DonatShell
Server IP : 180.180.241.3  /  Your IP : 216.73.216.252
Web Server : Microsoft-IIS/7.5
System : Windows NT NETWORK-NHRC 6.1 build 7601 (Windows Server 2008 R2 Standard Edition Service Pack 1) i586
User : IUSR ( 0)
PHP Version : 5.3.28
Disable Function : NONE
MySQL : ON  |  cURL : ON  |  WGET : OFF  |  Perl : OFF  |  Python : OFF  |  Sudo : OFF  |  Pkexec : OFF
Directory :  /Windows/Help/Windows/en-US/

Upload File :
current_dir [ Writeable ] document_root [ Writeable ]

 

Command :


[ HOME SHELL ]     

Current File : /Windows/Help/Windows/en-US/secpol.h1s
MZ@PEL!@0k@.rsrc@@.its @@0	HX||4VS_VERSION_INFOStringFileInfo040904b0b!FileVersion1.00.00                         l"FileDescriptionCompiled Microsoft Help 2.0 TitleBFileStamp353734A101CA041F4JCompilerVersion2.5.71210.08579VCompileDate2009-07-14T01:05:41      >TopicCount3I000000000000ALegalCopyright 2008 Microsoft Corporation. All rights reserved.CCCCCCCCCCCCCDVarFileInfo$Translation	ti475RwgITOLITLS(X쌡^
V`   x )CAOLPHHC ITSF #95	-Y쌡^
VY쌡^
VIFCMAOLL)IFCM AOLL//$FXFtiAttribute//$FXFtiAttribute/BTREEq/$FXFtiAttribute/DATA/$FXFtiAttribute/PROPERTY	N/$FXFtiMain//$FXFtiMain/BTREE/$FXFtiMain/DATA/$FXFtiMain/PROPERTY#N/$Index//$Index/$ATTRNAME/$Index/$PROPBAG/$Index/$STRINGS',/$Index/$SYSTEM}D/$Index/$TOPICATTRW0/$Index/$TOPICS=@/$Index/$URLSTRSR/$Index/$URLTBL%/$Index/$VTAIDX/$Index/AssetId//$Index/AssetId/$LEAVES'/$Index/BestBet//$Index/BestBet/$LEAVES'	/$OBJINST/assets/0/assets/279d63a1-e0cd-46a1-92f5-09b944f80fa0.xmlts0/assets/7177b781-6e07-484a-8945-3a2cbf407eaf.xmlg/0/assets/8de05792-3165-416f-828a-422e9d463cd3.xml/secpol.h1c/,/secpol.h1f[/secpol.h1vk/secpol_AssetId.h1knk/secpol_BestBet.h1kYk::DataSpace/NameList<(::DataSpace/Storage/MSCompressed/ContentDR,::DataSpace/Storage/MSCompressed/ControlDataT )::DataSpace/Storage/MSCompressed/SpanInfoL/::DataSpace/Storage/MSCompressed/Transform/List<_::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/i::DataSpace/Storage/MSCompressed/Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/InstanceData/ResetTableH3::Transform/{8CEC5846-07A1-11D9-B15E-000D56BFE6EE}/iDp)UncompressedMSCompressedFX쌡^
VLZXCHH<?xml version="1.0" encoding="utf-8"?>
<procedural contentType="Procedure" xml:lang="en" xmlns="http://schemas.microsoft.com/maml/2004/10" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ns3="http://schemas.microsoft.com/maml/dev/command/2004/10" xmlns:ns4="http://schemas.microsoft.com/maml/dev/2004/10">
  <title>Change password policy settings</title>
  <content>
    <para replaceWith="mshelp://windows/?id=0a4626f7-b6a1-4c31-8e0c-ee57c13ea6eb#help_file_disclaimer">
      <notLocalizable>__elbasuer__</notLocalizable>
    </para>
    <para>
      <phrase replaceWith="mshelp://windows/?id=86a8f01a-68ec-4521-91f1-bf93996ba85f#lua_mustbeadmin">
        <notLocalizable>__elbasuer__</notLocalizable>
      </phrase>
    </para>
    <para condition="IsMachineOnDomain">Because your computer is on a <glossaryEntryLink><linkText>domain</linkText><uri href="mshelp://windows/?id=d373ac43-ecac-43bb-884a-e78e6e2c7b7a#gtmt_domain_def"><summary>View definition</summary></uri></glossaryEntryLink>, only your network administrator can change password policy settings.</para>
    <para condition="IsDisplayedInBrowser">If your computer is on a <glossaryEntryLink><linkText>domain</linkText><uri href="mshelp://windows/?id=d373ac43-ecac-43bb-884a-e78e6e2c7b7a#gtmt_domain_def"><summary>View definition</summary></uri></glossaryEntryLink>, only your network administrator can change password policy settings.</para>
    <para>You can help protect your computer by customizing your password policy settings, including requiring users to change their password regularly, specifying a minimum length for passwords, and requiring passwords to meet certain complexity requirements.</para>
    <procedure>
      <step>
        <para>
          <shellExecuteLink>
            <linkText>Click to open Local Security Policy. </linkText>
            <command>%25systemroot%25\system32\mmc.exe secpol.msc</command>
            <summary>Click to open Local Security Policy</summary>
          </shellExecuteLink>
          <phrase replaceWith="mshelp://windows/?id=65c34c9e-e37f-4395-b3c1-483031afce03#altnav_local_security_settings">
            <notLocalizable>__elbasuer__</notLocalizable>
          </phrase>‌ <phrase replaceWith="mshelp://windows/?id=0e88efcb-0f3f-4a37-8ccc-331c81b96adc#lua_prompt"><notLocalizable>__elbasuer__</notLocalizable></phrase></para>
      </step>
      <step>
        <para>In the left pane, double-click <ui>Account Policies</ui>, and then click <ui>Password Policy</ui>.</para>
      </step>
      <step>
        <para>Double-click the item in the <ui>Policy</ui> list that you want to change, change the setting, and then click <ui>OK</ui>.</para>
        <para> This table lists the password policy settings that are available, explains how each setting works, and provides a recommendation for each setting.</para>
        <table>
          <summary>Table describing password policy settings and recommendations</summary>
          <tableHeader>
            <row>
              <headerEntry>
                <para>Policy</para>
              </headerEntry>
              <headerEntry>
                <para>What it does</para>
              </headerEntry>
              <headerEntry>
                <para>What we recommend</para>
              </headerEntry>
            </row>
          </tableHeader>
          <row>
            <entry>
              <para>Enforce password history</para>
            </entry>
            <entry>
              <para>Prevents users from creating a new password that is the same as their current password or a recently used password. To specify how many passwords are remembered, provide a value. For example, a value of 1 means that only the last password will be remembered, and a value of 5 means that the previous five passwords will be remembered.</para>
            </entry>
            <entry>
              <para>Use a number that is greater than 1.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Maximum password age</para>
            </entry>
            <entry>
              <para>Sets the maximum number of days that a password is valid. After this number of days, the user will have to change the password.</para>
            </entry>
            <entry>
              <para>Set a maximum password age of 70 days. Setting the number of days too high provides hackers with an extended window of opportunity to crack the password. Setting the number of days too low might be frustrating for users who have to change their passwords too frequently.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Minimum password age</para>
            </entry>
            <entry>
              <para>Sets the minimum number of days that must pass before a password can be changed.</para>
            </entry>
            <entry>
              <para>Set the minimum password age to at least 1 day. By doing so, you require that the user can only change their password once a day. This will help to enforce other settings. For example, if the past five passwords are remembered, this will ensure that at least five days must pass before the user can reuse their original password. If the minimum password age is set to 0, the user can  change their password six times on the same day and begin reusing their original password on the same day.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Minimum password length</para>
            </entry>
            <entry>
              <para>Specifies the fewest number of characters a password can have.</para>
            </entry>
            <entry>
              <para condition="IsMachineOnDomain"> Set the length between 8 and 12 characters (provided that it also has to meet complexity requirements). Longer passwords are more difficult to crack than shorter passwords, assuming that the password is not a word or common phrase.</para>
              <para condition="IsNotMachineOnDomain">Set the length between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a word or common phrase. If you are not concerned about someone in your office or home using your computer, however, using <foreignPhrase>no</foreignPhrase> password gives you better protection against a hacker trying to break into your computer from the Internet or another network than an easily guessed password would. If you use no password, <notLocalizable>Windows</notLocalizable> automatically prevents anyone  from logging on to your computer from the Internet or another network.</para>
              <para condition="IsDisplayedInBrowser">Set the length between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a word or common phrase. If you are not concerned about someone in your office or home using your computer, however, using <foreignPhrase>no</foreignPhrase> password gives you better protection against a hacker trying to break into your computer from the Internet or another network than an easily guessed password would. If you use no password, <notLocalizable>Windows</notLocalizable> automatically prevents anyone  from logging on to your computer from the Internet or another network.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para> Password must meet complexity requirements</para>
            </entry>
            <entry>
              <para>Requires that passwords:</para>
              <list class="unordered">
                <listItem>
                  <para> Be at least six characters long</para>
                </listItem>
                <listItem>
                  <para>Contain a combination of at least three of the following characters: uppercase letters, lowercase letters, numbers, symbols (punctuation marks)</para>
                </listItem>
                <listItem>
                  <para>Don't contain the user's user name or screen name</para>
                </listItem>
              </list>
            </entry>
            <entry>
              <para>Enable this setting. These complexity requirements can help create a strong password.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Store passwords using reversible encryption</para>
            </entry>
            <entry>
              <para>Stores the password without encrypting it.</para>
            </entry>
            <entry>
              <para>Do not use this setting unless you use a program that requires it.</para>
            </entry>
          </row>
        </table>
      </step>
    </procedure>
  </content>
</procedural><?xml version="1.0" encoding="utf-8"?>
<procedural contentType="Procedure" xml:lang="en" xmlns="http://schemas.microsoft.com/maml/2004/10" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ns3="http://schemas.microsoft.com/maml/dev/command/2004/10" xmlns:ns4="http://schemas.microsoft.com/maml/dev/2004/10">
  <title>Require strong passwords on this computer</title>
  <content>
    <para replaceWith="mshelp://windows/?id=0a4626f7-b6a1-4c31-8e0c-ee57c13ea6eb#help_file_disclaimer">
      <notLocalizable>__elbasuer__</notLocalizable>
    </para>
    <para>
      <phrase replaceWith="mshelp://windows/?id=86a8f01a-68ec-4521-91f1-bf93996ba85f#lua_mustbeadmin">
        <notLocalizable>__elbasuer__</notLocalizable>
      </phrase>
    </para>
    <para> You can help protect your computer by setting policies that require all users to have <glossaryEntryLink><linkText>strong passwords</linkText><uri href="mshelp://windows/?id=25e83a66-303b-485b-be94-0ff70cc14fc6#gtmt_strong_password_def"><summary>View definition</summary></uri></glossaryEntryLink> that expire after a certain amount of time so that they are changed regularly. You can manage these settings in the Local Security Policy <glossaryEntryLink><linkText>snap-in</linkText><uri href="mshelp://windows/?id=28672751-ea48-4217-85b3-7006a7c611f0#gtmt_snap_in_def"><summary>View definition</summary></uri></glossaryEntryLink>.</para>
    <procedure>
      <title>To require a strong password</title>
      <step>
        <para>
          <shellExecuteLink>
            <linkText>Click to open Local Security Policy.</linkText>
            <command>%25systemroot%25\system32\mmc.exe secpol.msc</command>
            <summary>Click to open Local Security Policy</summary>
          </shellExecuteLink>
          <phrase replaceWith="mshelp://windows/?id=65c34c9e-e37f-4395-b3c1-483031afce03#altnav_local_security_settings">
            <notLocalizable>__elbasuer__</notLocalizable>
          </phrase>‌ <phrase replaceWith="mshelp://windows/?id=0e88efcb-0f3f-4a37-8ccc-331c81b96adc#lua_prompt"><notLocalizable>__elbasuer__</notLocalizable></phrase></para>
      </step>
      <step>
        <para>In the left pane, double-click <ui>Account Policies</ui>, and then click <ui>Password Policy</ui>.</para>
      </step>
      <step>
        <para>Double-click a policy to change it. </para>
        <para> This table lists the password policy settings that are available, explains how each setting works, and provides a recommendation for each setting.</para>
        <table>
          <summary>Table describing password policy settings and recommendations</summary>
          <tableHeader>
            <row>
              <headerEntry>
                <para>Policy</para>
              </headerEntry>
              <headerEntry>
                <para>What it does</para>
              </headerEntry>
              <headerEntry>
                <para>What we recommend</para>
              </headerEntry>
            </row>
          </tableHeader>
          <row>
            <entry>
              <para>Enforce password history</para>
            </entry>
            <entry>
              <para>Prevents users from creating a new password that is the same as their current password or a recently used password. To specify how many passwords are remembered, provide a value. For example, a value of 1 means that only the last password will be remembered, and a value of 5 means that the previous five passwords will be remembered.</para>
            </entry>
            <entry>
              <para>Use a number that is greater than 1.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Maximum password age</para>
            </entry>
            <entry>
              <para>Sets the maximum number of days that a password is valid. After this number of days, the user will have to change the password.</para>
            </entry>
            <entry>
              <para>Set a maximum password age of 70 days. Setting the number of days too high provides hackers with an extended window of opportunity to crack the password. Setting the number of days too low might be frustrating for users who have to change their passwords too frequently.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Minimum password age</para>
            </entry>
            <entry>
              <para>Sets the minimum number of days that must pass before a password can be changed.</para>
            </entry>
            <entry>
              <para>Set the minimum password age to at least 1 day. By doing so, you require that the user can only change their password once a day. This will help to enforce other settings. For example, if the past five passwords are remembered, this will ensure that at least five days must pass before the user can reuse their original password. If the minimum password age is set to 0, the user can  change their password six times on the same day and begin reusing their original password on the same day.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Minimum password length</para>
            </entry>
            <entry>
              <para>Specifies the fewest number of characters a password can have.</para>
            </entry>
            <entry>
              <para condition="IsMachineOnDomain"> Set the length between 8 and 12 characters (provided that it also has to meet complexity requirements). Longer passwords are more difficult to crack than shorter passwords, assuming that the password is not a word or common phrase.</para>
              <para condition="IsNotMachineOnDomain">Set the length between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a word or common phrase. If you are not concerned about someone in your office or home using your computer, however, using <foreignPhrase>no</foreignPhrase> password gives you better protection against a hacker trying to break into your computer from the Internet or another network than an easily guessed password would. If you use no password, <notLocalizable>Windows</notLocalizable> automatically prevents anyone  from logging on to your computer from the Internet or another network.</para>
              <para condition="IsDisplayedInBrowser">Set the length between 8 and 12 characters (provided that they also meet complexity requirements). A longer password is more difficult to crack than a shorter password, assuming the password is not a word or common phrase. If you are not concerned about someone in your office or home using your computer, however, using <foreignPhrase>no</foreignPhrase> password gives you better protection against a hacker trying to break into your computer from the Internet or another network than an easily guessed password would. If you use no password, <notLocalizable>Windows</notLocalizable> automatically prevents anyone  from logging on to your computer from the Internet or another network.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para> Password must meet complexity requirements</para>
            </entry>
            <entry>
              <para>Requires that passwords:</para>
              <list class="unordered">
                <listItem>
                  <para> Be at least six characters long</para>
                </listItem>
                <listItem>
                  <para>Contain a combination of at least three of the following characters: uppercase letters, lowercase letters, numbers, symbols (punctuation marks)</para>
                </listItem>
                <listItem>
                  <para>Don't contain the user's user name or screen name</para>
                </listItem>
              </list>
            </entry>
            <entry>
              <para>Enable this setting. These complexity requirements can help create a strong password.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Store passwords using reversible encryption</para>
            </entry>
            <entry>
              <para>Stores the password without encrypting it.</para>
            </entry>
            <entry>
              <para>Do not use this setting unless you use a program that requires it.</para>
            </entry>
          </row>
        </table>
      </step>
    </procedure>
  </content>
</procedural><?xml version="1.0" encoding="utf-8"?>
<tutorial contentType="Tutorial" xml:lang="en" xmlns="http://schemas.microsoft.com/maml/2004/10" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ns3="http://schemas.microsoft.com/maml/dev/command/2004/10" xmlns:ns4="http://schemas.microsoft.com/maml/dev/2004/10">
  <title>Monitor attempts to access and change settings on your computer</title>
  <content>
    <para replaceWith="mshelp://windows/?id=0a4626f7-b6a1-4c31-8e0c-ee57c13ea6eb#help_file_disclaimer">
      <notLocalizable>__elbasuer__</notLocalizable>
    </para>
    <para>
      <phrase replaceWith="mshelp://windows/?id=86a8f01a-68ec-4521-91f1-bf93996ba85f#lua_mustbeadmin">
        <notLocalizable>__elbasuer__</notLocalizable>
      </phrase>
    </para>
    <para>You can monitor (also known as <newTerm>audit</newTerm>) what's happening on your computer to help make it more secure. By auditing your computer, you can tell if someone has logged on to the computer, created a new <glossaryEntryLink><linkText>user account</linkText><uri href="mshelp://windows/?id=ca5d36ab-2fa7-49bb-bcc1-fe25cae5fef4#gtmt_user_account_def"><summary>View definition</summary></uri></glossaryEntryLink>, changed a security policy, or opened a document. Auditing doesn't prevent a hacker or someone who has an account on your computer from making changes, it just lets you know when a change is made and who made it. </para>
    <para>The following table describes the different kinds of events you can monitor. If you choose to monitor any of these kinds of events, <notLocalizable>Windows</notLocalizable> will record the events in a log that you can look at with Event Viewer.</para>
    <table>
      <summary>Table describing events you can monitor</summary>
      <tableHeader>
        <row>
          <headerEntry>
            <para>Event</para>
          </headerEntry>
          <headerEntry>
            <para>Description</para>
          </headerEntry>
        </row>
      </tableHeader>
      <row>
        <entry>
          <para>Account management</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone has changed an account name, enabled or disabled an account, created or deleted an account, changed a <glossaryEntryLink><linkText>password</linkText><uri href="mshelp://windows/?id=45cf5840-fef0-4b98-9bba-f06e528bdb03#gtmt_password_def"><summary>View definition</summary></uri></glossaryEntryLink>, or changed a user <glossaryEntryLink><linkText>group</linkText><uri href="mshelp://windows/?id=726d2cda-7a04-43dd-b96f-4c12de074393#gtmt_group_def"><summary>View definition</summary></uri></glossaryEntryLink>.</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Logon events</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone has logged on or off your computer (either while physically at your computer or by trying to log on over a network).</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Directory service access</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone accesses an Active Directory object that has its own system access control list (SACL).</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Object access</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone has used a file, folder, printer, or other object. While you can also audit <glossaryEntryLink><linkText>registry keys</linkText><uri href="mshelp://windows/?id=eb5bb8dd-ee63-48bf-a2a3-3309eaf1d308#gtmt_registry_key_def"><summary>View definition</summary></uri></glossaryEntryLink>, we don't recommend doing that unless you  have advanced computer knowledge and know how to use the registry.</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Policy change</para>
        </entry>
        <entry>
          <para>Monitor this to see attempts to change local security policies and to see if someone has changed <glossaryEntryLink><linkText>user rights</linkText><uri href="mshelp://windows/?id=1003262d-135d-4b40-8765-c26071d06445#gtmt_user_rights_def"><summary>View definition</summary></uri></glossaryEntryLink> assignments, auditing policies, or trust policies.</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Privilege use</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone performs a task on the computer that they have permission to perform. </para>
        </entry>
      </row>
      <row>
        <entry>
          <para>Process tracking</para>
        </entry>
        <entry>
          <para>Monitor this to see when events such as  program activation or a process exiting occur.</para>
        </entry>
      </row>
      <row>
        <entry>
          <para>System events</para>
        </entry>
        <entry>
          <para>Monitor this to see when someone has shut down or restarted the computer, or when a process or program tries to do something that it doesn't have permission to do. For example, if spyware tried to change a setting on your computer without your permission, system event monitoring would record it.</para>
        </entry>
      </row>
    </table>
    <procedure expandCollapse="collapse">
      <title>To turn on auditing</title>
      <step>
        <para>
          <shellExecuteLink>
            <linkText>Click to open Local Security Policy.</linkText>
            <command>%25systemroot%25\system32\mmc.exe secpol.msc</command>
            <summary>Click to open Local Security Settings</summary>
          </shellExecuteLink>
          <phrase replaceWith="mshelp://windows/?id=65c34c9e-e37f-4395-b3c1-483031afce03#altnav_local_security_settings">
            <notLocalizable>__elbasuer__</notLocalizable>
          </phrase>‌ <phrase replaceWith="mshelp://windows/?id=0e88efcb-0f3f-4a37-8ccc-331c81b96adc#lua_prompt"><notLocalizable>__elbasuer__</notLocalizable></phrase></para>
      </step>
      <step>
        <para>In the left pane, double-click <ui>Local Policies</ui>, and then click <ui>Audit Policy</ui>.</para>
      </step>
      <step>
        <para>Double-click the event type that you want to audit.</para>
      </step>
      <step>
        <para>Select the <ui>Success</ui> or <ui>Failure</ui> check box, or both, and then click <ui>OK</ui>.</para>
        <list class="unordered">
          <listItem>
            <para>If you select <ui>Success</ui>, <notLocalizable>Windows</notLocalizable> will record any successful attempts to complete the type of event that you are monitoring. For example, if you're auditing logon events, any time someone logs on to your computer would be considered a successful logon event.</para>
          </listItem>
          <listItem>
            <para>If you select <ui>Failure</ui>, any unsuccessful attempt to log on to your computer will be recorded.</para>
          </listItem>
          <listItem>
            <para>If you select both <ui>Success</ui> and <ui>Failure</ui>, <notLocalizable>Windows</notLocalizable> will record all attempts.</para>
          </listItem>
        </list>
        <para>There is a limit to how many events can be recorded and, if the audit log gets too full, it can slow down your computer. To make more space, you can delete events from the log when you're viewing them in Event Viewer.</para>
      </step>
    </procedure>
    <procedure expandCollapse="collapse">
      <title>To monitor who  opens documents</title>
      <step>
        <para>Right-click the document or file that you want to keep track of, and then click <ui>Properties</ui>.</para>
      </step>
      <step>
        <para>Click the <ui>Security</ui> tab, click <ui>Advanced</ui>, and then click the <ui>Auditing</ui> tab.</para>
      </step>
      <step>
        <para>Click <ui>Continue</ui>. <phrase replaceWith="mshelp://windows/?id=0e88efcb-0f3f-4a37-8ccc-331c81b96adc#lua_prompt"><notLocalizable>__elbasuer__</notLocalizable></phrase></para>
      </step>
      <step>
        <para>Click <ui>Add</ui>.</para>
      </step>
      <step>
        <para>In the <ui>Enter the object name to select</ui> box, type the name of the user or group whose actions you want to keep track of, and then click <ui>OK</ui> in each of the four open dialog boxes.</para>
        <para>If you want to monitor everyone, type <userInput>Everyone</userInput>. If you want to monitor a particular person, type the name of the computer followed by the person's user name or the name of the domain followed by the person's user name (if the computer is on a domain): <replaceable>computer</replaceable><userInput>\</userInput><replaceable>user name</replaceable> or <replaceable>domain</replaceable><userInput>\</userInput><replaceable>user name.</replaceable></para>
      </step>
      <step>
        <para>Select the check box for any action you want to audit, and then click <ui>OK</ui>. The following table describes what you can audit.</para>
        <table>
          <title>Auditable actions for files</title>
          <summary>Table describing auditable actions for files</summary>
          <tableHeader>
            <row>
              <headerEntry>
                <para>Action</para>
              </headerEntry>
              <headerEntry>
                <para>Description</para>
              </headerEntry>
            </row>
          </tableHeader>
          <row>
            <entry>
              <para>Traverse folder/execute file</para>
            </entry>
            <entry>
              <para>Keeps track of when someone runs a program file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>List folder/read data</para>
            </entry>
            <entry>
              <para>Keeps track of when someone views the data in a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Read attributes</para>
            </entry>
            <entry>
              <para>Keeps track of when someone views the attributes of a file, such as read-only or hidden.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Read extended attributes</para>
            </entry>
            <entry>
              <para>Keeps track of when someone views the extended attributes of a file. The extended attributes are defined by the program that created the file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Create files/write data</para>
            </entry>
            <entry>
              <para>Keeps track of when someone changes the contents of a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Create folders/append data</para>
            </entry>
            <entry>
              <para>Keeps track of when someone adds data to the end of a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Write attributes</para>
            </entry>
            <entry>
              <para>Keeps track of when someone changes the attributes of a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Write extended attributes</para>
            </entry>
            <entry>
              <para>Keeps track of when someone changes the extended attributes of the file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Delete subfolders and files</para>
            </entry>
            <entry>
              <para>Keeps track of when someone deletes a folder.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Delete</para>
            </entry>
            <entry>
              <para>Keeps track of when someone deletes a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Read permissions</para>
            </entry>
            <entry>
              <para>Keeps track of when someone reads the permissions on a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Change permissions</para>
            </entry>
            <entry>
              <para>Keeps track of when someone changes the permissions on a file.</para>
            </entry>
          </row>
          <row>
            <entry>
              <para>Take ownership</para>
            </entry>
            <entry>
              <para>Keeps track of when someone takes ownership of a file.</para>
            </entry>
          </row>
        </table>
        <alertSet class="note">
          <title>Note</title>
          <alert>
            <para>Selecting the <ui>Full control</ui> check box selects all of the auditable actions.</para>
          </alert>
        </alertSet>
      </step>
    </procedure>
    <procedure expandCollapse="collapse">
      <title>To view audit logs</title>
      <step>
        <para>
          <shellExecuteLink>
            <linkText>Click to open Event Viewer.</linkText>
            <command>%25systemroot%25\system32\mmc.exe eventvwr.msc</command>
            <summary>Click to open Event Viewer in Control Panel</summary>
          </shellExecuteLink>
          <phrase replaceWith="mshelp://windows/?id=ed7b589a-dee6-474a-a566-124683d607cf#altnav_event_viewer">
            <notLocalizable>__elbasuer__</notLocalizable>
          </phrase>‌ <phrase replaceWith="mshelp://windows/?id=0e88efcb-0f3f-4a37-8ccc-331c81b96adc#lua_prompt"><notLocalizable>__elbasuer__</notLocalizable></phrase></para>
      </step>
      <step>
        <para>In the left pane, double-click <ui><notLocalizable>Windows</notLocalizable> Logs</ui>, and then click <ui>Security</ui>.</para>
      </step>
      <step>
        <para>Double-click an event to see the details.</para>
      </step>
      <alertSet class="note">
        <title>Note</title>
        <alert>
          <para>To delete logs, click <ui>Clear Log</ui> in the Actions pane.</para>
        </alert>
      </alertSet>
    </procedure>
    <para>For more information about security auditing, including detailed audit policies, go to <navigationLink targetVerification="false"><linkText>Security Auditing</linkText><uri href="http://go.microsoft.com/fwlink/?LinkID=93806"><summary>Go to www.microsoft.com and search for "security auditing"</summary></uri></navigationLink>
on the Microsoft website.</para>
  </content>
</tutorial><?xml version="1.0" encoding="utf-8"?>
<HelpCollection Id="secpol" DTDVersion="1.0" FileVersion="" LangId="1033" Title="secpol" Copyright="© 2008 Microsoft Corporation. All rights reserved." xmlns="http://schemas.microsoft.com/help/collection/2004/11">
  <CompilerOptions CompileResult="H1S" CreateFullTextIndex="Yes" BreakerId="Microsoft.NLG.en.WordBreaker">
    <IncludeFile File="secpol.h1f" />
  </CompilerOptions>
  <VTopicDef File="secpol.h1v" />
  <KeywordIndexDef File="secpol_AssetId.h1k" />
  <KeywordIndexDef File="secpol_BestBet.h1k" />
  <ItemMoniker Name="!DefaultTOC" ProgId="HxDs.HxHierarchy" InitData="AnyString" />
  <ItemMoniker Name="!DefaultFullTextSearch" ProgId="HxDs.HxFullTextSearch" InitData="AnyString" />
  <ItemMoniker Name="!DefaultAssetIdIndex" ProgId="HxDs.HxIndex" InitData="AssetId" />
  <ItemMoniker Name="!DefaultBestBetIndex" ProgId="HxDs.HxIndex" InitData="BestBet" />
</HelpCollection><?xml version="1.0" encoding="utf-8"?>
<HelpFileList>
  <File Url="assets\279d63a1-e0cd-46a1-92f5-09b944f80fa0.xml" />
  <File Url="assets\7177b781-6e07-484a-8945-3a2cbf407eaf.xml" />
  <File Url="assets\8de05792-3165-416f-828a-422e9d463cd3.xml" />
</HelpFileList><?xml version="1.0" encoding="utf-8"?>
<VTopicSet DTDVersion="1.0">
  <VTopic Url="assets\279d63a1-e0cd-46a1-92f5-09b944f80fa0.xml" RLTitle="Change password policy settings">
    <Attr Name="assetid" Value="279d63a1-e0cd-46a1-92f5-09b944f80fa0" />
    <Keyword Index="AssetId" Term="279d63a1-e0cd-46a1-92f5-09b944f80fa0" />
    <Keyword Index="BestBet" Term="password settings" />
    <Keyword Index="BestBet" Term="password policy" />
    <FTSText>change password expiration change password expire change password disable password local security policy password change password expiration password expire Password Policy password settings password policy secpol secpol.msc Security policy</FTSText>
  </VTopic>
  <VTopic Url="assets\7177b781-6e07-484a-8945-3a2cbf407eaf.xml" RLTitle="Require strong passwords on this computer">
    <Attr Name="assetid" Value="7177b781-6e07-484a-8945-3a2cbf407eaf" />
    <Keyword Index="AssetId" Term="7177b781-6e07-484a-8945-3a2cbf407eaf" />
    <Keyword Index="BestBet" Term="strong passwords" />
    <FTSText>passwords strong password</FTSText>
  </VTopic>
  <VTopic Url="assets\8de05792-3165-416f-828a-422e9d463cd3.xml" RLTitle="Monitor attempts to access and change settings on your computer">
    <Attr Name="assetid" Value="8de05792-3165-416f-828a-422e9d463cd3" />
    <Keyword Index="AssetId" Term="8de05792-3165-416f-828a-422e9d463cd3" />
    <FTSText>AUDIT event log event tracing windows etw Event Viewer local security policy tracking</FTSText>
  </VTopic>
</VTopicSet><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="AssetId" /><?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE HelpIndex>
<HelpIndex DTDVersion="1.0" Name="BestBet" /> qyT`FELs"U(]QJ"JTe(*%\ҮKUj(%TH[;l@Ds<;~rDDKr	(ДaV"V	0al$Eja6CEZvpF	@QPBWiWZ	߿pCA6ˇk[VN;?-o
'<(.Ng!{#~߈pɃƳCo"vQMΦ}S~CW&oͿM7yoތͥQ(M;Sʻ|wf[7_9pq5˛}rnyn.ny;远_^̹5^ǹccù9wk腞$>7qqsy=9σs=s<='aoJz%>OL='JozNit\SOڨz
zsm{^^{7Nk[.8ǹsR*G?:ֻ7wWﭿs,i~z7<w	_I<~^ϵv>J9˿ϻ];/f[}kzm޿Q5{?],{mfA^}kmzw˿Н⵺v{mw:mMto/EWumOI^ŷ{m׎}k;^{mמoػ7ww❸|0ɏ'tfi~z陾髾O_կfuC}W}uWKoվZpկꪶܯ~M㯯nύu~s=7wﴶ{snw߽w{t׽~7{{|wq_w_3w{o|[/{|fn¶Wyw66ܰWnm]޿0##^b?ď]p_;6.|Efe7~V_^;}~|bz
:])_J^WMvz[v՘/_3Zk^|ޱ]v~bz{kvz.ί_Ef>K}bM{=k.x"Wv{(`;7{"w.]ӣGr^->؟;]Nw8eY;w;(1/~x}Gt>}o#qǼPc1!ߖA8p38t}=A~6GiN)9iGٍM㼟n7>߾H~K9q]q/N):+SJLuOpN)=:S=S:uJ錳N)ҝ):t{JtƼJuOz|OO~ҹ)>:Ss>S:>:Ss:t`lOΌN)9S:>:/SJf|t|JtvǧJ|t|JtɧJ|tvJLO|OΘ霚OμN)ҙ;)ҝ?)C)>:SJ}tg}Jt.h9:SJvN)>S:wJN)>:S3;ttҹS)Y:ۻSJ^}tg}JtnxN)>S:wJ̰OOβҹS:}JtLN:/Ss<t΂lOyҝq)3>S:}JtݧJ}txJlO)3<tNyJ:KyRJgx{B䋷x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^x^/ŋx/^ʥ~7
ѐ

;|444q~
&Ώah4<|<!h4Ly~
ÞGph>
[.h>
_0ØGhhx|44D~
áGѐ8hF?h&?Jҏh6i>
5ӏh4~
7ԏahJ?SGC4|?VGChb>
}?ahn>
GCahz>
Gh8$}4a?h8>
Gahh>&h?CGah4T~
KGCa\}4>l?ah?@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@x@ȟm`00``00``00``00``00``00``00``00`DYDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD}U
A/}/'Ӹ^N]~3y!l/8epo)po;4qgK44SRW)\,|J%8<4^ow(h#6b1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b#Fb1F#Ĉ1b?F!u!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!7/)0r,/C!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ2dC!d2!CȐ8dwo-7[?WSm\<~F\.\…p\.¸p.\…p\.j\p\.¸p.\…p\.¸p.\(p\.qp.\…p\.{4p\.¸p.\ÅQZ.kcWָp.\…p\.¸p.\…p\.{Pcp;m;q莨;C>}`63zG^;
Oó}_<jCۇ>Ax#-Ł}gX<HLqp G44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4=Mqϭ#jګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjګjjڷqC@>ii{4MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4qOxjګjjګjjګjm\m7V[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmo[ZM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4qO
.\p\MQE\[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmV[[mVmo[Z|M44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM4?6K44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44Mm44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM
>9~iiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiۦw4MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44MM44Myeii{'usS?NW^?`nϗWz5l)s=IE\'tc^yM:y']x)~^S^ǹ<b|l_q;{=
^rA/pyw=?_Dp{vZ&7xnϦ.ܷͭ`Ozġc!9pIKQ/Rݸ6w:[9r{k\[C*RutҭUU--nT[͜[~shft=~s8Ak\2GW*W91_h¤e_'Ȼ0.Wk̲5JamͰ攪MFӒcN,aEFtif	Gm Xp.h

+w.uAT!e\(E4-4<D0'L-m<:Rfc=;j`^0eA"wTS08䆉F)6JSTu5
$ͺ}gvo]wV,+ii2cO2WavPӊrfbiG7peթϧ0!8DžmCI/-Y`mֵ{BN9Mmdwk+"'ȋ5cG,{%@?J0(a:!ef+f3L;'C꼱ے䚗I?*TX8+6dfQt&_} #FiCzlV?	z${ؕ7	]8Fxt=
@˧UaI]Pݾ8`jӟG4:
2\51/0P$MF'JPi%%Dg;&Gw;q<#>u$edX"ծ{΅Ti匜R,ZoWQ#7.dutHW|?@*^ծi{)Z+f=;}r>x}ag;cM̂w>fZMO9]~}\.)Vo	:׉1Q
V|LFo94}NFju"{ԉFbZǎ]ILK<AZN#E;$K\xefIgvP?Sl;+tĿsl@
f/aw%p>芹T)?HOv}]ßZ~U8ԉ
eb-
-Xi~
vt-cxdڶFoԌez,gY+WQ@Gdfk?2knKX2l)L/PQhj2/AҦI	~;=aEw4SvN/
%0;>|"2CcȔrZLE7QPcQU1^u[q
,"B$9ǃ,a&?Y⍩xv$%sTܲM~eZ34=Lv2PC$^A(XeCX׃j/ۣZTDbթwV(YnJcsַg~чjEwҒrJXCtT!V2'Yfy6rX̪ku^Mo${)Gg;h.cX"{j?͚^tJb5DAzCʫPg2xx(ٍ2oF.@v,V$xhY\cdx/[/vEՎW{-s<p~{*O؇ibStYbylefjtgʋvYGLT<aG
;C7&
[X5Dh+Ҵ- ZF(8xZE?Ս.u9ͬuh$Cl\a#L(B0]Mq c4#lvuTU,OEGleN7_!+\awҕBwjTχE,j--sJUiOѺLLC
+CQ"^kU2>R\cc"v>y\SJQEFN3A zAff-/n4霆H$+H!j6QyBܻpՆͿ	iKߣ
WQ; "2F/<bg͇Dc23#d#]ZZReV)	%:Dkz.[QV~})_#dïFÎܒτ4LStɣ3#]jݔB?c']]ed:^#.5et:gVvO2{BX+в8W2٢l{k\=uAZ&_[زGt$l)*V:"7M(U,{c5ɧTir(rG*kuIXr:`^6Vs%{x浬s
^G7Fgā+~<|H07_b>L1<޸Sr-fSF{"(&6K7)ԯUg2o6'OM1c*eN/-HVkKJUSiRe`wm/.AZҰ5mfEgtd8
s>UIאJw+p9%M5%!XzM'ץ֔N\JPܾթ~]Fӌ{O]`OlKwۥ.gEcWWX]yFLY.-Hq0ЏPZ'sdV:fB &-Եt*1kLҙ%=,Z	mM)EhxOu5Y	
Z{{N"I`4Bɵ$q7Ӊ}G;ď􉔈vW<	o@*5ș*r7ޤvzz>{G,[z)[]cw)(u(qj)$lvA^(Z
Dwڇ9(PT.8x|bYdsoa)iۨ]Ro{Ɲ|0h2Ft
%41:WKl2G%g6k5T~*EP;x-9ʾև½{!^܊.<Y
OPFɷv?4Oq͓RJqL^$sr3&zт5RVsOVr9H\k~fVvqN6fvG'udD3eJ6exϬ]zu>,F+F2K@-ꃭѮ	:QAjFy	wd~I1xwO@N>1Hʈ`8͋ilbȺ6dז;2q[W1gg?stϙ	*'eD,p~ͯj־lsu{]y	zqiɍ19x'doJt~<9H<U'EۋN7({@vQ&te#7ʍfB*J]|$}qĭus	yC#AkFZ6U% orLF6G%
k}r~X؃{aqrt'1Jlm1/KYrxfl
gS֓Y)ܠbQv&ByD[-3 gF,p vSN1yMQ^~]8yxGtՕ$}l
d;
TA_6ٛSpSǺg޴rA@˴v;msi84;r4H/<?kfi|kP9ڄ3~Ax,GqԉKwWמּw1˜]Q4?t<Pk}I(BF5=fXӕL@xJ8br<i(jkT4puwuj(,,md
YSdAPGkF׫tubЍ5!cH1ܨ]~لpt^1F@	}C
lXչ(s<҂(DZ>Wf
sY#=0<Is߷jF7
7ٞ4vUt,<mXwl^mNKlՔH*n%\|S8_N&efc*Ŗ.kCBGDE*vdׁ|ޣԇ6bZ/bDey\BgoG;W-R/r\5up3l1ª3x}i9VofF-䣗1ŴevYU?Xz1![3;Nȧ%kmt=D0:Y!B&ܪy0D
Ɔ>IĈg#`L?s	R:6<R#l?:ϰJ3E$S&*׏?ጅ텗#墙g r~dd:Jԯ@Mlo5ٶQ)ttv&qmGEh.Y"!oK5ӎ>2prd]4!óy6nLE3tX|`~c81zjvZ%}{T{<_5O:Tm'rܻT^mE<Qm`̰jլՙ+\aՇ婧:oywKDiQ10=/t "/pH.ij ksyrXޘ~;3~'@軯ŬkZJ9Rͻ}%(4)J
3鄢CmOO)ki24ijTxiT$!)123JISIK$$*q$|<ZbRNO'%h%"#p"X>>8qiѷ']Pq{mP?poߋgh[F
#;^X!kXAztFF~|l@Y@E>[CL3dҲdn-`O
W0Tn7={Z5np^
z؉/j̴L071[IQTK+P38
S*BI{UiV9)*^%?Vo.)ͫoj.]fXzߤga:?}lnҮ~z>^gF}'=2l7UiH닡6?ݧ~&e4ۏ-yŹ{ۊFU1L'8p&:oMc2M# &lqnDlnš5T'fXQAk9%3)X<gs#ݵu>߽W56]()!-R
g9W)UYm߫P`$uZ4oz³;*q(zSXdz>m	,JB
oóbXϒ+WdS^UКKB.R;MK3)OSLZgS
9eehg%#lP&>2
527dvHՙ"l՟
E΍@u4R]e҇ns]csk̋y,բJ1Ą3@hjD9-(m'8M6t+pŢ9"@	>̡b9W";uh?ܬ8,Q`-g7
x}oGn5D~`j8۽aѬ׈$(ޱ<bҋ/ִb-qPrcǩEz˺e80	Xq

0%>Yo$"id59{M5E9/N-EZT+]jjW
ݫ4Wt˵	UчfBUfNuӪmHbPTrYeES<Eoi3~G]P<CZ*b=
:]W|
~UYޛC4^~@")ϕoZIg>t-6G7rT*ƺ|J/}N®1t]?CErQ0_'S7s,;JsSǦG{BL)wwOnrFt{Uqٝ]LqlbsL4\bx0愬R3=q_%mP!XQڻkqA
8AgO)ҀZX>g.B50_4j)Hr]qFu
e9JE<yZu%
˨[]VNR0IޕRa!x\(Z0Ѝ#D0v5n@ծo414xm;g"6M(g]a"xJ$tUjrBPaU6FnsijԼEFh4ƂktdsVf1nЀHatVN91
W^<aX8UPݩ崯aXiS"	'ѭ|cMX'&>m{66R)v;w*P]d\jH-4Gnꅌo֮#Үk\@r6bfc&R+1%rY%ϪeL!TrǏ11"rsi2.)f	с_1Y<ID‹yHtw)b4Hng<홏3Nw+ئݷ=R&K`r_^G]EWְR霅e2=4Y_rU]OV2BRL<N7e,#&ĕm9MjJ}:ߖN	p1F@AbI-%^JHN@OvIċia0ur\8!_Rv	@~\ELj\)o^*؈aT+BG(7,.4~!#1?&ł~8A>A~f4f)CT9BtL6˼*yÕ(nha
Lxt
78۠~s(vN+{,RR$շ*vb>LgLk8~a,@@A`B[,4B+"{Pe5e,
e=2XFCgfy)|F+a'N➡Q(	o*fm˺N;`Ӊ.E;ث/<ݡ
j7M|q{Nfx,xt?j4	
ʄ#8O;
 m3q/Ih,|pכ6o]vsי /+C?{k{ K]b^C`gIŀ :3"}%+
||!.g%oH^[On|?x=[qm?8n:Ƌx)\b8oO(	
rşX캺Pca+B/΢p߱"EtTY|=_DE^N6?!K pqsbw7cIp(@dRdY	jbưRxn	>1 T?b7y_[ľiBr~9L<ϧRS?I'w
lٙSd%Ӹɿ2|fn&ߧ_d@J0[JӃLvAh|G'$Z|o
4y_Ӈ]ZM_
)O~Y|fϷN,
qd%R\Ø+OO1ˀ8@(R7'5

Anon7 - 2022
AnonSec Team