``1@#Q#+vf;*NTw^;L=v?ey#-f%C~*Gt5ave$sIs~;}tzhOXyX@6fUwc z-%RpWs|1gtYV4Nx{^M2Qs8Wp?D;Mu$_RF86-QotV2y=Qwi^@x<<3!ON5DVY8=5&_A zDCAfXSY1M~J3voKQs6w^G;YOh&b?BFZq%dhr9~>4U_0^RL#9&x*qG!>k%FAfhBA(c zd2KC+wp3Ks5Z7D6t*Pe5(VF3EtJcP~U{}a_j0bMm+hjAMP?oaXz{YLaqcwp*@Wwcg z)bpeONm8aA6FXMM7rHwVprsx~H@#Lxw)&c%FT4*%()PQzeg(W)UBNxtp3m-9KpU_( zrv!P_m?51q@~ihjt9j82gScq^Q!oa(kllT!CZ(_W(Kxqes3E`;U zdCR*mIZx_d$A2D|h4JQTq~XkAx_z`U(yX2-QMu(~q$bH>H6L8okGELywv81lVFhAX zoe(tkJuR(8N(W!b5FA+2rh!_UjNPD{ro_n87TjsdY0E{cip zo2r(3Wjf7=5Ki#B>??iq+(#pXfALMe={lvd3!{A(b6WZs+tW+&@gt;XMidlS*bbY! zHQ~X8SLVKYdk2EeM);{`=WWyngSZuZgq%LZa|KnsM(hiTOJo_zXnzHQArRG#aQue5 z3}E!ug8U25d6wd;rrfY3VWO~i%16bcyybZBt7`Om*)q78bec1BorI)MUWNwp0 z0SEK``#`YYj+l51+KWUYF(=K?nd9kfG<8FkW+9Mo*)2ZLp8Xg|axJ4%(j+WPrhn35 z`qbI~#OYu?)yrE$luVUcJj`eIHqkFZV<^wlb0BuQuEe)%-tH5-F89L3e{cS)`bv$~ z1M_d+D-OsWA|FQF$EV1m^^b5DL!O>)huACUsnm#@9NKU(`}4+*wklmORe&sHlNQ%E z-Gk|0o;$jNK#!;9-PQ*M1O=TF4|h~prZ)Mk`yVH5#j&VQPEFB?dKRaqrhfbO4TuE* z;Ws?Y*RPM&ru=nxlj=4PHuqpu(k70!YIn0gp>F0C_O?y0M5s@!%+_M1%{?s~d_}4v z(i{bJoX5tNEi9LbW8D_2)P~PyxeX}TZaLc*D#cL~tkj7`Frg$8SHD}49j3LSYdY&U zVFtO3g{{vZkzG;Z>zym1j}o`k_bOqzCLA#xuRmi5krG>y&D^T0s<~uc%x~5bVn!a+ zWcI}wR89Z-rRjFqYl!^-G@OTlMBEmD<=Ep~zYTI6IFFd_h$Vu1o1|yPrs)hH#ZMnr1aV&Jw;E^r?d#07DJsGV=@T2p=_OGo!gPOK0cwno*P5Y zlB6Y>T72~?COuhU5@75oc^w@_eG#ZFr$bPKzp~Fe7MJp7MaRqxT_GkONqsRL7`XB) zEZVAZ51((;RY~C@H;;LBWvweNI?$z{K6i(kWowZ|F6qlV!Nql_RY~xti zf;4$)XF-M*E^eumi_%Qh>LUyI59x=ICSWI%6|9Hs=tVUsl$usL;>m z|f`;eX_~+Zz*EgJmsM*CikSN=4w>GIODREg`E>zc^naCM$8BKnGh};Pvp-wzmE}AEj(%t*0{uIenEFpJogbZrp}FP0Nia#+V5W&Dm_p z%81*ChO*@rmwZm4dm0`K<0B_eikaFUAJ^g0(!BdLzYlfR&~WH5s^P14(75$cq3VDV z*Q8)*%p@x3i2DI@rMIEBHW6^NV>We2cr$npTVdH<>onhBH}MqUScpAj{5892Z$pqd;aB)hk5RY39jQ-vf=M%lvhPx zx>HJq)|zhLSlaGx3-tD}jA~%2J*Fx(lY^M7WVaiR?Z(Y`oi$P_Zk7^Zwo+4x=p+*o z^ww6$te#bl@g`HG7_iw=Jc!{L%4ih=BjJf9MzElZU!CDFri<|ct?o!Fd9MD1_;`h{ zBzN!Lb#-;EtgMWUjZHJQIjw0+H-9`KsML z@0MxmJPR>xar;8=? z+iL3TKeDlGy>oaYlOi*Dej$@tua*7Noyf~0%glfq*xQ8*a&jF4@Vn;^C;T`FiS9wJ z#++;}bpC>5)YjJ0JU{~Q68wAj4pBt=M0b35H_`CjpmY0Zy)sit--`~(B~@m=Jf2@E zGu|sw5>J_t(-q5BFBof>7#XMO)t+R;ZF2x)wTrWrl{>HiC@wCR#E3ryz#%~M3$~^I zX)6zSY(H#h97{B{xX}M9DJ1Vohrez!rJUi$WDUdd+9jK>vT@5I`(t8;}9df4_*Yxal0&Se-2N zFT|3Bmij}0P-P!X&vqFJN+MnUji&-6jzq`*6R~s`4H3@a;QZhY%yB0VYCIiL8sx7pE{(3Q^R~Le zTS)1j&fjnP_$xj?c_$WQ25eYsK51{0Vu;i1m4p=72n;BOs}8XDDTWf@6GTR|Ce71r4nXymxaXu3)-m-VlFichPAcR-)DcDq%tG+JDw=o+d*=1kL zM=ApfnCR>l9+rIJdh*r!D<^EK3M`0?AvWTA*Hmi`&5-4dl~!EFNP z)Ye&>dFw^~YLt$pcd_c6?&_jj5(@-s#~nQPp6SupyKRcwj|Cm5cSrtO#5@TQxP|kA z#x^-;q8A0&RscxT@ial>K^!WYJnR;LKtF!rHH{E|d>de)^apwTy9 zx~Gre%CTP~$&AUQeVbeIdec3`084*>APeQ`%Bmk;x8@ZpMJ(J>*kSaA|%{0sV0u3*LZK%1cjLC zKrYV;o=v~d_FIhWNKJ*KDLB*r8}rs9Kk_bCm05H9ESuU!XmBdf3t0XdB*$!qHa~){ z&IDMtvRX(p5A~&aKN*nlhunEfjZrGgLe_^LJz^9dm~~3IBv$pNe=}zyOjp>aDbCUx zl{lPH=`eE`#7rWu*elemX6>H^q!C2-dypgqyz*ZElE6l*-;2+205dB)UT2iam6dA{0B`WOm@k%&exlzD zQ3W-(3{UrX4y;N|=5*7?eb{3D8R1n7kd_+KUppKud3js&X2yA@?s@J}SFk}>l#R0J zeze66oQ8Xfo2^FBDQo$r>AFd6Lzw|4F*=MD&ih0Kr7K+owq>Ium4eFoPnYjk5#023 z>DAp-LMDekL#NBSfBE@K(ICJb`V#&396ykvXI5zcik0*(I=d4#yeF;MP}P2!Vzy#g zHq5eM4xA4<8*JFduA!3XPP$==N?xAO##=Hxm2OpTD2?l%rK86MsS#09S+CsL14Zu! zNsW}>M*-QjiuOe;L!gX+Xf2GBUTOp2Sz~N157|g4)(G%$bT6CLvlN zvVGpl5C-cJYVkaVrwcNenx@!VyL3yI7~BM;qndDjgzS%JP-fm&-YT7KdNa1hN%fqo zE;(1!B4;`lG8h_h0U+hk-+KX?AOEP-*K{$lou*6zZI%s(@BOhulJ^ARZ|`856fo?C zPYyq3-%3jJ?cF?`D(a7i_Sr;B5Gpxdzdj|VVcuA`9cg8pKb2*fcVUq-K>77m{$jr0 z7$`IU83g=?jhd63+-ypToBTZ;=+Z;gpvIKm7aBUZ*jDYap*uPkPQr>xPuUNzMo5t} z27;dY`Kb;4uUN;O_4x026^>?$sni5Urqfono5(mH z#LjG?2%#FvZk1}&6cOolaG6?XOQ;RwJEJI_MfVAI*m`AU8oU-96KPVxF0nB)dOGGs zBh)zCZ`WPF-m*Y6S(aw``m4=bNARG);{X|R>oXYVBx;hb(ZxLg!Ps1YqRBk%K9P{9 z`XS@LrHx|H`-8U^?SB%P1}q{P}jU5It^oNO2qV0T z@7vVSqig|;!V`9Q=Xb}Za&X3=Sf0MMpKe2RLBm-k$za)-kG zt4sUjE`8}fZ#SKgsQ3g84c!sGbQ^IUBkSZ($L*g3`|R_Gh!c4;Y-)yQXZ4kJjXe)h zC-C^s>mtOE2BH-~{?x`F7K!lv52>}?Bz$hjo#fLiEXJQH!DG$Hkjh>eg$4xMsjPiALNRgP8q55p zzCAr9rm|D}?CLV_Jo!LQHxYHu>LjRp5cA2r<2IZ}`w<&+o~7*@am!!RAEa}qOkAAr zVTR@98CMeq8(D<*jCuq?P-KKKYTcj*4{yt`q&D*#zaOII(QS01H+b>eNSGVk5`?)O zv^9QsjFxdytUfb8&1rI*mq5+&a748$8FL2@paHI~{E2uk56yecAqge4oZ`$Mm(2uIV&N z>+laqE&Oiiy?x)6vuSj~`8*h-wxiGZgv}4m34m8K;QK*T065>;hG#U*YjAn}%LdsO zwKfQ}KL@vrA=$v&7E#K#!es629))Ln7n3nc!YzqE)YBX8fb^0pcT^eCm(m+3tx@S*&xK=XlX(<$=cv(d{ENSxaSyYWV~PvA z)abjm%Z~ZRE~)l=dTE~+m-`33{mkEQmVE1{i~andb8`k>eo&hZT(03betigM6+N6mONvv+ zN;kvb&pbON_~3YB{Bsv5n&90t(`pQzG4^s#vfopDaB1svU}LPpA}1I948Vxg&yPj< zU#;=yx|3@NdJtu|nK)qSnLWUail9O5UYs>DlkpfSOp z>#=F?dk-{V{rKAi4{gelvzg5OC&jbb;3y~I0g7CE^r#>|zgVme7MEO=cqDn7V)5wq zG$}ITL_E>QZfx>hU^!(-kVJ#`!O`jY0Za^mZFmDUtGCQ!DtWzi!uXi+$@LHe_>LPSQwP#Y(@@T(93HZykr+o(v z4fuJOhu_a!`IVk@Q<_1XE@LW&qQJ(VD+tI-Z3aoYwW}z;utx%nzWeu`%L0^bh^V-F z2r&n|(i5tJi)eg;14w6dO;#g zUrWrwRCg35zgxRb=8sSENox7w_iP2=A$=5?K3gQz#O~I8X+QtiTAybyHPPpO?i)XF zHg@CZgQ2t`TfFGWN|CfS@X+NE$)XNPt{nSd!_pQF^+ugz>5a@o{yLC#Przl^6Jl3l zUN=lVFV*uvsVu*mvs0kIDipT2&vz|JUM*f-jzo@TcZ1m2RQn#Di#>@e$W=vTWTsO; zlXt0}-5H44^d>;~&Chu!K?BDh=w&Rvv-&Q_Jwe6fyhZxur=nabXlO_!T)d&nSf$!I zns(j?O*WiTH_0iHei>v3M)-+uEGWvS#02B0Fv3f5so_QB%v_QwI2h;>49M4rC zGUBMHXpb&V!}E%LkZUw2%pxTfFFn<)$}_<)?rl?wvA~Ch1Q}ywY;>RVO`~LASOK0j zr!hqDNqv`1osFKFlW{&qIdi{1SU95J-FavV0ZaP=;0OD^J|?nrp_O>6UCMQtS>>%m7{20uwzx%uc z@Z_(Y8T9!r+xIh8d9w0kCp^``78ES=2|iNd?5Y4DEd+uv;>=;lwF|AkUuomsZY=knKPc#=dGfpdtkfjpV*TYX_B z9wC#gSNUe;fM1Wh5_t~yNBwGEU(jwc%lFe`3Irn!x8JSXzS2}uT0-@SNHMHAG-nL@ z+&gVnABx&5NL1bEEJKEPTDkToa8*6|1#h<5uJ#! z>Egu)y6pvR>B}9Ex~P-QGxw8cH&MGkQ;xjlUa=aIwKZ3Tr(|55AjDhA{Le`qE_rUJ za5J2DYYGW-Z6S6=$+=BjTF|VFiDxtSynxN1(^e>|L$G1yLefb112>(qtM~nw@uR9I zz+B&+tc@l}D(kKO9WP+n^39wc4lGc@g3(lg=WbW|f*OkSJg|Q(Xx3>jibB9@8U}`* z^uUrOtEKgkcW2tYO9{qYQBfd<_BA`^cOVIfXq|t&h5ye$)g3Q$bMt@8&l~wB`#S;! zcl%$6wE^KXASC*)2Le!}>-rPd0kgV#CbTB}bw-Bb(rX zRz;ZVYoiNOZPvAQGE~CO`E2Q`UaosF6|jvfUGMbRdpn)r;9L;I#3L`bwe8(} z2YX?xW_SB-Izc9DMavey?yf^B?bwsM1-W8rd8@rJNO3S>5=G;ZfrEylG?e8}_{3*g zpEkZPhU6v_AcO6W4v0 z=wMKt-k7n=>R1wy;N)Q9^K#z@vGEBpTR!F`)zGbxBsOTkO&ot4Af)sd-a0vTnr6iD z{kdSp$yf;dzSf%qox!Z}i&^e|{VQ>*o$uYH@Nh?#FR`xr&TkteKiO1acYjBsebRo)?twn`xvLF&y={zO=MdjKu{# z9-|HQ?=|K#eN%W@u+#f=bi1+m{i+*B^nCOgKEq9%lU<-GzX7401O!;qM`6*lU5C3F zmi>L(o;Z^(96>Mb9u{)~y+svxMJ1@Luz$L0dfIh2BdGZUpt z(;a_2t_E&q1{&pQCXsq|$Quzrsw zW07tp`pd@TOSz-dTOxqqN&a40xSlfvt8$5NxEPw_ZWD4oFh{fp_fP#CANJREHucOO z(%plXw-Lxy5`8U9%?ZP`>zXZU!k8^WPE%u2&~t(3AzNh+g08)sU72sy7Dd9}zEJNU zzAy+R4@f}y+fi2E#SHJ%b*s~k)8sMdzIoe>DHUAC2V?ub4(Enj!`O;!Q_3XQ<7jk$ zI9(t+3fg_NmkaPc7Y}+@`28MITenUJ@=vB!A&Uk1ioa&`-|O@CKkV1IJh0PD)mjss zKkP5I5cDJp1(owKMRq5b2rt9lI{0qwxBviDwgFh8sEHV_P^8((DQC4ntd6c0g>wx| znE!EElsFymU4A|zY;gND?mapf_t&b|XfY}`><9yS#+`RsCjyLokOiyN2X=95B{TVX z?Cp70ek@psjCo1lgtYI)AC~0BmBto7C4EjlTKc`r;b9oFE8GH2gu3ZDk59$X6ukCf zKQ@supWmgDKRuPVA2PGG74;h5Fi({C&F@lKlVU)d_ukH_`0xRK=X7R}$60Z?agass zAbPaY*xXjsx%x+WJ+8Ro^4Cx0cu!rWX00dfJqJ?F$DKcqcj2;edfvDeUu}d1Eq|$cn8BK^hUM5}R4i%g5@sFb7;Wi(lE4^7)hBcEm`p|+kl7x8j#d{7Fr>=%QBGh-!HV{4O;4Crv?Yg3ilbK+Ti+T03C zK78u_u7a8Q14Xsu$2@IocGQg(-P`Qaw^%an_K3DlsY#6;zI@u~g5Y&Cc}PW`8J`2w zWGLb846LFA`v2aV=f@8T{X`-g)i-_QhYQv;Y&ex~UWo>v)2@Ratc zsJQEN+yY|As-Zx{yK}EPqk#Y5hy5hv_)}Xi4Sr+-Go3dnS}7~!uvX7tr%NJ++p4i( z$CsuK40E{EEFKw|?qJRKh}xHWIcr?Ywh#YyV})}>qp#PhBex}nLm-Z>Zu?>0!JK$) z)v5dL#)~Lts^+lu*H- zXi(ht_sTv#r|ypwN+d+ypi~`A14+bEdw$a4ytZeP(;du)-r;3WQg)&5JHP_>06d}Y=zhYI(qQW0f4IR38%Sz54ag%w8aB8pUxI2*3~5+-p8`h5RuS=QUKe zRV38Sw3Xhssgn)R;&tf8rI;()@}Zf~b>Q3Itp;Av2|2dXH6C1s+n=*0FGRcppTiqQ zo{l+nl~c0V^k+O4_6rBUvK!=x{GfIGu8K;ssj{N%qIesT;Kk)cT_Uz>NLu9bbj%?( zey}U)rLFgO!vGfK;T@a#Qg3%hdr9GC_N;^lL1tW;3k4!wuRDePGt&$`^?>G`cqy9+ zA{r`iH{=OdhrQeDI|*q)YITJb4oI#hXsy#+D7{p$>J0{pG4T=781T7PA0F%7LI^u! zig^)Q{IjSh*sR6vg5?hFH5yD$0SXWOiugeaz;$_OLTmC^|p6^ zHV(HXL{WC^CelEFh|V~kcr~+mYS+Uz2Div}R6=m>)^&j20Qd-&RdNz@2ccU3R@!;o zdkHDkORldpgzzq#qPwGa?~_vxXX}-`!A)drK2Yy>p^wZAk%%mENTWzR zU-f>?nCGIax_t3I$2ch|$K{UK@_tiS*JjCc&&ZOmYb*ZVWcOuLU39)y>3J$hgRhlR zFI)H5U`fjM-`v&M#^7V31BYjTkdVwy+Da5DYtGA0dwBJ2Mtq{uTkXUXpMLdfLX&2|%QV?y9thM9oVHY(I1 zzkeB}oOJ!64KnhapWlh$u;mKX5iE|DSK`@ec@zIXk@HW;0Y-{qjHPA^&DO z~ zaB*>e>kELP{q`na`1tt0Pya)W*IypirT_b^;PAvX)sj0NJP`=&{O`#5ub%q~&>|LQ zhV#C3^aD_FR1W_yO@WL6a6vHO4+#he{;5V26Pn*@q@e-Ofd6QHq%W{r4){i(=!K!l z6c2*y=~L`j`(@U4c!Ub`Um>Zyi<>|~19Wb777GXYubdqYSD=8gCg=<+; PUv;G zI7EN}@}GHSfU{DUuUvSK&OgT^cL3$RkCOY(qDI#e{96#|f9J530x5awZ%qWOiUANP zfc(n7BnCd}H*?iy?CEuzUZcV!>5x`fc^sS*^k=IpfFa1k=sQ3kNJIv$> zuBNW!0D}4}nF5sWQ3S`5)FIGr`}XvR1xMvdqd!LrL(f9B1J8*7TfcCPDz16 zTuA{SXFLQp8?cX7>Oipa9Sj{Xh@PxIh8syiuUG>`e{ka>7Kqy}<$p>IVcmcsVHPa@-G7SBCq8#VduFwjs$=sjzidqZCZ zAHXPR&fTp#LQb3U`Yyb2Ndf8lHe*3HIUVz&jX&QOyDpkGH+b!FJ$@o#iSWVfGgh*4 zu9SX<9+nzO?A+iPwRGAMcu2|9>$h0a@%_i1emXU>zZ%+@SNkYG{CM{qm!9<-zy0a) z)K9#$PMRe&o6*k-=CXDz;W7W2y0-ZdS_I)Rtl=>{g-x%{kdTg9%&l`llv^Cq)Xar6 zD_{`NZ+}-KuVQD{L*qezO2efM<>R$1-Q_1+UN&o3_i+%h*;N~^M`ZkJ@+<8D{haBm zmGHluotna&bzYKa|5;;Q3XV(rX?s{zpIMEdv)rMbG(b2x*WJH8gGm6!TF^2q8^ewH-J13 zm~j_s%SeBvOX+n8qv8#Z$)Kd8p^*($c7hruq}?Y;icLwRmLG^xecP0m(Alq`^2xj= zQhCVAt4BdGEN`u&gE7y#+{VKb%57p13UnQ-bXsIYo;(@BLmlWZ+V+&6Z3>~L0;)>x zzs~jr>lC5Rt()E+Au0Qytci0vmR!MH)AfxGkd2RtAtzg|YbSdQUqEC^%6*c!*o>5f zM-9$3HSltC2v96TP(gdqVXSXoM$V_#T$H9{6Gf(?N6Gtj3g_iaq&#hftH@>N1ZP|~ z{_*ad{nz~Q3xd3CVl8PilN3=^@BJmy=3pW^!S1yvbw&!GJhS?_U%fP6t2}(5EE!(> zq@TxqXa`f)dK5%9pDDhYZWG@~Y%l|*B5Yzd$*kst;DwL`d|XXoPZqK%=H%=9_A)~0#@J^=&&t)s?==pt(X&ZI*{cj zOoN;2ZRkCnOeE-ZZC4BYJe-iK0kr)=)~E6*pCi{olhB4JATe;$|LB@+D0TYOcqnxKD+wQ?`=0TSFHY z9ho?V>j93xgNz4=bBDz!w5O-?dde4th%I67O94+P{?IIOcLN*UN>feir?y*lU;DOI z0)vj|-lBw|P8r1qcVShZI;yAFZ9GV2Iv(nDZx8aP^GLhCu2bADt86zh$F{7v+dXnN zu8jdnUiDwaFO#yNbIpx0NQko&?M0?U?A=~F0{-r;bZ=l>JfYgS0I5g5y;U^H;!=od-eyZS41oM;H<~7lKRfqFe&sKW%SqOn zOG@Q<7PG+(xlqKJ;O67|f&PewdvHrF1Agyl>J*XD*}o6n%Hevhsq25dMbn7cov*U0 zMfThX7?{e8R4~su2n3TcaBl7&;i8QGt-$|HZe_Iui57;d6(xH z(dpzn_h|V&U<<>6GV8l;@`sUzl`iX8lST(?HR|KVD@Q)KnG8TP3#{r@e0O%z!N;Z5 z&*^vqo#!k1ioW-u6t{|}8|<&52z+|8J5_aqnQefH&qf)3Tl#COKfR$2HB|t6C^;!9 zwWLexSp6JNu|299G-c2b9D+O*BxDtzwC^lFc*>^-4LQW-`eTpEP7&Zl;c)I$?^?#X~o9d5EWH#whshqwLdy-iE3*s0)$w4)A z2N*{o9;(o)XA}_;?n-iUx3f3Zc;fmUj*|`|RCuG$LzZZYs@l_o6g^`-gx*Epp3-oV*RSJff4R+f5+>+ z8DU#9Q{Z_tFm(P;4r?KS=X6G~=%HLnGezl&qQ&Et<92bN#N|z>F9V#M)A;?ht7P+D zO{}Y0gFe%MuTtyw2*2R$=;{joqYNlKdE92AtMUghH+n&p1~Ply{MSGa{M#)KECxlc zr_{suS>QF=q}Nl=>nfUBaTM1xu-T__fS<;KtR^TJJ&WbyytEowIh1M n%Htj1ck%s`06IEdjL6U`py#^;7?IjO{P@p^~e7LF^ZE> literal 0 HcmV?d00001 From f1e2e9e93a894561f5022a812c44ca8ea658dbee Mon Sep 17 00:00:00 2001 From: KC Cross Date: Thu, 11 Jun 2020 11:20:02 -0700 Subject: [PATCH 190/228] Acrolinx 2.0 GitHub API Identify guidance profiles per repo within the .edn file. --- .acrolinx-config.edn | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/.acrolinx-config.edn b/.acrolinx-config.edn index 4a22e37c62..61cb120716 100644 --- a/.acrolinx-config.edn +++ b/.acrolinx-config.edn @@ -1,5 +1,8 @@ {:allowed-branchname-matches ["master"] :allowed-filename-matches ["windows/"] + + :guidance-profile "d2b6c2c8-00ee-47f1-8d10-b280cc3434c1" ;; Profile ID for "M365-specific" + :acrolinx-check-settings { "languageId" "en" @@ -33,6 +36,6 @@ Click the scorecard links for each article to review the Acrolinx feedback on gr " **More info about Acrolinx** -You are helping M365 test Acrolinx while we merge to the Microsoft instance. We have set the minimum score to 20 to test that the minimum score script works. This is effectively *not* setting a minimum score. If you need to bypass this score, please contact krowley or go directly to the marveldocs-admins. Thanks for your patience while we continue with roll out! +We have set the minimum score to 20. This is effectively *not* setting a minimum score. If you need to bypass this score, please contact MARVEL PubOps. " } From 9d882212fa75af5712d87115a99482e3c7196d7d Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 11 Jun 2020 14:39:01 -0700 Subject: [PATCH 191/228] Release notes for 2003-2 --- .../microsoft-defender-atp/mac-exclusions.md | 13 ++++++++++--- .../microsoft-defender-atp/mac-whatsnew.md | 6 ++++++ 2 files changed, 16 insertions(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index c5927c9a88..cdb95e6464 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -42,9 +42,16 @@ The follow table shows the exclusion types supported by Microsoft Defender ATP f Exclusion | Definition | Examples ---|---|--- File extension | All files with the extension, anywhere on the machine | `.test` -File | A specific file identified by the full path | `/var/log/test.log` -Folder | All files under the specified folder | `/var/log/` -Process | A specific process (specified either by the full path or file name) and all files opened by it | `/bin/cat`
    `cat` +File | A specific file identified by the full path | `/var/log/test.log`
    `/var/log/*.log`
    `/var/log/install.?.log` +Folder | All files under the specified folder | `/var/log/`
    `/var/*/` +Process | A specific process (specified either by the full path or file name) and all files opened by it | `/bin/cat`
    `cat`
    `c?t` + +File, folder, and process exclusions support the following wildcards: + +Wildcard | Description | Example | Matches +---|---|---|--- +\* | Matches any number of any characters including none | `/var/\*/\*.log` | `/var/log/system.log` +? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` ## How to configure the list of exclusions diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index 57fde3cc75..fbf351fb3e 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -26,6 +26,12 @@ ms.topic: conceptual > > If you have previously whitelisted the kernel extension as part of your remote deployment, that warning should not be presented to the end user. If you have not previously deployed a policy to whitelist the kernel extension, your users will be presented with the warning. To proactively silence the warning, you can still deploy a configuration to whitelist the kernel extension. Refer to the instructions in the [JAMF-based deployment](mac-install-with-jamf.md#approved-kernel-extension) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics. +## 101.00.31 + +- Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types) +- Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender ATP** +- Other performance improvements & bug fixes + ## 100.90.27 - You can now [set an update channel](mac-updates.md#set-the-channel-name) for Microsoft Defender ATP for Mac that is different from the system-wide update channel From 79ff52480775adde4812a72f18e6cbe7b9b0f2a7 Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 11 Jun 2020 16:25:58 -0700 Subject: [PATCH 192/228] Updates --- .../microsoft-defender-atp/linux-exclusions.md | 8 ++++---- .../microsoft-defender-atp/mac-exclusions.md | 8 ++++---- .../microsoft-defender-atp/mac-whatsnew.md | 2 ++ 3 files changed, 10 insertions(+), 8 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md index ef0797f456..b35f7ae596 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md @@ -48,10 +48,10 @@ Process | A specific process (specified either by the full path or file name) an File, folder, and process exclusions support the following wildcards: -Wildcard | Description | Example | Matches ----|---|---|--- -\* | Matches any number of any characters including none | `/var/\*/\*.log` | `/var/log/system.log` -? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` +Wildcard | Description | Example | Matches | Does not match +---|---|---|---|--- +\* | Matches any number of any characters including none (note that when this is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` +? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` | `file123.log` ## How to configure the list of exclusions diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index cdb95e6464..4e65c42654 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -48,10 +48,10 @@ Process | A specific process (specified either by the full path or file name) an File, folder, and process exclusions support the following wildcards: -Wildcard | Description | Example | Matches ----|---|---|--- -\* | Matches any number of any characters including none | `/var/\*/\*.log` | `/var/log/system.log` -? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` +Wildcard | Description | Example | Matches | Does not match +---|---|---|---|--- +\* | Matches any number of any characters including none (note that when this is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` +? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` | `file123.log` ## How to configure the list of exclusions diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index fbf351fb3e..40f7391213 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -28,8 +28,10 @@ ms.topic: conceptual ## 101.00.31 +- Improved [product onboarding experience for Intune users](https://docs.microsoft.com/en-us/mem/intune/apps/apps-advanced-threat-protection-macos) - Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types) - Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender ATP** +- In-place product downgrades are now explictily disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device - Other performance improvements & bug fixes ## 100.90.27 From e2d132d8d1b8e998daa09b064f34b604a8e0b3df Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 11 Jun 2020 16:27:54 -0700 Subject: [PATCH 193/228] Updates --- .../microsoft-defender-atp/linux-exclusions.md | 2 +- .../threat-protection/microsoft-defender-atp/mac-exclusions.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md index b35f7ae596..5d04bf7089 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/linux-exclusions.md @@ -50,7 +50,7 @@ File, folder, and process exclusions support the following wildcards: Wildcard | Description | Example | Matches | Does not match ---|---|---|---|--- -\* | Matches any number of any characters including none (note that when this is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` +\* | Matches any number of any characters including none (note that when this wildcard is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` ? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` | `file123.log` ## How to configure the list of exclusions diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md index 4e65c42654..af6fa6157c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-exclusions.md @@ -50,7 +50,7 @@ File, folder, and process exclusions support the following wildcards: Wildcard | Description | Example | Matches | Does not match ---|---|---|---|--- -\* | Matches any number of any characters including none (note that when this is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` +\* | Matches any number of any characters including none (note that when this wildcard is used inside a path it will substitute only one folder) | `/var/\*/\*.log` | `/var/log/system.log` | `/var/log/nested/system.log` ? | Matches any single character | `file?.log` | `file1.log`
    `file2.log` | `file123.log` ## How to configure the list of exclusions From 876846d571f557c1ad4e8f7a20d7c123d391431a Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 11 Jun 2020 16:28:55 -0700 Subject: [PATCH 194/228] Typo --- .../threat-protection/microsoft-defender-atp/mac-whatsnew.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index 40f7391213..dba3915c9f 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -31,7 +31,7 @@ ms.topic: conceptual - Improved [product onboarding experience for Intune users](https://docs.microsoft.com/en-us/mem/intune/apps/apps-advanced-threat-protection-macos) - Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types) - Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender ATP** -- In-place product downgrades are now explictily disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device +- In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device - Other performance improvements & bug fixes ## 100.90.27 From aebf0bc809eafe738528da97fb3e8165ee39932b Mon Sep 17 00:00:00 2001 From: Tudor Dobrila Date: Thu, 11 Jun 2020 16:38:33 -0700 Subject: [PATCH 195/228] Remove locale from URL to Intune --- .../threat-protection/microsoft-defender-atp/mac-whatsnew.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index dba3915c9f..b1deb73638 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -28,7 +28,7 @@ ms.topic: conceptual ## 101.00.31 -- Improved [product onboarding experience for Intune users](https://docs.microsoft.com/en-us/mem/intune/apps/apps-advanced-threat-protection-macos) +- Improved [product onboarding experience for Intune users](https://docs.microsoft.com/mem/intune/apps/apps-advanced-threat-protection-macos) - Antivirus [exclusions now support wildcards](mac-exclusions.md#supported-exclusion-types) - Added the ability to trigger antivirus scans from the macOS contextual menu. You can now right-click a file or a folder in Finder and select **Scan with Microsoft Defender ATP** - In-place product downgrades are now explicitly disallowed by the installer. If you need to downgrade, first uninstall the existing version and reconfigure your device From 2b163375f0406e481b307257bb16e2885254ee74 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 12 Jun 2020 12:45:39 +0530 Subject: [PATCH 196/228] replaced error 404 link to new link as per the user report #6940 , so i replaced the invalid link to new link new link **https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager** --- devices/surface/manage-surface-driver-and-firmware-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/manage-surface-driver-and-firmware-updates.md b/devices/surface/manage-surface-driver-and-firmware-updates.md index a1eea22998..0d168ed57d 100644 --- a/devices/surface/manage-surface-driver-and-firmware-updates.md +++ b/devices/surface/manage-surface-driver-and-firmware-updates.md @@ -35,7 +35,7 @@ Microsoft Endpoint Configuration Manager allows you to synchronize and deploy Su For detailed steps, see the following resources: -- [How to manage Surface driver updates in Configuration Manager](https://docs.microsoft.com/surface/manage-surface-driver-updates-configuration-manager.md) +- [How to manage Surface driver updates in Configuration Manager](https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager) - [Deploy applications with Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/deploy-applications) - [Endpoint Configuration Manager documentation](https://docs.microsoft.com/configmgr/) From ca5561088e4a3531383d071f4478e030c1dae6e1 Mon Sep 17 00:00:00 2001 From: VARADHARAJAN K <3296790+RAJU2529@users.noreply.github.com> Date: Fri, 12 Jun 2020 21:21:59 +0530 Subject: [PATCH 197/228] Update devices/surface/manage-surface-driver-and-firmware-updates.md accepted Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com> --- devices/surface/manage-surface-driver-and-firmware-updates.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/devices/surface/manage-surface-driver-and-firmware-updates.md b/devices/surface/manage-surface-driver-and-firmware-updates.md index 0d168ed57d..2bbe968461 100644 --- a/devices/surface/manage-surface-driver-and-firmware-updates.md +++ b/devices/surface/manage-surface-driver-and-firmware-updates.md @@ -35,7 +35,7 @@ Microsoft Endpoint Configuration Manager allows you to synchronize and deploy Su For detailed steps, see the following resources: -- [How to manage Surface driver updates in Configuration Manager](https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager) +- [How to manage Surface driver updates in Configuration Manager](https://docs.microsoft.com/surface/manage-surface-driver-updates-configuration-manager) - [Deploy applications with Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/deploy-applications) - [Endpoint Configuration Manager documentation](https://docs.microsoft.com/configmgr/) From 435ae94ffd0fabb0fe688517a8eafc5d1e139807 Mon Sep 17 00:00:00 2001 From: Charles Inglis <32555877+cinglis-msft@users.noreply.github.com> Date: Fri, 12 Jun 2020 12:32:45 -0500 Subject: [PATCH 198/228] Updated Defender alternatives --- windows/deployment/update/update-compliance-monitor.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/update-compliance-monitor.md b/windows/deployment/update/update-compliance-monitor.md index 311272e93b..bf80658e30 100644 --- a/windows/deployment/update/update-compliance-monitor.md +++ b/windows/deployment/update/update-compliance-monitor.md @@ -19,7 +19,7 @@ ms.topic: article > [!IMPORTANT] > While [Windows Analytics was retired on January 31, 2020](https://docs.microsoft.com/windows/deployment/update/update-compliance-monitor), support for Update Compliance has continued through the Azure Portal. Two planned feature removals for Update Compliance – Microsoft Defender Antivirus reporting and Perspectives – are now scheduled to be removed beginning Monday, May 11, 2020. -> * The retirement of Microsoft Defender Antivirus reporting will begin Monday, May 11, 2020. You can continue to review malware definition status and manage and monitor malware attacks with Microsoft Endpoint Manager's [Endpoint Protection for Microsoft Intune](https://docs.microsoft.com/mem/intune/fundamentals/help-secure-windows-pcs-with-endpoint-protection-for-microsoft-intune). Configuration Manager customers can monitor Endpoint Protection with [Endpoint Protection in Configuration Manager](https://docs.microsoft.com/configmgr/protect/deploy-use/monitor-endpoint-protection). +> * The retirement of Microsoft Defender Antivirus reporting will begin Monday, May 11, 2020. You can continue to for threats with [Microsoft Endpoint Manager](https://www.microsoft.com/microsoft-365/microsoft-endpoint-manager) and [Defender Advanced Threat Protection](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection). > * The Perspectives feature of Update Compliance will be retired Monday, May 11, 2020. The Perspectives feature is part of the Log Search portal of Log Analytics, which was deprecated on February 15, 2019 in favor of [Azure Monitor Logs](https://docs.microsoft.com/azure/azure-monitor/log-query/log-search-transition). Your Update Compliance solution will be automatically upgraded to Azure Monitor Logs, and the data available in Perspectives will be migrated to a set of queries in the [Needs Attention section](update-compliance-need-attention.md) of Update Compliance. ## Introduction From e5a42df8f32c7c1155dad95884249d1f966043c8 Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 12 Jun 2020 12:43:54 -0700 Subject: [PATCH 199/228] New article Hub Teams app --- devices/surface-hub/TOC.md | 1 + devices/surface-hub/hub-teams-app.md | 28 ++++++++++++++++++++++++++++ 2 files changed, 29 insertions(+) create mode 100644 devices/surface-hub/hub-teams-app.md diff --git a/devices/surface-hub/TOC.md b/devices/surface-hub/TOC.md index 67516c9773..867063cc0c 100644 --- a/devices/surface-hub/TOC.md +++ b/devices/surface-hub/TOC.md @@ -32,6 +32,7 @@ ### [Create provisioning packages for Surface Hub 2S](surface-hub-2s-deploy.md) ### [Deploy apps to Surface Hub 2S using Intune](surface-hub-2s-deploy-apps-intune.md) ### [Create Surface Hub 2S on-premises accounts with PowerShell](surface-hub-2s-onprem-powershell.md) +### [Surface Hub Teams app](hub-teams-app.md) ## Manage ### [Manage Surface Hub 2S with Microsoft Intune](surface-hub-2s-manage-intune.md) diff --git a/devices/surface-hub/hub-teams-app.md b/devices/surface-hub/hub-teams-app.md new file mode 100644 index 0000000000..4083dc8515 --- /dev/null +++ b/devices/surface-hub/hub-teams-app.md @@ -0,0 +1,28 @@ +--- +title: "Microsoft Teams app for Surface Hub" +description: "This page shows a summary of updates to the Microsoft Teams app for Surface Hub" +keywords: separate values with commas +ms.prod: surface-hub +ms.sitesec: library +author: greg-lindsay +ms.author: greglin +manager: laurawi +audience: Admin +ms.topic: article +ms.date: 06/12/2020 +ms.localizationpriority: Medium + +# Microsoft Teams app for Surface Hub + +The Microsoft Teams app for Surface Hub is periodically updated and available via the [Microsoft Store](https://www.microsoft.com/store/apps/windows). If you manage Surface Hub with Automatic Updates enabled (default setting), the app will update automatically. + + +## Version history + +| **Store app version** | **Updates** | **Published to Microsoft Store** | +| --------------------- | --------------------------------------------------------------------------------------------------- | -------------------------------- | +| 0.2020.13201.0 | - 3x3 Gallery view on Surface Hub
    - Ability to search for External users | June 10, 2020
    | +| 0.2020.13201 | - Quality improvements and Bug fixes | June 1, 2020
    | +| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub
    - Added controls for Attendee/Presenter role changes | May 21, 2020 | + + From 65e0c5ec71b385837537e557f306f28f5e0a982a Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Fri, 12 Jun 2020 13:49:45 -0700 Subject: [PATCH 200/228] Cut images showing old brand name Per Deniseb, but images showing the old Windows Defender Antivirus and/or Windows Defender Offline name. See task 4116148. --- ...network-connections-microsoft-defender-antivirus.md | 8 ++------ ...eal-time-protection-microsoft-defender-antivirus.md | 5 +---- ...d-periodic-scanning-microsoft-defender-antivirus.md | 10 ++-------- ...rosoft-defender-antivirus-on-windows-server-2016.md | 4 +--- .../microsoft-defender-offline.md | 4 +--- ...nges-to-security-settings-with-tamper-protection.md | 4 ---- 6 files changed, 7 insertions(+), 28 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md index 2992128fc2..1b7bc129b9 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md @@ -87,9 +87,7 @@ Download the file by visiting the following link: >[!NOTE] >This file is not an actual piece of malware. It is a fake file that is designed to test if you are properly connected to the cloud. -If you are properly connected, you will see a warning Microsoft Defender Antivirus notification: - -![Microsoft Defender Antivirus notification informing the user that malware was found](images/defender/wdav-malware-detected.png) +If you are properly connected, you will see a warning Microsoft Defender Antivirus notification. If you are using Microsoft Edge, you'll also see a notification message: @@ -107,9 +105,7 @@ You will also see a detection under **Quarantined threats** in the **Scan histor ![Screenshot of the Scan history label in the Windows Security app](images/defender/wdav-history-wdsc.png) -3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware: - - ![Screenshot of quarantined items in the Windows Security app](images/defender/wdav-quarantined-history-wdsc.png) +3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware. >[!NOTE] >Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md). diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md index a456334e1f..fbcf3e9352 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md @@ -38,7 +38,6 @@ To enable and configure always-on protection: 2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**. ![GPEdit taskbar search result](images/gpedit-search.png) 2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. -![Microsoft Defender Antivirus](images/gpedit-windows-defender-antivirus.png) 3. Configure the Microsoft Defender Antivirus antimalware service policy settings. To do this: 1. In the **Microsoft Defender Antivirus** details pane on right, double-click the policy setting as specified in the following table: @@ -46,14 +45,12 @@ To enable and configure always-on protection: |-----------------------------|------------------------|-------------------------------| | Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled | Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled | - 2. Configure the setting as appropriate, and click **OK**. 3. Repeat the previous steps for each setting in the table. 4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this: 1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, click **Real-time Protection**. - ![Microsoft Defender Antivirus Real-time Protection options](images/gpedit-real-time-protection.png) - 2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table: + 2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table: | Setting | Description | Default setting | |-----------------------------|------------------------|-------------------------------| diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md index fdc1e748f8..545f77a114 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/limited-periodic-scanning-microsoft-defender-antivirus.md @@ -39,18 +39,12 @@ If Microsoft Defender Antivirus is enabled, the usual options will appear to con ![Windows Security app showing Microsoft Defender AV options, including scan options, settings, and update options](images/vtp-wdav.png) -If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options: +If another antivirus product is installed and working correctly, Microsoft Defender Antivirus will disable itself. The Windows Security app will change the **Virus & threat protection** section to show status about the AV product, and provide a link to the product's configuration options. -![Windows Security app showing ContosoAV as the installed and running antivirus provider. There is a single link to open ContosoAV settings.](images/vtp-3ps.png) - -Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning. - -![The limited periodic option is a toggle to enable or disable **periodic scanning**](images/vtp-3ps-lps.png) +Underneath any third party AV products, a new link will appear as **Microsoft Defender Antivirus options**. Clicking this link will expand to show the toggle that enables limited periodic scanning. Note that the limited periodic option is a toggle to enable or disable periodic scanning. Sliding the switch to **On** will show the standard Microsoft Defender AV options underneath the third party AV product. The limited periodic scanning option will appear at the bottom of the page. -![When enabled, periodic scanning shows the normal Microsoft Defender Antivirus options](images/vtp-3ps-lps-on.png) - ## Related articles - [Configure behavioral, heuristic, and real-time protection](configure-protection-features-microsoft-defender-antivirus.md) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index 5018ae9f9d..5a5fefca87 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -61,9 +61,7 @@ In Windows Server 2016, the **Add Roles and Features Wizard** looks like this: ![Add roles and feature wizard showing the GUI for Windows Defender option](images/server-add-gui.png) -In Windows Server 2019, the **Add Roles and Feature Wizard** looks like this: - -![Add roles and features wizard Windows Server 2019](images/WDAV-WinSvr2019-turnfeatureson.jpg) +In Windows Server 2019, the **Add Roles and Feature Wizard** looks much the same. ### Turn on the GUI using PowerShell diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md index 103ede404e..cb5f4ad90e 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md @@ -62,9 +62,7 @@ The prompt can occur via a notification, similar to the following: ![Windows notification showing the requirement to run Microsoft Defender Offline](images/defender/notification.png) -The user will also be notified within the Windows Defender client: - -![Windows Defender showing the requirement to run Microsoft Defender Offline](images/defender/client.png) +The user will also be notified within the Windows Defender client. In Configuration Manager, you can identify the status of endpoints by navigating to **Monitoring > Overview > Security > Endpoint Protection Status > System Center Endpoint Protection Status**. diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 971482d70d..4a2fe0777f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -112,10 +112,6 @@ You must have appropriate [permissions](../microsoft-defender-atp/assign-portal- 5. Assign the profile to one or more groups. - Here's what you see in the Windows Security app: - - ![Turning tamper protection on in Windows 10 Enterprise](images/turnontamperprotect-enterprise.png) - ### Are you using Windows OS 1709, 1803, or 1809? If you are using Windows 10 OS [1709](https://docs.microsoft.com/windows/release-information/status-windows-10-1709), [1803](https://docs.microsoft.com/windows/release-information/status-windows-10-1803), or [1809](https://docs.microsoft.com/windows/release-information/status-windows-10-1809-and-windows-server-2019), you won't see **Tamper Protection** in the Windows Security app. In this case, you can use PowerShell to determine whether tamper protection is enabled. From 4a4f9781df96d5318010680908d2619c590403ff Mon Sep 17 00:00:00 2001 From: John Kaiser <35939694+CoveMiner@users.noreply.github.com> Date: Fri, 12 Jun 2020 14:12:40 -0700 Subject: [PATCH 201/228] Update hub-teams-app.md --- devices/surface-hub/hub-teams-app.md | 25 ++++++++++--------------- 1 file changed, 10 insertions(+), 15 deletions(-) diff --git a/devices/surface-hub/hub-teams-app.md b/devices/surface-hub/hub-teams-app.md index 4083dc8515..ecc0410e36 100644 --- a/devices/surface-hub/hub-teams-app.md +++ b/devices/surface-hub/hub-teams-app.md @@ -1,28 +1,23 @@ --- -title: "Microsoft Teams app for Surface Hub" -description: "This page shows a summary of updates to the Microsoft Teams app for Surface Hub" -keywords: separate values with commas +title: Microsoft Teams app for Surface Hub +description: Provides a version history of updates for the Microsoft Teams app for Surface Hub +keywords: surface, hub, ms.prod: surface-hub ms.sitesec: library -author: greg-lindsay +author: greglin ms.author: greglin -manager: laurawi -audience: Admin ms.topic: article -ms.date: 06/12/2020 -ms.localizationpriority: Medium +ms.localizationpriority: medium +--- -# Microsoft Teams app for Surface Hub +# Microsoft Teams app for Surface Hub The Microsoft Teams app for Surface Hub is periodically updated and available via the [Microsoft Store](https://www.microsoft.com/store/apps/windows). If you manage Surface Hub with Automatic Updates enabled (default setting), the app will update automatically. ## Version history - | **Store app version** | **Updates** | **Published to Microsoft Store** | | --------------------- | --------------------------------------------------------------------------------------------------- | -------------------------------- | -| 0.2020.13201.0 | - 3x3 Gallery view on Surface Hub
    - Ability to search for External users | June 10, 2020
    | -| 0.2020.13201 | - Quality improvements and Bug fixes | June 1, 2020
    | -| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub
    - Added controls for Attendee/Presenter role changes | May 21, 2020 | - - +| 0.2020.13201.0 | - 3x3 Gallery view on Surface Hub
    - Ability to search for External users | June 10, 2020
    **** | +| 0.2020.13201 | - Quality improvements and Bug fixes | June 1, 2020
    **** | +| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub
    - Added controls for Attendee/Presenter role changes | May 21, 2020 | \ No newline at end of file From 886ca1562c888b98d481198b9eb351e9b2797b95 Mon Sep 17 00:00:00 2001 From: DanPandre <54847950+DanPandre@users.noreply.github.com> Date: Fri, 12 Jun 2020 17:38:47 -0400 Subject: [PATCH 202/228] Fix Local settings descriptions to match user experience --- .../local-management-surface-hub-settings.md | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/devices/surface-hub/local-management-surface-hub-settings.md b/devices/surface-hub/local-management-surface-hub-settings.md index 810691dfe8..4ffa2a3cbe 100644 --- a/devices/surface-hub/local-management-surface-hub-settings.md +++ b/devices/surface-hub/local-management-surface-hub-settings.md @@ -40,12 +40,12 @@ Surface Hubs have many settings that are common to other Windows devices, but al | Wireless projection (Miracast) channel | Surface Hub > Projection | Set the channel for Miracast projection. | | Meeting info shown on the welcome screen | Surface Hub > Welcome screen | Choose whether meeting organizer, time, and subject show up on the welcome screen. | | Welcome screen background | Surface Hub > Welcome screen | Choose a background image for the welcome screen. | -| Idle timeout to Welcome screen | Surface Hub > Session & Power | Choose how long until the Surface Hub returns to the welcome screen after no motion is detected. | -| Resume session | Surface Hub > Session & Power | Choose to allow users to resume a session after no motion is detected or to automatically clean up a session. | -| Access to Office 365 meetings and files | Surface Hub > Session & Power | Choose whether a user can sign in to Office 365 to get access to their meetings and files. | -| Turn on screen with motion sensors | Surface Hub > Session & clean up | Choose whether the screen turns on when motion is detected. | -| Session time out | Surface Hub > Session & clean up | Choose how long the device needs to be inactive before returning to the welcome screen. | -| Sleep time out | Surface Hub > Session & clean up | Choose how long the device needs to be inactive before going to sleep mode. | +| Session timeout to Welcome screen | Surface Hub > Session & power | Choose how long until the Surface Hub returns to the welcome screen after no motion is detected. | +| Resume session | Surface Hub > Session & power | Choose to allow users to resume a session after no motion is detected or to automatically clean up a session. | +| Access to Office 365 meetings and files | Surface Hub > Session & power | Choose whether a user can sign in to Office 365 to get access to their meetings and files. | +| Turn on screen with motion sensors | Surface Hub > Session & power | Choose whether the screen turns on when motion is detected. | +| Screen time out | Surface Hub > Session & power | Choose how long the device needs to be inactive before turning off the screen. | +| Sleep time out | Surface Hub > Session & power | Choose how long the device needs to be inactive before going to sleep mode. | | Friendly name | Surface Hub > About | Set the Surface Hub name that people will see when connecting wirelessly. | | Maintenance hours | Update & security > Windows Update > Advanced options | Configure when updates can be installed. | | Configure Windows Server Update Services (WSUS) server | Update & security > Windows Update > Advanced options | Change whether Surface Hub receives updates from a WSUS server instead of Windows Update. | From 2b296e5d6b2df591a681fcd3d5fe4c8f8c4d715c Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 15:16:55 -0700 Subject: [PATCH 203/228] Removed unnecessary bold from table headings --- devices/surface-hub/hub-teams-app.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface-hub/hub-teams-app.md b/devices/surface-hub/hub-teams-app.md index ecc0410e36..a2e25a8458 100644 --- a/devices/surface-hub/hub-teams-app.md +++ b/devices/surface-hub/hub-teams-app.md @@ -16,8 +16,8 @@ The Microsoft Teams app for Surface Hub is periodically updated and available vi ## Version history -| **Store app version** | **Updates** | **Published to Microsoft Store** | +| Store app version | Updates | Published to Microsoft Store | | --------------------- | --------------------------------------------------------------------------------------------------- | -------------------------------- | | 0.2020.13201.0 | - 3x3 Gallery view on Surface Hub
    - Ability to search for External users | June 10, 2020
    **** | | 0.2020.13201 | - Quality improvements and Bug fixes | June 1, 2020
    **** | -| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub
    - Added controls for Attendee/Presenter role changes | May 21, 2020 | \ No newline at end of file +| 0.2020.4301.0 | - Accept incoming PSTN calls on Surface Hub
    - Added controls for Attendee/Presenter role changes | May 21, 2020 | From 85eee2b34ba7e8150065f4429949e16743dd95eb Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Fri, 12 Jun 2020 15:17:25 -0700 Subject: [PATCH 204/228] Updated meta descriptions for SEO --- .../appv-create-a-package-accelerator.md | 2 +- .../app-v/appv-for-windows.md | 2 +- .../app-v/appv-getting-started.md | 2 +- ...-publishing-server-on-a-remote-computer.md | 2 +- .../mdm/certificate-renewal-windows-mdm.md | 2 +- .../mdm/clientcertificateinstall-csp.md | 2 +- windows/client-management/mdm/defender-csp.md | 2 +- windows/client-management/mdm/defender-ddf.md | 2 +- .../mdm/enterpriseappvmanagement-csp.md | 2 +- .../mdm/enterpriseassignedaccess-xsd.md | 2 +- .../mdm/policy-csp-attachmentmanager.md | 2 +- .../mdm/policy-csp-education.md | 2 +- .../mdm/policy-csp-mssecurityguide.md | 2 +- .../mdm/policy-csp-system.md | 2 +- windows/configuration/kiosk-validate.md | 2 +- .../configuration/ue-v/uev-troubleshooting.md | 2 +- ...application-virtualization-applications.md | 2 +- windows/deployment/deploy.md | 2 +- .../update/windows-update-resources.md | 2 +- .../usmt/usmt-determine-what-to-migrate.md | 135 +++++++++--------- .../volume-activation/vamt-known-issues.md | 2 +- .../windows-autopilot-requirements.md | 2 +- ...ndows-7-and-windows-server-2008-r2-sp1.yml | 2 +- .../resolved-issues-windows-server-2012.yml | 2 +- ...windows-8.1-and-windows-server-2012-r2.yml | 2 +- .../status-windows-server-2008-sp2.yml | 2 +- windows/whats-new/get-started-with-1709.md | 2 +- 27 files changed, 94 insertions(+), 93 deletions(-) diff --git a/windows/application-management/app-v/appv-create-a-package-accelerator.md b/windows/application-management/app-v/appv-create-a-package-accelerator.md index 7f2ec6c3c5..db4fe23b68 100644 --- a/windows/application-management/app-v/appv-create-a-package-accelerator.md +++ b/windows/application-management/app-v/appv-create-a-package-accelerator.md @@ -1,6 +1,6 @@ --- title: How to create a package accelerator (Windows 10) -description: How to create a package accelerator. +description: Learn how to create App-V Package Accelerators to automatically generate new virtual application packages. author: lomayor ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy diff --git a/windows/application-management/app-v/appv-for-windows.md b/windows/application-management/app-v/appv-for-windows.md index 459032925c..bec88a55bf 100644 --- a/windows/application-management/app-v/appv-for-windows.md +++ b/windows/application-management/app-v/appv-for-windows.md @@ -1,6 +1,6 @@ --- title: Application Virtualization (App-V) (Windows 10) -description: Application Virtualization (App-V) +description: See various topics that can help you administer Application Virtualization (App-V) and its components. author: lomayor ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy diff --git a/windows/application-management/app-v/appv-getting-started.md b/windows/application-management/app-v/appv-getting-started.md index 1b1f6592d5..2e1556cb8a 100644 --- a/windows/application-management/app-v/appv-getting-started.md +++ b/windows/application-management/app-v/appv-getting-started.md @@ -1,6 +1,6 @@ --- title: Getting Started with App-V (Windows 10) -description: Getting Started with App-V for Windows 10 +description: Get started with Microsoft Application Virtualization (App-V) for Windows 10. author: lomayor ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy diff --git a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md index 7209027bb8..8fce503469 100644 --- a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md +++ b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md @@ -1,6 +1,6 @@ --- title: Install the Publishing Server on a Remote Computer (Windows 10) -description: How to Install the App-V Publishing Server on a Remote Computer +description: Use the procedures in this article to install the Microsoft Application Virtualization (App-V) publishing server on a separate computer. author: lomayor ms.pagetype: mdop, appcompat, virtualization ms.mktglfcycl: deploy diff --git a/windows/client-management/mdm/certificate-renewal-windows-mdm.md b/windows/client-management/mdm/certificate-renewal-windows-mdm.md index 26580c5095..415aa6a9b9 100644 --- a/windows/client-management/mdm/certificate-renewal-windows-mdm.md +++ b/windows/client-management/mdm/certificate-renewal-windows-mdm.md @@ -1,6 +1,6 @@ --- title: Certificate Renewal -description: The enrolled client certificate expires after a period of use. +description: Find all the resources needed to provide continuous access to client certificates. MS-HAID: - 'p\_phdevicemgmt.certificate\_renewal' - 'p\_phDeviceMgmt.certificate\_renewal\_windows\_mdm' diff --git a/windows/client-management/mdm/clientcertificateinstall-csp.md b/windows/client-management/mdm/clientcertificateinstall-csp.md index 8837ad757e..0f2ec33a8f 100644 --- a/windows/client-management/mdm/clientcertificateinstall-csp.md +++ b/windows/client-management/mdm/clientcertificateinstall-csp.md @@ -1,6 +1,6 @@ --- title: ClientCertificateInstall CSP -description: ClientCertificateInstall CSP +description: The ClientCertificateInstall configuration service provider (CSP) enables the enterprise to install client certificates. ms.assetid: B624EB73-2972-47F2-9D7E-826D641BF8A7 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/defender-csp.md b/windows/client-management/mdm/defender-csp.md index 8c398e4992..0842fb0031 100644 --- a/windows/client-management/mdm/defender-csp.md +++ b/windows/client-management/mdm/defender-csp.md @@ -1,6 +1,6 @@ --- title: Defender CSP -description: Defender CSP +description: See how the Windows Defender configuration service provider is used to configure various Windows Defender actions across the enterprise. ms.assetid: 481AA74F-08B2-4A32-B95D-5A3FD05B335C ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/defender-ddf.md b/windows/client-management/mdm/defender-ddf.md index 6ca8fc6f49..60c2372aed 100644 --- a/windows/client-management/mdm/defender-ddf.md +++ b/windows/client-management/mdm/defender-ddf.md @@ -1,6 +1,6 @@ --- title: Defender DDF file -description: Defender DDF file +description: See how the the OMA DM device description framework (DDF) for the **Defender** configuration service provider is used. ms.assetid: 39B9E6CF-4857-4199-B3C3-EC740A439F65 ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/enterpriseappvmanagement-csp.md b/windows/client-management/mdm/enterpriseappvmanagement-csp.md index ab13935f66..22445122ec 100644 --- a/windows/client-management/mdm/enterpriseappvmanagement-csp.md +++ b/windows/client-management/mdm/enterpriseappvmanagement-csp.md @@ -1,6 +1,6 @@ --- title: EnterpriseAppVManagement CSP -description: EnterpriseAppVManagement CSP +description: Examine the tree format for EnterpriseAppVManagement configuration service provider (CSP) to manage virtual applications in Windows 10 PCs.(Enterprise and Education editions). ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/client-management/mdm/enterpriseassignedaccess-xsd.md b/windows/client-management/mdm/enterpriseassignedaccess-xsd.md index f73c18d744..3ee96832c7 100644 --- a/windows/client-management/mdm/enterpriseassignedaccess-xsd.md +++ b/windows/client-management/mdm/enterpriseassignedaccess-xsd.md @@ -1,6 +1,6 @@ --- title: EnterpriseAssignedAccess XSD -description: EnterpriseAssignedAccess XSD +description: This XSD can be used to validate that the lockdown XML in the \ block of the AssignedAccessXML node. ms.assetid: BB3B633E-E361-4B95-9D4A-CE6E08D67ADA ms.reviewer: manager: dansimp diff --git a/windows/client-management/mdm/policy-csp-attachmentmanager.md b/windows/client-management/mdm/policy-csp-attachmentmanager.md index b09a07d3b2..bc3456d80d 100644 --- a/windows/client-management/mdm/policy-csp-attachmentmanager.md +++ b/windows/client-management/mdm/policy-csp-attachmentmanager.md @@ -1,6 +1,6 @@ --- title: Policy CSP - AttachmentManager -description: Policy CSP - AttachmentManager +description: Manage Windows marks file attachments with information about their zone of origin (such as restricted, Internet, intranet, local). ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/client-management/mdm/policy-csp-education.md b/windows/client-management/mdm/policy-csp-education.md index e316fbdb3f..df04232bea 100644 --- a/windows/client-management/mdm/policy-csp-education.md +++ b/windows/client-management/mdm/policy-csp-education.md @@ -1,6 +1,6 @@ --- title: Policy CSP - Education -description: Policy CSP - Education +description: Control graphing functionality in the Windows Calculator app. ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/client-management/mdm/policy-csp-mssecurityguide.md b/windows/client-management/mdm/policy-csp-mssecurityguide.md index 598cad17d2..f896724225 100644 --- a/windows/client-management/mdm/policy-csp-mssecurityguide.md +++ b/windows/client-management/mdm/policy-csp-mssecurityguide.md @@ -1,6 +1,6 @@ --- title: Policy CSP - MSSecurityGuide -description: Policy CSP - MSSecurityGuide +description: See how this ADMX-backed policy requires a special SyncML format to enable or disable. ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/client-management/mdm/policy-csp-system.md b/windows/client-management/mdm/policy-csp-system.md index 7cb986c7fd..a221c321b1 100644 --- a/windows/client-management/mdm/policy-csp-system.md +++ b/windows/client-management/mdm/policy-csp-system.md @@ -1,6 +1,6 @@ --- title: Policy CSP - System -description: Policy CSP - System +description: Learn policy settings that determines whether users can access the Insider build controls in the advanced options for Windows Update. ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/configuration/kiosk-validate.md b/windows/configuration/kiosk-validate.md index ea34adf834..34b8124fa2 100644 --- a/windows/configuration/kiosk-validate.md +++ b/windows/configuration/kiosk-validate.md @@ -1,6 +1,6 @@ --- title: Validate kiosk configuration (Windows 10) -description: This topic explains what to expect on a multi-app kiosk. +description: Learn what to expect on a multi-app kiosk in Windows 10 Pro, Enterprise, and Education. ms.assetid: 428680AE-A05F-43ED-BD59-088024D1BFCC ms.reviewer: manager: dansimp diff --git a/windows/configuration/ue-v/uev-troubleshooting.md b/windows/configuration/ue-v/uev-troubleshooting.md index 1ffb99a964..9683bd771d 100644 --- a/windows/configuration/ue-v/uev-troubleshooting.md +++ b/windows/configuration/ue-v/uev-troubleshooting.md @@ -1,6 +1,6 @@ --- title: Troubleshooting UE-V -description: Troubleshooting UE-V +description: Find resources for troubleshooting UE-V for Windows 10. author: dansimp ms.pagetype: mdop, virtualization ms.mktglfcycl: deploy diff --git a/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications.md b/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications.md index d2e019723d..8b68977b69 100644 --- a/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications.md +++ b/windows/configuration/ue-v/uev-using-uev-with-application-virtualization-applications.md @@ -1,6 +1,6 @@ --- title: Using UE-V with Application Virtualization applications -description: Using UE-V with Application Virtualization applications +description: Learn how to use User Experience Virtualization (UE-V) with Microsoft Application Virtualization (App-V). author: dansimp ms.pagetype: mdop, virtualization ms.mktglfcycl: deploy diff --git a/windows/deployment/deploy.md b/windows/deployment/deploy.md index 4680e56b08..d86cb2f2a8 100644 --- a/windows/deployment/deploy.md +++ b/windows/deployment/deploy.md @@ -1,6 +1,6 @@ --- title: Deploy Windows 10 (Windows 10) -description: Deploying Windows 10 for IT professionals. +description: Learn Windows 10 upgrade options for planning, testing, and managing your production deployment. ms.assetid: E9E2DED5-DBA7-4300-B411-BA0FD39BE18C ms.reviewer: manager: laurawi diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 16e2488d65..d7c9b71e67 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -1,6 +1,6 @@ --- title: Windows Update - Additional resources -description: Additional resources for Windows Update +description: Use these resource to troubleshoot and reset Windows Update. ms.prod: w10 ms.mktglfcycl: diff --git a/windows/deployment/usmt/usmt-determine-what-to-migrate.md b/windows/deployment/usmt/usmt-determine-what-to-migrate.md index cb04fac7e3..3b16df17e6 100644 --- a/windows/deployment/usmt/usmt-determine-what-to-migrate.md +++ b/windows/deployment/usmt/usmt-determine-what-to-migrate.md @@ -1,67 +1,68 @@ ---- -title: Determine What to Migrate (Windows 10) -description: Determine What to Migrate -ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761 -ms.reviewer: -manager: laurawi -ms.author: greglin -ms.prod: w10 -ms.mktglfcycl: deploy -ms.sitesec: library -audience: itpro author: greg-lindsay -ms.date: 04/19/2017 -ms.topic: article ---- - -# Determine What to Migrate - - -By default, User State Migration Tool (USMT) 10.0 migrates the items listed in [What Does USMT Migrate?](usmt-what-does-usmt-migrate.md), depending on the migration .xml files you specify. These default settings are often enough for a basic migration. - -However, when considering what settings to migrate, you should also consider what settings you would like the user to be able to configure, if any, and what settings you would like to standardize. Many organizations use their migration as an opportunity to create and begin enforcing a better-managed environment. Some of the settings that users can configure on unmanaged computers prior to the migration can be locked on the new, managed computers. For example, standard wallpaper, Internet Explorer security settings, and desktop configuration are some of the items you can choose to standardize. - -To reduce complexity and increase standardization, your organization should consider creating a *standard operating environment (SOE)*. An SOE is a combination of hardware and software that you distribute to all users. This means selecting a baseline for all computers, including standard hardware drivers; core operating system features; core productivity applications, especially if they are under volume licensing; and core utilities. This environment should also include a standard set of security features, as outlined in the organization’s corporate policy. Using a standard operating environment can vastly simplify the migration and reduce overall deployment challenges. - -## In This Section - - - ---- - - - - - - - - - - - - - - - - - - -

    Identify Users

    Use command-line options to specify which users to migrate and how they should be migrated.

    Identify Applications Settings

    Determine which applications you want to migrate and prepare a list of application settings to be migrated.

    Identify Operating System Settings

    Use migration to create a new standard environment on each of the destination computers.

    Identify File Types, Files, and Folders

    Determine and locate the standard, company-specified, and non-standard locations of the file types, files, folders, and settings that you want to migrate.

    - - - -## Related topics - - -[What Does USMT Migrate?](usmt-what-does-usmt-migrate.md) - - - - - - - - - +--- +title: Determine What to Migrate (Windows 10) +description: Determine migration settings for standard or customized for the User State Migration Tool (USMT) 10.0. +ms.assetid: 01ae1d13-c3eb-4618-b39d-ee5d18d55761 +ms.reviewer: +manager: laurawi +ms.author: greglin +ms.prod: w10 +ms.mktglfcycl: deploy +ms.sitesec: library +audience: itpro +author: greg-lindsay +ms.date: 04/19/2017 +ms.topic: article +--- + +# Determine What to Migrate + + +By default, User State Migration Tool (USMT) 10.0 migrates the items listed in [What Does USMT Migrate?](usmt-what-does-usmt-migrate.md), depending on the migration .xml files you specify. These default settings are often enough for a basic migration. + +However, when considering what settings to migrate, you should also consider what settings you would like the user to be able to configure, if any, and what settings you would like to standardize. Many organizations use their migration as an opportunity to create and begin enforcing a better-managed environment. Some of the settings that users can configure on unmanaged computers prior to the migration can be locked on the new, managed computers. For example, standard wallpaper, Internet Explorer security settings, and desktop configuration are some of the items you can choose to standardize. + +To reduce complexity and increase standardization, your organization should consider creating a *standard operating environment (SOE)*. An SOE is a combination of hardware and software that you distribute to all users. This means selecting a baseline for all computers, including standard hardware drivers; core operating system features; core productivity applications, especially if they are under volume licensing; and core utilities. This environment should also include a standard set of security features, as outlined in the organization’s corporate policy. Using a standard operating environment can vastly simplify the migration and reduce overall deployment challenges. + +## In This Section + + + ++++ + + + + + + + + + + + + + + + + + + +

    Identify Users

    Use command-line options to specify which users to migrate and how they should be migrated.

    Identify Applications Settings

    Determine which applications you want to migrate and prepare a list of application settings to be migrated.

    Identify Operating System Settings

    Use migration to create a new standard environment on each of the destination computers.

    Identify File Types, Files, and Folders

    Determine and locate the standard, company-specified, and non-standard locations of the file types, files, folders, and settings that you want to migrate.

    + + + +## Related topics + + +[What Does USMT Migrate?](usmt-what-does-usmt-migrate.md) + + + + + + + + + diff --git a/windows/deployment/volume-activation/vamt-known-issues.md b/windows/deployment/volume-activation/vamt-known-issues.md index 2259c02d2f..b4173bb737 100644 --- a/windows/deployment/volume-activation/vamt-known-issues.md +++ b/windows/deployment/volume-activation/vamt-known-issues.md @@ -1,6 +1,6 @@ --- title: VAMT known issues (Windows 10) -description: Volume Activation Management Tool (VAMT) known issues +description: Find out the current known issues with the Volume Activation Management Tool (VAMT), versions 3.0. and 3.1. ms.assetid: 8992f1f3-830a-4ce7-a248-f3a6377ab77f ms.reviewer: manager: laurawi diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index 25fee702e2..eca7e2bf95 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -2,7 +2,7 @@ title: Windows Autopilot requirements ms.reviewer: manager: laurawi -description: Inform yourself about software, networking, licensing, and configuration requirements for Windows Autopilot deployment. +description: See the requirements you need to run Windows Autopilot in Windows 10, Azure Active Directory, and MDM services such as Microsoft Intune. keywords: mdm, setup, windows, windows 10, oobe, manage, deploy, autopilot, ztd, zero-touch, partner, msfb, intune ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml index d559457fca..0e9d00f112 100644 --- a/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml +++ b/windows/release-information/resolved-issues-windows-7-and-windows-server-2008-r2-sp1.yml @@ -1,7 +1,7 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1 +title: See a list of known issues that have been resolved for Windows 7 and Windows Server 2008 R2 SP1 over the last six months. metadata: document_id: title: Resolved issues in Windows 7 and Windows Server 2008 R2 SP1 diff --git a/windows/release-information/resolved-issues-windows-server-2012.yml b/windows/release-information/resolved-issues-windows-server-2012.yml index 87c57cef75..d9f4e51351 100644 --- a/windows/release-information/resolved-issues-windows-server-2012.yml +++ b/windows/release-information/resolved-issues-windows-server-2012.yml @@ -1,7 +1,7 @@ ### YamlMime:YamlDocument documentType: LandingData -title: Resolved issues in Windows Server 2012 +title: See a list of known issues that have been resolved for Windows Server 2012 over the last six months. metadata: document_id: title: Resolved issues in Windows Server 2012 diff --git a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml index 1d522d681a..01f8a8436e 100644 --- a/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml +++ b/windows/release-information/status-windows-8.1-and-windows-server-2012-r2.yml @@ -5,7 +5,7 @@ title: Windows 8.1 and Windows Server 2012 R2 metadata: document_id: title: Windows 8.1 and Windows Server 2012 R2 - description: View announcements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2 + description: View announcements and review known issues and fixes for Windows 8.1 and Windows Server 2012 R2. keywords: Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/release-information/status-windows-server-2008-sp2.yml b/windows/release-information/status-windows-server-2008-sp2.yml index cf035b38eb..386d5d16ad 100644 --- a/windows/release-information/status-windows-server-2008-sp2.yml +++ b/windows/release-information/status-windows-server-2008-sp2.yml @@ -5,7 +5,7 @@ title: Windows Server 2008 SP2 metadata: document_id: title: Windows Server 2008 SP2 - description: View announcements and review known issues and fixes for Windows Server 2008 SP2 + description: View announcements and review known issues and fixes for Windows Server 2008 SP2. keywords: Windows, Windows 10, issues, fixes, announcements, Windows Server, advisories ms.localizationpriority: high author: greg-lindsay diff --git a/windows/whats-new/get-started-with-1709.md b/windows/whats-new/get-started-with-1709.md index b7879030be..2b22a606de 100644 --- a/windows/whats-new/get-started-with-1709.md +++ b/windows/whats-new/get-started-with-1709.md @@ -1,6 +1,6 @@ --- title: Get started with Windows 10, version 1709 -description: All the information to get you started with Windows 10, version 1709. +description: Learn the dos and don'ts for getting started with Windows 10, version 1709. keywords: ["get started", "windows 10", "fall creators update", "1709"] ms.prod: w10 ms.mktglfcycl: deploy From ef4ecf6cf21dbbdb04769cbc57e4c81e26883cfe Mon Sep 17 00:00:00 2001 From: "Jeff Reeds (Aquent LLC)" Date: Fri, 12 Jun 2020 15:27:58 -0700 Subject: [PATCH 205/228] Minor chages made to update docs --- mdop/appv-v5/app-v-51-supported-configurations.md | 2 ++ .../app-v/appv-supported-configurations.md | 4 ++-- 2 files changed, 4 insertions(+), 2 deletions(-) diff --git a/mdop/appv-v5/app-v-51-supported-configurations.md b/mdop/appv-v5/app-v-51-supported-configurations.md index 1883e4284b..5d7e251bfa 100644 --- a/mdop/appv-v5/app-v-51-supported-configurations.md +++ b/mdop/appv-v5/app-v-51-supported-configurations.md @@ -16,6 +16,8 @@ ms.date: 04/02/2020 # App-V 5.1 Supported Configurations +>Applies to: Windows 10, version 1607; Window Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 (Extended Security Update) + This topic specifies the requirements to install and run Microsoft Application Virtualization (App-V) 5.1 in your environment. ## App-V Server system requirements diff --git a/windows/application-management/app-v/appv-supported-configurations.md b/windows/application-management/app-v/appv-supported-configurations.md index dcf1e72905..a1b4f90845 100644 --- a/windows/application-management/app-v/appv-supported-configurations.md +++ b/windows/application-management/app-v/appv-supported-configurations.md @@ -14,7 +14,7 @@ ms.topic: article --- # App-V Supported Configurations ->Applies to: Windows 10, version 1607; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 +>Applies to: Windows 10, version 1607; Window Server 2019; Windows Server 2016; Windows Server 2012 R2; Windows Server 2012; Windows Server 2008 R2 (Extended Security Update) This topic specifies the requirements to install and run App-V in your Windows 10 environment. For information about prerequisite software such as the .NET Framework, see [App-V prerequisites](appv-prerequisites.md). @@ -34,7 +34,7 @@ The App-V server does not support the following scenarios: ### Management server operating system requirements -You can install the App-V Management server on a server running Windows Server 2008 R2 with SP1 or later. +You can install the App-V Management server on a server running Windows Server 2008 R2 with SP1 (Extended Security Update) or later. >[!IMPORTANT] >Deploying a Management server role to a computer with Remote Desktop Services enabled is not supported. From 1bb7409be8356431b6ec0d910636705c5299a947 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 16:40:41 -0700 Subject: [PATCH 206/228] Corrected code block type and indentation --- ...re-network-connections-microsoft-defender-antivirus.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md index 1b7bc129b9..db0d9fed09 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md @@ -68,7 +68,7 @@ After whitelisting the URLs listed above, you can test if you are connected to t Use the following argument with the Microsoft Defender Antivirus command-line utility (`mpcmdrun.exe`) to verify that your network can communicate with the Microsoft Defender Antivirus cloud service: -```DOS +```console "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -ValidateMapsConnection ``` @@ -107,10 +107,10 @@ You will also see a detection under **Quarantined threats** in the **Scan histor 3. Under the **Quarantined threats** section, click the **See full history** label to see the detected fake malware. ->[!NOTE] ->Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md). + > [!NOTE] + > Versions of Windows 10 before version 1703 have a different user interface. See [Microsoft Defender Antivirus in the Windows Security app](microsoft-defender-security-center-antivirus.md). -The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-microsoft-defender-antivirus.md). + The Windows event log will also show [Windows Defender client event ID 2050](troubleshoot-microsoft-defender-antivirus.md). >[!IMPORTANT] >You will not be able to use a proxy auto-config (.pac) file to test network connections to these URLs. You will need to verify your proxy servers and any network filtering tools manually to ensure connectivity. From c1686f459e91285d36be5f91dfe0661f064ba9dd Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 16:49:34 -0700 Subject: [PATCH 207/228] Attempting to fix layout and numbering --- ...protection-microsoft-defender-antivirus.md | 96 ++++++++++++------- 1 file changed, 59 insertions(+), 37 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md index fbcf3e9352..727463b3d6 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-real-time-protection-microsoft-defender-antivirus.md @@ -34,75 +34,97 @@ You can use **Local Group Policy Editor** to enable and configure Microsoft Defe To enable and configure always-on protection: 1. Open **Local Group Policy Editor**. To do this: + 1. In your Windows 10 taskbar search box, type **gpedit**. - 2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**. -![GPEdit taskbar search result](images/gpedit-search.png) + + 1. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**. + + ![GPEdit taskbar search result](images/gpedit-search.png) + 2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus**. + 3. Configure the Microsoft Defender Antivirus antimalware service policy settings. To do this: + 1. In the **Microsoft Defender Antivirus** details pane on right, double-click the policy setting as specified in the following table: - | Setting | Description | Default setting | - |-----------------------------|------------------------|-------------------------------| - | Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled - | Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled | - 2. Configure the setting as appropriate, and click **OK**. - 3. Repeat the previous steps for each setting in the table. + | Setting | Description | Default setting | + |-----------------------------|------------------------|-------------------------------| + | Allow antimalware service to startup with normal priority | You can lower the priority of the Microsoft Defender Antivirus engine, which may be useful in lightweight deployments where you want to have as lean a startup process as possible. This may impact protection on the endpoint. | Enabled + | Allow antimalware service to remain running always | If protection updates have been disabled, you can set Microsoft Defender Antivirus to still run. This lowers the protection on the endpoint. | Disabled | + + 1. Configure the setting as appropriate, and click **OK**. + + 1. Repeat the previous steps for each setting in the table. + +4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this: -4. Configure the Microsoft Defender Antivirus real-time protection policy settings. To do this: 1. In the **Microsoft Defender Antivirus** details pane, double-click **Real-time Protection**. Or, from the **Microsoft Defender Antivirus** tree on left pane, click **Real-time Protection**. - 2. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table: + + 1. In the **Real-time Protection** details pane on right, double-click the policy setting as specified in the following table: - | Setting | Description | Default setting | - |-----------------------------|------------------------|-------------------------------| - | Turn on behavior monitoring | The AV engine will monitor file processes, file and registry changes, and other events on your endpoints for suspicious and known malicious activity. | Enabled | - | Scan all downloaded files and attachments | Downloaded files and attachments are automatically scanned. This operates in addition to the Windows Defender SmartScreen filter, which scans files before and during downloading. | Enabled | - | Monitor file and program activity on your computer | The Microsoft Defender Antivirus engine makes note of any file changes (file writes, such as moves, copies, or modifications) and general program activity (programs that are opened or running and that cause other programs to run). | Enabled | - | Turn on raw volume write notifications | Information about raw volume writes will be analyzed by behavior monitoring. | Enabled | - | Turn on process scanning whenever real-time protection is enabled | You can independently enable the Microsoft Defender Antivirus engine to scan running processes for suspicious modifications or behaviors. This is useful if you have temporarily disabled real-time protection and want to automatically scan processes that started while it was disabled. | Enabled | - | Define the maximum size of downloaded files and attachments to be scanned | You can define the size in kilobytes. | Enabled | - | Configure local setting override for turn on behavior monitoring | Configure a local override for the configuration of behavior monitoring. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | - | Configure local setting override for scanning all downloaded files and attachments | Configure a local override for the configuration of scanning for all downloaded files and attachments. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | - | Configure local setting override for monitoring file and program activity on your computer | Configure a local override for the configuration of monitoring for file and program activity on your computer. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | - | Configure local setting override to turn on real-time protection | Configure a local override for the configuration to turn on real-time protection. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | - | Configure local setting override for monitoring for incoming and outgoing file activity | Configure a local override for the configuration of monitoring for incoming and outgoing file activity. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. | Enabled | - | Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) | + | Setting | Description | Default setting | + |-----------------------------|------------------------|-------------------------------| + | Turn on behavior monitoring | The AV engine will monitor file processes, file and registry changes, and other events on your endpoints for suspicious and known malicious activity. | Enabled | + | Scan all downloaded files and attachments | Downloaded files and attachments are automatically scanned. This operates in addition to the Windows Defender SmartScreen filter, which scans files before and during downloading. | Enabled | + | Monitor file and program activity on your computer | The Microsoft Defender Antivirus engine makes note of any file changes (file writes, such as moves, copies, or modifications) and general program activity (programs that are opened or running and that cause other programs to run). | Enabled | + | Turn on raw volume write notifications | Information about raw volume writes will be analyzed by behavior monitoring. | Enabled | + | Turn on process scanning whenever real-time protection is enabled | You can independently enable the Microsoft Defender Antivirus engine to scan running processes for suspicious modifications or behaviors. This is useful if you have temporarily disabled real-time protection and want to automatically scan processes that started while it was disabled. | Enabled | + | Define the maximum size of downloaded files and attachments to be scanned | You can define the size in kilobytes. | Enabled | + | Configure local setting override for turn on behavior monitoring | Configure a local override for the configuration of behavior monitoring. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | + | Configure local setting override for scanning all downloaded files and attachments | Configure a local override for the configuration of scanning for all downloaded files and attachments. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | + | Configure local setting override for monitoring file and program activity on your computer | Configure a local override for the configuration of monitoring for file and program activity on your computer. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | + | Configure local setting override to turn on real-time protection | Configure a local override for the configuration to turn on real-time protection. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting.| Enabled | + | Configure local setting override for monitoring for incoming and outgoing file activity | Configure a local override for the configuration of monitoring for incoming and outgoing file activity. This setting can only be set by Group Policy. If you enable this setting, the local preference setting will take priority over Group Policy. If you disable or do not configure this setting, Group Policy will take priority over the local preference setting. | Enabled | + | Configure monitoring for incoming and outgoing file and program activity | Specify whether monitoring should occur on incoming, outgoing, both, or neither direction. This is relevant for Windows Server installations where you have defined specific servers or Server Roles that see large amounts of file changes in only one direction and you want to improve network performance. Fully updated endpoints (and servers) on a network will see little performance impact irrespective of the number or direction of file changes. | Enabled (both directions) | - 3. Configure the setting as appropriate, and click **OK**. - 4. Repeat the previous steps for each setting in the table. + 1. Configure the setting as appropriate, and click **OK**. + + 1. Repeat the previous steps for each setting in the table. 5. Configure the Microsoft Defender Antivirus scanning policy setting. To do this: + 1. From the **Microsoft Defender Antivirus** tree on left pane, click **Scan**. - ![Microsoft Defender Antivirus Scan options](images/gpedit-windows-defender-antivirus-scan.png) + + ![Microsoft Defender Antivirus Scan options](images/gpedit-windows-defender-antivirus-scan.png) - 2. In the **Scan** details pane on right, double-click the policy setting as specified in the following table: + 1. In the **Scan** details pane on right, double-click the policy setting as specified in the following table: - | Setting | Description | Default setting | - |-----------------------------|------------------------|-------------------------------| - | Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the Microsoft Defender Antivirus engine is asked to detect the activity. | Enabled | + | Setting | Description | Default setting | + |-----------------------------|------------------------|-------------------------------| + | Turn on heuristics | Heuristic protection will disable or block suspicious activity immediately before the Microsoft Defender Antivirus engine is asked to detect the activity. | Enabled | - 3. Configure the setting as appropriate, and click **OK**. + 1. Configure the setting as appropriate, and click **OK**. + 6. Close **Local Group Policy Editor**. ## Disable real-time protection in Group Policy + > [!WARNING] > Disabling real-time protection drastically reduces the protection on your endpoints and is not recommended. The main real-time protection capability is enabled by default, but you can disable it by using **Local Group Policy Editor**. -To disable real-time protection in Group policy: +To disable real-time protection in Group policy: + 1. Open **Local Group Policy Editor**. - 1. In your Windows 10 taskbar search box, type **gpedit**. - 2. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**. + + 1. In your Windows 10 taskbar search box, type **gpedit**. + + 1. Under **Best match**, click **Edit group policy** to launch **Local Group Policy Editor**. 2. In the left pane of **Local Group Policy Editor**, expand the tree to **Computer Configuration** > **Administrative Templates** > **Windows Components** > **Microsoft Defender Antivirus** > **Real-time Protection**. 3. In the **Real-time Protection** details pane on right, double-click **Turn off real-time protection**. -![Turn off real-time protection](images/gpedit-turn-off-real-time-protection.png) + + ![Turn off real-time protection](images/gpedit-turn-off-real-time-protection.png) 4. In the **Turn off real-time protection** setting window, set the option to **Enabled**. -![Turn off real-time protection enabled](images/gpedit-turn-off-real-time-protection-enabled.png) + + ![Turn off real-time protection enabled](images/gpedit-turn-off-real-time-protection-enabled.png) + 5. Click **OK**. + 6. Close **Local Group Policy Editor**. ## Related articles From 5e741c12f1adf735d3a1231ad33ca2e2db5183e8 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 16:54:27 -0700 Subject: [PATCH 208/228] Corrected type on code block to a valid type We need to use one of the types on this list: https://docsmetadatatool.azurewebsites.net/allowlists# --- .../microsoft-defender-offline.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md index cb5f4ad90e..0a396c5667 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-offline.md @@ -106,7 +106,7 @@ Use the [**MSFT_MpWDOScan**](https://msdn.microsoft.com/library/dn455323(v=vs.85 The following WMI script snippet will immediately run a Microsoft Defender Offline scan, which will cause the endpoint to restart, run the offline scan, and then restart and boot into Windows. -```WMI +```console wmic /namespace:\\root\Microsoft\Windows\Defender path MSFT_MpWDOScan call Start ``` @@ -119,11 +119,9 @@ See the following for more information: 1. Open the Windows Security app by clicking the shield icon in the task bar or searching the start menu for **Defender**. 2. Click the **Virus & threat protection** tile (or the shield icon on the left menu bar) and then the **Advanced scan** label: - 3. Select **Microsoft Defender Offline scan** and click **Scan now**. - > [!NOTE] > In Windows 10, version 1607, the offline scan could be run from under **Windows Settings** > **Update & security** > **Windows Defender** or from the Windows Defender client. From 943d2bf8965a8a1a2ffd8c69f86b20ad97f66f41 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 16:56:10 -0700 Subject: [PATCH 209/228] Indented content in a list item --- ...ent-changes-to-security-settings-with-tamper-protection.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md index 4a2fe0777f..3d058b3d8f 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/prevent-changes-to-security-settings-with-tamper-protection.md @@ -73,9 +73,9 @@ If you are a home user, or you are not subject to settings managed by a security 3. Set **Tamper Protection** to **On** or **Off**. -Here's what you see in the Windows Security app: + Here's what you see in the Windows Security app: -![Tamper protection turned on in Windows 10 Home](images/tamperprotectionturnedon.png) + ![Tamper protection turned on in Windows 10 Home](images/tamperprotectionturnedon.png) ## Turn tamper protection on (or off) for your organization using Intune From fc555d881cfa8eed71dcceacb1387a8a9e7a7d0b Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 17:30:59 -0700 Subject: [PATCH 210/228] Applied a valid type to a code block Code blocks should have a type in this list: https://docsmetadatatool.azurewebsites.net/allowlists# --- .../microsoft-defender-antivirus-on-windows-server-2016.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md index 5a5fefca87..2108fffbab 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/microsoft-defender-antivirus-on-windows-server-2016.md @@ -108,7 +108,7 @@ Get-Service -Name mpssvc As an alternative to PowerShell, you can use Command Prompt to verify that Microsoft Defender Antivirus is running. To do that, run the following command from a command prompt: -```DOS +```console sc query Windefend ``` From a4534aa49956f9a5d72b8e948a4a36a0f6124358 Mon Sep 17 00:00:00 2001 From: Gary Moore Date: Fri, 12 Jun 2020 18:38:37 -0700 Subject: [PATCH 211/228] Corrected the type on the code block --- .../appv-install-the-publishing-server-on-a-remote-computer.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md index 8fce503469..f08f5dfe4d 100644 --- a/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md +++ b/windows/application-management/app-v/appv-install-the-publishing-server-on-a-remote-computer.md @@ -38,7 +38,7 @@ Use the following procedure to install the publishing server on a separate compu 3. Enter the server name and a description (if required), then select **Add**. 9. To verify that the publishing server is running correctly, you should import a package to the management server, entitle that package to an AD group, then publish it. Using an internet browser, open the following URL: https://publishingserver:pubport. If the server is running correctly, information like the following example should appear. - ```SQL + ```xml From d98285e53da90a9fbf4b17d8bfcf75707b85c5ec Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 14 Jun 2020 01:59:42 +0200 Subject: [PATCH 212/228] MDATP/Onboarding issues: Localization adaptations Description: As discussed in issue ticket #6741 (ID de evento incorrecto o reemplazado por palabras) and #4775 (Error Event ID is invalid), automatic Machine Translation translates some table digits to words or replaces digits with others. Thanks to AmadorM for commenting about this in ticket #4775. Changes proposed: - Encapsulate table digits with MarkDown back ticks - Use MarkDown table center alignment for the value column - Update 2 MSDN URLs permanently redirected to docs.microsoft.com - Replace some freetext HTML codes with MarkDown code - Whitespace, codestyle, and grammar corrections: - Remove redundant end-of-line blanks - Add MarkDown indent marker compatibility spacing - Reduce single line triple back tick pairs to single pairs - Reduce some indents to 4 spaces (back from 5 spaces) - Normalize numbered list number/text spacing to 1 space - Standardize H2/H3/H4 headings to be followed by 1 blank line - Normalize headings to be preceded by 2 blank spaces - Move the word "key" out of one of the the HKEY code blocks - Add missing colon after "The status is then displayed" - Standardize line spacing in the 28-step illustrated procedure - Move 1 colon inside the MarkDown **bold** formatting - Replace tabs (redundant) inside table cells with 1 space - Correct the casing in Syncml -> SyncML - Remove *is* from "Currently is supported platforms:" Ticket closure or reference: Closes #6741 Ref. #4775 --- .../troubleshoot-onboarding.md | 181 +++++++++++------- 1 file changed, 109 insertions(+), 72 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md index c8c682d83f..04a9d022a7 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding.md @@ -20,11 +20,11 @@ ms.topic: troubleshooting # Troubleshoot Microsoft Defender Advanced Threat Protection onboarding issues **Applies to:** + - [Microsoft Defender Advanced Threat Protection (Microsoft Defender ATP)](https://go.microsoft.com/fwlink/p/?linkid=2069559) - Windows Server 2012 R2 - Windows Server 2016 - You might need to troubleshoot the Microsoft Defender ATP onboarding process if you encounter issues. This page provides detailed steps to troubleshoot onboarding issues that might occur when deploying with one of the deployment tools and common errors that might occur on the machines. @@ -33,29 +33,34 @@ This page provides detailed steps to troubleshoot onboarding issues that might o If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines.md) after an hour, it might indicate an onboarding or connectivity problem. + ### Troubleshoot onboarding when deploying with Group Policy -Deployment with Group Policy is done by running the onboarding script on the machines. The Group Policy console does not indicate if the deployment has succeeded or not. + +Deployment with Group Policy is done by running the onboarding script on the machines. The Group Policy console does not indicate if the deployment has succeeded or not. If you have completed the onboarding process and don't see machines in the [Machines list](investigate-machines.md) after an hour, you can check the output of the script on the machines. For more information, see [Troubleshoot onboarding when deploying with a script](#troubleshoot-onboarding-when-deploying-with-a-script). If the script completes successfully, see [Troubleshoot onboarding issues on the machines](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. + ### Troubleshoot onboarding issues when deploying with Microsoft Endpoint Configuration Manager + When onboarding machines using the following versions of Configuration Manager: -- Microsoft Endpoint Configuration Manager + +- Microsoft Endpoint Configuration Manager - System Center 2012 Configuration Manager - System Center 2012 R2 Configuration Manager - Deployment with the above-mentioned versions of Configuration Manager is done by running the onboarding script on the machines. You can track the deployment in the Configuration Manager Console. If the deployment fails, you can check the output of the script on the machines. If the onboarding completed successfully but the machines are not showing up in the **Machines list** after an hour, see [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine) for additional errors that might occur. + ### Troubleshoot onboarding when deploying with a script -**Check the result of the script on the machine**: +**Check the result of the script on the machine:** 1. Click **Start**, type **Event Viewer**, and press **Enter**. 2. Go to **Windows Logs** > **Application**. @@ -67,17 +72,19 @@ If the script fails and the event is an error, you can check the event ID in the > The following event IDs are specific to the onboarding script only. Event ID | Error Type | Resolution steps -:---|:---|:--- -5 | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```. -10 | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
    ```HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```.
    Verify that the script has been run as an administrator. -15 | Failed to start SENSE service |Check the service health (```sc query sense``` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).

    If the machine is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the machine. If rebooting the machine doesn't address the issue, upgrade to KB4015217 and try onboarding again. -15 | Failed to start SENSE service | If the message of the error is: System error 577 or error 1058 has occurred. You need to enable the Microsoft Defender Antivirus ELAM driver, see [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy) for instructions. -30 | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). -35 | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
    ```HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status```.
    The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). -40 | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). -65 | Insufficient privileges| Run the script again with administrator privileges. +:---:|:---|:--- + `5` | Offboarding data was found but couldn't be deleted | Check the permissions on the registry, specifically
    `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`. +`10` | Onboarding data couldn't be written to registry | Check the permissions on the registry, specifically
    `HKLM\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`.
    Verify that the script has been run as an administrator. +`15` | Failed to start SENSE service |Check the service health (`sc query sense` command). Make sure it's not in an intermediate state (*'Pending_Stopped'*, *'Pending_Running'*) and try to run the script again (with administrator rights).

    If the machine is running Windows 10, version 1607 and running the command `sc query sense` returns `START_PENDING`, reboot the machine. If rebooting the machine doesn't address the issue, upgrade to KB4015217 and try onboarding again. +`15` | Failed to start SENSE service | If the message of the error is: System error 577 or error 1058 has occurred, you need to enable the Microsoft Defender Antivirus ELAM driver, see [Ensure that Microsoft Defender Antivirus is not disabled by a policy](#ensure-that-microsoft-defender-antivirus-is-not-disabled-by-a-policy) for instructions. +`30` | The script failed to wait for the service to start running | The service could have taken more time to start or has encountered errors while trying to start. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). +`35` | The script failed to find needed onboarding status registry value | When the SENSE service starts for the first time, it writes onboarding status to the registry location
    `HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection\Status`.
    The script failed to find it after several seconds. You can manually test it and check if it's there. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). +`40` | SENSE service onboarding status is not set to **1** | The SENSE service has failed to onboard properly. For more information on events and errors related to SENSE, see [Review events and errors using Event viewer](event-error-codes.md). +`65` | Insufficient privileges| Run the script again with administrator privileges. + ### Troubleshoot onboarding issues using Microsoft Intune + You can use Microsoft Intune to check error codes and attempt to troubleshoot the cause of the issue. If you have configured policies in Intune and they are not propagated on machines, you might need to configure automatic MDM enrollment. @@ -92,28 +99,27 @@ If none of the event logs and troubleshooting steps work, download the Local scr **Microsoft Intune error codes and OMA-URIs**: - Error Code Hex | Error Code Dec | Error Description | OMA-URI | Possible cause and troubleshooting steps -:---|:---|:---|:---|:--- -0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
    Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.

    **Troubleshooting steps:**
    Check the event IDs in the [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) section.

    Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - | | | | Onboarding
    Offboarding
    SampleSharing | **Possible cause:** Microsoft Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

    **Troubleshooting steps:** Ensure that the following registry key exists: ```HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection```

    If it doesn't exist, open an elevated command and add the key. - | | | | SenseIsRunning
    OnboardingState
    OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.

    **Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine).

    Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://msdn.microsoft.com/library/windows/hardware/mt632120%28v=vs.85%29.aspx). - || | | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

    Currently is supported platforms: Enterprise, Education, and Professional.
    Server is not supported. - 0x87D101A9 | -2016345687 |Syncml(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

    Currently is supported platforms: Enterprise, Education, and Professional. +:---:|:---|:---|:---|:--- +0x87D1FDE8 | -2016281112 | Remediation failed | Onboarding
    Offboarding | **Possible cause:** Onboarding or offboarding failed on a wrong blob: wrong signature or missing PreviousOrgIds fields.

    **Troubleshooting steps:**
    Check the event IDs in the [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) section.

    Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://docs.microsoft.com/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10). + | | | | Onboarding
    Offboarding
    SampleSharing | **Possible cause:** Microsoft Defender ATP Policy registry key does not exist or the OMA DM client doesn't have permissions to write to it.

    **Troubleshooting steps:** Ensure that the following registry key exists: `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Advanced Threat Protection`

    If it doesn't exist, open an elevated command and add the key. + | | | | SenseIsRunning
    OnboardingState
    OrgId | **Possible cause:** An attempt to remediate by read-only property. Onboarding has failed.

    **Troubleshooting steps:** Check the troubleshooting steps in [Troubleshoot onboarding issues on the machine](#troubleshoot-onboarding-issues-on-the-machine).

    Check the MDM event logs in the following table or follow the instructions in [Diagnose MDM failures in Windows 10](https://docs.microsoft.com/windows/client-management/mdm/diagnose-mdm-failures-in-windows-10). + | | | | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

    Currently supported platforms:
    Enterprise, Education, and Professional.
    Server is not supported. + 0x87D101A9 | -2016345687 |SyncML(425): The requested command failed because the sender does not have adequate access control permissions (ACL) on the recipient. | All | **Possible cause:** Attempt to deploy Microsoft Defender ATP on non-supported SKU/Platform, particularly Holographic SKU.

    Currently supported platforms:
    Enterprise, Education, and Professional. -
    -Known issues with non-compliance + +**Known issues with non-compliance** The following table provides information on issues with non-compliance and how you can address the issues. Case | Symptoms | Possible cause and troubleshooting steps -:---|:---|:--- -1 | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.

    **Troubleshooting steps:** Wait for OOBE to complete. -2 | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.

    **Troubleshooting steps:** The issue should automatically be fixed within 24 hours. -3 | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time. +:---:|:---|:--- + `1` | Machine is compliant by SenseIsRunning OMA-URI. But is non-compliant by OrgId, Onboarding and OnboardingState OMA-URIs. | **Possible cause:** Check that user passed OOBE after Windows installation or upgrade. During OOBE onboarding couldn't be completed but SENSE is running already.

    **Troubleshooting steps:** Wait for OOBE to complete. + `2` | Machine is compliant by OrgId, Onboarding, and OnboardingState OMA-URIs, but is non-compliant by SenseIsRunning OMA-URI. | **Possible cause:** Sense service's startup type is set as "Delayed Start". Sometimes this causes the Microsoft Intune server to report the machine as non-compliant by SenseIsRunning when DM session occurs on system start.

    **Troubleshooting steps:** The issue should automatically be fixed within 24 hours. + `3` | Machine is non-compliant | **Troubleshooting steps:** Ensure that Onboarding and Offboarding policies are not deployed on the same machine at same time. -
    -Mobile Device Management (MDM) event logs + +**Mobile Device Management (MDM) event logs** View the MDM event logs to troubleshoot issues that might arise during onboarding: @@ -125,7 +131,9 @@ ID | Severity | Event description | Troubleshooting steps :---|:---|:---|:--- 1819 | Error | Microsoft Defender Advanced Threat Protection CSP: Failed to Set Node's Value. NodeId: (%1), TokenName: (%2), Result: (%3). | Download the [Cumulative Update for Windows 10, 1607](https://go.microsoft.com/fwlink/?linkid=829760). + ## Troubleshoot onboarding issues on the machine + If the deployment tools used does not indicate an error in the onboarding process, but machines are still not appearing in the machines list in an hour, go through the following verification topics to check if an error occurred with the Microsoft Defender ATP agent: - [View agent onboarding errors in the machine event log](#view-agent-onboarding-errors-in-the-machine-event-log) - [Ensure the diagnostic data service is enabled](#ensure-the-diagnostics-service-is-enabled) @@ -154,44 +162,47 @@ If the deployment tools used does not indicate an error in the onboarding proces 6. Events which can indicate issues will appear in the **Operational** pane. You can attempt to troubleshoot them based on the solutions in the following table: Event ID | Message | Resolution steps -:---|:---|:--- -5 | Microsoft Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -6 | Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script.md). -7 | Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. -9 | Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

    If the event happened during offboarding, contact support. -10 | Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

    If the problem persists, contact support. -15 | Microsoft Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). -17 | Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script.md). If the problem persists, contact support. -25 | Microsoft Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. -27 | Failed to enable Microsoft Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. -29 | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. -30 | Failed to disable $(build.sense.productDisplayName) mode in Microsoft Defender Advanced Threat Protection. Failure code: %1 | Contact support. -32 | $(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1 | Verify that the service start type is manual and reboot the machine. -55 | Failed to create the Secure ETW autologger. Failure code: %1 | Reboot the machine. -63 | Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4 | Identify what is causing changes in start type of mentioned service. If the exit code is not 0, fix the start type manually to expected start type. -64 | Starting stopped external service. Name: %1, exit code: %2 | Contact support if the event keeps re-appearing. -68 | The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3 | Identify what is causing changes in start type. Fix mentioned service start type. -69 | The service is stopped. Service name: %1 | Start the mentioned service. Contact support if persists. +:---:|:---|:--- + `5` | Microsoft Defender Advanced Threat Protection service failed to connect to the server at _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). + `6` | Microsoft Defender Advanced Threat Protection service is not onboarded and no onboarding parameters were found. Failure code: _variable_ | [Run the onboarding script again](configure-endpoints-script.md). + `7` | Microsoft Defender Advanced Threat Protection service failed to read the onboarding parameters. Failure code: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection), then run the entire onboarding process again. + `9` | Microsoft Defender Advanced Threat Protection service failed to change its start type. Failure code: variable | If the event happened during onboarding, reboot and re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

    If the event happened during offboarding, contact support. +`10` | Microsoft Defender Advanced Threat Protection service failed to persist the onboarding information. Failure code: variable | If the event happened during onboarding, re-attempt running the onboarding script. For more information, see [Run the onboarding script again](configure-endpoints-script.md).

    If the problem persists, contact support. +`15` | Microsoft Defender Advanced Threat Protection cannot start command channel with URL: _variable_ | [Ensure the machine has Internet access](#ensure-the-machine-has-an-internet-connection). +`17` | Microsoft Defender Advanced Threat Protection service failed to change the Connected User Experiences and Telemetry service location. Failure code: variable | [Run the onboarding script again](configure-endpoints-script.md). If the problem persists, contact support. +`25` | Microsoft Defender Advanced Threat Protection service failed to reset health status in the registry. Failure code: _variable_ | Contact support. +`27` | Failed to enable Microsoft Defender Advanced Threat Protection mode in Windows Defender. Onboarding process failed. Failure code: variable | Contact support. +`29` | Failed to read the offboarding parameters. Error type: %1, Error code: %2, Description: %3 | Ensure the machine has Internet access, then run the entire offboarding process again. +`30` | Failed to disable $(build.sense.productDisplayName) mode in Microsoft Defender Advanced Threat Protection. Failure code: %1 | Contact support. +`32` | $(build.sense.productDisplayName) service failed to request to stop itself after offboarding process. Failure code: %1 | Verify that the service start type is manual and reboot the machine. +`55` | Failed to create the Secure ETW autologger. Failure code: %1 | Reboot the machine. +`63` | Updating the start type of external service. Name: %1, actual start type: %2, expected start type: %3, exit code: %4 | Identify what is causing changes in start type of mentioned service. If the exit code is not 0, fix the start type manually to expected start type. +`64` | Starting stopped external service. Name: %1, exit code: %2 | Contact support if the event keeps re-appearing. +`68` | The start type of the service is unexpected. Service name: %1, actual start type: %2, expected start type: %3 | Identify what is causing changes in start type. Fix mentioned service start type. +`69` | The service is stopped. Service name: %1 | Start the mentioned service. Contact support if persists.
    There are additional components on the machine that the Microsoft Defender ATP agent depends on to function properly. If there are no onboarding related errors in the Microsoft Defender ATP agent event log, proceed with the following steps to ensure that the additional components are configured correctly. + ### Ensure the diagnostic data service is enabled + If the machines aren't reporting correctly, you might need to check that the Windows 10 diagnostic data service is set to automatically start and is running on the machine. The service might have been disabled by other programs or user configuration changes. First, you should check that the service is set to start automatically when Windows starts, then you should check that the service is currently running (and start it if it isn't). + ### Ensure the service is set to start **Use the command line to check the Windows 10 diagnostic data service startup type**: 1. Open an elevated command-line prompt on the machine: - a. Click **Start**, type **cmd**, and press **Enter**. + a. Click **Start**, type **cmd**, and press **Enter**. - b. Right-click **Command prompt** and select **Run as administrator**. + b. Right-click **Command prompt** and select **Run as administrator**. 2. Enter the following command, and press **Enter**: @@ -210,9 +221,9 @@ First, you should check that the service is set to start automatically when Wind 1. Open an elevated command-line prompt on the machine: - a. Click **Start**, type **cmd**, and press **Enter**. + a. Click **Start**, type **cmd**, and press **Enter**. - b. Right-click **Command prompt** and select **Run as administrator**. + b. Right-click **Command prompt** and select **Run as administrator**. 2. Enter the following command, and press **Enter**: @@ -244,7 +255,9 @@ To ensure that sensor has service connectivity, follow the steps described in th If the verification fails and your environment is using a proxy to connect to the Internet, then follow the steps described in [Configure proxy and Internet connectivity settings](configure-proxy-internet.md) topic. + ### Ensure that Microsoft Defender Antivirus is not disabled by a policy + **Problem**: The Microsoft Defender ATP service does not start after onboarding. **Symptom**: Onboarding successfully completes, but you see error 577 or error 1058 when trying to start the service. @@ -258,19 +271,20 @@ If the verification fails and your environment is using a proxy to connect to th For example, in Group Policy there should be no entries such as the following values: - - `````` - - `````` + - `` + - `` - After clearing the policy, run the onboarding steps again. - You can also check the following registry key values to verify that the policy is disabled: - 1. Open the registry ```key HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender```. - 2. Ensure that the value ```DisableAntiSpyware``` is not present. + 1. Open the registry key `HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender`. + 2. Ensure that the value `DisableAntiSpyware` is not present. - ![Image of registry key for Microsoft Defender Antivirus](images/atp-disableantispyware-regkey.png) + ![Image of registry key for Microsoft Defender Antivirus](images/atp-disableantispyware-regkey.png) ## Troubleshoot onboarding issues on a server + If you encounter issues while onboarding a server, go through the following verification steps to address possible issues. - [Ensure Microsoft Monitoring Agent (MMA) is installed and configured to report sensor data to the service](configure-server-endpoints.md#server-mma) @@ -293,8 +307,10 @@ You might also need to check the following: - Check to see that machines are reflected in the **Machines list** in the portal. -## Confirming onboarding of newly built machines -There may be instances when onboarding is deployed on a newly built machine but not completed. + +## Confirming onboarding of newly built machines + +There may be instances when onboarding is deployed on a newly built machine but not completed. The steps below provide guidance for the following scenario: - Onboarding package is deployed to newly built machines @@ -302,106 +318,127 @@ The steps below provide guidance for the following scenario: - Machine is turned off or restarted before the end user performs a first logon - In this scenario, the SENSE service will not start automatically even though onboarding package was deployed ->[!NOTE] ->The following steps are only relevant when using Microsoft Endpoint Configuration Manager +> [!NOTE] +> The following steps are only relevant when using Microsoft Endpoint Configuration Manager -1. Create an application in Microsoft Endpoint Configuration Manager. +1. Create an application in Microsoft Endpoint Configuration Manager. ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-1.png) 2. Select **Manually specify the application information**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-2.png) 3. Specify information about the application, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-3.png) -4. Specify information about the software center, then select **Next**. +4. Specify information about the software center, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-4.png) 5. In **Deployment types** select **Add**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-5.png) 6. Select **Manually specify the deployment type information**, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-6.png) 7. Specify information about the deployment type, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-7.png) 8. In **Content** > **Installation program** specify the command: `net start sense`. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-8.png) -9. In **Detection method**, select **Configure rules to detect the presence of this deployment type**, then select **Add Clause**. +9. In **Detection method**, select **Configure rules to detect the presence of this deployment type**, then select **Add Clause**. ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-9.png) 10. Specify the following detection rule details, then select **OK**: + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-10.png) 11. In **Detection method** select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-11.png) 12. In **User Experience**, specify the following information, then select **Next**: + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-12.png) 13. In **Requirements**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-13.png) 14. In **Dependencies**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-14.png) 15. In **Summary**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-15.png) 16. In **Completion**, select **Close**. - - ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-16.png) + + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-16.png) 17. In **Deployment types**, select **Next**. - + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-17.png) 18. In **Summary**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-18.png) - - The status is then displayed + + The status is then displayed: ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-19.png) 19. In **Completion**, select **Close**. - + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-20.png) 20. You can now deploy the application by right-clicking the app and selecting **Deploy**. - + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-21.png) 21. In **General** select **Automatically distribute content for dependencies** and **Browse**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-22.png) 22. In **Content** select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-23.png) 23. In **Deployment settings**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-24.png) 24. In **Scheduling** select **As soon as possible after the available time**, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-25.png) 25. In **User experience**, select **Commit changes at deadline or during a maintenance window (requires restarts)**, then select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-26.png) 26. In **Alerts** select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-27.png) -27. In **Summary**, select **Next**. +27. In **Summary**, select **Next**. + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-28.png) The status is then displayed ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-29.png) 28. In **Completion**, select **Close**. - ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-30.png) + ![Image of Microsoft Endpoint Configuration Manager configuration](images/mecm-30.png) ## Related topics From 1a9a8cec2df8170e41b36ea726b55366710d144f Mon Sep 17 00:00:00 2001 From: illfated Date: Sun, 14 Jun 2020 03:18:09 +0200 Subject: [PATCH 213/228] Windows Update: code blocks vs. translation errors Description: As reported in issue ticket #6953 (Translations errors caused by missing code block), there are several remaining lines of text directly referencing file paths and/or OS commands where the commands and their parameters get translated due to a lack of MarkDown code blocks. Thanks to sebbu2 for reporting this issue. Changes proposed: - Encapsulate (enclose) CLi commands and folder paths in MD back ticks - Remove MD bullet point indicators from the encapsulated lines - Whitespace & grammar corrections: - Normalize indentation, for the code blocks in particular - Add missing MarkDown indent marker compatibility spacing - Add blank line after H2 heading (MD codestyle standard) - Grammar improvement: "allow reset" -> 'allows you to reset' - Add readability comma to the same sentence - Remove redundant blank line in the metadata section Ticket closure or reference: Closes #6953 --- .../update/windows-update-resources.md | 31 +++++++++++-------- 1 file changed, 18 insertions(+), 13 deletions(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 16e2488d65..c3631a707c 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -3,7 +3,6 @@ title: Windows Update - Additional resources description: Additional resources for Windows Update ms.prod: w10 ms.mktglfcycl: - audience: itpro author: jaimeo ms.localizationpriority: medium @@ -17,7 +16,7 @@ ms.topic: article # Windows Update - additional resources ->Applies to: Windows 10 +> Applies to: Windows 10 The following resources provide additional information about using Windows Update. @@ -37,10 +36,11 @@ The following resources provide additional information about using Windows Updat [This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-WindowsUpdateps1-e0c5eb78) will completely reset the Windows Update client settings. It has been tested on Windows 7, 8, 10, and Windows Server 2012 R2. It will configure the services and registry keys related to Windows Update for default settings. It will also clean up files related to Windows Update, in addition to BITS related data. -[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allow reset the Windows Update Agent resolving issues with Windows Update. +[This script](https://gallery.technet.microsoft.com/scriptcenter/Reset-Windows-Update-Agent-d824badc) allows you to reset the Windows Update Agent, resolving issues with Windows Update. ## Reset Windows Update components manually + 1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: ``` cmd @@ -56,17 +56,22 @@ The following resources provide additional information about using Windows Updat ``` 4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. 1. Rename the following folders to *.BAK: - - %systemroot%\SoftwareDistribution\DataStore - - %systemroot%\SoftwareDistribution\Download - - %systemroot%\system32\catroot2 - - To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - Ren %systemroot%\SoftwareDistribution\DataStore *.bak - - Ren %systemroot%\SoftwareDistribution\Download *.bak - - Ren %systemroot%\system32\catroot2 *.bak + ``` + %systemroot%\SoftwareDistribution\DataStore + %systemroot%\SoftwareDistribution\Download + %systemroot%\system32\catroot2 + ``` + To do this, type the following commands at a command prompt. Press ENTER after you type each command. + ``` + Ren %systemroot%\SoftwareDistribution\DataStore *.bak + Ren %systemroot%\SoftwareDistribution\Download *.bak + Ren %systemroot%\system32\catroot2 *.bak + ``` 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - - sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) - - sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) + ``` + sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) + sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) + ``` 5. Type the following command at a command prompt, and then press ENTER: ``` cd /d %windir%\system32 From 8ef88ecb990c089cd271ed630d1216786fbc81f1 Mon Sep 17 00:00:00 2001 From: EfiKliger <45028856+EfiKliger@users.noreply.github.com> Date: Mon, 15 Jun 2020 07:58:34 +0300 Subject: [PATCH 214/228] Update manage-indicators.md --- .../microsoft-defender-atp/manage-indicators.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md index c2f2dd8964..e1f2ac58da 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md @@ -95,7 +95,7 @@ It's important to understand the following prerequisites prior to creating indic 4. Specify the following details: - Indicator - Specify the entity details and define the expiration of the indicator. - Action - Specify the action to be taken and provide a description. - - Scope - Define the scope of the machine group. + - Scope - Define the scope of the machine group according to your [user permissions](machine-groups.md). 5. Review the details in the Summary tab, then click **Save**. From 729cef0ad81b4712a206d173435d20d8043a46e7 Mon Sep 17 00:00:00 2001 From: amirsc3 <42802974+amirsc3@users.noreply.github.com> Date: Mon, 15 Jun 2020 15:28:30 +0300 Subject: [PATCH 215/228] Update configure-endpoints-vdi.md Adding line to remove senseGuid to prevent re-onboarding via PS1 issue --- .../microsoft-defender-atp/configure-endpoints-vdi.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md index b640c52453..bc65d8301d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-vdi.md @@ -136,6 +136,7 @@ If offline servicing is not a viable option for your non-persistent VDI environm PsExec.exe -s cmd.exe cd "C:\ProgramData\Microsoft\Windows Defender Advanced Threat Protection\Cyber" del *.* /f /s /q + REG DELETE “HKLM\SOFTWARE\Microsoft\Windows Advanced Threat Protection" /v senseGuid /f exit ``` From b192690b4bf683fe18aac55f4b4e7a1f11e27360 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 15 Jun 2020 08:51:22 -0700 Subject: [PATCH 216/228] updating blacklist/whitelist to allow/block --- devices/hololens/hololens-faq-security.md | 12 +- devices/hololens/hololens-offline.md | 2 +- devices/hololens/hololens-requirements.md | 2 +- ...olicies-for-surface-hub-device-accounts.md | 4 +- ...e-and-test-a-device-account-surface-hub.md | 2 +- .../surface-hub/troubleshoot-surface-hub.md | 2 +- .../mdm/applicationcontrol-csp.md | 2 +- .../client-management/mdm/applocker-csp.md | 2 +- .../mdm/healthattestation-csp.md | 16 +- ...ew-in-windows-mdm-enrollment-management.md | 6 +- .../windows-10-mobile-and-mdm.md | 4 +- windows/configuration/wcd/wcd-cellcore.md | 2 +- .../update/windows-update-troubleshooting.md | 2 +- .../upgrade-windows-phone-8-1-to-10.md | 227 +++++++++--------- .../windows-10-enterprise-e3-overview.md | 2 +- .../windows-autopilot-requirements.md | 2 +- ...g-recommendations-for-many-audit-events.md | 2 +- .../audit-security-system-extension.md | 6 +- .../threat-protection/auditing/event-4611.md | 2 +- .../threat-protection/auditing/event-4614.md | 2 +- .../threat-protection/auditing/event-4622.md | 2 +- .../threat-protection/auditing/event-4624.md | 2 +- .../threat-protection/auditing/event-4648.md | 2 +- .../threat-protection/auditing/event-4688.md | 2 +- .../threat-protection/auditing/event-4696.md | 2 +- .../threat-protection/auditing/event-4703.md | 2 +- .../threat-protection/auditing/event-4704.md | 2 +- .../threat-protection/auditing/event-4705.md | 2 +- .../threat-protection/auditing/event-4717.md | 2 +- .../threat-protection/auditing/event-4718.md | 2 +- .../threat-protection/auditing/event-4732.md | 2 +- .../threat-protection/auditing/event-4733.md | 2 +- .../threat-protection/auditing/event-4751.md | 2 +- .../threat-protection/auditing/event-4752.md | 2 +- .../threat-protection/auditing/event-4768.md | 4 +- .../threat-protection/auditing/event-4769.md | 4 +- .../threat-protection/auditing/event-4771.md | 4 +- .../threat-protection/auditing/event-4776.md | 2 +- .../threat-protection/auditing/event-4778.md | 2 +- .../threat-protection/auditing/event-4779.md | 2 +- .../threat-protection/auditing/event-5152.md | 2 +- .../threat-protection/auditing/event-5156.md | 2 +- .../threat-protection/auditing/event-5157.md | 2 +- ...onnections-microsoft-defender-antivirus.md | 2 +- .../configure-mssp-support.md | 8 +- .../controlled-folders.md | 2 +- .../customize-controlled-folders.md | 4 +- .../mac-install-with-intune.md | 2 +- .../mac-install-with-other-mdm.md | 2 +- .../microsoft-defender-atp/mac-whatsnew.md | 2 +- .../manage-automation-folder-exclusions.md | 2 +- .../manage-indicators.md | 2 +- .../production-deployment.md | 4 +- .../troubleshoot-mdatp.md | 4 +- .../microsoft-defender-atp/troubleshoot-np.md | 2 +- .../troubleshoot-onboarding-error-messages.md | 4 +- ...iew-of-threat-mitigations-in-windows-10.md | 2 +- ...arding-to-assist-in-intrusion-detection.md | 2 +- .../LOB-win32-apps-on-s.md | 2 +- ...ows-defender-application-control-policy.md | 2 +- ...s-defender-application-control-policies.md | 2 +- ...or-windows-defender-application-control.md | 2 +- .../create-initial-default-policy.md | 4 +- ...e-wdac-policy-for-fully-managed-devices.md | 2 +- ...wdac-policy-for-lightly-managed-devices.md | 2 +- ...rt-windows-defender-application-control.md | 2 +- ...s-defender-application-control-policies.md | 2 +- ...ion-control-policies-using-group-policy.md | 2 +- ...plication-control-policies-using-intune.md | 2 +- ...s-defender-application-control-policies.md | 2 +- ...s-defender-application-control-policies.md | 2 +- .../event-id-explanations.md | 2 +- .../example-wdac-base-policies.md | 2 +- .../feature-availability.md | 2 +- ...th-windows-defender-application-control.md | 2 +- ...s-defender-application-control-policies.md | 2 +- .../microsoft-recommended-block-rules.md | 6 +- ...defender-application-control-management.md | 2 +- ...events-centrally-using-advanced-hunting.md | 2 +- .../select-types-of-rules-to-create.md | 2 +- .../types-of-devices.md | 2 +- ...ication-control-policy-design-decisions.md | 2 +- ...ontrol-for-classic-windows-applications.md | 2 +- ...-portal-in-microsoft-store-for-business.md | 2 +- ...r-application-control-against-tampering.md | 2 +- ...l-specific-plug-ins-add-ins-and-modules.md | 2 +- ...tion-control-with-dynamic-code-security.md | 2 +- ...control-with-intelligent-security-graph.md | 2 +- ...lication-control-with-managed-installer.md | 4 +- .../wdac-and-applocker-overview.md | 2 +- ...er-application-control-deployment-guide.md | 4 +- ...fender-application-control-design-guide.md | 2 +- ...r-application-control-operational-guide.md | 2 +- .../windows-defender-application-control.md | 2 +- ...sed-root-of-trust-helps-protect-windows.md | 2 +- ...sed-root-of-trust-helps-protect-windows.md | 2 +- 96 files changed, 242 insertions(+), 241 deletions(-) diff --git a/devices/hololens/hololens-faq-security.md b/devices/hololens/hololens-faq-security.md index 85f66c8318..770410499f 100644 --- a/devices/hololens/hololens-faq-security.md +++ b/devices/hololens/hololens-faq-security.md @@ -34,7 +34,7 @@ appliesto: 1. **What frequency range and channels does the device operate on and is it configurable?** 1. Wi-Fi: The frequency range is not user configurable and depends on the country of use. In the US Wi-Fi uses both 2.4 GHz (1-11) channels and 5 GHz (36-64, 100-165) channels. 1. Bluetooth: Bluetooth uses the standard 2.4-2.48 GHz range. -1. **Can the device blacklist or white list specific frequencies?** +1. **Can the device allow or block specific frequencies?** 1. This is not controllable by the user/device 1. **What is the power level for both transmit and receive? Is it adjustable? What is the range of operation?** 1. Our emissions testing standards can be found [here](https://fccid.io/C3K1688). Range of operation is highly dependent on the access point and environment - but is roughly equivalent to other high-quality phones, tablets, or PCs. @@ -63,9 +63,9 @@ appliesto: 1. Yes 1. **Is there an ability to control or disable the use of ports on the device?** 1. The HoloLens only contains 2 ports (one for headphones and one for charging or connecting to PCs). There is not ability to disable the port due to functionality and recovery reasons. -1. **Antivirus, end point detection, IPS, app control whitelist – Any ability to run antivirus, end point detection, IPS, app control whitelist, etc.** +1. **Antivirus, end point detection, IPS, app control allow list – Any ability to run antivirus, end point detection, IPS, app control allow list, etc.** 1. Windows Holographic for Business (commercial suite) does support Windows Defender Smart Screen. If an antivirus company were to create and publish their app to the Universal Windows Platform, it could be downloaded on HoloLens. At present, no companies have done this for HoloLens. - 1. Whitelisting apps is possible by using the Microsoft Enterprise Store, where you can choose only what specific apps can be downloaded. Also, through MDM you can lock what specific apps can be run or even seen on the device. + 1. Allowing apps is possible by using the Microsoft Enterprise Store, where you can choose only what specific apps can be downloaded. Also, through MDM you can lock what specific apps can be run or even seen on the device. 1. **Can we quarantine the device from prod network until we update the device if it has been offline for an extended period of time? Ex. Device has been sitting in a drawer not powered up for a period (6 months) and has not received any updates, patches, etc. When it tries to come on the network can we flag it and say you must update on another network prior to being complaint to join the network.** 1. This is something that can be managed on the infrastructure level by either an MDM or an on-prem server. The device can be flagged as not compliant if it does not meet a specified Update version. 1. **Does Microsoft include any back doors or access to services that allows Microsoft to connect to the device for screen sharing or remote support at will?** @@ -85,7 +85,7 @@ appliesto: 1. C3K1855 1. **What frequency range and channels does the device operate on and is it configurable?** 1. Wi-Fi: The frequency range is not user configurable and depends on the country of use. In the US Wi-Fi uses both 2.4 GHz (1-11) channels and 5 GHz (36-64, 100-165) channels. -1. **Can the device blacklist or white list specific frequencies?** +1. **Can the device allow or block specific frequencies?** 1. This is not controllable by the user/device 1. **What is the power level for both transmit and receive? Is it adjustable? What is the range of operation?** 1. Wireless power levels depend on the channel of operation. Devices are calibrated to perform at the highest power levels allowed based on the region's regulatory rules. @@ -113,9 +113,9 @@ appliesto: 1. Yes 1. **Is there an ability to control or disable the use of ports on the device?** 1. The HoloLens only contains 2 ports (one for headphones and one for charging or connecting to PCs). There is not ability to disable the port due to functionality and recovery reasons. -1. **Antivirus, end point detection, IPS, app control whitelist – Any ability to run antivirus, end point detection, IPS, app control whitelist, etc.** +1. **Antivirus, end point detection, IPS, app control allow – Any ability to run antivirus, end point detection, IPS, app control allow, etc.** 1. HoloLens 2nd Gen supports Windows Defender Smart Screen. If an antivirus company were to create and publish their app to the Universal Windows Platform, it could be downloaded on HoloLens. At present, no companies have done this for HoloLens. - 1. Whitelisting apps is possible by using the Microsoft Enterprise Store, where you can choose only what specific apps can be downloaded. Also, through MDM you can lock what specific apps can be run or even seen on the device. + 1. Allowing apps is possible by using the Microsoft Enterprise Store, where you can choose only what specific apps can be downloaded. Also, through MDM you can lock what specific apps can be run or even seen on the device. 1. **Can we quarantine the device from prod network until we update the device if it has been offline for an extended period of time? Ex. Device has been sitting in a drawer not powered up for a period (6 months) and has not received any updates, patches, etc. When it tries to come on the network can we flag it and say you must update on another network prior to being complaint to join the network.** 1. This is something that can be managed on the infrastructure level by either an MDM or an on-prem server. The device can be flagged as not compliant if it does not meet a specified Update version. 1. **Does Microsoft include any back doors or access to services that allows Microsoft to connect to the device for screen sharing or remote support at will?** diff --git a/devices/hololens/hololens-offline.md b/devices/hololens/hololens-offline.md index b9ee084421..e16ee7df6f 100644 --- a/devices/hololens/hololens-offline.md +++ b/devices/hololens/hololens-offline.md @@ -22,7 +22,7 @@ appliesto: # Manage connection endpoints for HoloLens -Some HoloLens components, apps, and related services transfer data to Microsoft network endpoints. This article lists different endpoints and URLs that need to be whitelisted in your network configuration (e.g. proxy or firewall) for those components to be functional. +Some HoloLens components, apps, and related services transfer data to Microsoft network endpoints. This article lists different endpoints and URLs that need to be allowed in your network configuration (e.g. proxy or firewall) for those components to be functional. ## Near-offline setup diff --git a/devices/hololens/hololens-requirements.md b/devices/hololens/hololens-requirements.md index c8be6947ae..a175ddd5eb 100644 --- a/devices/hololens/hololens-requirements.md +++ b/devices/hololens/hololens-requirements.md @@ -23,7 +23,7 @@ This document also assumes that the HoloLens has been evaluated by security team 1. [Determine what features you need](hololens-requirements.md#step-1-determine-what-you-need) 1. [Determine what licenses you need](hololens-licenses-requirements.md) 1. [Configure your network for HoloLens](hololens-commercial-infrastructure.md). - 1. This section includes bandwidth requirements, URL, and ports that need to be whitelisted on your firewall; Azure AD guidance; Mobile Device Management (MDM) Guidance; app deployment/management guidance; and certificate guidance. + 1. This section includes bandwidth requirements, URL, and ports that need to be allowed on your firewall; Azure AD guidance; Mobile Device Management (MDM) Guidance; app deployment/management guidance; and certificate guidance. 1. (Optional) [Configure HoloLens using a provisioning package](hololens-provisioning.md) 1. [Enroll Device](hololens-enroll-mdm.md) 1. [Set up ring based updates for HoloLens](hololens-updates.md) diff --git a/devices/surface-hub/apply-activesync-policies-for-surface-hub-device-accounts.md b/devices/surface-hub/apply-activesync-policies-for-surface-hub-device-accounts.md index 66dd43f75c..8c94fbb5fe 100644 --- a/devices/surface-hub/apply-activesync-policies-for-surface-hub-device-accounts.md +++ b/devices/surface-hub/apply-activesync-policies-for-surface-hub-device-accounts.md @@ -21,10 +21,10 @@ The Microsoft Surface Hub's device account uses ActiveSync to sync mail and cale For these features to work, the ActiveSync policies for your organization must be configured as follows: -- There can't be any global policies that block synchronization of the resource mailbox that's being used by the Surface Hub’s device account. If there is such a blocking policy, you need to whitelist the Surface Hub as an allowed device. +- There can't be any global policies that block synchronization of the resource mailbox that's being used by the Surface Hub’s device account. If there is such a blocking policy, you need to add the Surface Hub as an allowed device. - You must set a mobile device mailbox policy where the **PasswordEnabled** setting is set to False. Other mobile device mailbox policy settings are not compatible with the Surface Hub. -## Whitelisting the DeviceID +## Allowing the DeviceID Your organization may have a global policy that prevents syncing of device accounts provisioned on Surface Hubs. To configure this property, see [Allowing device IDs for ActiveSync](appendix-a-powershell-scripts-for-surface-hub.md#whitelisting-device-ids-cmdlet). diff --git a/devices/surface-hub/create-and-test-a-device-account-surface-hub.md b/devices/surface-hub/create-and-test-a-device-account-surface-hub.md index 8985f70c9d..b5ce94c19a 100644 --- a/devices/surface-hub/create-and-test-a-device-account-surface-hub.md +++ b/devices/surface-hub/create-and-test-a-device-account-surface-hub.md @@ -38,7 +38,7 @@ This table explains the main steps and configuration decisions when you create a | 2 | Configure mailbox properties | The mailbox must be configured with the correct properties to enable the best meeting experience on Surface Hub. For more information on mailbox properties, see [Mailbox properties](exchange-properties-for-surface-hub-device-accounts.md). | | 3 | Apply a compatible mobile device mailbox policy to the mailbox | Surface Hub is managed using mobile device management (MDM) rather than through mobile device mailbox policies. For compatibility, the device account must have a mobile device mailbox policy where the **PasswordEnabled** setting is set to False. Otherwise, Surface Hub can't sync mail and calendar info. | | 4 | Enable mailbox with Skype for Business (Lync Server 2013 or later, or Skype for Business Online) | Skype for Business must be enabled to use conferencing features like video calls, IM, and screen sharing. | -| 5 | (Optional) Whitelist ActiveSync Device ID | Your organization may have a global policy that prevents device accounts from syncing mail and calendar info. If so, you need to whitelist the ActiveSync Device ID of your Surface Hub. | +| 5 | (Optional) Whitelist ActiveSync Device ID | Your organization may have a global policy that prevents device accounts from syncing mail and calendar info. If so, you need to allow the ActiveSync Device ID of your Surface Hub. | | 6 | (Optional) Disable password expiration | To simplify management, you can turn off password expiration for the device account and allow Surface Hub to automatically rotate the device account password. For more information about password management, see [Password management](password-management-for-surface-hub-device-accounts.md). | ## Detailed configuration steps diff --git a/devices/surface-hub/troubleshoot-surface-hub.md b/devices/surface-hub/troubleshoot-surface-hub.md index 4a30281eff..06b493c24d 100644 --- a/devices/surface-hub/troubleshoot-surface-hub.md +++ b/devices/surface-hub/troubleshoot-surface-hub.md @@ -415,7 +415,7 @@ Possible fixes for issues with Surface Hub first-run program.

    Can't sync mail/calendar.

    The account has not allowed the Surface Hub as an allowed device.

    0x86000C1C

    -

    Add the Surface Hub device ID to the whitelist by setting the ActiveSyncAllowedDeviceIds property for the mailbox.

    +

    Add the Surface Hub device ID to the allowed list by setting the ActiveSyncAllowedDeviceIds property for the mailbox.

    diff --git a/windows/client-management/mdm/applicationcontrol-csp.md b/windows/client-management/mdm/applicationcontrol-csp.md index 4293995ef5..9cb53ea100 100644 --- a/windows/client-management/mdm/applicationcontrol-csp.md +++ b/windows/client-management/mdm/applicationcontrol-csp.md @@ -1,7 +1,7 @@ --- title: ApplicationControl CSP description: The ApplicationControl CSP allows you to manage multiple Windows Defender Application Control (WDAC) policies from a MDM server. -keywords: whitelisting, security, malware +keywords: security, malware ms.author: dansimp ms.topic: article ms.prod: w10 diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index 3a1f4b6002..ea7d1567cb 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -869,7 +869,7 @@ The following list shows the apps that may be included in the inbox. -## Whitelist examples +## Allow list examples The following example disables the calendar application. diff --git a/windows/client-management/mdm/healthattestation-csp.md b/windows/client-management/mdm/healthattestation-csp.md index 3870f7d385..e24210c9e0 100644 --- a/windows/client-management/mdm/healthattestation-csp.md +++ b/windows/client-management/mdm/healthattestation-csp.md @@ -748,13 +748,13 @@ Each of these are described in further detail in the following sections, along w
    **PCR0**

    The measurement that is captured in PCR[0] typically represents a consistent view of the Host Platform between boot cycles. It contains a measurement of components that are provided by the host platform manufacturer.

    -

    Enterprise managers can create a whitelist of trusted PCR[0] values, compare the PCR[0] value of the managed devices (the value that is verified and reported by HAS) with the whitelist, and then make a trust decision based on the result of the comparison.

    +

    Enterprise managers can create a allow list of trusted PCR[0] values, compare the PCR[0] value of the managed devices (the value that is verified and reported by HAS) with the allow list, and then make a trust decision based on the result of the comparison.

    -

    If your enterprise does not have a whitelist of accepted PCR[0] values, then take no action.

    +

    If your enterprise does not have a allow list of accepted PCR[0] values, then take no action.

    -

    If PCR[0] equals an accepted whitelisted value, then allow access.

    +

    If PCR[0] equals an accepted allow list value, then allow access.

    -

    If PCR[0] does not equal any accepted whitelisted value, then take one of the following actions that align with your enterprise policies:

    +

    If PCR[0] does not equal any accepted listed value, then take one of the following actions that align with your enterprise policies:

    - Disallow all access - Direct the device to an enterprise honeypot, to further monitor the device's activities. @@ -762,9 +762,9 @@ Each of these are described in further detail in the following sections, along w **SBCPHash**

    SBCPHash is the finger print of the Custom Secure Boot Configuration Policy (SBCP) that was loaded during boot in Windows devices, except PCs.

    -

    If SBCPHash is not present, or is an accepted (whitelisted) value, then allow access. +

    If SBCPHash is not present, or is an accepted allow-listed value, then allow access. -

    If SBCPHash is present in DHA-Report, and is not a whitelisted value, then take one of the following actions that align with your enterprise policies:

    +

    If SBCPHash is present in DHA-Report, and is not a allow-listed value, then take one of the following actions that align with your enterprise policies:

    - Disallow all access - Place the device in a watch list to monitor the device more closely for potential risks. @@ -772,9 +772,9 @@ Each of these are described in further detail in the following sections, along w **CIPolicy**

    This attribute indicates the Code Integrity policy that is controlling the security of the boot environment.

    -

    If CIPolicy is not present, or is an accepted (whitelisted) value, then allow access.

    +

    If CIPolicy is not present, or is an accepted allow-listed value, then allow access.

    -

    If CIPolicy is present and is not a whitelisted value, then take one of the following actions that align with your enterprise policies:

    +

    If CIPolicy is present and is not a allow-listed value, then take one of the following actions that align with your enterprise policies:

    - Disallow all access - Place the device in a watch list to monitor the device more closely for potential risks. diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index 430601798d..c2b889cfe1 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -44,7 +44,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Server-initiated unenrollment failure](#server-initiated-unenrollment-failure) - [Certificates causing issues with Wi-Fi and VPN](#certificates-causing-issues-with-wi-fi-and-vpn) - [Version information for mobile devices](#version-information-for-mobile-devices) - - [Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) + - [Upgrading Windows Phone 8.1 devices with app allow list using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) @@ -1747,7 +1747,7 @@ Currently in Windows 10, version 1511, when using the ClientCertificateInstall The software version information from **DevDetail/SwV** does not match the version in **Settings** under **System/About**. -### Upgrading Windows Phone 8.1 devices with app whitelisting using ApplicationRestriction policy has issues +### Upgrading Windows Phone 8.1 devices with app allow-listing using ApplicationRestriction policy has issues - When you upgrade Windows Phone 8.1 devices to Windows 10 Mobile using ApplicationRestrictions with a list of allowed apps, some Windows inbox apps get blocked causing unexpected behavior. To work around this issue, you must include the [inbox apps](applocker-csp.md#inboxappsandcomponents) that you need to your list of allowed apps. @@ -2946,7 +2946,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o AppLocker CSP -

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Whitelist examples.

    +

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Allow list examples.

    DeviceManageability CSP diff --git a/windows/client-management/windows-10-mobile-and-mdm.md b/windows/client-management/windows-10-mobile-and-mdm.md index afb9c4241f..7017e40876 100644 --- a/windows/client-management/windows-10-mobile-and-mdm.md +++ b/windows/client-management/windows-10-mobile-and-mdm.md @@ -533,7 +533,7 @@ Learn more about the [Microsoft Store for Business](/microsoft-store/index). IT administrators can control which apps are allowed to be installed on Windows 10 Mobile devices and how they should be kept up-to-date. -Windows 10 Mobile includes AppLocker, which enables administrators to create allow or disallow (sometimes also called whitelist/blacklist) lists of apps from the Microsoft Store. This capability extends to built-in apps, as well, such as Xbox, Groove, text messaging, email, and calendar, etc. The ability to allow or deny apps helps to ensure that people use their mobile devices for their intended purposes. However, it is not always an easy approach to find a balance between what employees need or request and security concerns. Creating allow or disallow lists also requires keeping up with the changing app landscape in the Microsoft Store. +Windows 10 Mobile includes AppLocker, which enables administrators to create allow or disallow lists of apps from the Microsoft Store. This capability extends to built-in apps, as well, such as Xbox, Groove, text messaging, email, and calendar, etc. The ability to allow or deny apps helps to ensure that people use their mobile devices for their intended purposes. However, it is not always an easy approach to find a balance between what employees need or request and security concerns. Creating allow or disallow lists also requires keeping up with the changing app landscape in the Microsoft Store. For more details, see [AppLocker CSP](https://msdn.microsoft.com/library/windows/hardware/dn920019(v=vs.85).aspx). @@ -970,7 +970,7 @@ This is a list of attributes that are supported by DHA and can trigger the corre - **Boot Manager Version** The version of the Boot Manager running on the device. The HAS can check this version to determine whether the most current Boot Manager is running, which is more secure (trusted). - **Code integrity version** Specifies the version of code that is performing integrity checks during the boot sequence. The HAS can check this version to determine whether the most current version of code is running, which is more secure (trusted). - **Secure Boot Configuration Policy (SBCP) present** Whether the hash of the custom SBCP is present. A device with an SBCP hash present is more trustworthy than a device without an SBCP hash. -- **Boot cycle whitelist** The view of the host platform between boot cycles as defined by the manufacturer compared to a published whitelist. A device that complies with the whitelist is more trustworthy (secure) than a device that is noncompliant. +- **Boot cycle whitelist** The view of the host platform between boot cycles as defined by the manufacturer compared to a published allow list. A device that complies with the allow list is more trustworthy (secure) than a device that is noncompliant. **Example scenario** diff --git a/windows/configuration/wcd/wcd-cellcore.md b/windows/configuration/wcd/wcd-cellcore.md index b9b724b0b7..5e739a99ce 100644 --- a/windows/configuration/wcd/wcd-cellcore.md +++ b/windows/configuration/wcd/wcd-cellcore.md @@ -139,7 +139,7 @@ Select from the following: ### eSim -Configure **FwUpdate** > **AllowedAppIdList** to whitelist apps that are allowed to update the firmware. Obtain the app IDs from the card vendor. +Configure **FwUpdate** > **AllowedAppIdList** to list apps that are allowed to update the firmware. Obtain the app IDs from the card vendor. ### External diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index 90805fd151..ed26f9246b 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -162,7 +162,7 @@ Check that your device can access these Windows Update endpoints: - `http://wustat.windows.com` - `http://ntservicepack.microsoft.com` - Whitelist these endpoints for future use. + White these endpoints for future use. ## Updates aren't downloading from the intranet endpoint (WSUS or Configuration Manager) Windows 10 devices can receive updates from a variety of sources, including Windows Update online, a Windows Server Update Services server, and others. To determine the source of Windows Updates currently being used on a device, follow these steps: diff --git a/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md b/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md index 78d70d0d25..6de193cccb 100644 --- a/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md +++ b/windows/deployment/upgrade/upgrade-windows-phone-8-1-to-10.md @@ -1,113 +1,114 @@ ---- -title: Upgrade Windows Phone 8.1 to Windows 10 Mobile in an MDM environment (Windows 10) -ms.reviewer: -manager: laurawi -ms.author: greglin -description: This article describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using MDM. -keywords: upgrade, update, windows, phone, windows 10, mdm, mobile -ms.prod: w10 -ms.mktglfcycl: deploy -ms.localizationpriority: medium -ms.sitesec: library -ms.pagetype: mdm -audience: itpro author: greg-lindsay -ms.topic: article ---- - -# Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management (MDM) - -**Applies to** - -- Windows 10 Mobile - -## Summary - -This article describes how system administrators can upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using [Mobile Device Management](https://docs.microsoft.com/windows/client-management/mdm/) (MDM). - ->[!IMPORTANT] ->If you are not a system administrator, see the [Windows 10 Mobile Upgrade & Updates](https://www.microsoft.com/windows/windows-10-mobile-upgrade) page for details about updating your Windows 8.1 Mobile device to Windows 10 Mobile using the [Upgrade Advisor](https://www.microsoft.com/store/p/upgrade-advisor/9nblggh0f5g4). - -## Upgrading with MDM - -The Windows Phone 8.1 to Windows 10 Mobile upgrade uses an "opt-in" or "seeker" model. To determine if the device is eligible for an upgrade with MDM, see the [How to determine whether an upgrade is available for a device](#howto-upgrade-available) topic in this article. An eligible device must opt-in to be offered the upgrade. For consumers, the Windows 10 Mobile Upgrade Advisor app is available from the Windows Store to perform the opt-in. For Enterprises, Microsoft is offering a centralized management solution through MDM that can push a management policy to each eligible device to perform the opt-in. - -If you use a list of allowed applications (app whitelisting) with MDM, verify that system applications are whitelisted before you upgrade to Windows 10 Mobile. Also, be aware that there are [known issues](https://msdn.microsoft.com/library/windows/hardware/mt299056.aspx#whitelist) with app whitelisting that could adversely affect the device after you upgrade. - -Some enterprises might want to control the availability of the Windows 10 Mobile upgrade to their users. With the opt-in model, the enterprise can blacklist the Upgrade Advisor app to prevent their users from upgrading prematurely. For more information about how to blacklist the Upgrade Advisor app, see the [How to blacklist the Upgrade Advisor app](#howto-blacklist) section in this article. Enterprises that have blacklisted the Upgrade Advisor app can use the solution described in this article to select the upgrade timing on a per-device basis. - -## More information - -To provide enterprises with a solution that's independent of the Upgrade Advisor, a new registry key in the registry configuration service provider (CSP) is available. A special GUID key value is defined. When Microsoft Update (MU) detects the presence of the registry key value on a device, any available upgrade will be made available to the device. - -### Prerequisites - -- Windows Phone 8.1 device with an available upgrade to Windows 10 Mobile. -- Device connected to Wi-Fi or cellular network to perform scan for upgrade. -- Device is already enrolled with an MDM session. -- Device is able to receive the management policy. -- MDM is capable of pushing the management policy to devices. Minimum version numbers for some popular MDM providers that support this solution are: InTune: 5.0.5565, AirWatch: 8.2, Mobile Iron: 9.0. - -### Instructions for the MDM server - -The registry CSP is used to push the GUID value to the following registry key for which the Open Mobile Alliance (OMA) Device Management (DM) client has Read/Write access and for which the Device Update service has Read access. - -``` -[HKLM\Software\Microsoft\Provisioning\OMADM] -"EnterpriseUpgrade"="d369c9b6-2379-466d-9162-afc53361e3c2” -``` - - -The complete SyncML command for the solution is as follows. Note: The SyncML may vary, depending on your MDM solution. - -``` -SyncML xmlns="SYNCML:SYNCML1.1"> - - - 250 - - - ./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/EnterpriseUpgrade - - - chr - - d369c9b6-2379-466d-9162-afc53361e3c2 - - - - - -``` - -The OMA DM server policy description is provided in the following table: - -|Item |Setting | -|------|------------| -| OMA-URI |./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/EnterpriseUpgrade | -| Data Type |String | -| Value |d369c9b6-2379-466d-9162-afc53361e3c2 | - - -After the device consumes the policy, it will be able to receive an available upgrade. - -To disable the policy, delete the **OMADM** registry key or set the **EnterpriseUpgrade** string value to anything other than the GUID. - -### How to determine whether an upgrade is available for a device - -The Windows 10 Mobile Upgrade Advisor app is not designed or intended for Enterprise customers who want to automate the upgrade process. However, the Windows 10 Mobile Upgrade Advisor app is the best mechanism to determine when an upgrade is available. The app dynamically queries whether the upgrade is released for this device model and associated mobile operator (MO). - -We recommend that enterprises use a pilot device with the Windows 10 Mobile Upgrade Advisor app installed. The pilot device provides the device model and MO used by the enterprise. When you run the app on the pilot device, it will tell you that either an upgrade is available, that the device is eligible for upgrade, or that an upgrade is not available for this device. - -Note: The availability of Windows 10 Mobile as an update for existing Windows Phone 8.1 devices varies by device manufacturer, device model, country or region, mobile operator or service provider, hardware limitations, and other factors. To check for compatibility and other important installation information, see the [Windows 10 Mobile FAQ](https://support.microsoft.com/help/10599/windows-10-mobile-how-to-get) page. - -### How to blacklist the Upgrade Advisor app - -Some enterprises may want to block their users from installing the Windows 10 Mobile Upgrade Advisor app. With Windows Phone 8.1, you can allow or deny individual apps by adding specific app publishers or the app globally unique identifier (GUID) from the Window Phone Store to an allow or deny XML list. The GUID for a particular application can be found in the URL for the app in the phone store. For example, the GUID to the Windows 10 Mobile Upgrade Adviser (fbe47e4f-7769-4103-910e-dca8c43e0b07) is displayed in the following URL: - -http://windowsphone.com/s?appid=fbe47e4f-7769-4103-910e-dca8c43e0b07 - -For more information about how to do this, see [Try it out: restrict Windows Phone 8.1 apps](https://technet.microsoft.com/windows/dn771706.aspx). - -## Related topics - -[Windows 10 Mobile and mobile device management](/windows/client-management/windows-10-mobile-and-mdm) +--- +title: Upgrade Windows Phone 8.1 to Windows 10 Mobile in an MDM environment (Windows 10) +ms.reviewer: +manager: laurawi +ms.author: greglin +description: This article describes how to upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using MDM. +keywords: upgrade, update, windows, phone, windows 10, mdm, mobile +ms.prod: w10 +ms.mktglfcycl: deploy +ms.localizationpriority: medium +ms.sitesec: library +ms.pagetype: mdm +audience: itpro +author: greg-lindsay +ms.topic: article +--- + +# Upgrade a Windows Phone 8.1 to Windows 10 Mobile with Mobile Device Management (MDM) + +**Applies to** + +- Windows 10 Mobile + +## Summary + +This article describes how system administrators can upgrade eligible Windows Phone 8.1 devices to Windows 10 Mobile using [Mobile Device Management](https://docs.microsoft.com/windows/client-management/mdm/) (MDM). + +>[!IMPORTANT] +>If you are not a system administrator, see the [Windows 10 Mobile Upgrade & Updates](https://www.microsoft.com/windows/windows-10-mobile-upgrade) page for details about updating your Windows 8.1 Mobile device to Windows 10 Mobile using the [Upgrade Advisor](https://www.microsoft.com/store/p/upgrade-advisor/9nblggh0f5g4). + +## Upgrading with MDM + +The Windows Phone 8.1 to Windows 10 Mobile upgrade uses an "opt-in" or "seeker" model. To determine if the device is eligible for an upgrade with MDM, see the [How to determine whether an upgrade is available for a device](#howto-upgrade-available) topic in this article. An eligible device must opt-in to be offered the upgrade. For consumers, the Windows 10 Mobile Upgrade Advisor app is available from the Windows Store to perform the opt-in. For Enterprises, Microsoft is offering a centralized management solution through MDM that can push a management policy to each eligible device to perform the opt-in. + +If you use a list of allowed applications (app allow listing) with MDM, verify that system applications are allow-listed before you upgrade to Windows 10 Mobile. Also, be aware that there are [known issues](https://msdn.microsoft.com/library/windows/hardware/mt299056.aspx#whitelist) with app allow-lists that could adversely affect the device after you upgrade. + +Some enterprises might want to control the availability of the Windows 10 Mobile upgrade to their users. With the opt-in model, the enterprise can block the Upgrade Advisor app to prevent their users from upgrading prematurely. For more information about how to restrict the Upgrade Advisor app, see the [How to restrict the Upgrade Advisor app](#howto-restrict) section in this article. Enterprises that have restricted the Upgrade Advisor app can use the solution described in this article to select the upgrade timing on a per-device basis. + +## More information + +To provide enterprises with a solution that's independent of the Upgrade Advisor, a new registry key in the registry configuration service provider (CSP) is available. A special GUID key value is defined. When Microsoft Update (MU) detects the presence of the registry key value on a device, any available upgrade will be made available to the device. + +### Prerequisites + +- Windows Phone 8.1 device with an available upgrade to Windows 10 Mobile. +- Device connected to Wi-Fi or cellular network to perform scan for upgrade. +- Device is already enrolled with an MDM session. +- Device is able to receive the management policy. +- MDM is capable of pushing the management policy to devices. Minimum version numbers for some popular MDM providers that support this solution are: InTune: 5.0.5565, AirWatch: 8.2, Mobile Iron: 9.0. + +### Instructions for the MDM server + +The registry CSP is used to push the GUID value to the following registry key for which the Open Mobile Alliance (OMA) Device Management (DM) client has Read/Write access and for which the Device Update service has Read access. + +``` +[HKLM\Software\Microsoft\Provisioning\OMADM] +"EnterpriseUpgrade"="d369c9b6-2379-466d-9162-afc53361e3c2” +``` + + +The complete SyncML command for the solution is as follows. Note: The SyncML may vary, depending on your MDM solution. + +``` +SyncML xmlns="SYNCML:SYNCML1.1"> + + + 250 + + + ./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/EnterpriseUpgrade + + + chr + + d369c9b6-2379-466d-9162-afc53361e3c2 + + + + + +``` + +The OMA DM server policy description is provided in the following table: + +|Item |Setting | +|------|------------| +| OMA-URI |./Vendor/MSFT/Registry/HKLM/SOFTWARE/Microsoft/Provisioning/OMADM/EnterpriseUpgrade | +| Data Type |String | +| Value |d369c9b6-2379-466d-9162-afc53361e3c2 | + + +After the device consumes the policy, it will be able to receive an available upgrade. + +To disable the policy, delete the **OMADM** registry key or set the **EnterpriseUpgrade** string value to anything other than the GUID. + +### How to determine whether an upgrade is available for a device + +The Windows 10 Mobile Upgrade Advisor app is not designed or intended for Enterprise customers who want to automate the upgrade process. However, the Windows 10 Mobile Upgrade Advisor app is the best mechanism to determine when an upgrade is available. The app dynamically queries whether the upgrade is released for this device model and associated mobile operator (MO). + +We recommend that enterprises use a pilot device with the Windows 10 Mobile Upgrade Advisor app installed. The pilot device provides the device model and MO used by the enterprise. When you run the app on the pilot device, it will tell you that either an upgrade is available, that the device is eligible for upgrade, or that an upgrade is not available for this device. + +Note: The availability of Windows 10 Mobile as an update for existing Windows Phone 8.1 devices varies by device manufacturer, device model, country or region, mobile operator or service provider, hardware limitations, and other factors. To check for compatibility and other important installation information, see the [Windows 10 Mobile FAQ](https://support.microsoft.com/help/10599/windows-10-mobile-how-to-get) page. + +### How to restrict the Upgrade Advisor app + +Some enterprises may want to block their users from installing the Windows 10 Mobile Upgrade Advisor app. With Windows Phone 8.1, you can allow or deny individual apps by adding specific app publishers or the app globally unique identifier (GUID) from the Window Phone Store to an allow or deny XML list. The GUID for a particular application can be found in the URL for the app in the phone store. For example, the GUID to the Windows 10 Mobile Upgrade Adviser (fbe47e4f-7769-4103-910e-dca8c43e0b07) is displayed in the following URL: + +http://windowsphone.com/s?appid=fbe47e4f-7769-4103-910e-dca8c43e0b07 + +For more information about how to do this, see [Try it out: restrict Windows Phone 8.1 apps](https://technet.microsoft.com/windows/dn771706.aspx). + +## Related topics + +[Windows 10 Mobile and mobile device management](/windows/client-management/windows-10-mobile-and-mdm) diff --git a/windows/deployment/windows-10-enterprise-e3-overview.md b/windows/deployment/windows-10-enterprise-e3-overview.md index e4cadbe165..c36f0c2cdc 100644 --- a/windows/deployment/windows-10-enterprise-e3-overview.md +++ b/windows/deployment/windows-10-enterprise-e3-overview.md @@ -105,7 +105,7 @@ Windows 10 Enterprise edition has a number of features that are unavailable in

    AppLocker management

    -

    This feature helps IT pros determine which applications and files users can run on a device (also known as “whitelisting”). The applications and files that can be managed include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.

    +

    This feature helps IT pros determine which applications and files users can run on a device. The applications and files that can be managed include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers.

    For more information, see AppLocker.

    diff --git a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md index eca7e2bf95..1cf373f277 100644 --- a/windows/deployment/windows-autopilot/windows-autopilot-requirements.md +++ b/windows/deployment/windows-autopilot/windows-autopilot-requirements.md @@ -49,7 +49,7 @@ Windows Autopilot depends on a variety of internet-based services. Access to the - Ensure DNS name resolution for internet DNS names - Allow access to all hosts via port 80 (HTTP), 443 (HTTPS), and 123 (UDP/NTP) -In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to whitelist access to the required services. For additional details about each of these services and their specific requirements, review the following details: +In environments that have more restrictive Internet access, or for those that require authentication before internet access can be obtained, additional configuration may be required to allow access to the required services. For additional details about each of these services and their specific requirements, review the following details: - From ea4c2f59707baf4abc765495e8800c8a1812230f Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 15 Jun 2020 09:41:16 -0700 Subject: [PATCH 219/228] pencil edit --- .../deployment/update/update-compliance-configuration-manual.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/update-compliance-configuration-manual.md b/windows/deployment/update/update-compliance-configuration-manual.md index 1387e22018..de0fe72583 100644 --- a/windows/deployment/update/update-compliance-configuration-manual.md +++ b/windows/deployment/update/update-compliance-configuration-manual.md @@ -55,7 +55,7 @@ All Group Policies that need to be configured for Update Compliance are under ** |---------------------------|-|-----------------------------------------------------------| |**Configure the Commercial ID** |[Your CommercialID](update-compliance-get-started.md#get-your-commercialid) | Identifies the device as belonging to your organization. | |**Allow Telemetry** | 1 - Basic |Configures the maximum allowed diagnostic data to be sent to Microsoft. Individual users can still set this lower than what the policy defines. See the following policy for more information. | -|**Configure telemetry opt-in setting user interface** | 1 - Disable telemetry opt-in Settings |(in Windows 10, version 1803 and later) Determines whether end-users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this polic, otherwise the effective diagnostic data level on devices might not be sufficient. | +|**Configure telemetry opt-in setting user interface** | 1 - Disable telemetry opt-in Settings |(in Windows 10, version 1803 and later) Determines whether end-users of the device can adjust diagnostic data to levels lower than the level defined by AllowTelemetry. We recommend that you disable this policy, otherwise the effective diagnostic data level on devices might not be sufficient. | |**Allow device name to be sent in Windows diagnostic data** | 1 - Enabled | Allows device name to be sent for Windows Diagnostic Data. If this policy is Not Configured or Disabled, Device Name will not be sent and will not be visible in Update Compliance, showing `#` instead. | ## Required endpoints From 9fe5b1d944155b8fc6bc4511fd97787bc5c49134 Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 15 Jun 2020 09:41:18 -0700 Subject: [PATCH 220/228] fixing anchor link --- windows/client-management/mdm/applocker-csp.md | 2 +- .../mdm/new-in-windows-mdm-enrollment-management.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index 973ba78922..4fe03939a0 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -868,7 +868,7 @@ The following list shows the apps that may be included in the inbox. -## Allow list examples +## Allow list examples The following example disables the calendar application. diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index aa8a5bcf89..2927d154d3 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -2945,7 +2945,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o - From 618f27b95fc12be3abfc3e2d71c45da19d611a74 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 15 Jun 2020 09:57:21 -0700 Subject: [PATCH 221/228] pencil edits --- windows/deployment/update/windows-update-resources.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index c3631a707c..1100e81433 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -56,19 +56,19 @@ The following resources provide additional information about using Windows Updat ``` 4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. 1. Rename the following folders to *.BAK: - ``` + ```console %systemroot%\SoftwareDistribution\DataStore %systemroot%\SoftwareDistribution\Download %systemroot%\system32\catroot2 ``` To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` + ```console Ren %systemroot%\SoftwareDistribution\DataStore *.bak Ren %systemroot%\SoftwareDistribution\Download *.bak Ren %systemroot%\system32\catroot2 *.bak ``` 2. Reset the BITS service and the Windows Update service to the default security descriptor. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` + ```console sc.exe sdset bits D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) ``` From 55d3990b163826de1853c373d381b0f79e524686 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 15 Jun 2020 09:59:00 -0700 Subject: [PATCH 222/228] updating toc --- windows/security/threat-protection/TOC.md | 1 + 1 file changed, 1 insertion(+) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 41e116ecca..25821bd270 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -264,6 +264,7 @@ #### [Alerts queue]() ##### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue.md) +##### [Review alerts](windows/security/threat-protection/microsoft-defender-atp/review-alerts.md) ##### [Manage alerts](microsoft-defender-atp/manage-alerts.md) ##### [Investigate alerts](microsoft-defender-atp/investigate-alerts.md) ##### [Investigate files](microsoft-defender-atp/investigate-files.md) From c1c122c82606dbd4f2f9c4f12f311d22621f73eb Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 15 Jun 2020 10:12:12 -0700 Subject: [PATCH 223/228] pencil edits --- .../update/windows-update-resources.md | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/windows/deployment/update/windows-update-resources.md b/windows/deployment/update/windows-update-resources.md index 1100e81433..60c38e2f82 100644 --- a/windows/deployment/update/windows-update-resources.md +++ b/windows/deployment/update/windows-update-resources.md @@ -42,16 +42,16 @@ The following resources provide additional information about using Windows Updat ## Reset Windows Update components manually 1. Open a Windows command prompt. To open a command prompt, click **Start > Run**. Copy and paste (or type) the following command and then press ENTER: - ``` + ```console cmd ``` 2. Stop the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` + ```console net stop bits net stop wuauserv ``` 3. Delete the qmgr\*.dat files. To do this, type the following command at a command prompt, and then press ENTER: - ``` + ```console Del "%ALLUSERSPROFILE%\Application Data\Microsoft\Network\Downloader\qmgr*.dat" ``` 4. If this is your first attempt at resolving your Windows Update issues by using the steps in this article, go to step 5 without carrying out the steps in step 4. The steps in step 4 should only be performed at this point in the troubleshooting if you cannot resolve your Windows Update issues after following all steps but step 4. The steps in step 4 are also performed by the "Aggressive" mode of the Fix it Solution above. @@ -73,12 +73,12 @@ The following resources provide additional information about using Windows Updat sc.exe sdset wuauserv D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;AU)(A;;CCLCSWRPWPDTLOCRRC;;;PU) ``` 5. Type the following command at a command prompt, and then press ENTER: - ``` + ```console cd /d %windir%\system32 ``` 6. Reregister the BITS files and the Windows Update files. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` + ```console regsvr32.exe atl.dll regsvr32.exe urlmon.dll regsvr32.exe mshtml.dll @@ -118,20 +118,20 @@ The following resources provide additional information about using Windows Updat ``` 7. Reset Winsock. To do this, type the following command at a command prompt, and then press ENTER: - ``` + ```console netsh winsock reset ``` 8. If you are running Windows XP or Windows Server 2003, you have to set the proxy settings. To do this, type the following command at a command prompt, and then press ENTER: - ``` + ```console proxycfg.exe -d ``` 9. Restart the BITS service and the Windows Update service. To do this, type the following commands at a command prompt. Press ENTER after you type each command. - ``` + ```console net start bits net start wuauserv ``` 10. If you are running Windows Vista or Windows Server 2008, clear the BITS queue. To do this, type the following command at a command prompt, and then press ENTER: - ``` + ```console bitsadmin.exe /reset /allusers ``` From f1a628d11b63501087ade8ba914e10b699b0ba39 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 15 Jun 2020 10:21:23 -0700 Subject: [PATCH 224/228] fixing links --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index b466653ed7..77259f849c 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -93,7 +93,6 @@ When making the move to the new alert page you will notice that we have centrali ## Related topics -- [Incidents overview](incidents-overview.md) +- [View and organize the incidents queue](view-incidents-queue.md) - [Investigate incidents](investigate-incidents.md) -- [Prioritize incidents](incident-queue.md) - [Manage incidents](manage-incidents.md) \ No newline at end of file From 3894a42ea3f6646edb2ed8e05fc0415087e6cdc2 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 15 Jun 2020 10:24:28 -0700 Subject: [PATCH 225/228] adding video --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 77259f849c..068d302539 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -91,6 +91,10 @@ If you are experiencing a false alert with a line-of-business application, creat When making the move to the new alert page you will notice that we have centralized information from the alert process tree, the incident graph, and the artifact timeline into the [alert story](#investigate-using-the-alert-story), with some information available through the [affected assets](#review-affected-assets) section. Any additional information has been consolidated into the details pane for the relevant entities. +## Video overview of the new alert page + +[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4yiO5] + ## Related topics - [View and organize the incidents queue](view-incidents-queue.md) From e300ab6f5604e2d20d104aa8fa0753068bb4bb97 Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 15 Jun 2020 10:44:05 -0700 Subject: [PATCH 226/228] pencil edit --- windows/deployment/update/windows-update-troubleshooting.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/deployment/update/windows-update-troubleshooting.md b/windows/deployment/update/windows-update-troubleshooting.md index ed26f9246b..967245b7d0 100644 --- a/windows/deployment/update/windows-update-troubleshooting.md +++ b/windows/deployment/update/windows-update-troubleshooting.md @@ -162,7 +162,7 @@ Check that your device can access these Windows Update endpoints: - `http://wustat.windows.com` - `http://ntservicepack.microsoft.com` - White these endpoints for future use. + Allow these endpoints for future use. ## Updates aren't downloading from the intranet endpoint (WSUS or Configuration Manager) Windows 10 devices can receive updates from a variety of sources, including Windows Update online, a Windows Server Update Services server, and others. To determine the source of Windows Updates currently being used on a device, follow these steps: From ef4d801f4ae366e6f137ba848d49abde91884b89 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 15 Jun 2020 10:53:44 -0700 Subject: [PATCH 227/228] pushing out a toc fix --- windows/security/threat-protection/TOC.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/windows/security/threat-protection/TOC.md b/windows/security/threat-protection/TOC.md index 76ee1d85a4..b8f3f6b5be 100644 --- a/windows/security/threat-protection/TOC.md +++ b/windows/security/threat-protection/TOC.md @@ -60,7 +60,6 @@ ##### [System integrity](windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md) - #### [Device control]() ##### [Code integrity](device-guard/introduction-to-device-guard-virtualization-based-security-and-windows-defender-application-control.md) ##### [Control USB devices](device-control/control-usb-devices-using-intune.md) @@ -264,7 +263,7 @@ #### [Alerts queue]() ##### [View and organize the Alerts queue](microsoft-defender-atp/alerts-queue.md) -##### [Review alerts](windows/security/threat-protection/microsoft-defender-atp/review-alerts.md) +##### [Review alerts](microsoft-defender-atp/review-alerts.md) ##### [Manage alerts](microsoft-defender-atp/manage-alerts.md) ##### [Investigate alerts](microsoft-defender-atp/investigate-alerts.md) ##### [Investigate files](microsoft-defender-atp/investigate-files.md) From 624d465c86a81147813c79d68e7a1bbd4fe5bc98 Mon Sep 17 00:00:00 2001 From: Dani Halfin Date: Mon, 15 Jun 2020 10:56:23 -0700 Subject: [PATCH 228/228] fixing video --- .../threat-protection/microsoft-defender-atp/review-alerts.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md index 068d302539..4499b07fc0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md +++ b/windows/security/threat-protection/microsoft-defender-atp/review-alerts.md @@ -93,7 +93,7 @@ When making the move to the new alert page you will notice that we have centrali ## Video overview of the new alert page -[!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4yiO5] +> [!VIDEO https://www.microsoft.com/en-us/videoplayer/embed/RE4yiO5] ## Related topics
    ServiceInformation
    Windows Autopilot Deployment ServiceAfter a network connection is in place, each Windows 10 device will contact the Windows Autopilot Deployment Service. With Windows 10 version 1903 and above, the following URLs are used: https://ztd.dds.microsoft.com, https://cs.dds.microsoft.com.
    diff --git a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md index d212b266b1..b062a6e72b 100644 --- a/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md +++ b/windows/security/threat-protection/auditing/appendix-a-security-monitoring-recommendations-for-many-audit-events.md @@ -27,7 +27,7 @@ This document, the [Advanced security audit policy settings](advanced-security-a | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor relevant events for the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor relevant events for the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | Monitor the relevant events for **“Subject\\Security ID”** accounts that are outside the whitelist of accounts. | +| **Account allow list**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | Monitor the relevant events for **“Subject\\Security ID”** accounts that are outside the allow list of accounts. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | Identify events that correspond to the actions you want to monitor, and for those events, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor the specific events for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/audit-security-system-extension.md b/windows/security/threat-protection/auditing/audit-security-system-extension.md index 50dcccadde..8c764f65c4 100644 --- a/windows/security/threat-protection/auditing/audit-security-system-extension.md +++ b/windows/security/threat-protection/auditing/audit-security-system-extension.md @@ -35,9 +35,9 @@ Attempts to install or load security system extensions or services are critical | Computer Type | General Success | General Failure | Stronger Success | Stronger Failure | Comments | |-------------------|-----------------|-----------------|------------------|------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| -| Domain Controller | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should have “SYSTEM” as value for **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Member Server | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | -| Workstation | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring a whitelist of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Domain Controller | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring an allow list of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should have “SYSTEM” as value for **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Member Server | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring an allow list of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | +| Workstation | Yes | No | Yes | No | The main reason why we recommend Success auditing for this subcategory is “[4697](event-4697.md)(S): A service was installed in the system.”
    For other events we strongly recommend monitoring an allow list of allowed security extensions (authenticated packages, logon processes, notification packages, and security packages). Otherwise it's hard to pull useful information from these events, except event 4611 which typically should display “SYSTEM” for the **“Subject”** field.
    This subcategory doesn’t have Failure events, so there is no recommendation to enable Failure auditing for this subcategory. | **Events List:** diff --git a/windows/security/threat-protection/auditing/event-4611.md b/windows/security/threat-protection/auditing/event-4611.md index d245a30f27..6862a8d6a8 100644 --- a/windows/security/threat-protection/auditing/event-4611.md +++ b/windows/security/threat-protection/auditing/event-4611.md @@ -108,7 +108,7 @@ For 4611(S): A trusted logon process has been registered with the Local Security - Because this event is typically triggered by the SYSTEM account, we recommend that you report it whenever **“Subject\\Security ID”** is not SYSTEM. -- Typically this event has an informational purpose. If you defined the list of allowed Logon Processes in the system, then you can check is “**Logon Process Name”** field value in the whitelist or not. +- Typically this event has an informational purpose. If you defined the list of allowed Logon Processes in the system, then you can check is “**Logon Process Name”** field value in the allow list or not. - diff --git a/windows/security/threat-protection/auditing/event-4614.md b/windows/security/threat-protection/auditing/event-4614.md index 8dd6e72adc..f86b22408c 100644 --- a/windows/security/threat-protection/auditing/event-4614.md +++ b/windows/security/threat-protection/auditing/event-4614.md @@ -78,5 +78,5 @@ Each time a system starts, it loads the notification package DLLs from **HKEY\_L For 4614(S): A notification package has been loaded by the Security Account Manager. -- Typically this event has an informational purpose. If you defined the list of allowed Notification Packages in the system, then you can check is “**Notification Package Name”** field value in the whitelist or not. +- Typically this event has an informational purpose. If you defined the list of allowed Notification Packages in the system, then you can check is “**Notification Package Name”** field value in the allow list or not. diff --git a/windows/security/threat-protection/auditing/event-4622.md b/windows/security/threat-protection/auditing/event-4622.md index e425430b75..385f508b09 100644 --- a/windows/security/threat-protection/auditing/event-4622.md +++ b/windows/security/threat-protection/auditing/event-4622.md @@ -100,5 +100,5 @@ These are some Security Package DLLs loaded by default in Windows 10: For 4622(S): A security package has been loaded by the Local Security Authority. -- Typically this event has an informational purpose. If you defined the list of allowed Security Packages in the system, then you can check is “**Security Package Name”** field value in the whitelist or not. +- Typically this event has an informational purpose. If you defined the list of allowed Security Packages in the system, then you can check is “**Security Package Name”** field value in the allow list or not. diff --git a/windows/security/threat-protection/auditing/event-4624.md b/windows/security/threat-protection/auditing/event-4624.md index a7f80d6745..cf8e0d63b8 100644 --- a/windows/security/threat-protection/auditing/event-4624.md +++ b/windows/security/threat-protection/auditing/event-4624.md @@ -277,7 +277,7 @@ For 4624(S): An account was successfully logged on. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“New Logon\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“New Logon\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“New Logon\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“New Logon\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “allow list-only” action, review the **“New Logon\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“New Logon\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“New Logon\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4648.md b/windows/security/threat-protection/auditing/event-4648.md index 97bb3eda59..5a44bd38f1 100644 --- a/windows/security/threat-protection/auditing/event-4648.md +++ b/windows/security/threat-protection/auditing/event-4648.md @@ -178,7 +178,7 @@ The following table is similar to the table in [Appendix A: Security monitoring | **High-value accounts**: You might have high value domain or local accounts for which you need to monitor each action.
    Examples of high value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that correspond to the high value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** and “**Account Whose Credentials Were Used\\Security ID**” (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and “**Account Whose Credentials Were Used\\Security ID**” for accounts that are outside the whitelist. | +| **Account allow list**: You might have a specific allow list of accounts that are allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and “**Account Whose Credentials Were Used\\Security ID**” for accounts that are outside the allow list. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform the action corresponding to this event. | Monitor for the **“Subject\\Account Domain”** or “**Account Whose Credentials Were Used\\Security ID**” corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** or “**Account Whose Credentials Were Used\\Security ID**” that you are concerned about.
    For example, you might monitor to ensure that “**Account Whose Credentials Were Used\\Security ID**” is not used to log on to a certain computer. | | **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** and “**Account Whose Credentials Were Used\\Security ID**” for names that don’t comply with naming conventions. | diff --git a/windows/security/threat-protection/auditing/event-4688.md b/windows/security/threat-protection/auditing/event-4688.md index 94d84a85cf..55ace9419d 100644 --- a/windows/security/threat-protection/auditing/event-4688.md +++ b/windows/security/threat-protection/auditing/event-4688.md @@ -192,7 +192,7 @@ For 4688(S): A new process has been created. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor all events with the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor all events with the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Creator Subject\\Security ID”** and **“Target Subject\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Creator Subject\\Security ID”** and **“Target Subject\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor the specific events for the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Creator Subject\\Security ID”** or **“Target Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4696.md b/windows/security/threat-protection/auditing/event-4696.md index cc31b9e54f..0268cd25a8 100644 --- a/windows/security/threat-protection/auditing/event-4696.md +++ b/windows/security/threat-protection/auditing/event-4696.md @@ -152,7 +152,7 @@ For 4696(S): A primary token was assigned to process. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and **“New Token Information\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** and **“New Token Information\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** or **“New Token Information\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4703.md b/windows/security/threat-protection/auditing/event-4703.md index 5c8f7fcc36..9e2056f25d 100644 --- a/windows/security/threat-protection/auditing/event-4703.md +++ b/windows/security/threat-protection/auditing/event-4703.md @@ -194,7 +194,7 @@ Otherwise, see the recommendations in the following table. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\Security ID**” that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. Also check the “**Target Account\\Security ID**” and **“Enabled Privileges”** to see what was enabled. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. Also check the “**Target Account\\Security ID**” and **“Enabled Privileges”** to see what was enabled. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about.
    Also check **“Target Account\\Security ID”** to see whether the change in privileges should be made on that computer for that account. | diff --git a/windows/security/threat-protection/auditing/event-4704.md b/windows/security/threat-protection/auditing/event-4704.md index f78b83ef3c..7db8499254 100644 --- a/windows/security/threat-protection/auditing/event-4704.md +++ b/windows/security/threat-protection/auditing/event-4704.md @@ -152,7 +152,7 @@ For 4704(S): A user right was assigned. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\ Account Name**” that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. Also check the “**Target Account\\Account Name**” and **“New Right”** to see what was enabled. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. Also check the “**Target Account\\Account Name**” and **“New Right”** to see what was enabled. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about.
    Also check **“Target Account\\ Account Name”** to see whether the change in rights should be made on that computer for that account. | diff --git a/windows/security/threat-protection/auditing/event-4705.md b/windows/security/threat-protection/auditing/event-4705.md index 09c240e026..a89086caee 100644 --- a/windows/security/threat-protection/auditing/event-4705.md +++ b/windows/security/threat-protection/auditing/event-4705.md @@ -151,7 +151,7 @@ For 4705(S): A user right was removed. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** or “**Target Account\\Account Name**” that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
    If you have specific user rights policies, for example, a whitelist of accounts that can perform certain actions, monitor this event to confirm that it was appropriate that the “**Removed Right**” was removed from “**Target** **Account\\Account Name**.” | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list.
    If you have specific user rights policies, for example, an allow list of accounts that can perform certain actions, monitor this event to confirm that it was appropriate that the “**Removed Right**” was removed from “**Target** **Account\\Account Name**.” | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Target Account\\Account Name”** to see whether the account type is as expected.
    For example, if some accounts have critical user rights which should never be removed, monitor this event for the **“Target** **Account\\Account Name”** and the appropriate rights.
    As another example, if non-administrative accounts should never be granted certain user rights (for example, **SeAuditPrivilege**), you might monitor this event, because a right can be removed only after it was previously granted. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Target Account\\Account Name**” to see whether user rights should be removed from that account (or whether that account should have any rights on that computer).
    For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Removed Right**” should be removed from “**Target** **Account\\Account Name**” in each case. | diff --git a/windows/security/threat-protection/auditing/event-4717.md b/windows/security/threat-protection/auditing/event-4717.md index 13f2c744aa..ffe87e87e0 100644 --- a/windows/security/threat-protection/auditing/event-4717.md +++ b/windows/security/threat-protection/auditing/event-4717.md @@ -126,7 +126,7 @@ For 4717(S): System security access was granted to an account. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
    If you have specific user logon rights policies, for example, a whitelist of accounts that can log on to certain computers, monitor this event to confirm that any “**Access Right**” was granted only to the appropriate “**Account Modified\\Account Name**.” | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list.
    If you have specific user logon rights policies, for example, an allow list of accounts that can log on to certain computers, monitor this event to confirm that any “**Access Right**” was granted only to the appropriate “**Account Modified\\Account Name**.” | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** to see whether the account type is as expected.
    For example, if non-service accounts should never be granted certain logon rights (for example, **SeServiceLogonRight**), monitor this event for those accounts and rights. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Account Modified\\Account Name**” to see whether logon rights should be granted to that account.
    For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Access Right**” should be granted to “**Account Modified\\Account Name**” in each case. | diff --git a/windows/security/threat-protection/auditing/event-4718.md b/windows/security/threat-protection/auditing/event-4718.md index 9bb398d835..ecef74c71a 100644 --- a/windows/security/threat-protection/auditing/event-4718.md +++ b/windows/security/threat-protection/auditing/event-4718.md @@ -126,7 +126,7 @@ For 4718(S): System security access was removed from an account. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist.
    If you have specific user logon rights policies, for example, a whitelist of accounts that can log on to certain computers, monitor this event to confirm that it was appropriate that the “**Access Right**” was removed from “**Account Modified\\Account Name**.” | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list.
    If you have specific user logon rights policies, for example, an allow list of accounts that can log on to certain computers, monitor this event to confirm that it was appropriate that the “**Access Right**” was removed from “**Account Modified\\Account Name**.” | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** and “**Account Modified\\Account Name”** to see whether the account type is as expected.
    For example, if critical remote network service accounts have user logon rights which should never be removed (for example, **SeNetworkLogonRight**), monitor this event for the **“Account Modified\\Account Name”** and the appropriate rights.
    As another example, if non-service accounts should never be granted certain logon rights (for example, **SeServiceLogonRight**), you might monitor this event, because a right can be removed only after it was previously granted. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should perform only limited actions, or no actions at all. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. Also be sure to check “**Account Modified\\Account Name**” to see whether logon rights should be removed from that account.
    For high-value servers or other computers, we recommend that you track this event and investigate whether the specific “**Access Right**” should be removed from “**Account Modified\\Account Name**” in each case. | diff --git a/windows/security/threat-protection/auditing/event-4732.md b/windows/security/threat-protection/auditing/event-4732.md index 511b73b62c..65ba0ae840 100644 --- a/windows/security/threat-protection/auditing/event-4732.md +++ b/windows/security/threat-protection/auditing/event-4732.md @@ -153,7 +153,7 @@ For 4732(S): A member was added to a security-enabled local group. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4733.md b/windows/security/threat-protection/auditing/event-4733.md index e7b90640ec..b970a918bc 100644 --- a/windows/security/threat-protection/auditing/event-4733.md +++ b/windows/security/threat-protection/auditing/event-4733.md @@ -160,7 +160,7 @@ For 4733(S): A member was removed from a security-enabled local group. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4751.md b/windows/security/threat-protection/auditing/event-4751.md index 3d070ae403..e72bc3b3a0 100644 --- a/windows/security/threat-protection/auditing/event-4751.md +++ b/windows/security/threat-protection/auditing/event-4751.md @@ -157,7 +157,7 @@ For 4751(S): A member was added to a security-disabled global group. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4752.md b/windows/security/threat-protection/auditing/event-4752.md index 63d0425219..b1fc1df98f 100644 --- a/windows/security/threat-protection/auditing/event-4752.md +++ b/windows/security/threat-protection/auditing/event-4752.md @@ -148,7 +148,7 @@ For 4752(S): A member was removed from a security-disabled global group. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Security ID”** and **“Member\\Security ID”** that correspond to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Security ID”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Security ID”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Security ID”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4768.md b/windows/security/threat-protection/auditing/event-4768.md index 74e6e22b45..1da086eb93 100644 --- a/windows/security/threat-protection/auditing/event-4768.md +++ b/windows/security/threat-protection/auditing/event-4768.md @@ -304,13 +304,13 @@ For 4768(S, F): A Kerberos authentication ticket (TGT) was requested. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“User ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“User ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“User ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“User ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“User ID”** for accounts that are outside the allow list. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Supplied Realm Name”** corresponding to another domain or “external” location. | | **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**User ID”** for names that don’t comply with naming conventions. | - You can track all [4768](event-4768.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges. -- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4768](event-4768.md) events. If **Client Address** is not from the whitelist, generate the alert. +- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4768](event-4768.md) events. If **Client Address** is not from the allow list, generate the alert. - All **Client Address** = ::1 means local authentication. If you know the list of accounts which should log on to the domain controllers, then you need to monitor for all possible violations, where **Client Address** = ::1 and **Account Name** is not allowed to log on to any domain controller. diff --git a/windows/security/threat-protection/auditing/event-4769.md b/windows/security/threat-protection/auditing/event-4769.md index 199a11849a..64f7bf4503 100644 --- a/windows/security/threat-protection/auditing/event-4769.md +++ b/windows/security/threat-protection/auditing/event-4769.md @@ -280,9 +280,9 @@ For 4769(S, F): A Kerberos service ticket was requested. - You can track all [4769](event-4769.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges. -- If you know that **Account Name** should be able to request tickets (should be used) only from a known whitelist of IP addresses, track all **Client Address** values for this **Account Name** in [4769](event-4769.md) events. If **Client Address** is not from your whitelist of IP addresses, generate the alert. +- If you know that **Account Name** should be able to request tickets (should be used) only from a known allow list of IP addresses, track all **Client Address** values for this **Account Name** in [4769](event-4769.md) events. If **Client Address** is not from your allow list of IP addresses, generate the alert. -- All **Client Address** = ::1 means local TGS requests, which means that the **Account Name** logged on to a domain controller before making the TGS request. If you have a whitelist of accounts allowed to log on to domain controllers, monitor events with **Client Address** = ::1 and any **Account Name** outside the whitelist. +- All **Client Address** = ::1 means local TGS requests, which means that the **Account Name** logged on to a domain controller before making the TGS request. If you have an allow list of accounts allowed to log on to domain controllers, monitor events with **Client Address** = ::1 and any **Account Name** outside the allow list. - All [4769](event-4769.md) events with **Client Port** field value > 0 and < 1024 should be examined, because a well-known port was used for outbound connection. diff --git a/windows/security/threat-protection/auditing/event-4771.md b/windows/security/threat-protection/auditing/event-4771.md index f97c972551..b099911afd 100644 --- a/windows/security/threat-protection/auditing/event-4771.md +++ b/windows/security/threat-protection/auditing/event-4771.md @@ -208,12 +208,12 @@ For 4771(F): Kerberos pre-authentication failed. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Security ID”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Security ID”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Security ID”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Security ID”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Security ID”** for accounts that are outside the allow list. | | **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Subject\\Account Name”** for names that don’t comply with naming conventions. | - You can track all [4771](event-4771.md) events where the **Client Address** is not from your internal IP range or not from private IP ranges. -- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4771](event-4771.md) events. If **Client Address** is not from the whitelist, generate the alert. +- If you know that **Account Name** should be used only from known list of IP addresses, track all **Client Address** values for this **Account Name** in [4771](event-4771.md) events. If **Client Address** is not from the allow list, generate the alert. - All **Client Address** = ::1 means local authentication. If you know the list of accounts which should log on to the domain controllers, then you need to monitor for all possible violations, where **Client Address** = ::1 and **Account Name** is not allowed to log on to any domain controller. diff --git a/windows/security/threat-protection/auditing/event-4776.md b/windows/security/threat-protection/auditing/event-4776.md index 895d43226c..2e759dcb4e 100644 --- a/windows/security/threat-protection/auditing/event-4776.md +++ b/windows/security/threat-protection/auditing/event-4776.md @@ -129,7 +129,7 @@ For 4776(S, F): The computer attempted to validate the credentials for an accoun | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Logon Account”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Logon Account”** value (with other information) to monitor how or when a particular account is being used.
    To monitor activity of specific user accounts outside of working hours, monitor the appropriate **Logon Account + Source Workstation** pairs. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Logon Account”** that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Logon Account”** for accounts that are outside the whitelist. | +| **Account allow list**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Logon Account”** for accounts that are outside the allow list. | | **Restricted-use computers**: You might have certain computers from which certain people (accounts) should not log on. | Monitor the target **Source Workstation** for credential validation requests from the **“Logon Account”** that you are concerned about. | | **Account naming conventions**: Your organization might have specific naming conventions for account names. | Monitor “**Logon Account”** for names that don’t comply with naming conventions. | diff --git a/windows/security/threat-protection/auditing/event-4778.md b/windows/security/threat-protection/auditing/event-4778.md index 92d5783c67..265b39dbcf 100644 --- a/windows/security/threat-protection/auditing/event-4778.md +++ b/windows/security/threat-protection/auditing/event-4778.md @@ -126,7 +126,7 @@ For 4778(S): A session was reconnected to a Window Station. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Account Name”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the whitelist. | +| **Account allow list**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the allow list. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Account Name”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Account Name”** that you are concerned about. | diff --git a/windows/security/threat-protection/auditing/event-4779.md b/windows/security/threat-protection/auditing/event-4779.md index a5a3de2a56..bd733289bb 100644 --- a/windows/security/threat-protection/auditing/event-4779.md +++ b/windows/security/threat-protection/auditing/event-4779.md @@ -130,7 +130,7 @@ For 4779(S): A session was disconnected from a Window Station. | **High-value accounts**: You might have high-value domain or local accounts for which you need to monitor each action.
    Examples of high-value accounts are database administrators, built-in local administrator account, domain administrators, service accounts, domain controller accounts and so on. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the high-value account or accounts. | | **Anomalies or malicious actions**: You might have specific requirements for detecting anomalies or monitoring potential malicious actions. For example, you might need to monitor for use of an account outside of working hours. | When you monitor for anomalies or malicious actions, use the **“Subject\\Account Name”** (with other information) to monitor how or when a particular account is being used. | | **Non-active accounts**: You might have non-active, disabled, or guest accounts, or other accounts that should never be used. | Monitor this event with the **“Subject\\Account Name”** that corresponds to the accounts that should never be used. | -| **Account whitelist**: You might have a specific whitelist of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the whitelist. | +| **Account whitelist**: You might have a specific allow list of accounts that are the only ones allowed to perform actions corresponding to particular events. | If this event corresponds to a “whitelist-only” action, review the **“Subject\\Account Name”** for accounts that are outside the whitelist. | | **Accounts of different types**: You might want to ensure that certain actions are performed only by certain account types, for example, local or domain account, machine or user account, vendor or employee account, and so on. | If this event corresponds to an action you want to monitor for certain account types, review the **“Subject\\Account Name”** to see whether the account type is as expected. | | **External accounts**: You might be monitoring accounts from another domain, or “external” accounts that are not allowed to perform certain actions (represented by certain specific events). | Monitor this event for the **“Subject\\Account Domain”** corresponding to accounts from another domain or “external” accounts. | | **Restricted-use computers or devices**: You might have certain computers, machines, or devices on which certain people (accounts) should not typically perform any actions.
    For example, you might have computers to which connections should not be made from certain accounts or addresses. | Monitor the target **Computer:** (or other target device) for actions performed by the **“Subject\\Account Name”** that you are concerned about.
    If you have a target **Computer:** (or other target device) to which connections should not be made from certain accounts or addresses, monitor this event for the corresponding **Client Name** or **Client Address**. | diff --git a/windows/security/threat-protection/auditing/event-5152.md b/windows/security/threat-protection/auditing/event-5152.md index e2b46de2c3..a13a14a7de 100644 --- a/windows/security/threat-protection/auditing/event-5152.md +++ b/windows/security/threat-protection/auditing/event-5152.md @@ -180,7 +180,7 @@ For 5152(F): The Windows Filtering Platform blocked a packet. - If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.” -- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in **“Destination Address”** that are not in the whitelist. +- If you have an allow list of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in **“Destination Address”** that are not in the allow list. - If you need to monitor all inbound connections to a specific local port, monitor for [5152](event-5152.md) events with that “**Source Port**.**”** diff --git a/windows/security/threat-protection/auditing/event-5156.md b/windows/security/threat-protection/auditing/event-5156.md index cdfc758875..6a97371b47 100644 --- a/windows/security/threat-protection/auditing/event-5156.md +++ b/windows/security/threat-protection/auditing/event-5156.md @@ -180,7 +180,7 @@ For 5156(S): The Windows Filtering Platform has permitted a connection. - If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.**”** -- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the whitelist. +- If you have an allow list of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the allow list. - If you need to monitor all inbound connections to a specific local port, monitor for [5156](event-5156.md) events with that “**Source Port**.**”** diff --git a/windows/security/threat-protection/auditing/event-5157.md b/windows/security/threat-protection/auditing/event-5157.md index 76a8a34a2d..f35e1cf804 100644 --- a/windows/security/threat-protection/auditing/event-5157.md +++ b/windows/security/threat-protection/auditing/event-5157.md @@ -180,7 +180,7 @@ For 5157(F): The Windows Filtering Platform has blocked a connection. - If you know that the computer should never contact or be contacted by certain network IP addresses, monitor for these addresses in “**Destination Address**.**”** -- If you have a “whitelist” of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the whitelist. +- If you have an allow list of IP addresses that the computer or device is expected to contact or be contacted by, monitor for IP addresses in “**Destination Address”** that are not in the allow list. - If you need to monitor all inbound connections to a specific local port, monitor for [5157](event-5157.md) events with that “**Source Port**.**”** diff --git a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md index db0d9fed09..2a7c5b7895 100644 --- a/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md +++ b/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus.md @@ -62,7 +62,7 @@ Because your protection is a cloud service, computers must have access to the in ## Validate connections between your network and the cloud -After whitelisting the URLs listed above, you can test if you are connected to the Microsoft Defender Antivirus cloud service and are correctly reporting and receiving information to ensure you are fully protected. +After allowing the URLs listed above, you can test if you are connected to the Microsoft Defender Antivirus cloud service and are correctly reporting and receiving information to ensure you are fully protected. **Use the cmdline tool to validate cloud-delivered protection:** diff --git a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md index ab87a6d7f1..7f7ce8196d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md +++ b/windows/security/threat-protection/microsoft-defender-atp/configure-mssp-support.md @@ -159,7 +159,7 @@ Step 1: Create a third-party application Step 2: Get access and refresh tokens from your customer's tenant -Step 3: Whitelist your application on Microsoft Defender Security Center +Step 3: allow your application on Microsoft Defender Security Center @@ -279,11 +279,11 @@ After providing your credentials, you'll need to grant consent to the applicatio 8. In the PowerShell window, you'll receive an access token and a refresh token. Save the refresh token to configure your SIEM connector. -### Step 3: Whitelist your application on Microsoft Defender Security Center -You'll need to whitelist the application you created in Microsoft Defender Security Center. +### Step 3: Allow your application on Microsoft Defender Security Center +You'll need to allow the application you created in Microsoft Defender Security Center. -You'll need to have **Manage portal system settings** permission to whitelist the application. Otherwise, you'll need to request your customer to whitelist the application for you. +You'll need to have **Manage portal system settings** permission to allow the application. Otherwise, you'll need to request your customer to allow the application for you. 1. Go to `https://securitycenter.windows.com?tid=` (replace \ with the customer's tenant ID. diff --git a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md index d33c9a2195..0f087e2e04 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/controlled-folders.md @@ -37,7 +37,7 @@ Controlled folder access is especially useful in helping to protect your documen With Controlled folder access in place, a notification will appear on the computer where the app attempted to make changes to a protected folder. You can [customize the notification](customize-attack-surface-reduction.md#customize-the-notification) with your company details and contact information. You can also enable the rules individually to customize what techniques the feature monitors. -The protected folders include common system folders, and you can [add additional folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow or whitelist apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. +The protected folders include common system folders, and you can [add additional folders](customize-controlled-folders.md#protect-additional-folders). You can also [allow apps](customize-controlled-folders.md#allow-specific-apps-to-make-changes-to-controlled-folders) to give them access to the protected folders. You can use [audit mode](audit-windows-defender.md) to evaluate how controlled folder access would impact your organization if it were enabled. You can also visit the Windows Defender Testground website at [demo.wd.microsoft.com](https://demo.wd.microsoft.com?ocid=cx-wddocs-testground) to confirm the feature is working and see how it works. diff --git a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md index 858060526b..7853dd9b56 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md +++ b/windows/security/threat-protection/microsoft-defender-atp/customize-controlled-folders.md @@ -1,7 +1,7 @@ --- title: Add additional folders and apps to be protected -description: Add additional folders that should be protected by Controlled folder access, or whitelist apps that are incorrectly blocking changes to important files. -keywords: Controlled folder access, windows 10, windows defender, ransomware, protect, files, folders, customize, add folder, add app, whitelist, add executable +description: Add additional folders that should be protected by Controlled folder access, or allow apps that are incorrectly blocking changes to important files. +keywords: Controlled folder access, windows 10, windows defender, ransomware, protect, files, folders, customize, add folder, add app, allow, add executable search.product: eADQiWindows 10XVcnh ms.pagetype: security ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-intune.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-intune.md index cf50d3ac04..d892904b96 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-intune.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-intune.md @@ -207,7 +207,7 @@ You may now enroll more devices. You can also enroll them later, after you have ``` -9. To whitelist Defender and Auto Update for displaying notifications in UI on macOS 10.15 (Catalina), import the following .mobileconfig as a custom payload: +9. To allow Defender and Auto Update for displaying notifications in UI on macOS 10.15 (Catalina), import the following .mobileconfig as a custom payload: ```xml diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md index d67b31e398..05fc7da212 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-install-with-other-mdm.md @@ -72,7 +72,7 @@ MDM uses it to deploy the settings file to **/Library/Managed Preferences/com.mi ### Kernel extension policy -Set up a KEXT or kernel extension policy. Use team identifier **UBF8T346G9** to whitelist kernel extensions provided by Microsoft. +Set up a KEXT or kernel extension policy. Use team identifier **UBF8T346G9** to allow kernel extensions provided by Microsoft. ## Check installation status diff --git a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md index b1deb73638..3613ce2eb0 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md +++ b/windows/security/threat-protection/microsoft-defender-atp/mac-whatsnew.md @@ -24,7 +24,7 @@ ms.topic: conceptual > > In the meantime, starting with macOS Catalina update 10.15.4, Apple introduced a user facing *Legacy System Extension* warning to signal applications that rely on kernel extensions. > -> If you have previously whitelisted the kernel extension as part of your remote deployment, that warning should not be presented to the end user. If you have not previously deployed a policy to whitelist the kernel extension, your users will be presented with the warning. To proactively silence the warning, you can still deploy a configuration to whitelist the kernel extension. Refer to the instructions in the [JAMF-based deployment](mac-install-with-jamf.md#approved-kernel-extension) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics. +> If you have previously allowed the kernel extension as part of your remote deployment, that warning should not be presented to the end user. If you have not previously deployed a policy to allow the kernel extension, your users will be presented with the warning. To proactively silence the warning, you can still deploy a configuration to allow the kernel extension. Refer to the instructions in the [JAMF-based deployment](mac-install-with-jamf.md#approved-kernel-extension) and [Microsoft Intune-based deployment](mac-install-with-intune.md#create-system-configuration-profiles) topics. ## 101.00.31 diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md index 04299aa29c..a0dcdc9364 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-automation-folder-exclusions.md @@ -1,7 +1,7 @@ --- title: Manage automation folder exclusions description: Add automation folder exclusions to control the files that are excluded from an automated investigation. -keywords: manage, automation, exclusion, whitelist, blacklist, block, clean, malicious +keywords: manage, automation, exclusion, block, clean, malicious search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md index c2f2dd8964..328f88b28d 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md +++ b/windows/security/threat-protection/microsoft-defender-atp/manage-indicators.md @@ -2,7 +2,7 @@ title: Manage indicators ms.reviewer: description: Create indicators for a file hash, IP address, URLs, or domains that define the detection, prevention, and exclusion of entities. -keywords: manage, allowed, blocked, whitelist, blacklist, block, clean, malicious, file hash, ip address, urls, domain +keywords: manage, allowed, blocked, block, clean, malicious, file hash, ip address, urls, domain search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 diff --git a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md index fc6cb7176a..ebad60bf6b 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md +++ b/windows/security/threat-protection/microsoft-defender-atp/production-deployment.md @@ -140,12 +140,12 @@ the following discovery methods: If a Transparent proxy or WPAD has been implemented in the network topology, there is no need for special configuration settings. For more information on Microsoft Defender ATP URL exclusions in the proxy, see the -Appendix section in this document for the URLs Whitelisting or on +Appendix section in this document for the URLs allow list or on [Microsoft Docs](https://docs.microsoft.com/windows/security/threat-protection/windows-defender-atp/configure-proxy-internet-windows-defender-advanced-threat-protection#enable-access-to-windows-defender-atp-service-urls-in-the-proxy-server). > [!NOTE] -> For a detailed list of URLs that need to be whitelisted, please see [this article](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus). +> For a detailed list of URLs that need to be allowed, please see [this article](https://docs.microsoft.com/windows/security/threat-protection/microsoft-defender-antivirus/configure-network-connections-microsoft-defender-antivirus). **Manual static proxy configuration:** diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md index ea417b545a..965b186fad 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-mdatp.md @@ -1,7 +1,7 @@ --- title: Troubleshoot Microsoft Defender Advanced Threat Protection service issues description: Find solutions and work arounds to known issues such as server errors when trying to access the service. -keywords: troubleshoot Microsoft Defender Advanced Threat Protection, troubleshoot Windows ATP, server error, access denied, invalid credentials, no data, dashboard portal, whitelist, event viewer +keywords: troubleshoot Microsoft Defender Advanced Threat Protection, troubleshoot Windows ATP, server error, access denied, invalid credentials, no data, dashboard portal, allow, event viewer search.product: eADQiWindows 10XVcnh search.appverid: met150 ms.prod: w10 @@ -28,7 +28,7 @@ Configure your browser to allow cookies. ## Elements or data missing on the portal If some UI elements or data is missing on Microsoft Defender Security Center it’s possible that proxy settings are blocking it. -Make sure that `*.securitycenter.windows.com` is included the proxy whitelist. +Make sure that `*.securitycenter.windows.com` is included the proxy allow list. > [!NOTE] diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md index 12ce265639..b435c4b723 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-np.md @@ -74,7 +74,7 @@ If you've tested the feature with the demo site and with audit mode, and network ## Exclude website from network protection scope -To whitelist the website that is being blocked (false positive), add its URL to the [list of trusted sites](https://blogs.msdn.microsoft.com/asiatech/2014/08/19/how-to-add-web-sites-to-trusted-sites-via-gpo-from-dc-installed-ie10-or-higher-ie-version/). Web resources from this list bypass the network protection check. +To allow the website that is being blocked (false positive), add its URL to the [list of trusted sites](https://blogs.msdn.microsoft.com/asiatech/2014/08/19/how-to-add-web-sites-to-trusted-sites-via-gpo-from-dc-installed-ie10-or-higher-ie-version/). Web resources from this list bypass the network protection check. ## Collect diagnostic data for file submissions diff --git a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md index 0628b4a46e..17903652ed 100644 --- a/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md +++ b/windows/security/threat-protection/microsoft-defender-atp/troubleshoot-onboarding-error-messages.md @@ -69,11 +69,11 @@ If the portal dashboard, and other sections show an error message such as "Data ![Image of data currently isn't available](images/atp-data-not-available.png) -You'll need to whitelist the `securitycenter.windows.com` and all sub-domains under it. For example `*.securitycenter.windows.com`. +You'll need to allow the `securitycenter.windows.com` and all sub-domains under it. For example `*.securitycenter.windows.com`. ## Portal communication issues -If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are whitelisted and open for communication. +If you encounter issues with accessing the portal, missing data, or restricted access to portions of the portal, you'll need to verify that the following URLs are allowed and open for communication. - `*.blob.core.windows.net crl.microsoft.com` diff --git a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md index 6356278506..15bf8bc91c 100644 --- a/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md +++ b/windows/security/threat-protection/overview-of-threat-mitigations-in-windows-10.md @@ -60,7 +60,7 @@ Windows 10 mitigations that you can configure are listed in the following two ta | **Windows Defender SmartScreen**
    helps prevent
    malicious applications
    from being downloaded | Windows Defender SmartScreen can check the reputation of a downloaded application by using a service that Microsoft maintains. The first time a user runs an app that originates from the Internet (even if the user copied it from another PC), SmartScreen checks to see if the app lacks a reputation or is known to be malicious, and responds accordingly.

    **More information**: [Windows Defender SmartScreen](#windows-defender-smartscreen), later in this topic | | **Credential Guard**
    helps keep attackers
    from gaining access through
    Pass-the-Hash or
    Pass-the-Ticket attacks | Credential Guard uses virtualization-based security to isolate secrets, such as NTLM password hashes and Kerberos Ticket Granting Tickets, so that only privileged system software can access them.
    Credential Guard is included in Windows 10 Enterprise and Windows Server 2016.

    **More information**: [Protect derived domain credentials with Credential Guard](/windows/access-protection/credential-guard/credential-guard) | | **Enterprise certificate pinning**
    helps prevent
    man-in-the-middle attacks
    that leverage PKI | Enterprise certificate pinning enables you to protect your internal domain names from chaining to unwanted certificates or to fraudulently issued certificates. With enterprise certificate pinning, you can "pin" (associate) an X.509 certificate and its public key to its Certification Authority, either root or leaf.

    **More information**: [Enterprise Certificate Pinning](/windows/access-protection/enterprise-certificate-pinning) | -| **Device Guard**
    helps keep a device
    from running malware or
    other untrusted apps | Device Guard includes a Code Integrity policy that you create; a whitelist of trusted apps—the only apps allowed to run in your organization. Device Guard also includes a powerful system mitigation called hypervisor-protected code integrity (HVCI), which leverages virtualization-based security (VBS) to protect Windows' kernel-mode code integrity validation process. HVCI has specific hardware requirements, and works with Code Integrity policies to help stop attacks even if they gain access to the kernel.
    Device Guard is included in Windows 10 Enterprise and Windows Server 2016.

    **More information**: [Introduction to Device Guard](/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies) | +| **Device Guard**
    helps keep a device
    from running malware or
    other untrusted apps | Device Guard includes a Code Integrity policy that you create; an allowlist of trusted apps—the only apps allowed to run in your organization. Device Guard also includes a powerful system mitigation called hypervisor-protected code integrity (HVCI), which leverages virtualization-based security (VBS) to protect Windows' kernel-mode code integrity validation process. HVCI has specific hardware requirements, and works with Code Integrity policies to help stop attacks even if they gain access to the kernel.
    Device Guard is included in Windows 10 Enterprise and Windows Server 2016.

    **More information**: [Introduction to Device Guard](/windows/device-security/device-guard/introduction-to-device-guard-virtualization-based-security-and-code-integrity-policies) | | **Microsoft Defender Antivirus**,
    which helps keep devices
    free of viruses and other
    malware | Windows 10 includes Microsoft Defender Antivirus, a robust inbox antimalware solution. Microsoft Defender Antivirus has been significantly improved since it was introduced in Windows 8.

    **More information**: [Microsoft Defender Antivirus](#microsoft-defender-antivirus), later in this topic | | **Blocking of untrusted fonts**
    helps prevent fonts
    from being used in
    elevation-of-privilege attacks | Block Untrusted Fonts is a setting that allows you to prevent users from loading fonts that are "untrusted" onto your network, which can mitigate elevation-of-privilege attacks associated with the parsing of font files. However, as of Windows 10, version 1703, this mitigation is less important, because font parsing is isolated in an [AppContainer sandbox](https://docs.microsoft.com/windows/win32/secauthz/appcontainer-isolation) (for a list describing this and other kernel pool protections, see [Kernel pool protections](#kernel-pool-protections), later in this topic).

    **More information**: [Block untrusted fonts in an enterprise](/windows/threat-protection/block-untrusted-fonts-in-enterprise) | | **Memory protections**
    help prevent malware
    from using memory manipulation
    techniques such as buffer
    overruns | These mitigations, listed in [Table 2](#table-2), help to protect against memory-based attacks, where malware or other code manipulates memory to gain control of a system (for example, malware that attempts to use buffer overruns to inject malicious executable code into memory. Note:
    A subset of apps will not be able to run if some of these mitigations are set to their most restrictive settings. Testing can help you maximize protection while still allowing these apps to run.

    **More information**: [Table 2](#table-2), later in this topic | diff --git a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md index 69291f7a17..da3aea58e5 100644 --- a/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md +++ b/windows/security/threat-protection/use-windows-event-forwarding-to-assist-in-intrusion-detection.md @@ -174,7 +174,7 @@ To gain the most value out of the baseline subscription we recommend to have the - Apply a security audit policy that is a super-set of the recommended minimum audit policy. For more info, see [Appendix A – Minimum Recommended minimum Audit Policy](#bkmk-appendixa). This ensures that the security event log is generating the required events. - Apply at least an Audit-Only AppLocker policy to devices. - - If you are already whitelisting or blacklisting events by using AppLocker, then this requirement is met. + - If you are already allowing or restricting events by using AppLocker, then this requirement is met. - AppLocker events contain extremely useful information, such as file hash and digital signature information for executables and scripts. - Enable disabled event channels and set the minimum size for modern event files. diff --git a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md index 4ead268500..a7254e397b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md +++ b/windows/security/threat-protection/windows-defender-application-control/LOB-win32-apps-on-s.md @@ -1,7 +1,7 @@ --- title: Allow LOB Win32 Apps on Intune-Managed S Mode Devices (Windows 10) description: Using WDAC supplemental policies, you can expand the S mode base policy on your Intune-managed devices. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md index 7591c17136..fd016ed909 100644 --- a/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/allow-com-object-registration-in-windows-defender-application-control-policy.md @@ -1,7 +1,7 @@ --- title: Allow COM object registration in a WDAC policy (Windows 10) description: You can allow COM object registration in a Windows Defender Application Control policy. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md index 8f28ada884..c5f703e0aa 100644 --- a/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/audit-windows-defender-application-control-policies.md @@ -1,7 +1,7 @@ --- title: Audit Windows Defender Application Control policies (Windows 10) description: Audits allow admins to discover apps that were missed during an initial policy scan and to identify new apps that were installed since the policy was created. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md index e07be3cc57..a7e35f839e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-code-signing-cert-for-windows-defender-application-control.md @@ -1,7 +1,7 @@ --- title: Create a code signing cert for Windows Defender Application Control (Windows 10) description: Learn how to set up a publicly-issued code signing certificate, so you can sign catalog files or WDAC policies internally. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md index 1a27567a27..077d800cdc 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-initial-default-policy.md @@ -1,7 +1,7 @@ --- title: Create a WDAC policy for fixed-workload devices using a reference computer (Windows 10) description: To create a Windows Defender Application Control (WDAC) policy for fixed-workload devices within your organization, follow this guide. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy @@ -66,7 +66,7 @@ To create a WDAC policy, copy each of the following commands into an elevated Wi > [!Note] > - > - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the WDAC policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the whitelist will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Windows Defender Application Control. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application. + > - When you specify the **-UserPEs** parameter (to include user mode executables in the scan), rule option **0 Enabled:UMCI** is automatically added to the WDAC policy. In contrast, if you do not specify **-UserPEs**, the policy will be empty of user mode executables and will only have rules for kernel mode binaries like drivers, in other words, the allow list will not include applications. If you create such a policy and later add rule option **0 Enabled:UMCI**, all attempts to start applications will cause a response from Windows Defender Application Control. In audit mode, the response is logging an event, and in enforced mode, the response is blocking the application. > - You can add the **-MultiplePolicyFormat** parameter when creating policies which will be deployed to computers which are running Windows build 1903+. For more information about multiple policies, see [Deploy multiple Windows Defender Application Control policies](deploy-multiple-windows-defender-application-control-policies.md). > - You can add the **-Fallback** parameter to catch any applications not discovered using the primary file rule level specified by the **-Level** parameter. For more information about file rule level options, see [Windows Defender Application Control file rule levels](select-types-of-rules-to-create.md). > diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md index 9957c0ae10..8b4a0fa4ff 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-fully-managed-devices.md @@ -1,7 +1,7 @@ --- title: Create a WDAC policy for fully-managed devices (Windows 10) description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. -keywords: whitelisting, security, malware +keywords: security, malware ms.topic: conceptual ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 diff --git a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md index fbee02749f..89cecfc78b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/create-wdac-policy-for-lightly-managed-devices.md @@ -1,7 +1,7 @@ --- title: Create a WDAC policy for lightly-managed devices (Windows 10) description: Windows Defender Application Control restricts which applications users are allowed to run and the code that runs in the system core. -keywords: whitelisting, security, malware +keywords: security, malware ms.topic: conceptual ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md index 1ea8df15e9..3abf426167 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-catalog-files-to-support-windows-defender-application-control.md @@ -1,7 +1,7 @@ --- title: Deploy catalog files to support Windows Defender Application Control (Windows 10) description: Catalog files simplify running unsigned applications in the presence of a Windows Defender Application Control (WDAC) policy. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md index 0fc1b53db9..f4ee690c02 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies.md @@ -1,7 +1,7 @@ --- title: Use multiple Windows Defender Application Control Policies (Windows 10) description: Windows Defender Application Control supports multiple code integrity policies for one device. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-group-policy.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-group-policy.md index 1700437f22..9151364753 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-group-policy.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-group-policy.md @@ -1,7 +1,7 @@ --- title: Deploy WDAC policies via Group Policy (Windows 10) description: Windows Defender Application Control (WDAC) policies can easily be deployed and managed with Group Policy. Learn how by following this step-by-step guide. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md index 2ec54bcba7..651222522b 100644 --- a/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md +++ b/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune.md @@ -1,7 +1,7 @@ --- title: Deploy Windows Defender Application Control (WDAC) policies by using Microsoft Intune (Windows 10) description: You can use Microsoft Intune to configure Windows Defender Application Control (WDAC). Learn how with this step-by-step guide. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md index 31261f15de..b1e6b39844 100644 --- a/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/disable-windows-defender-application-control-policies.md @@ -1,7 +1,7 @@ --- title: Disable Windows Defender Application Control policies (Windows 10) description: This topic covers how to disable unsigned or signed WDAC policies. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md index ea8808ca7f..9d9abf86c3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/enforce-windows-defender-application-control-policies.md @@ -1,7 +1,7 @@ --- title: Enforce Windows Defender Application Control (WDAC) policies (Windows 10) description: Learn how to test a Windows Defender Application Control (WDAC) policy in enforced mode by following these steps in an elevated Windows PowerShell session. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md b/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md index 182c28dedc..965a842f19 100644 --- a/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md +++ b/windows/security/threat-protection/windows-defender-application-control/event-id-explanations.md @@ -1,7 +1,7 @@ --- title: Understanding Application Control events (Windows 10) description: Learn what different Windows Defender Application Control events signify. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md b/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md index 6a84a32f71..293ed79adc 100644 --- a/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/example-wdac-base-policies.md @@ -1,7 +1,7 @@ --- title: Example WDAC base policies (Windows 10) description: When creating a WDAC policy for an organization, start from one of the many available example base policies. -keywords: whitelisting, security, malware +keywords: security, malware ms.topic: article ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 diff --git a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md index d7bdf7e3c3..638d0f40cd 100644 --- a/windows/security/threat-protection/windows-defender-application-control/feature-availability.md +++ b/windows/security/threat-protection/windows-defender-application-control/feature-availability.md @@ -1,7 +1,7 @@ --- title: Feature Availability description: Compare WDAC and AppLocker feature availability. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md index ebb66d445a..0c2cbcf366 100644 --- a/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/manage-packaged-apps-with-windows-defender-application-control.md @@ -1,7 +1,7 @@ --- title: Manage packaged apps with WDAC (Windows 10) description: Packaged apps, also known as Universal Windows apps, allow you to control the entire app by using a single Windows Defender Application Control (WDAC) rule. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md index 6054e9f6bd..8437b48c3c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md +++ b/windows/security/threat-protection/windows-defender-application-control/merge-windows-defender-application-control-policies.md @@ -1,7 +1,7 @@ --- title: Merge Windows Defender Application Control policies (Windows 10) description: Because each computer running Windows 10 can have only one WDAC policy, you will occasionally need to merge two or more policies. Learn how with this guide. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md index 8e442a2a0f..443397ada3 100644 --- a/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md +++ b/windows/security/threat-protection/windows-defender-application-control/microsoft-recommended-block-rules.md @@ -1,7 +1,7 @@ --- title: Microsoft recommended block rules (Windows 10) description: View a list of recommended block rules, based on knowledge shared between Microsoft and the wider security community. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy @@ -26,7 +26,7 @@ ms.date: 04/09/2019 Members of the security community\* continuously collaborate with Microsoft to help protect customers. With the help of their valuable reports, Microsoft has identified a list of valid applications that an attacker could also potentially use to bypass Windows Defender Application Control. -Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent application whitelisting policies, including Windows Defender Application Control: +Unless your use scenarios explicitly require them, Microsoft recommends that you block the following applications. These applications or files can be used by an attacker to circumvent application allow policies, including Windows Defender Application Control: - addinprocess.exe - addinprocess32.exe @@ -53,7 +53,7 @@ Unless your use scenarios explicitly require them, Microsoft recommends that you [1]A vulnerability in bginfo.exe has been fixed in the latest version 4.22. If you use BGInfo, for security, make sure to download and run the latest version here [BGInfo 4.22](https://docs.microsoft.com/sysinternals/downloads/bginfo). Note that BGInfo versions earlier than 4.22 are still vulnerable and should be blocked. -[2]If you are using your reference system in a development context and use msbuild.exe to build managed applications, we recommend that you whitelist msbuild.exe in your code integrity policies. However, if your reference system is an end user device that is not being used in a development context, we recommend that you block msbuild.exe. +[2]If you are using your reference system in a development context and use msbuild.exe to build managed applications, we recommend that you allow msbuild.exe in your code integrity policies. However, if your reference system is an end user device that is not being used in a development context, we recommend that you block msbuild.exe. *Microsoft recognizes the efforts of those in the security community who help us protect customers through responsible vulnerability disclosure, and extends thanks to the following people: diff --git a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md index cccca7a73e..9c6d253b10 100644 --- a/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md +++ b/windows/security/threat-protection/windows-defender-application-control/plan-windows-defender-application-control-management.md @@ -1,7 +1,7 @@ --- title: Plan for WDAC policy management (Windows 10) description: How to plan for Windows Defender Application Control (WDAC) policy management. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md index 74f69040e8..3b0e313266 100644 --- a/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md +++ b/windows/security/threat-protection/windows-defender-application-control/querying-application-control-events-centrally-using-advanced-hunting.md @@ -1,7 +1,7 @@ --- title: Query Application Control events with Advanced Hunting (Windows 10) description: Learn how to query Windows Defender Application Control events across your entire organization by using Advanced Hunting. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md index 5b823d7eeb..e14032719c 100644 --- a/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md +++ b/windows/security/threat-protection/windows-defender-application-control/select-types-of-rules-to-create.md @@ -1,7 +1,7 @@ --- title: Understand WDAC policy rules and file rules (Windows 10) description: Windows Defender Application Control (WDAC) provides control over a computer running Windows 10 by using policies that specify whether a driver or application is trusted and can be run. A policy includes *policy rules* that control options. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md index db8225d362..601d01340e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md +++ b/windows/security/threat-protection/windows-defender-application-control/types-of-devices.md @@ -1,7 +1,7 @@ --- title: Policy creation for common WDAC usage scenarios (Windows 10) description: Develop a plan for deploying Windows Defender Application Control (WDAC) in your organization based on these common scenarios. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md index 54d8ea8492..266e60b744 100644 --- a/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md +++ b/windows/security/threat-protection/windows-defender-application-control/understand-windows-defender-application-control-policy-design-decisions.md @@ -1,7 +1,7 @@ --- title: Understand Windows Defender Application Control policy design decisions (Windows 10) description: Understand Windows Defender Application Control policy design decisions. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md b/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md index da33a878fe..555168716a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-code-signing-to-simplify-application-control-for-classic-windows-applications.md @@ -1,7 +1,7 @@ --- title: Use code signing to simplify application control for classic Windows applications (Windows 10) description: With embedded signing, your WDAC policies typically do not have to be updated when an app is updated. To set this up, you can choose from a variety of methods. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md index 5e852821b5..d050e42b00 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-device-guard-signing-portal-in-microsoft-store-for-business.md @@ -1,7 +1,7 @@ --- title: Use the Device Guard Signing Portal in the Microsoft Store for Business (Windows 10) description: You can sign code integrity policies with the Device Guard signing portal to prevent them from being tampered with after they're deployed. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md b/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md index 7386316a87..5bbcb531fa 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md @@ -1,7 +1,7 @@ --- title: Use signed policies to protect Windows Defender Application Control against tampering (Windows 10) description: Signed WDAC policies give organizations the highest level of malware protection available in Windows 10. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md index 8dfefbb2b5..43cc718d71 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-policy-to-control-specific-plug-ins-add-ins-and-modules.md @@ -1,7 +1,7 @@ --- title: Use a Windows Defender Application Control policy to control specific plug-ins, add-ins, and modules (Windows 10) description: WDAC policies can be used not only to control applications, but also to control whether specific plug-ins, add-ins, and modules can run from specific apps. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.reviewer: manager: dansimp diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md index 90585fe7cb..5490ef7a77 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-dynamic-code-security.md @@ -1,7 +1,7 @@ --- title: Windows Defender Application Control and .NET Hardening (Windows 10) description: Dynamic Code Security is an application control feature that can verify code loaded by .NET at runtime. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md index 09a7320fa3..7705229827 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-intelligent-security-graph.md @@ -1,7 +1,7 @@ --- title: Authorize reputable apps with the Intelligent Security Graph (ISG) (Windows 10) description: Automatically authorize applications that Microsoft’s ISG recognizes as having known good reputation. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer.md b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer.md index 675381d926..8ad3ce6f98 100644 --- a/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer.md +++ b/windows/security/threat-protection/windows-defender-application-control/use-windows-defender-application-control-with-managed-installer.md @@ -1,7 +1,7 @@ --- title: Authorize apps deployed with a WDAC managed installer (Windows 10) description: Explains how you can use a managed installer to automatically authorize applications deployed and installed by a designated software distribution solution, such as Microsoft Endpoint Configuration Manager. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy @@ -56,7 +56,7 @@ The identity of the managed installer executable(s) is specified in an AppLocker Currently, neither the AppLocker policy creation UI in GPO Editor nor the PowerShell cmdlets allow for directly specifying rules for the Managed Installer rule collection. However, a text editor can be used to make the simple changes needed to an EXE or DLL rule collection policy to specify Type="ManagedInstaller", so that the new rule can be imported into a GPO. An example of a valid Managed Installer rule collection is shown below. -For more information about creating an AppLocker policy that includes a managed installer and configuring client devices, see [Simplify application whitelisting with Configuration Manager and Windows 10](https://cloudblogs.microsoft.com/enterprisemobility/2016/06/20/configmgr-as-a-managed-installer-with-win10/). +For more information about creating an AppLocker policy that includes a managed installer and configuring client devices, see [Simplify application listing with Configuration Manager and Windows 10](https://cloudblogs.microsoft.com/enterprisemobility/2016/06/20/configmgr-as-a-managed-installer-with-win10/). As mentioned above, the AppLocker CSP for OMA-URI policies does not currently support the Managed Installer rule collection or the Service Enforcement rule extensions mentioned below. diff --git a/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md b/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md index 7a955f8700..73deb5fff0 100644 --- a/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md +++ b/windows/security/threat-protection/windows-defender-application-control/wdac-and-applocker-overview.md @@ -1,7 +1,7 @@ --- title: WDAC and AppLocker Overview description: Compare Windows application control technologies. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md index 9e0b0651d1..0484518b2a 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-deployment-guide.md @@ -1,7 +1,7 @@ --- title: Planning and getting started on the Windows Defender Application Control deployment process (Windows 10) description: Learn how to gather information, create a plan, and begin to test initial code integrity policies for a Windows Defender Application Control deployment. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy @@ -46,7 +46,7 @@ This topic provides a roadmap for planning and getting started on the Windows De Legitimate applications from trusted vendors provide valid functionality. However, an attacker could also potentially use that same functionality to run malicious executable code that could bypass WDAC. - For operational scenarios that require elevated security, certain applications with known Code Integrity bypasses may represent a security risk if you whitelist them in your WDAC policies. Other applications, where older versions of the application had vulnerabilities, also represent a risk. Therefore, you may want to deny or block such applications from your WDAC policies. For applications with vulnerabilities, once the vulnerabilities are fixed you can create a rule that only allows the fixed or newer versions of that application. The decision to allow or block applications depends on the context and on how the reference system is being used. + For operational scenarios that require elevated security, certain applications with known Code Integrity bypasses may represent a security risk if you allow them in your WDAC policies. Other applications, where older versions of the application had vulnerabilities, also represent a risk. Therefore, you may want to deny or block such applications from your WDAC policies. For applications with vulnerabilities, once the vulnerabilities are fixed you can create a rule that only allows the fixed or newer versions of that application. The decision to allow or block applications depends on the context and on how the reference system is being used. Security professionals collaborate with Microsoft continuously to help protect customers. With the help of their valuable reports, Microsoft has identified a list of known applications that an attacker could potentially use to bypass Windows Defender Application Control. Depending on the context, you may want to block these applications. To view this list of applications and for use case examples, such as disabling msbuild.exe, see [Microsoft recommended block rules](microsoft-recommended-block-rules.md). diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md index 66a776eaf6..1d18afd93e 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-design-guide.md @@ -1,7 +1,7 @@ --- title: Windows Defender Application Control design guide (Windows 10) description: Microsoft Windows Defender Application Control allows organizations to control what apps and drivers will run on their managed Windows 10 devices. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md index d3e82010c2..9ee20747b7 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control-operational-guide.md @@ -1,7 +1,7 @@ --- title: Managing and troubleshooting Windows Defender Application Control policies (Windows 10) description: Gather information about how your deployed Windows Defender Application Control policies are behaving. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md index 7f723913e2..e6c525c383 100644 --- a/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md +++ b/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control.md @@ -1,7 +1,7 @@ --- title: Application Control for Windows description: Application Control restricts which applications users are allowed to run and the code that runs in the system core. -keywords: whitelisting, security, malware +keywords: security, malware ms.assetid: 8d6e0474-c475-411b-b095-1c61adb2bdbb ms.prod: w10 ms.mktglfcycl: deploy diff --git a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md index 9c4ca00884..e389280262 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-system-guard/how-hardware-based-root-of-trust-helps-protect-windows.md @@ -37,7 +37,7 @@ This hardware-based root of trust comes from the device’s Secure Boot feature, This technique of measuring the static early boot UEFI components is called the Static Root of Trust for Measurement (SRTM). As there are thousands of PC vendors that produce numerous models with different UEFI BIOS versions, there becomes an incredibly large number of SRTM measurements upon bootup. -Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a blacklist), or a list of known 'good' SRTM measurements (also known as a whitelist). +Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a block list), or a list of known 'good' SRTM measurements (also known as an allow list). Each option has a drawback: - A list of known 'bad' SRTM measurements allows a hacker to change just 1 bit in a component to create an entirely new SRTM hash that needs to be listed. This means that the SRTM flow is inherently brittle - a minor change can invalidate the entire chain of trust. diff --git a/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md b/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md index a17ad45ab9..33b2c4f62e 100644 --- a/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md +++ b/windows/security/threat-protection/windows-defender-system-guard/system-guard-how-hardware-based-root-of-trust-helps-protect-windows.md @@ -38,7 +38,7 @@ This hardware-based root of trust comes from the device’s Secure Boot feature, This technique of measuring the static early boot UEFI components is called the Static Root of Trust for Measurement (SRTM). As there are thousands of PC vendors that produce numerous models with different UEFI BIOS versions, there becomes an incredibly large number of SRTM measurements upon bootup. -Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a blacklist), or a list of known 'good' SRTM measurements (also known as a whitelist). +Two techniques exist to establish trust here—either maintain a list of known 'bad' SRTM measurements (also known as a block list), or a list of known 'good' SRTM measurements (also known as an allow list). Each option has a drawback: - A list of known 'bad' SRTM measurements allows a hacker to change just 1 bit in a component to create an entirely new SRTM hash that needs to be listed. This means that the SRTM flow is inherently brittle - a minor change can invalidate the entire chain of trust. From 23e4d58f6fcb78988a4fda1068b74e3017daf1ea Mon Sep 17 00:00:00 2001 From: Tina Burden Date: Mon, 15 Jun 2020 08:58:13 -0700 Subject: [PATCH 217/228] pencil edits --- devices/surface/manage-surface-driver-and-firmware-updates.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/devices/surface/manage-surface-driver-and-firmware-updates.md b/devices/surface/manage-surface-driver-and-firmware-updates.md index 2bbe968461..39fccb3ec4 100644 --- a/devices/surface/manage-surface-driver-and-firmware-updates.md +++ b/devices/surface/manage-surface-driver-and-firmware-updates.md @@ -142,8 +142,8 @@ This file name provides the following information: ## Learn more - [Download drivers and firmware for Surface](https://support.microsoft.com/help/4023482/surface-download-drivers-and-firmware) -- [How to manage Surface driver updates in Configuration Manager.](https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager) -- [Deploy applications with Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/deploy-applications). +- [How to manage Surface driver updates in Configuration Manager](https://support.microsoft.com/help/4098906/manage-surface-driver-updates-in-configuration-manager) +- [Deploy applications with Configuration Manager](https://docs.microsoft.com/configmgr/apps/deploy-use/deploy-applications) - [Endpoint Configuration Manager documentation](https://docs.microsoft.com/configmgr/) - [Microsoft Deployment Toolkit documentation](https://docs.microsoft.com/configmgr/mdt/) - [Deploy Windows 10 with the Microsoft Deployment Toolkit](https://docs.microsoft.com/windows/deployment/deploy-windows-mdt/deploy-windows-10-with-the-microsoft-deployment-toolkit) From 29be7a044fae08bc374d1d7627df4de70320476d Mon Sep 17 00:00:00 2001 From: Daniel Simpson Date: Mon, 15 Jun 2020 09:35:57 -0700 Subject: [PATCH 218/228] fixing brkn link --- windows/client-management/mdm/applocker-csp.md | 1 - .../mdm/new-in-windows-mdm-enrollment-management.md | 5 ++--- 2 files changed, 2 insertions(+), 4 deletions(-) diff --git a/windows/client-management/mdm/applocker-csp.md b/windows/client-management/mdm/applocker-csp.md index ea7d1567cb..973ba78922 100644 --- a/windows/client-management/mdm/applocker-csp.md +++ b/windows/client-management/mdm/applocker-csp.md @@ -40,7 +40,6 @@ Defines restrictions for applications. Additional information: - [Find publisher and product name of apps](#productname) - step-by-step guide for getting the publisher and product names for various Windows apps. -- [Whitelist example](#whitelist-examples) - example for Windows 10 Mobile that denies all apps except the ones listed. **AppLocker/ApplicationLaunchRestrictions/_Grouping_** Grouping nodes are dynamic nodes, and there may be any number of them for a given enrollment (or a given context). The actual identifiers are selected by the management endpoint, whose job it is to determine what their purpose is, and to not conflict with other identifiers that they define. diff --git a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md index c2b889cfe1..aa8a5bcf89 100644 --- a/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md +++ b/windows/client-management/mdm/new-in-windows-mdm-enrollment-management.md @@ -44,8 +44,7 @@ For details about Microsoft mobile device management protocols for Windows 10 s - [Server-initiated unenrollment failure](#server-initiated-unenrollment-failure) - [Certificates causing issues with Wi-Fi and VPN](#certificates-causing-issues-with-wi-fi-and-vpn) - [Version information for mobile devices](#version-information-for-mobile-devices) - - [Upgrading Windows Phone 8.1 devices with app allow list using ApplicationRestriction policy has issues](#upgrading-windows-phone-81-devices-with-app-whitelisting-using-applicationrestriction-policy-has-issues) - - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) + - [Apps dependent on Microsoft Frameworks may get blocked in phones prior to build 10586.218](#apps-dependent-on-microsoft-frameworks-may-get-blocked-in-phones-prior-to-build-10586218) - [Multiple certificates might cause Wi-Fi connection instabilities in Windows 10 Mobile](#multiple-certificates-might-cause-wi-fi-connection-instabilities-in-windows-10-mobile) - [Remote PIN reset not supported in Azure Active Directory joined mobile devices](#remote-pin-reset-not-supported-in-azure-active-directory-joined-mobile-devices) - [MDM client will immediately check-in with the MDM server after client renews WNS channel URI](#mdm-client-will-immediately-check-in-with-the-mdm-server-after-client-renews-wns-channel-uri) @@ -2946,7 +2945,7 @@ How do I turn if off? | The service can be stopped from the "Services" console o
    AppLocker CSP

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Allow list examples.

    +

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Allow list examples.

    DeviceManageability CSP
    AppLocker CSP

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Allow list examples.

    +

    Added two new SyncML examples (to disable the calendar app and to block usage of the map app) in Allow list examples.

    DeviceManageability CSP

    Manage Windows 10 connection endpoints