From 01acadcab2690fa79ac0b0a9c45df9c4c0c4a2f3 Mon Sep 17 00:00:00 2001
From: Benjamin Flamm <57767769+beflamm@users.noreply.github.com>
Date: Thu, 12 Dec 2024 10:00:49 -0500
Subject: [PATCH 01/13] Learn Editor: Update
apple-settings-catalog-configurations.md
---
.../apple-settings-catalog-configurations.md | 70 +++++++++++++++++--
1 file changed, 65 insertions(+), 5 deletions(-)
diff --git a/memdocs/intune/configuration/apple-settings-catalog-configurations.md b/memdocs/intune/configuration/apple-settings-catalog-configurations.md
index 86f770c4502..2e9c5229a61 100644
--- a/memdocs/intune/configuration/apple-settings-catalog-configurations.md
+++ b/memdocs/intune/configuration/apple-settings-catalog-configurations.md
@@ -78,17 +78,52 @@ Some settings are available in device configuration templates and in the setting
## Apple declarative configurations
This section is specific to the configurations that are under the Declarative Device Management (DDM) category in the settings catalog. You can learn more about DDM at [Intro to declarative device management and Apple devices](https://support.apple.com/guide/deployment/depb1bab77f8/1/web/1.0) on Apple's website.
-
+### Disk Management
+
+Use Disk Management setting to install disk management settings on devices. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Disk Management using the following documentation:
+
+|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation|
+| -------- | -------- | -------- | -------- |
+|[Storage management declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep2b9f009ed/web)|[Disk Management Settings](https://developer.apple.com/documentation/devicemanagement/diskmanagementsettings)|[Disk Management Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/diskmanagement.settings.yaml)||
+
+Known issues
+
+- None
+
+### Math Settings
+
+Use Math Settings to configure the Math and Calculator apps on devices. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Math Settings using the following documentation:
+
+|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation|
+| -------- | -------- | -------- | -------- |
+|[Math and Calculator app declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep7881be3bb/web)|[Math Settings](https://developer.apple.com/documentation/devicemanagement/mathsettings)|[Math Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/math.settings.yaml)||
+
+Known issues
+
+- None
+
### Passcode
Use the passcode configuration to require that devices have a password or passcode that meet your organization's requirements. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Passcode using the following documentation:
-| Apple Platform Guides | Apple Developer | Apple YAML | Intune documentation
+| Apple Platform Guides | Apple Developer | Apple YAML | Intune documentation|
| ------- | ------- | ------- | ------- |
-|
- [Passcodes and passwords](https://support.apple.com/guide/security/sec20230a10d/web)
- [Passcode declarative configuration](https://support.apple.com/guide/deployment/depf72b010a8/1/web/1.0)
| [Passcode](https://developer.apple.com/documentation/devicemanagement/passcode)| [Passcode](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/passcode.settings.yaml)
+| - [Passcodes and passwords](https://support.apple.com/guide/security/sec20230a10d/web)
- [Passcode declarative configuration](https://support.apple.com/guide/deployment/depf72b010a8/1/web/1.0)
| [Passcode](https://developer.apple.com/documentation/devicemanagement/passcode)| [Passcode](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/passcode.settings.yaml)||
#### Known issues
- None
+### Safari Extension Settings
+
+Use the Safari extensions settings to manage extensions in the Safari browser. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Safari Extension Settings using the following documentation:
+
+|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation|
+| -------- | -------- | -------- | -------- |
+|[Safari extensions management declarative configuration](https://support.apple.com/en-tm/guide/deployment/depff7fad9d8/web)|[Safari Extension Settings](https://developer.apple.com/documentation/devicemanagement/safariextensionsettings)|[Safari Extension Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/safari.extensions.settings.yaml)||
+
+Known issues
+
+- None
+
### Software Update
Use the Software Update configuration to enforce an update to install at a specific time. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about this configuration using the following documentation:
@@ -99,6 +134,18 @@ Use the Software Update configuration to enforce an update to install at a speci
#### Known issues
- None
+### Software Update Settings
+
+Use the Software Update Settings configuration to defer OS updates and control how users can manually interact with software updates in System Settings. This configuration is located in the **Declarative Device Management (DDM)** category of the settings catalog. You can learn more about Passcode using the following documentation:
+
+|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation|
+| -------- | -------- | -------- | -------- |
+|[Software Update Settings declarative configuration](https://support.apple.com/en-tm/guide/deployment/dep0578d8b8a/web)|[Software Update Settings](https://developer.apple.com/documentation/devicemanagement/softwareupdatesettings)|[Software Update Settings](https://github.com/apple/device-management/blob/release/declarative/declarations/configurations/softwareupdate.settings.yaml)|[Use the settings catalog to configure managed software updates](../protect/managed-software-updates-ios-macos.md)|
+
+Known issues
+
+- None
+
## Apple MDM payload settings
This section is specific to Apple payloads that use the standard MDM channel. A list of these payloads is available at [Review MDM payloads for Apple devices](https://support.apple.com/guide/deployment/dep5370d089/web) on Apple's website.
@@ -145,7 +192,21 @@ Use the Firewall configuration to manage the native macOS application firewall.
| Apps allowed | Networking > Firewall | Applications (Allowed = True) |
| Apps blocked | Networking > Firewall | Applications (Allowed = False) |
| Enable stealth mode | Networking > Firewall | Enable Stealth Mode |
-
+### Font
+
+> [!NOTE]
+> Font files being uploaded to Intune must be less than 2MB in size.
+
+Use the Font payload to configure fonts on devices. This configuration is located in the **System Configuration** category of the settings catalog. You can learn more about Font using the following documentation:
+
+|Apple Platform Guides|Apple Developer|Apple YAML|Intune documentation|
+| -------- | -------- | -------- | -------- |
+|[Fonts MDM payload settings](https://support.apple.com/en-tm/guide/deployment/depeba084b8/web)|[Font](https://developer.apple.com/documentation/devicemanagement/font)|[Font](https://github.com/apple/device-management/blob/release/mdm/profiles/com.apple.font.yaml)||
+
+Known issues
+
+- None
+
### System Policy Control (Gatekeeper)
Use the System Policy Control payload to configure Gatekeeper settings. This configuration is located in the **System Policy Control** category of the settings catalog. You can learn more about System Policy Control using the following documentation:
@@ -162,7 +223,6 @@ Use the System Policy Control payload to configure Gatekeeper settings. This con
| -------- | ------- | ------- |
| Do not allow user to override Gatekeeper | System Policy Control > System Policy Control | Enable Assessment |
| Allow apps downloaded from these locations | System Policy Control > System Policy Control | Allow Identified Developers |
-
### System Extensions
Use the System Extensions payload to configure system extensions to be automatically loaded or prevent users from approving specific extensions. This configuration is located in the **System Configuration** category of the settings catalog. You can learn more about System Extensions using the following documentation:
From 0ca97ee0fd97663a6158e8972067a371049ddcb1 Mon Sep 17 00:00:00 2001
From: Benjamin Flamm <57767769+beflamm@users.noreply.github.com>
Date: Thu, 12 Dec 2024 10:01:42 -0500
Subject: [PATCH 02/13] Learn Editor: Update
apple-settings-catalog-configurations.md
From 92a1b0ae3a271590fff76de46212d2d54a605f05 Mon Sep 17 00:00:00 2001
From: brenduns
Date: Fri, 13 Dec 2024 10:33:10 -0800
Subject: [PATCH 03/13] Article review and updates
---
.../advanced-threat-protection-configure.md | 198 +++++++++++-------
.../atp-security-center-intune-toggle.png | Bin 21795 -> 53712 bytes
.../onboard-report.png | Bin 79275 -> 0 bytes
.../select-preconfigured-policy.jpg | Bin 0 -> 287708 bytes
4 files changed, 119 insertions(+), 79 deletions(-)
delete mode 100644 memdocs/intune/protect/media/advanced-threat-protection-configure/onboard-report.png
create mode 100644 memdocs/intune/protect/media/advanced-threat-protection-configure/select-preconfigured-policy.jpg
diff --git a/memdocs/intune/protect/advanced-threat-protection-configure.md b/memdocs/intune/protect/advanced-threat-protection-configure.md
index 2db78c2b781..5489ccf3899 100644
--- a/memdocs/intune/protect/advanced-threat-protection-configure.md
+++ b/memdocs/intune/protect/advanced-threat-protection-configure.md
@@ -1,13 +1,13 @@
---
# required metadata
-title: Configure Microsoft Defender for Endpoint in Microsoft Intune
-description: Configure Microsoft Defender for Endpoint in Intune, including connecting to Defender for Endpoint, onboarding devices, assigning compliance for risk levels, and Conditional Access policies.
+title: Configure integration of Microsoft Defender for Endpoint in Microsoft Intune
+description: Integrate Microsoft Defender for Endpoint with Microsoft Intune, including connecting the products, onboarding devices, and assigning policies for compliance and risk level assessment.
keywords: configure, manage, capabilities, attack surface reduction, next-generation protection, security controls, endpoint detection and response, auto investigation and remediation, security controls, controls, microsoft defender for endpoint, mde
author: brenduns
ms.author: brenduns
manager: dougeby
-ms.date: 04/17/2024
+ms.date: 12/13/2024
ms.topic: how-to
ms.service: microsoft-intune
ms.subservice: protect
@@ -31,80 +31,89 @@ ms.collection:
- sub-secure-endpoints
---
-# Configure Microsoft Defender for Endpoint in Intune
+# Connect and configure Microsoft Defender for Endpoint for use with Intune
-Use the information and procedures in this article to configure integration of Microsoft Defender for Endpoint with Intune. Configuration includes the following general steps:
+Use the information and procedures in this article to connect Microsoft Defender for Endpoint with Intune and to then onboard and configure devices for Defender for Endpoint. Information in this article includes the following general steps:
-- **Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection lets Microsoft Defender for Endpoint collect data about machine risk from supported devices you manage with Intune. See the [prerequisites](../protect/advanced-threat-protection.md#prerequisites) to use Microsoft Defender for Endpoint with Intune.
-- **Use Intune policy to onboard devices with Microsoft Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level.
-- **Use Intune device compliance policies to set the level of risk you want to allow**. Microsoft Defender for Endpoint reports a devices risk level. Devices that exceed the allowed risk level are identified as noncompliant.
-- **Use a Conditional Access policy** to block users from accessing corporate resources from devices that are noncompliant.
+- **Establish a service-to-service connection between Intune and Microsoft Defender for Endpoint**. This connection enables Intune to interact with Microsoft Defender on devices, including installation (onboarding) and configuration of the Defender for Endpoint client, and integration of machine risk scores from supported devices you manage with Intune. See the [prerequisites](../protect/advanced-threat-protection.md#prerequisites) to use Microsoft Defender for Endpoint with Intune.
+- **Onboard devices to Defender for Endpoint**. You onboard devices to configure them to communicate with Microsoft Defender for Endpoint and to provide data that helps assess their risk level. Each platform has separate requirements to onboard to Defender.
+- **Use Intune device compliance policies to set the level of risk you want to allow**. Microsoft Defender for Endpoint reports on the risk level of devices. Devices that exceed the allowed risk level are identified as noncompliant.
+- **Use Conditional Access policy** to block users from accessing corporate resources while using a device that is identified as noncompliant.
- **Use** [**app protection policies**](../protect/mtd-app-protection-policy.md) for Android and iOS/iPadOS, to set device risk levels. App protection policies work with both enrolled and unenrolled devices.
-In addition to managing settings for Microsoft Defender for Endpoint on devices that enroll with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called *Security Management for Microsoft Defender for Endpoint* and requires configuring the *Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations* toggle to *On*. For more information, see [MDE Security Configuration Management](../protect/mde-security-integration.md).
+In addition to managing settings for Microsoft Defender for Endpoint on devices that enroll with Intune, you can manage Defender for Endpoint security configurations on devices that aren’t enrolled with Intune. This scenario is called *Security Management for Microsoft Defender for Endpoint* and requires configuring the *Allow Microsoft Defender for Endpoint to enforce Endpoint Security Configurations* toggle to *On*. For more information, see [Microsoft Defender for Endpoint Security Configuration Management](../protect/mde-security-integration.md).
[!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)]
## Connect Microsoft Defender for Endpoint to Intune
-The first step you take is to set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. Set up requires administrative access to both the Microsoft Defender Security Center, and to Intune.
+Before Intune and Defender for Endpoint can work together, you must set up the service-to-service connection between Intune and Microsoft Defender for Endpoint. This is a one-time action per tenant. Setup requires administrative access to both the Microsoft Defender Security Center and the Microsoft Intune admin center.
-You only need to enable Microsoft Defender for Endpoint a single time per tenant.
+### Enable Intune and Microsoft Defender for Endpoint integration
-### To enable Microsoft Defender for Endpoint
+1. Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](https://security.microsoft.com). The Intune admin center also includes a link to the Defender for Endpoint portal.
-Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](https://security.microsoft.com). The Intune admin center also includes a link to the Defender for Endpoint portal.
+ 1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
+ 2. Select **Endpoint security** > **Microsoft Defender for Endpoint** and review the **Connection status** at the top of the page. If it’s **Enabled**, Defender and Intune are already connected and you can skip to step #2.
-2. Select **Endpoint security** > **Microsoft Defender for Endpoint**, and then select **Open the Microsoft Defender Security Center**.
+ If the status is **Unavailable**, continue here.
+ 3. Scroll down to the bottom of the *Microsoft Defender for Endpoint* page and select the link **Open the Microsoft Defender Security Center** to open the Microsoft Defender for portal and continue with the next numbered step.
> [!TIP]
>
- > In the Intune admin center, if the **Connection status** at the top of the Microsoft Defender for Endpoint page is already set to **Enabled**, the connection to Intune is already active and the admin center displays different UI text for the link. In this event, select **Open the Microsoft Defender for Endpoint admin console** to open the Microsoft Defender for portal. Then you can use the guidance in the following step to confirm that the **Microsoft Intune connection** is set to **On**.
+ > If the connection is already active, the link to open the Defender portal reads: **Open the Microsoft Defender for Endpoint admin console**.
:::image type="content" source="./media/advanced-threat-protection-configure/atp-device-compliance-open-microsoft-defender.png" alt-text="Screen shot that shows the patch to open the Microsoft Defender Security Center.":::
-3. In **Microsoft Defender** portal (previously the *Microsoft Defender Security Center*):
- 1. Select [**Settings** > **Endpoints** >**Advanced features**](https://security.microsoft.com/preferences2/integration).
- 2. For **Microsoft Intune connection**, choose **On**:
+2. In [**Microsoft Defender** portal](https://security.microsoft.com/):
+
+ 1. Use the left-hand pane to scroll down and select **Settings** > **Endpoints** >**Advanced features**.
+ 2. On the advanced features pane, scroll down to locate the entry for **Microsoft Intune connection** and set the toggle to **On**.
:::image type="content" source="./media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png" alt-text="Screen shot of the Microsoft Intune connection setting.":::
- 3. Select **Save preferences**.
+ 3. Select **Save preferences** to complete the connection between Intune and Defender for Endpoint.
> [!NOTE]
> Once the connection is established, the services are expected to sync with each other _at least_ once every 24 hours. The number of days without sync until the connection is considered unresponsive is configurable in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431). Select **Endpoint security** > **Microsoft Defender for Endpoint** > **Number of days until partner is unresponsive**
-4. Return to **Microsoft Defender for Endpoint** page in the Microsoft Intune admin center.
+3. Return to **Microsoft Defender for Endpoint** page in the Microsoft Intune admin center where you configure aspects of the Defender for Endpoint integration. The Connection status should now display **Enabled**.
+
+ On this page, review each category and the available configurations for platform support and platforms specific options you plan to use, and set those toggles to **On**. You can return later to enable or disable any of these options.
+
+ To set up the following integrations of Microsoft Defender for Endpoint, your account must be assigned an Intune [role-based access control]( /mem/intune/fundamentals/role-based-access-control) (RBAC) role that includes *Read* and *Modify* for the *Mobile Threat Defense* permission in Intune. The *Endpoint Security Manager* built-in admin role for Intune has these permissions included.
+
+ **Compliance policy evaluation** - To use Defender for Endpoint with **compliance policies**, configure the following under **Compliance policy evaluation** for the platforms you support:
+
+ - Set **Connect Android devices** to Microsoft Defender for Endpoint to **On**
+ - Set **Connect iOS/iPadOS devices** to Microsoft Defender for Endpoint to **On**
+ - Set **Connect Windows devices** to Microsoft Defender for Endpoint to **On**
- 1. To use Defender for Endpoint with **compliance policies**, configure the following under **Compliance policy evaluation** for the platforms you support:
- - Set **Connect Android devices** to Microsoft Defender for Endpoint to **On**
- - Set **Connect iOS/iPadOS devices** to Microsoft Defender for Endpoint to **On**
- - Set **Connect Windows devices** to Microsoft Defender for Endpoint to **On**
+ When these configurations are *On*, applicable devices that you manage with Intune, and devices you enroll in the future, are connected to Microsoft Defender for Endpoint for compliance.
- When these configurations are *On*, applicable devices that you manage with Intune, and devices you enroll in the future, are connected to Microsoft Defender for Endpoint for compliance.
+ For iOS devices, Defender for Endpoint also supports the following settings that help provide the Vulnerability Assessment of apps on Microsoft Defender for Endpoint for iOS. For more information about using the following two settings, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps).
- For iOS devices, Defender for Endpoint also supports the following settings that help provide the Vulnerability Assessment of apps on Microsoft Defender for Endpoint for iOS. For more information about using the following two settings, see [Configure vulnerability assessment of apps](/microsoft-365/security/defender-endpoint/ios-configure-features#configure-vulnerability-assessment-of-apps).
+ - **Enable App Sync for iOS Devices**: Set to **On** to allow Defender for Endpoint to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and provide updated app data during device check-in.
- - **Enable App Sync for iOS Devices**: Set to **On** to allow Defender for Endpoint to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and provide updated app data during device check-in.
+ - **Send full application inventory data on personally owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with Defender for Endpoint when Defender for Endpoint syncs app data and requests the app inventory list.
- - **Send full application inventory data on personally owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with Defender for Endpoint when Defender for Endpoint syncs app data and requests the app inventory list.
+ When set to **On**, Defender for Endpoint can request a list of applications from Intune for personally owned iOS/iPadOS devices. This list includes unmanaged apps and apps that were deployed through Intune.
- When set to **On**, Defender for Endpoint can request a list of applications from Intune for personally owned iOS/iPadOS devices. This list includes unmanaged apps and apps that were deployed through Intune.
+ When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.
- When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.
+ For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options).
- For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options).
- 2. To use Defender for Endpoint with **app protection policies** for Android and iOS/iPadOS, configure the following under **App protection policy evaluation** for the platforms you use:
- - Set **Connect Android devices to Microsoft Defender** for Endpoint to **On**.
- - Set **Connect iOS/iPadOS devices to Microsoft Defender for Endpoint** on to **On**.
+ **App protection policy evaluation** - Configure the following toggles to use Defender for Endpoint with Intune **app protection policies** for Android and iOS/iPadOS, configure the following under **App protection policy evaluation** for the platforms you use:
- To set up an integration Microsoft Defender for Endpoint for compliance and app protection policy evaluation, you must have a role that includes *Read* and *Modify* for the *Mobile Threat Defense* permission in Intune. The *Endpoint Security Manager* built-in admin role for Intune has these permissions included. For more information about both MDM Compliance Policy Settings and App Protection Policy Settings, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options).
+ - Set **Connect Android devices to Microsoft Defender** for Endpoint to **On**.
+ - Set **Connect iOS/iPadOS devices to Microsoft Defender for Endpoint** on to **On**.
-5. Select **Save**.
+ For more information, see [Mobile Threat Defense toggle options](../protect/mtd-connector-enable.md#mobile-threat-defense-toggle-options).
+
+4. Select **Save**.
> [!TIP]
>
@@ -112,39 +121,55 @@ Open the Microsoft Defender for Endpoint portal at [security.microsoft.com](http
## Onboard devices
-When you enable support for Microsoft Defender for Endpoint in Intune, you established a service-to-service connection between Intune and Microsoft Defender for Endpoint. You can then onboard devices you manage with Intune to Microsoft Defender for Endpoint. Onboarding enables collection of data about device risk levels.
+After establishing the service-to-service connection between Intune and Microsoft Defender for Endpoint, use Intune to onboard your managed devices to Microsoft Defender for Endpoint. Onboarding involves enrolling devices into the Defender for Endpoint service to ensure they're protected and monitored for security threats and enables collection of data about device risk levels.
When onboarding devices, be sure to use the most recent version of Microsoft Defender for Endpoint for each platform.
+The process to onboard devices to Defender for Endpoint varies by platform.
+
### Onboard Windows devices
-- [**Endpoint detection and response**](../protect/endpoint-security-edr-policy.md) (EDR) policy. The *Microsoft Defender for Endpoint* page in the Intune admin center includes a link that directly opens the EDR policy creation workflow, which is part of endpoint security in Intune.
+With a connection between Intune and Defender established, Intune automatically receives an onboarding configuration package from Defender that can be used by Intune to onboard Windows devices. This package is used by Intune EDR policy to configure devices to communicate with [Microsoft Defender for Endpoint services](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and to scan files and detect threats. The onboarded devices also report their risk level to Microsoft Defender for Endpoint based on your compliance policies.
- Use EDR policies to configure device security without the overhead of the larger body of settings found in device configuration profiles. You can also use EDR policy with tenant attached devices, which are devices you manage with Configuration Manager.
+Onboarding of a device using the configuration package is a one-time action.
- When you configure EDR policy after connecting Intune to Defender, the policy setting *Microsoft Defender for Endpoint client configuration package type* has a new configuration option: **Auto from connector**. With this option, Intune automatically gets the onboarding package (blob) from your Defender for Endpoint deployment, replacing the need to manually configure an Onboard package.
+To deploy the onboarding package for Windows devices, you can choose to use a preconfigured EDR policy option, which deploys to the *All devices* group to onboard all applicable Windows devices, or you can manually create the EDR Policy for more granular deployments, which requires you to complete a few additional steps.
-- **Device configuration policy**. When creating a device configuration policy to onboard Windows devices, select the *Microsoft Defender for Endpoint* template. When you connected Intune to Defender, Intune received an onboarding configuration package from Defender. This package is used by the template to configure devices to communicate with [Microsoft Defender for Endpoint services](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection) and to scan files and detect threats. The onboarded devices also report their risk level to Microsoft Defender for Endpoint based on your compliance policies.
-After onboarding a device using the configuration package, you don't need to do it again.
+#### Use the preconfigured policy
-- [**Group policy or Microsoft Configuration Manager**](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints). [Onboard Windows machines using Microsoft Configuration Manager](/windows/security/threat-protection/microsoft-defender-atp/configure-endpoints-sccm) has more details on the Microsoft Defender for Endpoint settings.
+With this path, you provide a name for the onboarding policy and select both the *platform* and *profile*. Other settings are preselected and include use of the onboarding package without additional settings, use of the *Default* scope tag, and assignment to the *All Devices* group. You can’t change these options during policy creation, but can return later to edit the policy details.
-> [!TIP]
->
-> When using multiple policies or policy types like *device configuration* policy and *endpoint detection and response* policy to manage the same device settings (such as onboarding to Defender for Endpoint), you can create policy conflicts for devices. To learn more about conflicts, see [Manage conflicts](../protect/endpoint-security-policy.md#manage-conflicts) in the *Manage security policies* article.
+1. Open the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Endpoint security** > **Endpoint detection and response** > and select the **EDR Onboarding Status** tab.
+
+2. On this tab, select **Deploy preconfigured policy**.
-### Create the device configuration profile to onboard Windows devices
+ :::image type="content" source="./media/advanced-threat-protection-configure/select-preconfigured-policy.jpg" alt-text="Screen shot that displays the path to the preconfigured policy option.":::
+
+3. For Platform, select **Windows** for devices managed directly by Intune, or **Windows (ConfigMgr) ** for devices managed through the Tenant Attach scenario. For Profile select **Endpoint detection and response**.
+
+4. Specify a Name for the policy.
+
+5. On the **Review and Create** page you can review this policies configuration. When ready select **Save** to save this policy, which immediately begins to deploy to the *All Devices* group.
+
+#### Create your own EDR policy:
+
+With this path, you can define all aspects of the initial onboarding policy before it begins to deploy to devices.
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-2. Select **Endpoint security** > **Endpoint detection and response** > **Create Policy**.
-3. For **Platform**, select **Windows 10, Windows 11, and Windows Server**.
-4. For **Profile type**, select **Endpoint detection and response**, and then select **Create**.
-5. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, then choose **Next**.
-6. On the **Configuration settings** page, configure the following options for **Endpoint Detection and Response**:
- - **Microsoft Defender for Endpoint client configuration package type**: Select *Auto from connector* to use the onboarding package (blob) from your Defender for Endpoint deployment. If you are onboarding to a different or disconnected Defender for Endpoint deployment, select *Onboard* and paste the text from the WindowsDefenderATP.onboarding blob file into the *Onboarding (Device)* field.
+2. Select **Endpoint security** > **Endpoint detection and response** > and in the *Summary* tab, select **Create Policy**.
+
+3. For *Platform* select **Windows**, for Profile select **Endpoint detection and response**, and then select **Create**.
+
+4. On the **Basics** page, enter a *Name and Description* (optional) for the profile, then choose Next.
+
+5. On the **Configuration settings** page, configure the following options depending on your needs:
+
+ - **Microsoft Defender for Endpoint client configuration package type**: Select **Auto from connector**. With this option, the onboarding policy automatically uses the onboarding blob that Intune received from Microsoft Defender. If you're onboarding to a different or disconnected Defender for Endpoint deployment, select Onboard and paste the text from the WindowsDefenderATP.onboarding blob file into the *Onboarding (Device)* field.
+
- **Sample Sharing**: Returns or sets the Microsoft Defender for Endpoint Sample Sharing configuration parameter.
- - **[Deprecated] Telemetry Reporting Frequency**: For devices that are at high risk, **Enable** this setting so it reports telemetry to the Microsoft Defender for Endpoint service more frequently.
+
+ - **[Deprecated] Telemetry Reporting Frequency**: This setting is deprecated and no longer applies to new devices. The setting remains visible in the policy UI for visibility for older policies that had this configured.
:::image type="content" source="./media/advanced-threat-protection-configure/automatic-package-configuration.png" alt-text="Screen shot of the configuration options for Endpoint Detection and Response.":::
@@ -154,65 +179,81 @@ After onboarding a device using the configuration package, you don't need to do
>
> If you haven’t configured this connection successfully, the setting *Microsoft Defender for Endpoint client configuration package type* only includes options to specify onboard and offboard blobs.
-7. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
+6. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
-8. On the **Assignments** page, select the groups that will receive this profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
+7. On the **Assignments** page, select the groups that will receive this profile. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
When you deploy to user groups, a user must sign in on a device before the policy applies and the device can onboard to Defender for Endpoint.
- Select **Next**.
+ Select **Next** to continue.
-9. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created.
- **OK**, and then **Create** to save your changes, which creates the profile.
+8. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list when you select the policy type for the profile you created.
+
+ > [!TIP]
+ > When using multiple policies or policy types like *device configuration* policy and *endpoint detection and response* policy to manage the same device settings, you can create policy conflicts for devices. To learn more about conflicts, see [Manage conflicts](../protect/endpoint-security-policy.md#manage-conflicts) in the *Manage security policies* article.
### Onboard macOS devices
After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard macOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Microsoft Defender Endpoint, which then collects data about devices risk level.
-For configuration guidance for Intune, see [Microsoft Defender for Endpoint for macOS](../apps/apps-advanced-threat-protection-macos.md).
+Intune doesn't support an automatic onboarding package for macOS as it does for Windows devices. For configuration guidance for Intune, see [Microsoft Defender for Endpoint for macOS](../apps/apps-advanced-threat-protection-macos.md).
For more information about Microsoft Defender for Endpoint for Mac including what's new in the latest release, see [Microsoft Defender for Endpoint for Mac](/microsoft-365/security/defender-endpoint/microsoft-defender-endpoint-mac?view=o365-worldwide&preserve-view=true) in the Microsoft 365 security documentation.
### Onboard Android devices
-After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard Android devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level.
+After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard Android devices to Microsoft Defender for Endpoint.
-There isn't a configuration package for devices that run Android. Instead, see [Overview of Microsoft Defender for Endpoint for Android](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android) in the Microsoft Defender for Endpoint documentation for the prerequisites and onboarding instructions for Android.
+Intune doesn't support an automatic onboarding package for Android as it does for Windows devices. For configuration guidance for Intune, see [Overview of Microsoft Defender for Endpoint for Android](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-android) in the Microsoft Defender for Endpoint documentation for the prerequisites and onboarding instructions for Android.
For devices that run Android, you can also use Intune policy to modify Microsoft Defender for Endpoint on Android. For more information, see [Microsoft Defender for Endpoint web protection](../protect/advanced-threat-protection-manage-android.md).
### Onboard iOS/iPadOS devices
-After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard iOS/iPadOS devices to Microsoft Defender for Endpoint. Onboarding configures devices to communicate with Defender for Endpoint, which then collects data about the devices risk level.
+After you establish the service-to-service connection between Intune and Microsoft Defender for Endpoint, you can onboard iOS/iPadOS devices to Microsoft Defender for Endpoint.
-There isn't a configuration package for devices that run iOS/iPadOS. Instead, see [Overview of Microsoft Defender for Endpoint for iOS](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios) in the Microsoft Defender for Endpoint documentation for prerequisites and onboarding instructions for iOS/iPadOS.
+Intune doesn't support an automatic onboarding package for iOS/iPadOS as it does for Windows devices. For configuration guidance for Intune, see [Overview of Microsoft Defender for Endpoint for iOS](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-atp-ios) in the Microsoft Defender for Endpoint documentation for prerequisites and onboarding instructions for iOS/iPadOS.
-For devices that run iOS/iPadOS (in Supervised Mode), there's specialized ability given the increased management capabilities provided by the platform on these types of devices. To take advantage of these capabilities, the Defender app needs to know if a device is in Supervised Mode. Intune allows you to configure the Defender for iOS app through an App Configuration policy (for managed devices) that should be targeted to all iOS Devices as a best practice. For more information, see [Complete deployment for supervised devices](/microsoft-365/security/defender-endpoint/ios-install?#complete-deployment-for-supervised-devices).
+For devices that run iOS/iPadOS (in Supervised Mode), there's specialized ability given the increased management capabilities provided by the platform on these types of devices. To take advantage of these capabilities, the Defender app needs to know if a device is in *Supervised Mode*. For more information, see [Complete deployment for supervised devices](/microsoft-365/security/defender-endpoint/ios-install?#complete-deployment-for-supervised-devices).
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
+
2. Select **Apps** > **App configuration policies** > **+ Add**, and then select**Managed devices** from the drop down list.
+
3. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, select **Platform** as **iOS/iPadOS** then choose **Next**.
+
4. Select **Targeted app** as **Microsoft Defender for iOS**.
+
5. On the **Settings** page, set the **Configuration key** as **issupervised**, then **Value type** as **string** with the **{{issupervised}}** as the **Configuration value**.
+
6. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
+
7. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it's a best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
- When deploying policy to user groups, a user must sign-in on a device before the policy applies.
+ When you deploy policy to user groups, a user must sign-in on a device before the policy applies.
Select **Next**.
8. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
-Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for iOS team has made available a custom .mobileconfig profile to deploy to iPad/iOS devices. The .mobileconfig profile is used to analyze network traffic to ensure a safe browsing experience - a feature of Defender for iOS.
+Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for iOS team provides a custom .mobileconfig profile to deploy to iPad/iOS devices. The .mobileconfig profile is used to analyze network traffic to ensure a safe browsing experience - a feature of Defender for iOS.
1. Download the .mobile profile, which is hosted here: [https://aka.ms/mdatpiossupervisedprofile](https://aka.ms/mdatpiossupervisedprofile).
+
2. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
+
3. Select **Devices** > **Manage devices** > **Configuration** > On the *Policies* tab, select **+ Create**.
+
4. For **Platform**, select **iOS/iPadOS**
+
5. For **Profile type**, select **Custom**, and then select **Create**.
+
6. On the **Basics** page, enter a *Name* and *Description* (optional) for the profile, then choose **Next**.
+
7. Enter a *Configuration profile name*, and select a `.mobileconfig` file to Upload.
+
8. Select **Next** to open the **Scope tags** page. Scope tags are optional. Select **Next** to continue.
+
9. On the **Assignments** page, select the groups that will receive this profile. For this scenario, it's a best practice to target **All Devices**. For more information on assigning profiles, see [Assign user and device profiles](../configuration/device-profile-assign.md).
When you deploy to user groups, a user must sign in on a device before the policy applies.
@@ -222,10 +263,9 @@ Further, for devices that run iOS/iPadOS (in Supervised Mode), the Defender for
10. On the **Review + create** page, when you're done, choose **Create**. The new profile is displayed in the list of configuration profiles.
### View the count of devices that are onboarded to Microsoft Defender for Endpoint
+You can view a report on device onboarding status from within the Intune admin center by going to **Endpoint security** > **Endpoint detection and response** > and selecting the **EDR Onboarding Status** tab.
-To view the onboarded devices from Microsoft Defender for Endpoint within the Microsoft Defender for Endpoint connector page, you need an Intune role that includes *Read* for the *Microsoft Defender Advanced Threat Protection* permission.
-
-:::image type="content" source="./media/advanced-threat-protection-configure/onboard-report.png" alt-text="Sample view of the onboarded device report.":::
+To view this information, your account must be assigned an Intune role that includes *Read* for the *Microsoft Defender Advanced Threat Protection* permission.
## Create and assign compliance policy to set device risk level
@@ -235,7 +275,7 @@ If you're not familiar with creating compliance policy, reference the [Create a
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-2. Select **Devices** > **Compliance**. On the **Policies** tab, select **+ Create policy**.
+2. Select **Devices** > **Compliance**. On the **Policies** tab, select **+ Create policy**.
3. For **Platform**, use the drop-down box to select one of the following options:
- **Android device administrator**
@@ -263,7 +303,7 @@ If you're not familiar with creating compliance policy, reference the [Create a
Use the procedure to [create an application protection policy for either iOS/iPadOS or Android](../apps/app-protection-policies.md#app-protection-policies-for-iosipados-and-android-apps), and use the following information on the *Apps*, *Conditional launch*, and *Assignments* pages:
- **Apps**: Select the apps you wish to be targeted by app protection policies. For this feature set, these apps are blocked or selectively wiped based on device risk assessment from your chosen Mobile Threat Defense vendor.
-- **Conditional launch**: Below *Device conditions*, use the drop-down box to select **Max allowed device threat level**.
+- **Conditional launch**: Below *Device conditions*, use the drop-down box to select **Max allowed device threat level**.
Options for the threat level **Value**:
@@ -291,22 +331,22 @@ Conditional Access policies can use data from Microsoft Defender for Endpoint to
> Conditional Access is a Microsoft Entra technology. The *Conditional Access* node found in the Microsoft Intune admin center is the node from *Microsoft Entra*.
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
-2. Select **Endpoint security** > **Conditional Access** > **Create new policy**. Because Intune presents the policy creation user interface for Conditional Access from the Azure portal, the interface is different than the policy creation workflow you might be familiar with.
+2. Select **Endpoint security** > **Conditional Access** > **Create new policy**. Because Intune presents the policy creation user interface for Conditional Access from the Azure portal, the interface is different than the policy creation workflow you might be familiar with.
3. Enter a policy **Name**.
4. For **Users**, use the *Include* and *Exclude* tabs to configure groups that will receive this policy.
5. For **Target resources**, set *Select what this policy applies to* to **Cloud apps**, and then choose which apps to protect. For example, choose **Select apps** and then for *Select*, search for and select **Office 365 SharePoint Online** and **Office 365 Exchange Online**.
-6. For **Conditions**, select **Client apps** and then set *Configure* to **Yes**. Next, select the checkboxes for **Browser** and **Mobile apps and desktop clients**. Then, select **Done** to save the client app configuration.
-7. For **Grant**, configure this policy to apply based on device compliance rules. For example:
+6. For **Conditions**, select **Client apps** and then set *Configure* to **Yes**. Next, select the checkboxes for **Browser** and **Mobile apps and desktop clients**. Then, select **Done** to save the client app configuration.
+7. For **Grant**, configure this policy to apply based on device compliance rules. For example:
1. Select **Grant access**.
2. Select the checkbox for **Require device to be marked as compliant**.
3. Select **Require all the selected controls**.
Choose **Select** to save the Grant configuration.
-8. For **Enable policy**, select **On** and then **Create** to save your changes.
+8. For **Enable policy**, select **On** and then **Create** to save your changes.
-## Next steps
+## Related content
- [Configure Microsoft Defender for Endpoint settings on Android](../protect/advanced-threat-protection-manage-android.md)
- [Monitor compliance for risk levels](../protect/advanced-threat-protection-monitor.md)
diff --git a/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png b/memdocs/intune/protect/media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png
index 02f3b4cfba5bb8879969b625632822a35ae92924..f46587c815025d85ae21a11aed34666bda4663af 100644
GIT binary patch
literal 53712
zcmb@tWn3K3(kMJYfZz$bcnHDW9TI{B5AM3S6WmFF5MY5MxF)!}ySwXRi@W>cy!_93
z&UxPZ?S8oR8|mrksjlg&uBoo73H_`njfGBv4gdg_%qIyI0C-{XT>kSC@%gwQM6LCF
zLU2}*76(d3$abGEURZok_y7RqQ5g5e$j{ekj-Rxh0f6w`KRZG)K@a|OC83L?mW!%`
zxr@8;7c=0qv6a0GtD>aZ8y;2;cpyCbxkZ(kmW;WK3?uOJ`2rarK|lr&o=dXNJL&(F
zpJ@T;5s>~>{|_}B2#5go^I7M4w+eajuX@Yp@;~6gi3sc<{qOnz=n{Co@e>tz@!XD`
zlZzeU@4s>W(;xERf8+W6T>b|TpRpqTtEGwn|8wbop5kC<|L3ldiZh3S7o{q&~m&CyXwv^?#)
zC`^5sGWx|!X79${Lzuf}>-L;QznYSgyQ`~fv;Ooneh=v7w>SUZek`}|JtBN~_2S>#
z=__2G*Z))gAdD57^xuYQ-z60ObK{lL#|+y4V#uXZ#`_O~uF0Qyq5p&W<(k!}DT)7L
z=6+}W_CMG>Nd7OoF@`kyUojhDj=DAD1Cp*!KmUu{@Q_$q!Hc9<-3r&bn#RPp@H_7~
zjOdz)zHC+1@9Mri?b~j1kvG3%BisA`lE8M(oS8EiJOI|NKrb)X{#aOzIrj21-0Tq@
zJwUP?+15g?CW^p9oUQPZn!L$Y=HNfXcP+2ZNhlOsd-*3_xI|`DXyX8F=>d}MTx6d^
z5ZF;r+JdfU4)VXwI7GQ5EDaXinf!O4M(4SHBzMf%wazZ!{=K5np$G
z-iKkenInWC27PUR@C`Cla80B%nS9Xw-)E=9NO{Iz`a5aft2VtD2l0>68+8D*rWS+5
zduHPcp%!eWq{NGP>}GuXauQx`fGs*?2=E_7!dMLP)OC3h{4Y-`&y^$~Ew08VmXv6u
z95GS-mvd5&`FZ)u#yaFPE~VlRLun=*z)Scg{v+q)WoQ&j==6|g`I@Q~XY6Z)fJ~b0
zePULJNXMO)MLZ4#?a+GlVjb*|V9SjOhmNv079ZfjFM+=cvK4as-Ll`seM*0}G<(&(
z6jJ#qtEZl#!Dk{wj>8<}65{aLz^6-k~A(HZ(YSY){@CsU*a9+J3qd
ze6-ZJ(ddd)GPp6h>!;Q{rsWDWOq+-fS&(xMW73U?!`A5N6{mMPNT(Fjf%lWAI`{3M
zHK*xqH5h&7Gb4)AkYk|Jl{=!0t$TXimuJg7#NeRfbU7S%j-AU){kD+UOH_(3-3qu
z8d5wPR~XS=&lpAHaUmruFP6dGdSdvtQktMIukG>|_=Ma7POwE`TE9^CW8-IL)~HeU
zvhrGIcEVUSwV33gKVWSIS7X1_;^@HU_ifuwa{yr50zMw+%2i4h6mGjJFWYd)CdxLv
zJ(Wl-Rvp`!o1~4x`cl54l6N+dTUw-jx-^ID3hzb;Fmd+q;Y}Xhd_-~*%T`=E-C|;j
z_n~B&xz~lCi-orE7~eGzls4U*iwIx<0o`uciR@;#DcT=>Wu*VDw4OvBy$n^Oe=nsn
z+Nn$!`DIUtMYY!u9^mu{1iOh2UU=JHA2bnubc)92k3smrX0Zfn%^gB(2dTK*)iWoY
z?b5MDT~>1Y_k2MoAq=QAi5}!J0N*w`xBZPP$DlS=@-+2j!ZO#h0EH?EwGtUZ>9{XkXC?#=n
z&UR|_@%E0Fly$j%LY@N-w2Nl(3q4XmNU#}{rWV;9nQ8<4*aZXE>|zmV2DMp
zp82G$CEDklWsfJ9^(9y*TZIv;ZT*zr79FsxZYs`JDA8ad_(E=S8tlVs6s^cIFdA9!
z_f~mz$$6ylPR!SMri>z{iE4eXeKNn=+IVGWRTP^r&W9rYVeEstde&kqW%3{iztdV)
zxd=;yj+u9*R`;8*LB1Nka5MC3MI~*mQ~JNtEUxaOw&4RdT>MyRi@nnW^S_mdHzsOo
z+*r0wJcN0JFJu$5B#TS}hKU>*q79~(77MsJ@Z%kR^Vas`Ge%GZY224+A=pK&!k#WW@j`QCu586>(3r;c=?`(xTP0a?!G+@hDT*$(MNhi*brExTCN9
z)mZ~4CTYxX^K$uO4MsJ=Bok-)kG|#|o9jgAuHx}4;~$%Y$iBW`*%5Q>s0ezOdqD-d1+MwJGh&
z9L1!Q`(Cl-yqV-Stv_yClj_Nl_`37#XAR-WnyoF5mIeH7cZJ84iqWL?h~w34Gps&V
zPY)#OaPq@01a^%c%4L4@`vJJvlJo9Wsg1efA3@jgy?8jSjb(KC)!w#EYyC`?RNS|F
zBnM$J=ksn{ZL|APN-;j`F5Qr~a@@e1LE*cF!OoD=nx3dQ{Jk6%d_A5DM
zA%i3yo7*X5rkO`C%>rJrPd_4(VjlLPtSS7S^Z&eS=`vm#T`r|R6L-d@=WA46g+yNP
z)&&Eeg(&>ief;nx@KYznc`tLDa3o34?iP~BWzl-OP%Qil%@`1bZ@?XfDe652^YKvO
z{_u&Q&}dpVt*66$TP!5td(PrHr9x8EL3M;K+cNBOZ&83NXIQu4w)Y32K%h_!<9c5s
z8%q+u*?iG68O_z}DsfXm05I7T7o@t}D(G}pr9DZfkWhIv=!`~?4fXT6nJi@SDN#;r
zeuyHn%aMa!W8b8chq+XG7Sz
z^r6h>VA1u@z0cdVYt+eqG_?0kxGrnl?oR7t5zW8sjIP!$!>A-o%-`03PIq{DB?a!m
zd`ZO~MUer+L8cA4l6;_Qo~dL#5fNKK3+|mYT#`Mo4NPYl{XGJ2jD$oFtaRsc?yqnhpT=l~i_%EDkTsttH}=Rsev6aV8y-
zXXuv2>qcywLtXOPhB{jjs5C1+Ym50!66y%cVwIAgnoH;yjgF!}vz`a%R$teAz5LG%Bm;xgH55ai69K@2++)A75{{w!+HQ*Y
z;&$p|vcG^+?j5`M;%}$ZS{$+2KUpdTYK+<9`D*l+%wgkwV1M6JShM?pBzmf1rpCZK
z&uvlv-9j!;EKEmGwH~di+R|d<)AjBGL6vf8QDo?kCKpj0Ab_KQ;ILvZWeTI!&ofX{30#D4DK5ojsucYaQ}P{cxFw=6(-{
zJRpt618vl!Dk8pw?}L)|_w@DcSePk~yVlUI$tcX_0sP?dHX(YKwfj>95yV?1GCp_N
z_i{463xO*u{@79|ZhyWa-QOZlZQ)PH$W;&X(Ck{-i!|L~9msJE1={9nk+r;k^XkNt
zEUf+T)Ob~3Zkhy+{DVg0hdVRsra5cs?oHhj1-lMWE+}P$82rKJBX@pzeB`?t
z?MuCr>CGQMk}Ys-Njf#+%z7!ClZsXNpj+|K!FGpkxOAz6)KX~Zo$K&t2gS+MeJA%)
zg0fqdhkGMa35nS#(p=A)_{FdmUn+#}qVUfAL$+YcDKhV;SY0-9v5Oi0S{YKD$0oPD
zRA785yhXt6W@jJ#@JDbRDSUYKT)?X(`S>78(LkiqztaPORED&IDYhxVbD3;e7~1*0
zFc-C@QjJW40b^|EYU
z*ke0t#|jhQ%y0ehqf(ggFN0hghv>;I#SnY;qXe&1jzn9Si1+0=N7UN7fR6TBPJ`5a
z7TZHqTUFXZuD|7|-;z2qfhz|GGJ$9RReDR{cN|>d(>Kca7#wv}bkf$G<=6Os;7fRaoUmP7B|0v@T73)m}
z_VRLXs{OEPiKq;a@QDDD1m?+odhgZ2MLRp`db&@daT%C96Ed5MipQR8xSv8$Ro
z#gdW4S)Q#L)t)Y@fvMocB77J0;>x9Rb?){%iuZ!kTtM*A2c(ean%DQrq1jj{bZn#j
z;e;3aT-H;N{?1uUDIOk$H;yMqlYG|rnC-BXTt)vNFW6P5h
zGqzzg>|HLCp&tV0y;{i-9%5n=xxuBuG(%zg&yJ2KJJp4>*Efv?U(Rj1WqCq6#iauE
zpH|l`hIXJ9Ygwy-w}PZJvaXdc10R;TsJRRW#ey!Qwq$hEEqNQR+A9l=#}_h$!f1r`esI!BLFZfe_@B
zNGTqvs-*xI9bb6qJx+Uog5ZZgRPA4peD}kSf>K2&!9*g|PArus3_5JwB)Pn5=Fjn(P$Hv;T23v!I{43+^4a!3KSHx$N
zy_T}&DEDwbx1#VUP1tX*<9X40w_)pMBcq!9VX5cz#M!Ov*$0@`9BmOm00I?30e0(%
zuj%w{eSZ&Mx+w@2f9(MQ#MOJtzFE7*FTofHz3sR_S${`+Y)3$q4!Jl;-ix|}occnZ
ze9#0E&}m$$4YZk8&PAb^fdT^@42VI@WP0>}%QOmk#*1AqNpwQAMWp4EIc<6_v~9%h
zjhBOy8=<3n=O=}|Rk$*8zB~)v%RHuen!Of2Lec|M8v5DBm9yCGel=TjSS%01%tgV>
z)jHCo3i#a}AdEwn;pjGJF*_!dI6^x!snqwBq#wr8DZRge$%zBJXDIF9}~$H>|A)vsaspH=;*Oc-r>O!@W$6c7Sowslk`N(-1_>%7)3
zr88MmDv7J(_*PfVxaIAxV@9OU?o=ZPCCN`|W&H35XytY*BCi#T9?JI@*v?GDef_e1
z_!sbfuD4^dN@BaPJ`mWb@`ZuH2s46iw3m>AX{3M+6KOUlTKphFSO+bho&9#Do!xKI_oL?IXM&pI_4IG!eViGl0h;BoF7%Q^ZShC44}~=Xc%=
z+typ_8hae6DZx={7_F%+cRn>WrEv{*ujJVp)d|Dkwrz?36FzQP(CpgU(`2R&
z|1z&TuRzr80w*Blo`ox`#fTK~3e8`fZiNQ^
z6sZp(V86ymW4i4vZ!?n63|F5UR@z@12aU(RRoAYh;KxrW`$O(tbgY^~j{3LF_&SM$
z|7ej-dSaoGS6%&8i?2WDAo!#R!3}5mEgi*o1(cJ6WudaxY?b`aI#-w26u583CX^sb
z0M*LL0Sa^Cc=%}iyO6`>t3xFrH`}MH^UU#0PVlzvWa{;iZ-`=&NB{%d50S?QHX-+;
z>(y;?3tUOeikjOZvCV{>7Dp`_baf
zB+eb1#HQ-wV<4@<3Ag)$@EIw%TEMfQsN82Vpc8b76;vfe>$no`R
z##rpF`%8_?*(6$xiXq0Q6Gprslu_Ambqw>SM5zs2*23PiLZ~wXb&XH6h
zcOUqzw6}x#506K@o=6IqTq3Ez?^D$B!Q$h>_VR%+xvClBiZe3{O9X9m#=(3^Y6$DL
zY!zl9xWVZ?Bo-dC>nozCFvq8KaCZcK#^%=wH&JVNYt;8sIU331gs3L^UoQ2v<@Hi&
z1z~KSd1yv1=~JR489wmds&I9Gw#LM%)-N3!g@ke>Cd6zIiyJX0Sp4c5z))JqKpj5G%`!FonvRNv9%C!l0
z>5s*0rGDntEDmM|1)PzNb=DH)Dq#9iAbdm;Fk;`C=FCQORUjMRjIuZ!>$x{jum3zB@Gpa;lqZ8BUVQ{
z6}tft!RkfR--Sc#LzbBu>FR?qj3P)t04Pw0F}8n$gt`+bL!xD+*y|X#pm=f{3~9_{
zq=|W|L-Q3DE)IJe^?1GewGKUSY+9KyI*(iG1ptxBRiigU&mLJU3>;#LE~xrpQXl1i
z8G*%w!fzRUZp@mD@T!SA|To1P+l9%q*_KTq;MMZUS
zB_B0fA9`H;`-E<8P)Ygh@9#}f_)KqZmEy54s}ZGgm6@`n@(aLz4n29QGFU3XI@0d8
z>W%WWnn~NOU441KWXx0&Wuw^LD9$Hr_BC-_xpF9OccT@OdF^ixa{BtpcLn~cll=!K>-c<+=YS!~(0R2!TT!B}6UUobIVg|UA2t>+6aZ;&*E_nG+$F#+dQF_~sj5e_*KvjQYXaj@s^p+?eMO0~a~v04MG64@HuZakfmNh3mtqfD}r+48-CKek&}V
zyPEWCFCt#rE8B-hEjo+A+;-&4K(hJiTn;S7xgY&w{$^1xhtq(I9A5tAcI;0{<
zbUje9NLRpUKmvyq7A@)1Dm5bc6KV*CaiI8DyOeLeij>3~R%}&-Mm01QAWn;;qR{js
zpZTn5(l#2GshwZc;xJDTF%M&)LR(vUW-rcZXJHH0BJc2LIDk{sX&Ph4lHrmEkouMtKd(Nsz9suy3)K!pW*?qR}
zS7z^pTNVIl+2$HFv#8r{xBdJ;-J_VmN!tgTZ+ebEvU_Dmn#={sCvaLD{UjaDnohvH
zr^xJ$BoiH4Ciy8-s9Y|Bf~%@b?X$RHh4i40X8A^Anel_vLPGh&9
zU3u@_lQ*+>)6yv&K_*a8i)56gD#Nhd@(>b{IyI`=_H1t~E(dm2pT8tyH@_%D@ZA<`
zHQ(9+NO@oCBYGiw&42NrKuW!~W+;dQ6@
zVqF4<<+Rj7+lP4KZpflErW0Q?+)Ktkk2rrlWWS`dKxI_-$v)}jA5Drk5zDy0DYq?>T4
zqmnI}d4m$5Ad;*|w|FC-7g8I!w*x_Z5jk^!L&x9B)${8Pr)A}T8H&%cwtSM&QEnt&-j&VRan(ix?-=4}0F
zr4)AYzCk`C=Mqy2^XP!hi;x~5>|XyYP6$CSyLZVrcXXf%x#0XyEc&z*K9oTVj3s_9
z9>P~ok1QQ0tlrU`qCJ0S@boSWQCD>
zn!{yWpEeHq^~=+I-@NjDpRqQE7PdGp+kbng^}721#j*YIIFk|oL-haasP_NU;JNo;
z91Bd0`X!g@YBiE>>zwD+$f2$#n}IwY)tv#=(YGVH2hC2YRAJ!)Yo%X3B4abDk|Igg
zMFYh*tRI+b3BS*uyOzTJJgZTXOrT2@|Px
zKG)1;QWqY56ghm_;1!cw>v~vd5i=Y*$Jkq)Z9aHt9NYYbdb}}Mzl5N8e`MvK#=L&E
zN*ao5Tx!5NYGn7sEwdLY$KWb>_l9l%NXB2evl+u!SzERi;gQfal+OS5Q763&`Xj)i
z`bsSO=CQw7%&(F~*?4_|YwXg0zeC~G6XR14#*0(R;mVTqwS21C
zXC*dG?{-S&2Z(WAl#rLG=(8R0m~6AY1?wCgK5_{C_VmF8d|N!*b%0_A4{DXrPjh_G
zkkC1-)Lsx%P{t)l{i!m)^l;udjOBTFARTpGNy|k8$rDPrKHtZZqGH7Z27!By72z8~x+(>^Z{W
z^RK+CjNis_yZ0s~Xf5TSV%#(TdZrX(=-HFc#ITtp=6%zKKREZDaz`B2XYY_siI&V=
zeYnd>QWWe)h7PnX8IK38M1}C*JS-#$&tLdd7b~@`Zr}RME|<`0dI~ij`J^7n^g`Ag
z`P~S~mZB#p%$QjU8skdU9zu&A2WQDt)eqWFOvs-`DRL}Ay9u;(7PQdPre@Q%d~AeB
zF(~e$xQ?voYue^VdcFetByypD{xZrI@Odx`TtD=(4O6b)
z#k?IMI1A==BSajb>}FDGt8gS~x=5{EPI^s$zby+4PMEDsxG(!TOR=?6k}=9ArOtMp
z`aRCNQ;LbX*Yz$d4^jSopX9dpMJGFF{nb2Nw`?o0mI(8l(9Q5{S=z|h3~WWUA)1_G
ze9B^1RLmUoL?vWtYz4M5ZuggUdaUF}l(Vs6q5{fbx5Hi!f${NJZhI|5%k7_WwO=5F
zw=7)2NYAA%st(fbpHRXFV_^Jbs_7Yz^(0^4q`l@8kMc+G_utM;^_EF8hP
z;dP5lQzYjh($MTmsl$&>P5q^;Hr;W02(te$IeasYHjHSYZs76^CT`{P1HHrJi-^DR
zb2qqmF04I=ADlJ8&I9vU;+mAbCB`K3&TIW;LRP!P$TZV^l~KKcS6SRbdozc5cZmYp
zbHgiZ3~EHQ2BO|v&B{~+)i#(?7;J{9B@F`GJ@ura#KiTRSR|x|hK(UQzd?N2`t_ds
z_TuGTS+;qaXDO-r2SK)gjGs?e_K%?ZgNrFatmV1UOEf59pkl1%Vq}x;{C;%{f<0A@
zt@Do;pL}^*w7(@veJyJ(?KE|#0`Vjg9BMNTOs4hzvq-PsaA~-;BM#haqI(NC0L6Jlx
zHlf>AVdDocs^U$zYTV*Rxd2tsoa*1luWZp6Lm!uhW<9
zSyvAb)Sf4oXwd(*nUZB?8`~Q15uNA@JEp)2A7L%Aa@+qbY36$}pc73O@SMV$)K50z13qIWR$L~VS|P~;lO
z=(C}5qo%_;JbVWLi$BQ-h$&)YqJJ@TT$Q9@D}hi0U8%S49yas){=$a?
zhbRR{i3z%JRi=sGO$)6QNj=XOdcno;wJ&q`5zAE+3ERvyn&9{h1$1kla*Wp)p3exBQwmN
zl3wP1#XTdvbBjK_1Ed(Lc#OnEs9;xXlf?0ESegSXf5U|C>g#g2s&mB`8^{dnNF*T{
z@M;?t)#SrOMMs@!(CdEYdq2dJuOp{&6hHYqay~_Qvh|v_j_XrWQqsNM*+k*9M`%g*2pg2r!ducuyX|$XW0Hc@}o#<9RNsu{OD)<`%_CJq_mPdlaujOc6hDo7gE=l)Oc@c-f?SX1Jl{z
zAP8irqX4Bwv#byRcyfbbbp-LB7tK|8X9})Mj*e=QI)bVgiOu%Sdr^V+zt8S8*%lQC
zhvf%LHOpZS!|O%z*2>ymUNq~nv3gBTd<+7mDzq1H=QRR5TK`8iqvF)n{gor|UY!h2
zJJ9wGDz3K@PrR*m=OhWf-2DxRY`_B`
z(;Tl~yPHH;aMHx3#Km|87Tfe)x3H%6o6pA$e7iS!ZC5xf3@gUn8B2QYx9(=EqG7LL
z&f|7^TE$~Hpi_CAGez7iJxZ~bW5+nq&uES3a!84rozmh$$09}Z%flJOFum)
zFsJKACZOOdZe5M3TQ}!gDD|^~cXPg8w_khLljjg(qlAM2j1}5^S)W)a(#z_Hz6Ik=
zU_9pleWj=&BTU$vJPrz3W_*>5AHl-dReR}Jxq9!X&8Vcr%6CQ(y6Uc4fK}pGGNVTb
zDloBsj5YhFf0s-o+kyUIScvoVBY{5s=_|*Gg-sO+{oC+IdjIQ(m3Jqb_
z;cl#5$0NzBDqz^(ss~%JZK{XcFv`h>F&MI%?kiY3&d#BEXBJ<17eT!8HmfbGKu*Aar7!VdU@NR*
zVC_zzxP{8Mne2rvdRB0)yPXIqUR47&`c|5zLhboQJ-vy~unuCL>e9o&TvzszC^4r?14WtW=Oi?4<+Q+$fg*Lo0#GIL7P449
zHR_VWPs7a24w;BvaL4L{nqH~Yx6N8qhr0qQi-ZVQTt3LWTQhpP)86^F;|PdJ3fglE
zqbF5B@Xj_9&E5PB#_ik!5=%5MWn}&}&FENx+IDr{#B>VLL+~a;{W+NC(ArERyd=(!
zr(ZKb#|+hEptB&B=J5NMU-ShZN?*?g@jJ2nY~gIZiobKM?apaHv65_5oSpRj`HIwZ
zjf)|+@r+wt#m+NXu%t}Ejt0{SS1Tzio@?P~YWE$twWbMEbd64dEbcgZri}RuQtAEi
z5gak;F=Czwm*Z}!f{qM^c+x^kSM5OBOam`E1vP79j;Y}Z1G>iF%edN^4qQ};-)bBy
zh|SXl9gB@x2nm)RdaZ(&y#dU%|6My@doM#
zixURp51gYBpklm}Q~`TR>RLB04NUTOouy;E$+RAA_1*CD`WP;eJz)T)FfT#i-UF$Kw2r051F_{!4L_x2Lp%eu%^Qd&sQIyz9e1t%ptXvcSS}}6K@nn^L;7{eHJ66Nymim%S73dB4RZC`dU8{bnQ!+O;Q2g
zL|6=S?ozW4MFdJjSklx<=N&dJv}&3Vs%9Z4Oc;r=QW+CmTVh`Q^+SrLRzh;L%f1)(
z;Z&ia10MoujKD9Vj*%b>XqXKr9@iiZzsCtchXC6DqV#mpGb4f3%0t~OWlkhKP<+zX
zP&&~>2syN&W)`kHf=z16YTKB}80fg&$0pzoaO4@XSs-APWr*(Hw|ulHA(#rY$r{M{
zws9?Fj2wAxf$Hk;Vsb5`3oqoV*E}{J$~_(1O&eQqQzG)5uZBecx0hb}R4}$@TFe+%
zEq$E+VFYIc&-6D@Z^~>9bx~boXLZ!+{QDXc6WyscdSjX2{Y2bUR@v3r)mqB9a)y&XD_3A>C&Q|bzkYK)`QGXr
zRbaKjCV6@G*IU&Ze0;)<&38*paUm(*!B=j0mSLH1j~8W1CU(tO7$Ym)|M-;*T-fAB
z8rG$0Qs);l(=*C5#NCBlT$K|U6?6LCB@ILOh@E6UXqS)JbQpn$a+Bc_P(I#p66fE?
zi=Xmr9W<>Of4^OiuHah3Qwb-q&-{)u>xf{J%ydMtI&f
z_2YLh^yPYXhmXk^GO!egwd=bjLsvBi?E-HvuWI&}sIvy@T^SCBVh?U>k{}xwvahj;
z=a-c~B_=ulBOq5VQiCfl47}_OG%l*SVQuY!Fmit8_Y)I8V6EgW@#+TZn$QwWZo3rGaUNihE8!L5H19=l!AMr1t6J|p{(ll(_beuegR>|YP?C&$l4oqaK
zsy}?ka;h}@xPQpvU>9K@Qxz9WWMM`tz0{|M;d>YCrThGG*G~2DgQs)VqLa?soS%^{
zKzQ+bP%>&J7U-~3n{+>G>MARz{xS&iy4qj29yb44BYJr-Vpy6LqcOuhMITWyFy!TC
zwDWVE3MLrTHOB|{uimsK2if37J2T1-49C9z+geE@`L#ii=6>T>xJ>XSLG>k1Vkq%&
zm1{t2Z8LHslXVhTS2fLQ-w63O(>=`V$wUiS5K
zo~BqhzHr}jg?r_D9(ajlPfpAy`MnycdC@oTru0>B@62|Gw%oCa
z5?rR|Zekf5+cU*ecE4}nE%-I3>8Pkf^`hg(w@4NnTmP7WM=rUfS(p1+3k#V>hM250
z?k;xs?T0ydx6^KRBZ|uzTbkYoRK5|qk}X&yj;E1;DY4KGg*Q8vc2heV;V5CSB18C(
zd*+ag-6z5dk_%Ni(RDFrsC*G^J?#>Wy<2Wiy^wgPmX-SYM&%kvsjn!-7NK$0qb)wP
zoRt}h1v~@YB)yM;-rjCP<7jKg-_bIX;|7nJ?;ZCq#qHoPARJOjze&Z|()i)2gRUSj
zgjiNhK<^vg`iHl
zg4UCMI2a@}UBGl@AqoQ>3u4Xu+m}ocTYr8o&IwyQ!j)Y~NcIQZT7~`Ry?f8PLExgn
zzJXF!yLM2xga5;$w*$pU`*WqN*yHJZD4YIoW5_QRWe_EkaY6|19JBXb3XfPYK@Awf
z!OLrScTw*o$7?t+X$;{Yq$BgNy1I{tZ|ybuV&rGJiXGKInHTUf(SY09o9Z;E137wn
z&UUKCEo3t$F$@HMpSdNy07J4bDUU+QU0QMo!A0@kVLz}If4OHMgCWxmSAE|!vL?-z
zA+Nq#QP!t_uOf!X6OmRIxhN
zYexBf{Br0Tx&NRr)9!2&q_JP5RY6oEm&X`Vz7zidUuvK(;h?L5mWU;l@#jq6Lo=&_
zwTZ!gBP~{4pvi$DZs_RSLwCa50xO8C3=~h_ub*GfPV{jCj|g`rEx(`Fzck~dgZ=UppO_vTA*PXeXWsN1<+R5;ID>Ylp8v2m?GNHn!H+&$mBen7^hE0k&z
z*n6~SZXZ1sr!cB>xq#WJsjnv9LY&O9wo**8z{#uM*|lX^Osw7H~evk
zO~&vz8sRhaIX$<*We&Z)yd;nlYo_i5fmJ&nI{&a4c-Em5?j76din
z-W*$9F1s}$s2K>HdNw2U5d|A`eVQ5e0|T>gpY9i{Q;n_E02$Nsfm
zyEcXfC0$yE&byVWs{&S(o&97uj3G{sEwSsl
zz8=N*<#_0Pi}k5Vap}+ErLffwhcd%_+pt;8eM>Eb-84ekn&jK)fQ=5zBc`jf5
zyIm`~_WULvkB^Lrn{scB>v$9+p=sAKtbWTUKtpqJ>E@~cijAN26t{F|*Pc~d%1vTr
z3b`}6SQ!%?bhoG><>(PufJSOH-RQ+(f)`yL8i`P}Ls~BO54|AIFFv;5Y|aXc%kKtp
z6<^Z0kG@OB2xE0#ICxFkQGow)J#NrJerH)|%G$sH@pn9*OUs06=%H*JYEnE
z`{wh>@Q=4ek2hZ3fv~-?=PCE_KHd+;^c8QK1P^T6+GISj!PB~E!%L~+G(|U*&ITrjhGb$PR;#8
z{KA*83OhlC$tAwR;QI>w8$rAtP%_DAE3cEY))HPR_{C|hw|KnhX=_P!xpo^^TSvsW
z>~%l^KUeXdsgXP&pB5tl
zdUk84zLfk)A}j(R!0_a!F*P&Ez7DYAip-Ed-7Iw{7asNuXEs3w_LmHEv7E8AOa~2q
zvkleGw}ME(%kP+b`^yUi00@N&k{H=h+6
zJ&llLGSCy39-SWDBf!kH;tnfC8SK@xf({rlI3~Q_6EA1L%U}+!alowNQkv?Xs!GAF
zjE^`YIkr4I?-av#Xk|jaLZP#etQ&=5s+vtXAdr;_atT!M6YiP8M?HK4a0GPAC
zY15ySN`Rjlr}~?aD94E}IM904IU%%JDgUS@m^*hq!VXMoD0W&thxL2p%`l^sNIW
zw*Ae9oK80Y(25)`3R!L~4BjIEZ9O)72jjfilE{MOohIc#Kn6WJcj&5&u%QK=hK=$+
zkUTcRcB1^_trx+QQ?B7F~_DIKBM
zpnDO}hDQDEfWLSc7qjlnK)k-)Ve2gTIohUW{{gJo!VRSNh6T&SdU9ptFJlz;+|4J8
z?KYZksv+33GQ}YRZ-QP)?UYMbM6gUVoC-`;UE16x^L4up6b|0Ys+B=B$aImOkmvs
zm{t28^r+yZ-CFaT*_Je5g{P_1@JYa#Rv``g2g!(Z%Hg_LvtAAW@|pw<88MeR?k$;0Vz~YzK2OF{}uH1Xxb9
zcK5iM`zI3cO4#OuL!bt8ya?~tP-xX|=iTj~>^VBRO_x_@wPbQ$COh%#lY%{sg*)Ffl9ZfvK0&1updM?~7
z2m6bWfVgn?v6$G01=;X0^z({oAIcgD)@%g;6o3nvD>K)_Ap#szxb6Nn2TD!7LuKER
z=&nY)Yd-0DD+T~e?(r?uQY#GuMH{9we;@Bn&XFbeU)jbc{(`b{)kwiUm6KMx9DNoO
z1p)@E%v4dLE+?!Yuq!M;-m8a(zRsKGvtFM19_jJo(3g~p`=+l)TU2Eus)nh{fu)R0
z`5%BNh&nr^0tNe8#YGU=VUxR9%F45j{q~mwugUHqBocdKV>_;9;8lPqSI*eT0#{Y-
zU8fD8?PhHp*jEtMTHmC}Q)&0`hKAvfIjHM|+3rsC>B_}{70`-GeKqzYX4W&a;_XB8FI8~*zZ2-2ZQ
z#}5$@7`hos5Kua#o1s$}x|LE=q#Nn(hM_y98>Bmjq2oX2+@1Tg)>&uG-CXST?l<@Q
zJkR&@eLvLQt@w8$e9Y8I_oKaBFg`#Q;^d6{9b2K)%!4Aw{&RTwck1E*RrTSCV0EF<
zq&o!f)bFOZ30p5vCOY}3Rv{;_EIQp_F4|RMC$;zo3Q&o=2Y&yT&Hec$tzYfEQcdII
zApC(2c~!(j0myVyzPQaA(l`+Gy%!P`($%%r)kP-7UvyyBc<5hSqml=T4eBHPK=;@EjT(%VONzpb1v8+Pc@{)c@n*?U}>r?O-MkI
z0&bxd19#ufG|ZLXeIa?-+>-S=j@;Z$-~Rel2%#jIFu`jZTk9;}*2l84=3?gZ)Wo{M
zckx3sj~TOBwyfofLQf0%k(B&)^Off{v`Utf_+aOB?A_KKFPhw(-@w>57@OqgHkrNgZjSAd>CPZSw^oK6kAf
zv`-Z_@|a7AnI&X&%Wv~K^li8+$queGCf2QwJAozKIhqCoH(+JOfK9khrD`Fqe%38{
z`Nds5iIC)&m;o4#I29gblWDT3OF?dw2^_vum$+Dll}7ZrCF3?LHI>E?C`Ps^A$DT5$FH!sg|0Bq_U?*1x@LOQt*z}LWEcUXrk)yuJ~-xw^Z#^7p5ay)TBZ;$^%3&d!}$gH<~{-bK>d3&oi8n&O9|0uP_+rh|Ji
z0t=--m}ogxl;_Y@*3?0rtxI2{{1@aYQXbvV;OXp!D^c~ns?lH#b^yUGzKX-~Zu7jK
znVWNb*!lYL+iI838IdF^%6RvRh`$IbwuzOU9p9c}^(AM#ud;*v
z$SU3RT+Yo)fkXasfA7uE%=CfT6wbs^)DDSniHQXoyJ(Si_9RNW=q77!alZ)oPumKr1;||_=H~bUT53XF=Kw+eRK(VTWD=7msvUl4e)7(p
zOhQX)=u99=I8B=&1sa?6jOd@wy&IJhGrC$DEc**f&oN&}`t1jLR17|QN~I!$qFQR{
z_b>2p5MCZcKz!ePf)SbfO->YSq59BNY+K28I)Ln-vmi~z$#RsMglg#yW7RAbnj5k0
z3t)1`KMUmP7RR8QmTI`UwdLS=fA$ITE}rZ6h7)N6Ht+aUq$LV7=M7d2UKCZ%f_kcHm6Jl5Meh!x#&&Ya
z5&s;6xFiV{j|q%?M%ms(0KZhnp=TL2w>`<~1E@GC|otRqC=i|4+M4+@YTd
z7(`lMk>CUzlnTBN^8zt?@BKr|ibCvNrp4r-Rg_bbG&pE4mvp~cCHHri{+AtTWA8cV;$#>#e;C7rL@#J#5CE??eDltx)}q7CH2Gn>xu0}DobuP(O-_M|c^
zXtvJ=B;$Pl-Y7Cv(B8P9xc+<8nzI)(D(f_MD5`qDx5yHN@;+?zW&Y)|vZJqSIL-6+
zOt|Iv!^Kne2hGJ$FP=;{&Z3u1ft(g2yVTvrFTM5pqv}NfiQUl<2hM!$xEkau*cNPd
zhdz052XQ6#ySn*(wG1>R%ZI1+Cr#)@`m9f-7mUd6AQRH=-F}ARqm&(GT8^~h!yzfc
z(ojWTHc^W&l}(y^+BkgyT+Yz?O%Y*R%zT7Rv=fI<{dKKpWC6!Ygz(c;pLO)=AAkLZ
zWtr$NI@Fw9Bngr)LuI2ba~i0Hb#Dwf5A-kHz~Pu)^NCs<
z8KSUb*mgIlj=+yJ;Cs{*eEp3I@%E8j|7r0*qQDG75SnoyJ{Tint+D`~3-&)Zoo{m7
z@zncD_WCg>w%m4;c91dXTQ;&SpW}R=a^~89UfurNN`~%6QO|Ss>2`3tI-G2V5~P9)
z?8}0$qE|Jf7)7gHDK8GLcq~U4wvK|swb-AlMdqWT6(UkY!zJc5atYx*zGxnD3;{aC
z9v+Qn=mdEtxXL9VM1daq2}@E;Kgs(ccfYH=;w9-EhZKs>&ag4hPW?tDFxWis)9=?O
zqAvWdHtOV=qJ0DxL(p*pn+@zUzhFLfR!=9x$jE}ysA-XkAs`@v!tL*oR-35x*p&Ki
zxwQW3eYd=?js!itXedb;7a5uSJK^=!*Ywh6{3nNhRmI^5%=LQy+A*RALllo##N|rF
zFeB3=im<00?Pto5{`p7)PHAm}ui`=#_n0gZovRbU8@1-UUtE2yro%qItxrwm3GMEi
zUxuCkb*G7VdtfIgf=mBGGr^%eBde37{DfMc`uM2qRzE5vq
z^hkI9wLU(xhiv65J0k&Y51yl_AD%}WCQ*|kibidr4F<7=rPVSk@yn}>s#ysiGyJWV8hT3g>llUE%p#%8HXlbu;@)F=2Av
zHJWS~@70J~{W==ZYr3=~%t0yeZ$~Xt#dUb~RTg4i@WctFW(t2aCHq?5$2}dUXgU!*bzK0nfu?l7&+xQf!lXXI5S;vyn
zKYOOL${iuBd1Wuw$fl}6QxssScO_i?OVS$qsc=$Az6@XD;oi-E7|1cA)O-2oO&RZ*
z{>ljY!0622SYNa4A?PhtM5R!1&%c91`@yr0p*FaHL0bATD0sz!t52fpgb#e*6kT2GTvtD1WD=Cg@A*T^DR=
zhB`wpwg~t!fy!`XsFC5LNJ$jrc;{fl)Y1I>>+7qZ&D&RyQO*}Y6#E$OD`eQy#kW{1
zyoXJMK){ke6+K$ZVMWBS-DzGzU}igh_Ga{MFLIyes<*Boe6?3`?_x9D&D
zc*MMH9c1~jbfyD`w$9U~aRW+HYxFgZzRcgLysEEsu7-A~;g!^kG_?pVEiGt&6|!@u
zb<|OnR%~g7=s-$7F(it=q7*&LmFt-L{GPb^)}xLzVOEY-UzEa@k_}zol9a9k;{J{h
z&Dj2srS`8y?yk6tP8R@Bb)I2$56PuqzhzIny~aKB1X-baGl4TARYx(w!!4;LvFUa3
zp3S5E+&kxz01)M$4N|qURCe@pa{8dBg~Z!s=`Y)pm4Dk2cG1sW(buQ42eD(VG#sKY&fVXtzCI_Dn|DN%#403%*Pc!k
zWc2z&3qgE{RRpN7dHjrs&JAJG!ajrCpQ`fS9q2b&&mPga`S6>LY@*VX;)q{fcR!yz
z#Bz~$&iemrj8Xb5+t8cjk4vtX6TMO%f5=?15dQM#2D|>}qDfT1N{#2DSWa)G0j2j<
z(?<{*kk2o`v?G^-A7D>Pw$U?Dw3vB`uNI*ym7`rC4M^OMq^)VCdhR-#l?#a0rr(GxGPykDwhb;+uu#i4^qumj0>Q_A`|FjS|3$>4a9w
zH&gPS61?jPE9$vS8Mfc4%erjLFF{RZUiD!rhC-TWl~Jq|UzL5n`}dOe{460S^y$&+
zm4zx}ObSt|?350Cxh$z3qgMk9AhS8NX&d6>EUbA=`Bht%X?w|Fj7*z;kT7H${74QQu>{9~8btst*jTuLu{}-Qm+r
z&E-8!R?Lka8#EiFcwTCw1QLeNJhIrb2V-{hrLgAL3FA=$DI4?-22r-8XF7ny`R(1}
zP^rA^YhD0Y+^L0!s(-gsIJWN1A;U0e;ph%@)sq04v2N=w_F}&n)QTDwFSS
zOl*nwD{hpM-2e%&=jUa_{V@Psgk9>%mh)9EMAwyj%u4NyxQ&T83+FE`5002oi>hz!
zOg!9DopsuFMjj9wUQX@d`&K6MxsDvM%cWjC`gOi{bT
zK_^;?$`o;7s-Z9BIq2gbW<3zr{APjIZ2et-xoU9q@kC%d^7+-(Tk;XQ@nPryThWBT
z*jmgPxPM&C1Raw;tQVh}AJcNJEqyHu1+Z%JX5l{f6Ybxqa%a{jABK}
zQL&&EO(_ugOT~`}s&jv^f3j?_lO)qd6;n3Ov6;C*35a1jT5vP^!}(RPl<6q_){&ya
z?;)Gd`MgvqEnsA1n=L{cvqQ9ex#n!?>9`dV}PtIeE4E+~YCV07FpMUuEc
z0DRmKS+S>ynMvqebK@iBt1-46B_}cW+wJMA+}Y)4l-UIR@gn#guWUx+?*%il1wDu3
z_WY`Ia(+<2j1c$9x^G@&2V$Sk`HN96!bmw;V6cbyV?VFW4A4Q#P4|uoDYvF9{ne2n
z=C%SQKf;KnJ${+D>n@!%&f)6|T^xi+14&-aD^~-wWI({mu5uhh{dSfoR1{k|{U?h(
zG8kRQ%)HHqM>9o&x0}$PE*@(kMsB`v`%`O7OXN~Loz>$)h7Nf8(G<%@f!vFfjta+E
z)h0I_Ehcsbjz1eAXBsv=249^Vc-6-cdK^C2a1_OMBG#Px-xDK}nVAt_FMiTX(C*{y
zGIi`oIr!?zI`m6k>s
z{VS6`E8#AUF_1gAAITet62L`%i6J!y5cMSCdch{lQ0t|mtK<#!_9>qC!^0Cnx{Y5K
za1QAePkc~F8{IZnpR6Ob7OUKM#|;|II=@$pTk;y~0bj|u9DaqLOoDlgZcjYQf3N+9
zu1EHUCxDV#_R^*Bq#ArUS02y5-E{I;czy}>Z*^W|vgAI9IgAq!)2Dog@9n?Z${@dk
zlm}@4SxHl@Q1DdKdd)wfusgsO=1%pFl
z(bnp1d`*lF_6!DJE5}jCtL(Hq3*Y@gQS&L_!$F<nJ_G{d6DJM+uc)^X>{n(sFReuKwfAFU|RRRyIHF^_n$|vyDqK)|_(o@#Zu-a_>yC>_an5lLf
zB0fe_q<+GTd+(AlA6mm{KYfTNlTJca(8}3aju>L)u^829LCA1T)kIfre(*ugLf!PD
zk~8BGGFM@=$Wf+5C0kBcMCIGXtSL$bT)d9MnzP6`%R6HKI&)n*FdrmIkzq3qu=P-o$T)ZNspy!pTnb?xveEJRq#sh?BT>kzY3i5dmKv|>ZUDAX)!+EK^Zj
z$);az*17zK_LzO|aZ$G9yjl7
zi0cdbKfw>@WU(-sc=So8s*DFlbZ8jn#0`axr^0pEI@al6tH!)sfXJG4MQfeN7blyU
zwBTWqvGk^MiTcr@QOAfX6O{ixrn;Axe3`;XU!AWDO!u*@NV6(vx)>TshR)ix#B{$1
z!LIXyMv3Sq2@n1LX#u?GUR%7Xc3ho^gzt`K3S1ZX$d9i|J+j3$pR63j{q;V|PSkoi
zYv<`X_`4T}6lBn_9yhWSIqcc>SvHktDDBz{wmKbS89=^RIJb}Il|}VkW<29G<81vq
zIy}>;VV&PHi*={k3IoM>X95OM@PZ-x9Ecmu+U0NK8x+1D4u&U!(prqC1eoNtecGn7
z7Ajh~6rP5cifd
zKw!K^MPf>OCU}8y&%fUhr(+GG4SxH-gK>7t^kG7}sJNtngrJL>v3--6l}D!7x9FFO
z9o0uX&|Wyt(W_OXI;;KP=uj=6+U;iM0qTHABKyDl5eizh=bsn?tO7f&c%SLco?n||
zf$qznHeiFrhemCJ-krat;ab$6KnYlaZuE1lf*cY)UMtzb!wDm)b#C{AE=uC09;F}?
zi}x`v9>6JzIy8(gXjRl+qU4
zpB4#hN!$G1Hs3i%>%xn41$VFR53VI+O-b0cmMD8A@@^!psUZS=|KH
zx8_ag1Scjhfh?l<#4llu-*WC+kl>XfR)}Lh|Gpw-)vYFsiJkmtjQcsE=*rN=%e*E;
zkuKFR2T2WgMv7=)g}kg>e}G#&8lF5=Zae=R96?9_4MxikR=ipu
zNE0f~Y!D^I#aqDoyx{7EPv+T%CL2X_@Z3W>ODT;4mV2W`)}dhug1$s=-F)4tU>l(
zZm_m=G!5J9>
znsarQVIAFTei2B`$~4;sc$AU47vWS*wj1%ve3|P6c^_+f$oS1O*;b*bp=bU}a
zSERh~Rt}#SDxRkN8P6-jJ3L8eJiW}dN@X0O70DpQYc2Rq>aomaBPDE6CMS@i;XQjndOnESJ1SLtG5uh^bz}>p
zB{=^vlFC?29%W!
zD%e(^%(W+$@R0%vY@UN}7_VtQz(h(VbW;*i)cy`=V_Y5|JJ{xEslY<6D=p&e&3lDR
zmpWg6r$%xZ%N$u0-dlJ@9v`x9)sgmE78$&}+TXV8#Q+o)ExdR(7i^6=ENOtOtApCc
zo3}!*JVHFqy!Z&9@{Pbf?rQ7
zYm1QC6hG#C?LQElGOvit&6(c}?gvX#!>bPuV)R3;i77_(mNhY|e<3$}e;!-Gvth)F
z($cqThkrKjQo!=oiniuTZ6m%tg#NbBicflXW!~m&av^we*Ju0P-&aa?fV;c2xVR%5
z>QHG)JG4-IYQDcMOWJg?y86kf1!rVpyd4;EGvwBz{EshRG;1eA!2(6!&v9|_U1|U;
zj?u!Y^Of)So-SLV^~{GSDjBC-f51dVKq;XKAVQnwstA8oQ(Dt8FN2)&z6U3*%|
zAWhd-VRa_sh8_Wq&F`8%nIBUw&*=~GMc)2YB_FjT;nwvE!B6F$j7C!)V8|^RRw!z~
z+(*`JWbA|v$nmJFIa87k2ef^2aJ#|~!lzoD3Q=u{C*7{q#Y-XFcrhJV%_}_J|63V_
ztoXGl_s~Zh>{i*)Bk4L@t8&Qre+~UOxH)BtEpF}0KR8XX?0scN$WQxUDuiQi!VypO
zQjhi{iQk5DajT>&Rv&$+6cJ7Pc)I-oAAFb50ps7(Z{oDb^h2YLOmODkv4*#&FJ^7)
zE@4Da*=lH7@*#zpXls9e#e5kiI9OU5jv@dQ^i<`N`&I=SqlIEsyrp%QA5HmitXQuN
z(fT6~tC45Gr>in8vRF97p*Plw}@kz%6+hHqi^csM=a61J9qD`
z!rP~!mC&wB96#Oe!97i^q
zxUXoV=E$AkjeD2+M+^$58~zWkckwPc*N#|Lc%E~@22b1WcRVtgL_2YSyQ|49y&_jK
z&e3Y8$He7S)}N=LQQQpk7!D$61`cm~A-I%ZUr9fM^mSwhleUoD|mRkwW@Wc$6iV3jIS!
z+=+ge|hyD{^F`;(O=5fU-wjsF5b}VN~lkmkvp3wUA
z6}9DgiAlS{b9xK!xSaRKZiU~h;C(n-3FEC8O~R`e=b6Ds!-jJ+8H`>{xr#S+Z-ZLe
zvwz&|lJEZ!r81(Pwa+%#(0RSvy8?Ty?m&3aQK)6R$WXW&7jK(Ed9j6si}f9_iV(fr
zRPNssC_gp&JAw9GYSJtUJ~Fd2AA7V5J-1!e=P5~qUYq2<`0&vGzday&{3~{*&xTFr
zurEnOI1d_Er7U4*cP?uuI7Bbb2|dki?CdZo5Rp1&$D>=nFwJbY-PeT2$C
z4?l$3VVqyz>)}7HUC{UVw_B?HdfJkETAqAn@psO7R)0)9>Wf7tU>A5I)~{bbXCmjt
z`3uClo}Y-1P*c&j~|E4rOoP@y37u%ee~
zRCI9Fq#9qp+silH-lkDu+{_@_rwu)w_TKCt^?ck6Bu_c{>Cfu9Gw7(r{%Ga+z0rH9
zCiqKsON*hutx>ilJP1u*3;0et&_&XK#
zoQ2wNJ^S$cJzAD(i`o7lZScl6UVO(cKUfyK|139r#KBpwkw8NFMVxuHQ>Lzvm!aZ=
zeKyMbsNEk7!&=G&uGPk95=f-GTUxt@ak&Htc?Rp(*&J{>np|r7PsE0KNbuF>3#7~
zs`{k4lIUGu`FZI}TAJFTjaNu7X6i>QZ*fryt);8A8H*mIR+c00OD>FWUNCWqtwiJbIx-qUl154U`vKNhMSc;_F*I^;faJKY0B&8#F=FOZuG@cizeDTnU_FzbTbTpg|
zOoa`Fxi;8bOj93AYKdRhL0bF47c`D~k2Mj^T`5;_nk#EA;*Q{?0W-yh3oC-`pE$>GyTIS+w~T{&`z9#nOY
z?KBY}LHVnNH2e?Z1I!TH$S=dmXA_IPQ+-If=vDmw)C8i)T6%jj%6_XQI4T9~-zC8j
zeljcyAr7}Rv1i+Idg1>I?2p>p%SNu+q{w@CI@aUQR{m?ep_b%A+g}??M;jAea+oOt
zSMwk_6OxA%`8ZkLH8t
zZ~QHJ4jkXQV3LVJ#fKAbR9YwP160VUD!T4-Na-rSx}4HNF=P50|Qm2?(&%4Xy4
zVb%itGuH?297Zu&^+YO-_nSDQ_onLtc8h7`Qmx1Sj&skvZLOT_1+9wD73G)Uy+z%_
zcWA3#zURxyIS-{7ZUIkgl{-#BB2f&fr~pYODaA$;Xu2~NHA@@S{C=A|Ic#M@;_HR8
zp-7K!A@wQ2@N%Y173c+(?Fp?BV+P$pyX!B8^YQoK+Ka?KRh+q2Q819j%qOC;v$t+m
zqy%=W`E5(f?Q{1%kKVwA?be;(7+ao|g%gp)%`0ejH9UOJJT)#|@{&DW@b6#>I&gO}
z05>N=3P}hMuioQ08dPjyc+MvmzvakfK_1ZgqdL57g*Bg*!#4;{+6-(tt4j6nLHf@=
z&;8z?-X)V(@HItW7$4w3-oiEF44#F;Nfh^O(SW{$?0a(0vWLHhc(N7YzOrn-mYT}I
zU$e|bzp_vHQg-;`?qhltQEt1aKTa~6*xjhW7B;j3{6N5;tEc!lihC6GmpQHT#ERqS
z@)%&`MeQz|RXk%*g&aM~4OW29{J8h~w82PJU})+UAd&93b8{SF^CtRx26UD!gKQ6J
z=Cv3Wlxm_ixdj599gF)t4KcT^q*M<~XL!5$d;C<06hs|fXXPKot~+kT|NDk$w_;_~
z24jy4!poFb-xSYhd)h+(9sqo8XSeN1ofRS?qxHu9=<!n?t5)V=uEU2ys$0Z9Bj6K*Mvp|LIEVSoHw06DkS_Emz?!2U`rCGpQZtL
zJ&D8}?~Bal%PR%$MQhzV$leL9Cl0R^jM2~-%O|diBwB*&IOK*tDUFiAVSVfd!oEK;
z8LU_~9W(Fj9kYjwDFq$2eh@)t$8anH>;H9K7eEz~WJL5DoNU)pcUGz<`+8mryg>_D
zABi{ujsC-v_bP&hZP#l?H1i=G!j`Q&M&fM?Zflpp7l(D+3Gqg2=Qwjp=Uo1;$=@yP
zUah^4wakb8rVq&=LGw1_-(F)qm9;Tlh2oOmo
zs&|o>Zf(EDRT)Fq5`|wx8q~U(7)dS0oN|yrGW4QVag36uYI1(O)#wcNorCLb{d
zt>9L*@G@$cY-E-2vqtZc)Zs2hqZkR{MsuUQRyot0`af~&q)G+dM2=Lqts1ADZH1JF
zaPhQ39!}o1PUJC^n%{)R0;>}bp{O!_kdT$f1|(ug-SU5lTMTiUnAmByT>o0w^wLEI
zl6smNl+u*qRDRT-AM$uE$mc90Wer8LZp-hrC<7cR1^v6jyX{6tzwPX8nw)#$Vep%a
zo1JVVZ+eSU`Fv)5U4FVklAx~K5=q9#X*F`uP;iG@I7MKOSD{8u#y{TNzuaI%v)+LU
z{MA}+`^AdumXJuw^rnijOjnS88u7;!Wku8JdTV`N6T|7qH*`d=rm*6+fP&s1oG@Mb
z7wVxYrRmGr9&K)E5@%-EG
z3Bs(K=C_dkIC~r6HVRA7?#JBoMzeQ+b4>cKBvPpA
z*?}igus#EAr`%w2Ekhb5pz3DwM1Db0E~R@rWX#uf?5nspzl2_2UgcSkO%8yYfM&^|
zBgohD3h0>s;=;kI4BDgAc7LaT0JgXV^E?343;p$mtQt1o948mwYxqt($ptHu4b8HJcc@aBj;7#26(FdT_?NY3i=X$v6|zllWXBj
zgOQl+L>jp}ri=D_Tb|*T=of&MwW71BPtNH4Pr@dqV#9vtGwKGL?k}1Bcesi(PNeEv
zCxQKnxXv#C6)nbh3A}p2>@=I>DDO&s2>IQV|1g=qGDO>jHRe`O;{aKFcMbH{DN6{d
zjIRS>?z`6w-la6wgN?C_Tu5@*#ok$ShfYZXK3AUfnzc(Z{6U)o0F4XR!)=n)2v84c
zcntN0Ci~^QAe%$6nulWZl`cuFwFO2Z-c>_RPZzh4htYT;03eeNuEH90J`HA-5gwA>
z$09PHeVyOAg63YLVSFs+Hj}@PLWLdIlo*vR<_a2|&uPfK{+B$?kt8&qTEZUI=5a3b
zM+uPm@GnS5ewV-<$&U}io{X)|6$`X~HO_SCt>EdTOPjO;4D6
z!WD!mQ^<`cXQ<`0KHU%2Nkdyq4=rWLl@7LXT$zBkTNXT=rEj3w>($4uQ_?d3GBK2ne`}
z7+x=P5S@ReI#!0AnI})8fLD#Gqw}yGC@>^Q-0g}-!RLr5T_r)DMh5pM9w~B`8#=-f
ze(O04qRnf)yi*oC0@Q4i`wJa)wG^}m^^K7aJR^K+3fRtF{o(G&@p^JSWnr<
z9;b-$y9#Z4!+R2upV6X6qP}VE6bA>)uk9;xLxUP4T{qBx+Is3C8zt46ZzjtRB1U8z
z#69RhuAO5v+njaUvDeQ7f**to#Q69Kua)*3=6QX6Sc}4nX|^_KwU)>a-g<)y{F-ia
ztx7uQOW}JxAmljV%wTo7xo)w|ec(#r}*egx`wW`SlQ)
zaPG^U9xeH@No8|i7YDY1HUkL+$D
z;aG12@|O>H@k7jOk#!l1HS7=dj|w(mNlfxDy#nl{R@039iFim;D_ASy^7ywVn&g0r
z^F7k@qpFSqfY=W;)i8C#w=n5+AP`RnBw^y;e3tEJ9A#^b10op(jp@~uIW>weWPnS&
zJN}6nMLfp`OnPZm8!s72`t}@FS)D|mojK7&Y(7jnT{`AQ&!zybwwV!OVg530>(PVcRSmpwe%4xkOQO+ox`j_v{^n{((7|yFs$HIi&+7<
ztJafsxA%0sPM>6a-Bn#H|MHqPs#wiU^i?>a1z8Z01$jK*xopF6o5oKf$@yHnM(@1_
zSXI0iJgFw+zW@5^rt{k#b`^>Vt^#Ce1})Rq>CD27RVL&h_e}KE_YB?^8>2zSV{fk7
z?UPD}wA+7;I`$>zOtI+}>WN?v*~
zqew#T+JrTsmd%d|WXKXi_E1$;obn8X(zz7EuELG03~E`2xlc$(guCKG9Pg-)TlI87
zglY*N(-&LdN^Qi*tVnP}_f>`xv1{qte-%n%4bN`Lt5#z7BjjO!H_
zfp;r{t>&Av@>S-#K`z_Z1BRQ
z)H51I7HQcMrmnz#V)rdJLcH;VENkBe{VE25>4oyk;btiDf{z#VD-9)_G6PwqVM6tr
zntw*Da)%vGSKnkTlyh_Bjfl9PxalXqIt-_eN*AIv`hx=eoheA4haG-V!;u`Ao}G=0
zUjZZz^|;3zz%hUAK4Nm+b)6l99d?RbfXU?=Z}w$22d=k46iCtF;X!j`%#jESuOfW}
z^H5=N#Om!*Rgi^fAYnG5cdo%flw>Y97e&Iz^Ljdiqg^ysh4}+@-USLo-m|C4w;(o^
zP?Dl3o0mrl1>iM!4gEJKpUllBN!C!1zU0c7KO!Pn!bX2I2QwLrrwFR7Z*48k*2N0j
zXp}Ed?w@tD%l$n0i>B?_=G!ZP{3Elh|Lt-Aqq{91Mg%7Y{*=q}KupO`4elU98~K*X
z=cBxb9fuZ6o02xD-|6{19wuFxq{i&3Etx3djcS1#
z?N1iFZcMsdP^+iSS_U}S833f@r7t_9{g%B2+lWkpz6IlMe8*k
zX|zrzYYSWaK&c(l1aQ<{{MlJV<2xrmFB8>L{iau&{#r~VfZP2a1|2Syly4UTc3+;$
zOOI^U7p73^d9P6)^ocrTjrsX#efq8%!_ILop1FXV!~ObH?0y*whBdsLYW{X**XX20
zecDR0k^OFY42|@6%7}Lfh<&7mb}fKV@}l{YvLFAW)*%WIcuNsNB#DUzl()E>UH9I*
zzQO<&t1BE=+_~~31BoOHna>w9d}UuB;_g%vyIaAvmadIh{?gn1iu-u9)-3R6b@~|V
z`&cn8WLiUEdi%WpiUyXz)Q?FAVhaaXdAomfy5`yg$m()wZW%yzI)ncOO$(7;r$-FE
zrUbI+&JSWZ1Rh8dREniP={cV+w;hu@_v~E7+!iZL@k){rvW*g~A*(Lz@<<>-WS)2X
z2JJ!SwZ$mFI~{?j=UVH2#Iy~bBpDiI!}f~E!&1x-me-P>7A7@QVoT6D2juA+?D05e
zCdlXvo_0l9__zOP)V$7`
z65HopYp{_BlFoBw%S)H^+uNeI5nKs*M?R3TY%TUMuDf82f8+q*>E+_@=
zz`W({3^g_4AG*K)!D(w-Sv=pKZAsmU@X&)~r94
z9FrAfF4TGrh4-^?@z>{vz`&5L@R#sWaF-d4t`OwxA-%{RBLWdwV5HaTCHpbevo|Ga
zT&rTq=Rbo$jrG$qUHAisC$c^_zPkB472HiMpf)AH=Wqv|lYiCAbp%Iz4K!g4in=rH
zEH%$GD9+;QOJatd&m4USpFJJ@NM?I@dg2AW+d^2{j+ChM`U?0j?rF%fe8EMcVW0=`
zSn~d1g({{IPKb3qy!)J(xgKZ#q#vgl!>ys=S+Q^Rf)y7j)%ys8A%dVZ!a+%3X4r
zgkZXeBipRsOK0^lKqd93SVhkJgv@)hu}kyNVlw2@3R8ZU@4A<&lRi!E@wH1Q6mj)6
zK5elcwyn@G?SC2u-%X^MyynSeOR=2ABvzNfPO*^ndwFpG;oS3iE@dA$#kE~(k
z$!R^eX$hN`w{PCq>T`3#l+)_QJf3>Snlqz%6qm)MTRH7oH)N1Qpal8y+gEcOBRY?U
zK}bN5u5Gb8gaz!!V!PI5QjzYcIfd)c2H&s!3H6V(=F05cHpv_#NP#c(;xhC#FS4$|
zZYO2?v60={=W=yEI-KB>k=vUR0$$RLNQOPR$xuk(yzkz^`^smE|ycD*}Ai+(QEcYY0DXSJ$E)gZk;DRsu(=O9re$O^CedzzQbRFdaL8*OVad_LE
z;FCG+8L~t?`x_hq3
zhC={q4&{7O+@Z(@k%fjxE0|
za>qP)02?VnDOztkIO<;dad>5#l;_;M8Q5PdefnrO6?S@>
z>aM8n<+-#N3=V7I2u4z8Qm#gerNi4`x|W9Z#nsJCAEH#PCH<^}sUQ(mcdO&4ApJXa
z#;*ClzuIhrEzfR9-ExzWT&LqPOE^ZGb89IK!qIHC(QZ_Ki8yuCba_~zcwFjF%~(qb
zsp2}^V&aG}AT?n>DWn4%L@6%jM;Mgsw)!=}|Ne|>6|vl0Eo8Bu!yc6z^W|%it&m;|
zasR^5JXz>yL{szCnVq*FPo0oNpTuk=&`oEu0SBX0C~d_~%$o(D&3`*Iwh0?~
z>J-=+@VKAY-t&ycbCNJUT-`yiNVESoDg#Pn+Zxk><(a=QracYCAs4@oAKMH;TplRBuX)1|;wt1yt6l)|&VeLOh2^Uif=U26yA=j)z;4^ezdceH4HG46G5g@v5!
zVco0gd}fcXF?|m>1dvzlY1f@s1Fzsl&3BZU
zqf6IaXup*xV-H8Ve}Xz2FM2|R{;-EPtQ-sO6>snuwF_Eq6S$8m
zQl_`@i|dsnl6>@OFDxLOG&z9
z@j4^=VqW!Y$>x%aj@rRLHmoIGqR1FJj_&8-r4#Sr8Uz`n`OdKUTA8^$!G?3TS0)$#
zj%z;^8xNUOca{87{T%)Cuv!DTy5mCAqY+?jyHzQOp+&T)XZkiuxH^xN|L40h$-u}-
zU)c?xt1W}O_NxLt`3Eb{*kV{gF}SM$6LA1pv{3+{^q0wlNwCoBo>
z9uf#HL9+Pbt_y_VZo%C>!QGwU?ymdp{rf*3;O#oKRi|oqcBH3gdZzoj+QmWI7^4?0
zqsy(MVxykVRayt*heL;lL&rlU{Sf|Ut~AlayZ$@U!4{0rBbS7mw#p9=cU!a~1X6wa
z-(4n}KV)#N84yarz8~b39n=gnS@bHzER%(-yC
z3Gji3+gso5;A=
z6c^2-8CVZbhikXcJ8*~#AjH1+4j0F5>x)TnDg5$B>_yLz(Yvo-e!l{MFLF`T?_{Pm
zw9q8LMx37|xQEp}lmP8rM%&R_MLO1+XR|at|
zL}gAaTB{pdin1GM`m?{RYt(&o3x3INlR4dsJ97HB8a+!xHp)0g%k5F(xoo)^R|Eeu
zsVD<_*#-LOct2z~UC;-C@1x$U+~8yc>*XNuN&fh;gcs;8BKOxN3IUy_`KfpSQd9~V`;=gnglL7NG4
zc8A;L#`Y&F0Szpm^X$x@bd*AX$=VwgcpFsnF0NZQ9FrbUv1I7wkS`Lf6Nla$r=hdI
zt~jGv!2-v52UidmJ%A8}SSRkcW}{+QxQ*42
zYMEKR2F9Y&c;$;fD;^1O9LTU>e;g(QrLWeqv)K2xQO?jIa^?|G?H%fRUOlbKN@ui|
zw>2g2D3tZX`!UnQ(MMy!>f4Ioi|D|RB;kWHRY_Yk?UvJ&3u1i0;Rh+#cf01JeEn&F
z&V6ZtK)pw?iIEK8H8~^Kg+!*dIJzMNK5yKXrpTIG)i;qOn6W799ppFmq&*-CqJq13*BL@phY2TGhzT?zpTJ&DK3>a1W4l
zAU+mfqo}n~{q~E?Bo5JU?^tE`*5rYW{&2n-+~{T#V>^Vba0OnK1{~;_qS~FTJSS_h_^9oGliH00-&lgzX9}kn2(odh7ixq3(%Omy
z>NM_j>bO8h-=#m#mxhu2L6*_x?%ngHmX@WZmgQc3&CS|DS=%(v&z@2hIi@$;7cM`>
zK+GTh{#oVS>DqF37aTvRL6I<5KkIj*{;K`n`GXI9@zzaw2+OkgH;*2{SU^W{&oHIH
z+v|J@fK2+cCx*Jyo14uot;~=)lN{$h+fq@_8e!H6&0i^rDG1RvWu(L^)2^>RjBGI$
zj{9lKF>)Dsh7}zaraUGIe>iHDM`q>AnoLx@jO2MycH8kT?&t2CJHG$f4EXQA>gF~L
zs_VvLf1_s(Ho7+>3(liSc@=l)OU1amy$qI16ykrLE7o)NM--erc
z`rG-uM@mA;B{>3RX#j;whx^S20$m6iGT^!pnHZhs63mkz*iG~+_vByYKvJsJwdU`r9s%*>B4h3Tpj0@ALv0#HW>eJ>boghZf
zfpQ<{HtH0BfIc^p*t4%%V#3KUfLsbb6IY+S*3N^r#^Y8JOrJ5d9(0~a7RPAP8V0)T
z;OGh8MWgSxv*(%e<|a{G2b}XNlYiIGXX?ClL2j*=9kJcLD|@sa0iNg~ARv&9pL%W$HJ`XQq2q_R>00JcIf
zyHRx2;|2o(AeF}Vriq##a4-~g?jaGiS~(0_mqo3b~cZM
z^_eWGzwrP*y=x9wuvyFMyWUd7l7WvZE7|QUePyC598gFuC(BKZYq#5vbWb
zvxs}4WZ-6x0N*1KypQTs_^O`ca3M|BJjw28l(-D3wR!&|TO)*09Qr-%M4#JgYN&C;
zUjfVh(l*ecELj?T5Sh_X+tG6te(|cPv7)4KDWB~j?Bsa?8;5ZZ@AtqNbE?m)$AYepn
z`p2@*+!l(bdgoMk+!w8&kaX`IWMm+H3j~JQ*g@Ct1~?=M`w)pXGDJZiM)1zXNHtCK
zdq%J>Ud`wN7%`w+Ej()CT5d#lM_?G``hSb-E
z&VY}5A2>#s7|LLxk!v6!J>L_CG90WU?j^$Ie?%h3{YA@)(@&&4ek8xZ~
z0dGp0Crw`{Ik?O$?nl`gw$qDY82s_T|v8t6LopYg=
zR1hL6yuk4$Z9zac+Q^5@T(SKN3bEihaIQ2Oi%gBNa^lqxP$)cd#O!_7E!PWRwE5Fv
zO5heu?_nr~9N#m6H{B464>D2>rDEZ>%ySfi$a7$1WTobPyV`3!1zaYk`Iu(8f*}6G
z``hqn@kRH_nuP@x4$rl@{m~4)hxyf
z;DZ4B%6T+p3s2|S7&FlMqaxDHG~&h@41^CefAu5WaDVkOXAh{QSx`*F00YEeR7ze$
zOD6fk+UY~b?*PqL&9xc(w)^{H`x)DXiU*zVJmvAr?uVD9bf^TK!gAYK+Az>=jqstD
z9uF!YnEI+S=VRoJKq8WljGi=^ZKd;hsy!`n?rdLEN*t;$YTJQu-&u=P*4SN~60s{%
zEC>wvfGS+fmAo(JgDLsTR%2SfuWDB7$4|CXd%;jmD}`k2Eo>lGC}5)Gn8NEiT**x&
zR=*JJaR^Spnr!H9#hk&DzEhv=Z!viHJy+YU=~GZ-3gobPOhz5FH%J!7;D<#Td5oAK^AoLg@3`6VdGttpL(-*BL
zMm``6KN(mq*DCdJB3IeN}^hC~!+lcGEW`H4qd3E2II!X~wdLduJ;Q*JU5rhS$_thWLjAFP$(=Gx
ztnd5=x`^mCgis2k^IP-1>wj*l3umMEI-L8yRCG9f($;=$V^TSe)wjXH#X0jgXt(eE
zPEuv9Kkft?Wz&5)@LR&aqfoKu$Lf+*p24fan}oMURW5bsr3H|0=JpHmX|1n4zA6P;
z$;&v*CTxhGdQ>Fc
zna;fkMN_91z7XEecC_h_iDmpp(+Ef+3;*aV9A|8tJZN{l@vk-KBCWsh0d*}+{8<(}
z?fyC3R-zAS;du{YHR!#xUJQp37phZYKOMJ$kyY+P)*vI8B`eiyX*X@pTeo-atC_B0
zbQq%v!?d;y1eK4zTR9BS=Bf)x46@{x+^Dxv9|%Q7t*rO{HLmmq1DQF)0X1P2G3jWE
zn@ALDmKOH5C=wX2O{-30I@*dDT!lL819$Q&=+c&;d;ic>rJi3#)YmQv{%XA*oL((i
ztvTyW-N^gV)9&XZ&i8=x7KGt*jZ4qQ$~HDuUFD-ykVni}-LL&q!?7pxCQS|lle2zq
zW@3$U8}hNO
z$ao$LQp!y-YG-vZ!;wO4eZc)4Uf#^$_FdRZk=hJ)`D)l_is4T|e6McHP*Kr4%1tfZSKQhQ6RhZeV-=op6bLV8fZL7IJ?tqwA
zfgEDqkYM|xhLpM-K|mtL`o3mXHyQy9Lz_8n@xUR@g=s4BuOqm9<)}E-@d5!#W)DA1
zk5Cbk8G<@pDF+LT{4_LzPZh6jrrEbDwqyDL32G)|dn%AB{M=tL&t4H%
z=4g94IIr&a%JF$UY#TqfTt`U9gVeIHew|K0#J4uLHxaVEy?Hp~uFuI0{bt+t;dcHn
z%Hgw6LK_^`w0PS7{kJNw>=<{|&IGCtDu56Cnv2+?rCO=JZwysTfuASN&Zbs+fMj0t
z{>B`&f9!__2njU`xt+YBrt-RQ>PabU0RRRd3n%&Ud{m_U;T-d-sC?D?e!1oRha_?s
zusilQ3e2yS!6|Cra)&g?akcqqPfa_uXK+eKj^XIg@@Vh26)5}((3Jq$#!{u7g0RiA^p
z?OwnU&Pl{4PDI;QB*RlBt}jvC&4guP3MA7aUjPY(mP~BSjEC)O17k6S6We~UV_QBP
zf_+G2s3tezj;3}aM2QKbo5s#lzZ9m#R3#>m9$$`4xL1m0@|?9~Dq<`;E~Jb3vsm*Y
zME{BtVK^+@P8bs$!`Mx8l0G)yaxgWAiau^YdC*CZQtM%TMUKEkMA8Lq_@}yqG
zRhkl==Qx@Xu^^Jq#c4LG%wcZA3B1BYlcAk!=TpWO9jKu6P|tF+CNU$KAfFlRpl=|`
z0?>uXgRkSYi4$kP&_92^X+18Kr)6HjRZ|Qm)
zrr^I!4%y<GL)E%Q1?^Rcj3OgTv_Ue${giHS33lIkaJ
zmfml`gv9m-hu&{K;>+V7$*F5!Bo}j(CU!|NUMgTHg5#{L%7_yod@g@_!rYtn6{7Hv
z8R+QVh)&tw+;lP3)fVO|5rbCqUW8_Y=(2alN1!-h7;Kl5qlv{2ICMQu2Ex!AkPJ7W5Q^ls$Ohq4Wu-(J5KS&=A)AWV7Com4xC^uF7(r84)!b
zV$k1TErus8gjX;nBh#Z6nXshjwspsOv{wPV}sj62>JnvH}2
zH9kH8$+GLEPH0Xsv0Lfizr(8E>D@Wd)@{RHt+$HyBBACDxw;JEl@H^Hv^<3*!T#nk
zsYmj;q#sKsh^DfJ;V1nZnbk08)H<@)paX9TAzexaNkq+?4m(T63{m?_ThT`K_y=
z*it9R75@{rz(@7HxwOrtOW$ZU0;Ib(N%`$OMA)zA%KVw>a@6A%l``1g{YY@@91Q&;
zvoFz>zpn6IJ6@us*v6r`9|=XuW3>zc>l4WQhD~lp!wBJwqA+%DyaEv*oi7Z(N{M^G
z)B7k-C=(Epa^k0MdfDOpkoQsBYVlEDMiM`8W_|FeY3-wysPOw=AW6gzju#W2^i^bJ
zEVgnd_muUOze*b#QYucOVo;rI0obo0Z4Fz!?IV#wO;4Gz4C@mUrjfOL>1B+dm_#D`
zS>z*sItfCwXi8s$jF$aD+F5atMrU{ycMcKj%g`+H_J=_cM97hie*0bG1bkDa3$CK$
z_;Px|{c2*mY?7#UR=`=Owdgg0*U7-+PAo8{qxVIvXV~L5R+SqDY}Q>y41AC$W+Lco
z`$~x~g`Yw(qx1dD-STD;Tg>H3E*L+S7^&WZ_mLkQkBaH3NXo$WdSOA&$RVqYoe1>R
zTCrIS#84*Rjsqmhu<@d^5UDH+Glr9=2~5-Y
zR8$1HzR!G;GM*8=M$l*HQF+Pn17;NDb)xmWg?+us2ddbm6>n)TV9MV=NjPWE^edze
zOr;#Ki|sh!-B42c(6m_tF)%Npr*{|f8r%kaP&3tV5#(#k`X;li(XYZABbe-sN)Z&G
zQhpePqhpRB`bQ;4tl50A2tRH48=iM<)1@(>mxl0}i=+!=0zQX{T!OH#8Bq7BFDANm)mc}&3x`t0
z_9m4ptbr}=Co7D>Sb8N|#aHW5%cT0EmLIgx6c4VzHyPreUgWZdw)&l#wb6xThtP@g*Hl-R{ceb?T~Ii`
zrheQ?mEG2tt1x!Ik$|ycJU`ez7rKz9u54j|vv=Wi(UhJ$f7YhX_*PRt>;5zo*$;DU
zgC`ihwKlCtKa5f?*LTexD;B+eSyx23YMqf1ZZ<0$o`$)H&bJ|fae(S2yU`k-2Q8ZuX+b=_0O*G!coXO`c~
zEfHz(mgkRJOk92WpMk29+UwJiC$rL~y^A0MplOT@$4s=<%RX*;fIlJq(OccO_wU_t
z7GZoUeTr3aO3I;K8{AX?6#7MZh2g)?GJ4S6y0WUXj!jGHp`77Yk-;j`dOJ}qRg>5|
ziZ}9y9`_%!Sut9G+|Eoq3_JFwDbs2_N_(o6hU3)1egf3)w@Di;6l_sjuU-l0m%i~3
zGe77Ln@|e$+eShz7;a_nGOY3NG9nqQ(z3qluMVy|DnpTVo+|9LjB*nBp@C52x}4|B
zpE%~F-$Hf4WZEtgW>U0mr0x-VqX1_5UF0&OnulSV^QCO4<_*l-pSYgU>+
zQN@lPr8!A|Mr5vpDfIBS;6XnUF))#7EHmGXdF$M%cD(1@@+*dHAi}zF>gz&x9Qhe{
zlL)Xj+s#Z%o)^}!wXdEk
zF8Y!t4GnQoU1xiVtLiLR-Dlaie~{wg2JTxxj@xg(!b8nWLa>*)gkf8YR8j
zSoEqZSloD@GWOW?_@z%Q*sr;%C8)Of9-9xvFXUGeA4%Dkt+->`%0SgjlX29mDSmKh
zze02U^Sv3RwXF!$0lG56y>L?|6(FO!i`!73a6pYn#*@j&C^5de*X%oi%o1A7;)$W-WYrbW>0)qVv;ie!u1LY4&%-Q?sJi=t>z5
zVJEO?R106su>V!U9~@_WQZZ;53c{3t^?f7+W9y&w_V$dSi{G6dw3>02tqyeNRu)w-wOe3@U`nAO&^eg0ByuBI_Ar@{Je^-0a_Kf89g
z+xayx5_52e>Bcs7kT10Qm9lAc3Hzt{-8z2gAeZcxEx(m_^WDC?gS7{lCAX
zC#svzTb(6=;Z;95;a~UukY?x!@ppfG;M=r3JpMd4s+hPMC`eRAT@*RAgq7mbV>-&)USqlLE>*R#R0k+7Y&
zifA)*s~pajER{{QZ(^G&{HmPh|=Rl
z#!uW#BoOAE|85ww%+*W(k4f_DhOdJ7heJZExKo)HdgNEC)QQ>^iHmjZv
zm6yP;cr*K_@3C25mc5)vIrVuVd$S4eCXKx9R2gu90i=y@WxtAtpdMR(cQ>uqmf-tv
zEVU~=1$=yfTF7fn@Mce$rv2f}#hjwVYePzf_lOJSpNPwzkvS%!M{%-&0B*N6^^2mX
z6VWEq?=us&Z*3$#$^8;9#c0y5bJ-H@yujzZEpz(_!&=pS2U$B=xxGk;Z|0eH4@Bs~
zZ%pNK54+Q8dt;-f&uie7d}zcU?3h=yh))Vi*9t%^MrOw48ZJ|l5z45e+DGXLoN_v^H5&FI-G
z6acuLm%_|x+gUa@FLcAJUvavgj~bJncS^kYqvUydwUvebzTxEfF9OiC6*~QbQ%H@H
zP5WT!q1}7q84c^zNYaC<*Y+}=_`6zb%vc&!@Z_^X^ye;gF7Gw}=Kjd?rFzrx?7xGw
zx0&A-jMEL@v&tzwe$z#GbZjakS~PAK>3_p_hV`yy4JIR^S5i&r$h>JQ~`w-pRxQ5r_y(*v3PCwTC=B^z5
zi3pLC$@A@5L)vJ)d^X
z<=dwlC)K*1Ws~5ELgW&EPu?VTph~<|J)<2BA2dBUzB_*m;KHJPKdvh^=sPjg;xrb_
z_@{JnR9VN#yDP~07o47
z?fOuB&h~cZ?uQ&qXd5gbf?2cX#PFboo@3u6?P2hQOL4%y(B-4BP~I1LAv6irljPWE
zNs8~h@bdt^9Tv~;PahzsPT??fYYf0IUtUO>?XmI080d8Y7)`csv+6rfj=6|%`iiSb
zS29ffrLIB=bDy|fO#Ec-y0J(vX8YEwW;A6FO{@YOY|P0)q|~D;TijfnXgp0Mz`@4D
zx;YSWZ;+D%fMRW1)MkbV7Ur^0a^i^{j?Bzlm{Stz{M0`Le3!!`!N(^o%o22xPD`47
z(JQx04&bNd=kv!EMt;QBL_~blU90Jae~7{F?863kPx_lZ>EkD)(7NxN&iyV)*kI%s
z=BK-=EJ7iaLLlG67AFumE2_PC7zbjbv&*h|4dcfon6TU~^k~J2E8Ou(E%k#;Y=X+Q
zwi}}`T=lqd(2GATLAP@DPCW;S>>O0|+T>q?|6~gjQInGwUM>4T1hnG?D2|XZVVTNg
z@x(+W$m1(`?>D2m@pevI*7E16D*oQOkUso_?95PFEOHBWXo6h>A{*JdF)tQ1fj~
zD>8Gzf(w{lsDbQvPzV`3pE$=?3_MGFIAIE24mMUbI*XludQo4qN}VU~TfYel`K8k8
zhYUnl{%)#kG^7z>I}7tHA-?WWtR
zs1b}B81Q%C(>GbQRNq&vX&f#`rZNEqEmg}K1h3uxWX6JE{zf^egxxdeMud>tYMP>8C!NOqx
zvnZzq4q&9OAKXtLPKN&*6&U||U}5)DO1-O=7}IBN!J4F$zg*@;0p64zRgIE8#`r+T
zxZdP;EIC8AKQRE%IDIUhXTtj!F$L=o(YGU>)p6A;ei^QuP@iOaHtwsCj404Kr(tIE
zlu*V&?-Y?ZQlyaHetvg{VhI5D=F(=mt$}nBnaEvV&~xvMsBr+Bqrb3k6tcW)o+#GH?4-O1TCbMuLQ~%5fsYF%XdUsOHwPstM#0*&4nCV3Z9ndyoq+aRR@P
z5T*~vCA1qoi2e0xO`_&hN(qgh#6Y2>KcUy&WbiI`J;WKKDVGfXk_spb>RM;UV?hQF
zGQ5aZy1ZHOZbqQHIO?ZZf7~C!0Ozv3<#uuKyg||}F4G`8GLpeZB}nFHcqhLGr`K0^
z(~KMk`+=~O~ryaa8Y`ZV=;{
zcP;0lUXTKkh>^|B{d325Ow;$(y0q13@-=;^%08o75c3bbZ|8Nyq_g_V$dWM&za;y|
z-ASg2n8IQLd>U#tU7^eL!W9nVsYV1objXCr7HL}AtCpt
zA#b6_cbNQNQ~oNwV3xbri$pdrYj@94j7RIiQ^HceY>$!O4ukFUhX;csNZ!-E=9FR~
zD&gSMoGw**O()EzL-c8pdOvp;I9*uOqp&@no07)?eE#U)YbCUP-wxVO4#F*9#rmj(
z4U0=nm}Qc+XqoxB0HYw1A}pHvkdGUAlAiWg%ed(6f*7GBK#(fT@Gkd8h6q8k>cU$$
z@4n9zBWk1nv06GIhLH0@kD}~ny{lVj?v^i#TyC%m(4o6;{mIlq#x*kt$$?k%r*>uX
z6jEqwwUTp^{z62mF#YRKBaI6w)*R=*;zIx!5F=BUmkq{Nion+5Ms0{lu=V2vBgMOlIjMA;UCRKwEWP%kS}_I67{V&?1yCm&8j3Kk-lYY>M_W8PplB1jK4ybgCI^
z>aT9&fE6O6F*T5VT1)rkWWy6dGHi6*@Aw*LA9^3EW{o)PYa5yTB=F;5No4sj|4oZh
z+Y44~0#!pkGpFKt#{VWMVTXvYNCY#tC|^tQZ|R={gIh